{"id":12646,"date":"2024-03-14T13:18:31","date_gmt":"2024-03-14T12:18:31","guid":{"rendered":"https:\/\/blog.prif.org\/beyond-the-code\/"},"modified":"2024-03-14T13:18:31","modified_gmt":"2024-03-14T12:18:31","slug":"beyond-the-code","status":"publish","type":"post","link":"https:\/\/blog.prif.org\/en\/2024\/03\/14\/beyond-the-code\/","title":{"rendered":"Beyond the Code: Unveiling Gender Dynamics in AI and Cybersecurity for International Security"},"content":{"rendered":"<p><strong>Emerging technologies are transforming foreign and security policy as they challenge traditional understandings of power, influence and security. Developments in artificial intelligence (AI) and the increasing importance of cyberspace are some of the most prominent in this regard. Yet, not only are there repercussions for security when narrowly conceived as state security, but they also affect gender relations and human security more broadly. Gender as an analytical category allows us to shed light on the impact of emerging technologies on inequalities, power and violence.<\/strong><\/p>\n<p>Gender is highly relevant to international cybersecurity and AI technologies but is often overlooked and under-analyzed. Technology, security and gender are mutually reinforcing \u2013 gender influences technological developments and security policies and gendered violence is replicated and amplified through them. This is why we argue that international cybersecurity and the use of AI technologies are in need of a critical gender perspective to reveal and counter those unequal power structures and forms of violence. Neglecting the gendered dimensions of emerging digital technologies hinders the development of security practices aligned with the needs and realities of those most affected.<\/p>\n<p>A gender perspective allows us to highlight how challenges such as hacking (i.e. unauthorized access, theft, destruction, or manipulation of information), disinformation, or structurally inbuilt biases may affect the security of vulnerable groups. Widespread hacking of sensitive health data containing information about abortions can lead to significant risks for patients and health workers in contexts where reproductive health and rights are not recognized.<a href=\"https:\/\/www.politico.com\/news\/2022\/06\/17\/abortion-rights-advocates-digital-security-threats-00040654\" target=\"_blank\" rel=\"noopener\" name=\"_ftnref1\"><sup>1<\/sup><\/a> Disinformation campaigns frequently target women, individuals of diverse sexual orientations, gender identities, expressions, and characteristics (SOGIESC), as well as human rights activists, subjecting them disproportionately to hate speech and violence.<a href=\"https:\/\/www.europarl.europa.eu\/RegData\/etudes\/BRIE\/2021\/653644\/EXPO_BRI(2021)653644_EN.pdf\" target=\"_blank\" rel=\"noopener\" name=\"_ftnref2\"><sup>2<\/sup><\/a> <a href=\"https:\/\/eu.boell.org\/en\/2021\/07\/09\/gendered-disinformation-6-reasons-why-liberal-democracies-need-respond-threat\" target=\"_blank\" rel=\"noopener\" name=\"_ftnref3\"><sup>3<\/sup><\/a> Existing gender and racial biases are deeply ingrained in data sets used for training AI applications. AI models thus perpetuate discrimination by reproducing and reinforcing biases, often with unpredictable consequences.<a href=\"https:\/\/time.com\/5520558\/artificial-intelligence-racial-gender-bias\/\" target=\"_blank\" rel=\"noopener\" name=\"_ftnref4\"><sup>4<\/sup><\/a><\/p>\n<p>The rapid and global evolution of cyberspace \u2013 the virtual environment where communication, interaction and the exchange of information between computers, devices, and people takes place \u2013 is prompting states to enhance traditional security measures. They focus on safeguarding critical infrastructure and boosting military capabilities for potential cyber operations. Artificial intelligence today is largely based on machine learning (ML) algorithms that are used to classify large sets of data and recognize patterns in text, speech or images.<a href=\"https:\/\/www.iks.fraunhofer.de\/de\/themen\/kuenstliche-intelligenz.html.\" target=\"_blank\" rel=\"noopener\" name=\"_ftnref1\"><sup>5<\/sup><\/a><\/p>\n<div class=\"su-box su-box-style-default\" id=\"\" style=\"border-color:#00574c;border-radius:3px;\"><div class=\"su-box-title\" style=\"background-color:#0e8a7f;color:#ffffff;border-top-left-radius:1px;border-top-right-radius:1px\">Gender and Intersectionality<\/div><div class=\"su-box-content su-u-clearfix su-u-trim\" style=\"border-bottom-left-radius:1px;border-bottom-right-radius:1px\">Gender relates to social and cultural norms, behaviors, and identities that are assigned to specific gender categories. In most societies, gender is constructed within a male and female binary and determines who holds power and has access to resources.<\/p>\n<p>Because gender is not the only power structure, an intersectional approach is needed that takes into consideration context-specific forms of discrimination and oppression on ground of class, ethnicity, race, age, nationality, and more.<sup>6<\/sup><\/div><\/div>\n<p>These AI technologies are increasingly being integrated into the military domain and cybersecurity, be it for rather mundane activities such as logistics, improving and increasing military decision-making or enhancing autonomous functions in weapons systems.<sup>7<\/sup><\/p>\n<p>However, issues surrounding digital technologies and security have predominantly been discussed within supposedly gender-neutral but deeply male-centric and militarized paradigms and understandings of security. Additionally, the perception of threats and the development of protective measures have been shaped by a largely homogenous \u2013 white and male \u2013 group, inadvertently side-lining the unique experiences, expertise, and vulnerabilities of women and other marginalized groups. It is imperative to recognize gendered and intersecting power structures as a crucial variable influencing cybersecurity and military AI applications.<\/p>\n<h2><strong>Understanding the need for gender analysis of digital technologies<\/strong><\/h2>\n<p>Existing international frameworks in the field of disarmament, as well as the United Nations Women, Peace, and Security (WPS) agenda, have become recognized frameworks for addressing gender as an issue for international security.<\/p>\n<div class=\"su-box su-box-style-default\" id=\"\" style=\"border-color:#00574c;border-radius:3px;\"><div class=\"su-box-title\" style=\"background-color:#0e8a7f;color:#ffffff;border-top-left-radius:1px;border-top-right-radius:1px\">Underrepresentation<\/div><div class=\"su-box-content su-u-clearfix su-u-trim\" style=\"border-bottom-left-radius:1px;border-bottom-right-radius:1px\">In arms control, non-proliferation and disarmament fora heads of delegations are mostly men and women only account for 20%-32% of delegates in multilateral meetings.<sup>8<\/sup> In cyber diplomacy, women only made up on average 20% of participants within the UN Groups of Governmental Experts (GGE). Only 24% of delegations were led by women.<a href=\"https:\/\/unidir.org\/wp-content\/uploads\/2023\/05\/Gender-in-Cyber-Diplomacy_Factsheet.pdf.\" target=\"_blank\" rel=\"noopener\" name=\"_ftnref2\"><sup>9<\/sup><\/a>\u00a0During the first UN expert meeting on autonomous weapons systems in 2014, of the 18 experts who were invited, none were women.<a href=\"https:\/\/www.justsecurity.org\/10424\/women-autonomous-weapons\/\" target=\"_blank\" rel=\"noopener\" name=\"_ftnref1\"><sup>10<\/sup><\/a><\/div><\/div>\n<p>More recently, feminist foreign policies are slowly beginning to engage with cybersecurity and emerging AI technologies. An intersectional feminist perspective on security first entails the deconstruction of mainstream security discourses and practices and then the analytical refocusing on diverse security needs and experiences of violence by marginalized groups. Violence can be understood as a continuum that includes, in addition to physical violence, other dimensions such as structural, economic, discursive, or cultural violence.<a href=\"https:\/\/friedensgutachten.de\/user\/pages\/04.archiv\/2022\/02.ausgabe\/06.nachhaltiger-frieden\/FGA2022_Kapitel%202.pdf\" target=\"_blank\" rel=\"noopener\" name=\"_ftnref1\"><sup>11<\/sup><\/a> This is why a feminist approach is imperative to sustainably mitigate the layered risks amplified and reproduced in and through cyberspace and AI technologies for individuals, structurally disadvantaged groups, societies, and states.<\/p>\n<p>But how exactly does gender shape security, AI technologies and cyberspace? Two aspects that determine the relation of gender and security have to be highlighted.<sup>12<\/sup> First, international security policy and our thinking about war and violence is embedded in gendered power structures that privilege masculine forms of knowledge and action, as well as state-centric and militarized security understandings. This becomes evident in the domination of male personnel in the field of international security, in their applied strategies and military thinking but also in masculine language.<sup>13<\/sup> Second, not only is the physical world is shaped by gendered structures and violence, but these are reproduced in cyberspace and through AI as humans are developing and using the newly created spaces, tools and instruments.<a href=\"https:\/\/reachingcriticalwill.org\/images\/documents\/Publications\/gender-cybersecurity.pdf\" target=\"_blank\" rel=\"noopener\" name=\"_ftnref4\"><sup>14<\/sup><\/a><\/p>\n<p>Gender therefore influences the definition and scope of security policies and gendered hierarchies and practices mutually reinforce each other. It is, like other fields relevant for international security, highly dominated by masculine and militarized thinking that translates into corresponding action. Applying an intersectional gender lens to cyberspace and military AI in the context of international security means to acknowledge a wide range of insecurities that otherwise remain invisible. Those become evident in (1) unequal participation and representation, (2) reinforced gender biases through AI and (3) issues of data protection and privacy.<\/p>\n<p>The underrepresentation and lower participation of marginalized groups has been a constant feature of security politics, not only when it comes to cybersecurity and AI. However, in these areas such tendencies become glaringly obvious.<\/p>\n<p>In all aspects of the cybersecurity profession, women and people with diverse SOGIESC are underrepresented. Only 24% of the cybersecurity workforce worldwide are women;<a href=\"https:\/\/media.isc2.org\/-\/media\/Project\/ISC2\/Main\/Media\/documents\/research\/ISC2-Women-in-Cybersecurity-Report.pdf?rev=d9c1e6269f8d43b19ee8fae5972a1bf5.\" target=\"_blank\" rel=\"noopener\" name=\"_ftnref1\"><sup>15<\/sup><\/a>\u00a0of these, 9% Black, 4% Hispanic and 8% Asian women make up only a very small proportion of the total workforce. Although global statistics show<a href=\"https:\/\/blog.gitnux.com\/cybersecurity-diversity-statistics\/\" target=\"_blank\" rel=\"noopener\"><sup>16<\/sup><\/a> that the number of women is increasing, more than half of all women in cybersecurity feel like they can\u2019t reach higher positions in their organizations; an experience that is much higher for women that are also part of a minority. The same trends can be observed in the field of AI professions. While the number of women in computer science and AI has been increasing, only around 22% of AI computer scientists are women.<a href=\"https:\/\/www.turing.ac.uk\/sites\/default\/files\/2021-03\/where-are-the-women_public-policy_full-report.pdf\" target=\"_blank\" rel=\"noopener\" name=\"_ftnref3\"><sup>17<\/sup><\/a><\/p>\n<div class=\"su-box su-box-style-default\" id=\"\" style=\"border-color:#00574c;border-radius:3px;\"><div class=\"su-box-title\" style=\"background-color:#0e8a7f;color:#ffffff;border-top-left-radius:1px;border-top-right-radius:1px\">Online Gender Based Violence (OGBV)<\/div><div class=\"su-box-content su-u-clearfix su-u-trim\" style=\"border-bottom-left-radius:1px;border-bottom-right-radius:1px\">\n<p>OGBV can be understood as part of the continuum of violence against women and people of diverse SOGIESC as violence offline and online are mutually reinforcing each other. In traditional understandings of cybersecurity, forms of OGBV are largely neglected. It describes \u201ca range of different forms of violence perpetrated by ICT means on the grounds of gender or a combination of gender and other factors.<a href=\"https:\/\/eige.europa.eu\/sites\/default\/files\/cyber_violence_against_women_and_girls_key_terms_and_concepts.pdf\" target=\"_blank\" rel=\"noopener\" name=\"_ftnref1\"><sup>18<\/sup><\/a> The most common forms are cyber stalking, cyber harassment, cyber bullying, online gender-based hate speech and non-consensual intimate image abuse. It becomes visible in the context of intimate partner violence<a href=\"https:\/\/www.e-ir.info\/2022\/09\/18\/interview-julia-slupska\/\" target=\"_blank\" rel=\"noopener\" name=\"_ftnref2\"><sup>19<\/sup><\/a> but also in gendered disinformation campaigns and hate speech.<a href=\"https:\/\/www.dcaf.ch\/cyber-violence-against-women-and-girls-western-balkans-selected-case-studies-and-cybersecurity\" target=\"_blank\" rel=\"noopener\" name=\"_ftnref3\"><sup>20<\/sup><\/a><\/div><\/div>\n<p>Even more troubling is the global inequality of representation among support workers labelling datasets for training, who are overwhelmingly located in the Global South.<a href=\"https:\/\/www.nytimes.com\/2019\/08\/16\/technology\/ai-humans.html\" target=\"_blank\" rel=\"noopener\" name=\"_ftnref4\"><sup>21<\/sup><\/a><\/p>\n<p>Reasons for the lack of equal participation and representation are plentiful. Unequal access to education, individual priorities, masculine work culture in the digital sector, unequal distribution of care work and the influence of norms that associate technical skills with men. The fields of natural science, technology, engineering and mathematics (STEM) are traditionally male dominated which means that gendered norms and assumptions as well as patriarchal structures are reproduced. While representation can only be a first step in overcoming gender inequalities and won\u2019t solve underlying structural issues, it is nonetheless important to integrate meaningful perspectives and experiences of marginalized groups.<a href=\"https:\/\/www3.weforum.org\/docs\/WEF_GGGR_2023.pdf\" target=\"_blank\" rel=\"noopener\" name=\"_ftnref5\"><sup>22<\/sup><\/a><\/p>\n<h2><strong>AI reinforces gender biases<\/strong><\/h2>\n<p><a href=\"#_ftnref1\" name=\"_ftn1\"><\/a><\/p>\n<p>A recent study on publicly available instances of biases in AI machine learning systems found that 44.2% of those systems demonstrate gender bias and 25.7% both gender and racial bias<a href=\"https:\/\/ssir.org\/articles\/entry\/when_good_algorithms_go_sexist_why_and_how_to_advance_ai_gender_equity#\" target=\"_blank\" rel=\"noopener\" name=\"_ftnref1\"><sup>23<\/sup><\/a>. But where do these biases come from and what do they mean? Through these biases, outputs were incorrect and\/or discriminatory. These biases arise because machine learning algorithms reproduce or even amplify social gender norms. First, programmers might reproduce unintentional biases because, as pointed out above, AI work and computer science lack diversity and equal representation. Second, the data itself can exhibit gendered and racialized stereotypes that are then reproduced through the algorithms when social groups are over- or underrepresented or misclassified.<a href=\"https:\/\/www.nytimes.com\/2019\/11\/19\/technology\/artificial-intelligence-bias.html\" target=\"_blank\" rel=\"noopener\" name=\"_ftnref2\"><sup>24<\/sup><\/a> The consequences of gender biases being reinforced by technologies are even more serious in military AI applications.<sup>25<\/sup>\u00a0In targeting decisions for instance, the distinction between combatants and civilians is essential. If however, autonomous or AI-supported targeting decisions are influenced by gender biases, &#8216;military-aged men\u2019 will most likely be disproportionately miscategorized as combatants and thus as potential targets. AI and other digital technologies are also increasingly integrated into cybersecurity systems and responses, resulting in biased threat models<a href=\"https:\/\/ssrn.com\/abstract=3429851\" target=\"_blank\" rel=\"noopener\" name=\"_ftnref4\"><sup>26<\/sup><\/a>\u00a0or reporting with severe gender blind-spots. On the other hand, AI also creates new gendered risks in the realm of cybersecurity. Deep fakes are manipulated videos that can be indistinguishable from originals and are becoming more and more accessible and realistic due to increased quality and availability of tools. Gendered security concerns arise as deep fakes can lead to image-based sexual violence, impacting victims personally and professionally with women being disproportionally affected.<a href=\"https:\/\/wiisglobal.org\/deepfakes-as-a-security-issue-why-gender-matters\/\" target=\"_blank\" rel=\"noopener\" name=\"_ftnref5\"><sup>27<\/sup><\/a>.<\/p>\n<h2><strong>Gendered risks of data protection and privacy<\/strong><\/h2>\n<p>Data protection and privacy rights are already discussed politically and represent an established part of cybersecurity talk. What current discussions are still missing are specific gendered risks that arise as a result from the fact that not all people are equally affected by invasions of their privacy. Privacy International traces back how the right to privacy has historically been (and still is) interpreted for the exercise of patriarchal power, for example, by legitimizing domestic violence, including rape.<a href=\"https:\/\/www.privacyinternational.org\/sites\/default\/files\/2018-11\/From%20oppression%20to%20liberation-reclaiming%20the%20right%20to%20privacy.pdf\" target=\"_blank\" rel=\"noopener\" name=\"_ftnref1\"><sup>28<\/sup><\/a> This leads to the double threat for the rights of women and people of diverse SOGIESC, because they are violated both in the public sphere and in the private sphere, the latter of which is supposed to guarantee protection from state intervention. These restrictions and threats are significantly expanded by digital technologies. Groups facing structural discrimination, activists, human rights defenders and journalists are especially affected by state surveillance and excessive data collection, as impressive research shows.<a href=\"https:\/\/www.article19.org\/apps-arrests-abuse-egypt-lebanon-iran\/\" target=\"_blank\" rel=\"noopener\" name=\"_ftnref2\"><sup>29<\/sup><\/a> In Iran, Lebanon and Egypt, people with diverse SOGIESC do not only face surveillance but are also under threat of physical violence as fake accounts in dating apps are being used \u201cto lure individuals into face-to face-meetings, entrap them, and subject them to arrest or cruel and degrading treatment, or blackmail them for money or sexual services\u201d. <a href=\"https:\/\/www.article19.org\/apps-arrests-abuse-egypt-lebanon-iran\/\" target=\"_blank\" rel=\"noopener\" name=\"_ftnref3\"><sup>30<\/sup><\/a>\u00a0 Also, data breaches have gendered impacts as data collection is never gender neutral. The digital collection of health data and breaches of that data, which can include information on pregnancies or abortions, can lead to the legal and social discrimination and stigmatization of women and people with diverse SOGIESC, thus to the violation of their sexual and reproductive rights.\u00a0 In the US, the 2022 reversal of Roe v. Wade\u2014which granted the constitutional right to abortion in the US\u2014is an example of how gendered cybersecurity risks can emerge and worsen.<a href=\"https:\/\/time.com\/6193224\/abortion-privacy-data-reform\/\" target=\"_blank\" rel=\"noopener\" name=\"_ftnref4\"><sup>31<\/sup><\/a><\/p>\n<h2><strong>What can we do about it?<\/strong><\/h2>\n<p>As illustrated above, cybersecurity and AI technologies are multilayered and impact more than state security. Yet, international security is still largely characterized by state and military-centric security and structural violence. A feminist perspective on cybersecurity and emerging technologies like AI challenges conventional concepts and provides an opportunity to examine the diverse dimensions and contexts in which security policies unfold and unravel existing power structures. Becoming aware of how gender shapes cybersecurity and AI and acknowledging and centering gendered risks as well as traditional security is a first step in the right direction towards a security approach that takes seriously the realities of marginalized groups and tackles root causes of violence. However, all too often these perspectives remain siloed. National cyber- and AI security strategies need to be gender-mainstreamed.<a href=\"https:\/\/centreforfeministforeignpolicy.org\/2023\/06\/21\/feminist-perspectives-on-the-militarisation-of-cyberspace\/\" target=\"_blank\" rel=\"noopener\" name=\"_ftnref1\"><sup>32<\/sup><\/a> Next steps for policy makers include the development of gender sensitive policies, cybersecurity and AI standards on all levels and in private and public sectors. Already existing frameworks like WPS and feminist foreign policies need to address questions of cybersecurity and emerging AI technologies more explicitly to remain credible. The involvement of relevant stakeholders in decision-making processes international fora and national security policies, especially those traditionally marginalized, is essential. Other steps should include increasing the participation of women and other marginalized groups in STEM and in security policy fora, as well as incorporating alternative security approaches and mechanisms, developed from and with affected communities. With the accelerated speed in which technological innovation in the field of AI and cyberspace takes place, regulatory policies are needed more than ever &#8211; and these have to include an intersectional gender perspective to ensure that gender-based threats will not be overlooked, societal resilience against cyberattacks strengthened, and resources more fairly distributed.<\/p>\n<p>&nbsp;<\/p>\n<hr \/>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-9369 size-full alignleft\" src=\"https:\/\/blog.prif.org\/wp-content\/uploads\/2024\/03\/PRIF-Spotlight-2_2024-Title-Page.jpg\" alt=\"\" width=\"200\" height=\"284\" \/> Download (pdf): <a href=\"https:\/\/www.prif.org\/publikationen\/publikationssuche\/publikation\/beyond-the-code\" target=\"_blank\" rel=\"noopener\">Ferl, Anna-Katharina \/ Perras, Clara (2024): Beyond the Code. Unveiling Gender Dynamics in AI and Cybersecurity for International Security, PRIF Spotlight 2\/2024, Frankfurt\/M.<\/a><\/p>\n<p><a href=\"https:\/\/www.prif.org\/spotlight0224-fn\" target=\"_blank\" rel=\"noopener\">To the footnotes<\/a><\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<hr \/>\n<p>&nbsp;<\/p>\n<p><a href=\"#_ftnref1\" name=\"_ftn1\"><\/a><\/p>\n<p><a href=\"#_ftnref1\" name=\"_ftn1\"><\/a><\/p>\n<p><a href=\"#_ftnref1\" name=\"_ftn1\"><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Emerging technologies are transforming foreign and security policy as they challenge traditional understandings of power, influence and security. Developments in artificial intelligence (AI) and the increasing importance of cyberspace are some of the most prominent in this regard. Yet, not only are there repercussions for security when narrowly conceived as state security, but they also affect gender relations and human security more broadly. Gender as an analytical category allows us to shed light on the impact of emerging technologies on inequalities, power and violence.<\/p>\n","protected":false},"author":151,"featured_media":12424,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1125,1091,1112],"tags":[1263,1161,1190,1209],"coauthors":[581,773],"class_list":["post-12646","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-english-en","category-feminist-peace-research","category-prif-spotlight","tag-artificial-intelligence","tag-cybersecurity-en-2","tag-digital-spaces","tag-gender-en"],"acf":[],"views":798,"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.1.1 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Beyond the Code: Unveiling Gender Dynamics in AI and Cybersecurity for International Security - PRIF BLOG<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/blog.prif.org\/en\/2024\/03\/14\/beyond-the-code\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Beyond the Code: Unveiling Gender Dynamics in AI and Cybersecurity for International Security - PRIF BLOG\" \/>\n<meta property=\"og:description\" content=\"Emerging technologies are transforming foreign and security policy as they challenge traditional understandings of power, influence and security. Developments in artificial intelligence (AI) and the increasing importance of cyberspace are some of the most prominent in this regard. Yet, not only are there repercussions for security when narrowly conceived as state security, but they also affect gender relations and human security more broadly. Gender as an analytical category allows us to shed light on the impact of emerging technologies on inequalities, power and violence.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/blog.prif.org\/en\/2024\/03\/14\/beyond-the-code\/\" \/>\n<meta property=\"og:site_name\" content=\"PRIF BLOG\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/HSFK.PRIF\" \/>\n<meta property=\"article:published_time\" content=\"2024-03-14T12:18:31+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/blog.prif.org\/wp-content\/uploads\/2024\/03\/277683448_BLOGneu.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1875\" \/>\n\t<meta property=\"og:image:height\" content=\"1025\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Anna-Katharina Ferl, Clara Perras\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@HSFK_PRIF\" \/>\n<meta name=\"twitter:site\" content=\"@HSFK_PRIF\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Anna-Katharina Ferl, Clara Perras\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"14 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/blog.prif.org\/en\/2024\/03\/14\/beyond-the-code\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/blog.prif.org\/en\/2024\/03\/14\/beyond-the-code\/\"},\"author\":{\"name\":\"Anna-Katharina Ferl\",\"@id\":\"https:\/\/blog.prif.org\/en\/#\/schema\/person\/60d04ebc9ef370b66d41e6bfc2953423\"},\"headline\":\"Beyond the Code: Unveiling Gender Dynamics in AI and Cybersecurity for International Security\",\"datePublished\":\"2024-03-14T12:18:31+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/blog.prif.org\/en\/2024\/03\/14\/beyond-the-code\/\"},\"wordCount\":2327,\"publisher\":{\"@id\":\"https:\/\/blog.prif.org\/en\/#organization\"},\"image\":{\"@id\":\"https:\/\/blog.prif.org\/en\/2024\/03\/14\/beyond-the-code\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/blog.prif.org\/wp-content\/uploads\/2024\/03\/277683448_BLOGneu.jpg\",\"keywords\":[\"Artificial Intelligence\",\"Cybersecurity\",\"Digital Spaces\",\"Gender\"],\"articleSection\":[\"English\",\"Feminist Peace Research\",\"PRIF Spotlight\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/blog.prif.org\/en\/2024\/03\/14\/beyond-the-code\/\",\"url\":\"https:\/\/blog.prif.org\/en\/2024\/03\/14\/beyond-the-code\/\",\"name\":\"Beyond the Code: Unveiling Gender Dynamics in AI and Cybersecurity for International Security - PRIF BLOG\",\"isPartOf\":{\"@id\":\"https:\/\/blog.prif.org\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/blog.prif.org\/en\/2024\/03\/14\/beyond-the-code\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/blog.prif.org\/en\/2024\/03\/14\/beyond-the-code\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/blog.prif.org\/wp-content\/uploads\/2024\/03\/277683448_BLOGneu.jpg\",\"datePublished\":\"2024-03-14T12:18:31+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/blog.prif.org\/en\/2024\/03\/14\/beyond-the-code\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/blog.prif.org\/en\/2024\/03\/14\/beyond-the-code\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/blog.prif.org\/en\/2024\/03\/14\/beyond-the-code\/#primaryimage\",\"url\":\"https:\/\/blog.prif.org\/wp-content\/uploads\/2024\/03\/277683448_BLOGneu.jpg\",\"contentUrl\":\"https:\/\/blog.prif.org\/wp-content\/uploads\/2024\/03\/277683448_BLOGneu.jpg\",\"width\":1875,\"height\":1025,\"caption\":\"A congress attendant trying a Virtual Reality work safety experience created but Out Here on the VIVE Focus 3 headset during the Mobile World Congress (MWC) the biggest trade show of the sector focused on mobile devices, 5G, IOT, AI and big data, celebrated, on March 3, 2022, in Barcelona, Spain. (Photo by Joan Cros\/NurPhoto)\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/blog.prif.org\/en\/2024\/03\/14\/beyond-the-code\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Startseite\",\"item\":\"https:\/\/blog.prif.org\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Beyond the Code: Unveiling Gender Dynamics in AI and Cybersecurity for International Security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/blog.prif.org\/en\/#website\",\"url\":\"https:\/\/blog.prif.org\/en\/\",\"name\":\"PRIF BLOG\",\"description\":\"Peace Research Institute Frankfurt \/ Leibniz Institut Hessische Stiftung Friedens- und Konfliktforschung\",\"publisher\":{\"@id\":\"https:\/\/blog.prif.org\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/blog.prif.org\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/blog.prif.org\/en\/#organization\",\"name\":\"Peace Research Institute Frankfurt \/ Leibniz Institut Hessische Stiftung Friedens- und Konfliktforschung\",\"url\":\"https:\/\/blog.prif.org\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/blog.prif.org\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/blog.prif.org\/wp-content\/uploads\/2023\/09\/cropped-blog_rgb.png\",\"contentUrl\":\"https:\/\/blog.prif.org\/wp-content\/uploads\/2023\/09\/cropped-blog_rgb.png\",\"width\":750,\"height\":226,\"caption\":\"Peace Research Institute Frankfurt \/ Leibniz Institut Hessische Stiftung Friedens- und Konfliktforschung\"},\"image\":{\"@id\":\"https:\/\/blog.prif.org\/en\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/HSFK.PRIF\",\"https:\/\/x.com\/HSFK_PRIF\",\"https:\/\/www.linkedin.com\/company\/8912786\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/blog.prif.org\/en\/#\/schema\/person\/60d04ebc9ef370b66d41e6bfc2953423\",\"name\":\"Anna-Katharina Ferl\",\"description\":\"Anna-Katharina Ferl ist assoziierte Forscherin im Programm\u00adbereich Internationale Sicherheit und in der Forschungs\u00adgruppe \u201eEmerging Disruptive Techno\u00adlogies\u201c bei PRIF. Ihre Forschungs\u00adschwerpunkte sind die Regulierung autonomer Waffen\u00adsysteme und milit\u00e4rischer K\u00fcnstliche Intelligenz. \/\/ Anna-Katharina Ferl is an Associate Fellow at PRIF\u2019s International Security Research Depart\u00adment and the research group \u201cEmerging Disrup\u00adtive Techno\u00adlogies\u201d. Her research interest focuses on the regulation of auto\u00adnomous weapons systems and military Artificial Intelligence. | Twitter: @AnnaKFerl\",\"url\":\"https:\/\/blog.prif.org\/en\/author\/aferl\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Beyond the Code: Unveiling Gender Dynamics in AI and Cybersecurity for International Security - PRIF BLOG","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/blog.prif.org\/en\/2024\/03\/14\/beyond-the-code\/","og_locale":"en_US","og_type":"article","og_title":"Beyond the Code: Unveiling Gender Dynamics in AI and Cybersecurity for International Security - PRIF BLOG","og_description":"Emerging technologies are transforming foreign and security policy as they challenge traditional understandings of power, influence and security. Developments in artificial intelligence (AI) and the increasing importance of cyberspace are some of the most prominent in this regard. Yet, not only are there repercussions for security when narrowly conceived as state security, but they also affect gender relations and human security more broadly. Gender as an analytical category allows us to shed light on the impact of emerging technologies on inequalities, power and violence.","og_url":"https:\/\/blog.prif.org\/en\/2024\/03\/14\/beyond-the-code\/","og_site_name":"PRIF BLOG","article_publisher":"https:\/\/www.facebook.com\/HSFK.PRIF","article_published_time":"2024-03-14T12:18:31+00:00","og_image":[{"width":1875,"height":1025,"url":"https:\/\/blog.prif.org\/wp-content\/uploads\/2024\/03\/277683448_BLOGneu.jpg","type":"image\/jpeg"}],"author":"Anna-Katharina Ferl, Clara Perras","twitter_card":"summary_large_image","twitter_creator":"@HSFK_PRIF","twitter_site":"@HSFK_PRIF","twitter_misc":{"Written by":"Anna-Katharina Ferl, Clara Perras","Est. reading time":"14 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/blog.prif.org\/en\/2024\/03\/14\/beyond-the-code\/#article","isPartOf":{"@id":"https:\/\/blog.prif.org\/en\/2024\/03\/14\/beyond-the-code\/"},"author":{"name":"Anna-Katharina Ferl","@id":"https:\/\/blog.prif.org\/en\/#\/schema\/person\/60d04ebc9ef370b66d41e6bfc2953423"},"headline":"Beyond the Code: Unveiling Gender Dynamics in AI and Cybersecurity for International Security","datePublished":"2024-03-14T12:18:31+00:00","mainEntityOfPage":{"@id":"https:\/\/blog.prif.org\/en\/2024\/03\/14\/beyond-the-code\/"},"wordCount":2327,"publisher":{"@id":"https:\/\/blog.prif.org\/en\/#organization"},"image":{"@id":"https:\/\/blog.prif.org\/en\/2024\/03\/14\/beyond-the-code\/#primaryimage"},"thumbnailUrl":"https:\/\/blog.prif.org\/wp-content\/uploads\/2024\/03\/277683448_BLOGneu.jpg","keywords":["Artificial Intelligence","Cybersecurity","Digital Spaces","Gender"],"articleSection":["English","Feminist Peace Research","PRIF Spotlight"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/blog.prif.org\/en\/2024\/03\/14\/beyond-the-code\/","url":"https:\/\/blog.prif.org\/en\/2024\/03\/14\/beyond-the-code\/","name":"Beyond the Code: Unveiling Gender Dynamics in AI and Cybersecurity for International Security - PRIF BLOG","isPartOf":{"@id":"https:\/\/blog.prif.org\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/blog.prif.org\/en\/2024\/03\/14\/beyond-the-code\/#primaryimage"},"image":{"@id":"https:\/\/blog.prif.org\/en\/2024\/03\/14\/beyond-the-code\/#primaryimage"},"thumbnailUrl":"https:\/\/blog.prif.org\/wp-content\/uploads\/2024\/03\/277683448_BLOGneu.jpg","datePublished":"2024-03-14T12:18:31+00:00","breadcrumb":{"@id":"https:\/\/blog.prif.org\/en\/2024\/03\/14\/beyond-the-code\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/blog.prif.org\/en\/2024\/03\/14\/beyond-the-code\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.prif.org\/en\/2024\/03\/14\/beyond-the-code\/#primaryimage","url":"https:\/\/blog.prif.org\/wp-content\/uploads\/2024\/03\/277683448_BLOGneu.jpg","contentUrl":"https:\/\/blog.prif.org\/wp-content\/uploads\/2024\/03\/277683448_BLOGneu.jpg","width":1875,"height":1025,"caption":"A congress attendant trying a Virtual Reality work safety experience created but Out Here on the VIVE Focus 3 headset during the Mobile World Congress (MWC) the biggest trade show of the sector focused on mobile devices, 5G, IOT, AI and big data, celebrated, on March 3, 2022, in Barcelona, Spain. (Photo by Joan Cros\/NurPhoto)"},{"@type":"BreadcrumbList","@id":"https:\/\/blog.prif.org\/en\/2024\/03\/14\/beyond-the-code\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Startseite","item":"https:\/\/blog.prif.org\/en\/"},{"@type":"ListItem","position":2,"name":"Beyond the Code: Unveiling Gender Dynamics in AI and Cybersecurity for International Security"}]},{"@type":"WebSite","@id":"https:\/\/blog.prif.org\/en\/#website","url":"https:\/\/blog.prif.org\/en\/","name":"PRIF BLOG","description":"Peace Research Institute Frankfurt \/ Leibniz Institut Hessische Stiftung Friedens- und Konfliktforschung","publisher":{"@id":"https:\/\/blog.prif.org\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/blog.prif.org\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/blog.prif.org\/en\/#organization","name":"Peace Research Institute Frankfurt \/ Leibniz Institut Hessische Stiftung Friedens- und Konfliktforschung","url":"https:\/\/blog.prif.org\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.prif.org\/en\/#\/schema\/logo\/image\/","url":"https:\/\/blog.prif.org\/wp-content\/uploads\/2023\/09\/cropped-blog_rgb.png","contentUrl":"https:\/\/blog.prif.org\/wp-content\/uploads\/2023\/09\/cropped-blog_rgb.png","width":750,"height":226,"caption":"Peace Research Institute Frankfurt \/ Leibniz Institut Hessische Stiftung Friedens- und Konfliktforschung"},"image":{"@id":"https:\/\/blog.prif.org\/en\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/HSFK.PRIF","https:\/\/x.com\/HSFK_PRIF","https:\/\/www.linkedin.com\/company\/8912786\/"]},{"@type":"Person","@id":"https:\/\/blog.prif.org\/en\/#\/schema\/person\/60d04ebc9ef370b66d41e6bfc2953423","name":"Anna-Katharina Ferl","description":"Anna-Katharina Ferl ist assoziierte Forscherin im Programm\u00adbereich Internationale Sicherheit und in der Forschungs\u00adgruppe \u201eEmerging Disruptive Techno\u00adlogies\u201c bei PRIF. Ihre Forschungs\u00adschwerpunkte sind die Regulierung autonomer Waffen\u00adsysteme und milit\u00e4rischer K\u00fcnstliche Intelligenz. \/\/ Anna-Katharina Ferl is an Associate Fellow at PRIF\u2019s International Security Research Depart\u00adment and the research group \u201cEmerging Disrup\u00adtive Techno\u00adlogies\u201d. Her research interest focuses on the regulation of auto\u00adnomous weapons systems and military Artificial Intelligence. | Twitter: @AnnaKFerl","url":"https:\/\/blog.prif.org\/en\/author\/aferl\/"}]}},"_links":{"self":[{"href":"https:\/\/blog.prif.org\/en\/wp-json\/wp\/v2\/posts\/12646","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.prif.org\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.prif.org\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.prif.org\/en\/wp-json\/wp\/v2\/users\/151"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.prif.org\/en\/wp-json\/wp\/v2\/comments?post=12646"}],"version-history":[{"count":0,"href":"https:\/\/blog.prif.org\/en\/wp-json\/wp\/v2\/posts\/12646\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/blog.prif.org\/en\/wp-json\/wp\/v2\/media\/12424"}],"wp:attachment":[{"href":"https:\/\/blog.prif.org\/en\/wp-json\/wp\/v2\/media?parent=12646"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.prif.org\/en\/wp-json\/wp\/v2\/categories?post=12646"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.prif.org\/en\/wp-json\/wp\/v2\/tags?post=12646"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/blog.prif.org\/en\/wp-json\/wp\/v2\/coauthors?post=12646"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}