Dear Members and Friends of PEASEC,

As 2025 comes to a close, we sincerely thank you for your support and contributions. Wishing you a joyful holiday season and a successful New Year!

A very short summary: 

  • Doctoral Theses:We celebrated the successful doctorates of Dr. Stefka Schmid, Dr. Philipp Kühn and Dr. Tom Biselli.
  • Staff Developments: We welcomed new research associates (Dr. Ephraim Zimmer, Simon Althaus, Tim Fischer, Helen Bader), a new guest professor (Prof. Dr. Ira Helsloot), a new deputy professor (Vertr.-Prof. Dr. Katrin Hartwig) many new student assistants. Our secretrary Birgit Schmidt retired, and Dr. Sebastian Linsner, Dr. Stefka Schmid and Dr. Tom Biselli moved on.
  • Leadership Transition: Prof. Christian Reuter concluded his term as dean and was appointed vice-director of emergenCITY and as GI ambassador.
  • Publications and Awards: Our team published over 50 papers, including 17 in top-tier venues, and received multiple prestigious awards, such as 2 CHI Honorable Mention Awards and several further awards.
  • Projects and Outreach: We contributed to award-winning projects like the eHUB, shared research at major conferences including CHI, and were featured in national and regional media.

Thank you for being part of our journey in 2025. We look forward to 2026!

Warm regards,
The PEASEC Team


Doctoral Theses


Staff Developments


Leadership Transition: 


Teaching

  • We supervised around 30 successfully completed Bachelor’s and Master’s theses.
  • We welcomed Prof. Dr. Ira Helsloot as guest professor in summer semester 2025, where he taught the course Cyber Incident Preparation and Response on decision-making during cyber incidents.
  • Dr. Katrin Hartwig has been appointed as deputy professor (Vertretungsprofessor) for the winter semester 2025/2026 (1.10.2025-31.3.2026) to represent the W3 professorship ‘Knowledge Engineering’ at the Department of Computer Science at TU Darmstadt.

Publications and Awards


Projects, Events and Outreach

  • We (co-)organised and contributed to various scientific events and conferences, presenting our research on crisis preparedness and digital rights at international venues. PEASEC researchers were involved in award-winning interdisciplinary projects such as the eHUB, shared insights at the BBK conference in Bonn, and joined global debates at RightsCon 2025 in Taipei.
  • In addition, our work received attention in national and regional media such as FAZ, hessenschau, Darmstädter Echo and Mainzer Zeitung, underlining the societal relevance of our research on disinformation, resilience and digital security.

News 2025

Highlights 2025

2025 (49)

A-Paper 2025

(CORE≥A v VHB≥A v WKWI≥A v Thomson Reuters JIF≥1 v GI-CSCW≥A)

2025

  • Christian Reuter, Amanda Lee Hughes, Cody Buntain (2025)
    Combating Information Warfare: State and Trends in User-Centered Countermeasures against Fake News and Misinformation
    Behaviour & Information Technology (BIT) ;44(13):3348–3361. doi:10.1080/0144929X.2024.2442486
    [BibTeX] [Abstract] [Download PDF]

    The rise of fake news and misinformation in the digital age poses serious risks for individuals and society, particularly during crises like the Israel-Hamas war, the Russian-Ukraine war, or the COVID-19 pandemic. Misinformation serves as a tool to manipulate public opinion and create discord. Vulnerability to manipulation increases in online spaces during crises, where authoritative information is scarce. Emergency management, public health, political and public administration, as well as media professionals and citizens express concern and seek solutions to enhance information quality during such critical times. This article highlights user-centred approaches to countering fake news and misinformation, tracing their historical evolution from ancient Greece to the present, focussing on their relevance during the COVID-19 crisis and in contemporary information warfare. It describes the vulnerability of audiences to misinformation and outlines prevailing trends in user-centred countermeasures. This article also introduces recent research on the effectiveness of media literacy interventions on truth discernment, a cross-cultural comparison of the perception of negative consequences and the injunctive norm, a comparison of video and text to promote lateral reading in adolescents, content-specific indicators on Twitter from a user perspective, a learning system for detecting misinformation as well as ethical and security considerations in automated detection.

    @article{reuterCombatingInformationWarfare2025,
    title = {Combating {Information} {Warfare}: {State} and {Trends} in {User}-{Centered} {Countermeasures} against {Fake} {News} and {Misinformation}},
    volume = {44},
    issn = {0144-929X},
    url = {https://doi.org/10.1080/0144929X.2024.2442486},
    doi = {10.1080/0144929X.2024.2442486},
    abstract = {The rise of fake news and misinformation in the digital age poses serious risks for individuals and society, particularly during crises like the Israel-Hamas war, the Russian-Ukraine war, or the COVID-19 pandemic. Misinformation serves as a tool to manipulate public opinion and create discord. Vulnerability to manipulation increases in online spaces during crises, where authoritative information is scarce. Emergency management, public health, political and public administration, as well as media professionals and citizens express concern and seek solutions to enhance information quality during such critical times. This article highlights user-centred approaches to countering fake news and misinformation, tracing their historical evolution from ancient Greece to the present, focussing on their relevance during the COVID-19 crisis and in contemporary information warfare. It describes the vulnerability of audiences to misinformation and outlines prevailing trends in user-centred countermeasures. This article also introduces recent research on the effectiveness of media literacy interventions on truth discernment, a cross-cultural comparison of the perception of negative consequences and the injunctive norm, a comparison of video and text to promote lateral reading in adolescents, content-specific indicators on Twitter from a user perspective, a learning system for detecting misinformation as well as ethical and security considerations in automated detection.},
    number = {13},
    journal = {Behaviour \& Information Technology (BIT)},
    author = {Reuter, Christian and Hughes, Amanda Lee and Buntain, Cody},
    year = {2025},
    keywords = {A-Paper, Crisis, HCI, Peace, Projekt-NEBULA, Ranking-CORE-A, Ranking-ImpactFactor, SocialMedia},
    pages = {3348--3361},
    }

  • Christian Reuter, Amanda Lee Hughes, Cody Buntain (2025)
    Special Issue on Combating Information Warfare: User-Centered Countermeasures against Fake News and Misinformation – Behaviour & Information Technology (BIT)
    Taylor & Francis.
    [BibTeX] [Abstract]

    The rise of fake news and misinformation in the digital age poses serious risks for individuals and society, particularly during crises like the Israel-Hamas war, the Russian-Ukraine war, or the COVID-19 pandemic. Misinformation serves as a tool to manipulate public opinion and create discord. Vulnerability to manipulation increases in online spaces during crises, where authoritative information is scarce. Emergency management, public health, political and public administration, as well as media professionals and citizens express concern and seek solutions to enhance information quality during such critical times. This article highlights user-centred approaches to countering fake news and misinformation, tracing their historical evolution from ancient Greece to the present, focussing on their relevance during the COVID-19 crisis and in contemporary information warfare. It describes the vulnerability of audiences to misinformation and outlines prevailing trends in user-centred countermeasures. This article also introduces recent research on the effectiveness of media literacy interventions on truth discernment, a cross-cultural comparison of the perception of negative consequences and the injunctive norm, a comparison of video and text to promote lateral reading in adolescents, content-specific indicators on Twitter from a user perspective, a learning system for detecting misinformation as well as ethical and security considerations in automated detection.

    @book{reuterSpecialIssueCombating2025,
    title = {Special {Issue} on {Combating} {Information} {Warfare}: {User}-{Centered} {Countermeasures} against {Fake} {News} and {Misinformation} - {Behaviour} \& {Information} {Technology} ({BIT})},
    abstract = {The rise of fake news and misinformation in the digital age poses serious risks for individuals and society, particularly during crises like the Israel-Hamas war, the Russian-Ukraine war, or the COVID-19 pandemic. Misinformation serves as a tool to manipulate public opinion and create discord. Vulnerability to manipulation increases in online spaces during crises, where authoritative information is scarce. Emergency management, public health, political and public administration, as well as media professionals and citizens express concern and seek solutions to enhance information quality during such critical times. This article highlights user-centred approaches to countering fake news and misinformation, tracing their historical evolution from ancient Greece to the present, focussing on their relevance during the COVID-19 crisis and in contemporary information warfare. It describes the vulnerability of audiences to misinformation and outlines prevailing trends in user-centred countermeasures. This article also introduces recent research on the effectiveness of media literacy interventions on truth discernment, a cross-cultural comparison of the perception of negative consequences and the injunctive norm, a comparison of video and text to promote lateral reading in adolescents, content-specific indicators on Twitter from a user perspective, a learning system for detecting misinformation as well as ethical and security considerations in automated detection.},
    publisher = {Taylor \& Francis},
    author = {Reuter, Christian and Hughes, Amanda Lee and Buntain, Cody},
    year = {2025},
    note = {Publication Title: Behaviour \& Information Technology (BIT)},
    keywords = {Crisis, HCI, SocialMedia, A-Paper, Ranking-ImpactFactor, Ranking-CORE-A, Peace},
    }

  • Markus Bayer, Justin Lutz, Christian Reuter (2025)
    ActiveLLM: Large Language Model-based Active Learning for Textual Few-Shot Scenarios
    Transactions of the Association for Computational Linguistics (TACL) . doi:10.48550/arXiv.2405.10808
    [BibTeX] [Abstract] [Download PDF]

    Active learning is designed to minimize annotation efforts by prioritizing instances that most enhance learning. However, many active learning strategies struggle with a ‘coldstart’ problem, needing substantial initial data to be effective. This limitation reduces their utility in the increasingly relevant fewshot scenarios, where the instance selection has a substantial impact. To address this, we introduce ActiveLLM, a novel active learning approach that leverages Large Language Models such as GPT-4, o1, Llama 3, or Mistral Large for selecting instances. We demonstrate that ActiveLLM significantly enhances the classification performance of BERT classifiers in few-shot scenarios, outperforming traditional active learning methods as well as improving the few-shot learning methods ADAPET, PERFECT, and Set- Fit. Additionally, ActiveLLM can be extended to non-few-shot scenarios, allowing for iterative selections. In this way, ActiveLLM can even help other active learning strategies to overcome their cold-start problem. Our results suggest that ActiveLLM offers a promising solution for improving model performance across various learning setups.

    @article{bayerActiveLLMLargeLanguage2025,
    title = {{ActiveLLM}: {Large} {Language} {Model}-based {Active} {Learning} for {Textual} {Few}-{Shot} {Scenarios}},
    url = {https://arxiv.org/pdf/2405.10808},
    doi = {10.48550/arXiv.2405.10808},
    abstract = {Active learning is designed to minimize annotation
    efforts by prioritizing instances that
    most enhance learning. However, many active
    learning strategies struggle with a ‘coldstart’
    problem, needing substantial initial
    data to be effective. This limitation reduces
    their utility in the increasingly relevant fewshot
    scenarios, where the instance selection
    has a substantial impact. To address this, we
    introduce ActiveLLM, a novel active learning
    approach that leverages Large Language
    Models such as GPT-4, o1, Llama 3, or
    Mistral Large for selecting instances. We
    demonstrate that ActiveLLM significantly
    enhances the classification performance of
    BERT classifiers in few-shot scenarios, outperforming
    traditional active learning methods
    as well as improving the few-shot learning
    methods ADAPET, PERFECT, and Set-
    Fit. Additionally, ActiveLLM can be extended
    to non-few-shot scenarios, allowing
    for iterative selections. In this way, ActiveLLM
    can even help other active learning
    strategies to overcome their cold-start problem.
    Our results suggest that ActiveLLM
    offers a promising solution for improving
    model performance across various learning
    setups.},
    journal = {Transactions of the Association for Computational Linguistics (TACL)},
    author = {Bayer, Markus and Lutz, Justin and Reuter, Christian},
    year = {2025},
    keywords = {Student, UsableSec, Security, A-Paper, Projekt-CYLENCE, Projekt-ATHENE-CyAware, CORE-A*},
    }

  • Thea Riebe, Anja-Liisa Gonsior, Lilian Reichert, Christian Reuter (2025)
    Envisioning Human-Machine Interaction in Future Warfare: Defence Industry Narratives on Human Control of Autonomous Weapon Systems
    Global Society ;39(4):421–445. doi:10.1080/13600826.2024.2436966
    [BibTeX] [Abstract] [Download PDF]

    The development of artificial intelligence and autonomous functions in the military domain has an immense impact on technologies being developed by the private defence industry. Defence firms contribute to the narratives and visions on autonomous weapon systems and the future of warfare, e.g. in the form of strategic marketing of their products. However, their role has so far been understudied, especially regarding autonomous weapon systems. As the normative debate revolves around aspects of human control, this work examines the narratives of (meaningful) human control in the marketing of autonomous military systems by defence manufacturers. Based on a comprehensive content analysis of twenty defence firms, we identified three main narratives, which envision autonomy as a military advantage, the role of the human in the future of warfare, and human-machine teaming. Based on the results, we argue that defence companies reproduce and adapt narratives which shape expectations and visions of human control of autonomous weapon systems in anticipation of emerging norms for (meaningful) human control. However, without specifications and verification mechanisms, there is no indication that human control will be meaningful.

    @article{riebeEnvisioningHumanMachineInteraction2025a,
    title = {Envisioning {Human}-{Machine} {Interaction} in {Future} {Warfare}: {Defence} {Industry} {Narratives} on {Human} {Control} of {Autonomous} {Weapon} {Systems}},
    volume = {39},
    issn = {1360-0826},
    url = {https://doi.org/10.1080/13600826.2024.2436966},
    doi = {10.1080/13600826.2024.2436966},
    abstract = {The development of artificial intelligence and autonomous functions in the military domain has an immense impact on technologies being developed by the private defence industry. Defence firms contribute to the narratives and visions on autonomous weapon systems and the future of warfare, e.g. in the form of strategic marketing of their products. However, their role has so far been understudied, especially regarding autonomous weapon systems. As the normative debate revolves around aspects of human control, this work examines the narratives of (meaningful) human control in the marketing of autonomous military systems by defence manufacturers. Based on a comprehensive content analysis of twenty defence firms, we identified three main narratives, which envision autonomy as a military advantage, the role of the human in the future of warfare, and human-machine teaming. Based on the results, we argue that defence companies reproduce and adapt narratives which shape expectations and visions of human control of autonomous weapon systems in anticipation of emerging norms for (meaningful) human control. However, without specifications and verification mechanisms, there is no indication that human control will be meaningful.},
    number = {4},
    journal = {Global Society},
    author = {Riebe, Thea and Gonsior, Anja-Liisa and Reichert, Lilian and Reuter, Christian},
    year = {2025},
    keywords = {HCI, Student, A-Paper, Ranking-ImpactFactor, Peace, AuswahlPeace, Projekt-TraCe, Projekt-ATHENE-CyAware},
    pages = {421--445},
    }

  • Enno Steinbrink, Laura Guntrum, Christian Reuter (2025)
    Smartphone and ICT Use Among Ukrainian Refugees: Technology Support during War, Flight, and Adaptation in Germany
    Proceedings of the ACM: Human Computer Interaction (PACM): Computer-Supported Cooperative Work and Social Computing (CSCW). doi:10.1145/3711067
    [BibTeX] [Abstract] [Download PDF]

    In conflict-ridden environments, timely and accurate information is critical for those dealing with the dynamic of events. When individuals have to flee, it becomes evident that refugees frequently rely on information and communication technologies (ICT) for information acquisition, travel coordination, and maintaining connections with related parties. Based on 17 interviews, this research explores how Ukrainian refugees, who sought protection in Germany due to the 2022 Russian full-scale invasion, use ICT before, during, and after their flight. By providing empirical findings, the results show in depth how contextual factors, such as infrastructural instability, privacy concerns and an advanced digitalization, interrelate with user behaviors. Analyzing the multifaceted civilian ICT use in the context of war and flight, this exploratory research contributes to the existing research on HCI in migration contexts and connects to several topics of CSCW. By contrasting case specifics, this work highlights what makes Ukraine a special case in this research area. Furthermore, this paper examines both existing and emerging affordances of ICT in the context of flight, and identifies the crucial role of messenger groups for information gathering in all phases of the flight. Lastly, collaborative dimensions of the identified affordances are discussed.

    @article{steinbrinkSmartphoneICTUse2025,
    title = {Smartphone and {ICT} {Use} {Among} {Ukrainian} {Refugees}: {Technology} {Support} during {War}, {Flight}, and {Adaptation} in {Germany}},
    url = {https://www.peasec.de/paper/2025/2025_SteinbrinkGuntrumReuter_Ukraine_CSCW.pdf},
    doi = {10.1145/3711067},
    abstract = {In conflict-ridden environments, timely and accurate information is critical for those dealing with the dynamic of events. When individuals have to flee, it becomes evident that refugees frequently rely on information and communication technologies (ICT) for information acquisition, travel coordination, and maintaining connections with related parties. Based on 17 interviews, this research explores how Ukrainian refugees, who sought protection in Germany due to the 2022 Russian full-scale invasion, use ICT before, during, and after their flight. By providing empirical findings, the results show in depth how contextual factors, such as infrastructural instability, privacy concerns and an advanced digitalization, interrelate with user behaviors. Analyzing the multifaceted civilian ICT use in the context of war and flight, this exploratory research contributes to the existing research on HCI in migration contexts and connects to several topics of CSCW. By contrasting case specifics, this work highlights what makes Ukraine a special case in this research area. Furthermore, this paper examines both existing and emerging affordances of ICT in the context of flight, and identifies the crucial role of messenger groups for information gathering in all phases of the flight. Lastly, collaborative dimensions of the identified affordances are discussed.},
    number = {CSCW},
    journal = {Proceedings of the ACM: Human Computer Interaction (PACM): Computer-Supported Cooperative Work and Social Computing},
    author = {Steinbrink, Enno and Guntrum, Laura and Reuter, Christian},
    year = {2025},
    note = {Place: New York, NY, USA
    Publisher: Association for Computing Machinery},
    keywords = {Crisis, HCI, UsableSec, A-Paper, Ranking-CORE-A, Projekt-GRKPrivacy, Projekt-TraCe, Projekt-ATHENE},
    }

  • Julian Bäumler, Thea Riebe, Marc-André Kaufhold, Christian Reuter (2025)
    Harnessing Inter-Organizational Collaboration and Automation to Combat Online Hate Speech: A Qualitative Study with German Reporting Centers
    Proceedings of the ACM: Human Computer Interaction (PACM): Computer-Supported Cooperative Work and Social Computing . doi:10.1145/3710991
    [BibTeX] [Abstract] [Download PDF]

    In Germany and other countries, specialized non-profit reporting centers combat online hate speech by submitting criminal content to law enforcement agencies, forwarding deletion requests to social media platforms, and providing counseling to victims, thus contributing to the governance mechanism of content moderation as intermediaries between victims and various organizations. Whereas research in computer-supported cooperative work has extensively explored collaboration of and automation for content moderators, there are no works that focus on reporting centers. Based on expert interviews with their staff (N=15), this study finds that most German centers share a collaborative workflow, of which multiple tasks are heavily dependent on inter-organizational exchange. However, there are differences in their implementation of monitoring, content assessment, automation technology adoption, and external collaborators. As the centers are faced with diverse challenges, such as borderline case assessment, psychological burdens, limited visibility, conflicting goals with other actors, and manual repetitive work, our study contributes with nine implications for designing and researching supportive technologies. They provide suggestions for improving hate speech gathering and reporting, researching hate speech prioritization and assessment algorithms, and designing case processing systems. Beyond that, we outline directions for research on inter-organizational collaboration.

    @article{baumlerHarnessingInterOrganizationalCollaboration2025,
    title = {Harnessing {Inter}-{Organizational} {Collaboration} and {Automation} to {Combat} {Online} {Hate} {Speech}: {A} {Qualitative} {Study} with {German} {Reporting} {Centers}},
    url = {https://dl.acm.org/doi/10.1145/3710991},
    doi = {10.1145/3710991},
    abstract = {In Germany and other countries, specialized non-profit reporting centers combat online hate speech by submitting criminal content to law enforcement agencies, forwarding deletion requests to social media platforms, and providing counseling to victims, thus contributing to the governance mechanism of content moderation as intermediaries between victims and various organizations. Whereas research in computer-supported cooperative work has extensively explored collaboration of and automation for content moderators, there are no works that focus on reporting centers. Based on expert interviews with their staff (N=15), this study finds that most German centers share a collaborative workflow, of which multiple tasks are heavily dependent on inter-organizational exchange. However, there are differences in their implementation of monitoring, content assessment, automation technology adoption, and external collaborators. As the centers are faced with diverse challenges, such as borderline case assessment, psychological burdens, limited visibility, conflicting goals with other actors, and manual repetitive work, our study contributes with nine implications for designing and researching supportive technologies. They provide suggestions for improving hate speech gathering and reporting, researching hate speech prioritization and assessment algorithms, and designing case processing systems. Beyond that, we outline directions for research on inter-organizational collaboration.},
    journal = {Proceedings of the ACM: Human Computer Interaction (PACM): Computer-Supported Cooperative Work and Social Computing},
    author = {Bäumler, Julian and Riebe, Thea and Kaufhold, Marc-André and Reuter, Christian},
    year = {2025},
    keywords = {AuswahlCrisis, Crisis, HCI, A-Paper, Ranking-CORE-A, Projekt-CYWARN, Projekt-CYLENCE},
    }

  • Tom Biselli, Katrin Hartwig, Christian Reuter (2025)
    Mitigating Misinformation Sharing on Social Media through Personalised Nudging
    Proceedings of the ACM: Human Computer Interaction (PACM): Computer-Supported Cooperative Work and Social Computing ;9(2). doi:https://doi.org/10.1145/3711034
    [BibTeX] [Abstract] [Download PDF]

    The ongoing challenge of misinformation on social media motivates ongoing efforts to find effective countermeasures. In this study, we evaluated the potential of personalised nudging to reduce the sharing of misinformation on social media, as personalised support has been successfully applied in other areas of critical information handling. In an online experiment (N = 396) exposing users to social media posts, we assessed the degree of misinformation sharing between groups receiving (1) no nudges, (2) non-personalised nudges, and (3) personalised nudges. Personalisation was based on three psychometric dimensions – general decision-making style, consideration of future consequences, need for cognition – to assign the most appropriate nudge from a pool of five nudges. The results showed significant differences (p {\textless} .05) between all three groups, with the personalised nudge group sharing the least misinformation. Detailed analyses at the nudge level revealed that one nudge was universally effective and two nudges were effective only in their personalised form. The results generally confirm the potential of personalisation, although the effect is limited in scope. These findings shed light on the nuanced results of nudging studies, highlight the benefits of personalisation, and raise ethical considerations regarding the privacy implications of personalisation and those inherent in nudges.

    @article{biselliMitigatingMisinformationSharing2025,
    title = {Mitigating {Misinformation} {Sharing} on {Social} {Media} through {Personalised} {Nudging}},
    volume = {9},
    url = {https://www.peasec.de/paper/2025/2025_BiselliHartwigReuter_PersonalisedNudges_CSCW.pdf},
    doi = {https://doi.org/10.1145/3711034},
    abstract = {The ongoing challenge of misinformation on social media motivates ongoing efforts to find effective countermeasures.
    In this study, we evaluated the potential of personalised nudging to reduce the sharing of misinformation on social media, as personalised support has been successfully applied in other areas of critical information handling.
    In an online experiment (N = 396) exposing users to social media posts, we assessed the degree of misinformation sharing between groups receiving (1) no nudges, (2) non-personalised nudges, and (3) personalised nudges. Personalisation was based on three psychometric dimensions - general decision-making style, consideration of future consequences, need for cognition - to assign the most appropriate nudge from a pool of five nudges.
    The results showed significant differences (p {\textless} .05) between all three groups, with the personalised nudge group sharing the least misinformation. Detailed analyses at the nudge level revealed that one nudge was universally effective and two nudges were effective only in their personalised form.
    The results generally confirm the potential of personalisation, although the effect is limited in scope.
    These findings shed light on the nuanced results of nudging studies, highlight the benefits of personalisation, and raise ethical considerations regarding the privacy implications of personalisation and those inherent in nudges.},
    number = {2},
    journal = {Proceedings of the ACM: Human Computer Interaction (PACM): Computer-Supported Cooperative Work and Social Computing},
    author = {Biselli, Tom and Hartwig, Katrin and Reuter, Christian},
    year = {2025},
    keywords = {Crisis, HCI, A-Paper, Ranking-CORE-A, Projekt-NEBULA, Projekt-ATHENE-PriVis},
    }

  • Stefka Schmid, Daniel Lambach, Carlo Diehl, Christian Reuter (2025)
    Arms Race or Innovation Race? Geopolitical AI Development
    Geopolitics ;30(4):1907–1936. doi:10.1080/14650045.2025.2456019
    [BibTeX] [Abstract] [Download PDF]

    China, the United States, and the European Union have spoken of a global competition surrounding Artificial Intelligence (AI). There is widespread talk of an ‘AI Arms Race’. But what is the nature of this race? We argue that the arms race metaphor does not capture the dynamics of global competition in the AI sector. Instead, we propose the notion of a ‘geopolitical innovation race’ for technological leadership in a networked global economy. Based on an analysis of government documents, we find that actors (1) are open to both zero-sum or positive-sum approaches in AI development, (2) organise actor networks differently based on national innovation cultures, (3) prioritise economics and status next to security concerns, and (4) are open to how AI should be interpreted. Referring to the competitive race of AI research and development, the three technopoles perpetuate the geopoliticisation of innovation and intertwine security and economic interests.

    @article{schmidArmsRaceInnovation2025,
    title = {Arms {Race} or {Innovation} {Race}? {Geopolitical} {AI} {Development}},
    volume = {30},
    issn = {1465-0045},
    url = {https://doi.org/10.1080/14650045.2025.2456019},
    doi = {10.1080/14650045.2025.2456019},
    abstract = {China, the United States, and the European Union have spoken of a global competition surrounding Artificial Intelligence (AI). There is widespread talk of an ‘AI Arms Race’. But what is the nature of this race? We argue that the arms race metaphor does not capture the dynamics of global competition in the AI sector. Instead, we propose the notion of a ‘geopolitical innovation race’ for technological leadership in a networked global economy. Based on an analysis of government documents, we find that actors (1) are open to both zero-sum or positive-sum approaches in AI development, (2) organise actor networks differently based on national innovation cultures, (3) prioritise economics and status next to security concerns, and (4) are open to how AI should be interpreted. Referring to the competitive race of AI research and development, the three technopoles perpetuate the geopoliticisation of innovation and intertwine security and economic interests.},
    number = {4},
    journal = {Geopolitics},
    author = {Schmid, Stefka and Lambach, Daniel and Diehl, Carlo and Reuter, Christian},
    year = {2025},
    note = {Publisher: Routledge},
    keywords = {Selected, A-Paper, Ranking-ImpactFactor, Peace, AuswahlPeace, Projekt-TraCe, Projekt-ATHENE},
    pages = {1907--1936},
    }

  • Leon Janzen, Florentin Putz, Marc-André Kaufhold, Kolja Straub, Matthias Hollick (2025)
    The User Perspective on Island-Ready 6G Communication: A Survey of Future Smartphone Usage in Crisis-Struck Areas with Local Cellular Connectivity
    Proceedings of the Conference on Human Factors in Computing Systems (CHI) (Honorable Mentions) Yokohama, Japan. doi:10.1145/3706598.3714324
    [BibTeX] [Abstract] [Download PDF]

    Using smartphone apps during crises is well-established, proving critical for efficient crisis response. However, such apps become futile without an Internet connection, which is a common issue during crises. The ongoing 6G standardization explores the capability to provide local cellular connectivity for areas cut off from the Internet in crises. This paper introduces to the HCI community the concept of cellular island connectivity in isolated areas, promising a seamless transition from normal operation to island operation with local-only cellular connectivity. It presents findings from a survey (N = 857) among adult smartphone users from major German cities regarding their smartphone usage preferences in this model. Results show a shift in app demand, with users favoring general-purpose apps over dedicated crisis apps in specific scenarios. We prioritize smartphone services based on their criticality, distinguishing between apps essential for crisis response and those supporting routines. Our findings provide operators, developers, and authorities insights into making user-centric design decisions for implementing island-ready 6G communication.

    @inproceedings{janzenUserPerspectiveIslandReady2025,
    address = {Yokohama, Japan},
    series = {{CHI} '25},
    title = {The {User} {Perspective} on {Island}-{Ready} {6G} {Communication}: {A} {Survey} of {Future} {Smartphone} {Usage} in {Crisis}-{Struck} {Areas} with {Local} {Cellular} {Connectivity}},
    url = {peasec.de/paper/2025/2025_JanzenPutzKaufholdStraubHollick_UserPerspective6GCommunication_CHI.pdf},
    doi = {10.1145/3706598.3714324},
    abstract = {Using smartphone apps during crises is well-established, proving critical for efficient crisis response. However, such apps become futile without an Internet connection, which is a common issue during crises. The ongoing 6G standardization explores the capability to provide local cellular connectivity for areas cut off from the Internet in crises. This paper introduces to the HCI community the concept of cellular island connectivity in isolated areas, promising a seamless transition from normal operation to island operation with local-only cellular connectivity. It presents findings from a survey (N = 857) among adult smartphone users from major German cities regarding their smartphone usage preferences in this model. Results show a shift in app demand, with users favoring general-purpose apps over dedicated crisis apps in specific scenarios. We prioritize smartphone services based on their criticality, distinguishing between apps essential for crisis response and those supporting routines. Our findings provide operators, developers, and authorities insights into making user-centric design decisions for implementing island-ready 6G communication.},
    booktitle = {Proceedings of the {Conference} on {Human} {Factors} in {Computing} {Systems} ({CHI}) ({Honorable} {Mentions})},
    publisher = {Association for Computing Machinery},
    author = {Janzen, Leon and Putz, Florentin and Kaufhold, Marc-André and Straub, Kolja and Hollick, Matthias},
    year = {2025},
    keywords = {AuswahlCrisis, HCI, UsableSec, Security, A-Paper, Ranking-CORE-A*, Projekt-emergenCITY, Projekt-CYLENCE, emergenCITY\_INF, emergenCITY\_SG},
    }

  • Marc-André Kaufhold, Julian Bäumler, Marius Bajorski, Christian Reuter (2025)
    Cyber Threat Awareness, Protective Measures and Communication Preferences in Germany: Implications from Three Representative Surveys (2021-2024)
    Proceedings of the Conference on Human Factors in Computing Systems (CHI) Yokohama, Japan. doi:10.1145/3706598.3713795
    [BibTeX] [Abstract] [Download PDF]

    In light of the increasing vulnerability of citizens against cyberattacks, we conducted three representative surveys with German citizens in 2021 (N=1,093), 2023 (N=1,011), and 2024 (N=1,004) to examine their cyber threat awareness, use of protective security measures, and preferred information channels. While our findings attest large proportions of the German population a high level of cyber threat awareness, many citizens feel inadequately informed about coping with cyberattacks and show little confidence in German security authorities to protect citizens and infrastructures. While age correlated with citizens’ awareness and behavior, we only saw minor temporal differences between datasets. Finally, we provide design and policy implications for enhancing citizens’ awareness of cyber threats and implementing security measures.

    @inproceedings{kaufholdCyberThreatAwareness2025,
    address = {Yokohama, Japan},
    series = {{CHI} '25},
    title = {Cyber {Threat} {Awareness}, {Protective} {Measures} and {Communication} {Preferences} in {Germany}: {Implications} from {Three} {Representative} {Surveys} (2021-2024)},
    url = {https://peasec.de/paper/2025/2025_KaufholdB%C3%A4umlerBajorskiReuter_ComparativeCybersecuritySurvey_CHI.pdf},
    doi = {10.1145/3706598.3713795},
    abstract = {In light of the increasing vulnerability of citizens against cyberattacks, we conducted three representative surveys with German citizens in 2021 (N=1,093), 2023 (N=1,011), and 2024 (N=1,004) to examine their cyber threat awareness, use of protective security measures, and preferred information channels. While our findings attest large proportions of the German population a high level of cyber threat awareness, many citizens feel inadequately informed about coping with cyberattacks and show little confidence in German security authorities to protect citizens and infrastructures. While age correlated with citizens’ awareness and behavior, we only saw minor temporal differences between datasets. Finally, we provide design and policy implications for enhancing citizens’ awareness of cyber threats and implementing security measures.},
    booktitle = {Proceedings of the {Conference} on {Human} {Factors} in {Computing} {Systems} ({CHI})},
    publisher = {Association for Computing Machinery},
    author = {Kaufhold, Marc-André and Bäumler, Julian and Bajorski, Marius and Reuter, Christian},
    year = {2025},
    keywords = {HCI, Selected, UsableSec, Security, A-Paper, Ranking-CORE-A*, AuswahlUsableSec, Projekt-CYLENCE, Projekt-ATHENE-CyAware},
    }

  • Markus Henkel, Steffen Haesler, Hiba Al-Najmi, Frank Hessel, Christian Reuter (2025)
    The House That Saves Me? Assessing the Role of Smart Home Automation in Warning Scenarios
    Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies (IMWUT) ;9(1):5:1–5:32. doi:10.1145/3712269
    [BibTeX] [Abstract] [Download PDF]

    As smart home technology becomes integral to modern living, researchers must consider safety aspects. While single-purpose devices alert users to specific dangers, integrating them within comprehensive smart home warning systems (SHWSs) offers new safety potentials by allowing actuators to respond to threats based on predefined protocols. Key questions include whether user preferences for automation levels in smart homes are affected by different warning scenarios, and how unwanted automation or false positives influence acceptance. To explore this, we conduct two studies: (1) A lab study in a smart home with various actuators, where participants (N = 48) encounter warnings across three automation levels. (2) A follow-up interview study (N = 16) further evaluating our prototype and unwanted automation situations. Results show that participants preferred higher automation during warnings and were more receptive to smart technology in dangerous situations, though customization remains essential to ensure acceptance. While higher automation levels reduced perceived interruption, some still preferred less intense warnings. Others preferred not receiving warnings of mild dangers, fully relying on automation. Finally, we find that specific safety protocols and handling of false positive alarms must be chosen carefully to avoid mistrust, users feeling a loss of control, and damage through unwanted executions.

    @article{henkelHouseThatSaves2025,
    title = {The {House} {That} {Saves} {Me}? {Assessing} the {Role} of {Smart} {Home} {Automation} in {Warning} {Scenarios}},
    volume = {9},
    shorttitle = {The {House} {That} {Saves} {Me}?},
    url = {https://www.peasec.de/paper/2025/2025_HenkelHaeslerAlNajmiHesselReuter_HouseThatSavesMe_IMWUT.pdf},
    doi = {10.1145/3712269},
    abstract = {As smart home technology becomes integral to modern living, researchers must consider safety aspects. While single-purpose devices alert users to specific dangers, integrating them within comprehensive smart home warning systems (SHWSs) offers new safety potentials by allowing actuators to respond to threats based on predefined protocols. Key questions include whether user preferences for automation levels in smart homes are affected by different warning scenarios, and how unwanted automation or false positives influence acceptance. To explore this, we conduct two studies: (1) A lab study in a smart home with various actuators, where participants (N = 48) encounter warnings across three automation levels. (2) A follow-up interview study (N = 16) further evaluating our prototype and unwanted automation situations. Results show that participants preferred higher automation during warnings and were more receptive to smart technology in dangerous situations, though customization remains essential to ensure acceptance. While higher automation levels reduced perceived interruption, some still preferred less intense warnings. Others preferred not receiving warnings of mild dangers, fully relying on automation. Finally, we find that specific safety protocols and handling of false positive alarms must be chosen carefully to avoid mistrust, users feeling a loss of control, and damage through unwanted executions.},
    number = {1},
    journal = {Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies (IMWUT)},
    author = {Henkel, Markus and Haesler, Steffen and Al-Najmi, Hiba and Hessel, Frank and Reuter, Christian},
    year = {2025},
    keywords = {AuswahlCrisis, Crisis, HCI, Student, A-Paper, Ranking-CORE-A*, Projekt-ATHENE-SecUrban, Projekt-emergenCITY, emergenCITY\_INF, emergenCITY\_SG},
    pages = {5:1--5:32},
    }

  • Julian Bäumler, Helen Bader, Marc-André Kaufhold, Christian Reuter (2025)
    Towards Youth-Sensitive Hateful Content Reporting: An Inclusive Focus Group Study in Germany
    Proceedings of the Conference on Human Factors in Computing Systems (CHI) (Honorable Mentions) Yokohama, Japan. doi:10.1145/3706598.3713542
    [BibTeX] [Abstract] [Download PDF]

    Youth are particularly likely to encounter hateful internet content, which can severely impact their well-being. While most social media provide reporting mechanisms, in several countries, severe hateful content can alternatively be reported to law enforcement or dedicated reporting centers. However, in Germany, many youth never resort to reporting. While research in human-computer interaction has investigated adults’ views on platform-based reporting, youth perspectives and platform-independent alternatives have received little attention. By involving a diverse group of 47 German adolescents and young adults in eight focus group interviews, we investigate how youth-sensitive reporting systems for hateful content can be designed. We explore German youth’s reporting barriers, finding that on platforms, they feel particularly discouraged by deficient rule enforcement and feedback, while platform-independent alternatives are rather unknown and perceived as time-consuming and disruptive. We further elicit their requirements for platform-independent reporting tools and contribute with heuristics for designing youth-sensitive and inclusive reporting systems.

    @inproceedings{baumlerYouthSensitiveHatefulContent2025,
    address = {Yokohama, Japan},
    series = {{CHI} '25},
    title = {Towards {Youth}-{Sensitive} {Hateful} {Content} {Reporting}: {An} {Inclusive} {Focus} {Group} {Study} in {Germany}},
    url = {peasec.de/paper/2025/2025_BäumlerBaderKaufholdReuter_HatefulContentReporting_CHI.pdf},
    doi = {10.1145/3706598.3713542},
    abstract = {Youth are particularly likely to encounter hateful internet content, which can severely impact their well-being. While most social media provide reporting mechanisms, in several countries, severe hateful content can alternatively be reported to law enforcement or dedicated reporting centers. However, in Germany, many youth never resort to reporting. While research in human-computer interaction has investigated adults’ views on platform-based reporting, youth perspectives and platform-independent alternatives have received little attention. By involving a diverse group of 47 German adolescents and young adults in eight focus group interviews, we investigate how youth-sensitive reporting systems for hateful content can be designed. We explore German youth’s reporting barriers, finding that on platforms, they feel particularly discouraged by deficient rule enforcement and feedback, while platform-independent alternatives are rather unknown and perceived as time-consuming and disruptive. We further elicit their requirements for platform-independent reporting tools and contribute with heuristics for designing youth-sensitive and inclusive reporting systems.},
    booktitle = {Proceedings of the {Conference} on {Human} {Factors} in {Computing} {Systems} ({CHI}) ({Honorable} {Mentions})},
    publisher = {Association for Computing Machinery},
    author = {Bäumler, Julian and Bader, Helen and Kaufhold, Marc-André and Reuter, Christian},
    year = {2025},
    keywords = {AuswahlCrisis, Crisis, HCI, Selected, Student, A-Paper, Ranking-CORE-A*, Projekt-CYLENCE, Projekt-ATHENE-CyAware},
    }

  • Jonas Franken, Thomas Reinhold, Timon Dörnfeld, Christian Reuter (2025)
    Hidden structures of a global infrastructure: Expansion factors of the subsea data cable network
    Technological Forecasting and Social Change (TFSC) ;215:124068. doi:10.1016/j.techfore.2025.124068
    [BibTeX] [Abstract] [Download PDF]

    The network of subsea data cables (SDC) transmits the majority of international and intercontinental data exchanges. After thirty years of fiber-optic SDC installation across the oceans, almost all coastal and island countries gained access to the only global fixed infrastructure network. Still, there is considerable inequality in the number of available SDC accesses, creating deficits in redundancy for less connected states. Previous research hypothesized multiple factors that influenced the build-up of internet infrastructures but failed to verify these assumptions through inferential statistics. This work highlights the national-level factors that made backbone access provision more – or less – attractive to SDC project decision-makers. Our regression analysis of global country-year data (n = 4916) found that socio-economic (population, GDP), political (state fragility, conflict), and geographic factors (seismic hazard, neighboring territories) significantly influenced the number of active and planned accesses. This work can serve as a foundation for further research leveraging quantitative statistics to unveil hidden structures in the construction of material internet infrastructures and support sustainability in the future allocation of international infrastructure development resources in general.

    @article{frankenHiddenStructuresGlobal2025,
    title = {Hidden structures of a global infrastructure: {Expansion} factors of the subsea data cable network},
    volume = {215},
    issn = {0040-1625},
    shorttitle = {Hidden structures of a global infrastructure},
    url = {https://www.peasec.de/paper/2025/2025_FrankenReinholdDörnfeldReuter_TechForecasting.pdf},
    doi = {10.1016/j.techfore.2025.124068},
    abstract = {The network of subsea data cables (SDC) transmits the majority of international and intercontinental data exchanges. After thirty years of fiber-optic SDC installation across the oceans, almost all coastal and island countries gained access to the only global fixed infrastructure network. Still, there is considerable inequality in the number of available SDC accesses, creating deficits in redundancy for less connected states. Previous research hypothesized multiple factors that influenced the build-up of internet infrastructures but failed to verify these assumptions through inferential statistics. This work highlights the national-level factors that made backbone access provision more – or less – attractive to SDC project decision-makers. Our regression analysis of global country-year data (n = 4916) found that socio-economic (population, GDP), political (state fragility, conflict), and geographic factors (seismic hazard, neighboring territories) significantly influenced the number of active and planned accesses. This work can serve as a foundation for further research leveraging quantitative statistics to unveil hidden structures in the construction of material internet infrastructures and support sustainability in the future allocation of international infrastructure development resources in general.},
    urldate = {2025-03-03},
    journal = {Technological Forecasting and Social Change (TFSC)},
    author = {Franken, Jonas and Reinhold, Thomas and Dörnfeld, Timon and Reuter, Christian},
    month = jun,
    year = {2025},
    keywords = {Selected, Security, A-Paper, Peace, AuswahlPeace, Projekt-ATHENE-SecUrban},
    pages = {124068},
    }

  • Tom Biselli, Katrin Hartwig, Niklas Kneissl, Louis Pouliot, Christian Reuter (2025)
    ChartChecker: A User-Centred Approach to Support the Understanding of Misleading Charts
    Proceedings of the ACM Designing Interactive Systems Conference (DIS) . doi:10.1145/3715336.3735784
    [BibTeX] [Abstract] [Download PDF]

    Misinformation through data visualisation is particularly dangerous because charts are often perceived as objective data representations. While past efforts to counter misinformation have focused on text and, to some extent, images and video, developing user-centred strategies to combat misleading charts remains an unresolved challenge. This study presents a conceptual approach through ChartChecker, a browser-plugin that aims to automatically extract line and bar chart data and detect potentially misleading features such as non-linear axis scales. A participatory design approach was used to develop a user-centred interface to provide transparent, comprehensible information about potentially misleading features in charts. Finally, a think-aloud study (N = 15) with ChartChecker revealed overall satisfaction with the tools’ user interface, comprehensibility, functionality, and usefulness. The results are discussed in terms of improving user engagement, increasing transparency and optimising tools designed to counter misleading information in charts, leading to overarching design implications for user-centred strategies for the visual domain.

    @inproceedings{biselliChartCheckerUserCentredApproach2025,
    series = {{DIS} '25},
    title = {{ChartChecker}: {A} {User}-{Centred} {Approach} to {Support} the {Understanding} of {Misleading} {Charts}},
    url = {https://www.peasec.de/paper/2025/2025_BiselliHartwigKneisslPouiliotReuter_ChartChecker_DIS.pdf},
    doi = {10.1145/3715336.3735784},
    abstract = {Misinformation through data visualisation is particularly dangerous because charts are often perceived as objective data representations. While past efforts to counter misinformation have focused on text and, to some extent, images and video, developing user-centred strategies to combat misleading charts remains an unresolved challenge.
    This study presents a conceptual approach through ChartChecker, a browser-plugin that aims to automatically extract line and bar chart data and detect potentially misleading features such as non-linear axis scales. A participatory design approach was used to develop a user-centred interface to provide transparent, comprehensible information about potentially misleading features in charts. Finally, a think-aloud study (N = 15) with ChartChecker revealed overall satisfaction with the tools' user interface, comprehensibility, functionality, and usefulness. The results are discussed in terms of improving user engagement, increasing transparency and optimising tools designed to counter misleading information in charts, leading to overarching design implications for user-centred strategies for the visual domain.},
    booktitle = {Proceedings of the {ACM} {Designing} {Interactive} {Systems} {Conference} ({DIS})},
    publisher = {Association for Computing Machinery},
    author = {Biselli, Tom and Hartwig, Katrin and Kneissl, Niklas and Pouliot, Louis and Reuter, Christian},
    year = {2025},
    keywords = {Crisis, HCI, Student, A-Paper, Ranking-CORE-A, Projekt-NEBULA, Projekt-ATHENE-PriVis},
    }

  • Miyerlandy Cabanzo Valencia, Laura Guntrum (2025)
    Race, ethnicity, and technology-facilitated violence: The experience of activists in chocó, colombia
    New Media and Society . doi:10.1177/14614448251344286
    [BibTeX] [Abstract]

    Racism extends into the digital realm, manifesting in various forms of technology-facilitated violence (TFV). Although much research centers on the Global North, it is es-sential to investigate this issue in other settings, such as Colombia, where activists are par-ticularly vulnerable to TFV. This study enriches the debate with a qualitative approach, conducting 18 interviews with activists from Chocó and Bogotá. The literature on race and TFV reveals that technology can exacerbate racism through social media, like anonymity, and introduce new forms of racist violence, including deepfakes and algorithmic bias. However, these forms were not prevalent in our interviews. For activists, structural racism, especially limited internet, and electricity access emerged as a primary factor in their ex-periences with racist TFV. Overt TFV escalates to offline threats, silencing dissenting voices. This research emphasizes the need to understand TFV within non-Western regions, advocating for nuanced approaches to addressing digital racism in diverse contexts.

    @article{CabanzoValencia2025,
    title = {Race, ethnicity, and technology-facilitated violence: {The} experience of activists in chocó, colombia},
    doi = {10.1177/14614448251344286},
    abstract = {Racism extends into the digital realm, manifesting in various forms of technology-facilitated violence (TFV). Although much research centers on the Global North, it is es-sential to investigate this issue in other settings, such as Colombia, where activists are par-ticularly vulnerable to TFV. This study enriches the debate with a qualitative approach, conducting 18 interviews with activists from Chocó and Bogotá. The literature on race and TFV reveals that technology can exacerbate racism through social media, like anonymity, and introduce new forms of racist violence, including deepfakes and algorithmic bias. However, these forms were not prevalent in our interviews. For activists, structural racism, especially limited internet, and electricity access emerged as a primary factor in their ex-periences with racist TFV. Overt TFV escalates to offline threats, silencing dissenting voices. This research emphasizes the need to understand TFV within non-Western regions, advocating for nuanced approaches to addressing digital racism in diverse contexts.},
    journal = {New Media and Society},
    author = {Valencia, Miyerlandy Cabanzo and Guntrum, Laura},
    year = {2025},
    keywords = {Security, A-Paper, Peace, Projekt-TraCe, Ranking-ImpfactFactor},
    }

  • Julius von Willich, Frank Nelles, Wen-Jie Tseng, Jan Gugenheimer, Sebastian Günther, Max Mühlhäuser (2025)
    A Qualitative Investigation of User Transitions and Frictions in Cross-Reality Applications
    Proceedings of the Conference on Human Factors in Computing Systems (CHI) New York, NY, USA. doi:10.1145/3706598.3713921
    [BibTeX] [Abstract] [Download PDF]

    Research in Augmented Reality (AR) and Virtual Reality (VR) has mostly viewed them in isolation. Yet, when used together in practical settings, AR and VR each offer unique strengths, necessitating multiple transitions to harness their advantages. This paper investigates potential challenges in Cross-Reality (CR) transitions to inform future application design. We implemented a CR system featuring a 3D modeling task that requires users to switch between PC, AR, and VR. Using a talk-aloud study (n=12) and thematic analysis, we revealed that frictions primarily arose when transitions conflicted with users’ Spatial Mental Model (SMM). Furthermore, we found five transition archetypes employed to enhance productivity once an SMM was established. Our findings uncover that transitions have to focus on establishing and upholding the SMM of users across realities, by communicating differences between them.

    @inproceedings{10.1145/3706598.3713921,
    address = {New York, NY, USA},
    series = {Chi '25},
    title = {A {Qualitative} {Investigation} of {User} {Transitions} and {Frictions} in {Cross}-{Reality} {Applications}},
    isbn = {979-8-4007-1394-1},
    url = {https://www.peasec.de/paper/2025/2025_VonWillichNellesTsengGugenheimerGüntherMühlhäuser_FrictionsCrossReality_CHI.pdf},
    doi = {10.1145/3706598.3713921},
    abstract = {Research in Augmented Reality (AR) and Virtual Reality (VR) has mostly viewed them in isolation. Yet, when used together in practical settings, AR and VR each offer unique strengths, necessitating multiple transitions to harness their advantages. This paper investigates potential challenges in Cross-Reality (CR) transitions to inform future application design. We implemented a CR system featuring a 3D modeling task that requires users to switch between PC, AR, and VR. Using a talk-aloud study (n=12) and thematic analysis, we revealed that frictions primarily arose when transitions conflicted with users’ Spatial Mental Model (SMM). Furthermore, we found five transition archetypes employed to enhance productivity once an SMM was established. Our findings uncover that transitions have to focus on establishing and upholding the SMM of users across realities, by communicating differences between them.},
    booktitle = {Proceedings of the {Conference} on {Human} {Factors} in {Computing} {Systems} ({CHI})},
    publisher = {Association for Computing Machinery},
    author = {von Willich, Julius and Nelles, Frank and Tseng, Wen-Jie and Gugenheimer, Jan and Günther, Sebastian and Mühlhäuser, Max},
    year = {2025},
    note = {Number of pages: 18
    tex.articleno: 808},
    keywords = {HCI, A-Paper, Ranking-CORE-A*, Projekt-emergenCITY, Projekt-ATHENE, emergenCITY\_INF, emergenCITY\_SG},
    }

  • Franz Kuntke, Lars Baumgärtner, Jonas Franken, Christian Reuter (2025)
    Crisis-communication between farms: Disruption-tolerant networking with commodity LoRaWAN hardware
    Information Technology for Development .
    [BibTeX] [Abstract]

    The reliability of communication networks can be compromised by various factors, including natural disasters, which highlights the need for backup systems. In rural areas, where restoring public network infrastructure can take time, an alternative communication channel can be particularly valuable. This study explores the potential of repurposing Long Range Wide Area Networks (LoRaWAN) gateways as multi-hop network nodes to create a digital emergency communication system. Farmers, who are increasingly adopting Low Power Wide Area Networks (LPWANs) and are geographically spread, are identified as key stakeholders for such a system. Using OpenStreetMap data on farm locations, we found that connecting farm communities through LoRa communication is theoretically possible in many areas. Simulations using delay-tolerant network routing protocols confirm the feasibility of this approach under various scenarios. While the general feasability was first evaluated with data from Germany, we also conduct analyses for Uganda. A proof-of-concept implementation demonstrates that small messages can be transmitted successfully using real hardware, validating the concept of a decentralized communication infrastructure based on existing equipment. Additionally, we conducted experiments to measure energy consumption, bandwidth usage, and latency in actual hardware setups. This work contributes to various Sustainable Development Goals by supporting resilient communication infrastructure in underserved areas (SDG 9: Industry, Innovation and Infrastructure), strengthening rural communities that are often the last to recover after emergencies (SDG 10: Reduced Inequalities, SDG 11: Sustainable Cities and Communities), and ultimately helping safeguard food systems through improved agricultural coordination and communication (SDG 2: Zero Hunger).

    @article{kuntke2025crisis,
    title = {Crisis-communication between farms: {Disruption}-tolerant networking with commodity {LoRaWAN} hardware},
    abstract = {The reliability of communication networks can be compromised by various factors, including natural disasters, which highlights the need for backup systems. In rural areas, where restoring public network infrastructure can take time, an alternative communication channel can be particularly valuable. This study explores the potential of repurposing Long Range Wide Area Networks (LoRaWAN) gateways as multi-hop network nodes to create a digital emergency communication system. Farmers, who are increasingly adopting Low Power Wide Area Networks (LPWANs) and are geographically spread, are identified as key stakeholders for such a system. Using OpenStreetMap data on farm locations, we found that connecting farm communities through LoRa communication is theoretically possible in many areas. Simulations using delay-tolerant network routing protocols confirm the feasibility of this approach under various scenarios. While the general feasability was first evaluated with data from Germany, we also conduct analyses for Uganda. A proof-of-concept implementation demonstrates that small messages can be transmitted successfully using real hardware, validating the concept of a decentralized communication infrastructure based on existing equipment. Additionally, we conducted experiments to measure energy consumption, bandwidth usage, and latency in actual hardware setups. This work contributes to various Sustainable Development Goals by supporting resilient communication infrastructure in underserved areas (SDG 9: Industry, Innovation and Infrastructure), strengthening rural communities that are often the last to recover after emergencies (SDG 10: Reduced Inequalities, SDG 11: Sustainable Cities and Communities), and ultimately helping safeguard food systems through improved agricultural coordination and communication (SDG 2: Zero Hunger).},
    journal = {Information Technology for Development},
    author = {Kuntke, Franz and Baumgärtner, Lars and Franken, Jonas and Reuter, Christian},
    year = {2025},
    keywords = {UsableSec, Security, A-Paper, Projekt-emergenCITY, Projekt-AgriRegio, emergenCITY\_INF, emergenCITY\_SG},
    }

  • Laura Guntrum, Christian Reuter (2025)
    Activists’ strategies for coping with technology-facilitated violence in the global south
    ACM Transactions on Computer-Human Interaction (TOCHI) . doi:10.1145/3762811
    [BibTeX] [Abstract] [Download PDF]

    Activists’ use of ICTs in contexts affected by violence poses challenges like digital surveillance. Based on 92 interviews with activists from Bolivia, Cameroon, Costa Rica, Colombia, India, Myanmar, and Nicaragua, this study explores their protection and coping strategies against technology-facilitated violence. Findings show limited emphasis on digital security and privacy-enhancing technologies, primarily due to the usability and familiarity with popular applications, coupled with relative unfamiliarity with other features. Generally, some precautions, like avoiding real-time location sharing, are common. While many protection strategies are similar, some are shaped by local factors like internet shutdowns and different adversaries’ capabilities. The findings demonstrate that some tools and features, such as VPN, may offer protection but also pose risks, e.g., in the case of criminalization, highlighting the crucial role of local context. Designing secure and usable features that account for the varying levels of limitations, such as poor connectivity and risks activists face, is essential.

    @article{Guntrum2025,
    title = {Activists' strategies for coping with technology-facilitated violence in the global south},
    issn = {1073-0516},
    url = {https://doi.org/10.1145/3762811},
    doi = {10.1145/3762811},
    abstract = {Activists' use of ICTs in contexts affected by violence poses challenges like digital surveillance. Based on 92 interviews with activists from Bolivia, Cameroon, Costa Rica, Colombia, India, Myanmar, and Nicaragua, this study explores their protection and coping strategies against technology-facilitated violence. Findings show limited emphasis on digital security and privacy-enhancing technologies, primarily due to the usability and familiarity with popular applications, coupled with relative unfamiliarity with other features. Generally, some precautions, like avoiding real-time location sharing, are common. While many protection strategies are similar, some are shaped by local factors like internet shutdowns and different adversaries' capabilities. The findings demonstrate that some tools and features, such as VPN, may offer protection but also pose risks, e.g., in the case of criminalization, highlighting the crucial role of local context. Designing secure and usable features that account for the varying levels of limitations, such as poor connectivity and risks activists face, is essential.},
    journal = {ACM Transactions on Computer-Human Interaction (TOCHI)},
    author = {Guntrum, Laura and Reuter, Christian},
    year = {2025},
    keywords = {A-Paper, Ranking-CORE-A*, Peace, AuswahlPeace, Projekt-TraCe, Projekt-ATHENE-PriVis},
    }

    Alle Paper 2025

    Begutachtete Zeitschriften / Peer-reviewed Journals

  • Thea Riebe, Laura Guntrum, Lilian Reichert, Christian Reuter (2025)
    Social media in crisis communication: insights from peace operations on the African continent
    i-com ;24(2):363–384. doi:10.1515/icom-2025-0006
    [BibTeX] [Abstract] [Download PDF]

    Social media plays a crucial role in United Nations (UN) peace operations, which are typically deployed in regions affected by conflict to promote peace, facilitate political dialogue, and support post-conflict reconstruction efforts. The UN has introduced the concept of the digital peacekeeper, whose role is to collect and analyse public data, with a particular focus on social media. This article explores the role of official social media use by African peace operations (POs) between 2003 and 2024 through a qualitative analysis of 126 UN documents. The findings reveal that African POs employ a diverse communication strategy, primarily centred on disseminating information, education, and access to reliable information in disrupted contexts. However, the full potential of social media is not realised, resulting in a predominantly one-way communication model. Using affordance theory for social media, the paper demonstrates how bidirectional interactions could support sustainable peace efforts.

    @article{riebeSocialMediaCrisis2025,
    title = {Social media in crisis communication: insights from peace operations on the {African} continent},
    volume = {24},
    copyright = {De Gruyter expressly reserves the right to use all content for commercial text and data mining within the meaning of Section 44b of the German Copyright Act.},
    issn = {2196-6826},
    shorttitle = {Social media in crisis communication},
    url = {https://www.degruyterbrill.com/document/doi/10.1515/icom-2025-0006/html},
    doi = {10.1515/icom-2025-0006},
    abstract = {Social media plays a crucial role in United Nations (UN) peace operations, which are typically deployed in regions affected by conflict to promote peace, facilitate political dialogue, and support post-conflict reconstruction efforts. The UN has introduced the concept of the digital peacekeeper, whose role is to collect and analyse public data, with a particular focus on social media. This article explores the role of official social media use by African peace operations (POs) between 2003 and 2024 through a qualitative analysis of 126 UN documents. The findings reveal that African POs employ a diverse communication strategy, primarily centred on disseminating information, education, and access to reliable information in disrupted contexts. However, the full potential of social media is not realised, resulting in a predominantly one-way communication model. Using affordance theory for social media, the paper demonstrates how bidirectional interactions could support sustainable peace efforts.},
    language = {en},
    number = {2},
    urldate = {2025-10-07},
    journal = {i-com},
    author = {Riebe, Thea and Guntrum, Laura and Reichert, Lilian and Reuter, Christian},
    month = aug,
    year = {2025},
    note = {Publisher: Oldenbourg Wissenschaftsverlag},
    keywords = {Student, Peace, Projekt-ATHENE},
    pages = {363--384},
    }

  • Laura Guntrum, Daniela Forero Nuñez, Christian Reuter (2025)
    Chilling or resisting? Exploring the influence of technology-facilitated (gender-based) violence on female feminists in Colombia and Costa Rica
    i-com – Journal of Interactive Media . doi:10.1515/icom-2025-0004
    [BibTeX] [Abstract] [Download PDF]

    The shrinking of secure online spaces and incidents of technology-facilitated (gender-based) violence (TF(GB)V) against female feminists have partially led to self-censorship, thereby constricting public discourse. To unravel the impact of increasing TF(GB)V on feminist mobilization, 22 interviews with Costa Rican and Colombian, female feminists advocating for feminist issues, such as reproductive rights, were conducted. All interviewees, advocating for often perceived controversial topics within patriarchal societies, have experienced forms of TF(GB)V, including misogynistic hate speech. In reaction to this violence, interviewees respond in varying ways – some reduce their social media activity, while others develop personal coping strategies. In fact, most interviewees engage in both chilling and resistance mechanisms concurrently. Increased awareness of potential consequences and coping mechanisms of female feminists when experiencing TF(GB)V helps to develop gender-sensitive mechanisms to protect (female) activists and foster a safer online environment. While measures such as IT security training for activists, enhanced content moderation on platforms, and gender-sensitive design approaches are crucial, addressing the underlying issue – the targeting of feminists with violence – is imperative. Without such efforts, there is a risk that affected individuals withdraw from digital spaces, thereby limiting the diversity of narratives that shape public discourse online.

    @article{guntrumChillingResistingExploring2025,
    title = {Chilling or resisting? {Exploring} the influence of technology-facilitated (gender-based) violence on female feminists in {Colombia} and {Costa} {Rica}},
    issn = {2196-6826},
    shorttitle = {Chilling or resisting?},
    url = {https://www.degruyterbrill.com/document/doi/10.1515/icom-2025-0004/html},
    doi = {10.1515/icom-2025-0004},
    abstract = {The shrinking of secure online spaces and incidents of technology-facilitated (gender-based) violence (TF(GB)V) against female feminists have partially led to self-censorship, thereby constricting public discourse. To unravel the impact of increasing TF(GB)V on feminist mobilization, 22 interviews with Costa Rican and Colombian, female feminists advocating for feminist issues, such as reproductive rights, were conducted. All interviewees, advocating for often perceived controversial topics within patriarchal societies, have experienced forms of TF(GB)V, including misogynistic hate speech. In reaction to this violence, interviewees respond in varying ways – some reduce their social media activity, while others develop personal coping strategies. In fact, most interviewees engage in both chilling and resistance mechanisms concurrently. Increased awareness of potential consequences and coping mechanisms of female feminists when experiencing TF(GB)V helps to develop gender-sensitive mechanisms to protect (female) activists and foster a safer online environment. While measures such as IT security training for activists, enhanced content moderation on platforms, and gender-sensitive design approaches are crucial, addressing the underlying issue – the targeting of feminists with violence – is imperative. Without such efforts, there is a risk that affected individuals withdraw from digital spaces, thereby limiting the diversity of narratives that shape public discourse online.},
    language = {en},
    journal = {i-com – Journal of Interactive Media},
    author = {Guntrum, Laura and Nuñez, Daniela Forero and Reuter, Christian},
    month = jul,
    year = {2025},
    note = {Publisher: Oldenbourg Wissenschaftsverlag},
    keywords = {HCI, Peace, Projekt-TraCe, Projekt-ATHENE},
    }

  • Christian Reuter, Amanda Lee Hughes, Cody Buntain (2025)
    Combating Information Warfare: State and Trends in User-Centered Countermeasures against Fake News and Misinformation
    Behaviour & Information Technology (BIT) ;44(13):3348–3361. doi:10.1080/0144929X.2024.2442486
    [BibTeX] [Abstract] [Download PDF]

    The rise of fake news and misinformation in the digital age poses serious risks for individuals and society, particularly during crises like the Israel-Hamas war, the Russian-Ukraine war, or the COVID-19 pandemic. Misinformation serves as a tool to manipulate public opinion and create discord. Vulnerability to manipulation increases in online spaces during crises, where authoritative information is scarce. Emergency management, public health, political and public administration, as well as media professionals and citizens express concern and seek solutions to enhance information quality during such critical times. This article highlights user-centred approaches to countering fake news and misinformation, tracing their historical evolution from ancient Greece to the present, focussing on their relevance during the COVID-19 crisis and in contemporary information warfare. It describes the vulnerability of audiences to misinformation and outlines prevailing trends in user-centred countermeasures. This article also introduces recent research on the effectiveness of media literacy interventions on truth discernment, a cross-cultural comparison of the perception of negative consequences and the injunctive norm, a comparison of video and text to promote lateral reading in adolescents, content-specific indicators on Twitter from a user perspective, a learning system for detecting misinformation as well as ethical and security considerations in automated detection.

    @article{reuterCombatingInformationWarfare2025,
    title = {Combating {Information} {Warfare}: {State} and {Trends} in {User}-{Centered} {Countermeasures} against {Fake} {News} and {Misinformation}},
    volume = {44},
    issn = {0144-929X},
    url = {https://doi.org/10.1080/0144929X.2024.2442486},
    doi = {10.1080/0144929X.2024.2442486},
    abstract = {The rise of fake news and misinformation in the digital age poses serious risks for individuals and society, particularly during crises like the Israel-Hamas war, the Russian-Ukraine war, or the COVID-19 pandemic. Misinformation serves as a tool to manipulate public opinion and create discord. Vulnerability to manipulation increases in online spaces during crises, where authoritative information is scarce. Emergency management, public health, political and public administration, as well as media professionals and citizens express concern and seek solutions to enhance information quality during such critical times. This article highlights user-centred approaches to countering fake news and misinformation, tracing their historical evolution from ancient Greece to the present, focussing on their relevance during the COVID-19 crisis and in contemporary information warfare. It describes the vulnerability of audiences to misinformation and outlines prevailing trends in user-centred countermeasures. This article also introduces recent research on the effectiveness of media literacy interventions on truth discernment, a cross-cultural comparison of the perception of negative consequences and the injunctive norm, a comparison of video and text to promote lateral reading in adolescents, content-specific indicators on Twitter from a user perspective, a learning system for detecting misinformation as well as ethical and security considerations in automated detection.},
    number = {13},
    journal = {Behaviour \& Information Technology (BIT)},
    author = {Reuter, Christian and Hughes, Amanda Lee and Buntain, Cody},
    year = {2025},
    keywords = {A-Paper, Crisis, HCI, Peace, Projekt-NEBULA, Ranking-CORE-A, Ranking-ImpactFactor, SocialMedia},
    pages = {3348--3361},
    }

  • Markus Bayer, Justin Lutz, Christian Reuter (2025)
    ActiveLLM: Large Language Model-based Active Learning for Textual Few-Shot Scenarios
    Transactions of the Association for Computational Linguistics (TACL) . doi:10.48550/arXiv.2405.10808
    [BibTeX] [Abstract] [Download PDF]

    Active learning is designed to minimize annotation efforts by prioritizing instances that most enhance learning. However, many active learning strategies struggle with a ‘coldstart’ problem, needing substantial initial data to be effective. This limitation reduces their utility in the increasingly relevant fewshot scenarios, where the instance selection has a substantial impact. To address this, we introduce ActiveLLM, a novel active learning approach that leverages Large Language Models such as GPT-4, o1, Llama 3, or Mistral Large for selecting instances. We demonstrate that ActiveLLM significantly enhances the classification performance of BERT classifiers in few-shot scenarios, outperforming traditional active learning methods as well as improving the few-shot learning methods ADAPET, PERFECT, and Set- Fit. Additionally, ActiveLLM can be extended to non-few-shot scenarios, allowing for iterative selections. In this way, ActiveLLM can even help other active learning strategies to overcome their cold-start problem. Our results suggest that ActiveLLM offers a promising solution for improving model performance across various learning setups.

    @article{bayerActiveLLMLargeLanguage2025,
    title = {{ActiveLLM}: {Large} {Language} {Model}-based {Active} {Learning} for {Textual} {Few}-{Shot} {Scenarios}},
    url = {https://arxiv.org/pdf/2405.10808},
    doi = {10.48550/arXiv.2405.10808},
    abstract = {Active learning is designed to minimize annotation
    efforts by prioritizing instances that
    most enhance learning. However, many active
    learning strategies struggle with a ‘coldstart’
    problem, needing substantial initial
    data to be effective. This limitation reduces
    their utility in the increasingly relevant fewshot
    scenarios, where the instance selection
    has a substantial impact. To address this, we
    introduce ActiveLLM, a novel active learning
    approach that leverages Large Language
    Models such as GPT-4, o1, Llama 3, or
    Mistral Large for selecting instances. We
    demonstrate that ActiveLLM significantly
    enhances the classification performance of
    BERT classifiers in few-shot scenarios, outperforming
    traditional active learning methods
    as well as improving the few-shot learning
    methods ADAPET, PERFECT, and Set-
    Fit. Additionally, ActiveLLM can be extended
    to non-few-shot scenarios, allowing
    for iterative selections. In this way, ActiveLLM
    can even help other active learning
    strategies to overcome their cold-start problem.
    Our results suggest that ActiveLLM
    offers a promising solution for improving
    model performance across various learning
    setups.},
    journal = {Transactions of the Association for Computational Linguistics (TACL)},
    author = {Bayer, Markus and Lutz, Justin and Reuter, Christian},
    year = {2025},
    keywords = {Student, UsableSec, Security, A-Paper, Projekt-CYLENCE, Projekt-ATHENE-CyAware, CORE-A*},
    }

  • Thea Riebe, Anja-Liisa Gonsior, Lilian Reichert, Christian Reuter (2025)
    Envisioning Human-Machine Interaction in Future Warfare: Defence Industry Narratives on Human Control of Autonomous Weapon Systems
    Global Society ;39(4):421–445. doi:10.1080/13600826.2024.2436966
    [BibTeX] [Abstract] [Download PDF]

    The development of artificial intelligence and autonomous functions in the military domain has an immense impact on technologies being developed by the private defence industry. Defence firms contribute to the narratives and visions on autonomous weapon systems and the future of warfare, e.g. in the form of strategic marketing of their products. However, their role has so far been understudied, especially regarding autonomous weapon systems. As the normative debate revolves around aspects of human control, this work examines the narratives of (meaningful) human control in the marketing of autonomous military systems by defence manufacturers. Based on a comprehensive content analysis of twenty defence firms, we identified three main narratives, which envision autonomy as a military advantage, the role of the human in the future of warfare, and human-machine teaming. Based on the results, we argue that defence companies reproduce and adapt narratives which shape expectations and visions of human control of autonomous weapon systems in anticipation of emerging norms for (meaningful) human control. However, without specifications and verification mechanisms, there is no indication that human control will be meaningful.

    @article{riebeEnvisioningHumanMachineInteraction2025a,
    title = {Envisioning {Human}-{Machine} {Interaction} in {Future} {Warfare}: {Defence} {Industry} {Narratives} on {Human} {Control} of {Autonomous} {Weapon} {Systems}},
    volume = {39},
    issn = {1360-0826},
    url = {https://doi.org/10.1080/13600826.2024.2436966},
    doi = {10.1080/13600826.2024.2436966},
    abstract = {The development of artificial intelligence and autonomous functions in the military domain has an immense impact on technologies being developed by the private defence industry. Defence firms contribute to the narratives and visions on autonomous weapon systems and the future of warfare, e.g. in the form of strategic marketing of their products. However, their role has so far been understudied, especially regarding autonomous weapon systems. As the normative debate revolves around aspects of human control, this work examines the narratives of (meaningful) human control in the marketing of autonomous military systems by defence manufacturers. Based on a comprehensive content analysis of twenty defence firms, we identified three main narratives, which envision autonomy as a military advantage, the role of the human in the future of warfare, and human-machine teaming. Based on the results, we argue that defence companies reproduce and adapt narratives which shape expectations and visions of human control of autonomous weapon systems in anticipation of emerging norms for (meaningful) human control. However, without specifications and verification mechanisms, there is no indication that human control will be meaningful.},
    number = {4},
    journal = {Global Society},
    author = {Riebe, Thea and Gonsior, Anja-Liisa and Reichert, Lilian and Reuter, Christian},
    year = {2025},
    keywords = {HCI, Student, A-Paper, Ranking-ImpactFactor, Peace, AuswahlPeace, Projekt-TraCe, Projekt-ATHENE-CyAware},
    pages = {421--445},
    }

  • Enno Steinbrink, Laura Guntrum, Christian Reuter (2025)
    Smartphone and ICT Use Among Ukrainian Refugees: Technology Support during War, Flight, and Adaptation in Germany
    Proceedings of the ACM: Human Computer Interaction (PACM): Computer-Supported Cooperative Work and Social Computing (CSCW). doi:10.1145/3711067
    [BibTeX] [Abstract] [Download PDF]

    In conflict-ridden environments, timely and accurate information is critical for those dealing with the dynamic of events. When individuals have to flee, it becomes evident that refugees frequently rely on information and communication technologies (ICT) for information acquisition, travel coordination, and maintaining connections with related parties. Based on 17 interviews, this research explores how Ukrainian refugees, who sought protection in Germany due to the 2022 Russian full-scale invasion, use ICT before, during, and after their flight. By providing empirical findings, the results show in depth how contextual factors, such as infrastructural instability, privacy concerns and an advanced digitalization, interrelate with user behaviors. Analyzing the multifaceted civilian ICT use in the context of war and flight, this exploratory research contributes to the existing research on HCI in migration contexts and connects to several topics of CSCW. By contrasting case specifics, this work highlights what makes Ukraine a special case in this research area. Furthermore, this paper examines both existing and emerging affordances of ICT in the context of flight, and identifies the crucial role of messenger groups for information gathering in all phases of the flight. Lastly, collaborative dimensions of the identified affordances are discussed.

    @article{steinbrinkSmartphoneICTUse2025,
    title = {Smartphone and {ICT} {Use} {Among} {Ukrainian} {Refugees}: {Technology} {Support} during {War}, {Flight}, and {Adaptation} in {Germany}},
    url = {https://www.peasec.de/paper/2025/2025_SteinbrinkGuntrumReuter_Ukraine_CSCW.pdf},
    doi = {10.1145/3711067},
    abstract = {In conflict-ridden environments, timely and accurate information is critical for those dealing with the dynamic of events. When individuals have to flee, it becomes evident that refugees frequently rely on information and communication technologies (ICT) for information acquisition, travel coordination, and maintaining connections with related parties. Based on 17 interviews, this research explores how Ukrainian refugees, who sought protection in Germany due to the 2022 Russian full-scale invasion, use ICT before, during, and after their flight. By providing empirical findings, the results show in depth how contextual factors, such as infrastructural instability, privacy concerns and an advanced digitalization, interrelate with user behaviors. Analyzing the multifaceted civilian ICT use in the context of war and flight, this exploratory research contributes to the existing research on HCI in migration contexts and connects to several topics of CSCW. By contrasting case specifics, this work highlights what makes Ukraine a special case in this research area. Furthermore, this paper examines both existing and emerging affordances of ICT in the context of flight, and identifies the crucial role of messenger groups for information gathering in all phases of the flight. Lastly, collaborative dimensions of the identified affordances are discussed.},
    number = {CSCW},
    journal = {Proceedings of the ACM: Human Computer Interaction (PACM): Computer-Supported Cooperative Work and Social Computing},
    author = {Steinbrink, Enno and Guntrum, Laura and Reuter, Christian},
    year = {2025},
    note = {Place: New York, NY, USA
    Publisher: Association for Computing Machinery},
    keywords = {Crisis, HCI, UsableSec, A-Paper, Ranking-CORE-A, Projekt-GRKPrivacy, Projekt-TraCe, Projekt-ATHENE},
    }

  • Julian Bäumler, Thea Riebe, Marc-André Kaufhold, Christian Reuter (2025)
    Harnessing Inter-Organizational Collaboration and Automation to Combat Online Hate Speech: A Qualitative Study with German Reporting Centers
    Proceedings of the ACM: Human Computer Interaction (PACM): Computer-Supported Cooperative Work and Social Computing . doi:10.1145/3710991
    [BibTeX] [Abstract] [Download PDF]

    In Germany and other countries, specialized non-profit reporting centers combat online hate speech by submitting criminal content to law enforcement agencies, forwarding deletion requests to social media platforms, and providing counseling to victims, thus contributing to the governance mechanism of content moderation as intermediaries between victims and various organizations. Whereas research in computer-supported cooperative work has extensively explored collaboration of and automation for content moderators, there are no works that focus on reporting centers. Based on expert interviews with their staff (N=15), this study finds that most German centers share a collaborative workflow, of which multiple tasks are heavily dependent on inter-organizational exchange. However, there are differences in their implementation of monitoring, content assessment, automation technology adoption, and external collaborators. As the centers are faced with diverse challenges, such as borderline case assessment, psychological burdens, limited visibility, conflicting goals with other actors, and manual repetitive work, our study contributes with nine implications for designing and researching supportive technologies. They provide suggestions for improving hate speech gathering and reporting, researching hate speech prioritization and assessment algorithms, and designing case processing systems. Beyond that, we outline directions for research on inter-organizational collaboration.

    @article{baumlerHarnessingInterOrganizationalCollaboration2025,
    title = {Harnessing {Inter}-{Organizational} {Collaboration} and {Automation} to {Combat} {Online} {Hate} {Speech}: {A} {Qualitative} {Study} with {German} {Reporting} {Centers}},
    url = {https://dl.acm.org/doi/10.1145/3710991},
    doi = {10.1145/3710991},
    abstract = {In Germany and other countries, specialized non-profit reporting centers combat online hate speech by submitting criminal content to law enforcement agencies, forwarding deletion requests to social media platforms, and providing counseling to victims, thus contributing to the governance mechanism of content moderation as intermediaries between victims and various organizations. Whereas research in computer-supported cooperative work has extensively explored collaboration of and automation for content moderators, there are no works that focus on reporting centers. Based on expert interviews with their staff (N=15), this study finds that most German centers share a collaborative workflow, of which multiple tasks are heavily dependent on inter-organizational exchange. However, there are differences in their implementation of monitoring, content assessment, automation technology adoption, and external collaborators. As the centers are faced with diverse challenges, such as borderline case assessment, psychological burdens, limited visibility, conflicting goals with other actors, and manual repetitive work, our study contributes with nine implications for designing and researching supportive technologies. They provide suggestions for improving hate speech gathering and reporting, researching hate speech prioritization and assessment algorithms, and designing case processing systems. Beyond that, we outline directions for research on inter-organizational collaboration.},
    journal = {Proceedings of the ACM: Human Computer Interaction (PACM): Computer-Supported Cooperative Work and Social Computing},
    author = {Bäumler, Julian and Riebe, Thea and Kaufhold, Marc-André and Reuter, Christian},
    year = {2025},
    keywords = {AuswahlCrisis, Crisis, HCI, A-Paper, Ranking-CORE-A, Projekt-CYWARN, Projekt-CYLENCE},
    }

  • Tom Biselli, Katrin Hartwig, Christian Reuter (2025)
    Mitigating Misinformation Sharing on Social Media through Personalised Nudging
    Proceedings of the ACM: Human Computer Interaction (PACM): Computer-Supported Cooperative Work and Social Computing ;9(2). doi:https://doi.org/10.1145/3711034
    [BibTeX] [Abstract] [Download PDF]

    The ongoing challenge of misinformation on social media motivates ongoing efforts to find effective countermeasures. In this study, we evaluated the potential of personalised nudging to reduce the sharing of misinformation on social media, as personalised support has been successfully applied in other areas of critical information handling. In an online experiment (N = 396) exposing users to social media posts, we assessed the degree of misinformation sharing between groups receiving (1) no nudges, (2) non-personalised nudges, and (3) personalised nudges. Personalisation was based on three psychometric dimensions – general decision-making style, consideration of future consequences, need for cognition – to assign the most appropriate nudge from a pool of five nudges. The results showed significant differences (p {\textless} .05) between all three groups, with the personalised nudge group sharing the least misinformation. Detailed analyses at the nudge level revealed that one nudge was universally effective and two nudges were effective only in their personalised form. The results generally confirm the potential of personalisation, although the effect is limited in scope. These findings shed light on the nuanced results of nudging studies, highlight the benefits of personalisation, and raise ethical considerations regarding the privacy implications of personalisation and those inherent in nudges.

    @article{biselliMitigatingMisinformationSharing2025,
    title = {Mitigating {Misinformation} {Sharing} on {Social} {Media} through {Personalised} {Nudging}},
    volume = {9},
    url = {https://www.peasec.de/paper/2025/2025_BiselliHartwigReuter_PersonalisedNudges_CSCW.pdf},
    doi = {https://doi.org/10.1145/3711034},
    abstract = {The ongoing challenge of misinformation on social media motivates ongoing efforts to find effective countermeasures.
    In this study, we evaluated the potential of personalised nudging to reduce the sharing of misinformation on social media, as personalised support has been successfully applied in other areas of critical information handling.
    In an online experiment (N = 396) exposing users to social media posts, we assessed the degree of misinformation sharing between groups receiving (1) no nudges, (2) non-personalised nudges, and (3) personalised nudges. Personalisation was based on three psychometric dimensions - general decision-making style, consideration of future consequences, need for cognition - to assign the most appropriate nudge from a pool of five nudges.
    The results showed significant differences (p {\textless} .05) between all three groups, with the personalised nudge group sharing the least misinformation. Detailed analyses at the nudge level revealed that one nudge was universally effective and two nudges were effective only in their personalised form.
    The results generally confirm the potential of personalisation, although the effect is limited in scope.
    These findings shed light on the nuanced results of nudging studies, highlight the benefits of personalisation, and raise ethical considerations regarding the privacy implications of personalisation and those inherent in nudges.},
    number = {2},
    journal = {Proceedings of the ACM: Human Computer Interaction (PACM): Computer-Supported Cooperative Work and Social Computing},
    author = {Biselli, Tom and Hartwig, Katrin and Reuter, Christian},
    year = {2025},
    keywords = {Crisis, HCI, A-Paper, Ranking-CORE-A, Projekt-NEBULA, Projekt-ATHENE-PriVis},
    }

  • Stefka Schmid, Daniel Lambach, Carlo Diehl, Christian Reuter (2025)
    Arms Race or Innovation Race? Geopolitical AI Development
    Geopolitics ;30(4):1907–1936. doi:10.1080/14650045.2025.2456019
    [BibTeX] [Abstract] [Download PDF]

    China, the United States, and the European Union have spoken of a global competition surrounding Artificial Intelligence (AI). There is widespread talk of an ‘AI Arms Race’. But what is the nature of this race? We argue that the arms race metaphor does not capture the dynamics of global competition in the AI sector. Instead, we propose the notion of a ‘geopolitical innovation race’ for technological leadership in a networked global economy. Based on an analysis of government documents, we find that actors (1) are open to both zero-sum or positive-sum approaches in AI development, (2) organise actor networks differently based on national innovation cultures, (3) prioritise economics and status next to security concerns, and (4) are open to how AI should be interpreted. Referring to the competitive race of AI research and development, the three technopoles perpetuate the geopoliticisation of innovation and intertwine security and economic interests.

    @article{schmidArmsRaceInnovation2025,
    title = {Arms {Race} or {Innovation} {Race}? {Geopolitical} {AI} {Development}},
    volume = {30},
    issn = {1465-0045},
    url = {https://doi.org/10.1080/14650045.2025.2456019},
    doi = {10.1080/14650045.2025.2456019},
    abstract = {China, the United States, and the European Union have spoken of a global competition surrounding Artificial Intelligence (AI). There is widespread talk of an ‘AI Arms Race’. But what is the nature of this race? We argue that the arms race metaphor does not capture the dynamics of global competition in the AI sector. Instead, we propose the notion of a ‘geopolitical innovation race’ for technological leadership in a networked global economy. Based on an analysis of government documents, we find that actors (1) are open to both zero-sum or positive-sum approaches in AI development, (2) organise actor networks differently based on national innovation cultures, (3) prioritise economics and status next to security concerns, and (4) are open to how AI should be interpreted. Referring to the competitive race of AI research and development, the three technopoles perpetuate the geopoliticisation of innovation and intertwine security and economic interests.},
    number = {4},
    journal = {Geopolitics},
    author = {Schmid, Stefka and Lambach, Daniel and Diehl, Carlo and Reuter, Christian},
    year = {2025},
    note = {Publisher: Routledge},
    keywords = {Selected, A-Paper, Ranking-ImpactFactor, Peace, AuswahlPeace, Projekt-TraCe, Projekt-ATHENE},
    pages = {1907--1936},
    }

  • Thea Riebe, Christian Reuter (2025)
    Technology and the Transformation of Political Violence – Editorial of the ZeFKo Special Section
    Zeitschrift für Friedens- und Konfliktforschung (ZeFKo) ;15(1). doi:10.1007/s42597-025-00142-9
    [BibTeX] [Abstract] [Download PDF]

    The global efforts to reduce armament after the end of the Cold War have been stalled due to rising nationalist ambitions. Within this dynamic, military technologies are evolving and contributing to the changing dynamics of arms races. These challenges posed by new and established arms technologies were discussed in the interdisciplinary conference “Science – Peace – Security ’23” (SPS’23) held from September 20 to Friday, September 22, 2023, at the Technical University of Darmstadt. The conference brought together interdisciplinary scholars to discuss the role of these technologies in wars and conflicts, as well as approaches toward arms control and non-proliferation. Three of the contributions are part of this special section. Almuntaser Albalawi and Kristoffer provide an in-depth analysis of the four primary mechanisms investigating alleged chemical weapons use in Syria. Zenobia S. Homan and Saman Omar explore the influence of media coverage on chemical weapon attacks in the Kurdistan Region of Iraq. Bandarra et al. examine the critical role of International Atomic Energy Agency (IAEA) safeguards in preventing nuclear weapons proliferation. All these contributions highlight the need to critically assess and update arms control regimes, mechanisms, and instruments to adapt to the transformation of political violence, e.g., providing access to information and improving trust in institutions and international cooperation.

    @article{riebeTechnologyTransformationPolitical2025,
    title = {Technology and the {Transformation} of {Political} {Violence} - {Editorial} of the {ZeFKo} {Special} {Section}},
    volume = {15},
    url = {https://link.springer.com/article/10.1007/s42597-025-00142-9},
    doi = {10.1007/s42597-025-00142-9},
    abstract = {The global efforts to reduce armament after the end of the Cold War have been stalled due to rising nationalist ambitions. Within this dynamic, military technologies are evolving and contributing to the changing dynamics of arms races. These challenges posed by new and established arms technologies were discussed in the interdisciplinary conference "Science - Peace - Security '23" (SPS'23) held from September 20 to Friday, September 22, 2023, at the Technical University of Darmstadt. The conference brought together interdisciplinary scholars to discuss the role of these technologies in wars and conflicts, as well as approaches toward arms control and non-proliferation. Three of the contributions are part of this special section. Almuntaser Albalawi and Kristoffer provide an in-depth analysis of the four primary mechanisms investigating alleged chemical weapons use in Syria. Zenobia S. Homan and Saman Omar explore the influence of media coverage on chemical weapon attacks in the Kurdistan Region of Iraq. Bandarra et al. examine the critical role of International Atomic Energy Agency (IAEA) safeguards in preventing nuclear weapons proliferation. All these contributions highlight the need to critically assess and update arms control regimes, mechanisms, and instruments to adapt to the transformation of political violence, e.g., providing access to information and improving trust in institutions and international cooperation.},
    number = {1},
    journal = {Zeitschrift für Friedens- und Konfliktforschung (ZeFKo)},
    author = {Riebe, Thea and Reuter, Christian},
    year = {2025},
    keywords = {Security, Peace, Projekt-CROSSING, Projekt-TraCe},
    }

  • Julian Bäumler, Georg Voronin, Marc-André Kaufhold (2025)
    Cyber Hate Awareness: Information Types and Technologies Relevant to the Law Enforcement and Reporting Center Domain
    i-com – Journal of Interactive Media ;24(1). doi:10.1515/icom-2024-0062
    [BibTeX] [Abstract] [Download PDF]

    In Germany, both law enforcement agencies (LEAs) and dedicated reporting centers (RCs) engage in various activities to counter illegal online hate speech (HS). Due to the high volume of such content and against the background of limited resources, their personnel can be confronted with the issue of information overload. To mitigate this issue, information filtering, classification, prioritization, and visualization technologies offer great potential. However, a nuanced understanding of situational awareness is required to inform the domain-sensitive implementation of supportive technology and adequate decision-making. Although previous research has explored the concept of situational awareness in policing, it has not been studied in relation to online HS. Based on a qualitative research design employing a thematic analysis of qualitative expert interviews with practitioners from German LEAs and RCs (N=29), we will contribute to the state of research in human-computer interaction with a systematization of 23 information types of relevance for situational awareness of online HS in the law enforcement and RC domain. On that basis, we identify victim, perpetrator, context, evidence, legal, and threat awareness as domain-specific situational awareness sub-types and formulate ten implications for designing reporting, open-source intelligence, classification, and visual analytics tools.

    @article{baumlerCyberHateAwareness2025,
    title = {Cyber {Hate} {Awareness}: {Information} {Types} and {Technologies} {Relevant} to the {Law} {Enforcement} and {Reporting} {Center} {Domain}},
    volume = {24},
    issn = {2196-6826},
    shorttitle = {Cyber hate awareness},
    url = {https://www.degruyter.com/document/doi/10.1515/icom-2024-0062/html},
    doi = {10.1515/icom-2024-0062},
    abstract = {In Germany, both law enforcement agencies (LEAs) and dedicated reporting centers (RCs) engage in various activities to counter illegal online hate speech (HS). Due to the high volume of such content and against the background of limited resources, their personnel can be confronted with the issue of information overload. To mitigate this issue, information filtering, classification, prioritization, and visualization technologies offer great potential. However, a nuanced understanding of situational awareness is required to inform the domain-sensitive implementation of supportive technology and adequate decision-making. Although previous research has explored the concept of situational awareness in policing, it has not been studied in relation to online HS. Based on a qualitative research design employing a thematic analysis of qualitative expert interviews with practitioners from German LEAs and RCs (N=29), we will contribute to the state of research in human-computer interaction with a systematization of 23 information types of relevance for situational awareness of online HS in the law enforcement and RC domain. On that basis, we identify victim, perpetrator, context, evidence, legal, and threat awareness as domain-specific situational awareness sub-types and formulate ten implications for designing reporting, open-source intelligence, classification, and visual analytics tools.},
    number = {1},
    journal = {i-com - Journal of Interactive Media},
    author = {Bäumler, Julian and Voronin, Georg and Kaufhold, Marc-André},
    year = {2025},
    keywords = {Crisis, HCI, Projekt-CYLENCE, Projekt-ATHENE-CyAware},
    }

  • Markus Henkel, Steffen Haesler, Hiba Al-Najmi, Frank Hessel, Christian Reuter (2025)
    The House That Saves Me? Assessing the Role of Smart Home Automation in Warning Scenarios
    Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies (IMWUT) ;9(1):5:1–5:32. doi:10.1145/3712269
    [BibTeX] [Abstract] [Download PDF]

    As smart home technology becomes integral to modern living, researchers must consider safety aspects. While single-purpose devices alert users to specific dangers, integrating them within comprehensive smart home warning systems (SHWSs) offers new safety potentials by allowing actuators to respond to threats based on predefined protocols. Key questions include whether user preferences for automation levels in smart homes are affected by different warning scenarios, and how unwanted automation or false positives influence acceptance. To explore this, we conduct two studies: (1) A lab study in a smart home with various actuators, where participants (N = 48) encounter warnings across three automation levels. (2) A follow-up interview study (N = 16) further evaluating our prototype and unwanted automation situations. Results show that participants preferred higher automation during warnings and were more receptive to smart technology in dangerous situations, though customization remains essential to ensure acceptance. While higher automation levels reduced perceived interruption, some still preferred less intense warnings. Others preferred not receiving warnings of mild dangers, fully relying on automation. Finally, we find that specific safety protocols and handling of false positive alarms must be chosen carefully to avoid mistrust, users feeling a loss of control, and damage through unwanted executions.

    @article{henkelHouseThatSaves2025,
    title = {The {House} {That} {Saves} {Me}? {Assessing} the {Role} of {Smart} {Home} {Automation} in {Warning} {Scenarios}},
    volume = {9},
    shorttitle = {The {House} {That} {Saves} {Me}?},
    url = {https://www.peasec.de/paper/2025/2025_HenkelHaeslerAlNajmiHesselReuter_HouseThatSavesMe_IMWUT.pdf},
    doi = {10.1145/3712269},
    abstract = {As smart home technology becomes integral to modern living, researchers must consider safety aspects. While single-purpose devices alert users to specific dangers, integrating them within comprehensive smart home warning systems (SHWSs) offers new safety potentials by allowing actuators to respond to threats based on predefined protocols. Key questions include whether user preferences for automation levels in smart homes are affected by different warning scenarios, and how unwanted automation or false positives influence acceptance. To explore this, we conduct two studies: (1) A lab study in a smart home with various actuators, where participants (N = 48) encounter warnings across three automation levels. (2) A follow-up interview study (N = 16) further evaluating our prototype and unwanted automation situations. Results show that participants preferred higher automation during warnings and were more receptive to smart technology in dangerous situations, though customization remains essential to ensure acceptance. While higher automation levels reduced perceived interruption, some still preferred less intense warnings. Others preferred not receiving warnings of mild dangers, fully relying on automation. Finally, we find that specific safety protocols and handling of false positive alarms must be chosen carefully to avoid mistrust, users feeling a loss of control, and damage through unwanted executions.},
    number = {1},
    journal = {Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies (IMWUT)},
    author = {Henkel, Markus and Haesler, Steffen and Al-Najmi, Hiba and Hessel, Frank and Reuter, Christian},
    year = {2025},
    keywords = {AuswahlCrisis, Crisis, HCI, Student, A-Paper, Ranking-CORE-A*, Projekt-ATHENE-SecUrban, Projekt-emergenCITY, emergenCITY\_INF, emergenCITY\_SG},
    pages = {5:1--5:32},
    }

  • Jasmin Haunschild, Markus Henkel, Christian Reuter (2025)
    Breaking Down Barriers to Warning Technology Adoption: Usability and Usefulness of a Messenger App Warning Bot
    i-com – Journal of Interactive Media ;24(1). doi:10.1515/icom-2024-0067
    [BibTeX] [Abstract] [Download PDF]

    In crisis situations, citizens’ situational awareness is paramount for an effective response. While warning apps offer location-based alerts, their usage is relatively low. We propose a personalised messaging app channel as an alternative, presenting a warning bot that may lower adoption barriers. We employ the design science research process to define user requirements and iteratively evaluate and improve the bot’s usability and usefulness. The results showcase high usability, with over 40\% expressing an interest in utilising such a warning channel, stressing as reasons the added value of proactive warnings for personalised locations while not requiring a separate app. The derived requirements and design solutions, such as graphically enhanced user interface elements as guardrails for effective and error-free communication, demonstrate that a suitable warning chatbot does not necessarily require complex language processing capabilities. Additionally, our findings facilitate further research on accessibility via conversational design in the realm of crisis warnings.

    @article{haunschildBreakingBarriersWarning2025,
    title = {Breaking {Down} {Barriers} to {Warning} {Technology} {Adoption}: {Usability} and {Usefulness} of a {Messenger} {App} {Warning} {Bot}},
    volume = {24},
    copyright = {De Gruyter expressly reserves the right to use all content for commercial text and data mining within the meaning of Section 44b of the German Copyright Act.},
    issn = {2196-6826},
    shorttitle = {Breaking down barriers to warning technology adoption},
    url = {https://www.degruyter.com/document/doi/10.1515/icom-2024-0067/html},
    doi = {10.1515/icom-2024-0067},
    abstract = {In crisis situations, citizens' situational awareness is paramount for an effective response. While warning apps offer location-based alerts, their usage is relatively low. We propose a personalised messaging app channel as an alternative, presenting a warning bot that may lower adoption barriers. We employ the design science research process to define user requirements and iteratively evaluate and improve the bot's usability and usefulness. The results showcase high usability, with over 40\% expressing an interest in utilising such a warning channel, stressing as reasons the added value of proactive warnings for personalised locations while not requiring a separate app. The derived requirements and design solutions, such as graphically enhanced user interface elements as guardrails for effective and error-free communication, demonstrate that a suitable warning chatbot does not necessarily require complex language processing capabilities. Additionally, our findings facilitate further research on accessibility via conversational design in the realm of crisis warnings.},
    language = {en},
    number = {1},
    journal = {i-com - Journal of Interactive Media},
    author = {Haunschild, Jasmin and Henkel, Markus and Reuter, Christian},
    month = feb,
    year = {2025},
    note = {Publisher: Oldenbourg Wissenschaftsverlag},
    keywords = {Crisis, HCI, Projekt-ATHENE-SecUrban, Projekt-emergenCITY, emergenCITY\_INF, emergenCITY\_SG},
    }

  • Jonas Franken, Thomas Reinhold, Timon Dörnfeld, Christian Reuter (2025)
    Hidden structures of a global infrastructure: Expansion factors of the subsea data cable network
    Technological Forecasting and Social Change (TFSC) ;215:124068. doi:10.1016/j.techfore.2025.124068
    [BibTeX] [Abstract] [Download PDF]

    The network of subsea data cables (SDC) transmits the majority of international and intercontinental data exchanges. After thirty years of fiber-optic SDC installation across the oceans, almost all coastal and island countries gained access to the only global fixed infrastructure network. Still, there is considerable inequality in the number of available SDC accesses, creating deficits in redundancy for less connected states. Previous research hypothesized multiple factors that influenced the build-up of internet infrastructures but failed to verify these assumptions through inferential statistics. This work highlights the national-level factors that made backbone access provision more – or less – attractive to SDC project decision-makers. Our regression analysis of global country-year data (n = 4916) found that socio-economic (population, GDP), political (state fragility, conflict), and geographic factors (seismic hazard, neighboring territories) significantly influenced the number of active and planned accesses. This work can serve as a foundation for further research leveraging quantitative statistics to unveil hidden structures in the construction of material internet infrastructures and support sustainability in the future allocation of international infrastructure development resources in general.

    @article{frankenHiddenStructuresGlobal2025,
    title = {Hidden structures of a global infrastructure: {Expansion} factors of the subsea data cable network},
    volume = {215},
    issn = {0040-1625},
    shorttitle = {Hidden structures of a global infrastructure},
    url = {https://www.peasec.de/paper/2025/2025_FrankenReinholdDörnfeldReuter_TechForecasting.pdf},
    doi = {10.1016/j.techfore.2025.124068},
    abstract = {The network of subsea data cables (SDC) transmits the majority of international and intercontinental data exchanges. After thirty years of fiber-optic SDC installation across the oceans, almost all coastal and island countries gained access to the only global fixed infrastructure network. Still, there is considerable inequality in the number of available SDC accesses, creating deficits in redundancy for less connected states. Previous research hypothesized multiple factors that influenced the build-up of internet infrastructures but failed to verify these assumptions through inferential statistics. This work highlights the national-level factors that made backbone access provision more – or less – attractive to SDC project decision-makers. Our regression analysis of global country-year data (n = 4916) found that socio-economic (population, GDP), political (state fragility, conflict), and geographic factors (seismic hazard, neighboring territories) significantly influenced the number of active and planned accesses. This work can serve as a foundation for further research leveraging quantitative statistics to unveil hidden structures in the construction of material internet infrastructures and support sustainability in the future allocation of international infrastructure development resources in general.},
    urldate = {2025-03-03},
    journal = {Technological Forecasting and Social Change (TFSC)},
    author = {Franken, Jonas and Reinhold, Thomas and Dörnfeld, Timon and Reuter, Christian},
    month = jun,
    year = {2025},
    keywords = {Selected, Security, A-Paper, Peace, AuswahlPeace, Projekt-ATHENE-SecUrban},
    pages = {124068},
    }

  • Marc-André Kaufhold, Tilo Mentler, Simon Nestler, Christian Reuter (2025)
    The Tension of Usable Safety, Security and Privacy
    i-com – Journal of Interactive Media ;24(1). doi:10.1515/icom-2025-0009
    [BibTeX] [Abstract] [Download PDF]

    Local disasters such as the Ahr Valley flood in Germany, the international backdrop of the RussoUkrainian War, or the global impact of the COVID-19 pandemic place high demands on the people and organisations that are involved in these situations and contexts to save lives, mitigate damage, provide comfort, or organise reconstruction. Novel technologies are constantly making their way into everyday life, such as artificial intelligence, big data, decentralised networks, internet of things, or virtual reality. Their adaptation, acceptance, usability, usefulness, and legal framework conditions for safety-critical systems must be researched and tested thoroughly. In this special issue, we investigate the use of computer-based solutions in areas and situations of direct relevance to people’s lives and well-being (Usable Safety), as well as contributions to user-oriented resilience concepts of sociotechnical systems concerning potential attacks (Usable Security) and data protection mechanisms (Usable Privacy).

    @article{kaufholdTensionUsableSafety2025,
    title = {The {Tension} of {Usable} {Safety}, {Security} and {Privacy}},
    volume = {24},
    url = {https://www.degruyterbrill.com/document/doi/10.1515/icom-2025-0009/html},
    doi = {10.1515/icom-2025-0009},
    abstract = {Local disasters such as the Ahr Valley flood in Germany, the international backdrop of the RussoUkrainian War, or the global impact of the COVID-19 pandemic place high demands on the people and organisations that are involved in these situations and contexts to save lives, mitigate damage, provide comfort, or organise reconstruction. Novel technologies are constantly making their way into everyday life, such as artificial intelligence, big data, decentralised networks, internet of things, or virtual reality. Their adaptation, acceptance, usability, usefulness, and legal framework conditions for safety-critical systems must be researched and tested thoroughly. In this special issue, we investigate the use of computer-based solutions in areas and situations of direct relevance to people’s lives and well-being (Usable Safety), as well as contributions to user-oriented resilience concepts of sociotechnical systems concerning potential attacks (Usable Security) and data protection mechanisms (Usable Privacy).},
    language = {en},
    number = {1},
    journal = {i-com - Journal of Interactive Media},
    author = {Kaufhold, Marc-André and Mentler, Tilo and Nestler, Simon and Reuter, Christian},
    year = {2025},
    keywords = {HCI, UsableSec, Security, Projekt-CROSSING, Projekt-ATHENE},
    }

  • Julian Bäumler, Louis Blöcher, Lars-Joel Frey, Xian Chen, Markus Bayer, Christian Reuter (2025)
    A survey of machine learning models and datasets for the multi-label classification of textual hate speech in english
    arXiv . doi:10.48550/arXiv.2504.08609
    [BibTeX] [Abstract] [Download PDF]

    The dissemination of online hate speech can have serious negative consequences for individuals, online communities, and entire societies. This and the large volume of hateful online content prompted both practitioners’, i.e., in content moderation or law enforcement, and researchers’ interest in machine learning models to automatically classify instances of hate speech. Whereas most scientific works address hate speech classification as a binary task, practice often requires a differentiation into sub-types, e.g., according to target, severity, or legality, which may overlap for individual content. Hence, researchers created datasets and machine learning models that approach hate speech classification in textual data as a multi-label problem. This work presents the first systematic and comprehensive survey of scientific literature on this emerging research landscape in English (N=46). We contribute with a concise overview of 28 datasets suited for training multi-label classification models that reveals significant heterogeneity regarding label-set, size, meta-concept, annotation process, and inter-annotator agreement. Our analysis of 24 publications proposing suitable classification models further establishes inconsistency in evaluation and a preference for architectures based on Bidirectional Encoder Representation from Transformers (BERT) and Recurrent Neural Networks (RNNs). We identify imbalanced training data, reliance on crowdsourcing platforms, small and sparse datasets, and missing methodological alignment as critical open issues and formulate ten recommendations for research.

    @article{baumlerSurveyMachineLearningModels,
    title = {A survey of machine learning models and datasets for the multi-label classification of textual hate speech in english},
    url = {https://arxiv.org/abs/2504.08609},
    doi = {10.48550/arXiv.2504.08609},
    abstract = {The dissemination of online hate speech can have serious negative consequences for individuals, online communities, and entire societies. This and the large volume of hateful online content prompted both practitioners', i.e., in content moderation or law enforcement, and researchers' interest in machine learning models to automatically classify instances of hate speech. Whereas most scientific works address hate speech classification as a binary task, practice often requires a differentiation into sub-types, e.g., according to target, severity, or legality, which may overlap for individual content. Hence, researchers created datasets and machine learning models that approach hate speech classification in textual data as a multi-label problem. This work presents the first systematic and comprehensive survey of scientific literature on this emerging research landscape in English (N=46). We contribute with a concise overview of 28 datasets suited for training multi-label classification models that reveals significant heterogeneity regarding label-set, size, meta-concept, annotation process, and inter-annotator agreement. Our analysis of 24 publications proposing suitable classification models further establishes inconsistency in evaluation and a preference for architectures based on Bidirectional Encoder Representation from Transformers (BERT) and Recurrent Neural Networks (RNNs). We identify imbalanced training data, reliance on crowdsourcing platforms, small and sparse datasets, and missing methodological alignment as critical open issues and formulate ten recommendations for research.},
    journal = {arXiv},
    author = {Bäumler, Julian and Blöcher, Louis and Frey, Lars-Joel and Chen, Xian and Bayer, Markus and Reuter, Christian},
    year = {2025},
    keywords = {Crisis, HCI, Student, Projekt-CYLENCE, Projekt-ATHENE-CyAware},
    }

  • Miyerlandy Cabanzo Valencia, Laura Guntrum (2025)
    Race, ethnicity, and technology-facilitated violence: The experience of activists in chocó, colombia
    New Media and Society . doi:10.1177/14614448251344286
    [BibTeX] [Abstract]

    Racism extends into the digital realm, manifesting in various forms of technology-facilitated violence (TFV). Although much research centers on the Global North, it is es-sential to investigate this issue in other settings, such as Colombia, where activists are par-ticularly vulnerable to TFV. This study enriches the debate with a qualitative approach, conducting 18 interviews with activists from Chocó and Bogotá. The literature on race and TFV reveals that technology can exacerbate racism through social media, like anonymity, and introduce new forms of racist violence, including deepfakes and algorithmic bias. However, these forms were not prevalent in our interviews. For activists, structural racism, especially limited internet, and electricity access emerged as a primary factor in their ex-periences with racist TFV. Overt TFV escalates to offline threats, silencing dissenting voices. This research emphasizes the need to understand TFV within non-Western regions, advocating for nuanced approaches to addressing digital racism in diverse contexts.

    @article{CabanzoValencia2025,
    title = {Race, ethnicity, and technology-facilitated violence: {The} experience of activists in chocó, colombia},
    doi = {10.1177/14614448251344286},
    abstract = {Racism extends into the digital realm, manifesting in various forms of technology-facilitated violence (TFV). Although much research centers on the Global North, it is es-sential to investigate this issue in other settings, such as Colombia, where activists are par-ticularly vulnerable to TFV. This study enriches the debate with a qualitative approach, conducting 18 interviews with activists from Chocó and Bogotá. The literature on race and TFV reveals that technology can exacerbate racism through social media, like anonymity, and introduce new forms of racist violence, including deepfakes and algorithmic bias. However, these forms were not prevalent in our interviews. For activists, structural racism, especially limited internet, and electricity access emerged as a primary factor in their ex-periences with racist TFV. Overt TFV escalates to offline threats, silencing dissenting voices. This research emphasizes the need to understand TFV within non-Western regions, advocating for nuanced approaches to addressing digital racism in diverse contexts.},
    journal = {New Media and Society},
    author = {Valencia, Miyerlandy Cabanzo and Guntrum, Laura},
    year = {2025},
    keywords = {Security, A-Paper, Peace, Projekt-TraCe, Ranking-ImpfactFactor},
    }

  • Markus Henkel, Steffen Haesler, Hiba Al-Najmi, Frank Hessel, Christian Reuter (2025)
    Smart Homes als Ergänzung des Warnmittelmixes?
    Fachkongress Forschung für den Bevölkerungsschutz 2025 .
    [BibTeX] [Abstract] [Download PDF]

    Deutschland nutzt einen breiten Mix aus verschiedenen Warnmitteln, um möglichst große Teile der Bevölkerung vor Gefahren zu warnen. Smart Homes können den Warnmittelmix ergänzen, da sie vor regionalen und lokalen Gefahren warnen und automatisch auf solche reagieren können. Unsere Studien zeigen, dass sich die Probandinnen und Probanden die zukünftige Nutzung von Smart Home Warnsystemen situationsangepasst vorstellen können.

    @article{henkelSH,
    title = {Smart {Homes} als {Ergänzung} des {Warnmittelmixes}?},
    url = {https://www.peasec.de/paper/2025/2025_HenkelHaeslerAlNajmiHesselReuter_SmartHomeErgaenzung_bbk.pdf},
    abstract = {Deutschland nutzt einen breiten Mix aus verschiedenen Warnmitteln, um möglichst große Teile der Bevölkerung vor Gefahren zu warnen. Smart Homes können den Warnmittelmix ergänzen, da sie vor regionalen und lokalen Gefahren warnen und automatisch auf solche reagieren können. Unsere Studien zeigen, dass sich die Probandinnen und Probanden die zukünftige Nutzung von Smart Home Warnsystemen situationsangepasst vorstellen können.},
    journal = {Fachkongress Forschung für den Bevölkerungsschutz 2025},
    author = {Henkel, Markus and Haesler, Steffen and Al-Najmi, Hiba and Hessel, Frank and Reuter, Christian},
    year = {2025},
    keywords = {Crisis, HCI, Student, Projekt-ATHENE-SecUrban, Projekt-emergenCITY, emergenCITY\_INF, emergenCITY\_SG},
    }

  • Franz Kuntke, Lars Baumgärtner, Jonas Franken, Christian Reuter (2025)
    Crisis-communication between farms: Disruption-tolerant networking with commodity LoRaWAN hardware
    Information Technology for Development .
    [BibTeX] [Abstract]

    The reliability of communication networks can be compromised by various factors, including natural disasters, which highlights the need for backup systems. In rural areas, where restoring public network infrastructure can take time, an alternative communication channel can be particularly valuable. This study explores the potential of repurposing Long Range Wide Area Networks (LoRaWAN) gateways as multi-hop network nodes to create a digital emergency communication system. Farmers, who are increasingly adopting Low Power Wide Area Networks (LPWANs) and are geographically spread, are identified as key stakeholders for such a system. Using OpenStreetMap data on farm locations, we found that connecting farm communities through LoRa communication is theoretically possible in many areas. Simulations using delay-tolerant network routing protocols confirm the feasibility of this approach under various scenarios. While the general feasability was first evaluated with data from Germany, we also conduct analyses for Uganda. A proof-of-concept implementation demonstrates that small messages can be transmitted successfully using real hardware, validating the concept of a decentralized communication infrastructure based on existing equipment. Additionally, we conducted experiments to measure energy consumption, bandwidth usage, and latency in actual hardware setups. This work contributes to various Sustainable Development Goals by supporting resilient communication infrastructure in underserved areas (SDG 9: Industry, Innovation and Infrastructure), strengthening rural communities that are often the last to recover after emergencies (SDG 10: Reduced Inequalities, SDG 11: Sustainable Cities and Communities), and ultimately helping safeguard food systems through improved agricultural coordination and communication (SDG 2: Zero Hunger).

    @article{kuntke2025crisis,
    title = {Crisis-communication between farms: {Disruption}-tolerant networking with commodity {LoRaWAN} hardware},
    abstract = {The reliability of communication networks can be compromised by various factors, including natural disasters, which highlights the need for backup systems. In rural areas, where restoring public network infrastructure can take time, an alternative communication channel can be particularly valuable. This study explores the potential of repurposing Long Range Wide Area Networks (LoRaWAN) gateways as multi-hop network nodes to create a digital emergency communication system. Farmers, who are increasingly adopting Low Power Wide Area Networks (LPWANs) and are geographically spread, are identified as key stakeholders for such a system. Using OpenStreetMap data on farm locations, we found that connecting farm communities through LoRa communication is theoretically possible in many areas. Simulations using delay-tolerant network routing protocols confirm the feasibility of this approach under various scenarios. While the general feasability was first evaluated with data from Germany, we also conduct analyses for Uganda. A proof-of-concept implementation demonstrates that small messages can be transmitted successfully using real hardware, validating the concept of a decentralized communication infrastructure based on existing equipment. Additionally, we conducted experiments to measure energy consumption, bandwidth usage, and latency in actual hardware setups. This work contributes to various Sustainable Development Goals by supporting resilient communication infrastructure in underserved areas (SDG 9: Industry, Innovation and Infrastructure), strengthening rural communities that are often the last to recover after emergencies (SDG 10: Reduced Inequalities, SDG 11: Sustainable Cities and Communities), and ultimately helping safeguard food systems through improved agricultural coordination and communication (SDG 2: Zero Hunger).},
    journal = {Information Technology for Development},
    author = {Kuntke, Franz and Baumgärtner, Lars and Franken, Jonas and Reuter, Christian},
    year = {2025},
    keywords = {UsableSec, Security, A-Paper, Projekt-emergenCITY, Projekt-AgriRegio, emergenCITY\_INF, emergenCITY\_SG},
    }

  • Laura Guntrum, Verena Lasso Mena (2025)
    Unmasking digital threats in the pursuit of human rights and environmental defense in La Guajira, North Colombia
    Information, Communication & Society :1–22. doi:10.1080/1369118X.2025.2503444
    [BibTeX] [Abstract] [Download PDF]

    Those engaged in the defense of human and land rights, particularly in areas of resource extraction, are increasingly exposed to violence, including a growing number of digital threats. In Colombia, the legacy of decades of armed conflict has overshadowed concerns regarding digital rights, resulting in reports of digital surveillance and online harassment without the requisite judicial oversight. Due to the paucity of research on this topic, this study examines the experiences of 37 environmental and human rights defenders (EHRDs) in La Guajira, North Colombia, who are leveraging information and communication technologies (ICTs) to amplify their concerns in an extractivist region with a history of human rights abuses. The findings indicate a significant prevalence of technology-facilitated violence (TFV) against EHRDs, including death threats, hacking, and hate speech through various digital channels. The spectrum of threats is attributed to several sources, including armed groups, multinational companies, and individuals within the affected communities. The study emphasizes the necessity of adopting a comprehensive approach to violence, integrating TFV into a more expansive conceptualization of violence. Failing to acknowledge the prevalence of TFV may result in an incomplete understanding of the experiences of EHRDs and the consequences of such violence, including self-censorship and emotional harm. Given the increasing overlap between digital and physical violence, we present a framework to enhance the capture and understanding of TFV. Furthermore, this study demonstrates the shortcomings of current security protocols in addressing the multifaceted violence directed at EHRDs due to their opposition to extractive agendas.

    @article{guntrumUnmaskingDigitalThreats2025,
    title = {Unmasking digital threats in the pursuit of human rights and environmental defense in {La} {Guajira}, {North} {Colombia}},
    issn = {1369-118X},
    url = {https://www.peasec.de/paper/2025/2025_GuntrumLassoMenaReuter_UnmaskingDigitalThreats_InfoCommSoc.pdf},
    doi = {10.1080/1369118X.2025.2503444},
    abstract = {Those engaged in the defense of human and land rights, particularly in areas of resource extraction, are increasingly exposed to violence, including a growing number of digital threats. In Colombia, the legacy of decades of armed conflict has overshadowed concerns regarding digital rights, resulting in reports of digital surveillance and online harassment without the requisite judicial oversight. Due to the paucity of research on this topic, this study examines the experiences of 37 environmental and human rights defenders (EHRDs) in La Guajira, North Colombia, who are leveraging information and communication technologies (ICTs) to amplify their concerns in an extractivist region with a history of human rights abuses. The findings indicate a significant prevalence of technology-facilitated violence (TFV) against EHRDs, including death threats, hacking, and hate speech through various digital channels. The spectrum of threats is attributed to several sources, including armed groups, multinational companies, and individuals within the affected communities. The study emphasizes the necessity of adopting a comprehensive approach to violence, integrating TFV into a more expansive conceptualization of violence. Failing to acknowledge the prevalence of TFV may result in an incomplete understanding of the experiences of EHRDs and the consequences of such violence, including self-censorship and emotional harm. Given the increasing overlap between digital and physical violence, we present a framework to enhance the capture and understanding of TFV. Furthermore, this study demonstrates the shortcomings of current security protocols in addressing the multifaceted violence directed at EHRDs due to their opposition to extractive agendas.},
    journal = {Information, Communication \& Society},
    author = {Guntrum, Laura and Mena, Verena Lasso},
    year = {2025},
    note = {Publisher: Routledge},
    keywords = {Peace, Projekt-TraCe},
    pages = {1--22},
    }

  • Laura Guntrum, Christian Reuter (2025)
    Activists’ strategies for coping with technology-facilitated violence in the global south
    ACM Transactions on Computer-Human Interaction (TOCHI) . doi:10.1145/3762811
    [BibTeX] [Abstract] [Download PDF]

    Activists’ use of ICTs in contexts affected by violence poses challenges like digital surveillance. Based on 92 interviews with activists from Bolivia, Cameroon, Costa Rica, Colombia, India, Myanmar, and Nicaragua, this study explores their protection and coping strategies against technology-facilitated violence. Findings show limited emphasis on digital security and privacy-enhancing technologies, primarily due to the usability and familiarity with popular applications, coupled with relative unfamiliarity with other features. Generally, some precautions, like avoiding real-time location sharing, are common. While many protection strategies are similar, some are shaped by local factors like internet shutdowns and different adversaries’ capabilities. The findings demonstrate that some tools and features, such as VPN, may offer protection but also pose risks, e.g., in the case of criminalization, highlighting the crucial role of local context. Designing secure and usable features that account for the varying levels of limitations, such as poor connectivity and risks activists face, is essential.

    @article{Guntrum2025,
    title = {Activists' strategies for coping with technology-facilitated violence in the global south},
    issn = {1073-0516},
    url = {https://doi.org/10.1145/3762811},
    doi = {10.1145/3762811},
    abstract = {Activists' use of ICTs in contexts affected by violence poses challenges like digital surveillance. Based on 92 interviews with activists from Bolivia, Cameroon, Costa Rica, Colombia, India, Myanmar, and Nicaragua, this study explores their protection and coping strategies against technology-facilitated violence. Findings show limited emphasis on digital security and privacy-enhancing technologies, primarily due to the usability and familiarity with popular applications, coupled with relative unfamiliarity with other features. Generally, some precautions, like avoiding real-time location sharing, are common. While many protection strategies are similar, some are shaped by local factors like internet shutdowns and different adversaries' capabilities. The findings demonstrate that some tools and features, such as VPN, may offer protection but also pose risks, e.g., in the case of criminalization, highlighting the crucial role of local context. Designing secure and usable features that account for the varying levels of limitations, such as poor connectivity and risks activists face, is essential.},
    journal = {ACM Transactions on Computer-Human Interaction (TOCHI)},
    author = {Guntrum, Laura and Reuter, Christian},
    year = {2025},
    keywords = {A-Paper, Ranking-CORE-A*, Peace, AuswahlPeace, Projekt-TraCe, Projekt-ATHENE-PriVis},
    }

    Bücher und herausgegebene Zeitschriften / Books and Edited Special Issues in Journals

  • Jasmin Haunschild (2025)
    Enhancing Citizens’ Role in Public Safety: Interaction, Perception and Design of Mobile Warning Apps
    Darmstadt, Germany: Dissertation (Dr. rer. nat.), Department of Computer Science, Technische Universität Darmstadt.
    [BibTeX]

    @book{haunschildEnhancingCitizensRole2025a,
    address = {Darmstadt, Germany},
    title = {Enhancing {Citizens}’ {Role} in {Public} {Safety}: {Interaction}, {Perception} and {Design} of {Mobile} {Warning} {Apps}},
    publisher = {Dissertation (Dr. rer. nat.), Department of Computer Science, Technische Universität Darmstadt},
    author = {Haunschild, Jasmin},
    year = {2025},
    keywords = {Crisis, HCI, Projekt-ATHENE-SecUrban, Projekt-emergenCITY, Dissertation, emergenCITY\_INF, emergenCITY\_SG},
    }

  • Jasmin Haunschild (2025)
    Enhancing Citizens’ Role in Public Safety: Interaction, Perception and Design of Mobile Warning Apps
    Wiesbaden, Germany: Springer Vieweg. doi:10.1007/978-3-658-46489-9
    [BibTeX] [Abstract] [Download PDF]

    The COVID-19 pandemic and the war in Ukraine emphasize the need for greater disaster resilience and preparedness. This book investigates how these apps can enhance crisis awareness and citizen involvement in disaster prevention and response. By examining user perspectives and the impact of crisis experiences, the book explores how to increase the adoption and effectiveness of warning apps. The research uses qualitative and quantitative methods, including surveys and design interventions, to reveal current usage, changes over time and desired features. It shows that while citizens find warning apps helpful, more safety-related features and two-way communication could increase their appeal. Additionally, the integration of preparedness features into these apps can increase their perceived usefulness, though challenges remain in addressing user expectations and design preferences across different crises and cultural contexts.

    @book{haunschildEnhancingCitizensRole2025,
    address = {Wiesbaden, Germany},
    title = {Enhancing {Citizens}’ {Role} in {Public} {Safety}: {Interaction}, {Perception} and {Design} of {Mobile} {Warning} {Apps}},
    isbn = {978-3-658-46488-2},
    url = {https://link.springer.com/book/10.1007/978-3-658-46489-9},
    abstract = {The COVID-19 pandemic and the war in Ukraine emphasize the need for greater disaster resilience and preparedness. This book investigates how these apps can enhance crisis awareness and citizen involvement in disaster prevention and response. By examining user perspectives and the impact of crisis experiences, the book explores how to increase the adoption and effectiveness of warning apps. The research uses qualitative and quantitative methods, including surveys and design interventions, to reveal current usage, changes over time and desired features. It shows that while citizens find warning apps helpful, more safety-related features and two-way communication could increase their appeal. Additionally, the integration of preparedness features into these apps can increase their perceived usefulness, though challenges remain in addressing user expectations and design preferences across different crises and cultural contexts.},
    publisher = {Springer Vieweg},
    author = {Haunschild, Jasmin},
    year = {2025},
    doi = {10.1007/978-3-658-46489-9},
    keywords = {Crisis, HCI, Projekt-ATHENE-SecUrban, Projekt-emergenCITY, DissPublisher, emergenCITY\_INF, emergenCITY\_SG},
    }

  • Christian Reuter, Amanda Lee Hughes, Cody Buntain (2025)
    Special Issue on Combating Information Warfare: User-Centered Countermeasures against Fake News and Misinformation – Behaviour & Information Technology (BIT)
    Taylor & Francis.
    [BibTeX] [Abstract]

    The rise of fake news and misinformation in the digital age poses serious risks for individuals and society, particularly during crises like the Israel-Hamas war, the Russian-Ukraine war, or the COVID-19 pandemic. Misinformation serves as a tool to manipulate public opinion and create discord. Vulnerability to manipulation increases in online spaces during crises, where authoritative information is scarce. Emergency management, public health, political and public administration, as well as media professionals and citizens express concern and seek solutions to enhance information quality during such critical times. This article highlights user-centred approaches to countering fake news and misinformation, tracing their historical evolution from ancient Greece to the present, focussing on their relevance during the COVID-19 crisis and in contemporary information warfare. It describes the vulnerability of audiences to misinformation and outlines prevailing trends in user-centred countermeasures. This article also introduces recent research on the effectiveness of media literacy interventions on truth discernment, a cross-cultural comparison of the perception of negative consequences and the injunctive norm, a comparison of video and text to promote lateral reading in adolescents, content-specific indicators on Twitter from a user perspective, a learning system for detecting misinformation as well as ethical and security considerations in automated detection.

    @book{reuterSpecialIssueCombating2025,
    title = {Special {Issue} on {Combating} {Information} {Warfare}: {User}-{Centered} {Countermeasures} against {Fake} {News} and {Misinformation} - {Behaviour} \& {Information} {Technology} ({BIT})},
    abstract = {The rise of fake news and misinformation in the digital age poses serious risks for individuals and society, particularly during crises like the Israel-Hamas war, the Russian-Ukraine war, or the COVID-19 pandemic. Misinformation serves as a tool to manipulate public opinion and create discord. Vulnerability to manipulation increases in online spaces during crises, where authoritative information is scarce. Emergency management, public health, political and public administration, as well as media professionals and citizens express concern and seek solutions to enhance information quality during such critical times. This article highlights user-centred approaches to countering fake news and misinformation, tracing their historical evolution from ancient Greece to the present, focussing on their relevance during the COVID-19 crisis and in contemporary information warfare. It describes the vulnerability of audiences to misinformation and outlines prevailing trends in user-centred countermeasures. This article also introduces recent research on the effectiveness of media literacy interventions on truth discernment, a cross-cultural comparison of the perception of negative consequences and the injunctive norm, a comparison of video and text to promote lateral reading in adolescents, content-specific indicators on Twitter from a user perspective, a learning system for detecting misinformation as well as ethical and security considerations in automated detection.},
    publisher = {Taylor \& Francis},
    author = {Reuter, Christian and Hughes, Amanda Lee and Buntain, Cody},
    year = {2025},
    note = {Publication Title: Behaviour \& Information Technology (BIT)},
    keywords = {Crisis, HCI, SocialMedia, A-Paper, Ranking-ImpactFactor, Ranking-CORE-A, Peace},
    }

  • Sebastian Linsner (2025)
    Privacy Preserving Data Management – Assisting Users in Data Disclosure Scenarios
    Darmstadt, Germany: Dissertation (Dr.-Ing.), Department of Computer Science, Technische Universität Darmstadt.
    [BibTeX]

    @book{linsnerPrivacyPreservingData2025a,
    address = {Darmstadt, Germany},
    title = {Privacy {Preserving} {Data} {Management} – {Assisting} {Users} in {Data} {Disclosure} {Scenarios}},
    publisher = {Dissertation (Dr.-Ing.), Department of Computer Science, Technische Universität Darmstadt},
    author = {Linsner, Sebastian},
    year = {2025},
    keywords = {UsableSec, Security, Projekt-CROSSING, Dissertation, Projekt-ATHENE-PriVis},
    }

  • Katrin Hartwig (2025)
    Navigating Misinformation: User-Centered Design and Evaluation of Indicator-Based Digital Interventions
    Darmstadt, Germany: Dissertation (Dr.-Ing.), Department of Computer Science, Technische Universität Darmstadt.
    [BibTeX]

    @book{hartwigNavigatingMisinformationUserCentered2025a,
    address = {Darmstadt, Germany},
    title = {Navigating {Misinformation}: {User}-{Centered} {Design} and {Evaluation} of {Indicator}-{Based} {Digital} {Interventions}},
    publisher = {Dissertation (Dr.-Ing.), Department of Computer Science, Technische Universität Darmstadt},
    author = {Hartwig, Katrin},
    year = {2025},
    keywords = {Crisis, HCI, Projekt-CROSSING, Projekt-NEBULA, Dissertation},
    }

  • Steffen Haesler (2025)
    Citizens in Crises: Behavior, Dependencies, and Technological Support of Digital Self-Organization
    Darmstadt, Germany: Dissertation (Dr. rer. nat.), Department of Computer Science, Technische Universität Darmstadt.
    [BibTeX]

    @book{haeslerCitizensCrisesBehavior2025a,
    address = {Darmstadt, Germany},
    title = {Citizens in {Crises}: {Behavior}, {Dependencies}, and {Technological} {Support} of {Digital} {Self}-{Organization}},
    publisher = {Dissertation (Dr. rer. nat.), Department of Computer Science, Technische Universität Darmstadt},
    author = {Haesler, Steffen},
    year = {2025},
    keywords = {Crisis, HCI, Projekt-ATHENE-SecUrban, Projekt-emergenCITY, Dissertation, emergenCITY\_INF, emergenCITY\_SG},
    }

  • Markus Bayer (2025)
    Deep Learning in Textual Low-Data Regimes for Cybersecurity
    Darmstadt, Germany: Dissertation (Dr. rer. nat.), Department of Computer Science, Technische Universität Darmstadt.
    [BibTeX]

    @book{bayerDeepLearningTextual2025a,
    address = {Darmstadt, Germany},
    title = {Deep {Learning} in {Textual} {Low}-{Data} {Regimes} for {Cybersecurity}},
    publisher = {Dissertation (Dr. rer. nat.), Department of Computer Science, Technische Universität Darmstadt},
    author = {Bayer, Markus},
    year = {2025},
    keywords = {Security, Projekt-CYWARN, Projekt-CYLENCE, Dissertation, Projekt-ATHENE-CyAware},
    }

  • Markus Bayer (2025)
    Deep Learning in Textual Low-Data Regimes for Cybersecurity
    Wiesbaden, Germany: Springer Vieweg. doi:10.1007/978-3-658-48778-2
    [BibTeX] [Download PDF]

    @book{bayerDeepLearningTextual2025,
    address = {Wiesbaden, Germany},
    title = {Deep {Learning} in {Textual} {Low}-{Data} {Regimes} for {Cybersecurity}},
    isbn = {978-3-658-48777-5},
    url = {https://link.springer.com/book/10.1007/978-3-658-48778-2},
    publisher = {Springer Vieweg},
    author = {Bayer, Markus},
    year = {2025},
    doi = {10.1007/978-3-658-48778-2},
    keywords = {Security, Projekt-CYWARN, Projekt-CYLENCE, Projekt-ATHENE-CyAware, DissPublisher},
    }

  • Katrin Hartwig (2025)
    Navigating Misinformation: User-Centered Design and Evaluation of Indicator-Based Digital Interventions
    Wiesbaden, Germany: Springer Vieweg. doi:10.1007/978-3-658-47885-8
    [BibTeX] [Abstract] [Download PDF]

    Informed navigation of misinformation on social media constitutes a major challenge. The field of Human-Computer Interaction (HCI) suggests digital misinformation interventions as user-centered countermeasures. This book clusters (1) existing misinformation interventions within a taxonomy encompassing designs, interaction types, and timings. The book demonstrates that current research mostly addresses higher-educated participants, and targets Twitter/X and Facebook. It highlights trends toward comprehensible interventions in contrast to top-down approaches. The findings informed (2) the design, implementation, and evaluation of simulated apps for TikTok, voice messages, and Twitter/X as indicator-based interventions. Therefore, (3) the book identified misinformation indicators for various modalities that were perceived as comprehensible.The book empirically demonstrates that (4) indicator-based interventions are positively received due to their transparency. However, they also come with challenges, such as users’ blind trust and lack of realistic assessments of biases. This research outlines chances and implications for future research.

    @book{hartwigNavigatingMisinformationUserCentered2025,
    address = {Wiesbaden, Germany},
    title = {Navigating {Misinformation}: {User}-{Centered} {Design} and {Evaluation} of {Indicator}-{Based} {Digital} {Interventions}},
    isbn = {978-3-658-47884-1},
    url = {https://link.springer.com/book/10.1007/978-3-658-47885-8},
    abstract = {Informed navigation of misinformation on social media constitutes a major challenge. The field of Human-Computer Interaction (HCI) suggests digital misinformation interventions as user-centered countermeasures. This book clusters (1) existing misinformation interventions within a taxonomy encompassing designs, interaction types, and timings. The book demonstrates that current research mostly addresses higher-educated participants, and targets Twitter/X and Facebook. It highlights trends toward comprehensible interventions in contrast to top-down approaches. The findings informed (2) the design, implementation, and evaluation of simulated apps for TikTok, voice messages, and Twitter/X as indicator-based interventions. Therefore, (3) the book identified misinformation indicators for various modalities that were perceived as comprehensible.The book empirically demonstrates that (4) indicator-based interventions are positively received due to their transparency. However, they also come with challenges, such as users' blind trust and lack of realistic assessments of biases. This research outlines chances and implications for future research.},
    publisher = {Springer Vieweg},
    author = {Hartwig, Katrin},
    year = {2025},
    doi = {10.1007/978-3-658-47885-8},
    keywords = {Crisis, HCI, Projekt-CROSSING, Projekt-NEBULA, Projekt-CYLENCE, Projekt-ATHENE, DissPublisher},
    }

  • Sebastian Linsner (2025)
    Privacy Preserving Data Management – Assisting Users in Data Disclosure Scenarios
    Wiesbaden, Germany: Springer Vieweg. doi:10.1007/978-3-658-47445-4
    [BibTeX] [Abstract] [Download PDF]

    Users face many situations in which they have to disclose their data to others. In many cases, they are not properly informed about the usage of their data or the consequences of data disclosure. This book investigates how users can be supported by researching three core aspects: Firstly, problems and risks that lead to (unintended) data disclosure or arise from it have to be identified. Secondly, measures are investigated that developers can apply to mitigate these risks and meet the needs of the users. Finally, the developed solutions have to be adopted into practice. Strategies to bring security- and privacy-enhancing technologies to use are essential because a tool that is not used cannot protect anyone. The investigated scenarios are twofold: Firstly, business-to-business (B2B) collaborations, especially highlighting the perspective of owners of small and medium enterprises (SMEs) who are forced to provide data for business processes. Secondly, scenarios of everyday usage for private users that require the disclosure of data are investigated.

    @book{linsnerPrivacyPreservingData2025,
    address = {Wiesbaden, Germany},
    title = {Privacy {Preserving} {Data} {Management} – {Assisting} {Users} in {Data} {Disclosure} {Scenarios}},
    url = {https://link.springer.com/book/9783658474447},
    abstract = {Users face many situations in which they have to disclose their data to others. In many cases, they are not properly informed about the usage of their data or the consequences of data disclosure. This book investigates how users can be supported by researching three core aspects: Firstly, problems and risks that lead to (unintended) data disclosure or arise from it have to be identified. Secondly, measures are investigated that developers can apply to mitigate these risks and meet the needs of the users. Finally, the developed solutions have to be adopted into practice. Strategies to bring security- and privacy-enhancing technologies to use are essential because a tool that is not used cannot protect anyone.
    The investigated scenarios are twofold: Firstly, business-to-business (B2B) collaborations, especially highlighting the perspective of owners of small and medium enterprises (SMEs) who are forced to provide data for business processes. Secondly, scenarios of everyday usage for private users that require the disclosure of data are investigated.},
    publisher = {Springer Vieweg},
    author = {Linsner, Sebastian},
    year = {2025},
    doi = {10.1007/978-3-658-47445-4},
    keywords = {UsableSec, Security, Projekt-CROSSING, Projekt-ATHENE-PriVis, DissPublisher},
    }

  • Steffen Haesler (2025)
    Citizens in Crises: Behavior, Dependencies, and Technological Support of Digital Self-Organization
    Wiesbaden, Germany: Springer Vieweg.
    [BibTeX]

    @book{haeslerCitizensCrisesBehavior2025,
    address = {Wiesbaden, Germany},
    title = {Citizens in {Crises}: {Behavior}, {Dependencies}, and {Technological} {Support} of {Digital} {Self}-{Organization}},
    publisher = {Springer Vieweg},
    author = {Haesler, Steffen},
    year = {2025},
    keywords = {Crisis, HCI, Projekt-emergenCITY, DissPublisher, emergenCITY\_INF, emergenCITY\_SG},
    }

  • Stefka Schmid (2025)
    Governing (In)Security: Socio-technical Interactions in International Relations
    Darmstadt, Germany: Dissertation (Dr. phil.), Department of History and Social Sciences, Technische Universität Darmstadt. doi:10.26083/tuprints-00030095
    [BibTeX] [Abstract] [Download PDF]

    Information technology is used across the globe, permeating different spheres of life. In particular, advances of artificial intelligence (AI) and broad adoption of social media re-negotiate human interactions with the world. In the midst of geopolitical tensions and multiple crises, as indicated by the Russian invasion of Ukraine in 2022 or the COVID-19 pandemic, technology has become highly important to security governance. For example, the EU has formulated policies on the use of “high risk AI” while political actors use social media for (disinformation) campaigns or war reporting. Against the backdrop of multiple crises and political actors’ reliance on technological solutions, critical security studies (CSS) has been dedicated to deconstructing governmental security politics as stabilizers of the status quo, with insecurities persisting, enacted through technologically mediated practices. While attention has specifically been paid to the role of expertise in “critical” contexts, my work is interested in how socio-technical expert knowledge plays into the problematization of broader innovation policies. Further, although various practices and forms of labor have been studied, their collaborative character and informal actors’ productive self-governance have been investigated less prominently. Connecting to human-computer interaction (HCI) as a community of socio-technical practice, it becomes possible to identify user-centric design characteristics and “agnostic” framing of contexts of use being traded into both spheres of political and technological practice. I focus on socio-technical practices that are enacted in different fields: (1) AI innovation policies, (2) safety-critical scenarios, and (3) misinformation on social media. In these, security is negotiated and on high demand. AI innovation policies are formulated in the context of global competition and address both commercial and military applications. Safety-critical scenarios, in which uncertainty is high, are experienced by both formal and informal non-governmental actors. Misinformation on social media, especially in the context of rising authoritarianism, has been identified a threat and is aimed to be mitigated by technological solutions. Thus, the first part finds that Chinese, EU and US policies refer to design characteristics in the problematization of AI innovation. AI is presented as an opaque and abstract issue that is realized across multiple contexts of use. Risks and threats are posed by the “black box” character of AI and technology use by “others”. Future innovation is seen as a solution, with characteristics ranging from reliability to explainability being used as points of reference. The second part investigates computer-supported cooperative work (CSCW) of both formal and informal collectives in safety-critical scenarios. Self-governance in crises requires cooperative and collaborative work, comprising routines and teamwork. Actors’ perceptions of criticality are governed self-referentially, with emphasis put on situation awareness as a goal in formal settings. Successful coping with insecurities points out the productive side of self-governance by informal actors, building on both physically and virtually enacted care practices. The third part addresses (de)politicization in the context of technological measures aiming at mitigating the spread of misinformation on social media. Reflecting on user studies that resulted in prototyping of a learning-oriented approach, depoliticization is notable considering user-centered design on the grounds of responsibilization and technological solutionism. Yet, this also entails politicization of user interventions regarding their transparency. Situated in HCI and as an interdisciplinary endeavor, this work allows for a reflexive approach that both integrates and reflects on problem solving approaches that are co-constitutive to security governance.

    @book{schmidGoverningInSecuritySociotechnical2025,
    address = {Darmstadt, Germany},
    title = {Governing ({In}){Security}: {Socio}-technical {Interactions} in {International} {Relations}},
    url = {https://tuprints.ulb.tu-darmstadt.de/30095/},
    abstract = {Information technology is used across the globe, permeating different spheres of life. In particular, advances of artificial intelligence (AI) and broad adoption of social media re-negotiate human interactions with the world. In the midst of geopolitical tensions and multiple crises, as indicated by the Russian invasion of Ukraine in 2022 or the COVID-19 pandemic, technology has become highly important to security governance. For example, the EU has formulated policies on the use of "high risk AI" while political actors use social media for (disinformation) campaigns or war reporting.
    Against the backdrop of multiple crises and political actors' reliance on technological solutions, critical security studies (CSS) has been dedicated to deconstructing governmental security politics as stabilizers of the status quo, with insecurities persisting, enacted through technologically mediated practices. While attention has specifically been paid to the role of expertise in "critical" contexts, my work is interested in how socio-technical expert knowledge plays into the problematization of broader innovation policies. Further, although various practices and forms of labor have been studied, their collaborative character and informal actors' productive self-governance have been investigated less prominently. Connecting to human-computer interaction (HCI) as a community of socio-technical practice, it becomes possible to identify user-centric design characteristics and "agnostic" framing of contexts of use being traded into both spheres of political and technological practice. I focus on socio-technical practices that are enacted in different fields: (1) AI innovation policies, (2) safety-critical scenarios, and (3) misinformation on social media. In these, security is negotiated and on high demand. AI innovation policies are formulated in the context of global competition and address both commercial and military applications. Safety-critical scenarios, in which uncertainty is high, are experienced by both formal and informal non-governmental actors. Misinformation on social media, especially in the context of rising authoritarianism, has been identified a threat and is aimed to be mitigated by technological solutions.
    Thus, the first part finds that Chinese, EU and US policies refer to design characteristics in the problematization of AI innovation. AI is presented as an opaque and abstract issue that is realized across multiple contexts of use. Risks and threats are posed by the "black box" character of AI and technology use by "others". Future innovation is seen as a solution, with characteristics ranging from reliability to explainability being used as points of reference. The second part investigates computer-supported cooperative work (CSCW) of both formal and informal collectives in safety-critical scenarios. Self-governance in crises requires cooperative and collaborative work, comprising routines and teamwork. Actors' perceptions of criticality are governed self-referentially, with emphasis put on situation awareness as a goal in formal settings. Successful coping with insecurities points out the productive side of self-governance by informal actors, building on both physically and virtually enacted care practices. The third part addresses (de)politicization in the context of technological measures aiming at mitigating the spread of misinformation on social media. Reflecting on user studies that resulted in prototyping of a learning-oriented approach, depoliticization is notable considering user-centered design on the grounds of responsibilization and technological solutionism. Yet, this also entails politicization of user interventions regarding their transparency. Situated in HCI and as an interdisciplinary endeavor, this work allows for a reflexive approach that both integrates and reflects on problem solving approaches that are co-constitutive to security governance.},
    publisher = {Dissertation (Dr. phil.), Department of History and Social Sciences, Technische Universität Darmstadt},
    author = {Schmid, Stefka},
    year = {2025},
    doi = {10.26083/tuprints-00030095},
    keywords = {Crisis, Peace, Projekt-TraCe, Projekt-NEBULA, Dissertation},
    }

  • Philipp Kuehn (2025)
    Proactive Cyber Threat Intelligence: Automating the Intelligence Cycle based on Open Sources
    Darmstadt, Germany: Dissertation (Dr.-Ing.), Department of Computer Science, Technische Universität Darmstadt.
    [BibTeX]

    @book{kuehnProactiveCyberThreat2025,
    address = {Darmstadt, Germany},
    title = {Proactive {Cyber} {Threat} {Intelligence}: {Automating} the {Intelligence} {Cycle} based on {Open} {Sources}},
    publisher = {Dissertation (Dr.-Ing.), Department of Computer Science, Technische Universität Darmstadt},
    author = {Kuehn, Philipp},
    year = {2025},
    keywords = {UsableSec, Security, Projekt-ATHENE-SecUrban, Projekt-CYWARN, Dissertation},
    }

  • Livani Charikleia, Franziska Schraut, Laura Guntrum, Julian Lawrence (2025)
    Code of Courage: A Comic About Digital Security for Activists [Available in German, Russian, Spanish under “Download PDF”]
    Darmstadt, Germany: Universitäts- und Landesbibliothek Darmstadt. doi:10.26083/tuprints-00029108
    [BibTeX] [Abstract] [Download PDF]

    Security is paramount – online and offline.Maria, Alex, Sarah, and Daniel are four friends deeply committed to human rights activism in a country grappling with increasing authoritarianism. Their efforts to organize and amplify their message on social media are met with relentless challenges: internet shutdowns, hacked accounts, direct threats, and constant surveillance – tactics aimed at silencing dissent and instilling fear. Daniel’s arrest for this involvement in the protests serves as a stark reminder of the dangers they all face.Follow Maria as she strives to learn more about digital safety and what is means for activists in four short comic stories.

    @book{ComicCodeofCourage,
    address = {Darmstadt, Germany},
    title = {Code of {Courage}: {A} {Comic} {About} {Digital} {Security} for {Activists} [{Available} in {German}, {Russian}, {Spanish} under "{Download} {PDF}"]},
    url = {https://peasec.de/2025/comic/},
    abstract = {Security is paramount - online and offline.Maria, Alex, Sarah, and Daniel are four friends deeply committed to human rights activism in a country grappling with increasing authoritarianism. Their efforts to organize and amplify their message on social media are met with relentless challenges: internet shutdowns, hacked accounts, direct threats, and constant surveillance - tactics aimed at silencing dissent and instilling fear. Daniel's arrest for this involvement in the protests serves as a stark reminder of the dangers they all face.Follow Maria as she strives to learn more about digital safety and what is means for activists in four short comic stories.},
    publisher = {Universitäts- und Landesbibliothek Darmstadt},
    author = {Charikleia, Livani and Schraut, Franziska and Guntrum, Laura and Lawrence, Julian},
    year = {2025},
    doi = {10.26083/tuprints-00029108},
    keywords = {Peace, Projekt-TraCe},
    }

  • Tom Biselli (2025)
    Individual Information Sovereignty: User Perspectives and Digital Interventions for Navigating Privacy and Misinformation
    Darmstadt, Germany: Dissertation (Dr. rer. nat.), Department of Computer Science, Technische Universität Darmstadt. doi:10.26083/tuprints-00030183
    [BibTeX] [Abstract]

    In an ever more complex and opaque digital information landscape, individuals increasingly share sensitive data and rely on various digital sources for information. In doing so, they face increasing challenges in engaging with digital information flows. This dissertation explores two critical directions of digital information flows: (1) the disclosure of sensitive information related to privacy and (2) the consumption of information, with a particular focus on misinformation. To effectively address these challenges, individuals require support in regaining their information sovereignty, which this dissertation conceptualises as a form of autonomy, control, and competence in navigating digital information flows related to privacy and misinformation. Overall, this dissertation provides a user-centred perspective rooted in Human-Computer Interaction to explore conceptual and methodological insights, user perspectives, and design implications for digital interventions with the overarching aim of supporting Individual Information Sovereignty. To do this, this dissertation employs a range of qualitative and quantitative research methods, including representative surveys, interviews, focus groups, think-aloud studies, and online experiments. Findings on conceptual and methodological insights demonstrate how precise operationalisation and measurement of concepts such as privacy and corresponding behaviour are essential prerequisites for accurately determining user needs. Findings on user perspectives highlight diverse, context-dependent, and evolving perspectives and patterns in digital technology use as well as support needs. Users express a fundamental tension between the advantages of digital information availability and the risk of information overload, leading to challenges in maintaining control over digital information flows. In the context of emergencies, for example, the use of social media is especially hindered by perceived privacy implications and the risk of false rumours. In general, users desire greater transparency and comprehensibility when navigating privacy and misinformation, suggesting that interventions should prioritise empowering user autonomy through tailored, clear and well-structured information. Finally, findings on design implications for digital interventions to support navigating privacy and misinformation highlight the potential of transparent and personalised approaches. For instance, personalised cookie banners tailored to users’ privacy knowledge reduce the acceptance of browser cookies. Additionally, personalised nudges and transparent, indicator-based interventions support the identification of misleading information in text, videos, and charts. Overall, this dissertation demonstrates the heterogeneity of user perspectives and the potential of transparent and personalised interventions to support Individual Information Sovereignty. This approach aims to empower users to navigate digital information flows in a more informed and self-determined way.

    @book{biselliIndividualInformationSovereignty2025,
    address = {Darmstadt, Germany},
    title = {Individual {Information} {Sovereignty}: {User} {Perspectives} and {Digital} {Interventions} for {Navigating} {Privacy} and {Misinformation}},
    abstract = {In an ever more complex and opaque digital information landscape, individuals increasingly share sensitive data and rely on various digital sources for information. In doing so, they face increasing challenges in engaging with digital information flows. This dissertation explores two critical directions of digital information flows: (1) the disclosure of sensitive information related to privacy and (2) the consumption of information, with a particular focus on misinformation. To effectively address these challenges, individuals require support in regaining their information sovereignty, which this dissertation conceptualises as a form of autonomy, control, and competence in navigating digital information flows related to privacy and misinformation. Overall, this dissertation provides a user-centred perspective rooted in Human-Computer Interaction to explore conceptual and methodological insights, user perspectives, and design implications for digital interventions with the overarching aim of supporting Individual Information Sovereignty. To do this, this dissertation employs a range of qualitative and quantitative research methods, including representative surveys, interviews, focus groups, think-aloud studies, and online experiments.
    Findings on conceptual and methodological insights demonstrate how precise operationalisation and measurement of concepts such as privacy and corresponding behaviour are essential prerequisites for accurately determining user needs. Findings on user perspectives highlight diverse, context-dependent, and evolving perspectives and patterns in digital technology use as well as support needs. Users express a fundamental tension between the advantages of digital information availability and the risk of information overload, leading to challenges in maintaining control over digital information flows. In the context of emergencies, for example, the use of social media is especially hindered by perceived privacy implications and the risk of false rumours. In general, users desire greater transparency and comprehensibility when navigating privacy and misinformation, suggesting that interventions should prioritise empowering user autonomy through tailored, clear and well-structured information. Finally, findings on design implications for digital interventions to support navigating privacy and misinformation highlight the potential of transparent and personalised approaches. For instance, personalised cookie banners tailored to users' privacy knowledge reduce the acceptance of browser cookies. Additionally, personalised nudges and transparent, indicator-based interventions support the identification of misleading information in text, videos, and charts.
    Overall, this dissertation demonstrates the heterogeneity of user perspectives and the potential of transparent and personalised interventions to support Individual Information Sovereignty. This approach aims to empower users to navigate digital information flows in a more informed and self-determined way.},
    publisher = {Dissertation (Dr. rer. nat.), Department of Computer Science, Technische Universität Darmstadt},
    author = {Biselli, Tom},
    year = {2025},
    doi = {10.26083/tuprints-00030183},
    keywords = {Crisis, HCI, Projekt-NEBULA, Projekt-ATHENE, Dissertation},
    }

  • Philipp Kuehn (2025)
    Proactive Cyber Threat Intelligence: Automating the Intelligence Cycle based on Open Sources
    Wiesbaden, Germany: Springer Vieweg.
    [BibTeX] [Download PDF]

    @book{kuehnProactiveCyberThreat2025a,
    address = {Wiesbaden, Germany},
    title = {Proactive {Cyber} {Threat} {Intelligence}: {Automating} the {Intelligence} {Cycle} based on {Open} {Sources}},
    isbn = {978-3-658-49240-3},
    url = {https://link.springer.com/book/9783658492403},
    publisher = {Springer Vieweg},
    author = {Kuehn, Philipp},
    year = {2025},
    keywords = {UsableSec, Security, Projekt-ATHENE-SecUrban, Projekt-CYWARN, DissPublisher},
    }

    Kapitel in Büchern

  • Christian Reuter, Jürgen Scheffran, Manuel Kreutle (2025)
    Naturwissenschaftlich-technische Friedens- und Konfliktforschung
    In: Hans J. Gießmann, Bernhard Rinke: Handbuch Frieden. Springer VS.
    [BibTeX]

    @incollection{reuterNaturwissenschaftlichtechnischeFriedensUnd2025,
    title = {Naturwissenschaftlich-technische {Friedens}- und {Konfliktforschung}},
    booktitle = {Handbuch {Frieden}},
    publisher = {Springer VS},
    author = {Reuter, Christian and Scheffran, Jürgen and Kreutle, Manuel},
    editor = {Gießmann, Hans J. and Rinke, Bernhard},
    year = {2025},
    keywords = {Peace, Projekt-CNTR, Projekt-TraCe},
    }

    Publikationen in Konferenzbänden / Peer-reviewed Conference Papers

  • Leon Janzen, Florentin Putz, Marc-André Kaufhold, Kolja Straub, Matthias Hollick (2025)
    The User Perspective on Island-Ready 6G Communication: A Survey of Future Smartphone Usage in Crisis-Struck Areas with Local Cellular Connectivity
    Proceedings of the Conference on Human Factors in Computing Systems (CHI) (Honorable Mentions) Yokohama, Japan. doi:10.1145/3706598.3714324
    [BibTeX] [Abstract] [Download PDF]

    Using smartphone apps during crises is well-established, proving critical for efficient crisis response. However, such apps become futile without an Internet connection, which is a common issue during crises. The ongoing 6G standardization explores the capability to provide local cellular connectivity for areas cut off from the Internet in crises. This paper introduces to the HCI community the concept of cellular island connectivity in isolated areas, promising a seamless transition from normal operation to island operation with local-only cellular connectivity. It presents findings from a survey (N = 857) among adult smartphone users from major German cities regarding their smartphone usage preferences in this model. Results show a shift in app demand, with users favoring general-purpose apps over dedicated crisis apps in specific scenarios. We prioritize smartphone services based on their criticality, distinguishing between apps essential for crisis response and those supporting routines. Our findings provide operators, developers, and authorities insights into making user-centric design decisions for implementing island-ready 6G communication.

    @inproceedings{janzenUserPerspectiveIslandReady2025,
    address = {Yokohama, Japan},
    series = {{CHI} '25},
    title = {The {User} {Perspective} on {Island}-{Ready} {6G} {Communication}: {A} {Survey} of {Future} {Smartphone} {Usage} in {Crisis}-{Struck} {Areas} with {Local} {Cellular} {Connectivity}},
    url = {peasec.de/paper/2025/2025_JanzenPutzKaufholdStraubHollick_UserPerspective6GCommunication_CHI.pdf},
    doi = {10.1145/3706598.3714324},
    abstract = {Using smartphone apps during crises is well-established, proving critical for efficient crisis response. However, such apps become futile without an Internet connection, which is a common issue during crises. The ongoing 6G standardization explores the capability to provide local cellular connectivity for areas cut off from the Internet in crises. This paper introduces to the HCI community the concept of cellular island connectivity in isolated areas, promising a seamless transition from normal operation to island operation with local-only cellular connectivity. It presents findings from a survey (N = 857) among adult smartphone users from major German cities regarding their smartphone usage preferences in this model. Results show a shift in app demand, with users favoring general-purpose apps over dedicated crisis apps in specific scenarios. We prioritize smartphone services based on their criticality, distinguishing between apps essential for crisis response and those supporting routines. Our findings provide operators, developers, and authorities insights into making user-centric design decisions for implementing island-ready 6G communication.},
    booktitle = {Proceedings of the {Conference} on {Human} {Factors} in {Computing} {Systems} ({CHI}) ({Honorable} {Mentions})},
    publisher = {Association for Computing Machinery},
    author = {Janzen, Leon and Putz, Florentin and Kaufhold, Marc-André and Straub, Kolja and Hollick, Matthias},
    year = {2025},
    keywords = {AuswahlCrisis, HCI, UsableSec, Security, A-Paper, Ranking-CORE-A*, Projekt-emergenCITY, Projekt-CYLENCE, emergenCITY\_INF, emergenCITY\_SG},
    }

  • Marc-André Kaufhold, Julian Bäumler, Marius Bajorski, Christian Reuter (2025)
    Cyber Threat Awareness, Protective Measures and Communication Preferences in Germany: Implications from Three Representative Surveys (2021-2024)
    Proceedings of the Conference on Human Factors in Computing Systems (CHI) Yokohama, Japan. doi:10.1145/3706598.3713795
    [BibTeX] [Abstract] [Download PDF]

    In light of the increasing vulnerability of citizens against cyberattacks, we conducted three representative surveys with German citizens in 2021 (N=1,093), 2023 (N=1,011), and 2024 (N=1,004) to examine their cyber threat awareness, use of protective security measures, and preferred information channels. While our findings attest large proportions of the German population a high level of cyber threat awareness, many citizens feel inadequately informed about coping with cyberattacks and show little confidence in German security authorities to protect citizens and infrastructures. While age correlated with citizens’ awareness and behavior, we only saw minor temporal differences between datasets. Finally, we provide design and policy implications for enhancing citizens’ awareness of cyber threats and implementing security measures.

    @inproceedings{kaufholdCyberThreatAwareness2025,
    address = {Yokohama, Japan},
    series = {{CHI} '25},
    title = {Cyber {Threat} {Awareness}, {Protective} {Measures} and {Communication} {Preferences} in {Germany}: {Implications} from {Three} {Representative} {Surveys} (2021-2024)},
    url = {https://peasec.de/paper/2025/2025_KaufholdB%C3%A4umlerBajorskiReuter_ComparativeCybersecuritySurvey_CHI.pdf},
    doi = {10.1145/3706598.3713795},
    abstract = {In light of the increasing vulnerability of citizens against cyberattacks, we conducted three representative surveys with German citizens in 2021 (N=1,093), 2023 (N=1,011), and 2024 (N=1,004) to examine their cyber threat awareness, use of protective security measures, and preferred information channels. While our findings attest large proportions of the German population a high level of cyber threat awareness, many citizens feel inadequately informed about coping with cyberattacks and show little confidence in German security authorities to protect citizens and infrastructures. While age correlated with citizens’ awareness and behavior, we only saw minor temporal differences between datasets. Finally, we provide design and policy implications for enhancing citizens’ awareness of cyber threats and implementing security measures.},
    booktitle = {Proceedings of the {Conference} on {Human} {Factors} in {Computing} {Systems} ({CHI})},
    publisher = {Association for Computing Machinery},
    author = {Kaufhold, Marc-André and Bäumler, Julian and Bajorski, Marius and Reuter, Christian},
    year = {2025},
    keywords = {HCI, Selected, UsableSec, Security, A-Paper, Ranking-CORE-A*, AuswahlUsableSec, Projekt-CYLENCE, Projekt-ATHENE-CyAware},
    }

  • Julian Bäumler, Helen Bader, Marc-André Kaufhold, Christian Reuter (2025)
    Towards Youth-Sensitive Hateful Content Reporting: An Inclusive Focus Group Study in Germany
    Proceedings of the Conference on Human Factors in Computing Systems (CHI) (Honorable Mentions) Yokohama, Japan. doi:10.1145/3706598.3713542
    [BibTeX] [Abstract] [Download PDF]

    Youth are particularly likely to encounter hateful internet content, which can severely impact their well-being. While most social media provide reporting mechanisms, in several countries, severe hateful content can alternatively be reported to law enforcement or dedicated reporting centers. However, in Germany, many youth never resort to reporting. While research in human-computer interaction has investigated adults’ views on platform-based reporting, youth perspectives and platform-independent alternatives have received little attention. By involving a diverse group of 47 German adolescents and young adults in eight focus group interviews, we investigate how youth-sensitive reporting systems for hateful content can be designed. We explore German youth’s reporting barriers, finding that on platforms, they feel particularly discouraged by deficient rule enforcement and feedback, while platform-independent alternatives are rather unknown and perceived as time-consuming and disruptive. We further elicit their requirements for platform-independent reporting tools and contribute with heuristics for designing youth-sensitive and inclusive reporting systems.

    @inproceedings{baumlerYouthSensitiveHatefulContent2025,
    address = {Yokohama, Japan},
    series = {{CHI} '25},
    title = {Towards {Youth}-{Sensitive} {Hateful} {Content} {Reporting}: {An} {Inclusive} {Focus} {Group} {Study} in {Germany}},
    url = {peasec.de/paper/2025/2025_BäumlerBaderKaufholdReuter_HatefulContentReporting_CHI.pdf},
    doi = {10.1145/3706598.3713542},
    abstract = {Youth are particularly likely to encounter hateful internet content, which can severely impact their well-being. While most social media provide reporting mechanisms, in several countries, severe hateful content can alternatively be reported to law enforcement or dedicated reporting centers. However, in Germany, many youth never resort to reporting. While research in human-computer interaction has investigated adults’ views on platform-based reporting, youth perspectives and platform-independent alternatives have received little attention. By involving a diverse group of 47 German adolescents and young adults in eight focus group interviews, we investigate how youth-sensitive reporting systems for hateful content can be designed. We explore German youth’s reporting barriers, finding that on platforms, they feel particularly discouraged by deficient rule enforcement and feedback, while platform-independent alternatives are rather unknown and perceived as time-consuming and disruptive. We further elicit their requirements for platform-independent reporting tools and contribute with heuristics for designing youth-sensitive and inclusive reporting systems.},
    booktitle = {Proceedings of the {Conference} on {Human} {Factors} in {Computing} {Systems} ({CHI}) ({Honorable} {Mentions})},
    publisher = {Association for Computing Machinery},
    author = {Bäumler, Julian and Bader, Helen and Kaufhold, Marc-André and Reuter, Christian},
    year = {2025},
    keywords = {AuswahlCrisis, Crisis, HCI, Selected, Student, A-Paper, Ranking-CORE-A*, Projekt-CYLENCE, Projekt-ATHENE-CyAware},
    }

  • Marc-André Kaufhold, Tilo Mentler, Simon Nestler, Katrin Hartwig, Christian Reuter (2025)
    12. Workshop Mensch-Maschine-Interaktion in sicherheitskritischen Systemen
    Mensch und Computer 2025 – Workshopband Chemnitz, Germany. doi:10.18420/muc2025-mci-ws-102
    [BibTeX] [Abstract] [Download PDF]

    Im Zentrum dieses Workshops steht die Interaktion von Mensch und Technik in sicherheitskritischen Kontexten. Hierzu zählen Bereiche, die bereits seit Jahrzehnten Gegenstand der Forschung sind (z.B. Prozessführung in Leitwarten), aber auch aktuelle Herausforderungen (z.B. Social Media im Katastrophenschutz). In diesen und vielen weiteren Bereichen gilt, dass sichere Systemzustände nur durch die ganzheitliche Betrachtung von Mensch, Technik und Organisation gewährleistet bzw. schnellstmöglich wieder erreicht werden können. In diesem Zusammenhang ist der Workshop auch der Nutzbarkeit und Akzeptanz von Sicherheitskonzepten sowie einer bewussteren Auseinandersetzung der Nutzenden mit diesem Thema gewidmet.

    @inproceedings{kaufhold12WorkshopMenschMaschineInteraktion2025,
    address = {Chemnitz, Germany},
    title = {12. {Workshop} {Mensch}-{Maschine}-{Interaktion} in sicherheitskritischen {Systemen}},
    url = {https://dl.gi.de/items/1deb68fe-4141-4475-8e2b-51188ef57566},
    doi = {10.18420/muc2025-mci-ws-102},
    abstract = {Im Zentrum dieses Workshops steht die Interaktion von Mensch und Technik in sicherheitskritischen Kontexten. Hierzu zählen Bereiche, die bereits seit Jahrzehnten Gegenstand der Forschung sind (z.B. Prozessführung in Leitwarten), aber auch aktuelle Herausforderungen (z.B. Social Media im Katastrophenschutz). In diesen und vielen weiteren Bereichen gilt, dass sichere Systemzustände nur durch die ganzheitliche Betrachtung von Mensch, Technik und Organisation gewährleistet bzw. schnellstmöglich wieder erreicht werden können. In diesem Zusammenhang ist der Workshop auch der Nutzbarkeit und Akzeptanz von Sicherheitskonzepten sowie einer bewussteren Auseinandersetzung der Nutzenden mit diesem Thema gewidmet.},
    language = {de},
    booktitle = {Mensch und {Computer} 2025 - {Workshopband}},
    publisher = {Gesellschaft für Informatik e.V.},
    author = {Kaufhold, Marc-André and Mentler, Tilo and Nestler, Simon and Hartwig, Katrin and Reuter, Christian},
    year = {2025},
    keywords = {HCI, UsableSec, Security, Projekt-CYLENCE, Projekt-ATHENE},
    }

  • Tom Biselli, Katrin Hartwig, Niklas Kneissl, Louis Pouliot, Christian Reuter (2025)
    ChartChecker: A User-Centred Approach to Support the Understanding of Misleading Charts
    Proceedings of the ACM Designing Interactive Systems Conference (DIS) . doi:10.1145/3715336.3735784
    [BibTeX] [Abstract] [Download PDF]

    Misinformation through data visualisation is particularly dangerous because charts are often perceived as objective data representations. While past efforts to counter misinformation have focused on text and, to some extent, images and video, developing user-centred strategies to combat misleading charts remains an unresolved challenge. This study presents a conceptual approach through ChartChecker, a browser-plugin that aims to automatically extract line and bar chart data and detect potentially misleading features such as non-linear axis scales. A participatory design approach was used to develop a user-centred interface to provide transparent, comprehensible information about potentially misleading features in charts. Finally, a think-aloud study (N = 15) with ChartChecker revealed overall satisfaction with the tools’ user interface, comprehensibility, functionality, and usefulness. The results are discussed in terms of improving user engagement, increasing transparency and optimising tools designed to counter misleading information in charts, leading to overarching design implications for user-centred strategies for the visual domain.

    @inproceedings{biselliChartCheckerUserCentredApproach2025,
    series = {{DIS} '25},
    title = {{ChartChecker}: {A} {User}-{Centred} {Approach} to {Support} the {Understanding} of {Misleading} {Charts}},
    url = {https://www.peasec.de/paper/2025/2025_BiselliHartwigKneisslPouiliotReuter_ChartChecker_DIS.pdf},
    doi = {10.1145/3715336.3735784},
    abstract = {Misinformation through data visualisation is particularly dangerous because charts are often perceived as objective data representations. While past efforts to counter misinformation have focused on text and, to some extent, images and video, developing user-centred strategies to combat misleading charts remains an unresolved challenge.
    This study presents a conceptual approach through ChartChecker, a browser-plugin that aims to automatically extract line and bar chart data and detect potentially misleading features such as non-linear axis scales. A participatory design approach was used to develop a user-centred interface to provide transparent, comprehensible information about potentially misleading features in charts. Finally, a think-aloud study (N = 15) with ChartChecker revealed overall satisfaction with the tools' user interface, comprehensibility, functionality, and usefulness. The results are discussed in terms of improving user engagement, increasing transparency and optimising tools designed to counter misleading information in charts, leading to overarching design implications for user-centred strategies for the visual domain.},
    booktitle = {Proceedings of the {ACM} {Designing} {Interactive} {Systems} {Conference} ({DIS})},
    publisher = {Association for Computing Machinery},
    author = {Biselli, Tom and Hartwig, Katrin and Kneissl, Niklas and Pouliot, Louis and Reuter, Christian},
    year = {2025},
    keywords = {Crisis, HCI, Student, A-Paper, Ranking-CORE-A, Projekt-NEBULA, Projekt-ATHENE-PriVis},
    }

  • Marc-André Kaufhold, Julian Bäumler, Nicolai Koukal, Christian Reuter (2025)
    AdvisoryHub: Design and Evaluation of a Cross-Platform Security Advisory System for Cyber Situational Awareness
    Proceedings of the 20th International Conference on Availability, Reliability and Security (ARES 2025) Cham. doi:10.1007/978-3-032-00627-1_3
    [BibTeX] [Abstract] [Download PDF]

    Computer Emergency Response Teams provide advisory, preventive, and reactive cybersecurity services for authorities, citizens, and businesses. However, their responsibility of establishing cyber situational awareness by monitoring and analyzing security advisories and vulnerabilities has become challenging due to the growing volume of information disseminated through public channels. Thus, this paper presents the preliminary design of a system for automatically retrieving and extracting security advisory documents from Common Security Advisory Framework (CSAF), HTML, and RSS sources. The evaluation with various security advisory sources (N=53) shows that the developed system can retrieve 90\% of the published advisory documents, which is a significant improvement over systems only relying on the retrieval from RSS feeds (30\%).

    @inproceedings{kaufholdAdvisoryHubDesignEvaluation2025,
    address = {Cham},
    title = {{AdvisoryHub}: {Design} and {Evaluation} of a {Cross}-{Platform} {Security} {Advisory} {System} for {Cyber} {Situational} {Awareness}},
    isbn = {978-3-032-00627-1},
    url = {https://www.peasec.de/paper/2025/2025_KaufholdBäumlerKoukalReuter_SecurityAdvisoryExtractionSystem_ARES.pdf},
    doi = {10.1007/978-3-032-00627-1_3},
    abstract = {Computer Emergency Response Teams provide advisory, preventive, and reactive cybersecurity services for authorities, citizens, and businesses. However, their responsibility of establishing cyber situational awareness by monitoring and analyzing security advisories and vulnerabilities has become challenging due to the growing volume of information disseminated through public channels. Thus, this paper presents the preliminary design of a system for automatically retrieving and extracting security advisory documents from Common Security Advisory Framework (CSAF), HTML, and RSS sources. The evaluation with various security advisory sources (N=53) shows that the developed system can retrieve 90\% of the published advisory documents, which is a significant improvement over systems only relying on the retrieval from RSS feeds (30\%).},
    language = {en},
    booktitle = {Proceedings of the 20th {International} {Conference} on {Availability}, {Reliability} and {Security} ({ARES} 2025)},
    publisher = {Springer Nature Switzerland},
    author = {Kaufhold, Marc-André and Bäumler, Julian and Koukal, Nicolai and Reuter, Christian},
    editor = {Dalla Preda, Mila and Schrittwieser, Sebastian and Naessens, Vincent and De Sutter, Bjorn},
    year = {2025},
    keywords = {HCI, UsableSec, Ranking-CORE-B, Projekt-CYLENCE, Projekt-ATHENE-CyAware},
    pages = {47--68},
    }

  • Julius von Willich, Frank Nelles, Wen-Jie Tseng, Jan Gugenheimer, Sebastian Günther, Max Mühlhäuser (2025)
    A Qualitative Investigation of User Transitions and Frictions in Cross-Reality Applications
    Proceedings of the Conference on Human Factors in Computing Systems (CHI) New York, NY, USA. doi:10.1145/3706598.3713921
    [BibTeX] [Abstract] [Download PDF]

    Research in Augmented Reality (AR) and Virtual Reality (VR) has mostly viewed them in isolation. Yet, when used together in practical settings, AR and VR each offer unique strengths, necessitating multiple transitions to harness their advantages. This paper investigates potential challenges in Cross-Reality (CR) transitions to inform future application design. We implemented a CR system featuring a 3D modeling task that requires users to switch between PC, AR, and VR. Using a talk-aloud study (n=12) and thematic analysis, we revealed that frictions primarily arose when transitions conflicted with users’ Spatial Mental Model (SMM). Furthermore, we found five transition archetypes employed to enhance productivity once an SMM was established. Our findings uncover that transitions have to focus on establishing and upholding the SMM of users across realities, by communicating differences between them.

    @inproceedings{10.1145/3706598.3713921,
    address = {New York, NY, USA},
    series = {Chi '25},
    title = {A {Qualitative} {Investigation} of {User} {Transitions} and {Frictions} in {Cross}-{Reality} {Applications}},
    isbn = {979-8-4007-1394-1},
    url = {https://www.peasec.de/paper/2025/2025_VonWillichNellesTsengGugenheimerGüntherMühlhäuser_FrictionsCrossReality_CHI.pdf},
    doi = {10.1145/3706598.3713921},
    abstract = {Research in Augmented Reality (AR) and Virtual Reality (VR) has mostly viewed them in isolation. Yet, when used together in practical settings, AR and VR each offer unique strengths, necessitating multiple transitions to harness their advantages. This paper investigates potential challenges in Cross-Reality (CR) transitions to inform future application design. We implemented a CR system featuring a 3D modeling task that requires users to switch between PC, AR, and VR. Using a talk-aloud study (n=12) and thematic analysis, we revealed that frictions primarily arose when transitions conflicted with users’ Spatial Mental Model (SMM). Furthermore, we found five transition archetypes employed to enhance productivity once an SMM was established. Our findings uncover that transitions have to focus on establishing and upholding the SMM of users across realities, by communicating differences between them.},
    booktitle = {Proceedings of the {Conference} on {Human} {Factors} in {Computing} {Systems} ({CHI})},
    publisher = {Association for Computing Machinery},
    author = {von Willich, Julius and Nelles, Frank and Tseng, Wen-Jie and Gugenheimer, Jan and Günther, Sebastian and Mühlhäuser, Max},
    year = {2025},
    note = {Number of pages: 18
    tex.articleno: 808},
    keywords = {HCI, A-Paper, Ranking-CORE-A*, Projekt-emergenCITY, Projekt-ATHENE, emergenCITY\_INF, emergenCITY\_SG},
    }

  • Steffen Haesler, Marc-André Kaufhold, Nadja Thiessen, Michaela Lestakova, Michele Knodt, Christian Reuter (2025)
    How to stay Connected: Citizens’ Needs on Digital Self-Organization in Neighborhoods during a Crisis
    Mensch und Computer 2025 – Workshopband . doi:10.18420/muc2025-mci-ws01-131
    [BibTeX] [Download PDF]

    @inproceedings{haeslerHowStayConnected2025,
    title = {How to stay {Connected}: {Citizens}' {Needs} on {Digital} {Self}-{Organization} in {Neighborhoods} during a {Crisis}},
    url = {https://dl.gi.de/items/f58b6f20-ded9-46c4-a709-9c37840d435f},
    doi = {10.18420/muc2025-mci-ws01-131},
    language = {en},
    booktitle = {Mensch und {Computer} 2025 - {Workshopband}},
    publisher = {Gesellschaft für Informatik e.V.},
    author = {Haesler, Steffen and Kaufhold, Marc-André and Thiessen, Nadja and Lestakova, Michaela and Knodt, Michele and Reuter, Christian},
    year = {2025},
    keywords = {HCI, UsableSec, Projekt-ATHENE-SecUrban, Projekt-emergenCITY},
    }

  • Philipp Kuehn, Markus Bayer, Tobias Frey, Moritz Kerk, Christian Reuter (2025)
    Reducing Information Overload: Because Even Security Experts Need to Blink
    Availability, Reliability and Security Cham. doi:10.1007/978-3-032-00633-2_9
    [BibTeX] [Abstract] [Download PDF]

    Computer Security Incident Response Teams (CSIRTs) face increasing challenges processing the growing volume of security-related information. Daily manual analysis of threat reports, security advisories, and vulnerability announcements leads to information overload, contributing to burnout and attrition among security professionals. Clustering such information to cope with the initial information volume and enables security professionals to grasp the current overview of the situation more easily and decide on actions. This work evaluates 196 combinations of clustering algorithms and embedding models across five security-related datasets to identify optimal approaches for automated information consolidation. We demonstrate that clustering can reduce information overload by over 90 \% while maintaining semantic coherence. Our evaluation indicates a minimal need of configuration to successfully cluster information within a reasonable timespan on consumer hardware. The findings suggest that clustering approaches can significantly enhance CSIRT operational efficiency while maintaining analytical integrity. However, complex threat reports require careful parameter tuning to achieve acceptable performance, indicating areas for future optimization (The code is made publicly available at the following URL: https://github.com/PEASEC/reducing-information-overload)

    @inproceedings{kuehn_reducing_2025,
    address = {Cham},
    title = {Reducing {Information} {Overload}: {Because} {Even} {Security} {Experts} {Need} to {Blink}},
    isbn = {978-3-032-00633-2},
    shorttitle = {Reducing {Information} {Overload}},
    url = {https://link.springer.com/chapter/10.1007/978-3-032-00633-2_9},
    doi = {10.1007/978-3-032-00633-2_9},
    abstract = {Computer Security Incident Response Teams (CSIRTs) face increasing challenges processing the growing volume of security-related information. Daily manual analysis of threat reports, security advisories, and vulnerability announcements leads to information overload, contributing to burnout and attrition among security professionals. Clustering such information to cope with the initial information volume and enables security professionals to grasp the current overview of the situation more easily and decide on actions. This work evaluates 196 combinations of clustering algorithms and embedding models across five security-related datasets to identify optimal approaches for automated information consolidation. We demonstrate that clustering can reduce information overload by over 90 \% while maintaining semantic coherence. Our evaluation indicates a minimal need of configuration to successfully cluster information within a reasonable timespan on consumer hardware. The findings suggest that clustering approaches can significantly enhance CSIRT operational efficiency while maintaining analytical integrity. However, complex threat reports require careful parameter tuning to achieve acceptable performance, indicating areas for future optimization (The code is made publicly available at the following URL: https://github.com/PEASEC/reducing-information-overload)},
    language = {en},
    booktitle = {Availability, {Reliability} and {Security}},
    publisher = {Springer Nature Switzerland},
    author = {Kuehn, Philipp and Bayer, Markus and Frey, Tobias and Kerk, Moritz and Reuter, Christian},
    editor = {Coppens, Bart and Volckaert, Bruno and Naessens, Vincent and De Sutter, Bjorn},
    year = {2025},
    keywords = {Student, UsableSec, Security, Ranking-CORE-B, Projekt-CYWARN, Projekt-ATHENE-CyAware},
    pages = {139--155},
    }

  • Anja-Liisa Gonsior (2025)
    Is Soft Law the New Law? Exploring Discourses on Governance and Regulation of Emerging Disruptive Technologies in the Military Domain
    Mensch und Computer 2025 – Workshopband . doi:10.18420/muc2025-mci-ws01-172
    [BibTeX] [Abstract] [Download PDF]

    In view of the increasing number of emerging disruptive technologies {\textbackslash}ac\{edts\} in military and warfare contexts, their regulation is becoming ever more urgent. {\textbackslash}ac\{edts\} encompass a very wide range of weapons technologies. In this article, I focus on technologies and applications in the fields of autonomy, artificial intelligence and cyber technologies. Dealing with the regulation of these technologies is particularly relevant as they are increasingly used in military contexts, yet at the same time there is no uniform international regulation approach to these {\textbackslash}ac\{edts\}. Moreover, this is a field in which different disciplines come into play. While social science research in this field focuses, for example, on the development of norms and political processes, aspects of human-machine interaction play an equally central role in this context, for example with regard to autonomous weapon systems. It becomes apparent that normative processes with regard to {\textbackslash}ac\{edts\} in the military sector take on a different dynamic and that soft law approaches are becoming increasingly important in view of unsuccessful regulatory and arms control efforts. In this paper, this focus of current research is considered in relation to the respective disciplines.

    @inproceedings{gonsiorSoftLawNew2025,
    title = {Is {Soft} {Law} the {New} {Law}? {Exploring} {Discourses} on {Governance} and {Regulation} of {Emerging} {Disruptive} {Technologies} in the {Military} {Domain}},
    url = {https://dl.gi.de/items/342b1381-6cfd-456f-96bf-4e9b6caf49a4},
    doi = {10.18420/muc2025-mci-ws01-172},
    abstract = {In view of the increasing number of emerging disruptive technologies {\textbackslash}ac\{edts\} in military and warfare contexts, their regulation is becoming ever more urgent. {\textbackslash}ac\{edts\} encompass a very wide range of weapons technologies. In this article, I focus on technologies and applications in the fields of autonomy, artificial intelligence and cyber technologies. Dealing with the regulation of these technologies is particularly relevant as they are increasingly used in military contexts, yet at the same time there is no uniform international regulation approach to these {\textbackslash}ac\{edts\}. Moreover, this is a field in which different disciplines come into play. While social science research in this field focuses, for example, on the development of norms and political processes, aspects of human-machine interaction play an equally central role in this context, for example with regard to autonomous weapon systems. It becomes apparent that normative processes with regard to {\textbackslash}ac\{edts\} in the military sector take on a different dynamic and that soft law approaches are becoming increasingly important in view of unsuccessful regulatory and arms control efforts. In this paper, this focus of current research is considered in relation to the respective disciplines.},
    language = {en},
    booktitle = {Mensch und {Computer} 2025 - {Workshopband}},
    publisher = {Gesellschaft für Informatik e.V.},
    author = {Gonsior, Anja-Liisa},
    year = {2025},
    keywords = {Peace, Projekt-TraCe, Security},
    }

    Weitere Publikationen / Other Publications

  • Philipp Kuehn, Dilara Nadermahmoodi, Markus Bayer, Christian Reuter (2025)
    Bandit on the Hunt: Dynamic Crawling for Cyber Threat Intelligence
    2025.
    [BibTeX] [Abstract] [Download PDF]

    Public information contains valuable Cyber Threat Intelligence (CTI) that is used to prevent future attacks. While standards exist for sharing this information, much appears in non-standardized news articles or blogs. Monitoring online sources for threats is time-consuming and source selection is uncertain. Current research focuses on extracting Indicators of Compromise from known sources, rarely addressing new source identification. This paper proposes a CTI-focused crawler using multi-armed bandit (MAB) and various crawling strategies. It employs SBERT to identify relevant documents while dynamically adapting its crawling path. Our system ThreatCrawl achieves a harvest rate exceeding 25\% and expands its seed by over 300\% while maintaining topical focus. Additionally, the crawler identifies previously unknown but highly relevant overview pages, datasets, and domains.

    @techreport{kuehnBanditHuntDynamic2025,
    title = {Bandit on the {Hunt}: {Dynamic} {Crawling} for {Cyber} {Threat} {Intelligence}},
    shorttitle = {Bandit on the {Hunt}},
    url = {http://arxiv.org/abs/2504.18375},
    abstract = {Public information contains valuable Cyber Threat Intelligence (CTI) that is used to prevent future attacks. While standards exist for sharing this information, much appears in non-standardized news articles or blogs. Monitoring online sources for threats is time-consuming and source selection is uncertain. Current research focuses on extracting Indicators of Compromise from known sources, rarely addressing new source identification. This paper proposes a CTI-focused crawler using multi-armed bandit (MAB) and various crawling strategies. It employs SBERT to identify relevant documents while dynamically adapting its crawling path. Our system ThreatCrawl achieves a harvest rate exceeding 25\% and expands its seed by over 300\% while maintaining topical focus. Additionally, the crawler identifies previously unknown but highly relevant overview pages, datasets, and domains.},
    number = {arXiv:2504.18375},
    urldate = {2025-05-20},
    institution = {arXiv},
    author = {Kuehn, Philipp and Nadermahmoodi, Dilara and Bayer, Markus and Reuter, Christian},
    month = apr,
    year = {2025},
    note = {arXiv:2504.18375 [cs]},
    keywords = {Student, UsableSec, Security, Projekt-ATHENE-SecUrban, Projekt-CYWARN},
    }

  • Laura Guntrum, Christian Reuter (2025)
    Digitale Gewalt gegen Aktivist:innen: Risiken und mögliche Handlungsmöglichkeiten
    2025.
    [BibTeX] [Abstract] [Download PDF]

    Seit den frühen 2010er Jahren, insbesondere während der Proteste in Ägypten und Tunesien, wurde die Rolle von Informations- und Kommunikationstechnologien (IKT) für aktivistische Tätigkeiten immer wichtiger. Dies zeigt sich beispielsweise an der Nutzung sozialer Medien durch Aktivist:innen in Myanmar, die nach dem Militärputsch 2021 internationale Aufmerksamkeit erlangen wollten. IKTs bieten zahlreiche Vorteile wie Kosteneinsparungen, Zugang zu alternativen Informationsquellen und die Demokratisierung politischer Beteiligung. Jedoch sind Aktivist:innen mit vielfältigen Herausforderungen und unterschiedlichen Formen von digitaler Gewalt konfrontiert, darunter Internetabschaltungen, Hassrede und Zensurmaßnahmen. Auch ist ein Anstieg digitaler Überwachung, Propaganda und der Manipulation von Informationen zu verzeichnen. Die zunehmende Verbreitung digitaler Gewalt stellt für Aktivist:innen und soziale Bewegungen ein signifikantes Problem dar, was dazu führt, dass sich immer mehr Aktivist:innen selbst zensieren und sich aus den Online-Räumen zurückziehen.

    @techreport{Guntrum2025,
    title = {Digitale {Gewalt} gegen {Aktivist}:innen: {Risiken} und mögliche {Handlungsmöglichkeiten}},
    url = {https://gi-radar.de/373-digitale-gewalt/},
    abstract = {Seit den frühen 2010er Jahren, insbesondere während der Proteste in Ägypten und Tunesien, wurde die Rolle von Informations- und Kommunikationstechnologien (IKT) für aktivistische Tätigkeiten immer wichtiger. Dies zeigt sich beispielsweise an der Nutzung sozialer Medien durch Aktivist:innen in Myanmar, die nach dem Militärputsch 2021 internationale Aufmerksamkeit erlangen wollten. IKTs bieten zahlreiche Vorteile wie Kosteneinsparungen, Zugang zu alternativen Informationsquellen und die Demokratisierung politischer Beteiligung. Jedoch sind Aktivist:innen mit vielfältigen Herausforderungen und unterschiedlichen Formen von digitaler Gewalt konfrontiert, darunter Internetabschaltungen, Hassrede und Zensurmaßnahmen. Auch ist ein Anstieg digitaler Überwachung, Propaganda und der Manipulation von Informationen zu verzeichnen. Die zunehmende Verbreitung digitaler Gewalt stellt für Aktivist:innen und soziale Bewegungen ein signifikantes Problem dar, was dazu führt, dass sich immer mehr Aktivist:innen selbst zensieren und sich aus den Online-Räumen zurückziehen.},
    institution = {Gesellschaft für Informatik},
    author = {Guntrum, Laura and Reuter, Christian},
    month = feb,
    year = {2025},
    keywords = {Peace, Projekt-TraCe},
    }

  • Jonas Franken (2025)
    Cable diplomacy: Securing influence, data and global rules
    2025.
    [BibTeX] [Abstract] [Download PDF]

    More than 600 subsea data cables connect nearly every coastal country of the world, amounting to a cumulative length of more than 1.5 million km. These fibre optic cables are responsible for over 99\% of intercontinental data traffic. They are the digital lifelines of our modern world. Yet, external factors frequently expose vulnerabilities in the network and its supporting infrastructure. While around 150 cable faults occur globally each year, a growing number of cable faults are suspected to be linked to hybrid or malicious activity. In this context, and following recent cable disruptions in the Baltic Sea, the European Union has put forth an EU Action Plan on Cable Security. Recognising that many states around the world face similar risks, this Action Plan proposes to establish “an advanced cable diplomacy” . But cable diplomacy is not a one-size-fits-all strategy. Technological sensitivities, dual-use military aspects and geopolitical considerations demand a tailored approach.This policy brief therefore addresses a key question: Where and how should the EU build effective cable diplomacy partnerships? To address this, the EU’s cable diplomacy should be structured around three geographic pillars, reflecting regional contexts and strategic opportunities. Alongside these regional priorities, the EU must also reinforce its role in shaping global governance for undersea infrastructure, working through multilateral institutions and international standard-setting bodies. By doing so, the European Union can strengthen global resilience of subsea infrastructure and position itself as a security enhancer in the field of critical infrastructure.

    @techreport{frankenCableDiplomacySecuring2025,
    title = {Cable diplomacy: {Securing} influence, data and global rules},
    url = {https://www.peasec.de/paper/2025/2025_Franken_CableDiplomacy_BoellEU.pdf},
    abstract = {More than 600 subsea data cables connect nearly every coastal country of the world, amounting to a cumulative length of more than 1.5 million km. These fibre optic cables are responsible for over 99\% of intercontinental data traffic. They are the digital lifelines of our modern world. Yet, external factors frequently expose vulnerabilities in the network and its supporting infrastructure. While around 150 cable faults occur globally each year, a growing number of cable faults are suspected to be linked to hybrid or malicious activity. In this context, and following recent cable disruptions in the Baltic Sea, the European Union has put forth an EU Action Plan on Cable Security. Recognising that many states around the world face similar risks, this Action Plan proposes to establish “an advanced cable diplomacy” . But cable diplomacy is not a one-size-fits-all strategy. Technological sensitivities, dual-use military aspects and geopolitical considerations demand a tailored approach.This policy brief therefore addresses a key question: Where and how should the EU build effective cable diplomacy partnerships? To address this, the EU’s cable diplomacy should be structured around three geographic pillars, reflecting regional contexts and strategic opportunities. Alongside these regional priorities, the EU must also reinforce its role in shaping global governance for undersea infrastructure, working through multilateral institutions and international standard-setting bodies. By doing so, the European Union can strengthen global resilience of subsea infrastructure and position itself as a security enhancer in the field of critical infrastructure.},
    institution = {Böll EU Brief},
    author = {Franken, Jonas},
    year = {2025},
    keywords = {Peace, Projekt-NetzGeschichte, Projekt-ATHENE-SecFOCI},
    }

  • Camino Kavanagh, Jonas Franken, Wenting He (2025)
    Achieving Depth: Subsea Telecommunications Cables as Critical Infrastructure
    Geneva, Switzerland: 2025.
    [BibTeX] [Abstract] [Download PDF]

    Today, submarine fibre-optic telecommunications cable systems are the backbone of our data and communications infrastructure, essential to the general functioning and integrity of the internet and the broader information and communications technology (ICT) ecosystem. While satellites and the new constellations in low Earth orbit are breaking ground, especially in terms of lowering costs and accessibility, they are still no match to the high capacity and low latency that today’s subsea cable systems provide. As more countries are connected, the security and resilience of the infrastructure becomes ever more critical. In 2023, UNIDIR published its first report on subsea cables, entitled Wading Murky Waters: Subsea Communications Cables and Responsible State Behaviour. The initial scoping study sought to raise awareness of this essential transmission technology. Since then, a slew of new initiatives have been proposed, including at the international level, signalling both the strategic importance of the infrastructure and the need to strengthen security and resilience across all of its components.This follow-on study sets out to understand what it means in policy and practice when governments qualify or designate subsea telecommunications cables as critical infrastructure (CI). The report draws from the CI literature to frame government approaches to security and resilience, identifying how government policy and practice interact with core CI concepts such as absorptive, restorative and adaptive resilience capacities. While subsea cable systems are generally designed and deployed with these capacities in mind, effective government action on security and resilience can contribute to strengthening them.

    @techreport{kavanagh_achieving_2025,
    address = {Geneva, Switzerland},
    title = {Achieving {Depth}: {Subsea} {Telecommunications} {Cables} as {Critical} {Infrastructure}},
    url = {https://unidir.org/publication/achieving-depth-subsea-telecommunications-cables-as-critical-infrastructure/},
    abstract = {Today, submarine fibre-optic telecommunications cable systems are the backbone of our data and communications infrastructure, essential to the general functioning and integrity of the internet and the broader information and communications technology (ICT) ecosystem. While satellites and the new constellations in low Earth orbit are breaking ground, especially in terms of lowering costs and accessibility, they are still no match to the high capacity and low latency that today’s subsea cable systems provide. As more countries are connected, the security and resilience of the infrastructure becomes ever more critical. In 2023, UNIDIR published its first report on subsea cables, entitled Wading Murky Waters: Subsea Communications Cables and Responsible State Behaviour. The initial scoping study sought to raise awareness of this essential transmission technology. Since then, a slew of new initiatives have been proposed, including at the international level, signalling both the strategic importance of the infrastructure and the need to strengthen security and resilience across all of its components.This follow-on study sets out to understand what it means in policy and practice when governments qualify or designate subsea telecommunications cables as critical infrastructure (CI). The report draws from the CI literature to frame government approaches to security and resilience, identifying how government policy and practice interact with core CI concepts such as absorptive, restorative and adaptive resilience capacities. While subsea cable systems are generally designed and deployed with these capacities in mind, effective government action on security and resilience can contribute to strengthening them.},
    institution = {United Nations Institute for Disarmament Research},
    author = {Kavanagh, Camino and Franken, Jonas and He, Wenting},
    year = {2025},
    keywords = {Security, Peace, Projekt-ATHENE-SecFOCI},
    }

  • Stefka Schmid, Julia Mahlberg (2025)
    AI for border control – a `geopolitical innovation race’ at the EU’s external borders
    Border Criminologies: 2025.
    [BibTeX] [Abstract] [Download PDF]

    The geopolitical innovation race is structured around four key dimensions: (1) pay-off structure, (2) actor networks, (3) motivation, and (4) social construction of technology that differentiate it from an `arms race’ and `innovation race’. The term `geopolitical innovation race’ tries to capture current dynamics of tech governance. Border control is neither the most prominent nor publicly discussed field of AI application, but we still find that related EU politics reflect notions of a `geopolitical innovation race’. From a technocratic, problem-solving perspective, border control represents just another `context of use’ of AI, neglecting that involved humans face impactful consequences of technology use. Characteristics of a geopolitical innovation race are notable in innovation projects for border control, illustrating a similar mode of politics across application contexts but with less ethical obligations to implement `trustworthy AI’ compared to commercial products.

    @techreport{schmidAIBorderEU2025,
    address = {Border Criminologies},
    title = {{AI} for border control – a `geopolitical innovation race' at the {EU}'s external borders},
    url = {https://blogs.law.ox.ac.uk/border-criminologies-blog/blog-post/2025/07/ai-border-control-geopolitical-innovation-race-eus},
    abstract = {The geopolitical innovation race is structured around four key dimensions: (1) pay-off structure, (2) actor networks, (3) motivation, and (4) social construction of technology that differentiate it from an `arms race' and `innovation race'. The term `geopolitical innovation race' tries to capture current dynamics of tech governance. Border control is neither the most prominent nor publicly discussed field of AI application, but we still find that related EU politics reflect notions of a `geopolitical innovation race'. From a technocratic, problem-solving perspective, border control represents just another `context of use' of AI, neglecting that involved humans face impactful consequences of technology use. Characteristics of a geopolitical innovation race are notable in innovation projects for border control, illustrating a similar mode of politics across application contexts but with less ethical obligations to implement `trustworthy AI' compared to commercial products.},
    author = {Schmid, Stefka and Mahlberg, Julia},
    year = {2025},
    keywords = {Peace, Projekt-CNTR, Projekt-TraCe, Student},
    }

  • Stefka Schmid, Carlo Diehl, Christian Reuter (2025)
    Neue Realitäten in der globalen Sicherheit durch KI [new realities of AI in global security]
    CNTR Monitor: 2025.
    [BibTeX]

    @techreport{schmid_CNTR_2025,
    address = {CNTR Monitor},
    title = {Neue {Realitäten} in der globalen {Sicherheit} durch {KI} [new realities of {AI} in global security]},
    institution = {CNTR Monitor},
    author = {Schmid, Stefka and Diehl, Carlo and Reuter, Christian},
    year = {2025},
    keywords = {Peace, Projekt-CNTR},
    }

  • Stefka Schmid, Diehl Carlo, Christian Reuter (2025)
    Das gefährliche Bild des „KI-Wettrüstens“: Wie Metaphern die globale KI-Politik prägen
    FIfF-Kommunikation: 2025.
    [BibTeX] [Abstract]

    Künstliche Intelligenz ist zu einem zentralen Feld des globalen Wettbewerbs geworden, das von China, den USA und der EU häufig als Teil eines „KI-Wettrüstens“ verstanden wird. Wir argumentieren jedoch, dass diese Metapher die Dynamiken der KI-Entwicklung verzerrt. Stattdessen schlagen wir den Begriff eines „geopolitischen Innovationswettlaufs“ um technologische Vorherrschaft in einer vernetzten globalen Wirtschaft vor. Auf Basis einer Analyse von Strategiepapieren zeigen wir, dass die Akteure (1) zwischen Nullsummen- und Positivsummenlogiken schwanken, (2) ihre Netzwerke entsprechend nationaler Innovationskulturen unterschiedlich organisieren, (3) neben Sicherheitsinteressen auch wirtschaftliche und statusbezogene Ziele verfolgen und (4) die Bedeutung von KI bewusst offenhalten. Übergreifend trägt die „Wettlauf“-Metapher dazu bei, die „Geopolitisierung“ von Innovation zu verfestigen und Sicherheit eng mit wirtschaftlichen Interessen zu verknüpfen. Vor diesem Hintergrund identifizieren wir folgende zentrale Punkte: 1. Die Metapher des „Wettrüstens“ sollte vermieden werden. Sie vereinfacht die KI-Entwicklung zu stark und birgt Eskalationsrisiken. Ein geopolitischer Innovationswettlauf basiert dagegen sowohl auf Wettbewerb als auch auf Zusammenarbeit. 2. Rhetorik zählt. Kommunikation, die auf einer nationalistischen Redeweise von „Wettrüsten“ aufbaut, fördert nur eine „Rückkehr zur Geopolitik“. Es ist zwar wichtig, Probleme transparent zu machen, sie sollten aber auf differenzierte Weise kommuniziert werden. 3. Kooperative Rahmenordnungen sollten gestärkt werden. Internationale Standards und Regulierung können Rivalitäten abmildern und, je nach ihrem Aufbau, Raum für verantwortungsvollere und diversere Innovation schaffen.

    @techreport{schmidGefahrlicheBildKIWettrustens2025,
    address = {FIfF-Kommunikation},
    title = {Das gefährliche {Bild} des „{KI}-{Wettrüstens}“: {Wie} {Metaphern} die globale {KI}-{Politik} prägen},
    abstract = {Künstliche Intelligenz ist zu einem zentralen Feld des globalen Wettbewerbs geworden, das von China, den USA und der EU häufig als Teil eines „KI-Wettrüstens“ verstanden wird. Wir argumentieren jedoch, dass diese Metapher die Dynamiken der KI-Entwicklung verzerrt. Stattdessen schlagen wir den Begriff eines „geopolitischen Innovationswettlaufs“ um technologische Vorherrschaft in einer vernetzten globalen Wirtschaft vor. Auf Basis einer Analyse von Strategiepapieren zeigen wir, dass die Akteure (1) zwischen Nullsummen- und Positivsummenlogiken schwanken, (2) ihre Netzwerke entsprechend nationaler Innovationskulturen unterschiedlich organisieren, (3) neben Sicherheitsinteressen auch wirtschaftliche und statusbezogene Ziele verfolgen und (4) die Bedeutung von KI bewusst offenhalten. Übergreifend trägt die „Wettlauf“-Metapher dazu bei, die „Geopolitisierung“ von Innovation zu verfestigen und Sicherheit eng mit wirtschaftlichen Interessen zu verknüpfen. Vor diesem Hintergrund identifizieren wir folgende zentrale Punkte:
    1.  Die Metapher des „Wettrüstens“ sollte vermieden werden. Sie vereinfacht die KI-Entwicklung zu stark und birgt Eskalationsrisiken. Ein geopolitischer Innovationswettlauf basiert dagegen sowohl auf Wettbewerb als auch auf Zusammenarbeit.
    2.  Rhetorik zählt. Kommunikation, die auf einer nationalistischen Redeweise von „Wettrüsten“ aufbaut, fördert nur eine „Rückkehr zur Geopolitik“. Es ist zwar wichtig, Probleme transparent zu machen, sie sollten aber auf differenzierte Weise kommuniziert werden.
    3.  Kooperative Rahmenordnungen sollten gestärkt werden. Internationale Standards und Regulierung können Rivalitäten abmildern und, je nach ihrem Aufbau, Raum für verantwortungsvollere und diversere Innovation schaffen.},
    author = {Schmid, Stefka and Carlo, Diehl and Reuter, Christian},
    year = {2025},
    keywords = {Peace, Projekt-CNTR, Projekt-TraCe, Security},
    }

    PEASEC 2025: The Year: 3 completed PhDs (Governing (In)Security, Threat Intelligence, Information Sovereignty), Conclusion as Dean, New Positions, 7 awards
    Tagged on: