BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//PEASEC - Science and Technology for Peace and Security | Technical University of Darmstadt - ECPv6.15.18//NONSGML v1.0//EN
CALSCALE:GREGORIAN
METHOD:PUBLISH
X-WR-CALNAME:PEASEC - Science and Technology for Peace and Security | Technical University of Darmstadt
X-ORIGINAL-URL:https://peasec.de
X-WR-CALDESC:Events for PEASEC - Science and Technology for Peace and Security | Technical University of Darmstadt
REFRESH-INTERVAL;VALUE=DURATION:PT1H
X-Robots-Tag:noindex
X-PUBLISHED-TTL:PT1H
BEGIN:VTIMEZONE
TZID:Europe/Berlin
BEGIN:DAYLIGHT
TZOFFSETFROM:+0100
TZOFFSETTO:+0200
TZNAME:CEST
DTSTART:20220327T010000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:+0200
TZOFFSETTO:+0100
TZNAME:CET
DTSTART:20221030T010000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:+0100
TZOFFSETTO:+0200
TZNAME:CEST
DTSTART:20230326T010000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:+0200
TZOFFSETTO:+0100
TZNAME:CET
DTSTART:20231029T010000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:+0100
TZOFFSETTO:+0200
TZNAME:CEST
DTSTART:20240331T010000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:+0200
TZOFFSETTO:+0100
TZNAME:CET
DTSTART:20241027T010000
END:STANDARD
END:VTIMEZONE
BEGIN:VEVENT
DTSTART;TZID=Europe/Berlin:20231211T090000
DTEND;TZID=Europe/Berlin:20231211T092500
DTSTAMP:20260404T141428
CREATED:20231205T114705Z
LAST-MODIFIED:20231205T114705Z
UID:16696-1702285200-1702286700@peasec.de
SUMMARY:Bachelorarbeit Informatik von Hiba Al-Najmi: The Impact Of Automation Levels On Trust And Acceptance Of Smart Home Warning Systems
DESCRIPTION:Abstract: In this study\, we address the under-explored dimension of human interaction with smart home warning systems during crisis scenarios\, with focus on the identification of the optimal automation level. An experimental study was conducted with a sample of 51 participants in a controlled laboratory environment\, which emulated smart home warning systems. Each participant engaged with one of three distinct levels of automation and encountered four distinct warnings with varying levels of danger. Subsequently\, participants made decisions and potentially took actions in response to the warnings displayed by the system and the suggested protocols proposed by the system. These decisions encompassed choices to permit the system to proceed with execution\, to halt or even revert the process\, or to manually execute or refrain from executing the suggested actions. For instance\, this could involve actions such as closing doors and windows in response to a gas leak incident originating from a nearby factory. Data were gathered via surveys and subsequently analyzed using ANOVA to discern significant differences in responses across the automation levels. The study revealed that the System Usability Scale (SUS) scores were consistently high across different levels of automation\, indicating a uniformly high ease of use regardless of automation degree. Additionally\, it was found that users responded significantly differently to critical versus non-critical smart home warnings\, demonstrating the system’s effectiveness in appropriately categorizing and conveying the urgency of notifications. \n  \nBetreuer*in: Steffen Haesler\, M.Sc. \nPrüfer: Prof. Dr. Dr. Christian Reuter
URL:https://peasec.de/event/bachelorarbeit-najmi/
LOCATION:Zoom
CATEGORIES:Kolloquium
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=Europe/Berlin:20231206T161500
DTEND;TZID=Europe/Berlin:20231206T175500
DTSTAMP:20260404T141428
CREATED:20230925T055916Z
LAST-MODIFIED:20231128T114350Z
UID:16091-1701879300-1701885300@peasec.de
SUMMARY:Sichere Kritische Infrastruktur: Resilienz – eine in Deutschland unbekannte Erscheinung? (Albrecht Broemme\, Präsident THW 2006-2009) – NUR IN ZOOM!
DESCRIPTION:
URL:https://peasec.de/event/sichere-kritische-infrastruktur-resilienz-eine-in-deutschland-unbekannte-erscheinung-albrecht-broemme-praesident-thw-2006-2009/
LOCATION:Raum S103/123 (Altes Hauptgebäude\, Hochschulstraße 1\, 64289 Darmstadt) und in ZOOM
CATEGORIES:Ringvorlesung Sichere Kritische Infrastrukturen
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=Europe/Berlin:20231206T140000
DTEND;TZID=Europe/Berlin:20231206T164500
DTSTAMP:20260404T141428
CREATED:20230626T151119Z
LAST-MODIFIED:20230919T091316Z
UID:15548-1701871200-1701881100@peasec.de
SUMMARY:Disputation Franz Kuntke: "Resilient Smart Farming: Crisis-Capable Information and Communication Technologies for Agriculture"
DESCRIPTION:Abstract:\nAs in many sectors\, agriculture is experiencing a continuous digitalization\, i.e. an increase in data-driven technologies used. In contrast to companies of other critical infrastructures – e.g. energy or telecommunication – a typical farm is comparatively small and often run as a family business. Accordingly\, the demands on farming technology\, its implementation\, and regulations are different in many terms. Also\, the circumstances that influence crisis risks and crisis management are different in agriculture – and as digitalization introduces new potential risks\, this process should be critically reviewed. But research in the area of farming equipment mostly concentrates on positive aspects of modern technologies. The current state-of-the-art approaches for agriculture are often referred under terms smart farming and agriculture 4.0\, that incorporates more precise cultivation with less (manual) effort. But such new agriculture technology developments usually lack an assessment about its impact on the sector’s resilience and dependencies on other infrastructures. The research domain of disaster and risk sciences mostly concentrates on other topics\, apart from agriculture\, and the resilience research in agriculture itself is currently intensifying\, but focusing more on problems resulting from climate and social change. For this reasons it remains unclear\, how digitalization impacts resilience of the food production and food safety. Therefore\, it is not well researched which technological developments may lead to undesired effects in the future. And how modern systems should be designed to allow for both\, positive impacts on efficiency\, and prevention of negative effects in terms of reduced resilience capacities\, is also not answered by literature yet. Aim of the present work is to close this research gap in the interplay between agriculture\, digitalization and resilience.\nTo answer the question to what extent current technologies used by farmers are at risk of failure\, the dissertation first presents a snapshot of the resilience state of agricultural companies and their used technologies. This involves interviews with stakeholders\, mainly farmers\, as well as surveying security issues of the LoRaWAN protocol\, a transmission technology especially useful for agricultural Internet of Things. Which desires of farmers regarding software focusing on aspects of business continuity and secured operations exist\, is another open question\, that is also answered with empirical methods\, mainly focus groups and usability tests. Then the rise of Internet of Things in agriculture raises another question\, whether such technologies acquired for smart farming could also have benefits for resilience against internet-connection-lost situations. This question is answered by empirical evaluation of LoRaWAN range characteristics in agricultural landscapes\, as well as artifact generation for resilient communication channels on top of LoRaWAN transmission devices.\nSeveral findings are derived from the conducted research: There is a lack in understanding how strong the used tools in agriculture are dependent on Information and Communications Technology\, and many tools does require a working internet connection. Additionally\, information technology used by agricultural companies has security issues\, as in other domains\, which must be considered at best in the design phase of technology by system engineers\, but should be at the latest a decision criteria when users choose a new technology. Based on these findings\, developments and evaluations of new software approaches are presented: Derived design criteria and own system designs\, that allow for modern data-driven business operations\, including Internet of Things integration based on LoRaWAN. The developed solutions show an increase of resilience capacities by enhancing the communication possibilities in crisis situations. The thesis points out\, how the state of resilience in agriculture of developed countries is today\, and what to expect from current generation technology. Additionally\, it builds new concepts and software artifacts as an example\, how disaster-capable features can be integrated into information management systems for a more crisis-proof future of farm operations. \nMi. 6. Dezember 2023\, 14:00-15:45 Uhr im CYSEC-Gebäude\n(Gebäudenummer: S2/20; Anschrift: Pankratiusstr. 2\, Darmstadt\, Raum: 9). \n\n14:00h: öffentlicher Vortrag von 30min\n14:30h: Wissenschaftliches Gespräch von 60min\n15:30h: Interne Kommissionssitzung und Ergebnisverkündung\nab 15:45h: Empfang
URL:https://peasec.de/event/disputation-franz-kuntke-resilient-smart-farming-crisis-capable-information-and-communication-technologies-for-agriculture/
CATEGORIES:Disputation
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=Europe/Berlin:20231129T161500
DTEND;TZID=Europe/Berlin:20231129T175500
DTSTAMP:20260404T141429
CREATED:20230925T055603Z
LAST-MODIFIED:20231001T165553Z
UID:16089-1701274500-1701280500@peasec.de
SUMMARY:Sichere Kritische Infrastruktur: Einblicke in das Krisenmanagement eines Mobilfunkbetreibers (Oliver Harzheim\, Vodafone)
DESCRIPTION:
URL:https://peasec.de/event/kritis-23-harzheim/
LOCATION:Raum S103/123 (Altes Hauptgebäude\, Hochschulstraße 1\, 64289 Darmstadt) und in ZOOM
CATEGORIES:Ringvorlesung Sichere Kritische Infrastrukturen
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=Europe/Berlin:20231122T161500
DTEND;TZID=Europe/Berlin:20231122T175500
DTSTAMP:20260404T141429
CREATED:20230925T055311Z
LAST-MODIFIED:20230925T060933Z
UID:16086-1700669700-1700675700@peasec.de
SUMMARY:Sichere Kritische Infrastruktur: Vortrag von Kristian Schmidt\, HEAG
DESCRIPTION:
URL:https://peasec.de/event/kritis-23-schmidt/
LOCATION:Raum S103/123 (Altes Hauptgebäude\, Hochschulstraße 1\, 64289 Darmstadt) und in ZOOM
CATEGORIES:Ringvorlesung Sichere Kritische Infrastrukturen
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=Europe/Berlin:20231122T140000
DTEND;TZID=Europe/Berlin:20231122T150000
DTSTAMP:20260404T141429
CREATED:20231110T233738Z
LAST-MODIFIED:20231110T233738Z
UID:16607-1700661600-1700665200@peasec.de
SUMMARY:IFSH-Forschungskolloquium: Vortrag von Stefka Schmid „Trust in Artificial Intelligence: Producing Ontological Security through Governmental Visions“
DESCRIPTION:
URL:https://peasec.de/event/ifsh-forschungskolloquium-vortrag-von-stefka-schmid-trust-in-artificial-intelligence-producing-ontological-security-through-governmental-visions/
LOCATION:virtuell\, Institut für Friedensforschung und Sicherheitspolitik (IFSH)\, Hamburg
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=Europe/Berlin:20231122T113000
DTEND;TZID=Europe/Berlin:20231122T123000
DTSTAMP:20260404T141429
CREATED:20230926T063614Z
LAST-MODIFIED:20230926T063721Z
UID:16308-1700652600-1700656200@peasec.de
SUMMARY:PromovierDA - Promovieren an der TU Darmstadt
DESCRIPTION:Informationsveranstaltung zur Promotion an der TU Darmstadt.\nInsbesondere Vorstellung fachspezifischer Informationen durch Prof. Dr. Dr. Reuter. \nZur Anmeldung:\nhttps://www.tu-darmstadt.de/forschen/wissenschaftlicher_nachwuchs_tu/promotionsinteressierte_tu/promovierda.de.jsp
URL:https://peasec.de/event/promovierda-promovieren-an-der-tu-darmstadt/
CATEGORIES:Kolloquium
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=Europe/Berlin:20231121T084500
DTEND;TZID=Europe/Berlin:20231121T091000
DTSTAMP:20260404T141429
CREATED:20231115T124943Z
LAST-MODIFIED:20231115T124943Z
UID:16618-1700556300-1700557800@peasec.de
SUMMARY:Masterarbeit im Studiengang Internationale Studien/Friedens- und Konfliktforschung von Lennart Söhngen: Scrollen Richtung Hass: eine Analyse der Eigenschaften extremistischer Inhalte auf TikTok
DESCRIPTION:Abstract: Extremistische Einstellungen sind in der Bevölkerung zuletzt stark angestiegen. Sozialen Medien wird dabei eine elementare Bedeutung für die Verbreitung entsprechender Inhalte zugeschrieben. Ein Dienst\, der diesbezüglich mehr und mehr in den Fokus rückt\, ist das Videoportal TikTok. Innerhalb weniger Jahre hat sich TikTok zu einer der weltweit bedeutendsten Social-Media-Plattformen entwickelt\, die besonders bei jungen Menschen sehr beliebt ist. Die meiste Zeit verbringen die Nutzer*innen im sogenannten Für-Dich-Feed\, einem endlosen Stream aus Videos\, der\, basierend auf den Interessen der Nutzer*innen von einem Empfehlungsalgorithmus zusammengestellt wird. Durch eine ethnographische Vorgehensweise sollte herausgefunden werden\, wie dieser Empfehlungsalgorithmus zur Verbreitung extremistischer Inhalte auf TikTok beiträgt. Dafür wurden über mehrere Tage Videos im Für-Dich-Feed angesehen und mit dort auftretenden extremistischen Inhalten nach vorher festgelegten Kriterien interagiert. Die dadurch identifizierten Inhalte wurden zudem einer quantitativ-qualitativen Inhaltsanalyse unterzogen\, um etwas über ihre Beschaffenheit zu lernen. Die Interaktionen mit extremistischen Inhalten führten innerhalb kürzester Zeit dazu\, dass der Für-Dich-Feed mehrheitlich aus entsprechenden Videos bestand. Zudem wurde deutlich\, dass extremistische Akteur*innen auf TikTok für die Verbreitung ihrer Inhalte vor allem auf die Verwendung von Codes und Humor setzen. \n  \nBetreuer*in: Stefka Schmid\, M.A. \nPrüfer: Prof. Dr. Dr. Christian Reuter
URL:https://peasec.de/event/masterarbeit-im-studiengang-internationale-studien-friedens-und-konfliktforschung-von-lennart-soehngen-scrollen-richtung-hass-eine-analyse-der-eigenschaften-extremistischer-inhalte-auf-tiktok/
LOCATION:Zoom
CATEGORIES:Kolloquium
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=Europe/Berlin:20231120T090000
DTEND;TZID=Europe/Berlin:20231120T092500
DTSTAMP:20260404T141429
CREATED:20231115T124806Z
LAST-MODIFIED:20231115T124806Z
UID:16616-1700470800-1700472300@peasec.de
SUMMARY:Bachelorarbeit im Studiengang Informatik von Nils Neuhäusel: Cognitive and Psychological Perceptions in Drone Operations: Understanding User Needs and Experiences in Military Environments
DESCRIPTION:Abstract: This thesis analyses the requirements and experiences of RPA operators in military contexts and highlights specific challenges and needs of working in this environment. The main research question seeks to improve the design and development of RPA systems by gaining a deeper understanding of the real-world circumstances and difficulties faced by operators. The work is based on a comprehensive literature review and an explorative analysis of individual perspectives gained from interviews\, articles\, reports\, biographies and documentary films. The focus lies on military drone operators of fixed-wing drones. The thesis’s findings demonstrate how important it is to incorporate user requirements and experiences into drone system designs in order to improve these technologies’ effectiveness and acceptance. It also emphasizes how important it is to think about the ethical and social implications of drone operations. The work broadens the conversation on the role of humans in increasingly automated and remote-controlled aircraft systems and offers insightful information that can be used to create training programs and improve user interface design. The article concludes with the recommendation that\, in order to overcome the challenges associated with RPA operations\, a strong cooperation between developers\, psychologists and operators is essential. \n  \nBetreuerin: Anja-Liisa Gonsior \nPrüfer: Prof. Dr. Dr. Christian Reuter
URL:https://peasec.de/event/bachelorarbeit-im-studiengang-informatik-von-nils-neuhaeusel-cognitive-and-psychological-perceptions-in-drone-operations-understanding-user-needs-and-experiences-in-military-environments/
LOCATION:Zoom
CATEGORIES:Kolloquium
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=Europe/Berlin:20231117T113000
DTEND;TZID=Europe/Berlin:20231117T131500
DTSTAMP:20260404T141429
CREATED:20230626T151839Z
LAST-MODIFIED:20230703T072705Z
UID:15552-1700220600-1700226900@peasec.de
SUMMARY:Disputation Jasmin Haunschild: "Enhancing Citizens’ Role in Public Safety and Security: Interaction\, Perception and Design of Mobile Crisis Apps"
DESCRIPTION:Abstract:\nThe experience of the Corona virus pandemic and the war in Ukraine have emphasized the possibility of the occurrence even of low-probability safety and security hazards and the importance of crisis preparedness. Increasingly\, warning app are offered as a mobile component of crisis alert systems. These apps offer multi-media content\, reliable agency information and two-way communication. They thus promise users to maintain situational awareness in case of a crisis. In addition\, some apps offer preventive and response advice\, as well as features for citizens to organise themselves.\nHowever\, low usage numbers across all European countries indicate that such apps are either not well-known or not well-received\, but explanations for this are missing. Studies focusing on warning app users’ expectations in a state-centric risk culture are so far rare and preparedness features are hardly investigated. Therefore\, studies investigating the user perspective on warning apps\, particularly their utility\, are important. In addition\, exploring and adding further functions could increase the utility of such apps. In particular\, warning apps could focus more on increasing crisis preparedness\, especially because citizens in a state-centric risk culture such as in Germany do not take responsibility for individual preparedness. The aim of this dissertation is thus to investigate mobile crisis apps’ potential for enhancing citizens’ role in public safety and security. This will be done by investigating use and perception of such apps\, as well as design interventions that increase citizens’ contributions to public safety and security. To do this\, firstly\, representative and qualitative surveys are conducted\, exploring the user perspective on warning apps\, identifying trends and changes over time and comparing their usefulness to other sources. By investigating the COVID-19 pandemic and changes in risk cultures following severe crises since 2020\, the studies analyse the impact of crisis experience on personal crisis responsibility and trust in emergency management through a comparative survey. Secondly\, to enhance crisis preparedness\, different versions of preparedness features are developed and evaluated in an experiment.\nThe results show that citizens believe that warning apps are useful\, and those who used a warning app in a crisis report it to be one of the most helpful sources of information. In line with the theory of risk culture\, the apps are preferred to social media in crises  in Germany. Warning app adoption increased over time in Germany\, while feature and design preferences remained largely stable. Analyses of the impacts of particular crises show that the lack of concise and reliable agency information about regulations put in place to manage the COVID-19 pandemic outbreak left an informational gap\, that was filled only slowly by warning apps. With regard to involving citizens in crisis response through crisis preparedness\, the results show that a persuasively designed preparedness feature can increase the taking of preparedness measures. In addition\, extending warning apps by preparedness features can increase warning app utility\, particularly for those users who perceive the information as relevant and informative. \nFreitag\, 17. November 2023\, 11:30-13:15 Uhr im CYSEC-Gebäude\n(Gebäudenummer: S2/20; Anschrift: Pankratiusstr. 2\, Darmstadt\, Raum: 9) \n\n11:30h öffentlicher Vortrag von 30min\n12:00h Wissenschaftliches Gespräch von 60min\n13:00h Interne Kommissionssitzung und Ergebnisverkündung\nab 13:15h Empfang
URL:https://peasec.de/event/disputation-jasmin-haunschild-enhancing-citizens-role-in-public-safety-and-security-interaction-perception-and-design-of-mobile-crisis-apps/
CATEGORIES:Disputation
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=Europe/Berlin:20231115T161500
DTEND;TZID=Europe/Berlin:20231115T175500
DTSTAMP:20260404T141429
CREATED:20230925T054828Z
LAST-MODIFIED:20231110T190945Z
UID:16082-1700064900-1700070900@peasec.de
SUMMARY:Sichere Kritische Infrastruktur: Die Rollen des BBKs und der Bundesakademie für Bevölkerungsschutz und Zivile Verteidigung (BABZ) im Laufe der Zeit (Stefan Voßschmidt\, BBK) ACHTUNG NUR IN ZOOM
DESCRIPTION:
URL:https://peasec.de/event/sichere-kritische-infrastruktur-die-rollen-des-bbks-und-der-bundesakademie-fuer-bevoelkerungsschutz-und-zivile-verteidigung-babz-im-laufe-der-zeit-stefan-vossschmidt-bbk/
LOCATION:Zoom
CATEGORIES:Ringvorlesung Sichere Kritische Infrastrukturen
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=Europe/Berlin:20231114T090000
DTEND;TZID=Europe/Berlin:20231114T104500
DTSTAMP:20260404T141429
CREATED:20231110T233700Z
LAST-MODIFIED:20231110T233700Z
UID:16604-1699952400-1699958700@peasec.de
SUMMARY:Offene Jahrestagung der DVPW-Themengruppe Kritische Sicherheitsstudien: Vortrag von Stefka Schmid „Socio-technical Security: Collective Human-Computer Interactions in a Networked World“
DESCRIPTION:
URL:https://peasec.de/event/offene-jahrestagung-der-dvpw-themengruppe-kritische-sicherheitsstudien-vortrag-von-stefka-schmid-socio-technical-security-collective-human-computer-interactions-in-a-networked-world/
LOCATION:Schloss Hohentübingen\, Tübingen
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=Europe/Berlin:20231108T161500
DTEND;TZID=Europe/Berlin:20231108T175500
DTSTAMP:20260404T141429
CREATED:20230925T054617Z
LAST-MODIFIED:20230925T065603Z
UID:16080-1699460100-1699466100@peasec.de
SUMMARY:Sichere Kritische Infrastruktur: Grundbegriffe: Resilienz (Prof. Dr.-Ing. Matthias Hollick)
DESCRIPTION:
URL:https://peasec.de/event/kritis-23-hollick/
LOCATION:Raum S103/123 (Altes Hauptgebäude\, Hochschulstraße 1\, 64289 Darmstadt) und in ZOOM
CATEGORIES:Ringvorlesung Sichere Kritische Infrastrukturen
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=Europe/Berlin:20231108T093000
DTEND;TZID=Europe/Berlin:20231108T095500
DTSTAMP:20260404T141429
CREATED:20231027T131723Z
LAST-MODIFIED:20231027T131723Z
UID:16520-1699435800-1699437300@peasec.de
SUMMARY:Masterarbeit im Studiengang M.Sc. Visual Computing von Alexander Jäger:  Interaktives Visualisierungstool des politischen Spektrums zur Erweiterung und Verbesserung von Voting Advice Applications am Beispiel des Wahl-O-Mats.
DESCRIPTION:Abstract: Voting Advice Applications (VAAs) wie der deutsche Wahl-O-Mat haben sich seit der Jahrtausendwende zu einem populären Tool der politischen Bildung entwickelt\, die im Vorfeld von Wahlen von Millionen Nutzer*innen in Demokratien weltweit verwendet werden und somit einen nicht zu unterschätzenden Einfluss auf Elektionsergebnisse haben. Im Rahmen dieser Arbeit wurde ein neues Design für VAAs ausgearbeitet und implementiert\, damit diese langfristig intuitiver\, informativer und transparenter für die Nutzer*innen werden können. Der erste Teil des Designs umfasst eine neuartige\, hierarchische Visualisierungsform für hochdimensionale VAAs\, die die Thesen in thematische Gruppen unterteilt und es den Nutzerinnen somit erleichtert\, die Übereinstimmungswerte bezüglich ihrer Zusammensetzung aufzuschlüsseln. Der zweite Teil des Designs präsentiert eine Umsetzung des participation by design-Ansatzes\, der den Nutzer*innen vielfältige Individualisierungs- und Interaktionsmöglichkeiten anbietet\, um die Anwendung an die eigenen Vorstellungen und Wünsche anpassen zu können. Dabei erhalten Nutzerinnen u.a. die Möglichkeit zwischen hoch- und niedrigdimensionalen Ergebnissen als auch zwischen den angewendeten Metriken und Matching-Methoden zu wählen. Im Rahmen einer Nutzerstudie wurde das implementierte Konzept in Bezug auf Verständlichkeit\, Nützlichkeit und Attraktivität ausgewertet\, um festzustellen\, ob auf Seiten der Nutzerschaft eine Nachfrage für solche VAAs existiert. Es konnte festgehalten werden\, dass das präsentierte Design nicht ausreichend Hilfestellungen zum Verständnis der angebotenen Individualisierungsmöglichkeiten anbietet\, weshalb es in Bezug auf die Verständlichkeit sehr niedrig bewertet wurde. Bedingt durch Limitationen bzgl. der Implementierung und Evaluation konnten die aufgestellten Hypothesen nicht abschließend beantwortet werden. \nBetreuerin: Laura Guntrum \nPrüfer: Prof. Dr. Dr. Christian Reuter
URL:https://peasec.de/event/masterarbeit-jaeger/
CATEGORIES:Kolloquium
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=Europe/Berlin:20231108T090000
DTEND;TZID=Europe/Berlin:20231108T092500
DTSTAMP:20260404T141429
CREATED:20231027T131524Z
LAST-MODIFIED:20231027T131524Z
UID:16517-1699434000-1699435500@peasec.de
SUMMARY:Masterarbeit im Studiengang IT-Sicherheit von Martin Ronai: Making PGP Usable - Development of a Concept and Implementation of a Usable PGP Email Client
DESCRIPTION:Abstract: This thesis presents a comprehensive literature review of existing PGP solutions. Existing PGP applications have usability shortcomings\, and a lack of user understanding makes consistent and correct usage a challenge. Since only a small percentage of email traffic is encrypted\, it remains necessary to implement privacy-enhancing measures. This is especially important as many users may not possess extensive knowledge of encryption methods. Our main goal is to design and implement a PGP email client in compliance with modern frameworks and methods of usable security. A crucial part of this paper is a conducted evaluation of the client\, in which users perform pre-defined tasks\, in particular the exchange of PGP-encrypted mails. As a result\, even users unfamiliar with PGP were able to exchange encrypted mail\, albeit at a higher time cost. While this client does not offer all of the features that PGP implements\, our focus is on ease of use and practicality. Our results make a contribution to the further development of secure and user-friendly email communication solutions. \n  \nBetreuer*in: Kilian Demuth \nPrüfer: Prof. Dr. Dr. Christian Reuter
URL:https://peasec.de/event/masterarbeit-im-studiengang-it-sicherheit-von-martin-ronai-making-pgp-usable-development-of-a-concept-and-implementation-of-a-usable-pgp-email-client/
CATEGORIES:Kolloquium
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=Europe/Berlin:20231101T161500
DTEND;TZID=Europe/Berlin:20231101T175500
DTSTAMP:20260404T141429
CREATED:20230924T100839Z
LAST-MODIFIED:20230925T060423Z
UID:16066-1698855300-1698861300@peasec.de
SUMMARY:Sichere Kritische Infrastruktur: Grundbegriffe: Kritikalität\, Vulnerabilität\, Preparedness\, System of Systems (Prof. Dr. Jens Ivo Engels)
DESCRIPTION:
URL:https://peasec.de/event/kritis-23-engels-2/
LOCATION:Raum S103/123 (Altes Hauptgebäude\, Hochschulstraße 1\, 64289 Darmstadt) und in ZOOM
CATEGORIES:Ringvorlesung Sichere Kritische Infrastrukturen
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=Europe/Berlin:20231025T161500
DTEND;TZID=Europe/Berlin:20231025T175500
DTSTAMP:20260404T141429
CREATED:20230924T094628Z
LAST-MODIFIED:20231021T162434Z
UID:16060-1698250500-1698256500@peasec.de
SUMMARY:Sichere Kritische Infrastruktur: Kickoff sowie Einführung in Sichere Kritische Infrastrukturen (Prof. Dr. Dr. Christian Reuter)
DESCRIPTION:
URL:https://peasec.de/event/kritis_23_reuter/
LOCATION:Raum S103/123 (Altes Hauptgebäude\, Hochschulstraße 1\, 64289 Darmstadt) und in ZOOM
CATEGORIES:Ringvorlesung Sichere Kritische Infrastrukturen
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=Europe/Berlin:20231023T090000
DTEND;TZID=Europe/Berlin:20231023T092500
DTSTAMP:20260404T141429
CREATED:20230925T085844Z
LAST-MODIFIED:20230925T090028Z
UID:16124-1698051600-1698053100@peasec.de
SUMMARY:Bachelorarbeit im Studiengang Informatik von Luca Liontos: Analyse\, Neukonzeption\, Reimplementierung und Erweiterung der Durchsetzung der Nutzungsbedingungen eines Multi-Plattform Social-Media-Crawlers
DESCRIPTION:Abstract: Das Open Data Observatory (ODS) ist ein System zur Erhebung und Analyse von Postings aus verschiedenen Social-Media Plattformen zur Verwendung in der Forschung. Die Plattform erlaubt es Nutzenden Suchanfragen zu formulieren und an verschiedene Social-Media Seiten zu verteilen. Die erhobenen Daten können mittels Natural Language Processing (NLP) und Klassifizierung verarbeitet und visualisiert werden. Das bestehende ODS weist verschiedene Mängel hinsichtlich der Wart- und Erweiterbarkeit auf. Hinzu kommt\, dass das alte System um keinerlei Funktionen zum Umsetzten der Nutzungsbedingungen (TOS) der verschiedenen eingebundenen Social-Media-Plattformen verfügt. Das nur sehr schlecht erweiterbare System müsste um viele Funktionalitäten ergänzt werden\, um dieses TOS-konform zu gestalten. Im Rahmen dieser Arbeit wurde das ODS neu konzipiert und implementiert. Hierfür wurde das Altsystem auf verschiedene Qualitätsmerkmale analysiert. Aufbauend auf den Erkenntnissen\, die am Altsystem gewonnen wurden\, wurde unter mehreren infrage kommenden Architekturen eine Plug-In-Architektur gewählt und auf dieser ein Konzept für das Neusystem erstellt. Das neu implementierte System wurde auf dieselben Metriken und Qualitätsmerkmale wie das Altsystem getestet\, um die Verbesserung der Erweiterbarkeit nachvollziehen zu können. Des Weiteren wurden die TOS verschiedener Plattformen auf Gemeinsamkeiten überprüft\, um anschließend ein TOS-Konzept für das neue ODS konzipieren und implementieren zu können. \nBetreuer*in: Markus Bayer\nPrüfer: Prof. Dr. Dr. Christian Reuter
URL:https://peasec.de/event/bachelorarbeit-im-studiengang-informatik-von-luca-liontos-analyse-neukonzeption-reimplementierung-und-erweiterung-der-durchsetzung-der-nutzungsbedingungen-eines-multi-plattform-social-media-crawler/
CATEGORIES:Kolloquium
END:VEVENT
BEGIN:VEVENT
DTSTART;VALUE=DATE:20231005
DTEND;VALUE=DATE:20231007
DTSTAMP:20260404T141429
CREATED:20230616T091945Z
LAST-MODIFIED:20230616T091945Z
UID:15526-1696464000-1696636799@peasec.de
SUMMARY:IpB Tagung "Social Movement and Conflict Research in Dialogue: Interdisciplinary Perspectives on Violence & Mobilisation”
DESCRIPTION:Panel\, mitorganisiert von PEASEC “Between clicktivism\,\ndigital surveillance\, and social media logic”. \nWebsite:\nhttps://protestinstitut.eu/veranstaltungen_uberblick/jahrestagung-2023/
URL:https://peasec.de/event/ipb-tagung-social-movement-and-conflict-research-in-dialogue-interdisciplinary-perspectives-on-violence-mobilisation/
LOCATION:FU Berlin
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=Europe/Berlin:20230925T100000
DTEND;TZID=Europe/Berlin:20230925T103000
DTSTAMP:20260404T141429
CREATED:20230828T060540Z
LAST-MODIFIED:20230911T061242Z
UID:15864-1695636000-1695637800@peasec.de
SUMMARY:Masterarbeit im Studiengang Cognitive Science von Felix Schmitt: How Information Sovereignty Combines the Concepts of Privacy and Misinformation and How It Could Guide Future Research
DESCRIPTION:Datum: Montag\, 25.09.2023 \nVortrag (15min) um 09:55; Diskussion (10min) bis 10:20 \n  \nMasterarbeit im Studiengang Cognitive Science von Felix Schmitt: \nHow Information Sovereignty Combines the Concepts of Privacy and Misinformation and How It Could Guide Future Research \nAbstract: During the last decades\, misinformation and privacy became two of the most prominent and extensively researched topics related to the Internet. Especially  on social media\, users are constantly challenged to determine which incoming information they deem credible\, and which  outgoing information they feel comfortable revealing about themselves. Regardless\,  there are little to no approaches tackling both concepts together. By  conducting a literature review\, this thesis aims to determine if “personal information  sovereignty” serves as a useful concept for their combination\, focusing  on the users control over their personal data. For this\, definitions of  the relevant terms such as information and sovereignty are revisited. Then\, it is investigated where privacy and misinformation  overlap\, how they influence each other\, why it makes sense to combine  them and which implications can be deduced from these findings. Central  commonalities include their focus on the flow\, diffusion and overload of information\, the challenges stemming from the  impenetrability of the digital information space\, the different degrees  of assistance users need\, and the promising possibilities of improving  media literacy. Analyzing the existing research on these topics shows that “personal information sovereignty” can serve  as a helpful concept to address these issues. It has to be noted\,  though\, that concepts are applied differently in diverse scenarios and  by various researchers\, therefore rendering its wide application unforeseeable. \n  \nBetreuer*in: M.Sc. Tom Biselli \nPrüfer: Prof. Dr. Dr. Christian Reuter
URL:https://peasec.de/event/masterarbeit-im-studiengang-cognitive-science-von-felix-schmitt-how-information-sovereignty-combines-the-concepts-of-privacy-and-misinformation-and-how-it-could-guide-future-research/
CATEGORIES:Kolloquium
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=Europe/Berlin:20230925T093000
DTEND;TZID=Europe/Berlin:20230925T100000
DTSTAMP:20260404T141429
CREATED:20230828T060511Z
LAST-MODIFIED:20230828T060511Z
UID:15862-1695634200-1695636000@peasec.de
SUMMARY:Masterarbeit im Studiengang IT Security von Jacob Oehler: Self-Reports and Actual Privacy Behaviour on Social  Media: The Privacy Paradox Revisited
DESCRIPTION:Datum: Montag\, 25.09.2023 \nVortrag (15min) um 09:30; Diskussion (10min) bis 09:55 \n  \nMasterarbeit im Studiengang IT Security von Jacob Oehler: \nSelf-Reports and Actual Privacy Behaviour on Social  Media: The Privacy Paradox Revisited \nAbstract In this thesis\, we address the intriguing phenomenon known as the privacy paradox in the context of social media. Previous work has reported a dissonance between individuals’ stated privacy attitudes and their actual behaviour on popular social media platforms\, the so-called privacy paradox. Building on existing research and theory\, we chose an approach involving the calculation of a privacy score to assess both users’ privacy attitudes and their observed behaviours. We collected survey data on attitudes and used data scraping techniques to collect behavioural information. Through statistical analysis\, we uncovered the relationship between users’ self-reported privacy concerns and their online actions. Our findings shed light on the complex interplay between privacy perceptions and behaviours in the dynamic landscape of social media\, and contribute to a deeper understanding of the privacy paradox phenomenon \n  \nBetreuer*in: M.Sc. Tom Biselli \nPrüfer: Prof. Dr. Dr. Christian Reuter
URL:https://peasec.de/event/masterarbeit-im-studiengang-it-security-von-jacob-oehler-self-reports-and-actual-privacy-behaviour-on-social-media-the-privacy-paradox-revisited/
CATEGORIES:Kolloquium
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=Europe/Berlin:20230925T080000
DTEND;TZID=Europe/Berlin:20230925T170000
DTSTAMP:20260404T141429
CREATED:20230925T090158Z
LAST-MODIFIED:20230925T090158Z
UID:16127-1695628800-1695661200@peasec.de
SUMMARY:Bachelorarbeit im Studiengang Informatik von Vladyslav Zbykovskyi: Analyse der Rolle von Cyberangriffen im hybriden Krieg Russlands in der Ukraine: Eine OSINT-basierte Untersuchung von sozialen Netzwerken und Online-Nachrichten
DESCRIPTION:Abstract:Diese Bachelorarbeit untersucht die Rolle von Cyberangriffen in Kriegen\, insbesondere im russischen Angriffskrieg. Der Schwerpunkt liegt auf der Analyse von OSINT\, um die genaue Funktion von Cyberangriffen in der Informationskriegsführung zu ergründen und deren Diskussion in der Gesellschaft zu beleuchten. Besonders im Fokus steht die Untersuchung von Nachrichten auf der Social-Networking-Plattform Telegram und deren Auswirkungen auf verschiedene Teile der ukrainischen Gesellschaft. Eine umfassende Charakterisierung der verschiedenen Arten von Cyberbedrohungen\, die Russland gegen die Ukraine einsetzt\, wurde durchgeführt. Die Ergebnisse dieser Untersuchung dienen als Leitfaden für den Umgang mit Cyberangriffen und bieten Empfehlungen zur Entwicklung wirksamer Gegenmaßnahmen. Auf diese Weise trägt diese Arbeit dazu bei\, die Herausforderungen im Bereich der Cybersicherheit und der Informationskriegsführung in einer zunehmend digitalisierten Welt besser zu bewältigen. \nBetreuer*in: Stefka Schmid\, M.A.\nPrüfer: Prof. Dr. Dr. Christian Reuter
URL:https://peasec.de/event/bachelorarbeit-im-studiengang-informatik-von-vladyslav-zbykovskyi-analyse-der-rolle-von-cyberangriffen-im-hybriden-krieg-russlands-in-der-ukraine-eine-osint-basierte-untersuchung-von-sozialen-netzwe/
CATEGORIES:Kolloquium
END:VEVENT
BEGIN:VEVENT
DTSTART;VALUE=DATE:20230920
DTEND;VALUE=DATE:20230923
DTSTAMP:20260404T141429
CREATED:20230822T113556Z
LAST-MODIFIED:20230822T113633Z
UID:15809-1695168000-1695427199@peasec.de
SUMMARY:Science Peace Security 2023 in Darmstadt
DESCRIPTION:
URL:https://peasec.de/event/science-peace-security-2023-in-darmstadt/
ATTACH;FMTTYPE=image/png:https://peasec.de/wp-content/uploads/2023/06/sps-conference-logo-23-01.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=Europe/Berlin:20230918T113000
DTEND;TZID=Europe/Berlin:20230918T120000
DTSTAMP:20260404T141429
CREATED:20230906T075858Z
LAST-MODIFIED:20230917T160813Z
UID:15942-1695036600-1695038400@peasec.de
SUMMARY:Masterarbeit von Jordan Dieudonné: Identifying and detecting inconsistencies in IT-Security knowledge bases
DESCRIPTION:Abstract: As society becomes increasingly dependent on infrastructures that require large amounts of computing power to function\, it is more necessary than ever to protect the systems in use from failures and attacks. IT-security professionals secure these systems by leveraging information from knowledge bases that cover various concepts such as weaknesses\, vulnerabilities\, and attack patterns. Given the increasing number of software vulnerabilities reported each year\, as well as discovered changes that impact previously discovered vulnerabilities\, providing accurate information is challenging. However\, it is necessary to maintain consistency across different knowledge bases to provide IT security professionals with the most accurate information so they can take appropriate protection and countermeasures. This study examines current knowledge bases that provide open information and the IT security concepts they cover\, with the goal of defining and identifying inconsistencies between them. By using a compact security ontology covering different data sources\, a means of automatic inconsistency detection is created. The inconsistencies identified are analyzed and the findings shed light on some of the challenges in providing accurate vulnerability information. We identify inconsistencies between the NVD\, CWE\, and CAPEC by using and comparing information about the stated prerequisites and requirements. In addition\, we identify inconsistent vulnerability mapping between NVD and OSV\, as well as indications of inconsistent descriptions and affected versions between the two sources. The results underscore the importance of the work being done to detect and clean up inconsistencies\, while providing considerations for further research in this area. \nBetreuer: Philipp Kühn\, M.Sc.\nPrüfer: Prof. Dr. Dr. Christian Reuter
URL:https://peasec.de/event/masterarbeit-von-jordan-dieudonne-identifying-and-detecting-inconsistencies-in-it-security-knowledge-bases/
CATEGORIES:Kolloquium
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=Europe/Berlin:20230915T111500
DTEND;TZID=Europe/Berlin:20230915T130000
DTSTAMP:20260404T141429
CREATED:20230626T151436Z
LAST-MODIFIED:20230626T152332Z
UID:15550-1694776500-1694782800@peasec.de
SUMMARY:Disputation Thomas Reinhold: "Towards a Peaceful Development of Cyberspace: Challenges and Technical Measures for the De-Escalation of State-Led Cyber Conflicts and Arms Control of Cyber Weapons"
DESCRIPTION:Abstract:\nCyberspace\, already a few decades old\, has become a matter of course for most of us\, part of our everyday life. At the same time\, this space and the global infrastructure behind it are essential for our civilizations\, the economy and administration\, and thus an essential expression and lifeline of a globalized world. However\, these developments also create vulnerabilities and thus\, cyberspace is increasingly developing into an intelligence and military operational area – for the defense and security of states but also as a component of offensive military planning\, visible in the creation of military cyber departments and the integration of cyberspace into states’ security and defense strategies. In order to contain and regulate the conflict and escalation potential of technology used by military forces\, over the last decades\, a complex toolset of transparency\, de-escalation and arms control measures has been developed and proof-tested. Unfortunately\, many of these established measures do not work for cyberspace due to its specific technical characteristics. Even more\, the concept of what constitutes a weapon – an essential requirement for regulation – starts to blur for this domain.\nAgainst this background\, this thesis aims to answer how measures for the de-escalation of state-led conflicts in cyberspace and arms control of cyber weapons can be developed? In order to answer this question\, the dissertation takes a specifically technical perspective on these problems and the underlying political challenges of state behaviour and international humanitarian law in cyberspace to identify starting points for technical measures of transparency\, arms control and verification.\nBased on this approach of adopting already existing technical measures from other fields of the computer science\, the thesis will provide proof of concepts approaches for some of the mentioned challenges like a classification system for cyberweapons that is based on technical measurable features\, an approach for the mutual reduction of vulnerability stockpiles\, an approach to prove the non-involvement in a cyber conflict and solutions for the challenge of marking identifying civilian and consequently to be protected IT systems in the cyberspace.\nAll these initial approaches and the questions of how and by which measures arms control and conflict reduction can work for cyberspace are still quite new and subject to not too many debates. Indeed\, the approach of deliberately self-restricting the capabilities of technology in order to serve a bigger goal\, like the reduction of its destructive usage\, is yet not very common for the engineering thinking of computer science.\nTherefore this dissertation also aims to provide some impulses regarding the responsibility and creative options of the computer science with a view to the peaceful development and use of cyberspace. \nFreitag\, 15. September 2023\, 11:15-13:00 Uhr im CYSEC-Gebäude\n(Gebäudenummer: S2/20; Anschrift: Pankratiusstr. 2\, Darmstadt\, Raum: 9). \n\n11:15h öffentlicher Vortrag von 30min\n11:45h Wissenschaftliches Gespräch von 60min\n12:45h Interne Kommissionssitzung und Ergebnisverkündung\nab 13:00h Empfang
URL:https://peasec.de/event/disputation-thomas-reinhold-towards-a-peaceful-development-of-cyberspace-challenges-and-technical-measures-for-the-de-escalation-of-state-led-cyber-conflicts-and-arms-control-of-cyber-weapons/
CATEGORIES:Disputation
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=Europe/Berlin:20230912T113000
DTEND;TZID=Europe/Berlin:20230912T120000
DTSTAMP:20260404T141429
CREATED:20230911T061633Z
LAST-MODIFIED:20230912T091900Z
UID:15954-1694518200-1694520000@peasec.de
SUMMARY:Masterarbeit im Studiengang Elektrotechnik und Informationstechnk von Ignacio Collado: Cyber Situational Awareness for Computer Emergency Response Teams: Design and Evaluation of an Automated Alerting and Sharing System
DESCRIPTION:Abstract: Computer emergency response teams (CERTs) of the public sector provide advisory\, preventive\, and reactive cybersecurity services for authorities\, citizens\, and enterprises. However\, their tasks of monitoring\, analyzing\, and communicating threats to establish cyber situational awareness are getting more complex due to the increasing information volume disseminated through public channels. Besides the time-consuming data collection for incident handling and daily reporting\, CERTs are often confronted with irrelevant\, redundant\, or incredible information\, exacerbating the time-critical prevention of and response to cyber threats. This thesis presents the design of an alerting and sharing component of the Cyber Threat Observatory\, which is an automatic\, cross-platform and real-time cybersecurity dashboard. Based on semi-structured interviews (N=8)\, one design iteration and scenario-based evaluation sessions (N=6) with CERT-EU and EC employees from Belgium\, France\, Greece\, Italy\, and Spain\, it discusses design implications around automatization and alert detection\, personalization and customizability\, data export and refinement\, as well as data source integration. \n  \nBetreuer*in: Dr. Tobias Meuser\, Dr. Marc-André Kaufhold \nPrüfer: Prof. Dr. Ralf Steinmetz\, Prof. Dr. Dr. Christian Reuter
URL:https://peasec.de/event/masterarbeit-im-studiengang-elektrotechnik-und-informationstechnk-von-ignacio-collado-cyber-situational-awareness-for-computer-emergency-response-teams-design-and-evaluation-of-an-automated-alerting/
CATEGORIES:Kolloquium
END:VEVENT
BEGIN:VEVENT
DTSTART;VALUE=DATE:20230905
DTEND;VALUE=DATE:20230910
DTSTAMP:20260404T141429
CREATED:20230607T131838Z
LAST-MODIFIED:20230607T131838Z
UID:15497-1693872000-1694303999@peasec.de
SUMMARY:PEC 2023: Vortrag von Stefka Schmid „Trust in AI: Visions of Artificial Intelligence Securing Governmental Interests”
DESCRIPTION:Genaues Datum und der Uhrzeit des Vortrags wird noch veröffentlicht.
URL:https://peasec.de/event/pec-2023-vortrag-von-stefka-schmid-trust-in-ai-visions-of-artificial-intelligence-securing-governmental-interests/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=Europe/Berlin:20230816T090000
DTEND;TZID=Europe/Berlin:20230816T092500
DTSTAMP:20260404T141429
CREATED:20230628T155749Z
LAST-MODIFIED:20230628T155749Z
UID:15563-1692176400-1692177900@peasec.de
SUMMARY:Kolloquium Julian Bäumler: (Inter-)organizational Online Hate Speech Gathering\, Analysis\, and Response: A Qualitative Study with German Reporting Centers
DESCRIPTION:Masterarbeit im Studiengang Internationale Studien / Friedens- und Konfliktforschung\nvon Julian Bäumler \nAbstract: \nSocial media users are increasingly exposed to hate speech\, with potentially serious consequences for both affected individuals and society. In Germany\, reporting centers for hate speech and other illegal content assume a special function in governmental and civic counterstrategies. They forward reported content violating social media platforms’ rules to the respective operator\, submit content potentially criminally relevant to law enforcement agencies\, provide counseling to victims\, and\, in some instances\, proactively monitor social media platforms. Due to the high volume of hate speech content\, they are heavily dependent on a functioning collaboration and adequate technology support. Thus the application contexts and requirements of prospective users of supportive technologies warrant attention. Whereas research in Human-computer interaction (HCI) and Computer-supported cooperative work (CSCW) has extensively explored technology-enabled content moderation\, there are no works systematically involving reporting center staff in the study of the activities of this type of organization. This thesis approaches this gap by empirically investigating through a qualitative content analysis of semi-structured expert interviews with reporting center staff (N=14) how information and communication technologies can contribute to online hate speech gathering\, analysis\, and response by German reporting centers. Moreover\, it is explored how inter- and intra-organizational collaboration facilitates these activities. This work contributes to the state of research with observations on organizational structures\, strategies\, collaborative practices\, and technology support (1)\, empirically substantiated challenges (2)\, and an ideal-typical workflow model (3) of the centers\, as well as with design\, research\, and policy implications to improve their technology support and performance (4). \nBetreuerin: Dr. Thea Riebe\nPrüfer: Prof. Dr. Dr. Christian Reuter\, Dr. Julian Junk
URL:https://peasec.de/event/kolloquium-julian-baeumler-inter-organizational-online-hate-speech-gathering-analysis-and-response-a-qualitative-study-with-german-reporting-centers/
CATEGORIES:Kolloquium
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=Europe/Berlin:20230816T083000
DTEND;TZID=Europe/Berlin:20230816T085500
DTSTAMP:20260404T141429
CREATED:20230810T080304Z
LAST-MODIFIED:20230810T080359Z
UID:15683-1692174600-1692176100@peasec.de
SUMMARY:Kolloquium Max Langer: Problemanalyse und Handlungsempfehlungen für Sicherheitsbehörden zur Bekämpfung der Dunkelziffer von Cybersicherheitsvorfällen
DESCRIPTION:Bachelorarbeit im Studiengang Cognitive Science \nAbstract: Mit der Abhängigkeit von digitalen Strukturen wächst auch die Cyberkriminalität. Dabei ist besonders die Dunkelziffer bei der Meldung von Cybersicherheitsvorfällen problematisch: Lediglich 13 Prozent der befragten Unternehmen gaben an\, schwere Cyberangriffe den Behörden zu melden (Dreißigacker et al. 2021\, S. 8). Die vorliegende Bachelorarbeit beschäftigt sich mit der steigenden Bedrohung durch Cybersicherheitsvorfälle und der niedrigeren Meldequote von Cybersicherheitsvorfällen in der Wirtschaft. Die Arbeit hat zum Ziel\, die Kommunikation zwischen Sicherheitsbehörden und deutschen Unternehmen im Zusammenhang mit Cybersicherheitsvorfällen systematisch zu analysieren und zu bewerten. Dazu wird die folgende Forschungsfrage gestellt: Wie kann die Zusammenarbeit zwischen Unternehmen und Sicherheitsbehörden im Zuge von Cybersicherheitsbehörden optimiert werden\, um die Dunkelziffer von nichtgemeldeten Cybersicherheitsvorfällen zu reduzieren? Zur Beantwortung der Forschungsfrage wurden qualitative Experteninterviews mit Unternehmen\, Behörden und IT-Dienstleistern durchgeführt. Kern der Gespräche waren Problemfelder in der Kommunikation zwischen den Akteuren sowie Möglichkeiten\, wie Behörden besser aufgestellt und Meldewege optimiert werden können. Die Interviewdaten werden mittels qualitativer Inhaltsanalyse ausgewertet. Ein Ausblick zeigt auf\, dass die Bedeutung der Cybersicherheit weiter wachsen wird. Es wird angeregt\, sowohl mehr Geld zur Bekämpfung von Cyberangriffen auszugeben als auch die Cybersicherheitsarchitektur und sich ergebenen Meldewege zu überarbeiten. Die Befragten sahen besonders in der unterschiedlichen Qualität der Beamtinnen und Beamten ein (Vertrauens)-Problem\, sodass angeregt wurde\, für die Aus- und Weiterbildung mehr Möglichkeiten anzubieten und mehr Budget freizugeben. Abschließend betont die Arbeit die Notwendigkeit einer kooperativen Zusammenarbeit zwischen Bund\, Ländern und Unternehmen\, um die Cybersicherheit in Deutschland nachhaltig zu stärken und den Herausforderungen der digitalen Welt effektiv zu begegnen. \nBetreuer: Dr. Marc-André Kaufhold\nPrüfer: Prof. Dr. Dr. Christian Reuter
URL:https://peasec.de/event/kolloquium-max-langer-problemanalyse-und-handlungsempfehlungen-fuer-sicherheitsbehoerden-zur-bekaempfung-der-dunkelziffer-von-cybersicherheitsvorfaellen/
CATEGORIES:Kolloquium
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=Europe/Berlin:20230623T164500
DTEND;TZID=Europe/Berlin:20230623T181500
DTSTAMP:20260404T141429
CREATED:20230203T164359Z
LAST-MODIFIED:20230607T131608Z
UID:14852-1687538700-1687544100@peasec.de
SUMMARY:BISA 2023: Vortrag von Stefka Schmid „Trust in AI: Visions of Artificial Intelligence Securing Governmental Interests”
DESCRIPTION:BISA 2023 Conference (https://conference.bisa.ac.uk/\, vorläufiges Programm https://indico.bisa.ac.uk/event/241/timetable/?view=standard) \nAuthors: Stefka Schmid (TU Darmstadt)\, Bao-Chau Pham (University of Vienna) \, Anna-Katharina Ferl (Peace Research Institute Frankfurt (PRIF))
URL:https://peasec.de/event/bisa-2023-vortrag-von-stefka-schmid-trust-in-ai-visions-of-artificial-intelligence-securing-governmental-interests/
LOCATION:Hilton Hotel Glasgow
END:VEVENT
END:VCALENDAR