{"id":6143,"date":"2020-12-03T06:05:47","date_gmt":"2020-12-03T06:05:47","guid":{"rendered":"https:\/\/wissenschaftliche-integritaet.de\/kommentare\/dual-use-problematik-in-der-mathematik\/"},"modified":"2021-06-11T15:09:52","modified_gmt":"2021-06-11T15:09:52","slug":"dual-use-problem-in-mathematics","status":"publish","type":"kommentare","link":"https:\/\/wissenschaftliche-integritaet.de\/en\/comments\/dual-use-problem-in-mathematics\/","title":{"rendered":"The dual use problem in mathematics"},"content":{"rendered":"\n<p>In many cases, basic research in both theoretical and applied mathematics has the potential to be significant to security-related research as well (possibly not until later). Just as a knife as a cutting tool can always be used as a weapon too, mathematical methods investigated in the field of control theory, for example, can often be used for both peaceful and military purposes. The same applies in the field of number theory with regard to its application in the fields of cryptography and coding theory. The answer to this cannot be a general ban on basic mathematical research of course.<\/p>\n\n\n\n<p>However, aspects and issues regarding security-related research should be addressed in accordance with the applicable rules and laws when there is evidence of the potential concrete applicability of mathematical research in security-related areas. Indications might include the field of application targeted by the researchers themselves, or else their own previous research background or that of cooperation partners. In the case of cooperative projects, one point that should always be taken into consideration and indeed critically questioned is whether the participating institutions or their sponsors or funders aim to achieve or even require the utilisation of research results in a security-related context.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>In many cases, basic research in both theoretical and applied mathematics has the potential to be significant to security-related research as well.<\/p>\n","protected":false},"featured_media":0,"menu_order":0,"template":"","kommentar_cats":[267],"kommentar_tags":[192,218],"class_list":["post-6143","kommentare","type-kommentare","status-publish","hentry","kommentar_cats-natural-sciences","kommentar_tags-dual-use-en","kommentar_tags-mathematics"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>The dual use problem in mathematics - Wissenschaftliche Integrit\u00e4t<\/title>\n<meta name=\"description\" content=\"In many cases, basic research in both theoretical and applied mathematics has the potential to be significant to security-related research as well.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/wissenschaftliche-integritaet.de\/kommentare\/dual-use-problem-in-mathematics\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The dual use problem in mathematics - Wissenschaftliche Integrit\u00e4t\" \/>\n<meta property=\"og:description\" content=\"In many cases, basic research in both theoretical and applied mathematics has the potential to be significant to security-related research as well.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/wissenschaftliche-integritaet.de\/kommentare\/dual-use-problem-in-mathematics\/\" \/>\n<meta property=\"og:site_name\" content=\"Wissenschaftliche Integrit\u00e4t\" \/>\n<meta property=\"article:modified_time\" content=\"2021-06-11T15:09:52+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/wissenschaftliche-integritaet.de\/wp-content\/uploads\/2020\/02\/dfg-wissenschaftliche-integritaet-defaultimage.png\" \/>\n\t<meta property=\"og:image:width\" content=\"2324\" \/>\n\t<meta property=\"og:image:height\" content=\"1474\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/wissenschaftliche-integritaet.de\\\/kommentare\\\/dual-use-problem-in-mathematics\\\/\",\"url\":\"https:\\\/\\\/wissenschaftliche-integritaet.de\\\/kommentare\\\/dual-use-problem-in-mathematics\\\/\",\"name\":\"The dual use problem in mathematics - Wissenschaftliche Integrit\u00e4t\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/wissenschaftliche-integritaet.de\\\/en\\\/#website\"},\"datePublished\":\"2020-12-03T06:05:47+00:00\",\"dateModified\":\"2021-06-11T15:09:52+00:00\",\"description\":\"In many cases, basic research in both theoretical and applied mathematics has the potential to be significant to security-related research as well.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/wissenschaftliche-integritaet.de\\\/kommentare\\\/dual-use-problem-in-mathematics\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/wissenschaftliche-integritaet.de\\\/kommentare\\\/dual-use-problem-in-mathematics\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/wissenschaftliche-integritaet.de\\\/kommentare\\\/dual-use-problem-in-mathematics\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/wissenschaftliche-integritaet.de\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"The dual use problem in mathematics\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/wissenschaftliche-integritaet.de\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/wissenschaftliche-integritaet.de\\\/en\\\/\",\"name\":\"Wissenschaftliche Integrit\u00e4t\",\"description\":\"Sicherung guter wissenschaftlicher Praxis\",\"publisher\":{\"@id\":\"https:\\\/\\\/wissenschaftliche-integritaet.de\\\/en\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/wissenschaftliche-integritaet.de\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/wissenschaftliche-integritaet.de\\\/en\\\/#organization\",\"name\":\"Deutsche Forschungsgemeinschaft e.V.\",\"url\":\"https:\\\/\\\/wissenschaftliche-integritaet.de\\\/en\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/wissenschaftliche-integritaet.de\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/wissenschaftliche-integritaet.de\\\/wp-content\\\/uploads\\\/2020\\\/02\\\/GWP-Logo-v20200213@2x.png\",\"contentUrl\":\"https:\\\/\\\/wissenschaftliche-integritaet.de\\\/wp-content\\\/uploads\\\/2020\\\/02\\\/GWP-Logo-v20200213@2x.png\",\"width\":252,\"height\":70,\"caption\":\"Deutsche Forschungsgemeinschaft e.V.\"},\"image\":{\"@id\":\"https:\\\/\\\/wissenschaftliche-integritaet.de\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"The dual use problem in mathematics - Wissenschaftliche Integrit\u00e4t","description":"In many cases, basic research in both theoretical and applied mathematics has the potential to be significant to security-related research as well.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/wissenschaftliche-integritaet.de\/kommentare\/dual-use-problem-in-mathematics\/","og_locale":"en_US","og_type":"article","og_title":"The dual use problem in mathematics - Wissenschaftliche Integrit\u00e4t","og_description":"In many cases, basic research in both theoretical and applied mathematics has the potential to be significant to security-related research as well.","og_url":"https:\/\/wissenschaftliche-integritaet.de\/kommentare\/dual-use-problem-in-mathematics\/","og_site_name":"Wissenschaftliche Integrit\u00e4t","article_modified_time":"2021-06-11T15:09:52+00:00","og_image":[{"width":2324,"height":1474,"url":"https:\/\/wissenschaftliche-integritaet.de\/wp-content\/uploads\/2020\/02\/dfg-wissenschaftliche-integritaet-defaultimage.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/wissenschaftliche-integritaet.de\/kommentare\/dual-use-problem-in-mathematics\/","url":"https:\/\/wissenschaftliche-integritaet.de\/kommentare\/dual-use-problem-in-mathematics\/","name":"The dual use problem in mathematics - Wissenschaftliche Integrit\u00e4t","isPartOf":{"@id":"https:\/\/wissenschaftliche-integritaet.de\/en\/#website"},"datePublished":"2020-12-03T06:05:47+00:00","dateModified":"2021-06-11T15:09:52+00:00","description":"In many cases, basic research in both theoretical and applied mathematics has the potential to be significant to security-related research as well.","breadcrumb":{"@id":"https:\/\/wissenschaftliche-integritaet.de\/kommentare\/dual-use-problem-in-mathematics\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/wissenschaftliche-integritaet.de\/kommentare\/dual-use-problem-in-mathematics\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/wissenschaftliche-integritaet.de\/kommentare\/dual-use-problem-in-mathematics\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/wissenschaftliche-integritaet.de\/en\/"},{"@type":"ListItem","position":2,"name":"The dual use problem in mathematics"}]},{"@type":"WebSite","@id":"https:\/\/wissenschaftliche-integritaet.de\/en\/#website","url":"https:\/\/wissenschaftliche-integritaet.de\/en\/","name":"Wissenschaftliche Integrit\u00e4t","description":"Sicherung guter wissenschaftlicher Praxis","publisher":{"@id":"https:\/\/wissenschaftliche-integritaet.de\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/wissenschaftliche-integritaet.de\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/wissenschaftliche-integritaet.de\/en\/#organization","name":"Deutsche Forschungsgemeinschaft e.V.","url":"https:\/\/wissenschaftliche-integritaet.de\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/wissenschaftliche-integritaet.de\/en\/#\/schema\/logo\/image\/","url":"https:\/\/wissenschaftliche-integritaet.de\/wp-content\/uploads\/2020\/02\/GWP-Logo-v20200213@2x.png","contentUrl":"https:\/\/wissenschaftliche-integritaet.de\/wp-content\/uploads\/2020\/02\/GWP-Logo-v20200213@2x.png","width":252,"height":70,"caption":"Deutsche Forschungsgemeinschaft e.V."},"image":{"@id":"https:\/\/wissenschaftliche-integritaet.de\/en\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/wissenschaftliche-integritaet.de\/en\/wp-json\/wp\/v2\/kommentare\/6143","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/wissenschaftliche-integritaet.de\/en\/wp-json\/wp\/v2\/kommentare"}],"about":[{"href":"https:\/\/wissenschaftliche-integritaet.de\/en\/wp-json\/wp\/v2\/types\/kommentare"}],"version-history":[{"count":2,"href":"https:\/\/wissenschaftliche-integritaet.de\/en\/wp-json\/wp\/v2\/kommentare\/6143\/revisions"}],"predecessor-version":[{"id":6893,"href":"https:\/\/wissenschaftliche-integritaet.de\/en\/wp-json\/wp\/v2\/kommentare\/6143\/revisions\/6893"}],"wp:attachment":[{"href":"https:\/\/wissenschaftliche-integritaet.de\/en\/wp-json\/wp\/v2\/media?parent=6143"}],"wp:term":[{"taxonomy":"kommentar_cats","embeddable":true,"href":"https:\/\/wissenschaftliche-integritaet.de\/en\/wp-json\/wp\/v2\/kommentar_cats?post=6143"},{"taxonomy":"kommentar_tags","embeddable":true,"href":"https:\/\/wissenschaftliche-integritaet.de\/en\/wp-json\/wp\/v2\/kommentar_tags?post=6143"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}