BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//PEASEC - Science and Technology for Peace and Security | Technical University of Darmstadt - ECPv6.15.20//NONSGML v1.0//EN
CALSCALE:GREGORIAN
METHOD:PUBLISH
X-ORIGINAL-URL:https://peasec.de
X-WR-CALDESC:Events for PEASEC - Science and Technology for Peace and Security | Technical University of Darmstadt
REFRESH-INTERVAL;VALUE=DURATION:PT1H
X-Robots-Tag:noindex
X-PUBLISHED-TTL:PT1H
BEGIN:VTIMEZONE
TZID:Europe/Berlin
BEGIN:DAYLIGHT
TZOFFSETFROM:+0100
TZOFFSETTO:+0200
TZNAME:CEST
DTSTART:20220327T010000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:+0200
TZOFFSETTO:+0100
TZNAME:CET
DTSTART:20221030T010000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:+0100
TZOFFSETTO:+0200
TZNAME:CEST
DTSTART:20230326T010000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:+0200
TZOFFSETTO:+0100
TZNAME:CET
DTSTART:20231029T010000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:+0100
TZOFFSETTO:+0200
TZNAME:CEST
DTSTART:20240331T010000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:+0200
TZOFFSETTO:+0100
TZNAME:CET
DTSTART:20241027T010000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:+0100
TZOFFSETTO:+0200
TZNAME:CEST
DTSTART:20250330T010000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:+0200
TZOFFSETTO:+0100
TZNAME:CET
DTSTART:20251026T010000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:+0100
TZOFFSETTO:+0200
TZNAME:CEST
DTSTART:20260329T010000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:+0200
TZOFFSETTO:+0100
TZNAME:CET
DTSTART:20261025T010000
END:STANDARD
END:VTIMEZONE
BEGIN:VEVENT
DTSTART;TZID=Europe/Berlin:20250210T084500
DTEND;TZID=Europe/Berlin:20250210T091500
DTSTAMP:20260430T182149
CREATED:20250205T150741Z
LAST-MODIFIED:20250205T150939Z
UID:20459-1739177100-1739178900@peasec.de
SUMMARY:Masterarbeit im Studiengang Internationale Studien/Friedens- und Konfliktforschung von Sabrina Neuhäusel: Risk Cultures and Citizens‘ Perception of Social Media Use in Emergencies – A German Case Study
DESCRIPTION:Social Media [SM] has become an essential component of contemporary crisis management and communication strategies\, and its value across various natural or human-induced emergency events is well-attested. However\, studies that offer explanatory factors for citizens’ divergent risk perception and behavior before\, during\, and after emergencies – particularly in relation to SM – are still scarce. This study addresses this gap by transferring Cornia et al.’s (2016) risk culture framework\, differentiating between state-oriented\, individualistic\, and fatalistic risk cultures\, to the realm of SM to analyze citizens’ use of and attitudes toward SM in emergencies. Therefore\, an online survey with N=192 German citizens was conducted to investigate whether recent incidents\, such as the COVID-19 pandemic or the 2021 Ahr Valley flood\, which have caused widespread criticism of and dissatisfaction with the effectiveness of Germany’s civil protection systems\, have changed citizens’ risk perception and crisis management strategies\, and how this affected their SM use. Specifically\, it was examined whether Germany has shifted from a state-oriented risk culture to an individualistic one. The findings of the quantitative and qualitative analyses reveal an interplay between state-oriented and individualistic risk culture attitudes\, where both state-provided guidance and personal initiative\, i.e.\, in the form of increased reliance on SM\, play essential roles in navigating crises. The results also highlight practical implications for improving future crisis communication strategies and context-sensitive approaches to strengthening societal resilience\, thus contributing to a deeper understanding of how socio-cultural contexts shape citizens’ risk perception and behavior. \nBetreuerin: Dr. Stefka Schmid\nPrüfer: Prof. Dr. Dr. Christian Reuter \nOrt: virtuell bei Zoom
URL:https://peasec.de/event/masterarbeit-im-studiengang-internationale-studien-friedens-und-konfliktforschung-von-sabrina-neuhausel-risk-cultures-and-citizens-perception-of-social-media-use-in-emergencies-a/
LOCATION:Zoom
CATEGORIES:Kolloquium
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=Europe/Berlin:20250120T090000
DTEND;TZID=Europe/Berlin:20250120T092500
DTSTAMP:20260430T182149
CREATED:20250103T152200Z
LAST-MODIFIED:20250103T152200Z
UID:19984-1737363600-1737365100@peasec.de
SUMMARY:Masterarbeit im Studiengang IT-Sicherheit von Per Philipp Schneider: Potentials and Challenges of Satellite Internet for Critical Infrastructures in case of an Internet Connection Failure
DESCRIPTION:The ongoing digitalization of critical infrastructures has significantly increased their dependence on internet connectivity. Disruptions to essential submarine cables\, which form the backbone of internet access\, can abruptly isolate highly digitalized regions from the internet for extended periods. The rapid development of satellite constellations for broadband internet in recent years presents new opportunities for internet provisioning. This study aims to explore potentials and limitations of satellite internet for maintaining best possible continuous operation of critical infrastructures during outages of terrestrial cable connections. Existing research does not provide systematic methodologies to address this issue. Thus\, a novel framework is proposed to analyze the problem in a structured manner. The methodology identifies internet-dependent processes within an infrastructure and assesses their internet requirements. These requirements are then compared against the performance parameters of a selected satellite constellation. Based on the feasibility of maintaining operation of these processes\, the analysis is extended to more complex structures to evaluate operational viability in these cases. The framework was applied to the medical services subsector within the healthcare sector and the financial transactions subsector within the finance sector\, using the Starlink satellite constellation. Results show that Starlink can support most identified processes and holds significant potential for sustaining the operation of complex infrastructures in these two subsectors. However\, in some scenarios\, limitations arise due to Starlink’s limited uplink capabilities and increased latency. The flexibility of the developed framework enables future research to analyze additional sectors\, incorporate new satellite constellations\, or extend existing analyses by including newly identified processes. \nBetreuer: Jonas Franken\nPrüfer: Prof. Dr. Dr. Christian Reuter
URL:https://peasec.de/event/masterarbeit-im-studiengang-it-sicherheit-von-per-philipp-schneider-potentials-and-challenges-of-satellite-internet-for-critical-infrastructures-in-case-of-an-internet-connection-failure/
LOCATION:Zoom
CATEGORIES:Kolloquium
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=Europe/Berlin:20250113T084500
DTEND;TZID=Europe/Berlin:20250113T091500
DTSTAMP:20260430T182149
CREATED:20250103T152351Z
LAST-MODIFIED:20250103T152351Z
UID:19986-1736757900-1736759700@peasec.de
SUMMARY:Masterarbeit im Studiengang IT-Sicherheit von Andre Hanke: Securing Cryptography in the Quantum Era: An Analysis of Threats and Post-Quantum Solution
DESCRIPTION:Einstein famously described quantum phenomena as “spukhafte Fernwirkung”—spooky action at a distance—a concept that challenged classical understanding. While\, these same quantum principles have the potential to propel us into a new computational era\, promising unprecedented processing power\, they also pose a significant threat to cryptographic systems should a sufficiently large quantum computer be built. Algorithms like Shor’s and Grover’s threaten to break the mathematical foundations of current encryption methods such as RSA and Elliptic Curve Cryptography. While it’s uncertain when quantum computers capable of this will be realized—possibly decades in the future—findings suggest that this risk to data is already present. There is a rising suspicion that adversaries are intercepting encrypted data today to decrypt it once quantum computing matures\, thereby jeopardizing sensitive information requiring long-term confidentiality. The development of quantum-resistant cryptography is crucial to counter this threat\, with the National Institute of Standards and Technology (NIST) leading efforts through their Post-Quantum Cryptography Standardization process. Although this process finally bore fruit after eight years with the release of the first three standards in 2024\, findings further suggest a misconception regarding the perceived urgency of this migration. Despite significant progress in researching and standardizing quantum-resistant algorithms\, the threat posed by potential quantum attacks seems to be underestimated. Widespread adoption is expected to take years due to the need for careful deprecation of existing algorithms and extensive public-private engagement. Additionally\, the historically lengthy process of even much less complex cryptographic migrations means that real-world implementation may be too slow and does not account for the immediate problem of data harvesting attacks. This thesis underscores the urgent need to accelerate the global adoption of post-quantum cryptographic measures to safeguard digital infrastructures against the emerging and immediate quantum threat. \nBetreuer: Dr. Thomas Reinold\nPrüfer: Prof. Dr. Dr. Christian Reuter
URL:https://peasec.de/event/masterarbeit-im-studiengang-it-sicherheit-von-andre-hanke-securing-cryptography-in-the-quantum-era-an-analysis-of-threats-and-post-quantum-solution-2/
LOCATION:Zoom
CATEGORIES:Kolloquium
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=Europe/Berlin:20241216T100000
DTEND;TZID=Europe/Berlin:20241216T103000
DTSTAMP:20260430T182149
CREATED:20241208T003139Z
LAST-MODIFIED:20241208T003316Z
UID:19820-1734343200-1734345000@peasec.de
SUMMARY:Masterarbeit im Studiengang IT-Sicherheit von Andre Hanke: Securing Cryptography in the Quantum Era: An Analysis of Threats and Post-Quantum Solution
DESCRIPTION:Einstein famously described quantum phenomena as “spukhafte Fernwirkung”—spooky action at a distance—a concept that challenged classical understanding. While\, these same quantum principles have the potential to propel us into a new computational era\, promising unprecedented processing power\, they also pose a significant threat to cryptographic systems should a sufficiently large quantum computer be built. Algorithms like Shor’s and Grover’s threaten to break the mathematical foundations of current encryption methods such as RSA and Elliptic Curve Cryptography. While it’s uncertain when quantum computers capable of this will be realized—possibly decades in the future—findings suggest that this risk to data is already present. There is a rising suspicion that adversaries are intercepting encrypted data today to decrypt it once quantum computing matures\, thereby jeopardizing sensitive information requiring long-term confidentiality. The development of quantum-resistant cryptography is crucial to counter this threat\, with the National Institute of Standards and Technology (NIST) leading efforts through their Post-Quantum Cryptography Standardization process. Although this process finally bore fruit after eight years with the release of the first three standards in 2024\, findings further suggest a misconception regarding the perceived urgency of this migration. Despite significant progress in researching and standardizing quantum-resistant algorithms\, the threat posed by potential quantum attacks seems to be underestimated. Widespread adoption is expected to take years due to the need for careful deprecation of existing algorithms and extensive public-private engagement. Additionally\, the historically lengthy process of even much less complex cryptographic migrations means that real-world implementation may be too slow and does not account for the immediate problem of data harvesting attacks. This thesis underscores the urgent need to accelerate the global adoption of post-quantum cryptographic measures to safeguard digital infrastructures against the emerging and immediate quantum threat. \nBetreuer: Dr. Thomas Reinold\nPrüfer: Prof. Dr. Dr. Christian Reuter
URL:https://peasec.de/event/masterarbeit-im-studiengang-it-sicherheit-von-andre-hanke-securing-cryptography-in-the-quantum-era-an-analysis-of-threats-and-post-quantum-solution/
LOCATION:Zoom
CATEGORIES:Kolloquium
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=Europe/Berlin:20241212T080000
DTEND;TZID=Europe/Berlin:20241212T170000
DTSTAMP:20260430T182149
CREATED:20241212T142336Z
LAST-MODIFIED:20241212T142336Z
UID:19911-1733990400-1734022800@peasec.de
SUMMARY:Masterarbeit im Studiengang Internationale Studien/Friedens- und Konfliktforschung von Sabrina Neuhäusel: Risk Cultures and Citizens‘ Perception of Social Media Use in Emergencies – A German Case Study
DESCRIPTION:Social Media [SM] has become an essential component of contemporary crisis management and communication strategies\, and its value across various natural or human-induced emergency events is well-attested. However\, studies that offer explanatory factors for citizens’ divergent risk perception and behavior before\, during\, and after emergencies – particularly in relation to SM – are still scarce. This study addresses this gap by transferring Cornia et al.’s (2016) risk culture framework\, differentiating between state-oriented\, individualistic\, and fatalistic risk cultures\, to the realm of SM to analyze citizens’ use of and attitudes toward SM in emergencies. Therefore\, an online survey with N=192 German citizens was conducted to investigate whether recent incidents\, such as the COVID-19 pandemic or the 2021 Ahr Valley flood\, which have caused widespread criticism of and dissatisfaction with the effectiveness of Germany’s civil protection systems\, have changed citizens’ risk perception and crisis management strategies\, and how this affected their SM use. Specifically\, it was examined whether Germany has shifted from a state-oriented risk culture to an individualistic one. The findings of the quantitative and qualitative analyses reveal an interplay between state-oriented and individualistic risk culture attitudes\, where both state-provided guidance and personal initiative\, i.e.\, in the form of increased reliance on SM\, play essential roles in navigating crises. The results also highlight practical implications for improving future crisis communication strategies and context-sensitive approaches to strengthening societal resilience\, thus contributing to a deeper understanding of how socio-cultural contexts shape citizens’ risk perception and behavior. \nBetreuerin: Stefka Schmid\, M.A.\nPrüfer: Prof. Dr. Dr. Christian Reuter
URL:https://peasec.de/event/masterarbeit-im-studiengang-internationale-studien-friedens-und-konfliktforschung-von-sabrina-neuhaeusel-risk-cultures-and-citizens-perception-of-social-media-use-in-emergencies-a/
LOCATION:Zoom
CATEGORIES:Kolloquium
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=Europe/Berlin:20241210T084500
DTEND;TZID=Europe/Berlin:20241210T091500
DTSTAMP:20260430T182149
CREATED:20241111T170903Z
LAST-MODIFIED:20241208T003322Z
UID:19593-1733820300-1733822100@peasec.de
SUMMARY:Masterarbeit im Studiengang Internationale Studien / Friedens- und Konfliktforschung (ISFK) von Helen Bader: Towards Youth-Sensitivity and Restorative Justice Approaches in Hate Speech Reporting Systems: An Inclusive Focus Group Study with German Adolescents
DESCRIPTION:Youth are particularly vulnerable to encountering hateful content online\, which can significantly harm their well-being. Although most social media platforms offer reporting mechanisms\, these systems often have shortcomings\, such as an one-size-fits-all approach and a lack of adequate social support options. In some countries\, serious cases of hate speech can also be reported to law enforcement or specialized reporting centers. However\, in Germany\, many young people choose not to report such content. While previous research in HCI has explored adults’ views on platform-based reporting\, there is limited focus on the perspectives of youth and their awareness of platform-independent alternatives. This thesis addresses this gap by conducting an empirical investigation through a qualitative content analysis of eight focus group interviews with German adolescents and young adults (n=47). The objective of this investigation is to ascertain how youth-sensitive reporting systems for hateful content should be designed. It examines the barriers young people face when reporting hate speech\, revealing that they are often discouraged by poor rule enforcement and lack of feedback on platforms\, while platform-independent options are largely unfamiliar and viewed as inconvenient. The results also outlines key design requirements and preferred reporting channels for platform-independent reporting tools\, and provides heuristics for creating inclusive\, youth-sensitive reporting systems. This thesis contributes to research in HCI by presenting insights into the reporting barriers of adolescents and socially underrepresented groups (1)\, identifying requirements to reporting hateful content platform-independently (2)\, and uncovering reservations\, particularly towards law enforcement (3). It further proposes high-level heuristics for youth-sensitive\, user-centered reporting technology (4) and highlights cross-sector implications for improving the services of reporting centers in Germany (5). \nBetreuer: Julian Bäumler\, M.A.\nPrüfer: Prof. Dr. Dr. Christian Reuter\, Prof. Dr. Julian Junk
URL:https://peasec.de/event/masterarbeit-im-studiengang-internationale-studien-friedens-und-konfliktforschung-isfk-von-helen-bader-towards-youth-sensitivity-and-restorative-justice-approaches-in-hate-speech-reporting-syste/
LOCATION:Zoom
CATEGORIES:Kolloquium
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=Europe/Berlin:20241203T084500
DTEND;TZID=Europe/Berlin:20241203T091500
DTSTAMP:20260430T182149
CREATED:20241014T213424Z
LAST-MODIFIED:20241014T213424Z
UID:19266-1733215500-1733217300@peasec.de
SUMMARY:Masterarbeit im Studiengang Data and Discourse Studies von Franziska Schneider: From Discord to Deception - Unravelling the Dynamics of Hate Speech and Disinformation in Information Warfare
DESCRIPTION:Abstract: Disinformation and hate speech are often highlighted as major challenges within social media landscapes. While these phenomena have been extensively studied individually\, their interconnection\, particularly within the context of information warfare strategies\, remains underexplored in empirical research. This thesis addresses this gap by providing a comprehensive analysis of how disinformation and hate speech converge to disrupt societies. Drawing on the framework of information warfare and psychological information operations\, the research examines how these discourses contribute to the construction of echo chambers\, intensifying societal polarisation through identity work. Methodologically\, the study utilises large-scale social media fact-checking datasets and applies pre-trained machine learning classifiers to detect hate speech. A statistical evaluation follows to explore the interaction between hate speech and disinformation. This computational approach overcomes the limitations of previous studies that relied on resource-intensive manual annotations of smaller datasets. The results aim to enhance our understanding of the bidirectional relationship between disinformation and hate speech\, contributing empirical insights that can inform the development of more effective counter-strategies against these destabilizing forces. \nBetreuer: Julian Bäumler\, M.A.\nPrüfer: Prof. Dr. Dr. Christian Reuter
URL:https://peasec.de/event/masterarbeit-im-studiengang-data-and-discourse-studies-von-franziska-schneider-from-discord-to-deception-unravelling-the-dynamics-of-hate-speech-and-disinformation-in-information-warfare/
LOCATION:Zoom
CATEGORIES:Kolloquium
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=Europe/Berlin:20241128T120000
DTEND;TZID=Europe/Berlin:20241128T123000
DTSTAMP:20260430T182149
CREATED:20241111T055212Z
LAST-MODIFIED:20241111T055212Z
UID:19589-1732795200-1732797000@peasec.de
SUMMARY:Masterarbeit im Studiengang Informatik von Nadja Bauer: Acceptance of AI-Based Hate Speech Moderation on Social Media: The Impact of Familiarity with AI Systems\, IT Knowledge\, and Social Media Use
DESCRIPTION:As the prevalence of hate speech on social media continues to rise\, there is an increasing rationale for the implementation of AI-based moderation systems. This study addresses the existing research gap in understanding how individual factors\, including user familiarity with AI\, IT proficiency\, and social media use influence attitudes towards AI-based hate speech moderation. Based on an extensive literature review\, the study develops three hypotheses: General familiarity with AI systems negatively correlates with acceptance of AI-based hate speech moderation (H1); higher levels of IT knowledge positively correlate with acceptance of AI-based hate speech moderation (H2); and a greater extent of social media use is positively associated with acceptance of AI-based moderation (H3). To explore these hypotheses\, an online survey on the use of AI to address hate speech on social media is conducted (N = 115)\, and the data is analyzed using a multiple linear regression model. The results show that familiarity with AI systems does not significantly influence acceptance\, while frequent social media use shows a slight\, non-significant positive trend toward acceptance. In contrast\, a notable negative correlation was found between IT knowledge and the acceptance of AI-based hate speech moderation. These findings provide both theoretical insights and practical implications for the use of AI-based content moderation systems on social media. \nBetreuer: Julian Bäumler\, M.A.\nPrüfer: Prof. Dr. Dr. Christian Reuter
URL:https://peasec.de/event/masterarbeit-im-studiengang-informatik-von-nadja-bauer-acceptance-of-ai-based-hate-speech-moderation-on-social-media-the-impact-of-familiarity-with-ai-systems-it-knowledge-and-social-media-use/
LOCATION:Zoom
CATEGORIES:Kolloquium
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=Europe/Berlin:20241111T091500
DTEND;TZID=Europe/Berlin:20241111T094500
DTSTAMP:20260430T182149
CREATED:20241025T152211Z
LAST-MODIFIED:20241025T152211Z
UID:19448-1731316500-1731318300@peasec.de
SUMMARY:Masterarbeit (M.Sc.) im Studiengang IT-Sicherheit von Kasimir Romer: Building a Data Processing Pipeline for Submarine Cable News - Leveraging Large Language Models for Advanced Analysis and Visualization
DESCRIPTION:Abstract: Submarine Data Cables (SDCs) are critical infrastructures that handle the majority of global network traffic. Despite their importance\, SDCs receive limited media coverage and public attention\, which creates significant gaps in understanding their vulnerabilities and significance. This thesis explores the potential of Large Language Models (LLMs) in extracting information about Submarine Data Cables from unstructured text\, such as news articles\, and investigates methods to improve this extraction process. An LLM-based information extraction module is developed and integrated into the Submarine Cable Dashboard to enhance its ability to process and analyze relevant news data. The performance of this LLM-based module is then compared to the existing rule-based approach. Additionally\, the thesis examines and compares different LLMs with respect to accuracy\, hallucination rate\, and processing speed to determine the most effective model for this specific task. Results show that the LLM-based approach outperforms the rule-based method in most cases\, particularly due to the strengths of LLMs in Natural Language Processing tasks. \n Betreuer: Jonas Franken \nPrüfer: Prof. Dr. Dr. Christian Reuter
URL:https://peasec.de/event/masterarbeit-m-sc-im-studiengang-it-sicherheit-von-kasimir-romer-building-a-data-processing-pipeline-for-submarine-cable-news-leveraging-large-language-models-for-advanced-analysis-and-visualiza/
LOCATION:Zoom
CATEGORIES:Kolloquium
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=Europe/Berlin:20241111T084500
DTEND;TZID=Europe/Berlin:20241111T091000
DTSTAMP:20260430T182149
CREATED:20241025T151937Z
LAST-MODIFIED:20241025T151937Z
UID:19446-1731314700-1731316200@peasec.de
SUMMARY:Masterarbeit (M.Sc.) im Studiengang IT-Sicherheit von Luca Roth:  Submarine Cable Landing Stations: An Analysis of Information Security Threats\, Vulnerabilities and Defences
DESCRIPTION:Abstract: Cable landing stations (CLS) are facilities that host components required for the operation of subsea data cables (SDC) and facilitate their interconnection with terrestrial networks. SDC have an essential role for the secure operation of internet communication. However\, as existing work focusing on information security specifically for CLS is sparsely available and often outdated\, there is a need for new coordinated efforts in order to evaluate and improve their protection. This thesis fills a research gap in this regard\, by presenting how CLS and SDC can generally be impacted by different information security threats and how the industry is prepared to counter them. For this\, attack vectors\, threat actors as well as the protection level of CLS are identified and set in relation to each other. The analysis shows that multiple actors have the motivation and resources to harm information security of CLS. In regard of their protection standards\, a great variation is noticeable. Especially considering physical protection\, some facilities have significant weaknesses. Furthermore\, the analysis shows that information security highly depends on the selection of the architecture as well as other aspects of physical and logical CLS components. \nBetreuer: Jonas Franken\nPrüfer: Prof. Dr. Dr. Christian Reuter
URL:https://peasec.de/event/masterarbeit-m-sc-im-studiengang-it-sicherheit-von-luca-roth-submarine-cable-landing-stations-an-analysis-of-information-security-threats-vulnerabilities-and-defences/
CATEGORIES:Kolloquium
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=Europe/Berlin:20241104T090000
DTEND;TZID=Europe/Berlin:20241104T092500
DTSTAMP:20260430T182149
CREATED:20241104T003857Z
LAST-MODIFIED:20241104T003857Z
UID:19496-1730710800-1730712300@peasec.de
SUMMARY:Bachelorarbeit (B.Sc.) im Studiengang Informatik von Kleanthis Moschopoulos:
DESCRIPTION:Abstract: Warning systems have changed rapidly over the last centuries\, from local personal warnings to radio to TV news up to other governmental channels such as modern warning apps. Still\, a rather untouched area in this regard is the role of smart-homes. With their ever increasing prevalance\, they are getting more and more integrated in our daily lives and are therefore worth considering to bring into the discussion of safety warnings. This thesis discusses the usability of smart-home systems\, more specifically smart-home speakers\, as a method for population warning in cases of regional and national emergencies. To this end\, a pre-existing implementation of the NINA warning app via an Amazon Alexa Skill is looked at and its problems are outlined by looking at its user reviews. Afterwards an own implementation that rectifies some of the showcased problems is being discussed\, key features being the inability for location selection and language inconsistency. While the implementation works to a satisfying degree and offers the basic necessary functionability\, it still shows some issues that warrant further development. To be fully usable\, future improvements in regards of functionality are necessary as well as user studies to implement direct user feedback. Finally the thesis outlines some of the potential of smart speakers in the area of user warnings\, depending on current limitations and future outlooks. \nBetreuer: Markus Henkel\nPrüfer: Prof. Dr. Dr. Christian Reuter
URL:https://peasec.de/event/bachelorarbeit-b-sc-im-studiengang-informatik-von-kleanthis-moschopoulos/
LOCATION:Zoom
CATEGORIES:Kolloquium
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=Europe/Berlin:20241009T090000
DTEND;TZID=Europe/Berlin:20241009T092500
DTSTAMP:20260430T182149
CREATED:20241001T174713Z
LAST-MODIFIED:20241001T174737Z
UID:19109-1728464400-1728465900@peasec.de
SUMMARY:Masterarbeit im Studiengang Wirtschaftsinformatik von Alexander Able: The public core of the internet – A literature review of the concept’s journey and its references to physical infrastructure
DESCRIPTION:Abstract: Das Konzept des Public Core of the Internet hat sich seit der initialen Veröffentlichung 2014 stetig verbreitet und ist ein viel diskutierter Teil der Internet Governance geworden. Internationale Anerkennung hat das Konzept durch die Aufnahme in die GCSC-Normen sowie den Paris Call for Trust and Security in Cyberspace erfahren. Die bisherigen Normen befassen sich jedoch kaum mit der physischen Infrastruktur des Public Core of the Internet. Deshalb untersucht diese Studienarbeit im Rahmen einer Literaturstudie inwiefern die physische Infrastruktur des Public Core of the Internet in wissenschaftlichen und politischen Veröffentlichungen inkludiert wurde. Die wissenschaftlichen Veröffentlichungen wurden mittels einer Forward-Search zu „The public core of the internet“ ermittelt. Diese wurden durch eine systematische Literaturrecherche der politischen Veröffentlichungen ergänzt\, um ein vollständiges Bild der Entwicklung des Public Core of the Internet zu erhalten. Die Ergebnisse zeigen\, dass lediglich auf europäischer Ebene Maßnahmen zum Schutz der physischen Infrastruktur des Public Core of the Internet getroffen werden. Auf internationaler Ebene mangelt es an einer Einigung bezüglich einer klaren Definition der physischen Infrastruktur\, weshalb bisher keine weiteren Normen beschlossen wurden. \nBetreuer: Jonas Franken \nPrüfer: Prof. Dr. Dr. Christian Reuter
URL:https://peasec.de/event/masterarbeit-im-studiengang-wirtschaftsinformatik-von-alexander-able-the-public-core-of-the-internet-a-literature-review-of-the-concepts-journey-and-its-references-to-physical-infr/
LOCATION:Zoom
CATEGORIES:Kolloquium
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=Europe/Berlin:20240923T093000
DTEND;TZID=Europe/Berlin:20240923T100000
DTSTAMP:20260430T182149
CREATED:20240814T084040Z
LAST-MODIFIED:20240814T084040Z
UID:18601-1727083800-1727085600@peasec.de
SUMMARY:Bachelorarbeit Isha Grouven: Investigating App Camouflage As A Strategy To Counter Digital Surveillance For Activists
DESCRIPTION:This thesis addresses the feature of “app camouflage\,” which is an approach to mitigate digital surveillance and censorship\, particularly in contexts where individuals may be at risk of violence or other harm. The growing number of individuals with internet access and digital device ownership has resulted in an increase in device inspections\, or “phone checks\,” as a method of enforcing censorship. This amplifies the need to enhance security measures to protect sensitive data. This research investigates the effectiveness of “app camouflage” in which an application’s true functionality is disguised by an innocuous front\, like a calculator application. By examining similar concepts\, such as the Umbrella app’s “Enable Mask” feature\, the potential benefits and limitations of such approaches are assessed.  \n  \nFurthermore\, this thesis examines the potential risks and limitations of app camouflage\, particularly in the context of advanced inspection technologies. A prototype implementation for Android devices is proposed. In conclusion\, while app camouflage provides an additional layer of security\, especially in situations where the user is not in control of their device\, it is not a foolproof solution. Lastly\, this research offers insights into potential improvements to app camouflaging\, to further protect activists\, victims of domestic violence\, and other vulnerable users from censorship\, surveillance\, and violence. \nBetreuerin: Laura Guntrum\, MA\nPrüfer: Prof. Dr. Dr. Christian Reuter
URL:https://peasec.de/event/bachelorarbeit-isha-grouven-investigating-app-camouflage-as-a-strategy-to-counter-digital-surveillance-for-activists/
LOCATION:Zoom
CATEGORIES:Kolloquium
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=Europe/Berlin:20240923T090000
DTEND;TZID=Europe/Berlin:20240923T093000
DTSTAMP:20260430T182149
CREATED:20240814T083903Z
LAST-MODIFIED:20240906T122642Z
UID:18597-1727082000-1727083800@peasec.de
SUMMARY:Bachelorarbeit Tom Schuster: Crisis Notifications and Recommendations in Telegram for Activists in conflict-affected Contexts
DESCRIPTION:Mobile crisis notification systems\, including apps such as NINA\, have been shown around the world to be successful in alerting the public to disasters. Activists in certain countries such as Afghanistan\, especially since the Taliban takeover\, face unique threats such as phone searches at random checkpoints. On the basis of a threat model for Afghanistan\, I propose that the use of a mobile app-based notification system could effectively warn activists in such countries. Messenger apps are one of the primary communication tools used by activists. One of the most widely used open-source messenger apps in conflict-affected regions is Telegram. For this thesis\, I develop and compare three different approaches for adding an alert system to Telegram. Two similar approaches are based on a Telegram bot that can send notifications to users in a private chat or channel. The last approach is a modified version of Telegram for Android with a new notification system. The channel and the new notification system can quickly send notifications to many users. The main disadvantage of using a bot is the inability to use encryption compared to the modified application. On the other hand\, it doesn’t require any installation. Finally\, I analyze the digital security advice that is targeted at activists and that could be provided along with the notifications. In addition to general digital security advice\, the recommendations for activists heavily feature tips to improve security against physically present adversaries\, such as hiding specific apps or using a burner phone.The thesis concludes that it is possible to provide fast private crisis notifications and recommendations. \n  \nBetreuerin: Laura Guntrum\, MA \nPrüfer: Prof. Dr. Dr. Christian Reuter
URL:https://peasec.de/event/bachelorarbeit-tom-schuste-crisis-notifications-and-recommendations-in-telegram-for-activists-in-conflict-affected-contexts/
LOCATION:Zoom
CATEGORIES:Kolloquium
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=Europe/Berlin:20240916T113000
DTEND;TZID=Europe/Berlin:20240916T115500
DTSTAMP:20260430T182149
CREATED:20240826T104058Z
LAST-MODIFIED:20240916T070555Z
UID:18689-1726486200-1726487700@peasec.de
SUMMARY:Masterarbeit Max Hampel: Evaluating the Importance of Profile Descriptions for the Sentiment Analysis of Tweets in Protest Movements
DESCRIPTION:Abstract: Plenty of research has been done to analyze and classify the sentiment (i.e.\, the positive\, neutral or negative stance) of social media posts during crises\, conflicts\, and protests using machine learning techniques. However\, fewer works have examined the impact of the user profile description on the outcome of sentiment analysis for different post types\, including tweets\, quotes and replies. Using the case of the occupation and evacuation of Lützerath\, this thesis presents the collection and annotation of a respective Twitter/X data set\, the model creation for sentiment analysis based on post content and user profile descriptions\, as well as its evaluation using traditional machine learning methods (e.g.\, Random Forest\, SVM) and more recent language models (e.g.\, DistillBERT\, RoBERTa). Since the thesis is still a work in progress\, evaluation findings and implications will be disclosed in the presentation announced in this mail. \n  \nBetreuer: Dr. Marc-André Kaufhold \nPrüfer: Prof. Dr. Dr. Christian Reuter
URL:https://peasec.de/event/masterarbeit-max-hampel-evaluating-the-importance-of-profile-descriptions-for-the-sentiment-analysis-of-tweets-in-protest-movements/
LOCATION:Zoom
CATEGORIES:Kolloquium
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=Europe/Berlin:20240822T084500
DTEND;TZID=Europe/Berlin:20240822T091500
DTSTAMP:20260430T182149
CREATED:20240807T114112Z
LAST-MODIFIED:20240807T114112Z
UID:18532-1724316300-1724318100@peasec.de
SUMMARY:Bachelorarbeit Lisa Heidenreich: Influence of implicit gender cues on perception of virtual agents and interaction – an experimental study in Germany
DESCRIPTION:Given the growing integration of AI into daily life\, understanding how gender perceptions influence interactions with (seemingly) artificial intelligent interaction partners is crucial to prevent stereotypes from being reproduced through this interaction. This paper explores the role of implicit gender cues in user perception and satisfaction when interacting with virtual agents. Varying levels of agency in the agents thereby serve as the implicit gender cue. Data analysis from 93 participants indicate no clear gender-based divergence in preferences over all participants\, but a preference for low-level agency agents from older male participants. High communion emerged as a significant positive predictor of satisfaction across all conditions\, whereas low communion had a detrimental effect. These results underscore the critical role of gender considerations in AI design\, suggesting that AI systems should be developed with an awareness of these preferences to enhance user satisfaction and promote gender equality. The study calls for a thoughtful and ethical approach to AI development\, ensuring that technology serves diverse user needs without perpetuating stereotypes. \n  \nBetreuerin: Anja-Liisa Gonsior\, M.A. \nPrüfer: Prof. Dr. Dr. Christian Reuter
URL:https://peasec.de/event/bachelorarbeit-lisa-heidenreich-influence-of-implicit-gender-cues-on-perception-of-virtual-agents-and-interaction-an-experimental-study-in-germany/
LOCATION:Zoom
CATEGORIES:Kolloquium
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=Europe/Berlin:20240808T090000
DTEND;TZID=Europe/Berlin:20240808T093000
DTSTAMP:20260430T182149
CREATED:20240707T234043Z
LAST-MODIFIED:20240708T010745Z
UID:18415-1723107600-1723109400@peasec.de
SUMMARY:Bacheloarbeit Heorhii Topalov: The Role of Social Media in the Context of Russian-Ukrainian War
DESCRIPTION:In the contemporary era\, ICTs have become an indispensable component of warfare. Their capacity to disseminate information rapidly and on a vast scale renders them an indispensable tool in the modern battlefield. In order to gain insight into the utilisation of social media in the context of the Russian-Ukrainian war during the period of 2022\, it is imperative to examine the activities of Ukrainian groups such as the North Atlantic Fella Organization (NAFO) and InformNapalm. Given the rapid pace of ICTs development\, the databases of related literature are becoming increasingly out of date and require updating with contemporary patterns. A number of strategies were identified during the research\, including information warfare\, propaganda\, mobilisation\, activism\, and crowdfunding. Through the qualitative content analysis of selected cases and systematic literature review were presented examples of leveraging of social media to influence public opinion\, mobilise resources\, and document events in real-time. The study identifies the purposes of NAFO and InformNapalm\, including the debunking of misinformation\, fact-checking and intelligence\, fundraising campaigns\, trolling and memetic warfare\, and the dissemination of information to a broader audience. It analyses their influence on the warfare in Ukraine in 2022. \n  \nBetreuerin: Laura Guntrum\, MA \nPrüfer: Prof. Dr. Dr. Christian Reuter
URL:https://peasec.de/event/bacheloarbeit-heorhii-topalov-the-role-of-social-media-in-the-context-of-russian-ukrainian-war/
LOCATION:Zoom
CATEGORIES:Kolloquium
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=Europe/Berlin:20240701T090000
DTEND;TZID=Europe/Berlin:20240701T093000
DTSTAMP:20260430T182149
CREATED:20240611T161003Z
LAST-MODIFIED:20240611T161143Z
UID:18193-1719824400-1719826200@peasec.de
SUMMARY:Masterarbeit Nevin Hochsam López: The Link between Privacy and Misinformation – A Systematic Literature Review
DESCRIPTION:Abstract: In today’s digital world\, privacy invasions and the proliferation of misinformation have become ubiquitous issues. Numerous incidents have demonstrated their far-reaching effects on our digital lives and society at large. These challenges raise a critical question: Is there a link between privacy and misinformation? Insights on this connection may aid the development of mitigation strategies addressing both concerns. This thesis seeks to provide answers. For this purpose\, we conducted a systematic literature review (N=123) to gain an in-depth understanding how current research contextualizes privacy and misinformation. Our analysis shows that the interplay of privacy and misinformation spans across various topics (e.g. social media\, artificial intelligence\, encryption\, COVID-19\, laws and regulations) with varying characteristics depending on the context. Based on our findings\, we identified several multifaceted links\, such as: efforts to protect privacy and curb misinformation conflict in certain scenarios. Conversely\, misinformation can\, in some instances\, help to protect privacy. Additionally\, our results suggest that Big Tech companies may profit from both privacy invasions and misinformation. This thesis concludes by proposing approaches for future research\, aiming to address privacy and misinformation concerns simultaneously and thereby\, potentially contributing to a more secure digital environment in the future. \nBetreuer: Tom Biselli \nPrüfer: Prof. Dr. Dr. Christian Reuter
URL:https://peasec.de/event/masterarbeit-nevin-hochsam-lopez-the-link-between-privacy-and-misinformation-a-systematic-literature-review/
LOCATION:Zoom
CATEGORIES:Kolloquium
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=Europe/Berlin:20240621T113000
DTEND;TZID=Europe/Berlin:20240621T120000
DTSTAMP:20260430T182149
CREATED:20240611T093501Z
LAST-MODIFIED:20240611T093501Z
UID:18190-1718969400-1718971200@peasec.de
SUMMARY:Masterarbeit Laura Buhleier: Privacy Visualizations: Aiding User Comprehension of Privacy Policies
DESCRIPTION:Abstract: Privacy policies are widely regarded as being practically unreadable for laypersons and being seemingly written by lawyers for lawyers rather than with the end user in mind. Their length and complexity deter users contradicting their purpose of informing of the given privacy rights and restrictions. Therefore methods to enhance the usability of privacy policies are necessary. Visualizations represent such a method to facilitate quick apprehension of complex legal formulations. \nExisting approaches include privacy icons as well as labels and indicators. However so far no definitive solution has been established in practice. Therefore this work sets out on discovering which forms of visualization can effectively support the usability of privacy policies. To directly involve users in the design process a participatory design approach is chosen. \nThe participatory study is carried out in workshops\, which aim to construct first designs on usable privacy policies\, and open interviews to receive further feedback on the developed designs. It is found that a combination of the different visualization approaches of icons and labels was preferred by users. These findings are then implemented into a finalized design and recommendations\, intended as a guideline for designers as well as lawmakers. \n  \nBetreuer: Kilian Demuth \nPrüfer: Prof. Dr. Dr. Christian Reuter
URL:https://peasec.de/event/masterarbeit-laura-buhleier-privacy-visualizations-aiding-user-comprehension-of-privacy-policies/
LOCATION:Zoom
CATEGORIES:Kolloquium
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=Europe/Berlin:20240606T110000
DTEND;TZID=Europe/Berlin:20240606T112500
DTSTAMP:20260430T182149
CREATED:20240429T084158Z
LAST-MODIFIED:20240521T114223Z
UID:17589-1717671600-1717673100@peasec.de
SUMMARY:Bachelorarbeit Martin Lexa: Design und Implementierung eines plattformübergreifenden Dashboards zur Analyse von Hate Speech in Meldestellen
DESCRIPTION:Abstract: An der Schnittstelle zwischen Betroffenen und Meldenden einerseits sowie Ermittlungs- und Strafverfolgungsbehörden andererseits sind Meldestellen wie „Hessen gegen Hetze“ oder „Respect! Gegen Hetze im Netz“ mit einem zunehmenden Aufkommen an Hassrede über eine Vielzahl unterschiedlicher und öffentlicher Medien konfrontiert. Im Hinblick auf die oft begrenzten Personalressourcen in Meldestellen erscheint es vielversprechend\, technische Automatisierungs- und Unterstützungspotenziale für die Erfassung\, Priorisierung und Behandlung der gemeldeten Fälle zu erforschen. Die vorliegende Bachelorarbeit untersucht daher Nutzungsanforderungen und Designprinzipien für ein plattformübergreifendes Dashboard zur Analyse von Hassrede durch Meldestellen. Basierend auf einer Literaturrecherche und einer empirischen Anforderungsanalyse stellt diese Design-Science-Arbeit die Konzeption eines Systems zur Erhöhung des Situationsbewusstseins von Meldestellen vor\, welches Kennzahlen (z.B. Anzahl und Priorität der Fälle)\, erweiterte Statistiken (z.B. Visualisierung nach gruppenbezogenen Merkmalen\, Straftatbestand und zuständiger Behörde) sowie Detailinformationen (z.B. Plattform und Screenshots des Hassredevorfalls) zu den eingegangen Reports als Grundlage für eine verbesserte Fallbehandlung darstellt. \n  \nBetreuer: Dr. Marc-André Kaufhold \nPrüfer: Prof. Dr. Dr. Christian Reuter \n  \nOrt: in Präsenz in Darmstadt \nGebäude S2|20\, 1. Etage\, Seminarraum 117
URL:https://peasec.de/event/bachelorarbeit-martin-lexa-design-und-implementierung-eines-plattformuebergreifenden-dashboards-zur-analyse-von-hate-speech-in-meldestellen/
CATEGORIES:Kolloquium
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=Europe/Berlin:20240513T090000
DTEND;TZID=Europe/Berlin:20240513T092500
DTSTAMP:20260430T182149
CREATED:20240423T132317Z
LAST-MODIFIED:20240507T071525Z
UID:17526-1715590800-1715592300@peasec.de
SUMMARY:Masterarbeit Nicolai Koukal: Design and Evaluation of a Security Advisory Content Retrieval and Extraction System to Enhance Cyber Situational Awareness
DESCRIPTION:Abstract: Computer emergency response teams (CERTs) of the public sector provide advisory\, preventive\, and reactive cybersecurity services for authorities\, citizens\, and enterprises. However\, their tasks of monitoring\, analysing\, and communicating threats to establish cyber situational awareness are getting more complex due to the increasing information volume and varying information quality disseminated through public channels. Besides the time-consuming data collection for incident handling and daily reporting\, CERTs are often confronted with irrelevant\, redundant\, or incredible information\, exacerbating the time-critical prevention of and response to cyber threats. Based on a literature review and empirical requirements analysis\, this thesis presents the design and evaluation of a security advisory content retrieval and extraction system\, which facilitates the multi-source gathering and analysis of security advisories by means of (1) CSAF and (2) RSS feeds as well as (3) HTML extraction. The thesis concludes with a discussion of design science research contributions and implications. \n  \nBetreuer: Dr. Marc-André Kaufhold \nPrüfer: Prof. Dr. Dr. Christian Reuter
URL:https://peasec.de/event/masterarbeit-nicolai-koukal-security-advisory-content-retrieval-and-extraction-system/
LOCATION:Zoom
CATEGORIES:Kolloquium
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=Europe/Berlin:20240430T090000
DTEND;TZID=Europe/Berlin:20240430T092500
DTSTAMP:20260430T182149
CREATED:20240429T083436Z
LAST-MODIFIED:20240429T091216Z
UID:17584-1714467600-1714469100@peasec.de
SUMMARY:Masterarbeit Kolja Renkel: A Silent Conquest of the Backbone? Factors of the Growing Submarine Data Cable Ownership by Content Providers
DESCRIPTION:Abstract: The submarine data cable (SDC) infrastructure is the backbone of the Internet and transports the majority of data exchanges worldwide. The ownership structure of those cables has been changing for several years due to new stakeholders and investors. Large content providers like Google\, Amazon\, Microsoft\, and Meta started investing in their own SDC infrastructure. As this directly impacts the internet backbone\, it might positively or negatively affect this critical infrastructure’s overall security\, stability\, and availability. For better understanding\, I will examine the key factors that are important to content providers when planning to build an SDC connecting a particular country. I approached this by creating hypotheses with factors grouped into four categories: socio-economic\, political\, technological\, and geographical. Using multiple regression analysis\, I examined the various key factors and their relevance. The results show that countries with a high gross domestic product (GDP) and high internet usage but with more general political tensions and less technological progress\, compared to the First World\, are of great interest to content providers planning SDCs. Based on the results\, the different implications of the ownership change in the SDC critical infrastructure are discussed. The findings suggest that the internet backbone is growing and gaining stability. However\, as the named content providers are U.S.-based companies\, it is likely that the U.S. dominance over the SDC infrastructure will further increase. Additionally\, there is a chance that this could result in a market centralization around Google\, Amazon\, Microsoft\, and Meta\, as their bandwidth usage is already over 50\% of the worldwide traffic. Content providers must be aware of their responsibilities and comply with regulations such as the NIS2 to further guarantee the security\, availability\, and fairness of usage. \nBetreuer*in: Jonas Franken\, M.A. \nPrüfer: Prof. Dr. Dr. Christian Reuter
URL:https://peasec.de/event/masterarbeit-kolja-renkel-a-silent-conquest-of-the-backbone-factors-of-the-growing-submarine-data-cable-ownership-by-content-providers/
LOCATION:Zoom
CATEGORIES:Kolloquium
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=Europe/Berlin:20240411T084500
DTEND;TZID=Europe/Berlin:20240411T091500
DTSTAMP:20260430T182149
CREATED:20240409T035737Z
LAST-MODIFIED:20240409T035737Z
UID:17459-1712825100-1712826900@peasec.de
SUMMARY:Masterarbeit im Studiengang IT-Sicherheit von Niklas Herz: Document Analysis of EU Reports on the Development of Cybersecurity Technologies
DESCRIPTION:Abstract: In today’s digital landscape\, cybersecurity threats have become imminent dangers affecting individuals\, businesses and nations alike. Current developments in international politics\, such as the war on Ukraine or the Israel-Hamas war\, show how cyber attacks can be used in conjunction with military actions. Possessing robust cybersecurity capabilities is essential for maintaining national security and safeguarding against evolving cyber threats. As major cybersecurity actors\, transnational alliances such as the European Union play a significant role in this field. While EU cybersecurity policies such as NIS-2 or the Cyber Resilience Act have gained considerable research attention\, there is a deficiency in studies focusing on specific technology developments within the realm of cybersecurity. In order to address this\, the aim of this thesis is to explore and analyze the current technology developments that are funded or developed by the European Union in the area of cybersecurity. To accomplish this\, I employ a three-staged methodology. First\, I analyze the current threat landscape the EU faces to determine what technologies are needed. This step includes a systematic literature review and a thematic analysis. Furthermore\, I delve deeper into reports\, documents and research papers that focus on cybersecurity technology developments and gain insights on the technical details. This yields an analysis of the specific advancements through a systematic review and qualitative content analysis. Finally\, I correlate discovered threats and technologies and assess\, whether these technologies tackle the threats that result from the analysis and to which extent they can mitigate them. This approach provides a detailed examination of the current state of technologies in the EU and allows me to put them into context within the cybersecurity threat landscape. \n  \nBetreuer*in: Anja-Liisa Gonsior\, M.A. \nPrüfer: Prof. Dr. Dr. Christian Reuter
URL:https://peasec.de/event/masterarbeit-im-studiengang-it-sicherheit-von-niklas-herz-document-analysis-of-eu-reports-on-the-development-of-cybersecurity-technologies/
LOCATION:Zoom
CATEGORIES:Kolloquium
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=Europe/Berlin:20240228T110000
DTEND;TZID=Europe/Berlin:20240228T112500
DTSTAMP:20260430T182149
CREATED:20240210T113050Z
LAST-MODIFIED:20240912T072308Z
UID:17133-1709118000-1709119500@peasec.de
SUMMARY:Bachelorarbeit im Studiengang Informatik von Louis Pouliot: Chartchecker: A User-Centered Investigation of Chart Annotation and Misinformation Detection Software
DESCRIPTION:  \nBetreuer*in: Tom Biselli \nPrüfer: Prof. Dr. Dr. Christian Reuter
URL:https://peasec.de/event/bachelorarbeit-im-studiengang-informatik-von-louis-pouliot-chartchecker-a-user-centered-investigation-of-chart-annotation-and-misinformation-detection-software/
LOCATION:Zoom
CATEGORIES:Kolloquium
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=Europe/Berlin:20240214T100000
DTEND;TZID=Europe/Berlin:20240214T102500
DTSTAMP:20260430T182149
CREATED:20240115T150148Z
LAST-MODIFIED:20240210T110551Z
UID:16923-1707904800-1707906300@peasec.de
SUMMARY:Masterarbeit im Studiengang IT-Sicherheit von Ken Vogt: Third Party Data Access Manager for Transparent Interventions for Cookie Consent Forms
DESCRIPTION:Abstract: Navigating cookie consent forms and other types of cookie management mechanisms has become a recurring experience for users. Since the GDPR came into effect\, website operators have to obtain informed consent before placing non-essential cookies. But this is not always adhered to: Users are frequently manipulated via dark patterns or hiding of crucial information\, thus making an informed privacy choice impossible. \nWhile many automated tools for cookie management exist\, they often lack transparency\, cause breakage of websites or enforce the user’s privacy settings differently. This thesis proposes Cookie Lens\, a Firefox browser extension to present cookie information of websites in a clear and unbiased manner. Cookie Lens analyzes the cookie consent forms of popular websites and visualizes the data in a table format. This enables users to obtain transparent cookie information without manipulation or the necessity to navigate convoluted sub menus. \nCookie Lens is tested via a qualitative user study with participants giving feedback on functionality and user interface. The study finds that this form of visualization enabled users to gain transparency on which of their personal data is processed\, who it is being sent to and what exactly consenting to cookies on a website entails. \nBetreuer*in: Kilian Demuth\, M.Sc.\nPrüfer: Prof. Dr. Dr. Christian Reuter
URL:https://peasec.de/event/masterarbeit-im-studiengang-it-sicherheit-von-ken-vogt-third-party-data-access-manager-for-transparent-interventions-for-cookie-consent-forms/
LOCATION:Zoom
CATEGORIES:Kolloquium
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=Europe/Berlin:20240110T090000
DTEND;TZID=Europe/Berlin:20240110T092500
DTSTAMP:20260430T182149
CREATED:20240108T151320Z
LAST-MODIFIED:20240108T151320Z
UID:16853-1704877200-1704878700@peasec.de
SUMMARY:Bachelorarbeit im Studiengang Informatik von Eduard Repp: TudTok: ein Ansatz zur Schulung des Umgangs mit Desinformationen in Sozialen Medien unter Berücksichtigung bekannter bild- und videobasierter Indikatoren.
DESCRIPTION:Abstract: In einer Zeit\, in der soziale Medien eine dominante Rolle in der Verbreitung von Informationen spielen\, stellen Desinformationen auf mehreren Ebenen eine ernsthafte Herausforderung dar. Die Publikation von Unwahrheiten beschränkt sich dabei nicht auf das geschriebene Wort oder manipulierte Bilder. Auch Videoclips können durch moderne Technik verändert\, Sachverhalte in ein bestimmtes Licht gerückt und Inhalte gänzlich neu gestaltet werden. \nDie rasante Streuung dieser Informationen durch Akteure\, die gezielt oder unwissentlich Desinformationen verbreiten\, kann politische\, gesellschaftliche und persönliche Konsequenzen mit sich bringen. Social Media Plattformen wie Instagram\, Facebook und TikTok brachten durch eine hohe Nutzerbasis und eine regelrechte Informationsflut neue Herausforderungen. \nAus diesem Grund gibt es bereits zahlreiche Bestrebungen\, Desinformationen zu erkennen und herauszufiltern. Neben technischen Tools\, die anhand bestimmter Merkmale Informationen beurteilen\, stellt die gezielte Schulung der eigenen Kenntnisse eine der zentralen Maßnahmen zum Schutz vor Falschinformationen dar. Verschiedenen Institutionen haben dafür Charakteristika und Anhaltspunkte herausgefiltert und klassifiziert und sie zu Indikatoren zusammengefasst. Mithilfe dieser Indikatoren können nicht nur technische Tools gespeist\, sondern auch die Kenntnisse von Einzelpersonen gezielt erweitert werden. \nAusgehend von den Ergebnissen bisheriger Forschungen steht im Rahmen dieser Arbeit die Auseinandersetzung mit dem Spannungsfeld von Medienkompetenz und Desinformationen im Vordergrund. Das Zentrum der Untersuchung bildet die Kurzvideoplattform TikTok\, die bei der Verbreitung von Desinformationen mittlerweile eine entscheidende Rolle einnimmt. Aufbauend auf den Erkenntnissen der bisherigen Forschung\, dient ein praktischer Teil dazu\, die gesammelten Informationen zu bündeln\, aufzubereiten und zugänglich zu machen. Dafür wurde eine fiktive\, an TikTok angelehnte Plattform entwickelt\, durch die Wissen über relevante und auf Videoclips zugeschnittene Indikatoren im Bezug auf die populäre Social Media Plattform vermittelt und erworbene Kenntnisse evaluiert werden können. Dies dient dazu einen Ansatz zur Erhöhung der Medienkompetenz von Nutzern zu\, liefern und damit einen Beitrag für die Bekämpfung der Verbreitung von Desinformationen zu leisten. \n  \nBetreuer*in: Katrin Hartwig\, M.Sc. \nPrüfer: Prof. Dr. Dr. Christian Reuter
URL:https://peasec.de/event/bachelorarbeit-im-studiengang-informatik-von-eduard-repp-tudtok-ein-ansatz-zur-schulung-des-umgangs-mit-desinformationen-in-sozialen-medien-unter-beruecksichtigung-bekannter-bild-und-videobasierter/
LOCATION:Zoom
CATEGORIES:Kolloquium
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=Europe/Berlin:20240108T090000
DTEND;TZID=Europe/Berlin:20240108T092500
DTSTAMP:20260430T182149
CREATED:20231227T082512Z
LAST-MODIFIED:20231227T082512Z
UID:16795-1704704400-1704705900@peasec.de
SUMMARY:Bachelorarbeit im Studiengang Informatik von Yelyzaveta Vereshchak: Nutzerrezensionen und Kernfunktionen von Bevölkerungsschutz-Apps „Povitriana Tryvoha“\, „yeTryvoha“\, und „yePPO“ im Kontext der russischen Invasion 2022
DESCRIPTION:Abstract: Die russische Invasion gegen die Ukraine begann am 24. Februar 2022. Zum Schutz der Bevölkerung der Ukraine wurden verschiedene Methoden eingesetzt. Mit der Entwicklung moderner Technologien sind viele zusätzliche Möglichkeiten entstanden\, der Bevölkerung in Krisensituationen zu helfen. So wurden seit Beginn des Krieges Bevölkerungsschutz-Apps wie „Povitriana Tryvoha“\, „yeTryvoha“ und „yePPO“ entwickelt.\nDas Ziel dieser Bachelorarbeit ist es\, herauszufinden\, wie diese Apps von der Zivilgesellschaft anhand der Rezensionen der Nutzer:innen wahrgenommen werden. Dafür werden die Rezensionen im App Store und Google Play mit Hilfe von Bibliotheken in Python geparst. Anschließend werden sie mit Hilfe von LDA-Modellen und Sentimentanalyse kategorisiert und analysiert. Neben der Auswertung der Nutzerrezensionen wird manuell überprüft\, welche der wichtigsten Kernfunktionen der Bevölkerungsschutz-Apps in diesen bereits vorhanden sind und welche nicht. Als Ergebnis dieser Analyse werden für jede App die Kernfunktionalitäten und die wichtigsten Themen der Rezensionen dieser Apps identifiziert. \nBetreuer*in: Enno Steinbrink\, M.Sc.\nPrüfer: Prof. Dr. Dr. Christian Reuter
URL:https://peasec.de/event/bachelorarbeit-im-studiengang-informatik-von-yelyzaveta-vereshchak-nutzerrezensionen-und-kernfunktionen-von-bevoelkerungsschutz-apps-povitriana-tryvoha-yetryvoha/
LOCATION:Zoom
CATEGORIES:Kolloquium
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=Europe/Berlin:20231211T090000
DTEND;TZID=Europe/Berlin:20231211T092500
DTSTAMP:20260430T182149
CREATED:20231205T114705Z
LAST-MODIFIED:20231205T114705Z
UID:16696-1702285200-1702286700@peasec.de
SUMMARY:Bachelorarbeit Informatik von Hiba Al-Najmi: The Impact Of Automation Levels On Trust And Acceptance Of Smart Home Warning Systems
DESCRIPTION:Abstract: In this study\, we address the under-explored dimension of human interaction with smart home warning systems during crisis scenarios\, with focus on the identification of the optimal automation level. An experimental study was conducted with a sample of 51 participants in a controlled laboratory environment\, which emulated smart home warning systems. Each participant engaged with one of three distinct levels of automation and encountered four distinct warnings with varying levels of danger. Subsequently\, participants made decisions and potentially took actions in response to the warnings displayed by the system and the suggested protocols proposed by the system. These decisions encompassed choices to permit the system to proceed with execution\, to halt or even revert the process\, or to manually execute or refrain from executing the suggested actions. For instance\, this could involve actions such as closing doors and windows in response to a gas leak incident originating from a nearby factory. Data were gathered via surveys and subsequently analyzed using ANOVA to discern significant differences in responses across the automation levels. The study revealed that the System Usability Scale (SUS) scores were consistently high across different levels of automation\, indicating a uniformly high ease of use regardless of automation degree. Additionally\, it was found that users responded significantly differently to critical versus non-critical smart home warnings\, demonstrating the system’s effectiveness in appropriately categorizing and conveying the urgency of notifications. \n  \nBetreuer*in: Steffen Haesler\, M.Sc. \nPrüfer: Prof. Dr. Dr. Christian Reuter
URL:https://peasec.de/event/bachelorarbeit-najmi/
LOCATION:Zoom
CATEGORIES:Kolloquium
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=Europe/Berlin:20231122T113000
DTEND;TZID=Europe/Berlin:20231122T123000
DTSTAMP:20260430T182149
CREATED:20230926T063614Z
LAST-MODIFIED:20230926T063721Z
UID:16308-1700652600-1700656200@peasec.de
SUMMARY:PromovierDA - Promovieren an der TU Darmstadt
DESCRIPTION:Informationsveranstaltung zur Promotion an der TU Darmstadt.\nInsbesondere Vorstellung fachspezifischer Informationen durch Prof. Dr. Dr. Reuter. \nZur Anmeldung:\nhttps://www.tu-darmstadt.de/forschen/wissenschaftlicher_nachwuchs_tu/promotionsinteressierte_tu/promovierda.de.jsp
URL:https://peasec.de/event/promovierda-promovieren-an-der-tu-darmstadt/
CATEGORIES:Kolloquium
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=Europe/Berlin:20231121T084500
DTEND;TZID=Europe/Berlin:20231121T091000
DTSTAMP:20260430T182149
CREATED:20231115T124943Z
LAST-MODIFIED:20231115T124943Z
UID:16618-1700556300-1700557800@peasec.de
SUMMARY:Masterarbeit im Studiengang Internationale Studien/Friedens- und Konfliktforschung von Lennart Söhngen: Scrollen Richtung Hass: eine Analyse der Eigenschaften extremistischer Inhalte auf TikTok
DESCRIPTION:Abstract: Extremistische Einstellungen sind in der Bevölkerung zuletzt stark angestiegen. Sozialen Medien wird dabei eine elementare Bedeutung für die Verbreitung entsprechender Inhalte zugeschrieben. Ein Dienst\, der diesbezüglich mehr und mehr in den Fokus rückt\, ist das Videoportal TikTok. Innerhalb weniger Jahre hat sich TikTok zu einer der weltweit bedeutendsten Social-Media-Plattformen entwickelt\, die besonders bei jungen Menschen sehr beliebt ist. Die meiste Zeit verbringen die Nutzer*innen im sogenannten Für-Dich-Feed\, einem endlosen Stream aus Videos\, der\, basierend auf den Interessen der Nutzer*innen von einem Empfehlungsalgorithmus zusammengestellt wird. Durch eine ethnographische Vorgehensweise sollte herausgefunden werden\, wie dieser Empfehlungsalgorithmus zur Verbreitung extremistischer Inhalte auf TikTok beiträgt. Dafür wurden über mehrere Tage Videos im Für-Dich-Feed angesehen und mit dort auftretenden extremistischen Inhalten nach vorher festgelegten Kriterien interagiert. Die dadurch identifizierten Inhalte wurden zudem einer quantitativ-qualitativen Inhaltsanalyse unterzogen\, um etwas über ihre Beschaffenheit zu lernen. Die Interaktionen mit extremistischen Inhalten führten innerhalb kürzester Zeit dazu\, dass der Für-Dich-Feed mehrheitlich aus entsprechenden Videos bestand. Zudem wurde deutlich\, dass extremistische Akteur*innen auf TikTok für die Verbreitung ihrer Inhalte vor allem auf die Verwendung von Codes und Humor setzen. \n  \nBetreuer*in: Stefka Schmid\, M.A. \nPrüfer: Prof. Dr. Dr. Christian Reuter
URL:https://peasec.de/event/masterarbeit-im-studiengang-internationale-studien-friedens-und-konfliktforschung-von-lennart-soehngen-scrollen-richtung-hass-eine-analyse-der-eigenschaften-extremistischer-inhalte-auf-tiktok/
LOCATION:Zoom
CATEGORIES:Kolloquium
END:VEVENT
END:VCALENDAR