News: Highlights 2019
2019 (12)
Alle News 2019
A-Paper 2019
(CORE≥A v VHB≥A v WKWI≥A v Thomson Reuters JIF≥1 v GI-CSCW≥A)
2019
[BibTeX] [Abstract] [Download PDF]
Usage of social media during emergencies and respective perceptions vary across countries. Our representative survey of 7,071 citizens in Europe (Germany, Italy, the Netherlands and the United Kingdom) shows differences of current use of social media in emergencies, expectations towards authorities monitoring social media, intensity of perceiving barriers regarding the use as well as variances concerning the (likelihood of future) use of mobile apps. While German and British participants‘ frequency of use of social media is medium and low, respectively, Italian and Dutch respondents use them relatively frequently. Our comparison of the four countries allows for an interpretation of divergent behavior across countries with respect to risk cultures as well as expanding the respective model to social media contexts. At the same time, our findings stress that across the four European countries participants assessed similar advantages like dissemination of information and barriers like false rumors with respect to use social media during emergencies. Distributed equally across nations, age and gender showed significant relationships with social media usage which, among other findings, suggests being helpful for effective implementation of management structures using new technologies.
@article{reuter_impact_2019,
title = {The {Impact} of {Risk} {Cultures}: {Citizens}' {Perception} of {Social} {Media} {Use} in {Emergencies} across {Europe}},
volume = {148},
url = {http://www.peasec.de/paper/2019/2019_ReuterKaufholdSchmidSpielhoferHahne_TheImpactofRiskCultures_TFSC.pdf},
doi = {10.1016/j.techfore.2019.119724},
abstract = {Usage of social media during emergencies and respective perceptions vary across countries. Our representative survey of 7,071 citizens in Europe (Germany, Italy, the Netherlands and the United Kingdom) shows differences of current use of social media in emergencies, expectations towards authorities monitoring social media, intensity of perceiving barriers regarding the use as well as variances concerning the (likelihood of future) use of mobile apps. While German and British participants' frequency of use of social media is medium and low, respectively, Italian and Dutch respondents use them relatively frequently. Our comparison of the four countries allows for an interpretation of divergent behavior across countries with respect to risk cultures as well as expanding the respective model to social media contexts. At the same time, our findings stress that across the four European countries participants assessed similar advantages like dissemination of information and barriers like false rumors with respect to use social media during emergencies. Distributed equally across nations, age and gender showed significant relationships with social media usage which, among other findings, suggests being helpful for effective implementation of management structures using new technologies.},
number = {119724},
journal = {Technological Forecasting and Social Change (TFSC)},
author = {Reuter, Christian and Kaufhold, Marc-André and Schmid, Stefka and Spielhofer, Thomas and Hahne, Anna Sophie},
year = {2019},
keywords = {Crisis, HCI, A-Paper, Selected, AuswahlCrisis, Ranking-ImpactFactor, SocialMedia, Projekt-EmerGent, Ranking-VHB-B},
pages = {1--17},
}
[BibTeX] [Abstract] [Download PDF]
In this paper, we explore a specialized type of knowledge, „nomadic knowledge“ to understand its implications in knowledge sharing process. Nomadic knowledge is enacted in a discontinuous pattern with a changing set of actors and further flows on a definedtrajectory. This knowledge is quite important but is required sporadically, so it has a varying level of importance for stakeholders at different instances of time. The limited interest of knowledge holders after the creation of knowledge makes the knowledge sharing processcomplex. Furthermore, new sets of actors overloaded with tasks often ignore the knowledge sharing aspect due to the urgency of tasks at hand. Using a long-term field study we describe a particular practice that is not well supported technologically. The objective of this paper is to outline the concept of nomadic knowledge and associated implications, so that respective practices can be supported by the knowledge management community with appropriate technology.
@article{saeed_nomadic_2019,
title = {Nomadic {Knowledge} {Sharing} {Practices} and {Challenges}: {Findings} from a {Long}-term {Case} {Study}},
volume = {7},
url = {https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=8715497},
doi = {10.1109/ACCESS.2019.2916903},
abstract = {In this paper, we explore a specialized type of knowledge, "nomadic knowledge" to understand its implications in knowledge sharing process. Nomadic knowledge is enacted in a discontinuous pattern with a changing set of actors and further flows on a definedtrajectory. This knowledge is quite important but is required sporadically, so it has a varying level of importance for stakeholders at different instances of time. The limited interest of knowledge holders after the creation of knowledge makes the knowledge sharing processcomplex. Furthermore, new sets of actors overloaded with tasks often ignore the knowledge sharing aspect due to the urgency of tasks at hand. Using a long-term field study we describe a particular practice that is not well supported technologically. The objective of this paper is to outline the concept of nomadic knowledge and associated implications, so that respective practices can be supported by the knowledge management community with appropriate technology.},
number = {1},
journal = {IEEE Access},
author = {Saeed, Saqib and Pipek, Volkmar and Rohde, Markus and Reuter, Christian and Pinatti De Carvalho, Aparecido Fabiano and Wulf, Volker},
year = {2019},
keywords = {HCI, A-Paper, Ranking-ImpactFactor, Cooperation, Ranking-CORE-B},
pages = {63564--63577},
}
[BibTeX] [Abstract] [Download PDF]
On-site work of emergency service teams consists of highly cooperative tasks. Especially during distributed search and rescue tasks there is a constant mix of routinized and non-routinized activities. Within this paper we focus on the work practices of the German Red Cross Rescue Dog Units who deal with several uncertainties regarding the involved dogs, the fragility of the respective situations as well as issues of using technologies under enormous time pressure. Smart glasses provide possibilities for enhanced and hands-free interaction in various contexts and a number of approaches have already been applied, aiming at efficient use of the respective technological innovation in private and professional contexts. However, the collaborative potential of smart glasses in time-critical and uncertain situations is still unexplored. Our design case study examines how the on-site work of emergency service teams can be supported by smart glasses: Based on examining the work practices of the German Red Cross Rescue Dogs, we introduce ‘RescueGlass‘ as a coordinative concept, encompassing hands-free head-mounted display (HMD) application as well as a corresponding smartphone application. Finally, we describe the evaluation of its use in the field of emergency response and management. We show how current features such as ‘fog of war‘ or various sensors support the cooperative practices of dog handlers, and outline current technical limitations offering future research questions. Our paper provides an initial design probe using smart glasses to engage in the field of collaborative professional mobile tasks.
@article{reuter_rescueglass_2019,
title = {{RescueGlass}: {Collaborative} {Applications} involving {Head}-{Mounted} {Displays} for {Red} {Cross} {Rescue} {Dog} {Units}},
volume = {28},
url = {http://www.peasec.de/paper/2019/2019_ReuterLudwigMischur_RescueGlass_JCSCW.pdf},
doi = {10.1007/s10606-018-9339-8},
abstract = {On-site work of emergency service teams consists of highly cooperative tasks. Especially during distributed search and rescue tasks there is a constant mix of routinized and non-routinized activities. Within this paper we focus on the work practices of the German Red Cross Rescue Dog Units who deal with several uncertainties regarding the involved dogs, the fragility of the respective situations as well as issues of using technologies under enormous time pressure. Smart glasses provide possibilities for enhanced and hands-free interaction in various contexts and a number of approaches have already been applied, aiming at efficient use of the respective technological innovation in private and professional contexts. However, the collaborative potential of smart glasses in time-critical and uncertain situations is still unexplored. Our design case study examines how the on-site work of emergency service teams can be supported by smart glasses: Based on examining the work practices of the German Red Cross Rescue Dogs, we introduce ‘RescueGlass' as a coordinative concept, encompassing hands-free head-mounted display (HMD) application as well as a corresponding smartphone application. Finally, we describe the evaluation of its use in the field of emergency response and management. We show how current features such as ‘fog of war' or various sensors support the cooperative practices of dog handlers, and outline current technical limitations offering future research questions. Our paper provides an initial design probe using smart glasses to engage in the field of collaborative professional mobile tasks.},
number = {1-2},
journal = {Computer Supported Cooperative Work: The Journal of Collaborative Computing (JCSCW)},
author = {Reuter, Christian and Ludwig, Thomas and Mischur, Patrick},
year = {2019},
keywords = {Security, UsableSec, Crisis, HCI, A-Paper, Ranking-ImpactFactor, Projekt-KontiKat, Infrastructure, Cooperation, Ranking-CORE-B, Projekt-KOKOS, Ranking-VHB-B},
pages = {209--246},
}
[BibTeX] [Abstract] [Download PDF]
Social media have been established in many natural disasters or human‐induced crises and emergencies. Nowadays, authorities, such as emergency services, and citizens engage with social media in different phases of the emergency management cycle. However, as research in crisis informatics highlights, one remaining issue constitutes the chaotic use of social media by citizens during emergencies, which has the potential to increase the complexity of tasks, uncertainty, and pressure for emergency services. To counter these risks, besides implementing supportive technology, social media guidelines may help putting artefact and theoretical contributions into practical use for authorities and citizens. This paper presents the design and evaluation (with 1,024 participants) of citizens‘ guidelines for using social media before, during, and after emergencies.
@article{kaufhold_avoiding_2019,
title = {Avoiding {Chaotic} {Use} of {Social} {Media} before, during, and after {Emergencies}: {Design} and {Evaluation} of {Citizens}' {Guidelines}},
volume = {27},
url = {http://www.peasec.de/paper/2019/2019_KaufholdGizikisReuterHabdankGrinko_DesignEvaluationCitizenGuidelines_JCCM.pdf},
doi = {10.1111/1468-5973.12249},
abstract = {Social media have been established in many natural disasters or human‐induced crises and emergencies. Nowadays, authorities, such as emergency services, and citizens engage with social media in different phases of the emergency management cycle. However, as research in crisis informatics highlights, one remaining issue constitutes the chaotic use of social media by citizens during emergencies, which has the potential to increase the complexity of tasks, uncertainty, and pressure for emergency services. To counter these risks, besides implementing supportive technology, social media guidelines may help putting artefact and theoretical contributions into practical use for authorities and citizens. This paper presents the design and evaluation (with 1,024 participants) of citizens' guidelines for using social media before, during, and after emergencies.},
number = {3},
journal = {Journal of Contingencies and Crisis Management (JCCM)},
author = {Kaufhold, Marc-André and Gizikis, Alexis and Reuter, Christian and Habdank, Matthias and Grinko, Margarita},
year = {2019},
keywords = {Crisis, HCI, A-Paper, AuswahlKaufhold, Ranking-ImpactFactor, SocialMedia, Projekt-KontiKat, Projekt-EmerGent},
pages = {198--213},
}
Alle Paper 2019
Begutachtete Zeitschriften / Peer-reviewed Journals
[BibTeX] [Abstract] [Download PDF]
Usage of social media during emergencies and respective perceptions vary across countries. Our representative survey of 7,071 citizens in Europe (Germany, Italy, the Netherlands and the United Kingdom) shows differences of current use of social media in emergencies, expectations towards authorities monitoring social media, intensity of perceiving barriers regarding the use as well as variances concerning the (likelihood of future) use of mobile apps. While German and British participants‘ frequency of use of social media is medium and low, respectively, Italian and Dutch respondents use them relatively frequently. Our comparison of the four countries allows for an interpretation of divergent behavior across countries with respect to risk cultures as well as expanding the respective model to social media contexts. At the same time, our findings stress that across the four European countries participants assessed similar advantages like dissemination of information and barriers like false rumors with respect to use social media during emergencies. Distributed equally across nations, age and gender showed significant relationships with social media usage which, among other findings, suggests being helpful for effective implementation of management structures using new technologies.
@article{reuter_impact_2019,
title = {The {Impact} of {Risk} {Cultures}: {Citizens}' {Perception} of {Social} {Media} {Use} in {Emergencies} across {Europe}},
volume = {148},
url = {http://www.peasec.de/paper/2019/2019_ReuterKaufholdSchmidSpielhoferHahne_TheImpactofRiskCultures_TFSC.pdf},
doi = {10.1016/j.techfore.2019.119724},
abstract = {Usage of social media during emergencies and respective perceptions vary across countries. Our representative survey of 7,071 citizens in Europe (Germany, Italy, the Netherlands and the United Kingdom) shows differences of current use of social media in emergencies, expectations towards authorities monitoring social media, intensity of perceiving barriers regarding the use as well as variances concerning the (likelihood of future) use of mobile apps. While German and British participants' frequency of use of social media is medium and low, respectively, Italian and Dutch respondents use them relatively frequently. Our comparison of the four countries allows for an interpretation of divergent behavior across countries with respect to risk cultures as well as expanding the respective model to social media contexts. At the same time, our findings stress that across the four European countries participants assessed similar advantages like dissemination of information and barriers like false rumors with respect to use social media during emergencies. Distributed equally across nations, age and gender showed significant relationships with social media usage which, among other findings, suggests being helpful for effective implementation of management structures using new technologies.},
number = {119724},
journal = {Technological Forecasting and Social Change (TFSC)},
author = {Reuter, Christian and Kaufhold, Marc-André and Schmid, Stefka and Spielhofer, Thomas and Hahne, Anna Sophie},
year = {2019},
keywords = {Crisis, HCI, A-Paper, Selected, AuswahlCrisis, Ranking-ImpactFactor, SocialMedia, Projekt-EmerGent, Ranking-VHB-B},
pages = {1--17},
}
[BibTeX] [Abstract] [Download PDF]
In this paper, we explore a specialized type of knowledge, „nomadic knowledge“ to understand its implications in knowledge sharing process. Nomadic knowledge is enacted in a discontinuous pattern with a changing set of actors and further flows on a definedtrajectory. This knowledge is quite important but is required sporadically, so it has a varying level of importance for stakeholders at different instances of time. The limited interest of knowledge holders after the creation of knowledge makes the knowledge sharing processcomplex. Furthermore, new sets of actors overloaded with tasks often ignore the knowledge sharing aspect due to the urgency of tasks at hand. Using a long-term field study we describe a particular practice that is not well supported technologically. The objective of this paper is to outline the concept of nomadic knowledge and associated implications, so that respective practices can be supported by the knowledge management community with appropriate technology.
@article{saeed_nomadic_2019,
title = {Nomadic {Knowledge} {Sharing} {Practices} and {Challenges}: {Findings} from a {Long}-term {Case} {Study}},
volume = {7},
url = {https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=8715497},
doi = {10.1109/ACCESS.2019.2916903},
abstract = {In this paper, we explore a specialized type of knowledge, "nomadic knowledge" to understand its implications in knowledge sharing process. Nomadic knowledge is enacted in a discontinuous pattern with a changing set of actors and further flows on a definedtrajectory. This knowledge is quite important but is required sporadically, so it has a varying level of importance for stakeholders at different instances of time. The limited interest of knowledge holders after the creation of knowledge makes the knowledge sharing processcomplex. Furthermore, new sets of actors overloaded with tasks often ignore the knowledge sharing aspect due to the urgency of tasks at hand. Using a long-term field study we describe a particular practice that is not well supported technologically. The objective of this paper is to outline the concept of nomadic knowledge and associated implications, so that respective practices can be supported by the knowledge management community with appropriate technology.},
number = {1},
journal = {IEEE Access},
author = {Saeed, Saqib and Pipek, Volkmar and Rohde, Markus and Reuter, Christian and Pinatti De Carvalho, Aparecido Fabiano and Wulf, Volker},
year = {2019},
keywords = {HCI, A-Paper, Ranking-ImpactFactor, Cooperation, Ranking-CORE-B},
pages = {63564--63577},
}
[BibTeX] [Abstract] [Download PDF]
On-site work of emergency service teams consists of highly cooperative tasks. Especially during distributed search and rescue tasks there is a constant mix of routinized and non-routinized activities. Within this paper we focus on the work practices of the German Red Cross Rescue Dog Units who deal with several uncertainties regarding the involved dogs, the fragility of the respective situations as well as issues of using technologies under enormous time pressure. Smart glasses provide possibilities for enhanced and hands-free interaction in various contexts and a number of approaches have already been applied, aiming at efficient use of the respective technological innovation in private and professional contexts. However, the collaborative potential of smart glasses in time-critical and uncertain situations is still unexplored. Our design case study examines how the on-site work of emergency service teams can be supported by smart glasses: Based on examining the work practices of the German Red Cross Rescue Dogs, we introduce ‘RescueGlass‘ as a coordinative concept, encompassing hands-free head-mounted display (HMD) application as well as a corresponding smartphone application. Finally, we describe the evaluation of its use in the field of emergency response and management. We show how current features such as ‘fog of war‘ or various sensors support the cooperative practices of dog handlers, and outline current technical limitations offering future research questions. Our paper provides an initial design probe using smart glasses to engage in the field of collaborative professional mobile tasks.
@article{reuter_rescueglass_2019,
title = {{RescueGlass}: {Collaborative} {Applications} involving {Head}-{Mounted} {Displays} for {Red} {Cross} {Rescue} {Dog} {Units}},
volume = {28},
url = {http://www.peasec.de/paper/2019/2019_ReuterLudwigMischur_RescueGlass_JCSCW.pdf},
doi = {10.1007/s10606-018-9339-8},
abstract = {On-site work of emergency service teams consists of highly cooperative tasks. Especially during distributed search and rescue tasks there is a constant mix of routinized and non-routinized activities. Within this paper we focus on the work practices of the German Red Cross Rescue Dog Units who deal with several uncertainties regarding the involved dogs, the fragility of the respective situations as well as issues of using technologies under enormous time pressure. Smart glasses provide possibilities for enhanced and hands-free interaction in various contexts and a number of approaches have already been applied, aiming at efficient use of the respective technological innovation in private and professional contexts. However, the collaborative potential of smart glasses in time-critical and uncertain situations is still unexplored. Our design case study examines how the on-site work of emergency service teams can be supported by smart glasses: Based on examining the work practices of the German Red Cross Rescue Dogs, we introduce ‘RescueGlass' as a coordinative concept, encompassing hands-free head-mounted display (HMD) application as well as a corresponding smartphone application. Finally, we describe the evaluation of its use in the field of emergency response and management. We show how current features such as ‘fog of war' or various sensors support the cooperative practices of dog handlers, and outline current technical limitations offering future research questions. Our paper provides an initial design probe using smart glasses to engage in the field of collaborative professional mobile tasks.},
number = {1-2},
journal = {Computer Supported Cooperative Work: The Journal of Collaborative Computing (JCSCW)},
author = {Reuter, Christian and Ludwig, Thomas and Mischur, Patrick},
year = {2019},
keywords = {Security, UsableSec, Crisis, HCI, A-Paper, Ranking-ImpactFactor, Projekt-KontiKat, Infrastructure, Cooperation, Ranking-CORE-B, Projekt-KOKOS, Ranking-VHB-B},
pages = {209--246},
}
[BibTeX] [Abstract] [Download PDF]
Social media have been established in many natural disasters or human‐induced crises and emergencies. Nowadays, authorities, such as emergency services, and citizens engage with social media in different phases of the emergency management cycle. However, as research in crisis informatics highlights, one remaining issue constitutes the chaotic use of social media by citizens during emergencies, which has the potential to increase the complexity of tasks, uncertainty, and pressure for emergency services. To counter these risks, besides implementing supportive technology, social media guidelines may help putting artefact and theoretical contributions into practical use for authorities and citizens. This paper presents the design and evaluation (with 1,024 participants) of citizens‘ guidelines for using social media before, during, and after emergencies.
@article{kaufhold_avoiding_2019,
title = {Avoiding {Chaotic} {Use} of {Social} {Media} before, during, and after {Emergencies}: {Design} and {Evaluation} of {Citizens}' {Guidelines}},
volume = {27},
url = {http://www.peasec.de/paper/2019/2019_KaufholdGizikisReuterHabdankGrinko_DesignEvaluationCitizenGuidelines_JCCM.pdf},
doi = {10.1111/1468-5973.12249},
abstract = {Social media have been established in many natural disasters or human‐induced crises and emergencies. Nowadays, authorities, such as emergency services, and citizens engage with social media in different phases of the emergency management cycle. However, as research in crisis informatics highlights, one remaining issue constitutes the chaotic use of social media by citizens during emergencies, which has the potential to increase the complexity of tasks, uncertainty, and pressure for emergency services. To counter these risks, besides implementing supportive technology, social media guidelines may help putting artefact and theoretical contributions into practical use for authorities and citizens. This paper presents the design and evaluation (with 1,024 participants) of citizens' guidelines for using social media before, during, and after emergencies.},
number = {3},
journal = {Journal of Contingencies and Crisis Management (JCCM)},
author = {Kaufhold, Marc-André and Gizikis, Alexis and Reuter, Christian and Habdank, Matthias and Grinko, Margarita},
year = {2019},
keywords = {Crisis, HCI, A-Paper, AuswahlKaufhold, Ranking-ImpactFactor, SocialMedia, Projekt-KontiKat, Projekt-EmerGent},
pages = {198--213},
}
Bücher und herausgegebene Zeitschriften / Books and Edited Special Issues in Journals
[BibTeX] [Abstract] [Download PDF]
Technological and scientific progress, especially the rapid development in information technology (IT), plays a crucial role regarding questions of peace and security. This textbook addresses the significance, potentials and challenges of IT for peace and securi-ty. For this purpose, the book offers an introduction to peace, conflict, and security research, thereby focusing on natural-science, technical and computer science perspec-tives. In the following, it sheds light on cyber conflicts, war and peace, cyber arms con-trol, cyber attribution and infrastructures as well as culture and interaction before an outlook is given.
@book{reuter_information_2019-1,
address = {Wiesbaden, Germany},
title = {Information {Technology} for {Peace} and {Security} - {IT} {Applications} and {Infrastructures} in {Conflicts}, {Crises}, {War}, and {Peace}},
isbn = {978-3-658-25652-4},
url = {https://www.springer.com/de/book/9783658256517},
abstract = {Technological and scientific progress, especially the rapid development in information technology (IT), plays a crucial role regarding questions of peace and security. This textbook addresses the significance, potentials and challenges of IT for peace and securi-ty. For this purpose, the book offers an introduction to peace, conflict, and security research, thereby focusing on natural-science, technical and computer science perspec-tives. In the following, it sheds light on cyber conflicts, war and peace, cyber arms con-trol, cyber attribution and infrastructures as well as culture and interaction before an outlook is given.},
publisher = {Springer Vieweg},
author = {Reuter, Christian},
year = {2019},
doi = {10.1007/978-3-658-25652-4},
keywords = {Peace, RSF, Security, Crisis, Projekt-CROSSING, Selected, Cyberwar, AuswahlPeace, Projekt-DualUse, Projekt-CRISP, Infrastructure, Projekt-MAKI},
}
[BibTeX] [Abstract] [Download PDF]
The digitalisation of communication started as early as the 1980s. With the rise of the internet in the mid-90s the digitalisation process intensified; then it took on another dimension with the spread of social media and smartphones in the mid noughties. These new technologies are providing new possibilities that are unveiling, or rather, strengthening societal trends. What’s more, traditional forms of organisation are also being transformed at breakneck speed. This publication provides an overview of both developments: On the one hand we have societal developments such as the blurring of boundaries between real and digital worlds, constant connectivity, fake news, and social media outrage. On the other, we have the effects on traditional media, the workplace, schools, non-governmental organisations and sports.
@book{reuter_digitalisation_2019,
address = {Frankfurt am Main},
title = {Digitalisation and {Communication}: {Societal} {Trends} and the {Change} in {Organisations}},
url = {http://publikationen.ub.uni-frankfurt.de/opus4/files/47853/SPPaper6_Digitalisation_Communication_English.pdf},
abstract = {The digitalisation of communication started as early as the 1980s. With the rise of the internet in the mid-90s the digitalisation process intensified; then it took on another dimension with the spread of social media and smartphones in the mid noughties. These new technologies are providing new possibilities that are unveiling, or rather, strengthening societal trends. What's more, traditional forms of organisation are also being transformed at breakneck speed. This publication provides an overview of both developments: On the one hand we have societal developments such as the blurring of boundaries between real and digital worlds, constant connectivity, fake news, and social media outrage. On the other, we have the effects on traditional media, the workplace, schools, non-governmental organisations and sports.},
publisher = {Mercator Science-Policy Fellowship-Programme},
author = {Reuter, Christian and Schultz, Tanjev and Stegbauer, Christian},
year = {2019},
keywords = {HCI, SocialMedia},
}
[BibTeX] [Abstract] [Download PDF]
Bereits seit den 80er-Jahren erleben wir die Digitalisierung der Kommunikation. Mit dem Siegeszug des Internets in den 90er-Jahren intensivierte sich dieser Prozess und erreichte ab Mitte der 2000er mit der Verbreitung sozialer Medien und Smartphones eine neue Dimension. Neue technische Möglichkeiten haben neue gesellschaftliche Trends hervorgebracht bzw. verstärkt. Die Digitalisierung der Kommunikation verändert aber auch traditionelle Organisationsformen in atemberaubender Geschwindigkeit. Diese Publikation bietet einen Überblick zu diesen beiden Entwicklungen: gesellschaftliche Entwicklungen wie die Auflösung von realer und digitaler Welt, ständige Vernetztheit, Fake News und Shitstorm auf der einen Seite und die Auswirkungen dieser Prozesse auf traditionelle Medien, Arbeitswelt, Schulen, Nichtregierungsorganisationen und den Sportsektor auf der anderen Seite.
@book{reuter_digitalisierung_2019,
address = {Frankfurt am Main},
title = {Die {Digitalisierung} der {Kommunikation}: {Gesellschaftliche} {Trends} und der {Wandel} von {Organisationen}},
url = {http://publikationen.ub.uni-frankfurt.de/opus4/files/47852/PolicyPaper5_Digitalisierung_Kommunikation_deutsch.pdf},
abstract = {Bereits seit den 80er-Jahren erleben wir die Digitalisierung der Kommunikation. Mit dem Siegeszug des Internets in den 90er-Jahren intensivierte sich dieser Prozess und erreichte ab Mitte der 2000er mit der Verbreitung sozialer Medien und Smartphones eine neue Dimension. Neue technische Möglichkeiten haben neue gesellschaftliche Trends hervorgebracht bzw. verstärkt. Die Digitalisierung der Kommunikation verändert aber auch traditionelle Organisationsformen in atemberaubender Geschwindigkeit. Diese Publikation bietet einen Überblick zu diesen beiden Entwicklungen: gesellschaftliche Entwicklungen wie die Auflösung von realer und digitaler Welt, ständige Vernetztheit, Fake News und Shitstorm auf der einen Seite und die Auswirkungen dieser Prozesse auf traditionelle Medien, Arbeitswelt, Schulen, Nichtregierungsorganisationen und den Sportsektor auf der anderen Seite.},
publisher = {Mercator Science-Policy Fellowship-Programme},
author = {Reuter, Christian and Schultz, Tanjev and Stegbauer, Christian},
year = {2019},
keywords = {HCI, SocialMedia},
}
[BibTeX] [Abstract] [Download PDF]
Scientific discoveries and technological innovations have always exerted a great influence on peace and security. New civil and military technologies are revolutionizing warfare. Particularly striking areas are cyber warfare and the rapid development of unmanned weapons systems. Issues of nuclear disarmament, missile defence or space armament as well as chemical and biological weapons are again becoming more urgent. The conference SCIENCE · PEACE · SECURITY ’19 aimed for an accurate understanding and fruitful discussions of today’s and tomorrow’s peace and security challenges. This includes scientific-technical as well as inter- disciplinary contributions, focusing on problems of international security and peace-building as well as contributions dedicated to transparency, trust-building, arms control, disarmament, and conflict management.
@book{reuter_science_2019-1,
address = {Darmstadt, Germany},
title = {{SCIENCE} {PEACE} {SECURITY} '19 - {Proceedings} of the {Interdisciplinary} {Conference} on {Technical} {Peace} and {Security} {Research}},
url = {https://tuprints.ulb.tu-darmstadt.de/id/eprint/9164},
abstract = {Scientific discoveries and technological innovations have always exerted a great influence on peace and security. New civil and military technologies are revolutionizing warfare. Particularly striking areas are cyber warfare and the rapid development of unmanned weapons systems. Issues of nuclear disarmament, missile defence or space armament as well as chemical and biological weapons are again becoming more urgent. The conference SCIENCE · PEACE · SECURITY '19 aimed for an accurate understanding and fruitful discussions of today's and tomorrow's peace and security challenges. This includes scientific-technical as well as inter- disciplinary contributions, focusing on problems of international security and peace-building as well as contributions dedicated to transparency, trust-building, arms control, disarmament, and conflict management.},
publisher = {TUprints},
author = {Reuter, Christian and Altmann, Jürgen and Göttsche, Malte and Himmel, Mirko},
year = {2019},
keywords = {Peace, Security, Crisis, Projekt-DualUse},
}
Kapitel in Büchern
[BibTeX] [Abstract] [Download PDF]
Dual-use in information technology is a pressing issue: how can we prevent, control or manage the risk of a harmful application of IT? How can dual-use awareness and regu-lation help to mitigate the risks to peace and security on the national and international level? As the cyberspace has been declared a military domain, IT is of increasing im-portance for civil and military infrastructures. How can researchers, developers and decision makers make sure that IT is not misused to cause harm? For nuclear, biological and chemical technologies this has been discussed as the dual-use problem. This chapter illustrates the approaches towards different dual-use concepts, how to conduct a tech-nology assessment and provides insight into the implementation of dual-use assessment guidelines at TU Darmstadt, the so-called Civil Clause.
@incollection{riebe_dual_2019,
address = {Wiesbaden, Germany},
title = {Dual {Use} and {Dilemmas} for {Cybersecurity}, {Peace} and {Technology} {Assessment}},
isbn = {978-3-658-25652-4},
url = {https://link.springer.com/chapter/10.1007/978-3-658-25652-4_8},
abstract = {Dual-use in information technology is a pressing issue: how can we prevent, control or manage the risk of a harmful application of IT? How can dual-use awareness and regu-lation help to mitigate the risks to peace and security on the national and international level? As the cyberspace has been declared a military domain, IT is of increasing im-portance for civil and military infrastructures. How can researchers, developers and decision makers make sure that IT is not misused to cause harm? For nuclear, biological and chemical technologies this has been discussed as the dual-use problem. This chapter illustrates the approaches towards different dual-use concepts, how to conduct a tech-nology assessment and provides insight into the implementation of dual-use assessment guidelines at TU Darmstadt, the so-called Civil Clause.},
booktitle = {Information {Technology} for {Peace} and {Security} - {IT} {Applications} and {Infrastructures} in {Conflicts}, {Crises}, {War}, and {Peace}},
publisher = {Springer Vieweg},
author = {Riebe, Thea and Reuter, Christian},
editor = {Reuter, Christian},
year = {2019},
doi = {10.1007/978-3-658-25652-4_8},
keywords = {Peace, Projekt-DualUse, Projekt-KontiKat, Projekt-CRISP},
pages = {165--184},
}
[BibTeX] [Abstract] [Download PDF]
Advances in science and technology play a crucial role in the context of peace, conflict and security. As information technology (IT) is becoming omnipresent, this includes both the resilience of IT infrastructures e.g. as a target in cases of conflict and the role of IT applications to prevent and manage conflicts, crises and disasters. This chapter is an introduction to IT and its role in war and peace, in conflicts and crises as well as in safety and security. Based on those connections a new field of research has emerged: IT peace research. It is introduced in this chapter which provides an overview of the inter-disciplinary concepts of peace, conflict and security. In addition, the research disciplines computer science and peace and conflict studies as the basis of IT peace research are explained. Moreover, the chapter focuses on the specific research topics of IT peace research and presents the institutionalised research landscape in Germany.
@incollection{reuter_it_2019,
address = {Wiesbaden, Germany},
title = {{IT} in {Peace}, {Conflict}, and {Security} {Research}},
isbn = {978-3-658-25652-4},
url = {https://www.springer.com/de/book/9783658256517},
abstract = {Advances in science and technology play a crucial role in the context of peace, conflict and security. As information technology (IT) is becoming omnipresent, this includes both the resilience of IT infrastructures e.g. as a target in cases of conflict and the role of IT applications to prevent and manage conflicts, crises and disasters. This chapter is an introduction to IT and its role in war and peace, in conflicts and crises as well as in safety and security. Based on those connections a new field of research has emerged: IT peace research. It is introduced in this chapter which provides an overview of the inter-disciplinary concepts of peace, conflict and security. In addition, the research disciplines computer science and peace and conflict studies as the basis of IT peace research are explained. Moreover, the chapter focuses on the specific research topics of IT peace research and presents the institutionalised research landscape in Germany.},
booktitle = {Information {Technology} for {Peace} and {Security} - {IT} {Applications} and {Infrastructures} in {Conflicts}, {Crises}, {War}, and {Peace}},
publisher = {Springer Vieweg},
author = {Reuter, Christian and Aldehoff, Larissa and Riebe, Thea and Kaufhold, Marc-André},
editor = {Reuter, Christian},
year = {2019},
doi = {10.1007/978-3-658-25652-4_2},
keywords = {Peace, Security, HCI, Projekt-CRISP, Infrastructure},
pages = {11--37},
}
[BibTeX] [Abstract] [Download PDF]
Not only today, but also in the future information technology and the advances in the field of computer science will have a high relevance for peace and security. Naturally, a textbook like this can only cover a selective part of research and a certain point in time. Nonetheless, it can be attempted to identify trends, challenges and venture an outlook into the future. That is exactly what we want to achieve in this chapter: To predict fu-ture developments and try to classify them correctly. These considerations were made both by the editor and the authors involved alike. Therefore, an outlook based on fun-damentals, cyber conflicts and war, cyber peace, cyber arms control, infrastructures as well as social interaction is given.
@incollection{reuter_future_2019,
address = {Wiesbaden, Germany},
title = {The {Future} of {IT} in {Peace} and {Security}},
isbn = {978-3-658-25652-4},
url = {https://www.springer.com/de/book/9783658256517},
abstract = {Not only today, but also in the future information technology and the advances in the field of computer science will have a high relevance for peace and security. Naturally, a textbook like this can only cover a selective part of research and a certain point in time. Nonetheless, it can be attempted to identify trends, challenges and venture an outlook into the future. That is exactly what we want to achieve in this chapter: To predict fu-ture developments and try to classify them correctly. These considerations were made both by the editor and the authors involved alike. Therefore, an outlook based on fun-damentals, cyber conflicts and war, cyber peace, cyber arms control, infrastructures as well as social interaction is given.},
booktitle = {Information {Technology} for {Peace} and {Security} - {IT} {Applications} and {Infrastructures} in {Conflicts}, {Crises}, {War}, and {Peace}},
publisher = {Springer Vieweg},
author = {Reuter, Christian and Aal, Konstantin and Aldehoff, Larissa and Altmann, Jürgen and Buchmann, Johannes and Bernhardt, Ute and Denker, Kai and Herrmann, Dominik and Hollick, Matthias and Katzenbeisser, Stefan and Kaufhold, Marc-André and Nordmann, Alfred and Reinhold, Thomas and Riebe, Thea and Ripper, Annette and Ruhmann, Ingo and Saalbach, Klaus-Peter and Schörnig, Niklas and Sunyaev, Ali and Wulf, Volker},
editor = {Reuter, Christian},
year = {2019},
doi = {10.1007/978-3-658-25652-4_19},
keywords = {Peace, Security, UsableSec, HCI, Projekt-CROSSING, Projekt-CRISP},
pages = {405--413},
}
[BibTeX] [Abstract] [Download PDF]
Technological and scientific progress, especially the rapid development in information technology (IT), plays a crucial role regarding questions of peace and security. This textbook addresses the significance, potentials and challenges of IT for peace and securi-ty. For this purpose, the book offers an introduction to peace, conflict, and security research, thereby focusing on natural science, technical and computer science perspec-tives. In the following, it sheds light on fundamentals (e.g. IT in peace, conflict and security, natural-science/technical peace research), cyber conflicts and war (e.g. infor-mation warfare, cyber espionage, cyber defence, Darknet), cyber peace (e.g. dual-use, technology assessment, confidence and security building measures), cyber arms control (e.g. arms control in the cyberspace, unmanned systems, verification), cyber attribution and infrastructures (e.g. attribution of cyber attacks, resilient infrastructures, secure critical information infrastructures), culture and interaction (e.g. safety and security, cultural violence, social media), before an outlook is given. This chapter provides an overview of all chapters in this book.
@incollection{reuter_information_2019,
address = {Wiesbaden, Germany},
title = {Information {Technology} for {Peace} and {Security} - {Introduction} and {Overview}},
isbn = {978-3-658-25652-4},
url = {https://www.springer.com/de/book/9783658256517},
abstract = {Technological and scientific progress, especially the rapid development in information technology (IT), plays a crucial role regarding questions of peace and security. This textbook addresses the significance, potentials and challenges of IT for peace and securi-ty. For this purpose, the book offers an introduction to peace, conflict, and security research, thereby focusing on natural science, technical and computer science perspec-tives. In the following, it sheds light on fundamentals (e.g. IT in peace, conflict and security, natural-science/technical peace research), cyber conflicts and war (e.g. infor-mation warfare, cyber espionage, cyber defence, Darknet), cyber peace (e.g. dual-use, technology assessment, confidence and security building measures), cyber arms control (e.g. arms control in the cyberspace, unmanned systems, verification), cyber attribution and infrastructures (e.g. attribution of cyber attacks, resilient infrastructures, secure critical information infrastructures), culture and interaction (e.g. safety and security, cultural violence, social media), before an outlook is given. This chapter provides an overview of all chapters in this book.},
booktitle = {Information {Technology} for {Peace} and {Security} - {IT} {Applications} and {Infrastructures} in {Conflicts}, {Crises}, {War}, and {Peace}},
publisher = {Springer Vieweg},
author = {Reuter, Christian},
editor = {Reuter, Christian},
year = {2019},
doi = {10.1007/978-3-658-25652-4_1},
keywords = {Peace, Security, Crisis, Projekt-CROSSING, Projekt-CRISP},
pages = {3--9},
}
[BibTeX] [Abstract] [Download PDF]
Verification is one of the pillars of arms control and non-proliferation treaties as well as an important part of confidence building measures. It defines practical measures that enable treaty members to check the treaty compliance by observing, counting or moni-toring specific actions and their accordance with the respective rules. In contrast to his-torical examples of former military technologies, cyberspace features some unique char-acteristics making it hard to apply established measures. The chapter describes these peculiarities and assesses distinguishing problems compared to selected verification measures for nuclear, biological and chemicals weapons technology. Yet, cyberspace is a human-made domain and adjusting its technical setting, rules and principles may help to reduce the threat of ongoing militarisation. Offering some alternatives, the chapter elaborates on suitable and measurable parameters for this domain and presents potential-ly useful verification approaches.
@incollection{reinhold_verification_2019,
address = {Wiesbaden, Germany},
title = {Verification in {Cyberspace}},
isbn = {978-3-658-25652-4},
url = {https://www.springer.com/de/book/9783658256517},
abstract = {Verification is one of the pillars of arms control and non-proliferation treaties as well as an important part of confidence building measures. It defines practical measures that enable treaty members to check the treaty compliance by observing, counting or moni-toring specific actions and their accordance with the respective rules. In contrast to his-torical examples of former military technologies, cyberspace features some unique char-acteristics making it hard to apply established measures. The chapter describes these peculiarities and assesses distinguishing problems compared to selected verification measures for nuclear, biological and chemicals weapons technology. Yet, cyberspace is a human-made domain and adjusting its technical setting, rules and principles may help to reduce the threat of ongoing militarisation. Offering some alternatives, the chapter elaborates on suitable and measurable parameters for this domain and presents potential-ly useful verification approaches.},
booktitle = {Information {Technology} for {Peace} and {Security} - {IT} {Applications} and {Infrastructures} in {Conflicts}, {Crises}, {War}, and {Peace}},
publisher = {Springer Vieweg},
author = {Reinhold, Thomas and Reuter, Christian},
editor = {Reuter, Christian},
year = {2019},
doi = {10.1007/978-3-658-25652-4_12},
keywords = {Peace, Security, Projekt-CRISP},
pages = {257--276},
}
[BibTeX] [Abstract] [Download PDF]
The encompassing trend of digitalisation and widespread dependencies on IT systems triggers adjustments also in the military forces. Besides necessary enhancements of IT security and defensive measures for cyberspace, a growing number of states are estab-lishing offensive military capabilities for this domain. Looking at historical develop-ments and transformations due to advancements in military technologies, the chapter discusses the political progress made and tools developed since. Both of these have con-tributed to handling challenges and confining threats to international security. With this background, the text assesses a possible application of these efforts to developments concerning cyberspace, as well as obstacles that need to be tackled for it to be success-ful. The chapter points out political advancements already in progress, the role of social initiatives, such as the cyber peace campaign of the Forum of Computer Scientists for Peace and Societal Responsibility (FifF), as well as potential consequences of the rising probability of cyber war as opposed to the prospects of cyber peace.
@incollection{reinhold_cyber_2019,
address = {Wiesbaden, Germany},
title = {From {Cyber} {War} to {Cyber} {Peace}},
isbn = {978-3-658-25652-4},
url = {https://www.springer.com/de/book/9783658256517},
abstract = {The encompassing trend of digitalisation and widespread dependencies on IT systems triggers adjustments also in the military forces. Besides necessary enhancements of IT security and defensive measures for cyberspace, a growing number of states are estab-lishing offensive military capabilities for this domain. Looking at historical develop-ments and transformations due to advancements in military technologies, the chapter discusses the political progress made and tools developed since. Both of these have con-tributed to handling challenges and confining threats to international security. With this background, the text assesses a possible application of these efforts to developments concerning cyberspace, as well as obstacles that need to be tackled for it to be success-ful. The chapter points out political advancements already in progress, the role of social initiatives, such as the cyber peace campaign of the Forum of Computer Scientists for Peace and Societal Responsibility (FifF), as well as potential consequences of the rising probability of cyber war as opposed to the prospects of cyber peace.},
booktitle = {Information {Technology} for {Peace} and {Security} - {IT} {Applications} and {Infrastructures} in {Conflicts}, {Crises}, {War}, and {Peace}},
publisher = {Springer Vieweg},
author = {Reinhold, Thomas and Reuter, Christian},
editor = {Reuter, Christian},
year = {2019},
doi = {10.1007/978-3-658-25652-4_7},
keywords = {Peace, Security, Projekt-CROSSING, Cyberwar, Projekt-DualUse, Projekt-CRISP},
pages = {139--164},
}
[BibTeX] [Abstract] [Download PDF]
Arms control aims at preventing conflicts and fostering stability in inter-state relations by either reducing the probability of usage of a specific weapon or regulating its use and thus, reducing the costs of armament. Several approaches to arms control exist: limiting or reducing numbers of weapons and armed forces, disarmament (“down to zero”) or prohibiting certain weapons. To illustrate these further, this chapter elaborates on the necessity of arms control and presents some historical examples, including an overview of existing measures of arms control. Extrapolating from these, the general architecture of arms control regimes and the complex issue of establishing and verifying compliance with agreements will be discussed, not least with respect to cyberspace. Building on these theoretical considerations, the chapter presents important treaties and first approaches, including the Wassenaar Arrangement, the recommendations of the OSCE, and the UN GGE 2015.
@incollection{reuter_arms_2019,
address = {Wiesbaden},
title = {Arms {Control} and its {Applicability} to {Cyberspace}},
isbn = {978-3-658-25651-7 978-3-658-25652-4},
url = {http://link.springer.com/10.1007/978-3-658-25652-4_10},
abstract = {Arms control aims at preventing conflicts and fostering stability in inter-state relations by either reducing the probability of usage of a specific weapon or regulating its use and thus, reducing the costs of armament. Several approaches to arms control exist: limiting or reducing numbers of weapons and armed forces, disarmament (“down to zero”) or prohibiting certain weapons. To illustrate these further, this chapter elaborates on the necessity of arms control and presents some historical examples, including an overview of existing measures of arms control. Extrapolating from these, the general architecture of arms control regimes and the complex issue of establishing and verifying compliance with agreements will be discussed, not least with respect to cyberspace. Building on these theoretical considerations, the chapter presents important treaties and first approaches, including the Wassenaar Arrangement, the recommendations of the OSCE, and the UN GGE 2015.},
language = {en},
urldate = {2021-05-11},
booktitle = {Information {Technology} for {Peace} and {Security} - {IT} {Applications} and {Infrastructures} in {Conflicts}, {Crises}, {War}, and {Peace}},
publisher = {Springer Fachmedien Wiesbaden},
author = {Reinhold, Thomas and Reuter, Christian},
editor = {Reuter, Christian},
year = {2019},
doi = {10.1007/978-3-658-25652-4_10},
pages = {207--231},
}
[BibTeX] [Abstract] [Download PDF]
Over the last decade, social media services had an enormous impact on modern culture. They are nowadays widely established in everyday life, but also during natural and man-made crises and conflicts. For instance, Facebook was part of the Arabic Spring, in which the tool facilitated the communication and interaction between participants of political protests. On the contrary, terrorists may recruit new members and disseminate ideologies, and social bots may influence social and political processes. Based on the notions of cultural violence and cultural peace as well as the phenomena of fake news, terrorism and social bots, this exploratory review firstly presents human cultural inter-ventions in social media (e.g. dissemination of fake news and terroristic propaganda) and respective countermeasures (e.g. fake news detection and counter-narratives). Sec-ondly, it discusses automatic cultural interventions realised via social bots (e.g. astro-turfing, misdirection and smoke screening) and countermeasures (e.g. crowdsourcing and social bot detection). Finally, this chapter concludes with a range of cultural inter-ventions and information and communication technology (ICT) in terms of actors and intentions to identify future research potential for supporting situational assessments during conflicts.
@incollection{kaufhold_cultural_2019,
address = {Wiesbaden, Germany},
title = {Cultural {Violence} and {Peace} in {Social} {Media}},
isbn = {978-3-658-25652-4},
url = {https://www.springer.com/de/book/9783658256517},
abstract = {Over the last decade, social media services had an enormous impact on modern culture. They are nowadays widely established in everyday life, but also during natural and man-made crises and conflicts. For instance, Facebook was part of the Arabic Spring, in which the tool facilitated the communication and interaction between participants of political protests. On the contrary, terrorists may recruit new members and disseminate ideologies, and social bots may influence social and political processes. Based on the notions of cultural violence and cultural peace as well as the phenomena of fake news, terrorism and social bots, this exploratory review firstly presents human cultural inter-ventions in social media (e.g. dissemination of fake news and terroristic propaganda) and respective countermeasures (e.g. fake news detection and counter-narratives). Sec-ondly, it discusses automatic cultural interventions realised via social bots (e.g. astro-turfing, misdirection and smoke screening) and countermeasures (e.g. crowdsourcing and social bot detection). Finally, this chapter concludes with a range of cultural inter-ventions and information and communication technology (ICT) in terms of actors and intentions to identify future research potential for supporting situational assessments during conflicts.},
booktitle = {Information {Technology} for {Peace} and {Security} - {IT} {Applications} and {Infrastructures} in {Conflicts}, {Crises}, {War}, and {Peace}},
publisher = {Springer Vieweg},
author = {Kaufhold, Marc-André and Reuter, Christian},
editor = {Reuter, Christian},
year = {2019},
doi = {10.1007/978-3-658-25652-4_17},
keywords = {Peace, Crisis, HCI, SocialMedia, Projekt-CRISP},
pages = {361--381},
}
[BibTeX] [Abstract] [Download PDF]
In its recommendations for the further development of peace and conflict research published in July 2019, the German Council of Science and Humanities (Wissenschaftsrat), as the most important science policy advisory body in Germany, stated that urgent action was needed to strengthen scientific and technical peace and conflict research. As a positive example of the permanent establishment of this field of research at a university, the TU Darmstadt was named. This is where the first edition of the conference series „SCIENCE · PEACE · SECURITY“ took place.
@incollection{reuter_science_2019,
address = {Darmstadt, Germany},
title = {{SCIENCE} {PEACE} {SECURITY} '19 – {An} {Editorial}},
url = {https://tuprints.ulb.tu-darmstadt.de/id/eprint/9164},
abstract = {In its recommendations for the further development of peace and conflict research published in July 2019, the German Council of Science and Humanities (Wissenschaftsrat), as the most important science policy advisory body in Germany, stated that urgent action was needed to strengthen scientific and technical peace and conflict research. As a positive example of the permanent establishment of this field of research at a university, the TU Darmstadt was named. This is where the first edition of the conference series "SCIENCE · PEACE · SECURITY" took place.},
booktitle = {{SCIENCE} {PEACE} {SECURITY} '19 - {Proceedings} of the {Interdisciplinary} {Conference} on {Technical} {Peace} and {Security} {Research}},
publisher = {TUprints},
author = {Reuter, Christian and Altmann, Jürgen and Göttsche, Malte and Himmel, Mirko},
editor = {Reuter, Christian and Altmann, Jürgen and Göttsche, Malte and Himmel, Mirko},
year = {2019},
keywords = {Peace, Security},
pages = {7--10},
}
[BibTeX] [Abstract] [Download PDF]
Konsequentes Vorgehen von Behörden gegen gezielte Falschnachrichten – das wünscht sich laut einer repräsentativen Studie eine große Mehrheit der Bevölkerung in Deutschland. Das Fachgebiet Wissenschaft und Technik für Frieden und Sicherheit (PEASEC) der Technischen Universität Darmstadt fragte unter anderem danach, wie Bürgerinnen und Bürger Fake News wahrnehmen und auf sie reagieren und welche Gegenmaßnahmen als sinnvoll erachtet werden.
@incollection{reuter_fake_2019,
address = {Frankfurt am Main},
title = {Fake {News} und manipulierte {Meinungsbildung}},
url = {http://publikationen.ub.uni-frankfurt.de/opus4/files/47852/PolicyPaper5_Digitalisierung_Kommunikation_deutsch.pdf},
abstract = {Konsequentes Vorgehen von Behörden gegen gezielte Falschnachrichten – das wünscht sich laut einer repräsentativen Studie eine große Mehrheit der Bevölkerung in Deutschland. Das Fachgebiet Wissenschaft und Technik für Frieden und Sicherheit (PEASEC) der Technischen Universität Darmstadt fragte unter anderem danach, wie Bürgerinnen und Bürger Fake News wahrnehmen und auf sie reagieren und welche Gegenmaßnahmen als sinnvoll erachtet werden.},
booktitle = {Die {Digitalisierung} der {Kommunikation}: {Gesellschaftliche} {Trends} und der {Wandel} von {Organisationen}},
publisher = {Mercator Science-Policy Fellowship-Programme},
author = {Reuter, Christian},
editor = {Reuter, Christian and Schultz, Tanjev and Stegbauer, Christian},
year = {2019},
keywords = {Peace, Crisis, HCI, SocialMedia},
pages = {15--19},
}
[BibTeX] [Abstract] [Download PDF]
Im Dezember 2017 wurde eine Invasion des deutschen Regierungsnetzwerks entdeckt; dieses vernetzt Bundesministerien und Behörden (vgl. Reinhold 2018a). Die Angreifer nutzten das Intranet der Hochschule des Bundes für öffentliche Verwaltung und der Bundesakademie für öffentliche Verwaltung als Einfallstor. Dieses ist der am wenigsten gesicherte Teil des Systems, da externe Teilnehmerinnen und Teilnehmer auch außerhalb der Einrichtung darauf zugreifen müssen, beispielsweise für Fortbildungen des Auswärtigen Amtes.
@incollection{reuter_cyberwar_2019,
title = {Cyberwar zwischen {Fiktion} und {Realität} – technologische {Möglichkeiten}},
isbn = {978-3-658-27713-0},
url = {https://peasec.de/paper/2019/2019_ReuterRiebeAldehoffKaufholdReinhold2019_CyberwarZwischenFiktionUndReal_Cyberwar.pdf},
abstract = {Im Dezember 2017 wurde eine Invasion des deutschen Regierungsnetzwerks entdeckt; dieses vernetzt Bundesministerien und Behörden (vgl. Reinhold 2018a). Die Angreifer nutzten das Intranet der Hochschule des Bundes für öffentliche Verwaltung und der Bundesakademie für öffentliche Verwaltung als Einfallstor. Dieses ist der am wenigsten gesicherte Teil des Systems, da externe Teilnehmerinnen und Teilnehmer auch außerhalb der Einrichtung darauf zugreifen müssen, beispielsweise für Fortbildungen des Auswärtigen Amtes.},
booktitle = {Cyberwar – die {Digitalisierung} der {Kriegsführung}},
publisher = {Springer VS},
author = {Reuter, Christian and Riebe, Thea and Aldehoff, Larissa and Kaufhold, Marc-André and Reinhold, Thomas},
editor = {Werkner, Ines-Jacqueline and Schörnig, Niklas},
year = {2019},
doi = {10.1007/978-3-658-27713-0},
keywords = {Peace, Security, Cyberwar, Projekt-DualUse},
pages = {15--38},
}
[BibTeX] [Abstract] [Download PDF]
Per a recent study, a majority of Germans wants to see strict action taken against the targeted spread of disinformation in the news. Researchers in the Science and Technology for Peace and Security (PEASEC) research group at Technische Universität Darmstadt investigated how German citizens perceive and react to fake news and asked them what countermeasures they would consider to be most appropriate.
@incollection{reuter_fake_2019-2,
address = {Frankfurt am Main},
title = {Fake {News} and the {Manipulation} of {Public} {Opinion}},
url = {http://publikationen.ub.uni-frankfurt.de/opus4/files/47853/SPPaper6_Digitalisation_Communication_English.pdf},
abstract = {Per a recent study, a majority of Germans wants to see strict action taken against the targeted spread of disinformation in the news. Researchers in the Science and Technology for Peace and Security (PEASEC) research group at Technische Universität Darmstadt investigated how German citizens perceive and react to fake news and asked them what countermeasures they would consider to be most appropriate.},
booktitle = {Digitalisation and {Communication}: {Societal} {Trends} and the {Change} in {Organisations}},
publisher = {Mercator Science-Policy Fellowship-Programme},
author = {Reuter, Christian},
editor = {Reuter, Christian and Schultz, Tanjev and Stegbauer, Christian},
year = {2019},
keywords = {Peace, Crisis},
pages = {13--16},
}
[BibTeX] [Abstract] [Download PDF]
In the discussion of lethal autonomous weapon systems (LAWS) in the expert forum of the Convention on Certain Conventional Weapons (CCW), the interpretation of crucial concepts such as autonomy and human control is decisive for the future direction of international hu- manitarian law. Starting from the perspective of a synthesis of Actor-Network Theory (ANT) and Value-Sensitive-Design (VSD), we aim to analyse the discourse of LAWS and ask for pos- sibilities to implement Meaningful Human Control.
@incollection{schmid_meaningful_2019,
address = {Darmstadt, Germany},
title = {Meaningful {Human} {Control} of {Lethal} {Autonomous} {Weapon} {Systems}},
url = {https://tuprints.ulb.tu-darmstadt.de/id/eprint/9164},
abstract = {In the discussion of lethal autonomous weapon systems (LAWS) in the expert forum of the Convention on Certain Conventional Weapons (CCW), the interpretation of crucial concepts such as autonomy and human control is decisive for the future direction of international hu- manitarian law. Starting from the perspective of a synthesis of Actor-Network Theory (ANT) and Value-Sensitive-Design (VSD), we aim to analyse the discourse of LAWS and ask for pos- sibilities to implement Meaningful Human Control.},
booktitle = {{SCIENCE} {PEACE} {SECURITY} '19 - {Proceedings} of the {Interdisciplinary} {Conference} on {Technical} {Peace} and {Security} {Research}},
publisher = {TUprints},
author = {Schmid, Stefka and Riebe, Thea and Reuter, Christian},
editor = {Reuter, Christian and Altmann, Jürgen and Göttsche, Malte and Himmel, Mirko},
year = {2019},
keywords = {Peace, Student, Security, Projekt-DualUse},
pages = {196--200},
}
Publikationen in Konferenzbänden / Peer-reviewed Conference Papers
[BibTeX] [Abstract] [Download PDF]
The research field of crisis informatics examines the potentials and limitations of information and communication technology in crises, disasters, and emergencies. Although ICT plays an increasingly large role in crisis response and management, in-depth studies on crisis apps and similar technology in the context of an emergency have been missing. Based on responses by 1024 participants in Germany, we examine the diffusion, usage, perception and adoption of mobile crisis apps as well as required functions and improvements. We conclude that crisis apps are still a little-known form of disaster ICT, but have potential for enhancing communication, keeping users up to date and providing a more effective crisis management as supplement to other media channels dependent on different underlying infrastructures. However, they should be adaptable to user characteristics, consider privacy, allow communication and offer valuable information to raise awareness of potential disasters without creating an overload. Also, the familiarity with and trust in crisis apps should be addressed to maximize their beneficial impact on crisis communication and management. We discuss further implications as well as directions for future research with larger target groups and specific usage scenarios.
@inproceedings{grinko_adoption_2019,
address = {Hamburg, Germany},
title = {Adoption, {Use} and {Diffusion} of {Crisis} {Apps} in {Germany}: {A} {Representative} {Survey}},
url = {https://dl.acm.org/citation.cfm?id=3340782},
doi = {10.1145/3340764.3340782},
abstract = {The research field of crisis informatics examines the potentials and limitations of information and communication technology in crises, disasters, and emergencies. Although ICT plays an increasingly large role in crisis response and management, in-depth studies on crisis apps and similar technology in the context of an emergency have been missing. Based on responses by 1024 participants in Germany, we examine the diffusion, usage, perception and adoption of mobile crisis apps as well as required functions and improvements. We conclude that crisis apps are still a little-known form of disaster ICT, but have potential for enhancing communication, keeping users up to date and providing a more effective crisis management as supplement to other media channels dependent on different underlying infrastructures. However, they should be adaptable to user characteristics, consider privacy, allow communication and offer valuable information to raise awareness of potential disasters without creating an overload. Also, the familiarity with and trust in crisis apps should be addressed to maximize their beneficial impact on crisis communication and management. We discuss further implications as well as directions for future research with larger target groups and specific usage scenarios.},
booktitle = {Mensch und {Computer} - {Tagungsband}},
publisher = {ACM},
author = {Grinko, Margarita and Kaufhold, Marc-André and Reuter, Christian},
editor = {Alt, Florian and Bulling, Andreas and Döring, Tanja},
year = {2019},
keywords = {Student, UsableSec, Crisis, Projekt-KontiKat, Projekt-MAKI},
pages = {263--274},
}
[BibTeX] [Abstract] [Download PDF]
Digitalization, which proceeds in all branches, as well in agriculture, by using new technology, sensors and networking, requires responsible usage of data. One possibility to manage data and use them to create value is the blockchain-technology. It is primary enforced by the food industries and consumers to ensure traceability and transparency. To put blockchain-technology into beneficial use in agriculture, this domain has to be analyzed regarding social and business aspects. This paper presents the results of a qualitative study where 41 actors from the agricultural do-main participated in focus groups and delivered a written statement. It was found that farmers are interested in adapting new markets and technologies early to get an economic advantage. On the other hand, the fear of losing traditional local business partners and the social surroundings of the farmers must be considered
@inproceedings{linsner_blockchain_2019,
address = {Hamburg, Germany},
title = {Blockchain in der {Landwirtschaft} 4.0 - {Empirische} {Studie} zu {Erwartungen} von {Landwirt}\_innen gegenüber dezentralen {Services} auf {Basis} von {Distributed} {Ledger} {Technology}},
url = {https://dl.acm.org/citation.cfm?id=3340799},
doi = {10.1145/3340764.3340799},
abstract = {Digitalization, which proceeds in all branches, as well in agriculture, by using new technology, sensors and networking, requires responsible usage of data. One possibility to manage data and use them to create value is the blockchain-technology. It is primary enforced by the food industries and consumers to ensure traceability and transparency. To put blockchain-technology into beneficial use in agriculture, this domain has to be analyzed regarding social and business aspects. This paper presents the results of a qualitative study where 41 actors from the agricultural do-main participated in focus groups and delivered a written statement. It was found that farmers are interested in adapting new markets and technologies early to get an economic advantage. On the other hand, the fear of losing traditional local business partners and the social surroundings of the farmers must be considered},
booktitle = {Mensch und {Computer} - {Tagungsband}},
publisher = {ACM},
author = {Linsner, Sebastian and Kuntke, Franz and Schmidbauer-Wolf, Gina Maria and Reuter, Christian},
editor = {Alt, Florian and Bulling, Andreas and Döring, Tanja},
year = {2019},
keywords = {Projekt-GeoBox, HCI, Projekt-CROSSING, Projekt-CRISP, Projekt-MAKI, Projekt-HyServ, Cooperation},
pages = {103--113},
}
[BibTeX] [Abstract] [Download PDF]
With the increasing popularity of the smartphone, the number of people using it for financial transactions such as online shopping, online banking or mobile payment is also growing. Apps used in these contexts store sensitive and valuable data, creating a need for security measures. It has not yet been researched to what extent certain authentication mechanisms, which can be information-, biometric- as well as token-based, are suitable for individual apps and the respective data. The goal of this work is to assess how perceived security and estimated effort of using such mechanisms, as well as the degree to which app data is considered worth protecting, influence users‘ choices of appropriate measures to protect app categories. Therefore, we conducted a representative study (n=1024). On the one hand, our results show that a positive correlation between perceived security and effort exists for all investigated non-biometric authentication methods. On the other hand, the study sheds light on the differences between the investigated app categories and the users‘ choice of the appropriate security mechanisms for the particular category. In contrast to perceived security having a positive influence on a user’s preference of mechanism, a relation can hardly be identified for effort. Moreover, app data sensitivity does not seem relevant for the users‘ choice of security mechanism.
@inproceedings{reuter_between_2019,
address = {Hamburg, Germany},
title = {Between {Effort} and {Security}: {User} {Assessment} of the {Adequacy} of {Security} {Mechanisms} for {App} {Categories}},
url = {http://www.peasec.de/paper/2019/2019_ReuterHaeusserBienHerbert_EffortSecurity_MuC.pdf},
doi = {10.1145/3340764.3340770},
abstract = {With the increasing popularity of the smartphone, the number of people using it for financial transactions such as online shopping, online banking or mobile payment is also growing. Apps used in these contexts store sensitive and valuable data, creating a need for security measures. It has not yet been researched to what extent certain authentication mechanisms, which can be information-, biometric- as well as token-based, are suitable for individual apps and the respective data. The goal of this work is to assess how perceived security and estimated effort of using such mechanisms, as well as the degree to which app data is considered worth protecting, influence users' choices of appropriate measures to protect app categories. Therefore, we conducted a representative study (n=1024). On the one hand, our results show that a positive correlation between perceived security and effort exists for all investigated non-biometric authentication methods. On the other hand, the study sheds light on the differences between the investigated app categories and the users' choice of the appropriate security mechanisms for the particular category. In contrast to perceived security having a positive influence on a user's preference of mechanism, a relation can hardly be identified for effort. Moreover, app data sensitivity does not seem relevant for the users' choice of security mechanism.},
booktitle = {Mensch und {Computer} - {Tagungsband}},
publisher = {ACM},
author = {Reuter, Christian and Häusser, Katja and Bien, Mona and Herbert, Franziska},
editor = {Alt, Florian and Bulling, Andreas and Döring, Tanja},
year = {2019},
keywords = {Student, Security, UsableSec, HCI, Projekt-ATHENE-FANCY, Projekt-CROSSING, Projekt-CRISP},
pages = {287--297},
}
[BibTeX] [Abstract] [Download PDF]
The use of information technology (IT) in peace, conflict and security raises some questions, i.e. whether the use of IT can be limited exclusively to so-called advantageous purposes and applications and whether improper use can be prevented. This ambivalence is called a dual- use dilemma, meaning that objects, knowledge and technology can find both useful and harm- ful applications. Dual-use questions have been addressed in various disciplines, in particular in nuclear technology and the production of nuclear weapons, but also in chemistry and biology. In all these disciplines, dual-use topics in technical development and education have been discussed and addressed. Nevertheless, the importance of dual-use differs slightly, depending on the technology and its risks, as well as its distribution and application. Nuclear technology is less accessible than biotechnology, which in turn is less accessible than IT.
@inproceedings{riebe_accessing_2019,
address = {Darmstadt, Germany},
title = {Accessing {Dual} {Use} in {IT} {Development}},
url = {https://peasec.de/paper/2019/2019_RiebeReuter_AccessingDualUse_ProcSciencePeaceSecurity-TUprints.pdf},
abstract = {The use of information technology (IT) in peace, conflict and security raises some questions, i.e. whether the use of IT can be limited exclusively to so-called advantageous purposes and applications and whether improper use can be prevented. This ambivalence is called a dual- use dilemma, meaning that objects, knowledge and technology can find both useful and harm- ful applications. Dual-use questions have been addressed in various disciplines, in particular in nuclear technology and the production of nuclear weapons, but also in chemistry and biology. In all these disciplines, dual-use topics in technical development and education have been discussed and addressed. Nevertheless, the importance of dual-use differs slightly, depending on the technology and its risks, as well as its distribution and application. Nuclear technology is less accessible than biotechnology, which in turn is less accessible than IT.},
booktitle = {{SCIENCE} {PEACE} {SECURITY} '19 - {Proceedings} of the {Interdisciplinary} {Conference} on {Technical} {Peace} and {Security} {Research}},
publisher = {TUprints},
author = {Riebe, Thea and Reuter, Christian},
year = {2019},
keywords = {Peace, Projekt-DualUse},
pages = {46--49},
}
[BibTeX] [Abstract] [Download PDF]
In positive psychology, flow is described as a holistic mental condition in which an individual delves into an activity with full concentration. Even in software engineering, the promotion of flow experience fosters effects such as positive affect, improved learning, and higher product loyalty in computer-aided environments. However, from a practice-based perspective it is not obvious how to design ICT to support flow experience. With this paper, we, therefore, contribute concrete design implications, paving the way for a good flow experience in ICT. This paper be-gins by examining the current state of flow research in the field of Human-Computer Interaction. We then go on to present a study comprising the development and evaluation of design options that aim to support flow in integrated development environments such as Eclipse, one of the most prominent open-source IDEs. The findings reveal practical implications on the use of four flow design options for software engineering and are integrated into a preliminary research framework.
@inproceedings{kaufhold_flow_2019,
address = {Stockholm and Uppsala, Sweden},
title = {Flow {Experience} in {Software} {Engineering}: {Development} and {Evaluation} of {Design} {Options} for {Eclipse}},
isbn = {978-1-73363-250-8},
url = {https://aisel.aisnet.org/ecis2019_rip/17/},
abstract = {In positive psychology, flow is described as a holistic mental condition in which an individual delves into an activity with full concentration. Even in software engineering, the promotion of flow experience fosters effects such as positive affect, improved learning, and higher product loyalty in computer-aided environments. However, from a practice-based perspective it is not obvious how to design ICT to support flow experience. With this paper, we, therefore, contribute concrete design implications, paving the way for a good flow experience in ICT. This paper be-gins by examining the current state of flow research in the field of Human-Computer Interaction. We then go on to present a study comprising the development and evaluation of design options that aim to support flow in integrated development environments such as Eclipse, one of the most prominent open-source IDEs. The findings reveal practical implications on the use of four flow design options for software engineering and are integrated into a preliminary research framework.},
booktitle = {Proceedings of the {European} {Conference} on {Information} {Systems} ({ECIS})},
publisher = {AIS},
author = {Kaufhold, Marc-André and Reuter, Christian and Ludwig, Thomas},
year = {2019},
keywords = {Ranking-CORE-A, Projekt-KontiKat, Ranking-VHB-B, Ranking-WKWI-A},
}
[BibTeX] [Abstract] [Download PDF]
Input modalities generally as well as in cars are evolving quickly regarding their spread and reliability. One possible input technique is gaze interaction, a topic still being researched. What are the front seat passengers‘ feelings towards gaze interaction, are they comfortable using it and do they think it is necessary? A laboratory experiment was conducted with 13 student participants, using a driving simulator, eye tracker, lamp and a driving wheel. Qualitative data was collected during and after the experiment through observation and a semi-structured interview. Quantitative data was collected through questionnaires (ATI, CTAM, SUS). The results were that the usability of the system was high but participants did not feel well using it.
@inproceedings{schmidbauer-wolf_usability_2019,
address = {Hamburg, Germany},
title = {Usability and {UX} of a {Gaze} {Interaction} {Tool} for {Front} {Seat} {Passengers}: {Evaluation} of a {Gaze} {Controlled} {Optical} {Feedback} {System} in a {Car}},
url = {www.peasec.de/paper/2019/2019_SchmidbauerWolfGuder_UsabilityUXGazeInteractionTool.pdf},
doi = {10.1145/3340764.3344890},
abstract = {Input modalities generally as well as in cars are evolving quickly regarding their spread and reliability. One possible input technique is gaze interaction, a topic still being researched. What are the front seat passengers' feelings towards gaze interaction, are they comfortable using it and do they think it is necessary? A laboratory experiment was conducted with 13 student participants, using a driving simulator, eye tracker, lamp and a driving wheel. Qualitative data was collected during and after the experiment through observation and a semi-structured interview. Quantitative data was collected through questionnaires (ATI, CTAM, SUS). The results were that the usability of the system was high but participants did not feel well using it.},
booktitle = {{MuC}’19: {Proceedings} of {Mensch} und {Computer} 2019},
publisher = {Gesellschaft für Informatik e.V.},
author = {Schmidbauer-Wolf, Gina Maria and Guder, Markus},
year = {2019},
keywords = {Student, HCI},
pages = {677--681},
}
[BibTeX] [Abstract] [Download PDF]
People use social media in various ways including looking for or sharing information during crises or emergencies (e.g. floods, storms, terrorist attacks). Few studies have focused on European citizens‘ perceptions, and just one has deployed a representative sample to examine this. This article presents the results of one of the first representative studies on this topic conducted in the United Kingdom. The study shows that around a third (34\%) have used social media during an emergency and that such use is more widespread among younger people. In contrast, the main reasons for not using social media in an emergency include technological concerns and that the trustworthiness of social media content is doubtful. However, there is a growing trend towards increased use. The article deduces and explores implications of these findings, including problems potentially arising with more citizens sharing information on social media during emergencies and expecting a response.
@inproceedings{spielhofer_social_2019,
address = {València, Spain},
title = {Social {Media} {Use} in {Emergencies} of {Citizens} in the {United} {Kingdom}},
url = {http://www.peasec.de/paper/2019/2019_SpielhoferHahneReuterKaufholdSchmid_SocialMediaCrisesUK_ISCRAM.pdf},
abstract = {People use social media in various ways including looking for or sharing information during crises or emergencies (e.g. floods, storms, terrorist attacks). Few studies have focused on European citizens' perceptions, and just one has deployed a representative sample to examine this. This article presents the results of one of the first representative studies on this topic conducted in the United Kingdom. The study shows that around a third (34\%) have used social media during an emergency and that such use is more widespread among younger people. In contrast, the main reasons for not using social media in an emergency include technological concerns and that the trustworthiness of social media content is doubtful. However, there is a growing trend towards increased use. The article deduces and explores implications of these findings, including problems potentially arising with more citizens sharing information on social media during emergencies and expecting a response.},
booktitle = {Proceedings of the {Information} {Systems} for {Crisis} {Response} and {Management} ({ISCRAM})},
publisher = {ISCRAM Association},
author = {Spielhofer, Thomas and Hahne, Anna Sophie and Reuter, Christian and Kaufhold, Marc-André and Schmid, Stefka},
editor = {Franco, Zeno and González, José J. and Canós, José H.},
year = {2019},
keywords = {Crisis, HCI, SocialMedia, Projekt-KontiKat, Cooperation, Projekt-EmerGent},
}
[BibTeX] [Abstract] [Download PDF]
Technological and scientific progress, especially the rapid development in information technology (IT), plays a crucial role regarding questions of peace and security. This short overview addresses the significance, potentials and challenges of IT for peace and security. For this purpose, the talk offers an introduction to peace, conflict, and security research, thereby focusing on natural science, technical and computer science perspectives. In the following, it sheds light on fundamentals (e.g. IT in peace, conflict and security, natural science/ technical peace research), cyber conflicts and war (e.g. information warfare, cyber espionage, cyber defence, Darknet), cyber peace (e.g. dual-use, technology assessment, confidence and security building measures), cyber arms control (e.g. arms control in the cyberspace, unmanned systems, verification), cyber attribution and infrastructures (e.g. attribution of cyber-attacks, resilient infrastructures, secure critical information infrastructures), culture and interaction (e.g. safety and security, cultural violence, social media), before an outlook is given.
@inproceedings{reuter_information_2019-2,
address = {Darmstadt, Germany},
title = {Information {Technology} for {Peace} and {Security} – {An} {Emerging} {Research} {Field}},
url = {www.peasec.de/paper/2019/2019_Reuter_ITPeaceSecurityEmergingField_ProcSciencePeaceSecurity-TUprints.pdf},
abstract = {Technological and scientific progress, especially the rapid development in information technology (IT), plays a crucial role regarding questions of peace and security. This short overview addresses the significance, potentials and challenges of IT for peace and security. For this purpose, the talk offers an introduction to peace, conflict, and security research, thereby focusing on natural science, technical and computer science perspectives. In the following, it sheds light on fundamentals (e.g. IT in peace, conflict and security, natural science/ technical peace research), cyber conflicts and war (e.g. information warfare, cyber espionage, cyber defence, Darknet), cyber peace (e.g. dual-use, technology assessment, confidence and security building measures), cyber arms control (e.g. arms control in the cyberspace, unmanned systems, verification), cyber attribution and infrastructures (e.g. attribution of cyber-attacks, resilient infrastructures, secure critical information infrastructures), culture and interaction (e.g. safety and security, cultural violence, social media), before an outlook is given.},
booktitle = {{SCIENCE} {PEACE} {SECURITY} '19 - {Proceedings} of the {Interdisciplinary} {Conference} on {Technical} {Peace} and {Security} {Research}},
publisher = {TUprints},
author = {Reuter, Christian},
editor = {Reuter, Christian and Altmann, Jürgen and Göttsche, Malte and Himmel, Mirko},
year = {2019},
keywords = {Security, UsableSec, HCI, Projekt-ATHENE-FANCY, Projekt-CRISP},
pages = {18--20},
}
[BibTeX] [Abstract] [Download PDF]
Currently, there is a tremendous number of communication technology and tems in use. Not only in the private user space, but also in business operations and societal areas, they are deeply involved: Ranging from messaging services or navigation over (critical) SCADA systems to whole digital cities and communities. Consequently, the view on communication networks in security and particularly crisis scenarios becomes inevitable. This paper examines the notions of resilience, adaption and transition within communication networks with a specific focus on crises. Based on a structured literature review, the fundamentals of resilience and communication networks are introduced. The paper then discusses the characteristics of (a) evolvability, accessibility, usability and diversity as well as (b) self-organization, -management, -optimization, – monitoring, -healing and -protection for communication network resilience. Finally, it outlines challenges and potentials of communication network resilience based in the use cases of security and crises.
@inproceedings{kalle_resilience_2019,
address = {Kassel, Germany},
title = {Resilience in {Security} and {Crises} through {Adaptions} and {Transitions}},
url = {https://dl.gi.de/bitstream/handle/20.500.12116/25097/paper12_02.pdf},
doi = {10.18420/inf2019_ws60},
abstract = {Currently, there is a tremendous number of communication technology and tems in use. Not only in the private user space, but also in business operations and societal areas, they are deeply involved: Ranging from messaging services or navigation over (critical) SCADA systems to whole digital cities and communities. Consequently, the view on communication networks in security and particularly crisis scenarios becomes inevitable. This paper examines the notions of resilience, adaption and transition within communication networks with a specific focus on crises. Based on a structured literature review, the fundamentals of resilience and communication networks are introduced. The paper then discusses the characteristics of (a) evolvability, accessibility, usability and diversity as well as (b) self-organization, -management, -optimization, - monitoring, -healing and -protection for communication network resilience. Finally, it outlines challenges and potentials of communication network resilience based in the use cases of security and crises.},
booktitle = {{INFORMATIK} 2019: 50 {Jahre} {Gesellschaft} für {Informatik} – {Informatik} für {Gesellschaft} ({Workshop}-{Beiträge}), {Lecture} {Notes} in {Informatics} ({LNI})},
publisher = {Gesellschaft für Informatik e. V.},
author = {Kalle, Timo and Kaufhold, Marc-André and Kuntke, Franz and Reuter, Christian and Rizk, Amr and Steinmetz, Ralf},
editor = {Draude, C. and Lange, M. and Sick, B.},
year = {2019},
keywords = {Student, Projekt-GeoBox, Security, UsableSec, Crisis, HCI, Projekt-MAKI, Ranking-CORE-C, Ranking-VHB-C},
pages = {571--584},
}
[BibTeX] [Abstract] [Download PDF]
Over the last decade, social media established an enormous impact on modern culture not only for everyday life uses, but also during natural and man-made crises and conflicts. For instance, Facebook was part of the Arabic Spring, in which the tool facilitated the communication and interaction between participants of political protests. However, social media is not only used for good purposes and offers potentials for misuse: fake news manipulate public discourses, cyber terrorism aims to recruit new members and disseminate ideologies, and social bots in- fluence economic as well as political processes. Based on the notions of cultural violence and cultural peace as well as the phenomena of fake news, terrorism, and social bots, this paper outlines countermeasures to facilitate cultural peace and security.
@inproceedings{kaufhold_social_2019,
address = {Darmstadt, Germany},
title = {Social {Media} {Misuse}: {Cultural} {Violence}, {Peace} and {Security} in {Digital} {Networks}},
url = {https://tuprints.ulb.tu-darmstadt.de/id/eprint/9164},
abstract = {Over the last decade, social media established an enormous impact on modern culture not only for everyday life uses, but also during natural and man-made crises and conflicts. For instance, Facebook was part of the Arabic Spring, in which the tool facilitated the communication and interaction between participants of political protests. However, social media is not only used for good purposes and offers potentials for misuse: fake news manipulate public discourses, cyber terrorism aims to recruit new members and disseminate ideologies, and social bots in- fluence economic as well as political processes. Based on the notions of cultural violence and cultural peace as well as the phenomena of fake news, terrorism, and social bots, this paper outlines countermeasures to facilitate cultural peace and security.},
booktitle = {{SCIENCE} {PEACE} {SECURITY} '19 - {Proceedings} of the {Interdisciplinary} {Conference} on {Technical} {Peace} and {Security} {Research}},
publisher = {TUprints},
author = {Kaufhold, Marc-André and Reuter, Christian},
editor = {Reuter, Christian and Altmann, Jürgen and Göttsche, Malte and Himmel, Mirko},
year = {2019},
keywords = {Peace, Crisis, SocialMedia},
pages = {61--66},
}
[BibTeX] [Abstract] [Download PDF]
Resilienz ist in aller Munde. Die vorliegende Arbeit setzt sich mit der Ausfall- und Angriffssicherheit der Landwirtschaft als zentraler Bestandteil der Ernährungswirtschaft im digitalen Zeitalter kritisch auseinander. Dabei geht es nicht um die Frage, ob Smart Farming in der landwirtschaftlichen Praxis sinnvoll ist, sondern ob deren Infrastruktur den Anforderungen einer ausfallsicheren (resilienten) Infrastruktur gerecht wird. Da die Ernährungswirtschaft ein Teil der kritischen Infrastruktur ist, ist deren Analyse in Hinsicht auf mögliche Angriffspotenziale und auf Ausfallsicherheit von gesellschaftlicher Relevanz. Wir schlagen Resilient Smart Farming (RSF) zur Nutzung digitaler Technologien in krisensicherer Infrastruktur vor.
@inproceedings{reuter_resilient_2019,
address = {Vienna, Austria},
title = {Resilient {Smart} {Farming} ({RSF}) – {Nutzung} digitaler {Technologien} in krisensicherer {Infrastruktur}},
url = {http://gil-net.de/Publikationen/139_177.pdf},
abstract = {Resilienz ist in aller Munde. Die vorliegende Arbeit setzt sich mit der Ausfall- und Angriffssicherheit der Landwirtschaft als zentraler Bestandteil der Ernährungswirtschaft im digitalen Zeitalter kritisch auseinander. Dabei geht es nicht um die Frage, ob Smart Farming in der landwirtschaftlichen Praxis sinnvoll ist, sondern ob deren Infrastruktur den Anforderungen einer ausfallsicheren (resilienten) Infrastruktur gerecht wird. Da die Ernährungswirtschaft ein Teil der kritischen Infrastruktur ist, ist deren Analyse in Hinsicht auf mögliche Angriffspotenziale und auf Ausfallsicherheit von gesellschaftlicher Relevanz. Wir schlagen Resilient Smart Farming (RSF) zur Nutzung digitaler Technologien in krisensicherer Infrastruktur vor.},
booktitle = {39. {GIL}-{Jahrestagung}: {Informatik} in der {Land}-, {Forst}- und {Ernährungswirtschaft} {Fokus}; {Digitalisierung} für landwirtschaftliche {Betriebe} in kleinstrukturierten {Regionen} – ein {Widerspruch} in sich?, {Lecture} {Notes} in {Informatics} ({LNI})},
publisher = {Gesellschaft für Informatik},
author = {Reuter, Christian and Schneider, Wolfgang and Eberz, Daniel},
editor = {Meyer-Aurich, A.},
year = {2019},
keywords = {Projekt-GeoBox, RSF, Crisis, Infrastructure, Projekt-HyServ, Ranking-CORE-C, Ranking-VHB-C},
pages = {177--182},
}
[BibTeX] [Abstract] [Download PDF]
Finding a responsible way to address fake news on social media has become an urgent matter both in political and social contexts. Existing studies focus mainly on how to detect and label fake news. However, approaches to assist users in making their own assessments are largely missing. In this article we present a study on how an indicator-based white-box approach can support Twitter-users in assessing tweets. In a first step, we identified indicators for fake news that have shown to be promising in previous studies and that are suitable for our idea of a white-box approach. Building on that basis of indicators we then designed and implemented the browser-plugin TrustyTweet, which aims to assist users on Twitter in assessing tweets by showing politically neutral and intuitive warnings without creating reactance. Finally, we present the findings of our evaluations carried out with a total of 27 participants, which result in further design implications for approaches to assist users in dealing with fake news.
@inproceedings{hartwig_fighting_2019,
address = {Darmstadt, Germany},
title = {Fighting {Misinformation} on {Twitter}: {The} {Plugin} based approach {TrustyTweet}},
url = {https://tuprints.ulb.tu-darmstadt.de/id/eprint/9164},
abstract = {Finding a responsible way to address fake news on social media has become an urgent matter both in political and social contexts. Existing studies focus mainly on how to detect and label fake news. However, approaches to assist users in making their own assessments are largely missing. In this article we present a study on how an indicator-based white-box approach can support Twitter-users in assessing tweets. In a first step, we identified indicators for fake news that have shown to be promising in previous studies and that are suitable for our idea of a white-box approach. Building on that basis of indicators we then designed and implemented the browser-plugin TrustyTweet, which aims to assist users on Twitter in assessing tweets by showing politically neutral and intuitive warnings without creating reactance. Finally, we present the findings of our evaluations carried out with a total of 27 participants, which result in further design implications for approaches to assist users in dealing with fake news.},
booktitle = {{SCIENCE} {PEACE} {SECURITY} '19 - {Proceedings} of the {Interdisciplinary} {Conference} on {Technical} {Peace} and {Security} {Research}},
publisher = {TUprints},
author = {Hartwig, Katrin and Reuter, Christian},
editor = {Reuter, Christian and Altmann, Jürgen and Göttsche, Malte and Himmel, Mirko},
year = {2019},
keywords = {Peace, Crisis, HCI, SocialMedia},
pages = {67--69},
}
[BibTeX] [Abstract] [Download PDF]
Attribution consists of technical, legal and politically defined processes. However, the interna- tional community has not yet defined processes unilaterally, even though the UN GGE has proposed to address the increase of cyber operations. Taking existing threat exchange stand- ards into account, this paper presents an approach to support efforts for more effective attrib- ution by developing a platform with the common open source threat exchange formats STIX and MEAC. Furthermore, the platform is evaluated in terms of usability.
@inproceedings{riebe_threat_2019,
address = {Darmstadt, Germany},
title = {Threat {Intelligence} {Application} for {Cyber} {Attribution}},
url = {https://tuprints.ulb.tu-darmstadt.de/id/eprint/9164},
abstract = {Attribution consists of technical, legal and politically defined processes. However, the interna- tional community has not yet defined processes unilaterally, even though the UN GGE has proposed to address the increase of cyber operations. Taking existing threat exchange stand- ards into account, this paper presents an approach to support efforts for more effective attrib- ution by developing a platform with the common open source threat exchange formats STIX and MEAC. Furthermore, the platform is evaluated in terms of usability.},
booktitle = {{SCIENCE} {PEACE} {SECURITY} '19 - {Proceedings} of the {Interdisciplinary} {Conference} on {Technical} {Peace} and {Security} {Research}},
publisher = {TUprints},
author = {Riebe, Thea and Kaufhold, Marc-André and Kumar, Tarun and Reinhold, Thomas and Reuter, Christian},
editor = {Reuter, Christian and Altmann, Jürgen and Göttsche, Malte and Himmel, Mirko},
year = {2019},
keywords = {Peace, Student, Security, Projekt-DualUse},
pages = {56--60},
}
[BibTeX] [Abstract] [Download PDF]
Smart cities want to provide a better life to their citizens, e.g. regarding health care, infrastruc- ture, better safety and security. This can be achieved by using more and new technology and by interconnecting and analysing new and existent devices. Thus, public spaces and buildings will be equipped with more interconnected input and output modalities. This ongoing technolo- gization of public spaces creates opportunities for making everyone’s life more secure, while at the same time everyone’s personal privacy is endangered. So how is this balancing act tackled and dealt with right now? What fears do citizens have regarding their security as well as their privacy? This paper provides first insights into the topic privacy in smart cities regarding that smart cities need data which can be provided by and of people. The paper raises the question if collecting people’s data, and thus enabling smart cities, is ethical and if not, how it can be assured to be ethical.
@inproceedings{schmidbauer-wolf_responsible_2019,
address = {Darmstadt, Germany},
title = {Responsible {Data} {Usage} in {Smart} {Cities}: {Privacy} in {Everyday} {Life} vs. {Reacting} to {Emergency} {Situations}},
url = {https://tuprints.ulb.tu-darmstadt.de/id/eprint/9164},
abstract = {Smart cities want to provide a better life to their citizens, e.g. regarding health care, infrastruc- ture, better safety and security. This can be achieved by using more and new technology and by interconnecting and analysing new and existent devices. Thus, public spaces and buildings will be equipped with more interconnected input and output modalities. This ongoing technolo- gization of public spaces creates opportunities for making everyone's life more secure, while at the same time everyone's personal privacy is endangered. So how is this balancing act tackled and dealt with right now? What fears do citizens have regarding their security as well as their privacy? This paper provides first insights into the topic privacy in smart cities regarding that smart cities need data which can be provided by and of people. The paper raises the question if collecting people's data, and thus enabling smart cities, is ethical and if not, how it can be assured to be ethical.},
booktitle = {{SCIENCE} {PEACE} {SECURITY} '19 - {Proceedings} of the {Interdisciplinary} {Conference} on {Technical} {Peace} and {Security} {Research}},
publisher = {TUprints},
author = {Schmidbauer-Wolf, Gina Maria and Herbert, Franziska and Reuter, Christian},
editor = {Reuter, Christian and Altmann, Jürgen and Göttsche, Malte and Himmel, Mirko},
year = {2019},
keywords = {Security, UsableSec, HCI, Projekt-ATHENE-FANCY, Projekt-CRISP},
pages = {70--74},
}
[BibTeX] [Abstract] [Download PDF]
Die Digitalisierung verspricht auch in der zivilen Gefahrenabwehr Vorteile z.B. in Form von schneller Lagebilderstellung, höherer Informationsqualität von Entscheidungsgrundlagen, effizienter Einsatz-vorbereitung und Interaktion mit der Öffentlichkeit. Der Workshop IT-Rettung bietet Raum, Forschungserkenntnisse zu präsentieren und zu würdigen sowie fallstudien- und szenarien-orientierte Ergebnisse in einen allgemeinen Kontext einzuordnen
@inproceedings{pottebaum_it-rettung_2019,
address = {Kassel, Germany},
title = {{IT}-{Rettung} 2019: {IT}-{Unterstützung} in {Emergency} {Management} \& {Response}},
url = {http://www.peasec.de/paper/2019/2019_PottebaumErfurthReuter_IT-Rettung.pdf},
doi = {10.18420/inf2019_ws58},
abstract = {Die Digitalisierung verspricht auch in der zivilen Gefahrenabwehr Vorteile z.B. in Form von schneller Lagebilderstellung, höherer Informationsqualität von Entscheidungsgrundlagen, effizienter Einsatz-vorbereitung und Interaktion mit der Öffentlichkeit. Der Workshop IT-Rettung bietet Raum, Forschungserkenntnisse zu präsentieren und zu würdigen sowie fallstudien- und szenarien-orientierte Ergebnisse in einen allgemeinen Kontext einzuordnen},
booktitle = {{INFORMATIK} 2019: 50 {Jahre} {Gesellschaft} für {Informatik} – {Informatik} für {Gesellschaft} ({Workshop}-{Beiträge}), {Lecture} {Notes} in {Informatics} ({LNI})},
publisher = {Gesellschaft für Informatik},
author = {Pottebaum, Jens and Erfurth, Christian and Reuter, Christian},
editor = {Draude, C. and Lange, M. and Sick, B.},
year = {2019},
keywords = {Crisis, Ranking-CORE-C, Ranking-VHB-C},
pages = {557--557},
}
[BibTeX] [Abstract] [Download PDF]
The Internet of Things (IoT) has a significant impact on agriculture. So-called Smart Farming uses drones and a variety of sensors to measure climate, irrigation, soil moisture or GPS position. With this rapid influx of technology increases the threat that vulnerabilities in those technologies are being exploited for malicious intent. To show the impact of cyberattacks on agriculture, we present a simulation of several attacks on a ZigBee-based wireless sensor network. We conduct a delay attack, an interference attack and three different routing attacks (sinkhole, blackhole and selective forwarding attack). Those attacks are simulated using NETA with the OMNET++ framework. We will show that the security of WSN is influenced by factors like energy consumption or computation power, which can conflict with other interests like low per-unit costs.
@inproceedings{linsner_vulnerability_2019,
address = {Wien, Austria},
title = {Vulnerability {Assessment} in the {Smart} {Farming} {Infrastructure} through {Cyberattacks}},
url = {http://gil-net.de/Publikationen/139_119.pdf},
abstract = {The Internet of Things (IoT) has a significant impact on agriculture. So-called Smart Farming uses drones and a variety of sensors to measure climate, irrigation, soil moisture or GPS position. With this rapid influx of technology increases the threat that vulnerabilities in those technologies are being exploited for malicious intent. To show the impact of cyberattacks on agriculture, we present a simulation of several attacks on a ZigBee-based wireless sensor network. We conduct a delay attack, an interference attack and three different routing attacks (sinkhole, blackhole and selective forwarding attack). Those attacks are simulated using NETA with the OMNET++ framework. We will show that the security of WSN is influenced by factors like energy consumption or computation power, which can conflict with other interests like low per-unit costs.},
booktitle = {39. {GIL}-{Jahrestagung}: {Informatik} in der {Land}-, {Forst}- und {Ernährungswirtschaft} {Fokus}; {Digitalisierung} für landwirtschaftliche {Betriebe} in kleinstrukturierten {Regionen} – ein {Widerspruch} in sich?, {Lecture} {Notes} in {Informatics} ({LNI})},
publisher = {Gesellschaft für Informatik},
author = {Linsner, Sebastian and Varma, Rashmi and Reuter, Christian},
editor = {Meyer-Aurich, A.},
year = {2019},
keywords = {Student, Projekt-GeoBox, RSF, Security, Projekt-CROSSING, Infrastructure, Projekt-HyServ, Ranking-CORE-C, Ranking-VHB-C},
pages = {119--124},
}
[BibTeX] [Abstract] [Download PDF]
Social media is used during crises and disasters by state authorities and citizens to communicate and provide, gain and analyze information. Monitoring of platforms in such cases is both a well-established practice and a research area. The question, whether people are willing to renounce privacy in social media during critical incidents, or even allow surveillance in order to contribute to public security, remains unanswered. Our survey of 1,024 German inhabitants is the first empirical study on people’s views on social media monitoring and surveillance in crisis management. We find the willingness to share data during an imminent threat depends mostly on the type of data: a majority (63\% and 67\%, respectively) would give access to addresses and telephone numbers, whereas the willingness to share content of chats or telephone calls is significantly lower (27\%). Our analysis reveals diverging opinions among participants and some effects of sociodemographic variables on the acceptance of invasions into privacy.
@inproceedings{aldehoff_renouncing_2019,
address = {València, Spain},
title = {Renouncing {Privacy} in {Crisis} {Management}? {People}'s {View} on {Social} {Media} {Monitoring} and {Surveillance}},
url = {http://www.peasec.de/paper/2019/2019_AldehoffDankenbringReuter_RenouncingPrivacyCrisisManagement_ISCRAM.pdf},
abstract = {Social media is used during crises and disasters by state authorities and citizens to communicate and provide, gain and analyze information. Monitoring of platforms in such cases is both a well-established practice and a research area. The question, whether people are willing to renounce privacy in social media during critical incidents, or even allow surveillance in order to contribute to public security, remains unanswered. Our survey of 1,024 German inhabitants is the first empirical study on people's views on social media monitoring and surveillance in crisis management. We find the willingness to share data during an imminent threat depends mostly on the type of data: a majority (63\% and 67\%, respectively) would give access to addresses and telephone numbers, whereas the willingness to share content of chats or telephone calls is significantly lower (27\%). Our analysis reveals diverging opinions among participants and some effects of sociodemographic variables on the acceptance of invasions into privacy.},
booktitle = {Proceedings of the {Information} {Systems} for {Crisis} {Response} and {Management} ({ISCRAM})},
publisher = {ISCRAM Association},
author = {Aldehoff, Larissa and Dankenbring, Meri and Reuter, Christian},
editor = {Franco, Zeno and González, José J. and Canós, José H.},
year = {2019},
keywords = {Peace, Student, Security, UsableSec, Crisis, Projekt-ATHENE-FANCY, Projekt-CROSSING, SocialMedia, Projekt-DualUse, Projekt-CRISP},
pages = {1184--1197},
}
[BibTeX] [Abstract] [Download PDF]
With the increase of terrorist attacks and spreading extremism worldwide, countermeasures advance as well. Often social media is used for recruitment and radicalization of susceptible target groups. Counter narratives are trying to disclose the illusion created by radical and extremist groups through a purposive and educational counter statement, and to initiate a rethinking in the affected individuals via thought-provoking impulses and advice. This exploratory study investigates counter narrative campaigns with regard to their fight and prevention against terrorism in social media. Posts with strong emotions and a personal reference to affected individuals achieved the highest impact and most reactions from the target group. Furthermore, our results illustrate that the impact of a counter narrative campaign cannot be measured solely according to the reaction rate to their postings and that further analysis steps are therefore necessary for the final evaluation of the campaigns.
@inproceedings{langer_counter_2019,
address = {València, Spain},
title = {Counter {Narratives} in {Social} {Media}: {An} {Empirical} {Study} on {Combat} and {Prevention} of {Terrorism}},
url = {http://www.peasec.de/paper/2019/2019_Langeretal_Counternarratives_ISCRAM.pdf},
abstract = {With the increase of terrorist attacks and spreading extremism worldwide, countermeasures advance as well. Often social media is used for recruitment and radicalization of susceptible target groups. Counter narratives are trying to disclose the illusion created by radical and extremist groups through a purposive and educational counter statement, and to initiate a rethinking in the affected individuals via thought-provoking impulses and advice. This exploratory study investigates counter narrative campaigns with regard to their fight and prevention against terrorism in social media. Posts with strong emotions and a personal reference to affected individuals achieved the highest impact and most reactions from the target group. Furthermore, our results illustrate that the impact of a counter narrative campaign cannot be measured solely according to the reaction rate to their postings and that further analysis steps are therefore necessary for the final evaluation of the campaigns.},
booktitle = {Proceedings of the {Information} {Systems} for {Crisis} {Response} and {Management} ({ISCRAM})},
publisher = {ISCRAM Association},
author = {Langer, Amanda and Kaufhold, Marc-André and Runft, Elena and Reuter, Christian and Grinko, Margarita and Pipek, Volkmar},
editor = {Franco, Zeno and González, José J. and Canós, José H.},
year = {2019},
keywords = {Peace, Student, Crisis, SocialMedia, Projekt-KontiKat},
pages = {746--755},
}
[BibTeX] [Abstract] [Download PDF]
Bereits während des Hochwassers in Mitteleuropa 2013 und der Flüchtlingskrise in Europa ab 2015 wurde deutlich, dass freiwillige HelferInnen die Bewältigung von Krisensituationen unterstützen. Durch die vermehrte Koordination der Helfenden, auch unter Ein- satz sozialer Medien, kommt es zunehmend zu Konflikten zwi- schen den teilweise kollidierenden Erwartungshaltungen periodi- sierter Werte der eingebundenen Akteure. Die Entwicklung von Kollaborationswerkzeugen mit Hilfe der Methode des Value-Sen- sitive Designs kann bereits im Vorfeld solche Konflikte aufzeigen und gezielt verhindern oder moderieren. Dazu wurde in einer Fall- studie anhand des Hochwassers 2013 induktiv abgeleitet, welche Werte und Erwartungen die unterschiedlichen Stakeholder haben, und welche Konflikte sich daraus im Hinblick auf die Anforderun- gen ergeben. Diese Studie zeigt insbesondere die Konfliktpotenzi- ale für freiwillige HelferInnen in sozialen Medien in Bezug auf den Schutz der Privatsphäre und vor Diskriminierung auf und leistet damit einen Beitrag für die Konflikt-Optimierung und Akzeptanz- steigerung des Einsatzes sozialer Medien im Katastrophenschutz.
@inproceedings{riebe_werte_2019,
address = {Hamburg, Germany},
title = {Werte und {Wertekonflikte} in sozialen {Medien} für die {Vernetzung} ungebundener {Helfer} in {Krisensituationen} – {Ein} {Value}-{Sensitive} {Design} {Ansatz}},
url = {https://dl.gi.de/bitstream/handle/20.500.12116/25150/133-05.pdf},
doi = {10.18420/muc2019-ws-133-05},
abstract = {Bereits während des Hochwassers in Mitteleuropa 2013 und der Flüchtlingskrise in Europa ab 2015 wurde deutlich, dass freiwillige HelferInnen die Bewältigung von Krisensituationen unterstützen. Durch die vermehrte Koordination der Helfenden, auch unter Ein- satz sozialer Medien, kommt es zunehmend zu Konflikten zwi- schen den teilweise kollidierenden Erwartungshaltungen periodi- sierter Werte der eingebundenen Akteure. Die Entwicklung von Kollaborationswerkzeugen mit Hilfe der Methode des Value-Sen- sitive Designs kann bereits im Vorfeld solche Konflikte aufzeigen und gezielt verhindern oder moderieren. Dazu wurde in einer Fall- studie anhand des Hochwassers 2013 induktiv abgeleitet, welche Werte und Erwartungen die unterschiedlichen Stakeholder haben, und welche Konflikte sich daraus im Hinblick auf die Anforderun- gen ergeben. Diese Studie zeigt insbesondere die Konfliktpotenzi- ale für freiwillige HelferInnen in sozialen Medien in Bezug auf den Schutz der Privatsphäre und vor Diskriminierung auf und leistet damit einen Beitrag für die Konflikt-Optimierung und Akzeptanz- steigerung des Einsatzes sozialer Medien im Katastrophenschutz.},
booktitle = {Mensch und {Computer} 2019 - {Workshopband}},
publisher = {Gesellschaft für Informatik e.V.},
author = {Riebe, Thea and Langer, Amanda and Kaufhold, Marc-André and Kretschmer, Nina Katharina and Reuter, Christian},
year = {2019},
keywords = {Peace, Student, Security, Crisis, SocialMedia, Projekt-DualUse, Projekt-KontiKat},
pages = {308--318},
}
[BibTeX] [Abstract] [Download PDF]
Das Forschungsfeld Social Media Analytics untersucht Methoden zur Analyse sozialer Medien nicht nur für Bürger und Unternehmen, sondern auch für Einsatzkräfte in Notsituationen. Zur Unterstützung des Situationsbewusstseins in derartigen Lagen werden unter anderem soziale Netzwerkanalysen angewandt, um Handlungen und die Vernetzung von Helfern nachzuvollziehen, sowie Stimmungsanalysen, um Emotionen der nutzergenerierten Inhalte zu extrahieren. Unsere Literaturstudie zeigt allerdings, dass keine technischen Ansätze existieren, die Netzwerk- und Stimmungsanalysen kombinieren. Dieser Beitrag stellt das Design und die Implementierung einer solchen Web- Anwendung auf Basis von Twitter vor, um anschließend Potenziale und Herausforderungen für die Evaluation und Weiterentwicklung des Ansatzes zu diskutieren.
@inproceedings{kaufhold_sentinet_2019,
address = {Hamburg, Germany},
title = {{SentiNet}: {Twitter}-basierter {Ansatz} zur kombinierten {Netzwerk}- und {Stimmungsanalyse} in {Katastrophenlagen}},
url = {https://dl.gi.de/bitstream/handle/20.500.12116/25149/133-04.pdf},
doi = {10.18420/muc2019-ws-133-04},
abstract = {Das Forschungsfeld Social Media Analytics untersucht Methoden zur Analyse sozialer Medien nicht nur für Bürger und Unternehmen, sondern auch für Einsatzkräfte in Notsituationen. Zur Unterstützung des Situationsbewusstseins in derartigen Lagen werden unter anderem soziale Netzwerkanalysen angewandt, um Handlungen und die Vernetzung von Helfern nachzuvollziehen, sowie Stimmungsanalysen, um Emotionen der nutzergenerierten Inhalte zu extrahieren. Unsere Literaturstudie zeigt allerdings, dass keine technischen Ansätze existieren, die Netzwerk- und Stimmungsanalysen kombinieren. Dieser Beitrag stellt das Design und die Implementierung einer solchen Web- Anwendung auf Basis von Twitter vor, um anschließend Potenziale und Herausforderungen für die Evaluation und Weiterentwicklung des Ansatzes zu diskutieren.},
booktitle = {Mensch und {Computer} 2019 - {Workshopband}},
publisher = {Gesellschaft für Informatik e.V.},
author = {Kaufhold, Marc-André and Schmidt, Arne and Seifert, Fabienne and Riebe, Thea and Reuter, Christian},
year = {2019},
keywords = {Crisis, SocialMedia, Projekt-KontiKat},
pages = {297--308},
}
[BibTeX] [Abstract] [Download PDF]
Wie werden eigene private Daten geschützt? Um dieser Frage nachzugehen, wurde in einer qualitativen Studie mit sechs Informatikabsolvent_innen erfragt, wie diese die Privatheit ihrer Daten schützen. Das Ziel der teilstrukturierten Inter- views war es einen möglichst breiten Überblick über tatsäch- lich verwendete Techniken und Technologien zum Schutz der privaten Daten zu gewinnen. Während sich die Vermu- tung bestätigte, dass alle Teilnehmer_innen ein Bewusstsein für die Brisanz ihrer privaten Daten hatten, unterschieden sich die Definitionen ebendieser privaten Daten sowie das Verhalten, um diese zu schützen. Es konnte beobachtet wer- den, dass viel Wissen in diesem Bereich nicht zwangsläufig zu einem vorsichtigeren Handeln führt. Mögliche genannte Strategien zum Schutz der eigenen Daten sind: Informiert bleiben, Datensparsamkeit, Vermeidung der Produkte be- stimmter Konzerne sowie Resignation. Als Motivation für das jeweilige Verhalten wurden sowohl politische, philoso- phische, utilitaristische, als auch angstgetriebene Gründe genannt. Letztere können in Angst vor Diebstahl und Angst vor Andersbehandlung unterschieden werden.
@inproceedings{schmidbauer-wolf_kampf_2019,
address = {Hamburg, Germany},
title = {Ein {Kampf} gegen {Windmühlen}: qualitative {Studie} über {Informatikabsolvent}\_innen und ihre {Datenprivatheit}},
url = {https://dl.gi.de/bitstream/handle/20.500.12116/25168/302-06.pdf},
doi = {10.18420/muc2019-ws-302-06},
abstract = {Wie werden eigene private Daten geschützt? Um dieser Frage nachzugehen, wurde in einer qualitativen Studie mit sechs Informatikabsolvent\_innen erfragt, wie diese die Privatheit ihrer Daten schützen. Das Ziel der teilstrukturierten Inter- views war es einen möglichst breiten Überblick über tatsäch- lich verwendete Techniken und Technologien zum Schutz der privaten Daten zu gewinnen. Während sich die Vermu- tung bestätigte, dass alle Teilnehmer\_innen ein Bewusstsein für die Brisanz ihrer privaten Daten hatten, unterschieden sich die Definitionen ebendieser privaten Daten sowie das Verhalten, um diese zu schützen. Es konnte beobachtet wer- den, dass viel Wissen in diesem Bereich nicht zwangsläufig zu einem vorsichtigeren Handeln führt. Mögliche genannte Strategien zum Schutz der eigenen Daten sind: Informiert bleiben, Datensparsamkeit, Vermeidung der Produkte be- stimmter Konzerne sowie Resignation. Als Motivation für das jeweilige Verhalten wurden sowohl politische, philoso- phische, utilitaristische, als auch angstgetriebene Gründe genannt. Letztere können in Angst vor Diebstahl und Angst vor Andersbehandlung unterschieden werden.},
booktitle = {Mensch und {Computer} 2019 - {Workshopband}},
publisher = {Gesellschaft für Informatik e.V.},
author = {Schmidbauer-Wolf, Gina Maria and Herbert, Franziska and Reuter, Christian},
year = {2019},
keywords = {Security, Projekt-ATHENE-FANCY},
pages = {256--264},
}
[BibTeX] [Abstract] [Download PDF]
Nur wenn die technischen (z.B. Zuverlässigkeit) und nutzungs- orientierten Aspekte (z.B. Gebrauchstauglichkeit) angemessen und integriert berücksichtigt werden, können computerbasierte Systeme und vor allem deren Anwendung in komplexen Situati- onen sicher sein. Eine gute Benutzbarkeit ist dabei kein Zusatz, sondern zentraler Bestandteil bei der Verbesserung der System- sicherheit. Im Zentrum dieses Workshops stehen Erkenntnisse zur Mensch-Computer-Interaktion in sicherheitskritischen An- wendungsgebieten. Dazu werden Konzepte der Krisenkommuni- kation, der Nutzung sozialer Medien, neuartige Interaktionskon- zepte und Reflektionen zu Forschungsprojekten vorgestellt.
@inproceedings{reuter_6_2019,
address = {Hamburg, Germany},
title = {6. {Workshop} {Mensch}-{Maschine}-{Interaktion} in sicherheitskritischen {Systemen} - {Neue} digitale {Realitäten}},
url = {https://dl.gi.de/server/api/core/bitstreams/0f34b4af-542f-4a0e-8793-ceaf0602dee2/content},
abstract = {Nur wenn die technischen (z.B. Zuverlässigkeit) und nutzungs- orientierten Aspekte (z.B. Gebrauchstauglichkeit) angemessen und integriert berücksichtigt werden, können computerbasierte Systeme und vor allem deren Anwendung in komplexen Situati- onen sicher sein. Eine gute Benutzbarkeit ist dabei kein Zusatz, sondern zentraler Bestandteil bei der Verbesserung der System- sicherheit. Im Zentrum dieses Workshops stehen Erkenntnisse zur Mensch-Computer-Interaktion in sicherheitskritischen An- wendungsgebieten. Dazu werden Konzepte der Krisenkommuni- kation, der Nutzung sozialer Medien, neuartige Interaktionskon- zepte und Reflektionen zu Forschungsprojekten vorgestellt.},
booktitle = {Mensch und {Computer} 2019 - {Workshopband}},
publisher = {Gesellschaft für Informatik e.V.},
author = {Reuter, Christian and Mentler, Tilo and Nestler, Simon and Herczeg, Michael and Ludwig, Thomas and Pottebaum, Jens and Kaufhold, Marc-André},
year = {2019},
keywords = {Security, UsableSec, Crisis, HCI},
pages = {278--280},
}
[BibTeX] [Abstract] [Download PDF]
The importance of dealing withfake newsonsocial mediahas increased both in political and social contexts.While existing studies focus mainly on how to detect and label fake news, approaches to assist usersin making their own assessments are largely missing. This article presents a study on how Twitter-users’assessmentscan be supported by an indicator-based white-box approach.First, we gathered potential indicators for fake news that have proven to be promising in previous studies and that fit our idea of awhite-box approach. Based on those indicators we then designed and implemented the browser-plugin TrusyTweet, which assists users on Twitterin assessing tweetsby showing politically neutral and intuitive warnings without creating reactance. Finally, we suggest the findings of our evaluations with a total of 27 participants which lead to further design implicationsfor approachesto assistusers in dealing with fake news.
@inproceedings{hartwig_trustytweet_2019,
address = {Siegen, Germany},
title = {{TrustyTweet}: {An} {Indicator}-based {Browser}-{Plugin} to {Assist} {Users} in {Dealing} with {Fake} {News} on {Twitter}},
url = {http://www.peasec.de/paper/2019/2019_HartwigReuter_TrustyTweet_WI.pdf},
abstract = {The importance of dealing withfake newsonsocial mediahas increased both in political and social contexts.While existing studies focus mainly on how to detect and label fake news, approaches to assist usersin making their own assessments are largely missing. This article presents a study on how Twitter-users'assessmentscan be supported by an indicator-based white-box approach.First, we gathered potential indicators for fake news that have proven to be promising in previous studies and that fit our idea of awhite-box approach. Based on those indicators we then designed and implemented the browser-plugin TrusyTweet, which assists users on Twitterin assessing tweetsby showing politically neutral and intuitive warnings without creating reactance. Finally, we suggest the findings of our evaluations with a total of 27 participants which lead to further design implicationsfor approachesto assistusers in dealing with fake news.},
booktitle = {Proceedings of the {International} {Conference} on {Wirtschaftsinformatik} ({WI})},
publisher = {AIS},
author = {Hartwig, Katrin and Reuter, Christian},
year = {2019},
keywords = {Peace, Student, Crisis, HCI, Projekt-ATHENE-FANCY, SocialMedia, Projekt-CRISP, Ranking-CORE-C, Ranking-VHB-C, Ranking-WKWI-A},
pages = {1858--1869},
}
[BibTeX] [Abstract] [Download PDF]
In der Sicherheits- und Krisenforschung stehen bislang primär Fragen der Vulne-rabilität, Stärkung von Resilienz und Erhaltung bzw. Wiederherstellung kritischer Infrastrukturen (KRITIS) im Mittelpunkt; zunehmend wird auch die Bedeutung von Sozialen Medien und Krisen-Apps erkannt. Inwiefern ist die Zivilbevölke-rung in Deutschland aber auf das Eintreten einer Krise tatsächlich vorbereitet? Welche Informations- und Kommunikationstechniken (IKT) werden im Alltag und bei einem potentiellen Infrastrukturausfall genutzt? Unser Beitrag stellt die Ergebnisse einer repräsentativen Umfrage mit 1024 Teilnehmern in Deutschland vor, die belegen, dass Gefahrenbewusstsein, Vorbereitung, effektives Krisenma-nagement und Verbreitung von Krisen-Apps in Deutschland noch relativ gering sind, während traditionelle Kommunikations- und Informationskanäle sowie in-formelle Informationsnetzwerke bevorzugt werden. Die Ergebnisse stellen wei-terhin die beträchtlichen Unterstützungspotentiale von IKT in derartigen Krisensi-tuationen heraus, die zur Erhöhung des Risikobewusstseins, der Erleichterung des Informationstransfers und der Verbesserung der Kommunikation zwischen Zivilbevölkerung, KRITIS-Betreibern und Behörden und Organisationen mit Si-cherheitsaufgaben (BOS) entscheidend beitragen können.
@inproceedings{kaufhold_potentiale_2019,
address = {Siegen, Germany},
title = {Potentiale von {IKT} beim {Ausfall} kritischer {Infrastrukturen}: {Erwartungen}, {Informationsgewinnung} und {Mediennutzung} der {Zivilbevölkerung} in {Deutschland}},
url = {http://www.peasec.de/paper/2019/2019_KaufholdGrinkoReuterSchorschLangerSkudelnyHollick_InfrastrukturAusfall_WI.pdf},
abstract = {In der Sicherheits- und Krisenforschung stehen bislang primär Fragen der Vulne-rabilität, Stärkung von Resilienz und Erhaltung bzw. Wiederherstellung kritischer Infrastrukturen (KRITIS) im Mittelpunkt; zunehmend wird auch die Bedeutung von Sozialen Medien und Krisen-Apps erkannt. Inwiefern ist die Zivilbevölke-rung in Deutschland aber auf das Eintreten einer Krise tatsächlich vorbereitet? Welche Informations- und Kommunikationstechniken (IKT) werden im Alltag und bei einem potentiellen Infrastrukturausfall genutzt? Unser Beitrag stellt die Ergebnisse einer repräsentativen Umfrage mit 1024 Teilnehmern in Deutschland vor, die belegen, dass Gefahrenbewusstsein, Vorbereitung, effektives Krisenma-nagement und Verbreitung von Krisen-Apps in Deutschland noch relativ gering sind, während traditionelle Kommunikations- und Informationskanäle sowie in-formelle Informationsnetzwerke bevorzugt werden. Die Ergebnisse stellen wei-terhin die beträchtlichen Unterstützungspotentiale von IKT in derartigen Krisensi-tuationen heraus, die zur Erhöhung des Risikobewusstseins, der Erleichterung des Informationstransfers und der Verbesserung der Kommunikation zwischen Zivilbevölkerung, KRITIS-Betreibern und Behörden und Organisationen mit Si-cherheitsaufgaben (BOS) entscheidend beitragen können.},
booktitle = {Proceedings of the {International} {Conference} on {Wirtschaftsinformatik} ({WI})},
publisher = {AIS},
author = {Kaufhold, Marc-André and Grinko, Margarita and Reuter, Christian and Schorch, Marén and Langer, Amanda and Skudelny, Sascha and Hollick, Matthias},
year = {2019},
keywords = {Projekt-GeoBox, RSF, Crisis, HCI, SocialMedia, Projekt-KontiKat, Infrastructure, Projekt-MAKI, Projekt-HyServ, Ranking-CORE-C, Ranking-VHB-C, Ranking-WKWI-A},
pages = {1054--1068},
}
[BibTeX] [Abstract] [Download PDF]
Fake news has become an important topic in our social and political environment. While research is coming up for the U.S. and European countries, many aspects remain uncovered as long as existing work only marginally inves-tigates people’s attitudes towards fake news. In this work, we present the results of a representative study (N=1023) in Germany asking participants about their attitudes towards fake news and approaches to counteract disinformation. More than 80\% of the participants agree that fake news poses a threat. 78\% see fake news as harming democracy. Even though about half of the respondents (48\%) have noticed fake news, most participants stated to have never liked, shared or commented on fake news. Regarding demographic factors, our findings support the view of younger and relatively educated people being more informed about fake news. Concerning ideological motives, the evaluation suggests left-wing or liberal respondents to be more critical of fake news
@inproceedings{reuter_fake_2019-1,
address = {Siegen, Germany},
title = {Fake {News} {Perception} in {Germany}: {A} {Representative} {Study} of {People}'s {Attitudes} and {Approaches} to {Counteract} {Disinformation}},
url = {http://www.peasec.de/paper/2019/2019_ReuterHartwigKirchnerSchlegel_FakeNewsPerceptionGermany_WI.pdf},
abstract = {Fake news has become an important topic in our social and political environment. While research is coming up for the U.S. and European countries, many aspects remain uncovered as long as existing work only marginally inves-tigates people's attitudes towards fake news. In this work, we present the results of a representative study (N=1023) in Germany asking participants about their attitudes towards fake news and approaches to counteract disinformation. More than 80\% of the participants agree that fake news poses a threat. 78\% see fake news as harming democracy. Even though about half of the respondents (48\%) have noticed fake news, most participants stated to have never liked, shared or commented on fake news. Regarding demographic factors, our findings support the view of younger and relatively educated people being more informed about fake news. Concerning ideological motives, the evaluation suggests left-wing or liberal respondents to be more critical of fake news},
booktitle = {Proceedings of the {International} {Conference} on {Wirtschaftsinformatik} ({WI})},
publisher = {AIS},
author = {Reuter, Christian and Hartwig, Katrin and Kirchner, Jan and Schlegel, Noah},
year = {2019},
keywords = {Peace, Student, Crisis, HCI, SocialMedia, Ranking-CORE-C, Ranking-VHB-C, Ranking-WKWI-A},
pages = {1069--1083},
}
[BibTeX] [Abstract] [Download PDF]
Arbeitsteilung und Kooperation sind essentielle Bestandteil von Landwirtschaft, die sich im Laufe der Geschichte stetig weiterentwickelt haben. Nun ermöglicht die voranschreitende Digitalisierung in der Landwirtschaft erneut Innovationen und neue Arten der Kooperation. Moderne Dienstleistungen – wie optimierte Logistik oder umweltschonende Bewirtschaftung – verbinden zunehmend Maschinenleistungen und Datendienste zu untrennbaren Hybriden Services. Im Zuge dessen werden detaillierte Vereinbarungen bezüglich der bereitzustellenden betrieblichen Daten sowie der Verwendung der während der Dienstleistung erhobenen Messwerte getroffen. Im Rahmen des Projektes HyServ werden Servicekonzepte und Schnittstellen entwickelt, welche es den Akteuren erlauben, die Hoheit über die eigenen Daten zu behalten und dennoch kooperative Dienstleistungsverträge zu erstellen. Zu diesem Zweck werden dezentrale Strukturen mit kryptographisch gesichertem Austausch etabliert, welche als Infrastruktur für orchestrierte Micro-Services und Smart Contracts dienen.
@inproceedings{bernardi_hybride_2019,
address = {Vienna, Austria},
title = {Hybride {Dienstleistungen} in digitalisierten {Kooperationen} in der {Landwirtschaft}},
url = {http://gil-net.de/Publikationen/139_25-30.pdf},
abstract = {Arbeitsteilung und Kooperation sind essentielle Bestandteil von Landwirtschaft, die sich im Laufe der Geschichte stetig weiterentwickelt haben. Nun ermöglicht die voranschreitende Digitalisierung in der Landwirtschaft erneut Innovationen und neue Arten der Kooperation. Moderne Dienstleistungen – wie optimierte Logistik oder umweltschonende Bewirtschaftung – verbinden zunehmend Maschinenleistungen und Datendienste zu untrennbaren Hybriden Services. Im Zuge dessen werden detaillierte Vereinbarungen bezüglich der bereitzustellenden betrieblichen Daten sowie der Verwendung der während der Dienstleistung erhobenen Messwerte getroffen. Im Rahmen des Projektes HyServ werden Servicekonzepte und Schnittstellen entwickelt, welche es den Akteuren erlauben, die Hoheit über die eigenen Daten zu behalten und dennoch kooperative Dienstleistungsverträge zu erstellen. Zu diesem Zweck werden dezentrale Strukturen mit kryptographisch gesichertem Austausch etabliert, welche als Infrastruktur für orchestrierte Micro-Services und Smart Contracts dienen.},
booktitle = {39. {GIL}-{Jahrestagung}: {Informatik} in der {Land}-, {Forst}- und {Ernährungswirtschaft} {Fokus}; {Digitalisierung} für landwirtschaftliche {Betriebe} in kleinstrukturierten {Regionen} – ein {Widerspruch} in sich?, {Lecture} {Notes} in {Informatics} ({LNI})},
publisher = {Gesellschaft für Informatik},
author = {Bernardi, Ansgar and Reuter, Christian and Schneider, Wolfgang and Linsner, Sebastian and Kaufhold, Marc-André},
editor = {Meyer-Aurich, A.},
year = {2019},
keywords = {RSF, HCI, Infrastructure, Projekt-HyServ, Ranking-CORE-C, Ranking-VHB-C},
pages = {25--30},
}
Weitere Publikationen / Other Publications
[BibTeX] [Abstract] [Download PDF]
The use of social media is ubiquitous and nowadays well- established in our everyday life, but increasingly also before, during or after emergencies. The produced data is spread across several types of social media and can be used by different actors, such as emergency services or volunteer communities. There are already systems available that support the process of gathering, analysing and distributing information through social media. However, dependent on the goal of analysis, the analysis methods and available systems are limited based on technical or business-oriented restrictions. This paper presents the design of a cross-platform Social Media API, which was integrated and evaluated within multiple emergency scenarios. Based on the lessons learned, we outline the core challenges from the practical development and theoretical findings, focusing (1) cross-platform gathering and data management, (2) trustability and information quality, (3) tailorability and adjustable data operations, and (4) queries, performance, and technical development.
@techreport{kaufhold_cross-media_2019,
title = {Cross-{Media} {Usage} of {Social} {Big} {Data} for {Emergency} {Services} and {Volunteer} {Communities}: {Approaches}, {Development} and {Challenges} of {Multi}-{Platform} {Social} {Media} {Services}},
url = {https://arxiv.org/pdf/1907.07725.pdf},
abstract = {The use of social media is ubiquitous and nowadays well- established in our everyday life, but increasingly also before, during or after emergencies. The produced data is spread across several types of social media and can be used by different actors, such as emergency services or volunteer communities. There are already systems available that support the process of gathering, analysing and distributing information through social media. However, dependent on the goal of analysis, the analysis methods and available systems are limited based on technical or business-oriented restrictions. This paper presents the design of a cross-platform Social Media API, which was integrated and evaluated within multiple emergency scenarios. Based on the lessons learned, we outline the core challenges from the practical development and theoretical findings, focusing (1) cross-platform gathering and data management, (2) trustability and information quality, (3) tailorability and adjustable data operations, and (4) queries, performance, and technical development.},
institution = {arXiv},
author = {Kaufhold, Marc-André and Reuter, Christian and Ludwig, Thomas},
year = {2019},
keywords = {Crisis, SocialMedia, Projekt-KontiKat, Projekt-EmerGent},
pages = {1--11},
}
[BibTeX] [Abstract] [Download PDF]
Der Einsatz von Informationstechnologie (IT) im Frieden ebenso wie in Konflikten und für Sicherheitszwecke wirft einige Fragen auf (Reuter 2019), u.a. ob die Nutzung von IT auf so genannte förderliche Zwecke und Anwendungen begrenzt und eine schädliche Nutzung verhindert werden kann (Riebe und Reuter 2019). Diese Ambivalenz wird als Dual-use-Dilemma bezeichnet und bedeutet, dass Gegenstände, Wissen und Technologie sowohl nützliche als auch schädliche Anwendung fi nden können. Dual-use-Fragen stellen sich in ganz unterschiedlichen technischen und naturwissenschaftlichen Disziplinen, insbesondere in der Nukleartechnologie sowie in der Chemie und Biologie. Dabei unterscheidet sich die Bedeutung von Dual-use je nach Technologie, ihren spezifi schen Risiken und Szenarien sowie ihrer Distribution und Anwendung. Konkret bedeutet dies: Sicherheitspolitische Risikoszenarien und Anwender der Nukleartechnologie unterscheiden sich erheblich von denen der IT.
@techreport{riebe_dual-use_2019,
address = {Wissenschaft \& Frieden 2019-1},
title = {Dual-{Use} in der {IT}: {Bewertung} in der {Softwareentwicklung}},
url = {http://www.peasec.de/paper/2019/2019_RiebeReuter_DualUse_WuF.pdf},
abstract = {Der Einsatz von Informationstechnologie (IT) im Frieden ebenso wie in Konflikten und für Sicherheitszwecke wirft einige Fragen auf (Reuter 2019), u.a. ob die Nutzung von IT auf so genannte förderliche Zwecke und Anwendungen begrenzt und eine schädliche Nutzung verhindert werden kann (Riebe und Reuter 2019). Diese Ambivalenz wird als Dual-use-Dilemma bezeichnet und bedeutet, dass Gegenstände, Wissen und Technologie sowohl nützliche als auch schädliche Anwendung fi nden können. Dual-use-Fragen stellen sich in ganz unterschiedlichen technischen und naturwissenschaftlichen Disziplinen, insbesondere in der Nukleartechnologie sowie in der Chemie und Biologie. Dabei unterscheidet sich die Bedeutung von Dual-use je nach Technologie, ihren spezifi schen Risiken und Szenarien sowie ihrer Distribution und Anwendung. Konkret bedeutet dies: Sicherheitspolitische Risikoszenarien und Anwender der Nukleartechnologie unterscheiden sich erheblich von denen der IT.},
author = {Riebe, Thea and Reuter, Christian},
year = {2019},
keywords = {Peace, Projekt-DualUse, Projekt-KontiKat},
pages = {46--48},
}