Unsere Forschung wird zum einen aus Landesmitteln der TU Darmstadt sowie zu großen Teilen in drittmittelfinanzierten (BMBF, HMWK, DFG und BMEL) Forschungsprojekten realisiert.

Aktuelle Projekte

ATHENE-SecFOCI: Security of Fiber-Optic Critical Infrastructures (01.01.2024-31.12.2027, BMBF+HMWK)

Data-transmitting technologies have become a focus point for public security concerns since the NordStream sabotages, the BalticConnector incident, and various critical communication infrastructure outages in recent years. The project SecFOCI aims to assess, map, and counter emerging vulnerabilities in the material internet infrastructure, explicitly focusing on fiber-optic critical infrastructures (FOCI):

  1. Assessment: SecFOCI aims to systematize knowledge about the security of cables by conceptualizing fiber optics as critical infrastructures. It aims to understand current protection measures, their incorporation into security strategies, and their representation in research. The project also explores potential future developments that could impact the security of FOCI and maps the literature landscape to identify structural characteristics.
  2. Mapping: Next, it strengthens technical and empirical analysis of FOCI by identifying threat scenarios, mapping the material internet using graph theory and network analysis, applying scenarios to assess the consequences of physical infrastructure failures, and developing a visual simulation tool for stress testing.
  3. Countering: Lastly, the project aims to provide actionable recommendations for operators and authorities to enhance the resilience of global and regional transmission networks, create readable visualizations of vulnerabilities in the material internet backbone, and synthesize security and protection strategies.

SecFOCI acknowledges the multidisciplinary nature of the research subject, combining perspectives from cyber security, engineering, political science, geography, economics, and history. It emphasizes the need to bridge the gap between security-related internet research on the physical and logical layers of digital networks and aims to contribute to understanding the structural origins of fiber-optic data cable networks. The approach involves five work packages covering systematic literature analysis, design and analysis of network models, scenario analysis, user studies, surveys, and interviews.

ATHENE – Nationales Forschungszentrum für angewandte Cybersicherheit (seit 1.1.2019, BMBF+HMWK) – Website

Das Nationale Forschungs­zentrum für angewandte Cyber­sicher­heit ATHENE ist eine Forschungseinrichtung der Fraunhofer-Institute SIT und IGD sowie der Hochschulen TU Darmstadt und Hochschule Darmstadt. In einem bisher einzigartigen und innovativen Kooperations­modell von universitärer und außeruniversitärer Forschung betreibt ATHENE Spitzenforschung zum Wohl von Wirtschaft, Gesellschaft und Staat und setzt Impulse in der Wissenschaft. Das Forschungs­zentrum arbeitet agil und effizient und kann so auch kurzfristig auf neue He­raus­for­de­rung­en und veränderte Bedroh­ungs­lagen reagieren. ATHENE wird gefördert vom Bundesministerium für Bildung und Forschung (BMBF) und vom Hessischen Ministerium für Wissenschaft und Kunst (HMWK) und hat seinen Standort in der Wissen­schafts­stadt Darmstadt, Deutschlands erster Adresse für Cyber­sicher­heits­for­schung.

2024

  • Jasmin Haunschild, Laura Guntrum, Sofía Cerrillo, Franziska Bujara, Christian Reuter (2024)
    Towards a Digitally Mediated Transitional Justice Process? An Analysis of Colombian Transitional Justice Organisations’ Posting Behaviour on Facebook
    Peace and Conflict Studies .
    [BibTeX] [Abstract]

    In Colombia, Transitional Justice (TJ) institutions were established after years of violent conflict as part of the 2016 peace agreement between the FARC and the Colombian government. By analysing the posting behaviour of the government-appointed TJ institutions on Facebook, we show how general TJ aims and opportunities for citizen participation were promoted in 2019. Our analysis reveals that the organisations rarely address topics related to reconciliation and that active online participation and two-way communication are rather scarce. Instead, Facebook is mainly used by the TJ organisations to increase solidarity with victims and disseminate information about their work and the TJ process. Reflecting on existing literature on TJ and social media participation, we identify great potential for expanding TJ goals and community engagement on social media, to use it as a resource for facilitating the TJ processes, creating exchange, and enabling participation.

    @article{haunschild_towards_2024,
    title = {Towards a {Digitally} {Mediated} {Transitional} {Justice} {Process}? {An} {Analysis} of {Colombian} {Transitional} {Justice} {Organisations}’ {Posting} {Behaviour} on {Facebook}},
    abstract = {In Colombia, Transitional Justice (TJ) institutions were established after years of violent conflict as part of the 2016 peace agreement between the FARC and the Colombian government. By analysing the posting behaviour of the government-appointed TJ institutions on Facebook, we show how general TJ aims and opportunities for citizen participation were promoted in 2019. Our analysis reveals that the organisations rarely address topics related to reconciliation and that active online participation and two-way communication are rather scarce. Instead, Facebook is mainly used by the TJ organisations to increase solidarity with victims and disseminate information about their work and the TJ process. Reflecting on existing literature on TJ and social media participation, we identify great potential for expanding TJ goals and community engagement on social media, to use it as a resource for facilitating the TJ processes, creating exchange, and enabling participation.},
    journal = {Peace and Conflict Studies},
    author = {Haunschild, Jasmin and Guntrum, Laura and Cerrillo, Sofía and Bujara, Franziska and Reuter, Christian},
    year = {2024},
    keywords = {SocialMedia, Student, Peace, Projekt-ATHENE-SecUrban},
    }

  • Franz Kuntke (2024)
    Resilient Smart Farming: Crisis-Capable Information and Communication Technologies for Agriculture
    Wiesbaden, Germany: Springer Vieweg.
    [BibTeX]

    @book{kuntke_resilient_2024,
    address = {Wiesbaden, Germany},
    title = {Resilient {Smart} {Farming}: {Crisis}-{Capable} {Information} and {Communication} {Technologies} for {Agriculture}},
    publisher = {Springer Vieweg},
    author = {Kuntke, Franz},
    year = {2024},
    keywords = {Crisis, HCI, UsableSec, Security, RSF, Projekt-ATHENE-SecUrban, Projekt-emergenCITY, Dissertation},
    }

  • Jasmin Haunschild (2024)
    Enhancing Citizens’ Role in Public Safety: Interaction, Perception and Design of Mobile Warning Apps
    Darmstadt, Germany: Dissertation (Dr. rer. nat.), Department of Computer Science, Technische Universität Darmstadt.
    [BibTeX]

    @book{haunschild_enhancing_2024,
    address = {Darmstadt, Germany},
    title = {Enhancing {Citizens}’ {Role} in {Public} {Safety}: {Interaction}, {Perception} and {Design} of {Mobile} {Warning} {Apps}},
    publisher = {Dissertation (Dr. rer. nat.), Department of Computer Science, Technische Universität Darmstadt},
    author = {Haunschild, Jasmin},
    year = {2024},
    keywords = {Crisis, HCI, Projekt-ATHENE-SecUrban, Projekt-emergenCITY, Dissertation},
    }

  • Jasmin Haunschild (2024)
    Enhancing Citizens’ Role in Public Safety: Interaction, Perception and Design of Mobile Warning Apps
    Wiesbaden, Germany: Springer Vieweg.
    [BibTeX]

    @book{haunschild_enhancing_2024-1,
    address = {Wiesbaden, Germany},
    title = {Enhancing {Citizens}’ {Role} in {Public} {Safety}: {Interaction}, {Perception} and {Design} of {Mobile} {Warning} {Apps}},
    publisher = {Springer Vieweg},
    author = {Haunschild, Jasmin},
    year = {2024},
    keywords = {Crisis, HCI, Projekt-ATHENE-SecUrban, Projekt-emergenCITY, Dissertation},
    }

  • Felix Burger, Jasmin Haunschild, Christian Reuter (2024)
    Understanding Crisis Preparedness: Insights from Personal Values, Beliefs, Social Norms, and Personal Norms
    Proceedings of the 17th International Conference on Information Systems for Crisis Response and Management (ISCRAM) .
    [BibTeX] [Abstract]

    In disasters and crises, individual household preparedness is crucial for societal resilience. However, motivating citizens to take personal responsibility and to implement preparedness measures remains challenging. This study investigates the impact of values, beliefs and norms on preparedness. Through a survey on resource-oriented crisis preparedness and participants’ values, a group of rather prepared and rather unprepared people was differentiated. We quantitatively analyzed the correlation between values and crisis preparedness. Quantitative analysis revealed a significant association between benevolence as a value and higher preparedness. Follow-up interviews (N=30) delved into participants‘ beliefs and norms, showing minimal group differences. While crisis preparedness is mildly positively viewed, strong negativity exists towards perceived “hoarders” or “preppers.” The study discusses implication for crisis communication and the design of nudges and persuasive systems, emphasizing the role of benevolence in fostering preparedness.

    @inproceedings{burger_understanding_2024,
    title = {Understanding {Crisis} {Preparedness}: {Insights} from {Personal} {Values}, {Beliefs}, {Social} {Norms}, and {Personal} {Norms}},
    abstract = {In disasters and crises, individual household preparedness is crucial for societal resilience. However, motivating citizens to take personal responsibility and to implement preparedness measures remains challenging. This study investigates the impact of values, beliefs and norms on preparedness. Through a survey on resource-oriented crisis preparedness and participants’ values, a group of rather prepared and rather unprepared people was differentiated. We quantitatively analyzed the correlation between values and crisis preparedness. Quantitative analysis revealed a significant association between benevolence as a value and higher preparedness. Follow-up interviews (N=30) delved into participants' beliefs and norms, showing minimal group differences. While crisis preparedness is mildly positively viewed, strong negativity exists towards perceived “hoarders” or “preppers.” The study discusses implication for crisis communication and the design of nudges and persuasive systems, emphasizing the role of benevolence in fostering preparedness.},
    booktitle = {Proceedings of the 17th {International} {Conference} on {Information} {Systems} for {Crisis} {Response} and {Management} ({ISCRAM})},
    author = {Burger, Felix and Haunschild, Jasmin and Reuter, Christian},
    year = {2024},
    keywords = {Crisis, Student, Projekt-ATHENE-SecUrban, Projekt-emergenCITY},
    }

    2023

  • Stefka Schmid, Laura Guntrum, Steffen Haesler, Lisa Schultheiß, Christian Reuter (2023)
    Digital Volunteers During the COVID-19 Pandemic: Care Work on Social Media for Socio-technical Resilience
    Weizenbaum Journal of the Digital Society ;3(1). doi:10.34669/WI.WJDS/3.3.6
    [BibTeX] [Abstract] [Download PDF]

    Like past crises, the COVID-19 pandemic has also activated individual volunteers to help to respond to the crisis. This includes digital volunteers, who have organized physical aid and conducted activities on social media. Analyzing German volunteering support groups on Facebook and related Reddit threads in the context of the COVID-19 pandemic, we {\textbackslash}updatedshow what type of help is offered and how social media users interact with each other, trying to cope with the situation. We reveal that most users offering help online conduct mostly typical care work, such as buying groceries or giving advice. Crucially, volunteering is characterized by relationships of care and thus builds on affirmative interactions. Albeit some misdirected offers and regressive interruptions, people use the possibility to make their voices heard and, showing empathy, help each other to cope with crisis. Social media like Facebook mediate societal structures, including relationships of care, offering a space for continuous, cumulatively resilient conduct of care work. Reflecting on the traditional division of labor in crisis volunteering and counter-productive dynamics of care and empathy, we aim for feminist ethics of care which allows for interactions on social media that foster generative computer-supported collaboration.

    @article{schmid_digital_2023,
    title = {Digital {Volunteers} {During} the {COVID}-19 {Pandemic}: {Care} {Work} on {Social} {Media} for {Socio}-technical {Resilience}},
    volume = {3},
    issn = {2748-5625},
    url = {https://ojs.weizenbaum-institut.de/index.php/wjds/article/view/78},
    doi = {10.34669/WI.WJDS/3.3.6},
    abstract = {Like past crises, the COVID-19 pandemic has also activated individual volunteers to help to respond to the crisis. This includes digital volunteers, who have organized physical aid and conducted activities on social media. Analyzing German volunteering support groups on Facebook and related Reddit threads in the context of the COVID-19 pandemic, we {\textbackslash}updatedshow what type of help is offered and how social media users interact with each other, trying to cope with the situation. We reveal that most users offering help online conduct mostly typical care work, such as buying groceries or giving advice. Crucially, volunteering is characterized by relationships of care and thus builds on affirmative interactions. Albeit some misdirected offers and regressive interruptions, people use the possibility to make their voices heard and, showing empathy, help each other to cope with crisis. Social media like Facebook mediate societal structures, including relationships of care, offering a space for continuous, cumulatively resilient conduct of care work. Reflecting on the traditional division of labor in crisis volunteering and counter-productive dynamics of care and empathy, we aim for feminist ethics of care which allows for interactions on social media that foster generative computer-supported collaboration.},
    number = {1},
    journal = {Weizenbaum Journal of the Digital Society},
    author = {Schmid, Stefka and Guntrum, Laura and Haesler, Steffen and Schultheiß, Lisa and Reuter, Christian},
    month = may,
    year = {2023},
    keywords = {Crisis, HCI, SocialMedia, Student, Peace, Projekt-ATHENE-SecUrban, Projekt-emergenCITY, Projekt-TraCe},
    }

  • Thomas Reinhold, Christian Reuter (2023)
    Preventing the escalation of cyber conflicts: towards an approach to plausibly assure the non-involvement in a cyberattack
    Zeitschrift für Friedens- und Konfliktforschung (ZeFKo) ;12(1):31–58. doi:10.1007/s42597-023-00099-7
    [BibTeX] [Abstract] [Download PDF]

    While cyberspace has evolved into a commonly shared space vital to our individual lives and societies, malicious cyber activities by state actors as part of espionage operations, regarding defense strategies, or as part of traditional conflicts have strongly increased. In contrast, attributing the origin of such activities remains problematic. The ambiguity of digital data raises the problem of misinterpreting available information, increasing the risk of misinformed reactions and conflict escalation. In order to reduce this risk, this paper proposes a transparency system based on technologies which usually already exist for IT security measures that an accused actor in a specific incident can use to provide credible information which plausibly assures his non-involvement. The paper analyses the technical requirements, presents the technical concept and discusses the necessary adjustments to existing IT networks for its implementation. Intended as a measure for conflict de-escalation, the paper further discusses the limitations of this approach, especially with regard to technical limits as well as the political motivation and behavior of states.

    @article{reinhold_preventing_2023,
    title = {Preventing the escalation of cyber conflicts: towards an approach to plausibly assure the non-involvement in a cyberattack},
    volume = {12},
    issn = {2524-6976},
    url = {https://doi.org/10.1007/s42597-023-00099-7},
    doi = {10.1007/s42597-023-00099-7},
    abstract = {While cyberspace has evolved into a commonly shared space vital to our individual lives and societies, malicious cyber activities by state actors as part of espionage operations, regarding defense strategies, or as part of traditional conflicts have strongly increased. In contrast, attributing the origin of such activities remains problematic. The ambiguity of digital data raises the problem of misinterpreting available information, increasing the risk of misinformed reactions and conflict escalation. In order to reduce this risk, this paper proposes a transparency system based on technologies which usually already exist for IT security measures that an accused actor in a specific incident can use to provide credible information which plausibly assures his non-involvement. The paper analyses the technical requirements, presents the technical concept and discusses the necessary adjustments to existing IT networks for its implementation. Intended as a measure for conflict de-escalation, the paper further discusses the limitations of this approach, especially with regard to technical limits as well as the political motivation and behavior of states.},
    number = {1},
    journal = {Zeitschrift für Friedens- und Konfliktforschung (ZeFKo)},
    author = {Reinhold, Thomas and Reuter, Christian},
    month = apr,
    year = {2023},
    keywords = {Security, Peace, Projekt-CROSSING, Projekt-ATHENE-SecUrban},
    pages = {31--58},
    }

  • Philipp Kuehn, Mike Schmidt, Markus Bayer, Christian Reuter (2023)
    ThreatCrawl: A BERT-based Focused Crawler for the Cybersecurity Domain
    2023.
    [BibTeX] [Abstract] [Download PDF]

    Publicly available information contains valuable information for Cyber Threat Intelligence (CTI). This can be used to prevent attacks that have already taken place on other systems. Ideally, only the initial attack succeeds and all subsequent ones are detected and stopped. But while there are different standards to exchange this information, a lot of it is shared in articles or blog posts in non-standardized ways. Manually scanning through multiple online portals and news pages to discover new threats and extracting them is a time-consuming task. To automize parts of this scanning process, multiple papers propose extractors that use Natural Language Processing (NLP) to extract Indicators of Compromise (IOCs) from documents. However, while this already solves the problem of extracting the information out of documents, the search for these documents is rarely considered. In this paper, a new focused crawler is proposed called ThreatCrawl, which uses Bidirectional Encoder Representations from Transformers (BERT)-based models to classify documents and adapt its crawling path dynamically. While ThreatCrawl has difficulties to classify the specific type of Open Source Intelligence (OSINT) named in texts, e.g., IOC content, it can successfully find relevant documents and modify its path accordingly. It yields harvest rates of up to 52\%, which are, to the best of our knowledge, better than the current state of the art.

    @techreport{kuehn_threatcrawl_2023,
    title = {{ThreatCrawl}: {A} {BERT}-based {Focused} {Crawler} for the {Cybersecurity} {Domain}},
    shorttitle = {{ThreatCrawl}},
    url = {http://arxiv.org/abs/2304.11960},
    abstract = {Publicly available information contains valuable information for Cyber Threat Intelligence (CTI). This can be used to prevent attacks that have already taken place on other systems. Ideally, only the initial attack succeeds and all subsequent ones are detected and stopped. But while there are different standards to exchange this information, a lot of it is shared in articles or blog posts in non-standardized ways. Manually scanning through multiple online portals and news pages to discover new threats and extracting them is a time-consuming task. To automize parts of this scanning process, multiple papers propose extractors that use Natural Language Processing (NLP) to extract Indicators of Compromise (IOCs) from documents. However, while this already solves the problem of extracting the information out of documents, the search for these documents is rarely considered. In this paper, a new focused crawler is proposed called ThreatCrawl, which uses Bidirectional Encoder Representations from Transformers (BERT)-based models to classify documents and adapt its crawling path dynamically. While ThreatCrawl has difficulties to classify the specific type of Open Source Intelligence (OSINT) named in texts, e.g., IOC content, it can successfully find relevant documents and modify its path accordingly. It yields harvest rates of up to 52\%, which are, to the best of our knowledge, better than the current state of the art.},
    number = {arXiv:2304.11960},
    urldate = {2023-04-27},
    institution = {arXiv},
    author = {Kuehn, Philipp and Schmidt, Mike and Bayer, Markus and Reuter, Christian},
    month = apr,
    year = {2023},
    note = {arXiv:2304.11960 [cs]},
    keywords = {Student, Security, Projekt-ATHENE-SecUrban, Projekt-CYWARN},
    }

  • Philipp Kuehn, David N. Relke, Christian Reuter (2023)
    Common vulnerability scoring system prediction based on open source intelligence information sources
    Computers & Security . doi:10.1016/j.cose.2023.103286
    [BibTeX] [Abstract] [Download PDF]

    The number of newly published vulnerabilities is constantly increasing. Until now, the information available when a new vulnerability is published is manually assessed by experts using a ()cvss vector and score. This assessment is time consuming and requires expertise. Various works already try to predict vectors or scores using machine learning based on the textual descriptions of the vulnerability to enable faster assessment. However, for this purpose, previous works only use the texts available in databases such as nvd. With this work, the publicly available web pages referenced in the nvd are analyzed and made available as sources of texts through web scraping. A dl based method for predicting the vector is implemented and evaluated. The present work provides a classification of the nvd’s reference texts based on the suitability and crawlability of their texts. While we identified the overall influence of the additional texts is negligible, we outperformed the state-of-the-art with our dl prediction models.

    @article{kuehn_common_2023,
    title = {Common vulnerability scoring system prediction based on open source intelligence information sources},
    url = {https://peasec.de/paper/2023/2023_KuehnRelkeReuter_CommonVulnerabilityScoringSystemOSINT_CompSec.pdf},
    doi = {10.1016/j.cose.2023.103286},
    abstract = {The number of newly published vulnerabilities is constantly increasing. Until now, the information available when a new vulnerability is published is manually assessed by experts using a ()cvss vector and score. This assessment is time consuming and requires expertise. Various works already try to predict vectors or scores using machine learning based on the textual descriptions of the vulnerability to enable faster assessment. However, for this purpose, previous works only use the texts available in databases such as nvd. With this work, the publicly available web pages referenced in the nvd are analyzed and made available as sources of texts through web scraping. A dl based method for predicting the vector is implemented and evaluated. The present work provides a classification of the nvd’s reference texts based on the suitability and crawlability of their texts. While we identified the overall influence of the additional texts is negligible, we outperformed the state-of-the-art with our dl prediction models.},
    journal = {Computers \& Security},
    author = {Kuehn, Philipp and Relke, David N. and Reuter, Christian},
    year = {2023},
    keywords = {Student, UsableSec, Security, Ranking-ImpactFactor, Ranking-CORE-B, Projekt-ATHENE-SecUrban, Projekt-CYWARN},
    }

  • Verena Zimmermann, Jasmin Haunschild, Alina Stöver, Nina Gerber (2023)
    Safe AND Secure Infrastructures? – Studying Human Aspects of Safety and Security Incidents with Experts from both Domains
    Mensch und Computer – Workshopband Rapperswil, Switzerland. doi:10.18420/muc2023-mci-ws01-225
    [BibTeX] [Abstract] [Download PDF]

    In today’s digitalized and interconnected world, the traditionally distinct concepts security and safety are increasingly intertwined. For example, a cyber attack on a hospital can negatively impact the patients’ physical safety. Thus, security research and practice should consider these interactions. To explore human-related challenges at the intersection of safety and security, we conducted three focus group workshops with N= 16 experts from both domains. We introduced two scenarios leading to a power outage, one with a safety-related cause (snow storm) and one with a security-related cause (cyber attack). The experts discussed interactions, differences and parallels in coping with the scenarios. Additionally, potential solutions for building response capacity by including volunteers were explored. The findings indicate similar consequences resulting from the safety- vs. security-related incidents. However, the experts identified relevant differences in the challenges preparing for and coping with the scenarios. While security-related challenges included the incalculable time horizon, impact and cascading effects as well as lack of emergency plans and training, safety challengesmainly concerned accessibility of the affected area. The implications for future work are discussed.

    @inproceedings{zimmermann_safe_2023,
    address = {Rapperswil, Switzerland},
    title = {Safe {AND} {Secure} {Infrastructures}? – {Studying} {Human} {Aspects} of {Safety} and {Security} {Incidents} with {Experts} from both {Domains}},
    url = {https://dl.gi.de/items/9c1d2bd5-229f-4db0-a764-6126cf92ef5f},
    doi = {10.18420/muc2023-mci-ws01-225},
    abstract = {In today’s digitalized and interconnected world, the traditionally distinct concepts security and safety are increasingly intertwined. For example, a cyber attack on a hospital can negatively impact the patients’ physical safety. Thus, security research and practice should consider these interactions. To explore human-related challenges at the intersection of safety and security, we conducted three focus group workshops with N= 16 experts from both domains. We introduced two scenarios leading to a power outage, one with a safety-related cause (snow storm) and one with a security-related cause (cyber attack). The experts discussed interactions, differences and parallels in coping with the scenarios. Additionally, potential solutions for building response capacity by including volunteers were explored. The findings indicate similar consequences resulting from the safety- vs. security-related incidents. However, the experts identified relevant differences in the challenges preparing for and coping with the scenarios. While security-related challenges included the incalculable time horizon, impact and cascading effects as well as lack of emergency plans and training, safety challengesmainly concerned accessibility of the affected area. The implications for future work are discussed.},
    language = {de},
    booktitle = {Mensch und {Computer} - {Workshopband}},
    publisher = {Gesellschaft für Informatik e.V.},
    author = {Zimmermann, Verena and Haunschild, Jasmin and Stöver, Alina and Gerber, Nina},
    year = {2023},
    keywords = {Security, Peace, Projekt-ATHENE-SecUrban, Projekt-GRKPrivacy},
    }

  • Stefka Schmid (2023)
    Safe and Secure? Visions of Military Human-Computer Interaction
    Mensch und Computer – Workshopband Rapperswil, Switzerland. doi:10.18420/muc2023-mci-ws01-365
    [BibTeX] [Abstract] [Download PDF]

    Safety-critical human-computer interaction has focused on technology use in life-critical situations, including military operations. Due to the practical relevance of HCI and disciplinary debates about human-centered design, this literature review studies HCI scholarships’ visions of military human-computer interaction. Through text analysis and categorization of publications, it is found that interaction is envisioned to take place in the context of both missionoriented operational (e.g., target detection) as well as organizational tasks (e.g., military training). While artificial intelligence, virtual/augmented reality, and robots are most frequently defined as technological environments, goals, such as situation awareness, enjoyment, and trust are predominantly associated with them. Considering scholarly references to application contexts and different factors of the context of use allows to systematically approach how military human-computer interaction is imagined. Offering insight into research trends in HCI, this first overview of research endeavors also contributes to interdisciplinary debates, such as Security Studies and technology assessment.

    @inproceedings{schmid_safe_2023,
    address = {Rapperswil, Switzerland},
    title = {Safe and {Secure}? {Visions} of {Military} {Human}-{Computer} {Interaction}},
    url = {https://dl.gi.de/items/841cc5bd-8e25-40de-804f-8fb4fedddf11},
    doi = {10.18420/muc2023-mci-ws01-365},
    abstract = {Safety-critical human-computer interaction has focused on technology use in life-critical situations, including military operations. Due to the practical relevance of HCI and disciplinary debates about human-centered design, this literature review studies HCI scholarships’ visions of military human-computer interaction. Through text analysis and categorization of publications, it is found that interaction is envisioned to take place in the context of both missionoriented operational (e.g., target detection) as well as organizational tasks (e.g., military training). While artificial intelligence, virtual/augmented reality, and robots are most frequently defined as technological environments, goals, such as situation awareness, enjoyment, and trust are predominantly associated with them. Considering scholarly references to application contexts and different factors of the context of use allows to systematically approach how military human-computer interaction is imagined. Offering insight into research trends in HCI, this first overview of research endeavors also contributes to interdisciplinary debates, such as Security Studies and technology assessment.},
    language = {de},
    booktitle = {Mensch und {Computer} - {Workshopband}},
    publisher = {Gesellschaft für Informatik e.V.},
    author = {Schmid, Stefka},
    year = {2023},
    keywords = {Peace, Projekt-ATHENE-SecUrban, Projekt-TraCe},
    }

  • Jonas Franken, Marco Zivkovic, Nadja Thiessen, Jens Ivo Engels, Christian Reuter (2023)
    Das Netz hat Geschichte: Historisch-technische Analyse der kritischen Infrastrukturen in der Region Rhein/Main
    In: : INFORMATIK 2023 – Designing Futures: Zukünfte gestalten. Bonn: Gesellschaft für Informatik e. V., , 1–6. doi:10.18420/inf2023_159
    [BibTeX] [Abstract] [Download PDF]

    Kritische Infrastrukturen sind häufig über Jahrzehnte gewachsene, komplexe Netze. Dennoch fehlt derzeit die historische Perspektive auf die Aufschichtungstendenzen von Technologien in den Sektoren, die für die Gesellschaft essenzielle Dienste bereitstellen. Ein besseres Verständnis von Ausbreitungs-, Ausbau-, Ersatz- und Ausmusterungsprozessen kann Entscheidungshilfe und Orientierung für resilientere Versorgungsnetzarchitekturen in der Zukunft geben. Kompatibilitätsprobleme mit Legacy-Soft- und Hardware sind bekannte Phänomene in vielen KRITIS-Einrichtungen. Entsprechend gewinnen Wissens- und Erfahrungstransfers bei zunehmend komplexen, dennoch über Jahrzehnte verwendete Technologien in landwirtschaftlichen Betrieben enorm an Bedeutung. Der Beitrag vollzieht die Konzeption und Fragestellungen eines interdisziplinären Forschungsprojekts nach, in welchem die Verwundbarkeit der kritischen Infrastruktursektoren Verkehr und Kommunikation im Rhein-Main-Gebiet analysiert wird. Von den Leistungen beider Sektoren hängt die digitale Landwirtschaft stark ab. Insbesondere rurale, beim digitalen und Schienennetzausbau häufig vernachlässigte Gebiete werden dabei mittels explorativer Interviewstudie und anschließender archivbasierter, quantitativer Überprüfung der zuvor generierten Hypothesen aus einer raum-zeitlichen und technischen Perspektive untersucht.

    @incollection{franken_netz_2023,
    address = {Bonn},
    title = {Das {Netz} hat {Geschichte}: {Historisch}-technische {Analyse} der kritischen {Infrastrukturen} in der {Region} {Rhein}/{Main}},
    url = {https://peasec.de/paper/2023/2023_FrankenZivkovicThiessenEngelsReuter_NetzGeschichte_GI.pdf},
    abstract = {Kritische Infrastrukturen sind häufig über Jahrzehnte gewachsene, komplexe Netze. Dennoch fehlt derzeit die historische Perspektive auf die Aufschichtungstendenzen von Technologien in den Sektoren, die für die Gesellschaft essenzielle Dienste bereitstellen. Ein besseres Verständnis von Ausbreitungs-, Ausbau-, Ersatz- und Ausmusterungsprozessen kann Entscheidungshilfe und Orientierung für resilientere Versorgungsnetzarchitekturen in der Zukunft geben. Kompatibilitätsprobleme mit Legacy-Soft- und Hardware sind bekannte Phänomene in vielen KRITIS-Einrichtungen. Entsprechend gewinnen Wissens- und Erfahrungstransfers bei zunehmend komplexen, dennoch über Jahrzehnte verwendete Technologien in landwirtschaftlichen Betrieben enorm an Bedeutung. Der Beitrag vollzieht die Konzeption und Fragestellungen eines interdisziplinären Forschungsprojekts nach, in welchem die Verwundbarkeit der kritischen Infrastruktursektoren Verkehr und Kommunikation im Rhein-Main-Gebiet analysiert wird. Von den Leistungen beider Sektoren hängt die digitale Landwirtschaft stark ab. Insbesondere rurale, beim digitalen und Schienennetzausbau häufig vernachlässigte Gebiete werden dabei mittels explorativer Interviewstudie und anschließender archivbasierter, quantitativer Überprüfung der zuvor generierten Hypothesen aus einer raum-zeitlichen und technischen Perspektive untersucht.},
    booktitle = {{INFORMATIK} 2023 - {Designing} {Futures}: {Zukünfte} gestalten},
    publisher = {Gesellschaft für Informatik e. V.},
    author = {Franken, Jonas and Zivkovic, Marco and Thiessen, Nadja and Engels, Jens Ivo and Reuter, Christian},
    year = {2023},
    doi = {10.18420/inf2023_159},
    keywords = {Security, Infrastructure, Projekt-ATHENE-SecUrban, Projekt-emergenCITY, Projekt-AgriRegio},
    pages = {1--6},
    }

  • Marco Zivkovic, Jonas Franken, Nadja Thiessen, Jens Ivo Engels, Christian Reuter (2023)
    Infrastrukturen und historisches Wissen: Eine interdisziplinäre Analyse der Resilienz von Schienen- und Kabelnetzen
    Tagungsband Fachtagung Katastrophenforschung 2023 Leoben.
    [BibTeX] [Abstract] [Download PDF]

    Im Forschungsprojekt “ Das Netz hat Geschichte: Netzwerk- und Vulnerabilitätsanalyse Kritischer Infrastrukturen am Beispiel IKT und Verkehr in Rhein/Main”“ wird das historische Wachstum von IKT- und Schieneninfrastrukturnetzen, sowie daraus erwachsene Konsequenzen für deren Vulnerabilitäten am Beispiel der Rhein-Main-Region interdisziplinär untersucht. Beide Infrastrukturnetze entstanden über Jahrzehnte hinweg und sind das Ergebnis verschiedener Interessen und technischer Entwicklungen aus unterschiedlichen Zeitschichten. Dies beeinflusst die Widerstandsfähigkeit der Netze und birgt potenzielle Risiken. Anhand von ca. 20 Expert:inneninterviews soll das Wissen von Praktiker:innen über das Alter, die Ausbreitung, technische Neuerungen und deren Auswirkungen analysiert werden. Die Forschung basiert auf dem Zeitschichtenmodell von Koselleck, das es ermöglicht, die verschiedenen zeitlichen Ebenen der Infrastrukturentwicklung zu analysieren. Die Ergebnisse der semi-strukturierten Interviewstudie zum impliziten Wissen der Befragten werden genutzt, um Hypothesen zu generieren, die später mittels Archivstudien und Netzwerkanalysen überprüft werden. Die gewonnenen Erkenntnisse können zur Stärkung der Resilienz von Infrastrukturen, insbesondere bei Katastrophenszenarien regionalen Ausmaßes, und zukünftigen Investitionsentscheidungen beitragen.

    @inproceedings{zivkovic_infrastrukturen_2023,
    address = {Leoben},
    title = {Infrastrukturen und historisches {Wissen}: {Eine} interdisziplinäre {Analyse} der {Resilienz} von {Schienen}- und {Kabelnetzen}},
    isbn = {978-3-900397-11-1},
    url = {https://peasec.de/paper/2023/2023_ZivkovicFrankenThiessenEngelsReuter_InfrastrukturenHistorischesWissen_FKF23.pdf},
    abstract = {Im Forschungsprojekt " Das Netz hat Geschichte: Netzwerk- und Vulnerabilitätsanalyse Kritischer Infrastrukturen am Beispiel IKT und Verkehr in Rhein/Main”" wird das historische Wachstum von IKT- und Schieneninfrastrukturnetzen, sowie daraus erwachsene Konsequenzen für deren Vulnerabilitäten am Beispiel der Rhein-Main-Region interdisziplinär untersucht. Beide Infrastrukturnetze entstanden über Jahrzehnte hinweg und sind das Ergebnis verschiedener Interessen und technischer Entwicklungen aus unterschiedlichen Zeitschichten. Dies beeinflusst die Widerstandsfähigkeit der Netze und birgt potenzielle Risiken. Anhand von ca. 20 Expert:inneninterviews soll das Wissen von Praktiker:innen über das Alter, die Ausbreitung, technische Neuerungen und deren Auswirkungen analysiert werden. Die Forschung basiert auf dem Zeitschichtenmodell von Koselleck, das es ermöglicht, die verschiedenen zeitlichen Ebenen der Infrastrukturentwicklung zu analysieren. Die Ergebnisse der semi-strukturierten Interviewstudie zum impliziten Wissen der Befragten werden genutzt, um Hypothesen zu generieren, die später mittels Archivstudien und Netzwerkanalysen überprüft werden. Die gewonnenen Erkenntnisse können zur Stärkung der Resilienz von Infrastrukturen, insbesondere bei Katastrophenszenarien regionalen Ausmaßes, und zukünftigen Investitionsentscheidungen beitragen.},
    booktitle = {Tagungsband {Fachtagung} {Katastrophenforschung} 2023},
    publisher = {Disaster Competence Network Austria},
    author = {Zivkovic, Marco and Franken, Jonas and Thiessen, Nadja and Engels, Jens Ivo and Reuter, Christian},
    year = {2023},
    keywords = {Crisis, Security, Infrastructure, Projekt-ATHENE-SecUrban, Projekt-emergenCITY, Projekt-NetzGeschichte},
    }

  • Thomas Reinhold, Philipp Kuehn, Daniel Günther, Thomas Schneider, Christian Reuter (2023)
    ExTRUST: Reducing Exploit Stockpiles With a Privacy-Preserving Depletion Systems for Inter-State Relationships
    IEEE Transactions on Technology and Society ;4(2):158–170. doi:10.1109/TTS.2023.3280356
    [BibTeX] [Abstract] [Download PDF]

    Cyberspace is a fragile construct threatened by malicious cyber operations of different actors, with vulnerabilities in IT hardware and software forming the basis for such activities, thus also posing a threat to global IT security. Advancements in the field of artificial intelligence accelerate this development, either with artificial intelligence enabled cyber weapons, automated cyber defense measures, or artificial intelligence-based threat and vulnerability detection. Especially state actors, with their long-term strategic security interests, often stockpile such knowledge of vulnerabilities and exploits to enable their military or intelligence service cyberspace operations. While treaties and regulations to limit these developments and to enhance global IT security by disclosing vulnerabilities are currently being discussed on the international level, these efforts are hindered by state concerns about the disclosure of unique knowledge and about giving up tactical advantages. This leads to a situation where multiple states are likely to stockpile at least some identical exploits, with technical measures to enable a depletion process for these stockpiles that preserve state secrecy interests and consider the special constraints of interacting states as well as the requirements within such environments being non-existent. This paper proposes such a privacy-preserving approach that allows multiple state parties to privately compare their stock of vulnerabilities and exploits to check for items that occur in multiple stockpiles without revealing them so that their disclosure can be considered. We call our system ExTRUST and show that it is scalable and can withstand several attack scenarios. Beyond the intergovernmental setting, ExTRUST can also be used for other zero-trust use cases, such as bug-bounty programs.

    @article{reinhold_extrust_2023,
    title = {{ExTRUST}: {Reducing} {Exploit} {Stockpiles} {With} a {Privacy}-{Preserving} {Depletion} {Systems} for {Inter}-{State} {Relationships}},
    volume = {4},
    url = {https://peasec.de/paper/2023/2023_ReinholdKuehnGuentherSchneiderReuter_ExTrust-ehem-BlockED_TTaS.pdf},
    doi = {10.1109/TTS.2023.3280356},
    abstract = {Cyberspace is a fragile construct threatened by malicious cyber operations of different actors, with vulnerabilities in IT hardware and software forming the basis for such activities, thus also posing a threat to global IT security. Advancements in the field of artificial intelligence accelerate this development, either with artificial intelligence enabled cyber weapons, automated cyber defense measures, or artificial intelligence-based threat and vulnerability detection. Especially state actors, with their long-term strategic security interests, often stockpile such knowledge of vulnerabilities and exploits to enable their military or intelligence service cyberspace operations. While treaties and regulations to limit these developments and to enhance global IT security by disclosing vulnerabilities are currently being discussed on the international level, these efforts are hindered by state concerns about the disclosure of unique knowledge and about giving up tactical advantages. This leads to a situation where multiple states are likely to stockpile at least some identical exploits, with technical measures to enable a depletion process for these stockpiles that preserve state secrecy interests and consider the special constraints of interacting states as well as the requirements within such environments being non-existent. This paper proposes such a privacy-preserving approach that allows multiple state parties to privately compare their stock of vulnerabilities and exploits to check for items that occur in multiple stockpiles without revealing them so that their disclosure can be considered. We call our system ExTRUST and show that it is scalable and can withstand several attack scenarios. Beyond the intergovernmental setting, ExTRUST can also be used for other zero-trust use cases, such as bug-bounty programs.},
    number = {2},
    journal = {IEEE Transactions on Technology and Society},
    author = {Reinhold, Thomas and Kuehn, Philipp and Günther, Daniel and Schneider, Thomas and Reuter, Christian},
    year = {2023},
    keywords = {Selected, Student, A-Paper, Peace, Projekt-CROSSING, AuswahlPeace, Cyberwar, Projekt-ATHENE-SecUrban, Projekt-GRKPrivacy},
    pages = {158--170},
    }

  • Jasmin Haunschild, Selina Pauli, Christian Reuter (2023)
    Preparedness Nudging for Warning Apps? A Mixed-Method Study Investigating Popularity and Effects of Preparedness Alerts in Warning Apps
    International Journal on Human-Computer Studies (IJHCS) ;172:102995. doi:https://doi.org/10.1016/j.ijhcs.2023.102995
    [BibTeX] [Abstract] [Download PDF]

    Warning apps are used by many to receive warnings about imminent disasters. However, their potential for increasing awareness about general hazards and for increasing preparedness is currently underused. With a mixed-method design that includes a representative survey of the German population, a design workshop and an app evaluation experiment, this study investigates users’ preferences regarding non-acute preparedness alerts’ inclusion in crisis apps and the effectiveness of Nudging in this context. The experiment shows that while the social influence nudge had no significant effect compared to the control group without a nudging condition, the confrontational nudge increased the number of taken recommended preparedness measures. The evaluation indicates that the preparedness alerts increased users’ knowledge and their motivation to use a warning app. This motivation is, in contrast, decreased when the messages are perceived as a disruption. While many oppose push notifications, favor finding persuasively designed preparedness advice in a separate menu or as an optional notification.

    @article{haunschild_preparedness_2023,
    title = {Preparedness {Nudging} for {Warning} {Apps}? {A} {Mixed}-{Method} {Study} {Investigating} {Popularity} and {Effects} of {Preparedness} {Alerts} in {Warning} {Apps}},
    volume = {172},
    issn = {1071-5819},
    url = {https://peasec.de/paper/2023/2023_HaunschildPauliReuter_NudgingWarningApps_IJHCS.pdf},
    doi = {https://doi.org/10.1016/j.ijhcs.2023.102995},
    abstract = {Warning apps are used by many to receive warnings about imminent disasters. However, their potential for increasing awareness about general hazards and for increasing preparedness is currently underused. With a mixed-method design that includes a representative survey of the German population, a design workshop and an app evaluation experiment, this study investigates users’ preferences regarding non-acute preparedness alerts’ inclusion in crisis apps and the effectiveness of Nudging in this context. The experiment shows that while the social influence nudge had no significant effect compared to the control group without a nudging condition, the confrontational nudge increased the number of taken recommended preparedness measures. The evaluation indicates that the preparedness alerts increased users’ knowledge and their motivation to use a warning app. This motivation is, in contrast, decreased when the messages are perceived as a disruption. While many oppose push notifications, favor finding persuasively designed preparedness advice in a separate menu or as an optional notification.},
    journal = {International Journal on Human-Computer Studies (IJHCS)},
    author = {Haunschild, Jasmin and Pauli, Selina and Reuter, Christian},
    year = {2023},
    keywords = {AuswahlCrisis, Crisis, Selected, Student, A-Paper, Ranking-ImpactFactor, Projekt-ATHENE-SecUrban, Projekt-emergenCITY},
    pages = {102995},
    }

  • Thomas Reinhold, Helene Pleil, Christian Reuter (2023)
    Challenges for Cyber Arms Control: A Qualitative Expert Interview Study
    Zeitschrift für Außen- und Sicherheitspolitik (ZfAS) ;16(3):289–310. doi:10.1007/s12399-023-00960-w
    [BibTeX] [Abstract] [Download PDF]

    The militarization of cyberspace has been a topic in international fora and scientific debates for several years. However, the development of applicable, and verifiable arms control measures that can effectively reduce the risk of military escalations in cyberspace is still hindered by the characteristics of this domain. The article analyses challenges and obstacles of dual-use, proliferation, constant technological progress, the importance of the private sector, difficulties in defining and verifying weapons and difficulties in attributing attacks.

    @article{reinhold_challenges_2023,
    title = {Challenges for {Cyber} {Arms} {Control}: {A} {Qualitative} {Expert} {Interview} {Study}},
    volume = {16},
    issn = {1866-2196},
    url = {https://doi.org/10.1007/s12399-023-00960-w},
    doi = {10.1007/s12399-023-00960-w},
    abstract = {The militarization of cyberspace has been a topic in international fora and scientific debates for several years. However, the development of applicable, and verifiable arms control measures that can effectively reduce the risk of military escalations in cyberspace is still hindered by the characteristics of this domain. The article analyses challenges and obstacles of dual-use, proliferation, constant technological progress, the importance of the private sector, difficulties in defining and verifying weapons and difficulties in attributing attacks.},
    number = {3},
    journal = {Zeitschrift für Außen- und Sicherheitspolitik (ZfAS)},
    author = {Reinhold, Thomas and Pleil, Helene and Reuter, Christian},
    month = aug,
    year = {2023},
    keywords = {Security, Peace, Projekt-CROSSING, Projekt-ATHENE-SecUrban},
    pages = {289--310},
    }

  • Markus Bayer, Marc-André Kaufhold, Christian Reuter (2023)
    A Survey on Data Augmentation for Text Classification
    ACM Computing Surveys (CSUR) ;55(7):1–39. doi:10.1145/3544558
    [BibTeX] [Abstract] [Download PDF]

    Data augmentation, the artificial creation of training data for machine learning by transformations, is a widely studied research field across machine learning disciplines. While it is useful for increasing a model’s generalization capabilities, it can also address many other challenges and problems, from overcoming a limited amount of training data, to regularizing the objective, to limiting the amount data used to protect privacy. Based on a precise description of the goals and applications of data augmentation and a taxonomy for existing works, this survey is concerned with data augmentation methods for textual classification and aims to provide a concise and comprehensive overview for researchers and practitioners. Derived from the taxonomy, we divide more than 100 methods into 12 different groupings and give state-of-the-art references expounding which methods are highly promising by relating them to each other. Finally, research perspectives that may constitute a building block for future work are provided.

    @article{bayer_survey_2023,
    title = {A {Survey} on {Data} {Augmentation} for {Text} {Classification}},
    volume = {55},
    url = {https://dl.acm.org/doi/pdf/10.1145/3544558},
    doi = {10.1145/3544558},
    abstract = {Data augmentation, the artificial creation of training data for machine learning by transformations, is a widely studied research field across machine learning disciplines. While it is useful for increasing a model's generalization capabilities, it can also address many other challenges and problems, from overcoming a limited amount of training data, to regularizing the objective, to limiting the amount data used to protect privacy. Based on a precise description of the goals and applications of data augmentation and a taxonomy for existing works, this survey is concerned with data augmentation methods for textual classification and aims to provide a concise and comprehensive overview for researchers and practitioners. Derived from the taxonomy, we divide more than 100 methods into 12 different groupings and give state-of-the-art references expounding which methods are highly promising by relating them to each other. Finally, research perspectives that may constitute a building block for future work are provided.},
    number = {7},
    journal = {ACM Computing Surveys (CSUR)},
    author = {Bayer, Markus and Kaufhold, Marc-André and Reuter, Christian},
    year = {2023},
    keywords = {AuswahlCrisis, Crisis, Selected, A-Paper, Ranking-CORE-A*, Ranking-ImpactFactor, Projekt-ATHENE-SecUrban, Projekt-CYWARN, Projekt-emergenCITY, AuswahlKaufhold},
    pages = {1--39},
    }

  • Steffen Haesler, Marc Wendelborn, Christian Reuter (2023)
    Getting the Residents‘ Attention: The Perception of Warning Channels in Smart Home Warning Systems
    Proceedings of the ACM Designing Interactive Systems Conference (DIS) New York, NY, USA. doi:10.1145/3563657.3596076
    [BibTeX] [Abstract] [Download PDF]

    About half a billion households are expected to use smart home systems by 2025. Although many IoT sensors, such as smoke detectors or security cameras, are available and governmental crisis warning systems are in place, little is known about how to warn appropriately in smart home environments. We created a Raspberry Pi based prototype with a speaker, a display, and a connected smart light bulb. Together with a focus group, we developed a taxonomy for warning messages in smart home environments, dividing them into five classes with different stimuli. We evaluated the taxonomy using the Experience Sampling Method (ESM) in a field study at participants‘ (N = 13) homes testing 331 warnings. The results show that taxonomy-based warning stimuli are perceived to be appropriate and participants could imagine using such a warning system. We propose a deeper integration of warning capabilities into smart home environments to enhance the safety of citizens.

    @inproceedings{haesler_getting_2023,
    address = {New York, NY, USA},
    series = {{DIS} '23},
    title = {Getting the {Residents}' {Attention}: {The} {Perception} of {Warning} {Channels} in {Smart} {Home} {Warning} {Systems}},
    isbn = {978-1-4503-9893-0},
    url = {https://peasec.de/paper/2023/2023_HaeslerWendelbornReuter_SmartHomeWarningSystems_DIS},
    doi = {10.1145/3563657.3596076},
    abstract = {About half a billion households are expected to use smart home systems by 2025. Although many IoT sensors, such as smoke detectors or security cameras, are available and governmental crisis warning systems are in place, little is known about how to warn appropriately in smart home environments. We created a Raspberry Pi based prototype with a speaker, a display, and a connected smart light bulb. Together with a focus group, we developed a taxonomy for warning messages in smart home environments, dividing them into five classes with different stimuli. We evaluated the taxonomy using the Experience Sampling Method (ESM) in a field study at participants' (N = 13) homes testing 331 warnings. The results show that taxonomy-based warning stimuli are perceived to be appropriate and participants could imagine using such a warning system. We propose a deeper integration of warning capabilities into smart home environments to enhance the safety of citizens.},
    booktitle = {Proceedings of the {ACM} {Designing} {Interactive} {Systems} {Conference} ({DIS})},
    publisher = {Association for Computing Machinery},
    author = {Haesler, Steffen and Wendelborn, Marc and Reuter, Christian},
    year = {2023},
    note = {event-place: Pittsburgh, PA, USA},
    keywords = {Crisis, HCI, Student, A-Paper, Ranking-CORE-A, Projekt-ATHENE-SecUrban, Projekt-emergenCITY},
    pages = {1114--1127},
    }

  • Laura Guntrum, Sebastian Schwartz, Christian Reuter (2023)
    Dual-Use Technologies in the Context of Autonomous Driving: An Empirical Case Study From Germany
    Zeitschrift für Außen- und Sicherheitspolitik (ZfAS) . doi:10.1007/s12399-022-00935-3
    [BibTeX] [Abstract] [Download PDF]

    The article examines which technical aspects of autonomous driving are potentially transferable to the military sector. Through expert interviews the strong fragmentation of technologies in the field of autonomous driving becomes apparent. This hinders the clear identification of a specific dual-use technology. Environmental perception, artificial intelligence and sensors are considered to have the highest transferability rate from civil research to the military sector. Therefore, sensor development should receive special attention.

    @article{guntrum_dual-use_2023,
    title = {Dual-{Use} {Technologies} in the {Context} of {Autonomous} {Driving}: {An} {Empirical} {Case} {Study} {From} {Germany}},
    issn = {1866-2196},
    url = {https://doi.org/10.1007/s12399-022-00935-3},
    doi = {10.1007/s12399-022-00935-3},
    abstract = {The article examines which technical aspects of autonomous driving are potentially transferable to the military sector. Through expert interviews the strong fragmentation of technologies in the field of autonomous driving becomes apparent. This hinders the clear identification of a specific dual-use technology. Environmental perception, artificial intelligence and sensors are considered to have the highest transferability rate from civil research to the military sector. Therefore, sensor development should receive special attention.},
    journal = {Zeitschrift für Außen- und Sicherheitspolitik (ZfAS)},
    author = {Guntrum, Laura and Schwartz, Sebastian and Reuter, Christian},
    month = jan,
    year = {2023},
    keywords = {Peace, Projekt-ATHENE-SecUrban, Projekt-TraCe},
    }

  • Thomas Reinhold, Christian Reuter (2023)
    Zur Debatte über die Einhegung eines Cyberwars: Analyse militärischer Cyberaktivitäten im Krieg Russlands gegen die Ukraine
    Zeitschrift für Friedens- und Konfliktforschung (ZeFKo) . doi:10.1007/s42597-023-00094-y
    [BibTeX] [Abstract] [Download PDF]

    Der Überfall Russlands auf die Ukraine und der sich anschließende Krieg haben neben vielen anderen sicherheitspolitischen Gewissheiten auch zum ersten Mal die Rolle des Cyberspace in einem offenen Angriffskrieg demonstriert und bedenkenswerte Entwicklungen offenbart. Ziel dieses Beitrags ist es, die militärischen Aktivitäten im Cyberspace im Rahmen des Krieges Russlands gegen die Ukraine auf der Grundlage der öffentlich verfügbaren Informationen zu analysieren und im Hinblick auf die bis dato gängigen Vorstellungen eines Cyberwars zu bewerten. Darauf aufbauend werden mögliche Schlussfolgerungen betrachtet, zum einen mit Blick auf die zukünftige Bedeutung von Cyberaktivitäten für Russland, hinsichtlich des generellen militärischen Einsatzes von Cyberwirkmitteln und dessen weiterer Entwicklung, und in Bezug auf zukünftige internationale Debatten zur Einhegung von Cyberwars und des schädigenden Einsatzes von Cyberwirkmitteln.

    @article{reinhold_zur_2023,
    title = {Zur {Debatte} über die {Einhegung} eines {Cyberwars}: {Analyse} militärischer {Cyberaktivitäten} im {Krieg} {Russlands} gegen die {Ukraine}},
    issn = {2524-6976},
    url = {https://doi.org/10.1007/s42597-023-00094-y},
    doi = {10.1007/s42597-023-00094-y},
    abstract = {Der Überfall Russlands auf die Ukraine und der sich anschließende Krieg haben neben vielen anderen sicherheitspolitischen Gewissheiten auch zum ersten Mal die Rolle des Cyberspace in einem offenen Angriffskrieg demonstriert und bedenkenswerte Entwicklungen offenbart. Ziel dieses Beitrags ist es, die militärischen Aktivitäten im Cyberspace im Rahmen des Krieges Russlands gegen die Ukraine auf der Grundlage der öffentlich verfügbaren Informationen zu analysieren und im Hinblick auf die bis dato gängigen Vorstellungen eines Cyberwars zu bewerten. Darauf aufbauend werden mögliche Schlussfolgerungen betrachtet, zum einen mit Blick auf die zukünftige Bedeutung von Cyberaktivitäten für Russland, hinsichtlich des generellen militärischen Einsatzes von Cyberwirkmitteln und dessen weiterer Entwicklung, und in Bezug auf zukünftige internationale Debatten zur Einhegung von Cyberwars und des schädigenden Einsatzes von Cyberwirkmitteln.},
    journal = {Zeitschrift für Friedens- und Konfliktforschung (ZeFKo)},
    author = {Reinhold, Thomas and Reuter, Christian},
    month = mar,
    year = {2023},
    keywords = {Security, Peace, Projekt-ATHENE-SecUrban, Projekt-TraCe},
    }

  • Elise Özalp, Katrin Hartwig, Christian Reuter (2023)
    Trends in Explainable Artificial Intelligence for Non-Experts
    In: Peter Klimczak, Christer Petersen: AI – Limits and Prospects of Artificial Intelligence. Bielefeld: Transcript Verlag, , 223–243.
    [BibTeX] [Abstract] [Download PDF]

    In this paper we provide an overview of XAI by introducing fundamental terminology and the goals of XAI, as well as recent research findings. Whilst doing this, we pay special attention to strategies for non-expert stakeholders. This leads us to our first research question: “What are the trends in explainable AI strategies for non-experts?”. In order to illustrate the current state of these trends, we further want to study an exemplary and very relevant application domain. According to Abdul et al. (2018), one of the first domains where researchers pursued XAI is the medical domain. This leads to our second research question: “What are the approaches of XAI in the medical domain for non-expert stakeholders?” These research questions will provide an overview of current topics in XAI and show possible research extensions for specific domains.

    @incollection{ozalp_trends_2023,
    address = {Bielefeld},
    title = {Trends in {Explainable} {Artificial} {Intelligence} for {Non}-{Experts}},
    url = {https://www.transcript-verlag.de/978-3-8376-5732-6/ai-limits-and-prospects-of-artificial-intelligence/?c=313000019},
    abstract = {In this paper we provide an overview of XAI by introducing fundamental terminology and the goals of XAI, as well as recent research findings. Whilst doing this, we pay special attention to strategies for non-expert stakeholders. This leads us to our first research question: “What are the trends in explainable AI strategies for non-experts?”. In order to illustrate the current state of these trends, we further want to study an exemplary and very relevant application domain. According to Abdul et al. (2018), one of the first domains where researchers pursued XAI is the medical domain. This leads to our second research question: “What are the approaches of XAI in the medical domain for non-expert stakeholders?” These research questions will provide an overview of current topics in XAI and show possible research extensions for specific domains.},
    booktitle = {{AI} - {Limits} and {Prospects} of {Artificial} {Intelligence}},
    publisher = {Transcript Verlag},
    author = {Özalp, Elise and Hartwig, Katrin and Reuter, Christian},
    editor = {Klimczak, Peter and Petersen, Christer},
    year = {2023},
    keywords = {HCI, Student, UsableSec, Projekt-CROSSING, Projekt-ATHENE-SecUrban, Projekt-CYWARN},
    pages = {223--243},
    }

  • Thea Riebe, Julian Bäumler, Marc-André Kaufhold, Christian Reuter (2023)
    Values and Value Conflicts in the Context of OSINT Technologies for Cybersecurity Incident Response: A Value Sensitive Design Perspective
    Computer Supported Cooperative Work: The Journal of Collaborative Computing (JCSCW) . doi:10.1007/s10606-022-09453-4
    [BibTeX] [Abstract] [Download PDF]

    The negotiation of stakeholder values as a collaborative process throughout technology development has been studied extensively within the fields of Computer Supported Cooperative Work and Human-Computer Interaction. Despite their increasing significance for cybersecurity incident response, there is a gap in research on values of importance to the design of open-source intelligence (OSINT) technologies for this purpose. In this paper, we investigate which values and value conflicts emerge due to the application and development of machine learning (ML) based OSINT technologies to assist cyber security incident response operators. For this purpose, we employ a triangulation of methods, consisting of a systematic survey of the technical literature on the development of OSINT artefacts for cybersecurity (N = 73) and an empirical value sensitive design case study, comprising semi-structured interviews with stakeholders (N = 9) as well as a focus group (N = 7) with developers. Based on our results, we identify implications relevant to the research on and design of OSINT artefacts for cybersecurity incident response.

    @article{riebe_values_2023,
    title = {Values and {Value} {Conflicts} in the {Context} of {OSINT} {Technologies} for {Cybersecurity} {Incident} {Response}: {A} {Value} {Sensitive} {Design} {Perspective}},
    url = {https://link.springer.com/article/10.1007/s10606-022-09453-4},
    doi = {10.1007/s10606-022-09453-4},
    abstract = {The negotiation of stakeholder values as a collaborative process throughout technology development has been studied extensively within the fields of Computer Supported Cooperative Work and Human-Computer Interaction. Despite their increasing significance for cybersecurity incident response, there is a gap in research on values of importance to the design of open-source intelligence (OSINT) technologies for this purpose. In this paper, we investigate which values and value conflicts emerge due to the application and development of machine learning (ML) based OSINT technologies to assist cyber security incident response operators. For this purpose, we employ a triangulation of methods, consisting of a systematic survey of the technical literature on the development of OSINT artefacts for cybersecurity (N = 73) and an empirical value sensitive design case study, comprising semi-structured interviews with stakeholders (N = 9) as well as a focus group (N = 7) with developers. Based on our results, we identify implications relevant to the research on and design of OSINT artefacts for cybersecurity incident response.},
    journal = {Computer Supported Cooperative Work: The Journal of Collaborative Computing (JCSCW)},
    author = {Riebe, Thea and Bäumler, Julian and Kaufhold, Marc-André and Reuter, Christian},
    year = {2023},
    keywords = {HCI, Student, UsableSec, Security, A-Paper, Ranking-ImpactFactor, Ranking-CORE-B, Projekt-CROSSING, Projekt-ATHENE-SecUrban, Projekt-CYWARN},
    }

  • Jasmin Haunschild, Leon Jung, Christian Reuter (2023)
    Dual-use in volunteer operations? Attitudes of computer science students regarding the establishment of a cyber security volunteer force
    In: Gerber Nina, Zimmermann Verena: International Symposium on Technikpsychologie (TecPsy). Sciendo, , 66–81.
    [BibTeX] [Abstract] [Download PDF]

    The digitalisation of critical infrastructure has increased the risk of large-scale cyber incidents. In contrast to the management of conventional emergencies by established civil protection organisations involving volunteers in Germany, few response capacities exist for these events. The concept of a volunteer force for cyber security could close this protection gap. However, such involvement also poses practical and ethical challenges. By conducting interviews with computer science students (N = 11), this paper analyses potential volunteers’ attitudes towards ethical implications of a cyber volunteer force, as well as practical aspects that might motivate or hinder their participation. A qualitative content analysis reveals that students are largely unaware of potential dilemmas connected to vulnerabilities handling and national cybersecurity interests. Ethical guidelines and means of motivating and encouraging potential volunteers are discussed.

    @incollection{haunschild_dual-use_2023,
    title = {Dual-use in volunteer operations? {Attitudes} of computer science students regarding the establishment of a cyber security volunteer force},
    isbn = {978-83-66675-89-6},
    url = {https://sciendo.com/chapter/9788366675896/10.2478/9788366675896-006},
    abstract = {The digitalisation of critical infrastructure has increased the risk of large-scale cyber incidents. In contrast to the management of conventional emergencies by established civil protection organisations involving volunteers in Germany, few response capacities exist for these events. The concept of a volunteer force for cyber security could close this protection gap. However, such involvement also poses practical and ethical challenges. By conducting interviews with computer science students (N = 11), this paper analyses potential volunteers’ attitudes towards ethical implications of a cyber volunteer force, as well as practical aspects that might motivate or hinder their participation. A qualitative
    content analysis reveals that students are largely unaware of potential dilemmas connected to vulnerabilities handling and national cybersecurity interests. Ethical guidelines and means of motivating and encouraging potential volunteers
    are discussed.},
    booktitle = {International {Symposium} on {Technikpsychologie} ({TecPsy})},
    publisher = {Sciendo},
    author = {Haunschild, Jasmin and Jung, Leon and Reuter, Christian},
    editor = {Nina, Gerber and Verena, Zimmermann},
    year = {2023},
    keywords = {Crisis, Student, UsableSec, Security, Projekt-ATHENE-SecUrban, Projekt-emergenCITY},
    pages = {66--81},
    }

  • Jonas Franken, Franziska Schneider, Christian Reuter (2023)
    The Internet’s Plumbing Consists of Garden Hoses: A Critical Analysis of the Advantages and Pitfalls of Metaphors Use for Critical Maritime Infrastructures
    Dreizack 23 Kiel.
    [BibTeX] [Download PDF]

    @inproceedings{franken_internets_2023,
    address = {Kiel},
    title = {The {Internet}’s {Plumbing} {Consists} of {Garden} {Hoses}: {A} {Critical} {Analysis} of the {Advantages} and {Pitfalls} of {Metaphors} {Use} for {Critical} {Maritime} {Infrastructures}},
    url = {https://peasec.de/paper/2023/2023_FrankenSchneiderReuter_MetaphernMarKRITIS_Dreizack23.pdf},
    booktitle = {Dreizack 23},
    publisher = {The Kiel Seapower Series},
    author = {Franken, Jonas and Schneider, Franziska and Reuter, Christian},
    editor = {Schilling, Henrik},
    year = {2023},
    keywords = {Security, Peace, Projekt-ATHENE-SecUrban, Projekt-AgriRegio, Projekt-NetzGeschichte},
    pages = {1--8},
    }

    2022

  • Jasmin Haunschild, Marc-André Kaufhold, Christian Reuter (2022)
    Cultural Violence and Fragmentation on Social Media: Interventions and Countermeasures by Humans and Social Bots
    In: Myriam Dunn Cavelty, Andreas Wenger: Cyber Security Politics: Socio-Technological Transformations and Political Fragmentation. Routledge, , 48–63.
    [BibTeX] [Abstract] [Download PDF]

    Mobile technologies and social media services are among the socio-technological innovations that have an enormous impact transforming modern culture and political processes. Social media are often defined as a “group of internet-based applications […] that allow the creation and exchange of user-generated content” (Kaplan and Haenlein 2010). Shaping opinions, politics, participation, and protest (Wulf et al. 2013), they are used by citizens for news consumption and social exchange (Robinson et al. 2017); by journalists for reporting, analyzing, and collecting information (Stieglitz et al. 2018a); and by organizations to monitor crises, emergencies, customer feedback, and sentiment, among others (Haunschild et al. 2020). Large-scale international events, such as the 2010 Arab Spring, showcased the potential of socio-technological transformations: Citizens were not passive victims but active and autonomous participants utilizing social media to coordinate protest and for crisis response (Reuter and Kaufhold 2018). However, in other cases, citizens’ activities coordinated via social media also increased the complexity of tasks and pressure for formal authorities, since the lack of state control has not had only empowering or benign effects. Instead, on social media, false information spreads fast and it is easy for groups to find an audience there, either to enhance their profit or to target vulnerable groups with dangerous ideology.

    @incollection{haunschild_cultural_2022,
    title = {Cultural {Violence} and {Fragmentation} on {Social} {Media}: {Interventions} and {Countermeasures} by {Humans} and {Social} {Bots}},
    isbn = {978-0-367-62674-7},
    url = {https://peasec.de/paper/2022/2022_HaunschildKaufholdReuter_SocialMediaAndFragmentation_Routledge.pdf},
    abstract = {Mobile technologies and social media services are among the socio-technological innovations that have an enormous impact transforming modern culture and political processes. Social media are often defined as a “group of internet-based applications […] that allow the creation and exchange of user-generated content” (Kaplan and Haenlein 2010). Shaping opinions, politics, participation, and protest (Wulf et al. 2013), they are used by citizens for news consumption and social exchange (Robinson et al. 2017); by journalists for reporting, analyzing, and collecting information (Stieglitz et al. 2018a); and by organizations to monitor crises, emergencies, customer feedback, and sentiment, among others (Haunschild et al. 2020). Large-scale international events, such as the 2010 Arab Spring, showcased the potential of socio-technological transformations: Citizens were not passive victims but active and autonomous participants utilizing social media to coordinate protest and for crisis response (Reuter and Kaufhold 2018). However, in other cases, citizens’ activities coordinated via social media also increased the complexity of tasks and pressure for formal authorities, since the lack of state control has not had only empowering or benign effects. Instead, on social media, false information spreads fast and it is easy for groups to find an audience there, either to enhance their profit or to target vulnerable groups with dangerous ideology.},
    booktitle = {Cyber {Security} {Politics}: {Socio}-{Technological} {Transformations} and {Political} {Fragmentation}},
    publisher = {Routledge},
    author = {Haunschild, Jasmin and Kaufhold, Marc-André and Reuter, Christian},
    editor = {Cavelty, Myriam Dunn and Wenger, Andreas},
    year = {2022},
    keywords = {Crisis, SocialMedia, Peace, Projekt-ATHENE-SecUrban, Projekt-CYWARN, Projekt-emergenCITY},
    pages = {48--63},
    }

  • Jonas Franken (2022)
    Seekabel als Maritime Kritische Infrastruktur
    Dreizack 21: Von historischen bis zukünftigen Herausforderungen im maritimen Raum Laboe/Kiel.
    [BibTeX] [Download PDF]

    @inproceedings{franken_seekabel_2022,
    address = {Laboe/Kiel},
    title = {Seekabel als {Maritime} {Kritische} {Infrastruktur}},
    url = {https://www.kielseapowerseries.com/files/ispk/content/workshops/Dreizack/Sammelband zum Dreizack21.pdf},
    booktitle = {Dreizack 21: {Von} historischen bis zukünftigen {Herausforderungen} im maritimen {Raum}},
    author = {Franken, Jonas},
    editor = {Schilling, Henrik},
    year = {2022},
    keywords = {Student, Security, Projekt-ATHENE-SecUrban},
    pages = {22--25},
    }

  • Thomas Reinhold, Christian Reuter (2022)
    Towards a Cyber Weapons Assessment Model – Assessment of the Technical Features of Malicious Software
    IEEE Transactions on Technology and Society ;3(3):226–239. doi:10.1109/TTS.2021.3131817
    [BibTeX] [Abstract] [Download PDF]

    The revelation of the Stuxnet malware in 2010 shed light on the presence of state actors that are willing and capable of developing and using highly sophisticated, specialized malicious software for their political interests. These tools -often dubbed cyber weapons -are expected to become the next major advancement in weaponry technology. Besides the threats of offensive cyber operations for civil IT systems due to the interconnected nature of the cyberspace, international regulation of cyber weapons is -among other aspects -hindered by the fact that the military development and the strategic and tactical deployment of cyber weapons differ significantly from other weapons technologies. In order to establish measures of cyber arms related control treaties, it is crucial to identify these particular characteristics. Based on this premise, the article analyzes the current perspectives on cyber weapons, identifying their weaknesses of being either based on assumptions about adversarial actors or being applicable only after the usage of a malicious tool. In contrast to these approaches, the article focuses on the specific functional aspects of malware and presents an indicator-based assessment model based on parameters that can be measured prior to the application of malicious software. This enables the categorization of malicious tools as cyber weapons. Besides this, the article aims to introduce thought-provoking impulses with regard to social responsibility in computer science.

    @article{reinhold_towards_2022,
    title = {Towards a {Cyber} {Weapons} {Assessment} {Model} – {Assessment} of the {Technical} {Features} of {Malicious} {Software}},
    volume = {3},
    issn = {2637-6415},
    url = {https://peasec.de/paper/2021/2021_ReinholdReuter_CyberWeapons_IEEETransactionsTechnologySociety.pdf},
    doi = {10.1109/TTS.2021.3131817},
    abstract = {The revelation of the Stuxnet malware in 2010 shed light on the presence of state actors that are willing and capable of developing and using highly sophisticated, specialized malicious software for their political interests. These tools -often dubbed cyber weapons -are expected to become the next major advancement in weaponry technology. Besides the threats of offensive cyber operations for civil IT systems due to the interconnected nature of the cyberspace, international regulation of cyber weapons is -among other aspects -hindered by the fact that the military development and the strategic and tactical deployment of cyber weapons differ significantly from other weapons technologies. In order to establish measures of cyber arms related control treaties, it is crucial to identify these particular characteristics. Based on this premise, the article analyzes the current perspectives on cyber weapons, identifying their weaknesses of being either based on assumptions about adversarial actors or being applicable only after the usage of a malicious tool. In contrast to these approaches, the article focuses on the specific functional aspects of malware and presents an indicator-based assessment model based on parameters that can be measured prior to the application of malicious software. This enables the categorization of malicious tools as cyber weapons. Besides this, the article aims to introduce thought-provoking impulses with regard to social responsibility in computer science.},
    language = {en},
    number = {3},
    journal = {IEEE Transactions on Technology and Society},
    author = {Reinhold, Thomas and Reuter, Christian},
    month = sep,
    year = {2022},
    keywords = {A-Paper, Ranking-ImpactFactor, Peace, AuswahlPeace, Cyberwar, Projekt-ATHENE-SecUrban},
    pages = {226--239},
    }

  • Niklas Schörnig, Thomas Reinhold (2022)
    Armament, Arms Control and Artificial Intelligence – The Janus-faced Nature of Machine Learning in the Military Realm
    1 ed. Springer. doi:https://doi.org/10.1007/978-3-031-11043-6
    [BibTeX] [Abstract] [Download PDF]

    Looking at a variety of armament sectors, the book examines how Artificial Intelligence (AI) impacts the fields of armament and arms control, how existing arms control measures will be affected by AI, and what new approaches based on AI have been or are currently developed. The significant increase in computing power, the increasing reliance on software, and the advent of (narrow) AI and deep-learning algorithms all have the potential to lead to disruptive changes for military operations and warfare, rendering many classical arms control instruments less effective, or even useless. On the other hand, AI might lead to completely new arms control approaches, raising the effectiveness and reliability of new verification measures. To provide a common understanding, the book starts by presenting a general introduction to the state of the art in artificial intelligence and arms control, and how the two topics are interrelated. The second part of the book looks at examples from various fields of weapon technology, including weapons of mass destruction (WMD), conventional armament, and emerging technologies. The final section offers a cross-cutting perspective based on the examples presented in the second part. This volume will appeal to students and scholars of international relations, as well as policy-makers and practitioners interested in a better understanding of peace and security studies in general, and armament and arms control in particular with a strong focus on AI.

    @book{schornig_armament_2022,
    edition = {1},
    title = {Armament, {Arms} {Control} and {Artificial} {Intelligence} - {The} {Janus}-faced {Nature} of {Machine} {Learning} in the {Military} {Realm}},
    isbn = {978-3-031-11043-6},
    url = {https://link.springer.com/book/10.1007/978-3-031-11043-6},
    abstract = {Looking at a variety of armament sectors, the book examines how Artificial Intelligence (AI) impacts the fields of armament and arms control, how existing arms control measures will be affected by AI, and what new approaches based on AI have been or are currently developed.
    The significant increase in computing power, the increasing reliance on software, and the advent of (narrow) AI and deep-learning algorithms all have the potential to lead to disruptive changes for military operations and warfare, rendering many classical arms control instruments less effective, or even useless. On the other hand, AI might lead to completely new arms control approaches, raising the effectiveness and reliability of new verification measures. To provide a common understanding, the book starts by presenting a general introduction to the state of the art in artificial intelligence and arms control, and how the two topics are interrelated. The second part of the book looks at examples from various fields of weapon technology, including weapons of mass destruction (WMD), conventional armament, and emerging technologies. The final section offers a cross-cutting perspective based on the examples presented in the second part.
    This volume will appeal to students and scholars of international relations, as well as policy-makers and practitioners interested in a better understanding of peace and security studies in general, and armament and arms control in particular with a strong focus on AI.},
    language = {en},
    publisher = {Springer},
    author = {Schörnig, Niklas and Reinhold, Thomas},
    year = {2022},
    doi = {https://doi.org/10.1007/978-3-031-11043-6},
    keywords = {Security, Peace, Projekt-ATHENE-SecUrban},
    }

  • Thomas Reinhold (2022)
    Arms Control for Artificial Intelligence
    In: Niklas Schörnig, Thomas ReinholdArmament, Arms Control and Artificial Intelligence – The Janus-faced Nature of Machine Learning in the Military Realm. 1 ed. Springer, , 211–226. doi:https://doi.org/10.1007/978-3-031-11043-6_15
    [BibTeX] [Abstract] [Download PDF]

    With military weapon systems getting more and more improved by artificial intelligence and states competing about the leading role in this development, the question arises how arms control measures can be applied to decrease this equipment spiral. The ongoing debates on cyber weapons have already highlighted the problems with controlling or limiting digital technologies, not to mention the dual use problems. While still in an early stage, this chapter develops possible approaches for AI arms control by considering the different life cycle steps of a typical AI enabled system, based on lessons learned from other arms control approaches. It will discuss the different starting points, their arms control potential as well as its limitations to provide a holistic perspective for necessary further develops and debates.

    @incollection{reinhold_arms_2022,
    edition = {1},
    title = {Arms {Control} for {Artificial} {Intelligence}},
    isbn = {978-3-031-11043-6},
    url = {https://peasec.de/paper/2022/2022_Reinhold_ ArmsControlforAI_AI-Book.pdf},
    abstract = {With military weapon systems getting more and more improved by artificial intelligence and states competing about the leading role in this development, the question arises how arms control measures can be applied to decrease this equipment spiral. The ongoing debates on cyber weapons have already highlighted the problems with controlling or limiting digital technologies, not to mention the dual use problems. While still in an early stage, this chapter develops possible approaches for AI arms control by considering the different life cycle steps of a typical AI enabled system, based on lessons learned from other arms control approaches. It will discuss the different starting points, their arms control potential as well as its limitations to provide a holistic perspective for necessary further develops and debates.},
    language = {en},
    booktitle = {Armament, {Arms} {Control} and {Artificial} {Intelligence} - {The} {Janus}-faced {Nature} of {Machine} {Learning} in the {Military} {Realm}},
    publisher = {Springer},
    author = {Reinhold, Thomas},
    editor = {Schörnig, Niklas and Reinhold, Thomas},
    year = {2022},
    doi = {https://doi.org/10.1007/978-3-031-11043-6_15},
    keywords = {Security, Peace, Projekt-ATHENE-SecUrban},
    pages = {211--226},
    }

  • Thomas Reinhold, Christian Reuter (2022)
    Cyber Weapons and Artificial Intelligence: Impact, Influence and the Challenges for Arms Control
    In: Niklas Schörnig, Thomas ReinholdArmament, Arms Control and Artificial Intelligence – The Janus-faced Nature of Machine Learning in the Military Realm. 1 ed. Springer, , 145–158. doi:https://doi.org/10.1007/978-3-031-11043-6_11
    [BibTeX] [Abstract] [Download PDF]

    As cyber weapons and artificial intelligence technologies share the same technological foundation of bits and bytes, there is a strong trend of connecting both, thus addressing the imminent challenge of cyber weapons of processing, filtering and aggregating huge amounts of digital data in real time into decisions and actions. This chapter will analyze this development and highlight the increasing tendency towards AI enabled autonomous decisions in defensive as well as offensive cyber weapons, the arising additional challenges for attributing cyberattacks and the problems for developing arms control measures for this “technology fusion”. However, the article also ventures an outlook how AI methods can help to mitigate these challenges if applied for arms control measures itself.

    @incollection{reinhold_cyber_2022,
    edition = {1},
    title = {Cyber {Weapons} and {Artificial} {Intelligence}: {Impact}, {Influence} and the {Challenges} for {Arms} {Control}},
    isbn = {978-3-031-11043-6},
    url = {https://peasec.de/paper/2022/2022_ReinholdReuter_CyberWeaponsAIImpactInfluenceChallenges_AI-Book.pdf},
    abstract = {As cyber weapons and artificial intelligence technologies share the same technological foundation of bits and bytes, there is a strong trend of connecting both, thus addressing the imminent challenge of cyber weapons of processing, filtering and aggregating huge amounts of digital data in real time into decisions and actions. This chapter will analyze this development and highlight the increasing tendency towards AI enabled autonomous decisions in defensive as well as offensive cyber weapons, the arising additional challenges for attributing cyberattacks and the problems for developing arms control measures for this “technology fusion”. However, the article also ventures an outlook how AI methods can help to mitigate these challenges if applied for arms control measures itself.},
    language = {en},
    booktitle = {Armament, {Arms} {Control} and {Artificial} {Intelligence} - {The} {Janus}-faced {Nature} of {Machine} {Learning} in the {Military} {Realm}},
    publisher = {Springer},
    author = {Reinhold, Thomas and Reuter, Christian},
    editor = {Schörnig, Niklas and Reinhold, Thomas},
    year = {2022},
    doi = {https://doi.org/10.1007/978-3-031-11043-6_11},
    keywords = {Security, Peace, Projekt-ATHENE-SecUrban},
    pages = {145--158},
    }

  • Niklas Schörnig, Thomas Reinhold (2022)
    Introduction
    In: Niklas Schörnig, Thomas ReinholdArmament, Arms Control and Artificial Intelligence – The Janus-faced Nature of Machine Learning in the Military Realm. 1 ed. Springer, , 1–9. doi:https://doi.org/10.1007/978-3-031-11043-6_1
    [BibTeX] [Abstract] [Download PDF]

    In 1987, Allan Din published the seminal book “Arms and Artificial Intelligence,” in which he argued that the future military use of AI would be a double-edged sword. Warning about control failures and accidental war on one hand, Din also pointed out the potential of AI to enhance arms control. 35 years later, what was a niche technology in Din’s day has since become one of the most influential technologies in both the civilian and military sectors. In addition, AI has evolved from sophisticated yet deterministic expert systems to machine learning algorithms. Today, AI is about to be introduced in almost every branch of the military, with a variety of implications for arms control. This book reflects the work of the individual authors and identifies common themes and areas where AI can be used for the greater good or where its use calls for particular vigilance. It offers an essential primer for interested readers, while also encouraging experts from the arms control community to dig more deeply into the issues.

    @incollection{schornig_introduction_2022,
    edition = {1},
    title = {Introduction},
    isbn = {978-3-031-11043-6},
    url = {http://www.peasec.de/paper/2022/2022_SchoernigReinhold_Intro_AI-Book.pdf},
    abstract = {In 1987, Allan Din published the seminal book “Arms and Artificial Intelligence,” in which he argued that the future military use of AI would be a double-edged sword. Warning about control failures and accidental war on one hand, Din also pointed out the potential of AI to enhance arms control. 35 years later, what was a niche technology in Din’s day has since become one of the most influential technologies in both the civilian and military sectors. In addition, AI has evolved from sophisticated yet deterministic expert systems to machine learning algorithms. Today, AI is about to be introduced in almost every branch of the military, with a variety of implications for arms control. This book reflects the work of the individual authors and identifies common themes and areas where AI can be used for the greater good or where its use calls for particular vigilance. It offers an essential primer for interested readers, while also encouraging experts from the arms control community to dig more deeply into the issues.},
    language = {en},
    booktitle = {Armament, {Arms} {Control} and {Artificial} {Intelligence} - {The} {Janus}-faced {Nature} of {Machine} {Learning} in the {Military} {Realm}},
    publisher = {Springer},
    author = {Schörnig, Niklas and Reinhold, Thomas},
    editor = {Schörnig, Niklas and Reinhold, Thomas},
    year = {2022},
    doi = {https://doi.org/10.1007/978-3-031-11043-6_1},
    keywords = {Security, Peace, Projekt-ATHENE-SecUrban},
    pages = {1--9},
    }

  • Jasmin Haunschild, Marc-André Kaufhold, Christian Reuter (2022)
    Perceptions and Use of Warning Apps – Did Recent Crises Lead to Changes in Germany?
    Mensch und Computer – Tagungsband New York. doi:10.1145/3543758.3543770
    [BibTeX] [Abstract] [Download PDF]

    Warning and emergency apps are an integral part of crisis informatics and particularly relevant in countries that currently do not have cell broadcast, such as Germany. Previous studies have shown that such apps are regarded as relevant, but only around 16\% of German citizens used them in 2017 and 2019. With the COVID-19 pandemic and a devastating flash flood, Germany has recently experienced severe crisis-related losses. By comparing data from representative surveys from 2017, 2019 and 2021, this study investigates whether these events have changed the perceptions of warning apps and their usage patterns in Germany. The study shows that while multi-hazard emergency and warning apps have been easily surpassed in usage by COVID-19 contact tracing apps, the use of warning apps has also increased and the pandemic has added new desired features. While these have been little-used during the COVID-19 pandemic, especially non-users see smartphone messengers app channels as possible alternatives to warning apps. In addition, regional warning apps appear promising, possibly because they make choosing a warning app easier when there are several available on the market.

    @inproceedings{haunschild_perceptions_2022,
    address = {New York},
    title = {Perceptions and {Use} of {Warning} {Apps} – {Did} {Recent} {Crises} {Lead} to {Changes} in {Germany}?},
    url = {http://www.peasec.de/paper/2022/2022_HaunschildKaufholdReuter_WarningAppsChangesGermany_MuC.pdf},
    doi = {10.1145/3543758.3543770},
    abstract = {Warning and emergency apps are an integral part of crisis informatics and particularly relevant in countries that currently do not have cell broadcast, such as Germany. Previous studies have shown that such apps are regarded as relevant, but only around 16\% of German citizens used them in 2017 and 2019. With the COVID-19 pandemic and a devastating flash flood, Germany has recently experienced severe crisis-related losses. By comparing data from representative surveys from 2017, 2019 and 2021, this study investigates whether these events have changed the perceptions of warning apps and their usage patterns in Germany. The study shows that while multi-hazard emergency and warning apps have been easily surpassed in usage by COVID-19 contact tracing apps, the use of warning apps has also increased and the pandemic has added new desired features. While these have been little-used during the COVID-19 pandemic, especially non-users see smartphone messengers app channels as possible alternatives to warning apps. In addition, regional warning apps appear promising, possibly because they make choosing a warning app easier when there are several available on the market.},
    language = {en},
    booktitle = {Mensch und {Computer} - {Tagungsband}},
    publisher = {ACM},
    author = {Haunschild, Jasmin and Kaufhold, Marc-André and Reuter, Christian},
    year = {2022},
    keywords = {Crisis, Projekt-ATHENE-SecUrban, Projekt-CYWARN, Projekt-emergenCITY},
    }

  • Sabrina Gabel, Lilian Reichert, Christian Reuter (2022)
    Discussing Conflict in Social Media – The Use of Twitter in the Jammu and Kashmir Conflict
    Media, War & Conflict ;15(4):1–26.
    [BibTeX] [Abstract] [Download PDF]

    Social media have come to play a vital role not only in our everyday lives, but also in times of conflict and crisis such as natural disasters or civil wars. Recent research has highlighted, on the one hand, the use of social media as a means of recruitment by terrorists and, on the other hand, the use of Facebook, Twitter etc. to gain the support of the population during insurgencies. This article conducts a qualitative content analysis of content on Twitter concerning the conflict in the Jammu and Kashmir region. The tweets following the death of a popular militant, Burhan Wani, cover three different themes: (1) criticism of intellectuals, (2) Burhan Wani’s impact on the conflict, and (3) tweets referring to the conflict itself. Generally, people use Twitter to make their own point of view clear to others and discredit the opposing party, at the same time tweets are reflecting the antagonism between the two parties to the conflict, India and Pakistan. The sample of tweets reflects the lack of awareness among people in the region regarding the motivations of the new generation of militancy emerging in Kashmir after 1990.

    @article{gabel_discussing_2022,
    title = {Discussing {Conflict} in {Social} {Media} – {The} {Use} of {Twitter} in the {Jammu} and {Kashmir} {Conflict}},
    volume = {15},
    url = {https://journals.sagepub.com/doi/full/10.1177/1750635220970997},
    abstract = {Social media have come to play a vital role not only in our everyday lives, but also in times of conflict and crisis such as natural disasters or civil wars. Recent research has highlighted, on the one hand, the use of social media as a means of recruitment by terrorists and, on the other hand, the use of Facebook, Twitter etc. to gain the support of the population during insurgencies. This article conducts a qualitative content analysis of content on Twitter concerning the conflict in the Jammu and Kashmir region. The tweets following the death of a popular militant, Burhan Wani, cover three different themes: (1) criticism of intellectuals, (2) Burhan Wani's impact on the conflict, and (3) tweets referring to the conflict itself. Generally, people use Twitter to make their own point of view clear to others and discredit the opposing party, at the same time tweets are reflecting the antagonism between the two parties to the conflict, India and Pakistan. The sample of tweets reflects the lack of awareness among people in the region regarding the motivations of the new generation of militancy emerging in Kashmir after 1990.},
    number = {4},
    journal = {Media, War \& Conflict},
    author = {Gabel, Sabrina and Reichert, Lilian and Reuter, Christian},
    year = {2022},
    keywords = {Crisis, HCI, SocialMedia, Ranking-ImpactFactor, Peace, Projekt-ATHENE-SecUrban},
    pages = {1--26},
    }

  • Philipp Kuehn, Moritz Kerk, Marc Wendelborn, Christian Reuter (2022)
    Clustering of Threat Information to Mitigate Information Overload for Computer Emergency Response Teams
    2022.
    [BibTeX] [Abstract] [Download PDF]

    The constantly increasing number of threats and the existing diversity of information sources pose challenges for Computer Emergency Response Teams (CERTs). In order to respond to new threats, CERTs need to gather information in a timely and comprehensive manner. However, the volume of information and sources can lead to information overload. This paper answers the question of how to reduce information overload for CERTs with the help of clustering methods. Conditions for such a framework were established and subsequently tested. In order to perform an evaluation, different types of evaluation metrics were introduced and selected in relation to the framework conditions. Furthermore, different vectorizations and distance measures in combination with the clustering methods were evaluated and interpreted. Two different ground-truth datasets were used for the evaluation, one containing threat messages and a dataset with messages from different news categories. The work shows that the K-means clustering method along with TF-IDF vectorization and cosine distance provide the best results in the domain of threat messages.

    @techreport{kuehn_clustering_2022,
    title = {Clustering of {Threat} {Information} to {Mitigate} {Information} {Overload} for {Computer} {Emergency} {Response} {Teams}},
    copyright = {arXiv.org perpetual, non-exclusive license},
    url = {https://arxiv.org/pdf/2210.14067.pdf},
    abstract = {The constantly increasing number of threats and the existing diversity of information sources pose challenges for Computer Emergency Response Teams (CERTs). In order to respond to new threats, CERTs need to gather information in a timely and comprehensive manner. However, the volume of information and sources can lead to information overload. This paper answers the question of how to reduce information overload for CERTs with the help of clustering methods. Conditions for such a framework were established and subsequently tested. In order to perform an evaluation, different types of evaluation metrics were introduced and selected in relation to the framework conditions. Furthermore, different vectorizations and distance measures in combination with the clustering methods were evaluated and interpreted. Two different ground-truth datasets were used for the evaluation, one containing threat messages and a dataset with messages from different news categories. The work shows that the K-means clustering method along with TF-IDF vectorization and cosine distance provide the best results in the domain of threat messages.},
    language = {en},
    institution = {arXiv},
    author = {Kuehn, Philipp and Kerk, Moritz and Wendelborn, Marc and Reuter, Christian},
    year = {2022},
    note = {https://doi.org/10.48550/arXiv.2210.14067},
    keywords = {HCI, Student, Security, Projekt-ATHENE-SecUrban, Projekt-CYWARN},
    }

  • Christian Reuter (2022)
    A European Perspective on Crisis Informatics: Citizens‘ and Authorities‘ attitudes towards Social Media for Public Safety and Security
    Nijmegen: The Radboud University Thesis Repository.
    [BibTeX] [Abstract] [Download PDF]

    Mobilising helpers in the event of a flood or letting friends know that you are okay in the event of a terrorist attack – more and more people are using social media in emergency, crisis or disaster situations. Storms, floods, attacks or pandemics (esp. COVID-19) show that citizens use social media to inform themselves or to coordinate. This thesis presents qualitative and quantitative studies on the attitudes of emergency services and citizens in Europe towards social media in emergencies. Across the individual sub-studies, almost 10,000 people are surveyed including representative studies in the Netherlands, Germany, the UK and Italy. The work empirically shows that social media is increasingly important for emergency services, both for prevention and during crises; that private use of social media is a driving force in shaping opinions for organisational use; and that citizens have high expectations towards authorities, especially monitoring social media is expected, and sometimes responses within one hour. Depending on the risk culture, the data show further differences, e.g. whether the state (Germany) or the individual (Netherlands) is seen as primarily responsible for coping with the situation.

    @book{reuter_european_2022-1,
    address = {Nijmegen},
    title = {A {European} {Perspective} on {Crisis} {Informatics}: {Citizens}' and {Authorities}' attitudes towards {Social} {Media} for {Public} {Safety} and {Security}},
    url = {https://repository.ubn.ru.nl/handle/2066/253000},
    abstract = {Mobilising helpers in the event of a flood or letting friends know that you are okay in the event of a terrorist attack – more and more people are using social media in emergency, crisis or disaster situations. Storms, floods, attacks or pandemics (esp. COVID-19) show that citizens use social media to inform themselves or to coordinate. This thesis presents qualitative and quantitative studies on the attitudes of emergency services and citizens in Europe towards social media in emergencies. Across the individual sub-studies, almost 10,000 people are surveyed including representative studies in the Netherlands, Germany, the UK and Italy. The work empirically shows that social media is increasingly important for emergency services, both for prevention and during crises; that private use of social media is a driving force in shaping opinions for organisational use; and that citizens have high expectations towards authorities, especially monitoring social media is expected, and sometimes responses within one hour. Depending on the risk culture, the data show further differences, e.g. whether the state (Germany) or the individual (Netherlands) is seen as primarily responsible for coping with the situation.},
    publisher = {The Radboud University Thesis Repository},
    author = {Reuter, Christian},
    year = {2022},
    keywords = {AuswahlCrisis, Crisis, HCI, Selected, SocialMedia, Projekt-EmerGent, Projekt-KontiKat, Projekt-ATHENE-SecUrban, Projekt-emergenCITY, Dissertation},
    }

  • Christian Reuter, Luigi Lo Iacono, Alexander Benlian (2022)
    A Quarter Century of Usable Security and Privacy Research: Transparency, Tailorability, and the Road Ahead
    Behaviour & Information Technology (BIT) ;41(10):2035–2048. doi:10.1080/0144929X.2022.2080908
    [BibTeX] [Abstract] [Download PDF]

    In the last decades, research has shown that both technical solutions and user perceptions are important to improve security and privacy in the digital realm. The field of ‘usable security’ already started to emerge in the mid-90s, primarily focussed on password and email security. Later on, the research field of ”usable security and privacy” evolved and broadened the aim to design concepts and tools to assist users in enhancing their behaviour with regard to both privacy and security. Nevertheless, many user interventions are not as effective as desired. Because of highly diverse usage contexts, leading to different privacy and security requirements and not always to one-size-fits-all approaches, tailorability is necessary to address this issue. Furthermore, transparency is a crucial requirement, as providing comprehensible information may counter reactance towards security interventions. This article first provides a brief history of the research field in its first quarter-century and then highlights research on the transparency and tailorability of user interventions. Based on this, this article then presents six contributions with regard to (1) privacy concerns in times of COVID-19, (2) authentication on mobile devices, (3) GDPR-compliant data management, (4) privacy notices on websites, (5) data disclosure scenarios in agriculture, as well as (6) rights under data protection law and the concrete process should data subjects want to claim those rights. This article concludes with several research directions on user-centred transparency and tailorability.

    @article{reuter_quarter_2022,
    title = {A {Quarter} {Century} of {Usable} {Security} and {Privacy} {Research}: {Transparency}, {Tailorability}, and the {Road} {Ahead}},
    volume = {41},
    issn = {0144-929X},
    url = {https://www.tandfonline.com/toc/tbit20/41/10},
    doi = {10.1080/0144929X.2022.2080908},
    abstract = {In the last decades, research has shown that both technical solutions and user perceptions are important to improve security and privacy in the digital realm. The field of ‘usable security’ already started to emerge in the mid-90s, primarily focussed on password and email security. Later on, the research field of ”usable security and privacy” evolved and broadened the aim to design concepts and tools to assist users in enhancing their behaviour with regard to both privacy and security. Nevertheless, many user interventions are not as effective as desired. Because of highly diverse usage contexts, leading to different privacy and security requirements and not always to one-size-fits-all approaches, tailorability is necessary to address this issue. Furthermore, transparency is a crucial requirement, as providing comprehensible information may counter reactance towards security interventions. This article first provides a brief history of the research field in its first quarter-century and then highlights research on the transparency and tailorability of user interventions. Based on this, this article then presents six contributions with regard to (1) privacy concerns in times of COVID-19, (2) authentication on mobile devices, (3) GDPR-compliant data management, (4) privacy notices on websites, (5) data disclosure scenarios in agriculture, as well as (6) rights under data protection law and the concrete process should data subjects want to claim those rights. This article concludes with several research directions on user-centred transparency and tailorability.},
    number = {10},
    journal = {Behaviour \& Information Technology (BIT)},
    author = {Reuter, Christian and Lo Iacono, Luigi and Benlian, Alexander},
    year = {2022},
    keywords = {Crisis, HCI, SocialMedia, UsableSec, Security, A-Paper, Ranking-ImpactFactor, Ranking-CORE-A, Projekt-CROSSING, Projekt-ATHENE-SecUrban},
    pages = {2035--2048},
    }

  • Philipp Kuehn, Julian Bäumler, Marc-André Kaufhold, Marc Wendelborn, Christian Reuter (2022)
    The Notion of Relevance in Cybersecurity: A Categorization of Security Tools and Deduction of Relevance Notions
    Mensch und Computer – Workshopband Darmstadt. doi:10.18420/muc2022-mci-ws01-220
    [BibTeX] [Abstract] [Download PDF]

    Proper cybersecurity requires timely information to defend the IT infrastructure. In a dynamic field like cybersecurity, gathering up-to-date information is usually a manual, time-consuming, and exhaustive task. Automatic and usable approaches are supposed to be a solution to this problem, but for this, they require a notion of information relevance to distinguish relevant from irrelevant information. First, on the basis of a literature review, this paper proposes a novel cybersecurity tool categorization based on corresponding tool types with their respective definitions and core features. Second, it elaborates information used in each category and deduces notions of relevance. Third, it outlines how these findings informed the design of a security dashboard to guide computer emergency response team staff in identifying current threats in open source intelligence sources while mitigating information overload.

    @inproceedings{kuehn_notion_2022,
    address = {Darmstadt},
    series = {Mensch und {Computer} 2022 - {Workshopband}},
    title = {The {Notion} of {Relevance} in {Cybersecurity}: {A} {Categorization} of {Security} {Tools} and {Deduction} of {Relevance} {Notions}},
    url = {https://dl.gi.de/handle/20.500.12116/39072},
    doi = {10.18420/muc2022-mci-ws01-220},
    abstract = {Proper cybersecurity requires timely information to defend the IT infrastructure. In a dynamic field like cybersecurity, gathering up-to-date information is usually a manual, time-consuming, and exhaustive task. Automatic and usable approaches are supposed to be a solution to this problem, but for this, they require a notion of information relevance to distinguish relevant from irrelevant information. First, on the basis of a literature review, this paper proposes a novel cybersecurity tool categorization based on corresponding tool types with their respective definitions and core features. Second, it elaborates information used in each category and deduces notions of relevance. Third, it outlines how these findings informed the design of a security dashboard to guide computer emergency response team staff in identifying current threats in open source intelligence sources while mitigating information overload.},
    language = {en},
    booktitle = {Mensch und {Computer} - {Workshopband}},
    publisher = {Gesellschaft für Informatik},
    author = {Kuehn, Philipp and Bäumler, Julian and Kaufhold, Marc-André and Wendelborn, Marc and Reuter, Christian},
    year = {2022},
    keywords = {Student, UsableSec, Security, Projekt-ATHENE-SecUrban, Projekt-CYWARN},
    }

  • Denis Orlov, Simon Möller, Sven Düfler, Steffen Haesler, Christian Reuter (2022)
    Detecting a Crisis: Comparison of Self-Reported vs. Automated Internet Outage Measuring Methods
    Mensch und Computer – Workshopband Darmstadt. doi:10.18420/muc2022-mci-ws10-321
    [BibTeX] [Abstract] [Download PDF]

    Every day, there are internet disruptions or outages around the world that affect our daily lives. In this paper, we analyzed these events in Germany in recent years and found out how they can be detected, and what impact they have on citizens, especially in crisis situations. For this purpose, we take a look at two different approaches to recording internet outages, namely the self-reporting of citizens and automatic reporting by algorithmic examination of the availability of IP networks. We evaluate the data of six major events with regard to their meaningfulness in quality and quantity. We found that due to the amount of data and the inherent imprecision of the methods used, it is difficult to detect outages through algorithmic examination. But once an event is publicly known by self-reporting, they have advantages to capture the temporal and spatial dimensions of the outage due to its nature of objective measurements. As a result, we propose that users’ crowdsourcing can enhance the detection of outages and should be seen as an important starting point to even begin an analysis with algorithm-based techniques, but it is to ISPs and regulatory authorities to support that.

    @inproceedings{orlov_detecting_2022,
    address = {Darmstadt},
    series = {Mensch und {Computer} 2022 - {Workshopband}},
    title = {Detecting a {Crisis}: {Comparison} of {Self}-{Reported} vs. {Automated} {Internet} {Outage} {Measuring} {Methods}},
    url = {https://dl.gi.de/handle/20.500.12116/39089},
    doi = {10.18420/muc2022-mci-ws10-321},
    abstract = {Every day, there are internet disruptions or outages around the world that affect our daily lives. In this paper, we analyzed these events in Germany in recent years and found out how they can be detected, and what impact they have on citizens, especially in crisis situations. For this purpose, we take a look at two different approaches to recording internet outages, namely the self-reporting of citizens and automatic reporting by algorithmic examination of the availability of IP networks. We evaluate the data of six major events with regard to their meaningfulness in quality and quantity. We found that due to the amount of data and the inherent imprecision of the methods used, it is difficult to detect outages through algorithmic examination. But once an event is publicly known by self-reporting, they have advantages to capture the temporal and spatial dimensions of the outage due to its nature of objective measurements. As a result, we propose that users’ crowdsourcing can enhance the detection of outages and should be seen as an important starting point to even begin an analysis with algorithm-based techniques, but it is to ISPs and regulatory authorities to support that.},
    language = {en},
    booktitle = {Mensch und {Computer} - {Workshopband}},
    publisher = {Gesellschaft für Informatik},
    author = {Orlov, Denis and Möller, Simon and Düfler, Sven and Haesler, Steffen and Reuter, Christian},
    year = {2022},
    keywords = {HCI, Student, UsableSec, Security, Projekt-ATHENE-SecUrban, Projekt-emergenCITY},
    }

  • Thomas Reinhold, Christian Reuter (2022)
    Book Review: Artificial Intelligence and The Future of Warfare, James Johnson (2021)
    Zeitschrift für Außen- und Sicherheitspolitik (ZfAS) . doi:10.1007/s12399-022-00918-4
    [BibTeX] [Abstract] [Download PDF]

    Technological and scientific progress, especially the rapid development of information technology (IT), plays a crucial role in peace and security issuesFootnote1. Artificial Intelligence (AI) is one example. AI is a sub-discipline of computer science, dealing with computer systems capable of performing tasks which require human intelligenceFootnote2. According to James Johnson, PhD, Lecturer in Strategic Studies in the Department of Politics & International Relations at the University of Aberdeen and author of the book Artificial Intelligence and the Future of Warfare, the hype around this has made it easy to overstate the opportunities and challenges posed by the development and deployment of AI in the military sphere. The author argues, that “speculations about super intelligent AI or the threat of superman AI to humanity” are entirely disconnected from today’s capabilities of AI. The book aims to address this problem by deciphering “proven capabilities and applications from mere speculation”, with a strong focus on the challenges AI poses to strategic stability, nuclear deterrence and how AI might influence nuclear weapon systems. The author concludes with implications and policy recommendations on how states could manage the escalatory risks posed by AI.

    @article{reinhold_book_2022,
    title = {Book {Review}: {Artificial} {Intelligence} and {The} {Future} of {Warfare}, {James} {Johnson} (2021)},
    url = {https://link.springer.com/article/10.1007/s12399-022-00918-4},
    doi = {10.1007/s12399-022-00918-4},
    abstract = {Technological and scientific progress, especially the rapid development of information technology (IT), plays a crucial role in peace and security issuesFootnote1. Artificial Intelligence (AI) is one example. AI is a sub-discipline of computer science, dealing with computer systems capable of performing tasks which require human intelligenceFootnote2. According to James Johnson, PhD, Lecturer in Strategic Studies in the Department of Politics \& International Relations at the University of Aberdeen and author of the book Artificial Intelligence and the Future of Warfare, the hype around this has made it easy to overstate the opportunities and challenges posed by the development and deployment of AI in the military sphere. The author argues, that “speculations about super intelligent AI or the threat of superman AI to humanity” are entirely disconnected from today’s capabilities of AI. The book aims to address this problem by deciphering “proven capabilities and applications from mere speculation”, with a strong focus on the challenges AI poses to strategic stability, nuclear deterrence and how AI might influence nuclear weapon systems. The author concludes with implications and policy recommendations on how states could manage the escalatory risks posed by AI.},
    journal = {Zeitschrift für Außen- und Sicherheitspolitik (ZfAS)},
    author = {Reinhold, Thomas and Reuter, Christian},
    year = {2022},
    keywords = {Peace, Projekt-ATHENE-SecUrban},
    }

  • Christian Bueger, Tobias Liebetrau, Jonas Franken (2022)
    Security threats to undersea communications cables and infrastructure – consequences for the EU
    Brussels: European Parliament.
    [BibTeX] [Abstract] [Download PDF]

    The EU’s subsea data cable network is both vital for global connectivity and vulnerable. This study provides a systematic review of the current security threats, as well as the actors at the origin of these threats. Building on reports and expert input, the paper takes stock of current awareness, preparedness and response mechanisms, both at the EU and Member State level. A number of recommendations suggest how to improve the resilience of the cable network. Proposals build on the need to enhance EU-wide awareness, improve coordination and share information across EU institutions and Member States. In addition, surveillance capabilities must be advanced, response and repair mechanisms strengthened, and the topic mainstreamed across external action.

    @book{bueger_security_2022,
    address = {Brussels},
    title = {Security threats to undersea communications cables and infrastructure – consequences for the {EU}},
    url = {https://www.europarl.europa.eu/thinktank/en/document/EXPO_IDA(2022)702557},
    abstract = {The EU’s subsea data cable network is both vital for global connectivity and vulnerable. This study provides a systematic review of the current security threats, as well as the actors at the origin of these threats. Building on reports and expert input, the paper takes stock of current awareness, preparedness and response mechanisms, both at the EU and Member State level. A number of recommendations suggest how to improve the resilience of the cable network. Proposals build on the need to enhance EU-wide awareness, improve coordination and share information across EU institutions and Member States. In addition, surveillance capabilities must be advanced, response and repair mechanisms strengthened, and the topic mainstreamed across external action.},
    publisher = {European Parliament},
    author = {Bueger, Christian and Liebetrau, Tobias and Franken, Jonas},
    year = {2022},
    keywords = {Student, Security, Infrastructure, Cyberwar, Projekt-ATHENE-SecUrban, Projekt-emergenCITY},
    }

  • Marc-André Kaufhold, Ali Sercan Basyurt, Kaan Eyilmez, Marc Stöttinger, Christian Reuter (2022)
    Cyber Threat Observatory: Design and Evaluation of an Interactive Dashboard for Computer Emergency Response Teams
    Proceedings of the European Conference on Information Systems (ECIS) Timisoara, Romania.
    [BibTeX] [Abstract] [Download PDF]

    Besides the merits of increasing digitization and networking, societies are increasling exposed to cyberattacks. In Germany, Computer Emerrgency Response Teams (CERTs) of the public sector operate on federal and state level to provide preventative and reactive information security services for authorities, citizens, and enterprises. Their tasks of monitoring, analyzing, and communicating threats is getting more complex by the increasing information quantity disseminated into relevant public channels. Using the lens of design science research, this paper contributes with the design and evaluation of a cross-platform cybersecurity dashboard for CERTs. Based on expert scenario-based walkthroughs in combination with semi-structured interviews (N=12), it discusses six design implications, including the customizability of data sources and filtering of displayed entities, modular integration of additional information sources, interrelation between different information feeds, intelligent algorithms for content assessment and filtering, integration with security software and systems, as well as export, sharing and communication of relevant data.

    @inproceedings{kaufhold_cyber_2022,
    address = {Timisoara, Romania},
    title = {Cyber {Threat} {Observatory}: {Design} and {Evaluation} of an {Interactive} {Dashboard} for {Computer} {Emergency} {Response} {Teams}},
    url = {http://www.peasec.de/paper/2022/2022_KaufholdBasyurtEyilmezStoettingerReuter_CyberThreatObservatory_ECIS.pdf},
    abstract = {Besides the merits of increasing digitization and networking, societies are increasling exposed to cyberattacks. In Germany, Computer Emerrgency Response Teams (CERTs) of the public sector operate on federal and state level to provide preventative and reactive information security services for authorities, citizens, and enterprises. Their tasks of monitoring, analyzing, and communicating threats is getting more complex by the increasing information quantity disseminated into relevant public channels. Using the lens of design science research, this paper contributes with the design and evaluation of a cross-platform cybersecurity dashboard for CERTs. Based on expert scenario-based walkthroughs in combination with semi-structured interviews (N=12), it discusses six design implications, including the customizability of data sources and filtering of displayed entities, modular integration of additional information sources, interrelation between different information feeds, intelligent algorithms for content assessment and filtering, integration with security software and systems, as well as export, sharing and communication of relevant data.},
    booktitle = {Proceedings of the {European} {Conference} on {Information} {Systems} ({ECIS})},
    author = {Kaufhold, Marc-André and Basyurt, Ali Sercan and Eyilmez, Kaan and Stöttinger, Marc and Reuter, Christian},
    year = {2022},
    keywords = {HCI, UsableSec, Security, A-Paper, Ranking-CORE-A, Projekt-ATHENE-SecUrban, Projekt-CYWARN},
    }

  • Marc-André Kaufhold, Julian Bäumler, Christian Reuter (2022)
    The Implementation of Protective Measures and Communication of Cybersecurity Alerts in Germany – A Representative Survey of the Population
    Mensch und Computer – Workshopband Darmstadt. doi:10.18420/muc2022-mci-ws01-228
    [BibTeX] [Abstract] [Download PDF]

    Despite the merits of digitization in private and professional spaces, critical infrastructures and societies are increasingly exposed to cyberattacks. We conducted a representative survey with German citizens (N=1,093) to examine how they assess the current and future cyber threat situation as well as possible protective measures in cyberspace. Furthermore, we asked what information and channels citizens need to be aware of cyber threats. Our findings indicate that large proportions of the German population feel inadequately informed about cyber threats and tend to only apply enforced security measures by programs (e.g., updates) and services (e.g., two-factor authentication). Furthermore, institutions such as state-level Computer Emergency Response Teams (CERTs) are relatively unknown among the population and respondents showed little confidence in German security authorities to cope with largescale attacks and ultimately protect citizens. Still, our participants prefer to receive cybersecurity information via installed security applications, television channels, or emergency warning apps.

    @inproceedings{kaufhold_implementation_2022,
    address = {Darmstadt},
    series = {Mensch und {Computer} 2022 - {Workshopband}},
    title = {The {Implementation} of {Protective} {Measures} and {Communication} of {Cybersecurity} {Alerts} in {Germany} - {A} {Representative} {Survey} of the {Population}},
    url = {https://dl.gi.de/handle/20.500.12116/39061},
    doi = {10.18420/muc2022-mci-ws01-228},
    abstract = {Despite the merits of digitization in private and professional spaces, critical infrastructures and societies are increasingly exposed to cyberattacks. We conducted a representative survey with German citizens (N=1,093) to examine how they assess the current and future cyber threat situation as well as possible protective measures in cyberspace. Furthermore, we asked what information and channels citizens need to be aware of cyber threats. Our findings indicate that large proportions of the German population feel inadequately informed about cyber threats and tend to only apply enforced security measures by programs (e.g., updates) and services (e.g., two-factor authentication). Furthermore, institutions such as state-level Computer Emergency Response Teams (CERTs) are relatively unknown among the population and respondents showed little confidence in German security authorities to cope with largescale attacks and ultimately protect citizens. Still, our participants prefer to receive cybersecurity information via installed security applications, television channels, or emergency warning apps.},
    language = {en},
    booktitle = {Mensch und {Computer} - {Workshopband}},
    publisher = {Gesellschaft für Informatik},
    author = {Kaufhold, Marc-André and Bäumler, Julian and Reuter, Christian},
    year = {2022},
    keywords = {HCI, Student, UsableSec, Security, Projekt-ATHENE-SecUrban, Projekt-CYWARN},
    }

  • Stefka Schmid (2022)
    Trustworthy and Explainable: A European Vision of (Weaponised) Artificial Intelligence
    Die Friedens-Warte / Journal of International Peace and Organization (JIPO) ;95(3-4):290–315. doi:10.35998/fw-2022-0013
    [BibTeX] [Abstract] [Download PDF]

    The European Union (EU) has undertaken policies which address the research and development of artificial intelligence (AI). In light of debates of technology assessment which focus on risks for humans and questions of control of AI, the EU has propagated an ethical, human-centred approach of the application of AI. It is important to identify how the EU envisions AI as this may guide emerging norms in AI governance and today’s research and development of (weaponised) AI. Building on works of Human-Computer Interaction (HCI), this work derives the actor’s understanding of human-AI interaction, including conceptualisations of explainability, interpretability, and risks. Analysis of EU documents on the implementation of AI as a general-purpose technology and for military application reveals that explainability and risk identification are crucial elements for trust, which itself is a necessary component in the uptake of AI. Interdisciplinary approaches allow for a more detailed understanding of actors’ fundamental views on human control of AI, which further contributes to debates on technology assessment in professionalised political contexts.

    @article{schmid_trustworthy_2022,
    title = {Trustworthy and {Explainable}: {A} {European} {Vision} of ({Weaponised}) {Artificial} {Intelligence}},
    volume = {95},
    url = {https://elibrary.bwv-verlag.de/article/10.35998/fw-2022-0013},
    doi = {10.35998/fw-2022-0013},
    abstract = {The European Union (EU) has undertaken policies which address the research and development of artificial intelligence (AI). In light of debates of technology assessment which focus on risks for humans and questions of control of AI, the EU has propagated an ethical, human-centred approach of the application of AI. It is important to identify how the EU envisions AI as this may guide emerging norms in AI governance and today’s research and development of (weaponised) AI. Building on works of Human-Computer Interaction (HCI), this work derives the actor’s understanding of human-AI interaction, including conceptualisations of explainability, interpretability, and risks. Analysis of EU documents on the implementation of AI as a general-purpose technology and for military application reveals that explainability and risk identification are crucial elements for trust, which itself is a necessary component in the uptake of AI. Interdisciplinary approaches allow for a more detailed understanding of actors’ fundamental views on human control of AI, which further contributes to debates on technology assessment in professionalised political contexts.},
    number = {3-4},
    journal = {Die Friedens-Warte / Journal of International Peace and Organization (JIPO)},
    author = {Schmid, Stefka},
    year = {2022},
    keywords = {Peace, Projekt-ATHENE-SecUrban, Projekt-TraCe},
    pages = {290--315},
    }

  • Christian Reuter (2022)
    A European Perspective on Crisis Informatics: Citizens‘ and Authorities‘ attitudes towards Social Media for Public Safety and Security
    1 ed. Wiesbaden: Springer Vieweg. doi:https://doi.org/10.1007/978-3-658-39720-3
    [BibTeX] [Abstract] [Download PDF]

    Mobilising helpers in the event of a flood or letting friends know that you are okay in the event of a terrorist attack – more and more people are using social media in emergency, crisis or disaster situations. Storms, floods, attacks or pandemics (esp. COVID-19) show that citizens use social media to inform themselves or to coordinate. This thesis presents qualitative and quantitative studies on the attitudes of emergency services and citizens in Europe towards social media in emergencies. Across the individual sub-studies, almost 10,000 people are surveyed including representative studies in the Netherlands, Germany, the UK and Italy. The work empirically shows that social media is increasingly important for emergency services, both for prevention and during crises; that private use of social media is a driving force in shaping opinions for organisational use; and that citizens have high expectations towards authorities, especially monitoring social media is expected, and sometimes responses within one hour. Depending on the risk culture, the data show further differences, e.g. whether the state (Germany) or the individual (Netherlands) is seen as primarily responsible for coping with the situation.

    @book{reuter_european_2022,
    address = {Wiesbaden},
    edition = {1},
    title = {A {European} {Perspective} on {Crisis} {Informatics}: {Citizens}' and {Authorities}' attitudes towards {Social} {Media} for {Public} {Safety} and {Security}},
    isbn = {978-3-658-39719-7},
    url = {https://link.springer.com/book/10.1007/978-3-658-39720-3},
    abstract = {Mobilising helpers in the event of a flood or letting friends know that you are okay in the event of a terrorist attack – more and more people are using social media in emergency, crisis or disaster situations. Storms, floods, attacks or pandemics (esp. COVID-19) show that citizens use social media to inform themselves or to coordinate. This thesis presents qualitative and quantitative studies on the attitudes of emergency services and citizens in Europe towards social media in emergencies. Across the individual sub-studies, almost 10,000 people are surveyed including representative studies in the Netherlands, Germany, the UK and Italy. The work empirically shows that social media is increasingly important for emergency services, both for prevention and during crises; that private use of social media is a driving force in shaping opinions for organisational use; and that citizens have high expectations towards authorities, especially monitoring social media is expected, and sometimes responses within one hour. Depending on the risk culture, the data show further differences, e.g. whether the state (Germany) or the individual (Netherlands) is seen as primarily responsible for coping with the situation.},
    language = {en},
    publisher = {Springer Vieweg},
    author = {Reuter, Christian},
    year = {2022},
    doi = {https://doi.org/10.1007/978-3-658-39720-3},
    keywords = {Crisis, HCI, SocialMedia, Projekt-EmerGent, Projekt-KontiKat, Projekt-ATHENE-SecUrban, Projekt-emergenCITY, Dissertation},
    }

  • Jonas Franken, Thomas Reinhold, Lilian Reichert, Christian Reuter (2022)
    The Digital Divide in State Vulnerability to Submarine Communications Cable Failure
    International Journal of Critical Infrastructure Protection (IJCIP) ;38(100522):1–15. doi:10.1016/j.ijcip.2022.100522
    [BibTeX] [Abstract] [Download PDF]

    The backbone network of submarine communication cables (SCC) carries 98\% of international internet traffic. Coastal and island states strongly depend on this physical internet infrastructure to provide internet connectivity. Although about 100 SCC breakdowns of human or natural origin occur at yearly average, a literature review reveals that there is no approach to assess individual state vulnerability to SCC failure in global comparison. In this article, the global SCC network is modeled based on publicly available data. Besides the analysis of the global network properties, a focus is put on remaining bandwidth capacities in three different failure scenario simulations of SCC breakdowns. As a result, this study identifies 15 highly vulnerable states and overseas territories, and another 28 territories that are classified as partially vulnerable to SCC failures. Since economic market decisions shape the structure of the SCC network, an uneven distribution of redundancies and the resulting vulnerability of disadvantaged economies can be confirmed. Therefore, the study’s findings may contribute to a better assessment of the necessity of preventive protection measures of critical telecommunication infrastructures in states and territories characterized by high and medium vulnerability.

    @article{franken_digital_2022,
    title = {The {Digital} {Divide} in {State} {Vulnerability} to {Submarine} {Communications} {Cable} {Failure}},
    volume = {38},
    url = {https://peasec.de/paper/2022/2022_FrankenReinholdReichertReuter_DigitalDivideStateVulnerabilitySubmarineCommunicationsCable_IJCIP.pdf},
    doi = {10.1016/j.ijcip.2022.100522},
    abstract = {The backbone network of submarine communication cables (SCC) carries 98\% of international internet traffic. Coastal and island states strongly depend on this physical internet infrastructure to provide internet connectivity. Although about 100 SCC breakdowns of human or natural origin occur at yearly average, a literature review reveals that there is no approach to assess individual state vulnerability to SCC failure in global comparison. In this article, the global SCC network is modeled based on publicly available data. Besides the analysis of the global network properties, a focus is put on remaining bandwidth capacities in three different failure scenario simulations of SCC breakdowns. As a result, this study identifies 15 highly vulnerable states and overseas territories, and another 28 territories that are classified as partially vulnerable to SCC failures. Since economic market decisions shape the structure of the SCC network, an uneven distribution of redundancies and the resulting vulnerability of disadvantaged economies can be confirmed. Therefore, the study's findings may contribute to a better assessment of the necessity of preventive protection measures of critical telecommunication infrastructures in states and territories characterized by high and medium vulnerability.},
    number = {100522},
    journal = {International Journal of Critical Infrastructure Protection (IJCIP)},
    author = {Franken, Jonas and Reinhold, Thomas and Reichert, Lilian and Reuter, Christian},
    year = {2022},
    keywords = {Selected, Student, Security, A-Paper, Ranking-ImpactFactor, AuswahlPeace, Projekt-ATHENE-SecUrban, Projekt-AgriRegio},
    pages = {1--15},
    }

  • Verena Zimmermann, Jasmin Haunschild, Marita Unden, Paul Gerber, Nina Gerber (2022)
    Sicherheitsherausforderungen für Smart City-Infrastrukturen
    Wirtschaftsinformatik & Management . doi:10.1365/s35764-022-00396-5
    [BibTeX] [Abstract] [Download PDF]

    Viele Städte entwickeln sich hin zu einer „Smart City“. Der Trend birgt einerseits vielfältige Potenziale für Effizienz, Nachhaltigkeit und Sicherheit. Auf der anderen Seite ergeben sich neue Herausforderungen für den Schutz städtischer Infrastrukturen und der darin befindlichen Daten vor Ausfällen und (Cyber‑)Angriffen, die in ihrer Komplexität bisher nur wenig untersucht sind.

    @article{zimmermann_sicherheitsherausforderungen_2022,
    title = {Sicherheitsherausforderungen für {Smart} {City}-{Infrastrukturen}},
    url = {https://link.springer.com/content/pdf/10.1365/s35764-022-00396-5.pdf},
    doi = {10.1365/s35764-022-00396-5},
    abstract = {Viele Städte entwickeln sich hin zu einer „Smart City“. Der Trend birgt einerseits vielfältige Potenziale für Effizienz, Nachhaltigkeit und Sicherheit. Auf der anderen Seite ergeben sich neue Herausforderungen für den Schutz städtischer Infrastrukturen und der darin befindlichen Daten vor Ausfällen und (Cyber‑)Angriffen, die in ihrer Komplexität bisher nur wenig untersucht sind.},
    journal = {Wirtschaftsinformatik \& Management},
    author = {Zimmermann, Verena and Haunschild, Jasmin and Unden, Marita and Gerber, Paul and Gerber, Nina},
    year = {2022},
    keywords = {UsableSec, Security, Projekt-ATHENE-SecUrban},
    }

    2021

  • Christian Reuter (2021)
    Sicherheitskritische Mensch-Computer-Interaktion: Interaktive Technologien und Soziale Medien im Krisen- und Sicherheitsmanagement (Zweite Auflage)
    2 ed. Wiesbaden: Springer Vieweg.
    [BibTeX] [Abstract] [Download PDF]

    Die zweite, aktualisierte Auflage dieses Lehr- und Fachbuchs gibt eine fundierte und praxisbezogene Einführung sowie einen Überblick über Grundlagen, Methoden und Anwendungen der Mensch-Computer-Interaktion im Kontext von Sicherheit, Notfällen, Krisen, Katastrophen, Krieg und Frieden. Dies adressierend werden interaktive, mobile, ubiquitäre und kooperative Technologien sowie soziale Medien vorgestellt. Hierbei finden klassische Themen wie benutzbare (IT-)Sicherheit, Industrie 4.0, Katastrophenschutz, Medizin und Automobil, aber auch Augmented Reality, Crowdsourcing, Shitstorm Management, Social Media Analytics und Cyberwar ihren Platz. Methodisch wird das Spektrum von Usable Safety bis Usable Security Engineering von Analyse über Design bis Evaluation abgedeckt. Das Buch eignet sich ebenso als Lehrbuch für Studierende wie als Handbuch für Wissenschaftler, Designer, Entwickler und Anwender.

    @book{reuter_sicherheitskritische_2021,
    address = {Wiesbaden},
    edition = {2},
    title = {Sicherheitskritische {Mensch}-{Computer}-{Interaktion}: {Interaktive} {Technologien} und {Soziale} {Medien} im {Krisen}- und {Sicherheitsmanagement} ({Zweite} {Auflage})},
    isbn = {978-3-658-32795-8},
    url = {https://www.springer.com/de/book/9783658327941},
    abstract = {Die zweite, aktualisierte Auflage dieses Lehr- und Fachbuchs gibt eine fundierte und praxisbezogene Einführung sowie einen Überblick über Grundlagen, Methoden und Anwendungen der Mensch-Computer-Interaktion im Kontext von Sicherheit, Notfällen, Krisen, Katastrophen, Krieg und Frieden. Dies adressierend werden interaktive, mobile, ubiquitäre und kooperative Technologien sowie soziale Medien vorgestellt. Hierbei finden klassische Themen wie benutzbare (IT-)Sicherheit, Industrie 4.0, Katastrophenschutz, Medizin und Automobil, aber auch Augmented Reality, Crowdsourcing, Shitstorm Management, Social Media Analytics und Cyberwar ihren Platz. Methodisch wird das Spektrum von Usable Safety bis Usable Security Engineering von Analyse über Design bis Evaluation abgedeckt. Das Buch eignet sich ebenso als Lehrbuch für Studierende wie als Handbuch für Wissenschaftler, Designer, Entwickler und Anwender.},
    publisher = {Springer Vieweg},
    author = {Reuter, Christian},
    year = {2021},
    keywords = {AuswahlCrisis, HCI, Selected, SocialMedia, UsableSec, Security, Projekt-KontiKat, Peace, Infrastructure, Projekt-ATHENE-SecUrban, Projekt-CYWARN, Projekt-emergenCITY},
    }

  • Jasmin Haunschild, Kilian Demuth, Henri-Jacques Geiß, Christian Richter, Christian Reuter (2021)
    Nutzer, Sammler, Entscheidungsträger? Arten der Bürgerbeteiligung in Smart Cities
    HMD Praxis der Wirtschaftsinformatik ;58. doi:10.1365/s40702-021-00770-8
    [BibTeX] [Abstract] [Download PDF]

    Digitalisierung ist ein präsenter Faktor in vielen Städten. So existieren bereits viele Smart-City-Initiativen, bei denen Städte versuchen, ihre Prozesse durch Erfassung und Verknüpfung von Daten, oft unter Zuhilfenahme von Datenplattformen, zu optimieren. In Anbetracht der damit einhergehenden großen Investitionen und Veränderungen wird Bürgerbeteiligung als zentraler Faktor für den Erfolg solcher Initiativen betrachtet. Bisher ist allerdings nicht klar, was typische Beteiligungsformate von Smart-City-Initiativen sind und welche Rolle(n) BürgerInnen dabei einnehmen. Dieser Beitrag leitet mittels einer Literaturanalyse zu Smart Cities ein Kategorienschema zu typischen Bürgerbeteiligungsarten ab. Die Analyse ergab, dass sich Einbindung von BürgerInnen in politische Entscheidungen und bei der Entwicklung technischer Artefakte maßgeblich auf e‑Government oder Participatory Design bezieht. Im Hinblick auf die Beteiligungsarten zeigt sich, dass Makrofabriken, Living Labs und Open-Data-Plattformen häufige Ansätze sind, um BürgerInnen als Co-Creators einzubinden. Zudem werden BürgerInnen mit Citizen Sensing zur Erfassung von Daten oder Missständen einbezogen. Dabei zeigen sich sowohl aktivere, als auch eher passive Beteiligungsarten. Die Analyse zeigt, dass die Einbindung von BürgerInnen häufig entweder auf eine Beteiligung an politischen Entscheidungen oder an der Entwicklung technischer Artefakte abzielt. Auch wenn keine klare Abgrenzung möglich ist, sind diese Ansätze dann eher durch e‑Government oder Participatory Design inspiriert.

    @article{haunschild_nutzer_2021,
    title = {Nutzer, {Sammler}, {Entscheidungsträger}? {Arten} der {Bürgerbeteiligung} in {Smart} {Cities}},
    volume = {58},
    url = {https://peasec.de/paper/2021/2021_HaunschildDemuthGeissRichterReuter_NutzerSammlerEntscheidungstragerBuergerbeteiligungSmartCities_HMD.pdf},
    doi = {10.1365/s40702-021-00770-8},
    abstract = {Digitalisierung ist ein präsenter Faktor in vielen Städten. So existieren bereits viele Smart-City-Initiativen, bei denen Städte versuchen, ihre Prozesse durch Erfassung und Verknüpfung von Daten, oft unter Zuhilfenahme von Datenplattformen, zu optimieren. In Anbetracht der damit einhergehenden großen Investitionen und Veränderungen wird Bürgerbeteiligung als zentraler Faktor für den Erfolg solcher Initiativen betrachtet. Bisher ist allerdings nicht klar, was typische Beteiligungsformate von Smart-City-Initiativen sind und welche Rolle(n) BürgerInnen dabei einnehmen. Dieser Beitrag leitet mittels einer Literaturanalyse zu Smart Cities ein Kategorienschema zu typischen Bürgerbeteiligungsarten ab. Die Analyse ergab, dass sich Einbindung von BürgerInnen in politische Entscheidungen und bei der Entwicklung technischer Artefakte maßgeblich auf e‑Government oder Participatory Design bezieht. Im Hinblick auf die Beteiligungsarten zeigt sich, dass Makrofabriken, Living Labs und Open-Data-Plattformen häufige Ansätze sind, um BürgerInnen als Co-Creators einzubinden. Zudem werden BürgerInnen mit Citizen Sensing zur Erfassung von Daten oder Missständen einbezogen. Dabei zeigen sich sowohl aktivere, als auch eher passive Beteiligungsarten. Die Analyse zeigt, dass die Einbindung von BürgerInnen häufig entweder auf eine Beteiligung an politischen Entscheidungen oder an der Entwicklung technischer Artefakte abzielt. Auch wenn keine klare Abgrenzung möglich ist, sind diese Ansätze dann eher durch e‑Government oder Participatory Design inspiriert.},
    journal = {HMD Praxis der Wirtschaftsinformatik},
    author = {Haunschild, Jasmin and Demuth, Kilian and Geiß, Henri-Jacques and Richter, Christian and Reuter, Christian},
    year = {2021},
    keywords = {HCI, Student, Projekt-ATHENE-SecUrban, Projekt-emergenCITY},
    }

  • Katrin Hartwig, Atlas Englisch, Jan Pelle Thomson, Christian Reuter (2021)
    Finding Secret Treasure? Improving Memorized Secrets Through Gamification
    European Symposium on Usable Security (EuroUSEC) Karlsruhe, Germany. doi:10.1145/3481357.3481509
    [BibTeX] [Abstract] [Download PDF]

    Users tend to bypass systems that are designed to increase their personal security and privacy while limiting their perceived freedom. Nudges present a possible solution to this problem, offering security benefits without taking away perceived freedom. We have identified a lack of research comparing concrete implementations of nudging concepts in an emulated real-world scenario to assess their relative value as a nudge. Comparing multiple nudging implementations in an emulated real-world scenario including a novel avatar nudge with gamification elements, this publication discusses the advantages of nudging for stronger user-created passwords regarding efficacy, usability, and memorability.We investigated the effect of gamification in nudges, performing two studies (𝑁1 = 16, 𝑁2 = 1, 000) to refine and evaluate implementations of current and novel nudging concepts. Our research found a gamified nudge, which integrates a personalizable avatar guide into the registration process, to perform less effectively than state-of-the-art nudges, independently of participants’ gaming frequency.

    @inproceedings{hartwig_finding_2021,
    address = {Karlsruhe, Germany},
    title = {Finding {Secret} {Treasure}? {Improving} {Memorized} {Secrets} {Through} {Gamification}},
    url = {https://peasec.de/paper/2021/2021_HartwigEnglischThomsonReuter_MemorizedSecretsThroughGamification_EuroUSEC.pdf},
    doi = {10.1145/3481357.3481509},
    abstract = {Users tend to bypass systems that are designed to increase their personal security and privacy while limiting their perceived freedom.
    Nudges present a possible solution to this problem, offering security benefits without taking away perceived freedom. We have
    identified a lack of research comparing concrete implementations of nudging concepts in an emulated real-world scenario to assess their
    relative value as a nudge. Comparing multiple nudging implementations in an emulated real-world scenario including a novel avatar
    nudge with gamification elements, this publication discusses the advantages of nudging for stronger user-created passwords regarding
    efficacy, usability, and memorability.We investigated the effect of gamification in nudges, performing two studies (𝑁1 = 16, 𝑁2 = 1, 000)
    to refine and evaluate implementations of current and novel nudging concepts. Our research found a gamified nudge, which integrates
    a personalizable avatar guide into the registration process, to perform less effectively than state-of-the-art nudges, independently of
    participants’ gaming frequency.},
    booktitle = {European {Symposium} on {Usable} {Security} ({EuroUSEC})},
    publisher = {ACM},
    author = {Hartwig, Katrin and Englisch, Atlas and Thomson, Jan Pelle and Reuter, Christian},
    year = {2021},
    keywords = {Student, UsableSec, Security, Projekt-CROSSING, Projekt-ATHENE-SecUrban},
    pages = {105--117},
    }

  • Katrin Hartwig, Christian Reuter (2021)
    Nudge or Restraint: How do People Assess Nudging in Cybersecurity – A Representative Study in Germany
    European Symposium on Usable Security (EuroUSEC) Karlsruhe, Germany. doi:10.1145/3481357.3481514
    [BibTeX] [Abstract] [Download PDF]

    While nudging is a long-established instrument in many contexts, it has more recently emerged to be relevant in cybersecurity as well. For instance, existing research suggests nudges for stronger passwords or safe WiFi connections. However, those nudges are often not as effective as desired. To improve their effectiveness, it is crucial to understand how people assess nudges in cybersecurity, to address potential fears and resulting reactance and to facilitate voluntary compliance. In other contexts, such as the health sector, studies have already thoroughly explored the attitude towards nudging. To address that matter in cybersecurity, we conducted a representative study in Germany (𝑁 = 1, 012), asking people about their attitude towards nudging in that specific context. Our findings reveal that 64\% rated nudging in cybersecurity as helpful, however several participants expected risks such as intentional misguidance, manipulation and data exposure as well.

    @inproceedings{hartwig_nudge_2021,
    address = {Karlsruhe, Germany},
    title = {Nudge or {Restraint}: {How} do {People} {Assess} {Nudging} in {Cybersecurity} - {A} {Representative} {Study} in {Germany}},
    url = {https://peasec.de/paper/2021/2021_HartwigReuter_NudgingCybersecurityRepresentativeStudy_EuroUSEC.pdf},
    doi = {10.1145/3481357.3481514},
    abstract = {While nudging is a long-established instrument in many contexts, it has more recently emerged to be relevant in cybersecurity as well. For instance, existing research suggests nudges for stronger passwords or safe WiFi connections. However, those nudges are often not as effective as desired. To improve their effectiveness, it is crucial to understand how people assess nudges in cybersecurity, to address potential fears and resulting reactance and to facilitate voluntary compliance. In other contexts, such as the health sector, studies have already thoroughly explored the attitude towards nudging. To address that matter in cybersecurity, we conducted a representative study in Germany (𝑁 = 1, 012), asking people about their attitude towards nudging in that specific context. Our findings reveal that 64\% rated nudging in cybersecurity as helpful, however several participants expected risks such as intentional misguidance, manipulation and data exposure as well.},
    booktitle = {European {Symposium} on {Usable} {Security} ({EuroUSEC})},
    publisher = {ACM},
    author = {Hartwig, Katrin and Reuter, Christian},
    year = {2021},
    keywords = {UsableSec, Security, Projekt-CROSSING, Projekt-ATHENE-SecUrban},
    pages = {141--150},
    }

  • Thea Riebe, Tristan Wirth, Markus Bayer, Philipp Kuehn, Marc-André Kaufhold, Volker Knauthe, Stefan Guthe, Christian Reuter (2021)
    CySecAlert: An Alert Generation System for Cyber Security Events Using Open Source Intelligence Data
    Information and Communications Security (ICICS) . doi:10.1007/978-3-030-86890-1_24
    [BibTeX] [Abstract] [Download PDF]

    Receiving relevant information on possible cyber threats, attacks, and data breaches in a timely manner is crucial for early response. The social media platform Twitter hosts an active cyber security community. Their activities are often monitored manually by security experts, such as Computer Emergency Response Teams (CERTs). We thus propose a Twitter-based alert generation system that issues alerts to a system operator as soon as new relevant cyber security related topics emerge. Thereby, our system allows us to monitor user accounts with significantly less workload. Our system applies a supervised classifier, based on active learning, that detects tweets containing relevant information. The results indicate that uncertainty sampling can reduce the amount of manual relevance classification effort and enhance the classifier performance substantially compared to random sampling. Our approach reduces the number of accounts and tweets that are needed for the classifier training, thus making the tool easily and rapidly adaptable to the specific context while also supporting data minimization for Open Source Intelligence (OSINT). Relevant tweets are clustered by a greedy stream clustering algorithm in order to identify significant events. The proposed system is able to work near real-time within the required 15-minutes time frame and detects up to 93.8\% of relevant events with a false alert rate of 14.81\%.

    @inproceedings{riebe_cysecalert_2021,
    title = {{CySecAlert}: {An} {Alert} {Generation} {System} for {Cyber} {Security} {Events} {Using} {Open} {Source} {Intelligence} {Data}},
    url = {https://peasec.de/paper/2021/2021_RiebeWirthBayerKuehnKaufholdKnautheGutheReuter_CySecAlertOpenSourceIntelligence_ICICS.pdf},
    doi = {10.1007/978-3-030-86890-1_24},
    abstract = {Receiving relevant information on possible cyber threats, attacks, and data breaches in a timely manner is crucial for early response. The social media platform Twitter hosts an active cyber security community. Their activities are often monitored manually by security experts, such as Computer Emergency Response Teams (CERTs). We thus propose a Twitter-based alert generation system that issues alerts to a system operator as soon as new relevant cyber security related topics emerge. Thereby, our system allows us to monitor user accounts with significantly less workload. Our system applies a supervised classifier, based on active learning, that detects tweets containing relevant information. The results indicate that uncertainty sampling can reduce the amount of manual relevance classification effort and enhance the classifier performance substantially compared to random sampling. Our approach reduces the number of accounts and tweets that are needed for the classifier training, thus making the tool easily and rapidly adaptable to the specific context while also supporting data minimization for Open Source Intelligence (OSINT). Relevant tweets are clustered by a greedy stream clustering algorithm in order to identify significant events. The proposed system is able to work near real-time within the required 15-minutes time frame and detects up to 93.8\% of relevant events with a false alert rate of 14.81\%.},
    booktitle = {Information and {Communications} {Security} ({ICICS})},
    author = {Riebe, Thea and Wirth, Tristan and Bayer, Markus and Kuehn, Philipp and Kaufhold, Marc-André and Knauthe, Volker and Guthe, Stefan and Reuter, Christian},
    year = {2021},
    keywords = {Student, UsableSec, Security, Ranking-CORE-B, Projekt-ATHENE-SecUrban, Projekt-CYWARN},
    pages = {429--446},
    }

  • Thea Riebe, Marc-André Kaufhold, Christian Reuter (2021)
    The Impact of Organizational Structure and Technology Use on Collaborative Practices in Computer Emergency Response Teams: An Empirical Study
    Proceedings of the ACM: Human Computer Interaction (PACM): Computer-Supported Cooperative Work and Social Computing ;5(CSCW2). doi:10.1145/3479865
    [BibTeX] [Abstract] [Download PDF]

    Besides the merits of increasing digitization and interconnectedness in private and professional spaces, critical infrastructures and societies are more and more exposed to cyberattacks. In order to enhance the preventative and reactive capabilities against cyberattacks, Computer Emergency Response Teams (CERTs) are deployed in many countries and organizations. In Germany, CERTs in the public sector operate on federal and state level to provide information security services for authorities, citizens, and enterprises. Their tasks of monitoring, analyzing, and communicating threats and incidents is getting more complex due to the increasing amount of information disseminated into public channels. By adopting the perspectives of Computer-Supported Cooperative Work (CSCW) and Crisis Informatics, we contribute to the study of organizational structures, technology use, and the impact on collaborative practices in and between state CERTs with empirical research based on expert interviews with representatives of German state CERTs (N=15) and supplementary document analyses (N=25). We derive design and policy implications from our findings, including the need for interoperable and modular architecture, a shift towards service level agreements, cross-platform monitoring and analysis of incident data, use of deduplication techniques and standardized threat exchange formats, a reduction of resource costs through process automation, and transparent reporting and tool structures for information exchange.

    @article{riebe_impact_2021,
    title = {The {Impact} of {Organizational} {Structure} and {Technology} {Use} on {Collaborative} {Practices} in {Computer} {Emergency} {Response} {Teams}: {An} {Empirical} {Study}},
    volume = {5},
    url = {https://www.peasec.de/paper/2021/2021_RiebeKaufholdReuter_ComputerEmegencyResponseTeams_CSCW.pdf},
    doi = {10.1145/3479865},
    abstract = {Besides the merits of increasing digitization and interconnectedness in private and professional spaces, critical infrastructures and societies are more and more exposed to cyberattacks. In order to enhance the preventative and reactive capabilities against cyberattacks, Computer Emergency Response Teams (CERTs) are deployed in many countries and organizations. In Germany, CERTs in the public sector operate on federal and state level to provide information security services for authorities, citizens, and enterprises. Their tasks of monitoring, analyzing, and communicating threats and incidents is getting more complex due to the increasing amount of information disseminated into public channels. By adopting the perspectives of Computer-Supported Cooperative Work (CSCW) and Crisis Informatics, we contribute to the study of organizational structures, technology use, and the impact on collaborative practices in and between state CERTs with empirical research based on expert interviews with representatives of German state CERTs (N=15) and supplementary document analyses (N=25). We derive design and policy implications from our findings, including the need for interoperable and modular architecture, a shift towards service level agreements, cross-platform monitoring and analysis of incident data, use of deduplication techniques and standardized threat exchange formats, a reduction of resource costs through process automation, and transparent reporting and tool structures for information exchange.},
    number = {CSCW2},
    journal = {Proceedings of the ACM: Human Computer Interaction (PACM): Computer-Supported Cooperative Work and Social Computing},
    author = {Riebe, Thea and Kaufhold, Marc-André and Reuter, Christian},
    year = {2021},
    keywords = {Crisis, UsableSec, Security, A-Paper, Ranking-CORE-A, Projekt-KontiKat, Projekt-ATHENE-SecUrban, Projekt-CYWARN, AuswahlUsableSec, AuswahlKaufhold},
    }

  • Marc-André Kaufhold (2021)
    Information Refinement Technologies for Crisis Informatics: User Expectations and Design Principles for Social Media and Mobile Apps
    Wiesbaden, Germany: Springer Vieweg. doi:10.1007/978-3-658-33341-6
    [BibTeX] [Abstract] [Download PDF]

    Marc-André Kaufhold explores user expectations and design implications for the utilization of new media in crisis management and response. He develops a novel framework for information refinement, which integrates the event, organisational, societal, and technological perspectives of crises. Therefore, he reviews the state of the art on crisis informatics and empirically examines the use, potentials and barriers of both social media and mobile apps. Based on these insights, he designs and evaluates ICT concepts and artifacts with the aim to overcome the issues of information overload and quality in large-scale crises, concluding with practical and theoretical implications for technology adaptation and design.

    @book{kaufhold_information_2021,
    address = {Wiesbaden, Germany},
    title = {Information {Refinement} {Technologies} for {Crisis} {Informatics}: {User} {Expectations} and {Design} {Principles} for {Social} {Media} and {Mobile} {Apps}},
    isbn = {978-3-658-33343-0},
    url = {https://www.springer.com/gp/book/9783658333430},
    abstract = {Marc-André Kaufhold explores user expectations and design implications for the utilization of new media in crisis management and response. He develops a novel framework for information refinement, which integrates the event, organisational, societal, and technological perspectives of crises. Therefore, he reviews the state of the art on crisis informatics and empirically examines the use, potentials and barriers of both social media and mobile apps. Based on these insights, he designs and evaluates ICT concepts and artifacts with the aim to overcome the issues of information overload and quality in large-scale crises, concluding with practical and theoretical implications for technology adaptation and design.},
    publisher = {Springer Vieweg},
    author = {Kaufhold, Marc-André},
    year = {2021},
    doi = {10.1007/978-3-658-33341-6},
    keywords = {Crisis, Projekt-KontiKat, Projekt-ATHENE-SecUrban, Projekt-CYWARN, AuswahlKaufhold, Dissertation},
    }

  • Jasmin Haunschild, Christian Reuter (2021)
    Bridging from Crisis to Everyday Life – An Analysis of User Reviews of the Warning App NINA and the COVID-19 Information Apps CoroBuddy and DarfIchDas
    CSCW ’21 Companion: Conference Companion Publication of the 2021 on Computer Supported Cooperative Work and Social Computing Virtual Event, USA. doi:10.1145/3462204.3481745
    [BibTeX] [Abstract] [Download PDF]

    During a dynamic and protracted crisis such as the COVID-19 pandemic, citizens are continuously challenged with making decisionsunder uncertainty. In addition to evaluating the risk of their behav-iors to themselves and others, citizens also have to consider themost current regulation, which often varies federally and locallyand by incidence numbers. Few tools help to stay informed aboutthe current rules. The state-run German multi-hazard warningapp NINA incorporated a feature for COVID-19, while two apps,DarfIchDas and CoroBuddy, focus only on COVID-19 regulationand are privately run. To investigate users’ expectations, perceivedadvantages, and gaps as well as the developers’ challenges, we analyze recent app store reviews of the apps and developers’ replies.We show that the warning app and the COVID-19 regulation appsare evaluated on different terms, that the correctness and portrayalof complex rules are the main challenges and that developers andeditors are underusing users’ potential for crowdsourcing.

    @inproceedings{haunschild_bridging_2021,
    address = {Virtual Event, USA},
    title = {Bridging from {Crisis} to {Everyday} {Life} – {An} {Analysis} of {User} {Reviews} of the {Warning} {App} {NINA} and the {COVID}-19 {Information} {Apps} {CoroBuddy} and {DarfIchDas}},
    url = {https://peasec.de/paper/2021/2021_HaunschildReuter_UserReviewsWarningCovidApps_CSCWComp.pdf},
    doi = {10.1145/3462204.3481745},
    abstract = {During a dynamic and protracted crisis such as the COVID-19 pandemic, citizens are continuously challenged with making decisionsunder uncertainty. In addition to evaluating the risk of their behav-iors to themselves and others, citizens also have to consider themost current regulation, which often varies federally and locallyand by incidence numbers. Few tools help to stay informed aboutthe current rules. The state-run German multi-hazard warningapp NINA incorporated a feature for COVID-19, while two apps,DarfIchDas and CoroBuddy, focus only on COVID-19 regulationand are privately run. To investigate users’ expectations, perceivedadvantages, and gaps as well as the developers’ challenges, we analyze recent app store reviews of the apps and developers’ replies.We show that the warning app and the COVID-19 regulation appsare evaluated on different terms, that the correctness and portrayalof complex rules are the main challenges and that developers andeditors are underusing users’ potential for crowdsourcing.},
    booktitle = {{CSCW} '21 {Companion}: {Conference} {Companion} {Publication} of the 2021 on {Computer} {Supported} {Cooperative} {Work} and {Social} {Computing}},
    publisher = {ACM},
    author = {Haunschild, Jasmin and Reuter, Christian},
    year = {2021},
    keywords = {Crisis, Projekt-ATHENE-SecUrban, Projekt-emergenCITY},
    pages = {72--78},
    }

  • Marc-André Kaufhold, Markus Bayer, Daniel Hartung, Christian Reuter (2021)
    Design and Evaluation of Deep Learning Models for Real-Time Credibility Assessment in Twitter
    30th International Conference on Artificial Neural Networks (ICANN2021) Bratislava. doi:https://doi.org/10.1007/978-3-030-86383-8_32
    [BibTeX] [Abstract] [Download PDF]

    Social media have an enormous impact on modern life but are prone to the dissemination of false information. In several domains, such as crisis management or political communication, it is of utmost importance to detect false and to promote credible information. Although educational measures might help individuals to detect false information, the sheer volume of social big data, which sometimes need to be anal- ysed under time-critical constraints, calls for automated and (near) real- time assessment methods. Hence, this paper reviews existing approaches before designing and evaluating three deep learning models (MLP, RNN, BERT) for real-time credibility assessment using the example of Twitter posts. While our BERT implementation achieved best results with an accuracy of up to 87.07\% and an F1 score of 0.8764 when using meta- data, text, and user features, MLP and RNN showed lower classification quality but better performance for real-time application. Furthermore, the paper contributes with a novel dataset for credibility assessment.

    @inproceedings{kaufhold_design_2021,
    address = {Bratislava},
    title = {Design and {Evaluation} of {Deep} {Learning} {Models} for {Real}-{Time} {Credibility} {Assessment} in {Twitter}},
    url = {https://peasec.de/paper/2021/2021_KaufholdBayerHartungReuter_DeepLearningCredibilityAssessmentTwitter_ICANN.pdf},
    doi = {https://doi.org/10.1007/978-3-030-86383-8_32},
    abstract = {Social media have an enormous impact on modern life but are prone to the dissemination of false information. In several domains, such as crisis management or political communication, it is of utmost importance to detect false and to promote credible information. Although educational measures might help individuals to detect false information, the sheer volume of social big data, which sometimes need to be anal- ysed under time-critical constraints, calls for automated and (near) real- time assessment methods. Hence, this paper reviews existing approaches before designing and evaluating three deep learning models (MLP, RNN, BERT) for real-time credibility assessment using the example of Twitter posts. While our BERT implementation achieved best results with an accuracy of up to 87.07\% and an F1 score of 0.8764 when using meta- data, text, and user features, MLP and RNN showed lower classification quality but better performance for real-time application. Furthermore, the paper contributes with a novel dataset for credibility assessment.},
    booktitle = {30th {International} {Conference} on {Artificial} {Neural} {Networks} ({ICANN2021})},
    author = {Kaufhold, Marc-André and Bayer, Markus and Hartung, Daniel and Reuter, Christian},
    year = {2021},
    keywords = {Student, Security, Ranking-CORE-B, Projekt-ATHENE-SecUrban, Projekt-CYWARN},
    pages = {1--13},
    }

  • Jasmin Haunschild, Christian Reuter (2021)
    Perceptions of Police Technology Use and Attitudes Towards the Police – A Representative Survey of the German Population
    Mensch und Computer – Workshopband Bonn. doi:10.18420/muc2021-mci-ws08-255
    [BibTeX] [Abstract] [Download PDF]

    Many Germans perceive a brutalization of society, and state officials also report feeling under attack. At the same time, policing is criticised for becoming increasingly militarised and for having extended surveillance in the course of fighting terrorism. Advancements in HCI are used in the context of many of the issues that policing is facing. In this study, we conduct a representative survey of the German population to investigate personal experiences with and attitudes towards the police and information and communication technologies (ICT) used for policing. We find an overall positive image of the police and uncritical attitudes towards ICT used for general surveillance (body-worn cameras, video surveillance, face recognition) and slightly more critical attitudes towards personal surveillance (e.g. through communication data retention). The study indicates that perceptions differ according to experience of unfair treatment by the police, while other factors such as age and education have similar effects.

    @inproceedings{haunschild_perceptions_2021,
    address = {Bonn},
    title = {Perceptions of {Police} {Technology} {Use} and {Attitudes} {Towards} the {Police} - {A} {Representative} {Survey} of the {German} {Population}},
    volume = {Mensch und Computer 2021 - Workshopband},
    url = {http://www.peasec.de/paper/2021/2021_HaunschildReuter_PoliceTechnologyUseSurvey_MuC-WS.pdf},
    doi = {10.18420/muc2021-mci-ws08-255},
    abstract = {Many Germans perceive a brutalization of society, and state officials also report feeling under attack. At the same time, policing is criticised for becoming increasingly militarised and for having extended surveillance in the course of fighting terrorism. Advancements in HCI are used in the context of many of the issues that policing is facing. In this study, we conduct a representative survey of the German population to investigate personal experiences with and attitudes towards the police and information and communication technologies (ICT) used for policing. We find an overall positive image of the police and uncritical attitudes towards ICT used for general surveillance (body-worn cameras, video surveillance, face recognition) and slightly more critical attitudes towards personal surveillance (e.g. through communication data retention). The study indicates that perceptions differ according to experience of unfair treatment by the police, while other factors such as age and education have similar effects.},
    booktitle = {Mensch und {Computer} - {Workshopband}},
    publisher = {Gesellschaft für Informatik e. V.},
    author = {Haunschild, Jasmin and Reuter, Christian},
    year = {2021},
    keywords = {Security, Projekt-ATHENE-SecUrban, Projekt-CYWARN, Projekt-emergenCITY},
    }

  • Markus Bayer, Marc-André Kaufhold, Christian Reuter (2021)
    Information Overload in Crisis Management: Bilingual Evaluation of Embedding Models for Clustering Social Media Posts in Emergencies
    Proceedings of the European Conference on Information Systems (ECIS) .
    [BibTeX] [Abstract] [Download PDF]

    Past studies in the domains of information systems have analysed the potentials and barriers of social media in emergencies. While information disseminated in social media can lead to valuable insights, emergency services and researchers face the challenge of information overload as data quickly exceeds the manageable amount. We propose an embedding-based clustering approach and a method for the automated labelling of clusters. Given that the clustering quality is highly dependent on embeddings, we evaluate 19 embedding models with respect to time, internal cluster quality, and language invariance. The results show that it may be sensible to use embedding models that were already trained on other crisis datasets. However, one must ensure that the training data generalizes enough, so that the clustering can adapt to new situations. Confirming this, we found out that some embeddings were not able to perform as well on a German dataset as on an English dataset.

    @inproceedings{bayer_information_2021,
    title = {Information {Overload} in {Crisis} {Management}: {Bilingual} {Evaluation} of {Embedding} {Models} for {Clustering} {Social} {Media} {Posts} in {Emergencies}},
    url = {https://peasec.de/paper/2021/2021_BayerKaufholdReuter_InformationOverloadInCrisisManagementBilingualEvaluation_ECIS.pdf},
    abstract = {Past studies in the domains of information systems have analysed the potentials and barriers of social media in emergencies. While information disseminated in social media can lead to valuable insights, emergency services and researchers face the challenge of information overload as data quickly exceeds the manageable amount. We propose an embedding-based clustering approach and a method for the automated labelling of clusters. Given that the clustering quality is highly dependent on embeddings, we evaluate 19 embedding models with respect to time, internal cluster quality, and language invariance. The results show that it may be sensible to use embedding models that were already trained on other crisis datasets. However, one must ensure that the training data generalizes enough, so that the clustering can adapt to new situations. Confirming this, we found out that some embeddings were not able to perform as well on a German dataset as on an English dataset.},
    booktitle = {Proceedings of the {European} {Conference} on {Information} {Systems} ({ECIS})},
    author = {Bayer, Markus and Kaufhold, Marc-André and Reuter, Christian},
    year = {2021},
    keywords = {Crisis, SocialMedia, A-Paper, Ranking-CORE-A, Projekt-ATHENE-SecUrban, Projekt-CYWARN},
    pages = {1--18},
    }

  • Steffen Haesler, Ragnark Mogk, Florentin Putz, Kevin T. Logan, Nadja Thiessen, Katharina Kleinschnitger, Lars Baumgärtner, Jan-Philipp Stroscher, Christian Reuter, Michele Knodt, Matthias Hollick (2021)
    Connected Self-Organized Citizens in Crises: An Interdisciplinary Resilience Concept for Neighborhoods
    CSCW ’21 Companion: Conference Companion Publication of the 2021 on Computer Supported Cooperative Work and Social Computing Virtual Event, USA. doi:10.1145/3462204.3481749
    [BibTeX] [Abstract] [Download PDF]

    When facing major crisis events, such as earthquakes, flooding,or attacks on infrastructure, people start to organize within theirneighborhoods. While this has historically been an analog process,people now use collaboration or messenger apps to support theirself-organization. Unfortunately, these apps are not designed to beresilient and fail with communication infrastructure outages whenservers are no longer available. We provide a resilience conceptwith requirements derived from an interdisciplinary view enablingcitizens to communicate and collaborate in everyday life and duringcrisis events. Our human-centered prototype integrates conceptsof nudging for crisis preparedness, decentralized and secure com-munication, participation, smart resource management, historicalknowledge, and legal issues to help guide further research.

    @inproceedings{haesler_connected_2021,
    address = {Virtual Event, USA},
    title = {Connected {Self}-{Organized} {Citizens} in {Crises}: {An} {Interdisciplinary} {Resilience} {Concept} for {Neighborhoods}},
    url = {https://peasec.de/paper/2021/2021_Haesleretal_ConnectedSelfOrganizedCitizensinCrises_CSCWComp.pdf},
    doi = {10.1145/3462204.3481749},
    abstract = {When facing major crisis events, such as earthquakes, flooding,or attacks on infrastructure, people start to organize within theirneighborhoods. While this has historically been an analog process,people now use collaboration or messenger apps to support theirself-organization. Unfortunately, these apps are not designed to beresilient and fail with communication infrastructure outages whenservers are no longer available. We provide a resilience conceptwith requirements derived from an interdisciplinary view enablingcitizens to communicate and collaborate in everyday life and duringcrisis events. Our human-centered prototype integrates conceptsof nudging for crisis preparedness, decentralized and secure com-munication, participation, smart resource management, historicalknowledge, and legal issues to help guide further research.},
    booktitle = {{CSCW} '21 {Companion}: {Conference} {Companion} {Publication} of the 2021 on {Computer} {Supported} {Cooperative} {Work} and {Social} {Computing}},
    publisher = {ACM},
    author = {Haesler, Steffen and Mogk, Ragnark and Putz, Florentin and Logan, Kevin T. and Thiessen, Nadja and Kleinschnitger, Katharina and Baumgärtner, Lars and Stroscher, Jan-Philipp and Reuter, Christian and Knodt, Michele and Hollick, Matthias},
    year = {2021},
    keywords = {Crisis, Projekt-ATHENE-SecUrban, Projekt-emergenCITY},
    }

  • Steffen Haesler, Stefka Schmid, Annemike Sophia Vierneisel, Christian Reuter (2021)
    Stronger Together: How Neighborhood Groups Build up a Virtual Network during the COVID-19 Pandemic
    Proceedings of the ACM: Human Computer Interaction (PACM): Computer-Supported Cooperative Work and Social Computing ;5(CSCW2).
    [BibTeX] [Abstract] [Download PDF]

    During crises such as the COVID-19 pandemic, people spontaneously initiate support groups, while establishedorganizations like soccer clubs set non-regular goals, both offering help. Interested in the coordination of suchhelp and potential challenges of collaboration, we conducted a virtual ethnography of a multi-level networklocated in Germany. We focused on aims, activities, and technological mediation, with Activity Theory astheoretical framework. Our findings show that the organizational aim of coordinating help was successfullyachieved by connecting heterogeneous actors through digitization and institutionalization. Enabled by thecontext of the COVID-19 pandemic crisis, the network acted virtually, but was also able to integrate analogspaces of help. We identified six crucial implications regarding the use of technology and collaboration forbuilding a successful volunteering network.

    @article{haesler_stronger_2021,
    title = {Stronger {Together}: {How} {Neighborhood} {Groups} {Build} up a {Virtual} {Network} during the {COVID}-19 {Pandemic}},
    volume = {5},
    url = {https://peasec.de/paper/2021/2021_HaeslerSchmidVierneiselReuter_StrongerTogetherVirtualNetworkCOVID19_CSCW.pdf},
    abstract = {During crises such as the COVID-19 pandemic, people spontaneously initiate support groups, while establishedorganizations like soccer clubs set non-regular goals, both offering help. Interested in the coordination of suchhelp and potential challenges of collaboration, we conducted a virtual ethnography of a multi-level networklocated in Germany. We focused on aims, activities, and technological mediation, with Activity Theory astheoretical framework. Our findings show that the organizational aim of coordinating help was successfullyachieved by connecting heterogeneous actors through digitization and institutionalization. Enabled by thecontext of the COVID-19 pandemic crisis, the network acted virtually, but was also able to integrate analogspaces of help. We identified six crucial implications regarding the use of technology and collaboration forbuilding a successful volunteering network.},
    number = {CSCW2},
    journal = {Proceedings of the ACM: Human Computer Interaction (PACM): Computer-Supported Cooperative Work and Social Computing},
    author = {Haesler, Steffen and Schmid, Stefka and Vierneisel, Annemike Sophia and Reuter, Christian},
    year = {2021},
    keywords = {AuswahlCrisis, Crisis, HCI, Selected, A-Paper, Ranking-CORE-A, Projekt-ATHENE-SecUrban, Projekt-emergenCITY},
    }

  • Thea Riebe, Stefka Schmid, Christian Reuter (2021)
    Measuring Spillover Effects from Defense to Civilian Sectors – A Quantitative Approach Using LinkedIn
    Defence and Peace Economics ;32(7):773–785. doi:10.1080/10242694.2020.1755787
    [BibTeX] [Abstract] [Download PDF]

    Spillover effects describe the process of a company benefiting from the R&D activities of another one and thereby gaining an economic advantage. One prominent approach for measuring spillover effects is based on the analysis of patent citation networks. Taking social media analytics and knowledge economics into account, this paper presents a complementary approach to quantify spillover effects from defense to civilian research and development, analyzing 513 employment biographies from the social network LinkedIn. Using descriptive network analysis, we investigate the emigration of personnel of the German defense industry to other civilian producers. Thereby, our study reveals that in the last decade, employees of defense suppliers have changed positions significantly less often, with 3.24 changes on average than professionals who have worked more than 50\% of their jobs in the civilian sector, having changed 4.61 times on average. Our work illustrates the churn behavior and how spillover effects between defense and civilian sectors can be measured using social career networks such as LinkedIn.

    @article{riebe_measuring_2021,
    title = {Measuring {Spillover} {Effects} from {Defense} to {Civilian} {Sectors} – {A} {Quantitative} {Approach} {Using} {LinkedIn}},
    volume = {32},
    url = {https://peasec.de/paper/2021/2021_RiebeSchmidReuter_SpilloverEffectsDefensetoCivilianLinkedIn_PDE.pdf},
    doi = {10.1080/10242694.2020.1755787},
    abstract = {Spillover effects describe the process of a company benefiting from the R\&D activities of another one and thereby gaining an economic advantage. One prominent approach for measuring spillover effects is based on the analysis of patent citation networks. Taking social media analytics and knowledge economics into account, this paper presents a complementary approach to quantify spillover effects from defense to civilian research and development, analyzing 513 employment biographies from the social network LinkedIn. Using descriptive network analysis, we investigate the emigration of personnel of the German defense industry to other civilian producers. Thereby, our study reveals that in the last decade, employees of defense suppliers have changed positions significantly less often, with 3.24 changes on average than professionals who have worked more than 50\% of their jobs in the civilian sector, having changed 4.61 times on average. Our work illustrates the churn behavior and how spillover effects between defense and civilian sectors can be measured using social career networks such as LinkedIn.},
    number = {7},
    journal = {Defence and Peace Economics},
    author = {Riebe, Thea and Schmid, Stefka and Reuter, Christian},
    year = {2021},
    keywords = {Selected, A-Paper, Ranking-ImpactFactor, Peace, Projekt-DualUse, AuswahlPeace, Cyberwar, Projekt-ATHENE-SecUrban},
    pages = {773--785},
    }

  • Philipp Kuehn, Markus Bayer, Marc Wendelborn, Christian Reuter (2021)
    OVANA: An Approach to Analyze and Improve the Information Quality of Vulnerability Databases
    Proceedings of the 16th International Conference on Availability, Reliability and Security (ARES 2021) . doi:10.1145/3465481.3465744
    [BibTeX] [Abstract] [Download PDF]

    Vulnerability databases are one of the main information sources for IT security experts. Hence, the quality of their information is of utmost importance for anyone working in this area. Previous work has shown that machine readable information is either missing, incorrect, or inconsistent with other data sources. In this paper, we introduce a system called Overt Vulnerability source ANAlysis (OVANA), utilizing state-of-the-art machine learning (ML) and natural-language processing (NLP) techniques, which analyzes the information quality (IQ) of vulnerability databases, searches the free-form description for relevant information missing from structured fields, and updates it accordingly. Our paper shows that OVANA is able to improve the IQ of the National Vulnerability Database by 51.23\% based on the indicators of accuracy, completeness, and uniqueness. Moreover, we present information which should be incorporated into the structured fields to increase the uniqueness of vulnerability entries and improve the discriminability of different vulnerability entries. The identified information from OVANA enables a more targeted vulnerability search and provides guidance for IT security experts in finding relevant information in vulnerability descriptions for severity assessment.

    @inproceedings{kuehn_ovana_2021,
    title = {{OVANA}: {An} {Approach} to {Analyze} and {Improve} the {Information} {Quality} of {Vulnerability} {Databases}},
    isbn = {978-1-4503-9051-4},
    url = {https://peasec.de/paper/2021/2021_KuehnBayerWendelbornReuter_OVANAQualityVulnerabilityDatabases_ARES.pdf},
    doi = {10.1145/3465481.3465744},
    abstract = {Vulnerability databases are one of the main information sources for IT security experts. Hence, the quality of their information is of utmost importance for anyone working in this area. Previous work has shown that machine readable information is either missing, incorrect, or inconsistent with other data sources. In this paper, we introduce a system called Overt Vulnerability source ANAlysis (OVANA), utilizing state-of-the-art machine learning (ML) and natural-language processing (NLP) techniques, which analyzes the information quality (IQ) of vulnerability databases, searches the free-form description for relevant information missing from structured fields, and updates it accordingly. Our paper shows that OVANA is able to improve the IQ of the National Vulnerability Database by 51.23\% based on the indicators of accuracy, completeness, and uniqueness. Moreover, we present information which should be incorporated into the structured fields to increase the uniqueness of vulnerability entries and improve the discriminability of different vulnerability entries. The identified information from OVANA enables a more targeted vulnerability search and provides guidance for IT security experts in finding relevant information in vulnerability descriptions for severity assessment.},
    booktitle = {Proceedings of the 16th {International} {Conference} on {Availability}, {Reliability} and {Security} ({ARES} 2021)},
    publisher = {ACM},
    author = {Kuehn, Philipp and Bayer, Markus and Wendelborn, Marc and Reuter, Christian},
    year = {2021},
    keywords = {Security, Peace, Ranking-CORE-B, AuswahlPeace, Projekt-ATHENE-SecUrban, Projekt-CYWARN},
    pages = {1--11},
    }

  • Jasmin Haunschild, Selina Pauli, Christian Reuter (2021)
    Citizens‘ Perceived Information Responsibilities and Information Challenges During the COVID-19 Pandemic
    GoodIT ’21: Proceedings of the Conference on Information Technology for Social Good . doi:10.1145/3462203.3475886
    [BibTeX] [Abstract] [Download PDF]

    In crises, citizens show changes in their information behavior, which is mediated by trust in sources, personal relations, online and offline news outlets and information and communication technologies such as apps and social media. Through a repeated one-week survey with closed and open questions of German citizens during the beginning of the COVID-19 pandemic, this study examines citizens‘ perceptions of information responsibilities, their satisfaction with the fulfillment of these responsibilities and their wishes for improving the information flow. The study shows that the dynamism of the crisis and the federally varying strategies burden citizens who perceive an obligation to stay informed, but view agencies as responsible for making information readily available. The study contributes a deeper understanding of citizens‘ needs in crises and discusses implications for design of communication tools for dynamic situations that reduce information overload while fulfilling citizens‘ desire to stay informed.

    @inproceedings{haunschild_citizens_2021,
    title = {Citizens' {Perceived} {Information} {Responsibilities} and {Information} {Challenges} {During} the {COVID}-19 {Pandemic}},
    url = {http://www.peasec.de/paper/2021/2021_HaunschildPauliReuter_InformationResponsibilitiesCovid19_GoodIT.pdf},
    doi = {10.1145/3462203.3475886},
    abstract = {In crises, citizens show changes in their information behavior, which is mediated by trust in sources, personal relations, online and offline news outlets and information and communication technologies such as apps and social media. Through a repeated one-week survey with closed and open questions of German citizens during the beginning of the COVID-19 pandemic, this study examines citizens' perceptions of information responsibilities, their satisfaction with the fulfillment of these responsibilities and their wishes for improving the information flow. The study shows that the dynamism of the crisis and the federally varying strategies burden citizens who perceive an obligation to stay informed, but view agencies as responsible for making information readily available. The study contributes a deeper understanding of citizens' needs in crises and discusses implications for design of communication tools for dynamic situations that reduce information overload while fulfilling citizens' desire to stay informed.},
    booktitle = {{GoodIT} '21: {Proceedings} of the {Conference} on {Information} {Technology} for {Social} {Good}},
    author = {Haunschild, Jasmin and Pauli, Selina and Reuter, Christian},
    year = {2021},
    keywords = {Crisis, Projekt-ATHENE-SecUrban, Projekt-emergenCITY},
    pages = {151--156},
    }

  • Rolf Egert, Nina Gerber, Jasmin Haunschild, Philipp Kuehn, Verena Zimmermann (2021)
    Towards Resilient Critical Infrastructures – Motivating Users to Contribute to Smart Grid Resilience
    i-com – Journal of Interactive Media ;20(2):161–175. doi:10.1515/icom-2021-0021
    [BibTeX] [Abstract] [Download PDF]

    Smart cities aim at improving efficiency while providing safety and security by merging conventional infrastructures with information and communication technology. One strategy for mitigating hazardous situations and improving the overall resilience of the system is to involve citizens. For instance, smart grids involve prosumers – capable of producing and consuming electricity – who can adjust their electricity profile dynamically (i.e., decrease or increase electricity consumption), or use their local production to supply electricity to the grid. This mitigates the impact of peak-consumption periods on the grid and makes it easier for operators to control the grid. This involvement of prosumers is accompanied by numerous socio-technical challenges, including motivating citizens to contribute by adjusting their electricity consumption to the requirements of the energy grid. Towards this end, this work investigates motivational strategies and tools, including nudging, persuasive technologies, and incentives, that can be leveraged to increase the motivation of citizens. We discuss long-term and side effects and ethical and privacy considerations, before portraying bug bounty programs, gamification and apps as technologies and strategies to communicate the motivational strategies to citizens.

    @article{egert_towards_2021,
    series = {i-com},
    title = {Towards {Resilient} {Critical} {Infrastructures} - {Motivating} {Users} to {Contribute} to {Smart} {Grid} {Resilience}},
    volume = {20},
    url = {https://www.degruyter.com/document/doi/10.1515/icom-2021-0021/html},
    doi = {10.1515/icom-2021-0021},
    abstract = {Smart cities aim at improving efficiency while providing safety and security by merging conventional infrastructures with information and communication technology. One strategy for mitigating hazardous situations and improving the overall resilience of the system is to involve citizens. For instance, smart grids involve prosumers - capable of producing and consuming electricity - who can adjust their electricity profile dynamically (i.e., decrease or increase electricity consumption), or use their local production to supply electricity to the grid. This mitigates the impact of peak-consumption periods on the grid and makes it easier for operators to control the grid. This involvement of prosumers is accompanied by numerous socio-technical challenges, including motivating citizens to contribute by adjusting their electricity consumption to the requirements of the energy grid. Towards this end, this work investigates motivational strategies and tools, including nudging, persuasive technologies, and incentives, that can be leveraged to increase the motivation of citizens. We discuss long-term and side effects and ethical and privacy considerations, before portraying bug bounty programs, gamification and apps as technologies and strategies to communicate the motivational strategies to citizens.},
    number = {2},
    journal = {i-com - Journal of Interactive Media},
    author = {Egert, Rolf and Gerber, Nina and Haunschild, Jasmin and Kuehn, Philipp and Zimmermann, Verena},
    year = {2021},
    keywords = {Security, Infrastructure, Projekt-ATHENE-SecUrban, Projekt-CYWARN, Projekt-emergenCITY},
    pages = {161--175},
    }

    2020

  • Thea Riebe, Jasmin Haunschild, Felix Divo, Matthias Lang, Gerbert Roitburd, Jonas Franken, Christian Reuter (2020)
    Die Veränderung der Vorratsdatenspeicherung in Europa
    Datenschutz und Datensicherheit – DuD ;44(5):316–321. doi:10.1007/s11623-020-1275-3
    [BibTeX] [Abstract] [Download PDF]

    Die Diskussion um die Vorratsdatenspeicherung ist europaweit weiterhin relevant, da es keine einheitliche Gesetzgebung der EU-Mitgliedsstaaten gibt. So werden in einigen EU-Staaten weiterhin Vorratsdaten gespeichert, obwohl der EuGH die Vorratsdatenspeicherung für teilweise rechtswidrig erklärt hat. Dabei unterscheiden sich die Speicherdauer, die erhobenen Daten und die Rechte der Behörden erheblich. Der Beitrag vergleicht den Umgang mit der Vorratsdatenspeicherung in zehn EU- und Schengen-Staaten im Hinblick auf Einführung und Aussetzung, Speicherdauer, Speicherinhalte und Zugriffsrechte.

    @article{riebe_veranderung_2020,
    title = {Die {Veränderung} der {Vorratsdatenspeicherung} in {Europa}},
    volume = {44},
    url = {https://www.peasec.de/paper/2020/2020_Riebeetal_VDSinEuropa_DuD.pdf},
    doi = {10.1007/s11623-020-1275-3},
    abstract = {Die Diskussion um die Vorratsdatenspeicherung ist europaweit weiterhin relevant, da es keine einheitliche Gesetzgebung der EU-Mitgliedsstaaten gibt. So werden in einigen EU-Staaten weiterhin Vorratsdaten gespeichert, obwohl der EuGH die Vorratsdatenspeicherung für teilweise rechtswidrig erklärt hat. Dabei unterscheiden sich die Speicherdauer, die erhobenen Daten und die Rechte der Behörden erheblich. Der Beitrag vergleicht den Umgang mit der Vorratsdatenspeicherung in zehn EU- und Schengen-Staaten im Hinblick auf Einführung und Aussetzung, Speicherdauer, Speicherinhalte und Zugriffsrechte.},
    number = {5},
    journal = {Datenschutz und Datensicherheit - DuD},
    author = {Riebe, Thea and Haunschild, Jasmin and Divo, Felix and Lang, Matthias and Roitburd, Gerbert and Franken, Jonas and Reuter, Christian},
    year = {2020},
    keywords = {Student, Security, Projekt-KontiKat, Peace, Projekt-DualUse, Projekt-ATHENE-SecUrban},
    pages = {316--321},
    }

  • Marc-André Kaufhold, Jasmin Haunschild, Christian Reuter (2020)
    Warning the Public: A Survey on Attitudes, Expectations and Use of Mobile Crisis Apps in Germany
    Proceedings of the European Conference on Information Systems (ECIS) .
    [BibTeX] [Abstract] [Download PDF]

    As part of information systems, the research field of crisis informatics increasingly investigates the potentials and limitations of mobile crisis apps, which constitute a relatively new public service for citizens and are specifically designed for the dissemination of disaster‐related information and communication between authorities, organizations and citizens. While existing crisis apps, such as KATWARN or NINA in Germany, focus on preparatory information and warning functionality, there is a need for apps and research on police-related functionality, such as information on cybercrime, fraud offences, or search for missing persons. Based on a workshop with civil protection (N=12) and police officers (N=15), we designed a questionnaire and conducted a representative survey of German citizens (N=1.219) on the past, current and future use, perceived helpfulness, deployment and behavioural preferences, configurability and most important functionality of mobile crisis apps. Our results indicate that in addition to emergency and weather warnings, crime- and health-related warnings are also desired by many, as is the possibility for bidirectional communication. People also want one central app and are resistant to installing more than one crisis app. Furthermore, there are few significant differences between socioeconomic groups.

    @inproceedings{kaufhold_warning_2020,
    title = {Warning the {Public}: {A} {Survey} on {Attitudes}, {Expectations} and {Use} of {Mobile} {Crisis} {Apps} in {Germany}},
    url = {http://www.peasec.de/paper/2020/2020_KaufholdHaunschildReuter_WarningthePublic_ECIS.pdf},
    abstract = {As part of information systems, the research field of crisis informatics increasingly investigates the potentials and limitations of mobile crisis apps, which constitute a relatively new public service for citizens and are specifically designed for the dissemination of disaster‐related information and communication between authorities, organizations and citizens. While existing crisis apps, such as KATWARN or NINA in Germany, focus on preparatory information and warning functionality, there is a need for apps and research on police-related functionality, such as information on cybercrime, fraud offences, or search for missing persons. Based on a workshop with civil protection (N=12) and police officers (N=15), we designed a questionnaire and conducted a representative survey of German citizens (N=1.219) on the past, current and future use, perceived helpfulness, deployment and behavioural preferences, configurability and most important functionality of mobile crisis apps. Our results indicate that in addition to emergency and weather warnings, crime- and health-related warnings are also desired by many, as is the possibility for bidirectional communication. People also want one central app and are resistant to installing more than one crisis app. Furthermore, there are few significant differences between socioeconomic groups.},
    booktitle = {Proceedings of the {European} {Conference} on {Information} {Systems} ({ECIS})},
    publisher = {AIS},
    author = {Kaufhold, Marc-André and Haunschild, Jasmin and Reuter, Christian},
    year = {2020},
    keywords = {Crisis, A-Paper, Ranking-VHB-B, Ranking-WKWI-A, Ranking-CORE-A, Projekt-ATHENE-SecUrban, Projekt-ATHENE-FANCY, Projekt-emergenCITY},
    }

  • Steffen Haesler, Stefka Schmid, Christian Reuter (2020)
    Crisis Volunteering Nerds: Three Months After COVID-19 Hackathon \#WirVsVirus
    MobileHCI ’20: 22nd International Conference on Human-Computer Interaction with Mobile Devices and Services . doi:10.1145/3406324.3424584
    [BibTeX] [Abstract] [Download PDF]

    The hackathon \#WirVsVirus in March 2020 was one of the biggest hackathons in history. Under the patronage of the federal government of Germany, 28,361 participants worked together in 1,498 projects, finding innovative apps and solutions against the COVID-19 pandemic. Three months after the event, we present an exemplifying analysis of the topics, used technologies and remaining activity of these projects. Shedding light on this instance of citizen science allows to highlight the potential of hackathons and startup culture regarding socio-technological resilience. At the same time, it may be understood as an impulse for crisis informatics to consider new forms of volunteering in the course of crisis management.

    @inproceedings{haesler_crisis_2020,
    title = {Crisis {Volunteering} {Nerds}: {Three} {Months} {After} {COVID}-19 {Hackathon} \#{WirVsVirus}},
    url = {https://dl.acm.org/doi/pdf/10.1145/3406324.3424584},
    doi = {10.1145/3406324.3424584},
    abstract = {The hackathon \#WirVsVirus in March 2020 was one of the biggest hackathons in history. Under the patronage of the federal government of Germany, 28,361 participants worked together in 1,498 projects, finding innovative apps and solutions against the COVID-19 pandemic. Three months after the event, we present an exemplifying analysis of the topics, used technologies and remaining activity of these projects. Shedding light on this instance of citizen science allows to highlight the potential of hackathons and startup culture regarding socio-technological resilience. At the same time, it may be understood as an impulse for crisis informatics to consider new forms of volunteering in the course of crisis management.},
    booktitle = {{MobileHCI} '20: 22nd {International} {Conference} on {Human}-{Computer} {Interaction} with {Mobile} {Devices} and {Services}},
    publisher = {ACM},
    author = {Haesler, Steffen and Schmid, Stefka and Reuter, Christian},
    year = {2020},
    keywords = {Crisis, HCI, Projekt-ATHENE-SecUrban, Projekt-emergenCITY},
    pages = {1--56},
    }

  • Christian Reuter, Marc-André Kaufhold, Tina Comes, Michèle Knodt, Max Mühlhäuser (2020)
    Mobile Resilience: Designing Mobile Interactive Systems for Societal and Technical Resilience
    MobileHCI ’20: 22nd International Conference on Human-Computer Interaction with Mobile Devices and Services . doi:10.1145/3406324.3424590
    [BibTeX] [Abstract] [Download PDF]

    Digitalization and interconnectedness, facilitated by the Internet of Things (IoT) and the widespread distribution of mobile devices, can be used to tackle important societal challenges. This is maybe most prominently visible in the response to the COVID-2019 Pandemic. However, the design of mobile technology, functionality and underlying infrastructures must be resilient against disruptions caused by man-made (e.g. bombings, hacking) and natural (e.g. earthquakes, hurricanes) crises, emergencies and threats. To explore challenges, designs and potentials of interactive technologies, this workshop investigates the overlapping space of mobile technologies and resilient systems, including future application domains such as smart cities.

    @inproceedings{reuter_mobile_2020,
    title = {Mobile {Resilience}: {Designing} {Mobile} {Interactive} {Systems} for {Societal} and {Technical} {Resilience}},
    url = {https://dl.acm.org/doi/pdf/10.1145/3406324.3424590},
    doi = {10.1145/3406324.3424590},
    abstract = {Digitalization and interconnectedness, facilitated by the Internet of Things (IoT) and the widespread distribution of mobile devices, can be used to tackle important societal challenges. This is maybe most prominently visible in the response to the COVID-2019 Pandemic. However, the design of mobile technology, functionality and underlying infrastructures must be resilient against disruptions caused by man-made (e.g. bombings, hacking) and natural (e.g. earthquakes, hurricanes) crises, emergencies and threats. To explore challenges, designs and potentials of interactive technologies, this workshop investigates the overlapping space of mobile technologies and resilient systems, including future application domains such as smart cities.},
    booktitle = {{MobileHCI} '20: 22nd {International} {Conference} on {Human}-{Computer} {Interaction} with {Mobile} {Devices} and {Services}},
    author = {Reuter, Christian and Kaufhold, Marc-André and Comes, Tina and Knodt, Michèle and Mühlhäuser, Max},
    year = {2020},
    keywords = {Crisis, HCI, SocialMedia, Ranking-CORE-B, Projekt-ATHENE-SecUrban, Projekt-CYWARN, Projekt-emergenCITY},
    pages = {1--3},
    }

  • Christian Reuter, Jasmin Haunschild, Matthias Hollick, Max Mühlhäuser, Joachim Vogt, Michael Kreutzer (2020)
    Towards Secure Urban Infrastructures: Cyber Security Challenges to Information and Communication Technology in Smart Cities
    Mensch und Computer – Workshopband Magdeburg. doi:10.18420/muc2020-ws117-408
    [BibTeX] [Abstract] [Download PDF]

    The growth of cities continues to be a global megatrend. As more and more people live in urban areas and urban services and infrastructures are under growing strain, technologies are increasingly being researched and used to make city life more efficient and comfortable. As a result, so-called “Smart Cities” have complex IT infrastructures and cyber-physical systems such as sensor/actuator networks for the general population and are developing worldwide. Urban infrastructure must be secured against attacks, ensuring reliable and resilient services for citizens as well as privacy and data security. This paper introduces selected challenges faced by infrastructure providers, citizens and decision-makers in handling attacks aimed at information and communication technologies (ICT) of urban infrastructures and presents current research avenues for tackling cyberattacks and for developing tools for creating, portraying and disseminating actiona-ble information as one important response to security challenges. It then presents findings from a representative survey conducted in Germany (N=1091) on the experiences and perceptions of citizens concerning the relevance of cyberat-tacks will be presented.

    @inproceedings{reuter_towards_2020,
    address = {Magdeburg},
    title = {Towards {Secure} {Urban} {Infrastructures}: {Cyber} {Security} {Challenges} to {Information} and {Communication} {Technology} in {Smart} {Cities}},
    url = {https://dl.gi.de/bitstream/handle/20.500.12116/33550/muc2020-ws-408.pdf},
    doi = {10.18420/muc2020-ws117-408},
    abstract = {The growth of cities continues to be a global megatrend. As more and more people live in urban areas and urban services and infrastructures are under growing strain, technologies are increasingly being researched and used to make city life more efficient and comfortable. As a result, so-called “Smart Cities” have complex IT infrastructures and cyber-physical systems such as sensor/actuator networks for the general population and are developing worldwide. Urban infrastructure must be secured against attacks, ensuring reliable and resilient services for citizens as well as privacy and data security. This paper introduces selected challenges faced by infrastructure providers, citizens and decision-makers in handling attacks aimed at information and communication technologies (ICT) of urban infrastructures and presents current research avenues for tackling cyberattacks and for developing tools for creating, portraying and disseminating actiona-ble information as one important response to security challenges. It then presents findings from a representative survey conducted in Germany (N=1091) on the experiences and perceptions of citizens concerning the relevance of cyberat-tacks will be presented.},
    booktitle = {Mensch und {Computer} - {Workshopband}},
    publisher = {Gesellschaft für Informatik e.V.},
    author = {Reuter, Christian and Haunschild, Jasmin and Hollick, Matthias and Mühlhäuser, Max and Vogt, Joachim and Kreutzer, Michael},
    editor = {Hansen, C. and Nürnberger, A. and Preim, B.},
    year = {2020},
    keywords = {Crisis, UsableSec, Security, Infrastructure, Projekt-ATHENE-SecUrban, Projekt-emergenCITY},
    pages = {1--7},
    }

  • Philipp Kuehn, Thea Riebe, Lynn Apelt, Max Jansen, Christian Reuter (2020)
    Sharing of Cyber Threat Intelligence between States
    S+F Sicherheit und Frieden / Peace and Security ;38(1):22–28. doi:10.5771/0175-274X-2020-1-22
    [BibTeX] [Abstract] [Download PDF]

    Threats in cyberspace have increased in recent years due to the increment of offensive capabilities by states. Approaches to mitigate the security dilemma in cyberspace within the UN are deadlocked, as states have not been able to achieve agreements. However, from the perspective of IT-Security, there are Cyber Threat Intelligence (CTI) platforms to share and analyze cyber threats for a collective crisis management. To investigate, whether or not CTI platforms can be used as a confidence-building measure between states and international organizations, we portray current CTI platforms, showcase political requirements, and answer the question of how CTI communication may contribute to confidence-building in international affairs. Our results suggest the need to further develop analytical capabilities, as well as the implementation of a broad social, political, and legal environment for international CTI sharing.

    @article{kuehn_sharing_2020,
    title = {Sharing of {Cyber} {Threat} {Intelligence} between {States}},
    volume = {38},
    url = {http://www.peasec.de/paper/2020/2020_KuehnRiebeApeltJansenReuter_SharingCyberThreatIntelligence_SF.pdf},
    doi = {10.5771/0175-274X-2020-1-22},
    abstract = {Threats in cyberspace have increased in recent years due to the increment of offensive capabilities by states. Approaches to mitigate the security dilemma in cyberspace within the UN are deadlocked, as states have not been able to achieve agreements. However, from the perspective of IT-Security, there are Cyber Threat Intelligence (CTI) platforms to share and analyze cyber threats for a collective crisis management. To investigate, whether or not CTI platforms can be used as a confidence-building measure between states and international organizations, we portray current CTI platforms, showcase political requirements, and answer the question of how CTI communication may contribute to confidence-building in international affairs. Our results suggest the need to further develop analytical capabilities, as well as the implementation of a broad social, political, and legal environment for international CTI sharing.},
    number = {1},
    journal = {S+F Sicherheit und Frieden / Peace and Security},
    author = {Kuehn, Philipp and Riebe, Thea and Apelt, Lynn and Jansen, Max and Reuter, Christian},
    year = {2020},
    keywords = {Student, Security, Peace, Projekt-DualUse, Cyberwar, Projekt-ATHENE-SecUrban, Projekt-CYWARN},
    pages = {22--28},
    }

  • Christian Reuter, Jürgen Altmann, Malte Göttsche, Mirko Himmel (2020)
    Zur naturwissenschaftlich-technischen Friedens- und Konfliktforschung – Aktuelle Herausforderungen und Bewertung der Empfehlungen des Wissenschaftsrats
    Zeitschrift für Friedens- und Konfliktforschung (ZeFKo) ;9(1):143–154. doi:10.1007/s42597-020-00035-z
    [BibTeX] [Abstract] [Download PDF]

    ie besorgniserregende Aufkündigung des INF-Vertrags, der wiederholte Einsatz von Chemiewaffen in Syrien, kontroverse Diskussionen über die Einführung autonomer Waffensysteme oder zunehmende Cyber-Bedrohungen prägen das aktuelle politische Weltgeschehen. Besonders in einer Zeit, in der nukleare, biologische und chemische Abrüstung- und Rüstungskontrollmaßnahmen vor großen Herausforderungen stehen und gleichzeitig neue Technologien veränderte Anforderungen an diese Kontrollmechanismen mit sich bringen, gewinnt die naturwissenschaftlich-technische Friedensforschung enorm an Bedeutung. Sie beschäftigt sich auf der Grundlage von Erkenntnissen aus verschiedenen Naturwissenschaften und technischen Fachrichtungen (z. B. Physik, Chemie, Biologie, Informatik) mit der Rolle naturwissenschaftlicher und technischer Möglichkeiten im Kontext von Krieg und Frieden sowie Rüstung und Abrüstung. Sie unterstützt die politischen Prozesse der Kriegsprävention, der Abrüstung und der Vertrauensbildung mit Analysen der Eigenschaften und Folgen neuer Waffenarten und Technologien. Aus dieser Forschung werden Vorschläge für die Begrenzung neuer Waffenentwicklungen ebenso entwickelt wie technische Lösungen für eine verbesserte Rüstungskontrolle. Dieser Artikel benennt aktuelle Herausforderungen der naturwissenschaftlich-technischen Friedensforschung und geht dabei auch auf die aktuellen Empfehlungen des Wissenschaftsrats zur Weiterentwicklung der Friedens- und Konfliktforschung aus dem Jahr 2019 ein.

    @article{reuter_zur_2020,
    title = {Zur naturwissenschaftlich-technischen {Friedens}- und {Konfliktforschung} – {Aktuelle} {Herausforderungen} und {Bewertung} der {Empfehlungen} des {Wissenschaftsrats}},
    volume = {9},
    url = {https://link.springer.com/content/pdf/10.1007/s42597-020-00035-z.pdf},
    doi = {10.1007/s42597-020-00035-z},
    abstract = {ie besorgniserregende Aufkündigung des INF-Vertrags, der wiederholte Einsatz von Chemiewaffen in Syrien, kontroverse Diskussionen über die Einführung autonomer Waffensysteme oder zunehmende Cyber-Bedrohungen prägen das aktuelle politische Weltgeschehen. Besonders in einer Zeit, in der nukleare, biologische und chemische Abrüstung- und Rüstungskontrollmaßnahmen vor großen Herausforderungen stehen und gleichzeitig neue Technologien veränderte Anforderungen an diese Kontrollmechanismen mit sich bringen, gewinnt die naturwissenschaftlich-technische Friedensforschung enorm an Bedeutung. Sie beschäftigt sich auf der Grundlage von Erkenntnissen aus verschiedenen Naturwissenschaften und technischen Fachrichtungen (z. B. Physik, Chemie, Biologie, Informatik) mit der Rolle naturwissenschaftlicher und technischer Möglichkeiten im Kontext von Krieg und Frieden sowie Rüstung und Abrüstung. Sie unterstützt die politischen Prozesse der Kriegsprävention, der Abrüstung und der Vertrauensbildung mit Analysen der Eigenschaften und Folgen neuer Waffenarten und Technologien. Aus dieser Forschung werden Vorschläge für die Begrenzung neuer Waffenentwicklungen ebenso entwickelt wie technische Lösungen für eine verbesserte Rüstungskontrolle. Dieser Artikel benennt aktuelle Herausforderungen der naturwissenschaftlich-technischen Friedensforschung und geht dabei auch auf die aktuellen Empfehlungen des Wissenschaftsrats zur Weiterentwicklung der Friedens- und Konfliktforschung aus dem Jahr 2019 ein.},
    number = {1},
    journal = {Zeitschrift für Friedens- und Konfliktforschung (ZeFKo)},
    author = {Reuter, Christian and Altmann, Jürgen and Göttsche, Malte and Himmel, Mirko},
    year = {2020},
    keywords = {Security, Peace, Projekt-CROSSING, Cyberwar, Projekt-ATHENE-SecUrban},
    pages = {143--154},
    }

  • Christian Reuter (2020)
    Towards IT Peace Research: Challenges at the Intersection of Peace and Conflict Research and Computer Science
    S+F Sicherheit und Frieden / Peace and Security ;38(1):10–16. doi:10.5771/0175-274X-2020-1-10
    [BibTeX] [Abstract] [Download PDF]

    Advances in science and technology, including information technology (IT), play a crucial role in the context of peace and security. However, research on the intersection of peace and conflict research as well as computer science is not well established yet. This article highlights the need for further work in the area of research “IT peace research”, which includes both empirical research on the role of IT in peace and security, as well as technical research to design technologies and applications. Based on the elaboration of the disciplines, central challenges, such as insecurity, actors, attribution and laws, are outlined.

    @article{reuter_towards_2020-1,
    title = {Towards {IT} {Peace} {Research}: {Challenges} at the {Intersection} of {Peace} and {Conflict} {Research} and {Computer} {Science}},
    volume = {38},
    url = {https://www.nomos-elibrary.de/10.5771/0175-274X-2020-1-10.pdf},
    doi = {10.5771/0175-274X-2020-1-10},
    abstract = {Advances in science and technology, including information technology (IT), play a crucial role in the context of peace and security. However, research on the intersection of peace and conflict research as well as computer science is not well established yet. This article highlights the need for further work in the area of research “IT peace research”, which includes both empirical research on the role of IT in peace and security, as well as technical research to design technologies and applications. Based on the elaboration of the disciplines, central challenges, such as insecurity, actors, attribution and laws, are outlined.},
    number = {1},
    journal = {S+F Sicherheit und Frieden / Peace and Security},
    author = {Reuter, Christian},
    year = {2020},
    keywords = {Security, Peace, Projekt-DualUse, AuswahlPeace, Cyberwar, Projekt-ATHENE-SecUrban},
    pages = {10--16},
    }

  • Thomas Reinhold (2020)
    Verfassungs- und völkerrechtliche Fragen im militärischen Cyber- und Informationsraum unter besonderer Berücksichtigung des Parlamentsvorbehalts, der Zurechenbarkeit von Cyberangriffen sowie einer möglichen Anpassung nationaler und internationaler Normen
    In: : Deutscher Bundestag, Verteidigungsausschuss. Deutscher Bundestag, Verteidigungsausschuss, , 1–9.
    [BibTeX] [Download PDF]

    @incollection{reinhold_verfassungs-_2020,
    title = {Verfassungs- und völkerrechtliche {Fragen} im militärischen {Cyber}- und {Informationsraum} unter besonderer {Berücksichtigung} des {Parlamentsvorbehalts}, der {Zurechenbarkeit} von {Cyberangriffen} sowie einer möglichen {Anpassung} nationaler und internationaler {Normen}},
    url = {https://www.bundestag.de/resource/blob/824622/67fc9db4f856a8445355562500d2a134/stellungnahme-Thomas-Reinhold_15-03-2021-data.pdf},
    booktitle = {Deutscher {Bundestag}, {Verteidigungsausschuss}},
    publisher = {Deutscher Bundestag, Verteidigungsausschuss},
    author = {Reinhold, Thomas},
    year = {2020},
    keywords = {Security, Peace, Cyberwar, Projekt-ATHENE-SecUrban},
    pages = {1--9},
    }

  • Marc-André Kaufhold (2020)
    Information Refinement Technologies for Crisis Informatics: User Expectations and Design Implications for Social Media and Mobile Apps in Crisis
    Darmstadt, Germany: Dissertation (Dr. rer. nat.), Department of Computer Science, Technische Unviersität Darmstadt.
    [BibTeX] [Abstract] [Download PDF]

    In den letzten 20 Jahren haben sich mobile Technologien und soziale Medien nicht nur im Alltag, sondern auch in Krisensituationen etabliert. Insbesondere großflächige Ereignisse wie der Hurrikan Sandy (2012) oder das mitteleuropäische Hochwasser (2013) haben gezeigt, dass sich die Bevölkerung aktiv mit Informations- und Kommunikationstechnologie (IKT) an der Schadensbewältigung beteiligt (Reuter, Hughes, et al., 2018). Daraus ist das Forschungsfeld der Kriseninformatik entstanden, welches Wissen der Informatik und Gesellschaftswissenschaften kombiniert und zudem in Disziplinen wie der MenschMaschine-Interaktion (HCI), Computerunterstützten Gruppenarbeit (CSCW) und Wirtschaftsinformatik (WI) verankert ist. Während die Bevölkerung IKT einsetzt, um die Unsicherheiten in Krisen zu bewältigen, nutzen Behörden und Organisationen mit Sicherheitsaufgaben (BOS), etwa Feuerwehr und Polizei, öffentliche Daten, um das Situationsbewusstsein und die Entscheidungsfindung für eine bessere Schadensbewältigung zu verbessern (Palen & Anderson, 2016). Noch größere Katastrophen wie die aktuelle COVID-19-Pandemie verstärken dabei die Herausforderungen der Kriseninformatik (Xie et al., 2020). Für BOS stellt die umfangreiche Menge heterogener und semantisch verknüpfter Daten, auch Social Big Data genannt (Olshannikova et al., 2017), eine große Herausforderung im Hinblick auf die Qualität, Quantität und den Zugriff auf relevante Informationen dar. Um ein Situationsbewusstsein und nutzbare Informationen, d. h. die richtigen Informationen zur richtigen Zeit bei der richtigen Person, zu erhalten (Zade et al., 2018), müssen Informationen auf die Bedingungen des Ereignisses, organisationale Anforderungen, soziale Rahmenbedingungen und technische Möglichkeiten verfeinert werden. Diese Dissertation kombiniert das methodische Framework der Designfallstudien (Wulf et al., 2011) mit den Prinzipien der Design-Science-Forschung (Hevner et al., 2004), um das Thema der Informationsverfeinerung (Information Refinement) in vier Phasen zu untersuchen, wovon jede unterschiedliche Forschungsbeiträge hervorbringt. Die Arbeit begutachtet zunächst Nutzungs-, Rollen- und Wahrnehmungsmuster in der Kriseninformatik und stellt die Potenziale sozialer Medien zur öffentlichen Teilhabe an der Krisenbewältigung heraus. Die empirische Studien mit der deutschen Bevölkerung zeigen die positiven Einstellungen und die steigende Nutzung mobiler und sozialer Technologien in Krisen, stellen aber auch Barrieren heraus und zeigen die Erwartung, dass BOS in soziale Medien aktiv sind. Die Ergebnisse fundieren das Design innovativer IKT-Artefakte, darunter visuelle Bevölkerungsrichtlinien für soziale Medien in Krisen (SMG), ein Web-Interface für BOS zur Aggregation mobiler und sozialer Daten (ESI), ein Algorithmus zur Extraktion relevanter Informationen in sozialen Medien (SMO), und eine mobile App für die bidirektionale Kommunikation zwischen BOS und Bevölkerung (112.social). Die Evaluation der Artefakte involviert EndnutzerInnen aus dem Anwendungsfeld des Krisenmanagements, um potenziale für Verbesserungen und zukünftige Forschung zu identifizieren. Die Arbeit schließt mit einem Framework zur Informationsverfeinerung für die Kriseninformatik ab, welche die event-, gesellschafts-, organisation- und technologiebasierte Perspektive integriert.

    @book{kaufhold_information_2020,
    address = {Darmstadt, Germany},
    title = {Information {Refinement} {Technologies} for {Crisis} {Informatics}: {User} {Expectations} and {Design} {Implications} for {Social} {Media} and {Mobile} {Apps} in {Crisis}},
    url = {https://doi.org/10.26083/tuprints-00017474},
    abstract = {In den letzten 20 Jahren haben sich mobile Technologien und soziale Medien nicht nur im Alltag, sondern auch in Krisensituationen etabliert. Insbesondere großflächige Ereignisse wie der Hurrikan Sandy (2012) oder das mitteleuropäische Hochwasser (2013) haben gezeigt, dass sich die Bevölkerung aktiv mit Informations- und Kommunikationstechnologie (IKT) an der Schadensbewältigung beteiligt (Reuter, Hughes, et al., 2018). Daraus ist das Forschungsfeld der Kriseninformatik entstanden, welches Wissen der Informatik und Gesellschaftswissenschaften kombiniert und zudem in Disziplinen wie der MenschMaschine-Interaktion (HCI), Computerunterstützten Gruppenarbeit (CSCW) und Wirtschaftsinformatik (WI) verankert ist. Während die Bevölkerung IKT einsetzt, um die Unsicherheiten in Krisen zu bewältigen, nutzen Behörden und Organisationen mit Sicherheitsaufgaben (BOS), etwa Feuerwehr und Polizei, öffentliche Daten, um das Situationsbewusstsein und die Entscheidungsfindung für eine bessere Schadensbewältigung zu verbessern (Palen \& Anderson, 2016). Noch größere Katastrophen wie die aktuelle COVID-19-Pandemie verstärken dabei die Herausforderungen der Kriseninformatik (Xie et al., 2020). Für BOS stellt die umfangreiche Menge heterogener und semantisch verknüpfter Daten, auch Social Big Data genannt (Olshannikova et al., 2017), eine große Herausforderung im Hinblick auf die Qualität, Quantität und den Zugriff auf relevante Informationen dar. Um ein Situationsbewusstsein und nutzbare Informationen, d. h. die richtigen Informationen zur richtigen Zeit bei der richtigen Person, zu erhalten (Zade et al., 2018), müssen Informationen auf die Bedingungen des Ereignisses, organisationale Anforderungen, soziale Rahmenbedingungen und technische Möglichkeiten verfeinert werden. Diese Dissertation kombiniert das methodische Framework der Designfallstudien (Wulf et al., 2011) mit den Prinzipien der Design-Science-Forschung (Hevner et al., 2004), um das Thema der Informationsverfeinerung (Information Refinement) in vier Phasen zu untersuchen, wovon jede unterschiedliche Forschungsbeiträge hervorbringt. Die Arbeit begutachtet zunächst Nutzungs-, Rollen- und Wahrnehmungsmuster in der Kriseninformatik und stellt die Potenziale sozialer Medien zur öffentlichen Teilhabe an der Krisenbewältigung heraus. Die empirische Studien mit der deutschen Bevölkerung zeigen die positiven Einstellungen und die steigende Nutzung mobiler und sozialer Technologien in Krisen, stellen aber auch Barrieren heraus und zeigen die Erwartung, dass BOS in soziale Medien aktiv sind. Die Ergebnisse fundieren das Design innovativer IKT-Artefakte, darunter visuelle Bevölkerungsrichtlinien für soziale Medien in Krisen (SMG), ein Web-Interface für BOS zur Aggregation mobiler und sozialer Daten (ESI), ein Algorithmus zur Extraktion relevanter Informationen in sozialen Medien (SMO), und eine mobile App für die bidirektionale Kommunikation zwischen BOS und Bevölkerung (112.social). Die Evaluation der Artefakte involviert EndnutzerInnen aus dem Anwendungsfeld des Krisenmanagements, um potenziale für Verbesserungen und zukünftige Forschung zu identifizieren. Die Arbeit schließt mit einem Framework zur Informationsverfeinerung für die Kriseninformatik ab, welche die event-, gesellschafts-, organisation- und technologiebasierte Perspektive integriert.},
    publisher = {Dissertation (Dr. rer. nat.), Department of Computer Science, Technische Unviersität Darmstadt},
    author = {Kaufhold, Marc-André},
    year = {2020},
    keywords = {Crisis, Projekt-KontiKat, Projekt-ATHENE-SecUrban, Projekt-CYWARN, Dissertation},
    }

  • Marc-André Kaufhold, Markus Bayer, Christian Reuter (2020)
    Rapid relevance classification of social media posts in disasters and emergencies: A system and evaluation featuring active, incremental and online learning
    Information Processing & Management (IPM) ;57(1):1–32.
    [BibTeX] [Abstract] [Download PDF]

    The research field of crisis informatics examines, amongst others, the potentials and barriers of social media use during disasters and emergencies. Social media allow emergency services to receive valuable information (e.g., eyewitness reports, pictures, or videos) from social media. However, the vast amount of data generated during large-scale incidents can lead to issue of information overload. Research indicates that supervised machine learning techniques are sui- table for identifying relevant messages and filter out irrelevant messages, thus mitigating in- formation overload. Still, they require a considerable amount of labeled data, clear criteria for relevance classification, a usable interface to facilitate the labeling process and a mechanism to rapidly deploy retrained classifiers. To overcome these issues, we present (1) a system for social media monitoring, analysis and relevance classification, (2) abstract and precise criteria for re- levance classification in social media during disasters and emergencies, (3) the evaluation of a well-performing Random Forest algorithm for relevance classification incorporating metadata from social media into a batch learning approach (e.g., 91.28\%/89.19\% accuracy, 98.3\%/89.6\% precision and 80.4\%/87.5\% recall with a fast training time with feature subset selection on the European floods/BASF SE incident datasets), as well as (4) an approach and preliminary eva- luation for relevance classification including active, incremental and online learning to reduce the amount of required labeled data and to correct misclassifications of the algorithm by feed- back classification. Using the latter approach, we achieved a well-performing classifier based on the European floods dataset by only requiring a quarter of labeled data compared to the tradi- tional batch learning approach. Despite a lesser effect on the BASF SE incident dataset, still a substantial improvement could be determined.

    @article{kaufhold_rapid_2020,
    title = {Rapid relevance classification of social media posts in disasters and emergencies: {A} system and evaluation featuring active, incremental and online learning},
    volume = {57},
    url = {https://peasec.de/paper/2020/2020_KaufholdBayerReuter_RapidRelevanceClassification_IPM.pdf},
    abstract = {The research field of crisis informatics examines, amongst others, the potentials and barriers of social media use during disasters and emergencies. Social media allow emergency services to receive valuable information (e.g., eyewitness reports, pictures, or videos) from social media. However, the vast amount of data generated during large-scale incidents can lead to issue of information overload. Research indicates that supervised machine learning techniques are sui- table for identifying relevant messages and filter out irrelevant messages, thus mitigating in- formation overload. Still, they require a considerable amount of labeled data, clear criteria for relevance classification, a usable interface to facilitate the labeling process and a mechanism to rapidly deploy retrained classifiers. To overcome these issues, we present (1) a system for social media monitoring, analysis and relevance classification, (2) abstract and precise criteria for re- levance classification in social media during disasters and emergencies, (3) the evaluation of a well-performing Random Forest algorithm for relevance classification incorporating metadata from social media into a batch learning approach (e.g., 91.28\%/89.19\% accuracy, 98.3\%/89.6\% precision and 80.4\%/87.5\% recall with a fast training time with feature subset selection on the European floods/BASF SE incident datasets), as well as (4) an approach and preliminary eva- luation for relevance classification including active, incremental and online learning to reduce the amount of required labeled data and to correct misclassifications of the algorithm by feed- back classification. Using the latter approach, we achieved a well-performing classifier based on the European floods dataset by only requiring a quarter of labeled data compared to the tradi- tional batch learning approach. Despite a lesser effect on the BASF SE incident dataset, still a substantial improvement could be determined.},
    number = {1},
    journal = {Information Processing \& Management (IPM)},
    author = {Kaufhold, Marc-André and Bayer, Markus and Reuter, Christian},
    year = {2020},
    keywords = {Crisis, SocialMedia, A-Paper, Ranking-ImpactFactor, Ranking-CORE-A, Ranking-WKWI-B, Projekt-ATHENE-SecUrban, Projekt-emergenCITY, AuswahlKaufhold},
    pages = {1--32},
    }

  • Jasmin Haunschild, Marc-André Kaufhold, Christian Reuter (2020)
    Sticking with Landlines? Citizens‘ and Police Social Media Use and Expectation During Emergencies
    Proceedings of the International Conference on Wirtschaftsinformatik (WI) (Best Paper Social Impact Award) Potsdam, Germany. doi:10.30844/wi_2020_o2-haunschild
    [BibTeX] [Abstract] [Download PDF]

    Crisis informatics has examined the use, potentials and weaknesses of social media in emergencies across different events (e.g., man-made, natural or hybrid), countries and heterogeneous participants (e.g., citizens or emergency services) for almost two decades. While most research analyzes specific cases, few studies have focused on citizens‘ perceptions of different social media platforms in emergencies using a representative sample. Basing our questionnaire on a workshop with police officers, we present the results of a representative study on citizens‘ perception of social media in emergencies that we conducted in Germany. Our study suggests that when it comes to emergencies, socio-demographic differences are largely insignificant and no clear preferences for emergency services‘ social media strategies exist. Due to the widespread searching behavior on some platforms, emergency services can reach a wide audience by turning to certain channels but should account for groups with distinct preferences.

    @inproceedings{haunschild_sticking_2020,
    address = {Potsdam, Germany},
    title = {Sticking with {Landlines}? {Citizens}' and {Police} {Social} {Media} {Use} and {Expectation} {During} {Emergencies}},
    url = {http://www.peasec.de/paper/2020/2020_HaunschildKaufholdReuter_SocialMediaPoliceSurvey_WI.pdf},
    doi = {10.30844/wi_2020_o2-haunschild},
    abstract = {Crisis informatics has examined the use, potentials and weaknesses of social media in emergencies across different events (e.g., man-made, natural or hybrid), countries and heterogeneous participants (e.g., citizens or emergency services) for almost two decades. While most research analyzes specific cases, few studies have focused on citizens' perceptions of different social media platforms in emergencies using a representative sample. Basing our questionnaire on a workshop with police officers, we present the results of a representative study on citizens' perception of social media in emergencies that we conducted in Germany. Our study suggests that when it comes to emergencies, socio-demographic differences are largely insignificant and no clear preferences for emergency services' social media strategies exist. Due to the widespread searching behavior on some platforms, emergency services can reach a wide audience by turning to certain channels but should account for groups with distinct preferences.},
    booktitle = {Proceedings of the {International} {Conference} on {Wirtschaftsinformatik} ({WI}) ({Best} {Paper} {Social} {Impact} {Award})},
    publisher = {AIS Electronic Library (AISel)},
    author = {Haunschild, Jasmin and Kaufhold, Marc-André and Reuter, Christian},
    year = {2020},
    keywords = {Crisis, Ranking-CORE-C, Ranking-VHB-C, Ranking-WKWI-A, Projekt-MAKI, Projekt-ATHENE-SecUrban, Projekt-emergenCITY},
    pages = {1--16},
    }

    ATHENE-PriVis: Visualization-based Technologies as Enablers for Privacy Sovereignty Online (01.01.2023-31.12.2026, BMBF+HMWK)

    ATHENE-PriVis: Visualization-based Technologies as Enablers for Privacy Sovereignty Online
    (01.01.2023-31.12.2026)

    Current digital environments present a highly complex landscape regarding privacy. In online contexts such as social networks, mobile devices, or Internet-of-Things (IoT) devices, privacy losses or violations are not always trivial to perceive and decide upon. This complicates the design of privacy regulations and leaves online providers with ample scope to design and implement their  products to collect, store, process and disclose end-users’ personal information, hence endangering end-users’ data and privacy sovereignty. While regulations such as the General Data Protection Regulation (GDPR) aim to strengthen users’ rights to privacy sovereignty, current approaches that aim to make use of this regulation in order to promote the conscious handling of personal information online fall short of the desired effects in three important ways. (1) Privacy-enhancing regulations and technical solutions lack comprehensibility and usability for end-users. (2) The inherent connections among individuals and their personal data lead to the fact that a person’s privacy is not only affected by their own decisions, but also by those of other individuals or organizations. (3) In current research and practice, there is a lack of strategies for addressing privacy sovereignty needs that are tailored to individual circumstances, e.g., individual with little IT competence. Hence, the overarching goal of the research project “Visualization-based Technologies as Enablers for Privacy Sovereignty Online” (PriVis) is to develop prototypes of user interfaces employing personalized visualization-based Transparency-enhancing technologies (TETs) based on a detailed evaluation of user needs when interacting with the digital world. Personalized visualization-based TETs are defined as “transparency-enhancing technologies which incorporate information visualization techniques to increase the perceived transparency of personal data for users and are customizable for different user groups.”

    ATHENE – Nationales Forschungszentrum für angewandte Cybersicherheit (seit 1.1.2019, BMBF+HMWK) – Website

    Das Nationale Forschungs­zentrum für angewandte Cyber­sicher­heit ATHENE ist eine Forschungseinrichtung der Fraunhofer-Institute SIT und IGD sowie der Hochschulen TU Darmstadt und Hochschule Darmstadt. In einem bisher einzigartigen und innovativen Kooperations­modell von universitärer und außeruniversitärer Forschung betreibt ATHENE Spitzenforschung zum Wohl von Wirtschaft, Gesellschaft und Staat und setzt Impulse in der Wissenschaft. Das Forschungs­zentrum arbeitet agil und effizient und kann so auch kurzfristig auf neue He­raus­for­de­rung­en und veränderte Bedroh­ungs­lagen reagieren. ATHENE wird gefördert vom Bundesministerium für Bildung und Forschung (BMBF) und vom Hessischen Ministerium für Wissenschaft und Kunst (HMWK) und hat seinen Standort in der Wissen­schafts­stadt Darmstadt, Deutschlands erster Adresse für Cyber­sicher­heits­for­schung.

    2024

  • Jasmin Haunschild, Laura Guntrum, Sofía Cerrillo, Franziska Bujara, Christian Reuter (2024)
    Towards a Digitally Mediated Transitional Justice Process? An Analysis of Colombian Transitional Justice Organisations’ Posting Behaviour on Facebook
    Peace and Conflict Studies .
    [BibTeX] [Abstract]

    In Colombia, Transitional Justice (TJ) institutions were established after years of violent conflict as part of the 2016 peace agreement between the FARC and the Colombian government. By analysing the posting behaviour of the government-appointed TJ institutions on Facebook, we show how general TJ aims and opportunities for citizen participation were promoted in 2019. Our analysis reveals that the organisations rarely address topics related to reconciliation and that active online participation and two-way communication are rather scarce. Instead, Facebook is mainly used by the TJ organisations to increase solidarity with victims and disseminate information about their work and the TJ process. Reflecting on existing literature on TJ and social media participation, we identify great potential for expanding TJ goals and community engagement on social media, to use it as a resource for facilitating the TJ processes, creating exchange, and enabling participation.

    @article{haunschild_towards_2024,
    title = {Towards a {Digitally} {Mediated} {Transitional} {Justice} {Process}? {An} {Analysis} of {Colombian} {Transitional} {Justice} {Organisations}’ {Posting} {Behaviour} on {Facebook}},
    abstract = {In Colombia, Transitional Justice (TJ) institutions were established after years of violent conflict as part of the 2016 peace agreement between the FARC and the Colombian government. By analysing the posting behaviour of the government-appointed TJ institutions on Facebook, we show how general TJ aims and opportunities for citizen participation were promoted in 2019. Our analysis reveals that the organisations rarely address topics related to reconciliation and that active online participation and two-way communication are rather scarce. Instead, Facebook is mainly used by the TJ organisations to increase solidarity with victims and disseminate information about their work and the TJ process. Reflecting on existing literature on TJ and social media participation, we identify great potential for expanding TJ goals and community engagement on social media, to use it as a resource for facilitating the TJ processes, creating exchange, and enabling participation.},
    journal = {Peace and Conflict Studies},
    author = {Haunschild, Jasmin and Guntrum, Laura and Cerrillo, Sofía and Bujara, Franziska and Reuter, Christian},
    year = {2024},
    keywords = {SocialMedia, Student, Peace, Projekt-ATHENE-SecUrban},
    }

  • Franz Kuntke (2024)
    Resilient Smart Farming: Crisis-Capable Information and Communication Technologies for Agriculture
    Wiesbaden, Germany: Springer Vieweg.
    [BibTeX]

    @book{kuntke_resilient_2024,
    address = {Wiesbaden, Germany},
    title = {Resilient {Smart} {Farming}: {Crisis}-{Capable} {Information} and {Communication} {Technologies} for {Agriculture}},
    publisher = {Springer Vieweg},
    author = {Kuntke, Franz},
    year = {2024},
    keywords = {Crisis, HCI, UsableSec, Security, RSF, Projekt-ATHENE-SecUrban, Projekt-emergenCITY, Dissertation},
    }

  • Jasmin Haunschild (2024)
    Enhancing Citizens’ Role in Public Safety: Interaction, Perception and Design of Mobile Warning Apps
    Darmstadt, Germany: Dissertation (Dr. rer. nat.), Department of Computer Science, Technische Universität Darmstadt.
    [BibTeX]

    @book{haunschild_enhancing_2024,
    address = {Darmstadt, Germany},
    title = {Enhancing {Citizens}’ {Role} in {Public} {Safety}: {Interaction}, {Perception} and {Design} of {Mobile} {Warning} {Apps}},
    publisher = {Dissertation (Dr. rer. nat.), Department of Computer Science, Technische Universität Darmstadt},
    author = {Haunschild, Jasmin},
    year = {2024},
    keywords = {Crisis, HCI, Projekt-ATHENE-SecUrban, Projekt-emergenCITY, Dissertation},
    }

  • Jasmin Haunschild (2024)
    Enhancing Citizens’ Role in Public Safety: Interaction, Perception and Design of Mobile Warning Apps
    Wiesbaden, Germany: Springer Vieweg.
    [BibTeX]

    @book{haunschild_enhancing_2024-1,
    address = {Wiesbaden, Germany},
    title = {Enhancing {Citizens}’ {Role} in {Public} {Safety}: {Interaction}, {Perception} and {Design} of {Mobile} {Warning} {Apps}},
    publisher = {Springer Vieweg},
    author = {Haunschild, Jasmin},
    year = {2024},
    keywords = {Crisis, HCI, Projekt-ATHENE-SecUrban, Projekt-emergenCITY, Dissertation},
    }

  • Felix Burger, Jasmin Haunschild, Christian Reuter (2024)
    Understanding Crisis Preparedness: Insights from Personal Values, Beliefs, Social Norms, and Personal Norms
    Proceedings of the 17th International Conference on Information Systems for Crisis Response and Management (ISCRAM) .
    [BibTeX] [Abstract]

    In disasters and crises, individual household preparedness is crucial for societal resilience. However, motivating citizens to take personal responsibility and to implement preparedness measures remains challenging. This study investigates the impact of values, beliefs and norms on preparedness. Through a survey on resource-oriented crisis preparedness and participants’ values, a group of rather prepared and rather unprepared people was differentiated. We quantitatively analyzed the correlation between values and crisis preparedness. Quantitative analysis revealed a significant association between benevolence as a value and higher preparedness. Follow-up interviews (N=30) delved into participants‘ beliefs and norms, showing minimal group differences. While crisis preparedness is mildly positively viewed, strong negativity exists towards perceived “hoarders” or “preppers.” The study discusses implication for crisis communication and the design of nudges and persuasive systems, emphasizing the role of benevolence in fostering preparedness.

    @inproceedings{burger_understanding_2024,
    title = {Understanding {Crisis} {Preparedness}: {Insights} from {Personal} {Values}, {Beliefs}, {Social} {Norms}, and {Personal} {Norms}},
    abstract = {In disasters and crises, individual household preparedness is crucial for societal resilience. However, motivating citizens to take personal responsibility and to implement preparedness measures remains challenging. This study investigates the impact of values, beliefs and norms on preparedness. Through a survey on resource-oriented crisis preparedness and participants’ values, a group of rather prepared and rather unprepared people was differentiated. We quantitatively analyzed the correlation between values and crisis preparedness. Quantitative analysis revealed a significant association between benevolence as a value and higher preparedness. Follow-up interviews (N=30) delved into participants' beliefs and norms, showing minimal group differences. While crisis preparedness is mildly positively viewed, strong negativity exists towards perceived “hoarders” or “preppers.” The study discusses implication for crisis communication and the design of nudges and persuasive systems, emphasizing the role of benevolence in fostering preparedness.},
    booktitle = {Proceedings of the 17th {International} {Conference} on {Information} {Systems} for {Crisis} {Response} and {Management} ({ISCRAM})},
    author = {Burger, Felix and Haunschild, Jasmin and Reuter, Christian},
    year = {2024},
    keywords = {Crisis, Student, Projekt-ATHENE-SecUrban, Projekt-emergenCITY},
    }

    2023

  • Stefka Schmid, Laura Guntrum, Steffen Haesler, Lisa Schultheiß, Christian Reuter (2023)
    Digital Volunteers During the COVID-19 Pandemic: Care Work on Social Media for Socio-technical Resilience
    Weizenbaum Journal of the Digital Society ;3(1). doi:10.34669/WI.WJDS/3.3.6
    [BibTeX] [Abstract] [Download PDF]

    Like past crises, the COVID-19 pandemic has also activated individual volunteers to help to respond to the crisis. This includes digital volunteers, who have organized physical aid and conducted activities on social media. Analyzing German volunteering support groups on Facebook and related Reddit threads in the context of the COVID-19 pandemic, we {\textbackslash}updatedshow what type of help is offered and how social media users interact with each other, trying to cope with the situation. We reveal that most users offering help online conduct mostly typical care work, such as buying groceries or giving advice. Crucially, volunteering is characterized by relationships of care and thus builds on affirmative interactions. Albeit some misdirected offers and regressive interruptions, people use the possibility to make their voices heard and, showing empathy, help each other to cope with crisis. Social media like Facebook mediate societal structures, including relationships of care, offering a space for continuous, cumulatively resilient conduct of care work. Reflecting on the traditional division of labor in crisis volunteering and counter-productive dynamics of care and empathy, we aim for feminist ethics of care which allows for interactions on social media that foster generative computer-supported collaboration.

    @article{schmid_digital_2023,
    title = {Digital {Volunteers} {During} the {COVID}-19 {Pandemic}: {Care} {Work} on {Social} {Media} for {Socio}-technical {Resilience}},
    volume = {3},
    issn = {2748-5625},
    url = {https://ojs.weizenbaum-institut.de/index.php/wjds/article/view/78},
    doi = {10.34669/WI.WJDS/3.3.6},
    abstract = {Like past crises, the COVID-19 pandemic has also activated individual volunteers to help to respond to the crisis. This includes digital volunteers, who have organized physical aid and conducted activities on social media. Analyzing German volunteering support groups on Facebook and related Reddit threads in the context of the COVID-19 pandemic, we {\textbackslash}updatedshow what type of help is offered and how social media users interact with each other, trying to cope with the situation. We reveal that most users offering help online conduct mostly typical care work, such as buying groceries or giving advice. Crucially, volunteering is characterized by relationships of care and thus builds on affirmative interactions. Albeit some misdirected offers and regressive interruptions, people use the possibility to make their voices heard and, showing empathy, help each other to cope with crisis. Social media like Facebook mediate societal structures, including relationships of care, offering a space for continuous, cumulatively resilient conduct of care work. Reflecting on the traditional division of labor in crisis volunteering and counter-productive dynamics of care and empathy, we aim for feminist ethics of care which allows for interactions on social media that foster generative computer-supported collaboration.},
    number = {1},
    journal = {Weizenbaum Journal of the Digital Society},
    author = {Schmid, Stefka and Guntrum, Laura and Haesler, Steffen and Schultheiß, Lisa and Reuter, Christian},
    month = may,
    year = {2023},
    keywords = {Crisis, HCI, SocialMedia, Student, Peace, Projekt-ATHENE-SecUrban, Projekt-emergenCITY, Projekt-TraCe},
    }

  • Thomas Reinhold, Christian Reuter (2023)
    Preventing the escalation of cyber conflicts: towards an approach to plausibly assure the non-involvement in a cyberattack
    Zeitschrift für Friedens- und Konfliktforschung (ZeFKo) ;12(1):31–58. doi:10.1007/s42597-023-00099-7
    [BibTeX] [Abstract] [Download PDF]

    While cyberspace has evolved into a commonly shared space vital to our individual lives and societies, malicious cyber activities by state actors as part of espionage operations, regarding defense strategies, or as part of traditional conflicts have strongly increased. In contrast, attributing the origin of such activities remains problematic. The ambiguity of digital data raises the problem of misinterpreting available information, increasing the risk of misinformed reactions and conflict escalation. In order to reduce this risk, this paper proposes a transparency system based on technologies which usually already exist for IT security measures that an accused actor in a specific incident can use to provide credible information which plausibly assures his non-involvement. The paper analyses the technical requirements, presents the technical concept and discusses the necessary adjustments to existing IT networks for its implementation. Intended as a measure for conflict de-escalation, the paper further discusses the limitations of this approach, especially with regard to technical limits as well as the political motivation and behavior of states.

    @article{reinhold_preventing_2023,
    title = {Preventing the escalation of cyber conflicts: towards an approach to plausibly assure the non-involvement in a cyberattack},
    volume = {12},
    issn = {2524-6976},
    url = {https://doi.org/10.1007/s42597-023-00099-7},
    doi = {10.1007/s42597-023-00099-7},
    abstract = {While cyberspace has evolved into a commonly shared space vital to our individual lives and societies, malicious cyber activities by state actors as part of espionage operations, regarding defense strategies, or as part of traditional conflicts have strongly increased. In contrast, attributing the origin of such activities remains problematic. The ambiguity of digital data raises the problem of misinterpreting available information, increasing the risk of misinformed reactions and conflict escalation. In order to reduce this risk, this paper proposes a transparency system based on technologies which usually already exist for IT security measures that an accused actor in a specific incident can use to provide credible information which plausibly assures his non-involvement. The paper analyses the technical requirements, presents the technical concept and discusses the necessary adjustments to existing IT networks for its implementation. Intended as a measure for conflict de-escalation, the paper further discusses the limitations of this approach, especially with regard to technical limits as well as the political motivation and behavior of states.},
    number = {1},
    journal = {Zeitschrift für Friedens- und Konfliktforschung (ZeFKo)},
    author = {Reinhold, Thomas and Reuter, Christian},
    month = apr,
    year = {2023},
    keywords = {Security, Peace, Projekt-CROSSING, Projekt-ATHENE-SecUrban},
    pages = {31--58},
    }

  • Philipp Kuehn, Mike Schmidt, Markus Bayer, Christian Reuter (2023)
    ThreatCrawl: A BERT-based Focused Crawler for the Cybersecurity Domain
    2023.
    [BibTeX] [Abstract] [Download PDF]

    Publicly available information contains valuable information for Cyber Threat Intelligence (CTI). This can be used to prevent attacks that have already taken place on other systems. Ideally, only the initial attack succeeds and all subsequent ones are detected and stopped. But while there are different standards to exchange this information, a lot of it is shared in articles or blog posts in non-standardized ways. Manually scanning through multiple online portals and news pages to discover new threats and extracting them is a time-consuming task. To automize parts of this scanning process, multiple papers propose extractors that use Natural Language Processing (NLP) to extract Indicators of Compromise (IOCs) from documents. However, while this already solves the problem of extracting the information out of documents, the search for these documents is rarely considered. In this paper, a new focused crawler is proposed called ThreatCrawl, which uses Bidirectional Encoder Representations from Transformers (BERT)-based models to classify documents and adapt its crawling path dynamically. While ThreatCrawl has difficulties to classify the specific type of Open Source Intelligence (OSINT) named in texts, e.g., IOC content, it can successfully find relevant documents and modify its path accordingly. It yields harvest rates of up to 52\%, which are, to the best of our knowledge, better than the current state of the art.

    @techreport{kuehn_threatcrawl_2023,
    title = {{ThreatCrawl}: {A} {BERT}-based {Focused} {Crawler} for the {Cybersecurity} {Domain}},
    shorttitle = {{ThreatCrawl}},
    url = {http://arxiv.org/abs/2304.11960},
    abstract = {Publicly available information contains valuable information for Cyber Threat Intelligence (CTI). This can be used to prevent attacks that have already taken place on other systems. Ideally, only the initial attack succeeds and all subsequent ones are detected and stopped. But while there are different standards to exchange this information, a lot of it is shared in articles or blog posts in non-standardized ways. Manually scanning through multiple online portals and news pages to discover new threats and extracting them is a time-consuming task. To automize parts of this scanning process, multiple papers propose extractors that use Natural Language Processing (NLP) to extract Indicators of Compromise (IOCs) from documents. However, while this already solves the problem of extracting the information out of documents, the search for these documents is rarely considered. In this paper, a new focused crawler is proposed called ThreatCrawl, which uses Bidirectional Encoder Representations from Transformers (BERT)-based models to classify documents and adapt its crawling path dynamically. While ThreatCrawl has difficulties to classify the specific type of Open Source Intelligence (OSINT) named in texts, e.g., IOC content, it can successfully find relevant documents and modify its path accordingly. It yields harvest rates of up to 52\%, which are, to the best of our knowledge, better than the current state of the art.},
    number = {arXiv:2304.11960},
    urldate = {2023-04-27},
    institution = {arXiv},
    author = {Kuehn, Philipp and Schmidt, Mike and Bayer, Markus and Reuter, Christian},
    month = apr,
    year = {2023},
    note = {arXiv:2304.11960 [cs]},
    keywords = {Student, Security, Projekt-ATHENE-SecUrban, Projekt-CYWARN},
    }

  • Philipp Kuehn, David N. Relke, Christian Reuter (2023)
    Common vulnerability scoring system prediction based on open source intelligence information sources
    Computers & Security . doi:10.1016/j.cose.2023.103286
    [BibTeX] [Abstract] [Download PDF]

    The number of newly published vulnerabilities is constantly increasing. Until now, the information available when a new vulnerability is published is manually assessed by experts using a ()cvss vector and score. This assessment is time consuming and requires expertise. Various works already try to predict vectors or scores using machine learning based on the textual descriptions of the vulnerability to enable faster assessment. However, for this purpose, previous works only use the texts available in databases such as nvd. With this work, the publicly available web pages referenced in the nvd are analyzed and made available as sources of texts through web scraping. A dl based method for predicting the vector is implemented and evaluated. The present work provides a classification of the nvd’s reference texts based on the suitability and crawlability of their texts. While we identified the overall influence of the additional texts is negligible, we outperformed the state-of-the-art with our dl prediction models.

    @article{kuehn_common_2023,
    title = {Common vulnerability scoring system prediction based on open source intelligence information sources},
    url = {https://peasec.de/paper/2023/2023_KuehnRelkeReuter_CommonVulnerabilityScoringSystemOSINT_CompSec.pdf},
    doi = {10.1016/j.cose.2023.103286},
    abstract = {The number of newly published vulnerabilities is constantly increasing. Until now, the information available when a new vulnerability is published is manually assessed by experts using a ()cvss vector and score. This assessment is time consuming and requires expertise. Various works already try to predict vectors or scores using machine learning based on the textual descriptions of the vulnerability to enable faster assessment. However, for this purpose, previous works only use the texts available in databases such as nvd. With this work, the publicly available web pages referenced in the nvd are analyzed and made available as sources of texts through web scraping. A dl based method for predicting the vector is implemented and evaluated. The present work provides a classification of the nvd’s reference texts based on the suitability and crawlability of their texts. While we identified the overall influence of the additional texts is negligible, we outperformed the state-of-the-art with our dl prediction models.},
    journal = {Computers \& Security},
    author = {Kuehn, Philipp and Relke, David N. and Reuter, Christian},
    year = {2023},
    keywords = {Student, UsableSec, Security, Ranking-ImpactFactor, Ranking-CORE-B, Projekt-ATHENE-SecUrban, Projekt-CYWARN},
    }

  • Verena Zimmermann, Jasmin Haunschild, Alina Stöver, Nina Gerber (2023)
    Safe AND Secure Infrastructures? – Studying Human Aspects of Safety and Security Incidents with Experts from both Domains
    Mensch und Computer – Workshopband Rapperswil, Switzerland. doi:10.18420/muc2023-mci-ws01-225
    [BibTeX] [Abstract] [Download PDF]

    In today’s digitalized and interconnected world, the traditionally distinct concepts security and safety are increasingly intertwined. For example, a cyber attack on a hospital can negatively impact the patients’ physical safety. Thus, security research and practice should consider these interactions. To explore human-related challenges at the intersection of safety and security, we conducted three focus group workshops with N= 16 experts from both domains. We introduced two scenarios leading to a power outage, one with a safety-related cause (snow storm) and one with a security-related cause (cyber attack). The experts discussed interactions, differences and parallels in coping with the scenarios. Additionally, potential solutions for building response capacity by including volunteers were explored. The findings indicate similar consequences resulting from the safety- vs. security-related incidents. However, the experts identified relevant differences in the challenges preparing for and coping with the scenarios. While security-related challenges included the incalculable time horizon, impact and cascading effects as well as lack of emergency plans and training, safety challengesmainly concerned accessibility of the affected area. The implications for future work are discussed.

    @inproceedings{zimmermann_safe_2023,
    address = {Rapperswil, Switzerland},
    title = {Safe {AND} {Secure} {Infrastructures}? – {Studying} {Human} {Aspects} of {Safety} and {Security} {Incidents} with {Experts} from both {Domains}},
    url = {https://dl.gi.de/items/9c1d2bd5-229f-4db0-a764-6126cf92ef5f},
    doi = {10.18420/muc2023-mci-ws01-225},
    abstract = {In today’s digitalized and interconnected world, the traditionally distinct concepts security and safety are increasingly intertwined. For example, a cyber attack on a hospital can negatively impact the patients’ physical safety. Thus, security research and practice should consider these interactions. To explore human-related challenges at the intersection of safety and security, we conducted three focus group workshops with N= 16 experts from both domains. We introduced two scenarios leading to a power outage, one with a safety-related cause (snow storm) and one with a security-related cause (cyber attack). The experts discussed interactions, differences and parallels in coping with the scenarios. Additionally, potential solutions for building response capacity by including volunteers were explored. The findings indicate similar consequences resulting from the safety- vs. security-related incidents. However, the experts identified relevant differences in the challenges preparing for and coping with the scenarios. While security-related challenges included the incalculable time horizon, impact and cascading effects as well as lack of emergency plans and training, safety challengesmainly concerned accessibility of the affected area. The implications for future work are discussed.},
    language = {de},
    booktitle = {Mensch und {Computer} - {Workshopband}},
    publisher = {Gesellschaft für Informatik e.V.},
    author = {Zimmermann, Verena and Haunschild, Jasmin and Stöver, Alina and Gerber, Nina},
    year = {2023},
    keywords = {Security, Peace, Projekt-ATHENE-SecUrban, Projekt-GRKPrivacy},
    }

  • Stefka Schmid (2023)
    Safe and Secure? Visions of Military Human-Computer Interaction
    Mensch und Computer – Workshopband Rapperswil, Switzerland. doi:10.18420/muc2023-mci-ws01-365
    [BibTeX] [Abstract] [Download PDF]

    Safety-critical human-computer interaction has focused on technology use in life-critical situations, including military operations. Due to the practical relevance of HCI and disciplinary debates about human-centered design, this literature review studies HCI scholarships’ visions of military human-computer interaction. Through text analysis and categorization of publications, it is found that interaction is envisioned to take place in the context of both missionoriented operational (e.g., target detection) as well as organizational tasks (e.g., military training). While artificial intelligence, virtual/augmented reality, and robots are most frequently defined as technological environments, goals, such as situation awareness, enjoyment, and trust are predominantly associated with them. Considering scholarly references to application contexts and different factors of the context of use allows to systematically approach how military human-computer interaction is imagined. Offering insight into research trends in HCI, this first overview of research endeavors also contributes to interdisciplinary debates, such as Security Studies and technology assessment.

    @inproceedings{schmid_safe_2023,
    address = {Rapperswil, Switzerland},
    title = {Safe and {Secure}? {Visions} of {Military} {Human}-{Computer} {Interaction}},
    url = {https://dl.gi.de/items/841cc5bd-8e25-40de-804f-8fb4fedddf11},
    doi = {10.18420/muc2023-mci-ws01-365},
    abstract = {Safety-critical human-computer interaction has focused on technology use in life-critical situations, including military operations. Due to the practical relevance of HCI and disciplinary debates about human-centered design, this literature review studies HCI scholarships’ visions of military human-computer interaction. Through text analysis and categorization of publications, it is found that interaction is envisioned to take place in the context of both missionoriented operational (e.g., target detection) as well as organizational tasks (e.g., military training). While artificial intelligence, virtual/augmented reality, and robots are most frequently defined as technological environments, goals, such as situation awareness, enjoyment, and trust are predominantly associated with them. Considering scholarly references to application contexts and different factors of the context of use allows to systematically approach how military human-computer interaction is imagined. Offering insight into research trends in HCI, this first overview of research endeavors also contributes to interdisciplinary debates, such as Security Studies and technology assessment.},
    language = {de},
    booktitle = {Mensch und {Computer} - {Workshopband}},
    publisher = {Gesellschaft für Informatik e.V.},
    author = {Schmid, Stefka},
    year = {2023},
    keywords = {Peace, Projekt-ATHENE-SecUrban, Projekt-TraCe},
    }

  • Jonas Franken, Marco Zivkovic, Nadja Thiessen, Jens Ivo Engels, Christian Reuter (2023)
    Das Netz hat Geschichte: Historisch-technische Analyse der kritischen Infrastrukturen in der Region Rhein/Main
    In: : INFORMATIK 2023 – Designing Futures: Zukünfte gestalten. Bonn: Gesellschaft für Informatik e. V., , 1–6. doi:10.18420/inf2023_159
    [BibTeX] [Abstract] [Download PDF]

    Kritische Infrastrukturen sind häufig über Jahrzehnte gewachsene, komplexe Netze. Dennoch fehlt derzeit die historische Perspektive auf die Aufschichtungstendenzen von Technologien in den Sektoren, die für die Gesellschaft essenzielle Dienste bereitstellen. Ein besseres Verständnis von Ausbreitungs-, Ausbau-, Ersatz- und Ausmusterungsprozessen kann Entscheidungshilfe und Orientierung für resilientere Versorgungsnetzarchitekturen in der Zukunft geben. Kompatibilitätsprobleme mit Legacy-Soft- und Hardware sind bekannte Phänomene in vielen KRITIS-Einrichtungen. Entsprechend gewinnen Wissens- und Erfahrungstransfers bei zunehmend komplexen, dennoch über Jahrzehnte verwendete Technologien in landwirtschaftlichen Betrieben enorm an Bedeutung. Der Beitrag vollzieht die Konzeption und Fragestellungen eines interdisziplinären Forschungsprojekts nach, in welchem die Verwundbarkeit der kritischen Infrastruktursektoren Verkehr und Kommunikation im Rhein-Main-Gebiet analysiert wird. Von den Leistungen beider Sektoren hängt die digitale Landwirtschaft stark ab. Insbesondere rurale, beim digitalen und Schienennetzausbau häufig vernachlässigte Gebiete werden dabei mittels explorativer Interviewstudie und anschließender archivbasierter, quantitativer Überprüfung der zuvor generierten Hypothesen aus einer raum-zeitlichen und technischen Perspektive untersucht.

    @incollection{franken_netz_2023,
    address = {Bonn},
    title = {Das {Netz} hat {Geschichte}: {Historisch}-technische {Analyse} der kritischen {Infrastrukturen} in der {Region} {Rhein}/{Main}},
    url = {https://peasec.de/paper/2023/2023_FrankenZivkovicThiessenEngelsReuter_NetzGeschichte_GI.pdf},
    abstract = {Kritische Infrastrukturen sind häufig über Jahrzehnte gewachsene, komplexe Netze. Dennoch fehlt derzeit die historische Perspektive auf die Aufschichtungstendenzen von Technologien in den Sektoren, die für die Gesellschaft essenzielle Dienste bereitstellen. Ein besseres Verständnis von Ausbreitungs-, Ausbau-, Ersatz- und Ausmusterungsprozessen kann Entscheidungshilfe und Orientierung für resilientere Versorgungsnetzarchitekturen in der Zukunft geben. Kompatibilitätsprobleme mit Legacy-Soft- und Hardware sind bekannte Phänomene in vielen KRITIS-Einrichtungen. Entsprechend gewinnen Wissens- und Erfahrungstransfers bei zunehmend komplexen, dennoch über Jahrzehnte verwendete Technologien in landwirtschaftlichen Betrieben enorm an Bedeutung. Der Beitrag vollzieht die Konzeption und Fragestellungen eines interdisziplinären Forschungsprojekts nach, in welchem die Verwundbarkeit der kritischen Infrastruktursektoren Verkehr und Kommunikation im Rhein-Main-Gebiet analysiert wird. Von den Leistungen beider Sektoren hängt die digitale Landwirtschaft stark ab. Insbesondere rurale, beim digitalen und Schienennetzausbau häufig vernachlässigte Gebiete werden dabei mittels explorativer Interviewstudie und anschließender archivbasierter, quantitativer Überprüfung der zuvor generierten Hypothesen aus einer raum-zeitlichen und technischen Perspektive untersucht.},
    booktitle = {{INFORMATIK} 2023 - {Designing} {Futures}: {Zukünfte} gestalten},
    publisher = {Gesellschaft für Informatik e. V.},
    author = {Franken, Jonas and Zivkovic, Marco and Thiessen, Nadja and Engels, Jens Ivo and Reuter, Christian},
    year = {2023},
    doi = {10.18420/inf2023_159},
    keywords = {Security, Infrastructure, Projekt-ATHENE-SecUrban, Projekt-emergenCITY, Projekt-AgriRegio},
    pages = {1--6},
    }

  • Marco Zivkovic, Jonas Franken, Nadja Thiessen, Jens Ivo Engels, Christian Reuter (2023)
    Infrastrukturen und historisches Wissen: Eine interdisziplinäre Analyse der Resilienz von Schienen- und Kabelnetzen
    Tagungsband Fachtagung Katastrophenforschung 2023 Leoben.
    [BibTeX] [Abstract] [Download PDF]

    Im Forschungsprojekt “ Das Netz hat Geschichte: Netzwerk- und Vulnerabilitätsanalyse Kritischer Infrastrukturen am Beispiel IKT und Verkehr in Rhein/Main”“ wird das historische Wachstum von IKT- und Schieneninfrastrukturnetzen, sowie daraus erwachsene Konsequenzen für deren Vulnerabilitäten am Beispiel der Rhein-Main-Region interdisziplinär untersucht. Beide Infrastrukturnetze entstanden über Jahrzehnte hinweg und sind das Ergebnis verschiedener Interessen und technischer Entwicklungen aus unterschiedlichen Zeitschichten. Dies beeinflusst die Widerstandsfähigkeit der Netze und birgt potenzielle Risiken. Anhand von ca. 20 Expert:inneninterviews soll das Wissen von Praktiker:innen über das Alter, die Ausbreitung, technische Neuerungen und deren Auswirkungen analysiert werden. Die Forschung basiert auf dem Zeitschichtenmodell von Koselleck, das es ermöglicht, die verschiedenen zeitlichen Ebenen der Infrastrukturentwicklung zu analysieren. Die Ergebnisse der semi-strukturierten Interviewstudie zum impliziten Wissen der Befragten werden genutzt, um Hypothesen zu generieren, die später mittels Archivstudien und Netzwerkanalysen überprüft werden. Die gewonnenen Erkenntnisse können zur Stärkung der Resilienz von Infrastrukturen, insbesondere bei Katastrophenszenarien regionalen Ausmaßes, und zukünftigen Investitionsentscheidungen beitragen.

    @inproceedings{zivkovic_infrastrukturen_2023,
    address = {Leoben},
    title = {Infrastrukturen und historisches {Wissen}: {Eine} interdisziplinäre {Analyse} der {Resilienz} von {Schienen}- und {Kabelnetzen}},
    isbn = {978-3-900397-11-1},
    url = {https://peasec.de/paper/2023/2023_ZivkovicFrankenThiessenEngelsReuter_InfrastrukturenHistorischesWissen_FKF23.pdf},
    abstract = {Im Forschungsprojekt " Das Netz hat Geschichte: Netzwerk- und Vulnerabilitätsanalyse Kritischer Infrastrukturen am Beispiel IKT und Verkehr in Rhein/Main”" wird das historische Wachstum von IKT- und Schieneninfrastrukturnetzen, sowie daraus erwachsene Konsequenzen für deren Vulnerabilitäten am Beispiel der Rhein-Main-Region interdisziplinär untersucht. Beide Infrastrukturnetze entstanden über Jahrzehnte hinweg und sind das Ergebnis verschiedener Interessen und technischer Entwicklungen aus unterschiedlichen Zeitschichten. Dies beeinflusst die Widerstandsfähigkeit der Netze und birgt potenzielle Risiken. Anhand von ca. 20 Expert:inneninterviews soll das Wissen von Praktiker:innen über das Alter, die Ausbreitung, technische Neuerungen und deren Auswirkungen analysiert werden. Die Forschung basiert auf dem Zeitschichtenmodell von Koselleck, das es ermöglicht, die verschiedenen zeitlichen Ebenen der Infrastrukturentwicklung zu analysieren. Die Ergebnisse der semi-strukturierten Interviewstudie zum impliziten Wissen der Befragten werden genutzt, um Hypothesen zu generieren, die später mittels Archivstudien und Netzwerkanalysen überprüft werden. Die gewonnenen Erkenntnisse können zur Stärkung der Resilienz von Infrastrukturen, insbesondere bei Katastrophenszenarien regionalen Ausmaßes, und zukünftigen Investitionsentscheidungen beitragen.},
    booktitle = {Tagungsband {Fachtagung} {Katastrophenforschung} 2023},
    publisher = {Disaster Competence Network Austria},
    author = {Zivkovic, Marco and Franken, Jonas and Thiessen, Nadja and Engels, Jens Ivo and Reuter, Christian},
    year = {2023},
    keywords = {Crisis, Security, Infrastructure, Projekt-ATHENE-SecUrban, Projekt-emergenCITY, Projekt-NetzGeschichte},
    }

  • Thomas Reinhold, Philipp Kuehn, Daniel Günther, Thomas Schneider, Christian Reuter (2023)
    ExTRUST: Reducing Exploit Stockpiles With a Privacy-Preserving Depletion Systems for Inter-State Relationships
    IEEE Transactions on Technology and Society ;4(2):158–170. doi:10.1109/TTS.2023.3280356
    [BibTeX] [Abstract] [Download PDF]

    Cyberspace is a fragile construct threatened by malicious cyber operations of different actors, with vulnerabilities in IT hardware and software forming the basis for such activities, thus also posing a threat to global IT security. Advancements in the field of artificial intelligence accelerate this development, either with artificial intelligence enabled cyber weapons, automated cyber defense measures, or artificial intelligence-based threat and vulnerability detection. Especially state actors, with their long-term strategic security interests, often stockpile such knowledge of vulnerabilities and exploits to enable their military or intelligence service cyberspace operations. While treaties and regulations to limit these developments and to enhance global IT security by disclosing vulnerabilities are currently being discussed on the international level, these efforts are hindered by state concerns about the disclosure of unique knowledge and about giving up tactical advantages. This leads to a situation where multiple states are likely to stockpile at least some identical exploits, with technical measures to enable a depletion process for these stockpiles that preserve state secrecy interests and consider the special constraints of interacting states as well as the requirements within such environments being non-existent. This paper proposes such a privacy-preserving approach that allows multiple state parties to privately compare their stock of vulnerabilities and exploits to check for items that occur in multiple stockpiles without revealing them so that their disclosure can be considered. We call our system ExTRUST and show that it is scalable and can withstand several attack scenarios. Beyond the intergovernmental setting, ExTRUST can also be used for other zero-trust use cases, such as bug-bounty programs.

    @article{reinhold_extrust_2023,
    title = {{ExTRUST}: {Reducing} {Exploit} {Stockpiles} {With} a {Privacy}-{Preserving} {Depletion} {Systems} for {Inter}-{State} {Relationships}},
    volume = {4},
    url = {https://peasec.de/paper/2023/2023_ReinholdKuehnGuentherSchneiderReuter_ExTrust-ehem-BlockED_TTaS.pdf},
    doi = {10.1109/TTS.2023.3280356},
    abstract = {Cyberspace is a fragile construct threatened by malicious cyber operations of different actors, with vulnerabilities in IT hardware and software forming the basis for such activities, thus also posing a threat to global IT security. Advancements in the field of artificial intelligence accelerate this development, either with artificial intelligence enabled cyber weapons, automated cyber defense measures, or artificial intelligence-based threat and vulnerability detection. Especially state actors, with their long-term strategic security interests, often stockpile such knowledge of vulnerabilities and exploits to enable their military or intelligence service cyberspace operations. While treaties and regulations to limit these developments and to enhance global IT security by disclosing vulnerabilities are currently being discussed on the international level, these efforts are hindered by state concerns about the disclosure of unique knowledge and about giving up tactical advantages. This leads to a situation where multiple states are likely to stockpile at least some identical exploits, with technical measures to enable a depletion process for these stockpiles that preserve state secrecy interests and consider the special constraints of interacting states as well as the requirements within such environments being non-existent. This paper proposes such a privacy-preserving approach that allows multiple state parties to privately compare their stock of vulnerabilities and exploits to check for items that occur in multiple stockpiles without revealing them so that their disclosure can be considered. We call our system ExTRUST and show that it is scalable and can withstand several attack scenarios. Beyond the intergovernmental setting, ExTRUST can also be used for other zero-trust use cases, such as bug-bounty programs.},
    number = {2},
    journal = {IEEE Transactions on Technology and Society},
    author = {Reinhold, Thomas and Kuehn, Philipp and Günther, Daniel and Schneider, Thomas and Reuter, Christian},
    year = {2023},
    keywords = {Selected, Student, A-Paper, Peace, Projekt-CROSSING, AuswahlPeace, Cyberwar, Projekt-ATHENE-SecUrban, Projekt-GRKPrivacy},
    pages = {158--170},
    }

  • Jasmin Haunschild, Selina Pauli, Christian Reuter (2023)
    Preparedness Nudging for Warning Apps? A Mixed-Method Study Investigating Popularity and Effects of Preparedness Alerts in Warning Apps
    International Journal on Human-Computer Studies (IJHCS) ;172:102995. doi:https://doi.org/10.1016/j.ijhcs.2023.102995
    [BibTeX] [Abstract] [Download PDF]

    Warning apps are used by many to receive warnings about imminent disasters. However, their potential for increasing awareness about general hazards and for increasing preparedness is currently underused. With a mixed-method design that includes a representative survey of the German population, a design workshop and an app evaluation experiment, this study investigates users’ preferences regarding non-acute preparedness alerts’ inclusion in crisis apps and the effectiveness of Nudging in this context. The experiment shows that while the social influence nudge had no significant effect compared to the control group without a nudging condition, the confrontational nudge increased the number of taken recommended preparedness measures. The evaluation indicates that the preparedness alerts increased users’ knowledge and their motivation to use a warning app. This motivation is, in contrast, decreased when the messages are perceived as a disruption. While many oppose push notifications, favor finding persuasively designed preparedness advice in a separate menu or as an optional notification.

    @article{haunschild_preparedness_2023,
    title = {Preparedness {Nudging} for {Warning} {Apps}? {A} {Mixed}-{Method} {Study} {Investigating} {Popularity} and {Effects} of {Preparedness} {Alerts} in {Warning} {Apps}},
    volume = {172},
    issn = {1071-5819},
    url = {https://peasec.de/paper/2023/2023_HaunschildPauliReuter_NudgingWarningApps_IJHCS.pdf},
    doi = {https://doi.org/10.1016/j.ijhcs.2023.102995},
    abstract = {Warning apps are used by many to receive warnings about imminent disasters. However, their potential for increasing awareness about general hazards and for increasing preparedness is currently underused. With a mixed-method design that includes a representative survey of the German population, a design workshop and an app evaluation experiment, this study investigates users’ preferences regarding non-acute preparedness alerts’ inclusion in crisis apps and the effectiveness of Nudging in this context. The experiment shows that while the social influence nudge had no significant effect compared to the control group without a nudging condition, the confrontational nudge increased the number of taken recommended preparedness measures. The evaluation indicates that the preparedness alerts increased users’ knowledge and their motivation to use a warning app. This motivation is, in contrast, decreased when the messages are perceived as a disruption. While many oppose push notifications, favor finding persuasively designed preparedness advice in a separate menu or as an optional notification.},
    journal = {International Journal on Human-Computer Studies (IJHCS)},
    author = {Haunschild, Jasmin and Pauli, Selina and Reuter, Christian},
    year = {2023},
    keywords = {AuswahlCrisis, Crisis, Selected, Student, A-Paper, Ranking-ImpactFactor, Projekt-ATHENE-SecUrban, Projekt-emergenCITY},
    pages = {102995},
    }

  • Thomas Reinhold, Helene Pleil, Christian Reuter (2023)
    Challenges for Cyber Arms Control: A Qualitative Expert Interview Study
    Zeitschrift für Außen- und Sicherheitspolitik (ZfAS) ;16(3):289–310. doi:10.1007/s12399-023-00960-w
    [BibTeX] [Abstract] [Download PDF]

    The militarization of cyberspace has been a topic in international fora and scientific debates for several years. However, the development of applicable, and verifiable arms control measures that can effectively reduce the risk of military escalations in cyberspace is still hindered by the characteristics of this domain. The article analyses challenges and obstacles of dual-use, proliferation, constant technological progress, the importance of the private sector, difficulties in defining and verifying weapons and difficulties in attributing attacks.

    @article{reinhold_challenges_2023,
    title = {Challenges for {Cyber} {Arms} {Control}: {A} {Qualitative} {Expert} {Interview} {Study}},
    volume = {16},
    issn = {1866-2196},
    url = {https://doi.org/10.1007/s12399-023-00960-w},
    doi = {10.1007/s12399-023-00960-w},
    abstract = {The militarization of cyberspace has been a topic in international fora and scientific debates for several years. However, the development of applicable, and verifiable arms control measures that can effectively reduce the risk of military escalations in cyberspace is still hindered by the characteristics of this domain. The article analyses challenges and obstacles of dual-use, proliferation, constant technological progress, the importance of the private sector, difficulties in defining and verifying weapons and difficulties in attributing attacks.},
    number = {3},
    journal = {Zeitschrift für Außen- und Sicherheitspolitik (ZfAS)},
    author = {Reinhold, Thomas and Pleil, Helene and Reuter, Christian},
    month = aug,
    year = {2023},
    keywords = {Security, Peace, Projekt-CROSSING, Projekt-ATHENE-SecUrban},
    pages = {289--310},
    }

  • Markus Bayer, Marc-André Kaufhold, Christian Reuter (2023)
    A Survey on Data Augmentation for Text Classification
    ACM Computing Surveys (CSUR) ;55(7):1–39. doi:10.1145/3544558
    [BibTeX] [Abstract] [Download PDF]

    Data augmentation, the artificial creation of training data for machine learning by transformations, is a widely studied research field across machine learning disciplines. While it is useful for increasing a model’s generalization capabilities, it can also address many other challenges and problems, from overcoming a limited amount of training data, to regularizing the objective, to limiting the amount data used to protect privacy. Based on a precise description of the goals and applications of data augmentation and a taxonomy for existing works, this survey is concerned with data augmentation methods for textual classification and aims to provide a concise and comprehensive overview for researchers and practitioners. Derived from the taxonomy, we divide more than 100 methods into 12 different groupings and give state-of-the-art references expounding which methods are highly promising by relating them to each other. Finally, research perspectives that may constitute a building block for future work are provided.

    @article{bayer_survey_2023,
    title = {A {Survey} on {Data} {Augmentation} for {Text} {Classification}},
    volume = {55},
    url = {https://dl.acm.org/doi/pdf/10.1145/3544558},
    doi = {10.1145/3544558},
    abstract = {Data augmentation, the artificial creation of training data for machine learning by transformations, is a widely studied research field across machine learning disciplines. While it is useful for increasing a model's generalization capabilities, it can also address many other challenges and problems, from overcoming a limited amount of training data, to regularizing the objective, to limiting the amount data used to protect privacy. Based on a precise description of the goals and applications of data augmentation and a taxonomy for existing works, this survey is concerned with data augmentation methods for textual classification and aims to provide a concise and comprehensive overview for researchers and practitioners. Derived from the taxonomy, we divide more than 100 methods into 12 different groupings and give state-of-the-art references expounding which methods are highly promising by relating them to each other. Finally, research perspectives that may constitute a building block for future work are provided.},
    number = {7},
    journal = {ACM Computing Surveys (CSUR)},
    author = {Bayer, Markus and Kaufhold, Marc-André and Reuter, Christian},
    year = {2023},
    keywords = {AuswahlCrisis, Crisis, Selected, A-Paper, Ranking-CORE-A*, Ranking-ImpactFactor, Projekt-ATHENE-SecUrban, Projekt-CYWARN, Projekt-emergenCITY, AuswahlKaufhold},
    pages = {1--39},
    }

  • Steffen Haesler, Marc Wendelborn, Christian Reuter (2023)
    Getting the Residents‘ Attention: The Perception of Warning Channels in Smart Home Warning Systems
    Proceedings of the ACM Designing Interactive Systems Conference (DIS) New York, NY, USA. doi:10.1145/3563657.3596076
    [BibTeX] [Abstract] [Download PDF]

    About half a billion households are expected to use smart home systems by 2025. Although many IoT sensors, such as smoke detectors or security cameras, are available and governmental crisis warning systems are in place, little is known about how to warn appropriately in smart home environments. We created a Raspberry Pi based prototype with a speaker, a display, and a connected smart light bulb. Together with a focus group, we developed a taxonomy for warning messages in smart home environments, dividing them into five classes with different stimuli. We evaluated the taxonomy using the Experience Sampling Method (ESM) in a field study at participants‘ (N = 13) homes testing 331 warnings. The results show that taxonomy-based warning stimuli are perceived to be appropriate and participants could imagine using such a warning system. We propose a deeper integration of warning capabilities into smart home environments to enhance the safety of citizens.

    @inproceedings{haesler_getting_2023,
    address = {New York, NY, USA},
    series = {{DIS} '23},
    title = {Getting the {Residents}' {Attention}: {The} {Perception} of {Warning} {Channels} in {Smart} {Home} {Warning} {Systems}},
    isbn = {978-1-4503-9893-0},
    url = {https://peasec.de/paper/2023/2023_HaeslerWendelbornReuter_SmartHomeWarningSystems_DIS},
    doi = {10.1145/3563657.3596076},
    abstract = {About half a billion households are expected to use smart home systems by 2025. Although many IoT sensors, such as smoke detectors or security cameras, are available and governmental crisis warning systems are in place, little is known about how to warn appropriately in smart home environments. We created a Raspberry Pi based prototype with a speaker, a display, and a connected smart light bulb. Together with a focus group, we developed a taxonomy for warning messages in smart home environments, dividing them into five classes with different stimuli. We evaluated the taxonomy using the Experience Sampling Method (ESM) in a field study at participants' (N = 13) homes testing 331 warnings. The results show that taxonomy-based warning stimuli are perceived to be appropriate and participants could imagine using such a warning system. We propose a deeper integration of warning capabilities into smart home environments to enhance the safety of citizens.},
    booktitle = {Proceedings of the {ACM} {Designing} {Interactive} {Systems} {Conference} ({DIS})},
    publisher = {Association for Computing Machinery},
    author = {Haesler, Steffen and Wendelborn, Marc and Reuter, Christian},
    year = {2023},
    note = {event-place: Pittsburgh, PA, USA},
    keywords = {Crisis, HCI, Student, A-Paper, Ranking-CORE-A, Projekt-ATHENE-SecUrban, Projekt-emergenCITY},
    pages = {1114--1127},
    }

  • Laura Guntrum, Sebastian Schwartz, Christian Reuter (2023)
    Dual-Use Technologies in the Context of Autonomous Driving: An Empirical Case Study From Germany
    Zeitschrift für Außen- und Sicherheitspolitik (ZfAS) . doi:10.1007/s12399-022-00935-3
    [BibTeX] [Abstract] [Download PDF]

    The article examines which technical aspects of autonomous driving are potentially transferable to the military sector. Through expert interviews the strong fragmentation of technologies in the field of autonomous driving becomes apparent. This hinders the clear identification of a specific dual-use technology. Environmental perception, artificial intelligence and sensors are considered to have the highest transferability rate from civil research to the military sector. Therefore, sensor development should receive special attention.

    @article{guntrum_dual-use_2023,
    title = {Dual-{Use} {Technologies} in the {Context} of {Autonomous} {Driving}: {An} {Empirical} {Case} {Study} {From} {Germany}},
    issn = {1866-2196},
    url = {https://doi.org/10.1007/s12399-022-00935-3},
    doi = {10.1007/s12399-022-00935-3},
    abstract = {The article examines which technical aspects of autonomous driving are potentially transferable to the military sector. Through expert interviews the strong fragmentation of technologies in the field of autonomous driving becomes apparent. This hinders the clear identification of a specific dual-use technology. Environmental perception, artificial intelligence and sensors are considered to have the highest transferability rate from civil research to the military sector. Therefore, sensor development should receive special attention.},
    journal = {Zeitschrift für Außen- und Sicherheitspolitik (ZfAS)},
    author = {Guntrum, Laura and Schwartz, Sebastian and Reuter, Christian},
    month = jan,
    year = {2023},
    keywords = {Peace, Projekt-ATHENE-SecUrban, Projekt-TraCe},
    }

  • Thomas Reinhold, Christian Reuter (2023)
    Zur Debatte über die Einhegung eines Cyberwars: Analyse militärischer Cyberaktivitäten im Krieg Russlands gegen die Ukraine
    Zeitschrift für Friedens- und Konfliktforschung (ZeFKo) . doi:10.1007/s42597-023-00094-y
    [BibTeX] [Abstract] [Download PDF]

    Der Überfall Russlands auf die Ukraine und der sich anschließende Krieg haben neben vielen anderen sicherheitspolitischen Gewissheiten auch zum ersten Mal die Rolle des Cyberspace in einem offenen Angriffskrieg demonstriert und bedenkenswerte Entwicklungen offenbart. Ziel dieses Beitrags ist es, die militärischen Aktivitäten im Cyberspace im Rahmen des Krieges Russlands gegen die Ukraine auf der Grundlage der öffentlich verfügbaren Informationen zu analysieren und im Hinblick auf die bis dato gängigen Vorstellungen eines Cyberwars zu bewerten. Darauf aufbauend werden mögliche Schlussfolgerungen betrachtet, zum einen mit Blick auf die zukünftige Bedeutung von Cyberaktivitäten für Russland, hinsichtlich des generellen militärischen Einsatzes von Cyberwirkmitteln und dessen weiterer Entwicklung, und in Bezug auf zukünftige internationale Debatten zur Einhegung von Cyberwars und des schädigenden Einsatzes von Cyberwirkmitteln.

    @article{reinhold_zur_2023,
    title = {Zur {Debatte} über die {Einhegung} eines {Cyberwars}: {Analyse} militärischer {Cyberaktivitäten} im {Krieg} {Russlands} gegen die {Ukraine}},
    issn = {2524-6976},
    url = {https://doi.org/10.1007/s42597-023-00094-y},
    doi = {10.1007/s42597-023-00094-y},
    abstract = {Der Überfall Russlands auf die Ukraine und der sich anschließende Krieg haben neben vielen anderen sicherheitspolitischen Gewissheiten auch zum ersten Mal die Rolle des Cyberspace in einem offenen Angriffskrieg demonstriert und bedenkenswerte Entwicklungen offenbart. Ziel dieses Beitrags ist es, die militärischen Aktivitäten im Cyberspace im Rahmen des Krieges Russlands gegen die Ukraine auf der Grundlage der öffentlich verfügbaren Informationen zu analysieren und im Hinblick auf die bis dato gängigen Vorstellungen eines Cyberwars zu bewerten. Darauf aufbauend werden mögliche Schlussfolgerungen betrachtet, zum einen mit Blick auf die zukünftige Bedeutung von Cyberaktivitäten für Russland, hinsichtlich des generellen militärischen Einsatzes von Cyberwirkmitteln und dessen weiterer Entwicklung, und in Bezug auf zukünftige internationale Debatten zur Einhegung von Cyberwars und des schädigenden Einsatzes von Cyberwirkmitteln.},
    journal = {Zeitschrift für Friedens- und Konfliktforschung (ZeFKo)},
    author = {Reinhold, Thomas and Reuter, Christian},
    month = mar,
    year = {2023},
    keywords = {Security, Peace, Projekt-ATHENE-SecUrban, Projekt-TraCe},
    }

  • Elise Özalp, Katrin Hartwig, Christian Reuter (2023)
    Trends in Explainable Artificial Intelligence for Non-Experts
    In: Peter Klimczak, Christer Petersen: AI – Limits and Prospects of Artificial Intelligence. Bielefeld: Transcript Verlag, , 223–243.
    [BibTeX] [Abstract] [Download PDF]

    In this paper we provide an overview of XAI by introducing fundamental terminology and the goals of XAI, as well as recent research findings. Whilst doing this, we pay special attention to strategies for non-expert stakeholders. This leads us to our first research question: “What are the trends in explainable AI strategies for non-experts?”. In order to illustrate the current state of these trends, we further want to study an exemplary and very relevant application domain. According to Abdul et al. (2018), one of the first domains where researchers pursued XAI is the medical domain. This leads to our second research question: “What are the approaches of XAI in the medical domain for non-expert stakeholders?” These research questions will provide an overview of current topics in XAI and show possible research extensions for specific domains.

    @incollection{ozalp_trends_2023,
    address = {Bielefeld},
    title = {Trends in {Explainable} {Artificial} {Intelligence} for {Non}-{Experts}},
    url = {https://www.transcript-verlag.de/978-3-8376-5732-6/ai-limits-and-prospects-of-artificial-intelligence/?c=313000019},
    abstract = {In this paper we provide an overview of XAI by introducing fundamental terminology and the goals of XAI, as well as recent research findings. Whilst doing this, we pay special attention to strategies for non-expert stakeholders. This leads us to our first research question: “What are the trends in explainable AI strategies for non-experts?”. In order to illustrate the current state of these trends, we further want to study an exemplary and very relevant application domain. According to Abdul et al. (2018), one of the first domains where researchers pursued XAI is the medical domain. This leads to our second research question: “What are the approaches of XAI in the medical domain for non-expert stakeholders?” These research questions will provide an overview of current topics in XAI and show possible research extensions for specific domains.},
    booktitle = {{AI} - {Limits} and {Prospects} of {Artificial} {Intelligence}},
    publisher = {Transcript Verlag},
    author = {Özalp, Elise and Hartwig, Katrin and Reuter, Christian},
    editor = {Klimczak, Peter and Petersen, Christer},
    year = {2023},
    keywords = {HCI, Student, UsableSec, Projekt-CROSSING, Projekt-ATHENE-SecUrban, Projekt-CYWARN},
    pages = {223--243},
    }

  • Thea Riebe, Julian Bäumler, Marc-André Kaufhold, Christian Reuter (2023)
    Values and Value Conflicts in the Context of OSINT Technologies for Cybersecurity Incident Response: A Value Sensitive Design Perspective
    Computer Supported Cooperative Work: The Journal of Collaborative Computing (JCSCW) . doi:10.1007/s10606-022-09453-4
    [BibTeX] [Abstract] [Download PDF]

    The negotiation of stakeholder values as a collaborative process throughout technology development has been studied extensively within the fields of Computer Supported Cooperative Work and Human-Computer Interaction. Despite their increasing significance for cybersecurity incident response, there is a gap in research on values of importance to the design of open-source intelligence (OSINT) technologies for this purpose. In this paper, we investigate which values and value conflicts emerge due to the application and development of machine learning (ML) based OSINT technologies to assist cyber security incident response operators. For this purpose, we employ a triangulation of methods, consisting of a systematic survey of the technical literature on the development of OSINT artefacts for cybersecurity (N = 73) and an empirical value sensitive design case study, comprising semi-structured interviews with stakeholders (N = 9) as well as a focus group (N = 7) with developers. Based on our results, we identify implications relevant to the research on and design of OSINT artefacts for cybersecurity incident response.

    @article{riebe_values_2023,
    title = {Values and {Value} {Conflicts} in the {Context} of {OSINT} {Technologies} for {Cybersecurity} {Incident} {Response}: {A} {Value} {Sensitive} {Design} {Perspective}},
    url = {https://link.springer.com/article/10.1007/s10606-022-09453-4},
    doi = {10.1007/s10606-022-09453-4},
    abstract = {The negotiation of stakeholder values as a collaborative process throughout technology development has been studied extensively within the fields of Computer Supported Cooperative Work and Human-Computer Interaction. Despite their increasing significance for cybersecurity incident response, there is a gap in research on values of importance to the design of open-source intelligence (OSINT) technologies for this purpose. In this paper, we investigate which values and value conflicts emerge due to the application and development of machine learning (ML) based OSINT technologies to assist cyber security incident response operators. For this purpose, we employ a triangulation of methods, consisting of a systematic survey of the technical literature on the development of OSINT artefacts for cybersecurity (N = 73) and an empirical value sensitive design case study, comprising semi-structured interviews with stakeholders (N = 9) as well as a focus group (N = 7) with developers. Based on our results, we identify implications relevant to the research on and design of OSINT artefacts for cybersecurity incident response.},
    journal = {Computer Supported Cooperative Work: The Journal of Collaborative Computing (JCSCW)},
    author = {Riebe, Thea and Bäumler, Julian and Kaufhold, Marc-André and Reuter, Christian},
    year = {2023},
    keywords = {HCI, Student, UsableSec, Security, A-Paper, Ranking-ImpactFactor, Ranking-CORE-B, Projekt-CROSSING, Projekt-ATHENE-SecUrban, Projekt-CYWARN},
    }

  • Jasmin Haunschild, Leon Jung, Christian Reuter (2023)
    Dual-use in volunteer operations? Attitudes of computer science students regarding the establishment of a cyber security volunteer force
    In: Gerber Nina, Zimmermann Verena: International Symposium on Technikpsychologie (TecPsy). Sciendo, , 66–81.
    [BibTeX] [Abstract] [Download PDF]

    The digitalisation of critical infrastructure has increased the risk of large-scale cyber incidents. In contrast to the management of conventional emergencies by established civil protection organisations involving volunteers in Germany, few response capacities exist for these events. The concept of a volunteer force for cyber security could close this protection gap. However, such involvement also poses practical and ethical challenges. By conducting interviews with computer science students (N = 11), this paper analyses potential volunteers’ attitudes towards ethical implications of a cyber volunteer force, as well as practical aspects that might motivate or hinder their participation. A qualitative content analysis reveals that students are largely unaware of potential dilemmas connected to vulnerabilities handling and national cybersecurity interests. Ethical guidelines and means of motivating and encouraging potential volunteers are discussed.

    @incollection{haunschild_dual-use_2023,
    title = {Dual-use in volunteer operations? {Attitudes} of computer science students regarding the establishment of a cyber security volunteer force},
    isbn = {978-83-66675-89-6},
    url = {https://sciendo.com/chapter/9788366675896/10.2478/9788366675896-006},
    abstract = {The digitalisation of critical infrastructure has increased the risk of large-scale cyber incidents. In contrast to the management of conventional emergencies by established civil protection organisations involving volunteers in Germany, few response capacities exist for these events. The concept of a volunteer force for cyber security could close this protection gap. However, such involvement also poses practical and ethical challenges. By conducting interviews with computer science students (N = 11), this paper analyses potential volunteers’ attitudes towards ethical implications of a cyber volunteer force, as well as practical aspects that might motivate or hinder their participation. A qualitative
    content analysis reveals that students are largely unaware of potential dilemmas connected to vulnerabilities handling and national cybersecurity interests. Ethical guidelines and means of motivating and encouraging potential volunteers
    are discussed.},
    booktitle = {International {Symposium} on {Technikpsychologie} ({TecPsy})},
    publisher = {Sciendo},
    author = {Haunschild, Jasmin and Jung, Leon and Reuter, Christian},
    editor = {Nina, Gerber and Verena, Zimmermann},
    year = {2023},
    keywords = {Crisis, Student, UsableSec, Security, Projekt-ATHENE-SecUrban, Projekt-emergenCITY},
    pages = {66--81},
    }

  • Jonas Franken, Franziska Schneider, Christian Reuter (2023)
    The Internet’s Plumbing Consists of Garden Hoses: A Critical Analysis of the Advantages and Pitfalls of Metaphors Use for Critical Maritime Infrastructures
    Dreizack 23 Kiel.
    [BibTeX] [Download PDF]

    @inproceedings{franken_internets_2023,
    address = {Kiel},
    title = {The {Internet}’s {Plumbing} {Consists} of {Garden} {Hoses}: {A} {Critical} {Analysis} of the {Advantages} and {Pitfalls} of {Metaphors} {Use} for {Critical} {Maritime} {Infrastructures}},
    url = {https://peasec.de/paper/2023/2023_FrankenSchneiderReuter_MetaphernMarKRITIS_Dreizack23.pdf},
    booktitle = {Dreizack 23},
    publisher = {The Kiel Seapower Series},
    author = {Franken, Jonas and Schneider, Franziska and Reuter, Christian},
    editor = {Schilling, Henrik},
    year = {2023},
    keywords = {Security, Peace, Projekt-ATHENE-SecUrban, Projekt-AgriRegio, Projekt-NetzGeschichte},
    pages = {1--8},
    }

    2022

  • Jasmin Haunschild, Marc-André Kaufhold, Christian Reuter (2022)
    Cultural Violence and Fragmentation on Social Media: Interventions and Countermeasures by Humans and Social Bots
    In: Myriam Dunn Cavelty, Andreas Wenger: Cyber Security Politics: Socio-Technological Transformations and Political Fragmentation. Routledge, , 48–63.
    [BibTeX] [Abstract] [Download PDF]

    Mobile technologies and social media services are among the socio-technological innovations that have an enormous impact transforming modern culture and political processes. Social media are often defined as a “group of internet-based applications […] that allow the creation and exchange of user-generated content” (Kaplan and Haenlein 2010). Shaping opinions, politics, participation, and protest (Wulf et al. 2013), they are used by citizens for news consumption and social exchange (Robinson et al. 2017); by journalists for reporting, analyzing, and collecting information (Stieglitz et al. 2018a); and by organizations to monitor crises, emergencies, customer feedback, and sentiment, among others (Haunschild et al. 2020). Large-scale international events, such as the 2010 Arab Spring, showcased the potential of socio-technological transformations: Citizens were not passive victims but active and autonomous participants utilizing social media to coordinate protest and for crisis response (Reuter and Kaufhold 2018). However, in other cases, citizens’ activities coordinated via social media also increased the complexity of tasks and pressure for formal authorities, since the lack of state control has not had only empowering or benign effects. Instead, on social media, false information spreads fast and it is easy for groups to find an audience there, either to enhance their profit or to target vulnerable groups with dangerous ideology.

    @incollection{haunschild_cultural_2022,
    title = {Cultural {Violence} and {Fragmentation} on {Social} {Media}: {Interventions} and {Countermeasures} by {Humans} and {Social} {Bots}},
    isbn = {978-0-367-62674-7},
    url = {https://peasec.de/paper/2022/2022_HaunschildKaufholdReuter_SocialMediaAndFragmentation_Routledge.pdf},
    abstract = {Mobile technologies and social media services are among the socio-technological innovations that have an enormous impact transforming modern culture and political processes. Social media are often defined as a “group of internet-based applications […] that allow the creation and exchange of user-generated content” (Kaplan and Haenlein 2010). Shaping opinions, politics, participation, and protest (Wulf et al. 2013), they are used by citizens for news consumption and social exchange (Robinson et al. 2017); by journalists for reporting, analyzing, and collecting information (Stieglitz et al. 2018a); and by organizations to monitor crises, emergencies, customer feedback, and sentiment, among others (Haunschild et al. 2020). Large-scale international events, such as the 2010 Arab Spring, showcased the potential of socio-technological transformations: Citizens were not passive victims but active and autonomous participants utilizing social media to coordinate protest and for crisis response (Reuter and Kaufhold 2018). However, in other cases, citizens’ activities coordinated via social media also increased the complexity of tasks and pressure for formal authorities, since the lack of state control has not had only empowering or benign effects. Instead, on social media, false information spreads fast and it is easy for groups to find an audience there, either to enhance their profit or to target vulnerable groups with dangerous ideology.},
    booktitle = {Cyber {Security} {Politics}: {Socio}-{Technological} {Transformations} and {Political} {Fragmentation}},
    publisher = {Routledge},
    author = {Haunschild, Jasmin and Kaufhold, Marc-André and Reuter, Christian},
    editor = {Cavelty, Myriam Dunn and Wenger, Andreas},
    year = {2022},
    keywords = {Crisis, SocialMedia, Peace, Projekt-ATHENE-SecUrban, Projekt-CYWARN, Projekt-emergenCITY},
    pages = {48--63},
    }

  • Jonas Franken (2022)
    Seekabel als Maritime Kritische Infrastruktur
    Dreizack 21: Von historischen bis zukünftigen Herausforderungen im maritimen Raum Laboe/Kiel.
    [BibTeX] [Download PDF]

    @inproceedings{franken_seekabel_2022,
    address = {Laboe/Kiel},
    title = {Seekabel als {Maritime} {Kritische} {Infrastruktur}},
    url = {https://www.kielseapowerseries.com/files/ispk/content/workshops/Dreizack/Sammelband zum Dreizack21.pdf},
    booktitle = {Dreizack 21: {Von} historischen bis zukünftigen {Herausforderungen} im maritimen {Raum}},
    author = {Franken, Jonas},
    editor = {Schilling, Henrik},
    year = {2022},
    keywords = {Student, Security, Projekt-ATHENE-SecUrban},
    pages = {22--25},
    }

  • Thomas Reinhold, Christian Reuter (2022)
    Towards a Cyber Weapons Assessment Model – Assessment of the Technical Features of Malicious Software
    IEEE Transactions on Technology and Society ;3(3):226–239. doi:10.1109/TTS.2021.3131817
    [BibTeX] [Abstract] [Download PDF]

    The revelation of the Stuxnet malware in 2010 shed light on the presence of state actors that are willing and capable of developing and using highly sophisticated, specialized malicious software for their political interests. These tools -often dubbed cyber weapons -are expected to become the next major advancement in weaponry technology. Besides the threats of offensive cyber operations for civil IT systems due to the interconnected nature of the cyberspace, international regulation of cyber weapons is -among other aspects -hindered by the fact that the military development and the strategic and tactical deployment of cyber weapons differ significantly from other weapons technologies. In order to establish measures of cyber arms related control treaties, it is crucial to identify these particular characteristics. Based on this premise, the article analyzes the current perspectives on cyber weapons, identifying their weaknesses of being either based on assumptions about adversarial actors or being applicable only after the usage of a malicious tool. In contrast to these approaches, the article focuses on the specific functional aspects of malware and presents an indicator-based assessment model based on parameters that can be measured prior to the application of malicious software. This enables the categorization of malicious tools as cyber weapons. Besides this, the article aims to introduce thought-provoking impulses with regard to social responsibility in computer science.

    @article{reinhold_towards_2022,
    title = {Towards a {Cyber} {Weapons} {Assessment} {Model} – {Assessment} of the {Technical} {Features} of {Malicious} {Software}},
    volume = {3},
    issn = {2637-6415},
    url = {https://peasec.de/paper/2021/2021_ReinholdReuter_CyberWeapons_IEEETransactionsTechnologySociety.pdf},
    doi = {10.1109/TTS.2021.3131817},
    abstract = {The revelation of the Stuxnet malware in 2010 shed light on the presence of state actors that are willing and capable of developing and using highly sophisticated, specialized malicious software for their political interests. These tools -often dubbed cyber weapons -are expected to become the next major advancement in weaponry technology. Besides the threats of offensive cyber operations for civil IT systems due to the interconnected nature of the cyberspace, international regulation of cyber weapons is -among other aspects -hindered by the fact that the military development and the strategic and tactical deployment of cyber weapons differ significantly from other weapons technologies. In order to establish measures of cyber arms related control treaties, it is crucial to identify these particular characteristics. Based on this premise, the article analyzes the current perspectives on cyber weapons, identifying their weaknesses of being either based on assumptions about adversarial actors or being applicable only after the usage of a malicious tool. In contrast to these approaches, the article focuses on the specific functional aspects of malware and presents an indicator-based assessment model based on parameters that can be measured prior to the application of malicious software. This enables the categorization of malicious tools as cyber weapons. Besides this, the article aims to introduce thought-provoking impulses with regard to social responsibility in computer science.},
    language = {en},
    number = {3},
    journal = {IEEE Transactions on Technology and Society},
    author = {Reinhold, Thomas and Reuter, Christian},
    month = sep,
    year = {2022},
    keywords = {A-Paper, Ranking-ImpactFactor, Peace, AuswahlPeace, Cyberwar, Projekt-ATHENE-SecUrban},
    pages = {226--239},
    }

  • Niklas Schörnig, Thomas Reinhold (2022)
    Armament, Arms Control and Artificial Intelligence – The Janus-faced Nature of Machine Learning in the Military Realm
    1 ed. Springer. doi:https://doi.org/10.1007/978-3-031-11043-6
    [BibTeX] [Abstract] [Download PDF]

    Looking at a variety of armament sectors, the book examines how Artificial Intelligence (AI) impacts the fields of armament and arms control, how existing arms control measures will be affected by AI, and what new approaches based on AI have been or are currently developed. The significant increase in computing power, the increasing reliance on software, and the advent of (narrow) AI and deep-learning algorithms all have the potential to lead to disruptive changes for military operations and warfare, rendering many classical arms control instruments less effective, or even useless. On the other hand, AI might lead to completely new arms control approaches, raising the effectiveness and reliability of new verification measures. To provide a common understanding, the book starts by presenting a general introduction to the state of the art in artificial intelligence and arms control, and how the two topics are interrelated. The second part of the book looks at examples from various fields of weapon technology, including weapons of mass destruction (WMD), conventional armament, and emerging technologies. The final section offers a cross-cutting perspective based on the examples presented in the second part. This volume will appeal to students and scholars of international relations, as well as policy-makers and practitioners interested in a better understanding of peace and security studies in general, and armament and arms control in particular with a strong focus on AI.

    @book{schornig_armament_2022,
    edition = {1},
    title = {Armament, {Arms} {Control} and {Artificial} {Intelligence} - {The} {Janus}-faced {Nature} of {Machine} {Learning} in the {Military} {Realm}},
    isbn = {978-3-031-11043-6},
    url = {https://link.springer.com/book/10.1007/978-3-031-11043-6},
    abstract = {Looking at a variety of armament sectors, the book examines how Artificial Intelligence (AI) impacts the fields of armament and arms control, how existing arms control measures will be affected by AI, and what new approaches based on AI have been or are currently developed.
    The significant increase in computing power, the increasing reliance on software, and the advent of (narrow) AI and deep-learning algorithms all have the potential to lead to disruptive changes for military operations and warfare, rendering many classical arms control instruments less effective, or even useless. On the other hand, AI might lead to completely new arms control approaches, raising the effectiveness and reliability of new verification measures. To provide a common understanding, the book starts by presenting a general introduction to the state of the art in artificial intelligence and arms control, and how the two topics are interrelated. The second part of the book looks at examples from various fields of weapon technology, including weapons of mass destruction (WMD), conventional armament, and emerging technologies. The final section offers a cross-cutting perspective based on the examples presented in the second part.
    This volume will appeal to students and scholars of international relations, as well as policy-makers and practitioners interested in a better understanding of peace and security studies in general, and armament and arms control in particular with a strong focus on AI.},
    language = {en},
    publisher = {Springer},
    author = {Schörnig, Niklas and Reinhold, Thomas},
    year = {2022},
    doi = {https://doi.org/10.1007/978-3-031-11043-6},
    keywords = {Security, Peace, Projekt-ATHENE-SecUrban},
    }

  • Thomas Reinhold (2022)
    Arms Control for Artificial Intelligence
    In: Niklas Schörnig, Thomas ReinholdArmament, Arms Control and Artificial Intelligence – The Janus-faced Nature of Machine Learning in the Military Realm. 1 ed. Springer, , 211–226. doi:https://doi.org/10.1007/978-3-031-11043-6_15
    [BibTeX] [Abstract] [Download PDF]

    With military weapon systems getting more and more improved by artificial intelligence and states competing about the leading role in this development, the question arises how arms control measures can be applied to decrease this equipment spiral. The ongoing debates on cyber weapons have already highlighted the problems with controlling or limiting digital technologies, not to mention the dual use problems. While still in an early stage, this chapter develops possible approaches for AI arms control by considering the different life cycle steps of a typical AI enabled system, based on lessons learned from other arms control approaches. It will discuss the different starting points, their arms control potential as well as its limitations to provide a holistic perspective for necessary further develops and debates.

    @incollection{reinhold_arms_2022,
    edition = {1},
    title = {Arms {Control} for {Artificial} {Intelligence}},
    isbn = {978-3-031-11043-6},
    url = {https://peasec.de/paper/2022/2022_Reinhold_ ArmsControlforAI_AI-Book.pdf},
    abstract = {With military weapon systems getting more and more improved by artificial intelligence and states competing about the leading role in this development, the question arises how arms control measures can be applied to decrease this equipment spiral. The ongoing debates on cyber weapons have already highlighted the problems with controlling or limiting digital technologies, not to mention the dual use problems. While still in an early stage, this chapter develops possible approaches for AI arms control by considering the different life cycle steps of a typical AI enabled system, based on lessons learned from other arms control approaches. It will discuss the different starting points, their arms control potential as well as its limitations to provide a holistic perspective for necessary further develops and debates.},
    language = {en},
    booktitle = {Armament, {Arms} {Control} and {Artificial} {Intelligence} - {The} {Janus}-faced {Nature} of {Machine} {Learning} in the {Military} {Realm}},
    publisher = {Springer},
    author = {Reinhold, Thomas},
    editor = {Schörnig, Niklas and Reinhold, Thomas},
    year = {2022},
    doi = {https://doi.org/10.1007/978-3-031-11043-6_15},
    keywords = {Security, Peace, Projekt-ATHENE-SecUrban},
    pages = {211--226},
    }

  • Thomas Reinhold, Christian Reuter (2022)
    Cyber Weapons and Artificial Intelligence: Impact, Influence and the Challenges for Arms Control
    In: Niklas Schörnig, Thomas ReinholdArmament, Arms Control and Artificial Intelligence – The Janus-faced Nature of Machine Learning in the Military Realm. 1 ed. Springer, , 145–158. doi:https://doi.org/10.1007/978-3-031-11043-6_11
    [BibTeX] [Abstract] [Download PDF]

    As cyber weapons and artificial intelligence technologies share the same technological foundation of bits and bytes, there is a strong trend of connecting both, thus addressing the imminent challenge of cyber weapons of processing, filtering and aggregating huge amounts of digital data in real time into decisions and actions. This chapter will analyze this development and highlight the increasing tendency towards AI enabled autonomous decisions in defensive as well as offensive cyber weapons, the arising additional challenges for attributing cyberattacks and the problems for developing arms control measures for this “technology fusion”. However, the article also ventures an outlook how AI methods can help to mitigate these challenges if applied for arms control measures itself.

    @incollection{reinhold_cyber_2022,
    edition = {1},
    title = {Cyber {Weapons} and {Artificial} {Intelligence}: {Impact}, {Influence} and the {Challenges} for {Arms} {Control}},
    isbn = {978-3-031-11043-6},
    url = {https://peasec.de/paper/2022/2022_ReinholdReuter_CyberWeaponsAIImpactInfluenceChallenges_AI-Book.pdf},
    abstract = {As cyber weapons and artificial intelligence technologies share the same technological foundation of bits and bytes, there is a strong trend of connecting both, thus addressing the imminent challenge of cyber weapons of processing, filtering and aggregating huge amounts of digital data in real time into decisions and actions. This chapter will analyze this development and highlight the increasing tendency towards AI enabled autonomous decisions in defensive as well as offensive cyber weapons, the arising additional challenges for attributing cyberattacks and the problems for developing arms control measures for this “technology fusion”. However, the article also ventures an outlook how AI methods can help to mitigate these challenges if applied for arms control measures itself.},
    language = {en},
    booktitle = {Armament, {Arms} {Control} and {Artificial} {Intelligence} - {The} {Janus}-faced {Nature} of {Machine} {Learning} in the {Military} {Realm}},
    publisher = {Springer},
    author = {Reinhold, Thomas and Reuter, Christian},
    editor = {Schörnig, Niklas and Reinhold, Thomas},
    year = {2022},
    doi = {https://doi.org/10.1007/978-3-031-11043-6_11},
    keywords = {Security, Peace, Projekt-ATHENE-SecUrban},
    pages = {145--158},
    }

  • Niklas Schörnig, Thomas Reinhold (2022)
    Introduction
    In: Niklas Schörnig, Thomas ReinholdArmament, Arms Control and Artificial Intelligence – The Janus-faced Nature of Machine Learning in the Military Realm. 1 ed. Springer, , 1–9. doi:https://doi.org/10.1007/978-3-031-11043-6_1
    [BibTeX] [Abstract] [Download PDF]

    In 1987, Allan Din published the seminal book “Arms and Artificial Intelligence,” in which he argued that the future military use of AI would be a double-edged sword. Warning about control failures and accidental war on one hand, Din also pointed out the potential of AI to enhance arms control. 35 years later, what was a niche technology in Din’s day has since become one of the most influential technologies in both the civilian and military sectors. In addition, AI has evolved from sophisticated yet deterministic expert systems to machine learning algorithms. Today, AI is about to be introduced in almost every branch of the military, with a variety of implications for arms control. This book reflects the work of the individual authors and identifies common themes and areas where AI can be used for the greater good or where its use calls for particular vigilance. It offers an essential primer for interested readers, while also encouraging experts from the arms control community to dig more deeply into the issues.

    @incollection{schornig_introduction_2022,
    edition = {1},
    title = {Introduction},
    isbn = {978-3-031-11043-6},
    url = {http://www.peasec.de/paper/2022/2022_SchoernigReinhold_Intro_AI-Book.pdf},
    abstract = {In 1987, Allan Din published the seminal book “Arms and Artificial Intelligence,” in which he argued that the future military use of AI would be a double-edged sword. Warning about control failures and accidental war on one hand, Din also pointed out the potential of AI to enhance arms control. 35 years later, what was a niche technology in Din’s day has since become one of the most influential technologies in both the civilian and military sectors. In addition, AI has evolved from sophisticated yet deterministic expert systems to machine learning algorithms. Today, AI is about to be introduced in almost every branch of the military, with a variety of implications for arms control. This book reflects the work of the individual authors and identifies common themes and areas where AI can be used for the greater good or where its use calls for particular vigilance. It offers an essential primer for interested readers, while also encouraging experts from the arms control community to dig more deeply into the issues.},
    language = {en},
    booktitle = {Armament, {Arms} {Control} and {Artificial} {Intelligence} - {The} {Janus}-faced {Nature} of {Machine} {Learning} in the {Military} {Realm}},
    publisher = {Springer},
    author = {Schörnig, Niklas and Reinhold, Thomas},
    editor = {Schörnig, Niklas and Reinhold, Thomas},
    year = {2022},
    doi = {https://doi.org/10.1007/978-3-031-11043-6_1},
    keywords = {Security, Peace, Projekt-ATHENE-SecUrban},
    pages = {1--9},
    }

  • Jasmin Haunschild, Marc-André Kaufhold, Christian Reuter (2022)
    Perceptions and Use of Warning Apps – Did Recent Crises Lead to Changes in Germany?
    Mensch und Computer – Tagungsband New York. doi:10.1145/3543758.3543770
    [BibTeX] [Abstract] [Download PDF]

    Warning and emergency apps are an integral part of crisis informatics and particularly relevant in countries that currently do not have cell broadcast, such as Germany. Previous studies have shown that such apps are regarded as relevant, but only around 16\% of German citizens used them in 2017 and 2019. With the COVID-19 pandemic and a devastating flash flood, Germany has recently experienced severe crisis-related losses. By comparing data from representative surveys from 2017, 2019 and 2021, this study investigates whether these events have changed the perceptions of warning apps and their usage patterns in Germany. The study shows that while multi-hazard emergency and warning apps have been easily surpassed in usage by COVID-19 contact tracing apps, the use of warning apps has also increased and the pandemic has added new desired features. While these have been little-used during the COVID-19 pandemic, especially non-users see smartphone messengers app channels as possible alternatives to warning apps. In addition, regional warning apps appear promising, possibly because they make choosing a warning app easier when there are several available on the market.

    @inproceedings{haunschild_perceptions_2022,
    address = {New York},
    title = {Perceptions and {Use} of {Warning} {Apps} – {Did} {Recent} {Crises} {Lead} to {Changes} in {Germany}?},
    url = {http://www.peasec.de/paper/2022/2022_HaunschildKaufholdReuter_WarningAppsChangesGermany_MuC.pdf},
    doi = {10.1145/3543758.3543770},
    abstract = {Warning and emergency apps are an integral part of crisis informatics and particularly relevant in countries that currently do not have cell broadcast, such as Germany. Previous studies have shown that such apps are regarded as relevant, but only around 16\% of German citizens used them in 2017 and 2019. With the COVID-19 pandemic and a devastating flash flood, Germany has recently experienced severe crisis-related losses. By comparing data from representative surveys from 2017, 2019 and 2021, this study investigates whether these events have changed the perceptions of warning apps and their usage patterns in Germany. The study shows that while multi-hazard emergency and warning apps have been easily surpassed in usage by COVID-19 contact tracing apps, the use of warning apps has also increased and the pandemic has added new desired features. While these have been little-used during the COVID-19 pandemic, especially non-users see smartphone messengers app channels as possible alternatives to warning apps. In addition, regional warning apps appear promising, possibly because they make choosing a warning app easier when there are several available on the market.},
    language = {en},
    booktitle = {Mensch und {Computer} - {Tagungsband}},
    publisher = {ACM},
    author = {Haunschild, Jasmin and Kaufhold, Marc-André and Reuter, Christian},
    year = {2022},
    keywords = {Crisis, Projekt-ATHENE-SecUrban, Projekt-CYWARN, Projekt-emergenCITY},
    }

  • Sabrina Gabel, Lilian Reichert, Christian Reuter (2022)
    Discussing Conflict in Social Media – The Use of Twitter in the Jammu and Kashmir Conflict
    Media, War & Conflict ;15(4):1–26.
    [BibTeX] [Abstract] [Download PDF]

    Social media have come to play a vital role not only in our everyday lives, but also in times of conflict and crisis such as natural disasters or civil wars. Recent research has highlighted, on the one hand, the use of social media as a means of recruitment by terrorists and, on the other hand, the use of Facebook, Twitter etc. to gain the support of the population during insurgencies. This article conducts a qualitative content analysis of content on Twitter concerning the conflict in the Jammu and Kashmir region. The tweets following the death of a popular militant, Burhan Wani, cover three different themes: (1) criticism of intellectuals, (2) Burhan Wani’s impact on the conflict, and (3) tweets referring to the conflict itself. Generally, people use Twitter to make their own point of view clear to others and discredit the opposing party, at the same time tweets are reflecting the antagonism between the two parties to the conflict, India and Pakistan. The sample of tweets reflects the lack of awareness among people in the region regarding the motivations of the new generation of militancy emerging in Kashmir after 1990.

    @article{gabel_discussing_2022,
    title = {Discussing {Conflict} in {Social} {Media} – {The} {Use} of {Twitter} in the {Jammu} and {Kashmir} {Conflict}},
    volume = {15},
    url = {https://journals.sagepub.com/doi/full/10.1177/1750635220970997},
    abstract = {Social media have come to play a vital role not only in our everyday lives, but also in times of conflict and crisis such as natural disasters or civil wars. Recent research has highlighted, on the one hand, the use of social media as a means of recruitment by terrorists and, on the other hand, the use of Facebook, Twitter etc. to gain the support of the population during insurgencies. This article conducts a qualitative content analysis of content on Twitter concerning the conflict in the Jammu and Kashmir region. The tweets following the death of a popular militant, Burhan Wani, cover three different themes: (1) criticism of intellectuals, (2) Burhan Wani's impact on the conflict, and (3) tweets referring to the conflict itself. Generally, people use Twitter to make their own point of view clear to others and discredit the opposing party, at the same time tweets are reflecting the antagonism between the two parties to the conflict, India and Pakistan. The sample of tweets reflects the lack of awareness among people in the region regarding the motivations of the new generation of militancy emerging in Kashmir after 1990.},
    number = {4},
    journal = {Media, War \& Conflict},
    author = {Gabel, Sabrina and Reichert, Lilian and Reuter, Christian},
    year = {2022},
    keywords = {Crisis, HCI, SocialMedia, Ranking-ImpactFactor, Peace, Projekt-ATHENE-SecUrban},
    pages = {1--26},
    }

  • Philipp Kuehn, Moritz Kerk, Marc Wendelborn, Christian Reuter (2022)
    Clustering of Threat Information to Mitigate Information Overload for Computer Emergency Response Teams
    2022.
    [BibTeX] [Abstract] [Download PDF]

    The constantly increasing number of threats and the existing diversity of information sources pose challenges for Computer Emergency Response Teams (CERTs). In order to respond to new threats, CERTs need to gather information in a timely and comprehensive manner. However, the volume of information and sources can lead to information overload. This paper answers the question of how to reduce information overload for CERTs with the help of clustering methods. Conditions for such a framework were established and subsequently tested. In order to perform an evaluation, different types of evaluation metrics were introduced and selected in relation to the framework conditions. Furthermore, different vectorizations and distance measures in combination with the clustering methods were evaluated and interpreted. Two different ground-truth datasets were used for the evaluation, one containing threat messages and a dataset with messages from different news categories. The work shows that the K-means clustering method along with TF-IDF vectorization and cosine distance provide the best results in the domain of threat messages.

    @techreport{kuehn_clustering_2022,
    title = {Clustering of {Threat} {Information} to {Mitigate} {Information} {Overload} for {Computer} {Emergency} {Response} {Teams}},
    copyright = {arXiv.org perpetual, non-exclusive license},
    url = {https://arxiv.org/pdf/2210.14067.pdf},
    abstract = {The constantly increasing number of threats and the existing diversity of information sources pose challenges for Computer Emergency Response Teams (CERTs). In order to respond to new threats, CERTs need to gather information in a timely and comprehensive manner. However, the volume of information and sources can lead to information overload. This paper answers the question of how to reduce information overload for CERTs with the help of clustering methods. Conditions for such a framework were established and subsequently tested. In order to perform an evaluation, different types of evaluation metrics were introduced and selected in relation to the framework conditions. Furthermore, different vectorizations and distance measures in combination with the clustering methods were evaluated and interpreted. Two different ground-truth datasets were used for the evaluation, one containing threat messages and a dataset with messages from different news categories. The work shows that the K-means clustering method along with TF-IDF vectorization and cosine distance provide the best results in the domain of threat messages.},
    language = {en},
    institution = {arXiv},
    author = {Kuehn, Philipp and Kerk, Moritz and Wendelborn, Marc and Reuter, Christian},
    year = {2022},
    note = {https://doi.org/10.48550/arXiv.2210.14067},
    keywords = {HCI, Student, Security, Projekt-ATHENE-SecUrban, Projekt-CYWARN},
    }

  • Christian Reuter (2022)
    A European Perspective on Crisis Informatics: Citizens‘ and Authorities‘ attitudes towards Social Media for Public Safety and Security
    Nijmegen: The Radboud University Thesis Repository.
    [BibTeX] [Abstract] [Download PDF]

    Mobilising helpers in the event of a flood or letting friends know that you are okay in the event of a terrorist attack – more and more people are using social media in emergency, crisis or disaster situations. Storms, floods, attacks or pandemics (esp. COVID-19) show that citizens use social media to inform themselves or to coordinate. This thesis presents qualitative and quantitative studies on the attitudes of emergency services and citizens in Europe towards social media in emergencies. Across the individual sub-studies, almost 10,000 people are surveyed including representative studies in the Netherlands, Germany, the UK and Italy. The work empirically shows that social media is increasingly important for emergency services, both for prevention and during crises; that private use of social media is a driving force in shaping opinions for organisational use; and that citizens have high expectations towards authorities, especially monitoring social media is expected, and sometimes responses within one hour. Depending on the risk culture, the data show further differences, e.g. whether the state (Germany) or the individual (Netherlands) is seen as primarily responsible for coping with the situation.

    @book{reuter_european_2022-1,
    address = {Nijmegen},
    title = {A {European} {Perspective} on {Crisis} {Informatics}: {Citizens}' and {Authorities}' attitudes towards {Social} {Media} for {Public} {Safety} and {Security}},
    url = {https://repository.ubn.ru.nl/handle/2066/253000},
    abstract = {Mobilising helpers in the event of a flood or letting friends know that you are okay in the event of a terrorist attack – more and more people are using social media in emergency, crisis or disaster situations. Storms, floods, attacks or pandemics (esp. COVID-19) show that citizens use social media to inform themselves or to coordinate. This thesis presents qualitative and quantitative studies on the attitudes of emergency services and citizens in Europe towards social media in emergencies. Across the individual sub-studies, almost 10,000 people are surveyed including representative studies in the Netherlands, Germany, the UK and Italy. The work empirically shows that social media is increasingly important for emergency services, both for prevention and during crises; that private use of social media is a driving force in shaping opinions for organisational use; and that citizens have high expectations towards authorities, especially monitoring social media is expected, and sometimes responses within one hour. Depending on the risk culture, the data show further differences, e.g. whether the state (Germany) or the individual (Netherlands) is seen as primarily responsible for coping with the situation.},
    publisher = {The Radboud University Thesis Repository},
    author = {Reuter, Christian},
    year = {2022},
    keywords = {AuswahlCrisis, Crisis, HCI, Selected, SocialMedia, Projekt-EmerGent, Projekt-KontiKat, Projekt-ATHENE-SecUrban, Projekt-emergenCITY, Dissertation},
    }

  • Christian Reuter, Luigi Lo Iacono, Alexander Benlian (2022)
    A Quarter Century of Usable Security and Privacy Research: Transparency, Tailorability, and the Road Ahead
    Behaviour & Information Technology (BIT) ;41(10):2035–2048. doi:10.1080/0144929X.2022.2080908
    [BibTeX] [Abstract] [Download PDF]

    In the last decades, research has shown that both technical solutions and user perceptions are important to improve security and privacy in the digital realm. The field of ‘usable security’ already started to emerge in the mid-90s, primarily focussed on password and email security. Later on, the research field of ”usable security and privacy” evolved and broadened the aim to design concepts and tools to assist users in enhancing their behaviour with regard to both privacy and security. Nevertheless, many user interventions are not as effective as desired. Because of highly diverse usage contexts, leading to different privacy and security requirements and not always to one-size-fits-all approaches, tailorability is necessary to address this issue. Furthermore, transparency is a crucial requirement, as providing comprehensible information may counter reactance towards security interventions. This article first provides a brief history of the research field in its first quarter-century and then highlights research on the transparency and tailorability of user interventions. Based on this, this article then presents six contributions with regard to (1) privacy concerns in times of COVID-19, (2) authentication on mobile devices, (3) GDPR-compliant data management, (4) privacy notices on websites, (5) data disclosure scenarios in agriculture, as well as (6) rights under data protection law and the concrete process should data subjects want to claim those rights. This article concludes with several research directions on user-centred transparency and tailorability.

    @article{reuter_quarter_2022,
    title = {A {Quarter} {Century} of {Usable} {Security} and {Privacy} {Research}: {Transparency}, {Tailorability}, and the {Road} {Ahead}},
    volume = {41},
    issn = {0144-929X},
    url = {https://www.tandfonline.com/toc/tbit20/41/10},
    doi = {10.1080/0144929X.2022.2080908},
    abstract = {In the last decades, research has shown that both technical solutions and user perceptions are important to improve security and privacy in the digital realm. The field of ‘usable security’ already started to emerge in the mid-90s, primarily focussed on password and email security. Later on, the research field of ”usable security and privacy” evolved and broadened the aim to design concepts and tools to assist users in enhancing their behaviour with regard to both privacy and security. Nevertheless, many user interventions are not as effective as desired. Because of highly diverse usage contexts, leading to different privacy and security requirements and not always to one-size-fits-all approaches, tailorability is necessary to address this issue. Furthermore, transparency is a crucial requirement, as providing comprehensible information may counter reactance towards security interventions. This article first provides a brief history of the research field in its first quarter-century and then highlights research on the transparency and tailorability of user interventions. Based on this, this article then presents six contributions with regard to (1) privacy concerns in times of COVID-19, (2) authentication on mobile devices, (3) GDPR-compliant data management, (4) privacy notices on websites, (5) data disclosure scenarios in agriculture, as well as (6) rights under data protection law and the concrete process should data subjects want to claim those rights. This article concludes with several research directions on user-centred transparency and tailorability.},
    number = {10},
    journal = {Behaviour \& Information Technology (BIT)},
    author = {Reuter, Christian and Lo Iacono, Luigi and Benlian, Alexander},
    year = {2022},
    keywords = {Crisis, HCI, SocialMedia, UsableSec, Security, A-Paper, Ranking-ImpactFactor, Ranking-CORE-A, Projekt-CROSSING, Projekt-ATHENE-SecUrban},
    pages = {2035--2048},
    }

  • Philipp Kuehn, Julian Bäumler, Marc-André Kaufhold, Marc Wendelborn, Christian Reuter (2022)
    The Notion of Relevance in Cybersecurity: A Categorization of Security Tools and Deduction of Relevance Notions
    Mensch und Computer – Workshopband Darmstadt. doi:10.18420/muc2022-mci-ws01-220
    [BibTeX] [Abstract] [Download PDF]

    Proper cybersecurity requires timely information to defend the IT infrastructure. In a dynamic field like cybersecurity, gathering up-to-date information is usually a manual, time-consuming, and exhaustive task. Automatic and usable approaches are supposed to be a solution to this problem, but for this, they require a notion of information relevance to distinguish relevant from irrelevant information. First, on the basis of a literature review, this paper proposes a novel cybersecurity tool categorization based on corresponding tool types with their respective definitions and core features. Second, it elaborates information used in each category and deduces notions of relevance. Third, it outlines how these findings informed the design of a security dashboard to guide computer emergency response team staff in identifying current threats in open source intelligence sources while mitigating information overload.

    @inproceedings{kuehn_notion_2022,
    address = {Darmstadt},
    series = {Mensch und {Computer} 2022 - {Workshopband}},
    title = {The {Notion} of {Relevance} in {Cybersecurity}: {A} {Categorization} of {Security} {Tools} and {Deduction} of {Relevance} {Notions}},
    url = {https://dl.gi.de/handle/20.500.12116/39072},
    doi = {10.18420/muc2022-mci-ws01-220},
    abstract = {Proper cybersecurity requires timely information to defend the IT infrastructure. In a dynamic field like cybersecurity, gathering up-to-date information is usually a manual, time-consuming, and exhaustive task. Automatic and usable approaches are supposed to be a solution to this problem, but for this, they require a notion of information relevance to distinguish relevant from irrelevant information. First, on the basis of a literature review, this paper proposes a novel cybersecurity tool categorization based on corresponding tool types with their respective definitions and core features. Second, it elaborates information used in each category and deduces notions of relevance. Third, it outlines how these findings informed the design of a security dashboard to guide computer emergency response team staff in identifying current threats in open source intelligence sources while mitigating information overload.},
    language = {en},
    booktitle = {Mensch und {Computer} - {Workshopband}},
    publisher = {Gesellschaft für Informatik},
    author = {Kuehn, Philipp and Bäumler, Julian and Kaufhold, Marc-André and Wendelborn, Marc and Reuter, Christian},
    year = {2022},
    keywords = {Student, UsableSec, Security, Projekt-ATHENE-SecUrban, Projekt-CYWARN},
    }

  • Denis Orlov, Simon Möller, Sven Düfler, Steffen Haesler, Christian Reuter (2022)
    Detecting a Crisis: Comparison of Self-Reported vs. Automated Internet Outage Measuring Methods
    Mensch und Computer – Workshopband Darmstadt. doi:10.18420/muc2022-mci-ws10-321
    [BibTeX] [Abstract] [Download PDF]

    Every day, there are internet disruptions or outages around the world that affect our daily lives. In this paper, we analyzed these events in Germany in recent years and found out how they can be detected, and what impact they have on citizens, especially in crisis situations. For this purpose, we take a look at two different approaches to recording internet outages, namely the self-reporting of citizens and automatic reporting by algorithmic examination of the availability of IP networks. We evaluate the data of six major events with regard to their meaningfulness in quality and quantity. We found that due to the amount of data and the inherent imprecision of the methods used, it is difficult to detect outages through algorithmic examination. But once an event is publicly known by self-reporting, they have advantages to capture the temporal and spatial dimensions of the outage due to its nature of objective measurements. As a result, we propose that users’ crowdsourcing can enhance the detection of outages and should be seen as an important starting point to even begin an analysis with algorithm-based techniques, but it is to ISPs and regulatory authorities to support that.

    @inproceedings{orlov_detecting_2022,
    address = {Darmstadt},
    series = {Mensch und {Computer} 2022 - {Workshopband}},
    title = {Detecting a {Crisis}: {Comparison} of {Self}-{Reported} vs. {Automated} {Internet} {Outage} {Measuring} {Methods}},
    url = {https://dl.gi.de/handle/20.500.12116/39089},
    doi = {10.18420/muc2022-mci-ws10-321},
    abstract = {Every day, there are internet disruptions or outages around the world that affect our daily lives. In this paper, we analyzed these events in Germany in recent years and found out how they can be detected, and what impact they have on citizens, especially in crisis situations. For this purpose, we take a look at two different approaches to recording internet outages, namely the self-reporting of citizens and automatic reporting by algorithmic examination of the availability of IP networks. We evaluate the data of six major events with regard to their meaningfulness in quality and quantity. We found that due to the amount of data and the inherent imprecision of the methods used, it is difficult to detect outages through algorithmic examination. But once an event is publicly known by self-reporting, they have advantages to capture the temporal and spatial dimensions of the outage due to its nature of objective measurements. As a result, we propose that users’ crowdsourcing can enhance the detection of outages and should be seen as an important starting point to even begin an analysis with algorithm-based techniques, but it is to ISPs and regulatory authorities to support that.},
    language = {en},
    booktitle = {Mensch und {Computer} - {Workshopband}},
    publisher = {Gesellschaft für Informatik},
    author = {Orlov, Denis and Möller, Simon and Düfler, Sven and Haesler, Steffen and Reuter, Christian},
    year = {2022},
    keywords = {HCI, Student, UsableSec, Security, Projekt-ATHENE-SecUrban, Projekt-emergenCITY},
    }

  • Thomas Reinhold, Christian Reuter (2022)
    Book Review: Artificial Intelligence and The Future of Warfare, James Johnson (2021)
    Zeitschrift für Außen- und Sicherheitspolitik (ZfAS) . doi:10.1007/s12399-022-00918-4
    [BibTeX] [Abstract] [Download PDF]

    Technological and scientific progress, especially the rapid development of information technology (IT), plays a crucial role in peace and security issuesFootnote1. Artificial Intelligence (AI) is one example. AI is a sub-discipline of computer science, dealing with computer systems capable of performing tasks which require human intelligenceFootnote2. According to James Johnson, PhD, Lecturer in Strategic Studies in the Department of Politics & International Relations at the University of Aberdeen and author of the book Artificial Intelligence and the Future of Warfare, the hype around this has made it easy to overstate the opportunities and challenges posed by the development and deployment of AI in the military sphere. The author argues, that “speculations about super intelligent AI or the threat of superman AI to humanity” are entirely disconnected from today’s capabilities of AI. The book aims to address this problem by deciphering “proven capabilities and applications from mere speculation”, with a strong focus on the challenges AI poses to strategic stability, nuclear deterrence and how AI might influence nuclear weapon systems. The author concludes with implications and policy recommendations on how states could manage the escalatory risks posed by AI.

    @article{reinhold_book_2022,
    title = {Book {Review}: {Artificial} {Intelligence} and {The} {Future} of {Warfare}, {James} {Johnson} (2021)},
    url = {https://link.springer.com/article/10.1007/s12399-022-00918-4},
    doi = {10.1007/s12399-022-00918-4},
    abstract = {Technological and scientific progress, especially the rapid development of information technology (IT), plays a crucial role in peace and security issuesFootnote1. Artificial Intelligence (AI) is one example. AI is a sub-discipline of computer science, dealing with computer systems capable of performing tasks which require human intelligenceFootnote2. According to James Johnson, PhD, Lecturer in Strategic Studies in the Department of Politics \& International Relations at the University of Aberdeen and author of the book Artificial Intelligence and the Future of Warfare, the hype around this has made it easy to overstate the opportunities and challenges posed by the development and deployment of AI in the military sphere. The author argues, that “speculations about super intelligent AI or the threat of superman AI to humanity” are entirely disconnected from today’s capabilities of AI. The book aims to address this problem by deciphering “proven capabilities and applications from mere speculation”, with a strong focus on the challenges AI poses to strategic stability, nuclear deterrence and how AI might influence nuclear weapon systems. The author concludes with implications and policy recommendations on how states could manage the escalatory risks posed by AI.},
    journal = {Zeitschrift für Außen- und Sicherheitspolitik (ZfAS)},
    author = {Reinhold, Thomas and Reuter, Christian},
    year = {2022},
    keywords = {Peace, Projekt-ATHENE-SecUrban},
    }

  • Christian Bueger, Tobias Liebetrau, Jonas Franken (2022)
    Security threats to undersea communications cables and infrastructure – consequences for the EU
    Brussels: European Parliament.
    [BibTeX] [Abstract] [Download PDF]

    The EU’s subsea data cable network is both vital for global connectivity and vulnerable. This study provides a systematic review of the current security threats, as well as the actors at the origin of these threats. Building on reports and expert input, the paper takes stock of current awareness, preparedness and response mechanisms, both at the EU and Member State level. A number of recommendations suggest how to improve the resilience of the cable network. Proposals build on the need to enhance EU-wide awareness, improve coordination and share information across EU institutions and Member States. In addition, surveillance capabilities must be advanced, response and repair mechanisms strengthened, and the topic mainstreamed across external action.

    @book{bueger_security_2022,
    address = {Brussels},
    title = {Security threats to undersea communications cables and infrastructure – consequences for the {EU}},
    url = {https://www.europarl.europa.eu/thinktank/en/document/EXPO_IDA(2022)702557},
    abstract = {The EU’s subsea data cable network is both vital for global connectivity and vulnerable. This study provides a systematic review of the current security threats, as well as the actors at the origin of these threats. Building on reports and expert input, the paper takes stock of current awareness, preparedness and response mechanisms, both at the EU and Member State level. A number of recommendations suggest how to improve the resilience of the cable network. Proposals build on the need to enhance EU-wide awareness, improve coordination and share information across EU institutions and Member States. In addition, surveillance capabilities must be advanced, response and repair mechanisms strengthened, and the topic mainstreamed across external action.},
    publisher = {European Parliament},
    author = {Bueger, Christian and Liebetrau, Tobias and Franken, Jonas},
    year = {2022},
    keywords = {Student, Security, Infrastructure, Cyberwar, Projekt-ATHENE-SecUrban, Projekt-emergenCITY},
    }

  • Marc-André Kaufhold, Ali Sercan Basyurt, Kaan Eyilmez, Marc Stöttinger, Christian Reuter (2022)
    Cyber Threat Observatory: Design and Evaluation of an Interactive Dashboard for Computer Emergency Response Teams
    Proceedings of the European Conference on Information Systems (ECIS) Timisoara, Romania.
    [BibTeX] [Abstract] [Download PDF]

    Besides the merits of increasing digitization and networking, societies are increasling exposed to cyberattacks. In Germany, Computer Emerrgency Response Teams (CERTs) of the public sector operate on federal and state level to provide preventative and reactive information security services for authorities, citizens, and enterprises. Their tasks of monitoring, analyzing, and communicating threats is getting more complex by the increasing information quantity disseminated into relevant public channels. Using the lens of design science research, this paper contributes with the design and evaluation of a cross-platform cybersecurity dashboard for CERTs. Based on expert scenario-based walkthroughs in combination with semi-structured interviews (N=12), it discusses six design implications, including the customizability of data sources and filtering of displayed entities, modular integration of additional information sources, interrelation between different information feeds, intelligent algorithms for content assessment and filtering, integration with security software and systems, as well as export, sharing and communication of relevant data.

    @inproceedings{kaufhold_cyber_2022,
    address = {Timisoara, Romania},
    title = {Cyber {Threat} {Observatory}: {Design} and {Evaluation} of an {Interactive} {Dashboard} for {Computer} {Emergency} {Response} {Teams}},
    url = {http://www.peasec.de/paper/2022/2022_KaufholdBasyurtEyilmezStoettingerReuter_CyberThreatObservatory_ECIS.pdf},
    abstract = {Besides the merits of increasing digitization and networking, societies are increasling exposed to cyberattacks. In Germany, Computer Emerrgency Response Teams (CERTs) of the public sector operate on federal and state level to provide preventative and reactive information security services for authorities, citizens, and enterprises. Their tasks of monitoring, analyzing, and communicating threats is getting more complex by the increasing information quantity disseminated into relevant public channels. Using the lens of design science research, this paper contributes with the design and evaluation of a cross-platform cybersecurity dashboard for CERTs. Based on expert scenario-based walkthroughs in combination with semi-structured interviews (N=12), it discusses six design implications, including the customizability of data sources and filtering of displayed entities, modular integration of additional information sources, interrelation between different information feeds, intelligent algorithms for content assessment and filtering, integration with security software and systems, as well as export, sharing and communication of relevant data.},
    booktitle = {Proceedings of the {European} {Conference} on {Information} {Systems} ({ECIS})},
    author = {Kaufhold, Marc-André and Basyurt, Ali Sercan and Eyilmez, Kaan and Stöttinger, Marc and Reuter, Christian},
    year = {2022},
    keywords = {HCI, UsableSec, Security, A-Paper, Ranking-CORE-A, Projekt-ATHENE-SecUrban, Projekt-CYWARN},
    }

  • Marc-André Kaufhold, Julian Bäumler, Christian Reuter (2022)
    The Implementation of Protective Measures and Communication of Cybersecurity Alerts in Germany – A Representative Survey of the Population
    Mensch und Computer – Workshopband Darmstadt. doi:10.18420/muc2022-mci-ws01-228
    [BibTeX] [Abstract] [Download PDF]

    Despite the merits of digitization in private and professional spaces, critical infrastructures and societies are increasingly exposed to cyberattacks. We conducted a representative survey with German citizens (N=1,093) to examine how they assess the current and future cyber threat situation as well as possible protective measures in cyberspace. Furthermore, we asked what information and channels citizens need to be aware of cyber threats. Our findings indicate that large proportions of the German population feel inadequately informed about cyber threats and tend to only apply enforced security measures by programs (e.g., updates) and services (e.g., two-factor authentication). Furthermore, institutions such as state-level Computer Emergency Response Teams (CERTs) are relatively unknown among the population and respondents showed little confidence in German security authorities to cope with largescale attacks and ultimately protect citizens. Still, our participants prefer to receive cybersecurity information via installed security applications, television channels, or emergency warning apps.

    @inproceedings{kaufhold_implementation_2022,
    address = {Darmstadt},
    series = {Mensch und {Computer} 2022 - {Workshopband}},
    title = {The {Implementation} of {Protective} {Measures} and {Communication} of {Cybersecurity} {Alerts} in {Germany} - {A} {Representative} {Survey} of the {Population}},
    url = {https://dl.gi.de/handle/20.500.12116/39061},
    doi = {10.18420/muc2022-mci-ws01-228},
    abstract = {Despite the merits of digitization in private and professional spaces, critical infrastructures and societies are increasingly exposed to cyberattacks. We conducted a representative survey with German citizens (N=1,093) to examine how they assess the current and future cyber threat situation as well as possible protective measures in cyberspace. Furthermore, we asked what information and channels citizens need to be aware of cyber threats. Our findings indicate that large proportions of the German population feel inadequately informed about cyber threats and tend to only apply enforced security measures by programs (e.g., updates) and services (e.g., two-factor authentication). Furthermore, institutions such as state-level Computer Emergency Response Teams (CERTs) are relatively unknown among the population and respondents showed little confidence in German security authorities to cope with largescale attacks and ultimately protect citizens. Still, our participants prefer to receive cybersecurity information via installed security applications, television channels, or emergency warning apps.},
    language = {en},
    booktitle = {Mensch und {Computer} - {Workshopband}},
    publisher = {Gesellschaft für Informatik},
    author = {Kaufhold, Marc-André and Bäumler, Julian and Reuter, Christian},
    year = {2022},
    keywords = {HCI, Student, UsableSec, Security, Projekt-ATHENE-SecUrban, Projekt-CYWARN},
    }

  • Stefka Schmid (2022)
    Trustworthy and Explainable: A European Vision of (Weaponised) Artificial Intelligence
    Die Friedens-Warte / Journal of International Peace and Organization (JIPO) ;95(3-4):290–315. doi:10.35998/fw-2022-0013
    [BibTeX] [Abstract] [Download PDF]

    The European Union (EU) has undertaken policies which address the research and development of artificial intelligence (AI). In light of debates of technology assessment which focus on risks for humans and questions of control of AI, the EU has propagated an ethical, human-centred approach of the application of AI. It is important to identify how the EU envisions AI as this may guide emerging norms in AI governance and today’s research and development of (weaponised) AI. Building on works of Human-Computer Interaction (HCI), this work derives the actor’s understanding of human-AI interaction, including conceptualisations of explainability, interpretability, and risks. Analysis of EU documents on the implementation of AI as a general-purpose technology and for military application reveals that explainability and risk identification are crucial elements for trust, which itself is a necessary component in the uptake of AI. Interdisciplinary approaches allow for a more detailed understanding of actors’ fundamental views on human control of AI, which further contributes to debates on technology assessment in professionalised political contexts.

    @article{schmid_trustworthy_2022,
    title = {Trustworthy and {Explainable}: {A} {European} {Vision} of ({Weaponised}) {Artificial} {Intelligence}},
    volume = {95},
    url = {https://elibrary.bwv-verlag.de/article/10.35998/fw-2022-0013},
    doi = {10.35998/fw-2022-0013},
    abstract = {The European Union (EU) has undertaken policies which address the research and development of artificial intelligence (AI). In light of debates of technology assessment which focus on risks for humans and questions of control of AI, the EU has propagated an ethical, human-centred approach of the application of AI. It is important to identify how the EU envisions AI as this may guide emerging norms in AI governance and today’s research and development of (weaponised) AI. Building on works of Human-Computer Interaction (HCI), this work derives the actor’s understanding of human-AI interaction, including conceptualisations of explainability, interpretability, and risks. Analysis of EU documents on the implementation of AI as a general-purpose technology and for military application reveals that explainability and risk identification are crucial elements for trust, which itself is a necessary component in the uptake of AI. Interdisciplinary approaches allow for a more detailed understanding of actors’ fundamental views on human control of AI, which further contributes to debates on technology assessment in professionalised political contexts.},
    number = {3-4},
    journal = {Die Friedens-Warte / Journal of International Peace and Organization (JIPO)},
    author = {Schmid, Stefka},
    year = {2022},
    keywords = {Peace, Projekt-ATHENE-SecUrban, Projekt-TraCe},
    pages = {290--315},
    }

  • Christian Reuter (2022)
    A European Perspective on Crisis Informatics: Citizens‘ and Authorities‘ attitudes towards Social Media for Public Safety and Security
    1 ed. Wiesbaden: Springer Vieweg. doi:https://doi.org/10.1007/978-3-658-39720-3
    [BibTeX] [Abstract] [Download PDF]

    Mobilising helpers in the event of a flood or letting friends know that you are okay in the event of a terrorist attack – more and more people are using social media in emergency, crisis or disaster situations. Storms, floods, attacks or pandemics (esp. COVID-19) show that citizens use social media to inform themselves or to coordinate. This thesis presents qualitative and quantitative studies on the attitudes of emergency services and citizens in Europe towards social media in emergencies. Across the individual sub-studies, almost 10,000 people are surveyed including representative studies in the Netherlands, Germany, the UK and Italy. The work empirically shows that social media is increasingly important for emergency services, both for prevention and during crises; that private use of social media is a driving force in shaping opinions for organisational use; and that citizens have high expectations towards authorities, especially monitoring social media is expected, and sometimes responses within one hour. Depending on the risk culture, the data show further differences, e.g. whether the state (Germany) or the individual (Netherlands) is seen as primarily responsible for coping with the situation.

    @book{reuter_european_2022,
    address = {Wiesbaden},
    edition = {1},
    title = {A {European} {Perspective} on {Crisis} {Informatics}: {Citizens}' and {Authorities}' attitudes towards {Social} {Media} for {Public} {Safety} and {Security}},
    isbn = {978-3-658-39719-7},
    url = {https://link.springer.com/book/10.1007/978-3-658-39720-3},
    abstract = {Mobilising helpers in the event of a flood or letting friends know that you are okay in the event of a terrorist attack – more and more people are using social media in emergency, crisis or disaster situations. Storms, floods, attacks or pandemics (esp. COVID-19) show that citizens use social media to inform themselves or to coordinate. This thesis presents qualitative and quantitative studies on the attitudes of emergency services and citizens in Europe towards social media in emergencies. Across the individual sub-studies, almost 10,000 people are surveyed including representative studies in the Netherlands, Germany, the UK and Italy. The work empirically shows that social media is increasingly important for emergency services, both for prevention and during crises; that private use of social media is a driving force in shaping opinions for organisational use; and that citizens have high expectations towards authorities, especially monitoring social media is expected, and sometimes responses within one hour. Depending on the risk culture, the data show further differences, e.g. whether the state (Germany) or the individual (Netherlands) is seen as primarily responsible for coping with the situation.},
    language = {en},
    publisher = {Springer Vieweg},
    author = {Reuter, Christian},
    year = {2022},
    doi = {https://doi.org/10.1007/978-3-658-39720-3},
    keywords = {Crisis, HCI, SocialMedia, Projekt-EmerGent, Projekt-KontiKat, Projekt-ATHENE-SecUrban, Projekt-emergenCITY, Dissertation},
    }

  • Jonas Franken, Thomas Reinhold, Lilian Reichert, Christian Reuter (2022)
    The Digital Divide in State Vulnerability to Submarine Communications Cable Failure
    International Journal of Critical Infrastructure Protection (IJCIP) ;38(100522):1–15. doi:10.1016/j.ijcip.2022.100522
    [BibTeX] [Abstract] [Download PDF]

    The backbone network of submarine communication cables (SCC) carries 98\% of international internet traffic. Coastal and island states strongly depend on this physical internet infrastructure to provide internet connectivity. Although about 100 SCC breakdowns of human or natural origin occur at yearly average, a literature review reveals that there is no approach to assess individual state vulnerability to SCC failure in global comparison. In this article, the global SCC network is modeled based on publicly available data. Besides the analysis of the global network properties, a focus is put on remaining bandwidth capacities in three different failure scenario simulations of SCC breakdowns. As a result, this study identifies 15 highly vulnerable states and overseas territories, and another 28 territories that are classified as partially vulnerable to SCC failures. Since economic market decisions shape the structure of the SCC network, an uneven distribution of redundancies and the resulting vulnerability of disadvantaged economies can be confirmed. Therefore, the study’s findings may contribute to a better assessment of the necessity of preventive protection measures of critical telecommunication infrastructures in states and territories characterized by high and medium vulnerability.

    @article{franken_digital_2022,
    title = {The {Digital} {Divide} in {State} {Vulnerability} to {Submarine} {Communications} {Cable} {Failure}},
    volume = {38},
    url = {https://peasec.de/paper/2022/2022_FrankenReinholdReichertReuter_DigitalDivideStateVulnerabilitySubmarineCommunicationsCable_IJCIP.pdf},
    doi = {10.1016/j.ijcip.2022.100522},
    abstract = {The backbone network of submarine communication cables (SCC) carries 98\% of international internet traffic. Coastal and island states strongly depend on this physical internet infrastructure to provide internet connectivity. Although about 100 SCC breakdowns of human or natural origin occur at yearly average, a literature review reveals that there is no approach to assess individual state vulnerability to SCC failure in global comparison. In this article, the global SCC network is modeled based on publicly available data. Besides the analysis of the global network properties, a focus is put on remaining bandwidth capacities in three different failure scenario simulations of SCC breakdowns. As a result, this study identifies 15 highly vulnerable states and overseas territories, and another 28 territories that are classified as partially vulnerable to SCC failures. Since economic market decisions shape the structure of the SCC network, an uneven distribution of redundancies and the resulting vulnerability of disadvantaged economies can be confirmed. Therefore, the study's findings may contribute to a better assessment of the necessity of preventive protection measures of critical telecommunication infrastructures in states and territories characterized by high and medium vulnerability.},
    number = {100522},
    journal = {International Journal of Critical Infrastructure Protection (IJCIP)},
    author = {Franken, Jonas and Reinhold, Thomas and Reichert, Lilian and Reuter, Christian},
    year = {2022},
    keywords = {Selected, Student, Security, A-Paper, Ranking-ImpactFactor, AuswahlPeace, Projekt-ATHENE-SecUrban, Projekt-AgriRegio},
    pages = {1--15},
    }

  • Verena Zimmermann, Jasmin Haunschild, Marita Unden, Paul Gerber, Nina Gerber (2022)
    Sicherheitsherausforderungen für Smart City-Infrastrukturen
    Wirtschaftsinformatik & Management . doi:10.1365/s35764-022-00396-5
    [BibTeX] [Abstract] [Download PDF]

    Viele Städte entwickeln sich hin zu einer „Smart City“. Der Trend birgt einerseits vielfältige Potenziale für Effizienz, Nachhaltigkeit und Sicherheit. Auf der anderen Seite ergeben sich neue Herausforderungen für den Schutz städtischer Infrastrukturen und der darin befindlichen Daten vor Ausfällen und (Cyber‑)Angriffen, die in ihrer Komplexität bisher nur wenig untersucht sind.

    @article{zimmermann_sicherheitsherausforderungen_2022,
    title = {Sicherheitsherausforderungen für {Smart} {City}-{Infrastrukturen}},
    url = {https://link.springer.com/content/pdf/10.1365/s35764-022-00396-5.pdf},
    doi = {10.1365/s35764-022-00396-5},
    abstract = {Viele Städte entwickeln sich hin zu einer „Smart City“. Der Trend birgt einerseits vielfältige Potenziale für Effizienz, Nachhaltigkeit und Sicherheit. Auf der anderen Seite ergeben sich neue Herausforderungen für den Schutz städtischer Infrastrukturen und der darin befindlichen Daten vor Ausfällen und (Cyber‑)Angriffen, die in ihrer Komplexität bisher nur wenig untersucht sind.},
    journal = {Wirtschaftsinformatik \& Management},
    author = {Zimmermann, Verena and Haunschild, Jasmin and Unden, Marita and Gerber, Paul and Gerber, Nina},
    year = {2022},
    keywords = {UsableSec, Security, Projekt-ATHENE-SecUrban},
    }

    2021

  • Christian Reuter (2021)
    Sicherheitskritische Mensch-Computer-Interaktion: Interaktive Technologien und Soziale Medien im Krisen- und Sicherheitsmanagement (Zweite Auflage)
    2 ed. Wiesbaden: Springer Vieweg.
    [BibTeX] [Abstract] [Download PDF]

    Die zweite, aktualisierte Auflage dieses Lehr- und Fachbuchs gibt eine fundierte und praxisbezogene Einführung sowie einen Überblick über Grundlagen, Methoden und Anwendungen der Mensch-Computer-Interaktion im Kontext von Sicherheit, Notfällen, Krisen, Katastrophen, Krieg und Frieden. Dies adressierend werden interaktive, mobile, ubiquitäre und kooperative Technologien sowie soziale Medien vorgestellt. Hierbei finden klassische Themen wie benutzbare (IT-)Sicherheit, Industrie 4.0, Katastrophenschutz, Medizin und Automobil, aber auch Augmented Reality, Crowdsourcing, Shitstorm Management, Social Media Analytics und Cyberwar ihren Platz. Methodisch wird das Spektrum von Usable Safety bis Usable Security Engineering von Analyse über Design bis Evaluation abgedeckt. Das Buch eignet sich ebenso als Lehrbuch für Studierende wie als Handbuch für Wissenschaftler, Designer, Entwickler und Anwender.

    @book{reuter_sicherheitskritische_2021,
    address = {Wiesbaden},
    edition = {2},
    title = {Sicherheitskritische {Mensch}-{Computer}-{Interaktion}: {Interaktive} {Technologien} und {Soziale} {Medien} im {Krisen}- und {Sicherheitsmanagement} ({Zweite} {Auflage})},
    isbn = {978-3-658-32795-8},
    url = {https://www.springer.com/de/book/9783658327941},
    abstract = {Die zweite, aktualisierte Auflage dieses Lehr- und Fachbuchs gibt eine fundierte und praxisbezogene Einführung sowie einen Überblick über Grundlagen, Methoden und Anwendungen der Mensch-Computer-Interaktion im Kontext von Sicherheit, Notfällen, Krisen, Katastrophen, Krieg und Frieden. Dies adressierend werden interaktive, mobile, ubiquitäre und kooperative Technologien sowie soziale Medien vorgestellt. Hierbei finden klassische Themen wie benutzbare (IT-)Sicherheit, Industrie 4.0, Katastrophenschutz, Medizin und Automobil, aber auch Augmented Reality, Crowdsourcing, Shitstorm Management, Social Media Analytics und Cyberwar ihren Platz. Methodisch wird das Spektrum von Usable Safety bis Usable Security Engineering von Analyse über Design bis Evaluation abgedeckt. Das Buch eignet sich ebenso als Lehrbuch für Studierende wie als Handbuch für Wissenschaftler, Designer, Entwickler und Anwender.},
    publisher = {Springer Vieweg},
    author = {Reuter, Christian},
    year = {2021},
    keywords = {AuswahlCrisis, HCI, Selected, SocialMedia, UsableSec, Security, Projekt-KontiKat, Peace, Infrastructure, Projekt-ATHENE-SecUrban, Projekt-CYWARN, Projekt-emergenCITY},
    }

  • Jasmin Haunschild, Kilian Demuth, Henri-Jacques Geiß, Christian Richter, Christian Reuter (2021)
    Nutzer, Sammler, Entscheidungsträger? Arten der Bürgerbeteiligung in Smart Cities
    HMD Praxis der Wirtschaftsinformatik ;58. doi:10.1365/s40702-021-00770-8
    [BibTeX] [Abstract] [Download PDF]

    Digitalisierung ist ein präsenter Faktor in vielen Städten. So existieren bereits viele Smart-City-Initiativen, bei denen Städte versuchen, ihre Prozesse durch Erfassung und Verknüpfung von Daten, oft unter Zuhilfenahme von Datenplattformen, zu optimieren. In Anbetracht der damit einhergehenden großen Investitionen und Veränderungen wird Bürgerbeteiligung als zentraler Faktor für den Erfolg solcher Initiativen betrachtet. Bisher ist allerdings nicht klar, was typische Beteiligungsformate von Smart-City-Initiativen sind und welche Rolle(n) BürgerInnen dabei einnehmen. Dieser Beitrag leitet mittels einer Literaturanalyse zu Smart Cities ein Kategorienschema zu typischen Bürgerbeteiligungsarten ab. Die Analyse ergab, dass sich Einbindung von BürgerInnen in politische Entscheidungen und bei der Entwicklung technischer Artefakte maßgeblich auf e‑Government oder Participatory Design bezieht. Im Hinblick auf die Beteiligungsarten zeigt sich, dass Makrofabriken, Living Labs und Open-Data-Plattformen häufige Ansätze sind, um BürgerInnen als Co-Creators einzubinden. Zudem werden BürgerInnen mit Citizen Sensing zur Erfassung von Daten oder Missständen einbezogen. Dabei zeigen sich sowohl aktivere, als auch eher passive Beteiligungsarten. Die Analyse zeigt, dass die Einbindung von BürgerInnen häufig entweder auf eine Beteiligung an politischen Entscheidungen oder an der Entwicklung technischer Artefakte abzielt. Auch wenn keine klare Abgrenzung möglich ist, sind diese Ansätze dann eher durch e‑Government oder Participatory Design inspiriert.

    @article{haunschild_nutzer_2021,
    title = {Nutzer, {Sammler}, {Entscheidungsträger}? {Arten} der {Bürgerbeteiligung} in {Smart} {Cities}},
    volume = {58},
    url = {https://peasec.de/paper/2021/2021_HaunschildDemuthGeissRichterReuter_NutzerSammlerEntscheidungstragerBuergerbeteiligungSmartCities_HMD.pdf},
    doi = {10.1365/s40702-021-00770-8},
    abstract = {Digitalisierung ist ein präsenter Faktor in vielen Städten. So existieren bereits viele Smart-City-Initiativen, bei denen Städte versuchen, ihre Prozesse durch Erfassung und Verknüpfung von Daten, oft unter Zuhilfenahme von Datenplattformen, zu optimieren. In Anbetracht der damit einhergehenden großen Investitionen und Veränderungen wird Bürgerbeteiligung als zentraler Faktor für den Erfolg solcher Initiativen betrachtet. Bisher ist allerdings nicht klar, was typische Beteiligungsformate von Smart-City-Initiativen sind und welche Rolle(n) BürgerInnen dabei einnehmen. Dieser Beitrag leitet mittels einer Literaturanalyse zu Smart Cities ein Kategorienschema zu typischen Bürgerbeteiligungsarten ab. Die Analyse ergab, dass sich Einbindung von BürgerInnen in politische Entscheidungen und bei der Entwicklung technischer Artefakte maßgeblich auf e‑Government oder Participatory Design bezieht. Im Hinblick auf die Beteiligungsarten zeigt sich, dass Makrofabriken, Living Labs und Open-Data-Plattformen häufige Ansätze sind, um BürgerInnen als Co-Creators einzubinden. Zudem werden BürgerInnen mit Citizen Sensing zur Erfassung von Daten oder Missständen einbezogen. Dabei zeigen sich sowohl aktivere, als auch eher passive Beteiligungsarten. Die Analyse zeigt, dass die Einbindung von BürgerInnen häufig entweder auf eine Beteiligung an politischen Entscheidungen oder an der Entwicklung technischer Artefakte abzielt. Auch wenn keine klare Abgrenzung möglich ist, sind diese Ansätze dann eher durch e‑Government oder Participatory Design inspiriert.},
    journal = {HMD Praxis der Wirtschaftsinformatik},
    author = {Haunschild, Jasmin and Demuth, Kilian and Geiß, Henri-Jacques and Richter, Christian and Reuter, Christian},
    year = {2021},
    keywords = {HCI, Student, Projekt-ATHENE-SecUrban, Projekt-emergenCITY},
    }

  • Katrin Hartwig, Atlas Englisch, Jan Pelle Thomson, Christian Reuter (2021)
    Finding Secret Treasure? Improving Memorized Secrets Through Gamification
    European Symposium on Usable Security (EuroUSEC) Karlsruhe, Germany. doi:10.1145/3481357.3481509
    [BibTeX] [Abstract] [Download PDF]

    Users tend to bypass systems that are designed to increase their personal security and privacy while limiting their perceived freedom. Nudges present a possible solution to this problem, offering security benefits without taking away perceived freedom. We have identified a lack of research comparing concrete implementations of nudging concepts in an emulated real-world scenario to assess their relative value as a nudge. Comparing multiple nudging implementations in an emulated real-world scenario including a novel avatar nudge with gamification elements, this publication discusses the advantages of nudging for stronger user-created passwords regarding efficacy, usability, and memorability.We investigated the effect of gamification in nudges, performing two studies (𝑁1 = 16, 𝑁2 = 1, 000) to refine and evaluate implementations of current and novel nudging concepts. Our research found a gamified nudge, which integrates a personalizable avatar guide into the registration process, to perform less effectively than state-of-the-art nudges, independently of participants’ gaming frequency.

    @inproceedings{hartwig_finding_2021,
    address = {Karlsruhe, Germany},
    title = {Finding {Secret} {Treasure}? {Improving} {Memorized} {Secrets} {Through} {Gamification}},
    url = {https://peasec.de/paper/2021/2021_HartwigEnglischThomsonReuter_MemorizedSecretsThroughGamification_EuroUSEC.pdf},
    doi = {10.1145/3481357.3481509},
    abstract = {Users tend to bypass systems that are designed to increase their personal security and privacy while limiting their perceived freedom.
    Nudges present a possible solution to this problem, offering security benefits without taking away perceived freedom. We have
    identified a lack of research comparing concrete implementations of nudging concepts in an emulated real-world scenario to assess their
    relative value as a nudge. Comparing multiple nudging implementations in an emulated real-world scenario including a novel avatar
    nudge with gamification elements, this publication discusses the advantages of nudging for stronger user-created passwords regarding
    efficacy, usability, and memorability.We investigated the effect of gamification in nudges, performing two studies (𝑁1 = 16, 𝑁2 = 1, 000)
    to refine and evaluate implementations of current and novel nudging concepts. Our research found a gamified nudge, which integrates
    a personalizable avatar guide into the registration process, to perform less effectively than state-of-the-art nudges, independently of
    participants’ gaming frequency.},
    booktitle = {European {Symposium} on {Usable} {Security} ({EuroUSEC})},
    publisher = {ACM},
    author = {Hartwig, Katrin and Englisch, Atlas and Thomson, Jan Pelle and Reuter, Christian},
    year = {2021},
    keywords = {Student, UsableSec, Security, Projekt-CROSSING, Projekt-ATHENE-SecUrban},
    pages = {105--117},
    }

  • Katrin Hartwig, Christian Reuter (2021)
    Nudge or Restraint: How do People Assess Nudging in Cybersecurity – A Representative Study in Germany
    European Symposium on Usable Security (EuroUSEC) Karlsruhe, Germany. doi:10.1145/3481357.3481514
    [BibTeX] [Abstract] [Download PDF]

    While nudging is a long-established instrument in many contexts, it has more recently emerged to be relevant in cybersecurity as well. For instance, existing research suggests nudges for stronger passwords or safe WiFi connections. However, those nudges are often not as effective as desired. To improve their effectiveness, it is crucial to understand how people assess nudges in cybersecurity, to address potential fears and resulting reactance and to facilitate voluntary compliance. In other contexts, such as the health sector, studies have already thoroughly explored the attitude towards nudging. To address that matter in cybersecurity, we conducted a representative study in Germany (𝑁 = 1, 012), asking people about their attitude towards nudging in that specific context. Our findings reveal that 64\% rated nudging in cybersecurity as helpful, however several participants expected risks such as intentional misguidance, manipulation and data exposure as well.

    @inproceedings{hartwig_nudge_2021,
    address = {Karlsruhe, Germany},
    title = {Nudge or {Restraint}: {How} do {People} {Assess} {Nudging} in {Cybersecurity} - {A} {Representative} {Study} in {Germany}},
    url = {https://peasec.de/paper/2021/2021_HartwigReuter_NudgingCybersecurityRepresentativeStudy_EuroUSEC.pdf},
    doi = {10.1145/3481357.3481514},
    abstract = {While nudging is a long-established instrument in many contexts, it has more recently emerged to be relevant in cybersecurity as well. For instance, existing research suggests nudges for stronger passwords or safe WiFi connections. However, those nudges are often not as effective as desired. To improve their effectiveness, it is crucial to understand how people assess nudges in cybersecurity, to address potential fears and resulting reactance and to facilitate voluntary compliance. In other contexts, such as the health sector, studies have already thoroughly explored the attitude towards nudging. To address that matter in cybersecurity, we conducted a representative study in Germany (𝑁 = 1, 012), asking people about their attitude towards nudging in that specific context. Our findings reveal that 64\% rated nudging in cybersecurity as helpful, however several participants expected risks such as intentional misguidance, manipulation and data exposure as well.},
    booktitle = {European {Symposium} on {Usable} {Security} ({EuroUSEC})},
    publisher = {ACM},
    author = {Hartwig, Katrin and Reuter, Christian},
    year = {2021},
    keywords = {UsableSec, Security, Projekt-CROSSING, Projekt-ATHENE-SecUrban},
    pages = {141--150},
    }

  • Thea Riebe, Tristan Wirth, Markus Bayer, Philipp Kuehn, Marc-André Kaufhold, Volker Knauthe, Stefan Guthe, Christian Reuter (2021)
    CySecAlert: An Alert Generation System for Cyber Security Events Using Open Source Intelligence Data
    Information and Communications Security (ICICS) . doi:10.1007/978-3-030-86890-1_24
    [BibTeX] [Abstract] [Download PDF]

    Receiving relevant information on possible cyber threats, attacks, and data breaches in a timely manner is crucial for early response. The social media platform Twitter hosts an active cyber security community. Their activities are often monitored manually by security experts, such as Computer Emergency Response Teams (CERTs). We thus propose a Twitter-based alert generation system that issues alerts to a system operator as soon as new relevant cyber security related topics emerge. Thereby, our system allows us to monitor user accounts with significantly less workload. Our system applies a supervised classifier, based on active learning, that detects tweets containing relevant information. The results indicate that uncertainty sampling can reduce the amount of manual relevance classification effort and enhance the classifier performance substantially compared to random sampling. Our approach reduces the number of accounts and tweets that are needed for the classifier training, thus making the tool easily and rapidly adaptable to the specific context while also supporting data minimization for Open Source Intelligence (OSINT). Relevant tweets are clustered by a greedy stream clustering algorithm in order to identify significant events. The proposed system is able to work near real-time within the required 15-minutes time frame and detects up to 93.8\% of relevant events with a false alert rate of 14.81\%.

    @inproceedings{riebe_cysecalert_2021,
    title = {{CySecAlert}: {An} {Alert} {Generation} {System} for {Cyber} {Security} {Events} {Using} {Open} {Source} {Intelligence} {Data}},
    url = {https://peasec.de/paper/2021/2021_RiebeWirthBayerKuehnKaufholdKnautheGutheReuter_CySecAlertOpenSourceIntelligence_ICICS.pdf},
    doi = {10.1007/978-3-030-86890-1_24},
    abstract = {Receiving relevant information on possible cyber threats, attacks, and data breaches in a timely manner is crucial for early response. The social media platform Twitter hosts an active cyber security community. Their activities are often monitored manually by security experts, such as Computer Emergency Response Teams (CERTs). We thus propose a Twitter-based alert generation system that issues alerts to a system operator as soon as new relevant cyber security related topics emerge. Thereby, our system allows us to monitor user accounts with significantly less workload. Our system applies a supervised classifier, based on active learning, that detects tweets containing relevant information. The results indicate that uncertainty sampling can reduce the amount of manual relevance classification effort and enhance the classifier performance substantially compared to random sampling. Our approach reduces the number of accounts and tweets that are needed for the classifier training, thus making the tool easily and rapidly adaptable to the specific context while also supporting data minimization for Open Source Intelligence (OSINT). Relevant tweets are clustered by a greedy stream clustering algorithm in order to identify significant events. The proposed system is able to work near real-time within the required 15-minutes time frame and detects up to 93.8\% of relevant events with a false alert rate of 14.81\%.},
    booktitle = {Information and {Communications} {Security} ({ICICS})},
    author = {Riebe, Thea and Wirth, Tristan and Bayer, Markus and Kuehn, Philipp and Kaufhold, Marc-André and Knauthe, Volker and Guthe, Stefan and Reuter, Christian},
    year = {2021},
    keywords = {Student, UsableSec, Security, Ranking-CORE-B, Projekt-ATHENE-SecUrban, Projekt-CYWARN},
    pages = {429--446},
    }

  • Thea Riebe, Marc-André Kaufhold, Christian Reuter (2021)
    The Impact of Organizational Structure and Technology Use on Collaborative Practices in Computer Emergency Response Teams: An Empirical Study
    Proceedings of the ACM: Human Computer Interaction (PACM): Computer-Supported Cooperative Work and Social Computing ;5(CSCW2). doi:10.1145/3479865
    [BibTeX] [Abstract] [Download PDF]

    Besides the merits of increasing digitization and interconnectedness in private and professional spaces, critical infrastructures and societies are more and more exposed to cyberattacks. In order to enhance the preventative and reactive capabilities against cyberattacks, Computer Emergency Response Teams (CERTs) are deployed in many countries and organizations. In Germany, CERTs in the public sector operate on federal and state level to provide information security services for authorities, citizens, and enterprises. Their tasks of monitoring, analyzing, and communicating threats and incidents is getting more complex due to the increasing amount of information disseminated into public channels. By adopting the perspectives of Computer-Supported Cooperative Work (CSCW) and Crisis Informatics, we contribute to the study of organizational structures, technology use, and the impact on collaborative practices in and between state CERTs with empirical research based on expert interviews with representatives of German state CERTs (N=15) and supplementary document analyses (N=25). We derive design and policy implications from our findings, including the need for interoperable and modular architecture, a shift towards service level agreements, cross-platform monitoring and analysis of incident data, use of deduplication techniques and standardized threat exchange formats, a reduction of resource costs through process automation, and transparent reporting and tool structures for information exchange.

    @article{riebe_impact_2021,
    title = {The {Impact} of {Organizational} {Structure} and {Technology} {Use} on {Collaborative} {Practices} in {Computer} {Emergency} {Response} {Teams}: {An} {Empirical} {Study}},
    volume = {5},
    url = {https://www.peasec.de/paper/2021/2021_RiebeKaufholdReuter_ComputerEmegencyResponseTeams_CSCW.pdf},
    doi = {10.1145/3479865},
    abstract = {Besides the merits of increasing digitization and interconnectedness in private and professional spaces, critical infrastructures and societies are more and more exposed to cyberattacks. In order to enhance the preventative and reactive capabilities against cyberattacks, Computer Emergency Response Teams (CERTs) are deployed in many countries and organizations. In Germany, CERTs in the public sector operate on federal and state level to provide information security services for authorities, citizens, and enterprises. Their tasks of monitoring, analyzing, and communicating threats and incidents is getting more complex due to the increasing amount of information disseminated into public channels. By adopting the perspectives of Computer-Supported Cooperative Work (CSCW) and Crisis Informatics, we contribute to the study of organizational structures, technology use, and the impact on collaborative practices in and between state CERTs with empirical research based on expert interviews with representatives of German state CERTs (N=15) and supplementary document analyses (N=25). We derive design and policy implications from our findings, including the need for interoperable and modular architecture, a shift towards service level agreements, cross-platform monitoring and analysis of incident data, use of deduplication techniques and standardized threat exchange formats, a reduction of resource costs through process automation, and transparent reporting and tool structures for information exchange.},
    number = {CSCW2},
    journal = {Proceedings of the ACM: Human Computer Interaction (PACM): Computer-Supported Cooperative Work and Social Computing},
    author = {Riebe, Thea and Kaufhold, Marc-André and Reuter, Christian},
    year = {2021},
    keywords = {Crisis, UsableSec, Security, A-Paper, Ranking-CORE-A, Projekt-KontiKat, Projekt-ATHENE-SecUrban, Projekt-CYWARN, AuswahlUsableSec, AuswahlKaufhold},
    }

  • Marc-André Kaufhold (2021)
    Information Refinement Technologies for Crisis Informatics: User Expectations and Design Principles for Social Media and Mobile Apps
    Wiesbaden, Germany: Springer Vieweg. doi:10.1007/978-3-658-33341-6
    [BibTeX] [Abstract] [Download PDF]

    Marc-André Kaufhold explores user expectations and design implications for the utilization of new media in crisis management and response. He develops a novel framework for information refinement, which integrates the event, organisational, societal, and technological perspectives of crises. Therefore, he reviews the state of the art on crisis informatics and empirically examines the use, potentials and barriers of both social media and mobile apps. Based on these insights, he designs and evaluates ICT concepts and artifacts with the aim to overcome the issues of information overload and quality in large-scale crises, concluding with practical and theoretical implications for technology adaptation and design.

    @book{kaufhold_information_2021,
    address = {Wiesbaden, Germany},
    title = {Information {Refinement} {Technologies} for {Crisis} {Informatics}: {User} {Expectations} and {Design} {Principles} for {Social} {Media} and {Mobile} {Apps}},
    isbn = {978-3-658-33343-0},
    url = {https://www.springer.com/gp/book/9783658333430},
    abstract = {Marc-André Kaufhold explores user expectations and design implications for the utilization of new media in crisis management and response. He develops a novel framework for information refinement, which integrates the event, organisational, societal, and technological perspectives of crises. Therefore, he reviews the state of the art on crisis informatics and empirically examines the use, potentials and barriers of both social media and mobile apps. Based on these insights, he designs and evaluates ICT concepts and artifacts with the aim to overcome the issues of information overload and quality in large-scale crises, concluding with practical and theoretical implications for technology adaptation and design.},
    publisher = {Springer Vieweg},
    author = {Kaufhold, Marc-André},
    year = {2021},
    doi = {10.1007/978-3-658-33341-6},
    keywords = {Crisis, Projekt-KontiKat, Projekt-ATHENE-SecUrban, Projekt-CYWARN, AuswahlKaufhold, Dissertation},
    }

  • Jasmin Haunschild, Christian Reuter (2021)
    Bridging from Crisis to Everyday Life – An Analysis of User Reviews of the Warning App NINA and the COVID-19 Information Apps CoroBuddy and DarfIchDas
    CSCW ’21 Companion: Conference Companion Publication of the 2021 on Computer Supported Cooperative Work and Social Computing Virtual Event, USA. doi:10.1145/3462204.3481745
    [BibTeX] [Abstract] [Download PDF]

    During a dynamic and protracted crisis such as the COVID-19 pandemic, citizens are continuously challenged with making decisionsunder uncertainty. In addition to evaluating the risk of their behav-iors to themselves and others, citizens also have to consider themost current regulation, which often varies federally and locallyand by incidence numbers. Few tools help to stay informed aboutthe current rules. The state-run German multi-hazard warningapp NINA incorporated a feature for COVID-19, while two apps,DarfIchDas and CoroBuddy, focus only on COVID-19 regulationand are privately run. To investigate users’ expectations, perceivedadvantages, and gaps as well as the developers’ challenges, we analyze recent app store reviews of the apps and developers’ replies.We show that the warning app and the COVID-19 regulation appsare evaluated on different terms, that the correctness and portrayalof complex rules are the main challenges and that developers andeditors are underusing users’ potential for crowdsourcing.

    @inproceedings{haunschild_bridging_2021,
    address = {Virtual Event, USA},
    title = {Bridging from {Crisis} to {Everyday} {Life} – {An} {Analysis} of {User} {Reviews} of the {Warning} {App} {NINA} and the {COVID}-19 {Information} {Apps} {CoroBuddy} and {DarfIchDas}},
    url = {https://peasec.de/paper/2021/2021_HaunschildReuter_UserReviewsWarningCovidApps_CSCWComp.pdf},
    doi = {10.1145/3462204.3481745},
    abstract = {During a dynamic and protracted crisis such as the COVID-19 pandemic, citizens are continuously challenged with making decisionsunder uncertainty. In addition to evaluating the risk of their behav-iors to themselves and others, citizens also have to consider themost current regulation, which often varies federally and locallyand by incidence numbers. Few tools help to stay informed aboutthe current rules. The state-run German multi-hazard warningapp NINA incorporated a feature for COVID-19, while two apps,DarfIchDas and CoroBuddy, focus only on COVID-19 regulationand are privately run. To investigate users’ expectations, perceivedadvantages, and gaps as well as the developers’ challenges, we analyze recent app store reviews of the apps and developers’ replies.We show that the warning app and the COVID-19 regulation appsare evaluated on different terms, that the correctness and portrayalof complex rules are the main challenges and that developers andeditors are underusing users’ potential for crowdsourcing.},
    booktitle = {{CSCW} '21 {Companion}: {Conference} {Companion} {Publication} of the 2021 on {Computer} {Supported} {Cooperative} {Work} and {Social} {Computing}},
    publisher = {ACM},
    author = {Haunschild, Jasmin and Reuter, Christian},
    year = {2021},
    keywords = {Crisis, Projekt-ATHENE-SecUrban, Projekt-emergenCITY},
    pages = {72--78},
    }

  • Marc-André Kaufhold, Markus Bayer, Daniel Hartung, Christian Reuter (2021)
    Design and Evaluation of Deep Learning Models for Real-Time Credibility Assessment in Twitter
    30th International Conference on Artificial Neural Networks (ICANN2021) Bratislava. doi:https://doi.org/10.1007/978-3-030-86383-8_32
    [BibTeX] [Abstract] [Download PDF]

    Social media have an enormous impact on modern life but are prone to the dissemination of false information. In several domains, such as crisis management or political communication, it is of utmost importance to detect false and to promote credible information. Although educational measures might help individuals to detect false information, the sheer volume of social big data, which sometimes need to be anal- ysed under time-critical constraints, calls for automated and (near) real- time assessment methods. Hence, this paper reviews existing approaches before designing and evaluating three deep learning models (MLP, RNN, BERT) for real-time credibility assessment using the example of Twitter posts. While our BERT implementation achieved best results with an accuracy of up to 87.07\% and an F1 score of 0.8764 when using meta- data, text, and user features, MLP and RNN showed lower classification quality but better performance for real-time application. Furthermore, the paper contributes with a novel dataset for credibility assessment.

    @inproceedings{kaufhold_design_2021,
    address = {Bratislava},
    title = {Design and {Evaluation} of {Deep} {Learning} {Models} for {Real}-{Time} {Credibility} {Assessment} in {Twitter}},
    url = {https://peasec.de/paper/2021/2021_KaufholdBayerHartungReuter_DeepLearningCredibilityAssessmentTwitter_ICANN.pdf},
    doi = {https://doi.org/10.1007/978-3-030-86383-8_32},
    abstract = {Social media have an enormous impact on modern life but are prone to the dissemination of false information. In several domains, such as crisis management or political communication, it is of utmost importance to detect false and to promote credible information. Although educational measures might help individuals to detect false information, the sheer volume of social big data, which sometimes need to be anal- ysed under time-critical constraints, calls for automated and (near) real- time assessment methods. Hence, this paper reviews existing approaches before designing and evaluating three deep learning models (MLP, RNN, BERT) for real-time credibility assessment using the example of Twitter posts. While our BERT implementation achieved best results with an accuracy of up to 87.07\% and an F1 score of 0.8764 when using meta- data, text, and user features, MLP and RNN showed lower classification quality but better performance for real-time application. Furthermore, the paper contributes with a novel dataset for credibility assessment.},
    booktitle = {30th {International} {Conference} on {Artificial} {Neural} {Networks} ({ICANN2021})},
    author = {Kaufhold, Marc-André and Bayer, Markus and Hartung, Daniel and Reuter, Christian},
    year = {2021},
    keywords = {Student, Security, Ranking-CORE-B, Projekt-ATHENE-SecUrban, Projekt-CYWARN},
    pages = {1--13},
    }

  • Jasmin Haunschild, Christian Reuter (2021)
    Perceptions of Police Technology Use and Attitudes Towards the Police – A Representative Survey of the German Population
    Mensch und Computer – Workshopband Bonn. doi:10.18420/muc2021-mci-ws08-255
    [BibTeX] [Abstract] [Download PDF]

    Many Germans perceive a brutalization of society, and state officials also report feeling under attack. At the same time, policing is criticised for becoming increasingly militarised and for having extended surveillance in the course of fighting terrorism. Advancements in HCI are used in the context of many of the issues that policing is facing. In this study, we conduct a representative survey of the German population to investigate personal experiences with and attitudes towards the police and information and communication technologies (ICT) used for policing. We find an overall positive image of the police and uncritical attitudes towards ICT used for general surveillance (body-worn cameras, video surveillance, face recognition) and slightly more critical attitudes towards personal surveillance (e.g. through communication data retention). The study indicates that perceptions differ according to experience of unfair treatment by the police, while other factors such as age and education have similar effects.

    @inproceedings{haunschild_perceptions_2021,
    address = {Bonn},
    title = {Perceptions of {Police} {Technology} {Use} and {Attitudes} {Towards} the {Police} - {A} {Representative} {Survey} of the {German} {Population}},
    volume = {Mensch und Computer 2021 - Workshopband},
    url = {http://www.peasec.de/paper/2021/2021_HaunschildReuter_PoliceTechnologyUseSurvey_MuC-WS.pdf},
    doi = {10.18420/muc2021-mci-ws08-255},
    abstract = {Many Germans perceive a brutalization of society, and state officials also report feeling under attack. At the same time, policing is criticised for becoming increasingly militarised and for having extended surveillance in the course of fighting terrorism. Advancements in HCI are used in the context of many of the issues that policing is facing. In this study, we conduct a representative survey of the German population to investigate personal experiences with and attitudes towards the police and information and communication technologies (ICT) used for policing. We find an overall positive image of the police and uncritical attitudes towards ICT used for general surveillance (body-worn cameras, video surveillance, face recognition) and slightly more critical attitudes towards personal surveillance (e.g. through communication data retention). The study indicates that perceptions differ according to experience of unfair treatment by the police, while other factors such as age and education have similar effects.},
    booktitle = {Mensch und {Computer} - {Workshopband}},
    publisher = {Gesellschaft für Informatik e. V.},
    author = {Haunschild, Jasmin and Reuter, Christian},
    year = {2021},
    keywords = {Security, Projekt-ATHENE-SecUrban, Projekt-CYWARN, Projekt-emergenCITY},
    }

  • Markus Bayer, Marc-André Kaufhold, Christian Reuter (2021)
    Information Overload in Crisis Management: Bilingual Evaluation of Embedding Models for Clustering Social Media Posts in Emergencies
    Proceedings of the European Conference on Information Systems (ECIS) .
    [BibTeX] [Abstract] [Download PDF]

    Past studies in the domains of information systems have analysed the potentials and barriers of social media in emergencies. While information disseminated in social media can lead to valuable insights, emergency services and researchers face the challenge of information overload as data quickly exceeds the manageable amount. We propose an embedding-based clustering approach and a method for the automated labelling of clusters. Given that the clustering quality is highly dependent on embeddings, we evaluate 19 embedding models with respect to time, internal cluster quality, and language invariance. The results show that it may be sensible to use embedding models that were already trained on other crisis datasets. However, one must ensure that the training data generalizes enough, so that the clustering can adapt to new situations. Confirming this, we found out that some embeddings were not able to perform as well on a German dataset as on an English dataset.

    @inproceedings{bayer_information_2021,
    title = {Information {Overload} in {Crisis} {Management}: {Bilingual} {Evaluation} of {Embedding} {Models} for {Clustering} {Social} {Media} {Posts} in {Emergencies}},
    url = {https://peasec.de/paper/2021/2021_BayerKaufholdReuter_InformationOverloadInCrisisManagementBilingualEvaluation_ECIS.pdf},
    abstract = {Past studies in the domains of information systems have analysed the potentials and barriers of social media in emergencies. While information disseminated in social media can lead to valuable insights, emergency services and researchers face the challenge of information overload as data quickly exceeds the manageable amount. We propose an embedding-based clustering approach and a method for the automated labelling of clusters. Given that the clustering quality is highly dependent on embeddings, we evaluate 19 embedding models with respect to time, internal cluster quality, and language invariance. The results show that it may be sensible to use embedding models that were already trained on other crisis datasets. However, one must ensure that the training data generalizes enough, so that the clustering can adapt to new situations. Confirming this, we found out that some embeddings were not able to perform as well on a German dataset as on an English dataset.},
    booktitle = {Proceedings of the {European} {Conference} on {Information} {Systems} ({ECIS})},
    author = {Bayer, Markus and Kaufhold, Marc-André and Reuter, Christian},
    year = {2021},
    keywords = {Crisis, SocialMedia, A-Paper, Ranking-CORE-A, Projekt-ATHENE-SecUrban, Projekt-CYWARN},
    pages = {1--18},
    }

  • Steffen Haesler, Ragnark Mogk, Florentin Putz, Kevin T. Logan, Nadja Thiessen, Katharina Kleinschnitger, Lars Baumgärtner, Jan-Philipp Stroscher, Christian Reuter, Michele Knodt, Matthias Hollick (2021)
    Connected Self-Organized Citizens in Crises: An Interdisciplinary Resilience Concept for Neighborhoods
    CSCW ’21 Companion: Conference Companion Publication of the 2021 on Computer Supported Cooperative Work and Social Computing Virtual Event, USA. doi:10.1145/3462204.3481749
    [BibTeX] [Abstract] [Download PDF]

    When facing major crisis events, such as earthquakes, flooding,or attacks on infrastructure, people start to organize within theirneighborhoods. While this has historically been an analog process,people now use collaboration or messenger apps to support theirself-organization. Unfortunately, these apps are not designed to beresilient and fail with communication infrastructure outages whenservers are no longer available. We provide a resilience conceptwith requirements derived from an interdisciplinary view enablingcitizens to communicate and collaborate in everyday life and duringcrisis events. Our human-centered prototype integrates conceptsof nudging for crisis preparedness, decentralized and secure com-munication, participation, smart resource management, historicalknowledge, and legal issues to help guide further research.

    @inproceedings{haesler_connected_2021,
    address = {Virtual Event, USA},
    title = {Connected {Self}-{Organized} {Citizens} in {Crises}: {An} {Interdisciplinary} {Resilience} {Concept} for {Neighborhoods}},
    url = {https://peasec.de/paper/2021/2021_Haesleretal_ConnectedSelfOrganizedCitizensinCrises_CSCWComp.pdf},
    doi = {10.1145/3462204.3481749},
    abstract = {When facing major crisis events, such as earthquakes, flooding,or attacks on infrastructure, people start to organize within theirneighborhoods. While this has historically been an analog process,people now use collaboration or messenger apps to support theirself-organization. Unfortunately, these apps are not designed to beresilient and fail with communication infrastructure outages whenservers are no longer available. We provide a resilience conceptwith requirements derived from an interdisciplinary view enablingcitizens to communicate and collaborate in everyday life and duringcrisis events. Our human-centered prototype integrates conceptsof nudging for crisis preparedness, decentralized and secure com-munication, participation, smart resource management, historicalknowledge, and legal issues to help guide further research.},
    booktitle = {{CSCW} '21 {Companion}: {Conference} {Companion} {Publication} of the 2021 on {Computer} {Supported} {Cooperative} {Work} and {Social} {Computing}},
    publisher = {ACM},
    author = {Haesler, Steffen and Mogk, Ragnark and Putz, Florentin and Logan, Kevin T. and Thiessen, Nadja and Kleinschnitger, Katharina and Baumgärtner, Lars and Stroscher, Jan-Philipp and Reuter, Christian and Knodt, Michele and Hollick, Matthias},
    year = {2021},
    keywords = {Crisis, Projekt-ATHENE-SecUrban, Projekt-emergenCITY},
    }

  • Steffen Haesler, Stefka Schmid, Annemike Sophia Vierneisel, Christian Reuter (2021)
    Stronger Together: How Neighborhood Groups Build up a Virtual Network during the COVID-19 Pandemic
    Proceedings of the ACM: Human Computer Interaction (PACM): Computer-Supported Cooperative Work and Social Computing ;5(CSCW2).
    [BibTeX] [Abstract] [Download PDF]

    During crises such as the COVID-19 pandemic, people spontaneously initiate support groups, while establishedorganizations like soccer clubs set non-regular goals, both offering help. Interested in the coordination of suchhelp and potential challenges of collaboration, we conducted a virtual ethnography of a multi-level networklocated in Germany. We focused on aims, activities, and technological mediation, with Activity Theory astheoretical framework. Our findings show that the organizational aim of coordinating help was successfullyachieved by connecting heterogeneous actors through digitization and institutionalization. Enabled by thecontext of the COVID-19 pandemic crisis, the network acted virtually, but was also able to integrate analogspaces of help. We identified six crucial implications regarding the use of technology and collaboration forbuilding a successful volunteering network.

    @article{haesler_stronger_2021,
    title = {Stronger {Together}: {How} {Neighborhood} {Groups} {Build} up a {Virtual} {Network} during the {COVID}-19 {Pandemic}},
    volume = {5},
    url = {https://peasec.de/paper/2021/2021_HaeslerSchmidVierneiselReuter_StrongerTogetherVirtualNetworkCOVID19_CSCW.pdf},
    abstract = {During crises such as the COVID-19 pandemic, people spontaneously initiate support groups, while establishedorganizations like soccer clubs set non-regular goals, both offering help. Interested in the coordination of suchhelp and potential challenges of collaboration, we conducted a virtual ethnography of a multi-level networklocated in Germany. We focused on aims, activities, and technological mediation, with Activity Theory astheoretical framework. Our findings show that the organizational aim of coordinating help was successfullyachieved by connecting heterogeneous actors through digitization and institutionalization. Enabled by thecontext of the COVID-19 pandemic crisis, the network acted virtually, but was also able to integrate analogspaces of help. We identified six crucial implications regarding the use of technology and collaboration forbuilding a successful volunteering network.},
    number = {CSCW2},
    journal = {Proceedings of the ACM: Human Computer Interaction (PACM): Computer-Supported Cooperative Work and Social Computing},
    author = {Haesler, Steffen and Schmid, Stefka and Vierneisel, Annemike Sophia and Reuter, Christian},
    year = {2021},
    keywords = {AuswahlCrisis, Crisis, HCI, Selected, A-Paper, Ranking-CORE-A, Projekt-ATHENE-SecUrban, Projekt-emergenCITY},
    }

  • Thea Riebe, Stefka Schmid, Christian Reuter (2021)
    Measuring Spillover Effects from Defense to Civilian Sectors – A Quantitative Approach Using LinkedIn
    Defence and Peace Economics ;32(7):773–785. doi:10.1080/10242694.2020.1755787
    [BibTeX] [Abstract] [Download PDF]

    Spillover effects describe the process of a company benefiting from the R&D activities of another one and thereby gaining an economic advantage. One prominent approach for measuring spillover effects is based on the analysis of patent citation networks. Taking social media analytics and knowledge economics into account, this paper presents a complementary approach to quantify spillover effects from defense to civilian research and development, analyzing 513 employment biographies from the social network LinkedIn. Using descriptive network analysis, we investigate the emigration of personnel of the German defense industry to other civilian producers. Thereby, our study reveals that in the last decade, employees of defense suppliers have changed positions significantly less often, with 3.24 changes on average than professionals who have worked more than 50\% of their jobs in the civilian sector, having changed 4.61 times on average. Our work illustrates the churn behavior and how spillover effects between defense and civilian sectors can be measured using social career networks such as LinkedIn.

    @article{riebe_measuring_2021,
    title = {Measuring {Spillover} {Effects} from {Defense} to {Civilian} {Sectors} – {A} {Quantitative} {Approach} {Using} {LinkedIn}},
    volume = {32},
    url = {https://peasec.de/paper/2021/2021_RiebeSchmidReuter_SpilloverEffectsDefensetoCivilianLinkedIn_PDE.pdf},
    doi = {10.1080/10242694.2020.1755787},
    abstract = {Spillover effects describe the process of a company benefiting from the R\&D activities of another one and thereby gaining an economic advantage. One prominent approach for measuring spillover effects is based on the analysis of patent citation networks. Taking social media analytics and knowledge economics into account, this paper presents a complementary approach to quantify spillover effects from defense to civilian research and development, analyzing 513 employment biographies from the social network LinkedIn. Using descriptive network analysis, we investigate the emigration of personnel of the German defense industry to other civilian producers. Thereby, our study reveals that in the last decade, employees of defense suppliers have changed positions significantly less often, with 3.24 changes on average than professionals who have worked more than 50\% of their jobs in the civilian sector, having changed 4.61 times on average. Our work illustrates the churn behavior and how spillover effects between defense and civilian sectors can be measured using social career networks such as LinkedIn.},
    number = {7},
    journal = {Defence and Peace Economics},
    author = {Riebe, Thea and Schmid, Stefka and Reuter, Christian},
    year = {2021},
    keywords = {Selected, A-Paper, Ranking-ImpactFactor, Peace, Projekt-DualUse, AuswahlPeace, Cyberwar, Projekt-ATHENE-SecUrban},
    pages = {773--785},
    }

  • Philipp Kuehn, Markus Bayer, Marc Wendelborn, Christian Reuter (2021)
    OVANA: An Approach to Analyze and Improve the Information Quality of Vulnerability Databases
    Proceedings of the 16th International Conference on Availability, Reliability and Security (ARES 2021) . doi:10.1145/3465481.3465744
    [BibTeX] [Abstract] [Download PDF]

    Vulnerability databases are one of the main information sources for IT security experts. Hence, the quality of their information is of utmost importance for anyone working in this area. Previous work has shown that machine readable information is either missing, incorrect, or inconsistent with other data sources. In this paper, we introduce a system called Overt Vulnerability source ANAlysis (OVANA), utilizing state-of-the-art machine learning (ML) and natural-language processing (NLP) techniques, which analyzes the information quality (IQ) of vulnerability databases, searches the free-form description for relevant information missing from structured fields, and updates it accordingly. Our paper shows that OVANA is able to improve the IQ of the National Vulnerability Database by 51.23\% based on the indicators of accuracy, completeness, and uniqueness. Moreover, we present information which should be incorporated into the structured fields to increase the uniqueness of vulnerability entries and improve the discriminability of different vulnerability entries. The identified information from OVANA enables a more targeted vulnerability search and provides guidance for IT security experts in finding relevant information in vulnerability descriptions for severity assessment.

    @inproceedings{kuehn_ovana_2021,
    title = {{OVANA}: {An} {Approach} to {Analyze} and {Improve} the {Information} {Quality} of {Vulnerability} {Databases}},
    isbn = {978-1-4503-9051-4},
    url = {https://peasec.de/paper/2021/2021_KuehnBayerWendelbornReuter_OVANAQualityVulnerabilityDatabases_ARES.pdf},
    doi = {10.1145/3465481.3465744},
    abstract = {Vulnerability databases are one of the main information sources for IT security experts. Hence, the quality of their information is of utmost importance for anyone working in this area. Previous work has shown that machine readable information is either missing, incorrect, or inconsistent with other data sources. In this paper, we introduce a system called Overt Vulnerability source ANAlysis (OVANA), utilizing state-of-the-art machine learning (ML) and natural-language processing (NLP) techniques, which analyzes the information quality (IQ) of vulnerability databases, searches the free-form description for relevant information missing from structured fields, and updates it accordingly. Our paper shows that OVANA is able to improve the IQ of the National Vulnerability Database by 51.23\% based on the indicators of accuracy, completeness, and uniqueness. Moreover, we present information which should be incorporated into the structured fields to increase the uniqueness of vulnerability entries and improve the discriminability of different vulnerability entries. The identified information from OVANA enables a more targeted vulnerability search and provides guidance for IT security experts in finding relevant information in vulnerability descriptions for severity assessment.},
    booktitle = {Proceedings of the 16th {International} {Conference} on {Availability}, {Reliability} and {Security} ({ARES} 2021)},
    publisher = {ACM},
    author = {Kuehn, Philipp and Bayer, Markus and Wendelborn, Marc and Reuter, Christian},
    year = {2021},
    keywords = {Security, Peace, Ranking-CORE-B, AuswahlPeace, Projekt-ATHENE-SecUrban, Projekt-CYWARN},
    pages = {1--11},
    }

  • Jasmin Haunschild, Selina Pauli, Christian Reuter (2021)
    Citizens‘ Perceived Information Responsibilities and Information Challenges During the COVID-19 Pandemic
    GoodIT ’21: Proceedings of the Conference on Information Technology for Social Good . doi:10.1145/3462203.3475886
    [BibTeX] [Abstract] [Download PDF]

    In crises, citizens show changes in their information behavior, which is mediated by trust in sources, personal relations, online and offline news outlets and information and communication technologies such as apps and social media. Through a repeated one-week survey with closed and open questions of German citizens during the beginning of the COVID-19 pandemic, this study examines citizens‘ perceptions of information responsibilities, their satisfaction with the fulfillment of these responsibilities and their wishes for improving the information flow. The study shows that the dynamism of the crisis and the federally varying strategies burden citizens who perceive an obligation to stay informed, but view agencies as responsible for making information readily available. The study contributes a deeper understanding of citizens‘ needs in crises and discusses implications for design of communication tools for dynamic situations that reduce information overload while fulfilling citizens‘ desire to stay informed.

    @inproceedings{haunschild_citizens_2021,
    title = {Citizens' {Perceived} {Information} {Responsibilities} and {Information} {Challenges} {During} the {COVID}-19 {Pandemic}},
    url = {http://www.peasec.de/paper/2021/2021_HaunschildPauliReuter_InformationResponsibilitiesCovid19_GoodIT.pdf},
    doi = {10.1145/3462203.3475886},
    abstract = {In crises, citizens show changes in their information behavior, which is mediated by trust in sources, personal relations, online and offline news outlets and information and communication technologies such as apps and social media. Through a repeated one-week survey with closed and open questions of German citizens during the beginning of the COVID-19 pandemic, this study examines citizens' perceptions of information responsibilities, their satisfaction with the fulfillment of these responsibilities and their wishes for improving the information flow. The study shows that the dynamism of the crisis and the federally varying strategies burden citizens who perceive an obligation to stay informed, but view agencies as responsible for making information readily available. The study contributes a deeper understanding of citizens' needs in crises and discusses implications for design of communication tools for dynamic situations that reduce information overload while fulfilling citizens' desire to stay informed.},
    booktitle = {{GoodIT} '21: {Proceedings} of the {Conference} on {Information} {Technology} for {Social} {Good}},
    author = {Haunschild, Jasmin and Pauli, Selina and Reuter, Christian},
    year = {2021},
    keywords = {Crisis, Projekt-ATHENE-SecUrban, Projekt-emergenCITY},
    pages = {151--156},
    }

  • Rolf Egert, Nina Gerber, Jasmin Haunschild, Philipp Kuehn, Verena Zimmermann (2021)
    Towards Resilient Critical Infrastructures – Motivating Users to Contribute to Smart Grid Resilience
    i-com – Journal of Interactive Media ;20(2):161–175. doi:10.1515/icom-2021-0021
    [BibTeX] [Abstract] [Download PDF]

    Smart cities aim at improving efficiency while providing safety and security by merging conventional infrastructures with information and communication technology. One strategy for mitigating hazardous situations and improving the overall resilience of the system is to involve citizens. For instance, smart grids involve prosumers – capable of producing and consuming electricity – who can adjust their electricity profile dynamically (i.e., decrease or increase electricity consumption), or use their local production to supply electricity to the grid. This mitigates the impact of peak-consumption periods on the grid and makes it easier for operators to control the grid. This involvement of prosumers is accompanied by numerous socio-technical challenges, including motivating citizens to contribute by adjusting their electricity consumption to the requirements of the energy grid. Towards this end, this work investigates motivational strategies and tools, including nudging, persuasive technologies, and incentives, that can be leveraged to increase the motivation of citizens. We discuss long-term and side effects and ethical and privacy considerations, before portraying bug bounty programs, gamification and apps as technologies and strategies to communicate the motivational strategies to citizens.

    @article{egert_towards_2021,
    series = {i-com},
    title = {Towards {Resilient} {Critical} {Infrastructures} - {Motivating} {Users} to {Contribute} to {Smart} {Grid} {Resilience}},
    volume = {20},
    url = {https://www.degruyter.com/document/doi/10.1515/icom-2021-0021/html},
    doi = {10.1515/icom-2021-0021},
    abstract = {Smart cities aim at improving efficiency while providing safety and security by merging conventional infrastructures with information and communication technology. One strategy for mitigating hazardous situations and improving the overall resilience of the system is to involve citizens. For instance, smart grids involve prosumers - capable of producing and consuming electricity - who can adjust their electricity profile dynamically (i.e., decrease or increase electricity consumption), or use their local production to supply electricity to the grid. This mitigates the impact of peak-consumption periods on the grid and makes it easier for operators to control the grid. This involvement of prosumers is accompanied by numerous socio-technical challenges, including motivating citizens to contribute by adjusting their electricity consumption to the requirements of the energy grid. Towards this end, this work investigates motivational strategies and tools, including nudging, persuasive technologies, and incentives, that can be leveraged to increase the motivation of citizens. We discuss long-term and side effects and ethical and privacy considerations, before portraying bug bounty programs, gamification and apps as technologies and strategies to communicate the motivational strategies to citizens.},
    number = {2},
    journal = {i-com - Journal of Interactive Media},
    author = {Egert, Rolf and Gerber, Nina and Haunschild, Jasmin and Kuehn, Philipp and Zimmermann, Verena},
    year = {2021},
    keywords = {Security, Infrastructure, Projekt-ATHENE-SecUrban, Projekt-CYWARN, Projekt-emergenCITY},
    pages = {161--175},
    }

    2020

  • Thea Riebe, Jasmin Haunschild, Felix Divo, Matthias Lang, Gerbert Roitburd, Jonas Franken, Christian Reuter (2020)
    Die Veränderung der Vorratsdatenspeicherung in Europa
    Datenschutz und Datensicherheit – DuD ;44(5):316–321. doi:10.1007/s11623-020-1275-3
    [BibTeX] [Abstract] [Download PDF]

    Die Diskussion um die Vorratsdatenspeicherung ist europaweit weiterhin relevant, da es keine einheitliche Gesetzgebung der EU-Mitgliedsstaaten gibt. So werden in einigen EU-Staaten weiterhin Vorratsdaten gespeichert, obwohl der EuGH die Vorratsdatenspeicherung für teilweise rechtswidrig erklärt hat. Dabei unterscheiden sich die Speicherdauer, die erhobenen Daten und die Rechte der Behörden erheblich. Der Beitrag vergleicht den Umgang mit der Vorratsdatenspeicherung in zehn EU- und Schengen-Staaten im Hinblick auf Einführung und Aussetzung, Speicherdauer, Speicherinhalte und Zugriffsrechte.

    @article{riebe_veranderung_2020,
    title = {Die {Veränderung} der {Vorratsdatenspeicherung} in {Europa}},
    volume = {44},
    url = {https://www.peasec.de/paper/2020/2020_Riebeetal_VDSinEuropa_DuD.pdf},
    doi = {10.1007/s11623-020-1275-3},
    abstract = {Die Diskussion um die Vorratsdatenspeicherung ist europaweit weiterhin relevant, da es keine einheitliche Gesetzgebung der EU-Mitgliedsstaaten gibt. So werden in einigen EU-Staaten weiterhin Vorratsdaten gespeichert, obwohl der EuGH die Vorratsdatenspeicherung für teilweise rechtswidrig erklärt hat. Dabei unterscheiden sich die Speicherdauer, die erhobenen Daten und die Rechte der Behörden erheblich. Der Beitrag vergleicht den Umgang mit der Vorratsdatenspeicherung in zehn EU- und Schengen-Staaten im Hinblick auf Einführung und Aussetzung, Speicherdauer, Speicherinhalte und Zugriffsrechte.},
    number = {5},
    journal = {Datenschutz und Datensicherheit - DuD},
    author = {Riebe, Thea and Haunschild, Jasmin and Divo, Felix and Lang, Matthias and Roitburd, Gerbert and Franken, Jonas and Reuter, Christian},
    year = {2020},
    keywords = {Student, Security, Projekt-KontiKat, Peace, Projekt-DualUse, Projekt-ATHENE-SecUrban},
    pages = {316--321},
    }

  • Marc-André Kaufhold, Jasmin Haunschild, Christian Reuter (2020)
    Warning the Public: A Survey on Attitudes, Expectations and Use of Mobile Crisis Apps in Germany
    Proceedings of the European Conference on Information Systems (ECIS) .
    [BibTeX] [Abstract] [Download PDF]

    As part of information systems, the research field of crisis informatics increasingly investigates the potentials and limitations of mobile crisis apps, which constitute a relatively new public service for citizens and are specifically designed for the dissemination of disaster‐related information and communication between authorities, organizations and citizens. While existing crisis apps, such as KATWARN or NINA in Germany, focus on preparatory information and warning functionality, there is a need for apps and research on police-related functionality, such as information on cybercrime, fraud offences, or search for missing persons. Based on a workshop with civil protection (N=12) and police officers (N=15), we designed a questionnaire and conducted a representative survey of German citizens (N=1.219) on the past, current and future use, perceived helpfulness, deployment and behavioural preferences, configurability and most important functionality of mobile crisis apps. Our results indicate that in addition to emergency and weather warnings, crime- and health-related warnings are also desired by many, as is the possibility for bidirectional communication. People also want one central app and are resistant to installing more than one crisis app. Furthermore, there are few significant differences between socioeconomic groups.

    @inproceedings{kaufhold_warning_2020,
    title = {Warning the {Public}: {A} {Survey} on {Attitudes}, {Expectations} and {Use} of {Mobile} {Crisis} {Apps} in {Germany}},
    url = {http://www.peasec.de/paper/2020/2020_KaufholdHaunschildReuter_WarningthePublic_ECIS.pdf},
    abstract = {As part of information systems, the research field of crisis informatics increasingly investigates the potentials and limitations of mobile crisis apps, which constitute a relatively new public service for citizens and are specifically designed for the dissemination of disaster‐related information and communication between authorities, organizations and citizens. While existing crisis apps, such as KATWARN or NINA in Germany, focus on preparatory information and warning functionality, there is a need for apps and research on police-related functionality, such as information on cybercrime, fraud offences, or search for missing persons. Based on a workshop with civil protection (N=12) and police officers (N=15), we designed a questionnaire and conducted a representative survey of German citizens (N=1.219) on the past, current and future use, perceived helpfulness, deployment and behavioural preferences, configurability and most important functionality of mobile crisis apps. Our results indicate that in addition to emergency and weather warnings, crime- and health-related warnings are also desired by many, as is the possibility for bidirectional communication. People also want one central app and are resistant to installing more than one crisis app. Furthermore, there are few significant differences between socioeconomic groups.},
    booktitle = {Proceedings of the {European} {Conference} on {Information} {Systems} ({ECIS})},
    publisher = {AIS},
    author = {Kaufhold, Marc-André and Haunschild, Jasmin and Reuter, Christian},
    year = {2020},
    keywords = {Crisis, A-Paper, Ranking-VHB-B, Ranking-WKWI-A, Ranking-CORE-A, Projekt-ATHENE-SecUrban, Projekt-ATHENE-FANCY, Projekt-emergenCITY},
    }

  • Steffen Haesler, Stefka Schmid, Christian Reuter (2020)
    Crisis Volunteering Nerds: Three Months After COVID-19 Hackathon \#WirVsVirus
    MobileHCI ’20: 22nd International Conference on Human-Computer Interaction with Mobile Devices and Services . doi:10.1145/3406324.3424584
    [BibTeX] [Abstract] [Download PDF]

    The hackathon \#WirVsVirus in March 2020 was one of the biggest hackathons in history. Under the patronage of the federal government of Germany, 28,361 participants worked together in 1,498 projects, finding innovative apps and solutions against the COVID-19 pandemic. Three months after the event, we present an exemplifying analysis of the topics, used technologies and remaining activity of these projects. Shedding light on this instance of citizen science allows to highlight the potential of hackathons and startup culture regarding socio-technological resilience. At the same time, it may be understood as an impulse for crisis informatics to consider new forms of volunteering in the course of crisis management.

    @inproceedings{haesler_crisis_2020,
    title = {Crisis {Volunteering} {Nerds}: {Three} {Months} {After} {COVID}-19 {Hackathon} \#{WirVsVirus}},
    url = {https://dl.acm.org/doi/pdf/10.1145/3406324.3424584},
    doi = {10.1145/3406324.3424584},
    abstract = {The hackathon \#WirVsVirus in March 2020 was one of the biggest hackathons in history. Under the patronage of the federal government of Germany, 28,361 participants worked together in 1,498 projects, finding innovative apps and solutions against the COVID-19 pandemic. Three months after the event, we present an exemplifying analysis of the topics, used technologies and remaining activity of these projects. Shedding light on this instance of citizen science allows to highlight the potential of hackathons and startup culture regarding socio-technological resilience. At the same time, it may be understood as an impulse for crisis informatics to consider new forms of volunteering in the course of crisis management.},
    booktitle = {{MobileHCI} '20: 22nd {International} {Conference} on {Human}-{Computer} {Interaction} with {Mobile} {Devices} and {Services}},
    publisher = {ACM},
    author = {Haesler, Steffen and Schmid, Stefka and Reuter, Christian},
    year = {2020},
    keywords = {Crisis, HCI, Projekt-ATHENE-SecUrban, Projekt-emergenCITY},
    pages = {1--56},
    }

  • Christian Reuter, Marc-André Kaufhold, Tina Comes, Michèle Knodt, Max Mühlhäuser (2020)
    Mobile Resilience: Designing Mobile Interactive Systems for Societal and Technical Resilience
    MobileHCI ’20: 22nd International Conference on Human-Computer Interaction with Mobile Devices and Services . doi:10.1145/3406324.3424590
    [BibTeX] [Abstract] [Download PDF]

    Digitalization and interconnectedness, facilitated by the Internet of Things (IoT) and the widespread distribution of mobile devices, can be used to tackle important societal challenges. This is maybe most prominently visible in the response to the COVID-2019 Pandemic. However, the design of mobile technology, functionality and underlying infrastructures must be resilient against disruptions caused by man-made (e.g. bombings, hacking) and natural (e.g. earthquakes, hurricanes) crises, emergencies and threats. To explore challenges, designs and potentials of interactive technologies, this workshop investigates the overlapping space of mobile technologies and resilient systems, including future application domains such as smart cities.

    @inproceedings{reuter_mobile_2020,
    title = {Mobile {Resilience}: {Designing} {Mobile} {Interactive} {Systems} for {Societal} and {Technical} {Resilience}},
    url = {https://dl.acm.org/doi/pdf/10.1145/3406324.3424590},
    doi = {10.1145/3406324.3424590},
    abstract = {Digitalization and interconnectedness, facilitated by the Internet of Things (IoT) and the widespread distribution of mobile devices, can be used to tackle important societal challenges. This is maybe most prominently visible in the response to the COVID-2019 Pandemic. However, the design of mobile technology, functionality and underlying infrastructures must be resilient against disruptions caused by man-made (e.g. bombings, hacking) and natural (e.g. earthquakes, hurricanes) crises, emergencies and threats. To explore challenges, designs and potentials of interactive technologies, this workshop investigates the overlapping space of mobile technologies and resilient systems, including future application domains such as smart cities.},
    booktitle = {{MobileHCI} '20: 22nd {International} {Conference} on {Human}-{Computer} {Interaction} with {Mobile} {Devices} and {Services}},
    author = {Reuter, Christian and Kaufhold, Marc-André and Comes, Tina and Knodt, Michèle and Mühlhäuser, Max},
    year = {2020},
    keywords = {Crisis, HCI, SocialMedia, Ranking-CORE-B, Projekt-ATHENE-SecUrban, Projekt-CYWARN, Projekt-emergenCITY},
    pages = {1--3},
    }

  • Christian Reuter, Jasmin Haunschild, Matthias Hollick, Max Mühlhäuser, Joachim Vogt, Michael Kreutzer (2020)
    Towards Secure Urban Infrastructures: Cyber Security Challenges to Information and Communication Technology in Smart Cities
    Mensch und Computer – Workshopband Magdeburg. doi:10.18420/muc2020-ws117-408
    [BibTeX] [Abstract] [Download PDF]

    The growth of cities continues to be a global megatrend. As more and more people live in urban areas and urban services and infrastructures are under growing strain, technologies are increasingly being researched and used to make city life more efficient and comfortable. As a result, so-called “Smart Cities” have complex IT infrastructures and cyber-physical systems such as sensor/actuator networks for the general population and are developing worldwide. Urban infrastructure must be secured against attacks, ensuring reliable and resilient services for citizens as well as privacy and data security. This paper introduces selected challenges faced by infrastructure providers, citizens and decision-makers in handling attacks aimed at information and communication technologies (ICT) of urban infrastructures and presents current research avenues for tackling cyberattacks and for developing tools for creating, portraying and disseminating actiona-ble information as one important response to security challenges. It then presents findings from a representative survey conducted in Germany (N=1091) on the experiences and perceptions of citizens concerning the relevance of cyberat-tacks will be presented.

    @inproceedings{reuter_towards_2020,
    address = {Magdeburg},
    title = {Towards {Secure} {Urban} {Infrastructures}: {Cyber} {Security} {Challenges} to {Information} and {Communication} {Technology} in {Smart} {Cities}},
    url = {https://dl.gi.de/bitstream/handle/20.500.12116/33550/muc2020-ws-408.pdf},
    doi = {10.18420/muc2020-ws117-408},
    abstract = {The growth of cities continues to be a global megatrend. As more and more people live in urban areas and urban services and infrastructures are under growing strain, technologies are increasingly being researched and used to make city life more efficient and comfortable. As a result, so-called “Smart Cities” have complex IT infrastructures and cyber-physical systems such as sensor/actuator networks for the general population and are developing worldwide. Urban infrastructure must be secured against attacks, ensuring reliable and resilient services for citizens as well as privacy and data security. This paper introduces selected challenges faced by infrastructure providers, citizens and decision-makers in handling attacks aimed at information and communication technologies (ICT) of urban infrastructures and presents current research avenues for tackling cyberattacks and for developing tools for creating, portraying and disseminating actiona-ble information as one important response to security challenges. It then presents findings from a representative survey conducted in Germany (N=1091) on the experiences and perceptions of citizens concerning the relevance of cyberat-tacks will be presented.},
    booktitle = {Mensch und {Computer} - {Workshopband}},
    publisher = {Gesellschaft für Informatik e.V.},
    author = {Reuter, Christian and Haunschild, Jasmin and Hollick, Matthias and Mühlhäuser, Max and Vogt, Joachim and Kreutzer, Michael},
    editor = {Hansen, C. and Nürnberger, A. and Preim, B.},
    year = {2020},
    keywords = {Crisis, UsableSec, Security, Infrastructure, Projekt-ATHENE-SecUrban, Projekt-emergenCITY},
    pages = {1--7},
    }

  • Philipp Kuehn, Thea Riebe, Lynn Apelt, Max Jansen, Christian Reuter (2020)
    Sharing of Cyber Threat Intelligence between States
    S+F Sicherheit und Frieden / Peace and Security ;38(1):22–28. doi:10.5771/0175-274X-2020-1-22
    [BibTeX] [Abstract] [Download PDF]

    Threats in cyberspace have increased in recent years due to the increment of offensive capabilities by states. Approaches to mitigate the security dilemma in cyberspace within the UN are deadlocked, as states have not been able to achieve agreements. However, from the perspective of IT-Security, there are Cyber Threat Intelligence (CTI) platforms to share and analyze cyber threats for a collective crisis management. To investigate, whether or not CTI platforms can be used as a confidence-building measure between states and international organizations, we portray current CTI platforms, showcase political requirements, and answer the question of how CTI communication may contribute to confidence-building in international affairs. Our results suggest the need to further develop analytical capabilities, as well as the implementation of a broad social, political, and legal environment for international CTI sharing.

    @article{kuehn_sharing_2020,
    title = {Sharing of {Cyber} {Threat} {Intelligence} between {States}},
    volume = {38},
    url = {http://www.peasec.de/paper/2020/2020_KuehnRiebeApeltJansenReuter_SharingCyberThreatIntelligence_SF.pdf},
    doi = {10.5771/0175-274X-2020-1-22},
    abstract = {Threats in cyberspace have increased in recent years due to the increment of offensive capabilities by states. Approaches to mitigate the security dilemma in cyberspace within the UN are deadlocked, as states have not been able to achieve agreements. However, from the perspective of IT-Security, there are Cyber Threat Intelligence (CTI) platforms to share and analyze cyber threats for a collective crisis management. To investigate, whether or not CTI platforms can be used as a confidence-building measure between states and international organizations, we portray current CTI platforms, showcase political requirements, and answer the question of how CTI communication may contribute to confidence-building in international affairs. Our results suggest the need to further develop analytical capabilities, as well as the implementation of a broad social, political, and legal environment for international CTI sharing.},
    number = {1},
    journal = {S+F Sicherheit und Frieden / Peace and Security},
    author = {Kuehn, Philipp and Riebe, Thea and Apelt, Lynn and Jansen, Max and Reuter, Christian},
    year = {2020},
    keywords = {Student, Security, Peace, Projekt-DualUse, Cyberwar, Projekt-ATHENE-SecUrban, Projekt-CYWARN},
    pages = {22--28},
    }

  • Christian Reuter, Jürgen Altmann, Malte Göttsche, Mirko Himmel (2020)
    Zur naturwissenschaftlich-technischen Friedens- und Konfliktforschung – Aktuelle Herausforderungen und Bewertung der Empfehlungen des Wissenschaftsrats
    Zeitschrift für Friedens- und Konfliktforschung (ZeFKo) ;9(1):143–154. doi:10.1007/s42597-020-00035-z
    [BibTeX] [Abstract] [Download PDF]

    ie besorgniserregende Aufkündigung des INF-Vertrags, der wiederholte Einsatz von Chemiewaffen in Syrien, kontroverse Diskussionen über die Einführung autonomer Waffensysteme oder zunehmende Cyber-Bedrohungen prägen das aktuelle politische Weltgeschehen. Besonders in einer Zeit, in der nukleare, biologische und chemische Abrüstung- und Rüstungskontrollmaßnahmen vor großen Herausforderungen stehen und gleichzeitig neue Technologien veränderte Anforderungen an diese Kontrollmechanismen mit sich bringen, gewinnt die naturwissenschaftlich-technische Friedensforschung enorm an Bedeutung. Sie beschäftigt sich auf der Grundlage von Erkenntnissen aus verschiedenen Naturwissenschaften und technischen Fachrichtungen (z. B. Physik, Chemie, Biologie, Informatik) mit der Rolle naturwissenschaftlicher und technischer Möglichkeiten im Kontext von Krieg und Frieden sowie Rüstung und Abrüstung. Sie unterstützt die politischen Prozesse der Kriegsprävention, der Abrüstung und der Vertrauensbildung mit Analysen der Eigenschaften und Folgen neuer Waffenarten und Technologien. Aus dieser Forschung werden Vorschläge für die Begrenzung neuer Waffenentwicklungen ebenso entwickelt wie technische Lösungen für eine verbesserte Rüstungskontrolle. Dieser Artikel benennt aktuelle Herausforderungen der naturwissenschaftlich-technischen Friedensforschung und geht dabei auch auf die aktuellen Empfehlungen des Wissenschaftsrats zur Weiterentwicklung der Friedens- und Konfliktforschung aus dem Jahr 2019 ein.

    @article{reuter_zur_2020,
    title = {Zur naturwissenschaftlich-technischen {Friedens}- und {Konfliktforschung} – {Aktuelle} {Herausforderungen} und {Bewertung} der {Empfehlungen} des {Wissenschaftsrats}},
    volume = {9},
    url = {https://link.springer.com/content/pdf/10.1007/s42597-020-00035-z.pdf},
    doi = {10.1007/s42597-020-00035-z},
    abstract = {ie besorgniserregende Aufkündigung des INF-Vertrags, der wiederholte Einsatz von Chemiewaffen in Syrien, kontroverse Diskussionen über die Einführung autonomer Waffensysteme oder zunehmende Cyber-Bedrohungen prägen das aktuelle politische Weltgeschehen. Besonders in einer Zeit, in der nukleare, biologische und chemische Abrüstung- und Rüstungskontrollmaßnahmen vor großen Herausforderungen stehen und gleichzeitig neue Technologien veränderte Anforderungen an diese Kontrollmechanismen mit sich bringen, gewinnt die naturwissenschaftlich-technische Friedensforschung enorm an Bedeutung. Sie beschäftigt sich auf der Grundlage von Erkenntnissen aus verschiedenen Naturwissenschaften und technischen Fachrichtungen (z. B. Physik, Chemie, Biologie, Informatik) mit der Rolle naturwissenschaftlicher und technischer Möglichkeiten im Kontext von Krieg und Frieden sowie Rüstung und Abrüstung. Sie unterstützt die politischen Prozesse der Kriegsprävention, der Abrüstung und der Vertrauensbildung mit Analysen der Eigenschaften und Folgen neuer Waffenarten und Technologien. Aus dieser Forschung werden Vorschläge für die Begrenzung neuer Waffenentwicklungen ebenso entwickelt wie technische Lösungen für eine verbesserte Rüstungskontrolle. Dieser Artikel benennt aktuelle Herausforderungen der naturwissenschaftlich-technischen Friedensforschung und geht dabei auch auf die aktuellen Empfehlungen des Wissenschaftsrats zur Weiterentwicklung der Friedens- und Konfliktforschung aus dem Jahr 2019 ein.},
    number = {1},
    journal = {Zeitschrift für Friedens- und Konfliktforschung (ZeFKo)},
    author = {Reuter, Christian and Altmann, Jürgen and Göttsche, Malte and Himmel, Mirko},
    year = {2020},
    keywords = {Security, Peace, Projekt-CROSSING, Cyberwar, Projekt-ATHENE-SecUrban},
    pages = {143--154},
    }

  • Christian Reuter (2020)
    Towards IT Peace Research: Challenges at the Intersection of Peace and Conflict Research and Computer Science
    S+F Sicherheit und Frieden / Peace and Security ;38(1):10–16. doi:10.5771/0175-274X-2020-1-10
    [BibTeX] [Abstract] [Download PDF]

    Advances in science and technology, including information technology (IT), play a crucial role in the context of peace and security. However, research on the intersection of peace and conflict research as well as computer science is not well established yet. This article highlights the need for further work in the area of research “IT peace research”, which includes both empirical research on the role of IT in peace and security, as well as technical research to design technologies and applications. Based on the elaboration of the disciplines, central challenges, such as insecurity, actors, attribution and laws, are outlined.

    @article{reuter_towards_2020-1,
    title = {Towards {IT} {Peace} {Research}: {Challenges} at the {Intersection} of {Peace} and {Conflict} {Research} and {Computer} {Science}},
    volume = {38},
    url = {https://www.nomos-elibrary.de/10.5771/0175-274X-2020-1-10.pdf},
    doi = {10.5771/0175-274X-2020-1-10},
    abstract = {Advances in science and technology, including information technology (IT), play a crucial role in the context of peace and security. However, research on the intersection of peace and conflict research as well as computer science is not well established yet. This article highlights the need for further work in the area of research “IT peace research”, which includes both empirical research on the role of IT in peace and security, as well as technical research to design technologies and applications. Based on the elaboration of the disciplines, central challenges, such as insecurity, actors, attribution and laws, are outlined.},
    number = {1},
    journal = {S+F Sicherheit und Frieden / Peace and Security},
    author = {Reuter, Christian},
    year = {2020},
    keywords = {Security, Peace, Projekt-DualUse, AuswahlPeace, Cyberwar, Projekt-ATHENE-SecUrban},
    pages = {10--16},
    }

  • Thomas Reinhold (2020)
    Verfassungs- und völkerrechtliche Fragen im militärischen Cyber- und Informationsraum unter besonderer Berücksichtigung des Parlamentsvorbehalts, der Zurechenbarkeit von Cyberangriffen sowie einer möglichen Anpassung nationaler und internationaler Normen
    In: : Deutscher Bundestag, Verteidigungsausschuss. Deutscher Bundestag, Verteidigungsausschuss, , 1–9.
    [BibTeX] [Download PDF]

    @incollection{reinhold_verfassungs-_2020,
    title = {Verfassungs- und völkerrechtliche {Fragen} im militärischen {Cyber}- und {Informationsraum} unter besonderer {Berücksichtigung} des {Parlamentsvorbehalts}, der {Zurechenbarkeit} von {Cyberangriffen} sowie einer möglichen {Anpassung} nationaler und internationaler {Normen}},
    url = {https://www.bundestag.de/resource/blob/824622/67fc9db4f856a8445355562500d2a134/stellungnahme-Thomas-Reinhold_15-03-2021-data.pdf},
    booktitle = {Deutscher {Bundestag}, {Verteidigungsausschuss}},
    publisher = {Deutscher Bundestag, Verteidigungsausschuss},
    author = {Reinhold, Thomas},
    year = {2020},
    keywords = {Security, Peace, Cyberwar, Projekt-ATHENE-SecUrban},
    pages = {1--9},
    }

  • Marc-André Kaufhold (2020)
    Information Refinement Technologies for Crisis Informatics: User Expectations and Design Implications for Social Media and Mobile Apps in Crisis
    Darmstadt, Germany: Dissertation (Dr. rer. nat.), Department of Computer Science, Technische Unviersität Darmstadt.
    [BibTeX] [Abstract] [Download PDF]

    In den letzten 20 Jahren haben sich mobile Technologien und soziale Medien nicht nur im Alltag, sondern auch in Krisensituationen etabliert. Insbesondere großflächige Ereignisse wie der Hurrikan Sandy (2012) oder das mitteleuropäische Hochwasser (2013) haben gezeigt, dass sich die Bevölkerung aktiv mit Informations- und Kommunikationstechnologie (IKT) an der Schadensbewältigung beteiligt (Reuter, Hughes, et al., 2018). Daraus ist das Forschungsfeld der Kriseninformatik entstanden, welches Wissen der Informatik und Gesellschaftswissenschaften kombiniert und zudem in Disziplinen wie der MenschMaschine-Interaktion (HCI), Computerunterstützten Gruppenarbeit (CSCW) und Wirtschaftsinformatik (WI) verankert ist. Während die Bevölkerung IKT einsetzt, um die Unsicherheiten in Krisen zu bewältigen, nutzen Behörden und Organisationen mit Sicherheitsaufgaben (BOS), etwa Feuerwehr und Polizei, öffentliche Daten, um das Situationsbewusstsein und die Entscheidungsfindung für eine bessere Schadensbewältigung zu verbessern (Palen & Anderson, 2016). Noch größere Katastrophen wie die aktuelle COVID-19-Pandemie verstärken dabei die Herausforderungen der Kriseninformatik (Xie et al., 2020). Für BOS stellt die umfangreiche Menge heterogener und semantisch verknüpfter Daten, auch Social Big Data genannt (Olshannikova et al., 2017), eine große Herausforderung im Hinblick auf die Qualität, Quantität und den Zugriff auf relevante Informationen dar. Um ein Situationsbewusstsein und nutzbare Informationen, d. h. die richtigen Informationen zur richtigen Zeit bei der richtigen Person, zu erhalten (Zade et al., 2018), müssen Informationen auf die Bedingungen des Ereignisses, organisationale Anforderungen, soziale Rahmenbedingungen und technische Möglichkeiten verfeinert werden. Diese Dissertation kombiniert das methodische Framework der Designfallstudien (Wulf et al., 2011) mit den Prinzipien der Design-Science-Forschung (Hevner et al., 2004), um das Thema der Informationsverfeinerung (Information Refinement) in vier Phasen zu untersuchen, wovon jede unterschiedliche Forschungsbeiträge hervorbringt. Die Arbeit begutachtet zunächst Nutzungs-, Rollen- und Wahrnehmungsmuster in der Kriseninformatik und stellt die Potenziale sozialer Medien zur öffentlichen Teilhabe an der Krisenbewältigung heraus. Die empirische Studien mit der deutschen Bevölkerung zeigen die positiven Einstellungen und die steigende Nutzung mobiler und sozialer Technologien in Krisen, stellen aber auch Barrieren heraus und zeigen die Erwartung, dass BOS in soziale Medien aktiv sind. Die Ergebnisse fundieren das Design innovativer IKT-Artefakte, darunter visuelle Bevölkerungsrichtlinien für soziale Medien in Krisen (SMG), ein Web-Interface für BOS zur Aggregation mobiler und sozialer Daten (ESI), ein Algorithmus zur Extraktion relevanter Informationen in sozialen Medien (SMO), und eine mobile App für die bidirektionale Kommunikation zwischen BOS und Bevölkerung (112.social). Die Evaluation der Artefakte involviert EndnutzerInnen aus dem Anwendungsfeld des Krisenmanagements, um potenziale für Verbesserungen und zukünftige Forschung zu identifizieren. Die Arbeit schließt mit einem Framework zur Informationsverfeinerung für die Kriseninformatik ab, welche die event-, gesellschafts-, organisation- und technologiebasierte Perspektive integriert.

    @book{kaufhold_information_2020,
    address = {Darmstadt, Germany},
    title = {Information {Refinement} {Technologies} for {Crisis} {Informatics}: {User} {Expectations} and {Design} {Implications} for {Social} {Media} and {Mobile} {Apps} in {Crisis}},
    url = {https://doi.org/10.26083/tuprints-00017474},
    abstract = {In den letzten 20 Jahren haben sich mobile Technologien und soziale Medien nicht nur im Alltag, sondern auch in Krisensituationen etabliert. Insbesondere großflächige Ereignisse wie der Hurrikan Sandy (2012) oder das mitteleuropäische Hochwasser (2013) haben gezeigt, dass sich die Bevölkerung aktiv mit Informations- und Kommunikationstechnologie (IKT) an der Schadensbewältigung beteiligt (Reuter, Hughes, et al., 2018). Daraus ist das Forschungsfeld der Kriseninformatik entstanden, welches Wissen der Informatik und Gesellschaftswissenschaften kombiniert und zudem in Disziplinen wie der MenschMaschine-Interaktion (HCI), Computerunterstützten Gruppenarbeit (CSCW) und Wirtschaftsinformatik (WI) verankert ist. Während die Bevölkerung IKT einsetzt, um die Unsicherheiten in Krisen zu bewältigen, nutzen Behörden und Organisationen mit Sicherheitsaufgaben (BOS), etwa Feuerwehr und Polizei, öffentliche Daten, um das Situationsbewusstsein und die Entscheidungsfindung für eine bessere Schadensbewältigung zu verbessern (Palen \& Anderson, 2016). Noch größere Katastrophen wie die aktuelle COVID-19-Pandemie verstärken dabei die Herausforderungen der Kriseninformatik (Xie et al., 2020). Für BOS stellt die umfangreiche Menge heterogener und semantisch verknüpfter Daten, auch Social Big Data genannt (Olshannikova et al., 2017), eine große Herausforderung im Hinblick auf die Qualität, Quantität und den Zugriff auf relevante Informationen dar. Um ein Situationsbewusstsein und nutzbare Informationen, d. h. die richtigen Informationen zur richtigen Zeit bei der richtigen Person, zu erhalten (Zade et al., 2018), müssen Informationen auf die Bedingungen des Ereignisses, organisationale Anforderungen, soziale Rahmenbedingungen und technische Möglichkeiten verfeinert werden. Diese Dissertation kombiniert das methodische Framework der Designfallstudien (Wulf et al., 2011) mit den Prinzipien der Design-Science-Forschung (Hevner et al., 2004), um das Thema der Informationsverfeinerung (Information Refinement) in vier Phasen zu untersuchen, wovon jede unterschiedliche Forschungsbeiträge hervorbringt. Die Arbeit begutachtet zunächst Nutzungs-, Rollen- und Wahrnehmungsmuster in der Kriseninformatik und stellt die Potenziale sozialer Medien zur öffentlichen Teilhabe an der Krisenbewältigung heraus. Die empirische Studien mit der deutschen Bevölkerung zeigen die positiven Einstellungen und die steigende Nutzung mobiler und sozialer Technologien in Krisen, stellen aber auch Barrieren heraus und zeigen die Erwartung, dass BOS in soziale Medien aktiv sind. Die Ergebnisse fundieren das Design innovativer IKT-Artefakte, darunter visuelle Bevölkerungsrichtlinien für soziale Medien in Krisen (SMG), ein Web-Interface für BOS zur Aggregation mobiler und sozialer Daten (ESI), ein Algorithmus zur Extraktion relevanter Informationen in sozialen Medien (SMO), und eine mobile App für die bidirektionale Kommunikation zwischen BOS und Bevölkerung (112.social). Die Evaluation der Artefakte involviert EndnutzerInnen aus dem Anwendungsfeld des Krisenmanagements, um potenziale für Verbesserungen und zukünftige Forschung zu identifizieren. Die Arbeit schließt mit einem Framework zur Informationsverfeinerung für die Kriseninformatik ab, welche die event-, gesellschafts-, organisation- und technologiebasierte Perspektive integriert.},
    publisher = {Dissertation (Dr. rer. nat.), Department of Computer Science, Technische Unviersität Darmstadt},
    author = {Kaufhold, Marc-André},
    year = {2020},
    keywords = {Crisis, Projekt-KontiKat, Projekt-ATHENE-SecUrban, Projekt-CYWARN, Dissertation},
    }

  • Marc-André Kaufhold, Markus Bayer, Christian Reuter (2020)
    Rapid relevance classification of social media posts in disasters and emergencies: A system and evaluation featuring active, incremental and online learning
    Information Processing & Management (IPM) ;57(1):1–32.
    [BibTeX] [Abstract] [Download PDF]

    The research field of crisis informatics examines, amongst others, the potentials and barriers of social media use during disasters and emergencies. Social media allow emergency services to receive valuable information (e.g., eyewitness reports, pictures, or videos) from social media. However, the vast amount of data generated during large-scale incidents can lead to issue of information overload. Research indicates that supervised machine learning techniques are sui- table for identifying relevant messages and filter out irrelevant messages, thus mitigating in- formation overload. Still, they require a considerable amount of labeled data, clear criteria for relevance classification, a usable interface to facilitate the labeling process and a mechanism to rapidly deploy retrained classifiers. To overcome these issues, we present (1) a system for social media monitoring, analysis and relevance classification, (2) abstract and precise criteria for re- levance classification in social media during disasters and emergencies, (3) the evaluation of a well-performing Random Forest algorithm for relevance classification incorporating metadata from social media into a batch learning approach (e.g., 91.28\%/89.19\% accuracy, 98.3\%/89.6\% precision and 80.4\%/87.5\% recall with a fast training time with feature subset selection on the European floods/BASF SE incident datasets), as well as (4) an approach and preliminary eva- luation for relevance classification including active, incremental and online learning to reduce the amount of required labeled data and to correct misclassifications of the algorithm by feed- back classification. Using the latter approach, we achieved a well-performing classifier based on the European floods dataset by only requiring a quarter of labeled data compared to the tradi- tional batch learning approach. Despite a lesser effect on the BASF SE incident dataset, still a substantial improvement could be determined.

    @article{kaufhold_rapid_2020,
    title = {Rapid relevance classification of social media posts in disasters and emergencies: {A} system and evaluation featuring active, incremental and online learning},
    volume = {57},
    url = {https://peasec.de/paper/2020/2020_KaufholdBayerReuter_RapidRelevanceClassification_IPM.pdf},
    abstract = {The research field of crisis informatics examines, amongst others, the potentials and barriers of social media use during disasters and emergencies. Social media allow emergency services to receive valuable information (e.g., eyewitness reports, pictures, or videos) from social media. However, the vast amount of data generated during large-scale incidents can lead to issue of information overload. Research indicates that supervised machine learning techniques are sui- table for identifying relevant messages and filter out irrelevant messages, thus mitigating in- formation overload. Still, they require a considerable amount of labeled data, clear criteria for relevance classification, a usable interface to facilitate the labeling process and a mechanism to rapidly deploy retrained classifiers. To overcome these issues, we present (1) a system for social media monitoring, analysis and relevance classification, (2) abstract and precise criteria for re- levance classification in social media during disasters and emergencies, (3) the evaluation of a well-performing Random Forest algorithm for relevance classification incorporating metadata from social media into a batch learning approach (e.g., 91.28\%/89.19\% accuracy, 98.3\%/89.6\% precision and 80.4\%/87.5\% recall with a fast training time with feature subset selection on the European floods/BASF SE incident datasets), as well as (4) an approach and preliminary eva- luation for relevance classification including active, incremental and online learning to reduce the amount of required labeled data and to correct misclassifications of the algorithm by feed- back classification. Using the latter approach, we achieved a well-performing classifier based on the European floods dataset by only requiring a quarter of labeled data compared to the tradi- tional batch learning approach. Despite a lesser effect on the BASF SE incident dataset, still a substantial improvement could be determined.},
    number = {1},
    journal = {Information Processing \& Management (IPM)},
    author = {Kaufhold, Marc-André and Bayer, Markus and Reuter, Christian},
    year = {2020},
    keywords = {Crisis, SocialMedia, A-Paper, Ranking-ImpactFactor, Ranking-CORE-A, Ranking-WKWI-B, Projekt-ATHENE-SecUrban, Projekt-emergenCITY, AuswahlKaufhold},
    pages = {1--32},
    }

  • Jasmin Haunschild, Marc-André Kaufhold, Christian Reuter (2020)
    Sticking with Landlines? Citizens‘ and Police Social Media Use and Expectation During Emergencies
    Proceedings of the International Conference on Wirtschaftsinformatik (WI) (Best Paper Social Impact Award) Potsdam, Germany. doi:10.30844/wi_2020_o2-haunschild
    [BibTeX] [Abstract] [Download PDF]

    Crisis informatics has examined the use, potentials and weaknesses of social media in emergencies across different events (e.g., man-made, natural or hybrid), countries and heterogeneous participants (e.g., citizens or emergency services) for almost two decades. While most research analyzes specific cases, few studies have focused on citizens‘ perceptions of different social media platforms in emergencies using a representative sample. Basing our questionnaire on a workshop with police officers, we present the results of a representative study on citizens‘ perception of social media in emergencies that we conducted in Germany. Our study suggests that when it comes to emergencies, socio-demographic differences are largely insignificant and no clear preferences for emergency services‘ social media strategies exist. Due to the widespread searching behavior on some platforms, emergency services can reach a wide audience by turning to certain channels but should account for groups with distinct preferences.

    @inproceedings{haunschild_sticking_2020,
    address = {Potsdam, Germany},
    title = {Sticking with {Landlines}? {Citizens}' and {Police} {Social} {Media} {Use} and {Expectation} {During} {Emergencies}},
    url = {http://www.peasec.de/paper/2020/2020_HaunschildKaufholdReuter_SocialMediaPoliceSurvey_WI.pdf},
    doi = {10.30844/wi_2020_o2-haunschild},
    abstract = {Crisis informatics has examined the use, potentials and weaknesses of social media in emergencies across different events (e.g., man-made, natural or hybrid), countries and heterogeneous participants (e.g., citizens or emergency services) for almost two decades. While most research analyzes specific cases, few studies have focused on citizens' perceptions of different social media platforms in emergencies using a representative sample. Basing our questionnaire on a workshop with police officers, we present the results of a representative study on citizens' perception of social media in emergencies that we conducted in Germany. Our study suggests that when it comes to emergencies, socio-demographic differences are largely insignificant and no clear preferences for emergency services' social media strategies exist. Due to the widespread searching behavior on some platforms, emergency services can reach a wide audience by turning to certain channels but should account for groups with distinct preferences.},
    booktitle = {Proceedings of the {International} {Conference} on {Wirtschaftsinformatik} ({WI}) ({Best} {Paper} {Social} {Impact} {Award})},
    publisher = {AIS Electronic Library (AISel)},
    author = {Haunschild, Jasmin and Kaufhold, Marc-André and Reuter, Christian},
    year = {2020},
    keywords = {Crisis, Ranking-CORE-C, Ranking-VHB-C, Ranking-WKWI-A, Projekt-MAKI, Projekt-ATHENE-SecUrban, Projekt-emergenCITY},
    pages = {1--16},
    }

    emergenCITY: Die Resiliente Digitale Stadt (1.1.2020-31.12.2023, HMWK)

    emergenCITY – Die Resiliente Digitale Stadt (1.1.2020-31.12.2026, HMWK)

    https://www.emergencity.de/

    Die TU Darmstadt kann im Rahmen des hessischen Forschungsförderungsprogramms LOEWE ein neues Zentrum etablieren – es trägt den Titel „Die Resiliente Digitale Stadt” und wird bis Ende 2023 mit insgesamt 17,4 Millionen Euro gefördert. Dies gab das Hessische Wissenschaftsministerium bekannt.

    Das LOEWE-Zentrum „emergenCITY“ („Resiliente Digitale Stadt“) wird Lösungen erarbeiten, die in Krisenfällen einen Notbetrieb für und mit Informations- und Kommunikationstechnologien sicherstellen, schnelle Hilfe ermöglichen und eine effiziente Rückkehr zur Normalität unterstützen. Dazu muss sich die Technologie bereits im Normalbetrieb kontinuierlich „selbst-vorbereitend“ auf Krisensituationen einstellen und diese autonom detektieren, so Hollick. In Notlagen sollen überlebenswichtige Dienste beschleunigt bereitgestellt werden. Das gewonnene Erfahrungswissen soll helfen, bei künftigen kritischen Situationen besser vorbereitet zu sein.

    Das ist auch dringend erforderlich: Im Jahr 2050 werden zwei Drittel der Weltbevölkerung in Städten leben. Für das Wachstum von Städten sind anpassungsfähige und effiziente Infrastrukturen unerlässlich. Digitale Städte der Zukunft nutzen vermehrt Informations- und Kommunikationstechnologien, um vernetzte Infrastrukturen etwa in den Bereichen Energie, Verkehr, Gesundheit, Staat und Verwaltung bereitzustellen. Die Abhängigkeit dieser Systeme aus Informations- und Kommunikationstechnologien nimmt stetig zu – und sie werden durch Naturereignisse, menschliches und technisches Versagen sowie Gewalt und Terror verwundbar.

    PEASEC ist Teil von emergenCITY. Teams von 23 Professorinnen und Professoren aus Informatik, Elektrotechnik und Informationstechnik, Maschinenbau, Gesellschafts- und Geschichtswissenschaften, Architektur, Wirtschaftswissenschaften sowie Rechtswissenschaften werden gemeinsam im universitären Verbund forschen – die Federführung hat die TU Darmstadt (Prof. Hollick), Partner sind die Universität Kassel und die Universität Marburg. Zusammen mit der Digitalstadt Darmstadt wird ein emergenCITY-Lab zur praxisnahen Erprobung von Lösungen etabliert. Das Bundesamt für Bevölkerungsschutz und Katastrophenhilfe bringt als weiterer Partner die gesamtheitliche Behörden- und Anwendungssicht ein.

    2024

  • Steffen Haesler, Christian Reuter (2024)
    Moderne Technologien und Resilienz
    In: Andreas H. Karsten, Stefan Voßschmidt, Uwe Becker: Resilienz und Schockereignisse. Kohlhammer.
    [BibTeX]

    @incollection{haesler_moderne_2024,
    title = {Moderne {Technologien} und {Resilienz}},
    booktitle = {Resilienz und {Schockereignisse}},
    publisher = {Kohlhammer},
    author = {Haesler, Steffen and Reuter, Christian},
    editor = {Karsten, Andreas H. and Voßschmidt, Stefan and Becker, Uwe},
    year = {2024},
    keywords = {UsableSec, Security, Projekt-emergenCITY},
    }

  • Franz Kuntke (2024)
    Resilient Smart Farming: Crisis-Capable Information and Communication Technologies for Agriculture
    Wiesbaden, Germany: Springer Vieweg.
    [BibTeX]

    @book{kuntke_resilient_2024,
    address = {Wiesbaden, Germany},
    title = {Resilient {Smart} {Farming}: {Crisis}-{Capable} {Information} and {Communication} {Technologies} for {Agriculture}},
    publisher = {Springer Vieweg},
    author = {Kuntke, Franz},
    year = {2024},
    keywords = {Crisis, HCI, UsableSec, Security, RSF, Projekt-ATHENE-SecUrban, Projekt-emergenCITY, Dissertation},
    }

  • Jasmin Haunschild (2024)
    Enhancing Citizens’ Role in Public Safety: Interaction, Perception and Design of Mobile Warning Apps
    Darmstadt, Germany: Dissertation (Dr. rer. nat.), Department of Computer Science, Technische Universität Darmstadt.
    [BibTeX]

    @book{haunschild_enhancing_2024,
    address = {Darmstadt, Germany},
    title = {Enhancing {Citizens}’ {Role} in {Public} {Safety}: {Interaction}, {Perception} and {Design} of {Mobile} {Warning} {Apps}},
    publisher = {Dissertation (Dr. rer. nat.), Department of Computer Science, Technische Universität Darmstadt},
    author = {Haunschild, Jasmin},
    year = {2024},
    keywords = {Crisis, HCI, Projekt-ATHENE-SecUrban, Projekt-emergenCITY, Dissertation},
    }

  • Jasmin Haunschild (2024)
    Enhancing Citizens’ Role in Public Safety: Interaction, Perception and Design of Mobile Warning Apps
    Wiesbaden, Germany: Springer Vieweg.
    [BibTeX]

    @book{haunschild_enhancing_2024-1,
    address = {Wiesbaden, Germany},
    title = {Enhancing {Citizens}’ {Role} in {Public} {Safety}: {Interaction}, {Perception} and {Design} of {Mobile} {Warning} {Apps}},
    publisher = {Springer Vieweg},
    author = {Haunschild, Jasmin},
    year = {2024},
    keywords = {Crisis, HCI, Projekt-ATHENE-SecUrban, Projekt-emergenCITY, Dissertation},
    }

  • Felix Burger, Jasmin Haunschild, Christian Reuter (2024)
    Understanding Crisis Preparedness: Insights from Personal Values, Beliefs, Social Norms, and Personal Norms
    Proceedings of the 17th International Conference on Information Systems for Crisis Response and Management (ISCRAM) .
    [BibTeX] [Abstract]

    In disasters and crises, individual household preparedness is crucial for societal resilience. However, motivating citizens to take personal responsibility and to implement preparedness measures remains challenging. This study investigates the impact of values, beliefs and norms on preparedness. Through a survey on resource-oriented crisis preparedness and participants’ values, a group of rather prepared and rather unprepared people was differentiated. We quantitatively analyzed the correlation between values and crisis preparedness. Quantitative analysis revealed a significant association between benevolence as a value and higher preparedness. Follow-up interviews (N=30) delved into participants‘ beliefs and norms, showing minimal group differences. While crisis preparedness is mildly positively viewed, strong negativity exists towards perceived “hoarders” or “preppers.” The study discusses implication for crisis communication and the design of nudges and persuasive systems, emphasizing the role of benevolence in fostering preparedness.

    @inproceedings{burger_understanding_2024,
    title = {Understanding {Crisis} {Preparedness}: {Insights} from {Personal} {Values}, {Beliefs}, {Social} {Norms}, and {Personal} {Norms}},
    abstract = {In disasters and crises, individual household preparedness is crucial for societal resilience. However, motivating citizens to take personal responsibility and to implement preparedness measures remains challenging. This study investigates the impact of values, beliefs and norms on preparedness. Through a survey on resource-oriented crisis preparedness and participants’ values, a group of rather prepared and rather unprepared people was differentiated. We quantitatively analyzed the correlation between values and crisis preparedness. Quantitative analysis revealed a significant association between benevolence as a value and higher preparedness. Follow-up interviews (N=30) delved into participants' beliefs and norms, showing minimal group differences. While crisis preparedness is mildly positively viewed, strong negativity exists towards perceived “hoarders” or “preppers.” The study discusses implication for crisis communication and the design of nudges and persuasive systems, emphasizing the role of benevolence in fostering preparedness.},
    booktitle = {Proceedings of the 17th {International} {Conference} on {Information} {Systems} for {Crisis} {Response} and {Management} ({ISCRAM})},
    author = {Burger, Felix and Haunschild, Jasmin and Reuter, Christian},
    year = {2024},
    keywords = {Crisis, Student, Projekt-ATHENE-SecUrban, Projekt-emergenCITY},
    }

    2023

  • Stefka Schmid, Laura Guntrum, Steffen Haesler, Lisa Schultheiß, Christian Reuter (2023)
    Digital Volunteers During the COVID-19 Pandemic: Care Work on Social Media for Socio-technical Resilience
    Weizenbaum Journal of the Digital Society ;3(1). doi:10.34669/WI.WJDS/3.3.6
    [BibTeX] [Abstract] [Download PDF]

    Like past crises, the COVID-19 pandemic has also activated individual volunteers to help to respond to the crisis. This includes digital volunteers, who have organized physical aid and conducted activities on social media. Analyzing German volunteering support groups on Facebook and related Reddit threads in the context of the COVID-19 pandemic, we {\textbackslash}updatedshow what type of help is offered and how social media users interact with each other, trying to cope with the situation. We reveal that most users offering help online conduct mostly typical care work, such as buying groceries or giving advice. Crucially, volunteering is characterized by relationships of care and thus builds on affirmative interactions. Albeit some misdirected offers and regressive interruptions, people use the possibility to make their voices heard and, showing empathy, help each other to cope with crisis. Social media like Facebook mediate societal structures, including relationships of care, offering a space for continuous, cumulatively resilient conduct of care work. Reflecting on the traditional division of labor in crisis volunteering and counter-productive dynamics of care and empathy, we aim for feminist ethics of care which allows for interactions on social media that foster generative computer-supported collaboration.

    @article{schmid_digital_2023,
    title = {Digital {Volunteers} {During} the {COVID}-19 {Pandemic}: {Care} {Work} on {Social} {Media} for {Socio}-technical {Resilience}},
    volume = {3},
    issn = {2748-5625},
    url = {https://ojs.weizenbaum-institut.de/index.php/wjds/article/view/78},
    doi = {10.34669/WI.WJDS/3.3.6},
    abstract = {Like past crises, the COVID-19 pandemic has also activated individual volunteers to help to respond to the crisis. This includes digital volunteers, who have organized physical aid and conducted activities on social media. Analyzing German volunteering support groups on Facebook and related Reddit threads in the context of the COVID-19 pandemic, we {\textbackslash}updatedshow what type of help is offered and how social media users interact with each other, trying to cope with the situation. We reveal that most users offering help online conduct mostly typical care work, such as buying groceries or giving advice. Crucially, volunteering is characterized by relationships of care and thus builds on affirmative interactions. Albeit some misdirected offers and regressive interruptions, people use the possibility to make their voices heard and, showing empathy, help each other to cope with crisis. Social media like Facebook mediate societal structures, including relationships of care, offering a space for continuous, cumulatively resilient conduct of care work. Reflecting on the traditional division of labor in crisis volunteering and counter-productive dynamics of care and empathy, we aim for feminist ethics of care which allows for interactions on social media that foster generative computer-supported collaboration.},
    number = {1},
    journal = {Weizenbaum Journal of the Digital Society},
    author = {Schmid, Stefka and Guntrum, Laura and Haesler, Steffen and Schultheiß, Lisa and Reuter, Christian},
    month = may,
    year = {2023},
    keywords = {Crisis, HCI, SocialMedia, Student, Peace, Projekt-ATHENE-SecUrban, Projekt-emergenCITY, Projekt-TraCe},
    }

  • Jasmin Haunschild, Selina Pauli, Christian Reuter (2023)
    Preparedness Nudging for Warning Apps? A Mixed-Method Study Investigating Popularity and Effects of Preparedness Alerts in Warning Apps
    International Journal on Human-Computer Studies (IJHCS) ;172:102995. doi:https://doi.org/10.1016/j.ijhcs.2023.102995
    [BibTeX] [Abstract] [Download PDF]

    Warning apps are used by many to receive warnings about imminent disasters. However, their potential for increasing awareness about general hazards and for increasing preparedness is currently underused. With a mixed-method design that includes a representative survey of the German population, a design workshop and an app evaluation experiment, this study investigates users’ preferences regarding non-acute preparedness alerts’ inclusion in crisis apps and the effectiveness of Nudging in this context. The experiment shows that while the social influence nudge had no significant effect compared to the control group without a nudging condition, the confrontational nudge increased the number of taken recommended preparedness measures. The evaluation indicates that the preparedness alerts increased users’ knowledge and their motivation to use a warning app. This motivation is, in contrast, decreased when the messages are perceived as a disruption. While many oppose push notifications, favor finding persuasively designed preparedness advice in a separate menu or as an optional notification.

    @article{haunschild_preparedness_2023,
    title = {Preparedness {Nudging} for {Warning} {Apps}? {A} {Mixed}-{Method} {Study} {Investigating} {Popularity} and {Effects} of {Preparedness} {Alerts} in {Warning} {Apps}},
    volume = {172},
    issn = {1071-5819},
    url = {https://peasec.de/paper/2023/2023_HaunschildPauliReuter_NudgingWarningApps_IJHCS.pdf},
    doi = {https://doi.org/10.1016/j.ijhcs.2023.102995},
    abstract = {Warning apps are used by many to receive warnings about imminent disasters. However, their potential for increasing awareness about general hazards and for increasing preparedness is currently underused. With a mixed-method design that includes a representative survey of the German population, a design workshop and an app evaluation experiment, this study investigates users’ preferences regarding non-acute preparedness alerts’ inclusion in crisis apps and the effectiveness of Nudging in this context. The experiment shows that while the social influence nudge had no significant effect compared to the control group without a nudging condition, the confrontational nudge increased the number of taken recommended preparedness measures. The evaluation indicates that the preparedness alerts increased users’ knowledge and their motivation to use a warning app. This motivation is, in contrast, decreased when the messages are perceived as a disruption. While many oppose push notifications, favor finding persuasively designed preparedness advice in a separate menu or as an optional notification.},
    journal = {International Journal on Human-Computer Studies (IJHCS)},
    author = {Haunschild, Jasmin and Pauli, Selina and Reuter, Christian},
    year = {2023},
    keywords = {AuswahlCrisis, Crisis, Selected, Student, A-Paper, Ranking-ImpactFactor, Projekt-ATHENE-SecUrban, Projekt-emergenCITY},
    pages = {102995},
    }

  • Markus Bayer, Marc-André Kaufhold, Christian Reuter (2023)
    A Survey on Data Augmentation for Text Classification
    ACM Computing Surveys (CSUR) ;55(7):1–39. doi:10.1145/3544558
    [BibTeX] [Abstract] [Download PDF]

    Data augmentation, the artificial creation of training data for machine learning by transformations, is a widely studied research field across machine learning disciplines. While it is useful for increasing a model’s generalization capabilities, it can also address many other challenges and problems, from overcoming a limited amount of training data, to regularizing the objective, to limiting the amount data used to protect privacy. Based on a precise description of the goals and applications of data augmentation and a taxonomy for existing works, this survey is concerned with data augmentation methods for textual classification and aims to provide a concise and comprehensive overview for researchers and practitioners. Derived from the taxonomy, we divide more than 100 methods into 12 different groupings and give state-of-the-art references expounding which methods are highly promising by relating them to each other. Finally, research perspectives that may constitute a building block for future work are provided.

    @article{bayer_survey_2023,
    title = {A {Survey} on {Data} {Augmentation} for {Text} {Classification}},
    volume = {55},
    url = {https://dl.acm.org/doi/pdf/10.1145/3544558},
    doi = {10.1145/3544558},
    abstract = {Data augmentation, the artificial creation of training data for machine learning by transformations, is a widely studied research field across machine learning disciplines. While it is useful for increasing a model's generalization capabilities, it can also address many other challenges and problems, from overcoming a limited amount of training data, to regularizing the objective, to limiting the amount data used to protect privacy. Based on a precise description of the goals and applications of data augmentation and a taxonomy for existing works, this survey is concerned with data augmentation methods for textual classification and aims to provide a concise and comprehensive overview for researchers and practitioners. Derived from the taxonomy, we divide more than 100 methods into 12 different groupings and give state-of-the-art references expounding which methods are highly promising by relating them to each other. Finally, research perspectives that may constitute a building block for future work are provided.},
    number = {7},
    journal = {ACM Computing Surveys (CSUR)},
    author = {Bayer, Markus and Kaufhold, Marc-André and Reuter, Christian},
    year = {2023},
    keywords = {AuswahlCrisis, Crisis, Selected, A-Paper, Ranking-CORE-A*, Ranking-ImpactFactor, Projekt-ATHENE-SecUrban, Projekt-CYWARN, Projekt-emergenCITY, AuswahlKaufhold},
    pages = {1--39},
    }

  • Jasmin Haunschild, Leon Jung, Christian Reuter (2023)
    Dual-use in volunteer operations? Attitudes of computer science students regarding the establishment of a cyber security volunteer force
    In: Gerber Nina, Zimmermann Verena: International Symposium on Technikpsychologie (TecPsy). Sciendo, , 66–81.
    [BibTeX] [Abstract] [Download PDF]

    The digitalisation of critical infrastructure has increased the risk of large-scale cyber incidents. In contrast to the management of conventional emergencies by established civil protection organisations involving volunteers in Germany, few response capacities exist for these events. The concept of a volunteer force for cyber security could close this protection gap. However, such involvement also poses practical and ethical challenges. By conducting interviews with computer science students (N = 11), this paper analyses potential volunteers’ attitudes towards ethical implications of a cyber volunteer force, as well as practical aspects that might motivate or hinder their participation. A qualitative content analysis reveals that students are largely unaware of potential dilemmas connected to vulnerabilities handling and national cybersecurity interests. Ethical guidelines and means of motivating and encouraging potential volunteers are discussed.

    @incollection{haunschild_dual-use_2023,
    title = {Dual-use in volunteer operations? {Attitudes} of computer science students regarding the establishment of a cyber security volunteer force},
    isbn = {978-83-66675-89-6},
    url = {https://sciendo.com/chapter/9788366675896/10.2478/9788366675896-006},
    abstract = {The digitalisation of critical infrastructure has increased the risk of large-scale cyber incidents. In contrast to the management of conventional emergencies by established civil protection organisations involving volunteers in Germany, few response capacities exist for these events. The concept of a volunteer force for cyber security could close this protection gap. However, such involvement also poses practical and ethical challenges. By conducting interviews with computer science students (N = 11), this paper analyses potential volunteers’ attitudes towards ethical implications of a cyber volunteer force, as well as practical aspects that might motivate or hinder their participation. A qualitative
    content analysis reveals that students are largely unaware of potential dilemmas connected to vulnerabilities handling and national cybersecurity interests. Ethical guidelines and means of motivating and encouraging potential volunteers
    are discussed.},
    booktitle = {International {Symposium} on {Technikpsychologie} ({TecPsy})},
    publisher = {Sciendo},
    author = {Haunschild, Jasmin and Jung, Leon and Reuter, Christian},
    editor = {Nina, Gerber and Verena, Zimmermann},
    year = {2023},
    keywords = {Crisis, Student, UsableSec, Security, Projekt-ATHENE-SecUrban, Projekt-emergenCITY},
    pages = {66--81},
    }

  • Marc-André Kaufhold, Christian Reuter, Thomas Ludwig (2023)
    Big Data and Multi-platform Social Media Services in Disaster Management
    In: Amita Singh: International Handbook of Disaster Research. Singapore: Springer Nature Singapore, , 1–21.
    [BibTeX] [Abstract] [Download PDF]

    The use of social media today is not only ubiquitous and an integral part of everyday life but is also increasingly relevant before, during, or after emergencies. Data produced in these contexts, such as situational updates and multimedia content, is disseminated across different social media platforms and can be leveraged by various actors, including emergency services or volunteer communities. However, the dissemination of several thousand or even millions of messages during large-scale emergencies confronts analysts with challenges of information quality and overload. Hence, crisis informatics as a research domain seeks to explore and develop systems that support the collection, analysis, and dissemination of valuable social media information in emergencies. This chapter presents the social media API (SMA), which is a multi-platform service for gathering big social data across different social media channels and analyzing the credibility and relevance of collected data by the means of machine learning models. Based on the lessons learned from both the implementation process and user-centered evaluations in multiple emergency settings, this chapter discusses core challenges and potentials of the SMA and similar services, focusing on (1) the multi-platform gathering and management of data, (2) the mitigation of information overload by relevance assessment and message grouping, (3) the assessment of credibility and information quality, and (4) user-centered tailorability and adjustable data operations.

    @incollection{kaufhold_big_2023,
    address = {Singapore},
    title = {Big {Data} and {Multi}-platform {Social} {Media} {Services} in {Disaster} {Management}},
    isbn = {978-981-16-8800-3},
    url = {https://peasec.de/paper/2023/2023_KaufholdReuterLudwig_BigDataMultiPlatformSocialMediaDisaster_HandbookDisaster.pdf},
    abstract = {The use of social media today is not only ubiquitous and an integral part of everyday life but is also increasingly relevant before, during, or after emergencies. Data produced in these contexts, such as situational updates and multimedia content, is disseminated across different social media platforms and can be leveraged by various actors, including emergency services or volunteer communities. However, the dissemination of several thousand or even millions of messages during large-scale emergencies confronts analysts with challenges of information quality and overload. Hence, crisis informatics as a research domain seeks to explore and develop systems that support the collection, analysis, and dissemination of valuable social media information in emergencies. This chapter presents the social media API (SMA), which is a multi-platform service for gathering big social data across different social media channels and analyzing the credibility and relevance of collected data by the means of machine learning models. Based on the lessons learned from both the implementation process and user-centered evaluations in multiple emergency settings, this chapter discusses core challenges and potentials of the SMA and similar services, focusing on (1) the multi-platform gathering and management of data, (2) the mitigation of information overload by relevance assessment and message grouping, (3) the assessment of credibility and information quality, and (4) user-centered tailorability and adjustable data operations.},
    booktitle = {International {Handbook} of {Disaster} {Research}},
    publisher = {Springer Nature Singapore},
    author = {Kaufhold, Marc-André and Reuter, Christian and Ludwig, Thomas},
    editor = {Singh, Amita},
    year = {2023},
    keywords = {Crisis, HCI, Projekt-KOKOS, Projekt-CYWARN, Projekt-emergenCITY},
    pages = {1--21},
    }

  • Christian Reuter, Marc-André Kaufhold (2023)
    Crisis Informatics
    In: Zheng Yan: Cambridge Handbook of Cyber Behavior. Cambridge University Press.
    [BibTeX] [Abstract]

    In summary, crisis informatics has established itself as an important research area in the ever-increasing complexity of the cyber world. Its importance is further amplified by the time-critical constraints of emergencies and disasters. However, crisis informatics will be challenged to evolve quickly to tackle global-scale emergencies, such as the ongoing COVID-19 pandemic and the increasing risks of natural hazards due to climate change. This chapter seeks to supplement this effort by analyzing interaction, role, information, and perception patterns, which were prevalent in the past 20 years of social media use in crises.

    @incollection{reuter_crisis_2023,
    title = {Crisis {Informatics}},
    isbn = {978-1-00-905708-0},
    abstract = {In summary, crisis informatics has established itself as an important research area in the ever-increasing complexity of the cyber world. Its importance is further amplified by the time-critical constraints of emergencies and disasters. However, crisis informatics will be challenged to evolve quickly to tackle global-scale emergencies, such as the ongoing COVID-19 pandemic and the increasing risks of natural hazards due to climate change. This chapter seeks to supplement this effort by analyzing interaction, role, information, and perception patterns, which were prevalent in the past 20 years of social media use in crises.},
    booktitle = {Cambridge {Handbook} of {Cyber} {Behavior}},
    publisher = {Cambridge University Press},
    author = {Reuter, Christian and Kaufhold, Marc-André},
    editor = {Yan, Zheng},
    year = {2023},
    keywords = {Crisis, HCI, Peace, Projekt-CYWARN, Projekt-ATHENE-FANCY, Projekt-emergenCITY},
    }

  • Franz Kuntke, Lars Baumgärtner, Christian Reuter (2023)
    Rural Communication in Outage Scenarios: Disruption-Tolerant Networking via LoRaWAN Setups
    Proceedings of Information Systems for Crisis Response and Management (ISCRAM) .
    [BibTeX] [Abstract] [Download PDF]

    Since communications infrastructure is subject to many impacts, e.g., destructive natural events, they can potentially collapse at any time. Especially in rural areas, the recovery of public network infrastructure can take some time, so a dedicated communication channel would be advantageous. We explore the possibility of transforming commodity LoRaWAN gateways into meshed network nodes for a digital emergency communication channel. In order to obtain the required parameters, we collected farm locations in Germany with OpenStreetMap. Based on the assumptions of LoRa communication range and considering our use case requirements, connecting farm communities seems theoretically feasible in many areas of our data set. To further analyze our idea, we ran simulations of two common DTN routing protocols with different scenarios. A proof-of-concept implementation allows smaller messages to be transmitted using real hardware and demonstrates that a decentralized communications infrastructure based on commodity hardware is possible.

    @inproceedings{kuntke_rural_2023,
    title = {Rural {Communication} in {Outage} {Scenarios}: {Disruption}-{Tolerant} {Networking} via {LoRaWAN} {Setups}},
    url = {https://idl.iscram.org/files/kuntke/2023/2581_Kuntke_etal2023.pdf},
    abstract = {Since communications infrastructure is subject to many impacts, e.g., destructive natural events, they can potentially collapse at any time. Especially in rural areas, the recovery of public network infrastructure can take some time, so a dedicated communication channel would be advantageous. We explore the possibility of transforming commodity LoRaWAN gateways into meshed network nodes for a digital emergency communication channel. In order to obtain the required parameters, we collected farm locations in Germany with OpenStreetMap. Based on the assumptions of LoRa communication range and considering our use case requirements, connecting farm communities seems theoretically feasible in many areas of our data set. To further analyze our idea, we ran simulations of two common DTN routing protocols with different scenarios. A proof-of-concept implementation allows smaller messages to be transmitted using real hardware and demonstrates that a decentralized communications infrastructure based on commodity hardware is possible.},
    booktitle = {Proceedings of {Information} {Systems} for {Crisis} {Response} and {Management} ({ISCRAM})},
    author = {Kuntke, Franz and Baumgärtner, Lars and Reuter, Christian},
    year = {2023},
    keywords = {Crisis, Security, RSF, Projekt-MAKI, Projekt-GeoBox, Projekt-emergenCITY, Projekt-AgriRegio},
    pages = {1--13},
    }

  • Leon Würsching, Florentin Putz, Steffen Haesler, Matthias Hollick (2023)
    FIDO2 the Rescue? Platform vs. Roaming Authentication on Smartphones
    Proceedings of the Conference on Human Factors in Computing Systems (CHI) (Best Paper Award) New York, NY, USA. doi:10.1145/3544548.3580993
    [BibTeX] [Abstract] [Download PDF]

    Modern smartphones support FIDO2 passwordless authentication using either external security keys or internal biometric authentication, but it is unclear whether users appreciate and accept these new forms of web authentication for their own accounts. We present the first lab study (N=87) comparing platform and roaming authentication on smartphones, determining the practical strengths and weaknesses of FIDO2 as perceived by users in a mobile scenario. Most participants were willing to adopt passwordless authentication during our in-person user study, but closer analysis shows that participants prioritize usability, security, and availability differently depending on the account type. We identify remaining adoption barriers that prevent FIDO2 from succeeding password authentication, such as missing support for contemporary usage patterns, including account delegation and usage on multiple clients.

    @inproceedings{wursching_fido2_2023,
    address = {New York, NY, USA},
    series = {{CHI} '23},
    title = {{FIDO2} the {Rescue}? {Platform} vs. {Roaming} {Authentication} on {Smartphones}},
    url = {https://peasec.de/paper/2023/2023_WuerschingPutzHaeslerHollick_PlatformvsRoamingAuthenticationonSmartphones_CHI.pdf},
    doi = {10.1145/3544548.3580993},
    abstract = {Modern smartphones support FIDO2 passwordless authentication using either external security keys or internal biometric authentication, but it is unclear whether users appreciate and accept these new forms of web authentication for their own accounts. We present the first lab study (N=87) comparing platform and roaming authentication on smartphones, determining the practical strengths and weaknesses of FIDO2 as perceived by users in a mobile scenario. Most participants were willing to adopt passwordless authentication during our in-person user study, but closer analysis shows that participants prioritize usability, security, and availability differently depending on the account type. We identify remaining adoption barriers that prevent FIDO2 from succeeding password authentication, such as missing support for contemporary usage patterns, including account delegation and usage on multiple clients.},
    booktitle = {Proceedings of the {Conference} on {Human} {Factors} in {Computing} {Systems} ({CHI}) ({Best} {Paper} {Award})},
    publisher = {Association for Computing Machinery},
    author = {Würsching, Leon and Putz, Florentin and Haesler, Steffen and Hollick, Matthias},
    year = {2023},
    note = {event-place: Hamburg, HH, Germany},
    keywords = {HCI, UsableSec, Security, A-Paper, Ranking-CORE-A*, AuswahlUsableSec, Projekt-emergenCITY},
    }

  • Jonas Höchst, Lars Baumgärtner, Franz Kuntke, Alvar Penning, Artur Sterz, Markus Sommer, Bernd Freisleben (2023)
    Mobile Device-to-Device Communication for Crisis Scenarios Using Low-Cost LoRa Modems
    In: Hans Jochen Scholl, Eric E. Holdeman, Kees F. Boersma: Disaster Management and Information Technology: Professional Response and Recovery Management in the Age of Disasters. Cham: Springer International Publishing, , 235–268. doi:10.1007/978-3-031-20939-0_12
    [BibTeX] [Abstract] [Download PDF]

    We present an approach to enable long-range device-to-device communication between smartphones in crisis situations. Our approach is based on inexpensive and readily available microcontrollers with integrated LoRa hardware that we empower to receive and forward messages via Bluetooth, Wi-Fi, or a serial connection by means of a dedicated firmware, called rf95modem. The developed firmware cannot only be used in crisis scenarios but also in a variety of other applications, such as providing a communication fallback during outdoor activities, geolocation-based games or broadcasting of local information. We present two applications to show the benefits of our approach. First, we introduce a novel device-to-device LoRa chat application that works on both Android and iOS as well as on traditional computers like notebooks using a console-based interface. Second, we demonstrate how other infrastructure-less technology can benefit from our approach by integrating it into the DTN7 delay-tolerant networking software. Furthermore, we present the results of an in-depth experimental evaluation of approach consisting of (i) real-world device-to-device LoRa transmissions in urban and rural areas and (ii) scalability tests based on simulations of LoRa device-to-device usage in a medium-sized city with up to 1000 active users. The firmware, our device-to-device chat application, our integration into DTN7, as well as our code fragments of the experimental evaluation and the experimental results are available under permissive open-source licenses.

    @incollection{hochst_mobile_2023,
    address = {Cham},
    title = {Mobile {Device}-to-{Device} {Communication} for {Crisis} {Scenarios} {Using} {Low}-{Cost} {LoRa} {Modems}},
    isbn = {978-3-031-20939-0},
    url = {https://peasec.de/paper/2023/2023_HoechstBaumgaertnerKuntkePenningSterzSommerFreisleben_MobileD2DCommunication_DMaIT.pdf},
    abstract = {We present an approach to enable long-range device-to-device communication between smartphones in crisis situations. Our approach is based on inexpensive and readily available microcontrollers with integrated LoRa hardware that we empower to receive and forward messages via Bluetooth, Wi-Fi, or a serial connection by means of a dedicated firmware, called rf95modem. The developed firmware cannot only be used in crisis scenarios but also in a variety of other applications, such as providing a communication fallback during outdoor activities, geolocation-based games or broadcasting of local information. We present two applications to show the benefits of our approach. First, we introduce a novel device-to-device LoRa chat application that works on both Android and iOS as well as on traditional computers like notebooks using a console-based interface. Second, we demonstrate how other infrastructure-less technology can benefit from our approach by integrating it into the DTN7 delay-tolerant networking software. Furthermore, we present the results of an in-depth experimental evaluation of approach consisting of (i) real-world device-to-device LoRa transmissions in urban and rural areas and (ii) scalability tests based on simulations of LoRa device-to-device usage in a medium-sized city with up to 1000 active users. The firmware, our device-to-device chat application, our integration into DTN7, as well as our code fragments of the experimental evaluation and the experimental results are available under permissive open-source licenses.},
    booktitle = {Disaster {Management} and {Information} {Technology}: {Professional} {Response} and {Recovery} {Management} in the {Age} of {Disasters}},
    publisher = {Springer International Publishing},
    author = {Höchst, Jonas and Baumgärtner, Lars and Kuntke, Franz and Penning, Alvar and Sterz, Artur and Sommer, Markus and Freisleben, Bernd},
    editor = {Scholl, Hans Jochen and Holdeman, Eric E. and Boersma, F. Kees},
    year = {2023},
    doi = {10.1007/978-3-031-20939-0_12},
    keywords = {Crisis, Security, RSF, Projekt-emergenCITY, Projekt-ATHENE},
    pages = {235--268},
    }

  • Steffen Haesler, Marc Wendelborn, Christian Reuter (2023)
    Getting the Residents‘ Attention: The Perception of Warning Channels in Smart Home Warning Systems
    Proceedings of the ACM Designing Interactive Systems Conference (DIS) New York, NY, USA. doi:10.1145/3563657.3596076
    [BibTeX] [Abstract] [Download PDF]

    About half a billion households are expected to use smart home systems by 2025. Although many IoT sensors, such as smoke detectors or security cameras, are available and governmental crisis warning systems are in place, little is known about how to warn appropriately in smart home environments. We created a Raspberry Pi based prototype with a speaker, a display, and a connected smart light bulb. Together with a focus group, we developed a taxonomy for warning messages in smart home environments, dividing them into five classes with different stimuli. We evaluated the taxonomy using the Experience Sampling Method (ESM) in a field study at participants‘ (N = 13) homes testing 331 warnings. The results show that taxonomy-based warning stimuli are perceived to be appropriate and participants could imagine using such a warning system. We propose a deeper integration of warning capabilities into smart home environments to enhance the safety of citizens.

    @inproceedings{haesler_getting_2023,
    address = {New York, NY, USA},
    series = {{DIS} '23},
    title = {Getting the {Residents}' {Attention}: {The} {Perception} of {Warning} {Channels} in {Smart} {Home} {Warning} {Systems}},
    isbn = {978-1-4503-9893-0},
    url = {https://peasec.de/paper/2023/2023_HaeslerWendelbornReuter_SmartHomeWarningSystems_DIS},
    doi = {10.1145/3563657.3596076},
    abstract = {About half a billion households are expected to use smart home systems by 2025. Although many IoT sensors, such as smoke detectors or security cameras, are available and governmental crisis warning systems are in place, little is known about how to warn appropriately in smart home environments. We created a Raspberry Pi based prototype with a speaker, a display, and a connected smart light bulb. Together with a focus group, we developed a taxonomy for warning messages in smart home environments, dividing them into five classes with different stimuli. We evaluated the taxonomy using the Experience Sampling Method (ESM) in a field study at participants' (N = 13) homes testing 331 warnings. The results show that taxonomy-based warning stimuli are perceived to be appropriate and participants could imagine using such a warning system. We propose a deeper integration of warning capabilities into smart home environments to enhance the safety of citizens.},
    booktitle = {Proceedings of the {ACM} {Designing} {Interactive} {Systems} {Conference} ({DIS})},
    publisher = {Association for Computing Machinery},
    author = {Haesler, Steffen and Wendelborn, Marc and Reuter, Christian},
    year = {2023},
    note = {event-place: Pittsburgh, PA, USA},
    keywords = {Crisis, HCI, Student, A-Paper, Ranking-CORE-A, Projekt-ATHENE-SecUrban, Projekt-emergenCITY},
    pages = {1114--1127},
    }

  • Christian Reuter, Marc-André Kaufhold, Tom Biselli, Helene Pleil (2023)
    Increasing Adoption Despite Perceived Limitations of Social Media in Emergencies: Representative Insights on German Citizens’ Perception and Trends from 2017 to 2021
    International Journal of Disaster Risk Reduction (IJDRR) ;96. doi:https://doi.org/10.1016/j.ijdrr.2023.103880
    [BibTeX] [Abstract] [Download PDF]

    The value of social media in crises, disasters, and emergencies across different events, participants, and states is now well-examined in crisis informatics research. Previous research has contributed to the state of the art with empirical insights on the use of social media, approaches for the gathering and processing of big social data, the design and evaluation of information systems, and the analysis of cumulative and longitudinal data. While some studies examined social media use representatively for their target audience, these usually only comprise a single point of inquiry and do not allow for a trend analysis. This work provides results (1) of a representative survey with German citizens from 2021 on use patterns, perceptions, and expectations regarding social media during emergencies. Furthermore, it (2) compares these results to previous surveys and provides insights on temporal changes and trends from 2017, over 2019 to 2021. Our findings highlight that social media use in emergencies increased in 2021 and 2019 compared to 2017. Between 2019 and 2021, the amount of information shared on social media remained on a similar level, while the perceived disadvantages of social media in emergencies significantly increased. In light of demographic variables, the results of the 2021 survey confirm previous findings, according to which older individuals (45+ years) use social media in emergencies less often than younger individuals (18-24 years). Furthermore, while the quicker availability of information was one of the reasons for social media use, especially the potential information overload was a key factor for not using social media in emergencies. The results are discussed in light of the dynamic nature of attitudes regarding social media in emergencies and the need to account for heterogeneity in user expectations to build trustworthy information ecosystems in social media.

    @article{reuter_increasing_2023,
    title = {Increasing {Adoption} {Despite} {Perceived} {Limitations} of {Social} {Media} in {Emergencies}: {Representative} {Insights} on {German} {Citizens}’ {Perception} and {Trends} from 2017 to 2021},
    volume = {96},
    issn = {2212-4209},
    url = {https://peasec.de/paper/2023/2023_ReuterKaufholdBiselliPleil_SocialMediaEmergenciesSurvey_IJDRR.pdf},
    doi = {https://doi.org/10.1016/j.ijdrr.2023.103880},
    abstract = {The value of social media in crises, disasters, and emergencies across different events, participants, and states is now well-examined in crisis informatics research. Previous research has contributed to the state of the art with empirical insights on the use of social media, approaches for the gathering and processing of big social data, the design and evaluation of information systems, and the analysis of cumulative and longitudinal data. While some studies examined social media use representatively for their target audience, these usually only comprise a single point of inquiry and do not allow for a trend analysis. This work provides results (1) of a representative survey with German citizens from 2021 on use patterns, perceptions, and expectations regarding social media during emergencies. Furthermore, it (2) compares these results to previous surveys and provides insights on temporal changes and trends from 2017, over 2019 to 2021. Our findings highlight that social media use in emergencies increased in 2021 and 2019 compared to 2017. Between 2019 and 2021, the amount of information shared on social media remained on a similar level, while the perceived disadvantages of social media in emergencies significantly increased. In light of demographic variables, the results of the 2021 survey confirm previous findings, according to which older individuals (45+ years) use social media in emergencies less often than younger individuals (18-24 years). Furthermore, while the quicker availability of information was one of the reasons for social media use, especially the potential information overload was a key factor for not using social media in emergencies. The results are discussed in light of the dynamic nature of attitudes regarding social media in emergencies and the need to account for heterogeneity in user expectations to build trustworthy information ecosystems in social media.},
    journal = {International Journal of Disaster Risk Reduction (IJDRR)},
    author = {Reuter, Christian and Kaufhold, Marc-André and Biselli, Tom and Pleil, Helene},
    year = {2023},
    keywords = {AuswahlCrisis, Crisis, SocialMedia, Student, A-Paper, Ranking-ImpactFactor, Projekt-emergenCITY, Projekt-NEBULA, Projekt-CYLENCE},
    }

  • Marco Zivkovic, Jonas Franken, Nadja Thiessen, Jens Ivo Engels, Christian Reuter (2023)
    Infrastrukturen und historisches Wissen: Eine interdisziplinäre Analyse der Resilienz von Schienen- und Kabelnetzen
    Tagungsband Fachtagung Katastrophenforschung 2023 Leoben.
    [BibTeX] [Abstract] [Download PDF]

    Im Forschungsprojekt “ Das Netz hat Geschichte: Netzwerk- und Vulnerabilitätsanalyse Kritischer Infrastrukturen am Beispiel IKT und Verkehr in Rhein/Main”“ wird das historische Wachstum von IKT- und Schieneninfrastrukturnetzen, sowie daraus erwachsene Konsequenzen für deren Vulnerabilitäten am Beispiel der Rhein-Main-Region interdisziplinär untersucht. Beide Infrastrukturnetze entstanden über Jahrzehnte hinweg und sind das Ergebnis verschiedener Interessen und technischer Entwicklungen aus unterschiedlichen Zeitschichten. Dies beeinflusst die Widerstandsfähigkeit der Netze und birgt potenzielle Risiken. Anhand von ca. 20 Expert:inneninterviews soll das Wissen von Praktiker:innen über das Alter, die Ausbreitung, technische Neuerungen und deren Auswirkungen analysiert werden. Die Forschung basiert auf dem Zeitschichtenmodell von Koselleck, das es ermöglicht, die verschiedenen zeitlichen Ebenen der Infrastrukturentwicklung zu analysieren. Die Ergebnisse der semi-strukturierten Interviewstudie zum impliziten Wissen der Befragten werden genutzt, um Hypothesen zu generieren, die später mittels Archivstudien und Netzwerkanalysen überprüft werden. Die gewonnenen Erkenntnisse können zur Stärkung der Resilienz von Infrastrukturen, insbesondere bei Katastrophenszenarien regionalen Ausmaßes, und zukünftigen Investitionsentscheidungen beitragen.

    @inproceedings{zivkovic_infrastrukturen_2023,
    address = {Leoben},
    title = {Infrastrukturen und historisches {Wissen}: {Eine} interdisziplinäre {Analyse} der {Resilienz} von {Schienen}- und {Kabelnetzen}},
    isbn = {978-3-900397-11-1},
    url = {https://peasec.de/paper/2023/2023_ZivkovicFrankenThiessenEngelsReuter_InfrastrukturenHistorischesWissen_FKF23.pdf},
    abstract = {Im Forschungsprojekt " Das Netz hat Geschichte: Netzwerk- und Vulnerabilitätsanalyse Kritischer Infrastrukturen am Beispiel IKT und Verkehr in Rhein/Main”" wird das historische Wachstum von IKT- und Schieneninfrastrukturnetzen, sowie daraus erwachsene Konsequenzen für deren Vulnerabilitäten am Beispiel der Rhein-Main-Region interdisziplinär untersucht. Beide Infrastrukturnetze entstanden über Jahrzehnte hinweg und sind das Ergebnis verschiedener Interessen und technischer Entwicklungen aus unterschiedlichen Zeitschichten. Dies beeinflusst die Widerstandsfähigkeit der Netze und birgt potenzielle Risiken. Anhand von ca. 20 Expert:inneninterviews soll das Wissen von Praktiker:innen über das Alter, die Ausbreitung, technische Neuerungen und deren Auswirkungen analysiert werden. Die Forschung basiert auf dem Zeitschichtenmodell von Koselleck, das es ermöglicht, die verschiedenen zeitlichen Ebenen der Infrastrukturentwicklung zu analysieren. Die Ergebnisse der semi-strukturierten Interviewstudie zum impliziten Wissen der Befragten werden genutzt, um Hypothesen zu generieren, die später mittels Archivstudien und Netzwerkanalysen überprüft werden. Die gewonnenen Erkenntnisse können zur Stärkung der Resilienz von Infrastrukturen, insbesondere bei Katastrophenszenarien regionalen Ausmaßes, und zukünftigen Investitionsentscheidungen beitragen.},
    booktitle = {Tagungsband {Fachtagung} {Katastrophenforschung} 2023},
    publisher = {Disaster Competence Network Austria},
    author = {Zivkovic, Marco and Franken, Jonas and Thiessen, Nadja and Engels, Jens Ivo and Reuter, Christian},
    year = {2023},
    keywords = {Crisis, Security, Infrastructure, Projekt-ATHENE-SecUrban, Projekt-emergenCITY, Projekt-NetzGeschichte},
    }

  • Jonas Franken, Marco Zivkovic, Nadja Thiessen, Jens Ivo Engels, Christian Reuter (2023)
    Das Netz hat Geschichte: Historisch-technische Analyse der kritischen Infrastrukturen in der Region Rhein/Main
    In: : INFORMATIK 2023 – Designing Futures: Zukünfte gestalten. Bonn: Gesellschaft für Informatik e. V., , 1–6. doi:10.18420/inf2023_159
    [BibTeX] [Abstract] [Download PDF]

    Kritische Infrastrukturen sind häufig über Jahrzehnte gewachsene, komplexe Netze. Dennoch fehlt derzeit die historische Perspektive auf die Aufschichtungstendenzen von Technologien in den Sektoren, die für die Gesellschaft essenzielle Dienste bereitstellen. Ein besseres Verständnis von Ausbreitungs-, Ausbau-, Ersatz- und Ausmusterungsprozessen kann Entscheidungshilfe und Orientierung für resilientere Versorgungsnetzarchitekturen in der Zukunft geben. Kompatibilitätsprobleme mit Legacy-Soft- und Hardware sind bekannte Phänomene in vielen KRITIS-Einrichtungen. Entsprechend gewinnen Wissens- und Erfahrungstransfers bei zunehmend komplexen, dennoch über Jahrzehnte verwendete Technologien in landwirtschaftlichen Betrieben enorm an Bedeutung. Der Beitrag vollzieht die Konzeption und Fragestellungen eines interdisziplinären Forschungsprojekts nach, in welchem die Verwundbarkeit der kritischen Infrastruktursektoren Verkehr und Kommunikation im Rhein-Main-Gebiet analysiert wird. Von den Leistungen beider Sektoren hängt die digitale Landwirtschaft stark ab. Insbesondere rurale, beim digitalen und Schienennetzausbau häufig vernachlässigte Gebiete werden dabei mittels explorativer Interviewstudie und anschließender archivbasierter, quantitativer Überprüfung der zuvor generierten Hypothesen aus einer raum-zeitlichen und technischen Perspektive untersucht.

    @incollection{franken_netz_2023,
    address = {Bonn},
    title = {Das {Netz} hat {Geschichte}: {Historisch}-technische {Analyse} der kritischen {Infrastrukturen} in der {Region} {Rhein}/{Main}},
    url = {https://peasec.de/paper/2023/2023_FrankenZivkovicThiessenEngelsReuter_NetzGeschichte_GI.pdf},
    abstract = {Kritische Infrastrukturen sind häufig über Jahrzehnte gewachsene, komplexe Netze. Dennoch fehlt derzeit die historische Perspektive auf die Aufschichtungstendenzen von Technologien in den Sektoren, die für die Gesellschaft essenzielle Dienste bereitstellen. Ein besseres Verständnis von Ausbreitungs-, Ausbau-, Ersatz- und Ausmusterungsprozessen kann Entscheidungshilfe und Orientierung für resilientere Versorgungsnetzarchitekturen in der Zukunft geben. Kompatibilitätsprobleme mit Legacy-Soft- und Hardware sind bekannte Phänomene in vielen KRITIS-Einrichtungen. Entsprechend gewinnen Wissens- und Erfahrungstransfers bei zunehmend komplexen, dennoch über Jahrzehnte verwendete Technologien in landwirtschaftlichen Betrieben enorm an Bedeutung. Der Beitrag vollzieht die Konzeption und Fragestellungen eines interdisziplinären Forschungsprojekts nach, in welchem die Verwundbarkeit der kritischen Infrastruktursektoren Verkehr und Kommunikation im Rhein-Main-Gebiet analysiert wird. Von den Leistungen beider Sektoren hängt die digitale Landwirtschaft stark ab. Insbesondere rurale, beim digitalen und Schienennetzausbau häufig vernachlässigte Gebiete werden dabei mittels explorativer Interviewstudie und anschließender archivbasierter, quantitativer Überprüfung der zuvor generierten Hypothesen aus einer raum-zeitlichen und technischen Perspektive untersucht.},
    booktitle = {{INFORMATIK} 2023 - {Designing} {Futures}: {Zukünfte} gestalten},
    publisher = {Gesellschaft für Informatik e. V.},
    author = {Franken, Jonas and Zivkovic, Marco and Thiessen, Nadja and Engels, Jens Ivo and Reuter, Christian},
    year = {2023},
    doi = {10.18420/inf2023_159},
    keywords = {Security, Infrastructure, Projekt-ATHENE-SecUrban, Projekt-emergenCITY, Projekt-AgriRegio},
    pages = {1--6},
    }

    2022

  • Jasmin Haunschild, Marc-André Kaufhold, Christian Reuter (2022)
    Cultural Violence and Fragmentation on Social Media: Interventions and Countermeasures by Humans and Social Bots
    In: Myriam Dunn Cavelty, Andreas Wenger: Cyber Security Politics: Socio-Technological Transformations and Political Fragmentation. Routledge, , 48–63.
    [BibTeX] [Abstract] [Download PDF]

    Mobile technologies and social media services are among the socio-technological innovations that have an enormous impact transforming modern culture and political processes. Social media are often defined as a “group of internet-based applications […] that allow the creation and exchange of user-generated content” (Kaplan and Haenlein 2010). Shaping opinions, politics, participation, and protest (Wulf et al. 2013), they are used by citizens for news consumption and social exchange (Robinson et al. 2017); by journalists for reporting, analyzing, and collecting information (Stieglitz et al. 2018a); and by organizations to monitor crises, emergencies, customer feedback, and sentiment, among others (Haunschild et al. 2020). Large-scale international events, such as the 2010 Arab Spring, showcased the potential of socio-technological transformations: Citizens were not passive victims but active and autonomous participants utilizing social media to coordinate protest and for crisis response (Reuter and Kaufhold 2018). However, in other cases, citizens’ activities coordinated via social media also increased the complexity of tasks and pressure for formal authorities, since the lack of state control has not had only empowering or benign effects. Instead, on social media, false information spreads fast and it is easy for groups to find an audience there, either to enhance their profit or to target vulnerable groups with dangerous ideology.

    @incollection{haunschild_cultural_2022,
    title = {Cultural {Violence} and {Fragmentation} on {Social} {Media}: {Interventions} and {Countermeasures} by {Humans} and {Social} {Bots}},
    isbn = {978-0-367-62674-7},
    url = {https://peasec.de/paper/2022/2022_HaunschildKaufholdReuter_SocialMediaAndFragmentation_Routledge.pdf},
    abstract = {Mobile technologies and social media services are among the socio-technological innovations that have an enormous impact transforming modern culture and political processes. Social media are often defined as a “group of internet-based applications […] that allow the creation and exchange of user-generated content” (Kaplan and Haenlein 2010). Shaping opinions, politics, participation, and protest (Wulf et al. 2013), they are used by citizens for news consumption and social exchange (Robinson et al. 2017); by journalists for reporting, analyzing, and collecting information (Stieglitz et al. 2018a); and by organizations to monitor crises, emergencies, customer feedback, and sentiment, among others (Haunschild et al. 2020). Large-scale international events, such as the 2010 Arab Spring, showcased the potential of socio-technological transformations: Citizens were not passive victims but active and autonomous participants utilizing social media to coordinate protest and for crisis response (Reuter and Kaufhold 2018). However, in other cases, citizens’ activities coordinated via social media also increased the complexity of tasks and pressure for formal authorities, since the lack of state control has not had only empowering or benign effects. Instead, on social media, false information spreads fast and it is easy for groups to find an audience there, either to enhance their profit or to target vulnerable groups with dangerous ideology.},
    booktitle = {Cyber {Security} {Politics}: {Socio}-{Technological} {Transformations} and {Political} {Fragmentation}},
    publisher = {Routledge},
    author = {Haunschild, Jasmin and Kaufhold, Marc-André and Reuter, Christian},
    editor = {Cavelty, Myriam Dunn and Wenger, Andreas},
    year = {2022},
    keywords = {Crisis, SocialMedia, Peace, Projekt-ATHENE-SecUrban, Projekt-CYWARN, Projekt-emergenCITY},
    pages = {48--63},
    }

  • Christian Reuter (2022)
    A European Perspective on Crisis Informatics: Citizens‘ and Authorities‘ attitudes towards Social Media for Public Safety and Security
    1 ed. Wiesbaden: Springer Vieweg. doi:https://doi.org/10.1007/978-3-658-39720-3
    [BibTeX] [Abstract] [Download PDF]

    Mobilising helpers in the event of a flood or letting friends know that you are okay in the event of a terrorist attack – more and more people are using social media in emergency, crisis or disaster situations. Storms, floods, attacks or pandemics (esp. COVID-19) show that citizens use social media to inform themselves or to coordinate. This thesis presents qualitative and quantitative studies on the attitudes of emergency services and citizens in Europe towards social media in emergencies. Across the individual sub-studies, almost 10,000 people are surveyed including representative studies in the Netherlands, Germany, the UK and Italy. The work empirically shows that social media is increasingly important for emergency services, both for prevention and during crises; that private use of social media is a driving force in shaping opinions for organisational use; and that citizens have high expectations towards authorities, especially monitoring social media is expected, and sometimes responses within one hour. Depending on the risk culture, the data show further differences, e.g. whether the state (Germany) or the individual (Netherlands) is seen as primarily responsible for coping with the situation.

    @book{reuter_european_2022,
    address = {Wiesbaden},
    edition = {1},
    title = {A {European} {Perspective} on {Crisis} {Informatics}: {Citizens}' and {Authorities}' attitudes towards {Social} {Media} for {Public} {Safety} and {Security}},
    isbn = {978-3-658-39719-7},
    url = {https://link.springer.com/book/10.1007/978-3-658-39720-3},
    abstract = {Mobilising helpers in the event of a flood or letting friends know that you are okay in the event of a terrorist attack – more and more people are using social media in emergency, crisis or disaster situations. Storms, floods, attacks or pandemics (esp. COVID-19) show that citizens use social media to inform themselves or to coordinate. This thesis presents qualitative and quantitative studies on the attitudes of emergency services and citizens in Europe towards social media in emergencies. Across the individual sub-studies, almost 10,000 people are surveyed including representative studies in the Netherlands, Germany, the UK and Italy. The work empirically shows that social media is increasingly important for emergency services, both for prevention and during crises; that private use of social media is a driving force in shaping opinions for organisational use; and that citizens have high expectations towards authorities, especially monitoring social media is expected, and sometimes responses within one hour. Depending on the risk culture, the data show further differences, e.g. whether the state (Germany) or the individual (Netherlands) is seen as primarily responsible for coping with the situation.},
    language = {en},
    publisher = {Springer Vieweg},
    author = {Reuter, Christian},
    year = {2022},
    doi = {https://doi.org/10.1007/978-3-658-39720-3},
    keywords = {Crisis, HCI, SocialMedia, Projekt-EmerGent, Projekt-KontiKat, Projekt-ATHENE-SecUrban, Projekt-emergenCITY, Dissertation},
    }

  • Christian Bueger, Tobias Liebetrau, Jonas Franken (2022)
    Security threats to undersea communications cables and infrastructure – consequences for the EU
    Brussels: European Parliament.
    [BibTeX] [Abstract] [Download PDF]

    The EU’s subsea data cable network is both vital for global connectivity and vulnerable. This study provides a systematic review of the current security threats, as well as the actors at the origin of these threats. Building on reports and expert input, the paper takes stock of current awareness, preparedness and response mechanisms, both at the EU and Member State level. A number of recommendations suggest how to improve the resilience of the cable network. Proposals build on the need to enhance EU-wide awareness, improve coordination and share information across EU institutions and Member States. In addition, surveillance capabilities must be advanced, response and repair mechanisms strengthened, and the topic mainstreamed across external action.

    @book{bueger_security_2022,
    address = {Brussels},
    title = {Security threats to undersea communications cables and infrastructure – consequences for the {EU}},
    url = {https://www.europarl.europa.eu/thinktank/en/document/EXPO_IDA(2022)702557},
    abstract = {The EU’s subsea data cable network is both vital for global connectivity and vulnerable. This study provides a systematic review of the current security threats, as well as the actors at the origin of these threats. Building on reports and expert input, the paper takes stock of current awareness, preparedness and response mechanisms, both at the EU and Member State level. A number of recommendations suggest how to improve the resilience of the cable network. Proposals build on the need to enhance EU-wide awareness, improve coordination and share information across EU institutions and Member States. In addition, surveillance capabilities must be advanced, response and repair mechanisms strengthened, and the topic mainstreamed across external action.},
    publisher = {European Parliament},
    author = {Bueger, Christian and Liebetrau, Tobias and Franken, Jonas},
    year = {2022},
    keywords = {Student, Security, Infrastructure, Cyberwar, Projekt-ATHENE-SecUrban, Projekt-emergenCITY},
    }

  • Denis Orlov, Simon Möller, Sven Düfler, Steffen Haesler, Christian Reuter (2022)
    Detecting a Crisis: Comparison of Self-Reported vs. Automated Internet Outage Measuring Methods
    Mensch und Computer – Workshopband Darmstadt. doi:10.18420/muc2022-mci-ws10-321
    [BibTeX] [Abstract] [Download PDF]

    Every day, there are internet disruptions or outages around the world that affect our daily lives. In this paper, we analyzed these events in Germany in recent years and found out how they can be detected, and what impact they have on citizens, especially in crisis situations. For this purpose, we take a look at two different approaches to recording internet outages, namely the self-reporting of citizens and automatic reporting by algorithmic examination of the availability of IP networks. We evaluate the data of six major events with regard to their meaningfulness in quality and quantity. We found that due to the amount of data and the inherent imprecision of the methods used, it is difficult to detect outages through algorithmic examination. But once an event is publicly known by self-reporting, they have advantages to capture the temporal and spatial dimensions of the outage due to its nature of objective measurements. As a result, we propose that users’ crowdsourcing can enhance the detection of outages and should be seen as an important starting point to even begin an analysis with algorithm-based techniques, but it is to ISPs and regulatory authorities to support that.

    @inproceedings{orlov_detecting_2022,
    address = {Darmstadt},
    series = {Mensch und {Computer} 2022 - {Workshopband}},
    title = {Detecting a {Crisis}: {Comparison} of {Self}-{Reported} vs. {Automated} {Internet} {Outage} {Measuring} {Methods}},
    url = {https://dl.gi.de/handle/20.500.12116/39089},
    doi = {10.18420/muc2022-mci-ws10-321},
    abstract = {Every day, there are internet disruptions or outages around the world that affect our daily lives. In this paper, we analyzed these events in Germany in recent years and found out how they can be detected, and what impact they have on citizens, especially in crisis situations. For this purpose, we take a look at two different approaches to recording internet outages, namely the self-reporting of citizens and automatic reporting by algorithmic examination of the availability of IP networks. We evaluate the data of six major events with regard to their meaningfulness in quality and quantity. We found that due to the amount of data and the inherent imprecision of the methods used, it is difficult to detect outages through algorithmic examination. But once an event is publicly known by self-reporting, they have advantages to capture the temporal and spatial dimensions of the outage due to its nature of objective measurements. As a result, we propose that users’ crowdsourcing can enhance the detection of outages and should be seen as an important starting point to even begin an analysis with algorithm-based techniques, but it is to ISPs and regulatory authorities to support that.},
    language = {en},
    booktitle = {Mensch und {Computer} - {Workshopband}},
    publisher = {Gesellschaft für Informatik},
    author = {Orlov, Denis and Möller, Simon and Düfler, Sven and Haesler, Steffen and Reuter, Christian},
    year = {2022},
    keywords = {HCI, Student, UsableSec, Security, Projekt-ATHENE-SecUrban, Projekt-emergenCITY},
    }

  • Christian Reuter (2022)
    A European Perspective on Crisis Informatics: Citizens‘ and Authorities‘ attitudes towards Social Media for Public Safety and Security
    Nijmegen: The Radboud University Thesis Repository.
    [BibTeX] [Abstract] [Download PDF]

    Mobilising helpers in the event of a flood or letting friends know that you are okay in the event of a terrorist attack – more and more people are using social media in emergency, crisis or disaster situations. Storms, floods, attacks or pandemics (esp. COVID-19) show that citizens use social media to inform themselves or to coordinate. This thesis presents qualitative and quantitative studies on the attitudes of emergency services and citizens in Europe towards social media in emergencies. Across the individual sub-studies, almost 10,000 people are surveyed including representative studies in the Netherlands, Germany, the UK and Italy. The work empirically shows that social media is increasingly important for emergency services, both for prevention and during crises; that private use of social media is a driving force in shaping opinions for organisational use; and that citizens have high expectations towards authorities, especially monitoring social media is expected, and sometimes responses within one hour. Depending on the risk culture, the data show further differences, e.g. whether the state (Germany) or the individual (Netherlands) is seen as primarily responsible for coping with the situation.

    @book{reuter_european_2022-1,
    address = {Nijmegen},
    title = {A {European} {Perspective} on {Crisis} {Informatics}: {Citizens}' and {Authorities}' attitudes towards {Social} {Media} for {Public} {Safety} and {Security}},
    url = {https://repository.ubn.ru.nl/handle/2066/253000},
    abstract = {Mobilising helpers in the event of a flood or letting friends know that you are okay in the event of a terrorist attack – more and more people are using social media in emergency, crisis or disaster situations. Storms, floods, attacks or pandemics (esp. COVID-19) show that citizens use social media to inform themselves or to coordinate. This thesis presents qualitative and quantitative studies on the attitudes of emergency services and citizens in Europe towards social media in emergencies. Across the individual sub-studies, almost 10,000 people are surveyed including representative studies in the Netherlands, Germany, the UK and Italy. The work empirically shows that social media is increasingly important for emergency services, both for prevention and during crises; that private use of social media is a driving force in shaping opinions for organisational use; and that citizens have high expectations towards authorities, especially monitoring social media is expected, and sometimes responses within one hour. Depending on the risk culture, the data show further differences, e.g. whether the state (Germany) or the individual (Netherlands) is seen as primarily responsible for coping with the situation.},
    publisher = {The Radboud University Thesis Repository},
    author = {Reuter, Christian},
    year = {2022},
    keywords = {AuswahlCrisis, Crisis, HCI, Selected, SocialMedia, Projekt-EmerGent, Projekt-KontiKat, Projekt-ATHENE-SecUrban, Projekt-emergenCITY, Dissertation},
    }

  • Markus Bayer, Marc-André Kaufhold, Björn Buchhold, Marcel Keller, Jörg Dallmeyer, Christian Reuter (2022)
    Data Augmentation in Natural Language Processing: A Novel Text Generation Approach for Long and Short Text Classifiers
    International Journal of Machine Learning and Cybernetics (IJMLC) . doi:10.1007/s13042-022-01553-3
    [BibTeX] [Abstract] [Download PDF]

    In many cases of machine learning, research suggests that the development of training data might have a higher relevance than the choice and modelling of classifiers themselves. Thus, data augmentation methods have been developed to improve classifiers by artificially created training data. In NLP, there is the challenge of establishing universal rules for text transformations which provide new linguistic patterns. In this paper, we present and evaluate a text generation method suitable to increase the performance of classifiers for long and short texts. We achieved promising improvements when evaluating short as well as long text tasks with the enhancement by our text generation method. Especially with regard to small data analytics, additive accuracy gains of up to 15.53\% and 3.56\% are achieved within a constructed low data regime, compared to the no augmentation baseline and another data augmentation technique. As the current track of these constructed regimes is not universally applicable, we also show major improvements in several real world low data tasks (up to +4.84 F1-score). Since we are evaluating the method from many perspectives (in total 11 datasets), we also observe situations where the method might not be suitable. We discuss implications and patterns for the successful application of our approach on different types of datasets.

    @article{bayer_data_2022,
    title = {Data {Augmentation} in {Natural} {Language} {Processing}: {A} {Novel} {Text} {Generation} {Approach} for {Long} and {Short} {Text} {Classifiers}},
    url = {https://link.springer.com/article/10.1007/s13042-022-01553-3},
    doi = {10.1007/s13042-022-01553-3},
    abstract = {In many cases of machine learning, research suggests that the development of training data might have a higher relevance than the choice and modelling of classifiers themselves. Thus, data augmentation methods have been developed to improve classifiers by artificially created training data. In NLP, there is the challenge of establishing universal rules for text transformations which provide new linguistic patterns. In this paper, we present and evaluate a text generation method suitable to increase the performance of classifiers for long and short texts. We achieved promising improvements when evaluating short as well as long text tasks with the enhancement by our text generation method. Especially with regard to small data analytics, additive accuracy gains of up to 15.53\% and 3.56\% are achieved within a constructed low data regime, compared to the no augmentation baseline and another data augmentation technique. As the current track of these constructed regimes is not universally applicable, we also show major improvements in several real world low data tasks (up to +4.84 F1-score). Since we are evaluating the method from many perspectives (in total 11 datasets), we also observe situations where the method might not be suitable. We discuss implications and patterns for the successful application of our approach on different types of datasets.},
    journal = {International Journal of Machine Learning and Cybernetics (IJMLC)},
    author = {Bayer, Markus and Kaufhold, Marc-André and Buchhold, Björn and Keller, Marcel and Dallmeyer, Jörg and Reuter, Christian},
    year = {2022},
    keywords = {Student, Security, A-Paper, Ranking-ImpactFactor, Projekt-CYWARN, Projekt-emergenCITY},
    }

  • Jasmin Haunschild, Marc-André Kaufhold, Christian Reuter (2022)
    Perceptions and Use of Warning Apps – Did Recent Crises Lead to Changes in Germany?
    Mensch und Computer – Tagungsband New York. doi:10.1145/3543758.3543770
    [BibTeX] [Abstract] [Download PDF]

    Warning and emergency apps are an integral part of crisis informatics and particularly relevant in countries that currently do not have cell broadcast, such as Germany. Previous studies have shown that such apps are regarded as relevant, but only around 16\% of German citizens used them in 2017 and 2019. With the COVID-19 pandemic and a devastating flash flood, Germany has recently experienced severe crisis-related losses. By comparing data from representative surveys from 2017, 2019 and 2021, this study investigates whether these events have changed the perceptions of warning apps and their usage patterns in Germany. The study shows that while multi-hazard emergency and warning apps have been easily surpassed in usage by COVID-19 contact tracing apps, the use of warning apps has also increased and the pandemic has added new desired features. While these have been little-used during the COVID-19 pandemic, especially non-users see smartphone messengers app channels as possible alternatives to warning apps. In addition, regional warning apps appear promising, possibly because they make choosing a warning app easier when there are several available on the market.

    @inproceedings{haunschild_perceptions_2022,
    address = {New York},
    title = {Perceptions and {Use} of {Warning} {Apps} – {Did} {Recent} {Crises} {Lead} to {Changes} in {Germany}?},
    url = {http://www.peasec.de/paper/2022/2022_HaunschildKaufholdReuter_WarningAppsChangesGermany_MuC.pdf},
    doi = {10.1145/3543758.3543770},
    abstract = {Warning and emergency apps are an integral part of crisis informatics and particularly relevant in countries that currently do not have cell broadcast, such as Germany. Previous studies have shown that such apps are regarded as relevant, but only around 16\% of German citizens used them in 2017 and 2019. With the COVID-19 pandemic and a devastating flash flood, Germany has recently experienced severe crisis-related losses. By comparing data from representative surveys from 2017, 2019 and 2021, this study investigates whether these events have changed the perceptions of warning apps and their usage patterns in Germany. The study shows that while multi-hazard emergency and warning apps have been easily surpassed in usage by COVID-19 contact tracing apps, the use of warning apps has also increased and the pandemic has added new desired features. While these have been little-used during the COVID-19 pandemic, especially non-users see smartphone messengers app channels as possible alternatives to warning apps. In addition, regional warning apps appear promising, possibly because they make choosing a warning app easier when there are several available on the market.},
    language = {en},
    booktitle = {Mensch und {Computer} - {Tagungsband}},
    publisher = {ACM},
    author = {Haunschild, Jasmin and Kaufhold, Marc-André and Reuter, Christian},
    year = {2022},
    keywords = {Crisis, Projekt-ATHENE-SecUrban, Projekt-CYWARN, Projekt-emergenCITY},
    }

    2021

  • Christian Reuter (2021)
    Sicherheitskritische Mensch-Computer-Interaktion: Interaktive Technologien und Soziale Medien im Krisen- und Sicherheitsmanagement (Zweite Auflage)
    2 ed. Wiesbaden: Springer Vieweg.
    [BibTeX] [Abstract] [Download PDF]

    Die zweite, aktualisierte Auflage dieses Lehr- und Fachbuchs gibt eine fundierte und praxisbezogene Einführung sowie einen Überblick über Grundlagen, Methoden und Anwendungen der Mensch-Computer-Interaktion im Kontext von Sicherheit, Notfällen, Krisen, Katastrophen, Krieg und Frieden. Dies adressierend werden interaktive, mobile, ubiquitäre und kooperative Technologien sowie soziale Medien vorgestellt. Hierbei finden klassische Themen wie benutzbare (IT-)Sicherheit, Industrie 4.0, Katastrophenschutz, Medizin und Automobil, aber auch Augmented Reality, Crowdsourcing, Shitstorm Management, Social Media Analytics und Cyberwar ihren Platz. Methodisch wird das Spektrum von Usable Safety bis Usable Security Engineering von Analyse über Design bis Evaluation abgedeckt. Das Buch eignet sich ebenso als Lehrbuch für Studierende wie als Handbuch für Wissenschaftler, Designer, Entwickler und Anwender.

    @book{reuter_sicherheitskritische_2021,
    address = {Wiesbaden},
    edition = {2},
    title = {Sicherheitskritische {Mensch}-{Computer}-{Interaktion}: {Interaktive} {Technologien} und {Soziale} {Medien} im {Krisen}- und {Sicherheitsmanagement} ({Zweite} {Auflage})},
    isbn = {978-3-658-32795-8},
    url = {https://www.springer.com/de/book/9783658327941},
    abstract = {Die zweite, aktualisierte Auflage dieses Lehr- und Fachbuchs gibt eine fundierte und praxisbezogene Einführung sowie einen Überblick über Grundlagen, Methoden und Anwendungen der Mensch-Computer-Interaktion im Kontext von Sicherheit, Notfällen, Krisen, Katastrophen, Krieg und Frieden. Dies adressierend werden interaktive, mobile, ubiquitäre und kooperative Technologien sowie soziale Medien vorgestellt. Hierbei finden klassische Themen wie benutzbare (IT-)Sicherheit, Industrie 4.0, Katastrophenschutz, Medizin und Automobil, aber auch Augmented Reality, Crowdsourcing, Shitstorm Management, Social Media Analytics und Cyberwar ihren Platz. Methodisch wird das Spektrum von Usable Safety bis Usable Security Engineering von Analyse über Design bis Evaluation abgedeckt. Das Buch eignet sich ebenso als Lehrbuch für Studierende wie als Handbuch für Wissenschaftler, Designer, Entwickler und Anwender.},
    publisher = {Springer Vieweg},
    author = {Reuter, Christian},
    year = {2021},
    keywords = {AuswahlCrisis, HCI, Selected, SocialMedia, UsableSec, Security, Projekt-KontiKat, Peace, Infrastructure, Projekt-ATHENE-SecUrban, Projekt-CYWARN, Projekt-emergenCITY},
    }

  • Jasmin Haunschild, Christian Reuter (2021)
    Perceptions of Police Technology Use and Attitudes Towards the Police – A Representative Survey of the German Population
    Mensch und Computer – Workshopband Bonn. doi:10.18420/muc2021-mci-ws08-255
    [BibTeX] [Abstract] [Download PDF]

    Many Germans perceive a brutalization of society, and state officials also report feeling under attack. At the same time, policing is criticised for becoming increasingly militarised and for having extended surveillance in the course of fighting terrorism. Advancements in HCI are used in the context of many of the issues that policing is facing. In this study, we conduct a representative survey of the German population to investigate personal experiences with and attitudes towards the police and information and communication technologies (ICT) used for policing. We find an overall positive image of the police and uncritical attitudes towards ICT used for general surveillance (body-worn cameras, video surveillance, face recognition) and slightly more critical attitudes towards personal surveillance (e.g. through communication data retention). The study indicates that perceptions differ according to experience of unfair treatment by the police, while other factors such as age and education have similar effects.

    @inproceedings{haunschild_perceptions_2021,
    address = {Bonn},
    title = {Perceptions of {Police} {Technology} {Use} and {Attitudes} {Towards} the {Police} - {A} {Representative} {Survey} of the {German} {Population}},
    volume = {Mensch und Computer 2021 - Workshopband},
    url = {http://www.peasec.de/paper/2021/2021_HaunschildReuter_PoliceTechnologyUseSurvey_MuC-WS.pdf},
    doi = {10.18420/muc2021-mci-ws08-255},
    abstract = {Many Germans perceive a brutalization of society, and state officials also report feeling under attack. At the same time, policing is criticised for becoming increasingly militarised and for having extended surveillance in the course of fighting terrorism. Advancements in HCI are used in the context of many of the issues that policing is facing. In this study, we conduct a representative survey of the German population to investigate personal experiences with and attitudes towards the police and information and communication technologies (ICT) used for policing. We find an overall positive image of the police and uncritical attitudes towards ICT used for general surveillance (body-worn cameras, video surveillance, face recognition) and slightly more critical attitudes towards personal surveillance (e.g. through communication data retention). The study indicates that perceptions differ according to experience of unfair treatment by the police, while other factors such as age and education have similar effects.},
    booktitle = {Mensch und {Computer} - {Workshopband}},
    publisher = {Gesellschaft für Informatik e. V.},
    author = {Haunschild, Jasmin and Reuter, Christian},
    year = {2021},
    keywords = {Security, Projekt-ATHENE-SecUrban, Projekt-CYWARN, Projekt-emergenCITY},
    }

  • Jasmin Haunschild, Selina Pauli, Christian Reuter (2021)
    Citizens‘ Perceived Information Responsibilities and Information Challenges During the COVID-19 Pandemic
    GoodIT ’21: Proceedings of the Conference on Information Technology for Social Good . doi:10.1145/3462203.3475886
    [BibTeX] [Abstract] [Download PDF]

    In crises, citizens show changes in their information behavior, which is mediated by trust in sources, personal relations, online and offline news outlets and information and communication technologies such as apps and social media. Through a repeated one-week survey with closed and open questions of German citizens during the beginning of the COVID-19 pandemic, this study examines citizens‘ perceptions of information responsibilities, their satisfaction with the fulfillment of these responsibilities and their wishes for improving the information flow. The study shows that the dynamism of the crisis and the federally varying strategies burden citizens who perceive an obligation to stay informed, but view agencies as responsible for making information readily available. The study contributes a deeper understanding of citizens‘ needs in crises and discusses implications for design of communication tools for dynamic situations that reduce information overload while fulfilling citizens‘ desire to stay informed.

    @inproceedings{haunschild_citizens_2021,
    title = {Citizens' {Perceived} {Information} {Responsibilities} and {Information} {Challenges} {During} the {COVID}-19 {Pandemic}},
    url = {http://www.peasec.de/paper/2021/2021_HaunschildPauliReuter_InformationResponsibilitiesCovid19_GoodIT.pdf},
    doi = {10.1145/3462203.3475886},
    abstract = {In crises, citizens show changes in their information behavior, which is mediated by trust in sources, personal relations, online and offline news outlets and information and communication technologies such as apps and social media. Through a repeated one-week survey with closed and open questions of German citizens during the beginning of the COVID-19 pandemic, this study examines citizens' perceptions of information responsibilities, their satisfaction with the fulfillment of these responsibilities and their wishes for improving the information flow. The study shows that the dynamism of the crisis and the federally varying strategies burden citizens who perceive an obligation to stay informed, but view agencies as responsible for making information readily available. The study contributes a deeper understanding of citizens' needs in crises and discusses implications for design of communication tools for dynamic situations that reduce information overload while fulfilling citizens' desire to stay informed.},
    booktitle = {{GoodIT} '21: {Proceedings} of the {Conference} on {Information} {Technology} for {Social} {Good}},
    author = {Haunschild, Jasmin and Pauli, Selina and Reuter, Christian},
    year = {2021},
    keywords = {Crisis, Projekt-ATHENE-SecUrban, Projekt-emergenCITY},
    pages = {151--156},
    }

  • Steffen Haesler, Stefka Schmid, Annemike Sophia Vierneisel, Christian Reuter (2021)
    Stronger Together: How Neighborhood Groups Build up a Virtual Network during the COVID-19 Pandemic
    Proceedings of the ACM: Human Computer Interaction (PACM): Computer-Supported Cooperative Work and Social Computing ;5(CSCW2).
    [BibTeX] [Abstract] [Download PDF]

    During crises such as the COVID-19 pandemic, people spontaneously initiate support groups, while establishedorganizations like soccer clubs set non-regular goals, both offering help. Interested in the coordination of suchhelp and potential challenges of collaboration, we conducted a virtual ethnography of a multi-level networklocated in Germany. We focused on aims, activities, and technological mediation, with Activity Theory astheoretical framework. Our findings show that the organizational aim of coordinating help was successfullyachieved by connecting heterogeneous actors through digitization and institutionalization. Enabled by thecontext of the COVID-19 pandemic crisis, the network acted virtually, but was also able to integrate analogspaces of help. We identified six crucial implications regarding the use of technology and collaboration forbuilding a successful volunteering network.

    @article{haesler_stronger_2021,
    title = {Stronger {Together}: {How} {Neighborhood} {Groups} {Build} up a {Virtual} {Network} during the {COVID}-19 {Pandemic}},
    volume = {5},
    url = {https://peasec.de/paper/2021/2021_HaeslerSchmidVierneiselReuter_StrongerTogetherVirtualNetworkCOVID19_CSCW.pdf},
    abstract = {During crises such as the COVID-19 pandemic, people spontaneously initiate support groups, while establishedorganizations like soccer clubs set non-regular goals, both offering help. Interested in the coordination of suchhelp and potential challenges of collaboration, we conducted a virtual ethnography of a multi-level networklocated in Germany. We focused on aims, activities, and technological mediation, with Activity Theory astheoretical framework. Our findings show that the organizational aim of coordinating help was successfullyachieved by connecting heterogeneous actors through digitization and institutionalization. Enabled by thecontext of the COVID-19 pandemic crisis, the network acted virtually, but was also able to integrate analogspaces of help. We identified six crucial implications regarding the use of technology and collaboration forbuilding a successful volunteering network.},
    number = {CSCW2},
    journal = {Proceedings of the ACM: Human Computer Interaction (PACM): Computer-Supported Cooperative Work and Social Computing},
    author = {Haesler, Steffen and Schmid, Stefka and Vierneisel, Annemike Sophia and Reuter, Christian},
    year = {2021},
    keywords = {AuswahlCrisis, Crisis, HCI, Selected, A-Paper, Ranking-CORE-A, Projekt-ATHENE-SecUrban, Projekt-emergenCITY},
    }

  • Steffen Haesler, Ragnark Mogk, Florentin Putz, Kevin T. Logan, Nadja Thiessen, Katharina Kleinschnitger, Lars Baumgärtner, Jan-Philipp Stroscher, Christian Reuter, Michele Knodt, Matthias Hollick (2021)
    Connected Self-Organized Citizens in Crises: An Interdisciplinary Resilience Concept for Neighborhoods
    CSCW ’21 Companion: Conference Companion Publication of the 2021 on Computer Supported Cooperative Work and Social Computing Virtual Event, USA. doi:10.1145/3462204.3481749
    [BibTeX] [Abstract] [Download PDF]

    When facing major crisis events, such as earthquakes, flooding,or attacks on infrastructure, people start to organize within theirneighborhoods. While this has historically been an analog process,people now use collaboration or messenger apps to support theirself-organization. Unfortunately, these apps are not designed to beresilient and fail with communication infrastructure outages whenservers are no longer available. We provide a resilience conceptwith requirements derived from an interdisciplinary view enablingcitizens to communicate and collaborate in everyday life and duringcrisis events. Our human-centered prototype integrates conceptsof nudging for crisis preparedness, decentralized and secure com-munication, participation, smart resource management, historicalknowledge, and legal issues to help guide further research.

    @inproceedings{haesler_connected_2021,
    address = {Virtual Event, USA},
    title = {Connected {Self}-{Organized} {Citizens} in {Crises}: {An} {Interdisciplinary} {Resilience} {Concept} for {Neighborhoods}},
    url = {https://peasec.de/paper/2021/2021_Haesleretal_ConnectedSelfOrganizedCitizensinCrises_CSCWComp.pdf},
    doi = {10.1145/3462204.3481749},
    abstract = {When facing major crisis events, such as earthquakes, flooding,or attacks on infrastructure, people start to organize within theirneighborhoods. While this has historically been an analog process,people now use collaboration or messenger apps to support theirself-organization. Unfortunately, these apps are not designed to beresilient and fail with communication infrastructure outages whenservers are no longer available. We provide a resilience conceptwith requirements derived from an interdisciplinary view enablingcitizens to communicate and collaborate in everyday life and duringcrisis events. Our human-centered prototype integrates conceptsof nudging for crisis preparedness, decentralized and secure com-munication, participation, smart resource management, historicalknowledge, and legal issues to help guide further research.},
    booktitle = {{CSCW} '21 {Companion}: {Conference} {Companion} {Publication} of the 2021 on {Computer} {Supported} {Cooperative} {Work} and {Social} {Computing}},
    publisher = {ACM},
    author = {Haesler, Steffen and Mogk, Ragnark and Putz, Florentin and Logan, Kevin T. and Thiessen, Nadja and Kleinschnitger, Katharina and Baumgärtner, Lars and Stroscher, Jan-Philipp and Reuter, Christian and Knodt, Michele and Hollick, Matthias},
    year = {2021},
    keywords = {Crisis, Projekt-ATHENE-SecUrban, Projekt-emergenCITY},
    }

  • Jasmin Haunschild, Kilian Demuth, Henri-Jacques Geiß, Christian Richter, Christian Reuter (2021)
    Nutzer, Sammler, Entscheidungsträger? Arten der Bürgerbeteiligung in Smart Cities
    HMD Praxis der Wirtschaftsinformatik ;58. doi:10.1365/s40702-021-00770-8
    [BibTeX] [Abstract] [Download PDF]

    Digitalisierung ist ein präsenter Faktor in vielen Städten. So existieren bereits viele Smart-City-Initiativen, bei denen Städte versuchen, ihre Prozesse durch Erfassung und Verknüpfung von Daten, oft unter Zuhilfenahme von Datenplattformen, zu optimieren. In Anbetracht der damit einhergehenden großen Investitionen und Veränderungen wird Bürgerbeteiligung als zentraler Faktor für den Erfolg solcher Initiativen betrachtet. Bisher ist allerdings nicht klar, was typische Beteiligungsformate von Smart-City-Initiativen sind und welche Rolle(n) BürgerInnen dabei einnehmen. Dieser Beitrag leitet mittels einer Literaturanalyse zu Smart Cities ein Kategorienschema zu typischen Bürgerbeteiligungsarten ab. Die Analyse ergab, dass sich Einbindung von BürgerInnen in politische Entscheidungen und bei der Entwicklung technischer Artefakte maßgeblich auf e‑Government oder Participatory Design bezieht. Im Hinblick auf die Beteiligungsarten zeigt sich, dass Makrofabriken, Living Labs und Open-Data-Plattformen häufige Ansätze sind, um BürgerInnen als Co-Creators einzubinden. Zudem werden BürgerInnen mit Citizen Sensing zur Erfassung von Daten oder Missständen einbezogen. Dabei zeigen sich sowohl aktivere, als auch eher passive Beteiligungsarten. Die Analyse zeigt, dass die Einbindung von BürgerInnen häufig entweder auf eine Beteiligung an politischen Entscheidungen oder an der Entwicklung technischer Artefakte abzielt. Auch wenn keine klare Abgrenzung möglich ist, sind diese Ansätze dann eher durch e‑Government oder Participatory Design inspiriert.

    @article{haunschild_nutzer_2021,
    title = {Nutzer, {Sammler}, {Entscheidungsträger}? {Arten} der {Bürgerbeteiligung} in {Smart} {Cities}},
    volume = {58},
    url = {https://peasec.de/paper/2021/2021_HaunschildDemuthGeissRichterReuter_NutzerSammlerEntscheidungstragerBuergerbeteiligungSmartCities_HMD.pdf},
    doi = {10.1365/s40702-021-00770-8},
    abstract = {Digitalisierung ist ein präsenter Faktor in vielen Städten. So existieren bereits viele Smart-City-Initiativen, bei denen Städte versuchen, ihre Prozesse durch Erfassung und Verknüpfung von Daten, oft unter Zuhilfenahme von Datenplattformen, zu optimieren. In Anbetracht der damit einhergehenden großen Investitionen und Veränderungen wird Bürgerbeteiligung als zentraler Faktor für den Erfolg solcher Initiativen betrachtet. Bisher ist allerdings nicht klar, was typische Beteiligungsformate von Smart-City-Initiativen sind und welche Rolle(n) BürgerInnen dabei einnehmen. Dieser Beitrag leitet mittels einer Literaturanalyse zu Smart Cities ein Kategorienschema zu typischen Bürgerbeteiligungsarten ab. Die Analyse ergab, dass sich Einbindung von BürgerInnen in politische Entscheidungen und bei der Entwicklung technischer Artefakte maßgeblich auf e‑Government oder Participatory Design bezieht. Im Hinblick auf die Beteiligungsarten zeigt sich, dass Makrofabriken, Living Labs und Open-Data-Plattformen häufige Ansätze sind, um BürgerInnen als Co-Creators einzubinden. Zudem werden BürgerInnen mit Citizen Sensing zur Erfassung von Daten oder Missständen einbezogen. Dabei zeigen sich sowohl aktivere, als auch eher passive Beteiligungsarten. Die Analyse zeigt, dass die Einbindung von BürgerInnen häufig entweder auf eine Beteiligung an politischen Entscheidungen oder an der Entwicklung technischer Artefakte abzielt. Auch wenn keine klare Abgrenzung möglich ist, sind diese Ansätze dann eher durch e‑Government oder Participatory Design inspiriert.},
    journal = {HMD Praxis der Wirtschaftsinformatik},
    author = {Haunschild, Jasmin and Demuth, Kilian and Geiß, Henri-Jacques and Richter, Christian and Reuter, Christian},
    year = {2021},
    keywords = {HCI, Student, Projekt-ATHENE-SecUrban, Projekt-emergenCITY},
    }

  • Jasmin Haunschild, Christian Reuter (2021)
    Bridging from Crisis to Everyday Life – An Analysis of User Reviews of the Warning App NINA and the COVID-19 Information Apps CoroBuddy and DarfIchDas
    CSCW ’21 Companion: Conference Companion Publication of the 2021 on Computer Supported Cooperative Work and Social Computing Virtual Event, USA. doi:10.1145/3462204.3481745
    [BibTeX] [Abstract] [Download PDF]

    During a dynamic and protracted crisis such as the COVID-19 pandemic, citizens are continuously challenged with making decisionsunder uncertainty. In addition to evaluating the risk of their behav-iors to themselves and others, citizens also have to consider themost current regulation, which often varies federally and locallyand by incidence numbers. Few tools help to stay informed aboutthe current rules. The state-run German multi-hazard warningapp NINA incorporated a feature for COVID-19, while two apps,DarfIchDas and CoroBuddy, focus only on COVID-19 regulationand are privately run. To investigate users’ expectations, perceivedadvantages, and gaps as well as the developers’ challenges, we analyze recent app store reviews of the apps and developers’ replies.We show that the warning app and the COVID-19 regulation appsare evaluated on different terms, that the correctness and portrayalof complex rules are the main challenges and that developers andeditors are underusing users’ potential for crowdsourcing.

    @inproceedings{haunschild_bridging_2021,
    address = {Virtual Event, USA},
    title = {Bridging from {Crisis} to {Everyday} {Life} – {An} {Analysis} of {User} {Reviews} of the {Warning} {App} {NINA} and the {COVID}-19 {Information} {Apps} {CoroBuddy} and {DarfIchDas}},
    url = {https://peasec.de/paper/2021/2021_HaunschildReuter_UserReviewsWarningCovidApps_CSCWComp.pdf},
    doi = {10.1145/3462204.3481745},
    abstract = {During a dynamic and protracted crisis such as the COVID-19 pandemic, citizens are continuously challenged with making decisionsunder uncertainty. In addition to evaluating the risk of their behav-iors to themselves and others, citizens also have to consider themost current regulation, which often varies federally and locallyand by incidence numbers. Few tools help to stay informed aboutthe current rules. The state-run German multi-hazard warningapp NINA incorporated a feature for COVID-19, while two apps,DarfIchDas and CoroBuddy, focus only on COVID-19 regulationand are privately run. To investigate users’ expectations, perceivedadvantages, and gaps as well as the developers’ challenges, we analyze recent app store reviews of the apps and developers’ replies.We show that the warning app and the COVID-19 regulation appsare evaluated on different terms, that the correctness and portrayalof complex rules are the main challenges and that developers andeditors are underusing users’ potential for crowdsourcing.},
    booktitle = {{CSCW} '21 {Companion}: {Conference} {Companion} {Publication} of the 2021 on {Computer} {Supported} {Cooperative} {Work} and {Social} {Computing}},
    publisher = {ACM},
    author = {Haunschild, Jasmin and Reuter, Christian},
    year = {2021},
    keywords = {Crisis, Projekt-ATHENE-SecUrban, Projekt-emergenCITY},
    pages = {72--78},
    }

  • Rolf Egert, Nina Gerber, Jasmin Haunschild, Philipp Kuehn, Verena Zimmermann (2021)
    Towards Resilient Critical Infrastructures – Motivating Users to Contribute to Smart Grid Resilience
    i-com – Journal of Interactive Media ;20(2):161–175. doi:10.1515/icom-2021-0021
    [BibTeX] [Abstract] [Download PDF]

    Smart cities aim at improving efficiency while providing safety and security by merging conventional infrastructures with information and communication technology. One strategy for mitigating hazardous situations and improving the overall resilience of the system is to involve citizens. For instance, smart grids involve prosumers – capable of producing and consuming electricity – who can adjust their electricity profile dynamically (i.e., decrease or increase electricity consumption), or use their local production to supply electricity to the grid. This mitigates the impact of peak-consumption periods on the grid and makes it easier for operators to control the grid. This involvement of prosumers is accompanied by numerous socio-technical challenges, including motivating citizens to contribute by adjusting their electricity consumption to the requirements of the energy grid. Towards this end, this work investigates motivational strategies and tools, including nudging, persuasive technologies, and incentives, that can be leveraged to increase the motivation of citizens. We discuss long-term and side effects and ethical and privacy considerations, before portraying bug bounty programs, gamification and apps as technologies and strategies to communicate the motivational strategies to citizens.

    @article{egert_towards_2021,
    series = {i-com},
    title = {Towards {Resilient} {Critical} {Infrastructures} - {Motivating} {Users} to {Contribute} to {Smart} {Grid} {Resilience}},
    volume = {20},
    url = {https://www.degruyter.com/document/doi/10.1515/icom-2021-0021/html},
    doi = {10.1515/icom-2021-0021},
    abstract = {Smart cities aim at improving efficiency while providing safety and security by merging conventional infrastructures with information and communication technology. One strategy for mitigating hazardous situations and improving the overall resilience of the system is to involve citizens. For instance, smart grids involve prosumers - capable of producing and consuming electricity - who can adjust their electricity profile dynamically (i.e., decrease or increase electricity consumption), or use their local production to supply electricity to the grid. This mitigates the impact of peak-consumption periods on the grid and makes it easier for operators to control the grid. This involvement of prosumers is accompanied by numerous socio-technical challenges, including motivating citizens to contribute by adjusting their electricity consumption to the requirements of the energy grid. Towards this end, this work investigates motivational strategies and tools, including nudging, persuasive technologies, and incentives, that can be leveraged to increase the motivation of citizens. We discuss long-term and side effects and ethical and privacy considerations, before portraying bug bounty programs, gamification and apps as technologies and strategies to communicate the motivational strategies to citizens.},
    number = {2},
    journal = {i-com - Journal of Interactive Media},
    author = {Egert, Rolf and Gerber, Nina and Haunschild, Jasmin and Kuehn, Philipp and Zimmermann, Verena},
    year = {2021},
    keywords = {Security, Infrastructure, Projekt-ATHENE-SecUrban, Projekt-CYWARN, Projekt-emergenCITY},
    pages = {161--175},
    }

    2020

  • Marc-André Kaufhold, Jasmin Haunschild, Christian Reuter (2020)
    Warning the Public: A Survey on Attitudes, Expectations and Use of Mobile Crisis Apps in Germany
    Proceedings of the European Conference on Information Systems (ECIS) .
    [BibTeX] [Abstract] [Download PDF]

    As part of information systems, the research field of crisis informatics increasingly investigates the potentials and limitations of mobile crisis apps, which constitute a relatively new public service for citizens and are specifically designed for the dissemination of disaster‐related information and communication between authorities, organizations and citizens. While existing crisis apps, such as KATWARN or NINA in Germany, focus on preparatory information and warning functionality, there is a need for apps and research on police-related functionality, such as information on cybercrime, fraud offences, or search for missing persons. Based on a workshop with civil protection (N=12) and police officers (N=15), we designed a questionnaire and conducted a representative survey of German citizens (N=1.219) on the past, current and future use, perceived helpfulness, deployment and behavioural preferences, configurability and most important functionality of mobile crisis apps. Our results indicate that in addition to emergency and weather warnings, crime- and health-related warnings are also desired by many, as is the possibility for bidirectional communication. People also want one central app and are resistant to installing more than one crisis app. Furthermore, there are few significant differences between socioeconomic groups.

    @inproceedings{kaufhold_warning_2020,
    title = {Warning the {Public}: {A} {Survey} on {Attitudes}, {Expectations} and {Use} of {Mobile} {Crisis} {Apps} in {Germany}},
    url = {http://www.peasec.de/paper/2020/2020_KaufholdHaunschildReuter_WarningthePublic_ECIS.pdf},
    abstract = {As part of information systems, the research field of crisis informatics increasingly investigates the potentials and limitations of mobile crisis apps, which constitute a relatively new public service for citizens and are specifically designed for the dissemination of disaster‐related information and communication between authorities, organizations and citizens. While existing crisis apps, such as KATWARN or NINA in Germany, focus on preparatory information and warning functionality, there is a need for apps and research on police-related functionality, such as information on cybercrime, fraud offences, or search for missing persons. Based on a workshop with civil protection (N=12) and police officers (N=15), we designed a questionnaire and conducted a representative survey of German citizens (N=1.219) on the past, current and future use, perceived helpfulness, deployment and behavioural preferences, configurability and most important functionality of mobile crisis apps. Our results indicate that in addition to emergency and weather warnings, crime- and health-related warnings are also desired by many, as is the possibility for bidirectional communication. People also want one central app and are resistant to installing more than one crisis app. Furthermore, there are few significant differences between socioeconomic groups.},
    booktitle = {Proceedings of the {European} {Conference} on {Information} {Systems} ({ECIS})},
    publisher = {AIS},
    author = {Kaufhold, Marc-André and Haunschild, Jasmin and Reuter, Christian},
    year = {2020},
    keywords = {Crisis, A-Paper, Ranking-VHB-B, Ranking-WKWI-A, Ranking-CORE-A, Projekt-ATHENE-SecUrban, Projekt-ATHENE-FANCY, Projekt-emergenCITY},
    }

  • Steffen Haesler, Stefka Schmid, Christian Reuter (2020)
    Crisis Volunteering Nerds: Three Months After COVID-19 Hackathon \#WirVsVirus
    MobileHCI ’20: 22nd International Conference on Human-Computer Interaction with Mobile Devices and Services . doi:10.1145/3406324.3424584
    [BibTeX] [Abstract] [Download PDF]

    The hackathon \#WirVsVirus in March 2020 was one of the biggest hackathons in history. Under the patronage of the federal government of Germany, 28,361 participants worked together in 1,498 projects, finding innovative apps and solutions against the COVID-19 pandemic. Three months after the event, we present an exemplifying analysis of the topics, used technologies and remaining activity of these projects. Shedding light on this instance of citizen science allows to highlight the potential of hackathons and startup culture regarding socio-technological resilience. At the same time, it may be understood as an impulse for crisis informatics to consider new forms of volunteering in the course of crisis management.

    @inproceedings{haesler_crisis_2020,
    title = {Crisis {Volunteering} {Nerds}: {Three} {Months} {After} {COVID}-19 {Hackathon} \#{WirVsVirus}},
    url = {https://dl.acm.org/doi/pdf/10.1145/3406324.3424584},
    doi = {10.1145/3406324.3424584},
    abstract = {The hackathon \#WirVsVirus in March 2020 was one of the biggest hackathons in history. Under the patronage of the federal government of Germany, 28,361 participants worked together in 1,498 projects, finding innovative apps and solutions against the COVID-19 pandemic. Three months after the event, we present an exemplifying analysis of the topics, used technologies and remaining activity of these projects. Shedding light on this instance of citizen science allows to highlight the potential of hackathons and startup culture regarding socio-technological resilience. At the same time, it may be understood as an impulse for crisis informatics to consider new forms of volunteering in the course of crisis management.},
    booktitle = {{MobileHCI} '20: 22nd {International} {Conference} on {Human}-{Computer} {Interaction} with {Mobile} {Devices} and {Services}},
    publisher = {ACM},
    author = {Haesler, Steffen and Schmid, Stefka and Reuter, Christian},
    year = {2020},
    keywords = {Crisis, HCI, Projekt-ATHENE-SecUrban, Projekt-emergenCITY},
    pages = {1--56},
    }

  • Christian Reuter, Marc-André Kaufhold, Tina Comes, Michèle Knodt, Max Mühlhäuser (2020)
    Mobile Resilience: Designing Mobile Interactive Systems for Societal and Technical Resilience
    MobileHCI ’20: 22nd International Conference on Human-Computer Interaction with Mobile Devices and Services . doi:10.1145/3406324.3424590
    [BibTeX] [Abstract] [Download PDF]

    Digitalization and interconnectedness, facilitated by the Internet of Things (IoT) and the widespread distribution of mobile devices, can be used to tackle important societal challenges. This is maybe most prominently visible in the response to the COVID-2019 Pandemic. However, the design of mobile technology, functionality and underlying infrastructures must be resilient against disruptions caused by man-made (e.g. bombings, hacking) and natural (e.g. earthquakes, hurricanes) crises, emergencies and threats. To explore challenges, designs and potentials of interactive technologies, this workshop investigates the overlapping space of mobile technologies and resilient systems, including future application domains such as smart cities.

    @inproceedings{reuter_mobile_2020,
    title = {Mobile {Resilience}: {Designing} {Mobile} {Interactive} {Systems} for {Societal} and {Technical} {Resilience}},
    url = {https://dl.acm.org/doi/pdf/10.1145/3406324.3424590},
    doi = {10.1145/3406324.3424590},
    abstract = {Digitalization and interconnectedness, facilitated by the Internet of Things (IoT) and the widespread distribution of mobile devices, can be used to tackle important societal challenges. This is maybe most prominently visible in the response to the COVID-2019 Pandemic. However, the design of mobile technology, functionality and underlying infrastructures must be resilient against disruptions caused by man-made (e.g. bombings, hacking) and natural (e.g. earthquakes, hurricanes) crises, emergencies and threats. To explore challenges, designs and potentials of interactive technologies, this workshop investigates the overlapping space of mobile technologies and resilient systems, including future application domains such as smart cities.},
    booktitle = {{MobileHCI} '20: 22nd {International} {Conference} on {Human}-{Computer} {Interaction} with {Mobile} {Devices} and {Services}},
    author = {Reuter, Christian and Kaufhold, Marc-André and Comes, Tina and Knodt, Michèle and Mühlhäuser, Max},
    year = {2020},
    keywords = {Crisis, HCI, SocialMedia, Ranking-CORE-B, Projekt-ATHENE-SecUrban, Projekt-CYWARN, Projekt-emergenCITY},
    pages = {1--3},
    }

  • Christian Reuter, Jasmin Haunschild, Matthias Hollick, Max Mühlhäuser, Joachim Vogt, Michael Kreutzer (2020)
    Towards Secure Urban Infrastructures: Cyber Security Challenges to Information and Communication Technology in Smart Cities
    Mensch und Computer – Workshopband Magdeburg. doi:10.18420/muc2020-ws117-408
    [BibTeX] [Abstract] [Download PDF]

    The growth of cities continues to be a global megatrend. As more and more people live in urban areas and urban services and infrastructures are under growing strain, technologies are increasingly being researched and used to make city life more efficient and comfortable. As a result, so-called “Smart Cities” have complex IT infrastructures and cyber-physical systems such as sensor/actuator networks for the general population and are developing worldwide. Urban infrastructure must be secured against attacks, ensuring reliable and resilient services for citizens as well as privacy and data security. This paper introduces selected challenges faced by infrastructure providers, citizens and decision-makers in handling attacks aimed at information and communication technologies (ICT) of urban infrastructures and presents current research avenues for tackling cyberattacks and for developing tools for creating, portraying and disseminating actiona-ble information as one important response to security challenges. It then presents findings from a representative survey conducted in Germany (N=1091) on the experiences and perceptions of citizens concerning the relevance of cyberat-tacks will be presented.

    @inproceedings{reuter_towards_2020,
    address = {Magdeburg},
    title = {Towards {Secure} {Urban} {Infrastructures}: {Cyber} {Security} {Challenges} to {Information} and {Communication} {Technology} in {Smart} {Cities}},
    url = {https://dl.gi.de/bitstream/handle/20.500.12116/33550/muc2020-ws-408.pdf},
    doi = {10.18420/muc2020-ws117-408},
    abstract = {The growth of cities continues to be a global megatrend. As more and more people live in urban areas and urban services and infrastructures are under growing strain, technologies are increasingly being researched and used to make city life more efficient and comfortable. As a result, so-called “Smart Cities” have complex IT infrastructures and cyber-physical systems such as sensor/actuator networks for the general population and are developing worldwide. Urban infrastructure must be secured against attacks, ensuring reliable and resilient services for citizens as well as privacy and data security. This paper introduces selected challenges faced by infrastructure providers, citizens and decision-makers in handling attacks aimed at information and communication technologies (ICT) of urban infrastructures and presents current research avenues for tackling cyberattacks and for developing tools for creating, portraying and disseminating actiona-ble information as one important response to security challenges. It then presents findings from a representative survey conducted in Germany (N=1091) on the experiences and perceptions of citizens concerning the relevance of cyberat-tacks will be presented.},
    booktitle = {Mensch und {Computer} - {Workshopband}},
    publisher = {Gesellschaft für Informatik e.V.},
    author = {Reuter, Christian and Haunschild, Jasmin and Hollick, Matthias and Mühlhäuser, Max and Vogt, Joachim and Kreutzer, Michael},
    editor = {Hansen, C. and Nürnberger, A. and Preim, B.},
    year = {2020},
    keywords = {Crisis, UsableSec, Security, Infrastructure, Projekt-ATHENE-SecUrban, Projekt-emergenCITY},
    pages = {1--7},
    }

  • Christian Reuter, Marc-André Kaufhold, Fabian Spahr, Thomas Spielhofer, Anna Sophie Hahne (2020)
    Emergency Service Staff and Social Media – A Comparative Empirical Study of the Perception by Emergency Services Members in Europe in 2014 and 2017
    International Journal of Disaster Risk Reduction (IJDRR) ;46(101516). doi:10.1016/j.ijdrr.2020.101516
    [BibTeX] [Abstract] [Download PDF]

    Finding a way to ensure an effective use of social media has become increasingly important to emergency services over the past decade. Despite all efforts to determine the utility of social media for emergency organisations, it is necessary to benefit from such institutions‘ staffs‘ opinions to establish effective use. To provide empirical evidence we present a comparison of two surveys, conducted across Europe with emergency services in 2014 and 2017 respectively, with a total of 1169 answers. The analysis shows that personal experience has an effect on how organisational usage of social media is perceived and how emergency service staff view the future use of social media. Furthermore, the use has increased. This article not only shows emergency services what their staff think about their social media usage but also discusses challenges and future directions for the design of systems that can be useful for further development of optimized organisational social media usage.

    @article{reuter_emergency_2020,
    title = {Emergency {Service} {Staff} and {Social} {Media} – {A} {Comparative} {Empirical} {Study} of the {Perception} by {Emergency} {Services} {Members} in {Europe} in 2014 and 2017},
    volume = {46},
    url = {https://peasec.de/paper/2020/2020_ReuterKaufholdSpahrSpielhoferHahne_EmergencyServiceSocialMediaAttitude20142017_IJDRR.pdf},
    doi = {10.1016/j.ijdrr.2020.101516},
    abstract = {Finding a way to ensure an effective use of social media has become increasingly important to emergency services over the past decade. Despite all efforts to determine the utility of social media for emergency organisations, it is necessary to benefit from such institutions' staffs' opinions to establish effective use. To provide empirical evidence we present a comparison of two surveys, conducted across Europe with emergency services in 2014 and 2017 respectively, with a total of 1169 answers. The analysis shows that personal experience has an effect on how organisational usage of social media is perceived and how emergency service staff view the future use of social media. Furthermore, the use has increased. This article not only shows emergency services what their staff think about their social media usage but also discusses challenges and future directions for the design of systems that can be useful for further development of optimized organisational social media usage.},
    number = {101516},
    journal = {International Journal of Disaster Risk Reduction (IJDRR)},
    author = {Reuter, Christian and Kaufhold, Marc-André and Spahr, Fabian and Spielhofer, Thomas and Hahne, Anna Sophie},
    year = {2020},
    keywords = {Crisis, SocialMedia, Student, A-Paper, Ranking-ImpactFactor, Projekt-emergenCITY},
    }

  • Milan Stute, Max Maass, Tom Schons, Marc-André Kaufhold, Christian Reuter, Matthias Hollick (2020)
    Empirical Insights for Designing Information and Communication Technology for International Disaster Response
    International Journal of Disaster Risk Reduction (IJDRR) ;47(101598):1–10. doi:10.1016/j.ijdrr.2020.101598
    [BibTeX] [Abstract] [Download PDF]

    Due to the increase in natural disasters in the past years, Disaster Response Organizations (DROs) are faced with the challenge of coping with more and larger operations. Currently appointed Information and Communications Technology (ICT) used for coordination and communication is sometimes outdated and does not scale, while novel technologies have the potential to greatly improve disaster response efficiency. To allow adoption of these novel technologies, ICT system designers have to take into account the particular needs of DROs and characteristics of International Disaster Response (IDR). This work attempts to bring the humanitarian and ICT communities closer together. In this work, we analyze IDR-related documents and conduct expert interviews. Using open coding, we extract empirical insights and translate the peculiarities of DRO coordination and operation into tangible ICT design requirements. This information is based on interviews with active IDR staff as well as DRO guidelines and reports. Ultimately, the goal of this paper is to serve as a reference for future ICT research endeavors to support and increase the efficiency of IDR operations.

    @article{stute_empirical_2020,
    title = {Empirical {Insights} for {Designing} {Information} and {Communication} {Technology} for {International} {Disaster} {Response}},
    volume = {47},
    url = {https://www.sciencedirect.com/science/article/pii/S2212420919309501},
    doi = {10.1016/j.ijdrr.2020.101598},
    abstract = {Due to the increase in natural disasters in the past years, Disaster Response Organizations (DROs) are faced with the challenge of coping with more and larger operations. Currently appointed Information and Communications Technology (ICT) used for coordination and communication is sometimes outdated and does not scale, while novel technologies have the potential to greatly improve disaster response efficiency. To allow adoption of these novel technologies, ICT system designers have to take into account the particular needs of DROs and characteristics of International Disaster Response (IDR). This work attempts to bring the humanitarian and ICT communities closer together. In this work, we analyze IDR-related documents and conduct expert interviews. Using open coding, we extract empirical insights and translate the peculiarities of DRO coordination and operation into tangible ICT design requirements. This information is based on interviews with active IDR staff as well as DRO guidelines and reports. Ultimately, the goal of this paper is to serve as a reference for future ICT research endeavors to support and increase the efficiency of IDR operations.},
    number = {101598},
    journal = {International Journal of Disaster Risk Reduction (IJDRR)},
    author = {Stute, Milan and Maass, Max and Schons, Tom and Kaufhold, Marc-André and Reuter, Christian and Hollick, Matthias},
    year = {2020},
    keywords = {Crisis, Student, UsableSec, A-Paper, Ranking-ImpactFactor, Projekt-emergenCITY},
    pages = {1--10},
    }

  • Marc-André Kaufhold, Markus Bayer, Christian Reuter (2020)
    Rapid relevance classification of social media posts in disasters and emergencies: A system and evaluation featuring active, incremental and online learning
    Information Processing & Management (IPM) ;57(1):1–32.
    [BibTeX] [Abstract] [Download PDF]

    The research field of crisis informatics examines, amongst others, the potentials and barriers of social media use during disasters and emergencies. Social media allow emergency services to receive valuable information (e.g., eyewitness reports, pictures, or videos) from social media. However, the vast amount of data generated during large-scale incidents can lead to issue of information overload. Research indicates that supervised machine learning techniques are sui- table for identifying relevant messages and filter out irrelevant messages, thus mitigating in- formation overload. Still, they require a considerable amount of labeled data, clear criteria for relevance classification, a usable interface to facilitate the labeling process and a mechanism to rapidly deploy retrained classifiers. To overcome these issues, we present (1) a system for social media monitoring, analysis and relevance classification, (2) abstract and precise criteria for re- levance classification in social media during disasters and emergencies, (3) the evaluation of a well-performing Random Forest algorithm for relevance classification incorporating metadata from social media into a batch learning approach (e.g., 91.28\%/89.19\% accuracy, 98.3\%/89.6\% precision and 80.4\%/87.5\% recall with a fast training time with feature subset selection on the European floods/BASF SE incident datasets), as well as (4) an approach and preliminary eva- luation for relevance classification including active, incremental and online learning to reduce the amount of required labeled data and to correct misclassifications of the algorithm by feed- back classification. Using the latter approach, we achieved a well-performing classifier based on the European floods dataset by only requiring a quarter of labeled data compared to the tradi- tional batch learning approach. Despite a lesser effect on the BASF SE incident dataset, still a substantial improvement could be determined.

    @article{kaufhold_rapid_2020,
    title = {Rapid relevance classification of social media posts in disasters and emergencies: {A} system and evaluation featuring active, incremental and online learning},
    volume = {57},
    url = {https://peasec.de/paper/2020/2020_KaufholdBayerReuter_RapidRelevanceClassification_IPM.pdf},
    abstract = {The research field of crisis informatics examines, amongst others, the potentials and barriers of social media use during disasters and emergencies. Social media allow emergency services to receive valuable information (e.g., eyewitness reports, pictures, or videos) from social media. However, the vast amount of data generated during large-scale incidents can lead to issue of information overload. Research indicates that supervised machine learning techniques are sui- table for identifying relevant messages and filter out irrelevant messages, thus mitigating in- formation overload. Still, they require a considerable amount of labeled data, clear criteria for relevance classification, a usable interface to facilitate the labeling process and a mechanism to rapidly deploy retrained classifiers. To overcome these issues, we present (1) a system for social media monitoring, analysis and relevance classification, (2) abstract and precise criteria for re- levance classification in social media during disasters and emergencies, (3) the evaluation of a well-performing Random Forest algorithm for relevance classification incorporating metadata from social media into a batch learning approach (e.g., 91.28\%/89.19\% accuracy, 98.3\%/89.6\% precision and 80.4\%/87.5\% recall with a fast training time with feature subset selection on the European floods/BASF SE incident datasets), as well as (4) an approach and preliminary eva- luation for relevance classification including active, incremental and online learning to reduce the amount of required labeled data and to correct misclassifications of the algorithm by feed- back classification. Using the latter approach, we achieved a well-performing classifier based on the European floods dataset by only requiring a quarter of labeled data compared to the tradi- tional batch learning approach. Despite a lesser effect on the BASF SE incident dataset, still a substantial improvement could be determined.},
    number = {1},
    journal = {Information Processing \& Management (IPM)},
    author = {Kaufhold, Marc-André and Bayer, Markus and Reuter, Christian},
    year = {2020},
    keywords = {Crisis, SocialMedia, A-Paper, Ranking-ImpactFactor, Ranking-CORE-A, Ranking-WKWI-B, Projekt-ATHENE-SecUrban, Projekt-emergenCITY, AuswahlKaufhold},
    pages = {1--32},
    }

  • Jasmin Haunschild, Marc-André Kaufhold, Christian Reuter (2020)
    Sticking with Landlines? Citizens‘ and Police Social Media Use and Expectation During Emergencies
    Proceedings of the International Conference on Wirtschaftsinformatik (WI) (Best Paper Social Impact Award) Potsdam, Germany. doi:10.30844/wi_2020_o2-haunschild
    [BibTeX] [Abstract] [Download PDF]

    Crisis informatics has examined the use, potentials and weaknesses of social media in emergencies across different events (e.g., man-made, natural or hybrid), countries and heterogeneous participants (e.g., citizens or emergency services) for almost two decades. While most research analyzes specific cases, few studies have focused on citizens‘ perceptions of different social media platforms in emergencies using a representative sample. Basing our questionnaire on a workshop with police officers, we present the results of a representative study on citizens‘ perception of social media in emergencies that we conducted in Germany. Our study suggests that when it comes to emergencies, socio-demographic differences are largely insignificant and no clear preferences for emergency services‘ social media strategies exist. Due to the widespread searching behavior on some platforms, emergency services can reach a wide audience by turning to certain channels but should account for groups with distinct preferences.

    @inproceedings{haunschild_sticking_2020,
    address = {Potsdam, Germany},
    title = {Sticking with {Landlines}? {Citizens}' and {Police} {Social} {Media} {Use} and {Expectation} {During} {Emergencies}},
    url = {http://www.peasec.de/paper/2020/2020_HaunschildKaufholdReuter_SocialMediaPoliceSurvey_WI.pdf},
    doi = {10.30844/wi_2020_o2-haunschild},
    abstract = {Crisis informatics has examined the use, potentials and weaknesses of social media in emergencies across different events (e.g., man-made, natural or hybrid), countries and heterogeneous participants (e.g., citizens or emergency services) for almost two decades. While most research analyzes specific cases, few studies have focused on citizens' perceptions of different social media platforms in emergencies using a representative sample. Basing our questionnaire on a workshop with police officers, we present the results of a representative study on citizens' perception of social media in emergencies that we conducted in Germany. Our study suggests that when it comes to emergencies, socio-demographic differences are largely insignificant and no clear preferences for emergency services' social media strategies exist. Due to the widespread searching behavior on some platforms, emergency services can reach a wide audience by turning to certain channels but should account for groups with distinct preferences.},
    booktitle = {Proceedings of the {International} {Conference} on {Wirtschaftsinformatik} ({WI}) ({Best} {Paper} {Social} {Impact} {Award})},
    publisher = {AIS Electronic Library (AISel)},
    author = {Haunschild, Jasmin and Kaufhold, Marc-André and Reuter, Christian},
    year = {2020},
    keywords = {Crisis, Ranking-CORE-C, Ranking-VHB-C, Ranking-WKWI-A, Projekt-MAKI, Projekt-ATHENE-SecUrban, Projekt-emergenCITY},
    pages = {1--16},
    }

    ATHENE-CyAware: User-Centered Technology Design for Cyber Situational Awareness (1.1.2023-31.12.2026, BMBF+HMWK)

    ATHENE-CyAware: User-Centered Technology Design for Cyber Situational Awareness (01.01.2023-31.12.2026, BMBF+HMWK)

    Looking at the 2015 Ukraine power grid cyberattack, the 2017 WannaCry ransomware attack, or the 2020 University Hospital of Düsseldorf hack, amongst others, the vulnerability of critical infrastructures and thus also of society to cyberattacks becomes apparent. The growing interconnection of information and communication technology in combination with the increasing number, variety, and professionalism of cyber threats exacerbate the challenges for Computer Emergency Response Teams (CERTs) and IT Security Officers (ITSOs) to maintain cyber situational awareness, i.e., to provide an accurate situation picture of the cyber threats and security vulnerabilities relevant to the organization and other target groups as a foundation for decision-making. Thus, the overarching goal of the project “User-Centered Technology Design for Cyber Situational Awareness” (CYAWARE) is to design and evaluate usable security technologies enhancing the cyber situational awareness of CERTs and ITSOs in businesses, industry, government, and society.
    More specifically, this includes (1) an artificial intelligence pipeline for the adjustable, fast, performant, and transparent detection of cyber threats and vulnerabilities as well as (2) a visual analytics dashboard for the customizable filtering for relevant information enhancing cyber situational awareness, with a special emphasis on external threat awareness. Embedded into the methodological framework of a design case study, the project comprises empirical pre-studies to understand organizational practices, the design of innovative ICT to tackle identified challenges, and the evaluation of their functionality, usability, and user experience. The findings of the participatory and user-centered design approach will be distilled into best practices, guidelines, and design implications to enhance our understanding of usable technologies contributing to cyber situational awareness and decision-making.

    CNTR: Cluster Natur- und Technikwissenschaftliche Rüstungskontrollforschung (1.1.2023-31.12.2026, AA)

    CNTR: Cluster Natur- und Technikwissenschaftliche Rüstungskontrollforschung (1.1.2023-31.12.2026, AA)

    https://www.cntrarmscontrol.org/

    Der russische Überfall auf die Ukraine hat die möglichen Gefahren, die von rüstungs­technischen Inno­vationen, Nuklear­waffen, chemischen und biologischen Kampf­stoffen sowie digitaler Kriegs­führung ausgehen, drastisch ins Bewusstsein zurück­gebracht. Auch wenn modernste Waffen­systeme in der Ukraine nur punktuell zum Einsatz kamen, zeigt der Einsatz von Drohnen, hoch­präzisen Flugabwehr­systemen oder Cyber­fähigkeiten exem­plarisch, wie sehr Technologie die Macht­verhältnisse auf dem Schlachtfeld beein­flussen kann. Neue Waffen­technologie kann im Extremfall Macht­verhältnisse disruptiv umkehren und für Unsicher­heit sorgen. Letzteres gilt auch für Chemie- und Biowaffen, sogar wenn sie lediglich rhetorisch für Propaganda- und Desinformations­zwecke benutzt werden.

    Ziel des Clusters Natur- und Technik­wissenschaftliche Rüstungs­kontrollforschung (CNTR) ist es, diese Gefahren zu untersuchen, wissen­schaftlich fundiert einzuordnen und auf dieser Grundlage Handlungs­empfehlungen zur Stärkung der Rüstungs­kontrolle zu entwickeln. Dazu integriert das Cluster technik- und natur­wissen­schaftliche Erkenntnisse und Expertise in den inter­disziplinären Diskurs der Friedens- und Konflikt­forschung. Eng verzahnt arbeiten Forschende der Natur- und Sozial­wissenschaften am Leibnitz-Institut für Friedens- und Konflikt­forschung (PRIF) mit den Universitäten Darmstadt und Gießen zusammen, ganz im Sinne der 2019 formulierten Empfehlungen des Wissenschafts­rats zur Weiter­entwicklung der Friedens- und Konfliktforschung. Das Projekt wird über eine Laufzeit von vier Jahren (Januar 2023 bis Dezember 2026) vom Auswärtigen Amt gefördert.

    Im Rahmen des Clusters wird u.a. folgende Forschungs­gruppe gegründet: Neue Technologien und Rüstungskontrolle (geleitet von Prof. Dr. Dr. Christian Reuter und Dr. Niklas Schörnig): Die Rüstungs­kontrolle ist in einer schweren Krise, mehr noch: der Einsatz neuster Technologien wie Hyperschall­raketen, Drohnen oder gar die militärische Nutzung künstlicher Intelligenz lassen einen neuen quali­tativen Rüstungs­wettlauf und die umfang­reiche Verbreitung modernster Waffen­technologie wahr­scheinlich erscheinen. Um in dieser Situation zur Analyse von militärischen Potenzialen, zur Ein­schätzung von Risiken und zur Entwicklung neuer Optionen für Rüstungs­kontrolle, aber auch zur Abrüstung und Nicht­verbreitung von Nuklear­waffen beizutragen, ist natur­wissen­schaftliche Expertise notwendig. Verschärft wird das Problem durch den zunehmenden Einsatz von Künstlicher Intelligenz (KI) und (semi)­autonomen Waffen. Gleichzeitig können neue Technologien aber auch dazu beitragen, wirksame Gegen­strategien und zuverlässigere Instrumente für Rüstungs­kontrolle und Verifikation zu entwickeln.

    CYLENCE: Strategien und Werkzeuge gegen Cybermobbing und Hassbotschaften (1.8.2023-31.07.2026, BMBF)

    CYLENCE: Strategien und Werkzeuge gegen Cybermobbing und Hassbotschaften (1.8.2023-31.7.2026, BMBF)

    https://peasec.de/cylence

    Laut einer vergleichenden Studie des Bündnis gegen Cybermobbing e.V. (Beitzinger & Leest, 2021) waren 2021 rund 11,5% der Menschen in Deutschland von Cybermobbing betroffen. Während etwas mehr als 53% der Cybermobbingvorfälle im privaten Umfeld geschehen, entfallen noch 38% auf das Arbeitsumfeld. Neben Depressionen, Suchtgefahr oder körperlichen Beschwerden stuften sich rund 15% der Betroffenen von Mobbing und Cybermobbing als suizidgefährdet ein. Aus wirtschaftlicher Sicht ist dabei die Kündigungsbereitschaft von Mobbingopfern um 40% höher, Betroffene weisen fast doppelt so viele Krankheitstage wie der Durchschnitt auf und die jährlichen Kosten durch den Produktionsausfall in der deutschen Wirtschaft werden auf rund 8 Mrd. Euro geschätzt. Eine regelmäßige Befragung der Landesanstalt für Medien NRW (Landesanstalt für Medien NRW, 2021) verdeutlicht zudem, dass die Anzahl der Internetnutzer*innen in Deutschland, die häufig mit Hassbotschaften konfrontiert sind, in den letzten Jahren von 27% (2017) auf 39% (2021) angestiegen ist. Obwohl im Jahr 2021 über zwei Drittel der Befragten schon einmal Hasskommentare wahrgenommen haben, haben nur 28% von diesen einen Hasskommentar beim jeweiligen Portal gemeldet.

    Das Ziel von CYLENCE ist die Entwicklung von Strategien und Werkzeugen zur medienübergreifenden Meldung, Erkennung und Behandlung von Cybermobbing und Hassbotschaften. Dazu sollen organisationale Strategien und Werkzeuge zur Erfassung und Analyse (teil-)öffentlicher, sozialer Datenquellen (z.B. Facebook, Telegram, Twitter) auf Basis eines partizipativen Entwicklungsprozesses Ermittlungs- und Strafverfolgungsbehörden (ESBs) zur verbesserten Früherkennung und Behandlung von Cyber-Missbrauchsfällen befähigen. Eine darauf ausgerichtete Schulungsstrategie wird durch ein interaktives Tutorial für die Aneignung der entwickelten Werkzeuge ergänzt, die mithilfe von Künstlicher Intelligenz (KI) und Visual Analytics (VA) die anpassbare, faire und nachvollziehbare KI-Detektion und echtzeitbasierte Dashboard-Aufbereitung von Cyber-Missbrauchsinhalten unterstützen. Zur Erhöhung der zivilen Sicherheit sollen weiter die Erkennung und Meldung von Cybermobbing und Hassbotschaften durch die Bevölkerung gestärkt werden. Dies umfasst eine Strategie zur Verbesserung der Kommunikation zwischen Bürger*innen, Betroffenen und ESBs, welche durch empirische Feldforschung (z.B. repräsentative Befragungen) unterstützt und im Rahmen einer Kampagne erprobt wird. Dazu werden Werkzeuge zur Erkennung und Meldung von Cyber-Missbrauch für Bürger*innen durch ein Browser-Plugin und eine Smartphone-App zur Verfügung gestellt und evaluiert.

    2024

  • Marc-André Kaufhold, Jasmin Haunschild, Christian Reuter (2024)
    Cultural Violence and Peace Interventions in Social Media
    In: Christian Reuter: Information Technology for Peace and Security – IT-Applications and Infrastructures in Conflicts, Crises, War, and Peace. Wiesbaden, Germany: Springer Vieweg.
    [BibTeX] [Abstract]

    Over the last decade, social media services had an enormous impact on modern culture. They are nowadays widely established in everyday life, but also during natural and man-made crises and conflicts. For instance, Facebook was part of the Arabic Spring, in which the tool facilitated the communication and interaction between participants of political protests. On the contrary, terrorists may recruit new members and disseminate ideologies, and social bots may influence social and political processes. Based on the notions of cultural violence and cultural peace as well as the phenomena of fake news, terrorism and social bots, this exploratory review firstly presents human cultural inter-ventions in social media (e.g. dissemination of fake news and terroristic propaganda) and respective countermeasures (e.g. fake news detection and counter-narratives). Sec-ondly, it discusses automatic cultural interventions realised via social bots (e.g. astro-turfing, misdirection and smoke screening) and countermeasures (e.g. crowdsourcing and social bot detection). Finally, this chapter concludes with a range of cultural inter-ventions and information and communication technology (ICT) in terms of actors and intentions to identify future research potential for supporting situational assessments during conflicts.

    @incollection{kaufhold_cultural_2024,
    address = {Wiesbaden, Germany},
    title = {Cultural {Violence} and {Peace} {Interventions} in {Social} {Media}},
    abstract = {Over the last decade, social media services had an enormous impact on modern culture. They are nowadays widely established in everyday life, but also during natural and man-made crises and conflicts. For instance, Facebook was part of the Arabic Spring, in which the tool facilitated the communication and interaction between participants of political protests. On the contrary, terrorists may recruit new members and disseminate ideologies, and social bots may influence social and political processes. Based on the notions of cultural violence and cultural peace as well as the phenomena of fake news, terrorism and social bots, this exploratory review firstly presents human cultural inter-ventions in social media (e.g. dissemination of fake news and terroristic propaganda) and respective countermeasures (e.g. fake news detection and counter-narratives). Sec-ondly, it discusses automatic cultural interventions realised via social bots (e.g. astro-turfing, misdirection and smoke screening) and countermeasures (e.g. crowdsourcing and social bot detection). Finally, this chapter concludes with a range of cultural inter-ventions and information and communication technology (ICT) in terms of actors and intentions to identify future research potential for supporting situational assessments during conflicts.},
    booktitle = {Information {Technology} for {Peace} and {Security} - {IT}-{Applications} and {Infrastructures} in {Conflicts}, {Crises}, {War}, and {Peace}},
    publisher = {Springer Vieweg},
    author = {Kaufhold, Marc-André and Haunschild, Jasmin and Reuter, Christian},
    editor = {Reuter, Christian},
    year = {2024},
    keywords = {Crisis, HCI, SocialMedia, Peace, Projekt-CYLENCE},
    }

  • Marc-André Kaufhold, Thea Riebe, Markus Bayer, Christian Reuter (2024)
    ‚We Do Not Have the Capacity to Monitor All Media‘: A Design Case Study on Cyber Situational Awareness in Computer Emergency Response Teams
    Proceedings of the Conference on Human Factors in Computing Systems (CHI) .
    [BibTeX] [Abstract]

    Computer Emergency Response Teams (CERTs) have been established in the public sector globally to provide advisory, preventive and reactive cybersecurity services for government agencies, citizens, and businesses. Nevertheless, their responsibility of monitoring, analyzing, and communicating cyber threats and security vulnerabilities have become increasingly challenging due to the growing volume and varying quality of information disseminated through public and social channels. Based on a design case study conducted from 2021 to 2023, this paper combines three iterations of expert interviews (N=25), design workshops (N=4) and cognitive walkthroughs (N=25) to design an automated, cross-platform and real-time cybersecurity dashboard. By adopting the notion of cyber situational awareness, the study further extracts user requirements and design heuristics for enhanced threat intelligence and mission awareness in CERTs, discussing the aspects of source integration, data management, customizable visualization, relationship awareness, information assessment, software integration, (inter-)organizational collaboration, and communication of stakeholder warnings.

    @inproceedings{kaufhold_we_2024,
    series = {{CHI} '24},
    title = {'{We} {Do} {Not} {Have} the {Capacity} to {Monitor} {All} {Media}': {A} {Design} {Case} {Study} on {Cyber} {Situational} {Awareness} in {Computer} {Emergency} {Response} {Teams}},
    abstract = {Computer Emergency Response Teams (CERTs) have been established in the public sector globally to provide advisory, preventive and reactive cybersecurity services for government agencies, citizens, and businesses. Nevertheless, their responsibility of monitoring, analyzing, and communicating cyber threats and security vulnerabilities have become increasingly challenging due to the growing volume and varying quality of information disseminated through public and social channels. Based on a design case study conducted from 2021 to 2023, this paper combines three iterations of expert interviews (N=25), design workshops (N=4) and cognitive walkthroughs (N=25) to design an automated, cross-platform and real-time cybersecurity dashboard. By adopting the notion of cyber situational awareness, the study further extracts user requirements and design heuristics for enhanced threat intelligence and mission awareness in CERTs, discussing the aspects of source integration, data management, customizable visualization, relationship awareness, information assessment, software integration, (inter-)organizational collaboration, and communication of stakeholder warnings.},
    booktitle = {Proceedings of the {Conference} on {Human} {Factors} in {Computing} {Systems} ({CHI})},
    publisher = {Association for Computing Machinery},
    author = {Kaufhold, Marc-André and Riebe, Thea and Bayer, Markus and Reuter, Christian},
    year = {2024},
    keywords = {HCI, Selected, UsableSec, Security, A-Paper, Ranking-CORE-A*, Projekt-CYWARN, AuswahlUsableSec, AuswahlKaufhold, Projekt-CYLENCE, Projekt-ATHENE-CyAware},
    }

  • Markus Bayer, Philipp Kuehn, Ramin Shanehsaz, Christian Reuter (2024)
    CySecBERT: A Domain-Adapted Language Model for the Cybersecurity Domain
    ACM Transactions on Privacy and Security .
    [BibTeX] [Abstract]

    The field of cybersecurity is evolving fast. Security professionals are in need of intelligence on past, current and – ideally – on upcoming threats, because attacks are becoming more advanced and are increasingly targeting larger and more complex systems. Since the processing and analysis of such large amounts of information cannot be addressed manually, cybersecurity experts rely on machine learning techniques. In the textual domain, pre-trained language models like BERT have proven to be helpful as they provide a good baseline for further fine-tuning. However, due to the domain-knowledge and the many technical terms in cybersecurity, general language models might miss the gist of textual information. For this reason, we create a high-quality dataset and present a language model specifically tailored to the cybersecurity domain which can serve as a basic building block for cybersecurity systems. The model is compared on 15 tasks: Domain-dependent extrinsic tasks for measuring the performance on specific problems, intrinsic tasks for measuring the performance of the internal representations of the model as well as general tasks from the SuperGLUE benchmark. The results of the intrinsic tasks show that our model improves the internal representation space of domain words compared to the other models. The extrinsic, domain-dependent tasks, consisting of sequence tagging and classification, show that the model performs best in cybersecurity scenarios. In addition, we pay special attention to the choice of hyperparameters against catastrophic forgetting, as pre-trained models tend to forget the original knowledge during further training.

    @article{bayer_cysecbert_2024,
    title = {{CySecBERT}: {A} {Domain}-{Adapted} {Language} {Model} for the {Cybersecurity} {Domain}},
    abstract = {The field of cybersecurity is evolving fast. Security professionals are in need of intelligence on past, current and - ideally - on upcoming threats, because attacks are becoming more advanced and are increasingly targeting larger and more complex systems. Since the processing and analysis of such large amounts of information cannot be addressed manually, cybersecurity experts rely on machine learning techniques. In the textual domain, pre-trained language models like BERT have proven to be helpful as they provide a good baseline for further fine-tuning. However, due to the domain-knowledge and the many technical terms in cybersecurity, general language models might miss the gist of textual information. For this reason, we create a high-quality dataset and present a language model specifically tailored to the cybersecurity domain which can serve as a basic building block for cybersecurity systems. The model is compared on 15 tasks: Domain-dependent extrinsic tasks for measuring the performance on specific problems, intrinsic tasks for measuring the performance of the internal representations of the model as well as general tasks from the SuperGLUE benchmark. The results of the intrinsic tasks show that our model improves the internal representation space of domain words compared to the other models. The extrinsic, domain-dependent tasks, consisting of sequence tagging and classification, show that the model performs best in cybersecurity scenarios. In addition, we pay special attention to the choice of hyperparameters against catastrophic forgetting, as pre-trained models tend to forget the original knowledge during further training.},
    journal = {ACM Transactions on Privacy and Security},
    author = {Bayer, Markus and Kuehn, Philipp and Shanehsaz, Ramin and Reuter, Christian},
    year = {2024},
    keywords = {Projekt-ATHENE-CyAware, Projekt-CYLENCE, Projekt-CYWARN, Ranking-CORE-A, Ranking-ImpactFactor, Security, Student, UsableSec},
    }

    2023

  • Christian Reuter, Marc-André Kaufhold, Tom Biselli, Helene Pleil (2023)
    Increasing Adoption Despite Perceived Limitations of Social Media in Emergencies: Representative Insights on German Citizens’ Perception and Trends from 2017 to 2021
    International Journal of Disaster Risk Reduction (IJDRR) ;96. doi:https://doi.org/10.1016/j.ijdrr.2023.103880
    [BibTeX] [Abstract] [Download PDF]

    The value of social media in crises, disasters, and emergencies across different events, participants, and states is now well-examined in crisis informatics research. Previous research has contributed to the state of the art with empirical insights on the use of social media, approaches for the gathering and processing of big social data, the design and evaluation of information systems, and the analysis of cumulative and longitudinal data. While some studies examined social media use representatively for their target audience, these usually only comprise a single point of inquiry and do not allow for a trend analysis. This work provides results (1) of a representative survey with German citizens from 2021 on use patterns, perceptions, and expectations regarding social media during emergencies. Furthermore, it (2) compares these results to previous surveys and provides insights on temporal changes and trends from 2017, over 2019 to 2021. Our findings highlight that social media use in emergencies increased in 2021 and 2019 compared to 2017. Between 2019 and 2021, the amount of information shared on social media remained on a similar level, while the perceived disadvantages of social media in emergencies significantly increased. In light of demographic variables, the results of the 2021 survey confirm previous findings, according to which older individuals (45+ years) use social media in emergencies less often than younger individuals (18-24 years). Furthermore, while the quicker availability of information was one of the reasons for social media use, especially the potential information overload was a key factor for not using social media in emergencies. The results are discussed in light of the dynamic nature of attitudes regarding social media in emergencies and the need to account for heterogeneity in user expectations to build trustworthy information ecosystems in social media.

    @article{reuter_increasing_2023,
    title = {Increasing {Adoption} {Despite} {Perceived} {Limitations} of {Social} {Media} in {Emergencies}: {Representative} {Insights} on {German} {Citizens}’ {Perception} and {Trends} from 2017 to 2021},
    volume = {96},
    issn = {2212-4209},
    url = {https://peasec.de/paper/2023/2023_ReuterKaufholdBiselliPleil_SocialMediaEmergenciesSurvey_IJDRR.pdf},
    doi = {https://doi.org/10.1016/j.ijdrr.2023.103880},
    abstract = {The value of social media in crises, disasters, and emergencies across different events, participants, and states is now well-examined in crisis informatics research. Previous research has contributed to the state of the art with empirical insights on the use of social media, approaches for the gathering and processing of big social data, the design and evaluation of information systems, and the analysis of cumulative and longitudinal data. While some studies examined social media use representatively for their target audience, these usually only comprise a single point of inquiry and do not allow for a trend analysis. This work provides results (1) of a representative survey with German citizens from 2021 on use patterns, perceptions, and expectations regarding social media during emergencies. Furthermore, it (2) compares these results to previous surveys and provides insights on temporal changes and trends from 2017, over 2019 to 2021. Our findings highlight that social media use in emergencies increased in 2021 and 2019 compared to 2017. Between 2019 and 2021, the amount of information shared on social media remained on a similar level, while the perceived disadvantages of social media in emergencies significantly increased. In light of demographic variables, the results of the 2021 survey confirm previous findings, according to which older individuals (45+ years) use social media in emergencies less often than younger individuals (18-24 years). Furthermore, while the quicker availability of information was one of the reasons for social media use, especially the potential information overload was a key factor for not using social media in emergencies. The results are discussed in light of the dynamic nature of attitudes regarding social media in emergencies and the need to account for heterogeneity in user expectations to build trustworthy information ecosystems in social media.},
    journal = {International Journal of Disaster Risk Reduction (IJDRR)},
    author = {Reuter, Christian and Kaufhold, Marc-André and Biselli, Tom and Pleil, Helene},
    year = {2023},
    keywords = {AuswahlCrisis, Crisis, SocialMedia, Student, A-Paper, Ranking-ImpactFactor, Projekt-emergenCITY, Projekt-NEBULA, Projekt-CYLENCE},
    }

  • Marc-André Kaufhold, Markus Bayer, Julian Bäumler, Christian Reuter, Stefan Stieglitz, Ali Sercan Basyurt, Milad Mirabaie, Christoph Fuchß, Kaan Eyilmez (2023)
    CYLENCE: Strategies and Tools for Cross-Media Reporting, Detection, and Treatment of Cyberbullying and Hatespeech in Law Enforcement Agencies
    Mensch und Computer – Workshopband Rapperswil, Switzerland. doi:10.18420/muc2023-mci-ws01-211
    [BibTeX] [Abstract] [Download PDF]

    Despite the merits of public and social media in private and professional spaces, citizens and professionals are increasingly exposed to cyberabuse, such as cyberbullying and hate speech. Thus, Law Enforcement Agencies (LEA) are deployed in many countries and organisations to enhance the preventive and reactive capabilities against cyberabuse. However, their tasks are getting more complex by the increasing amount and varying quality of information disseminated into public channels. Adopting the perspectives of Crisis Informatics and safety-critical Human-Computer Interaction (HCI) and based on both a narrative literature review and group discussions, this paper first outlines the research agenda of the CYLENCE project, which seeks to design strategies and tools for cross-media reporting, detection, and treatment of cyberbullying and hatespeech in investigative and law enforcement agencies. Second, it identifies and elaborates seven research challenges with regard to the monitoring, analysis and communication of cyberabuse in LEAs, which serve as a starting point for in-depth research within the project.

    @inproceedings{kaufhold_cylence_2023,
    address = {Rapperswil, Switzerland},
    title = {{CYLENCE}: {Strategies} and {Tools} for {Cross}-{Media} {Reporting}, {Detection}, and {Treatment} of {Cyberbullying} and {Hatespeech} in {Law} {Enforcement} {Agencies}},
    url = {https://dl.gi.de/items/0e0efe8f-64bf-400c-85f7-02b65f83189d},
    doi = {10.18420/muc2023-mci-ws01-211},
    abstract = {Despite the merits of public and social media in private and professional spaces, citizens and professionals are increasingly exposed to cyberabuse, such as cyberbullying and hate speech. Thus, Law Enforcement Agencies (LEA) are deployed in many countries and organisations to enhance the preventive and reactive capabilities against cyberabuse. However, their tasks are getting more complex by the increasing amount and varying quality of information disseminated into public channels. Adopting the perspectives of Crisis Informatics and safety-critical Human-Computer Interaction (HCI) and based on both a narrative literature review and group discussions, this paper first outlines the research agenda of the CYLENCE project, which seeks to design strategies and tools for cross-media reporting, detection, and treatment of cyberbullying and hatespeech in investigative and law enforcement agencies. Second, it identifies and elaborates seven research challenges with regard to the monitoring, analysis and communication of cyberabuse in LEAs, which serve as a starting point for in-depth research within the project.},
    language = {de},
    booktitle = {Mensch und {Computer} - {Workshopband}},
    publisher = {Gesellschaft für Informatik e.V.},
    author = {Kaufhold, Marc-André and Bayer, Markus and Bäumler, Julian and Reuter, Christian and Stieglitz, Stefan and Basyurt, Ali Sercan and Mirabaie, Milad and Fuchß, Christoph and Eyilmez, Kaan},
    year = {2023},
    keywords = {HCI, UsableSec, Projekt-CYLENCE},
    }

    SFB1119 CROSSING: Kryptographiebasierte Sicherheitslösungen als Grundlage für Vertrauen in heutigen und zukünftigen IT-Systemen (1.8.2018-30.06.2026, DFG)

    SFB CROSSING – Kryptografiebasierte Sicherheitslösungen als Grundlage für Vertrauen in heutigen und zukünftigen IT-Systemen (01.08.2018-30.06.2026, DFG)

    https://www.crossing.tu-darmstadt.de/

    Kryptographie ist ein unverzichtbares Instrument für die sichere Gestaltung digitaler Prozesse, in dem sie Vertraulichkeit, Integrität, Authentisierung und Unabstreitbarkeit gewährleistet. Auf diese Weise können viele Dienste sicher über das Internet abgewickelt werden. Dennoch lassen sich nicht alle in der Praxis auftretenden Probleme mit den bereits existierenden kryptographischen Verfahren lösen. Diese Problemstellung motivierte CROSSING schon vor dessen Start im Jahre 2014, und ist auch heute noch aktuell. Dementsprechend war und ist das übergeordnete Ziel des Sonderforschungsbereichs CROSSING: Kryptographie-basierte Sicherheitslösungen zu entwickeln, die Vertrauen in heutigen und zukünftigen IT-Systemen ermöglichen. Die Lösungen werden die Effizienz- und Sicherheitsanforderungen dieser IT-Umgebungen erfüllen und werden sicher implementiert sein. Entwickler, Administratoren und Endanwender von IT werden diese Lösungen leicht nutzen können, auch wenn sie keine Kryptographie-Experten sind.

    Teilprojekt: Transparenz als nutzerzentrierte Intervention für Privatsphäre und Sicherheit

    Das Projekt zielt darauf ab, Nutzer angemessen zu informieren und aufzuklären, um eine bessere Entscheidungsfindung in Bezug auf das persönliche Sicherheits- und Privatheitsverhalten zu fördern. Das Projekt untersucht insbesondere, in welchen Kontexten und für welche Nutzer transparente, nachvollziehbare Indikatoren als Intervention zu solch verbesserten Ergebnissen führen. Ganz allgemein untersucht das Projekt, ob und wie nutzerzentrierte Sicherheits- und Privatheits-Interventionen von der Personalisierung und Kontrolle durch die Benutzer selbst profitieren können.

    2024

  • Tom Biselli, Laura Utz, Christian Reuter (2024)
    Supporting Informed Choices about Browser Cookies: The Impact of Personalised Cookie Banners
    Proceedings on Privacy Enhancing Technologies (PoPETs) (1):171–191. doi:https://doi.org/10.56553/popets-2024-0011
    [BibTeX] [Abstract] [Download PDF]

    Browser cookies, especially those from third parties, pose a threat to individual privacy. While it is possible in principle to control the number of cookies accepted, this choice is often neither usable nor truly informed. To address this issue, this study used semi-structured interviews (N=19) to identify attitudes and user requirements to develop an alternative personalised cookie banner, which was evaluated in an online experiment (N=157). The cookie banner explanations were tailored to the privacy knowledge of three groups of users: low, medium and high. The online experiment measured cookie choices and perceived usability of the cookie banner across three groups: an experimental group that viewed the novel cookie banner with personalisation (personalised privacy assistant), a control group that viewed the novel cookie banner without personalisation (privacy assistant) and a control group that viewed the standard cookie banner provided by the website. The results indicate that the novel cookie banner (with or without personalisation) generally resulted in significantly fewer accepted cookies and increased usability compared to the standard cookie window. In addition, the personalised cookie banner resulted in significantly fewer accepted cookies and higher usability than the non-personalised cookie banner. These results suggest that tailoring cookie banners to users‘ privacy knowledge can be an effective approach to empowering users to make informed choices and better protect their privacy.

    @article{biselli_supporting_2024,
    title = {Supporting {Informed} {Choices} about {Browser} {Cookies}: {The} {Impact} of {Personalised} {Cookie} {Banners}},
    url = {https://petsymposium.org/popets/2024/popets-2024-0011.pdf},
    doi = {https://doi.org/10.56553/popets-2024-0011},
    abstract = {Browser cookies, especially those from third parties, pose a threat to individual privacy. While it is possible in principle to control the number of cookies accepted, this choice is often neither usable nor truly informed. To address this issue, this study used semi-structured interviews (N=19) to identify attitudes and user requirements to develop an alternative personalised cookie banner, which was evaluated in an online experiment (N=157). The cookie banner explanations were tailored to the privacy knowledge of three groups of users: low, medium and high. The online experiment measured cookie choices and perceived usability of the cookie banner across three groups: an experimental group that viewed the novel cookie banner with personalisation (personalised privacy assistant), a control group that viewed the novel cookie banner without personalisation (privacy assistant) and a control group that viewed the standard cookie banner provided by the website. The results indicate that the novel cookie banner (with or without personalisation) generally resulted in significantly fewer accepted cookies and increased usability compared to the standard cookie window. In addition, the personalised cookie banner resulted in significantly fewer accepted cookies and higher usability than the non-personalised cookie banner. These results suggest that tailoring cookie banners to users' privacy knowledge can be an effective approach to empowering users to make informed choices and better protect their privacy.},
    number = {1},
    journal = {Proceedings on Privacy Enhancing Technologies (PoPETs)},
    author = {Biselli, Tom and Utz, Laura and Reuter, Christian},
    year = {2024},
    keywords = {HCI, Selected, Student, UsableSec, Security, A-Paper, Ranking-CORE-A, Projekt-CROSSING, AuswahlUsableSec},
    pages = {171--191},
    }

  • Christian Reuter (2024)
    Information Technology for Peace and Security – IT-Applications and Infrastructures in Conflicts, Crises, War, and Peace
    Wiesbaden, Germany: Springer Vieweg.
    [BibTeX]

    @book{reuter_information_2024,
    address = {Wiesbaden, Germany},
    title = {Information {Technology} for {Peace} and {Security} - {IT}-{Applications} and {Infrastructures} in {Conflicts}, {Crises}, {War}, and {Peace}},
    publisher = {Springer Vieweg},
    author = {Reuter, Christian},
    year = {2024},
    keywords = {Selected, Security, Peace, Infrastructure, Projekt-CROSSING, AuswahlPeace, Cyberwar, Projekt-TraCe},
    }

  • Christian Reuter, Konstantin Aal, Jürgen Altmann, Ute Bernhardt, Kai Denker, Anja-Liisa Gonsior, Dominik Herrmann, Matthias Hollick, Marc-André Kaufhold, Thomas Reinhold, Thea Riebe, Ingo Ruhmann, Klaus-Peter Saalbach, Niklas Schörnig, Ali Sunyaev, Volker Wulf, Laura Guntrum, Jonas Franken, Stefka Schmid (2024)
    Outlook: The Future of IT in Peace and Security
    In: Christian Reuter: Information Technology for Peace and Security – IT-Applications and Infrastructures in Conflicts, Crises, War, and Peace. Wiesbaden, Germany: Springer Vieweg.
    [BibTeX] [Abstract]

    Not only today, but also in the future information technology and the advances in the field of computer science will have a high relevance for peace and security. Naturally, a textbook like this can only cover a selective part of research and a certain point in time. Nonetheless, it can be attempted to identify trends, challenges and venture an outlook into the future. That is exactly what we want to achieve in this chapter: To predict fu-ture developments and try to classify them correctly. These considerations were made both by the editor and the authors involved alike. Therefore, an outlook based on fun-damentals, cyber conflicts and war, cyber peace, cyber arms control, infrastructures as well as social interaction is given.

    @incollection{reuter_outlook_2024,
    address = {Wiesbaden, Germany},
    title = {Outlook: {The} {Future} of {IT} in {Peace} and {Security}},
    abstract = {Not only today, but also in the future information technology and the advances in the field of computer science will have a high relevance for peace and security. Naturally, a textbook like this can only cover a selective part of research and a certain point in time. Nonetheless, it can be attempted to identify trends, challenges and venture an outlook into the future. That is exactly what we want to achieve in this chapter: To predict fu-ture developments and try to classify them correctly. These considerations were made both by the editor and the authors involved alike. Therefore, an outlook based on fun-damentals, cyber conflicts and war, cyber peace, cyber arms control, infrastructures as well as social interaction is given.},
    booktitle = {Information {Technology} for {Peace} and {Security} - {IT}-{Applications} and {Infrastructures} in {Conflicts}, {Crises}, {War}, and {Peace}},
    publisher = {Springer Vieweg},
    author = {Reuter, Christian and Aal, Konstantin and Altmann, Jürgen and Bernhardt, Ute and Denker, Kai and Gonsior, Anja-Liisa and Herrmann, Dominik and Hollick, Matthias and Kaufhold, Marc-André and Reinhold, Thomas and Riebe, Thea and Ruhmann, Ingo and Saalbach, Klaus-Peter and Schörnig, Niklas and Sunyaev, Ali and Wulf, Volker and Guntrum, Laura and Franken, Jonas and Schmid, Stefka},
    editor = {Reuter, Christian},
    year = {2024},
    keywords = {Security, Peace, Projekt-CROSSING},
    }

  • Christian Reuter, Jonas Franken, Anja-Liisa Gonsior, Laura Guntrum, Stefka Schmid, Thea Riebe (2024)
    An Overview and Introduction to Information Technology for Peace and Security
    In: Christian Reuter: Information Technology for Peace and Security – IT-Applications and Infrastructures in Conflicts, Crises, War, and Peace. Wiesbaden, Germany: Springer Vieweg.
    [BibTeX] [Abstract]

    Technological and scientific progress, especially the rapid development in information technology (IT), plays a crucial role regarding questions of peace and security. This textbook addresses the significance, potentials and challenges of IT for peace and securi-ty. For this purpose, the book offers an introduction to peace, conflict, and security research, thereby focusing on natural science, technical and computer science perspec-tives. In the following, it sheds light on fundamentals (e.g. IT in peace, conflict and security, natural-science/technical peace research), cyber conflicts and war (e.g. infor-mation warfare, cyber espionage, cyber defence, Darknet), cyber peace (e.g. dual-use, technology assessment, confidence and security building measures), cyber arms control (e.g. arms control in the cyberspace, unmanned systems, verification), cyber attribution and infrastructures (e.g. attribution of cyber attacks, resilient infrastructures, secure critical information infrastructures), culture and interaction (e.g. safety and security, cultural violence, social media), before an outlook is given. This chapter provides an overview of all chapters in this book.

    @incollection{reuter_overview_2024,
    address = {Wiesbaden, Germany},
    title = {An {Overview} and {Introduction} to {Information} {Technology} for {Peace} and {Security}},
    abstract = {Technological and scientific progress, especially the rapid development in information technology (IT), plays a crucial role regarding questions of peace and security. This textbook addresses the significance, potentials and challenges of IT for peace and securi-ty. For this purpose, the book offers an introduction to peace, conflict, and security research, thereby focusing on natural science, technical and computer science perspec-tives. In the following, it sheds light on fundamentals (e.g. IT in peace, conflict and security, natural-science/technical peace research), cyber conflicts and war (e.g. infor-mation warfare, cyber espionage, cyber defence, Darknet), cyber peace (e.g. dual-use, technology assessment, confidence and security building measures), cyber arms control (e.g. arms control in the cyberspace, unmanned systems, verification), cyber attribution and infrastructures (e.g. attribution of cyber attacks, resilient infrastructures, secure critical information infrastructures), culture and interaction (e.g. safety and security, cultural violence, social media), before an outlook is given. This chapter provides an overview of all chapters in this book.},
    booktitle = {Information {Technology} for {Peace} and {Security} - {IT}-{Applications} and {Infrastructures} in {Conflicts}, {Crises}, {War}, and {Peace}},
    publisher = {Springer Vieweg},
    author = {Reuter, Christian and Franken, Jonas and Gonsior, Anja-Liisa and Guntrum, Laura and Schmid, Stefka and Riebe, Thea},
    editor = {Reuter, Christian},
    year = {2024},
    keywords = {Security, Peace, Projekt-CROSSING},
    }

  • Thomas Reinhold, Christian Reuter (2024)
    From Cyber War to Cyber Peace
    In: Christian Reuter: Information Technology for Peace and Security – IT-Applications and Infrastructures in Conflicts, Crises, War, and Peace. Wiesbaden, Germany: Springer Vieweg.
    [BibTeX] [Abstract]

    The encompassing trend of digitalisation and widespread dependencies on IT systems triggers adjustments also in the military forces. Besides necessary enhancements of IT security and defensive measures for cyberspace, a growing number of states are estab-lishing offensive military capabilities for this domain. Looking at historical develop-ments and transformations due to advancements in military technologies, the chapter discusses the political progress made and tools developed since. Both of these have con-tributed to handling challenges and confining threats to international security. With this background, the text assesses a possible application of these efforts to developments concerning cyberspace, as well as obstacles that need to be tackled for it to be success-ful. The chapter points out political advancements already in progress, the role of social initiatives, such as the cyber peace campaign of the Forum of Computer Scientists for Peace and Societal Responsibility (FifF), as well as potential consequences of the rising probability of cyber war as opposed to the prospects of cyber peace.

    @incollection{reinhold_cyber_2024,
    address = {Wiesbaden, Germany},
    title = {From {Cyber} {War} to {Cyber} {Peace}},
    abstract = {The encompassing trend of digitalisation and widespread dependencies on IT systems triggers adjustments also in the military forces. Besides necessary enhancements of IT security and defensive measures for cyberspace, a growing number of states are estab-lishing offensive military capabilities for this domain. Looking at historical develop-ments and transformations due to advancements in military technologies, the chapter discusses the political progress made and tools developed since. Both of these have con-tributed to handling challenges and confining threats to international security. With this background, the text assesses a possible application of these efforts to developments concerning cyberspace, as well as obstacles that need to be tackled for it to be success-ful. The chapter points out political advancements already in progress, the role of social initiatives, such as the cyber peace campaign of the Forum of Computer Scientists for Peace and Societal Responsibility (FifF), as well as potential consequences of the rising probability of cyber war as opposed to the prospects of cyber peace.},
    booktitle = {Information {Technology} for {Peace} and {Security} - {IT}-{Applications} and {Infrastructures} in {Conflicts}, {Crises}, {War}, and {Peace}},
    publisher = {Springer Vieweg},
    author = {Reinhold, Thomas and Reuter, Christian},
    editor = {Reuter, Christian},
    year = {2024},
    keywords = {Security, Peace, Projekt-CROSSING, Cyberwar, Projekt-CNTR},
    }

  • Thomas Reinhold (2024)
    Towards a Peaceful Development of Cyberspace: Challenges and Technical Measures for the De-Escalation of State-Led Cyberconflicts and Arms Control of Cyberweapons
    Springer Fachmedien Wiesbaden.
    [BibTeX] [Abstract]

    Cyberspace, already a few decades old, has become a matter of course for most of us, part of our everyday life. At the same time, this space and the global infrastructure behind it are essential for our civilizations, the economy and administration, and thus an essential expression and lifeline of a globalized world. However, these developments also create vulnerabilities and thus, cyberspace is increasingly developing into an intelligence and military operational area – for the defense and security of states but also as a component of offensive military planning, visible in the creation of military cyber-departments and the integration of cyberspace into states‘ security and defense strategies. In order to contain and regulate the conflict and escalation potential of technology used by military forces, over the last decades, a complex tool set of transparency, de-escalation and arms control measures has been developed and proof-tested. Unfortunately, many of these established measures do not work for cyberspace due to its specific technical characteristics. Even more, the concept of what constitutes a weapon – an essential requirement for regulation – starts to blur for this domain. Against this background, this thesis aims to answer how measures for the de-escalation of state-led conflicts in cyberspace and arms control of cyberweapons can be developed. In order to answer this question, the dissertation takes a specifically technical perspective on these problems and the underlying political challenges of state behavior and international humanitarian law in cyberspace to identify starting points for technical measures of transparency, arms control and verification. Based on this approach of adopting already existing technical measures from other fields of computer science, the thesis will provide proof of concepts approaches for some mentioned challenges like a classification system for cyberweapons that is based on technical measurable features, an approach for the mutual reduction of vulnerability stockpiles and an approach to plausibly assure the non-involvement in a cyberconflict as a measure for de-escalation. All these initial approaches and the questions of how and by which measures arms control and conflict reduction can work for cyberspace are still quite new and subject to not too many debates. Indeed, the approach of deliberately self-restricting the capabilities of technology in order to serve a bigger goal, like the reduction of its destructive usage, is yet not very common for the engineering thinking of computer science. Therefore, this dissertation also aims to provide some impulses regarding the responsibility and creative options of computer science with a view to the peaceful development and use of cyberspace.

    @book{reinhold_towards_2024,
    title = {Towards a {Peaceful} {Development} of {Cyberspace}: {Challenges} and {Technical} {Measures} for the {De}-{Escalation} of {State}-{Led} {Cyberconflicts} and {Arms} {Control} of {Cyberweapons}},
    abstract = {Cyberspace, already a few decades old, has become a matter of course for most of us, part of our everyday life. At the same time, this space and the global infrastructure behind it are essential for our civilizations, the economy and administration, and thus an essential expression and lifeline of a globalized world. However, these developments also create vulnerabilities and thus, cyberspace is increasingly developing into an intelligence and military operational area – for the defense and security of states but also as a component of offensive military planning, visible in the creation of military cyber-departments and the integration of cyberspace into states' security and defense strategies. In order to contain and regulate the conflict and escalation potential of technology used by military forces, over the last decades, a complex tool set of transparency, de-escalation and arms control measures has been developed and proof-tested. Unfortunately, many of these established measures do not work for cyberspace due to its specific technical characteristics. Even more, the concept of what constitutes a weapon – an essential requirement for regulation – starts to blur for this domain. Against this background, this thesis aims to answer how measures for the de-escalation of state-led conflicts in cyberspace and arms control of cyberweapons can be developed. In order to answer this question, the dissertation takes a specifically technical perspective on these problems and the underlying political challenges of state behavior and international humanitarian law in cyberspace to identify starting points for technical measures of transparency, arms control and verification. Based on this approach of adopting already existing technical measures from other fields of computer science, the thesis will provide proof of concepts approaches for some mentioned challenges like a classification system for cyberweapons that is based on technical measurable features, an approach for the mutual reduction of vulnerability stockpiles and an approach to plausibly assure the non-involvement in a cyberconflict as a measure for de-escalation. All these initial approaches and the questions of how and by which measures arms control and conflict reduction can work for cyberspace are still quite new and subject to not too many debates. Indeed, the approach of deliberately self-restricting the capabilities of technology in order to serve a bigger goal, like the reduction of its destructive usage, is yet not very common for the engineering thinking of computer science. Therefore, this dissertation also aims to provide some impulses regarding the responsibility and creative options of computer science with a view to the peaceful development and use of cyberspace.},
    publisher = {Springer Fachmedien Wiesbaden},
    author = {Reinhold, Thomas},
    year = {2024},
    keywords = {Security, Peace, Projekt-CROSSING, Projekt-ATHENE, Dissertation},
    }

    2023

  • Thomas Reinhold, Christian Reuter (2023)
    Preventing the escalation of cyber conflicts: towards an approach to plausibly assure the non-involvement in a cyberattack
    Zeitschrift für Friedens- und Konfliktforschung (ZeFKo) ;12(1):31–58. doi:10.1007/s42597-023-00099-7
    [BibTeX] [Abstract] [Download PDF]

    While cyberspace has evolved into a commonly shared space vital to our individual lives and societies, malicious cyber activities by state actors as part of espionage operations, regarding defense strategies, or as part of traditional conflicts have strongly increased. In contrast, attributing the origin of such activities remains problematic. The ambiguity of digital data raises the problem of misinterpreting available information, increasing the risk of misinformed reactions and conflict escalation. In order to reduce this risk, this paper proposes a transparency system based on technologies which usually already exist for IT security measures that an accused actor in a specific incident can use to provide credible information which plausibly assures his non-involvement. The paper analyses the technical requirements, presents the technical concept and discusses the necessary adjustments to existing IT networks for its implementation. Intended as a measure for conflict de-escalation, the paper further discusses the limitations of this approach, especially with regard to technical limits as well as the political motivation and behavior of states.

    @article{reinhold_preventing_2023,
    title = {Preventing the escalation of cyber conflicts: towards an approach to plausibly assure the non-involvement in a cyberattack},
    volume = {12},
    issn = {2524-6976},
    url = {https://doi.org/10.1007/s42597-023-00099-7},
    doi = {10.1007/s42597-023-00099-7},
    abstract = {While cyberspace has evolved into a commonly shared space vital to our individual lives and societies, malicious cyber activities by state actors as part of espionage operations, regarding defense strategies, or as part of traditional conflicts have strongly increased. In contrast, attributing the origin of such activities remains problematic. The ambiguity of digital data raises the problem of misinterpreting available information, increasing the risk of misinformed reactions and conflict escalation. In order to reduce this risk, this paper proposes a transparency system based on technologies which usually already exist for IT security measures that an accused actor in a specific incident can use to provide credible information which plausibly assures his non-involvement. The paper analyses the technical requirements, presents the technical concept and discusses the necessary adjustments to existing IT networks for its implementation. Intended as a measure for conflict de-escalation, the paper further discusses the limitations of this approach, especially with regard to technical limits as well as the political motivation and behavior of states.},
    number = {1},
    journal = {Zeitschrift für Friedens- und Konfliktforschung (ZeFKo)},
    author = {Reinhold, Thomas and Reuter, Christian},
    month = apr,
    year = {2023},
    keywords = {Security, Peace, Projekt-CROSSING, Projekt-ATHENE-SecUrban},
    pages = {31--58},
    }

  • Sebastian Surminski, Christian Niesler, Sebastian Linsner, Lucas Davi, Christian Reuter (2023)
    SCAtt-man: Side-Channel-Based Remote Attestation for Embedded Devices that Users Understand
    Proceedings of the Thirteenth ACM Conference on Data and Application Security and Privacy New York, NY, USA. doi:10.1145/3577923.3583652
    [BibTeX] [Abstract] [Download PDF]

    From the perspective of end-users, IoT devices behave like a black box: As long as they work as intended, users will not detect any compromise. Users have minimal control over the software. Hence, it is very likely that the user misses that illegal recordings and transmissions occur if a security camera or a smart speaker is hacked. In this paper, we present SCAtt-man, the first remote attestation scheme that is specifically designed with the user in mind. SCAtt-man deploys software-based attestation to check the integrity of remote devices, allowing users to verify the integrity of IoT devices with their smartphones. The key novelty of SCAtt-man resides in the utilization of user-observable side-channels such as light or sound in the attestation protocol. Our proof-of-concept implementation targets a smart speaker and an attestation protocol that is based on a data-over-sound protocol. Our evaluation demonstrates the effectiveness of toolname against a variety of attacks and its usability based on a user study with 20 participants.

    @inproceedings{surminski_scatt-man_2023,
    address = {New York, NY, USA},
    series = {{CODASPY} '23},
    title = {{SCAtt}-man: {Side}-{Channel}-{Based} {Remote} {Attestation} for {Embedded} {Devices} that {Users} {Understand}},
    isbn = {9798400700675},
    url = {https://doi.org/10.1145/3577923.3583652},
    doi = {10.1145/3577923.3583652},
    abstract = {From the perspective of end-users, IoT devices behave like a black box: As long as they work as intended, users will not detect any compromise. Users have minimal control over the software. Hence, it is very likely that the user misses that illegal recordings and transmissions occur if a security camera or a smart speaker is hacked. In this paper, we present SCAtt-man, the first remote attestation scheme that is specifically designed with the user in mind. SCAtt-man deploys software-based attestation to check the integrity of remote devices, allowing users to verify the integrity of IoT devices with their smartphones. The key novelty of SCAtt-man resides in the utilization of user-observable side-channels such as light or sound in the attestation protocol. Our proof-of-concept implementation targets a smart speaker and an attestation protocol that is based on a data-over-sound protocol. Our evaluation demonstrates the effectiveness of toolname against a variety of attacks and its usability based on a user study with 20 participants.},
    booktitle = {Proceedings of the {Thirteenth} {ACM} {Conference} on {Data} and {Application} {Security} and {Privacy}},
    publisher = {Association for Computing Machinery},
    author = {Surminski, Sebastian and Niesler, Christian and Linsner, Sebastian and Davi, Lucas and Reuter, Christian},
    year = {2023},
    keywords = {HCI, UsableSec, Security, Ranking-CORE-B, Projekt-CROSSING},
    pages = {225--236},
    }

  • Thea Riebe, Julian Bäumler, Marc-André Kaufhold, Christian Reuter (2023)
    Values and Value Conflicts in the Context of OSINT Technologies for Cybersecurity Incident Response: A Value Sensitive Design Perspective
    Computer Supported Cooperative Work: The Journal of Collaborative Computing (JCSCW) . doi:10.1007/s10606-022-09453-4
    [BibTeX] [Abstract] [Download PDF]

    The negotiation of stakeholder values as a collaborative process throughout technology development has been studied extensively within the fields of Computer Supported Cooperative Work and Human-Computer Interaction. Despite their increasing significance for cybersecurity incident response, there is a gap in research on values of importance to the design of open-source intelligence (OSINT) technologies for this purpose. In this paper, we investigate which values and value conflicts emerge due to the application and development of machine learning (ML) based OSINT technologies to assist cyber security incident response operators. For this purpose, we employ a triangulation of methods, consisting of a systematic survey of the technical literature on the development of OSINT artefacts for cybersecurity (N = 73) and an empirical value sensitive design case study, comprising semi-structured interviews with stakeholders (N = 9) as well as a focus group (N = 7) with developers. Based on our results, we identify implications relevant to the research on and design of OSINT artefacts for cybersecurity incident response.

    @article{riebe_values_2023,
    title = {Values and {Value} {Conflicts} in the {Context} of {OSINT} {Technologies} for {Cybersecurity} {Incident} {Response}: {A} {Value} {Sensitive} {Design} {Perspective}},
    url = {https://link.springer.com/article/10.1007/s10606-022-09453-4},
    doi = {10.1007/s10606-022-09453-4},
    abstract = {The negotiation of stakeholder values as a collaborative process throughout technology development has been studied extensively within the fields of Computer Supported Cooperative Work and Human-Computer Interaction. Despite their increasing significance for cybersecurity incident response, there is a gap in research on values of importance to the design of open-source intelligence (OSINT) technologies for this purpose. In this paper, we investigate which values and value conflicts emerge due to the application and development of machine learning (ML) based OSINT technologies to assist cyber security incident response operators. For this purpose, we employ a triangulation of methods, consisting of a systematic survey of the technical literature on the development of OSINT artefacts for cybersecurity (N = 73) and an empirical value sensitive design case study, comprising semi-structured interviews with stakeholders (N = 9) as well as a focus group (N = 7) with developers. Based on our results, we identify implications relevant to the research on and design of OSINT artefacts for cybersecurity incident response.},
    journal = {Computer Supported Cooperative Work: The Journal of Collaborative Computing (JCSCW)},
    author = {Riebe, Thea and Bäumler, Julian and Kaufhold, Marc-André and Reuter, Christian},
    year = {2023},
    keywords = {HCI, Student, UsableSec, Security, A-Paper, Ranking-ImpactFactor, Ranking-CORE-B, Projekt-CROSSING, Projekt-ATHENE-SecUrban, Projekt-CYWARN},
    }

  • Elise Özalp, Katrin Hartwig, Christian Reuter (2023)
    Trends in Explainable Artificial Intelligence for Non-Experts
    In: Peter Klimczak, Christer Petersen: AI – Limits and Prospects of Artificial Intelligence. Bielefeld: Transcript Verlag, , 223–243.
    [BibTeX] [Abstract] [Download PDF]

    In this paper we provide an overview of XAI by introducing fundamental terminology and the goals of XAI, as well as recent research findings. Whilst doing this, we pay special attention to strategies for non-expert stakeholders. This leads us to our first research question: “What are the trends in explainable AI strategies for non-experts?”. In order to illustrate the current state of these trends, we further want to study an exemplary and very relevant application domain. According to Abdul et al. (2018), one of the first domains where researchers pursued XAI is the medical domain. This leads to our second research question: “What are the approaches of XAI in the medical domain for non-expert stakeholders?” These research questions will provide an overview of current topics in XAI and show possible research extensions for specific domains.

    @incollection{ozalp_trends_2023,
    address = {Bielefeld},
    title = {Trends in {Explainable} {Artificial} {Intelligence} for {Non}-{Experts}},
    url = {https://www.transcript-verlag.de/978-3-8376-5732-6/ai-limits-and-prospects-of-artificial-intelligence/?c=313000019},
    abstract = {In this paper we provide an overview of XAI by introducing fundamental terminology and the goals of XAI, as well as recent research findings. Whilst doing this, we pay special attention to strategies for non-expert stakeholders. This leads us to our first research question: “What are the trends in explainable AI strategies for non-experts?”. In order to illustrate the current state of these trends, we further want to study an exemplary and very relevant application domain. According to Abdul et al. (2018), one of the first domains where researchers pursued XAI is the medical domain. This leads to our second research question: “What are the approaches of XAI in the medical domain for non-expert stakeholders?” These research questions will provide an overview of current topics in XAI and show possible research extensions for specific domains.},
    booktitle = {{AI} - {Limits} and {Prospects} of {Artificial} {Intelligence}},
    publisher = {Transcript Verlag},
    author = {Özalp, Elise and Hartwig, Katrin and Reuter, Christian},
    editor = {Klimczak, Peter and Petersen, Christer},
    year = {2023},
    keywords = {HCI, Student, UsableSec, Projekt-CROSSING, Projekt-ATHENE-SecUrban, Projekt-CYWARN},
    pages = {223--243},
    }

  • Enno Steinbrink, Tom Biselli, Sebastian Linsner, Franziska Herbert, Christian Reuter (2023)
    Privacy Perception and Behaviour in Safety-Critical Environments
    In: Nina Gerber, Alina Stöver, Karola Marky: Human Factors in Privacy Research. Cham: Springer International Publishing, , 237–251.
    [BibTeX] [Abstract] [Download PDF]

    When considering privacy, context, and environmental circumstances can have a strong influence on individual decisions and user behavior. Especially in crises or threatening situations, privacy may conflict with other values, such as personal safety and health. In other cases, personal or public safety can also be dependent on privacy: the context of flight shows how, for those affected, the value of data protection can increase as a result of an increased threat situation. Thus, when individual sovereignty—the autonomous development of one’s own will—or safety is highly dependent on information flows, people tend to be more protective of their privacy in order to maintain their information sovereignty. But also, the context of agriculture, as part of the critical infrastructure, shows how privacy concerns can affect the adoption of digital tools. With these two examples, flight and migration as well as agriculture, this chapter presents some exemplary results that illustrate the importance of the influence of situational factors on perceived information sovereignty and the evaluation of privacy.

    @incollection{steinbrink_privacy_2023,
    address = {Cham},
    title = {Privacy {Perception} and {Behaviour} in {Safety}-{Critical} {Environments}},
    isbn = {978-3-031-28643-8},
    url = {https://doi.org/10.1007/978-3-031-28643-8_12},
    abstract = {When considering privacy, context, and environmental circumstances can have a strong influence on individual decisions and user behavior. Especially in crises or threatening situations, privacy may conflict with other values, such as personal safety and health. In other cases, personal or public safety can also be dependent on privacy: the context of flight shows how, for those affected, the value of data protection can increase as a result of an increased threat situation. Thus, when individual sovereignty—the autonomous development of one’s own will—or safety is highly dependent on information flows, people tend to be more protective of their privacy in order to maintain their information sovereignty. But also, the context of agriculture, as part of the critical infrastructure, shows how privacy concerns can affect the adoption of digital tools. With these two examples, flight and migration as well as agriculture, this chapter presents some exemplary results that illustrate the importance of the influence of situational factors on perceived information sovereignty and the evaluation of privacy.},
    booktitle = {Human {Factors} in {Privacy} {Research}},
    publisher = {Springer International Publishing},
    author = {Steinbrink, Enno and Biselli, Tom and Linsner, Sebastian and Herbert, Franziska and Reuter, Christian},
    editor = {Gerber, Nina and Stöver, Alina and Marky, Karola},
    year = {2023},
    keywords = {HCI, UsableSec, Security, Projekt-CROSSING, Projekt-ATHENE-FANCY, Projekt-GRKPrivacy},
    pages = {237--251},
    }

  • Thomas Reinhold, Helene Pleil, Christian Reuter (2023)
    Challenges for Cyber Arms Control: A Qualitative Expert Interview Study
    Zeitschrift für Außen- und Sicherheitspolitik (ZfAS) ;16(3):289–310. doi:10.1007/s12399-023-00960-w
    [BibTeX] [Abstract] [Download PDF]

    The militarization of cyberspace has been a topic in international fora and scientific debates for several years. However, the development of applicable, and verifiable arms control measures that can effectively reduce the risk of military escalations in cyberspace is still hindered by the characteristics of this domain. The article analyses challenges and obstacles of dual-use, proliferation, constant technological progress, the importance of the private sector, difficulties in defining and verifying weapons and difficulties in attributing attacks.

    @article{reinhold_challenges_2023,
    title = {Challenges for {Cyber} {Arms} {Control}: {A} {Qualitative} {Expert} {Interview} {Study}},
    volume = {16},
    issn = {1866-2196},
    url = {https://doi.org/10.1007/s12399-023-00960-w},
    doi = {10.1007/s12399-023-00960-w},
    abstract = {The militarization of cyberspace has been a topic in international fora and scientific debates for several years. However, the development of applicable, and verifiable arms control measures that can effectively reduce the risk of military escalations in cyberspace is still hindered by the characteristics of this domain. The article analyses challenges and obstacles of dual-use, proliferation, constant technological progress, the importance of the private sector, difficulties in defining and verifying weapons and difficulties in attributing attacks.},
    number = {3},
    journal = {Zeitschrift für Außen- und Sicherheitspolitik (ZfAS)},
    author = {Reinhold, Thomas and Pleil, Helene and Reuter, Christian},
    month = aug,
    year = {2023},
    keywords = {Security, Peace, Projekt-CROSSING, Projekt-ATHENE-SecUrban},
    pages = {289--310},
    }

  • Thomas Reinhold, Philipp Kuehn, Daniel Günther, Thomas Schneider, Christian Reuter (2023)
    ExTRUST: Reducing Exploit Stockpiles With a Privacy-Preserving Depletion Systems for Inter-State Relationships
    IEEE Transactions on Technology and Society ;4(2):158–170. doi:10.1109/TTS.2023.3280356
    [BibTeX] [Abstract] [Download PDF]

    Cyberspace is a fragile construct threatened by malicious cyber operations of different actors, with vulnerabilities in IT hardware and software forming the basis for such activities, thus also posing a threat to global IT security. Advancements in the field of artificial intelligence accelerate this development, either with artificial intelligence enabled cyber weapons, automated cyber defense measures, or artificial intelligence-based threat and vulnerability detection. Especially state actors, with their long-term strategic security interests, often stockpile such knowledge of vulnerabilities and exploits to enable their military or intelligence service cyberspace operations. While treaties and regulations to limit these developments and to enhance global IT security by disclosing vulnerabilities are currently being discussed on the international level, these efforts are hindered by state concerns about the disclosure of unique knowledge and about giving up tactical advantages. This leads to a situation where multiple states are likely to stockpile at least some identical exploits, with technical measures to enable a depletion process for these stockpiles that preserve state secrecy interests and consider the special constraints of interacting states as well as the requirements within such environments being non-existent. This paper proposes such a privacy-preserving approach that allows multiple state parties to privately compare their stock of vulnerabilities and exploits to check for items that occur in multiple stockpiles without revealing them so that their disclosure can be considered. We call our system ExTRUST and show that it is scalable and can withstand several attack scenarios. Beyond the intergovernmental setting, ExTRUST can also be used for other zero-trust use cases, such as bug-bounty programs.

    @article{reinhold_extrust_2023,
    title = {{ExTRUST}: {Reducing} {Exploit} {Stockpiles} {With} a {Privacy}-{Preserving} {Depletion} {Systems} for {Inter}-{State} {Relationships}},
    volume = {4},
    url = {https://peasec.de/paper/2023/2023_ReinholdKuehnGuentherSchneiderReuter_ExTrust-ehem-BlockED_TTaS.pdf},
    doi = {10.1109/TTS.2023.3280356},
    abstract = {Cyberspace is a fragile construct threatened by malicious cyber operations of different actors, with vulnerabilities in IT hardware and software forming the basis for such activities, thus also posing a threat to global IT security. Advancements in the field of artificial intelligence accelerate this development, either with artificial intelligence enabled cyber weapons, automated cyber defense measures, or artificial intelligence-based threat and vulnerability detection. Especially state actors, with their long-term strategic security interests, often stockpile such knowledge of vulnerabilities and exploits to enable their military or intelligence service cyberspace operations. While treaties and regulations to limit these developments and to enhance global IT security by disclosing vulnerabilities are currently being discussed on the international level, these efforts are hindered by state concerns about the disclosure of unique knowledge and about giving up tactical advantages. This leads to a situation where multiple states are likely to stockpile at least some identical exploits, with technical measures to enable a depletion process for these stockpiles that preserve state secrecy interests and consider the special constraints of interacting states as well as the requirements within such environments being non-existent. This paper proposes such a privacy-preserving approach that allows multiple state parties to privately compare their stock of vulnerabilities and exploits to check for items that occur in multiple stockpiles without revealing them so that their disclosure can be considered. We call our system ExTRUST and show that it is scalable and can withstand several attack scenarios. Beyond the intergovernmental setting, ExTRUST can also be used for other zero-trust use cases, such as bug-bounty programs.},
    number = {2},
    journal = {IEEE Transactions on Technology and Society},
    author = {Reinhold, Thomas and Kuehn, Philipp and Günther, Daniel and Schneider, Thomas and Reuter, Christian},
    year = {2023},
    keywords = {Selected, Student, A-Paper, Peace, Projekt-CROSSING, AuswahlPeace, Cyberwar, Projekt-ATHENE-SecUrban, Projekt-GRKPrivacy},
    pages = {158--170},
    }

  • Markus Bayer, Tobias Frey, Christian Reuter (2023)
    Multi-Level Fine-Tuning, Data Augmentation, and Few-Shot Learning for Specialized Cyber Threat Intelligence
    Computers & Security . doi:10.1016/j.cose.2023.103430
    [BibTeX] [Abstract] [Download PDF]

    A Design Science Artefact for Cyber Threat Detection and Actor Specific Communication

    @article{bayer_multi-level_2023,
    title = {Multi-{Level} {Fine}-{Tuning}, {Data} {Augmentation}, and {Few}-{Shot} {Learning} for {Specialized} {Cyber} {Threat} {Intelligence}},
    issn = {0167-4048},
    url = {https://peasec.de/paper/2023/2023_BayerFreyReuter_MultiLevelFineTuningForCyberThreatIntelligence_CS.pdf},
    doi = {10.1016/j.cose.2023.103430},
    abstract = {A Design Science Artefact for Cyber Threat Detection and Actor Specific Communication},
    journal = {Computers \& Security},
    author = {Bayer, Markus and Frey, Tobias and Reuter, Christian},
    year = {2023},
    keywords = {Student, Security, A-Paper, Ranking-ImpactFactor, Projekt-CROSSING, Projekt-CYWARN, Projekt-ATHENE},
    }

  • Katrin Hartwig, Christian Reuter (2023)
    Countering Fake News Technically – Detection and Countermeasure Approaches to Support Users
    In: Peter Klimczak, Thomas Zoglauer: Truth and Fake in the Post-Factual Digital Age: Distinctions in the Humanities and IT Sciences. Wiesbaden: Springer Fachmedien Wiesbaden, , 131–147. doi:10.1007/978-3-658-40406-2_7
    [BibTeX] [Abstract] [Download PDF]

    The importance of dealing with fake newsfake news has increased in both political and social contexts: While existing studies mainly focus on how to detect and label fake news, approaches to help users make their own assessments are largely lacking. This article presents existing black-boxblack box and white-boxwhite box approaches and compares advantages and disadvantages. In particular, white-box approaches show promise in counteracting reactance, while black-box approaches detect fake news with much greater accuracy. We also present the browser plugin TrustyTweetTrustyTweet, which we developed to help users evaluate tweets on Twitter by displaying politically neutral and intuitive warnings without generating reactance.

    @incollection{hartwig_countering_2023,
    address = {Wiesbaden},
    title = {Countering {Fake} {News} {Technically} – {Detection} and {Countermeasure} {Approaches} to {Support} {Users}},
    isbn = {978-3-658-40406-2},
    url = {https://peasec.de/paper/2023/2023_HartwigReuter_CounteringFakeNews_TruthFakePostTruth.pdf},
    abstract = {The importance of dealing with fake newsfake news has increased in both political and social contexts: While existing studies mainly focus on how to detect and label fake news, approaches to help users make their own assessments are largely lacking. This article presents existing black-boxblack box and white-boxwhite box approaches and compares advantages and disadvantages. In particular, white-box approaches show promise in counteracting reactance, while black-box approaches detect fake news with much greater accuracy. We also present the browser plugin TrustyTweetTrustyTweet, which we developed to help users evaluate tweets on Twitter by displaying politically neutral and intuitive warnings without generating reactance.},
    booktitle = {Truth and {Fake} in the {Post}-{Factual} {Digital} {Age}: {Distinctions} in the {Humanities} and {IT} {Sciences}},
    publisher = {Springer Fachmedien Wiesbaden},
    author = {Hartwig, Katrin and Reuter, Christian},
    editor = {Klimczak, Peter and Zoglauer, Thomas},
    year = {2023},
    doi = {10.1007/978-3-658-40406-2_7},
    keywords = {Crisis, HCI, SocialMedia, Projekt-CROSSING, Projekt-ATHENE},
    pages = {131--147},
    }

  • Thomas Reinhold (2023)
    Towards a Peaceful Development of Cyberspace: Challenges and Technical Measures for the De-Escalation of State-Led Cyberconflicts and Arms Control of Cyberweapons
    Darmstadt, Germany: Dissertation (Dr. rer. nat.), Department of Computer Science, Technische Universität Darmstadt. doi:10.26083/tuprints-00024559
    [BibTeX] [Abstract] [Download PDF]

    Cyberspace, already a few decades old, has become a matter of course for most of us, part of our everyday life. At the same time, this space and the global infrastructure behind it are essential for our civilizations, the economy and administration, and thus an essential expression and lifeline of a globalized world. However, these developments also create vulnerabilities and thus, cyberspace is increasingly developing into an intelligence and military operational area – for the defense and security of states but also as a component of offensive military planning, visible in the creation of military cyber-departments and the integration of cyberspace into states‘ security and defense strategies. In order to contain and regulate the conflict and escalation potential of technology used by military forces, over the last decades, a complex tool set of transparency, de-escalation and arms control measures has been developed and proof-tested. Unfortunately, many of these established measures do not work for cyberspace due to its specific technical characteristics. Even more, the concept of what constitutes a weapon – an essential requirement for regulation – starts to blur for this domain. Against this background, this thesis aims to answer how measures for the de-escalation of state-led conflicts in cyberspace and arms control of cyberweapons can be developed. In order to answer this question, the dissertation takes a specifically technical perspective on these problems and the underlying political challenges of state behavior and international humanitarian law in cyberspace to identify starting points for technical measures of transparency, arms control and verification. Based on this approach of adopting already existing technical measures from other fields of computer science, the thesis will provide proof of concepts approaches for some mentioned challenges like a classification system for cyberweapons that is based on technical measurable features, an approach for the mutual reduction of vulnerability stockpiles and an approach to plausibly assure the non-involvement in a cyberconflict as a measure for de-escalation. All these initial approaches and the questions of how and by which measures arms control and conflict reduction can work for cyberspace are still quite new and subject to not too many debates. Indeed, the approach of deliberately self-restricting the capabilities of technology in order to serve a bigger goal, like the reduction of its destructive usage, is yet not very common for the engineering thinking of computer science. Therefore, this dissertation also aims to provide some impulses regarding the responsibility and creative options of computer science with a view to the peaceful development and use of cyberspace.

    @book{reinhold_towards_2023,
    address = {Darmstadt, Germany},
    title = {Towards a {Peaceful} {Development} of {Cyberspace}: {Challenges} and {Technical} {Measures} for the {De}-{Escalation} of {State}-{Led} {Cyberconflicts} and {Arms} {Control} of {Cyberweapons}},
    url = {https://tuprints.ulb.tu-darmstadt.de/24559/},
    abstract = {Cyberspace, already a few decades old, has become a matter of course for most of us, part of our everyday life. At the same time, this space and the global infrastructure behind it are essential for our civilizations, the economy and administration, and thus an essential expression and lifeline of a globalized world. However, these developments also create vulnerabilities and thus, cyberspace is increasingly developing into an intelligence and military operational area – for the defense and security of states but also as a component of offensive military planning, visible in the creation of military cyber-departments and the integration of cyberspace into states' security and defense strategies. In order to contain and regulate the conflict and escalation potential of technology used by military forces, over the last decades, a complex tool set of transparency, de-escalation and arms control measures has been developed and proof-tested. Unfortunately, many of these established measures do not work for cyberspace due to its specific technical characteristics. Even more, the concept of what constitutes a weapon – an essential requirement for regulation – starts to blur for this domain. Against this background, this thesis aims to answer how measures for the de-escalation of state-led conflicts in cyberspace and arms control of cyberweapons can be developed. In order to answer this question, the dissertation takes a specifically technical perspective on these problems and the underlying political challenges of state behavior and international humanitarian law in cyberspace to identify starting points for technical measures of transparency, arms control and verification. Based on this approach of adopting already existing technical measures from other fields of computer science, the thesis will provide proof of concepts approaches for some mentioned challenges like a classification system for cyberweapons that is based on technical measurable features, an approach for the mutual reduction of vulnerability stockpiles and an approach to plausibly assure the non-involvement in a cyberconflict as a measure for de-escalation. All these initial approaches and the questions of how and by which measures arms control and conflict reduction can work for cyberspace are still quite new and subject to not too many debates. Indeed, the approach of deliberately self-restricting the capabilities of technology in order to serve a bigger goal, like the reduction of its destructive usage, is yet not very common for the engineering thinking of computer science. Therefore, this dissertation also aims to provide some impulses regarding the responsibility and creative options of computer science with a view to the peaceful development and use of cyberspace.},
    publisher = {Dissertation (Dr. rer. nat.), Department of Computer Science, Technische Universität Darmstadt},
    author = {Reinhold, Thomas},
    year = {2023},
    doi = {10.26083/tuprints-00024559},
    keywords = {Security, Peace, Projekt-CROSSING, Projekt-ATHENE, Dissertation},
    }

  • Christian Reuter, Thea Riebe, Laura Guntrum (2023)
    Science Peace Security ‘23 – Proceedings of the Interdisciplinary Conference on Technical Peace and Security Research
    Darmstadt, Germany: TUprints. doi:10.26083/tuprints-00024777
    [BibTeX] [Abstract] [Download PDF]

    The conference Science · Peace · Security ’23 took place from September 20 to 22, 2023, at the Georg-Christoph-Lichtenberg-Haus of the Technical University of Darmstadt. It focused on the transformation of technologies, their role in wars and conflicts, and issues related to arms control. The three-day scientific conference welcomed over 110 participants from Germany and speakers from the United Kingdom, Sweden, the USA, Colombia, India, Italy, Switzerland, Norway, the Czech Republic, Iraq, Austria, and the Netherlands. More than 50 different organizations were represented, ensuring interdisciplinary exchange. The program covered a wide range of topics reflecting societal discourses in light of a changing global security landscape. In total, the conference featured 40 presentations, workshops, discussions, and panels that discussed current and future challenges in the field of technical peace and conflict research. Particularly relevant topics included: Artificial Intelligence, Unmanned Weapons Systems, Rocket and Space Technologies (Nuclear) Arms Control, Regulation of Biological and Chemical Weapons, Information Technologies for Surveillance and Oppression of Civilians, (Civilian) Critical Infrastructures, Digital Peacebuilding, Human-Machine Interaction, Dual-Used, Cyber Attacks and Relevant Technology and Security Policies.

    @book{reuter_science_2023,
    address = {Darmstadt, Germany},
    title = {Science {Peace} {Security} ‘23 - {Proceedings} of the {Interdisciplinary} {Conference} on {Technical} {Peace} and {Security} {Research}},
    url = {https://tuprints.ulb.tu-darmstadt.de/id/eprint/24777},
    abstract = {The conference Science · Peace · Security '23 took place from September 20 to 22, 2023, at the Georg-Christoph-Lichtenberg-Haus of the Technical University of Darmstadt. It focused on the transformation of technologies, their role in wars and conflicts, and issues related to arms control. The three-day scientific conference welcomed over 110 participants from Germany and speakers from the United Kingdom, Sweden, the USA, Colombia, India, Italy, Switzerland, Norway, the Czech Republic, Iraq, Austria, and the Netherlands. More than 50 different organizations were represented, ensuring interdisciplinary exchange. The program covered a wide range of topics reflecting societal discourses in light of a changing global security landscape. In total, the conference featured 40 presentations, workshops, discussions, and panels that discussed current and future challenges in the field of technical peace and conflict research. Particularly relevant topics included: Artificial Intelligence, Unmanned Weapons Systems, Rocket and Space Technologies (Nuclear) Arms Control, Regulation of Biological and Chemical Weapons, Information Technologies for Surveillance and Oppression of Civilians, (Civilian) Critical Infrastructures, Digital Peacebuilding, Human-Machine Interaction, Dual-Used, Cyber Attacks and Relevant Technology and Security Policies.},
    publisher = {TUprints},
    author = {Reuter, Christian and Riebe, Thea and Guntrum, Laura},
    year = {2023},
    doi = {10.26083/tuprints-00024777},
    keywords = {Security, Peace, Projekt-CROSSING, Projekt-TraCe},
    }

  • Christian Reuter, Thea Riebe, Laura Guntrum (2023)
    Science Peace Security ’23: Editorial of the Proceedings of the Interdisciplinary Conference on Technical Peace and Security Research
    In: Christian Reuter, Thea Riebe, Laura Guntrum: Science Peace Security ’23: Proceedings of the Interdisciplinary Conference on Technical Peace and Security Research. Darmstadt, Germany: TUprints, , 9–13. doi:10.26083/tuprints-00024777
    [BibTeX] [Abstract] [Download PDF]

    The conference Science · Peace · Security ’23 took place from September 20 to 22, 2023, at the Georg-Christoph-Lichtenberg-Haus of the Technical University of Darmstadt. It focused on the transformation of technologies, their role in wars and conflicts, and issues related to arms control. The three-day scientific conference welcomed over 110 participants from Germany and speakers from the United Kingdom, Sweden, the USA, Colombia, India, Italy, Switzerland, Norway, the Czech Republic, Iraq, Austria, and the Netherlands. More than 50 different organizations were represented, ensuring interdisciplinary exchange. The program covered a wide range of topics reflecting societal discourses in light of a changing global security landscape. In total, the conference featured 40 presentations, workshops, discussions, and panels that discussed current and future challenges in the field of technical peace and conflict research. Particularly relevant topics included: Artificial Intelligence, Unmanned Weapons Systems, Rocket and Space Technologies (Nuclear) Arms Control, Regulation of Biological and Chemical Weapons, Information Technologies for Surveillance and Oppression of Civilians, (Civilian) Critical Infrastructures, Digital Peacebuilding, Human-Machine Interaction, Dual-Used, Cyber Attacks and Relevant Technology and Security Policies.

    @incollection{reuter_science_2023-1,
    address = {Darmstadt, Germany},
    title = {Science {Peace} {Security} ’23: {Editorial} of the {Proceedings} of the {Interdisciplinary} {Conference} on {Technical} {Peace} and {Security} {Research}},
    url = {https://tuprints.ulb.tu-darmstadt.de/id/eprint/24777},
    abstract = {The conference Science · Peace · Security '23 took place from September 20 to 22, 2023, at the Georg-Christoph-Lichtenberg-Haus of the Technical University of Darmstadt. It focused on the transformation of technologies, their role in wars and conflicts, and issues related to arms control. The three-day scientific conference welcomed over 110 participants from Germany and speakers from the United Kingdom, Sweden, the USA, Colombia, India, Italy, Switzerland, Norway, the Czech Republic, Iraq, Austria, and the Netherlands. More than 50 different organizations were represented, ensuring interdisciplinary exchange. The program covered a wide range of topics reflecting societal discourses in light of a changing global security landscape. In total, the conference featured 40 presentations, workshops, discussions, and panels that discussed current and future challenges in the field of technical peace and conflict research. Particularly relevant topics included: Artificial Intelligence, Unmanned Weapons Systems, Rocket and Space Technologies (Nuclear) Arms Control, Regulation of Biological and Chemical Weapons, Information Technologies for Surveillance and Oppression of Civilians, (Civilian) Critical Infrastructures, Digital Peacebuilding, Human-Machine Interaction, Dual-Used, Cyber Attacks and Relevant Technology and Security Policies.},
    booktitle = {Science {Peace} {Security} ’23: {Proceedings} of the {Interdisciplinary} {Conference} on {Technical} {Peace} and {Security} {Research}},
    publisher = {TUprints},
    author = {Reuter, Christian and Riebe, Thea and Guntrum, Laura},
    editor = {Reuter, Christian and Riebe, Thea and Guntrum, Laura},
    year = {2023},
    doi = {10.26083/tuprints-00024777},
    keywords = {Security, Peace, Projekt-CROSSING, Projekt-TraCe},
    pages = {9--13},
    }

    2022

  • Christian Reuter, Luigi Lo Iacono, Alexander Benlian (2022)
    A Quarter Century of Usable Security and Privacy Research: Transparency, Tailorability, and the Road Ahead
    Behaviour & Information Technology (BIT) ;41(10):2035–2048. doi:10.1080/0144929X.2022.2080908
    [BibTeX] [Abstract] [Download PDF]

    In the last decades, research has shown that both technical solutions and user perceptions are important to improve security and privacy in the digital realm. The field of ‘usable security’ already started to emerge in the mid-90s, primarily focussed on password and email security. Later on, the research field of ”usable security and privacy” evolved and broadened the aim to design concepts and tools to assist users in enhancing their behaviour with regard to both privacy and security. Nevertheless, many user interventions are not as effective as desired. Because of highly diverse usage contexts, leading to different privacy and security requirements and not always to one-size-fits-all approaches, tailorability is necessary to address this issue. Furthermore, transparency is a crucial requirement, as providing comprehensible information may counter reactance towards security interventions. This article first provides a brief history of the research field in its first quarter-century and then highlights research on the transparency and tailorability of user interventions. Based on this, this article then presents six contributions with regard to (1) privacy concerns in times of COVID-19, (2) authentication on mobile devices, (3) GDPR-compliant data management, (4) privacy notices on websites, (5) data disclosure scenarios in agriculture, as well as (6) rights under data protection law and the concrete process should data subjects want to claim those rights. This article concludes with several research directions on user-centred transparency and tailorability.

    @article{reuter_quarter_2022,
    title = {A {Quarter} {Century} of {Usable} {Security} and {Privacy} {Research}: {Transparency}, {Tailorability}, and the {Road} {Ahead}},
    volume = {41},
    issn = {0144-929X},
    url = {https://www.tandfonline.com/toc/tbit20/41/10},
    doi = {10.1080/0144929X.2022.2080908},
    abstract = {In the last decades, research has shown that both technical solutions and user perceptions are important to improve security and privacy in the digital realm. The field of ‘usable security’ already started to emerge in the mid-90s, primarily focussed on password and email security. Later on, the research field of ”usable security and privacy” evolved and broadened the aim to design concepts and tools to assist users in enhancing their behaviour with regard to both privacy and security. Nevertheless, many user interventions are not as effective as desired. Because of highly diverse usage contexts, leading to different privacy and security requirements and not always to one-size-fits-all approaches, tailorability is necessary to address this issue. Furthermore, transparency is a crucial requirement, as providing comprehensible information may counter reactance towards security interventions. This article first provides a brief history of the research field in its first quarter-century and then highlights research on the transparency and tailorability of user interventions. Based on this, this article then presents six contributions with regard to (1) privacy concerns in times of COVID-19, (2) authentication on mobile devices, (3) GDPR-compliant data management, (4) privacy notices on websites, (5) data disclosure scenarios in agriculture, as well as (6) rights under data protection law and the concrete process should data subjects want to claim those rights. This article concludes with several research directions on user-centred transparency and tailorability.},
    number = {10},
    journal = {Behaviour \& Information Technology (BIT)},
    author = {Reuter, Christian and Lo Iacono, Luigi and Benlian, Alexander},
    year = {2022},
    keywords = {Crisis, HCI, SocialMedia, UsableSec, Security, A-Paper, Ranking-ImpactFactor, Ranking-CORE-A, Projekt-CROSSING, Projekt-ATHENE-SecUrban},
    pages = {2035--2048},
    }

  • Laura Buhleier, Sebastian Linsner, Enno Steinbrink, Christian Reuter (2022)
    Eine Klassifikation sicherheitskritischer UX-Design-Patterns
    Mensch und Computer – Workshopband Darmstadt. doi:10.18420/muc2022-mci-ws10-275
    [BibTeX] [Abstract] [Download PDF]

    User Experience ist von zunehmender Relevanz für die Entwicklung digitaler Designentscheidungen und hat somit weitgehende Auswirkungen auf das Nutzerverhalten. Dass dies besonders für die Sicherheit und Vertraulichkeit nicht nur von Vorteil sein kann, sondern Nutzer*innen negativ beeinflussen kann, wird in dieser Arbeit ersichtlich. Betrachtetwerden dafür die Themengebiete Anti-Patterns, Grey Patterns und Dark-Patterns. Anti-Patterns bezeichnen wiederkehrende Lösungen für ein Konzept eines User Interfaces, die trotz guter Intention ungewünschte Nebeneffekte oder Konsequenzen haben. Dark-Patterns dagegen stellen Designentscheidungen dar, die durch Täuschung oder Ausnutzung psychischen Drucks versuchen Nutzer*innen zu Handlungen zu verleiten, von denen die Ersteller*innen des Dark-Patterns mehr profitieren als die Anwender* innen. Der Begriff Grey Patterns wird in dieser Arbeit für alle Design Patterns genutzt, die sich nicht direkt zuordnen lassen. Da es bisher kaum vergleichendeWerke und keinen Konsens zu diesen Themengebieten gibt, ist das Ziel dieser Arbeit ein grundlegendes Modell aufzustellen. Dabei wird durch die Untersuchung bestehender Literatur eine zusammenfassende Taxonomie und ein Vorgehen zur Unterscheidung von Anti-Patterns und Dark-Patterns erarbeitet, die als Grundlage für weitere Arbeiten und zur Entwicklung von Gegenmaßnahmen genutzt werden können.

    @inproceedings{buhleier_klassifikation_2022,
    address = {Darmstadt},
    series = {Mensch und {Computer} 2022 - {Workshopband}},
    title = {Eine {Klassifikation} sicherheitskritischer {UX}-{Design}-{Patterns}},
    url = {https://dl.gi.de/handle/20.500.12116/39087},
    doi = {10.18420/muc2022-mci-ws10-275},
    abstract = {User Experience ist von zunehmender Relevanz für die Entwicklung digitaler Designentscheidungen und hat somit weitgehende Auswirkungen auf das Nutzerverhalten. Dass dies besonders für die Sicherheit und Vertraulichkeit nicht nur von Vorteil sein kann, sondern Nutzer*innen negativ beeinflussen kann, wird in dieser Arbeit ersichtlich. Betrachtetwerden dafür die Themengebiete Anti-Patterns, Grey Patterns und Dark-Patterns. Anti-Patterns bezeichnen wiederkehrende Lösungen für ein Konzept eines User Interfaces, die trotz guter Intention ungewünschte Nebeneffekte oder Konsequenzen haben. Dark-Patterns dagegen stellen Designentscheidungen dar, die durch Täuschung oder Ausnutzung psychischen Drucks versuchen Nutzer*innen zu Handlungen zu verleiten, von denen die Ersteller*innen des Dark-Patterns mehr profitieren als die Anwender* innen. Der Begriff Grey Patterns wird in dieser Arbeit für alle Design Patterns genutzt, die sich nicht direkt zuordnen lassen. Da es bisher kaum vergleichendeWerke und keinen Konsens zu diesen Themengebieten gibt, ist das Ziel dieser Arbeit ein grundlegendes Modell aufzustellen. Dabei wird durch die Untersuchung bestehender Literatur eine zusammenfassende Taxonomie und ein Vorgehen zur Unterscheidung von Anti-Patterns und Dark-Patterns erarbeitet, die als Grundlage für weitere Arbeiten und zur Entwicklung von Gegenmaßnahmen genutzt werden können.},
    language = {de},
    booktitle = {Mensch und {Computer} - {Workshopband}},
    publisher = {Gesellschaft für Informatik},
    author = {Buhleier, Laura and Linsner, Sebastian and Steinbrink, Enno and Reuter, Christian},
    year = {2022},
    keywords = {HCI, Student, UsableSec, Security, Projekt-CROSSING, Projekt-GRKPrivacy},
    }

  • Tom Biselli, Enno Steinbrink, Franziska Herbert, Gina Maria Schmidbauer-Wolf, Christian Reuter (2022)
    On the Challenges of Developing a Concise Questionnaire to Identify Privacy Personas
    Proceedings on Privacy Enhancing Technologies (PoPETs) (4):645–669. doi:10.56553/popets-2022-0126
    [BibTeX] [Abstract] [Download PDF]

    Concise instruments to determine privacy personas – typical privacy-related user groups – are not available at present. Consequently, we aimed to identify them on a privacy knowledge–privacy behavior ratio based on a self-developed instrument. To achieve this, we conducted an item analysis (N = 820) and a confirmatory factor analysis (CFA) (N = 656) of data based on an online study with German participants. Starting with 81 items, we reduced those to an eleven-item questionnaire with the two scales privacy knowledge and privacy behavior. A subsequent cluster analysis (N = 656) revealed three distinct user groups: (1) Fundamentalists scoring high in privacy knowledge and behavior, (2) Pragmatists scoring average in privacy knowledge and behavior and (3) Unconcerned scoring low in privacy knowledge and behavior. In a closer inspection of the questionnaire, the CFAs supported the model with a close global fit based on RMSEA in a training and to a lesser extent in a cross-validation sample. Deficient local fit as well as validity and reliability coefficients well below generally accepted thresholds, however, revealed that the questionnaire in its current form cannot be considered a suitable measurement instrument for determining privacy personas. The results are discussed in terms of related persona conceptualizations, the importance of a methodologically sound investigation of corresponding privacy dimensions and our lessons learned.

    @article{biselli_challenges_2022,
    title = {On the {Challenges} of {Developing} a {Concise} {Questionnaire} to {Identify} {Privacy} {Personas}},
    url = {https://petsymposium.org/2022/files/papers/issue4/popets-2022-0126.pdf},
    doi = {10.56553/popets-2022-0126},
    abstract = {Concise instruments to determine privacy personas – typical privacy-related user groups – are not available at present. Consequently, we aimed to identify them on a privacy knowledge–privacy behavior ratio based on a self-developed instrument. To achieve this, we conducted an item analysis (N = 820) and a confirmatory factor analysis (CFA) (N = 656) of data based on an online study with German participants. Starting with 81 items, we reduced those to an eleven-item questionnaire with the two scales privacy knowledge and privacy behavior. A subsequent cluster analysis (N = 656) revealed three distinct user groups: (1) Fundamentalists scoring high in privacy knowledge and behavior, (2) Pragmatists scoring average in privacy knowledge and behavior and (3) Unconcerned scoring low in privacy knowledge and behavior. In a closer inspection of the questionnaire, the CFAs supported the model with a close global fit based on RMSEA in a training and to a lesser extent in a cross-validation sample. Deficient local fit as well as validity and reliability coefficients well below generally accepted thresholds, however, revealed that the questionnaire in its current form cannot be considered a suitable measurement instrument for determining privacy personas. The results are discussed in terms of related persona conceptualizations, the importance of a methodologically sound investigation of corresponding privacy dimensions and our lessons learned.},
    number = {4},
    journal = {Proceedings on Privacy Enhancing Technologies (PoPETs)},
    author = {Biselli, Tom and Steinbrink, Enno and Herbert, Franziska and Schmidbauer-Wolf, Gina Maria and Reuter, Christian},
    year = {2022},
    keywords = {HCI, Selected, UsableSec, Security, A-Paper, Ranking-CORE-A, Projekt-CROSSING, Projekt-ATHENE-FANCY, AuswahlUsableSec, Projekt-GRKPrivacy},
    pages = {645--669},
    }

  • Katrin Hartwig, Christian Reuter (2022)
    Nudging Users Towards Better Security Decisions in Password Creation Using Whitebox-based Multidimensional Visualizations
    Behaviour & Information Technology (BIT) ;41(7):1357–1380. doi:10.1080/0144929X.2021.1876167
    [BibTeX] [Abstract] [Download PDF]

    Nudging users to keep them secure online has become a growing research field in cybersecurity. While existing approaches are mainly blackbox based, showing aggregated visualisations as one-size-fits-all nudges, personalisation turned out promising to enhance the efficacy of nudges within the high variance of users and contexts. This article presents a disaggregated whitebox-based visualisation of critical information as a novel nudge. By segmenting users according to their decision-making and information processing styles, we investigate if the novel nudge is more effective for specific users than a common black-box nudge. Based on existing literature about critical factors in password security, we designed a dynamic radar chart and parallel coordinates as disaggregated visualisations. We evaluated the short-term effectiveness and users‘ perception of the nudges in a think-aloud prestudy and a representative online evaluation (N=1.012). Our findings suggest that dynamic radar charts present a moderately effective nudge towards stronger passwords regarding short-term efficacy and are appreciated particularly by players of role-playing games.

    @article{hartwig_nudging_2022,
    title = {Nudging {Users} {Towards} {Better} {Security} {Decisions} in {Password} {Creation} {Using} {Whitebox}-based {Multidimensional} {Visualizations}},
    volume = {41},
    url = {https://peasec.de/paper/2022/2022_HartwigReuter_WhiteboxMultidimensionalNudges_BIT.pdf},
    doi = {10.1080/0144929X.2021.1876167},
    abstract = {Nudging users to keep them secure online has become a growing research field in cybersecurity. While existing approaches are mainly blackbox based, showing aggregated visualisations as one-size-fits-all nudges, personalisation turned out promising to enhance the efficacy of nudges within the high variance of users and contexts. This article presents a disaggregated whitebox-based visualisation of critical information as a novel nudge. By segmenting users according to their decision-making and information processing styles, we investigate if the novel nudge is more effective for specific users than a common black-box nudge. Based on existing literature about critical factors in password security, we designed a dynamic radar chart and parallel coordinates as disaggregated visualisations. We evaluated the short-term effectiveness and users' perception of the nudges in a think-aloud prestudy and a representative online evaluation (N=1.012). Our findings suggest that dynamic radar charts present a moderately effective nudge towards stronger passwords regarding short-term efficacy and are appreciated particularly by players of role-playing games.},
    number = {7},
    journal = {Behaviour \& Information Technology (BIT)},
    author = {Hartwig, Katrin and Reuter, Christian},
    year = {2022},
    keywords = {HCI, Selected, UsableSec, Security, A-Paper, Ranking-ImpactFactor, Ranking-CORE-A, Projekt-CROSSING, Projekt-ATHENE-FANCY, AuswahlUsableSec},
    pages = {1357--1380},
    }

    2021

  • Anjuli Franz, Gregor Albrecht, Verena Zimmermann, Katrin Hartwig, Christian Reuter, Alexander Benlian, Joachim Vogt (2021)
    SoK: Still Plenty of Phish in the Sea — A Review of User-Oriented Phishing Interventions and Avenues for Future Research
    USENIX Symposium on Usable Privacy and Security (SOUPS) .
    [BibTeX] [Abstract] [Download PDF]

    Phishing is a prevalent cyber threat, targeting individuals and organizations alike. Previous approaches on anti-phishing measures have started to recognize the role of the user, who, at the center of the target, builds the last line of defense. However, user-oriented phishing interventions are fragmented across a diverse research landscape, which has not been systematized to date. This makes it challenging to gain an overview of the various approaches taken by prior works. In this paper, we present a taxonomy of phishing interventions based on a systematic literature analysis. We shed light on the diversity of existing approaches by analyzing them with respect to the intervention type, the addressed phishing attack vector, the time at which the intervention takes place, and the required user interaction. Furthermore, we highlight shortcomings and challenges emerging from both our literature sample and prior meta-analyses, and discuss them in the light of current movements in the field of usable security. With this article, we hope to provide useful directions for future works on phishing interventions.

    @inproceedings{franz_sok_2021,
    title = {{SoK}: {Still} {Plenty} of {Phish} in the {Sea} — {A} {Review} of {User}-{Oriented} {Phishing} {Interventions} and {Avenues} for {Future} {Research}},
    isbn = {978-1-939133-25-0},
    url = {https://www.usenix.org/system/files/soups2021-franz.pdf},
    abstract = {Phishing is a prevalent cyber threat, targeting individuals and
    organizations alike. Previous approaches on anti-phishing
    measures have started to recognize the role of the user, who,
    at the center of the target, builds the last line of defense.
    However, user-oriented phishing interventions are fragmented
    across a diverse research landscape, which has not been
    systematized to date. This makes it challenging to gain an
    overview of the various approaches taken by prior works.
    In this paper, we present a taxonomy of phishing interventions
    based on a systematic literature analysis. We shed light
    on the diversity of existing approaches by analyzing them
    with respect to the intervention type, the addressed phishing
    attack vector, the time at which the intervention takes place,
    and the required user interaction. Furthermore, we highlight
    shortcomings and challenges emerging from both our literature
    sample and prior meta-analyses, and discuss them in
    the light of current movements in the field of usable security.
    With this article, we hope to provide useful directions for
    future works on phishing interventions.},
    booktitle = {{USENIX} {Symposium} on {Usable} {Privacy} and {Security} ({SOUPS})},
    author = {Franz, Anjuli and Albrecht, Gregor and Zimmermann, Verena and Hartwig, Katrin and Reuter, Christian and Benlian, Alexander and Vogt, Joachim},
    year = {2021},
    keywords = {UsableSec, Security, Ranking-CORE-B, Projekt-CROSSING, AuswahlUsableSec},
    }

  • Katrin Hartwig, Christian Reuter (2021)
    Nudge or Restraint: How do People Assess Nudging in Cybersecurity – A Representative Study in Germany
    European Symposium on Usable Security (EuroUSEC) Karlsruhe, Germany. doi:10.1145/3481357.3481514
    [BibTeX] [Abstract] [Download PDF]

    While nudging is a long-established instrument in many contexts, it has more recently emerged to be relevant in cybersecurity as well. For instance, existing research suggests nudges for stronger passwords or safe WiFi connections. However, those nudges are often not as effective as desired. To improve their effectiveness, it is crucial to understand how people assess nudges in cybersecurity, to address potential fears and resulting reactance and to facilitate voluntary compliance. In other contexts, such as the health sector, studies have already thoroughly explored the attitude towards nudging. To address that matter in cybersecurity, we conducted a representative study in Germany (𝑁 = 1, 012), asking people about their attitude towards nudging in that specific context. Our findings reveal that 64\% rated nudging in cybersecurity as helpful, however several participants expected risks such as intentional misguidance, manipulation and data exposure as well.

    @inproceedings{hartwig_nudge_2021,
    address = {Karlsruhe, Germany},
    title = {Nudge or {Restraint}: {How} do {People} {Assess} {Nudging} in {Cybersecurity} - {A} {Representative} {Study} in {Germany}},
    url = {https://peasec.de/paper/2021/2021_HartwigReuter_NudgingCybersecurityRepresentativeStudy_EuroUSEC.pdf},
    doi = {10.1145/3481357.3481514},
    abstract = {While nudging is a long-established instrument in many contexts, it has more recently emerged to be relevant in cybersecurity as well. For instance, existing research suggests nudges for stronger passwords or safe WiFi connections. However, those nudges are often not as effective as desired. To improve their effectiveness, it is crucial to understand how people assess nudges in cybersecurity, to address potential fears and resulting reactance and to facilitate voluntary compliance. In other contexts, such as the health sector, studies have already thoroughly explored the attitude towards nudging. To address that matter in cybersecurity, we conducted a representative study in Germany (𝑁 = 1, 012), asking people about their attitude towards nudging in that specific context. Our findings reveal that 64\% rated nudging in cybersecurity as helpful, however several participants expected risks such as intentional misguidance, manipulation and data exposure as well.},
    booktitle = {European {Symposium} on {Usable} {Security} ({EuroUSEC})},
    publisher = {ACM},
    author = {Hartwig, Katrin and Reuter, Christian},
    year = {2021},
    keywords = {UsableSec, Security, Projekt-CROSSING, Projekt-ATHENE-SecUrban},
    pages = {141--150},
    }

  • Katrin Hartwig, Atlas Englisch, Jan Pelle Thomson, Christian Reuter (2021)
    Finding Secret Treasure? Improving Memorized Secrets Through Gamification
    European Symposium on Usable Security (EuroUSEC) Karlsruhe, Germany. doi:10.1145/3481357.3481509
    [BibTeX] [Abstract] [Download PDF]

    Users tend to bypass systems that are designed to increase their personal security and privacy while limiting their perceived freedom. Nudges present a possible solution to this problem, offering security benefits without taking away perceived freedom. We have identified a lack of research comparing concrete implementations of nudging concepts in an emulated real-world scenario to assess their relative value as a nudge. Comparing multiple nudging implementations in an emulated real-world scenario including a novel avatar nudge with gamification elements, this publication discusses the advantages of nudging for stronger user-created passwords regarding efficacy, usability, and memorability.We investigated the effect of gamification in nudges, performing two studies (𝑁1 = 16, 𝑁2 = 1, 000) to refine and evaluate implementations of current and novel nudging concepts. Our research found a gamified nudge, which integrates a personalizable avatar guide into the registration process, to perform less effectively than state-of-the-art nudges, independently of participants’ gaming frequency.

    @inproceedings{hartwig_finding_2021,
    address = {Karlsruhe, Germany},
    title = {Finding {Secret} {Treasure}? {Improving} {Memorized} {Secrets} {Through} {Gamification}},
    url = {https://peasec.de/paper/2021/2021_HartwigEnglischThomsonReuter_MemorizedSecretsThroughGamification_EuroUSEC.pdf},
    doi = {10.1145/3481357.3481509},
    abstract = {Users tend to bypass systems that are designed to increase their personal security and privacy while limiting their perceived freedom.
    Nudges present a possible solution to this problem, offering security benefits without taking away perceived freedom. We have
    identified a lack of research comparing concrete implementations of nudging concepts in an emulated real-world scenario to assess their
    relative value as a nudge. Comparing multiple nudging implementations in an emulated real-world scenario including a novel avatar
    nudge with gamification elements, this publication discusses the advantages of nudging for stronger user-created passwords regarding
    efficacy, usability, and memorability.We investigated the effect of gamification in nudges, performing two studies (𝑁1 = 16, 𝑁2 = 1, 000)
    to refine and evaluate implementations of current and novel nudging concepts. Our research found a gamified nudge, which integrates
    a personalizable avatar guide into the registration process, to perform less effectively than state-of-the-art nudges, independently of
    participants’ gaming frequency.},
    booktitle = {European {Symposium} on {Usable} {Security} ({EuroUSEC})},
    publisher = {ACM},
    author = {Hartwig, Katrin and Englisch, Atlas and Thomson, Jan Pelle and Reuter, Christian},
    year = {2021},
    keywords = {Student, UsableSec, Security, Projekt-CROSSING, Projekt-ATHENE-SecUrban},
    pages = {105--117},
    }

    2020

  • Philipp Imperatori, Thea Riebe, Christian Reuter (2020)
    Verschlüsselungspolitik der USA: Vom Clipper-Chip zu Edward Snowden
    FIfF-Kommunikation ;37:77–80.
    [BibTeX] [Download PDF]

    @article{imperatori_verschlusselungspolitik_2020,
    title = {Verschlüsselungspolitik der {USA}: {Vom} {Clipper}-{Chip} zu {Edward} {Snowden}},
    volume = {37},
    url = {https://tuprints.ulb.tu-darmstadt.de/20060/1/fk-1-20-p77.pdf},
    journal = {FIfF-Kommunikation},
    author = {Imperatori, Philipp and Riebe, Thea and Reuter, Christian},
    year = {2020},
    keywords = {Student, Security, Peace, Projekt-DualUse, Projekt-CROSSING},
    pages = {77--80},
    }

  • Christian Reuter, Jürgen Altmann, Malte Göttsche, Mirko Himmel (2020)
    Zur naturwissenschaftlich-technischen Friedens- und Konfliktforschung – Aktuelle Herausforderungen und Bewertung der Empfehlungen des Wissenschaftsrats
    Zeitschrift für Friedens- und Konfliktforschung (ZeFKo) ;9(1):143–154. doi:10.1007/s42597-020-00035-z
    [BibTeX] [Abstract] [Download PDF]

    ie besorgniserregende Aufkündigung des INF-Vertrags, der wiederholte Einsatz von Chemiewaffen in Syrien, kontroverse Diskussionen über die Einführung autonomer Waffensysteme oder zunehmende Cyber-Bedrohungen prägen das aktuelle politische Weltgeschehen. Besonders in einer Zeit, in der nukleare, biologische und chemische Abrüstung- und Rüstungskontrollmaßnahmen vor großen Herausforderungen stehen und gleichzeitig neue Technologien veränderte Anforderungen an diese Kontrollmechanismen mit sich bringen, gewinnt die naturwissenschaftlich-technische Friedensforschung enorm an Bedeutung. Sie beschäftigt sich auf der Grundlage von Erkenntnissen aus verschiedenen Naturwissenschaften und technischen Fachrichtungen (z. B. Physik, Chemie, Biologie, Informatik) mit der Rolle naturwissenschaftlicher und technischer Möglichkeiten im Kontext von Krieg und Frieden sowie Rüstung und Abrüstung. Sie unterstützt die politischen Prozesse der Kriegsprävention, der Abrüstung und der Vertrauensbildung mit Analysen der Eigenschaften und Folgen neuer Waffenarten und Technologien. Aus dieser Forschung werden Vorschläge für die Begrenzung neuer Waffenentwicklungen ebenso entwickelt wie technische Lösungen für eine verbesserte Rüstungskontrolle. Dieser Artikel benennt aktuelle Herausforderungen der naturwissenschaftlich-technischen Friedensforschung und geht dabei auch auf die aktuellen Empfehlungen des Wissenschaftsrats zur Weiterentwicklung der Friedens- und Konfliktforschung aus dem Jahr 2019 ein.

    @article{reuter_zur_2020,
    title = {Zur naturwissenschaftlich-technischen {Friedens}- und {Konfliktforschung} – {Aktuelle} {Herausforderungen} und {Bewertung} der {Empfehlungen} des {Wissenschaftsrats}},
    volume = {9},
    url = {https://link.springer.com/content/pdf/10.1007/s42597-020-00035-z.pdf},
    doi = {10.1007/s42597-020-00035-z},
    abstract = {ie besorgniserregende Aufkündigung des INF-Vertrags, der wiederholte Einsatz von Chemiewaffen in Syrien, kontroverse Diskussionen über die Einführung autonomer Waffensysteme oder zunehmende Cyber-Bedrohungen prägen das aktuelle politische Weltgeschehen. Besonders in einer Zeit, in der nukleare, biologische und chemische Abrüstung- und Rüstungskontrollmaßnahmen vor großen Herausforderungen stehen und gleichzeitig neue Technologien veränderte Anforderungen an diese Kontrollmechanismen mit sich bringen, gewinnt die naturwissenschaftlich-technische Friedensforschung enorm an Bedeutung. Sie beschäftigt sich auf der Grundlage von Erkenntnissen aus verschiedenen Naturwissenschaften und technischen Fachrichtungen (z. B. Physik, Chemie, Biologie, Informatik) mit der Rolle naturwissenschaftlicher und technischer Möglichkeiten im Kontext von Krieg und Frieden sowie Rüstung und Abrüstung. Sie unterstützt die politischen Prozesse der Kriegsprävention, der Abrüstung und der Vertrauensbildung mit Analysen der Eigenschaften und Folgen neuer Waffenarten und Technologien. Aus dieser Forschung werden Vorschläge für die Begrenzung neuer Waffenentwicklungen ebenso entwickelt wie technische Lösungen für eine verbesserte Rüstungskontrolle. Dieser Artikel benennt aktuelle Herausforderungen der naturwissenschaftlich-technischen Friedensforschung und geht dabei auch auf die aktuellen Empfehlungen des Wissenschaftsrats zur Weiterentwicklung der Friedens- und Konfliktforschung aus dem Jahr 2019 ein.},
    number = {1},
    journal = {Zeitschrift für Friedens- und Konfliktforschung (ZeFKo)},
    author = {Reuter, Christian and Altmann, Jürgen and Göttsche, Malte and Himmel, Mirko},
    year = {2020},
    keywords = {Security, Peace, Projekt-CROSSING, Cyberwar, Projekt-ATHENE-SecUrban},
    pages = {143--154},
    }

    2019

  • Christian Reuter, Konstantin Aal, Larissa Aldehoff, Jürgen Altmann, Johannes Buchmann, Ute Bernhardt, Kai Denker, Dominik Herrmann, Matthias Hollick, Stefan Katzenbeisser, Marc-André Kaufhold, Alfred Nordmann, Thomas Reinhold, Thea Riebe, Annette Ripper, Ingo Ruhmann, Klaus-Peter Saalbach, Niklas Schörnig, Ali Sunyaev, Volker Wulf (2019)
    The Future of IT in Peace and Security
    In: Christian Reuter: Information Technology for Peace and Security – IT-Applications and Infrastructures in Conflicts, Crises, War, and Peace. Wiesbaden, Germany: Springer Vieweg, , 405–413. doi:10.1007/978-3-658-25652-4_19
    [BibTeX] [Abstract] [Download PDF]

    Not only today, but also in the future information technology and the advances in the field of computer science will have a high relevance for peace and security. Naturally, a textbook like this can only cover a selective part of research and a certain point in time. Nonetheless, it can be attempted to identify trends, challenges and venture an outlook into the future. That is exactly what we want to achieve in this chapter: To predict fu-ture developments and try to classify them correctly. These considerations were made both by the editor and the authors involved alike. Therefore, an outlook based on fun-damentals, cyber conflicts and war, cyber peace, cyber arms control, infrastructures as well as social interaction is given.

    @incollection{reuter_future_2019,
    address = {Wiesbaden, Germany},
    title = {The {Future} of {IT} in {Peace} and {Security}},
    isbn = {978-3-658-25652-4},
    url = {https://www.springer.com/de/book/9783658256517},
    abstract = {Not only today, but also in the future information technology and the advances in the field of computer science will have a high relevance for peace and security. Naturally, a textbook like this can only cover a selective part of research and a certain point in time. Nonetheless, it can be attempted to identify trends, challenges and venture an outlook into the future. That is exactly what we want to achieve in this chapter: To predict fu-ture developments and try to classify them correctly. These considerations were made both by the editor and the authors involved alike. Therefore, an outlook based on fun-damentals, cyber conflicts and war, cyber peace, cyber arms control, infrastructures as well as social interaction is given.},
    booktitle = {Information {Technology} for {Peace} and {Security} - {IT}-{Applications} and {Infrastructures} in {Conflicts}, {Crises}, {War}, and {Peace}},
    publisher = {Springer Vieweg},
    author = {Reuter, Christian and Aal, Konstantin and Aldehoff, Larissa and Altmann, Jürgen and Buchmann, Johannes and Bernhardt, Ute and Denker, Kai and Herrmann, Dominik and Hollick, Matthias and Katzenbeisser, Stefan and Kaufhold, Marc-André and Nordmann, Alfred and Reinhold, Thomas and Riebe, Thea and Ripper, Annette and Ruhmann, Ingo and Saalbach, Klaus-Peter and Schörnig, Niklas and Sunyaev, Ali and Wulf, Volker},
    editor = {Reuter, Christian},
    year = {2019},
    doi = {10.1007/978-3-658-25652-4_19},
    keywords = {HCI, UsableSec, Security, Peace, Projekt-CRISP, Projekt-CROSSING},
    pages = {405--413},
    }

  • Christian Reuter (2019)
    Information Technology for Peace and Security – Introduction and Overview
    In: Christian Reuter: Information Technology for Peace and Security – IT-Applications and Infrastructures in Conflicts, Crises, War, and Peace. Wiesbaden, Germany: Springer Vieweg, , 3–9. doi:10.1007/978-3-658-25652-4_1
    [BibTeX] [Abstract] [Download PDF]

    Technological and scientific progress, especially the rapid development in information technology (IT), plays a crucial role regarding questions of peace and security. This textbook addresses the significance, potentials and challenges of IT for peace and securi-ty. For this purpose, the book offers an introduction to peace, conflict, and security research, thereby focusing on natural science, technical and computer science perspec-tives. In the following, it sheds light on fundamentals (e.g. IT in peace, conflict and security, natural-science/technical peace research), cyber conflicts and war (e.g. infor-mation warfare, cyber espionage, cyber defence, Darknet), cyber peace (e.g. dual-use, technology assessment, confidence and security building measures), cyber arms control (e.g. arms control in the cyberspace, unmanned systems, verification), cyber attribution and infrastructures (e.g. attribution of cyber attacks, resilient infrastructures, secure critical information infrastructures), culture and interaction (e.g. safety and security, cultural violence, social media), before an outlook is given. This chapter provides an overview of all chapters in this book.

    @incollection{reuter_information_2019,
    address = {Wiesbaden, Germany},
    title = {Information {Technology} for {Peace} and {Security} - {Introduction} and {Overview}},
    isbn = {978-3-658-25652-4},
    url = {https://www.springer.com/de/book/9783658256517},
    abstract = {Technological and scientific progress, especially the rapid development in information technology (IT), plays a crucial role regarding questions of peace and security. This textbook addresses the significance, potentials and challenges of IT for peace and securi-ty. For this purpose, the book offers an introduction to peace, conflict, and security research, thereby focusing on natural science, technical and computer science perspec-tives. In the following, it sheds light on fundamentals (e.g. IT in peace, conflict and security, natural-science/technical peace research), cyber conflicts and war (e.g. infor-mation warfare, cyber espionage, cyber defence, Darknet), cyber peace (e.g. dual-use, technology assessment, confidence and security building measures), cyber arms control (e.g. arms control in the cyberspace, unmanned systems, verification), cyber attribution and infrastructures (e.g. attribution of cyber attacks, resilient infrastructures, secure critical information infrastructures), culture and interaction (e.g. safety and security, cultural violence, social media), before an outlook is given. This chapter provides an overview of all chapters in this book.},
    booktitle = {Information {Technology} for {Peace} and {Security} - {IT}-{Applications} and {Infrastructures} in {Conflicts}, {Crises}, {War}, and {Peace}},
    publisher = {Springer Vieweg},
    author = {Reuter, Christian},
    editor = {Reuter, Christian},
    year = {2019},
    doi = {10.1007/978-3-658-25652-4_1},
    keywords = {Crisis, Security, Peace, Projekt-CRISP, Projekt-CROSSING},
    pages = {3--9},
    }

  • Sebastian Linsner, Rashmi Varma, Christian Reuter (2019)
    Vulnerability Assessment in the Smart Farming Infrastructure through Cyberattacks
    39. GIL-Jahrestagung: Informatik in der Land-, Forst- und Ernährungswirtschaft Fokus; Digitalisierung für landwirtschaftliche Betriebe in kleinstrukturierten Regionen – ein Widerspruch in sich?, Lecture Notes in Informatics (LNI) Wien, Austria.
    [BibTeX] [Abstract] [Download PDF]

    The Internet of Things (IoT) has a significant impact on agriculture. So-called Smart Farming uses drones and a variety of sensors to measure climate, irrigation, soil moisture or GPS position. With this rapid influx of technology increases the threat that vulnerabilities in those technologies are being exploited for malicious intent. To show the impact of cyberattacks on agriculture, we present a simulation of several attacks on a ZigBee-based wireless sensor network. We conduct a delay attack, an interference attack and three different routing attacks (sinkhole, blackhole and selective forwarding attack). Those attacks are simulated using NETA with the OMNET++ framework. We will show that the security of WSN is influenced by factors like energy consumption or computation power, which can conflict with other interests like low per-unit costs.

    @inproceedings{linsner_vulnerability_2019,
    address = {Wien, Austria},
    title = {Vulnerability {Assessment} in the {Smart} {Farming} {Infrastructure} through {Cyberattacks}},
    url = {http://gil-net.de/Publikationen/139_119.pdf},
    abstract = {The Internet of Things (IoT) has a significant impact on agriculture. So-called Smart Farming uses drones and a variety of sensors to measure climate, irrigation, soil moisture or GPS position. With this rapid influx of technology increases the threat that vulnerabilities in those technologies are being exploited for malicious intent. To show the impact of cyberattacks on agriculture, we present a simulation of several attacks on a ZigBee-based wireless sensor network. We conduct a delay attack, an interference attack and three different routing attacks (sinkhole, blackhole and selective forwarding attack). Those attacks are simulated using NETA with the OMNET++ framework. We will show that the security of WSN is influenced by factors like energy consumption or computation power, which can conflict with other interests like low per-unit costs.},
    booktitle = {39. {GIL}-{Jahrestagung}: {Informatik} in der {Land}-, {Forst}- und {Ernährungswirtschaft} {Fokus}; {Digitalisierung} für landwirtschaftliche {Betriebe} in kleinstrukturierten {Regionen} – ein {Widerspruch} in sich?, {Lecture} {Notes} in {Informatics} ({LNI})},
    publisher = {Gesellschaft für Informatik},
    author = {Linsner, Sebastian and Varma, Rashmi and Reuter, Christian},
    editor = {Meyer-Aurich, A.},
    year = {2019},
    keywords = {Student, Ranking-CORE-C, Ranking-VHB-C, Security, Infrastructure, RSF, Projekt-CROSSING, Projekt-GeoBox, Projekt-HyServ},
    pages = {119--124},
    }

  • Sebastian Linsner, Franz Kuntke, Gina Maria Schmidbauer-Wolf, Christian Reuter (2019)
    Blockchain in der Landwirtschaft 4.0 – Empirische Studie zu Erwartungen von Landwirt_innen gegenüber dezentralen Services auf Basis von Distributed Ledger Technology
    Mensch und Computer – Tagungsband Hamburg, Germany. doi:10.1145/3340764.3340799
    [BibTeX] [Abstract] [Download PDF]

    Digitalization, which proceeds in all branches, as well in agriculture, by using new technology, sensors and networking, requires responsible usage of data. One possibility to manage data and use them to create value is the blockchain-technology. It is primary enforced by the food industries and consumers to ensure traceability and transparency. To put blockchain-technology into beneficial use in agriculture, this domain has to be analyzed regarding social and business aspects. This paper presents the results of a qualitative study where 41 actors from the agricultural do-main participated in focus groups and delivered a written statement. It was found that farmers are interested in adapting new markets and technologies early to get an economic advantage. On the other hand, the fear of losing traditional local business partners and the social surroundings of the farmers must be considered

    @inproceedings{linsner_blockchain_2019,
    address = {Hamburg, Germany},
    title = {Blockchain in der {Landwirtschaft} 4.0 - {Empirische} {Studie} zu {Erwartungen} von {Landwirt}\_innen gegenüber dezentralen {Services} auf {Basis} von {Distributed} {Ledger} {Technology}},
    url = {https://dl.acm.org/citation.cfm?id=3340799},
    doi = {10.1145/3340764.3340799},
    abstract = {Digitalization, which proceeds in all branches, as well in agriculture, by using new technology, sensors and networking, requires responsible usage of data. One possibility to manage data and use them to create value is the blockchain-technology. It is primary enforced by the food industries and consumers to ensure traceability and transparency. To put blockchain-technology into beneficial use in agriculture, this domain has to be analyzed regarding social and business aspects. This paper presents the results of a qualitative study where 41 actors from the agricultural do-main participated in focus groups and delivered a written statement. It was found that farmers are interested in adapting new markets and technologies early to get an economic advantage. On the other hand, the fear of losing traditional local business partners and the social surroundings of the farmers must be considered},
    booktitle = {Mensch und {Computer} - {Tagungsband}},
    publisher = {ACM},
    author = {Linsner, Sebastian and Kuntke, Franz and Schmidbauer-Wolf, Gina Maria and Reuter, Christian},
    editor = {Alt, Florian and Bulling, Andreas and Döring, Tanja},
    year = {2019},
    keywords = {Cooperation, HCI, Projekt-CRISP, Projekt-CROSSING, Projekt-MAKI, Projekt-GeoBox, Projekt-HyServ},
    pages = {103--113},
    }

  • Christian Reuter, Katja Häusser, Mona Bien, Franziska Herbert (2019)
    Between Effort and Security: User Assessment of the Adequacy of Security Mechanisms for App Categories
    Mensch und Computer – Tagungsband Hamburg, Germany. doi:10.1145/3340764.3340770
    [BibTeX] [Abstract] [Download PDF]

    With the increasing popularity of the smartphone, the number of people using it for financial transactions such as online shopping, online banking or mobile payment is also growing. Apps used in these contexts store sensitive and valuable data, creating a need for security measures. It has not yet been researched to what extent certain authentication mechanisms, which can be information-, biometric- as well as token-based, are suitable for individual apps and the respective data. The goal of this work is to assess how perceived security and estimated effort of using such mechanisms, as well as the degree to which app data is considered worth protecting, influence users‘ choices of appropriate measures to protect app categories. Therefore, we conducted a representative study (n=1024). On the one hand, our results show that a positive correlation between perceived security and effort exists for all investigated non-biometric authentication methods. On the other hand, the study sheds light on the differences between the investigated app categories and the users‘ choice of the appropriate security mechanisms for the particular category. In contrast to perceived security having a positive influence on a user’s preference of mechanism, a relation can hardly be identified for effort. Moreover, app data sensitivity does not seem relevant for the users‘ choice of security mechanism.

    @inproceedings{reuter_between_2019,
    address = {Hamburg, Germany},
    title = {Between {Effort} and {Security}: {User} {Assessment} of the {Adequacy} of {Security} {Mechanisms} for {App} {Categories}},
    url = {http://www.peasec.de/paper/2019/2019_ReuterHaeusserBienHerbert_EffortSecurity_MuC.pdf},
    doi = {10.1145/3340764.3340770},
    abstract = {With the increasing popularity of the smartphone, the number of people using it for financial transactions such as online shopping, online banking or mobile payment is also growing. Apps used in these contexts store sensitive and valuable data, creating a need for security measures. It has not yet been researched to what extent certain authentication mechanisms, which can be information-, biometric- as well as token-based, are suitable for individual apps and the respective data. The goal of this work is to assess how perceived security and estimated effort of using such mechanisms, as well as the degree to which app data is considered worth protecting, influence users' choices of appropriate measures to protect app categories. Therefore, we conducted a representative study (n=1024). On the one hand, our results show that a positive correlation between perceived security and effort exists for all investigated non-biometric authentication methods. On the other hand, the study sheds light on the differences between the investigated app categories and the users' choice of the appropriate security mechanisms for the particular category. In contrast to perceived security having a positive influence on a user's preference of mechanism, a relation can hardly be identified for effort. Moreover, app data sensitivity does not seem relevant for the users' choice of security mechanism.},
    booktitle = {Mensch und {Computer} - {Tagungsband}},
    publisher = {ACM},
    author = {Reuter, Christian and Häusser, Katja and Bien, Mona and Herbert, Franziska},
    editor = {Alt, Florian and Bulling, Andreas and Döring, Tanja},
    year = {2019},
    keywords = {HCI, Student, UsableSec, Security, Projekt-CRISP, Projekt-CROSSING, Projekt-ATHENE-FANCY},
    pages = {287--297},
    }

  • Larissa Aldehoff, Meri Dankenbring, Christian Reuter (2019)
    Renouncing Privacy in Crisis Management? People’s View on Social Media Monitoring and Surveillance
    Proceedings of the Information Systems for Crisis Response and Management (ISCRAM) València, Spain.
    [BibTeX] [Abstract] [Download PDF]

    Social media is used during crises and disasters by state authorities and citizens to communicate and provide, gain and analyze information. Monitoring of platforms in such cases is both a well-established practice and a research area. The question, whether people are willing to renounce privacy in social media during critical incidents, or even allow surveillance in order to contribute to public security, remains unanswered. Our survey of 1,024 German inhabitants is the first empirical study on people’s views on social media monitoring and surveillance in crisis management. We find the willingness to share data during an imminent threat depends mostly on the type of data: a majority (63\% and 67\%, respectively) would give access to addresses and telephone numbers, whereas the willingness to share content of chats or telephone calls is significantly lower (27\%). Our analysis reveals diverging opinions among participants and some effects of sociodemographic variables on the acceptance of invasions into privacy.

    @inproceedings{aldehoff_renouncing_2019,
    address = {València, Spain},
    title = {Renouncing {Privacy} in {Crisis} {Management}? {People}'s {View} on {Social} {Media} {Monitoring} and {Surveillance}},
    url = {http://www.peasec.de/paper/2019/2019_AldehoffDankenbringReuter_RenouncingPrivacyCrisisManagement_ISCRAM.pdf},
    abstract = {Social media is used during crises and disasters by state authorities and citizens to communicate and provide, gain and analyze information. Monitoring of platforms in such cases is both a well-established practice and a research area. The question, whether people are willing to renounce privacy in social media during critical incidents, or even allow surveillance in order to contribute to public security, remains unanswered. Our survey of 1,024 German inhabitants is the first empirical study on people's views on social media monitoring and surveillance in crisis management. We find the willingness to share data during an imminent threat depends mostly on the type of data: a majority (63\% and 67\%, respectively) would give access to addresses and telephone numbers, whereas the willingness to share content of chats or telephone calls is significantly lower (27\%). Our analysis reveals diverging opinions among participants and some effects of sociodemographic variables on the acceptance of invasions into privacy.},
    booktitle = {Proceedings of the {Information} {Systems} for {Crisis} {Response} and {Management} ({ISCRAM})},
    publisher = {ISCRAM Association},
    author = {Aldehoff, Larissa and Dankenbring, Meri and Reuter, Christian},
    editor = {Franco, Zeno and González, José J. and Canós, José H.},
    year = {2019},
    keywords = {Crisis, SocialMedia, Student, UsableSec, Security, Peace, Projekt-CRISP, Projekt-DualUse, Projekt-CROSSING, Projekt-ATHENE-FANCY},
    pages = {1184--1197},
    }

  • Thomas Reinhold, Christian Reuter (2019)
    From Cyber War to Cyber Peace
    In: Christian Reuter: Information Technology for Peace and Security – IT-Applications and Infrastructures in Conflicts, Crises, War, and Peace. Wiesbaden, Germany: Springer Vieweg, , 139–164. doi:10.1007/978-3-658-25652-4_7
    [BibTeX] [Abstract] [Download PDF]

    The encompassing trend of digitalisation and widespread dependencies on IT systems triggers adjustments also in the military forces. Besides necessary enhancements of IT security and defensive measures for cyberspace, a growing number of states are estab-lishing offensive military capabilities for this domain. Looking at historical develop-ments and transformations due to advancements in military technologies, the chapter discusses the political progress made and tools developed since. Both of these have con-tributed to handling challenges and confining threats to international security. With this background, the text assesses a possible application of these efforts to developments concerning cyberspace, as well as obstacles that need to be tackled for it to be success-ful. The chapter points out political advancements already in progress, the role of social initiatives, such as the cyber peace campaign of the Forum of Computer Scientists for Peace and Societal Responsibility (FifF), as well as potential consequences of the rising probability of cyber war as opposed to the prospects of cyber peace.

    @incollection{reinhold_cyber_2019,
    address = {Wiesbaden, Germany},
    title = {From {Cyber} {War} to {Cyber} {Peace}},
    isbn = {978-3-658-25652-4},
    url = {https://www.springer.com/de/book/9783658256517},
    abstract = {The encompassing trend of digitalisation and widespread dependencies on IT systems triggers adjustments also in the military forces. Besides necessary enhancements of IT security and defensive measures for cyberspace, a growing number of states are estab-lishing offensive military capabilities for this domain. Looking at historical develop-ments and transformations due to advancements in military technologies, the chapter discusses the political progress made and tools developed since. Both of these have con-tributed to handling challenges and confining threats to international security. With this background, the text assesses a possible application of these efforts to developments concerning cyberspace, as well as obstacles that need to be tackled for it to be success-ful. The chapter points out political advancements already in progress, the role of social initiatives, such as the cyber peace campaign of the Forum of Computer Scientists for Peace and Societal Responsibility (FifF), as well as potential consequences of the rising probability of cyber war as opposed to the prospects of cyber peace.},
    booktitle = {Information {Technology} for {Peace} and {Security} - {IT}-{Applications} and {Infrastructures} in {Conflicts}, {Crises}, {War}, and {Peace}},
    publisher = {Springer Vieweg},
    author = {Reinhold, Thomas and Reuter, Christian},
    editor = {Reuter, Christian},
    year = {2019},
    doi = {10.1007/978-3-658-25652-4_7},
    keywords = {Security, Peace, Projekt-CRISP, Projekt-DualUse, Projekt-CROSSING, Cyberwar},
    pages = {139--164},
    }

  • Christian Reuter (2019)
    Information Technology for Peace and Security – IT-Applications and Infrastructures in Conflicts, Crises, War, and Peace
    Wiesbaden, Germany: Springer Vieweg. doi:10.1007/978-3-658-25652-4
    [BibTeX] [Abstract] [Download PDF]

    Technological and scientific progress, especially the rapid development in information technology (IT), plays a crucial role regarding questions of peace and security. This textbook addresses the significance, potentials and challenges of IT for peace and securi-ty. For this purpose, the book offers an introduction to peace, conflict, and security research, thereby focusing on natural-science, technical and computer science perspec-tives. In the following, it sheds light on cyber conflicts, war and peace, cyber arms con-trol, cyber attribution and infrastructures as well as culture and interaction before an outlook is given.

    @book{reuter_information_2019-1,
    address = {Wiesbaden, Germany},
    title = {Information {Technology} for {Peace} and {Security} - {IT}-{Applications} and {Infrastructures} in {Conflicts}, {Crises}, {War}, and {Peace}},
    isbn = {978-3-658-25652-4},
    url = {https://www.springer.com/de/book/9783658256517},
    abstract = {Technological and scientific progress, especially the rapid development in information technology (IT), plays a crucial role regarding questions of peace and security. This textbook addresses the significance, potentials and challenges of IT for peace and securi-ty. For this purpose, the book offers an introduction to peace, conflict, and security research, thereby focusing on natural-science, technical and computer science perspec-tives. In the following, it sheds light on cyber conflicts, war and peace, cyber arms con-trol, cyber attribution and infrastructures as well as culture and interaction before an outlook is given.},
    publisher = {Springer Vieweg},
    author = {Reuter, Christian},
    year = {2019},
    doi = {10.1007/978-3-658-25652-4},
    keywords = {Crisis, Selected, Security, Peace, Infrastructure, Projekt-CRISP, Projekt-DualUse, RSF, Projekt-CROSSING, AuswahlPeace, Cyberwar, Projekt-MAKI},
    }

    2017

  • Christian Reuter, Marc-André Kaufhold, Jonas Klös (2017)
    Benutzbare Sicherheit: Usability, Safety und Security bei Passwörtern
    Mensch und Computer – Workshopband Regensburg, Germany. doi:https://doi.org/10.18420/muc2017-ws01-0384
    [BibTeX] [Abstract] [Download PDF]

    Obwohl Usability und Sicherheit beides relevante Anforderungen für Anwendungssysteme sind, stehen sie in einem Spannungsfeld. Sicherheit kann als Schutz vor Angriffen von außen (Security), aber auch für das sichere Funktionieren (Safety) dieser Anwendungssysteme verstanden werden. Durch die immer größere Vernetzung klassischer Safety-Domänen, wie dem Katastrophenschutz, gewinnen Security-Aspekte dort ebenfalls an Bedeutung. Die Übertragung von kritischen und vertraulichen Informationen auf mobile Endgeräte muss zugleich passwortgeschützt als auch schnell verfügbar sein; zeitintensive Authentifizierungsmechanismen können hier stören. In dieser Studie werden die Nutzung von Passwörtern vor dem Hintergrund der Abwägung von Sicherheit und Usability exploriert und Hypothesen zum Umgang mit Passwörtern aufgestellt, die im Kontext der Digitalisierung in der zivilen Sicherheit sowie mobilen und ubiquitären Geräte im Katastrophenschutz an enormer Bedeutung gewinnen.

    @inproceedings{reuter_benutzbare_2017,
    address = {Regensburg, Germany},
    title = {Benutzbare {Sicherheit}: {Usability}, {Safety} und {Security} bei {Passwörtern}},
    url = {https://dl.gi.de/bitstream/handle/20.500.12116/3214/2017_WS01_384.pdf?sequence=1&isAllowed=y},
    doi = {https://doi.org/10.18420/muc2017-ws01-0384},
    abstract = {Obwohl Usability und Sicherheit beides relevante Anforderungen für Anwendungssysteme sind, stehen sie in einem Spannungsfeld. Sicherheit kann als Schutz vor Angriffen von außen (Security), aber auch für das sichere Funktionieren (Safety) dieser Anwendungssysteme verstanden werden. Durch die immer größere Vernetzung klassischer Safety-Domänen, wie dem Katastrophenschutz, gewinnen Security-Aspekte dort ebenfalls an Bedeutung. Die Übertragung von kritischen und vertraulichen Informationen auf mobile Endgeräte muss zugleich passwortgeschützt als auch schnell verfügbar sein; zeitintensive Authentifizierungsmechanismen können hier stören. In dieser Studie werden die Nutzung von Passwörtern vor dem Hintergrund der Abwägung von Sicherheit und Usability exploriert und Hypothesen zum Umgang mit Passwörtern aufgestellt, die im Kontext der Digitalisierung in der zivilen Sicherheit sowie mobilen und ubiquitären Geräte im Katastrophenschutz an enormer Bedeutung gewinnen.},
    booktitle = {Mensch und {Computer} - {Workshopband}},
    publisher = {Gesellschaft für Informatik e.V.},
    author = {Reuter, Christian and Kaufhold, Marc-André and Klös, Jonas},
    editor = {Burghardt, M. and Wimmer, R. and Wolff, C. and Womser-Hacker, C.},
    year = {2017},
    keywords = {HCI, Student, UsableSec, Security, Projekt-KontiKat, Projekt-CRISP, Projekt-CROSSING},
    pages = {33--41},
    }

    TraCe: Regionales Forschungszentrum „Transformations of Political Violence“ (1.4.2022-31.3.2026, BMBF)

    TraCe: Regionales Forschungszentrum „Transformations of Political Violence“ (1.4.2022-31.3.2026, BMBF)

    https://www.trace-center.de/

    Die Geschichte moderner Gesell­schaften und der inter­nationalen Beziehungen wird üblicher­weise als ein schritt­weiser Verzicht auf Gewalt erzählt. Von einer Über­windung organisierter Gewalt kann allerdings keine Rede sein. Aktuelle Tendenzen weisen vielmehr in die entgegen­gesetzte Richtung: Das welt­weite Konflikt­geschehen hat an Inten­sität wieder zu­genommen; Globalisierung und techno­logischer Wandel ermöglichen neue Formen kriege­rischer und terroris­tischer Gewalt. Diese Ent­wicklungen verweisen auf Trans­formationen, die existierende Normen und Praktiken zur Einhegung politischer Gewalt heraus­fordern. Das Regionale Forschungs­zentrum „Trans­formations of Political Violence“ untersucht diese Ent­wicklungen mit dem Ziel, die Konse­quenzen für den inner­gesell­schaftlichen und inter­nationalen Frieden zu iden­tifizieren und Strategien zur Ein­dämmung politi­scher Gewalt unter den sich ver­ändernden Bedingungen zu entwickeln.

    Das Regionale Forschungs­zentrum “Trans­formations of Political Violence“ ist ein Kooperations­projekt Leibnitz-Institut für Friedens- und Konflikt­forschung (PRIF), der Goethe-Universität Frankfurt, der Justus-Liebig-Universität Gießen, der Philipps-Universität Marburg und der Technischen Universität Darmstadt. Es handelt sich um eine inter­disziplinäre Forschungs­initiative, die vom Bundes­ministerium für Bildung und Forschung (BMBF) finanziert wird (Laufzeit: April 2022 – März 2026).

    Mit der Errichtung des regionalen Forschungs­zentrums inten­sivieren die beteiligten Partner­institutionen ihre bestehende Zusammen­arbeit und bündeln ihre Ex­pertise in der inter­disziplinären Gewalt­forschung. Durch die thematische Profil­bildung und die Etablierung dauerhafter Veranstaltungs­reihen schaffen sie ein regionales Kompetenz­zentrum für Forschung, Lehre und Wissens­transfer, das inter­national sichtbar ist und systematisch zur Einhegung und Prävention politischer Gewalt beiträgt.

    Das Zentrum bringt disziplinäre Pers­pektiven aus Politik­wissen­schaft, Soziologie, Geschichts- und Rechts­wissenschaften, Sozial­anthropologie, Sozial­psychologie, Kultur- und Sprach­wissen­schaften und Informatik sowie verschiedene methodologische Ansätze zusammen und untersucht das Zusammen­spiel unter­schiedlicher Typen und Ebenen politischer Gewalt systematisch in drei thematischen Forschungs­feldern sowie in einem Synergiefeld.

    2024

  • Christian Reuter (2024)
    Information Technology for Peace and Security – IT-Applications and Infrastructures in Conflicts, Crises, War, and Peace
    Wiesbaden, Germany: Springer Vieweg.
    [BibTeX]

    @book{reuter_information_2024,
    address = {Wiesbaden, Germany},
    title = {Information {Technology} for {Peace} and {Security} - {IT}-{Applications} and {Infrastructures} in {Conflicts}, {Crises}, {War}, and {Peace}},
    publisher = {Springer Vieweg},
    author = {Reuter, Christian},
    year = {2024},
    keywords = {Selected, Security, Peace, Infrastructure, Projekt-CROSSING, AuswahlPeace, Cyberwar, Projekt-TraCe},
    }

  • Laura Guntrum (2024)
    Keyboard Fighters: The Use of ICTs by Activists in Times of Military Coup in Myanmar
    Proceedings of the Conference on Human Factors in Computing Systems (CHI) .
    [BibTeX] [Abstract]

    Amidst the ongoing anti-military protests in Myanmar since 2021, there is a noticeable research gap on ICT-supported activism. Generally, ICTs play an important role during political crises in conjunction with activists’ practices on the ground. Inspired by Resource Mobilization Theory, I conducted qualitative interviews (N=16) and a qualitative online survey (N=34), which demonstrate the intersection between analog and digital domains, showcasing the ingenuity of the activists, and the rapid adoption of ICTs in a country that has experienced a digital revolution within the last few years. As not all people were able to protest on-the-ground, they acted as keyboard fighters to organize protests, to share information, and to support the civil disobedience movement in Myanmar. The study identifies, inter alia, the need for better offline applications with wider coverage in times of internet shutdowns, applications that cannot be easily identified during physical controls, and providing free and secure VPN access.

    @inproceedings{guntrum_keyboard_2024,
    series = {{CHI} '24},
    title = {Keyboard {Fighters}: {The} {Use} of {ICTs} by {Activists} in {Times} of {Military} {Coup} in {Myanmar}},
    abstract = {Amidst the ongoing anti-military protests in Myanmar since 2021, there is a noticeable research gap on ICT-supported activism. Generally, ICTs play an important role during political crises in conjunction with activists’ practices on the ground. Inspired by Resource Mobilization Theory, I conducted qualitative interviews (N=16) and a qualitative online survey (N=34), which demonstrate the intersection between analog and digital domains, showcasing the ingenuity of the activists, and the rapid adoption of ICTs in a country that has experienced a digital revolution within the last few years. As not all people were able to protest on-the-ground, they acted as keyboard fighters to organize protests, to share information, and to support the civil disobedience movement in Myanmar. The study identifies, inter alia, the need for better offline applications with wider coverage in times of internet shutdowns, applications that cannot be easily identified during physical controls, and providing free and secure VPN access.},
    booktitle = {Proceedings of the {Conference} on {Human} {Factors} in {Computing} {Systems} ({CHI})},
    publisher = {Association for Computing Machinery},
    author = {Guntrum, Laura},
    year = {2024},
    keywords = {HCI, Selected, A-Paper, Ranking-CORE-A*, Peace, Projekt-TraCe, Projekt-ATHENE},
    }

    2023

  • Stefka Schmid, Laura Guntrum, Steffen Haesler, Lisa Schultheiß, Christian Reuter (2023)
    Digital Volunteers During the COVID-19 Pandemic: Care Work on Social Media for Socio-technical Resilience
    Weizenbaum Journal of the Digital Society ;3(1). doi:10.34669/WI.WJDS/3.3.6
    [BibTeX] [Abstract] [Download PDF]

    Like past crises, the COVID-19 pandemic has also activated individual volunteers to help to respond to the crisis. This includes digital volunteers, who have organized physical aid and conducted activities on social media. Analyzing German volunteering support groups on Facebook and related Reddit threads in the context of the COVID-19 pandemic, we {\textbackslash}updatedshow what type of help is offered and how social media users interact with each other, trying to cope with the situation. We reveal that most users offering help online conduct mostly typical care work, such as buying groceries or giving advice. Crucially, volunteering is characterized by relationships of care and thus builds on affirmative interactions. Albeit some misdirected offers and regressive interruptions, people use the possibility to make their voices heard and, showing empathy, help each other to cope with crisis. Social media like Facebook mediate societal structures, including relationships of care, offering a space for continuous, cumulatively resilient conduct of care work. Reflecting on the traditional division of labor in crisis volunteering and counter-productive dynamics of care and empathy, we aim for feminist ethics of care which allows for interactions on social media that foster generative computer-supported collaboration.

    @article{schmid_digital_2023,
    title = {Digital {Volunteers} {During} the {COVID}-19 {Pandemic}: {Care} {Work} on {Social} {Media} for {Socio}-technical {Resilience}},
    volume = {3},
    issn = {2748-5625},
    url = {https://ojs.weizenbaum-institut.de/index.php/wjds/article/view/78},
    doi = {10.34669/WI.WJDS/3.3.6},
    abstract = {Like past crises, the COVID-19 pandemic has also activated individual volunteers to help to respond to the crisis. This includes digital volunteers, who have organized physical aid and conducted activities on social media. Analyzing German volunteering support groups on Facebook and related Reddit threads in the context of the COVID-19 pandemic, we {\textbackslash}updatedshow what type of help is offered and how social media users interact with each other, trying to cope with the situation. We reveal that most users offering help online conduct mostly typical care work, such as buying groceries or giving advice. Crucially, volunteering is characterized by relationships of care and thus builds on affirmative interactions. Albeit some misdirected offers and regressive interruptions, people use the possibility to make their voices heard and, showing empathy, help each other to cope with crisis. Social media like Facebook mediate societal structures, including relationships of care, offering a space for continuous, cumulatively resilient conduct of care work. Reflecting on the traditional division of labor in crisis volunteering and counter-productive dynamics of care and empathy, we aim for feminist ethics of care which allows for interactions on social media that foster generative computer-supported collaboration.},
    number = {1},
    journal = {Weizenbaum Journal of the Digital Society},
    author = {Schmid, Stefka and Guntrum, Laura and Haesler, Steffen and Schultheiß, Lisa and Reuter, Christian},
    month = may,
    year = {2023},
    keywords = {Crisis, HCI, SocialMedia, Student, Peace, Projekt-ATHENE-SecUrban, Projekt-emergenCITY, Projekt-TraCe},
    }

  • Laura Guntrum, Benjamin Güldenring, Franz Kuntke, Christian Reuter (2023)
    Using Digitally Mediated Methods in Sensitive Contexts: A Threat Analysis and Critical Reflection on Security, Privacy, and Ethical Concerns in the Case of Afghanistan
    Zeitschrift für Friedens- und Konfliktforschung (ZeFKo) ;11(2):95–128. doi:10.1007/s42597-022-00088-2
    [BibTeX] [Abstract] [Download PDF]

    Given the lack of empirical examples of how research can be conducted via digital means in sensitive contexts, this paper provides a threat model using Afghanistan, where the Taliban took power in August 2021, as an example. Both technical and non-technical research-related risks are analyzed, paying attention to research ethics, data security, and privacy. We argue that any threat model and risk analysis is highly context-dependent. Our analysis reveals that in certain research processes, human security does not necessarily coincide with data security and that an ambivalence exists between privacy and usability. In addition to the concrete threat analysis, the paper identifies some general technical solutions (e.g., encryption methods, communication software) for different research steps to foster secure and ethically justifiable research.

    @article{guntrum_using_2023,
    title = {Using {Digitally} {Mediated} {Methods} in {Sensitive} {Contexts}: {A} {Threat} {Analysis} and {Critical} {Reflection} on {Security}, {Privacy}, and {Ethical} {Concerns} in the {Case} of {Afghanistan}},
    volume = {11},
    issn = {2524-6976},
    url = {https://link.springer.com/article/10.1007/s42597-022-00088-2},
    doi = {10.1007/s42597-022-00088-2},
    abstract = {Given the lack of empirical examples of how research can be conducted via digital means in sensitive contexts, this paper provides a threat model using Afghanistan, where the Taliban took power in August 2021, as an example. Both technical and non-technical research-related risks are analyzed, paying attention to research ethics, data security, and privacy. We argue that any threat model and risk analysis is highly context-dependent. Our analysis reveals that in certain research processes, human security does not necessarily coincide with data security and that an ambivalence exists between privacy and usability. In addition to the concrete threat analysis, the paper identifies some general technical solutions (e.g., encryption methods, communication software) for different research steps to foster secure and ethically justifiable research.},
    number = {2},
    journal = {Zeitschrift für Friedens- und Konfliktforschung (ZeFKo)},
    author = {Guntrum, Laura and Güldenring, Benjamin and Kuntke, Franz and Reuter, Christian},
    month = oct,
    year = {2023},
    keywords = {Peace, Projekt-ATHENE-FANCY, Projekt-TraCe},
    pages = {95--128},
    }

  • Thomas Reinhold, Christian Reuter (2023)
    Zur Debatte über die Einhegung eines Cyberwars: Analyse militärischer Cyberaktivitäten im Krieg Russlands gegen die Ukraine
    Zeitschrift für Friedens- und Konfliktforschung (ZeFKo) . doi:10.1007/s42597-023-00094-y
    [BibTeX] [Abstract] [Download PDF]

    Der Überfall Russlands auf die Ukraine und der sich anschließende Krieg haben neben vielen anderen sicherheitspolitischen Gewissheiten auch zum ersten Mal die Rolle des Cyberspace in einem offenen Angriffskrieg demonstriert und bedenkenswerte Entwicklungen offenbart. Ziel dieses Beitrags ist es, die militärischen Aktivitäten im Cyberspace im Rahmen des Krieges Russlands gegen die Ukraine auf der Grundlage der öffentlich verfügbaren Informationen zu analysieren und im Hinblick auf die bis dato gängigen Vorstellungen eines Cyberwars zu bewerten. Darauf aufbauend werden mögliche Schlussfolgerungen betrachtet, zum einen mit Blick auf die zukünftige Bedeutung von Cyberaktivitäten für Russland, hinsichtlich des generellen militärischen Einsatzes von Cyberwirkmitteln und dessen weiterer Entwicklung, und in Bezug auf zukünftige internationale Debatten zur Einhegung von Cyberwars und des schädigenden Einsatzes von Cyberwirkmitteln.

    @article{reinhold_zur_2023,
    title = {Zur {Debatte} über die {Einhegung} eines {Cyberwars}: {Analyse} militärischer {Cyberaktivitäten} im {Krieg} {Russlands} gegen die {Ukraine}},
    issn = {2524-6976},
    url = {https://doi.org/10.1007/s42597-023-00094-y},
    doi = {10.1007/s42597-023-00094-y},
    abstract = {Der Überfall Russlands auf die Ukraine und der sich anschließende Krieg haben neben vielen anderen sicherheitspolitischen Gewissheiten auch zum ersten Mal die Rolle des Cyberspace in einem offenen Angriffskrieg demonstriert und bedenkenswerte Entwicklungen offenbart. Ziel dieses Beitrags ist es, die militärischen Aktivitäten im Cyberspace im Rahmen des Krieges Russlands gegen die Ukraine auf der Grundlage der öffentlich verfügbaren Informationen zu analysieren und im Hinblick auf die bis dato gängigen Vorstellungen eines Cyberwars zu bewerten. Darauf aufbauend werden mögliche Schlussfolgerungen betrachtet, zum einen mit Blick auf die zukünftige Bedeutung von Cyberaktivitäten für Russland, hinsichtlich des generellen militärischen Einsatzes von Cyberwirkmitteln und dessen weiterer Entwicklung, und in Bezug auf zukünftige internationale Debatten zur Einhegung von Cyberwars und des schädigenden Einsatzes von Cyberwirkmitteln.},
    journal = {Zeitschrift für Friedens- und Konfliktforschung (ZeFKo)},
    author = {Reinhold, Thomas and Reuter, Christian},
    month = mar,
    year = {2023},
    keywords = {Security, Peace, Projekt-ATHENE-SecUrban, Projekt-TraCe},
    }

  • Laura Guntrum, Sebastian Schwartz, Christian Reuter (2023)
    Dual-Use Technologies in the Context of Autonomous Driving: An Empirical Case Study From Germany
    Zeitschrift für Außen- und Sicherheitspolitik (ZfAS) . doi:10.1007/s12399-022-00935-3
    [BibTeX] [Abstract] [Download PDF]

    The article examines which technical aspects of autonomous driving are potentially transferable to the military sector. Through expert interviews the strong fragmentation of technologies in the field of autonomous driving becomes apparent. This hinders the clear identification of a specific dual-use technology. Environmental perception, artificial intelligence and sensors are considered to have the highest transferability rate from civil research to the military sector. Therefore, sensor development should receive special attention.

    @article{guntrum_dual-use_2023,
    title = {Dual-{Use} {Technologies} in the {Context} of {Autonomous} {Driving}: {An} {Empirical} {Case} {Study} {From} {Germany}},
    issn = {1866-2196},
    url = {https://doi.org/10.1007/s12399-022-00935-3},
    doi = {10.1007/s12399-022-00935-3},
    abstract = {The article examines which technical aspects of autonomous driving are potentially transferable to the military sector. Through expert interviews the strong fragmentation of technologies in the field of autonomous driving becomes apparent. This hinders the clear identification of a specific dual-use technology. Environmental perception, artificial intelligence and sensors are considered to have the highest transferability rate from civil research to the military sector. Therefore, sensor development should receive special attention.},
    journal = {Zeitschrift für Außen- und Sicherheitspolitik (ZfAS)},
    author = {Guntrum, Laura and Schwartz, Sebastian and Reuter, Christian},
    month = jan,
    year = {2023},
    keywords = {Peace, Projekt-ATHENE-SecUrban, Projekt-TraCe},
    }

  • Stefka Schmid (2023)
    Safe and Secure? Visions of Military Human-Computer Interaction
    Mensch und Computer – Workshopband Rapperswil, Switzerland. doi:10.18420/muc2023-mci-ws01-365
    [BibTeX] [Abstract] [Download PDF]

    Safety-critical human-computer interaction has focused on technology use in life-critical situations, including military operations. Due to the practical relevance of HCI and disciplinary debates about human-centered design, this literature review studies HCI scholarships’ visions of military human-computer interaction. Through text analysis and categorization of publications, it is found that interaction is envisioned to take place in the context of both missionoriented operational (e.g., target detection) as well as organizational tasks (e.g., military training). While artificial intelligence, virtual/augmented reality, and robots are most frequently defined as technological environments, goals, such as situation awareness, enjoyment, and trust are predominantly associated with them. Considering scholarly references to application contexts and different factors of the context of use allows to systematically approach how military human-computer interaction is imagined. Offering insight into research trends in HCI, this first overview of research endeavors also contributes to interdisciplinary debates, such as Security Studies and technology assessment.

    @inproceedings{schmid_safe_2023,
    address = {Rapperswil, Switzerland},
    title = {Safe and {Secure}? {Visions} of {Military} {Human}-{Computer} {Interaction}},
    url = {https://dl.gi.de/items/841cc5bd-8e25-40de-804f-8fb4fedddf11},
    doi = {10.18420/muc2023-mci-ws01-365},
    abstract = {Safety-critical human-computer interaction has focused on technology use in life-critical situations, including military operations. Due to the practical relevance of HCI and disciplinary debates about human-centered design, this literature review studies HCI scholarships’ visions of military human-computer interaction. Through text analysis and categorization of publications, it is found that interaction is envisioned to take place in the context of both missionoriented operational (e.g., target detection) as well as organizational tasks (e.g., military training). While artificial intelligence, virtual/augmented reality, and robots are most frequently defined as technological environments, goals, such as situation awareness, enjoyment, and trust are predominantly associated with them. Considering scholarly references to application contexts and different factors of the context of use allows to systematically approach how military human-computer interaction is imagined. Offering insight into research trends in HCI, this first overview of research endeavors also contributes to interdisciplinary debates, such as Security Studies and technology assessment.},
    language = {de},
    booktitle = {Mensch und {Computer} - {Workshopband}},
    publisher = {Gesellschaft für Informatik e.V.},
    author = {Schmid, Stefka},
    year = {2023},
    keywords = {Peace, Projekt-ATHENE-SecUrban, Projekt-TraCe},
    }

  • Christian Reuter, Thea Riebe, Laura Guntrum (2023)
    Science Peace Security ‘23 – Proceedings of the Interdisciplinary Conference on Technical Peace and Security Research
    Darmstadt, Germany: TUprints. doi:10.26083/tuprints-00024777
    [BibTeX] [Abstract] [Download PDF]

    The conference Science · Peace · Security ’23 took place from September 20 to 22, 2023, at the Georg-Christoph-Lichtenberg-Haus of the Technical University of Darmstadt. It focused on the transformation of technologies, their role in wars and conflicts, and issues related to arms control. The three-day scientific conference welcomed over 110 participants from Germany and speakers from the United Kingdom, Sweden, the USA, Colombia, India, Italy, Switzerland, Norway, the Czech Republic, Iraq, Austria, and the Netherlands. More than 50 different organizations were represented, ensuring interdisciplinary exchange. The program covered a wide range of topics reflecting societal discourses in light of a changing global security landscape. In total, the conference featured 40 presentations, workshops, discussions, and panels that discussed current and future challenges in the field of technical peace and conflict research. Particularly relevant topics included: Artificial Intelligence, Unmanned Weapons Systems, Rocket and Space Technologies (Nuclear) Arms Control, Regulation of Biological and Chemical Weapons, Information Technologies for Surveillance and Oppression of Civilians, (Civilian) Critical Infrastructures, Digital Peacebuilding, Human-Machine Interaction, Dual-Used, Cyber Attacks and Relevant Technology and Security Policies.

    @book{reuter_science_2023,
    address = {Darmstadt, Germany},
    title = {Science {Peace} {Security} ‘23 - {Proceedings} of the {Interdisciplinary} {Conference} on {Technical} {Peace} and {Security} {Research}},
    url = {https://tuprints.ulb.tu-darmstadt.de/id/eprint/24777},
    abstract = {The conference Science · Peace · Security '23 took place from September 20 to 22, 2023, at the Georg-Christoph-Lichtenberg-Haus of the Technical University of Darmstadt. It focused on the transformation of technologies, their role in wars and conflicts, and issues related to arms control. The three-day scientific conference welcomed over 110 participants from Germany and speakers from the United Kingdom, Sweden, the USA, Colombia, India, Italy, Switzerland, Norway, the Czech Republic, Iraq, Austria, and the Netherlands. More than 50 different organizations were represented, ensuring interdisciplinary exchange. The program covered a wide range of topics reflecting societal discourses in light of a changing global security landscape. In total, the conference featured 40 presentations, workshops, discussions, and panels that discussed current and future challenges in the field of technical peace and conflict research. Particularly relevant topics included: Artificial Intelligence, Unmanned Weapons Systems, Rocket and Space Technologies (Nuclear) Arms Control, Regulation of Biological and Chemical Weapons, Information Technologies for Surveillance and Oppression of Civilians, (Civilian) Critical Infrastructures, Digital Peacebuilding, Human-Machine Interaction, Dual-Used, Cyber Attacks and Relevant Technology and Security Policies.},
    publisher = {TUprints},
    author = {Reuter, Christian and Riebe, Thea and Guntrum, Laura},
    year = {2023},
    doi = {10.26083/tuprints-00024777},
    keywords = {Security, Peace, Projekt-CROSSING, Projekt-TraCe},
    }

  • Christian Reuter, Thea Riebe, Laura Guntrum (2023)
    Science Peace Security ’23: Editorial of the Proceedings of the Interdisciplinary Conference on Technical Peace and Security Research
    In: Christian Reuter, Thea Riebe, Laura Guntrum: Science Peace Security ’23: Proceedings of the Interdisciplinary Conference on Technical Peace and Security Research. Darmstadt, Germany: TUprints, , 9–13. doi:10.26083/tuprints-00024777
    [BibTeX] [Abstract] [Download PDF]

    The conference Science · Peace · Security ’23 took place from September 20 to 22, 2023, at the Georg-Christoph-Lichtenberg-Haus of the Technical University of Darmstadt. It focused on the transformation of technologies, their role in wars and conflicts, and issues related to arms control. The three-day scientific conference welcomed over 110 participants from Germany and speakers from the United Kingdom, Sweden, the USA, Colombia, India, Italy, Switzerland, Norway, the Czech Republic, Iraq, Austria, and the Netherlands. More than 50 different organizations were represented, ensuring interdisciplinary exchange. The program covered a wide range of topics reflecting societal discourses in light of a changing global security landscape. In total, the conference featured 40 presentations, workshops, discussions, and panels that discussed current and future challenges in the field of technical peace and conflict research. Particularly relevant topics included: Artificial Intelligence, Unmanned Weapons Systems, Rocket and Space Technologies (Nuclear) Arms Control, Regulation of Biological and Chemical Weapons, Information Technologies for Surveillance and Oppression of Civilians, (Civilian) Critical Infrastructures, Digital Peacebuilding, Human-Machine Interaction, Dual-Used, Cyber Attacks and Relevant Technology and Security Policies.

    @incollection{reuter_science_2023-1,
    address = {Darmstadt, Germany},
    title = {Science {Peace} {Security} ’23: {Editorial} of the {Proceedings} of the {Interdisciplinary} {Conference} on {Technical} {Peace} and {Security} {Research}},
    url = {https://tuprints.ulb.tu-darmstadt.de/id/eprint/24777},
    abstract = {The conference Science · Peace · Security '23 took place from September 20 to 22, 2023, at the Georg-Christoph-Lichtenberg-Haus of the Technical University of Darmstadt. It focused on the transformation of technologies, their role in wars and conflicts, and issues related to arms control. The three-day scientific conference welcomed over 110 participants from Germany and speakers from the United Kingdom, Sweden, the USA, Colombia, India, Italy, Switzerland, Norway, the Czech Republic, Iraq, Austria, and the Netherlands. More than 50 different organizations were represented, ensuring interdisciplinary exchange. The program covered a wide range of topics reflecting societal discourses in light of a changing global security landscape. In total, the conference featured 40 presentations, workshops, discussions, and panels that discussed current and future challenges in the field of technical peace and conflict research. Particularly relevant topics included: Artificial Intelligence, Unmanned Weapons Systems, Rocket and Space Technologies (Nuclear) Arms Control, Regulation of Biological and Chemical Weapons, Information Technologies for Surveillance and Oppression of Civilians, (Civilian) Critical Infrastructures, Digital Peacebuilding, Human-Machine Interaction, Dual-Used, Cyber Attacks and Relevant Technology and Security Policies.},
    booktitle = {Science {Peace} {Security} ’23: {Proceedings} of the {Interdisciplinary} {Conference} on {Technical} {Peace} and {Security} {Research}},
    publisher = {TUprints},
    author = {Reuter, Christian and Riebe, Thea and Guntrum, Laura},
    editor = {Reuter, Christian and Riebe, Thea and Guntrum, Laura},
    year = {2023},
    doi = {10.26083/tuprints-00024777},
    keywords = {Security, Peace, Projekt-CROSSING, Projekt-TraCe},
    pages = {9--13},
    }

    2022

  • Sebastian Schwartz, Laura Guntrum, Christian Reuter (2022)
    Vision or Threat – Awareness for Dual-Use in the Development of Autonomous Driving
    IEEE Transactions on Technology and Society ;3(3):163–174. doi:10.1109/TTS.2022.3182310
    [BibTeX] [Abstract] [Download PDF]

    In the digital age, the vision of autonomous vehicles (AVs) is vibrant. Research is being conducted worldwide to inte-grate AVs into our everyday lives in the future, spending consid-erable amounts of money in the development process. Actors from both engineering as well as social sciences are involved in this re-search, with technical disciplines strongly dominating. In addition to perceived progress of numerous newly developed technologies such as AVs, challenges should also be referred to. According to research analysis, the transferability of autonomous cars to the military sphere seems to be frequently forgotten or ignored (dual-use). Since not much research has been conducted in Germany on the potential deployment of autonomous driving development steps into military domains, 25 semi-structured interviews with de-velopers and researchers and actors involved in the field, were conducted in 2020. The paper identifies that the majority of re-spondents interviewed were aware of general existing dual-use de-bates, however, few had reflected about dual-use issues regarding a possible transfer of their own development processes in the con-text of autonomous driving to military applications, intensively. One reason is the small-scale nature of research, another is the complexity of the field, which enables the engineer’s alienation from their responsibility for the artefacts’ use. Moreover, it has become clear that hardly any conversations among colleagues oc-cur about possible misuse and that no standardized policy guide-lines exist, which provide information about possible risk. To raise dual-use awareness, scientific contributions, risk education, and interdisciplinary discussions are essential.

    @article{schwartz_vision_2022,
    title = {Vision or {Threat} – {Awareness} for {Dual}-{Use} in the {Development} of {Autonomous} {Driving}},
    volume = {3},
    issn = {2637-6415},
    url = {https://www.peasec.de/paper/2022/2022_SchwartzGuntrumReuter_VisionorThreatAwarenessDualUseAutonomousDriving_IEEE-TTS.pdf},
    doi = {10.1109/TTS.2022.3182310},
    abstract = {In the digital age, the vision of autonomous vehicles (AVs) is vibrant. Research is being conducted worldwide to inte-grate AVs into our everyday lives in the future, spending consid-erable amounts of money in the development process. Actors from both engineering as well as social sciences are involved in this re-search, with technical disciplines strongly dominating. In addition to perceived progress of numerous newly developed technologies such as AVs, challenges should also be referred to. According to research analysis, the transferability of autonomous cars to the military sphere seems to be frequently forgotten or ignored (dual-use). Since not much research has been conducted in Germany on the potential deployment of autonomous driving development steps into military domains, 25 semi-structured interviews with de-velopers and researchers and actors involved in the field, were conducted in 2020. The paper identifies that the majority of re-spondents interviewed were aware of general existing dual-use de-bates, however, few had reflected about dual-use issues regarding a possible transfer of their own development processes in the con-text of autonomous driving to military applications, intensively. One reason is the small-scale nature of research, another is the complexity of the field, which enables the engineer’s alienation from their responsibility for the artefacts’ use. Moreover, it has become clear that hardly any conversations among colleagues oc-cur about possible misuse and that no standardized policy guide-lines exist, which provide information about possible risk. To raise dual-use awareness, scientific contributions, risk education, and interdisciplinary discussions are essential.},
    language = {en},
    number = {3},
    journal = {IEEE Transactions on Technology and Society},
    author = {Schwartz, Sebastian and Guntrum, Laura and Reuter, Christian},
    year = {2022},
    keywords = {Selected, A-Paper, Ranking-ImpactFactor, Peace, AuswahlPeace, Projekt-ATHENE-FANCY, Projekt-TraCe},
    pages = {163--174},
    }

  • Stefka Schmid (2022)
    Trustworthy and Explainable: A European Vision of (Weaponised) Artificial Intelligence
    Die Friedens-Warte / Journal of International Peace and Organization (JIPO) ;95(3-4):290–315. doi:10.35998/fw-2022-0013
    [BibTeX] [Abstract] [Download PDF]

    The European Union (EU) has undertaken policies which address the research and development of artificial intelligence (AI). In light of debates of technology assessment which focus on risks for humans and questions of control of AI, the EU has propagated an ethical, human-centred approach of the application of AI. It is important to identify how the EU envisions AI as this may guide emerging norms in AI governance and today’s research and development of (weaponised) AI. Building on works of Human-Computer Interaction (HCI), this work derives the actor’s understanding of human-AI interaction, including conceptualisations of explainability, interpretability, and risks. Analysis of EU documents on the implementation of AI as a general-purpose technology and for military application reveals that explainability and risk identification are crucial elements for trust, which itself is a necessary component in the uptake of AI. Interdisciplinary approaches allow for a more detailed understanding of actors’ fundamental views on human control of AI, which further contributes to debates on technology assessment in professionalised political contexts.

    @article{schmid_trustworthy_2022,
    title = {Trustworthy and {Explainable}: {A} {European} {Vision} of ({Weaponised}) {Artificial} {Intelligence}},
    volume = {95},
    url = {https://elibrary.bwv-verlag.de/article/10.35998/fw-2022-0013},
    doi = {10.35998/fw-2022-0013},
    abstract = {The European Union (EU) has undertaken policies which address the research and development of artificial intelligence (AI). In light of debates of technology assessment which focus on risks for humans and questions of control of AI, the EU has propagated an ethical, human-centred approach of the application of AI. It is important to identify how the EU envisions AI as this may guide emerging norms in AI governance and today’s research and development of (weaponised) AI. Building on works of Human-Computer Interaction (HCI), this work derives the actor’s understanding of human-AI interaction, including conceptualisations of explainability, interpretability, and risks. Analysis of EU documents on the implementation of AI as a general-purpose technology and for military application reveals that explainability and risk identification are crucial elements for trust, which itself is a necessary component in the uptake of AI. Interdisciplinary approaches allow for a more detailed understanding of actors’ fundamental views on human control of AI, which further contributes to debates on technology assessment in professionalised political contexts.},
    number = {3-4},
    journal = {Die Friedens-Warte / Journal of International Peace and Organization (JIPO)},
    author = {Schmid, Stefka},
    year = {2022},
    keywords = {Peace, Projekt-ATHENE-SecUrban, Projekt-TraCe},
    pages = {290--315},
    }

  • Laura Guntrum (2022)
    Justice-oriented Research in Peace and Conflict Studies in Times of Social Distancing
    Mensch und Computer – Workshopband Darmstadt. doi:10.18420/muc2022-mci-ws10-216
    [BibTeX] [Abstract] [Download PDF]

    Not only since the COVID-19 pandemic, many research processes had already been increasingly digitized to maintain global ex-change of information efficiently. For years, scientific empirical studies have been conducted in politically sensitive contexts using digitally mediated methods, entailing numerous risks as well as potentials. One goal of digital research is to also capture marginal-ized voices. With emerging risks related to digital research, such as digital surveillance and social media monitoring by adversaries (e.g., the military in Myanmar), research needs to be more thoughtfully conducted. Considering research ethics, an evolving discrepancy between security measures and values of social jus-tice, such as accessibility and representation, appears as most data-secure applications are not used widely and offers such as “Free Basics” entice people to use rather data-unsecure applica-tions. Reflecting on this existing discrepancy in ethical require-ments, I illustrate challenges of the German research context re-lated to digitally conducted research focusing on overt conflictive social contexts.

    @inproceedings{guntrum_justice-oriented_2022,
    address = {Darmstadt},
    series = {Mensch und {Computer} 2022 - {Workshopband}},
    title = {Justice-oriented {Research} in {Peace} and {Conflict} {Studies} in {Times} of {Social} {Distancing}},
    url = {https://dl.gi.de/handle/20.500.12116/39092},
    doi = {10.18420/muc2022-mci-ws10-216},
    abstract = {Not only since the COVID-19 pandemic, many research processes had already been increasingly digitized to maintain global ex-change of information efficiently. For years, scientific empirical studies have been conducted in politically sensitive contexts using digitally mediated methods, entailing numerous risks as well as potentials. One goal of digital research is to also capture marginal-ized voices. With emerging risks related to digital research, such as digital surveillance and social media monitoring by adversaries (e.g., the military in Myanmar), research needs to be more thoughtfully conducted. Considering research ethics, an evolving discrepancy between security measures and values of social jus-tice, such as accessibility and representation, appears as most data-secure applications are not used widely and offers such as “Free Basics” entice people to use rather data-unsecure applica-tions. Reflecting on this existing discrepancy in ethical require-ments, I illustrate challenges of the German research context re-lated to digitally conducted research focusing on overt conflictive social contexts.},
    language = {en},
    booktitle = {Mensch und {Computer} - {Workshopband}},
    publisher = {Gesellschaft für Informatik},
    author = {Guntrum, Laura},
    year = {2022},
    keywords = {Security, Peace, Projekt-ATHENE-FANCY, Projekt-TraCe},
    }

  • Stefka Schmid, Katrin Hartwig, Robert Cieslinski, Christian Reuter (2022)
    Digital Resilience in Dealing with Misinformation on Social Media during COVID-19: A Web Application to Assist Users in Crises
    Information Systems Frontiers (ISF) . doi:10.1007/s10796-022-10347-5
    [BibTeX] [Abstract] [Download PDF]

    In crises such as the COVID-19 pandemic, it is crucial to support users when dealing with social media content. Considering digital resilience, we propose a web app based on Social Network Analysis (SNA) to provide an overview of potentially misleading vs. non-misleading content on Twitter, which can be explored by users and enable foundational learning. The latter aims at systematically identifying thematic patterns which may be associated with misleading information. Additionally, it entails reflecting on indicators of misleading tweets which are proposed to approach classification of tweets. Paying special attention to non-expert users of social media, we conducted a two-step Think Aloud study for evaluation. While participants valued the opportunity to generate new knowledge and the diversity of the application, qualities such as equality and rapidity may be further improved. However, learning effects outweighed individual costs as all users were able to shift focus onto relevant features, such as hashtags, while readily pointing out content characteristics. Our design artifact connects to learning-oriented interventions regarding the spread of misleading information and tackles information overload by a SNA-based plug-in.

    @article{schmid_digital_2022,
    title = {Digital {Resilience} in {Dealing} with {Misinformation} on {Social} {Media} during {COVID}-19: {A} {Web} {Application} to {Assist} {Users} in {Crises}},
    url = {https://link.springer.com/article/10.1007/s10796-022-10347-5},
    doi = {10.1007/s10796-022-10347-5},
    abstract = {In crises such as the COVID-19 pandemic, it is crucial to support users when dealing with social media content. Considering digital resilience, we propose a web app based on Social Network Analysis (SNA) to provide an overview of potentially misleading vs. non-misleading content on Twitter, which can be explored by users and enable foundational learning. The latter aims at systematically identifying thematic patterns which may be associated with misleading information. Additionally, it entails reflecting on indicators of misleading tweets which are proposed to approach classification of tweets. Paying special attention to non-expert users of social media, we conducted a two-step Think Aloud study for evaluation. While participants valued the opportunity to generate new knowledge and the diversity of the application, qualities such as equality and rapidity may be further improved. However, learning effects outweighed individual costs as all users were able to shift focus onto relevant features, such as hashtags, while readily pointing out content characteristics. Our design artifact connects to learning-oriented interventions regarding the spread of misleading information and tackles information overload by a SNA-based plug-in.},
    journal = {Information Systems Frontiers (ISF)},
    author = {Schmid, Stefka and Hartwig, Katrin and Cieslinski, Robert and Reuter, Christian},
    year = {2022},
    keywords = {Crisis, Student, A-Paper, Projekt-TraCe, Projekt-NEBULA},
    }

  • Laura Guntrum, Mira Keßler, Jignesh Patel, Anna Varfolomeeva (2022)
    Remotely Accessing the Field and Building Trust with Distant Sources. Perspectives from Journalism Practice for Ethnographic Research
    Global Media Journal – German Edition ;12(1).
    [BibTeX] [Abstract] [Download PDF]

    Journalists and ethnographic researchers, such as anthropologists, sociologists or media scholars, have comparable ways of establishing initial contacts with people from their fields of interest. Due to the ongoing COVID-19 pandemic and consequential travel restrictions and social distancing, it has become increasingly difficult to access a field. Taking inspiration from social anthropologist Ulf Hannerz (2004, p. 226), who compared journalists and anthropologists as “neighboring groups engaged in a somehow parallel pursuit,” this article explores what researchers may learn from practitioners who conduct research without being on-site. Fed by various practical journalists’ experiences, the article aims to investigate how information and communication technologies (ICTs) and digitally mediated methods, such as online search tools and social media, can be used to establish contacts and gain trust remotely. Here, the relevance of these methods for accessing a field in general goes beyond the limitations imposed during the COVID-19 pandemic and can be of interest to all those who face difficulties of field access of any kind. Ultimately, this article reflects on corresponding ethical challenges that may arise while conducting research remotely.

    @article{guntrum_remotely_2022,
    title = {Remotely {Accessing} the {Field} and {Building} {Trust} with {Distant} {Sources}. {Perspectives} from {Journalism} {Practice} for {Ethnographic} {Research}},
    volume = {12},
    url = {https://globalmediajournal.de/index.php/gmj/article/view/220},
    abstract = {Journalists and ethnographic researchers, such as anthropologists, sociologists or media scholars, have comparable ways of establishing initial contacts with people from their fields of interest. Due to the ongoing COVID-19 pandemic and consequential travel restrictions and social distancing, it has become increasingly difficult to access a field. Taking inspiration from social anthropologist Ulf Hannerz (2004, p. 226), who compared journalists and anthropologists as “neighboring groups engaged in a somehow parallel pursuit,” this article explores what researchers may learn from practitioners who conduct research without being on-site. Fed by various practical journalists’ experiences, the article aims to investigate how information and communication technologies (ICTs) and digitally mediated methods, such as online search tools and social media, can be used to establish contacts and gain trust remotely. Here, the relevance of these methods for accessing a field in general goes beyond the limitations imposed during the COVID-19 pandemic and can be of interest to all those who face difficulties of field access of any kind. Ultimately, this article reflects on corresponding ethical challenges that may arise while conducting research remotely.},
    number = {1},
    journal = {Global Media Journal - German Edition},
    author = {Guntrum, Laura and Keßler, Mira and Patel, Jignesh and Varfolomeeva, Anna},
    year = {2022},
    keywords = {Peace, Projekt-TraCe},
    }

    NEBULA: Nutzerzentrierte KI-basierte Erkennung von Fake News und Fehlinformationen (1.7.2022-30.6.2025, BMBF)

    BMBF-Verbundprojekt NEBULA: Nutzerzentrierte KI-basierte Erkennung von Fake News und Fehlinformationen (1.7.2022-30.6.2025, BMBF)

    https://peasec.de/projekte/nebula

    Die Verbreitung falscher und irreführender Informationen – insbesondere über soziale Medien wie TikTok, Twitter, Facebook und Co. – nehmen eine immer größer werdende Relevanz in sicherheitsrelevanten Situationen ein. Gerade im Kontext des Ukrainekriegs spielen derartige Plattformen eine besondere Rolle, indem gefälschte Videos oder Inhalte mit falscher zeitlicher Einordnung in kürzester Zeit viral gehen und somit das Potential für Verunsicherung und Meinungsmanipulation birgen. Problematisch sind dabei nicht nur absichtliche sondern auch unabsichtlich irreführende Informationen.

    Ziel des interdisziplinären Verbundvorhabens NEBULA ist die transparente, KI-basierte Erkennung von Fake News und Fehlinformationen in sicherheitsrelevanten Situationen sowie die zielgruppengerechte Darstellung der Detektionsergebnisse zur Förderung der Medienkompetenz. Die nutzerzentrierten Ansätze adressieren dabei sowohl  Behörden und Organisationen mit Sicherheitsaufgaben (BOS) in der akkuraten Lagebilderstellung und Krisenkommunikation als auch vulnerable Personen (z.B. aufgrund ihres Alters, Bildungshintergrunds oder ihrer Sprachkenntnisse) durch partizipative Entwicklung von technischen Unterstützungswerkzeugen. Innerhalb des Projekts entstehen Demonstratore in Form von Smartphone-Apps, Browser-Plugins und Webanwendungen, um Einzelpersonen und Behörden dazu zu befähigen, Fake News und Fehlinformationen selbst erkennen zu können.

    Dem Verbundprojekt NEBULA gehören fünf Verbundpartner, acht assoziierte Partner sowie zwei Unterauftragsnehmer an: Neben dem Lehrstuhl Wissenschaft und Technik für Frieden und Sicherheit (PEASEC) der Technischen Universität Darmstadt (Prof. Dr. Christian Reuter) als Verbundkoordinator sind der Lehrstuhl für Wirtschaftsinformatik und Neue Medien (WiNeMe) der Universität Siegen (Prof. Dr. Volker Wulf), die Professur für Kommunikationswissenschaft mit Schwerpunkt politische Kommunikation der Hochschule Bonn-Rhein-Sieg (Prof. Dr. Hektor Haarkötter), der Lehrstuhl Data Science (DICE) der Universität Paderborn (Prof. Dr. Axel-Cyrille Ngonga Ngomo) sowie die NanoGiants GmbH (Lukas Czarnecki) als Verbundpartner am Projekt beteiligt.

    2024

  • Katrin Hartwig, Tom Biselli, Franziska Schneider, Christian Reuter (2024)
    From Adolescents‘ Eyes: Assessing an Indicator-Based Intervention to Combat Misinformation on TikTok
    Proceedings of the Conference on Human Factors in Computing Systems (CHI) .
    [BibTeX] [Abstract]

    Misinformation poses a recurrent challenge for video-sharing platforms (VSPs) like TikTok. Obtaining user perspectives on digital interventions addressing the need for transparency (e.g., through indicators) is essential. This article offers a thorough examination of the comprehensibility, usefulness, and limitations of an indicator-based intervention from an adolescents’ perspective. This study (𝑁 = 39; aged 13-16 years) comprised two qualitative steps: (1) focus group discussions and (2) think-aloud sessions, where participants engaged with a smartphone-app for TikTok. The results offer new insights into how video-based indicators can assist adolescents’ assessments. The intervention received positive feedback, especially for its transparency, and could be applicable to new content. This paper sheds light on how adolescents are expected to be experts while also being prone to video-based misinformation, with limited understanding of an intervention’s limitations. By adopting teenagers’ perspectives, we contribute to HCI research and provide new insights into the chances and limitations of interventions for VSPs.

    @inproceedings{hartwig_adolescents_2024,
    series = {{CHI} '24},
    title = {From {Adolescents}' {Eyes}: {Assessing} an {Indicator}-{Based} {Intervention} to {Combat} {Misinformation} on {TikTok}},
    abstract = {Misinformation poses a recurrent challenge for video-sharing platforms (VSPs) like TikTok. Obtaining user perspectives on digital interventions addressing the need for transparency (e.g., through indicators) is essential. This article offers a thorough examination of the comprehensibility, usefulness, and limitations of an indicator-based intervention from an adolescents’ perspective. This study (𝑁 = 39; aged 13-16 years) comprised two qualitative steps: (1) focus group discussions and (2) think-aloud sessions, where participants
    engaged with a smartphone-app for TikTok. The results offer new insights into how video-based indicators can assist adolescents’ assessments. The intervention received positive feedback, especially for its transparency, and could be applicable to new content. This paper sheds light on how adolescents are expected to be experts while also being prone to video-based misinformation, with limited understanding of an intervention’s limitations. By adopting
    teenagers’ perspectives, we contribute to HCI research and provide new insights into the chances and limitations of interventions for VSPs.},
    booktitle = {Proceedings of the {Conference} on {Human} {Factors} in {Computing} {Systems} ({CHI})},
    publisher = {Association for Computing Machinery},
    author = {Hartwig, Katrin and Biselli, Tom and Schneider, Franziska and Reuter, Christian},
    year = {2024},
    keywords = {AuswahlCrisis, HCI, Selected, UsableSec, Security, A-Paper, Ranking-CORE-A*, Projekt-NEBULA, Projekt-ATHENE-PriVis},
    }

  • Katrin Hartwig, Ruslan Sandler, Christian Reuter (2024)
    Navigating Misinformation in Voice Messages: Identification of User-Centered Features for Digital Interventions
    Risk, Hazards, & Crisis in Public Policy .
    [BibTeX] [Abstract]

    Misinformation presents a challenge to democracies, particularly in times of crisis. One way in which misinformation is spread is through voice messages sent via messenger groups, which enable members to share information on a larger scale. Gaining user perspectives on digital misinformation interventions as countermeasure after detection is crucial. In this paper, we extract potential features of misinformation in voice messages from literature, implement them within a program that automatically processes voice messages, and evaluate their perceived usefulness and comprehensibility as user-centered indicators.We propose 35 features extracted from audio files at the character, word, sentence, audio and creator levels to assist (1) private individuals in conducting credibility assessments, (2) government agencies faced with data overload during crises, and (3) researchers seeking to gather features for automatic detection approaches. We conducted a think-aloud study with laypersons (N = 20) to provide initial insight into how individuals autonomously assess the credibility of voice messages, as well as which automatically extracted features they find to be clear and convincing indicators of misinformation. Our study provides qualitative and quantitative insights into valuable indicators, particularly when they relate directly to the content or its creator, and uncovers challenges in user interface design.

    @article{hartwig_navigating_2024,
    title = {Navigating {Misinformation} in {Voice} {Messages}: {Identification} of {User}-{Centered} {Features} for {Digital} {Interventions}},
    abstract = {Misinformation presents a challenge to democracies, particularly in times of crisis. One way in which misinformation is spread is through voice messages sent via messenger groups, which enable members to share information on a larger scale. Gaining user perspectives on digital misinformation interventions as countermeasure after detection is crucial. In this paper, we extract potential features of misinformation in voice messages from literature, implement them within a program that automatically processes voice messages, and evaluate their perceived usefulness and comprehensibility as user-centered indicators.We propose 35 features extracted from audio files at the character, word, sentence, audio and creator levels to assist (1) private individuals in conducting credibility assessments, (2) government agencies faced with data overload during crises, and (3) researchers seeking to gather features for automatic detection approaches. We conducted a think-aloud study with laypersons (N = 20) to provide initial insight into how individuals autonomously assess the credibility of voice messages, as well as which automatically extracted features they find to be clear and convincing indicators of misinformation. Our study provides qualitative and quantitative insights into valuable indicators, particularly when they relate directly to the content or its creator, and uncovers challenges in user interface design.},
    journal = {Risk, Hazards, \& Crisis in Public Policy},
    author = {Hartwig, Katrin and Sandler, Ruslan and Reuter, Christian},
    year = {2024},
    keywords = {Crisis, HCI, SocialMedia, Student, UsableSec, A-Paper, Ranking-ImpactFactor, Cyberwar, Projekt-NEBULA},
    }

    2023

  • Katrin Hartwig, Frederic Doell, Christian Reuter (2023)
    The Landscape of User-centered Misinformation Interventions – A Systematic Literature Review
    2023. doi:10.48550/ARXIV.2301.06517
    [BibTeX] [Abstract] [Download PDF]

    Misinformation represent a key challenge for society. User-centered misinformation interventions as digital countermeasures that exert a direct influence on users represent a promising means to deal with the large amounts of information available. While an extensive body of research on this topic exists, researchers are confronted with a diverse research landscape spanning multiple disciplines. This review systematizes the landscape of user-centered misinformation interventions to facilitate knowledge transfer, identify trends, and enable informed decision-making. Over 3,700 scholarly publications were screened and a systematic literature review (N=108) was conducted. A taxonomy was derived regarding intervention design (e.g., binary label), user interaction (active or passive), and timing (e.g., post exposure to misinformation). We provide a structured overview of approaches across multiple disciplines, and derive six overarching challenges for future research.

    @techreport{hartwig_landscape_2023,
    title = {The {Landscape} of {User}-centered {Misinformation} {Interventions} – {A} {Systematic} {Literature} {Review}},
    copyright = {arXiv.org perpetual, non-exclusive license},
    url = {https://arxiv.org/abs/2301.06517},
    abstract = {Misinformation represent a key challenge for society. User-centered misinformation interventions as digital countermeasures that exert a direct influence on users represent a promising means to deal with the large amounts of information available. While an extensive body of research on this topic exists, researchers are confronted with a diverse research landscape spanning multiple disciplines. This review systematizes the landscape of user-centered misinformation interventions to facilitate knowledge transfer, identify trends, and enable informed decision-making. Over 3,700 scholarly publications were screened and a systematic literature review (N=108) was conducted. A taxonomy was derived regarding intervention design (e.g., binary label), user interaction (active or passive), and timing (e.g., post exposure to misinformation). We provide a structured overview of approaches across multiple disciplines, and derive six overarching challenges for future research.},
    institution = {arXiv},
    author = {Hartwig, Katrin and Doell, Frederic and Reuter, Christian},
    year = {2023},
    doi = {10.48550/ARXIV.2301.06517},
    keywords = {HCI, Peace, Projekt-NEBULA},
    }

  • Christian Reuter, Marc-André Kaufhold, Tom Biselli, Helene Pleil (2023)
    Increasing Adoption Despite Perceived Limitations of Social Media in Emergencies: Representative Insights on German Citizens’ Perception and Trends from 2017 to 2021
    International Journal of Disaster Risk Reduction (IJDRR) ;96. doi:https://doi.org/10.1016/j.ijdrr.2023.103880
    [BibTeX] [Abstract] [Download PDF]

    The value of social media in crises, disasters, and emergencies across different events, participants, and states is now well-examined in crisis informatics research. Previous research has contributed to the state of the art with empirical insights on the use of social media, approaches for the gathering and processing of big social data, the design and evaluation of information systems, and the analysis of cumulative and longitudinal data. While some studies examined social media use representatively for their target audience, these usually only comprise a single point of inquiry and do not allow for a trend analysis. This work provides results (1) of a representative survey with German citizens from 2021 on use patterns, perceptions, and expectations regarding social media during emergencies. Furthermore, it (2) compares these results to previous surveys and provides insights on temporal changes and trends from 2017, over 2019 to 2021. Our findings highlight that social media use in emergencies increased in 2021 and 2019 compared to 2017. Between 2019 and 2021, the amount of information shared on social media remained on a similar level, while the perceived disadvantages of social media in emergencies significantly increased. In light of demographic variables, the results of the 2021 survey confirm previous findings, according to which older individuals (45+ years) use social media in emergencies less often than younger individuals (18-24 years). Furthermore, while the quicker availability of information was one of the reasons for social media use, especially the potential information overload was a key factor for not using social media in emergencies. The results are discussed in light of the dynamic nature of attitudes regarding social media in emergencies and the need to account for heterogeneity in user expectations to build trustworthy information ecosystems in social media.

    @article{reuter_increasing_2023,
    title = {Increasing {Adoption} {Despite} {Perceived} {Limitations} of {Social} {Media} in {Emergencies}: {Representative} {Insights} on {German} {Citizens}’ {Perception} and {Trends} from 2017 to 2021},
    volume = {96},
    issn = {2212-4209},
    url = {https://peasec.de/paper/2023/2023_ReuterKaufholdBiselliPleil_SocialMediaEmergenciesSurvey_IJDRR.pdf},
    doi = {https://doi.org/10.1016/j.ijdrr.2023.103880},
    abstract = {The value of social media in crises, disasters, and emergencies across different events, participants, and states is now well-examined in crisis informatics research. Previous research has contributed to the state of the art with empirical insights on the use of social media, approaches for the gathering and processing of big social data, the design and evaluation of information systems, and the analysis of cumulative and longitudinal data. While some studies examined social media use representatively for their target audience, these usually only comprise a single point of inquiry and do not allow for a trend analysis. This work provides results (1) of a representative survey with German citizens from 2021 on use patterns, perceptions, and expectations regarding social media during emergencies. Furthermore, it (2) compares these results to previous surveys and provides insights on temporal changes and trends from 2017, over 2019 to 2021. Our findings highlight that social media use in emergencies increased in 2021 and 2019 compared to 2017. Between 2019 and 2021, the amount of information shared on social media remained on a similar level, while the perceived disadvantages of social media in emergencies significantly increased. In light of demographic variables, the results of the 2021 survey confirm previous findings, according to which older individuals (45+ years) use social media in emergencies less often than younger individuals (18-24 years). Furthermore, while the quicker availability of information was one of the reasons for social media use, especially the potential information overload was a key factor for not using social media in emergencies. The results are discussed in light of the dynamic nature of attitudes regarding social media in emergencies and the need to account for heterogeneity in user expectations to build trustworthy information ecosystems in social media.},
    journal = {International Journal of Disaster Risk Reduction (IJDRR)},
    author = {Reuter, Christian and Kaufhold, Marc-André and Biselli, Tom and Pleil, Helene},
    year = {2023},
    keywords = {AuswahlCrisis, Crisis, SocialMedia, Student, A-Paper, Ranking-ImpactFactor, Projekt-emergenCITY, Projekt-NEBULA, Projekt-CYLENCE},
    }

    2022

  • Stefka Schmid, Katrin Hartwig, Robert Cieslinski, Christian Reuter (2022)
    Digital Resilience in Dealing with Misinformation on Social Media during COVID-19: A Web Application to Assist Users in Crises
    Information Systems Frontiers (ISF) . doi:10.1007/s10796-022-10347-5
    [BibTeX] [Abstract] [Download PDF]

    In crises such as the COVID-19 pandemic, it is crucial to support users when dealing with social media content. Considering digital resilience, we propose a web app based on Social Network Analysis (SNA) to provide an overview of potentially misleading vs. non-misleading content on Twitter, which can be explored by users and enable foundational learning. The latter aims at systematically identifying thematic patterns which may be associated with misleading information. Additionally, it entails reflecting on indicators of misleading tweets which are proposed to approach classification of tweets. Paying special attention to non-expert users of social media, we conducted a two-step Think Aloud study for evaluation. While participants valued the opportunity to generate new knowledge and the diversity of the application, qualities such as equality and rapidity may be further improved. However, learning effects outweighed individual costs as all users were able to shift focus onto relevant features, such as hashtags, while readily pointing out content characteristics. Our design artifact connects to learning-oriented interventions regarding the spread of misleading information and tackles information overload by a SNA-based plug-in.

    @article{schmid_digital_2022,
    title = {Digital {Resilience} in {Dealing} with {Misinformation} on {Social} {Media} during {COVID}-19: {A} {Web} {Application} to {Assist} {Users} in {Crises}},
    url = {https://link.springer.com/article/10.1007/s10796-022-10347-5},
    doi = {10.1007/s10796-022-10347-5},
    abstract = {In crises such as the COVID-19 pandemic, it is crucial to support users when dealing with social media content. Considering digital resilience, we propose a web app based on Social Network Analysis (SNA) to provide an overview of potentially misleading vs. non-misleading content on Twitter, which can be explored by users and enable foundational learning. The latter aims at systematically identifying thematic patterns which may be associated with misleading information. Additionally, it entails reflecting on indicators of misleading tweets which are proposed to approach classification of tweets. Paying special attention to non-expert users of social media, we conducted a two-step Think Aloud study for evaluation. While participants valued the opportunity to generate new knowledge and the diversity of the application, qualities such as equality and rapidity may be further improved. However, learning effects outweighed individual costs as all users were able to shift focus onto relevant features, such as hashtags, while readily pointing out content characteristics. Our design artifact connects to learning-oriented interventions regarding the spread of misleading information and tackles information overload by a SNA-based plug-in.},
    journal = {Information Systems Frontiers (ISF)},
    author = {Schmid, Stefka and Hartwig, Katrin and Cieslinski, Robert and Reuter, Christian},
    year = {2022},
    keywords = {Crisis, Student, A-Paper, Projekt-TraCe, Projekt-NEBULA},
    }

    GRK2050 P&T: DFG-Graduiertenkolleg Privatheit und Vertrauen (1.4.2020-30.9.2024, DFG)

    DFG-Graduiertenkolleg Privatheit und Vertrauen (1.4.2020-30.9.2024, DFG)

    https://www.informatik.tu-darmstadt.de/privacy-trust

    In dem von der Deutschen Forschungsgemeinschaft finanzierten Graduiertenkolleg „Privatheit und Vertrauen für mobile Nutzer“ werden interdisziplinär neue Lösungen für den Schutz der Privatsphäre bei der mobilen Internetnutzung entwickelt. Vertreter der Informatik, Usability und Wirtschaftswissenschaften aus der TU Darmstadt arbeiten eng mit Wissenschaftler aus den Bereichen der Rechtswissenschaften und der Soziologie der Universität Kassel zusammen. Sie alle arbeiten in interdisziplinären Promotionsthemen an der Vision eines neuartigen persönlichen Mobilgeräts.

    Das Graduiertenkolleg möchte zu besserem und persönlich anpassbarem Schutz der Privatsphäre der Nutzer und zu mehr Transparenz in der IT-Welt beitragen. Die Nutzer sollen in der Lage sein, das sie umgebende Netzwerk und seine Komponenten hinreichend zu verstehen, die vermeintliche Qualität einer Dienst- und System-Nutzung mit all den Vor- und Nachteilen abzuwägen und so die Vertrauenswürdigkeit zu bewerten. Die Ergebnisse des Graduiertenkollegs sollen dazu beitragen, dass die Grundrechte auf informationelle Selbstbestimmung und auf Schutz des Telekommunikationsgeheimnisses im Internet künftig besser verwirklicht werden können.

    2023

  • Enno Steinbrink, Tom Biselli, Sebastian Linsner, Franziska Herbert, Christian Reuter (2023)
    Privacy Perception and Behaviour in Safety-Critical Environments
    In: Nina Gerber, Alina Stöver, Karola Marky: Human Factors in Privacy Research. Cham: Springer International Publishing, , 237–251.
    [BibTeX] [Abstract] [Download PDF]

    When considering privacy, context, and environmental circumstances can have a strong influence on individual decisions and user behavior. Especially in crises or threatening situations, privacy may conflict with other values, such as personal safety and health. In other cases, personal or public safety can also be dependent on privacy: the context of flight shows how, for those affected, the value of data protection can increase as a result of an increased threat situation. Thus, when individual sovereignty—the autonomous development of one’s own will—or safety is highly dependent on information flows, people tend to be more protective of their privacy in order to maintain their information sovereignty. But also, the context of agriculture, as part of the critical infrastructure, shows how privacy concerns can affect the adoption of digital tools. With these two examples, flight and migration as well as agriculture, this chapter presents some exemplary results that illustrate the importance of the influence of situational factors on perceived information sovereignty and the evaluation of privacy.

    @incollection{steinbrink_privacy_2023,
    address = {Cham},
    title = {Privacy {Perception} and {Behaviour} in {Safety}-{Critical} {Environments}},
    isbn = {978-3-031-28643-8},
    url = {https://doi.org/10.1007/978-3-031-28643-8_12},
    abstract = {When considering privacy, context, and environmental circumstances can have a strong influence on individual decisions and user behavior. Especially in crises or threatening situations, privacy may conflict with other values, such as personal safety and health. In other cases, personal or public safety can also be dependent on privacy: the context of flight shows how, for those affected, the value of data protection can increase as a result of an increased threat situation. Thus, when individual sovereignty—the autonomous development of one’s own will—or safety is highly dependent on information flows, people tend to be more protective of their privacy in order to maintain their information sovereignty. But also, the context of agriculture, as part of the critical infrastructure, shows how privacy concerns can affect the adoption of digital tools. With these two examples, flight and migration as well as agriculture, this chapter presents some exemplary results that illustrate the importance of the influence of situational factors on perceived information sovereignty and the evaluation of privacy.},
    booktitle = {Human {Factors} in {Privacy} {Research}},
    publisher = {Springer International Publishing},
    author = {Steinbrink, Enno and Biselli, Tom and Linsner, Sebastian and Herbert, Franziska and Reuter, Christian},
    editor = {Gerber, Nina and Stöver, Alina and Marky, Karola},
    year = {2023},
    keywords = {HCI, UsableSec, Security, Projekt-CROSSING, Projekt-ATHENE-FANCY, Projekt-GRKPrivacy},
    pages = {237--251},
    }

  • Thomas Reinhold, Philipp Kuehn, Daniel Günther, Thomas Schneider, Christian Reuter (2023)
    ExTRUST: Reducing Exploit Stockpiles With a Privacy-Preserving Depletion Systems for Inter-State Relationships
    IEEE Transactions on Technology and Society ;4(2):158–170. doi:10.1109/TTS.2023.3280356
    [BibTeX] [Abstract] [Download PDF]

    Cyberspace is a fragile construct threatened by malicious cyber operations of different actors, with vulnerabilities in IT hardware and software forming the basis for such activities, thus also posing a threat to global IT security. Advancements in the field of artificial intelligence accelerate this development, either with artificial intelligence enabled cyber weapons, automated cyber defense measures, or artificial intelligence-based threat and vulnerability detection. Especially state actors, with their long-term strategic security interests, often stockpile such knowledge of vulnerabilities and exploits to enable their military or intelligence service cyberspace operations. While treaties and regulations to limit these developments and to enhance global IT security by disclosing vulnerabilities are currently being discussed on the international level, these efforts are hindered by state concerns about the disclosure of unique knowledge and about giving up tactical advantages. This leads to a situation where multiple states are likely to stockpile at least some identical exploits, with technical measures to enable a depletion process for these stockpiles that preserve state secrecy interests and consider the special constraints of interacting states as well as the requirements within such environments being non-existent. This paper proposes such a privacy-preserving approach that allows multiple state parties to privately compare their stock of vulnerabilities and exploits to check for items that occur in multiple stockpiles without revealing them so that their disclosure can be considered. We call our system ExTRUST and show that it is scalable and can withstand several attack scenarios. Beyond the intergovernmental setting, ExTRUST can also be used for other zero-trust use cases, such as bug-bounty programs.

    @article{reinhold_extrust_2023,
    title = {{ExTRUST}: {Reducing} {Exploit} {Stockpiles} {With} a {Privacy}-{Preserving} {Depletion} {Systems} for {Inter}-{State} {Relationships}},
    volume = {4},
    url = {https://peasec.de/paper/2023/2023_ReinholdKuehnGuentherSchneiderReuter_ExTrust-ehem-BlockED_TTaS.pdf},
    doi = {10.1109/TTS.2023.3280356},
    abstract = {Cyberspace is a fragile construct threatened by malicious cyber operations of different actors, with vulnerabilities in IT hardware and software forming the basis for such activities, thus also posing a threat to global IT security. Advancements in the field of artificial intelligence accelerate this development, either with artificial intelligence enabled cyber weapons, automated cyber defense measures, or artificial intelligence-based threat and vulnerability detection. Especially state actors, with their long-term strategic security interests, often stockpile such knowledge of vulnerabilities and exploits to enable their military or intelligence service cyberspace operations. While treaties and regulations to limit these developments and to enhance global IT security by disclosing vulnerabilities are currently being discussed on the international level, these efforts are hindered by state concerns about the disclosure of unique knowledge and about giving up tactical advantages. This leads to a situation where multiple states are likely to stockpile at least some identical exploits, with technical measures to enable a depletion process for these stockpiles that preserve state secrecy interests and consider the special constraints of interacting states as well as the requirements within such environments being non-existent. This paper proposes such a privacy-preserving approach that allows multiple state parties to privately compare their stock of vulnerabilities and exploits to check for items that occur in multiple stockpiles without revealing them so that their disclosure can be considered. We call our system ExTRUST and show that it is scalable and can withstand several attack scenarios. Beyond the intergovernmental setting, ExTRUST can also be used for other zero-trust use cases, such as bug-bounty programs.},
    number = {2},
    journal = {IEEE Transactions on Technology and Society},
    author = {Reinhold, Thomas and Kuehn, Philipp and Günther, Daniel and Schneider, Thomas and Reuter, Christian},
    year = {2023},
    keywords = {Selected, Student, A-Paper, Peace, Projekt-CROSSING, AuswahlPeace, Cyberwar, Projekt-ATHENE-SecUrban, Projekt-GRKPrivacy},
    pages = {158--170},
    }

  • Verena Zimmermann, Jasmin Haunschild, Alina Stöver, Nina Gerber (2023)
    Safe AND Secure Infrastructures? – Studying Human Aspects of Safety and Security Incidents with Experts from both Domains
    Mensch und Computer – Workshopband Rapperswil, Switzerland. doi:10.18420/muc2023-mci-ws01-225
    [BibTeX] [Abstract] [Download PDF]

    In today’s digitalized and interconnected world, the traditionally distinct concepts security and safety are increasingly intertwined. For example, a cyber attack on a hospital can negatively impact the patients’ physical safety. Thus, security research and practice should consider these interactions. To explore human-related challenges at the intersection of safety and security, we conducted three focus group workshops with N= 16 experts from both domains. We introduced two scenarios leading to a power outage, one with a safety-related cause (snow storm) and one with a security-related cause (cyber attack). The experts discussed interactions, differences and parallels in coping with the scenarios. Additionally, potential solutions for building response capacity by including volunteers were explored. The findings indicate similar consequences resulting from the safety- vs. security-related incidents. However, the experts identified relevant differences in the challenges preparing for and coping with the scenarios. While security-related challenges included the incalculable time horizon, impact and cascading effects as well as lack of emergency plans and training, safety challengesmainly concerned accessibility of the affected area. The implications for future work are discussed.

    @inproceedings{zimmermann_safe_2023,
    address = {Rapperswil, Switzerland},
    title = {Safe {AND} {Secure} {Infrastructures}? – {Studying} {Human} {Aspects} of {Safety} and {Security} {Incidents} with {Experts} from both {Domains}},
    url = {https://dl.gi.de/items/9c1d2bd5-229f-4db0-a764-6126cf92ef5f},
    doi = {10.18420/muc2023-mci-ws01-225},
    abstract = {In today’s digitalized and interconnected world, the traditionally distinct concepts security and safety are increasingly intertwined. For example, a cyber attack on a hospital can negatively impact the patients’ physical safety. Thus, security research and practice should consider these interactions. To explore human-related challenges at the intersection of safety and security, we conducted three focus group workshops with N= 16 experts from both domains. We introduced two scenarios leading to a power outage, one with a safety-related cause (snow storm) and one with a security-related cause (cyber attack). The experts discussed interactions, differences and parallels in coping with the scenarios. Additionally, potential solutions for building response capacity by including volunteers were explored. The findings indicate similar consequences resulting from the safety- vs. security-related incidents. However, the experts identified relevant differences in the challenges preparing for and coping with the scenarios. While security-related challenges included the incalculable time horizon, impact and cascading effects as well as lack of emergency plans and training, safety challengesmainly concerned accessibility of the affected area. The implications for future work are discussed.},
    language = {de},
    booktitle = {Mensch und {Computer} - {Workshopband}},
    publisher = {Gesellschaft für Informatik e.V.},
    author = {Zimmermann, Verena and Haunschild, Jasmin and Stöver, Alina and Gerber, Nina},
    year = {2023},
    keywords = {Security, Peace, Projekt-ATHENE-SecUrban, Projekt-GRKPrivacy},
    }

    2022

  • Laura Buhleier, Sebastian Linsner, Enno Steinbrink, Christian Reuter (2022)
    Eine Klassifikation sicherheitskritischer UX-Design-Patterns
    Mensch und Computer – Workshopband Darmstadt. doi:10.18420/muc2022-mci-ws10-275
    [BibTeX] [Abstract] [Download PDF]

    User Experience ist von zunehmender Relevanz für die Entwicklung digitaler Designentscheidungen und hat somit weitgehende Auswirkungen auf das Nutzerverhalten. Dass dies besonders für die Sicherheit und Vertraulichkeit nicht nur von Vorteil sein kann, sondern Nutzer*innen negativ beeinflussen kann, wird in dieser Arbeit ersichtlich. Betrachtetwerden dafür die Themengebiete Anti-Patterns, Grey Patterns und Dark-Patterns. Anti-Patterns bezeichnen wiederkehrende Lösungen für ein Konzept eines User Interfaces, die trotz guter Intention ungewünschte Nebeneffekte oder Konsequenzen haben. Dark-Patterns dagegen stellen Designentscheidungen dar, die durch Täuschung oder Ausnutzung psychischen Drucks versuchen Nutzer*innen zu Handlungen zu verleiten, von denen die Ersteller*innen des Dark-Patterns mehr profitieren als die Anwender* innen. Der Begriff Grey Patterns wird in dieser Arbeit für alle Design Patterns genutzt, die sich nicht direkt zuordnen lassen. Da es bisher kaum vergleichendeWerke und keinen Konsens zu diesen Themengebieten gibt, ist das Ziel dieser Arbeit ein grundlegendes Modell aufzustellen. Dabei wird durch die Untersuchung bestehender Literatur eine zusammenfassende Taxonomie und ein Vorgehen zur Unterscheidung von Anti-Patterns und Dark-Patterns erarbeitet, die als Grundlage für weitere Arbeiten und zur Entwicklung von Gegenmaßnahmen genutzt werden können.

    @inproceedings{buhleier_klassifikation_2022,
    address = {Darmstadt},
    series = {Mensch und {Computer} 2022 - {Workshopband}},
    title = {Eine {Klassifikation} sicherheitskritischer {UX}-{Design}-{Patterns}},
    url = {https://dl.gi.de/handle/20.500.12116/39087},
    doi = {10.18420/muc2022-mci-ws10-275},
    abstract = {User Experience ist von zunehmender Relevanz für die Entwicklung digitaler Designentscheidungen und hat somit weitgehende Auswirkungen auf das Nutzerverhalten. Dass dies besonders für die Sicherheit und Vertraulichkeit nicht nur von Vorteil sein kann, sondern Nutzer*innen negativ beeinflussen kann, wird in dieser Arbeit ersichtlich. Betrachtetwerden dafür die Themengebiete Anti-Patterns, Grey Patterns und Dark-Patterns. Anti-Patterns bezeichnen wiederkehrende Lösungen für ein Konzept eines User Interfaces, die trotz guter Intention ungewünschte Nebeneffekte oder Konsequenzen haben. Dark-Patterns dagegen stellen Designentscheidungen dar, die durch Täuschung oder Ausnutzung psychischen Drucks versuchen Nutzer*innen zu Handlungen zu verleiten, von denen die Ersteller*innen des Dark-Patterns mehr profitieren als die Anwender* innen. Der Begriff Grey Patterns wird in dieser Arbeit für alle Design Patterns genutzt, die sich nicht direkt zuordnen lassen. Da es bisher kaum vergleichendeWerke und keinen Konsens zu diesen Themengebieten gibt, ist das Ziel dieser Arbeit ein grundlegendes Modell aufzustellen. Dabei wird durch die Untersuchung bestehender Literatur eine zusammenfassende Taxonomie und ein Vorgehen zur Unterscheidung von Anti-Patterns und Dark-Patterns erarbeitet, die als Grundlage für weitere Arbeiten und zur Entwicklung von Gegenmaßnahmen genutzt werden können.},
    language = {de},
    booktitle = {Mensch und {Computer} - {Workshopband}},
    publisher = {Gesellschaft für Informatik},
    author = {Buhleier, Laura and Linsner, Sebastian and Steinbrink, Enno and Reuter, Christian},
    year = {2022},
    keywords = {HCI, Student, UsableSec, Security, Projekt-CROSSING, Projekt-GRKPrivacy},
    }

  • Tom Biselli, Enno Steinbrink, Franziska Herbert, Gina Maria Schmidbauer-Wolf, Christian Reuter (2022)
    On the Challenges of Developing a Concise Questionnaire to Identify Privacy Personas
    Proceedings on Privacy Enhancing Technologies (PoPETs) (4):645–669. doi:10.56553/popets-2022-0126
    [BibTeX] [Abstract] [Download PDF]

    Concise instruments to determine privacy personas – typical privacy-related user groups – are not available at present. Consequently, we aimed to identify them on a privacy knowledge–privacy behavior ratio based on a self-developed instrument. To achieve this, we conducted an item analysis (N = 820) and a confirmatory factor analysis (CFA) (N = 656) of data based on an online study with German participants. Starting with 81 items, we reduced those to an eleven-item questionnaire with the two scales privacy knowledge and privacy behavior. A subsequent cluster analysis (N = 656) revealed three distinct user groups: (1) Fundamentalists scoring high in privacy knowledge and behavior, (2) Pragmatists scoring average in privacy knowledge and behavior and (3) Unconcerned scoring low in privacy knowledge and behavior. In a closer inspection of the questionnaire, the CFAs supported the model with a close global fit based on RMSEA in a training and to a lesser extent in a cross-validation sample. Deficient local fit as well as validity and reliability coefficients well below generally accepted thresholds, however, revealed that the questionnaire in its current form cannot be considered a suitable measurement instrument for determining privacy personas. The results are discussed in terms of related persona conceptualizations, the importance of a methodologically sound investigation of corresponding privacy dimensions and our lessons learned.

    @article{biselli_challenges_2022,
    title = {On the {Challenges} of {Developing} a {Concise} {Questionnaire} to {Identify} {Privacy} {Personas}},
    url = {https://petsymposium.org/2022/files/papers/issue4/popets-2022-0126.pdf},
    doi = {10.56553/popets-2022-0126},
    abstract = {Concise instruments to determine privacy personas – typical privacy-related user groups – are not available at present. Consequently, we aimed to identify them on a privacy knowledge–privacy behavior ratio based on a self-developed instrument. To achieve this, we conducted an item analysis (N = 820) and a confirmatory factor analysis (CFA) (N = 656) of data based on an online study with German participants. Starting with 81 items, we reduced those to an eleven-item questionnaire with the two scales privacy knowledge and privacy behavior. A subsequent cluster analysis (N = 656) revealed three distinct user groups: (1) Fundamentalists scoring high in privacy knowledge and behavior, (2) Pragmatists scoring average in privacy knowledge and behavior and (3) Unconcerned scoring low in privacy knowledge and behavior. In a closer inspection of the questionnaire, the CFAs supported the model with a close global fit based on RMSEA in a training and to a lesser extent in a cross-validation sample. Deficient local fit as well as validity and reliability coefficients well below generally accepted thresholds, however, revealed that the questionnaire in its current form cannot be considered a suitable measurement instrument for determining privacy personas. The results are discussed in terms of related persona conceptualizations, the importance of a methodologically sound investigation of corresponding privacy dimensions and our lessons learned.},
    number = {4},
    journal = {Proceedings on Privacy Enhancing Technologies (PoPETs)},
    author = {Biselli, Tom and Steinbrink, Enno and Herbert, Franziska and Schmidbauer-Wolf, Gina Maria and Reuter, Christian},
    year = {2022},
    keywords = {HCI, Selected, UsableSec, Security, A-Paper, Ranking-CORE-A, Projekt-CROSSING, Projekt-ATHENE-FANCY, AuswahlUsableSec, Projekt-GRKPrivacy},
    pages = {645--669},
    }

  • Sebastian Linsner, Enno Steinbrink, Franz Kuntke, Jonas Franken, Christian Reuter (2022)
    Supporting Users in Data Disclosure Scenarios in Agriculture through Transparency
    Behaviour & Information Technology (BIT) ;41(10):2137–2159. doi:10.1080/0144929X.2022.2068070
    [BibTeX] [Abstract] [Download PDF]

    Business collaboration in the era of digital transformation requires the exchange of operational data. Since data are hardly controllable once they have been published or shared with others, it is highly important that users are clearly informed about who has access to which data and how certain settings can prevent the disclosure of sensitive data. However, giving end users more control over their data through increased transparency could also lead to information overload. This is particularly true in the field of agriculture, where tight schedules put pressure on employees of small enterprises. We conduct an empirical prestudy with 52 German farmers to investigate current data sharing scenarios. From these insights, we derive requirements and a concept for data sharing solutions providing data flow transparency for users. To investigate the behavior of users and the effects of transparent UI controls, we evaluate a prototype with 18 persons. Our evaluation shows that farmers demand flexible and secure tools that adjust to their workflows. Also, data should be stored and processed locally, granting farmers data sovereignty. Although the controls require additional effort, the evaluated transparent controls for data disclosure are easy to use and raise user awareness.

    @article{linsner_supporting_2022,
    title = {Supporting {Users} in {Data} {Disclosure} {Scenarios} in {Agriculture} through {Transparency}},
    volume = {41},
    url = {http://www.peasec.de/paper/2022/2022_LinsnerSteinbrinkKuntkeFrankenReuter_SupportingDataDisclosureScenariosAgriculture_BIT.pdf},
    doi = {10.1080/0144929X.2022.2068070},
    abstract = {Business collaboration in the era of digital transformation requires the exchange of operational data. Since data are hardly controllable once they have been published or shared with others, it is highly important that users are clearly informed about who has access to which data and how certain settings can prevent the disclosure of sensitive data. However, giving end users more control over their data through increased transparency could also lead to information overload. This is particularly true in the field of agriculture, where tight schedules put pressure on employees of small enterprises. We conduct an empirical prestudy with 52 German farmers to investigate current data sharing scenarios. From these insights, we derive requirements and a concept for data sharing solutions providing data flow transparency for users. To investigate the behavior of users and the effects of transparent UI controls, we evaluate a prototype with 18 persons. Our evaluation shows that farmers demand flexible and secure tools that adjust to their workflows. Also, data should be stored and processed locally, granting farmers data sovereignty. Although the controls require additional effort, the evaluated transparent controls for data disclosure are easy to use and raise user awareness.},
    number = {10},
    journal = {Behaviour \& Information Technology (BIT)},
    author = {Linsner, Sebastian and Steinbrink, Enno and Kuntke, Franz and Franken, Jonas and Reuter, Christian},
    year = {2022},
    keywords = {UsableSec, Security, A-Paper, Ranking-ImpactFactor, Ranking-CORE-A, RSF, Projekt-GRKPrivacy, Projekt-HyServ, Projekt-AgriRegio},
    pages = {2137--2159},
    }

  • Franz Kuntke, Vladimir Romanenko, Sebastian Linsner, Enno Steinbrink, Christian Reuter (2022)
    LoRaWAN Security Issues and Mitigation Options by the Example of Agricultural IoT Scenarios
    Transactions on Emerging Telecommunications Technologies (ETT) ;33(5):e4452. doi:10.1002/ett.4452
    [BibTeX] [Abstract] [Download PDF]

    The Internet of Things (IoT) is a major trend that is seen as a great opportunity to improve efficiency in many domains, including agriculture. This technology could transform the sector, improving the management and quality of agricultural operations, for example, crop farming. The most promising data transmission standard for this domain seems to be Long Range Wide Area Network (LoRaWAN), a popular representative of low power wide area network technologies today. LoRaWAN, like any wireless protocol, has properties that can be exploited by attackers, which has been a topic of multiple research papers in recent years. By conducting a systematic literature review, we build a recent list of attacks, as well as collect mitigation options. Taking a look at a concrete use case (IoT in agriculture) allows us to evaluate the practicality of both exploiting the vulnerabilities and implementing the countermeasures. We detected 16 attacks that we grouped into six attack types. Along with the attacks, we collect countermeasures for attack mitigation. Developers can use our findings to minimize the risks when developing applications based on LoRaWAN. These mostly theoretical security recommendations should encourage future works to evaluate the mitigations in practice.

    @article{kuntke_lorawan_2022,
    title = {{LoRaWAN} {Security} {Issues} and {Mitigation} {Options} by the {Example} of {Agricultural} {IoT} {Scenarios}},
    volume = {33},
    issn = {2161-3915},
    url = {https://www.peasec.de/paper/2022/2022_KuntkeRomanenkoLinsnerSteinbrinkReuter_LoRaWANsecurityAgriculture_ETT.pdf},
    doi = {10.1002/ett.4452},
    abstract = {The Internet of Things (IoT) is a major trend that is seen as a great opportunity to improve efficiency in many domains, including agriculture. This technology could transform the sector, improving the management and quality of agricultural operations, for example, crop farming. The most promising data transmission standard for this domain seems to be Long Range Wide Area Network (LoRaWAN), a popular representative of low power wide area network technologies today. LoRaWAN, like any wireless protocol, has properties that can be exploited by attackers, which has been a topic of multiple research papers in recent years. By conducting a systematic literature review, we build a recent list of attacks, as well as collect mitigation options. Taking a look at a concrete use case (IoT in agriculture) allows us to evaluate the practicality of both exploiting the vulnerabilities and implementing the countermeasures. We detected 16 attacks that we grouped into six attack types. Along with the attacks, we collect countermeasures for attack mitigation. Developers can use our findings to minimize the risks when developing applications based on LoRaWAN. These mostly theoretical security recommendations should encourage future works to evaluate the mitigations in practice.},
    number = {5},
    journal = {Transactions on Emerging Telecommunications Technologies (ETT)},
    author = {Kuntke, Franz and Romanenko, Vladimir and Linsner, Sebastian and Steinbrink, Enno and Reuter, Christian},
    month = may,
    year = {2022},
    keywords = {Student, Security, A-Paper, Ranking-ImpactFactor, RSF, Projekt-GeoBox, Projekt-GRKPrivacy, Projekt-HyServ, Projekt-AgriRegio},
    pages = {e4452},
    }

  • Franz Kuntke, Sebastian Linsner, Enno Steinbrink, Jonas Franken, Christian Reuter (2022)
    Resilience in Agriculture: Communication and Energy Infrastructure Dependencies of German Farmers
    International Journal of Disaster Risk Science (IJDRS) ;13(2):214–229. doi:10.1007/s13753-022-00404-7
    [BibTeX] [Abstract] [Download PDF]

    Agriculture is subject to high demands regarding resilience as it is an essential component of the food production chain. In the agricultural sector, there is an increasing usage of digital tools that rely on communication and energy infrastructures. Should disruption occur, such strengthened dependencies on other infrastructures increase the probability of ripple effects. Thus, there is a need to analyze the resilience of the agricultural sector with a specific focus on the effects of digitalization. This study works out resilience capacities of the interconnected technologies used in farm systems based on the experiences and opinions of farmers. Information was gathered through focus group interviews with farmers (N = 52) and a survey with participants from the agricultural sector (N = 118). In particular, the focus is put on the digital tools and other information and communication technologies they use. Based on a definition of resilience capacities, we evaluate resilience regarding energy and communication demands in various types of farm systems. Especially important are the resilience aspects of modern systems’ digital communication as well as the poorly developed and nonresilient network infrastructure in rural areas that contrast with the claim for a resilient agriculture. The result is a low robustness capacity, as our analysis concludes with the risk of food production losses.

    @article{kuntke_resilience_2022,
    title = {Resilience in {Agriculture}: {Communication} and {Energy} {Infrastructure} {Dependencies} of {German} {Farmers}},
    volume = {13},
    issn = {2192-6395},
    url = {https://link.springer.com/article/10.1007/s13753-022-00404-7},
    doi = {10.1007/s13753-022-00404-7},
    abstract = {Agriculture is subject to high demands regarding resilience as it is an essential component of the food production chain. In the agricultural sector, there is an increasing usage of digital tools that rely on communication and energy infrastructures. Should disruption occur, such strengthened dependencies on other infrastructures increase the probability of ripple effects. Thus, there is a need to analyze the resilience of the agricultural sector with a specific focus on the effects of digitalization. This study works out resilience capacities of the interconnected technologies used in farm systems based on the experiences and opinions of farmers. Information was gathered through focus group interviews with farmers (N = 52) and a survey with participants from the agricultural sector (N = 118). In particular, the focus is put on the digital tools and other information and communication technologies they use. Based on a definition of resilience capacities, we evaluate resilience regarding energy and communication demands in various types of farm systems. Especially important are the resilience aspects of modern systems’ digital communication as well as the poorly developed and nonresilient network infrastructure in rural areas that contrast with the claim for a resilient agriculture. The result is a low robustness capacity, as our analysis concludes with the risk of food production losses.},
    number = {2},
    journal = {International Journal of Disaster Risk Science (IJDRS)},
    author = {Kuntke, Franz and Linsner, Sebastian and Steinbrink, Enno and Franken, Jonas and Reuter, Christian},
    month = apr,
    year = {2022},
    keywords = {Selected, Security, A-Paper, Ranking-ImpactFactor, Ranking-CORE-B, RSF, Projekt-GeoBox, Projekt-GRKPrivacy, Projekt-HyServ, Projekt-AgriRegio},
    pages = {214--229},
    }

    2021

  • Sebastian Linsner, Franz Kuntke, Enno Steinbrink, Jonas Franken, Christian Reuter (2021)
    The Role of Privacy in Digitalization – Analysing the German Farmers‘ Perspective
    Proceedings on Privacy Enhancing Technologies (PoPETs) ;2021(3):334–350. doi:10.2478/popets-2021-0050
    [BibTeX] [Abstract] [Download PDF]

    Technological progress can disrupt domains and change the way we work and collaborate. This paper presents a qualitative study with 52 German farmers that investigates the impact of the ongoing digitalization process in agriculture and discusses the implications for privacy research. As in other domains, the introduction of digital tools and services leads to the data itself becoming a resource. Sharing this data with products along the supply chain is favored by retailers and consumers, who benefit from traceability through transparency. However, transparency can pose a privacy risk. Having insight into the business data of others along the supply chain provides an advantage in terms of market position. This is particularly true in agriculture, where there is already a significant imbalance of power between actors. A multitude of small and medium-sized farming businesses are opposed by large upstream and downstream players that drive technological innovation. Further weakening the market position of farmers could lead to severe consequences for the entire sector. We found that on the one hand, privacy behaviors are affected by adoption of digitalization, and on the other hand, privacy itself influences adoption of digital tools. Our study sheds light on the emerging challenges for farmers and the role of privacy in the process of digitalization in agriculture.

    @article{linsner_role_2021,
    title = {The {Role} of {Privacy} in {Digitalization} – {Analysing} the {German} {Farmers}' {Perspective}},
    volume = {2021},
    url = {https://www.petsymposium.org/2021/files/papers/issue3/popets-2021-0050.pdf},
    doi = {10.2478/popets-2021-0050},
    abstract = {Technological progress can disrupt domains
    and change the way we work and collaborate. This paper presents a qualitative study with 52 German farmers
    that investigates the impact of the ongoing digitalization process in agriculture and discusses the implications for privacy research. As in other domains, the introduction of digital tools and services leads to the data
    itself becoming a resource. Sharing this data with products along the supply chain is favored by retailers and
    consumers, who benefit from traceability through transparency. However, transparency can pose a privacy risk.
    Having insight into the business data of others along the
    supply chain provides an advantage in terms of market
    position. This is particularly true in agriculture, where
    there is already a significant imbalance of power between actors. A multitude of small and medium-sized
    farming businesses are opposed by large upstream and
    downstream players that drive technological innovation.
    Further weakening the market position of farmers could
    lead to severe consequences for the entire sector. We
    found that on the one hand, privacy behaviors are affected by adoption of digitalization, and on the other
    hand, privacy itself influences adoption of digital tools.
    Our study sheds light on the emerging challenges for
    farmers and the role of privacy in the process of digitalization in agriculture.},
    number = {3},
    journal = {Proceedings on Privacy Enhancing Technologies (PoPETs)},
    author = {Linsner, Sebastian and Kuntke, Franz and Steinbrink, Enno and Franken, Jonas and Reuter, Christian},
    year = {2021},
    keywords = {HCI, Selected, UsableSec, Security, A-Paper, Ranking-ImpactFactor, Ranking-CORE-A, AuswahlUsableSec, Projekt-GeoBox, Projekt-GRKPrivacy, Projekt-HyServ},
    pages = {334--350},
    }

  • Enno Steinbrink, Lilian Reichert, Michelle Mende, Christian Reuter (2021)
    Digital Privacy Perceptions of Asylum Seekers in Germany – An Empirical Study about Smartphone Usage during the Flight
    Proceedings of the ACM: Human Computer Interaction (PACM): Computer-Supported Cooperative Work and Social Computing ;5(CSCW2). doi:10.1145/3479526
    [BibTeX] [Abstract] [Download PDF]

    Since 2015, an increased number of asylum seekers is coming to Europe. These migration movements increasingly rely on digital infrastructure, such as mobile internet access and online services, in order to reach their targeted destination countries. Asylum seekers often use smartphones for information and communication purposes. Even though there are many positive aspects in the use of such technologies, researchers have to consider the perceived risks of this specific user group. This work aims at investigating the use of mobile information technologies by asylum seekers during their flight, especially taking privacy into account. Thus, it examines asylum seekers’ digital privacy perceptions and identifies privacy protection behaviors by conducting a qualitative interview study with 14 asylum seekers who applied for asylum in Germany. The results show that asylum seekers are often aware of the various risks deriving from the use of smartphones and ICT, such as surveillance and persecution by state or non-state actors as well as extortion by criminals. Based on this, this work furthermore outlines different strategies used to manage these risks. Since the lack of privacy and trust leads to avoidance behavior, the insights of this study provide valuable information for the design of assistance apps and collaboration platforms, which appropriately address the specific needs for digital privacy in the context of flight, or for the conception of privacy-enhancing technologies helping to achieve this.

    @article{steinbrink_digital_2021,
    title = {Digital {Privacy} {Perceptions} of {Asylum} {Seekers} in {Germany} - {An} {Empirical} {Study} about {Smartphone} {Usage} during the {Flight}},
    volume = {5},
    url = {https://www.peasec.de/paper/2021/2021_SteinbrinkReichertMendeReuter_DigitalPrivacyPerceptionAsylumSeekers_CSCW.pdf},
    doi = {10.1145/3479526},
    abstract = {Since 2015, an increased number of asylum seekers is coming to Europe. These migration movements increasingly rely on digital infrastructure, such as mobile internet access and online services, in order to reach their targeted destination countries. Asylum seekers often use smartphones for information and communication purposes. Even though there are many positive aspects in the use of such technologies, researchers have to consider the perceived risks of this specific user group. This work aims at investigating the use of mobile information technologies by asylum seekers during their flight, especially taking privacy into account. Thus, it examines asylum seekers’ digital privacy perceptions and identifies privacy protection behaviors by conducting a qualitative interview study with 14 asylum seekers who applied for asylum in Germany. The results show that asylum seekers are often aware of the various risks deriving from the use of smartphones and ICT, such as surveillance and persecution by state or non-state actors as well as extortion by criminals. Based on this, this work furthermore outlines different strategies used to manage these risks. Since the lack of privacy and trust leads to avoidance behavior, the insights of this study provide valuable information for the design of assistance apps and collaboration platforms, which appropriately address the specific needs for digital privacy in the context of flight, or for the conception of privacy-enhancing technologies helping to achieve this.},
    number = {CSCW2},
    journal = {Proceedings of the ACM: Human Computer Interaction (PACM): Computer-Supported Cooperative Work and Social Computing},
    author = {Steinbrink, Enno and Reichert, Lilian and Mende, Michelle and Reuter, Christian},
    year = {2021},
    keywords = {Student, UsableSec, Security, A-Paper, Ranking-ImpactFactor, Ranking-CORE-A, Projekt-ATHENE-FANCY, AuswahlUsableSec, Projekt-GRKPrivacy},
    }

    Das Netz hat Geschichte: Netzwerk- und Vulnerabilitätsanalyse Kritischer Infrastrukturen am Beispiel IKT und Verkehr in Rhein/Main (1.1.2023-30.06.2024, FIF-IANUS)

    Das Netz hat Geschichte: Netzwerk- und Vulnerabilitätsanalyse Kritischer Infrastrukturen am Beispiel IKT und Verkehr in Rhein/Main (1.1.2023-30.6.2024, FIF-IANUS)

    Wohl kaum eine Infrastruktur gilt moderner als elektronische Kommunikationssysteme. Doch auch digitale Kommunikationsmittel haben eine Geschichte. Die Historizität von Infrastrukturen hat enorme Auswirkungen auf ihre aktuelle Gestalt. Insbesondere die Vulnerabilität von Infrastrukturen ist stark von historischen Strukturen geprägt. Die räumliche Ausdehnung der Netzwerke aufgrund historischer Strukturen reproduziert ungleiche Vulnerabilitätsniveaus.

    Das Projekt wird die Verletzlichkeit der kritischen Infrastrukturen Verkehr und Kommunikation in der Rhein-Main-Region analysieren. Beide komplexen Netzwerkstrukturen haben sich aus mehr oder weniger heterogenen „Zeitschichten“ entwickelt, die aus raum-zeitlicher und technischer Perspektive untersucht werden. Das Projektziel ist es, aus der historischen Entstehung und der aktuellen Technologieverbreitung Lehren für eine resilientere Gestaltung zu ziehen. Auf der Grundlage von Literaturrecherche und Konzeption wird eine qualitative Interviewstudie durchgeführt, um Hypothesen über das implizite Wissen über die zeitliche Heterogenität, die daraus resultierenden Schwachstellen und die interdependente Entwicklung beider Sektoren zu generieren. Anschließend sollen quantitative Netzwerkanalysen Einblicke in die Gemeinsamkeiten und Unterschiede der Verbreitung und der daraus folgenden Verwundbarkeit emergenter Technologien liefern. Zu diesem Zweck wird eine Archivstudie vorgesehen, in der die zeitlichen Schichtungsprozesse der Infrastrukturen aufgeschlüsselt und Hypothesen historisch geprüft werden. Die empirischen Schritte des Projekts sind eingebettet in eine initiale interdisziplinäre Konzeption und eine abschließende gemeinsame Projektevaluation.

    AgriRegio: Infrastruktur zur Förderung von digitaler Resilienz und Klimaresilienz im ländlichen Raum am Beispiel der Pilotregion Nahe-Donnersberg (BMEL, 1.1.2022-30.06.2024)

    AgriRegio: Infrastruktur zur Förderung von digitaler Resilienz und Klimaresilienz im ländlichen Raum am Beispiel der Pilotregion Nahe-Donnersberg (BMEL, 1.1.2022-30.6.2024)

    https://peasec.de/projekte/agriregio

    AgriRegio LogoSmart Farming macht ressourcenschonendes und wirtschaftlicheres Arbeiten in der Landwirtschaft möglich. Doch die Digitalisierung bietet den Landwirten nicht nur betriebsinterne Vorteile. Sensordaten können auch beim überbetrieblichen Logistik- und Bewirtschaftungsmanagement neue regionale Handlungsoptionen zum Boden-, Pflanzen- und Klimaschutz liefern. Ein Ausfall oder gar Angriff auf die dabei eingesetzten digitalen Lösungen kann jedoch im Extremfall zu Produktionsausfällen und Versorgungsengpässen führen. Im neuen Verbundvorhaben „AgriRegio – Infrastruktur zur Förderung von digitaler Resilienz und Klimaresilienz im ländlichen Raum am Beispiel der Pilotregion Nahe-Donnersberg“ wird jetzt ein innovatives Konzept für dezentrales und resilientes Edge Computing zur Praxisreife entwickelt und erprobt. Damit soll die digitalisierte Datenerfassung und -nutzung in landwirtschaftlichen Betrieben widerstandsfähiger gemacht und die sicherheitskritische Infrastruktur auf dem Sektor Ernährung geschützt werden. Das Bundesministerium für Ernährung und Landwirtschaft (BMEL) fördert AgriRegio für zwei Jahre (1.1.2022 – 31.12.2023) mit einem Gesamtvolumen von ca. 800.000 Euro.

    Ziel des Projekts AgriRegio ist es zu zeigen, dass sich auf regionaler Ebene ein flächendeckendes und vom Internet unabhängiges Sensornetz mithilfe von aktuellen, standardisierten Technologien des Edge Computings etablieren lässt. Beim Edge Computing werden digital erfasste Daten dezentral verarbeitet. Die in der Landwirtschaft eingesetzten smarten Sensoren sollen sich dabei an einen kostengünstigen Miniserver („HofBox“) zur lokalen Speicherung von Betriebsdaten, Geodaten und Fachinformationen anbinden lassen. Landwirte können so eigene IoT-Sensornetze im überbetrieblichen Verbund betreiben. Das Konzept wird im Rahmen einer öffentlich-privaten Partnerschaft unter Einbeziehung von regionalen Erzeugerorganisationen und Gebietskörperschaften in der Pilotregion Nahe-Donnersberg in Rheinland-Pfalz getestet. AgriRegio wird technologisch flankiert durch die vom BMEL geförderten Projekte GeoBox-Infrastruktur und Experimentierfeld-Südwest am  Dienstleistungszentrum Ländlicher Raum Rheinland-Pfalz.

    Koordiniert wird das Verbundprojekt vom Lehrstuhl Wissenschaft und Technik für Frieden und Sicherheit (PEASEC) am Fachbereich Informatik der Technischen Universität Darmstadt. Weitere Partner sind IBM Deutschland GmbH, expeer GmbH, RLP AgroScience, der Maschinen- und Betriebshilfsring Rheinhessen-Nahe-Donnersberg e.V. sowie die Kreisverwaltungen Donnersbergkreis und Bad Kreuznach. Durch den Open-Source-Ansatz des Verbundprojektes wird die flächendeckende Einführung der bereits entwickelten, sensorgestützten HofBox unterstützt. Die in AgriRegio geplante experimentelle Operationalisierung einer resilienten, digitalen Infrastruktur bei Internetausfällen schließt sowohl Erzeugerorganisationen als auch die in Krisenfällen zuständigen Gebietskörperschaften bzw. Landkreise in eine regional ausgerichtete Digitalisierung der Landwirtschaft ein, die durch den Aufbau smarter Sensornetzwerke zudem die Umsetzung von umwelt- und klimaschonenden Bewirtschaftungs- und Logistikmaßnahmen sogar auf überbetrieblicher Ebene fördert. Dieser gesellschaftlich relevante regionale Ansatz von AgriRegio ist offen für eine herstellerübergreifende Beteiligung der IT-Branche und wird insbesondere für die etablierten Anbieter verwundbarer Cloudlösungen von zunehmender Relevanz bei der Digitalisierung der Landwirtschaft als Teil der kritischen Infrastruktur.

    Weitere Informationen zum Projekt finden Sie unter https://peasec.de/projekte/agriregio/

    2024

  • Franz Kuntke, Marc-André Kaufhold, Sebastian Linsner, Christian Reuter (2024)
    GeoBox: Design and Evaluation of a Tool for Resilient and Decentralized Data Management in Agriculture
    Behaviour & Information Technology (BIT) ;43(4):764–786. doi:10.1080/0144929X.2023.2185747
    [BibTeX] [Abstract] [Download PDF]

    Farm Management Information Systems (FMIS) are an important core component of modern farming companies as they allow, e.g., to document activities, create fertilization plans, and feed digital equipment with required data. Since the entire agricultural sector is an essential component of food production, high standards of resilience should be established in the involved companies. Accordingly, the used software should also be designed with high standards on reliability and crisis capability. Based on a literature review, we found that software for farmers with certain resilience needs is lacking. Thus, we designed and evaluated a new FMIS concept with the user-centered design method. By conducting focus groups (two rounds, total N=57) in 2017 and 2019, we raised specific front-end and back-end requirements of farmers. Based on the requirements, we developed our concept for both front- and back-end in terms of a decentralized and offline-working FMIS. Through the evaluation with practitioners (N=16) of the implemented concept, we derived findings and implications, highlighting the need for privacy, stability, and offline-capability, as well as the UI-requirement to be supportive, e.g., with easy to understand icons and terms.

    @article{kuntke_geobox_2024,
    title = {{GeoBox}: {Design} and {Evaluation} of a {Tool} for {Resilient} and {Decentralized} {Data} {Management} in {Agriculture}},
    volume = {43},
    issn = {0144-929X},
    url = {https://peasec.de/paper/2023/2023_KuntkeKaufholdLinsnerReuter_GeoBox_BIT.pdf},
    doi = {10.1080/0144929X.2023.2185747},
    abstract = {Farm Management Information Systems (FMIS) are an important core component of modern farming companies as they allow, e.g., to document activities, create fertilization plans, and feed digital equipment with required data. Since the entire agricultural sector is an essential component of food production, high standards of resilience should be established in the involved companies. Accordingly, the used software should also be designed with high standards on reliability and crisis capability. Based on a literature review, we found that software for farmers with certain resilience needs is lacking. Thus, we designed and evaluated a new FMIS concept with the user-centered design method. By conducting focus groups (two rounds, total N=57) in 2017 and 2019, we raised specific front-end and back-end requirements of farmers. Based on the requirements, we developed our concept for both front- and back-end in terms of a decentralized and offline-working FMIS. Through the evaluation with practitioners (N=16) of the implemented concept, we derived findings and implications, highlighting the need for privacy, stability, and offline-capability, as well as the UI-requirement to be supportive, e.g., with easy to understand icons and terms.},
    number = {4},
    journal = {Behaviour \& Information Technology (BIT)},
    author = {Kuntke, Franz and Kaufhold, Marc-André and Linsner, Sebastian and Reuter, Christian},
    month = mar,
    year = {2024},
    note = {Publisher: Taylor \& Francis},
    keywords = {UsableSec, Security, A-Paper, Ranking-ImpactFactor, Ranking-CORE-A, AuswahlUsableSec, Projekt-GeoBox, Projekt-AgriRegio},
    pages = {764--786},
    }

  • Daniel Eberz-Eder, Franz Kuntke, Christian Reuter, Ansgar Bernardi, Ahmad Kadi, Gerwin Brill, Daniel Martini, Benno Kleinhenz (2024)
    Hybrid Cloud Infrastrukturen – Edge Computng und KI-basierte Anwendungen in der Landwirtschaft für resiliente und effektive Produktions- und Biodiversitätsmaßnahmen
    44. GIL-Jahrestagung: Informatik in der Land-, Forst- und Ernährungswirtschaft .
    [BibTeX] [Abstract]

    Mobile Erhebung semantisch modellierter Daten und deren Auswertung im Feld durch Hybrid Cloud Computing sind Grundlage des Resilienten Smart Farmings im Projekt GeoBox. Eine skalierbare Architektur und semantische Datenmodellierung ermöglichen Management betrieblicher Software-Container, flexible Anpassung an neue Aufgaben, und die Realisierung einfach nutzbarer externer Services, vorgestellt am Beispiel eines Resistenz-Beratungs-Chatbots und von Blühstreifen als Biodiversitätsmaßnahme.

    @inproceedings{eberz-eder_hybrid_2024,
    title = {Hybrid {Cloud} {Infrastrukturen} - {Edge} {Computng} und {KI}-basierte {Anwendungen} in der {Landwirtschaft} für resiliente und effektive {Produktions}- und {Biodiversitätsmaßnahmen}},
    abstract = {Mobile Erhebung semantisch modellierter Daten und deren Auswertung im Feld durch Hybrid Cloud Computing sind Grundlage des Resilienten Smart Farmings im Projekt GeoBox. Eine skalierbare Architektur und semantische Datenmodellierung ermöglichen Management betrieblicher Software-Container, flexible Anpassung an neue Aufgaben, und die Realisierung einfach nutzbarer externer Services, vorgestellt am Beispiel eines Resistenz-Beratungs-Chatbots und von Blühstreifen als Biodiversitätsmaßnahme.},
    booktitle = {44. {GIL}-{Jahrestagung}: {Informatik} in der {Land}-, {Forst}- und {Ernährungswirtschaft}},
    publisher = {Gesellschaft für Informatik},
    author = {Eberz-Eder, Daniel and Kuntke, Franz and Reuter, Christian and Bernardi, Ansgar and Kadi, Ahmad and Brill, Gerwin and Martini, Daniel and Kleinhenz, Benno},
    year = {2024},
    keywords = {UsableSec, Security, RSF, Projekt-GeoBox, Projekt-AgriRegio},
    }

    2023

  • Daniel Eberz-Eder, Franz Kuntke, Gerwin Brill, Ansgar Bernardi, Christian Wied, Philippe Nuderscher, Christian Reuter (2023)
    Prototypische Entwicklungen zur Umsetzung des Resilient Smart Farming (RSF) mittels Edge Computing
    43. GIL-Jahrestagung: Informatik in der Land-, Forst- und Ernährungswirtschaft .
    [BibTeX] [Abstract] [Download PDF]

    Landwirtschaft als essenzieller Teil der Nahrungsmittelproduktion gehört zu den kritischen Infrastrukturen (KRITIS). Dementsprechend müssen die eingesetzten Systeme für einen widerstandsfähigen Betrieb ausgelegt sein. Dies gilt auch für die auf landwirtschaftlichen Betrieben eingesetzte Software, die Sicherheits- und Resilienzkriterien genügen muss. Jedoch ist die Zunahme an Software zu beobachten, welche eine permanente Internetkonnektivität erfordert, d. h. eine stabile Verbindung zu Servern oder Cloud-Applikationen ist für deren Funktionsweise erforderlich. Dies stellt eine erhebliche Schwachstelle hinsichtlich der Resilienz dar und kann bei Ausfällen der Telekommunikationsinfrastruktur zu großen Problemen führen. Mit Entwicklungen aus dem Bereich Resilient Smart Farming (RSF) zeigen wir, wie Datenhaltung nach dem Offline-First-Prinzip gestaltet werden kann. Ein zentraler Bestandteil hierbei ist das Resilient Edge Computing (REC) und die entwickelte HofBox: ein Mini-Server, der das Datenmanagement im Betrieb übernimmt und mittels innovativer Open-Source basierender Container-Technologie (Open Horizon) umsetzt. Dadurch werden in Zukunft weitere Anwendungsfälle innerhalb der landwirtschaftlichen Produktions- und Wertschöpfungskette durch Public-Private-Partnership-Modelle realistisch und realisierbar.

    @inproceedings{eberz-eder_prototypische_2023,
    title = {Prototypische {Entwicklungen} zur {Umsetzung} des {Resilient} {Smart} {Farming} ({RSF}) mittels {Edge} {Computing}},
    url = {https://dl.gi.de/handle/20.500.12116/40264},
    abstract = {Landwirtschaft als essenzieller Teil der Nahrungsmittelproduktion gehört zu den kritischen Infrastrukturen (KRITIS). Dementsprechend müssen die eingesetzten Systeme für einen widerstandsfähigen Betrieb ausgelegt sein. Dies gilt auch für die auf landwirtschaftlichen Betrieben eingesetzte Software, die Sicherheits- und Resilienzkriterien genügen muss. Jedoch ist die Zunahme an Software zu beobachten, welche eine permanente Internetkonnektivität erfordert, d. h. eine stabile Verbindung zu Servern oder Cloud-Applikationen ist für deren Funktionsweise erforderlich. Dies stellt eine erhebliche Schwachstelle hinsichtlich der Resilienz dar und kann bei Ausfällen der Telekommunikationsinfrastruktur zu großen Problemen führen. Mit Entwicklungen aus dem Bereich Resilient Smart Farming (RSF) zeigen wir, wie Datenhaltung nach dem Offline-First-Prinzip gestaltet werden kann. Ein zentraler Bestandteil hierbei ist das Resilient Edge Computing (REC) und die entwickelte HofBox: ein Mini-Server, der das Datenmanagement im Betrieb übernimmt und mittels innovativer Open-Source basierender Container-Technologie (Open Horizon) umsetzt. Dadurch werden in Zukunft weitere Anwendungsfälle innerhalb der landwirtschaftlichen Produktions- und Wertschöpfungskette durch Public-Private-Partnership-Modelle realistisch und realisierbar.},
    booktitle = {43. {GIL}-{Jahrestagung}: {Informatik} in der {Land}-, {Forst}- und {Ernährungswirtschaft}},
    publisher = {Gesellschaft für Informatik},
    author = {Eberz-Eder, Daniel and Kuntke, Franz and Brill, Gerwin and Bernardi, Ansgar and Wied, Christian and Nuderscher, Philippe and Reuter, Christian},
    year = {2023},
    keywords = {UsableSec, Security, RSF, Projekt-GeoBox, Projekt-AgriRegio},
    pages = {309--314},
    }

  • Franz Kuntke, Lars Baumgärtner, Christian Reuter (2023)
    Rural Communication in Outage Scenarios: Disruption-Tolerant Networking via LoRaWAN Setups
    Proceedings of Information Systems for Crisis Response and Management (ISCRAM) .
    [BibTeX] [Abstract] [Download PDF]

    Since communications infrastructure is subject to many impacts, e.g., destructive natural events, they can potentially collapse at any time. Especially in rural areas, the recovery of public network infrastructure can take some time, so a dedicated communication channel would be advantageous. We explore the possibility of transforming commodity LoRaWAN gateways into meshed network nodes for a digital emergency communication channel. In order to obtain the required parameters, we collected farm locations in Germany with OpenStreetMap. Based on the assumptions of LoRa communication range and considering our use case requirements, connecting farm communities seems theoretically feasible in many areas of our data set. To further analyze our idea, we ran simulations of two common DTN routing protocols with different scenarios. A proof-of-concept implementation allows smaller messages to be transmitted using real hardware and demonstrates that a decentralized communications infrastructure based on commodity hardware is possible.

    @inproceedings{kuntke_rural_2023,
    title = {Rural {Communication} in {Outage} {Scenarios}: {Disruption}-{Tolerant} {Networking} via {LoRaWAN} {Setups}},
    url = {https://idl.iscram.org/files/kuntke/2023/2581_Kuntke_etal2023.pdf},
    abstract = {Since communications infrastructure is subject to many impacts, e.g., destructive natural events, they can potentially collapse at any time. Especially in rural areas, the recovery of public network infrastructure can take some time, so a dedicated communication channel would be advantageous. We explore the possibility of transforming commodity LoRaWAN gateways into meshed network nodes for a digital emergency communication channel. In order to obtain the required parameters, we collected farm locations in Germany with OpenStreetMap. Based on the assumptions of LoRa communication range and considering our use case requirements, connecting farm communities seems theoretically feasible in many areas of our data set. To further analyze our idea, we ran simulations of two common DTN routing protocols with different scenarios. A proof-of-concept implementation allows smaller messages to be transmitted using real hardware and demonstrates that a decentralized communications infrastructure based on commodity hardware is possible.},
    booktitle = {Proceedings of {Information} {Systems} for {Crisis} {Response} and {Management} ({ISCRAM})},
    author = {Kuntke, Franz and Baumgärtner, Lars and Reuter, Christian},
    year = {2023},
    keywords = {Crisis, Security, RSF, Projekt-MAKI, Projekt-GeoBox, Projekt-emergenCITY, Projekt-AgriRegio},
    pages = {1--13},
    }

  • Franz Kuntke, Merve Bektas, Laura Buhleier, Ella Pohl, Rebekka Schiller, Christian Reuter (2023)
    How Would Emergency Communication Based on LoRaWAN Perform? Empirical Findings of Signal Propagation in Rural Areas
    Proceedings of Information Systems for Crisis Response and Management (ISCRAM) .
    [BibTeX] [Abstract] [Download PDF]

    Low Power Wide Area Network (LPWAN) technologies are typically promoted for Internet-of-Things (IoT) applications, but are also of interest for emergency communications systems when regular fixed and mobile networks break down. Although LoRaWAN is a frequently used representative here, there are sometimes large differences between the proposed range and the results of some practical evaluations. Since previous work has focused on urban environments or has conducted simulations, this work aims to gather concrete knowledge on the transmission characteristics in rural environments. Extensive field studies with varying geographic conditions and comparative tests in urban environments were performed using two different hardware implementations. Overall, it was found that the collected values in rural areas are significantly lower than the theoretical values. Nevertheless, the results certify that LoRaWAN technology has a high range that cannot be achieved with other common technologies for emergency communications.

    @inproceedings{kuntke_how_2023,
    title = {How {Would} {Emergency} {Communication} {Based} on {LoRaWAN} {Perform}? {Empirical} {Findings} of {Signal} {Propagation} in {Rural} {Areas}},
    url = {https://idl.iscram.org/files/kuntke/2023/2586_Kuntke_etal2023.pdf},
    abstract = {Low Power Wide Area Network (LPWAN) technologies are typically promoted for Internet-of-Things (IoT) applications, but are also of interest for emergency communications systems when regular fixed and mobile networks break down. Although LoRaWAN is a frequently used representative here, there are sometimes large differences between the proposed range and the results of some practical evaluations. Since previous work has focused on urban environments or has conducted simulations, this work aims to gather concrete knowledge on the transmission characteristics in rural environments. Extensive field studies with varying geographic conditions and comparative tests in urban environments were performed using two different hardware implementations. Overall, it was found that the collected values in rural areas are significantly lower than the theoretical values. Nevertheless, the results certify that LoRaWAN technology has a high range that cannot be achieved with other common technologies for emergency communications.},
    booktitle = {Proceedings of {Information} {Systems} for {Crisis} {Response} and {Management} ({ISCRAM})},
    author = {Kuntke, Franz and Bektas, Merve and Buhleier, Laura and Pohl, Ella and Schiller, Rebekka and Reuter, Christian},
    year = {2023},
    keywords = {Crisis, Student, RSF, Projekt-GeoBox, Projekt-AgriRegio},
    pages = {1--8},
    }

  • Denis Orlov, Franz Kuntke, Christian Reuter (2023)
    Optimierte Messenger-Applikation zur Notfallkommunikation via LoRaWAN-DTN
    In: : INFORMATIK 2023 – Designing Futures: Zukünfte gestalten. Gesellschaft für Informatik e. V., , 1–6. doi:10.18420/inf2023_160
    [BibTeX] [Abstract] [Download PDF]

    Die vorliegende Arbeit präsentiert die Entwicklung einer Messenger-App mit Schwerpunkt auf Benutzerfreundlichkeit, für die Nutzung mit einem bestehenden LoRaWAN-DTN-Backend. Die App ermöglicht den Austausch von Nachrichten mit anderen Personen über ein vorhandenes Kommunikationssystem auf LoRaWAN-Basis. Das grundlegende Softwaregerüst wurde mithilfe agiler Softwareentwicklungsmethoden als Progressive-Web-App entwickelt und iterativ verbessert. Das Ergebnis ist eine plattformübergreifende App für Desktop-PCs und Android-Smartphones. Die App bietet grundlegende Messenger-Funktionen wie Kontaktverwaltung, Chatverlauf-Speicher und Benachrichtigungen. Zusätzlich enthält die App erweiterte Funktionen wie einen leicht zugänglichen SOS-Button, um Notfallnachrichten schnell absetzen zu können. Ziel der Entwicklung war es, die Gebrauchstauglichkeit gegenüber einem ersten Prototyp zu verbessern. Die App soll effektive Kommunikation zwischen Helfern und Betroffenen ermöglichen, während und nach Krisenereignissen wie beispielsweise der europäischen Flutkatastrophe 2021. In folgenden Arbeiten soll das System unter Nutzung dieser App im Einsatz getestet werden.

    @incollection{orlov_optimierte_2023,
    title = {Optimierte {Messenger}-{Applikation} zur {Notfallkommunikation} via {LoRaWAN}-{DTN}},
    url = {https://peasec.de/paper/2023/2023_OrlovKuntkeReuter_OptimierteMessengerApplikation_GI.pdf},
    abstract = {Die vorliegende Arbeit präsentiert die Entwicklung einer Messenger-App mit Schwerpunkt auf Benutzerfreundlichkeit, für die Nutzung mit einem bestehenden LoRaWAN-DTN-Backend. Die App ermöglicht den Austausch von Nachrichten mit anderen Personen über ein vorhandenes Kommunikationssystem auf LoRaWAN-Basis. Das grundlegende Softwaregerüst wurde mithilfe agiler Softwareentwicklungsmethoden als Progressive-Web-App entwickelt und iterativ verbessert. Das Ergebnis ist eine plattformübergreifende App für Desktop-PCs und Android-Smartphones. Die App bietet grundlegende Messenger-Funktionen wie Kontaktverwaltung, Chatverlauf-Speicher und Benachrichtigungen. Zusätzlich enthält die App erweiterte Funktionen wie einen leicht zugänglichen SOS-Button, um Notfallnachrichten schnell absetzen zu können. Ziel der Entwicklung war es, die Gebrauchstauglichkeit gegenüber einem ersten Prototyp zu verbessern. Die App soll effektive Kommunikation zwischen Helfern und Betroffenen ermöglichen, während und nach Krisenereignissen wie beispielsweise der europäischen Flutkatastrophe 2021. In folgenden Arbeiten soll das System unter Nutzung dieser App im Einsatz getestet werden.},
    booktitle = {{INFORMATIK} 2023 - {Designing} {Futures}: {Zukünfte} gestalten},
    publisher = {Gesellschaft für Informatik e. V.},
    author = {Orlov, Denis and Kuntke, Franz and Reuter, Christian},
    year = {2023},
    doi = {10.18420/inf2023_160},
    keywords = {Crisis, Student, RSF, Projekt-AgriRegio},
    pages = {1--6},
    }

  • Jonas Franken, Marco Zivkovic, Nadja Thiessen, Jens Ivo Engels, Christian Reuter (2023)
    Das Netz hat Geschichte: Historisch-technische Analyse der kritischen Infrastrukturen in der Region Rhein/Main
    In: : INFORMATIK 2023 – Designing Futures: Zukünfte gestalten. Bonn: Gesellschaft für Informatik e. V., , 1–6. doi:10.18420/inf2023_159
    [BibTeX] [Abstract] [Download PDF]

    Kritische Infrastrukturen sind häufig über Jahrzehnte gewachsene, komplexe Netze. Dennoch fehlt derzeit die historische Perspektive auf die Aufschichtungstendenzen von Technologien in den Sektoren, die für die Gesellschaft essenzielle Dienste bereitstellen. Ein besseres Verständnis von Ausbreitungs-, Ausbau-, Ersatz- und Ausmusterungsprozessen kann Entscheidungshilfe und Orientierung für resilientere Versorgungsnetzarchitekturen in der Zukunft geben. Kompatibilitätsprobleme mit Legacy-Soft- und Hardware sind bekannte Phänomene in vielen KRITIS-Einrichtungen. Entsprechend gewinnen Wissens- und Erfahrungstransfers bei zunehmend komplexen, dennoch über Jahrzehnte verwendete Technologien in landwirtschaftlichen Betrieben enorm an Bedeutung. Der Beitrag vollzieht die Konzeption und Fragestellungen eines interdisziplinären Forschungsprojekts nach, in welchem die Verwundbarkeit der kritischen Infrastruktursektoren Verkehr und Kommunikation im Rhein-Main-Gebiet analysiert wird. Von den Leistungen beider Sektoren hängt die digitale Landwirtschaft stark ab. Insbesondere rurale, beim digitalen und Schienennetzausbau häufig vernachlässigte Gebiete werden dabei mittels explorativer Interviewstudie und anschließender archivbasierter, quantitativer Überprüfung der zuvor generierten Hypothesen aus einer raum-zeitlichen und technischen Perspektive untersucht.

    @incollection{franken_netz_2023,
    address = {Bonn},
    title = {Das {Netz} hat {Geschichte}: {Historisch}-technische {Analyse} der kritischen {Infrastrukturen} in der {Region} {Rhein}/{Main}},
    url = {https://peasec.de/paper/2023/2023_FrankenZivkovicThiessenEngelsReuter_NetzGeschichte_GI.pdf},
    abstract = {Kritische Infrastrukturen sind häufig über Jahrzehnte gewachsene, komplexe Netze. Dennoch fehlt derzeit die historische Perspektive auf die Aufschichtungstendenzen von Technologien in den Sektoren, die für die Gesellschaft essenzielle Dienste bereitstellen. Ein besseres Verständnis von Ausbreitungs-, Ausbau-, Ersatz- und Ausmusterungsprozessen kann Entscheidungshilfe und Orientierung für resilientere Versorgungsnetzarchitekturen in der Zukunft geben. Kompatibilitätsprobleme mit Legacy-Soft- und Hardware sind bekannte Phänomene in vielen KRITIS-Einrichtungen. Entsprechend gewinnen Wissens- und Erfahrungstransfers bei zunehmend komplexen, dennoch über Jahrzehnte verwendete Technologien in landwirtschaftlichen Betrieben enorm an Bedeutung. Der Beitrag vollzieht die Konzeption und Fragestellungen eines interdisziplinären Forschungsprojekts nach, in welchem die Verwundbarkeit der kritischen Infrastruktursektoren Verkehr und Kommunikation im Rhein-Main-Gebiet analysiert wird. Von den Leistungen beider Sektoren hängt die digitale Landwirtschaft stark ab. Insbesondere rurale, beim digitalen und Schienennetzausbau häufig vernachlässigte Gebiete werden dabei mittels explorativer Interviewstudie und anschließender archivbasierter, quantitativer Überprüfung der zuvor generierten Hypothesen aus einer raum-zeitlichen und technischen Perspektive untersucht.},
    booktitle = {{INFORMATIK} 2023 - {Designing} {Futures}: {Zukünfte} gestalten},
    publisher = {Gesellschaft für Informatik e. V.},
    author = {Franken, Jonas and Zivkovic, Marco and Thiessen, Nadja and Engels, Jens Ivo and Reuter, Christian},
    year = {2023},
    doi = {10.18420/inf2023_159},
    keywords = {Security, Infrastructure, Projekt-ATHENE-SecUrban, Projekt-emergenCITY, Projekt-AgriRegio},
    pages = {1--6},
    }

  • Franz Kuntke, Daniel Eberz-Eder, Matthias Trapp, Christian Reuter (2023)
    RSF-Lab’23: Konzepte und Anwendungen zur resilienten digitalen Landwirtschaft
    In: : INFORMATIK 2023 – Designing Futures: Zukünfte gestalten. Bonn: Gesellschaft für Informatik e. V., , 1529–1533. doi:10.18420/inf2023_156
    [BibTeX] [Abstract] [Download PDF]

    Neben positiven Aspekten wie der Produktivitätssteigerung bringt die Digitalisierung auch neue Gefahren mit sich. Entsprechend muss der Prozess gerade in Bereichen von gesellschaftlich enormer Bedeutung kritisch begleitet werden, um eine fundierte Entscheidung bei Auswahl und Entwicklung neuer Technologien zu treffen. Die Vision ist hierbei ein resilientes Smart Farming (RSF), bei dem die Fortschritte der Digitalisierung in der Landwirtschaft genutzt werden, ohne dabei die Ausfallsicherheit der landwirtschaftlichen Primärproduktion und somit die Lebensmittelversorgung der Verbraucher zu gefährden. Dieser Workshop konzentriert sich auf die Bewältigung dieser Forschungsherausforderungen und liefert Beiträge zu verschiedenen Themenbereichen. Dazu gehören (1) ein Hofbox-Ansatz basierend auf etablierten Open-Source Werkzeugen, (2) ein mobiles Assistenzsystem für den Transport von künstlichen Besamungsportionen, (3) die historische Perspektive auf kritische Infrastrukturen in der Region Rhein/Main, und (4) eine Messenger-Applikation zur Notfallkommunikation mittels LoRaWAN-basierten IoT-Setups.

    @incollection{kuntke_rsf-lab23_2023,
    address = {Bonn},
    title = {{RSF}-{Lab}'23: {Konzepte} und {Anwendungen} zur resilienten digitalen {Landwirtschaft}},
    isbn = {978-3-88579-731-9},
    url = {https://peasec.de/paper/2023/2023_KuntkeEberzEderTrappReuter_KonzepteAnwendungen_GI.pdf},
    abstract = {Neben positiven Aspekten wie der Produktivitätssteigerung bringt die Digitalisierung auch neue Gefahren mit sich. Entsprechend muss der Prozess gerade in Bereichen von gesellschaftlich enormer Bedeutung kritisch begleitet werden, um eine fundierte Entscheidung bei Auswahl und Entwicklung neuer Technologien zu treffen. Die Vision ist hierbei ein resilientes Smart Farming (RSF), bei dem die Fortschritte der Digitalisierung in der Landwirtschaft genutzt werden, ohne dabei die Ausfallsicherheit der landwirtschaftlichen Primärproduktion und somit die Lebensmittelversorgung der Verbraucher zu gefährden. Dieser Workshop konzentriert sich auf die Bewältigung dieser Forschungsherausforderungen und liefert Beiträge zu verschiedenen Themenbereichen. Dazu gehören (1) ein Hofbox-Ansatz basierend auf etablierten Open-Source Werkzeugen, (2) ein mobiles Assistenzsystem für den Transport von künstlichen Besamungsportionen, (3) die historische Perspektive auf kritische Infrastrukturen in der Region Rhein/Main, und (4) eine Messenger-Applikation zur Notfallkommunikation mittels LoRaWAN-basierten IoT-Setups.},
    booktitle = {{INFORMATIK} 2023 - {Designing} {Futures}: {Zukünfte} gestalten},
    publisher = {Gesellschaft für Informatik e. V.},
    author = {Kuntke, Franz and Eberz-Eder, Daniel and Trapp, Matthias and Reuter, Christian},
    year = {2023},
    doi = {10.18420/inf2023_156},
    keywords = {Security, RSF, Projekt-AgriRegio},
    pages = {1529--1533},
    }

  • Daniel Schmidt, Franz Kuntke, Maximilian Bauer, Lars Baumgärtner (2023)
    BPoL: A Disruption-Tolerant LoRa Network for Disaster Communication
    IEEE Global Humanitarian Technology Conference (GHTC) . doi:10.1109/GHTC56179.2023.10354717
    [BibTeX] [Abstract] [Download PDF]

    Information and Communication Technology (ICT) is vital for everyday life and especially during times of disaster.Relying on existing infrastructure is problematic as maintenance is expensive, and they can be disrupted in emergency scenarios. Cost is a major factor which limits the technologies that can be used in rural areas or for emergency response, as satellite uplinks or private cellular networks are very expensive and complex. LoRa is commonly used for IoT infrastructure worldwide in the form of LoRaWAN to cover larger distances with low costs. But it can also be used in a Device-to-Device (D2D) mode for direct communication. By combining LoRa with Disruption-tolerant Networking (DTN), we present an affordable and practical solution that can cope with challenging conditions and be used for a large variety of applications. In our evaluation, we show how adaptable our solution is and how it outperforms similar mesh-based applications for disaster communication.

    @inproceedings{schmidt_bpol_2023,
    title = {{BPoL}: {A} {Disruption}-{Tolerant} {LoRa} {Network} for {Disaster} {Communication}},
    url = {https://peasec.de/paper/2023/2023_SchmidtKuntkeBauerBaumgaertner_BPOL_GHTC.pdf},
    doi = {10.1109/GHTC56179.2023.10354717},
    abstract = {Information and Communication Technology (ICT) is vital for everyday life and especially during times of disaster.Relying on existing infrastructure is problematic as maintenance is expensive, and they can be disrupted in emergency scenarios. Cost is a major factor which limits the technologies that can be used in rural areas or for emergency response, as satellite uplinks or private cellular networks are very expensive and complex. LoRa is commonly used for IoT infrastructure worldwide in the form of LoRaWAN to cover larger distances with low costs. But it can also be used in a Device-to-Device (D2D) mode for direct communication. By combining LoRa with Disruption-tolerant Networking (DTN), we present an affordable and practical solution that can cope with challenging conditions and be used for a large variety of applications. In our evaluation, we show how adaptable our solution is and how it outperforms similar mesh-based applications for disaster communication.},
    booktitle = {{IEEE} {Global} {Humanitarian} {Technology} {Conference} ({GHTC})},
    author = {Schmidt, Daniel and Kuntke, Franz and Bauer, Maximilian and Baumgärtner, Lars},
    year = {2023},
    keywords = {UsableSec, Security, Projekt-GeoBox, Projekt-AgriRegio},
    pages = {440--447},
    }

  • Jonas Franken, Franziska Schneider, Christian Reuter (2023)
    The Internet’s Plumbing Consists of Garden Hoses: A Critical Analysis of the Advantages and Pitfalls of Metaphors Use for Critical Maritime Infrastructures
    Dreizack 23 Kiel.
    [BibTeX] [Download PDF]

    @inproceedings{franken_internets_2023,
    address = {Kiel},
    title = {The {Internet}’s {Plumbing} {Consists} of {Garden} {Hoses}: {A} {Critical} {Analysis} of the {Advantages} and {Pitfalls} of {Metaphors} {Use} for {Critical} {Maritime} {Infrastructures}},
    url = {https://peasec.de/paper/2023/2023_FrankenSchneiderReuter_MetaphernMarKRITIS_Dreizack23.pdf},
    booktitle = {Dreizack 23},
    publisher = {The Kiel Seapower Series},
    author = {Franken, Jonas and Schneider, Franziska and Reuter, Christian},
    editor = {Schilling, Henrik},
    year = {2023},
    keywords = {Security, Peace, Projekt-ATHENE-SecUrban, Projekt-AgriRegio, Projekt-NetzGeschichte},
    pages = {1--8},
    }

    2022

  • Jonas Franken, Thomas Reinhold, Lilian Reichert, Christian Reuter (2022)
    The Digital Divide in State Vulnerability to Submarine Communications Cable Failure
    International Journal of Critical Infrastructure Protection (IJCIP) ;38(100522):1–15. doi:10.1016/j.ijcip.2022.100522
    [BibTeX] [Abstract] [Download PDF]

    The backbone network of submarine communication cables (SCC) carries 98\% of international internet traffic. Coastal and island states strongly depend on this physical internet infrastructure to provide internet connectivity. Although about 100 SCC breakdowns of human or natural origin occur at yearly average, a literature review reveals that there is no approach to assess individual state vulnerability to SCC failure in global comparison. In this article, the global SCC network is modeled based on publicly available data. Besides the analysis of the global network properties, a focus is put on remaining bandwidth capacities in three different failure scenario simulations of SCC breakdowns. As a result, this study identifies 15 highly vulnerable states and overseas territories, and another 28 territories that are classified as partially vulnerable to SCC failures. Since economic market decisions shape the structure of the SCC network, an uneven distribution of redundancies and the resulting vulnerability of disadvantaged economies can be confirmed. Therefore, the study’s findings may contribute to a better assessment of the necessity of preventive protection measures of critical telecommunication infrastructures in states and territories characterized by high and medium vulnerability.

    @article{franken_digital_2022,
    title = {The {Digital} {Divide} in {State} {Vulnerability} to {Submarine} {Communications} {Cable} {Failure}},
    volume = {38},
    url = {https://peasec.de/paper/2022/2022_FrankenReinholdReichertReuter_DigitalDivideStateVulnerabilitySubmarineCommunicationsCable_IJCIP.pdf},
    doi = {10.1016/j.ijcip.2022.100522},
    abstract = {The backbone network of submarine communication cables (SCC) carries 98\% of international internet traffic. Coastal and island states strongly depend on this physical internet infrastructure to provide internet connectivity. Although about 100 SCC breakdowns of human or natural origin occur at yearly average, a literature review reveals that there is no approach to assess individual state vulnerability to SCC failure in global comparison. In this article, the global SCC network is modeled based on publicly available data. Besides the analysis of the global network properties, a focus is put on remaining bandwidth capacities in three different failure scenario simulations of SCC breakdowns. As a result, this study identifies 15 highly vulnerable states and overseas territories, and another 28 territories that are classified as partially vulnerable to SCC failures. Since economic market decisions shape the structure of the SCC network, an uneven distribution of redundancies and the resulting vulnerability of disadvantaged economies can be confirmed. Therefore, the study's findings may contribute to a better assessment of the necessity of preventive protection measures of critical telecommunication infrastructures in states and territories characterized by high and medium vulnerability.},
    number = {100522},
    journal = {International Journal of Critical Infrastructure Protection (IJCIP)},
    author = {Franken, Jonas and Reinhold, Thomas and Reichert, Lilian and Reuter, Christian},
    year = {2022},
    keywords = {Selected, Student, Security, A-Paper, Ranking-ImpactFactor, AuswahlPeace, Projekt-ATHENE-SecUrban, Projekt-AgriRegio},
    pages = {1--15},
    }

  • Laura Buhleier, Patrick Gantner, Tobias Frey, Michael Boers, Marc-André Kaufhold, Christian Reuter (2022)
    Effizienz und Nachhaltigkeit durch Green-IT: ein systematischer Literaturüberblick im Kontext der Klimakrise
    INFORMATIK 2022: 52. Jahrestagung der Gesellschaft für Informatik – Informatik für Gesellschaft (Workshop-Beiträge), Lecture Notes in Informatics (LNI) Hamburg, Germany. doi:10.18420/inf2022_83
    [BibTeX] [Abstract] [Download PDF]

    Die Klimakrise gehört zu den aktuell größten Herausforderungen unserer Zeit. Informations- und Kommunikationstechnologien (IKT) können hierbei eine entscheidende Rolle spielen. Einerseits, da eine Effizienzsteigerung von oder durch IKT zu einer klimafreundlicheren Nutzung beitragen kann, und andererseits, da IKT zu einem erhöhten Ressourcenverbrauch führen kann. Um diese Thematik weiter zu untersuchen, wird in dieser Arbeit eine systematische Literaturrecherche durchgeführt, um Herausforderungen und Potenziale in der Adressierung der Klimakrise durch eine effiziente und nachhaltige Entwicklung des IKT-Sektors zu analysieren. Die dabei untersuchte Literatur beinhaltet Herausforderungen wie zum Beispiel den hohen Energie- und Materialverbrauch der IKT-Geräte und Datenzentren sowie die entstehenden Entsorgungskosten und das Konsumverhalten der Nutzer*innen. Deswegen sollten die Nutzer*innen mehr Informationen zur Wartung, zum Kauf gebrauchter Geräte, und zum Recyceln/Entsorgen erhalten. Die Analyse lieferte aber auch viele Potenziale. Durch IKT können Effizienzsteigerungen in den Bereich Industrie, Landwirtschaft, Verkehr und Transport erreicht und auch umweltschädliche Geräte substituiert werden. Durch diese Potenziale kann es aber, wie in anderen Bereichen, zu einem Rebound-Effekt kommen.

    @inproceedings{buhleier_effizienz_2022,
    address = {Hamburg, Germany},
    title = {Effizienz und {Nachhaltigkeit} durch {Green}-{IT}: ein systematischer {Literaturüberblick} im {Kontext} der {Klimakrise}},
    isbn = {978-3-88579-720-3},
    url = {https://dl.gi.de/bitstream/handle/20.500.12116/39590/rsflab_06.pdf?sequence=1&isAllowed=y},
    doi = {10.18420/inf2022_83},
    abstract = {Die Klimakrise gehört zu den aktuell größten Herausforderungen unserer Zeit. Informations- und Kommunikationstechnologien (IKT) können hierbei eine entscheidende Rolle spielen. Einerseits, da eine Effizienzsteigerung von oder durch IKT zu einer klimafreundlicheren Nutzung beitragen kann, und andererseits, da IKT zu einem erhöhten Ressourcenverbrauch führen kann. Um diese Thematik weiter zu untersuchen, wird in dieser Arbeit eine systematische Literaturrecherche durchgeführt, um Herausforderungen und Potenziale in der Adressierung der Klimakrise durch eine effiziente und nachhaltige Entwicklung des IKT-Sektors zu analysieren. Die dabei untersuchte Literatur beinhaltet Herausforderungen wie zum Beispiel den hohen Energie- und Materialverbrauch der IKT-Geräte und Datenzentren sowie die entstehenden Entsorgungskosten und das Konsumverhalten der Nutzer*innen. Deswegen sollten die Nutzer*innen mehr Informationen zur Wartung, zum Kauf gebrauchter Geräte, und zum Recyceln/Entsorgen erhalten. Die Analyse lieferte aber auch viele Potenziale. Durch IKT können Effizienzsteigerungen in den Bereich Industrie, Landwirtschaft, Verkehr und Transport erreicht und auch umweltschädliche Geräte substituiert werden. Durch diese Potenziale kann es aber, wie in anderen Bereichen, zu einem Rebound-Effekt kommen.},
    language = {de},
    booktitle = {{INFORMATIK} 2022: 52. {Jahrestagung} der {Gesellschaft} für {Informatik} – {Informatik} für {Gesellschaft} ({Workshop}-{Beiträge}), {Lecture} {Notes} in {Informatics} ({LNI})},
    publisher = {Gesellschaft für Informatik e. V.},
    author = {Buhleier, Laura and Gantner, Patrick and Frey, Tobias and Boers, Michael and Kaufhold, Marc-André and Reuter, Christian},
    editor = {Demmler, D. and Krupka, D. and Federrath, H.},
    year = {2022},
    keywords = {Student, Ranking-CORE-C, Ranking-VHB-C, Security, Projekt-GeoBox, Projekt-AgriRegio},
    pages = {995--1012},
    }

  • Christian Reuter, Franz Kuntke, Matthias Trapp, Christian Wied, Gerwin Brill, Georg Müller, Enno Steinbrink, Jonas Franken, Daniel Eberz-Eder, Wolfgang Schneider (2022)
    AgriRegio: Infrastruktur zur Förderung von digitaler Resilienz und Klimaresilienz im ländlichen Raum am Beispiel der Pilotregion Nahe-Donnersberg
    INFORMATIK 2022: 52. Jahrestagung der Gesellschaft für Informatik – Informatik für Gesellschaft (Workshop-Beiträge), Lecture Notes in Informatics (LNI) Hamburg, Germany. doi:10.18420/inf2022_81
    [BibTeX] [Abstract] [Download PDF]

    Die Digitalisierung schreitet auch in der Landwirtschaft immer weiter voran. Vermehrt werden in landwirtschaftlichen Betrieben sogenannte Smart Farming-Technologien eingesetzt, mit deren Hilfe verschiedenste Arbeitsabläufe automatisiert ablaufen, kontrolliert werden und mit anderen Betrieben ausgetauscht werden können. Durch die verfügbaren Daten und die Vernetzung mit anderen Betrieben, ergeben sich vielfältige neue Möglichkeiten in Bezug auf ressourcenschonendes, wirtschaftlicheres und kollaboratives Arbeiten. Problematiken ergeben sich mit Blick auf die Speicherung dieser sensiblen Betriebsdaten, vor allem, wenn hierfür nur einige wenige Anbieter zur Verfügung stehen. Das Forschungsprojekt „AgriRegio“ soll die digitalisierte Datenerfassung und -nutzung in landwirtschaftlichen Betrieben widerstandsfähiger machen und die sicherheitskritische Infrastruktur schützen. Sieben Projektpartner erproben dazu smarte Sensoren auf Basis standardisierter Open-Source-Technologien in der Landwirtschaft, bei denen die Betriebsdaten dezentral auf lokalen Servern gespeichert werden.

    @inproceedings{reuter_agriregio_2022,
    address = {Hamburg, Germany},
    title = {{AgriRegio}: {Infrastruktur} zur {Förderung} von digitaler {Resilienz} und {Klimaresilienz} im ländlichen {Raum} am {Beispiel} der {Pilotregion} {Nahe}-{Donnersberg}},
    isbn = {978-3-88579-720-3},
    url = {https://dl.gi.de/bitstream/handle/20.500.12116/39588/rsflab_04.pdf?sequence=1&isAllowed=y},
    doi = {10.18420/inf2022_81},
    abstract = {Die Digitalisierung schreitet auch in der Landwirtschaft immer weiter voran. Vermehrt werden in landwirtschaftlichen Betrieben sogenannte Smart Farming-Technologien eingesetzt, mit deren Hilfe verschiedenste Arbeitsabläufe automatisiert ablaufen, kontrolliert werden und mit anderen Betrieben ausgetauscht werden können. Durch die verfügbaren Daten und die Vernetzung mit anderen Betrieben, ergeben sich vielfältige neue Möglichkeiten in Bezug auf ressourcenschonendes, wirtschaftlicheres und kollaboratives Arbeiten. Problematiken ergeben sich mit Blick auf die Speicherung dieser sensiblen Betriebsdaten, vor allem, wenn hierfür nur einige wenige Anbieter zur Verfügung stehen. Das Forschungsprojekt „AgriRegio“ soll die digitalisierte Datenerfassung und -nutzung in landwirtschaftlichen Betrieben widerstandsfähiger machen und die sicherheitskritische Infrastruktur schützen. Sieben Projektpartner erproben dazu smarte Sensoren auf Basis standardisierter Open-Source-Technologien in der Landwirtschaft, bei denen die Betriebsdaten dezentral auf lokalen Servern gespeichert werden.},
    language = {de},
    booktitle = {{INFORMATIK} 2022: 52. {Jahrestagung} der {Gesellschaft} für {Informatik} – {Informatik} für {Gesellschaft} ({Workshop}-{Beiträge}), {Lecture} {Notes} in {Informatics} ({LNI})},
    publisher = {Gesellschaft für Informatik e. V.},
    author = {Reuter, Christian and Kuntke, Franz and Trapp, Matthias and Wied, Christian and Brill, Gerwin and Müller, Georg and Steinbrink, Enno and Franken, Jonas and Eberz-Eder, Daniel and Schneider, Wolfgang},
    editor = {Demmler, D. and Krupka, D. and Federrath, H.},
    year = {2022},
    keywords = {Ranking-CORE-C, Ranking-VHB-C, UsableSec, Security, RSF, Projekt-AgriRegio},
    pages = {961--972},
    }

  • Christian Reuter, Daniel Eberz-Eder, Franz Kuntke, Matthias Trapp (2022)
    RSF-Lab’22: Resilient Smart Farming Laboratory: Für eine widerstandsfähige und intelligente Landwirtschaft
    INFORMATIK 2022: 52. Jahrestagung der Gesellschaft für Informatik – Informatik für Gesellschaft (Workshop-Beiträge), Lecture Notes in Informatics (LNI) Hamburg, Germany. doi:10.18420/inf2022_78
    [BibTeX] [Abstract] [Download PDF]

    Die zunehmende Vernetzung und Digitalisierung bringen große Veränderungen aber auch Vulnerabilitäten auf allen Ebenen mit sich. Um eine Infrastruktur für ein resilientes Smart Farming (RSF) zu erstellen, welche die Fortschritte der Digitalisierung in der Landwirtschaft nutzt, ohne die Ausfallsicherheit der landwirtschaftlichen Primärproduktion und damit die Lebensmittelversorgung der Verbraucher zu gefährden, bedarf speziell der Sicherheitsaspekt einer kritischen Auseinandersetzung. Der Workshop adressiert diese Forschungsherausforderungen durch Beiträge zu einem umfassenden Monitoring für den Transport von künstlichen Besamungsdosen, zu modularer, sicherer und robuster Steuerungsarchitektur für autonomes Bewirtschaften von Weinbergen, zur Resilienz im ländlichen Raum, zum Aufbau eines informellen Netzwerkes zur Förderung der Digitalisierung in der Landwirtschaft und zu Effizienz und Nachhaltigkeit durch Green-IT.

    @inproceedings{reuter_rsf-lab22_2022,
    address = {Hamburg, Germany},
    title = {{RSF}-{Lab}’22: {Resilient} {Smart} {Farming} {Laboratory}: {Für} eine widerstandsfähige und intelligente {Landwirtschaft}},
    isbn = {978-3-88579-720-3},
    url = {https://dl.gi.de/bitstream/handle/20.500.12116/39585/rsflab_01.pdf?sequence=1&isAllowed=y},
    doi = {10.18420/inf2022_78},
    abstract = {Die zunehmende Vernetzung und Digitalisierung bringen große Veränderungen aber auch Vulnerabilitäten auf allen Ebenen mit sich. Um eine Infrastruktur für ein resilientes Smart Farming (RSF) zu erstellen, welche die Fortschritte der Digitalisierung in der Landwirtschaft nutzt, ohne die Ausfallsicherheit der landwirtschaftlichen Primärproduktion und damit die Lebensmittelversorgung der Verbraucher zu gefährden, bedarf speziell der Sicherheitsaspekt einer kritischen Auseinandersetzung. Der Workshop adressiert diese Forschungsherausforderungen durch Beiträge zu einem umfassenden Monitoring für den Transport von künstlichen Besamungsdosen, zu modularer, sicherer und robuster Steuerungsarchitektur für autonomes Bewirtschaften von Weinbergen, zur Resilienz im ländlichen Raum, zum Aufbau eines informellen Netzwerkes zur Förderung der Digitalisierung in der Landwirtschaft und zu Effizienz und Nachhaltigkeit durch Green-IT.},
    language = {de},
    booktitle = {{INFORMATIK} 2022: 52. {Jahrestagung} der {Gesellschaft} für {Informatik} – {Informatik} für {Gesellschaft} ({Workshop}-{Beiträge}), {Lecture} {Notes} in {Informatics} ({LNI})},
    publisher = {Gesellschaft für Informatik e. V.},
    author = {Reuter, Christian and Eberz-Eder, Daniel and Kuntke, Franz and Trapp, Matthias},
    editor = {Demmler, D. and Krupka, D. and Federrath, H.},
    year = {2022},
    keywords = {Security, RSF, Projekt-AgriRegio},
    pages = {931--934},
    }

  • Sebastian Linsner, Enno Steinbrink, Franz Kuntke, Jonas Franken, Christian Reuter (2022)
    Supporting Users in Data Disclosure Scenarios in Agriculture through Transparency
    Behaviour & Information Technology (BIT) ;41(10):2137–2159. doi:10.1080/0144929X.2022.2068070
    [BibTeX] [Abstract] [Download PDF]

    Business collaboration in the era of digital transformation requires the exchange of operational data. Since data are hardly controllable once they have been published or shared with others, it is highly important that users are clearly informed about who has access to which data and how certain settings can prevent the disclosure of sensitive data. However, giving end users more control over their data through increased transparency could also lead to information overload. This is particularly true in the field of agriculture, where tight schedules put pressure on employees of small enterprises. We conduct an empirical prestudy with 52 German farmers to investigate current data sharing scenarios. From these insights, we derive requirements and a concept for data sharing solutions providing data flow transparency for users. To investigate the behavior of users and the effects of transparent UI controls, we evaluate a prototype with 18 persons. Our evaluation shows that farmers demand flexible and secure tools that adjust to their workflows. Also, data should be stored and processed locally, granting farmers data sovereignty. Although the controls require additional effort, the evaluated transparent controls for data disclosure are easy to use and raise user awareness.

    @article{linsner_supporting_2022,
    title = {Supporting {Users} in {Data} {Disclosure} {Scenarios} in {Agriculture} through {Transparency}},
    volume = {41},
    url = {http://www.peasec.de/paper/2022/2022_LinsnerSteinbrinkKuntkeFrankenReuter_SupportingDataDisclosureScenariosAgriculture_BIT.pdf},
    doi = {10.1080/0144929X.2022.2068070},
    abstract = {Business collaboration in the era of digital transformation requires the exchange of operational data. Since data are hardly controllable once they have been published or shared with others, it is highly important that users are clearly informed about who has access to which data and how certain settings can prevent the disclosure of sensitive data. However, giving end users more control over their data through increased transparency could also lead to information overload. This is particularly true in the field of agriculture, where tight schedules put pressure on employees of small enterprises. We conduct an empirical prestudy with 52 German farmers to investigate current data sharing scenarios. From these insights, we derive requirements and a concept for data sharing solutions providing data flow transparency for users. To investigate the behavior of users and the effects of transparent UI controls, we evaluate a prototype with 18 persons. Our evaluation shows that farmers demand flexible and secure tools that adjust to their workflows. Also, data should be stored and processed locally, granting farmers data sovereignty. Although the controls require additional effort, the evaluated transparent controls for data disclosure are easy to use and raise user awareness.},
    number = {10},
    journal = {Behaviour \& Information Technology (BIT)},
    author = {Linsner, Sebastian and Steinbrink, Enno and Kuntke, Franz and Franken, Jonas and Reuter, Christian},
    year = {2022},
    keywords = {UsableSec, Security, A-Paper, Ranking-ImpactFactor, Ranking-CORE-A, RSF, Projekt-GRKPrivacy, Projekt-HyServ, Projekt-AgriRegio},
    pages = {2137--2159},
    }

  • Franz Kuntke, Vladimir Romanenko, Sebastian Linsner, Enno Steinbrink, Christian Reuter (2022)
    LoRaWAN Security Issues and Mitigation Options by the Example of Agricultural IoT Scenarios
    Transactions on Emerging Telecommunications Technologies (ETT) ;33(5):e4452. doi:10.1002/ett.4452
    [BibTeX] [Abstract] [Download PDF]

    The Internet of Things (IoT) is a major trend that is seen as a great opportunity to improve efficiency in many domains, including agriculture. This technology could transform the sector, improving the management and quality of agricultural operations, for example, crop farming. The most promising data transmission standard for this domain seems to be Long Range Wide Area Network (LoRaWAN), a popular representative of low power wide area network technologies today. LoRaWAN, like any wireless protocol, has properties that can be exploited by attackers, which has been a topic of multiple research papers in recent years. By conducting a systematic literature review, we build a recent list of attacks, as well as collect mitigation options. Taking a look at a concrete use case (IoT in agriculture) allows us to evaluate the practicality of both exploiting the vulnerabilities and implementing the countermeasures. We detected 16 attacks that we grouped into six attack types. Along with the attacks, we collect countermeasures for attack mitigation. Developers can use our findings to minimize the risks when developing applications based on LoRaWAN. These mostly theoretical security recommendations should encourage future works to evaluate the mitigations in practice.

    @article{kuntke_lorawan_2022,
    title = {{LoRaWAN} {Security} {Issues} and {Mitigation} {Options} by the {Example} of {Agricultural} {IoT} {Scenarios}},
    volume = {33},
    issn = {2161-3915},
    url = {https://www.peasec.de/paper/2022/2022_KuntkeRomanenkoLinsnerSteinbrinkReuter_LoRaWANsecurityAgriculture_ETT.pdf},
    doi = {10.1002/ett.4452},
    abstract = {The Internet of Things (IoT) is a major trend that is seen as a great opportunity to improve efficiency in many domains, including agriculture. This technology could transform the sector, improving the management and quality of agricultural operations, for example, crop farming. The most promising data transmission standard for this domain seems to be Long Range Wide Area Network (LoRaWAN), a popular representative of low power wide area network technologies today. LoRaWAN, like any wireless protocol, has properties that can be exploited by attackers, which has been a topic of multiple research papers in recent years. By conducting a systematic literature review, we build a recent list of attacks, as well as collect mitigation options. Taking a look at a concrete use case (IoT in agriculture) allows us to evaluate the practicality of both exploiting the vulnerabilities and implementing the countermeasures. We detected 16 attacks that we grouped into six attack types. Along with the attacks, we collect countermeasures for attack mitigation. Developers can use our findings to minimize the risks when developing applications based on LoRaWAN. These mostly theoretical security recommendations should encourage future works to evaluate the mitigations in practice.},
    number = {5},
    journal = {Transactions on Emerging Telecommunications Technologies (ETT)},
    author = {Kuntke, Franz and Romanenko, Vladimir and Linsner, Sebastian and Steinbrink, Enno and Reuter, Christian},
    month = may,
    year = {2022},
    keywords = {Student, Security, A-Paper, Ranking-ImpactFactor, RSF, Projekt-GeoBox, Projekt-GRKPrivacy, Projekt-HyServ, Projekt-AgriRegio},
    pages = {e4452},
    }

  • Franz Kuntke, Sebastian Linsner, Enno Steinbrink, Jonas Franken, Christian Reuter (2022)
    Resilience in Agriculture: Communication and Energy Infrastructure Dependencies of German Farmers
    International Journal of Disaster Risk Science (IJDRS) ;13(2):214–229. doi:10.1007/s13753-022-00404-7
    [BibTeX] [Abstract] [Download PDF]

    Agriculture is subject to high demands regarding resilience as it is an essential component of the food production chain. In the agricultural sector, there is an increasing usage of digital tools that rely on communication and energy infrastructures. Should disruption occur, such strengthened dependencies on other infrastructures increase the probability of ripple effects. Thus, there is a need to analyze the resilience of the agricultural sector with a specific focus on the effects of digitalization. This study works out resilience capacities of the interconnected technologies used in farm systems based on the experiences and opinions of farmers. Information was gathered through focus group interviews with farmers (N = 52) and a survey with participants from the agricultural sector (N = 118). In particular, the focus is put on the digital tools and other information and communication technologies they use. Based on a definition of resilience capacities, we evaluate resilience regarding energy and communication demands in various types of farm systems. Especially important are the resilience aspects of modern systems’ digital communication as well as the poorly developed and nonresilient network infrastructure in rural areas that contrast with the claim for a resilient agriculture. The result is a low robustness capacity, as our analysis concludes with the risk of food production losses.

    @article{kuntke_resilience_2022,
    title = {Resilience in {Agriculture}: {Communication} and {Energy} {Infrastructure} {Dependencies} of {German} {Farmers}},
    volume = {13},
    issn = {2192-6395},
    url = {https://link.springer.com/article/10.1007/s13753-022-00404-7},
    doi = {10.1007/s13753-022-00404-7},
    abstract = {Agriculture is subject to high demands regarding resilience as it is an essential component of the food production chain. In the agricultural sector, there is an increasing usage of digital tools that rely on communication and energy infrastructures. Should disruption occur, such strengthened dependencies on other infrastructures increase the probability of ripple effects. Thus, there is a need to analyze the resilience of the agricultural sector with a specific focus on the effects of digitalization. This study works out resilience capacities of the interconnected technologies used in farm systems based on the experiences and opinions of farmers. Information was gathered through focus group interviews with farmers (N = 52) and a survey with participants from the agricultural sector (N = 118). In particular, the focus is put on the digital tools and other information and communication technologies they use. Based on a definition of resilience capacities, we evaluate resilience regarding energy and communication demands in various types of farm systems. Especially important are the resilience aspects of modern systems’ digital communication as well as the poorly developed and nonresilient network infrastructure in rural areas that contrast with the claim for a resilient agriculture. The result is a low robustness capacity, as our analysis concludes with the risk of food production losses.},
    number = {2},
    journal = {International Journal of Disaster Risk Science (IJDRS)},
    author = {Kuntke, Franz and Linsner, Sebastian and Steinbrink, Enno and Franken, Jonas and Reuter, Christian},
    month = apr,
    year = {2022},
    keywords = {Selected, Security, A-Paper, Ranking-ImpactFactor, Ranking-CORE-B, RSF, Projekt-GeoBox, Projekt-GRKPrivacy, Projekt-HyServ, Projekt-AgriRegio},
    pages = {214--229},
    }

  • Daniel Eberz-Eder, Franz Kuntke, Christian Reuter (2022)
    Sensibilität für Resilient Smart Farming (RSF) und seine Bedeutung in Krisenzeiten
    42. GIL-Jahrestagung: Informatik in der Land-, Forst- und Ernährungswirtschaft Tänikon, Switzerland.
    [BibTeX] [Abstract] [Download PDF]

    Mit der globalen COVID-19-Pandemie und dem Hochwasser in West- und Mitteleuropa im Sommer 2021 hat unter anderem Deutschland in jüngster Vergangenheit zwei schwerwiegende Krisenszenarien erlebt. Die Auswirkungen auf die Gesellschaft und Wirtschaft sind verheerend. Parallel lassen sich Krisenereignisse im digitalen Raum, wie die Zunahme an Cyberkriminalität beobachten. Es wird zunehmend deutlich, dass die Resilienz analoger sowie digitaler Prozesse wichtiger für die vollständige Betriebsfähigkeit wird. Die vorliegende Arbeit setzt sich mit der Bedeutung des Resilient Smart Farming (RSF) in Krisenzeiten als Möglichkeit für eine nachhaltige, umweltgerechte und resiliente digitale Landwirtschaft auseinander. Dazu wurden u.a. lokale Schadensmeldungen gruppiert und mögliche RSF-Gegenmaßnahmen aufgezeigt. Im Ergebnis zeigt sich eine Bewertung von Konzepten des RSF hinsichtlich der Krisenprävention und -bewältigung anhand aktueller realer Beispiele. Aufgrund zunehmender Bedrohungen durch Naturkatastrophen und Cyberkriminialität gehen wir davon aus, dass die Aufmerksamkeit von Gesellschaft und Politik für die Resilienz der Primärproduktion weiter steigen wird.

    @inproceedings{eberz-eder_sensibilitat_2022,
    address = {Tänikon, Switzerland},
    title = {Sensibilität für {Resilient} {Smart} {Farming} ({RSF}) und seine {Bedeutung} in {Krisenzeiten}},
    url = {https://peasec.de/paper/2022/2022_EberzEderKuntkeReuter_SensibilitaetResilientSmartFarmingKrisen_GIL.pdf},
    abstract = {Mit der globalen COVID-19-Pandemie und dem Hochwasser in West- und Mitteleuropa im Sommer 2021 hat unter anderem Deutschland in jüngster Vergangenheit zwei schwerwiegende Krisenszenarien erlebt. Die Auswirkungen auf die Gesellschaft und Wirtschaft sind verheerend. Parallel lassen sich Krisenereignisse im digitalen Raum, wie die Zunahme an Cyberkriminalität beobachten. Es wird zunehmend deutlich, dass die Resilienz analoger sowie digitaler Prozesse wichtiger für die vollständige Betriebsfähigkeit wird. Die vorliegende Arbeit setzt sich mit der Bedeutung des Resilient Smart Farming (RSF) in Krisenzeiten als Möglichkeit für eine nachhaltige, umweltgerechte und resiliente digitale Landwirtschaft auseinander. Dazu wurden u.a. lokale Schadensmeldungen gruppiert und mögliche RSF-Gegenmaßnahmen aufgezeigt. Im Ergebnis zeigt sich eine Bewertung von Konzepten des RSF hinsichtlich der Krisenprävention und -bewältigung anhand aktueller realer Beispiele. Aufgrund zunehmender Bedrohungen durch Naturkatastrophen und Cyberkriminialität gehen wir davon aus, dass die Aufmerksamkeit von Gesellschaft und Politik für die Resilienz der Primärproduktion weiter steigen wird.},
    booktitle = {42. {GIL}-{Jahrestagung}: {Informatik} in der {Land}-, {Forst}- und {Ernährungswirtschaft}},
    publisher = {Gesellschaft für Informatik},
    author = {Eberz-Eder, Daniel and Kuntke, Franz and Reuter, Christian},
    year = {2022},
    keywords = {Crisis, Projekt-GeoBox, Projekt-AgriRegio},
    }

    CYWARN: Analyse und Kommunikation des Lagebilds im Cyberraum (1.10.2020-31.3.2024, BMBF)

    CYWARN: Analyse und Kommunikation des Lagebilds im Cyberraum (1.10.2020-31.3.2024, BMBF)

    https://cywarn.peasec.de

    Die Zunahme komplexer Cyberangriffe, wie die Hackerangriffe auf den Deutschen Bundestag (2015) oder auf das Lukaskrankenhaus in Neuss (2016), verdeutlichen die Verletzbarkeit der Gesellschaft und Informationsinfrastruktur. Neben Technologien zur Informations- und IT-Sicherheit braucht es Frühwarnsysteme und Reaktionsstrategien zur Stärkung der zivilen Sicherheit. Sogenannte Computer Emergency Response Teams (CERTs) sind die zentrale Anlaufstelle für präventive und reaktive Maßnahmen bei IT-Sicherheitsvorfällen. Aufgrund der unüber-sichtlichen Informationslage bei Cyberangriffen ist die Auswertung und zielgruppengerechte Aufbereitung der Vorfälle für diese Teams eine große Herausforderung.

    Das Projekt CYWARN verfolgt das Ziel, CERTs durch neue Strategien und Technologien bei der Analyse und Kommunikation des Cyber-Lagebilds zu unterstützen. Es entsteht ein Demonstrator, der die automatisierte Sammlung öffentlicher und geschlossener Datenquellen sowie eine Datenauswertung mit Glaubwürdigkeitsanalyse und Informationspriorisierung ermöglicht. Durch den hohen Grad an Automatisierung werden die Teams durch den Demonstrator darin befähigt, effizienter Cyberbedrohungen zu erkennen, zu analysieren und zu kommunizieren. Die Ergebnisse fließen in Handlungsempfehlungen, Sensibilisierungsmaßnahmen, Lageberichte und Warnmeldungen ein, die dann von den Teams für die adressatengerechte Kommunikation mit der Bevölkerung, Behörden oder KRITIS-Betreibern verwendet werden. Akzeptanz und Anwenderfreundlichkeit werden bei der Entwicklung ebenso berücksichtigt, wie ethische, rechtliche und soziale Rahmenbedingungen. Langfristig ist ein Einsatz auch bei anderen Behörden und Organisationen mit Sicherheitsaufgaben oder Unternehmen, die ein eigenes CERT betreiben, denkbar.

    Projektumriss_CYWARN

    2024

  • Marc-André Kaufhold, Thea Riebe, Markus Bayer, Christian Reuter (2024)
    ‚We Do Not Have the Capacity to Monitor All Media‘: A Design Case Study on Cyber Situational Awareness in Computer Emergency Response Teams
    Proceedings of the Conference on Human Factors in Computing Systems (CHI) .
    [BibTeX] [Abstract]

    Computer Emergency Response Teams (CERTs) have been established in the public sector globally to provide advisory, preventive and reactive cybersecurity services for government agencies, citizens, and businesses. Nevertheless, their responsibility of monitoring, analyzing, and communicating cyber threats and security vulnerabilities have become increasingly challenging due to the growing volume and varying quality of information disseminated through public and social channels. Based on a design case study conducted from 2021 to 2023, this paper combines three iterations of expert interviews (N=25), design workshops (N=4) and cognitive walkthroughs (N=25) to design an automated, cross-platform and real-time cybersecurity dashboard. By adopting the notion of cyber situational awareness, the study further extracts user requirements and design heuristics for enhanced threat intelligence and mission awareness in CERTs, discussing the aspects of source integration, data management, customizable visualization, relationship awareness, information assessment, software integration, (inter-)organizational collaboration, and communication of stakeholder warnings.

    @inproceedings{kaufhold_we_2024,
    series = {{CHI} '24},
    title = {'{We} {Do} {Not} {Have} the {Capacity} to {Monitor} {All} {Media}': {A} {Design} {Case} {Study} on {Cyber} {Situational} {Awareness} in {Computer} {Emergency} {Response} {Teams}},
    abstract = {Computer Emergency Response Teams (CERTs) have been established in the public sector globally to provide advisory, preventive and reactive cybersecurity services for government agencies, citizens, and businesses. Nevertheless, their responsibility of monitoring, analyzing, and communicating cyber threats and security vulnerabilities have become increasingly challenging due to the growing volume and varying quality of information disseminated through public and social channels. Based on a design case study conducted from 2021 to 2023, this paper combines three iterations of expert interviews (N=25), design workshops (N=4) and cognitive walkthroughs (N=25) to design an automated, cross-platform and real-time cybersecurity dashboard. By adopting the notion of cyber situational awareness, the study further extracts user requirements and design heuristics for enhanced threat intelligence and mission awareness in CERTs, discussing the aspects of source integration, data management, customizable visualization, relationship awareness, information assessment, software integration, (inter-)organizational collaboration, and communication of stakeholder warnings.},
    booktitle = {Proceedings of the {Conference} on {Human} {Factors} in {Computing} {Systems} ({CHI})},
    publisher = {Association for Computing Machinery},
    author = {Kaufhold, Marc-André and Riebe, Thea and Bayer, Markus and Reuter, Christian},
    year = {2024},
    keywords = {HCI, Selected, UsableSec, Security, A-Paper, Ranking-CORE-A*, Projekt-CYWARN, AuswahlUsableSec, AuswahlKaufhold, Projekt-CYLENCE, Projekt-ATHENE-CyAware},
    }

  • Markus Bayer, Philipp Kuehn, Ramin Shanehsaz, Christian Reuter (2024)
    CySecBERT: A Domain-Adapted Language Model for the Cybersecurity Domain
    ACM Transactions on Privacy and Security .
    [BibTeX] [Abstract]

    The field of cybersecurity is evolving fast. Security professionals are in need of intelligence on past, current and – ideally – on upcoming threats, because attacks are becoming more advanced and are increasingly targeting larger and more complex systems. Since the processing and analysis of such large amounts of information cannot be addressed manually, cybersecurity experts rely on machine learning techniques. In the textual domain, pre-trained language models like BERT have proven to be helpful as they provide a good baseline for further fine-tuning. However, due to the domain-knowledge and the many technical terms in cybersecurity, general language models might miss the gist of textual information. For this reason, we create a high-quality dataset and present a language model specifically tailored to the cybersecurity domain which can serve as a basic building block for cybersecurity systems. The model is compared on 15 tasks: Domain-dependent extrinsic tasks for measuring the performance on specific problems, intrinsic tasks for measuring the performance of the internal representations of the model as well as general tasks from the SuperGLUE benchmark. The results of the intrinsic tasks show that our model improves the internal representation space of domain words compared to the other models. The extrinsic, domain-dependent tasks, consisting of sequence tagging and classification, show that the model performs best in cybersecurity scenarios. In addition, we pay special attention to the choice of hyperparameters against catastrophic forgetting, as pre-trained models tend to forget the original knowledge during further training.

    @article{bayer_cysecbert_2024,
    title = {{CySecBERT}: {A} {Domain}-{Adapted} {Language} {Model} for the {Cybersecurity} {Domain}},
    abstract = {The field of cybersecurity is evolving fast. Security professionals are in need of intelligence on past, current and - ideally - on upcoming threats, because attacks are becoming more advanced and are increasingly targeting larger and more complex systems. Since the processing and analysis of such large amounts of information cannot be addressed manually, cybersecurity experts rely on machine learning techniques. In the textual domain, pre-trained language models like BERT have proven to be helpful as they provide a good baseline for further fine-tuning. However, due to the domain-knowledge and the many technical terms in cybersecurity, general language models might miss the gist of textual information. For this reason, we create a high-quality dataset and present a language model specifically tailored to the cybersecurity domain which can serve as a basic building block for cybersecurity systems. The model is compared on 15 tasks: Domain-dependent extrinsic tasks for measuring the performance on specific problems, intrinsic tasks for measuring the performance of the internal representations of the model as well as general tasks from the SuperGLUE benchmark. The results of the intrinsic tasks show that our model improves the internal representation space of domain words compared to the other models. The extrinsic, domain-dependent tasks, consisting of sequence tagging and classification, show that the model performs best in cybersecurity scenarios. In addition, we pay special attention to the choice of hyperparameters against catastrophic forgetting, as pre-trained models tend to forget the original knowledge during further training.},
    journal = {ACM Transactions on Privacy and Security},
    author = {Bayer, Markus and Kuehn, Philipp and Shanehsaz, Ramin and Reuter, Christian},
    year = {2024},
    keywords = {Projekt-ATHENE-CyAware, Projekt-CYLENCE, Projekt-CYWARN, Ranking-CORE-A, Ranking-ImpactFactor, Security, Student, UsableSec},
    }

    2023

  • Philipp Kuehn, Mike Schmidt, Markus Bayer, Christian Reuter (2023)
    ThreatCrawl: A BERT-based Focused Crawler for the Cybersecurity Domain
    2023.
    [BibTeX] [Abstract] [Download PDF]

    Publicly available information contains valuable information for Cyber Threat Intelligence (CTI). This can be used to prevent attacks that have already taken place on other systems. Ideally, only the initial attack succeeds and all subsequent ones are detected and stopped. But while there are different standards to exchange this information, a lot of it is shared in articles or blog posts in non-standardized ways. Manually scanning through multiple online portals and news pages to discover new threats and extracting them is a time-consuming task. To automize parts of this scanning process, multiple papers propose extractors that use Natural Language Processing (NLP) to extract Indicators of Compromise (IOCs) from documents. However, while this already solves the problem of extracting the information out of documents, the search for these documents is rarely considered. In this paper, a new focused crawler is proposed called ThreatCrawl, which uses Bidirectional Encoder Representations from Transformers (BERT)-based models to classify documents and adapt its crawling path dynamically. While ThreatCrawl has difficulties to classify the specific type of Open Source Intelligence (OSINT) named in texts, e.g., IOC content, it can successfully find relevant documents and modify its path accordingly. It yields harvest rates of up to 52\%, which are, to the best of our knowledge, better than the current state of the art.

    @techreport{kuehn_threatcrawl_2023,
    title = {{ThreatCrawl}: {A} {BERT}-based {Focused} {Crawler} for the {Cybersecurity} {Domain}},
    shorttitle = {{ThreatCrawl}},
    url = {http://arxiv.org/abs/2304.11960},
    abstract = {Publicly available information contains valuable information for Cyber Threat Intelligence (CTI). This can be used to prevent attacks that have already taken place on other systems. Ideally, only the initial attack succeeds and all subsequent ones are detected and stopped. But while there are different standards to exchange this information, a lot of it is shared in articles or blog posts in non-standardized ways. Manually scanning through multiple online portals and news pages to discover new threats and extracting them is a time-consuming task. To automize parts of this scanning process, multiple papers propose extractors that use Natural Language Processing (NLP) to extract Indicators of Compromise (IOCs) from documents. However, while this already solves the problem of extracting the information out of documents, the search for these documents is rarely considered. In this paper, a new focused crawler is proposed called ThreatCrawl, which uses Bidirectional Encoder Representations from Transformers (BERT)-based models to classify documents and adapt its crawling path dynamically. While ThreatCrawl has difficulties to classify the specific type of Open Source Intelligence (OSINT) named in texts, e.g., IOC content, it can successfully find relevant documents and modify its path accordingly. It yields harvest rates of up to 52\%, which are, to the best of our knowledge, better than the current state of the art.},
    number = {arXiv:2304.11960},
    urldate = {2023-04-27},
    institution = {arXiv},
    author = {Kuehn, Philipp and Schmidt, Mike and Bayer, Markus and Reuter, Christian},
    month = apr,
    year = {2023},
    note = {arXiv:2304.11960 [cs]},
    keywords = {Student, Security, Projekt-ATHENE-SecUrban, Projekt-CYWARN},
    }

  • Thea Riebe (2023)
    Technology Assessment of Dual-Use ICTs – How to assess Diffusion, Governance and Design
    Darmstadt, Germany: Dissertation (Dr. rer. nat.), Department of Computer Science, Technische Universität Darmstadt. doi:10.26083/tuprints-00022849
    [BibTeX] [Abstract] [Download PDF]

    Technologies that can be used in military and civilian applications are referred to as dual-use. The dual-use nature of many information and communications technologies (ICTs) raises new questions for research and development for national, international, and human security. Measures to deal with the risks associated with the various dual-use technologies, including proliferation control, design approaches, and policy measures, vary widely. For example, Autonomous Weapon Systems (AWS) have not yet been regulated, while cryptographic products are subject to export and import controls. Innovations in artificial intelligence (AI), robotics, cybersecurity, and automated analysis of publicly available data raise new questions about their respective dual-use risks. Dual-use risks have been systematically discussed so far, especially in the life sciences, which have contributed to the development of methods for assessment and risk management. Dual-use risks arise, among other things, from the fact that safety-critical technologies can be easily disseminated or modified, as well as used as part of a weapon system. Therefore, the development and adaptation of robots and software requires an independent consideration that builds on the insights of related dual-use discourses. Therefore, this dissertation considers the management of such risks in terms of the proliferation, regulation, and design of individual dual-use information technologies. Technology Assessment (TA) is the epistemological framework for this work, bringing together the concepts and approaches of Critical Security Studies (CSS) and Human-Computer Interaction (HCI) to help evaluate and shape dual-use technologies. In order to identify the diffusion of dual-use at an early stage, the dissertation first examines the diffusion of dual-use innovations between civilian and military research in expert networks on LinkedIn, as well as on the basis of AI patents in a patent network. The results show low diffusion and tend to confirm existing studies on diffusion in patent networks. In the following section, the regulation of dual-use technologies is examined in the paper through two case studies. The first study uses a discourse analysis to show the value conflicts with regard to the regulation of autonomous weapons systems using the concept of Meaningful Human Control (MHC), while a second study, as a long-term comparative case study, analyzes the change and consequences of the regulation of strong cryptography in the U.S. as well as the programs of intelligence agencies for mass surveillance. Both cases point to the central role of private companies, both in the production of AWS and as intermediaries for the dissemination of encryption, as well as surveillance intermediaries. Subsequently, the dissertation examines the design of a dual-use technology using an Open Source Intelligence System (OSINT) for cybersecurity. For this purpose, conceptual, empirical, and technical studies are conducted as part of the Value-Sensitive Design (VSD) framework. During the studies, implications for research on and design of OSINT were identified. For example, the representative survey of the German population has shown that transparency of use while reducing mistrust is associated with higher acceptance of such systems. Additionally, it has been shown that data sparsity through the use of expert networks has many positive effects, not only improving the performance of the system, but is also preferable for legal and social reasons. Thus, the work contributes to the understanding of specific dual-use risks of AI, the regulation of AWS and cryptography, and the design of OSINT in cybersecurity. By combining concepts from CSS and participatory design methods in HCI, this work provides an interdisciplinary and multi-method contribution.

    @book{riebe_technology_2023,
    address = {Darmstadt, Germany},
    title = {Technology {Assessment} of {Dual}-{Use} {ICTs} – {How} to assess {Diffusion}, {Governance} and {Design}},
    url = {https://tuprints.ulb.tu-darmstadt.de/22849/},
    abstract = {Technologies that can be used in military and civilian applications are referred to as dual-use. The dual-use nature of many information and communications technologies (ICTs) raises new questions for research and development for national, international, and human security. Measures to deal with the risks associated with the various dual-use technologies, including proliferation control, design approaches, and policy measures, vary widely. For example, Autonomous Weapon Systems (AWS) have not yet been regulated, while cryptographic products are subject to export and import controls. Innovations in artificial intelligence (AI), robotics, cybersecurity, and automated analysis of publicly available data raise new questions about their respective dual-use risks.
    Dual-use risks have been systematically discussed so far, especially in the life sciences, which have contributed to the development of methods for assessment and risk management. Dual-use risks arise, among other things, from the fact that safety-critical technologies can be easily disseminated or modified, as well as used as part of a weapon system. Therefore, the development and adaptation of robots and software requires an independent consideration that builds on the insights of related dual-use discourses. Therefore, this dissertation considers the management of such risks in terms of the proliferation, regulation, and design of individual dual-use information technologies. Technology Assessment (TA) is the epistemological framework for this work, bringing together the concepts and approaches of Critical Security Studies (CSS) and Human-Computer Interaction (HCI) to help evaluate and shape dual-use technologies.
    In order to identify the diffusion of dual-use at an early stage, the dissertation first examines the diffusion of dual-use innovations between civilian and military research in expert networks on LinkedIn, as well as on the basis of AI patents in a patent network. The results show low diffusion and tend to confirm existing studies on diffusion in patent networks. In the following section, the regulation of dual-use technologies is examined in the paper through two case studies. The first study uses a discourse analysis to show the value conflicts with regard to the regulation of autonomous weapons systems using the concept of Meaningful Human Control (MHC), while a second study, as a long-term comparative case study, analyzes the change and consequences of the regulation of strong cryptography in the U.S. as well as the programs of intelligence agencies for mass surveillance. Both cases point to the central role of private companies, both in the production of AWS and as intermediaries for the dissemination of encryption, as well as surveillance intermediaries. Subsequently, the dissertation examines the design of a dual-use technology using an Open Source Intelligence System (OSINT) for cybersecurity. For this purpose, conceptual, empirical, and technical studies are conducted as part of the Value-Sensitive Design (VSD) framework. During the studies, implications for research on and design of OSINT were identified. For example, the representative survey of the German population has shown that transparency of use while reducing mistrust is associated with higher acceptance of such systems. Additionally, it has been shown that data sparsity through the use of expert networks has many positive effects, not only improving the performance of the system, but is also preferable for legal and social reasons. Thus, the work contributes to the understanding of specific dual-use risks of AI, the regulation of AWS and cryptography, and the design of OSINT in cybersecurity. By combining concepts from CSS and participatory design methods in HCI, this work provides an interdisciplinary and multi-method contribution.},
    publisher = {Dissertation (Dr. rer. nat.), Department of Computer Science, Technische Universität Darmstadt},
    author = {Riebe, Thea},
    year = {2023},
    doi = {10.26083/tuprints-00022849},
    keywords = {HCI, Projekt-KontiKat, Peace, Projekt-DualUse, Projekt-CYWARN, Dissertation},
    }

  • Markus Bayer, Marc-André Kaufhold, Christian Reuter (2023)
    A Survey on Data Augmentation for Text Classification
    ACM Computing Surveys (CSUR) ;55(7):1–39. doi:10.1145/3544558
    [BibTeX] [Abstract] [Download PDF]

    Data augmentation, the artificial creation of training data for machine learning by transformations, is a widely studied research field across machine learning disciplines. While it is useful for increasing a model’s generalization capabilities, it can also address many other challenges and problems, from overcoming a limited amount of training data, to regularizing the objective, to limiting the amount data used to protect privacy. Based on a precise description of the goals and applications of data augmentation and a taxonomy for existing works, this survey is concerned with data augmentation methods for textual classification and aims to provide a concise and comprehensive overview for researchers and practitioners. Derived from the taxonomy, we divide more than 100 methods into 12 different groupings and give state-of-the-art references expounding which methods are highly promising by relating them to each other. Finally, research perspectives that may constitute a building block for future work are provided.

    @article{bayer_survey_2023,
    title = {A {Survey} on {Data} {Augmentation} for {Text} {Classification}},
    volume = {55},
    url = {https://dl.acm.org/doi/pdf/10.1145/3544558},
    doi = {10.1145/3544558},
    abstract = {Data augmentation, the artificial creation of training data for machine learning by transformations, is a widely studied research field across machine learning disciplines. While it is useful for increasing a model's generalization capabilities, it can also address many other challenges and problems, from overcoming a limited amount of training data, to regularizing the objective, to limiting the amount data used to protect privacy. Based on a precise description of the goals and applications of data augmentation and a taxonomy for existing works, this survey is concerned with data augmentation methods for textual classification and aims to provide a concise and comprehensive overview for researchers and practitioners. Derived from the taxonomy, we divide more than 100 methods into 12 different groupings and give state-of-the-art references expounding which methods are highly promising by relating them to each other. Finally, research perspectives that may constitute a building block for future work are provided.},
    number = {7},
    journal = {ACM Computing Surveys (CSUR)},
    author = {Bayer, Markus and Kaufhold, Marc-André and Reuter, Christian},
    year = {2023},
    keywords = {AuswahlCrisis, Crisis, Selected, A-Paper, Ranking-CORE-A*, Ranking-ImpactFactor, Projekt-ATHENE-SecUrban, Projekt-CYWARN, Projekt-emergenCITY, AuswahlKaufhold},
    pages = {1--39},
    }

  • Marc-André Kaufhold, Christian Reuter, Thomas Ludwig (2023)
    Big Data and Multi-platform Social Media Services in Disaster Management
    In: Amita Singh: International Handbook of Disaster Research. Singapore: Springer Nature Singapore, , 1–21.
    [BibTeX] [Abstract] [Download PDF]

    The use of social media today is not only ubiquitous and an integral part of everyday life but is also increasingly relevant before, during, or after emergencies. Data produced in these contexts, such as situational updates and multimedia content, is disseminated across different social media platforms and can be leveraged by various actors, including emergency services or volunteer communities. However, the dissemination of several thousand or even millions of messages during large-scale emergencies confronts analysts with challenges of information quality and overload. Hence, crisis informatics as a research domain seeks to explore and develop systems that support the collection, analysis, and dissemination of valuable social media information in emergencies. This chapter presents the social media API (SMA), which is a multi-platform service for gathering big social data across different social media channels and analyzing the credibility and relevance of collected data by the means of machine learning models. Based on the lessons learned from both the implementation process and user-centered evaluations in multiple emergency settings, this chapter discusses core challenges and potentials of the SMA and similar services, focusing on (1) the multi-platform gathering and management of data, (2) the mitigation of information overload by relevance assessment and message grouping, (3) the assessment of credibility and information quality, and (4) user-centered tailorability and adjustable data operations.

    @incollection{kaufhold_big_2023,
    address = {Singapore},
    title = {Big {Data} and {Multi}-platform {Social} {Media} {Services} in {Disaster} {Management}},
    isbn = {978-981-16-8800-3},
    url = {https://peasec.de/paper/2023/2023_KaufholdReuterLudwig_BigDataMultiPlatformSocialMediaDisaster_HandbookDisaster.pdf},
    abstract = {The use of social media today is not only ubiquitous and an integral part of everyday life but is also increasingly relevant before, during, or after emergencies. Data produced in these contexts, such as situational updates and multimedia content, is disseminated across different social media platforms and can be leveraged by various actors, including emergency services or volunteer communities. However, the dissemination of several thousand or even millions of messages during large-scale emergencies confronts analysts with challenges of information quality and overload. Hence, crisis informatics as a research domain seeks to explore and develop systems that support the collection, analysis, and dissemination of valuable social media information in emergencies. This chapter presents the social media API (SMA), which is a multi-platform service for gathering big social data across different social media channels and analyzing the credibility and relevance of collected data by the means of machine learning models. Based on the lessons learned from both the implementation process and user-centered evaluations in multiple emergency settings, this chapter discusses core challenges and potentials of the SMA and similar services, focusing on (1) the multi-platform gathering and management of data, (2) the mitigation of information overload by relevance assessment and message grouping, (3) the assessment of credibility and information quality, and (4) user-centered tailorability and adjustable data operations.},
    booktitle = {International {Handbook} of {Disaster} {Research}},
    publisher = {Springer Nature Singapore},
    author = {Kaufhold, Marc-André and Reuter, Christian and Ludwig, Thomas},
    editor = {Singh, Amita},
    year = {2023},
    keywords = {Crisis, HCI, Projekt-KOKOS, Projekt-CYWARN, Projekt-emergenCITY},
    pages = {1--21},
    }

  • Thea Riebe, Julian Bäumler, Marc-André Kaufhold, Christian Reuter (2023)
    Values and Value Conflicts in the Context of OSINT Technologies for Cybersecurity Incident Response: A Value Sensitive Design Perspective
    Computer Supported Cooperative Work: The Journal of Collaborative Computing (JCSCW) . doi:10.1007/s10606-022-09453-4
    [BibTeX] [Abstract] [Download PDF]

    The negotiation of stakeholder values as a collaborative process throughout technology development has been studied extensively within the fields of Computer Supported Cooperative Work and Human-Computer Interaction. Despite their increasing significance for cybersecurity incident response, there is a gap in research on values of importance to the design of open-source intelligence (OSINT) technologies for this purpose. In this paper, we investigate which values and value conflicts emerge due to the application and development of machine learning (ML) based OSINT technologies to assist cyber security incident response operators. For this purpose, we employ a triangulation of methods, consisting of a systematic survey of the technical literature on the development of OSINT artefacts for cybersecurity (N = 73) and an empirical value sensitive design case study, comprising semi-structured interviews with stakeholders (N = 9) as well as a focus group (N = 7) with developers. Based on our results, we identify implications relevant to the research on and design of OSINT artefacts for cybersecurity incident response.

    @article{riebe_values_2023,
    title = {Values and {Value} {Conflicts} in the {Context} of {OSINT} {Technologies} for {Cybersecurity} {Incident} {Response}: {A} {Value} {Sensitive} {Design} {Perspective}},
    url = {https://link.springer.com/article/10.1007/s10606-022-09453-4},
    doi = {10.1007/s10606-022-09453-4},
    abstract = {The negotiation of stakeholder values as a collaborative process throughout technology development has been studied extensively within the fields of Computer Supported Cooperative Work and Human-Computer Interaction. Despite their increasing significance for cybersecurity incident response, there is a gap in research on values of importance to the design of open-source intelligence (OSINT) technologies for this purpose. In this paper, we investigate which values and value conflicts emerge due to the application and development of machine learning (ML) based OSINT technologies to assist cyber security incident response operators. For this purpose, we employ a triangulation of methods, consisting of a systematic survey of the technical literature on the development of OSINT artefacts for cybersecurity (N = 73) and an empirical value sensitive design case study, comprising semi-structured interviews with stakeholders (N = 9) as well as a focus group (N = 7) with developers. Based on our results, we identify implications relevant to the research on and design of OSINT artefacts for cybersecurity incident response.},
    journal = {Computer Supported Cooperative Work: The Journal of Collaborative Computing (JCSCW)},
    author = {Riebe, Thea and Bäumler, Julian and Kaufhold, Marc-André and Reuter, Christian},
    year = {2023},
    keywords = {HCI, Student, UsableSec, Security, A-Paper, Ranking-ImpactFactor, Ranking-CORE-B, Projekt-CROSSING, Projekt-ATHENE-SecUrban, Projekt-CYWARN},
    }

  • Thea Riebe, Tom Biselli, Marc-André Kaufhold, Christian Reuter (2023)
    Privacy Concerns and Acceptance Factors of OSINT for Cybersecurity: A Representative Survey
    Proceedings on Privacy Enhancing Technologies (PoPETs) (1):477–493. doi:https://doi.org/10.56553/popets-2023-0028
    [BibTeX] [Abstract] [Download PDF]

    The use of Open Source Intelligence (OSINT) to monitor and detect cybersecurity threats is gaining popularity among Cybersecurity Emergency or Incident Response Teams (CERTs/CSIRTs). They increasingly use semi-automated OSINT approaches when monitoring cyber threats for public infrastructure services and incident response. Most of the systems use publicly available data, often focusing on social media due to timely data for situational assessment. As indirect and affected stakeholders, the acceptance of OSINT systems by users, as well as the conditions which influence the acceptance, are relevant for the development of OSINT systems for cybersecurity. Therefore, as part of the ethical and social technology assessment, we conducted a survey (N=1,093), in which we asked participants about their acceptance of OSINT systems, their perceived need for open source surveillance, as well as their privacy behavior and concerns. Further, we tested if the awareness of OSINT is an interactive factor that affects other factors. Our results indicate that cyber threat perception and the perceived need for OSINT are positively related to acceptance, while privacy concerns are negatively related. The awareness of OSINT, however, has only shown effects on people with higher privacy concerns. Here, particularly high OSINT awareness and limited privacy concerns were associated with higher OSINT acceptance. Lastly, we provide implications for further research and the use of OSINT systems for cybersecurity by authorities. As OSINT is a framework rather than a single technology, approaches can be selected and combined to adhere to data minimization and anonymization as well as to leverage improvements in privacy-preserving computation and machine learning innovations. Regarding the use of OSINT, the results suggest to favor approaches that provide transparency to users regarding the use of the systems and the data they gather.

    @article{riebe_privacy_2023,
    title = {Privacy {Concerns} and {Acceptance} {Factors} of {OSINT} for {Cybersecurity}: {A} {Representative} {Survey}},
    url = {https://petsymposium.org/popets/2023/popets-2023-0028.pdf},
    doi = {https://doi.org/10.56553/popets-2023-0028},
    abstract = {The use of Open Source Intelligence (OSINT) to monitor and detect cybersecurity threats is gaining popularity among Cybersecurity Emergency or Incident Response Teams (CERTs/CSIRTs). They increasingly use semi-automated OSINT approaches when monitoring cyber threats for public infrastructure services and incident response. Most of the systems use publicly available data, often focusing on social media due to timely data for situational assessment. As indirect and affected stakeholders, the acceptance of OSINT systems by users, as well as the conditions which influence the acceptance, are relevant for the development of OSINT systems for cybersecurity. Therefore, as part of the ethical and social technology assessment, we conducted a survey (N=1,093), in which we asked participants about their acceptance of OSINT systems, their perceived need for open source surveillance, as well as their privacy behavior and concerns. Further, we tested if the awareness of OSINT is an interactive factor that affects other factors. Our results indicate that cyber threat perception and the perceived need for OSINT are positively related to acceptance, while privacy concerns are negatively related. The awareness of OSINT, however, has only shown effects on people with higher privacy concerns. Here, particularly high OSINT awareness and limited privacy concerns were associated with higher OSINT acceptance. Lastly, we provide implications for further research and the use of OSINT systems for cybersecurity by authorities. As OSINT is a framework rather than a single technology, approaches can be selected and combined to adhere to data minimization and anonymization as well as to leverage improvements in privacy-preserving computation and machine learning innovations. Regarding the use of OSINT, the results suggest to favor approaches that provide transparency to users regarding the use of the systems and the data they gather.},
    number = {1},
    journal = {Proceedings on Privacy Enhancing Technologies (PoPETs)},
    author = {Riebe, Thea and Biselli, Tom and Kaufhold, Marc-André and Reuter, Christian},
    year = {2023},
    keywords = {HCI, UsableSec, Security, A-Paper, Ranking-CORE-A, Projekt-CYWARN, Projekt-ATHENE-FANCY, AuswahlUsableSec},
    pages = {477--493},
    }

  • Christian Reuter, Marc-André Kaufhold (2023)
    Crisis Informatics
    In: Zheng Yan: Cambridge Handbook of Cyber Behavior. Cambridge University Press.
    [BibTeX] [Abstract]

    In summary, crisis informatics has established itself as an important research area in the ever-increasing complexity of the cyber world. Its importance is further amplified by the time-critical constraints of emergencies and disasters. However, crisis informatics will be challenged to evolve quickly to tackle global-scale emergencies, such as the ongoing COVID-19 pandemic and the increasing risks of natural hazards due to climate change. This chapter seeks to supplement this effort by analyzing interaction, role, information, and perception patterns, which were prevalent in the past 20 years of social media use in crises.

    @incollection{reuter_crisis_2023,
    title = {Crisis {Informatics}},
    isbn = {978-1-00-905708-0},
    abstract = {In summary, crisis informatics has established itself as an important research area in the ever-increasing complexity of the cyber world. Its importance is further amplified by the time-critical constraints of emergencies and disasters. However, crisis informatics will be challenged to evolve quickly to tackle global-scale emergencies, such as the ongoing COVID-19 pandemic and the increasing risks of natural hazards due to climate change. This chapter seeks to supplement this effort by analyzing interaction, role, information, and perception patterns, which were prevalent in the past 20 years of social media use in crises.},
    booktitle = {Cambridge {Handbook} of {Cyber} {Behavior}},
    publisher = {Cambridge University Press},
    author = {Reuter, Christian and Kaufhold, Marc-André},
    editor = {Yan, Zheng},
    year = {2023},
    keywords = {Crisis, HCI, Peace, Projekt-CYWARN, Projekt-ATHENE-FANCY, Projekt-emergenCITY},
    }

  • Elise Özalp, Katrin Hartwig, Christian Reuter (2023)
    Trends in Explainable Artificial Intelligence for Non-Experts
    In: Peter Klimczak, Christer Petersen: AI – Limits and Prospects of Artificial Intelligence. Bielefeld: Transcript Verlag, , 223–243.
    [BibTeX] [Abstract] [Download PDF]

    In this paper we provide an overview of XAI by introducing fundamental terminology and the goals of XAI, as well as recent research findings. Whilst doing this, we pay special attention to strategies for non-expert stakeholders. This leads us to our first research question: “What are the trends in explainable AI strategies for non-experts?”. In order to illustrate the current state of these trends, we further want to study an exemplary and very relevant application domain. According to Abdul et al. (2018), one of the first domains where researchers pursued XAI is the medical domain. This leads to our second research question: “What are the approaches of XAI in the medical domain for non-expert stakeholders?” These research questions will provide an overview of current topics in XAI and show possible research extensions for specific domains.

    @incollection{ozalp_trends_2023,
    address = {Bielefeld},
    title = {Trends in {Explainable} {Artificial} {Intelligence} for {Non}-{Experts}},
    url = {https://www.transcript-verlag.de/978-3-8376-5732-6/ai-limits-and-prospects-of-artificial-intelligence/?c=313000019},
    abstract = {In this paper we provide an overview of XAI by introducing fundamental terminology and the goals of XAI, as well as recent research findings. Whilst doing this, we pay special attention to strategies for non-expert stakeholders. This leads us to our first research question: “What are the trends in explainable AI strategies for non-experts?”. In order to illustrate the current state of these trends, we further want to study an exemplary and very relevant application domain. According to Abdul et al. (2018), one of the first domains where researchers pursued XAI is the medical domain. This leads to our second research question: “What are the approaches of XAI in the medical domain for non-expert stakeholders?” These research questions will provide an overview of current topics in XAI and show possible research extensions for specific domains.},
    booktitle = {{AI} - {Limits} and {Prospects} of {Artificial} {Intelligence}},
    publisher = {Transcript Verlag},
    author = {Özalp, Elise and Hartwig, Katrin and Reuter, Christian},
    editor = {Klimczak, Peter and Petersen, Christer},
    year = {2023},
    keywords = {HCI, Student, UsableSec, Projekt-CROSSING, Projekt-ATHENE-SecUrban, Projekt-CYWARN},
    pages = {223--243},
    }

  • Thea Riebe (2023)
    Technology Assessment of Dual-Use ICTs – How to assess Diffusion, Governance and Design
    Wiesbaden, Germany: Springer Vieweg.
    [BibTeX] [Abstract] [Download PDF]

    Technologies that can be used in military and civilian applications are referred to as dual-use. The dual-use nature of many information and communications technologies (ICTs) raises new questions for research and development for national, international, and human security. Measures to deal with the risks associated with the various dual-use technologies, including proliferation control, design approaches, and policy measures, vary widely. For example, Autonomous Weapon Systems (AWS) have not yet been regulated, while cryptographic products are subject to export and import controls. Innovations in artificial intelligence (AI), robotics, cybersecurity, and automated analysis of publicly available data raise new questions about their respective dual-use risks. Dual-use risks have been systematically discussed so far, especially in the life sciences, which have contributed to the development of methods for assessment and risk management. Dual-use risks arise, among other things, from the fact that safety-critical technologies can be easily disseminated or modified, as well as used as part of a weapon system. Therefore, the development and adaptation of robots and software requires an independent consideration that builds on the insights of related dual-use discourses. Therefore, this dissertation considers the management of such risks in terms of the proliferation, regulation, and design of individual dual-use information technologies. Technology Assessment (TA) is the epistemological framework for this work, bringing together the concepts and approaches of Critical Security Studies (CSS) and Human-Computer Interaction (HCI) to help evaluate and shape dual-use technologies. In order to identify the diffusion of dual-use at an early stage, the dissertation first examines the diffusion of dual-use innovations between civilian and military research in expert networks on LinkedIn, as well as on the basis of AI patents in a patent network. The results show low diffusion and tend to confirm existing studies on diffusion in patent networks. In the following section, the regulation of dual-use technologies is examined in the paper through two case studies. The first study uses a discourse analysis to show the value conflicts with regard to the regulation of autonomous weapons systems using the concept of Meaningful Human Control (MHC), while a second study, as a long-term comparative case study, analyzes the change and consequences of the regulation of strong cryptography in the U.S. as well as the programs of intelligence agencies for mass surveillance. Both cases point to the central role of private companies, both in the production of AWS and as intermediaries for the dissemination of encryption, as well as surveillance intermediaries. Subsequently, the dissertation examines the design of a dual-use technology using an Open Source Intelligence System (OSINT) for cybersecurity. For this purpose, conceptual, empirical, and technical studies are conducted as part of the Value-Sensitive Design (VSD) framework. During the studies, implications for research on and design of OSINT were identified. For example, the representative survey of the German population has shown that transparency of use while reducing mistrust is associated with higher acceptance of such systems. Additionally, it has been shown that data sparsity through the use of expert networks has many positive effects, not only improving the performance of the system, but is also preferable for legal and social reasons. Thus, the work contributes to the understanding of specific dual-use risks of AI, the regulation of AWS and cryptography, and the design of OSINT in cybersecurity. By combining concepts from CSS and participatory design methods in HCI, this work provides an interdisciplinary and multi-method contribution.

    @book{riebe_technology_2023-1,
    address = {Wiesbaden, Germany},
    title = {Technology {Assessment} of {Dual}-{Use} {ICTs} – {How} to assess {Diffusion}, {Governance} and {Design}},
    isbn = {978-3-658-41666-9},
    url = {https://link.springer.com/book/10.1007/978-3-658-41667-6},
    abstract = {Technologies that can be used in military and civilian applications are referred to as dual-use. The dual-use nature of many information and communications technologies (ICTs) raises new questions for research and development for national, international, and human security. Measures to deal with the risks associated with the various dual-use technologies, including proliferation control, design approaches, and policy measures, vary widely. For example, Autonomous Weapon Systems (AWS) have not yet been regulated, while cryptographic products are subject to export and import controls. Innovations in artificial intelligence (AI), robotics, cybersecurity, and automated analysis of publicly available data raise new questions about their respective dual-use risks.
    Dual-use risks have been systematically discussed so far, especially in the life sciences, which have contributed to the development of methods for assessment and risk management. Dual-use risks arise, among other things, from the fact that safety-critical technologies can be easily disseminated or modified, as well as used as part of a weapon system. Therefore, the development and adaptation of robots and software requires an independent consideration that builds on the insights of related dual-use discourses. Therefore, this dissertation considers the management of such risks in terms of the proliferation, regulation, and design of individual dual-use information technologies. Technology Assessment (TA) is the epistemological framework for this work, bringing together the concepts and approaches of Critical Security Studies (CSS) and Human-Computer Interaction (HCI) to help evaluate and shape dual-use technologies.
    In order to identify the diffusion of dual-use at an early stage, the dissertation first examines the diffusion of dual-use innovations between civilian and military research in expert networks on LinkedIn, as well as on the basis of AI patents in a patent network. The results show low diffusion and tend to confirm existing studies on diffusion in patent networks. In the following section, the regulation of dual-use technologies is examined in the paper through two case studies. The first study uses a discourse analysis to show the value conflicts with regard to the regulation of autonomous weapons systems using the concept of Meaningful Human Control (MHC), while a second study, as a long-term comparative case study, analyzes the change and consequences of the regulation of strong cryptography in the U.S. as well as the programs of intelligence agencies for mass surveillance. Both cases point to the central role of private companies, both in the production of AWS and as intermediaries for the dissemination of encryption, as well as surveillance intermediaries. Subsequently, the dissertation examines the design of a dual-use technology using an Open Source Intelligence System (OSINT) for cybersecurity. For this purpose, conceptual, empirical, and technical studies are conducted as part of the Value-Sensitive Design (VSD) framework. During the studies, implications for research on and design of OSINT were identified. For example, the representative survey of the German population has shown that transparency of use while reducing mistrust is associated with higher acceptance of such systems. Additionally, it has been shown that data sparsity through the use of expert networks has many positive effects, not only improving the performance of the system, but is also preferable for legal and social reasons. Thus, the work contributes to the understanding of specific dual-use risks of AI, the regulation of AWS and cryptography, and the design of OSINT in cybersecurity. By combining concepts from CSS and participatory design methods in HCI, this work provides an interdisciplinary and multi-method contribution.},
    publisher = {Springer Vieweg},
    author = {Riebe, Thea},
    year = {2023},
    note = {https://doi.org/10.1007/978-3-658-41667-6},
    keywords = {HCI, Projekt-KontiKat, Peace, Projekt-DualUse, Projekt-CYWARN, Dissertation},
    }

  • Markus Bayer, Tobias Frey, Christian Reuter (2023)
    Multi-Level Fine-Tuning, Data Augmentation, and Few-Shot Learning for Specialized Cyber Threat Intelligence
    Computers & Security . doi:10.1016/j.cose.2023.103430
    [BibTeX] [Abstract] [Download PDF]

    A Design Science Artefact for Cyber Threat Detection and Actor Specific Communication

    @article{bayer_multi-level_2023,
    title = {Multi-{Level} {Fine}-{Tuning}, {Data} {Augmentation}, and {Few}-{Shot} {Learning} for {Specialized} {Cyber} {Threat} {Intelligence}},
    issn = {0167-4048},
    url = {https://peasec.de/paper/2023/2023_BayerFreyReuter_MultiLevelFineTuningForCyberThreatIntelligence_CS.pdf},
    doi = {10.1016/j.cose.2023.103430},
    abstract = {A Design Science Artefact for Cyber Threat Detection and Actor Specific Communication},
    journal = {Computers \& Security},
    author = {Bayer, Markus and Frey, Tobias and Reuter, Christian},
    year = {2023},
    keywords = {Student, Security, A-Paper, Ranking-ImpactFactor, Projekt-CROSSING, Projekt-CYWARN, Projekt-ATHENE},
    }

  • Philipp Kuehn, David N. Relke, Christian Reuter (2023)
    Common vulnerability scoring system prediction based on open source intelligence information sources
    Computers & Security . doi:10.1016/j.cose.2023.103286
    [BibTeX] [Abstract] [Download PDF]

    The number of newly published vulnerabilities is constantly increasing. Until now, the information available when a new vulnerability is published is manually assessed by experts using a ()cvss vector and score. This assessment is time consuming and requires expertise. Various works already try to predict vectors or scores using machine learning based on the textual descriptions of the vulnerability to enable faster assessment. However, for this purpose, previous works only use the texts available in databases such as nvd. With this work, the publicly available web pages referenced in the nvd are analyzed and made available as sources of texts through web scraping. A dl based method for predicting the vector is implemented and evaluated. The present work provides a classification of the nvd’s reference texts based on the suitability and crawlability of their texts. While we identified the overall influence of the additional texts is negligible, we outperformed the state-of-the-art with our dl prediction models.

    @article{kuehn_common_2023,
    title = {Common vulnerability scoring system prediction based on open source intelligence information sources},
    url = {https://peasec.de/paper/2023/2023_KuehnRelkeReuter_CommonVulnerabilityScoringSystemOSINT_CompSec.pdf},
    doi = {10.1016/j.cose.2023.103286},
    abstract = {The number of newly published vulnerabilities is constantly increasing. Until now, the information available when a new vulnerability is published is manually assessed by experts using a ()cvss vector and score. This assessment is time consuming and requires expertise. Various works already try to predict vectors or scores using machine learning based on the textual descriptions of the vulnerability to enable faster assessment. However, for this purpose, previous works only use the texts available in databases such as nvd. With this work, the publicly available web pages referenced in the nvd are analyzed and made available as sources of texts through web scraping. A dl based method for predicting the vector is implemented and evaluated. The present work provides a classification of the nvd’s reference texts based on the suitability and crawlability of their texts. While we identified the overall influence of the additional texts is negligible, we outperformed the state-of-the-art with our dl prediction models.},
    journal = {Computers \& Security},
    author = {Kuehn, Philipp and Relke, David N. and Reuter, Christian},
    year = {2023},
    keywords = {Student, UsableSec, Security, Ranking-ImpactFactor, Ranking-CORE-B, Projekt-ATHENE-SecUrban, Projekt-CYWARN},
    }

    2022

  • Thea Riebe, Philipp Kuehn, Philipp Imperatori, Christian Reuter (2022)
    U.S. Security Policy: The Dual-Use Regulation of Cryptography and its Effects on Surveillance
    European Journal for Security Research (EJSR) . doi:10.1007/s41125-022-00080-0
    [BibTeX] [Abstract] [Download PDF]

    Cryptography has become ubiquitous in communication technology and is considered a necessary part of information security. However, both the regulation to restrict access to cryptography, as well as practices to weaken or break encryption, are part of the States’ security policies. The United States (U.S.) regulate cryptography for export in international trade as a dual-use good. However, the regulation has been increasingly loosened and transferred to bilateral agreements with Information and Communication Technology companies. At the same time, the National Security Agency attempted to implement a government encryption standard to guarantee itself easier access to data, thus progressively expanding surveillance on non-U.S. citizens. In this paper, using comparative policy analysis, we examine the evolution of both security policies by tracing the historical development of U.S. regulation of cryptography as a dual-use good, and surveillance technologies, and practices used from the 1990s to today. We conclude that the impact of the dual-use regulation has affected the efficiency of surveillance technology, by loosening regulations only for mass communication services, thereby supporting the proliferation of surveillance intermediaries, while working on strategies to collaborate and exploit their coverage.

    @article{riebe_us_2022,
    title = {U.{S}. {Security} {Policy}: {The} {Dual}-{Use} {Regulation} of {Cryptography} and its {Effects} on {Surveillance}},
    url = {https://link.springer.com/content/pdf/10.1007/s41125-022-00080-0.pdf},
    doi = {10.1007/s41125-022-00080-0},
    abstract = {Cryptography has become ubiquitous in communication technology and is considered a necessary part of information security. However, both the regulation to restrict access to cryptography, as well as practices to weaken or break encryption, are part of the States’ security policies. The United States (U.S.) regulate cryptography for export in international trade as a dual-use good. However, the regulation has been increasingly loosened and transferred to bilateral agreements with Information and Communication Technology companies. At the same time, the National Security Agency attempted to implement a government encryption standard to guarantee itself easier access to data, thus progressively expanding surveillance on non-U.S. citizens. In this paper, using comparative policy analysis, we examine the evolution of both security policies by tracing the historical development of U.S. regulation of cryptography as a dual-use good, and surveillance technologies, and practices used from the 1990s to today. We conclude that the impact of the dual-use regulation has affected the efficiency of surveillance technology, by loosening regulations only for mass communication services, thereby supporting the proliferation of surveillance intermediaries, while working on strategies to collaborate and exploit their coverage.},
    journal = {European Journal for Security Research (EJSR)},
    author = {Riebe, Thea and Kuehn, Philipp and Imperatori, Philipp and Reuter, Christian},
    year = {2022},
    keywords = {Student, Security, Projekt-KontiKat, Projekt-CYWARN},
    }

  • Jasmin Haunschild, Marc-André Kaufhold, Christian Reuter (2022)
    Cultural Violence and Fragmentation on Social Media: Interventions and Countermeasures by Humans and Social Bots
    In: Myriam Dunn Cavelty, Andreas Wenger: Cyber Security Politics: Socio-Technological Transformations and Political Fragmentation. Routledge, , 48–63.
    [BibTeX] [Abstract] [Download PDF]

    Mobile technologies and social media services are among the socio-technological innovations that have an enormous impact transforming modern culture and political processes. Social media are often defined as a “group of internet-based applications […] that allow the creation and exchange of user-generated content” (Kaplan and Haenlein 2010). Shaping opinions, politics, participation, and protest (Wulf et al. 2013), they are used by citizens for news consumption and social exchange (Robinson et al. 2017); by journalists for reporting, analyzing, and collecting information (Stieglitz et al. 2018a); and by organizations to monitor crises, emergencies, customer feedback, and sentiment, among others (Haunschild et al. 2020). Large-scale international events, such as the 2010 Arab Spring, showcased the potential of socio-technological transformations: Citizens were not passive victims but active and autonomous participants utilizing social media to coordinate protest and for crisis response (Reuter and Kaufhold 2018). However, in other cases, citizens’ activities coordinated via social media also increased the complexity of tasks and pressure for formal authorities, since the lack of state control has not had only empowering or benign effects. Instead, on social media, false information spreads fast and it is easy for groups to find an audience there, either to enhance their profit or to target vulnerable groups with dangerous ideology.

    @incollection{haunschild_cultural_2022,
    title = {Cultural {Violence} and {Fragmentation} on {Social} {Media}: {Interventions} and {Countermeasures} by {Humans} and {Social} {Bots}},
    isbn = {978-0-367-62674-7},
    url = {https://peasec.de/paper/2022/2022_HaunschildKaufholdReuter_SocialMediaAndFragmentation_Routledge.pdf},
    abstract = {Mobile technologies and social media services are among the socio-technological innovations that have an enormous impact transforming modern culture and political processes. Social media are often defined as a “group of internet-based applications […] that allow the creation and exchange of user-generated content” (Kaplan and Haenlein 2010). Shaping opinions, politics, participation, and protest (Wulf et al. 2013), they are used by citizens for news consumption and social exchange (Robinson et al. 2017); by journalists for reporting, analyzing, and collecting information (Stieglitz et al. 2018a); and by organizations to monitor crises, emergencies, customer feedback, and sentiment, among others (Haunschild et al. 2020). Large-scale international events, such as the 2010 Arab Spring, showcased the potential of socio-technological transformations: Citizens were not passive victims but active and autonomous participants utilizing social media to coordinate protest and for crisis response (Reuter and Kaufhold 2018). However, in other cases, citizens’ activities coordinated via social media also increased the complexity of tasks and pressure for formal authorities, since the lack of state control has not had only empowering or benign effects. Instead, on social media, false information spreads fast and it is easy for groups to find an audience there, either to enhance their profit or to target vulnerable groups with dangerous ideology.},
    booktitle = {Cyber {Security} {Politics}: {Socio}-{Technological} {Transformations} and {Political} {Fragmentation}},
    publisher = {Routledge},
    author = {Haunschild, Jasmin and Kaufhold, Marc-André and Reuter, Christian},
    editor = {Cavelty, Myriam Dunn and Wenger, Andreas},
    year = {2022},
    keywords = {Crisis, SocialMedia, Peace, Projekt-ATHENE-SecUrban, Projekt-CYWARN, Projekt-emergenCITY},
    pages = {48--63},
    }

  • Stefka Schmid, Thea Riebe, Christian Reuter (2022)
    Dual-Use and Trustworthy? A Mixed Methods Analysis of AI Diffusion between Civilian and Defense R&D
    Science and Engineering Ethics ;28(12):1–23. doi:10.1007/s11948-022-00364-7
    [BibTeX] [Abstract] [Download PDF]

    Artificial Intelligence (AI) seems to be impacting all industry sectors, while becoming a motor for innovation. The diffusion of AI from the civilian sector to the defense sector, and AI’s dual-use potential has drawn attention from security and ethics scholars. With the publication of the ethical guideline Trustworthy AI by the European Union (EU), normative questions on the application of AI have been further evaluated. In order to draw conclusions on Trustworthy AI as a point of reference for responsible research and development (R&D), we approach the diffusion of AI across both civilian and military spheres in the EU. We capture the extent of technological diffusion and derive European and German patent citation networks. Both networks indicate a low degree of diffusion of AI between civilian and defense sectors. A qualitative investigation of project descriptions of a research institute’s work in both civilian and military fields shows that military AI applications stress accuracy or robustness, while civilian AI reflects a focus on human-centric values. Our work represents a first approach by linking processes of technology diffusion with normative evaluations of R&D.

    @article{schmid_dual-use_2022,
    title = {Dual-{Use} and {Trustworthy}? {A} {Mixed} {Methods} {Analysis} of {AI} {Diffusion} between {Civilian} and {Defense} {R}\&{D}},
    volume = {28},
    url = {https://peasec.de/paper/2022/2022_SchmidRiebeReuter_DualUseandTrustworthy_ScienceEngineeringEthics.pdf},
    doi = {10.1007/s11948-022-00364-7},
    abstract = {Artificial Intelligence (AI) seems to be impacting all industry sectors, while becoming a motor for innovation. The diffusion of AI from the civilian sector to the defense sector, and AI’s dual-use potential has drawn attention from security and ethics scholars. With the publication of the ethical guideline Trustworthy AI by the European Union (EU), normative questions on the application of AI have been further evaluated. In order to draw conclusions on Trustworthy AI as a point of reference for responsible research and development (R\&D), we approach the diffusion of AI across both civilian and military spheres in the EU. We capture the extent of technological diffusion and derive European and German patent citation networks. Both networks indicate a low degree of diffusion of AI between civilian and defense sectors. A qualitative investigation of project descriptions of a research institute’s work in both civilian and military fields shows that military AI applications stress accuracy or robustness, while civilian AI reflects a focus on human-centric values. Our work represents a first approach by linking processes of technology diffusion with normative evaluations of R\&D.},
    number = {12},
    journal = {Science and Engineering Ethics},
    author = {Schmid, Stefka and Riebe, Thea and Reuter, Christian},
    year = {2022},
    keywords = {A-Paper, Ranking-ImpactFactor, Projekt-KontiKat, Peace, AuswahlPeace, Projekt-CYWARN},
    pages = {1--23},
    }

  • Marc-André Kaufhold, Julian Bäumler, Christian Reuter (2022)
    The Implementation of Protective Measures and Communication of Cybersecurity Alerts in Germany – A Representative Survey of the Population
    Mensch und Computer – Workshopband Darmstadt. doi:10.18420/muc2022-mci-ws01-228
    [BibTeX] [Abstract] [Download PDF]

    Despite the merits of digitization in private and professional spaces, critical infrastructures and societies are increasingly exposed to cyberattacks. We conducted a representative survey with German citizens (N=1,093) to examine how they assess the current and future cyber threat situation as well as possible protective measures in cyberspace. Furthermore, we asked what information and channels citizens need to be aware of cyber threats. Our findings indicate that large proportions of the German population feel inadequately informed about cyber threats and tend to only apply enforced security measures by programs (e.g., updates) and services (e.g., two-factor authentication). Furthermore, institutions such as state-level Computer Emergency Response Teams (CERTs) are relatively unknown among the population and respondents showed little confidence in German security authorities to cope with largescale attacks and ultimately protect citizens. Still, our participants prefer to receive cybersecurity information via installed security applications, television channels, or emergency warning apps.

    @inproceedings{kaufhold_implementation_2022,
    address = {Darmstadt},
    series = {Mensch und {Computer} 2022 - {Workshopband}},
    title = {The {Implementation} of {Protective} {Measures} and {Communication} of {Cybersecurity} {Alerts} in {Germany} - {A} {Representative} {Survey} of the {Population}},
    url = {https://dl.gi.de/handle/20.500.12116/39061},
    doi = {10.18420/muc2022-mci-ws01-228},
    abstract = {Despite the merits of digitization in private and professional spaces, critical infrastructures and societies are increasingly exposed to cyberattacks. We conducted a representative survey with German citizens (N=1,093) to examine how they assess the current and future cyber threat situation as well as possible protective measures in cyberspace. Furthermore, we asked what information and channels citizens need to be aware of cyber threats. Our findings indicate that large proportions of the German population feel inadequately informed about cyber threats and tend to only apply enforced security measures by programs (e.g., updates) and services (e.g., two-factor authentication). Furthermore, institutions such as state-level Computer Emergency Response Teams (CERTs) are relatively unknown among the population and respondents showed little confidence in German security authorities to cope with largescale attacks and ultimately protect citizens. Still, our participants prefer to receive cybersecurity information via installed security applications, television channels, or emergency warning apps.},
    language = {en},
    booktitle = {Mensch und {Computer} - {Workshopband}},
    publisher = {Gesellschaft für Informatik},
    author = {Kaufhold, Marc-André and Bäumler, Julian and Reuter, Christian},
    year = {2022},
    keywords = {HCI, Student, UsableSec, Security, Projekt-ATHENE-SecUrban, Projekt-CYWARN},
    }

  • Marc-André Kaufhold, Ali Sercan Basyurt, Kaan Eyilmez, Marc Stöttinger, Christian Reuter (2022)
    Cyber Threat Observatory: Design and Evaluation of an Interactive Dashboard for Computer Emergency Response Teams
    Proceedings of the European Conference on Information Systems (ECIS) Timisoara, Romania.
    [BibTeX] [Abstract] [Download PDF]

    Besides the merits of increasing digitization and networking, societies are increasling exposed to cyberattacks. In Germany, Computer Emerrgency Response Teams (CERTs) of the public sector operate on federal and state level to provide preventative and reactive information security services for authorities, citizens, and enterprises. Their tasks of monitoring, analyzing, and communicating threats is getting more complex by the increasing information quantity disseminated into relevant public channels. Using the lens of design science research, this paper contributes with the design and evaluation of a cross-platform cybersecurity dashboard for CERTs. Based on expert scenario-based walkthroughs in combination with semi-structured interviews (N=12), it discusses six design implications, including the customizability of data sources and filtering of displayed entities, modular integration of additional information sources, interrelation between different information feeds, intelligent algorithms for content assessment and filtering, integration with security software and systems, as well as export, sharing and communication of relevant data.

    @inproceedings{kaufhold_cyber_2022,
    address = {Timisoara, Romania},
    title = {Cyber {Threat} {Observatory}: {Design} and {Evaluation} of an {Interactive} {Dashboard} for {Computer} {Emergency} {Response} {Teams}},
    url = {http://www.peasec.de/paper/2022/2022_KaufholdBasyurtEyilmezStoettingerReuter_CyberThreatObservatory_ECIS.pdf},
    abstract = {Besides the merits of increasing digitization and networking, societies are increasling exposed to cyberattacks. In Germany, Computer Emerrgency Response Teams (CERTs) of the public sector operate on federal and state level to provide preventative and reactive information security services for authorities, citizens, and enterprises. Their tasks of monitoring, analyzing, and communicating threats is getting more complex by the increasing information quantity disseminated into relevant public channels. Using the lens of design science research, this paper contributes with the design and evaluation of a cross-platform cybersecurity dashboard for CERTs. Based on expert scenario-based walkthroughs in combination with semi-structured interviews (N=12), it discusses six design implications, including the customizability of data sources and filtering of displayed entities, modular integration of additional information sources, interrelation between different information feeds, intelligent algorithms for content assessment and filtering, integration with security software and systems, as well as export, sharing and communication of relevant data.},
    booktitle = {Proceedings of the {European} {Conference} on {Information} {Systems} ({ECIS})},
    author = {Kaufhold, Marc-André and Basyurt, Ali Sercan and Eyilmez, Kaan and Stöttinger, Marc and Reuter, Christian},
    year = {2022},
    keywords = {HCI, UsableSec, Security, A-Paper, Ranking-CORE-A, Projekt-ATHENE-SecUrban, Projekt-CYWARN},
    }

  • Philipp Kuehn, Julian Bäumler, Marc-André Kaufhold, Marc Wendelborn, Christian Reuter (2022)
    The Notion of Relevance in Cybersecurity: A Categorization of Security Tools and Deduction of Relevance Notions
    Mensch und Computer – Workshopband Darmstadt. doi:10.18420/muc2022-mci-ws01-220
    [BibTeX] [Abstract] [Download PDF]

    Proper cybersecurity requires timely information to defend the IT infrastructure. In a dynamic field like cybersecurity, gathering up-to-date information is usually a manual, time-consuming, and exhaustive task. Automatic and usable approaches are supposed to be a solution to this problem, but for this, they require a notion of information relevance to distinguish relevant from irrelevant information. First, on the basis of a literature review, this paper proposes a novel cybersecurity tool categorization based on corresponding tool types with their respective definitions and core features. Second, it elaborates information used in each category and deduces notions of relevance. Third, it outlines how these findings informed the design of a security dashboard to guide computer emergency response team staff in identifying current threats in open source intelligence sources while mitigating information overload.

    @inproceedings{kuehn_notion_2022,
    address = {Darmstadt},
    series = {Mensch und {Computer} 2022 - {Workshopband}},
    title = {The {Notion} of {Relevance} in {Cybersecurity}: {A} {Categorization} of {Security} {Tools} and {Deduction} of {Relevance} {Notions}},
    url = {https://dl.gi.de/handle/20.500.12116/39072},
    doi = {10.18420/muc2022-mci-ws01-220},
    abstract = {Proper cybersecurity requires timely information to defend the IT infrastructure. In a dynamic field like cybersecurity, gathering up-to-date information is usually a manual, time-consuming, and exhaustive task. Automatic and usable approaches are supposed to be a solution to this problem, but for this, they require a notion of information relevance to distinguish relevant from irrelevant information. First, on the basis of a literature review, this paper proposes a novel cybersecurity tool categorization based on corresponding tool types with their respective definitions and core features. Second, it elaborates information used in each category and deduces notions of relevance. Third, it outlines how these findings informed the design of a security dashboard to guide computer emergency response team staff in identifying current threats in open source intelligence sources while mitigating information overload.},
    language = {en},
    booktitle = {Mensch und {Computer} - {Workshopband}},
    publisher = {Gesellschaft für Informatik},
    author = {Kuehn, Philipp and Bäumler, Julian and Kaufhold, Marc-André and Wendelborn, Marc and Reuter, Christian},
    year = {2022},
    keywords = {Student, UsableSec, Security, Projekt-ATHENE-SecUrban, Projekt-CYWARN},
    }

  • Markus Bayer, Marc-André Kaufhold, Björn Buchhold, Marcel Keller, Jörg Dallmeyer, Christian Reuter (2022)
    Data Augmentation in Natural Language Processing: A Novel Text Generation Approach for Long and Short Text Classifiers
    International Journal of Machine Learning and Cybernetics (IJMLC) . doi:10.1007/s13042-022-01553-3
    [BibTeX] [Abstract] [Download PDF]

    In many cases of machine learning, research suggests that the development of training data might have a higher relevance than the choice and modelling of classifiers themselves. Thus, data augmentation methods have been developed to improve classifiers by artificially created training data. In NLP, there is the challenge of establishing universal rules for text transformations which provide new linguistic patterns. In this paper, we present and evaluate a text generation method suitable to increase the performance of classifiers for long and short texts. We achieved promising improvements when evaluating short as well as long text tasks with the enhancement by our text generation method. Especially with regard to small data analytics, additive accuracy gains of up to 15.53\% and 3.56\% are achieved within a constructed low data regime, compared to the no augmentation baseline and another data augmentation technique. As the current track of these constructed regimes is not universally applicable, we also show major improvements in several real world low data tasks (up to +4.84 F1-score). Since we are evaluating the method from many perspectives (in total 11 datasets), we also observe situations where the method might not be suitable. We discuss implications and patterns for the successful application of our approach on different types of datasets.

    @article{bayer_data_2022,
    title = {Data {Augmentation} in {Natural} {Language} {Processing}: {A} {Novel} {Text} {Generation} {Approach} for {Long} and {Short} {Text} {Classifiers}},
    url = {https://link.springer.com/article/10.1007/s13042-022-01553-3},
    doi = {10.1007/s13042-022-01553-3},
    abstract = {In many cases of machine learning, research suggests that the development of training data might have a higher relevance than the choice and modelling of classifiers themselves. Thus, data augmentation methods have been developed to improve classifiers by artificially created training data. In NLP, there is the challenge of establishing universal rules for text transformations which provide new linguistic patterns. In this paper, we present and evaluate a text generation method suitable to increase the performance of classifiers for long and short texts. We achieved promising improvements when evaluating short as well as long text tasks with the enhancement by our text generation method. Especially with regard to small data analytics, additive accuracy gains of up to 15.53\% and 3.56\% are achieved within a constructed low data regime, compared to the no augmentation baseline and another data augmentation technique. As the current track of these constructed regimes is not universally applicable, we also show major improvements in several real world low data tasks (up to +4.84 F1-score). Since we are evaluating the method from many perspectives (in total 11 datasets), we also observe situations where the method might not be suitable. We discuss implications and patterns for the successful application of our approach on different types of datasets.},
    journal = {International Journal of Machine Learning and Cybernetics (IJMLC)},
    author = {Bayer, Markus and Kaufhold, Marc-André and Buchhold, Björn and Keller, Marcel and Dallmeyer, Jörg and Reuter, Christian},
    year = {2022},
    keywords = {Student, Security, A-Paper, Ranking-ImpactFactor, Projekt-CYWARN, Projekt-emergenCITY},
    }

  • Kaan Eyilmez, Ali Sercan Basyurt, Stefan Stieglitz, Christoph Fuchss, Marc-André Kaufhold, Christian Reuter, Milad Mirabaie (2022)
    A Design Science Artefact for Cyber Threat Detection and Actor Specific Communication
    Australasian Conference on Information Systems (ACIS) .
    [BibTeX] [Abstract] [Download PDF]

    Over the past few decades, the number and variety of cyberattacks and malware patterns have increased immensely. As a countermeasure, computer emergency response teams were established with the responsibility of securing the cyber environment. However, recent studies revealed that currently performed manual processes and the unavailability of adequate tools impede the achievement of cybersecurity. To address these challenges, we followed the Design Science paradigm to develop an artefact that improves the evaluation of open-source intelligence obtained from Twitter as well as the actor-specific communication of cyber threat information. Subsequently, the implemented artefact will be evaluated through semi-structured interviews with subject matter experts. This research in progress article presents the identified research gap and describes the development process and the endeavor to contribute to the cybersecurity domain theoretically with design principles for the development of an instrument and practically by implementing an artefact that supports domain experts in their work.

    @inproceedings{eyilmez_design_2022,
    title = {A {Design} {Science} {Artefact} for {Cyber} {Threat} {Detection} and {Actor} {Specific} {Communication}},
    url = {https://aisel.aisnet.org/cgi/viewcontent.cgi?article=1049&context=acis2022},
    abstract = {Over the past few decades, the number and variety of cyberattacks and malware patterns have increased immensely. As a countermeasure, computer emergency response teams were established with the responsibility of securing the cyber environment. However, recent studies revealed that currently performed manual processes and the unavailability of adequate tools impede the achievement of cybersecurity. To address these challenges, we followed the Design Science paradigm to develop an artefact that improves the evaluation of open-source intelligence obtained from Twitter as well as the actor-specific communication of cyber threat information. Subsequently, the implemented artefact will be evaluated through semi-structured interviews with subject matter experts. This research in progress article presents the identified research gap and describes the development process and the endeavor to contribute to the cybersecurity domain theoretically with design principles for the development of an instrument and practically by implementing an artefact that supports domain experts in their work.},
    booktitle = {Australasian {Conference} on {Information} {Systems} ({ACIS})},
    publisher = {AIS Electronic Library (AISel)},
    author = {Eyilmez, Kaan and Basyurt, Ali Sercan and Stieglitz, Stefan and Fuchss, Christoph and Kaufhold, Marc-André and Reuter, Christian and Mirabaie, Milad},
    year = {2022},
    keywords = {Student, Security, Projekt-CYWARN},
    }

  • Philipp Kuehn, Moritz Kerk, Marc Wendelborn, Christian Reuter (2022)
    Clustering of Threat Information to Mitigate Information Overload for Computer Emergency Response Teams
    2022.
    [BibTeX] [Abstract] [Download PDF]

    The constantly increasing number of threats and the existing diversity of information sources pose challenges for Computer Emergency Response Teams (CERTs). In order to respond to new threats, CERTs need to gather information in a timely and comprehensive manner. However, the volume of information and sources can lead to information overload. This paper answers the question of how to reduce information overload for CERTs with the help of clustering methods. Conditions for such a framework were established and subsequently tested. In order to perform an evaluation, different types of evaluation metrics were introduced and selected in relation to the framework conditions. Furthermore, different vectorizations and distance measures in combination with the clustering methods were evaluated and interpreted. Two different ground-truth datasets were used for the evaluation, one containing threat messages and a dataset with messages from different news categories. The work shows that the K-means clustering method along with TF-IDF vectorization and cosine distance provide the best results in the domain of threat messages.

    @techreport{kuehn_clustering_2022,
    title = {Clustering of {Threat} {Information} to {Mitigate} {Information} {Overload} for {Computer} {Emergency} {Response} {Teams}},
    copyright = {arXiv.org perpetual, non-exclusive license},
    url = {https://arxiv.org/pdf/2210.14067.pdf},
    abstract = {The constantly increasing number of threats and the existing diversity of information sources pose challenges for Computer Emergency Response Teams (CERTs). In order to respond to new threats, CERTs need to gather information in a timely and comprehensive manner. However, the volume of information and sources can lead to information overload. This paper answers the question of how to reduce information overload for CERTs with the help of clustering methods. Conditions for such a framework were established and subsequently tested. In order to perform an evaluation, different types of evaluation metrics were introduced and selected in relation to the framework conditions. Furthermore, different vectorizations and distance measures in combination with the clustering methods were evaluated and interpreted. Two different ground-truth datasets were used for the evaluation, one containing threat messages and a dataset with messages from different news categories. The work shows that the K-means clustering method along with TF-IDF vectorization and cosine distance provide the best results in the domain of threat messages.},
    language = {en},
    institution = {arXiv},
    author = {Kuehn, Philipp and Kerk, Moritz and Wendelborn, Marc and Reuter, Christian},
    year = {2022},
    note = {https://doi.org/10.48550/arXiv.2210.14067},
    keywords = {HCI, Student, Security, Projekt-ATHENE-SecUrban, Projekt-CYWARN},
    }

  • Jasmin Haunschild, Marc-André Kaufhold, Christian Reuter (2022)
    Perceptions and Use of Warning Apps – Did Recent Crises Lead to Changes in Germany?
    Mensch und Computer – Tagungsband New York. doi:10.1145/3543758.3543770
    [BibTeX] [Abstract] [Download PDF]

    Warning and emergency apps are an integral part of crisis informatics and particularly relevant in countries that currently do not have cell broadcast, such as Germany. Previous studies have shown that such apps are regarded as relevant, but only around 16\% of German citizens used them in 2017 and 2019. With the COVID-19 pandemic and a devastating flash flood, Germany has recently experienced severe crisis-related losses. By comparing data from representative surveys from 2017, 2019 and 2021, this study investigates whether these events have changed the perceptions of warning apps and their usage patterns in Germany. The study shows that while multi-hazard emergency and warning apps have been easily surpassed in usage by COVID-19 contact tracing apps, the use of warning apps has also increased and the pandemic has added new desired features. While these have been little-used during the COVID-19 pandemic, especially non-users see smartphone messengers app channels as possible alternatives to warning apps. In addition, regional warning apps appear promising, possibly because they make choosing a warning app easier when there are several available on the market.

    @inproceedings{haunschild_perceptions_2022,
    address = {New York},
    title = {Perceptions and {Use} of {Warning} {Apps} – {Did} {Recent} {Crises} {Lead} to {Changes} in {Germany}?},
    url = {http://www.peasec.de/paper/2022/2022_HaunschildKaufholdReuter_WarningAppsChangesGermany_MuC.pdf},
    doi = {10.1145/3543758.3543770},
    abstract = {Warning and emergency apps are an integral part of crisis informatics and particularly relevant in countries that currently do not have cell broadcast, such as Germany. Previous studies have shown that such apps are regarded as relevant, but only around 16\% of German citizens used them in 2017 and 2019. With the COVID-19 pandemic and a devastating flash flood, Germany has recently experienced severe crisis-related losses. By comparing data from representative surveys from 2017, 2019 and 2021, this study investigates whether these events have changed the perceptions of warning apps and their usage patterns in Germany. The study shows that while multi-hazard emergency and warning apps have been easily surpassed in usage by COVID-19 contact tracing apps, the use of warning apps has also increased and the pandemic has added new desired features. While these have been little-used during the COVID-19 pandemic, especially non-users see smartphone messengers app channels as possible alternatives to warning apps. In addition, regional warning apps appear promising, possibly because they make choosing a warning app easier when there are several available on the market.},
    language = {en},
    booktitle = {Mensch und {Computer} - {Tagungsband}},
    publisher = {ACM},
    author = {Haunschild, Jasmin and Kaufhold, Marc-André and Reuter, Christian},
    year = {2022},
    keywords = {Crisis, Projekt-ATHENE-SecUrban, Projekt-CYWARN, Projekt-emergenCITY},
    }

  • Marc-André Kaufhold, Christian Reuter, Tina Comes, Milad Mirabaie, Stefan Stieglitz (2022)
    Proceedings of the 2nd Workshop on Mobile Resilience: Designing Interactive Systems for Crisis Response
    Darmstadt: TUprints.
    [BibTeX] [Abstract] [Download PDF]

    Information and communication technologies (ICT), including artificial intelligence, internet of things, and mobile applications can be utilized to tackle important societal challenges, such as the ongoing COVID-19 pandemic. While they may increase societal resilience, their design, functionality, and underlying infrastructures must be resilient against disruptions caused by anthropogenic, natural and hybrid crises, emergencies, and threats. In order to research challenges, designs, and potentials of interactive technologies, this workshop investigated the space of mobile technologies and resilient systems for crisis response, including the application domains of cyber threat and pandemic response.

    @book{kaufhold_proceedings_2022,
    address = {Darmstadt},
    title = {Proceedings of the 2nd {Workshop} on {Mobile} {Resilience}: {Designing} {Interactive} {Systems} for {Crisis} {Response}},
    url = {http://www.peasec.de/paper/2022/2022_KaufholdReuterComesMirbabaieStieglitz_Proceedings2ndWorkshopMobileResilience.pdf},
    abstract = {Information and communication technologies (ICT), including artificial intelligence, internet of things, and mobile applications can be utilized to tackle important societal challenges, such as the ongoing COVID-19 pandemic. While they may increase societal resilience, their design, functionality, and underlying infrastructures must be resilient against disruptions caused by anthropogenic, natural and hybrid crises, emergencies, and threats. In order to research challenges, designs, and potentials of interactive technologies, this workshop investigated the space of mobile technologies and resilient systems for crisis response, including the application domains of cyber threat and pandemic response.},
    publisher = {TUprints},
    author = {Kaufhold, Marc-André and Reuter, Christian and Comes, Tina and Mirabaie, Milad and Stieglitz, Stefan},
    year = {2022},
    keywords = {Crisis, Projekt-CYWARN},
    }

  • Ali Sercan Basyurt, Jennifer Fromm, Philipp Kuehn, Marc-André Kaufhold, Milad Mirabaie (2022)
    Help Wanted – Challenges in Data Collection, Analysis and Communication of Cyber Threats in Security Operation Centers
    Proceedings of the International Conference on Wirtschaftsinformatik (WI) Nürnberg.
    [BibTeX] [Abstract] [Download PDF]

    Security Operation Centers are tasked with collecting and analyzing cyber threat data from multiple sources to communicate warning messages and solutions. These tasks are extensive and resource consuming, which makes supporting approaches valuable to experts. However, to implement such approaches, information about the challenges these experts face while performing these tasks is necessary. We therefore conducted semi-structured expert interviews to identify these challenges. By doing so, valuable insights into these challenges based on expert knowledge is acquired, which in return could be leveraged to develop automated approaches to support experts and address these challenges.

    @inproceedings{basyurt_help_2022,
    address = {Nürnberg},
    title = {Help {Wanted} - {Challenges} in {Data} {Collection}, {Analysis} and {Communication} of {Cyber} {Threats} in {Security} {Operation} {Centers}},
    url = {http://www.peasec.de/paper/2022/2022_BasyourtFrommKuehnKaufholdMirabaie_HelpWantedChallengesDataCollectionAnalysisCommunication_WI.pdf},
    abstract = {Security Operation Centers are tasked with collecting and analyzing cyber threat data from multiple sources to communicate warning messages and solutions. These tasks are extensive and resource consuming, which makes supporting approaches valuable to experts. However, to implement such approaches, information about the challenges these experts face while performing these tasks is necessary. We therefore conducted semi-structured expert interviews to identify these challenges. By doing so, valuable insights into these challenges based on expert knowledge is acquired, which in return could be leveraged to develop automated approaches to support experts and address these challenges.},
    booktitle = {Proceedings of the {International} {Conference} on {Wirtschaftsinformatik} ({WI})},
    author = {Basyurt, Ali Sercan and Fromm, Jennifer and Kuehn, Philipp and Kaufhold, Marc-André and Mirabaie, Milad},
    year = {2022},
    keywords = {Ranking-CORE-C, Security, Projekt-CYWARN},
    }

    2021

  • Christian Reuter (2021)
    Sicherheitskritische Mensch-Computer-Interaktion: Interaktive Technologien und Soziale Medien im Krisen- und Sicherheitsmanagement (Zweite Auflage)
    2 ed. Wiesbaden: Springer Vieweg.
    [BibTeX] [Abstract] [Download PDF]

    Die zweite, aktualisierte Auflage dieses Lehr- und Fachbuchs gibt eine fundierte und praxisbezogene Einführung sowie einen Überblick über Grundlagen, Methoden und Anwendungen der Mensch-Computer-Interaktion im Kontext von Sicherheit, Notfällen, Krisen, Katastrophen, Krieg und Frieden. Dies adressierend werden interaktive, mobile, ubiquitäre und kooperative Technologien sowie soziale Medien vorgestellt. Hierbei finden klassische Themen wie benutzbare (IT-)Sicherheit, Industrie 4.0, Katastrophenschutz, Medizin und Automobil, aber auch Augmented Reality, Crowdsourcing, Shitstorm Management, Social Media Analytics und Cyberwar ihren Platz. Methodisch wird das Spektrum von Usable Safety bis Usable Security Engineering von Analyse über Design bis Evaluation abgedeckt. Das Buch eignet sich ebenso als Lehrbuch für Studierende wie als Handbuch für Wissenschaftler, Designer, Entwickler und Anwender.

    @book{reuter_sicherheitskritische_2021,
    address = {Wiesbaden},
    edition = {2},
    title = {Sicherheitskritische {Mensch}-{Computer}-{Interaktion}: {Interaktive} {Technologien} und {Soziale} {Medien} im {Krisen}- und {Sicherheitsmanagement} ({Zweite} {Auflage})},
    isbn = {978-3-658-32795-8},
    url = {https://www.springer.com/de/book/9783658327941},
    abstract = {Die zweite, aktualisierte Auflage dieses Lehr- und Fachbuchs gibt eine fundierte und praxisbezogene Einführung sowie einen Überblick über Grundlagen, Methoden und Anwendungen der Mensch-Computer-Interaktion im Kontext von Sicherheit, Notfällen, Krisen, Katastrophen, Krieg und Frieden. Dies adressierend werden interaktive, mobile, ubiquitäre und kooperative Technologien sowie soziale Medien vorgestellt. Hierbei finden klassische Themen wie benutzbare (IT-)Sicherheit, Industrie 4.0, Katastrophenschutz, Medizin und Automobil, aber auch Augmented Reality, Crowdsourcing, Shitstorm Management, Social Media Analytics und Cyberwar ihren Platz. Methodisch wird das Spektrum von Usable Safety bis Usable Security Engineering von Analyse über Design bis Evaluation abgedeckt. Das Buch eignet sich ebenso als Lehrbuch für Studierende wie als Handbuch für Wissenschaftler, Designer, Entwickler und Anwender.},
    publisher = {Springer Vieweg},
    author = {Reuter, Christian},
    year = {2021},
    keywords = {AuswahlCrisis, HCI, Selected, SocialMedia, UsableSec, Security, Projekt-KontiKat, Peace, Infrastructure, Projekt-ATHENE-SecUrban, Projekt-CYWARN, Projekt-emergenCITY},
    }

  • Jasmin Haunschild, Christian Reuter (2021)
    Perceptions of Police Technology Use and Attitudes Towards the Police – A Representative Survey of the German Population
    Mensch und Computer – Workshopband Bonn. doi:10.18420/muc2021-mci-ws08-255
    [BibTeX] [Abstract] [Download PDF]

    Many Germans perceive a brutalization of society, and state officials also report feeling under attack. At the same time, policing is criticised for becoming increasingly militarised and for having extended surveillance in the course of fighting terrorism. Advancements in HCI are used in the context of many of the issues that policing is facing. In this study, we conduct a representative survey of the German population to investigate personal experiences with and attitudes towards the police and information and communication technologies (ICT) used for policing. We find an overall positive image of the police and uncritical attitudes towards ICT used for general surveillance (body-worn cameras, video surveillance, face recognition) and slightly more critical attitudes towards personal surveillance (e.g. through communication data retention). The study indicates that perceptions differ according to experience of unfair treatment by the police, while other factors such as age and education have similar effects.

    @inproceedings{haunschild_perceptions_2021,
    address = {Bonn},
    title = {Perceptions of {Police} {Technology} {Use} and {Attitudes} {Towards} the {Police} - {A} {Representative} {Survey} of the {German} {Population}},
    volume = {Mensch und Computer 2021 - Workshopband},
    url = {http://www.peasec.de/paper/2021/2021_HaunschildReuter_PoliceTechnologyUseSurvey_MuC-WS.pdf},
    doi = {10.18420/muc2021-mci-ws08-255},
    abstract = {Many Germans perceive a brutalization of society, and state officials also report feeling under attack. At the same time, policing is criticised for becoming increasingly militarised and for having extended surveillance in the course of fighting terrorism. Advancements in HCI are used in the context of many of the issues that policing is facing. In this study, we conduct a representative survey of the German population to investigate personal experiences with and attitudes towards the police and information and communication technologies (ICT) used for policing. We find an overall positive image of the police and uncritical attitudes towards ICT used for general surveillance (body-worn cameras, video surveillance, face recognition) and slightly more critical attitudes towards personal surveillance (e.g. through communication data retention). The study indicates that perceptions differ according to experience of unfair treatment by the police, while other factors such as age and education have similar effects.},
    booktitle = {Mensch und {Computer} - {Workshopband}},
    publisher = {Gesellschaft für Informatik e. V.},
    author = {Haunschild, Jasmin and Reuter, Christian},
    year = {2021},
    keywords = {Security, Projekt-ATHENE-SecUrban, Projekt-CYWARN, Projekt-emergenCITY},
    }

  • Christian Reuter (2021)
    Einleitung in die sicherheitskritische Mensch-Computer-Interaktion
    In: Christian ReuterSicherheitskritische Mensch-Computer-Interaktion: Interaktive Technologien und Soziale Medien im Krisen- und Sicherheitsmanagement (Zweite Auflage). 2 ed. Wiesbaden, Germany: Springer Vieweg, , 3–17.
    [BibTeX] [Abstract] [Download PDF]

    Die sicherheitskritische Mensch-Computer-Interaktion (MCI) ist eine interdisziplinäre Herausforderung und ein für die Informatik und die jeweiligen Anwendungsdomänen ein zunehmend an Bedeutung gewinnendes Thema. Dieses Kapitel bietet eine Einfüh-rung in das Lehr- und Fachbuch „Sicherheitskritische Mensch-Computer-Interaktion – Interaktive Technologien und Soziale Medien im Krisen- und Sicherheitsmanagement“. Als didaktisch aufbereiteter, umfassender Überblick über Grundlagen, Methoden und Anwendungsgebiete soll es sowohl als vorlesungsbegleitende Lektüre als auch als Nach-schlagewerk für Personen aus Wissenschaft, Design und Entwicklung dienen. Dies ad-ressierend werden interaktive, mobile, ubiquitäre und kooperative Technologien sowie soziale Medien vorgestellt. Hierbei finden klassische Themen wie benutzbare (IT-)Sicherheit, Industrie 4.0, Katastrophenschutz, Medizin und Automobil, aber auch Augmented Reality, Crowdsourcing, Shitstorm Management, Social Media Analytics und Cyberwar ihren Platz. Methodisch wird das Spektrum von Usable Safety bis Usable Security Engineering, von Analyse über Design bis Evaluation abgedeckt.

    @incollection{reuter_einleitung_2021,
    address = {Wiesbaden, Germany},
    edition = {2},
    title = {Einleitung in die sicherheitskritische {Mensch}-{Computer}-{Interaktion}},
    isbn = {978-3-658-32794-1},
    url = {https://doi.org/10.1007/978-3-658-32795-8_1},
    abstract = {Die sicherheitskritische Mensch-Computer-Interaktion (MCI) ist eine interdisziplinäre Herausforderung und ein für die Informatik und die jeweiligen Anwendungsdomänen ein zunehmend an Bedeutung gewinnendes Thema. Dieses Kapitel bietet eine Einfüh-rung in das Lehr- und Fachbuch „Sicherheitskritische Mensch-Computer-Interaktion – Interaktive Technologien und Soziale Medien im Krisen- und Sicherheitsmanagement“. Als didaktisch aufbereiteter, umfassender Überblick über Grundlagen, Methoden und Anwendungsgebiete soll es sowohl als vorlesungsbegleitende Lektüre als auch als Nach-schlagewerk für Personen aus Wissenschaft, Design und Entwicklung dienen. Dies ad-ressierend werden interaktive, mobile, ubiquitäre und kooperative Technologien sowie soziale Medien vorgestellt. Hierbei finden klassische Themen wie benutzbare (IT-)Sicherheit, Industrie 4.0, Katastrophenschutz, Medizin und Automobil, aber auch Augmented Reality, Crowdsourcing, Shitstorm Management, Social Media Analytics und Cyberwar ihren Platz. Methodisch wird das Spektrum von Usable Safety bis Usable Security Engineering, von Analyse über Design bis Evaluation abgedeckt.},
    booktitle = {Sicherheitskritische {Mensch}-{Computer}-{Interaktion}: {Interaktive} {Technologien} und {Soziale} {Medien} im {Krisen}- und {Sicherheitsmanagement} ({Zweite} {Auflage})},
    publisher = {Springer Vieweg},
    author = {Reuter, Christian},
    editor = {Reuter, Christian},
    year = {2021},
    keywords = {Crisis, HCI, UsableSec, Security, Projekt-CYWARN},
    pages = {3--17},
    }

  • Christian Reuter, Marc-André Kaufhold (2021)
    Soziale Medien in Notfällen, Krisen und Katastrophen
    In: Christian ReuterSicherheitskritische Mensch-Computer-Interaktion: Interaktive Technologien und Soziale Medien im Krisen- und Sicherheitsmanagement (Zweite Auflage). 2 ed. Wiesbaden, Germany: Springer Vieweg, , 407–430.
    [BibTeX] [Abstract] [Download PDF]

    Die Nutzung sozialer Medien hat sich nicht nur im Alltag, sondern auch in vielen ver-schiedenen Notfällen, Krisen und Katastrophen etabliert. Dieser Prozess begann bereits vor etwa 20 Jahren nach den Terroranschlägen vom 11. September 2001. In den darauf-folgenden Jahren, vor allem aber dem letzten Jahrzehnt, wurde eine Vielzahl von Stu-dien veröffentlicht, die sich auf den Gebrauch von Informations- und Kommunikations-technologien einschließlich der sozialen Medien vor, während oder nach Notfällen kon-zentrieren. Dieser Forschungsbereich wird auch unter dem Begriff Crisis Informatics zusammengefasst. Das Ziel dieses Kapitels ist es, den Gebrauch von und die Forschung über soziale Medien in Katastrophen und Notfällen in den vergangenen 20 Jahren mit besonderem Schwerpunkt auf identifizierbare Nutzungsmuster und deren Wahrnehmung zusammenzufassen, um die bisherigen Ergebnisse und zukünftigen Potenziale herauszu-stellen.

    @incollection{reuter_soziale_2021,
    address = {Wiesbaden, Germany},
    edition = {2},
    title = {Soziale {Medien} in {Notfällen}, {Krisen} und {Katastrophen}},
    isbn = {978-3-658-32794-1},
    url = {https://doi.org/10.1007/978-3-658-32795-8_19},
    abstract = {Die Nutzung sozialer Medien hat sich nicht nur im Alltag, sondern auch in vielen ver-schiedenen Notfällen, Krisen und Katastrophen etabliert. Dieser Prozess begann bereits vor etwa 20 Jahren nach den Terroranschlägen vom 11. September 2001. In den darauf-folgenden Jahren, vor allem aber dem letzten Jahrzehnt, wurde eine Vielzahl von Stu-dien veröffentlicht, die sich auf den Gebrauch von Informations- und Kommunikations-technologien einschließlich der sozialen Medien vor, während oder nach Notfällen kon-zentrieren. Dieser Forschungsbereich wird auch unter dem Begriff Crisis Informatics zusammengefasst. Das Ziel dieses Kapitels ist es, den Gebrauch von und die Forschung über soziale Medien in Katastrophen und Notfällen in den vergangenen 20 Jahren mit besonderem Schwerpunkt auf identifizierbare Nutzungsmuster und deren Wahrnehmung zusammenzufassen, um die bisherigen Ergebnisse und zukünftigen Potenziale herauszu-stellen.},
    booktitle = {Sicherheitskritische {Mensch}-{Computer}-{Interaktion}: {Interaktive} {Technologien} und {Soziale} {Medien} im {Krisen}- und {Sicherheitsmanagement} ({Zweite} {Auflage})},
    publisher = {Springer Vieweg},
    author = {Reuter, Christian and Kaufhold, Marc-André},
    editor = {Reuter, Christian},
    year = {2021},
    keywords = {Crisis, Security, Peace, Projekt-CYWARN},
    pages = {407--430},
    }

  • Christian Reuter, Konstantin Aal, Frank Beham, Alexander Boden, Florian Brauner, Thomas Ludwig, Stephan Lukosch, Frank Fiedrich, Frank Fuchs-Kittowski, Stefan Geisler, Klaus Gennen, Dominik Herrmann, Marc-André Kaufhold, Michael Klafft, Myriam Lipprandt, Luigi Lo Iacono, Volkmar Pipek, Tilo Mentler, Simon Nestler, Jens Pottebaum, Sven Quadflieg, Stefan Stieglitz, Christian Sturm, Gebhard Rusch, Stefan Sackmann, Melanie Volkamer, Volker Wulf (2021)
    Die Zukunft sicherheitskritischer Mensch-Computer-Interaktion
    In: Christian ReuterSicherheitskritische Mensch-Computer-Interaktion: Interaktive Technologien und Soziale Medien im Krisen- und Sicherheitsmanagement (2. Auflage). 2 ed. Wiesbaden, Germany: Springer Vieweg, , 673–681.
    [BibTeX] [Abstract] [Download PDF]

    Sicherheitskritische Mensch-Computer-Interaktion ist nicht nur derzeit ein hochaktuel-les Thema, sondern wird dies auch in Zukunft bleiben. Insofern ist ein Lehr- und Fach-buch wie dieses immer nur eine Momentaufnahme, und kann immer nur einen punktuel-len Stand abdecken. Dennoch kann der Versuch unternommen werden, aktuelle Trends zu identifizieren und einen Ausblick in die Zukunft zu wagen. Genau das möchte dieses Kapitel erreichen: Es sollen zukünftige Entwicklungen vorausgesagt und versucht wer-den, diese korrekt einzuordnen. Das ist an dieser Stelle nicht nur durch den Herausgeber, sondern durch Abfrage bei zahlreichen am Lehrbuch beteiligten Autor*innen geschehen. Neben einem Ausblick auf Grundlagen und Methoden werden dementsprechend auch sicherheitskritische interaktive Systeme und sicherheitskritische kooperative Systeme abgedeckt.

    @incollection{reuter_zukunft_2021,
    address = {Wiesbaden, Germany},
    edition = {2},
    title = {Die {Zukunft} sicherheitskritischer {Mensch}-{Computer}-{Interaktion}},
    isbn = {978-3-658-19523-6},
    url = {https://doi.org/10.1007/978-3-658-32795-8_31},
    abstract = {Sicherheitskritische Mensch-Computer-Interaktion ist nicht nur derzeit ein hochaktuel-les Thema, sondern wird dies auch in Zukunft bleiben. Insofern ist ein Lehr- und Fach-buch wie dieses immer nur eine Momentaufnahme, und kann immer nur einen punktuel-len Stand abdecken. Dennoch kann der Versuch unternommen werden, aktuelle Trends zu identifizieren und einen Ausblick in die Zukunft zu wagen. Genau das möchte dieses Kapitel erreichen: Es sollen zukünftige Entwicklungen vorausgesagt und versucht wer-den, diese korrekt einzuordnen. Das ist an dieser Stelle nicht nur durch den Herausgeber, sondern durch Abfrage bei zahlreichen am Lehrbuch beteiligten Autor*innen geschehen. Neben einem Ausblick auf Grundlagen und Methoden werden dementsprechend auch sicherheitskritische interaktive Systeme und sicherheitskritische kooperative Systeme abgedeckt.},
    booktitle = {Sicherheitskritische {Mensch}-{Computer}-{Interaktion}: {Interaktive} {Technologien} und {Soziale} {Medien} im {Krisen}- und {Sicherheitsmanagement} (2. {Auflage})},
    publisher = {Springer Vieweg},
    author = {Reuter, Christian and Aal, Konstantin and Beham, Frank and Boden, Alexander and Brauner, Florian and Ludwig, Thomas and Lukosch, Stephan and Fiedrich, Frank and Fuchs-Kittowski, Frank and Geisler, Stefan and Gennen, Klaus and Herrmann, Dominik and Kaufhold, Marc-André and Klafft, Michael and Lipprandt, Myriam and Lo Iacono, Luigi and Pipek, Volkmar and Mentler, Tilo and Nestler, Simon and Pottebaum, Jens and Quadflieg, Sven and Stieglitz, Stefan and Sturm, Christian and Rusch, Gebhard and Sackmann, Stefan and Volkamer, Melanie and Wulf, Volker},
    editor = {Reuter, Christian},
    year = {2021},
    note = {https://doi.org/10.1007/978-3-658-32795-8\_31},
    keywords = {Crisis, HCI, SocialMedia, UsableSec, Security, Projekt-KontiKat, Projekt-CYWARN},
    pages = {673--681},
    }

  • Christian Reuter, Marc-André Kaufhold (2021)
    Informatik für Frieden-, Konflikt- und Sicherheitsforschung
    In: Christian ReuterSicherheitskritische Mensch-Computer-Interaktion: Interaktive Technologien und Soziale Medien im Krisen- und Sicherheitsmanagement (Zweite Auflage). 2 ed. Wiesbaden, Germany: Springer Vieweg, , 605–630.
    [BibTeX] [Abstract] [Download PDF]

    Seit jeher hatten die Erkenntnisse aus Naturwissenschaft und Technik einen großen Einfluss auf die Art und Weise, wie Kriege und Konflikte ausgetragen wurden bezie-hungsweise werden. Im Kontext von Frieden und Sicherheit können Erkenntnisse, die eigentlich für zivile Kontexte gewonnen wurden, auch für militärische Auseinanderset-zungen genutzt werden (Dual-Use-Problematik). Seit einigen Jahren betrifft dies insbe-sondere die Informatik, die durch die militärische Nutzung von Computern, Cyberwar, Cyberspionage Information Warfare, aber auch in Bereichen wie Desinformationen kon-fliktäre Auseinandersetzungen unterstützen (und verstärken) kann. Auch werden Kon-flikte vermehrt im digitalen Raum ausgetragen, mit erschwerter Zuordnungsmöglichkeit von einzelnen (angreifenden) Akteur*innen. Im Gegenzug dazu bietet die Informatik jedoch auch für friedensstiftende Aktivitäten zahlreiche Einsatzmöglichkeiten. Dieses Kapitel möchte eine Einführung in die zunehmend an Bedeutung gewinnende Thematik liefern.

    @incollection{reuter_informatik_2021,
    address = {Wiesbaden, Germany},
    edition = {2},
    title = {Informatik für {Frieden}-, {Konflikt}- und {Sicherheitsforschung}},
    isbn = {978-3-658-32794-1},
    url = {https://doi.org/10.1007/978-3-658-32795-8_28},
    abstract = {Seit jeher hatten die Erkenntnisse aus Naturwissenschaft und Technik einen großen Einfluss auf die Art und Weise, wie Kriege und Konflikte ausgetragen wurden bezie-hungsweise werden. Im Kontext von Frieden und Sicherheit können Erkenntnisse, die eigentlich für zivile Kontexte gewonnen wurden, auch für militärische Auseinanderset-zungen genutzt werden (Dual-Use-Problematik). Seit einigen Jahren betrifft dies insbe-sondere die Informatik, die durch die militärische Nutzung von Computern, Cyberwar, Cyberspionage Information Warfare, aber auch in Bereichen wie Desinformationen kon-fliktäre Auseinandersetzungen unterstützen (und verstärken) kann. Auch werden Kon-flikte vermehrt im digitalen Raum ausgetragen, mit erschwerter Zuordnungsmöglichkeit von einzelnen (angreifenden) Akteur*innen. Im Gegenzug dazu bietet die Informatik jedoch auch für friedensstiftende Aktivitäten zahlreiche Einsatzmöglichkeiten. Dieses Kapitel möchte eine Einführung in die zunehmend an Bedeutung gewinnende Thematik liefern.},
    booktitle = {Sicherheitskritische {Mensch}-{Computer}-{Interaktion}: {Interaktive} {Technologien} und {Soziale} {Medien} im {Krisen}- und {Sicherheitsmanagement} ({Zweite} {Auflage})},
    publisher = {Springer Vieweg},
    author = {Reuter, Christian and Kaufhold, Marc-André},
    editor = {Reuter, Christian},
    year = {2021},
    keywords = {Security, Peace, Projekt-DualUse, Projekt-CYWARN},
    pages = {605--630},
    }

  • Philipp Kuehn, Markus Bayer, Marc Wendelborn, Christian Reuter (2021)
    OVANA: An Approach to Analyze and Improve the Information Quality of Vulnerability Databases
    Proceedings of the 16th International Conference on Availability, Reliability and Security (ARES 2021) . doi:10.1145/3465481.3465744
    [BibTeX] [Abstract] [Download PDF]

    Vulnerability databases are one of the main information sources for IT security experts. Hence, the quality of their information is of utmost importance for anyone working in this area. Previous work has shown that machine readable information is either missing, incorrect, or inconsistent with other data sources. In this paper, we introduce a system called Overt Vulnerability source ANAlysis (OVANA), utilizing state-of-the-art machine learning (ML) and natural-language processing (NLP) techniques, which analyzes the information quality (IQ) of vulnerability databases, searches the free-form description for relevant information missing from structured fields, and updates it accordingly. Our paper shows that OVANA is able to improve the IQ of the National Vulnerability Database by 51.23\% based on the indicators of accuracy, completeness, and uniqueness. Moreover, we present information which should be incorporated into the structured fields to increase the uniqueness of vulnerability entries and improve the discriminability of different vulnerability entries. The identified information from OVANA enables a more targeted vulnerability search and provides guidance for IT security experts in finding relevant information in vulnerability descriptions for severity assessment.

    @inproceedings{kuehn_ovana_2021,
    title = {{OVANA}: {An} {Approach} to {Analyze} and {Improve} the {Information} {Quality} of {Vulnerability} {Databases}},
    isbn = {978-1-4503-9051-4},
    url = {https://peasec.de/paper/2021/2021_KuehnBayerWendelbornReuter_OVANAQualityVulnerabilityDatabases_ARES.pdf},
    doi = {10.1145/3465481.3465744},
    abstract = {Vulnerability databases are one of the main information sources for IT security experts. Hence, the quality of their information is of utmost importance for anyone working in this area. Previous work has shown that machine readable information is either missing, incorrect, or inconsistent with other data sources. In this paper, we introduce a system called Overt Vulnerability source ANAlysis (OVANA), utilizing state-of-the-art machine learning (ML) and natural-language processing (NLP) techniques, which analyzes the information quality (IQ) of vulnerability databases, searches the free-form description for relevant information missing from structured fields, and updates it accordingly. Our paper shows that OVANA is able to improve the IQ of the National Vulnerability Database by 51.23\% based on the indicators of accuracy, completeness, and uniqueness. Moreover, we present information which should be incorporated into the structured fields to increase the uniqueness of vulnerability entries and improve the discriminability of different vulnerability entries. The identified information from OVANA enables a more targeted vulnerability search and provides guidance for IT security experts in finding relevant information in vulnerability descriptions for severity assessment.},
    booktitle = {Proceedings of the 16th {International} {Conference} on {Availability}, {Reliability} and {Security} ({ARES} 2021)},
    publisher = {ACM},
    author = {Kuehn, Philipp and Bayer, Markus and Wendelborn, Marc and Reuter, Christian},
    year = {2021},
    keywords = {Security, Peace, Ranking-CORE-B, AuswahlPeace, Projekt-ATHENE-SecUrban, Projekt-CYWARN},
    pages = {1--11},
    }

  • Tilo Mentler, Christian Reuter, Simon Nestler, Marc-André Kaufhold, Michael Herczeg, Jens Pottebaum (2021)
    8. Workshop Mensch-Maschine-Interaktion in sicherheitskritischen Systemen: Ausnahmezustand
    Mensch und Computer – Workshopband Ingolstadt. doi:10.18420/muc2021-mci-ws08-117
    [BibTeX] [Abstract] [Download PDF]

    Im Zentrum dieses Workshops steht die Interaktion von Mensch und Technik in sicherheitskritischen Kontexten. Hierzu zählen Anwendungsfelder, die bereits seit vielen Jahren Gegenstand der Forschung und Entwicklung sind. Beispiele sind Katastrophen-schutz oder Medizin, aber auch kritische Infrastrukturen. In die-sen und vielen weiteren Bereichen gilt, dass sichere Systemzu-stände nur durch die ganzheitliche Betrachtung von Mensch, Technik und Organisation gewährleistet bzw. schnellstmöglich wieder erreicht werden können. In diesem Zusammenhang ist der Workshop auch der Nutzbarkeit und Akzeptanz von Sicher-heitskonzepten sowie einer bewussteren Auseinandersetzung der Nutzenden mit diesem Thema gewidmet. Dieser Beitrag stellt die Themenkomplexe des Workshops, die angenommenen Bei-träge und das Organisationsteam vor.

    @inproceedings{mentler_8_2021,
    address = {Ingolstadt},
    title = {8. {Workshop} {Mensch}-{Maschine}-{Interaktion} in sicherheitskritischen {Systemen}: {Ausnahmezustand}},
    url = {https://dl.gi.de/handle/20.500.12116/37338},
    doi = {10.18420/muc2021-mci-ws08-117},
    abstract = {Im Zentrum dieses Workshops steht die Interaktion von Mensch und Technik in sicherheitskritischen Kontexten. Hierzu zählen Anwendungsfelder, die bereits seit vielen Jahren Gegenstand der Forschung und Entwicklung sind. Beispiele sind Katastrophen-schutz oder Medizin, aber auch kritische Infrastrukturen. In die-sen und vielen weiteren Bereichen gilt, dass sichere Systemzu-stände nur durch die ganzheitliche Betrachtung von Mensch, Technik und Organisation gewährleistet bzw. schnellstmöglich wieder erreicht werden können. In diesem Zusammenhang ist der Workshop auch der Nutzbarkeit und Akzeptanz von Sicher-heitskonzepten sowie einer bewussteren Auseinandersetzung der Nutzenden mit diesem Thema gewidmet. Dieser Beitrag stellt die Themenkomplexe des Workshops, die angenommenen Bei-träge und das Organisationsteam vor.},
    booktitle = {Mensch und {Computer} - {Workshopband}},
    publisher = {Gesellschaft für Informatik e.V.},
    author = {Mentler, Tilo and Reuter, Christian and Nestler, Simon and Kaufhold, Marc-André and Herczeg, Michael and Pottebaum, Jens},
    year = {2021},
    keywords = {HCI, Security, Projekt-CYWARN},
    }

  • Markus Bayer, Marc-André Kaufhold, Christian Reuter (2021)
    Information Overload in Crisis Management: Bilingual Evaluation of Embedding Models for Clustering Social Media Posts in Emergencies
    Proceedings of the European Conference on Information Systems (ECIS) .
    [BibTeX] [Abstract] [Download PDF]

    Past studies in the domains of information systems have analysed the potentials and barriers of social media in emergencies. While information disseminated in social media can lead to valuable insights, emergency services and researchers face the challenge of information overload as data quickly exceeds the manageable amount. We propose an embedding-based clustering approach and a method for the automated labelling of clusters. Given that the clustering quality is highly dependent on embeddings, we evaluate 19 embedding models with respect to time, internal cluster quality, and language invariance. The results show that it may be sensible to use embedding models that were already trained on other crisis datasets. However, one must ensure that the training data generalizes enough, so that the clustering can adapt to new situations. Confirming this, we found out that some embeddings were not able to perform as well on a German dataset as on an English dataset.

    @inproceedings{bayer_information_2021,
    title = {Information {Overload} in {Crisis} {Management}: {Bilingual} {Evaluation} of {Embedding} {Models} for {Clustering} {Social} {Media} {Posts} in {Emergencies}},
    url = {https://peasec.de/paper/2021/2021_BayerKaufholdReuter_InformationOverloadInCrisisManagementBilingualEvaluation_ECIS.pdf},
    abstract = {Past studies in the domains of information systems have analysed the potentials and barriers of social media in emergencies. While information disseminated in social media can lead to valuable insights, emergency services and researchers face the challenge of information overload as data quickly exceeds the manageable amount. We propose an embedding-based clustering approach and a method for the automated labelling of clusters. Given that the clustering quality is highly dependent on embeddings, we evaluate 19 embedding models with respect to time, internal cluster quality, and language invariance. The results show that it may be sensible to use embedding models that were already trained on other crisis datasets. However, one must ensure that the training data generalizes enough, so that the clustering can adapt to new situations. Confirming this, we found out that some embeddings were not able to perform as well on a German dataset as on an English dataset.},
    booktitle = {Proceedings of the {European} {Conference} on {Information} {Systems} ({ECIS})},
    author = {Bayer, Markus and Kaufhold, Marc-André and Reuter, Christian},
    year = {2021},
    keywords = {Crisis, SocialMedia, A-Paper, Ranking-CORE-A, Projekt-ATHENE-SecUrban, Projekt-CYWARN},
    pages = {1--18},
    }

  • Marc-André Kaufhold, Markus Bayer, Daniel Hartung, Christian Reuter (2021)
    Design and Evaluation of Deep Learning Models for Real-Time Credibility Assessment in Twitter
    30th International Conference on Artificial Neural Networks (ICANN2021) Bratislava. doi:https://doi.org/10.1007/978-3-030-86383-8_32
    [BibTeX] [Abstract] [Download PDF]

    Social media have an enormous impact on modern life but are prone to the dissemination of false information. In several domains, such as crisis management or political communication, it is of utmost importance to detect false and to promote credible information. Although educational measures might help individuals to detect false information, the sheer volume of social big data, which sometimes need to be anal- ysed under time-critical constraints, calls for automated and (near) real- time assessment methods. Hence, this paper reviews existing approaches before designing and evaluating three deep learning models (MLP, RNN, BERT) for real-time credibility assessment using the example of Twitter posts. While our BERT implementation achieved best results with an accuracy of up to 87.07\% and an F1 score of 0.8764 when using meta- data, text, and user features, MLP and RNN showed lower classification quality but better performance for real-time application. Furthermore, the paper contributes with a novel dataset for credibility assessment.

    @inproceedings{kaufhold_design_2021,
    address = {Bratislava},
    title = {Design and {Evaluation} of {Deep} {Learning} {Models} for {Real}-{Time} {Credibility} {Assessment} in {Twitter}},
    url = {https://peasec.de/paper/2021/2021_KaufholdBayerHartungReuter_DeepLearningCredibilityAssessmentTwitter_ICANN.pdf},
    doi = {https://doi.org/10.1007/978-3-030-86383-8_32},
    abstract = {Social media have an enormous impact on modern life but are prone to the dissemination of false information. In several domains, such as crisis management or political communication, it is of utmost importance to detect false and to promote credible information. Although educational measures might help individuals to detect false information, the sheer volume of social big data, which sometimes need to be anal- ysed under time-critical constraints, calls for automated and (near) real- time assessment methods. Hence, this paper reviews existing approaches before designing and evaluating three deep learning models (MLP, RNN, BERT) for real-time credibility assessment using the example of Twitter posts. While our BERT implementation achieved best results with an accuracy of up to 87.07\% and an F1 score of 0.8764 when using meta- data, text, and user features, MLP and RNN showed lower classification quality but better performance for real-time application. Furthermore, the paper contributes with a novel dataset for credibility assessment.},
    booktitle = {30th {International} {Conference} on {Artificial} {Neural} {Networks} ({ICANN2021})},
    author = {Kaufhold, Marc-André and Bayer, Markus and Hartung, Daniel and Reuter, Christian},
    year = {2021},
    keywords = {Student, Security, Ranking-CORE-B, Projekt-ATHENE-SecUrban, Projekt-CYWARN},
    pages = {1--13},
    }

  • Marc-André Kaufhold, Jennifer Fromm, Thea Riebe, Milad Mirbabaie, Philipp Kuehn, Ali Sercan Basyurt, Markus Bayer, Marc Stöttinger, Kaan Eyilmez, Reinhard Möller, Christoph Fuchß, Stefan Stieglitz, Christian Reuter (2021)
    CYWARN: Strategy and Technology Development for Cross-Platform Cyber Situational Awareness and Actor-Specific Cyber Threat Communication
    Mensch und Computer – Workshopband Bonn. doi:10.18420/muc2021-mci-ws08-263
    [BibTeX] [Abstract] [Download PDF]

    Despite the merits of digitisation in private and professional spaces, critical infrastructures and societies are increasingly ex-posed to cyberattacks. Thus, Computer Emergency Response Teams (CERTs) are deployed in many countries and organisations to enhance the preventive and reactive capabilities against cyberattacks. However, their tasks are getting more complex by the increasing amount and varying quality of information dissem-inated into public channels. Adopting the perspectives of Crisis Informatics and safety-critical Human-Computer Interaction (HCI) and based on both a narrative literature review and group discussions, this paper first outlines the research agenda of the CYWARN project, which seeks to design strategies and technolo-gies for cross-platform cyber situational awareness and actor-spe-cific cyber threat communication. Second, it identifies and elabo-rates eight research challenges with regard to the monitoring, analysis and communication of cyber threats in CERTs, which serve as a starting point for in-depth research within the project.

    @inproceedings{kaufhold_cywarn_2021,
    address = {Bonn},
    series = {Mensch und {Computer} 2021 - {Workshopband}},
    title = {{CYWARN}: {Strategy} and {Technology} {Development} for {Cross}-{Platform} {Cyber} {Situational} {Awareness} and {Actor}-{Specific} {Cyber} {Threat} {Communication}},
    url = {https://dl.gi.de/server/api/core/bitstreams/8f470f6b-5050-4fb9-b923-d08cf84c17b7/content},
    doi = {10.18420/muc2021-mci-ws08-263},
    abstract = {Despite the merits of digitisation in private and professional spaces, critical infrastructures and societies are increasingly ex-posed to cyberattacks. Thus, Computer Emergency Response Teams (CERTs) are deployed in many countries and organisations to enhance the preventive and reactive capabilities against cyberattacks. However, their tasks are getting more complex by the increasing amount and varying quality of information dissem-inated into public channels. Adopting the perspectives of Crisis Informatics and safety-critical Human-Computer Interaction (HCI) and based on both a narrative literature review and group discussions, this paper first outlines the research agenda of the CYWARN project, which seeks to design strategies and technolo-gies for cross-platform cyber situational awareness and actor-spe-cific cyber threat communication. Second, it identifies and elabo-rates eight research challenges with regard to the monitoring, analysis and communication of cyber threats in CERTs, which serve as a starting point for in-depth research within the project.},
    booktitle = {Mensch und {Computer} - {Workshopband}},
    publisher = {Gesellschaft für Informatik},
    author = {Kaufhold, Marc-André and Fromm, Jennifer and Riebe, Thea and Mirbabaie, Milad and Kuehn, Philipp and Basyurt, Ali Sercan and Bayer, Markus and Stöttinger, Marc and Eyilmez, Kaan and Möller, Reinhard and Fuchß, Christoph and Stieglitz, Stefan and Reuter, Christian},
    year = {2021},
    keywords = {Security, Projekt-CYWARN},
    }

  • Marc-André Kaufhold, Christian Reuter, Tina Comes, Milad Mirbabaie, Stefan Stieglitz (2021)
    2nd Workshop on Mobile Resilience: Designing Mobile Interactive Systems for Crisis Response
    MobileHCI ’21: 23nd International Conference on Human-Computer Interaction with Mobile Devices and Services . doi:10.1145/3447527.3474869
    [BibTeX] [Abstract] [Download PDF]

    Information and communication technologies (ICT), including artificial intelligence, internet of things, and mobile applications, can be utilized to tackle important societal challenges, such as the ongoing COVID-19 pandemic. While they may increase societal resilience, their design, functionality, and underlying infrastructures must be resilient against disruptions caused by anthropogenic, natural and hybrid crises, emergencies, and threats. In order to research challenges, designs, and potentials of interactive technologies, the second iteration of the workshop investigates the space of mobile technologies and resilient systems for crisis response, including the application domains of cyber threat and pandemic response.

    @article{kaufhold_2nd_2021,
    series = {{MobileHCI} '21 {Adjunct}},
    title = {2nd {Workshop} on {Mobile} {Resilience}: {Designing} {Mobile} {Interactive} {Systems} for {Crisis} {Response}},
    url = {https://peasec.de/paper/2021/2021_KaufholdReuterComesMirbabaieStieglitz_2ndWorkshopMobileResilience_MobileHCI.pdf},
    doi = {10.1145/3447527.3474869},
    abstract = {Information and communication technologies (ICT), including artificial intelligence, internet of things, and mobile applications, can be utilized to tackle important societal challenges, such as the ongoing COVID-19 pandemic. While they may increase societal resilience, their design, functionality, and underlying infrastructures must be resilient against disruptions caused by anthropogenic, natural and hybrid crises, emergencies, and threats. In order to research challenges, designs, and potentials of interactive technologies, the second iteration of the workshop investigates the space of mobile technologies and resilient systems for crisis response, including the application domains of cyber threat and pandemic response.},
    journal = {MobileHCI '21: 23nd International Conference on Human-Computer Interaction with Mobile Devices and Services},
    author = {Kaufhold, Marc-André and Reuter, Christian and Comes, Tina and Mirbabaie, Milad and Stieglitz, Stefan},
    year = {2021},
    keywords = {Crisis, Projekt-CYWARN},
    }

  • Marc-André Kaufhold (2021)
    Information Refinement Technologies for Crisis Informatics: User Expectations and Design Principles for Social Media and Mobile Apps
    Wiesbaden, Germany: Springer Vieweg. doi:10.1007/978-3-658-33341-6
    [BibTeX] [Abstract] [Download PDF]

    Marc-André Kaufhold explores user expectations and design implications for the utilization of new media in crisis management and response. He develops a novel framework for information refinement, which integrates the event, organisational, societal, and technological perspectives of crises. Therefore, he reviews the state of the art on crisis informatics and empirically examines the use, potentials and barriers of both social media and mobile apps. Based on these insights, he designs and evaluates ICT concepts and artifacts with the aim to overcome the issues of information overload and quality in large-scale crises, concluding with practical and theoretical implications for technology adaptation and design.

    @book{kaufhold_information_2021,
    address = {Wiesbaden, Germany},
    title = {Information {Refinement} {Technologies} for {Crisis} {Informatics}: {User} {Expectations} and {Design} {Principles} for {Social} {Media} and {Mobile} {Apps}},
    isbn = {978-3-658-33343-0},
    url = {https://www.springer.com/gp/book/9783658333430},
    abstract = {Marc-André Kaufhold explores user expectations and design implications for the utilization of new media in crisis management and response. He develops a novel framework for information refinement, which integrates the event, organisational, societal, and technological perspectives of crises. Therefore, he reviews the state of the art on crisis informatics and empirically examines the use, potentials and barriers of both social media and mobile apps. Based on these insights, he designs and evaluates ICT concepts and artifacts with the aim to overcome the issues of information overload and quality in large-scale crises, concluding with practical and theoretical implications for technology adaptation and design.},
    publisher = {Springer Vieweg},
    author = {Kaufhold, Marc-André},
    year = {2021},
    doi = {10.1007/978-3-658-33341-6},
    keywords = {Crisis, Projekt-KontiKat, Projekt-ATHENE-SecUrban, Projekt-CYWARN, AuswahlKaufhold, Dissertation},
    }

  • Thea Riebe, Marc-André Kaufhold, Christian Reuter (2021)
    The Impact of Organizational Structure and Technology Use on Collaborative Practices in Computer Emergency Response Teams: An Empirical Study
    Proceedings of the ACM: Human Computer Interaction (PACM): Computer-Supported Cooperative Work and Social Computing ;5(CSCW2). doi:10.1145/3479865
    [BibTeX] [Abstract] [Download PDF]

    Besides the merits of increasing digitization and interconnectedness in private and professional spaces, critical infrastructures and societies are more and more exposed to cyberattacks. In order to enhance the preventative and reactive capabilities against cyberattacks, Computer Emergency Response Teams (CERTs) are deployed in many countries and organizations. In Germany, CERTs in the public sector operate on federal and state level to provide information security services for authorities, citizens, and enterprises. Their tasks of monitoring, analyzing, and communicating threats and incidents is getting more complex due to the increasing amount of information disseminated into public channels. By adopting the perspectives of Computer-Supported Cooperative Work (CSCW) and Crisis Informatics, we contribute to the study of organizational structures, technology use, and the impact on collaborative practices in and between state CERTs with empirical research based on expert interviews with representatives of German state CERTs (N=15) and supplementary document analyses (N=25). We derive design and policy implications from our findings, including the need for interoperable and modular architecture, a shift towards service level agreements, cross-platform monitoring and analysis of incident data, use of deduplication techniques and standardized threat exchange formats, a reduction of resource costs through process automation, and transparent reporting and tool structures for information exchange.

    @article{riebe_impact_2021,
    title = {The {Impact} of {Organizational} {Structure} and {Technology} {Use} on {Collaborative} {Practices} in {Computer} {Emergency} {Response} {Teams}: {An} {Empirical} {Study}},
    volume = {5},
    url = {https://www.peasec.de/paper/2021/2021_RiebeKaufholdReuter_ComputerEmegencyResponseTeams_CSCW.pdf},
    doi = {10.1145/3479865},
    abstract = {Besides the merits of increasing digitization and interconnectedness in private and professional spaces, critical infrastructures and societies are more and more exposed to cyberattacks. In order to enhance the preventative and reactive capabilities against cyberattacks, Computer Emergency Response Teams (CERTs) are deployed in many countries and organizations. In Germany, CERTs in the public sector operate on federal and state level to provide information security services for authorities, citizens, and enterprises. Their tasks of monitoring, analyzing, and communicating threats and incidents is getting more complex due to the increasing amount of information disseminated into public channels. By adopting the perspectives of Computer-Supported Cooperative Work (CSCW) and Crisis Informatics, we contribute to the study of organizational structures, technology use, and the impact on collaborative practices in and between state CERTs with empirical research based on expert interviews with representatives of German state CERTs (N=15) and supplementary document analyses (N=25). We derive design and policy implications from our findings, including the need for interoperable and modular architecture, a shift towards service level agreements, cross-platform monitoring and analysis of incident data, use of deduplication techniques and standardized threat exchange formats, a reduction of resource costs through process automation, and transparent reporting and tool structures for information exchange.},
    number = {CSCW2},
    journal = {Proceedings of the ACM: Human Computer Interaction (PACM): Computer-Supported Cooperative Work and Social Computing},
    author = {Riebe, Thea and Kaufhold, Marc-André and Reuter, Christian},
    year = {2021},
    keywords = {Crisis, UsableSec, Security, A-Paper, Ranking-CORE-A, Projekt-KontiKat, Projekt-ATHENE-SecUrban, Projekt-CYWARN, AuswahlUsableSec, AuswahlKaufhold},
    }

  • Thea Riebe, Tristan Wirth, Markus Bayer, Philipp Kuehn, Marc-André Kaufhold, Volker Knauthe, Stefan Guthe, Christian Reuter (2021)
    CySecAlert: An Alert Generation System for Cyber Security Events Using Open Source Intelligence Data
    Information and Communications Security (ICICS) . doi:10.1007/978-3-030-86890-1_24
    [BibTeX] [Abstract] [Download PDF]

    Receiving relevant information on possible cyber threats, attacks, and data breaches in a timely manner is crucial for early response. The social media platform Twitter hosts an active cyber security community. Their activities are often monitored manually by security experts, such as Computer Emergency Response Teams (CERTs). We thus propose a Twitter-based alert generation system that issues alerts to a system operator as soon as new relevant cyber security related topics emerge. Thereby, our system allows us to monitor user accounts with significantly less workload. Our system applies a supervised classifier, based on active learning, that detects tweets containing relevant information. The results indicate that uncertainty sampling can reduce the amount of manual relevance classification effort and enhance the classifier performance substantially compared to random sampling. Our approach reduces the number of accounts and tweets that are needed for the classifier training, thus making the tool easily and rapidly adaptable to the specific context while also supporting data minimization for Open Source Intelligence (OSINT). Relevant tweets are clustered by a greedy stream clustering algorithm in order to identify significant events. The proposed system is able to work near real-time within the required 15-minutes time frame and detects up to 93.8\% of relevant events with a false alert rate of 14.81\%.

    @inproceedings{riebe_cysecalert_2021,
    title = {{CySecAlert}: {An} {Alert} {Generation} {System} for {Cyber} {Security} {Events} {Using} {Open} {Source} {Intelligence} {Data}},
    url = {https://peasec.de/paper/2021/2021_RiebeWirthBayerKuehnKaufholdKnautheGutheReuter_CySecAlertOpenSourceIntelligence_ICICS.pdf},
    doi = {10.1007/978-3-030-86890-1_24},
    abstract = {Receiving relevant information on possible cyber threats, attacks, and data breaches in a timely manner is crucial for early response. The social media platform Twitter hosts an active cyber security community. Their activities are often monitored manually by security experts, such as Computer Emergency Response Teams (CERTs). We thus propose a Twitter-based alert generation system that issues alerts to a system operator as soon as new relevant cyber security related topics emerge. Thereby, our system allows us to monitor user accounts with significantly less workload. Our system applies a supervised classifier, based on active learning, that detects tweets containing relevant information. The results indicate that uncertainty sampling can reduce the amount of manual relevance classification effort and enhance the classifier performance substantially compared to random sampling. Our approach reduces the number of accounts and tweets that are needed for the classifier training, thus making the tool easily and rapidly adaptable to the specific context while also supporting data minimization for Open Source Intelligence (OSINT). Relevant tweets are clustered by a greedy stream clustering algorithm in order to identify significant events. The proposed system is able to work near real-time within the required 15-minutes time frame and detects up to 93.8\% of relevant events with a false alert rate of 14.81\%.},
    booktitle = {Information and {Communications} {Security} ({ICICS})},
    author = {Riebe, Thea and Wirth, Tristan and Bayer, Markus and Kuehn, Philipp and Kaufhold, Marc-André and Knauthe, Volker and Guthe, Stefan and Reuter, Christian},
    year = {2021},
    keywords = {Student, UsableSec, Security, Ranking-CORE-B, Projekt-ATHENE-SecUrban, Projekt-CYWARN},
    pages = {429--446},
    }

  • Rolf Egert, Nina Gerber, Jasmin Haunschild, Philipp Kuehn, Verena Zimmermann (2021)
    Towards Resilient Critical Infrastructures – Motivating Users to Contribute to Smart Grid Resilience
    i-com – Journal of Interactive Media ;20(2):161–175. doi:10.1515/icom-2021-0021
    [BibTeX] [Abstract] [Download PDF]

    Smart cities aim at improving efficiency while providing safety and security by merging conventional infrastructures with information and communication technology. One strategy for mitigating hazardous situations and improving the overall resilience of the system is to involve citizens. For instance, smart grids involve prosumers – capable of producing and consuming electricity – who can adjust their electricity profile dynamically (i.e., decrease or increase electricity consumption), or use their local production to supply electricity to the grid. This mitigates the impact of peak-consumption periods on the grid and makes it easier for operators to control the grid. This involvement of prosumers is accompanied by numerous socio-technical challenges, including motivating citizens to contribute by adjusting their electricity consumption to the requirements of the energy grid. Towards this end, this work investigates motivational strategies and tools, including nudging, persuasive technologies, and incentives, that can be leveraged to increase the motivation of citizens. We discuss long-term and side effects and ethical and privacy considerations, before portraying bug bounty programs, gamification and apps as technologies and strategies to communicate the motivational strategies to citizens.

    @article{egert_towards_2021,
    series = {i-com},
    title = {Towards {Resilient} {Critical} {Infrastructures} - {Motivating} {Users} to {Contribute} to {Smart} {Grid} {Resilience}},
    volume = {20},
    url = {https://www.degruyter.com/document/doi/10.1515/icom-2021-0021/html},
    doi = {10.1515/icom-2021-0021},
    abstract = {Smart cities aim at improving efficiency while providing safety and security by merging conventional infrastructures with information and communication technology. One strategy for mitigating hazardous situations and improving the overall resilience of the system is to involve citizens. For instance, smart grids involve prosumers - capable of producing and consuming electricity - who can adjust their electricity profile dynamically (i.e., decrease or increase electricity consumption), or use their local production to supply electricity to the grid. This mitigates the impact of peak-consumption periods on the grid and makes it easier for operators to control the grid. This involvement of prosumers is accompanied by numerous socio-technical challenges, including motivating citizens to contribute by adjusting their electricity consumption to the requirements of the energy grid. Towards this end, this work investigates motivational strategies and tools, including nudging, persuasive technologies, and incentives, that can be leveraged to increase the motivation of citizens. We discuss long-term and side effects and ethical and privacy considerations, before portraying bug bounty programs, gamification and apps as technologies and strategies to communicate the motivational strategies to citizens.},
    number = {2},
    journal = {i-com - Journal of Interactive Media},
    author = {Egert, Rolf and Gerber, Nina and Haunschild, Jasmin and Kuehn, Philipp and Zimmermann, Verena},
    year = {2021},
    keywords = {Security, Infrastructure, Projekt-ATHENE-SecUrban, Projekt-CYWARN, Projekt-emergenCITY},
    pages = {161--175},
    }

    2020

  • Christian Reuter, Marc-André Kaufhold, Tina Comes, Michèle Knodt, Max Mühlhäuser (2020)
    Mobile Resilience: Designing Mobile Interactive Systems for Societal and Technical Resilience
    MobileHCI ’20: 22nd International Conference on Human-Computer Interaction with Mobile Devices and Services . doi:10.1145/3406324.3424590
    [BibTeX] [Abstract] [Download PDF]

    Digitalization and interconnectedness, facilitated by the Internet of Things (IoT) and the widespread distribution of mobile devices, can be used to tackle important societal challenges. This is maybe most prominently visible in the response to the COVID-2019 Pandemic. However, the design of mobile technology, functionality and underlying infrastructures must be resilient against disruptions caused by man-made (e.g. bombings, hacking) and natural (e.g. earthquakes, hurricanes) crises, emergencies and threats. To explore challenges, designs and potentials of interactive technologies, this workshop investigates the overlapping space of mobile technologies and resilient systems, including future application domains such as smart cities.

    @inproceedings{reuter_mobile_2020,
    title = {Mobile {Resilience}: {Designing} {Mobile} {Interactive} {Systems} for {Societal} and {Technical} {Resilience}},
    url = {https://dl.acm.org/doi/pdf/10.1145/3406324.3424590},
    doi = {10.1145/3406324.3424590},
    abstract = {Digitalization and interconnectedness, facilitated by the Internet of Things (IoT) and the widespread distribution of mobile devices, can be used to tackle important societal challenges. This is maybe most prominently visible in the response to the COVID-2019 Pandemic. However, the design of mobile technology, functionality and underlying infrastructures must be resilient against disruptions caused by man-made (e.g. bombings, hacking) and natural (e.g. earthquakes, hurricanes) crises, emergencies and threats. To explore challenges, designs and potentials of interactive technologies, this workshop investigates the overlapping space of mobile technologies and resilient systems, including future application domains such as smart cities.},
    booktitle = {{MobileHCI} '20: 22nd {International} {Conference} on {Human}-{Computer} {Interaction} with {Mobile} {Devices} and {Services}},
    author = {Reuter, Christian and Kaufhold, Marc-André and Comes, Tina and Knodt, Michèle and Mühlhäuser, Max},
    year = {2020},
    keywords = {Crisis, HCI, SocialMedia, Ranking-CORE-B, Projekt-ATHENE-SecUrban, Projekt-CYWARN, Projekt-emergenCITY},
    pages = {1--3},
    }

  • Philipp Kuehn, Thea Riebe, Lynn Apelt, Max Jansen, Christian Reuter (2020)
    Sharing of Cyber Threat Intelligence between States
    S+F Sicherheit und Frieden / Peace and Security ;38(1):22–28. doi:10.5771/0175-274X-2020-1-22
    [BibTeX] [Abstract] [Download PDF]

    Threats in cyberspace have increased in recent years due to the increment of offensive capabilities by states. Approaches to mitigate the security dilemma in cyberspace within the UN are deadlocked, as states have not been able to achieve agreements. However, from the perspective of IT-Security, there are Cyber Threat Intelligence (CTI) platforms to share and analyze cyber threats for a collective crisis management. To investigate, whether or not CTI platforms can be used as a confidence-building measure between states and international organizations, we portray current CTI platforms, showcase political requirements, and answer the question of how CTI communication may contribute to confidence-building in international affairs. Our results suggest the need to further develop analytical capabilities, as well as the implementation of a broad social, political, and legal environment for international CTI sharing.

    @article{kuehn_sharing_2020,
    title = {Sharing of {Cyber} {Threat} {Intelligence} between {States}},
    volume = {38},
    url = {http://www.peasec.de/paper/2020/2020_KuehnRiebeApeltJansenReuter_SharingCyberThreatIntelligence_SF.pdf},
    doi = {10.5771/0175-274X-2020-1-22},
    abstract = {Threats in cyberspace have increased in recent years due to the increment of offensive capabilities by states. Approaches to mitigate the security dilemma in cyberspace within the UN are deadlocked, as states have not been able to achieve agreements. However, from the perspective of IT-Security, there are Cyber Threat Intelligence (CTI) platforms to share and analyze cyber threats for a collective crisis management. To investigate, whether or not CTI platforms can be used as a confidence-building measure between states and international organizations, we portray current CTI platforms, showcase political requirements, and answer the question of how CTI communication may contribute to confidence-building in international affairs. Our results suggest the need to further develop analytical capabilities, as well as the implementation of a broad social, political, and legal environment for international CTI sharing.},
    number = {1},
    journal = {S+F Sicherheit und Frieden / Peace and Security},
    author = {Kuehn, Philipp and Riebe, Thea and Apelt, Lynn and Jansen, Max and Reuter, Christian},
    year = {2020},
    keywords = {Student, Security, Peace, Projekt-DualUse, Cyberwar, Projekt-ATHENE-SecUrban, Projekt-CYWARN},
    pages = {22--28},
    }

  • Marc-André Kaufhold (2020)
    Information Refinement Technologies for Crisis Informatics: User Expectations and Design Implications for Social Media and Mobile Apps in Crisis
    Darmstadt, Germany: Dissertation (Dr. rer. nat.), Department of Computer Science, Technische Unviersität Darmstadt.
    [BibTeX] [Abstract] [Download PDF]

    In den letzten 20 Jahren haben sich mobile Technologien und soziale Medien nicht nur im Alltag, sondern auch in Krisensituationen etabliert. Insbesondere großflächige Ereignisse wie der Hurrikan Sandy (2012) oder das mitteleuropäische Hochwasser (2013) haben gezeigt, dass sich die Bevölkerung aktiv mit Informations- und Kommunikationstechnologie (IKT) an der Schadensbewältigung beteiligt (Reuter, Hughes, et al., 2018). Daraus ist das Forschungsfeld der Kriseninformatik entstanden, welches Wissen der Informatik und Gesellschaftswissenschaften kombiniert und zudem in Disziplinen wie der MenschMaschine-Interaktion (HCI), Computerunterstützten Gruppenarbeit (CSCW) und Wirtschaftsinformatik (WI) verankert ist. Während die Bevölkerung IKT einsetzt, um die Unsicherheiten in Krisen zu bewältigen, nutzen Behörden und Organisationen mit Sicherheitsaufgaben (BOS), etwa Feuerwehr und Polizei, öffentliche Daten, um das Situationsbewusstsein und die Entscheidungsfindung für eine bessere Schadensbewältigung zu verbessern (Palen & Anderson, 2016). Noch größere Katastrophen wie die aktuelle COVID-19-Pandemie verstärken dabei die Herausforderungen der Kriseninformatik (Xie et al., 2020). Für BOS stellt die umfangreiche Menge heterogener und semantisch verknüpfter Daten, auch Social Big Data genannt (Olshannikova et al., 2017), eine große Herausforderung im Hinblick auf die Qualität, Quantität und den Zugriff auf relevante Informationen dar. Um ein Situationsbewusstsein und nutzbare Informationen, d. h. die richtigen Informationen zur richtigen Zeit bei der richtigen Person, zu erhalten (Zade et al., 2018), müssen Informationen auf die Bedingungen des Ereignisses, organisationale Anforderungen, soziale Rahmenbedingungen und technische Möglichkeiten verfeinert werden. Diese Dissertation kombiniert das methodische Framework der Designfallstudien (Wulf et al., 2011) mit den Prinzipien der Design-Science-Forschung (Hevner et al., 2004), um das Thema der Informationsverfeinerung (Information Refinement) in vier Phasen zu untersuchen, wovon jede unterschiedliche Forschungsbeiträge hervorbringt. Die Arbeit begutachtet zunächst Nutzungs-, Rollen- und Wahrnehmungsmuster in der Kriseninformatik und stellt die Potenziale sozialer Medien zur öffentlichen Teilhabe an der Krisenbewältigung heraus. Die empirische Studien mit der deutschen Bevölkerung zeigen die positiven Einstellungen und die steigende Nutzung mobiler und sozialer Technologien in Krisen, stellen aber auch Barrieren heraus und zeigen die Erwartung, dass BOS in soziale Medien aktiv sind. Die Ergebnisse fundieren das Design innovativer IKT-Artefakte, darunter visuelle Bevölkerungsrichtlinien für soziale Medien in Krisen (SMG), ein Web-Interface für BOS zur Aggregation mobiler und sozialer Daten (ESI), ein Algorithmus zur Extraktion relevanter Informationen in sozialen Medien (SMO), und eine mobile App für die bidirektionale Kommunikation zwischen BOS und Bevölkerung (112.social). Die Evaluation der Artefakte involviert EndnutzerInnen aus dem Anwendungsfeld des Krisenmanagements, um potenziale für Verbesserungen und zukünftige Forschung zu identifizieren. Die Arbeit schließt mit einem Framework zur Informationsverfeinerung für die Kriseninformatik ab, welche die event-, gesellschafts-, organisation- und technologiebasierte Perspektive integriert.

    @book{kaufhold_information_2020,
    address = {Darmstadt, Germany},
    title = {Information {Refinement} {Technologies} for {Crisis} {Informatics}: {User} {Expectations} and {Design} {Implications} for {Social} {Media} and {Mobile} {Apps} in {Crisis}},
    url = {https://doi.org/10.26083/tuprints-00017474},
    abstract = {In den letzten 20 Jahren haben sich mobile Technologien und soziale Medien nicht nur im Alltag, sondern auch in Krisensituationen etabliert. Insbesondere großflächige Ereignisse wie der Hurrikan Sandy (2012) oder das mitteleuropäische Hochwasser (2013) haben gezeigt, dass sich die Bevölkerung aktiv mit Informations- und Kommunikationstechnologie (IKT) an der Schadensbewältigung beteiligt (Reuter, Hughes, et al., 2018). Daraus ist das Forschungsfeld der Kriseninformatik entstanden, welches Wissen der Informatik und Gesellschaftswissenschaften kombiniert und zudem in Disziplinen wie der MenschMaschine-Interaktion (HCI), Computerunterstützten Gruppenarbeit (CSCW) und Wirtschaftsinformatik (WI) verankert ist. Während die Bevölkerung IKT einsetzt, um die Unsicherheiten in Krisen zu bewältigen, nutzen Behörden und Organisationen mit Sicherheitsaufgaben (BOS), etwa Feuerwehr und Polizei, öffentliche Daten, um das Situationsbewusstsein und die Entscheidungsfindung für eine bessere Schadensbewältigung zu verbessern (Palen \& Anderson, 2016). Noch größere Katastrophen wie die aktuelle COVID-19-Pandemie verstärken dabei die Herausforderungen der Kriseninformatik (Xie et al., 2020). Für BOS stellt die umfangreiche Menge heterogener und semantisch verknüpfter Daten, auch Social Big Data genannt (Olshannikova et al., 2017), eine große Herausforderung im Hinblick auf die Qualität, Quantität und den Zugriff auf relevante Informationen dar. Um ein Situationsbewusstsein und nutzbare Informationen, d. h. die richtigen Informationen zur richtigen Zeit bei der richtigen Person, zu erhalten (Zade et al., 2018), müssen Informationen auf die Bedingungen des Ereignisses, organisationale Anforderungen, soziale Rahmenbedingungen und technische Möglichkeiten verfeinert werden. Diese Dissertation kombiniert das methodische Framework der Designfallstudien (Wulf et al., 2011) mit den Prinzipien der Design-Science-Forschung (Hevner et al., 2004), um das Thema der Informationsverfeinerung (Information Refinement) in vier Phasen zu untersuchen, wovon jede unterschiedliche Forschungsbeiträge hervorbringt. Die Arbeit begutachtet zunächst Nutzungs-, Rollen- und Wahrnehmungsmuster in der Kriseninformatik und stellt die Potenziale sozialer Medien zur öffentlichen Teilhabe an der Krisenbewältigung heraus. Die empirische Studien mit der deutschen Bevölkerung zeigen die positiven Einstellungen und die steigende Nutzung mobiler und sozialer Technologien in Krisen, stellen aber auch Barrieren heraus und zeigen die Erwartung, dass BOS in soziale Medien aktiv sind. Die Ergebnisse fundieren das Design innovativer IKT-Artefakte, darunter visuelle Bevölkerungsrichtlinien für soziale Medien in Krisen (SMG), ein Web-Interface für BOS zur Aggregation mobiler und sozialer Daten (ESI), ein Algorithmus zur Extraktion relevanter Informationen in sozialen Medien (SMO), und eine mobile App für die bidirektionale Kommunikation zwischen BOS und Bevölkerung (112.social). Die Evaluation der Artefakte involviert EndnutzerInnen aus dem Anwendungsfeld des Krisenmanagements, um potenziale für Verbesserungen und zukünftige Forschung zu identifizieren. Die Arbeit schließt mit einem Framework zur Informationsverfeinerung für die Kriseninformatik ab, welche die event-, gesellschafts-, organisation- und technologiebasierte Perspektive integriert.},
    publisher = {Dissertation (Dr. rer. nat.), Department of Computer Science, Technische Unviersität Darmstadt},
    author = {Kaufhold, Marc-André},
    year = {2020},
    keywords = {Crisis, Projekt-KontiKat, Projekt-ATHENE-SecUrban, Projekt-CYWARN, Dissertation},
    }

    Abgeschlossene Projekte

    Abgeschlossene Projekte an der TU Darmstadt:

    ATHENE-SecAttack: Security of Urban Infrastructures Against Cyberattacks (1.1.2020-31.12.2023, BMBF+HMWK)

    ATHENE-SecUrban: Secure Urban Infrastructures  (1.1.2020-31.12.2023, BMBF+HMWK)ATHENE-SecAttack: Security of Urban Infrastructures Against Cyberattacks (1.1.2020-31.12.2023, BMBF+HMWK) – Website

    https://securban.athene-center.de/

    The project focuses on the use of malicious software (malware) employed as a cyberweapon for espionage or attacks against the highly connected, automated and interdependent infrastructures in urban areas and the according challenges and threats. With this focus, the project will render exploits, their impacts, their stockpiling and attribution characteristics measurable. It will then analyze the requirements that precondition effective regulation of different types of malware, such as attribution, oversight of stockpiling, delegation to independent experts for oversight or detection of indiscriminate malware in breach of international law and conventions. With a focus on urban infrastructures, SecAttack will provide tools for the detection and mitigation of cyber attacks as well as develop recommendations for decision makers and stakeholders to regulate and structure urban ICT infrastructures to prevent or disincentivized cyber attacks. Regarding the necessary regulation of such malicious tools, SecAttack will furthermore provide technical solutions for classifying types of malware as cyberweapons and contribute technical solutions to regulatory challenges of arms control and military risk prevention. In addition, the project will assess the necessary security of an organized development and stockpiling of malware and provide measures to reduce risks of inadvertent incidents, which is a common smallest denominator of state actors towards the security of national IT infrastructures and a possible basis for further interstate cooperation.

    ATHENE-FANCY: Future Data Economy and Society (1.1.2019-31.12.2022, BMBF+HMWK)

    ATHENE-FANCY: Future Data Economy and Society  (1.4.2019-31.12.2022, BMBF+HMWK)

    Daten können einen hohen Wert für Wirtschaft und Gesellschaft haben. Analyse, Zusammenführung und Nutzung von Daten stellen neben dem hohen ökonomischen Wert auch einen hohen gesellschaftlichen Nutzen dar, man denke z. B. an die Medizin. Auch im Bereich der Künstlichen Intelligenz nimmt die Bedeutung der Daten­ökonomie zu, vor allem durch die vielfältigen Einsatzmöglichkeiten des Maschinellen Lernens. Durch solch selbstlernende Algorithmen ergibt sich ein potenzieller Vorteil bei der Analyse von großen Datenmengen, die oft menschliche Analysefähigkeiten an ihre Grenzen bringen. Demgegenüber stehen jedoch große Risiken für den Schutz der Privatsphäre jedes Einzelnen.

    Im Rahmen der ATHENE-Forschung erfolgt eine integrierte und interdisziplinäre Analyse des Trade-offs zwischen dem Wert von Daten einerseits und Privatsphäre-Risiken andererseits. Ein Schwerpunkt der For­schungs­arbeiten ist die gemeinsame Entwicklung von Privacy-Enhancing-Technologies (PETs), die einerseits die Kontrolle des Einzelnen über die eigenen persönlichen Daten erhöhen und andererseits die Analyse und Zusammenführung von großen Datenmengen ermöglichen. Auf dieser Grundlage werden Bausteine für faire und rechtskonforme digitale Ge­schäfts­modelle mithilfe von PETs entwickelt, die den Wert der Daten nutzen und gleichzeitig die Privatsphäre der Menschen schützen.

    2023

  • Laura Guntrum, Benjamin Güldenring, Franz Kuntke, Christian Reuter (2023)
    Using Digitally Mediated Methods in Sensitive Contexts: A Threat Analysis and Critical Reflection on Security, Privacy, and Ethical Concerns in the Case of Afghanistan
    Zeitschrift für Friedens- und Konfliktforschung (ZeFKo) ;11(2):95–128. doi:10.1007/s42597-022-00088-2
    [BibTeX] [Abstract] [Download PDF]

    Given the lack of empirical examples of how research can be conducted via digital means in sensitive contexts, this paper provides a threat model using Afghanistan, where the Taliban took power in August 2021, as an example. Both technical and non-technical research-related risks are analyzed, paying attention to research ethics, data security, and privacy. We argue that any threat model and risk analysis is highly context-dependent. Our analysis reveals that in certain research processes, human security does not necessarily coincide with data security and that an ambivalence exists between privacy and usability. In addition to the concrete threat analysis, the paper identifies some general technical solutions (e.g., encryption methods, communication software) for different research steps to foster secure and ethically justifiable research.

    @article{guntrum_using_2023,
    title = {Using {Digitally} {Mediated} {Methods} in {Sensitive} {Contexts}: {A} {Threat} {Analysis} and {Critical} {Reflection} on {Security}, {Privacy}, and {Ethical} {Concerns} in the {Case} of {Afghanistan}},
    volume = {11},
    issn = {2524-6976},
    url = {https://link.springer.com/article/10.1007/s42597-022-00088-2},
    doi = {10.1007/s42597-022-00088-2},
    abstract = {Given the lack of empirical examples of how research can be conducted via digital means in sensitive contexts, this paper provides a threat model using Afghanistan, where the Taliban took power in August 2021, as an example. Both technical and non-technical research-related risks are analyzed, paying attention to research ethics, data security, and privacy. We argue that any threat model and risk analysis is highly context-dependent. Our analysis reveals that in certain research processes, human security does not necessarily coincide with data security and that an ambivalence exists between privacy and usability. In addition to the concrete threat analysis, the paper identifies some general technical solutions (e.g., encryption methods, communication software) for different research steps to foster secure and ethically justifiable research.},
    number = {2},
    journal = {Zeitschrift für Friedens- und Konfliktforschung (ZeFKo)},
    author = {Guntrum, Laura and Güldenring, Benjamin and Kuntke, Franz and Reuter, Christian},
    month = oct,
    year = {2023},
    keywords = {Peace, Projekt-ATHENE-FANCY, Projekt-TraCe},
    pages = {95--128},
    }

  • Thea Riebe, Tom Biselli, Marc-André Kaufhold, Christian Reuter (2023)
    Privacy Concerns and Acceptance Factors of OSINT for Cybersecurity: A Representative Survey
    Proceedings on Privacy Enhancing Technologies (PoPETs) (1):477–493. doi:https://doi.org/10.56553/popets-2023-0028
    [BibTeX] [Abstract] [Download PDF]

    The use of Open Source Intelligence (OSINT) to monitor and detect cybersecurity threats is gaining popularity among Cybersecurity Emergency or Incident Response Teams (CERTs/CSIRTs). They increasingly use semi-automated OSINT approaches when monitoring cyber threats for public infrastructure services and incident response. Most of the systems use publicly available data, often focusing on social media due to timely data for situational assessment. As indirect and affected stakeholders, the acceptance of OSINT systems by users, as well as the conditions which influence the acceptance, are relevant for the development of OSINT systems for cybersecurity. Therefore, as part of the ethical and social technology assessment, we conducted a survey (N=1,093), in which we asked participants about their acceptance of OSINT systems, their perceived need for open source surveillance, as well as their privacy behavior and concerns. Further, we tested if the awareness of OSINT is an interactive factor that affects other factors. Our results indicate that cyber threat perception and the perceived need for OSINT are positively related to acceptance, while privacy concerns are negatively related. The awareness of OSINT, however, has only shown effects on people with higher privacy concerns. Here, particularly high OSINT awareness and limited privacy concerns were associated with higher OSINT acceptance. Lastly, we provide implications for further research and the use of OSINT systems for cybersecurity by authorities. As OSINT is a framework rather than a single technology, approaches can be selected and combined to adhere to data minimization and anonymization as well as to leverage improvements in privacy-preserving computation and machine learning innovations. Regarding the use of OSINT, the results suggest to favor approaches that provide transparency to users regarding the use of the systems and the data they gather.

    @article{riebe_privacy_2023,
    title = {Privacy {Concerns} and {Acceptance} {Factors} of {OSINT} for {Cybersecurity}: {A} {Representative} {Survey}},
    url = {https://petsymposium.org/popets/2023/popets-2023-0028.pdf},
    doi = {https://doi.org/10.56553/popets-2023-0028},
    abstract = {The use of Open Source Intelligence (OSINT) to monitor and detect cybersecurity threats is gaining popularity among Cybersecurity Emergency or Incident Response Teams (CERTs/CSIRTs). They increasingly use semi-automated OSINT approaches when monitoring cyber threats for public infrastructure services and incident response. Most of the systems use publicly available data, often focusing on social media due to timely data for situational assessment. As indirect and affected stakeholders, the acceptance of OSINT systems by users, as well as the conditions which influence the acceptance, are relevant for the development of OSINT systems for cybersecurity. Therefore, as part of the ethical and social technology assessment, we conducted a survey (N=1,093), in which we asked participants about their acceptance of OSINT systems, their perceived need for open source surveillance, as well as their privacy behavior and concerns. Further, we tested if the awareness of OSINT is an interactive factor that affects other factors. Our results indicate that cyber threat perception and the perceived need for OSINT are positively related to acceptance, while privacy concerns are negatively related. The awareness of OSINT, however, has only shown effects on people with higher privacy concerns. Here, particularly high OSINT awareness and limited privacy concerns were associated with higher OSINT acceptance. Lastly, we provide implications for further research and the use of OSINT systems for cybersecurity by authorities. As OSINT is a framework rather than a single technology, approaches can be selected and combined to adhere to data minimization and anonymization as well as to leverage improvements in privacy-preserving computation and machine learning innovations. Regarding the use of OSINT, the results suggest to favor approaches that provide transparency to users regarding the use of the systems and the data they gather.},
    number = {1},
    journal = {Proceedings on Privacy Enhancing Technologies (PoPETs)},
    author = {Riebe, Thea and Biselli, Tom and Kaufhold, Marc-André and Reuter, Christian},
    year = {2023},
    keywords = {HCI, UsableSec, Security, A-Paper, Ranking-CORE-A, Projekt-CYWARN, Projekt-ATHENE-FANCY, AuswahlUsableSec},
    pages = {477--493},
    }

  • Christian Reuter, Marc-André Kaufhold (2023)
    Crisis Informatics
    In: Zheng Yan: Cambridge Handbook of Cyber Behavior. Cambridge University Press.
    [BibTeX] [Abstract]

    In summary, crisis informatics has established itself as an important research area in the ever-increasing complexity of the cyber world. Its importance is further amplified by the time-critical constraints of emergencies and disasters. However, crisis informatics will be challenged to evolve quickly to tackle global-scale emergencies, such as the ongoing COVID-19 pandemic and the increasing risks of natural hazards due to climate change. This chapter seeks to supplement this effort by analyzing interaction, role, information, and perception patterns, which were prevalent in the past 20 years of social media use in crises.

    @incollection{reuter_crisis_2023,
    title = {Crisis {Informatics}},
    isbn = {978-1-00-905708-0},
    abstract = {In summary, crisis informatics has established itself as an important research area in the ever-increasing complexity of the cyber world. Its importance is further amplified by the time-critical constraints of emergencies and disasters. However, crisis informatics will be challenged to evolve quickly to tackle global-scale emergencies, such as the ongoing COVID-19 pandemic and the increasing risks of natural hazards due to climate change. This chapter seeks to supplement this effort by analyzing interaction, role, information, and perception patterns, which were prevalent in the past 20 years of social media use in crises.},
    booktitle = {Cambridge {Handbook} of {Cyber} {Behavior}},
    publisher = {Cambridge University Press},
    author = {Reuter, Christian and Kaufhold, Marc-André},
    editor = {Yan, Zheng},
    year = {2023},
    keywords = {Crisis, HCI, Peace, Projekt-CYWARN, Projekt-ATHENE-FANCY, Projekt-emergenCITY},
    }

  • Enno Steinbrink, Tom Biselli, Sebastian Linsner, Franziska Herbert, Christian Reuter (2023)
    Privacy Perception and Behaviour in Safety-Critical Environments
    In: Nina Gerber, Alina Stöver, Karola Marky: Human Factors in Privacy Research. Cham: Springer International Publishing, , 237–251.
    [BibTeX] [Abstract] [Download PDF]

    When considering privacy, context, and environmental circumstances can have a strong influence on individual decisions and user behavior. Especially in crises or threatening situations, privacy may conflict with other values, such as personal safety and health. In other cases, personal or public safety can also be dependent on privacy: the context of flight shows how, for those affected, the value of data protection can increase as a result of an increased threat situation. Thus, when individual sovereignty—the autonomous development of one’s own will—or safety is highly dependent on information flows, people tend to be more protective of their privacy in order to maintain their information sovereignty. But also, the context of agriculture, as part of the critical infrastructure, shows how privacy concerns can affect the adoption of digital tools. With these two examples, flight and migration as well as agriculture, this chapter presents some exemplary results that illustrate the importance of the influence of situational factors on perceived information sovereignty and the evaluation of privacy.

    @incollection{steinbrink_privacy_2023,
    address = {Cham},
    title = {Privacy {Perception} and {Behaviour} in {Safety}-{Critical} {Environments}},
    isbn = {978-3-031-28643-8},
    url = {https://doi.org/10.1007/978-3-031-28643-8_12},
    abstract = {When considering privacy, context, and environmental circumstances can have a strong influence on individual decisions and user behavior. Especially in crises or threatening situations, privacy may conflict with other values, such as personal safety and health. In other cases, personal or public safety can also be dependent on privacy: the context of flight shows how, for those affected, the value of data protection can increase as a result of an increased threat situation. Thus, when individual sovereignty—the autonomous development of one’s own will—or safety is highly dependent on information flows, people tend to be more protective of their privacy in order to maintain their information sovereignty. But also, the context of agriculture, as part of the critical infrastructure, shows how privacy concerns can affect the adoption of digital tools. With these two examples, flight and migration as well as agriculture, this chapter presents some exemplary results that illustrate the importance of the influence of situational factors on perceived information sovereignty and the evaluation of privacy.},
    booktitle = {Human {Factors} in {Privacy} {Research}},
    publisher = {Springer International Publishing},
    author = {Steinbrink, Enno and Biselli, Tom and Linsner, Sebastian and Herbert, Franziska and Reuter, Christian},
    editor = {Gerber, Nina and Stöver, Alina and Marky, Karola},
    year = {2023},
    keywords = {HCI, UsableSec, Security, Projekt-CROSSING, Projekt-ATHENE-FANCY, Projekt-GRKPrivacy},
    pages = {237--251},
    }

    2022

  • Sebastian Schwartz, Laura Guntrum, Christian Reuter (2022)
    Vision or Threat – Awareness for Dual-Use in the Development of Autonomous Driving
    IEEE Transactions on Technology and Society ;3(3):163–174. doi:10.1109/TTS.2022.3182310
    [BibTeX] [Abstract] [Download PDF]

    In the digital age, the vision of autonomous vehicles (AVs) is vibrant. Research is being conducted worldwide to inte-grate AVs into our everyday lives in the future, spending consid-erable amounts of money in the development process. Actors from both engineering as well as social sciences are involved in this re-search, with technical disciplines strongly dominating. In addition to perceived progress of numerous newly developed technologies such as AVs, challenges should also be referred to. According to research analysis, the transferability of autonomous cars to the military sphere seems to be frequently forgotten or ignored (dual-use). Since not much research has been conducted in Germany on the potential deployment of autonomous driving development steps into military domains, 25 semi-structured interviews with de-velopers and researchers and actors involved in the field, were conducted in 2020. The paper identifies that the majority of re-spondents interviewed were aware of general existing dual-use de-bates, however, few had reflected about dual-use issues regarding a possible transfer of their own development processes in the con-text of autonomous driving to military applications, intensively. One reason is the small-scale nature of research, another is the complexity of the field, which enables the engineer’s alienation from their responsibility for the artefacts’ use. Moreover, it has become clear that hardly any conversations among colleagues oc-cur about possible misuse and that no standardized policy guide-lines exist, which provide information about possible risk. To raise dual-use awareness, scientific contributions, risk education, and interdisciplinary discussions are essential.

    @article{schwartz_vision_2022,
    title = {Vision or {Threat} – {Awareness} for {Dual}-{Use} in the {Development} of {Autonomous} {Driving}},
    volume = {3},
    issn = {2637-6415},
    url = {https://www.peasec.de/paper/2022/2022_SchwartzGuntrumReuter_VisionorThreatAwarenessDualUseAutonomousDriving_IEEE-TTS.pdf},
    doi = {10.1109/TTS.2022.3182310},
    abstract = {In the digital age, the vision of autonomous vehicles (AVs) is vibrant. Research is being conducted worldwide to inte-grate AVs into our everyday lives in the future, spending consid-erable amounts of money in the development process. Actors from both engineering as well as social sciences are involved in this re-search, with technical disciplines strongly dominating. In addition to perceived progress of numerous newly developed technologies such as AVs, challenges should also be referred to. According to research analysis, the transferability of autonomous cars to the military sphere seems to be frequently forgotten or ignored (dual-use). Since not much research has been conducted in Germany on the potential deployment of autonomous driving development steps into military domains, 25 semi-structured interviews with de-velopers and researchers and actors involved in the field, were conducted in 2020. The paper identifies that the majority of re-spondents interviewed were aware of general existing dual-use de-bates, however, few had reflected about dual-use issues regarding a possible transfer of their own development processes in the con-text of autonomous driving to military applications, intensively. One reason is the small-scale nature of research, another is the complexity of the field, which enables the engineer’s alienation from their responsibility for the artefacts’ use. Moreover, it has become clear that hardly any conversations among colleagues oc-cur about possible misuse and that no standardized policy guide-lines exist, which provide information about possible risk. To raise dual-use awareness, scientific contributions, risk education, and interdisciplinary discussions are essential.},
    language = {en},
    number = {3},
    journal = {IEEE Transactions on Technology and Society},
    author = {Schwartz, Sebastian and Guntrum, Laura and Reuter, Christian},
    year = {2022},
    keywords = {Selected, A-Paper, Ranking-ImpactFactor, Peace, AuswahlPeace, Projekt-ATHENE-FANCY, Projekt-TraCe},
    pages = {163--174},
    }

  • Laura Guntrum (2022)
    Justice-oriented Research in Peace and Conflict Studies in Times of Social Distancing
    Mensch und Computer – Workshopband Darmstadt. doi:10.18420/muc2022-mci-ws10-216
    [BibTeX] [Abstract] [Download PDF]

    Not only since the COVID-19 pandemic, many research processes had already been increasingly digitized to maintain global ex-change of information efficiently. For years, scientific empirical studies have been conducted in politically sensitive contexts using digitally mediated methods, entailing numerous risks as well as potentials. One goal of digital research is to also capture marginal-ized voices. With emerging risks related to digital research, such as digital surveillance and social media monitoring by adversaries (e.g., the military in Myanmar), research needs to be more thoughtfully conducted. Considering research ethics, an evolving discrepancy between security measures and values of social jus-tice, such as accessibility and representation, appears as most data-secure applications are not used widely and offers such as “Free Basics” entice people to use rather data-unsecure applica-tions. Reflecting on this existing discrepancy in ethical require-ments, I illustrate challenges of the German research context re-lated to digitally conducted research focusing on overt conflictive social contexts.

    @inproceedings{guntrum_justice-oriented_2022,
    address = {Darmstadt},
    series = {Mensch und {Computer} 2022 - {Workshopband}},
    title = {Justice-oriented {Research} in {Peace} and {Conflict} {Studies} in {Times} of {Social} {Distancing}},
    url = {https://dl.gi.de/handle/20.500.12116/39092},
    doi = {10.18420/muc2022-mci-ws10-216},
    abstract = {Not only since the COVID-19 pandemic, many research processes had already been increasingly digitized to maintain global ex-change of information efficiently. For years, scientific empirical studies have been conducted in politically sensitive contexts using digitally mediated methods, entailing numerous risks as well as potentials. One goal of digital research is to also capture marginal-ized voices. With emerging risks related to digital research, such as digital surveillance and social media monitoring by adversaries (e.g., the military in Myanmar), research needs to be more thoughtfully conducted. Considering research ethics, an evolving discrepancy between security measures and values of social jus-tice, such as accessibility and representation, appears as most data-secure applications are not used widely and offers such as “Free Basics” entice people to use rather data-unsecure applica-tions. Reflecting on this existing discrepancy in ethical require-ments, I illustrate challenges of the German research context re-lated to digitally conducted research focusing on overt conflictive social contexts.},
    language = {en},
    booktitle = {Mensch und {Computer} - {Workshopband}},
    publisher = {Gesellschaft für Informatik},
    author = {Guntrum, Laura},
    year = {2022},
    keywords = {Security, Peace, Projekt-ATHENE-FANCY, Projekt-TraCe},
    }

  • Tom Biselli, Enno Steinbrink, Franziska Herbert, Gina Maria Schmidbauer-Wolf, Christian Reuter (2022)
    On the Challenges of Developing a Concise Questionnaire to Identify Privacy Personas
    Proceedings on Privacy Enhancing Technologies (PoPETs) (4):645–669. doi:10.56553/popets-2022-0126
    [BibTeX] [Abstract] [Download PDF]

    Concise instruments to determine privacy personas – typical privacy-related user groups – are not available at present. Consequently, we aimed to identify them on a privacy knowledge–privacy behavior ratio based on a self-developed instrument. To achieve this, we conducted an item analysis (N = 820) and a confirmatory factor analysis (CFA) (N = 656) of data based on an online study with German participants. Starting with 81 items, we reduced those to an eleven-item questionnaire with the two scales privacy knowledge and privacy behavior. A subsequent cluster analysis (N = 656) revealed three distinct user groups: (1) Fundamentalists scoring high in privacy knowledge and behavior, (2) Pragmatists scoring average in privacy knowledge and behavior and (3) Unconcerned scoring low in privacy knowledge and behavior. In a closer inspection of the questionnaire, the CFAs supported the model with a close global fit based on RMSEA in a training and to a lesser extent in a cross-validation sample. Deficient local fit as well as validity and reliability coefficients well below generally accepted thresholds, however, revealed that the questionnaire in its current form cannot be considered a suitable measurement instrument for determining privacy personas. The results are discussed in terms of related persona conceptualizations, the importance of a methodologically sound investigation of corresponding privacy dimensions and our lessons learned.

    @article{biselli_challenges_2022,
    title = {On the {Challenges} of {Developing} a {Concise} {Questionnaire} to {Identify} {Privacy} {Personas}},
    url = {https://petsymposium.org/2022/files/papers/issue4/popets-2022-0126.pdf},
    doi = {10.56553/popets-2022-0126},
    abstract = {Concise instruments to determine privacy personas – typical privacy-related user groups – are not available at present. Consequently, we aimed to identify them on a privacy knowledge–privacy behavior ratio based on a self-developed instrument. To achieve this, we conducted an item analysis (N = 820) and a confirmatory factor analysis (CFA) (N = 656) of data based on an online study with German participants. Starting with 81 items, we reduced those to an eleven-item questionnaire with the two scales privacy knowledge and privacy behavior. A subsequent cluster analysis (N = 656) revealed three distinct user groups: (1) Fundamentalists scoring high in privacy knowledge and behavior, (2) Pragmatists scoring average in privacy knowledge and behavior and (3) Unconcerned scoring low in privacy knowledge and behavior. In a closer inspection of the questionnaire, the CFAs supported the model with a close global fit based on RMSEA in a training and to a lesser extent in a cross-validation sample. Deficient local fit as well as validity and reliability coefficients well below generally accepted thresholds, however, revealed that the questionnaire in its current form cannot be considered a suitable measurement instrument for determining privacy personas. The results are discussed in terms of related persona conceptualizations, the importance of a methodologically sound investigation of corresponding privacy dimensions and our lessons learned.},
    number = {4},
    journal = {Proceedings on Privacy Enhancing Technologies (PoPETs)},
    author = {Biselli, Tom and Steinbrink, Enno and Herbert, Franziska and Schmidbauer-Wolf, Gina Maria and Reuter, Christian},
    year = {2022},
    keywords = {HCI, Selected, UsableSec, Security, A-Paper, Ranking-CORE-A, Projekt-CROSSING, Projekt-ATHENE-FANCY, AuswahlUsableSec, Projekt-GRKPrivacy},
    pages = {645--669},
    }

  • Katrin Hartwig, Christian Reuter (2022)
    Nudging Users Towards Better Security Decisions in Password Creation Using Whitebox-based Multidimensional Visualizations
    Behaviour & Information Technology (BIT) ;41(7):1357–1380. doi:10.1080/0144929X.2021.1876167
    [BibTeX] [Abstract] [Download PDF]

    Nudging users to keep them secure online has become a growing research field in cybersecurity. While existing approaches are mainly blackbox based, showing aggregated visualisations as one-size-fits-all nudges, personalisation turned out promising to enhance the efficacy of nudges within the high variance of users and contexts. This article presents a disaggregated whitebox-based visualisation of critical information as a novel nudge. By segmenting users according to their decision-making and information processing styles, we investigate if the novel nudge is more effective for specific users than a common black-box nudge. Based on existing literature about critical factors in password security, we designed a dynamic radar chart and parallel coordinates as disaggregated visualisations. We evaluated the short-term effectiveness and users‘ perception of the nudges in a think-aloud prestudy and a representative online evaluation (N=1.012). Our findings suggest that dynamic radar charts present a moderately effective nudge towards stronger passwords regarding short-term efficacy and are appreciated particularly by players of role-playing games.

    @article{hartwig_nudging_2022,
    title = {Nudging {Users} {Towards} {Better} {Security} {Decisions} in {Password} {Creation} {Using} {Whitebox}-based {Multidimensional} {Visualizations}},
    volume = {41},
    url = {https://peasec.de/paper/2022/2022_HartwigReuter_WhiteboxMultidimensionalNudges_BIT.pdf},
    doi = {10.1080/0144929X.2021.1876167},
    abstract = {Nudging users to keep them secure online has become a growing research field in cybersecurity. While existing approaches are mainly blackbox based, showing aggregated visualisations as one-size-fits-all nudges, personalisation turned out promising to enhance the efficacy of nudges within the high variance of users and contexts. This article presents a disaggregated whitebox-based visualisation of critical information as a novel nudge. By segmenting users according to their decision-making and information processing styles, we investigate if the novel nudge is more effective for specific users than a common black-box nudge. Based on existing literature about critical factors in password security, we designed a dynamic radar chart and parallel coordinates as disaggregated visualisations. We evaluated the short-term effectiveness and users' perception of the nudges in a think-aloud prestudy and a representative online evaluation (N=1.012). Our findings suggest that dynamic radar charts present a moderately effective nudge towards stronger passwords regarding short-term efficacy and are appreciated particularly by players of role-playing games.},
    number = {7},
    journal = {Behaviour \& Information Technology (BIT)},
    author = {Hartwig, Katrin and Reuter, Christian},
    year = {2022},
    keywords = {HCI, Selected, UsableSec, Security, A-Paper, Ranking-ImpactFactor, Ranking-CORE-A, Projekt-CROSSING, Projekt-ATHENE-FANCY, AuswahlUsableSec},
    pages = {1357--1380},
    }

    2021

  • Franziska Herbert, Gina Maria Schmidbauer-Wolf, Christian Reuter (2021)
    Who Should Get My Private Data in Which Case? Evidence in the Wild
    Mensch und Computer – Tagungsband New York. doi:10.1145/3473856.3473879
    [BibTeX] [Abstract] [Download PDF]

    As a result of the ongoing digitalization of our everyday lives, the amount of data produced by everyone is steadily increasing. This happens through personal decisions and items, such as the use of social media or smartphones, but also through more and more data acquisition in public spaces, such as e.g., Closed Circuit Television. Are people aware of the data they are sharing? What kind of data do people want to share with whom? Are people aware if they have Wi-Fi, GPS, or Bluetooth activated as potential data sharing functionalities on their phone? To answer these questions, we conducted a representative online survey as well as face-to-face interviews with users in Germany. We found that most users wanted to share private data on premise with most entities, indicating that willingness to share data depends on who has access to the data. Almost half of the participants would be more willing to share data with specific entities (state bodies & rescue forces) in the event that an acquaintance is endangered. For Wi-Fi and GPS the frequencies of self-reported and actual activation on the smartphone are almost equal, but 17\% of participants were unaware of the Bluetooth status on their smartphone. Our research is therefore in line with other studies suggesting relatively low privacy awareness of users.

    @inproceedings{herbert_who_2021,
    address = {New York},
    title = {Who {Should} {Get} {My} {Private} {Data} in {Which} {Case}? {Evidence} in the {Wild}},
    url = {http://www.peasec.de/paper/2021/2021_Herbert_SchmidbauerWolfReuter_WhoShouldGetMyPrivateDateinWhichCase_MuC.pdf},
    doi = {10.1145/3473856.3473879},
    abstract = {As a result of the ongoing digitalization of our everyday lives, the amount of data produced by everyone is steadily increasing. This happens through personal decisions and items, such as the use of social media or smartphones, but also through more and more data acquisition in public spaces, such as e.g., Closed Circuit Television. Are people aware of the data they are sharing? What kind of data do people want to share with whom? Are people aware if they have Wi-Fi, GPS, or Bluetooth activated as potential data sharing functionalities on their phone? To answer these questions, we conducted a representative online survey as well as face-to-face interviews with users in Germany. We found that most users wanted to share private data on premise with most entities, indicating that willingness to share data depends on who has access to the data. Almost half of the participants would be more willing to share data with specific entities (state bodies \& rescue forces) in the event that an acquaintance is endangered. For Wi-Fi and GPS the frequencies of self-reported and actual activation on the smartphone are almost equal, but 17\% of participants were unaware of the Bluetooth status on their smartphone. Our research is therefore in line with other studies suggesting relatively low privacy awareness of users.},
    booktitle = {Mensch und {Computer} - {Tagungsband}},
    publisher = {ACM},
    author = {Herbert, Franziska and Schmidbauer-Wolf, Gina Maria and Reuter, Christian},
    year = {2021},
    keywords = {UsableSec, Security, Projekt-ATHENE-FANCY},
    }

  • Enno Steinbrink, Lilian Reichert, Michelle Mende, Christian Reuter (2021)
    Digital Privacy Perceptions of Asylum Seekers in Germany – An Empirical Study about Smartphone Usage during the Flight
    Proceedings of the ACM: Human Computer Interaction (PACM): Computer-Supported Cooperative Work and Social Computing ;5(CSCW2). doi:10.1145/3479526
    [BibTeX] [Abstract] [Download PDF]

    Since 2015, an increased number of asylum seekers is coming to Europe. These migration movements increasingly rely on digital infrastructure, such as mobile internet access and online services, in order to reach their targeted destination countries. Asylum seekers often use smartphones for information and communication purposes. Even though there are many positive aspects in the use of such technologies, researchers have to consider the perceived risks of this specific user group. This work aims at investigating the use of mobile information technologies by asylum seekers during their flight, especially taking privacy into account. Thus, it examines asylum seekers’ digital privacy perceptions and identifies privacy protection behaviors by conducting a qualitative interview study with 14 asylum seekers who applied for asylum in Germany. The results show that asylum seekers are often aware of the various risks deriving from the use of smartphones and ICT, such as surveillance and persecution by state or non-state actors as well as extortion by criminals. Based on this, this work furthermore outlines different strategies used to manage these risks. Since the lack of privacy and trust leads to avoidance behavior, the insights of this study provide valuable information for the design of assistance apps and collaboration platforms, which appropriately address the specific needs for digital privacy in the context of flight, or for the conception of privacy-enhancing technologies helping to achieve this.

    @article{steinbrink_digital_2021,
    title = {Digital {Privacy} {Perceptions} of {Asylum} {Seekers} in {Germany} - {An} {Empirical} {Study} about {Smartphone} {Usage} during the {Flight}},
    volume = {5},
    url = {https://www.peasec.de/paper/2021/2021_SteinbrinkReichertMendeReuter_DigitalPrivacyPerceptionAsylumSeekers_CSCW.pdf},
    doi = {10.1145/3479526},
    abstract = {Since 2015, an increased number of asylum seekers is coming to Europe. These migration movements increasingly rely on digital infrastructure, such as mobile internet access and online services, in order to reach their targeted destination countries. Asylum seekers often use smartphones for information and communication purposes. Even though there are many positive aspects in the use of such technologies, researchers have to consider the perceived risks of this specific user group. This work aims at investigating the use of mobile information technologies by asylum seekers during their flight, especially taking privacy into account. Thus, it examines asylum seekers’ digital privacy perceptions and identifies privacy protection behaviors by conducting a qualitative interview study with 14 asylum seekers who applied for asylum in Germany. The results show that asylum seekers are often aware of the various risks deriving from the use of smartphones and ICT, such as surveillance and persecution by state or non-state actors as well as extortion by criminals. Based on this, this work furthermore outlines different strategies used to manage these risks. Since the lack of privacy and trust leads to avoidance behavior, the insights of this study provide valuable information for the design of assistance apps and collaboration platforms, which appropriately address the specific needs for digital privacy in the context of flight, or for the conception of privacy-enhancing technologies helping to achieve this.},
    number = {CSCW2},
    journal = {Proceedings of the ACM: Human Computer Interaction (PACM): Computer-Supported Cooperative Work and Social Computing},
    author = {Steinbrink, Enno and Reichert, Lilian and Mende, Michelle and Reuter, Christian},
    year = {2021},
    keywords = {Student, UsableSec, Security, A-Paper, Ranking-ImpactFactor, Ranking-CORE-A, Projekt-ATHENE-FANCY, AuswahlUsableSec, Projekt-GRKPrivacy},
    }

  • Tom Biselli, Christian Reuter (2021)
    On the Relationship between IT Privacy and Security Behavior: A Survey among German Private Users
    Proceedings of the International Conference on Wirtschaftsinformatik (WI) Potsdam, Germany.
    [BibTeX] [Abstract] [Download PDF]

    The relevance of adequate privacy and security behavior in the digital space is higher than ever. However, the exact relationship between privacy and security behavior is rarely discussed in the literature. This study investigates this relationship and the role of socio-demographic factors (gender, age, education, political opinions) in such behavior. Exploratory results of a survey of German private users (N=1,219) show that privacy and security behavior are only weakly correlated and not similarly influenced by socio-demographic factors. While se-curity behavior significantly differs between age and education groups (younger and less educated show less security behavior), no such differences exist for pri-vacy behavior. Additionally, political orientation and opinion has no influence on privacy and security behavior. Thus, this study sheds light on the concepts of privacy, security and corresponding behavior and emphasizes the need for a fine-grained differentiation if either privacy or security behavior is to be improved.

    @inproceedings{biselli_relationship_2021,
    address = {Potsdam, Germany},
    title = {On the {Relationship} between {IT} {Privacy} and {Security} {Behavior}: {A} {Survey} among {German} {Private} {Users}},
    url = {https://peasec.de/paper/2021/2021_BiselliReuter_RelationshipITPrivacyandSecurityBehavior_WI.pdf},
    abstract = {The relevance of adequate privacy and security behavior in the digital space is higher than ever. However, the exact relationship between privacy and security behavior is rarely discussed in the literature. This study investigates this relationship and the role of socio-demographic factors (gender, age, education, political opinions) in such behavior. Exploratory results of a survey of German private users (N=1,219) show that privacy and security behavior are only weakly correlated and not similarly influenced by socio-demographic factors. While se-curity behavior significantly differs between age and education groups (younger and less educated show less security behavior), no such differences exist for pri-vacy behavior. Additionally, political orientation and opinion has no influence on privacy and security behavior. Thus, this study sheds light on the concepts of privacy, security and corresponding behavior and emphasizes the need for a fine-grained differentiation if either privacy or security behavior is to be improved.},
    booktitle = {Proceedings of the {International} {Conference} on {Wirtschaftsinformatik} ({WI})},
    publisher = {AIS},
    author = {Biselli, Tom and Reuter, Christian},
    year = {2021},
    keywords = {HCI, Ranking-CORE-C, UsableSec, Security, Ranking-WKWI-A, Projekt-ATHENE-FANCY},
    pages = {1--17},
    }

    2020

  • Marc-André Kaufhold, Jasmin Haunschild, Christian Reuter (2020)
    Warning the Public: A Survey on Attitudes, Expectations and Use of Mobile Crisis Apps in Germany
    Proceedings of the European Conference on Information Systems (ECIS) .
    [BibTeX] [Abstract] [Download PDF]

    As part of information systems, the research field of crisis informatics increasingly investigates the potentials and limitations of mobile crisis apps, which constitute a relatively new public service for citizens and are specifically designed for the dissemination of disaster‐related information and communication between authorities, organizations and citizens. While existing crisis apps, such as KATWARN or NINA in Germany, focus on preparatory information and warning functionality, there is a need for apps and research on police-related functionality, such as information on cybercrime, fraud offences, or search for missing persons. Based on a workshop with civil protection (N=12) and police officers (N=15), we designed a questionnaire and conducted a representative survey of German citizens (N=1.219) on the past, current and future use, perceived helpfulness, deployment and behavioural preferences, configurability and most important functionality of mobile crisis apps. Our results indicate that in addition to emergency and weather warnings, crime- and health-related warnings are also desired by many, as is the possibility for bidirectional communication. People also want one central app and are resistant to installing more than one crisis app. Furthermore, there are few significant differences between socioeconomic groups.

    @inproceedings{kaufhold_warning_2020,
    title = {Warning the {Public}: {A} {Survey} on {Attitudes}, {Expectations} and {Use} of {Mobile} {Crisis} {Apps} in {Germany}},
    url = {http://www.peasec.de/paper/2020/2020_KaufholdHaunschildReuter_WarningthePublic_ECIS.pdf},
    abstract = {As part of information systems, the research field of crisis informatics increasingly investigates the potentials and limitations of mobile crisis apps, which constitute a relatively new public service for citizens and are specifically designed for the dissemination of disaster‐related information and communication between authorities, organizations and citizens. While existing crisis apps, such as KATWARN or NINA in Germany, focus on preparatory information and warning functionality, there is a need for apps and research on police-related functionality, such as information on cybercrime, fraud offences, or search for missing persons. Based on a workshop with civil protection (N=12) and police officers (N=15), we designed a questionnaire and conducted a representative survey of German citizens (N=1.219) on the past, current and future use, perceived helpfulness, deployment and behavioural preferences, configurability and most important functionality of mobile crisis apps. Our results indicate that in addition to emergency and weather warnings, crime- and health-related warnings are also desired by many, as is the possibility for bidirectional communication. People also want one central app and are resistant to installing more than one crisis app. Furthermore, there are few significant differences between socioeconomic groups.},
    booktitle = {Proceedings of the {European} {Conference} on {Information} {Systems} ({ECIS})},
    publisher = {AIS},
    author = {Kaufhold, Marc-André and Haunschild, Jasmin and Reuter, Christian},
    year = {2020},
    keywords = {Crisis, A-Paper, Ranking-VHB-B, Ranking-WKWI-A, Ranking-CORE-A, Projekt-ATHENE-SecUrban, Projekt-ATHENE-FANCY, Projekt-emergenCITY},
    }

  • Marc-André Kaufhold, Nicola Rupp, Christian Reuter, Matthias Habdank (2020)
    Mitigating Information Overload in Social Media during Conflicts and Crises: Design and Evaluation of a Cross-Platform Alerting System
    Behaviour & Information Technology (BIT) ;39(3):319–342. doi:10.1080/0144929X.2019.1620334
    [BibTeX] [Abstract] [Download PDF]

    The research field of crisis informatics examines, amongst others, the potentials and barriers of social media use during conflicts and crises. Social media allow emergency services to reach the public easily in the context of crisis communication and receive valuable information (e.g. pictures) from social media data. However, the vast amount of data generated during large-scale incidents can lead to issues of information overload and quality. To mitigate these issues, this paper proposes the semi-automatic creation of alerts including keyword, relevance and information quality filters based on cross-platform social media data. We conducted empirical studies and workshops with emergency services across Europe to raise requirements, then iteratively designed and implemented an approach to support emergency services, and performed multiple evaluations, including live demonstrations and field trials, to research the potentials of social media-based alerts. Finally, we present the findings and implications based on semi-structured interviews with emergency services, highlighting the need for usable configurability and white-box algorithm representation.

    @article{kaufhold_mitigating_2020,
    title = {Mitigating {Information} {Overload} in {Social} {Media} during {Conflicts} and {Crises}: {Design} and {Evaluation} of a {Cross}-{Platform} {Alerting} {System}},
    volume = {39},
    url = {https://www.tandfonline.com/doi/full/10.1080/0144929X.2019.1620334},
    doi = {10.1080/0144929X.2019.1620334},
    abstract = {The research field of crisis informatics examines, amongst others, the potentials and barriers of social media use during conflicts and crises. Social media allow emergency services to reach the public easily in the context of crisis communication and receive valuable information (e.g. pictures) from social media data. However, the vast amount of data generated during large-scale incidents can lead to issues of information overload and quality. To mitigate these issues, this paper proposes the semi-automatic creation of alerts including keyword, relevance and information quality filters based on cross-platform social media data. We conducted empirical studies and workshops with emergency services across Europe to raise requirements, then iteratively designed and implemented an approach to support emergency services, and performed multiple evaluations, including live demonstrations and field trials, to research the potentials of social media-based alerts. Finally, we present the findings and implications based on semi-structured interviews with emergency services, highlighting the need for usable configurability and white-box algorithm representation.},
    number = {3},
    journal = {Behaviour \& Information Technology (BIT)},
    author = {Kaufhold, Marc-André and Rupp, Nicola and Reuter, Christian and Habdank, Matthias},
    year = {2020},
    keywords = {AuswahlCrisis, Crisis, HCI, Selected, SocialMedia, Security, A-Paper, Ranking-ImpactFactor, Ranking-CORE-A, Projekt-KontiKat, Projekt-ATHENE-FANCY, AuswahlKaufhold},
    pages = {319--342},
    }

  • Franziska Herbert, Gina Maria Schmidbauer-Wolf, Christian Reuter (2020)
    Differences in IT Security Behavior and Knowledge of Private Users in Germany
    Proceedings of the International Conference on Wirtschaftsinformatik (WI) Potsdam, Germany. doi:10.30844/wi_2020_v3-herbert
    [BibTeX] [Abstract] [Download PDF]

    The German Federal Office for Information Security (Bundesamt für Sicherheit in der Informationstechnik) offers advice and recommendations for private users on how to behave securely. Based on these recommendations we investigate the IT security knowledge and behavior of private users with a rep- resentative study of the German population (N = 1.219). Additionally, we ana- lyze the role of socio-demographic factors (gender, age, education, political ori- entation) for security knowledge and behavior. Results show that German pri- vate users have only moderate IT security knowledge and behavior, with as- pects as gender, age, education and political orientation partly having an influ- ence. Men, higher educated and politically moderately oriented participants show higher security knowledge, whereas young people and those less knowl- edgeable about security behave less security-conscious. Additionally, security knowledge and behavior correlate moderately. Therefore, to increase private users‘ IT security we suggest to increase education and training especially for users being young, politically right-wing or female.

    @inproceedings{herbert_differences_2020,
    address = {Potsdam, Germany},
    title = {Differences in {IT} {Security} {Behavior} and {Knowledge} of {Private} {Users} in {Germany}},
    url = {https://library.gito.de/wp-content/uploads/2021/08/V3_Herbert-Differences_in_IT_Security_Behavior_and_Knowledge-541_c.pdf},
    doi = {10.30844/wi_2020_v3-herbert},
    abstract = {The German Federal Office for Information Security (Bundesamt für Sicherheit in der Informationstechnik) offers advice and recommendations for private users on how to behave securely. Based on these recommendations we investigate the IT security knowledge and behavior of private users with a rep- resentative study of the German population (N = 1.219). Additionally, we ana- lyze the role of socio-demographic factors (gender, age, education, political ori- entation) for security knowledge and behavior. Results show that German pri- vate users have only moderate IT security knowledge and behavior, with as- pects as gender, age, education and political orientation partly having an influ- ence. Men, higher educated and politically moderately oriented participants show higher security knowledge, whereas young people and those less knowl- edgeable about security behave less security-conscious. Additionally, security knowledge and behavior correlate moderately. Therefore, to increase private users' IT security we suggest to increase education and training especially for users being young, politically right-wing or female.},
    booktitle = {Proceedings of the {International} {Conference} on {Wirtschaftsinformatik} ({WI})},
    author = {Herbert, Franziska and Schmidbauer-Wolf, Gina Maria and Reuter, Christian},
    year = {2020},
    keywords = {Ranking-CORE-C, Ranking-VHB-C, UsableSec, Security, Ranking-WKWI-A, Projekt-ATHENE-FANCY},
    pages = {1--16},
    }

    2019

  • Gina Maria Schmidbauer-Wolf, Franziska Herbert, Christian Reuter (2019)
    Ein Kampf gegen Windmühlen: qualitative Studie über Informatikabsolvent_innen und ihre Datenprivatheit
    Mensch und Computer – Workshopband Hamburg, Germany. doi:10.18420/muc2019-ws-302-06
    [BibTeX] [Abstract] [Download PDF]

    Wie werden eigene private Daten geschützt? Um dieser Frage nachzugehen, wurde in einer qualitativen Studie mit sechs Informatikabsolvent_innen erfragt, wie diese die Privatheit ihrer Daten schützen. Das Ziel der teilstrukturierten Inter- views war es einen möglichst breiten Überblick über tatsäch- lich verwendete Techniken und Technologien zum Schutz der privaten Daten zu gewinnen. Während sich die Vermu- tung bestätigte, dass alle Teilnehmer_innen ein Bewusstsein für die Brisanz ihrer privaten Daten hatten, unterschieden sich die Definitionen ebendieser privaten Daten sowie das Verhalten, um diese zu schützen. Es konnte beobachtet wer- den, dass viel Wissen in diesem Bereich nicht zwangsläufig zu einem vorsichtigeren Handeln führt. Mögliche genannte Strategien zum Schutz der eigenen Daten sind: Informiert bleiben, Datensparsamkeit, Vermeidung der Produkte be- stimmter Konzerne sowie Resignation. Als Motivation für das jeweilige Verhalten wurden sowohl politische, philoso- phische, utilitaristische, als auch angstgetriebene Gründe genannt. Letztere können in Angst vor Diebstahl und Angst vor Andersbehandlung unterschieden werden.

    @inproceedings{schmidbauer-wolf_kampf_2019,
    address = {Hamburg, Germany},
    title = {Ein {Kampf} gegen {Windmühlen}: qualitative {Studie} über {Informatikabsolvent}\_innen und ihre {Datenprivatheit}},
    url = {https://dl.gi.de/bitstream/handle/20.500.12116/25168/302-06.pdf},
    doi = {10.18420/muc2019-ws-302-06},
    abstract = {Wie werden eigene private Daten geschützt? Um dieser Frage nachzugehen, wurde in einer qualitativen Studie mit sechs Informatikabsolvent\_innen erfragt, wie diese die Privatheit ihrer Daten schützen. Das Ziel der teilstrukturierten Inter- views war es einen möglichst breiten Überblick über tatsäch- lich verwendete Techniken und Technologien zum Schutz der privaten Daten zu gewinnen. Während sich die Vermu- tung bestätigte, dass alle Teilnehmer\_innen ein Bewusstsein für die Brisanz ihrer privaten Daten hatten, unterschieden sich die Definitionen ebendieser privaten Daten sowie das Verhalten, um diese zu schützen. Es konnte beobachtet wer- den, dass viel Wissen in diesem Bereich nicht zwangsläufig zu einem vorsichtigeren Handeln führt. Mögliche genannte Strategien zum Schutz der eigenen Daten sind: Informiert bleiben, Datensparsamkeit, Vermeidung der Produkte be- stimmter Konzerne sowie Resignation. Als Motivation für das jeweilige Verhalten wurden sowohl politische, philoso- phische, utilitaristische, als auch angstgetriebene Gründe genannt. Letztere können in Angst vor Diebstahl und Angst vor Andersbehandlung unterschieden werden.},
    booktitle = {Mensch und {Computer} - {Workshopband}},
    publisher = {Gesellschaft für Informatik e.V.},
    author = {Schmidbauer-Wolf, Gina Maria and Herbert, Franziska and Reuter, Christian},
    year = {2019},
    keywords = {Security, Projekt-ATHENE-FANCY},
    pages = {256--264},
    }

  • Gina Maria Schmidbauer-Wolf, Franziska Herbert, Christian Reuter (2019)
    Responsible Data Usage in Smart Cities: Privacy in Everyday Life vs. Reacting to Emergency Situations
    SCIENCE PEACE SECURITY ’19 – Proceedings of the Interdisciplinary Conference on Technical Peace and Security Research Darmstadt, Germany.
    [BibTeX] [Abstract] [Download PDF]

    Smart cities want to provide a better life to their citizens, e.g. regarding health care, infrastruc- ture, better safety and security. This can be achieved by using more and new technology and by interconnecting and analysing new and existent devices. Thus, public spaces and buildings will be equipped with more interconnected input and output modalities. This ongoing technolo- gization of public spaces creates opportunities for making everyone’s life more secure, while at the same time everyone’s personal privacy is endangered. So how is this balancing act tackled and dealt with right now? What fears do citizens have regarding their security as well as their privacy? This paper provides first insights into the topic privacy in smart cities regarding that smart cities need data which can be provided by and of people. The paper raises the question if collecting people’s data, and thus enabling smart cities, is ethical and if not, how it can be assured to be ethical.

    @inproceedings{schmidbauer-wolf_responsible_2019,
    address = {Darmstadt, Germany},
    title = {Responsible {Data} {Usage} in {Smart} {Cities}: {Privacy} in {Everyday} {Life} vs. {Reacting} to {Emergency} {Situations}},
    url = {https://tuprints.ulb.tu-darmstadt.de/id/eprint/9164},
    abstract = {Smart cities want to provide a better life to their citizens, e.g. regarding health care, infrastruc- ture, better safety and security. This can be achieved by using more and new technology and by interconnecting and analysing new and existent devices. Thus, public spaces and buildings will be equipped with more interconnected input and output modalities. This ongoing technolo- gization of public spaces creates opportunities for making everyone's life more secure, while at the same time everyone's personal privacy is endangered. So how is this balancing act tackled and dealt with right now? What fears do citizens have regarding their security as well as their privacy? This paper provides first insights into the topic privacy in smart cities regarding that smart cities need data which can be provided by and of people. The paper raises the question if collecting people's data, and thus enabling smart cities, is ethical and if not, how it can be assured to be ethical.},
    booktitle = {{SCIENCE} {PEACE} {SECURITY} '19 - {Proceedings} of the {Interdisciplinary} {Conference} on {Technical} {Peace} and {Security} {Research}},
    publisher = {TUprints},
    author = {Schmidbauer-Wolf, Gina Maria and Herbert, Franziska and Reuter, Christian},
    editor = {Reuter, Christian and Altmann, Jürgen and Göttsche, Malte and Himmel, Mirko},
    year = {2019},
    keywords = {HCI, UsableSec, Security, Projekt-CRISP, Projekt-ATHENE-FANCY},
    pages = {70--74},
    }

  • Christian Reuter, Katja Häusser, Mona Bien, Franziska Herbert (2019)
    Between Effort and Security: User Assessment of the Adequacy of Security Mechanisms for App Categories
    Mensch und Computer – Tagungsband Hamburg, Germany. doi:10.1145/3340764.3340770
    [BibTeX] [Abstract] [Download PDF]

    With the increasing popularity of the smartphone, the number of people using it for financial transactions such as online shopping, online banking or mobile payment is also growing. Apps used in these contexts store sensitive and valuable data, creating a need for security measures. It has not yet been researched to what extent certain authentication mechanisms, which can be information-, biometric- as well as token-based, are suitable for individual apps and the respective data. The goal of this work is to assess how perceived security and estimated effort of using such mechanisms, as well as the degree to which app data is considered worth protecting, influence users‘ choices of appropriate measures to protect app categories. Therefore, we conducted a representative study (n=1024). On the one hand, our results show that a positive correlation between perceived security and effort exists for all investigated non-biometric authentication methods. On the other hand, the study sheds light on the differences between the investigated app categories and the users‘ choice of the appropriate security mechanisms for the particular category. In contrast to perceived security having a positive influence on a user’s preference of mechanism, a relation can hardly be identified for effort. Moreover, app data sensitivity does not seem relevant for the users‘ choice of security mechanism.

    @inproceedings{reuter_between_2019,
    address = {Hamburg, Germany},
    title = {Between {Effort} and {Security}: {User} {Assessment} of the {Adequacy} of {Security} {Mechanisms} for {App} {Categories}},
    url = {http://www.peasec.de/paper/2019/2019_ReuterHaeusserBienHerbert_EffortSecurity_MuC.pdf},
    doi = {10.1145/3340764.3340770},
    abstract = {With the increasing popularity of the smartphone, the number of people using it for financial transactions such as online shopping, online banking or mobile payment is also growing. Apps used in these contexts store sensitive and valuable data, creating a need for security measures. It has not yet been researched to what extent certain authentication mechanisms, which can be information-, biometric- as well as token-based, are suitable for individual apps and the respective data. The goal of this work is to assess how perceived security and estimated effort of using such mechanisms, as well as the degree to which app data is considered worth protecting, influence users' choices of appropriate measures to protect app categories. Therefore, we conducted a representative study (n=1024). On the one hand, our results show that a positive correlation between perceived security and effort exists for all investigated non-biometric authentication methods. On the other hand, the study sheds light on the differences between the investigated app categories and the users' choice of the appropriate security mechanisms for the particular category. In contrast to perceived security having a positive influence on a user's preference of mechanism, a relation can hardly be identified for effort. Moreover, app data sensitivity does not seem relevant for the users' choice of security mechanism.},
    booktitle = {Mensch und {Computer} - {Tagungsband}},
    publisher = {ACM},
    author = {Reuter, Christian and Häusser, Katja and Bien, Mona and Herbert, Franziska},
    editor = {Alt, Florian and Bulling, Andreas and Döring, Tanja},
    year = {2019},
    keywords = {HCI, Student, UsableSec, Security, Projekt-CRISP, Projekt-CROSSING, Projekt-ATHENE-FANCY},
    pages = {287--297},
    }

  • Larissa Aldehoff, Meri Dankenbring, Christian Reuter (2019)
    Renouncing Privacy in Crisis Management? People’s View on Social Media Monitoring and Surveillance
    Proceedings of the Information Systems for Crisis Response and Management (ISCRAM) València, Spain.
    [BibTeX] [Abstract] [Download PDF]

    Social media is used during crises and disasters by state authorities and citizens to communicate and provide, gain and analyze information. Monitoring of platforms in such cases is both a well-established practice and a research area. The question, whether people are willing to renounce privacy in social media during critical incidents, or even allow surveillance in order to contribute to public security, remains unanswered. Our survey of 1,024 German inhabitants is the first empirical study on people’s views on social media monitoring and surveillance in crisis management. We find the willingness to share data during an imminent threat depends mostly on the type of data: a majority (63\% and 67\%, respectively) would give access to addresses and telephone numbers, whereas the willingness to share content of chats or telephone calls is significantly lower (27\%). Our analysis reveals diverging opinions among participants and some effects of sociodemographic variables on the acceptance of invasions into privacy.

    @inproceedings{aldehoff_renouncing_2019,
    address = {València, Spain},
    title = {Renouncing {Privacy} in {Crisis} {Management}? {People}'s {View} on {Social} {Media} {Monitoring} and {Surveillance}},
    url = {http://www.peasec.de/paper/2019/2019_AldehoffDankenbringReuter_RenouncingPrivacyCrisisManagement_ISCRAM.pdf},
    abstract = {Social media is used during crises and disasters by state authorities and citizens to communicate and provide, gain and analyze information. Monitoring of platforms in such cases is both a well-established practice and a research area. The question, whether people are willing to renounce privacy in social media during critical incidents, or even allow surveillance in order to contribute to public security, remains unanswered. Our survey of 1,024 German inhabitants is the first empirical study on people's views on social media monitoring and surveillance in crisis management. We find the willingness to share data during an imminent threat depends mostly on the type of data: a majority (63\% and 67\%, respectively) would give access to addresses and telephone numbers, whereas the willingness to share content of chats or telephone calls is significantly lower (27\%). Our analysis reveals diverging opinions among participants and some effects of sociodemographic variables on the acceptance of invasions into privacy.},
    booktitle = {Proceedings of the {Information} {Systems} for {Crisis} {Response} and {Management} ({ISCRAM})},
    publisher = {ISCRAM Association},
    author = {Aldehoff, Larissa and Dankenbring, Meri and Reuter, Christian},
    editor = {Franco, Zeno and González, José J. and Canós, José H.},
    year = {2019},
    keywords = {Crisis, SocialMedia, Student, UsableSec, Security, Peace, Projekt-CRISP, Projekt-DualUse, Projekt-CROSSING, Projekt-ATHENE-FANCY},
    pages = {1184--1197},
    }

  • Christian Reuter (2019)
    Information Technology for Peace and Security – An Emerging Research Field
    SCIENCE PEACE SECURITY ’19 – Proceedings of the Interdisciplinary Conference on Technical Peace and Security Research Darmstadt, Germany.
    [BibTeX] [Abstract] [Download PDF]

    Technological and scientific progress, especially the rapid development in information technology (IT), plays a crucial role regarding questions of peace and security. This short overview addresses the significance, potentials and challenges of IT for peace and security. For this purpose, the talk offers an introduction to peace, conflict, and security research, thereby focusing on natural science, technical and computer science perspectives. In the following, it sheds light on fundamentals (e.g. IT in peace, conflict and security, natural science/ technical peace research), cyber conflicts and war (e.g. information warfare, cyber espionage, cyber defence, Darknet), cyber peace (e.g. dual-use, technology assessment, confidence and security building measures), cyber arms control (e.g. arms control in the cyberspace, unmanned systems, verification), cyber attribution and infrastructures (e.g. attribution of cyber-attacks, resilient infrastructures, secure critical information infrastructures), culture and interaction (e.g. safety and security, cultural violence, social media), before an outlook is given.

    @inproceedings{reuter_information_2019-2,
    address = {Darmstadt, Germany},
    title = {Information {Technology} for {Peace} and {Security} – {An} {Emerging} {Research} {Field}},
    url = {www.peasec.de/paper/2019/2019_Reuter_ITPeaceSecurityEmergingField_ProcSciencePeaceSecurity-TUprints.pdf},
    abstract = {Technological and scientific progress, especially the rapid development in information technology (IT), plays a crucial role regarding questions of peace and security. This short overview addresses the significance, potentials and challenges of IT for peace and security. For this purpose, the talk offers an introduction to peace, conflict, and security research, thereby focusing on natural science, technical and computer science perspectives. In the following, it sheds light on fundamentals (e.g. IT in peace, conflict and security, natural science/ technical peace research), cyber conflicts and war (e.g. information warfare, cyber espionage, cyber defence, Darknet), cyber peace (e.g. dual-use, technology assessment, confidence and security building measures), cyber arms control (e.g. arms control in the cyberspace, unmanned systems, verification), cyber attribution and infrastructures (e.g. attribution of cyber-attacks, resilient infrastructures, secure critical information infrastructures), culture and interaction (e.g. safety and security, cultural violence, social media), before an outlook is given.},
    booktitle = {{SCIENCE} {PEACE} {SECURITY} '19 - {Proceedings} of the {Interdisciplinary} {Conference} on {Technical} {Peace} and {Security} {Research}},
    publisher = {TUprints},
    author = {Reuter, Christian},
    editor = {Reuter, Christian and Altmann, Jürgen and Göttsche, Malte and Himmel, Mirko},
    year = {2019},
    keywords = {HCI, UsableSec, Security, Projekt-CRISP, Projekt-ATHENE-FANCY},
    pages = {18--20},
    }

  • Katrin Hartwig, Christian Reuter (2019)
    TrustyTweet: An Indicator-based Browser-Plugin to Assist Users in Dealing with Fake News on Twitter
    Proceedings of the International Conference on Wirtschaftsinformatik (WI) Siegen, Germany.
    [BibTeX] [Abstract] [Download PDF]

    The importance of dealing withfake newsonsocial mediahas increased both in political and social contexts.While existing studies focus mainly on how to detect and label fake news, approaches to assist usersin making their own assessments are largely missing. This article presents a study on how Twitter-users’assessmentscan be supported by an indicator-based white-box approach.First, we gathered potential indicators for fake news that have proven to be promising in previous studies and that fit our idea of awhite-box approach. Based on those indicators we then designed and implemented the browser-plugin TrusyTweet, which assists users on Twitterin assessing tweetsby showing politically neutral and intuitive warnings without creating reactance. Finally, we suggest the findings of our evaluations with a total of 27 participants which lead to further design implicationsfor approachesto assistusers in dealing with fake news.

    @inproceedings{hartwig_trustytweet_2019,
    address = {Siegen, Germany},
    title = {{TrustyTweet}: {An} {Indicator}-based {Browser}-{Plugin} to {Assist} {Users} in {Dealing} with {Fake} {News} on {Twitter}},
    url = {http://www.peasec.de/paper/2019/2019_HartwigReuter_TrustyTweet_WI.pdf},
    abstract = {The importance of dealing withfake newsonsocial mediahas increased both in political and social contexts.While existing studies focus mainly on how to detect and label fake news, approaches to assist usersin making their own assessments are largely missing. This article presents a study on how Twitter-users'assessmentscan be supported by an indicator-based white-box approach.First, we gathered potential indicators for fake news that have proven to be promising in previous studies and that fit our idea of awhite-box approach. Based on those indicators we then designed and implemented the browser-plugin TrusyTweet, which assists users on Twitterin assessing tweetsby showing politically neutral and intuitive warnings without creating reactance. Finally, we suggest the findings of our evaluations with a total of 27 participants which lead to further design implicationsfor approachesto assistusers in dealing with fake news.},
    booktitle = {Proceedings of the {International} {Conference} on {Wirtschaftsinformatik} ({WI})},
    publisher = {AIS},
    author = {Hartwig, Katrin and Reuter, Christian},
    year = {2019},
    keywords = {Crisis, HCI, SocialMedia, Student, Ranking-CORE-C, Ranking-VHB-C, Ranking-WKWI-A, Peace, Projekt-CRISP, Projekt-ATHENE-FANCY},
    pages = {1858--1869},
    }

    Geobox-II: Standardisierung der GeoBox-Infrastruktur II: Standardisierter Datenaustausch mit amtlichen Informationsportalen (1.7.2020-31.12.2022, BMEL)

    Standardisierung der GeoBox-Infrastruktur – Phase 2: Standardisierter Datenaustausch mit amtlichen Informationsportalen

    2024

  • Franz Kuntke, Marc-André Kaufhold, Sebastian Linsner, Christian Reuter (2024)
    GeoBox: Design and Evaluation of a Tool for Resilient and Decentralized Data Management in Agriculture
    Behaviour & Information Technology (BIT) ;43(4):764–786. doi:10.1080/0144929X.2023.2185747
    [BibTeX] [Abstract] [Download PDF]

    Farm Management Information Systems (FMIS) are an important core component of modern farming companies as they allow, e.g., to document activities, create fertilization plans, and feed digital equipment with required data. Since the entire agricultural sector is an essential component of food production, high standards of resilience should be established in the involved companies. Accordingly, the used software should also be designed with high standards on reliability and crisis capability. Based on a literature review, we found that software for farmers with certain resilience needs is lacking. Thus, we designed and evaluated a new FMIS concept with the user-centered design method. By conducting focus groups (two rounds, total N=57) in 2017 and 2019, we raised specific front-end and back-end requirements of farmers. Based on the requirements, we developed our concept for both front- and back-end in terms of a decentralized and offline-working FMIS. Through the evaluation with practitioners (N=16) of the implemented concept, we derived findings and implications, highlighting the need for privacy, stability, and offline-capability, as well as the UI-requirement to be supportive, e.g., with easy to understand icons and terms.

    @article{kuntke_geobox_2024,
    title = {{GeoBox}: {Design} and {Evaluation} of a {Tool} for {Resilient} and {Decentralized} {Data} {Management} in {Agriculture}},
    volume = {43},
    issn = {0144-929X},
    url = {https://peasec.de/paper/2023/2023_KuntkeKaufholdLinsnerReuter_GeoBox_BIT.pdf},
    doi = {10.1080/0144929X.2023.2185747},
    abstract = {Farm Management Information Systems (FMIS) are an important core component of modern farming companies as they allow, e.g., to document activities, create fertilization plans, and feed digital equipment with required data. Since the entire agricultural sector is an essential component of food production, high standards of resilience should be established in the involved companies. Accordingly, the used software should also be designed with high standards on reliability and crisis capability. Based on a literature review, we found that software for farmers with certain resilience needs is lacking. Thus, we designed and evaluated a new FMIS concept with the user-centered design method. By conducting focus groups (two rounds, total N=57) in 2017 and 2019, we raised specific front-end and back-end requirements of farmers. Based on the requirements, we developed our concept for both front- and back-end in terms of a decentralized and offline-working FMIS. Through the evaluation with practitioners (N=16) of the implemented concept, we derived findings and implications, highlighting the need for privacy, stability, and offline-capability, as well as the UI-requirement to be supportive, e.g., with easy to understand icons and terms.},
    number = {4},
    journal = {Behaviour \& Information Technology (BIT)},
    author = {Kuntke, Franz and Kaufhold, Marc-André and Linsner, Sebastian and Reuter, Christian},
    month = mar,
    year = {2024},
    note = {Publisher: Taylor \& Francis},
    keywords = {UsableSec, Security, A-Paper, Ranking-ImpactFactor, Ranking-CORE-A, AuswahlUsableSec, Projekt-GeoBox, Projekt-AgriRegio},
    pages = {764--786},
    }

  • Daniel Eberz-Eder, Franz Kuntke, Christian Reuter, Ansgar Bernardi, Ahmad Kadi, Gerwin Brill, Daniel Martini, Benno Kleinhenz (2024)
    Hybrid Cloud Infrastrukturen – Edge Computng und KI-basierte Anwendungen in der Landwirtschaft für resiliente und effektive Produktions- und Biodiversitätsmaßnahmen
    44. GIL-Jahrestagung: Informatik in der Land-, Forst- und Ernährungswirtschaft .
    [BibTeX] [Abstract]

    Mobile Erhebung semantisch modellierter Daten und deren Auswertung im Feld durch Hybrid Cloud Computing sind Grundlage des Resilienten Smart Farmings im Projekt GeoBox. Eine skalierbare Architektur und semantische Datenmodellierung ermöglichen Management betrieblicher Software-Container, flexible Anpassung an neue Aufgaben, und die Realisierung einfach nutzbarer externer Services, vorgestellt am Beispiel eines Resistenz-Beratungs-Chatbots und von Blühstreifen als Biodiversitätsmaßnahme.

    @inproceedings{eberz-eder_hybrid_2024,
    title = {Hybrid {Cloud} {Infrastrukturen} - {Edge} {Computng} und {KI}-basierte {Anwendungen} in der {Landwirtschaft} für resiliente und effektive {Produktions}- und {Biodiversitätsmaßnahmen}},
    abstract = {Mobile Erhebung semantisch modellierter Daten und deren Auswertung im Feld durch Hybrid Cloud Computing sind Grundlage des Resilienten Smart Farmings im Projekt GeoBox. Eine skalierbare Architektur und semantische Datenmodellierung ermöglichen Management betrieblicher Software-Container, flexible Anpassung an neue Aufgaben, und die Realisierung einfach nutzbarer externer Services, vorgestellt am Beispiel eines Resistenz-Beratungs-Chatbots und von Blühstreifen als Biodiversitätsmaßnahme.},
    booktitle = {44. {GIL}-{Jahrestagung}: {Informatik} in der {Land}-, {Forst}- und {Ernährungswirtschaft}},
    publisher = {Gesellschaft für Informatik},
    author = {Eberz-Eder, Daniel and Kuntke, Franz and Reuter, Christian and Bernardi, Ansgar and Kadi, Ahmad and Brill, Gerwin and Martini, Daniel and Kleinhenz, Benno},
    year = {2024},
    keywords = {UsableSec, Security, RSF, Projekt-GeoBox, Projekt-AgriRegio},
    }

    2023

  • Daniel Eberz-Eder, Franz Kuntke, Gerwin Brill, Ansgar Bernardi, Christian Wied, Philippe Nuderscher, Christian Reuter (2023)
    Prototypische Entwicklungen zur Umsetzung des Resilient Smart Farming (RSF) mittels Edge Computing
    43. GIL-Jahrestagung: Informatik in der Land-, Forst- und Ernährungswirtschaft .
    [BibTeX] [Abstract] [Download PDF]

    Landwirtschaft als essenzieller Teil der Nahrungsmittelproduktion gehört zu den kritischen Infrastrukturen (KRITIS). Dementsprechend müssen die eingesetzten Systeme für einen widerstandsfähigen Betrieb ausgelegt sein. Dies gilt auch für die auf landwirtschaftlichen Betrieben eingesetzte Software, die Sicherheits- und Resilienzkriterien genügen muss. Jedoch ist die Zunahme an Software zu beobachten, welche eine permanente Internetkonnektivität erfordert, d. h. eine stabile Verbindung zu Servern oder Cloud-Applikationen ist für deren Funktionsweise erforderlich. Dies stellt eine erhebliche Schwachstelle hinsichtlich der Resilienz dar und kann bei Ausfällen der Telekommunikationsinfrastruktur zu großen Problemen führen. Mit Entwicklungen aus dem Bereich Resilient Smart Farming (RSF) zeigen wir, wie Datenhaltung nach dem Offline-First-Prinzip gestaltet werden kann. Ein zentraler Bestandteil hierbei ist das Resilient Edge Computing (REC) und die entwickelte HofBox: ein Mini-Server, der das Datenmanagement im Betrieb übernimmt und mittels innovativer Open-Source basierender Container-Technologie (Open Horizon) umsetzt. Dadurch werden in Zukunft weitere Anwendungsfälle innerhalb der landwirtschaftlichen Produktions- und Wertschöpfungskette durch Public-Private-Partnership-Modelle realistisch und realisierbar.

    @inproceedings{eberz-eder_prototypische_2023,
    title = {Prototypische {Entwicklungen} zur {Umsetzung} des {Resilient} {Smart} {Farming} ({RSF}) mittels {Edge} {Computing}},
    url = {https://dl.gi.de/handle/20.500.12116/40264},
    abstract = {Landwirtschaft als essenzieller Teil der Nahrungsmittelproduktion gehört zu den kritischen Infrastrukturen (KRITIS). Dementsprechend müssen die eingesetzten Systeme für einen widerstandsfähigen Betrieb ausgelegt sein. Dies gilt auch für die auf landwirtschaftlichen Betrieben eingesetzte Software, die Sicherheits- und Resilienzkriterien genügen muss. Jedoch ist die Zunahme an Software zu beobachten, welche eine permanente Internetkonnektivität erfordert, d. h. eine stabile Verbindung zu Servern oder Cloud-Applikationen ist für deren Funktionsweise erforderlich. Dies stellt eine erhebliche Schwachstelle hinsichtlich der Resilienz dar und kann bei Ausfällen der Telekommunikationsinfrastruktur zu großen Problemen führen. Mit Entwicklungen aus dem Bereich Resilient Smart Farming (RSF) zeigen wir, wie Datenhaltung nach dem Offline-First-Prinzip gestaltet werden kann. Ein zentraler Bestandteil hierbei ist das Resilient Edge Computing (REC) und die entwickelte HofBox: ein Mini-Server, der das Datenmanagement im Betrieb übernimmt und mittels innovativer Open-Source basierender Container-Technologie (Open Horizon) umsetzt. Dadurch werden in Zukunft weitere Anwendungsfälle innerhalb der landwirtschaftlichen Produktions- und Wertschöpfungskette durch Public-Private-Partnership-Modelle realistisch und realisierbar.},
    booktitle = {43. {GIL}-{Jahrestagung}: {Informatik} in der {Land}-, {Forst}- und {Ernährungswirtschaft}},
    publisher = {Gesellschaft für Informatik},
    author = {Eberz-Eder, Daniel and Kuntke, Franz and Brill, Gerwin and Bernardi, Ansgar and Wied, Christian and Nuderscher, Philippe and Reuter, Christian},
    year = {2023},
    keywords = {UsableSec, Security, RSF, Projekt-GeoBox, Projekt-AgriRegio},
    pages = {309--314},
    }

  • Franz Kuntke, Lars Baumgärtner, Christian Reuter (2023)
    Rural Communication in Outage Scenarios: Disruption-Tolerant Networking via LoRaWAN Setups
    Proceedings of Information Systems for Crisis Response and Management (ISCRAM) .
    [BibTeX] [Abstract] [Download PDF]

    Since communications infrastructure is subject to many impacts, e.g., destructive natural events, they can potentially collapse at any time. Especially in rural areas, the recovery of public network infrastructure can take some time, so a dedicated communication channel would be advantageous. We explore the possibility of transforming commodity LoRaWAN gateways into meshed network nodes for a digital emergency communication channel. In order to obtain the required parameters, we collected farm locations in Germany with OpenStreetMap. Based on the assumptions of LoRa communication range and considering our use case requirements, connecting farm communities seems theoretically feasible in many areas of our data set. To further analyze our idea, we ran simulations of two common DTN routing protocols with different scenarios. A proof-of-concept implementation allows smaller messages to be transmitted using real hardware and demonstrates that a decentralized communications infrastructure based on commodity hardware is possible.

    @inproceedings{kuntke_rural_2023,
    title = {Rural {Communication} in {Outage} {Scenarios}: {Disruption}-{Tolerant} {Networking} via {LoRaWAN} {Setups}},
    url = {https://idl.iscram.org/files/kuntke/2023/2581_Kuntke_etal2023.pdf},
    abstract = {Since communications infrastructure is subject to many impacts, e.g., destructive natural events, they can potentially collapse at any time. Especially in rural areas, the recovery of public network infrastructure can take some time, so a dedicated communication channel would be advantageous. We explore the possibility of transforming commodity LoRaWAN gateways into meshed network nodes for a digital emergency communication channel. In order to obtain the required parameters, we collected farm locations in Germany with OpenStreetMap. Based on the assumptions of LoRa communication range and considering our use case requirements, connecting farm communities seems theoretically feasible in many areas of our data set. To further analyze our idea, we ran simulations of two common DTN routing protocols with different scenarios. A proof-of-concept implementation allows smaller messages to be transmitted using real hardware and demonstrates that a decentralized communications infrastructure based on commodity hardware is possible.},
    booktitle = {Proceedings of {Information} {Systems} for {Crisis} {Response} and {Management} ({ISCRAM})},
    author = {Kuntke, Franz and Baumgärtner, Lars and Reuter, Christian},
    year = {2023},
    keywords = {Crisis, Security, RSF, Projekt-MAKI, Projekt-GeoBox, Projekt-emergenCITY, Projekt-AgriRegio},
    pages = {1--13},
    }

  • Franz Kuntke, Merve Bektas, Laura Buhleier, Ella Pohl, Rebekka Schiller, Christian Reuter (2023)
    How Would Emergency Communication Based on LoRaWAN Perform? Empirical Findings of Signal Propagation in Rural Areas
    Proceedings of Information Systems for Crisis Response and Management (ISCRAM) .
    [BibTeX] [Abstract] [Download PDF]

    Low Power Wide Area Network (LPWAN) technologies are typically promoted for Internet-of-Things (IoT) applications, but are also of interest for emergency communications systems when regular fixed and mobile networks break down. Although LoRaWAN is a frequently used representative here, there are sometimes large differences between the proposed range and the results of some practical evaluations. Since previous work has focused on urban environments or has conducted simulations, this work aims to gather concrete knowledge on the transmission characteristics in rural environments. Extensive field studies with varying geographic conditions and comparative tests in urban environments were performed using two different hardware implementations. Overall, it was found that the collected values in rural areas are significantly lower than the theoretical values. Nevertheless, the results certify that LoRaWAN technology has a high range that cannot be achieved with other common technologies for emergency communications.

    @inproceedings{kuntke_how_2023,
    title = {How {Would} {Emergency} {Communication} {Based} on {LoRaWAN} {Perform}? {Empirical} {Findings} of {Signal} {Propagation} in {Rural} {Areas}},
    url = {https://idl.iscram.org/files/kuntke/2023/2586_Kuntke_etal2023.pdf},
    abstract = {Low Power Wide Area Network (LPWAN) technologies are typically promoted for Internet-of-Things (IoT) applications, but are also of interest for emergency communications systems when regular fixed and mobile networks break down. Although LoRaWAN is a frequently used representative here, there are sometimes large differences between the proposed range and the results of some practical evaluations. Since previous work has focused on urban environments or has conducted simulations, this work aims to gather concrete knowledge on the transmission characteristics in rural environments. Extensive field studies with varying geographic conditions and comparative tests in urban environments were performed using two different hardware implementations. Overall, it was found that the collected values in rural areas are significantly lower than the theoretical values. Nevertheless, the results certify that LoRaWAN technology has a high range that cannot be achieved with other common technologies for emergency communications.},
    booktitle = {Proceedings of {Information} {Systems} for {Crisis} {Response} and {Management} ({ISCRAM})},
    author = {Kuntke, Franz and Bektas, Merve and Buhleier, Laura and Pohl, Ella and Schiller, Rebekka and Reuter, Christian},
    year = {2023},
    keywords = {Crisis, Student, RSF, Projekt-GeoBox, Projekt-AgriRegio},
    pages = {1--8},
    }

  • Daniel Schmidt, Franz Kuntke, Maximilian Bauer, Lars Baumgärtner (2023)
    BPoL: A Disruption-Tolerant LoRa Network for Disaster Communication
    IEEE Global Humanitarian Technology Conference (GHTC) . doi:10.1109/GHTC56179.2023.10354717
    [BibTeX] [Abstract] [Download PDF]

    Information and Communication Technology (ICT) is vital for everyday life and especially during times of disaster.Relying on existing infrastructure is problematic as maintenance is expensive, and they can be disrupted in emergency scenarios. Cost is a major factor which limits the technologies that can be used in rural areas or for emergency response, as satellite uplinks or private cellular networks are very expensive and complex. LoRa is commonly used for IoT infrastructure worldwide in the form of LoRaWAN to cover larger distances with low costs. But it can also be used in a Device-to-Device (D2D) mode for direct communication. By combining LoRa with Disruption-tolerant Networking (DTN), we present an affordable and practical solution that can cope with challenging conditions and be used for a large variety of applications. In our evaluation, we show how adaptable our solution is and how it outperforms similar mesh-based applications for disaster communication.

    @inproceedings{schmidt_bpol_2023,
    title = {{BPoL}: {A} {Disruption}-{Tolerant} {LoRa} {Network} for {Disaster} {Communication}},
    url = {https://peasec.de/paper/2023/2023_SchmidtKuntkeBauerBaumgaertner_BPOL_GHTC.pdf},
    doi = {10.1109/GHTC56179.2023.10354717},
    abstract = {Information and Communication Technology (ICT) is vital for everyday life and especially during times of disaster.Relying on existing infrastructure is problematic as maintenance is expensive, and they can be disrupted in emergency scenarios. Cost is a major factor which limits the technologies that can be used in rural areas or for emergency response, as satellite uplinks or private cellular networks are very expensive and complex. LoRa is commonly used for IoT infrastructure worldwide in the form of LoRaWAN to cover larger distances with low costs. But it can also be used in a Device-to-Device (D2D) mode for direct communication. By combining LoRa with Disruption-tolerant Networking (DTN), we present an affordable and practical solution that can cope with challenging conditions and be used for a large variety of applications. In our evaluation, we show how adaptable our solution is and how it outperforms similar mesh-based applications for disaster communication.},
    booktitle = {{IEEE} {Global} {Humanitarian} {Technology} {Conference} ({GHTC})},
    author = {Schmidt, Daniel and Kuntke, Franz and Bauer, Maximilian and Baumgärtner, Lars},
    year = {2023},
    keywords = {UsableSec, Security, Projekt-GeoBox, Projekt-AgriRegio},
    pages = {440--447},
    }

    2022

  • Laura Buhleier, Patrick Gantner, Tobias Frey, Michael Boers, Marc-André Kaufhold, Christian Reuter (2022)
    Effizienz und Nachhaltigkeit durch Green-IT: ein systematischer Literaturüberblick im Kontext der Klimakrise
    INFORMATIK 2022: 52. Jahrestagung der Gesellschaft für Informatik – Informatik für Gesellschaft (Workshop-Beiträge), Lecture Notes in Informatics (LNI) Hamburg, Germany. doi:10.18420/inf2022_83
    [BibTeX] [Abstract] [Download PDF]

    Die Klimakrise gehört zu den aktuell größten Herausforderungen unserer Zeit. Informations- und Kommunikationstechnologien (IKT) können hierbei eine entscheidende Rolle spielen. Einerseits, da eine Effizienzsteigerung von oder durch IKT zu einer klimafreundlicheren Nutzung beitragen kann, und andererseits, da IKT zu einem erhöhten Ressourcenverbrauch führen kann. Um diese Thematik weiter zu untersuchen, wird in dieser Arbeit eine systematische Literaturrecherche durchgeführt, um Herausforderungen und Potenziale in der Adressierung der Klimakrise durch eine effiziente und nachhaltige Entwicklung des IKT-Sektors zu analysieren. Die dabei untersuchte Literatur beinhaltet Herausforderungen wie zum Beispiel den hohen Energie- und Materialverbrauch der IKT-Geräte und Datenzentren sowie die entstehenden Entsorgungskosten und das Konsumverhalten der Nutzer*innen. Deswegen sollten die Nutzer*innen mehr Informationen zur Wartung, zum Kauf gebrauchter Geräte, und zum Recyceln/Entsorgen erhalten. Die Analyse lieferte aber auch viele Potenziale. Durch IKT können Effizienzsteigerungen in den Bereich Industrie, Landwirtschaft, Verkehr und Transport erreicht und auch umweltschädliche Geräte substituiert werden. Durch diese Potenziale kann es aber, wie in anderen Bereichen, zu einem Rebound-Effekt kommen.

    @inproceedings{buhleier_effizienz_2022,
    address = {Hamburg, Germany},
    title = {Effizienz und {Nachhaltigkeit} durch {Green}-{IT}: ein systematischer {Literaturüberblick} im {Kontext} der {Klimakrise}},
    isbn = {978-3-88579-720-3},
    url = {https://dl.gi.de/bitstream/handle/20.500.12116/39590/rsflab_06.pdf?sequence=1&isAllowed=y},
    doi = {10.18420/inf2022_83},
    abstract = {Die Klimakrise gehört zu den aktuell größten Herausforderungen unserer Zeit. Informations- und Kommunikationstechnologien (IKT) können hierbei eine entscheidende Rolle spielen. Einerseits, da eine Effizienzsteigerung von oder durch IKT zu einer klimafreundlicheren Nutzung beitragen kann, und andererseits, da IKT zu einem erhöhten Ressourcenverbrauch führen kann. Um diese Thematik weiter zu untersuchen, wird in dieser Arbeit eine systematische Literaturrecherche durchgeführt, um Herausforderungen und Potenziale in der Adressierung der Klimakrise durch eine effiziente und nachhaltige Entwicklung des IKT-Sektors zu analysieren. Die dabei untersuchte Literatur beinhaltet Herausforderungen wie zum Beispiel den hohen Energie- und Materialverbrauch der IKT-Geräte und Datenzentren sowie die entstehenden Entsorgungskosten und das Konsumverhalten der Nutzer*innen. Deswegen sollten die Nutzer*innen mehr Informationen zur Wartung, zum Kauf gebrauchter Geräte, und zum Recyceln/Entsorgen erhalten. Die Analyse lieferte aber auch viele Potenziale. Durch IKT können Effizienzsteigerungen in den Bereich Industrie, Landwirtschaft, Verkehr und Transport erreicht und auch umweltschädliche Geräte substituiert werden. Durch diese Potenziale kann es aber, wie in anderen Bereichen, zu einem Rebound-Effekt kommen.},
    language = {de},
    booktitle = {{INFORMATIK} 2022: 52. {Jahrestagung} der {Gesellschaft} für {Informatik} – {Informatik} für {Gesellschaft} ({Workshop}-{Beiträge}), {Lecture} {Notes} in {Informatics} ({LNI})},
    publisher = {Gesellschaft für Informatik e. V.},
    author = {Buhleier, Laura and Gantner, Patrick and Frey, Tobias and Boers, Michael and Kaufhold, Marc-André and Reuter, Christian},
    editor = {Demmler, D. and Krupka, D. and Federrath, H.},
    year = {2022},
    keywords = {Student, Ranking-CORE-C, Ranking-VHB-C, Security, Projekt-GeoBox, Projekt-AgriRegio},
    pages = {995--1012},
    }

  • Franz Kuntke, Vladimir Romanenko, Sebastian Linsner, Enno Steinbrink, Christian Reuter (2022)
    LoRaWAN Security Issues and Mitigation Options by the Example of Agricultural IoT Scenarios
    Transactions on Emerging Telecommunications Technologies (ETT) ;33(5):e4452. doi:10.1002/ett.4452
    [BibTeX] [Abstract] [Download PDF]

    The Internet of Things (IoT) is a major trend that is seen as a great opportunity to improve efficiency in many domains, including agriculture. This technology could transform the sector, improving the management and quality of agricultural operations, for example, crop farming. The most promising data transmission standard for this domain seems to be Long Range Wide Area Network (LoRaWAN), a popular representative of low power wide area network technologies today. LoRaWAN, like any wireless protocol, has properties that can be exploited by attackers, which has been a topic of multiple research papers in recent years. By conducting a systematic literature review, we build a recent list of attacks, as well as collect mitigation options. Taking a look at a concrete use case (IoT in agriculture) allows us to evaluate the practicality of both exploiting the vulnerabilities and implementing the countermeasures. We detected 16 attacks that we grouped into six attack types. Along with the attacks, we collect countermeasures for attack mitigation. Developers can use our findings to minimize the risks when developing applications based on LoRaWAN. These mostly theoretical security recommendations should encourage future works to evaluate the mitigations in practice.

    @article{kuntke_lorawan_2022,
    title = {{LoRaWAN} {Security} {Issues} and {Mitigation} {Options} by the {Example} of {Agricultural} {IoT} {Scenarios}},
    volume = {33},
    issn = {2161-3915},
    url = {https://www.peasec.de/paper/2022/2022_KuntkeRomanenkoLinsnerSteinbrinkReuter_LoRaWANsecurityAgriculture_ETT.pdf},
    doi = {10.1002/ett.4452},
    abstract = {The Internet of Things (IoT) is a major trend that is seen as a great opportunity to improve efficiency in many domains, including agriculture. This technology could transform the sector, improving the management and quality of agricultural operations, for example, crop farming. The most promising data transmission standard for this domain seems to be Long Range Wide Area Network (LoRaWAN), a popular representative of low power wide area network technologies today. LoRaWAN, like any wireless protocol, has properties that can be exploited by attackers, which has been a topic of multiple research papers in recent years. By conducting a systematic literature review, we build a recent list of attacks, as well as collect mitigation options. Taking a look at a concrete use case (IoT in agriculture) allows us to evaluate the practicality of both exploiting the vulnerabilities and implementing the countermeasures. We detected 16 attacks that we grouped into six attack types. Along with the attacks, we collect countermeasures for attack mitigation. Developers can use our findings to minimize the risks when developing applications based on LoRaWAN. These mostly theoretical security recommendations should encourage future works to evaluate the mitigations in practice.},
    number = {5},
    journal = {Transactions on Emerging Telecommunications Technologies (ETT)},
    author = {Kuntke, Franz and Romanenko, Vladimir and Linsner, Sebastian and Steinbrink, Enno and Reuter, Christian},
    month = may,
    year = {2022},
    keywords = {Student, Security, A-Paper, Ranking-ImpactFactor, RSF, Projekt-GeoBox, Projekt-GRKPrivacy, Projekt-HyServ, Projekt-AgriRegio},
    pages = {e4452},
    }

  • Franz Kuntke, Sebastian Linsner, Enno Steinbrink, Jonas Franken, Christian Reuter (2022)
    Resilience in Agriculture: Communication and Energy Infrastructure Dependencies of German Farmers
    International Journal of Disaster Risk Science (IJDRS) ;13(2):214–229. doi:10.1007/s13753-022-00404-7
    [BibTeX] [Abstract] [Download PDF]

    Agriculture is subject to high demands regarding resilience as it is an essential component of the food production chain. In the agricultural sector, there is an increasing usage of digital tools that rely on communication and energy infrastructures. Should disruption occur, such strengthened dependencies on other infrastructures increase the probability of ripple effects. Thus, there is a need to analyze the resilience of the agricultural sector with a specific focus on the effects of digitalization. This study works out resilience capacities of the interconnected technologies used in farm systems based on the experiences and opinions of farmers. Information was gathered through focus group interviews with farmers (N = 52) and a survey with participants from the agricultural sector (N = 118). In particular, the focus is put on the digital tools and other information and communication technologies they use. Based on a definition of resilience capacities, we evaluate resilience regarding energy and communication demands in various types of farm systems. Especially important are the resilience aspects of modern systems’ digital communication as well as the poorly developed and nonresilient network infrastructure in rural areas that contrast with the claim for a resilient agriculture. The result is a low robustness capacity, as our analysis concludes with the risk of food production losses.

    @article{kuntke_resilience_2022,
    title = {Resilience in {Agriculture}: {Communication} and {Energy} {Infrastructure} {Dependencies} of {German} {Farmers}},
    volume = {13},
    issn = {2192-6395},
    url = {https://link.springer.com/article/10.1007/s13753-022-00404-7},
    doi = {10.1007/s13753-022-00404-7},
    abstract = {Agriculture is subject to high demands regarding resilience as it is an essential component of the food production chain. In the agricultural sector, there is an increasing usage of digital tools that rely on communication and energy infrastructures. Should disruption occur, such strengthened dependencies on other infrastructures increase the probability of ripple effects. Thus, there is a need to analyze the resilience of the agricultural sector with a specific focus on the effects of digitalization. This study works out resilience capacities of the interconnected technologies used in farm systems based on the experiences and opinions of farmers. Information was gathered through focus group interviews with farmers (N = 52) and a survey with participants from the agricultural sector (N = 118). In particular, the focus is put on the digital tools and other information and communication technologies they use. Based on a definition of resilience capacities, we evaluate resilience regarding energy and communication demands in various types of farm systems. Especially important are the resilience aspects of modern systems’ digital communication as well as the poorly developed and nonresilient network infrastructure in rural areas that contrast with the claim for a resilient agriculture. The result is a low robustness capacity, as our analysis concludes with the risk of food production losses.},
    number = {2},
    journal = {International Journal of Disaster Risk Science (IJDRS)},
    author = {Kuntke, Franz and Linsner, Sebastian and Steinbrink, Enno and Franken, Jonas and Reuter, Christian},
    month = apr,
    year = {2022},
    keywords = {Selected, Security, A-Paper, Ranking-ImpactFactor, Ranking-CORE-B, RSF, Projekt-GeoBox, Projekt-GRKPrivacy, Projekt-HyServ, Projekt-AgriRegio},
    pages = {214--229},
    }

  • Daniel Eberz-Eder, Franz Kuntke, Christian Reuter (2022)
    Sensibilität für Resilient Smart Farming (RSF) und seine Bedeutung in Krisenzeiten
    42. GIL-Jahrestagung: Informatik in der Land-, Forst- und Ernährungswirtschaft Tänikon, Switzerland.
    [BibTeX] [Abstract] [Download PDF]

    Mit der globalen COVID-19-Pandemie und dem Hochwasser in West- und Mitteleuropa im Sommer 2021 hat unter anderem Deutschland in jüngster Vergangenheit zwei schwerwiegende Krisenszenarien erlebt. Die Auswirkungen auf die Gesellschaft und Wirtschaft sind verheerend. Parallel lassen sich Krisenereignisse im digitalen Raum, wie die Zunahme an Cyberkriminalität beobachten. Es wird zunehmend deutlich, dass die Resilienz analoger sowie digitaler Prozesse wichtiger für die vollständige Betriebsfähigkeit wird. Die vorliegende Arbeit setzt sich mit der Bedeutung des Resilient Smart Farming (RSF) in Krisenzeiten als Möglichkeit für eine nachhaltige, umweltgerechte und resiliente digitale Landwirtschaft auseinander. Dazu wurden u.a. lokale Schadensmeldungen gruppiert und mögliche RSF-Gegenmaßnahmen aufgezeigt. Im Ergebnis zeigt sich eine Bewertung von Konzepten des RSF hinsichtlich der Krisenprävention und -bewältigung anhand aktueller realer Beispiele. Aufgrund zunehmender Bedrohungen durch Naturkatastrophen und Cyberkriminialität gehen wir davon aus, dass die Aufmerksamkeit von Gesellschaft und Politik für die Resilienz der Primärproduktion weiter steigen wird.

    @inproceedings{eberz-eder_sensibilitat_2022,
    address = {Tänikon, Switzerland},
    title = {Sensibilität für {Resilient} {Smart} {Farming} ({RSF}) und seine {Bedeutung} in {Krisenzeiten}},
    url = {https://peasec.de/paper/2022/2022_EberzEderKuntkeReuter_SensibilitaetResilientSmartFarmingKrisen_GIL.pdf},
    abstract = {Mit der globalen COVID-19-Pandemie und dem Hochwasser in West- und Mitteleuropa im Sommer 2021 hat unter anderem Deutschland in jüngster Vergangenheit zwei schwerwiegende Krisenszenarien erlebt. Die Auswirkungen auf die Gesellschaft und Wirtschaft sind verheerend. Parallel lassen sich Krisenereignisse im digitalen Raum, wie die Zunahme an Cyberkriminalität beobachten. Es wird zunehmend deutlich, dass die Resilienz analoger sowie digitaler Prozesse wichtiger für die vollständige Betriebsfähigkeit wird. Die vorliegende Arbeit setzt sich mit der Bedeutung des Resilient Smart Farming (RSF) in Krisenzeiten als Möglichkeit für eine nachhaltige, umweltgerechte und resiliente digitale Landwirtschaft auseinander. Dazu wurden u.a. lokale Schadensmeldungen gruppiert und mögliche RSF-Gegenmaßnahmen aufgezeigt. Im Ergebnis zeigt sich eine Bewertung von Konzepten des RSF hinsichtlich der Krisenprävention und -bewältigung anhand aktueller realer Beispiele. Aufgrund zunehmender Bedrohungen durch Naturkatastrophen und Cyberkriminialität gehen wir davon aus, dass die Aufmerksamkeit von Gesellschaft und Politik für die Resilienz der Primärproduktion weiter steigen wird.},
    booktitle = {42. {GIL}-{Jahrestagung}: {Informatik} in der {Land}-, {Forst}- und {Ernährungswirtschaft}},
    publisher = {Gesellschaft für Informatik},
    author = {Eberz-Eder, Daniel and Kuntke, Franz and Reuter, Christian},
    year = {2022},
    keywords = {Crisis, Projekt-GeoBox, Projekt-AgriRegio},
    }

    2021

  • Sebastian Linsner, Franz Kuntke, Enno Steinbrink, Jonas Franken, Christian Reuter (2021)
    The Role of Privacy in Digitalization – Analysing the German Farmers‘ Perspective
    Proceedings on Privacy Enhancing Technologies (PoPETs) ;2021(3):334–350. doi:10.2478/popets-2021-0050
    [BibTeX] [Abstract] [Download PDF]

    Technological progress can disrupt domains and change the way we work and collaborate. This paper presents a qualitative study with 52 German farmers that investigates the impact of the ongoing digitalization process in agriculture and discusses the implications for privacy research. As in other domains, the introduction of digital tools and services leads to the data itself becoming a resource. Sharing this data with products along the supply chain is favored by retailers and consumers, who benefit from traceability through transparency. However, transparency can pose a privacy risk. Having insight into the business data of others along the supply chain provides an advantage in terms of market position. This is particularly true in agriculture, where there is already a significant imbalance of power between actors. A multitude of small and medium-sized farming businesses are opposed by large upstream and downstream players that drive technological innovation. Further weakening the market position of farmers could lead to severe consequences for the entire sector. We found that on the one hand, privacy behaviors are affected by adoption of digitalization, and on the other hand, privacy itself influences adoption of digital tools. Our study sheds light on the emerging challenges for farmers and the role of privacy in the process of digitalization in agriculture.

    @article{linsner_role_2021,
    title = {The {Role} of {Privacy} in {Digitalization} – {Analysing} the {German} {Farmers}' {Perspective}},
    volume = {2021},
    url = {https://www.petsymposium.org/2021/files/papers/issue3/popets-2021-0050.pdf},
    doi = {10.2478/popets-2021-0050},
    abstract = {Technological progress can disrupt domains
    and change the way we work and collaborate. This paper presents a qualitative study with 52 German farmers
    that investigates the impact of the ongoing digitalization process in agriculture and discusses the implications for privacy research. As in other domains, the introduction of digital tools and services leads to the data
    itself becoming a resource. Sharing this data with products along the supply chain is favored by retailers and
    consumers, who benefit from traceability through transparency. However, transparency can pose a privacy risk.
    Having insight into the business data of others along the
    supply chain provides an advantage in terms of market
    position. This is particularly true in agriculture, where
    there is already a significant imbalance of power between actors. A multitude of small and medium-sized
    farming businesses are opposed by large upstream and
    downstream players that drive technological innovation.
    Further weakening the market position of farmers could
    lead to severe consequences for the entire sector. We
    found that on the one hand, privacy behaviors are affected by adoption of digitalization, and on the other
    hand, privacy itself influences adoption of digital tools.
    Our study sheds light on the emerging challenges for
    farmers and the role of privacy in the process of digitalization in agriculture.},
    number = {3},
    journal = {Proceedings on Privacy Enhancing Technologies (PoPETs)},
    author = {Linsner, Sebastian and Kuntke, Franz and Steinbrink, Enno and Franken, Jonas and Reuter, Christian},
    year = {2021},
    keywords = {HCI, Selected, UsableSec, Security, A-Paper, Ranking-ImpactFactor, Ranking-CORE-A, AuswahlUsableSec, Projekt-GeoBox, Projekt-GRKPrivacy, Projekt-HyServ},
    pages = {334--350},
    }

  • Franz Kuntke, Marcel Sinn, Sebastian Linsner, Christian Reuter (2021)
    Low Power Wide Area Networks (LPWAN) für krisentaugliche Datenübertragung in landwirtschaftlichen Betrieben
    41. GIL-Jahrestagung: Informatik in der Land-, Forst- und Ernährungswirtschaft Meyer-Aurich, Andreas Gandorfer, Markus Hoffmann, Christa Weltzien, Cornelia Bellingrath-Kimura, Sonoko D. Floto, Helga.
    [BibTeX] [Abstract] [Download PDF]

    Zuverlässige IT-basierte Kommunikation in der Landwirtschaft wird immer wichtiger für den regulären Betriebsablauf. Sollte sich ein Landwirt beispielsweise während eines lokalen Krisenfalls, wie einem Ausfall des Mobilfunknetzes oder des Internetzugangs des Betriebs, auf dem Feld aufhalten, wird ein alternativer Kommunikationskanal benötigt, um weiterhin eine Verbindung zu IT-Komponenten und benötigten Daten herstellen zu können. Mit der zunehmenden Digitalisierung finden Low-Power-Wide-Area-Network (LPWAN)-Technologien immer häufiger Anwendung, beispielsweise durch den Aufbau von Sensornetzwerken. Die eingesetzten LPWANTechnologien bieten dabei eine hohe Reichweite und sind größtenteils autark einsetzbar, erlauben jedoch keine klassische TCP/IP-Kommunikation. Im Rahmen dieser Arbeit wird experimentell eine populäre LPWAN-Technologie, namentlich LoRaWAN, durch AX.25 auf OSI-Schicht 2 (Data Link Layer) ergänzt, um Endgeräten eine TCP/IP-basierte Kommunikation über weite Strecken zu erlauben. Die Evaluation zeigt, dass klassische Anwendungen mit niedriger Bandbreite somit funktionsfähig sind und krisentaugliche Datenübertragung in landwirtschaftlichen Betrieben ermöglichen können.

    @inproceedings{kuntke_low_2021,
    address = {Meyer-Aurich, Andreas Gandorfer, Markus Hoffmann, Christa Weltzien, Cornelia Bellingrath-Kimura, Sonoko D. Floto, Helga},
    title = {Low {Power} {Wide} {Area} {Networks} ({LPWAN}) für krisentaugliche {Datenübertragung} in landwirtschaftlichen {Betrieben}},
    url = {http://www.peasec.de/paper/2021/2021_KuntkeSinnLinsnerReuter_LowPowerWideAreaNetworks_GIL.pdf},
    abstract = {Zuverlässige IT-basierte Kommunikation in der Landwirtschaft wird immer wichtiger für den regulären Betriebsablauf. Sollte sich ein Landwirt beispielsweise während eines lokalen Krisenfalls, wie einem Ausfall des Mobilfunknetzes oder des Internetzugangs des Betriebs, auf dem Feld aufhalten, wird ein alternativer Kommunikationskanal benötigt, um weiterhin eine Verbindung zu IT-Komponenten und benötigten Daten herstellen zu können. Mit der zunehmenden Digitalisierung finden Low-Power-Wide-Area-Network (LPWAN)-Technologien immer häufiger Anwendung, beispielsweise durch den Aufbau von Sensornetzwerken. Die eingesetzten LPWANTechnologien bieten dabei eine hohe Reichweite und sind größtenteils autark einsetzbar, erlauben jedoch keine klassische TCP/IP-Kommunikation. Im Rahmen dieser Arbeit wird experimentell eine populäre LPWAN-Technologie, namentlich LoRaWAN, durch AX.25 auf OSI-Schicht 2 (Data Link Layer) ergänzt, um Endgeräten eine TCP/IP-basierte Kommunikation über weite Strecken zu erlauben. Die Evaluation zeigt, dass klassische Anwendungen mit niedriger Bandbreite somit funktionsfähig sind und krisentaugliche Datenübertragung in landwirtschaftlichen Betrieben ermöglichen können.},
    booktitle = {41. {GIL}-{Jahrestagung}: {Informatik} in der {Land}-, {Forst}- und {Ernährungswirtschaft}},
    publisher = {Gesellschaft für Informatik},
    author = {Kuntke, Franz and Sinn, Marcel and Linsner, Sebastian and Reuter, Christian},
    editor = {Meyer-Aurich, Andreas and Gandorfer, Markus and Hoffmann, Christa and Weltzien, Cornelia and Bellingrath-Kimura, Sonoko D. and Floto, Helga},
    year = {2021},
    keywords = {Ranking-VHB-C, Security, Projekt-GeoBox, Projekt-HyServ},
    pages = {193--198},
    }

  • Daniel Eberz-Eder, Franz Kuntke, Wolfgang Schneider, Christian Reuter (2021)
    Technologische Umsetzung des Resilient Smart Farming (RSF) durch den Einsatz von Edge-Computing
    41. GIL-Jahrestagung: Informatik in der Land-, Forst- und Ernährungswirtschaft .
    [BibTeX] [Abstract] [Download PDF]

    Edge Computing bietet die Möglichkeit zur Realisierung von Resilient Smart Farming (RSF). Die vorliegende Arbeit setzt sich mit Möglichkeiten der möglichst ausfallsicheren Digitalisierung der Landwirtschaft als kritischer Infrastruktur auseinander und zeigt auf, dass dezentrale Lösungen des Edge Computing inzwischen innovative technologische Möglichkeiten zur Realisierung von RSF bieten. Die Vorteile der lokalen Datenverarbeitung am Entstehungsort in Kombination mit einer regionalen Vernetzung bieten neue Möglichkeiten im Zeitalter von 5GInfrastrukturen und dem Einsatz von IoT-Sensornetzwerken. Der Fokus dieser Arbeit liegt auf Edge Computing als Technologie zur Umsetzung eines resilienten Smart Farming.

    @inproceedings{eberz-eder_technologische_2021,
    title = {Technologische {Umsetzung} des {Resilient} {Smart} {Farming} ({RSF}) durch den {Einsatz} von {Edge}-{Computing}},
    url = {http://www.peasec.de/paper/2021/2021_EberzEderKuntkeSchneiderReuter_TechnischeUmsetzungResilientSmartFarming_GIL.pdf},
    abstract = {Edge Computing bietet die Möglichkeit zur Realisierung von Resilient Smart Farming (RSF). Die vorliegende Arbeit setzt sich mit Möglichkeiten der möglichst ausfallsicheren Digitalisierung der Landwirtschaft als kritischer Infrastruktur auseinander und zeigt auf, dass dezentrale Lösungen des Edge Computing inzwischen innovative technologische Möglichkeiten zur Realisierung von RSF bieten. Die Vorteile der lokalen Datenverarbeitung am Entstehungsort in Kombination mit einer regionalen Vernetzung bieten neue Möglichkeiten im Zeitalter von 5GInfrastrukturen und dem Einsatz von IoT-Sensornetzwerken. Der Fokus dieser Arbeit liegt auf Edge Computing als Technologie zur Umsetzung eines resilienten Smart Farming.},
    booktitle = {41. {GIL}-{Jahrestagung}: {Informatik} in der {Land}-, {Forst}- und {Ernährungswirtschaft}},
    publisher = {Gesellschaft für Informatik},
    author = {Eberz-Eder, Daniel and Kuntke, Franz and Schneider, Wolfgang and Reuter, Christian},
    year = {2021},
    keywords = {Ranking-VHB-C, UsableSec, Security, Projekt-GeoBox},
    pages = {79--84},
    }

  • Franz Kuntke, Marcel Sinn, Christian Reuter (2021)
    Reliable Data Transmission using Low Power Wide Area Networks (LPWAN) for Agricultural Applications
    Proceedings of the 16th International Conference on Availability, Reliability and Security (ARES 2021) . doi:10.1145/3465481.3469191
    [BibTeX] [Abstract] [Download PDF]

    Reliable IT-based communication in agriculture is becoming increasingly important for regular operations. For example, if a farmer is in the field during a network outage, such as a failure of the mobile network, an alternative communication channel is needed to continue to connect to IT components and required data. With increasing digitalization, Low Power Wide Area Network (LPWAN) technologies are being used more and more frequently, e.g. for sensor networks. The LPWAN technologies offer a high range and can be used autonomously for the most part, but do not allow classic TCP/IP communication. In this work, a popular LPWAN technology, namely LoRaWAN, is experimentally supplemented by AX.25 on OSI layer 2 (Data Link Layer) to allow end devices TCP/IP-based communication over long distances. The evaluation shows that classic low-bandwidth applications are thus functional and can enable reliable, crisis-capable data transmission.

    @inproceedings{kuntke_reliable_2021,
    title = {Reliable {Data} {Transmission} using {Low} {Power} {Wide} {Area} {Networks} ({LPWAN}) for {Agricultural} {Applications}},
    url = {http://www.peasec.de/paper/2021/2021_KuntkeSinnReuter_LPWANAgriculture_FARES.pdf},
    doi = {10.1145/3465481.3469191},
    abstract = {Reliable IT-based communication in agriculture is becoming increasingly important for regular operations. For example, if a farmer is in the field during a network outage, such as a failure of the mobile network, an alternative communication channel is needed to continue to connect to IT components and required data. With increasing digitalization, Low Power Wide Area Network (LPWAN) technologies are being used more and more frequently, e.g. for sensor networks. The LPWAN technologies offer a high range and can be used autonomously for the most part, but do not allow classic TCP/IP communication. In this work, a popular LPWAN technology, namely LoRaWAN, is experimentally supplemented by AX.25 on OSI layer 2 (Data Link Layer) to allow end devices TCP/IP-based communication over long distances. The evaluation shows that classic low-bandwidth applications are thus functional and can enable reliable, crisis-capable data transmission.},
    booktitle = {Proceedings of the 16th {International} {Conference} on {Availability}, {Reliability} and {Security} ({ARES} 2021)},
    author = {Kuntke, Franz and Sinn, Marcel and Reuter, Christian},
    year = {2021},
    keywords = {Student, Security, Projekt-GeoBox, Projekt-HyServ},
    pages = {1--9},
    }

    2020

  • Franz Kuntke, Christian Reuter, Wolfgang Schneider, Daniel Eberz, Ansgar Bernardi (2020)
    Die GeoBox-Vision: Resiliente Interaktion und Kooperation in der Landwirtschaft durch dezentrale Systeme
    Mensch und Computer – Workshopband Magdeburg. doi:10.18420/muc2020-ws117-407
    [BibTeX] [Abstract] [Download PDF]

    Betrachtet man Landwirtschaft unter dem Blickwinkel kritischer Infrastruktur, da sie einen essenziellen Bestandteil der lebenswich-tigen Nahrungsmittelproduktion darstellt, so wird schnell klar, dass auch die dort eingesetzten Werkzeuge hohen Anforderungen stand-halten müssen. Mit dem Einsatz moderner digitaler Werkzeuge werden Erwartungen verbunden, sowohl den gesellschaftlichen Anforderungen nach Qualität und Quantität von Nahrungsmitteln gerecht zu werden, als auch dabei die Produktion möglichst effi-zient unter Berücksichtigung von Umwelt und Natur durchzufüh-ren. Ebenso gilt es die Interessen der landwirtschaftlich Beschäftig-ten zu wahren. Die Geobox-Infrastruktur verfolgt dieses Ziel. Zu den wichtigsten Aspekten, die dabei erfüllt werden müssen, zählen eine resiliente Systemarchitektur, Sicherheit und Datenhoheit, aber auch Gebrauchstauglichkeit. Dieser Beitrag diskutiert den For-schungsansatz sowie zentrale Anforderungen.

    @inproceedings{kuntke_geobox-vision_2020,
    address = {Magdeburg},
    title = {Die {GeoBox}-{Vision}: {Resiliente} {Interaktion} und {Kooperation} in der {Landwirtschaft} durch dezentrale {Systeme}},
    url = {https://dl.gi.de/handle/20.500.12116/33548},
    doi = {10.18420/muc2020-ws117-407},
    abstract = {Betrachtet man Landwirtschaft unter dem Blickwinkel kritischer Infrastruktur, da sie einen essenziellen Bestandteil der lebenswich-tigen Nahrungsmittelproduktion darstellt, so wird schnell klar, dass auch die dort eingesetzten Werkzeuge hohen Anforderungen stand-halten müssen. Mit dem Einsatz moderner digitaler Werkzeuge werden Erwartungen verbunden, sowohl den gesellschaftlichen Anforderungen nach Qualität und Quantität von Nahrungsmitteln gerecht zu werden, als auch dabei die Produktion möglichst effi-zient unter Berücksichtigung von Umwelt und Natur durchzufüh-ren. Ebenso gilt es die Interessen der landwirtschaftlich Beschäftig-ten zu wahren. Die Geobox-Infrastruktur verfolgt dieses Ziel. Zu den wichtigsten Aspekten, die dabei erfüllt werden müssen, zählen eine resiliente Systemarchitektur, Sicherheit und Datenhoheit, aber auch Gebrauchstauglichkeit. Dieser Beitrag diskutiert den For-schungsansatz sowie zentrale Anforderungen.},
    booktitle = {Mensch und {Computer} - {Workshopband}},
    publisher = {Gesellschaft für Informatik e.V.},
    author = {Kuntke, Franz and Reuter, Christian and Schneider, Wolfgang and Eberz, Daniel and Bernardi, Ansgar},
    editor = {Hansen, C. and Nürnberger, A. and Preim, B.},
    year = {2020},
    keywords = {Crisis, UsableSec, Security, Infrastructure, Projekt-GeoBox},
    pages = {1--6},
    }

  • Jonas Höchst, Lars Baumgärtner, Franz Kuntke, Alvar Penning, Artur Sterz, Bernd Freisleben (2020)
    LoRa-based Device-to-Device Smartphone Communication for Crisis Scenarios
    Proceedings of Information Systems for Crisis Response and Management (ISCRAM) .
    [BibTeX] [Abstract] [Download PDF]

    In this paper, we present an approach to facilitate long-range device-to-device communication via smartphones in crisis scenarios. Through a custom firmware for low-cost LoRa capable micro-controller boards, called rf95modem, common devices for end users can be enabled to use LoRa through a Bluetooth, Wi-Fi, or serial connection. We present two applications utilizing the flexibility provided by the proposed firmware. First, we introduce a novel device-to-device LoRa chat application that works a) on the two major mobile platforms Android and iOS and b) on traditional computers like notebooks using a console-based interface. Second, we demonstrate how other infrastructure-less technology can benefit from our approach by integrating it into the DTN7 delay-tolerant networking software. The firmware, the device-to-device chat application, the integration into DTN7, as well as the experimental evaluation code fragments are available under permissive open-source licenses.

    @inproceedings{hochst_lora-based_2020,
    title = {{LoRa}-based {Device}-to-{Device} {Smartphone} {Communication} for {Crisis} {Scenarios}},
    url = {https://peasec.de/paper/2020/2020_Höchstetal_LoRaDeviceSmartphoneCommunicationCrisisScenarios.pdf},
    abstract = {In this paper, we present an approach to facilitate long-range device-to-device communication via smartphones in crisis scenarios. Through a custom firmware for low-cost LoRa capable micro-controller boards, called rf95modem, common devices for end users can be enabled to use LoRa through a Bluetooth, Wi-Fi, or serial connection. We present two applications utilizing the flexibility provided by the proposed firmware. First, we introduce a novel device-to-device LoRa chat application that works a) on the two major mobile platforms Android and iOS and b) on traditional computers like notebooks using a console-based interface. Second, we demonstrate how other infrastructure-less technology can benefit from our approach by integrating it into the DTN7 delay-tolerant networking software. The firmware, the device-to-device chat application, the integration into DTN7, as well as the experimental evaluation code fragments are available under permissive open-source licenses.},
    booktitle = {Proceedings of {Information} {Systems} for {Crisis} {Response} and {Management} ({ISCRAM})},
    author = {Höchst, Jonas and Baumgärtner, Lars and Kuntke, Franz and Penning, Alvar and Sterz, Artur and Freisleben, Bernd},
    year = {2020},
    keywords = {Crisis, Security, Projekt-MAKI, Projekt-GeoBox},
    pages = {996--1011},
    }

    2019

  • Sebastian Linsner, Rashmi Varma, Christian Reuter (2019)
    Vulnerability Assessment in the Smart Farming Infrastructure through Cyberattacks
    39. GIL-Jahrestagung: Informatik in der Land-, Forst- und Ernährungswirtschaft Fokus; Digitalisierung für landwirtschaftliche Betriebe in kleinstrukturierten Regionen – ein Widerspruch in sich?, Lecture Notes in Informatics (LNI) Wien, Austria.
    [BibTeX] [Abstract] [Download PDF]

    The Internet of Things (IoT) has a significant impact on agriculture. So-called Smart Farming uses drones and a variety of sensors to measure climate, irrigation, soil moisture or GPS position. With this rapid influx of technology increases the threat that vulnerabilities in those technologies are being exploited for malicious intent. To show the impact of cyberattacks on agriculture, we present a simulation of several attacks on a ZigBee-based wireless sensor network. We conduct a delay attack, an interference attack and three different routing attacks (sinkhole, blackhole and selective forwarding attack). Those attacks are simulated using NETA with the OMNET++ framework. We will show that the security of WSN is influenced by factors like energy consumption or computation power, which can conflict with other interests like low per-unit costs.

    @inproceedings{linsner_vulnerability_2019,
    address = {Wien, Austria},
    title = {Vulnerability {Assessment} in the {Smart} {Farming} {Infrastructure} through {Cyberattacks}},
    url = {http://gil-net.de/Publikationen/139_119.pdf},
    abstract = {The Internet of Things (IoT) has a significant impact on agriculture. So-called Smart Farming uses drones and a variety of sensors to measure climate, irrigation, soil moisture or GPS position. With this rapid influx of technology increases the threat that vulnerabilities in those technologies are being exploited for malicious intent. To show the impact of cyberattacks on agriculture, we present a simulation of several attacks on a ZigBee-based wireless sensor network. We conduct a delay attack, an interference attack and three different routing attacks (sinkhole, blackhole and selective forwarding attack). Those attacks are simulated using NETA with the OMNET++ framework. We will show that the security of WSN is influenced by factors like energy consumption or computation power, which can conflict with other interests like low per-unit costs.},
    booktitle = {39. {GIL}-{Jahrestagung}: {Informatik} in der {Land}-, {Forst}- und {Ernährungswirtschaft} {Fokus}; {Digitalisierung} für landwirtschaftliche {Betriebe} in kleinstrukturierten {Regionen} – ein {Widerspruch} in sich?, {Lecture} {Notes} in {Informatics} ({LNI})},
    publisher = {Gesellschaft für Informatik},
    author = {Linsner, Sebastian and Varma, Rashmi and Reuter, Christian},
    editor = {Meyer-Aurich, A.},
    year = {2019},
    keywords = {Student, Ranking-CORE-C, Ranking-VHB-C, Security, Infrastructure, RSF, Projekt-CROSSING, Projekt-GeoBox, Projekt-HyServ},
    pages = {119--124},
    }

  • Sebastian Linsner, Franz Kuntke, Gina Maria Schmidbauer-Wolf, Christian Reuter (2019)
    Blockchain in der Landwirtschaft 4.0 – Empirische Studie zu Erwartungen von Landwirt_innen gegenüber dezentralen Services auf Basis von Distributed Ledger Technology
    Mensch und Computer – Tagungsband Hamburg, Germany. doi:10.1145/3340764.3340799
    [BibTeX] [Abstract] [Download PDF]

    Digitalization, which proceeds in all branches, as well in agriculture, by using new technology, sensors and networking, requires responsible usage of data. One possibility to manage data and use them to create value is the blockchain-technology. It is primary enforced by the food industries and consumers to ensure traceability and transparency. To put blockchain-technology into beneficial use in agriculture, this domain has to be analyzed regarding social and business aspects. This paper presents the results of a qualitative study where 41 actors from the agricultural do-main participated in focus groups and delivered a written statement. It was found that farmers are interested in adapting new markets and technologies early to get an economic advantage. On the other hand, the fear of losing traditional local business partners and the social surroundings of the farmers must be considered

    @inproceedings{linsner_blockchain_2019,
    address = {Hamburg, Germany},
    title = {Blockchain in der {Landwirtschaft} 4.0 - {Empirische} {Studie} zu {Erwartungen} von {Landwirt}\_innen gegenüber dezentralen {Services} auf {Basis} von {Distributed} {Ledger} {Technology}},
    url = {https://dl.acm.org/citation.cfm?id=3340799},
    doi = {10.1145/3340764.3340799},
    abstract = {Digitalization, which proceeds in all branches, as well in agriculture, by using new technology, sensors and networking, requires responsible usage of data. One possibility to manage data and use them to create value is the blockchain-technology. It is primary enforced by the food industries and consumers to ensure traceability and transparency. To put blockchain-technology into beneficial use in agriculture, this domain has to be analyzed regarding social and business aspects. This paper presents the results of a qualitative study where 41 actors from the agricultural do-main participated in focus groups and delivered a written statement. It was found that farmers are interested in adapting new markets and technologies early to get an economic advantage. On the other hand, the fear of losing traditional local business partners and the social surroundings of the farmers must be considered},
    booktitle = {Mensch und {Computer} - {Tagungsband}},
    publisher = {ACM},
    author = {Linsner, Sebastian and Kuntke, Franz and Schmidbauer-Wolf, Gina Maria and Reuter, Christian},
    editor = {Alt, Florian and Bulling, Andreas and Döring, Tanja},
    year = {2019},
    keywords = {Cooperation, HCI, Projekt-CRISP, Projekt-CROSSING, Projekt-MAKI, Projekt-GeoBox, Projekt-HyServ},
    pages = {103--113},
    }

  • Timo Kalle, Marc-André Kaufhold, Franz Kuntke, Christian Reuter, Amr Rizk, Ralf Steinmetz (2019)
    Resilience in Security and Crises through Adaptions and Transitions
    INFORMATIK 2019: 50 Jahre Gesellschaft für Informatik – Informatik für Gesellschaft (Workshop-Beiträge), Lecture Notes in Informatics (LNI) Kassel, Germany. doi:10.18420/inf2019_ws60
    [BibTeX] [Abstract] [Download PDF]

    Currently, there is a tremendous number of communication technology and tems in use. Not only in the private user space, but also in business operations and societal areas, they are deeply involved: Ranging from messaging services or navigation over (critical) SCADA systems to whole digital cities and communities. Consequently, the view on communication networks in security and particularly crisis scenarios becomes inevitable. This paper examines the notions of resilience, adaption and transition within communication networks with a specific focus on crises. Based on a structured literature review, the fundamentals of resilience and communication networks are introduced. The paper then discusses the characteristics of (a) evolvability, accessibility, usability and diversity as well as (b) self-organization, -management, -optimization, – monitoring, -healing and -protection for communication network resilience. Finally, it outlines challenges and potentials of communication network resilience based in the use cases of security and crises.

    @inproceedings{kalle_resilience_2019,
    address = {Kassel, Germany},
    title = {Resilience in {Security} and {Crises} through {Adaptions} and {Transitions}},
    url = {https://dl.gi.de/bitstream/handle/20.500.12116/25097/paper12_02.pdf},
    doi = {10.18420/inf2019_ws60},
    abstract = {Currently, there is a tremendous number of communication technology and tems in use. Not only in the private user space, but also in business operations and societal areas, they are deeply involved: Ranging from messaging services or navigation over (critical) SCADA systems to whole digital cities and communities. Consequently, the view on communication networks in security and particularly crisis scenarios becomes inevitable. This paper examines the notions of resilience, adaption and transition within communication networks with a specific focus on crises. Based on a structured literature review, the fundamentals of resilience and communication networks are introduced. The paper then discusses the characteristics of (a) evolvability, accessibility, usability and diversity as well as (b) self-organization, -management, -optimization, - monitoring, -healing and -protection for communication network resilience. Finally, it outlines challenges and potentials of communication network resilience based in the use cases of security and crises.},
    booktitle = {{INFORMATIK} 2019: 50 {Jahre} {Gesellschaft} für {Informatik} – {Informatik} für {Gesellschaft} ({Workshop}-{Beiträge}), {Lecture} {Notes} in {Informatics} ({LNI})},
    publisher = {Gesellschaft für Informatik e. V.},
    author = {Kalle, Timo and Kaufhold, Marc-André and Kuntke, Franz and Reuter, Christian and Rizk, Amr and Steinmetz, Ralf},
    editor = {Draude, C. and Lange, M. and Sick, B.},
    year = {2019},
    keywords = {Crisis, HCI, Student, Ranking-CORE-C, Ranking-VHB-C, UsableSec, Security, Projekt-MAKI, Projekt-GeoBox},
    pages = {571--584},
    }

  • Christian Reuter, Wolfgang Schneider, Daniel Eberz (2019)
    Resilient Smart Farming (RSF) – Nutzung digitaler Technologien in krisensicherer Infrastruktur
    39. GIL-Jahrestagung: Informatik in der Land-, Forst- und Ernährungswirtschaft Fokus; Digitalisierung für landwirtschaftliche Betriebe in kleinstrukturierten Regionen – ein Widerspruch in sich?, Lecture Notes in Informatics (LNI) Vienna, Austria.
    [BibTeX] [Abstract] [Download PDF]

    Resilienz ist in aller Munde. Die vorliegende Arbeit setzt sich mit der Ausfall- und Angriffssicherheit der Landwirtschaft als zentraler Bestandteil der Ernährungswirtschaft im digitalen Zeitalter kritisch auseinander. Dabei geht es nicht um die Frage, ob Smart Farming in der landwirtschaftlichen Praxis sinnvoll ist, sondern ob deren Infrastruktur den Anforderungen einer ausfallsicheren (resilienten) Infrastruktur gerecht wird. Da die Ernährungswirtschaft ein Teil der kritischen Infrastruktur ist, ist deren Analyse in Hinsicht auf mögliche Angriffspotenziale und auf Ausfallsicherheit von gesellschaftlicher Relevanz. Wir schlagen Resilient Smart Farming (RSF) zur Nutzung digitaler Technologien in krisensicherer Infrastruktur vor.

    @inproceedings{reuter_resilient_2019,
    address = {Vienna, Austria},
    title = {Resilient {Smart} {Farming} ({RSF}) – {Nutzung} digitaler {Technologien} in krisensicherer {Infrastruktur}},
    url = {http://gil-net.de/Publikationen/139_177.pdf},
    abstract = {Resilienz ist in aller Munde. Die vorliegende Arbeit setzt sich mit der Ausfall- und Angriffssicherheit der Landwirtschaft als zentraler Bestandteil der Ernährungswirtschaft im digitalen Zeitalter kritisch auseinander. Dabei geht es nicht um die Frage, ob Smart Farming in der landwirtschaftlichen Praxis sinnvoll ist, sondern ob deren Infrastruktur den Anforderungen einer ausfallsicheren (resilienten) Infrastruktur gerecht wird. Da die Ernährungswirtschaft ein Teil der kritischen Infrastruktur ist, ist deren Analyse in Hinsicht auf mögliche Angriffspotenziale und auf Ausfallsicherheit von gesellschaftlicher Relevanz. Wir schlagen Resilient Smart Farming (RSF) zur Nutzung digitaler Technologien in krisensicherer Infrastruktur vor.},
    booktitle = {39. {GIL}-{Jahrestagung}: {Informatik} in der {Land}-, {Forst}- und {Ernährungswirtschaft} {Fokus}; {Digitalisierung} für landwirtschaftliche {Betriebe} in kleinstrukturierten {Regionen} – ein {Widerspruch} in sich?, {Lecture} {Notes} in {Informatics} ({LNI})},
    publisher = {Gesellschaft für Informatik},
    author = {Reuter, Christian and Schneider, Wolfgang and Eberz, Daniel},
    editor = {Meyer-Aurich, A.},
    year = {2019},
    keywords = {Crisis, Ranking-CORE-C, Ranking-VHB-C, Infrastructure, RSF, Projekt-GeoBox, Projekt-HyServ},
    pages = {177--182},
    }

  • Marc-André Kaufhold, Margarita Grinko, Christian Reuter, Marén Schorch, Amanda Langer, Sascha Skudelny, Matthias Hollick (2019)
    Potentiale von IKT beim Ausfall kritischer Infrastrukturen: Erwartungen, Informationsgewinnung und Mediennutzung der Zivilbevölkerung in Deutschland
    Proceedings of the International Conference on Wirtschaftsinformatik (WI) Siegen, Germany.
    [BibTeX] [Abstract] [Download PDF]

    In der Sicherheits- und Krisenforschung stehen bislang primär Fragen der Vulne-rabilität, Stärkung von Resilienz und Erhaltung bzw. Wiederherstellung kritischer Infrastrukturen (KRITIS) im Mittelpunkt; zunehmend wird auch die Bedeutung von Sozialen Medien und Krisen-Apps erkannt. Inwiefern ist die Zivilbevölke-rung in Deutschland aber auf das Eintreten einer Krise tatsächlich vorbereitet? Welche Informations- und Kommunikationstechniken (IKT) werden im Alltag und bei einem potentiellen Infrastrukturausfall genutzt? Unser Beitrag stellt die Ergebnisse einer repräsentativen Umfrage mit 1024 Teilnehmern in Deutschland vor, die belegen, dass Gefahrenbewusstsein, Vorbereitung, effektives Krisenma-nagement und Verbreitung von Krisen-Apps in Deutschland noch relativ gering sind, während traditionelle Kommunikations- und Informationskanäle sowie in-formelle Informationsnetzwerke bevorzugt werden. Die Ergebnisse stellen wei-terhin die beträchtlichen Unterstützungspotentiale von IKT in derartigen Krisensi-tuationen heraus, die zur Erhöhung des Risikobewusstseins, der Erleichterung des Informationstransfers und der Verbesserung der Kommunikation zwischen Zivilbevölkerung, KRITIS-Betreibern und Behörden und Organisationen mit Si-cherheitsaufgaben (BOS) entscheidend beitragen können.

    @inproceedings{kaufhold_potentiale_2019,
    address = {Siegen, Germany},
    title = {Potentiale von {IKT} beim {Ausfall} kritischer {Infrastrukturen}: {Erwartungen}, {Informationsgewinnung} und {Mediennutzung} der {Zivilbevölkerung} in {Deutschland}},
    url = {http://www.peasec.de/paper/2019/2019_KaufholdGrinkoReuterSchorschLangerSkudelnyHollick_InfrastrukturAusfall_WI.pdf},
    abstract = {In der Sicherheits- und Krisenforschung stehen bislang primär Fragen der Vulne-rabilität, Stärkung von Resilienz und Erhaltung bzw. Wiederherstellung kritischer Infrastrukturen (KRITIS) im Mittelpunkt; zunehmend wird auch die Bedeutung von Sozialen Medien und Krisen-Apps erkannt. Inwiefern ist die Zivilbevölke-rung in Deutschland aber auf das Eintreten einer Krise tatsächlich vorbereitet? Welche Informations- und Kommunikationstechniken (IKT) werden im Alltag und bei einem potentiellen Infrastrukturausfall genutzt? Unser Beitrag stellt die Ergebnisse einer repräsentativen Umfrage mit 1024 Teilnehmern in Deutschland vor, die belegen, dass Gefahrenbewusstsein, Vorbereitung, effektives Krisenma-nagement und Verbreitung von Krisen-Apps in Deutschland noch relativ gering sind, während traditionelle Kommunikations- und Informationskanäle sowie in-formelle Informationsnetzwerke bevorzugt werden. Die Ergebnisse stellen wei-terhin die beträchtlichen Unterstützungspotentiale von IKT in derartigen Krisensi-tuationen heraus, die zur Erhöhung des Risikobewusstseins, der Erleichterung des Informationstransfers und der Verbesserung der Kommunikation zwischen Zivilbevölkerung, KRITIS-Betreibern und Behörden und Organisationen mit Si-cherheitsaufgaben (BOS) entscheidend beitragen können.},
    booktitle = {Proceedings of the {International} {Conference} on {Wirtschaftsinformatik} ({WI})},
    publisher = {AIS},
    author = {Kaufhold, Marc-André and Grinko, Margarita and Reuter, Christian and Schorch, Marén and Langer, Amanda and Skudelny, Sascha and Hollick, Matthias},
    year = {2019},
    keywords = {Crisis, HCI, SocialMedia, Ranking-CORE-C, Ranking-VHB-C, Ranking-WKWI-A, Projekt-KontiKat, Infrastructure, RSF, Projekt-MAKI, Projekt-GeoBox, Projekt-HyServ},
    pages = {1054--1068},
    }

    2018

  • Christian Reuter, Wolfgang Schneider, Daniel Eberz, Markus Bayer, Daniel Hartung, Cemal Kaygusuz (2018)
    Resiliente Digitalisierung der kritischen Infrastruktur Landwirtschaft – mobil, dezentral, ausfallsicher
    Mensch und Computer – Workshopband Dresden, Germany.
    [BibTeX] [Abstract] [Download PDF]

    Diese Arbeit befasst sich mit der zunehmenden Digitalisierung der kritischen Infrastruktur Ernährungswirtschaft und setzt den Fokus insbesondere auf die dadurch resultierenden in-formationstechnologischen Folgen bezüglich der Angriffs- und Ausfallsicherheit in der Landwirtschaft und von ihr abhängigen Sektoren. In diesem Kontext wird die Modernisie-rungen der Landmaschinen und deren Vernetzung sowie das Cloud-Computing in der Landwirtschaft analysiert und zu treffende Maßnahmen bezüglich einer resilienten Struktur erläutert. In vielen Bereichen wird dabei aufgezeigt, dass das Ausfallrisiko der Produktion zugunsten von Vorteilen wie Ertrags- und Qualitätssteigerung vernachlässigt wird.

    @inproceedings{reuter_resiliente_2018,
    address = {Dresden, Germany},
    title = {Resiliente {Digitalisierung} der kritischen {Infrastruktur} {Landwirtschaft} - mobil, dezentral, ausfallsicher},
    url = {https://dl.gi.de/bitstream/handle/20.500.12116/16930/Beitrag_330_final__a.pdf},
    abstract = {Diese Arbeit befasst sich mit der zunehmenden Digitalisierung der kritischen Infrastruktur Ernährungswirtschaft und setzt den Fokus insbesondere auf die dadurch resultierenden in-formationstechnologischen Folgen bezüglich der Angriffs- und Ausfallsicherheit in der Landwirtschaft und von ihr abhängigen Sektoren. In diesem Kontext wird die Modernisie-rungen der Landmaschinen und deren Vernetzung sowie das Cloud-Computing in der Landwirtschaft analysiert und zu treffende Maßnahmen bezüglich einer resilienten Struktur erläutert. In vielen Bereichen wird dabei aufgezeigt, dass das Ausfallrisiko der Produktion zugunsten von Vorteilen wie Ertrags- und Qualitätssteigerung vernachlässigt wird.},
    booktitle = {Mensch und {Computer} - {Workshopband}},
    publisher = {Gesellschaft für Informatik e.V.},
    author = {Reuter, Christian and Schneider, Wolfgang and Eberz, Daniel and Bayer, Markus and Hartung, Daniel and Kaygusuz, Cemal},
    editor = {Dachselt, Raimund and Weber, Gerhard},
    year = {2018},
    keywords = {Crisis, Student, Projekt-KontiKat, Infrastructure, RSF, Projekt-MAKI, Projekt-GeoBox, Projekt-HyServ},
    pages = {623--632},
    }

    DualUse: IT Research of Concern - Bewertung von Dual-Use Risiken in der Softwareentwicklung (1.1.2019-31.12.2021, FIF-IANUS)

    IT Research of Concern: Bewertung von Dual-Use Risiken in der Softwareentwicklung (1.1.2019-31.12.2021, FIF-IANUS)

    (gemeinsames Projekt mit dem Institut für Philosophie, Prof. Dr. Alfred Nordmann)

    Dual-Use Potentiale werden in Risikobereichen der Physik, Chemie und Biologie in der Forschung und Entwicklung diskutiert, um den Missbrauch einflussreicher Technologien zu verhindern. Diese Ansätze der Dual-use Bewertung werden in diesem Projekt systematisiert und ihre Übertragbarkeit von den klassischen Natur- und Ingenieurwissenschaften in die Informatik, mit besonderem Schwerpunkt auf den Prozess der Softwareentwicklung, überprüft.

    2023

  • Thea Riebe (2023)
    Technology Assessment of Dual-Use ICTs – How to assess Diffusion, Governance and Design
    Darmstadt, Germany: Dissertation (Dr. rer. nat.), Department of Computer Science, Technische Universität Darmstadt. doi:10.26083/tuprints-00022849
    [BibTeX] [Abstract] [Download PDF]

    Technologies that can be used in military and civilian applications are referred to as dual-use. The dual-use nature of many information and communications technologies (ICTs) raises new questions for research and development for national, international, and human security. Measures to deal with the risks associated with the various dual-use technologies, including proliferation control, design approaches, and policy measures, vary widely. For example, Autonomous Weapon Systems (AWS) have not yet been regulated, while cryptographic products are subject to export and import controls. Innovations in artificial intelligence (AI), robotics, cybersecurity, and automated analysis of publicly available data raise new questions about their respective dual-use risks. Dual-use risks have been systematically discussed so far, especially in the life sciences, which have contributed to the development of methods for assessment and risk management. Dual-use risks arise, among other things, from the fact that safety-critical technologies can be easily disseminated or modified, as well as used as part of a weapon system. Therefore, the development and adaptation of robots and software requires an independent consideration that builds on the insights of related dual-use discourses. Therefore, this dissertation considers the management of such risks in terms of the proliferation, regulation, and design of individual dual-use information technologies. Technology Assessment (TA) is the epistemological framework for this work, bringing together the concepts and approaches of Critical Security Studies (CSS) and Human-Computer Interaction (HCI) to help evaluate and shape dual-use technologies. In order to identify the diffusion of dual-use at an early stage, the dissertation first examines the diffusion of dual-use innovations between civilian and military research in expert networks on LinkedIn, as well as on the basis of AI patents in a patent network. The results show low diffusion and tend to confirm existing studies on diffusion in patent networks. In the following section, the regulation of dual-use technologies is examined in the paper through two case studies. The first study uses a discourse analysis to show the value conflicts with regard to the regulation of autonomous weapons systems using the concept of Meaningful Human Control (MHC), while a second study, as a long-term comparative case study, analyzes the change and consequences of the regulation of strong cryptography in the U.S. as well as the programs of intelligence agencies for mass surveillance. Both cases point to the central role of private companies, both in the production of AWS and as intermediaries for the dissemination of encryption, as well as surveillance intermediaries. Subsequently, the dissertation examines the design of a dual-use technology using an Open Source Intelligence System (OSINT) for cybersecurity. For this purpose, conceptual, empirical, and technical studies are conducted as part of the Value-Sensitive Design (VSD) framework. During the studies, implications for research on and design of OSINT were identified. For example, the representative survey of the German population has shown that transparency of use while reducing mistrust is associated with higher acceptance of such systems. Additionally, it has been shown that data sparsity through the use of expert networks has many positive effects, not only improving the performance of the system, but is also preferable for legal and social reasons. Thus, the work contributes to the understanding of specific dual-use risks of AI, the regulation of AWS and cryptography, and the design of OSINT in cybersecurity. By combining concepts from CSS and participatory design methods in HCI, this work provides an interdisciplinary and multi-method contribution.

    @book{riebe_technology_2023,
    address = {Darmstadt, Germany},
    title = {Technology {Assessment} of {Dual}-{Use} {ICTs} – {How} to assess {Diffusion}, {Governance} and {Design}},
    url = {https://tuprints.ulb.tu-darmstadt.de/22849/},
    abstract = {Technologies that can be used in military and civilian applications are referred to as dual-use. The dual-use nature of many information and communications technologies (ICTs) raises new questions for research and development for national, international, and human security. Measures to deal with the risks associated with the various dual-use technologies, including proliferation control, design approaches, and policy measures, vary widely. For example, Autonomous Weapon Systems (AWS) have not yet been regulated, while cryptographic products are subject to export and import controls. Innovations in artificial intelligence (AI), robotics, cybersecurity, and automated analysis of publicly available data raise new questions about their respective dual-use risks.
    Dual-use risks have been systematically discussed so far, especially in the life sciences, which have contributed to the development of methods for assessment and risk management. Dual-use risks arise, among other things, from the fact that safety-critical technologies can be easily disseminated or modified, as well as used as part of a weapon system. Therefore, the development and adaptation of robots and software requires an independent consideration that builds on the insights of related dual-use discourses. Therefore, this dissertation considers the management of such risks in terms of the proliferation, regulation, and design of individual dual-use information technologies. Technology Assessment (TA) is the epistemological framework for this work, bringing together the concepts and approaches of Critical Security Studies (CSS) and Human-Computer Interaction (HCI) to help evaluate and shape dual-use technologies.
    In order to identify the diffusion of dual-use at an early stage, the dissertation first examines the diffusion of dual-use innovations between civilian and military research in expert networks on LinkedIn, as well as on the basis of AI patents in a patent network. The results show low diffusion and tend to confirm existing studies on diffusion in patent networks. In the following section, the regulation of dual-use technologies is examined in the paper through two case studies. The first study uses a discourse analysis to show the value conflicts with regard to the regulation of autonomous weapons systems using the concept of Meaningful Human Control (MHC), while a second study, as a long-term comparative case study, analyzes the change and consequences of the regulation of strong cryptography in the U.S. as well as the programs of intelligence agencies for mass surveillance. Both cases point to the central role of private companies, both in the production of AWS and as intermediaries for the dissemination of encryption, as well as surveillance intermediaries. Subsequently, the dissertation examines the design of a dual-use technology using an Open Source Intelligence System (OSINT) for cybersecurity. For this purpose, conceptual, empirical, and technical studies are conducted as part of the Value-Sensitive Design (VSD) framework. During the studies, implications for research on and design of OSINT were identified. For example, the representative survey of the German population has shown that transparency of use while reducing mistrust is associated with higher acceptance of such systems. Additionally, it has been shown that data sparsity through the use of expert networks has many positive effects, not only improving the performance of the system, but is also preferable for legal and social reasons. Thus, the work contributes to the understanding of specific dual-use risks of AI, the regulation of AWS and cryptography, and the design of OSINT in cybersecurity. By combining concepts from CSS and participatory design methods in HCI, this work provides an interdisciplinary and multi-method contribution.},
    publisher = {Dissertation (Dr. rer. nat.), Department of Computer Science, Technische Universität Darmstadt},
    author = {Riebe, Thea},
    year = {2023},
    doi = {10.26083/tuprints-00022849},
    keywords = {HCI, Projekt-KontiKat, Peace, Projekt-DualUse, Projekt-CYWARN, Dissertation},
    }

  • Thea Riebe (2023)
    Technology Assessment of Dual-Use ICTs – How to assess Diffusion, Governance and Design
    Wiesbaden, Germany: Springer Vieweg.
    [BibTeX] [Abstract] [Download PDF]

    Technologies that can be used in military and civilian applications are referred to as dual-use. The dual-use nature of many information and communications technologies (ICTs) raises new questions for research and development for national, international, and human security. Measures to deal with the risks associated with the various dual-use technologies, including proliferation control, design approaches, and policy measures, vary widely. For example, Autonomous Weapon Systems (AWS) have not yet been regulated, while cryptographic products are subject to export and import controls. Innovations in artificial intelligence (AI), robotics, cybersecurity, and automated analysis of publicly available data raise new questions about their respective dual-use risks. Dual-use risks have been systematically discussed so far, especially in the life sciences, which have contributed to the development of methods for assessment and risk management. Dual-use risks arise, among other things, from the fact that safety-critical technologies can be easily disseminated or modified, as well as used as part of a weapon system. Therefore, the development and adaptation of robots and software requires an independent consideration that builds on the insights of related dual-use discourses. Therefore, this dissertation considers the management of such risks in terms of the proliferation, regulation, and design of individual dual-use information technologies. Technology Assessment (TA) is the epistemological framework for this work, bringing together the concepts and approaches of Critical Security Studies (CSS) and Human-Computer Interaction (HCI) to help evaluate and shape dual-use technologies. In order to identify the diffusion of dual-use at an early stage, the dissertation first examines the diffusion of dual-use innovations between civilian and military research in expert networks on LinkedIn, as well as on the basis of AI patents in a patent network. The results show low diffusion and tend to confirm existing studies on diffusion in patent networks. In the following section, the regulation of dual-use technologies is examined in the paper through two case studies. The first study uses a discourse analysis to show the value conflicts with regard to the regulation of autonomous weapons systems using the concept of Meaningful Human Control (MHC), while a second study, as a long-term comparative case study, analyzes the change and consequences of the regulation of strong cryptography in the U.S. as well as the programs of intelligence agencies for mass surveillance. Both cases point to the central role of private companies, both in the production of AWS and as intermediaries for the dissemination of encryption, as well as surveillance intermediaries. Subsequently, the dissertation examines the design of a dual-use technology using an Open Source Intelligence System (OSINT) for cybersecurity. For this purpose, conceptual, empirical, and technical studies are conducted as part of the Value-Sensitive Design (VSD) framework. During the studies, implications for research on and design of OSINT were identified. For example, the representative survey of the German population has shown that transparency of use while reducing mistrust is associated with higher acceptance of such systems. Additionally, it has been shown that data sparsity through the use of expert networks has many positive effects, not only improving the performance of the system, but is also preferable for legal and social reasons. Thus, the work contributes to the understanding of specific dual-use risks of AI, the regulation of AWS and cryptography, and the design of OSINT in cybersecurity. By combining concepts from CSS and participatory design methods in HCI, this work provides an interdisciplinary and multi-method contribution.

    @book{riebe_technology_2023-1,
    address = {Wiesbaden, Germany},
    title = {Technology {Assessment} of {Dual}-{Use} {ICTs} – {How} to assess {Diffusion}, {Governance} and {Design}},
    isbn = {978-3-658-41666-9},
    url = {https://link.springer.com/book/10.1007/978-3-658-41667-6},
    abstract = {Technologies that can be used in military and civilian applications are referred to as dual-use. The dual-use nature of many information and communications technologies (ICTs) raises new questions for research and development for national, international, and human security. Measures to deal with the risks associated with the various dual-use technologies, including proliferation control, design approaches, and policy measures, vary widely. For example, Autonomous Weapon Systems (AWS) have not yet been regulated, while cryptographic products are subject to export and import controls. Innovations in artificial intelligence (AI), robotics, cybersecurity, and automated analysis of publicly available data raise new questions about their respective dual-use risks.
    Dual-use risks have been systematically discussed so far, especially in the life sciences, which have contributed to the development of methods for assessment and risk management. Dual-use risks arise, among other things, from the fact that safety-critical technologies can be easily disseminated or modified, as well as used as part of a weapon system. Therefore, the development and adaptation of robots and software requires an independent consideration that builds on the insights of related dual-use discourses. Therefore, this dissertation considers the management of such risks in terms of the proliferation, regulation, and design of individual dual-use information technologies. Technology Assessment (TA) is the epistemological framework for this work, bringing together the concepts and approaches of Critical Security Studies (CSS) and Human-Computer Interaction (HCI) to help evaluate and shape dual-use technologies.
    In order to identify the diffusion of dual-use at an early stage, the dissertation first examines the diffusion of dual-use innovations between civilian and military research in expert networks on LinkedIn, as well as on the basis of AI patents in a patent network. The results show low diffusion and tend to confirm existing studies on diffusion in patent networks. In the following section, the regulation of dual-use technologies is examined in the paper through two case studies. The first study uses a discourse analysis to show the value conflicts with regard to the regulation of autonomous weapons systems using the concept of Meaningful Human Control (MHC), while a second study, as a long-term comparative case study, analyzes the change and consequences of the regulation of strong cryptography in the U.S. as well as the programs of intelligence agencies for mass surveillance. Both cases point to the central role of private companies, both in the production of AWS and as intermediaries for the dissemination of encryption, as well as surveillance intermediaries. Subsequently, the dissertation examines the design of a dual-use technology using an Open Source Intelligence System (OSINT) for cybersecurity. For this purpose, conceptual, empirical, and technical studies are conducted as part of the Value-Sensitive Design (VSD) framework. During the studies, implications for research on and design of OSINT were identified. For example, the representative survey of the German population has shown that transparency of use while reducing mistrust is associated with higher acceptance of such systems. Additionally, it has been shown that data sparsity through the use of expert networks has many positive effects, not only improving the performance of the system, but is also preferable for legal and social reasons. Thus, the work contributes to the understanding of specific dual-use risks of AI, the regulation of AWS and cryptography, and the design of OSINT in cybersecurity. By combining concepts from CSS and participatory design methods in HCI, this work provides an interdisciplinary and multi-method contribution.},
    publisher = {Springer Vieweg},
    author = {Riebe, Thea},
    year = {2023},
    note = {https://doi.org/10.1007/978-3-658-41667-6},
    keywords = {HCI, Projekt-KontiKat, Peace, Projekt-DualUse, Projekt-CYWARN, Dissertation},
    }

    2021

  • Thea Riebe, Stefka Schmid, Christian Reuter (2021)
    LinkedIn als Barometer: Austausch zwischen ziviler und militärischer F&E
    Wissenschaft & Frieden: 2021.
    [BibTeX] [Abstract] [Download PDF]

    Gibt es Wissenstransfers zwischen militärischer und ziviler Forschung? Wenn ja, in welchem Umfang? Um die Art und Weise zu untersuchen, wie Unternehmen durch sogenannte »Spillover«-Effekte von den Aktivitäten in den Bereichen »Forschung und Entwicklung« (F&E) eines anderen Unternehmens profi tieren, existieren bereits Methoden, die die Mobilität von Arbeitskräften als Initiator von Wissenstransfers untersuchen. Dieser Beitrag stellt einen ergänzenden Ansatz vor, der auf »Social Media Analytics« (SMA) beruht. Er soll helfen, die »Spillover«-Eff ekte vom Verteidigungsbereich in die zivile F&E quantifi zieren zu können und beruht auf der Analyse von Angaben zum Beschäftigungswechsel aus dem sozialen Netzwerk »LinkedIn«.

    @techreport{riebe_linkedin_2021,
    address = {Wissenschaft \& Frieden},
    title = {{LinkedIn} als {Barometer}: {Austausch} zwischen ziviler und militärischer {F}\&{E}},
    url = {https://peasec.de/paper/2021/2021_RiebeSchmidReuter_LinkedInalsBarometer_WuF.pdf},
    abstract = {Gibt es Wissenstransfers zwischen militärischer und ziviler Forschung? Wenn ja, in welchem Umfang? Um die Art und Weise zu untersuchen, wie Unternehmen durch sogenannte »Spillover«-Effekte von den Aktivitäten in den Bereichen »Forschung und Entwicklung« (F\&E) eines anderen Unternehmens profi tieren, existieren bereits Methoden, die die Mobilität von Arbeitskräften als Initiator von Wissenstransfers untersuchen. Dieser Beitrag stellt einen ergänzenden Ansatz vor, der auf »Social Media Analytics« (SMA) beruht. Er soll helfen, die »Spillover«-Eff ekte vom Verteidigungsbereich in die zivile F\&E quantifi zieren zu können und beruht auf der Analyse von Angaben zum Beschäftigungswechsel aus dem sozialen Netzwerk »LinkedIn«.},
    author = {Riebe, Thea and Schmid, Stefka and Reuter, Christian},
    year = {2021},
    keywords = {Peace, Projekt-DualUse},
    }

  • Christian Reuter, Marc-André Kaufhold (2021)
    Informatik für Frieden-, Konflikt- und Sicherheitsforschung
    In: Christian ReuterSicherheitskritische Mensch-Computer-Interaktion: Interaktive Technologien und Soziale Medien im Krisen- und Sicherheitsmanagement (Zweite Auflage). 2 ed. Wiesbaden, Germany: Springer Vieweg, , 605–630.
    [BibTeX] [Abstract] [Download PDF]

    Seit jeher hatten die Erkenntnisse aus Naturwissenschaft und Technik einen großen Einfluss auf die Art und Weise, wie Kriege und Konflikte ausgetragen wurden bezie-hungsweise werden. Im Kontext von Frieden und Sicherheit können Erkenntnisse, die eigentlich für zivile Kontexte gewonnen wurden, auch für militärische Auseinanderset-zungen genutzt werden (Dual-Use-Problematik). Seit einigen Jahren betrifft dies insbe-sondere die Informatik, die durch die militärische Nutzung von Computern, Cyberwar, Cyberspionage Information Warfare, aber auch in Bereichen wie Desinformationen kon-fliktäre Auseinandersetzungen unterstützen (und verstärken) kann. Auch werden Kon-flikte vermehrt im digitalen Raum ausgetragen, mit erschwerter Zuordnungsmöglichkeit von einzelnen (angreifenden) Akteur*innen. Im Gegenzug dazu bietet die Informatik jedoch auch für friedensstiftende Aktivitäten zahlreiche Einsatzmöglichkeiten. Dieses Kapitel möchte eine Einführung in die zunehmend an Bedeutung gewinnende Thematik liefern.

    @incollection{reuter_informatik_2021,
    address = {Wiesbaden, Germany},
    edition = {2},
    title = {Informatik für {Frieden}-, {Konflikt}- und {Sicherheitsforschung}},
    isbn = {978-3-658-32794-1},
    url = {https://doi.org/10.1007/978-3-658-32795-8_28},
    abstract = {Seit jeher hatten die Erkenntnisse aus Naturwissenschaft und Technik einen großen Einfluss auf die Art und Weise, wie Kriege und Konflikte ausgetragen wurden bezie-hungsweise werden. Im Kontext von Frieden und Sicherheit können Erkenntnisse, die eigentlich für zivile Kontexte gewonnen wurden, auch für militärische Auseinanderset-zungen genutzt werden (Dual-Use-Problematik). Seit einigen Jahren betrifft dies insbe-sondere die Informatik, die durch die militärische Nutzung von Computern, Cyberwar, Cyberspionage Information Warfare, aber auch in Bereichen wie Desinformationen kon-fliktäre Auseinandersetzungen unterstützen (und verstärken) kann. Auch werden Kon-flikte vermehrt im digitalen Raum ausgetragen, mit erschwerter Zuordnungsmöglichkeit von einzelnen (angreifenden) Akteur*innen. Im Gegenzug dazu bietet die Informatik jedoch auch für friedensstiftende Aktivitäten zahlreiche Einsatzmöglichkeiten. Dieses Kapitel möchte eine Einführung in die zunehmend an Bedeutung gewinnende Thematik liefern.},
    booktitle = {Sicherheitskritische {Mensch}-{Computer}-{Interaktion}: {Interaktive} {Technologien} und {Soziale} {Medien} im {Krisen}- und {Sicherheitsmanagement} ({Zweite} {Auflage})},
    publisher = {Springer Vieweg},
    author = {Reuter, Christian and Kaufhold, Marc-André},
    editor = {Reuter, Christian},
    year = {2021},
    keywords = {Security, Peace, Projekt-DualUse, Projekt-CYWARN},
    pages = {605--630},
    }

  • Thea Riebe, Stefka Schmid, Christian Reuter (2021)
    Measuring Spillover Effects from Defense to Civilian Sectors – A Quantitative Approach Using LinkedIn
    Defence and Peace Economics ;32(7):773–785. doi:10.1080/10242694.2020.1755787
    [BibTeX] [Abstract] [Download PDF]

    Spillover effects describe the process of a company benefiting from the R&D activities of another one and thereby gaining an economic advantage. One prominent approach for measuring spillover effects is based on the analysis of patent citation networks. Taking social media analytics and knowledge economics into account, this paper presents a complementary approach to quantify spillover effects from defense to civilian research and development, analyzing 513 employment biographies from the social network LinkedIn. Using descriptive network analysis, we investigate the emigration of personnel of the German defense industry to other civilian producers. Thereby, our study reveals that in the last decade, employees of defense suppliers have changed positions significantly less often, with 3.24 changes on average than professionals who have worked more than 50\% of their jobs in the civilian sector, having changed 4.61 times on average. Our work illustrates the churn behavior and how spillover effects between defense and civilian sectors can be measured using social career networks such as LinkedIn.

    @article{riebe_measuring_2021,
    title = {Measuring {Spillover} {Effects} from {Defense} to {Civilian} {Sectors} – {A} {Quantitative} {Approach} {Using} {LinkedIn}},
    volume = {32},
    url = {https://peasec.de/paper/2021/2021_RiebeSchmidReuter_SpilloverEffectsDefensetoCivilianLinkedIn_PDE.pdf},
    doi = {10.1080/10242694.2020.1755787},
    abstract = {Spillover effects describe the process of a company benefiting from the R\&D activities of another one and thereby gaining an economic advantage. One prominent approach for measuring spillover effects is based on the analysis of patent citation networks. Taking social media analytics and knowledge economics into account, this paper presents a complementary approach to quantify spillover effects from defense to civilian research and development, analyzing 513 employment biographies from the social network LinkedIn. Using descriptive network analysis, we investigate the emigration of personnel of the German defense industry to other civilian producers. Thereby, our study reveals that in the last decade, employees of defense suppliers have changed positions significantly less often, with 3.24 changes on average than professionals who have worked more than 50\% of their jobs in the civilian sector, having changed 4.61 times on average. Our work illustrates the churn behavior and how spillover effects between defense and civilian sectors can be measured using social career networks such as LinkedIn.},
    number = {7},
    journal = {Defence and Peace Economics},
    author = {Riebe, Thea and Schmid, Stefka and Reuter, Christian},
    year = {2021},
    keywords = {Selected, A-Paper, Ranking-ImpactFactor, Peace, Projekt-DualUse, AuswahlPeace, Cyberwar, Projekt-ATHENE-SecUrban},
    pages = {773--785},
    }

  • Thomas Reinhold (2021)
    Zur Rolle und Verantwortung der Informatik für die Friedensforschung und Rüstungskontrolle
    FIfF-Kommunikation ;38:47–49.
    [BibTeX] [Download PDF]

    @article{reinhold_zur_2021,
    title = {Zur {Rolle} und {Verantwortung} der {Informatik} für die {Friedensforschung} und {Rüstungskontrolle}},
    volume = {38},
    url = {https://peasec.de/paper/2021/2021_Reinhold_RolleVerantwortungInformatikFriedensforschung_FIFF.pdf},
    journal = {FIfF-Kommunikation},
    author = {Reinhold, Thomas},
    year = {2021},
    keywords = {Security, Peace, Projekt-DualUse, Cyberwar},
    pages = {47--49},
    }

    2020

  • Thea Riebe, Jasmin Haunschild, Felix Divo, Matthias Lang, Gerbert Roitburd, Jonas Franken, Christian Reuter (2020)
    Die Veränderung der Vorratsdatenspeicherung in Europa
    Datenschutz und Datensicherheit – DuD ;44(5):316–321. doi:10.1007/s11623-020-1275-3
    [BibTeX] [Abstract] [Download PDF]

    Die Diskussion um die Vorratsdatenspeicherung ist europaweit weiterhin relevant, da es keine einheitliche Gesetzgebung der EU-Mitgliedsstaaten gibt. So werden in einigen EU-Staaten weiterhin Vorratsdaten gespeichert, obwohl der EuGH die Vorratsdatenspeicherung für teilweise rechtswidrig erklärt hat. Dabei unterscheiden sich die Speicherdauer, die erhobenen Daten und die Rechte der Behörden erheblich. Der Beitrag vergleicht den Umgang mit der Vorratsdatenspeicherung in zehn EU- und Schengen-Staaten im Hinblick auf Einführung und Aussetzung, Speicherdauer, Speicherinhalte und Zugriffsrechte.

    @article{riebe_veranderung_2020,
    title = {Die {Veränderung} der {Vorratsdatenspeicherung} in {Europa}},
    volume = {44},
    url = {https://www.peasec.de/paper/2020/2020_Riebeetal_VDSinEuropa_DuD.pdf},
    doi = {10.1007/s11623-020-1275-3},
    abstract = {Die Diskussion um die Vorratsdatenspeicherung ist europaweit weiterhin relevant, da es keine einheitliche Gesetzgebung der EU-Mitgliedsstaaten gibt. So werden in einigen EU-Staaten weiterhin Vorratsdaten gespeichert, obwohl der EuGH die Vorratsdatenspeicherung für teilweise rechtswidrig erklärt hat. Dabei unterscheiden sich die Speicherdauer, die erhobenen Daten und die Rechte der Behörden erheblich. Der Beitrag vergleicht den Umgang mit der Vorratsdatenspeicherung in zehn EU- und Schengen-Staaten im Hinblick auf Einführung und Aussetzung, Speicherdauer, Speicherinhalte und Zugriffsrechte.},
    number = {5},
    journal = {Datenschutz und Datensicherheit - DuD},
    author = {Riebe, Thea and Haunschild, Jasmin and Divo, Felix and Lang, Matthias and Roitburd, Gerbert and Franken, Jonas and Reuter, Christian},
    year = {2020},
    keywords = {Student, Security, Projekt-KontiKat, Peace, Projekt-DualUse, Projekt-ATHENE-SecUrban},
    pages = {316--321},
    }

  • Philipp Imperatori, Thea Riebe, Christian Reuter (2020)
    Verschlüsselungspolitik der USA: Vom Clipper-Chip zu Edward Snowden
    FIfF-Kommunikation ;37:77–80.
    [BibTeX] [Download PDF]

    @article{imperatori_verschlusselungspolitik_2020,
    title = {Verschlüsselungspolitik der {USA}: {Vom} {Clipper}-{Chip} zu {Edward} {Snowden}},
    volume = {37},
    url = {https://tuprints.ulb.tu-darmstadt.de/20060/1/fk-1-20-p77.pdf},
    journal = {FIfF-Kommunikation},
    author = {Imperatori, Philipp and Riebe, Thea and Reuter, Christian},
    year = {2020},
    keywords = {Student, Security, Peace, Projekt-DualUse, Projekt-CROSSING},
    pages = {77--80},
    }

  • Thea Riebe, Stefka Schmid, Christian Reuter (2020)
    Meaningful Human Control of Lethal Autonomous Weapon System: The CCW-Debate and its Implications for Value-Sensitive Design
    IEEE Technology and Society Magazine ;39(4):36–51. doi:10.1109/MTS.2020.3031846
    [BibTeX] [Abstract] [Download PDF]

    The debate on the development and deployment of lethal autonomous weapon systems (LAWS) as an emerging technology is of increasing importance, with discussions stalling and technological development progressing. Monitoring the progress of increasingly autonomous weapons systems in civilian and military use as well as regulating possible autonomous systems early on is demanded by civil society actors, like the Campaign to Stop Killer Robots and the International Committee of the Red Cross (ICRC), while nation states follow a variety of interests and strategies, showing little room for consensus on central terms and questions [2], [3]. This article therefore sheds light on the work of the Group of Governmental Experts (GGE) of the UN Convention of Certain Conventional Weapons (CCW). The CCW, offering an arena for international cooperation, has dedicated itself to the purpose of finding common ground with respect to an understanding of LAWS, as well as to the necessary degree of human control. From an ethical perspective, the concept of Meaningful Human Control (MHC) supports a human-centric approach. Several IEEE projects, series and publications are dedicated to this prioritization, especially regarding civilian use. As autonomous technology is increasingly at the center of contemporary military innovations, questions of (human) agency and responsibility in warfare have become even more pressing. As stressed by the United Nations Institute for Disarmament Research (UNIDIR), the concept of MHC may prove useful in the context of development and use of (semi-) autonomous weaponry.

    @article{riebe_meaningful_2020,
    title = {Meaningful {Human} {Control} of {Lethal} {Autonomous} {Weapon} {System}: {The} {CCW}-{Debate} and its {Implications} for {Value}-{Sensitive} {Design}},
    volume = {39},
    url = {https://peasec.de/paper/2020/2020_RiebeSchmidReuter_MHC_IEEETechScieMag.pdf},
    doi = {10.1109/MTS.2020.3031846},
    abstract = {The debate on the development and deployment of lethal autonomous weapon systems (LAWS) as an emerging technology is of increasing importance, with discussions stalling and technological development progressing. Monitoring the progress of increasingly autonomous weapons systems in civilian and military use as well as regulating possible autonomous systems early on is demanded by civil society actors, like the Campaign to Stop Killer Robots and the International Committee of the Red Cross (ICRC), while nation states follow a variety of interests and strategies, showing little room for consensus on central terms and questions [2], [3]. This article therefore sheds light on the work of the Group of Governmental Experts (GGE) of the UN Convention of Certain Conventional Weapons (CCW). The CCW, offering an arena for international cooperation, has dedicated itself to the purpose of finding common ground with respect to an understanding of LAWS, as well as to the necessary degree of human control. From an ethical perspective, the concept of Meaningful Human Control (MHC) supports a human-centric approach. Several IEEE projects, series and publications are dedicated to this prioritization, especially regarding civilian use. As autonomous technology is increasingly at the center of contemporary military innovations, questions of (human) agency and responsibility in warfare have become even more pressing. As stressed by the United Nations Institute for Disarmament Research (UNIDIR), the concept of MHC may prove useful in the context of development and use of (semi-) autonomous weaponry.},
    number = {4},
    journal = {IEEE Technology and Society Magazine},
    author = {Riebe, Thea and Schmid, Stefka and Reuter, Christian},
    year = {2020},
    keywords = {A-Paper, Ranking-ImpactFactor, Projekt-KontiKat, Peace, Projekt-DualUse, AuswahlPeace, Cyberwar},
    pages = {36--51},
    }

  • Sebastian Schwartz, Christian Reuter (2020)
    90.000 Tonnen Diplomatie 2.0: Die Integration von unbemannten Systemen in den operativen Flugzeugträgerbetrieb am Beispiel der X-47B
    Zeitschrift für Außen- und Sicherheitspolitik (ZfAS) ;13(1). doi:10.1007/s12399-020-00803-y
    [BibTeX] [Abstract] [Download PDF]

    Die Debatte um die Integration von autonomen Systemen in Streitkräfte wird oftmals auf einer (militär-)strategischen Ebene geführt. Die technisch-operativen Aspekte werden außerhalb des Fachpublikums häufig nur am Rande erwähnt. Der Beitrag analysiert die Integration von U(C)AVs in den operativen Flugzeugträgerbetrieb am Beispiel der X‑47B. Die Studie zeigt, dass es keine fundamentalen Probleme bei der Integration gibt, U(C)AVs in einem Fünf-Jahres-Horizont zur neuen maritimen Realität gehören und die Gefahr eines Rüstungswettlaufs in Bezug auf autonome Waffensysteme steigen wird.

    @article{schwartz_90000_2020,
    title = {90.000 {Tonnen} {Diplomatie} 2.0: {Die} {Integration} von unbemannten {Systemen} in den operativen {Flugzeugträgerbetrieb} am {Beispiel} der {X}-{47B}},
    volume = {13},
    url = {https://link.springer.com/content/pdf/10.1007/s12399-020-00803-y.pdf},
    doi = {10.1007/s12399-020-00803-y},
    abstract = {Die Debatte um die Integration von autonomen Systemen in Streitkräfte wird oftmals auf einer (militär-)strategischen Ebene geführt. Die technisch-operativen Aspekte werden außerhalb des Fachpublikums häufig nur am Rande erwähnt. Der Beitrag analysiert die Integration von U(C)AVs in den operativen Flugzeugträgerbetrieb am Beispiel der X‑47B. Die Studie zeigt, dass es keine fundamentalen Probleme bei der Integration gibt, U(C)AVs in einem Fünf-Jahres-Horizont zur neuen maritimen Realität gehören und die Gefahr eines Rüstungswettlaufs in Bezug auf autonome Waffensysteme steigen wird.},
    number = {1},
    journal = {Zeitschrift für Außen- und Sicherheitspolitik (ZfAS)},
    author = {Schwartz, Sebastian and Reuter, Christian},
    year = {2020},
    keywords = {Peace, Projekt-DualUse},
    }

  • Philipp Kuehn, Thea Riebe, Lynn Apelt, Max Jansen, Christian Reuter (2020)
    Sharing of Cyber Threat Intelligence between States
    S+F Sicherheit und Frieden / Peace and Security ;38(1):22–28. doi:10.5771/0175-274X-2020-1-22
    [BibTeX] [Abstract] [Download PDF]

    Threats in cyberspace have increased in recent years due to the increment of offensive capabilities by states. Approaches to mitigate the security dilemma in cyberspace within the UN are deadlocked, as states have not been able to achieve agreements. However, from the perspective of IT-Security, there are Cyber Threat Intelligence (CTI) platforms to share and analyze cyber threats for a collective crisis management. To investigate, whether or not CTI platforms can be used as a confidence-building measure between states and international organizations, we portray current CTI platforms, showcase political requirements, and answer the question of how CTI communication may contribute to confidence-building in international affairs. Our results suggest the need to further develop analytical capabilities, as well as the implementation of a broad social, political, and legal environment for international CTI sharing.

    @article{kuehn_sharing_2020,
    title = {Sharing of {Cyber} {Threat} {Intelligence} between {States}},
    volume = {38},
    url = {http://www.peasec.de/paper/2020/2020_KuehnRiebeApeltJansenReuter_SharingCyberThreatIntelligence_SF.pdf},
    doi = {10.5771/0175-274X-2020-1-22},
    abstract = {Threats in cyberspace have increased in recent years due to the increment of offensive capabilities by states. Approaches to mitigate the security dilemma in cyberspace within the UN are deadlocked, as states have not been able to achieve agreements. However, from the perspective of IT-Security, there are Cyber Threat Intelligence (CTI) platforms to share and analyze cyber threats for a collective crisis management. To investigate, whether or not CTI platforms can be used as a confidence-building measure between states and international organizations, we portray current CTI platforms, showcase political requirements, and answer the question of how CTI communication may contribute to confidence-building in international affairs. Our results suggest the need to further develop analytical capabilities, as well as the implementation of a broad social, political, and legal environment for international CTI sharing.},
    number = {1},
    journal = {S+F Sicherheit und Frieden / Peace and Security},
    author = {Kuehn, Philipp and Riebe, Thea and Apelt, Lynn and Jansen, Max and Reuter, Christian},
    year = {2020},
    keywords = {Student, Security, Peace, Projekt-DualUse, Cyberwar, Projekt-ATHENE-SecUrban, Projekt-CYWARN},
    pages = {22--28},
    }

  • Christian Reuter (2020)
    Towards IT Peace Research: Challenges at the Intersection of Peace and Conflict Research and Computer Science
    S+F Sicherheit und Frieden / Peace and Security ;38(1):10–16. doi:10.5771/0175-274X-2020-1-10
    [BibTeX] [Abstract] [Download PDF]

    Advances in science and technology, including information technology (IT), play a crucial role in the context of peace and security. However, research on the intersection of peace and conflict research as well as computer science is not well established yet. This article highlights the need for further work in the area of research “IT peace research”, which includes both empirical research on the role of IT in peace and security, as well as technical research to design technologies and applications. Based on the elaboration of the disciplines, central challenges, such as insecurity, actors, attribution and laws, are outlined.

    @article{reuter_towards_2020-1,
    title = {Towards {IT} {Peace} {Research}: {Challenges} at the {Intersection} of {Peace} and {Conflict} {Research} and {Computer} {Science}},
    volume = {38},
    url = {https://www.nomos-elibrary.de/10.5771/0175-274X-2020-1-10.pdf},
    doi = {10.5771/0175-274X-2020-1-10},
    abstract = {Advances in science and technology, including information technology (IT), play a crucial role in the context of peace and security. However, research on the intersection of peace and conflict research as well as computer science is not well established yet. This article highlights the need for further work in the area of research “IT peace research”, which includes both empirical research on the role of IT in peace and security, as well as technical research to design technologies and applications. Based on the elaboration of the disciplines, central challenges, such as insecurity, actors, attribution and laws, are outlined.},
    number = {1},
    journal = {S+F Sicherheit und Frieden / Peace and Security},
    author = {Reuter, Christian},
    year = {2020},
    keywords = {Security, Peace, Projekt-DualUse, AuswahlPeace, Cyberwar, Projekt-ATHENE-SecUrban},
    pages = {10--16},
    }

  • Christian Reuter, Jürgen Altmann, Malte Göttsche, Mirko Himmel (2020)
    Special Issue: Interdisciplinary Contributions to Natural Science/Technical Peace Research – S+F Sicherheit und Frieden / Peace and Security
    Nomos. doi:10.5771/0175-274X-2020-1
    [BibTeX] [Download PDF]

    @book{reuter_special_2020-1,
    title = {Special {Issue}: {Interdisciplinary} {Contributions} to {Natural} {Science}/{Technical} {Peace} {Research} - {S}+{F} {Sicherheit} und {Frieden} / {Peace} and {Security}},
    volume = {38},
    url = {https://peasec.de/paper/2020/2020_ReuterAltmannGoettscheHimmel_SpecIss_NaturalScienceTechnicalPeaceResarch_SF.pdf},
    number = {1},
    publisher = {Nomos},
    author = {Reuter, Christian and Altmann, Jürgen and Göttsche, Malte and Himmel, Mirko},
    year = {2020},
    doi = {10.5771/0175-274X-2020-1},
    note = {Publication Title: S+F Sicherheit und Frieden / Peace and Security},
    keywords = {Peace, Projekt-DualUse, AuswahlPeace},
    }

  • Thea Riebe (2020)
    Umgang mit Killerrobotern
    2020.
    [BibTeX] [Download PDF]

    @techreport{riebe_umgang_2020,
    title = {Umgang mit {Killerrobotern}},
    url = {https://peasec.de/paper/2020/2020_Riebe_UmgangmitKillerbotobern_WF.pdf},
    author = {Riebe, Thea},
    year = {2020},
    keywords = {Peace, Projekt-DualUse},
    }

    2019

  • Thea Riebe, Amanda Langer, Marc-André Kaufhold, Nina Katharina Kretschmer, Christian Reuter (2019)
    Werte und Wertekonflikte in sozialen Medien für die Vernetzung ungebundener Helfer in Krisensituationen – Ein Value-Sensitive Design Ansatz
    Mensch und Computer – Workshopband Hamburg, Germany. doi:10.18420/muc2019-ws-133-05
    [BibTeX] [Abstract] [Download PDF]

    Bereits während des Hochwassers in Mitteleuropa 2013 und der Flüchtlingskrise in Europa ab 2015 wurde deutlich, dass freiwillige HelferInnen die Bewältigung von Krisensituationen unterstützen. Durch die vermehrte Koordination der Helfenden, auch unter Ein- satz sozialer Medien, kommt es zunehmend zu Konflikten zwi- schen den teilweise kollidierenden Erwartungshaltungen periodi- sierter Werte der eingebundenen Akteure. Die Entwicklung von Kollaborationswerkzeugen mit Hilfe der Methode des Value-Sen- sitive Designs kann bereits im Vorfeld solche Konflikte aufzeigen und gezielt verhindern oder moderieren. Dazu wurde in einer Fall- studie anhand des Hochwassers 2013 induktiv abgeleitet, welche Werte und Erwartungen die unterschiedlichen Stakeholder haben, und welche Konflikte sich daraus im Hinblick auf die Anforderun- gen ergeben. Diese Studie zeigt insbesondere die Konfliktpotenzi- ale für freiwillige HelferInnen in sozialen Medien in Bezug auf den Schutz der Privatsphäre und vor Diskriminierung auf und leistet damit einen Beitrag für die Konflikt-Optimierung und Akzeptanz- steigerung des Einsatzes sozialer Medien im Katastrophenschutz.

    @inproceedings{riebe_werte_2019,
    address = {Hamburg, Germany},
    title = {Werte und {Wertekonflikte} in sozialen {Medien} für die {Vernetzung} ungebundener {Helfer} in {Krisensituationen} – {Ein} {Value}-{Sensitive} {Design} {Ansatz}},
    url = {https://dl.gi.de/bitstream/handle/20.500.12116/25150/133-05.pdf},
    doi = {10.18420/muc2019-ws-133-05},
    abstract = {Bereits während des Hochwassers in Mitteleuropa 2013 und der Flüchtlingskrise in Europa ab 2015 wurde deutlich, dass freiwillige HelferInnen die Bewältigung von Krisensituationen unterstützen. Durch die vermehrte Koordination der Helfenden, auch unter Ein- satz sozialer Medien, kommt es zunehmend zu Konflikten zwi- schen den teilweise kollidierenden Erwartungshaltungen periodi- sierter Werte der eingebundenen Akteure. Die Entwicklung von Kollaborationswerkzeugen mit Hilfe der Methode des Value-Sen- sitive Designs kann bereits im Vorfeld solche Konflikte aufzeigen und gezielt verhindern oder moderieren. Dazu wurde in einer Fall- studie anhand des Hochwassers 2013 induktiv abgeleitet, welche Werte und Erwartungen die unterschiedlichen Stakeholder haben, und welche Konflikte sich daraus im Hinblick auf die Anforderun- gen ergeben. Diese Studie zeigt insbesondere die Konfliktpotenzi- ale für freiwillige HelferInnen in sozialen Medien in Bezug auf den Schutz der Privatsphäre und vor Diskriminierung auf und leistet damit einen Beitrag für die Konflikt-Optimierung und Akzeptanz- steigerung des Einsatzes sozialer Medien im Katastrophenschutz.},
    booktitle = {Mensch und {Computer} - {Workshopband}},
    publisher = {Gesellschaft für Informatik e.V.},
    author = {Riebe, Thea and Langer, Amanda and Kaufhold, Marc-André and Kretschmer, Nina Katharina and Reuter, Christian},
    year = {2019},
    keywords = {Crisis, SocialMedia, Student, Security, Projekt-KontiKat, Peace, Projekt-DualUse},
    pages = {308--318},
    }

  • Thea Riebe, Marc-André Kaufhold, Tarun Kumar, Thomas Reinhold, Christian Reuter (2019)
    Threat Intelligence Application for Cyber Attribution
    SCIENCE PEACE SECURITY ’19 – Proceedings of the Interdisciplinary Conference on Technical Peace and Security Research Darmstadt, Germany.
    [BibTeX] [Abstract] [Download PDF]

    Attribution consists of technical, legal and politically defined processes. However, the interna- tional community has not yet defined processes unilaterally, even though the UN GGE has proposed to address the increase of cyber operations. Taking existing threat exchange stand- ards into account, this paper presents an approach to support efforts for more effective attrib- ution by developing a platform with the common open source threat exchange formats STIX and MEAC. Furthermore, the platform is evaluated in terms of usability.

    @inproceedings{riebe_threat_2019,
    address = {Darmstadt, Germany},
    title = {Threat {Intelligence} {Application} for {Cyber} {Attribution}},
    url = {https://tuprints.ulb.tu-darmstadt.de/id/eprint/9164},
    abstract = {Attribution consists of technical, legal and politically defined processes. However, the interna- tional community has not yet defined processes unilaterally, even though the UN GGE has proposed to address the increase of cyber operations. Taking existing threat exchange stand- ards into account, this paper presents an approach to support efforts for more effective attrib- ution by developing a platform with the common open source threat exchange formats STIX and MEAC. Furthermore, the platform is evaluated in terms of usability.},
    booktitle = {{SCIENCE} {PEACE} {SECURITY} '19 - {Proceedings} of the {Interdisciplinary} {Conference} on {Technical} {Peace} and {Security} {Research}},
    publisher = {TUprints},
    author = {Riebe, Thea and Kaufhold, Marc-André and Kumar, Tarun and Reinhold, Thomas and Reuter, Christian},
    editor = {Reuter, Christian and Altmann, Jürgen and Göttsche, Malte and Himmel, Mirko},
    year = {2019},
    keywords = {Student, Security, Peace, Projekt-DualUse},
    pages = {56--60},
    }

  • Thea Riebe, Christian Reuter (2019)
    Dual Use and Dilemmas for Cybersecurity, Peace and Technology Assessment
    In: Christian Reuter: Information Technology for Peace and Security – IT-Applications and Infrastructures in Conflicts, Crises, War, and Peace. Wiesbaden, Germany: Springer Vieweg, , 165–184. doi:10.1007/978-3-658-25652-4_8
    [BibTeX] [Abstract] [Download PDF]

    Dual-use in information technology is a pressing issue: how can we prevent, control or manage the risk of a harmful application of IT? How can dual-use awareness and regu-lation help to mitigate the risks to peace and security on the national and international level? As the cyberspace has been declared a military domain, IT is of increasing im-portance for civil and military infrastructures. How can researchers, developers and decision makers make sure that IT is not misused to cause harm? For nuclear, biological and chemical technologies this has been discussed as the dual-use problem. This chapter illustrates the approaches towards different dual-use concepts, how to conduct a tech-nology assessment and provides insight into the implementation of dual-use assessment guidelines at TU Darmstadt, the so-called Civil Clause.

    @incollection{riebe_dual_2019,
    address = {Wiesbaden, Germany},
    title = {Dual {Use} and {Dilemmas} for {Cybersecurity}, {Peace} and {Technology} {Assessment}},
    isbn = {978-3-658-25652-4},
    url = {https://link.springer.com/chapter/10.1007/978-3-658-25652-4_8},
    abstract = {Dual-use in information technology is a pressing issue: how can we prevent, control or manage the risk of a harmful application of IT? How can dual-use awareness and regu-lation help to mitigate the risks to peace and security on the national and international level? As the cyberspace has been declared a military domain, IT is of increasing im-portance for civil and military infrastructures. How can researchers, developers and decision makers make sure that IT is not misused to cause harm? For nuclear, biological and chemical technologies this has been discussed as the dual-use problem. This chapter illustrates the approaches towards different dual-use concepts, how to conduct a tech-nology assessment and provides insight into the implementation of dual-use assessment guidelines at TU Darmstadt, the so-called Civil Clause.},
    booktitle = {Information {Technology} for {Peace} and {Security} - {IT}-{Applications} and {Infrastructures} in {Conflicts}, {Crises}, {War}, and {Peace}},
    publisher = {Springer Vieweg},
    author = {Riebe, Thea and Reuter, Christian},
    editor = {Reuter, Christian},
    year = {2019},
    doi = {10.1007/978-3-658-25652-4_8},
    keywords = {Projekt-KontiKat, Peace, Projekt-CRISP, Projekt-DualUse},
    pages = {165--184},
    }

  • Thea Riebe, Christian Reuter (2019)
    Dual-Use in der IT: Bewertung in der Softwareentwicklung
    Wissenschaft & Frieden 2019-1: 2019.
    [BibTeX] [Abstract] [Download PDF]

    Der Einsatz von Informationstechnologie (IT) im Frieden ebenso wie in Konflikten und für Sicherheitszwecke wirft einige Fragen auf (Reuter 2019), u.a. ob die Nutzung von IT auf so genannte förderliche Zwecke und Anwendungen begrenzt und eine schädliche Nutzung verhindert werden kann (Riebe und Reuter 2019). Diese Ambivalenz wird als Dual-use-Dilemma bezeichnet und bedeutet, dass Gegenstände, Wissen und Technologie sowohl nützliche als auch schädliche Anwendung fi nden können. Dual-use-Fragen stellen sich in ganz unterschiedlichen technischen und naturwissenschaftlichen Disziplinen, insbesondere in der Nukleartechnologie sowie in der Chemie und Biologie. Dabei unterscheidet sich die Bedeutung von Dual-use je nach Technologie, ihren spezifi schen Risiken und Szenarien sowie ihrer Distribution und Anwendung. Konkret bedeutet dies: Sicherheitspolitische Risikoszenarien und Anwender der Nukleartechnologie unterscheiden sich erheblich von denen der IT.

    @techreport{riebe_dual-use_2019,
    address = {Wissenschaft \& Frieden 2019-1},
    title = {Dual-{Use} in der {IT}: {Bewertung} in der {Softwareentwicklung}},
    url = {http://www.peasec.de/paper/2019/2019_RiebeReuter_DualUse_WuF.pdf},
    abstract = {Der Einsatz von Informationstechnologie (IT) im Frieden ebenso wie in Konflikten und für Sicherheitszwecke wirft einige Fragen auf (Reuter 2019), u.a. ob die Nutzung von IT auf so genannte förderliche Zwecke und Anwendungen begrenzt und eine schädliche Nutzung verhindert werden kann (Riebe und Reuter 2019). Diese Ambivalenz wird als Dual-use-Dilemma bezeichnet und bedeutet, dass Gegenstände, Wissen und Technologie sowohl nützliche als auch schädliche Anwendung fi nden können. Dual-use-Fragen stellen sich in ganz unterschiedlichen technischen und naturwissenschaftlichen Disziplinen, insbesondere in der Nukleartechnologie sowie in der Chemie und Biologie. Dabei unterscheidet sich die Bedeutung von Dual-use je nach Technologie, ihren spezifi schen Risiken und Szenarien sowie ihrer Distribution und Anwendung. Konkret bedeutet dies: Sicherheitspolitische Risikoszenarien und Anwender der Nukleartechnologie unterscheiden sich erheblich von denen der IT.},
    author = {Riebe, Thea and Reuter, Christian},
    year = {2019},
    keywords = {Projekt-KontiKat, Peace, Projekt-DualUse},
    pages = {46--48},
    }

  • Christian Reuter, Jürgen Altmann, Malte Göttsche, Mirko Himmel (2019)
    SCIENCE PEACE SECURITY ’19 – Proceedings of the Interdisciplinary Conference on Technical Peace and Security Research
    Darmstadt, Germany: TUprints.
    [BibTeX] [Abstract] [Download PDF]

    Scientific discoveries and technological innovations have always exerted a great influence on peace and security. New civil and military technologies are revolutionizing warfare. Particularly striking areas are cyber warfare and the rapid development of unmanned weapons systems. Issues of nuclear disarmament, missile defence or space armament as well as chemical and biological weapons are again becoming more urgent. The conference SCIENCE · PEACE · SECURITY ’19 aimed for an accurate understanding and fruitful discussions of today’s and tomorrow’s peace and security challenges. This includes scientific-technical as well as inter- disciplinary contributions, focusing on problems of international security and peace-building as well as contributions dedicated to transparency, trust-building, arms control, disarmament, and conflict management.

    @book{reuter_science_2019,
    address = {Darmstadt, Germany},
    title = {{SCIENCE} {PEACE} {SECURITY} '19 - {Proceedings} of the {Interdisciplinary} {Conference} on {Technical} {Peace} and {Security} {Research}},
    url = {https://tuprints.ulb.tu-darmstadt.de/id/eprint/9164},
    abstract = {Scientific discoveries and technological innovations have always exerted a great influence on peace and security. New civil and military technologies are revolutionizing warfare. Particularly striking areas are cyber warfare and the rapid development of unmanned weapons systems. Issues of nuclear disarmament, missile defence or space armament as well as chemical and biological weapons are again becoming more urgent. The conference SCIENCE · PEACE · SECURITY '19 aimed for an accurate understanding and fruitful discussions of today's and tomorrow's peace and security challenges. This includes scientific-technical as well as inter- disciplinary contributions, focusing on problems of international security and peace-building as well as contributions dedicated to transparency, trust-building, arms control, disarmament, and conflict management.},
    publisher = {TUprints},
    author = {Reuter, Christian and Altmann, Jürgen and Göttsche, Malte and Himmel, Mirko},
    year = {2019},
    keywords = {Crisis, Security, Peace, Projekt-DualUse},
    }

  • Larissa Aldehoff, Meri Dankenbring, Christian Reuter (2019)
    Renouncing Privacy in Crisis Management? People’s View on Social Media Monitoring and Surveillance
    Proceedings of the Information Systems for Crisis Response and Management (ISCRAM) València, Spain.
    [BibTeX] [Abstract] [Download PDF]

    Social media is used during crises and disasters by state authorities and citizens to communicate and provide, gain and analyze information. Monitoring of platforms in such cases is both a well-established practice and a research area. The question, whether people are willing to renounce privacy in social media during critical incidents, or even allow surveillance in order to contribute to public security, remains unanswered. Our survey of 1,024 German inhabitants is the first empirical study on people’s views on social media monitoring and surveillance in crisis management. We find the willingness to share data during an imminent threat depends mostly on the type of data: a majority (63\% and 67\%, respectively) would give access to addresses and telephone numbers, whereas the willingness to share content of chats or telephone calls is significantly lower (27\%). Our analysis reveals diverging opinions among participants and some effects of sociodemographic variables on the acceptance of invasions into privacy.

    @inproceedings{aldehoff_renouncing_2019,
    address = {València, Spain},
    title = {Renouncing {Privacy} in {Crisis} {Management}? {People}'s {View} on {Social} {Media} {Monitoring} and {Surveillance}},
    url = {http://www.peasec.de/paper/2019/2019_AldehoffDankenbringReuter_RenouncingPrivacyCrisisManagement_ISCRAM.pdf},
    abstract = {Social media is used during crises and disasters by state authorities and citizens to communicate and provide, gain and analyze information. Monitoring of platforms in such cases is both a well-established practice and a research area. The question, whether people are willing to renounce privacy in social media during critical incidents, or even allow surveillance in order to contribute to public security, remains unanswered. Our survey of 1,024 German inhabitants is the first empirical study on people's views on social media monitoring and surveillance in crisis management. We find the willingness to share data during an imminent threat depends mostly on the type of data: a majority (63\% and 67\%, respectively) would give access to addresses and telephone numbers, whereas the willingness to share content of chats or telephone calls is significantly lower (27\%). Our analysis reveals diverging opinions among participants and some effects of sociodemographic variables on the acceptance of invasions into privacy.},
    booktitle = {Proceedings of the {Information} {Systems} for {Crisis} {Response} and {Management} ({ISCRAM})},
    publisher = {ISCRAM Association},
    author = {Aldehoff, Larissa and Dankenbring, Meri and Reuter, Christian},
    editor = {Franco, Zeno and González, José J. and Canós, José H.},
    year = {2019},
    keywords = {Crisis, SocialMedia, Student, UsableSec, Security, Peace, Projekt-CRISP, Projekt-DualUse, Projekt-CROSSING, Projekt-ATHENE-FANCY},
    pages = {1184--1197},
    }

  • Christian Reuter, Thea Riebe, Larissa Aldehoff, Marc-André Kaufhold, Thomas Reinhold (2019)
    Cyberwar zwischen Fiktion und Realität – technologische Möglichkeiten
    In: Ines-Jacqueline Werkner, Niklas Schörnig: Cyberwar – die Digitalisierung der Kriegsführung. Springer VS, , 15–38. doi:10.1007/978-3-658-27713-0
    [BibTeX] [Abstract] [Download PDF]

    Im Dezember 2017 wurde eine Invasion des deutschen Regierungsnetzwerks entdeckt; dieses vernetzt Bundesministerien und Behörden (vgl. Reinhold 2018a). Die Angreifer nutzten das Intranet der Hochschule des Bundes für öffentliche Verwaltung und der Bundesakademie für öffentliche Verwaltung als Einfallstor. Dieses ist der am wenigsten gesicherte Teil des Systems, da externe Teilnehmerinnen und Teilnehmer auch außerhalb der Einrichtung darauf zugreifen müssen, beispielsweise für Fortbildungen des Auswärtigen Amtes.

    @incollection{reuter_cyberwar_2019,
    title = {Cyberwar zwischen {Fiktion} und {Realität} – technologische {Möglichkeiten}},
    isbn = {978-3-658-27713-0},
    url = {https://peasec.de/paper/2019/2019_ReuterRiebeAldehoffKaufholdReinhold2019_CyberwarZwischenFiktionUndReal_Cyberwar.pdf},
    abstract = {Im Dezember 2017 wurde eine Invasion des deutschen Regierungsnetzwerks entdeckt; dieses vernetzt Bundesministerien und Behörden (vgl. Reinhold 2018a). Die Angreifer nutzten das Intranet der Hochschule des Bundes für öffentliche Verwaltung und der Bundesakademie für öffentliche Verwaltung als Einfallstor. Dieses ist der am wenigsten gesicherte Teil des Systems, da externe Teilnehmerinnen und Teilnehmer auch außerhalb der Einrichtung darauf zugreifen müssen, beispielsweise für Fortbildungen des Auswärtigen Amtes.},
    booktitle = {Cyberwar – die {Digitalisierung} der {Kriegsführung}},
    publisher = {Springer VS},
    author = {Reuter, Christian and Riebe, Thea and Aldehoff, Larissa and Kaufhold, Marc-André and Reinhold, Thomas},
    editor = {Werkner, Ines-Jacqueline and Schörnig, Niklas},
    year = {2019},
    doi = {10.1007/978-3-658-27713-0},
    keywords = {Security, Peace, Projekt-DualUse, Cyberwar},
    pages = {15--38},
    }

  • Thomas Reinhold, Christian Reuter (2019)
    From Cyber War to Cyber Peace
    In: Christian Reuter: Information Technology for Peace and Security – IT-Applications and Infrastructures in Conflicts, Crises, War, and Peace. Wiesbaden, Germany: Springer Vieweg, , 139–164. doi:10.1007/978-3-658-25652-4_7
    [BibTeX] [Abstract] [Download PDF]

    The encompassing trend of digitalisation and widespread dependencies on IT systems triggers adjustments also in the military forces. Besides necessary enhancements of IT security and defensive measures for cyberspace, a growing number of states are estab-lishing offensive military capabilities for this domain. Looking at historical develop-ments and transformations due to advancements in military technologies, the chapter discusses the political progress made and tools developed since. Both of these have con-tributed to handling challenges and confining threats to international security. With this background, the text assesses a possible application of these efforts to developments concerning cyberspace, as well as obstacles that need to be tackled for it to be success-ful. The chapter points out political advancements already in progress, the role of social initiatives, such as the cyber peace campaign of the Forum of Computer Scientists for Peace and Societal Responsibility (FifF), as well as potential consequences of the rising probability of cyber war as opposed to the prospects of cyber peace.

    @incollection{reinhold_cyber_2019,
    address = {Wiesbaden, Germany},
    title = {From {Cyber} {War} to {Cyber} {Peace}},
    isbn = {978-3-658-25652-4},
    url = {https://www.springer.com/de/book/9783658256517},
    abstract = {The encompassing trend of digitalisation and widespread dependencies on IT systems triggers adjustments also in the military forces. Besides necessary enhancements of IT security and defensive measures for cyberspace, a growing number of states are estab-lishing offensive military capabilities for this domain. Looking at historical develop-ments and transformations due to advancements in military technologies, the chapter discusses the political progress made and tools developed since. Both of these have con-tributed to handling challenges and confining threats to international security. With this background, the text assesses a possible application of these efforts to developments concerning cyberspace, as well as obstacles that need to be tackled for it to be success-ful. The chapter points out political advancements already in progress, the role of social initiatives, such as the cyber peace campaign of the Forum of Computer Scientists for Peace and Societal Responsibility (FifF), as well as potential consequences of the rising probability of cyber war as opposed to the prospects of cyber peace.},
    booktitle = {Information {Technology} for {Peace} and {Security} - {IT}-{Applications} and {Infrastructures} in {Conflicts}, {Crises}, {War}, and {Peace}},
    publisher = {Springer Vieweg},
    author = {Reinhold, Thomas and Reuter, Christian},
    editor = {Reuter, Christian},
    year = {2019},
    doi = {10.1007/978-3-658-25652-4_7},
    keywords = {Security, Peace, Projekt-CRISP, Projekt-DualUse, Projekt-CROSSING, Cyberwar},
    pages = {139--164},
    }

  • Stefka Schmid, Thea Riebe, Christian Reuter (2019)
    Meaningful Human Control of Lethal Autonomous Weapon Systems
    In: Christian Reuter, Jürgen Altmann, Malte Göttsche, Mirko Himmel: SCIENCE PEACE SECURITY ’19 – Proceedings of the Interdisciplinary Conference on Technical Peace and Security Research. Darmstadt, Germany: TUprints, , 196–200.
    [BibTeX] [Abstract] [Download PDF]

    In the discussion of lethal autonomous weapon systems (LAWS) in the expert forum of the Convention on Certain Conventional Weapons (CCW), the interpretation of crucial concepts such as autonomy and human control is decisive for the future direction of international hu- manitarian law. Starting from the perspective of a synthesis of Actor-Network Theory (ANT) and Value-Sensitive-Design (VSD), we aim to analyse the discourse of LAWS and ask for pos- sibilities to implement Meaningful Human Control.

    @incollection{schmid_meaningful_2019,
    address = {Darmstadt, Germany},
    title = {Meaningful {Human} {Control} of {Lethal} {Autonomous} {Weapon} {Systems}},
    url = {https://tuprints.ulb.tu-darmstadt.de/id/eprint/9164},
    abstract = {In the discussion of lethal autonomous weapon systems (LAWS) in the expert forum of the Convention on Certain Conventional Weapons (CCW), the interpretation of crucial concepts such as autonomy and human control is decisive for the future direction of international hu- manitarian law. Starting from the perspective of a synthesis of Actor-Network Theory (ANT) and Value-Sensitive-Design (VSD), we aim to analyse the discourse of LAWS and ask for pos- sibilities to implement Meaningful Human Control.},
    booktitle = {{SCIENCE} {PEACE} {SECURITY} '19 - {Proceedings} of the {Interdisciplinary} {Conference} on {Technical} {Peace} and {Security} {Research}},
    publisher = {TUprints},
    author = {Schmid, Stefka and Riebe, Thea and Reuter, Christian},
    editor = {Reuter, Christian and Altmann, Jürgen and Göttsche, Malte and Himmel, Mirko},
    year = {2019},
    keywords = {Student, Security, Peace, Projekt-DualUse},
    pages = {196--200},
    }

  • Christian Reuter (2019)
    Information Technology for Peace and Security – IT-Applications and Infrastructures in Conflicts, Crises, War, and Peace
    Wiesbaden, Germany: Springer Vieweg. doi:10.1007/978-3-658-25652-4
    [BibTeX] [Abstract] [Download PDF]

    Technological and scientific progress, especially the rapid development in information technology (IT), plays a crucial role regarding questions of peace and security. This textbook addresses the significance, potentials and challenges of IT for peace and securi-ty. For this purpose, the book offers an introduction to peace, conflict, and security research, thereby focusing on natural-science, technical and computer science perspec-tives. In the following, it sheds light on cyber conflicts, war and peace, cyber arms con-trol, cyber attribution and infrastructures as well as culture and interaction before an outlook is given.

    @book{reuter_information_2019-1,
    address = {Wiesbaden, Germany},
    title = {Information {Technology} for {Peace} and {Security} - {IT}-{Applications} and {Infrastructures} in {Conflicts}, {Crises}, {War}, and {Peace}},
    isbn = {978-3-658-25652-4},
    url = {https://www.springer.com/de/book/9783658256517},
    abstract = {Technological and scientific progress, especially the rapid development in information technology (IT), plays a crucial role regarding questions of peace and security. This textbook addresses the significance, potentials and challenges of IT for peace and securi-ty. For this purpose, the book offers an introduction to peace, conflict, and security research, thereby focusing on natural-science, technical and computer science perspec-tives. In the following, it sheds light on cyber conflicts, war and peace, cyber arms con-trol, cyber attribution and infrastructures as well as culture and interaction before an outlook is given.},
    publisher = {Springer Vieweg},
    author = {Reuter, Christian},
    year = {2019},
    doi = {10.1007/978-3-658-25652-4},
    keywords = {Crisis, Selected, Security, Peace, Infrastructure, Projekt-CRISP, Projekt-DualUse, RSF, Projekt-CROSSING, AuswahlPeace, Cyberwar, Projekt-MAKI},
    }

  • Thea Riebe, Christian Reuter (2019)
    Accessing Dual Use in IT Development
    SCIENCE PEACE SECURITY ’19 – Proceedings of the Interdisciplinary Conference on Technical Peace and Security Research Darmstadt, Germany.
    [BibTeX] [Abstract] [Download PDF]

    The use of information technology (IT) in peace, conflict and security raises some questions, i.e. whether the use of IT can be limited exclusively to so-called advantageous purposes and applications and whether improper use can be prevented. This ambivalence is called a dual- use dilemma, meaning that objects, knowledge and technology can find both useful and harm- ful applications. Dual-use questions have been addressed in various disciplines, in particular in nuclear technology and the production of nuclear weapons, but also in chemistry and biology. In all these disciplines, dual-use topics in technical development and education have been discussed and addressed. Nevertheless, the importance of dual-use differs slightly, depending on the technology and its risks, as well as its distribution and application. Nuclear technology is less accessible than biotechnology, which in turn is less accessible than IT.

    @inproceedings{riebe_accessing_2019,
    address = {Darmstadt, Germany},
    title = {Accessing {Dual} {Use} in {IT} {Development}},
    url = {https://peasec.de/paper/2019/2019_RiebeReuter_AccessingDualUse_ProcSciencePeaceSecurity-TUprints.pdf},
    abstract = {The use of information technology (IT) in peace, conflict and security raises some questions, i.e. whether the use of IT can be limited exclusively to so-called advantageous purposes and applications and whether improper use can be prevented. This ambivalence is called a dual- use dilemma, meaning that objects, knowledge and technology can find both useful and harm- ful applications. Dual-use questions have been addressed in various disciplines, in particular in nuclear technology and the production of nuclear weapons, but also in chemistry and biology. In all these disciplines, dual-use topics in technical development and education have been discussed and addressed. Nevertheless, the importance of dual-use differs slightly, depending on the technology and its risks, as well as its distribution and application. Nuclear technology is less accessible than biotechnology, which in turn is less accessible than IT.},
    booktitle = {{SCIENCE} {PEACE} {SECURITY} '19 - {Proceedings} of the {Interdisciplinary} {Conference} on {Technical} {Peace} and {Security} {Research}},
    publisher = {TUprints},
    author = {Riebe, Thea and Reuter, Christian},
    year = {2019},
    keywords = {Peace, Projekt-DualUse},
    pages = {46--49},
    }

    2018

  • Markus Lederer, Alfred Nordmann, Christian Reuter (2018)
    IANUS am FiF und darüber hinaus: Die Bedeutung natur- und ingenieurwissenschaftlicher Friedensforschung für die TU Darmstadt
    In: Andreas Großmann, Heike Krebs, Josef Wiemeyer: Zwischendrin. 10 Jahre Forum interdisziplinäre Forschung der TU Darmstadt. Darmstadt: , , 71–89.
    [BibTeX] [Abstract] [Download PDF]

    IANUS steht seit 30 wechselhaften Jahren für natur- und ingenieur- wissenschaftliche Friedensforschung im Austausch mit den Sozial- und Geisteswissenschaften. Seit Januar 2018 ist IANUS ein Teil des Forums interdisziplinäre Forschung. Das FiF stellt das Dach, unter dem einige Aspekte der bisherigen IANUS-Arbeit weitergeführt werden sollen. Insofern das FiF nicht selbst wissenschaftlich arbeitet oder ein inhalt- liches Programm verfolgt, besteht das gemeinsame Dach in der admini- strativen Zusammenarbeit und dem Gedanken der Interdisziplinarität. Insofern IANUS von weitreichenderen Ambitionen geprägt ist, kann es unter dem gemeinsamen Dach derzeit nur auf sehr kleiner Flamme wei- terarbeiten. Freilich ergeben sich andererseits auch neue Perspektiven. Und wenn sich diese Perspektiven fruchtbar entwickeln lassen, würde ein erneuertes IANUS wesentlich zur internationalen Sichtbarkeit des FiF als Ausweis einer verantwortungsbewussten Forschungskultur an der TU Darmstadt beitragen. Was war IANUS und wofür steht es? Was ist IANUS heute – was kann und will es? Was könnte ein erneuertes IANUS werden – wie kann sein friedenspolitisch ausgerichteter wissenschaftlicher Anspruch zukünftig für das FiF und die TU Darmstadt wirksam werden? Diesen drei Fragen wenden sich die folgenden Abschnitte zu – und feiern somit, was nach 10 Jahren FiF, 30 Jahren IANUS und 140 Jahren TH/TU Darmstadt im Wandel der Forschungskulturen möglich war, ist und wird.

    @incollection{lederer_ianus_2018,
    address = {Darmstadt},
    title = {{IANUS} am {FiF} und darüber hinaus: {Die} {Bedeutung} natur- und ingenieurwissenschaftlicher {Friedensforschung} für die {TU} {Darmstadt}},
    url = {http://www.peasec.de/paper/2018/2018_LedererNordmannReuter_IANUS_FIF-Festschrift.pdf},
    abstract = {IANUS steht seit 30 wechselhaften Jahren für natur- und ingenieur- wissenschaftliche Friedensforschung im Austausch mit den Sozial- und Geisteswissenschaften. Seit Januar 2018 ist IANUS ein Teil des Forums interdisziplinäre Forschung. Das FiF stellt das Dach, unter dem einige Aspekte der bisherigen IANUS-Arbeit weitergeführt werden sollen. Insofern das FiF nicht selbst wissenschaftlich arbeitet oder ein inhalt- liches Programm verfolgt, besteht das gemeinsame Dach in der admini- strativen Zusammenarbeit und dem Gedanken der Interdisziplinarität. Insofern IANUS von weitreichenderen Ambitionen geprägt ist, kann es unter dem gemeinsamen Dach derzeit nur auf sehr kleiner Flamme wei- terarbeiten. Freilich ergeben sich andererseits auch neue Perspektiven. Und wenn sich diese Perspektiven fruchtbar entwickeln lassen, würde ein erneuertes IANUS wesentlich zur internationalen Sichtbarkeit des FiF als Ausweis einer verantwortungsbewussten Forschungskultur an der TU Darmstadt beitragen. Was war IANUS und wofür steht es? Was ist IANUS heute – was kann und will es? Was könnte ein erneuertes IANUS werden – wie kann sein friedenspolitisch ausgerichteter wissenschaftlicher Anspruch zukünftig für das FiF und die TU Darmstadt wirksam werden? Diesen drei Fragen wenden sich die folgenden Abschnitte zu – und feiern somit, was nach 10 Jahren FiF, 30 Jahren IANUS und 140 Jahren TH/TU Darmstadt im Wandel der Forschungskulturen möglich war, ist und wird.},
    booktitle = {Zwischendrin. 10 {Jahre} {Forum} interdisziplinäre {Forschung} der {TU} {Darmstadt}},
    author = {Lederer, Markus and Nordmann, Alfred and Reuter, Christian},
    editor = {Großmann, Andreas and Krebs, Heike and Wiemeyer, Josef},
    year = {2018},
    keywords = {Peace, Projekt-DualUse},
    pages = {71--89},
    }

  • Thea Riebe, Alfred Nordmann, Christian Reuter (2018)
    Responsible Research and Innovation: Interdisziplinärer Workshop von IANUS und Schader-Stiftung
    Wissenschaft & Frieden: 2018.
    [BibTeX] [Abstract] [Download PDF]

    Statt der Forschung ethische, rechtliche, gesellschaftliche Refl exion nur beizuge-sellen, verlangt Responsible Research and Innovation (RRI), dass sich Forschung an europäischen Werten – den Werten der Europäischen Union – orientiert. Um diese Öff nung zu gewährleisten, setzt RRI zunächst nicht auf spezifi sche Werte, sondern prozedural auf eine Forschung, die Folgen antizipiert, unterschiedliche Interessen und Wertvorstellungen inklu-diert, sich selbst refl ektiert und in die Verantwortung nehmen lässt. Doch was heißt das ?

    @techreport{riebe_responsible_2018,
    address = {Wissenschaft \& Frieden},
    title = {Responsible {Research} and {Innovation}: {Interdisziplinärer} {Workshop} von {IANUS} und {Schader}-{Stiftung}},
    url = {http://www.peasec.de/paper/2018/2018_RiebeNordmannReuter_RRI_WuF.pdf},
    abstract = {Statt der Forschung ethische, rechtliche, gesellschaftliche Refl exion nur beizuge-sellen, verlangt Responsible Research and Innovation (RRI), dass sich Forschung an europäischen Werten – den Werten der Europäischen Union – orientiert. Um diese Öff nung zu gewährleisten, setzt RRI zunächst nicht auf spezifi sche Werte, sondern prozedural auf eine Forschung, die Folgen antizipiert, unterschiedliche Interessen und Wertvorstellungen inklu-diert, sich selbst refl ektiert und in die Verantwortung nehmen lässt. Doch was heißt das ?},
    author = {Riebe, Thea and Nordmann, Alfred and Reuter, Christian},
    year = {2018},
    keywords = {Projekt-KontiKat, Peace, Projekt-CRISP, Projekt-DualUse},
    pages = {60--61},
    }

    HyServ: Hybride Dienstleistungen in digitalisierten Kooperationen (1.8.2018-31.7.2021, BMBF)

    HyServ: Hybride Dienstleistungen in digitalisierten Kooperationen (1.8.2018-31.12.2021, BMBF, FKZ: 01IS17030B)

    Die zunehmende Digitalisierung technischer Arbeitsmittel verlangt eine geänderte Sichtweise auf einzelne Dienstleistungen in kooperativen Arbeitsszenarien: Durch Kombination konventioneller Maschinenleistung mit notwendig begleitenden Datendiensten entstehen hybride Services. Mit Beauftragung und Durchführung derartiger Dienstleistungen müssen detaillierte Vereinbarungen über die bereitzustellenden Daten und über die Verwendung der bei der Dienstleistung erhobenen Messwerte formuliert und automatisiert und dezentral überwacht werden.

    HyServ erforscht und entwickelt innovative Servicekonzepte und Schnittstellen für Anbieter und Nutzer hybrider Dienste und illustriert und erprobt dies am Beispiel kollaborativer Arbeitsprozesse in der Landwirtschaft. Zentrale Komponenten sind die Formulierung von Smart Contracts über Bereitstellung und Weiterleitung zweckgebundener betrieblicher Daten; Orchestrierte Micro-Services und Datenquellen mit kryptographisch gesichertem Austausch und Überwachung der vereinbarten Datenflüsse in Blockchain-basierten dezentralen Strukturen; eine insbesondere für Nutzer im KMU-Bereich adäquat bedienungsfreundliche Zugangslösung; schließlich begleitende Schulungskonzepte für potentielle Anwender und Kunden, welche die innovativen Möglichkeiten der hybriden Dienstleistungen breiten Nutzerschichten zugänglich machen.

    Geobox-I: Standardisierung der GeoBox-Infrastruktur I: Dezentrale Datenhaltung und regionale Vernetzung (1.10.2018-31.12.2020, BMEL)

    Geobox-I – Standardisierung der GeoBox-Infrastruktur (1.10.2018-31.12.2020, BMEL) – Website

    Förderkennzeichnen TU Darmstadt: ptBLE-FKz 28-RZ-5.058

    Standardisierung der GeoBox-Infrastruktur – Phase 1: Dezentrale Datenhaltung und regionale Vernetzung

    Ziel des Vorhabens GeoBox-I ist die experimentelle Entwicklung, Erprobung und Verbreitung eines praxistauglichen Prototyps einer standardisierten und resilienten GeoBox-Infrastruktur zur dezentralen Datenhaltung und regionalen Vernetzung. Dies umfasst (1) die Vorgabe von Datenstrukturen und Vokabularien für austauschrelevante Informationen in einfach verständlicher Form in einem geeigneten Webportal als öffentliche Dienstleistung für die Branche, (2) die Spezifikation der GeoBox als betriebliche Datendrehscheibe mit Zwischenspeicher für vielfältige relevante Informationen, unter der alleinigen Kontrolle des jeweiligen landwirtschaftlichen Betriebes, (3) die Bereitstellung von wichtigen Geobasis- und Fachdaten für die landwirtschaftlichen Betriebe mit dezentraler Speicherung in den Betrieben, (4) die Realisierung von Kommunikationsprotokollen und Formularassistenten für den standardisierten Datenaustausch mit Dritten, (5) die Konzeption exemplarischer Dienste, die aus den standardisiert vorliegenden Daten extrahierte, unmittelbar nützliche Beratungsleistungen für Landwirte bereitstellen und (6) die Implementierung aller essentiellen Funktionen in Form offengelegter Referenz-Implementierungen exemplarischer Anwendungen. Diese werden auf hoheitliche Informations- und Beratungsinhalte im Bereich des Pflanzenschutzes fokussiert und im Rahmen der Aus- und Weiterbildung zum Thema Resilientes Smart Farming in die Praxis transferiert.

    2024

  • Franz Kuntke, Marc-André Kaufhold, Sebastian Linsner, Christian Reuter (2024)
    GeoBox: Design and Evaluation of a Tool for Resilient and Decentralized Data Management in Agriculture
    Behaviour & Information Technology (BIT) ;43(4):764–786. doi:10.1080/0144929X.2023.2185747
    [BibTeX] [Abstract] [Download PDF]

    Farm Management Information Systems (FMIS) are an important core component of modern farming companies as they allow, e.g., to document activities, create fertilization plans, and feed digital equipment with required data. Since the entire agricultural sector is an essential component of food production, high standards of resilience should be established in the involved companies. Accordingly, the used software should also be designed with high standards on reliability and crisis capability. Based on a literature review, we found that software for farmers with certain resilience needs is lacking. Thus, we designed and evaluated a new FMIS concept with the user-centered design method. By conducting focus groups (two rounds, total N=57) in 2017 and 2019, we raised specific front-end and back-end requirements of farmers. Based on the requirements, we developed our concept for both front- and back-end in terms of a decentralized and offline-working FMIS. Through the evaluation with practitioners (N=16) of the implemented concept, we derived findings and implications, highlighting the need for privacy, stability, and offline-capability, as well as the UI-requirement to be supportive, e.g., with easy to understand icons and terms.

    @article{kuntke_geobox_2024,
    title = {{GeoBox}: {Design} and {Evaluation} of a {Tool} for {Resilient} and {Decentralized} {Data} {Management} in {Agriculture}},
    volume = {43},
    issn = {0144-929X},
    url = {https://peasec.de/paper/2023/2023_KuntkeKaufholdLinsnerReuter_GeoBox_BIT.pdf},
    doi = {10.1080/0144929X.2023.2185747},
    abstract = {Farm Management Information Systems (FMIS) are an important core component of modern farming companies as they allow, e.g., to document activities, create fertilization plans, and feed digital equipment with required data. Since the entire agricultural sector is an essential component of food production, high standards of resilience should be established in the involved companies. Accordingly, the used software should also be designed with high standards on reliability and crisis capability. Based on a literature review, we found that software for farmers with certain resilience needs is lacking. Thus, we designed and evaluated a new FMIS concept with the user-centered design method. By conducting focus groups (two rounds, total N=57) in 2017 and 2019, we raised specific front-end and back-end requirements of farmers. Based on the requirements, we developed our concept for both front- and back-end in terms of a decentralized and offline-working FMIS. Through the evaluation with practitioners (N=16) of the implemented concept, we derived findings and implications, highlighting the need for privacy, stability, and offline-capability, as well as the UI-requirement to be supportive, e.g., with easy to understand icons and terms.},
    number = {4},
    journal = {Behaviour \& Information Technology (BIT)},
    author = {Kuntke, Franz and Kaufhold, Marc-André and Linsner, Sebastian and Reuter, Christian},
    month = mar,
    year = {2024},
    note = {Publisher: Taylor \& Francis},
    keywords = {UsableSec, Security, A-Paper, Ranking-ImpactFactor, Ranking-CORE-A, AuswahlUsableSec, Projekt-GeoBox, Projekt-AgriRegio},
    pages = {764--786},
    }

  • Daniel Eberz-Eder, Franz Kuntke, Christian Reuter, Ansgar Bernardi, Ahmad Kadi, Gerwin Brill, Daniel Martini, Benno Kleinhenz (2024)
    Hybrid Cloud Infrastrukturen – Edge Computng und KI-basierte Anwendungen in der Landwirtschaft für resiliente und effektive Produktions- und Biodiversitätsmaßnahmen
    44. GIL-Jahrestagung: Informatik in der Land-, Forst- und Ernährungswirtschaft .
    [BibTeX] [Abstract]

    Mobile Erhebung semantisch modellierter Daten und deren Auswertung im Feld durch Hybrid Cloud Computing sind Grundlage des Resilienten Smart Farmings im Projekt GeoBox. Eine skalierbare Architektur und semantische Datenmodellierung ermöglichen Management betrieblicher Software-Container, flexible Anpassung an neue Aufgaben, und die Realisierung einfach nutzbarer externer Services, vorgestellt am Beispiel eines Resistenz-Beratungs-Chatbots und von Blühstreifen als Biodiversitätsmaßnahme.

    @inproceedings{eberz-eder_hybrid_2024,
    title = {Hybrid {Cloud} {Infrastrukturen} - {Edge} {Computng} und {KI}-basierte {Anwendungen} in der {Landwirtschaft} für resiliente und effektive {Produktions}- und {Biodiversitätsmaßnahmen}},
    abstract = {Mobile Erhebung semantisch modellierter Daten und deren Auswertung im Feld durch Hybrid Cloud Computing sind Grundlage des Resilienten Smart Farmings im Projekt GeoBox. Eine skalierbare Architektur und semantische Datenmodellierung ermöglichen Management betrieblicher Software-Container, flexible Anpassung an neue Aufgaben, und die Realisierung einfach nutzbarer externer Services, vorgestellt am Beispiel eines Resistenz-Beratungs-Chatbots und von Blühstreifen als Biodiversitätsmaßnahme.},
    booktitle = {44. {GIL}-{Jahrestagung}: {Informatik} in der {Land}-, {Forst}- und {Ernährungswirtschaft}},
    publisher = {Gesellschaft für Informatik},
    author = {Eberz-Eder, Daniel and Kuntke, Franz and Reuter, Christian and Bernardi, Ansgar and Kadi, Ahmad and Brill, Gerwin and Martini, Daniel and Kleinhenz, Benno},
    year = {2024},
    keywords = {UsableSec, Security, RSF, Projekt-GeoBox, Projekt-AgriRegio},
    }

    2023

  • Daniel Eberz-Eder, Franz Kuntke, Gerwin Brill, Ansgar Bernardi, Christian Wied, Philippe Nuderscher, Christian Reuter (2023)
    Prototypische Entwicklungen zur Umsetzung des Resilient Smart Farming (RSF) mittels Edge Computing
    43. GIL-Jahrestagung: Informatik in der Land-, Forst- und Ernährungswirtschaft .
    [BibTeX] [Abstract] [Download PDF]

    Landwirtschaft als essenzieller Teil der Nahrungsmittelproduktion gehört zu den kritischen Infrastrukturen (KRITIS). Dementsprechend müssen die eingesetzten Systeme für einen widerstandsfähigen Betrieb ausgelegt sein. Dies gilt auch für die auf landwirtschaftlichen Betrieben eingesetzte Software, die Sicherheits- und Resilienzkriterien genügen muss. Jedoch ist die Zunahme an Software zu beobachten, welche eine permanente Internetkonnektivität erfordert, d. h. eine stabile Verbindung zu Servern oder Cloud-Applikationen ist für deren Funktionsweise erforderlich. Dies stellt eine erhebliche Schwachstelle hinsichtlich der Resilienz dar und kann bei Ausfällen der Telekommunikationsinfrastruktur zu großen Problemen führen. Mit Entwicklungen aus dem Bereich Resilient Smart Farming (RSF) zeigen wir, wie Datenhaltung nach dem Offline-First-Prinzip gestaltet werden kann. Ein zentraler Bestandteil hierbei ist das Resilient Edge Computing (REC) und die entwickelte HofBox: ein Mini-Server, der das Datenmanagement im Betrieb übernimmt und mittels innovativer Open-Source basierender Container-Technologie (Open Horizon) umsetzt. Dadurch werden in Zukunft weitere Anwendungsfälle innerhalb der landwirtschaftlichen Produktions- und Wertschöpfungskette durch Public-Private-Partnership-Modelle realistisch und realisierbar.

    @inproceedings{eberz-eder_prototypische_2023,
    title = {Prototypische {Entwicklungen} zur {Umsetzung} des {Resilient} {Smart} {Farming} ({RSF}) mittels {Edge} {Computing}},
    url = {https://dl.gi.de/handle/20.500.12116/40264},
    abstract = {Landwirtschaft als essenzieller Teil der Nahrungsmittelproduktion gehört zu den kritischen Infrastrukturen (KRITIS). Dementsprechend müssen die eingesetzten Systeme für einen widerstandsfähigen Betrieb ausgelegt sein. Dies gilt auch für die auf landwirtschaftlichen Betrieben eingesetzte Software, die Sicherheits- und Resilienzkriterien genügen muss. Jedoch ist die Zunahme an Software zu beobachten, welche eine permanente Internetkonnektivität erfordert, d. h. eine stabile Verbindung zu Servern oder Cloud-Applikationen ist für deren Funktionsweise erforderlich. Dies stellt eine erhebliche Schwachstelle hinsichtlich der Resilienz dar und kann bei Ausfällen der Telekommunikationsinfrastruktur zu großen Problemen führen. Mit Entwicklungen aus dem Bereich Resilient Smart Farming (RSF) zeigen wir, wie Datenhaltung nach dem Offline-First-Prinzip gestaltet werden kann. Ein zentraler Bestandteil hierbei ist das Resilient Edge Computing (REC) und die entwickelte HofBox: ein Mini-Server, der das Datenmanagement im Betrieb übernimmt und mittels innovativer Open-Source basierender Container-Technologie (Open Horizon) umsetzt. Dadurch werden in Zukunft weitere Anwendungsfälle innerhalb der landwirtschaftlichen Produktions- und Wertschöpfungskette durch Public-Private-Partnership-Modelle realistisch und realisierbar.},
    booktitle = {43. {GIL}-{Jahrestagung}: {Informatik} in der {Land}-, {Forst}- und {Ernährungswirtschaft}},
    publisher = {Gesellschaft für Informatik},
    author = {Eberz-Eder, Daniel and Kuntke, Franz and Brill, Gerwin and Bernardi, Ansgar and Wied, Christian and Nuderscher, Philippe and Reuter, Christian},
    year = {2023},
    keywords = {UsableSec, Security, RSF, Projekt-GeoBox, Projekt-AgriRegio},
    pages = {309--314},
    }

  • Franz Kuntke, Lars Baumgärtner, Christian Reuter (2023)
    Rural Communication in Outage Scenarios: Disruption-Tolerant Networking via LoRaWAN Setups
    Proceedings of Information Systems for Crisis Response and Management (ISCRAM) .
    [BibTeX] [Abstract] [Download PDF]

    Since communications infrastructure is subject to many impacts, e.g., destructive natural events, they can potentially collapse at any time. Especially in rural areas, the recovery of public network infrastructure can take some time, so a dedicated communication channel would be advantageous. We explore the possibility of transforming commodity LoRaWAN gateways into meshed network nodes for a digital emergency communication channel. In order to obtain the required parameters, we collected farm locations in Germany with OpenStreetMap. Based on the assumptions of LoRa communication range and considering our use case requirements, connecting farm communities seems theoretically feasible in many areas of our data set. To further analyze our idea, we ran simulations of two common DTN routing protocols with different scenarios. A proof-of-concept implementation allows smaller messages to be transmitted using real hardware and demonstrates that a decentralized communications infrastructure based on commodity hardware is possible.

    @inproceedings{kuntke_rural_2023,
    title = {Rural {Communication} in {Outage} {Scenarios}: {Disruption}-{Tolerant} {Networking} via {LoRaWAN} {Setups}},
    url = {https://idl.iscram.org/files/kuntke/2023/2581_Kuntke_etal2023.pdf},
    abstract = {Since communications infrastructure is subject to many impacts, e.g., destructive natural events, they can potentially collapse at any time. Especially in rural areas, the recovery of public network infrastructure can take some time, so a dedicated communication channel would be advantageous. We explore the possibility of transforming commodity LoRaWAN gateways into meshed network nodes for a digital emergency communication channel. In order to obtain the required parameters, we collected farm locations in Germany with OpenStreetMap. Based on the assumptions of LoRa communication range and considering our use case requirements, connecting farm communities seems theoretically feasible in many areas of our data set. To further analyze our idea, we ran simulations of two common DTN routing protocols with different scenarios. A proof-of-concept implementation allows smaller messages to be transmitted using real hardware and demonstrates that a decentralized communications infrastructure based on commodity hardware is possible.},
    booktitle = {Proceedings of {Information} {Systems} for {Crisis} {Response} and {Management} ({ISCRAM})},
    author = {Kuntke, Franz and Baumgärtner, Lars and Reuter, Christian},
    year = {2023},
    keywords = {Crisis, Security, RSF, Projekt-MAKI, Projekt-GeoBox, Projekt-emergenCITY, Projekt-AgriRegio},
    pages = {1--13},
    }

  • Franz Kuntke, Merve Bektas, Laura Buhleier, Ella Pohl, Rebekka Schiller, Christian Reuter (2023)
    How Would Emergency Communication Based on LoRaWAN Perform? Empirical Findings of Signal Propagation in Rural Areas
    Proceedings of Information Systems for Crisis Response and Management (ISCRAM) .
    [BibTeX] [Abstract] [Download PDF]

    Low Power Wide Area Network (LPWAN) technologies are typically promoted for Internet-of-Things (IoT) applications, but are also of interest for emergency communications systems when regular fixed and mobile networks break down. Although LoRaWAN is a frequently used representative here, there are sometimes large differences between the proposed range and the results of some practical evaluations. Since previous work has focused on urban environments or has conducted simulations, this work aims to gather concrete knowledge on the transmission characteristics in rural environments. Extensive field studies with varying geographic conditions and comparative tests in urban environments were performed using two different hardware implementations. Overall, it was found that the collected values in rural areas are significantly lower than the theoretical values. Nevertheless, the results certify that LoRaWAN technology has a high range that cannot be achieved with other common technologies for emergency communications.

    @inproceedings{kuntke_how_2023,
    title = {How {Would} {Emergency} {Communication} {Based} on {LoRaWAN} {Perform}? {Empirical} {Findings} of {Signal} {Propagation} in {Rural} {Areas}},
    url = {https://idl.iscram.org/files/kuntke/2023/2586_Kuntke_etal2023.pdf},
    abstract = {Low Power Wide Area Network (LPWAN) technologies are typically promoted for Internet-of-Things (IoT) applications, but are also of interest for emergency communications systems when regular fixed and mobile networks break down. Although LoRaWAN is a frequently used representative here, there are sometimes large differences between the proposed range and the results of some practical evaluations. Since previous work has focused on urban environments or has conducted simulations, this work aims to gather concrete knowledge on the transmission characteristics in rural environments. Extensive field studies with varying geographic conditions and comparative tests in urban environments were performed using two different hardware implementations. Overall, it was found that the collected values in rural areas are significantly lower than the theoretical values. Nevertheless, the results certify that LoRaWAN technology has a high range that cannot be achieved with other common technologies for emergency communications.},
    booktitle = {Proceedings of {Information} {Systems} for {Crisis} {Response} and {Management} ({ISCRAM})},
    author = {Kuntke, Franz and Bektas, Merve and Buhleier, Laura and Pohl, Ella and Schiller, Rebekka and Reuter, Christian},
    year = {2023},
    keywords = {Crisis, Student, RSF, Projekt-GeoBox, Projekt-AgriRegio},
    pages = {1--8},
    }

  • Daniel Schmidt, Franz Kuntke, Maximilian Bauer, Lars Baumgärtner (2023)
    BPoL: A Disruption-Tolerant LoRa Network for Disaster Communication
    IEEE Global Humanitarian Technology Conference (GHTC) . doi:10.1109/GHTC56179.2023.10354717
    [BibTeX] [Abstract] [Download PDF]

    Information and Communication Technology (ICT) is vital for everyday life and especially during times of disaster.Relying on existing infrastructure is problematic as maintenance is expensive, and they can be disrupted in emergency scenarios. Cost is a major factor which limits the technologies that can be used in rural areas or for emergency response, as satellite uplinks or private cellular networks are very expensive and complex. LoRa is commonly used for IoT infrastructure worldwide in the form of LoRaWAN to cover larger distances with low costs. But it can also be used in a Device-to-Device (D2D) mode for direct communication. By combining LoRa with Disruption-tolerant Networking (DTN), we present an affordable and practical solution that can cope with challenging conditions and be used for a large variety of applications. In our evaluation, we show how adaptable our solution is and how it outperforms similar mesh-based applications for disaster communication.

    @inproceedings{schmidt_bpol_2023,
    title = {{BPoL}: {A} {Disruption}-{Tolerant} {LoRa} {Network} for {Disaster} {Communication}},
    url = {https://peasec.de/paper/2023/2023_SchmidtKuntkeBauerBaumgaertner_BPOL_GHTC.pdf},
    doi = {10.1109/GHTC56179.2023.10354717},
    abstract = {Information and Communication Technology (ICT) is vital for everyday life and especially during times of disaster.Relying on existing infrastructure is problematic as maintenance is expensive, and they can be disrupted in emergency scenarios. Cost is a major factor which limits the technologies that can be used in rural areas or for emergency response, as satellite uplinks or private cellular networks are very expensive and complex. LoRa is commonly used for IoT infrastructure worldwide in the form of LoRaWAN to cover larger distances with low costs. But it can also be used in a Device-to-Device (D2D) mode for direct communication. By combining LoRa with Disruption-tolerant Networking (DTN), we present an affordable and practical solution that can cope with challenging conditions and be used for a large variety of applications. In our evaluation, we show how adaptable our solution is and how it outperforms similar mesh-based applications for disaster communication.},
    booktitle = {{IEEE} {Global} {Humanitarian} {Technology} {Conference} ({GHTC})},
    author = {Schmidt, Daniel and Kuntke, Franz and Bauer, Maximilian and Baumgärtner, Lars},
    year = {2023},
    keywords = {UsableSec, Security, Projekt-GeoBox, Projekt-AgriRegio},
    pages = {440--447},
    }

    2022

  • Laura Buhleier, Patrick Gantner, Tobias Frey, Michael Boers, Marc-André Kaufhold, Christian Reuter (2022)
    Effizienz und Nachhaltigkeit durch Green-IT: ein systematischer Literaturüberblick im Kontext der Klimakrise
    INFORMATIK 2022: 52. Jahrestagung der Gesellschaft für Informatik – Informatik für Gesellschaft (Workshop-Beiträge), Lecture Notes in Informatics (LNI) Hamburg, Germany. doi:10.18420/inf2022_83
    [BibTeX] [Abstract] [Download PDF]

    Die Klimakrise gehört zu den aktuell größten Herausforderungen unserer Zeit. Informations- und Kommunikationstechnologien (IKT) können hierbei eine entscheidende Rolle spielen. Einerseits, da eine Effizienzsteigerung von oder durch IKT zu einer klimafreundlicheren Nutzung beitragen kann, und andererseits, da IKT zu einem erhöhten Ressourcenverbrauch führen kann. Um diese Thematik weiter zu untersuchen, wird in dieser Arbeit eine systematische Literaturrecherche durchgeführt, um Herausforderungen und Potenziale in der Adressierung der Klimakrise durch eine effiziente und nachhaltige Entwicklung des IKT-Sektors zu analysieren. Die dabei untersuchte Literatur beinhaltet Herausforderungen wie zum Beispiel den hohen Energie- und Materialverbrauch der IKT-Geräte und Datenzentren sowie die entstehenden Entsorgungskosten und das Konsumverhalten der Nutzer*innen. Deswegen sollten die Nutzer*innen mehr Informationen zur Wartung, zum Kauf gebrauchter Geräte, und zum Recyceln/Entsorgen erhalten. Die Analyse lieferte aber auch viele Potenziale. Durch IKT können Effizienzsteigerungen in den Bereich Industrie, Landwirtschaft, Verkehr und Transport erreicht und auch umweltschädliche Geräte substituiert werden. Durch diese Potenziale kann es aber, wie in anderen Bereichen, zu einem Rebound-Effekt kommen.

    @inproceedings{buhleier_effizienz_2022,
    address = {Hamburg, Germany},
    title = {Effizienz und {Nachhaltigkeit} durch {Green}-{IT}: ein systematischer {Literaturüberblick} im {Kontext} der {Klimakrise}},
    isbn = {978-3-88579-720-3},
    url = {https://dl.gi.de/bitstream/handle/20.500.12116/39590/rsflab_06.pdf?sequence=1&isAllowed=y},
    doi = {10.18420/inf2022_83},
    abstract = {Die Klimakrise gehört zu den aktuell größten Herausforderungen unserer Zeit. Informations- und Kommunikationstechnologien (IKT) können hierbei eine entscheidende Rolle spielen. Einerseits, da eine Effizienzsteigerung von oder durch IKT zu einer klimafreundlicheren Nutzung beitragen kann, und andererseits, da IKT zu einem erhöhten Ressourcenverbrauch führen kann. Um diese Thematik weiter zu untersuchen, wird in dieser Arbeit eine systematische Literaturrecherche durchgeführt, um Herausforderungen und Potenziale in der Adressierung der Klimakrise durch eine effiziente und nachhaltige Entwicklung des IKT-Sektors zu analysieren. Die dabei untersuchte Literatur beinhaltet Herausforderungen wie zum Beispiel den hohen Energie- und Materialverbrauch der IKT-Geräte und Datenzentren sowie die entstehenden Entsorgungskosten und das Konsumverhalten der Nutzer*innen. Deswegen sollten die Nutzer*innen mehr Informationen zur Wartung, zum Kauf gebrauchter Geräte, und zum Recyceln/Entsorgen erhalten. Die Analyse lieferte aber auch viele Potenziale. Durch IKT können Effizienzsteigerungen in den Bereich Industrie, Landwirtschaft, Verkehr und Transport erreicht und auch umweltschädliche Geräte substituiert werden. Durch diese Potenziale kann es aber, wie in anderen Bereichen, zu einem Rebound-Effekt kommen.},
    language = {de},
    booktitle = {{INFORMATIK} 2022: 52. {Jahrestagung} der {Gesellschaft} für {Informatik} – {Informatik} für {Gesellschaft} ({Workshop}-{Beiträge}), {Lecture} {Notes} in {Informatics} ({LNI})},
    publisher = {Gesellschaft für Informatik e. V.},
    author = {Buhleier, Laura and Gantner, Patrick and Frey, Tobias and Boers, Michael and Kaufhold, Marc-André and Reuter, Christian},
    editor = {Demmler, D. and Krupka, D. and Federrath, H.},
    year = {2022},
    keywords = {Student, Ranking-CORE-C, Ranking-VHB-C, Security, Projekt-GeoBox, Projekt-AgriRegio},
    pages = {995--1012},
    }

  • Franz Kuntke, Vladimir Romanenko, Sebastian Linsner, Enno Steinbrink, Christian Reuter (2022)
    LoRaWAN Security Issues and Mitigation Options by the Example of Agricultural IoT Scenarios
    Transactions on Emerging Telecommunications Technologies (ETT) ;33(5):e4452. doi:10.1002/ett.4452
    [BibTeX] [Abstract] [Download PDF]

    The Internet of Things (IoT) is a major trend that is seen as a great opportunity to improve efficiency in many domains, including agriculture. This technology could transform the sector, improving the management and quality of agricultural operations, for example, crop farming. The most promising data transmission standard for this domain seems to be Long Range Wide Area Network (LoRaWAN), a popular representative of low power wide area network technologies today. LoRaWAN, like any wireless protocol, has properties that can be exploited by attackers, which has been a topic of multiple research papers in recent years. By conducting a systematic literature review, we build a recent list of attacks, as well as collect mitigation options. Taking a look at a concrete use case (IoT in agriculture) allows us to evaluate the practicality of both exploiting the vulnerabilities and implementing the countermeasures. We detected 16 attacks that we grouped into six attack types. Along with the attacks, we collect countermeasures for attack mitigation. Developers can use our findings to minimize the risks when developing applications based on LoRaWAN. These mostly theoretical security recommendations should encourage future works to evaluate the mitigations in practice.

    @article{kuntke_lorawan_2022,
    title = {{LoRaWAN} {Security} {Issues} and {Mitigation} {Options} by the {Example} of {Agricultural} {IoT} {Scenarios}},
    volume = {33},
    issn = {2161-3915},
    url = {https://www.peasec.de/paper/2022/2022_KuntkeRomanenkoLinsnerSteinbrinkReuter_LoRaWANsecurityAgriculture_ETT.pdf},
    doi = {10.1002/ett.4452},
    abstract = {The Internet of Things (IoT) is a major trend that is seen as a great opportunity to improve efficiency in many domains, including agriculture. This technology could transform the sector, improving the management and quality of agricultural operations, for example, crop farming. The most promising data transmission standard for this domain seems to be Long Range Wide Area Network (LoRaWAN), a popular representative of low power wide area network technologies today. LoRaWAN, like any wireless protocol, has properties that can be exploited by attackers, which has been a topic of multiple research papers in recent years. By conducting a systematic literature review, we build a recent list of attacks, as well as collect mitigation options. Taking a look at a concrete use case (IoT in agriculture) allows us to evaluate the practicality of both exploiting the vulnerabilities and implementing the countermeasures. We detected 16 attacks that we grouped into six attack types. Along with the attacks, we collect countermeasures for attack mitigation. Developers can use our findings to minimize the risks when developing applications based on LoRaWAN. These mostly theoretical security recommendations should encourage future works to evaluate the mitigations in practice.},
    number = {5},
    journal = {Transactions on Emerging Telecommunications Technologies (ETT)},
    author = {Kuntke, Franz and Romanenko, Vladimir and Linsner, Sebastian and Steinbrink, Enno and Reuter, Christian},
    month = may,
    year = {2022},
    keywords = {Student, Security, A-Paper, Ranking-ImpactFactor, RSF, Projekt-GeoBox, Projekt-GRKPrivacy, Projekt-HyServ, Projekt-AgriRegio},
    pages = {e4452},
    }

  • Franz Kuntke, Sebastian Linsner, Enno Steinbrink, Jonas Franken, Christian Reuter (2022)
    Resilience in Agriculture: Communication and Energy Infrastructure Dependencies of German Farmers
    International Journal of Disaster Risk Science (IJDRS) ;13(2):214–229. doi:10.1007/s13753-022-00404-7
    [BibTeX] [Abstract] [Download PDF]

    Agriculture is subject to high demands regarding resilience as it is an essential component of the food production chain. In the agricultural sector, there is an increasing usage of digital tools that rely on communication and energy infrastructures. Should disruption occur, such strengthened dependencies on other infrastructures increase the probability of ripple effects. Thus, there is a need to analyze the resilience of the agricultural sector with a specific focus on the effects of digitalization. This study works out resilience capacities of the interconnected technologies used in farm systems based on the experiences and opinions of farmers. Information was gathered through focus group interviews with farmers (N = 52) and a survey with participants from the agricultural sector (N = 118). In particular, the focus is put on the digital tools and other information and communication technologies they use. Based on a definition of resilience capacities, we evaluate resilience regarding energy and communication demands in various types of farm systems. Especially important are the resilience aspects of modern systems’ digital communication as well as the poorly developed and nonresilient network infrastructure in rural areas that contrast with the claim for a resilient agriculture. The result is a low robustness capacity, as our analysis concludes with the risk of food production losses.

    @article{kuntke_resilience_2022,
    title = {Resilience in {Agriculture}: {Communication} and {Energy} {Infrastructure} {Dependencies} of {German} {Farmers}},
    volume = {13},
    issn = {2192-6395},
    url = {https://link.springer.com/article/10.1007/s13753-022-00404-7},
    doi = {10.1007/s13753-022-00404-7},
    abstract = {Agriculture is subject to high demands regarding resilience as it is an essential component of the food production chain. In the agricultural sector, there is an increasing usage of digital tools that rely on communication and energy infrastructures. Should disruption occur, such strengthened dependencies on other infrastructures increase the probability of ripple effects. Thus, there is a need to analyze the resilience of the agricultural sector with a specific focus on the effects of digitalization. This study works out resilience capacities of the interconnected technologies used in farm systems based on the experiences and opinions of farmers. Information was gathered through focus group interviews with farmers (N = 52) and a survey with participants from the agricultural sector (N = 118). In particular, the focus is put on the digital tools and other information and communication technologies they use. Based on a definition of resilience capacities, we evaluate resilience regarding energy and communication demands in various types of farm systems. Especially important are the resilience aspects of modern systems’ digital communication as well as the poorly developed and nonresilient network infrastructure in rural areas that contrast with the claim for a resilient agriculture. The result is a low robustness capacity, as our analysis concludes with the risk of food production losses.},
    number = {2},
    journal = {International Journal of Disaster Risk Science (IJDRS)},
    author = {Kuntke, Franz and Linsner, Sebastian and Steinbrink, Enno and Franken, Jonas and Reuter, Christian},
    month = apr,
    year = {2022},
    keywords = {Selected, Security, A-Paper, Ranking-ImpactFactor, Ranking-CORE-B, RSF, Projekt-GeoBox, Projekt-GRKPrivacy, Projekt-HyServ, Projekt-AgriRegio},
    pages = {214--229},
    }

  • Daniel Eberz-Eder, Franz Kuntke, Christian Reuter (2022)
    Sensibilität für Resilient Smart Farming (RSF) und seine Bedeutung in Krisenzeiten
    42. GIL-Jahrestagung: Informatik in der Land-, Forst- und Ernährungswirtschaft Tänikon, Switzerland.
    [BibTeX] [Abstract] [Download PDF]

    Mit der globalen COVID-19-Pandemie und dem Hochwasser in West- und Mitteleuropa im Sommer 2021 hat unter anderem Deutschland in jüngster Vergangenheit zwei schwerwiegende Krisenszenarien erlebt. Die Auswirkungen auf die Gesellschaft und Wirtschaft sind verheerend. Parallel lassen sich Krisenereignisse im digitalen Raum, wie die Zunahme an Cyberkriminalität beobachten. Es wird zunehmend deutlich, dass die Resilienz analoger sowie digitaler Prozesse wichtiger für die vollständige Betriebsfähigkeit wird. Die vorliegende Arbeit setzt sich mit der Bedeutung des Resilient Smart Farming (RSF) in Krisenzeiten als Möglichkeit für eine nachhaltige, umweltgerechte und resiliente digitale Landwirtschaft auseinander. Dazu wurden u.a. lokale Schadensmeldungen gruppiert und mögliche RSF-Gegenmaßnahmen aufgezeigt. Im Ergebnis zeigt sich eine Bewertung von Konzepten des RSF hinsichtlich der Krisenprävention und -bewältigung anhand aktueller realer Beispiele. Aufgrund zunehmender Bedrohungen durch Naturkatastrophen und Cyberkriminialität gehen wir davon aus, dass die Aufmerksamkeit von Gesellschaft und Politik für die Resilienz der Primärproduktion weiter steigen wird.

    @inproceedings{eberz-eder_sensibilitat_2022,
    address = {Tänikon, Switzerland},
    title = {Sensibilität für {Resilient} {Smart} {Farming} ({RSF}) und seine {Bedeutung} in {Krisenzeiten}},
    url = {https://peasec.de/paper/2022/2022_EberzEderKuntkeReuter_SensibilitaetResilientSmartFarmingKrisen_GIL.pdf},
    abstract = {Mit der globalen COVID-19-Pandemie und dem Hochwasser in West- und Mitteleuropa im Sommer 2021 hat unter anderem Deutschland in jüngster Vergangenheit zwei schwerwiegende Krisenszenarien erlebt. Die Auswirkungen auf die Gesellschaft und Wirtschaft sind verheerend. Parallel lassen sich Krisenereignisse im digitalen Raum, wie die Zunahme an Cyberkriminalität beobachten. Es wird zunehmend deutlich, dass die Resilienz analoger sowie digitaler Prozesse wichtiger für die vollständige Betriebsfähigkeit wird. Die vorliegende Arbeit setzt sich mit der Bedeutung des Resilient Smart Farming (RSF) in Krisenzeiten als Möglichkeit für eine nachhaltige, umweltgerechte und resiliente digitale Landwirtschaft auseinander. Dazu wurden u.a. lokale Schadensmeldungen gruppiert und mögliche RSF-Gegenmaßnahmen aufgezeigt. Im Ergebnis zeigt sich eine Bewertung von Konzepten des RSF hinsichtlich der Krisenprävention und -bewältigung anhand aktueller realer Beispiele. Aufgrund zunehmender Bedrohungen durch Naturkatastrophen und Cyberkriminialität gehen wir davon aus, dass die Aufmerksamkeit von Gesellschaft und Politik für die Resilienz der Primärproduktion weiter steigen wird.},
    booktitle = {42. {GIL}-{Jahrestagung}: {Informatik} in der {Land}-, {Forst}- und {Ernährungswirtschaft}},
    publisher = {Gesellschaft für Informatik},
    author = {Eberz-Eder, Daniel and Kuntke, Franz and Reuter, Christian},
    year = {2022},
    keywords = {Crisis, Projekt-GeoBox, Projekt-AgriRegio},
    }

    2021

  • Sebastian Linsner, Franz Kuntke, Enno Steinbrink, Jonas Franken, Christian Reuter (2021)
    The Role of Privacy in Digitalization – Analysing the German Farmers‘ Perspective
    Proceedings on Privacy Enhancing Technologies (PoPETs) ;2021(3):334–350. doi:10.2478/popets-2021-0050
    [BibTeX] [Abstract] [Download PDF]

    Technological progress can disrupt domains and change the way we work and collaborate. This paper presents a qualitative study with 52 German farmers that investigates the impact of the ongoing digitalization process in agriculture and discusses the implications for privacy research. As in other domains, the introduction of digital tools and services leads to the data itself becoming a resource. Sharing this data with products along the supply chain is favored by retailers and consumers, who benefit from traceability through transparency. However, transparency can pose a privacy risk. Having insight into the business data of others along the supply chain provides an advantage in terms of market position. This is particularly true in agriculture, where there is already a significant imbalance of power between actors. A multitude of small and medium-sized farming businesses are opposed by large upstream and downstream players that drive technological innovation. Further weakening the market position of farmers could lead to severe consequences for the entire sector. We found that on the one hand, privacy behaviors are affected by adoption of digitalization, and on the other hand, privacy itself influences adoption of digital tools. Our study sheds light on the emerging challenges for farmers and the role of privacy in the process of digitalization in agriculture.

    @article{linsner_role_2021,
    title = {The {Role} of {Privacy} in {Digitalization} – {Analysing} the {German} {Farmers}' {Perspective}},
    volume = {2021},
    url = {https://www.petsymposium.org/2021/files/papers/issue3/popets-2021-0050.pdf},
    doi = {10.2478/popets-2021-0050},
    abstract = {Technological progress can disrupt domains
    and change the way we work and collaborate. This paper presents a qualitative study with 52 German farmers
    that investigates the impact of the ongoing digitalization process in agriculture and discusses the implications for privacy research. As in other domains, the introduction of digital tools and services leads to the data
    itself becoming a resource. Sharing this data with products along the supply chain is favored by retailers and
    consumers, who benefit from traceability through transparency. However, transparency can pose a privacy risk.
    Having insight into the business data of others along the
    supply chain provides an advantage in terms of market
    position. This is particularly true in agriculture, where
    there is already a significant imbalance of power between actors. A multitude of small and medium-sized
    farming businesses are opposed by large upstream and
    downstream players that drive technological innovation.
    Further weakening the market position of farmers could
    lead to severe consequences for the entire sector. We
    found that on the one hand, privacy behaviors are affected by adoption of digitalization, and on the other
    hand, privacy itself influences adoption of digital tools.
    Our study sheds light on the emerging challenges for
    farmers and the role of privacy in the process of digitalization in agriculture.},
    number = {3},
    journal = {Proceedings on Privacy Enhancing Technologies (PoPETs)},
    author = {Linsner, Sebastian and Kuntke, Franz and Steinbrink, Enno and Franken, Jonas and Reuter, Christian},
    year = {2021},
    keywords = {HCI, Selected, UsableSec, Security, A-Paper, Ranking-ImpactFactor, Ranking-CORE-A, AuswahlUsableSec, Projekt-GeoBox, Projekt-GRKPrivacy, Projekt-HyServ},
    pages = {334--350},
    }

  • Franz Kuntke, Marcel Sinn, Sebastian Linsner, Christian Reuter (2021)
    Low Power Wide Area Networks (LPWAN) für krisentaugliche Datenübertragung in landwirtschaftlichen Betrieben
    41. GIL-Jahrestagung: Informatik in der Land-, Forst- und Ernährungswirtschaft Meyer-Aurich, Andreas Gandorfer, Markus Hoffmann, Christa Weltzien, Cornelia Bellingrath-Kimura, Sonoko D. Floto, Helga.
    [BibTeX] [Abstract] [Download PDF]

    Zuverlässige IT-basierte Kommunikation in der Landwirtschaft wird immer wichtiger für den regulären Betriebsablauf. Sollte sich ein Landwirt beispielsweise während eines lokalen Krisenfalls, wie einem Ausfall des Mobilfunknetzes oder des Internetzugangs des Betriebs, auf dem Feld aufhalten, wird ein alternativer Kommunikationskanal benötigt, um weiterhin eine Verbindung zu IT-Komponenten und benötigten Daten herstellen zu können. Mit der zunehmenden Digitalisierung finden Low-Power-Wide-Area-Network (LPWAN)-Technologien immer häufiger Anwendung, beispielsweise durch den Aufbau von Sensornetzwerken. Die eingesetzten LPWANTechnologien bieten dabei eine hohe Reichweite und sind größtenteils autark einsetzbar, erlauben jedoch keine klassische TCP/IP-Kommunikation. Im Rahmen dieser Arbeit wird experimentell eine populäre LPWAN-Technologie, namentlich LoRaWAN, durch AX.25 auf OSI-Schicht 2 (Data Link Layer) ergänzt, um Endgeräten eine TCP/IP-basierte Kommunikation über weite Strecken zu erlauben. Die Evaluation zeigt, dass klassische Anwendungen mit niedriger Bandbreite somit funktionsfähig sind und krisentaugliche Datenübertragung in landwirtschaftlichen Betrieben ermöglichen können.

    @inproceedings{kuntke_low_2021,
    address = {Meyer-Aurich, Andreas Gandorfer, Markus Hoffmann, Christa Weltzien, Cornelia Bellingrath-Kimura, Sonoko D. Floto, Helga},
    title = {Low {Power} {Wide} {Area} {Networks} ({LPWAN}) für krisentaugliche {Datenübertragung} in landwirtschaftlichen {Betrieben}},
    url = {http://www.peasec.de/paper/2021/2021_KuntkeSinnLinsnerReuter_LowPowerWideAreaNetworks_GIL.pdf},
    abstract = {Zuverlässige IT-basierte Kommunikation in der Landwirtschaft wird immer wichtiger für den regulären Betriebsablauf. Sollte sich ein Landwirt beispielsweise während eines lokalen Krisenfalls, wie einem Ausfall des Mobilfunknetzes oder des Internetzugangs des Betriebs, auf dem Feld aufhalten, wird ein alternativer Kommunikationskanal benötigt, um weiterhin eine Verbindung zu IT-Komponenten und benötigten Daten herstellen zu können. Mit der zunehmenden Digitalisierung finden Low-Power-Wide-Area-Network (LPWAN)-Technologien immer häufiger Anwendung, beispielsweise durch den Aufbau von Sensornetzwerken. Die eingesetzten LPWANTechnologien bieten dabei eine hohe Reichweite und sind größtenteils autark einsetzbar, erlauben jedoch keine klassische TCP/IP-Kommunikation. Im Rahmen dieser Arbeit wird experimentell eine populäre LPWAN-Technologie, namentlich LoRaWAN, durch AX.25 auf OSI-Schicht 2 (Data Link Layer) ergänzt, um Endgeräten eine TCP/IP-basierte Kommunikation über weite Strecken zu erlauben. Die Evaluation zeigt, dass klassische Anwendungen mit niedriger Bandbreite somit funktionsfähig sind und krisentaugliche Datenübertragung in landwirtschaftlichen Betrieben ermöglichen können.},
    booktitle = {41. {GIL}-{Jahrestagung}: {Informatik} in der {Land}-, {Forst}- und {Ernährungswirtschaft}},
    publisher = {Gesellschaft für Informatik},
    author = {Kuntke, Franz and Sinn, Marcel and Linsner, Sebastian and Reuter, Christian},
    editor = {Meyer-Aurich, Andreas and Gandorfer, Markus and Hoffmann, Christa and Weltzien, Cornelia and Bellingrath-Kimura, Sonoko D. and Floto, Helga},
    year = {2021},
    keywords = {Ranking-VHB-C, Security, Projekt-GeoBox, Projekt-HyServ},
    pages = {193--198},
    }

  • Daniel Eberz-Eder, Franz Kuntke, Wolfgang Schneider, Christian Reuter (2021)
    Technologische Umsetzung des Resilient Smart Farming (RSF) durch den Einsatz von Edge-Computing
    41. GIL-Jahrestagung: Informatik in der Land-, Forst- und Ernährungswirtschaft .
    [BibTeX] [Abstract] [Download PDF]

    Edge Computing bietet die Möglichkeit zur Realisierung von Resilient Smart Farming (RSF). Die vorliegende Arbeit setzt sich mit Möglichkeiten der möglichst ausfallsicheren Digitalisierung der Landwirtschaft als kritischer Infrastruktur auseinander und zeigt auf, dass dezentrale Lösungen des Edge Computing inzwischen innovative technologische Möglichkeiten zur Realisierung von RSF bieten. Die Vorteile der lokalen Datenverarbeitung am Entstehungsort in Kombination mit einer regionalen Vernetzung bieten neue Möglichkeiten im Zeitalter von 5GInfrastrukturen und dem Einsatz von IoT-Sensornetzwerken. Der Fokus dieser Arbeit liegt auf Edge Computing als Technologie zur Umsetzung eines resilienten Smart Farming.

    @inproceedings{eberz-eder_technologische_2021,
    title = {Technologische {Umsetzung} des {Resilient} {Smart} {Farming} ({RSF}) durch den {Einsatz} von {Edge}-{Computing}},
    url = {http://www.peasec.de/paper/2021/2021_EberzEderKuntkeSchneiderReuter_TechnischeUmsetzungResilientSmartFarming_GIL.pdf},
    abstract = {Edge Computing bietet die Möglichkeit zur Realisierung von Resilient Smart Farming (RSF). Die vorliegende Arbeit setzt sich mit Möglichkeiten der möglichst ausfallsicheren Digitalisierung der Landwirtschaft als kritischer Infrastruktur auseinander und zeigt auf, dass dezentrale Lösungen des Edge Computing inzwischen innovative technologische Möglichkeiten zur Realisierung von RSF bieten. Die Vorteile der lokalen Datenverarbeitung am Entstehungsort in Kombination mit einer regionalen Vernetzung bieten neue Möglichkeiten im Zeitalter von 5GInfrastrukturen und dem Einsatz von IoT-Sensornetzwerken. Der Fokus dieser Arbeit liegt auf Edge Computing als Technologie zur Umsetzung eines resilienten Smart Farming.},
    booktitle = {41. {GIL}-{Jahrestagung}: {Informatik} in der {Land}-, {Forst}- und {Ernährungswirtschaft}},
    publisher = {Gesellschaft für Informatik},
    author = {Eberz-Eder, Daniel and Kuntke, Franz and Schneider, Wolfgang and Reuter, Christian},
    year = {2021},
    keywords = {Ranking-VHB-C, UsableSec, Security, Projekt-GeoBox},
    pages = {79--84},
    }

  • Franz Kuntke, Marcel Sinn, Christian Reuter (2021)
    Reliable Data Transmission using Low Power Wide Area Networks (LPWAN) for Agricultural Applications
    Proceedings of the 16th International Conference on Availability, Reliability and Security (ARES 2021) . doi:10.1145/3465481.3469191
    [BibTeX] [Abstract] [Download PDF]

    Reliable IT-based communication in agriculture is becoming increasingly important for regular operations. For example, if a farmer is in the field during a network outage, such as a failure of the mobile network, an alternative communication channel is needed to continue to connect to IT components and required data. With increasing digitalization, Low Power Wide Area Network (LPWAN) technologies are being used more and more frequently, e.g. for sensor networks. The LPWAN technologies offer a high range and can be used autonomously for the most part, but do not allow classic TCP/IP communication. In this work, a popular LPWAN technology, namely LoRaWAN, is experimentally supplemented by AX.25 on OSI layer 2 (Data Link Layer) to allow end devices TCP/IP-based communication over long distances. The evaluation shows that classic low-bandwidth applications are thus functional and can enable reliable, crisis-capable data transmission.

    @inproceedings{kuntke_reliable_2021,
    title = {Reliable {Data} {Transmission} using {Low} {Power} {Wide} {Area} {Networks} ({LPWAN}) for {Agricultural} {Applications}},
    url = {http://www.peasec.de/paper/2021/2021_KuntkeSinnReuter_LPWANAgriculture_FARES.pdf},
    doi = {10.1145/3465481.3469191},
    abstract = {Reliable IT-based communication in agriculture is becoming increasingly important for regular operations. For example, if a farmer is in the field during a network outage, such as a failure of the mobile network, an alternative communication channel is needed to continue to connect to IT components and required data. With increasing digitalization, Low Power Wide Area Network (LPWAN) technologies are being used more and more frequently, e.g. for sensor networks. The LPWAN technologies offer a high range and can be used autonomously for the most part, but do not allow classic TCP/IP communication. In this work, a popular LPWAN technology, namely LoRaWAN, is experimentally supplemented by AX.25 on OSI layer 2 (Data Link Layer) to allow end devices TCP/IP-based communication over long distances. The evaluation shows that classic low-bandwidth applications are thus functional and can enable reliable, crisis-capable data transmission.},
    booktitle = {Proceedings of the 16th {International} {Conference} on {Availability}, {Reliability} and {Security} ({ARES} 2021)},
    author = {Kuntke, Franz and Sinn, Marcel and Reuter, Christian},
    year = {2021},
    keywords = {Student, Security, Projekt-GeoBox, Projekt-HyServ},
    pages = {1--9},
    }

    2020

  • Franz Kuntke, Christian Reuter, Wolfgang Schneider, Daniel Eberz, Ansgar Bernardi (2020)
    Die GeoBox-Vision: Resiliente Interaktion und Kooperation in der Landwirtschaft durch dezentrale Systeme
    Mensch und Computer – Workshopband Magdeburg. doi:10.18420/muc2020-ws117-407
    [BibTeX] [Abstract] [Download PDF]

    Betrachtet man Landwirtschaft unter dem Blickwinkel kritischer Infrastruktur, da sie einen essenziellen Bestandteil der lebenswich-tigen Nahrungsmittelproduktion darstellt, so wird schnell klar, dass auch die dort eingesetzten Werkzeuge hohen Anforderungen stand-halten müssen. Mit dem Einsatz moderner digitaler Werkzeuge werden Erwartungen verbunden, sowohl den gesellschaftlichen Anforderungen nach Qualität und Quantität von Nahrungsmitteln gerecht zu werden, als auch dabei die Produktion möglichst effi-zient unter Berücksichtigung von Umwelt und Natur durchzufüh-ren. Ebenso gilt es die Interessen der landwirtschaftlich Beschäftig-ten zu wahren. Die Geobox-Infrastruktur verfolgt dieses Ziel. Zu den wichtigsten Aspekten, die dabei erfüllt werden müssen, zählen eine resiliente Systemarchitektur, Sicherheit und Datenhoheit, aber auch Gebrauchstauglichkeit. Dieser Beitrag diskutiert den For-schungsansatz sowie zentrale Anforderungen.

    @inproceedings{kuntke_geobox-vision_2020,
    address = {Magdeburg},
    title = {Die {GeoBox}-{Vision}: {Resiliente} {Interaktion} und {Kooperation} in der {Landwirtschaft} durch dezentrale {Systeme}},
    url = {https://dl.gi.de/handle/20.500.12116/33548},
    doi = {10.18420/muc2020-ws117-407},
    abstract = {Betrachtet man Landwirtschaft unter dem Blickwinkel kritischer Infrastruktur, da sie einen essenziellen Bestandteil der lebenswich-tigen Nahrungsmittelproduktion darstellt, so wird schnell klar, dass auch die dort eingesetzten Werkzeuge hohen Anforderungen stand-halten müssen. Mit dem Einsatz moderner digitaler Werkzeuge werden Erwartungen verbunden, sowohl den gesellschaftlichen Anforderungen nach Qualität und Quantität von Nahrungsmitteln gerecht zu werden, als auch dabei die Produktion möglichst effi-zient unter Berücksichtigung von Umwelt und Natur durchzufüh-ren. Ebenso gilt es die Interessen der landwirtschaftlich Beschäftig-ten zu wahren. Die Geobox-Infrastruktur verfolgt dieses Ziel. Zu den wichtigsten Aspekten, die dabei erfüllt werden müssen, zählen eine resiliente Systemarchitektur, Sicherheit und Datenhoheit, aber auch Gebrauchstauglichkeit. Dieser Beitrag diskutiert den For-schungsansatz sowie zentrale Anforderungen.},
    booktitle = {Mensch und {Computer} - {Workshopband}},
    publisher = {Gesellschaft für Informatik e.V.},
    author = {Kuntke, Franz and Reuter, Christian and Schneider, Wolfgang and Eberz, Daniel and Bernardi, Ansgar},
    editor = {Hansen, C. and Nürnberger, A. and Preim, B.},
    year = {2020},
    keywords = {Crisis, UsableSec, Security, Infrastructure, Projekt-GeoBox},
    pages = {1--6},
    }

  • Jonas Höchst, Lars Baumgärtner, Franz Kuntke, Alvar Penning, Artur Sterz, Bernd Freisleben (2020)
    LoRa-based Device-to-Device Smartphone Communication for Crisis Scenarios
    Proceedings of Information Systems for Crisis Response and Management (ISCRAM) .
    [BibTeX] [Abstract] [Download PDF]

    In this paper, we present an approach to facilitate long-range device-to-device communication via smartphones in crisis scenarios. Through a custom firmware for low-cost LoRa capable micro-controller boards, called rf95modem, common devices for end users can be enabled to use LoRa through a Bluetooth, Wi-Fi, or serial connection. We present two applications utilizing the flexibility provided by the proposed firmware. First, we introduce a novel device-to-device LoRa chat application that works a) on the two major mobile platforms Android and iOS and b) on traditional computers like notebooks using a console-based interface. Second, we demonstrate how other infrastructure-less technology can benefit from our approach by integrating it into the DTN7 delay-tolerant networking software. The firmware, the device-to-device chat application, the integration into DTN7, as well as the experimental evaluation code fragments are available under permissive open-source licenses.

    @inproceedings{hochst_lora-based_2020,
    title = {{LoRa}-based {Device}-to-{Device} {Smartphone} {Communication} for {Crisis} {Scenarios}},
    url = {https://peasec.de/paper/2020/2020_Höchstetal_LoRaDeviceSmartphoneCommunicationCrisisScenarios.pdf},
    abstract = {In this paper, we present an approach to facilitate long-range device-to-device communication via smartphones in crisis scenarios. Through a custom firmware for low-cost LoRa capable micro-controller boards, called rf95modem, common devices for end users can be enabled to use LoRa through a Bluetooth, Wi-Fi, or serial connection. We present two applications utilizing the flexibility provided by the proposed firmware. First, we introduce a novel device-to-device LoRa chat application that works a) on the two major mobile platforms Android and iOS and b) on traditional computers like notebooks using a console-based interface. Second, we demonstrate how other infrastructure-less technology can benefit from our approach by integrating it into the DTN7 delay-tolerant networking software. The firmware, the device-to-device chat application, the integration into DTN7, as well as the experimental evaluation code fragments are available under permissive open-source licenses.},
    booktitle = {Proceedings of {Information} {Systems} for {Crisis} {Response} and {Management} ({ISCRAM})},
    author = {Höchst, Jonas and Baumgärtner, Lars and Kuntke, Franz and Penning, Alvar and Sterz, Artur and Freisleben, Bernd},
    year = {2020},
    keywords = {Crisis, Security, Projekt-MAKI, Projekt-GeoBox},
    pages = {996--1011},
    }

    2019

  • Sebastian Linsner, Rashmi Varma, Christian Reuter (2019)
    Vulnerability Assessment in the Smart Farming Infrastructure through Cyberattacks
    39. GIL-Jahrestagung: Informatik in der Land-, Forst- und Ernährungswirtschaft Fokus; Digitalisierung für landwirtschaftliche Betriebe in kleinstrukturierten Regionen – ein Widerspruch in sich?, Lecture Notes in Informatics (LNI) Wien, Austria.
    [BibTeX] [Abstract] [Download PDF]

    The Internet of Things (IoT) has a significant impact on agriculture. So-called Smart Farming uses drones and a variety of sensors to measure climate, irrigation, soil moisture or GPS position. With this rapid influx of technology increases the threat that vulnerabilities in those technologies are being exploited for malicious intent. To show the impact of cyberattacks on agriculture, we present a simulation of several attacks on a ZigBee-based wireless sensor network. We conduct a delay attack, an interference attack and three different routing attacks (sinkhole, blackhole and selective forwarding attack). Those attacks are simulated using NETA with the OMNET++ framework. We will show that the security of WSN is influenced by factors like energy consumption or computation power, which can conflict with other interests like low per-unit costs.

    @inproceedings{linsner_vulnerability_2019,
    address = {Wien, Austria},
    title = {Vulnerability {Assessment} in the {Smart} {Farming} {Infrastructure} through {Cyberattacks}},
    url = {http://gil-net.de/Publikationen/139_119.pdf},
    abstract = {The Internet of Things (IoT) has a significant impact on agriculture. So-called Smart Farming uses drones and a variety of sensors to measure climate, irrigation, soil moisture or GPS position. With this rapid influx of technology increases the threat that vulnerabilities in those technologies are being exploited for malicious intent. To show the impact of cyberattacks on agriculture, we present a simulation of several attacks on a ZigBee-based wireless sensor network. We conduct a delay attack, an interference attack and three different routing attacks (sinkhole, blackhole and selective forwarding attack). Those attacks are simulated using NETA with the OMNET++ framework. We will show that the security of WSN is influenced by factors like energy consumption or computation power, which can conflict with other interests like low per-unit costs.},
    booktitle = {39. {GIL}-{Jahrestagung}: {Informatik} in der {Land}-, {Forst}- und {Ernährungswirtschaft} {Fokus}; {Digitalisierung} für landwirtschaftliche {Betriebe} in kleinstrukturierten {Regionen} – ein {Widerspruch} in sich?, {Lecture} {Notes} in {Informatics} ({LNI})},
    publisher = {Gesellschaft für Informatik},
    author = {Linsner, Sebastian and Varma, Rashmi and Reuter, Christian},
    editor = {Meyer-Aurich, A.},
    year = {2019},
    keywords = {Student, Ranking-CORE-C, Ranking-VHB-C, Security, Infrastructure, RSF, Projekt-CROSSING, Projekt-GeoBox, Projekt-HyServ},
    pages = {119--124},
    }

  • Sebastian Linsner, Franz Kuntke, Gina Maria Schmidbauer-Wolf, Christian Reuter (2019)
    Blockchain in der Landwirtschaft 4.0 – Empirische Studie zu Erwartungen von Landwirt_innen gegenüber dezentralen Services auf Basis von Distributed Ledger Technology
    Mensch und Computer – Tagungsband Hamburg, Germany. doi:10.1145/3340764.3340799
    [BibTeX] [Abstract] [Download PDF]

    Digitalization, which proceeds in all branches, as well in agriculture, by using new technology, sensors and networking, requires responsible usage of data. One possibility to manage data and use them to create value is the blockchain-technology. It is primary enforced by the food industries and consumers to ensure traceability and transparency. To put blockchain-technology into beneficial use in agriculture, this domain has to be analyzed regarding social and business aspects. This paper presents the results of a qualitative study where 41 actors from the agricultural do-main participated in focus groups and delivered a written statement. It was found that farmers are interested in adapting new markets and technologies early to get an economic advantage. On the other hand, the fear of losing traditional local business partners and the social surroundings of the farmers must be considered

    @inproceedings{linsner_blockchain_2019,
    address = {Hamburg, Germany},
    title = {Blockchain in der {Landwirtschaft} 4.0 - {Empirische} {Studie} zu {Erwartungen} von {Landwirt}\_innen gegenüber dezentralen {Services} auf {Basis} von {Distributed} {Ledger} {Technology}},
    url = {https://dl.acm.org/citation.cfm?id=3340799},
    doi = {10.1145/3340764.3340799},
    abstract = {Digitalization, which proceeds in all branches, as well in agriculture, by using new technology, sensors and networking, requires responsible usage of data. One possibility to manage data and use them to create value is the blockchain-technology. It is primary enforced by the food industries and consumers to ensure traceability and transparency. To put blockchain-technology into beneficial use in agriculture, this domain has to be analyzed regarding social and business aspects. This paper presents the results of a qualitative study where 41 actors from the agricultural do-main participated in focus groups and delivered a written statement. It was found that farmers are interested in adapting new markets and technologies early to get an economic advantage. On the other hand, the fear of losing traditional local business partners and the social surroundings of the farmers must be considered},
    booktitle = {Mensch und {Computer} - {Tagungsband}},
    publisher = {ACM},
    author = {Linsner, Sebastian and Kuntke, Franz and Schmidbauer-Wolf, Gina Maria and Reuter, Christian},
    editor = {Alt, Florian and Bulling, Andreas and Döring, Tanja},
    year = {2019},
    keywords = {Cooperation, HCI, Projekt-CRISP, Projekt-CROSSING, Projekt-MAKI, Projekt-GeoBox, Projekt-HyServ},
    pages = {103--113},
    }

  • Timo Kalle, Marc-André Kaufhold, Franz Kuntke, Christian Reuter, Amr Rizk, Ralf Steinmetz (2019)
    Resilience in Security and Crises through Adaptions and Transitions
    INFORMATIK 2019: 50 Jahre Gesellschaft für Informatik – Informatik für Gesellschaft (Workshop-Beiträge), Lecture Notes in Informatics (LNI) Kassel, Germany. doi:10.18420/inf2019_ws60
    [BibTeX] [Abstract] [Download PDF]

    Currently, there is a tremendous number of communication technology and tems in use. Not only in the private user space, but also in business operations and societal areas, they are deeply involved: Ranging from messaging services or navigation over (critical) SCADA systems to whole digital cities and communities. Consequently, the view on communication networks in security and particularly crisis scenarios becomes inevitable. This paper examines the notions of resilience, adaption and transition within communication networks with a specific focus on crises. Based on a structured literature review, the fundamentals of resilience and communication networks are introduced. The paper then discusses the characteristics of (a) evolvability, accessibility, usability and diversity as well as (b) self-organization, -management, -optimization, – monitoring, -healing and -protection for communication network resilience. Finally, it outlines challenges and potentials of communication network resilience based in the use cases of security and crises.

    @inproceedings{kalle_resilience_2019,
    address = {Kassel, Germany},
    title = {Resilience in {Security} and {Crises} through {Adaptions} and {Transitions}},
    url = {https://dl.gi.de/bitstream/handle/20.500.12116/25097/paper12_02.pdf},
    doi = {10.18420/inf2019_ws60},
    abstract = {Currently, there is a tremendous number of communication technology and tems in use. Not only in the private user space, but also in business operations and societal areas, they are deeply involved: Ranging from messaging services or navigation over (critical) SCADA systems to whole digital cities and communities. Consequently, the view on communication networks in security and particularly crisis scenarios becomes inevitable. This paper examines the notions of resilience, adaption and transition within communication networks with a specific focus on crises. Based on a structured literature review, the fundamentals of resilience and communication networks are introduced. The paper then discusses the characteristics of (a) evolvability, accessibility, usability and diversity as well as (b) self-organization, -management, -optimization, - monitoring, -healing and -protection for communication network resilience. Finally, it outlines challenges and potentials of communication network resilience based in the use cases of security and crises.},
    booktitle = {{INFORMATIK} 2019: 50 {Jahre} {Gesellschaft} für {Informatik} – {Informatik} für {Gesellschaft} ({Workshop}-{Beiträge}), {Lecture} {Notes} in {Informatics} ({LNI})},
    publisher = {Gesellschaft für Informatik e. V.},
    author = {Kalle, Timo and Kaufhold, Marc-André and Kuntke, Franz and Reuter, Christian and Rizk, Amr and Steinmetz, Ralf},
    editor = {Draude, C. and Lange, M. and Sick, B.},
    year = {2019},
    keywords = {Crisis, HCI, Student, Ranking-CORE-C, Ranking-VHB-C, UsableSec, Security, Projekt-MAKI, Projekt-GeoBox},
    pages = {571--584},
    }

  • Christian Reuter, Wolfgang Schneider, Daniel Eberz (2019)
    Resilient Smart Farming (RSF) – Nutzung digitaler Technologien in krisensicherer Infrastruktur
    39. GIL-Jahrestagung: Informatik in der Land-, Forst- und Ernährungswirtschaft Fokus; Digitalisierung für landwirtschaftliche Betriebe in kleinstrukturierten Regionen – ein Widerspruch in sich?, Lecture Notes in Informatics (LNI) Vienna, Austria.
    [BibTeX] [Abstract] [Download PDF]

    Resilienz ist in aller Munde. Die vorliegende Arbeit setzt sich mit der Ausfall- und Angriffssicherheit der Landwirtschaft als zentraler Bestandteil der Ernährungswirtschaft im digitalen Zeitalter kritisch auseinander. Dabei geht es nicht um die Frage, ob Smart Farming in der landwirtschaftlichen Praxis sinnvoll ist, sondern ob deren Infrastruktur den Anforderungen einer ausfallsicheren (resilienten) Infrastruktur gerecht wird. Da die Ernährungswirtschaft ein Teil der kritischen Infrastruktur ist, ist deren Analyse in Hinsicht auf mögliche Angriffspotenziale und auf Ausfallsicherheit von gesellschaftlicher Relevanz. Wir schlagen Resilient Smart Farming (RSF) zur Nutzung digitaler Technologien in krisensicherer Infrastruktur vor.

    @inproceedings{reuter_resilient_2019,
    address = {Vienna, Austria},
    title = {Resilient {Smart} {Farming} ({RSF}) – {Nutzung} digitaler {Technologien} in krisensicherer {Infrastruktur}},
    url = {http://gil-net.de/Publikationen/139_177.pdf},
    abstract = {Resilienz ist in aller Munde. Die vorliegende Arbeit setzt sich mit der Ausfall- und Angriffssicherheit der Landwirtschaft als zentraler Bestandteil der Ernährungswirtschaft im digitalen Zeitalter kritisch auseinander. Dabei geht es nicht um die Frage, ob Smart Farming in der landwirtschaftlichen Praxis sinnvoll ist, sondern ob deren Infrastruktur den Anforderungen einer ausfallsicheren (resilienten) Infrastruktur gerecht wird. Da die Ernährungswirtschaft ein Teil der kritischen Infrastruktur ist, ist deren Analyse in Hinsicht auf mögliche Angriffspotenziale und auf Ausfallsicherheit von gesellschaftlicher Relevanz. Wir schlagen Resilient Smart Farming (RSF) zur Nutzung digitaler Technologien in krisensicherer Infrastruktur vor.},
    booktitle = {39. {GIL}-{Jahrestagung}: {Informatik} in der {Land}-, {Forst}- und {Ernährungswirtschaft} {Fokus}; {Digitalisierung} für landwirtschaftliche {Betriebe} in kleinstrukturierten {Regionen} – ein {Widerspruch} in sich?, {Lecture} {Notes} in {Informatics} ({LNI})},
    publisher = {Gesellschaft für Informatik},
    author = {Reuter, Christian and Schneider, Wolfgang and Eberz, Daniel},
    editor = {Meyer-Aurich, A.},
    year = {2019},
    keywords = {Crisis, Ranking-CORE-C, Ranking-VHB-C, Infrastructure, RSF, Projekt-GeoBox, Projekt-HyServ},
    pages = {177--182},
    }

  • Marc-André Kaufhold, Margarita Grinko, Christian Reuter, Marén Schorch, Amanda Langer, Sascha Skudelny, Matthias Hollick (2019)
    Potentiale von IKT beim Ausfall kritischer Infrastrukturen: Erwartungen, Informationsgewinnung und Mediennutzung der Zivilbevölkerung in Deutschland
    Proceedings of the International Conference on Wirtschaftsinformatik (WI) Siegen, Germany.
    [BibTeX] [Abstract] [Download PDF]

    In der Sicherheits- und Krisenforschung stehen bislang primär Fragen der Vulne-rabilität, Stärkung von Resilienz und Erhaltung bzw. Wiederherstellung kritischer Infrastrukturen (KRITIS) im Mittelpunkt; zunehmend wird auch die Bedeutung von Sozialen Medien und Krisen-Apps erkannt. Inwiefern ist die Zivilbevölke-rung in Deutschland aber auf das Eintreten einer Krise tatsächlich vorbereitet? Welche Informations- und Kommunikationstechniken (IKT) werden im Alltag und bei einem potentiellen Infrastrukturausfall genutzt? Unser Beitrag stellt die Ergebnisse einer repräsentativen Umfrage mit 1024 Teilnehmern in Deutschland vor, die belegen, dass Gefahrenbewusstsein, Vorbereitung, effektives Krisenma-nagement und Verbreitung von Krisen-Apps in Deutschland noch relativ gering sind, während traditionelle Kommunikations- und Informationskanäle sowie in-formelle Informationsnetzwerke bevorzugt werden. Die Ergebnisse stellen wei-terhin die beträchtlichen Unterstützungspotentiale von IKT in derartigen Krisensi-tuationen heraus, die zur Erhöhung des Risikobewusstseins, der Erleichterung des Informationstransfers und der Verbesserung der Kommunikation zwischen Zivilbevölkerung, KRITIS-Betreibern und Behörden und Organisationen mit Si-cherheitsaufgaben (BOS) entscheidend beitragen können.

    @inproceedings{kaufhold_potentiale_2019,
    address = {Siegen, Germany},
    title = {Potentiale von {IKT} beim {Ausfall} kritischer {Infrastrukturen}: {Erwartungen}, {Informationsgewinnung} und {Mediennutzung} der {Zivilbevölkerung} in {Deutschland}},
    url = {http://www.peasec.de/paper/2019/2019_KaufholdGrinkoReuterSchorschLangerSkudelnyHollick_InfrastrukturAusfall_WI.pdf},
    abstract = {In der Sicherheits- und Krisenforschung stehen bislang primär Fragen der Vulne-rabilität, Stärkung von Resilienz und Erhaltung bzw. Wiederherstellung kritischer Infrastrukturen (KRITIS) im Mittelpunkt; zunehmend wird auch die Bedeutung von Sozialen Medien und Krisen-Apps erkannt. Inwiefern ist die Zivilbevölke-rung in Deutschland aber auf das Eintreten einer Krise tatsächlich vorbereitet? Welche Informations- und Kommunikationstechniken (IKT) werden im Alltag und bei einem potentiellen Infrastrukturausfall genutzt? Unser Beitrag stellt die Ergebnisse einer repräsentativen Umfrage mit 1024 Teilnehmern in Deutschland vor, die belegen, dass Gefahrenbewusstsein, Vorbereitung, effektives Krisenma-nagement und Verbreitung von Krisen-Apps in Deutschland noch relativ gering sind, während traditionelle Kommunikations- und Informationskanäle sowie in-formelle Informationsnetzwerke bevorzugt werden. Die Ergebnisse stellen wei-terhin die beträchtlichen Unterstützungspotentiale von IKT in derartigen Krisensi-tuationen heraus, die zur Erhöhung des Risikobewusstseins, der Erleichterung des Informationstransfers und der Verbesserung der Kommunikation zwischen Zivilbevölkerung, KRITIS-Betreibern und Behörden und Organisationen mit Si-cherheitsaufgaben (BOS) entscheidend beitragen können.},
    booktitle = {Proceedings of the {International} {Conference} on {Wirtschaftsinformatik} ({WI})},
    publisher = {AIS},
    author = {Kaufhold, Marc-André and Grinko, Margarita and Reuter, Christian and Schorch, Marén and Langer, Amanda and Skudelny, Sascha and Hollick, Matthias},
    year = {2019},
    keywords = {Crisis, HCI, SocialMedia, Ranking-CORE-C, Ranking-VHB-C, Ranking-WKWI-A, Projekt-KontiKat, Infrastructure, RSF, Projekt-MAKI, Projekt-GeoBox, Projekt-HyServ},
    pages = {1054--1068},
    }

    2018

  • Christian Reuter, Wolfgang Schneider, Daniel Eberz, Markus Bayer, Daniel Hartung, Cemal Kaygusuz (2018)
    Resiliente Digitalisierung der kritischen Infrastruktur Landwirtschaft – mobil, dezentral, ausfallsicher
    Mensch und Computer – Workshopband Dresden, Germany.
    [BibTeX] [Abstract] [Download PDF]

    Diese Arbeit befasst sich mit der zunehmenden Digitalisierung der kritischen Infrastruktur Ernährungswirtschaft und setzt den Fokus insbesondere auf die dadurch resultierenden in-formationstechnologischen Folgen bezüglich der Angriffs- und Ausfallsicherheit in der Landwirtschaft und von ihr abhängigen Sektoren. In diesem Kontext wird die Modernisie-rungen der Landmaschinen und deren Vernetzung sowie das Cloud-Computing in der Landwirtschaft analysiert und zu treffende Maßnahmen bezüglich einer resilienten Struktur erläutert. In vielen Bereichen wird dabei aufgezeigt, dass das Ausfallrisiko der Produktion zugunsten von Vorteilen wie Ertrags- und Qualitätssteigerung vernachlässigt wird.

    @inproceedings{reuter_resiliente_2018,
    address = {Dresden, Germany},
    title = {Resiliente {Digitalisierung} der kritischen {Infrastruktur} {Landwirtschaft} - mobil, dezentral, ausfallsicher},
    url = {https://dl.gi.de/bitstream/handle/20.500.12116/16930/Beitrag_330_final__a.pdf},
    abstract = {Diese Arbeit befasst sich mit der zunehmenden Digitalisierung der kritischen Infrastruktur Ernährungswirtschaft und setzt den Fokus insbesondere auf die dadurch resultierenden in-formationstechnologischen Folgen bezüglich der Angriffs- und Ausfallsicherheit in der Landwirtschaft und von ihr abhängigen Sektoren. In diesem Kontext wird die Modernisie-rungen der Landmaschinen und deren Vernetzung sowie das Cloud-Computing in der Landwirtschaft analysiert und zu treffende Maßnahmen bezüglich einer resilienten Struktur erläutert. In vielen Bereichen wird dabei aufgezeigt, dass das Ausfallrisiko der Produktion zugunsten von Vorteilen wie Ertrags- und Qualitätssteigerung vernachlässigt wird.},
    booktitle = {Mensch und {Computer} - {Workshopband}},
    publisher = {Gesellschaft für Informatik e.V.},
    author = {Reuter, Christian and Schneider, Wolfgang and Eberz, Daniel and Bayer, Markus and Hartung, Daniel and Kaygusuz, Cemal},
    editor = {Dachselt, Raimund and Weber, Gerhard},
    year = {2018},
    keywords = {Crisis, Student, Projekt-KontiKat, Infrastructure, RSF, Projekt-MAKI, Projekt-GeoBox, Projekt-HyServ},
    pages = {623--632},
    }

    SFB1053 MAKI: Multi-Mechanismen-Adaptation für das künftige Internet (2018-2019, DFG)

    SFB MAKI: Multi-Mechanismen-Adaptation für das künftige Internet (seit 2018, DFG) – Website

    Wie wird das Internet der Zukunft aussehen? Welche bereits bekannten Arten der Kommunikation bleiben erhalten, welche neuen müssen darüber hinaus berücksichtigt werden? Welche zusätzlichen Herausforderungen stellt die zunehmend mobile Nutzung der Netze? Der Sonderforschungsbereich MAKI (Multi-Mechanismen-Adaptation für das künftige Internet) schafft neue Voraussetzungen für die Kommunikationssysteme der Zukunft. Diese sollen sich sehr viel einfacher und im laufenden Betrieb an Veränderungen anpassen können. So könnte zum Beispiel ein Videostream in hoher Qualität und ohne Unterbrechung auf dem Smartphone abgespielt werden, auch wenn das Mobilfunknetz aufgrund von enormen Menschenansammlungen überlastet ist. Selbst auf Volksfesten und bei großen Sportveranstaltungen hätte der Nutzer zukünftig stabilen Empfang.

    X3: Infrastructure-Centered Perspective: Human-Computer-Interaction and Transitions: Das Teilprojekt X3 untersucht Transitionen bei Infrastrukturstörungen, etwa Abweichungen oder komplette Ausfälle. Es werden sowohl qualitative empirische Studien als auch repräsentative quantitative Studien durchgeführt, um Daten zur Wahrnehmung von Infrastrukturstörungen aus Sicht verschiedener Akteure zu sammeln und auszuwerten. Unter Berücksichtigung der empirischen Ergebnisse ist es das Ziel, technische Parameter abzuleiten, die im Einklang zu den Bedürfnissen der Akteure stehen, um Transitionen bei Infrastrukturstörungen proaktiv auszulösen. Darüber hinaus werden gebrauchstaugliche Demonstratoren zur Warnung und Information der Bevölkerung bei Infrastrukturstörungen entwickelt, um die Evaluation von Anwendungen und Dienste im Hinblick auf Benutzerfreundlichkeit, Verlässlichkeit und Widerstandsfähigkeit zu ermöglichen.

    2023

  • Franz Kuntke, Lars Baumgärtner, Christian Reuter (2023)
    Rural Communication in Outage Scenarios: Disruption-Tolerant Networking via LoRaWAN Setups
    Proceedings of Information Systems for Crisis Response and Management (ISCRAM) .
    [BibTeX] [Abstract] [Download PDF]

    Since communications infrastructure is subject to many impacts, e.g., destructive natural events, they can potentially collapse at any time. Especially in rural areas, the recovery of public network infrastructure can take some time, so a dedicated communication channel would be advantageous. We explore the possibility of transforming commodity LoRaWAN gateways into meshed network nodes for a digital emergency communication channel. In order to obtain the required parameters, we collected farm locations in Germany with OpenStreetMap. Based on the assumptions of LoRa communication range and considering our use case requirements, connecting farm communities seems theoretically feasible in many areas of our data set. To further analyze our idea, we ran simulations of two common DTN routing protocols with different scenarios. A proof-of-concept implementation allows smaller messages to be transmitted using real hardware and demonstrates that a decentralized communications infrastructure based on commodity hardware is possible.

    @inproceedings{kuntke_rural_2023,
    title = {Rural {Communication} in {Outage} {Scenarios}: {Disruption}-{Tolerant} {Networking} via {LoRaWAN} {Setups}},
    url = {https://idl.iscram.org/files/kuntke/2023/2581_Kuntke_etal2023.pdf},
    abstract = {Since communications infrastructure is subject to many impacts, e.g., destructive natural events, they can potentially collapse at any time. Especially in rural areas, the recovery of public network infrastructure can take some time, so a dedicated communication channel would be advantageous. We explore the possibility of transforming commodity LoRaWAN gateways into meshed network nodes for a digital emergency communication channel. In order to obtain the required parameters, we collected farm locations in Germany with OpenStreetMap. Based on the assumptions of LoRa communication range and considering our use case requirements, connecting farm communities seems theoretically feasible in many areas of our data set. To further analyze our idea, we ran simulations of two common DTN routing protocols with different scenarios. A proof-of-concept implementation allows smaller messages to be transmitted using real hardware and demonstrates that a decentralized communications infrastructure based on commodity hardware is possible.},
    booktitle = {Proceedings of {Information} {Systems} for {Crisis} {Response} and {Management} ({ISCRAM})},
    author = {Kuntke, Franz and Baumgärtner, Lars and Reuter, Christian},
    year = {2023},
    keywords = {Crisis, Security, RSF, Projekt-MAKI, Projekt-GeoBox, Projekt-emergenCITY, Projekt-AgriRegio},
    pages = {1--13},
    }

    2020

  • Jonas Höchst, Lars Baumgärtner, Franz Kuntke, Alvar Penning, Artur Sterz, Bernd Freisleben (2020)
    LoRa-based Device-to-Device Smartphone Communication for Crisis Scenarios
    Proceedings of Information Systems for Crisis Response and Management (ISCRAM) .
    [BibTeX] [Abstract] [Download PDF]

    In this paper, we present an approach to facilitate long-range device-to-device communication via smartphones in crisis scenarios. Through a custom firmware for low-cost LoRa capable micro-controller boards, called rf95modem, common devices for end users can be enabled to use LoRa through a Bluetooth, Wi-Fi, or serial connection. We present two applications utilizing the flexibility provided by the proposed firmware. First, we introduce a novel device-to-device LoRa chat application that works a) on the two major mobile platforms Android and iOS and b) on traditional computers like notebooks using a console-based interface. Second, we demonstrate how other infrastructure-less technology can benefit from our approach by integrating it into the DTN7 delay-tolerant networking software. The firmware, the device-to-device chat application, the integration into DTN7, as well as the experimental evaluation code fragments are available under permissive open-source licenses.

    @inproceedings{hochst_lora-based_2020,
    title = {{LoRa}-based {Device}-to-{Device} {Smartphone} {Communication} for {Crisis} {Scenarios}},
    url = {https://peasec.de/paper/2020/2020_Höchstetal_LoRaDeviceSmartphoneCommunicationCrisisScenarios.pdf},
    abstract = {In this paper, we present an approach to facilitate long-range device-to-device communication via smartphones in crisis scenarios. Through a custom firmware for low-cost LoRa capable micro-controller boards, called rf95modem, common devices for end users can be enabled to use LoRa through a Bluetooth, Wi-Fi, or serial connection. We present two applications utilizing the flexibility provided by the proposed firmware. First, we introduce a novel device-to-device LoRa chat application that works a) on the two major mobile platforms Android and iOS and b) on traditional computers like notebooks using a console-based interface. Second, we demonstrate how other infrastructure-less technology can benefit from our approach by integrating it into the DTN7 delay-tolerant networking software. The firmware, the device-to-device chat application, the integration into DTN7, as well as the experimental evaluation code fragments are available under permissive open-source licenses.},
    booktitle = {Proceedings of {Information} {Systems} for {Crisis} {Response} and {Management} ({ISCRAM})},
    author = {Höchst, Jonas and Baumgärtner, Lars and Kuntke, Franz and Penning, Alvar and Sterz, Artur and Freisleben, Bernd},
    year = {2020},
    keywords = {Crisis, Security, Projekt-MAKI, Projekt-GeoBox},
    pages = {996--1011},
    }

  • Jasmin Haunschild, Marc-André Kaufhold, Christian Reuter (2020)
    Sticking with Landlines? Citizens‘ and Police Social Media Use and Expectation During Emergencies
    Proceedings of the International Conference on Wirtschaftsinformatik (WI) (Best Paper Social Impact Award) Potsdam, Germany. doi:10.30844/wi_2020_o2-haunschild
    [BibTeX] [Abstract] [Download PDF]

    Crisis informatics has examined the use, potentials and weaknesses of social media in emergencies across different events (e.g., man-made, natural or hybrid), countries and heterogeneous participants (e.g., citizens or emergency services) for almost two decades. While most research analyzes specific cases, few studies have focused on citizens‘ perceptions of different social media platforms in emergencies using a representative sample. Basing our questionnaire on a workshop with police officers, we present the results of a representative study on citizens‘ perception of social media in emergencies that we conducted in Germany. Our study suggests that when it comes to emergencies, socio-demographic differences are largely insignificant and no clear preferences for emergency services‘ social media strategies exist. Due to the widespread searching behavior on some platforms, emergency services can reach a wide audience by turning to certain channels but should account for groups with distinct preferences.

    @inproceedings{haunschild_sticking_2020,
    address = {Potsdam, Germany},
    title = {Sticking with {Landlines}? {Citizens}' and {Police} {Social} {Media} {Use} and {Expectation} {During} {Emergencies}},
    url = {http://www.peasec.de/paper/2020/2020_HaunschildKaufholdReuter_SocialMediaPoliceSurvey_WI.pdf},
    doi = {10.30844/wi_2020_o2-haunschild},
    abstract = {Crisis informatics has examined the use, potentials and weaknesses of social media in emergencies across different events (e.g., man-made, natural or hybrid), countries and heterogeneous participants (e.g., citizens or emergency services) for almost two decades. While most research analyzes specific cases, few studies have focused on citizens' perceptions of different social media platforms in emergencies using a representative sample. Basing our questionnaire on a workshop with police officers, we present the results of a representative study on citizens' perception of social media in emergencies that we conducted in Germany. Our study suggests that when it comes to emergencies, socio-demographic differences are largely insignificant and no clear preferences for emergency services' social media strategies exist. Due to the widespread searching behavior on some platforms, emergency services can reach a wide audience by turning to certain channels but should account for groups with distinct preferences.},
    booktitle = {Proceedings of the {International} {Conference} on {Wirtschaftsinformatik} ({WI}) ({Best} {Paper} {Social} {Impact} {Award})},
    publisher = {AIS Electronic Library (AISel)},
    author = {Haunschild, Jasmin and Kaufhold, Marc-André and Reuter, Christian},
    year = {2020},
    keywords = {Crisis, Ranking-CORE-C, Ranking-VHB-C, Ranking-WKWI-A, Projekt-MAKI, Projekt-ATHENE-SecUrban, Projekt-emergenCITY},
    pages = {1--16},
    }

    2019

  • Sebastian Linsner, Franz Kuntke, Gina Maria Schmidbauer-Wolf, Christian Reuter (2019)
    Blockchain in der Landwirtschaft 4.0 – Empirische Studie zu Erwartungen von Landwirt_innen gegenüber dezentralen Services auf Basis von Distributed Ledger Technology
    Mensch und Computer – Tagungsband Hamburg, Germany. doi:10.1145/3340764.3340799
    [BibTeX] [Abstract] [Download PDF]

    Digitalization, which proceeds in all branches, as well in agriculture, by using new technology, sensors and networking, requires responsible usage of data. One possibility to manage data and use them to create value is the blockchain-technology. It is primary enforced by the food industries and consumers to ensure traceability and transparency. To put blockchain-technology into beneficial use in agriculture, this domain has to be analyzed regarding social and business aspects. This paper presents the results of a qualitative study where 41 actors from the agricultural do-main participated in focus groups and delivered a written statement. It was found that farmers are interested in adapting new markets and technologies early to get an economic advantage. On the other hand, the fear of losing traditional local business partners and the social surroundings of the farmers must be considered

    @inproceedings{linsner_blockchain_2019,
    address = {Hamburg, Germany},
    title = {Blockchain in der {Landwirtschaft} 4.0 - {Empirische} {Studie} zu {Erwartungen} von {Landwirt}\_innen gegenüber dezentralen {Services} auf {Basis} von {Distributed} {Ledger} {Technology}},
    url = {https://dl.acm.org/citation.cfm?id=3340799},
    doi = {10.1145/3340764.3340799},
    abstract = {Digitalization, which proceeds in all branches, as well in agriculture, by using new technology, sensors and networking, requires responsible usage of data. One possibility to manage data and use them to create value is the blockchain-technology. It is primary enforced by the food industries and consumers to ensure traceability and transparency. To put blockchain-technology into beneficial use in agriculture, this domain has to be analyzed regarding social and business aspects. This paper presents the results of a qualitative study where 41 actors from the agricultural do-main participated in focus groups and delivered a written statement. It was found that farmers are interested in adapting new markets and technologies early to get an economic advantage. On the other hand, the fear of losing traditional local business partners and the social surroundings of the farmers must be considered},
    booktitle = {Mensch und {Computer} - {Tagungsband}},
    publisher = {ACM},
    author = {Linsner, Sebastian and Kuntke, Franz and Schmidbauer-Wolf, Gina Maria and Reuter, Christian},
    editor = {Alt, Florian and Bulling, Andreas and Döring, Tanja},
    year = {2019},
    keywords = {Cooperation, HCI, Projekt-CRISP, Projekt-CROSSING, Projekt-MAKI, Projekt-GeoBox, Projekt-HyServ},
    pages = {103--113},
    }

  • Margarita Grinko, Marc-André Kaufhold, Christian Reuter (2019)
    Adoption, Use and Diffusion of Crisis Apps in Germany: A Representative Survey
    Mensch und Computer – Tagungsband Hamburg, Germany. doi:10.1145/3340764.3340782
    [BibTeX] [Abstract] [Download PDF]

    The research field of crisis informatics examines the potentials and limitations of information and communication technology in crises, disasters, and emergencies. Although ICT plays an increasingly large role in crisis response and management, in-depth studies on crisis apps and similar technology in the context of an emergency have been missing. Based on responses by 1024 participants in Germany, we examine the diffusion, usage, perception and adoption of mobile crisis apps as well as required functions and improvements. We conclude that crisis apps are still a little-known form of disaster ICT, but have potential for enhancing communication, keeping users up to date and providing a more effective crisis management as supplement to other media channels dependent on different underlying infrastructures. However, they should be adaptable to user characteristics, consider privacy, allow communication and offer valuable information to raise awareness of potential disasters without creating an overload. Also, the familiarity with and trust in crisis apps should be addressed to maximize their beneficial impact on crisis communication and management. We discuss further implications as well as directions for future research with larger target groups and specific usage scenarios.

    @inproceedings{grinko_adoption_2019,
    address = {Hamburg, Germany},
    title = {Adoption, {Use} and {Diffusion} of {Crisis} {Apps} in {Germany}: {A} {Representative} {Survey}},
    url = {https://dl.acm.org/citation.cfm?id=3340782},
    doi = {10.1145/3340764.3340782},
    abstract = {The research field of crisis informatics examines the potentials and limitations of information and communication technology in crises, disasters, and emergencies. Although ICT plays an increasingly large role in crisis response and management, in-depth studies on crisis apps and similar technology in the context of an emergency have been missing. Based on responses by 1024 participants in Germany, we examine the diffusion, usage, perception and adoption of mobile crisis apps as well as required functions and improvements. We conclude that crisis apps are still a little-known form of disaster ICT, but have potential for enhancing communication, keeping users up to date and providing a more effective crisis management as supplement to other media channels dependent on different underlying infrastructures. However, they should be adaptable to user characteristics, consider privacy, allow communication and offer valuable information to raise awareness of potential disasters without creating an overload. Also, the familiarity with and trust in crisis apps should be addressed to maximize their beneficial impact on crisis communication and management. We discuss further implications as well as directions for future research with larger target groups and specific usage scenarios.},
    booktitle = {Mensch und {Computer} - {Tagungsband}},
    publisher = {ACM},
    author = {Grinko, Margarita and Kaufhold, Marc-André and Reuter, Christian},
    editor = {Alt, Florian and Bulling, Andreas and Döring, Tanja},
    year = {2019},
    keywords = {Crisis, Student, UsableSec, Projekt-KontiKat, Projekt-MAKI},
    pages = {263--274},
    }

  • Christian Reuter (2019)
    Information Technology for Peace and Security – IT-Applications and Infrastructures in Conflicts, Crises, War, and Peace
    Wiesbaden, Germany: Springer Vieweg. doi:10.1007/978-3-658-25652-4
    [BibTeX] [Abstract] [Download PDF]

    Technological and scientific progress, especially the rapid development in information technology (IT), plays a crucial role regarding questions of peace and security. This textbook addresses the significance, potentials and challenges of IT for peace and securi-ty. For this purpose, the book offers an introduction to peace, conflict, and security research, thereby focusing on natural-science, technical and computer science perspec-tives. In the following, it sheds light on cyber conflicts, war and peace, cyber arms con-trol, cyber attribution and infrastructures as well as culture and interaction before an outlook is given.

    @book{reuter_information_2019-1,
    address = {Wiesbaden, Germany},
    title = {Information {Technology} for {Peace} and {Security} - {IT}-{Applications} and {Infrastructures} in {Conflicts}, {Crises}, {War}, and {Peace}},
    isbn = {978-3-658-25652-4},
    url = {https://www.springer.com/de/book/9783658256517},
    abstract = {Technological and scientific progress, especially the rapid development in information technology (IT), plays a crucial role regarding questions of peace and security. This textbook addresses the significance, potentials and challenges of IT for peace and securi-ty. For this purpose, the book offers an introduction to peace, conflict, and security research, thereby focusing on natural-science, technical and computer science perspec-tives. In the following, it sheds light on cyber conflicts, war and peace, cyber arms con-trol, cyber attribution and infrastructures as well as culture and interaction before an outlook is given.},
    publisher = {Springer Vieweg},
    author = {Reuter, Christian},
    year = {2019},
    doi = {10.1007/978-3-658-25652-4},
    keywords = {Crisis, Selected, Security, Peace, Infrastructure, Projekt-CRISP, Projekt-DualUse, RSF, Projekt-CROSSING, AuswahlPeace, Cyberwar, Projekt-MAKI},
    }

  • Timo Kalle, Marc-André Kaufhold, Franz Kuntke, Christian Reuter, Amr Rizk, Ralf Steinmetz (2019)
    Resilience in Security and Crises through Adaptions and Transitions
    INFORMATIK 2019: 50 Jahre Gesellschaft für Informatik – Informatik für Gesellschaft (Workshop-Beiträge), Lecture Notes in Informatics (LNI) Kassel, Germany. doi:10.18420/inf2019_ws60
    [BibTeX] [Abstract] [Download PDF]

    Currently, there is a tremendous number of communication technology and tems in use. Not only in the private user space, but also in business operations and societal areas, they are deeply involved: Ranging from messaging services or navigation over (critical) SCADA systems to whole digital cities and communities. Consequently, the view on communication networks in security and particularly crisis scenarios becomes inevitable. This paper examines the notions of resilience, adaption and transition within communication networks with a specific focus on crises. Based on a structured literature review, the fundamentals of resilience and communication networks are introduced. The paper then discusses the characteristics of (a) evolvability, accessibility, usability and diversity as well as (b) self-organization, -management, -optimization, – monitoring, -healing and -protection for communication network resilience. Finally, it outlines challenges and potentials of communication network resilience based in the use cases of security and crises.

    @inproceedings{kalle_resilience_2019,
    address = {Kassel, Germany},
    title = {Resilience in {Security} and {Crises} through {Adaptions} and {Transitions}},
    url = {https://dl.gi.de/bitstream/handle/20.500.12116/25097/paper12_02.pdf},
    doi = {10.18420/inf2019_ws60},
    abstract = {Currently, there is a tremendous number of communication technology and tems in use. Not only in the private user space, but also in business operations and societal areas, they are deeply involved: Ranging from messaging services or navigation over (critical) SCADA systems to whole digital cities and communities. Consequently, the view on communication networks in security and particularly crisis scenarios becomes inevitable. This paper examines the notions of resilience, adaption and transition within communication networks with a specific focus on crises. Based on a structured literature review, the fundamentals of resilience and communication networks are introduced. The paper then discusses the characteristics of (a) evolvability, accessibility, usability and diversity as well as (b) self-organization, -management, -optimization, - monitoring, -healing and -protection for communication network resilience. Finally, it outlines challenges and potentials of communication network resilience based in the use cases of security and crises.},
    booktitle = {{INFORMATIK} 2019: 50 {Jahre} {Gesellschaft} für {Informatik} – {Informatik} für {Gesellschaft} ({Workshop}-{Beiträge}), {Lecture} {Notes} in {Informatics} ({LNI})},
    publisher = {Gesellschaft für Informatik e. V.},
    author = {Kalle, Timo and Kaufhold, Marc-André and Kuntke, Franz and Reuter, Christian and Rizk, Amr and Steinmetz, Ralf},
    editor = {Draude, C. and Lange, M. and Sick, B.},
    year = {2019},
    keywords = {Crisis, HCI, Student, Ranking-CORE-C, Ranking-VHB-C, UsableSec, Security, Projekt-MAKI, Projekt-GeoBox},
    pages = {571--584},
    }

  • Marc-André Kaufhold, Margarita Grinko, Christian Reuter, Marén Schorch, Amanda Langer, Sascha Skudelny, Matthias Hollick (2019)
    Potentiale von IKT beim Ausfall kritischer Infrastrukturen: Erwartungen, Informationsgewinnung und Mediennutzung der Zivilbevölkerung in Deutschland
    Proceedings of the International Conference on Wirtschaftsinformatik (WI) Siegen, Germany.
    [BibTeX] [Abstract] [Download PDF]

    In der Sicherheits- und Krisenforschung stehen bislang primär Fragen der Vulne-rabilität, Stärkung von Resilienz und Erhaltung bzw. Wiederherstellung kritischer Infrastrukturen (KRITIS) im Mittelpunkt; zunehmend wird auch die Bedeutung von Sozialen Medien und Krisen-Apps erkannt. Inwiefern ist die Zivilbevölke-rung in Deutschland aber auf das Eintreten einer Krise tatsächlich vorbereitet? Welche Informations- und Kommunikationstechniken (IKT) werden im Alltag und bei einem potentiellen Infrastrukturausfall genutzt? Unser Beitrag stellt die Ergebnisse einer repräsentativen Umfrage mit 1024 Teilnehmern in Deutschland vor, die belegen, dass Gefahrenbewusstsein, Vorbereitung, effektives Krisenma-nagement und Verbreitung von Krisen-Apps in Deutschland noch relativ gering sind, während traditionelle Kommunikations- und Informationskanäle sowie in-formelle Informationsnetzwerke bevorzugt werden. Die Ergebnisse stellen wei-terhin die beträchtlichen Unterstützungspotentiale von IKT in derartigen Krisensi-tuationen heraus, die zur Erhöhung des Risikobewusstseins, der Erleichterung des Informationstransfers und der Verbesserung der Kommunikation zwischen Zivilbevölkerung, KRITIS-Betreibern und Behörden und Organisationen mit Si-cherheitsaufgaben (BOS) entscheidend beitragen können.

    @inproceedings{kaufhold_potentiale_2019,
    address = {Siegen, Germany},
    title = {Potentiale von {IKT} beim {Ausfall} kritischer {Infrastrukturen}: {Erwartungen}, {Informationsgewinnung} und {Mediennutzung} der {Zivilbevölkerung} in {Deutschland}},
    url = {http://www.peasec.de/paper/2019/2019_KaufholdGrinkoReuterSchorschLangerSkudelnyHollick_InfrastrukturAusfall_WI.pdf},
    abstract = {In der Sicherheits- und Krisenforschung stehen bislang primär Fragen der Vulne-rabilität, Stärkung von Resilienz und Erhaltung bzw. Wiederherstellung kritischer Infrastrukturen (KRITIS) im Mittelpunkt; zunehmend wird auch die Bedeutung von Sozialen Medien und Krisen-Apps erkannt. Inwiefern ist die Zivilbevölke-rung in Deutschland aber auf das Eintreten einer Krise tatsächlich vorbereitet? Welche Informations- und Kommunikationstechniken (IKT) werden im Alltag und bei einem potentiellen Infrastrukturausfall genutzt? Unser Beitrag stellt die Ergebnisse einer repräsentativen Umfrage mit 1024 Teilnehmern in Deutschland vor, die belegen, dass Gefahrenbewusstsein, Vorbereitung, effektives Krisenma-nagement und Verbreitung von Krisen-Apps in Deutschland noch relativ gering sind, während traditionelle Kommunikations- und Informationskanäle sowie in-formelle Informationsnetzwerke bevorzugt werden. Die Ergebnisse stellen wei-terhin die beträchtlichen Unterstützungspotentiale von IKT in derartigen Krisensi-tuationen heraus, die zur Erhöhung des Risikobewusstseins, der Erleichterung des Informationstransfers und der Verbesserung der Kommunikation zwischen Zivilbevölkerung, KRITIS-Betreibern und Behörden und Organisationen mit Si-cherheitsaufgaben (BOS) entscheidend beitragen können.},
    booktitle = {Proceedings of the {International} {Conference} on {Wirtschaftsinformatik} ({WI})},
    publisher = {AIS},
    author = {Kaufhold, Marc-André and Grinko, Margarita and Reuter, Christian and Schorch, Marén and Langer, Amanda and Skudelny, Sascha and Hollick, Matthias},
    year = {2019},
    keywords = {Crisis, HCI, SocialMedia, Ranking-CORE-C, Ranking-VHB-C, Ranking-WKWI-A, Projekt-KontiKat, Infrastructure, RSF, Projekt-MAKI, Projekt-GeoBox, Projekt-HyServ},
    pages = {1054--1068},
    }

    2018

  • Marc-André Kaufhold, Thea Riebe, Christian Reuter, Julian Hester, Danny Jeske, Lisa Knüver, Viktoria Richert (2018)
    Business Continuity Management in Micro Enterprises: Perception, Strategies and Use of ICT
    International Journal of Information Systems for Crisis Response and Management (IJISCRAM) ;10(1):1–19. doi:10.4018/IJISCRAM.2018010101
    [BibTeX] [Abstract] [Download PDF]

    Small and medium-sized enterprises (SMEs) represent 99\% of enterprises in Germany and more than 95\% in the European Union. Given the recent increase of natural disasters and man-made crises and emergencies, it seems an important economic goal to ascertain that SMEs are capable of maintaining their work, revenue and profit at an acceptable level. According to ISO 22301, business continuity management (BCM) is a holistic management process which identifies potential threats and their impact to an organization and serves as a framework to increase organizational resilience and response capabilities. Prior research identified that BCM is under-represented in SMEs and that their security level is partially in an uneconomical range. This article presents the analysis of interviews with 19 independent micro enterprises highlighting findings on their low crisis awareness, varying technical dependency, existing action strategies and communication strategies and proposing a categorization of micro enterprises as preventive technicians, data-intensive chains or pragmatic jumpers.

    @article{kaufhold_business_2018,
    title = {Business {Continuity} {Management} in {Micro} {Enterprises}: {Perception}, {Strategies} and {Use} of {ICT}},
    volume = {10},
    url = {http://www.peasec.de/paper/2018/2018_KaufholdRiebeReuteretal_BusinessContinuityManagementinMicroEnterprises_IJISCRAM.pdf},
    doi = {10.4018/IJISCRAM.2018010101},
    abstract = {Small and medium-sized enterprises (SMEs) represent 99\% of enterprises in Germany and more than 95\% in the European Union. Given the recent increase of natural disasters and man-made crises and emergencies, it seems an important economic goal to ascertain that SMEs are capable of maintaining their work, revenue and profit at an acceptable level. According to ISO 22301, business continuity management (BCM) is a holistic management process which identifies potential threats and their impact to an organization and serves as a framework to increase organizational resilience and response capabilities. Prior research identified that BCM is under-represented in SMEs and that their security level is partially in an uneconomical range. This article presents the analysis of interviews with 19 independent micro enterprises highlighting findings on their low crisis awareness, varying technical dependency, existing action strategies and communication strategies and proposing a categorization of micro enterprises as preventive technicians, data-intensive chains or pragmatic jumpers.},
    number = {1},
    journal = {International Journal of Information Systems for Crisis Response and Management (IJISCRAM)},
    author = {Kaufhold, Marc-André and Riebe, Thea and Reuter, Christian and Hester, Julian and Jeske, Danny and Knüver, Lisa and Richert, Viktoria},
    year = {2018},
    keywords = {Cooperation, Crisis, Student, Security, Projekt-KontiKat, Infrastructure, RSF, Projekt-MAKI},
    pages = {1--19},
    }

  • Christian Reuter, Wolfgang Schneider, Daniel Eberz, Markus Bayer, Daniel Hartung, Cemal Kaygusuz (2018)
    Resiliente Digitalisierung der kritischen Infrastruktur Landwirtschaft – mobil, dezentral, ausfallsicher
    Mensch und Computer – Workshopband Dresden, Germany.
    [BibTeX] [Abstract] [Download PDF]

    Diese Arbeit befasst sich mit der zunehmenden Digitalisierung der kritischen Infrastruktur Ernährungswirtschaft und setzt den Fokus insbesondere auf die dadurch resultierenden in-formationstechnologischen Folgen bezüglich der Angriffs- und Ausfallsicherheit in der Landwirtschaft und von ihr abhängigen Sektoren. In diesem Kontext wird die Modernisie-rungen der Landmaschinen und deren Vernetzung sowie das Cloud-Computing in der Landwirtschaft analysiert und zu treffende Maßnahmen bezüglich einer resilienten Struktur erläutert. In vielen Bereichen wird dabei aufgezeigt, dass das Ausfallrisiko der Produktion zugunsten von Vorteilen wie Ertrags- und Qualitätssteigerung vernachlässigt wird.

    @inproceedings{reuter_resiliente_2018,
    address = {Dresden, Germany},
    title = {Resiliente {Digitalisierung} der kritischen {Infrastruktur} {Landwirtschaft} - mobil, dezentral, ausfallsicher},
    url = {https://dl.gi.de/bitstream/handle/20.500.12116/16930/Beitrag_330_final__a.pdf},
    abstract = {Diese Arbeit befasst sich mit der zunehmenden Digitalisierung der kritischen Infrastruktur Ernährungswirtschaft und setzt den Fokus insbesondere auf die dadurch resultierenden in-formationstechnologischen Folgen bezüglich der Angriffs- und Ausfallsicherheit in der Landwirtschaft und von ihr abhängigen Sektoren. In diesem Kontext wird die Modernisie-rungen der Landmaschinen und deren Vernetzung sowie das Cloud-Computing in der Landwirtschaft analysiert und zu treffende Maßnahmen bezüglich einer resilienten Struktur erläutert. In vielen Bereichen wird dabei aufgezeigt, dass das Ausfallrisiko der Produktion zugunsten von Vorteilen wie Ertrags- und Qualitätssteigerung vernachlässigt wird.},
    booktitle = {Mensch und {Computer} - {Workshopband}},
    publisher = {Gesellschaft für Informatik e.V.},
    author = {Reuter, Christian and Schneider, Wolfgang and Eberz, Daniel and Bayer, Markus and Hartung, Daniel and Kaygusuz, Cemal},
    editor = {Dachselt, Raimund and Weber, Gerhard},
    year = {2018},
    keywords = {Crisis, Student, Projekt-KontiKat, Infrastructure, RSF, Projekt-MAKI, Projekt-GeoBox, Projekt-HyServ},
    pages = {623--632},
    }

    CRISP: Center for Research in Security and Privacy (2017-2018, BMBF+HMWK) – in ATHENE aufgegangen

    CRISP – Center for Research in Security and Privacy (1.10.2017-31.12.2018, BMBF+HMWK) – in ATHENE überführt

    Die bisher vom Bund (EC SPRIDE) und dem Land Hessen (CASED) finanzierten IT-Sicherheits-Forschungszentren bündeln ihre Kräfte als „Nationales Forschungszentrum für angewandte Cybersicherheit“, kurz CRISP.

    Mit dem Kernthema „Security at Large“ steht die Erforschung von Sicherheit für große Systeme, von den Komponenten bis zu ihrem Zusammenspiel in umfassenden Si­cher­heits­lö­sun­gen, im Fokus der For­schungs­aktivitäten. Die beiden For­schungs­feld­er „Sichere Internet-Infrastrukturen“ und „Sichere Web-Anwendungen“ nehmen dabei als Leucht­turm­projekte einen herausgehobenen Stellenwert ein.

    Mitglieder von CRISP sind die TU Darmstadt mit ihrem Profilbereich für IT-Sicher­heits­forschung CYSEC, die Hochschule Darmstadt sowie das Fraunhofer-Institut für Sichere Informations­technologie SIT und das Fraunhofer-Institut für Graphische Da­ten­verarbeitung IGD, die beide in Darmstadt ihren Sitz haben. Diese Part­ner­schaft weist die europaweit größte Allianz von For­schungs­ein­rich­tun­gen im Bereich Cyber­sicher­heit auf.

    2021

  • Christian Reuter, Marc-André Kaufhold (2021)
    Usable Safety Engineering sicherheitskritischer interaktiver Systeme
    In: Christian Reuter: Sicherheitskritische Mensch-Computer-Interaktion: Interaktive Technologien und Soziale Medien im Krisen- und Sicherheitsmanagement. Wiesbaden, Germany: Springer Vieweg, , 23–45. doi:10.1007/978-3-658-32795-8_2
    [BibTeX] [Abstract] [Download PDF]

    Die Gestaltung gebrauchstauglicher, interaktiver und kooperativer Systeme wird bereits seit den 1980er Jahren in der Disziplin Mensch-Computer-Interaktion (MCI) und Com-puterunterstützte Gruppenarbeit (CSCW) behandelt. Es gibt jedoch einige Besonderhei-ten der MCI im Kontext sicherheitskritischer Systeme, insbesondere der störungsfreien Nutzung von IT (Safety) zu beachten. Dieses Kapitel stellt die wichtigsten Merkmale der Anwendung von Gestaltungsmethoden der MCI in sicherheitskritischen Systemen dar. Hierfür werden zu Beginn die Grundlagen der beiden Gebiete – der MCI sowie des Kri-sen- und Sicherheitsmanagements – erläutert. Darauf aufbauend werden Ansätze und Methoden der Analyse, des Designs und der Entwicklung sowie der Evaluation der MCI unter besonderer Berücksichtigung sicherheitskritischer Systeme diskutiert. Aspekte wie Risikoanalysen in der Anforderungsanalyse, die Einkalkulierung von Bedienfehlern und Rückfallebenen im Systemdesign gehören ebenso dazu wie besondere Herausforderun-gen bei Evaluationen.

    @incollection{reuter_usable_2021,
    address = {Wiesbaden, Germany},
    title = {Usable {Safety} {Engineering} sicherheitskritischer interaktiver {Systeme}},
    isbn = {978-3-658-32795-8},
    url = {https://link.springer.com/chapter/10.1007/978-3-658-32795-8_2},
    abstract = {Die Gestaltung gebrauchstauglicher, interaktiver und kooperativer Systeme wird bereits seit den 1980er Jahren in der Disziplin Mensch-Computer-Interaktion (MCI) und Com-puterunterstützte Gruppenarbeit (CSCW) behandelt. Es gibt jedoch einige Besonderhei-ten der MCI im Kontext sicherheitskritischer Systeme, insbesondere der störungsfreien Nutzung von IT (Safety) zu beachten. Dieses Kapitel stellt die wichtigsten Merkmale der Anwendung von Gestaltungsmethoden der MCI in sicherheitskritischen Systemen dar. Hierfür werden zu Beginn die Grundlagen der beiden Gebiete – der MCI sowie des Kri-sen- und Sicherheitsmanagements – erläutert. Darauf aufbauend werden Ansätze und Methoden der Analyse, des Designs und der Entwicklung sowie der Evaluation der MCI unter besonderer Berücksichtigung sicherheitskritischer Systeme diskutiert. Aspekte wie Risikoanalysen in der Anforderungsanalyse, die Einkalkulierung von Bedienfehlern und Rückfallebenen im Systemdesign gehören ebenso dazu wie besondere Herausforderun-gen bei Evaluationen.},
    booktitle = {Sicherheitskritische {Mensch}-{Computer}-{Interaktion}: {Interaktive} {Technologien} und {Soziale} {Medien} im {Krisen}- und {Sicherheitsmanagement}},
    publisher = {Springer Vieweg},
    author = {Reuter, Christian and Kaufhold, Marc-André},
    editor = {Reuter, Christian},
    year = {2021},
    doi = {10.1007/978-3-658-32795-8_2},
    keywords = {HCI, UsableSec, Security, Projekt-KontiKat, Projekt-CRISP},
    pages = {23--45},
    }

    2019

  • Christian Reuter, Konstantin Aal, Larissa Aldehoff, Jürgen Altmann, Johannes Buchmann, Ute Bernhardt, Kai Denker, Dominik Herrmann, Matthias Hollick, Stefan Katzenbeisser, Marc-André Kaufhold, Alfred Nordmann, Thomas Reinhold, Thea Riebe, Annette Ripper, Ingo Ruhmann, Klaus-Peter Saalbach, Niklas Schörnig, Ali Sunyaev, Volker Wulf (2019)
    The Future of IT in Peace and Security
    In: Christian Reuter: Information Technology for Peace and Security – IT-Applications and Infrastructures in Conflicts, Crises, War, and Peace. Wiesbaden, Germany: Springer Vieweg, , 405–413. doi:10.1007/978-3-658-25652-4_19
    [BibTeX] [Abstract] [Download PDF]

    Not only today, but also in the future information technology and the advances in the field of computer science will have a high relevance for peace and security. Naturally, a textbook like this can only cover a selective part of research and a certain point in time. Nonetheless, it can be attempted to identify trends, challenges and venture an outlook into the future. That is exactly what we want to achieve in this chapter: To predict fu-ture developments and try to classify them correctly. These considerations were made both by the editor and the authors involved alike. Therefore, an outlook based on fun-damentals, cyber conflicts and war, cyber peace, cyber arms control, infrastructures as well as social interaction is given.

    @incollection{reuter_future_2019,
    address = {Wiesbaden, Germany},
    title = {The {Future} of {IT} in {Peace} and {Security}},
    isbn = {978-3-658-25652-4},
    url = {https://www.springer.com/de/book/9783658256517},
    abstract = {Not only today, but also in the future information technology and the advances in the field of computer science will have a high relevance for peace and security. Naturally, a textbook like this can only cover a selective part of research and a certain point in time. Nonetheless, it can be attempted to identify trends, challenges and venture an outlook into the future. That is exactly what we want to achieve in this chapter: To predict fu-ture developments and try to classify them correctly. These considerations were made both by the editor and the authors involved alike. Therefore, an outlook based on fun-damentals, cyber conflicts and war, cyber peace, cyber arms control, infrastructures as well as social interaction is given.},
    booktitle = {Information {Technology} for {Peace} and {Security} - {IT}-{Applications} and {Infrastructures} in {Conflicts}, {Crises}, {War}, and {Peace}},
    publisher = {Springer Vieweg},
    author = {Reuter, Christian and Aal, Konstantin and Aldehoff, Larissa and Altmann, Jürgen and Buchmann, Johannes and Bernhardt, Ute and Denker, Kai and Herrmann, Dominik and Hollick, Matthias and Katzenbeisser, Stefan and Kaufhold, Marc-André and Nordmann, Alfred and Reinhold, Thomas and Riebe, Thea and Ripper, Annette and Ruhmann, Ingo and Saalbach, Klaus-Peter and Schörnig, Niklas and Sunyaev, Ali and Wulf, Volker},
    editor = {Reuter, Christian},
    year = {2019},
    doi = {10.1007/978-3-658-25652-4_19},
    keywords = {HCI, UsableSec, Security, Peace, Projekt-CRISP, Projekt-CROSSING},
    pages = {405--413},
    }

  • Gina Maria Schmidbauer-Wolf, Franziska Herbert, Christian Reuter (2019)
    Responsible Data Usage in Smart Cities: Privacy in Everyday Life vs. Reacting to Emergency Situations
    SCIENCE PEACE SECURITY ’19 – Proceedings of the Interdisciplinary Conference on Technical Peace and Security Research Darmstadt, Germany.
    [BibTeX] [Abstract] [Download PDF]

    Smart cities want to provide a better life to their citizens, e.g. regarding health care, infrastruc- ture, better safety and security. This can be achieved by using more and new technology and by interconnecting and analysing new and existent devices. Thus, public spaces and buildings will be equipped with more interconnected input and output modalities. This ongoing technolo- gization of public spaces creates opportunities for making everyone’s life more secure, while at the same time everyone’s personal privacy is endangered. So how is this balancing act tackled and dealt with right now? What fears do citizens have regarding their security as well as their privacy? This paper provides first insights into the topic privacy in smart cities regarding that smart cities need data which can be provided by and of people. The paper raises the question if collecting people’s data, and thus enabling smart cities, is ethical and if not, how it can be assured to be ethical.

    @inproceedings{schmidbauer-wolf_responsible_2019,
    address = {Darmstadt, Germany},
    title = {Responsible {Data} {Usage} in {Smart} {Cities}: {Privacy} in {Everyday} {Life} vs. {Reacting} to {Emergency} {Situations}},
    url = {https://tuprints.ulb.tu-darmstadt.de/id/eprint/9164},
    abstract = {Smart cities want to provide a better life to their citizens, e.g. regarding health care, infrastruc- ture, better safety and security. This can be achieved by using more and new technology and by interconnecting and analysing new and existent devices. Thus, public spaces and buildings will be equipped with more interconnected input and output modalities. This ongoing technolo- gization of public spaces creates opportunities for making everyone's life more secure, while at the same time everyone's personal privacy is endangered. So how is this balancing act tackled and dealt with right now? What fears do citizens have regarding their security as well as their privacy? This paper provides first insights into the topic privacy in smart cities regarding that smart cities need data which can be provided by and of people. The paper raises the question if collecting people's data, and thus enabling smart cities, is ethical and if not, how it can be assured to be ethical.},
    booktitle = {{SCIENCE} {PEACE} {SECURITY} '19 - {Proceedings} of the {Interdisciplinary} {Conference} on {Technical} {Peace} and {Security} {Research}},
    publisher = {TUprints},
    author = {Schmidbauer-Wolf, Gina Maria and Herbert, Franziska and Reuter, Christian},
    editor = {Reuter, Christian and Altmann, Jürgen and Göttsche, Malte and Himmel, Mirko},
    year = {2019},
    keywords = {HCI, UsableSec, Security, Projekt-CRISP, Projekt-ATHENE-FANCY},
    pages = {70--74},
    }

  • Thea Riebe, Christian Reuter (2019)
    Dual Use and Dilemmas for Cybersecurity, Peace and Technology Assessment
    In: Christian Reuter: Information Technology for Peace and Security – IT-Applications and Infrastructures in Conflicts, Crises, War, and Peace. Wiesbaden, Germany: Springer Vieweg, , 165–184. doi:10.1007/978-3-658-25652-4_8
    [BibTeX] [Abstract] [Download PDF]

    Dual-use in information technology is a pressing issue: how can we prevent, control or manage the risk of a harmful application of IT? How can dual-use awareness and regu-lation help to mitigate the risks to peace and security on the national and international level? As the cyberspace has been declared a military domain, IT is of increasing im-portance for civil and military infrastructures. How can researchers, developers and decision makers make sure that IT is not misused to cause harm? For nuclear, biological and chemical technologies this has been discussed as the dual-use problem. This chapter illustrates the approaches towards different dual-use concepts, how to conduct a tech-nology assessment and provides insight into the implementation of dual-use assessment guidelines at TU Darmstadt, the so-called Civil Clause.

    @incollection{riebe_dual_2019,
    address = {Wiesbaden, Germany},
    title = {Dual {Use} and {Dilemmas} for {Cybersecurity}, {Peace} and {Technology} {Assessment}},
    isbn = {978-3-658-25652-4},
    url = {https://link.springer.com/chapter/10.1007/978-3-658-25652-4_8},
    abstract = {Dual-use in information technology is a pressing issue: how can we prevent, control or manage the risk of a harmful application of IT? How can dual-use awareness and regu-lation help to mitigate the risks to peace and security on the national and international level? As the cyberspace has been declared a military domain, IT is of increasing im-portance for civil and military infrastructures. How can researchers, developers and decision makers make sure that IT is not misused to cause harm? For nuclear, biological and chemical technologies this has been discussed as the dual-use problem. This chapter illustrates the approaches towards different dual-use concepts, how to conduct a tech-nology assessment and provides insight into the implementation of dual-use assessment guidelines at TU Darmstadt, the so-called Civil Clause.},
    booktitle = {Information {Technology} for {Peace} and {Security} - {IT}-{Applications} and {Infrastructures} in {Conflicts}, {Crises}, {War}, and {Peace}},
    publisher = {Springer Vieweg},
    author = {Riebe, Thea and Reuter, Christian},
    editor = {Reuter, Christian},
    year = {2019},
    doi = {10.1007/978-3-658-25652-4_8},
    keywords = {Projekt-KontiKat, Peace, Projekt-CRISP, Projekt-DualUse},
    pages = {165--184},
    }

  • Christian Reuter, Larissa Aldehoff, Thea Riebe, Marc-André Kaufhold (2019)
    IT in Peace, Conflict, and Security Research
    In: Christian Reuter: Information Technology for Peace and Security – IT-Applications and Infrastructures in Conflicts, Crises, War, and Peace. Wiesbaden, Germany: Springer Vieweg, , 11–37. doi:10.1007/978-3-658-25652-4_2
    [BibTeX] [Abstract] [Download PDF]

    Advances in science and technology play a crucial role in the context of peace, conflict and security. As information technology (IT) is becoming omnipresent, this includes both the resilience of IT infrastructures e.g. as a target in cases of conflict and the role of IT applications to prevent and manage conflicts, crises and disasters. This chapter is an introduction to IT and its role in war and peace, in conflicts and crises as well as in safety and security. Based on those connections a new field of research has emerged: IT peace research. It is introduced in this chapter which provides an overview of the inter-disciplinary concepts of peace, conflict and security. In addition, the research disciplines computer science and peace and conflict studies as the basis of IT peace research are explained. Moreover, the chapter focuses on the specific research topics of IT peace research and presents the institutionalised research landscape in Germany.

    @incollection{reuter_it_2019,
    address = {Wiesbaden, Germany},
    title = {{IT} in {Peace}, {Conflict}, and {Security} {Research}},
    isbn = {978-3-658-25652-4},
    url = {https://www.springer.com/de/book/9783658256517},
    abstract = {Advances in science and technology play a crucial role in the context of peace, conflict and security. As information technology (IT) is becoming omnipresent, this includes both the resilience of IT infrastructures e.g. as a target in cases of conflict and the role of IT applications to prevent and manage conflicts, crises and disasters. This chapter is an introduction to IT and its role in war and peace, in conflicts and crises as well as in safety and security. Based on those connections a new field of research has emerged: IT peace research. It is introduced in this chapter which provides an overview of the inter-disciplinary concepts of peace, conflict and security. In addition, the research disciplines computer science and peace and conflict studies as the basis of IT peace research are explained. Moreover, the chapter focuses on the specific research topics of IT peace research and presents the institutionalised research landscape in Germany.},
    booktitle = {Information {Technology} for {Peace} and {Security} - {IT}-{Applications} and {Infrastructures} in {Conflicts}, {Crises}, {War}, and {Peace}},
    publisher = {Springer Vieweg},
    author = {Reuter, Christian and Aldehoff, Larissa and Riebe, Thea and Kaufhold, Marc-André},
    editor = {Reuter, Christian},
    year = {2019},
    doi = {10.1007/978-3-658-25652-4_2},
    keywords = {HCI, Security, Peace, Infrastructure, Projekt-CRISP},
    pages = {11--37},
    }

  • Christian Reuter (2019)
    Information Technology for Peace and Security – Introduction and Overview
    In: Christian Reuter: Information Technology for Peace and Security – IT-Applications and Infrastructures in Conflicts, Crises, War, and Peace. Wiesbaden, Germany: Springer Vieweg, , 3–9. doi:10.1007/978-3-658-25652-4_1
    [BibTeX] [Abstract] [Download PDF]

    Technological and scientific progress, especially the rapid development in information technology (IT), plays a crucial role regarding questions of peace and security. This textbook addresses the significance, potentials and challenges of IT for peace and securi-ty. For this purpose, the book offers an introduction to peace, conflict, and security research, thereby focusing on natural science, technical and computer science perspec-tives. In the following, it sheds light on fundamentals (e.g. IT in peace, conflict and security, natural-science/technical peace research), cyber conflicts and war (e.g. infor-mation warfare, cyber espionage, cyber defence, Darknet), cyber peace (e.g. dual-use, technology assessment, confidence and security building measures), cyber arms control (e.g. arms control in the cyberspace, unmanned systems, verification), cyber attribution and infrastructures (e.g. attribution of cyber attacks, resilient infrastructures, secure critical information infrastructures), culture and interaction (e.g. safety and security, cultural violence, social media), before an outlook is given. This chapter provides an overview of all chapters in this book.

    @incollection{reuter_information_2019,
    address = {Wiesbaden, Germany},
    title = {Information {Technology} for {Peace} and {Security} - {Introduction} and {Overview}},
    isbn = {978-3-658-25652-4},
    url = {https://www.springer.com/de/book/9783658256517},
    abstract = {Technological and scientific progress, especially the rapid development in information technology (IT), plays a crucial role regarding questions of peace and security. This textbook addresses the significance, potentials and challenges of IT for peace and securi-ty. For this purpose, the book offers an introduction to peace, conflict, and security research, thereby focusing on natural science, technical and computer science perspec-tives. In the following, it sheds light on fundamentals (e.g. IT in peace, conflict and security, natural-science/technical peace research), cyber conflicts and war (e.g. infor-mation warfare, cyber espionage, cyber defence, Darknet), cyber peace (e.g. dual-use, technology assessment, confidence and security building measures), cyber arms control (e.g. arms control in the cyberspace, unmanned systems, verification), cyber attribution and infrastructures (e.g. attribution of cyber attacks, resilient infrastructures, secure critical information infrastructures), culture and interaction (e.g. safety and security, cultural violence, social media), before an outlook is given. This chapter provides an overview of all chapters in this book.},
    booktitle = {Information {Technology} for {Peace} and {Security} - {IT}-{Applications} and {Infrastructures} in {Conflicts}, {Crises}, {War}, and {Peace}},
    publisher = {Springer Vieweg},
    author = {Reuter, Christian},
    editor = {Reuter, Christian},
    year = {2019},
    doi = {10.1007/978-3-658-25652-4_1},
    keywords = {Crisis, Security, Peace, Projekt-CRISP, Projekt-CROSSING},
    pages = {3--9},
    }

  • Thomas Reinhold, Christian Reuter (2019)
    Verification in Cyberspace
    In: Christian Reuter: Information Technology for Peace and Security – IT-Applications and Infrastructures in Conflicts, Crises, War, and Peace. Wiesbaden, Germany: Springer Vieweg, , 257–276. doi:10.1007/978-3-658-25652-4_12
    [BibTeX] [Abstract] [Download PDF]

    Verification is one of the pillars of arms control and non-proliferation treaties as well as an important part of confidence building measures. It defines practical measures that enable treaty members to check the treaty compliance by observing, counting or moni-toring specific actions and their accordance with the respective rules. In contrast to his-torical examples of former military technologies, cyberspace features some unique char-acteristics making it hard to apply established measures. The chapter describes these peculiarities and assesses distinguishing problems compared to selected verification measures for nuclear, biological and chemicals weapons technology. Yet, cyberspace is a human-made domain and adjusting its technical setting, rules and principles may help to reduce the threat of ongoing militarisation. Offering some alternatives, the chapter elaborates on suitable and measurable parameters for this domain and presents potential-ly useful verification approaches.

    @incollection{reinhold_verification_2019,
    address = {Wiesbaden, Germany},
    title = {Verification in {Cyberspace}},
    isbn = {978-3-658-25652-4},
    url = {https://www.springer.com/de/book/9783658256517},
    abstract = {Verification is one of the pillars of arms control and non-proliferation treaties as well as an important part of confidence building measures. It defines practical measures that enable treaty members to check the treaty compliance by observing, counting or moni-toring specific actions and their accordance with the respective rules. In contrast to his-torical examples of former military technologies, cyberspace features some unique char-acteristics making it hard to apply established measures. The chapter describes these peculiarities and assesses distinguishing problems compared to selected verification measures for nuclear, biological and chemicals weapons technology. Yet, cyberspace is a human-made domain and adjusting its technical setting, rules and principles may help to reduce the threat of ongoing militarisation. Offering some alternatives, the chapter elaborates on suitable and measurable parameters for this domain and presents potential-ly useful verification approaches.},
    booktitle = {Information {Technology} for {Peace} and {Security} - {IT}-{Applications} and {Infrastructures} in {Conflicts}, {Crises}, {War}, and {Peace}},
    publisher = {Springer Vieweg},
    author = {Reinhold, Thomas and Reuter, Christian},
    editor = {Reuter, Christian},
    year = {2019},
    doi = {10.1007/978-3-658-25652-4_12},
    keywords = {Security, Peace, Projekt-CRISP},
    pages = {257--276},
    }

  • Sebastian Linsner, Franz Kuntke, Gina Maria Schmidbauer-Wolf, Christian Reuter (2019)
    Blockchain in der Landwirtschaft 4.0 – Empirische Studie zu Erwartungen von Landwirt_innen gegenüber dezentralen Services auf Basis von Distributed Ledger Technology
    Mensch und Computer – Tagungsband Hamburg, Germany. doi:10.1145/3340764.3340799
    [BibTeX] [Abstract] [Download PDF]

    Digitalization, which proceeds in all branches, as well in agriculture, by using new technology, sensors and networking, requires responsible usage of data. One possibility to manage data and use them to create value is the blockchain-technology. It is primary enforced by the food industries and consumers to ensure traceability and transparency. To put blockchain-technology into beneficial use in agriculture, this domain has to be analyzed regarding social and business aspects. This paper presents the results of a qualitative study where 41 actors from the agricultural do-main participated in focus groups and delivered a written statement. It was found that farmers are interested in adapting new markets and technologies early to get an economic advantage. On the other hand, the fear of losing traditional local business partners and the social surroundings of the farmers must be considered

    @inproceedings{linsner_blockchain_2019,
    address = {Hamburg, Germany},
    title = {Blockchain in der {Landwirtschaft} 4.0 - {Empirische} {Studie} zu {Erwartungen} von {Landwirt}\_innen gegenüber dezentralen {Services} auf {Basis} von {Distributed} {Ledger} {Technology}},
    url = {https://dl.acm.org/citation.cfm?id=3340799},
    doi = {10.1145/3340764.3340799},
    abstract = {Digitalization, which proceeds in all branches, as well in agriculture, by using new technology, sensors and networking, requires responsible usage of data. One possibility to manage data and use them to create value is the blockchain-technology. It is primary enforced by the food industries and consumers to ensure traceability and transparency. To put blockchain-technology into beneficial use in agriculture, this domain has to be analyzed regarding social and business aspects. This paper presents the results of a qualitative study where 41 actors from the agricultural do-main participated in focus groups and delivered a written statement. It was found that farmers are interested in adapting new markets and technologies early to get an economic advantage. On the other hand, the fear of losing traditional local business partners and the social surroundings of the farmers must be considered},
    booktitle = {Mensch und {Computer} - {Tagungsband}},
    publisher = {ACM},
    author = {Linsner, Sebastian and Kuntke, Franz and Schmidbauer-Wolf, Gina Maria and Reuter, Christian},
    editor = {Alt, Florian and Bulling, Andreas and Döring, Tanja},
    year = {2019},
    keywords = {Cooperation, HCI, Projekt-CRISP, Projekt-CROSSING, Projekt-MAKI, Projekt-GeoBox, Projekt-HyServ},
    pages = {103--113},
    }

  • Christian Reuter, Katja Häusser, Mona Bien, Franziska Herbert (2019)
    Between Effort and Security: User Assessment of the Adequacy of Security Mechanisms for App Categories
    Mensch und Computer – Tagungsband Hamburg, Germany. doi:10.1145/3340764.3340770
    [BibTeX] [Abstract] [Download PDF]

    With the increasing popularity of the smartphone, the number of people using it for financial transactions such as online shopping, online banking or mobile payment is also growing. Apps used in these contexts store sensitive and valuable data, creating a need for security measures. It has not yet been researched to what extent certain authentication mechanisms, which can be information-, biometric- as well as token-based, are suitable for individual apps and the respective data. The goal of this work is to assess how perceived security and estimated effort of using such mechanisms, as well as the degree to which app data is considered worth protecting, influence users‘ choices of appropriate measures to protect app categories. Therefore, we conducted a representative study (n=1024). On the one hand, our results show that a positive correlation between perceived security and effort exists for all investigated non-biometric authentication methods. On the other hand, the study sheds light on the differences between the investigated app categories and the users‘ choice of the appropriate security mechanisms for the particular category. In contrast to perceived security having a positive influence on a user’s preference of mechanism, a relation can hardly be identified for effort. Moreover, app data sensitivity does not seem relevant for the users‘ choice of security mechanism.

    @inproceedings{reuter_between_2019,
    address = {Hamburg, Germany},
    title = {Between {Effort} and {Security}: {User} {Assessment} of the {Adequacy} of {Security} {Mechanisms} for {App} {Categories}},
    url = {http://www.peasec.de/paper/2019/2019_ReuterHaeusserBienHerbert_EffortSecurity_MuC.pdf},
    doi = {10.1145/3340764.3340770},
    abstract = {With the increasing popularity of the smartphone, the number of people using it for financial transactions such as online shopping, online banking or mobile payment is also growing. Apps used in these contexts store sensitive and valuable data, creating a need for security measures. It has not yet been researched to what extent certain authentication mechanisms, which can be information-, biometric- as well as token-based, are suitable for individual apps and the respective data. The goal of this work is to assess how perceived security and estimated effort of using such mechanisms, as well as the degree to which app data is considered worth protecting, influence users' choices of appropriate measures to protect app categories. Therefore, we conducted a representative study (n=1024). On the one hand, our results show that a positive correlation between perceived security and effort exists for all investigated non-biometric authentication methods. On the other hand, the study sheds light on the differences between the investigated app categories and the users' choice of the appropriate security mechanisms for the particular category. In contrast to perceived security having a positive influence on a user's preference of mechanism, a relation can hardly be identified for effort. Moreover, app data sensitivity does not seem relevant for the users' choice of security mechanism.},
    booktitle = {Mensch und {Computer} - {Tagungsband}},
    publisher = {ACM},
    author = {Reuter, Christian and Häusser, Katja and Bien, Mona and Herbert, Franziska},
    editor = {Alt, Florian and Bulling, Andreas and Döring, Tanja},
    year = {2019},
    keywords = {HCI, Student, UsableSec, Security, Projekt-CRISP, Projekt-CROSSING, Projekt-ATHENE-FANCY},
    pages = {287--297},
    }

  • Larissa Aldehoff, Meri Dankenbring, Christian Reuter (2019)
    Renouncing Privacy in Crisis Management? People’s View on Social Media Monitoring and Surveillance
    Proceedings of the Information Systems for Crisis Response and Management (ISCRAM) València, Spain.
    [BibTeX] [Abstract] [Download PDF]

    Social media is used during crises and disasters by state authorities and citizens to communicate and provide, gain and analyze information. Monitoring of platforms in such cases is both a well-established practice and a research area. The question, whether people are willing to renounce privacy in social media during critical incidents, or even allow surveillance in order to contribute to public security, remains unanswered. Our survey of 1,024 German inhabitants is the first empirical study on people’s views on social media monitoring and surveillance in crisis management. We find the willingness to share data during an imminent threat depends mostly on the type of data: a majority (63\% and 67\%, respectively) would give access to addresses and telephone numbers, whereas the willingness to share content of chats or telephone calls is significantly lower (27\%). Our analysis reveals diverging opinions among participants and some effects of sociodemographic variables on the acceptance of invasions into privacy.

    @inproceedings{aldehoff_renouncing_2019,
    address = {València, Spain},
    title = {Renouncing {Privacy} in {Crisis} {Management}? {People}'s {View} on {Social} {Media} {Monitoring} and {Surveillance}},
    url = {http://www.peasec.de/paper/2019/2019_AldehoffDankenbringReuter_RenouncingPrivacyCrisisManagement_ISCRAM.pdf},
    abstract = {Social media is used during crises and disasters by state authorities and citizens to communicate and provide, gain and analyze information. Monitoring of platforms in such cases is both a well-established practice and a research area. The question, whether people are willing to renounce privacy in social media during critical incidents, or even allow surveillance in order to contribute to public security, remains unanswered. Our survey of 1,024 German inhabitants is the first empirical study on people's views on social media monitoring and surveillance in crisis management. We find the willingness to share data during an imminent threat depends mostly on the type of data: a majority (63\% and 67\%, respectively) would give access to addresses and telephone numbers, whereas the willingness to share content of chats or telephone calls is significantly lower (27\%). Our analysis reveals diverging opinions among participants and some effects of sociodemographic variables on the acceptance of invasions into privacy.},
    booktitle = {Proceedings of the {Information} {Systems} for {Crisis} {Response} and {Management} ({ISCRAM})},
    publisher = {ISCRAM Association},
    author = {Aldehoff, Larissa and Dankenbring, Meri and Reuter, Christian},
    editor = {Franco, Zeno and González, José J. and Canós, José H.},
    year = {2019},
    keywords = {Crisis, SocialMedia, Student, UsableSec, Security, Peace, Projekt-CRISP, Projekt-DualUse, Projekt-CROSSING, Projekt-ATHENE-FANCY},
    pages = {1184--1197},
    }

  • Thomas Reinhold, Christian Reuter (2019)
    From Cyber War to Cyber Peace
    In: Christian Reuter: Information Technology for Peace and Security – IT-Applications and Infrastructures in Conflicts, Crises, War, and Peace. Wiesbaden, Germany: Springer Vieweg, , 139–164. doi:10.1007/978-3-658-25652-4_7
    [BibTeX] [Abstract] [Download PDF]

    The encompassing trend of digitalisation and widespread dependencies on IT systems triggers adjustments also in the military forces. Besides necessary enhancements of IT security and defensive measures for cyberspace, a growing number of states are estab-lishing offensive military capabilities for this domain. Looking at historical develop-ments and transformations due to advancements in military technologies, the chapter discusses the political progress made and tools developed since. Both of these have con-tributed to handling challenges and confining threats to international security. With this background, the text assesses a possible application of these efforts to developments concerning cyberspace, as well as obstacles that need to be tackled for it to be success-ful. The chapter points out political advancements already in progress, the role of social initiatives, such as the cyber peace campaign of the Forum of Computer Scientists for Peace and Societal Responsibility (FifF), as well as potential consequences of the rising probability of cyber war as opposed to the prospects of cyber peace.

    @incollection{reinhold_cyber_2019,
    address = {Wiesbaden, Germany},
    title = {From {Cyber} {War} to {Cyber} {Peace}},
    isbn = {978-3-658-25652-4},
    url = {https://www.springer.com/de/book/9783658256517},
    abstract = {The encompassing trend of digitalisation and widespread dependencies on IT systems triggers adjustments also in the military forces. Besides necessary enhancements of IT security and defensive measures for cyberspace, a growing number of states are estab-lishing offensive military capabilities for this domain. Looking at historical develop-ments and transformations due to advancements in military technologies, the chapter discusses the political progress made and tools developed since. Both of these have con-tributed to handling challenges and confining threats to international security. With this background, the text assesses a possible application of these efforts to developments concerning cyberspace, as well as obstacles that need to be tackled for it to be success-ful. The chapter points out political advancements already in progress, the role of social initiatives, such as the cyber peace campaign of the Forum of Computer Scientists for Peace and Societal Responsibility (FifF), as well as potential consequences of the rising probability of cyber war as opposed to the prospects of cyber peace.},
    booktitle = {Information {Technology} for {Peace} and {Security} - {IT}-{Applications} and {Infrastructures} in {Conflicts}, {Crises}, {War}, and {Peace}},
    publisher = {Springer Vieweg},
    author = {Reinhold, Thomas and Reuter, Christian},
    editor = {Reuter, Christian},
    year = {2019},
    doi = {10.1007/978-3-658-25652-4_7},
    keywords = {Security, Peace, Projekt-CRISP, Projekt-DualUse, Projekt-CROSSING, Cyberwar},
    pages = {139--164},
    }

  • Christian Reuter (2019)
    Information Technology for Peace and Security – IT-Applications and Infrastructures in Conflicts, Crises, War, and Peace
    Wiesbaden, Germany: Springer Vieweg. doi:10.1007/978-3-658-25652-4
    [BibTeX] [Abstract] [Download PDF]

    Technological and scientific progress, especially the rapid development in information technology (IT), plays a crucial role regarding questions of peace and security. This textbook addresses the significance, potentials and challenges of IT for peace and securi-ty. For this purpose, the book offers an introduction to peace, conflict, and security research, thereby focusing on natural-science, technical and computer science perspec-tives. In the following, it sheds light on cyber conflicts, war and peace, cyber arms con-trol, cyber attribution and infrastructures as well as culture and interaction before an outlook is given.

    @book{reuter_information_2019-1,
    address = {Wiesbaden, Germany},
    title = {Information {Technology} for {Peace} and {Security} - {IT}-{Applications} and {Infrastructures} in {Conflicts}, {Crises}, {War}, and {Peace}},
    isbn = {978-3-658-25652-4},
    url = {https://www.springer.com/de/book/9783658256517},
    abstract = {Technological and scientific progress, especially the rapid development in information technology (IT), plays a crucial role regarding questions of peace and security. This textbook addresses the significance, potentials and challenges of IT for peace and securi-ty. For this purpose, the book offers an introduction to peace, conflict, and security research, thereby focusing on natural-science, technical and computer science perspec-tives. In the following, it sheds light on cyber conflicts, war and peace, cyber arms con-trol, cyber attribution and infrastructures as well as culture and interaction before an outlook is given.},
    publisher = {Springer Vieweg},
    author = {Reuter, Christian},
    year = {2019},
    doi = {10.1007/978-3-658-25652-4},
    keywords = {Crisis, Selected, Security, Peace, Infrastructure, Projekt-CRISP, Projekt-DualUse, RSF, Projekt-CROSSING, AuswahlPeace, Cyberwar, Projekt-MAKI},
    }

  • Marc-André Kaufhold, Christian Reuter (2019)
    Cultural Violence and Peace in Social Media
    In: Christian Reuter: Information Technology for Peace and Security – IT-Applications and Infrastructures in Conflicts, Crises, War, and Peace. Wiesbaden, Germany: Springer Vieweg, , 361–381. doi:10.1007/978-3-658-25652-4_17
    [BibTeX] [Abstract] [Download PDF]

    Over the last decade, social media services had an enormous impact on modern culture. They are nowadays widely established in everyday life, but also during natural and man-made crises and conflicts. For instance, Facebook was part of the Arabic Spring, in which the tool facilitated the communication and interaction between participants of political protests. On the contrary, terrorists may recruit new members and disseminate ideologies, and social bots may influence social and political processes. Based on the notions of cultural violence and cultural peace as well as the phenomena of fake news, terrorism and social bots, this exploratory review firstly presents human cultural inter-ventions in social media (e.g. dissemination of fake news and terroristic propaganda) and respective countermeasures (e.g. fake news detection and counter-narratives). Sec-ondly, it discusses automatic cultural interventions realised via social bots (e.g. astro-turfing, misdirection and smoke screening) and countermeasures (e.g. crowdsourcing and social bot detection). Finally, this chapter concludes with a range of cultural inter-ventions and information and communication technology (ICT) in terms of actors and intentions to identify future research potential for supporting situational assessments during conflicts.

    @incollection{kaufhold_cultural_2019,
    address = {Wiesbaden, Germany},
    title = {Cultural {Violence} and {Peace} in {Social} {Media}},
    isbn = {978-3-658-25652-4},
    url = {https://www.springer.com/de/book/9783658256517},
    abstract = {Over the last decade, social media services had an enormous impact on modern culture. They are nowadays widely established in everyday life, but also during natural and man-made crises and conflicts. For instance, Facebook was part of the Arabic Spring, in which the tool facilitated the communication and interaction between participants of political protests. On the contrary, terrorists may recruit new members and disseminate ideologies, and social bots may influence social and political processes. Based on the notions of cultural violence and cultural peace as well as the phenomena of fake news, terrorism and social bots, this exploratory review firstly presents human cultural inter-ventions in social media (e.g. dissemination of fake news and terroristic propaganda) and respective countermeasures (e.g. fake news detection and counter-narratives). Sec-ondly, it discusses automatic cultural interventions realised via social bots (e.g. astro-turfing, misdirection and smoke screening) and countermeasures (e.g. crowdsourcing and social bot detection). Finally, this chapter concludes with a range of cultural inter-ventions and information and communication technology (ICT) in terms of actors and intentions to identify future research potential for supporting situational assessments during conflicts.},
    booktitle = {Information {Technology} for {Peace} and {Security} - {IT}-{Applications} and {Infrastructures} in {Conflicts}, {Crises}, {War}, and {Peace}},
    publisher = {Springer Vieweg},
    author = {Kaufhold, Marc-André and Reuter, Christian},
    editor = {Reuter, Christian},
    year = {2019},
    doi = {10.1007/978-3-658-25652-4_17},
    keywords = {Crisis, HCI, SocialMedia, Peace, Projekt-CRISP},
    pages = {361--381},
    }

  • Christian Reuter (2019)
    Information Technology for Peace and Security – An Emerging Research Field
    SCIENCE PEACE SECURITY ’19 – Proceedings of the Interdisciplinary Conference on Technical Peace and Security Research Darmstadt, Germany.
    [BibTeX] [Abstract] [Download PDF]

    Technological and scientific progress, especially the rapid development in information technology (IT), plays a crucial role regarding questions of peace and security. This short overview addresses the significance, potentials and challenges of IT for peace and security. For this purpose, the talk offers an introduction to peace, conflict, and security research, thereby focusing on natural science, technical and computer science perspectives. In the following, it sheds light on fundamentals (e.g. IT in peace, conflict and security, natural science/ technical peace research), cyber conflicts and war (e.g. information warfare, cyber espionage, cyber defence, Darknet), cyber peace (e.g. dual-use, technology assessment, confidence and security building measures), cyber arms control (e.g. arms control in the cyberspace, unmanned systems, verification), cyber attribution and infrastructures (e.g. attribution of cyber-attacks, resilient infrastructures, secure critical information infrastructures), culture and interaction (e.g. safety and security, cultural violence, social media), before an outlook is given.

    @inproceedings{reuter_information_2019-2,
    address = {Darmstadt, Germany},
    title = {Information {Technology} for {Peace} and {Security} – {An} {Emerging} {Research} {Field}},
    url = {www.peasec.de/paper/2019/2019_Reuter_ITPeaceSecurityEmergingField_ProcSciencePeaceSecurity-TUprints.pdf},
    abstract = {Technological and scientific progress, especially the rapid development in information technology (IT), plays a crucial role regarding questions of peace and security. This short overview addresses the significance, potentials and challenges of IT for peace and security. For this purpose, the talk offers an introduction to peace, conflict, and security research, thereby focusing on natural science, technical and computer science perspectives. In the following, it sheds light on fundamentals (e.g. IT in peace, conflict and security, natural science/ technical peace research), cyber conflicts and war (e.g. information warfare, cyber espionage, cyber defence, Darknet), cyber peace (e.g. dual-use, technology assessment, confidence and security building measures), cyber arms control (e.g. arms control in the cyberspace, unmanned systems, verification), cyber attribution and infrastructures (e.g. attribution of cyber-attacks, resilient infrastructures, secure critical information infrastructures), culture and interaction (e.g. safety and security, cultural violence, social media), before an outlook is given.},
    booktitle = {{SCIENCE} {PEACE} {SECURITY} '19 - {Proceedings} of the {Interdisciplinary} {Conference} on {Technical} {Peace} and {Security} {Research}},
    publisher = {TUprints},
    author = {Reuter, Christian},
    editor = {Reuter, Christian and Altmann, Jürgen and Göttsche, Malte and Himmel, Mirko},
    year = {2019},
    keywords = {HCI, UsableSec, Security, Projekt-CRISP, Projekt-ATHENE-FANCY},
    pages = {18--20},
    }

  • Katrin Hartwig, Christian Reuter (2019)
    TrustyTweet: An Indicator-based Browser-Plugin to Assist Users in Dealing with Fake News on Twitter
    Proceedings of the International Conference on Wirtschaftsinformatik (WI) Siegen, Germany.
    [BibTeX] [Abstract] [Download PDF]

    The importance of dealing withfake newsonsocial mediahas increased both in political and social contexts.While existing studies focus mainly on how to detect and label fake news, approaches to assist usersin making their own assessments are largely missing. This article presents a study on how Twitter-users’assessmentscan be supported by an indicator-based white-box approach.First, we gathered potential indicators for fake news that have proven to be promising in previous studies and that fit our idea of awhite-box approach. Based on those indicators we then designed and implemented the browser-plugin TrusyTweet, which assists users on Twitterin assessing tweetsby showing politically neutral and intuitive warnings without creating reactance. Finally, we suggest the findings of our evaluations with a total of 27 participants which lead to further design implicationsfor approachesto assistusers in dealing with fake news.

    @inproceedings{hartwig_trustytweet_2019,
    address = {Siegen, Germany},
    title = {{TrustyTweet}: {An} {Indicator}-based {Browser}-{Plugin} to {Assist} {Users} in {Dealing} with {Fake} {News} on {Twitter}},
    url = {http://www.peasec.de/paper/2019/2019_HartwigReuter_TrustyTweet_WI.pdf},
    abstract = {The importance of dealing withfake newsonsocial mediahas increased both in political and social contexts.While existing studies focus mainly on how to detect and label fake news, approaches to assist usersin making their own assessments are largely missing. This article presents a study on how Twitter-users'assessmentscan be supported by an indicator-based white-box approach.First, we gathered potential indicators for fake news that have proven to be promising in previous studies and that fit our idea of awhite-box approach. Based on those indicators we then designed and implemented the browser-plugin TrusyTweet, which assists users on Twitterin assessing tweetsby showing politically neutral and intuitive warnings without creating reactance. Finally, we suggest the findings of our evaluations with a total of 27 participants which lead to further design implicationsfor approachesto assistusers in dealing with fake news.},
    booktitle = {Proceedings of the {International} {Conference} on {Wirtschaftsinformatik} ({WI})},
    publisher = {AIS},
    author = {Hartwig, Katrin and Reuter, Christian},
    year = {2019},
    keywords = {Crisis, HCI, SocialMedia, Student, Ranking-CORE-C, Ranking-VHB-C, Ranking-WKWI-A, Peace, Projekt-CRISP, Projekt-ATHENE-FANCY},
    pages = {1858--1869},
    }

    2018

  • Christian Reuter, Marc-André Kaufhold (2018)
    Informatik für Frieden und Sicherheit
    In: Christian Reuter: Sicherheitskritische Mensch-Computer-Interaktion: Interaktive Technologien und Soziale Medien im Krisen- und Sicherheitsmanagement. Wiesbaden, Germany: Springer Vieweg, , 573–595. doi:10.1007/978-3-658-19523-6_28
    [BibTeX] [Abstract] [Download PDF]

    Die Erkenntnisse aus Naturwissenschaft und Technik hatten bereits immer einen großen Einfluss auf die Art und Weise, wie Kriege und Konflikte ausgetragen werden konnten und ausgetragen wurden. Im Kontext von Frieden und Sicherheit können Erkenntnisse, die eigentlich für zivile Kontexte entwickelt wurden, auch für militärische Auseinandersetzungen genutzt werden (Dual-Use). Seit einigen Jahren betrifft dies insbesondere die Informatik, die durch die militärische Nutzung von Computern, Cyberwar, Information Warfare, einschließlich terroristischer Propaganda, Fake News, Ausspähung und Hacking konfliktäre Auseinandersetzungen unterstützen kann. Auch werden Konflikte vermehrt im digitalen Raum ausgetragen, mit erschwerter Zurechenbarkeit zu einzelnen (angreifenden) Akteuren. Die Informatik bietet jedoch auch für friedensstiftende Aktivitäten einige Möglichkeiten. Dieses Kapitel möchte eine Einführung in dieses an Bedeutung gewinnende Gebiet liefern.

    @incollection{reuter_informatik_2018,
    address = {Wiesbaden, Germany},
    title = {Informatik für {Frieden} und {Sicherheit}},
    isbn = {978-3-658-19523-6},
    url = {https://link.springer.com/chapter/10.1007/978-3-658-19523-6_28},
    abstract = {Die Erkenntnisse aus Naturwissenschaft und Technik hatten bereits immer einen großen Einfluss auf die Art und Weise, wie Kriege und Konflikte ausgetragen werden konnten und ausgetragen wurden. Im Kontext von Frieden und Sicherheit können Erkenntnisse, die eigentlich für zivile Kontexte entwickelt wurden, auch für militärische Auseinandersetzungen genutzt werden (Dual-Use). Seit einigen Jahren betrifft dies insbesondere die Informatik, die durch die militärische Nutzung von Computern, Cyberwar, Information Warfare, einschließlich terroristischer Propaganda, Fake News, Ausspähung und Hacking konfliktäre Auseinandersetzungen unterstützen kann. Auch werden Konflikte vermehrt im digitalen Raum ausgetragen, mit erschwerter Zurechenbarkeit zu einzelnen (angreifenden) Akteuren. Die Informatik bietet jedoch auch für friedensstiftende Aktivitäten einige Möglichkeiten. Dieses Kapitel möchte eine Einführung in dieses an Bedeutung gewinnende Gebiet liefern.},
    booktitle = {Sicherheitskritische {Mensch}-{Computer}-{Interaktion}: {Interaktive} {Technologien} und {Soziale} {Medien} im {Krisen}- und {Sicherheitsmanagement}},
    publisher = {Springer Vieweg},
    author = {Reuter, Christian and Kaufhold, Marc-André},
    editor = {Reuter, Christian},
    year = {2018},
    doi = {10.1007/978-3-658-19523-6_28},
    keywords = {Crisis, Security, Projekt-KontiKat, Peace, Projekt-CRISP},
    pages = {573--595},
    }

  • Thea Riebe, Katja Pätsch, Marc-André Kaufhold, Christian Reuter (2018)
    From Conspiracies to Insults: A Case Study of Radicalisation in Social Media Discourse
    Mensch und Computer – Workshopband Dresden, Germany.
    [BibTeX] [Abstract] [Download PDF]

    Online radicalisation is often linked to discourses on social media. In this context, the question arises how populist online discourses radicalise in social media platforms. With a quantitative content analysis of supporters of the German party “Alternative für Deutschland (AfD)” and their contributions on Facebook between March 2014 and May 2017, this preliminary analysis illustrates how the discourse shifts from a dominantly neutral debate to insult-driven and dis-criminatory contributions. It provides insights into the dynamic of political social media dis-courses and shows a tendency of correlating language style and topics that can be further studied in Social Media Analytics.

    @inproceedings{riebe_conspiracies_2018,
    address = {Dresden, Germany},
    title = {From {Conspiracies} to {Insults}: {A} {Case} {Study} of {Radicalisation} in {Social} {Media} {Discourse}},
    url = {https://dl.gi.de/bitstream/handle/20.500.12116/16795/Beitrag_449_final__a.pdf},
    abstract = {Online radicalisation is often linked to discourses on social media. In this context, the question arises how populist online discourses radicalise in social media platforms. With a quantitative content analysis of supporters of the German party “Alternative für Deutschland (AfD)” and their contributions on Facebook between March 2014 and May 2017, this preliminary analysis illustrates how the discourse shifts from a dominantly neutral debate to insult-driven and dis-criminatory contributions. It provides insights into the dynamic of political social media dis-courses and shows a tendency of correlating language style and topics that can be further studied in Social Media Analytics.},
    booktitle = {Mensch und {Computer} - {Workshopband}},
    publisher = {Gesellschaft für Informatik e.V.},
    author = {Riebe, Thea and Pätsch, Katja and Kaufhold, Marc-André and Reuter, Christian},
    editor = {Dachselt, Raimund and Weber, Gerhard},
    year = {2018},
    keywords = {Crisis, HCI, SocialMedia, Student, Projekt-KontiKat, Peace, Projekt-CRISP},
    pages = {595--603},
    }

  • Thea Riebe, Alfred Nordmann, Christian Reuter (2018)
    Responsible Research and Innovation: Interdisziplinärer Workshop von IANUS und Schader-Stiftung
    Wissenschaft & Frieden: 2018.
    [BibTeX] [Abstract] [Download PDF]

    Statt der Forschung ethische, rechtliche, gesellschaftliche Refl exion nur beizuge-sellen, verlangt Responsible Research and Innovation (RRI), dass sich Forschung an europäischen Werten – den Werten der Europäischen Union – orientiert. Um diese Öff nung zu gewährleisten, setzt RRI zunächst nicht auf spezifi sche Werte, sondern prozedural auf eine Forschung, die Folgen antizipiert, unterschiedliche Interessen und Wertvorstellungen inklu-diert, sich selbst refl ektiert und in die Verantwortung nehmen lässt. Doch was heißt das ?

    @techreport{riebe_responsible_2018,
    address = {Wissenschaft \& Frieden},
    title = {Responsible {Research} and {Innovation}: {Interdisziplinärer} {Workshop} von {IANUS} und {Schader}-{Stiftung}},
    url = {http://www.peasec.de/paper/2018/2018_RiebeNordmannReuter_RRI_WuF.pdf},
    abstract = {Statt der Forschung ethische, rechtliche, gesellschaftliche Refl exion nur beizuge-sellen, verlangt Responsible Research and Innovation (RRI), dass sich Forschung an europäischen Werten – den Werten der Europäischen Union – orientiert. Um diese Öff nung zu gewährleisten, setzt RRI zunächst nicht auf spezifi sche Werte, sondern prozedural auf eine Forschung, die Folgen antizipiert, unterschiedliche Interessen und Wertvorstellungen inklu-diert, sich selbst refl ektiert und in die Verantwortung nehmen lässt. Doch was heißt das ?},
    author = {Riebe, Thea and Nordmann, Alfred and Reuter, Christian},
    year = {2018},
    keywords = {Projekt-KontiKat, Peace, Projekt-CRISP, Projekt-DualUse},
    pages = {60--61},
    }

  • Christian Reuter, Marc-André Kaufhold (2018)
    Usable Safety Engineering sicherheitskritischer interaktiver Systeme
    In: Christian Reuter: Sicherheitskritische Mensch-Computer-Interaktion: Interaktive Technologien und Soziale Medien im Krisen- und Sicherheitsmanagement. Wiesbaden, Germany: Springer Vieweg, , 17–40. doi:10.1007/978-3-658-19523-6_2
    [BibTeX] [Abstract] [Download PDF]

    Die Gestaltung gebrauchstauglicher, interaktiver und kooperativer Systeme wird bereits seit den 1980er Jahren in der Disziplin Mensch-Computer-Interaktion (MCI) und Com-puterunterstützte Gruppenarbeit (CSCW) behandelt. Es gibt jedoch einige Besonderhei-ten der MCI im Kontext sicherheitskritischer Systeme, insbesondere der störungsfreien Nutzung von IT (Safety) zu beachten. Dieses Kapitel stellt die wichtigsten Merkmale der Anwendung von Gestaltungsmethoden der MCI in sicherheitskritischen Systemen dar. Hierfür werden zu Beginn die Grundlagen der beiden Gebiete – der MCI sowie des Kri-sen- und Sicherheitsmanagements – erläutert. Darauf aufbauend werden Ansätze und Methoden der Analyse, des Designs und der Entwicklung sowie der Evaluation der MCI unter besonderer Berücksichtigung sicherheitskritischer Systeme diskutiert. Aspekte wie Risikoanalysen in der Anforderungsanalyse, die Einkalkulierung von Bedienfehlern und Rückfallebenen im Systemdesign gehören ebenso dazu wie besondere Herausforderun-gen bei Evaluationen.

    @incollection{reuter_usable_2018,
    address = {Wiesbaden, Germany},
    title = {Usable {Safety} {Engineering} sicherheitskritischer interaktiver {Systeme}},
    isbn = {978-3-658-19523-6},
    url = {https://link.springer.com/chapter/10.1007/978-3-658-19523-6_2},
    abstract = {Die Gestaltung gebrauchstauglicher, interaktiver und kooperativer Systeme wird bereits seit den 1980er Jahren in der Disziplin Mensch-Computer-Interaktion (MCI) und Com-puterunterstützte Gruppenarbeit (CSCW) behandelt. Es gibt jedoch einige Besonderhei-ten der MCI im Kontext sicherheitskritischer Systeme, insbesondere der störungsfreien Nutzung von IT (Safety) zu beachten. Dieses Kapitel stellt die wichtigsten Merkmale der Anwendung von Gestaltungsmethoden der MCI in sicherheitskritischen Systemen dar. Hierfür werden zu Beginn die Grundlagen der beiden Gebiete – der MCI sowie des Kri-sen- und Sicherheitsmanagements – erläutert. Darauf aufbauend werden Ansätze und Methoden der Analyse, des Designs und der Entwicklung sowie der Evaluation der MCI unter besonderer Berücksichtigung sicherheitskritischer Systeme diskutiert. Aspekte wie Risikoanalysen in der Anforderungsanalyse, die Einkalkulierung von Bedienfehlern und Rückfallebenen im Systemdesign gehören ebenso dazu wie besondere Herausforderun-gen bei Evaluationen.},
    booktitle = {Sicherheitskritische {Mensch}-{Computer}-{Interaktion}: {Interaktive} {Technologien} und {Soziale} {Medien} im {Krisen}- und {Sicherheitsmanagement}},
    publisher = {Springer Vieweg},
    author = {Reuter, Christian and Kaufhold, Marc-André},
    editor = {Reuter, Christian},
    year = {2018},
    doi = {10.1007/978-3-658-19523-6_2},
    keywords = {HCI, UsableSec, Security, Projekt-KontiKat, Projekt-CRISP},
    pages = {17--40},
    }

  • Marc-André Kaufhold, Christian Reuter, Tobias Ermert (2018)
    Interaktionsdesign eines Risiko-Bewertungskonzepts für KMU
    Mensch und Computer – Tagungsband Dresden, Germany.
    [BibTeX] [Abstract] [Download PDF]

    Betriebsstörungen, Naturkatastrophen und andere Notfallszenarien bedrohen die Fortdauer von Unternehmen. Hierzu stellt Business Continuity Management (BCM) Maßnahmen zur Identifika-tion von Bedrohungen und Risiken sowie zum Aufbau der Belastbarkeit von Organisationen bereit. In der Forschung mangelt es jedoch an Ansätzen, welche BCM in kleinen und mittleren Unternehmen (KMU) unterstützen. In diesem Kurzbeitrag wird ein Konzept für KMU vorgestellt, welches die Identifikation und Bewertung von Risiken unterstützt, Bewältigungsmaßnahmen anbietet und unternehmensspezifische Risikoinformationen auf einem Dashboard visualisiert.

    @inproceedings{kaufhold_interaktionsdesign_2018,
    address = {Dresden, Germany},
    title = {Interaktionsdesign eines {Risiko}-{Bewertungskonzepts} für {KMU}},
    url = {https://dl.gi.de/bitstream/handle/20.500.12116/16626/Beitrag_356_final__a.pdf},
    abstract = {Betriebsstörungen, Naturkatastrophen und andere Notfallszenarien bedrohen die Fortdauer von Unternehmen. Hierzu stellt Business Continuity Management (BCM) Maßnahmen zur Identifika-tion von Bedrohungen und Risiken sowie zum Aufbau der Belastbarkeit von Organisationen bereit. In der Forschung mangelt es jedoch an Ansätzen, welche BCM in kleinen und mittleren Unternehmen (KMU) unterstützen. In diesem Kurzbeitrag wird ein Konzept für KMU vorgestellt, welches die Identifikation und Bewertung von Risiken unterstützt, Bewältigungsmaßnahmen anbietet und unternehmensspezifische Risikoinformationen auf einem Dashboard visualisiert.},
    booktitle = {Mensch und {Computer} - {Tagungsband}},
    publisher = {Gesellschaft für Informatik e.V.},
    author = {Kaufhold, Marc-André and Reuter, Christian and Ermert, Tobias},
    year = {2018},
    keywords = {Crisis, HCI, Student, UsableSec, Security, Projekt-KontiKat, Infrastructure, Projekt-CRISP, RSF, Projekt-HyServ},
    pages = {309--312},
    }

    2017

  • Christian Reuter, Marc-André Kaufhold, Jonas Klös (2017)
    Benutzbare Sicherheit: Usability, Safety und Security bei Passwörtern
    Mensch und Computer – Workshopband Regensburg, Germany. doi:https://doi.org/10.18420/muc2017-ws01-0384
    [BibTeX] [Abstract] [Download PDF]

    Obwohl Usability und Sicherheit beides relevante Anforderungen für Anwendungssysteme sind, stehen sie in einem Spannungsfeld. Sicherheit kann als Schutz vor Angriffen von außen (Security), aber auch für das sichere Funktionieren (Safety) dieser Anwendungssysteme verstanden werden. Durch die immer größere Vernetzung klassischer Safety-Domänen, wie dem Katastrophenschutz, gewinnen Security-Aspekte dort ebenfalls an Bedeutung. Die Übertragung von kritischen und vertraulichen Informationen auf mobile Endgeräte muss zugleich passwortgeschützt als auch schnell verfügbar sein; zeitintensive Authentifizierungsmechanismen können hier stören. In dieser Studie werden die Nutzung von Passwörtern vor dem Hintergrund der Abwägung von Sicherheit und Usability exploriert und Hypothesen zum Umgang mit Passwörtern aufgestellt, die im Kontext der Digitalisierung in der zivilen Sicherheit sowie mobilen und ubiquitären Geräte im Katastrophenschutz an enormer Bedeutung gewinnen.

    @inproceedings{reuter_benutzbare_2017,
    address = {Regensburg, Germany},
    title = {Benutzbare {Sicherheit}: {Usability}, {Safety} und {Security} bei {Passwörtern}},
    url = {https://dl.gi.de/bitstream/handle/20.500.12116/3214/2017_WS01_384.pdf?sequence=1&isAllowed=y},
    doi = {https://doi.org/10.18420/muc2017-ws01-0384},
    abstract = {Obwohl Usability und Sicherheit beides relevante Anforderungen für Anwendungssysteme sind, stehen sie in einem Spannungsfeld. Sicherheit kann als Schutz vor Angriffen von außen (Security), aber auch für das sichere Funktionieren (Safety) dieser Anwendungssysteme verstanden werden. Durch die immer größere Vernetzung klassischer Safety-Domänen, wie dem Katastrophenschutz, gewinnen Security-Aspekte dort ebenfalls an Bedeutung. Die Übertragung von kritischen und vertraulichen Informationen auf mobile Endgeräte muss zugleich passwortgeschützt als auch schnell verfügbar sein; zeitintensive Authentifizierungsmechanismen können hier stören. In dieser Studie werden die Nutzung von Passwörtern vor dem Hintergrund der Abwägung von Sicherheit und Usability exploriert und Hypothesen zum Umgang mit Passwörtern aufgestellt, die im Kontext der Digitalisierung in der zivilen Sicherheit sowie mobilen und ubiquitären Geräte im Katastrophenschutz an enormer Bedeutung gewinnen.},
    booktitle = {Mensch und {Computer} - {Workshopband}},
    publisher = {Gesellschaft für Informatik e.V.},
    author = {Reuter, Christian and Kaufhold, Marc-André and Klös, Jonas},
    editor = {Burghardt, M. and Wimmer, R. and Wolff, C. and Womser-Hacker, C.},
    year = {2017},
    keywords = {HCI, Student, UsableSec, Security, Projekt-KontiKat, Projekt-CRISP, Projekt-CROSSING},
    pages = {33--41},
    }

    Abgeschlossene Projekte an der Universität Siegen:

    KontiKat: Zivilgesellschaftliche und betriebliche Kontinuität durch sozio-technische Vernetzung in Katastrophenlagen (1.6.2017-31.12.2021, BMBF)

    KontiKat: Zivilgesellschaftliche und betriebliche Kontinuität durch sozio-technische Vernetzung in Katastrophenlagen (1.6.2017-31.12.2021, BMBF) – Details

    Krisen und Schadensereignisse können das gesellschaftliche Leben und wirtschaftliche Prozesse erheblich beinträchtigen. Dabei muss es sich nicht um Katastrophen handeln. Auch der regionale Ausfall von Telekommunikationsanlagen über Stunden oder Tage kann bereits weitreichende Folgen haben. Im Fokus des Projekts KontiKat steht die Aufrechterhaltung und Wiederherstellung des gesellschaftlichen Lebens nach größeren Schadensereignissen und Katastrophen. Hierzu sollen empirische Studien zur Erfassung der sozialen Vernetzung der Bevölkerung sowie von kleinen und mittleren Unternehmen durchgeführt werden. Die Ergebnisse tragen dazu bei, die Selbstorganisation, Hilfeleistungen und Notfallkommunikation in Krisensituationen zu fördern. (PDF Projektumriss_KontiKat)

    2023

  • Thea Riebe (2023)
    Technology Assessment of Dual-Use ICTs – How to assess Diffusion, Governance and Design
    Darmstadt, Germany: Dissertation (Dr. rer. nat.), Department of Computer Science, Technische Universität Darmstadt. doi:10.26083/tuprints-00022849
    [BibTeX] [Abstract] [Download PDF]

    Technologies that can be used in military and civilian applications are referred to as dual-use. The dual-use nature of many information and communications technologies (ICTs) raises new questions for research and development for national, international, and human security. Measures to deal with the risks associated with the various dual-use technologies, including proliferation control, design approaches, and policy measures, vary widely. For example, Autonomous Weapon Systems (AWS) have not yet been regulated, while cryptographic products are subject to export and import controls. Innovations in artificial intelligence (AI), robotics, cybersecurity, and automated analysis of publicly available data raise new questions about their respective dual-use risks. Dual-use risks have been systematically discussed so far, especially in the life sciences, which have contributed to the development of methods for assessment and risk management. Dual-use risks arise, among other things, from the fact that safety-critical technologies can be easily disseminated or modified, as well as used as part of a weapon system. Therefore, the development and adaptation of robots and software requires an independent consideration that builds on the insights of related dual-use discourses. Therefore, this dissertation considers the management of such risks in terms of the proliferation, regulation, and design of individual dual-use information technologies. Technology Assessment (TA) is the epistemological framework for this work, bringing together the concepts and approaches of Critical Security Studies (CSS) and Human-Computer Interaction (HCI) to help evaluate and shape dual-use technologies. In order to identify the diffusion of dual-use at an early stage, the dissertation first examines the diffusion of dual-use innovations between civilian and military research in expert networks on LinkedIn, as well as on the basis of AI patents in a patent network. The results show low diffusion and tend to confirm existing studies on diffusion in patent networks. In the following section, the regulation of dual-use technologies is examined in the paper through two case studies. The first study uses a discourse analysis to show the value conflicts with regard to the regulation of autonomous weapons systems using the concept of Meaningful Human Control (MHC), while a second study, as a long-term comparative case study, analyzes the change and consequences of the regulation of strong cryptography in the U.S. as well as the programs of intelligence agencies for mass surveillance. Both cases point to the central role of private companies, both in the production of AWS and as intermediaries for the dissemination of encryption, as well as surveillance intermediaries. Subsequently, the dissertation examines the design of a dual-use technology using an Open Source Intelligence System (OSINT) for cybersecurity. For this purpose, conceptual, empirical, and technical studies are conducted as part of the Value-Sensitive Design (VSD) framework. During the studies, implications for research on and design of OSINT were identified. For example, the representative survey of the German population has shown that transparency of use while reducing mistrust is associated with higher acceptance of such systems. Additionally, it has been shown that data sparsity through the use of expert networks has many positive effects, not only improving the performance of the system, but is also preferable for legal and social reasons. Thus, the work contributes to the understanding of specific dual-use risks of AI, the regulation of AWS and cryptography, and the design of OSINT in cybersecurity. By combining concepts from CSS and participatory design methods in HCI, this work provides an interdisciplinary and multi-method contribution.

    @book{riebe_technology_2023,
    address = {Darmstadt, Germany},
    title = {Technology {Assessment} of {Dual}-{Use} {ICTs} – {How} to assess {Diffusion}, {Governance} and {Design}},
    url = {https://tuprints.ulb.tu-darmstadt.de/22849/},
    abstract = {Technologies that can be used in military and civilian applications are referred to as dual-use. The dual-use nature of many information and communications technologies (ICTs) raises new questions for research and development for national, international, and human security. Measures to deal with the risks associated with the various dual-use technologies, including proliferation control, design approaches, and policy measures, vary widely. For example, Autonomous Weapon Systems (AWS) have not yet been regulated, while cryptographic products are subject to export and import controls. Innovations in artificial intelligence (AI), robotics, cybersecurity, and automated analysis of publicly available data raise new questions about their respective dual-use risks.
    Dual-use risks have been systematically discussed so far, especially in the life sciences, which have contributed to the development of methods for assessment and risk management. Dual-use risks arise, among other things, from the fact that safety-critical technologies can be easily disseminated or modified, as well as used as part of a weapon system. Therefore, the development and adaptation of robots and software requires an independent consideration that builds on the insights of related dual-use discourses. Therefore, this dissertation considers the management of such risks in terms of the proliferation, regulation, and design of individual dual-use information technologies. Technology Assessment (TA) is the epistemological framework for this work, bringing together the concepts and approaches of Critical Security Studies (CSS) and Human-Computer Interaction (HCI) to help evaluate and shape dual-use technologies.
    In order to identify the diffusion of dual-use at an early stage, the dissertation first examines the diffusion of dual-use innovations between civilian and military research in expert networks on LinkedIn, as well as on the basis of AI patents in a patent network. The results show low diffusion and tend to confirm existing studies on diffusion in patent networks. In the following section, the regulation of dual-use technologies is examined in the paper through two case studies. The first study uses a discourse analysis to show the value conflicts with regard to the regulation of autonomous weapons systems using the concept of Meaningful Human Control (MHC), while a second study, as a long-term comparative case study, analyzes the change and consequences of the regulation of strong cryptography in the U.S. as well as the programs of intelligence agencies for mass surveillance. Both cases point to the central role of private companies, both in the production of AWS and as intermediaries for the dissemination of encryption, as well as surveillance intermediaries. Subsequently, the dissertation examines the design of a dual-use technology using an Open Source Intelligence System (OSINT) for cybersecurity. For this purpose, conceptual, empirical, and technical studies are conducted as part of the Value-Sensitive Design (VSD) framework. During the studies, implications for research on and design of OSINT were identified. For example, the representative survey of the German population has shown that transparency of use while reducing mistrust is associated with higher acceptance of such systems. Additionally, it has been shown that data sparsity through the use of expert networks has many positive effects, not only improving the performance of the system, but is also preferable for legal and social reasons. Thus, the work contributes to the understanding of specific dual-use risks of AI, the regulation of AWS and cryptography, and the design of OSINT in cybersecurity. By combining concepts from CSS and participatory design methods in HCI, this work provides an interdisciplinary and multi-method contribution.},
    publisher = {Dissertation (Dr. rer. nat.), Department of Computer Science, Technische Universität Darmstadt},
    author = {Riebe, Thea},
    year = {2023},
    doi = {10.26083/tuprints-00022849},
    keywords = {HCI, Projekt-KontiKat, Peace, Projekt-DualUse, Projekt-CYWARN, Dissertation},
    }

  • Thea Riebe (2023)
    Technology Assessment of Dual-Use ICTs – How to assess Diffusion, Governance and Design
    Wiesbaden, Germany: Springer Vieweg.
    [BibTeX] [Abstract] [Download PDF]

    Technologies that can be used in military and civilian applications are referred to as dual-use. The dual-use nature of many information and communications technologies (ICTs) raises new questions for research and development for national, international, and human security. Measures to deal with the risks associated with the various dual-use technologies, including proliferation control, design approaches, and policy measures, vary widely. For example, Autonomous Weapon Systems (AWS) have not yet been regulated, while cryptographic products are subject to export and import controls. Innovations in artificial intelligence (AI), robotics, cybersecurity, and automated analysis of publicly available data raise new questions about their respective dual-use risks. Dual-use risks have been systematically discussed so far, especially in the life sciences, which have contributed to the development of methods for assessment and risk management. Dual-use risks arise, among other things, from the fact that safety-critical technologies can be easily disseminated or modified, as well as used as part of a weapon system. Therefore, the development and adaptation of robots and software requires an independent consideration that builds on the insights of related dual-use discourses. Therefore, this dissertation considers the management of such risks in terms of the proliferation, regulation, and design of individual dual-use information technologies. Technology Assessment (TA) is the epistemological framework for this work, bringing together the concepts and approaches of Critical Security Studies (CSS) and Human-Computer Interaction (HCI) to help evaluate and shape dual-use technologies. In order to identify the diffusion of dual-use at an early stage, the dissertation first examines the diffusion of dual-use innovations between civilian and military research in expert networks on LinkedIn, as well as on the basis of AI patents in a patent network. The results show low diffusion and tend to confirm existing studies on diffusion in patent networks. In the following section, the regulation of dual-use technologies is examined in the paper through two case studies. The first study uses a discourse analysis to show the value conflicts with regard to the regulation of autonomous weapons systems using the concept of Meaningful Human Control (MHC), while a second study, as a long-term comparative case study, analyzes the change and consequences of the regulation of strong cryptography in the U.S. as well as the programs of intelligence agencies for mass surveillance. Both cases point to the central role of private companies, both in the production of AWS and as intermediaries for the dissemination of encryption, as well as surveillance intermediaries. Subsequently, the dissertation examines the design of a dual-use technology using an Open Source Intelligence System (OSINT) for cybersecurity. For this purpose, conceptual, empirical, and technical studies are conducted as part of the Value-Sensitive Design (VSD) framework. During the studies, implications for research on and design of OSINT were identified. For example, the representative survey of the German population has shown that transparency of use while reducing mistrust is associated with higher acceptance of such systems. Additionally, it has been shown that data sparsity through the use of expert networks has many positive effects, not only improving the performance of the system, but is also preferable for legal and social reasons. Thus, the work contributes to the understanding of specific dual-use risks of AI, the regulation of AWS and cryptography, and the design of OSINT in cybersecurity. By combining concepts from CSS and participatory design methods in HCI, this work provides an interdisciplinary and multi-method contribution.

    @book{riebe_technology_2023-1,
    address = {Wiesbaden, Germany},
    title = {Technology {Assessment} of {Dual}-{Use} {ICTs} – {How} to assess {Diffusion}, {Governance} and {Design}},
    isbn = {978-3-658-41666-9},
    url = {https://link.springer.com/book/10.1007/978-3-658-41667-6},
    abstract = {Technologies that can be used in military and civilian applications are referred to as dual-use. The dual-use nature of many information and communications technologies (ICTs) raises new questions for research and development for national, international, and human security. Measures to deal with the risks associated with the various dual-use technologies, including proliferation control, design approaches, and policy measures, vary widely. For example, Autonomous Weapon Systems (AWS) have not yet been regulated, while cryptographic products are subject to export and import controls. Innovations in artificial intelligence (AI), robotics, cybersecurity, and automated analysis of publicly available data raise new questions about their respective dual-use risks.
    Dual-use risks have been systematically discussed so far, especially in the life sciences, which have contributed to the development of methods for assessment and risk management. Dual-use risks arise, among other things, from the fact that safety-critical technologies can be easily disseminated or modified, as well as used as part of a weapon system. Therefore, the development and adaptation of robots and software requires an independent consideration that builds on the insights of related dual-use discourses. Therefore, this dissertation considers the management of such risks in terms of the proliferation, regulation, and design of individual dual-use information technologies. Technology Assessment (TA) is the epistemological framework for this work, bringing together the concepts and approaches of Critical Security Studies (CSS) and Human-Computer Interaction (HCI) to help evaluate and shape dual-use technologies.
    In order to identify the diffusion of dual-use at an early stage, the dissertation first examines the diffusion of dual-use innovations between civilian and military research in expert networks on LinkedIn, as well as on the basis of AI patents in a patent network. The results show low diffusion and tend to confirm existing studies on diffusion in patent networks. In the following section, the regulation of dual-use technologies is examined in the paper through two case studies. The first study uses a discourse analysis to show the value conflicts with regard to the regulation of autonomous weapons systems using the concept of Meaningful Human Control (MHC), while a second study, as a long-term comparative case study, analyzes the change and consequences of the regulation of strong cryptography in the U.S. as well as the programs of intelligence agencies for mass surveillance. Both cases point to the central role of private companies, both in the production of AWS and as intermediaries for the dissemination of encryption, as well as surveillance intermediaries. Subsequently, the dissertation examines the design of a dual-use technology using an Open Source Intelligence System (OSINT) for cybersecurity. For this purpose, conceptual, empirical, and technical studies are conducted as part of the Value-Sensitive Design (VSD) framework. During the studies, implications for research on and design of OSINT were identified. For example, the representative survey of the German population has shown that transparency of use while reducing mistrust is associated with higher acceptance of such systems. Additionally, it has been shown that data sparsity through the use of expert networks has many positive effects, not only improving the performance of the system, but is also preferable for legal and social reasons. Thus, the work contributes to the understanding of specific dual-use risks of AI, the regulation of AWS and cryptography, and the design of OSINT in cybersecurity. By combining concepts from CSS and participatory design methods in HCI, this work provides an interdisciplinary and multi-method contribution.},
    publisher = {Springer Vieweg},
    author = {Riebe, Thea},
    year = {2023},
    note = {https://doi.org/10.1007/978-3-658-41667-6},
    keywords = {HCI, Projekt-KontiKat, Peace, Projekt-DualUse, Projekt-CYWARN, Dissertation},
    }

    2022

  • Thea Riebe, Philipp Kuehn, Philipp Imperatori, Christian Reuter (2022)
    U.S. Security Policy: The Dual-Use Regulation of Cryptography and its Effects on Surveillance
    European Journal for Security Research (EJSR) . doi:10.1007/s41125-022-00080-0
    [BibTeX] [Abstract] [Download PDF]

    Cryptography has become ubiquitous in communication technology and is considered a necessary part of information security. However, both the regulation to restrict access to cryptography, as well as practices to weaken or break encryption, are part of the States’ security policies. The United States (U.S.) regulate cryptography for export in international trade as a dual-use good. However, the regulation has been increasingly loosened and transferred to bilateral agreements with Information and Communication Technology companies. At the same time, the National Security Agency attempted to implement a government encryption standard to guarantee itself easier access to data, thus progressively expanding surveillance on non-U.S. citizens. In this paper, using comparative policy analysis, we examine the evolution of both security policies by tracing the historical development of U.S. regulation of cryptography as a dual-use good, and surveillance technologies, and practices used from the 1990s to today. We conclude that the impact of the dual-use regulation has affected the efficiency of surveillance technology, by loosening regulations only for mass communication services, thereby supporting the proliferation of surveillance intermediaries, while working on strategies to collaborate and exploit their coverage.

    @article{riebe_us_2022,
    title = {U.{S}. {Security} {Policy}: {The} {Dual}-{Use} {Regulation} of {Cryptography} and its {Effects} on {Surveillance}},
    url = {https://link.springer.com/content/pdf/10.1007/s41125-022-00080-0.pdf},
    doi = {10.1007/s41125-022-00080-0},
    abstract = {Cryptography has become ubiquitous in communication technology and is considered a necessary part of information security. However, both the regulation to restrict access to cryptography, as well as practices to weaken or break encryption, are part of the States’ security policies. The United States (U.S.) regulate cryptography for export in international trade as a dual-use good. However, the regulation has been increasingly loosened and transferred to bilateral agreements with Information and Communication Technology companies. At the same time, the National Security Agency attempted to implement a government encryption standard to guarantee itself easier access to data, thus progressively expanding surveillance on non-U.S. citizens. In this paper, using comparative policy analysis, we examine the evolution of both security policies by tracing the historical development of U.S. regulation of cryptography as a dual-use good, and surveillance technologies, and practices used from the 1990s to today. We conclude that the impact of the dual-use regulation has affected the efficiency of surveillance technology, by loosening regulations only for mass communication services, thereby supporting the proliferation of surveillance intermediaries, while working on strategies to collaborate and exploit their coverage.},
    journal = {European Journal for Security Research (EJSR)},
    author = {Riebe, Thea and Kuehn, Philipp and Imperatori, Philipp and Reuter, Christian},
    year = {2022},
    keywords = {Student, Security, Projekt-KontiKat, Projekt-CYWARN},
    }

  • Christian Reuter (2022)
    A European Perspective on Crisis Informatics: Citizens‘ and Authorities‘ attitudes towards Social Media for Public Safety and Security
    1 ed. Wiesbaden: Springer Vieweg. doi:https://doi.org/10.1007/978-3-658-39720-3
    [BibTeX] [Abstract] [Download PDF]

    Mobilising helpers in the event of a flood or letting friends know that you are okay in the event of a terrorist attack – more and more people are using social media in emergency, crisis or disaster situations. Storms, floods, attacks or pandemics (esp. COVID-19) show that citizens use social media to inform themselves or to coordinate. This thesis presents qualitative and quantitative studies on the attitudes of emergency services and citizens in Europe towards social media in emergencies. Across the individual sub-studies, almost 10,000 people are surveyed including representative studies in the Netherlands, Germany, the UK and Italy. The work empirically shows that social media is increasingly important for emergency services, both for prevention and during crises; that private use of social media is a driving force in shaping opinions for organisational use; and that citizens have high expectations towards authorities, especially monitoring social media is expected, and sometimes responses within one hour. Depending on the risk culture, the data show further differences, e.g. whether the state (Germany) or the individual (Netherlands) is seen as primarily responsible for coping with the situation.

    @book{reuter_european_2022,
    address = {Wiesbaden},
    edition = {1},
    title = {A {European} {Perspective} on {Crisis} {Informatics}: {Citizens}' and {Authorities}' attitudes towards {Social} {Media} for {Public} {Safety} and {Security}},
    isbn = {978-3-658-39719-7},
    url = {https://link.springer.com/book/10.1007/978-3-658-39720-3},
    abstract = {Mobilising helpers in the event of a flood or letting friends know that you are okay in the event of a terrorist attack – more and more people are using social media in emergency, crisis or disaster situations. Storms, floods, attacks or pandemics (esp. COVID-19) show that citizens use social media to inform themselves or to coordinate. This thesis presents qualitative and quantitative studies on the attitudes of emergency services and citizens in Europe towards social media in emergencies. Across the individual sub-studies, almost 10,000 people are surveyed including representative studies in the Netherlands, Germany, the UK and Italy. The work empirically shows that social media is increasingly important for emergency services, both for prevention and during crises; that private use of social media is a driving force in shaping opinions for organisational use; and that citizens have high expectations towards authorities, especially monitoring social media is expected, and sometimes responses within one hour. Depending on the risk culture, the data show further differences, e.g. whether the state (Germany) or the individual (Netherlands) is seen as primarily responsible for coping with the situation.},
    language = {en},
    publisher = {Springer Vieweg},
    author = {Reuter, Christian},
    year = {2022},
    doi = {https://doi.org/10.1007/978-3-658-39720-3},
    keywords = {Crisis, HCI, SocialMedia, Projekt-EmerGent, Projekt-KontiKat, Projekt-ATHENE-SecUrban, Projekt-emergenCITY, Dissertation},
    }

  • Stefka Schmid, Thea Riebe, Christian Reuter (2022)
    Dual-Use and Trustworthy? A Mixed Methods Analysis of AI Diffusion between Civilian and Defense R&D
    Science and Engineering Ethics ;28(12):1–23. doi:10.1007/s11948-022-00364-7
    [BibTeX] [Abstract] [Download PDF]

    Artificial Intelligence (AI) seems to be impacting all industry sectors, while becoming a motor for innovation. The diffusion of AI from the civilian sector to the defense sector, and AI’s dual-use potential has drawn attention from security and ethics scholars. With the publication of the ethical guideline Trustworthy AI by the European Union (EU), normative questions on the application of AI have been further evaluated. In order to draw conclusions on Trustworthy AI as a point of reference for responsible research and development (R&D), we approach the diffusion of AI across both civilian and military spheres in the EU. We capture the extent of technological diffusion and derive European and German patent citation networks. Both networks indicate a low degree of diffusion of AI between civilian and defense sectors. A qualitative investigation of project descriptions of a research institute’s work in both civilian and military fields shows that military AI applications stress accuracy or robustness, while civilian AI reflects a focus on human-centric values. Our work represents a first approach by linking processes of technology diffusion with normative evaluations of R&D.

    @article{schmid_dual-use_2022,
    title = {Dual-{Use} and {Trustworthy}? {A} {Mixed} {Methods} {Analysis} of {AI} {Diffusion} between {Civilian} and {Defense} {R}\&{D}},
    volume = {28},
    url = {https://peasec.de/paper/2022/2022_SchmidRiebeReuter_DualUseandTrustworthy_ScienceEngineeringEthics.pdf},
    doi = {10.1007/s11948-022-00364-7},
    abstract = {Artificial Intelligence (AI) seems to be impacting all industry sectors, while becoming a motor for innovation. The diffusion of AI from the civilian sector to the defense sector, and AI’s dual-use potential has drawn attention from security and ethics scholars. With the publication of the ethical guideline Trustworthy AI by the European Union (EU), normative questions on the application of AI have been further evaluated. In order to draw conclusions on Trustworthy AI as a point of reference for responsible research and development (R\&D), we approach the diffusion of AI across both civilian and military spheres in the EU. We capture the extent of technological diffusion and derive European and German patent citation networks. Both networks indicate a low degree of diffusion of AI between civilian and defense sectors. A qualitative investigation of project descriptions of a research institute’s work in both civilian and military fields shows that military AI applications stress accuracy or robustness, while civilian AI reflects a focus on human-centric values. Our work represents a first approach by linking processes of technology diffusion with normative evaluations of R\&D.},
    number = {12},
    journal = {Science and Engineering Ethics},
    author = {Schmid, Stefka and Riebe, Thea and Reuter, Christian},
    year = {2022},
    keywords = {A-Paper, Ranking-ImpactFactor, Projekt-KontiKat, Peace, AuswahlPeace, Projekt-CYWARN},
    pages = {1--23},
    }

  • Christian Reuter (2022)
    A European Perspective on Crisis Informatics: Citizens‘ and Authorities‘ attitudes towards Social Media for Public Safety and Security
    Nijmegen: The Radboud University Thesis Repository.
    [BibTeX] [Abstract] [Download PDF]

    Mobilising helpers in the event of a flood or letting friends know that you are okay in the event of a terrorist attack – more and more people are using social media in emergency, crisis or disaster situations. Storms, floods, attacks or pandemics (esp. COVID-19) show that citizens use social media to inform themselves or to coordinate. This thesis presents qualitative and quantitative studies on the attitudes of emergency services and citizens in Europe towards social media in emergencies. Across the individual sub-studies, almost 10,000 people are surveyed including representative studies in the Netherlands, Germany, the UK and Italy. The work empirically shows that social media is increasingly important for emergency services, both for prevention and during crises; that private use of social media is a driving force in shaping opinions for organisational use; and that citizens have high expectations towards authorities, especially monitoring social media is expected, and sometimes responses within one hour. Depending on the risk culture, the data show further differences, e.g. whether the state (Germany) or the individual (Netherlands) is seen as primarily responsible for coping with the situation.

    @book{reuter_european_2022-1,
    address = {Nijmegen},
    title = {A {European} {Perspective} on {Crisis} {Informatics}: {Citizens}' and {Authorities}' attitudes towards {Social} {Media} for {Public} {Safety} and {Security}},
    url = {https://repository.ubn.ru.nl/handle/2066/253000},
    abstract = {Mobilising helpers in the event of a flood or letting friends know that you are okay in the event of a terrorist attack – more and more people are using social media in emergency, crisis or disaster situations. Storms, floods, attacks or pandemics (esp. COVID-19) show that citizens use social media to inform themselves or to coordinate. This thesis presents qualitative and quantitative studies on the attitudes of emergency services and citizens in Europe towards social media in emergencies. Across the individual sub-studies, almost 10,000 people are surveyed including representative studies in the Netherlands, Germany, the UK and Italy. The work empirically shows that social media is increasingly important for emergency services, both for prevention and during crises; that private use of social media is a driving force in shaping opinions for organisational use; and that citizens have high expectations towards authorities, especially monitoring social media is expected, and sometimes responses within one hour. Depending on the risk culture, the data show further differences, e.g. whether the state (Germany) or the individual (Netherlands) is seen as primarily responsible for coping with the situation.},
    publisher = {The Radboud University Thesis Repository},
    author = {Reuter, Christian},
    year = {2022},
    keywords = {AuswahlCrisis, Crisis, HCI, Selected, SocialMedia, Projekt-EmerGent, Projekt-KontiKat, Projekt-ATHENE-SecUrban, Projekt-emergenCITY, Dissertation},
    }

    2021

  • Christian Reuter (2021)
    Sicherheitskritische Mensch-Computer-Interaktion: Interaktive Technologien und Soziale Medien im Krisen- und Sicherheitsmanagement (Zweite Auflage)
    2 ed. Wiesbaden: Springer Vieweg.
    [BibTeX] [Abstract] [Download PDF]

    Die zweite, aktualisierte Auflage dieses Lehr- und Fachbuchs gibt eine fundierte und praxisbezogene Einführung sowie einen Überblick über Grundlagen, Methoden und Anwendungen der Mensch-Computer-Interaktion im Kontext von Sicherheit, Notfällen, Krisen, Katastrophen, Krieg und Frieden. Dies adressierend werden interaktive, mobile, ubiquitäre und kooperative Technologien sowie soziale Medien vorgestellt. Hierbei finden klassische Themen wie benutzbare (IT-)Sicherheit, Industrie 4.0, Katastrophenschutz, Medizin und Automobil, aber auch Augmented Reality, Crowdsourcing, Shitstorm Management, Social Media Analytics und Cyberwar ihren Platz. Methodisch wird das Spektrum von Usable Safety bis Usable Security Engineering von Analyse über Design bis Evaluation abgedeckt. Das Buch eignet sich ebenso als Lehrbuch für Studierende wie als Handbuch für Wissenschaftler, Designer, Entwickler und Anwender.

    @book{reuter_sicherheitskritische_2021,
    address = {Wiesbaden},
    edition = {2},
    title = {Sicherheitskritische {Mensch}-{Computer}-{Interaktion}: {Interaktive} {Technologien} und {Soziale} {Medien} im {Krisen}- und {Sicherheitsmanagement} ({Zweite} {Auflage})},
    isbn = {978-3-658-32795-8},
    url = {https://www.springer.com/de/book/9783658327941},
    abstract = {Die zweite, aktualisierte Auflage dieses Lehr- und Fachbuchs gibt eine fundierte und praxisbezogene Einführung sowie einen Überblick über Grundlagen, Methoden und Anwendungen der Mensch-Computer-Interaktion im Kontext von Sicherheit, Notfällen, Krisen, Katastrophen, Krieg und Frieden. Dies adressierend werden interaktive, mobile, ubiquitäre und kooperative Technologien sowie soziale Medien vorgestellt. Hierbei finden klassische Themen wie benutzbare (IT-)Sicherheit, Industrie 4.0, Katastrophenschutz, Medizin und Automobil, aber auch Augmented Reality, Crowdsourcing, Shitstorm Management, Social Media Analytics und Cyberwar ihren Platz. Methodisch wird das Spektrum von Usable Safety bis Usable Security Engineering von Analyse über Design bis Evaluation abgedeckt. Das Buch eignet sich ebenso als Lehrbuch für Studierende wie als Handbuch für Wissenschaftler, Designer, Entwickler und Anwender.},
    publisher = {Springer Vieweg},
    author = {Reuter, Christian},
    year = {2021},
    keywords = {AuswahlCrisis, HCI, Selected, SocialMedia, UsableSec, Security, Projekt-KontiKat, Peace, Infrastructure, Projekt-ATHENE-SecUrban, Projekt-CYWARN, Projekt-emergenCITY},
    }

  • Christian Reuter, Konstantin Aal, Frank Beham, Alexander Boden, Florian Brauner, Thomas Ludwig, Stephan Lukosch, Frank Fiedrich, Frank Fuchs-Kittowski, Stefan Geisler, Klaus Gennen, Dominik Herrmann, Marc-André Kaufhold, Michael Klafft, Myriam Lipprandt, Luigi Lo Iacono, Volkmar Pipek, Tilo Mentler, Simon Nestler, Jens Pottebaum, Sven Quadflieg, Stefan Stieglitz, Christian Sturm, Gebhard Rusch, Stefan Sackmann, Melanie Volkamer, Volker Wulf (2021)
    Die Zukunft sicherheitskritischer Mensch-Computer-Interaktion
    In: Christian ReuterSicherheitskritische Mensch-Computer-Interaktion: Interaktive Technologien und Soziale Medien im Krisen- und Sicherheitsmanagement (2. Auflage). 2 ed. Wiesbaden, Germany: Springer Vieweg, , 673–681.
    [BibTeX] [Abstract] [Download PDF]

    Sicherheitskritische Mensch-Computer-Interaktion ist nicht nur derzeit ein hochaktuel-les Thema, sondern wird dies auch in Zukunft bleiben. Insofern ist ein Lehr- und Fach-buch wie dieses immer nur eine Momentaufnahme, und kann immer nur einen punktuel-len Stand abdecken. Dennoch kann der Versuch unternommen werden, aktuelle Trends zu identifizieren und einen Ausblick in die Zukunft zu wagen. Genau das möchte dieses Kapitel erreichen: Es sollen zukünftige Entwicklungen vorausgesagt und versucht wer-den, diese korrekt einzuordnen. Das ist an dieser Stelle nicht nur durch den Herausgeber, sondern durch Abfrage bei zahlreichen am Lehrbuch beteiligten Autor*innen geschehen. Neben einem Ausblick auf Grundlagen und Methoden werden dementsprechend auch sicherheitskritische interaktive Systeme und sicherheitskritische kooperative Systeme abgedeckt.

    @incollection{reuter_zukunft_2021,
    address = {Wiesbaden, Germany},
    edition = {2},
    title = {Die {Zukunft} sicherheitskritischer {Mensch}-{Computer}-{Interaktion}},
    isbn = {978-3-658-19523-6},
    url = {https://doi.org/10.1007/978-3-658-32795-8_31},
    abstract = {Sicherheitskritische Mensch-Computer-Interaktion ist nicht nur derzeit ein hochaktuel-les Thema, sondern wird dies auch in Zukunft bleiben. Insofern ist ein Lehr- und Fach-buch wie dieses immer nur eine Momentaufnahme, und kann immer nur einen punktuel-len Stand abdecken. Dennoch kann der Versuch unternommen werden, aktuelle Trends zu identifizieren und einen Ausblick in die Zukunft zu wagen. Genau das möchte dieses Kapitel erreichen: Es sollen zukünftige Entwicklungen vorausgesagt und versucht wer-den, diese korrekt einzuordnen. Das ist an dieser Stelle nicht nur durch den Herausgeber, sondern durch Abfrage bei zahlreichen am Lehrbuch beteiligten Autor*innen geschehen. Neben einem Ausblick auf Grundlagen und Methoden werden dementsprechend auch sicherheitskritische interaktive Systeme und sicherheitskritische kooperative Systeme abgedeckt.},
    booktitle = {Sicherheitskritische {Mensch}-{Computer}-{Interaktion}: {Interaktive} {Technologien} und {Soziale} {Medien} im {Krisen}- und {Sicherheitsmanagement} (2. {Auflage})},
    publisher = {Springer Vieweg},
    author = {Reuter, Christian and Aal, Konstantin and Beham, Frank and Boden, Alexander and Brauner, Florian and Ludwig, Thomas and Lukosch, Stephan and Fiedrich, Frank and Fuchs-Kittowski, Frank and Geisler, Stefan and Gennen, Klaus and Herrmann, Dominik and Kaufhold, Marc-André and Klafft, Michael and Lipprandt, Myriam and Lo Iacono, Luigi and Pipek, Volkmar and Mentler, Tilo and Nestler, Simon and Pottebaum, Jens and Quadflieg, Sven and Stieglitz, Stefan and Sturm, Christian and Rusch, Gebhard and Sackmann, Stefan and Volkamer, Melanie and Wulf, Volker},
    editor = {Reuter, Christian},
    year = {2021},
    note = {https://doi.org/10.1007/978-3-658-32795-8\_31},
    keywords = {Crisis, HCI, SocialMedia, UsableSec, Security, Projekt-KontiKat, Projekt-CYWARN},
    pages = {673--681},
    }

  • Marc-André Kaufhold (2021)
    Information Refinement Technologies for Crisis Informatics: User Expectations and Design Principles for Social Media and Mobile Apps
    Wiesbaden, Germany: Springer Vieweg. doi:10.1007/978-3-658-33341-6
    [BibTeX] [Abstract] [Download PDF]

    Marc-André Kaufhold explores user expectations and design implications for the utilization of new media in crisis management and response. He develops a novel framework for information refinement, which integrates the event, organisational, societal, and technological perspectives of crises. Therefore, he reviews the state of the art on crisis informatics and empirically examines the use, potentials and barriers of both social media and mobile apps. Based on these insights, he designs and evaluates ICT concepts and artifacts with the aim to overcome the issues of information overload and quality in large-scale crises, concluding with practical and theoretical implications for technology adaptation and design.

    @book{kaufhold_information_2021,
    address = {Wiesbaden, Germany},
    title = {Information {Refinement} {Technologies} for {Crisis} {Informatics}: {User} {Expectations} and {Design} {Principles} for {Social} {Media} and {Mobile} {Apps}},
    isbn = {978-3-658-33343-0},
    url = {https://www.springer.com/gp/book/9783658333430},
    abstract = {Marc-André Kaufhold explores user expectations and design implications for the utilization of new media in crisis management and response. He develops a novel framework for information refinement, which integrates the event, organisational, societal, and technological perspectives of crises. Therefore, he reviews the state of the art on crisis informatics and empirically examines the use, potentials and barriers of both social media and mobile apps. Based on these insights, he designs and evaluates ICT concepts and artifacts with the aim to overcome the issues of information overload and quality in large-scale crises, concluding with practical and theoretical implications for technology adaptation and design.},
    publisher = {Springer Vieweg},
    author = {Kaufhold, Marc-André},
    year = {2021},
    doi = {10.1007/978-3-658-33341-6},
    keywords = {Crisis, Projekt-KontiKat, Projekt-ATHENE-SecUrban, Projekt-CYWARN, AuswahlKaufhold, Dissertation},
    }

  • Thea Riebe, Marc-André Kaufhold, Christian Reuter (2021)
    The Impact of Organizational Structure and Technology Use on Collaborative Practices in Computer Emergency Response Teams: An Empirical Study
    Proceedings of the ACM: Human Computer Interaction (PACM): Computer-Supported Cooperative Work and Social Computing ;5(CSCW2). doi:10.1145/3479865
    [BibTeX] [Abstract] [Download PDF]

    Besides the merits of increasing digitization and interconnectedness in private and professional spaces, critical infrastructures and societies are more and more exposed to cyberattacks. In order to enhance the preventative and reactive capabilities against cyberattacks, Computer Emergency Response Teams (CERTs) are deployed in many countries and organizations. In Germany, CERTs in the public sector operate on federal and state level to provide information security services for authorities, citizens, and enterprises. Their tasks of monitoring, analyzing, and communicating threats and incidents is getting more complex due to the increasing amount of information disseminated into public channels. By adopting the perspectives of Computer-Supported Cooperative Work (CSCW) and Crisis Informatics, we contribute to the study of organizational structures, technology use, and the impact on collaborative practices in and between state CERTs with empirical research based on expert interviews with representatives of German state CERTs (N=15) and supplementary document analyses (N=25). We derive design and policy implications from our findings, including the need for interoperable and modular architecture, a shift towards service level agreements, cross-platform monitoring and analysis of incident data, use of deduplication techniques and standardized threat exchange formats, a reduction of resource costs through process automation, and transparent reporting and tool structures for information exchange.

    @article{riebe_impact_2021,
    title = {The {Impact} of {Organizational} {Structure} and {Technology} {Use} on {Collaborative} {Practices} in {Computer} {Emergency} {Response} {Teams}: {An} {Empirical} {Study}},
    volume = {5},
    url = {https://www.peasec.de/paper/2021/2021_RiebeKaufholdReuter_ComputerEmegencyResponseTeams_CSCW.pdf},
    doi = {10.1145/3479865},
    abstract = {Besides the merits of increasing digitization and interconnectedness in private and professional spaces, critical infrastructures and societies are more and more exposed to cyberattacks. In order to enhance the preventative and reactive capabilities against cyberattacks, Computer Emergency Response Teams (CERTs) are deployed in many countries and organizations. In Germany, CERTs in the public sector operate on federal and state level to provide information security services for authorities, citizens, and enterprises. Their tasks of monitoring, analyzing, and communicating threats and incidents is getting more complex due to the increasing amount of information disseminated into public channels. By adopting the perspectives of Computer-Supported Cooperative Work (CSCW) and Crisis Informatics, we contribute to the study of organizational structures, technology use, and the impact on collaborative practices in and between state CERTs with empirical research based on expert interviews with representatives of German state CERTs (N=15) and supplementary document analyses (N=25). We derive design and policy implications from our findings, including the need for interoperable and modular architecture, a shift towards service level agreements, cross-platform monitoring and analysis of incident data, use of deduplication techniques and standardized threat exchange formats, a reduction of resource costs through process automation, and transparent reporting and tool structures for information exchange.},
    number = {CSCW2},
    journal = {Proceedings of the ACM: Human Computer Interaction (PACM): Computer-Supported Cooperative Work and Social Computing},
    author = {Riebe, Thea and Kaufhold, Marc-André and Reuter, Christian},
    year = {2021},
    keywords = {Crisis, UsableSec, Security, A-Paper, Ranking-CORE-A, Projekt-KontiKat, Projekt-ATHENE-SecUrban, Projekt-CYWARN, AuswahlUsableSec, AuswahlKaufhold},
    }

  • Christian Reuter, Thomas Ludwig, Volkmar Pipek (2021)
    Resilienz durch Kooperationstechnologien
    In: Christian Reuter: Sicherheitskritische Mensch-Computer-Interaktion: Interaktive Technologien und Soziale Medien im Krisen- und Sicherheitsmanagement. Wiesbaden, Germany: Springer Vieweg, , 473–493. doi:10.1007/978-3-658-32795-8_22
    [BibTeX] [Abstract] [Download PDF]

    Kooperationstechnologien spielen in sicherheitskritischen Systemen eine große Rolle, da in vielen Anwendungsfeldern nicht nur die Interaktion von Mensch und Computer, sondern auch die durch IT unterstützte Kooperation zwischen Menschen notwendig ist, um Aufgaben bewältigen zu können. Solche Technologien müssen verschiedene Anfor-derungen erfüllen und können ebenfalls zur Resilienz beitragen. Unter Resilienz durch Kooperation verstehen wir die Fähigkeit, Krisen durch die Anpassungsfähigkeit an ge-änderte Realitäten ohne nachhaltigen Schaden mithilfe von Kooperation zu überstehen. Während das Konzept der Resilienz in den Ingenieurwissenschaften vornehmlich die Verfügbarkeit technischer Systeme fokussiert, betrachten wir Resilienz als soziotechni-sches Konstrukt, unter expliziter Betrachtung der beteiligten Akteur*innen. Basierend auf Grundlagen zu Kooperationstechnologien zeigt dieses Kapitel anhand von prakti-schen exemplarisch umgesetzten Kooperationstechnologien (soziales Netzwerk, GIS-System, Smartphone Apps, Facebook App und Social Media Analytics-Plattform), wie Kooperation unterstützt wird und zu kooperativer Resilienz beitragen kann.

    @incollection{reuter_resilienz_2021,
    address = {Wiesbaden, Germany},
    title = {Resilienz durch {Kooperationstechnologien}},
    isbn = {978-3-658-32795-8},
    url = {http://www.peasec.de/paper/2021/2021_ReuterLudwigPipek_ResilienzKooperationstechnologien_SecMCI-Kap22.pdf},
    abstract = {Kooperationstechnologien spielen in sicherheitskritischen Systemen eine große Rolle, da in vielen Anwendungsfeldern nicht nur die Interaktion von Mensch und Computer, sondern auch die durch IT unterstützte Kooperation zwischen Menschen notwendig ist, um Aufgaben bewältigen zu können. Solche Technologien müssen verschiedene Anfor-derungen erfüllen und können ebenfalls zur Resilienz beitragen. Unter Resilienz durch Kooperation verstehen wir die Fähigkeit, Krisen durch die Anpassungsfähigkeit an ge-änderte Realitäten ohne nachhaltigen Schaden mithilfe von Kooperation zu überstehen. Während das Konzept der Resilienz in den Ingenieurwissenschaften vornehmlich die Verfügbarkeit technischer Systeme fokussiert, betrachten wir Resilienz als soziotechni-sches Konstrukt, unter expliziter Betrachtung der beteiligten Akteur*innen. Basierend auf Grundlagen zu Kooperationstechnologien zeigt dieses Kapitel anhand von prakti-schen exemplarisch umgesetzten Kooperationstechnologien (soziales Netzwerk, GIS-System, Smartphone Apps, Facebook App und Social Media Analytics-Plattform), wie Kooperation unterstützt wird und zu kooperativer Resilienz beitragen kann.},
    booktitle = {Sicherheitskritische {Mensch}-{Computer}-{Interaktion}: {Interaktive} {Technologien} und {Soziale} {Medien} im {Krisen}- und {Sicherheitsmanagement}},
    publisher = {Springer Vieweg},
    author = {Reuter, Christian and Ludwig, Thomas and Pipek, Volkmar},
    editor = {Reuter, Christian},
    year = {2021},
    doi = {10.1007/978-3-658-32795-8_22},
    keywords = {Cooperation, HCI, SocialMedia, Projekt-KontiKat, Infrastructure, RSF},
    pages = {473--493},
    }

  • Christian Reuter, Marc-André Kaufhold (2021)
    Usable Safety Engineering sicherheitskritischer interaktiver Systeme
    In: Christian Reuter: Sicherheitskritische Mensch-Computer-Interaktion: Interaktive Technologien und Soziale Medien im Krisen- und Sicherheitsmanagement. Wiesbaden, Germany: Springer Vieweg, , 23–45. doi:10.1007/978-3-658-32795-8_2
    [BibTeX] [Abstract] [Download PDF]

    Die Gestaltung gebrauchstauglicher, interaktiver und kooperativer Systeme wird bereits seit den 1980er Jahren in der Disziplin Mensch-Computer-Interaktion (MCI) und Com-puterunterstützte Gruppenarbeit (CSCW) behandelt. Es gibt jedoch einige Besonderhei-ten der MCI im Kontext sicherheitskritischer Systeme, insbesondere der störungsfreien Nutzung von IT (Safety) zu beachten. Dieses Kapitel stellt die wichtigsten Merkmale der Anwendung von Gestaltungsmethoden der MCI in sicherheitskritischen Systemen dar. Hierfür werden zu Beginn die Grundlagen der beiden Gebiete – der MCI sowie des Kri-sen- und Sicherheitsmanagements – erläutert. Darauf aufbauend werden Ansätze und Methoden der Analyse, des Designs und der Entwicklung sowie der Evaluation der MCI unter besonderer Berücksichtigung sicherheitskritischer Systeme diskutiert. Aspekte wie Risikoanalysen in der Anforderungsanalyse, die Einkalkulierung von Bedienfehlern und Rückfallebenen im Systemdesign gehören ebenso dazu wie besondere Herausforderun-gen bei Evaluationen.

    @incollection{reuter_usable_2021,
    address = {Wiesbaden, Germany},
    title = {Usable {Safety} {Engineering} sicherheitskritischer interaktiver {Systeme}},
    isbn = {978-3-658-32795-8},
    url = {https://link.springer.com/chapter/10.1007/978-3-658-32795-8_2},
    abstract = {Die Gestaltung gebrauchstauglicher, interaktiver und kooperativer Systeme wird bereits seit den 1980er Jahren in der Disziplin Mensch-Computer-Interaktion (MCI) und Com-puterunterstützte Gruppenarbeit (CSCW) behandelt. Es gibt jedoch einige Besonderhei-ten der MCI im Kontext sicherheitskritischer Systeme, insbesondere der störungsfreien Nutzung von IT (Safety) zu beachten. Dieses Kapitel stellt die wichtigsten Merkmale der Anwendung von Gestaltungsmethoden der MCI in sicherheitskritischen Systemen dar. Hierfür werden zu Beginn die Grundlagen der beiden Gebiete – der MCI sowie des Kri-sen- und Sicherheitsmanagements – erläutert. Darauf aufbauend werden Ansätze und Methoden der Analyse, des Designs und der Entwicklung sowie der Evaluation der MCI unter besonderer Berücksichtigung sicherheitskritischer Systeme diskutiert. Aspekte wie Risikoanalysen in der Anforderungsanalyse, die Einkalkulierung von Bedienfehlern und Rückfallebenen im Systemdesign gehören ebenso dazu wie besondere Herausforderun-gen bei Evaluationen.},
    booktitle = {Sicherheitskritische {Mensch}-{Computer}-{Interaktion}: {Interaktive} {Technologien} und {Soziale} {Medien} im {Krisen}- und {Sicherheitsmanagement}},
    publisher = {Springer Vieweg},
    author = {Reuter, Christian and Kaufhold, Marc-André},
    editor = {Reuter, Christian},
    year = {2021},
    doi = {10.1007/978-3-658-32795-8_2},
    keywords = {HCI, UsableSec, Security, Projekt-KontiKat, Projekt-CRISP},
    pages = {23--45},
    }

    2020

  • Thea Riebe, Jasmin Haunschild, Felix Divo, Matthias Lang, Gerbert Roitburd, Jonas Franken, Christian Reuter (2020)
    Die Veränderung der Vorratsdatenspeicherung in Europa
    Datenschutz und Datensicherheit – DuD ;44(5):316–321. doi:10.1007/s11623-020-1275-3
    [BibTeX] [Abstract] [Download PDF]

    Die Diskussion um die Vorratsdatenspeicherung ist europaweit weiterhin relevant, da es keine einheitliche Gesetzgebung der EU-Mitgliedsstaaten gibt. So werden in einigen EU-Staaten weiterhin Vorratsdaten gespeichert, obwohl der EuGH die Vorratsdatenspeicherung für teilweise rechtswidrig erklärt hat. Dabei unterscheiden sich die Speicherdauer, die erhobenen Daten und die Rechte der Behörden erheblich. Der Beitrag vergleicht den Umgang mit der Vorratsdatenspeicherung in zehn EU- und Schengen-Staaten im Hinblick auf Einführung und Aussetzung, Speicherdauer, Speicherinhalte und Zugriffsrechte.

    @article{riebe_veranderung_2020,
    title = {Die {Veränderung} der {Vorratsdatenspeicherung} in {Europa}},
    volume = {44},
    url = {https://www.peasec.de/paper/2020/2020_Riebeetal_VDSinEuropa_DuD.pdf},
    doi = {10.1007/s11623-020-1275-3},
    abstract = {Die Diskussion um die Vorratsdatenspeicherung ist europaweit weiterhin relevant, da es keine einheitliche Gesetzgebung der EU-Mitgliedsstaaten gibt. So werden in einigen EU-Staaten weiterhin Vorratsdaten gespeichert, obwohl der EuGH die Vorratsdatenspeicherung für teilweise rechtswidrig erklärt hat. Dabei unterscheiden sich die Speicherdauer, die erhobenen Daten und die Rechte der Behörden erheblich. Der Beitrag vergleicht den Umgang mit der Vorratsdatenspeicherung in zehn EU- und Schengen-Staaten im Hinblick auf Einführung und Aussetzung, Speicherdauer, Speicherinhalte und Zugriffsrechte.},
    number = {5},
    journal = {Datenschutz und Datensicherheit - DuD},
    author = {Riebe, Thea and Haunschild, Jasmin and Divo, Felix and Lang, Matthias and Roitburd, Gerbert and Franken, Jonas and Reuter, Christian},
    year = {2020},
    keywords = {Student, Security, Projekt-KontiKat, Peace, Projekt-DualUse, Projekt-ATHENE-SecUrban},
    pages = {316--321},
    }

  • Thea Riebe, Stefka Schmid, Christian Reuter (2020)
    Meaningful Human Control of Lethal Autonomous Weapon System: The CCW-Debate and its Implications for Value-Sensitive Design
    IEEE Technology and Society Magazine ;39(4):36–51. doi:10.1109/MTS.2020.3031846
    [BibTeX] [Abstract] [Download PDF]

    The debate on the development and deployment of lethal autonomous weapon systems (LAWS) as an emerging technology is of increasing importance, with discussions stalling and technological development progressing. Monitoring the progress of increasingly autonomous weapons systems in civilian and military use as well as regulating possible autonomous systems early on is demanded by civil society actors, like the Campaign to Stop Killer Robots and the International Committee of the Red Cross (ICRC), while nation states follow a variety of interests and strategies, showing little room for consensus on central terms and questions [2], [3]. This article therefore sheds light on the work of the Group of Governmental Experts (GGE) of the UN Convention of Certain Conventional Weapons (CCW). The CCW, offering an arena for international cooperation, has dedicated itself to the purpose of finding common ground with respect to an understanding of LAWS, as well as to the necessary degree of human control. From an ethical perspective, the concept of Meaningful Human Control (MHC) supports a human-centric approach. Several IEEE projects, series and publications are dedicated to this prioritization, especially regarding civilian use. As autonomous technology is increasingly at the center of contemporary military innovations, questions of (human) agency and responsibility in warfare have become even more pressing. As stressed by the United Nations Institute for Disarmament Research (UNIDIR), the concept of MHC may prove useful in the context of development and use of (semi-) autonomous weaponry.

    @article{riebe_meaningful_2020,
    title = {Meaningful {Human} {Control} of {Lethal} {Autonomous} {Weapon} {System}: {The} {CCW}-{Debate} and its {Implications} for {Value}-{Sensitive} {Design}},
    volume = {39},
    url = {https://peasec.de/paper/2020/2020_RiebeSchmidReuter_MHC_IEEETechScieMag.pdf},
    doi = {10.1109/MTS.2020.3031846},
    abstract = {The debate on the development and deployment of lethal autonomous weapon systems (LAWS) as an emerging technology is of increasing importance, with discussions stalling and technological development progressing. Monitoring the progress of increasingly autonomous weapons systems in civilian and military use as well as regulating possible autonomous systems early on is demanded by civil society actors, like the Campaign to Stop Killer Robots and the International Committee of the Red Cross (ICRC), while nation states follow a variety of interests and strategies, showing little room for consensus on central terms and questions [2], [3]. This article therefore sheds light on the work of the Group of Governmental Experts (GGE) of the UN Convention of Certain Conventional Weapons (CCW). The CCW, offering an arena for international cooperation, has dedicated itself to the purpose of finding common ground with respect to an understanding of LAWS, as well as to the necessary degree of human control. From an ethical perspective, the concept of Meaningful Human Control (MHC) supports a human-centric approach. Several IEEE projects, series and publications are dedicated to this prioritization, especially regarding civilian use. As autonomous technology is increasingly at the center of contemporary military innovations, questions of (human) agency and responsibility in warfare have become even more pressing. As stressed by the United Nations Institute for Disarmament Research (UNIDIR), the concept of MHC may prove useful in the context of development and use of (semi-) autonomous weaponry.},
    number = {4},
    journal = {IEEE Technology and Society Magazine},
    author = {Riebe, Thea and Schmid, Stefka and Reuter, Christian},
    year = {2020},
    keywords = {A-Paper, Ranking-ImpactFactor, Projekt-KontiKat, Peace, Projekt-DualUse, AuswahlPeace, Cyberwar},
    pages = {36--51},
    }

  • Christian Reuter (2020)
    Quo Vadis? Digitalisierung und Social Media im Bevölkerungsschutz
    In: Sandra Ückert, Hasan Sürgit, Gerd Diesel: Digitalisierung als Erfolgsfaktor für das Sozial- und Wohlfahrtswesen. Nomos, , 311–318.
    [BibTeX] [Abstract] [Download PDF]

    Wie sieht ein digitalisierter Bevölkerungsschutz aus? Wie lassen sich „digitalisiert“ Leben retten? Was braucht es, um Bevölkerungsschutz zu digitalisieren? Dieses Kapitel soll erste Antworten geben, indem zunächst klären was mit Digitalisierung und sozialen Medien gemeint ist. Anschließend soll die Digitalisierung im Bevölkerungsschutz sowie zuletzt soziale Medien im Bevölkerungsschutz betrachtet werden, bevor ein Fazit gezogen wird.

    @incollection{reuter_quo_2020,
    title = {Quo {Vadis}? {Digitalisierung} und {Social} {Media} im {Bevölkerungsschutz}},
    isbn = {978-3-8487-6250-7},
    url = {https://peasec.de/paper/2020/2020_Reuter_QuoVadisDigitalisierungSocialMediaBevoelkerungsschutz_DigitalisierungSozialWohlfahrtswesen.pdf},
    abstract = {Wie sieht ein digitalisierter Bevölkerungsschutz aus? Wie lassen sich „digitalisiert“ Leben retten? Was braucht es, um Bevölkerungsschutz zu digitalisieren? Dieses Kapitel soll erste Antworten geben, indem zunächst klären was mit Digitalisierung und sozialen Medien gemeint ist. Anschließend soll die Digitalisierung im Bevölkerungsschutz sowie zuletzt soziale Medien im Bevölkerungsschutz betrachtet werden, bevor ein Fazit gezogen wird.},
    booktitle = {Digitalisierung als {Erfolgsfaktor} für das {Sozial}- und {Wohlfahrtswesen}},
    publisher = {Nomos},
    author = {Reuter, Christian},
    editor = {Ückert, Sandra and Sürgit, Hasan and Diesel, Gerd},
    year = {2020},
    keywords = {Crisis, SocialMedia, Projekt-KontiKat},
    pages = {311--318},
    }

  • Christian Reuter, Marc-André Kaufhold, Stefka Schmid (2020)
    Risikokulturen bei der Nutzung Sozialer Medien in Katastrophenlagen
    BBK Bevölkerungsschutz: 2020.
    [BibTeX] [Abstract] [Download PDF]

    Soziale Medien werden auf der ganzen Welt genutzt. Vergleicht man die allgemeine Nutzung sozialer Medien im Vereinigten Königreich (GB), Deutschland (DE), den Niederlanden (NL) und Italien (IT), zeigt sich, dass sie in Italien am wenigsten in Anspruch genommen werden. Dort sind knapp 40 \% der Bevölkerung, d. h. 37 Millionen Menschen, in den sozialen Medien aktiv. Sowohl im Vereinigtem Königreich (59 \%, 39 Mio.), Deutschland (55 \%, 45 Mio.) als auch den Niederlanden (57 \%, 9,74 Mio.) lassen sich ähnliche Tendenzen erkennen. Angesichts der Tatsache, dass mobile Endgeräte, die tendenziell immer griffbereit sind, sehr häufig zur Kommunikation über soziale Medien eingesetzt werden, ist es nicht verwunderlich, dass diese auch in Notsituationen genutzt werden [8]. Bis dato fehlt es an aussagekräftigen quantitativen und vergleichbaren Ergebnissen aus unterschiedlichen Ländern über die Wahrnehmung der Bevölkerung zur Nutzung von sozialen Medien in Notsituationen. Die im Folgenden vorgestellte Studie „The Impact of Risk Cultures: Citizens’ Perception of Social Media Use in Emergencies across Europe” [9] mit Beteiligung der TU Darmstadt, Universität Siegen und dem Tavistock Institute (London), möchte das bestehende Defizit adressieren. Anhand der repräsentativen Umfrageergebnisse werden zunächst vier europäische Länder präsentiert und dann miteinander verglichen. Ziel ist es, Ähnlichkeiten und Unterschiede in der Nutzung sozialer Medien in Notsituationen zu erfassen. Frühere Forschungsergebnisse haben im Hinblick auf Katastrophen gezeigt, dass es unterschiedliche Risikokulturen in europäischen Ländern gibt, die das Verhalten der Bevölkerung jeweils unterschiedlich beeinflussen und prägen (vgl. [4]; [5]).

    @techreport{reuter_risikokulturen_2020,
    address = {BBK Bevölkerungsschutz},
    title = {Risikokulturen bei der {Nutzung} {Sozialer} {Medien} in {Katastrophenlagen}},
    url = {https://peasec.de/paper/2020/2020_ReuterKaufholdSchmid_Risikokulturen_BBK.pdf},
    abstract = {Soziale Medien werden auf der ganzen Welt genutzt. Vergleicht man die allgemeine Nutzung sozialer Medien im Vereinigten Königreich (GB), Deutschland (DE), den Niederlanden (NL) und Italien (IT), zeigt sich, dass sie in Italien am
    wenigsten in Anspruch genommen werden. Dort sind knapp
    40 \% der Bevölkerung, d. h. 37 Millionen Menschen, in den
    sozialen Medien aktiv. Sowohl im Vereinigtem Königreich
    (59 \%, 39 Mio.), Deutschland (55 \%, 45 Mio.) als auch den Niederlanden (57 \%, 9,74 Mio.) lassen sich ähnliche Tendenzen
    erkennen. Angesichts der Tatsache, dass mobile Endgeräte,
    die tendenziell immer griffbereit sind, sehr häufig zur Kommunikation über soziale Medien eingesetzt werden, ist es
    nicht verwunderlich, dass diese auch in Notsituationen genutzt werden [8]. Bis dato fehlt es an aussagekräftigen
    quantitativen und vergleichbaren Ergebnissen aus unterschiedlichen Ländern über die Wahrnehmung der Bevölkerung zur Nutzung von sozialen Medien in Notsituationen.
    Die im Folgenden vorgestellte Studie „The Impact of
    Risk Cultures: Citizens’ Perception of Social Media Use in
    Emergencies across Europe” [9] mit Beteiligung der TU
    Darmstadt, Universität Siegen und dem Tavistock Institute
    (London), möchte das bestehende Defizit adressieren. Anhand der repräsentativen Umfrageergebnisse werden zunächst vier europäische Länder präsentiert und dann miteinander verglichen. Ziel ist es, Ähnlichkeiten und Unterschiede in der Nutzung sozialer Medien in Notsituationen
    zu erfassen. Frühere Forschungsergebnisse haben im Hinblick auf Katastrophen gezeigt, dass es unterschiedliche
    Risikokulturen in europäischen Ländern gibt, die das Verhalten der Bevölkerung jeweils unterschiedlich beeinflussen
    und prägen (vgl. [4]; [5]).},
    author = {Reuter, Christian and Kaufhold, Marc-André and Schmid, Stefka},
    year = {2020},
    keywords = {Crisis, SocialMedia, Projekt-KontiKat},
    pages = {14--17},
    }

  • Sohaib S. Hassan, Christian Reuter, Levan Bzhalava (2020)
    Perception or capability? – An empirical investigation of the factors influencing the adoption of social media and public cloud in German SMEs
    International Journal of Innovation Management ;2150002:1–26. doi:10.1142/S136391962150002X
    [BibTeX] [Abstract] [Download PDF]

    Social media and public cloud computing (SM&PC) have emerged as important resources of small and medium enterprises (SMEs), but not all SMEs use SM&PC. The existing research predominantly focuses on the role of either the features of social media and cloud computing in relation to the perceptions of decision makers or the internal capabilities of organization concerning new innovation adoption. By integrating multidisciplinary literature, we, instead, argues that both the perception- and capability-related factors could play an important role in the adoption of new ICT technology, such as SM&PC. Therefore, we empirically investigated the decision maker’s perception-related and SME’s capability-related factors that may influence the adoption of SM&PC in SMEs in Germany. We used quantitative research methods to examine the proposed hypotheses on a sample of 2,404 SMEs from 17 industrial sectors. The results demonstrate that the decisions of German SMEs to engage in social media and cloud computing are not only influenced by the perceptions of SME owners about the usefulness, security aspects, and the implementation costs of SM&PC, but also by the internal capabilities of an SME, namely the innovativeness of an SME. The results and potential contributions of our research are discussed.

    @article{s_hassan_perception_2020,
    title = {Perception or capability? – {An} empirical investigation of the factors influencing the adoption of social media and public cloud in {German} {SMEs}},
    volume = {2150002},
    url = {https://peasec.de/paper/2020/2020_HassanReuterBzhalava_AdoptionSocialMediaSME_IJIM.pdf},
    doi = {10.1142/S136391962150002X},
    abstract = {Social media and public cloud computing (SM\&PC) have emerged as important resources of small and medium enterprises (SMEs), but not all SMEs use SM\&PC. The existing research predominantly focuses on the role of either the features of social media and cloud computing in relation to the perceptions of decision makers or the internal capabilities of organization concerning new innovation adoption. By integrating multidisciplinary literature, we, instead, argues that both the perception- and capability-related factors could play an important role in the adoption of new ICT technology, such as SM\&PC. Therefore, we empirically investigated the decision maker's perception-related and SME's capability-related factors that may influence the adoption of SM\&PC in SMEs in Germany. We used quantitative research methods to examine the proposed hypotheses on a sample of 2,404 SMEs from 17 industrial sectors. The results demonstrate that the decisions of German SMEs to engage in social media and cloud computing are not only influenced by the perceptions of SME owners about the usefulness, security aspects, and the implementation costs of SM\&PC, but also by the internal capabilities of an SME, namely the innovativeness of an SME. The results and potential contributions of our research are discussed.},
    journal = {International Journal of Innovation Management},
    author = {S. Hassan, Sohaib and Reuter, Christian and Bzhalava, Levan},
    year = {2020},
    keywords = {HCI, SocialMedia, UsableSec, Ranking-VHB-B, Projekt-KontiKat, Projekt-HyServ},
    pages = {1--26},
    }

  • Marc-André Kaufhold (2020)
    Information Refinement Technologies for Crisis Informatics: User Expectations and Design Implications for Social Media and Mobile Apps in Crisis
    Darmstadt, Germany: Dissertation (Dr. rer. nat.), Department of Computer Science, Technische Unviersität Darmstadt.
    [BibTeX] [Abstract] [Download PDF]

    In den letzten 20 Jahren haben sich mobile Technologien und soziale Medien nicht nur im Alltag, sondern auch in Krisensituationen etabliert. Insbesondere großflächige Ereignisse wie der Hurrikan Sandy (2012) oder das mitteleuropäische Hochwasser (2013) haben gezeigt, dass sich die Bevölkerung aktiv mit Informations- und Kommunikationstechnologie (IKT) an der Schadensbewältigung beteiligt (Reuter, Hughes, et al., 2018). Daraus ist das Forschungsfeld der Kriseninformatik entstanden, welches Wissen der Informatik und Gesellschaftswissenschaften kombiniert und zudem in Disziplinen wie der MenschMaschine-Interaktion (HCI), Computerunterstützten Gruppenarbeit (CSCW) und Wirtschaftsinformatik (WI) verankert ist. Während die Bevölkerung IKT einsetzt, um die Unsicherheiten in Krisen zu bewältigen, nutzen Behörden und Organisationen mit Sicherheitsaufgaben (BOS), etwa Feuerwehr und Polizei, öffentliche Daten, um das Situationsbewusstsein und die Entscheidungsfindung für eine bessere Schadensbewältigung zu verbessern (Palen & Anderson, 2016). Noch größere Katastrophen wie die aktuelle COVID-19-Pandemie verstärken dabei die Herausforderungen der Kriseninformatik (Xie et al., 2020). Für BOS stellt die umfangreiche Menge heterogener und semantisch verknüpfter Daten, auch Social Big Data genannt (Olshannikova et al., 2017), eine große Herausforderung im Hinblick auf die Qualität, Quantität und den Zugriff auf relevante Informationen dar. Um ein Situationsbewusstsein und nutzbare Informationen, d. h. die richtigen Informationen zur richtigen Zeit bei der richtigen Person, zu erhalten (Zade et al., 2018), müssen Informationen auf die Bedingungen des Ereignisses, organisationale Anforderungen, soziale Rahmenbedingungen und technische Möglichkeiten verfeinert werden. Diese Dissertation kombiniert das methodische Framework der Designfallstudien (Wulf et al., 2011) mit den Prinzipien der Design-Science-Forschung (Hevner et al., 2004), um das Thema der Informationsverfeinerung (Information Refinement) in vier Phasen zu untersuchen, wovon jede unterschiedliche Forschungsbeiträge hervorbringt. Die Arbeit begutachtet zunächst Nutzungs-, Rollen- und Wahrnehmungsmuster in der Kriseninformatik und stellt die Potenziale sozialer Medien zur öffentlichen Teilhabe an der Krisenbewältigung heraus. Die empirische Studien mit der deutschen Bevölkerung zeigen die positiven Einstellungen und die steigende Nutzung mobiler und sozialer Technologien in Krisen, stellen aber auch Barrieren heraus und zeigen die Erwartung, dass BOS in soziale Medien aktiv sind. Die Ergebnisse fundieren das Design innovativer IKT-Artefakte, darunter visuelle Bevölkerungsrichtlinien für soziale Medien in Krisen (SMG), ein Web-Interface für BOS zur Aggregation mobiler und sozialer Daten (ESI), ein Algorithmus zur Extraktion relevanter Informationen in sozialen Medien (SMO), und eine mobile App für die bidirektionale Kommunikation zwischen BOS und Bevölkerung (112.social). Die Evaluation der Artefakte involviert EndnutzerInnen aus dem Anwendungsfeld des Krisenmanagements, um potenziale für Verbesserungen und zukünftige Forschung zu identifizieren. Die Arbeit schließt mit einem Framework zur Informationsverfeinerung für die Kriseninformatik ab, welche die event-, gesellschafts-, organisation- und technologiebasierte Perspektive integriert.

    @book{kaufhold_information_2020,
    address = {Darmstadt, Germany},
    title = {Information {Refinement} {Technologies} for {Crisis} {Informatics}: {User} {Expectations} and {Design} {Implications} for {Social} {Media} and {Mobile} {Apps} in {Crisis}},
    url = {https://doi.org/10.26083/tuprints-00017474},
    abstract = {In den letzten 20 Jahren haben sich mobile Technologien und soziale Medien nicht nur im Alltag, sondern auch in Krisensituationen etabliert. Insbesondere großflächige Ereignisse wie der Hurrikan Sandy (2012) oder das mitteleuropäische Hochwasser (2013) haben gezeigt, dass sich die Bevölkerung aktiv mit Informations- und Kommunikationstechnologie (IKT) an der Schadensbewältigung beteiligt (Reuter, Hughes, et al., 2018). Daraus ist das Forschungsfeld der Kriseninformatik entstanden, welches Wissen der Informatik und Gesellschaftswissenschaften kombiniert und zudem in Disziplinen wie der MenschMaschine-Interaktion (HCI), Computerunterstützten Gruppenarbeit (CSCW) und Wirtschaftsinformatik (WI) verankert ist. Während die Bevölkerung IKT einsetzt, um die Unsicherheiten in Krisen zu bewältigen, nutzen Behörden und Organisationen mit Sicherheitsaufgaben (BOS), etwa Feuerwehr und Polizei, öffentliche Daten, um das Situationsbewusstsein und die Entscheidungsfindung für eine bessere Schadensbewältigung zu verbessern (Palen \& Anderson, 2016). Noch größere Katastrophen wie die aktuelle COVID-19-Pandemie verstärken dabei die Herausforderungen der Kriseninformatik (Xie et al., 2020). Für BOS stellt die umfangreiche Menge heterogener und semantisch verknüpfter Daten, auch Social Big Data genannt (Olshannikova et al., 2017), eine große Herausforderung im Hinblick auf die Qualität, Quantität und den Zugriff auf relevante Informationen dar. Um ein Situationsbewusstsein und nutzbare Informationen, d. h. die richtigen Informationen zur richtigen Zeit bei der richtigen Person, zu erhalten (Zade et al., 2018), müssen Informationen auf die Bedingungen des Ereignisses, organisationale Anforderungen, soziale Rahmenbedingungen und technische Möglichkeiten verfeinert werden. Diese Dissertation kombiniert das methodische Framework der Designfallstudien (Wulf et al., 2011) mit den Prinzipien der Design-Science-Forschung (Hevner et al., 2004), um das Thema der Informationsverfeinerung (Information Refinement) in vier Phasen zu untersuchen, wovon jede unterschiedliche Forschungsbeiträge hervorbringt. Die Arbeit begutachtet zunächst Nutzungs-, Rollen- und Wahrnehmungsmuster in der Kriseninformatik und stellt die Potenziale sozialer Medien zur öffentlichen Teilhabe an der Krisenbewältigung heraus. Die empirische Studien mit der deutschen Bevölkerung zeigen die positiven Einstellungen und die steigende Nutzung mobiler und sozialer Technologien in Krisen, stellen aber auch Barrieren heraus und zeigen die Erwartung, dass BOS in soziale Medien aktiv sind. Die Ergebnisse fundieren das Design innovativer IKT-Artefakte, darunter visuelle Bevölkerungsrichtlinien für soziale Medien in Krisen (SMG), ein Web-Interface für BOS zur Aggregation mobiler und sozialer Daten (ESI), ein Algorithmus zur Extraktion relevanter Informationen in sozialen Medien (SMO), und eine mobile App für die bidirektionale Kommunikation zwischen BOS und Bevölkerung (112.social). Die Evaluation der Artefakte involviert EndnutzerInnen aus dem Anwendungsfeld des Krisenmanagements, um potenziale für Verbesserungen und zukünftige Forschung zu identifizieren. Die Arbeit schließt mit einem Framework zur Informationsverfeinerung für die Kriseninformatik ab, welche die event-, gesellschafts-, organisation- und technologiebasierte Perspektive integriert.},
    publisher = {Dissertation (Dr. rer. nat.), Department of Computer Science, Technische Unviersität Darmstadt},
    author = {Kaufhold, Marc-André},
    year = {2020},
    keywords = {Crisis, Projekt-KontiKat, Projekt-ATHENE-SecUrban, Projekt-CYWARN, Dissertation},
    }

  • Marc-André Kaufhold, Nicola Rupp, Christian Reuter, Matthias Habdank (2020)
    Mitigating Information Overload in Social Media during Conflicts and Crises: Design and Evaluation of a Cross-Platform Alerting System
    Behaviour & Information Technology (BIT) ;39(3):319–342. doi:10.1080/0144929X.2019.1620334
    [BibTeX] [Abstract] [Download PDF]

    The research field of crisis informatics examines, amongst others, the potentials and barriers of social media use during conflicts and crises. Social media allow emergency services to reach the public easily in the context of crisis communication and receive valuable information (e.g. pictures) from social media data. However, the vast amount of data generated during large-scale incidents can lead to issues of information overload and quality. To mitigate these issues, this paper proposes the semi-automatic creation of alerts including keyword, relevance and information quality filters based on cross-platform social media data. We conducted empirical studies and workshops with emergency services across Europe to raise requirements, then iteratively designed and implemented an approach to support emergency services, and performed multiple evaluations, including live demonstrations and field trials, to research the potentials of social media-based alerts. Finally, we present the findings and implications based on semi-structured interviews with emergency services, highlighting the need for usable configurability and white-box algorithm representation.

    @article{kaufhold_mitigating_2020,
    title = {Mitigating {Information} {Overload} in {Social} {Media} during {Conflicts} and {Crises}: {Design} and {Evaluation} of a {Cross}-{Platform} {Alerting} {System}},
    volume = {39},
    url = {https://www.tandfonline.com/doi/full/10.1080/0144929X.2019.1620334},
    doi = {10.1080/0144929X.2019.1620334},
    abstract = {The research field of crisis informatics examines, amongst others, the potentials and barriers of social media use during conflicts and crises. Social media allow emergency services to reach the public easily in the context of crisis communication and receive valuable information (e.g. pictures) from social media data. However, the vast amount of data generated during large-scale incidents can lead to issues of information overload and quality. To mitigate these issues, this paper proposes the semi-automatic creation of alerts including keyword, relevance and information quality filters based on cross-platform social media data. We conducted empirical studies and workshops with emergency services across Europe to raise requirements, then iteratively designed and implemented an approach to support emergency services, and performed multiple evaluations, including live demonstrations and field trials, to research the potentials of social media-based alerts. Finally, we present the findings and implications based on semi-structured interviews with emergency services, highlighting the need for usable configurability and white-box algorithm representation.},
    number = {3},
    journal = {Behaviour \& Information Technology (BIT)},
    author = {Kaufhold, Marc-André and Rupp, Nicola and Reuter, Christian and Habdank, Matthias},
    year = {2020},
    keywords = {AuswahlCrisis, Crisis, HCI, Selected, SocialMedia, Security, A-Paper, Ranking-ImpactFactor, Ranking-CORE-A, Projekt-KontiKat, Projekt-ATHENE-FANCY, AuswahlKaufhold},
    pages = {319--342},
    }

    2019

  • Marc-André Kaufhold, Christian Reuter, Thomas Ludwig (2019)
    Cross-Media Usage of Social Big Data for Emergency Services and Volunteer Communities: Approaches, Development and Challenges of Multi-Platform Social Media Services
    2019.
    [BibTeX] [Abstract] [Download PDF]

    The use of social media is ubiquitous and nowadays well- established in our everyday life, but increasingly also before, during or after emergencies. The produced data is spread across several types of social media and can be used by different actors, such as emergency services or volunteer communities. There are already systems available that support the process of gathering, analysing and distributing information through social media. However, dependent on the goal of analysis, the analysis methods and available systems are limited based on technical or business-oriented restrictions. This paper presents the design of a cross-platform Social Media API, which was integrated and evaluated within multiple emergency scenarios. Based on the lessons learned, we outline the core challenges from the practical development and theoretical findings, focusing (1) cross-platform gathering and data management, (2) trustability and information quality, (3) tailorability and adjustable data operations, and (4) queries, performance, and technical development.

    @techreport{kaufhold_cross-media_2019,
    title = {Cross-{Media} {Usage} of {Social} {Big} {Data} for {Emergency} {Services} and {Volunteer} {Communities}: {Approaches}, {Development} and {Challenges} of {Multi}-{Platform} {Social} {Media} {Services}},
    url = {https://arxiv.org/pdf/1907.07725.pdf},
    abstract = {The use of social media is ubiquitous and nowadays well- established in our everyday life, but increasingly also before, during or after emergencies. The produced data is spread across several types of social media and can be used by different actors, such as emergency services or volunteer communities. There are already systems available that support the process of gathering, analysing and distributing information through social media. However, dependent on the goal of analysis, the analysis methods and available systems are limited based on technical or business-oriented restrictions. This paper presents the design of a cross-platform Social Media API, which was integrated and evaluated within multiple emergency scenarios. Based on the lessons learned, we outline the core challenges from the practical development and theoretical findings, focusing (1) cross-platform gathering and data management, (2) trustability and information quality, (3) tailorability and adjustable data operations, and (4) queries, performance, and technical development.},
    institution = {arXiv},
    author = {Kaufhold, Marc-André and Reuter, Christian and Ludwig, Thomas},
    year = {2019},
    keywords = {Crisis, SocialMedia, Projekt-EmerGent, Projekt-KontiKat},
    pages = {1--11},
    }

  • Marc-André Kaufhold, Arne Schmidt, Fabienne Seifert, Thea Riebe, Christian Reuter (2019)
    SentiNet: Twitter-basierter Ansatz zur kombinierten Netzwerk- und Stimmungsanalyse in Katastrophenlagen
    Mensch und Computer – Workshopband Hamburg, Germany. doi:10.18420/muc2019-ws-133-04
    [BibTeX] [Abstract] [Download PDF]

    Das Forschungsfeld Social Media Analytics untersucht Methoden zur Analyse sozialer Medien nicht nur für Bürger und Unternehmen, sondern auch für Einsatzkräfte in Notsituationen. Zur Unterstützung des Situationsbewusstseins in derartigen Lagen werden unter anderem soziale Netzwerkanalysen angewandt, um Handlungen und die Vernetzung von Helfern nachzuvollziehen, sowie Stimmungsanalysen, um Emotionen der nutzergenerierten Inhalte zu extrahieren. Unsere Literaturstudie zeigt allerdings, dass keine technischen Ansätze existieren, die Netzwerk- und Stimmungsanalysen kombinieren. Dieser Beitrag stellt das Design und die Implementierung einer solchen Web- Anwendung auf Basis von Twitter vor, um anschließend Potenziale und Herausforderungen für die Evaluation und Weiterentwicklung des Ansatzes zu diskutieren.

    @inproceedings{kaufhold_sentinet_2019,
    address = {Hamburg, Germany},
    title = {{SentiNet}: {Twitter}-basierter {Ansatz} zur kombinierten {Netzwerk}- und {Stimmungsanalyse} in {Katastrophenlagen}},
    url = {https://dl.gi.de/bitstream/handle/20.500.12116/25149/133-04.pdf},
    doi = {10.18420/muc2019-ws-133-04},
    abstract = {Das Forschungsfeld Social Media Analytics untersucht Methoden zur Analyse sozialer Medien nicht nur für Bürger und Unternehmen, sondern auch für Einsatzkräfte in Notsituationen. Zur Unterstützung des Situationsbewusstseins in derartigen Lagen werden unter anderem soziale Netzwerkanalysen angewandt, um Handlungen und die Vernetzung von Helfern nachzuvollziehen, sowie Stimmungsanalysen, um Emotionen der nutzergenerierten Inhalte zu extrahieren. Unsere Literaturstudie zeigt allerdings, dass keine technischen Ansätze existieren, die Netzwerk- und Stimmungsanalysen kombinieren. Dieser Beitrag stellt das Design und die Implementierung einer solchen Web- Anwendung auf Basis von Twitter vor, um anschließend Potenziale und Herausforderungen für die Evaluation und Weiterentwicklung des Ansatzes zu diskutieren.},
    booktitle = {Mensch und {Computer} - {Workshopband}},
    publisher = {Gesellschaft für Informatik e.V.},
    author = {Kaufhold, Marc-André and Schmidt, Arne and Seifert, Fabienne and Riebe, Thea and Reuter, Christian},
    year = {2019},
    keywords = {Crisis, SocialMedia, Projekt-KontiKat},
    pages = {297--308},
    }

  • Thea Riebe, Amanda Langer, Marc-André Kaufhold, Nina Katharina Kretschmer, Christian Reuter (2019)
    Werte und Wertekonflikte in sozialen Medien für die Vernetzung ungebundener Helfer in Krisensituationen – Ein Value-Sensitive Design Ansatz
    Mensch und Computer – Workshopband Hamburg, Germany. doi:10.18420/muc2019-ws-133-05
    [BibTeX] [Abstract] [Download PDF]

    Bereits während des Hochwassers in Mitteleuropa 2013 und der Flüchtlingskrise in Europa ab 2015 wurde deutlich, dass freiwillige HelferInnen die Bewältigung von Krisensituationen unterstützen. Durch die vermehrte Koordination der Helfenden, auch unter Ein- satz sozialer Medien, kommt es zunehmend zu Konflikten zwi- schen den teilweise kollidierenden Erwartungshaltungen periodi- sierter Werte der eingebundenen Akteure. Die Entwicklung von Kollaborationswerkzeugen mit Hilfe der Methode des Value-Sen- sitive Designs kann bereits im Vorfeld solche Konflikte aufzeigen und gezielt verhindern oder moderieren. Dazu wurde in einer Fall- studie anhand des Hochwassers 2013 induktiv abgeleitet, welche Werte und Erwartungen die unterschiedlichen Stakeholder haben, und welche Konflikte sich daraus im Hinblick auf die Anforderun- gen ergeben. Diese Studie zeigt insbesondere die Konfliktpotenzi- ale für freiwillige HelferInnen in sozialen Medien in Bezug auf den Schutz der Privatsphäre und vor Diskriminierung auf und leistet damit einen Beitrag für die Konflikt-Optimierung und Akzeptanz- steigerung des Einsatzes sozialer Medien im Katastrophenschutz.

    @inproceedings{riebe_werte_2019,
    address = {Hamburg, Germany},
    title = {Werte und {Wertekonflikte} in sozialen {Medien} für die {Vernetzung} ungebundener {Helfer} in {Krisensituationen} – {Ein} {Value}-{Sensitive} {Design} {Ansatz}},
    url = {https://dl.gi.de/bitstream/handle/20.500.12116/25150/133-05.pdf},
    doi = {10.18420/muc2019-ws-133-05},
    abstract = {Bereits während des Hochwassers in Mitteleuropa 2013 und der Flüchtlingskrise in Europa ab 2015 wurde deutlich, dass freiwillige HelferInnen die Bewältigung von Krisensituationen unterstützen. Durch die vermehrte Koordination der Helfenden, auch unter Ein- satz sozialer Medien, kommt es zunehmend zu Konflikten zwi- schen den teilweise kollidierenden Erwartungshaltungen periodi- sierter Werte der eingebundenen Akteure. Die Entwicklung von Kollaborationswerkzeugen mit Hilfe der Methode des Value-Sen- sitive Designs kann bereits im Vorfeld solche Konflikte aufzeigen und gezielt verhindern oder moderieren. Dazu wurde in einer Fall- studie anhand des Hochwassers 2013 induktiv abgeleitet, welche Werte und Erwartungen die unterschiedlichen Stakeholder haben, und welche Konflikte sich daraus im Hinblick auf die Anforderun- gen ergeben. Diese Studie zeigt insbesondere die Konfliktpotenzi- ale für freiwillige HelferInnen in sozialen Medien in Bezug auf den Schutz der Privatsphäre und vor Diskriminierung auf und leistet damit einen Beitrag für die Konflikt-Optimierung und Akzeptanz- steigerung des Einsatzes sozialer Medien im Katastrophenschutz.},
    booktitle = {Mensch und {Computer} - {Workshopband}},
    publisher = {Gesellschaft für Informatik e.V.},
    author = {Riebe, Thea and Langer, Amanda and Kaufhold, Marc-André and Kretschmer, Nina Katharina and Reuter, Christian},
    year = {2019},
    keywords = {Crisis, SocialMedia, Student, Security, Projekt-KontiKat, Peace, Projekt-DualUse},
    pages = {308--318},
    }

  • Thea Riebe, Christian Reuter (2019)
    Dual Use and Dilemmas for Cybersecurity, Peace and Technology Assessment
    In: Christian Reuter: Information Technology for Peace and Security – IT-Applications and Infrastructures in Conflicts, Crises, War, and Peace. Wiesbaden, Germany: Springer Vieweg, , 165–184. doi:10.1007/978-3-658-25652-4_8
    [BibTeX] [Abstract] [Download PDF]

    Dual-use in information technology is a pressing issue: how can we prevent, control or manage the risk of a harmful application of IT? How can dual-use awareness and regu-lation help to mitigate the risks to peace and security on the national and international level? As the cyberspace has been declared a military domain, IT is of increasing im-portance for civil and military infrastructures. How can researchers, developers and decision makers make sure that IT is not misused to cause harm? For nuclear, biological and chemical technologies this has been discussed as the dual-use problem. This chapter illustrates the approaches towards different dual-use concepts, how to conduct a tech-nology assessment and provides insight into the implementation of dual-use assessment guidelines at TU Darmstadt, the so-called Civil Clause.

    @incollection{riebe_dual_2019,
    address = {Wiesbaden, Germany},
    title = {Dual {Use} and {Dilemmas} for {Cybersecurity}, {Peace} and {Technology} {Assessment}},
    isbn = {978-3-658-25652-4},
    url = {https://link.springer.com/chapter/10.1007/978-3-658-25652-4_8},
    abstract = {Dual-use in information technology is a pressing issue: how can we prevent, control or manage the risk of a harmful application of IT? How can dual-use awareness and regu-lation help to mitigate the risks to peace and security on the national and international level? As the cyberspace has been declared a military domain, IT is of increasing im-portance for civil and military infrastructures. How can researchers, developers and decision makers make sure that IT is not misused to cause harm? For nuclear, biological and chemical technologies this has been discussed as the dual-use problem. This chapter illustrates the approaches towards different dual-use concepts, how to conduct a tech-nology assessment and provides insight into the implementation of dual-use assessment guidelines at TU Darmstadt, the so-called Civil Clause.},
    booktitle = {Information {Technology} for {Peace} and {Security} - {IT}-{Applications} and {Infrastructures} in {Conflicts}, {Crises}, {War}, and {Peace}},
    publisher = {Springer Vieweg},
    author = {Riebe, Thea and Reuter, Christian},
    editor = {Reuter, Christian},
    year = {2019},
    doi = {10.1007/978-3-658-25652-4_8},
    keywords = {Projekt-KontiKat, Peace, Projekt-CRISP, Projekt-DualUse},
    pages = {165--184},
    }

  • Thomas Spielhofer, Anna Sophie Hahne, Christian Reuter, Marc-André Kaufhold, Stefka Schmid (2019)
    Social Media Use in Emergencies of Citizens in the United Kingdom
    Proceedings of the Information Systems for Crisis Response and Management (ISCRAM) València, Spain.
    [BibTeX] [Abstract] [Download PDF]

    People use social media in various ways including looking for or sharing information during crises or emergencies (e.g. floods, storms, terrorist attacks). Few studies have focused on European citizens‘ perceptions, and just one has deployed a representative sample to examine this. This article presents the results of one of the first representative studies on this topic conducted in the United Kingdom. The study shows that around a third (34\%) have used social media during an emergency and that such use is more widespread among younger people. In contrast, the main reasons for not using social media in an emergency include technological concerns and that the trustworthiness of social media content is doubtful. However, there is a growing trend towards increased use. The article deduces and explores implications of these findings, including problems potentially arising with more citizens sharing information on social media during emergencies and expecting a response.

    @inproceedings{spielhofer_social_2019,
    address = {València, Spain},
    title = {Social {Media} {Use} in {Emergencies} of {Citizens} in the {United} {Kingdom}},
    url = {http://www.peasec.de/paper/2019/2019_SpielhoferHahneReuterKaufholdSchmid_SocialMediaCrisesUK_ISCRAM.pdf},
    abstract = {People use social media in various ways including looking for or sharing information during crises or emergencies (e.g. floods, storms, terrorist attacks). Few studies have focused on European citizens' perceptions, and just one has deployed a representative sample to examine this. This article presents the results of one of the first representative studies on this topic conducted in the United Kingdom. The study shows that around a third (34\%) have used social media during an emergency and that such use is more widespread among younger people. In contrast, the main reasons for not using social media in an emergency include technological concerns and that the trustworthiness of social media content is doubtful. However, there is a growing trend towards increased use. The article deduces and explores implications of these findings, including problems potentially arising with more citizens sharing information on social media during emergencies and expecting a response.},
    booktitle = {Proceedings of the {Information} {Systems} for {Crisis} {Response} and {Management} ({ISCRAM})},
    publisher = {ISCRAM Association},
    author = {Spielhofer, Thomas and Hahne, Anna Sophie and Reuter, Christian and Kaufhold, Marc-André and Schmid, Stefka},
    editor = {Franco, Zeno and González, José J. and Canós, José H.},
    year = {2019},
    keywords = {Cooperation, Crisis, HCI, SocialMedia, Projekt-EmerGent, Projekt-KontiKat},
    }

  • Thea Riebe, Christian Reuter (2019)
    Dual-Use in der IT: Bewertung in der Softwareentwicklung
    Wissenschaft & Frieden 2019-1: 2019.
    [BibTeX] [Abstract] [Download PDF]

    Der Einsatz von Informationstechnologie (IT) im Frieden ebenso wie in Konflikten und für Sicherheitszwecke wirft einige Fragen auf (Reuter 2019), u.a. ob die Nutzung von IT auf so genannte förderliche Zwecke und Anwendungen begrenzt und eine schädliche Nutzung verhindert werden kann (Riebe und Reuter 2019). Diese Ambivalenz wird als Dual-use-Dilemma bezeichnet und bedeutet, dass Gegenstände, Wissen und Technologie sowohl nützliche als auch schädliche Anwendung fi nden können. Dual-use-Fragen stellen sich in ganz unterschiedlichen technischen und naturwissenschaftlichen Disziplinen, insbesondere in der Nukleartechnologie sowie in der Chemie und Biologie. Dabei unterscheidet sich die Bedeutung von Dual-use je nach Technologie, ihren spezifi schen Risiken und Szenarien sowie ihrer Distribution und Anwendung. Konkret bedeutet dies: Sicherheitspolitische Risikoszenarien und Anwender der Nukleartechnologie unterscheiden sich erheblich von denen der IT.

    @techreport{riebe_dual-use_2019,
    address = {Wissenschaft \& Frieden 2019-1},
    title = {Dual-{Use} in der {IT}: {Bewertung} in der {Softwareentwicklung}},
    url = {http://www.peasec.de/paper/2019/2019_RiebeReuter_DualUse_WuF.pdf},
    abstract = {Der Einsatz von Informationstechnologie (IT) im Frieden ebenso wie in Konflikten und für Sicherheitszwecke wirft einige Fragen auf (Reuter 2019), u.a. ob die Nutzung von IT auf so genannte förderliche Zwecke und Anwendungen begrenzt und eine schädliche Nutzung verhindert werden kann (Riebe und Reuter 2019). Diese Ambivalenz wird als Dual-use-Dilemma bezeichnet und bedeutet, dass Gegenstände, Wissen und Technologie sowohl nützliche als auch schädliche Anwendung fi nden können. Dual-use-Fragen stellen sich in ganz unterschiedlichen technischen und naturwissenschaftlichen Disziplinen, insbesondere in der Nukleartechnologie sowie in der Chemie und Biologie. Dabei unterscheidet sich die Bedeutung von Dual-use je nach Technologie, ihren spezifi schen Risiken und Szenarien sowie ihrer Distribution und Anwendung. Konkret bedeutet dies: Sicherheitspolitische Risikoszenarien und Anwender der Nukleartechnologie unterscheiden sich erheblich von denen der IT.},
    author = {Riebe, Thea and Reuter, Christian},
    year = {2019},
    keywords = {Projekt-KontiKat, Peace, Projekt-DualUse},
    pages = {46--48},
    }

  • Marc-André Kaufhold, Christian Reuter, Thomas Ludwig (2019)
    Flow Experience in Software Engineering: Development and Evaluation of Design Options for Eclipse
    Proceedings of the European Conference on Information Systems (ECIS) Stockholm and Uppsala, Sweden.
    [BibTeX] [Abstract] [Download PDF]

    In positive psychology, flow is described as a holistic mental condition in which an individual delves into an activity with full concentration. Even in software engineering, the promotion of flow experience fosters effects such as positive affect, improved learning, and higher product loyalty in computer-aided environments. However, from a practice-based perspective it is not obvious how to design ICT to support flow experience. With this paper, we, therefore, contribute concrete design implications, paving the way for a good flow experience in ICT. This paper be-gins by examining the current state of flow research in the field of Human-Computer Interaction. We then go on to present a study comprising the development and evaluation of design options that aim to support flow in integrated development environments such as Eclipse, one of the most prominent open-source IDEs. The findings reveal practical implications on the use of four flow design options for software engineering and are integrated into a preliminary research framework.

    @inproceedings{kaufhold_flow_2019,
    address = {Stockholm and Uppsala, Sweden},
    title = {Flow {Experience} in {Software} {Engineering}: {Development} and {Evaluation} of {Design} {Options} for {Eclipse}},
    isbn = {978-1-73363-250-8},
    url = {https://aisel.aisnet.org/ecis2019_rip/17/},
    abstract = {In positive psychology, flow is described as a holistic mental condition in which an individual delves into an activity with full concentration. Even in software engineering, the promotion of flow experience fosters effects such as positive affect, improved learning, and higher product loyalty in computer-aided environments. However, from a practice-based perspective it is not obvious how to design ICT to support flow experience. With this paper, we, therefore, contribute concrete design implications, paving the way for a good flow experience in ICT. This paper be-gins by examining the current state of flow research in the field of Human-Computer Interaction. We then go on to present a study comprising the development and evaluation of design options that aim to support flow in integrated development environments such as Eclipse, one of the most prominent open-source IDEs. The findings reveal practical implications on the use of four flow design options for software engineering and are integrated into a preliminary research framework.},
    booktitle = {Proceedings of the {European} {Conference} on {Information} {Systems} ({ECIS})},
    publisher = {AIS},
    author = {Kaufhold, Marc-André and Reuter, Christian and Ludwig, Thomas},
    year = {2019},
    keywords = {Ranking-VHB-B, Ranking-WKWI-A, Ranking-CORE-A, Projekt-KontiKat},
    }

  • Margarita Grinko, Marc-André Kaufhold, Christian Reuter (2019)
    Adoption, Use and Diffusion of Crisis Apps in Germany: A Representative Survey
    Mensch und Computer – Tagungsband Hamburg, Germany. doi:10.1145/3340764.3340782
    [BibTeX] [Abstract] [Download PDF]

    The research field of crisis informatics examines the potentials and limitations of information and communication technology in crises, disasters, and emergencies. Although ICT plays an increasingly large role in crisis response and management, in-depth studies on crisis apps and similar technology in the context of an emergency have been missing. Based on responses by 1024 participants in Germany, we examine the diffusion, usage, perception and adoption of mobile crisis apps as well as required functions and improvements. We conclude that crisis apps are still a little-known form of disaster ICT, but have potential for enhancing communication, keeping users up to date and providing a more effective crisis management as supplement to other media channels dependent on different underlying infrastructures. However, they should be adaptable to user characteristics, consider privacy, allow communication and offer valuable information to raise awareness of potential disasters without creating an overload. Also, the familiarity with and trust in crisis apps should be addressed to maximize their beneficial impact on crisis communication and management. We discuss further implications as well as directions for future research with larger target groups and specific usage scenarios.

    @inproceedings{grinko_adoption_2019,
    address = {Hamburg, Germany},
    title = {Adoption, {Use} and {Diffusion} of {Crisis} {Apps} in {Germany}: {A} {Representative} {Survey}},
    url = {https://dl.acm.org/citation.cfm?id=3340782},
    doi = {10.1145/3340764.3340782},
    abstract = {The research field of crisis informatics examines the potentials and limitations of information and communication technology in crises, disasters, and emergencies. Although ICT plays an increasingly large role in crisis response and management, in-depth studies on crisis apps and similar technology in the context of an emergency have been missing. Based on responses by 1024 participants in Germany, we examine the diffusion, usage, perception and adoption of mobile crisis apps as well as required functions and improvements. We conclude that crisis apps are still a little-known form of disaster ICT, but have potential for enhancing communication, keeping users up to date and providing a more effective crisis management as supplement to other media channels dependent on different underlying infrastructures. However, they should be adaptable to user characteristics, consider privacy, allow communication and offer valuable information to raise awareness of potential disasters without creating an overload. Also, the familiarity with and trust in crisis apps should be addressed to maximize their beneficial impact on crisis communication and management. We discuss further implications as well as directions for future research with larger target groups and specific usage scenarios.},
    booktitle = {Mensch und {Computer} - {Tagungsband}},
    publisher = {ACM},
    author = {Grinko, Margarita and Kaufhold, Marc-André and Reuter, Christian},
    editor = {Alt, Florian and Bulling, Andreas and Döring, Tanja},
    year = {2019},
    keywords = {Crisis, Student, UsableSec, Projekt-KontiKat, Projekt-MAKI},
    pages = {263--274},
    }

  • Amanda Langer, Marc-André Kaufhold, Elena Runft, Christian Reuter, Margarita Grinko, Volkmar Pipek (2019)
    Counter Narratives in Social Media: An Empirical Study on Combat and Prevention of Terrorism
    Proceedings of the Information Systems for Crisis Response and Management (ISCRAM) València, Spain.
    [BibTeX] [Abstract] [Download PDF]

    With the increase of terrorist attacks and spreading extremism worldwide, countermeasures advance as well. Often social media is used for recruitment and radicalization of susceptible target groups. Counter narratives are trying to disclose the illusion created by radical and extremist groups through a purposive and educational counter statement, and to initiate a rethinking in the affected individuals via thought-provoking impulses and advice. This exploratory study investigates counter narrative campaigns with regard to their fight and prevention against terrorism in social media. Posts with strong emotions and a personal reference to affected individuals achieved the highest impact and most reactions from the target group. Furthermore, our results illustrate that the impact of a counter narrative campaign cannot be measured solely according to the reaction rate to their postings and that further analysis steps are therefore necessary for the final evaluation of the campaigns.

    @inproceedings{langer_counter_2019,
    address = {València, Spain},
    title = {Counter {Narratives} in {Social} {Media}: {An} {Empirical} {Study} on {Combat} and {Prevention} of {Terrorism}},
    url = {http://www.peasec.de/paper/2019/2019_Langeretal_Counternarratives_ISCRAM.pdf},
    abstract = {With the increase of terrorist attacks and spreading extremism worldwide, countermeasures advance as well. Often social media is used for recruitment and radicalization of susceptible target groups. Counter narratives are trying to disclose the illusion created by radical and extremist groups through a purposive and educational counter statement, and to initiate a rethinking in the affected individuals via thought-provoking impulses and advice. This exploratory study investigates counter narrative campaigns with regard to their fight and prevention against terrorism in social media. Posts with strong emotions and a personal reference to affected individuals achieved the highest impact and most reactions from the target group. Furthermore, our results illustrate that the impact of a counter narrative campaign cannot be measured solely according to the reaction rate to their postings and that further analysis steps are therefore necessary for the final evaluation of the campaigns.},
    booktitle = {Proceedings of the {Information} {Systems} for {Crisis} {Response} and {Management} ({ISCRAM})},
    publisher = {ISCRAM Association},
    author = {Langer, Amanda and Kaufhold, Marc-André and Runft, Elena and Reuter, Christian and Grinko, Margarita and Pipek, Volkmar},
    editor = {Franco, Zeno and González, José J. and Canós, José H.},
    year = {2019},
    keywords = {Crisis, SocialMedia, Student, Projekt-KontiKat, Peace},
    pages = {746--755},
    }

  • Christian Reuter, Thomas Ludwig, Patrick Mischur (2019)
    RescueGlass: Collaborative Applications involving Head-Mounted Displays for Red Cross Rescue Dog Units
    Computer Supported Cooperative Work: The Journal of Collaborative Computing (JCSCW) ;28(1-2):209–246. doi:10.1007/s10606-018-9339-8
    [BibTeX] [Abstract] [Download PDF]

    On-site work of emergency service teams consists of highly cooperative tasks. Especially during distributed search and rescue tasks there is a constant mix of routinized and non-routinized activities. Within this paper we focus on the work practices of the German Red Cross Rescue Dog Units who deal with several uncertainties regarding the involved dogs, the fragility of the respective situations as well as issues of using technologies under enormous time pressure. Smart glasses provide possibilities for enhanced and hands-free interaction in various contexts and a number of approaches have already been applied, aiming at efficient use of the respective technological innovation in private and professional contexts. However, the collaborative potential of smart glasses in time-critical and uncertain situations is still unexplored. Our design case study examines how the on-site work of emergency service teams can be supported by smart glasses: Based on examining the work practices of the German Red Cross Rescue Dogs, we introduce ‘RescueGlass‘ as a coordinative concept, encompassing hands-free head-mounted display (HMD) application as well as a corresponding smartphone application. Finally, we describe the evaluation of its use in the field of emergency response and management. We show how current features such as ‘fog of war‘ or various sensors support the cooperative practices of dog handlers, and outline current technical limitations offering future research questions. Our paper provides an initial design probe using smart glasses to engage in the field of collaborative professional mobile tasks.

    @article{reuter_rescueglass_2019,
    title = {{RescueGlass}: {Collaborative} {Applications} involving {Head}-{Mounted} {Displays} for {Red} {Cross} {Rescue} {Dog} {Units}},
    volume = {28},
    url = {http://www.peasec.de/paper/2019/2019_ReuterLudwigMischur_RescueGlass_JCSCW.pdf},
    doi = {10.1007/s10606-018-9339-8},
    abstract = {On-site work of emergency service teams consists of highly cooperative tasks. Especially during distributed search and rescue tasks there is a constant mix of routinized and non-routinized activities. Within this paper we focus on the work practices of the German Red Cross Rescue Dog Units who deal with several uncertainties regarding the involved dogs, the fragility of the respective situations as well as issues of using technologies under enormous time pressure. Smart glasses provide possibilities for enhanced and hands-free interaction in various contexts and a number of approaches have already been applied, aiming at efficient use of the respective technological innovation in private and professional contexts. However, the collaborative potential of smart glasses in time-critical and uncertain situations is still unexplored. Our design case study examines how the on-site work of emergency service teams can be supported by smart glasses: Based on examining the work practices of the German Red Cross Rescue Dogs, we introduce ‘RescueGlass' as a coordinative concept, encompassing hands-free head-mounted display (HMD) application as well as a corresponding smartphone application. Finally, we describe the evaluation of its use in the field of emergency response and management. We show how current features such as ‘fog of war' or various sensors support the cooperative practices of dog handlers, and outline current technical limitations offering future research questions. Our paper provides an initial design probe using smart glasses to engage in the field of collaborative professional mobile tasks.},
    number = {1-2},
    journal = {Computer Supported Cooperative Work: The Journal of Collaborative Computing (JCSCW)},
    author = {Reuter, Christian and Ludwig, Thomas and Mischur, Patrick},
    year = {2019},
    keywords = {Cooperation, Crisis, HCI, UsableSec, Security, A-Paper, Ranking-ImpactFactor, Ranking-VHB-B, Projekt-KontiKat, Projekt-KOKOS, Ranking-CORE-B, Infrastructure},
    pages = {209--246},
    }

  • Marc-André Kaufhold, Alexis Gizikis, Christian Reuter, Matthias Habdank, Margarita Grinko (2019)
    Avoiding Chaotic Use of Social Media before, during, and after Emergencies: Design and Evaluation of Citizens‘ Guidelines
    Journal of Contingencies and Crisis Management (JCCM) ;27(3):198–213. doi:10.1111/1468-5973.12249
    [BibTeX] [Abstract] [Download PDF]

    Social media have been established in many natural disasters or human‐induced crises and emergencies. Nowadays, authorities, such as emergency services, and citizens engage with social media in different phases of the emergency management cycle. However, as research in crisis informatics highlights, one remaining issue constitutes the chaotic use of social media by citizens during emergencies, which has the potential to increase the complexity of tasks, uncertainty, and pressure for emergency services. To counter these risks, besides implementing supportive technology, social media guidelines may help putting artefact and theoretical contributions into practical use for authorities and citizens. This paper presents the design and evaluation (with 1,024 participants) of citizens‘ guidelines for using social media before, during, and after emergencies.

    @article{kaufhold_avoiding_2019,
    title = {Avoiding {Chaotic} {Use} of {Social} {Media} before, during, and after {Emergencies}: {Design} and {Evaluation} of {Citizens}' {Guidelines}},
    volume = {27},
    url = {http://www.peasec.de/paper/2019/2019_KaufholdGizikisReuterHabdankGrinko_DesignEvaluationCitizenGuidelines_JCCM.pdf},
    doi = {10.1111/1468-5973.12249},
    abstract = {Social media have been established in many natural disasters or human‐induced crises and emergencies. Nowadays, authorities, such as emergency services, and citizens engage with social media in different phases of the emergency management cycle. However, as research in crisis informatics highlights, one remaining issue constitutes the chaotic use of social media by citizens during emergencies, which has the potential to increase the complexity of tasks, uncertainty, and pressure for emergency services. To counter these risks, besides implementing supportive technology, social media guidelines may help putting artefact and theoretical contributions into practical use for authorities and citizens. This paper presents the design and evaluation (with 1,024 participants) of citizens' guidelines for using social media before, during, and after emergencies.},
    number = {3},
    journal = {Journal of Contingencies and Crisis Management (JCCM)},
    author = {Kaufhold, Marc-André and Gizikis, Alexis and Reuter, Christian and Habdank, Matthias and Grinko, Margarita},
    year = {2019},
    keywords = {Crisis, HCI, SocialMedia, Projekt-EmerGent, A-Paper, Ranking-ImpactFactor, Projekt-KontiKat, AuswahlKaufhold},
    pages = {198--213},
    }

  • Marc-André Kaufhold, Margarita Grinko, Christian Reuter, Marén Schorch, Amanda Langer, Sascha Skudelny, Matthias Hollick (2019)
    Potentiale von IKT beim Ausfall kritischer Infrastrukturen: Erwartungen, Informationsgewinnung und Mediennutzung der Zivilbevölkerung in Deutschland
    Proceedings of the International Conference on Wirtschaftsinformatik (WI) Siegen, Germany.
    [BibTeX] [Abstract] [Download PDF]

    In der Sicherheits- und Krisenforschung stehen bislang primär Fragen der Vulne-rabilität, Stärkung von Resilienz und Erhaltung bzw. Wiederherstellung kritischer Infrastrukturen (KRITIS) im Mittelpunkt; zunehmend wird auch die Bedeutung von Sozialen Medien und Krisen-Apps erkannt. Inwiefern ist die Zivilbevölke-rung in Deutschland aber auf das Eintreten einer Krise tatsächlich vorbereitet? Welche Informations- und Kommunikationstechniken (IKT) werden im Alltag und bei einem potentiellen Infrastrukturausfall genutzt? Unser Beitrag stellt die Ergebnisse einer repräsentativen Umfrage mit 1024 Teilnehmern in Deutschland vor, die belegen, dass Gefahrenbewusstsein, Vorbereitung, effektives Krisenma-nagement und Verbreitung von Krisen-Apps in Deutschland noch relativ gering sind, während traditionelle Kommunikations- und Informationskanäle sowie in-formelle Informationsnetzwerke bevorzugt werden. Die Ergebnisse stellen wei-terhin die beträchtlichen Unterstützungspotentiale von IKT in derartigen Krisensi-tuationen heraus, die zur Erhöhung des Risikobewusstseins, der Erleichterung des Informationstransfers und der Verbesserung der Kommunikation zwischen Zivilbevölkerung, KRITIS-Betreibern und Behörden und Organisationen mit Si-cherheitsaufgaben (BOS) entscheidend beitragen können.

    @inproceedings{kaufhold_potentiale_2019,
    address = {Siegen, Germany},
    title = {Potentiale von {IKT} beim {Ausfall} kritischer {Infrastrukturen}: {Erwartungen}, {Informationsgewinnung} und {Mediennutzung} der {Zivilbevölkerung} in {Deutschland}},
    url = {http://www.peasec.de/paper/2019/2019_KaufholdGrinkoReuterSchorschLangerSkudelnyHollick_InfrastrukturAusfall_WI.pdf},
    abstract = {In der Sicherheits- und Krisenforschung stehen bislang primär Fragen der Vulne-rabilität, Stärkung von Resilienz und Erhaltung bzw. Wiederherstellung kritischer Infrastrukturen (KRITIS) im Mittelpunkt; zunehmend wird auch die Bedeutung von Sozialen Medien und Krisen-Apps erkannt. Inwiefern ist die Zivilbevölke-rung in Deutschland aber auf das Eintreten einer Krise tatsächlich vorbereitet? Welche Informations- und Kommunikationstechniken (IKT) werden im Alltag und bei einem potentiellen Infrastrukturausfall genutzt? Unser Beitrag stellt die Ergebnisse einer repräsentativen Umfrage mit 1024 Teilnehmern in Deutschland vor, die belegen, dass Gefahrenbewusstsein, Vorbereitung, effektives Krisenma-nagement und Verbreitung von Krisen-Apps in Deutschland noch relativ gering sind, während traditionelle Kommunikations- und Informationskanäle sowie in-formelle Informationsnetzwerke bevorzugt werden. Die Ergebnisse stellen wei-terhin die beträchtlichen Unterstützungspotentiale von IKT in derartigen Krisensi-tuationen heraus, die zur Erhöhung des Risikobewusstseins, der Erleichterung des Informationstransfers und der Verbesserung der Kommunikation zwischen Zivilbevölkerung, KRITIS-Betreibern und Behörden und Organisationen mit Si-cherheitsaufgaben (BOS) entscheidend beitragen können.},
    booktitle = {Proceedings of the {International} {Conference} on {Wirtschaftsinformatik} ({WI})},
    publisher = {AIS},
    author = {Kaufhold, Marc-André and Grinko, Margarita and Reuter, Christian and Schorch, Marén and Langer, Amanda and Skudelny, Sascha and Hollick, Matthias},
    year = {2019},
    keywords = {Crisis, HCI, SocialMedia, Ranking-CORE-C, Ranking-VHB-C, Ranking-WKWI-A, Projekt-KontiKat, Infrastructure, RSF, Projekt-MAKI, Projekt-GeoBox, Projekt-HyServ},
    pages = {1054--1068},
    }

    2018

  • Marc-André Kaufhold, Christian Reuter, Thea Riebe, Elmar von Radziewski (2018)
    Design eines BCM-Dashboards für kleine und mittlere Unternehmen
    Mensch und Computer – Workshopband Dresden, Germany.
    [BibTeX] [Abstract] [Download PDF]

    Business Continuity Management (BCM) ist definiert als ganzheitlicher Managementprozess, der poten-zielle Bedrohungen für Organisationen und die Auswirkungen ermittelt, sowie ein Gerüst zum Aufbau der Belastbarkeit einer Organisation bereitstellt. Bereits existierende Ansätze in der Forschung legen den Fokus allerdings auf große Konzerne, während die Umsetzung eines BCM-Konzepts für kleine und mittlere Unternehmen (KMU) oft an den knappen finanziellen und personellen Ressourcen, aber auch an der Komplexität des BCM scheitert. Um KMU bei der Implementierung eines an deren Bedürfnisse angepasstem BCM-Systems (BCMS) zu unterstützen, gibt es in der Forschung nur wenige Lösungsan-sätze. Dieser Artikel stellt auf Basis einer empirischen Studie, welche Umsetzungsfaktoren für BCM und Anforderungen für BCMS untersucht, das prototypische Design eines BCM-Dashboards vor, welches mit wenig Konfigurationsaufwand möglichst relevante externe und interne Gefahrenquellen in einer kom-pakten Übersicht darzustellen vermag.

    @inproceedings{kaufhold_design_2018,
    address = {Dresden, Germany},
    title = {Design eines {BCM}-{Dashboards} für kleine und mittlere {Unternehmen}},
    url = {https://dl.gi.de/bitstream/handle/20.500.12116/16796/Beitrag_453_final__a.pdf},
    abstract = {Business Continuity Management (BCM) ist definiert als ganzheitlicher Managementprozess, der poten-zielle Bedrohungen für Organisationen und die Auswirkungen ermittelt, sowie ein Gerüst zum Aufbau der Belastbarkeit einer Organisation bereitstellt. Bereits existierende Ansätze in der Forschung legen den Fokus allerdings auf große Konzerne, während die Umsetzung eines BCM-Konzepts für kleine und mittlere Unternehmen (KMU) oft an den knappen finanziellen und personellen Ressourcen, aber auch an der Komplexität des BCM scheitert. Um KMU bei der Implementierung eines an deren Bedürfnisse angepasstem BCM-Systems (BCMS) zu unterstützen, gibt es in der Forschung nur wenige Lösungsan-sätze. Dieser Artikel stellt auf Basis einer empirischen Studie, welche Umsetzungsfaktoren für BCM und Anforderungen für BCMS untersucht, das prototypische Design eines BCM-Dashboards vor, welches mit wenig Konfigurationsaufwand möglichst relevante externe und interne Gefahrenquellen in einer kom-pakten Übersicht darzustellen vermag.},
    booktitle = {Mensch und {Computer} - {Workshopband}},
    publisher = {Gesellschaft für Informatik e.V.},
    author = {Kaufhold, Marc-André and Reuter, Christian and Riebe, Thea and von Radziewski, Elmar},
    editor = {Dachselt, Raimund and Weber, Gerhard},
    year = {2018},
    keywords = {Crisis, HCI, Student, Projekt-KontiKat, Infrastructure},
    pages = {579--586},
    }

  • Christian Reuter, Amanda Lee Hughes, Starr Roxanne Hiltz, Muhammad Imran, Linda Plotnick (2018)
    Special Issue on Social Media in Crisis Management – International Journal on Human-Computer Interaction (IJHCI)
    .
    [BibTeX] [Download PDF]

    @book{reuter_special_2018,
    title = {Special {Issue} on {Social} {Media} in {Crisis} {Management} - {International} {Journal} on {Human}-{Computer} {Interaction} ({IJHCI})},
    volume = {34},
    url = {https://www.tandfonline.com/toc/hihc20/34/4?nav=tocList},
    author = {Reuter, Christian and Hughes, Amanda Lee and Hiltz, Starr Roxanne and Imran, Muhammad and Plotnick, Linda},
    year = {2018},
    note = {Publication Title: International Journal on Human-Computer Interaction (IJHCI)},
    keywords = {Crisis, HCI, SocialMedia, Ranking-ImpactFactor, Ranking-WKWI-B, Projekt-KontiKat, Ranking-CORE-B},
    }

  • Marc-André Kaufhold, Christian Reuter, Tobias Ermert (2018)
    Interaktionsdesign eines Risiko-Bewertungskonzepts für KMU
    Mensch und Computer – Tagungsband Dresden, Germany.
    [BibTeX] [Abstract] [Download PDF]

    Betriebsstörungen, Naturkatastrophen und andere Notfallszenarien bedrohen die Fortdauer von Unternehmen. Hierzu stellt Business Continuity Management (BCM) Maßnahmen zur Identifika-tion von Bedrohungen und Risiken sowie zum Aufbau der Belastbarkeit von Organisationen bereit. In der Forschung mangelt es jedoch an Ansätzen, welche BCM in kleinen und mittleren Unternehmen (KMU) unterstützen. In diesem Kurzbeitrag wird ein Konzept für KMU vorgestellt, welches die Identifikation und Bewertung von Risiken unterstützt, Bewältigungsmaßnahmen anbietet und unternehmensspezifische Risikoinformationen auf einem Dashboard visualisiert.

    @inproceedings{kaufhold_interaktionsdesign_2018,
    address = {Dresden, Germany},
    title = {Interaktionsdesign eines {Risiko}-{Bewertungskonzepts} für {KMU}},
    url = {https://dl.gi.de/bitstream/handle/20.500.12116/16626/Beitrag_356_final__a.pdf},
    abstract = {Betriebsstörungen, Naturkatastrophen und andere Notfallszenarien bedrohen die Fortdauer von Unternehmen. Hierzu stellt Business Continuity Management (BCM) Maßnahmen zur Identifika-tion von Bedrohungen und Risiken sowie zum Aufbau der Belastbarkeit von Organisationen bereit. In der Forschung mangelt es jedoch an Ansätzen, welche BCM in kleinen und mittleren Unternehmen (KMU) unterstützen. In diesem Kurzbeitrag wird ein Konzept für KMU vorgestellt, welches die Identifikation und Bewertung von Risiken unterstützt, Bewältigungsmaßnahmen anbietet und unternehmensspezifische Risikoinformationen auf einem Dashboard visualisiert.},
    booktitle = {Mensch und {Computer} - {Tagungsband}},
    publisher = {Gesellschaft für Informatik e.V.},
    author = {Kaufhold, Marc-André and Reuter, Christian and Ermert, Tobias},
    year = {2018},
    keywords = {Crisis, HCI, Student, UsableSec, Security, Projekt-KontiKat, Infrastructure, Projekt-CRISP, RSF, Projekt-HyServ},
    pages = {309--312},
    }

  • Christian Reuter (2018)
    Sicherheitskritische Mensch-Computer-Interaktion: Interaktive Technologien und Soziale Medien im Krisen- und Sicherheitsmanagement (Erste Auflage)
    Wiesbaden: Springer Vieweg. doi:10.1007/978-3-658-19523-6
    [BibTeX] [Abstract] [Download PDF]

    Dieses Lehr- und Fachbuch gibt eine fundierte und praxisbezogene Einführung sowie einen Überblick über Grundlagen, Methoden und Anwendungen der Mensch-Computer-Interaktion im Kontext von Sicherheit, Notfällen, Krisen, Katastrophen, Krieg und Frieden. Dies adressierend werden interaktive, mobile, ubiquitäre und kooperative Technologien sowie Soziale Medien vorgestellt. Hierbei finden klassische Themen wie benutzbare (IT-)Sicherheit, Industrie 4.0, Katastrophenschutz, Medizin und Automobil, aber auch Augmented Reality, Crowdsourcing, Shitstorm Management, Social Media Analytics und Cyberwar ihren Platz. Methodisch wird das Spektrum von Usable Safety- bis Usable Security Engineering von Analyse über Design bis Evaluation abgedeckt. Das Buch eignet sich ebenso als Lehrbuch für Studierende wie als Handbuch für Wissenschaftler, Designer, Entwickler und Anwender.

    @book{reuter_sicherheitskritische_2018-1,
    address = {Wiesbaden},
    title = {Sicherheitskritische {Mensch}-{Computer}-{Interaktion}: {Interaktive} {Technologien} und {Soziale} {Medien} im {Krisen}- und {Sicherheitsmanagement} ({Erste} {Auflage})},
    isbn = {978-3-658-19522-9},
    url = {http://www.springer.com/de/book/9783658195229},
    abstract = {Dieses Lehr- und Fachbuch gibt eine fundierte und praxisbezogene Einführung sowie einen Überblick über Grundlagen, Methoden und Anwendungen der Mensch-Computer-Interaktion im Kontext von Sicherheit, Notfällen, Krisen, Katastrophen, Krieg und Frieden. Dies adressierend werden interaktive, mobile, ubiquitäre und kooperative Technologien sowie Soziale Medien vorgestellt. Hierbei finden klassische Themen wie benutzbare (IT-)Sicherheit, Industrie 4.0, Katastrophenschutz, Medizin und Automobil, aber auch Augmented Reality, Crowdsourcing, Shitstorm Management, Social Media Analytics und Cyberwar ihren Platz. Methodisch wird das Spektrum von Usable Safety- bis Usable Security Engineering von Analyse über Design bis Evaluation abgedeckt. Das Buch eignet sich ebenso als Lehrbuch für Studierende wie als Handbuch für Wissenschaftler, Designer, Entwickler und Anwender.},
    publisher = {Springer Vieweg},
    author = {Reuter, Christian},
    year = {2018},
    doi = {10.1007/978-3-658-19523-6},
    keywords = {HCI, SocialMedia, Projekt-EmerGent, UsableSec, Security, Projekt-KontiKat, Peace, Infrastructure, RSF, AuswahlUsableSec},
    }

  • Christian Reuter, Wolfgang Schneider, Daniel Eberz, Markus Bayer, Daniel Hartung, Cemal Kaygusuz (2018)
    Resiliente Digitalisierung der kritischen Infrastruktur Landwirtschaft – mobil, dezentral, ausfallsicher
    Mensch und Computer – Workshopband Dresden, Germany.
    [BibTeX] [Abstract] [Download PDF]

    Diese Arbeit befasst sich mit der zunehmenden Digitalisierung der kritischen Infrastruktur Ernährungswirtschaft und setzt den Fokus insbesondere auf die dadurch resultierenden in-formationstechnologischen Folgen bezüglich der Angriffs- und Ausfallsicherheit in der Landwirtschaft und von ihr abhängigen Sektoren. In diesem Kontext wird die Modernisie-rungen der Landmaschinen und deren Vernetzung sowie das Cloud-Computing in der Landwirtschaft analysiert und zu treffende Maßnahmen bezüglich einer resilienten Struktur erläutert. In vielen Bereichen wird dabei aufgezeigt, dass das Ausfallrisiko der Produktion zugunsten von Vorteilen wie Ertrags- und Qualitätssteigerung vernachlässigt wird.

    @inproceedings{reuter_resiliente_2018,
    address = {Dresden, Germany},
    title = {Resiliente {Digitalisierung} der kritischen {Infrastruktur} {Landwirtschaft} - mobil, dezentral, ausfallsicher},
    url = {https://dl.gi.de/bitstream/handle/20.500.12116/16930/Beitrag_330_final__a.pdf},
    abstract = {Diese Arbeit befasst sich mit der zunehmenden Digitalisierung der kritischen Infrastruktur Ernährungswirtschaft und setzt den Fokus insbesondere auf die dadurch resultierenden in-formationstechnologischen Folgen bezüglich der Angriffs- und Ausfallsicherheit in der Landwirtschaft und von ihr abhängigen Sektoren. In diesem Kontext wird die Modernisie-rungen der Landmaschinen und deren Vernetzung sowie das Cloud-Computing in der Landwirtschaft analysiert und zu treffende Maßnahmen bezüglich einer resilienten Struktur erläutert. In vielen Bereichen wird dabei aufgezeigt, dass das Ausfallrisiko der Produktion zugunsten von Vorteilen wie Ertrags- und Qualitätssteigerung vernachlässigt wird.},
    booktitle = {Mensch und {Computer} - {Workshopband}},
    publisher = {Gesellschaft für Informatik e.V.},
    author = {Reuter, Christian and Schneider, Wolfgang and Eberz, Daniel and Bayer, Markus and Hartung, Daniel and Kaygusuz, Cemal},
    editor = {Dachselt, Raimund and Weber, Gerhard},
    year = {2018},
    keywords = {Crisis, Student, Projekt-KontiKat, Infrastructure, RSF, Projekt-MAKI, Projekt-GeoBox, Projekt-HyServ},
    pages = {623--632},
    }

  • Christian Reuter, Tilo Mentler (2018)
    Human-Computer-Interaction and Social Media in Safety-Critical Systems – Editorial
    Journal of Contingencies and Crisis Management (JCCM) ;26(1):2–3. doi:10.1111/1468-5973.12192
    [BibTeX] [Download PDF]

    @article{reuter_human-computer-interaction_2018,
    title = {Human-{Computer}-{Interaction} and {Social} {Media} in {Safety}-{Critical} {Systems} – {Editorial}},
    volume = {26},
    url = {http://onlinelibrary.wiley.com/doi/10.1111/1468-5973.12192/abstract},
    doi = {10.1111/1468-5973.12192},
    number = {1},
    journal = {Journal of Contingencies and Crisis Management (JCCM)},
    author = {Reuter, Christian and Mentler, Tilo},
    year = {2018},
    keywords = {Crisis, HCI, SocialMedia, Projekt-EmerGent, Ranking-ImpactFactor, Projekt-KontiKat},
    pages = {2--3},
    }

  • Christian Reuter (2018)
    Sicherheitskritische Mensch-Computer-Interaktion – Einleitung und Überblick
    In: Christian Reuter: Sicherheitskritische Mensch-Computer-Interaktion: Interaktive Technologien und Soziale Medien im Krisen- und Sicherheitsmanagement. Wiesbaden, Germany: Springer Vieweg, , 3–14. doi:10.1007/978-3-658-19523-6_1
    [BibTeX] [Abstract] [Download PDF]

    Die sicherheitskritische Mensch-Computer-Interaktion (MCI) ist eine interdisziplinäre Herausforderung und ein für die Informatik und die jeweiligen Anwendungsdomänen in der Bedeutung zunehmendes Thema. Dieses Kapitel bietet eine Einführung in das Lehr- und Fachbuch „Sicherheitskritische Mensch-Computer-Interaktion – Interaktive Technologien und Soziale Medien im Krisen- und Sicherheitsmanagement“. Als didaktisch aufbereiteter, umfassender Überblick über Grundlagen, Methoden und Anwendungsgebiete soll es sowohl als vorlesungsbegleitende Lektüre als auch als Nachschlagewerk für Wissenschaftler, Designer und Entwickler dienen. Dies adressierend werden interaktive, mobile, ubiquitäre und kooperative Technologien sowie soziale Medien vorgestellt. Hierbei finden klassische Themen wie benutzbare (IT-)Sicherheit, Industrie 4.0, Kata-strophenschutz, Medizin und Automobil, aber auch Augmented Reality, Crowdsourcing, Shitstorm Management, Social Media Analytics und Cyberwar ihren Platz. Methodisch wird das Spektrum von Usable Safety bis Usable Security Engineering von Analyse über Design bis Evaluation abgedeckt.

    @incollection{reuter_sicherheitskritische_2018,
    address = {Wiesbaden, Germany},
    title = {Sicherheitskritische {Mensch}-{Computer}-{Interaktion} – {Einleitung} und Überblick},
    isbn = {978-3-658-19523-6},
    url = {https://link.springer.com/chapter/10.1007/978-3-658-19523-6_1},
    abstract = {Die sicherheitskritische Mensch-Computer-Interaktion (MCI) ist eine interdisziplinäre Herausforderung und ein für die Informatik und die jeweiligen Anwendungsdomänen in der Bedeutung zunehmendes Thema. Dieses Kapitel bietet eine Einführung in das Lehr- und Fachbuch „Sicherheitskritische Mensch-Computer-Interaktion – Interaktive Technologien und Soziale Medien im Krisen- und Sicherheitsmanagement“. Als didaktisch aufbereiteter, umfassender Überblick über Grundlagen, Methoden und Anwendungsgebiete soll es sowohl als vorlesungsbegleitende Lektüre als auch als Nachschlagewerk für Wissenschaftler, Designer und Entwickler dienen. Dies adressierend werden interaktive, mobile, ubiquitäre und kooperative Technologien sowie soziale Medien vorgestellt. Hierbei finden klassische Themen wie benutzbare (IT-)Sicherheit, Industrie 4.0, Kata-strophenschutz, Medizin und Automobil, aber auch Augmented Reality, Crowdsourcing, Shitstorm Management, Social Media Analytics und Cyberwar ihren Platz. Methodisch wird das Spektrum von Usable Safety bis Usable Security Engineering von Analyse über Design bis Evaluation abgedeckt.},
    booktitle = {Sicherheitskritische {Mensch}-{Computer}-{Interaktion}: {Interaktive} {Technologien} und {Soziale} {Medien} im {Krisen}- und {Sicherheitsmanagement}},
    publisher = {Springer Vieweg},
    author = {Reuter, Christian},
    editor = {Reuter, Christian},
    year = {2018},
    doi = {10.1007/978-3-658-19523-6_1},
    keywords = {Crisis, HCI, SocialMedia, UsableSec, Projekt-KontiKat},
    pages = {3--14},
    }

  • Christian Reuter, Marc-André Kaufhold (2018)
    Soziale Medien in Notfällen, Krisen und Katastrophen
    In: Christian Reuter: Sicherheitskritische Mensch-Computer-Interaktion: Interaktive Technologien und Soziale Medien im Krisen- und Sicherheitsmanagement. Wiesbaden: Springer Vieweg, , 379–402. doi:10.1007/978-3-658-19523-6_19
    [BibTeX] [Abstract] [Download PDF]

    Die Nutzung sozialer Medien hat sich nicht nur im Alltag, sondern auch in vielen verschiedenen Notfällen, Krisen und Katastrophen etabliert. Dieser Prozess begann bereits vor über 15 Jahren nach den Terroranschlägen vom 11. September 2001. In den darauffolgenden Jahren, vor allem in den vergangenen zehn, wurden eine Vielzahl von Studien veröffentlicht, die sich auf den Gebrauch von Informations- und Kommunikations-technologien und sozialen Medien vor, während oder nach Notfällen konzentrieren. Dieser Forschungsbereich wird auch unter dem Begriff Crisis Informatics zusammengefasst. Das Ziel dieses Kapitels ist es, den Gebrauch von und die Forschung über soziale Medien in Katastrophen und Notfällen in den vergangenen 15 Jahren und mit besonderem Schwerpunkt auf identifizierbare Nutzungsmuster und der Wahrnehmung zusammenzufassen, um die bisherigen Ergebnisse und zukünftigen Potenziale herauszustellen.

    @incollection{reuter_soziale_2018-1,
    address = {Wiesbaden},
    title = {Soziale {Medien} in {Notfällen}, {Krisen} und {Katastrophen}},
    isbn = {978-3-658-19523-6},
    url = {https://link.springer.com/chapter/10.1007/978-3-658-19523-6_19},
    abstract = {Die Nutzung sozialer Medien hat sich nicht nur im Alltag, sondern auch in vielen verschiedenen Notfällen, Krisen und Katastrophen etabliert. Dieser Prozess begann bereits vor über 15 Jahren nach den Terroranschlägen vom 11. September 2001. In den darauffolgenden Jahren, vor allem in den vergangenen zehn, wurden eine Vielzahl von Studien veröffentlicht, die sich auf den Gebrauch von Informations- und Kommunikations-technologien und sozialen Medien vor, während oder nach Notfällen konzentrieren. Dieser Forschungsbereich wird auch unter dem Begriff Crisis Informatics zusammengefasst. Das Ziel dieses Kapitels ist es, den Gebrauch von und die Forschung über soziale Medien in Katastrophen und Notfällen in den vergangenen 15 Jahren und mit besonderem Schwerpunkt auf identifizierbare Nutzungsmuster und der Wahrnehmung zusammenzufassen, um die bisherigen Ergebnisse und zukünftigen Potenziale herauszustellen.},
    booktitle = {Sicherheitskritische {Mensch}-{Computer}-{Interaktion}: {Interaktive} {Technologien} und {Soziale} {Medien} im {Krisen}- und {Sicherheitsmanagement}},
    publisher = {Springer Vieweg},
    author = {Reuter, Christian and Kaufhold, Marc-André},
    editor = {Reuter, Christian},
    year = {2018},
    doi = {10.1007/978-3-658-19523-6_19},
    keywords = {Crisis, HCI, SocialMedia, Projekt-KontiKat},
    pages = {379--402},
    }

  • Christian Reuter, Thomas Ludwig, Volkmar Pipek (2018)
    Resilienz durch Kooperationstechnologien
    In: Christian Reuter: Sicherheitskritische Mensch-Computer-Interaktion: Interaktive Technologien und Soziale Medien im Krisen- und Sicherheitsmanagement. Wiesbaden, Germany: Springer Vieweg, , 443–465. doi:10.1007/978-3-658-19523-6_22
    [BibTeX] [Abstract] [Download PDF]

    Kooperationstechnologien spielen in sicherheitskritischen Systemen eine große Rolle, da in vielen Anwendungsfeldern nicht nur die Interaktion von Mensch und Computer, sondern auch die durch IT unterstützte Kooperation zwischen Menschen notwendig ist, um Aufgaben bewältigen zu können. Solche Technologien müssen verschiedene Anforderungen erfüllen und können ebenfalls zur Resilienz beitragen. Unter Resilienz durch Kooperation verstehen wir die Fähigkeit, Krisen durch die Anpassungsfähigkeit an geänderte Realitäten ohne nachhaltigen Schaden mithilfe von Kooperation zu überstehen. Während das Konzept der Resilienz in den Ingenieurwissenschaften vornehmlich die Verfügbarkeit technischer Systeme fokussiert, betrachten wir Resilienz als soziotechnisches Konstrukt, unter expliziter Betrachtung der beteiligten Akteure. Basierend auf Grundlagen zu Kooperationstechnologien zeigt unser Kapitel anhand von praktischen exemplarisch umgesetzten Kooperationstechnologien (soziales Netzwerk, GIS-System, Smartphone Apps, Facebook App und Social Media Analytics-Plattform), wie Kooperation unterstützt wird und zu kooperativer Resilienz beitragen kann.

    @incollection{reuter_resilienz_2018,
    address = {Wiesbaden, Germany},
    title = {Resilienz durch {Kooperationstechnologien}},
    isbn = {978-3-658-19523-6},
    url = {https://link.springer.com/chapter/10.1007/978-3-658-19523-6_22},
    abstract = {Kooperationstechnologien spielen in sicherheitskritischen Systemen eine große Rolle, da in vielen Anwendungsfeldern nicht nur die Interaktion von Mensch und Computer, sondern auch die durch IT unterstützte Kooperation zwischen Menschen notwendig ist, um Aufgaben bewältigen zu können. Solche Technologien müssen verschiedene Anforderungen erfüllen und können ebenfalls zur Resilienz beitragen. Unter Resilienz durch Kooperation verstehen wir die Fähigkeit, Krisen durch die Anpassungsfähigkeit an geänderte Realitäten ohne nachhaltigen Schaden mithilfe von Kooperation zu überstehen. Während das Konzept der Resilienz in den Ingenieurwissenschaften vornehmlich die Verfügbarkeit technischer Systeme fokussiert, betrachten wir Resilienz als soziotechnisches Konstrukt, unter expliziter Betrachtung der beteiligten Akteure. Basierend auf Grundlagen zu Kooperationstechnologien zeigt unser Kapitel anhand von praktischen exemplarisch umgesetzten Kooperationstechnologien (soziales Netzwerk, GIS-System, Smartphone Apps, Facebook App und Social Media Analytics-Plattform), wie Kooperation unterstützt wird und zu kooperativer Resilienz beitragen kann.},
    booktitle = {Sicherheitskritische {Mensch}-{Computer}-{Interaktion}: {Interaktive} {Technologien} und {Soziale} {Medien} im {Krisen}- und {Sicherheitsmanagement}},
    publisher = {Springer Vieweg},
    author = {Reuter, Christian and Ludwig, Thomas and Pipek, Volkmar},
    editor = {Reuter, Christian},
    year = {2018},
    doi = {10.1007/978-3-658-19523-6_22},
    keywords = {Cooperation, HCI, SocialMedia, Projekt-KontiKat, Infrastructure, RSF},
    pages = {443--465},
    }

  • Marc-André Kaufhold, Nicola Rupp, Christian Reuter, Christoph Amelunxen, Massimo Cristaldi (2018)
    112.SOCIAL: Design and Evaluation of a Mobile Crisis App for Bidirectional Communication between Emergency Services and Citizen
    Proceedings of the European Conference on Information Systems (ECIS) Portsmouth, UK.
    [BibTeX] [Abstract] [Download PDF]

    Emergencies threaten human lives and overall societal continuity, whether or not the crises and disas- ters are induced by nature, such as earthquakes, floods and hurricanes, or by human beings, such as accidents, terror attacks and uprisings. In such situations, not only do citizens demand information about the damage and safe behaviour, but emergency services also require high quality information to improve situational awareness. For this purpose, there are currently two kinds of apps available: Gen- eral-purpose apps, such as Facebook Safety Check or Twitter Alerts, already integrate safety features. Specific crisis apps, such as KATWARN in Germany or FEMA in the US, provide information on how to behave before, during and after emergencies, and capabilities for reporting incidents or receiving disaster warnings. In this paper, we analyse authorities‘ and citizens‘ information demands and features of crisis apps. Moreover, we present the concept, implementation and evaluation of a crisis app for incident reporting and bidirectional communication between authorities and citizens. Using the app, citizens may (1) report incidents by providing a category, description, location and multimedia files and (2) receive broadcasts and responses from authorities. Finally, we outline features, requirements and contextual factors for incident reporting and bidirectional communication via mobile app.

    @inproceedings{kaufhold_112social_2018,
    address = {Portsmouth, UK},
    title = {112.{SOCIAL}: {Design} and {Evaluation} of a {Mobile} {Crisis} {App} for {Bidirectional} {Communication} between {Emergency} {Services} and {Citizen}},
    url = {https://peasec.de/paper/2018/2018_KaufholdRuppReuterAmelunxenCristaldi_112Social_ECIS.pdf},
    abstract = {Emergencies threaten human lives and overall societal continuity, whether or not the crises and disas- ters are induced by nature, such as earthquakes, floods and hurricanes, or by human beings, such as accidents, terror attacks and uprisings. In such situations, not only do citizens demand information about the damage and safe behaviour, but emergency services also require high quality information to improve situational awareness. For this purpose, there are currently two kinds of apps available: Gen- eral-purpose apps, such as Facebook Safety Check or Twitter Alerts, already integrate safety features. Specific crisis apps, such as KATWARN in Germany or FEMA in the US, provide information on how to behave before, during and after emergencies, and capabilities for reporting incidents or receiving disaster warnings. In this paper, we analyse authorities' and citizens' information demands and features of crisis apps. Moreover, we present the concept, implementation and evaluation of a crisis app for incident reporting and bidirectional communication between authorities and citizens. Using the app, citizens may (1) report incidents by providing a category, description, location and multimedia files and (2) receive broadcasts and responses from authorities. Finally, we outline features, requirements and contextual factors for incident reporting and bidirectional communication via mobile app.},
    booktitle = {Proceedings of the {European} {Conference} on {Information} {Systems} ({ECIS})},
    publisher = {AIS},
    author = {Kaufhold, Marc-André and Rupp, Nicola and Reuter, Christian and Amelunxen, Christoph and Cristaldi, Massimo},
    year = {2018},
    keywords = {Cooperation, Crisis, HCI, Projekt-EmerGent, A-Paper, Ranking-VHB-B, Ranking-WKWI-A, Ranking-CORE-A, Projekt-KontiKat},
    pages = {1--17},
    }

  • Christian Reuter, Marc-André Kaufhold (2018)
    Usable Safety Engineering sicherheitskritischer interaktiver Systeme
    In: Christian Reuter: Sicherheitskritische Mensch-Computer-Interaktion: Interaktive Technologien und Soziale Medien im Krisen- und Sicherheitsmanagement. Wiesbaden, Germany: Springer Vieweg, , 17–40. doi:10.1007/978-3-658-19523-6_2
    [BibTeX] [Abstract] [Download PDF]

    Die Gestaltung gebrauchstauglicher, interaktiver und kooperativer Systeme wird bereits seit den 1980er Jahren in der Disziplin Mensch-Computer-Interaktion (MCI) und Com-puterunterstützte Gruppenarbeit (CSCW) behandelt. Es gibt jedoch einige Besonderhei-ten der MCI im Kontext sicherheitskritischer Systeme, insbesondere der störungsfreien Nutzung von IT (Safety) zu beachten. Dieses Kapitel stellt die wichtigsten Merkmale der Anwendung von Gestaltungsmethoden der MCI in sicherheitskritischen Systemen dar. Hierfür werden zu Beginn die Grundlagen der beiden Gebiete – der MCI sowie des Kri-sen- und Sicherheitsmanagements – erläutert. Darauf aufbauend werden Ansätze und Methoden der Analyse, des Designs und der Entwicklung sowie der Evaluation der MCI unter besonderer Berücksichtigung sicherheitskritischer Systeme diskutiert. Aspekte wie Risikoanalysen in der Anforderungsanalyse, die Einkalkulierung von Bedienfehlern und Rückfallebenen im Systemdesign gehören ebenso dazu wie besondere Herausforderun-gen bei Evaluationen.

    @incollection{reuter_usable_2018,
    address = {Wiesbaden, Germany},
    title = {Usable {Safety} {Engineering} sicherheitskritischer interaktiver {Systeme}},
    isbn = {978-3-658-19523-6},
    url = {https://link.springer.com/chapter/10.1007/978-3-658-19523-6_2},
    abstract = {Die Gestaltung gebrauchstauglicher, interaktiver und kooperativer Systeme wird bereits seit den 1980er Jahren in der Disziplin Mensch-Computer-Interaktion (MCI) und Com-puterunterstützte Gruppenarbeit (CSCW) behandelt. Es gibt jedoch einige Besonderhei-ten der MCI im Kontext sicherheitskritischer Systeme, insbesondere der störungsfreien Nutzung von IT (Safety) zu beachten. Dieses Kapitel stellt die wichtigsten Merkmale der Anwendung von Gestaltungsmethoden der MCI in sicherheitskritischen Systemen dar. Hierfür werden zu Beginn die Grundlagen der beiden Gebiete – der MCI sowie des Kri-sen- und Sicherheitsmanagements – erläutert. Darauf aufbauend werden Ansätze und Methoden der Analyse, des Designs und der Entwicklung sowie der Evaluation der MCI unter besonderer Berücksichtigung sicherheitskritischer Systeme diskutiert. Aspekte wie Risikoanalysen in der Anforderungsanalyse, die Einkalkulierung von Bedienfehlern und Rückfallebenen im Systemdesign gehören ebenso dazu wie besondere Herausforderun-gen bei Evaluationen.},
    booktitle = {Sicherheitskritische {Mensch}-{Computer}-{Interaktion}: {Interaktive} {Technologien} und {Soziale} {Medien} im {Krisen}- und {Sicherheitsmanagement}},
    publisher = {Springer Vieweg},
    author = {Reuter, Christian and Kaufhold, Marc-André},
    editor = {Reuter, Christian},
    year = {2018},
    doi = {10.1007/978-3-658-19523-6_2},
    keywords = {HCI, UsableSec, Security, Projekt-KontiKat, Projekt-CRISP},
    pages = {17--40},
    }

  • Christian Reuter, Jens Pottebaum (2018)
    Special Issue on IT Support for Crisis and Continuity Management – International Journal of Information Systems for Crisis Response and Management (IJISCRAM)
    .
    [BibTeX] [Download PDF]

    @book{reuter_special_2018-1,
    title = {Special {Issue} on {IT} {Support} for {Crisis} and {Continuity} {Management} - {International} {Journal} of {Information} {Systems} for {Crisis} {Response} and {Management} ({IJISCRAM})},
    volume = {10},
    url = {https://www.igi-global.com/journals/open-access/table-of-contents/international-journal-information-systems-crisis/1119?v=10&sitid=212700},
    number = {1},
    author = {Reuter, Christian and Pottebaum, Jens},
    year = {2018},
    note = {Publication Title: International Journal of Information Systems for Crisis Response and Management (IJISCRAM)},
    keywords = {Crisis, Projekt-KontiKat, Infrastructure, RSF},
    }

  • Christian Reuter, Jens Pottebaum (2018)
    Guest Editorial Preface: Special Issue on IT-Support for Crisis and Continuity Management
    International Journal of Information Systems for Crisis Response and Management (IJISCRAM) ;10(1):v–viii.
    [BibTeX] [Download PDF]

    @article{reuter_guest_2018,
    title = {Guest {Editorial} {Preface}: {Special} {Issue} on {IT}-{Support} for {Crisis} and {Continuity} {Management}},
    volume = {10},
    url = {http://www.peasec.de/paper/2018/2018_ReuterPottebaum_EditorialCrisisContinuityManagement_IJISCRAM.pdf},
    number = {1},
    journal = {International Journal of Information Systems for Crisis Response and Management (IJISCRAM)},
    author = {Reuter, Christian and Pottebaum, Jens},
    year = {2018},
    keywords = {Crisis, Projekt-KontiKat, Infrastructure, RSF},
    pages = {v--viii},
    }

  • Christian Reuter, Marc-André Kaufhold (2018)
    Informatik für Frieden und Sicherheit
    In: Christian Reuter: Sicherheitskritische Mensch-Computer-Interaktion: Interaktive Technologien und Soziale Medien im Krisen- und Sicherheitsmanagement. Wiesbaden, Germany: Springer Vieweg, , 573–595. doi:10.1007/978-3-658-19523-6_28
    [BibTeX] [Abstract] [Download PDF]

    Die Erkenntnisse aus Naturwissenschaft und Technik hatten bereits immer einen großen Einfluss auf die Art und Weise, wie Kriege und Konflikte ausgetragen werden konnten und ausgetragen wurden. Im Kontext von Frieden und Sicherheit können Erkenntnisse, die eigentlich für zivile Kontexte entwickelt wurden, auch für militärische Auseinandersetzungen genutzt werden (Dual-Use). Seit einigen Jahren betrifft dies insbesondere die Informatik, die durch die militärische Nutzung von Computern, Cyberwar, Information Warfare, einschließlich terroristischer Propaganda, Fake News, Ausspähung und Hacking konfliktäre Auseinandersetzungen unterstützen kann. Auch werden Konflikte vermehrt im digitalen Raum ausgetragen, mit erschwerter Zurechenbarkeit zu einzelnen (angreifenden) Akteuren. Die Informatik bietet jedoch auch für friedensstiftende Aktivitäten einige Möglichkeiten. Dieses Kapitel möchte eine Einführung in dieses an Bedeutung gewinnende Gebiet liefern.

    @incollection{reuter_informatik_2018,
    address = {Wiesbaden, Germany},
    title = {Informatik für {Frieden} und {Sicherheit}},
    isbn = {978-3-658-19523-6},
    url = {https://link.springer.com/chapter/10.1007/978-3-658-19523-6_28},
    abstract = {Die Erkenntnisse aus Naturwissenschaft und Technik hatten bereits immer einen großen Einfluss auf die Art und Weise, wie Kriege und Konflikte ausgetragen werden konnten und ausgetragen wurden. Im Kontext von Frieden und Sicherheit können Erkenntnisse, die eigentlich für zivile Kontexte entwickelt wurden, auch für militärische Auseinandersetzungen genutzt werden (Dual-Use). Seit einigen Jahren betrifft dies insbesondere die Informatik, die durch die militärische Nutzung von Computern, Cyberwar, Information Warfare, einschließlich terroristischer Propaganda, Fake News, Ausspähung und Hacking konfliktäre Auseinandersetzungen unterstützen kann. Auch werden Konflikte vermehrt im digitalen Raum ausgetragen, mit erschwerter Zurechenbarkeit zu einzelnen (angreifenden) Akteuren. Die Informatik bietet jedoch auch für friedensstiftende Aktivitäten einige Möglichkeiten. Dieses Kapitel möchte eine Einführung in dieses an Bedeutung gewinnende Gebiet liefern.},
    booktitle = {Sicherheitskritische {Mensch}-{Computer}-{Interaktion}: {Interaktive} {Technologien} und {Soziale} {Medien} im {Krisen}- und {Sicherheitsmanagement}},
    publisher = {Springer Vieweg},
    author = {Reuter, Christian and Kaufhold, Marc-André},
    editor = {Reuter, Christian},
    year = {2018},
    doi = {10.1007/978-3-658-19523-6_28},
    keywords = {Crisis, Security, Projekt-KontiKat, Peace, Projekt-CRISP},
    pages = {573--595},
    }

  • Christian Reuter, Amanda Lee Hughes, Starr Roxanne Hiltz, Muhammad Imran, Linda Plotnick (2018)
    Editorial of the Special Issue on Social Media in Crisis Management
    International Journal on Human-Computer Interaction (IJHCI) ;34(4):277–279. doi:10.1080/10447318.2018.1427833
    [BibTeX] [Abstract] [Download PDF]

    Social media is gaining more and more importance in crisis management: “Social media continue to evolve, and so does their use in emergency and crisis events” (Reuter et al., 2018). Related research is sometimes called “crisis informatics” (Palen et al., 2009). This special issue was initiated based on the track “Social Media Studies” at previous ISCRAM (Information Systems for Crisis Response and Management) conferences. It is usually one of the tracks with the most submissions, however we (successfully) aimed to also invite scholars from other venues to contribute.

    @article{reuter_editorial_2018,
    title = {Editorial of the {Special} {Issue} on {Social} {Media} in {Crisis} {Management}},
    volume = {34},
    url = {http://www.peasec.de/paper/2018/2018_ReuterHughesHiltzImranPlotnik_EditorialSpecialIssueSocialMediaCrisisManagement_IJHCI.pdf},
    doi = {10.1080/10447318.2018.1427833},
    abstract = {Social media is gaining more and more importance in crisis management: “Social media continue to evolve, and so does their use in emergency and crisis events” (Reuter et al., 2018). Related research is sometimes called “crisis informatics” (Palen et al., 2009). This special issue was initiated based on the track “Social Media Studies” at previous ISCRAM (Information Systems for Crisis Response and Management) conferences. It is usually one of the tracks with the most submissions, however we (successfully) aimed to also invite scholars from other venues to contribute.},
    number = {4},
    journal = {International Journal on Human-Computer Interaction (IJHCI)},
    author = {Reuter, Christian and Hughes, Amanda Lee and Hiltz, Starr Roxanne and Imran, Muhammad and Plotnick, Linda},
    year = {2018},
    keywords = {Crisis, HCI, SocialMedia, Ranking-ImpactFactor, Ranking-WKWI-B, Projekt-KontiKat, Ranking-CORE-B, RSF},
    pages = {277--279},
    }

  • Christian Reuter, Gerhard Backfried, Marc-André Kaufhold, Fabian Spahr (2018)
    ISCRAM turns 15: A Trend Analysis of Social Media Papers 2004-2017
    Proceedings of the Information Systems for Crisis Response and Management (ISCRAM) Rochester, New York, USA.
    [BibTeX] [Abstract] [Download PDF]

    In 2004, Information Systems for Crisis Response and Management (ISCRAM) was a new area of research. Pio- neering researchers from different continents and disciplines found fellowship at the first ISCRAM workshop. Around the same time, the use of social media in crises was first recognized in academia. In 2018, the 15 th IS- CRAM conference will take place, which gives us the possibility to look back on what has already been achieved with regard to IT support in crises using social media. With this article, we examine trends and developments with a specific focus on social media. We analyzed all papers published at previous ISCRAMs (n=1339). Our analysis shows that various platforms, the use of language and coverage of different types of disasters follow certain trends – most noticeably a dominance of Twitter, English and crises with large impacts such as hurricanes or earthquakes can be seen.

    @inproceedings{reuter_iscram_2018,
    address = {Rochester, New York, USA},
    title = {{ISCRAM} turns 15: {A} {Trend} {Analysis} of {Social} {Media} {Papers} 2004-2017},
    url = {http://www.peasec.de/paper/2018/2018_ReuterBackfriedKaufholdSpahn_15YearsISCRAM.pdf},
    abstract = {In 2004, Information Systems for Crisis Response and Management (ISCRAM) was a new area of research. Pio- neering researchers from different continents and disciplines found fellowship at the first ISCRAM workshop. Around the same time, the use of social media in crises was first recognized in academia. In 2018, the 15 th IS- CRAM conference will take place, which gives us the possibility to look back on what has already been achieved with regard to IT support in crises using social media. With this article, we examine trends and developments with a specific focus on social media. We analyzed all papers published at previous ISCRAMs (n=1339). Our analysis shows that various platforms, the use of language and coverage of different types of disasters follow certain trends – most noticeably a dominance of Twitter, English and crises with large impacts such as hurricanes or earthquakes can be seen.},
    booktitle = {Proceedings of the {Information} {Systems} for {Crisis} {Response} and {Management} ({ISCRAM})},
    publisher = {ISCRAM},
    author = {Reuter, Christian and Backfried, Gerhard and Kaufhold, Marc-André and Spahr, Fabian},
    editor = {Boersma, Kees and Tomaszewski, Brian},
    year = {2018},
    keywords = {Crisis, HCI, SocialMedia, Student, Projekt-KontiKat},
    pages = {1--14},
    }

  • Marc-André Kaufhold, Thea Riebe, Christian Reuter, Julian Hester, Danny Jeske, Lisa Knüver, Viktoria Richert (2018)
    Business Continuity Management in Micro Enterprises: Perception, Strategies and Use of ICT
    International Journal of Information Systems for Crisis Response and Management (IJISCRAM) ;10(1):1–19. doi:10.4018/IJISCRAM.2018010101
    [BibTeX] [Abstract] [Download PDF]

    Small and medium-sized enterprises (SMEs) represent 99\% of enterprises in Germany and more than 95\% in the European Union. Given the recent increase of natural disasters and man-made crises and emergencies, it seems an important economic goal to ascertain that SMEs are capable of maintaining their work, revenue and profit at an acceptable level. According to ISO 22301, business continuity management (BCM) is a holistic management process which identifies potential threats and their impact to an organization and serves as a framework to increase organizational resilience and response capabilities. Prior research identified that BCM is under-represented in SMEs and that their security level is partially in an uneconomical range. This article presents the analysis of interviews with 19 independent micro enterprises highlighting findings on their low crisis awareness, varying technical dependency, existing action strategies and communication strategies and proposing a categorization of micro enterprises as preventive technicians, data-intensive chains or pragmatic jumpers.

    @article{kaufhold_business_2018,
    title = {Business {Continuity} {Management} in {Micro} {Enterprises}: {Perception}, {Strategies} and {Use} of {ICT}},
    volume = {10},
    url = {http://www.peasec.de/paper/2018/2018_KaufholdRiebeReuteretal_BusinessContinuityManagementinMicroEnterprises_IJISCRAM.pdf},
    doi = {10.4018/IJISCRAM.2018010101},
    abstract = {Small and medium-sized enterprises (SMEs) represent 99\% of enterprises in Germany and more than 95\% in the European Union. Given the recent increase of natural disasters and man-made crises and emergencies, it seems an important economic goal to ascertain that SMEs are capable of maintaining their work, revenue and profit at an acceptable level. According to ISO 22301, business continuity management (BCM) is a holistic management process which identifies potential threats and their impact to an organization and serves as a framework to increase organizational resilience and response capabilities. Prior research identified that BCM is under-represented in SMEs and that their security level is partially in an uneconomical range. This article presents the analysis of interviews with 19 independent micro enterprises highlighting findings on their low crisis awareness, varying technical dependency, existing action strategies and communication strategies and proposing a categorization of micro enterprises as preventive technicians, data-intensive chains or pragmatic jumpers.},
    number = {1},
    journal = {International Journal of Information Systems for Crisis Response and Management (IJISCRAM)},
    author = {Kaufhold, Marc-André and Riebe, Thea and Reuter, Christian and Hester, Julian and Jeske, Danny and Knüver, Lisa and Richert, Viktoria},
    year = {2018},
    keywords = {Cooperation, Crisis, Student, Security, Projekt-KontiKat, Infrastructure, RSF, Projekt-MAKI},
    pages = {1--19},
    }

  • Christian Reuter, Marc-André Kaufhold, Thomas Spielhofer, Anna Sophie Hahne (2018)
    Soziale Medien und Apps in Notsituationen: Eine repräsentative Studie über die Wahrnehmung in Deutschland
    BBK Bevölkerungsschutz: 2018.
    [BibTeX] [Abstract] [Download PDF]

    Helfer bei Hochwassergefahr mobilisieren oder bei einem Terroranschlag Freunden auf Facebook mitteilen, dass es einem gut geht – immer mehr Menschen nutzen soziale Medien in Notsituationen, Krisen- oder Katastrophenlagen. Schließlich ist es heute kein Geheimnis mehr, dass soziale Medien in jenen Lagen (z. B. Überschwemmungen, Stürme, terroristische Anschläge) für diverse Gruppen (z. B. Bürger, Rettungsdienste) von Nutzen sein können. Während Stärken und Schwächen dieser Nutzung bereits eingehend erforscht wurden, widmen sich nur wenige Studien den betreffenden Wahrnehmungen innerhalb der Bevölkerung. Unsere repräsentative Untersuchung von Einstellungen der Bevölkerung in Deutschland gegenüber der Nutzung sozialer Medien in Notsituationen stellt die erste ihrer Art dar. Dabei zeigt sich, dass ungefähr die Hälfte der Befragten (44 \%) bereits in Notsituationen zum Zwecke des Teilens und / oder Herausfindens von Informationen auf soziale Medien zurückgegriffen hat. Zudem werden falsche Gerüchte in sozialen Medien mehrheitlich (74 \%) als Bedrohung empfunden. Notfall-Apps für das eigene Smartphone werden selten (16 \%) heruntergeladen, wobei Wetter- und Erste-Hilfe-Apps am beliebtesten sind.

    @techreport{reuter_soziale_2018,
    address = {BBK Bevölkerungsschutz},
    title = {Soziale {Medien} und {Apps} in {Notsituationen}: {Eine} repräsentative {Studie} über die {Wahrnehmung} in {Deutschland}},
    url = {http://www.peasec.de/paper/2018/2018_ReuterKaufholdSpielhoferHahne_SozialeMedienAppsNotsituationen_BBK.pdf},
    abstract = {Helfer bei Hochwassergefahr mobilisieren oder bei einem Terroranschlag Freunden auf Facebook mitteilen, dass es einem gut geht – immer mehr Menschen nutzen soziale Medien in Notsituationen, Krisen- oder Katastrophenlagen. Schließlich ist es heute kein Geheimnis mehr, dass soziale Medien in jenen Lagen (z. B. Überschwemmungen, Stürme, terroristische Anschläge) für diverse Gruppen (z. B. Bürger, Rettungsdienste) von Nutzen sein können. Während Stärken und Schwächen dieser Nutzung bereits eingehend erforscht wurden, widmen sich nur wenige Studien den betreffenden Wahrnehmungen innerhalb der Bevölkerung. Unsere repräsentative Untersuchung von Einstellungen der Bevölkerung in Deutschland gegenüber der Nutzung sozialer Medien in Notsituationen stellt die erste ihrer Art dar. Dabei zeigt sich, dass ungefähr die Hälfte der Befragten (44 \%) bereits in Notsituationen zum Zwecke des Teilens und / oder Herausfindens von Informationen auf soziale Medien zurückgegriffen hat. Zudem werden falsche Gerüchte in sozialen Medien mehrheitlich (74 \%) als Bedrohung empfunden. Notfall-Apps für das eigene Smartphone werden selten (16 \%) heruntergeladen, wobei Wetter- und Erste-Hilfe-Apps am beliebtesten sind.},
    author = {Reuter, Christian and Kaufhold, Marc-André and Spielhofer, Thomas and Hahne, Anna Sophie},
    year = {2018},
    keywords = {Crisis, HCI, SocialMedia, Projekt-EmerGent, Projekt-KontiKat},
    pages = {22--24},
    }

  • Christian Reuter, Thomas Ludwig, Marc-André Kaufhold, Thomas Spielhofer (2018)
    Studie: Wie sehen Mitarbeiter von Feuerwehr und THW den Einsatz sozialer Medien in Gefahrenlagen?
    Crisis Prevention: 2018.
    [BibTeX] [Download PDF]

    @techreport{reuter_studie_2018,
    address = {Crisis Prevention},
    title = {Studie: {Wie} sehen {Mitarbeiter} von {Feuerwehr} und {THW} den {Einsatz} sozialer {Medien} in {Gefahrenlagen}?},
    url = {http://www.peasec.de/paper/2018/2018_ReuterLudwigKaufholdSpielhofer_FeuerwehrTHWSozialeMedienGefahrenlagen_CrisisPrevention.pdf},
    author = {Reuter, Christian and Ludwig, Thomas and Kaufhold, Marc-André and Spielhofer, Thomas},
    year = {2018},
    keywords = {Crisis, HCI, SocialMedia, Projekt-EmerGent, Projekt-KontiKat},
    pages = {64--66},
    }

  • Christian Reuter, Amanda Lee Hughes, Marc-André Kaufhold (2018)
    Social Media in Crisis Management: An Evaluation and Analysis of Crisis Informatics Research
    International Journal on Human-Computer Interaction (IJHCI) ;34(4):280–294. doi:10.1080/10447318.2018.1427832
    [BibTeX] [Abstract] [Download PDF]

    Since the terrorist attacks of 9/11, the use of social media in emergency and crisis events has greatly increased and many studies have concentrated on the use of ICT and social media be-fore, during or after these events. The field of research that these studies fall under is called cri-sis informatics. In this paper, we evaluate and analyze crisis informatics research by looking at case studies of social media use in emergencies, outlining the types of research found in crisis informatics, and expounding upon the forms of interaction that have been researched. Finally, we summarize the achievements from an HCI perspective and outline trends and challenges for future research.

    @article{reuter_social_2018,
    title = {Social {Media} in {Crisis} {Management}: {An} {Evaluation} and {Analysis} of {Crisis} {Informatics} {Research}},
    volume = {34},
    url = {http://www.peasec.de/paper/2018/2018_ReuterHughesKaufhold_SocialMediaCrisisManagementEvaluation_IJHCI.pdf},
    doi = {10.1080/10447318.2018.1427832},
    abstract = {Since the terrorist attacks of 9/11, the use of social media in emergency and crisis events has greatly increased and many studies have concentrated on the use of ICT and social media be-fore, during or after these events. The field of research that these studies fall under is called cri-sis informatics. In this paper, we evaluate and analyze crisis informatics research by looking at case studies of social media use in emergencies, outlining the types of research found in crisis informatics, and expounding upon the forms of interaction that have been researched. Finally, we summarize the achievements from an HCI perspective and outline trends and challenges for future research.},
    number = {4},
    journal = {International Journal on Human-Computer Interaction (IJHCI)},
    author = {Reuter, Christian and Hughes, Amanda Lee and Kaufhold, Marc-André},
    year = {2018},
    keywords = {AuswahlCrisis, Crisis, HCI, Selected, SocialMedia, A-Paper, Ranking-ImpactFactor, Ranking-WKWI-B, Projekt-KontiKat, Peace, Ranking-CORE-B},
    pages = {280--294},
    }

  • Thea Riebe, Alfred Nordmann, Christian Reuter (2018)
    Responsible Research and Innovation: Interdisziplinärer Workshop von IANUS und Schader-Stiftung
    Wissenschaft & Frieden: 2018.
    [BibTeX] [Abstract] [Download PDF]

    Statt der Forschung ethische, rechtliche, gesellschaftliche Refl exion nur beizuge-sellen, verlangt Responsible Research and Innovation (RRI), dass sich Forschung an europäischen Werten – den Werten der Europäischen Union – orientiert. Um diese Öff nung zu gewährleisten, setzt RRI zunächst nicht auf spezifi sche Werte, sondern prozedural auf eine Forschung, die Folgen antizipiert, unterschiedliche Interessen und Wertvorstellungen inklu-diert, sich selbst refl ektiert und in die Verantwortung nehmen lässt. Doch was heißt das ?

    @techreport{riebe_responsible_2018,
    address = {Wissenschaft \& Frieden},
    title = {Responsible {Research} and {Innovation}: {Interdisziplinärer} {Workshop} von {IANUS} und {Schader}-{Stiftung}},
    url = {http://www.peasec.de/paper/2018/2018_RiebeNordmannReuter_RRI_WuF.pdf},
    abstract = {Statt der Forschung ethische, rechtliche, gesellschaftliche Refl exion nur beizuge-sellen, verlangt Responsible Research and Innovation (RRI), dass sich Forschung an europäischen Werten – den Werten der Europäischen Union – orientiert. Um diese Öff nung zu gewährleisten, setzt RRI zunächst nicht auf spezifi sche Werte, sondern prozedural auf eine Forschung, die Folgen antizipiert, unterschiedliche Interessen und Wertvorstellungen inklu-diert, sich selbst refl ektiert und in die Verantwortung nehmen lässt. Doch was heißt das ?},
    author = {Riebe, Thea and Nordmann, Alfred and Reuter, Christian},
    year = {2018},
    keywords = {Projekt-KontiKat, Peace, Projekt-CRISP, Projekt-DualUse},
    pages = {60--61},
    }

  • Simon Scholl, Christian Reuter, Thomas Ludwig, Marc-André Kaufhold (2018)
    SocialML: EUD im Maschine Learning zur Analyse sozialer Medien
    Mensch und Computer – Tagungsband Dresden, Germany.
    [BibTeX] [Abstract] [Download PDF]

    Die Analyse sozialer Medien hat eine enorme Bedeutung für die verschiedensten Bereiche, wie bei-spielsweise die Lagebeurteilung, journalistische Recherchen oder unternehmerische Analysen. Dabei sind die entsprechenden Analysten unterschiedlichen Kontextfaktoren unterworfen. Sei es durch ihren organisationalen Hintergrund, durch tätigkeitsbezogene Rollen oder den geografischen und zeitlichen Rahmen. Um den ständig im Wandel begriffenen Kontexten gerecht zu werden, ergeben sich permanent neue Herausforderungen für die Anpassbarkeit der Analyse. Dieser Beitrag untersucht, wie ein auf Machine Lear-ning (ML) basierendes Tool zur Social Media Analyse (SMA) im Sinne des End-User Development (EUD) auf verschiedenen Komplexitäts- und Schrittebenen umgesetzt werden kann.

    @inproceedings{scholl_socialml_2018,
    address = {Dresden, Germany},
    title = {{SocialML}: {EUD} im {Maschine} {Learning} zur {Analyse} sozialer {Medien}},
    url = {https://dl.gi.de/bitstream/handle/20.500.12116/16668/Beitrag_347_final__a.pdf},
    abstract = {Die Analyse sozialer Medien hat eine enorme Bedeutung für die verschiedensten Bereiche, wie bei-spielsweise die Lagebeurteilung, journalistische Recherchen oder unternehmerische Analysen. Dabei sind die entsprechenden Analysten unterschiedlichen Kontextfaktoren unterworfen. Sei es durch ihren organisationalen Hintergrund, durch tätigkeitsbezogene Rollen oder den geografischen und zeitlichen Rahmen. Um den ständig im Wandel begriffenen Kontexten gerecht zu werden, ergeben sich permanent neue Herausforderungen für die Anpassbarkeit der Analyse. Dieser Beitrag untersucht, wie ein auf Machine Lear-ning (ML) basierendes Tool zur Social Media Analyse (SMA) im Sinne des End-User Development (EUD) auf verschiedenen Komplexitäts- und Schrittebenen umgesetzt werden kann.},
    booktitle = {Mensch und {Computer} - {Tagungsband}},
    publisher = {Gesellschaft für Informatik e.V.},
    author = {Scholl, Simon and Reuter, Christian and Ludwig, Thomas and Kaufhold, Marc-André},
    year = {2018},
    keywords = {Crisis, HCI, SocialMedia, Student, Projekt-KontiKat},
    pages = {443--446},
    }

  • Thea Riebe, Katja Pätsch, Marc-André Kaufhold, Christian Reuter (2018)
    From Conspiracies to Insults: A Case Study of Radicalisation in Social Media Discourse
    Mensch und Computer – Workshopband Dresden, Germany.
    [BibTeX] [Abstract] [Download PDF]

    Online radicalisation is often linked to discourses on social media. In this context, the question arises how populist online discourses radicalise in social media platforms. With a quantitative content analysis of supporters of the German party “Alternative für Deutschland (AfD)” and their contributions on Facebook between March 2014 and May 2017, this preliminary analysis illustrates how the discourse shifts from a dominantly neutral debate to insult-driven and dis-criminatory contributions. It provides insights into the dynamic of political social media dis-courses and shows a tendency of correlating language style and topics that can be further studied in Social Media Analytics.

    @inproceedings{riebe_conspiracies_2018,
    address = {Dresden, Germany},
    title = {From {Conspiracies} to {Insults}: {A} {Case} {Study} of {Radicalisation} in {Social} {Media} {Discourse}},
    url = {https://dl.gi.de/bitstream/handle/20.500.12116/16795/Beitrag_449_final__a.pdf},
    abstract = {Online radicalisation is often linked to discourses on social media. In this context, the question arises how populist online discourses radicalise in social media platforms. With a quantitative content analysis of supporters of the German party “Alternative für Deutschland (AfD)” and their contributions on Facebook between March 2014 and May 2017, this preliminary analysis illustrates how the discourse shifts from a dominantly neutral debate to insult-driven and dis-criminatory contributions. It provides insights into the dynamic of political social media dis-courses and shows a tendency of correlating language style and topics that can be further studied in Social Media Analytics.},
    booktitle = {Mensch und {Computer} - {Workshopband}},
    publisher = {Gesellschaft für Informatik e.V.},
    author = {Riebe, Thea and Pätsch, Katja and Kaufhold, Marc-André and Reuter, Christian},
    editor = {Dachselt, Raimund and Weber, Gerhard},
    year = {2018},
    keywords = {Crisis, HCI, SocialMedia, Student, Projekt-KontiKat, Peace, Projekt-CRISP},
    pages = {595--603},
    }

  • Christian Reuter, Tilo Mentler, Simon Nestler, Michael Herczeg, Stefan Geisler, Thomas Ludwig, Volkmar Pipek, Jens Pottebaum (2018)
    5. Workshop Mensch-Maschine-Interaktion in sicherheitskritischen Systemen
    Mensch und Computer – Workshopband Dresden, Germany.
    [BibTeX] [Abstract] [Download PDF]

    Im Zentrum dieses Workshops stehen Erkenntnisse zur Mensch-Computer-Interaktion (MCI) in sicherheitskritischen Anwendungsgebieten. Da in solchen Feldern – etwa Katastrophenmanagement, Verkehr, Produktion oder Medizin – MCI eine immer größere Relevanz erhält, sind viele wissenschaftliche Gebiete, unter anderem die Informatik oder Mensch-Maschine Interaktion, zunehmend gefragt. Die Herausfor-derung besteht darin, bestehende Ansätze und Methoden zu diskutieren, anzupassen und innovative Lösungen zu entwickeln, die von den Nutzenden sicher und effizient verwendet werden können.

    @inproceedings{reuter_5_2018,
    address = {Dresden, Germany},
    title = {5. {Workshop} {Mensch}-{Maschine}-{Interaktion} in sicherheitskritischen {Systemen}},
    url = {https://dl.gi.de/bitstream/handle/20.500.12116/16929/Beitrag_328_final__a.pdf},
    abstract = {Im Zentrum dieses Workshops stehen Erkenntnisse zur Mensch-Computer-Interaktion (MCI) in sicherheitskritischen Anwendungsgebieten. Da in solchen Feldern – etwa Katastrophenmanagement, Verkehr, Produktion oder Medizin – MCI eine immer größere Relevanz erhält, sind viele wissenschaftliche Gebiete, unter anderem die Informatik oder Mensch-Maschine Interaktion, zunehmend gefragt. Die Herausfor-derung besteht darin, bestehende Ansätze und Methoden zu diskutieren, anzupassen und innovative Lösungen zu entwickeln, die von den Nutzenden sicher und effizient verwendet werden können.},
    booktitle = {Mensch und {Computer} - {Workshopband}},
    publisher = {Gesellschaft für Informatik e.V.},
    author = {Reuter, Christian and Mentler, Tilo and Nestler, Simon and Herczeg, Michael and Geisler, Stefan and Ludwig, Thomas and Pipek, Volkmar and Pottebaum, Jens},
    editor = {Dachselt, Raimund and Weber, Gerhard},
    year = {2018},
    keywords = {Crisis, HCI, UsableSec, Security, Projekt-KontiKat},
    pages = {565--569},
    }

  • Christian Reuter, Konstantin Aal, Frank Beham, Alexander Boden, Florian Brauner, Thomas Ludwig, Stephan Lukosch, Frank Fiedrich, Frank Fuchs-Kittowski, Stefan Geisler, Klaus Gennen, Dominik Herrmann, Marc-André Kaufhold, Michael Klafft, Myriam Lipprandt, Luigi Lo Iacono, Volkmar Pipek, Jens Pottebaum, Tilo Mentler, Simon Nestler, Stefan Stieglitz, Christian Sturm, Gebhard Rusch, Stefan Sackmann, Melanie Volkamer, Volker Wulf (2018)
    Die Zukunft sicherheitskritischer Mensch-Computer-Interaktion
    In: Christian Reuter: Sicherheitskritische Mensch-Computer-Interaktion: Interaktive Technologien und Soziale Medien im Krisen- und Sicherheitsmanagement. Wiesbaden, Germany: Springer Vieweg, , 621–630. doi:10.1007/978-3-658-19523-6_30
    [BibTeX] [Abstract] [Download PDF]

    Sicherheitskritische Mensch-Computer-Interaktion ist nicht nur derzeit, sondern auch zukünftig ein äußerst relevantes Thema. Hierbei kann ein Lehr- und Fachbuch, wie dieses, immer nur einen punktuellen Stand abdecken. Dennoch kann der Versuch unternommen werden, aktuelle Trends zu identifizieren und einen Ausblick in die Zukunft zu wagen. Genau das möchte dieses Kapitel erreichen: Es sollen zukünftige Entwicklungen vorausgesagt und versucht werden, diese korrekt einzuordnen. Das ist an dieser Stelle nicht nur durch den Herausgeber, sondern durch Abfrage bei zahlreichen am Lehrbuch beteiligten Autoren geschehen. Neben einem Ausblick auf Grundlagen und Methoden werden dementsprechend auch sicherheitskritische interaktive Systeme und sicherheitskritische kooperative Systeme abgedeckt.

    @incollection{reuter_zukunft_2018,
    address = {Wiesbaden, Germany},
    title = {Die {Zukunft} sicherheitskritischer {Mensch}-{Computer}-{Interaktion}},
    isbn = {978-3-658-19523-6},
    url = {https://link.springer.com/chapter/10.1007/978-3-658-19523-6_30},
    abstract = {Sicherheitskritische Mensch-Computer-Interaktion ist nicht nur derzeit, sondern auch zukünftig ein äußerst relevantes Thema. Hierbei kann ein Lehr- und Fachbuch, wie dieses, immer nur einen punktuellen Stand abdecken. Dennoch kann der Versuch unternommen werden, aktuelle Trends zu identifizieren und einen Ausblick in die Zukunft zu wagen. Genau das möchte dieses Kapitel erreichen: Es sollen zukünftige Entwicklungen vorausgesagt und versucht werden, diese korrekt einzuordnen. Das ist an dieser Stelle nicht nur durch den Herausgeber, sondern durch Abfrage bei zahlreichen am Lehrbuch beteiligten Autoren geschehen. Neben einem Ausblick auf Grundlagen und Methoden werden dementsprechend auch sicherheitskritische interaktive Systeme und sicherheitskritische kooperative Systeme abgedeckt.},
    booktitle = {Sicherheitskritische {Mensch}-{Computer}-{Interaktion}: {Interaktive} {Technologien} und {Soziale} {Medien} im {Krisen}- und {Sicherheitsmanagement}},
    publisher = {Springer Vieweg},
    author = {Reuter, Christian and Aal, Konstantin and Beham, Frank and Boden, Alexander and Brauner, Florian and Ludwig, Thomas and Lukosch, Stephan and Fiedrich, Frank and Fuchs-Kittowski, Frank and Geisler, Stefan and Gennen, Klaus and Herrmann, Dominik and Kaufhold, Marc-André and Klafft, Michael and Lipprandt, Myriam and Lo Iacono, Luigi and Pipek, Volkmar and Pottebaum, Jens and Mentler, Tilo and Nestler, Simon and Stieglitz, Stefan and Sturm, Christian and Rusch, Gebhard and Sackmann, Stefan and Volkamer, Melanie and Wulf, Volker},
    editor = {Reuter, Christian},
    year = {2018},
    doi = {10.1007/978-3-658-19523-6_30},
    keywords = {Crisis, HCI, SocialMedia, UsableSec, Security, Projekt-KontiKat},
    pages = {621--630},
    }

  • Christian Reuter (2018)
    Special Issue on Human-Computer-Interaction and Social Media in Safety-Critical Systems – Journal of Contingencies and Crisis Management (JCCM)
    Wiley.
    [BibTeX] [Download PDF]

    @book{reuter_special_2018-2,
    title = {Special {Issue} on {Human}-{Computer}-{Interaction} and {Social} {Media} in {Safety}-{Critical} {Systems} - {Journal} of {Contingencies} and {Crisis} {Management} ({JCCM})},
    volume = {26},
    url = {http://onlinelibrary.wiley.com/doi/10.1111/jccm.2018.26.issue-1/issuetoc},
    number = {1},
    publisher = {Wiley},
    author = {Reuter, Christian},
    year = {2018},
    note = {Publication Title: Journal of Contingencies and Crisis Management (JCCM)},
    keywords = {Crisis, HCI, SocialMedia, Projekt-EmerGent, Security, Ranking-ImpactFactor, Projekt-KontiKat},
    }

    2017

  • Daniel Wiegärtner, Christian Reuter, Claudia Müller (2017)
    Erwartungen der älteren Bevölkerung an IKT für Krisenkommunikation
    Mensch und Computer – Workshopband Regensburg, Germany. doi:10.18420/muc2017-ws17-0416
    [BibTeX] [Abstract] [Download PDF]

    Aufgrund des demographischen Wandels und der zunehmenden Bevölkerungsdichte im urbanen Raum wird es in Zukunft zu neuen Herausforderungen in der Planung und Vorbereitung von Katastrophen-lagen in Städten kommen. Dabei wird vor allem der Nutzen von IKT für ältere Menschen in Bezug auf (Groß-)Schadenslagen von hoher Relevanz sein, der in der bisherigen Forschung nicht angemessen be-trachtet wurde. Mittels eines nutzerzentrierten Ansatzes wird untersucht, wie eine geeignete Krisenkommunikation durch IKT für ältere Menschen funktionieren könnte. Ziel der Arbeit ist es, die Vorbereitung für die ältere Population in Großstädten im Falle einer (Groß-)Schadenslage zu untersuchen und zu un-terstützen. Gerade für das System Stadt sind die Ergebnisse dieser Arbeit von Relevanz und können hel-fen, den urbanen Raum resilienter gegen mögliche Katastrophen zu gestalten.

    @inproceedings{wiegartner_erwartungen_2017,
    address = {Regensburg, Germany},
    title = {Erwartungen der älteren {Bevölkerung} an {IKT} für {Krisenkommunikation}},
    url = {https://dl.gi.de/bitstream/handle/20.500.12116/3243/2017_WS17_416.pdf},
    doi = {10.18420/muc2017-ws17-0416},
    abstract = {Aufgrund des demographischen Wandels und der zunehmenden Bevölkerungsdichte im urbanen Raum wird es in Zukunft zu neuen Herausforderungen in der Planung und Vorbereitung von Katastrophen-lagen in Städten kommen. Dabei wird vor allem der Nutzen von IKT für ältere Menschen in Bezug auf (Groß-)Schadenslagen von hoher Relevanz sein, der in der bisherigen Forschung nicht angemessen be-trachtet wurde. Mittels eines nutzerzentrierten Ansatzes wird untersucht, wie eine geeignete Krisenkommunikation durch IKT für ältere Menschen funktionieren könnte. Ziel der Arbeit ist es, die Vorbereitung für die ältere Population in Großstädten im Falle einer (Groß-)Schadenslage zu untersuchen und zu un-terstützen. Gerade für das System Stadt sind die Ergebnisse dieser Arbeit von Relevanz und können hel-fen, den urbanen Raum resilienter gegen mögliche Katastrophen zu gestalten.},
    booktitle = {Mensch und {Computer} - {Workshopband}},
    publisher = {Gesellschaft für Informatik e.V.},
    author = {Wiegärtner, Daniel and Reuter, Christian and Müller, Claudia},
    editor = {Burghardt, M. and Wimmer, R. and Wolff, C. and Womser-Hacker, C.},
    year = {2017},
    keywords = {Crisis, HCI, Student, Projekt-KontiKat},
    pages = {609--614},
    }

  • Christian Reuter, Daniel Wiegärtner, Claudia Müller (2017)
    DIVOA – Unterstützung der älteren Bevölkerung bei Schadenslagen
    Mensch und Computer – Tagungsband Regensburg, Germany. doi:10.18420/muc2017-mci-0352
    [BibTeX] [Abstract] [Download PDF]

    Der demographische Wandel und die Urbanisierung können als die Megatrends der kommenden Jahre betrachten werden, wodurch sich neue Herausforderungen und Chancen für Städte ergeben. Gerade im Kontext von Katastrophen und Gefahren benötigt das System Stadt resiliente Ansätze, die mittels neuer Technologien gewährleistet werden können. Da IKT zeitnahe, kontextspezifische und persönliche Informationen ortsunabhängig liefern können, ist diese Entwicklung von hoher Relevanz für die Sicherstellung des Systems Stadt und dessen Bewohner. Im Kontext von Katastrophen und Gefahren weisen ältere Menschen aufgrund ihrer eingeschränkten physischen, sozialen und ökonomischen Fähigkeiten jedoch eine erhöhte Vulnerabilität auf. Diese Arbeit möchte, dies adressierend, einen Beitrag zur Integration der älteren Bevölkerung bei Schadenslagen darstellen und ein Konzept vorstellen.

    @inproceedings{reuter_divoa_2017,
    address = {Regensburg, Germany},
    title = {{DIVOA} – {Unterstützung} der älteren {Bevölkerung} bei {Schadenslagen}},
    url = {https://dl.gi.de/bitstream/handle/20.500.12116/3279/2017_MCI_352.pdf},
    doi = {10.18420/muc2017-mci-0352},
    abstract = {Der demographische Wandel und die Urbanisierung können als die Megatrends der kommenden Jahre betrachten werden, wodurch sich neue Herausforderungen und Chancen für Städte ergeben. Gerade im Kontext von Katastrophen und Gefahren benötigt das System Stadt resiliente Ansätze, die mittels neuer Technologien gewährleistet werden können. Da IKT zeitnahe, kontextspezifische und persönliche Informationen ortsunabhängig liefern können, ist diese Entwicklung von hoher Relevanz für die Sicherstellung des Systems Stadt und dessen Bewohner. Im Kontext von Katastrophen und Gefahren weisen ältere Menschen aufgrund ihrer eingeschränkten physischen, sozialen und ökonomischen Fähigkeiten jedoch eine erhöhte Vulnerabilität auf. Diese Arbeit möchte, dies adressierend, einen Beitrag zur Integration der älteren Bevölkerung bei Schadenslagen darstellen und ein Konzept vorstellen.},
    booktitle = {Mensch und {Computer} - {Tagungsband}},
    publisher = {Gesellschaft für Informatik e.V.},
    author = {Reuter, Christian and Wiegärtner, Daniel and Müller, Claudia},
    editor = {Burghardt, M. and Wimmer, R. and Wolff, C. and Womser-Hacker, C.},
    year = {2017},
    keywords = {Crisis, HCI, Student, Projekt-KontiKat},
    pages = {295--298},
    }

  • Christian Reuter, Marc-André Kaufhold, Marén Schorch, Jan Gerwinski, Christian Soost, Sohaib S. Hassan, Gebhard Rusch, Petra Moog, Volkmar Pipek, Volker Wulf (2017)
    Digitalisierung und Zivile Sicherheit: Zivilgesellschaftliche und betriebliche Kontinuität in Katastrophenlagen (KontiKat)
    In: Gero Hoch, Hildegard Schröteler von Brandt, Volker Stein, Angela Schwarz: Sicherheit (DIAGONAL Jahrgang 38). Göttingen: Vandenhoeck & Ruprecht, , 207–224. doi:10.14220/digo.2017.38.1.207
    [BibTeX] [Abstract] [Download PDF]

    Das Thema Sicherheit durchzieht sowohl das Leben Einzelner als auch das Zusammenleben von Personenkollektiven. In diesem Heft geht es um das Wahrnehmen und Wertschätzen sowie die Stabilisierung von Situationen, in denen Gefahren und Risiken reduziert werden. Außerdem stehen die Instrumentarien, Methoden und Maßnahmen im Fokus, mit denen Sicherheit geschaffen werden soll. Besonders in komplexen Systemen wird Sicherheit zu einem schwierig zu fassenden Thema, zu dessen Begleiterscheinungen beispielsweise die Beschneidung von Freiheit zählt. Sicherheit wird in allen Lebensgebieten relevant – von der Politik, Gesellschaft, Wirtschaft und Recht über die Arbeitswelt bis hin in Medien, Technologie, Ökologie und Medizin. Zudem ist der Umgang mit Sicherheit landeskulturell geprägt.

    @incollection{reuter_digitalisierung_2017,
    address = {Göttingen},
    title = {Digitalisierung und {Zivile} {Sicherheit}: {Zivilgesellschaftliche} und betriebliche {Kontinuität} in {Katastrophenlagen} ({KontiKat})},
    isbn = {978-3-8471-0739-2},
    url = {http://www.peasec.de/paper/2017/2017_ReuterKaufholdSchorchetal_DigitalisierungSicherheitKontiKat_Diagonal.pdf},
    abstract = {Das Thema Sicherheit durchzieht sowohl das Leben Einzelner als auch das Zusammenleben von Personenkollektiven. In diesem Heft geht es um das Wahrnehmen und Wertschätzen sowie die Stabilisierung von Situationen, in denen Gefahren und Risiken reduziert werden. Außerdem stehen die Instrumentarien, Methoden und Maßnahmen im Fokus, mit denen Sicherheit geschaffen werden soll. Besonders in komplexen Systemen wird Sicherheit zu einem schwierig zu fassenden Thema, zu dessen Begleiterscheinungen beispielsweise die Beschneidung von Freiheit zählt. Sicherheit wird in allen Lebensgebieten relevant – von der Politik, Gesellschaft, Wirtschaft und Recht über die Arbeitswelt bis hin in Medien, Technologie, Ökologie und Medizin. Zudem ist der Umgang mit Sicherheit landeskulturell geprägt.},
    booktitle = {Sicherheit ({DIAGONAL} {Jahrgang} 38)},
    publisher = {Vandenhoeck \& Ruprecht},
    author = {Reuter, Christian and Kaufhold, Marc-André and Schorch, Marén and Gerwinski, Jan and Soost, Christian and Hassan, Sohaib S. and Rusch, Gebhard and Moog, Petra and Pipek, Volkmar and Wulf, Volker},
    editor = {Hoch, Gero and Schröteler von Brandt, Hildegard and Stein, Volker and Schwarz, Angela},
    year = {2017},
    doi = {10.14220/digo.2017.38.1.207},
    keywords = {Cooperation, Crisis, HCI, SocialMedia, UsableSec, Projekt-KontiKat, Infrastructure, RSF},
    pages = {207--224},
    }

  • Christian Reuter, Marc-André Kaufhold, Inken Leopold, Hannah Knipp (2017)
    Katwarn, NINA or FEMA? Multi-Method Study on Distribution, Use and Public Views on Crisis Apps
    European Conference on Information Systems (ECIS) Guimarães, Portugal.
    [BibTeX] [Abstract] [Download PDF]

    Crises, such as thunderstorms and an increasing number of (recognised) terroristic attacks in 2015, 2016, and 2017, do not only lead to extensive monetary damage, but also threaten human lives and influence citizens‘ perceptions of safety and security. In such situations, the population demands information about the damage and safe behaviour. Although some apps are available to provide this information, the number of users seems relatively low. Focussing on Germany, this study aims to research (1) the distribution of crisis apps in the population, (2) the kinds of crisis apps currently used, as well as (3) needed core functionalities of warning apps. This multi-method study analyses crisis apps by investigating their utilisation quantitatively in a snowball-based survey in Europe (n=1,034) and in a representative survey in Germany (n=1,369). Based on this, the German warning apps Katwarn and NINA and the US-American app FEMA are evaluated qualitatively (n=22). The results revealed requirements which informed the implementation of a warning app prototype. The prototype combines the identified advantages of the apps evaluated in the study, containing warnings and all-clear, recommendations for action, functions to contact friends and helpers. The contributions of this work are findings on the distribution of crisis apps in Europe and Germany (both 16\%), the kinds of crisis apps used (mostly weather and warning apps), and empirically based requirements for warning apps which can be integrated in further developments of existing apps and a prototype for such an app.

    @inproceedings{reuter_katwarn_2017,
    address = {Guimarães, Portugal},
    title = {Katwarn, {NINA} or {FEMA}? {Multi}-{Method} {Study} on {Distribution}, {Use} and {Public} {Views} on {Crisis} {Apps}},
    url = {http://www.peasec.de/paper/2017/2017_ReuterKaufholdLeopoldKnipp_CrisisApps_ECIS.pdf},
    abstract = {Crises, such as thunderstorms and an increasing number of (recognised) terroristic attacks in 2015, 2016, and 2017, do not only lead to extensive monetary damage, but also threaten human lives and influence citizens' perceptions of safety and security. In such situations, the population demands information about the damage and safe behaviour. Although some apps are available to provide this information, the number of users seems relatively low. Focussing on Germany, this study aims to research (1) the distribution of crisis apps in the population, (2) the kinds of crisis apps currently used, as well as (3) needed core functionalities of warning apps. This multi-method study analyses crisis apps by investigating their utilisation quantitatively in a snowball-based survey in Europe (n=1,034) and in a representative survey in Germany (n=1,369). Based on this, the German warning apps Katwarn and NINA and the US-American app FEMA are evaluated qualitatively (n=22). The results revealed requirements which informed the implementation of a warning app prototype. The prototype combines the identified advantages of the apps evaluated in the study, containing warnings and all-clear, recommendations for action, functions to contact friends and helpers. The contributions of this work are findings on the distribution of crisis apps in Europe and Germany (both 16\%), the kinds of crisis apps used (mostly weather and warning apps), and empirically based requirements for warning apps which can be integrated in further developments of existing apps and a prototype for such an app.},
    booktitle = {European {Conference} on {Information} {Systems} ({ECIS})},
    publisher = {AIS},
    author = {Reuter, Christian and Kaufhold, Marc-André and Leopold, Inken and Knipp, Hannah},
    year = {2017},
    keywords = {Crisis, HCI, Student, Projekt-EmerGent, A-Paper, Ranking-VHB-B, Ranking-WKWI-A, Ranking-CORE-A, Projekt-KontiKat, Peace},
    pages = {2187--2201},
    }

  • Jens Pottebaum, Christian Erfurth, Christian Reuter (2017)
    IT-Rettung 2017: IT-Unterstützung in Emergency Management & Response
    INFORMATIK 2017, Lecture Notes in Informatics (LNI) Bonn.
    [BibTeX] [Abstract] [Download PDF]

    Notfallsituationen sind kritische Situationen, in denen eine Gefahr für Menschen, Infrastrukturen und die Umwelt besteht. IT-Unterstützung kann in der Vermeidung sowie der Verbesserung der Vorbereitung, der Abwehr und der Bewältigung helfenkomplexe und kritische Situationen zu beherrschen. Allerdings zeigen Erfahrungen, dass der Einsatz von IT als operatives Einsatzmittel oder Entscheidungsunterstützungswerkzeug auch für eine Zunahme der gefühlten Komplexität einer Einsatzlage bei vielen Beteiligten sorgen kann. Im Fokus des Workshops stehen die Herausforderungen und technischen Konsequenzen, die sich für die IT in diesem Umfeld ergeben. Neben der Ergebnisdarstellung werdenvor allem Erfahrungen aus der Anwendung wissenschaftlicher Methoden im Kontext der zivilen Sicherheit adressiert. Zieldes Workshops ist es, aus fallstudienorientierten Beiträgen –diese ergeben sich unter anderem aus der Struktur der Förderlandschaft in der zivilen Sicherheitsforschung –übertragbare Schlüsse abzuleiten.

    @inproceedings{pottebaum_it-rettung_2017,
    address = {Bonn},
    title = {{IT}-{Rettung} 2017: {IT}-{Unterstützung} in {Emergency} {Management} \& {Response}},
    url = {https://dl.gi.de/bitstream/handle/20.500.12116/3891/B16-0.pdf},
    abstract = {Notfallsituationen sind kritische Situationen, in denen eine Gefahr für Menschen, Infrastrukturen und die Umwelt besteht. IT-Unterstützung kann in der Vermeidung sowie der Verbesserung der Vorbereitung, der Abwehr und der Bewältigung helfenkomplexe und kritische Situationen zu beherrschen. Allerdings zeigen Erfahrungen, dass der Einsatz von IT als operatives Einsatzmittel oder Entscheidungsunterstützungswerkzeug auch für eine Zunahme der gefühlten Komplexität einer Einsatzlage bei vielen Beteiligten sorgen kann. Im Fokus des Workshops stehen die Herausforderungen und technischen Konsequenzen, die sich für die IT in diesem Umfeld ergeben. Neben der Ergebnisdarstellung werdenvor allem Erfahrungen aus der Anwendung wissenschaftlicher Methoden im Kontext der zivilen Sicherheit adressiert. Zieldes Workshops ist es, aus fallstudienorientierten Beiträgen –diese ergeben sich unter anderem aus der Struktur der Förderlandschaft in der zivilen Sicherheitsforschung –übertragbare Schlüsse abzuleiten.},
    booktitle = {{INFORMATIK} 2017, {Lecture} {Notes} in {Informatics} ({LNI})},
    publisher = {Gesellschaft für Informatik},
    author = {Pottebaum, Jens and Erfurth, Christian and Reuter, Christian},
    editor = {Eibl, Maximilian and Gaedke, Martin},
    year = {2017},
    keywords = {Ranking-CORE-C, Ranking-VHB-C, UsableSec, Projekt-KontiKat},
    pages = {1281--1282},
    }

  • Christian Reuter, Marc-André Kaufhold, René Steinfort (2017)
    Rumors, Fake News and Social Bots in Conflicts and Emergencies: Towards a Model for Believability in Social Media
    Proceedings of the Information Systems for Crisis Response and Management (ISCRAM) Albi, France.
    [BibTeX] [Abstract] [Download PDF]

    The use of social media is gaining more and more in importance in ordinary life but also in conflicts and emergencies. The social big data, generated by users, is partially also used as a source for situation assessment, e.g. to receive pictures or to assess the general mood. However, the information’s believability is hard to control and can deceive. Rumors, fake news and social bots are phenomenons that challenge the easy consumption of social media. To address this, our paper explores the believability of content in social media. Based on foundations of information quality we conducted a literature study to derive a three-level model for assessing believability. It summarizes existing assessment approaches, assessment criteria and related measures. On this basis, we describe several steps towards the development of an assessment approach that works across different types of social media.

    @inproceedings{reuter_rumors_2017,
    address = {Albi, France},
    title = {Rumors, {Fake} {News} and {Social} {Bots} in {Conflicts} and {Emergencies}: {Towards} a {Model} for {Believability} in {Social} {Media}},
    url = {http://www.peasec.de/paper/2017/2017_ReuterKaufholdSteinfort_RumorsFakeNewsBotsBelievability_ISCRAM.pdf},
    abstract = {The use of social media is gaining more and more in importance in ordinary life but also in conflicts and emergencies. The social big data, generated by users, is partially also used as a source for situation assessment, e.g. to receive pictures or to assess the general mood. However, the information's believability is hard to control and can deceive. Rumors, fake news and social bots are phenomenons that challenge the easy consumption of social media. To address this, our paper explores the believability of content in social media. Based on foundations of information quality we conducted a literature study to derive a three-level model for assessing believability. It summarizes existing assessment approaches, assessment criteria and related measures. On this basis, we describe several steps towards the development of an assessment approach that works across different types of social media.},
    booktitle = {Proceedings of the {Information} {Systems} for {Crisis} {Response} and {Management} ({ISCRAM})},
    publisher = {ISCRAM},
    author = {Reuter, Christian and Kaufhold, Marc-André and Steinfort, René},
    editor = {Comes, Tina and Bénaben, Frédérick and Hanachi, Chihab and Lauras, Matthieu},
    year = {2017},
    keywords = {Crisis, HCI, SocialMedia, Student, Projekt-KontiKat, Peace},
    pages = {583--591},
    }

  • Marc-André Kaufhold, Christian Reuter (2017)
    Integration von Flow in die Mensch- Computer-Interaktion? Potenziale für die Gestaltung interaktiver Systeme
    Mittelstand-Digital „Wissenschaft trifft Praxis“ ;7(1):78–88.
    [BibTeX] [Abstract] [Download PDF]

    Flow-Erleben beschreibt das „reflexionsfreie, gänzliche Aufgehen in einer glatt laufenden Tätigkeit, die man trotz hoher Beanspruchung noch unter Kontrolle hat“. Dabei zeigt die bestehende Literatur vielversprechende Effekte der Flow-Theorie auf, etwa positiver Affekt, verbessertes Lernen, Mitarbeiterproduktivität und Kundenloyalität, die einen Mehrwert in der Mensch-Computer-Interaktion und der Gestaltung interaktiver Systeme darstellen. Die Betrachtung der theoretischen Grundlagen zeigt, dass Flow ein komponentenreiches Konstrukt ist, welches kontextsensitiv erforscht werden muss: Die Beschaffenheit der gegenwärtigen Aufgabe und des interaktiven Systems, sowie demografische, individuelle und situative Faktoren beeinflussen das Flow-erleben. Zur Messung des Flow-erlebens wurden eine Reihe unterschiedlicher Messmethoden entwickelt, welche die gegenwärtige Erfahrung, etwa der FQ oder die esM, oder eine vergangene Erfahrung im Nachgang, etwa komponentenbasierte Fragebogen und qualitative Methoden, erfassen. In der Gestaltung interaktiver Systeme im Sinne der MCI wird einerseits die Betrachtung pragmatischer Qualitätskriterien (Effizienz, Durchschaubarkeit, Verlässlichkeit) der Usability und hedonistischer Qualitätskriterien (Attraktivität, Neuheit, Stimulation) der User Experience angestrebt. Andererseits untersucht ein separater Forschungsstrang die Relevanz der Flow-Theorie für die MCI. Während der Einfluss theoretischer Konstrukte des Flow-erlebens bereits deutlich untersucht wurde, fehlt die systematische Verknüpfung zu konkreten Designanforderungen zur Unterstützung des Flow-erlebens in interaktiven Systemen. Damit die Potenziale der Flow-Theorie in der Gestaltung interaktiver Systeme bestmöglich berücksichtigt werden können, sind vor allem vier Herausforderungen in der Forschung und Praxis zu adressieren: 1. Definition der theoretischen Kontextfaktoren: Wie kann die Flow-Theorie in der Mensch-Computer-Interaktion ganzheitlich bestimmt werden? 2. Operationalisierung der Flow-Theorie: Wie können Bedingungen, Erleben und Auswirkungen des Flow-erlebens genau und systematisch gemessen werden? 3. Integration in die Mensch-Computer-Interaktion: In welchem exakten Zusammenhang stehen die Konzepte Flow, Usability und User Experience? 4. Ableitung praktischer Designanforderungen: Wie können praktische Anforderungen zum Design des Flow-erlebens in interaktiven Systemen abgeleitet werden? Dieser Beitrag hat dazu die theoretischen Grundlagen des Flow-erlebens, bestehende Methoden und Metriken sowie verwandte Konzepte der MCI eingeleitet und diskutiert, um einerseits die systematische Erforschung der Flow-Theorie in der MCI und andererseits die Ableitung praktischer Design-Anforderungen zu motivieren.

    @article{kaufhold_integration_2017,
    title = {Integration von {Flow} in die {Mensch}- {Computer}-{Interaktion}? {Potenziale} für die {Gestaltung} interaktiver {Systeme}},
    volume = {7},
    url = {http://www.peasec.de/paper/2017/2017_KaufholdReuter_FlowMCI_MittelstandDigital.pdf},
    abstract = {Flow-Erleben beschreibt das „reflexionsfreie, gänzliche Aufgehen in einer glatt laufenden Tätigkeit, die man trotz hoher Beanspruchung noch unter Kontrolle hat“. Dabei zeigt die bestehende Literatur vielversprechende Effekte der Flow-Theorie auf, etwa positiver Affekt, verbessertes Lernen, Mitarbeiterproduktivität und Kundenloyalität, die einen Mehrwert in der Mensch-Computer-Interaktion und der Gestaltung interaktiver Systeme darstellen. Die Betrachtung der theoretischen Grundlagen zeigt, dass Flow ein komponentenreiches Konstrukt ist, welches kontextsensitiv erforscht werden muss: Die Beschaffenheit der gegenwärtigen Aufgabe und des interaktiven Systems, sowie demografische, individuelle und situative Faktoren beeinflussen das Flow-erleben. Zur Messung des Flow-erlebens wurden eine Reihe unterschiedlicher Messmethoden entwickelt, welche die gegenwärtige Erfahrung, etwa der FQ oder die esM, oder eine vergangene Erfahrung im Nachgang, etwa komponentenbasierte Fragebogen und qualitative Methoden, erfassen. In der Gestaltung interaktiver Systeme im Sinne der MCI wird einerseits die Betrachtung pragmatischer Qualitätskriterien (Effizienz, Durchschaubarkeit, Verlässlichkeit) der Usability und hedonistischer Qualitätskriterien (Attraktivität, Neuheit, Stimulation) der User Experience angestrebt. Andererseits untersucht ein separater Forschungsstrang die Relevanz der Flow-Theorie für die MCI. Während der Einfluss theoretischer Konstrukte des Flow-erlebens bereits deutlich untersucht wurde, fehlt die systematische Verknüpfung zu konkreten Designanforderungen zur Unterstützung des Flow-erlebens in interaktiven Systemen. Damit die Potenziale der Flow-Theorie in der Gestaltung interaktiver Systeme bestmöglich berücksichtigt werden können, sind vor allem vier Herausforderungen in der Forschung und Praxis zu adressieren: 1. Definition der theoretischen Kontextfaktoren: Wie kann die Flow-Theorie in der Mensch-Computer-Interaktion ganzheitlich bestimmt werden? 2. Operationalisierung der Flow-Theorie: Wie können Bedingungen, Erleben und Auswirkungen des Flow-erlebens genau und systematisch gemessen werden? 3. Integration in die Mensch-Computer-Interaktion: In welchem exakten Zusammenhang stehen die Konzepte Flow, Usability und User Experience? 4. Ableitung praktischer Designanforderungen: Wie können praktische Anforderungen zum Design des Flow-erlebens in interaktiven Systemen abgeleitet werden? Dieser Beitrag hat dazu die theoretischen Grundlagen des Flow-erlebens, bestehende Methoden und Metriken sowie verwandte Konzepte der MCI eingeleitet und diskutiert, um einerseits die systematische Erforschung der Flow-Theorie in der MCI und andererseits die Ableitung praktischer Design-Anforderungen zu motivieren.},
    number = {1},
    journal = {Mittelstand-Digital "Wissenschaft trifft Praxis"},
    author = {Kaufhold, Marc-André and Reuter, Christian},
    year = {2017},
    keywords = {HCI, Projekt-KontiKat},
    pages = {78--88},
    }

  • Christian Reuter, Marc-André Kaufhold, Inken Leopold, Hannah Knipp (2017)
    Informing the Population: Mobile Warning Apps
    In: Michael Klafft: Risk and Crisis Communication in Disaster Prevention and Management. Wilhelmshaven: epubli, , 31–41.
    [BibTeX] [Abstract] [Download PDF]

    Catastrophes like the storms in Europe in spring 2016, but also terrorist attacks regularly not only lead to extensive monetary damage but also threaten human lives. In such situations, the population desires information about the status of damage and safe behaviours. Apps can address this potentially, but comparatively, record a low number of users. Based on Reuter et al. (2017), this article shows the importance of information in disaster situations and illustrates features from current mobile warning apps.

    @incollection{reuter_informing_2017,
    address = {Wilhelmshaven},
    title = {Informing the {Population}: {Mobile} {Warning} {Apps}},
    isbn = {978-3-7450-5448-4},
    url = {https://peasec.de/paper/2017/2017_ReuterKaufholdLeopoldKnipp_InformingthePopulation.pdf},
    abstract = {Catastrophes like the storms in Europe in spring 2016, but also terrorist attacks regularly not only lead to extensive monetary damage but also threaten human lives. In such situations, the population desires information about the status of damage and safe behaviours. Apps can address this potentially, but comparatively, record a low number of users. Based on Reuter et al. (2017), this article shows the importance of information in disaster situations and illustrates features from current mobile warning apps.},
    booktitle = {Risk and {Crisis} {Communication} in {Disaster} {Prevention} and {Management}},
    publisher = {epubli},
    author = {Reuter, Christian and Kaufhold, Marc-André and Leopold, Inken and Knipp, Hannah},
    editor = {Klafft, Michael},
    year = {2017},
    keywords = {Crisis, HCI, Student, Projekt-KontiKat, Peace},
    pages = {31--41},
    }

  • Marc-André Kaufhold, Christian Reuter, Marvin Stefan (2017)
    Gesellschaftliche Herausforderungen des Missbrauchs von Bots und sozialen Medien
    Mensch und Computer – Workshopband Regensburg, Germany. doi:10.18420/muc2017-ws01-0386
    [BibTeX] [Abstract] [Download PDF]

    Soziale Medien wie Facebook oder Twitter haben sich als alltägliche Kommunikationskanäle etabliert. Aufgrund der großen Reichweite sind diese Medien für den privaten oder öffentlichen Austausch unter Freunden und Gruppierungen sowie zur Produkt- und Unternehmenswerbung geeignet, unterliegen aber auch der Gefahr der Manipulation öffentlicher Diskurse oder des Missbrauchs der jeweiligen Plattformfunktionen. Hierzu werden unter anderem Bots, und spezifischer „Social Bots“, als automatisierte Programme eingesetzt, um einen Einfluss auf ökonomische, politische und soziale Prozesse auszuüben. Dieser Beitrag stellt die vorläufigen Ergebnisse einer systematischen Literaturstudie und thematischen Analyse dar, welche gesellschaftliche Herausforderungen sowie zugehörige Methoden und Vorgehensweisen des Missbrauchs von Bots und sozialen Medien umfassen.

    @inproceedings{kaufhold_gesellschaftliche_2017,
    address = {Regensburg, Germany},
    title = {Gesellschaftliche {Herausforderungen} des {Missbrauchs} von {Bots} und sozialen {Medien}},
    url = {https://dl.gi.de/bitstream/handle/20.500.12116/3236/2017_WS01_386.pdf?sequence=1&isAllowed=y},
    doi = {10.18420/muc2017-ws01-0386},
    abstract = {Soziale Medien wie Facebook oder Twitter haben sich als alltägliche Kommunikationskanäle etabliert. Aufgrund der großen Reichweite sind diese Medien für den privaten oder öffentlichen Austausch unter Freunden und Gruppierungen sowie zur Produkt- und Unternehmenswerbung geeignet, unterliegen aber auch der Gefahr der Manipulation öffentlicher Diskurse oder des Missbrauchs der jeweiligen Plattformfunktionen. Hierzu werden unter anderem Bots, und spezifischer „Social Bots“, als automatisierte Programme eingesetzt, um einen Einfluss auf ökonomische, politische und soziale Prozesse auszuüben. Dieser Beitrag stellt die vorläufigen Ergebnisse einer systematischen Literaturstudie und thematischen Analyse dar, welche gesellschaftliche Herausforderungen sowie zugehörige Methoden und Vorgehensweisen des Missbrauchs von Bots und sozialen Medien umfassen.},
    booktitle = {Mensch und {Computer} - {Workshopband}},
    publisher = {Gesellschaft für Informatik e.V.},
    author = {Kaufhold, Marc-André and Reuter, Christian and Stefan, Marvin},
    editor = {Burghardt, M. and Wimmer, R. and Wolff, C. and Womser-Hacker, C.},
    year = {2017},
    keywords = {SocialMedia, Student, Projekt-KontiKat, Peace},
    pages = {51--58},
    }

  • Christian Reuter, Katja Pätsch, Elena Runft (2017)
    IT for Peace? Fighting Against Terrorism in Social Media – An Explorative Twitter Study
    i-com – Journal of Interactive Media ;16(2):181–195. doi:10.1515/icom-2017-0013
    [BibTeX] [Abstract] [Download PDF]

    The Internet and especially social media are not only used for supposedly good purposes. For example, the recruitment of new members and the dissemination of ideologies of terrorism also takes place in the media. However, the fight against terrorism also makes use of the same tools. The type of these countermeasures, as well as the methods, are covered in this work. In the first part, the state of the art is summarized. The second part presents an explorative empirical study of the fight against terrorism in social media, especially on Twitter. Different, preferably characteristic forms are structured within the scope with the example of Twitter. The aim of this work is to approach this highly relevant subject with the goal of peace, safety and safety from the perspective of information systems. Moreover, it should serve following researches in this field as basis and starting point.

    @article{reuter_it_2017,
    title = {{IT} for {Peace}? {Fighting} {Against} {Terrorism} in {Social} {Media} – {An} {Explorative} {Twitter} {Study}},
    volume = {16},
    url = {http://www.peasec.de/paper/2017/2017_ReuterPaetschRunft_ITforPeaceTerrorismSocialMedia_ICOM.pdf},
    doi = {10.1515/icom-2017-0013},
    abstract = {The Internet and especially social media are not only used for supposedly good purposes. For example, the recruitment of new members and the dissemination of ideologies of terrorism also takes place in the media. However, the fight against terrorism also makes use of the same tools. The type of these countermeasures, as well as the methods, are covered in this work. In the first part, the state of the art is summarized. The second part presents an explorative empirical study of the fight against terrorism in social media, especially on Twitter. Different, preferably characteristic forms are structured within the scope with the example of Twitter. The aim of this work is to approach this highly relevant subject with the goal of peace, safety and safety from the perspective of information systems. Moreover, it should serve following researches in this field as basis and starting point.},
    number = {2},
    journal = {i-com - Journal of Interactive Media},
    author = {Reuter, Christian and Pätsch, Katja and Runft, Elena},
    year = {2017},
    keywords = {Crisis, HCI, SocialMedia, Student, Projekt-EmerGent, Projekt-KontiKat, Peace},
    pages = {181--195},
    }

  • Christian Reuter, Marc-André Kaufhold, Jonas Klös (2017)
    Benutzbare Sicherheit: Usability, Safety und Security bei Passwörtern
    Mensch und Computer – Workshopband Regensburg, Germany. doi:https://doi.org/10.18420/muc2017-ws01-0384
    [BibTeX] [Abstract] [Download PDF]

    Obwohl Usability und Sicherheit beides relevante Anforderungen für Anwendungssysteme sind, stehen sie in einem Spannungsfeld. Sicherheit kann als Schutz vor Angriffen von außen (Security), aber auch für das sichere Funktionieren (Safety) dieser Anwendungssysteme verstanden werden. Durch die immer größere Vernetzung klassischer Safety-Domänen, wie dem Katastrophenschutz, gewinnen Security-Aspekte dort ebenfalls an Bedeutung. Die Übertragung von kritischen und vertraulichen Informationen auf mobile Endgeräte muss zugleich passwortgeschützt als auch schnell verfügbar sein; zeitintensive Authentifizierungsmechanismen können hier stören. In dieser Studie werden die Nutzung von Passwörtern vor dem Hintergrund der Abwägung von Sicherheit und Usability exploriert und Hypothesen zum Umgang mit Passwörtern aufgestellt, die im Kontext der Digitalisierung in der zivilen Sicherheit sowie mobilen und ubiquitären Geräte im Katastrophenschutz an enormer Bedeutung gewinnen.

    @inproceedings{reuter_benutzbare_2017,
    address = {Regensburg, Germany},
    title = {Benutzbare {Sicherheit}: {Usability}, {Safety} und {Security} bei {Passwörtern}},
    url = {https://dl.gi.de/bitstream/handle/20.500.12116/3214/2017_WS01_384.pdf?sequence=1&isAllowed=y},
    doi = {https://doi.org/10.18420/muc2017-ws01-0384},
    abstract = {Obwohl Usability und Sicherheit beides relevante Anforderungen für Anwendungssysteme sind, stehen sie in einem Spannungsfeld. Sicherheit kann als Schutz vor Angriffen von außen (Security), aber auch für das sichere Funktionieren (Safety) dieser Anwendungssysteme verstanden werden. Durch die immer größere Vernetzung klassischer Safety-Domänen, wie dem Katastrophenschutz, gewinnen Security-Aspekte dort ebenfalls an Bedeutung. Die Übertragung von kritischen und vertraulichen Informationen auf mobile Endgeräte muss zugleich passwortgeschützt als auch schnell verfügbar sein; zeitintensive Authentifizierungsmechanismen können hier stören. In dieser Studie werden die Nutzung von Passwörtern vor dem Hintergrund der Abwägung von Sicherheit und Usability exploriert und Hypothesen zum Umgang mit Passwörtern aufgestellt, die im Kontext der Digitalisierung in der zivilen Sicherheit sowie mobilen und ubiquitären Geräte im Katastrophenschutz an enormer Bedeutung gewinnen.},
    booktitle = {Mensch und {Computer} - {Workshopband}},
    publisher = {Gesellschaft für Informatik e.V.},
    author = {Reuter, Christian and Kaufhold, Marc-André and Klös, Jonas},
    editor = {Burghardt, M. and Wimmer, R. and Wolff, C. and Womser-Hacker, C.},
    year = {2017},
    keywords = {HCI, Student, UsableSec, Security, Projekt-KontiKat, Projekt-CRISP, Projekt-CROSSING},
    pages = {33--41},
    }

  • Christian Reuter, Tilo Mentler, Stefan Geisler, Michael Herczeg, Thomas Ludwig, Volkmar Pipek, Simon Nestler (2017)
    4. Workshop Mensch-Maschine-Interaktion in sicherheitskritischen Systemen
    Mensch und Computer – Workshopband Regensburg, Germany. doi:10.18420/muc2017-ws01-0380
    [BibTeX] [Abstract] [Download PDF]

    Die Interaktion und Kooperation zwischen Mensch und Computer in sicherheitskritischen Systemen ist eine interdisziplinäre Herausforderung und Gestaltungsaufgabe. Sicherheitskritische Anwendungsfelder sind vielfältig und umfassen verschiedene Branchen und Bereiche, beispielsweise Produktion, Medizin, Katastrophenschutz oder Verkehr. Neben stationären Rechnern und Maschinen haben mobile Kontexte und Endgeräte sowie soziale Medien bereits seit einigen Jahren an Bedeutung enorm zugenommen. Die spezifischen Herausforderungen der MCI in solchen sicherheitskritischen Kontexten bedürfen einer Diskussion in Bezug auf die Entwicklung bzw. Adaption von Methoden und Prozessen, aber auch auf Ergebnisse der Systementwicklung. Diese gilt es im Rahmen des Workshops zu adressieren, jedoch weniger im Hinblick auf die isolierten Technologien, sondern mit deutliche r Fokussierung auf das Zusammenwirken von Mensch, Technik und Organisation.

    @inproceedings{reuter_4_2017,
    address = {Regensburg, Germany},
    title = {4. {Workshop} {Mensch}-{Maschine}-{Interaktion} in sicherheitskritischen {Systemen}},
    url = {https://dl.gi.de/bitstream/handle/20.500.12116/3170/2017_WS01_380.pdf},
    doi = {10.18420/muc2017-ws01-0380},
    abstract = {Die Interaktion und Kooperation zwischen Mensch und Computer in sicherheitskritischen Systemen ist eine interdisziplinäre Herausforderung und Gestaltungsaufgabe. Sicherheitskritische Anwendungsfelder sind vielfältig und umfassen verschiedene Branchen und Bereiche, beispielsweise Produktion, Medizin, Katastrophenschutz oder Verkehr. Neben stationären Rechnern und Maschinen haben mobile Kontexte und Endgeräte sowie soziale Medien bereits seit einigen Jahren an Bedeutung enorm zugenommen. Die spezifischen Herausforderungen der MCI in solchen sicherheitskritischen Kontexten bedürfen einer Diskussion in Bezug auf die Entwicklung bzw. Adaption von Methoden und Prozessen, aber auch auf Ergebnisse der Systementwicklung. Diese gilt es im Rahmen des Workshops zu adressieren, jedoch weniger im Hinblick auf die isolierten Technologien, sondern mit deutliche r Fokussierung auf das Zusammenwirken von Mensch, Technik und Organisation.},
    booktitle = {Mensch und {Computer} - {Workshopband}},
    publisher = {Gesellschaft für Informatik e.V.},
    author = {Reuter, Christian and Mentler, Tilo and Geisler, Stefan and Herczeg, Michael and Ludwig, Thomas and Pipek, Volkmar and Nestler, Simon},
    editor = {Burghardt, M. and Wimmer, R. and Wolff, C. and Womser-Hacker, C.},
    year = {2017},
    keywords = {Crisis, HCI, SocialMedia, UsableSec, Security, Projekt-KontiKat},
    pages = {5--8},
    }

  • Jens Pottebaum, Christian Reuter (2017)
    Special Issue on IT-Support for Critical Infrastructure Protection – International Journal of Information Systems for Crisis Response and Management (IJISCRAM)
    IGI Global.
    [BibTeX] [Download PDF]

    @book{pottebaum_special_2017,
    title = {Special {Issue} on {IT}-{Support} for {Critical} {Infrastructure} {Protection} - {International} {Journal} of {Information} {Systems} for {Crisis} {Response} and {Management} ({IJISCRAM})},
    volume = {9},
    url = {https://www.igi-global.com/journals/open-access/table-of-contents/international-journal-information-systems-crisis/1119?v=9&sitid=213219},
    number = {4},
    publisher = {IGI Global},
    author = {Pottebaum, Jens and Reuter, Christian},
    year = {2017},
    note = {Publication Title: International Journal of Information Systems for Crisis Response and Management (IJISCRAM)},
    keywords = {Crisis, Projekt-KontiKat, Infrastructure, RSF},
    }

  • Jens Pottebaum, Christian Reuter (2017)
    Guest Editorial Preface: Special Issue on IT-Support for Critical Infrastructure Protection
    International Journal of Information Systems for Crisis Response and Management (IJISCRAM) ;9(4):iv–vii.
    [BibTeX] [Download PDF]

    @article{pottebaum_guest_2017,
    title = {Guest {Editorial} {Preface}: {Special} {Issue} on {IT}-{Support} for {Critical} {Infrastructure} {Protection}},
    volume = {9},
    url = {http://www.peasec.de/paper/2017/2017_PottebaumReuter_EditorialCriticalInfrastructureProtection_IJISCRAM.pdf},
    number = {4},
    journal = {International Journal of Information Systems for Crisis Response and Management (IJISCRAM)},
    author = {Pottebaum, Jens and Reuter, Christian},
    year = {2017},
    keywords = {Crisis, Projekt-KontiKat, Infrastructure},
    pages = {iv--vii},
    }

  • Marc-André Kaufhold, Christian Reuter, Thomas Ludwig, Simon Scholl (2017)
    Social Media Analytics: Eine Marktstudie im Krisenmanagement
    INFORMATIK 2017, Lecture Notes in Informatics (LNI), Gesellschaft für Informatik Bonn.
    [BibTeX] [Abstract] [Download PDF]

    Mit zunehmender Zahl an Nutzern sozialer Medien steigt auch die Menge produzierter Datenmengen, welche häufig unter dem Schlagwort Big Social Data diskutiert werden. Um Informationen aus diesen großen Datenmengen generieren zu können, existiert aktuell bereits eine Vielzahl verschiedener Systeme, welche sich des Data Minings bedienen, um die Analyse zu erleichtern. Je nachdem für welche Fragestellung diese Datenmengen herangezogen werden sollen, kommen verschiedene Systeme in Frage, die jeweils ihre Stärken und Schwächen haben. Innerhalb dieses Beitrages geben wir eine Übersicht aktueller Systeme zur Analyse sozialer Medien im Generellen sowie im speziellen Kontext des Krisenmanagements. Auf Basis verschiedener Attribute wie der Möglichkeit zur Kommunikation, des Setzens eines Alarms oder der Tonalität sowie einer darauf basierenden Marktanalyse werden die Systeme in die drei Klassen Intelligence-, Management- und spezialisierten Analysesysteme klassifiziert und im Hinblick auf ihre Eignung für die Analyse sozialer Medien kategorisiert.

    @inproceedings{kaufhold_social_2017,
    address = {Bonn},
    title = {Social {Media} {Analytics}: {Eine} {Marktstudie} im {Krisenmanagement}},
    url = {http://www.peasec.de/paper/2017/2017_KaufholdReuterLudwigScholl_SocialMediaAnalytcisMarktstudie_INF.pdf},
    abstract = {Mit zunehmender Zahl an Nutzern sozialer Medien steigt auch die Menge produzierter Datenmengen, welche häufig unter dem Schlagwort Big Social Data diskutiert werden. Um Informationen aus diesen großen Datenmengen generieren zu können, existiert aktuell bereits eine Vielzahl verschiedener Systeme, welche sich des Data Minings bedienen, um die Analyse zu erleichtern. Je nachdem für welche Fragestellung diese Datenmengen herangezogen werden sollen, kommen verschiedene Systeme in Frage, die jeweils ihre Stärken und Schwächen haben. Innerhalb dieses Beitrages geben wir eine Übersicht aktueller Systeme zur Analyse sozialer Medien im Generellen sowie im speziellen Kontext des Krisenmanagements. Auf Basis verschiedener Attribute wie der Möglichkeit zur Kommunikation, des Setzens eines Alarms oder der Tonalität sowie einer darauf basierenden Marktanalyse werden die Systeme in die drei Klassen Intelligence-, Management- und spezialisierten Analysesysteme klassifiziert und im Hinblick auf ihre Eignung für die Analyse sozialer Medien kategorisiert.},
    booktitle = {{INFORMATIK} 2017, {Lecture} {Notes} in {Informatics} ({LNI}), {Gesellschaft} für {Informatik}},
    author = {Kaufhold, Marc-André and Reuter, Christian and Ludwig, Thomas and Scholl, Simon},
    editor = {Eibl, Maximilian and Gaedke, Martin},
    year = {2017},
    keywords = {Crisis, HCI, SocialMedia, Student, Ranking-CORE-C, Ranking-VHB-C, Projekt-KontiKat},
    pages = {1325--1338},
    }

  • Marc-André Kaufhold, Christian Reuter (2017)
    The Impact of Social Media for Emergency Situations: A Case Study with the Fire Department of Frankfurt
    Proceedings of the Information Systems for Crisis Response and Management (ISCRAM) Albi, France.
    [BibTeX] [Abstract] [Download PDF]

    The use of social media is not only part of everyday life but also of crises and emergencies. Many studies focus on the concrete use of social media during a specific emergency, but the prevalence of social media, data access and published research studies allows the examination in a broader and more integrated manner. This work-in-progress paper presents the results of a case study with the Fire Department Frankfurt, which is one of the biggest and most modern fire departments in Germany. The findings relate to social media technologies, organizational structure and roles, information validation, staff skills and resources, and the importance of volunteer communities. In the next step, the results will be integrated into the frame of a comparative case study with the overall aim of examining the impact of social media on how emergency services respond and react in an emergency.

    @inproceedings{kaufhold_impact_2017,
    address = {Albi, France},
    title = {The {Impact} of {Social} {Media} for {Emergency} {Situations}: {A} {Case} {Study} with the {Fire} {Department} of {Frankfurt}},
    url = {http://www.peasec.de/paper/2017/2017_KaufholdReuter_ImpactSocialMediaFrankfurt_ISCRAM.pdf},
    abstract = {The use of social media is not only part of everyday life but also of crises and emergencies. Many studies focus on the concrete use of social media during a specific emergency, but the prevalence of social media, data access and published research studies allows the examination in a broader and more integrated manner. This work-in-progress paper presents the results of a case study with the Fire Department Frankfurt, which is one of the biggest and most modern fire departments in Germany. The findings relate to social media technologies, organizational structure and roles, information validation, staff skills and resources, and the importance of volunteer communities. In the next step, the results will be integrated into the frame of a comparative case study with the overall aim of examining the impact of social media on how emergency services respond and react in an emergency.},
    booktitle = {Proceedings of the {Information} {Systems} for {Crisis} {Response} and {Management} ({ISCRAM})},
    publisher = {ISCRAM},
    author = {Kaufhold, Marc-André and Reuter, Christian},
    editor = {Comes, Tina and Bénaben, Frédérick and Hanachi, Chihab and Lauras, Matthieu},
    year = {2017},
    keywords = {Crisis, HCI, SocialMedia, Projekt-EmerGent, Projekt-KontiKat},
    pages = {603--612},
    }

  • Christian Reuter, Marc-André Kaufhold, Thomas Spielhofer, Anna Sophie Hahne (2017)
    Social Media in Emergencies: A Representative Study on Citizens‘ Perception in Germany
    Proceedings of the ACM: Human Computer Interaction (PACM): Computer-Supported Cooperative Work and Social Computing ;1(2):1–19. doi:10.1145/3134725
    [BibTeX] [Abstract] [Download PDF]

    The value of social media in crises, disasters, and emergencies across different events (e.g. floods, storms, terroristic attacks), countries, and for heterogeneous participants (e.g. citizens, emergency services) is now well-attested. Existing work has examined the potentials and weaknesses of its use during specific events. Fewer studies, however, have focused on citizens‘ perceptions of social media in emergencies, and none have deployed a representative sample to examine this. We present the results of the first representative study on citizens‘ perception of social media in emergencies that we have conducted in Germany. Our study highlights, for example, that around half (45\%) of people have used social media during an emergency to share and / or look for information. In contrast, false rumours on social media (74\%) are perceived as a threat. Moreover, only a minority of people have downloaded a smartphone app for emergencies (16\%), with the most popular ones‘ weather and first aid apps.

    @article{reuter_social_2017-1,
    title = {Social {Media} in {Emergencies}: {A} {Representative} {Study} on {Citizens}' {Perception} in {Germany}},
    volume = {1},
    url = {http://www.peasec.de/paper/2017/2017_ReuterKaufholdSpielhoferHahne_SocialMediaEmergenciesGermany_CSCW.pdf},
    doi = {10.1145/3134725},
    abstract = {The value of social media in crises, disasters, and emergencies across different events (e.g. floods, storms, terroristic attacks), countries, and for heterogeneous participants (e.g. citizens, emergency services) is now well-attested. Existing work has examined the potentials and weaknesses of its use during specific events. Fewer studies, however, have focused on citizens' perceptions of social media in emergencies, and none have deployed a representative sample to examine this. We present the results of the first representative study on citizens' perception of social media in emergencies that we have conducted in Germany. Our study highlights, for example, that around half (45\%) of people have used social media during an emergency to share and / or look for information. In contrast, false rumours on social media (74\%) are perceived as a threat. Moreover, only a minority of people have downloaded a smartphone app for emergencies (16\%), with the most popular ones' weather and first aid apps.},
    number = {2},
    journal = {Proceedings of the ACM: Human Computer Interaction (PACM): Computer-Supported Cooperative Work and Social Computing},
    author = {Reuter, Christian and Kaufhold, Marc-André and Spielhofer, Thomas and Hahne, Anna Sophie},
    year = {2017},
    note = {Place: New York, USA},
    keywords = {Crisis, HCI, Selected, SocialMedia, Projekt-EmerGent, A-Paper, Ranking-CORE-A, Ranking-WKWI-B, Projekt-KontiKat},
    pages = {1--19},
    }

    Geobox-D: Düngemittelplaner sowie Geobox-U: Usability Optimierung (2016-2018)
    EmerGent: Emergency Management in Social Media Generation (2014-2017, EU)

    EmerGent: Emergency Management in Social Media Generation
    (1.4.2014-30.7.2017, EU) – Website

    Die Nutzung sozialer Medien in Katastrophenlagen ist mittlerweile ein verbreitetes Phänomen. Ereignisse, wie das Hochwasser in Mitteleuropa 2013 oder das Love-Parade Unglück 2010, zeigen, dass Bürger beispielsweise Facebook oder Twitter nutzen, um miteinander zu kommunizieren und (Selbst-)Hilfe zu organisieren. Behörden und Organisationen mit Sicherheitsaufgaben (BOS), wie die Feuerwehr und Polizei, kommunizieren über soziale Medien mit der Öffentlichkeit oder nutzen die bereitgestellten Inhalte zur Lagebeurteilung.

    Quelle: EmerGent (Bild UPB)

    Das Ziel des von der Europäischen Union geförderten Forschungsprojekts ist die Untersuchung der positiven und negativen Auswirkungen sozialer Medien in Katastrophenlagen, um die objektive und gefühlte Sicherheit der Bürger zu erhöhen. Hierzu werden zuerst anhand vergangener Ereignisse, empirischer Untersuchungen und veröffentlichter Studien derzeitige Nutzungsmuster und zukünftige Nutzungspotentiale untersucht. Hierauf aufbauend sollen Prototypen entwickelt und erprobt werden, die sowohl Bürger als auch die zuständigen BOS in der Bewältigung von Schadenslagen unterstützen.

    Neben der Universität Siegen sind die Universität Paderborn als Koordinator, IES Solutions (Italien), Oxford Computer Consultants, Travistock Institute (beide Großbritannien), Vestlandsforsking (Norwegen) sowie die Federation of the European Union Fire Officer Associations (Luxembourg), die European Emergency Number Association (Belgien), das Institut für Feuerwehr- und Rettungstechnologie (Deutschland) sowie das Scientific and Research Centre for Fire Protection (Polen) beteiligt.

    Dieses Projekt wird durch das Siebte Rahmenprogramm der Europäischen Gemeinschaft für Forschung, technologische Entwicklung und Demonstration mit der Fördernummer 608352 finanziert.

    2022

  • Christian Reuter (2022)
    A European Perspective on Crisis Informatics: Citizens‘ and Authorities‘ attitudes towards Social Media for Public Safety and Security
    1 ed. Wiesbaden: Springer Vieweg. doi:https://doi.org/10.1007/978-3-658-39720-3
    [BibTeX] [Abstract] [Download PDF]

    Mobilising helpers in the event of a flood or letting friends know that you are okay in the event of a terrorist attack – more and more people are using social media in emergency, crisis or disaster situations. Storms, floods, attacks or pandemics (esp. COVID-19) show that citizens use social media to inform themselves or to coordinate. This thesis presents qualitative and quantitative studies on the attitudes of emergency services and citizens in Europe towards social media in emergencies. Across the individual sub-studies, almost 10,000 people are surveyed including representative studies in the Netherlands, Germany, the UK and Italy. The work empirically shows that social media is increasingly important for emergency services, both for prevention and during crises; that private use of social media is a driving force in shaping opinions for organisational use; and that citizens have high expectations towards authorities, especially monitoring social media is expected, and sometimes responses within one hour. Depending on the risk culture, the data show further differences, e.g. whether the state (Germany) or the individual (Netherlands) is seen as primarily responsible for coping with the situation.

    @book{reuter_european_2022,
    address = {Wiesbaden},
    edition = {1},
    title = {A {European} {Perspective} on {Crisis} {Informatics}: {Citizens}' and {Authorities}' attitudes towards {Social} {Media} for {Public} {Safety} and {Security}},
    isbn = {978-3-658-39719-7},
    url = {https://link.springer.com/book/10.1007/978-3-658-39720-3},
    abstract = {Mobilising helpers in the event of a flood or letting friends know that you are okay in the event of a terrorist attack – more and more people are using social media in emergency, crisis or disaster situations. Storms, floods, attacks or pandemics (esp. COVID-19) show that citizens use social media to inform themselves or to coordinate. This thesis presents qualitative and quantitative studies on the attitudes of emergency services and citizens in Europe towards social media in emergencies. Across the individual sub-studies, almost 10,000 people are surveyed including representative studies in the Netherlands, Germany, the UK and Italy. The work empirically shows that social media is increasingly important for emergency services, both for prevention and during crises; that private use of social media is a driving force in shaping opinions for organisational use; and that citizens have high expectations towards authorities, especially monitoring social media is expected, and sometimes responses within one hour. Depending on the risk culture, the data show further differences, e.g. whether the state (Germany) or the individual (Netherlands) is seen as primarily responsible for coping with the situation.},
    language = {en},
    publisher = {Springer Vieweg},
    author = {Reuter, Christian},
    year = {2022},
    doi = {https://doi.org/10.1007/978-3-658-39720-3},
    keywords = {Crisis, HCI, SocialMedia, Projekt-EmerGent, Projekt-KontiKat, Projekt-ATHENE-SecUrban, Projekt-emergenCITY, Dissertation},
    }

  • Christian Reuter (2022)
    A European Perspective on Crisis Informatics: Citizens‘ and Authorities‘ attitudes towards Social Media for Public Safety and Security
    Nijmegen: The Radboud University Thesis Repository.
    [BibTeX] [Abstract] [Download PDF]

    Mobilising helpers in the event of a flood or letting friends know that you are okay in the event of a terrorist attack – more and more people are using social media in emergency, crisis or disaster situations. Storms, floods, attacks or pandemics (esp. COVID-19) show that citizens use social media to inform themselves or to coordinate. This thesis presents qualitative and quantitative studies on the attitudes of emergency services and citizens in Europe towards social media in emergencies. Across the individual sub-studies, almost 10,000 people are surveyed including representative studies in the Netherlands, Germany, the UK and Italy. The work empirically shows that social media is increasingly important for emergency services, both for prevention and during crises; that private use of social media is a driving force in shaping opinions for organisational use; and that citizens have high expectations towards authorities, especially monitoring social media is expected, and sometimes responses within one hour. Depending on the risk culture, the data show further differences, e.g. whether the state (Germany) or the individual (Netherlands) is seen as primarily responsible for coping with the situation.

    @book{reuter_european_2022-1,
    address = {Nijmegen},
    title = {A {European} {Perspective} on {Crisis} {Informatics}: {Citizens}' and {Authorities}' attitudes towards {Social} {Media} for {Public} {Safety} and {Security}},
    url = {https://repository.ubn.ru.nl/handle/2066/253000},
    abstract = {Mobilising helpers in the event of a flood or letting friends know that you are okay in the event of a terrorist attack – more and more people are using social media in emergency, crisis or disaster situations. Storms, floods, attacks or pandemics (esp. COVID-19) show that citizens use social media to inform themselves or to coordinate. This thesis presents qualitative and quantitative studies on the attitudes of emergency services and citizens in Europe towards social media in emergencies. Across the individual sub-studies, almost 10,000 people are surveyed including representative studies in the Netherlands, Germany, the UK and Italy. The work empirically shows that social media is increasingly important for emergency services, both for prevention and during crises; that private use of social media is a driving force in shaping opinions for organisational use; and that citizens have high expectations towards authorities, especially monitoring social media is expected, and sometimes responses within one hour. Depending on the risk culture, the data show further differences, e.g. whether the state (Germany) or the individual (Netherlands) is seen as primarily responsible for coping with the situation.},
    publisher = {The Radboud University Thesis Repository},
    author = {Reuter, Christian},
    year = {2022},
    keywords = {AuswahlCrisis, Crisis, HCI, Selected, SocialMedia, Projekt-EmerGent, Projekt-KontiKat, Projekt-ATHENE-SecUrban, Projekt-emergenCITY, Dissertation},
    }

    2019

  • Marc-André Kaufhold, Christian Reuter, Thomas Ludwig (2019)
    Cross-Media Usage of Social Big Data for Emergency Services and Volunteer Communities: Approaches, Development and Challenges of Multi-Platform Social Media Services
    2019.
    [BibTeX] [Abstract] [Download PDF]

    The use of social media is ubiquitous and nowadays well- established in our everyday life, but increasingly also before, during or after emergencies. The produced data is spread across several types of social media and can be used by different actors, such as emergency services or volunteer communities. There are already systems available that support the process of gathering, analysing and distributing information through social media. However, dependent on the goal of analysis, the analysis methods and available systems are limited based on technical or business-oriented restrictions. This paper presents the design of a cross-platform Social Media API, which was integrated and evaluated within multiple emergency scenarios. Based on the lessons learned, we outline the core challenges from the practical development and theoretical findings, focusing (1) cross-platform gathering and data management, (2) trustability and information quality, (3) tailorability and adjustable data operations, and (4) queries, performance, and technical development.

    @techreport{kaufhold_cross-media_2019,
    title = {Cross-{Media} {Usage} of {Social} {Big} {Data} for {Emergency} {Services} and {Volunteer} {Communities}: {Approaches}, {Development} and {Challenges} of {Multi}-{Platform} {Social} {Media} {Services}},
    url = {https://arxiv.org/pdf/1907.07725.pdf},
    abstract = {The use of social media is ubiquitous and nowadays well- established in our everyday life, but increasingly also before, during or after emergencies. The produced data is spread across several types of social media and can be used by different actors, such as emergency services or volunteer communities. There are already systems available that support the process of gathering, analysing and distributing information through social media. However, dependent on the goal of analysis, the analysis methods and available systems are limited based on technical or business-oriented restrictions. This paper presents the design of a cross-platform Social Media API, which was integrated and evaluated within multiple emergency scenarios. Based on the lessons learned, we outline the core challenges from the practical development and theoretical findings, focusing (1) cross-platform gathering and data management, (2) trustability and information quality, (3) tailorability and adjustable data operations, and (4) queries, performance, and technical development.},
    institution = {arXiv},
    author = {Kaufhold, Marc-André and Reuter, Christian and Ludwig, Thomas},
    year = {2019},
    keywords = {Crisis, SocialMedia, Projekt-EmerGent, Projekt-KontiKat},
    pages = {1--11},
    }

  • Thomas Spielhofer, Anna Sophie Hahne, Christian Reuter, Marc-André Kaufhold, Stefka Schmid (2019)
    Social Media Use in Emergencies of Citizens in the United Kingdom
    Proceedings of the Information Systems for Crisis Response and Management (ISCRAM) València, Spain.
    [BibTeX] [Abstract] [Download PDF]

    People use social media in various ways including looking for or sharing information during crises or emergencies (e.g. floods, storms, terrorist attacks). Few studies have focused on European citizens‘ perceptions, and just one has deployed a representative sample to examine this. This article presents the results of one of the first representative studies on this topic conducted in the United Kingdom. The study shows that around a third (34\%) have used social media during an emergency and that such use is more widespread among younger people. In contrast, the main reasons for not using social media in an emergency include technological concerns and that the trustworthiness of social media content is doubtful. However, there is a growing trend towards increased use. The article deduces and explores implications of these findings, including problems potentially arising with more citizens sharing information on social media during emergencies and expecting a response.

    @inproceedings{spielhofer_social_2019,
    address = {València, Spain},
    title = {Social {Media} {Use} in {Emergencies} of {Citizens} in the {United} {Kingdom}},
    url = {http://www.peasec.de/paper/2019/2019_SpielhoferHahneReuterKaufholdSchmid_SocialMediaCrisesUK_ISCRAM.pdf},
    abstract = {People use social media in various ways including looking for or sharing information during crises or emergencies (e.g. floods, storms, terrorist attacks). Few studies have focused on European citizens' perceptions, and just one has deployed a representative sample to examine this. This article presents the results of one of the first representative studies on this topic conducted in the United Kingdom. The study shows that around a third (34\%) have used social media during an emergency and that such use is more widespread among younger people. In contrast, the main reasons for not using social media in an emergency include technological concerns and that the trustworthiness of social media content is doubtful. However, there is a growing trend towards increased use. The article deduces and explores implications of these findings, including problems potentially arising with more citizens sharing information on social media during emergencies and expecting a response.},
    booktitle = {Proceedings of the {Information} {Systems} for {Crisis} {Response} and {Management} ({ISCRAM})},
    publisher = {ISCRAM Association},
    author = {Spielhofer, Thomas and Hahne, Anna Sophie and Reuter, Christian and Kaufhold, Marc-André and Schmid, Stefka},
    editor = {Franco, Zeno and González, José J. and Canós, José H.},
    year = {2019},
    keywords = {Cooperation, Crisis, HCI, SocialMedia, Projekt-EmerGent, Projekt-KontiKat},
    }

  • Christian Reuter, Marc-André Kaufhold, Stefka Schmid, Thomas Spielhofer, Anna Sophie Hahne (2019)
    The Impact of Risk Cultures: Citizens‘ Perception of Social Media Use in Emergencies across Europe
    Technological Forecasting and Social Change (TFSC) ;148(119724):1–17. doi:10.1016/j.techfore.2019.119724
    [BibTeX] [Abstract] [Download PDF]

    Usage of social media during emergencies and respective perceptions vary across countries. Our representative survey of 7,071 citizens in Europe (Germany, Italy, the Netherlands and the United Kingdom) shows differences of current use of social media in emergencies, expectations towards authorities monitoring social media, intensity of perceiving barriers regarding the use as well as variances concerning the (likelihood of future) use of mobile apps. While German and British participants‘ frequency of use of social media is medium and low, respectively, Italian and Dutch respondents use them relatively frequently. Our comparison of the four countries allows for an interpretation of divergent behavior across countries with respect to risk cultures as well as expanding the respective model to social media contexts. At the same time, our findings stress that across the four European countries participants assessed similar advantages like dissemination of information and barriers like false rumors with respect to use social media during emergencies. Distributed equally across nations, age and gender showed significant relationships with social media usage which, among other findings, suggests being helpful for effective implementation of management structures using new technologies.

    @article{reuter_impact_2019,
    title = {The {Impact} of {Risk} {Cultures}: {Citizens}' {Perception} of {Social} {Media} {Use} in {Emergencies} across {Europe}},
    volume = {148},
    url = {http://www.peasec.de/paper/2019/2019_ReuterKaufholdSchmidSpielhoferHahne_TheImpactofRiskCultures_TFSC.pdf},
    doi = {10.1016/j.techfore.2019.119724},
    abstract = {Usage of social media during emergencies and respective perceptions vary across countries. Our representative survey of 7,071 citizens in Europe (Germany, Italy, the Netherlands and the United Kingdom) shows differences of current use of social media in emergencies, expectations towards authorities monitoring social media, intensity of perceiving barriers regarding the use as well as variances concerning the (likelihood of future) use of mobile apps. While German and British participants' frequency of use of social media is medium and low, respectively, Italian and Dutch respondents use them relatively frequently. Our comparison of the four countries allows for an interpretation of divergent behavior across countries with respect to risk cultures as well as expanding the respective model to social media contexts. At the same time, our findings stress that across the four European countries participants assessed similar advantages like dissemination of information and barriers like false rumors with respect to use social media during emergencies. Distributed equally across nations, age and gender showed significant relationships with social media usage which, among other findings, suggests being helpful for effective implementation of management structures using new technologies.},
    number = {119724},
    journal = {Technological Forecasting and Social Change (TFSC)},
    author = {Reuter, Christian and Kaufhold, Marc-André and Schmid, Stefka and Spielhofer, Thomas and Hahne, Anna Sophie},
    year = {2019},
    keywords = {AuswahlCrisis, Crisis, HCI, Selected, SocialMedia, Projekt-EmerGent, A-Paper, Ranking-ImpactFactor, Ranking-VHB-B},
    pages = {1--17},
    }

  • Marc-André Kaufhold, Alexis Gizikis, Christian Reuter, Matthias Habdank, Margarita Grinko (2019)
    Avoiding Chaotic Use of Social Media before, during, and after Emergencies: Design and Evaluation of Citizens‘ Guidelines
    Journal of Contingencies and Crisis Management (JCCM) ;27(3):198–213. doi:10.1111/1468-5973.12249
    [BibTeX] [Abstract] [Download PDF]

    Social media have been established in many natural disasters or human‐induced crises and emergencies. Nowadays, authorities, such as emergency services, and citizens engage with social media in different phases of the emergency management cycle. However, as research in crisis informatics highlights, one remaining issue constitutes the chaotic use of social media by citizens during emergencies, which has the potential to increase the complexity of tasks, uncertainty, and pressure for emergency services. To counter these risks, besides implementing supportive technology, social media guidelines may help putting artefact and theoretical contributions into practical use for authorities and citizens. This paper presents the design and evaluation (with 1,024 participants) of citizens‘ guidelines for using social media before, during, and after emergencies.

    @article{kaufhold_avoiding_2019,
    title = {Avoiding {Chaotic} {Use} of {Social} {Media} before, during, and after {Emergencies}: {Design} and {Evaluation} of {Citizens}' {Guidelines}},
    volume = {27},
    url = {http://www.peasec.de/paper/2019/2019_KaufholdGizikisReuterHabdankGrinko_DesignEvaluationCitizenGuidelines_JCCM.pdf},
    doi = {10.1111/1468-5973.12249},
    abstract = {Social media have been established in many natural disasters or human‐induced crises and emergencies. Nowadays, authorities, such as emergency services, and citizens engage with social media in different phases of the emergency management cycle. However, as research in crisis informatics highlights, one remaining issue constitutes the chaotic use of social media by citizens during emergencies, which has the potential to increase the complexity of tasks, uncertainty, and pressure for emergency services. To counter these risks, besides implementing supportive technology, social media guidelines may help putting artefact and theoretical contributions into practical use for authorities and citizens. This paper presents the design and evaluation (with 1,024 participants) of citizens' guidelines for using social media before, during, and after emergencies.},
    number = {3},
    journal = {Journal of Contingencies and Crisis Management (JCCM)},
    author = {Kaufhold, Marc-André and Gizikis, Alexis and Reuter, Christian and Habdank, Matthias and Grinko, Margarita},
    year = {2019},
    keywords = {Crisis, HCI, SocialMedia, Projekt-EmerGent, A-Paper, Ranking-ImpactFactor, Projekt-KontiKat, AuswahlKaufhold},
    pages = {198--213},
    }

    2018

  • Christian Reuter, Thomas Ludwig, Marc-André Kaufhold, Thomas Spielhofer (2018)
    Studie: Wie sehen Mitarbeiter von Feuerwehr und THW den Einsatz sozialer Medien in Gefahrenlagen?
    Crisis Prevention: 2018.
    [BibTeX] [Download PDF]

    @techreport{reuter_studie_2018,
    address = {Crisis Prevention},
    title = {Studie: {Wie} sehen {Mitarbeiter} von {Feuerwehr} und {THW} den {Einsatz} sozialer {Medien} in {Gefahrenlagen}?},
    url = {http://www.peasec.de/paper/2018/2018_ReuterLudwigKaufholdSpielhofer_FeuerwehrTHWSozialeMedienGefahrenlagen_CrisisPrevention.pdf},
    author = {Reuter, Christian and Ludwig, Thomas and Kaufhold, Marc-André and Spielhofer, Thomas},
    year = {2018},
    keywords = {Crisis, HCI, SocialMedia, Projekt-EmerGent, Projekt-KontiKat},
    pages = {64--66},
    }

  • Christian Reuter, Marc-André Kaufhold, Thomas Spielhofer, Anna Sophie Hahne (2018)
    Soziale Medien und Apps in Notsituationen: Eine repräsentative Studie über die Wahrnehmung in Deutschland
    BBK Bevölkerungsschutz: 2018.
    [BibTeX] [Abstract] [Download PDF]

    Helfer bei Hochwassergefahr mobilisieren oder bei einem Terroranschlag Freunden auf Facebook mitteilen, dass es einem gut geht – immer mehr Menschen nutzen soziale Medien in Notsituationen, Krisen- oder Katastrophenlagen. Schließlich ist es heute kein Geheimnis mehr, dass soziale Medien in jenen Lagen (z. B. Überschwemmungen, Stürme, terroristische Anschläge) für diverse Gruppen (z. B. Bürger, Rettungsdienste) von Nutzen sein können. Während Stärken und Schwächen dieser Nutzung bereits eingehend erforscht wurden, widmen sich nur wenige Studien den betreffenden Wahrnehmungen innerhalb der Bevölkerung. Unsere repräsentative Untersuchung von Einstellungen der Bevölkerung in Deutschland gegenüber der Nutzung sozialer Medien in Notsituationen stellt die erste ihrer Art dar. Dabei zeigt sich, dass ungefähr die Hälfte der Befragten (44 \%) bereits in Notsituationen zum Zwecke des Teilens und / oder Herausfindens von Informationen auf soziale Medien zurückgegriffen hat. Zudem werden falsche Gerüchte in sozialen Medien mehrheitlich (74 \%) als Bedrohung empfunden. Notfall-Apps für das eigene Smartphone werden selten (16 \%) heruntergeladen, wobei Wetter- und Erste-Hilfe-Apps am beliebtesten sind.

    @techreport{reuter_soziale_2018,
    address = {BBK Bevölkerungsschutz},
    title = {Soziale {Medien} und {Apps} in {Notsituationen}: {Eine} repräsentative {Studie} über die {Wahrnehmung} in {Deutschland}},
    url = {http://www.peasec.de/paper/2018/2018_ReuterKaufholdSpielhoferHahne_SozialeMedienAppsNotsituationen_BBK.pdf},
    abstract = {Helfer bei Hochwassergefahr mobilisieren oder bei einem Terroranschlag Freunden auf Facebook mitteilen, dass es einem gut geht – immer mehr Menschen nutzen soziale Medien in Notsituationen, Krisen- oder Katastrophenlagen. Schließlich ist es heute kein Geheimnis mehr, dass soziale Medien in jenen Lagen (z. B. Überschwemmungen, Stürme, terroristische Anschläge) für diverse Gruppen (z. B. Bürger, Rettungsdienste) von Nutzen sein können. Während Stärken und Schwächen dieser Nutzung bereits eingehend erforscht wurden, widmen sich nur wenige Studien den betreffenden Wahrnehmungen innerhalb der Bevölkerung. Unsere repräsentative Untersuchung von Einstellungen der Bevölkerung in Deutschland gegenüber der Nutzung sozialer Medien in Notsituationen stellt die erste ihrer Art dar. Dabei zeigt sich, dass ungefähr die Hälfte der Befragten (44 \%) bereits in Notsituationen zum Zwecke des Teilens und / oder Herausfindens von Informationen auf soziale Medien zurückgegriffen hat. Zudem werden falsche Gerüchte in sozialen Medien mehrheitlich (74 \%) als Bedrohung empfunden. Notfall-Apps für das eigene Smartphone werden selten (16 \%) heruntergeladen, wobei Wetter- und Erste-Hilfe-Apps am beliebtesten sind.},
    author = {Reuter, Christian and Kaufhold, Marc-André and Spielhofer, Thomas and Hahne, Anna Sophie},
    year = {2018},
    keywords = {Crisis, HCI, SocialMedia, Projekt-EmerGent, Projekt-KontiKat},
    pages = {22--24},
    }

  • Marc-André Kaufhold, Nicola Rupp, Christian Reuter, Christoph Amelunxen, Massimo Cristaldi (2018)
    112.SOCIAL: Design and Evaluation of a Mobile Crisis App for Bidirectional Communication between Emergency Services and Citizen
    Proceedings of the European Conference on Information Systems (ECIS) Portsmouth, UK.
    [BibTeX] [Abstract] [Download PDF]

    Emergencies threaten human lives and overall societal continuity, whether or not the crises and disas- ters are induced by nature, such as earthquakes, floods and hurricanes, or by human beings, such as accidents, terror attacks and uprisings. In such situations, not only do citizens demand information about the damage and safe behaviour, but emergency services also require high quality information to improve situational awareness. For this purpose, there are currently two kinds of apps available: Gen- eral-purpose apps, such as Facebook Safety Check or Twitter Alerts, already integrate safety features. Specific crisis apps, such as KATWARN in Germany or FEMA in the US, provide information on how to behave before, during and after emergencies, and capabilities for reporting incidents or receiving disaster warnings. In this paper, we analyse authorities‘ and citizens‘ information demands and features of crisis apps. Moreover, we present the concept, implementation and evaluation of a crisis app for incident reporting and bidirectional communication between authorities and citizens. Using the app, citizens may (1) report incidents by providing a category, description, location and multimedia files and (2) receive broadcasts and responses from authorities. Finally, we outline features, requirements and contextual factors for incident reporting and bidirectional communication via mobile app.

    @inproceedings{kaufhold_112social_2018,
    address = {Portsmouth, UK},
    title = {112.{SOCIAL}: {Design} and {Evaluation} of a {Mobile} {Crisis} {App} for {Bidirectional} {Communication} between {Emergency} {Services} and {Citizen}},
    url = {https://peasec.de/paper/2018/2018_KaufholdRuppReuterAmelunxenCristaldi_112Social_ECIS.pdf},
    abstract = {Emergencies threaten human lives and overall societal continuity, whether or not the crises and disas- ters are induced by nature, such as earthquakes, floods and hurricanes, or by human beings, such as accidents, terror attacks and uprisings. In such situations, not only do citizens demand information about the damage and safe behaviour, but emergency services also require high quality information to improve situational awareness. For this purpose, there are currently two kinds of apps available: Gen- eral-purpose apps, such as Facebook Safety Check or Twitter Alerts, already integrate safety features. Specific crisis apps, such as KATWARN in Germany or FEMA in the US, provide information on how to behave before, during and after emergencies, and capabilities for reporting incidents or receiving disaster warnings. In this paper, we analyse authorities' and citizens' information demands and features of crisis apps. Moreover, we present the concept, implementation and evaluation of a crisis app for incident reporting and bidirectional communication between authorities and citizens. Using the app, citizens may (1) report incidents by providing a category, description, location and multimedia files and (2) receive broadcasts and responses from authorities. Finally, we outline features, requirements and contextual factors for incident reporting and bidirectional communication via mobile app.},
    booktitle = {Proceedings of the {European} {Conference} on {Information} {Systems} ({ECIS})},
    publisher = {AIS},
    author = {Kaufhold, Marc-André and Rupp, Nicola and Reuter, Christian and Amelunxen, Christoph and Cristaldi, Massimo},
    year = {2018},
    keywords = {Cooperation, Crisis, HCI, Projekt-EmerGent, A-Paper, Ranking-VHB-B, Ranking-WKWI-A, Ranking-CORE-A, Projekt-KontiKat},
    pages = {1--17},
    }

  • Christian Reuter, Tilo Mentler (2018)
    Human-Computer-Interaction and Social Media in Safety-Critical Systems – Editorial
    Journal of Contingencies and Crisis Management (JCCM) ;26(1):2–3. doi:10.1111/1468-5973.12192
    [BibTeX] [Download PDF]

    @article{reuter_human-computer-interaction_2018,
    title = {Human-{Computer}-{Interaction} and {Social} {Media} in {Safety}-{Critical} {Systems} – {Editorial}},
    volume = {26},
    url = {http://onlinelibrary.wiley.com/doi/10.1111/1468-5973.12192/abstract},
    doi = {10.1111/1468-5973.12192},
    number = {1},
    journal = {Journal of Contingencies and Crisis Management (JCCM)},
    author = {Reuter, Christian and Mentler, Tilo},
    year = {2018},
    keywords = {Crisis, HCI, SocialMedia, Projekt-EmerGent, Ranking-ImpactFactor, Projekt-KontiKat},
    pages = {2--3},
    }

  • Christian Reuter (2018)
    Sicherheitskritische Mensch-Computer-Interaktion: Interaktive Technologien und Soziale Medien im Krisen- und Sicherheitsmanagement (Erste Auflage)
    Wiesbaden: Springer Vieweg. doi:10.1007/978-3-658-19523-6
    [BibTeX] [Abstract] [Download PDF]

    Dieses Lehr- und Fachbuch gibt eine fundierte und praxisbezogene Einführung sowie einen Überblick über Grundlagen, Methoden und Anwendungen der Mensch-Computer-Interaktion im Kontext von Sicherheit, Notfällen, Krisen, Katastrophen, Krieg und Frieden. Dies adressierend werden interaktive, mobile, ubiquitäre und kooperative Technologien sowie Soziale Medien vorgestellt. Hierbei finden klassische Themen wie benutzbare (IT-)Sicherheit, Industrie 4.0, Katastrophenschutz, Medizin und Automobil, aber auch Augmented Reality, Crowdsourcing, Shitstorm Management, Social Media Analytics und Cyberwar ihren Platz. Methodisch wird das Spektrum von Usable Safety- bis Usable Security Engineering von Analyse über Design bis Evaluation abgedeckt. Das Buch eignet sich ebenso als Lehrbuch für Studierende wie als Handbuch für Wissenschaftler, Designer, Entwickler und Anwender.

    @book{reuter_sicherheitskritische_2018-1,
    address = {Wiesbaden},
    title = {Sicherheitskritische {Mensch}-{Computer}-{Interaktion}: {Interaktive} {Technologien} und {Soziale} {Medien} im {Krisen}- und {Sicherheitsmanagement} ({Erste} {Auflage})},
    isbn = {978-3-658-19522-9},
    url = {http://www.springer.com/de/book/9783658195229},
    abstract = {Dieses Lehr- und Fachbuch gibt eine fundierte und praxisbezogene Einführung sowie einen Überblick über Grundlagen, Methoden und Anwendungen der Mensch-Computer-Interaktion im Kontext von Sicherheit, Notfällen, Krisen, Katastrophen, Krieg und Frieden. Dies adressierend werden interaktive, mobile, ubiquitäre und kooperative Technologien sowie Soziale Medien vorgestellt. Hierbei finden klassische Themen wie benutzbare (IT-)Sicherheit, Industrie 4.0, Katastrophenschutz, Medizin und Automobil, aber auch Augmented Reality, Crowdsourcing, Shitstorm Management, Social Media Analytics und Cyberwar ihren Platz. Methodisch wird das Spektrum von Usable Safety- bis Usable Security Engineering von Analyse über Design bis Evaluation abgedeckt. Das Buch eignet sich ebenso als Lehrbuch für Studierende wie als Handbuch für Wissenschaftler, Designer, Entwickler und Anwender.},
    publisher = {Springer Vieweg},
    author = {Reuter, Christian},
    year = {2018},
    doi = {10.1007/978-3-658-19523-6},
    keywords = {HCI, SocialMedia, Projekt-EmerGent, UsableSec, Security, Projekt-KontiKat, Peace, Infrastructure, RSF, AuswahlUsableSec},
    }

  • Christian Reuter (2018)
    Special Issue on Human-Computer-Interaction and Social Media in Safety-Critical Systems – Journal of Contingencies and Crisis Management (JCCM)
    Wiley.
    [BibTeX] [Download PDF]

    @book{reuter_special_2018-2,
    title = {Special {Issue} on {Human}-{Computer}-{Interaction} and {Social} {Media} in {Safety}-{Critical} {Systems} - {Journal} of {Contingencies} and {Crisis} {Management} ({JCCM})},
    volume = {26},
    url = {http://onlinelibrary.wiley.com/doi/10.1111/jccm.2018.26.issue-1/issuetoc},
    number = {1},
    publisher = {Wiley},
    author = {Reuter, Christian},
    year = {2018},
    note = {Publication Title: Journal of Contingencies and Crisis Management (JCCM)},
    keywords = {Crisis, HCI, SocialMedia, Projekt-EmerGent, Security, Ranking-ImpactFactor, Projekt-KontiKat},
    }

  • Christian Reuter, Marc-André Kaufhold (2018)
    Fifteen Years of Social Media in Emergencies: A Retrospective Review and Future Directions for Crisis Informatics
    Journal of Contingencies and Crisis Management (JCCM) ;26(1):41–57. doi:10.1111/1468-5973.12196
    [BibTeX] [Abstract] [Download PDF]

    Social media has been established in many larger emergencies and crises. This process has not started just a few years ago, but already 15 years ago in 2001 after the terrorist attacks of 9/11. In the following years, especially in the last 10, sometimes summarized under the term crisis informatics, a variety of studies focusing on the use of ICT and social media before, during or after nearly every crisis and emergency has arisen. This article aims to recapitulate 15 years of social media in emergencies and its research with a special emphasis on use patterns, role patterns and perception patterns that can be found across different cases in order to point out what has been achieved so far, and what future potentials exist.

    @article{reuter_fifteen_2018,
    title = {Fifteen {Years} of {Social} {Media} in {Emergencies}: {A} {Retrospective} {Review} and {Future} {Directions} for {Crisis} {Informatics}},
    volume = {26},
    url = {http://www.peasec.de/paper/2018/2018_ReuterKaufhold_FifteenYearsSocialMediaEmergencies_JCCM.pdf},
    doi = {10.1111/1468-5973.12196},
    abstract = {Social media has been established in many larger emergencies and crises. This process has not started just a few years ago, but already 15 years ago in 2001 after the terrorist attacks of 9/11. In the following years, especially in the last 10, sometimes summarized under the term crisis informatics, a variety of studies focusing on the use of ICT and social media before, during or after nearly every crisis and emergency has arisen. This article aims to recapitulate 15 years of social media in emergencies and its research with a special emphasis on use patterns, role patterns and perception patterns that can be found across different cases in order to point out what has been achieved so far, and what future potentials exist.},
    number = {1},
    journal = {Journal of Contingencies and Crisis Management (JCCM)},
    author = {Reuter, Christian and Kaufhold, Marc-André},
    year = {2018},
    keywords = {AuswahlCrisis, Crisis, HCI, Selected, SocialMedia, Projekt-EmerGent, A-Paper, Ranking-ImpactFactor, Peace, Projekt-KOKOS, AuswahlKaufhold},
    pages = {41--57},
    }

    2017

  • Christian Reuter, Katja Pätsch, Elena Runft (2017)
    IT for Peace? Fighting Against Terrorism in Social Media – An Explorative Twitter Study
    i-com – Journal of Interactive Media ;16(2):181–195. doi:10.1515/icom-2017-0013
    [BibTeX] [Abstract] [Download PDF]

    The Internet and especially social media are not only used for supposedly good purposes. For example, the recruitment of new members and the dissemination of ideologies of terrorism also takes place in the media. However, the fight against terrorism also makes use of the same tools. The type of these countermeasures, as well as the methods, are covered in this work. In the first part, the state of the art is summarized. The second part presents an explorative empirical study of the fight against terrorism in social media, especially on Twitter. Different, preferably characteristic forms are structured within the scope with the example of Twitter. The aim of this work is to approach this highly relevant subject with the goal of peace, safety and safety from the perspective of information systems. Moreover, it should serve following researches in this field as basis and starting point.

    @article{reuter_it_2017,
    title = {{IT} for {Peace}? {Fighting} {Against} {Terrorism} in {Social} {Media} – {An} {Explorative} {Twitter} {Study}},
    volume = {16},
    url = {http://www.peasec.de/paper/2017/2017_ReuterPaetschRunft_ITforPeaceTerrorismSocialMedia_ICOM.pdf},
    doi = {10.1515/icom-2017-0013},
    abstract = {The Internet and especially social media are not only used for supposedly good purposes. For example, the recruitment of new members and the dissemination of ideologies of terrorism also takes place in the media. However, the fight against terrorism also makes use of the same tools. The type of these countermeasures, as well as the methods, are covered in this work. In the first part, the state of the art is summarized. The second part presents an explorative empirical study of the fight against terrorism in social media, especially on Twitter. Different, preferably characteristic forms are structured within the scope with the example of Twitter. The aim of this work is to approach this highly relevant subject with the goal of peace, safety and safety from the perspective of information systems. Moreover, it should serve following researches in this field as basis and starting point.},
    number = {2},
    journal = {i-com - Journal of Interactive Media},
    author = {Reuter, Christian and Pätsch, Katja and Runft, Elena},
    year = {2017},
    keywords = {Crisis, HCI, SocialMedia, Student, Projekt-EmerGent, Projekt-KontiKat, Peace},
    pages = {181--195},
    }

  • Marc-André Kaufhold, Christian Reuter (2017)
    The Impact of Social Media for Emergency Situations: A Case Study with the Fire Department of Frankfurt
    Proceedings of the Information Systems for Crisis Response and Management (ISCRAM) Albi, France.
    [BibTeX] [Abstract] [Download PDF]

    The use of social media is not only part of everyday life but also of crises and emergencies. Many studies focus on the concrete use of social media during a specific emergency, but the prevalence of social media, data access and published research studies allows the examination in a broader and more integrated manner. This work-in-progress paper presents the results of a case study with the Fire Department Frankfurt, which is one of the biggest and most modern fire departments in Germany. The findings relate to social media technologies, organizational structure and roles, information validation, staff skills and resources, and the importance of volunteer communities. In the next step, the results will be integrated into the frame of a comparative case study with the overall aim of examining the impact of social media on how emergency services respond and react in an emergency.

    @inproceedings{kaufhold_impact_2017,
    address = {Albi, France},
    title = {The {Impact} of {Social} {Media} for {Emergency} {Situations}: {A} {Case} {Study} with the {Fire} {Department} of {Frankfurt}},
    url = {http://www.peasec.de/paper/2017/2017_KaufholdReuter_ImpactSocialMediaFrankfurt_ISCRAM.pdf},
    abstract = {The use of social media is not only part of everyday life but also of crises and emergencies. Many studies focus on the concrete use of social media during a specific emergency, but the prevalence of social media, data access and published research studies allows the examination in a broader and more integrated manner. This work-in-progress paper presents the results of a case study with the Fire Department Frankfurt, which is one of the biggest and most modern fire departments in Germany. The findings relate to social media technologies, organizational structure and roles, information validation, staff skills and resources, and the importance of volunteer communities. In the next step, the results will be integrated into the frame of a comparative case study with the overall aim of examining the impact of social media on how emergency services respond and react in an emergency.},
    booktitle = {Proceedings of the {Information} {Systems} for {Crisis} {Response} and {Management} ({ISCRAM})},
    publisher = {ISCRAM},
    author = {Kaufhold, Marc-André and Reuter, Christian},
    editor = {Comes, Tina and Bénaben, Frédérick and Hanachi, Chihab and Lauras, Matthieu},
    year = {2017},
    keywords = {Crisis, HCI, SocialMedia, Projekt-EmerGent, Projekt-KontiKat},
    pages = {603--612},
    }

  • Christian Reuter, Thomas Spielhofer (2017)
    Towards Social Resilience: A Quantitative and Qualitative Survey on Citizens‘ Perception of Social Media in Emergencies in Europe
    Journal Technological Forecasting and Social Change (TFSC) ;121:168–180. doi:10.1016/j.techfore.2016.07.038
    [BibTeX] [Abstract] [Download PDF]

    Social media is increasingly being used during emergencies. Most available studies are focused on how citizens and/or authorities use these technologies in concrete events. However, larger quantitative studies with significant results on attitudes, needs and future plans of citizens in such events are not available – especially such of a comparative nature related to emergency services. As part of the EU project ‘EmerGent‘ this article presents the findings of a survey of 1034 citizens across 30 European countries conducted between February and June 2015 to explore citizens‘ attitudes towards the use of social media for private purposes and in emergency situations. The article briefly compares these findings with a second survey conducted with 761 emergency service staff across 32 European countries from September to December 2014. The aim of the overall study is to discuss citizens‘ attitudes towards social media in emergencies in order to derive challenges and opportunities for social resilience.

    @article{reuter_towards_2017,
    title = {Towards {Social} {Resilience}: {A} {Quantitative} and {Qualitative} {Survey} on {Citizens}' {Perception} of {Social} {Media} in {Emergencies} in {Europe}},
    volume = {121},
    url = {http://www.sciencedirect.com/science/article/pii/S0040162516301986},
    doi = {10.1016/j.techfore.2016.07.038},
    abstract = {Social media is increasingly being used during emergencies. Most available studies are focused on how citizens and/or authorities use these technologies in concrete events. However, larger quantitative studies with significant results on attitudes, needs and future plans of citizens in such events are not available - especially such of a comparative nature related to emergency services. As part of the EU project ‘EmerGent' this article presents the findings of a survey of 1034 citizens across 30 European countries conducted between February and June 2015 to explore citizens' attitudes towards the use of social media for private purposes and in emergency situations. The article briefly compares these findings with a second survey conducted with 761 emergency service staff across 32 European countries from September to December 2014. The aim of the overall study is to discuss citizens' attitudes towards social media in emergencies in order to derive challenges and opportunities for social resilience.},
    journal = {Journal Technological Forecasting and Social Change (TFSC)},
    author = {Reuter, Christian and Spielhofer, Thomas},
    year = {2017},
    keywords = {Crisis, HCI, SocialMedia, Projekt-EmerGent, A-Paper, Ranking-ImpactFactor, Ranking-VHB-B, RSF},
    pages = {168--180},
    }

  • Christian Reuter, Marc-André Kaufhold, Thomas Ludwig (2017)
    End-User Development and Social Big Data – Towards Tailorable Situation Assessment with Social Media
    In: Fabio Paternò, Volker Wulf: New Perspectives in End-User Development. Springer, , 307–332. doi:10.1007/978-3-319-60291-2_12
    [BibTeX] [Abstract] [Download PDF]

    The amount of data being available is increasing rapidly. Based on the technological advances with mobile and ubiquitous computing, the use of social media is getting more and more usual in daily life as well as in extraordinary situations, such as crises. Not surprisingly, this increasing use is one reason why data on the internet is also developing that fast. Currently, more than 3 billion people use the internet and the majority is also registered with social media services such as Facebook or Twitter. While processing this kind of data by the majority of non-technical users, concepts of End-User Development (EUD) are important. This chapter researches how concepts of EUD might be applied to handle social big data. Based on foundations and an empirical pre-study, we explore how EUD can support the gathering and assessment process of social media. In this context, we investigate how end-users can articulate their personal quality criteria appropriately and how the selection of relevant data can be supported by EUD approaches. We present a tailorable social media gathering service and quality assessment service for social media content, which has been implemented and integrated into an application for both volunteers and the emergency services.

    @incollection{reuter_end-user_2017,
    title = {End-{User} {Development} and {Social} {Big} {Data} - {Towards} {Tailorable} {Situation} {Assessment} with {Social} {Media}},
    isbn = {978-3-319-60290-5},
    url = {https://link.springer.com/chapter/10.1007/978-3-319-60291-2_12},
    abstract = {The amount of data being available is increasing rapidly. Based on the technological advances with mobile and ubiquitous computing, the use of social media is getting more and more usual in daily life as well as in extraordinary situations, such as crises. Not surprisingly, this increasing use is one reason why data on the internet is also developing that fast. Currently, more than 3 billion people use the internet and the majority is also registered with social media services such as Facebook or Twitter. While processing this kind of data by the majority of non-technical users, concepts of End-User Development (EUD) are important. This chapter researches how concepts of EUD might be applied to handle social big data. Based on foundations and an empirical pre-study, we explore how EUD can support the gathering and assessment process of social media. In this context, we investigate how end-users can articulate their personal quality criteria appropriately and how the selection of relevant data can be supported by EUD approaches. We present a tailorable social media gathering service and quality assessment service for social media content, which has been implemented and integrated into an application for both volunteers and the emergency services.},
    booktitle = {New {Perspectives} in {End}-{User} {Development}},
    publisher = {Springer},
    author = {Reuter, Christian and Kaufhold, Marc-André and Ludwig, Thomas},
    editor = {Paternò, Fabio and Wulf, Volker},
    year = {2017},
    doi = {10.1007/978-3-319-60291-2_12},
    keywords = {Crisis, HCI, SocialMedia, Projekt-EmerGent, Projekt-KOKOS},
    pages = {307--332},
    }

  • Christian Reuter, Thomas Ludwig, Marc-André Kaufhold, Julian Hupertz (2017)
    Social Media Resilience during Infrastructure Breakdowns using Mobile Ad-Hoc Networks
    Advances and New Trends in Environmental Informatics – Proceedings of the 30th EnviroInfo Conference Berlin, Germany. doi:10.1007/978-3-319-44711-7_7
    [BibTeX] [Abstract] [Download PDF]

    Social media and instant messaging services are nowadays considered as important communication infrastructures on which people rely on. However, the exchange of content during breakdowns of the underlying technical infrastructures, which sometimes happens based on environmental occurrences, is challenging. Hence, with this paper, we examine the resilience of social media during breakdowns. We discuss communication options and examine ad-hoc functionality for the exchange of social media data between different actors in such cases. To address this, we have developed a concept, which makes use of mobile ad-hoc networks (MANETs) for the spontaneous exchange of information with smartphones. We implemented our concept as the mobile application Social Offline Map (SOMAP) and evaluated it within two iterations (1.0 and 2.0). Finally, we discuss our contribution within the context of related work and the limitations of our approach.

    @inproceedings{reuter_social_2017,
    address = {Berlin, Germany},
    title = {Social {Media} {Resilience} during {Infrastructure} {Breakdowns} using {Mobile} {Ad}-{Hoc} {Networks}},
    url = {http://www.wineme.uni-siegen.de/paper/2017/2017_Reuteretal_SocialMediaResilienceMANET_EnviroInfo.pdf},
    doi = {10.1007/978-3-319-44711-7_7},
    abstract = {Social media and instant messaging services are nowadays considered as important communication infrastructures on which people rely on. However, the exchange of content during breakdowns of the underlying technical infrastructures, which sometimes happens based on environmental occurrences, is challenging. Hence, with this paper, we examine the resilience of social media during breakdowns. We discuss communication options and examine ad-hoc functionality for the exchange of social media data between different actors in such cases. To address this, we have developed a concept, which makes use of mobile ad-hoc networks (MANETs) for the spontaneous exchange of information with smartphones. We implemented our concept as the mobile application Social Offline Map (SOMAP) and evaluated it within two iterations (1.0 and 2.0). Finally, we discuss our contribution within the context of related work and the limitations of our approach.},
    booktitle = {Advances and {New} {Trends} in {Environmental} {Informatics} - {Proceedings} of the 30th {EnviroInfo} {Conference}},
    publisher = {Springer},
    author = {Reuter, Christian and Ludwig, Thomas and Kaufhold, Marc-André and Hupertz, Julian},
    editor = {Wohlgemuth, V. and Fuchs-Kittowski, Frank and Wittmann, Jochen},
    year = {2017},
    keywords = {Crisis, HCI, SocialMedia, Projekt-EmerGent, Security, Projekt-KOKOS, Infrastructure, RSF},
    pages = {75--88},
    }

  • Christian Reuter, Marc-André Kaufhold, Inken Leopold, Hannah Knipp (2017)
    Katwarn, NINA or FEMA? Multi-Method Study on Distribution, Use and Public Views on Crisis Apps
    European Conference on Information Systems (ECIS) Guimarães, Portugal.
    [BibTeX] [Abstract] [Download PDF]

    Crises, such as thunderstorms and an increasing number of (recognised) terroristic attacks in 2015, 2016, and 2017, do not only lead to extensive monetary damage, but also threaten human lives and influence citizens‘ perceptions of safety and security. In such situations, the population demands information about the damage and safe behaviour. Although some apps are available to provide this information, the number of users seems relatively low. Focussing on Germany, this study aims to research (1) the distribution of crisis apps in the population, (2) the kinds of crisis apps currently used, as well as (3) needed core functionalities of warning apps. This multi-method study analyses crisis apps by investigating their utilisation quantitatively in a snowball-based survey in Europe (n=1,034) and in a representative survey in Germany (n=1,369). Based on this, the German warning apps Katwarn and NINA and the US-American app FEMA are evaluated qualitatively (n=22). The results revealed requirements which informed the implementation of a warning app prototype. The prototype combines the identified advantages of the apps evaluated in the study, containing warnings and all-clear, recommendations for action, functions to contact friends and helpers. The contributions of this work are findings on the distribution of crisis apps in Europe and Germany (both 16\%), the kinds of crisis apps used (mostly weather and warning apps), and empirically based requirements for warning apps which can be integrated in further developments of existing apps and a prototype for such an app.

    @inproceedings{reuter_katwarn_2017,
    address = {Guimarães, Portugal},
    title = {Katwarn, {NINA} or {FEMA}? {Multi}-{Method} {Study} on {Distribution}, {Use} and {Public} {Views} on {Crisis} {Apps}},
    url = {http://www.peasec.de/paper/2017/2017_ReuterKaufholdLeopoldKnipp_CrisisApps_ECIS.pdf},
    abstract = {Crises, such as thunderstorms and an increasing number of (recognised) terroristic attacks in 2015, 2016, and 2017, do not only lead to extensive monetary damage, but also threaten human lives and influence citizens' perceptions of safety and security. In such situations, the population demands information about the damage and safe behaviour. Although some apps are available to provide this information, the number of users seems relatively low. Focussing on Germany, this study aims to research (1) the distribution of crisis apps in the population, (2) the kinds of crisis apps currently used, as well as (3) needed core functionalities of warning apps. This multi-method study analyses crisis apps by investigating their utilisation quantitatively in a snowball-based survey in Europe (n=1,034) and in a representative survey in Germany (n=1,369). Based on this, the German warning apps Katwarn and NINA and the US-American app FEMA are evaluated qualitatively (n=22). The results revealed requirements which informed the implementation of a warning app prototype. The prototype combines the identified advantages of the apps evaluated in the study, containing warnings and all-clear, recommendations for action, functions to contact friends and helpers. The contributions of this work are findings on the distribution of crisis apps in Europe and Germany (both 16\%), the kinds of crisis apps used (mostly weather and warning apps), and empirically based requirements for warning apps which can be integrated in further developments of existing apps and a prototype for such an app.},
    booktitle = {European {Conference} on {Information} {Systems} ({ECIS})},
    publisher = {AIS},
    author = {Reuter, Christian and Kaufhold, Marc-André and Leopold, Inken and Knipp, Hannah},
    year = {2017},
    keywords = {Crisis, HCI, Student, Projekt-EmerGent, A-Paper, Ranking-VHB-B, Ranking-WKWI-A, Ranking-CORE-A, Projekt-KontiKat, Peace},
    pages = {2187--2201},
    }

  • Christian Reuter, Marc-André Kaufhold, Thomas Spielhofer, Anna Sophie Hahne (2017)
    Social Media in Emergencies: A Representative Study on Citizens‘ Perception in Germany
    Proceedings of the ACM: Human Computer Interaction (PACM): Computer-Supported Cooperative Work and Social Computing ;1(2):1–19. doi:10.1145/3134725
    [BibTeX] [Abstract] [Download PDF]

    The value of social media in crises, disasters, and emergencies across different events (e.g. floods, storms, terroristic attacks), countries, and for heterogeneous participants (e.g. citizens, emergency services) is now well-attested. Existing work has examined the potentials and weaknesses of its use during specific events. Fewer studies, however, have focused on citizens‘ perceptions of social media in emergencies, and none have deployed a representative sample to examine this. We present the results of the first representative study on citizens‘ perception of social media in emergencies that we have conducted in Germany. Our study highlights, for example, that around half (45\%) of people have used social media during an emergency to share and / or look for information. In contrast, false rumours on social media (74\%) are perceived as a threat. Moreover, only a minority of people have downloaded a smartphone app for emergencies (16\%), with the most popular ones‘ weather and first aid apps.

    @article{reuter_social_2017-1,
    title = {Social {Media} in {Emergencies}: {A} {Representative} {Study} on {Citizens}' {Perception} in {Germany}},
    volume = {1},
    url = {http://www.peasec.de/paper/2017/2017_ReuterKaufholdSpielhoferHahne_SocialMediaEmergenciesGermany_CSCW.pdf},
    doi = {10.1145/3134725},
    abstract = {The value of social media in crises, disasters, and emergencies across different events (e.g. floods, storms, terroristic attacks), countries, and for heterogeneous participants (e.g. citizens, emergency services) is now well-attested. Existing work has examined the potentials and weaknesses of its use during specific events. Fewer studies, however, have focused on citizens' perceptions of social media in emergencies, and none have deployed a representative sample to examine this. We present the results of the first representative study on citizens' perception of social media in emergencies that we have conducted in Germany. Our study highlights, for example, that around half (45\%) of people have used social media during an emergency to share and / or look for information. In contrast, false rumours on social media (74\%) are perceived as a threat. Moreover, only a minority of people have downloaded a smartphone app for emergencies (16\%), with the most popular ones' weather and first aid apps.},
    number = {2},
    journal = {Proceedings of the ACM: Human Computer Interaction (PACM): Computer-Supported Cooperative Work and Social Computing},
    author = {Reuter, Christian and Kaufhold, Marc-André and Spielhofer, Thomas and Hahne, Anna Sophie},
    year = {2017},
    note = {Place: New York, USA},
    keywords = {Crisis, HCI, Selected, SocialMedia, Projekt-EmerGent, A-Paper, Ranking-CORE-A, Ranking-WKWI-B, Projekt-KontiKat},
    pages = {1--19},
    }

  • Christian Reuter, Katja Pätsch, Elena Runft (2017)
    Terrorbekämpfung mithilfe sozialer Medien – ein explorativer Einblick am Beispiel von Twitter
    Proceedings of the International Conference on Wirtschaftsinformatik (WI) St. Gallen, Switzerland.
    [BibTeX] [Abstract] [Download PDF]

    Das Internet und insbesondere soziale Medien werden bekanntermaßen nicht nur zu vermeintlich guten Zwecken genutzt. So findet die Rekrutierung neuer Mitglieder und die Verbreitung von Ideologien des Terrorismus ebenfalls über dieses Medium statt. Aber auch die Terrorismusbekämpfung bedient sich gleicher Werkzeuge. Die Art und Weise dieser Gegenmaßnahmen sowie die Vorgehensweisen sollen in diesem Artikel thematisiert werden. Im ersten Teil wird der Forschungsstand zusammengefasst. Der zweite Teil stellt eine explorative empirische Studie der Terrorismusbekämpfung in sozialen Medien, insbesondere in Twitter, dar. Verschiedene, möglichst charakteristische Formen werden in diesem Rahmen am Beispiel von Twitter strukturiert. Ziel ist es, sich diesem hochrelevanten Gebiet mit dem Ziel von Frieden und Sicherheit aus Perspektive der Wirtschaftsinformatik zu nähern und weiteren Forschungsarbeiten in diesem Gebiet als Grundlage und Ausgangspunkt dienen zu können.

    @inproceedings{reuter_terrorbekampfung_2017,
    address = {St. Gallen, Switzerland},
    title = {Terrorbekämpfung mithilfe sozialer {Medien} – ein explorativer {Einblick} am {Beispiel} von {Twitter}},
    url = {http://www.wineme.uni-siegen.de/paper/2017/2017_ReuterPaetschRunft_TerrorbekaempfungSozialeMedien_WI.pdf},
    abstract = {Das Internet und insbesondere soziale Medien werden bekanntermaßen nicht nur zu vermeintlich guten Zwecken genutzt. So findet die Rekrutierung neuer Mitglieder und die Verbreitung von Ideologien des Terrorismus ebenfalls über dieses Medium statt. Aber auch die Terrorismusbekämpfung bedient sich gleicher Werkzeuge. Die Art und Weise dieser Gegenmaßnahmen sowie die Vorgehensweisen sollen in diesem Artikel thematisiert werden. Im ersten Teil wird der Forschungsstand zusammengefasst. Der zweite Teil stellt eine explorative empirische Studie der Terrorismusbekämpfung in sozialen Medien, insbesondere in Twitter, dar. Verschiedene, möglichst charakteristische Formen werden in diesem Rahmen am Beispiel von Twitter strukturiert. Ziel ist es, sich diesem hochrelevanten Gebiet mit dem Ziel von Frieden und Sicherheit aus Perspektive der Wirtschaftsinformatik zu nähern und weiteren Forschungsarbeiten in diesem Gebiet als Grundlage und Ausgangspunkt dienen zu können.},
    booktitle = {Proceedings of the {International} {Conference} on {Wirtschaftsinformatik} ({WI})},
    publisher = {AIS},
    author = {Reuter, Christian and Pätsch, Katja and Runft, Elena},
    editor = {Leimeister, J.M. and Brenner, W.},
    year = {2017},
    keywords = {Crisis, HCI, SocialMedia, Student, Projekt-EmerGent, Ranking-CORE-C, Ranking-VHB-C, Ranking-WKWI-A, Peace},
    pages = {649--663},
    }

    2016

  • Christian Reuter, Thomas Ludwig, Volkmar Pipek (2016)
    Kooperative Resilienz – ein soziotechnischer Ansatz durch Kooperationstechnologien im Krisenmanagement
    Gruppe. Interaktion. Organisation. Zeitschrift für Angewandte Organisationspsychologie (GIO) ;47(2):159–169. doi:10.1007/s11612-016-0317-7
    [BibTeX] [Abstract] [Download PDF]

    Während das Konzept der Resilienz in den Ingenieurwissenschaften vornehmlich auf die Verfügbarkeit technischer Systeme fokussiert ist, betrachtet unser Beitrag Resilienz als soziotechnisches Konstrukt und zeigt Möglichkeiten zur Förderung kooperativer Resilienz, insbesondere durch Kooperationstechnologie, auf. Nach einer Definition von Resilienz im Allgemeinen und im Katastrophenschutz – unserem Anwendungsfeld – sowie im Kontext kooperativer Strukturen, stellen wir unsere Methodik und die entwickelten Kooperationstechnologien vor. Diese adressieren die Zusammenarbeit verschiedener Akteure (z. B. Feuerwehr, Polizei, Bevölkerung) in Schadenslagen. Abschließend diskutieren wir den Beitrag dieser Technologien zur kooperativen Resilienz als Fähigkeit, Krisen der Kooperation durch Anpassungsfähigkeit an geänderte Realitäten mithilfe von Kooperationstechnologie zu überstehen.

    @article{reuter_kooperative_2016,
    title = {Kooperative {Resilienz} – ein soziotechnischer {Ansatz} durch {Kooperationstechnologien} im {Krisenmanagement}},
    volume = {47},
    url = {https://www.wineme.uni-siegen.de/paper/2016/2016_reuterludwigpipek_kooperativeresilienz_gio.pdf},
    doi = {10.1007/s11612-016-0317-7},
    abstract = {Während das Konzept der Resilienz in den Ingenieurwissenschaften vornehmlich auf die Verfügbarkeit technischer Systeme fokussiert ist, betrachtet unser Beitrag Resilienz als soziotechnisches Konstrukt und zeigt Möglichkeiten zur Förderung kooperativer Resilienz, insbesondere durch Kooperationstechnologie, auf. Nach einer Definition von Resilienz im Allgemeinen und im Katastrophenschutz – unserem Anwendungsfeld – sowie im Kontext kooperativer Strukturen, stellen wir unsere Methodik und die entwickelten Kooperationstechnologien vor. Diese adressieren die Zusammenarbeit verschiedener Akteure (z. B. Feuerwehr, Polizei, Bevölkerung) in Schadenslagen. Abschließend diskutieren wir den Beitrag dieser Technologien zur kooperativen Resilienz als Fähigkeit, Krisen der Kooperation durch Anpassungsfähigkeit an geänderte Realitäten mithilfe von Kooperationstechnologie zu überstehen.},
    number = {2},
    journal = {Gruppe. Interaktion. Organisation. Zeitschrift für Angewandte Organisationspsychologie (GIO)},
    author = {Reuter, Christian and Ludwig, Thomas and Pipek, Volkmar},
    year = {2016},
    keywords = {Cooperation, Crisis, HCI, Projekt-InfoStrom, Projekt-EmerGent, Projekt-KOKOS, RSF},
    pages = {159--169},
    }

  • Tilo Mentler, Christian Reuter, Stefan Geisler (2016)
    Special Issue on Human-Machine Interaction and Cooperation in Safety-Critical Systems – i-com – Journal of Interactive Media
    De Gruyter.
    [BibTeX] [Download PDF]

    @book{mentler_special_2016,
    title = {Special {Issue} on {Human}-{Machine} {Interaction} and {Cooperation} in {Safety}-{Critical} {Systems} - i-com - {Journal} of {Interactive} {Media}},
    volume = {15},
    url = {https://peasec.de/paper/2016/2016_MentlerReuterGeisler_SpecialIssueHumanMachineInteractionSafetyCriticalSystems_ICOM.pdf},
    number = {3},
    publisher = {De Gruyter},
    author = {Mentler, Tilo and Reuter, Christian and Geisler, Stefan},
    year = {2016},
    note = {Publication Title: i-com: Journal of Interactive Media},
    keywords = {Crisis, HCI, Projekt-EmerGent, Security},
    }

  • Christian Reuter, Thomas Ludwig, Christoph Kotthaus, Marc-André Kaufhold, Elmar von Radziewski, Volkmar Pipek (2016)
    Big Data in a Crisis? Creating Social Media Datasets for Emergency Management Research
    i-com – Journal of Interactive Media ;15(3):249–264. doi:10.1515/icom-2016-0036
    [BibTeX] [Abstract] [Download PDF]

    A growing body of research in the area of information systems for crisis management is based on data from social media. After almost every larger disaster studies emerge with the focus on the specific use of social media. Much of this research is based on Twitter data, due to the ease of access of this (mainly public) data, compared to (more closed) data, such as Facebook or Google+. Based on the experience gained from a research project on social media in emergencies and our task to collect social media data sets for other partners, we present the design and evaluation of a graphical user interface that supports those stakeholders (such as emergency services or researchers) that are interested in creating social media datasets for further crisis management research. We do not specifically focus on the analysis of social media data. Rather we aim to support the gathering process and how actors without sophisticated technical skills can be supported to get what they want and especially need: relevant social media data. Within this article, we present a practice-oriented approach and implications for designing tools that support the collection of social media data as well as future work.

    @article{reuter_big_2016,
    title = {Big {Data} in a {Crisis}? {Creating} {Social} {Media} {Datasets} for {Emergency} {Management} {Research}},
    volume = {15},
    url = {http://wineme.uni-siegen.de/paper/2016/2016_Reuteretal_BigDatainCrisisDatasets_ICOM.pdf},
    doi = {10.1515/icom-2016-0036},
    abstract = {A growing body of research in the area of information systems for crisis management is based on data from social media. After almost every larger disaster studies emerge with the focus on the specific use of social media. Much of this research is based on Twitter data, due to the ease of access of this (mainly public) data, compared to (more closed) data, such as Facebook or Google+. Based on the experience gained from a research project on social media in emergencies and our task to collect social media data sets for other partners, we present the design and evaluation of a graphical user interface that supports those stakeholders (such as emergency services or researchers) that are interested in creating social media datasets for further crisis management research. We do not specifically focus on the analysis of social media data. Rather we aim to support the gathering process and how actors without sophisticated technical skills can be supported to get what they want and especially need: relevant social media data. Within this article, we present a practice-oriented approach and implications for designing tools that support the collection of social media data as well as future work.},
    number = {3},
    journal = {i-com - Journal of Interactive Media},
    author = {Reuter, Christian and Ludwig, Thomas and Kotthaus, Christoph and Kaufhold, Marc-André and von Radziewski, Elmar and Pipek, Volkmar},
    year = {2016},
    keywords = {HCI, SocialMedia, Projekt-EmerGent, Projekt-KOKOS},
    pages = {249--264},
    }

  • Christian Reuter, Tilo Mentler, Stefan Geisler, Michael Herczeg, Thomas Ludwig, Volkmar Pipek, Simon Nestler, Johannes Sautter (2016)
    Proceedings des Workshops „Mensch-Computer-Interaktion in sicherheitskritischen Systemen“
    Aachen, Germany: Gesellschaft für Informatik e.V..
    [BibTeX] [Download PDF]

    @book{reuter_proceedings_2016,
    address = {Aachen, Germany},
    title = {Proceedings des {Workshops} "{Mensch}-{Computer}-{Interaktion} in sicherheitskritischen {Systemen}"},
    url = {https://www.wineme.uni-siegen.de/paper/2016/2016_proc-sicherheitskritischemmi_muc.pdf},
    publisher = {Gesellschaft für Informatik e.V.},
    author = {Reuter, Christian and Mentler, Tilo and Geisler, Stefan and Herczeg, Michael and Ludwig, Thomas and Pipek, Volkmar and Nestler, Simon and Sautter, Johannes},
    editor = {Weyers, B. and Dittmar, A.},
    year = {2016},
    note = {Publication Title: Mensch \& Computer: Workshopband},
    keywords = {Crisis, HCI, Projekt-EmerGent, UsableSec},
    }

  • Christian Reuter, Tilo Mentler, Stefan Geisler, Michael Herczeg, Thomas Ludwig, Volkmar Pipek, Simon Nestler, Johannes Sautter (2016)
    Aktuelle Ansätze zur Mensch-Computer-Interaktion in sicherheitskritischen Systemen
    Mensch und Computer – Workshopband Aachen, Germany. doi:10.18420/muc2016-ws01-0000
    [BibTeX] [Abstract] [Download PDF]

    Die zunehmende Durchdringung der Lebenswelt mit IT macht auch nicht vor sicherheitskritischen Systemen halt. Anwendungsfelder betreffen kritische Infrastrukturen, Leitstellensysteme, Fahrzeug- und Verkehrsführungssoftware, Prozessführungssysteme, Produktionstechnologien, Anwendung der Medizintechnik, des Krisenmanagements, der Gefahrenabwehr oder des Terrorismus. Die Mensch-Computer-Interaktion in solchen sicherheitskritischen Systemen und Anwendungsfeldern ist eine Herausforderung nicht nur für die Informatik, sondern eine interdisziplinäre Aufgabe an der Schnittstelle vieler Disziplinen. Zunehmend müssen auch mobile Kontexte und Endgeräte sowie soziale Netzwerke in die Betrachtungen einbezogen werden.

    @inproceedings{reuter_aktuelle_2016,
    address = {Aachen, Germany},
    title = {Aktuelle {Ansätze} zur {Mensch}-{Computer}-{Interaktion} in sicherheitskritischen {Systemen}},
    url = {https://dl.gi.de/bitstream/handle/20.500.12116/314/bitstream_9083.pdf?sequence=1&isAllowed=y},
    doi = {10.18420/muc2016-ws01-0000},
    abstract = {Die zunehmende Durchdringung der Lebenswelt mit IT macht auch nicht vor sicherheitskritischen Systemen halt. Anwendungsfelder betreffen kritische Infrastrukturen, Leitstellensysteme, Fahrzeug- und Verkehrsführungssoftware, Prozessführungssysteme, Produktionstechnologien, Anwendung der Medizintechnik, des Krisenmanagements, der Gefahrenabwehr oder des Terrorismus. Die Mensch-Computer-Interaktion in solchen sicherheitskritischen Systemen und Anwendungsfeldern ist eine Herausforderung nicht nur für die Informatik, sondern eine interdisziplinäre Aufgabe an der Schnittstelle vieler Disziplinen. Zunehmend müssen auch mobile Kontexte und Endgeräte sowie soziale Netzwerke in die Betrachtungen einbezogen werden.},
    booktitle = {Mensch und {Computer} - {Workshopband}},
    publisher = {Gesellschaft für Informatik e.V.},
    author = {Reuter, Christian and Mentler, Tilo and Geisler, Stefan and Herczeg, Michael and Ludwig, Thomas and Pipek, Volkmar and Nestler, Simon and Sautter, Johannes},
    editor = {Weyers, B. and Dittmar, A.},
    year = {2016},
    keywords = {HCI, SocialMedia, Projekt-EmerGent, Projekt-KOKOS},
    }

  • Christian Reuter, Marc-André Kaufhold (2016)
    Warum Katastrophenschutzbehörden soziale Medien nicht nutzen wollen
    Mensch und Computer – Tagungsband Aachen, Germany. doi:10.18420/muc2016-mci-0205
    [BibTeX] [Abstract] [Download PDF]

    In Deutschland wurde die Umfassende Nutzung sozialer Medien in Krisenlagen erstmalig während des mitteleuropäischen Hochwassers 2013 öffentlich wahrgenommen (Kaufhold & Reuter, 2014). Twitter, Facebook, Google Maps und weitere Plattformen dienten der Informationsverbreitung Koordination freiwilliger Helfer. Solche Informationen sind potentiell auch für Behörden und Organisationen mit Sicherheitsaufgaben (BOS) von Relevanz, jedoch existieren ebenfalls Gefahren. Da es sich um einen sicherheitskritischen Kontext handelt, ist die Berücksichtigung kritischer Stimmen von besonderer Relevanz. Dieser Artikel möchte sich folglich mit den Gründen deren Nichtnutzung in Katstrophenlagen beschäftigen. Hierfür wird zuerst der Stand der Forschung analysiert, um anschließend die Ergebnisse einer explorativen empirischen Studie vorzustellen.

    @inproceedings{reuter_warum_2016,
    address = {Aachen, Germany},
    title = {Warum {Katastrophenschutzbehörden} soziale {Medien} nicht nutzen wollen},
    url = {https://dl.gi.de/bitstream/handle/20.500.12116/174/bitstream_8783.pdf},
    doi = {10.18420/muc2016-mci-0205},
    abstract = {In Deutschland wurde die Umfassende Nutzung sozialer Medien in Krisenlagen erstmalig während des mitteleuropäischen Hochwassers 2013 öffentlich wahrgenommen (Kaufhold \& Reuter, 2014). Twitter, Facebook, Google Maps und weitere Plattformen dienten der Informationsverbreitung Koordination freiwilliger Helfer. Solche Informationen sind potentiell auch für Behörden und Organisationen mit Sicherheitsaufgaben (BOS) von Relevanz, jedoch existieren ebenfalls Gefahren. Da es sich um einen sicherheitskritischen Kontext handelt, ist die Berücksichtigung kritischer Stimmen von besonderer Relevanz. Dieser Artikel möchte sich folglich mit den Gründen deren Nichtnutzung in Katstrophenlagen beschäftigen. Hierfür wird zuerst der Stand der Forschung analysiert, um anschließend die Ergebnisse einer explorativen empirischen Studie vorzustellen.},
    booktitle = {Mensch und {Computer} - {Tagungsband}},
    publisher = {Gesellschaft für Informatik e.V.},
    author = {Reuter, Christian and Kaufhold, Marc-André},
    editor = {Prinz, W. and Borchers, J. and Jarke, M.},
    year = {2016},
    keywords = {Crisis, SocialMedia, Projekt-EmerGent},
    pages = {1--4},
    }

  • Thomas Ludwig, Christian Reuter, Volkmar Pipek (2016)
    From Publics to Communities: Researching the Path of Shared Issues Through ICT
    Computer Supported Cooperative Work: The Journal of Collaborative Computing (JCSCW) ;25(2-3):193–225. doi:10.1007/s10606-016-9252-y
    [BibTeX] [Abstract] [Download PDF]

    In recent years, citizens‘ movements such as the Arab Spring or Euromaidan protests have clearly shown that, whenever affected — whether negatively or positively — by the state and government decisions, citizens act to deal with the shared issues. Groups of people who organize themselves to address (mainly political) issues were defined as a `public‘ by the philosopher John Dewey. He believed it is necessary to improve communication to create a `Great Community‘ as a cohesive group of a public. Although information and communication technologies (ICT) lead to ambivalent effects on pursuing this goal and often distract the mass of people from discussing these issues, we argue that nowadays ICT can improve communication and has the potential to foster the detection of issues and therefore promote the (trans-)formation of a public into an issue-based community. As our foundation we took a literature study covering the formation of publics and their potential to evolve into communities, as well as their interplay with technology. This formed the basis for the development of our operational model that `follows the issues‘ for capturing the (trans-)formation of a public. Based on our model, we outline different perspectives on detecting shared issues as early indicators for publics based on ICT and derive implications for researching this process from a practical perspective.

    @article{ludwig_publics_2016,
    title = {From {Publics} to {Communities}: {Researching} the {Path} of {Shared} {Issues} {Through} {ICT}},
    volume = {25},
    url = {https://www.wineme.uni-siegen.de/paper/2016/2016_ludwigreuterpipek_frompublicstocommunities_jcscw.pdf},
    doi = {10.1007/s10606-016-9252-y},
    abstract = {In recent years, citizens' movements such as the Arab Spring or Euromaidan protests have clearly shown that, whenever affected — whether negatively or positively — by the state and government decisions, citizens act to deal with the shared issues. Groups of people who organize themselves to address (mainly political) issues were defined as a `public' by the philosopher John Dewey. He believed it is necessary to improve communication to create a `Great Community' as a cohesive group of a public. Although information and communication technologies (ICT) lead to ambivalent effects on pursuing this goal and often distract the mass of people from discussing these issues, we argue that nowadays ICT can improve communication and has the potential to foster the detection of issues and therefore promote the (trans-)formation of a public into an issue-based community. As our foundation we took a literature study covering the formation of publics and their potential to evolve into communities, as well as their interplay with technology. This formed the basis for the development of our operational model that `follows the issues' for capturing the (trans-)formation of a public. Based on our model, we outline different perspectives on detecting shared issues as early indicators for publics based on ICT and derive implications for researching this process from a practical perspective.},
    number = {2-3},
    journal = {Computer Supported Cooperative Work: The Journal of Collaborative Computing (JCSCW)},
    author = {Ludwig, Thomas and Reuter, Christian and Pipek, Volkmar},
    year = {2016},
    note = {Place: Norwell, MA, USA
    Publisher: Kluwer Academic Publishers},
    keywords = {Cooperation, HCI, SocialMedia, Projekt-EmerGent, A-Paper, Ranking-ImpactFactor, Ranking-VHB-B, Ranking-CORE-B},
    pages = {193--225},
    }

  • Christian Reuter, Christoph Amelunxen, Matthias Moi (2016)
    Semi-Automatic Alerts and Notifications for Emergency Services based on Cross-Platform Social Media Data –Evaluation of a Prototype
    Informatik 2016: von Menschen für Menschen, Lecture Notes in Informatics (LNI) Klagenfurt.
    [BibTeX] [Abstract] [Download PDF]

    The convergence of social networking and mobile media technology is shifting the way how people communicate and gain or share information. People are using social media to a greater extent, also in emergency situations. During disasters throughout the world, such as the 2010 Haiti earthquake, the 2013 European floods, or the terror attacks 2015 in Paris and 2016 in Brussels, this has been illustrated again. Often information about disasters even finds its way faster to social media than it reaches regular news companies and emergency services. However, approaches for processing and analyzing the vast quantities of data produced have even more potential. Yet many emergency services still have not found a way to put this potential to an effective use. Within our project EmerGent we are developing a system to process and analyse information from social media particularly tailored for the specific needs of emergency services. The aim is to transform the high volume of noisy data into a low volume of rich content that is useful to emergency personnel. In the first part of this paper we present our approach from a user interface perspective. The second part deals with the evaluation of the approach and the derivation of future potentials of the approach.

    @inproceedings{reuter_semi-automatic_2016,
    address = {Klagenfurt},
    title = {Semi-{Automatic} {Alerts} and {Notifications} for {Emergency} {Services} based on {Cross}-{Platform} {Social} {Media} {Data} –{Evaluation} of a {Prototype}},
    url = {http://subs.emis.de/LNI/Proceedings/Proceedings259/P-259.pdf#page=1806},
    abstract = {The convergence of social networking and mobile media technology is shifting the way how people communicate and gain or share information. People are using social media to a greater extent, also in emergency situations. During disasters throughout the world, such as the 2010 Haiti earthquake, the 2013 European floods, or the terror attacks 2015 in Paris and 2016 in Brussels, this has been illustrated again. Often information about disasters even finds its way faster to social media than it reaches regular news companies and emergency services. However, approaches for processing and analyzing the vast quantities of data produced have even more potential. Yet many emergency services still have not found a way to put this potential to an effective use. Within our project EmerGent we are developing a system to process and analyse information from social media particularly tailored for the specific needs of emergency services. The aim is to transform the high volume of noisy data into a low volume of rich content that is useful to emergency personnel. In the first part of this paper we present our approach from a user interface perspective. The second part deals with the evaluation of the approach and the derivation of future potentials of the approach.},
    booktitle = {Informatik 2016: von {Menschen} für {Menschen}, {Lecture} {Notes} in {Informatics} ({LNI})},
    publisher = {Gesellschaft für Informatik},
    author = {Reuter, Christian and Amelunxen, Christoph and Moi, Matthias},
    editor = {Mayr, Heinrich C. and Pinzger, Martin},
    year = {2016},
    keywords = {Cooperation, HCI, SocialMedia, Projekt-EmerGent, Ranking-CORE-C, Ranking-VHB-C},
    pages = {1805--1818},
    }

  • Christian Reuter (2016)
    Chapter 44: Communication between Power Blackout and Mobile Network Overload
    In: Mehdi Khosrow-Pour: E-Health and Telemedicine: Concepts, Methodologies, Tools, and Applications. IGI Global, , 876–891.
    [BibTeX] [Abstract] [Download PDF]

    In cases of power outages the communication of organizations responsible for recovery work (emergency services, public administration, energy network operators) to the public poses several challenges, pri-marily the breakdowns of many communication infrastructures and therefore the limitations of the use of classical communication media. This paper surveys technical concepts to support crisis communica-tion during blackouts. Therefore it first investigates the perception and information demands of citizens and communication infrastructures in different scenarios. Furthermore, it analyzes communication infrastructures and their availability in different scenarios. Finally it proposes ‘BlaCom‘, an ICT-based concept for blackout communication, which addresses the time span between the occurrence of the energy blackout and the possible overload of the mobile phone network. It combines general information with location-specific and setting-specific information, was implemented as a prototype smartphone application and evaluated with 12 potential end users.

    @incollection{reuter_chapter_2016,
    title = {Chapter 44: {Communication} between {Power} {Blackout} and {Mobile} {Network} {Overload}},
    volume = {II},
    isbn = {978-1-4666-8756-1},
    url = {https://www.wineme.uni-siegen.de/paper/2016/2016_reuter_communicationpowerblackoutnetworkoverload_ehealth.pdf},
    abstract = {In cases of power outages the communication of organizations responsible for recovery work (emergency services, public administration, energy network operators) to the public poses several challenges, pri-marily the breakdowns of many communication infrastructures and therefore the limitations of the use of classical communication media. This paper surveys technical concepts to support crisis communica-tion during blackouts. Therefore it first investigates the perception and information demands of citizens and communication infrastructures in different scenarios. Furthermore, it analyzes communication infrastructures and their availability in different scenarios. Finally it proposes ‘BlaCom', an ICT-based concept for blackout communication, which addresses the time span between the occurrence of the energy blackout and the possible overload of the mobile phone network. It combines general information with location-specific and setting-specific information, was implemented as a prototype smartphone application and evaluated with 12 potential end users.},
    booktitle = {E-{Health} and {Telemedicine}: {Concepts}, {Methodologies}, {Tools}, and {Applications}},
    publisher = {IGI Global},
    author = {Reuter, Christian},
    editor = {{Mehdi Khosrow-Pour}},
    year = {2016},
    keywords = {Crisis, HCI, Projekt-InfoStrom, Projekt-EmerGent, Infrastructure, RSF},
    pages = {876--891},
    }

  • Tilo Mentler, Christian Reuter, Stefan Geisler (2016)
    Introduction to this Special Issue on “Human-Machine Interaction and Cooperation in Safety-Critical Systems”
    i-com – Journal of Interactive Media ;15(3):219–226. doi:https://doi.org/10.1515/icom-2016-0037
    [BibTeX] [Abstract] [Download PDF]

    Mission- and safety-critical domains are more and more characterized by interactive and multimedia systems varying from large-scale technologies (e. g. airplanes) to wearable devices (e. g. smartglasses) operated by professional staff or volunteering laypeople. While technical availability, reliability and security of computer-based systems are of utmost importance, outcomes and performances increasingly depend on sufficient human-machine interaction or even cooperation to a large extent. While this i-com Special Issue on “Human-Machine Interaction and Cooperation in Safety-Critical Systems” presents recent research results from specific application domains like aviation, automotive, crisis management and healthcare, this introductory paper outlines the diversity of users, technologies and interaction or cooperation models involved.

    @article{mentler_introduction_2016,
    title = {Introduction to this {Special} {Issue} on “{Human}-{Machine} {Interaction} and {Cooperation} in {Safety}-{Critical} {Systems}”},
    volume = {15},
    url = {https://www.degruyter.com/view/j/icom.2016.15.issue-3/icom-2016-0037/icom-2016-0037.xml?format=INT},
    doi = {https://doi.org/10.1515/icom-2016-0037},
    abstract = {Mission- and safety-critical domains are more and more characterized by interactive and multimedia systems varying from large-scale technologies (e. g. airplanes) to wearable devices (e. g. smartglasses) operated by professional staff or volunteering laypeople. While technical availability, reliability and security of computer-based systems are of utmost importance, outcomes and performances increasingly depend on sufficient human-machine interaction or even cooperation to a large extent. While this i-com Special Issue on “Human-Machine Interaction and Cooperation in Safety-Critical Systems” presents recent research results from specific application domains like aviation, automotive, crisis management and healthcare, this introductory paper outlines the diversity of users, technologies and interaction or cooperation models involved.},
    number = {3},
    journal = {i-com - Journal of Interactive Media},
    author = {Mentler, Tilo and Reuter, Christian and Geisler, Stefan},
    year = {2016},
    keywords = {Cooperation, Crisis, HCI, Projekt-EmerGent, Infrastructure},
    pages = {219--226},
    }

  • Christian Reuter, Julian Hupertz (2016)
    Sozial auch ohne Netz – Soziale Medien bei Infrastrukturproblemen
    Mensch und Computer – Workshopband Aachen, Germany. doi:http://dx.doi.org/10.18420/muc2016-ws01-0004
    [BibTeX] [Abstract] [Download PDF]

    Menschen tauschen sich aus und gerade in schwierigen Situationen ist Kommunikation sehr wichtig. In Katastrophenlagen, wie schweren Unwettern, sind jedoch teilweise zentrale Kommunikationsinfrastrukturen betroffen durch der durch Kommunikationsmedien unterstützte Informationsaustausch naturgemäß schwerer möglich als in Zeiten ohne solche Ausfälle. In jenen Fällen ist Kreativität erforderlich. Den Ansatz des Infrastructuring, d.h. der Re-Konzeptualisierung der eigenen Arbeit im Kontext bestehender und potentieller Werkzeuge, aufgreifend werden in diesem Artikel Kommunikationsmöglichkeiten in solchen Fällen untersucht. Basierend auf der Analyse der Verfügbarkeit von Kommunikationsinfrastrukturen wird betrachtet, welche Ansätze zur Kommunikation basierend auf alternativen und dezentralen Infrastrukturen wie MANETs, Wi-Fi und Bluetooth existieren und mithilfe von Smartphones nutzbar gemacht werden können.

    @inproceedings{reuter_sozial_2016,
    address = {Aachen, Germany},
    title = {Sozial auch ohne {Netz} – {Soziale} {Medien} bei {Infrastrukturproblemen}},
    url = {https://dl.gi.de/handle/20.500.12116/287},
    doi = {http://dx.doi.org/10.18420/muc2016-ws01-0004},
    abstract = {Menschen tauschen sich aus und gerade in schwierigen Situationen ist Kommunikation sehr wichtig. In Katastrophenlagen, wie schweren Unwettern, sind jedoch teilweise zentrale Kommunikationsinfrastrukturen betroffen durch der durch Kommunikationsmedien unterstützte Informationsaustausch naturgemäß schwerer möglich als in Zeiten ohne solche Ausfälle. In jenen Fällen ist Kreativität erforderlich. Den Ansatz des Infrastructuring, d.h. der Re-Konzeptualisierung der eigenen Arbeit im Kontext bestehender und potentieller Werkzeuge, aufgreifend werden in diesem Artikel Kommunikationsmöglichkeiten in solchen Fällen untersucht. Basierend auf der Analyse der Verfügbarkeit von Kommunikationsinfrastrukturen wird betrachtet, welche Ansätze zur Kommunikation basierend auf alternativen und dezentralen Infrastrukturen wie MANETs, Wi-Fi und Bluetooth existieren und mithilfe von Smartphones nutzbar gemacht werden können.},
    booktitle = {Mensch und {Computer} - {Workshopband}},
    publisher = {Gesellschaft für Informatik e.V.},
    author = {Reuter, Christian and Hupertz, Julian},
    editor = {Weyers, B. and Dittmar, A.},
    year = {2016},
    keywords = {Crisis, HCI, SocialMedia, Student, Projekt-EmerGent, Projekt-KOKOS, Infrastructure, RSF},
    }

  • Christian Reuter (2016)
    Emergence as a Characteristic of Resilient Cooperation Technologies
    Environmental Informatics – Stability, Continuity, Innovation. Current trends and future perspectives based on 30 years of history. Adjunct Proceedings of the EnviroInfo 2016 conference Berlin, Germany.
    [BibTeX] [Download PDF]

    @inproceedings{reuter_emergence_2016,
    address = {Berlin, Germany},
    title = {Emergence as a {Characteristic} of {Resilient} {Cooperation} {Technologies}},
    url = {http://www.peasec.de/paper/2016/2016_Reuter_EmergenceCharacteristicResilientTechnologies_EnviroInfo.pdf},
    booktitle = {Environmental {Informatics} – {Stability}, {Continuity}, {Innovation}. {Current} trends and future perspectives based on 30 years of history. {Adjunct} {Proceedings} of the {EnviroInfo} 2016 conference},
    author = {Reuter, Christian},
    editor = {Wohlgemuth, Volker and Fuchs-Kittowski, Frank and Wittmann, Jochen},
    year = {2016},
    keywords = {Projekt-EmerGent, Infrastructure, RSF},
    pages = {141--144},
    }

  • Marc-André Kaufhold, Christian Reuter (2016)
    The Self-Organization of Digital Volunteers across Social Media: The Case of the 2013 European Floods in Germany
    Journal of Homeland Security and Emergency Management (JHSEM) ;13(1):137–166. doi:10.1515/jhsem-2015-0063
    [BibTeX] [Abstract] [Download PDF]

    For almost 15 years, social media have been regularly used during emergencies. One of the most recent, and instructive, examples of its widespread use during a large scale scenario in Europe were the 2013 European floods. Public reporting during the event indicated, and our analysis confirms, that Twitter, Facebook (FB), Google Maps and other services were frequently used by affected citizen and volunteers to coordinate help activities among themselves. We conducted a qualitative analysis of selected emergent volunteer communities in Germany on FB and Twitter among others, and subsequently conducted interviews with FB group founders and activists. Our aim was to analyze the use of social media during this particular event, especially by digital volunteers. Our study illustrates the relevance of social media for German citizens in cases of disaster, focusing especially on the role of the moderator. Our specific emphasis was the embedding of social media in the organizing work done by said volunteers, emphasizing both the patterns of social media use and the challenges that result. We show that different social media were used in different ways: Twitter was used in the main for status updates while FB-pages were mostly intended to provide an overview. FB-groups also coordinated a multitude of activities.

    @article{kaufhold_self-organization_2016,
    title = {The {Self}-{Organization} of {Digital} {Volunteers} across {Social} {Media}: {The} {Case} of the 2013 {European} {Floods} in {Germany}},
    volume = {13},
    url = {http://wineme.uni-siegen.de/paper/2016/2016_KaufholdReuter_SelfOrganizationDigitalVolunteersEuropeanFloods_JHSEM.pdf},
    doi = {10.1515/jhsem-2015-0063},
    abstract = {For almost 15 years, social media have been regularly used during emergencies. One of the most recent, and instructive, examples of its widespread use during a large scale scenario in Europe were the 2013 European floods. Public reporting during the event indicated, and our analysis confirms, that Twitter, Facebook (FB), Google Maps and other services were frequently used by affected citizen and volunteers to coordinate help activities among themselves. We conducted a qualitative analysis of selected emergent volunteer communities in Germany on FB and Twitter among others, and subsequently conducted interviews with FB group founders and activists. Our aim was to analyze the use of social media during this particular event, especially by digital volunteers. Our study illustrates the relevance of social media for German citizens in cases of disaster, focusing especially on the role of the moderator. Our specific emphasis was the embedding of social media in the organizing work done by said volunteers, emphasizing both the patterns of social media use and the challenges that result. We show that different social media were used in different ways: Twitter was used in the main for status updates while FB-pages were mostly intended to provide an overview. FB-groups also coordinated a multitude of activities.},
    number = {1},
    journal = {Journal of Homeland Security and Emergency Management (JHSEM)},
    author = {Kaufhold, Marc-André and Reuter, Christian},
    year = {2016},
    keywords = {Cooperation, Crisis, HCI, SocialMedia, Projekt-EmerGent, Projekt-KOKOS, AuswahlKaufhold},
    pages = {137--166},
    }

  • Christian Reuter, Thomas Ludwig, Marc-André Kaufhold, Thomas Spielhofer (2016)
    Emergency Services Attitudes towards Social Media: A Quantitative and Qualitative Survey across Europe
    International Journal on Human-Computer Studies (IJHCS) ;95:96–111. doi:10.1016/j.ijhcs.2016.03.005
    [BibTeX] [Abstract] [Download PDF]

    Various studies show that social media is used in emergencies – and that in spite of possible challenges for emergency services, beneficial use cases can be identified. However, relatively little empirical data is available regarding the attitudes of emergency services towards social media, and almost none of a comparative nature. This article summarizes the findings of a survey conducted of the EU project ‘EmerGent‘ with 761 emergency service staff across 32 European countries from September to December 2014. The main aims of the survey were to explore the attitudes expressed by emergency service staff towards social media for private and organizational use as well as the levels and main factors influencing the current and likely future use of social media in their organizations. Based on our results, we discuss possible enhancements of the emergency management cycle using social media.

    @article{reuter_emergency_2016,
    title = {Emergency {Services} {Attitudes} towards {Social} {Media}: {A} {Quantitative} and {Qualitative} {Survey} across {Europe}},
    volume = {95},
    url = {https://peasec.de/paper/2016/2016_ReuterLudwigKaufholdSpielhofer_EmergencyServicesAttiudesSurveySocialMedia_IJHCS.pdf},
    doi = {10.1016/j.ijhcs.2016.03.005},
    abstract = {Various studies show that social media is used in emergencies – and that in spite of possible challenges for emergency services, beneficial use cases can be identified. However, relatively little empirical data is available regarding the attitudes of emergency services towards social media, and almost none of a comparative nature. This article summarizes the findings of a survey conducted of the EU project ‘EmerGent' with 761 emergency service staff across 32 European countries from September to December 2014. The main aims of the survey were to explore the attitudes expressed by emergency service staff towards social media for private and organizational use as well as the levels and main factors influencing the current and likely future use of social media in their organizations. Based on our results, we discuss possible enhancements of the emergency management cycle using social media.},
    journal = {International Journal on Human-Computer Studies (IJHCS)},
    author = {Reuter, Christian and Ludwig, Thomas and Kaufhold, Marc-André and Spielhofer, Thomas},
    year = {2016},
    keywords = {AuswahlCrisis, Crisis, HCI, Selected, SocialMedia, Projekt-EmerGent, A-Paper, Ranking-ImpactFactor, Ranking-CORE-A, Ranking-WKWI-B, AuswahlKaufhold},
    pages = {96--111},
    }

    2015

  • Christian Reuter, Julian Schröter (2015)
    Microblogging during the European Floods 2013: What Twitter May Contribute in German Emergencies
    International Journal of Information Systems for Crisis Response and Management (IJISCRAM) ;7(1):22–41.
    [BibTeX] [Abstract] [Download PDF]

    Social media is becoming more and more important in crisis management. However its analysis by emergency services still bears unaddressed challenges and the majority of studies focus on the use of social media in the USA. In this paper German tweets of the European Flood 2013 are therefore captured and analyzed using descriptive statistics, qualitative data coding, and computational algorithms. Our work illustrates that this event provided sufficient German traffic and geo-locations as well as enough original data (not derivative). However, up-to-date Named Entity Recognizer (NER) with German classifier could not recognize German rivers and highways satisfactorily. Furthermore our analysis revealed pragmatic (linguistic) barriers resulting from irony, wordplay, and ambiguity, as well as in retweet-behavior. To ease the analysis of data we suggest a retweet ratio, which is illustrated to be higher with important tweets and may help selecting tweets for mining. We argue that existing software has to be adapted and improved for German language characteristics, also to detect markedness, seriousness and truth

    @article{reuter_microblogging_2015,
    title = {Microblogging during the {European} {Floods} 2013: {What} {Twitter} {May} {Contribute} in {German} {Emergencies}},
    volume = {7},
    url = {http://www.peasec.de/paper/2015/2015_ReuterSchroeter_MicrobloggingEuropeanFloods_IJISCRAM.pdf},
    abstract = {Social media is becoming more and more important in crisis management. However its analysis by emergency services still bears unaddressed challenges and the majority of studies focus on the use of social media in the USA. In this paper German tweets of the European Flood 2013 are therefore captured and analyzed using descriptive statistics, qualitative data coding, and computational algorithms. Our work illustrates that this event provided sufficient German traffic and geo-locations as well as enough original data (not derivative). However, up-to-date Named Entity Recognizer (NER) with German classifier could not recognize German rivers and highways satisfactorily. Furthermore our analysis revealed pragmatic (linguistic) barriers resulting from irony, wordplay, and ambiguity, as well as in retweet-behavior. To ease the analysis of data we suggest a retweet ratio, which is illustrated to be higher with important tweets and may help selecting tweets for mining. We argue that existing software has to be adapted and improved for German language characteristics, also to detect markedness, seriousness and truth},
    number = {1},
    journal = {International Journal of Information Systems for Crisis Response and Management (IJISCRAM)},
    author = {Reuter, Christian and Schröter, Julian},
    year = {2015},
    keywords = {Cooperation, Crisis, HCI, SocialMedia, Student, Projekt-EmerGent},
    pages = {22--41},
    }

  • Christian Reuter (2015)
    Betriebliches Kontinuitätsmanagement in kleinen und mittleren Unternehmen – Smart Services für die Industrie 4.0
    Mensch und Computer – Workshopband .
    [BibTeX] [Abstract] [Download PDF]

    Betriebliches Kontinuitätsmanagement (Business Continuity Management, kurz: BCM) ist im Sinne des betrieblichen Notfallmanagements integraler Bestandteil ziviler Sicherheit. BCM ist laut ISO 22301 (2014) ein ganzheitlicher Managementprozess, der potenzielle Bedrohungen für Organisationen und deren Auswirkungen auf Geschäftsabläufe ermittelt. Bei Betrachtung der aktuellen Studienlage liegt der Schluss nahe, dass die Anwendung von BCM in kleinen und mittleren Unternehmen (KMU) unterrepräsentiert ist und der Sicherheitslevel teilweise im nicht-wirtschaftlichen Bereich liegt. Dieser Beitrag stellt den Einsatz von BCM in KMU vor und diskutiert diesbezügliche Forschungsergebnisse. Hierauf aufbauend wird eine Matrix zu möglichen Auswirkungen vs. Umfang und Qualität des Notfallmanagements verschiedener Akteure dargestellt. Abschließend werden leichtgewichtige und einfach zu handhabende BCM-Sicherheitslösungen, in Form von Smart Services, als möglicher Lösungsansatz für die vermehrt von kontinuierlichem IT-Einsatz abhängigen Industrie 4.0 vorgestellt.

    @inproceedings{reuter_betriebliches_2015,
    title = {Betriebliches {Kontinuitätsmanagement} in kleinen und mittleren {Unternehmen} – {Smart} {Services} für die {Industrie} 4.0},
    url = {https://www.wineme.uni-siegen.de/paper/2015/2015_reuter_bcminkmu_smartservicesindustrie40_muc.pdf},
    abstract = {Betriebliches Kontinuitätsmanagement (Business Continuity Management, kurz: BCM) ist im Sinne des betrieblichen Notfallmanagements integraler Bestandteil ziviler Sicherheit. BCM ist laut ISO 22301 (2014) ein ganzheitlicher Managementprozess, der potenzielle Bedrohungen für Organisationen und deren Auswirkungen auf Geschäftsabläufe ermittelt. Bei Betrachtung der aktuellen Studienlage liegt der Schluss nahe, dass die Anwendung von BCM in kleinen und mittleren Unternehmen (KMU) unterrepräsentiert ist und der Sicherheitslevel teilweise im nicht-wirtschaftlichen Bereich liegt. Dieser Beitrag stellt den Einsatz von BCM in KMU vor und diskutiert diesbezügliche Forschungsergebnisse. Hierauf aufbauend wird eine Matrix zu möglichen Auswirkungen vs. Umfang und Qualität des Notfallmanagements verschiedener Akteure dargestellt. Abschließend werden leichtgewichtige und einfach zu handhabende BCM-Sicherheitslösungen, in Form von Smart Services, als möglicher Lösungsansatz für die vermehrt von kontinuierlichem IT-Einsatz abhängigen Industrie 4.0 vorgestellt.},
    booktitle = {Mensch und {Computer} - {Workshopband}},
    publisher = {Oldenbourg-Verlag},
    author = {Reuter, Christian},
    editor = {Schmidt, Albrecht and Weisbecke, Anette and Burmester, Michael},
    year = {2015},
    keywords = {Projekt-EmerGent, UsableSec, Security, Projekt-KOKOS, Infrastructure},
    pages = {37--44},
    }

  • Christian Reuter, Thomas Ludwig, Marc-André Kaufhold, Volkmar Pipek (2015)
    XHELP: Design of a Cross-Platform Social-Media Application to Support Volunteer Moderators in Disasters
    Proceedings of the Conference on Human Factors in Computing Systems (CHI) Seoul, Korea. doi:10.1145/2702123.2702171
    [BibTeX] [Abstract] [Download PDF]

    Recent disasters have shown an increase in the significance of social media for both affected citizens and volunteers alike in the coordination of information and organization of relief activities, often independently of and in addition to the official emergency response. Existing research mainly focuses on the way in which individual platforms are used by volunteers in response to disasters. This paper examines the use of social media during the European Floods of 2013 and proposes a novel cross-social-media application for volunteers. Besides comprehensive analysis of volunteer communities, interviews were conducted with „digital volunteers“ such as Facebook moderators of disaster-related groups. Based on the challenges identified, we designed and implemented the cross-social-media application „XHELP“, which allows information to be both, acquired and distributed cross-media and cross-channel. The evaluation with 20 users leads to further design requirements for applications aiming to support volunteer moderators during disasters.

    @inproceedings{reuter_xhelp_2015,
    address = {Seoul, Korea},
    title = {{XHELP}: {Design} of a {Cross}-{Platform} {Social}-{Media} {Application} to {Support} {Volunteer} {Moderators} in {Disasters}},
    url = {http://www.peasec.de/paper/2015/2015_ReuterLudwigKaufholdPipek_XHELP_CHI.pdf},
    doi = {10.1145/2702123.2702171},
    abstract = {Recent disasters have shown an increase in the significance of social media for both affected citizens and volunteers alike in the coordination of information and organization of relief activities, often independently of and in addition to the official emergency response. Existing research mainly focuses on the way in which individual platforms are used by volunteers in response to disasters. This paper examines the use of social media during the European Floods of 2013 and proposes a novel cross-social-media application for volunteers. Besides comprehensive analysis of volunteer communities, interviews were conducted with "digital volunteers" such as Facebook moderators of disaster-related groups. Based on the challenges identified, we designed and implemented the cross-social-media application "XHELP", which allows information to be both, acquired and distributed cross-media and cross-channel. The evaluation with 20 users leads to further design requirements for applications aiming to support volunteer moderators during disasters.},
    booktitle = {Proceedings of the {Conference} on {Human} {Factors} in {Computing} {Systems} ({CHI})},
    publisher = {ACM Press},
    author = {Reuter, Christian and Ludwig, Thomas and Kaufhold, Marc-André and Pipek, Volkmar},
    year = {2015},
    keywords = {AuswahlCrisis, Cooperation, Crisis, HCI, Selected, SocialMedia, Projekt-EmerGent, A-Paper, Ranking-CORE-A*, Ranking-WKWI-A, AuswahlKaufhold},
    pages = {4093--4102},
    }

  • Christian Reuter (2015)
    Special Issue on Human Computer Interaction in Critical Systems II: Authorities and Industry – International Journal of Information Systems for Crisis Response and Management (IJISCRAM)
    IGI Global.
    [BibTeX] [Abstract] [Download PDF]

    Human computer interaction in security and time-critical systems is an interdisciplinary challenge at the seams of human factors, engineering, information systems and computer science. Application fields include control systems, critical infrastructures, vehicle and traffic management, production technology, business continuity management, medical technology, crisis management and civil protection. Nowadays in many areas mobile and ubiquitous computing as well as social media and collaborative technologies also plays an important role. The specific challenges require the discussion and development of new methods and approaches in order to design information systems. These are going to be addressed in this special issue with a particular focus on technologies for critical practices for authorities and industry.

    @book{reuter_special_2015-1,
    title = {Special {Issue} on {Human} {Computer} {Interaction} in {Critical} {Systems} {II}: {Authorities} and {Industry} - {International} {Journal} of {Information} {Systems} for {Crisis} {Response} and {Management} ({IJISCRAM})},
    volume = {7},
    url = {https://www.wineme.uni-siegen.de/paper/2015/2015_ijiscram-specialissue_hci-criticalsystems-ii.pdf},
    abstract = {Human computer interaction in security and time-critical systems is an interdisciplinary challenge at the seams of human factors, engineering, information systems and computer science. Application fields include control systems, critical infrastructures, vehicle and traffic management, production technology, business continuity management, medical technology, crisis management and civil protection. Nowadays in many areas mobile and ubiquitous computing as well as social media and collaborative technologies also plays an important role. The specific challenges require the discussion and development of new methods and approaches in order to design information systems. These are going to be addressed in this special issue with a particular focus on technologies for critical practices for authorities and industry.},
    number = {3},
    publisher = {IGI Global},
    author = {Reuter, Christian},
    year = {2015},
    note = {Publication Title: International Journal of Information Systems for Crisis Response and Management (IJISCRAM)},
    keywords = {HCI, SocialMedia, Projekt-EmerGent, Projekt-KOKOS},
    }

  • Christian Reuter, Tilo Mentler, Stefan Geisler (2015)
    Special Issue on Human Computer Interaction in Critical Systems I: Citizen and Volunteers – International Journal of Information Systems for Crisis Response and Management (IJISCRAM)
    IGI Global.
    [BibTeX] [Abstract] [Download PDF]

    Human computer interaction in security and time-critical systems is an interdisciplinary challenge at the seams of human factors, engineering, information systems and computer science. Application fields include control systems, critical infrastructures, vehicle and traffic management, production technology, business continuity management, medical technology, crisis management and civil protection. Nowadays in many areas mobile and ubiquitous computing as well as social media and collaborative technologies also plays an important role. The specific challenges require the discussion and development of new methods and approaches in order to design information systems. These are going to be addressed in this special issue with a particular focus on technologies for citizen and volunteers in emergencies.

    @book{reuter_special_2015,
    title = {Special {Issue} on {Human} {Computer} {Interaction} in {Critical} {Systems} {I}: {Citizen} and {Volunteers} - {International} {Journal} of {Information} {Systems} for {Crisis} {Response} and {Management} ({IJISCRAM})},
    volume = {7},
    url = {https://www.wineme.uni-siegen.de/paper/2015/2015_ijiscram-specialissue_hci-criticalsystems-i.pdf},
    abstract = {Human computer interaction in security and time-critical systems is an interdisciplinary challenge at the seams of human factors, engineering, information systems and computer science. Application fields include control systems, critical infrastructures, vehicle and traffic management, production technology, business continuity management, medical technology, crisis management and civil protection. Nowadays in many areas mobile and ubiquitous computing as well as social media and collaborative technologies also plays an important role. The specific challenges require the discussion and development of new methods and approaches in order to design information systems. These are going to be addressed in this special issue with a particular focus on technologies for citizen and volunteers in emergencies.},
    number = {2},
    publisher = {IGI Global},
    author = {Reuter, Christian and Mentler, Tilo and Geisler, Stefan},
    year = {2015},
    note = {Publication Title: International Journal of Information Systems for Crisis Response and Management (IJISCRAM)},
    keywords = {Crisis, HCI, SocialMedia, Projekt-EmerGent, Projekt-KOKOS},
    }

  • Christian Reuter, Thomas Ludwig, Therese Friberg, Sylvia Pratzler-Wanczura, Alexis Gizikis (2015)
    Social Media and Emergency Services? Interview Study on Current and Potential Use in 7 European Countries
    International Journal of Information Systems for Crisis Response and Management (IJISCRAM) ;7(2):36–58. doi:10.4018/IJISCRAM.2015040103
    [BibTeX] [Abstract] [Download PDF]

    Social media is much just used for private as well as business purposes, obviously, also during emergencies. Emergency services are often confronted with the amount of information from social media and might consider using them – or not using them. This article highlights the perception of emergency services on social media during emergencies. Within their European research project EMERGENT, the authors therefore conducted an interview study with emergency service staff (N=11) from seven European countries and eight different cities. Their results highlight the current and potential use of social media, the emergency service’s participation in research on social media as well as current challenges, benefits and future plans.

    @article{reuter_social_2015,
    title = {Social {Media} and {Emergency} {Services}? {Interview} {Study} on {Current} and {Potential} {Use} in 7 {European} {Countries}},
    volume = {7},
    url = {https://www.wineme.uni-siegen.de/paper/2015/2015_reuteretal_socialmediaemergencyservices-interview-study_ijiscram.pdf},
    doi = {10.4018/IJISCRAM.2015040103},
    abstract = {Social media is much just used for private as well as business purposes, obviously, also during emergencies. Emergency services are often confronted with the amount of information from social media and might consider using them – or not using them. This article highlights the perception of emergency services on social media during emergencies. Within their European research project EMERGENT, the authors therefore conducted an interview study with emergency service staff (N=11) from seven European countries and eight different cities. Their results highlight the current and potential use of social media, the emergency service's participation in research on social media as well as current challenges, benefits and future plans.},
    number = {2},
    journal = {International Journal of Information Systems for Crisis Response and Management (IJISCRAM)},
    author = {Reuter, Christian and Ludwig, Thomas and Friberg, Therese and Pratzler-Wanczura, Sylvia and Gizikis, Alexis},
    year = {2015},
    keywords = {Crisis, HCI, SocialMedia, Projekt-EmerGent},
    pages = {36--58},
    }

  • Christian Reuter, Thomas Ludwig, Michael Ritzkatis, Volkmar Pipek (2015)
    Social-QAS: Tailorable Quality Assessment Service for Social Media Content
    Proceedings of the International Symposium on End-User Development (IS-EUD). Lecture Notes in Computer Science . doi:10.1007/978-3-319-18425-8_11
    [BibTeX] [Abstract] [Download PDF]

    More than 3 billion people use the Internet, many of whom also use social media services such as the social network Facebook with about 1.35 billion active users monthly or the microblogging platform Twitter numbering approximately 284 million active users monthly. This paper researches how a tailorable quality assessment service can assist the use of citizen-generated content from social media. In particular, we want to study how users can articulate their personal quality criteria appropriately. A presentation of related work is followed by an empirical study on the use of social media in the field of emergency management, focusing on situation assessment practices by the emergency services. Based on this, we present the tailorable quality assessment service (QAS) for social media content, which has been implemented and integrated into an existing application for both volunteers and the emergency services.

    @inproceedings{reuter_social-qas_2015,
    title = {Social-{QAS}: {Tailorable} {Quality} {Assessment} {Service} for {Social} {Media} {Content}},
    url = {https://link.springer.com/chapter/10.1007%2F978-3-319-18425-8_11},
    doi = {10.1007/978-3-319-18425-8_11},
    abstract = {More than 3 billion people use the Internet, many of whom also use social media services such as the social network Facebook with about 1.35 billion active users monthly or the microblogging platform Twitter numbering approximately 284 million active users monthly. This paper researches how a tailorable quality assessment service can assist the use of citizen-generated content from social media. In particular, we want to study how users can articulate their personal quality criteria appropriately. A presentation of related work is followed by an empirical study on the use of social media in the field of emergency management, focusing on situation assessment practices by the emergency services. Based on this, we present the tailorable quality assessment service (QAS) for social media content, which has been implemented and integrated into an existing application for both volunteers and the emergency services.},
    booktitle = {Proceedings of the {International} {Symposium} on {End}-{User} {Development} ({IS}-{EUD}). {Lecture} {Notes} in {Computer} {Science}},
    author = {Reuter, Christian and Ludwig, Thomas and Ritzkatis, Michael and Pipek, Volkmar},
    year = {2015},
    keywords = {SocialMedia, Projekt-EmerGent},
    pages = {156--170},
    }

  • Christian Reuter, Tilo Mentler, Stefan Geisler (2015)
    Guest Editorial Preface: Special Issue on Human Computer Interaction in Critical Systems I: Citizen and Volunteers
    International Journal of Information Systems for Crisis Response and Management (IJISCRAM) ;7(2):i–ix.
    [BibTeX] [Abstract] [Download PDF]

    Human computer interaction in security and time-critical systems is an interdisciplinary challenge at the seams of human factors, engineering, information systems and computer science. Application fields include control systems, critical infrastructures, vehicle and traffic management, production technology, business continuity management, medical technology, crisis management and civil protection. Nowadays in many areas mobile and ubiquitous computing as well as social media and collaborative technologies also plays an important role. The specific challenges require the discussion and development of new methods and approaches in order to design information systems. These are going to be addressed in this special issue with a particular focus on technologies for citizen and volunteers in emergencies.

    @article{reuter_guest_2015-1,
    title = {Guest {Editorial} {Preface}: {Special} {Issue} on {Human} {Computer} {Interaction} in {Critical} {Systems} {I}: {Citizen} and {Volunteers}},
    volume = {7},
    url = {http://www.wineme.uni-siegen.de/paper/2015/2015_reuter_editorial-specialissue-hci-criticalsystems-i.pdf},
    abstract = {Human computer interaction in security and time-critical systems is an interdisciplinary challenge at the seams of human factors, engineering, information systems and computer science. Application fields include control systems, critical infrastructures, vehicle and traffic management, production technology, business continuity management, medical technology, crisis management and civil protection. Nowadays in many areas mobile and ubiquitous computing as well as social media and collaborative technologies also plays an important role. The specific challenges require the discussion and development of new methods and approaches in order to design information systems. These are going to be addressed in this special issue with a particular focus on technologies for citizen and volunteers in emergencies.},
    number = {2},
    journal = {International Journal of Information Systems for Crisis Response and Management (IJISCRAM)},
    author = {Reuter, Christian and Mentler, Tilo and Geisler, Stefan},
    year = {2015},
    keywords = {Crisis, HCI, SocialMedia, Projekt-EmerGent},
    pages = {i--ix},
    }

  • Thomas Ludwig, Christian Reuter, Volkmar Pipek (2015)
    Social Haystack: Dynamic Quality Assessment of Citizen-Generated Content during Emergencies
    ACM Transactions on Computer-Human Interaction (TOCHI) ;21(4):Article 17. doi:10.1145/2749461
    [BibTeX] [Abstract] [Download PDF]

    People all over the world are regularly affected by disasters and emergencies. Besides official emergency services, ordinary citizens are getting increasingly involved in crisis response work. They are usually present on-site at the place of incident and use social media to share information about the event. For emergency services, the large amount of citizen-generated content in social media, however, means that finding high-quality information is similar to “finding a needle in a haystack”. This article presents an approach to how a dynamic and subjective quality assessment of citizen-generated content could support the work of emergency services. First, we present results of our empirical study concerning the usage of citizen-generated content by emergency services. Based on our literature review and empirical study, we derive design guidelines and describe a concept for dynamic quality measurement that is implemented as a service-oriented web-application “Social Haystack.” Finally, we outline findings of its evaluation and implications thereof.

    @article{ludwig_social_2015,
    title = {Social {Haystack}: {Dynamic} {Quality} {Assessment} of {Citizen}-{Generated} {Content} during {Emergencies}},
    volume = {21},
    url = {https://www.wineme.uni-siegen.de/paper/2015/2015_ludwigreuterpipek_socialhaystack_tochi.pdf},
    doi = {10.1145/2749461},
    abstract = {People all over the world are regularly affected by disasters and emergencies. Besides official emergency services, ordinary citizens are getting increasingly involved in crisis response work. They are usually present on-site at the place of incident and use social media to share information about the event. For emergency services, the large amount of citizen-generated content in social media, however, means that finding high-quality information is similar to “finding a needle in a haystack”. This article presents an approach to how a dynamic and subjective quality assessment of citizen-generated content could support the work of emergency services. First, we present results of our empirical study concerning the usage of citizen-generated content by emergency services. Based on our literature review and empirical study, we derive design guidelines and describe a concept for dynamic quality measurement that is implemented as a service-oriented web-application “Social Haystack.” Finally, we outline findings of its evaluation and implications thereof.},
    number = {4},
    journal = {ACM Transactions on Computer-Human Interaction (TOCHI)},
    author = {Ludwig, Thomas and Reuter, Christian and Pipek, Volkmar},
    year = {2015},
    keywords = {Crisis, HCI, SocialMedia, Projekt-EmerGent, A-Paper, Ranking-CORE-A*, Ranking-ImpactFactor, Ranking-VHB-B, Ranking-WKWI-A},
    pages = {Article 17},
    }

  • Christian Reuter, Tilo Mentler, Stefan Geisler, Michael Herczeg, Thomas Ludwig, Volkmar Pipek, Simon Nestler, Johannes Sautter (2015)
    Proceedings des Workshops „Mensch-Computer-Interaktion und Social Computing in sicherheitskritischen Systemen“
    Mensch und Computer – Workshopband .
    [BibTeX] [Abstract] [Download PDF]

    Mensch-Maschine-Interaktion in sicherheitskritischen Systemen ist ein für die Informatik und die jeweiligen Anwendungsdomänen in der Bedeutung weiter zunehmendes Thema. Dieser Workshop der GI-Fachgruppe „Mensch-Maschine-Interaktion in sicherheitskritischen Systemen“ innerhalb des Fachbereichs Mensch-Computer-Interaktion soll aktuelle Entwicklungen und Fragestellungen offenlegen und neue Impulse für das Forschungsgebiet geben.

    @inproceedings{reuter_proceedings_2015,
    title = {Proceedings des {Workshops} "{Mensch}-{Computer}-{Interaktion} und {Social} {Computing} in sicherheitskritischen {Systemen}"},
    url = {https://peasec.de/paper/2015/2015_Reuteretal_Proc-KritischeMCI_MuC.pdf},
    abstract = {Mensch-Maschine-Interaktion in sicherheitskritischen Systemen ist ein für die Informatik und die jeweiligen Anwendungsdomänen in der Bedeutung weiter zunehmendes Thema. Dieser Workshop der GI-Fachgruppe „Mensch-Maschine-Interaktion in sicherheitskritischen Systemen“ innerhalb des Fachbereichs Mensch-Computer-Interaktion soll aktuelle Entwicklungen und Fragestellungen offenlegen und neue Impulse für das Forschungsgebiet geben.},
    booktitle = {Mensch und {Computer} - {Workshopband}},
    publisher = {Oldenbourg-Verlag},
    author = {Reuter, Christian and Mentler, Tilo and Geisler, Stefan and Herczeg, Michael and Ludwig, Thomas and Pipek, Volkmar and Nestler, Simon and Sautter, Johannes},
    editor = {Weisbecker, Anette and Burmester, Michael and Schmidt, Albrecht},
    year = {2015},
    keywords = {Crisis, HCI, SocialMedia, Projekt-EmerGent},
    }

  • Christian Reuter, Thomas Ludwig, Timo Funke, Volkmar Pipek (2015)
    SOMAP: Network Independent Social-Offline-Map-Mashup
    Proceedings of the Information Systems for Crisis Response and Management (ISCRAM) Kristiansand, Norway.
    [BibTeX] [Abstract] [Download PDF]

    Maps, showing the tactical or the administrative situation at any particular time, play a central role in disaster management. They can be realized as interactive map mashups. In addition to classical information (weather, water levels, energy network, forces), they can also be used to present a view on citizen-generated content, e.g. from social media. In this paper we offer insights into how mobile map mashups can assist citizens during infrastructure failures that often occur in large-scale emergencies. Based on a review of approaches and mobile applications from literature and especially from practice, we present SOMAP (social offline map), a mobile app we developed in Android. It offers offline map functionality in terms of (A) pro-active loading and storing of potentially needed maps of the respective area as well as (B) the possibility of exchanging information from social media using Bluetooth. The application was evaluated qualitatively, to gain insights into the potential of such applications.

    @inproceedings{reuter_somap_2015,
    address = {Kristiansand, Norway},
    title = {{SOMAP}: {Network} {Independent} {Social}-{Offline}-{Map}-{Mashup}},
    url = {https://www.wineme.uni-siegen.de/paper/2015/2015_reuterludwigfunkepipek_somap-socialofflinemap_iscram.pdf},
    abstract = {Maps, showing the tactical or the administrative situation at any particular time, play a central role in disaster management. They can be realized as interactive map mashups. In addition to classical information (weather, water levels, energy network, forces), they can also be used to present a view on citizen-generated content, e.g. from social media. In this paper we offer insights into how mobile map mashups can assist citizens during infrastructure failures that often occur in large-scale emergencies. Based on a review of approaches and mobile applications from literature and especially from practice, we present SOMAP (social offline map), a mobile app we developed in Android. It offers offline map functionality in terms of (A) pro-active loading and storing of potentially needed maps of the respective area as well as (B) the possibility of exchanging information from social media using Bluetooth. The application was evaluated qualitatively, to gain insights into the potential of such applications.},
    booktitle = {Proceedings of the {Information} {Systems} for {Crisis} {Response} and {Management} ({ISCRAM})},
    publisher = {ISCRAM},
    author = {Reuter, Christian and Ludwig, Thomas and Funke, Timo and Pipek, Volkmar},
    editor = {Palen, Leysia and Büscher, Monika and Comes, Tina and Hughes, Amanda Lee},
    year = {2015},
    keywords = {Cooperation, HCI, SocialMedia, Student, Projekt-EmerGent, UsableSec, Security, Infrastructure},
    }

  • Thomas Ludwig, Christian Reuter, Ralf Heukäufer (2015)
    CoTable: Collaborative Social Media Analysis with Multi-Touch Tables
    Proceedings of the Information Systems for Crisis Response and Management (ISCRAM) Kristiansand, Norway.
    [BibTeX] [Abstract] [Download PDF]

    To be able to take efficient measures in crisis management, it is essential for emergency services to get as much details about an actual situation on-site as possible. Currently content from social media plays an important role since those platforms are used to spread crisis-relevant data within the population. Our contribution presents a concept which supports the situation assessment practices of emergency services by collaboratively evaluating and by analyzing citizen-generated content from social media using a multi-touch table. The concept was implemented based on a Microsoft PixelSense and evaluated with 14 participants. The results reveal the impact of subjectivity of the participants, their positioning around the table as well as the uniqueness of social media posts on the collaborative situation assessment with multi-touch tables

    @inproceedings{ludwig_cotable_2015,
    address = {Kristiansand, Norway},
    title = {{CoTable}: {Collaborative} {Social} {Media} {Analysis} with {Multi}-{Touch} {Tables}},
    url = {https://www.wineme.uni-siegen.de/paper/2015/2015_ludwigreuterheukaeuferpipek_cotable_iscram.pdf},
    abstract = {To be able to take efficient measures in crisis management, it is essential for emergency services to get as much details about an actual situation on-site as possible. Currently content from social media plays an important role since those platforms are used to spread crisis-relevant data within the population. Our contribution presents a concept which supports the situation assessment practices of emergency services by collaboratively evaluating and by analyzing citizen-generated content from social media using a multi-touch table. The concept was implemented based on a Microsoft PixelSense and evaluated with 14 participants. The results reveal the impact of subjectivity of the participants, their positioning around the table as well as the uniqueness of social media posts on the collaborative situation assessment with multi-touch tables},
    booktitle = {Proceedings of the {Information} {Systems} for {Crisis} {Response} and {Management} ({ISCRAM})},
    publisher = {ISCRAM},
    author = {Ludwig, Thomas and Reuter, Christian and Heukäufer, Ralf},
    editor = {Palen, Leysia and Büscher, Monika and Comes, Tina and Hughes, Amanda Lee},
    year = {2015},
    keywords = {Cooperation, Crisis, HCI, SocialMedia, Student, Projekt-EmerGent},
    }

  • Christian Reuter (2015)
    Guest Editorial Preface: Special Issue on Human Computer Interaction in Critical Systems II: Authorities and Industry
    International Journal of Information Systems for Crisis Response and Management (IJISCRAM) ;7(3):iv–vi.
    [BibTeX] [Abstract] [Download PDF]

    Human computer interaction in security and time-critical systems is an interdisciplinary challenge at the seams of human factors, engineering, information systems and computer science. Application fields include control systems, critical infrastructures, vehicle and traffic management, production technology, business continuity management, medical technology, crisis management and civil protection. Nowadays in many areas mobile and ubiquitous computing as well as social media and collaborative technologies also plays an important role. The specific challenges require the discussion and development of new methods and approaches in order to design information systems. These are going to be addressed in this special issue with a particular focus on technologies for critical practices for authorities and industry.

    @article{reuter_guest_2015,
    title = {Guest {Editorial} {Preface}: {Special} {Issue} on {Human} {Computer} {Interaction} in {Critical} {Systems} {II}: {Authorities} and {Industry}},
    volume = {7},
    url = {http://www.wineme.uni-siegen.de/paper/2015/2015_reuter_editorial-specialissue-hci-criticalsystems-ii.pdf},
    abstract = {Human computer interaction in security and time-critical systems is an interdisciplinary challenge at the seams of human factors, engineering, information systems and computer science. Application fields include control systems, critical infrastructures, vehicle and traffic management, production technology, business continuity management, medical technology, crisis management and civil protection. Nowadays in many areas mobile and ubiquitous computing as well as social media and collaborative technologies also plays an important role. The specific challenges require the discussion and development of new methods and approaches in order to design information systems. These are going to be addressed in this special issue with a particular focus on technologies for critical practices for authorities and industry.},
    number = {3},
    journal = {International Journal of Information Systems for Crisis Response and Management (IJISCRAM)},
    author = {Reuter, Christian},
    year = {2015},
    keywords = {HCI, SocialMedia, Projekt-EmerGent},
    pages = {iv--vi},
    }

  • Christian Reuter, Tilo Mentler, Stefan Geisler, Michael Herczeg, Thomas Ludwig, Volkmar Pipek, Simon Nestler, Johannes Sautter (2015)
    Editorial: Mensch-Computer-Interaktion und Social Computing in sicherheitskritischen Systemen
    Mensch und Computer – Workshopband .
    [BibTeX] [Abstract] [Download PDF]

    Mensch-Maschine-Interaktion in sicherheitskritischen Systemen ist ein für die Informatik und die jeweiligen Anwendungsdomänen in der Bedeutung weiter zunehmendes Thema. Dieser Workshop der GI-Fachgruppe „Mensch-Maschine-Interaktion in sicherheitskritischen Systemen“ innerhalb des Fach-bereichs Mensch-Computer-Interaktion soll aktuelle Entwicklungen und Fragestellungen offenlegen und neue Impulse für das Forschungsgebiet geben.

    @inproceedings{reuter_editorial_2015,
    title = {Editorial: {Mensch}-{Computer}-{Interaktion} und {Social} {Computing} in sicherheitskritischen {Systemen}},
    url = {https://www.wineme.uni-siegen.de/paper/2015/2015_reuteretal_editorial-kritischehci_muc.pdf},
    abstract = {Mensch-Maschine-Interaktion in sicherheitskritischen Systemen ist ein für die Informatik und die jeweiligen Anwendungsdomänen in der Bedeutung weiter zunehmendes Thema. Dieser Workshop der GI-Fachgruppe „Mensch-Maschine-Interaktion in sicherheitskritischen Systemen“ innerhalb des Fach-bereichs Mensch-Computer-Interaktion soll aktuelle Entwicklungen und Fragestellungen offenlegen und neue Impulse für das Forschungsgebiet geben.},
    booktitle = {Mensch und {Computer} - {Workshopband}},
    publisher = {Oldenbourg-Verlag},
    author = {Reuter, Christian and Mentler, Tilo and Geisler, Stefan and Herczeg, Michael and Ludwig, Thomas and Pipek, Volkmar and Nestler, Simon and Sautter, Johannes},
    editor = {Schmidt, Albrecht and Weisbecke, Anette and Burmester, Michael},
    year = {2015},
    keywords = {Crisis, HCI, SocialMedia, Projekt-EmerGent},
    pages = {3--9},
    }

  • Christian Reuter (2015)
    Der Einsatz sozialer Medien in Katastrophenlagen
    Crisis Prevention – Fachmagazin für Innere Sicherheit, Bevölkerungsschutz und Katastrophenhilfe ;5(4):43–44.
    [BibTeX] [Abstract] [Download PDF]

    Der umfassende Einsatz sozialer Medien in Katastrophenlagen wurde in Deutschland erstmalig während des mitteleuropäischen Hochwassers im Frühjahr 2013 von einer breiten Öffentlichkeit wahrgenommen. Über Twitter, Facebook, Google Maps und weitere Plattformen koordinierten betroffene Bürger und freiwillige Helfer untereinander Hilfsaktivitäten und unterstützten den Katastrophenschutz. Zahlreiche Medien berichteten über dieses Phänomen. Dieser Artikel soll einen kleinen Überblick über das Thema geben.

    @article{reuter_einsatz_2015,
    title = {Der {Einsatz} sozialer {Medien} in {Katastrophenlagen}},
    volume = {5},
    url = {https://www.wineme.uni-siegen.de/paper/2015/2015_reuter_dereinsatzsozialermedieninkatastrophenlagen_crisisprevention.pdf},
    abstract = {Der umfassende Einsatz sozialer Medien in Katastrophenlagen wurde in Deutschland erstmalig während des mitteleuropäischen Hochwassers im Frühjahr 2013 von einer breiten Öffentlichkeit wahrgenommen. Über Twitter, Facebook, Google Maps und weitere Plattformen koordinierten betroffene Bürger und freiwillige Helfer untereinander Hilfsaktivitäten und unterstützten den Katastrophenschutz. Zahlreiche Medien berichteten über dieses Phänomen. Dieser Artikel soll einen kleinen Überblick über das Thema geben.},
    number = {4},
    journal = {Crisis Prevention – Fachmagazin für Innere Sicherheit, Bevölkerungsschutz und Katastrophenhilfe},
    author = {Reuter, Christian},
    year = {2015},
    keywords = {Crisis, HCI, SocialMedia, Projekt-EmerGent, Projekt-KOKOS},
    pages = {43--44},
    }

  • Thomas Ludwig, Christian Reuter, Tim Siebigteroth, Volkmar Pipek (2015)
    CrowdMonitor: Mobile Crowd Sensing for Assessing Physical and Digital Activities of Citizens during Emergencies
    Proceedings of the Conference on Human Factors in Computing Systems (CHI) New York, USA.
    [BibTeX] [Abstract] [Download PDF]

    Emergencies such as the 2013 Central European flood or the 2013 typhoon Haiyan in Philippines have shown how citizens can organize themselves and coordinate private relief activities. These activities can be found in (physical) groups of affected people, but also within (digital) social media communities. There is an evident need, however, for a clearer picture of what exactly is going on to be available for use by the official emergency services: to enlist them, to keep them safe, to support their efforts and to avoid need-less duplications or conflicts. Aligning emergency services and volunteer activities is, then, crucial. In this paper we present a mobile crowd sensing based concept, which was designed as well as implemented as the application CrowdMonitor and facilitates the detection of physical and digital activities and the assignment of specific tasks to citizens. Finally, we outline the findings of its evaluation.

    @inproceedings{ludwig_crowdmonitor_2015,
    address = {New York, USA},
    title = {{CrowdMonitor}: {Mobile} {Crowd} {Sensing} for {Assessing} {Physical} and {Digital} {Activities} of {Citizens} during {Emergencies}},
    url = {https://www.wineme.uni-siegen.de/paper/2015/2015_ludwigreutersiebigterothpipek_crowdmonitor_chi.pdf},
    abstract = {Emergencies such as the 2013 Central European flood or the 2013 typhoon Haiyan in Philippines have shown how citizens can organize themselves and coordinate private relief activities. These activities can be found in (physical) groups of affected people, but also within (digital) social media communities. There is an evident need, however, for a clearer picture of what exactly is going on to be available for use by the official emergency services: to enlist them, to keep them safe, to support their efforts and to avoid need-less duplications or conflicts. Aligning emergency services and volunteer activities is, then, crucial. In this paper we present a mobile crowd sensing based concept, which was designed as well as implemented as the application CrowdMonitor and facilitates the detection of physical and digital activities and the assignment of specific tasks to citizens. Finally, we outline the findings of its evaluation.},
    booktitle = {Proceedings of the {Conference} on {Human} {Factors} in {Computing} {Systems} ({CHI})},
    publisher = {ACM Press},
    author = {Ludwig, Thomas and Reuter, Christian and Siebigteroth, Tim and Pipek, Volkmar},
    editor = {Begole, Bo and Jinwoo, Kim and Kor, Inkpeni and Woontack, Woo},
    year = {2015},
    keywords = {Cooperation, Crisis, HCI, Student, Projekt-EmerGent, A-Paper, Ranking-CORE-A*, Ranking-WKWI-A},
    pages = {4083--4092},
    }

  • Matthias Moi, Therese Friberg, Robin Marterer, Christian Reuter, Thomas Ludwig, Deborah Markham, Mike Hewlett, Andrew Muddiman (2015)
    Strategy for Processing and Analyzing Social Media Data Streams in Emergencies
    Proceedings of the International Conference on Information and Communication Technologies for Disaster Management (ICT-DM) Brest, France.
    [BibTeX] [Abstract] [Download PDF]

    People are using social media to a greater extent, particularly in emergency situations. However, approaches for processing and analyzing the vast quantities of data produced currently lag far behind. In this paper we discuss important steps, and the associated challenges, for processing and analyzing social media in emergencies. In our research project EmerGent, a huge volume of low-quality messages will be continuously gathered from a variety of social media services such as Facebook or Twitter. Our aim is to design a software system that will process and analyze social media data, transforming the high volume of noisy data into a low volume of rich content that is useful to emergency personnel. Therefore, suitable techniques are needed to extract and condense key information from raw social media data, allowing detection of relevant events and generation of alerts pertinent to emergency personnel.

    @inproceedings{moi_strategy_2015,
    address = {Brest, France},
    title = {Strategy for {Processing} and {Analyzing} {Social} {Media} {Data} {Streams} in {Emergencies}},
    url = {https://ieeexplore.ieee.org/abstract/document/7402055},
    abstract = {People are using social media to a greater extent, particularly in emergency situations. However, approaches for processing and analyzing the vast quantities of data produced currently lag far behind. In this paper we discuss important steps, and the associated challenges, for processing and analyzing social media in emergencies. In our research project EmerGent, a huge volume of low-quality messages will be continuously gathered from a variety of social media services such as Facebook or Twitter. Our aim is to design a software system that will process and analyze social media data, transforming the high volume of noisy data into a low volume of rich content that is useful to emergency personnel. Therefore, suitable techniques are needed to extract and condense key information from raw social media data, allowing detection of relevant events and generation of alerts pertinent to emergency personnel.},
    booktitle = {Proceedings of the {International} {Conference} on {Information} and {Communication} {Technologies} for {Disaster} {Management} ({ICT}-{DM})},
    author = {Moi, Matthias and Friberg, Therese and Marterer, Robin and Reuter, Christian and Ludwig, Thomas and Markham, Deborah and Hewlett, Mike and Muddiman, Andrew},
    year = {2015},
    keywords = {Crisis, SocialMedia, Projekt-EmerGent},
    pages = {1--7},
    }

  • Marc-André Kaufhold, Christian Reuter (2015)
    Konzept und Evaluation einer Facebook-Applikation zur crossmedialen Selbstorganisation freiwilliger Helfer
    Proceedings of the International Conference on Wirtschaftsinformatik (WI) (Best Paper Award Nominee) Osnabrück, Germany.
    [BibTeX] [Abstract] [Download PDF]

    Das mitteleuropäische Hochwasser 2013 sorgte für große Schäden in weiten Teilen Deutschlands. Währenddessen und in der anschließenden Wiederherstellungsphase koordinierten betroffene und nicht betroffene Bürger ihre Hilfsaktivitäten nicht nur vor Ort, sondern auch in sozialen Medien wie Twitter, Facebook und mit Tools wie Google Maps. Basierend auf einer Vorstudie zu den Aktivitäten in Twitter und Facebook sowie Interviews mit „Digital Volunteers“ (hier: Gründer und Moderatoren von Facebook-Gruppen zum Hochwasser) stellt dieser Beitrag eine als Facebook-App realisierte crossmediale Applikation zur gruppen- und plattformübergreifenden Informationsbeschaffung und -Veröffentlichung vor, die der (Selbst-)Koordination ungebundener Helfer dienen soll. Diese wurde mit 20 Nutzern qualitativ evaluiert und zeigt Implikationen für die technische Unterstützung der Partizipation Freiwilliger in Katastrophenlagen auf.

    @inproceedings{kaufhold_konzept_2015,
    address = {Osnabrück, Germany},
    title = {Konzept und {Evaluation} einer {Facebook}-{Applikation} zur crossmedialen {Selbstorganisation} freiwilliger {Helfer}},
    url = {https://peasec.de/paper/2015/2015_KaufholdReuter_CrossmedialeSelbstorganisation_WI.pdf},
    abstract = {Das mitteleuropäische Hochwasser 2013 sorgte für große Schäden in weiten Teilen Deutschlands. Währenddessen und in der anschließenden Wiederherstellungsphase koordinierten betroffene und nicht betroffene Bürger ihre Hilfsaktivitäten nicht nur vor Ort, sondern auch in sozialen Medien wie Twitter, Facebook und mit Tools wie Google Maps. Basierend auf einer Vorstudie zu den Aktivitäten in Twitter und Facebook sowie Interviews mit „Digital Volunteers“ (hier: Gründer und Moderatoren von Facebook-Gruppen zum Hochwasser) stellt dieser Beitrag eine als Facebook-App realisierte crossmediale Applikation zur gruppen- und plattformübergreifenden Informationsbeschaffung und -Veröffentlichung vor, die der (Selbst-)Koordination ungebundener Helfer dienen soll. Diese wurde mit 20 Nutzern qualitativ evaluiert und zeigt Implikationen für die technische Unterstützung der Partizipation Freiwilliger in Katastrophenlagen auf.},
    booktitle = {Proceedings of the {International} {Conference} on {Wirtschaftsinformatik} ({WI}) ({Best} {Paper} {Award} {Nominee})},
    publisher = {AIS},
    author = {Kaufhold, Marc-André and Reuter, Christian},
    year = {2015},
    keywords = {Cooperation, Crisis, HCI, SocialMedia, Projekt-EmerGent, Ranking-CORE-C, Ranking-VHB-C, Ranking-WKWI-A},
    pages = {1844--1858},
    }

    2014

  • Christian Reuter, Michael Ritzkatis, Thomas Ludwig (2014)
    Entwicklung eines SOA-basierten und anpassbaren Bewertungsdienstes für Inhalte aus sozialen Medien
    Informatik 2014 – Big Data – Komplexität meistern Stuttgart, Germany.
    [BibTeX] [Abstract] [Download PDF]

    Dieser Beitrag soll aufzeigen, wie ein anpassbarer Bewertungsdienst die Nutzung bürgergenerierter Inhalte aus sozialen Medien unterstützen kann. Dabei soll insbesondere geklärt werden, wie dieser gestaltet werden kann und wie Nutzer die Qualitätskriterien angemessen artikulieren können. Nach einer Darstellung von Grundlagen und verwandten Arbeiten wird anhand einer empirischen Vorstudie der Umgang von Behörden und Organisationen mit Sicherheitsaufgaben (BOS) mit bürgergenerierten Informationen betrachtet. Basierend auf den dort gewonnen Erkenntnissen wurde ein service-orientierter Bewertungsdienst entwickelt und in eine Anwendung integriert, welche so den Zugang zu bürgergenerierten Informationen aus verschiedenen sozialen Medien inklusive einer anpassbaren Qualitätsbewertung ermöglicht. Eine abschließende Evaluation illustriert deren mögliche Anwendung in der Praxis.

    @inproceedings{reuter_entwicklung_2014,
    address = {Stuttgart, Germany},
    title = {Entwicklung eines {SOA}-basierten und anpassbaren {Bewertungsdienstes} für {Inhalte} aus sozialen {Medien}},
    url = {https://www.wineme.uni-siegen.de/paper/2014/2014_reuterritzkatisludwig-soabewertungsozialemedien_inf.pdf},
    abstract = {Dieser Beitrag soll aufzeigen, wie ein anpassbarer Bewertungsdienst die Nutzung bürgergenerierter Inhalte aus sozialen Medien unterstützen kann. Dabei soll insbesondere geklärt werden, wie dieser gestaltet werden kann und wie Nutzer die Qualitätskriterien angemessen artikulieren können. Nach einer Darstellung von Grundlagen und verwandten Arbeiten wird anhand einer empirischen Vorstudie der Umgang von Behörden und Organisationen mit Sicherheitsaufgaben (BOS) mit bürgergenerierten Informationen betrachtet. Basierend auf den dort gewonnen Erkenntnissen wurde ein service-orientierter Bewertungsdienst entwickelt und in eine Anwendung integriert, welche so den Zugang zu bürgergenerierten Informationen aus verschiedenen sozialen Medien inklusive einer anpassbaren Qualitätsbewertung ermöglicht. Eine abschließende Evaluation illustriert deren mögliche Anwendung in der Praxis.},
    booktitle = {Informatik 2014 - {Big} {Data} - {Komplexität} meistern},
    publisher = {GI-Edition-Lecture Notes in Informatics (LNI)},
    author = {Reuter, Christian and Ritzkatis, Michael and Ludwig, Thomas},
    editor = {Plöderereder, E. and Grunske, L. and Schneider, E. and Ull, D.},
    year = {2014},
    keywords = {Crisis, HCI, SocialMedia, Projekt-EmerGent, Ranking-CORE-C, Ranking-VHB-C, UsableSec},
    pages = {977--988},
    }

  • Christian Reuter, Michael Ritzkatis (2014)
    Adaptierbare Bewertung bürgergenerierter Inhalte aus sozialen Medien
    Mensch & Computer: Interaktiv unterwegs – Freiräume gestalten München, Germany.
    [BibTeX] [Abstract] [Download PDF]

    Zwei Drittel aller Internetnutzer in Deutschland nutzen soziale Medien. Neben der Kommunikation mit eigenen Kontakten werden dort auch vermehrt Fotos, Filme und Inhalte ganz bewusst öffentlich geteilt. Vergangene Ereignisse, wie das Hochwasser in Mitteleuropa im Juni 2013, haben gezeigt, dass diese alltäglichen Verhaltensweisen ebenso in Ausnahmesituationen fortgeführt werden und bürgergenierte Inhalte auch dann beispielsweise über Facebook und Twitter verbreitet werden. Diese werden in Teilen von Behörden und Organisationen mit Sicherheitsaufgaben (BOS), wie der Polizei und Feuerwehr, ausgewertet und für die Lagebeurteilung genutzt. Dieser Beitrag stellt, basierend auf einer Analyse verwandter Arbeiten, die Ergebnisse einer empirischen Untersuchung zur Nutzung bürgergenerierter Inhalte und die Bedingungen für deren Integration in die Lagebeurteilung durch BOS dar. Die hieraus gewonnenen Erkenntnisse münden in Anforderungen an einen adaptierbaren Bewertungsmechanismus für bürgergenerierte Inhalte aus sozialen Medien.

    @inproceedings{reuter_adaptierbare_2014,
    address = {München, Germany},
    title = {Adaptierbare {Bewertung} bürgergenerierter {Inhalte} aus sozialen {Medien}},
    url = {https://dl.gi.de/bitstream/handle/20.500.12116/7536/Reuter_Ritzkatis_2014.pdf},
    abstract = {Zwei Drittel aller Internetnutzer in Deutschland nutzen soziale Medien. Neben der Kommunikation mit eigenen Kontakten werden dort auch vermehrt Fotos, Filme und Inhalte ganz bewusst öffentlich geteilt. Vergangene Ereignisse, wie das Hochwasser in Mitteleuropa im Juni 2013, haben gezeigt, dass diese alltäglichen Verhaltensweisen ebenso in Ausnahmesituationen fortgeführt werden und bürgergenierte Inhalte auch dann beispielsweise über Facebook und Twitter verbreitet werden. Diese werden in Teilen von Behörden und Organisationen mit Sicherheitsaufgaben (BOS), wie der Polizei und Feuerwehr, ausgewertet und für die Lagebeurteilung genutzt. Dieser Beitrag stellt, basierend auf einer Analyse verwandter Arbeiten, die Ergebnisse einer empirischen Untersuchung zur Nutzung bürgergenerierter Inhalte und die Bedingungen für deren Integration in die Lagebeurteilung durch BOS dar. Die hieraus gewonnenen Erkenntnisse münden in Anforderungen an einen adaptierbaren Bewertungsmechanismus für bürgergenerierte Inhalte aus sozialen Medien.},
    booktitle = {Mensch \& {Computer}: {Interaktiv} unterwegs – {Freiräume} gestalten},
    publisher = {Oldenbourg-Verlag},
    author = {Reuter, Christian and Ritzkatis, Michael},
    editor = {Koch, Michael and Butz, Andreas and Schlichter, Johann},
    year = {2014},
    keywords = {Crisis, HCI, SocialMedia, Student, Projekt-EmerGent},
    pages = {115--124},
    }

  • Volkmar Pipek, Christian Reuter (2014)
    Forschungsherausforderungen der Interaktion und Kooperation im Krisenmanagement
    i-com – Zeitschrift für interaktive und kooperative Medien ;13(1):1–3.
    [BibTeX] [Download PDF]

    @article{pipek_forschungsherausforderungen_2014,
    title = {Forschungsherausforderungen der {Interaktion} und {Kooperation} im {Krisenmanagement}},
    volume = {13},
    url = {https://www.wineme.uni-siegen.de/paper/2014/2014_pipekreuter_forschungsherausforderungenkrisen_icom.pdf},
    number = {1},
    journal = {i-com - Zeitschrift für interaktive und kooperative Medien},
    author = {Pipek, Volkmar and Reuter, Christian},
    year = {2014},
    keywords = {Cooperation, HCI, Projekt-EmerGent},
    pages = {1--3},
    }

  • Marc-André Kaufhold, Christian Reuter (2014)
    Vernetzte Selbsthilfe in Sozialen Medien am Beispiel des Hochwassers 2013 / Linked Self-Help in Social Media using the example of the Floods 2013 in Germany
    i-com – Zeitschrift für interaktive und kooperative Medien ;13(1):20–28. doi:https://doi.org/10.1515/icom-2014-0004
    [BibTeX] [Abstract] [Download PDF]

    Dieser Artikel untersucht den Einsatz sozialer Medien während des Hochwassers 2013 in Deutschland. Über Twitter, Facebook, Google Maps und auf weiteren Plattformen koordinierten betroffene Bürger und freiwillige Helfer untereinander Hilfsaktivitäten und lieferten dabei einen ergänzenden und signifikanten Beitrag zum offiziellen Katastrophenschutz. Neben der qualitativen Analyse ausgewählter, entstandener Hilfsnetzwerke wurden zusätzlich Interviews mit Facebook-Gruppengründern geführt. Die Ziele dieser Studie liegen zum einen in der Analyse des Benutzungsverhaltens sozialer Medien in Katastrophenlagen, zum anderen in der Identifikation von Gestaltungs- und Erweiterungspotenzialen für soziale Medien im Katastrophenschutz.

    @article{kaufhold_vernetzte_2014,
    title = {Vernetzte {Selbsthilfe} in {Sozialen} {Medien} am {Beispiel} des {Hochwassers} 2013 / {Linked} {Self}-{Help} in {Social} {Media} using the example of the {Floods} 2013 in {Germany}},
    volume = {13},
    url = {https://www.wineme.uni-siegen.de/paper/2014/2014_kaufholdreuter_vernetzteselbsthilfehochwasser_icom.pdf},
    doi = {https://doi.org/10.1515/icom-2014-0004},
    abstract = {Dieser Artikel untersucht den Einsatz sozialer Medien während des Hochwassers 2013 in Deutschland. Über Twitter, Facebook, Google Maps und auf weiteren Plattformen koordinierten betroffene Bürger und freiwillige Helfer untereinander Hilfsaktivitäten und lieferten dabei einen ergänzenden und signifikanten Beitrag zum offiziellen Katastrophenschutz. Neben der qualitativen Analyse ausgewählter, entstandener Hilfsnetzwerke wurden zusätzlich Interviews mit Facebook-Gruppengründern geführt. Die Ziele dieser Studie liegen zum einen in der Analyse des Benutzungsverhaltens sozialer Medien in Katastrophenlagen, zum anderen in der Identifikation von Gestaltungs- und Erweiterungspotenzialen für soziale Medien im Katastrophenschutz.},
    number = {1},
    journal = {i-com - Zeitschrift für interaktive und kooperative Medien},
    author = {Kaufhold, Marc-André and Reuter, Christian},
    editor = {Pipek, Volkmar and Reuter, Christian},
    year = {2014},
    keywords = {Cooperation, Crisis, HCI, SocialMedia, Projekt-EmerGent},
    pages = {20--28},
    }

  • Reynold Greenlaw, Andrew Muddiman, Therese Friberg, Matthias Moi, Massimo Cristaldi, Thomas Ludwig, Christian Reuter (2014)
    The EmerGent project: Emergency Management in Social Media Generation – Dealing with Big Data from Social Media Data Stream
    Workshop on Big Data, Intelligence Management and Analytics Workshop. 7th IEEE/ACM International Conference on Utility and Cloud Computing (UCC) London, United Kingdom. doi:10.1109/UCC.2014.111
    [BibTeX] [Abstract] [Download PDF]

    This paper describes EmerGent which is a new EU FP7 project currently engaging with users, gathering requirements and writing initial technical specifications and deals with the impact of social media in emergency management. This paper describes the overall objectives of the project and the plans to create an online big data semantic store of social media will be outlined.

    @inproceedings{greenlaw_emergent_2014,
    address = {London, United Kingdom},
    title = {The {EmerGent} project: {Emergency} {Management} in {Social} {Media} {Generation} – {Dealing} with {Big} {Data} from {Social} {Media} {Data} {Stream}},
    url = {https://www.wineme.uni-siegen.de/paper/2014/2014_emergentbigdata_ucc.pdf},
    doi = {10.1109/UCC.2014.111},
    abstract = {This paper describes EmerGent which is a new EU FP7 project currently engaging with users, gathering requirements and writing initial technical specifications and deals with the impact of social media in emergency management. This paper describes the overall objectives of the project and the plans to create an online big data semantic store of social media will be outlined.},
    booktitle = {Workshop on {Big} {Data}, {Intelligence} {Management} and {Analytics} {Workshop}. 7th {IEEE}/{ACM} {International} {Conference} on {Utility} and {Cloud} {Computing} ({UCC})},
    author = {Greenlaw, Reynold and Muddiman, Andrew and Friberg, Therese and Moi, Matthias and Cristaldi, Massimo and Ludwig, Thomas and Reuter, Christian},
    year = {2014},
    keywords = {Crisis, HCI, SocialMedia, Projekt-EmerGent},
    pages = {687--689},
    }

  • Christian Reuter (2014)
    Emergent Collaboration Infrastructures: Technology Design for Inter-Organizational Crisis Management (Ph.D. Thesis)
    University of Siegen, Institute for Information Systems, Germany: Springer Gabler. doi:10.1007/978-3-658-08586-5
    [BibTeX] [Abstract] [Download PDF]

    Using the domain of crisis management, Christian Reuter explores challenges and opportunities for technology design in emergent environments. He therefore empirically analyzes collaborative work in inter-organizational crisis – such as the police, fire departments, energy network operators and citizens – in order to identify collaboration practices that reveal work infrastructure limitations. He also designs, implements and evaluates novel concepts and ICT artifacts towards the support of emergent collaboration. Besides the discovery of potential organizational effects on the ability to deal with emergence he presents methodological implications for technology design.

    @book{reuter_emergent_2014,
    address = {University of Siegen, Institute for Information Systems, Germany},
    title = {Emergent {Collaboration} {Infrastructures}: {Technology} {Design} for {Inter}-{Organizational} {Crisis} {Management} ({Ph}.{D}. {Thesis})},
    isbn = {978-3-658-08585-8},
    url = {http://www.springer.com/springer+gabler/bwl/wirtschaftsinformatik/book/978-3-658-08585-8},
    abstract = {Using the domain of crisis management, Christian Reuter explores challenges and opportunities for technology design in emergent environments. He therefore empirically analyzes collaborative work in inter-organizational crisis – such as the police, fire departments, energy network operators and citizens – in order to identify collaboration practices that reveal work infrastructure limitations. He also designs, implements and evaluates novel concepts and ICT artifacts towards the support of emergent collaboration. Besides the discovery of potential organizational effects on the ability to deal with emergence he presents methodological implications for technology design.},
    publisher = {Springer Gabler},
    author = {Reuter, Christian},
    year = {2014},
    doi = {10.1007/978-3-658-08586-5},
    note = {Backup Publisher: University of Siegen},
    keywords = {HCI, Projekt-InfoStrom, Selected, SocialMedia, Projekt-EmerGent, UsableSec, Infrastructure, AuswahlUsableSec, Dissertation},
    }

  • Christian Reuter, Thomas Ludwig, Volkmar Pipek, Michael Herczeg, Tilo Mentler, Simon Nestler, Johannes Sautter (2014)
    Editorial: Mensch-Computer-Interaktion und Social Computing in Krisensituationen
    Mensch und Computer – Workshopband München, Germany.
    [BibTeX] [Abstract] [Download PDF]

    Die Mensch-Computer-Interaktion und Social Computing in Krisensituationen wird auch in Zukunft eine große Rolle spielen. Mit diesem Workshop möchten wir einen kleinen Beitrag leisten, diese Entwicklung in sinnvoller Weise mitzugestalten.

    @inproceedings{reuter_editorial_2014,
    address = {München, Germany},
    title = {Editorial: {Mensch}-{Computer}-{Interaktion} und {Social} {Computing} in {Krisensituationen}},
    url = {https://www.wineme.uni-siegen.de/paper/2014/2014_reuteretal_mci-krisen-editorial_muc.pdf},
    abstract = {Die Mensch-Computer-Interaktion und Social Computing in Krisensituationen wird auch in Zukunft eine große Rolle spielen. Mit diesem Workshop möchten wir einen kleinen Beitrag leisten, diese Entwicklung in sinnvoller Weise mitzugestalten.},
    booktitle = {Mensch und {Computer} - {Workshopband}},
    publisher = {Oldenbourg-Verlag},
    author = {Reuter, Christian and Ludwig, Thomas and Pipek, Volkmar and Herczeg, Michael and Mentler, Tilo and Nestler, Simon and Sautter, Johannes},
    editor = {Koch, Michael and Butz, Andreas and Schlichter, Johann},
    year = {2014},
    keywords = {Crisis, HCI, Projekt-EmerGent},
    pages = {101--104},
    }

  • Christian Reuter, Thomas Ludwig, Volkmar Pipek, Michael Herczeg, Tilo Mentler, Simon Nestler, Johannes Sautter (2014)
    Proceedings des Workshops „Mensch-Computer-Interaktion und Social Computing in Krisensituationen“
    Mensch und Computer – Workshopband München, Germany.
    [BibTeX] [Abstract] [Download PDF]

    Mensch-Computer-Interaktion und Social Computing spielen auch in Krisensituationen eine große Rolle. Durch die größere Verbreitung mobiler und ubiquitärer Technologien sowie die zunehmende Durchdringung sozialer und kooperativer Medien im Alltag haben sich auch im Bereich des Krisenmanagements und der zivilen Sicherheitsforschung neue Möglichkeiten und Potenziale, aber auch Problembereiche entwickelt, die besonderer Aufmerksamkeit bedürfen. Neue Ansätze und Prototypen adressieren Interaktionen und Kooperationen innerhalb und zwischen klassischen Behörden und Organisationen mit Sicherheitsaufgaben (BOS), aber zunehmend auch die Einbeziehung der von der Krise betroffenen Akteure aus den Bereichen der Industrie und der Bürger, die eine Rolle als aktive Krisenmanager wahrnehmen und BOS unterstützen.

    @inproceedings{reuter_proceedings_2014,
    address = {München, Germany},
    title = {Proceedings des {Workshops} "{Mensch}-{Computer}-{Interaktion} und {Social} {Computing} in {Krisensituationen}"},
    url = {https://peasec.de/paper/2014/2014_Reuteretal_Eds_KrisenMCI_MuC.pdf},
    abstract = {Mensch-Computer-Interaktion und Social Computing spielen auch in Krisensituationen eine große Rolle. Durch die größere Verbreitung mobiler und ubiquitärer Technologien sowie die zunehmende Durchdringung sozialer und kooperativer Medien im Alltag haben sich auch im Bereich des Krisenmanagements und der zivilen Sicherheitsforschung neue Möglichkeiten und Potenziale, aber auch Problembereiche entwickelt, die besonderer Aufmerksamkeit bedürfen. Neue Ansätze und Prototypen adressieren Interaktionen und Kooperationen innerhalb und zwischen klassischen Behörden und Organisationen mit Sicherheitsaufgaben (BOS), aber zunehmend auch die Einbeziehung der von der Krise betroffenen Akteure aus den Bereichen der Industrie und der Bürger, die eine Rolle als aktive Krisenmanager wahrnehmen und BOS unterstützen.},
    booktitle = {Mensch und {Computer} - {Workshopband}},
    publisher = {Oldenbourg-Verlag},
    author = {Reuter, Christian and Ludwig, Thomas and Pipek, Volkmar and Herczeg, Michael and Mentler, Tilo and Nestler, Simon and Sautter, Johannes},
    editor = {Koch, Michael and Butz, Andreas and Schlichter, Johann},
    year = {2014},
    keywords = {Crisis, HCI, SocialMedia, Projekt-EmerGent},
    pages = {99--140},
    }

  • Christian Reuter (2014)
    Emergent Collaboration Infrastructures: Technology Design for Inter-Organizational Crisis Management (Ph.D. Thesis)
    University of Siegen, Institute for Information Systems, Germany: Universitätsbibliothek Siegen.
    [BibTeX] [Abstract] [Download PDF]

    The complexity and interconnectedness of current working environments encourages organizations, businesses and individuals to collaborate beyond spatial, temporal as well as organizational boundaries. These collaborations are potentially supported by information and communication technology (ICT) among mobile and ubiquitous systems. The academic field Computer-Supported Cooperative Work (CSCW) is primarily recognized for focusing on ICT support for collaboration practices as opposed to the computerizing of formal procedures. ICT, in this view, needs to reflect the dynamic nature of cooperation and collaboration. The notion emergence as coined by Lewes (1875) and interpreted by Goldstein (1999) refers to dynamic contexts that cannot be anticipated in their full extent before they actually occur. Emergent collaboration refers to the need for spontaneous collaboration in novel and changing structures and occurs in application fields such as inter-organizational crisis and emergency management, which by definition contain the unforeseeable. This dissertation contributes to research into infrastructures for emergent collaboration. Using the example of crisis management, it addresses (1) emergent collaboration practices and how they reveal work infrastructure limitations, (2) novel concepts and artifacts to support emergent collaboration, (3) their effects on the ability to deal with emergent situations and (4) methodological implications for technology design for emergent collaboration infrastructures in inter-organizational settings. Design case studies (Wulf et al., 2011), inspired by action research (Lewin, 1958) and following Hevner and Chatterjee’s suggestion (2010) to integrate action research with design research, are applied as a practice oriented research method. They contain three phases: an empirical analysis of the practices in the field, the development of innovative ICT artifacts with continuous participation of end-users related to the empirical findings and the evaluation of their appropriation (Pipek, 2005) in practice. In the case reported here, the empirical study on emergent collaboration by police and fire services, aid agencies, energy network operators and citizens in emergencies in two counties in Germany outlined the importance of improvisation work in situation assessment as well as mobile collaboration and reporting practices. The ICT design aimed towards the support of these emergent practices, illustrated by various concepts and prototypes. They comprise (1) an inter-organizational social network for emergency management (SiRena), (2) an inter-organizational situation assessment client (ISAC) aswell as mobile applications for (3) the ad hoc participation in mobile collaboration (MoCo) and (4) the articulation of information needs in mobile reporting (MoRep). Based on the empirical, technical and practical findings, the subsequent analysis uses the concept of infrastructuring (Pipek & Wulf, 2009), the integrated perspective on the design and use of information systems, and derives implications for emergent collaboration infrastructures, which contribute overall to the academic fields CSCW, Human Computer Interaction (HCI) and Information Systems (IS).

    @book{reuter_emergent_2014-1,
    address = {University of Siegen, Institute for Information Systems, Germany},
    title = {Emergent {Collaboration} {Infrastructures}: {Technology} {Design} for {Inter}-{Organizational} {Crisis} {Management} ({Ph}.{D}. {Thesis})},
    url = {http://dx.doi.org/10.25819/ubsi/10370},
    abstract = {The complexity and interconnectedness of current working environments encourages organizations, businesses and individuals to collaborate beyond spatial, temporal as well as organizational boundaries. These collaborations are potentially supported by information and communication technology (ICT) among mobile and ubiquitous systems. The academic field Computer-Supported Cooperative Work (CSCW) is primarily recognized for focusing on ICT support for collaboration practices as opposed to the computerizing of formal procedures. ICT, in this view, needs to reflect the dynamic nature of cooperation and collaboration. The notion emergence as coined by Lewes (1875) and interpreted by Goldstein (1999) refers to dynamic contexts that cannot be anticipated in their full extent before they actually occur. Emergent collaboration refers to the need for spontaneous collaboration in novel and changing structures and occurs in application fields such as inter-organizational crisis and emergency management, which by definition contain the unforeseeable.
    This dissertation contributes to research into infrastructures for emergent collaboration. Using the example of crisis management, it addresses (1) emergent collaboration practices and how they reveal work infrastructure limitations, (2) novel concepts and artifacts to support emergent collaboration, (3) their effects on the ability to deal with emergent situations and (4) methodological implications for technology design for emergent collaboration infrastructures in inter-organizational settings.
    Design case studies (Wulf et al., 2011), inspired by action research (Lewin, 1958) and following Hevner and Chatterjee’s suggestion (2010) to integrate action research with design research, are applied as a practice oriented research method. They contain three phases: an empirical analysis of the practices in the field, the development of innovative ICT artifacts with continuous participation of end-users related to the empirical findings and the evaluation of their appropriation (Pipek, 2005) in practice. In the case reported here, the empirical study on emergent collaboration by police and fire services, aid agencies, energy network operators and citizens in emergencies in two counties in Germany outlined the importance of improvisation work in situation assessment as well as mobile collaboration and reporting practices. The ICT design aimed towards the support of these emergent practices, illustrated by various concepts and prototypes. They comprise (1) an inter-organizational social network for emergency management (SiRena), (2) an inter-organizational situation assessment client (ISAC) aswell as mobile applications for (3) the ad hoc participation in mobile collaboration (MoCo) and (4) the articulation of information needs in mobile reporting (MoRep).
    Based on the empirical, technical and practical findings, the subsequent analysis uses the concept of infrastructuring (Pipek \& Wulf, 2009), the integrated perspective on the design and use of information systems, and derives implications for emergent collaboration infrastructures, which contribute overall to the academic fields CSCW, Human Computer Interaction (HCI) and Information Systems (IS).},
    publisher = {Universitätsbibliothek Siegen},
    author = {Reuter, Christian},
    year = {2014},
    keywords = {HCI, Projekt-InfoStrom, SocialMedia, Projekt-EmerGent, UsableSec, Infrastructure, Dissertation},
    }

    KOKOS: Unterstützung der Kooperation mit freiwilligen Helfern in komplexen Schadenslagen (2015-2018, BMBF)

    KOKOS: Unterstützung der Kooperation mit freiwilligen Helfern in komplexen Schadenslagen (2015-2018, BMBF)

    Die Jahrhundertflut in Ost- und Süddeutschland im Jahr 2013 oder die Orkane Kyrill in 2007 und Emma in 2008, welche im Westen Deutschlands eine Spur der Verwüstung hinterließen, haben offenbart, wie anfällig unsere Gesellschaft bei komplexen Schadensereignissen ist. In der verbesserten Zusammenarbeit zwischen Behörden, Unternehmen und der Bevölkerung liegt der Schlüssel zur optimaleren Reaktion auf solche Szenarien. In den vergangenen Jahren haben soziale Medien neue Möglichkeiten geschaffen, um über verschiedene Netzwerke, Blogs, Microblogs, Foto- oder Videoportale schnell Informationen zu verbreiten, sowie sich zusammenzuschließen, um gemeinsame Hilfsaktivitäten zu koordinieren. Durch eine sinnvolle Kooperation von Behörden und Organisationen mit Sicherheitsaufgaben und der Bevölkerung lässt sich die Sicherheit auch jenseits teurer Infrastrukturinvestitionen verbessern, sowie die Selbsthilfefähigkeit von Bürgerinnen und Bürgern sowie Unternehmen besser strukturieren und nutzen.

    Ziel des durch das Bundesministerium für Bildung und Forschung mit 1,8 Millionen Euro geförderten Projektes „Unterstützung der Kooperation mit freiwilligen Helfern in komplexen Schadenslagen (KOKOS)“ ist es, Methoden, technische Konzepte sowie IT-Werkzeuge zu entwickeln, um die Öffentlichkeit (Bevölkerung, Vereine, Verbände, Unternehmen) als aktiven Partner in das Krisenmanagement einzubeziehen und eine Kooperation anzustreben. Die beteiligten Wissenschaftlerinnen und Wissenschaftler untersuchen von Mai 2015 bis April 2018, wie bereits vorhandene gesellschaftliche, wirtschaftliche und zivile Strukturen in die Bewältigung größerer Krisenlagen sinnvoll einbezogen werden können. Bei der Erstversorgung der Bevölkerung könnten beispielsweise Mitarbeiterinnen und Mitarbeiter der Tafeln, die nahezu in allen größeren Städten Lebensmittel an Bedürftige verteilen, mit ihrem logistischen Erfahrungsschatz bei der Erstversorgung helfen. Denkbar ist auch, dass Fußball- oder Handballmannschaften, die als Team gut funktionieren und eingespielt sind, zur Unterstützung bei Aufräum- oder Aufbauarbeiten hinzugezogen werden und dort ebenfalls Hand in Hand agieren. Zudem könnten sich Unternehmen in Industriegebieten zusammenschließen, um die eigene Wiederherstellungsfähigkeit zu verbessern, aber auch Behörden oder die Bevölkerung in Schadenslagen zu unterstützen.

    2023

  • Marc-André Kaufhold, Christian Reuter, Thomas Ludwig (2023)
    Big Data and Multi-platform Social Media Services in Disaster Management
    In: Amita Singh: International Handbook of Disaster Research. Singapore: Springer Nature Singapore, , 1–21.
    [BibTeX] [Abstract] [Download PDF]

    The use of social media today is not only ubiquitous and an integral part of everyday life but is also increasingly relevant before, during, or after emergencies. Data produced in these contexts, such as situational updates and multimedia content, is disseminated across different social media platforms and can be leveraged by various actors, including emergency services or volunteer communities. However, the dissemination of several thousand or even millions of messages during large-scale emergencies confronts analysts with challenges of information quality and overload. Hence, crisis informatics as a research domain seeks to explore and develop systems that support the collection, analysis, and dissemination of valuable social media information in emergencies. This chapter presents the social media API (SMA), which is a multi-platform service for gathering big social data across different social media channels and analyzing the credibility and relevance of collected data by the means of machine learning models. Based on the lessons learned from both the implementation process and user-centered evaluations in multiple emergency settings, this chapter discusses core challenges and potentials of the SMA and similar services, focusing on (1) the multi-platform gathering and management of data, (2) the mitigation of information overload by relevance assessment and message grouping, (3) the assessment of credibility and information quality, and (4) user-centered tailorability and adjustable data operations.

    @incollection{kaufhold_big_2023,
    address = {Singapore},
    title = {Big {Data} and {Multi}-platform {Social} {Media} {Services} in {Disaster} {Management}},
    isbn = {978-981-16-8800-3},
    url = {https://peasec.de/paper/2023/2023_KaufholdReuterLudwig_BigDataMultiPlatformSocialMediaDisaster_HandbookDisaster.pdf},
    abstract = {The use of social media today is not only ubiquitous and an integral part of everyday life but is also increasingly relevant before, during, or after emergencies. Data produced in these contexts, such as situational updates and multimedia content, is disseminated across different social media platforms and can be leveraged by various actors, including emergency services or volunteer communities. However, the dissemination of several thousand or even millions of messages during large-scale emergencies confronts analysts with challenges of information quality and overload. Hence, crisis informatics as a research domain seeks to explore and develop systems that support the collection, analysis, and dissemination of valuable social media information in emergencies. This chapter presents the social media API (SMA), which is a multi-platform service for gathering big social data across different social media channels and analyzing the credibility and relevance of collected data by the means of machine learning models. Based on the lessons learned from both the implementation process and user-centered evaluations in multiple emergency settings, this chapter discusses core challenges and potentials of the SMA and similar services, focusing on (1) the multi-platform gathering and management of data, (2) the mitigation of information overload by relevance assessment and message grouping, (3) the assessment of credibility and information quality, and (4) user-centered tailorability and adjustable data operations.},
    booktitle = {International {Handbook} of {Disaster} {Research}},
    publisher = {Springer Nature Singapore},
    author = {Kaufhold, Marc-André and Reuter, Christian and Ludwig, Thomas},
    editor = {Singh, Amita},
    year = {2023},
    keywords = {Crisis, HCI, Projekt-KOKOS, Projekt-CYWARN, Projekt-emergenCITY},
    pages = {1--21},
    }

    2019

  • Christian Reuter, Thomas Ludwig, Patrick Mischur (2019)
    RescueGlass: Collaborative Applications involving Head-Mounted Displays for Red Cross Rescue Dog Units
    Computer Supported Cooperative Work: The Journal of Collaborative Computing (JCSCW) ;28(1-2):209–246. doi:10.1007/s10606-018-9339-8
    [BibTeX] [Abstract] [Download PDF]

    On-site work of emergency service teams consists of highly cooperative tasks. Especially during distributed search and rescue tasks there is a constant mix of routinized and non-routinized activities. Within this paper we focus on the work practices of the German Red Cross Rescue Dog Units who deal with several uncertainties regarding the involved dogs, the fragility of the respective situations as well as issues of using technologies under enormous time pressure. Smart glasses provide possibilities for enhanced and hands-free interaction in various contexts and a number of approaches have already been applied, aiming at efficient use of the respective technological innovation in private and professional contexts. However, the collaborative potential of smart glasses in time-critical and uncertain situations is still unexplored. Our design case study examines how the on-site work of emergency service teams can be supported by smart glasses: Based on examining the work practices of the German Red Cross Rescue Dogs, we introduce ‘RescueGlass‘ as a coordinative concept, encompassing hands-free head-mounted display (HMD) application as well as a corresponding smartphone application. Finally, we describe the evaluation of its use in the field of emergency response and management. We show how current features such as ‘fog of war‘ or various sensors support the cooperative practices of dog handlers, and outline current technical limitations offering future research questions. Our paper provides an initial design probe using smart glasses to engage in the field of collaborative professional mobile tasks.

    @article{reuter_rescueglass_2019,
    title = {{RescueGlass}: {Collaborative} {Applications} involving {Head}-{Mounted} {Displays} for {Red} {Cross} {Rescue} {Dog} {Units}},
    volume = {28},
    url = {http://www.peasec.de/paper/2019/2019_ReuterLudwigMischur_RescueGlass_JCSCW.pdf},
    doi = {10.1007/s10606-018-9339-8},
    abstract = {On-site work of emergency service teams consists of highly cooperative tasks. Especially during distributed search and rescue tasks there is a constant mix of routinized and non-routinized activities. Within this paper we focus on the work practices of the German Red Cross Rescue Dog Units who deal with several uncertainties regarding the involved dogs, the fragility of the respective situations as well as issues of using technologies under enormous time pressure. Smart glasses provide possibilities for enhanced and hands-free interaction in various contexts and a number of approaches have already been applied, aiming at efficient use of the respective technological innovation in private and professional contexts. However, the collaborative potential of smart glasses in time-critical and uncertain situations is still unexplored. Our design case study examines how the on-site work of emergency service teams can be supported by smart glasses: Based on examining the work practices of the German Red Cross Rescue Dogs, we introduce ‘RescueGlass' as a coordinative concept, encompassing hands-free head-mounted display (HMD) application as well as a corresponding smartphone application. Finally, we describe the evaluation of its use in the field of emergency response and management. We show how current features such as ‘fog of war' or various sensors support the cooperative practices of dog handlers, and outline current technical limitations offering future research questions. Our paper provides an initial design probe using smart glasses to engage in the field of collaborative professional mobile tasks.},
    number = {1-2},
    journal = {Computer Supported Cooperative Work: The Journal of Collaborative Computing (JCSCW)},
    author = {Reuter, Christian and Ludwig, Thomas and Mischur, Patrick},
    year = {2019},
    keywords = {Cooperation, Crisis, HCI, UsableSec, Security, A-Paper, Ranking-ImpactFactor, Ranking-VHB-B, Projekt-KontiKat, Projekt-KOKOS, Ranking-CORE-B, Infrastructure},
    pages = {209--246},
    }

    2018

  • Christian Reuter, Marc-André Kaufhold (2018)
    Fifteen Years of Social Media in Emergencies: A Retrospective Review and Future Directions for Crisis Informatics
    Journal of Contingencies and Crisis Management (JCCM) ;26(1):41–57. doi:10.1111/1468-5973.12196
    [BibTeX] [Abstract] [Download PDF]

    Social media has been established in many larger emergencies and crises. This process has not started just a few years ago, but already 15 years ago in 2001 after the terrorist attacks of 9/11. In the following years, especially in the last 10, sometimes summarized under the term crisis informatics, a variety of studies focusing on the use of ICT and social media before, during or after nearly every crisis and emergency has arisen. This article aims to recapitulate 15 years of social media in emergencies and its research with a special emphasis on use patterns, role patterns and perception patterns that can be found across different cases in order to point out what has been achieved so far, and what future potentials exist.

    @article{reuter_fifteen_2018,
    title = {Fifteen {Years} of {Social} {Media} in {Emergencies}: {A} {Retrospective} {Review} and {Future} {Directions} for {Crisis} {Informatics}},
    volume = {26},
    url = {http://www.peasec.de/paper/2018/2018_ReuterKaufhold_FifteenYearsSocialMediaEmergencies_JCCM.pdf},
    doi = {10.1111/1468-5973.12196},
    abstract = {Social media has been established in many larger emergencies and crises. This process has not started just a few years ago, but already 15 years ago in 2001 after the terrorist attacks of 9/11. In the following years, especially in the last 10, sometimes summarized under the term crisis informatics, a variety of studies focusing on the use of ICT and social media before, during or after nearly every crisis and emergency has arisen. This article aims to recapitulate 15 years of social media in emergencies and its research with a special emphasis on use patterns, role patterns and perception patterns that can be found across different cases in order to point out what has been achieved so far, and what future potentials exist.},
    number = {1},
    journal = {Journal of Contingencies and Crisis Management (JCCM)},
    author = {Reuter, Christian and Kaufhold, Marc-André},
    year = {2018},
    keywords = {AuswahlCrisis, Crisis, HCI, Selected, SocialMedia, Projekt-EmerGent, A-Paper, Ranking-ImpactFactor, Peace, Projekt-KOKOS, AuswahlKaufhold},
    pages = {41--57},
    }

    2017

  • Christian Reuter, Marc-André Kaufhold, Thomas Ludwig (2017)
    End-User Development and Social Big Data – Towards Tailorable Situation Assessment with Social Media
    In: Fabio Paternò, Volker Wulf: New Perspectives in End-User Development. Springer, , 307–332. doi:10.1007/978-3-319-60291-2_12
    [BibTeX] [Abstract] [Download PDF]

    The amount of data being available is increasing rapidly. Based on the technological advances with mobile and ubiquitous computing, the use of social media is getting more and more usual in daily life as well as in extraordinary situations, such as crises. Not surprisingly, this increasing use is one reason why data on the internet is also developing that fast. Currently, more than 3 billion people use the internet and the majority is also registered with social media services such as Facebook or Twitter. While processing this kind of data by the majority of non-technical users, concepts of End-User Development (EUD) are important. This chapter researches how concepts of EUD might be applied to handle social big data. Based on foundations and an empirical pre-study, we explore how EUD can support the gathering and assessment process of social media. In this context, we investigate how end-users can articulate their personal quality criteria appropriately and how the selection of relevant data can be supported by EUD approaches. We present a tailorable social media gathering service and quality assessment service for social media content, which has been implemented and integrated into an application for both volunteers and the emergency services.

    @incollection{reuter_end-user_2017,
    title = {End-{User} {Development} and {Social} {Big} {Data} - {Towards} {Tailorable} {Situation} {Assessment} with {Social} {Media}},
    isbn = {978-3-319-60290-5},
    url = {https://link.springer.com/chapter/10.1007/978-3-319-60291-2_12},
    abstract = {The amount of data being available is increasing rapidly. Based on the technological advances with mobile and ubiquitous computing, the use of social media is getting more and more usual in daily life as well as in extraordinary situations, such as crises. Not surprisingly, this increasing use is one reason why data on the internet is also developing that fast. Currently, more than 3 billion people use the internet and the majority is also registered with social media services such as Facebook or Twitter. While processing this kind of data by the majority of non-technical users, concepts of End-User Development (EUD) are important. This chapter researches how concepts of EUD might be applied to handle social big data. Based on foundations and an empirical pre-study, we explore how EUD can support the gathering and assessment process of social media. In this context, we investigate how end-users can articulate their personal quality criteria appropriately and how the selection of relevant data can be supported by EUD approaches. We present a tailorable social media gathering service and quality assessment service for social media content, which has been implemented and integrated into an application for both volunteers and the emergency services.},
    booktitle = {New {Perspectives} in {End}-{User} {Development}},
    publisher = {Springer},
    author = {Reuter, Christian and Kaufhold, Marc-André and Ludwig, Thomas},
    editor = {Paternò, Fabio and Wulf, Volker},
    year = {2017},
    doi = {10.1007/978-3-319-60291-2_12},
    keywords = {Crisis, HCI, SocialMedia, Projekt-EmerGent, Projekt-KOKOS},
    pages = {307--332},
    }

  • Thomas Ludwig, Christoph Kotthaus, Christian Reuter, Sören Van Dongen, Volkmar Pipek (2017)
    Situated crowdsourcing during disasters: Managing the tasks of spontaneous volunteers through public displays
    International Journal on Human-Computer Studies (IJHCS) ;102(C):103–121. doi:10.1016/j.ijhcs.2016.09.008
    [BibTeX] [Abstract] [Download PDF]

    Abstract Although emergency services have already recognized the importance of citizen-initiated activities during disasters, still questions with regard to the coordination of spontaneous volunteers and their activities arise. Within our article, we will present a technological approach based on public displays which aims to foster situated crowdsourcing between affected citizens, spontaneous volunteers as well as official emergency services. We will address the research question: How can the situated tasks performed by spontaneous volunteers be supported by the use of public displays during disasters? First we will present the current state of the art with regard to the coordination practices of spontaneous volunteers and emergency services within disaster situations as well as related problems, potentials and specifics of situated crowdsourcing and public displays. To gain insight into actual coordination practices, we conducted an empirical study with 18 different stakeholders involved in disaster management. Based on the literature review and our empirical study, we have derived a technical concept that supports the task and activity management of spontaneous volunteers as well as the coordination both of the demands of affected people and the offers from spontaneous volunteers. We have implemented our concept as the public display application ‘City-Share‘, which provides a robust communication infrastructure and encompasses situated crowdsourcing mechanisms for managing offers and demands of activities on-the-ground. Based on its evaluation with several users, we will discuss our findings with regard to the assignment of tasks on-the-ground and situated crowdsourcing during emergencies. We outline that City-Share can improve a community’s disaster resilience, especially when focusing on the kind of collaborative resilience emerging between official stakeholders and spontaneous volunteers or affected citizens at a local level.

    @article{ludwig_situated_2017,
    title = {Situated crowdsourcing during disasters: {Managing} the tasks of spontaneous volunteers through public displays},
    volume = {102},
    url = {http://www.peasec.de/paper/2017/2017_Ludwigetal_SituatedCrowdsourcingPublicDisplay_IJHCS.pdf},
    doi = {10.1016/j.ijhcs.2016.09.008},
    abstract = {Abstract Although emergency services have already recognized the importance of citizen-initiated activities during disasters, still questions with regard to the coordination of spontaneous volunteers and their activities arise. Within our article, we will present a technological approach based on public displays which aims to foster situated crowdsourcing between affected citizens, spontaneous volunteers as well as official emergency services. We will address the research question: How can the situated tasks performed by spontaneous volunteers be supported by the use of public displays during disasters? First we will present the current state of the art with regard to the coordination practices of spontaneous volunteers and emergency services within disaster situations as well as related problems, potentials and specifics of situated crowdsourcing and public displays. To gain insight into actual coordination practices, we conducted an empirical study with 18 different stakeholders involved in disaster management. Based on the literature review and our empirical study, we have derived a technical concept that supports the task and activity management of spontaneous volunteers as well as the coordination both of the demands of affected people and the offers from spontaneous volunteers. We have implemented our concept as the public display application ‘City-Share', which provides a robust communication infrastructure and encompasses situated crowdsourcing mechanisms for managing offers and demands of activities on-the-ground. Based on its evaluation with several users, we will discuss our findings with regard to the assignment of tasks on-the-ground and situated crowdsourcing during emergencies. We outline that City-Share can improve a community's disaster resilience, especially when focusing on the kind of collaborative resilience emerging between official stakeholders and spontaneous volunteers or affected citizens at a local level.},
    number = {C},
    journal = {International Journal on Human-Computer Studies (IJHCS)},
    author = {Ludwig, Thomas and Kotthaus, Christoph and Reuter, Christian and Dongen, Sören Van and Pipek, Volkmar},
    year = {2017},
    keywords = {Cooperation, Crisis, HCI, Student, A-Paper, Ranking-ImpactFactor, Ranking-CORE-A, Ranking-WKWI-B, Projekt-KOKOS},
    pages = {103--121},
    }

  • Gaia Mosconi, Matthias Korn, Christian Reuter, Peter Tolmie, Maurizio Teli, Volkmar Pipek (2017)
    From Facebook to the Neighbourhood: Infrastructuring of Hybrid Community Engagement
    Computer Supported Cooperative Work: The Journal of Collaborative Computing (JCSCW) ;26(4-6):959–1003. doi:10.1007/s10606-017-9291-z
    [BibTeX] [Abstract] [Download PDF]

    In recent years, social media have increased the resources that individuals and organizations are able to mobilize for the development of socially innovative practices. In this article, we engage with a naturally occurring development in a Trentinian neighbourhood to examine the cooperative interactions amongst members of a local community. The first author and local residents of the neighbourhood participated in online discussions, decision making, and physical activities that led to material changes in the area. The interventions are motivated by and based on the concept of Social Street that combines online interactions in a closed Facebook group with face-to-face meetings seeking to practically engage the collective in accomplishing certain immediate or ongoing needs. Over the course of two years, we studied this local instantiation of Social Street in Trento, Italy by way of an action-oriented (digital) ethnography. Through this work, we demonstrate how urban neighbourhoods might benefit from hybrid forms of community engagement that are enacted through a constant back and forth between online and face-to-face interactions. We further argue that the infrastructuring of local urban collectives should follow strategies that pay attention to the multiple issues in urban neighbourhoods and people’s attachments to them. Overall, the paper reflects upon the challenges and configurations of participation that this form of community-work entails.

    @article{mosconi_facebook_2017,
    title = {From {Facebook} to the {Neighbourhood}: {Infrastructuring} of {Hybrid} {Community} {Engagement}},
    volume = {26},
    url = {https://link.springer.com/article/10.1007/s10606-017-9291-z},
    doi = {10.1007/s10606-017-9291-z},
    abstract = {In recent years, social media have increased the resources that individuals and organizations are able to mobilize for the development of socially innovative practices. In this article, we engage with a naturally occurring development in a Trentinian neighbourhood to examine the cooperative interactions amongst members of a local community. The first author and local residents of the neighbourhood participated in online discussions, decision making, and physical activities that led to material changes in the area. The interventions are motivated by and based on the concept of Social Street that combines online interactions in a closed Facebook group with face-to-face meetings seeking to practically engage the collective in accomplishing certain immediate or ongoing needs. Over the course of two years, we studied this local instantiation of Social Street in Trento, Italy by way of an action-oriented (digital) ethnography. Through this work, we demonstrate how urban neighbourhoods might benefit from hybrid forms of community engagement that are enacted through a constant back and forth between online and face-to-face interactions. We further argue that the infrastructuring of local urban collectives should follow strategies that pay attention to the multiple issues in urban neighbourhoods and people's attachments to them. Overall, the paper reflects upon the challenges and configurations of participation that this form of community-work entails.},
    number = {4-6},
    journal = {Computer Supported Cooperative Work: The Journal of Collaborative Computing (JCSCW)},
    author = {Mosconi, Gaia and Korn, Matthias and Reuter, Christian and Tolmie, Peter and Teli, Maurizio and Pipek, Volkmar},
    year = {2017},
    keywords = {Crisis, HCI, SocialMedia, A-Paper, Ranking-ImpactFactor, Ranking-VHB-B, Projekt-KOKOS, Ranking-CORE-B},
    pages = {959--1003},
    }

  • Christian Reuter, Thomas Ludwig, Marc-André Kaufhold, Julian Hupertz (2017)
    Social Media Resilience during Infrastructure Breakdowns using Mobile Ad-Hoc Networks
    Advances and New Trends in Environmental Informatics – Proceedings of the 30th EnviroInfo Conference Berlin, Germany. doi:10.1007/978-3-319-44711-7_7
    [BibTeX] [Abstract] [Download PDF]

    Social media and instant messaging services are nowadays considered as important communication infrastructures on which people rely on. However, the exchange of content during breakdowns of the underlying technical infrastructures, which sometimes happens based on environmental occurrences, is challenging. Hence, with this paper, we examine the resilience of social media during breakdowns. We discuss communication options and examine ad-hoc functionality for the exchange of social media data between different actors in such cases. To address this, we have developed a concept, which makes use of mobile ad-hoc networks (MANETs) for the spontaneous exchange of information with smartphones. We implemented our concept as the mobile application Social Offline Map (SOMAP) and evaluated it within two iterations (1.0 and 2.0). Finally, we discuss our contribution within the context of related work and the limitations of our approach.

    @inproceedings{reuter_social_2017,
    address = {Berlin, Germany},
    title = {Social {Media} {Resilience} during {Infrastructure} {Breakdowns} using {Mobile} {Ad}-{Hoc} {Networks}},
    url = {http://www.wineme.uni-siegen.de/paper/2017/2017_Reuteretal_SocialMediaResilienceMANET_EnviroInfo.pdf},
    doi = {10.1007/978-3-319-44711-7_7},
    abstract = {Social media and instant messaging services are nowadays considered as important communication infrastructures on which people rely on. However, the exchange of content during breakdowns of the underlying technical infrastructures, which sometimes happens based on environmental occurrences, is challenging. Hence, with this paper, we examine the resilience of social media during breakdowns. We discuss communication options and examine ad-hoc functionality for the exchange of social media data between different actors in such cases. To address this, we have developed a concept, which makes use of mobile ad-hoc networks (MANETs) for the spontaneous exchange of information with smartphones. We implemented our concept as the mobile application Social Offline Map (SOMAP) and evaluated it within two iterations (1.0 and 2.0). Finally, we discuss our contribution within the context of related work and the limitations of our approach.},
    booktitle = {Advances and {New} {Trends} in {Environmental} {Informatics} - {Proceedings} of the 30th {EnviroInfo} {Conference}},
    publisher = {Springer},
    author = {Reuter, Christian and Ludwig, Thomas and Kaufhold, Marc-André and Hupertz, Julian},
    editor = {Wohlgemuth, V. and Fuchs-Kittowski, Frank and Wittmann, Jochen},
    year = {2017},
    keywords = {Crisis, HCI, SocialMedia, Projekt-EmerGent, Security, Projekt-KOKOS, Infrastructure, RSF},
    pages = {75--88},
    }

    2016

  • Christian Reuter, Thomas Ludwig, Volkmar Pipek (2016)
    Kooperative Resilienz – ein soziotechnischer Ansatz durch Kooperationstechnologien im Krisenmanagement
    Gruppe. Interaktion. Organisation. Zeitschrift für Angewandte Organisationspsychologie (GIO) ;47(2):159–169. doi:10.1007/s11612-016-0317-7
    [BibTeX] [Abstract] [Download PDF]

    Während das Konzept der Resilienz in den Ingenieurwissenschaften vornehmlich auf die Verfügbarkeit technischer Systeme fokussiert ist, betrachtet unser Beitrag Resilienz als soziotechnisches Konstrukt und zeigt Möglichkeiten zur Förderung kooperativer Resilienz, insbesondere durch Kooperationstechnologie, auf. Nach einer Definition von Resilienz im Allgemeinen und im Katastrophenschutz – unserem Anwendungsfeld – sowie im Kontext kooperativer Strukturen, stellen wir unsere Methodik und die entwickelten Kooperationstechnologien vor. Diese adressieren die Zusammenarbeit verschiedener Akteure (z. B. Feuerwehr, Polizei, Bevölkerung) in Schadenslagen. Abschließend diskutieren wir den Beitrag dieser Technologien zur kooperativen Resilienz als Fähigkeit, Krisen der Kooperation durch Anpassungsfähigkeit an geänderte Realitäten mithilfe von Kooperationstechnologie zu überstehen.

    @article{reuter_kooperative_2016,
    title = {Kooperative {Resilienz} – ein soziotechnischer {Ansatz} durch {Kooperationstechnologien} im {Krisenmanagement}},
    volume = {47},
    url = {https://www.wineme.uni-siegen.de/paper/2016/2016_reuterludwigpipek_kooperativeresilienz_gio.pdf},
    doi = {10.1007/s11612-016-0317-7},
    abstract = {Während das Konzept der Resilienz in den Ingenieurwissenschaften vornehmlich auf die Verfügbarkeit technischer Systeme fokussiert ist, betrachtet unser Beitrag Resilienz als soziotechnisches Konstrukt und zeigt Möglichkeiten zur Förderung kooperativer Resilienz, insbesondere durch Kooperationstechnologie, auf. Nach einer Definition von Resilienz im Allgemeinen und im Katastrophenschutz – unserem Anwendungsfeld – sowie im Kontext kooperativer Strukturen, stellen wir unsere Methodik und die entwickelten Kooperationstechnologien vor. Diese adressieren die Zusammenarbeit verschiedener Akteure (z. B. Feuerwehr, Polizei, Bevölkerung) in Schadenslagen. Abschließend diskutieren wir den Beitrag dieser Technologien zur kooperativen Resilienz als Fähigkeit, Krisen der Kooperation durch Anpassungsfähigkeit an geänderte Realitäten mithilfe von Kooperationstechnologie zu überstehen.},
    number = {2},
    journal = {Gruppe. Interaktion. Organisation. Zeitschrift für Angewandte Organisationspsychologie (GIO)},
    author = {Reuter, Christian and Ludwig, Thomas and Pipek, Volkmar},
    year = {2016},
    keywords = {Cooperation, Crisis, HCI, Projekt-InfoStrom, Projekt-EmerGent, Projekt-KOKOS, RSF},
    pages = {159--169},
    }

  • Christian Reuter, Thomas Ludwig, Christoph Kotthaus, Marc-André Kaufhold, Elmar von Radziewski, Volkmar Pipek (2016)
    Big Data in a Crisis? Creating Social Media Datasets for Emergency Management Research
    i-com – Journal of Interactive Media ;15(3):249–264. doi:10.1515/icom-2016-0036
    [BibTeX] [Abstract] [Download PDF]

    A growing body of research in the area of information systems for crisis management is based on data from social media. After almost every larger disaster studies emerge with the focus on the specific use of social media. Much of this research is based on Twitter data, due to the ease of access of this (mainly public) data, compared to (more closed) data, such as Facebook or Google+. Based on the experience gained from a research project on social media in emergencies and our task to collect social media data sets for other partners, we present the design and evaluation of a graphical user interface that supports those stakeholders (such as emergency services or researchers) that are interested in creating social media datasets for further crisis management research. We do not specifically focus on the analysis of social media data. Rather we aim to support the gathering process and how actors without sophisticated technical skills can be supported to get what they want and especially need: relevant social media data. Within this article, we present a practice-oriented approach and implications for designing tools that support the collection of social media data as well as future work.

    @article{reuter_big_2016,
    title = {Big {Data} in a {Crisis}? {Creating} {Social} {Media} {Datasets} for {Emergency} {Management} {Research}},
    volume = {15},
    url = {http://wineme.uni-siegen.de/paper/2016/2016_Reuteretal_BigDatainCrisisDatasets_ICOM.pdf},
    doi = {10.1515/icom-2016-0036},
    abstract = {A growing body of research in the area of information systems for crisis management is based on data from social media. After almost every larger disaster studies emerge with the focus on the specific use of social media. Much of this research is based on Twitter data, due to the ease of access of this (mainly public) data, compared to (more closed) data, such as Facebook or Google+. Based on the experience gained from a research project on social media in emergencies and our task to collect social media data sets for other partners, we present the design and evaluation of a graphical user interface that supports those stakeholders (such as emergency services or researchers) that are interested in creating social media datasets for further crisis management research. We do not specifically focus on the analysis of social media data. Rather we aim to support the gathering process and how actors without sophisticated technical skills can be supported to get what they want and especially need: relevant social media data. Within this article, we present a practice-oriented approach and implications for designing tools that support the collection of social media data as well as future work.},
    number = {3},
    journal = {i-com - Journal of Interactive Media},
    author = {Reuter, Christian and Ludwig, Thomas and Kotthaus, Christoph and Kaufhold, Marc-André and von Radziewski, Elmar and Pipek, Volkmar},
    year = {2016},
    keywords = {HCI, SocialMedia, Projekt-EmerGent, Projekt-KOKOS},
    pages = {249--264},
    }

  • Christian Reuter, Tilo Mentler, Stefan Geisler, Michael Herczeg, Thomas Ludwig, Volkmar Pipek, Simon Nestler, Johannes Sautter (2016)
    Aktuelle Ansätze zur Mensch-Computer-Interaktion in sicherheitskritischen Systemen
    Mensch und Computer – Workshopband Aachen, Germany. doi:10.18420/muc2016-ws01-0000
    [BibTeX] [Abstract] [Download PDF]

    Die zunehmende Durchdringung der Lebenswelt mit IT macht auch nicht vor sicherheitskritischen Systemen halt. Anwendungsfelder betreffen kritische Infrastrukturen, Leitstellensysteme, Fahrzeug- und Verkehrsführungssoftware, Prozessführungssysteme, Produktionstechnologien, Anwendung der Medizintechnik, des Krisenmanagements, der Gefahrenabwehr oder des Terrorismus. Die Mensch-Computer-Interaktion in solchen sicherheitskritischen Systemen und Anwendungsfeldern ist eine Herausforderung nicht nur für die Informatik, sondern eine interdisziplinäre Aufgabe an der Schnittstelle vieler Disziplinen. Zunehmend müssen auch mobile Kontexte und Endgeräte sowie soziale Netzwerke in die Betrachtungen einbezogen werden.

    @inproceedings{reuter_aktuelle_2016,
    address = {Aachen, Germany},
    title = {Aktuelle {Ansätze} zur {Mensch}-{Computer}-{Interaktion} in sicherheitskritischen {Systemen}},
    url = {https://dl.gi.de/bitstream/handle/20.500.12116/314/bitstream_9083.pdf?sequence=1&isAllowed=y},
    doi = {10.18420/muc2016-ws01-0000},
    abstract = {Die zunehmende Durchdringung der Lebenswelt mit IT macht auch nicht vor sicherheitskritischen Systemen halt. Anwendungsfelder betreffen kritische Infrastrukturen, Leitstellensysteme, Fahrzeug- und Verkehrsführungssoftware, Prozessführungssysteme, Produktionstechnologien, Anwendung der Medizintechnik, des Krisenmanagements, der Gefahrenabwehr oder des Terrorismus. Die Mensch-Computer-Interaktion in solchen sicherheitskritischen Systemen und Anwendungsfeldern ist eine Herausforderung nicht nur für die Informatik, sondern eine interdisziplinäre Aufgabe an der Schnittstelle vieler Disziplinen. Zunehmend müssen auch mobile Kontexte und Endgeräte sowie soziale Netzwerke in die Betrachtungen einbezogen werden.},
    booktitle = {Mensch und {Computer} - {Workshopband}},
    publisher = {Gesellschaft für Informatik e.V.},
    author = {Reuter, Christian and Mentler, Tilo and Geisler, Stefan and Herczeg, Michael and Ludwig, Thomas and Pipek, Volkmar and Nestler, Simon and Sautter, Johannes},
    editor = {Weyers, B. and Dittmar, A.},
    year = {2016},
    keywords = {HCI, SocialMedia, Projekt-EmerGent, Projekt-KOKOS},
    }

  • Christian Reuter, Gordian Geilen, Robin Gellert (2016)
    Sicherheit vs. Privatsphäre: Zur Akzeptanz von Überwachung in sozialen Medien im Kontext von Terrorkrisen
    Informatik 2016: von Menschen für Menschen Klagenfurt.
    [BibTeX] [Abstract] [Download PDF]

    Nach den terroristischen Anschlägen in Paris 2015 und Brüssel 2016 wurde das Bedürfnis nach mehr Sicherheit und Überwachung im Internet laut. Als Folge der Enthüllungen der Überwachungs- und Spionagetechniken der National Security Agency (NSA) durch Edward Snowden 2013 konnte in der Bevölkerung aber auch ein Aufschrei nach erhöhtem Schutz der Privatsphäre im Internet wahrgenommen werden. Die geschilderten Ereignisse verdeutlichen die gegensätzlichen Wünsche nach Sicherheit und Überwachung im Internet sowie Schutz der Privatsphäre. Im ersten Teil dieses Beitrags stellen wir den Stand der Forschung im Bereich Terror, Sicherheit und Privatsphäre in sozialen Medien dar. Im zweiten Teil führen wir eine explorative Studie durch, um zu beleuchten, ob Bürgerinnen und Bürger in Krisenzeiten bereit wären, ihre Privatsphäre im Internet, vor allem in sozialen Netzwerken, zugunsten von Sicherheit zu reduzieren. Basierend auf qualitativen Daten zeigt diese Arbeit Meinungscluster und Tendenzen in Bezug auf das Nullsummenspiel „Sicherheit und Privatsphäre“.

    @inproceedings{reuter_sicherheit_2016,
    address = {Klagenfurt},
    title = {Sicherheit vs. {Privatsphäre}: {Zur} {Akzeptanz} von Überwachung in sozialen {Medien} im {Kontext} von {Terrorkrisen}},
    url = {http://subs.emis.de/LNI/Proceedings/Proceedings259/P-259.pdf#page=1760},
    abstract = {Nach den terroristischen Anschlägen in Paris 2015 und Brüssel 2016 wurde das Bedürfnis nach mehr Sicherheit und Überwachung im Internet laut. Als Folge der Enthüllungen der Überwachungs- und Spionagetechniken der National Security Agency (NSA) durch Edward Snowden 2013 konnte in der Bevölkerung aber auch ein Aufschrei nach erhöhtem Schutz der Privatsphäre im Internet wahrgenommen werden. Die geschilderten Ereignisse verdeutlichen die gegensätzlichen Wünsche nach Sicherheit und Überwachung im Internet sowie Schutz der Privatsphäre. Im ersten Teil dieses Beitrags stellen wir den Stand der Forschung im Bereich Terror, Sicherheit und Privatsphäre in sozialen Medien dar. Im zweiten Teil führen wir eine explorative Studie durch, um zu beleuchten, ob Bürgerinnen und Bürger in Krisenzeiten bereit wären, ihre Privatsphäre im Internet, vor allem in sozialen Netzwerken, zugunsten von Sicherheit zu reduzieren. Basierend auf qualitativen Daten zeigt diese Arbeit Meinungscluster und Tendenzen in Bezug auf das Nullsummenspiel „Sicherheit und Privatsphäre“.},
    booktitle = {Informatik 2016: von {Menschen} für {Menschen}},
    publisher = {GI-Edition-Lecture Notes in Informatics (LNI)},
    author = {Reuter, Christian and Geilen, Gordian and Gellert, Robin},
    editor = {Mayr, Heinrich C. and Pinzger, Martin},
    year = {2016},
    keywords = {HCI, SocialMedia, Student, Ranking-CORE-C, Ranking-VHB-C, UsableSec, Security, Peace, Projekt-KOKOS},
    }

  • Christian Reuter, Julian Hupertz (2016)
    Sozial auch ohne Netz – Soziale Medien bei Infrastrukturproblemen
    Mensch und Computer – Workshopband Aachen, Germany. doi:http://dx.doi.org/10.18420/muc2016-ws01-0004
    [BibTeX] [Abstract] [Download PDF]

    Menschen tauschen sich aus und gerade in schwierigen Situationen ist Kommunikation sehr wichtig. In Katastrophenlagen, wie schweren Unwettern, sind jedoch teilweise zentrale Kommunikationsinfrastrukturen betroffen durch der durch Kommunikationsmedien unterstützte Informationsaustausch naturgemäß schwerer möglich als in Zeiten ohne solche Ausfälle. In jenen Fällen ist Kreativität erforderlich. Den Ansatz des Infrastructuring, d.h. der Re-Konzeptualisierung der eigenen Arbeit im Kontext bestehender und potentieller Werkzeuge, aufgreifend werden in diesem Artikel Kommunikationsmöglichkeiten in solchen Fällen untersucht. Basierend auf der Analyse der Verfügbarkeit von Kommunikationsinfrastrukturen wird betrachtet, welche Ansätze zur Kommunikation basierend auf alternativen und dezentralen Infrastrukturen wie MANETs, Wi-Fi und Bluetooth existieren und mithilfe von Smartphones nutzbar gemacht werden können.

    @inproceedings{reuter_sozial_2016,
    address = {Aachen, Germany},
    title = {Sozial auch ohne {Netz} – {Soziale} {Medien} bei {Infrastrukturproblemen}},
    url = {https://dl.gi.de/handle/20.500.12116/287},
    doi = {http://dx.doi.org/10.18420/muc2016-ws01-0004},
    abstract = {Menschen tauschen sich aus und gerade in schwierigen Situationen ist Kommunikation sehr wichtig. In Katastrophenlagen, wie schweren Unwettern, sind jedoch teilweise zentrale Kommunikationsinfrastrukturen betroffen durch der durch Kommunikationsmedien unterstützte Informationsaustausch naturgemäß schwerer möglich als in Zeiten ohne solche Ausfälle. In jenen Fällen ist Kreativität erforderlich. Den Ansatz des Infrastructuring, d.h. der Re-Konzeptualisierung der eigenen Arbeit im Kontext bestehender und potentieller Werkzeuge, aufgreifend werden in diesem Artikel Kommunikationsmöglichkeiten in solchen Fällen untersucht. Basierend auf der Analyse der Verfügbarkeit von Kommunikationsinfrastrukturen wird betrachtet, welche Ansätze zur Kommunikation basierend auf alternativen und dezentralen Infrastrukturen wie MANETs, Wi-Fi und Bluetooth existieren und mithilfe von Smartphones nutzbar gemacht werden können.},
    booktitle = {Mensch und {Computer} - {Workshopband}},
    publisher = {Gesellschaft für Informatik e.V.},
    author = {Reuter, Christian and Hupertz, Julian},
    editor = {Weyers, B. and Dittmar, A.},
    year = {2016},
    keywords = {Crisis, HCI, SocialMedia, Student, Projekt-EmerGent, Projekt-KOKOS, Infrastructure, RSF},
    }

  • Christian Reuter, Robin Gellert, Gordian Geilen (2016)
    Reception of Terror in Germany – Security, Privacy and Social Media
    Environmental Informatics – Stability, Continuity, Innovation. Current trends and future perspectives based on 30 years of history. Adjunct Proceedings of the EnviroInfo 2016 conference Berlin.
    [BibTeX] [Download PDF]

    @inproceedings{reuter_reception_2016,
    address = {Berlin},
    title = {Reception of {Terror} in {Germany} – {Security}, {Privacy} and {Social} {Media}},
    url = {http://www.peasec.de/paper/2016/2016_ReuterGeilenGellert_ReceptionTerrorGermany-SecurityPrivacySocialMedia_EnviroInfo_selbst.pdf},
    booktitle = {Environmental {Informatics} – {Stability}, {Continuity}, {Innovation}. {Current} trends and future perspectives based on 30 years of history. {Adjunct} {Proceedings} of the {EnviroInfo} 2016 conference},
    author = {Reuter, Christian and Gellert, Robin and Geilen, Gordian},
    editor = {Wohlgemuth, Volker and Fuchs-Kittowski, Frank and Wittmann, Jochen},
    year = {2016},
    keywords = {SocialMedia, UsableSec, Security, Peace, Projekt-KOKOS},
    pages = {151--156},
    }

  • Marc-André Kaufhold, Christian Reuter (2016)
    The Self-Organization of Digital Volunteers across Social Media: The Case of the 2013 European Floods in Germany
    Journal of Homeland Security and Emergency Management (JHSEM) ;13(1):137–166. doi:10.1515/jhsem-2015-0063
    [BibTeX] [Abstract] [Download PDF]

    For almost 15 years, social media have been regularly used during emergencies. One of the most recent, and instructive, examples of its widespread use during a large scale scenario in Europe were the 2013 European floods. Public reporting during the event indicated, and our analysis confirms, that Twitter, Facebook (FB), Google Maps and other services were frequently used by affected citizen and volunteers to coordinate help activities among themselves. We conducted a qualitative analysis of selected emergent volunteer communities in Germany on FB and Twitter among others, and subsequently conducted interviews with FB group founders and activists. Our aim was to analyze the use of social media during this particular event, especially by digital volunteers. Our study illustrates the relevance of social media for German citizens in cases of disaster, focusing especially on the role of the moderator. Our specific emphasis was the embedding of social media in the organizing work done by said volunteers, emphasizing both the patterns of social media use and the challenges that result. We show that different social media were used in different ways: Twitter was used in the main for status updates while FB-pages were mostly intended to provide an overview. FB-groups also coordinated a multitude of activities.

    @article{kaufhold_self-organization_2016,
    title = {The {Self}-{Organization} of {Digital} {Volunteers} across {Social} {Media}: {The} {Case} of the 2013 {European} {Floods} in {Germany}},
    volume = {13},
    url = {http://wineme.uni-siegen.de/paper/2016/2016_KaufholdReuter_SelfOrganizationDigitalVolunteersEuropeanFloods_JHSEM.pdf},
    doi = {10.1515/jhsem-2015-0063},
    abstract = {For almost 15 years, social media have been regularly used during emergencies. One of the most recent, and instructive, examples of its widespread use during a large scale scenario in Europe were the 2013 European floods. Public reporting during the event indicated, and our analysis confirms, that Twitter, Facebook (FB), Google Maps and other services were frequently used by affected citizen and volunteers to coordinate help activities among themselves. We conducted a qualitative analysis of selected emergent volunteer communities in Germany on FB and Twitter among others, and subsequently conducted interviews with FB group founders and activists. Our aim was to analyze the use of social media during this particular event, especially by digital volunteers. Our study illustrates the relevance of social media for German citizens in cases of disaster, focusing especially on the role of the moderator. Our specific emphasis was the embedding of social media in the organizing work done by said volunteers, emphasizing both the patterns of social media use and the challenges that result. We show that different social media were used in different ways: Twitter was used in the main for status updates while FB-pages were mostly intended to provide an overview. FB-groups also coordinated a multitude of activities.},
    number = {1},
    journal = {Journal of Homeland Security and Emergency Management (JHSEM)},
    author = {Kaufhold, Marc-André and Reuter, Christian},
    year = {2016},
    keywords = {Cooperation, Crisis, HCI, SocialMedia, Projekt-EmerGent, Projekt-KOKOS, AuswahlKaufhold},
    pages = {137--166},
    }

    2015

  • Christian Reuter (2015)
    Der Einsatz sozialer Medien in Katastrophenlagen
    Crisis Prevention – Fachmagazin für Innere Sicherheit, Bevölkerungsschutz und Katastrophenhilfe ;5(4):43–44.
    [BibTeX] [Abstract] [Download PDF]

    Der umfassende Einsatz sozialer Medien in Katastrophenlagen wurde in Deutschland erstmalig während des mitteleuropäischen Hochwassers im Frühjahr 2013 von einer breiten Öffentlichkeit wahrgenommen. Über Twitter, Facebook, Google Maps und weitere Plattformen koordinierten betroffene Bürger und freiwillige Helfer untereinander Hilfsaktivitäten und unterstützten den Katastrophenschutz. Zahlreiche Medien berichteten über dieses Phänomen. Dieser Artikel soll einen kleinen Überblick über das Thema geben.

    @article{reuter_einsatz_2015,
    title = {Der {Einsatz} sozialer {Medien} in {Katastrophenlagen}},
    volume = {5},
    url = {https://www.wineme.uni-siegen.de/paper/2015/2015_reuter_dereinsatzsozialermedieninkatastrophenlagen_crisisprevention.pdf},
    abstract = {Der umfassende Einsatz sozialer Medien in Katastrophenlagen wurde in Deutschland erstmalig während des mitteleuropäischen Hochwassers im Frühjahr 2013 von einer breiten Öffentlichkeit wahrgenommen. Über Twitter, Facebook, Google Maps und weitere Plattformen koordinierten betroffene Bürger und freiwillige Helfer untereinander Hilfsaktivitäten und unterstützten den Katastrophenschutz. Zahlreiche Medien berichteten über dieses Phänomen. Dieser Artikel soll einen kleinen Überblick über das Thema geben.},
    number = {4},
    journal = {Crisis Prevention – Fachmagazin für Innere Sicherheit, Bevölkerungsschutz und Katastrophenhilfe},
    author = {Reuter, Christian},
    year = {2015},
    keywords = {Crisis, HCI, SocialMedia, Projekt-EmerGent, Projekt-KOKOS},
    pages = {43--44},
    }

  • Christian Reuter (2015)
    Towards Efficient Security: Business Continuity Management in Small and Medium Enterprises
    International Journal of Information Systems for Crisis Response and Management (IJISCRAM) ;7(3):69–79. doi:10.4018/IJISCRAM.2015070105
    [BibTeX] [Abstract] [Download PDF]

    Business Continuity Management BCM is an integral part of civil security in terms of corporate crisis management. According to the ISO 22301 2014 BCM is defined as a holistic management process which identifies potential threats to an organization and the impacts those threats might have on business operations. Looking at the current situation of studies conducted in this field it seems to be obvious that the use of BCM in Small and Medium Enterprises SME is underrepresented and that the security level is partially located in an uneconomical range. This paper presents a literature research on the use of BCM in SME and discusses research findings concerning this matter. Based on this a matrix for possible impacts vs. quality of the crisis management for different actors is derived. The article concludes with the presentation of lightweight und easy to handle BCM security solutions in form of Smart Services, as a possible solution for the increasingly IT relaying industry 4.0.

    @article{reuter_towards_2015,
    title = {Towards {Efficient} {Security}: {Business} {Continuity} {Management} in {Small} and {Medium} {Enterprises}},
    volume = {7},
    url = {https://www.wineme.uni-siegen.de/paper/2015/2015_reuter_towardsefficientsecurity-bcminsme.pdf},
    doi = {10.4018/IJISCRAM.2015070105},
    abstract = {Business Continuity Management BCM is an integral part of civil security in terms of corporate crisis management. According to the ISO 22301 2014 BCM is defined as a holistic management process which identifies potential threats to an organization and the impacts those threats might have on business operations. Looking at the current situation of studies conducted in this field it seems to be obvious that the use of BCM in Small and Medium Enterprises SME is underrepresented and that the security level is partially located in an uneconomical range. This paper presents a literature research on the use of BCM in SME and discusses research findings concerning this matter. Based on this a matrix for possible impacts vs. quality of the crisis management for different actors is derived. The article concludes with the presentation of lightweight und easy to handle BCM security solutions in form of Smart Services, as a possible solution for the increasingly IT relaying industry 4.0.},
    number = {3},
    journal = {International Journal of Information Systems for Crisis Response and Management (IJISCRAM)},
    author = {Reuter, Christian},
    year = {2015},
    keywords = {Projekt-KOKOS, Infrastructure, RSF},
    pages = {69--79},
    }

  • Christian Reuter (2015)
    Betriebliches Kontinuitätsmanagement in kleinen und mittleren Unternehmen – Smart Services für die Industrie 4.0
    Mensch und Computer – Workshopband .
    [BibTeX] [Abstract] [Download PDF]

    Betriebliches Kontinuitätsmanagement (Business Continuity Management, kurz: BCM) ist im Sinne des betrieblichen Notfallmanagements integraler Bestandteil ziviler Sicherheit. BCM ist laut ISO 22301 (2014) ein ganzheitlicher Managementprozess, der potenzielle Bedrohungen für Organisationen und deren Auswirkungen auf Geschäftsabläufe ermittelt. Bei Betrachtung der aktuellen Studienlage liegt der Schluss nahe, dass die Anwendung von BCM in kleinen und mittleren Unternehmen (KMU) unterrepräsentiert ist und der Sicherheitslevel teilweise im nicht-wirtschaftlichen Bereich liegt. Dieser Beitrag stellt den Einsatz von BCM in KMU vor und diskutiert diesbezügliche Forschungsergebnisse. Hierauf aufbauend wird eine Matrix zu möglichen Auswirkungen vs. Umfang und Qualität des Notfallmanagements verschiedener Akteure dargestellt. Abschließend werden leichtgewichtige und einfach zu handhabende BCM-Sicherheitslösungen, in Form von Smart Services, als möglicher Lösungsansatz für die vermehrt von kontinuierlichem IT-Einsatz abhängigen Industrie 4.0 vorgestellt.

    @inproceedings{reuter_betriebliches_2015,
    title = {Betriebliches {Kontinuitätsmanagement} in kleinen und mittleren {Unternehmen} – {Smart} {Services} für die {Industrie} 4.0},
    url = {https://www.wineme.uni-siegen.de/paper/2015/2015_reuter_bcminkmu_smartservicesindustrie40_muc.pdf},
    abstract = {Betriebliches Kontinuitätsmanagement (Business Continuity Management, kurz: BCM) ist im Sinne des betrieblichen Notfallmanagements integraler Bestandteil ziviler Sicherheit. BCM ist laut ISO 22301 (2014) ein ganzheitlicher Managementprozess, der potenzielle Bedrohungen für Organisationen und deren Auswirkungen auf Geschäftsabläufe ermittelt. Bei Betrachtung der aktuellen Studienlage liegt der Schluss nahe, dass die Anwendung von BCM in kleinen und mittleren Unternehmen (KMU) unterrepräsentiert ist und der Sicherheitslevel teilweise im nicht-wirtschaftlichen Bereich liegt. Dieser Beitrag stellt den Einsatz von BCM in KMU vor und diskutiert diesbezügliche Forschungsergebnisse. Hierauf aufbauend wird eine Matrix zu möglichen Auswirkungen vs. Umfang und Qualität des Notfallmanagements verschiedener Akteure dargestellt. Abschließend werden leichtgewichtige und einfach zu handhabende BCM-Sicherheitslösungen, in Form von Smart Services, als möglicher Lösungsansatz für die vermehrt von kontinuierlichem IT-Einsatz abhängigen Industrie 4.0 vorgestellt.},
    booktitle = {Mensch und {Computer} - {Workshopband}},
    publisher = {Oldenbourg-Verlag},
    author = {Reuter, Christian},
    editor = {Schmidt, Albrecht and Weisbecke, Anette and Burmester, Michael},
    year = {2015},
    keywords = {Projekt-EmerGent, UsableSec, Security, Projekt-KOKOS, Infrastructure},
    pages = {37--44},
    }

  • Christian Reuter, Tilo Mentler, Stefan Geisler (2015)
    Special Issue on Human Computer Interaction in Critical Systems I: Citizen and Volunteers – International Journal of Information Systems for Crisis Response and Management (IJISCRAM)
    IGI Global.
    [BibTeX] [Abstract] [Download PDF]

    Human computer interaction in security and time-critical systems is an interdisciplinary challenge at the seams of human factors, engineering, information systems and computer science. Application fields include control systems, critical infrastructures, vehicle and traffic management, production technology, business continuity management, medical technology, crisis management and civil protection. Nowadays in many areas mobile and ubiquitous computing as well as social media and collaborative technologies also plays an important role. The specific challenges require the discussion and development of new methods and approaches in order to design information systems. These are going to be addressed in this special issue with a particular focus on technologies for citizen and volunteers in emergencies.

    @book{reuter_special_2015,
    title = {Special {Issue} on {Human} {Computer} {Interaction} in {Critical} {Systems} {I}: {Citizen} and {Volunteers} - {International} {Journal} of {Information} {Systems} for {Crisis} {Response} and {Management} ({IJISCRAM})},
    volume = {7},
    url = {https://www.wineme.uni-siegen.de/paper/2015/2015_ijiscram-specialissue_hci-criticalsystems-i.pdf},
    abstract = {Human computer interaction in security and time-critical systems is an interdisciplinary challenge at the seams of human factors, engineering, information systems and computer science. Application fields include control systems, critical infrastructures, vehicle and traffic management, production technology, business continuity management, medical technology, crisis management and civil protection. Nowadays in many areas mobile and ubiquitous computing as well as social media and collaborative technologies also plays an important role. The specific challenges require the discussion and development of new methods and approaches in order to design information systems. These are going to be addressed in this special issue with a particular focus on technologies for citizen and volunteers in emergencies.},
    number = {2},
    publisher = {IGI Global},
    author = {Reuter, Christian and Mentler, Tilo and Geisler, Stefan},
    year = {2015},
    note = {Publication Title: International Journal of Information Systems for Crisis Response and Management (IJISCRAM)},
    keywords = {Crisis, HCI, SocialMedia, Projekt-EmerGent, Projekt-KOKOS},
    }

  • Christian Reuter (2015)
    Special Issue on Human Computer Interaction in Critical Systems II: Authorities and Industry – International Journal of Information Systems for Crisis Response and Management (IJISCRAM)
    IGI Global.
    [BibTeX] [Abstract] [Download PDF]

    Human computer interaction in security and time-critical systems is an interdisciplinary challenge at the seams of human factors, engineering, information systems and computer science. Application fields include control systems, critical infrastructures, vehicle and traffic management, production technology, business continuity management, medical technology, crisis management and civil protection. Nowadays in many areas mobile and ubiquitous computing as well as social media and collaborative technologies also plays an important role. The specific challenges require the discussion and development of new methods and approaches in order to design information systems. These are going to be addressed in this special issue with a particular focus on technologies for critical practices for authorities and industry.

    @book{reuter_special_2015-1,
    title = {Special {Issue} on {Human} {Computer} {Interaction} in {Critical} {Systems} {II}: {Authorities} and {Industry} - {International} {Journal} of {Information} {Systems} for {Crisis} {Response} and {Management} ({IJISCRAM})},
    volume = {7},
    url = {https://www.wineme.uni-siegen.de/paper/2015/2015_ijiscram-specialissue_hci-criticalsystems-ii.pdf},
    abstract = {Human computer interaction in security and time-critical systems is an interdisciplinary challenge at the seams of human factors, engineering, information systems and computer science. Application fields include control systems, critical infrastructures, vehicle and traffic management, production technology, business continuity management, medical technology, crisis management and civil protection. Nowadays in many areas mobile and ubiquitous computing as well as social media and collaborative technologies also plays an important role. The specific challenges require the discussion and development of new methods and approaches in order to design information systems. These are going to be addressed in this special issue with a particular focus on technologies for critical practices for authorities and industry.},
    number = {3},
    publisher = {IGI Global},
    author = {Reuter, Christian},
    year = {2015},
    note = {Publication Title: International Journal of Information Systems for Crisis Response and Management (IJISCRAM)},
    keywords = {HCI, SocialMedia, Projekt-EmerGent, Projekt-KOKOS},
    }

    InfoStrom: Lernende Informationsinfrastrukturen im Krisenmanagement am Beispiel der Stromversorgung (2010-2013, BMBF)

    InfoStrom: Lernende Informationsinfrastrukturen im Krisenmanagement am Beispiel der Stromversorgung (2010-2013, BMBF)

    Strom ist für viele Versorgungssysteme, wie etwa bei der IT-Kommunikation, im ÖPNV oder dem Gesundheitswesen, entscheidend. Ausfälle sind zwar eher selten, doch wenn sie auftreten und länger andauern, treffen sie die Bevölkerung unvorbereitet und richten großen Schaden an. In so einem Fall sind Information und Kommunikation entscheidende Faktoren zur raschen Wiederherstellung der Stromversorgung. Daher hat das Projekt InfoStrom eine dezentrale, IT-gestützte Sicherheitsplattform erarbeitet, die alle relevanten Akteure, wie Energieversorger, Feuerwehr und Polizei, miteinander vernetzt. Über diese Sicherheitsplattform können Informationen gesammelt, bewertet, priorisiert und nutzergerecht abgebildet werden.

    2016

  • Christian Reuter, Thomas Ludwig, Volkmar Pipek (2016)
    Kooperative Resilienz – ein soziotechnischer Ansatz durch Kooperationstechnologien im Krisenmanagement
    Gruppe. Interaktion. Organisation. Zeitschrift für Angewandte Organisationspsychologie (GIO) ;47(2):159–169. doi:10.1007/s11612-016-0317-7
    [BibTeX] [Abstract] [Download PDF]

    Während das Konzept der Resilienz in den Ingenieurwissenschaften vornehmlich auf die Verfügbarkeit technischer Systeme fokussiert ist, betrachtet unser Beitrag Resilienz als soziotechnisches Konstrukt und zeigt Möglichkeiten zur Förderung kooperativer Resilienz, insbesondere durch Kooperationstechnologie, auf. Nach einer Definition von Resilienz im Allgemeinen und im Katastrophenschutz – unserem Anwendungsfeld – sowie im Kontext kooperativer Strukturen, stellen wir unsere Methodik und die entwickelten Kooperationstechnologien vor. Diese adressieren die Zusammenarbeit verschiedener Akteure (z. B. Feuerwehr, Polizei, Bevölkerung) in Schadenslagen. Abschließend diskutieren wir den Beitrag dieser Technologien zur kooperativen Resilienz als Fähigkeit, Krisen der Kooperation durch Anpassungsfähigkeit an geänderte Realitäten mithilfe von Kooperationstechnologie zu überstehen.

    @article{reuter_kooperative_2016,
    title = {Kooperative {Resilienz} – ein soziotechnischer {Ansatz} durch {Kooperationstechnologien} im {Krisenmanagement}},
    volume = {47},
    url = {https://www.wineme.uni-siegen.de/paper/2016/2016_reuterludwigpipek_kooperativeresilienz_gio.pdf},
    doi = {10.1007/s11612-016-0317-7},
    abstract = {Während das Konzept der Resilienz in den Ingenieurwissenschaften vornehmlich auf die Verfügbarkeit technischer Systeme fokussiert ist, betrachtet unser Beitrag Resilienz als soziotechnisches Konstrukt und zeigt Möglichkeiten zur Förderung kooperativer Resilienz, insbesondere durch Kooperationstechnologie, auf. Nach einer Definition von Resilienz im Allgemeinen und im Katastrophenschutz – unserem Anwendungsfeld – sowie im Kontext kooperativer Strukturen, stellen wir unsere Methodik und die entwickelten Kooperationstechnologien vor. Diese adressieren die Zusammenarbeit verschiedener Akteure (z. B. Feuerwehr, Polizei, Bevölkerung) in Schadenslagen. Abschließend diskutieren wir den Beitrag dieser Technologien zur kooperativen Resilienz als Fähigkeit, Krisen der Kooperation durch Anpassungsfähigkeit an geänderte Realitäten mithilfe von Kooperationstechnologie zu überstehen.},
    number = {2},
    journal = {Gruppe. Interaktion. Organisation. Zeitschrift für Angewandte Organisationspsychologie (GIO)},
    author = {Reuter, Christian and Ludwig, Thomas and Pipek, Volkmar},
    year = {2016},
    keywords = {Cooperation, Crisis, HCI, Projekt-InfoStrom, Projekt-EmerGent, Projekt-KOKOS, RSF},
    pages = {159--169},
    }

  • Christian Reuter (2016)
    Chapter 44: Communication between Power Blackout and Mobile Network Overload
    In: Mehdi Khosrow-Pour: E-Health and Telemedicine: Concepts, Methodologies, Tools, and Applications. IGI Global, , 876–891.
    [BibTeX] [Abstract] [Download PDF]

    In cases of power outages the communication of organizations responsible for recovery work (emergency services, public administration, energy network operators) to the public poses several challenges, pri-marily the breakdowns of many communication infrastructures and therefore the limitations of the use of classical communication media. This paper surveys technical concepts to support crisis communica-tion during blackouts. Therefore it first investigates the perception and information demands of citizens and communication infrastructures in different scenarios. Furthermore, it analyzes communication infrastructures and their availability in different scenarios. Finally it proposes ‘BlaCom‘, an ICT-based concept for blackout communication, which addresses the time span between the occurrence of the energy blackout and the possible overload of the mobile phone network. It combines general information with location-specific and setting-specific information, was implemented as a prototype smartphone application and evaluated with 12 potential end users.

    @incollection{reuter_chapter_2016,
    title = {Chapter 44: {Communication} between {Power} {Blackout} and {Mobile} {Network} {Overload}},
    volume = {II},
    isbn = {978-1-4666-8756-1},
    url = {https://www.wineme.uni-siegen.de/paper/2016/2016_reuter_communicationpowerblackoutnetworkoverload_ehealth.pdf},
    abstract = {In cases of power outages the communication of organizations responsible for recovery work (emergency services, public administration, energy network operators) to the public poses several challenges, pri-marily the breakdowns of many communication infrastructures and therefore the limitations of the use of classical communication media. This paper surveys technical concepts to support crisis communica-tion during blackouts. Therefore it first investigates the perception and information demands of citizens and communication infrastructures in different scenarios. Furthermore, it analyzes communication infrastructures and their availability in different scenarios. Finally it proposes ‘BlaCom', an ICT-based concept for blackout communication, which addresses the time span between the occurrence of the energy blackout and the possible overload of the mobile phone network. It combines general information with location-specific and setting-specific information, was implemented as a prototype smartphone application and evaluated with 12 potential end users.},
    booktitle = {E-{Health} and {Telemedicine}: {Concepts}, {Methodologies}, {Tools}, and {Applications}},
    publisher = {IGI Global},
    author = {Reuter, Christian},
    editor = {{Mehdi Khosrow-Pour}},
    year = {2016},
    keywords = {Crisis, HCI, Projekt-InfoStrom, Projekt-EmerGent, Infrastructure, RSF},
    pages = {876--891},
    }

    2015

  • Christian Reuter (2015)
    Emergente Kollaborationsinfrastrukturen – Technologiegestaltung am Beispiel des inter-organisationalen Krisenmanagements
    In: Steffen Hölldobler: Ausgezeichnete Informatikdissertationen 2014. GI- Edition-Lecture Notes in Informatics (LNI), D-14. Bonner Köllen Verlag, , 209–218.
    [BibTeX] [Abstract] [Download PDF]

    Am Beispiel des Krisenmanagements untersucht die hier vorgestellte Dissertation die Herausforderungen und Möglichkeiten der Technologiegestaltung für emergente, d.h. dynamische und nicht vorhersehbare, Kontexte. Hierfür wird empirisch die kollaborative Arbeit von Polizei, Feuerwehr, Energienetzbetreibern und Bürgern im inter-organisationalen Katastrophenschutz erforscht, um exemplarische Kollaborationspraktiken zu ermitteln, die Limitationen der Arbeitsinfrastruktur aufdecken. Hierauf aufbauend werden neuartige Konzepte und IT-Artefakte gestaltet, implementiert und evaluiert, die emergente Kollaboration ermöglichen sollen. Neben der Erforschung potentieller organisationaler Effekte auf die Fähigkeit mit Emergenz umzugehen, werden methodische Implikationen für die Technologiegestaltung abgeleitet.

    @incollection{reuter_emergente_2015,
    title = {Emergente {Kollaborationsinfrastrukturen} – {Technologiegestaltung} am {Beispiel} des inter-organisationalen {Krisenmanagements}},
    url = {https://www.wineme.uni-siegen.de/paper/2015/2015_reuter_emergentekollaborationstechnologien_gi-dissertationspreis.pdf},
    abstract = {Am Beispiel des Krisenmanagements untersucht die hier vorgestellte Dissertation die Herausforderungen und Möglichkeiten der Technologiegestaltung für emergente, d.h. dynamische und nicht vorhersehbare, Kontexte. Hierfür wird empirisch die kollaborative Arbeit von Polizei, Feuerwehr, Energienetzbetreibern und Bürgern im inter-organisationalen Katastrophenschutz erforscht, um exemplarische Kollaborationspraktiken zu ermitteln, die Limitationen der Arbeitsinfrastruktur aufdecken. Hierauf aufbauend werden neuartige Konzepte und IT-Artefakte gestaltet, implementiert und evaluiert, die emergente Kollaboration ermöglichen sollen. Neben der Erforschung potentieller organisationaler Effekte auf die Fähigkeit mit Emergenz umzugehen, werden methodische Implikationen für die Technologiegestaltung abgeleitet.},
    booktitle = {Ausgezeichnete {Informatikdissertationen} 2014. {GI}- {Edition}-{Lecture} {Notes} in {Informatics} ({LNI}), {D}-14},
    publisher = {Bonner Köllen Verlag},
    author = {Reuter, Christian},
    editor = {Hölldobler, Steffen},
    year = {2015},
    keywords = {Crisis, HCI, Projekt-InfoStrom, SocialMedia, Ranking-CORE-C, Ranking-VHB-C, UsableSec, Infrastructure, RSF},
    pages = {209--218},
    }

    2014

  • Christian Reuter, Thomas Ludwig, Volkmar Pipek (2014)
    Ad Hoc Participation in Situation Assessment: Supporting Mobile Collaboration in Emergencies
    ACM Transactions on Computer-Human Interaction (TOCHI) ;21(5):1–26. doi:10.1145/2651365
    [BibTeX] [Abstract] [Download PDF]

    Emergencies are characterized by high complexity and unpredictability. In order to assess and manage them successfully, improvisation work and informal communication, even beyond local and organizational boundaries, is needed. Such informal practices can facilitate ad hoc participation of units in situation assessment, but this may lack overall situation awareness. This paper presents a study on how emergent ‘collaboration needs‘ in current work of response teams, who are located on-site and in the control center, could be supported by mobile geo-collaboration systems. First, we present the results of an empirical study about informal work and mobile collaboration practices of emergency services. Then we describe the concept of a mobile geo-collaboration system that addresses the aspects detected in the empirical study and that was implemented as an Android application using web sockets, a technology enabling full-duplex ad hoc communication. Finally we outline the findings of its evaluation in practice and its implications.

    @article{reuter_ad_2014,
    title = {Ad {Hoc} {Participation} in {Situation} {Assessment}: {Supporting} {Mobile} {Collaboration} in {Emergencies}},
    volume = {21},
    url = {http://www.wineme.uni-siegen.de/paper/2014/2014_reuterludwigpipek_adhocparticipation_tochi.pdf},
    doi = {10.1145/2651365},
    abstract = {Emergencies are characterized by high complexity and unpredictability. In order to assess and manage them successfully, improvisation work and informal communication, even beyond local and organizational boundaries, is needed. Such informal practices can facilitate ad hoc participation of units in situation assessment, but this may lack overall situation awareness. This paper presents a study on how emergent ‘collaboration needs' in current work of response teams, who are located on-site and in the control center, could be supported by mobile geo-collaboration systems. First, we present the results of an empirical study about informal work and mobile collaboration practices of emergency services. Then we describe the concept of a mobile geo-collaboration system that addresses the aspects detected in the empirical study and that was implemented as an Android application using web sockets, a technology enabling full-duplex ad hoc communication. Finally we outline the findings of its evaluation in practice and its implications.},
    number = {5},
    journal = {ACM Transactions on Computer-Human Interaction (TOCHI)},
    author = {Reuter, Christian and Ludwig, Thomas and Pipek, Volkmar},
    month = nov,
    year = {2014},
    note = {Publisher: ACM},
    keywords = {Cooperation, Crisis, HCI, Projekt-InfoStrom, Selected, UsableSec, A-Paper, Ranking-CORE-A*, Ranking-ImpactFactor, Ranking-VHB-B, Ranking-WKWI-A, AuswahlUsableSec},
    pages = {1--26},
    }

  • Thomas Ludwig, Christian Reuter (2014)
    Entwicklung einer mobilen Reporting-Applikation zur Artikulation entscheidungsrelevanter Informationsbedarfe im Katastrophenschutz
    Informatik 2014 – Big Data – Komplexität meistern Stuttgart, Germany.
    [BibTeX] [Abstract] [Download PDF]

    Die im Katastrophenschutz beteiligten Behörden und Organisationen mit Sicherheitsaufgaben (BOS) benötigen für Entscheidungen stets möglichst aktuelle und genaue Informationen. Diese werden dabei je nach Lage von den Einsatzkräften, welche sich am Schadensort befinden, via Funk an die teilweise entfernt sitzenden Entscheidungsträger berichtet. Unsere Design-Fallstudie untersucht interaktive Unterstützungsmöglichkeiten dieser Berichts- bzw. Reporting-Prozesse: In einer qualitativen empirischen Studie deckten wir die Kommunikationspraktiken von BOS auf und entwickelten darauf aufbauend ein Konzept zur semi-strukturierten Artikulation von Informationsbedarfen, welches als mobile Android Applikation implementiert und mit potentiellen Nutzern evaluiert wurde. Unser Beitrag präsentiert, wie zielgerichtete Anfragen von Informationen unter Berücksichtigung angemessener Metadaten das Berichts- und Meldewesen örtlich verteilter Einsatzkräfte unterstützen können.

    @inproceedings{ludwig_entwicklung_2014,
    address = {Stuttgart, Germany},
    title = {Entwicklung einer mobilen {Reporting}-{Applikation} zur {Artikulation} entscheidungsrelevanter {Informationsbedarfe} im {Katastrophenschutz}},
    url = {https://www.wineme.uni-siegen.de/paper/2014/2014_ludwigreuter_morepartikulation_inf.pdf},
    abstract = {Die im Katastrophenschutz beteiligten Behörden und Organisationen mit Sicherheitsaufgaben (BOS) benötigen für Entscheidungen stets möglichst aktuelle und genaue Informationen. Diese werden dabei je nach Lage von den Einsatzkräften, welche sich am Schadensort befinden, via Funk an die teilweise entfernt sitzenden Entscheidungsträger berichtet. Unsere Design-Fallstudie untersucht interaktive Unterstützungsmöglichkeiten dieser Berichts- bzw. Reporting-Prozesse: In einer qualitativen empirischen Studie deckten wir die Kommunikationspraktiken von BOS auf und entwickelten darauf aufbauend ein Konzept zur semi-strukturierten Artikulation von Informationsbedarfen, welches als mobile Android Applikation implementiert und mit potentiellen Nutzern evaluiert wurde. Unser Beitrag präsentiert, wie zielgerichtete Anfragen von Informationen unter Berücksichtigung angemessener Metadaten das Berichts- und Meldewesen örtlich verteilter Einsatzkräfte unterstützen können.},
    booktitle = {Informatik 2014 - {Big} {Data} - {Komplexität} meistern},
    publisher = {GI-Edition-Lecture Notes in Informatics (LNI)},
    author = {Ludwig, Thomas and Reuter, Christian},
    editor = {Plöderereder, E. and Grunske, L. and Schneider, E. and Ull, D.},
    year = {2014},
    keywords = {Cooperation, Crisis, HCI, Projekt-InfoStrom, Ranking-CORE-C, Ranking-VHB-C},
    pages = {941--952},
    }

  • Benedikt Ley, Thomas Ludwig, Volkmar Pipek, Dave Randall, Christian Reuter, Torben Wiedenhoefer (2014)
    Information and Expertise Sharing in Inter-Organizational Crisis Management
    Computer Supported Cooperative Work: The Journal of Collaborative Computing (JCSCW) ;23(4-6):347–387. doi:10.1007/s10606-014-9205-2
    [BibTeX] [Abstract] [Download PDF]

    Emergency or crisis management, as is well-attested, is a complex management problem. A variety of agencies need to collaborate and coordinate in real-time and with an urgency that is not always present in other domains. It follows that accurate information of varying kinds (e.g. geographical and weather conditions; available skills and expertises; state-of-play; current dispositions and deployments) needs to be made available in a timely fashion to the organizations and individuals who need it. By definition, this information will come from a number of sources both within and across organizations. Large-scale events in particular necessitate collaboration with other organizations. Of course, plans and processes exist to deal with such events but the number of dynamically changing factors as well as the high number of heterogeneous organizations and the high degree of interdependency involved make it impossible to plan for all contingencies. A degree of ongoing improvisation, which typically occurs by means of a variety of information and expertise sharing practices, therefore becomes necessary. This, however, faces many challenges, such as different organizational cultures, distinct individual and coordinative work practices and discrete information systems. Our work entails an examination of the practices of information and expertise sharing, and the obstacles to it, in inter-organizational crisis management. We conceive of this as a design case study, such that we examine a problem area and its scope; conduct detailed enquiries into practice in that area, and provide design recommendations for implementation and evaluation. First, we will present the results of an empirical study of collaboration practices between organizations and public authorities with security responsibilities such as the police, fire departments, public administration and electricity network operators, mainly in scenarios of medium to large power outages in Germany. Based on these results, we will describe a concept, which was designed, implemented and evaluated as a system prototype, in two iterations. While the first iteration focuses on situation assessment, the second iteration also includes inter-organizational collaboration functionalities. Based on the findings of our evaluations with practitioners, we will discuss how to support collaboration with a particular focus on information and expertise sharing.

    @article{ley_information_2014,
    title = {Information and {Expertise} {Sharing} in {Inter}-{Organizational} {Crisis} {Management}},
    volume = {23},
    url = {https://www.wineme.uni-siegen.de/paper/2014/2014_informationsharingcrisis_jcscw.pdf},
    doi = {10.1007/s10606-014-9205-2},
    abstract = {Emergency or crisis management, as is well-attested, is a complex management problem. A variety of agencies need to collaborate and coordinate in real-time and with an urgency that is not always present in other domains. It follows that accurate information of varying kinds (e.g. geographical and weather conditions; available skills and expertises; state-of-play; current dispositions and deployments) needs to be made available in a timely fashion to the organizations and individuals who need it. By definition, this information will come from a number of sources both within and across organizations. Large-scale events in particular necessitate collaboration with other organizations. Of course, plans and processes exist to deal with such events but the number of dynamically changing factors as well as the high number of heterogeneous organizations and the high degree of interdependency involved make it impossible to plan for all contingencies. A degree of ongoing improvisation, which typically occurs by means of a variety of information and expertise sharing practices, therefore becomes necessary. This, however, faces many challenges, such as different organizational cultures, distinct individual and coordinative work practices and discrete information systems. Our work entails an examination of the practices of information and expertise sharing, and the obstacles to it, in inter-organizational crisis management. We conceive of this as a design case study, such that we examine a problem area and its scope; conduct detailed enquiries into practice in that area, and provide design recommendations for implementation and evaluation. First, we will present the results of an empirical study of collaboration practices between organizations and public authorities with security responsibilities such as the police, fire departments, public administration and electricity network operators, mainly in scenarios of medium to large power outages in Germany. Based on these results, we will describe a concept, which was designed, implemented and evaluated as a system prototype, in two iterations. While the first iteration focuses on situation assessment, the second iteration also includes inter-organizational collaboration functionalities. Based on the findings of our evaluations with practitioners, we will discuss how to support collaboration with a particular focus on information and expertise sharing.},
    number = {4-6},
    journal = {Computer Supported Cooperative Work: The Journal of Collaborative Computing (JCSCW)},
    author = {Ley, Benedikt and Ludwig, Thomas and Pipek, Volkmar and Randall, Dave and Reuter, Christian and Wiedenhoefer, Torben},
    year = {2014},
    keywords = {Cooperation, Crisis, HCI, Projekt-InfoStrom, A-Paper, Ranking-ImpactFactor, Ranking-VHB-B, Ranking-CORE-B},
    pages = {347--387},
    }

  • Christian Reuter (2014)
    Communication between Power Blackout and Mobile Network Overload
    International Journal of Information Systems for Crisis Response and Management (IJISCRAM) ;6(2):38–53. doi:10.4018/ijiscram.2014040103
    [BibTeX] [Abstract] [Download PDF]

    In cases of power outages the communication of organizations responsible for recovery work (emergency services, public administration, energy network operators) to the public poses several challenges, primarily the breakdowns of many communication infrastructures and therefore the limitations of the use of classical communication media. This paper surveys technical concepts to support crisis communication during blackouts. Therefore it first investigates the perception and information demands of citizens and communication infrastructures in different scenarios. Furthermore, it analyzes communication infrastructures and their availability in different scenarios. Finally it proposes ‘BlaCom‘, an ICT-based concept for blackout communication, which addresses the time span between the occurrence of the energy blackout and the possible overload of the mobile phone network. It combines general information with location-specific and setting-specific information, was implemented as a prototype smartphone application and evaluated with 12 potential end users.

    @article{reuter_communication_2014,
    title = {Communication between {Power} {Blackout} and {Mobile} {Network} {Overload}},
    volume = {6},
    url = {https://peasec.de/paper/2014/2014_Reuter_BlackoutCommunication_IJISCRAM.pdf},
    doi = {10.4018/ijiscram.2014040103},
    abstract = {In cases of power outages the communication of organizations responsible for recovery work (emergency services, public administration, energy network operators) to the public poses several challenges, primarily the breakdowns of many communication infrastructures and therefore the limitations of the use of classical communication media. This paper surveys technical concepts to support crisis communication during blackouts. Therefore it first investigates the perception and information demands of citizens and communication infrastructures in different scenarios. Furthermore, it analyzes communication infrastructures and their availability in different scenarios. Finally it proposes ‘BlaCom', an ICT-based concept for blackout communication, which addresses the time span between the occurrence of the energy blackout and the possible overload of the mobile phone network. It combines general information with location-specific and setting-specific information, was implemented as a prototype smartphone application and evaluated with 12 potential end users.},
    number = {2},
    journal = {International Journal of Information Systems for Crisis Response and Management (IJISCRAM)},
    author = {Reuter, Christian},
    year = {2014},
    keywords = {Projekt-InfoStrom, Infrastructure, RSF},
    pages = {38--53},
    }

  • Christian Reuter (2014)
    Emergent Collaboration Infrastructures: Technology Design for Inter-Organizational Crisis Management (Ph.D. Thesis)
    University of Siegen, Institute for Information Systems, Germany: Springer Gabler. doi:10.1007/978-3-658-08586-5
    [BibTeX] [Abstract] [Download PDF]

    Using the domain of crisis management, Christian Reuter explores challenges and opportunities for technology design in emergent environments. He therefore empirically analyzes collaborative work in inter-organizational crisis – such as the police, fire departments, energy network operators and citizens – in order to identify collaboration practices that reveal work infrastructure limitations. He also designs, implements and evaluates novel concepts and ICT artifacts towards the support of emergent collaboration. Besides the discovery of potential organizational effects on the ability to deal with emergence he presents methodological implications for technology design.

    @book{reuter_emergent_2014,
    address = {University of Siegen, Institute for Information Systems, Germany},
    title = {Emergent {Collaboration} {Infrastructures}: {Technology} {Design} for {Inter}-{Organizational} {Crisis} {Management} ({Ph}.{D}. {Thesis})},
    isbn = {978-3-658-08585-8},
    url = {http://www.springer.com/springer+gabler/bwl/wirtschaftsinformatik/book/978-3-658-08585-8},
    abstract = {Using the domain of crisis management, Christian Reuter explores challenges and opportunities for technology design in emergent environments. He therefore empirically analyzes collaborative work in inter-organizational crisis – such as the police, fire departments, energy network operators and citizens – in order to identify collaboration practices that reveal work infrastructure limitations. He also designs, implements and evaluates novel concepts and ICT artifacts towards the support of emergent collaboration. Besides the discovery of potential organizational effects on the ability to deal with emergence he presents methodological implications for technology design.},
    publisher = {Springer Gabler},
    author = {Reuter, Christian},
    year = {2014},
    doi = {10.1007/978-3-658-08586-5},
    note = {Backup Publisher: University of Siegen},
    keywords = {HCI, Projekt-InfoStrom, Selected, SocialMedia, Projekt-EmerGent, UsableSec, Infrastructure, AuswahlUsableSec, Dissertation},
    }

  • Christian Reuter (2014)
    Emergent Collaboration Infrastructures: Technology Design for Inter-Organizational Crisis Management (Ph.D. Thesis)
    University of Siegen, Institute for Information Systems, Germany: Universitätsbibliothek Siegen.
    [BibTeX] [Abstract] [Download PDF]

    The complexity and interconnectedness of current working environments encourages organizations, businesses and individuals to collaborate beyond spatial, temporal as well as organizational boundaries. These collaborations are potentially supported by information and communication technology (ICT) among mobile and ubiquitous systems. The academic field Computer-Supported Cooperative Work (CSCW) is primarily recognized for focusing on ICT support for collaboration practices as opposed to the computerizing of formal procedures. ICT, in this view, needs to reflect the dynamic nature of cooperation and collaboration. The notion emergence as coined by Lewes (1875) and interpreted by Goldstein (1999) refers to dynamic contexts that cannot be anticipated in their full extent before they actually occur. Emergent collaboration refers to the need for spontaneous collaboration in novel and changing structures and occurs in application fields such as inter-organizational crisis and emergency management, which by definition contain the unforeseeable. This dissertation contributes to research into infrastructures for emergent collaboration. Using the example of crisis management, it addresses (1) emergent collaboration practices and how they reveal work infrastructure limitations, (2) novel concepts and artifacts to support emergent collaboration, (3) their effects on the ability to deal with emergent situations and (4) methodological implications for technology design for emergent collaboration infrastructures in inter-organizational settings. Design case studies (Wulf et al., 2011), inspired by action research (Lewin, 1958) and following Hevner and Chatterjee’s suggestion (2010) to integrate action research with design research, are applied as a practice oriented research method. They contain three phases: an empirical analysis of the practices in the field, the development of innovative ICT artifacts with continuous participation of end-users related to the empirical findings and the evaluation of their appropriation (Pipek, 2005) in practice. In the case reported here, the empirical study on emergent collaboration by police and fire services, aid agencies, energy network operators and citizens in emergencies in two counties in Germany outlined the importance of improvisation work in situation assessment as well as mobile collaboration and reporting practices. The ICT design aimed towards the support of these emergent practices, illustrated by various concepts and prototypes. They comprise (1) an inter-organizational social network for emergency management (SiRena), (2) an inter-organizational situation assessment client (ISAC) aswell as mobile applications for (3) the ad hoc participation in mobile collaboration (MoCo) and (4) the articulation of information needs in mobile reporting (MoRep). Based on the empirical, technical and practical findings, the subsequent analysis uses the concept of infrastructuring (Pipek & Wulf, 2009), the integrated perspective on the design and use of information systems, and derives implications for emergent collaboration infrastructures, which contribute overall to the academic fields CSCW, Human Computer Interaction (HCI) and Information Systems (IS).

    @book{reuter_emergent_2014-1,
    address = {University of Siegen, Institute for Information Systems, Germany},
    title = {Emergent {Collaboration} {Infrastructures}: {Technology} {Design} for {Inter}-{Organizational} {Crisis} {Management} ({Ph}.{D}. {Thesis})},
    url = {http://dx.doi.org/10.25819/ubsi/10370},
    abstract = {The complexity and interconnectedness of current working environments encourages organizations, businesses and individuals to collaborate beyond spatial, temporal as well as organizational boundaries. These collaborations are potentially supported by information and communication technology (ICT) among mobile and ubiquitous systems. The academic field Computer-Supported Cooperative Work (CSCW) is primarily recognized for focusing on ICT support for collaboration practices as opposed to the computerizing of formal procedures. ICT, in this view, needs to reflect the dynamic nature of cooperation and collaboration. The notion emergence as coined by Lewes (1875) and interpreted by Goldstein (1999) refers to dynamic contexts that cannot be anticipated in their full extent before they actually occur. Emergent collaboration refers to the need for spontaneous collaboration in novel and changing structures and occurs in application fields such as inter-organizational crisis and emergency management, which by definition contain the unforeseeable.
    This dissertation contributes to research into infrastructures for emergent collaboration. Using the example of crisis management, it addresses (1) emergent collaboration practices and how they reveal work infrastructure limitations, (2) novel concepts and artifacts to support emergent collaboration, (3) their effects on the ability to deal with emergent situations and (4) methodological implications for technology design for emergent collaboration infrastructures in inter-organizational settings.
    Design case studies (Wulf et al., 2011), inspired by action research (Lewin, 1958) and following Hevner and Chatterjee’s suggestion (2010) to integrate action research with design research, are applied as a practice oriented research method. They contain three phases: an empirical analysis of the practices in the field, the development of innovative ICT artifacts with continuous participation of end-users related to the empirical findings and the evaluation of their appropriation (Pipek, 2005) in practice. In the case reported here, the empirical study on emergent collaboration by police and fire services, aid agencies, energy network operators and citizens in emergencies in two counties in Germany outlined the importance of improvisation work in situation assessment as well as mobile collaboration and reporting practices. The ICT design aimed towards the support of these emergent practices, illustrated by various concepts and prototypes. They comprise (1) an inter-organizational social network for emergency management (SiRena), (2) an inter-organizational situation assessment client (ISAC) aswell as mobile applications for (3) the ad hoc participation in mobile collaboration (MoCo) and (4) the articulation of information needs in mobile reporting (MoRep).
    Based on the empirical, technical and practical findings, the subsequent analysis uses the concept of infrastructuring (Pipek \& Wulf, 2009), the integrated perspective on the design and use of information systems, and derives implications for emergent collaboration infrastructures, which contribute overall to the academic fields CSCW, Human Computer Interaction (HCI) and Information Systems (IS).},
    publisher = {Universitätsbibliothek Siegen},
    author = {Reuter, Christian},
    year = {2014},
    keywords = {HCI, Projekt-InfoStrom, SocialMedia, Projekt-EmerGent, UsableSec, Infrastructure, Dissertation},
    }

    2013

  • Volkmar Pipek, Christian Reuter, Benedikt Ley, Thomas Ludwig, Torben Wiedenhoefer (2013)
    Sicherheitsarena – Ein Ansatz zur Verbesserung des Krisenmanagements durch Kooperation und Vernetzung
    Bonn, Germany: 2013.
    [BibTeX] [Download PDF]

    @techreport{pipek_sicherheitsarena_2013,
    address = {Bonn, Germany},
    title = {Sicherheitsarena – {Ein} {Ansatz} zur {Verbesserung} des {Krisenmanagements} durch {Kooperation} und {Vernetzung}},
    url = {http://www.peasec.de/paper/2013/2013_PipekReuterLeyLudwigWiedenhoefer_Sicherheitsarena_CrisisPrevention.pdf},
    number = {3},
    author = {Pipek, Volkmar and Reuter, Christian and Ley, Benedikt and Ludwig, Thomas and Wiedenhoefer, Torben},
    year = {2013},
    keywords = {Cooperation, Crisis, HCI, Projekt-InfoStrom, UsableSec},
    pages = {58--59},
    }

  • Thomas Ludwig, Christian Reuter, Volkmar Pipek (2013)
    What You See Is What I Need: Mobile Reporting Practices in Emergencies
    Proceedings of the European Conference on Computer Supported Cooperative Work (ECSCW) Paphos, Cyrus. doi:10.1007/978-1-4471-5346-7_10
    [BibTeX] [Abstract] [Download PDF]

    Decisions of emergency response organisations (police, fire fighters, infrastructure providers, etc.) rely on accurate and timely information. Some necessary information is integrated into control centre’s IT (weather, availability of electricity, gauge information, etc.), but almost every decision needs to be based on very specific information of the current crisis situation. Due to the unpredictable nature of a crisis, gathering this kind of information requires much improvisation and articulation work which we aim to support. We present a study on how different emergency response organisations communicate with teams on-site to generate necessary information for the coordinating instances, and we described, implemented and evaluated an interaction concept as well as a prototype to support this communication by a semi-structured request-and-report system based on Android devices. We learned that (1) the accuracy of request and reports can be improved by using an appropriate metadata structure in addition to creating multimedia-based information content, (2) requirements of trusted and fast information need to be respected in support concepts although they may even be contradictory, and (3) the coordination strategy of the emergency response organisation also shapes the way this interaction needs to be designed.

    @inproceedings{ludwig_what_2013,
    address = {Paphos, Cyrus},
    title = {What {You} {See} {Is} {What} {I} {Need}: {Mobile} {Reporting} {Practices} in {Emergencies}},
    url = {http://link.springer.com/chapter/10.1007/978-1-4471-5346-7_10},
    doi = {10.1007/978-1-4471-5346-7_10},
    abstract = {Decisions of emergency response organisations (police, fire fighters, infrastructure providers, etc.) rely on accurate and timely information. Some necessary information is integrated into control centre's IT (weather, availability of electricity, gauge information, etc.), but almost every decision needs to be based on very specific information of the current crisis situation. Due to the unpredictable nature of a crisis, gathering this kind of information requires much improvisation and articulation work which we aim to support. We present a study on how different emergency response organisations communicate with teams on-site to generate necessary information for the coordinating instances, and we described, implemented and evaluated an interaction concept as well as a prototype to support this communication by a semi-structured request-and-report system based on Android devices. We learned that (1) the accuracy of request and reports can be improved by using an appropriate metadata structure in addition to creating multimedia-based information content, (2) requirements of trusted and fast information need to be respected in support concepts although they may even be contradictory, and (3) the coordination strategy of the emergency response organisation also shapes the way this interaction needs to be designed.},
    booktitle = {Proceedings of the {European} {Conference} on {Computer} {Supported} {Cooperative} {Work} ({ECSCW})},
    publisher = {Springer},
    author = {Ludwig, Thomas and Reuter, Christian and Pipek, Volkmar},
    editor = {Bertelsen, Olav W. and Ciolfi, Luigina and Grasso, Antonietta and Papadopoulos, George Angelos},
    year = {2013},
    keywords = {Cooperation, Crisis, HCI, Projekt-InfoStrom, A-Paper, Ranking-CORE-B, Ranking-WKWI-C},
    pages = {181--206},
    }

  • Torben Wiedenhoefer, Christian Reuter, Benedikt Ley, Volkmar Pipek (2013)
    Entwicklung IT-basierter interorganisationaler Krisenmanagement-Infrastrukturen für Stromausfälle
    Informatik 2013 – Informatik angepasst an Mensch, Organisation und Umwelt Koblenz, Germany.
    [BibTeX] [Abstract] [Download PDF]

    Große Stromausfälle, wie beispielsweise der Ausfall der Stromversorgung im Nordosten der USA (2003) oder der Ausfall in weiten Teilen von West-Europa (2005), machen die fundamentale Bedeutung von Strom in unserem täglichen Leben deutlich. Sie zeigen auch, welche wichtige Rolle die Kooperation und Zusammenarbeit zwischen allen Beteiligten der Bewältigungs- und Wiederherstellungsarbeit spielt. Die Erfahrungen aus diesen Ausfällen legen nahe, dass Stromnetzbetreiber, Feuerwehr, Polizei, Behörden und Bürger einer Vielzahl von unterschiedlichen Herausforderungen in der interorganisationalen Kommunikation und innerhalb von Informations- und Koordinierungsprozessen gegenüberstehen. Ziel des Forschungsprojekts „InfoStrom“, welches vom Bundesministerium für Bildung und Forschung seit 2010 und bis Ende 2013 gefördert wird, ist die Entwicklung von Konzepten, um diese Zusammenarbeit zu unterstützten und letztlich zu verbessern. In diesem Beitrag werden potentielle Fragen und zukünftige Themen und erzielte Ergebnisse dargestellt, die sich auf die benutzerzentrierte Technologieentwicklung im Krisenmanagement und auf domain-spezifische Probleme, wie die Verbesserung der Integration von Bürgern in das Krisenmanagement, den Umgang mit Informationsunsicherheiten oder die Unterstützung des interorganisationalen Lernens, beziehen.

    @inproceedings{wiedenhoefer_entwicklung_2013,
    address = {Koblenz, Germany},
    title = {Entwicklung {IT}-basierter interorganisationaler {Krisenmanagement}-{Infrastrukturen} für {Stromausfälle}},
    url = {http://www.peasec.de/paper/2013/2013_WiedenhoeferReuterLeyPipek_KrisenmanagementInfrastrukturen_INF.pdf},
    abstract = {Große Stromausfälle, wie beispielsweise der Ausfall der Stromversorgung im Nordosten der USA (2003) oder der Ausfall in weiten Teilen von West-Europa (2005), machen die fundamentale Bedeutung von Strom in unserem täglichen Leben deutlich. Sie zeigen auch, welche wichtige Rolle die Kooperation und Zusammenarbeit zwischen allen Beteiligten der Bewältigungs- und Wiederherstellungsarbeit spielt. Die Erfahrungen aus diesen Ausfällen legen nahe, dass Stromnetzbetreiber, Feuerwehr, Polizei, Behörden und Bürger einer Vielzahl von unterschiedlichen Herausforderungen in der interorganisationalen Kommunikation und innerhalb von Informations- und Koordinierungsprozessen gegenüberstehen. Ziel des Forschungsprojekts „InfoStrom“, welches vom Bundesministerium für Bildung und Forschung seit 2010 und bis Ende 2013 gefördert wird, ist die Entwicklung von Konzepten, um diese Zusammenarbeit zu unterstützten und letztlich zu verbessern. In diesem Beitrag werden potentielle Fragen und zukünftige Themen und erzielte Ergebnisse dargestellt, die sich auf die benutzerzentrierte Technologieentwicklung im Krisenmanagement und auf domain-spezifische Probleme, wie die Verbesserung der Integration von Bürgern in das Krisenmanagement, den Umgang mit Informationsunsicherheiten oder die Unterstützung des interorganisationalen Lernens, beziehen.},
    booktitle = {Informatik 2013 - {Informatik} angepasst an {Mensch}, {Organisation} und {Umwelt}},
    publisher = {GI-Edition-Lecture Notes in Informatics (LNI)},
    author = {Wiedenhoefer, Torben and Reuter, Christian and Ley, Benedikt and Pipek, Volkmar},
    editor = {Hornbach, Matthias},
    year = {2013},
    keywords = {Cooperation, Crisis, Projekt-InfoStrom, Ranking-CORE-C, Ranking-VHB-C, Infrastructure, RSF},
    pages = {1649--1658},
    }

  • Christian Reuter, Oliver Heger, Volkmar Pipek (2013)
    Combining Real and Virtual Volunteers through Social Media
    Proceedings of the Information Systems for Crisis Response and Management (ISCRAM) Baden-Baden, Germany.
    [BibTeX] [Abstract] [Download PDF]

    Recent studies have called attention to the improvement of “collaborative resilience” by fostering the collaboration potentials of public and private stakeholders during disasters. With our research we consider real and virtual volunteers in order to detect conditions for cooperation among those citizen groups through social media. Therefore we analysed the usage of Twitter during a tornado crisis to look for role patterns and aspects that helped volunteer groups in the virtual to emerge, and matched the data with an interview study on experiences, attitudes, concerns and potentials professional emergency services recounted in the emergence of volunteer groups in the real. While virtual groups seem to easily form and collaborate, the engagement of real volunteers is decreasing according to the perception of professionals. We discuss the dynamics in both tendencies and suggest design implications (use of existing social networks, promotion and awareness, connection among volunteers, connection to emergency services and systems) to support both types of volunteer groups, which lead to a software prototype.

    @inproceedings{reuter_combining_2013,
    address = {Baden-Baden, Germany},
    title = {Combining {Real} and {Virtual} {Volunteers} through {Social} {Media}},
    url = {http://www.peasec.de/paper/2013/2013_ReuterHegerPipek_RealVirtualVolunteersSocialMedia_ISCRAM.pdf},
    abstract = {Recent studies have called attention to the improvement of “collaborative resilience” by fostering the collaboration potentials of public and private stakeholders during disasters. With our research we consider real and virtual volunteers in order to detect conditions for cooperation among those citizen groups through social media. Therefore we analysed the usage of Twitter during a tornado crisis to look for role patterns and aspects that helped volunteer groups in the virtual to emerge, and matched the data with an interview study on experiences, attitudes, concerns and potentials professional emergency services recounted in the emergence of volunteer groups in the real. While virtual groups seem to easily form and collaborate, the engagement of real volunteers is decreasing according to the perception of professionals. We discuss the dynamics in both tendencies and suggest design implications (use of existing social networks, promotion and awareness, connection among volunteers, connection to emergency services and systems) to support both types of volunteer groups, which lead to a software prototype.},
    booktitle = {Proceedings of the {Information} {Systems} for {Crisis} {Response} and {Management} ({ISCRAM})},
    publisher = {ISCRAM},
    author = {Reuter, Christian and Heger, Oliver and Pipek, Volkmar},
    editor = {Comes, T. and Fiedrich, F. and Fortier, S. and Geldermann, J. and Müller, Tim},
    year = {2013},
    keywords = {AuswahlCrisis, Cooperation, Crisis, HCI, Projekt-InfoStrom, Selected, SocialMedia, Student},
    pages = {780--790},
    }

  • Christian Reuter (2013)
    Power Outage Communications: Survey of Needs, Infrastructures and Concepts
    Proceedings of the Information Systems for Crisis Response and Management (ISCRAM) Baden-Baden, Germany.
    [BibTeX] [Abstract] [Download PDF]

    Crisis communication during power outages poses several challenges. Frist, the causes of power outages are often events such as severe weather, which also lead to complications. Second, power outages themselves lead to limitations in everyday life. Third, communication infrastructures, that are necessary for crisis communication, are often affected. This work focuses on the communication of the organizations responsible for recovery work (emergency services, public administration, energy network operators) to the public affected by the power outage. Therefore this paper investigates the perception and the information demands of citizens and communication infrastructures in different scenarios. Taking the users‘ needs into consideration, an Information and Communication Technology (ICT) based concept for crisis communication, which combines general information with location-specific and setting-specific information was implemented as a prototype smartphone application and evaluated with 12 potential end users. ICT-based concepts can gain acceptance, however they should be understood as supplemental for some target groups and in some scenarios.

    @inproceedings{reuter_power_2013,
    address = {Baden-Baden, Germany},
    title = {Power {Outage} {Communications}: {Survey} of {Needs}, {Infrastructures} and {Concepts}},
    url = {http://www.peasec.de/paper/2013/2013_Reuter_PowerOutageCommunication_ISCRAM.pdf},
    abstract = {Crisis communication during power outages poses several challenges. Frist, the causes of power outages are often events such as severe weather, which also lead to complications. Second, power outages themselves lead to limitations in everyday life. Third, communication infrastructures, that are necessary for crisis communication, are often affected. This work focuses on the communication of the organizations responsible for recovery work (emergency services, public administration, energy network operators) to the public affected by the power outage. Therefore this paper investigates the perception and the information demands of citizens and communication infrastructures in different scenarios. Taking the users' needs into consideration, an Information and Communication Technology (ICT) based concept for crisis communication, which combines general information with location-specific and setting-specific information was implemented as a prototype smartphone application and evaluated with 12 potential end users. ICT-based concepts can gain acceptance, however they should be understood as supplemental for some target groups and in some scenarios.},
    booktitle = {Proceedings of the {Information} {Systems} for {Crisis} {Response} and {Management} ({ISCRAM})},
    publisher = {ISCRAM},
    author = {Reuter, Christian},
    editor = {Comes, T. and Fiedrich, F. and Fortier, S. and Geldermann, J. and Müller, Tim},
    year = {2013},
    keywords = {Crisis, HCI, Projekt-InfoStrom, Infrastructure, RSF},
    pages = {884--889},
    }

  • Désirée Christofzik, Christian Reuter (2013)
    The Aggregation of Information Qualities in Collaborative Software
    International Journal of Entrepreneurial Venturing (IJEV) ;5(3):257–271.
    [BibTeX] [Abstract] [Download PDF]

    Collaborative software supports teams involved in a common task in generating and sharing information over geographic distances. Such software is used in the cooperation between organisations, companies or individuals. The overall quality of the resulting information product depends on the quality of the individual contributions as well as on an underlying consolidation process. We therefore present different ‘composition functions‘ indicating how the qualities of the contributions by single actors (qi) influence the quality of the aggregated information product (Q). Based upon a qualitative empirical study of inter-organizational crisis management in Germany we match use cases with those composition functions and derive implications for the design of collaborative software.

    @article{christofzik_aggregation_2013,
    title = {The {Aggregation} of {Information} {Qualities} in {Collaborative} {Software}},
    volume = {5},
    url = {http://www.peasec.de/paper/2013/2013_ChristofzikReuter_InformationQualities_IJEV.pdf},
    abstract = {Collaborative software supports teams involved in a common task in generating and sharing information over geographic distances. Such software is used in the cooperation between organisations, companies or individuals. The overall quality of the resulting information product depends on the quality of the individual contributions as well as on an underlying consolidation process. We therefore present different ‘composition functions' indicating how the qualities of the contributions by single actors (qi) influence the quality of the aggregated information product (Q). Based upon a qualitative empirical study of inter-organizational crisis management in Germany we match use cases with those composition functions and derive implications for the design of collaborative software.},
    number = {3},
    journal = {International Journal of Entrepreneurial Venturing (IJEV)},
    author = {Christofzik, Désirée and Reuter, Christian},
    year = {2013},
    keywords = {HCI, Projekt-InfoStrom, SocialMedia, Ranking-VHB-B},
    pages = {257--271},
    }

  • Thomas Ludwig, Christian Reuter, Volkmar Pipek (2013)
    Mobiler Reporting-Mechanismus für örtlich verteilte Einsatzkräfte
    Mensch & Computer 2013: Interaktive Vielfalt Bremen, Germany.
    [BibTeX] [Abstract] [Download PDF]

    Die im Katastrophenschutz beteiligten Behörden und Organisationen mit Sicherheitsaufgaben (BOS) benötigen für Entscheidungen eine aktuelle und akkurate Informationsbasis. Einige dieser Informationen, z.B. Wetterinformationen, können über externe Dienste in Leitstellensystemen visualisiert werden. Andere müssen seitens der zuständigen Einheiten vor Ort via Funk gemeldet werden. Unsere Design-Fallstudie untersucht interaktive Unterstützungsmöglichkeiten dieser Reporting-Prozesse: In einer qualitativen empirischen Studie wurden die Kommunikationspraktiken von Polizei und Feuerwehr untersucht. Darauf aufbauend wurde ein Konzept zur semi-strukturierten Artikulation von Informationsbedarfen erstellt, welches als mobile Android Applikation implementiert und mit potentiellen Nutzern evaluiert wurde. Unser Beitrag illustriert, wie zielgerichtete Informationsanfragen unter Berück-sichtigung angemessener Metadaten das Reporting örtlich verteilter Einsatzkräfte unterstützen können.

    @inproceedings{ludwig_mobiler_2013,
    address = {Bremen, Germany},
    title = {Mobiler {Reporting}-{Mechanismus} für örtlich verteilte {Einsatzkräfte}},
    url = {http://www.peasec.de/paper/2013/2013_LudwigReuterPipek_MobileReporting_MenschComputer.pdf},
    abstract = {Die im Katastrophenschutz beteiligten Behörden und Organisationen mit Sicherheitsaufgaben (BOS) benötigen für Entscheidungen eine aktuelle und akkurate Informationsbasis. Einige dieser Informationen, z.B. Wetterinformationen, können über externe Dienste in Leitstellensystemen visualisiert werden. Andere müssen seitens der zuständigen Einheiten vor Ort via Funk gemeldet werden. Unsere Design-Fallstudie untersucht interaktive Unterstützungsmöglichkeiten dieser Reporting-Prozesse: In einer qualitativen empirischen Studie wurden die Kommunikationspraktiken von Polizei und Feuerwehr untersucht. Darauf aufbauend wurde ein Konzept zur semi-strukturierten Artikulation von Informationsbedarfen erstellt, welches als mobile Android Applikation implementiert und mit potentiellen Nutzern evaluiert wurde. Unser Beitrag illustriert, wie zielgerichtete Informationsanfragen unter Berück-sichtigung angemessener Metadaten das Reporting örtlich verteilter Einsatzkräfte unterstützen können.},
    booktitle = {Mensch \& {Computer} 2013: {Interaktive} {Vielfalt}},
    publisher = {Oldenbourg-Verlag},
    author = {Ludwig, Thomas and Reuter, Christian and Pipek, Volkmar},
    editor = {Boll, Susanne and Maaß, Susanne and Malaka, Rainer},
    year = {2013},
    keywords = {Cooperation, HCI, Projekt-InfoStrom, SocialMedia, UsableSec},
    pages = {317--320},
    }

  • Hans-Peter Thamm, Thomas Ludwig, Christian Reuter (2013)
    Design of a Process Modell for Unmanned Aerial Systems (UAS) in Emergencies
    Proceedings of the Information Systems for Crisis Response and Management (ISCRAM) Baden-Baden, Germany.
    [BibTeX] [Abstract] [Download PDF]

    The electricity network is one of the most important infrastructures in modern industrialized societies. In the case of power outages, the society becomes aware of their dependence on electricity and organizations responsible for recovery work need precise information about the location and the type of the damage, which are usually not available. Unmanned Aerial Systems (UAS), commonly known as drones, are aircrafts without a human pilot on board and may help to collect this information. While many technical approaches for UAS exist, a systematic process model for using UAS in emergencies based on the organizations needs is still missing. Based on the presentation of current types of UAS, approaches of using UAS and workshops with organizations responsible for recovery work (police and fire department, public administration, power supplier) this paper presents a process model for UAS in emergencies, especially power outages, which takes both theoretical findings and human experiences into consideration.

    @inproceedings{thamm_design_2013,
    address = {Baden-Baden, Germany},
    title = {Design of a {Process} {Modell} for {Unmanned} {Aerial} {Systems} ({UAS}) in {Emergencies}},
    url = {http://www.peasec.de/paper/2013/2013_ThammLudwigReuter_UASEmergency_ISCRAM.pdf},
    abstract = {The electricity network is one of the most important infrastructures in modern industrialized societies. In the case of power outages, the society becomes aware of their dependence on electricity and organizations responsible for recovery work need precise information about the location and the type of the damage, which are usually not available. Unmanned Aerial Systems (UAS), commonly known as drones, are aircrafts without a human pilot on board and may help to collect this information. While many technical approaches for UAS exist, a systematic process model for using UAS in emergencies based on the organizations needs is still missing. Based on the presentation of current types of UAS, approaches of using UAS and workshops with organizations responsible for recovery work (police and fire department, public administration, power supplier) this paper presents a process model for UAS in emergencies, especially power outages, which takes both theoretical findings and human experiences into consideration.},
    booktitle = {Proceedings of the {Information} {Systems} for {Crisis} {Response} and {Management} ({ISCRAM})},
    publisher = {ISCRAM},
    author = {Thamm, Hans-Peter and Ludwig, Thomas and Reuter, Christian},
    editor = {Comes, T. and Fiedrich, F. and Fortier, S. and Geldermann, J. and Müller, Tim},
    year = {2013},
    keywords = {Projekt-InfoStrom, Infrastructure},
    pages = {478--487},
    }

  • Christian Reuter, Thomas Ludwig (2013)
    Anforderungen und technische Konzepte der Krisenkommunikation bei Stromausfall
    Informatik 2013 – Informatik angepasst an Mensch, Organisation und Umwelt Koblenz, Germany.
    [BibTeX] [Abstract] [Download PDF]

    Im Falle von Stromausfällen kommt der Kommunikation von Stromnetzbetreibern bzw. Behörden und Organisationen mit Sicherheitsaufgaben (BOS) mit der Bevölkerung eine besondere Bedeutung zu, da durch strombezogene Ausfälle vieler Kommunikationsinfrastrukturen die klassischen Kommunikationsmedien oftmals nicht in ihrer Gänze genutzt werden können. In diesem Beitrag werden technische Alternativkonzepte zur Unterstützung der Krisenkommunikation bei Ausfall der Stromversorgung untersucht. Hierzu werden zuerst die Wahrnehmung von Stromausfällen durch Bürger und deren Informationsbedarfe dargestellt und anschließend Kommunikationsinfrastrukturen sowie deren Verfügbarkeit in verschiedenen Stromausfallszenarien analysiert. Hierauf aufbauend wird das Konzept einer Smartphone-Applikation vorgestellt, welches die Zeit zwischen Eintreten des Stromausfalls und einer möglichen oder zeitweisen Überlastung des Mobilfunknetzes adressiert und mit potentiellen Nutzern evaluiert wurde. Ziel war es, Erkenntnisse über mögliche mobilfunkbasierte Unterstützungskonzepte zu gewinnen und Design-Vorschläge zur Umsetzung solcher Konzepte zu geben.

    @inproceedings{reuter_anforderungen_2013,
    address = {Koblenz, Germany},
    title = {Anforderungen und technische {Konzepte} der {Krisenkommunikation} bei {Stromausfall}},
    url = {http://www.peasec.de/paper/2013/2013_ReuterLudwig_KrisenkommunikationStromausfall_INF.pdf},
    abstract = {Im Falle von Stromausfällen kommt der Kommunikation von Stromnetzbetreibern bzw. Behörden und Organisationen mit Sicherheitsaufgaben (BOS) mit der Bevölkerung eine besondere Bedeutung zu, da durch strombezogene Ausfälle vieler Kommunikationsinfrastrukturen die klassischen Kommunikationsmedien oftmals nicht in ihrer Gänze genutzt werden können. In diesem Beitrag werden technische Alternativkonzepte zur Unterstützung der Krisenkommunikation bei Ausfall der Stromversorgung untersucht. Hierzu werden zuerst die Wahrnehmung von Stromausfällen durch Bürger und deren Informationsbedarfe dargestellt und anschließend Kommunikationsinfrastrukturen sowie deren Verfügbarkeit in verschiedenen Stromausfallszenarien analysiert. Hierauf aufbauend wird das Konzept einer Smartphone-Applikation vorgestellt, welches die Zeit zwischen Eintreten des Stromausfalls und einer möglichen oder zeitweisen Überlastung des Mobilfunknetzes adressiert und mit potentiellen Nutzern evaluiert wurde. Ziel war es, Erkenntnisse über mögliche mobilfunkbasierte Unterstützungskonzepte zu gewinnen und Design-Vorschläge zur Umsetzung solcher Konzepte zu geben.},
    booktitle = {Informatik 2013 - {Informatik} angepasst an {Mensch}, {Organisation} und {Umwelt}},
    publisher = {GI-Edition-Lecture Notes in Informatics (LNI)},
    author = {Reuter, Christian and Ludwig, Thomas},
    editor = {Hornbach, Matthias},
    year = {2013},
    keywords = {Projekt-InfoStrom, SocialMedia, Ranking-CORE-C, Ranking-VHB-C, Infrastructure},
    pages = {1604--1618},
    }

  • Oliver Heger, Christian Reuter (2013)
    IT-basierte Unterstützung virtueller und realer Selbsthilfegemeinschaften in Katastrophenlagen
    Proceedings of the International Conference on Wirtschaftsinformatik (WI) Leipzig, Germany.
    [BibTeX] [Abstract] [Download PDF]

    Social Media wird zunehmend von Betroffenen und Selbsthilfegemeinschaften in Katastrophenlagen genutzt. In diesem Beitrag werden Studien zu ‚virtuellen‘ und ‚realen‘ Selbsthilfeaktivitäten dargestellt. Untersucht wurden zum einen ‚virtuelle‘ Selbsthilfeaktivitäten in Twitter während der Tornadokatastrophe in den USA am 27./28.4.2011 mit besonderem Fokus auf die zeitlichen Verläufe und Nutzergruppen; zum anderen ‚reale‘ Selbsthilfe anhand Interviews mit Behörden und Organisationen mit Sicherheitsaufgaben (BOS). Hierauf aufbauend werden Gestaltungsaspekte und Anforderungen für Social Media zur Unterstützung von Krisenhelfern bzw. Selbst- und Nachbarschafts- hilfe und zur Kombination von virtuellen und realen Aktivitäten im Katastrophenmanagement diskutiert.

    @inproceedings{heger_it-basierte_2013,
    address = {Leipzig, Germany},
    title = {{IT}-basierte {Unterstützung} virtueller und realer {Selbsthilfegemeinschaften} in {Katastrophenlagen}},
    url = {http://www.peasec.de/paper/2013/2013_HegerReuter_IT-Selbsthilfegemeinschaften_WI.pdf},
    abstract = {Social Media wird zunehmend von Betroffenen und Selbsthilfegemeinschaften in Katastrophenlagen genutzt. In diesem Beitrag werden Studien zu ‚virtuellen‘ und ‚realen‘ Selbsthilfeaktivitäten dargestellt. Untersucht wurden zum einen ‚virtuelle‘ Selbsthilfeaktivitäten in Twitter während der Tornadokatastrophe in den USA am 27./28.4.2011 mit besonderem Fokus auf die zeitlichen Verläufe und Nutzergruppen; zum anderen ‚reale‘ Selbsthilfe anhand Interviews mit Behörden und Organisationen mit Sicherheitsaufgaben (BOS). Hierauf aufbauend werden Gestaltungsaspekte und Anforderungen für Social Media zur Unterstützung von Krisenhelfern bzw. Selbst- und Nachbarschafts- hilfe und zur Kombination von virtuellen und realen Aktivitäten im Katastrophenmanagement diskutiert.},
    booktitle = {Proceedings of the {International} {Conference} on {Wirtschaftsinformatik} ({WI})},
    author = {Heger, Oliver and Reuter, Christian},
    editor = {Alt, Rainer and Franczyk, Bogdan},
    year = {2013},
    keywords = {Cooperation, Crisis, HCI, Projekt-InfoStrom, SocialMedia, Ranking-CORE-C, Ranking-VHB-C, Ranking-WKWI-A},
    pages = {1861--1875},
    }

  • Christian Reuter, Michael Ritzkatis (2013)
    Unterstützung mobiler Geo-Kollaboration zur Lageeinschätzung von Feuerwehr und Polizei
    Proceedings of the International Conference on Wirtschaftsinformatik (WI) (Best Paper Award Nominee) Leipzig, Germany.
    [BibTeX] [Abstract] [Download PDF]

    Aufgrund komplexer und dringlicher Aufgaben steht die Zusammenarbeit über örtliche und organisationale Grenzen hinweg bei Behörden und Organisationen mit Sicherheitsaufgaben (BOS), wie Feuerwehr und Polizei, an der Tagesordnung. Ziel dieses Beitrags ist es zu untersuchen, wie die Kollaboration von Einsatzkräften vor Ort und jenen in der Leitstelle durch mobile Geokollaborationssysteme unterstützt werden kann. Nach einer Darstellung verwandter Arbeiten werden anhand einer qualitativen empirischen Studie die Informations- und Kommunikationspraktiken mobiler Einsatzkräfte vorgestellt. Hierauf aufbauend folgt die Konzeptionierung und Umsetzung eines mobilen Geokolla- borationssystems, welches an ein bestehendes Krisenmanagementsystem und Geoinformationssystem (GIS) angebunden ist und als Android-App realisiert wurde. Abschließend werden die Evaluationsergebnisse dieses Systems im Anwendungsfeld vorgestellt.

    @inproceedings{reuter_unterstutzung_2013,
    address = {Leipzig, Germany},
    title = {Unterstützung mobiler {Geo}-{Kollaboration} zur {Lageeinschätzung} von {Feuerwehr} und {Polizei}},
    url = {http://www.peasec.de/paper/2013/2013_ReuterRitzkatis_MobileGeoKollaboration_WI.pdf},
    abstract = {Aufgrund komplexer und dringlicher Aufgaben steht die Zusammenarbeit über örtliche und organisationale Grenzen hinweg bei Behörden und Organisationen mit Sicherheitsaufgaben (BOS), wie Feuerwehr und Polizei, an der Tagesordnung. Ziel dieses Beitrags ist es zu untersuchen, wie die Kollaboration von Einsatzkräften vor Ort und jenen in der Leitstelle durch mobile Geokollaborationssysteme unterstützt werden kann. Nach einer Darstellung verwandter Arbeiten werden anhand einer qualitativen empirischen Studie die Informations- und Kommunikationspraktiken mobiler Einsatzkräfte vorgestellt. Hierauf aufbauend folgt die Konzeptionierung und Umsetzung eines mobilen Geokolla- borationssystems, welches an ein bestehendes Krisenmanagementsystem und Geoinformationssystem (GIS) angebunden ist und als Android-App realisiert wurde. Abschließend werden die Evaluationsergebnisse dieses Systems im Anwendungsfeld vorgestellt.},
    booktitle = {Proceedings of the {International} {Conference} on {Wirtschaftsinformatik} ({WI}) ({Best} {Paper} {Award} {Nominee})},
    author = {Reuter, Christian and Ritzkatis, Michael},
    editor = {Alt, Rainer and Franczyk, Bogdan},
    year = {2013},
    keywords = {Cooperation, Crisis, HCI, Projekt-InfoStrom, SocialMedia, Student, Ranking-CORE-C, Ranking-VHB-C, UsableSec, Ranking-WKWI-A},
    pages = {1877--1891},
    }

    2012

  • Benedikt Ley, Volkmar Pipek, Christian Reuter, Torben Wiedenhoefer (2012)
    Supporting improvisation work in inter-organizational crisis management
    Proceedings of the Conference on Human Factors in Computing Systems (CHI) New York, USA. doi:10.1145/2207676.2208617
    [BibTeX] [Abstract] [Download PDF]

    Improvisation is necessary when planned decision-making as the main managerial activity does not fit the conditions the practice provides. In these cases, information technology should not just automate planned and structured decisions, but support improvisational practice. In this contribution we present an empirical study about the improvisation work in scenarios of medium to large power outages in Germany. Our focus is on inter-organizational cooperation practices, thus we examined the cooperation of fire departments, police, public administration, electricity infrastructure operators and citizens. Our empirical material allows to describe reasons and conditions for improvisation. Our resulting recommendations address the support of aggregation and visualization of information, a necessary individualization of information compositions, options for collaborative situation assessment, requirements for informal and formal communication, and accessibility of information resources.

    @inproceedings{ley_supporting_2012,
    address = {New York, USA},
    title = {Supporting improvisation work in inter-organizational crisis management},
    isbn = {978-1-4503-1015-4},
    url = {http://www.peasec.de/paper/2012/2012_LeyPipekReuterWiedenhoefer_ImprovisationWork_CHI.pdf},
    doi = {10.1145/2207676.2208617},
    abstract = {Improvisation is necessary when planned decision-making as the main managerial activity does not fit the conditions the practice provides. In these cases, information technology should not just automate planned and structured decisions, but support improvisational practice. In this contribution we present an empirical study about the improvisation work in scenarios of medium to large power outages in Germany. Our focus is on inter-organizational cooperation practices, thus we examined the cooperation of fire departments, police, public administration, electricity infrastructure operators and citizens. Our empirical material allows to describe reasons and conditions for improvisation. Our resulting recommendations address the support of aggregation and visualization of information, a necessary individualization of information compositions, options for collaborative situation assessment, requirements for informal and formal communication, and accessibility of information resources.},
    booktitle = {Proceedings of the {Conference} on {Human} {Factors} in {Computing} {Systems} ({CHI})},
    publisher = {ACM Press},
    author = {Ley, Benedikt and Pipek, Volkmar and Reuter, Christian and Wiedenhoefer, Torben},
    year = {2012},
    keywords = {Cooperation, Crisis, HCI, Projekt-InfoStrom, Projekt-RSBE, A-Paper, Ranking-CORE-A*, Ranking-WKWI-A},
    pages = {1529},
    }

  • Jan Hess, Christian Reuter, Volkmar Pipek, Volker Wulf (2012)
    Supporting End-User Articulations in Evolving Business Processes: A Case Study to explore Intuitive Notations and Interaction Designs
    International Journal of Cooperative Information Systems (IJCIS) ;21(4):263–296. doi:10.1142/S0218843012500049
    [BibTeX] [Abstract] [Download PDF]

    Adaptations of business processes are important in work environments, specifically when process-support needs to be tailored according to changing needs. The creation, management, and adaptation of the process models require typically modeling-experts. While these actors are knowledgeable in formalizing and operationalizing processes end-users who do not necessarily possess sophisticated modeling skills know typically local practices and framing conditions best. In this paper, we present an approach to support users in articulating their needs and to involve them into the (re-)design of process specifications. We explore how end-users reflect upon and articulate about business processes. Based on results of a qualitative study, we present a new, paper-based interaction technique, which enables users with little skills to model processes. The resulting process specifications can be transferred either in paper or in digital form into traditional modeling systems for further elaboration.

    @article{hess_supporting_2012,
    title = {Supporting {End}-{User} {Articulations} in {Evolving} {Business} {Processes}: {A} {Case} {Study} to explore {Intuitive} {Notations} and {Interaction} {Designs}},
    volume = {21},
    url = {https://www.wineme.uni-siegen.de/paper/2012/2012_hessreuterpipekwulf_supportingenduserarticulations_ijcis.pdf},
    doi = {10.1142/S0218843012500049},
    abstract = {Adaptations of business processes are important in work environments, specifically when process-support needs to be tailored according to changing needs. The creation, management, and adaptation of the process models require typically modeling-experts. While these actors are knowledgeable in formalizing and operationalizing processes end-users who do not necessarily possess sophisticated modeling skills know typically local practices and framing conditions best. In this paper, we present an approach to support users in articulating their needs and to involve them into the (re-)design of process specifications. We explore how end-users reflect upon and articulate about business processes. Based on results of a qualitative study, we present a new, paper-based interaction technique, which enables users with little skills to model processes. The resulting process specifications can be transferred either in paper or in digital form into traditional modeling systems for further elaboration.},
    number = {4},
    journal = {International Journal of Cooperative Information Systems (IJCIS)},
    author = {Hess, Jan and Reuter, Christian and Pipek, Volkmar and Wulf, Volker},
    year = {2012},
    keywords = {HCI, Projekt-InfoStrom, Ranking-CORE-C, A-Paper, Ranking-ImpactFactor, Ranking-VHB-B},
    pages = {263--296},
    }

  • Benedikt Ley, Volkmar Pipek, Christian Reuter, Torben Wiedenhoefer (2012)
    Supporting Inter-organizational Situation Assessment in Crisis Management
    Proceedings of the Information Systems for Crisis Response and Management (ISCRAM) Vancouver, Canada.
    [BibTeX] [Abstract] [Download PDF]

    To assess current situation properly is crucial for effective decision-making in crisis management. However, gathering accurate information from incidence sites and providing appropriate support for assessment practices faces several challenges. The unique information demands of each crisis situation, the information availability or inter-organizational problems and obstacles to information exchange are important factors that need to be considered in designing ICT. In this contribution we present results from an empirical study about decision-making practices in scenarios of medium to large power outages in Germany. We focused on the needs and practices on information exchange at the level of inter-organizational cooperation. We examined the cooperation of fire departments, police, public administration, electricity infrastructure operators and citizens. Our empirical material reflects particularly conditions and challenges in current situation assessment practices, and we were able to derive some design requirements for an inter-organizational situation assessment client (ISAC) as a complementary tool for the crisis management infrastructures the individual organizations have already build for their own areas of responsibility: Support for the aggregation and visualization of information, for the individualization of information compositions, for a collaborative situation assessment and for appropriate structures for sharing and accessing information resources.

    @inproceedings{ley_supporting_2012-1,
    address = {Vancouver, Canada},
    title = {Supporting {Inter}-organizational {Situation} {Assessment} in {Crisis} {Management}},
    url = {http://www.peasec.de/paper/2012/2012_LeyPipekReuterWiedenhoefer_SituationAssessment_ISCRAM.pdf},
    abstract = {To assess current situation properly is crucial for effective decision-making in crisis management. However, gathering accurate information from incidence sites and providing appropriate support for assessment practices faces several challenges. The unique information demands of each crisis situation, the information availability or inter-organizational problems and obstacles to information exchange are important factors that need to be considered in designing ICT. In this contribution we present results from an empirical study about decision-making practices in scenarios of medium to large power outages in Germany. We focused on the needs and practices on information exchange at the level of inter-organizational cooperation. We examined the cooperation of fire departments, police, public administration, electricity infrastructure operators and citizens. Our empirical material reflects particularly conditions and challenges in current situation assessment practices, and we were able to derive some design requirements for an inter-organizational situation assessment client (ISAC) as a complementary tool for the crisis management infrastructures the individual organizations have already build for their own areas of responsibility: Support for the aggregation and visualization of information, for the individualization of information compositions, for a collaborative situation assessment and for appropriate structures for sharing and accessing information resources.},
    booktitle = {Proceedings of the {Information} {Systems} for {Crisis} {Response} and {Management} ({ISCRAM})},
    publisher = {ISCRAM},
    author = {Ley, Benedikt and Pipek, Volkmar and Reuter, Christian and Wiedenhoefer, Torben},
    editor = {Rothkrantz, L. and Ristvey, J. and Franco, Z.},
    year = {2012},
    keywords = {Cooperation, Crisis, HCI, Projekt-InfoStrom, Projekt-RSBE},
    }

  • Christian Reuter, Alexandra Marx, Volkmar Pipek (2012)
    Crisis Management 2.0: Towards a Systematization of Social Software Use in Crisis Situations
    International Journal of Information Systems for Crisis Response and Management (IJISCRAM) ;4(1):1–16. doi:10.4018/jiscrm.2012010101
    [BibTeX] [Abstract] [Download PDF]

    The contribution of this paper is to propose a systematization of social software use in crisis situations pointing out different types of cooperation and its challenges. We will discuss how the organizational actors involved in crisis management (police, fire-fighters, organizations etc.) and the affected citizens are communicating and can communicate and collaborate through the use of social software. After defining the term ‘social software‘ we will outline the state-of-the-art about its use in crisis management. Drawing from this, we will present two case studies where we have examined the use of social software in 2010: first during the disruption of air travel caused by the eruptions of the volcano Eyjafjallajökull in Iceland and second during the mass panic at the Love Parade music festival in Germany. Based on both previous work and case studies we will discuss potentials and weaknesses and propose a classification matrix for different types of cooperation as a step towards a systematization of social software use in crisis situations.

    @article{reuter_crisis_2012,
    title = {Crisis {Management} 2.0: {Towards} a {Systematization} of {Social} {Software} {Use} in {Crisis} {Situations}},
    volume = {4},
    url = {http://www.peasec.de/paper/2012/2012_ReuterMarxPipek_CrisisManagement20-SystematizationSocialSoftware_IJISCRAM.pdf},
    doi = {10.4018/jiscrm.2012010101},
    abstract = {The contribution of this paper is to propose a systematization of social software use in crisis situations pointing out different types of cooperation and its challenges. We will discuss how the organizational actors involved in crisis management (police, fire-fighters, organizations etc.) and the affected citizens are communicating and can communicate and collaborate through the use of social software. After defining the term ‘social software' we will outline the state-of-the-art about its use in crisis management. Drawing from this, we will present two case studies where we have examined the use of social software in 2010: first during the disruption of air travel caused by the eruptions of the volcano Eyjafjallajökull in Iceland and second during the mass panic at the Love Parade music festival in Germany. Based on both previous work and case studies we will discuss potentials and weaknesses and propose a classification matrix for different types of cooperation as a step towards a systematization of social software use in crisis situations.},
    number = {1},
    journal = {International Journal of Information Systems for Crisis Response and Management (IJISCRAM)},
    author = {Reuter, Christian and Marx, Alexandra and Pipek, Volkmar},
    year = {2012},
    keywords = {AuswahlCrisis, Cooperation, Crisis, HCI, Projekt-InfoStrom, Selected, SocialMedia, Student, Projekt-RSBE},
    pages = {1--16},
    }

  • Désirée Christofzik, Christian Reuter (2012)
    Einfluss der Qualitätsermittlung kollaborativ erstellter Informationen auf die Gestaltung interorganisationaler Krisenmanagementsysteme
    Multikonferenz Wirtschaftsinformatik (MKWI) Braunschweig, Germany.
    [BibTeX] [Abstract] [Download PDF]

    In dieser Arbeit analysieren wir die Gesamtqualität kollaborativ erstellter Informationen als Aggregation der Qualität von Einzelinformationen indem wir die Angemessenheit verschiedener Funktionen in Abhängigkeit von der jeweiligen Fragestellung betrachten. Ziel ist die Herausstellung von Implikationen für das Design kollaborativer Systeme. Die Untersuchung findet am Beispiel des interorganisationalen Krisenmanagements statt. Nach einer Darstellung möglicher Aggregationsfunktionen zeigen wir auf Basis qualitativ-empirischer Untersuchungen exemplarische Anwendungsfälle aus dem interorganisationalen Krisenmanagement auf. Anhand dieser werden Implikationen für das Design und die Implementierung von Softwarekomponenten für die Vernetzung der beteiligten Akteure gezogen und gezeigt, dass die jeweilige Fragestellung hierbei von besonderer Bedeutung ist.

    @inproceedings{christofzik_einfluss_2012,
    address = {Braunschweig, Germany},
    title = {Einfluss der {Qualitätsermittlung} kollaborativ erstellter {Informationen} auf die {Gestaltung} interorganisationaler {Krisenmanagementsysteme}},
    isbn = {978-3-942183-63-5},
    url = {http://www.peasec.de/paper/2012/2012_ChristofzikReuter_QualitaetsermittlungKollaborativerInformationen_MKWI.pdf},
    abstract = {In dieser Arbeit analysieren wir die Gesamtqualität kollaborativ erstellter Informationen als Aggregation der Qualität von Einzelinformationen indem wir die Angemessenheit verschiedener Funktionen in Abhängigkeit von der jeweiligen Fragestellung betrachten. Ziel ist die Herausstellung von Implikationen für das Design kollaborativer Systeme. Die Untersuchung findet am Beispiel des interorganisationalen Krisenmanagements statt. Nach einer Darstellung möglicher Aggregationsfunktionen zeigen wir auf Basis qualitativ-empirischer Untersuchungen exemplarische Anwendungsfälle aus dem interorganisationalen Krisenmanagement auf. Anhand dieser werden Implikationen für das Design und die Implementierung von Softwarekomponenten für die Vernetzung der beteiligten Akteure gezogen und gezeigt, dass die jeweilige Fragestellung hierbei von besonderer Bedeutung ist.},
    booktitle = {Multikonferenz {Wirtschaftsinformatik} ({MKWI})},
    publisher = {GITO-Verlag},
    author = {Christofzik, Désirée and Reuter, Christian},
    editor = {Mattfeld, Dirk Christian and Robra-Bissantz, Susanne},
    year = {2012},
    keywords = {Cooperation, HCI, Projekt-InfoStrom, Projekt-RSBE, Ranking-WKWI-C},
    pages = {2049--2060},
    }

  • Christian Reuter, Oliver Heger, Volkmar Pipek (2012)
    Social Media for Supporting Emergent Groups in Crisis Management
    Proceedings of the CSCW Workshop on Collaboration and Crisis Informatics, International Reports on Socio Informatics Bonn, Germany.
    [BibTeX] [Abstract] [Download PDF]

    The great importance of Social Media for our today’s life causes an increasing use of internet-based platforms in crisis situations. Our work intends to show how so-called Emergent Groups, which arise as a result of crises, consist of private citizens and are not yet institutionalized organizations, can be supported by Social Media. At first, our literature review’s objective is to define the term ‘Emergent Group‘ and to outline their usage of Social Media as well as software-based requirements and suitable concepts to support such groups. A following quantitative and qualitative empirical analysis of a tornado crisis in the USA enables a closer look at especially virtual working Emergent Groups. Building on our literature review and empirical analysis, we discuss implications, derive further requirements and present a concept for the design of appropriate Social Software. We finally conclude by giving some potential research issues.

    @inproceedings{reuter_social_2012,
    address = {Bonn, Germany},
    title = {Social {Media} for {Supporting} {Emergent} {Groups} in {Crisis} {Management}},
    url = {http://www.peasec.de/paper/2012/2012_ReuterHegerPipek_SocialMediaEmergentGroups_CSCW-WS.pdf},
    abstract = {The great importance of Social Media for our today's life causes an increasing use of internet-based platforms in crisis situations. Our work intends to show how so-called Emergent Groups, which arise as a result of crises, consist of private citizens and are not yet institutionalized organizations, can be supported by Social Media. At first, our literature review's objective is to define the term ‘Emergent Group' and to outline their usage of Social Media as well as software-based requirements and suitable concepts to support such groups. A following quantitative and qualitative empirical analysis of a tornado crisis in the USA enables a closer look at especially virtual working Emergent Groups. Building on our literature review and empirical analysis, we discuss implications, derive further requirements and present a concept for the design of appropriate Social Software. We finally conclude by giving some potential research issues.},
    booktitle = {Proceedings of the {CSCW} {Workshop} on {Collaboration} and {Crisis} {Informatics}, {International} {Reports} on {Socio} {Informatics}},
    author = {Reuter, Christian and Heger, Oliver and Pipek, Volkmar},
    editor = {Pipek, Volkmar and Palen, Leysia and Landgren, Jonas},
    year = {2012},
    keywords = {Cooperation, Crisis, HCI, Projekt-InfoStrom, SocialMedia, Student},
    pages = {84--92},
    }

  • Christian Reuter, Volkmar Pipek, Torben Wiedenhoefer, Benedikt Ley (2012)
    Dealing with terminologies in collaborative systems for crisis management
    Proceedings of the Information Systems for Crisis Response and Management (ISCRAM) Vancouver, Canada.
    [BibTeX] [Abstract] [Download PDF]

    This paper presents approaches on how to deal with terminological ambiguities (different understandings of terms in heterogeneous groups of actors) in collaborative systems. First we will give some insight on the conceptual and theoretical foundation surrounding the ‘triangle of reference‘, a model of how linguistic symbols are related to the objects they represent. Then we will describe the results of our exploratory empirical study, which was conducted in Germany, and dealt with inter-organisational crisis communication. Based on this, we will then deduce requirements necessary for supporting and dealing with terminologies, and propose technical approaches for collaborative systems.

    @inproceedings{reuter_dealing_2012,
    address = {Vancouver, Canada},
    title = {Dealing with terminologies in collaborative systems for crisis management},
    url = {http://www.peasec.de/paper/2012/2012_ReuterPipekWiedenhoeferLey_TerminologiesCrisisManagement_ISCRAM.pdf},
    abstract = {This paper presents approaches on how to deal with terminological ambiguities (different understandings of terms in heterogeneous groups of actors) in collaborative systems. First we will give some insight on the conceptual and theoretical foundation surrounding the ‘triangle of reference', a model of how linguistic symbols are related to the objects they represent. Then we will describe the results of our exploratory empirical study, which was conducted in Germany, and dealt with inter-organisational crisis communication. Based on this, we will then deduce requirements necessary for supporting and dealing with terminologies, and propose technical approaches for collaborative systems.},
    booktitle = {Proceedings of the {Information} {Systems} for {Crisis} {Response} and {Management} ({ISCRAM})},
    publisher = {ISCRAM},
    author = {Reuter, Christian and Pipek, Volkmar and Wiedenhoefer, Torben and Ley, Benedikt},
    editor = {Rothkrantz, L. and Ristvey, J. and Franco, Z.},
    year = {2012},
    keywords = {Cooperation, Crisis, HCI, Projekt-InfoStrom},
    pages = {1--5},
    }

    2011

  • Christian Reuter (2011)
    IT-basierte Kooperationsunterstützung im interorganisationalen Krisenmanagement
    In: Michael Koch: Doktoranden-Kolloquium der Tagung Mensch & Computer 2011. .
    [BibTeX] [Abstract] [Download PDF]

    Die Dezentralität einer Organisation hat maßgeblichen Einfluss auf die Ausgestaltung von Kooperationsprozessen und deren Unterstützung durch IT-basierte Kooperationssysteme. Mein Dissertationsvorhaben untersucht momentane und potentielle Kooperationsprozesse im Spannungsfeld von Behörden und Organisationen mit Sicherheitsaufgaben, Unternehmen, Organisationen und Bürgern im interorganisationalen Krisenmanagement bei Großschadenslagen. Ziel ist die Beantwortung der Frage, wie IT-basierte Kooperationsunterstützung dezentraler Organisationen am Beispiel des Krisenmanagements erfolgen kann.

    @incollection{reuter_it-basierte_2011,
    title = {{IT}-basierte {Kooperationsunterstützung} im interorganisationalen {Krisenmanagement}},
    url = {https://peasec.de/paper/2011/2011_Reuter_ITbasierteKooperationsunterstuetzungKrisenmanagement-MuCDoc.pdf},
    abstract = {Die Dezentralität einer Organisation hat maßgeblichen Einfluss auf die Ausgestaltung von Kooperationsprozessen und deren Unterstützung durch IT-basierte Kooperationssysteme. Mein Dissertationsvorhaben untersucht momentane und potentielle Kooperationsprozesse im Spannungsfeld von Behörden und Organisationen mit Sicherheitsaufgaben, Unternehmen, Organisationen und Bürgern im interorganisationalen Krisenmanagement bei Großschadenslagen. Ziel ist die Beantwortung der Frage, wie IT-basierte Kooperationsunterstützung dezentraler Organisationen am Beispiel des Krisenmanagements erfolgen kann.},
    booktitle = {Doktoranden-{Kolloquium} der {Tagung} {Mensch} \& {Computer} 2011},
    author = {Reuter, Christian},
    editor = {Koch, Michael},
    year = {2011},
    keywords = {Cooperation, Crisis, HCI, Projekt-InfoStrom, UsableSec, Projekt-RSBE, Security},
    }

  • Christian Reuter (2011)
    Motive und Barrieren für Social Software in Organisationen und im Krisenmanagement
    Mensch und Computer – Workshopband Chemnitz, Germany.
    [BibTeX] [Abstract] [Download PDF]

    Es existieren zahlreiche Motive und Barrieren zur Nutzung von Social Software in Unternehmen und Organisationen. Ein mögliches Anwendungsszenario ist das interorganisationale Krisenmanagement von Behörden und Organisationen mit Sicherheitsaufgaben, Unternehmen und Bürgern bei Großschadenslagen. In diesem Beitrag werden Motive und Barrieren der Nutzung von Social Software in Unternehmen herausgestellt. Hierauf aufbauend werden diese auf das interorganisationale Krisenmanagement übertragen und Besonderheiten herausgearbeitet. Ziel ist die Darstellung möglicher Motive zur Nutzung von Social Software in der interorganisationalen Krisenkooperation.

    @inproceedings{reuter_motive_2011,
    address = {Chemnitz, Germany},
    title = {Motive und {Barrieren} für {Social} {Software} in {Organisationen} und im {Krisenmanagement}},
    url = {http://www.peasec.de/paper/2011/2011_Reuter_MotiveBarrierenSocialSoftware_MuC-WS.pdf},
    abstract = {Es existieren zahlreiche Motive und Barrieren zur Nutzung von Social Software in Unternehmen und Organisationen. Ein mögliches Anwendungsszenario ist das interorganisationale Krisenmanagement von Behörden und Organisationen mit Sicherheitsaufgaben, Unternehmen und Bürgern bei Großschadenslagen. In diesem Beitrag werden Motive und Barrieren der Nutzung von Social Software in Unternehmen herausgestellt. Hierauf aufbauend werden diese auf das interorganisationale Krisenmanagement übertragen und Besonderheiten herausgearbeitet. Ziel ist die Darstellung möglicher Motive zur Nutzung von Social Software in der interorganisationalen Krisenkooperation.},
    booktitle = {Mensch und {Computer} - {Workshopband}},
    publisher = {Universitätsverlag Chemnitz},
    author = {Reuter, Christian},
    editor = {Eibl, Maximilian and Ritter, Marc},
    year = {2011},
    keywords = {Crisis, HCI, Projekt-InfoStrom, SocialMedia, Projekt-RSBE},
    pages = {87--90},
    }

  • Torben Wiedenhoefer, Christian Reuter, Benedikt Ley, Volkmar Pipek (2011)
    Inter-organizational crisis management infrastructures for electrical power breakdowns
    Proceedings of the Information Systems for Crisis Response and Management (ISCRAM) Lisbon, Portugal.
    [BibTeX] [Abstract] [Download PDF]

    Major electricity breakdowns like the Northeast Blackout (USA) in 2003 or the blackout in most parts of Western Europe in 2005, have shown the fundamental role of electricity in our everyday life. The experiences of these accidents show that power suppliers, firefighters, police, county administration and citizens face multifarious challenges in inter-organizational communication, information and coordination processes during coping and recovery work. In this work-in-progress paper we describe early research dealing with inter-organizational issues in emergency management (EM). We are mainly focusing on supporting social practices in inter-organizational EM, for example collaborative interpretation of emergency situations, ad-hoc coordination or supporting citizen communication and helping routines. Identified from our experiences from related projects, discussions and literature studies, we suggest potential questions and future topics in user-driven software engineering processes for EM and domain specific problems, such as supporting citizen participation, coping with information uncertainties and quality variations or enhancing inter-organizational learning.

    @inproceedings{wiedenhoefer_inter-organizational_2011,
    address = {Lisbon, Portugal},
    title = {Inter-organizational crisis management infrastructures for electrical power breakdowns},
    url = {http://www.peasec.de/paper/2011/2011_WiedenhoeferReuterLeyPipek_CrisisManagementInfrastructures_ISCRAM.pdf},
    abstract = {Major electricity breakdowns like the Northeast Blackout (USA) in 2003 or the blackout in most parts of Western Europe in 2005, have shown the fundamental role of electricity in our everyday life. The experiences of these accidents show that power suppliers, firefighters, police, county administration and citizens face multifarious challenges in inter-organizational communication, information and coordination processes during coping and recovery work. In this work-in-progress paper we describe early research dealing with inter-organizational issues in emergency management (EM). We are mainly focusing on supporting social practices in inter-organizational EM, for example collaborative interpretation of emergency situations, ad-hoc coordination or supporting citizen communication and helping routines. Identified from our experiences from related projects, discussions and literature studies, we suggest potential questions and future topics in user-driven software engineering processes for EM and domain specific problems, such as supporting citizen participation, coping with information uncertainties and quality variations or enhancing inter-organizational learning.},
    booktitle = {Proceedings of the {Information} {Systems} for {Crisis} {Response} and {Management} ({ISCRAM})},
    publisher = {ISCRAM},
    author = {Wiedenhoefer, Torben and Reuter, Christian and Ley, Benedikt and Pipek, Volkmar},
    year = {2011},
    keywords = {Cooperation, Crisis, HCI, Projekt-InfoStrom, UsableSec, Projekt-RSBE, Security},
    }

  • Christian Reuter, Patrik Pohl, Volkmar Pipek (2011)
    Umgang mit Terminologien in inter- organisationaler Krisenkooperation – eine explorative Empirie
    Mensch & Computer 2011: Übermedien Übermorgen München, Germany.
    [BibTeX] [Abstract] [Download PDF]

    Ziel dieser Arbeit ist es, die Auswirkungen terminologischer Mehrdeutigkeiten, d.h. unterschiedlicher Begriffs-Verständnisse heterogener Akteursgruppen, auf die Gestaltung organisationsübergreifender Kooperationssysteme herauszustellen. Nach einer Darstellung theoretischer Ansätze des Umgangs mit Terminologien stellen wir unsere explorative empirische Studie, die wir am Beispiel des organisationsübergreifenden Krisenmanagements durchgeführt haben, vor. Hierauf aufbauend präsentieren wir unsere Befunde, leiten Anforderungen ab und schlagen technische Lösungen vor. Auch diskutieren wir Ansätze des Terminologiemanagements bezüglich ihrer Anwendbarkeit und stellen kooperative Ansätze zum Umgang mit Terminologien in interorganisationalen Kooperationssystemen vor.

    @inproceedings{reuter_umgang_2011,
    address = {München, Germany},
    title = {Umgang mit {Terminologien} in inter- organisationaler {Krisenkooperation} - eine explorative {Empirie}},
    isbn = {978-3-486-71235-3},
    url = {http://www.peasec.de/paper/2011/2011_ReuterPohlPipek_UmgangTerminologienKrisenkooperation_MenschComputer.pdf},
    abstract = {Ziel dieser Arbeit ist es, die Auswirkungen terminologischer Mehrdeutigkeiten, d.h. unterschiedlicher Begriffs-Verständnisse heterogener Akteursgruppen, auf die Gestaltung organisationsübergreifender Kooperationssysteme herauszustellen. Nach einer Darstellung theoretischer Ansätze des Umgangs mit Terminologien stellen wir unsere explorative empirische Studie, die wir am Beispiel des organisationsübergreifenden Krisenmanagements durchgeführt haben, vor. Hierauf aufbauend präsentieren wir unsere Befunde, leiten Anforderungen ab und schlagen technische Lösungen vor. Auch diskutieren wir Ansätze des Terminologiemanagements bezüglich ihrer Anwendbarkeit und stellen kooperative Ansätze zum Umgang mit Terminologien in interorganisationalen Kooperationssystemen vor.},
    booktitle = {Mensch \& {Computer} 2011: Übermedien Übermorgen},
    publisher = {Oldenbourg-Verlag},
    author = {Reuter, Christian and Pohl, Patrik and Pipek, Volkmar},
    editor = {Eibl, Maximilian},
    year = {2011},
    keywords = {Cooperation, Crisis, HCI, Projekt-InfoStrom, Student, Projekt-RSBE},
    pages = {171--180},
    }

  • Christian Reuter, Alexandra Marx, Volkmar Pipek (2011)
    Social Software as an Infrastructure for Crisis Management – a Case Study about Current Practice and Potential Usage
    Proceedings of the Information Systems for Crisis Response and Management (ISCRAM) Lisbon, Portugal.
    [BibTeX] [Abstract] [Download PDF]

    In this paper we will be discussing how the (semi-)professional actors involved in crisis management (police, fire-fighters, etc.) and the affected citizens can communicate and collaborate by the use of social software. After the definition of the term ‘social software‘ we will provide the state-of-the-art on current social software use in crisis management. Drawing from this, we will present two case studies where we examined the social software use in 2010: First during the disruption of air travel due to the eruptions of Eyjafjallajökull volcano in Iceland, second during the crisis at a stampede at the Love Parade music festival in Germany. We identified weak points and further potentials and tested the validity of the American case study findings from literature for Europe. We will conclude with a concept for using citizens in inter-organizational crisis management with a social software infrastructure and a communication matrix for crisis management.

    @inproceedings{reuter_social_2011,
    address = {Lisbon, Portugal},
    title = {Social {Software} as an {Infrastructure} for {Crisis} {Management} – a {Case} {Study} about {Current} {Practice} and {Potential} {Usage}},
    url = {http://www.peasec.de/paper/2011/2011_ReuterMarxPipek_SocialSoftwareInfrastructure_ISCRAM.pdf},
    abstract = {In this paper we will be discussing how the (semi-)professional actors involved in crisis management (police, fire-fighters, etc.) and the affected citizens can communicate and collaborate by the use of social software. After the definition of the term ‘social software' we will provide the state-of-the-art on current social software use in crisis management. Drawing from this, we will present two case studies where we examined the social software use in 2010: First during the disruption of air travel due to the eruptions of Eyjafjallajökull volcano in Iceland, second during the crisis at a stampede at the Love Parade music festival in Germany. We identified weak points and further potentials and tested the validity of the American case study findings from literature for Europe. We will conclude with a concept for using citizens in inter-organizational crisis management with a social software infrastructure and a communication matrix for crisis management.},
    booktitle = {Proceedings of the {Information} {Systems} for {Crisis} {Response} and {Management} ({ISCRAM})},
    publisher = {ISCRAM},
    author = {Reuter, Christian and Marx, Alexandra and Pipek, Volkmar},
    year = {2011},
    keywords = {Cooperation, Crisis, HCI, Projekt-InfoStrom, SocialMedia, Student, Projekt-RSBE, Infrastructure},
    pages = {1--10},
    }

  • Christian Reuter, Alexandra Marx, Volkmar Pipek (2011)
    Desaster 2.0: Einbeziehung von Bürgern in das Krisenmanagement
    Mensch & Computer 2011: Übermedien Übermorgen München, Germany.
    [BibTeX] [Abstract] [Download PDF]

    In dieser Arbeit soll untersucht werden, wie die im Krisenmanagement beteiligten Akteure (wie Polizei, Feuerwehr, Hilfsorganisationen, Infrastrukturbetreiber) und die betroffenen Bürger mittels Social Software kommunizieren und kollaborieren können. Anhand unserer Literaturstudie stellen wir einen Überblick über vergangene Forschung in diesem Bereich dar. Hierauf aufbauend präsentieren wir unsere beiden Fallstudien zur Nutzung von Social Software in Krisen: Zum einen während der Flugausfälle im Zuge des Vulkanausbruchs auf Island im April 2010, zum anderen im Zuge des Loveparade-Unglücks am 24.07.2010. Anschließend stellen wir identifizierte Stärken und Schwächen dar und fassen identifizierte Potentiale in einer Klassifikationsmatrix für Social Software im Krisenmanagement zusammen.

    @inproceedings{reuter_desaster_2011,
    address = {München, Germany},
    title = {Desaster 2.0: {Einbeziehung} von {Bürgern} in das {Krisenmanagement}},
    isbn = {978-3-486-71235-3},
    url = {http://www.peasec.de/paper/2011/2011_ReuterMarxPipek_Desaster20-EinbeziehungBuergerKrisenmanagement_MuC.pdf},
    abstract = {In dieser Arbeit soll untersucht werden, wie die im Krisenmanagement beteiligten Akteure (wie Polizei, Feuerwehr, Hilfsorganisationen, Infrastrukturbetreiber) und die betroffenen Bürger mittels Social Software kommunizieren und kollaborieren können. Anhand unserer Literaturstudie stellen wir einen Überblick über vergangene Forschung in diesem Bereich dar. Hierauf aufbauend präsentieren wir unsere beiden Fallstudien zur Nutzung von Social Software in Krisen: Zum einen während der Flugausfälle im Zuge des Vulkanausbruchs auf Island im April 2010, zum anderen im Zuge des Loveparade-Unglücks am 24.07.2010. Anschließend stellen wir identifizierte Stärken und Schwächen dar und fassen identifizierte Potentiale in einer Klassifikationsmatrix für Social Software im Krisenmanagement zusammen.},
    booktitle = {Mensch \& {Computer} 2011: Übermedien Übermorgen},
    publisher = {Oldenbourg-Verlag},
    author = {Reuter, Christian and Marx, Alexandra and Pipek, Volkmar},
    editor = {Eibl, Maximilian},
    year = {2011},
    keywords = {Cooperation, HCI, Projekt-InfoStrom, SocialMedia, Student, Projekt-RSBE},
    pages = {141--150},
    }

    2010

  • Claudia Mueller, Volkmar Pipek, Christian Reuter (2010)
    Globale Infrastruktur – lokales Arbeiten: Praxis IT-gestützter Wartung bei einem Energieversorger
    Mensch & Computer 2010: Interaktive Kulturen Duisburg, Germany.
    [BibTeX] [Abstract] [Download PDF]

    Lokale Praxis und globale Informations- und Kommunikationstechnik (IT) gehen immer dann eine sichtbare Verbindung ein, wenn IT eingesetzt wird, um Echtzeit-Informationen an einen anderen Ort zu übertragen, so wie dies z.B. durch Mobiltelefone/ MMS, ferngesteuerte Sensoren oder Live-Webcams geschieht. Diese Arbeit beschreibt eine Feldstudie zu IT-unterstützter Wartungsarbeit innerhalb der Infrastruktur eines Energieversorgers. Die Studie möchte insbesondere die Relationen zwischen lokalen Praxen und der Gestaltung einer IT-Infrastruktur als „Location Based System“ hervorheben, die nicht auf den ersten Blick sichtbar sind. Besonders richten wir den Blick sowohl auf „das Globale“ als auch auf „das Lokale“ von Strom- und IT-Infrastruktur. Wir orientieren uns am Infrastruktur-Konzept von Star & Ruhleder (1996) für eine Beschreibung und Analyse zweier unterschiedlicher Wartungsteams vor dem Hintergrund sozio-räumlicher sowie sozio-technischer Aspekte der Energieversorgungsinfrastruktur, der Informations- und Kommunikations-Infrastruktur und der jeweilig resultierenden Arbeitspraxis und diskutieren Konsequenzen für eine infrastrukturorientierte Technikgestaltung.

    @inproceedings{mueller_globale_2010,
    address = {Duisburg, Germany},
    title = {Globale {Infrastruktur} - lokales {Arbeiten}: {Praxis} {IT}-gestützter {Wartung} bei einem {Energieversorger}},
    url = {http://www.peasec.de/paper/2010/2010_MuellerPipekReuter_GlobaleInfrastruktur-ITWartungEnergieversorger_MuC.pdf},
    abstract = {Lokale Praxis und globale Informations- und Kommunikationstechnik (IT) gehen immer dann eine sichtbare Verbindung ein, wenn IT eingesetzt wird, um Echtzeit-Informationen an einen anderen Ort zu übertragen, so wie dies z.B. durch Mobiltelefone/ MMS, ferngesteuerte Sensoren oder Live-Webcams geschieht. Diese Arbeit beschreibt eine Feldstudie zu IT-unterstützter Wartungsarbeit innerhalb der Infrastruktur eines Energieversorgers. Die Studie möchte insbesondere die Relationen zwischen lokalen Praxen und der Gestaltung einer IT-Infrastruktur als „Location Based System“ hervorheben, die nicht auf den ersten Blick sichtbar sind. Besonders richten wir den Blick sowohl auf „das Globale“ als auch auf „das Lokale“ von Strom- und IT-Infrastruktur. Wir orientieren uns am Infrastruktur-Konzept von Star \& Ruhleder (1996) für eine Beschreibung und Analyse zweier unterschiedlicher Wartungsteams vor dem Hintergrund sozio-räumlicher sowie sozio-technischer Aspekte der Energieversorgungsinfrastruktur, der Informations- und Kommunikations-Infrastruktur und der jeweilig resultierenden Arbeitspraxis und diskutieren Konsequenzen für eine infrastrukturorientierte Technikgestaltung.},
    booktitle = {Mensch \& {Computer} 2010: {Interaktive} {Kulturen}},
    publisher = {Oldenbourg-Verlag},
    author = {Mueller, Claudia and Pipek, Volkmar and Reuter, Christian},
    editor = {Ziegler, Jürgen and Schmidt, Albrecht},
    year = {2010},
    keywords = {Cooperation, Crisis, HCI, Projekt-InfoStrom, Projekt-RSBE, Infrastructure, Projekt-RWE},
    pages = {37--46},
    }

  • Norbert Balduin, Georg Becker, Jürgen Brand, Michael Görgen, Mario Hannappel, Patrick Hasenfuß, Benedikt Ley, Volkmar Pipek, Florian Probst, Christian Reuter, Thomas Rose, Gebhard Rusch, Torben Wiedenhoefer, Andreas Zinnen (2010)
    InfoStrom: Learning information infrastructures for crisis management in case of medium to large electrical power breakdowns.
    Future Security – Proceedings of the Security Research Conference Berlin, Germany.
    [BibTeX] [Abstract] [Download PDF]

    One of the most important infrastructures in modern industrialized societies is the electricity network. Due to its fundamental role for many aspects of our everyday life, power infrastructures manifest a strong dependence between power suppliers and customers. Customers take the infrastructure for granted; it appears mostly invisible to them as long as it works, but in the case of breakdowns in power supply customers become aware of the dependence on electricity. They join professional actors in the recovery and coping work with regard to the electricity breakdown: Maintenance workers of the power provider, police, firefighters, red cross, etc. These institutions are professionalized for dealing with such situations, but the people affected by a power outage also need to be considered as actors.

    @inproceedings{balduin_infostrom_2010,
    address = {Berlin, Germany},
    title = {{InfoStrom}: {Learning} information infrastructures for crisis management in case of medium to large electrical power breakdowns.},
    url = {http://www.peasec.de/paper/2010/2010_Balduinetal_LearningInfrastructuresCrisisManagement_FutureSecurity.pdf},
    abstract = {One of the most important infrastructures in modern industrialized societies is the electricity network. Due to its fundamental role for many aspects of our everyday life, power infrastructures manifest a strong dependence between power suppliers and customers. Customers take the infrastructure for granted; it appears mostly invisible to them as long as it works, but in the case of breakdowns in power supply customers become aware of the dependence on electricity. They join professional actors in the recovery and coping work with regard to the electricity breakdown: Maintenance workers of the power provider, police, firefighters, red cross, etc. These institutions are professionalized for dealing with such situations, but the people affected by a power outage also need to be considered as actors.},
    booktitle = {Future {Security} - {Proceedings} of the {Security} {Research} {Conference}},
    publisher = {Fraunhofer VVS},
    author = {Balduin, Norbert and Becker, Georg and Brand, Jürgen and Görgen, Michael and Hannappel, Mario and Hasenfuß, Patrick and Ley, Benedikt and Pipek, Volkmar and Probst, Florian and Reuter, Christian and Rose, Thomas and Rusch, Gebhard and Wiedenhoefer, Torben and Zinnen, Andreas},
    year = {2010},
    keywords = {Cooperation, Crisis, HCI, Projekt-InfoStrom, UsableSec, Projekt-RSBE, Security, Infrastructure},
    }

    Störfallkommunikation: Pro-Aktives Kommunikationsmanagement für den Störfall (2006-2008, RWE)

    Störfallkommunikation: Pro-Aktives Kommunikationsmanagement für den Störfall (2006-2008, RWE)

    Das Forschungsprojekt analysiert neue Möglichkeiten der Kunden­kommu­ni­ka­tion im Störfall. Im Besonderen wird untersucht, welche kommu­nikativen Maßnahmen und Ak­tio­nen unter­nom­men werden können, um Betroffene von Stromausfällen zu infor­mie­ren und zu unterstützen. Das Projekt wird in enger Kooperation mit und Finanz­ier­ung durch RWE Rhein-Ruhr Netzser­vice durchgeführt, welches das größte deutsche Netz­ser­vice-Unternehmen darstellt und verantwortlich ist für den Be­trieb und die Steuerung der Strom-, Gas- und Wasserversorgungsnetze, die der RWE Rhein-Ruhr AG gehören. Das Projekt um­fasst (1) die Evaluation der der­zei­tigen Methoden und Instrumente zur Störfall­kommu­nikation, welche bereits von der RWE benutzt werden, (2) die Auswer­tung des Stands der Technik sowie zu­künftige Entwicklungen in den Medien- und In­for­mationstechnologien, welche für die Unterstützung im Stör­fall genutzt wer­den können, sowie (3) die Er­for­schung früherer Stromausfälle und Natur­ka­tas­trophen mit ihren spezifischen kommu­nikativen Problemen.
    Das Hauptziel des Projektes ist die Realisierung eines pro-aktiven Kommu­ni­ka­tionsmanage­ment-Tools, um Personen zu helfen, die von einem Strom­aus­fall, vom kleinen Aussetzer bis zum Worst-Case Sze­na­rio, betroffen sind. Das For­schungs­projekt will daher kommunikative, orga­ni­sa­tor­ische und technische Maßnahmen zur Verbesserung der Stör­fall­kommu­ni­ka­tion for­mulieren. Diese beinhalten die prototypische Realisierung eines auto­ma­tisierten Systems zur Information der Kunden, welches die verschiedenen Kanäle wie Rundfunk, In­ter­net und mobile Medien inte­griert. Weiter beinhaltet es die Identifikation ty­pi­scher Störfallszenarien mit ihren jeweils typischen chronologischen Abfolgen. Diese Szenarien sollen wich­tige Zeitfenster für die Kommunikation aufzeigen. Das Projekt soll Wege und Möglichkeiten zur Integration dieser Maßnahmen und neuen Techno­lo­gien in das bestehende Management der Störfallkommuni­ka­tion bei der RWE Rhein-Ruhr Netzservice deutlich machen.

    2010

  • Claudia Mueller, Volkmar Pipek, Christian Reuter (2010)
    Globale Infrastruktur – lokales Arbeiten: Praxis IT-gestützter Wartung bei einem Energieversorger
    Mensch & Computer 2010: Interaktive Kulturen Duisburg, Germany.
    [BibTeX] [Abstract] [Download PDF]

    Lokale Praxis und globale Informations- und Kommunikationstechnik (IT) gehen immer dann eine sichtbare Verbindung ein, wenn IT eingesetzt wird, um Echtzeit-Informationen an einen anderen Ort zu übertragen, so wie dies z.B. durch Mobiltelefone/ MMS, ferngesteuerte Sensoren oder Live-Webcams geschieht. Diese Arbeit beschreibt eine Feldstudie zu IT-unterstützter Wartungsarbeit innerhalb der Infrastruktur eines Energieversorgers. Die Studie möchte insbesondere die Relationen zwischen lokalen Praxen und der Gestaltung einer IT-Infrastruktur als „Location Based System“ hervorheben, die nicht auf den ersten Blick sichtbar sind. Besonders richten wir den Blick sowohl auf „das Globale“ als auch auf „das Lokale“ von Strom- und IT-Infrastruktur. Wir orientieren uns am Infrastruktur-Konzept von Star & Ruhleder (1996) für eine Beschreibung und Analyse zweier unterschiedlicher Wartungsteams vor dem Hintergrund sozio-räumlicher sowie sozio-technischer Aspekte der Energieversorgungsinfrastruktur, der Informations- und Kommunikations-Infrastruktur und der jeweilig resultierenden Arbeitspraxis und diskutieren Konsequenzen für eine infrastrukturorientierte Technikgestaltung.

    @inproceedings{mueller_globale_2010,
    address = {Duisburg, Germany},
    title = {Globale {Infrastruktur} - lokales {Arbeiten}: {Praxis} {IT}-gestützter {Wartung} bei einem {Energieversorger}},
    url = {http://www.peasec.de/paper/2010/2010_MuellerPipekReuter_GlobaleInfrastruktur-ITWartungEnergieversorger_MuC.pdf},
    abstract = {Lokale Praxis und globale Informations- und Kommunikationstechnik (IT) gehen immer dann eine sichtbare Verbindung ein, wenn IT eingesetzt wird, um Echtzeit-Informationen an einen anderen Ort zu übertragen, so wie dies z.B. durch Mobiltelefone/ MMS, ferngesteuerte Sensoren oder Live-Webcams geschieht. Diese Arbeit beschreibt eine Feldstudie zu IT-unterstützter Wartungsarbeit innerhalb der Infrastruktur eines Energieversorgers. Die Studie möchte insbesondere die Relationen zwischen lokalen Praxen und der Gestaltung einer IT-Infrastruktur als „Location Based System“ hervorheben, die nicht auf den ersten Blick sichtbar sind. Besonders richten wir den Blick sowohl auf „das Globale“ als auch auf „das Lokale“ von Strom- und IT-Infrastruktur. Wir orientieren uns am Infrastruktur-Konzept von Star \& Ruhleder (1996) für eine Beschreibung und Analyse zweier unterschiedlicher Wartungsteams vor dem Hintergrund sozio-räumlicher sowie sozio-technischer Aspekte der Energieversorgungsinfrastruktur, der Informations- und Kommunikations-Infrastruktur und der jeweilig resultierenden Arbeitspraxis und diskutieren Konsequenzen für eine infrastrukturorientierte Technikgestaltung.},
    booktitle = {Mensch \& {Computer} 2010: {Interaktive} {Kulturen}},
    publisher = {Oldenbourg-Verlag},
    author = {Mueller, Claudia and Pipek, Volkmar and Reuter, Christian},
    editor = {Ziegler, Jürgen and Schmidt, Albrecht},
    year = {2010},
    keywords = {Cooperation, Crisis, HCI, Projekt-InfoStrom, Projekt-RSBE, Infrastructure, Projekt-RWE},
    pages = {37--46},
    }

    2009

  • Christian Reuter, Volkmar Pipek, Claudia Mueller (2009)
    Avoiding crisis in communication: a computer-supported training approach for emergency management
    International Journal of Emergency Management (IJEM) ;6(3-4):356–368.
    [BibTeX] [Abstract] [Download PDF]

    Crisis management requires stakeholders not only to show strategic, organisational preparedness for crisis events (e.g., by systematising and professionalising coping with work), but also to develop skills in dealing with unanticipated events and other stakeholders involved in the same crisis. They should not only rely on established information flows and behaviour patterns, but also be able to deal with situational aspects. This usually involves communication work within and between organisations involved in crisis management. We describe the practice of the crisis communication training of a German Electricity Provider (GEP) and the prototype we developed, implemented and evaluated. The collaborative training tool targets not only the local practice, but also interorganisational training that will allow improving the mutual understanding of communication practices and meeting the information needs of other stakeholders.

    @article{reuter_avoiding_2009,
    title = {Avoiding crisis in communication: a computer-supported training approach for emergency management},
    volume = {6},
    url = {http://www.peasec.de/paper/2009/2009_ReuterPipekMueller_AvoidingCrisisinCommunication_IJEM.pdf},
    abstract = {Crisis management requires stakeholders not only to show strategic, organisational preparedness for crisis events (e.g., by systematising and professionalising coping with work), but also to develop skills in dealing with unanticipated events and other stakeholders involved in the same crisis. They should not only rely on established information flows and behaviour patterns, but also be able to deal with situational aspects. This usually involves communication work within and between organisations involved in crisis management. We describe the practice of the crisis communication training of a German Electricity Provider (GEP) and the prototype we developed, implemented and evaluated. The collaborative training tool targets not only the local practice, but also interorganisational training that will allow improving the mutual understanding of communication practices and meeting the information needs of other stakeholders.},
    number = {3-4},
    journal = {International Journal of Emergency Management (IJEM)},
    author = {Reuter, Christian and Pipek, Volkmar and Mueller, Claudia},
    year = {2009},
    keywords = {Crisis, HCI, Projekt-RWE},
    pages = {356--368},
    }

  • Christian Reuter (2009)
    Social Software als kritische Informations-Infrastruktur
    Mensch und Computer – Workshopband Berlin, Germany.
    [BibTeX] [Abstract] [Download PDF]

    Web 2.0 Anwendungen haben in einigen Anwendungsfeldern zur Unterstützung von Kommunikation und Zusammenarbeit in Unternehmen Einzug gehalten. Dieser Beitrag stellt auch mithilfe von Beispielen dar, warum Social Software als kritische Informations-Infrastruktur (KII) betrachtet werden kann. Es wird gezeigt, dass das „kritisch“ im Bezug auf die „Infrastruktur“ Fallbezogen verschieden gedeutet werden kann: zum einen kann deren Ausfall betriebliche Prozesse lähmen, zum anderen kann durch dessen Verfügbarkeit eine explizite und ungewünschte Darstellung kritischer Sachverhalte erfolgen.

    @inproceedings{reuter_social_2009,
    address = {Berlin, Germany},
    title = {Social {Software} als kritische {Informations}-{Infrastruktur}},
    url = {http://www.peasec.de/paper/2009/2009_Reuter_SocialSoftwarealsKritischeInfrastruktur_MenschComputer-WS.pdf},
    abstract = {Web 2.0 Anwendungen haben in einigen Anwendungsfeldern zur Unterstützung von Kommunikation und Zusammenarbeit in Unternehmen Einzug gehalten. Dieser Beitrag stellt auch mithilfe von Beispielen dar, warum Social Software als kritische Informations-Infrastruktur (KII) betrachtet werden kann. Es wird gezeigt, dass das „kritisch“ im Bezug auf die „Infrastruktur“ Fallbezogen verschieden gedeutet werden kann: zum einen kann deren Ausfall betriebliche Prozesse lähmen, zum anderen kann durch dessen Verfügbarkeit eine explizite und ungewünschte Darstellung kritischer Sachverhalte erfolgen.},
    booktitle = {Mensch und {Computer} - {Workshopband}},
    publisher = {Logos-Verlag},
    author = {Reuter, Christian},
    editor = {Kain, Saskia and Struve, Doreen and Wandke, Hartmut},
    year = {2009},
    keywords = {Crisis, HCI, SocialMedia, Infrastructure, Projekt-RWE},
    pages = {140--144},
    }

  • Christian Reuter, Volkmar Pipek, Claudia Mueller (2009)
    Computer Supported Collaborative Training in Crisis Communication Management
    Proceedings of the Information Systems for Crisis Response and Management (ISCRAM) Gothenburg, Sweden.
    [BibTeX] [Abstract] [Download PDF]

    Crisis management requires stakeholders to not only show strategic, organisational preparedness for crisis events (e.g. by systematising and professionalizing coping work), but also to develop skills to deal with unanticipated events and other stakeholders involved in the same crisis. They should not only rely on established information flows and behaviour patterns, but should be able to deal with situational aspects. This usually involves communication work within and between organisations involved in crisis management. We describe the practice of the crisis communication training of a German electricity provider and the prototype we developed, implemented and evaluated. The collaborative training tool targets not only the local practice, but aims at inter-organisational trainings that would also allow improving the mutual understanding for communication practices and information needs of other stakeholders.

    @inproceedings{reuter_computer_2009,
    address = {Gothenburg, Sweden},
    title = {Computer {Supported} {Collaborative} {Training} in {Crisis} {Communication} {Management}},
    url = {http://www.peasec.de/paper/2009/2009_ReuterPipekMueller_ComputerSupportedCollaborativeTraining_ISCRAM.pdf},
    abstract = {Crisis management requires stakeholders to not only show strategic, organisational preparedness for crisis events (e.g. by systematising and professionalizing coping work), but also to develop skills to deal with unanticipated events and other stakeholders involved in the same crisis. They should not only rely on established information flows and behaviour patterns, but should be able to deal with situational aspects. This usually involves communication work within and between organisations involved in crisis management. We describe the practice of the crisis communication training of a German electricity provider and the prototype we developed, implemented and evaluated. The collaborative training tool targets not only the local practice, but aims at inter-organisational trainings that would also allow improving the mutual understanding for communication practices and information needs of other stakeholders.},
    booktitle = {Proceedings of the {Information} {Systems} for {Crisis} {Response} and {Management} ({ISCRAM})},
    publisher = {ISCRAM},
    author = {Reuter, Christian and Pipek, Volkmar and Mueller, Claudia},
    editor = {Landgren, Jonas and Jul, S},
    year = {2009},
    keywords = {Crisis, HCI, Projekt-RWE},
    }

  • Christian Reuter, Volkmar Pipek (2009)
    Krisenkommunikation trainieren: Ein webgestützter Ansatz
    Mensch & Computer 2009: Grenzenlos frei? Berlin, Germany.
    [BibTeX] [Abstract] [Download PDF]

    Krisenmanagement fordert neben strategischer und organisationaler Vorbereitung auf die Bewältigungs- und Wiederherstellungsarbeit, auch Fähigkeiten, mit unvorhersehbaren Ereignissen und anderen Stakeholdern, die in die gleiche Krise involviert sind, umzugehen. Hier kann man sich nicht ausschließlich auf etablierte Informationsflüsse und Verhaltensmuster verlassen, sondern muss sich auch spontan-situativen Einflüssen stellen. Die für die Kommunikationsarbeit in und zwischen den involvierten Organisationen notwendigen Fähigkeiten müssen trainiert werden. Wir beschreiben die aktuelle Praxis des Krisenkommunikations-Trainings eines Energieversorgungsunternehmens (EVU) sowie den Prototypen zu dessen Unterstützung, den wir entwickelt, implementiert und evaluiert haben. Unser Trainingswerkzeug zielt nicht nur auf die lokale Praxis, sondern auch interorganisationale Trainings, was die Verbesserung eines gemeinsamen Verständnisses sowie der Informationsbedarfe anderer beinhaltet.

    @inproceedings{reuter_krisenkommunikation_2009,
    address = {Berlin, Germany},
    title = {Krisenkommunikation trainieren: {Ein} webgestützter {Ansatz}},
    url = {http://www.peasec.de/paper/2009/2009_ReuterPipek_KrisenkommunikationTrainieren_MenschComputer.pdf},
    abstract = {Krisenmanagement fordert neben strategischer und organisationaler Vorbereitung auf die Bewältigungs- und Wiederherstellungsarbeit, auch Fähigkeiten, mit unvorhersehbaren Ereignissen und anderen Stakeholdern, die in die gleiche Krise involviert sind, umzugehen. Hier kann man sich nicht ausschließlich auf etablierte Informationsflüsse und Verhaltensmuster verlassen, sondern muss sich auch spontan-situativen Einflüssen stellen. Die für die Kommunikationsarbeit in und zwischen den involvierten Organisationen notwendigen Fähigkeiten müssen trainiert werden. Wir beschreiben die aktuelle Praxis des Krisenkommunikations-Trainings eines Energieversorgungsunternehmens (EVU) sowie den Prototypen zu dessen Unterstützung, den wir entwickelt, implementiert und evaluiert haben. Unser Trainingswerkzeug zielt nicht nur auf die lokale Praxis, sondern auch interorganisationale Trainings, was die Verbesserung eines gemeinsamen Verständnisses sowie der Informationsbedarfe anderer beinhaltet.},
    booktitle = {Mensch \& {Computer} 2009: {Grenzenlos} frei?},
    publisher = {Oldenbourg-Verlag},
    author = {Reuter, Christian and Pipek, Volkmar},
    editor = {Wandke, Hartmut and Kain, Saskia and Struve, Doreen},
    year = {2009},
    keywords = {Crisis, HCI, Projekt-RWE},
    pages = {93--102},
    }

    2008

  • Christian Reuter (2008)
    Computerunterstütztes kollaboratives Training im Krisenkommunikations-Management am Beispiel eines Energieversorgungsunternehmens (Diplomarbeit)
    Siegen: .
    [BibTeX] [Download PDF]

    @book{reuter_computerunterstutztes_2008,
    address = {Siegen},
    title = {Computerunterstütztes kollaboratives {Training} im {Krisenkommunikations}-{Management} am {Beispiel} eines {Energieversorgungsunternehmens} ({Diplomarbeit})},
    url = {https://peasec.de/paper/2008/2008_Reuter_KrisentrainingEnergieversorger_Diplomarbeit_Auszug.pdf},
    author = {Reuter, Christian},
    editor = {Pipek, Volkmar and Wulf, Volker},
    year = {2008},
    keywords = {Cooperation, Crisis, HCI, UsableSec, Security, Projekt-RWE},
    }