Dear Members and Friends of PEASEC,
As 2025 comes to a close, we sincerely thank you for your support and contributions. Wishing you a joyful holiday season and a successful New Year!
A very short summary:
- Doctoral Theses:We celebrated the successful doctorates of Dr. Stefka Schmid, Dr. Philipp Kühn and Dr. Tom Biselli.
- Staff Developments: We welcomed new research associates (Dr. Ephraim Zimmer, Simon Althaus, Tim Fischer, Helen Bader), a new guest professor (Prof. Dr. Ira Helsloot), a new deputy professor (Vertr.-Prof. Dr. Katrin Hartwig) many new student assistants. Our secretrary Birgit Schmidt retired, and Dr. Sebastian Linsner, Dr. Stefka Schmid and Dr. Tom Biselli moved on.
- Leadership Transition: Prof. Christian Reuter concluded his term as dean and was appointed vice-director of emergenCITY and as GI ambassador.
- Publications and Awards: Our team published over 50 papers, including 17 in top-tier venues, and received multiple prestigious awards, such as 2 CHI Honorable Mention Awards and several further awards.
- Projects and Outreach: We contributed to award-winning projects like the eHUB, shared research at major conferences including CHI, and were featured in national and regional media.
Thank you for being part of our journey in 2025. We look forward to 2026!
Warm regards,
The PEASEC Team
Doctoral Theses
- In 2025 three doctoral candidates successfully completed their doctorates in our group:
- #10: Dr. phil. Stefka Schmid on Governing (In)Security,
- #11: Dr.-Ing. Philipp Kühn on Proactive Cyber Threat Intelligence,
- #12: Dr. rer. nat. Tom Biselli on Individual Information Sovereignty
- We are pleased that early this year we have surpassed the milestone of 10 doctoral graduates – trying to reach the milestone of 15 in 2026.
Staff Developments
- We welcomed new staff, especially our new research associates Dr. rer. nat. Ephraim Zimmer, Simon Althaus, M.Sc., Tim Fischer, M.Sc. as well as Helen Bader, M.A.. Additionally, we welcomed numerous new student assistants throughout the year.
- Over the course of this year, Dr.-Ing. Sebastian Linsner (LKA NRW), Dr. phil. Stefka Schmid (Aalto University, Finland) and Dr. rer. nat. Tom Biselli (Aalborg University, Denmark) have successfully completed their work with us moved on. After nearly 8 years in our group our secretary Birgit Schmidt is now retiring. We sincerely thank you for all your dedication and wish you all the very best for the future!
- Furthermore, many former student assistants graduated. We like to thank them for their achievements and commitment!
Leadership Transition:
- Leadership Transition at TU Darmstadt’s Department of Computer Science: Christian Reuter concluded his four-year term as Dean/Vice Dean of the Department of Computer Science at TU Darmstadt. The Department looks back on an intense period marked by significant faculty growth over two years (12 new appointments, 22 regular professors at the beginning), personnel reorganization in the Dean’s office, secured special developments, and notable academic achievements.
- Christian Reuter was appointed vice-director of emergenCITY and as GI ambassador.
Teaching
- We supervised around 30 successfully completed Bachelor’s and Master’s theses.
- We welcomed Prof. Dr. Ira Helsloot as guest professor in summer semester 2025, where he taught the course Cyber Incident Preparation and Response on decision-making during cyber incidents.
- Dr. Katrin Hartwig has been appointed as deputy professor (Vertretungsprofessor) for the winter semester 2025/2026 (1.10.2025-31.3.2026) to represent the W3 professorship ‘Knowledge Engineering’ at the Department of Computer Science at TU Darmstadt.
Publications and Awards
- During 2025, we published over 50 scientific publications – including 17 so-called ‘A-Papers’ (CORE-A*/A or high impact factor) (you can access these below).
- We are very grateful to have been selected for some prestigious awards:
- the CHI Honorable Mention Awards 2025 for two full papers by PEASEC researchers (in previous years: CHI Best Paper Award 2024 and CHI Best Paper Award 2023):
- “Towards Youth-Sensitive Hateful Content Reporting: An Inclusive Focus Group Study in Germany”
Authors: Julian Bäumler, Helen Bader, Dr. Marc-André Kaufhold, Prof. Dr. Dr. Christian Reuter - “The User Perspective on Island-Ready 6G Communication: A Survey of Future Smartphone Usage in Crisis-Struck Areas with Local Cellular Connectivity”
Authors: Leon Janzen, Florentin Putz, Dr. Marc-André Kaufhold, Kolja Straub, Prof. Dr. Matthias Hollick (in collaboration with SEEMOO)
- “Towards Youth-Sensitive Hateful Content Reporting: An Inclusive Focus Group Study in Germany”
- the Award for Outstanding Scientific Achievements of Vereinigung von Freunden der Technischen Universität zu Darmstadt e.V. for the PhD thesis of Dr. Katrin Hartwig
- the Freudenberg Award (10.000€) – Digital Science for the master’s thesis of Helen Bader, M.A.
- the Prize for Sustainability and Interdisciplinarity for eHUB Living Lab for the emergenCITY eHUB team, from our group: Markus Henkel, Dr. Steffen Haesler (alumni), Prof. Dr. Dr. Christian Reuter
- the IANUS Prize 2025 for scientific and technical peace and conflict research for Dr. Tom Biselli and Anna-Maria Kugler, M.Sc
- the CHI Honorable Mention Awards 2025 for two full papers by PEASEC researchers (in previous years: CHI Best Paper Award 2024 and CHI Best Paper Award 2023):
Projects, Events and Outreach
- We (co-)organised and contributed to various scientific events and conferences, presenting our research on crisis preparedness and digital rights at international venues. PEASEC researchers were involved in award-winning interdisciplinary projects such as the eHUB, shared insights at the BBK conference in Bonn, and joined global debates at RightsCon 2025 in Taipei.
- In addition, our work received attention in national and regional media such as FAZ, hessenschau, Darmstädter Echo and Mainzer Zeitung, underlining the societal relevance of our research on disinformation, resilience and digital security.
News 2025
2025 (49)
A-Paper 2025
(CORE≥A v VHB≥A v WKWI≥A v Thomson Reuters JIF≥1 v GI-CSCW≥A)
2025
[BibTeX] [Abstract] [Download PDF]
The rise of fake news and misinformation in the digital age poses serious risks for individuals and society, particularly during crises like the Israel-Hamas war, the Russian-Ukraine war, or the COVID-19 pandemic. Misinformation serves as a tool to manipulate public opinion and create discord. Vulnerability to manipulation increases in online spaces during crises, where authoritative information is scarce. Emergency management, public health, political and public administration, as well as media professionals and citizens express concern and seek solutions to enhance information quality during such critical times. This article highlights user-centred approaches to countering fake news and misinformation, tracing their historical evolution from ancient Greece to the present, focussing on their relevance during the COVID-19 crisis and in contemporary information warfare. It describes the vulnerability of audiences to misinformation and outlines prevailing trends in user-centred countermeasures. This article also introduces recent research on the effectiveness of media literacy interventions on truth discernment, a cross-cultural comparison of the perception of negative consequences and the injunctive norm, a comparison of video and text to promote lateral reading in adolescents, content-specific indicators on Twitter from a user perspective, a learning system for detecting misinformation as well as ethical and security considerations in automated detection.
@article{reuterCombatingInformationWarfare2025,
title = {Combating {Information} {Warfare}: {State} and {Trends} in {User}-{Centered} {Countermeasures} against {Fake} {News} and {Misinformation}},
volume = {44},
issn = {0144-929X},
url = {https://doi.org/10.1080/0144929X.2024.2442486},
doi = {10.1080/0144929X.2024.2442486},
abstract = {The rise of fake news and misinformation in the digital age poses serious risks for individuals and society, particularly during crises like the Israel-Hamas war, the Russian-Ukraine war, or the COVID-19 pandemic. Misinformation serves as a tool to manipulate public opinion and create discord. Vulnerability to manipulation increases in online spaces during crises, where authoritative information is scarce. Emergency management, public health, political and public administration, as well as media professionals and citizens express concern and seek solutions to enhance information quality during such critical times. This article highlights user-centred approaches to countering fake news and misinformation, tracing their historical evolution from ancient Greece to the present, focussing on their relevance during the COVID-19 crisis and in contemporary information warfare. It describes the vulnerability of audiences to misinformation and outlines prevailing trends in user-centred countermeasures. This article also introduces recent research on the effectiveness of media literacy interventions on truth discernment, a cross-cultural comparison of the perception of negative consequences and the injunctive norm, a comparison of video and text to promote lateral reading in adolescents, content-specific indicators on Twitter from a user perspective, a learning system for detecting misinformation as well as ethical and security considerations in automated detection.},
number = {13},
journal = {Behaviour \& Information Technology (BIT)},
author = {Reuter, Christian and Hughes, Amanda Lee and Buntain, Cody},
year = {2025},
keywords = {A-Paper, Crisis, HCI, Peace, Projekt-NEBULA, Ranking-CORE-A, Ranking-ImpactFactor, SocialMedia},
pages = {3348--3361},
}
[BibTeX] [Abstract]
The rise of fake news and misinformation in the digital age poses serious risks for individuals and society, particularly during crises like the Israel-Hamas war, the Russian-Ukraine war, or the COVID-19 pandemic. Misinformation serves as a tool to manipulate public opinion and create discord. Vulnerability to manipulation increases in online spaces during crises, where authoritative information is scarce. Emergency management, public health, political and public administration, as well as media professionals and citizens express concern and seek solutions to enhance information quality during such critical times. This article highlights user-centred approaches to countering fake news and misinformation, tracing their historical evolution from ancient Greece to the present, focussing on their relevance during the COVID-19 crisis and in contemporary information warfare. It describes the vulnerability of audiences to misinformation and outlines prevailing trends in user-centred countermeasures. This article also introduces recent research on the effectiveness of media literacy interventions on truth discernment, a cross-cultural comparison of the perception of negative consequences and the injunctive norm, a comparison of video and text to promote lateral reading in adolescents, content-specific indicators on Twitter from a user perspective, a learning system for detecting misinformation as well as ethical and security considerations in automated detection.
@book{reuterSpecialIssueCombating2025,
title = {Special {Issue} on {Combating} {Information} {Warfare}: {User}-{Centered} {Countermeasures} against {Fake} {News} and {Misinformation} - {Behaviour} \& {Information} {Technology} ({BIT})},
abstract = {The rise of fake news and misinformation in the digital age poses serious risks for individuals and society, particularly during crises like the Israel-Hamas war, the Russian-Ukraine war, or the COVID-19 pandemic. Misinformation serves as a tool to manipulate public opinion and create discord. Vulnerability to manipulation increases in online spaces during crises, where authoritative information is scarce. Emergency management, public health, political and public administration, as well as media professionals and citizens express concern and seek solutions to enhance information quality during such critical times. This article highlights user-centred approaches to countering fake news and misinformation, tracing their historical evolution from ancient Greece to the present, focussing on their relevance during the COVID-19 crisis and in contemporary information warfare. It describes the vulnerability of audiences to misinformation and outlines prevailing trends in user-centred countermeasures. This article also introduces recent research on the effectiveness of media literacy interventions on truth discernment, a cross-cultural comparison of the perception of negative consequences and the injunctive norm, a comparison of video and text to promote lateral reading in adolescents, content-specific indicators on Twitter from a user perspective, a learning system for detecting misinformation as well as ethical and security considerations in automated detection.},
publisher = {Taylor \& Francis},
author = {Reuter, Christian and Hughes, Amanda Lee and Buntain, Cody},
year = {2025},
note = {Publication Title: Behaviour \& Information Technology (BIT)},
keywords = {Crisis, HCI, SocialMedia, A-Paper, Ranking-ImpactFactor, Ranking-CORE-A, Peace},
}
[BibTeX] [Abstract] [Download PDF]
Active learning is designed to minimize annotation efforts by prioritizing instances that most enhance learning. However, many active learning strategies struggle with a ‘coldstart’ problem, needing substantial initial data to be effective. This limitation reduces their utility in the increasingly relevant fewshot scenarios, where the instance selection has a substantial impact. To address this, we introduce ActiveLLM, a novel active learning approach that leverages Large Language Models such as GPT-4, o1, Llama 3, or Mistral Large for selecting instances. We demonstrate that ActiveLLM significantly enhances the classification performance of BERT classifiers in few-shot scenarios, outperforming traditional active learning methods as well as improving the few-shot learning methods ADAPET, PERFECT, and Set- Fit. Additionally, ActiveLLM can be extended to non-few-shot scenarios, allowing for iterative selections. In this way, ActiveLLM can even help other active learning strategies to overcome their cold-start problem. Our results suggest that ActiveLLM offers a promising solution for improving model performance across various learning setups.
@article{bayerActiveLLMLargeLanguage2025,
title = {{ActiveLLM}: {Large} {Language} {Model}-based {Active} {Learning} for {Textual} {Few}-{Shot} {Scenarios}},
url = {https://arxiv.org/pdf/2405.10808},
doi = {10.48550/arXiv.2405.10808},
abstract = {Active learning is designed to minimize annotation
efforts by prioritizing instances that
most enhance learning. However, many active
learning strategies struggle with a ‘coldstart’
problem, needing substantial initial
data to be effective. This limitation reduces
their utility in the increasingly relevant fewshot
scenarios, where the instance selection
has a substantial impact. To address this, we
introduce ActiveLLM, a novel active learning
approach that leverages Large Language
Models such as GPT-4, o1, Llama 3, or
Mistral Large for selecting instances. We
demonstrate that ActiveLLM significantly
enhances the classification performance of
BERT classifiers in few-shot scenarios, outperforming
traditional active learning methods
as well as improving the few-shot learning
methods ADAPET, PERFECT, and Set-
Fit. Additionally, ActiveLLM can be extended
to non-few-shot scenarios, allowing
for iterative selections. In this way, ActiveLLM
can even help other active learning
strategies to overcome their cold-start problem.
Our results suggest that ActiveLLM
offers a promising solution for improving
model performance across various learning
setups.},
journal = {Transactions of the Association for Computational Linguistics (TACL)},
author = {Bayer, Markus and Lutz, Justin and Reuter, Christian},
year = {2025},
keywords = {Student, UsableSec, Security, A-Paper, Projekt-CYLENCE, Projekt-ATHENE-CyAware, CORE-A*},
}
[BibTeX] [Abstract] [Download PDF]
The development of artificial intelligence and autonomous functions in the military domain has an immense impact on technologies being developed by the private defence industry. Defence firms contribute to the narratives and visions on autonomous weapon systems and the future of warfare, e.g. in the form of strategic marketing of their products. However, their role has so far been understudied, especially regarding autonomous weapon systems. As the normative debate revolves around aspects of human control, this work examines the narratives of (meaningful) human control in the marketing of autonomous military systems by defence manufacturers. Based on a comprehensive content analysis of twenty defence firms, we identified three main narratives, which envision autonomy as a military advantage, the role of the human in the future of warfare, and human-machine teaming. Based on the results, we argue that defence companies reproduce and adapt narratives which shape expectations and visions of human control of autonomous weapon systems in anticipation of emerging norms for (meaningful) human control. However, without specifications and verification mechanisms, there is no indication that human control will be meaningful.
@article{riebeEnvisioningHumanMachineInteraction2025a,
title = {Envisioning {Human}-{Machine} {Interaction} in {Future} {Warfare}: {Defence} {Industry} {Narratives} on {Human} {Control} of {Autonomous} {Weapon} {Systems}},
volume = {39},
issn = {1360-0826},
url = {https://doi.org/10.1080/13600826.2024.2436966},
doi = {10.1080/13600826.2024.2436966},
abstract = {The development of artificial intelligence and autonomous functions in the military domain has an immense impact on technologies being developed by the private defence industry. Defence firms contribute to the narratives and visions on autonomous weapon systems and the future of warfare, e.g. in the form of strategic marketing of their products. However, their role has so far been understudied, especially regarding autonomous weapon systems. As the normative debate revolves around aspects of human control, this work examines the narratives of (meaningful) human control in the marketing of autonomous military systems by defence manufacturers. Based on a comprehensive content analysis of twenty defence firms, we identified three main narratives, which envision autonomy as a military advantage, the role of the human in the future of warfare, and human-machine teaming. Based on the results, we argue that defence companies reproduce and adapt narratives which shape expectations and visions of human control of autonomous weapon systems in anticipation of emerging norms for (meaningful) human control. However, without specifications and verification mechanisms, there is no indication that human control will be meaningful.},
number = {4},
journal = {Global Society},
author = {Riebe, Thea and Gonsior, Anja-Liisa and Reichert, Lilian and Reuter, Christian},
year = {2025},
keywords = {HCI, Student, A-Paper, Ranking-ImpactFactor, Peace, AuswahlPeace, Projekt-TraCe, Projekt-ATHENE-CyAware},
pages = {421--445},
}
[BibTeX] [Abstract] [Download PDF]
In conflict-ridden environments, timely and accurate information is critical for those dealing with the dynamic of events. When individuals have to flee, it becomes evident that refugees frequently rely on information and communication technologies (ICT) for information acquisition, travel coordination, and maintaining connections with related parties. Based on 17 interviews, this research explores how Ukrainian refugees, who sought protection in Germany due to the 2022 Russian full-scale invasion, use ICT before, during, and after their flight. By providing empirical findings, the results show in depth how contextual factors, such as infrastructural instability, privacy concerns and an advanced digitalization, interrelate with user behaviors. Analyzing the multifaceted civilian ICT use in the context of war and flight, this exploratory research contributes to the existing research on HCI in migration contexts and connects to several topics of CSCW. By contrasting case specifics, this work highlights what makes Ukraine a special case in this research area. Furthermore, this paper examines both existing and emerging affordances of ICT in the context of flight, and identifies the crucial role of messenger groups for information gathering in all phases of the flight. Lastly, collaborative dimensions of the identified affordances are discussed.
@article{steinbrinkSmartphoneICTUse2025,
title = {Smartphone and {ICT} {Use} {Among} {Ukrainian} {Refugees}: {Technology} {Support} during {War}, {Flight}, and {Adaptation} in {Germany}},
url = {https://www.peasec.de/paper/2025/2025_SteinbrinkGuntrumReuter_Ukraine_CSCW.pdf},
doi = {10.1145/3711067},
abstract = {In conflict-ridden environments, timely and accurate information is critical for those dealing with the dynamic of events. When individuals have to flee, it becomes evident that refugees frequently rely on information and communication technologies (ICT) for information acquisition, travel coordination, and maintaining connections with related parties. Based on 17 interviews, this research explores how Ukrainian refugees, who sought protection in Germany due to the 2022 Russian full-scale invasion, use ICT before, during, and after their flight. By providing empirical findings, the results show in depth how contextual factors, such as infrastructural instability, privacy concerns and an advanced digitalization, interrelate with user behaviors. Analyzing the multifaceted civilian ICT use in the context of war and flight, this exploratory research contributes to the existing research on HCI in migration contexts and connects to several topics of CSCW. By contrasting case specifics, this work highlights what makes Ukraine a special case in this research area. Furthermore, this paper examines both existing and emerging affordances of ICT in the context of flight, and identifies the crucial role of messenger groups for information gathering in all phases of the flight. Lastly, collaborative dimensions of the identified affordances are discussed.},
number = {CSCW},
journal = {Proceedings of the ACM: Human Computer Interaction (PACM): Computer-Supported Cooperative Work and Social Computing},
author = {Steinbrink, Enno and Guntrum, Laura and Reuter, Christian},
year = {2025},
note = {Place: New York, NY, USA
Publisher: Association for Computing Machinery},
keywords = {Crisis, HCI, UsableSec, A-Paper, Ranking-CORE-A, Projekt-GRKPrivacy, Projekt-TraCe, Projekt-ATHENE},
}
[BibTeX] [Abstract] [Download PDF]
In Germany and other countries, specialized non-profit reporting centers combat online hate speech by submitting criminal content to law enforcement agencies, forwarding deletion requests to social media platforms, and providing counseling to victims, thus contributing to the governance mechanism of content moderation as intermediaries between victims and various organizations. Whereas research in computer-supported cooperative work has extensively explored collaboration of and automation for content moderators, there are no works that focus on reporting centers. Based on expert interviews with their staff (N=15), this study finds that most German centers share a collaborative workflow, of which multiple tasks are heavily dependent on inter-organizational exchange. However, there are differences in their implementation of monitoring, content assessment, automation technology adoption, and external collaborators. As the centers are faced with diverse challenges, such as borderline case assessment, psychological burdens, limited visibility, conflicting goals with other actors, and manual repetitive work, our study contributes with nine implications for designing and researching supportive technologies. They provide suggestions for improving hate speech gathering and reporting, researching hate speech prioritization and assessment algorithms, and designing case processing systems. Beyond that, we outline directions for research on inter-organizational collaboration.
@article{baumlerHarnessingInterOrganizationalCollaboration2025,
title = {Harnessing {Inter}-{Organizational} {Collaboration} and {Automation} to {Combat} {Online} {Hate} {Speech}: {A} {Qualitative} {Study} with {German} {Reporting} {Centers}},
url = {https://dl.acm.org/doi/10.1145/3710991},
doi = {10.1145/3710991},
abstract = {In Germany and other countries, specialized non-profit reporting centers combat online hate speech by submitting criminal content to law enforcement agencies, forwarding deletion requests to social media platforms, and providing counseling to victims, thus contributing to the governance mechanism of content moderation as intermediaries between victims and various organizations. Whereas research in computer-supported cooperative work has extensively explored collaboration of and automation for content moderators, there are no works that focus on reporting centers. Based on expert interviews with their staff (N=15), this study finds that most German centers share a collaborative workflow, of which multiple tasks are heavily dependent on inter-organizational exchange. However, there are differences in their implementation of monitoring, content assessment, automation technology adoption, and external collaborators. As the centers are faced with diverse challenges, such as borderline case assessment, psychological burdens, limited visibility, conflicting goals with other actors, and manual repetitive work, our study contributes with nine implications for designing and researching supportive technologies. They provide suggestions for improving hate speech gathering and reporting, researching hate speech prioritization and assessment algorithms, and designing case processing systems. Beyond that, we outline directions for research on inter-organizational collaboration.},
journal = {Proceedings of the ACM: Human Computer Interaction (PACM): Computer-Supported Cooperative Work and Social Computing},
author = {Bäumler, Julian and Riebe, Thea and Kaufhold, Marc-André and Reuter, Christian},
year = {2025},
keywords = {AuswahlCrisis, Crisis, HCI, A-Paper, Ranking-CORE-A, Projekt-CYWARN, Projekt-CYLENCE},
}
[BibTeX] [Abstract] [Download PDF]
The ongoing challenge of misinformation on social media motivates ongoing efforts to find effective countermeasures. In this study, we evaluated the potential of personalised nudging to reduce the sharing of misinformation on social media, as personalised support has been successfully applied in other areas of critical information handling. In an online experiment (N = 396) exposing users to social media posts, we assessed the degree of misinformation sharing between groups receiving (1) no nudges, (2) non-personalised nudges, and (3) personalised nudges. Personalisation was based on three psychometric dimensions – general decision-making style, consideration of future consequences, need for cognition – to assign the most appropriate nudge from a pool of five nudges. The results showed significant differences (p {\textless} .05) between all three groups, with the personalised nudge group sharing the least misinformation. Detailed analyses at the nudge level revealed that one nudge was universally effective and two nudges were effective only in their personalised form. The results generally confirm the potential of personalisation, although the effect is limited in scope. These findings shed light on the nuanced results of nudging studies, highlight the benefits of personalisation, and raise ethical considerations regarding the privacy implications of personalisation and those inherent in nudges.
@article{biselliMitigatingMisinformationSharing2025,
title = {Mitigating {Misinformation} {Sharing} on {Social} {Media} through {Personalised} {Nudging}},
volume = {9},
url = {https://www.peasec.de/paper/2025/2025_BiselliHartwigReuter_PersonalisedNudges_CSCW.pdf},
doi = {https://doi.org/10.1145/3711034},
abstract = {The ongoing challenge of misinformation on social media motivates ongoing efforts to find effective countermeasures.
In this study, we evaluated the potential of personalised nudging to reduce the sharing of misinformation on social media, as personalised support has been successfully applied in other areas of critical information handling.
In an online experiment (N = 396) exposing users to social media posts, we assessed the degree of misinformation sharing between groups receiving (1) no nudges, (2) non-personalised nudges, and (3) personalised nudges. Personalisation was based on three psychometric dimensions - general decision-making style, consideration of future consequences, need for cognition - to assign the most appropriate nudge from a pool of five nudges.
The results showed significant differences (p {\textless} .05) between all three groups, with the personalised nudge group sharing the least misinformation. Detailed analyses at the nudge level revealed that one nudge was universally effective and two nudges were effective only in their personalised form.
The results generally confirm the potential of personalisation, although the effect is limited in scope.
These findings shed light on the nuanced results of nudging studies, highlight the benefits of personalisation, and raise ethical considerations regarding the privacy implications of personalisation and those inherent in nudges.},
number = {2},
journal = {Proceedings of the ACM: Human Computer Interaction (PACM): Computer-Supported Cooperative Work and Social Computing},
author = {Biselli, Tom and Hartwig, Katrin and Reuter, Christian},
year = {2025},
keywords = {Crisis, HCI, A-Paper, Ranking-CORE-A, Projekt-NEBULA, Projekt-ATHENE-PriVis},
}
[BibTeX] [Abstract] [Download PDF]
China, the United States, and the European Union have spoken of a global competition surrounding Artificial Intelligence (AI). There is widespread talk of an ‘AI Arms Race’. But what is the nature of this race? We argue that the arms race metaphor does not capture the dynamics of global competition in the AI sector. Instead, we propose the notion of a ‘geopolitical innovation race’ for technological leadership in a networked global economy. Based on an analysis of government documents, we find that actors (1) are open to both zero-sum or positive-sum approaches in AI development, (2) organise actor networks differently based on national innovation cultures, (3) prioritise economics and status next to security concerns, and (4) are open to how AI should be interpreted. Referring to the competitive race of AI research and development, the three technopoles perpetuate the geopoliticisation of innovation and intertwine security and economic interests.
@article{schmidArmsRaceInnovation2025,
title = {Arms {Race} or {Innovation} {Race}? {Geopolitical} {AI} {Development}},
volume = {30},
issn = {1465-0045},
url = {https://doi.org/10.1080/14650045.2025.2456019},
doi = {10.1080/14650045.2025.2456019},
abstract = {China, the United States, and the European Union have spoken of a global competition surrounding Artificial Intelligence (AI). There is widespread talk of an ‘AI Arms Race’. But what is the nature of this race? We argue that the arms race metaphor does not capture the dynamics of global competition in the AI sector. Instead, we propose the notion of a ‘geopolitical innovation race’ for technological leadership in a networked global economy. Based on an analysis of government documents, we find that actors (1) are open to both zero-sum or positive-sum approaches in AI development, (2) organise actor networks differently based on national innovation cultures, (3) prioritise economics and status next to security concerns, and (4) are open to how AI should be interpreted. Referring to the competitive race of AI research and development, the three technopoles perpetuate the geopoliticisation of innovation and intertwine security and economic interests.},
number = {4},
journal = {Geopolitics},
author = {Schmid, Stefka and Lambach, Daniel and Diehl, Carlo and Reuter, Christian},
year = {2025},
note = {Publisher: Routledge},
keywords = {Selected, A-Paper, Ranking-ImpactFactor, Peace, AuswahlPeace, Projekt-TraCe, Projekt-ATHENE},
pages = {1907--1936},
}
[BibTeX] [Abstract] [Download PDF]
Using smartphone apps during crises is well-established, proving critical for efficient crisis response. However, such apps become futile without an Internet connection, which is a common issue during crises. The ongoing 6G standardization explores the capability to provide local cellular connectivity for areas cut off from the Internet in crises. This paper introduces to the HCI community the concept of cellular island connectivity in isolated areas, promising a seamless transition from normal operation to island operation with local-only cellular connectivity. It presents findings from a survey (N = 857) among adult smartphone users from major German cities regarding their smartphone usage preferences in this model. Results show a shift in app demand, with users favoring general-purpose apps over dedicated crisis apps in specific scenarios. We prioritize smartphone services based on their criticality, distinguishing between apps essential for crisis response and those supporting routines. Our findings provide operators, developers, and authorities insights into making user-centric design decisions for implementing island-ready 6G communication.
@inproceedings{janzenUserPerspectiveIslandReady2025,
address = {Yokohama, Japan},
series = {{CHI} '25},
title = {The {User} {Perspective} on {Island}-{Ready} {6G} {Communication}: {A} {Survey} of {Future} {Smartphone} {Usage} in {Crisis}-{Struck} {Areas} with {Local} {Cellular} {Connectivity}},
url = {peasec.de/paper/2025/2025_JanzenPutzKaufholdStraubHollick_UserPerspective6GCommunication_CHI.pdf},
doi = {10.1145/3706598.3714324},
abstract = {Using smartphone apps during crises is well-established, proving critical for efficient crisis response. However, such apps become futile without an Internet connection, which is a common issue during crises. The ongoing 6G standardization explores the capability to provide local cellular connectivity for areas cut off from the Internet in crises. This paper introduces to the HCI community the concept of cellular island connectivity in isolated areas, promising a seamless transition from normal operation to island operation with local-only cellular connectivity. It presents findings from a survey (N = 857) among adult smartphone users from major German cities regarding their smartphone usage preferences in this model. Results show a shift in app demand, with users favoring general-purpose apps over dedicated crisis apps in specific scenarios. We prioritize smartphone services based on their criticality, distinguishing between apps essential for crisis response and those supporting routines. Our findings provide operators, developers, and authorities insights into making user-centric design decisions for implementing island-ready 6G communication.},
booktitle = {Proceedings of the {Conference} on {Human} {Factors} in {Computing} {Systems} ({CHI}) ({Honorable} {Mentions})},
publisher = {Association for Computing Machinery},
author = {Janzen, Leon and Putz, Florentin and Kaufhold, Marc-André and Straub, Kolja and Hollick, Matthias},
year = {2025},
keywords = {AuswahlCrisis, HCI, UsableSec, Security, A-Paper, Ranking-CORE-A*, Projekt-emergenCITY, Projekt-CYLENCE, emergenCITY\_INF, emergenCITY\_SG},
}
[BibTeX] [Abstract] [Download PDF]
In light of the increasing vulnerability of citizens against cyberattacks, we conducted three representative surveys with German citizens in 2021 (N=1,093), 2023 (N=1,011), and 2024 (N=1,004) to examine their cyber threat awareness, use of protective security measures, and preferred information channels. While our findings attest large proportions of the German population a high level of cyber threat awareness, many citizens feel inadequately informed about coping with cyberattacks and show little confidence in German security authorities to protect citizens and infrastructures. While age correlated with citizens’ awareness and behavior, we only saw minor temporal differences between datasets. Finally, we provide design and policy implications for enhancing citizens’ awareness of cyber threats and implementing security measures.
@inproceedings{kaufholdCyberThreatAwareness2025,
address = {Yokohama, Japan},
series = {{CHI} '25},
title = {Cyber {Threat} {Awareness}, {Protective} {Measures} and {Communication} {Preferences} in {Germany}: {Implications} from {Three} {Representative} {Surveys} (2021-2024)},
url = {https://peasec.de/paper/2025/2025_KaufholdB%C3%A4umlerBajorskiReuter_ComparativeCybersecuritySurvey_CHI.pdf},
doi = {10.1145/3706598.3713795},
abstract = {In light of the increasing vulnerability of citizens against cyberattacks, we conducted three representative surveys with German citizens in 2021 (N=1,093), 2023 (N=1,011), and 2024 (N=1,004) to examine their cyber threat awareness, use of protective security measures, and preferred information channels. While our findings attest large proportions of the German population a high level of cyber threat awareness, many citizens feel inadequately informed about coping with cyberattacks and show little confidence in German security authorities to protect citizens and infrastructures. While age correlated with citizens’ awareness and behavior, we only saw minor temporal differences between datasets. Finally, we provide design and policy implications for enhancing citizens’ awareness of cyber threats and implementing security measures.},
booktitle = {Proceedings of the {Conference} on {Human} {Factors} in {Computing} {Systems} ({CHI})},
publisher = {Association for Computing Machinery},
author = {Kaufhold, Marc-André and Bäumler, Julian and Bajorski, Marius and Reuter, Christian},
year = {2025},
keywords = {HCI, Selected, UsableSec, Security, A-Paper, Ranking-CORE-A*, AuswahlUsableSec, Projekt-CYLENCE, Projekt-ATHENE-CyAware},
}
[BibTeX] [Abstract] [Download PDF]
As smart home technology becomes integral to modern living, researchers must consider safety aspects. While single-purpose devices alert users to specific dangers, integrating them within comprehensive smart home warning systems (SHWSs) offers new safety potentials by allowing actuators to respond to threats based on predefined protocols. Key questions include whether user preferences for automation levels in smart homes are affected by different warning scenarios, and how unwanted automation or false positives influence acceptance. To explore this, we conduct two studies: (1) A lab study in a smart home with various actuators, where participants (N = 48) encounter warnings across three automation levels. (2) A follow-up interview study (N = 16) further evaluating our prototype and unwanted automation situations. Results show that participants preferred higher automation during warnings and were more receptive to smart technology in dangerous situations, though customization remains essential to ensure acceptance. While higher automation levels reduced perceived interruption, some still preferred less intense warnings. Others preferred not receiving warnings of mild dangers, fully relying on automation. Finally, we find that specific safety protocols and handling of false positive alarms must be chosen carefully to avoid mistrust, users feeling a loss of control, and damage through unwanted executions.
@article{henkelHouseThatSaves2025,
title = {The {House} {That} {Saves} {Me}? {Assessing} the {Role} of {Smart} {Home} {Automation} in {Warning} {Scenarios}},
volume = {9},
shorttitle = {The {House} {That} {Saves} {Me}?},
url = {https://www.peasec.de/paper/2025/2025_HenkelHaeslerAlNajmiHesselReuter_HouseThatSavesMe_IMWUT.pdf},
doi = {10.1145/3712269},
abstract = {As smart home technology becomes integral to modern living, researchers must consider safety aspects. While single-purpose devices alert users to specific dangers, integrating them within comprehensive smart home warning systems (SHWSs) offers new safety potentials by allowing actuators to respond to threats based on predefined protocols. Key questions include whether user preferences for automation levels in smart homes are affected by different warning scenarios, and how unwanted automation or false positives influence acceptance. To explore this, we conduct two studies: (1) A lab study in a smart home with various actuators, where participants (N = 48) encounter warnings across three automation levels. (2) A follow-up interview study (N = 16) further evaluating our prototype and unwanted automation situations. Results show that participants preferred higher automation during warnings and were more receptive to smart technology in dangerous situations, though customization remains essential to ensure acceptance. While higher automation levels reduced perceived interruption, some still preferred less intense warnings. Others preferred not receiving warnings of mild dangers, fully relying on automation. Finally, we find that specific safety protocols and handling of false positive alarms must be chosen carefully to avoid mistrust, users feeling a loss of control, and damage through unwanted executions.},
number = {1},
journal = {Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies (IMWUT)},
author = {Henkel, Markus and Haesler, Steffen and Al-Najmi, Hiba and Hessel, Frank and Reuter, Christian},
year = {2025},
keywords = {AuswahlCrisis, Crisis, HCI, Student, A-Paper, Ranking-CORE-A*, Projekt-ATHENE-SecUrban, Projekt-emergenCITY, emergenCITY\_INF, emergenCITY\_SG},
pages = {5:1--5:32},
}
[BibTeX] [Abstract] [Download PDF]
Youth are particularly likely to encounter hateful internet content, which can severely impact their well-being. While most social media provide reporting mechanisms, in several countries, severe hateful content can alternatively be reported to law enforcement or dedicated reporting centers. However, in Germany, many youth never resort to reporting. While research in human-computer interaction has investigated adults’ views on platform-based reporting, youth perspectives and platform-independent alternatives have received little attention. By involving a diverse group of 47 German adolescents and young adults in eight focus group interviews, we investigate how youth-sensitive reporting systems for hateful content can be designed. We explore German youth’s reporting barriers, finding that on platforms, they feel particularly discouraged by deficient rule enforcement and feedback, while platform-independent alternatives are rather unknown and perceived as time-consuming and disruptive. We further elicit their requirements for platform-independent reporting tools and contribute with heuristics for designing youth-sensitive and inclusive reporting systems.
@inproceedings{baumlerYouthSensitiveHatefulContent2025,
address = {Yokohama, Japan},
series = {{CHI} '25},
title = {Towards {Youth}-{Sensitive} {Hateful} {Content} {Reporting}: {An} {Inclusive} {Focus} {Group} {Study} in {Germany}},
url = {peasec.de/paper/2025/2025_BäumlerBaderKaufholdReuter_HatefulContentReporting_CHI.pdf},
doi = {10.1145/3706598.3713542},
abstract = {Youth are particularly likely to encounter hateful internet content, which can severely impact their well-being. While most social media provide reporting mechanisms, in several countries, severe hateful content can alternatively be reported to law enforcement or dedicated reporting centers. However, in Germany, many youth never resort to reporting. While research in human-computer interaction has investigated adults’ views on platform-based reporting, youth perspectives and platform-independent alternatives have received little attention. By involving a diverse group of 47 German adolescents and young adults in eight focus group interviews, we investigate how youth-sensitive reporting systems for hateful content can be designed. We explore German youth’s reporting barriers, finding that on platforms, they feel particularly discouraged by deficient rule enforcement and feedback, while platform-independent alternatives are rather unknown and perceived as time-consuming and disruptive. We further elicit their requirements for platform-independent reporting tools and contribute with heuristics for designing youth-sensitive and inclusive reporting systems.},
booktitle = {Proceedings of the {Conference} on {Human} {Factors} in {Computing} {Systems} ({CHI}) ({Honorable} {Mentions})},
publisher = {Association for Computing Machinery},
author = {Bäumler, Julian and Bader, Helen and Kaufhold, Marc-André and Reuter, Christian},
year = {2025},
keywords = {AuswahlCrisis, Crisis, HCI, Selected, Student, A-Paper, Ranking-CORE-A*, Projekt-CYLENCE, Projekt-ATHENE-CyAware},
}
[BibTeX] [Abstract] [Download PDF]
The network of subsea data cables (SDC) transmits the majority of international and intercontinental data exchanges. After thirty years of fiber-optic SDC installation across the oceans, almost all coastal and island countries gained access to the only global fixed infrastructure network. Still, there is considerable inequality in the number of available SDC accesses, creating deficits in redundancy for less connected states. Previous research hypothesized multiple factors that influenced the build-up of internet infrastructures but failed to verify these assumptions through inferential statistics. This work highlights the national-level factors that made backbone access provision more – or less – attractive to SDC project decision-makers. Our regression analysis of global country-year data (n = 4916) found that socio-economic (population, GDP), political (state fragility, conflict), and geographic factors (seismic hazard, neighboring territories) significantly influenced the number of active and planned accesses. This work can serve as a foundation for further research leveraging quantitative statistics to unveil hidden structures in the construction of material internet infrastructures and support sustainability in the future allocation of international infrastructure development resources in general.
@article{frankenHiddenStructuresGlobal2025,
title = {Hidden structures of a global infrastructure: {Expansion} factors of the subsea data cable network},
volume = {215},
issn = {0040-1625},
shorttitle = {Hidden structures of a global infrastructure},
url = {https://www.peasec.de/paper/2025/2025_FrankenReinholdDörnfeldReuter_TechForecasting.pdf},
doi = {10.1016/j.techfore.2025.124068},
abstract = {The network of subsea data cables (SDC) transmits the majority of international and intercontinental data exchanges. After thirty years of fiber-optic SDC installation across the oceans, almost all coastal and island countries gained access to the only global fixed infrastructure network. Still, there is considerable inequality in the number of available SDC accesses, creating deficits in redundancy for less connected states. Previous research hypothesized multiple factors that influenced the build-up of internet infrastructures but failed to verify these assumptions through inferential statistics. This work highlights the national-level factors that made backbone access provision more – or less – attractive to SDC project decision-makers. Our regression analysis of global country-year data (n = 4916) found that socio-economic (population, GDP), political (state fragility, conflict), and geographic factors (seismic hazard, neighboring territories) significantly influenced the number of active and planned accesses. This work can serve as a foundation for further research leveraging quantitative statistics to unveil hidden structures in the construction of material internet infrastructures and support sustainability in the future allocation of international infrastructure development resources in general.},
urldate = {2025-03-03},
journal = {Technological Forecasting and Social Change (TFSC)},
author = {Franken, Jonas and Reinhold, Thomas and Dörnfeld, Timon and Reuter, Christian},
month = jun,
year = {2025},
keywords = {Selected, Security, A-Paper, Peace, AuswahlPeace, Projekt-ATHENE-SecUrban},
pages = {124068},
}
[BibTeX] [Abstract] [Download PDF]
Misinformation through data visualisation is particularly dangerous because charts are often perceived as objective data representations. While past efforts to counter misinformation have focused on text and, to some extent, images and video, developing user-centred strategies to combat misleading charts remains an unresolved challenge. This study presents a conceptual approach through ChartChecker, a browser-plugin that aims to automatically extract line and bar chart data and detect potentially misleading features such as non-linear axis scales. A participatory design approach was used to develop a user-centred interface to provide transparent, comprehensible information about potentially misleading features in charts. Finally, a think-aloud study (N = 15) with ChartChecker revealed overall satisfaction with the tools’ user interface, comprehensibility, functionality, and usefulness. The results are discussed in terms of improving user engagement, increasing transparency and optimising tools designed to counter misleading information in charts, leading to overarching design implications for user-centred strategies for the visual domain.
@inproceedings{biselliChartCheckerUserCentredApproach2025,
series = {{DIS} '25},
title = {{ChartChecker}: {A} {User}-{Centred} {Approach} to {Support} the {Understanding} of {Misleading} {Charts}},
url = {https://www.peasec.de/paper/2025/2025_BiselliHartwigKneisslPouiliotReuter_ChartChecker_DIS.pdf},
doi = {10.1145/3715336.3735784},
abstract = {Misinformation through data visualisation is particularly dangerous because charts are often perceived as objective data representations. While past efforts to counter misinformation have focused on text and, to some extent, images and video, developing user-centred strategies to combat misleading charts remains an unresolved challenge.
This study presents a conceptual approach through ChartChecker, a browser-plugin that aims to automatically extract line and bar chart data and detect potentially misleading features such as non-linear axis scales. A participatory design approach was used to develop a user-centred interface to provide transparent, comprehensible information about potentially misleading features in charts. Finally, a think-aloud study (N = 15) with ChartChecker revealed overall satisfaction with the tools' user interface, comprehensibility, functionality, and usefulness. The results are discussed in terms of improving user engagement, increasing transparency and optimising tools designed to counter misleading information in charts, leading to overarching design implications for user-centred strategies for the visual domain.},
booktitle = {Proceedings of the {ACM} {Designing} {Interactive} {Systems} {Conference} ({DIS})},
publisher = {Association for Computing Machinery},
author = {Biselli, Tom and Hartwig, Katrin and Kneissl, Niklas and Pouliot, Louis and Reuter, Christian},
year = {2025},
keywords = {Crisis, HCI, Student, A-Paper, Ranking-CORE-A, Projekt-NEBULA, Projekt-ATHENE-PriVis},
}
[BibTeX] [Abstract]
Racism extends into the digital realm, manifesting in various forms of technology-facilitated violence (TFV). Although much research centers on the Global North, it is es-sential to investigate this issue in other settings, such as Colombia, where activists are par-ticularly vulnerable to TFV. This study enriches the debate with a qualitative approach, conducting 18 interviews with activists from Chocó and Bogotá. The literature on race and TFV reveals that technology can exacerbate racism through social media, like anonymity, and introduce new forms of racist violence, including deepfakes and algorithmic bias. However, these forms were not prevalent in our interviews. For activists, structural racism, especially limited internet, and electricity access emerged as a primary factor in their ex-periences with racist TFV. Overt TFV escalates to offline threats, silencing dissenting voices. This research emphasizes the need to understand TFV within non-Western regions, advocating for nuanced approaches to addressing digital racism in diverse contexts.
@article{CabanzoValencia2025,
title = {Race, ethnicity, and technology-facilitated violence: {The} experience of activists in chocó, colombia},
doi = {10.1177/14614448251344286},
abstract = {Racism extends into the digital realm, manifesting in various forms of technology-facilitated violence (TFV). Although much research centers on the Global North, it is es-sential to investigate this issue in other settings, such as Colombia, where activists are par-ticularly vulnerable to TFV. This study enriches the debate with a qualitative approach, conducting 18 interviews with activists from Chocó and Bogotá. The literature on race and TFV reveals that technology can exacerbate racism through social media, like anonymity, and introduce new forms of racist violence, including deepfakes and algorithmic bias. However, these forms were not prevalent in our interviews. For activists, structural racism, especially limited internet, and electricity access emerged as a primary factor in their ex-periences with racist TFV. Overt TFV escalates to offline threats, silencing dissenting voices. This research emphasizes the need to understand TFV within non-Western regions, advocating for nuanced approaches to addressing digital racism in diverse contexts.},
journal = {New Media and Society},
author = {Valencia, Miyerlandy Cabanzo and Guntrum, Laura},
year = {2025},
keywords = {Security, A-Paper, Peace, Projekt-TraCe, Ranking-ImpfactFactor},
}
[BibTeX] [Abstract] [Download PDF]
Research in Augmented Reality (AR) and Virtual Reality (VR) has mostly viewed them in isolation. Yet, when used together in practical settings, AR and VR each offer unique strengths, necessitating multiple transitions to harness their advantages. This paper investigates potential challenges in Cross-Reality (CR) transitions to inform future application design. We implemented a CR system featuring a 3D modeling task that requires users to switch between PC, AR, and VR. Using a talk-aloud study (n=12) and thematic analysis, we revealed that frictions primarily arose when transitions conflicted with users’ Spatial Mental Model (SMM). Furthermore, we found five transition archetypes employed to enhance productivity once an SMM was established. Our findings uncover that transitions have to focus on establishing and upholding the SMM of users across realities, by communicating differences between them.
@inproceedings{10.1145/3706598.3713921,
address = {New York, NY, USA},
series = {Chi '25},
title = {A {Qualitative} {Investigation} of {User} {Transitions} and {Frictions} in {Cross}-{Reality} {Applications}},
isbn = {979-8-4007-1394-1},
url = {https://www.peasec.de/paper/2025/2025_VonWillichNellesTsengGugenheimerGüntherMühlhäuser_FrictionsCrossReality_CHI.pdf},
doi = {10.1145/3706598.3713921},
abstract = {Research in Augmented Reality (AR) and Virtual Reality (VR) has mostly viewed them in isolation. Yet, when used together in practical settings, AR and VR each offer unique strengths, necessitating multiple transitions to harness their advantages. This paper investigates potential challenges in Cross-Reality (CR) transitions to inform future application design. We implemented a CR system featuring a 3D modeling task that requires users to switch between PC, AR, and VR. Using a talk-aloud study (n=12) and thematic analysis, we revealed that frictions primarily arose when transitions conflicted with users’ Spatial Mental Model (SMM). Furthermore, we found five transition archetypes employed to enhance productivity once an SMM was established. Our findings uncover that transitions have to focus on establishing and upholding the SMM of users across realities, by communicating differences between them.},
booktitle = {Proceedings of the {Conference} on {Human} {Factors} in {Computing} {Systems} ({CHI})},
publisher = {Association for Computing Machinery},
author = {von Willich, Julius and Nelles, Frank and Tseng, Wen-Jie and Gugenheimer, Jan and Günther, Sebastian and Mühlhäuser, Max},
year = {2025},
note = {Number of pages: 18
tex.articleno: 808},
keywords = {HCI, A-Paper, Ranking-CORE-A*, Projekt-emergenCITY, Projekt-ATHENE, emergenCITY\_INF, emergenCITY\_SG},
}
[BibTeX] [Abstract]
The reliability of communication networks can be compromised by various factors, including natural disasters, which highlights the need for backup systems. In rural areas, where restoring public network infrastructure can take time, an alternative communication channel can be particularly valuable. This study explores the potential of repurposing Long Range Wide Area Networks (LoRaWAN) gateways as multi-hop network nodes to create a digital emergency communication system. Farmers, who are increasingly adopting Low Power Wide Area Networks (LPWANs) and are geographically spread, are identified as key stakeholders for such a system. Using OpenStreetMap data on farm locations, we found that connecting farm communities through LoRa communication is theoretically possible in many areas. Simulations using delay-tolerant network routing protocols confirm the feasibility of this approach under various scenarios. While the general feasability was first evaluated with data from Germany, we also conduct analyses for Uganda. A proof-of-concept implementation demonstrates that small messages can be transmitted successfully using real hardware, validating the concept of a decentralized communication infrastructure based on existing equipment. Additionally, we conducted experiments to measure energy consumption, bandwidth usage, and latency in actual hardware setups. This work contributes to various Sustainable Development Goals by supporting resilient communication infrastructure in underserved areas (SDG 9: Industry, Innovation and Infrastructure), strengthening rural communities that are often the last to recover after emergencies (SDG 10: Reduced Inequalities, SDG 11: Sustainable Cities and Communities), and ultimately helping safeguard food systems through improved agricultural coordination and communication (SDG 2: Zero Hunger).
@article{kuntke2025crisis,
title = {Crisis-communication between farms: {Disruption}-tolerant networking with commodity {LoRaWAN} hardware},
abstract = {The reliability of communication networks can be compromised by various factors, including natural disasters, which highlights the need for backup systems. In rural areas, where restoring public network infrastructure can take time, an alternative communication channel can be particularly valuable. This study explores the potential of repurposing Long Range Wide Area Networks (LoRaWAN) gateways as multi-hop network nodes to create a digital emergency communication system. Farmers, who are increasingly adopting Low Power Wide Area Networks (LPWANs) and are geographically spread, are identified as key stakeholders for such a system. Using OpenStreetMap data on farm locations, we found that connecting farm communities through LoRa communication is theoretically possible in many areas. Simulations using delay-tolerant network routing protocols confirm the feasibility of this approach under various scenarios. While the general feasability was first evaluated with data from Germany, we also conduct analyses for Uganda. A proof-of-concept implementation demonstrates that small messages can be transmitted successfully using real hardware, validating the concept of a decentralized communication infrastructure based on existing equipment. Additionally, we conducted experiments to measure energy consumption, bandwidth usage, and latency in actual hardware setups. This work contributes to various Sustainable Development Goals by supporting resilient communication infrastructure in underserved areas (SDG 9: Industry, Innovation and Infrastructure), strengthening rural communities that are often the last to recover after emergencies (SDG 10: Reduced Inequalities, SDG 11: Sustainable Cities and Communities), and ultimately helping safeguard food systems through improved agricultural coordination and communication (SDG 2: Zero Hunger).},
journal = {Information Technology for Development},
author = {Kuntke, Franz and Baumgärtner, Lars and Franken, Jonas and Reuter, Christian},
year = {2025},
keywords = {UsableSec, Security, A-Paper, Projekt-emergenCITY, Projekt-AgriRegio, emergenCITY\_INF, emergenCITY\_SG},
}
[BibTeX] [Abstract] [Download PDF]
Activists’ use of ICTs in contexts affected by violence poses challenges like digital surveillance. Based on 92 interviews with activists from Bolivia, Cameroon, Costa Rica, Colombia, India, Myanmar, and Nicaragua, this study explores their protection and coping strategies against technology-facilitated violence. Findings show limited emphasis on digital security and privacy-enhancing technologies, primarily due to the usability and familiarity with popular applications, coupled with relative unfamiliarity with other features. Generally, some precautions, like avoiding real-time location sharing, are common. While many protection strategies are similar, some are shaped by local factors like internet shutdowns and different adversaries’ capabilities. The findings demonstrate that some tools and features, such as VPN, may offer protection but also pose risks, e.g., in the case of criminalization, highlighting the crucial role of local context. Designing secure and usable features that account for the varying levels of limitations, such as poor connectivity and risks activists face, is essential.
@article{Guntrum2025,
title = {Activists' strategies for coping with technology-facilitated violence in the global south},
issn = {1073-0516},
url = {https://doi.org/10.1145/3762811},
doi = {10.1145/3762811},
abstract = {Activists' use of ICTs in contexts affected by violence poses challenges like digital surveillance. Based on 92 interviews with activists from Bolivia, Cameroon, Costa Rica, Colombia, India, Myanmar, and Nicaragua, this study explores their protection and coping strategies against technology-facilitated violence. Findings show limited emphasis on digital security and privacy-enhancing technologies, primarily due to the usability and familiarity with popular applications, coupled with relative unfamiliarity with other features. Generally, some precautions, like avoiding real-time location sharing, are common. While many protection strategies are similar, some are shaped by local factors like internet shutdowns and different adversaries' capabilities. The findings demonstrate that some tools and features, such as VPN, may offer protection but also pose risks, e.g., in the case of criminalization, highlighting the crucial role of local context. Designing secure and usable features that account for the varying levels of limitations, such as poor connectivity and risks activists face, is essential.},
journal = {ACM Transactions on Computer-Human Interaction (TOCHI)},
author = {Guntrum, Laura and Reuter, Christian},
year = {2025},
keywords = {A-Paper, Ranking-CORE-A*, Peace, AuswahlPeace, Projekt-TraCe, Projekt-ATHENE-PriVis},
}
Alle Paper 2025
Begutachtete Zeitschriften / Peer-reviewed Journals
[BibTeX] [Abstract] [Download PDF]
Social media plays a crucial role in United Nations (UN) peace operations, which are typically deployed in regions affected by conflict to promote peace, facilitate political dialogue, and support post-conflict reconstruction efforts. The UN has introduced the concept of the digital peacekeeper, whose role is to collect and analyse public data, with a particular focus on social media. This article explores the role of official social media use by African peace operations (POs) between 2003 and 2024 through a qualitative analysis of 126 UN documents. The findings reveal that African POs employ a diverse communication strategy, primarily centred on disseminating information, education, and access to reliable information in disrupted contexts. However, the full potential of social media is not realised, resulting in a predominantly one-way communication model. Using affordance theory for social media, the paper demonstrates how bidirectional interactions could support sustainable peace efforts.
@article{riebeSocialMediaCrisis2025,
title = {Social media in crisis communication: insights from peace operations on the {African} continent},
volume = {24},
copyright = {De Gruyter expressly reserves the right to use all content for commercial text and data mining within the meaning of Section 44b of the German Copyright Act.},
issn = {2196-6826},
shorttitle = {Social media in crisis communication},
url = {https://www.degruyterbrill.com/document/doi/10.1515/icom-2025-0006/html},
doi = {10.1515/icom-2025-0006},
abstract = {Social media plays a crucial role in United Nations (UN) peace operations, which are typically deployed in regions affected by conflict to promote peace, facilitate political dialogue, and support post-conflict reconstruction efforts. The UN has introduced the concept of the digital peacekeeper, whose role is to collect and analyse public data, with a particular focus on social media. This article explores the role of official social media use by African peace operations (POs) between 2003 and 2024 through a qualitative analysis of 126 UN documents. The findings reveal that African POs employ a diverse communication strategy, primarily centred on disseminating information, education, and access to reliable information in disrupted contexts. However, the full potential of social media is not realised, resulting in a predominantly one-way communication model. Using affordance theory for social media, the paper demonstrates how bidirectional interactions could support sustainable peace efforts.},
language = {en},
number = {2},
urldate = {2025-10-07},
journal = {i-com},
author = {Riebe, Thea and Guntrum, Laura and Reichert, Lilian and Reuter, Christian},
month = aug,
year = {2025},
note = {Publisher: Oldenbourg Wissenschaftsverlag},
keywords = {Student, Peace, Projekt-ATHENE},
pages = {363--384},
}
[BibTeX] [Abstract] [Download PDF]
The shrinking of secure online spaces and incidents of technology-facilitated (gender-based) violence (TF(GB)V) against female feminists have partially led to self-censorship, thereby constricting public discourse. To unravel the impact of increasing TF(GB)V on feminist mobilization, 22 interviews with Costa Rican and Colombian, female feminists advocating for feminist issues, such as reproductive rights, were conducted. All interviewees, advocating for often perceived controversial topics within patriarchal societies, have experienced forms of TF(GB)V, including misogynistic hate speech. In reaction to this violence, interviewees respond in varying ways – some reduce their social media activity, while others develop personal coping strategies. In fact, most interviewees engage in both chilling and resistance mechanisms concurrently. Increased awareness of potential consequences and coping mechanisms of female feminists when experiencing TF(GB)V helps to develop gender-sensitive mechanisms to protect (female) activists and foster a safer online environment. While measures such as IT security training for activists, enhanced content moderation on platforms, and gender-sensitive design approaches are crucial, addressing the underlying issue – the targeting of feminists with violence – is imperative. Without such efforts, there is a risk that affected individuals withdraw from digital spaces, thereby limiting the diversity of narratives that shape public discourse online.
@article{guntrumChillingResistingExploring2025,
title = {Chilling or resisting? {Exploring} the influence of technology-facilitated (gender-based) violence on female feminists in {Colombia} and {Costa} {Rica}},
issn = {2196-6826},
shorttitle = {Chilling or resisting?},
url = {https://www.degruyterbrill.com/document/doi/10.1515/icom-2025-0004/html},
doi = {10.1515/icom-2025-0004},
abstract = {The shrinking of secure online spaces and incidents of technology-facilitated (gender-based) violence (TF(GB)V) against female feminists have partially led to self-censorship, thereby constricting public discourse. To unravel the impact of increasing TF(GB)V on feminist mobilization, 22 interviews with Costa Rican and Colombian, female feminists advocating for feminist issues, such as reproductive rights, were conducted. All interviewees, advocating for often perceived controversial topics within patriarchal societies, have experienced forms of TF(GB)V, including misogynistic hate speech. In reaction to this violence, interviewees respond in varying ways – some reduce their social media activity, while others develop personal coping strategies. In fact, most interviewees engage in both chilling and resistance mechanisms concurrently. Increased awareness of potential consequences and coping mechanisms of female feminists when experiencing TF(GB)V helps to develop gender-sensitive mechanisms to protect (female) activists and foster a safer online environment. While measures such as IT security training for activists, enhanced content moderation on platforms, and gender-sensitive design approaches are crucial, addressing the underlying issue – the targeting of feminists with violence – is imperative. Without such efforts, there is a risk that affected individuals withdraw from digital spaces, thereby limiting the diversity of narratives that shape public discourse online.},
language = {en},
journal = {i-com – Journal of Interactive Media},
author = {Guntrum, Laura and Nuñez, Daniela Forero and Reuter, Christian},
month = jul,
year = {2025},
note = {Publisher: Oldenbourg Wissenschaftsverlag},
keywords = {HCI, Peace, Projekt-TraCe, Projekt-ATHENE},
}
[BibTeX] [Abstract] [Download PDF]
The rise of fake news and misinformation in the digital age poses serious risks for individuals and society, particularly during crises like the Israel-Hamas war, the Russian-Ukraine war, or the COVID-19 pandemic. Misinformation serves as a tool to manipulate public opinion and create discord. Vulnerability to manipulation increases in online spaces during crises, where authoritative information is scarce. Emergency management, public health, political and public administration, as well as media professionals and citizens express concern and seek solutions to enhance information quality during such critical times. This article highlights user-centred approaches to countering fake news and misinformation, tracing their historical evolution from ancient Greece to the present, focussing on their relevance during the COVID-19 crisis and in contemporary information warfare. It describes the vulnerability of audiences to misinformation and outlines prevailing trends in user-centred countermeasures. This article also introduces recent research on the effectiveness of media literacy interventions on truth discernment, a cross-cultural comparison of the perception of negative consequences and the injunctive norm, a comparison of video and text to promote lateral reading in adolescents, content-specific indicators on Twitter from a user perspective, a learning system for detecting misinformation as well as ethical and security considerations in automated detection.
@article{reuterCombatingInformationWarfare2025,
title = {Combating {Information} {Warfare}: {State} and {Trends} in {User}-{Centered} {Countermeasures} against {Fake} {News} and {Misinformation}},
volume = {44},
issn = {0144-929X},
url = {https://doi.org/10.1080/0144929X.2024.2442486},
doi = {10.1080/0144929X.2024.2442486},
abstract = {The rise of fake news and misinformation in the digital age poses serious risks for individuals and society, particularly during crises like the Israel-Hamas war, the Russian-Ukraine war, or the COVID-19 pandemic. Misinformation serves as a tool to manipulate public opinion and create discord. Vulnerability to manipulation increases in online spaces during crises, where authoritative information is scarce. Emergency management, public health, political and public administration, as well as media professionals and citizens express concern and seek solutions to enhance information quality during such critical times. This article highlights user-centred approaches to countering fake news and misinformation, tracing their historical evolution from ancient Greece to the present, focussing on their relevance during the COVID-19 crisis and in contemporary information warfare. It describes the vulnerability of audiences to misinformation and outlines prevailing trends in user-centred countermeasures. This article also introduces recent research on the effectiveness of media literacy interventions on truth discernment, a cross-cultural comparison of the perception of negative consequences and the injunctive norm, a comparison of video and text to promote lateral reading in adolescents, content-specific indicators on Twitter from a user perspective, a learning system for detecting misinformation as well as ethical and security considerations in automated detection.},
number = {13},
journal = {Behaviour \& Information Technology (BIT)},
author = {Reuter, Christian and Hughes, Amanda Lee and Buntain, Cody},
year = {2025},
keywords = {A-Paper, Crisis, HCI, Peace, Projekt-NEBULA, Ranking-CORE-A, Ranking-ImpactFactor, SocialMedia},
pages = {3348--3361},
}
[BibTeX] [Abstract] [Download PDF]
Active learning is designed to minimize annotation efforts by prioritizing instances that most enhance learning. However, many active learning strategies struggle with a ‘coldstart’ problem, needing substantial initial data to be effective. This limitation reduces their utility in the increasingly relevant fewshot scenarios, where the instance selection has a substantial impact. To address this, we introduce ActiveLLM, a novel active learning approach that leverages Large Language Models such as GPT-4, o1, Llama 3, or Mistral Large for selecting instances. We demonstrate that ActiveLLM significantly enhances the classification performance of BERT classifiers in few-shot scenarios, outperforming traditional active learning methods as well as improving the few-shot learning methods ADAPET, PERFECT, and Set- Fit. Additionally, ActiveLLM can be extended to non-few-shot scenarios, allowing for iterative selections. In this way, ActiveLLM can even help other active learning strategies to overcome their cold-start problem. Our results suggest that ActiveLLM offers a promising solution for improving model performance across various learning setups.
@article{bayerActiveLLMLargeLanguage2025,
title = {{ActiveLLM}: {Large} {Language} {Model}-based {Active} {Learning} for {Textual} {Few}-{Shot} {Scenarios}},
url = {https://arxiv.org/pdf/2405.10808},
doi = {10.48550/arXiv.2405.10808},
abstract = {Active learning is designed to minimize annotation
efforts by prioritizing instances that
most enhance learning. However, many active
learning strategies struggle with a ‘coldstart’
problem, needing substantial initial
data to be effective. This limitation reduces
their utility in the increasingly relevant fewshot
scenarios, where the instance selection
has a substantial impact. To address this, we
introduce ActiveLLM, a novel active learning
approach that leverages Large Language
Models such as GPT-4, o1, Llama 3, or
Mistral Large for selecting instances. We
demonstrate that ActiveLLM significantly
enhances the classification performance of
BERT classifiers in few-shot scenarios, outperforming
traditional active learning methods
as well as improving the few-shot learning
methods ADAPET, PERFECT, and Set-
Fit. Additionally, ActiveLLM can be extended
to non-few-shot scenarios, allowing
for iterative selections. In this way, ActiveLLM
can even help other active learning
strategies to overcome their cold-start problem.
Our results suggest that ActiveLLM
offers a promising solution for improving
model performance across various learning
setups.},
journal = {Transactions of the Association for Computational Linguistics (TACL)},
author = {Bayer, Markus and Lutz, Justin and Reuter, Christian},
year = {2025},
keywords = {Student, UsableSec, Security, A-Paper, Projekt-CYLENCE, Projekt-ATHENE-CyAware, CORE-A*},
}
[BibTeX] [Abstract] [Download PDF]
The development of artificial intelligence and autonomous functions in the military domain has an immense impact on technologies being developed by the private defence industry. Defence firms contribute to the narratives and visions on autonomous weapon systems and the future of warfare, e.g. in the form of strategic marketing of their products. However, their role has so far been understudied, especially regarding autonomous weapon systems. As the normative debate revolves around aspects of human control, this work examines the narratives of (meaningful) human control in the marketing of autonomous military systems by defence manufacturers. Based on a comprehensive content analysis of twenty defence firms, we identified three main narratives, which envision autonomy as a military advantage, the role of the human in the future of warfare, and human-machine teaming. Based on the results, we argue that defence companies reproduce and adapt narratives which shape expectations and visions of human control of autonomous weapon systems in anticipation of emerging norms for (meaningful) human control. However, without specifications and verification mechanisms, there is no indication that human control will be meaningful.
@article{riebeEnvisioningHumanMachineInteraction2025a,
title = {Envisioning {Human}-{Machine} {Interaction} in {Future} {Warfare}: {Defence} {Industry} {Narratives} on {Human} {Control} of {Autonomous} {Weapon} {Systems}},
volume = {39},
issn = {1360-0826},
url = {https://doi.org/10.1080/13600826.2024.2436966},
doi = {10.1080/13600826.2024.2436966},
abstract = {The development of artificial intelligence and autonomous functions in the military domain has an immense impact on technologies being developed by the private defence industry. Defence firms contribute to the narratives and visions on autonomous weapon systems and the future of warfare, e.g. in the form of strategic marketing of their products. However, their role has so far been understudied, especially regarding autonomous weapon systems. As the normative debate revolves around aspects of human control, this work examines the narratives of (meaningful) human control in the marketing of autonomous military systems by defence manufacturers. Based on a comprehensive content analysis of twenty defence firms, we identified three main narratives, which envision autonomy as a military advantage, the role of the human in the future of warfare, and human-machine teaming. Based on the results, we argue that defence companies reproduce and adapt narratives which shape expectations and visions of human control of autonomous weapon systems in anticipation of emerging norms for (meaningful) human control. However, without specifications and verification mechanisms, there is no indication that human control will be meaningful.},
number = {4},
journal = {Global Society},
author = {Riebe, Thea and Gonsior, Anja-Liisa and Reichert, Lilian and Reuter, Christian},
year = {2025},
keywords = {HCI, Student, A-Paper, Ranking-ImpactFactor, Peace, AuswahlPeace, Projekt-TraCe, Projekt-ATHENE-CyAware},
pages = {421--445},
}
[BibTeX] [Abstract] [Download PDF]
In conflict-ridden environments, timely and accurate information is critical for those dealing with the dynamic of events. When individuals have to flee, it becomes evident that refugees frequently rely on information and communication technologies (ICT) for information acquisition, travel coordination, and maintaining connections with related parties. Based on 17 interviews, this research explores how Ukrainian refugees, who sought protection in Germany due to the 2022 Russian full-scale invasion, use ICT before, during, and after their flight. By providing empirical findings, the results show in depth how contextual factors, such as infrastructural instability, privacy concerns and an advanced digitalization, interrelate with user behaviors. Analyzing the multifaceted civilian ICT use in the context of war and flight, this exploratory research contributes to the existing research on HCI in migration contexts and connects to several topics of CSCW. By contrasting case specifics, this work highlights what makes Ukraine a special case in this research area. Furthermore, this paper examines both existing and emerging affordances of ICT in the context of flight, and identifies the crucial role of messenger groups for information gathering in all phases of the flight. Lastly, collaborative dimensions of the identified affordances are discussed.
@article{steinbrinkSmartphoneICTUse2025,
title = {Smartphone and {ICT} {Use} {Among} {Ukrainian} {Refugees}: {Technology} {Support} during {War}, {Flight}, and {Adaptation} in {Germany}},
url = {https://www.peasec.de/paper/2025/2025_SteinbrinkGuntrumReuter_Ukraine_CSCW.pdf},
doi = {10.1145/3711067},
abstract = {In conflict-ridden environments, timely and accurate information is critical for those dealing with the dynamic of events. When individuals have to flee, it becomes evident that refugees frequently rely on information and communication technologies (ICT) for information acquisition, travel coordination, and maintaining connections with related parties. Based on 17 interviews, this research explores how Ukrainian refugees, who sought protection in Germany due to the 2022 Russian full-scale invasion, use ICT before, during, and after their flight. By providing empirical findings, the results show in depth how contextual factors, such as infrastructural instability, privacy concerns and an advanced digitalization, interrelate with user behaviors. Analyzing the multifaceted civilian ICT use in the context of war and flight, this exploratory research contributes to the existing research on HCI in migration contexts and connects to several topics of CSCW. By contrasting case specifics, this work highlights what makes Ukraine a special case in this research area. Furthermore, this paper examines both existing and emerging affordances of ICT in the context of flight, and identifies the crucial role of messenger groups for information gathering in all phases of the flight. Lastly, collaborative dimensions of the identified affordances are discussed.},
number = {CSCW},
journal = {Proceedings of the ACM: Human Computer Interaction (PACM): Computer-Supported Cooperative Work and Social Computing},
author = {Steinbrink, Enno and Guntrum, Laura and Reuter, Christian},
year = {2025},
note = {Place: New York, NY, USA
Publisher: Association for Computing Machinery},
keywords = {Crisis, HCI, UsableSec, A-Paper, Ranking-CORE-A, Projekt-GRKPrivacy, Projekt-TraCe, Projekt-ATHENE},
}
[BibTeX] [Abstract] [Download PDF]
In Germany and other countries, specialized non-profit reporting centers combat online hate speech by submitting criminal content to law enforcement agencies, forwarding deletion requests to social media platforms, and providing counseling to victims, thus contributing to the governance mechanism of content moderation as intermediaries between victims and various organizations. Whereas research in computer-supported cooperative work has extensively explored collaboration of and automation for content moderators, there are no works that focus on reporting centers. Based on expert interviews with their staff (N=15), this study finds that most German centers share a collaborative workflow, of which multiple tasks are heavily dependent on inter-organizational exchange. However, there are differences in their implementation of monitoring, content assessment, automation technology adoption, and external collaborators. As the centers are faced with diverse challenges, such as borderline case assessment, psychological burdens, limited visibility, conflicting goals with other actors, and manual repetitive work, our study contributes with nine implications for designing and researching supportive technologies. They provide suggestions for improving hate speech gathering and reporting, researching hate speech prioritization and assessment algorithms, and designing case processing systems. Beyond that, we outline directions for research on inter-organizational collaboration.
@article{baumlerHarnessingInterOrganizationalCollaboration2025,
title = {Harnessing {Inter}-{Organizational} {Collaboration} and {Automation} to {Combat} {Online} {Hate} {Speech}: {A} {Qualitative} {Study} with {German} {Reporting} {Centers}},
url = {https://dl.acm.org/doi/10.1145/3710991},
doi = {10.1145/3710991},
abstract = {In Germany and other countries, specialized non-profit reporting centers combat online hate speech by submitting criminal content to law enforcement agencies, forwarding deletion requests to social media platforms, and providing counseling to victims, thus contributing to the governance mechanism of content moderation as intermediaries between victims and various organizations. Whereas research in computer-supported cooperative work has extensively explored collaboration of and automation for content moderators, there are no works that focus on reporting centers. Based on expert interviews with their staff (N=15), this study finds that most German centers share a collaborative workflow, of which multiple tasks are heavily dependent on inter-organizational exchange. However, there are differences in their implementation of monitoring, content assessment, automation technology adoption, and external collaborators. As the centers are faced with diverse challenges, such as borderline case assessment, psychological burdens, limited visibility, conflicting goals with other actors, and manual repetitive work, our study contributes with nine implications for designing and researching supportive technologies. They provide suggestions for improving hate speech gathering and reporting, researching hate speech prioritization and assessment algorithms, and designing case processing systems. Beyond that, we outline directions for research on inter-organizational collaboration.},
journal = {Proceedings of the ACM: Human Computer Interaction (PACM): Computer-Supported Cooperative Work and Social Computing},
author = {Bäumler, Julian and Riebe, Thea and Kaufhold, Marc-André and Reuter, Christian},
year = {2025},
keywords = {AuswahlCrisis, Crisis, HCI, A-Paper, Ranking-CORE-A, Projekt-CYWARN, Projekt-CYLENCE},
}
[BibTeX] [Abstract] [Download PDF]
The ongoing challenge of misinformation on social media motivates ongoing efforts to find effective countermeasures. In this study, we evaluated the potential of personalised nudging to reduce the sharing of misinformation on social media, as personalised support has been successfully applied in other areas of critical information handling. In an online experiment (N = 396) exposing users to social media posts, we assessed the degree of misinformation sharing between groups receiving (1) no nudges, (2) non-personalised nudges, and (3) personalised nudges. Personalisation was based on three psychometric dimensions – general decision-making style, consideration of future consequences, need for cognition – to assign the most appropriate nudge from a pool of five nudges. The results showed significant differences (p {\textless} .05) between all three groups, with the personalised nudge group sharing the least misinformation. Detailed analyses at the nudge level revealed that one nudge was universally effective and two nudges were effective only in their personalised form. The results generally confirm the potential of personalisation, although the effect is limited in scope. These findings shed light on the nuanced results of nudging studies, highlight the benefits of personalisation, and raise ethical considerations regarding the privacy implications of personalisation and those inherent in nudges.
@article{biselliMitigatingMisinformationSharing2025,
title = {Mitigating {Misinformation} {Sharing} on {Social} {Media} through {Personalised} {Nudging}},
volume = {9},
url = {https://www.peasec.de/paper/2025/2025_BiselliHartwigReuter_PersonalisedNudges_CSCW.pdf},
doi = {https://doi.org/10.1145/3711034},
abstract = {The ongoing challenge of misinformation on social media motivates ongoing efforts to find effective countermeasures.
In this study, we evaluated the potential of personalised nudging to reduce the sharing of misinformation on social media, as personalised support has been successfully applied in other areas of critical information handling.
In an online experiment (N = 396) exposing users to social media posts, we assessed the degree of misinformation sharing between groups receiving (1) no nudges, (2) non-personalised nudges, and (3) personalised nudges. Personalisation was based on three psychometric dimensions - general decision-making style, consideration of future consequences, need for cognition - to assign the most appropriate nudge from a pool of five nudges.
The results showed significant differences (p {\textless} .05) between all three groups, with the personalised nudge group sharing the least misinformation. Detailed analyses at the nudge level revealed that one nudge was universally effective and two nudges were effective only in their personalised form.
The results generally confirm the potential of personalisation, although the effect is limited in scope.
These findings shed light on the nuanced results of nudging studies, highlight the benefits of personalisation, and raise ethical considerations regarding the privacy implications of personalisation and those inherent in nudges.},
number = {2},
journal = {Proceedings of the ACM: Human Computer Interaction (PACM): Computer-Supported Cooperative Work and Social Computing},
author = {Biselli, Tom and Hartwig, Katrin and Reuter, Christian},
year = {2025},
keywords = {Crisis, HCI, A-Paper, Ranking-CORE-A, Projekt-NEBULA, Projekt-ATHENE-PriVis},
}
[BibTeX] [Abstract] [Download PDF]
China, the United States, and the European Union have spoken of a global competition surrounding Artificial Intelligence (AI). There is widespread talk of an ‘AI Arms Race’. But what is the nature of this race? We argue that the arms race metaphor does not capture the dynamics of global competition in the AI sector. Instead, we propose the notion of a ‘geopolitical innovation race’ for technological leadership in a networked global economy. Based on an analysis of government documents, we find that actors (1) are open to both zero-sum or positive-sum approaches in AI development, (2) organise actor networks differently based on national innovation cultures, (3) prioritise economics and status next to security concerns, and (4) are open to how AI should be interpreted. Referring to the competitive race of AI research and development, the three technopoles perpetuate the geopoliticisation of innovation and intertwine security and economic interests.
@article{schmidArmsRaceInnovation2025,
title = {Arms {Race} or {Innovation} {Race}? {Geopolitical} {AI} {Development}},
volume = {30},
issn = {1465-0045},
url = {https://doi.org/10.1080/14650045.2025.2456019},
doi = {10.1080/14650045.2025.2456019},
abstract = {China, the United States, and the European Union have spoken of a global competition surrounding Artificial Intelligence (AI). There is widespread talk of an ‘AI Arms Race’. But what is the nature of this race? We argue that the arms race metaphor does not capture the dynamics of global competition in the AI sector. Instead, we propose the notion of a ‘geopolitical innovation race’ for technological leadership in a networked global economy. Based on an analysis of government documents, we find that actors (1) are open to both zero-sum or positive-sum approaches in AI development, (2) organise actor networks differently based on national innovation cultures, (3) prioritise economics and status next to security concerns, and (4) are open to how AI should be interpreted. Referring to the competitive race of AI research and development, the three technopoles perpetuate the geopoliticisation of innovation and intertwine security and economic interests.},
number = {4},
journal = {Geopolitics},
author = {Schmid, Stefka and Lambach, Daniel and Diehl, Carlo and Reuter, Christian},
year = {2025},
note = {Publisher: Routledge},
keywords = {Selected, A-Paper, Ranking-ImpactFactor, Peace, AuswahlPeace, Projekt-TraCe, Projekt-ATHENE},
pages = {1907--1936},
}
[BibTeX] [Abstract] [Download PDF]
The global efforts to reduce armament after the end of the Cold War have been stalled due to rising nationalist ambitions. Within this dynamic, military technologies are evolving and contributing to the changing dynamics of arms races. These challenges posed by new and established arms technologies were discussed in the interdisciplinary conference “Science – Peace – Security ’23” (SPS’23) held from September 20 to Friday, September 22, 2023, at the Technical University of Darmstadt. The conference brought together interdisciplinary scholars to discuss the role of these technologies in wars and conflicts, as well as approaches toward arms control and non-proliferation. Three of the contributions are part of this special section. Almuntaser Albalawi and Kristoffer provide an in-depth analysis of the four primary mechanisms investigating alleged chemical weapons use in Syria. Zenobia S. Homan and Saman Omar explore the influence of media coverage on chemical weapon attacks in the Kurdistan Region of Iraq. Bandarra et al. examine the critical role of International Atomic Energy Agency (IAEA) safeguards in preventing nuclear weapons proliferation. All these contributions highlight the need to critically assess and update arms control regimes, mechanisms, and instruments to adapt to the transformation of political violence, e.g., providing access to information and improving trust in institutions and international cooperation.
@article{riebeTechnologyTransformationPolitical2025,
title = {Technology and the {Transformation} of {Political} {Violence} - {Editorial} of the {ZeFKo} {Special} {Section}},
volume = {15},
url = {https://link.springer.com/article/10.1007/s42597-025-00142-9},
doi = {10.1007/s42597-025-00142-9},
abstract = {The global efforts to reduce armament after the end of the Cold War have been stalled due to rising nationalist ambitions. Within this dynamic, military technologies are evolving and contributing to the changing dynamics of arms races. These challenges posed by new and established arms technologies were discussed in the interdisciplinary conference "Science - Peace - Security '23" (SPS'23) held from September 20 to Friday, September 22, 2023, at the Technical University of Darmstadt. The conference brought together interdisciplinary scholars to discuss the role of these technologies in wars and conflicts, as well as approaches toward arms control and non-proliferation. Three of the contributions are part of this special section. Almuntaser Albalawi and Kristoffer provide an in-depth analysis of the four primary mechanisms investigating alleged chemical weapons use in Syria. Zenobia S. Homan and Saman Omar explore the influence of media coverage on chemical weapon attacks in the Kurdistan Region of Iraq. Bandarra et al. examine the critical role of International Atomic Energy Agency (IAEA) safeguards in preventing nuclear weapons proliferation. All these contributions highlight the need to critically assess and update arms control regimes, mechanisms, and instruments to adapt to the transformation of political violence, e.g., providing access to information and improving trust in institutions and international cooperation.},
number = {1},
journal = {Zeitschrift für Friedens- und Konfliktforschung (ZeFKo)},
author = {Riebe, Thea and Reuter, Christian},
year = {2025},
keywords = {Security, Peace, Projekt-CROSSING, Projekt-TraCe},
}
[BibTeX] [Abstract] [Download PDF]
In Germany, both law enforcement agencies (LEAs) and dedicated reporting centers (RCs) engage in various activities to counter illegal online hate speech (HS). Due to the high volume of such content and against the background of limited resources, their personnel can be confronted with the issue of information overload. To mitigate this issue, information filtering, classification, prioritization, and visualization technologies offer great potential. However, a nuanced understanding of situational awareness is required to inform the domain-sensitive implementation of supportive technology and adequate decision-making. Although previous research has explored the concept of situational awareness in policing, it has not been studied in relation to online HS. Based on a qualitative research design employing a thematic analysis of qualitative expert interviews with practitioners from German LEAs and RCs (N=29), we will contribute to the state of research in human-computer interaction with a systematization of 23 information types of relevance for situational awareness of online HS in the law enforcement and RC domain. On that basis, we identify victim, perpetrator, context, evidence, legal, and threat awareness as domain-specific situational awareness sub-types and formulate ten implications for designing reporting, open-source intelligence, classification, and visual analytics tools.
@article{baumlerCyberHateAwareness2025,
title = {Cyber {Hate} {Awareness}: {Information} {Types} and {Technologies} {Relevant} to the {Law} {Enforcement} and {Reporting} {Center} {Domain}},
volume = {24},
issn = {2196-6826},
shorttitle = {Cyber hate awareness},
url = {https://www.degruyter.com/document/doi/10.1515/icom-2024-0062/html},
doi = {10.1515/icom-2024-0062},
abstract = {In Germany, both law enforcement agencies (LEAs) and dedicated reporting centers (RCs) engage in various activities to counter illegal online hate speech (HS). Due to the high volume of such content and against the background of limited resources, their personnel can be confronted with the issue of information overload. To mitigate this issue, information filtering, classification, prioritization, and visualization technologies offer great potential. However, a nuanced understanding of situational awareness is required to inform the domain-sensitive implementation of supportive technology and adequate decision-making. Although previous research has explored the concept of situational awareness in policing, it has not been studied in relation to online HS. Based on a qualitative research design employing a thematic analysis of qualitative expert interviews with practitioners from German LEAs and RCs (N=29), we will contribute to the state of research in human-computer interaction with a systematization of 23 information types of relevance for situational awareness of online HS in the law enforcement and RC domain. On that basis, we identify victim, perpetrator, context, evidence, legal, and threat awareness as domain-specific situational awareness sub-types and formulate ten implications for designing reporting, open-source intelligence, classification, and visual analytics tools.},
number = {1},
journal = {i-com - Journal of Interactive Media},
author = {Bäumler, Julian and Voronin, Georg and Kaufhold, Marc-André},
year = {2025},
keywords = {Crisis, HCI, Projekt-CYLENCE, Projekt-ATHENE-CyAware},
}
[BibTeX] [Abstract] [Download PDF]
As smart home technology becomes integral to modern living, researchers must consider safety aspects. While single-purpose devices alert users to specific dangers, integrating them within comprehensive smart home warning systems (SHWSs) offers new safety potentials by allowing actuators to respond to threats based on predefined protocols. Key questions include whether user preferences for automation levels in smart homes are affected by different warning scenarios, and how unwanted automation or false positives influence acceptance. To explore this, we conduct two studies: (1) A lab study in a smart home with various actuators, where participants (N = 48) encounter warnings across three automation levels. (2) A follow-up interview study (N = 16) further evaluating our prototype and unwanted automation situations. Results show that participants preferred higher automation during warnings and were more receptive to smart technology in dangerous situations, though customization remains essential to ensure acceptance. While higher automation levels reduced perceived interruption, some still preferred less intense warnings. Others preferred not receiving warnings of mild dangers, fully relying on automation. Finally, we find that specific safety protocols and handling of false positive alarms must be chosen carefully to avoid mistrust, users feeling a loss of control, and damage through unwanted executions.
@article{henkelHouseThatSaves2025,
title = {The {House} {That} {Saves} {Me}? {Assessing} the {Role} of {Smart} {Home} {Automation} in {Warning} {Scenarios}},
volume = {9},
shorttitle = {The {House} {That} {Saves} {Me}?},
url = {https://www.peasec.de/paper/2025/2025_HenkelHaeslerAlNajmiHesselReuter_HouseThatSavesMe_IMWUT.pdf},
doi = {10.1145/3712269},
abstract = {As smart home technology becomes integral to modern living, researchers must consider safety aspects. While single-purpose devices alert users to specific dangers, integrating them within comprehensive smart home warning systems (SHWSs) offers new safety potentials by allowing actuators to respond to threats based on predefined protocols. Key questions include whether user preferences for automation levels in smart homes are affected by different warning scenarios, and how unwanted automation or false positives influence acceptance. To explore this, we conduct two studies: (1) A lab study in a smart home with various actuators, where participants (N = 48) encounter warnings across three automation levels. (2) A follow-up interview study (N = 16) further evaluating our prototype and unwanted automation situations. Results show that participants preferred higher automation during warnings and were more receptive to smart technology in dangerous situations, though customization remains essential to ensure acceptance. While higher automation levels reduced perceived interruption, some still preferred less intense warnings. Others preferred not receiving warnings of mild dangers, fully relying on automation. Finally, we find that specific safety protocols and handling of false positive alarms must be chosen carefully to avoid mistrust, users feeling a loss of control, and damage through unwanted executions.},
number = {1},
journal = {Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies (IMWUT)},
author = {Henkel, Markus and Haesler, Steffen and Al-Najmi, Hiba and Hessel, Frank and Reuter, Christian},
year = {2025},
keywords = {AuswahlCrisis, Crisis, HCI, Student, A-Paper, Ranking-CORE-A*, Projekt-ATHENE-SecUrban, Projekt-emergenCITY, emergenCITY\_INF, emergenCITY\_SG},
pages = {5:1--5:32},
}
[BibTeX] [Abstract] [Download PDF]
In crisis situations, citizens’ situational awareness is paramount for an effective response. While warning apps offer location-based alerts, their usage is relatively low. We propose a personalised messaging app channel as an alternative, presenting a warning bot that may lower adoption barriers. We employ the design science research process to define user requirements and iteratively evaluate and improve the bot’s usability and usefulness. The results showcase high usability, with over 40\% expressing an interest in utilising such a warning channel, stressing as reasons the added value of proactive warnings for personalised locations while not requiring a separate app. The derived requirements and design solutions, such as graphically enhanced user interface elements as guardrails for effective and error-free communication, demonstrate that a suitable warning chatbot does not necessarily require complex language processing capabilities. Additionally, our findings facilitate further research on accessibility via conversational design in the realm of crisis warnings.
@article{haunschildBreakingBarriersWarning2025,
title = {Breaking {Down} {Barriers} to {Warning} {Technology} {Adoption}: {Usability} and {Usefulness} of a {Messenger} {App} {Warning} {Bot}},
volume = {24},
copyright = {De Gruyter expressly reserves the right to use all content for commercial text and data mining within the meaning of Section 44b of the German Copyright Act.},
issn = {2196-6826},
shorttitle = {Breaking down barriers to warning technology adoption},
url = {https://www.degruyter.com/document/doi/10.1515/icom-2024-0067/html},
doi = {10.1515/icom-2024-0067},
abstract = {In crisis situations, citizens' situational awareness is paramount for an effective response. While warning apps offer location-based alerts, their usage is relatively low. We propose a personalised messaging app channel as an alternative, presenting a warning bot that may lower adoption barriers. We employ the design science research process to define user requirements and iteratively evaluate and improve the bot's usability and usefulness. The results showcase high usability, with over 40\% expressing an interest in utilising such a warning channel, stressing as reasons the added value of proactive warnings for personalised locations while not requiring a separate app. The derived requirements and design solutions, such as graphically enhanced user interface elements as guardrails for effective and error-free communication, demonstrate that a suitable warning chatbot does not necessarily require complex language processing capabilities. Additionally, our findings facilitate further research on accessibility via conversational design in the realm of crisis warnings.},
language = {en},
number = {1},
journal = {i-com - Journal of Interactive Media},
author = {Haunschild, Jasmin and Henkel, Markus and Reuter, Christian},
month = feb,
year = {2025},
note = {Publisher: Oldenbourg Wissenschaftsverlag},
keywords = {Crisis, HCI, Projekt-ATHENE-SecUrban, Projekt-emergenCITY, emergenCITY\_INF, emergenCITY\_SG},
}
[BibTeX] [Abstract] [Download PDF]
The network of subsea data cables (SDC) transmits the majority of international and intercontinental data exchanges. After thirty years of fiber-optic SDC installation across the oceans, almost all coastal and island countries gained access to the only global fixed infrastructure network. Still, there is considerable inequality in the number of available SDC accesses, creating deficits in redundancy for less connected states. Previous research hypothesized multiple factors that influenced the build-up of internet infrastructures but failed to verify these assumptions through inferential statistics. This work highlights the national-level factors that made backbone access provision more – or less – attractive to SDC project decision-makers. Our regression analysis of global country-year data (n = 4916) found that socio-economic (population, GDP), political (state fragility, conflict), and geographic factors (seismic hazard, neighboring territories) significantly influenced the number of active and planned accesses. This work can serve as a foundation for further research leveraging quantitative statistics to unveil hidden structures in the construction of material internet infrastructures and support sustainability in the future allocation of international infrastructure development resources in general.
@article{frankenHiddenStructuresGlobal2025,
title = {Hidden structures of a global infrastructure: {Expansion} factors of the subsea data cable network},
volume = {215},
issn = {0040-1625},
shorttitle = {Hidden structures of a global infrastructure},
url = {https://www.peasec.de/paper/2025/2025_FrankenReinholdDörnfeldReuter_TechForecasting.pdf},
doi = {10.1016/j.techfore.2025.124068},
abstract = {The network of subsea data cables (SDC) transmits the majority of international and intercontinental data exchanges. After thirty years of fiber-optic SDC installation across the oceans, almost all coastal and island countries gained access to the only global fixed infrastructure network. Still, there is considerable inequality in the number of available SDC accesses, creating deficits in redundancy for less connected states. Previous research hypothesized multiple factors that influenced the build-up of internet infrastructures but failed to verify these assumptions through inferential statistics. This work highlights the national-level factors that made backbone access provision more – or less – attractive to SDC project decision-makers. Our regression analysis of global country-year data (n = 4916) found that socio-economic (population, GDP), political (state fragility, conflict), and geographic factors (seismic hazard, neighboring territories) significantly influenced the number of active and planned accesses. This work can serve as a foundation for further research leveraging quantitative statistics to unveil hidden structures in the construction of material internet infrastructures and support sustainability in the future allocation of international infrastructure development resources in general.},
urldate = {2025-03-03},
journal = {Technological Forecasting and Social Change (TFSC)},
author = {Franken, Jonas and Reinhold, Thomas and Dörnfeld, Timon and Reuter, Christian},
month = jun,
year = {2025},
keywords = {Selected, Security, A-Paper, Peace, AuswahlPeace, Projekt-ATHENE-SecUrban},
pages = {124068},
}
[BibTeX] [Abstract] [Download PDF]
Local disasters such as the Ahr Valley flood in Germany, the international backdrop of the RussoUkrainian War, or the global impact of the COVID-19 pandemic place high demands on the people and organisations that are involved in these situations and contexts to save lives, mitigate damage, provide comfort, or organise reconstruction. Novel technologies are constantly making their way into everyday life, such as artificial intelligence, big data, decentralised networks, internet of things, or virtual reality. Their adaptation, acceptance, usability, usefulness, and legal framework conditions for safety-critical systems must be researched and tested thoroughly. In this special issue, we investigate the use of computer-based solutions in areas and situations of direct relevance to people’s lives and well-being (Usable Safety), as well as contributions to user-oriented resilience concepts of sociotechnical systems concerning potential attacks (Usable Security) and data protection mechanisms (Usable Privacy).
@article{kaufholdTensionUsableSafety2025,
title = {The {Tension} of {Usable} {Safety}, {Security} and {Privacy}},
volume = {24},
url = {https://www.degruyterbrill.com/document/doi/10.1515/icom-2025-0009/html},
doi = {10.1515/icom-2025-0009},
abstract = {Local disasters such as the Ahr Valley flood in Germany, the international backdrop of the RussoUkrainian War, or the global impact of the COVID-19 pandemic place high demands on the people and organisations that are involved in these situations and contexts to save lives, mitigate damage, provide comfort, or organise reconstruction. Novel technologies are constantly making their way into everyday life, such as artificial intelligence, big data, decentralised networks, internet of things, or virtual reality. Their adaptation, acceptance, usability, usefulness, and legal framework conditions for safety-critical systems must be researched and tested thoroughly. In this special issue, we investigate the use of computer-based solutions in areas and situations of direct relevance to people’s lives and well-being (Usable Safety), as well as contributions to user-oriented resilience concepts of sociotechnical systems concerning potential attacks (Usable Security) and data protection mechanisms (Usable Privacy).},
language = {en},
number = {1},
journal = {i-com - Journal of Interactive Media},
author = {Kaufhold, Marc-André and Mentler, Tilo and Nestler, Simon and Reuter, Christian},
year = {2025},
keywords = {HCI, UsableSec, Security, Projekt-CROSSING, Projekt-ATHENE},
}
[BibTeX] [Abstract] [Download PDF]
The dissemination of online hate speech can have serious negative consequences for individuals, online communities, and entire societies. This and the large volume of hateful online content prompted both practitioners’, i.e., in content moderation or law enforcement, and researchers’ interest in machine learning models to automatically classify instances of hate speech. Whereas most scientific works address hate speech classification as a binary task, practice often requires a differentiation into sub-types, e.g., according to target, severity, or legality, which may overlap for individual content. Hence, researchers created datasets and machine learning models that approach hate speech classification in textual data as a multi-label problem. This work presents the first systematic and comprehensive survey of scientific literature on this emerging research landscape in English (N=46). We contribute with a concise overview of 28 datasets suited for training multi-label classification models that reveals significant heterogeneity regarding label-set, size, meta-concept, annotation process, and inter-annotator agreement. Our analysis of 24 publications proposing suitable classification models further establishes inconsistency in evaluation and a preference for architectures based on Bidirectional Encoder Representation from Transformers (BERT) and Recurrent Neural Networks (RNNs). We identify imbalanced training data, reliance on crowdsourcing platforms, small and sparse datasets, and missing methodological alignment as critical open issues and formulate ten recommendations for research.
@article{baumlerSurveyMachineLearningModels,
title = {A survey of machine learning models and datasets for the multi-label classification of textual hate speech in english},
url = {https://arxiv.org/abs/2504.08609},
doi = {10.48550/arXiv.2504.08609},
abstract = {The dissemination of online hate speech can have serious negative consequences for individuals, online communities, and entire societies. This and the large volume of hateful online content prompted both practitioners', i.e., in content moderation or law enforcement, and researchers' interest in machine learning models to automatically classify instances of hate speech. Whereas most scientific works address hate speech classification as a binary task, practice often requires a differentiation into sub-types, e.g., according to target, severity, or legality, which may overlap for individual content. Hence, researchers created datasets and machine learning models that approach hate speech classification in textual data as a multi-label problem. This work presents the first systematic and comprehensive survey of scientific literature on this emerging research landscape in English (N=46). We contribute with a concise overview of 28 datasets suited for training multi-label classification models that reveals significant heterogeneity regarding label-set, size, meta-concept, annotation process, and inter-annotator agreement. Our analysis of 24 publications proposing suitable classification models further establishes inconsistency in evaluation and a preference for architectures based on Bidirectional Encoder Representation from Transformers (BERT) and Recurrent Neural Networks (RNNs). We identify imbalanced training data, reliance on crowdsourcing platforms, small and sparse datasets, and missing methodological alignment as critical open issues and formulate ten recommendations for research.},
journal = {arXiv},
author = {Bäumler, Julian and Blöcher, Louis and Frey, Lars-Joel and Chen, Xian and Bayer, Markus and Reuter, Christian},
year = {2025},
keywords = {Crisis, HCI, Student, Projekt-CYLENCE, Projekt-ATHENE-CyAware},
}
[BibTeX] [Abstract]
Racism extends into the digital realm, manifesting in various forms of technology-facilitated violence (TFV). Although much research centers on the Global North, it is es-sential to investigate this issue in other settings, such as Colombia, where activists are par-ticularly vulnerable to TFV. This study enriches the debate with a qualitative approach, conducting 18 interviews with activists from Chocó and Bogotá. The literature on race and TFV reveals that technology can exacerbate racism through social media, like anonymity, and introduce new forms of racist violence, including deepfakes and algorithmic bias. However, these forms were not prevalent in our interviews. For activists, structural racism, especially limited internet, and electricity access emerged as a primary factor in their ex-periences with racist TFV. Overt TFV escalates to offline threats, silencing dissenting voices. This research emphasizes the need to understand TFV within non-Western regions, advocating for nuanced approaches to addressing digital racism in diverse contexts.
@article{CabanzoValencia2025,
title = {Race, ethnicity, and technology-facilitated violence: {The} experience of activists in chocó, colombia},
doi = {10.1177/14614448251344286},
abstract = {Racism extends into the digital realm, manifesting in various forms of technology-facilitated violence (TFV). Although much research centers on the Global North, it is es-sential to investigate this issue in other settings, such as Colombia, where activists are par-ticularly vulnerable to TFV. This study enriches the debate with a qualitative approach, conducting 18 interviews with activists from Chocó and Bogotá. The literature on race and TFV reveals that technology can exacerbate racism through social media, like anonymity, and introduce new forms of racist violence, including deepfakes and algorithmic bias. However, these forms were not prevalent in our interviews. For activists, structural racism, especially limited internet, and electricity access emerged as a primary factor in their ex-periences with racist TFV. Overt TFV escalates to offline threats, silencing dissenting voices. This research emphasizes the need to understand TFV within non-Western regions, advocating for nuanced approaches to addressing digital racism in diverse contexts.},
journal = {New Media and Society},
author = {Valencia, Miyerlandy Cabanzo and Guntrum, Laura},
year = {2025},
keywords = {Security, A-Paper, Peace, Projekt-TraCe, Ranking-ImpfactFactor},
}
[BibTeX] [Abstract] [Download PDF]
Deutschland nutzt einen breiten Mix aus verschiedenen Warnmitteln, um möglichst große Teile der Bevölkerung vor Gefahren zu warnen. Smart Homes können den Warnmittelmix ergänzen, da sie vor regionalen und lokalen Gefahren warnen und automatisch auf solche reagieren können. Unsere Studien zeigen, dass sich die Probandinnen und Probanden die zukünftige Nutzung von Smart Home Warnsystemen situationsangepasst vorstellen können.
@article{henkelSH,
title = {Smart {Homes} als {Ergänzung} des {Warnmittelmixes}?},
url = {https://www.peasec.de/paper/2025/2025_HenkelHaeslerAlNajmiHesselReuter_SmartHomeErgaenzung_bbk.pdf},
abstract = {Deutschland nutzt einen breiten Mix aus verschiedenen Warnmitteln, um möglichst große Teile der Bevölkerung vor Gefahren zu warnen. Smart Homes können den Warnmittelmix ergänzen, da sie vor regionalen und lokalen Gefahren warnen und automatisch auf solche reagieren können. Unsere Studien zeigen, dass sich die Probandinnen und Probanden die zukünftige Nutzung von Smart Home Warnsystemen situationsangepasst vorstellen können.},
journal = {Fachkongress Forschung für den Bevölkerungsschutz 2025},
author = {Henkel, Markus and Haesler, Steffen and Al-Najmi, Hiba and Hessel, Frank and Reuter, Christian},
year = {2025},
keywords = {Crisis, HCI, Student, Projekt-ATHENE-SecUrban, Projekt-emergenCITY, emergenCITY\_INF, emergenCITY\_SG},
}
[BibTeX] [Abstract]
The reliability of communication networks can be compromised by various factors, including natural disasters, which highlights the need for backup systems. In rural areas, where restoring public network infrastructure can take time, an alternative communication channel can be particularly valuable. This study explores the potential of repurposing Long Range Wide Area Networks (LoRaWAN) gateways as multi-hop network nodes to create a digital emergency communication system. Farmers, who are increasingly adopting Low Power Wide Area Networks (LPWANs) and are geographically spread, are identified as key stakeholders for such a system. Using OpenStreetMap data on farm locations, we found that connecting farm communities through LoRa communication is theoretically possible in many areas. Simulations using delay-tolerant network routing protocols confirm the feasibility of this approach under various scenarios. While the general feasability was first evaluated with data from Germany, we also conduct analyses for Uganda. A proof-of-concept implementation demonstrates that small messages can be transmitted successfully using real hardware, validating the concept of a decentralized communication infrastructure based on existing equipment. Additionally, we conducted experiments to measure energy consumption, bandwidth usage, and latency in actual hardware setups. This work contributes to various Sustainable Development Goals by supporting resilient communication infrastructure in underserved areas (SDG 9: Industry, Innovation and Infrastructure), strengthening rural communities that are often the last to recover after emergencies (SDG 10: Reduced Inequalities, SDG 11: Sustainable Cities and Communities), and ultimately helping safeguard food systems through improved agricultural coordination and communication (SDG 2: Zero Hunger).
@article{kuntke2025crisis,
title = {Crisis-communication between farms: {Disruption}-tolerant networking with commodity {LoRaWAN} hardware},
abstract = {The reliability of communication networks can be compromised by various factors, including natural disasters, which highlights the need for backup systems. In rural areas, where restoring public network infrastructure can take time, an alternative communication channel can be particularly valuable. This study explores the potential of repurposing Long Range Wide Area Networks (LoRaWAN) gateways as multi-hop network nodes to create a digital emergency communication system. Farmers, who are increasingly adopting Low Power Wide Area Networks (LPWANs) and are geographically spread, are identified as key stakeholders for such a system. Using OpenStreetMap data on farm locations, we found that connecting farm communities through LoRa communication is theoretically possible in many areas. Simulations using delay-tolerant network routing protocols confirm the feasibility of this approach under various scenarios. While the general feasability was first evaluated with data from Germany, we also conduct analyses for Uganda. A proof-of-concept implementation demonstrates that small messages can be transmitted successfully using real hardware, validating the concept of a decentralized communication infrastructure based on existing equipment. Additionally, we conducted experiments to measure energy consumption, bandwidth usage, and latency in actual hardware setups. This work contributes to various Sustainable Development Goals by supporting resilient communication infrastructure in underserved areas (SDG 9: Industry, Innovation and Infrastructure), strengthening rural communities that are often the last to recover after emergencies (SDG 10: Reduced Inequalities, SDG 11: Sustainable Cities and Communities), and ultimately helping safeguard food systems through improved agricultural coordination and communication (SDG 2: Zero Hunger).},
journal = {Information Technology for Development},
author = {Kuntke, Franz and Baumgärtner, Lars and Franken, Jonas and Reuter, Christian},
year = {2025},
keywords = {UsableSec, Security, A-Paper, Projekt-emergenCITY, Projekt-AgriRegio, emergenCITY\_INF, emergenCITY\_SG},
}
[BibTeX] [Abstract] [Download PDF]
Those engaged in the defense of human and land rights, particularly in areas of resource extraction, are increasingly exposed to violence, including a growing number of digital threats. In Colombia, the legacy of decades of armed conflict has overshadowed concerns regarding digital rights, resulting in reports of digital surveillance and online harassment without the requisite judicial oversight. Due to the paucity of research on this topic, this study examines the experiences of 37 environmental and human rights defenders (EHRDs) in La Guajira, North Colombia, who are leveraging information and communication technologies (ICTs) to amplify their concerns in an extractivist region with a history of human rights abuses. The findings indicate a significant prevalence of technology-facilitated violence (TFV) against EHRDs, including death threats, hacking, and hate speech through various digital channels. The spectrum of threats is attributed to several sources, including armed groups, multinational companies, and individuals within the affected communities. The study emphasizes the necessity of adopting a comprehensive approach to violence, integrating TFV into a more expansive conceptualization of violence. Failing to acknowledge the prevalence of TFV may result in an incomplete understanding of the experiences of EHRDs and the consequences of such violence, including self-censorship and emotional harm. Given the increasing overlap between digital and physical violence, we present a framework to enhance the capture and understanding of TFV. Furthermore, this study demonstrates the shortcomings of current security protocols in addressing the multifaceted violence directed at EHRDs due to their opposition to extractive agendas.
@article{guntrumUnmaskingDigitalThreats2025,
title = {Unmasking digital threats in the pursuit of human rights and environmental defense in {La} {Guajira}, {North} {Colombia}},
issn = {1369-118X},
url = {https://www.peasec.de/paper/2025/2025_GuntrumLassoMenaReuter_UnmaskingDigitalThreats_InfoCommSoc.pdf},
doi = {10.1080/1369118X.2025.2503444},
abstract = {Those engaged in the defense of human and land rights, particularly in areas of resource extraction, are increasingly exposed to violence, including a growing number of digital threats. In Colombia, the legacy of decades of armed conflict has overshadowed concerns regarding digital rights, resulting in reports of digital surveillance and online harassment without the requisite judicial oversight. Due to the paucity of research on this topic, this study examines the experiences of 37 environmental and human rights defenders (EHRDs) in La Guajira, North Colombia, who are leveraging information and communication technologies (ICTs) to amplify their concerns in an extractivist region with a history of human rights abuses. The findings indicate a significant prevalence of technology-facilitated violence (TFV) against EHRDs, including death threats, hacking, and hate speech through various digital channels. The spectrum of threats is attributed to several sources, including armed groups, multinational companies, and individuals within the affected communities. The study emphasizes the necessity of adopting a comprehensive approach to violence, integrating TFV into a more expansive conceptualization of violence. Failing to acknowledge the prevalence of TFV may result in an incomplete understanding of the experiences of EHRDs and the consequences of such violence, including self-censorship and emotional harm. Given the increasing overlap between digital and physical violence, we present a framework to enhance the capture and understanding of TFV. Furthermore, this study demonstrates the shortcomings of current security protocols in addressing the multifaceted violence directed at EHRDs due to their opposition to extractive agendas.},
journal = {Information, Communication \& Society},
author = {Guntrum, Laura and Mena, Verena Lasso},
year = {2025},
note = {Publisher: Routledge},
keywords = {Peace, Projekt-TraCe},
pages = {1--22},
}
[BibTeX] [Abstract] [Download PDF]
Activists’ use of ICTs in contexts affected by violence poses challenges like digital surveillance. Based on 92 interviews with activists from Bolivia, Cameroon, Costa Rica, Colombia, India, Myanmar, and Nicaragua, this study explores their protection and coping strategies against technology-facilitated violence. Findings show limited emphasis on digital security and privacy-enhancing technologies, primarily due to the usability and familiarity with popular applications, coupled with relative unfamiliarity with other features. Generally, some precautions, like avoiding real-time location sharing, are common. While many protection strategies are similar, some are shaped by local factors like internet shutdowns and different adversaries’ capabilities. The findings demonstrate that some tools and features, such as VPN, may offer protection but also pose risks, e.g., in the case of criminalization, highlighting the crucial role of local context. Designing secure and usable features that account for the varying levels of limitations, such as poor connectivity and risks activists face, is essential.
@article{Guntrum2025,
title = {Activists' strategies for coping with technology-facilitated violence in the global south},
issn = {1073-0516},
url = {https://doi.org/10.1145/3762811},
doi = {10.1145/3762811},
abstract = {Activists' use of ICTs in contexts affected by violence poses challenges like digital surveillance. Based on 92 interviews with activists from Bolivia, Cameroon, Costa Rica, Colombia, India, Myanmar, and Nicaragua, this study explores their protection and coping strategies against technology-facilitated violence. Findings show limited emphasis on digital security and privacy-enhancing technologies, primarily due to the usability and familiarity with popular applications, coupled with relative unfamiliarity with other features. Generally, some precautions, like avoiding real-time location sharing, are common. While many protection strategies are similar, some are shaped by local factors like internet shutdowns and different adversaries' capabilities. The findings demonstrate that some tools and features, such as VPN, may offer protection but also pose risks, e.g., in the case of criminalization, highlighting the crucial role of local context. Designing secure and usable features that account for the varying levels of limitations, such as poor connectivity and risks activists face, is essential.},
journal = {ACM Transactions on Computer-Human Interaction (TOCHI)},
author = {Guntrum, Laura and Reuter, Christian},
year = {2025},
keywords = {A-Paper, Ranking-CORE-A*, Peace, AuswahlPeace, Projekt-TraCe, Projekt-ATHENE-PriVis},
}
Bücher und herausgegebene Zeitschriften / Books and Edited Special Issues in Journals
[BibTeX]
@book{haunschildEnhancingCitizensRole2025a,
address = {Darmstadt, Germany},
title = {Enhancing {Citizens}’ {Role} in {Public} {Safety}: {Interaction}, {Perception} and {Design} of {Mobile} {Warning} {Apps}},
publisher = {Dissertation (Dr. rer. nat.), Department of Computer Science, Technische Universität Darmstadt},
author = {Haunschild, Jasmin},
year = {2025},
keywords = {Crisis, HCI, Projekt-ATHENE-SecUrban, Projekt-emergenCITY, Dissertation, emergenCITY\_INF, emergenCITY\_SG},
}
[BibTeX] [Abstract] [Download PDF]
The COVID-19 pandemic and the war in Ukraine emphasize the need for greater disaster resilience and preparedness. This book investigates how these apps can enhance crisis awareness and citizen involvement in disaster prevention and response. By examining user perspectives and the impact of crisis experiences, the book explores how to increase the adoption and effectiveness of warning apps. The research uses qualitative and quantitative methods, including surveys and design interventions, to reveal current usage, changes over time and desired features. It shows that while citizens find warning apps helpful, more safety-related features and two-way communication could increase their appeal. Additionally, the integration of preparedness features into these apps can increase their perceived usefulness, though challenges remain in addressing user expectations and design preferences across different crises and cultural contexts.
@book{haunschildEnhancingCitizensRole2025,
address = {Wiesbaden, Germany},
title = {Enhancing {Citizens}’ {Role} in {Public} {Safety}: {Interaction}, {Perception} and {Design} of {Mobile} {Warning} {Apps}},
isbn = {978-3-658-46488-2},
url = {https://link.springer.com/book/10.1007/978-3-658-46489-9},
abstract = {The COVID-19 pandemic and the war in Ukraine emphasize the need for greater disaster resilience and preparedness. This book investigates how these apps can enhance crisis awareness and citizen involvement in disaster prevention and response. By examining user perspectives and the impact of crisis experiences, the book explores how to increase the adoption and effectiveness of warning apps. The research uses qualitative and quantitative methods, including surveys and design interventions, to reveal current usage, changes over time and desired features. It shows that while citizens find warning apps helpful, more safety-related features and two-way communication could increase their appeal. Additionally, the integration of preparedness features into these apps can increase their perceived usefulness, though challenges remain in addressing user expectations and design preferences across different crises and cultural contexts.},
publisher = {Springer Vieweg},
author = {Haunschild, Jasmin},
year = {2025},
doi = {10.1007/978-3-658-46489-9},
keywords = {Crisis, HCI, Projekt-ATHENE-SecUrban, Projekt-emergenCITY, DissPublisher, emergenCITY\_INF, emergenCITY\_SG},
}
[BibTeX] [Abstract]
The rise of fake news and misinformation in the digital age poses serious risks for individuals and society, particularly during crises like the Israel-Hamas war, the Russian-Ukraine war, or the COVID-19 pandemic. Misinformation serves as a tool to manipulate public opinion and create discord. Vulnerability to manipulation increases in online spaces during crises, where authoritative information is scarce. Emergency management, public health, political and public administration, as well as media professionals and citizens express concern and seek solutions to enhance information quality during such critical times. This article highlights user-centred approaches to countering fake news and misinformation, tracing their historical evolution from ancient Greece to the present, focussing on their relevance during the COVID-19 crisis and in contemporary information warfare. It describes the vulnerability of audiences to misinformation and outlines prevailing trends in user-centred countermeasures. This article also introduces recent research on the effectiveness of media literacy interventions on truth discernment, a cross-cultural comparison of the perception of negative consequences and the injunctive norm, a comparison of video and text to promote lateral reading in adolescents, content-specific indicators on Twitter from a user perspective, a learning system for detecting misinformation as well as ethical and security considerations in automated detection.
@book{reuterSpecialIssueCombating2025,
title = {Special {Issue} on {Combating} {Information} {Warfare}: {User}-{Centered} {Countermeasures} against {Fake} {News} and {Misinformation} - {Behaviour} \& {Information} {Technology} ({BIT})},
abstract = {The rise of fake news and misinformation in the digital age poses serious risks for individuals and society, particularly during crises like the Israel-Hamas war, the Russian-Ukraine war, or the COVID-19 pandemic. Misinformation serves as a tool to manipulate public opinion and create discord. Vulnerability to manipulation increases in online spaces during crises, where authoritative information is scarce. Emergency management, public health, political and public administration, as well as media professionals and citizens express concern and seek solutions to enhance information quality during such critical times. This article highlights user-centred approaches to countering fake news and misinformation, tracing their historical evolution from ancient Greece to the present, focussing on their relevance during the COVID-19 crisis and in contemporary information warfare. It describes the vulnerability of audiences to misinformation and outlines prevailing trends in user-centred countermeasures. This article also introduces recent research on the effectiveness of media literacy interventions on truth discernment, a cross-cultural comparison of the perception of negative consequences and the injunctive norm, a comparison of video and text to promote lateral reading in adolescents, content-specific indicators on Twitter from a user perspective, a learning system for detecting misinformation as well as ethical and security considerations in automated detection.},
publisher = {Taylor \& Francis},
author = {Reuter, Christian and Hughes, Amanda Lee and Buntain, Cody},
year = {2025},
note = {Publication Title: Behaviour \& Information Technology (BIT)},
keywords = {Crisis, HCI, SocialMedia, A-Paper, Ranking-ImpactFactor, Ranking-CORE-A, Peace},
}
[BibTeX]
@book{linsnerPrivacyPreservingData2025a,
address = {Darmstadt, Germany},
title = {Privacy {Preserving} {Data} {Management} – {Assisting} {Users} in {Data} {Disclosure} {Scenarios}},
publisher = {Dissertation (Dr.-Ing.), Department of Computer Science, Technische Universität Darmstadt},
author = {Linsner, Sebastian},
year = {2025},
keywords = {UsableSec, Security, Projekt-CROSSING, Dissertation, Projekt-ATHENE-PriVis},
}
[BibTeX]
@book{hartwigNavigatingMisinformationUserCentered2025a,
address = {Darmstadt, Germany},
title = {Navigating {Misinformation}: {User}-{Centered} {Design} and {Evaluation} of {Indicator}-{Based} {Digital} {Interventions}},
publisher = {Dissertation (Dr.-Ing.), Department of Computer Science, Technische Universität Darmstadt},
author = {Hartwig, Katrin},
year = {2025},
keywords = {Crisis, HCI, Projekt-CROSSING, Projekt-NEBULA, Dissertation},
}
[BibTeX]
@book{haeslerCitizensCrisesBehavior2025a,
address = {Darmstadt, Germany},
title = {Citizens in {Crises}: {Behavior}, {Dependencies}, and {Technological} {Support} of {Digital} {Self}-{Organization}},
publisher = {Dissertation (Dr. rer. nat.), Department of Computer Science, Technische Universität Darmstadt},
author = {Haesler, Steffen},
year = {2025},
keywords = {Crisis, HCI, Projekt-ATHENE-SecUrban, Projekt-emergenCITY, Dissertation, emergenCITY\_INF, emergenCITY\_SG},
}
[BibTeX]
@book{bayerDeepLearningTextual2025a,
address = {Darmstadt, Germany},
title = {Deep {Learning} in {Textual} {Low}-{Data} {Regimes} for {Cybersecurity}},
publisher = {Dissertation (Dr. rer. nat.), Department of Computer Science, Technische Universität Darmstadt},
author = {Bayer, Markus},
year = {2025},
keywords = {Security, Projekt-CYWARN, Projekt-CYLENCE, Dissertation, Projekt-ATHENE-CyAware},
}
[BibTeX] [Download PDF]
@book{bayerDeepLearningTextual2025,
address = {Wiesbaden, Germany},
title = {Deep {Learning} in {Textual} {Low}-{Data} {Regimes} for {Cybersecurity}},
isbn = {978-3-658-48777-5},
url = {https://link.springer.com/book/10.1007/978-3-658-48778-2},
publisher = {Springer Vieweg},
author = {Bayer, Markus},
year = {2025},
doi = {10.1007/978-3-658-48778-2},
keywords = {Security, Projekt-CYWARN, Projekt-CYLENCE, Projekt-ATHENE-CyAware, DissPublisher},
}
[BibTeX] [Abstract] [Download PDF]
Informed navigation of misinformation on social media constitutes a major challenge. The field of Human-Computer Interaction (HCI) suggests digital misinformation interventions as user-centered countermeasures. This book clusters (1) existing misinformation interventions within a taxonomy encompassing designs, interaction types, and timings. The book demonstrates that current research mostly addresses higher-educated participants, and targets Twitter/X and Facebook. It highlights trends toward comprehensible interventions in contrast to top-down approaches. The findings informed (2) the design, implementation, and evaluation of simulated apps for TikTok, voice messages, and Twitter/X as indicator-based interventions. Therefore, (3) the book identified misinformation indicators for various modalities that were perceived as comprehensible.The book empirically demonstrates that (4) indicator-based interventions are positively received due to their transparency. However, they also come with challenges, such as users’ blind trust and lack of realistic assessments of biases. This research outlines chances and implications for future research.
@book{hartwigNavigatingMisinformationUserCentered2025,
address = {Wiesbaden, Germany},
title = {Navigating {Misinformation}: {User}-{Centered} {Design} and {Evaluation} of {Indicator}-{Based} {Digital} {Interventions}},
isbn = {978-3-658-47884-1},
url = {https://link.springer.com/book/10.1007/978-3-658-47885-8},
abstract = {Informed navigation of misinformation on social media constitutes a major challenge. The field of Human-Computer Interaction (HCI) suggests digital misinformation interventions as user-centered countermeasures. This book clusters (1) existing misinformation interventions within a taxonomy encompassing designs, interaction types, and timings. The book demonstrates that current research mostly addresses higher-educated participants, and targets Twitter/X and Facebook. It highlights trends toward comprehensible interventions in contrast to top-down approaches. The findings informed (2) the design, implementation, and evaluation of simulated apps for TikTok, voice messages, and Twitter/X as indicator-based interventions. Therefore, (3) the book identified misinformation indicators for various modalities that were perceived as comprehensible.The book empirically demonstrates that (4) indicator-based interventions are positively received due to their transparency. However, they also come with challenges, such as users' blind trust and lack of realistic assessments of biases. This research outlines chances and implications for future research.},
publisher = {Springer Vieweg},
author = {Hartwig, Katrin},
year = {2025},
doi = {10.1007/978-3-658-47885-8},
keywords = {Crisis, HCI, Projekt-CROSSING, Projekt-NEBULA, Projekt-CYLENCE, Projekt-ATHENE, DissPublisher},
}
[BibTeX] [Abstract] [Download PDF]
Users face many situations in which they have to disclose their data to others. In many cases, they are not properly informed about the usage of their data or the consequences of data disclosure. This book investigates how users can be supported by researching three core aspects: Firstly, problems and risks that lead to (unintended) data disclosure or arise from it have to be identified. Secondly, measures are investigated that developers can apply to mitigate these risks and meet the needs of the users. Finally, the developed solutions have to be adopted into practice. Strategies to bring security- and privacy-enhancing technologies to use are essential because a tool that is not used cannot protect anyone. The investigated scenarios are twofold: Firstly, business-to-business (B2B) collaborations, especially highlighting the perspective of owners of small and medium enterprises (SMEs) who are forced to provide data for business processes. Secondly, scenarios of everyday usage for private users that require the disclosure of data are investigated.
@book{linsnerPrivacyPreservingData2025,
address = {Wiesbaden, Germany},
title = {Privacy {Preserving} {Data} {Management} – {Assisting} {Users} in {Data} {Disclosure} {Scenarios}},
url = {https://link.springer.com/book/9783658474447},
abstract = {Users face many situations in which they have to disclose their data to others. In many cases, they are not properly informed about the usage of their data or the consequences of data disclosure. This book investigates how users can be supported by researching three core aspects: Firstly, problems and risks that lead to (unintended) data disclosure or arise from it have to be identified. Secondly, measures are investigated that developers can apply to mitigate these risks and meet the needs of the users. Finally, the developed solutions have to be adopted into practice. Strategies to bring security- and privacy-enhancing technologies to use are essential because a tool that is not used cannot protect anyone.
The investigated scenarios are twofold: Firstly, business-to-business (B2B) collaborations, especially highlighting the perspective of owners of small and medium enterprises (SMEs) who are forced to provide data for business processes. Secondly, scenarios of everyday usage for private users that require the disclosure of data are investigated.},
publisher = {Springer Vieweg},
author = {Linsner, Sebastian},
year = {2025},
doi = {10.1007/978-3-658-47445-4},
keywords = {UsableSec, Security, Projekt-CROSSING, Projekt-ATHENE-PriVis, DissPublisher},
}
[BibTeX]
@book{haeslerCitizensCrisesBehavior2025,
address = {Wiesbaden, Germany},
title = {Citizens in {Crises}: {Behavior}, {Dependencies}, and {Technological} {Support} of {Digital} {Self}-{Organization}},
publisher = {Springer Vieweg},
author = {Haesler, Steffen},
year = {2025},
keywords = {Crisis, HCI, Projekt-emergenCITY, DissPublisher, emergenCITY\_INF, emergenCITY\_SG},
}
[BibTeX] [Abstract] [Download PDF]
Information technology is used across the globe, permeating different spheres of life. In particular, advances of artificial intelligence (AI) and broad adoption of social media re-negotiate human interactions with the world. In the midst of geopolitical tensions and multiple crises, as indicated by the Russian invasion of Ukraine in 2022 or the COVID-19 pandemic, technology has become highly important to security governance. For example, the EU has formulated policies on the use of “high risk AI” while political actors use social media for (disinformation) campaigns or war reporting. Against the backdrop of multiple crises and political actors’ reliance on technological solutions, critical security studies (CSS) has been dedicated to deconstructing governmental security politics as stabilizers of the status quo, with insecurities persisting, enacted through technologically mediated practices. While attention has specifically been paid to the role of expertise in “critical” contexts, my work is interested in how socio-technical expert knowledge plays into the problematization of broader innovation policies. Further, although various practices and forms of labor have been studied, their collaborative character and informal actors’ productive self-governance have been investigated less prominently. Connecting to human-computer interaction (HCI) as a community of socio-technical practice, it becomes possible to identify user-centric design characteristics and “agnostic” framing of contexts of use being traded into both spheres of political and technological practice. I focus on socio-technical practices that are enacted in different fields: (1) AI innovation policies, (2) safety-critical scenarios, and (3) misinformation on social media. In these, security is negotiated and on high demand. AI innovation policies are formulated in the context of global competition and address both commercial and military applications. Safety-critical scenarios, in which uncertainty is high, are experienced by both formal and informal non-governmental actors. Misinformation on social media, especially in the context of rising authoritarianism, has been identified a threat and is aimed to be mitigated by technological solutions. Thus, the first part finds that Chinese, EU and US policies refer to design characteristics in the problematization of AI innovation. AI is presented as an opaque and abstract issue that is realized across multiple contexts of use. Risks and threats are posed by the “black box” character of AI and technology use by “others”. Future innovation is seen as a solution, with characteristics ranging from reliability to explainability being used as points of reference. The second part investigates computer-supported cooperative work (CSCW) of both formal and informal collectives in safety-critical scenarios. Self-governance in crises requires cooperative and collaborative work, comprising routines and teamwork. Actors’ perceptions of criticality are governed self-referentially, with emphasis put on situation awareness as a goal in formal settings. Successful coping with insecurities points out the productive side of self-governance by informal actors, building on both physically and virtually enacted care practices. The third part addresses (de)politicization in the context of technological measures aiming at mitigating the spread of misinformation on social media. Reflecting on user studies that resulted in prototyping of a learning-oriented approach, depoliticization is notable considering user-centered design on the grounds of responsibilization and technological solutionism. Yet, this also entails politicization of user interventions regarding their transparency. Situated in HCI and as an interdisciplinary endeavor, this work allows for a reflexive approach that both integrates and reflects on problem solving approaches that are co-constitutive to security governance.
@book{schmidGoverningInSecuritySociotechnical2025,
address = {Darmstadt, Germany},
title = {Governing ({In}){Security}: {Socio}-technical {Interactions} in {International} {Relations}},
url = {https://tuprints.ulb.tu-darmstadt.de/30095/},
abstract = {Information technology is used across the globe, permeating different spheres of life. In particular, advances of artificial intelligence (AI) and broad adoption of social media re-negotiate human interactions with the world. In the midst of geopolitical tensions and multiple crises, as indicated by the Russian invasion of Ukraine in 2022 or the COVID-19 pandemic, technology has become highly important to security governance. For example, the EU has formulated policies on the use of "high risk AI" while political actors use social media for (disinformation) campaigns or war reporting.
Against the backdrop of multiple crises and political actors' reliance on technological solutions, critical security studies (CSS) has been dedicated to deconstructing governmental security politics as stabilizers of the status quo, with insecurities persisting, enacted through technologically mediated practices. While attention has specifically been paid to the role of expertise in "critical" contexts, my work is interested in how socio-technical expert knowledge plays into the problematization of broader innovation policies. Further, although various practices and forms of labor have been studied, their collaborative character and informal actors' productive self-governance have been investigated less prominently. Connecting to human-computer interaction (HCI) as a community of socio-technical practice, it becomes possible to identify user-centric design characteristics and "agnostic" framing of contexts of use being traded into both spheres of political and technological practice. I focus on socio-technical practices that are enacted in different fields: (1) AI innovation policies, (2) safety-critical scenarios, and (3) misinformation on social media. In these, security is negotiated and on high demand. AI innovation policies are formulated in the context of global competition and address both commercial and military applications. Safety-critical scenarios, in which uncertainty is high, are experienced by both formal and informal non-governmental actors. Misinformation on social media, especially in the context of rising authoritarianism, has been identified a threat and is aimed to be mitigated by technological solutions.
Thus, the first part finds that Chinese, EU and US policies refer to design characteristics in the problematization of AI innovation. AI is presented as an opaque and abstract issue that is realized across multiple contexts of use. Risks and threats are posed by the "black box" character of AI and technology use by "others". Future innovation is seen as a solution, with characteristics ranging from reliability to explainability being used as points of reference. The second part investigates computer-supported cooperative work (CSCW) of both formal and informal collectives in safety-critical scenarios. Self-governance in crises requires cooperative and collaborative work, comprising routines and teamwork. Actors' perceptions of criticality are governed self-referentially, with emphasis put on situation awareness as a goal in formal settings. Successful coping with insecurities points out the productive side of self-governance by informal actors, building on both physically and virtually enacted care practices. The third part addresses (de)politicization in the context of technological measures aiming at mitigating the spread of misinformation on social media. Reflecting on user studies that resulted in prototyping of a learning-oriented approach, depoliticization is notable considering user-centered design on the grounds of responsibilization and technological solutionism. Yet, this also entails politicization of user interventions regarding their transparency. Situated in HCI and as an interdisciplinary endeavor, this work allows for a reflexive approach that both integrates and reflects on problem solving approaches that are co-constitutive to security governance.},
publisher = {Dissertation (Dr. phil.), Department of History and Social Sciences, Technische Universität Darmstadt},
author = {Schmid, Stefka},
year = {2025},
doi = {10.26083/tuprints-00030095},
keywords = {Crisis, Peace, Projekt-TraCe, Projekt-NEBULA, Dissertation},
}
[BibTeX]
@book{kuehnProactiveCyberThreat2025,
address = {Darmstadt, Germany},
title = {Proactive {Cyber} {Threat} {Intelligence}: {Automating} the {Intelligence} {Cycle} based on {Open} {Sources}},
publisher = {Dissertation (Dr.-Ing.), Department of Computer Science, Technische Universität Darmstadt},
author = {Kuehn, Philipp},
year = {2025},
keywords = {UsableSec, Security, Projekt-ATHENE-SecUrban, Projekt-CYWARN, Dissertation},
}
[BibTeX] [Abstract] [Download PDF]
Security is paramount – online and offline.Maria, Alex, Sarah, and Daniel are four friends deeply committed to human rights activism in a country grappling with increasing authoritarianism. Their efforts to organize and amplify their message on social media are met with relentless challenges: internet shutdowns, hacked accounts, direct threats, and constant surveillance – tactics aimed at silencing dissent and instilling fear. Daniel’s arrest for this involvement in the protests serves as a stark reminder of the dangers they all face.Follow Maria as she strives to learn more about digital safety and what is means for activists in four short comic stories.
@book{ComicCodeofCourage,
address = {Darmstadt, Germany},
title = {Code of {Courage}: {A} {Comic} {About} {Digital} {Security} for {Activists} [{Available} in {German}, {Russian}, {Spanish} under "{Download} {PDF}"]},
url = {https://peasec.de/2025/comic/},
abstract = {Security is paramount - online and offline.Maria, Alex, Sarah, and Daniel are four friends deeply committed to human rights activism in a country grappling with increasing authoritarianism. Their efforts to organize and amplify their message on social media are met with relentless challenges: internet shutdowns, hacked accounts, direct threats, and constant surveillance - tactics aimed at silencing dissent and instilling fear. Daniel's arrest for this involvement in the protests serves as a stark reminder of the dangers they all face.Follow Maria as she strives to learn more about digital safety and what is means for activists in four short comic stories.},
publisher = {Universitäts- und Landesbibliothek Darmstadt},
author = {Charikleia, Livani and Schraut, Franziska and Guntrum, Laura and Lawrence, Julian},
year = {2025},
doi = {10.26083/tuprints-00029108},
keywords = {Peace, Projekt-TraCe},
}
[BibTeX] [Abstract]
In an ever more complex and opaque digital information landscape, individuals increasingly share sensitive data and rely on various digital sources for information. In doing so, they face increasing challenges in engaging with digital information flows. This dissertation explores two critical directions of digital information flows: (1) the disclosure of sensitive information related to privacy and (2) the consumption of information, with a particular focus on misinformation. To effectively address these challenges, individuals require support in regaining their information sovereignty, which this dissertation conceptualises as a form of autonomy, control, and competence in navigating digital information flows related to privacy and misinformation. Overall, this dissertation provides a user-centred perspective rooted in Human-Computer Interaction to explore conceptual and methodological insights, user perspectives, and design implications for digital interventions with the overarching aim of supporting Individual Information Sovereignty. To do this, this dissertation employs a range of qualitative and quantitative research methods, including representative surveys, interviews, focus groups, think-aloud studies, and online experiments. Findings on conceptual and methodological insights demonstrate how precise operationalisation and measurement of concepts such as privacy and corresponding behaviour are essential prerequisites for accurately determining user needs. Findings on user perspectives highlight diverse, context-dependent, and evolving perspectives and patterns in digital technology use as well as support needs. Users express a fundamental tension between the advantages of digital information availability and the risk of information overload, leading to challenges in maintaining control over digital information flows. In the context of emergencies, for example, the use of social media is especially hindered by perceived privacy implications and the risk of false rumours. In general, users desire greater transparency and comprehensibility when navigating privacy and misinformation, suggesting that interventions should prioritise empowering user autonomy through tailored, clear and well-structured information. Finally, findings on design implications for digital interventions to support navigating privacy and misinformation highlight the potential of transparent and personalised approaches. For instance, personalised cookie banners tailored to users’ privacy knowledge reduce the acceptance of browser cookies. Additionally, personalised nudges and transparent, indicator-based interventions support the identification of misleading information in text, videos, and charts. Overall, this dissertation demonstrates the heterogeneity of user perspectives and the potential of transparent and personalised interventions to support Individual Information Sovereignty. This approach aims to empower users to navigate digital information flows in a more informed and self-determined way.
@book{biselliIndividualInformationSovereignty2025,
address = {Darmstadt, Germany},
title = {Individual {Information} {Sovereignty}: {User} {Perspectives} and {Digital} {Interventions} for {Navigating} {Privacy} and {Misinformation}},
abstract = {In an ever more complex and opaque digital information landscape, individuals increasingly share sensitive data and rely on various digital sources for information. In doing so, they face increasing challenges in engaging with digital information flows. This dissertation explores two critical directions of digital information flows: (1) the disclosure of sensitive information related to privacy and (2) the consumption of information, with a particular focus on misinformation. To effectively address these challenges, individuals require support in regaining their information sovereignty, which this dissertation conceptualises as a form of autonomy, control, and competence in navigating digital information flows related to privacy and misinformation. Overall, this dissertation provides a user-centred perspective rooted in Human-Computer Interaction to explore conceptual and methodological insights, user perspectives, and design implications for digital interventions with the overarching aim of supporting Individual Information Sovereignty. To do this, this dissertation employs a range of qualitative and quantitative research methods, including representative surveys, interviews, focus groups, think-aloud studies, and online experiments.
Findings on conceptual and methodological insights demonstrate how precise operationalisation and measurement of concepts such as privacy and corresponding behaviour are essential prerequisites for accurately determining user needs. Findings on user perspectives highlight diverse, context-dependent, and evolving perspectives and patterns in digital technology use as well as support needs. Users express a fundamental tension between the advantages of digital information availability and the risk of information overload, leading to challenges in maintaining control over digital information flows. In the context of emergencies, for example, the use of social media is especially hindered by perceived privacy implications and the risk of false rumours. In general, users desire greater transparency and comprehensibility when navigating privacy and misinformation, suggesting that interventions should prioritise empowering user autonomy through tailored, clear and well-structured information. Finally, findings on design implications for digital interventions to support navigating privacy and misinformation highlight the potential of transparent and personalised approaches. For instance, personalised cookie banners tailored to users' privacy knowledge reduce the acceptance of browser cookies. Additionally, personalised nudges and transparent, indicator-based interventions support the identification of misleading information in text, videos, and charts.
Overall, this dissertation demonstrates the heterogeneity of user perspectives and the potential of transparent and personalised interventions to support Individual Information Sovereignty. This approach aims to empower users to navigate digital information flows in a more informed and self-determined way.},
publisher = {Dissertation (Dr. rer. nat.), Department of Computer Science, Technische Universität Darmstadt},
author = {Biselli, Tom},
year = {2025},
doi = {10.26083/tuprints-00030183},
keywords = {Crisis, HCI, Projekt-NEBULA, Projekt-ATHENE, Dissertation},
}
[BibTeX] [Download PDF]
@book{kuehnProactiveCyberThreat2025a,
address = {Wiesbaden, Germany},
title = {Proactive {Cyber} {Threat} {Intelligence}: {Automating} the {Intelligence} {Cycle} based on {Open} {Sources}},
isbn = {978-3-658-49240-3},
url = {https://link.springer.com/book/9783658492403},
publisher = {Springer Vieweg},
author = {Kuehn, Philipp},
year = {2025},
keywords = {UsableSec, Security, Projekt-ATHENE-SecUrban, Projekt-CYWARN, DissPublisher},
}
Kapitel in Büchern
[BibTeX]
@incollection{reuterNaturwissenschaftlichtechnischeFriedensUnd2025,
title = {Naturwissenschaftlich-technische {Friedens}- und {Konfliktforschung}},
booktitle = {Handbuch {Frieden}},
publisher = {Springer VS},
author = {Reuter, Christian and Scheffran, Jürgen and Kreutle, Manuel},
editor = {Gießmann, Hans J. and Rinke, Bernhard},
year = {2025},
keywords = {Peace, Projekt-CNTR, Projekt-TraCe},
}
Publikationen in Konferenzbänden / Peer-reviewed Conference Papers
[BibTeX] [Abstract] [Download PDF]
Using smartphone apps during crises is well-established, proving critical for efficient crisis response. However, such apps become futile without an Internet connection, which is a common issue during crises. The ongoing 6G standardization explores the capability to provide local cellular connectivity for areas cut off from the Internet in crises. This paper introduces to the HCI community the concept of cellular island connectivity in isolated areas, promising a seamless transition from normal operation to island operation with local-only cellular connectivity. It presents findings from a survey (N = 857) among adult smartphone users from major German cities regarding their smartphone usage preferences in this model. Results show a shift in app demand, with users favoring general-purpose apps over dedicated crisis apps in specific scenarios. We prioritize smartphone services based on their criticality, distinguishing between apps essential for crisis response and those supporting routines. Our findings provide operators, developers, and authorities insights into making user-centric design decisions for implementing island-ready 6G communication.
@inproceedings{janzenUserPerspectiveIslandReady2025,
address = {Yokohama, Japan},
series = {{CHI} '25},
title = {The {User} {Perspective} on {Island}-{Ready} {6G} {Communication}: {A} {Survey} of {Future} {Smartphone} {Usage} in {Crisis}-{Struck} {Areas} with {Local} {Cellular} {Connectivity}},
url = {peasec.de/paper/2025/2025_JanzenPutzKaufholdStraubHollick_UserPerspective6GCommunication_CHI.pdf},
doi = {10.1145/3706598.3714324},
abstract = {Using smartphone apps during crises is well-established, proving critical for efficient crisis response. However, such apps become futile without an Internet connection, which is a common issue during crises. The ongoing 6G standardization explores the capability to provide local cellular connectivity for areas cut off from the Internet in crises. This paper introduces to the HCI community the concept of cellular island connectivity in isolated areas, promising a seamless transition from normal operation to island operation with local-only cellular connectivity. It presents findings from a survey (N = 857) among adult smartphone users from major German cities regarding their smartphone usage preferences in this model. Results show a shift in app demand, with users favoring general-purpose apps over dedicated crisis apps in specific scenarios. We prioritize smartphone services based on their criticality, distinguishing between apps essential for crisis response and those supporting routines. Our findings provide operators, developers, and authorities insights into making user-centric design decisions for implementing island-ready 6G communication.},
booktitle = {Proceedings of the {Conference} on {Human} {Factors} in {Computing} {Systems} ({CHI}) ({Honorable} {Mentions})},
publisher = {Association for Computing Machinery},
author = {Janzen, Leon and Putz, Florentin and Kaufhold, Marc-André and Straub, Kolja and Hollick, Matthias},
year = {2025},
keywords = {AuswahlCrisis, HCI, UsableSec, Security, A-Paper, Ranking-CORE-A*, Projekt-emergenCITY, Projekt-CYLENCE, emergenCITY\_INF, emergenCITY\_SG},
}
[BibTeX] [Abstract] [Download PDF]
In light of the increasing vulnerability of citizens against cyberattacks, we conducted three representative surveys with German citizens in 2021 (N=1,093), 2023 (N=1,011), and 2024 (N=1,004) to examine their cyber threat awareness, use of protective security measures, and preferred information channels. While our findings attest large proportions of the German population a high level of cyber threat awareness, many citizens feel inadequately informed about coping with cyberattacks and show little confidence in German security authorities to protect citizens and infrastructures. While age correlated with citizens’ awareness and behavior, we only saw minor temporal differences between datasets. Finally, we provide design and policy implications for enhancing citizens’ awareness of cyber threats and implementing security measures.
@inproceedings{kaufholdCyberThreatAwareness2025,
address = {Yokohama, Japan},
series = {{CHI} '25},
title = {Cyber {Threat} {Awareness}, {Protective} {Measures} and {Communication} {Preferences} in {Germany}: {Implications} from {Three} {Representative} {Surveys} (2021-2024)},
url = {https://peasec.de/paper/2025/2025_KaufholdB%C3%A4umlerBajorskiReuter_ComparativeCybersecuritySurvey_CHI.pdf},
doi = {10.1145/3706598.3713795},
abstract = {In light of the increasing vulnerability of citizens against cyberattacks, we conducted three representative surveys with German citizens in 2021 (N=1,093), 2023 (N=1,011), and 2024 (N=1,004) to examine their cyber threat awareness, use of protective security measures, and preferred information channels. While our findings attest large proportions of the German population a high level of cyber threat awareness, many citizens feel inadequately informed about coping with cyberattacks and show little confidence in German security authorities to protect citizens and infrastructures. While age correlated with citizens’ awareness and behavior, we only saw minor temporal differences between datasets. Finally, we provide design and policy implications for enhancing citizens’ awareness of cyber threats and implementing security measures.},
booktitle = {Proceedings of the {Conference} on {Human} {Factors} in {Computing} {Systems} ({CHI})},
publisher = {Association for Computing Machinery},
author = {Kaufhold, Marc-André and Bäumler, Julian and Bajorski, Marius and Reuter, Christian},
year = {2025},
keywords = {HCI, Selected, UsableSec, Security, A-Paper, Ranking-CORE-A*, AuswahlUsableSec, Projekt-CYLENCE, Projekt-ATHENE-CyAware},
}
[BibTeX] [Abstract] [Download PDF]
Youth are particularly likely to encounter hateful internet content, which can severely impact their well-being. While most social media provide reporting mechanisms, in several countries, severe hateful content can alternatively be reported to law enforcement or dedicated reporting centers. However, in Germany, many youth never resort to reporting. While research in human-computer interaction has investigated adults’ views on platform-based reporting, youth perspectives and platform-independent alternatives have received little attention. By involving a diverse group of 47 German adolescents and young adults in eight focus group interviews, we investigate how youth-sensitive reporting systems for hateful content can be designed. We explore German youth’s reporting barriers, finding that on platforms, they feel particularly discouraged by deficient rule enforcement and feedback, while platform-independent alternatives are rather unknown and perceived as time-consuming and disruptive. We further elicit their requirements for platform-independent reporting tools and contribute with heuristics for designing youth-sensitive and inclusive reporting systems.
@inproceedings{baumlerYouthSensitiveHatefulContent2025,
address = {Yokohama, Japan},
series = {{CHI} '25},
title = {Towards {Youth}-{Sensitive} {Hateful} {Content} {Reporting}: {An} {Inclusive} {Focus} {Group} {Study} in {Germany}},
url = {peasec.de/paper/2025/2025_BäumlerBaderKaufholdReuter_HatefulContentReporting_CHI.pdf},
doi = {10.1145/3706598.3713542},
abstract = {Youth are particularly likely to encounter hateful internet content, which can severely impact their well-being. While most social media provide reporting mechanisms, in several countries, severe hateful content can alternatively be reported to law enforcement or dedicated reporting centers. However, in Germany, many youth never resort to reporting. While research in human-computer interaction has investigated adults’ views on platform-based reporting, youth perspectives and platform-independent alternatives have received little attention. By involving a diverse group of 47 German adolescents and young adults in eight focus group interviews, we investigate how youth-sensitive reporting systems for hateful content can be designed. We explore German youth’s reporting barriers, finding that on platforms, they feel particularly discouraged by deficient rule enforcement and feedback, while platform-independent alternatives are rather unknown and perceived as time-consuming and disruptive. We further elicit their requirements for platform-independent reporting tools and contribute with heuristics for designing youth-sensitive and inclusive reporting systems.},
booktitle = {Proceedings of the {Conference} on {Human} {Factors} in {Computing} {Systems} ({CHI}) ({Honorable} {Mentions})},
publisher = {Association for Computing Machinery},
author = {Bäumler, Julian and Bader, Helen and Kaufhold, Marc-André and Reuter, Christian},
year = {2025},
keywords = {AuswahlCrisis, Crisis, HCI, Selected, Student, A-Paper, Ranking-CORE-A*, Projekt-CYLENCE, Projekt-ATHENE-CyAware},
}
[BibTeX] [Abstract] [Download PDF]
Im Zentrum dieses Workshops steht die Interaktion von Mensch und Technik in sicherheitskritischen Kontexten. Hierzu zählen Bereiche, die bereits seit Jahrzehnten Gegenstand der Forschung sind (z.B. Prozessführung in Leitwarten), aber auch aktuelle Herausforderungen (z.B. Social Media im Katastrophenschutz). In diesen und vielen weiteren Bereichen gilt, dass sichere Systemzustände nur durch die ganzheitliche Betrachtung von Mensch, Technik und Organisation gewährleistet bzw. schnellstmöglich wieder erreicht werden können. In diesem Zusammenhang ist der Workshop auch der Nutzbarkeit und Akzeptanz von Sicherheitskonzepten sowie einer bewussteren Auseinandersetzung der Nutzenden mit diesem Thema gewidmet.
@inproceedings{kaufhold12WorkshopMenschMaschineInteraktion2025,
address = {Chemnitz, Germany},
title = {12. {Workshop} {Mensch}-{Maschine}-{Interaktion} in sicherheitskritischen {Systemen}},
url = {https://dl.gi.de/items/1deb68fe-4141-4475-8e2b-51188ef57566},
doi = {10.18420/muc2025-mci-ws-102},
abstract = {Im Zentrum dieses Workshops steht die Interaktion von Mensch und Technik in sicherheitskritischen Kontexten. Hierzu zählen Bereiche, die bereits seit Jahrzehnten Gegenstand der Forschung sind (z.B. Prozessführung in Leitwarten), aber auch aktuelle Herausforderungen (z.B. Social Media im Katastrophenschutz). In diesen und vielen weiteren Bereichen gilt, dass sichere Systemzustände nur durch die ganzheitliche Betrachtung von Mensch, Technik und Organisation gewährleistet bzw. schnellstmöglich wieder erreicht werden können. In diesem Zusammenhang ist der Workshop auch der Nutzbarkeit und Akzeptanz von Sicherheitskonzepten sowie einer bewussteren Auseinandersetzung der Nutzenden mit diesem Thema gewidmet.},
language = {de},
booktitle = {Mensch und {Computer} 2025 - {Workshopband}},
publisher = {Gesellschaft für Informatik e.V.},
author = {Kaufhold, Marc-André and Mentler, Tilo and Nestler, Simon and Hartwig, Katrin and Reuter, Christian},
year = {2025},
keywords = {HCI, UsableSec, Security, Projekt-CYLENCE, Projekt-ATHENE},
}
[BibTeX] [Abstract] [Download PDF]
Misinformation through data visualisation is particularly dangerous because charts are often perceived as objective data representations. While past efforts to counter misinformation have focused on text and, to some extent, images and video, developing user-centred strategies to combat misleading charts remains an unresolved challenge. This study presents a conceptual approach through ChartChecker, a browser-plugin that aims to automatically extract line and bar chart data and detect potentially misleading features such as non-linear axis scales. A participatory design approach was used to develop a user-centred interface to provide transparent, comprehensible information about potentially misleading features in charts. Finally, a think-aloud study (N = 15) with ChartChecker revealed overall satisfaction with the tools’ user interface, comprehensibility, functionality, and usefulness. The results are discussed in terms of improving user engagement, increasing transparency and optimising tools designed to counter misleading information in charts, leading to overarching design implications for user-centred strategies for the visual domain.
@inproceedings{biselliChartCheckerUserCentredApproach2025,
series = {{DIS} '25},
title = {{ChartChecker}: {A} {User}-{Centred} {Approach} to {Support} the {Understanding} of {Misleading} {Charts}},
url = {https://www.peasec.de/paper/2025/2025_BiselliHartwigKneisslPouiliotReuter_ChartChecker_DIS.pdf},
doi = {10.1145/3715336.3735784},
abstract = {Misinformation through data visualisation is particularly dangerous because charts are often perceived as objective data representations. While past efforts to counter misinformation have focused on text and, to some extent, images and video, developing user-centred strategies to combat misleading charts remains an unresolved challenge.
This study presents a conceptual approach through ChartChecker, a browser-plugin that aims to automatically extract line and bar chart data and detect potentially misleading features such as non-linear axis scales. A participatory design approach was used to develop a user-centred interface to provide transparent, comprehensible information about potentially misleading features in charts. Finally, a think-aloud study (N = 15) with ChartChecker revealed overall satisfaction with the tools' user interface, comprehensibility, functionality, and usefulness. The results are discussed in terms of improving user engagement, increasing transparency and optimising tools designed to counter misleading information in charts, leading to overarching design implications for user-centred strategies for the visual domain.},
booktitle = {Proceedings of the {ACM} {Designing} {Interactive} {Systems} {Conference} ({DIS})},
publisher = {Association for Computing Machinery},
author = {Biselli, Tom and Hartwig, Katrin and Kneissl, Niklas and Pouliot, Louis and Reuter, Christian},
year = {2025},
keywords = {Crisis, HCI, Student, A-Paper, Ranking-CORE-A, Projekt-NEBULA, Projekt-ATHENE-PriVis},
}
[BibTeX] [Abstract] [Download PDF]
Computer Emergency Response Teams provide advisory, preventive, and reactive cybersecurity services for authorities, citizens, and businesses. However, their responsibility of establishing cyber situational awareness by monitoring and analyzing security advisories and vulnerabilities has become challenging due to the growing volume of information disseminated through public channels. Thus, this paper presents the preliminary design of a system for automatically retrieving and extracting security advisory documents from Common Security Advisory Framework (CSAF), HTML, and RSS sources. The evaluation with various security advisory sources (N=53) shows that the developed system can retrieve 90\% of the published advisory documents, which is a significant improvement over systems only relying on the retrieval from RSS feeds (30\%).
@inproceedings{kaufholdAdvisoryHubDesignEvaluation2025,
address = {Cham},
title = {{AdvisoryHub}: {Design} and {Evaluation} of a {Cross}-{Platform} {Security} {Advisory} {System} for {Cyber} {Situational} {Awareness}},
isbn = {978-3-032-00627-1},
url = {https://www.peasec.de/paper/2025/2025_KaufholdBäumlerKoukalReuter_SecurityAdvisoryExtractionSystem_ARES.pdf},
doi = {10.1007/978-3-032-00627-1_3},
abstract = {Computer Emergency Response Teams provide advisory, preventive, and reactive cybersecurity services for authorities, citizens, and businesses. However, their responsibility of establishing cyber situational awareness by monitoring and analyzing security advisories and vulnerabilities has become challenging due to the growing volume of information disseminated through public channels. Thus, this paper presents the preliminary design of a system for automatically retrieving and extracting security advisory documents from Common Security Advisory Framework (CSAF), HTML, and RSS sources. The evaluation with various security advisory sources (N=53) shows that the developed system can retrieve 90\% of the published advisory documents, which is a significant improvement over systems only relying on the retrieval from RSS feeds (30\%).},
language = {en},
booktitle = {Proceedings of the 20th {International} {Conference} on {Availability}, {Reliability} and {Security} ({ARES} 2025)},
publisher = {Springer Nature Switzerland},
author = {Kaufhold, Marc-André and Bäumler, Julian and Koukal, Nicolai and Reuter, Christian},
editor = {Dalla Preda, Mila and Schrittwieser, Sebastian and Naessens, Vincent and De Sutter, Bjorn},
year = {2025},
keywords = {HCI, UsableSec, Ranking-CORE-B, Projekt-CYLENCE, Projekt-ATHENE-CyAware},
pages = {47--68},
}
[BibTeX] [Abstract] [Download PDF]
Research in Augmented Reality (AR) and Virtual Reality (VR) has mostly viewed them in isolation. Yet, when used together in practical settings, AR and VR each offer unique strengths, necessitating multiple transitions to harness their advantages. This paper investigates potential challenges in Cross-Reality (CR) transitions to inform future application design. We implemented a CR system featuring a 3D modeling task that requires users to switch between PC, AR, and VR. Using a talk-aloud study (n=12) and thematic analysis, we revealed that frictions primarily arose when transitions conflicted with users’ Spatial Mental Model (SMM). Furthermore, we found five transition archetypes employed to enhance productivity once an SMM was established. Our findings uncover that transitions have to focus on establishing and upholding the SMM of users across realities, by communicating differences between them.
@inproceedings{10.1145/3706598.3713921,
address = {New York, NY, USA},
series = {Chi '25},
title = {A {Qualitative} {Investigation} of {User} {Transitions} and {Frictions} in {Cross}-{Reality} {Applications}},
isbn = {979-8-4007-1394-1},
url = {https://www.peasec.de/paper/2025/2025_VonWillichNellesTsengGugenheimerGüntherMühlhäuser_FrictionsCrossReality_CHI.pdf},
doi = {10.1145/3706598.3713921},
abstract = {Research in Augmented Reality (AR) and Virtual Reality (VR) has mostly viewed them in isolation. Yet, when used together in practical settings, AR and VR each offer unique strengths, necessitating multiple transitions to harness their advantages. This paper investigates potential challenges in Cross-Reality (CR) transitions to inform future application design. We implemented a CR system featuring a 3D modeling task that requires users to switch between PC, AR, and VR. Using a talk-aloud study (n=12) and thematic analysis, we revealed that frictions primarily arose when transitions conflicted with users’ Spatial Mental Model (SMM). Furthermore, we found five transition archetypes employed to enhance productivity once an SMM was established. Our findings uncover that transitions have to focus on establishing and upholding the SMM of users across realities, by communicating differences between them.},
booktitle = {Proceedings of the {Conference} on {Human} {Factors} in {Computing} {Systems} ({CHI})},
publisher = {Association for Computing Machinery},
author = {von Willich, Julius and Nelles, Frank and Tseng, Wen-Jie and Gugenheimer, Jan and Günther, Sebastian and Mühlhäuser, Max},
year = {2025},
note = {Number of pages: 18
tex.articleno: 808},
keywords = {HCI, A-Paper, Ranking-CORE-A*, Projekt-emergenCITY, Projekt-ATHENE, emergenCITY\_INF, emergenCITY\_SG},
}
[BibTeX] [Download PDF]
@inproceedings{haeslerHowStayConnected2025,
title = {How to stay {Connected}: {Citizens}' {Needs} on {Digital} {Self}-{Organization} in {Neighborhoods} during a {Crisis}},
url = {https://dl.gi.de/items/f58b6f20-ded9-46c4-a709-9c37840d435f},
doi = {10.18420/muc2025-mci-ws01-131},
language = {en},
booktitle = {Mensch und {Computer} 2025 - {Workshopband}},
publisher = {Gesellschaft für Informatik e.V.},
author = {Haesler, Steffen and Kaufhold, Marc-André and Thiessen, Nadja and Lestakova, Michaela and Knodt, Michele and Reuter, Christian},
year = {2025},
keywords = {HCI, UsableSec, Projekt-ATHENE-SecUrban, Projekt-emergenCITY},
}
[BibTeX] [Abstract] [Download PDF]
Computer Security Incident Response Teams (CSIRTs) face increasing challenges processing the growing volume of security-related information. Daily manual analysis of threat reports, security advisories, and vulnerability announcements leads to information overload, contributing to burnout and attrition among security professionals. Clustering such information to cope with the initial information volume and enables security professionals to grasp the current overview of the situation more easily and decide on actions. This work evaluates 196 combinations of clustering algorithms and embedding models across five security-related datasets to identify optimal approaches for automated information consolidation. We demonstrate that clustering can reduce information overload by over 90 \% while maintaining semantic coherence. Our evaluation indicates a minimal need of configuration to successfully cluster information within a reasonable timespan on consumer hardware. The findings suggest that clustering approaches can significantly enhance CSIRT operational efficiency while maintaining analytical integrity. However, complex threat reports require careful parameter tuning to achieve acceptable performance, indicating areas for future optimization (The code is made publicly available at the following URL: https://github.com/PEASEC/reducing-information-overload)
@inproceedings{kuehn_reducing_2025,
address = {Cham},
title = {Reducing {Information} {Overload}: {Because} {Even} {Security} {Experts} {Need} to {Blink}},
isbn = {978-3-032-00633-2},
shorttitle = {Reducing {Information} {Overload}},
url = {https://link.springer.com/chapter/10.1007/978-3-032-00633-2_9},
doi = {10.1007/978-3-032-00633-2_9},
abstract = {Computer Security Incident Response Teams (CSIRTs) face increasing challenges processing the growing volume of security-related information. Daily manual analysis of threat reports, security advisories, and vulnerability announcements leads to information overload, contributing to burnout and attrition among security professionals. Clustering such information to cope with the initial information volume and enables security professionals to grasp the current overview of the situation more easily and decide on actions. This work evaluates 196 combinations of clustering algorithms and embedding models across five security-related datasets to identify optimal approaches for automated information consolidation. We demonstrate that clustering can reduce information overload by over 90 \% while maintaining semantic coherence. Our evaluation indicates a minimal need of configuration to successfully cluster information within a reasonable timespan on consumer hardware. The findings suggest that clustering approaches can significantly enhance CSIRT operational efficiency while maintaining analytical integrity. However, complex threat reports require careful parameter tuning to achieve acceptable performance, indicating areas for future optimization (The code is made publicly available at the following URL: https://github.com/PEASEC/reducing-information-overload)},
language = {en},
booktitle = {Availability, {Reliability} and {Security}},
publisher = {Springer Nature Switzerland},
author = {Kuehn, Philipp and Bayer, Markus and Frey, Tobias and Kerk, Moritz and Reuter, Christian},
editor = {Coppens, Bart and Volckaert, Bruno and Naessens, Vincent and De Sutter, Bjorn},
year = {2025},
keywords = {Student, UsableSec, Security, Ranking-CORE-B, Projekt-CYWARN, Projekt-ATHENE-CyAware},
pages = {139--155},
}
[BibTeX] [Abstract] [Download PDF]
In view of the increasing number of emerging disruptive technologies {\textbackslash}ac\{edts\} in military and warfare contexts, their regulation is becoming ever more urgent. {\textbackslash}ac\{edts\} encompass a very wide range of weapons technologies. In this article, I focus on technologies and applications in the fields of autonomy, artificial intelligence and cyber technologies. Dealing with the regulation of these technologies is particularly relevant as they are increasingly used in military contexts, yet at the same time there is no uniform international regulation approach to these {\textbackslash}ac\{edts\}. Moreover, this is a field in which different disciplines come into play. While social science research in this field focuses, for example, on the development of norms and political processes, aspects of human-machine interaction play an equally central role in this context, for example with regard to autonomous weapon systems. It becomes apparent that normative processes with regard to {\textbackslash}ac\{edts\} in the military sector take on a different dynamic and that soft law approaches are becoming increasingly important in view of unsuccessful regulatory and arms control efforts. In this paper, this focus of current research is considered in relation to the respective disciplines.
@inproceedings{gonsiorSoftLawNew2025,
title = {Is {Soft} {Law} the {New} {Law}? {Exploring} {Discourses} on {Governance} and {Regulation} of {Emerging} {Disruptive} {Technologies} in the {Military} {Domain}},
url = {https://dl.gi.de/items/342b1381-6cfd-456f-96bf-4e9b6caf49a4},
doi = {10.18420/muc2025-mci-ws01-172},
abstract = {In view of the increasing number of emerging disruptive technologies {\textbackslash}ac\{edts\} in military and warfare contexts, their regulation is becoming ever more urgent. {\textbackslash}ac\{edts\} encompass a very wide range of weapons technologies. In this article, I focus on technologies and applications in the fields of autonomy, artificial intelligence and cyber technologies. Dealing with the regulation of these technologies is particularly relevant as they are increasingly used in military contexts, yet at the same time there is no uniform international regulation approach to these {\textbackslash}ac\{edts\}. Moreover, this is a field in which different disciplines come into play. While social science research in this field focuses, for example, on the development of norms and political processes, aspects of human-machine interaction play an equally central role in this context, for example with regard to autonomous weapon systems. It becomes apparent that normative processes with regard to {\textbackslash}ac\{edts\} in the military sector take on a different dynamic and that soft law approaches are becoming increasingly important in view of unsuccessful regulatory and arms control efforts. In this paper, this focus of current research is considered in relation to the respective disciplines.},
language = {en},
booktitle = {Mensch und {Computer} 2025 - {Workshopband}},
publisher = {Gesellschaft für Informatik e.V.},
author = {Gonsior, Anja-Liisa},
year = {2025},
keywords = {Peace, Projekt-TraCe, Security},
}
Weitere Publikationen / Other Publications
[BibTeX] [Abstract] [Download PDF]
Public information contains valuable Cyber Threat Intelligence (CTI) that is used to prevent future attacks. While standards exist for sharing this information, much appears in non-standardized news articles or blogs. Monitoring online sources for threats is time-consuming and source selection is uncertain. Current research focuses on extracting Indicators of Compromise from known sources, rarely addressing new source identification. This paper proposes a CTI-focused crawler using multi-armed bandit (MAB) and various crawling strategies. It employs SBERT to identify relevant documents while dynamically adapting its crawling path. Our system ThreatCrawl achieves a harvest rate exceeding 25\% and expands its seed by over 300\% while maintaining topical focus. Additionally, the crawler identifies previously unknown but highly relevant overview pages, datasets, and domains.
@techreport{kuehnBanditHuntDynamic2025,
title = {Bandit on the {Hunt}: {Dynamic} {Crawling} for {Cyber} {Threat} {Intelligence}},
shorttitle = {Bandit on the {Hunt}},
url = {http://arxiv.org/abs/2504.18375},
abstract = {Public information contains valuable Cyber Threat Intelligence (CTI) that is used to prevent future attacks. While standards exist for sharing this information, much appears in non-standardized news articles or blogs. Monitoring online sources for threats is time-consuming and source selection is uncertain. Current research focuses on extracting Indicators of Compromise from known sources, rarely addressing new source identification. This paper proposes a CTI-focused crawler using multi-armed bandit (MAB) and various crawling strategies. It employs SBERT to identify relevant documents while dynamically adapting its crawling path. Our system ThreatCrawl achieves a harvest rate exceeding 25\% and expands its seed by over 300\% while maintaining topical focus. Additionally, the crawler identifies previously unknown but highly relevant overview pages, datasets, and domains.},
number = {arXiv:2504.18375},
urldate = {2025-05-20},
institution = {arXiv},
author = {Kuehn, Philipp and Nadermahmoodi, Dilara and Bayer, Markus and Reuter, Christian},
month = apr,
year = {2025},
note = {arXiv:2504.18375 [cs]},
keywords = {Student, UsableSec, Security, Projekt-ATHENE-SecUrban, Projekt-CYWARN},
}
[BibTeX] [Abstract] [Download PDF]
Seit den frühen 2010er Jahren, insbesondere während der Proteste in Ägypten und Tunesien, wurde die Rolle von Informations- und Kommunikationstechnologien (IKT) für aktivistische Tätigkeiten immer wichtiger. Dies zeigt sich beispielsweise an der Nutzung sozialer Medien durch Aktivist:innen in Myanmar, die nach dem Militärputsch 2021 internationale Aufmerksamkeit erlangen wollten. IKTs bieten zahlreiche Vorteile wie Kosteneinsparungen, Zugang zu alternativen Informationsquellen und die Demokratisierung politischer Beteiligung. Jedoch sind Aktivist:innen mit vielfältigen Herausforderungen und unterschiedlichen Formen von digitaler Gewalt konfrontiert, darunter Internetabschaltungen, Hassrede und Zensurmaßnahmen. Auch ist ein Anstieg digitaler Überwachung, Propaganda und der Manipulation von Informationen zu verzeichnen. Die zunehmende Verbreitung digitaler Gewalt stellt für Aktivist:innen und soziale Bewegungen ein signifikantes Problem dar, was dazu führt, dass sich immer mehr Aktivist:innen selbst zensieren und sich aus den Online-Räumen zurückziehen.
@techreport{Guntrum2025,
title = {Digitale {Gewalt} gegen {Aktivist}:innen: {Risiken} und mögliche {Handlungsmöglichkeiten}},
url = {https://gi-radar.de/373-digitale-gewalt/},
abstract = {Seit den frühen 2010er Jahren, insbesondere während der Proteste in Ägypten und Tunesien, wurde die Rolle von Informations- und Kommunikationstechnologien (IKT) für aktivistische Tätigkeiten immer wichtiger. Dies zeigt sich beispielsweise an der Nutzung sozialer Medien durch Aktivist:innen in Myanmar, die nach dem Militärputsch 2021 internationale Aufmerksamkeit erlangen wollten. IKTs bieten zahlreiche Vorteile wie Kosteneinsparungen, Zugang zu alternativen Informationsquellen und die Demokratisierung politischer Beteiligung. Jedoch sind Aktivist:innen mit vielfältigen Herausforderungen und unterschiedlichen Formen von digitaler Gewalt konfrontiert, darunter Internetabschaltungen, Hassrede und Zensurmaßnahmen. Auch ist ein Anstieg digitaler Überwachung, Propaganda und der Manipulation von Informationen zu verzeichnen. Die zunehmende Verbreitung digitaler Gewalt stellt für Aktivist:innen und soziale Bewegungen ein signifikantes Problem dar, was dazu führt, dass sich immer mehr Aktivist:innen selbst zensieren und sich aus den Online-Räumen zurückziehen.},
institution = {Gesellschaft für Informatik},
author = {Guntrum, Laura and Reuter, Christian},
month = feb,
year = {2025},
keywords = {Peace, Projekt-TraCe},
}
[BibTeX] [Abstract] [Download PDF]
More than 600 subsea data cables connect nearly every coastal country of the world, amounting to a cumulative length of more than 1.5 million km. These fibre optic cables are responsible for over 99\% of intercontinental data traffic. They are the digital lifelines of our modern world. Yet, external factors frequently expose vulnerabilities in the network and its supporting infrastructure. While around 150 cable faults occur globally each year, a growing number of cable faults are suspected to be linked to hybrid or malicious activity. In this context, and following recent cable disruptions in the Baltic Sea, the European Union has put forth an EU Action Plan on Cable Security. Recognising that many states around the world face similar risks, this Action Plan proposes to establish “an advanced cable diplomacy” . But cable diplomacy is not a one-size-fits-all strategy. Technological sensitivities, dual-use military aspects and geopolitical considerations demand a tailored approach.This policy brief therefore addresses a key question: Where and how should the EU build effective cable diplomacy partnerships? To address this, the EU’s cable diplomacy should be structured around three geographic pillars, reflecting regional contexts and strategic opportunities. Alongside these regional priorities, the EU must also reinforce its role in shaping global governance for undersea infrastructure, working through multilateral institutions and international standard-setting bodies. By doing so, the European Union can strengthen global resilience of subsea infrastructure and position itself as a security enhancer in the field of critical infrastructure.
@techreport{frankenCableDiplomacySecuring2025,
title = {Cable diplomacy: {Securing} influence, data and global rules},
url = {https://www.peasec.de/paper/2025/2025_Franken_CableDiplomacy_BoellEU.pdf},
abstract = {More than 600 subsea data cables connect nearly every coastal country of the world, amounting to a cumulative length of more than 1.5 million km. These fibre optic cables are responsible for over 99\% of intercontinental data traffic. They are the digital lifelines of our modern world. Yet, external factors frequently expose vulnerabilities in the network and its supporting infrastructure. While around 150 cable faults occur globally each year, a growing number of cable faults are suspected to be linked to hybrid or malicious activity. In this context, and following recent cable disruptions in the Baltic Sea, the European Union has put forth an EU Action Plan on Cable Security. Recognising that many states around the world face similar risks, this Action Plan proposes to establish “an advanced cable diplomacy” . But cable diplomacy is not a one-size-fits-all strategy. Technological sensitivities, dual-use military aspects and geopolitical considerations demand a tailored approach.This policy brief therefore addresses a key question: Where and how should the EU build effective cable diplomacy partnerships? To address this, the EU’s cable diplomacy should be structured around three geographic pillars, reflecting regional contexts and strategic opportunities. Alongside these regional priorities, the EU must also reinforce its role in shaping global governance for undersea infrastructure, working through multilateral institutions and international standard-setting bodies. By doing so, the European Union can strengthen global resilience of subsea infrastructure and position itself as a security enhancer in the field of critical infrastructure.},
institution = {Böll EU Brief},
author = {Franken, Jonas},
year = {2025},
keywords = {Peace, Projekt-NetzGeschichte, Projekt-ATHENE-SecFOCI},
}
[BibTeX] [Abstract] [Download PDF]
Today, submarine fibre-optic telecommunications cable systems are the backbone of our data and communications infrastructure, essential to the general functioning and integrity of the internet and the broader information and communications technology (ICT) ecosystem. While satellites and the new constellations in low Earth orbit are breaking ground, especially in terms of lowering costs and accessibility, they are still no match to the high capacity and low latency that today’s subsea cable systems provide. As more countries are connected, the security and resilience of the infrastructure becomes ever more critical. In 2023, UNIDIR published its first report on subsea cables, entitled Wading Murky Waters: Subsea Communications Cables and Responsible State Behaviour. The initial scoping study sought to raise awareness of this essential transmission technology. Since then, a slew of new initiatives have been proposed, including at the international level, signalling both the strategic importance of the infrastructure and the need to strengthen security and resilience across all of its components.This follow-on study sets out to understand what it means in policy and practice when governments qualify or designate subsea telecommunications cables as critical infrastructure (CI). The report draws from the CI literature to frame government approaches to security and resilience, identifying how government policy and practice interact with core CI concepts such as absorptive, restorative and adaptive resilience capacities. While subsea cable systems are generally designed and deployed with these capacities in mind, effective government action on security and resilience can contribute to strengthening them.
@techreport{kavanagh_achieving_2025,
address = {Geneva, Switzerland},
title = {Achieving {Depth}: {Subsea} {Telecommunications} {Cables} as {Critical} {Infrastructure}},
url = {https://unidir.org/publication/achieving-depth-subsea-telecommunications-cables-as-critical-infrastructure/},
abstract = {Today, submarine fibre-optic telecommunications cable systems are the backbone of our data and communications infrastructure, essential to the general functioning and integrity of the internet and the broader information and communications technology (ICT) ecosystem. While satellites and the new constellations in low Earth orbit are breaking ground, especially in terms of lowering costs and accessibility, they are still no match to the high capacity and low latency that today’s subsea cable systems provide. As more countries are connected, the security and resilience of the infrastructure becomes ever more critical. In 2023, UNIDIR published its first report on subsea cables, entitled Wading Murky Waters: Subsea Communications Cables and Responsible State Behaviour. The initial scoping study sought to raise awareness of this essential transmission technology. Since then, a slew of new initiatives have been proposed, including at the international level, signalling both the strategic importance of the infrastructure and the need to strengthen security and resilience across all of its components.This follow-on study sets out to understand what it means in policy and practice when governments qualify or designate subsea telecommunications cables as critical infrastructure (CI). The report draws from the CI literature to frame government approaches to security and resilience, identifying how government policy and practice interact with core CI concepts such as absorptive, restorative and adaptive resilience capacities. While subsea cable systems are generally designed and deployed with these capacities in mind, effective government action on security and resilience can contribute to strengthening them.},
institution = {United Nations Institute for Disarmament Research},
author = {Kavanagh, Camino and Franken, Jonas and He, Wenting},
year = {2025},
keywords = {Security, Peace, Projekt-ATHENE-SecFOCI},
}
[BibTeX] [Abstract] [Download PDF]
The geopolitical innovation race is structured around four key dimensions: (1) pay-off structure, (2) actor networks, (3) motivation, and (4) social construction of technology that differentiate it from an `arms race’ and `innovation race’. The term `geopolitical innovation race’ tries to capture current dynamics of tech governance. Border control is neither the most prominent nor publicly discussed field of AI application, but we still find that related EU politics reflect notions of a `geopolitical innovation race’. From a technocratic, problem-solving perspective, border control represents just another `context of use’ of AI, neglecting that involved humans face impactful consequences of technology use. Characteristics of a geopolitical innovation race are notable in innovation projects for border control, illustrating a similar mode of politics across application contexts but with less ethical obligations to implement `trustworthy AI’ compared to commercial products.
@techreport{schmidAIBorderEU2025,
address = {Border Criminologies},
title = {{AI} for border control – a `geopolitical innovation race' at the {EU}'s external borders},
url = {https://blogs.law.ox.ac.uk/border-criminologies-blog/blog-post/2025/07/ai-border-control-geopolitical-innovation-race-eus},
abstract = {The geopolitical innovation race is structured around four key dimensions: (1) pay-off structure, (2) actor networks, (3) motivation, and (4) social construction of technology that differentiate it from an `arms race' and `innovation race'. The term `geopolitical innovation race' tries to capture current dynamics of tech governance. Border control is neither the most prominent nor publicly discussed field of AI application, but we still find that related EU politics reflect notions of a `geopolitical innovation race'. From a technocratic, problem-solving perspective, border control represents just another `context of use' of AI, neglecting that involved humans face impactful consequences of technology use. Characteristics of a geopolitical innovation race are notable in innovation projects for border control, illustrating a similar mode of politics across application contexts but with less ethical obligations to implement `trustworthy AI' compared to commercial products.},
author = {Schmid, Stefka and Mahlberg, Julia},
year = {2025},
keywords = {Peace, Projekt-CNTR, Projekt-TraCe, Student},
}
[BibTeX]
@techreport{schmid_CNTR_2025,
address = {CNTR Monitor},
title = {Neue {Realitäten} in der globalen {Sicherheit} durch {KI} [new realities of {AI} in global security]},
institution = {CNTR Monitor},
author = {Schmid, Stefka and Diehl, Carlo and Reuter, Christian},
year = {2025},
keywords = {Peace, Projekt-CNTR},
}
[BibTeX] [Abstract]
Künstliche Intelligenz ist zu einem zentralen Feld des globalen Wettbewerbs geworden, das von China, den USA und der EU häufig als Teil eines „KI-Wettrüstens“ verstanden wird. Wir argumentieren jedoch, dass diese Metapher die Dynamiken der KI-Entwicklung verzerrt. Stattdessen schlagen wir den Begriff eines „geopolitischen Innovationswettlaufs“ um technologische Vorherrschaft in einer vernetzten globalen Wirtschaft vor. Auf Basis einer Analyse von Strategiepapieren zeigen wir, dass die Akteure (1) zwischen Nullsummen- und Positivsummenlogiken schwanken, (2) ihre Netzwerke entsprechend nationaler Innovationskulturen unterschiedlich organisieren, (3) neben Sicherheitsinteressen auch wirtschaftliche und statusbezogene Ziele verfolgen und (4) die Bedeutung von KI bewusst offenhalten. Übergreifend trägt die „Wettlauf“-Metapher dazu bei, die „Geopolitisierung“ von Innovation zu verfestigen und Sicherheit eng mit wirtschaftlichen Interessen zu verknüpfen. Vor diesem Hintergrund identifizieren wir folgende zentrale Punkte: 1. Die Metapher des „Wettrüstens“ sollte vermieden werden. Sie vereinfacht die KI-Entwicklung zu stark und birgt Eskalationsrisiken. Ein geopolitischer Innovationswettlauf basiert dagegen sowohl auf Wettbewerb als auch auf Zusammenarbeit. 2. Rhetorik zählt. Kommunikation, die auf einer nationalistischen Redeweise von „Wettrüsten“ aufbaut, fördert nur eine „Rückkehr zur Geopolitik“. Es ist zwar wichtig, Probleme transparent zu machen, sie sollten aber auf differenzierte Weise kommuniziert werden. 3. Kooperative Rahmenordnungen sollten gestärkt werden. Internationale Standards und Regulierung können Rivalitäten abmildern und, je nach ihrem Aufbau, Raum für verantwortungsvollere und diversere Innovation schaffen.
@techreport{schmidGefahrlicheBildKIWettrustens2025,
address = {FIfF-Kommunikation},
title = {Das gefährliche {Bild} des „{KI}-{Wettrüstens}“: {Wie} {Metaphern} die globale {KI}-{Politik} prägen},
abstract = {Künstliche Intelligenz ist zu einem zentralen Feld des globalen Wettbewerbs geworden, das von China, den USA und der EU häufig als Teil eines „KI-Wettrüstens“ verstanden wird. Wir argumentieren jedoch, dass diese Metapher die Dynamiken der KI-Entwicklung verzerrt. Stattdessen schlagen wir den Begriff eines „geopolitischen Innovationswettlaufs“ um technologische Vorherrschaft in einer vernetzten globalen Wirtschaft vor. Auf Basis einer Analyse von Strategiepapieren zeigen wir, dass die Akteure (1) zwischen Nullsummen- und Positivsummenlogiken schwanken, (2) ihre Netzwerke entsprechend nationaler Innovationskulturen unterschiedlich organisieren, (3) neben Sicherheitsinteressen auch wirtschaftliche und statusbezogene Ziele verfolgen und (4) die Bedeutung von KI bewusst offenhalten. Übergreifend trägt die „Wettlauf“-Metapher dazu bei, die „Geopolitisierung“ von Innovation zu verfestigen und Sicherheit eng mit wirtschaftlichen Interessen zu verknüpfen. Vor diesem Hintergrund identifizieren wir folgende zentrale Punkte:
1. Die Metapher des „Wettrüstens“ sollte vermieden werden. Sie vereinfacht die KI-Entwicklung zu stark und birgt Eskalationsrisiken. Ein geopolitischer Innovationswettlauf basiert dagegen sowohl auf Wettbewerb als auch auf Zusammenarbeit.
2. Rhetorik zählt. Kommunikation, die auf einer nationalistischen Redeweise von „Wettrüsten“ aufbaut, fördert nur eine „Rückkehr zur Geopolitik“. Es ist zwar wichtig, Probleme transparent zu machen, sie sollten aber auf differenzierte Weise kommuniziert werden.
3. Kooperative Rahmenordnungen sollten gestärkt werden. Internationale Standards und Regulierung können Rivalitäten abmildern und, je nach ihrem Aufbau, Raum für verantwortungsvollere und diversere Innovation schaffen.},
author = {Schmid, Stefka and Carlo, Diehl and Reuter, Christian},
year = {2025},
keywords = {Peace, Projekt-CNTR, Projekt-TraCe, Security},
}






















