Kolloquium
Bachelorarbeit im Studiengang Informatik von Eduard Repp: TudTok: ein Ansatz zur Schulung des Umgangs mit Desinformationen in Sozialen Medien unter Berücksichtigung bekannter bild- und videobasierter Indikatoren.
ZoomAbstract: In einer Zeit, in der soziale Medien eine dominante Rolle in der Verbreitung von Informationen spielen, stellen Desinformationen auf mehreren Ebenen eine ernsthafte Herausforderung dar. Die Publikation von Unwahrheiten beschränkt sich dabei nicht auf das geschriebene Wort oder manipulierte Bilder.
Masterarbeit im Studiengang IT-Sicherheit von Ken Vogt: Third Party Data Access Manager for Transparent Interventions for Cookie Consent Forms
ZoomAbstract: Navigating cookie consent forms and other types of cookie management mechanisms has become a recurring experience for users. Since the GDPR came into effect, website operators have to obtain informed consent before placing non-essential cookies. But this is not always adhered to:
Bachelorarbeit im Studiengang Informatik von Louis Pouliot: Chartchecker: A User-Centered Investigation of Chart Annotation and Misinformation Detection Software
ZoomAbstract: The ever increasing usage of social media as a news source allows for opinionated and deceptive content to be spread much more rapidly. An especially problematic aspect of this is the existence of misleading data visualizations. These graphs may,
Masterarbeit im Studiengang IT-Sicherheit von Niklas Herz: Document Analysis of EU Reports on the Development of Cybersecurity Technologies
ZoomAbstract: In today's digital landscape, cybersecurity threats have become imminent dangers affecting individuals, businesses and nations alike. Current developments in international politics, such as the war on Ukraine or the Israel-Hamas war, show how cyber attacks can be used in
Masterarbeit Kolja Renkel: A Silent Conquest of the Backbone? Factors of the Growing Submarine Data Cable Ownership by Content Providers
ZoomAbstract: The submarine data cable (SDC) infrastructure is the backbone of the Internet and transports the majority of data exchanges worldwide. The ownership structure of those cables has been changing for several years due to new stakeholders and investors. Large
Masterarbeit Nicolai Koukal: Design and Evaluation of a Security Advisory Content Retrieval and Extraction System to Enhance Cyber Situational Awareness
ZoomAbstract: Computer emergency response teams (CERTs) of the public sector provide advisory, preventive, and reactive cybersecurity services for authorities, citizens, and enterprises. However, their tasks of monitoring, analysing, and communicating threats to establish cyber situational awareness are getting more complex
Bachelorarbeit Martin Lexa: Design und Implementierung eines plattformübergreifenden Dashboards zur Analyse von Hate Speech in Meldestellen
Abstract: An der Schnittstelle zwischen Betroffenen und Meldenden einerseits sowie Ermittlungs- und Strafverfolgungsbehörden andererseits sind Meldestellen wie „Hessen gegen Hetze“ oder „Respect! Gegen Hetze im Netz“ mit einem zunehmenden Aufkommen an Hassrede über eine Vielzahl unterschiedlicher und öffentlicher Medien konfrontiert.
Masterarbeit Laura Buhleier: Privacy Visualizations: Aiding User Comprehension of Privacy Policies
ZoomAbstract: Privacy policies are widely regarded as being practically unreadable for laypersons and being seemingly written by lawyers for lawyers rather than with the end user in mind. Their length and complexity deter users contradicting their purpose of informing of the given
Masterarbeit Nevin Hochsam López: The Link between Privacy and Misinformation – A Systematic Literature Review
ZoomAbstract: In today's digital world, privacy invasions and the proliferation of misinformation have become ubiquitous issues. Numerous incidents have demonstrated their far-reaching effects on our digital lives and society at large. These challenges raise a critical question: Is there a link
Bacheloarbeit Heorhii Topalov: The Role of Social Media in the Context of Russian-Ukrainian War
ZoomIn the contemporary era, ICTs have become an indispensable component of warfare. Their capacity to disseminate information rapidly and on a vast scale renders them an indispensable tool in the modern battlefield. In order to gain insight into the utilisation