BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//PEASEC - Science and Technology for Peace and Security | Technical University of Darmstadt - ECPv6.15.18//NONSGML v1.0//EN
CALSCALE:GREGORIAN
METHOD:PUBLISH
X-WR-CALNAME:PEASEC - Science and Technology for Peace and Security | Technical University of Darmstadt
X-ORIGINAL-URL:https://peasec.de
X-WR-CALDESC:Events for PEASEC - Science and Technology for Peace and Security | Technical University of Darmstadt
REFRESH-INTERVAL;VALUE=DURATION:PT1H
X-Robots-Tag:noindex
X-PUBLISHED-TTL:PT1H
BEGIN:VTIMEZONE
TZID:Europe/Berlin
BEGIN:DAYLIGHT
TZOFFSETFROM:+0100
TZOFFSETTO:+0200
TZNAME:CEST
DTSTART:20220327T010000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:+0200
TZOFFSETTO:+0100
TZNAME:CET
DTSTART:20221030T010000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:+0100
TZOFFSETTO:+0200
TZNAME:CEST
DTSTART:20230326T010000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:+0200
TZOFFSETTO:+0100
TZNAME:CET
DTSTART:20231029T010000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:+0100
TZOFFSETTO:+0200
TZNAME:CEST
DTSTART:20240331T010000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:+0200
TZOFFSETTO:+0100
TZNAME:CET
DTSTART:20241027T010000
END:STANDARD
END:VTIMEZONE
BEGIN:VEVENT
DTSTART;TZID=Europe/Berlin:20230125T161500
DTEND;TZID=Europe/Berlin:20230125T175500
DTSTAMP:20260404T211208
CREATED:20221010T112430Z
LAST-MODIFIED:20221011T084621Z
UID:13359-1674663300-1674669300@peasec.de
SUMMARY:Sichere Kritische Infrastrukturen V10: Internet Exchange Points – kritische Infrastruktur des Internets
DESCRIPTION:
URL:https://peasec.de/event/sichere-kritische-infrastrukturen-v10-internet-exchange-points-kritische-infrastruktur-des-internets/
LOCATION:Raum S103/123 (Altes Hauptgebäude\, Hochschulstraße 1\, 64289 Darmstadt) und in ZOOM
CATEGORIES:Ringvorlesung Sichere Kritische Infrastrukturen
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=Europe/Berlin:20230201T161500
DTEND;TZID=Europe/Berlin:20230201T175500
DTSTAMP:20260404T211208
CREATED:20220929T081653Z
LAST-MODIFIED:20221011T084557Z
UID:13082-1675268100-1675274100@peasec.de
SUMMARY:Sichere Kritische Infrastrukturen V11: Bedrohungen erkennen\, Risiken modellieren und Gegenmaßnahmen planen. Risikomanagement unter Wirtschaftlichkeitsanforderungen (Dr. Steven Arzt\, Fraunhofer SIT\, ATHENE)
DESCRIPTION:
URL:https://peasec.de/event/sichere-kritische-infrastrukturen-v1-bedrohungen-erkennen-risiken-modellieren-und-gegenmassnahmen-planen-risikomanagement-unter-wirtschaftlichkeitsanforderungen-dr-steven-arzt-fraunhofer-sit-at/
LOCATION:Raum S103/123 (Altes Hauptgebäude\, Hochschulstraße 1\, 64289 Darmstadt) und in ZOOM
CATEGORIES:Ringvorlesung Sichere Kritische Infrastrukturen
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=Europe/Berlin:20230209T100000
DTEND;TZID=Europe/Berlin:20230209T120000
DTSTAMP:20260404T211208
CREATED:20221125T124955Z
LAST-MODIFIED:20221125T125037Z
UID:14365-1675936800-1675944000@peasec.de
SUMMARY:Disputation Dominik Helm (FG Mezini): Architektur für kollaborative statische Programmanalyse
DESCRIPTION:
URL:https://peasec.de/event/disputation-dominik-helm-fg-mezini-architektur-fuer-kollaborative-statische-programmanalyse/
CATEGORIES:Disputation
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=Europe/Berlin:20230309T130000
DTEND;TZID=Europe/Berlin:20230309T140000
DTSTAMP:20260404T211208
CREATED:20230306T145802Z
LAST-MODIFIED:20230306T145802Z
UID:15061-1678366800-1678370400@peasec.de
SUMMARY:Research Seminar | Crypto vs. Reality - The (mis)perception of security mechanisms
DESCRIPTION:Speaker: Sebastian Linsner (TU Darmstadt – CROSSING E7)\nTitle: Crypto vs. Reality – The (mis)perception of security mechanisms\nDate: 09.03.2023\nTime: 13:00h\nLocation: Pankratiusstraße 2\, Lab 121 (Pizza afterwards)\n\nAbstract:\nDesigning Security mechanisms requires to meet many different needs: A sound theoretical concept\, a proper implementation without side-channels and a usable interface\, to name a few. But is that enough? While often an attacker model is derived and evaluated\, a proper user model is often lacking. Although it is important to prevent malicious actions taken against a security mechanism\, the ultimate hurdle is the adoption of the mechanism\, because a tool that is not used can not protect anyone. Adoption of security is not simply done by designing a nice interface and advertise the product. Research showed that the mental model of the users is highly important to prevent additional security risks: Users try to turn mechanisms of or circumvent them if they do not trust them. On the other hand\, leads lacking understanding of the security mechanisms to overestimation the actual security\, putting users at danger. Therefore\, I will highlight in my talk\, why it is important to include the users into the design process of security and how common risks can be prevented. \nBiography:\nSebastian Linser has his background in Computer Science and IT-Security. Since 2018\, he is a research associate at PEASEC – Science and Technology for Peace and Security\, working on the topics of Usable Security and Usable Privacy.
URL:https://peasec.de/event/research-seminar-crypto-vs-reality-the-misperception-of-security-mechanisms/
LOCATION:Pankratiusstraße 2\, Lab 121
END:VEVENT
BEGIN:VEVENT
DTSTART;VALUE=DATE:20230313
DTEND;VALUE=DATE:20230316
DTSTAMP:20260404T211208
CREATED:20230810T081156Z
LAST-MODIFIED:20230810T081156Z
UID:15691-1678665600-1678924799@peasec.de
SUMMARY:Panels für das 55. Kolloquium der Arbeitsgemeinschaft für Friedens- und Konfliktforschung in Darmstadt
DESCRIPTION:PEASEC Mitveranstalter vom 13.-15. März 2024 in Darmstadt
URL:https://peasec.de/event/panels-fuer-das-55-kolloquium-der-arbeitsgemeinschaft-fuer-friedens-und-konfliktforschung-in-darmstadt/
LOCATION:Darmstadt
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=Europe/Berlin:20230322T133000
DTEND;TZID=Europe/Berlin:20230322T150000
DTSTAMP:20260404T211208
CREATED:20230227T164551Z
LAST-MODIFIED:20230227T164551Z
UID:15042-1679491800-1679497200@peasec.de
SUMMARY:Vortrag von Jonas Franken beim VII. "Dreizack" 2023
DESCRIPTION:Im Rahmen der maritimen Netzwerk- und Nachwuchstagung Dreizack trägt PEASEC-WiMi Jonas Franken zum Thema “Autobahnen im Wilden Westen? – Eine kritische Analyse des Nutzens und der Fallstricke von Metaphern maritimer Basisinfrastrukturen” in Laboe vor.
URL:https://peasec.de/event/vortrag-von-jonas-franken-beim-vii-dreizack-2023/
LOCATION:Laboe
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=Europe/Berlin:20230330T143000
DTEND;TZID=Europe/Berlin:20230330T160000
DTSTAMP:20260404T211208
CREATED:20230203T164835Z
LAST-MODIFIED:20230203T164835Z
UID:14860-1680186600-1680192000@peasec.de
SUMMARY:AFK-Kolloquium 2023: Roundtable mit Stefka Schmid „Wie kann ein deutscher Beitrag zu einer umfassenden und global gedachten Rüstungskontrolle des 21. Jahrhunderts aussehen?“
DESCRIPTION:AFK-Kolloquium 2023 (https://afk-web.de/cms/afk-kolloquien/\, vorläufiges Programm https://afk-web.de/cms/wp-content/uploads/2023/01/AFK-Kolloquium_Programm.pdf)
URL:https://peasec.de/event/afk-kolloquium-2023-roundtable-mit-stefka-schmid-wie-kann-ein-deutscher-beitrag-zu-einer-umfassenden-und-global-gedachten-ruestungskontrolle-des-21-jahrhunderts-aussehen/
LOCATION:Hotel Christphorus\, Ev. Johannesstift (Berlin)
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=Europe/Berlin:20230417T090000
DTEND;TZID=Europe/Berlin:20230417T092500
DTSTAMP:20260404T211208
CREATED:20230408T143035Z
LAST-MODIFIED:20230408T143035Z
UID:15242-1681722000-1681723500@peasec.de
SUMMARY:Designing a Prototype Visualization Based on White-Box Indicators to Assist Users Identifying Misinformation on TikTok
DESCRIPTION:Masterarbeit im Studiengang IT Sicherheit von Robert Cieslinski: \nDesigning a Prototype Visualization Based on White-Box Indicators to Assist Users Identifying Misinformation on TikTok\nAbstract: Digital Fake News or misinformation in general have become a central part of online discourse and research. Detection approaches often try to maintain a certain level of transparency/interpretability to counteract unintended effects (e.g.\, Confirmation Bias\, Backfire Effect). One way for this is applying human understandable white-box indicators to the content in question. Several indicators are already described in the literature\, with some of them tailored to specific platforms such as Twitter or YouTube. For TikTok\, which popularized short videos with easy sound-reuse\, they may have to be reevaluated or new ones have to be developed. In this work\, an initial user study with 18 participants was conducted. The resulting list of helpful and potential applicable indicators showed two prominent groups of indicators: high emotionalization in some parts of the post and missing context/sources. In the next step\, a visualization prototype is developed. After prefiltering by a (simulated) classification system or a factchecker’s assessment\, fitting indicators are highlighted in the post. The design is evaluated with mock data.Betreuerin: Katrin Hartwig\, M.Sc. \nPrüfer: Prof. Dr. Dr. Christian Reuter
URL:https://peasec.de/event/designing-a-prototype-visualization-based-on-white-box-indicators-to-assist-users-identifying-misinformation-on-tiktok/
CATEGORIES:Kolloquium
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=Europe/Berlin:20230420T080000
DTEND;TZID=Europe/Berlin:20230420T170000
DTSTAMP:20260404T211208
CREATED:20230420T101733Z
LAST-MODIFIED:20230420T101733Z
UID:15252-1681977600-1682010000@peasec.de
SUMMARY:LINKS Webinar - The Role of Social Media in Disaster Resilience
DESCRIPTION:The Role of Social Media in Disaster Resilience: Establishing Bridges Between Authorities and Citizens. \nWebinar will take place on 8 May at 4 p.m. CEST.\nThe Societal Resilience Cluster of Horizon Projects is launching a series of webinars in 2023 on topics which focus on the strengthening of European disaster and crisis resilience. \nfull details: https://www.cmine.eu/events/113001
URL:https://peasec.de/event/links-webinar-the-role-of-social-media-in-disaster-resilience/
ATTACH;FMTTYPE=image/jpeg:https://peasec.de/wp-content/uploads/2023/04/links4.jpg
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=Europe/Berlin:20230427T190000
DTEND;TZID=Europe/Berlin:20230427T203000
DTSTAMP:20260404T211208
CREATED:20230425T151813Z
LAST-MODIFIED:20230425T151813Z
UID:15267-1682622000-1682627400@peasec.de
SUMMARY:Odenwald-Akademie: Vortrag von Franz Kuntke „smart farming: Hacks & Infrastrukturausfälle“
DESCRIPTION:Die Digitalisierung schreitet auch in der Landwirtschaft immer weiter voran. Sogenannte Smart Farming-Technologien\, die ein ressourcenschonenderes\, wirtschaftlicheres und kollaboratives Arbeiten ermöglichen sollen\, werden zunehmend in landwirtschaftlichen Betrieben eingesetzt. Doch wie viele aktuelle Ereignisse zeigen\, birgt die Digitalisierung nicht nur Vorteile\, sondern auch Gefahren – dies gilt auch für die  Landwirtschaft.\nIn diesem Vortrag wird der Begriff Resilienz im Kontext digitaler Systeme betrachtet. Darauf aufbauend werden mögliche Gefahren für Smart Farming Technologien aufgezeigt und aktuelle Hürden der  landwirtschaftlichen Digitalisierung thematisiert. Anschließend werden Konzepte\, Entwicklungen und zukünftige Vorhaben aus Forschungsprojekten wie GeoBox-Infrastrukur und AgriRegio vorgestellt\, die mögliche Lösungen für einige dieser Probleme aufzeigen.
URL:https://peasec.de/event/odenwald-akademie-vortrag-von-franz-kuntke-smart-farming-hacks-infrastrukturausfaelle/
LOCATION:Odenwald-Akademie\, Festsaal\, Haus der Energie\, Helmholtzstr. 1\, Erbach\, 64711
ATTACH;FMTTYPE=image/png:https://peasec.de/wp-content/uploads/2023/04/odenwald-akademie.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=Europe/Berlin:20230428T090000
DTEND;TZID=Europe/Berlin:20230428T092500
DTSTAMP:20260404T211208
CREATED:20230426T134546Z
LAST-MODIFIED:20230426T134736Z
UID:15325-1682672400-1682673900@peasec.de
SUMMARY:Datenschutz in kleinen & mittleren Unternehmen während der COVID-19-Pandemie.
DESCRIPTION:Masterarbeit im Studiengang Wirtschaftsinformatik von Nico Weber \nAbstract: Ende 2019 bricht das COVID-19-Virus aus und sorgt durch seine schnelle Verbreitung für eine weltweite Krise. Für viele Unternehmen ging dies mit einem immensen Umbruch der Arbeits- und Organisationsabläufe einher. Während weltweit eine Großzahl das Scheitern ihres Unternehmens erkennen musste\, erfahren andere die Pandemie als Katalysator der Digitalisierung. Gleichzeitig wachsen die Anforderungen für den Datenschutz innerhalb der EU. Im Mai 2018 tritt die DSGVO in Kraft und stellt dadurch insbesondere KMU vor diverse Herausforderungen. Ebenso steigen auch die Gefahren des Cyberraums. KMU\, welche rund 99\,4 % aller Unternehmen in Deutschland ausmachen\, sind anfällig für solche Bedrohungen. Das Ziel dieser Masterarbeit ist es daher\, zu erforschen\, wie die Gruppe der KMU während der COVID-19-Pandemie das Thema Datenschutz berücksichtigen konnte. Hierfür wird eine qualitative Datenerhebung anhand von zwei semi-strukturierten Leitfadeninterviews sowie 13 Online-Fragebögen durchgeführt. Eine Analyse\, geleitet durch die Methodologie der ‚Grounded Theory‘\, ermöglicht dabei die Interpretation der erhobenen Daten. Während einige KMU vor allem auf neue digitale Technologien zur Umsetzung mobiler Arbeit setzen\, implementieren andere Unternehmen keinerlei neue Technologien. Alle befragten KMU personenbezogene Daten verarbeiten\, nehmen das Cyberrisiko jedoch höchst unterschiedlich wahr. Dementsprechend variieren auch die etablierten Sicherheitsmaßnahmen. Und auch die Datenschutzanforderungen finden während der Pandemie unter KMU teils strenge\, teils keine Beachtung. Ursächlich hierfür sind unter anderem zu anspruchsvolle und unklare Anforderungen\, welche angesichts der dynamischen Entwicklungen keine umfangreiche Anwendung finden können. \nBetreuer: Enno Steinbrink\, M.Sc. \nPrüfer: Prof. Dr. Dr. Christian Reuter\nOrt: Raum 117\, CYSEC-Gebäude\, Pankratiusstraße 2
URL:https://peasec.de/event/datenschutz-in-kleinen-mittleren-unternehmen-waehrend-der-covid-19-pandemie/
CATEGORIES:Kolloquium
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=Europe/Berlin:20230508T160000
DTEND;TZID=Europe/Berlin:20230508T170000
DTSTAMP:20260404T211208
CREATED:20230502T155422Z
LAST-MODIFIED:20230502T155422Z
UID:15334-1683561600-1683565200@peasec.de
SUMMARY:The Role of Social Media in Disaster Resilience: Establishing Bridges Between Authorities and Citizens.
DESCRIPTION:The Role of Social Media in Disaster Resilience: Establishing Bridges Between Authorities and Citizens.\nWebinar will take place on 8 May at 4 p.m. CEST.\nThe Societal Resilience Cluster of Horizon Projects is launching a series of webinars in 2023 on topics which focus on the strengthening of European disaster and crisis resilience. \nFull details can be seen in the attachment and please register using the link on this page.
URL:https://peasec.de/event/the-role-of-social-media-in-disaster-resilience-establishing-bridges-between-authorities-and-citizens/
ATTACH;FMTTYPE=image/jpeg:https://peasec.de/wp-content/uploads/2023/05/links4.jpg
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=Europe/Berlin:20230509T090000
DTEND;TZID=Europe/Berlin:20230509T092500
DTSTAMP:20260404T211208
CREATED:20230426T134349Z
LAST-MODIFIED:20230426T134758Z
UID:15323-1683622800-1683624300@peasec.de
SUMMARY:Disruption Tolerant Networking – Notfall-Messenger via LoRaWAN
DESCRIPTION:Bachelorarbeit im Studiengang Informatik von Denis Orlov: \nAbstract: Internetbasierte Kommunikation ist in der modernen Gesellschaft nicht mehr wegzudenken. Allerdings konnte in der Vergangenheit beobachtet werden\, das in Krisensituationen die Verfügbarkeit dieser Kommunikationsmedien nicht gegeben sein muss. Gerade in Krisensituationen besteht allerdings ein hoher Bedarf an Kommunikation zwischen Helfern und Betroffenen. Um dem entgegenzuwirken wird LoRaWAN als alternatives Kommunikationsmedium in Betracht gezogen. Es konnte bereits gezeigt werden das sich dessen Sterntopologie in ein multi-hop Netzwerk umwandeln lässt und eine Bereitstellung mittels einer Disruption Tolerant Network (DTN) Architektur ist aktuell in Entwicklung. Ziel dieser Arbeit ist es eine Messenger App zu entwickeln\, welcher in der Lage ist sich mit dem LoRaWAN DTN-Backend zu verbinden und dessen DTN/BP7 Pakete zu verarbeiten. Hierzu wurde im ersten Schritt eine Technologie- und Literaturrecherche durchgeführt\, um eine passende Technologie für die App zu finden und festzustellen was aus vergangenen Arbeiten zu Notfall-Messengern gelernt werden kann. Danach wurde mithilfe agiler Softwareentwicklungsmethoden die App implementiert. Dabei wurde zuerst ein Prototyp entwickelt und dieser anschließend in das DTN integriert. Im Anschluss erfolgte noch eine Optimierung der App um die Benutzerfreundlichkeit zu verbessern. Schlussendlich konnte eine App geschaffen werden\, mit der Benutzer über LoRaWAN Nachrichten senden und empfangen können. Sie sind ebenfalls in der Lage Ihre Kontakte in der App zu hinterlegen\, den Chatverlauf über mehrere Sitzungen hinweg nachzuverfolgen und Benachrichtigungen über eingegangene Nachrichten zu erhalten. \nBetreuer: Franz Kuntke\, M.Sc.\nPrüfer: Prof. Dr. Dr. Christian Reuter\nOrt: Raum 117\, CYSEC-Gebäude\, Pankratiusstraße 2
URL:https://peasec.de/event/disruption-tolerant-networking-notfall-messenger-via-lorawan/
CATEGORIES:Kolloquium
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=Europe/Berlin:20230524T160000
DTEND;TZID=Europe/Berlin:20230524T162500
DTSTAMP:20260404T211208
CREATED:20230512T095254Z
LAST-MODIFIED:20230512T095254Z
UID:15408-1684944000-1684945500@peasec.de
SUMMARY:Optimizing Message Delivery Cost in Preexisting\, Disruption/Delay Tolerant Messaging Based LoRaWAN Networks for Disaster Communication.
DESCRIPTION:Abstract: \nThe availability of communication channels and the internet is often taken for granted\, but disasters like the 2023 Turkey-Syria earthquake show how quickly that can change. Emergency response solutions are then faced with a dynamic environment making it challenging to deliver messages between peers. The HofBox introduced an emergency communication system built on a LoRaWAN-based mesh network and delay tolerant networking to provide communication services in disaster situations.\nIn this thesis\, I analyze the requirements and challenges for routing algorithms in the HofBox environment. Legal duty cycle limits imposed on the network traffic in LoRaWAN networks are identified as the main factor limiting the amount of messages that can be routed through the network.\nA novel routing algorithm focused on improving duty cycle usage while keeping the delivery rate at flooding based approaches is proposed. To optimize the duty cycle usage\, the proposed algorithm incorporates multiple strategies to warn about sub-optimal network topologies and to minimize the amount of data transmitted while still providing message delivery rates comparable to flooding-based routing.\nTo evaluate the algorithm’s performance\, the proposed routing algorithm and the current flooding-based approach are implemented in software\, to compare the time on air characteristics of both solutions. Finally\, current limitations\, future optimizations and findings of the evaluation will be discussed. \nBetreuer: Franz Kuntke\, M.Sc.\nPrüfer: Prof. Dr. Dr. Christian Reuter
URL:https://peasec.de/event/optimizing-message-delivery-cost-in-preexisting-disruption-delay-tolerant-messaging-based-lorawan-networks-for-disaster-communication/
LOCATION:Pankratiusstr. 2\, Raum 117
CATEGORIES:Kolloquium
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=Europe/Berlin:20230531T090000
DTEND;TZID=Europe/Berlin:20230531T092500
DTSTAMP:20260404T211208
CREATED:20230512T102055Z
LAST-MODIFIED:20230530T090033Z
UID:15411-1685523600-1685525100@peasec.de
SUMMARY:MISINFO: A User-centered Android-Application to Assist Users in Dealing with Misinformation Across Social Media Platforms
DESCRIPTION:Bachelorarbeit im Studiengang Informatik von Mazen Alkatlabee \nAbstract: The dissemination of information has facilitated the emergence of fake news outlets\, which drawn out the importance of news literacy. While most of existing studies focus on either one so- cial media platform or need to be professional to deal with. In this work\, we propose MisInfo\, an Android app developed to assist users into detecting misinformation on any social media platforms such as Facebook\, using both Black-Box-Model for de- tection\, and White-Box-Model to provide explainable indicators. \nIt is important to note that MisInfo is a simulation prototype and does not implement every feature of a fully functional\, but mainly core functionalities such as designing a clean software architecture\, creating Floating Widget and organizing API calls such as OCR APIs to extract text from images. However\, Mis- Info provides an insight of the effectiveness of such an app and serves as a starting point for further research and development of a fully functional app. \nBetreuerin: Katrin Hartwig\, M.Sc. \nPrüfer: Prof. Dr. Dr. Christian Reuter
URL:https://peasec.de/event/https-peasec-de-termin-optimizing-message-delivery-cost-in-preexisting-disruption-delay-tolerant-messaging-based-lorawan-networks-for-disaster-communication/
CATEGORIES:Kolloquium
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=Europe/Berlin:20230531T093000
DTEND;TZID=Europe/Berlin:20230531T100000
DTSTAMP:20260404T211208
CREATED:20230530T085751Z
LAST-MODIFIED:20230530T085810Z
UID:15472-1685525400-1685527200@peasec.de
SUMMARY:User-centered development of nudges to mitigate the spread of misinformation on social media
DESCRIPTION:Bachelorarbeit im Studiengang Informatik von Bernadette Peter \nAbstract: In the context of digitalization\, it is becoming increasingly easy to receive and share information. But also to publish it. This also carries over to social platforms\, where information and news are spread that are not necessarily always accurate. This is especially problematic because this is often the only source of information for younger people. Removing untrustworthy content is not necessarily the best solution (reactance\, echo chambers creation)\, therefore this work focuses on the handling of misinformation through nudging. Two think-aloud studies (N =15; N=16) were conducted to qualitatively collect feedback on nudges and further develop the most promising ones between the studies. The nudges were concocted for the platform TikTok and were investigated as mockups in the second study. General requirements for nudges to be accepted and perceived as justified could be found. Influencing people to like or not like something was rejected by many participants. There were preferences in how direct and with how much information (text vs. animation) the nudge appeal was exposed to the user. \nBetreuerin: Katrin Hartwig\, M.Sc. \nPrüfer: Prof. Dr. Dr. Christian Reuter
URL:https://peasec.de/event/15472/
CATEGORIES:Kolloquium
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=Europe/Berlin:20230606T090000
DTEND;TZID=Europe/Berlin:20230606T092500
DTSTAMP:20260404T211208
CREATED:20230531T140903Z
LAST-MODIFIED:20230531T140922Z
UID:15480-1686042000-1686043500@peasec.de
SUMMARY:User Experience and Mental Model in DTN-based Peer-to-Peer Communication: Designing UI Elements for Uncertainty
DESCRIPTION:Masterarbeit im Studiengang Informatik von Markus Henkel: \nAbstract:\nThe Internet not only plays an important role in many aspects of everyday life\, but it is also vital for crisis communication. Over the past two decades\, citizens have increasingly used social media to self-organize during crises. However\, social media applications typically rely on the Internet\, which may not always be available. While disruption-tolerant networking has been recognized as a way of enabling communication in these situations\, it is unclear whether the general public would understand such technology and therefore\, whether they would adopt social media applications that utilize disruption-tolerant networking. This work extends an existing app that is intended to keep neighbourhoods connected during crises. By adding UI elements to the app’s direct messaging feature\, it attempts to provide information to users that helps them build a good mental model of DTN. Additionally\, it explores which of the UI elements reduce uncertainty\, increase spatial understanding and help assess the status of the communication. The results of the conducted user study show that participants were able to get a good understanding of the properties of DTN and its implications on their communication. By displaying additional information in the chat window\, users can be supported during crises that are accompanied by Internet outages and their uncertainty can be reduced. \nBetreuer: Steffen Haesler\, M.Sc.\nPrüfer: Prof. Dr. Dr. Christian Reuter\n(nur virtuell über Zoom)
URL:https://peasec.de/event/user-experience-and-mental-model-in-dtn-based-peer-to-peer-communication-designing-ui-elements-for-uncertainty/
CATEGORIES:Kolloquium
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=Europe/Berlin:20230616T090000
DTEND;TZID=Europe/Berlin:20230616T104500
DTSTAMP:20260404T211208
CREATED:20230203T164622Z
LAST-MODIFIED:20230530T223917Z
UID:14857-1686906000-1686912300@peasec.de
SUMMARY:IB Sektionstagung 2023: Vortrag von Stefka Schmid „Digital Diplomacy on Twitter: US and Chinese Soft Power in Times of COVID-19“
DESCRIPTION:IB Sektionstagung 2023 (https://www.zu.de/lehrstuehle/internationale-sicherheitspolitik/sektionstagung.php) \nAuthors: Stefka Schmid & Christian Reuter
URL:https://peasec.de/event/ib-sektionstagung-2023-vortrag-von-stefka-schmid-digital-diplomacy-on-twitter-us-and-chinese-soft-power-in-times-of-covid-19/
LOCATION:Zeppelin Universität Friedrichshafen
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=Europe/Berlin:20230620T183000
DTEND;TZID=Europe/Berlin:20230620T200000
DTSTAMP:20260404T211208
CREATED:20230612T153659Z
LAST-MODIFIED:20230615T101708Z
UID:15507-1687285800-1687291200@peasec.de
SUMMARY:Online-Fachgespräch mit Jonas Franken zum KRITIS-Dachgesetz: Wie schützen wir Unterseekabel\, Pipelines und LNG-Terminals?
DESCRIPTION:PEASEC-WiMi Jonas Franken diskutiert mit Expert:innen aus dem Bundestag\, Behörden und der Wirtschaft am kommenden Dienstag\, den 20.03.2023 18:30-20:00 zu Schutzmöglichkeiten Maritimer Kritischer Infrastrukturen: \nFür den Schutz ihrer Anlagen sind aktuell in erster Linie deren Betreiber kritischer Infrastrukturen verantwortlich. Diese müssten sich umfassend gegen Gefahren wie Naturkatastrophen\, Terrorismus\, Sabotage aber auch menschliches Versagen wappnen. Gerade mit Blick auf die neuen LNG Terminals\, die Unterseekabel und Pipelines trägt jedoch der Staat ebenso eine große Verantwortung und es kommt ihm beim Schutz dieser herausragenden Kritischen Infrastruktur – ob Ihrer tragenden und herausragenden Rolle für die Versorgung unseres Gemeinwesens und unserer Wirtschaft – eine tragende Rolle zu. \nAm 26. September 2022 wurden mit mehreren Sprengungen Anschläge auf die Nord-Stream-Pipelines verübt. Dabei wurden beide Stränge von Nord Stream 1 und einer der beiden Stränge von Nord Stream 2 unterbrochen. Bis heute ist unklar\, wer für die Anschläge verantwortlich ist. Allein dieser Vorgang zeigt wie hochaktuell und brisant dieses Thema ist\, dem wir uns in diesem Fachgespräch widmen wollen. Mit den eingeladenen Expert*innen wird vor diesem Hintergrund diskutiert: Wer ist federführend für den Schutz und für die Abstimmung und Organisation der Schutzmaßnahmen dieser Kritischen Infrastruktur eigentlich zuständig? Welche Voraussetzungen müssen von staatlicher Seite dafür geschaffen werden\, dass ein möglichst umfassender und effektiver Schutz – in baulicher\, technischer und personeller Hinsicht – durch die beteiligten Akteure organsiert werden kann? Wie können klare Verantwortlichkeiten und Kommunikationsstrukturen geschaffen werden\, die eine gute und effiziente Zusammenarbeit der Beteiligten auf allen Ebenen ermöglicht? Wie kann eine übergreifende Koordinierung gelingen\, die im Ernstfall funktioniert und alle praktischen Bedürfnisse erfüllt? \nDie Anmeldung ist hier möglich.
URL:https://peasec.de/event/online-fachgespraech-mit-jonas-franken-zum-kritis-dachgesetz-wie-schuetzen-wir-unterseekabel-pipelines-und-lng-terminals/
LOCATION:online
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=Europe/Berlin:20230623T164500
DTEND;TZID=Europe/Berlin:20230623T181500
DTSTAMP:20260404T211208
CREATED:20230203T164359Z
LAST-MODIFIED:20230607T131608Z
UID:14852-1687538700-1687544100@peasec.de
SUMMARY:BISA 2023: Vortrag von Stefka Schmid „Trust in AI: Visions of Artificial Intelligence Securing Governmental Interests”
DESCRIPTION:BISA 2023 Conference (https://conference.bisa.ac.uk/\, vorläufiges Programm https://indico.bisa.ac.uk/event/241/timetable/?view=standard) \nAuthors: Stefka Schmid (TU Darmstadt)\, Bao-Chau Pham (University of Vienna) \, Anna-Katharina Ferl (Peace Research Institute Frankfurt (PRIF))
URL:https://peasec.de/event/bisa-2023-vortrag-von-stefka-schmid-trust-in-ai-visions-of-artificial-intelligence-securing-governmental-interests/
LOCATION:Hilton Hotel Glasgow
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=Europe/Berlin:20230816T083000
DTEND;TZID=Europe/Berlin:20230816T085500
DTSTAMP:20260404T211208
CREATED:20230810T080304Z
LAST-MODIFIED:20230810T080359Z
UID:15683-1692174600-1692176100@peasec.de
SUMMARY:Kolloquium Max Langer: Problemanalyse und Handlungsempfehlungen für Sicherheitsbehörden zur Bekämpfung der Dunkelziffer von Cybersicherheitsvorfällen
DESCRIPTION:Bachelorarbeit im Studiengang Cognitive Science \nAbstract: Mit der Abhängigkeit von digitalen Strukturen wächst auch die Cyberkriminalität. Dabei ist besonders die Dunkelziffer bei der Meldung von Cybersicherheitsvorfällen problematisch: Lediglich 13 Prozent der befragten Unternehmen gaben an\, schwere Cyberangriffe den Behörden zu melden (Dreißigacker et al. 2021\, S. 8). Die vorliegende Bachelorarbeit beschäftigt sich mit der steigenden Bedrohung durch Cybersicherheitsvorfälle und der niedrigeren Meldequote von Cybersicherheitsvorfällen in der Wirtschaft. Die Arbeit hat zum Ziel\, die Kommunikation zwischen Sicherheitsbehörden und deutschen Unternehmen im Zusammenhang mit Cybersicherheitsvorfällen systematisch zu analysieren und zu bewerten. Dazu wird die folgende Forschungsfrage gestellt: Wie kann die Zusammenarbeit zwischen Unternehmen und Sicherheitsbehörden im Zuge von Cybersicherheitsbehörden optimiert werden\, um die Dunkelziffer von nichtgemeldeten Cybersicherheitsvorfällen zu reduzieren? Zur Beantwortung der Forschungsfrage wurden qualitative Experteninterviews mit Unternehmen\, Behörden und IT-Dienstleistern durchgeführt. Kern der Gespräche waren Problemfelder in der Kommunikation zwischen den Akteuren sowie Möglichkeiten\, wie Behörden besser aufgestellt und Meldewege optimiert werden können. Die Interviewdaten werden mittels qualitativer Inhaltsanalyse ausgewertet. Ein Ausblick zeigt auf\, dass die Bedeutung der Cybersicherheit weiter wachsen wird. Es wird angeregt\, sowohl mehr Geld zur Bekämpfung von Cyberangriffen auszugeben als auch die Cybersicherheitsarchitektur und sich ergebenen Meldewege zu überarbeiten. Die Befragten sahen besonders in der unterschiedlichen Qualität der Beamtinnen und Beamten ein (Vertrauens)-Problem\, sodass angeregt wurde\, für die Aus- und Weiterbildung mehr Möglichkeiten anzubieten und mehr Budget freizugeben. Abschließend betont die Arbeit die Notwendigkeit einer kooperativen Zusammenarbeit zwischen Bund\, Ländern und Unternehmen\, um die Cybersicherheit in Deutschland nachhaltig zu stärken und den Herausforderungen der digitalen Welt effektiv zu begegnen. \nBetreuer: Dr. Marc-André Kaufhold\nPrüfer: Prof. Dr. Dr. Christian Reuter
URL:https://peasec.de/event/kolloquium-max-langer-problemanalyse-und-handlungsempfehlungen-fuer-sicherheitsbehoerden-zur-bekaempfung-der-dunkelziffer-von-cybersicherheitsvorfaellen/
CATEGORIES:Kolloquium
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=Europe/Berlin:20230816T090000
DTEND;TZID=Europe/Berlin:20230816T092500
DTSTAMP:20260404T211208
CREATED:20230628T155749Z
LAST-MODIFIED:20230628T155749Z
UID:15563-1692176400-1692177900@peasec.de
SUMMARY:Kolloquium Julian Bäumler: (Inter-)organizational Online Hate Speech Gathering\, Analysis\, and Response: A Qualitative Study with German Reporting Centers
DESCRIPTION:Masterarbeit im Studiengang Internationale Studien / Friedens- und Konfliktforschung\nvon Julian Bäumler \nAbstract: \nSocial media users are increasingly exposed to hate speech\, with potentially serious consequences for both affected individuals and society. In Germany\, reporting centers for hate speech and other illegal content assume a special function in governmental and civic counterstrategies. They forward reported content violating social media platforms’ rules to the respective operator\, submit content potentially criminally relevant to law enforcement agencies\, provide counseling to victims\, and\, in some instances\, proactively monitor social media platforms. Due to the high volume of hate speech content\, they are heavily dependent on a functioning collaboration and adequate technology support. Thus the application contexts and requirements of prospective users of supportive technologies warrant attention. Whereas research in Human-computer interaction (HCI) and Computer-supported cooperative work (CSCW) has extensively explored technology-enabled content moderation\, there are no works systematically involving reporting center staff in the study of the activities of this type of organization. This thesis approaches this gap by empirically investigating through a qualitative content analysis of semi-structured expert interviews with reporting center staff (N=14) how information and communication technologies can contribute to online hate speech gathering\, analysis\, and response by German reporting centers. Moreover\, it is explored how inter- and intra-organizational collaboration facilitates these activities. This work contributes to the state of research with observations on organizational structures\, strategies\, collaborative practices\, and technology support (1)\, empirically substantiated challenges (2)\, and an ideal-typical workflow model (3) of the centers\, as well as with design\, research\, and policy implications to improve their technology support and performance (4). \nBetreuerin: Dr. Thea Riebe\nPrüfer: Prof. Dr. Dr. Christian Reuter\, Dr. Julian Junk
URL:https://peasec.de/event/kolloquium-julian-baeumler-inter-organizational-online-hate-speech-gathering-analysis-and-response-a-qualitative-study-with-german-reporting-centers/
CATEGORIES:Kolloquium
END:VEVENT
BEGIN:VEVENT
DTSTART;VALUE=DATE:20230905
DTEND;VALUE=DATE:20230910
DTSTAMP:20260404T211208
CREATED:20230607T131838Z
LAST-MODIFIED:20230607T131838Z
UID:15497-1693872000-1694303999@peasec.de
SUMMARY:PEC 2023: Vortrag von Stefka Schmid „Trust in AI: Visions of Artificial Intelligence Securing Governmental Interests”
DESCRIPTION:Genaues Datum und der Uhrzeit des Vortrags wird noch veröffentlicht.
URL:https://peasec.de/event/pec-2023-vortrag-von-stefka-schmid-trust-in-ai-visions-of-artificial-intelligence-securing-governmental-interests/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=Europe/Berlin:20230912T113000
DTEND;TZID=Europe/Berlin:20230912T120000
DTSTAMP:20260404T211208
CREATED:20230911T061633Z
LAST-MODIFIED:20230912T091900Z
UID:15954-1694518200-1694520000@peasec.de
SUMMARY:Masterarbeit im Studiengang Elektrotechnik und Informationstechnk von Ignacio Collado: Cyber Situational Awareness for Computer Emergency Response Teams: Design and Evaluation of an Automated Alerting and Sharing System
DESCRIPTION:Abstract: Computer emergency response teams (CERTs) of the public sector provide advisory\, preventive\, and reactive cybersecurity services for authorities\, citizens\, and enterprises. However\, their tasks of monitoring\, analyzing\, and communicating threats to establish cyber situational awareness are getting more complex due to the increasing information volume disseminated through public channels. Besides the time-consuming data collection for incident handling and daily reporting\, CERTs are often confronted with irrelevant\, redundant\, or incredible information\, exacerbating the time-critical prevention of and response to cyber threats. This thesis presents the design of an alerting and sharing component of the Cyber Threat Observatory\, which is an automatic\, cross-platform and real-time cybersecurity dashboard. Based on semi-structured interviews (N=8)\, one design iteration and scenario-based evaluation sessions (N=6) with CERT-EU and EC employees from Belgium\, France\, Greece\, Italy\, and Spain\, it discusses design implications around automatization and alert detection\, personalization and customizability\, data export and refinement\, as well as data source integration. \n  \nBetreuer*in: Dr. Tobias Meuser\, Dr. Marc-André Kaufhold \nPrüfer: Prof. Dr. Ralf Steinmetz\, Prof. Dr. Dr. Christian Reuter
URL:https://peasec.de/event/masterarbeit-im-studiengang-elektrotechnik-und-informationstechnk-von-ignacio-collado-cyber-situational-awareness-for-computer-emergency-response-teams-design-and-evaluation-of-an-automated-alerting/
CATEGORIES:Kolloquium
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=Europe/Berlin:20230915T111500
DTEND;TZID=Europe/Berlin:20230915T130000
DTSTAMP:20260404T211208
CREATED:20230626T151436Z
LAST-MODIFIED:20230626T152332Z
UID:15550-1694776500-1694782800@peasec.de
SUMMARY:Disputation Thomas Reinhold: "Towards a Peaceful Development of Cyberspace: Challenges and Technical Measures for the De-Escalation of State-Led Cyber Conflicts and Arms Control of Cyber Weapons"
DESCRIPTION:Abstract:\nCyberspace\, already a few decades old\, has become a matter of course for most of us\, part of our everyday life. At the same time\, this space and the global infrastructure behind it are essential for our civilizations\, the economy and administration\, and thus an essential expression and lifeline of a globalized world. However\, these developments also create vulnerabilities and thus\, cyberspace is increasingly developing into an intelligence and military operational area – for the defense and security of states but also as a component of offensive military planning\, visible in the creation of military cyber departments and the integration of cyberspace into states’ security and defense strategies. In order to contain and regulate the conflict and escalation potential of technology used by military forces\, over the last decades\, a complex toolset of transparency\, de-escalation and arms control measures has been developed and proof-tested. Unfortunately\, many of these established measures do not work for cyberspace due to its specific technical characteristics. Even more\, the concept of what constitutes a weapon – an essential requirement for regulation – starts to blur for this domain.\nAgainst this background\, this thesis aims to answer how measures for the de-escalation of state-led conflicts in cyberspace and arms control of cyber weapons can be developed? In order to answer this question\, the dissertation takes a specifically technical perspective on these problems and the underlying political challenges of state behaviour and international humanitarian law in cyberspace to identify starting points for technical measures of transparency\, arms control and verification.\nBased on this approach of adopting already existing technical measures from other fields of the computer science\, the thesis will provide proof of concepts approaches for some of the mentioned challenges like a classification system for cyberweapons that is based on technical measurable features\, an approach for the mutual reduction of vulnerability stockpiles\, an approach to prove the non-involvement in a cyber conflict and solutions for the challenge of marking identifying civilian and consequently to be protected IT systems in the cyberspace.\nAll these initial approaches and the questions of how and by which measures arms control and conflict reduction can work for cyberspace are still quite new and subject to not too many debates. Indeed\, the approach of deliberately self-restricting the capabilities of technology in order to serve a bigger goal\, like the reduction of its destructive usage\, is yet not very common for the engineering thinking of computer science.\nTherefore this dissertation also aims to provide some impulses regarding the responsibility and creative options of the computer science with a view to the peaceful development and use of cyberspace. \nFreitag\, 15. September 2023\, 11:15-13:00 Uhr im CYSEC-Gebäude\n(Gebäudenummer: S2/20; Anschrift: Pankratiusstr. 2\, Darmstadt\, Raum: 9). \n\n11:15h öffentlicher Vortrag von 30min\n11:45h Wissenschaftliches Gespräch von 60min\n12:45h Interne Kommissionssitzung und Ergebnisverkündung\nab 13:00h Empfang
URL:https://peasec.de/event/disputation-thomas-reinhold-towards-a-peaceful-development-of-cyberspace-challenges-and-technical-measures-for-the-de-escalation-of-state-led-cyber-conflicts-and-arms-control-of-cyber-weapons/
CATEGORIES:Disputation
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=Europe/Berlin:20230918T113000
DTEND;TZID=Europe/Berlin:20230918T120000
DTSTAMP:20260404T211208
CREATED:20230906T075858Z
LAST-MODIFIED:20230917T160813Z
UID:15942-1695036600-1695038400@peasec.de
SUMMARY:Masterarbeit von Jordan Dieudonné: Identifying and detecting inconsistencies in IT-Security knowledge bases
DESCRIPTION:Abstract: As society becomes increasingly dependent on infrastructures that require large amounts of computing power to function\, it is more necessary than ever to protect the systems in use from failures and attacks. IT-security professionals secure these systems by leveraging information from knowledge bases that cover various concepts such as weaknesses\, vulnerabilities\, and attack patterns. Given the increasing number of software vulnerabilities reported each year\, as well as discovered changes that impact previously discovered vulnerabilities\, providing accurate information is challenging. However\, it is necessary to maintain consistency across different knowledge bases to provide IT security professionals with the most accurate information so they can take appropriate protection and countermeasures. This study examines current knowledge bases that provide open information and the IT security concepts they cover\, with the goal of defining and identifying inconsistencies between them. By using a compact security ontology covering different data sources\, a means of automatic inconsistency detection is created. The inconsistencies identified are analyzed and the findings shed light on some of the challenges in providing accurate vulnerability information. We identify inconsistencies between the NVD\, CWE\, and CAPEC by using and comparing information about the stated prerequisites and requirements. In addition\, we identify inconsistent vulnerability mapping between NVD and OSV\, as well as indications of inconsistent descriptions and affected versions between the two sources. The results underscore the importance of the work being done to detect and clean up inconsistencies\, while providing considerations for further research in this area. \nBetreuer: Philipp Kühn\, M.Sc.\nPrüfer: Prof. Dr. Dr. Christian Reuter
URL:https://peasec.de/event/masterarbeit-von-jordan-dieudonne-identifying-and-detecting-inconsistencies-in-it-security-knowledge-bases/
CATEGORIES:Kolloquium
END:VEVENT
BEGIN:VEVENT
DTSTART;VALUE=DATE:20230920
DTEND;VALUE=DATE:20230923
DTSTAMP:20260404T211208
CREATED:20230822T113556Z
LAST-MODIFIED:20230822T113633Z
UID:15809-1695168000-1695427199@peasec.de
SUMMARY:Science Peace Security 2023 in Darmstadt
DESCRIPTION:
URL:https://peasec.de/event/science-peace-security-2023-in-darmstadt/
ATTACH;FMTTYPE=image/png:https://peasec.de/wp-content/uploads/2023/06/sps-conference-logo-23-01.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=Europe/Berlin:20230925T080000
DTEND;TZID=Europe/Berlin:20230925T170000
DTSTAMP:20260404T211208
CREATED:20230925T090158Z
LAST-MODIFIED:20230925T090158Z
UID:16127-1695628800-1695661200@peasec.de
SUMMARY:Bachelorarbeit im Studiengang Informatik von Vladyslav Zbykovskyi: Analyse der Rolle von Cyberangriffen im hybriden Krieg Russlands in der Ukraine: Eine OSINT-basierte Untersuchung von sozialen Netzwerken und Online-Nachrichten
DESCRIPTION:Abstract:Diese Bachelorarbeit untersucht die Rolle von Cyberangriffen in Kriegen\, insbesondere im russischen Angriffskrieg. Der Schwerpunkt liegt auf der Analyse von OSINT\, um die genaue Funktion von Cyberangriffen in der Informationskriegsführung zu ergründen und deren Diskussion in der Gesellschaft zu beleuchten. Besonders im Fokus steht die Untersuchung von Nachrichten auf der Social-Networking-Plattform Telegram und deren Auswirkungen auf verschiedene Teile der ukrainischen Gesellschaft. Eine umfassende Charakterisierung der verschiedenen Arten von Cyberbedrohungen\, die Russland gegen die Ukraine einsetzt\, wurde durchgeführt. Die Ergebnisse dieser Untersuchung dienen als Leitfaden für den Umgang mit Cyberangriffen und bieten Empfehlungen zur Entwicklung wirksamer Gegenmaßnahmen. Auf diese Weise trägt diese Arbeit dazu bei\, die Herausforderungen im Bereich der Cybersicherheit und der Informationskriegsführung in einer zunehmend digitalisierten Welt besser zu bewältigen. \nBetreuer*in: Stefka Schmid\, M.A.\nPrüfer: Prof. Dr. Dr. Christian Reuter
URL:https://peasec.de/event/bachelorarbeit-im-studiengang-informatik-von-vladyslav-zbykovskyi-analyse-der-rolle-von-cyberangriffen-im-hybriden-krieg-russlands-in-der-ukraine-eine-osint-basierte-untersuchung-von-sozialen-netzwe/
CATEGORIES:Kolloquium
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=Europe/Berlin:20230925T093000
DTEND;TZID=Europe/Berlin:20230925T100000
DTSTAMP:20260404T211208
CREATED:20230828T060511Z
LAST-MODIFIED:20230828T060511Z
UID:15862-1695634200-1695636000@peasec.de
SUMMARY:Masterarbeit im Studiengang IT Security von Jacob Oehler: Self-Reports and Actual Privacy Behaviour on Social  Media: The Privacy Paradox Revisited
DESCRIPTION:Datum: Montag\, 25.09.2023 \nVortrag (15min) um 09:30; Diskussion (10min) bis 09:55 \n  \nMasterarbeit im Studiengang IT Security von Jacob Oehler: \nSelf-Reports and Actual Privacy Behaviour on Social  Media: The Privacy Paradox Revisited \nAbstract In this thesis\, we address the intriguing phenomenon known as the privacy paradox in the context of social media. Previous work has reported a dissonance between individuals’ stated privacy attitudes and their actual behaviour on popular social media platforms\, the so-called privacy paradox. Building on existing research and theory\, we chose an approach involving the calculation of a privacy score to assess both users’ privacy attitudes and their observed behaviours. We collected survey data on attitudes and used data scraping techniques to collect behavioural information. Through statistical analysis\, we uncovered the relationship between users’ self-reported privacy concerns and their online actions. Our findings shed light on the complex interplay between privacy perceptions and behaviours in the dynamic landscape of social media\, and contribute to a deeper understanding of the privacy paradox phenomenon \n  \nBetreuer*in: M.Sc. Tom Biselli \nPrüfer: Prof. Dr. Dr. Christian Reuter
URL:https://peasec.de/event/masterarbeit-im-studiengang-it-security-von-jacob-oehler-self-reports-and-actual-privacy-behaviour-on-social-media-the-privacy-paradox-revisited/
CATEGORIES:Kolloquium
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=Europe/Berlin:20230925T100000
DTEND;TZID=Europe/Berlin:20230925T103000
DTSTAMP:20260404T211208
CREATED:20230828T060540Z
LAST-MODIFIED:20230911T061242Z
UID:15864-1695636000-1695637800@peasec.de
SUMMARY:Masterarbeit im Studiengang Cognitive Science von Felix Schmitt: How Information Sovereignty Combines the Concepts of Privacy and Misinformation and How It Could Guide Future Research
DESCRIPTION:Datum: Montag\, 25.09.2023 \nVortrag (15min) um 09:55; Diskussion (10min) bis 10:20 \n  \nMasterarbeit im Studiengang Cognitive Science von Felix Schmitt: \nHow Information Sovereignty Combines the Concepts of Privacy and Misinformation and How It Could Guide Future Research \nAbstract: During the last decades\, misinformation and privacy became two of the most prominent and extensively researched topics related to the Internet. Especially  on social media\, users are constantly challenged to determine which incoming information they deem credible\, and which  outgoing information they feel comfortable revealing about themselves. Regardless\,  there are little to no approaches tackling both concepts together. By  conducting a literature review\, this thesis aims to determine if “personal information  sovereignty” serves as a useful concept for their combination\, focusing  on the users control over their personal data. For this\, definitions of  the relevant terms such as information and sovereignty are revisited. Then\, it is investigated where privacy and misinformation  overlap\, how they influence each other\, why it makes sense to combine  them and which implications can be deduced from these findings. Central  commonalities include their focus on the flow\, diffusion and overload of information\, the challenges stemming from the  impenetrability of the digital information space\, the different degrees  of assistance users need\, and the promising possibilities of improving  media literacy. Analyzing the existing research on these topics shows that “personal information sovereignty” can serve  as a helpful concept to address these issues. It has to be noted\,  though\, that concepts are applied differently in diverse scenarios and  by various researchers\, therefore rendering its wide application unforeseeable. \n  \nBetreuer*in: M.Sc. Tom Biselli \nPrüfer: Prof. Dr. Dr. Christian Reuter
URL:https://peasec.de/event/masterarbeit-im-studiengang-cognitive-science-von-felix-schmitt-how-information-sovereignty-combines-the-concepts-of-privacy-and-misinformation-and-how-it-could-guide-future-research/
CATEGORIES:Kolloquium
END:VEVENT
END:VCALENDAR