SecUrban: Secure Urban Infrastructures
Mission innerhalb des Nationalen Forschungszentrums für angewandte Cybersicherheit ATHENE – Website
Das Nationale Forschungszentrum für angewandte Cybersicherheit ATHENE ist eine Forschungseinrichtung der Fraunhofer-Institute SIT und IGD sowie der Hochschulen TU Darmstadt und Hochschule Darmstadt. In einem bisher einzigartigen und innovativen Kooperationsmodell von universitärer und außeruniversitärer Forschung betreibt ATHENE Spitzenforschung zum Wohl von Wirtschaft, Gesellschaft und Staat und setzt Impulse in der Wissenschaft. Das Forschungszentrum arbeitet agil und effizient und kann so auch kurzfristig auf neue Herausforderungen und veränderte Bedrohungslagen reagieren.
ATHENE wird gefördert vom Bundesministerium für Bildung und Forschung (BMBF) und vom Hessischen Ministerium für Wissenschaft und Kunst (HMWK) und hat seinen Standort in der Wissenschaftsstadt Darmstadt, Deutschlands erster Adresse für Cybersicherheitsforschung. Eine der Missionen von ATHENE is SecUrban:
SecUrban: Secure Urban Infrastructures
The main goal of SecUrban is to provide secure and reliable information and communication infrastructure (ICT) for critical infrastructures (CI) to achieve understandable and actionable security solutions, using the Digitalstadt Darmstadt as an empirical case.
Involved ATHENE partners:
- TU Darmstadt, Science and Technology for Peace and Security – PEASEC (Prof. Dr. Dr. Christian Reuter) – Lead
- TU Darmstadt, Secure Mobile Networking Lab – SEEMOO (Prof. Dr.-Ing. Matthias Hollick)
- TU Darmstadt, Telecooperation Lab (Prof. Dr. Max Mühlhäuser)
- TU Darmstadt, Work and Engineering Psychology Research Group – FAI (Prof. Dr. Joachim Vogt)
- Fraunhofer SIT, Cybersecurity Analytics and Defences (Dr. Haya Shulman)
- Fraunhofer IGD, Smart Living & Biometric Technologies (Florian Kirchbuchner M.Sc.)
Publikationen von PEASEC:
2025
[BibTeX]
@book{haunschild_enhancing_2025,
address = {Wiesbaden, Germany},
title = {Enhancing {Citizens}’ {Role} in {Public} {Safety}: {Interaction}, {Perception} and {Design} of {Mobile} {Warning} {Apps}},
publisher = {Springer Vieweg},
author = {Haunschild, Jasmin},
year = {2025},
keywords = {Crisis, HCI, Projekt-emergenCITY, Projekt-ATHENE-SecUrban, DissPublisher},
}
2024
[BibTeX]
@book{haunschild_enhancing_2024,
address = {Darmstadt, Germany},
title = {Enhancing {Citizens}’ {Role} in {Public} {Safety}: {Interaction}, {Perception} and {Design} of {Mobile} {Warning} {Apps}},
publisher = {Dissertation (Dr. rer. nat.), Department of Computer Science, Technische Universität Darmstadt},
author = {Haunschild, Jasmin},
year = {2024},
keywords = {Crisis, HCI, Projekt-emergenCITY, Projekt-ATHENE-SecUrban, Dissertation},
}
[BibTeX] [Abstract] [Download PDF]
In Colombia, Transitional Justice (TJ) institutions were established after years of violent conflict as part of the 2016 peace agreement between the FARC and the Colombian government. By analysing the posting behaviour of the government-appointed TJ institutions on Facebook, we show how general TJ aims and opportunities for citizen participation were promoted in 2019. Our analysis reveals that the organisations rarely address topics related to reconciliation and that active online participation and two-way communication are rather scarce. Instead, Facebook is mainly used by the TJ organisations to increase solidarity with victims and disseminate information about their work and the TJ process. Reflecting on existing literature on TJ and social media participation, we identify great potential for expanding TJ goals and community engagement on social media, to use it as a resource for facilitating the TJ processes, creating exchange, and enabling participation.
@article{haunschild_towards_2024,
title = {Towards a {Digitally} {Mediated} {Transitional} {Justice} {Process}? {An} {Analysis} of {Colombian} {Transitional} {Justice} {Organisations}’ {Posting} {Behaviour} on {Facebook}},
volume = {30},
issn = {1082-7307},
url = {https://nsuworks.nova.edu/pcs/vol30/iss2/4/},
abstract = {In Colombia, Transitional Justice (TJ) institutions were established after years of violent conflict as part of the 2016 peace agreement between the FARC and the Colombian government. By analysing the posting behaviour of the government-appointed TJ institutions on Facebook, we show how general TJ aims and opportunities for citizen participation were promoted in 2019. Our analysis reveals that the organisations rarely address topics related to reconciliation and that active online participation and two-way communication are rather scarce. Instead, Facebook is mainly used by the TJ organisations to increase solidarity with victims and disseminate information about their work and the TJ process. Reflecting on existing literature on TJ and social media participation, we identify great potential for expanding TJ goals and community engagement on social media, to use it as a resource for facilitating the TJ processes, creating exchange, and enabling participation.},
number = {2},
journal = {Peace and Conflict Studies},
author = {Haunschild, Jasmin and Guntrum, Laura and Cerrillo, Sofía and Bujara, Franziska and Reuter, Christian},
year = {2024},
keywords = {Peace, Student, Projekt-ATHENE-SecUrban, SocialMedia},
}
[BibTeX] [Abstract] [Download PDF]
In disasters and crises, crisis preparation at the household level is crucial for societal resilience. However, motivating citizens to take personal responsibility and to implement preparedness measures remains challenging. This study investigates the impact of values, beliefs and norms on preparedness. Through a survey in Germany on resource-oriented crisis preparedness and participants’ values, a group of more prepared and less prepared individuals was differentiated. We quantitatively analyzed the correlation between values and crisis preparedness. A quantitative analysis revealed a significant association between the value of benevolence and higher preparedness. Follow-up interviews (N=30) explored participants&\#039; beliefs and norms, showing minimal group differences. Although crisis preparedness is generally viewed positively, strong negativity exists towards perceived “hoarders”. The study discusses implication for crisis communication and the design of nudges and persuasive systems, emphasizing intervention that can trigger benevolence to foster preparedness and appeal to the social benefits to counter the narrative of anti-social crisis preparedness.
@article{haunschild_understanding_2024,
title = {Understanding {Crisis} {Preparedness}: {Insights} from {Personal} {Values}, {Beliefs}, {Social} {Norms}, and {Personal} {Norms}},
volume = {21},
url = {https://ojs.iscram.org/index.php/Proceedings/article/view/19},
abstract = {In disasters and crises, crisis preparation at the household level is crucial for societal resilience. However, motivating citizens to take personal responsibility and to implement preparedness measures remains challenging. This study investigates the impact of values, beliefs and norms on preparedness. Through a survey in Germany on resource-oriented crisis preparedness and participants’ values, a group of more prepared and less prepared individuals was differentiated. We quantitatively analyzed the correlation between values and crisis preparedness. A quantitative analysis revealed a significant association between the value of benevolence and higher preparedness. Follow-up interviews (N=30) explored participants\&\#039; beliefs and norms, showing minimal group differences. Although crisis preparedness is generally viewed positively, strong negativity exists towards perceived “hoarders”. The study discusses implication for crisis communication and the design of nudges and persuasive systems, emphasizing intervention that can trigger benevolence to foster preparedness and appeal to the social benefits to counter the narrative of anti-social crisis preparedness.},
urldate = {2024-05-27},
journal = {Proceedings of the Information Systems for Crisis Response and Management (ISCRAM) (Best Paper Award)},
author = {Haunschild, Jasmin and Burger, Felix and Reuter, Christian},
month = may,
year = {2024},
note = {Section: ISCRAM Proceedings},
keywords = {Student, Crisis, Projekt-emergenCITY, Projekt-ATHENE-SecUrban},
}
[BibTeX] [Abstract] [Download PDF]
The ever-increasing number of threats and the existing diversity of information sources pose challenges for Computer Emergency Response Teams (CERTs). To respond to emerging threats, CERTs must gather information in a timely and comprehensive manner. But the volume of sources and information leads to information overload. This paper contributes to the question of how to reduce information overload for CERTs. We propose clustering incoming information as scanning this information is one of the most tiresome, but necessary, manual steps. Based on current studies, we establish conditions for such a framework. Different types of evaluation metrics are used and selected in relation to the framework conditions. Furthermore, different document embeddings and distance measures are evaluated and interpreted in combination with clustering methods. We use three different corpora for the evaluation, a novel ground truth corpus based on threat reports, one security bug report (SBR) corpus, and one with news articles. Our work shows, it is possible to reduce the information overload by up to 84.8\% with homogeneous clusters. A runtime analysis of the clustering methods strengthens the decision of selected clustering methods. The source code and dataset will be made publicly available after acceptance.
@misc{kuehn_threatcluster_2024,
title = {{ThreatCluster}: {Threat} {Clustering} for {Information} {Overload} {Reduction} in {Computer} {Emergency} {Response} {Teams}},
shorttitle = {{ThreatCluster}},
url = {http://arxiv.org/abs/2210.14067},
doi = {10.48550/arXiv.2210.14067},
abstract = {The ever-increasing number of threats and the existing diversity of information sources pose challenges for Computer Emergency Response Teams (CERTs). To respond to emerging threats, CERTs must gather information in a timely and comprehensive manner. But the volume of sources and information leads to information overload. This paper contributes to the question of how to reduce information overload for CERTs. We propose clustering incoming information as scanning this information is one of the most tiresome, but necessary, manual steps. Based on current studies, we establish conditions for such a framework. Different types of evaluation metrics are used and selected in relation to the framework conditions. Furthermore, different document embeddings and distance measures are evaluated and interpreted in combination with clustering methods. We use three different corpora for the evaluation, a novel ground truth corpus based on threat reports, one security bug report (SBR) corpus, and one with news articles. Our work shows, it is possible to reduce the information overload by up to 84.8\% with homogeneous clusters. A runtime analysis of the clustering methods strengthens the decision of selected clustering methods. The source code and dataset will be made publicly available after acceptance.},
urldate = {2024-03-18},
publisher = {arXiv},
author = {Kuehn, Philipp and Nadermahmoodi, Dilara and Kerk, Moritz and Reuter, Christian},
month = mar,
year = {2024},
note = {arXiv:2210.14067 [cs]
version: 2},
keywords = {Student, Security, UsableSec, Projekt-CYWARN, Projekt-ATHENE-SecUrban},
}
[BibTeX] [Abstract] [Download PDF]
In today’s world, cyber-attacks are becoming more frequent and thus proactive protection against them is becoming more important. Cyber Threat Intelligence (CTI) is a possible solution, as it collects threat information in various information sources and derives stakeholder intelligence to protect one’s infrastructure. The current focus of CTI in research is the clear web, but the dark web may contain further information. To further advance protection, this work analyzes the dark web as Open Source Intelligence (OSINT) data source to complement current CTI information. The underlying assumption is that hackers use the dark web to exchange, develop, and share information and assets. This work aims to understand the structure of the dark web and identify the amount of its openly available CTI related information. We conducted a comprehensive literature review for dark web research and CTI. To follow this up we manually investigated and analyzed 65 dark web forum (DWF), 7 single-vendor shops, and 72 dark web marketplace (DWM). We documented the content and relevance of DWFs and DWMs for CTI, as well as challenges during the extraction and provide mitigations. During our investigation we identified IT security relevant information in both DWFs and DWMs, ranging from malware toolboxes to hacking-as-a-service. One of the most present challenges during our manual analysis were necessary interactions to access information and anti-crawling measures, i.e., CAPTCHAs. This analysis showed 88\% of marketplaces and 53\% of forums contained relevant data. Our complementary semi-automated analysis of 1,186,906 onion addresses indicates, that the necessary interaction makes it difficult to see the dark web as an open, but rather treat it as specialized information source, when clear web information does not suffice.
@article{kuehn_navigating_2024,
title = {Navigating the {Shadows}: {Manual} and {Semi}-{Automated} {Evaluation} of the {Dark} {Web} for {Cyber} {Threat} {Intelligence}},
volume = {12},
issn = {2169-3536},
shorttitle = {Navigating the {Shadows}},
url = {https://ieeexplore.ieee.org/document/10643518},
doi = {10.1109/ACCESS.2024.3448247},
abstract = {In today’s world, cyber-attacks are becoming more frequent and thus proactive protection against them is becoming more important. Cyber Threat Intelligence (CTI) is a possible solution, as it collects threat information in various information sources and derives stakeholder intelligence to protect one’s infrastructure. The current focus of CTI in research is the clear web, but the dark web may contain further information. To further advance protection, this work analyzes the dark web as Open Source Intelligence (OSINT) data source to complement current CTI information. The underlying assumption is that hackers use the dark web to exchange, develop, and share information and assets. This work aims to understand the structure of the dark web and identify the amount of its openly available CTI related information. We conducted a comprehensive literature review for dark web research and CTI. To follow this up we manually investigated and analyzed 65 dark web forum (DWF), 7 single-vendor shops, and 72 dark web marketplace (DWM). We documented the content and relevance of DWFs and DWMs for CTI, as well as challenges during the extraction and provide mitigations. During our investigation we identified IT security relevant information in both DWFs and DWMs, ranging from malware toolboxes to hacking-as-a-service. One of the most present challenges during our manual analysis were necessary interactions to access information and anti-crawling measures, i.e., CAPTCHAs. This analysis showed 88\% of marketplaces and 53\% of forums contained relevant data. Our complementary semi-automated analysis of 1,186,906 onion addresses indicates, that the necessary interaction makes it difficult to see the dark web as an open, but rather treat it as specialized information source, when clear web information does not suffice.},
journal = {IEEE Access},
author = {Kuehn, Philipp and Wittorf, Kyra and Reuter, Christian},
year = {2024},
keywords = {Student, Security, UsableSec, Projekt-CYWARN, Projekt-ATHENE-SecUrban, Ranking-CORE-A, Ranking-ImpactFactor},
pages = {118903--118922},
}
2023
[BibTeX] [Abstract] [Download PDF]
Data augmentation, the artificial creation of training data for machine learning by transformations, is a widely studied research field across machine learning disciplines. While it is useful for increasing a model’s generalization capabilities, it can also address many other challenges and problems, from overcoming a limited amount of training data, to regularizing the objective, to limiting the amount data used to protect privacy. Based on a precise description of the goals and applications of data augmentation and a taxonomy for existing works, this survey is concerned with data augmentation methods for textual classification and aims to provide a concise and comprehensive overview for researchers and practitioners. Derived from the taxonomy, we divide more than 100 methods into 12 different groupings and give state-of-the-art references expounding which methods are highly promising by relating them to each other. Finally, research perspectives that may constitute a building block for future work are provided.
@article{bayer_survey_2023,
title = {A {Survey} on {Data} {Augmentation} for {Text} {Classification}},
volume = {55},
url = {https://dl.acm.org/doi/pdf/10.1145/3544558},
doi = {10.1145/3544558},
abstract = {Data augmentation, the artificial creation of training data for machine learning by transformations, is a widely studied research field across machine learning disciplines. While it is useful for increasing a model's generalization capabilities, it can also address many other challenges and problems, from overcoming a limited amount of training data, to regularizing the objective, to limiting the amount data used to protect privacy. Based on a precise description of the goals and applications of data augmentation and a taxonomy for existing works, this survey is concerned with data augmentation methods for textual classification and aims to provide a concise and comprehensive overview for researchers and practitioners. Derived from the taxonomy, we divide more than 100 methods into 12 different groupings and give state-of-the-art references expounding which methods are highly promising by relating them to each other. Finally, research perspectives that may constitute a building block for future work are provided.},
number = {7},
journal = {ACM Computing Surveys (CSUR)},
author = {Bayer, Markus and Kaufhold, Marc-André and Reuter, Christian},
year = {2023},
keywords = {Crisis, Projekt-CYWARN, Projekt-emergenCITY, Projekt-ATHENE-SecUrban, A-Paper, AuswahlKaufhold, Ranking-CORE-A*, Selected, AuswahlCrisis, Ranking-ImpactFactor},
pages = {1--39},
}
[BibTeX] [Abstract] [Download PDF]
Kritische Infrastrukturen sind häufig über Jahrzehnte gewachsene, komplexe Netze. Dennoch fehlt derzeit die historische Perspektive auf die Aufschichtungstendenzen von Technologien in den Sektoren, die für die Gesellschaft essenzielle Dienste bereitstellen. Ein besseres Verständnis von Ausbreitungs-, Ausbau-, Ersatz- und Ausmusterungsprozessen kann Entscheidungshilfe und Orientierung für resilientere Versorgungsnetzarchitekturen in der Zukunft geben. Kompatibilitätsprobleme mit Legacy-Soft- und Hardware sind bekannte Phänomene in vielen KRITIS-Einrichtungen. Entsprechend gewinnen Wissens- und Erfahrungstransfers bei zunehmend komplexen, dennoch über Jahrzehnte verwendete Technologien in landwirtschaftlichen Betrieben enorm an Bedeutung. Der Beitrag vollzieht die Konzeption und Fragestellungen eines interdisziplinären Forschungsprojekts nach, in welchem die Verwundbarkeit der kritischen Infrastruktursektoren Verkehr und Kommunikation im Rhein-Main-Gebiet analysiert wird. Von den Leistungen beider Sektoren hängt die digitale Landwirtschaft stark ab. Insbesondere rurale, beim digitalen und Schienennetzausbau häufig vernachlässigte Gebiete werden dabei mittels explorativer Interviewstudie und anschließender archivbasierter, quantitativer Überprüfung der zuvor generierten Hypothesen aus einer raum-zeitlichen und technischen Perspektive untersucht.
@incollection{franken_netz_2023,
address = {Bonn},
title = {Das {Netz} hat {Geschichte}: {Historisch}-technische {Analyse} der kritischen {Infrastrukturen} in der {Region} {Rhein}/{Main}},
url = {https://peasec.de/paper/2023/2023_FrankenZivkovicThiessenEngelsReuter_NetzGeschichte_GI.pdf},
abstract = {Kritische Infrastrukturen sind häufig über Jahrzehnte gewachsene, komplexe Netze. Dennoch fehlt derzeit die historische Perspektive auf die Aufschichtungstendenzen von Technologien in den Sektoren, die für die Gesellschaft essenzielle Dienste bereitstellen. Ein besseres Verständnis von Ausbreitungs-, Ausbau-, Ersatz- und Ausmusterungsprozessen kann Entscheidungshilfe und Orientierung für resilientere Versorgungsnetzarchitekturen in der Zukunft geben. Kompatibilitätsprobleme mit Legacy-Soft- und Hardware sind bekannte Phänomene in vielen KRITIS-Einrichtungen. Entsprechend gewinnen Wissens- und Erfahrungstransfers bei zunehmend komplexen, dennoch über Jahrzehnte verwendete Technologien in landwirtschaftlichen Betrieben enorm an Bedeutung. Der Beitrag vollzieht die Konzeption und Fragestellungen eines interdisziplinären Forschungsprojekts nach, in welchem die Verwundbarkeit der kritischen Infrastruktursektoren Verkehr und Kommunikation im Rhein-Main-Gebiet analysiert wird. Von den Leistungen beider Sektoren hängt die digitale Landwirtschaft stark ab. Insbesondere rurale, beim digitalen und Schienennetzausbau häufig vernachlässigte Gebiete werden dabei mittels explorativer Interviewstudie und anschließender archivbasierter, quantitativer Überprüfung der zuvor generierten Hypothesen aus einer raum-zeitlichen und technischen Perspektive untersucht.},
booktitle = {{INFORMATIK} 2023 - {Designing} {Futures}: {Zukünfte} gestalten},
publisher = {Gesellschaft für Informatik e. V.},
author = {Franken, Jonas and Zivkovic, Marco and Thiessen, Nadja and Engels, Jens Ivo and Reuter, Christian},
year = {2023},
doi = {10.18420/inf2023_159},
keywords = {Projekt-AgriRegio, Security, Projekt-emergenCITY, Projekt-ATHENE-SecUrban, Infrastructure},
pages = {1--6},
}
[BibTeX] [Download PDF]
@inproceedings{franken_internets_2023,
address = {Kiel},
title = {The {Internet}’s {Plumbing} {Consists} of {Garden} {Hoses}: {A} {Critical} {Analysis} of the {Advantages} and {Pitfalls} of {Metaphors} {Use} for {Critical} {Maritime} {Infrastructures}},
url = {https://peasec.de/paper/2023/2023_FrankenSchneiderReuter_MetaphernMarKRITIS_Dreizack23.pdf},
booktitle = {Dreizack 23},
publisher = {The Kiel Seapower Series},
author = {Franken, Jonas and Schneider, Franziska and Reuter, Christian},
editor = {Schilling, Henrik},
year = {2023},
keywords = {Peace, Projekt-AgriRegio, Security, Projekt-ATHENE-SecUrban, Projekt-NetzGeschichte},
pages = {1--8},
}
[BibTeX] [Abstract] [Download PDF]
The article examines which technical aspects of autonomous driving are potentially transferable to the military sector. Through expert interviews the strong fragmentation of technologies in the field of autonomous driving becomes apparent. This hinders the clear identification of a specific dual-use technology. Environmental perception, artificial intelligence and sensors are considered to have the highest transferability rate from civil research to the military sector. Therefore, sensor development should receive special attention.
@article{guntrum_dual-use_2023,
title = {Dual-{Use} {Technologies} in the {Context} of {Autonomous} {Driving}: {An} {Empirical} {Case} {Study} {From} {Germany}},
issn = {1866-2196},
url = {https://doi.org/10.1007/s12399-022-00935-3},
doi = {10.1007/s12399-022-00935-3},
abstract = {The article examines which technical aspects of autonomous driving are potentially transferable to the military sector. Through expert interviews the strong fragmentation of technologies in the field of autonomous driving becomes apparent. This hinders the clear identification of a specific dual-use technology. Environmental perception, artificial intelligence and sensors are considered to have the highest transferability rate from civil research to the military sector. Therefore, sensor development should receive special attention.},
journal = {Zeitschrift für Außen- und Sicherheitspolitik (ZfAS)},
author = {Guntrum, Laura and Schwartz, Sebastian and Reuter, Christian},
month = jan,
year = {2023},
keywords = {Peace, Projekt-TraCe, Projekt-ATHENE-SecUrban},
}
[BibTeX] [Abstract] [Download PDF]
About half a billion households are expected to use smart home systems by 2025. Although many IoT sensors, such as smoke detectors or security cameras, are available and governmental crisis warning systems are in place, little is known about how to warn appropriately in smart home environments. We created a Raspberry Pi based prototype with a speaker, a display, and a connected smart light bulb. Together with a focus group, we developed a taxonomy for warning messages in smart home environments, dividing them into five classes with different stimuli. We evaluated the taxonomy using the Experience Sampling Method (ESM) in a field study at participants‘ (N = 13) homes testing 331 warnings. The results show that taxonomy-based warning stimuli are perceived to be appropriate and participants could imagine using such a warning system. We propose a deeper integration of warning capabilities into smart home environments to enhance the safety of citizens.
@inproceedings{haesler_getting_2023,
address = {New York, NY, USA},
series = {{DIS} '23},
title = {Getting the {Residents}' {Attention}: {The} {Perception} of {Warning} {Channels} in {Smart} {Home} {Warning} {Systems}},
isbn = {978-1-4503-9893-0},
url = {https://peasec.de/paper/2023/2023_HaeslerWendelbornReuter_SmartHomeWarningSystems_DIS},
doi = {10.1145/3563657.3596076},
abstract = {About half a billion households are expected to use smart home systems by 2025. Although many IoT sensors, such as smoke detectors or security cameras, are available and governmental crisis warning systems are in place, little is known about how to warn appropriately in smart home environments. We created a Raspberry Pi based prototype with a speaker, a display, and a connected smart light bulb. Together with a focus group, we developed a taxonomy for warning messages in smart home environments, dividing them into five classes with different stimuli. We evaluated the taxonomy using the Experience Sampling Method (ESM) in a field study at participants' (N = 13) homes testing 331 warnings. The results show that taxonomy-based warning stimuli are perceived to be appropriate and participants could imagine using such a warning system. We propose a deeper integration of warning capabilities into smart home environments to enhance the safety of citizens.},
booktitle = {Proceedings of the {ACM} {Designing} {Interactive} {Systems} {Conference} ({DIS})},
publisher = {Association for Computing Machinery},
author = {Haesler, Steffen and Wendelborn, Marc and Reuter, Christian},
year = {2023},
note = {event-place: Pittsburgh, PA, USA},
keywords = {Student, Crisis, HCI, Projekt-emergenCITY, Projekt-ATHENE-SecUrban, A-Paper, Ranking-CORE-A},
pages = {1114--1127},
}
[BibTeX] [Abstract] [Download PDF]
The digitalisation of critical infrastructure has increased the risk of large-scale cyber incidents. In contrast to the management of conventional emergencies by established civil protection organisations involving volunteers in Germany, few response capacities exist for these events. The concept of a volunteer force for cyber security could close this protection gap. However, such involvement also poses practical and ethical challenges. By conducting interviews with computer science students (N = 11), this paper analyses potential volunteers’ attitudes towards ethical implications of a cyber volunteer force, as well as practical aspects that might motivate or hinder their participation. A qualitative content analysis reveals that students are largely unaware of potential dilemmas connected to vulnerabilities handling and national cybersecurity interests. Ethical guidelines and means of motivating and encouraging potential volunteers are discussed.
@incollection{haunschild_dual-use_2023,
title = {Dual-use in volunteer operations? {Attitudes} of computer science students regarding the establishment of a cyber security volunteer force},
isbn = {978-83-66675-89-6},
url = {https://sciendo.com/chapter/9788366675896/10.2478/9788366675896-006},
abstract = {The digitalisation of critical infrastructure has increased the risk of large-scale cyber incidents. In contrast to the management of conventional emergencies by established civil protection organisations involving volunteers in Germany, few response capacities exist for these events. The concept of a volunteer force for cyber security could close this protection gap. However, such involvement also poses practical and ethical challenges. By conducting interviews with computer science students (N = 11), this paper analyses potential volunteers’ attitudes towards ethical implications of a cyber volunteer force, as well as practical aspects that might motivate or hinder their participation. A qualitative
content analysis reveals that students are largely unaware of potential dilemmas connected to vulnerabilities handling and national cybersecurity interests. Ethical guidelines and means of motivating and encouraging potential volunteers
are discussed.},
booktitle = {International {Symposium} on {Technikpsychologie} ({TecPsy})},
publisher = {Sciendo},
author = {Haunschild, Jasmin and Jung, Leon and Reuter, Christian},
editor = {Nina, Gerber and Zimmermann, Verena},
year = {2023},
keywords = {Student, Security, UsableSec, Crisis, Projekt-emergenCITY, Projekt-ATHENE-SecUrban},
pages = {66--81},
}
[BibTeX] [Abstract] [Download PDF]
Warning apps are used by many to receive warnings about imminent disasters. However, their potential for increasing awareness about general hazards and for increasing preparedness is currently underused. With a mixed-method design that includes a representative survey of the German population, a design workshop and an app evaluation experiment, this study investigates users’ preferences regarding non-acute preparedness alerts’ inclusion in crisis apps and the effectiveness of Nudging in this context. The experiment shows that while the social influence nudge had no significant effect compared to the control group without a nudging condition, the confrontational nudge increased the number of taken recommended preparedness measures. The evaluation indicates that the preparedness alerts increased users’ knowledge and their motivation to use a warning app. This motivation is, in contrast, decreased when the messages are perceived as a disruption. While many oppose push notifications, favor finding persuasively designed preparedness advice in a separate menu or as an optional notification.
@article{haunschild_preparedness_2023,
title = {Preparedness {Nudging} for {Warning} {Apps}? {A} {Mixed}-{Method} {Study} {Investigating} {Popularity} and {Effects} of {Preparedness} {Alerts} in {Warning} {Apps}},
volume = {172},
issn = {1071-5819},
url = {https://peasec.de/paper/2023/2023_HaunschildPauliReuter_NudgingWarningApps_IJHCS.pdf},
doi = {https://doi.org/10.1016/j.ijhcs.2023.102995},
abstract = {Warning apps are used by many to receive warnings about imminent disasters. However, their potential for increasing awareness about general hazards and for increasing preparedness is currently underused. With a mixed-method design that includes a representative survey of the German population, a design workshop and an app evaluation experiment, this study investigates users’ preferences regarding non-acute preparedness alerts’ inclusion in crisis apps and the effectiveness of Nudging in this context. The experiment shows that while the social influence nudge had no significant effect compared to the control group without a nudging condition, the confrontational nudge increased the number of taken recommended preparedness measures. The evaluation indicates that the preparedness alerts increased users’ knowledge and their motivation to use a warning app. This motivation is, in contrast, decreased when the messages are perceived as a disruption. While many oppose push notifications, favor finding persuasively designed preparedness advice in a separate menu or as an optional notification.},
journal = {International Journal on Human-Computer Studies (IJHCS)},
author = {Haunschild, Jasmin and Pauli, Selina and Reuter, Christian},
year = {2023},
keywords = {Student, Crisis, Projekt-emergenCITY, Projekt-ATHENE-SecUrban, A-Paper, Selected, AuswahlCrisis, Ranking-ImpactFactor},
pages = {102995},
}
[BibTeX] [Abstract] [Download PDF]
Publicly available information contains valuable information for Cyber Threat Intelligence (CTI). This can be used to prevent attacks that have already taken place on other systems. Ideally, only the initial attack succeeds and all subsequent ones are detected and stopped. But while there are different standards to exchange this information, a lot of it is shared in articles or blog posts in non-standardized ways. Manually scanning through multiple online portals and news pages to discover new threats and extracting them is a time-consuming task. To automize parts of this scanning process, multiple papers propose extractors that use Natural Language Processing (NLP) to extract Indicators of Compromise (IOCs) from documents. However, while this already solves the problem of extracting the information out of documents, the search for these documents is rarely considered. In this paper, a new focused crawler is proposed called ThreatCrawl, which uses Bidirectional Encoder Representations from Transformers (BERT)-based models to classify documents and adapt its crawling path dynamically. While ThreatCrawl has difficulties to classify the specific type of Open Source Intelligence (OSINT) named in texts, e.g., IOC content, it can successfully find relevant documents and modify its path accordingly. It yields harvest rates of up to 52\%, which are, to the best of our knowledge, better than the current state of the art.
@techreport{kuehn_threatcrawl_2023,
title = {{ThreatCrawl}: {A} {BERT}-based {Focused} {Crawler} for the {Cybersecurity} {Domain}},
shorttitle = {{ThreatCrawl}},
url = {http://arxiv.org/abs/2304.11960},
abstract = {Publicly available information contains valuable information for Cyber Threat Intelligence (CTI). This can be used to prevent attacks that have already taken place on other systems. Ideally, only the initial attack succeeds and all subsequent ones are detected and stopped. But while there are different standards to exchange this information, a lot of it is shared in articles or blog posts in non-standardized ways. Manually scanning through multiple online portals and news pages to discover new threats and extracting them is a time-consuming task. To automize parts of this scanning process, multiple papers propose extractors that use Natural Language Processing (NLP) to extract Indicators of Compromise (IOCs) from documents. However, while this already solves the problem of extracting the information out of documents, the search for these documents is rarely considered. In this paper, a new focused crawler is proposed called ThreatCrawl, which uses Bidirectional Encoder Representations from Transformers (BERT)-based models to classify documents and adapt its crawling path dynamically. While ThreatCrawl has difficulties to classify the specific type of Open Source Intelligence (OSINT) named in texts, e.g., IOC content, it can successfully find relevant documents and modify its path accordingly. It yields harvest rates of up to 52\%, which are, to the best of our knowledge, better than the current state of the art.},
number = {arXiv:2304.11960},
urldate = {2023-04-27},
institution = {arXiv},
author = {Kuehn, Philipp and Schmidt, Mike and Bayer, Markus and Reuter, Christian},
month = apr,
year = {2023},
note = {arXiv:2304.11960 [cs]},
keywords = {Student, Security, Projekt-CYWARN, Projekt-ATHENE-SecUrban},
}
[BibTeX] [Abstract] [Download PDF]
The number of newly published vulnerabilities is constantly increasing. Until now, the information available when a new vulnerability is published is manually assessed by experts using a ()cvss vector and score. This assessment is time consuming and requires expertise. Various works already try to predict vectors or scores using machine learning based on the textual descriptions of the vulnerability to enable faster assessment. However, for this purpose, previous works only use the texts available in databases such as nvd. With this work, the publicly available web pages referenced in the nvd are analyzed and made available as sources of texts through web scraping. A dl based method for predicting the vector is implemented and evaluated. The present work provides a classification of the nvd’s reference texts based on the suitability and crawlability of their texts. While we identified the overall influence of the additional texts is negligible, we outperformed the state-of-the-art with our dl prediction models.
@article{kuehn_common_2023,
title = {Common vulnerability scoring system prediction based on open source intelligence information sources},
url = {https://peasec.de/paper/2023/2023_KuehnRelkeReuter_CommonVulnerabilityScoringSystemOSINT_CompSec.pdf},
doi = {10.1016/j.cose.2023.103286},
abstract = {The number of newly published vulnerabilities is constantly increasing. Until now, the information available when a new vulnerability is published is manually assessed by experts using a ()cvss vector and score. This assessment is time consuming and requires expertise. Various works already try to predict vectors or scores using machine learning based on the textual descriptions of the vulnerability to enable faster assessment. However, for this purpose, previous works only use the texts available in databases such as nvd. With this work, the publicly available web pages referenced in the nvd are analyzed and made available as sources of texts through web scraping. A dl based method for predicting the vector is implemented and evaluated. The present work provides a classification of the nvd’s reference texts based on the suitability and crawlability of their texts. While we identified the overall influence of the additional texts is negligible, we outperformed the state-of-the-art with our dl prediction models.},
journal = {Computers \& Security},
author = {Kuehn, Philipp and Relke, David N. and Reuter, Christian},
year = {2023},
keywords = {Student, Security, UsableSec, Projekt-CYWARN, Projekt-ATHENE-SecUrban, Ranking-ImpactFactor, Ranking-CORE-B},
}
[BibTeX] [Abstract] [Download PDF]
The militarization of cyberspace has been a topic in international fora and scientific debates for several years. However, the development of applicable, and verifiable arms control measures that can effectively reduce the risk of military escalations in cyberspace is still hindered by the characteristics of this domain. The article analyses challenges and obstacles of dual-use, proliferation, constant technological progress, the importance of the private sector, difficulties in defining and verifying weapons and difficulties in attributing attacks.
@article{reinhold_challenges_2023,
title = {Challenges for {Cyber} {Arms} {Control}: {A} {Qualitative} {Expert} {Interview} {Study}},
volume = {16},
issn = {1866-2196},
url = {https://doi.org/10.1007/s12399-023-00960-w},
doi = {10.1007/s12399-023-00960-w},
abstract = {The militarization of cyberspace has been a topic in international fora and scientific debates for several years. However, the development of applicable, and verifiable arms control measures that can effectively reduce the risk of military escalations in cyberspace is still hindered by the characteristics of this domain. The article analyses challenges and obstacles of dual-use, proliferation, constant technological progress, the importance of the private sector, difficulties in defining and verifying weapons and difficulties in attributing attacks.},
number = {3},
journal = {Zeitschrift für Außen- und Sicherheitspolitik (ZfAS)},
author = {Reinhold, Thomas and Pleil, Helene and Reuter, Christian},
month = aug,
year = {2023},
keywords = {Peace, Security, Projekt-ATHENE-SecUrban, Projekt-CROSSING},
pages = {289--310},
}
[BibTeX] [Abstract] [Download PDF]
While cyberspace has evolved into a commonly shared space vital to our individual lives and societies, malicious cyber activities by state actors as part of espionage operations, regarding defense strategies, or as part of traditional conflicts have strongly increased. In contrast, attributing the origin of such activities remains problematic. The ambiguity of digital data raises the problem of misinterpreting available information, increasing the risk of misinformed reactions and conflict escalation. In order to reduce this risk, this paper proposes a transparency system based on technologies which usually already exist for IT security measures that an accused actor in a specific incident can use to provide credible information which plausibly assures his non-involvement. The paper analyses the technical requirements, presents the technical concept and discusses the necessary adjustments to existing IT networks for its implementation. Intended as a measure for conflict de-escalation, the paper further discusses the limitations of this approach, especially with regard to technical limits as well as the political motivation and behavior of states.
@article{reinhold_preventing_2023,
title = {Preventing the escalation of cyber conflicts: towards an approach to plausibly assure the non-involvement in a cyberattack},
volume = {12},
issn = {2524-6976},
url = {https://doi.org/10.1007/s42597-023-00099-7},
doi = {10.1007/s42597-023-00099-7},
abstract = {While cyberspace has evolved into a commonly shared space vital to our individual lives and societies, malicious cyber activities by state actors as part of espionage operations, regarding defense strategies, or as part of traditional conflicts have strongly increased. In contrast, attributing the origin of such activities remains problematic. The ambiguity of digital data raises the problem of misinterpreting available information, increasing the risk of misinformed reactions and conflict escalation. In order to reduce this risk, this paper proposes a transparency system based on technologies which usually already exist for IT security measures that an accused actor in a specific incident can use to provide credible information which plausibly assures his non-involvement. The paper analyses the technical requirements, presents the technical concept and discusses the necessary adjustments to existing IT networks for its implementation. Intended as a measure for conflict de-escalation, the paper further discusses the limitations of this approach, especially with regard to technical limits as well as the political motivation and behavior of states.},
number = {1},
journal = {Zeitschrift für Friedens- und Konfliktforschung (ZeFKo)},
author = {Reinhold, Thomas and Reuter, Christian},
month = apr,
year = {2023},
keywords = {Peace, Security, Projekt-ATHENE-SecUrban, Projekt-CROSSING},
pages = {31--58},
}
[BibTeX] [Abstract] [Download PDF]
Cyberspace is a fragile construct threatened by malicious cyber operations of different actors, with vulnerabilities in IT hardware and software forming the basis for such activities, thus also posing a threat to global IT security. Advancements in the field of artificial intelligence accelerate this development, either with artificial intelligence enabled cyber weapons, automated cyber defense measures, or artificial intelligence-based threat and vulnerability detection. Especially state actors, with their long-term strategic security interests, often stockpile such knowledge of vulnerabilities and exploits to enable their military or intelligence service cyberspace operations. While treaties and regulations to limit these developments and to enhance global IT security by disclosing vulnerabilities are currently being discussed on the international level, these efforts are hindered by state concerns about the disclosure of unique knowledge and about giving up tactical advantages. This leads to a situation where multiple states are likely to stockpile at least some identical exploits, with technical measures to enable a depletion process for these stockpiles that preserve state secrecy interests and consider the special constraints of interacting states as well as the requirements within such environments being non-existent. This paper proposes such a privacy-preserving approach that allows multiple state parties to privately compare their stock of vulnerabilities and exploits to check for items that occur in multiple stockpiles without revealing them so that their disclosure can be considered. We call our system ExTRUST and show that it is scalable and can withstand several attack scenarios. Beyond the intergovernmental setting, ExTRUST can also be used for other zero-trust use cases, such as bug-bounty programs.
@article{reinhold_extrust_2023,
title = {{ExTRUST}: {Reducing} {Exploit} {Stockpiles} {With} a {Privacy}-{Preserving} {Depletion} {Systems} for {Inter}-{State} {Relationships}},
volume = {4},
url = {https://peasec.de/paper/2023/2023_ReinholdKuehnGuentherSchneiderReuter_ExTrust-ehem-BlockED_TTaS.pdf},
doi = {10.1109/TTS.2023.3280356},
abstract = {Cyberspace is a fragile construct threatened by malicious cyber operations of different actors, with vulnerabilities in IT hardware and software forming the basis for such activities, thus also posing a threat to global IT security. Advancements in the field of artificial intelligence accelerate this development, either with artificial intelligence enabled cyber weapons, automated cyber defense measures, or artificial intelligence-based threat and vulnerability detection. Especially state actors, with their long-term strategic security interests, often stockpile such knowledge of vulnerabilities and exploits to enable their military or intelligence service cyberspace operations. While treaties and regulations to limit these developments and to enhance global IT security by disclosing vulnerabilities are currently being discussed on the international level, these efforts are hindered by state concerns about the disclosure of unique knowledge and about giving up tactical advantages. This leads to a situation where multiple states are likely to stockpile at least some identical exploits, with technical measures to enable a depletion process for these stockpiles that preserve state secrecy interests and consider the special constraints of interacting states as well as the requirements within such environments being non-existent. This paper proposes such a privacy-preserving approach that allows multiple state parties to privately compare their stock of vulnerabilities and exploits to check for items that occur in multiple stockpiles without revealing them so that their disclosure can be considered. We call our system ExTRUST and show that it is scalable and can withstand several attack scenarios. Beyond the intergovernmental setting, ExTRUST can also be used for other zero-trust use cases, such as bug-bounty programs.},
number = {2},
journal = {IEEE Transactions on Technology and Society},
author = {Reinhold, Thomas and Kuehn, Philipp and Günther, Daniel and Schneider, Thomas and Reuter, Christian},
year = {2023},
keywords = {Peace, Student, Projekt-ATHENE-SecUrban, Projekt-CROSSING, A-Paper, Selected, Cyberwar, AuswahlPeace, Projekt-GRKPrivacy},
pages = {158--170},
}
[BibTeX] [Abstract] [Download PDF]
Der Überfall Russlands auf die Ukraine und der sich anschließende Krieg haben neben vielen anderen sicherheitspolitischen Gewissheiten auch zum ersten Mal die Rolle des Cyberspace in einem offenen Angriffskrieg demonstriert und bedenkenswerte Entwicklungen offenbart. Ziel dieses Beitrags ist es, die militärischen Aktivitäten im Cyberspace im Rahmen des Krieges Russlands gegen die Ukraine auf der Grundlage der öffentlich verfügbaren Informationen zu analysieren und im Hinblick auf die bis dato gängigen Vorstellungen eines Cyberwars zu bewerten. Darauf aufbauend werden mögliche Schlussfolgerungen betrachtet, zum einen mit Blick auf die zukünftige Bedeutung von Cyberaktivitäten für Russland, hinsichtlich des generellen militärischen Einsatzes von Cyberwirkmitteln und dessen weiterer Entwicklung, und in Bezug auf zukünftige internationale Debatten zur Einhegung von Cyberwars und des schädigenden Einsatzes von Cyberwirkmitteln.
@article{reinhold_zur_2023,
title = {Zur {Debatte} über die {Einhegung} eines {Cyberwars}: {Analyse} militärischer {Cyberaktivitäten} im {Krieg} {Russlands} gegen die {Ukraine}},
issn = {2524-6976},
url = {https://doi.org/10.1007/s42597-023-00094-y},
doi = {10.1007/s42597-023-00094-y},
abstract = {Der Überfall Russlands auf die Ukraine und der sich anschließende Krieg haben neben vielen anderen sicherheitspolitischen Gewissheiten auch zum ersten Mal die Rolle des Cyberspace in einem offenen Angriffskrieg demonstriert und bedenkenswerte Entwicklungen offenbart. Ziel dieses Beitrags ist es, die militärischen Aktivitäten im Cyberspace im Rahmen des Krieges Russlands gegen die Ukraine auf der Grundlage der öffentlich verfügbaren Informationen zu analysieren und im Hinblick auf die bis dato gängigen Vorstellungen eines Cyberwars zu bewerten. Darauf aufbauend werden mögliche Schlussfolgerungen betrachtet, zum einen mit Blick auf die zukünftige Bedeutung von Cyberaktivitäten für Russland, hinsichtlich des generellen militärischen Einsatzes von Cyberwirkmitteln und dessen weiterer Entwicklung, und in Bezug auf zukünftige internationale Debatten zur Einhegung von Cyberwars und des schädigenden Einsatzes von Cyberwirkmitteln.},
journal = {Zeitschrift für Friedens- und Konfliktforschung (ZeFKo)},
author = {Reinhold, Thomas and Reuter, Christian},
month = mar,
year = {2023},
keywords = {Peace, Projekt-TraCe, Security, Projekt-ATHENE-SecUrban},
}
[BibTeX] [Abstract] [Download PDF]
The negotiation of stakeholder values as a collaborative process throughout technology development has been studied extensively within the fields of Computer Supported Cooperative Work and Human-Computer Interaction. Despite their increasing significance for cybersecurity incident response, there is a gap in research on values of importance to the design of open-source intelligence (OSINT) technologies for this purpose. In this paper, we investigate which values and value conflicts emerge due to the application and development of machine learning (ML) based OSINT technologies to assist cyber security incident response operators. For this purpose, we employ a triangulation of methods, consisting of a systematic survey of the technical literature on the development of OSINT artefacts for cybersecurity (N = 73) and an empirical value sensitive design case study, comprising semi-structured interviews with stakeholders (N = 9) as well as a focus group (N = 7) with developers. Based on our results, we identify implications relevant to the research on and design of OSINT artefacts for cybersecurity incident response.
@article{riebe_values_2023,
title = {Values and {Value} {Conflicts} in the {Context} of {OSINT} {Technologies} for {Cybersecurity} {Incident} {Response}: {A} {Value} {Sensitive} {Design} {Perspective}},
url = {https://link.springer.com/article/10.1007/s10606-022-09453-4},
doi = {10.1007/s10606-022-09453-4},
abstract = {The negotiation of stakeholder values as a collaborative process throughout technology development has been studied extensively within the fields of Computer Supported Cooperative Work and Human-Computer Interaction. Despite their increasing significance for cybersecurity incident response, there is a gap in research on values of importance to the design of open-source intelligence (OSINT) technologies for this purpose. In this paper, we investigate which values and value conflicts emerge due to the application and development of machine learning (ML) based OSINT technologies to assist cyber security incident response operators. For this purpose, we employ a triangulation of methods, consisting of a systematic survey of the technical literature on the development of OSINT artefacts for cybersecurity (N = 73) and an empirical value sensitive design case study, comprising semi-structured interviews with stakeholders (N = 9) as well as a focus group (N = 7) with developers. Based on our results, we identify implications relevant to the research on and design of OSINT artefacts for cybersecurity incident response.},
journal = {Computer Supported Cooperative Work: The Journal of Collaborative Computing (JCSCW)},
author = {Riebe, Thea and Bäumler, Julian and Kaufhold, Marc-André and Reuter, Christian},
year = {2023},
keywords = {Student, Security, UsableSec, HCI, Projekt-CYWARN, Projekt-ATHENE-SecUrban, Projekt-CROSSING, A-Paper, Ranking-ImpactFactor, Ranking-CORE-B},
}
[BibTeX] [Abstract] [Download PDF]
Like past crises, the COVID-19 pandemic has also activated individual volunteers to help to respond to the crisis. This includes digital volunteers, who have organized physical aid and conducted activities on social media. Analyzing German volunteering support groups on Facebook and related Reddit threads in the context of the COVID-19 pandemic, we {\textbackslash}updatedshow what type of help is offered and how social media users interact with each other, trying to cope with the situation. We reveal that most users offering help online conduct mostly typical care work, such as buying groceries or giving advice. Crucially, volunteering is characterized by relationships of care and thus builds on affirmative interactions. Albeit some misdirected offers and regressive interruptions, people use the possibility to make their voices heard and, showing empathy, help each other to cope with crisis. Social media like Facebook mediate societal structures, including relationships of care, offering a space for continuous, cumulatively resilient conduct of care work. Reflecting on the traditional division of labor in crisis volunteering and counter-productive dynamics of care and empathy, we aim for feminist ethics of care which allows for interactions on social media that foster generative computer-supported collaboration.
@article{schmid_digital_2023,
title = {Digital {Volunteers} {During} the {COVID}-19 {Pandemic}: {Care} {Work} on {Social} {Media} for {Socio}-technical {Resilience}},
volume = {3},
issn = {2748-5625},
url = {https://ojs.weizenbaum-institut.de/index.php/wjds/article/view/78},
doi = {10.34669/WI.WJDS/3.3.6},
abstract = {Like past crises, the COVID-19 pandemic has also activated individual volunteers to help to respond to the crisis. This includes digital volunteers, who have organized physical aid and conducted activities on social media. Analyzing German volunteering support groups on Facebook and related Reddit threads in the context of the COVID-19 pandemic, we {\textbackslash}updatedshow what type of help is offered and how social media users interact with each other, trying to cope with the situation. We reveal that most users offering help online conduct mostly typical care work, such as buying groceries or giving advice. Crucially, volunteering is characterized by relationships of care and thus builds on affirmative interactions. Albeit some misdirected offers and regressive interruptions, people use the possibility to make their voices heard and, showing empathy, help each other to cope with crisis. Social media like Facebook mediate societal structures, including relationships of care, offering a space for continuous, cumulatively resilient conduct of care work. Reflecting on the traditional division of labor in crisis volunteering and counter-productive dynamics of care and empathy, we aim for feminist ethics of care which allows for interactions on social media that foster generative computer-supported collaboration.},
number = {1},
journal = {Weizenbaum Journal of the Digital Society},
author = {Schmid, Stefka and Guntrum, Laura and Haesler, Steffen and Schultheiß, Lisa and Reuter, Christian},
month = may,
year = {2023},
keywords = {Peace, Projekt-TraCe, Student, Crisis, HCI, Projekt-emergenCITY, Projekt-ATHENE-SecUrban, SocialMedia},
}
[BibTeX] [Abstract] [Download PDF]
Safety-critical human-computer interaction has focused on technology use in life-critical situations, including military operations. Due to the practical relevance of HCI and disciplinary debates about human-centered design, this literature review studies HCI scholarships’ visions of military human-computer interaction. Through text analysis and categorization of publications, it is found that interaction is envisioned to take place in the context of both missionoriented operational (e.g., target detection) as well as organizational tasks (e.g., military training). While artificial intelligence, virtual/augmented reality, and robots are most frequently defined as technological environments, goals, such as situation awareness, enjoyment, and trust are predominantly associated with them. Considering scholarly references to application contexts and different factors of the context of use allows to systematically approach how military human-computer interaction is imagined. Offering insight into research trends in HCI, this first overview of research endeavors also contributes to interdisciplinary debates, such as Security Studies and technology assessment.
@inproceedings{schmid_safe_2023,
address = {Rapperswil, Switzerland},
title = {Safe and {Secure}? {Visions} of {Military} {Human}-{Computer} {Interaction}},
url = {https://dl.gi.de/items/841cc5bd-8e25-40de-804f-8fb4fedddf11},
doi = {10.18420/muc2023-mci-ws01-365},
abstract = {Safety-critical human-computer interaction has focused on technology use in life-critical situations, including military operations. Due to the practical relevance of HCI and disciplinary debates about human-centered design, this literature review studies HCI scholarships’ visions of military human-computer interaction. Through text analysis and categorization of publications, it is found that interaction is envisioned to take place in the context of both missionoriented operational (e.g., target detection) as well as organizational tasks (e.g., military training). While artificial intelligence, virtual/augmented reality, and robots are most frequently defined as technological environments, goals, such as situation awareness, enjoyment, and trust are predominantly associated with them. Considering scholarly references to application contexts and different factors of the context of use allows to systematically approach how military human-computer interaction is imagined. Offering insight into research trends in HCI, this first overview of research endeavors also contributes to interdisciplinary debates, such as Security Studies and technology assessment.},
language = {de},
booktitle = {Mensch und {Computer} 2023 - {Workshopband}},
publisher = {Gesellschaft für Informatik e.V.},
author = {Schmid, Stefka},
year = {2023},
keywords = {Peace, Projekt-TraCe, Projekt-ATHENE-SecUrban},
}
[BibTeX] [Abstract] [Download PDF]
In today’s digitalized and interconnected world, the traditionally distinct concepts security and safety are increasingly intertwined. For example, a cyber attack on a hospital can negatively impact the patients’ physical safety. Thus, security research and practice should consider these interactions. To explore human-related challenges at the intersection of safety and security, we conducted three focus group workshops with N= 16 experts from both domains. We introduced two scenarios leading to a power outage, one with a safety-related cause (snow storm) and one with a security-related cause (cyber attack). The experts discussed interactions, differences and parallels in coping with the scenarios. Additionally, potential solutions for building response capacity by including volunteers were explored. The findings indicate similar consequences resulting from the safety- vs. security-related incidents. However, the experts identified relevant differences in the challenges preparing for and coping with the scenarios. While security-related challenges included the incalculable time horizon, impact and cascading effects as well as lack of emergency plans and training, safety challengesmainly concerned accessibility of the affected area. The implications for future work are discussed.
@inproceedings{zimmermann_safe_2023,
address = {Rapperswil, Switzerland},
title = {Safe {AND} {Secure} {Infrastructures}? – {Studying} {Human} {Aspects} of {Safety} and {Security} {Incidents} with {Experts} from both {Domains}},
url = {https://dl.gi.de/items/9c1d2bd5-229f-4db0-a764-6126cf92ef5f},
doi = {10.18420/muc2023-mci-ws01-225},
abstract = {In today’s digitalized and interconnected world, the traditionally distinct concepts security and safety are increasingly intertwined. For example, a cyber attack on a hospital can negatively impact the patients’ physical safety. Thus, security research and practice should consider these interactions. To explore human-related challenges at the intersection of safety and security, we conducted three focus group workshops with N= 16 experts from both domains. We introduced two scenarios leading to a power outage, one with a safety-related cause (snow storm) and one with a security-related cause (cyber attack). The experts discussed interactions, differences and parallels in coping with the scenarios. Additionally, potential solutions for building response capacity by including volunteers were explored. The findings indicate similar consequences resulting from the safety- vs. security-related incidents. However, the experts identified relevant differences in the challenges preparing for and coping with the scenarios. While security-related challenges included the incalculable time horizon, impact and cascading effects as well as lack of emergency plans and training, safety challengesmainly concerned accessibility of the affected area. The implications for future work are discussed.},
language = {de},
booktitle = {Mensch und {Computer} 2023 - {Workshopband}},
publisher = {Gesellschaft für Informatik e.V.},
author = {Zimmermann, Verena and Haunschild, Jasmin and Stöver, Alina and Gerber, Nina},
year = {2023},
keywords = {Peace, Security, Projekt-ATHENE-SecUrban, Projekt-GRKPrivacy},
}
[BibTeX] [Abstract] [Download PDF]
Im Forschungsprojekt “ Das Netz hat Geschichte: Netzwerk- und Vulnerabilitätsanalyse Kritischer Infrastrukturen am Beispiel IKT und Verkehr in Rhein/Main”“ wird das historische Wachstum von IKT- und Schieneninfrastrukturnetzen, sowie daraus erwachsene Konsequenzen für deren Vulnerabilitäten am Beispiel der Rhein-Main-Region interdisziplinär untersucht. Beide Infrastrukturnetze entstanden über Jahrzehnte hinweg und sind das Ergebnis verschiedener Interessen und technischer Entwicklungen aus unterschiedlichen Zeitschichten. Dies beeinflusst die Widerstandsfähigkeit der Netze und birgt potenzielle Risiken. Anhand von ca. 20 Expert:inneninterviews soll das Wissen von Praktiker:innen über das Alter, die Ausbreitung, technische Neuerungen und deren Auswirkungen analysiert werden. Die Forschung basiert auf dem Zeitschichtenmodell von Koselleck, das es ermöglicht, die verschiedenen zeitlichen Ebenen der Infrastrukturentwicklung zu analysieren. Die Ergebnisse der semi-strukturierten Interviewstudie zum impliziten Wissen der Befragten werden genutzt, um Hypothesen zu generieren, die später mittels Archivstudien und Netzwerkanalysen überprüft werden. Die gewonnenen Erkenntnisse können zur Stärkung der Resilienz von Infrastrukturen, insbesondere bei Katastrophenszenarien regionalen Ausmaßes, und zukünftigen Investitionsentscheidungen beitragen.
@inproceedings{zivkovic_infrastrukturen_2023,
address = {Leoben},
title = {Infrastrukturen und historisches {Wissen}: {Eine} interdisziplinäre {Analyse} der {Resilienz} von {Schienen}- und {Kabelnetzen}},
isbn = {978-3-900397-11-1},
url = {https://peasec.de/paper/2023/2023_ZivkovicFrankenThiessenEngelsReuter_InfrastrukturenHistorischesWissen_FKF23.pdf},
abstract = {Im Forschungsprojekt " Das Netz hat Geschichte: Netzwerk- und Vulnerabilitätsanalyse Kritischer Infrastrukturen am Beispiel IKT und Verkehr in Rhein/Main”" wird das historische Wachstum von IKT- und Schieneninfrastrukturnetzen, sowie daraus erwachsene Konsequenzen für deren Vulnerabilitäten am Beispiel der Rhein-Main-Region interdisziplinär untersucht. Beide Infrastrukturnetze entstanden über Jahrzehnte hinweg und sind das Ergebnis verschiedener Interessen und technischer Entwicklungen aus unterschiedlichen Zeitschichten. Dies beeinflusst die Widerstandsfähigkeit der Netze und birgt potenzielle Risiken. Anhand von ca. 20 Expert:inneninterviews soll das Wissen von Praktiker:innen über das Alter, die Ausbreitung, technische Neuerungen und deren Auswirkungen analysiert werden. Die Forschung basiert auf dem Zeitschichtenmodell von Koselleck, das es ermöglicht, die verschiedenen zeitlichen Ebenen der Infrastrukturentwicklung zu analysieren. Die Ergebnisse der semi-strukturierten Interviewstudie zum impliziten Wissen der Befragten werden genutzt, um Hypothesen zu generieren, die später mittels Archivstudien und Netzwerkanalysen überprüft werden. Die gewonnenen Erkenntnisse können zur Stärkung der Resilienz von Infrastrukturen, insbesondere bei Katastrophenszenarien regionalen Ausmaßes, und zukünftigen Investitionsentscheidungen beitragen.},
booktitle = {Tagungsband {Fachtagung} {Katastrophenforschung} 2023},
publisher = {Disaster Competence Network Austria},
author = {Zivkovic, Marco and Franken, Jonas and Thiessen, Nadja and Engels, Jens Ivo and Reuter, Christian},
year = {2023},
keywords = {Security, Crisis, Projekt-emergenCITY, Projekt-ATHENE-SecUrban, Infrastructure, Projekt-NetzGeschichte},
}
[BibTeX] [Abstract] [Download PDF]
In this paper we provide an overview of XAI by introducing fundamental terminology and the goals of XAI, as well as recent research findings. Whilst doing this, we pay special attention to strategies for non-expert stakeholders. This leads us to our first research question: “What are the trends in explainable AI strategies for non-experts?”. In order to illustrate the current state of these trends, we further want to study an exemplary and very relevant application domain. According to Abdul et al. (2018), one of the first domains where researchers pursued XAI is the medical domain. This leads to our second research question: “What are the approaches of XAI in the medical domain for non-expert stakeholders?” These research questions will provide an overview of current topics in XAI and show possible research extensions for specific domains.
@incollection{ozalp_trends_2023,
address = {Bielefeld},
title = {Trends in {Explainable} {Artificial} {Intelligence} for {Non}-{Experts}},
url = {https://www.transcript-verlag.de/978-3-8376-5732-6/ai-limits-and-prospects-of-artificial-intelligence/?c=313000019},
abstract = {In this paper we provide an overview of XAI by introducing fundamental terminology and the goals of XAI, as well as recent research findings. Whilst doing this, we pay special attention to strategies for non-expert stakeholders. This leads us to our first research question: “What are the trends in explainable AI strategies for non-experts?”. In order to illustrate the current state of these trends, we further want to study an exemplary and very relevant application domain. According to Abdul et al. (2018), one of the first domains where researchers pursued XAI is the medical domain. This leads to our second research question: “What are the approaches of XAI in the medical domain for non-expert stakeholders?” These research questions will provide an overview of current topics in XAI and show possible research extensions for specific domains.},
booktitle = {{AI} - {Limits} and {Prospects} of {Artificial} {Intelligence}},
publisher = {Transcript Verlag},
author = {Özalp, Elise and Hartwig, Katrin and Reuter, Christian},
editor = {Klimczak, Peter and Petersen, Christer},
year = {2023},
keywords = {Student, UsableSec, HCI, Projekt-CYWARN, Projekt-ATHENE-SecUrban, Projekt-CROSSING},
pages = {223--243},
}
2022
[BibTeX] [Abstract] [Download PDF]
The EU’s subsea data cable network is both vital for global connectivity and vulnerable. This study provides a systematic review of the current security threats, as well as the actors at the origin of these threats. Building on reports and expert input, the paper takes stock of current awareness, preparedness and response mechanisms, both at the EU and Member State level. A number of recommendations suggest how to improve the resilience of the cable network. Proposals build on the need to enhance EU-wide awareness, improve coordination and share information across EU institutions and Member States. In addition, surveillance capabilities must be advanced, response and repair mechanisms strengthened, and the topic mainstreamed across external action.
@book{bueger_security_2022,
address = {Brussels},
title = {Security threats to undersea communications cables and infrastructure – consequences for the {EU}},
url = {https://www.europarl.europa.eu/thinktank/en/document/EXPO_IDA(2022)702557},
abstract = {The EU’s subsea data cable network is both vital for global connectivity and vulnerable. This study provides a systematic review of the current security threats, as well as the actors at the origin of these threats. Building on reports and expert input, the paper takes stock of current awareness, preparedness and response mechanisms, both at the EU and Member State level. A number of recommendations suggest how to improve the resilience of the cable network. Proposals build on the need to enhance EU-wide awareness, improve coordination and share information across EU institutions and Member States. In addition, surveillance capabilities must be advanced, response and repair mechanisms strengthened, and the topic mainstreamed across external action.},
publisher = {European Parliament},
author = {Bueger, Christian and Liebetrau, Tobias and Franken, Jonas},
year = {2022},
keywords = {Student, Security, Projekt-emergenCITY, Projekt-ATHENE-SecUrban, Cyberwar, Infrastructure},
}
[BibTeX] [Download PDF]
@inproceedings{franken_seekabel_2022,
address = {Laboe/Kiel},
title = {Seekabel als {Maritime} {Kritische} {Infrastruktur}},
url = {https://www.kielseapowerseries.com/files/ispk/content/workshops/Dreizack/Sammelband zum Dreizack21.pdf},
booktitle = {Dreizack 21: {Von} historischen bis zukünftigen {Herausforderungen} im maritimen {Raum}},
author = {Franken, Jonas},
editor = {Schilling, Henrik},
year = {2022},
keywords = {Student, Security, Projekt-ATHENE-SecUrban},
pages = {22--25},
}
[BibTeX] [Abstract] [Download PDF]
The backbone network of submarine communication cables (SCC) carries 98\% of international internet traffic. Coastal and island states strongly depend on this physical internet infrastructure to provide internet connectivity. Although about 100 SCC breakdowns of human or natural origin occur at yearly average, a literature review reveals that there is no approach to assess individual state vulnerability to SCC failure in global comparison. In this article, the global SCC network is modeled based on publicly available data. Besides the analysis of the global network properties, a focus is put on remaining bandwidth capacities in three different failure scenario simulations of SCC breakdowns. As a result, this study identifies 15 highly vulnerable states and overseas territories, and another 28 territories that are classified as partially vulnerable to SCC failures. Since economic market decisions shape the structure of the SCC network, an uneven distribution of redundancies and the resulting vulnerability of disadvantaged economies can be confirmed. Therefore, the study’s findings may contribute to a better assessment of the necessity of preventive protection measures of critical telecommunication infrastructures in states and territories characterized by high and medium vulnerability.
@article{franken_digital_2022,
title = {The {Digital} {Divide} in {State} {Vulnerability} to {Submarine} {Communications} {Cable} {Failure}},
volume = {38},
url = {https://peasec.de/paper/2022/2022_FrankenReinholdReichertReuter_DigitalDivideStateVulnerabilitySubmarineCommunicationsCable_IJCIP.pdf},
doi = {10.1016/j.ijcip.2022.100522},
abstract = {The backbone network of submarine communication cables (SCC) carries 98\% of international internet traffic. Coastal and island states strongly depend on this physical internet infrastructure to provide internet connectivity. Although about 100 SCC breakdowns of human or natural origin occur at yearly average, a literature review reveals that there is no approach to assess individual state vulnerability to SCC failure in global comparison. In this article, the global SCC network is modeled based on publicly available data. Besides the analysis of the global network properties, a focus is put on remaining bandwidth capacities in three different failure scenario simulations of SCC breakdowns. As a result, this study identifies 15 highly vulnerable states and overseas territories, and another 28 territories that are classified as partially vulnerable to SCC failures. Since economic market decisions shape the structure of the SCC network, an uneven distribution of redundancies and the resulting vulnerability of disadvantaged economies can be confirmed. Therefore, the study's findings may contribute to a better assessment of the necessity of preventive protection measures of critical telecommunication infrastructures in states and territories characterized by high and medium vulnerability.},
number = {100522},
journal = {International Journal of Critical Infrastructure Protection (IJCIP)},
author = {Franken, Jonas and Reinhold, Thomas and Reichert, Lilian and Reuter, Christian},
year = {2022},
keywords = {Student, Projekt-AgriRegio, Security, Projekt-ATHENE-SecUrban, A-Paper, Selected, Ranking-ImpactFactor, AuswahlPeace},
pages = {1--15},
}
[BibTeX] [Abstract] [Download PDF]
Social media have come to play a vital role not only in our everyday lives, but also in times of conflict and crisis such as natural disasters or civil wars. Recent research has highlighted, on the one hand, the use of social media as a means of recruitment by terrorists and, on the other hand, the use of Facebook, Twitter etc. to gain the support of the population during insurgencies. This article conducts a qualitative content analysis of content on Twitter concerning the conflict in the Jammu and Kashmir region. The tweets following the death of a popular militant, Burhan Wani, cover three different themes: (1) criticism of intellectuals, (2) Burhan Wani’s impact on the conflict, and (3) tweets referring to the conflict itself. Generally, people use Twitter to make their own point of view clear to others and discredit the opposing party, at the same time tweets are reflecting the antagonism between the two parties to the conflict, India and Pakistan. The sample of tweets reflects the lack of awareness among people in the region regarding the motivations of the new generation of militancy emerging in Kashmir after 1990.
@article{gabel_discussing_2022,
title = {Discussing {Conflict} in {Social} {Media} – {The} {Use} of {Twitter} in the {Jammu} and {Kashmir} {Conflict}},
volume = {15},
url = {https://journals.sagepub.com/doi/full/10.1177/1750635220970997},
abstract = {Social media have come to play a vital role not only in our everyday lives, but also in times of conflict and crisis such as natural disasters or civil wars. Recent research has highlighted, on the one hand, the use of social media as a means of recruitment by terrorists and, on the other hand, the use of Facebook, Twitter etc. to gain the support of the population during insurgencies. This article conducts a qualitative content analysis of content on Twitter concerning the conflict in the Jammu and Kashmir region. The tweets following the death of a popular militant, Burhan Wani, cover three different themes: (1) criticism of intellectuals, (2) Burhan Wani's impact on the conflict, and (3) tweets referring to the conflict itself. Generally, people use Twitter to make their own point of view clear to others and discredit the opposing party, at the same time tweets are reflecting the antagonism between the two parties to the conflict, India and Pakistan. The sample of tweets reflects the lack of awareness among people in the region regarding the motivations of the new generation of militancy emerging in Kashmir after 1990.},
number = {4},
journal = {Media, War \& Conflict},
author = {Gabel, Sabrina and Reichert, Lilian and Reuter, Christian},
year = {2022},
keywords = {Peace, Crisis, HCI, Projekt-ATHENE-SecUrban, Ranking-ImpactFactor, SocialMedia},
pages = {1--26},
}
[BibTeX] [Abstract] [Download PDF]
Warning and emergency apps are an integral part of crisis informatics and particularly relevant in countries that currently do not have cell broadcast, such as Germany. Previous studies have shown that such apps are regarded as relevant, but only around 16\% of German citizens used them in 2017 and 2019. With the COVID-19 pandemic and a devastating flash flood, Germany has recently experienced severe crisis-related losses. By comparing data from representative surveys from 2017, 2019 and 2021, this study investigates whether these events have changed the perceptions of warning apps and their usage patterns in Germany. The study shows that while multi-hazard emergency and warning apps have been easily surpassed in usage by COVID-19 contact tracing apps, the use of warning apps has also increased and the pandemic has added new desired features. While these have been little-used during the COVID-19 pandemic, especially non-users see smartphone messengers app channels as possible alternatives to warning apps. In addition, regional warning apps appear promising, possibly because they make choosing a warning app easier when there are several available on the market.
@inproceedings{haunschild_perceptions_2022,
address = {New York},
title = {Perceptions and {Use} of {Warning} {Apps} – {Did} {Recent} {Crises} {Lead} to {Changes} in {Germany}?},
url = {http://www.peasec.de/paper/2022/2022_HaunschildKaufholdReuter_WarningAppsChangesGermany_MuC.pdf},
doi = {10.1145/3543758.3543770},
abstract = {Warning and emergency apps are an integral part of crisis informatics and particularly relevant in countries that currently do not have cell broadcast, such as Germany. Previous studies have shown that such apps are regarded as relevant, but only around 16\% of German citizens used them in 2017 and 2019. With the COVID-19 pandemic and a devastating flash flood, Germany has recently experienced severe crisis-related losses. By comparing data from representative surveys from 2017, 2019 and 2021, this study investigates whether these events have changed the perceptions of warning apps and their usage patterns in Germany. The study shows that while multi-hazard emergency and warning apps have been easily surpassed in usage by COVID-19 contact tracing apps, the use of warning apps has also increased and the pandemic has added new desired features. While these have been little-used during the COVID-19 pandemic, especially non-users see smartphone messengers app channels as possible alternatives to warning apps. In addition, regional warning apps appear promising, possibly because they make choosing a warning app easier when there are several available on the market.},
language = {en},
booktitle = {Mensch und {Computer} - {Tagungsband}},
publisher = {ACM},
author = {Haunschild, Jasmin and Kaufhold, Marc-André and Reuter, Christian},
year = {2022},
keywords = {Crisis, Projekt-CYWARN, Projekt-emergenCITY, Projekt-ATHENE-SecUrban},
}
[BibTeX] [Abstract] [Download PDF]
Mobile technologies and social media services are among the socio-technological innovations that have an enormous impact transforming modern culture and political processes. Social media are often defined as a “group of internet-based applications […] that allow the creation and exchange of user-generated content” (Kaplan and Haenlein 2010). Shaping opinions, politics, participation, and protest (Wulf et al. 2013), they are used by citizens for news consumption and social exchange (Robinson et al. 2017); by journalists for reporting, analyzing, and collecting information (Stieglitz et al. 2018a); and by organizations to monitor crises, emergencies, customer feedback, and sentiment, among others (Haunschild et al. 2020). Large-scale international events, such as the 2010 Arab Spring, showcased the potential of socio-technological transformations: Citizens were not passive victims but active and autonomous participants utilizing social media to coordinate protest and for crisis response (Reuter and Kaufhold 2018). However, in other cases, citizens’ activities coordinated via social media also increased the complexity of tasks and pressure for formal authorities, since the lack of state control has not had only empowering or benign effects. Instead, on social media, false information spreads fast and it is easy for groups to find an audience there, either to enhance their profit or to target vulnerable groups with dangerous ideology.
@incollection{haunschild_cultural_2022,
title = {Cultural {Violence} and {Fragmentation} on {Social} {Media}: {Interventions} and {Countermeasures} by {Humans} and {Social} {Bots}},
isbn = {978-0-367-62674-7},
url = {https://peasec.de/paper/2022/2022_HaunschildKaufholdReuter_SocialMediaAndFragmentation_Routledge.pdf},
abstract = {Mobile technologies and social media services are among the socio-technological innovations that have an enormous impact transforming modern culture and political processes. Social media are often defined as a “group of internet-based applications […] that allow the creation and exchange of user-generated content” (Kaplan and Haenlein 2010). Shaping opinions, politics, participation, and protest (Wulf et al. 2013), they are used by citizens for news consumption and social exchange (Robinson et al. 2017); by journalists for reporting, analyzing, and collecting information (Stieglitz et al. 2018a); and by organizations to monitor crises, emergencies, customer feedback, and sentiment, among others (Haunschild et al. 2020). Large-scale international events, such as the 2010 Arab Spring, showcased the potential of socio-technological transformations: Citizens were not passive victims but active and autonomous participants utilizing social media to coordinate protest and for crisis response (Reuter and Kaufhold 2018). However, in other cases, citizens’ activities coordinated via social media also increased the complexity of tasks and pressure for formal authorities, since the lack of state control has not had only empowering or benign effects. Instead, on social media, false information spreads fast and it is easy for groups to find an audience there, either to enhance their profit or to target vulnerable groups with dangerous ideology.},
booktitle = {Cyber {Security} {Politics}: {Socio}-{Technological} {Transformations} and {Political} {Fragmentation}},
publisher = {Routledge},
author = {Haunschild, Jasmin and Kaufhold, Marc-André and Reuter, Christian},
editor = {Cavelty, Myriam Dunn and Wenger, Andreas},
year = {2022},
keywords = {Peace, Crisis, Projekt-CYWARN, Projekt-emergenCITY, Projekt-ATHENE-SecUrban, SocialMedia},
pages = {48--63},
}
[BibTeX] [Abstract] [Download PDF]
Besides the merits of increasing digitization and networking, societies are increasling exposed to cyberattacks. In Germany, Computer Emerrgency Response Teams (CERTs) of the public sector operate on federal and state level to provide preventative and reactive information security services for authorities, citizens, and enterprises. Their tasks of monitoring, analyzing, and communicating threats is getting more complex by the increasing information quantity disseminated into relevant public channels. Using the lens of design science research, this paper contributes with the design and evaluation of a cross-platform cybersecurity dashboard for CERTs. Based on expert scenario-based walkthroughs in combination with semi-structured interviews (N=12), it discusses six design implications, including the customizability of data sources and filtering of displayed entities, modular integration of additional information sources, interrelation between different information feeds, intelligent algorithms for content assessment and filtering, integration with security software and systems, as well as export, sharing and communication of relevant data.
@inproceedings{kaufhold_cyber_2022,
address = {Timisoara, Romania},
title = {Cyber {Threat} {Observatory}: {Design} and {Evaluation} of an {Interactive} {Dashboard} for {Computer} {Emergency} {Response} {Teams}},
url = {http://www.peasec.de/paper/2022/2022_KaufholdBasyurtEyilmezStoettingerReuter_CyberThreatObservatory_ECIS.pdf},
abstract = {Besides the merits of increasing digitization and networking, societies are increasling exposed to cyberattacks. In Germany, Computer Emerrgency Response Teams (CERTs) of the public sector operate on federal and state level to provide preventative and reactive information security services for authorities, citizens, and enterprises. Their tasks of monitoring, analyzing, and communicating threats is getting more complex by the increasing information quantity disseminated into relevant public channels. Using the lens of design science research, this paper contributes with the design and evaluation of a cross-platform cybersecurity dashboard for CERTs. Based on expert scenario-based walkthroughs in combination with semi-structured interviews (N=12), it discusses six design implications, including the customizability of data sources and filtering of displayed entities, modular integration of additional information sources, interrelation between different information feeds, intelligent algorithms for content assessment and filtering, integration with security software and systems, as well as export, sharing and communication of relevant data.},
booktitle = {Proceedings of the {European} {Conference} on {Information} {Systems} ({ECIS})},
author = {Kaufhold, Marc-André and Basyurt, Ali Sercan and Eyilmez, Kaan and Stöttinger, Marc and Reuter, Christian},
year = {2022},
keywords = {Security, UsableSec, HCI, Projekt-CYWARN, Projekt-ATHENE-SecUrban, A-Paper, Ranking-CORE-A},
}
[BibTeX] [Abstract] [Download PDF]
Despite the merits of digitization in private and professional spaces, critical infrastructures and societies are increasingly exposed to cyberattacks. We conducted a representative survey with German citizens (N=1,093) to examine how they assess the current and future cyber threat situation as well as possible protective measures in cyberspace. Furthermore, we asked what information and channels citizens need to be aware of cyber threats. Our findings indicate that large proportions of the German population feel inadequately informed about cyber threats and tend to only apply enforced security measures by programs (e.g., updates) and services (e.g., two-factor authentication). Furthermore, institutions such as state-level Computer Emergency Response Teams (CERTs) are relatively unknown among the population and respondents showed little confidence in German security authorities to cope with largescale attacks and ultimately protect citizens. Still, our participants prefer to receive cybersecurity information via installed security applications, television channels, or emergency warning apps.
@inproceedings{kaufhold_implementation_2022,
address = {Darmstadt},
series = {Mensch und {Computer} 2022 - {Workshopband}},
title = {The {Implementation} of {Protective} {Measures} and {Communication} of {Cybersecurity} {Alerts} in {Germany} - {A} {Representative} {Survey} of the {Population}},
url = {https://dl.gi.de/handle/20.500.12116/39061},
doi = {10.18420/muc2022-mci-ws01-228},
abstract = {Despite the merits of digitization in private and professional spaces, critical infrastructures and societies are increasingly exposed to cyberattacks. We conducted a representative survey with German citizens (N=1,093) to examine how they assess the current and future cyber threat situation as well as possible protective measures in cyberspace. Furthermore, we asked what information and channels citizens need to be aware of cyber threats. Our findings indicate that large proportions of the German population feel inadequately informed about cyber threats and tend to only apply enforced security measures by programs (e.g., updates) and services (e.g., two-factor authentication). Furthermore, institutions such as state-level Computer Emergency Response Teams (CERTs) are relatively unknown among the population and respondents showed little confidence in German security authorities to cope with largescale attacks and ultimately protect citizens. Still, our participants prefer to receive cybersecurity information via installed security applications, television channels, or emergency warning apps.},
language = {en},
booktitle = {Mensch und {Computer} 2022 - {Workshopband}},
publisher = {Gesellschaft für Informatik},
author = {Kaufhold, Marc-André and Bäumler, Julian and Reuter, Christian},
year = {2022},
keywords = {Student, Security, UsableSec, HCI, Projekt-CYWARN, Projekt-ATHENE-SecUrban},
}
[BibTeX] [Abstract] [Download PDF]
Proper cybersecurity requires timely information to defend the IT infrastructure. In a dynamic field like cybersecurity, gathering up-to-date information is usually a manual, time-consuming, and exhaustive task. Automatic and usable approaches are supposed to be a solution to this problem, but for this, they require a notion of information relevance to distinguish relevant from irrelevant information. First, on the basis of a literature review, this paper proposes a novel cybersecurity tool categorization based on corresponding tool types with their respective definitions and core features. Second, it elaborates information used in each category and deduces notions of relevance. Third, it outlines how these findings informed the design of a security dashboard to guide computer emergency response team staff in identifying current threats in open source intelligence sources while mitigating information overload.
@inproceedings{kuehn_notion_2022,
address = {Darmstadt},
series = {Mensch und {Computer} 2022 - {Workshopband}},
title = {The {Notion} of {Relevance} in {Cybersecurity}: {A} {Categorization} of {Security} {Tools} and {Deduction} of {Relevance} {Notions}},
url = {https://dl.gi.de/handle/20.500.12116/39072},
doi = {10.18420/muc2022-mci-ws01-220},
abstract = {Proper cybersecurity requires timely information to defend the IT infrastructure. In a dynamic field like cybersecurity, gathering up-to-date information is usually a manual, time-consuming, and exhaustive task. Automatic and usable approaches are supposed to be a solution to this problem, but for this, they require a notion of information relevance to distinguish relevant from irrelevant information. First, on the basis of a literature review, this paper proposes a novel cybersecurity tool categorization based on corresponding tool types with their respective definitions and core features. Second, it elaborates information used in each category and deduces notions of relevance. Third, it outlines how these findings informed the design of a security dashboard to guide computer emergency response team staff in identifying current threats in open source intelligence sources while mitigating information overload.},
language = {en},
booktitle = {Mensch und {Computer} 2022 - {Workshopband}},
publisher = {Gesellschaft für Informatik},
author = {Kuehn, Philipp and Bäumler, Julian and Kaufhold, Marc-André and Wendelborn, Marc and Reuter, Christian},
year = {2022},
keywords = {Student, Security, UsableSec, Projekt-CYWARN, Projekt-ATHENE-SecUrban},
}
[BibTeX] [Abstract] [Download PDF]
Every day, there are internet disruptions or outages around the world that affect our daily lives. In this paper, we analyzed these events in Germany in recent years and found out how they can be detected, and what impact they have on citizens, especially in crisis situations. For this purpose, we take a look at two different approaches to recording internet outages, namely the self-reporting of citizens and automatic reporting by algorithmic examination of the availability of IP networks. We evaluate the data of six major events with regard to their meaningfulness in quality and quantity. We found that due to the amount of data and the inherent imprecision of the methods used, it is difficult to detect outages through algorithmic examination. But once an event is publicly known by self-reporting, they have advantages to capture the temporal and spatial dimensions of the outage due to its nature of objective measurements. As a result, we propose that users’ crowdsourcing can enhance the detection of outages and should be seen as an important starting point to even begin an analysis with algorithm-based techniques, but it is to ISPs and regulatory authorities to support that.
@inproceedings{orlov_detecting_2022,
address = {Darmstadt},
series = {Mensch und {Computer} 2022 - {Workshopband}},
title = {Detecting a {Crisis}: {Comparison} of {Self}-{Reported} vs. {Automated} {Internet} {Outage} {Measuring} {Methods}},
url = {https://dl.gi.de/handle/20.500.12116/39089},
doi = {10.18420/muc2022-mci-ws10-321},
abstract = {Every day, there are internet disruptions or outages around the world that affect our daily lives. In this paper, we analyzed these events in Germany in recent years and found out how they can be detected, and what impact they have on citizens, especially in crisis situations. For this purpose, we take a look at two different approaches to recording internet outages, namely the self-reporting of citizens and automatic reporting by algorithmic examination of the availability of IP networks. We evaluate the data of six major events with regard to their meaningfulness in quality and quantity. We found that due to the amount of data and the inherent imprecision of the methods used, it is difficult to detect outages through algorithmic examination. But once an event is publicly known by self-reporting, they have advantages to capture the temporal and spatial dimensions of the outage due to its nature of objective measurements. As a result, we propose that users’ crowdsourcing can enhance the detection of outages and should be seen as an important starting point to even begin an analysis with algorithm-based techniques, but it is to ISPs and regulatory authorities to support that.},
language = {en},
booktitle = {Mensch und {Computer} 2022 - {Workshopband}},
publisher = {Gesellschaft für Informatik},
author = {Orlov, Denis and Möller, Simon and Düfler, Sven and Haesler, Steffen and Reuter, Christian},
year = {2022},
keywords = {Student, Security, UsableSec, HCI, Projekt-emergenCITY, Projekt-ATHENE-SecUrban},
}
[BibTeX] [Abstract] [Download PDF]
With military weapon systems getting more and more improved by artificial intelligence and states competing about the leading role in this development, the question arises how arms control measures can be applied to decrease this equipment spiral. The ongoing debates on cyber weapons have already highlighted the problems with controlling or limiting digital technologies, not to mention the dual use problems. While still in an early stage, this chapter develops possible approaches for AI arms control by considering the different life cycle steps of a typical AI enabled system, based on lessons learned from other arms control approaches. It will discuss the different starting points, their arms control potential as well as its limitations to provide a holistic perspective for necessary further develops and debates.
@incollection{reinhold_arms_2022,
edition = {1},
title = {Arms {Control} for {Artificial} {Intelligence}},
isbn = {978-3-031-11043-6},
url = {https://peasec.de/paper/2022/2022_Reinhold_ ArmsControlforAI_AI-Book.pdf},
abstract = {With military weapon systems getting more and more improved by artificial intelligence and states competing about the leading role in this development, the question arises how arms control measures can be applied to decrease this equipment spiral. The ongoing debates on cyber weapons have already highlighted the problems with controlling or limiting digital technologies, not to mention the dual use problems. While still in an early stage, this chapter develops possible approaches for AI arms control by considering the different life cycle steps of a typical AI enabled system, based on lessons learned from other arms control approaches. It will discuss the different starting points, their arms control potential as well as its limitations to provide a holistic perspective for necessary further develops and debates.},
language = {en},
booktitle = {Armament, {Arms} {Control} and {Artificial} {Intelligence} - {The} {Janus}-faced {Nature} of {Machine} {Learning} in the {Military} {Realm}},
publisher = {Springer},
author = {Reinhold, Thomas},
editor = {Schörnig, Niklas and Reinhold, Thomas},
year = {2022},
doi = {https://doi.org/10.1007/978-3-031-11043-6_15},
keywords = {Peace, Security, Projekt-ATHENE-SecUrban},
pages = {211--226},
}
[BibTeX] [Abstract] [Download PDF]
As cyber weapons and artificial intelligence technologies share the same technological foundation of bits and bytes, there is a strong trend of connecting both, thus addressing the imminent challenge of cyber weapons of processing, filtering and aggregating huge amounts of digital data in real time into decisions and actions. This chapter will analyze this development and highlight the increasing tendency towards AI enabled autonomous decisions in defensive as well as offensive cyber weapons, the arising additional challenges for attributing cyberattacks and the problems for developing arms control measures for this “technology fusion”. However, the article also ventures an outlook how AI methods can help to mitigate these challenges if applied for arms control measures itself.
@incollection{reinhold_cyber_2022,
edition = {1},
title = {Cyber {Weapons} and {Artificial} {Intelligence}: {Impact}, {Influence} and the {Challenges} for {Arms} {Control}},
isbn = {978-3-031-11043-6},
url = {https://peasec.de/paper/2022/2022_ReinholdReuter_CyberWeaponsAIImpactInfluenceChallenges_AI-Book.pdf},
abstract = {As cyber weapons and artificial intelligence technologies share the same technological foundation of bits and bytes, there is a strong trend of connecting both, thus addressing the imminent challenge of cyber weapons of processing, filtering and aggregating huge amounts of digital data in real time into decisions and actions. This chapter will analyze this development and highlight the increasing tendency towards AI enabled autonomous decisions in defensive as well as offensive cyber weapons, the arising additional challenges for attributing cyberattacks and the problems for developing arms control measures for this “technology fusion”. However, the article also ventures an outlook how AI methods can help to mitigate these challenges if applied for arms control measures itself.},
language = {en},
booktitle = {Armament, {Arms} {Control} and {Artificial} {Intelligence} - {The} {Janus}-faced {Nature} of {Machine} {Learning} in the {Military} {Realm}},
publisher = {Springer},
author = {Reinhold, Thomas and Reuter, Christian},
editor = {Schörnig, Niklas and Reinhold, Thomas},
year = {2022},
doi = {https://doi.org/10.1007/978-3-031-11043-6_11},
keywords = {Peace, Security, Projekt-ATHENE-SecUrban},
pages = {145--158},
}
[BibTeX] [Abstract] [Download PDF]
Technological and scientific progress, especially the rapid development of information technology (IT), plays a crucial role in peace and security issuesFootnote1. Artificial Intelligence (AI) is one example. AI is a sub-discipline of computer science, dealing with computer systems capable of performing tasks which require human intelligenceFootnote2. According to James Johnson, PhD, Lecturer in Strategic Studies in the Department of Politics & International Relations at the University of Aberdeen and author of the book Artificial Intelligence and the Future of Warfare, the hype around this has made it easy to overstate the opportunities and challenges posed by the development and deployment of AI in the military sphere. The author argues, that “speculations about super intelligent AI or the threat of superman AI to humanity” are entirely disconnected from today’s capabilities of AI. The book aims to address this problem by deciphering “proven capabilities and applications from mere speculation”, with a strong focus on the challenges AI poses to strategic stability, nuclear deterrence and how AI might influence nuclear weapon systems. The author concludes with implications and policy recommendations on how states could manage the escalatory risks posed by AI.
@article{reinhold_book_2022,
title = {Book {Review}: {Artificial} {Intelligence} and {The} {Future} of {Warfare}, {James} {Johnson} (2021)},
url = {https://link.springer.com/article/10.1007/s12399-022-00918-4},
doi = {10.1007/s12399-022-00918-4},
abstract = {Technological and scientific progress, especially the rapid development of information technology (IT), plays a crucial role in peace and security issuesFootnote1. Artificial Intelligence (AI) is one example. AI is a sub-discipline of computer science, dealing with computer systems capable of performing tasks which require human intelligenceFootnote2. According to James Johnson, PhD, Lecturer in Strategic Studies in the Department of Politics \& International Relations at the University of Aberdeen and author of the book Artificial Intelligence and the Future of Warfare, the hype around this has made it easy to overstate the opportunities and challenges posed by the development and deployment of AI in the military sphere. The author argues, that “speculations about super intelligent AI or the threat of superman AI to humanity” are entirely disconnected from today’s capabilities of AI. The book aims to address this problem by deciphering “proven capabilities and applications from mere speculation”, with a strong focus on the challenges AI poses to strategic stability, nuclear deterrence and how AI might influence nuclear weapon systems. The author concludes with implications and policy recommendations on how states could manage the escalatory risks posed by AI.},
journal = {Zeitschrift für Außen- und Sicherheitspolitik (ZfAS)},
author = {Reinhold, Thomas and Reuter, Christian},
year = {2022},
keywords = {Peace, Projekt-ATHENE-SecUrban},
}
[BibTeX] [Abstract] [Download PDF]
The revelation of the Stuxnet malware in 2010 shed light on the presence of state actors that are willing and capable of developing and using highly sophisticated, specialized malicious software for their political interests. These tools -often dubbed cyber weapons -are expected to become the next major advancement in weaponry technology. Besides the threats of offensive cyber operations for civil IT systems due to the interconnected nature of the cyberspace, international regulation of cyber weapons is -among other aspects -hindered by the fact that the military development and the strategic and tactical deployment of cyber weapons differ significantly from other weapons technologies. In order to establish measures of cyber arms related control treaties, it is crucial to identify these particular characteristics. Based on this premise, the article analyzes the current perspectives on cyber weapons, identifying their weaknesses of being either based on assumptions about adversarial actors or being applicable only after the usage of a malicious tool. In contrast to these approaches, the article focuses on the specific functional aspects of malware and presents an indicator-based assessment model based on parameters that can be measured prior to the application of malicious software. This enables the categorization of malicious tools as cyber weapons. Besides this, the article aims to introduce thought-provoking impulses with regard to social responsibility in computer science.
@article{reinhold_towards_2022,
title = {Towards a {Cyber} {Weapons} {Assessment} {Model} – {Assessment} of the {Technical} {Features} of {Malicious} {Software}},
volume = {3},
issn = {2637-6415},
url = {https://peasec.de/paper/2021/2021_ReinholdReuter_CyberWeapons_IEEETransactionsTechnologySociety.pdf},
doi = {10.1109/TTS.2021.3131817},
abstract = {The revelation of the Stuxnet malware in 2010 shed light on the presence of state actors that are willing and capable of developing and using highly sophisticated, specialized malicious software for their political interests. These tools -often dubbed cyber weapons -are expected to become the next major advancement in weaponry technology. Besides the threats of offensive cyber operations for civil IT systems due to the interconnected nature of the cyberspace, international regulation of cyber weapons is -among other aspects -hindered by the fact that the military development and the strategic and tactical deployment of cyber weapons differ significantly from other weapons technologies. In order to establish measures of cyber arms related control treaties, it is crucial to identify these particular characteristics. Based on this premise, the article analyzes the current perspectives on cyber weapons, identifying their weaknesses of being either based on assumptions about adversarial actors or being applicable only after the usage of a malicious tool. In contrast to these approaches, the article focuses on the specific functional aspects of malware and presents an indicator-based assessment model based on parameters that can be measured prior to the application of malicious software. This enables the categorization of malicious tools as cyber weapons. Besides this, the article aims to introduce thought-provoking impulses with regard to social responsibility in computer science.},
language = {en},
number = {3},
journal = {IEEE Transactions on Technology and Society},
author = {Reinhold, Thomas and Reuter, Christian},
month = sep,
year = {2022},
keywords = {Peace, Projekt-ATHENE-SecUrban, A-Paper, Ranking-ImpactFactor, Cyberwar, AuswahlPeace},
pages = {226--239},
}
[BibTeX] [Abstract] [Download PDF]
In the last decades, research has shown that both technical solutions and user perceptions are important to improve security and privacy in the digital realm. The field of ‘usable security’ already started to emerge in the mid-90s, primarily focussed on password and email security. Later on, the research field of ”usable security and privacy” evolved and broadened the aim to design concepts and tools to assist users in enhancing their behaviour with regard to both privacy and security. Nevertheless, many user interventions are not as effective as desired. Because of highly diverse usage contexts, leading to different privacy and security requirements and not always to one-size-fits-all approaches, tailorability is necessary to address this issue. Furthermore, transparency is a crucial requirement, as providing comprehensible information may counter reactance towards security interventions. This article first provides a brief history of the research field in its first quarter-century and then highlights research on the transparency and tailorability of user interventions. Based on this, this article then presents six contributions with regard to (1) privacy concerns in times of COVID-19, (2) authentication on mobile devices, (3) GDPR-compliant data management, (4) privacy notices on websites, (5) data disclosure scenarios in agriculture, as well as (6) rights under data protection law and the concrete process should data subjects want to claim those rights. This article concludes with several research directions on user-centred transparency and tailorability.
@article{reuter_quarter_2022,
title = {A {Quarter} {Century} of {Usable} {Security} and {Privacy} {Research}: {Transparency}, {Tailorability}, and the {Road} {Ahead}},
volume = {41},
issn = {0144-929X},
url = {https://www.tandfonline.com/toc/tbit20/41/10},
doi = {10.1080/0144929X.2022.2080908},
abstract = {In the last decades, research has shown that both technical solutions and user perceptions are important to improve security and privacy in the digital realm. The field of ‘usable security’ already started to emerge in the mid-90s, primarily focussed on password and email security. Later on, the research field of ”usable security and privacy” evolved and broadened the aim to design concepts and tools to assist users in enhancing their behaviour with regard to both privacy and security. Nevertheless, many user interventions are not as effective as desired. Because of highly diverse usage contexts, leading to different privacy and security requirements and not always to one-size-fits-all approaches, tailorability is necessary to address this issue. Furthermore, transparency is a crucial requirement, as providing comprehensible information may counter reactance towards security interventions. This article first provides a brief history of the research field in its first quarter-century and then highlights research on the transparency and tailorability of user interventions. Based on this, this article then presents six contributions with regard to (1) privacy concerns in times of COVID-19, (2) authentication on mobile devices, (3) GDPR-compliant data management, (4) privacy notices on websites, (5) data disclosure scenarios in agriculture, as well as (6) rights under data protection law and the concrete process should data subjects want to claim those rights. This article concludes with several research directions on user-centred transparency and tailorability.},
number = {10},
journal = {Behaviour \& Information Technology (BIT)},
author = {Reuter, Christian and Lo Iacono, Luigi and Benlian, Alexander},
year = {2022},
keywords = {Security, UsableSec, Crisis, HCI, Projekt-ATHENE-SecUrban, Projekt-CROSSING, A-Paper, Ranking-CORE-A, Ranking-ImpactFactor, SocialMedia},
pages = {2035--2048},
}
[BibTeX] [Abstract] [Download PDF]
Mobilising helpers in the event of a flood or letting friends know that you are okay in the event of a terrorist attack – more and more people are using social media in emergency, crisis or disaster situations. Storms, floods, attacks or pandemics (esp. COVID-19) show that citizens use social media to inform themselves or to coordinate. This thesis presents qualitative and quantitative studies on the attitudes of emergency services and citizens in Europe towards social media in emergencies. Across the individual sub-studies, almost 10,000 people are surveyed including representative studies in the Netherlands, Germany, the UK and Italy. The work empirically shows that social media is increasingly important for emergency services, both for prevention and during crises; that private use of social media is a driving force in shaping opinions for organisational use; and that citizens have high expectations towards authorities, especially monitoring social media is expected, and sometimes responses within one hour. Depending on the risk culture, the data show further differences, e.g. whether the state (Germany) or the individual (Netherlands) is seen as primarily responsible for coping with the situation.
@book{reuter_european_2022,
address = {Nijmegen},
title = {A {European} {Perspective} on {Crisis} {Informatics}: {Citizens}' and {Authorities}' attitudes towards {Social} {Media} for {Public} {Safety} and {Security}},
url = {https://repository.ubn.ru.nl/handle/2066/253000},
abstract = {Mobilising helpers in the event of a flood or letting friends know that you are okay in the event of a terrorist attack – more and more people are using social media in emergency, crisis or disaster situations. Storms, floods, attacks or pandemics (esp. COVID-19) show that citizens use social media to inform themselves or to coordinate. This thesis presents qualitative and quantitative studies on the attitudes of emergency services and citizens in Europe towards social media in emergencies. Across the individual sub-studies, almost 10,000 people are surveyed including representative studies in the Netherlands, Germany, the UK and Italy. The work empirically shows that social media is increasingly important for emergency services, both for prevention and during crises; that private use of social media is a driving force in shaping opinions for organisational use; and that citizens have high expectations towards authorities, especially monitoring social media is expected, and sometimes responses within one hour. Depending on the risk culture, the data show further differences, e.g. whether the state (Germany) or the individual (Netherlands) is seen as primarily responsible for coping with the situation.},
publisher = {The Radboud University Thesis Repository},
author = {Reuter, Christian},
year = {2022},
doi = {10.1007/978-3-658-39720-3},
keywords = {Crisis, HCI, Projekt-emergenCITY, Projekt-ATHENE-SecUrban, Selected, AuswahlCrisis, SocialMedia, Projekt-KontiKat, Projekt-EmerGent, Dissertation},
}
[BibTeX] [Abstract] [Download PDF]
Mobilising helpers in the event of a flood or letting friends know that you are okay in the event of a terrorist attack – more and more people are using social media in emergency, crisis or disaster situations. Storms, floods, attacks or pandemics (esp. COVID-19) show that citizens use social media to inform themselves or to coordinate. This thesis presents qualitative and quantitative studies on the attitudes of emergency services and citizens in Europe towards social media in emergencies. Across the individual sub-studies, almost 10,000 people are surveyed including representative studies in the Netherlands, Germany, the UK and Italy. The work empirically shows that social media is increasingly important for emergency services, both for prevention and during crises; that private use of social media is a driving force in shaping opinions for organisational use; and that citizens have high expectations towards authorities, especially monitoring social media is expected, and sometimes responses within one hour. Depending on the risk culture, the data show further differences, e.g. whether the state (Germany) or the individual (Netherlands) is seen as primarily responsible for coping with the situation.
@book{reuter_european_2022-1,
address = {Wiesbaden},
edition = {1},
title = {A {European} {Perspective} on {Crisis} {Informatics}: {Citizens}' and {Authorities}' attitudes towards {Social} {Media} for {Public} {Safety} and {Security}},
isbn = {978-3-658-39719-7},
url = {https://link.springer.com/book/10.1007/978-3-658-39720-3},
abstract = {Mobilising helpers in the event of a flood or letting friends know that you are okay in the event of a terrorist attack – more and more people are using social media in emergency, crisis or disaster situations. Storms, floods, attacks or pandemics (esp. COVID-19) show that citizens use social media to inform themselves or to coordinate. This thesis presents qualitative and quantitative studies on the attitudes of emergency services and citizens in Europe towards social media in emergencies. Across the individual sub-studies, almost 10,000 people are surveyed including representative studies in the Netherlands, Germany, the UK and Italy. The work empirically shows that social media is increasingly important for emergency services, both for prevention and during crises; that private use of social media is a driving force in shaping opinions for organisational use; and that citizens have high expectations towards authorities, especially monitoring social media is expected, and sometimes responses within one hour. Depending on the risk culture, the data show further differences, e.g. whether the state (Germany) or the individual (Netherlands) is seen as primarily responsible for coping with the situation.},
language = {en},
publisher = {Springer Vieweg},
author = {Reuter, Christian},
year = {2022},
doi = {https://doi.org/10.1007/978-3-658-39720-3},
keywords = {Crisis, HCI, Projekt-emergenCITY, Projekt-ATHENE-SecUrban, SocialMedia, Projekt-KontiKat, Projekt-EmerGent, DissPublisher},
}
[BibTeX] [Abstract] [Download PDF]
The European Union (EU) has undertaken policies which address the research and development of artificial intelligence (AI). In light of debates of technology assessment which focus on risks for humans and questions of control of AI, the EU has propagated an ethical, human-centred approach of the application of AI. It is important to identify how the EU envisions AI as this may guide emerging norms in AI governance and today’s research and development of (weaponised) AI. Building on works of Human-Computer Interaction (HCI), this work derives the actor’s understanding of human-AI interaction, including conceptualisations of explainability, interpretability, and risks. Analysis of EU documents on the implementation of AI as a general-purpose technology and for military application reveals that explainability and risk identification are crucial elements for trust, which itself is a necessary component in the uptake of AI. Interdisciplinary approaches allow for a more detailed understanding of actors’ fundamental views on human control of AI, which further contributes to debates on technology assessment in professionalised political contexts.
@article{schmid_trustworthy_2022,
title = {Trustworthy and {Explainable}: {A} {European} {Vision} of ({Weaponised}) {Artificial} {Intelligence}},
volume = {95},
url = {https://elibrary.bwv-verlag.de/article/10.35998/fw-2022-0013},
doi = {10.35998/fw-2022-0013},
abstract = {The European Union (EU) has undertaken policies which address the research and development of artificial intelligence (AI). In light of debates of technology assessment which focus on risks for humans and questions of control of AI, the EU has propagated an ethical, human-centred approach of the application of AI. It is important to identify how the EU envisions AI as this may guide emerging norms in AI governance and today’s research and development of (weaponised) AI. Building on works of Human-Computer Interaction (HCI), this work derives the actor’s understanding of human-AI interaction, including conceptualisations of explainability, interpretability, and risks. Analysis of EU documents on the implementation of AI as a general-purpose technology and for military application reveals that explainability and risk identification are crucial elements for trust, which itself is a necessary component in the uptake of AI. Interdisciplinary approaches allow for a more detailed understanding of actors’ fundamental views on human control of AI, which further contributes to debates on technology assessment in professionalised political contexts.},
number = {3-4},
journal = {Die Friedens-Warte / Journal of International Peace and Organization (JIPO)},
author = {Schmid, Stefka},
year = {2022},
keywords = {Peace, Projekt-TraCe, Projekt-ATHENE-SecUrban},
pages = {290--315},
}
[BibTeX] [Abstract] [Download PDF]
In 1987, Allan Din published the seminal book “Arms and Artificial Intelligence,” in which he argued that the future military use of AI would be a double-edged sword. Warning about control failures and accidental war on one hand, Din also pointed out the potential of AI to enhance arms control. 35 years later, what was a niche technology in Din’s day has since become one of the most influential technologies in both the civilian and military sectors. In addition, AI has evolved from sophisticated yet deterministic expert systems to machine learning algorithms. Today, AI is about to be introduced in almost every branch of the military, with a variety of implications for arms control. This book reflects the work of the individual authors and identifies common themes and areas where AI can be used for the greater good or where its use calls for particular vigilance. It offers an essential primer for interested readers, while also encouraging experts from the arms control community to dig more deeply into the issues.
@incollection{schornig_introduction_2022,
edition = {1},
title = {Introduction},
isbn = {978-3-031-11043-6},
url = {http://www.peasec.de/paper/2022/2022_SchoernigReinhold_Intro_AI-Book.pdf},
abstract = {In 1987, Allan Din published the seminal book “Arms and Artificial Intelligence,” in which he argued that the future military use of AI would be a double-edged sword. Warning about control failures and accidental war on one hand, Din also pointed out the potential of AI to enhance arms control. 35 years later, what was a niche technology in Din’s day has since become one of the most influential technologies in both the civilian and military sectors. In addition, AI has evolved from sophisticated yet deterministic expert systems to machine learning algorithms. Today, AI is about to be introduced in almost every branch of the military, with a variety of implications for arms control. This book reflects the work of the individual authors and identifies common themes and areas where AI can be used for the greater good or where its use calls for particular vigilance. It offers an essential primer for interested readers, while also encouraging experts from the arms control community to dig more deeply into the issues.},
language = {en},
booktitle = {Armament, {Arms} {Control} and {Artificial} {Intelligence} - {The} {Janus}-faced {Nature} of {Machine} {Learning} in the {Military} {Realm}},
publisher = {Springer},
author = {Schörnig, Niklas and Reinhold, Thomas},
editor = {Schörnig, Niklas and Reinhold, Thomas},
year = {2022},
doi = {https://doi.org/10.1007/978-3-031-11043-6_1},
keywords = {Peace, Security, Projekt-ATHENE-SecUrban},
pages = {1--9},
}
[BibTeX] [Abstract] [Download PDF]
Looking at a variety of armament sectors, the book examines how Artificial Intelligence (AI) impacts the fields of armament and arms control, how existing arms control measures will be affected by AI, and what new approaches based on AI have been or are currently developed. The significant increase in computing power, the increasing reliance on software, and the advent of (narrow) AI and deep-learning algorithms all have the potential to lead to disruptive changes for military operations and warfare, rendering many classical arms control instruments less effective, or even useless. On the other hand, AI might lead to completely new arms control approaches, raising the effectiveness and reliability of new verification measures. To provide a common understanding, the book starts by presenting a general introduction to the state of the art in artificial intelligence and arms control, and how the two topics are interrelated. The second part of the book looks at examples from various fields of weapon technology, including weapons of mass destruction (WMD), conventional armament, and emerging technologies. The final section offers a cross-cutting perspective based on the examples presented in the second part. This volume will appeal to students and scholars of international relations, as well as policy-makers and practitioners interested in a better understanding of peace and security studies in general, and armament and arms control in particular with a strong focus on AI.
@book{schornig_armament_2022,
edition = {1},
title = {Armament, {Arms} {Control} and {Artificial} {Intelligence} - {The} {Janus}-faced {Nature} of {Machine} {Learning} in the {Military} {Realm}},
isbn = {978-3-031-11043-6},
url = {https://link.springer.com/book/10.1007/978-3-031-11043-6},
abstract = {Looking at a variety of armament sectors, the book examines how Artificial Intelligence (AI) impacts the fields of armament and arms control, how existing arms control measures will be affected by AI, and what new approaches based on AI have been or are currently developed.
The significant increase in computing power, the increasing reliance on software, and the advent of (narrow) AI and deep-learning algorithms all have the potential to lead to disruptive changes for military operations and warfare, rendering many classical arms control instruments less effective, or even useless. On the other hand, AI might lead to completely new arms control approaches, raising the effectiveness and reliability of new verification measures. To provide a common understanding, the book starts by presenting a general introduction to the state of the art in artificial intelligence and arms control, and how the two topics are interrelated. The second part of the book looks at examples from various fields of weapon technology, including weapons of mass destruction (WMD), conventional armament, and emerging technologies. The final section offers a cross-cutting perspective based on the examples presented in the second part.
This volume will appeal to students and scholars of international relations, as well as policy-makers and practitioners interested in a better understanding of peace and security studies in general, and armament and arms control in particular with a strong focus on AI.},
language = {en},
publisher = {Springer},
author = {Schörnig, Niklas and Reinhold, Thomas},
year = {2022},
doi = {https://doi.org/10.1007/978-3-031-11043-6},
keywords = {Peace, Security, Projekt-ATHENE-SecUrban},
}
[BibTeX] [Abstract] [Download PDF]
Viele Städte entwickeln sich hin zu einer „Smart City“. Der Trend birgt einerseits vielfältige Potenziale für Effizienz, Nachhaltigkeit und Sicherheit. Auf der anderen Seite ergeben sich neue Herausforderungen für den Schutz städtischer Infrastrukturen und der darin befindlichen Daten vor Ausfällen und (Cyber‑)Angriffen, die in ihrer Komplexität bisher nur wenig untersucht sind.
@article{zimmermann_sicherheitsherausforderungen_2022,
title = {Sicherheitsherausforderungen für {Smart} {City}-{Infrastrukturen}},
url = {https://link.springer.com/content/pdf/10.1365/s35764-022-00396-5.pdf},
doi = {10.1365/s35764-022-00396-5},
abstract = {Viele Städte entwickeln sich hin zu einer „Smart City“. Der Trend birgt einerseits vielfältige Potenziale für Effizienz, Nachhaltigkeit und Sicherheit. Auf der anderen Seite ergeben sich neue Herausforderungen für den Schutz städtischer Infrastrukturen und der darin befindlichen Daten vor Ausfällen und (Cyber‑)Angriffen, die in ihrer Komplexität bisher nur wenig untersucht sind.},
journal = {Wirtschaftsinformatik \& Management},
author = {Zimmermann, Verena and Haunschild, Jasmin and Unden, Marita and Gerber, Paul and Gerber, Nina},
year = {2022},
keywords = {Security, UsableSec, Projekt-ATHENE-SecUrban},
}
2021
[BibTeX] [Abstract] [Download PDF]
Past studies in the domains of information systems have analysed the potentials and barriers of social media in emergencies. While information disseminated in social media can lead to valuable insights, emergency services and researchers face the challenge of information overload as data quickly exceeds the manageable amount. We propose an embedding-based clustering approach and a method for the automated labelling of clusters. Given that the clustering quality is highly dependent on embeddings, we evaluate 19 embedding models with respect to time, internal cluster quality, and language invariance. The results show that it may be sensible to use embedding models that were already trained on other crisis datasets. However, one must ensure that the training data generalizes enough, so that the clustering can adapt to new situations. Confirming this, we found out that some embeddings were not able to perform as well on a German dataset as on an English dataset.
@inproceedings{bayer_information_2021,
title = {Information {Overload} in {Crisis} {Management}: {Bilingual} {Evaluation} of {Embedding} {Models} for {Clustering} {Social} {Media} {Posts} in {Emergencies}},
url = {https://peasec.de/paper/2021/2021_BayerKaufholdReuter_InformationOverloadInCrisisManagementBilingualEvaluation_ECIS.pdf},
abstract = {Past studies in the domains of information systems have analysed the potentials and barriers of social media in emergencies. While information disseminated in social media can lead to valuable insights, emergency services and researchers face the challenge of information overload as data quickly exceeds the manageable amount. We propose an embedding-based clustering approach and a method for the automated labelling of clusters. Given that the clustering quality is highly dependent on embeddings, we evaluate 19 embedding models with respect to time, internal cluster quality, and language invariance. The results show that it may be sensible to use embedding models that were already trained on other crisis datasets. However, one must ensure that the training data generalizes enough, so that the clustering can adapt to new situations. Confirming this, we found out that some embeddings were not able to perform as well on a German dataset as on an English dataset.},
booktitle = {Proceedings of the {European} {Conference} on {Information} {Systems} ({ECIS})},
author = {Bayer, Markus and Kaufhold, Marc-André and Reuter, Christian},
year = {2021},
keywords = {Crisis, Projekt-CYWARN, Projekt-ATHENE-SecUrban, A-Paper, Ranking-CORE-A, SocialMedia},
pages = {1--18},
}
[BibTeX] [Abstract] [Download PDF]
Smart cities aim at improving efficiency while providing safety and security by merging conventional infrastructures with information and communication technology. One strategy for mitigating hazardous situations and improving the overall resilience of the system is to involve citizens. For instance, smart grids involve prosumers – capable of producing and consuming electricity – who can adjust their electricity profile dynamically (i.e., decrease or increase electricity consumption), or use their local production to supply electricity to the grid. This mitigates the impact of peak-consumption periods on the grid and makes it easier for operators to control the grid. This involvement of prosumers is accompanied by numerous socio-technical challenges, including motivating citizens to contribute by adjusting their electricity consumption to the requirements of the energy grid. Towards this end, this work investigates motivational strategies and tools, including nudging, persuasive technologies, and incentives, that can be leveraged to increase the motivation of citizens. We discuss long-term and side effects and ethical and privacy considerations, before portraying bug bounty programs, gamification and apps as technologies and strategies to communicate the motivational strategies to citizens.
@article{egert_towards_2021,
series = {i-com},
title = {Towards {Resilient} {Critical} {Infrastructures} - {Motivating} {Users} to {Contribute} to {Smart} {Grid} {Resilience}},
volume = {20},
url = {https://www.degruyter.com/document/doi/10.1515/icom-2021-0021/html},
doi = {10.1515/icom-2021-0021},
abstract = {Smart cities aim at improving efficiency while providing safety and security by merging conventional infrastructures with information and communication technology. One strategy for mitigating hazardous situations and improving the overall resilience of the system is to involve citizens. For instance, smart grids involve prosumers - capable of producing and consuming electricity - who can adjust their electricity profile dynamically (i.e., decrease or increase electricity consumption), or use their local production to supply electricity to the grid. This mitigates the impact of peak-consumption periods on the grid and makes it easier for operators to control the grid. This involvement of prosumers is accompanied by numerous socio-technical challenges, including motivating citizens to contribute by adjusting their electricity consumption to the requirements of the energy grid. Towards this end, this work investigates motivational strategies and tools, including nudging, persuasive technologies, and incentives, that can be leveraged to increase the motivation of citizens. We discuss long-term and side effects and ethical and privacy considerations, before portraying bug bounty programs, gamification and apps as technologies and strategies to communicate the motivational strategies to citizens.},
number = {2},
journal = {i-com - Journal of Interactive Media},
author = {Egert, Rolf and Gerber, Nina and Haunschild, Jasmin and Kuehn, Philipp and Zimmermann, Verena},
year = {2021},
keywords = {Security, Projekt-CYWARN, Projekt-emergenCITY, Projekt-ATHENE-SecUrban, Infrastructure},
pages = {161--175},
}
[BibTeX] [Abstract] [Download PDF]
During crises such as the COVID-19 pandemic, people spontaneously initiate support groups, while establishedorganizations like soccer clubs set non-regular goals, both offering help. Interested in the coordination of suchhelp and potential challenges of collaboration, we conducted a virtual ethnography of a multi-level networklocated in Germany. We focused on aims, activities, and technological mediation, with Activity Theory astheoretical framework. Our findings show that the organizational aim of coordinating help was successfullyachieved by connecting heterogeneous actors through digitization and institutionalization. Enabled by thecontext of the COVID-19 pandemic crisis, the network acted virtually, but was also able to integrate analogspaces of help. We identified six crucial implications regarding the use of technology and collaboration forbuilding a successful volunteering network.
@article{haesler_stronger_2021,
title = {Stronger {Together}: {How} {Neighborhood} {Groups} {Build} up a {Virtual} {Network} during the {COVID}-19 {Pandemic}},
volume = {5},
url = {https://peasec.de/paper/2021/2021_HaeslerSchmidVierneiselReuter_StrongerTogetherVirtualNetworkCOVID19_CSCW.pdf},
abstract = {During crises such as the COVID-19 pandemic, people spontaneously initiate support groups, while establishedorganizations like soccer clubs set non-regular goals, both offering help. Interested in the coordination of suchhelp and potential challenges of collaboration, we conducted a virtual ethnography of a multi-level networklocated in Germany. We focused on aims, activities, and technological mediation, with Activity Theory astheoretical framework. Our findings show that the organizational aim of coordinating help was successfullyachieved by connecting heterogeneous actors through digitization and institutionalization. Enabled by thecontext of the COVID-19 pandemic crisis, the network acted virtually, but was also able to integrate analogspaces of help. We identified six crucial implications regarding the use of technology and collaboration forbuilding a successful volunteering network.},
number = {CSCW2},
journal = {Proceedings of the ACM: Human Computer Interaction (PACM): Computer-Supported Cooperative Work and Social Computing},
author = {Haesler, Steffen and Schmid, Stefka and Vierneisel, Annemike Sophia and Reuter, Christian},
year = {2021},
keywords = {Crisis, HCI, Projekt-emergenCITY, Projekt-ATHENE-SecUrban, A-Paper, Selected, AuswahlCrisis, Ranking-CORE-A},
}
[BibTeX] [Abstract] [Download PDF]
When facing major crisis events, such as earthquakes, flooding,or attacks on infrastructure, people start to organize within theirneighborhoods. While this has historically been an analog process,people now use collaboration or messenger apps to support theirself-organization. Unfortunately, these apps are not designed to beresilient and fail with communication infrastructure outages whenservers are no longer available. We provide a resilience conceptwith requirements derived from an interdisciplinary view enablingcitizens to communicate and collaborate in everyday life and duringcrisis events. Our human-centered prototype integrates conceptsof nudging for crisis preparedness, decentralized and secure com-munication, participation, smart resource management, historicalknowledge, and legal issues to help guide further research.
@inproceedings{haesler_connected_2021,
address = {Virtual Event, USA},
title = {Connected {Self}-{Organized} {Citizens} in {Crises}: {An} {Interdisciplinary} {Resilience} {Concept} for {Neighborhoods}},
url = {https://peasec.de/paper/2021/2021_Haesleretal_ConnectedSelfOrganizedCitizensinCrises_CSCWComp.pdf},
doi = {10.1145/3462204.3481749},
abstract = {When facing major crisis events, such as earthquakes, flooding,or attacks on infrastructure, people start to organize within theirneighborhoods. While this has historically been an analog process,people now use collaboration or messenger apps to support theirself-organization. Unfortunately, these apps are not designed to beresilient and fail with communication infrastructure outages whenservers are no longer available. We provide a resilience conceptwith requirements derived from an interdisciplinary view enablingcitizens to communicate and collaborate in everyday life and duringcrisis events. Our human-centered prototype integrates conceptsof nudging for crisis preparedness, decentralized and secure com-munication, participation, smart resource management, historicalknowledge, and legal issues to help guide further research.},
booktitle = {{CSCW} '21 {Companion}: {Conference} {Companion} {Publication} of the 2021 on {Computer} {Supported} {Cooperative} {Work} and {Social} {Computing}},
publisher = {ACM},
author = {Haesler, Steffen and Mogk, Ragnark and Putz, Florentin and Logan, Kevin T. and Thiessen, Nadja and Kleinschnitger, Katharina and Baumgärtner, Lars and Stroscher, Jan-Philipp and Reuter, Christian and Knodt, Michele and Hollick, Matthias},
year = {2021},
keywords = {Crisis, Projekt-emergenCITY, Projekt-ATHENE-SecUrban},
}
[BibTeX] [Abstract] [Download PDF]
While nudging is a long-established instrument in many contexts, it has more recently emerged to be relevant in cybersecurity as well. For instance, existing research suggests nudges for stronger passwords or safe WiFi connections. However, those nudges are often not as effective as desired. To improve their effectiveness, it is crucial to understand how people assess nudges in cybersecurity, to address potential fears and resulting reactance and to facilitate voluntary compliance. In other contexts, such as the health sector, studies have already thoroughly explored the attitude towards nudging. To address that matter in cybersecurity, we conducted a representative study in Germany (𝑁 = 1, 012), asking people about their attitude towards nudging in that specific context. Our findings reveal that 64\% rated nudging in cybersecurity as helpful, however several participants expected risks such as intentional misguidance, manipulation and data exposure as well.
@inproceedings{hartwig_nudge_2021,
address = {Karlsruhe, Germany},
title = {Nudge or {Restraint}: {How} do {People} {Assess} {Nudging} in {Cybersecurity} - {A} {Representative} {Study} in {Germany}},
url = {https://peasec.de/paper/2021/2021_HartwigReuter_NudgingCybersecurityRepresentativeStudy_EuroUSEC.pdf},
doi = {10.1145/3481357.3481514},
abstract = {While nudging is a long-established instrument in many contexts, it has more recently emerged to be relevant in cybersecurity as well. For instance, existing research suggests nudges for stronger passwords or safe WiFi connections. However, those nudges are often not as effective as desired. To improve their effectiveness, it is crucial to understand how people assess nudges in cybersecurity, to address potential fears and resulting reactance and to facilitate voluntary compliance. In other contexts, such as the health sector, studies have already thoroughly explored the attitude towards nudging. To address that matter in cybersecurity, we conducted a representative study in Germany (𝑁 = 1, 012), asking people about their attitude towards nudging in that specific context. Our findings reveal that 64\% rated nudging in cybersecurity as helpful, however several participants expected risks such as intentional misguidance, manipulation and data exposure as well.},
booktitle = {European {Symposium} on {Usable} {Security} ({EuroUSEC})},
publisher = {ACM},
author = {Hartwig, Katrin and Reuter, Christian},
year = {2021},
keywords = {Security, UsableSec, Projekt-ATHENE-SecUrban, Projekt-CROSSING},
pages = {141--150},
}
[BibTeX] [Abstract] [Download PDF]
Users tend to bypass systems that are designed to increase their personal security and privacy while limiting their perceived freedom. Nudges present a possible solution to this problem, offering security benefits without taking away perceived freedom. We have identified a lack of research comparing concrete implementations of nudging concepts in an emulated real-world scenario to assess their relative value as a nudge. Comparing multiple nudging implementations in an emulated real-world scenario including a novel avatar nudge with gamification elements, this publication discusses the advantages of nudging for stronger user-created passwords regarding efficacy, usability, and memorability.We investigated the effect of gamification in nudges, performing two studies (𝑁1 = 16, 𝑁2 = 1, 000) to refine and evaluate implementations of current and novel nudging concepts. Our research found a gamified nudge, which integrates a personalizable avatar guide into the registration process, to perform less effectively than state-of-the-art nudges, independently of participants’ gaming frequency.
@inproceedings{hartwig_finding_2021,
address = {Karlsruhe, Germany},
title = {Finding {Secret} {Treasure}? {Improving} {Memorized} {Secrets} {Through} {Gamification}},
url = {https://peasec.de/paper/2021/2021_HartwigEnglischThomsonReuter_MemorizedSecretsThroughGamification_EuroUSEC.pdf},
doi = {10.1145/3481357.3481509},
abstract = {Users tend to bypass systems that are designed to increase their personal security and privacy while limiting their perceived freedom.
Nudges present a possible solution to this problem, offering security benefits without taking away perceived freedom. We have
identified a lack of research comparing concrete implementations of nudging concepts in an emulated real-world scenario to assess their
relative value as a nudge. Comparing multiple nudging implementations in an emulated real-world scenario including a novel avatar
nudge with gamification elements, this publication discusses the advantages of nudging for stronger user-created passwords regarding
efficacy, usability, and memorability.We investigated the effect of gamification in nudges, performing two studies (𝑁1 = 16, 𝑁2 = 1, 000)
to refine and evaluate implementations of current and novel nudging concepts. Our research found a gamified nudge, which integrates
a personalizable avatar guide into the registration process, to perform less effectively than state-of-the-art nudges, independently of
participants’ gaming frequency.},
booktitle = {European {Symposium} on {Usable} {Security} ({EuroUSEC})},
publisher = {ACM},
author = {Hartwig, Katrin and Englisch, Atlas and Thomson, Jan Pelle and Reuter, Christian},
year = {2021},
keywords = {Student, Security, UsableSec, Projekt-ATHENE-SecUrban, Projekt-CROSSING},
pages = {105--117},
}
[BibTeX] [Abstract] [Download PDF]
In crises, citizens show changes in their information behavior, which is mediated by trust in sources, personal relations, online and offline news outlets and information and communication technologies such as apps and social media. Through a repeated one-week survey with closed and open questions of German citizens during the beginning of the COVID-19 pandemic, this study examines citizens‘ perceptions of information responsibilities, their satisfaction with the fulfillment of these responsibilities and their wishes for improving the information flow. The study shows that the dynamism of the crisis and the federally varying strategies burden citizens who perceive an obligation to stay informed, but view agencies as responsible for making information readily available. The study contributes a deeper understanding of citizens‘ needs in crises and discusses implications for design of communication tools for dynamic situations that reduce information overload while fulfilling citizens‘ desire to stay informed.
@inproceedings{haunschild_citizens_2021,
title = {Citizens' {Perceived} {Information} {Responsibilities} and {Information} {Challenges} {During} the {COVID}-19 {Pandemic}},
url = {http://www.peasec.de/paper/2021/2021_HaunschildPauliReuter_InformationResponsibilitiesCovid19_GoodIT.pdf},
doi = {10.1145/3462203.3475886},
abstract = {In crises, citizens show changes in their information behavior, which is mediated by trust in sources, personal relations, online and offline news outlets and information and communication technologies such as apps and social media. Through a repeated one-week survey with closed and open questions of German citizens during the beginning of the COVID-19 pandemic, this study examines citizens' perceptions of information responsibilities, their satisfaction with the fulfillment of these responsibilities and their wishes for improving the information flow. The study shows that the dynamism of the crisis and the federally varying strategies burden citizens who perceive an obligation to stay informed, but view agencies as responsible for making information readily available. The study contributes a deeper understanding of citizens' needs in crises and discusses implications for design of communication tools for dynamic situations that reduce information overload while fulfilling citizens' desire to stay informed.},
booktitle = {{GoodIT} '21: {Proceedings} of the {Conference} on {Information} {Technology} for {Social} {Good}},
author = {Haunschild, Jasmin and Pauli, Selina and Reuter, Christian},
year = {2021},
keywords = {Crisis, Projekt-emergenCITY, Projekt-ATHENE-SecUrban},
pages = {151--156},
}
[BibTeX] [Abstract] [Download PDF]
Many Germans perceive a brutalization of society, and state officials also report feeling under attack. At the same time, policing is criticised for becoming increasingly militarised and for having extended surveillance in the course of fighting terrorism. Advancements in HCI are used in the context of many of the issues that policing is facing. In this study, we conduct a representative survey of the German population to investigate personal experiences with and attitudes towards the police and information and communication technologies (ICT) used for policing. We find an overall positive image of the police and uncritical attitudes towards ICT used for general surveillance (body-worn cameras, video surveillance, face recognition) and slightly more critical attitudes towards personal surveillance (e.g. through communication data retention). The study indicates that perceptions differ according to experience of unfair treatment by the police, while other factors such as age and education have similar effects.
@inproceedings{haunschild_perceptions_2021,
address = {Bonn},
title = {Perceptions of {Police} {Technology} {Use} and {Attitudes} {Towards} the {Police} - {A} {Representative} {Survey} of the {German} {Population}},
volume = {Mensch und Computer - Workshopband},
url = {http://www.peasec.de/paper/2021/2021_HaunschildReuter_PoliceTechnologyUseSurvey_MuC-WS.pdf},
doi = {10.18420/muc2021-mci-ws08-255},
abstract = {Many Germans perceive a brutalization of society, and state officials also report feeling under attack. At the same time, policing is criticised for becoming increasingly militarised and for having extended surveillance in the course of fighting terrorism. Advancements in HCI are used in the context of many of the issues that policing is facing. In this study, we conduct a representative survey of the German population to investigate personal experiences with and attitudes towards the police and information and communication technologies (ICT) used for policing. We find an overall positive image of the police and uncritical attitudes towards ICT used for general surveillance (body-worn cameras, video surveillance, face recognition) and slightly more critical attitudes towards personal surveillance (e.g. through communication data retention). The study indicates that perceptions differ according to experience of unfair treatment by the police, while other factors such as age and education have similar effects.},
booktitle = {Mensch und {Computer} 2021 - {Workshopband}},
publisher = {Gesellschaft für Informatik e. V.},
author = {Haunschild, Jasmin and Reuter, Christian},
year = {2021},
keywords = {Security, Projekt-CYWARN, Projekt-emergenCITY, Projekt-ATHENE-SecUrban},
}
[BibTeX] [Abstract] [Download PDF]
During a dynamic and protracted crisis such as the COVID-19 pandemic, citizens are continuously challenged with making decisionsunder uncertainty. In addition to evaluating the risk of their behav-iors to themselves and others, citizens also have to consider themost current regulation, which often varies federally and locallyand by incidence numbers. Few tools help to stay informed aboutthe current rules. The state-run German multi-hazard warningapp NINA incorporated a feature for COVID-19, while two apps,DarfIchDas and CoroBuddy, focus only on COVID-19 regulationand are privately run. To investigate users’ expectations, perceivedadvantages, and gaps as well as the developers’ challenges, we analyze recent app store reviews of the apps and developers’ replies.We show that the warning app and the COVID-19 regulation appsare evaluated on different terms, that the correctness and portrayalof complex rules are the main challenges and that developers andeditors are underusing users’ potential for crowdsourcing.
@inproceedings{haunschild_bridging_2021,
address = {Virtual Event, USA},
title = {Bridging from {Crisis} to {Everyday} {Life} – {An} {Analysis} of {User} {Reviews} of the {Warning} {App} {NINA} and the {COVID}-19 {Information} {Apps} {CoroBuddy} and {DarfIchDas}},
url = {https://peasec.de/paper/2021/2021_HaunschildReuter_UserReviewsWarningCovidApps_CSCWComp.pdf},
doi = {10.1145/3462204.3481745},
abstract = {During a dynamic and protracted crisis such as the COVID-19 pandemic, citizens are continuously challenged with making decisionsunder uncertainty. In addition to evaluating the risk of their behav-iors to themselves and others, citizens also have to consider themost current regulation, which often varies federally and locallyand by incidence numbers. Few tools help to stay informed aboutthe current rules. The state-run German multi-hazard warningapp NINA incorporated a feature for COVID-19, while two apps,DarfIchDas and CoroBuddy, focus only on COVID-19 regulationand are privately run. To investigate users’ expectations, perceivedadvantages, and gaps as well as the developers’ challenges, we analyze recent app store reviews of the apps and developers’ replies.We show that the warning app and the COVID-19 regulation appsare evaluated on different terms, that the correctness and portrayalof complex rules are the main challenges and that developers andeditors are underusing users’ potential for crowdsourcing.},
booktitle = {{CSCW} '21 {Companion}: {Conference} {Companion} {Publication} of the 2021 on {Computer} {Supported} {Cooperative} {Work} and {Social} {Computing}},
publisher = {ACM},
author = {Haunschild, Jasmin and Reuter, Christian},
year = {2021},
keywords = {Crisis, Projekt-emergenCITY, Projekt-ATHENE-SecUrban},
pages = {72--78},
}
[BibTeX] [Abstract] [Download PDF]
Digitalisierung ist ein präsenter Faktor in vielen Städten. So existieren bereits viele Smart-City-Initiativen, bei denen Städte versuchen, ihre Prozesse durch Erfassung und Verknüpfung von Daten, oft unter Zuhilfenahme von Datenplattformen, zu optimieren. In Anbetracht der damit einhergehenden großen Investitionen und Veränderungen wird Bürgerbeteiligung als zentraler Faktor für den Erfolg solcher Initiativen betrachtet. Bisher ist allerdings nicht klar, was typische Beteiligungsformate von Smart-City-Initiativen sind und welche Rolle(n) BürgerInnen dabei einnehmen. Dieser Beitrag leitet mittels einer Literaturanalyse zu Smart Cities ein Kategorienschema zu typischen Bürgerbeteiligungsarten ab. Die Analyse ergab, dass sich Einbindung von BürgerInnen in politische Entscheidungen und bei der Entwicklung technischer Artefakte maßgeblich auf e‑Government oder Participatory Design bezieht. Im Hinblick auf die Beteiligungsarten zeigt sich, dass Makrofabriken, Living Labs und Open-Data-Plattformen häufige Ansätze sind, um BürgerInnen als Co-Creators einzubinden. Zudem werden BürgerInnen mit Citizen Sensing zur Erfassung von Daten oder Missständen einbezogen. Dabei zeigen sich sowohl aktivere, als auch eher passive Beteiligungsarten. Die Analyse zeigt, dass die Einbindung von BürgerInnen häufig entweder auf eine Beteiligung an politischen Entscheidungen oder an der Entwicklung technischer Artefakte abzielt. Auch wenn keine klare Abgrenzung möglich ist, sind diese Ansätze dann eher durch e‑Government oder Participatory Design inspiriert.
@article{haunschild_nutzer_2021,
title = {Nutzer, {Sammler}, {Entscheidungsträger}? {Arten} der {Bürgerbeteiligung} in {Smart} {Cities}},
volume = {58},
url = {https://peasec.de/paper/2021/2021_HaunschildDemuthGeissRichterReuter_NutzerSammlerEntscheidungstragerBuergerbeteiligungSmartCities_HMD.pdf},
doi = {10.1365/s40702-021-00770-8},
abstract = {Digitalisierung ist ein präsenter Faktor in vielen Städten. So existieren bereits viele Smart-City-Initiativen, bei denen Städte versuchen, ihre Prozesse durch Erfassung und Verknüpfung von Daten, oft unter Zuhilfenahme von Datenplattformen, zu optimieren. In Anbetracht der damit einhergehenden großen Investitionen und Veränderungen wird Bürgerbeteiligung als zentraler Faktor für den Erfolg solcher Initiativen betrachtet. Bisher ist allerdings nicht klar, was typische Beteiligungsformate von Smart-City-Initiativen sind und welche Rolle(n) BürgerInnen dabei einnehmen. Dieser Beitrag leitet mittels einer Literaturanalyse zu Smart Cities ein Kategorienschema zu typischen Bürgerbeteiligungsarten ab. Die Analyse ergab, dass sich Einbindung von BürgerInnen in politische Entscheidungen und bei der Entwicklung technischer Artefakte maßgeblich auf e‑Government oder Participatory Design bezieht. Im Hinblick auf die Beteiligungsarten zeigt sich, dass Makrofabriken, Living Labs und Open-Data-Plattformen häufige Ansätze sind, um BürgerInnen als Co-Creators einzubinden. Zudem werden BürgerInnen mit Citizen Sensing zur Erfassung von Daten oder Missständen einbezogen. Dabei zeigen sich sowohl aktivere, als auch eher passive Beteiligungsarten. Die Analyse zeigt, dass die Einbindung von BürgerInnen häufig entweder auf eine Beteiligung an politischen Entscheidungen oder an der Entwicklung technischer Artefakte abzielt. Auch wenn keine klare Abgrenzung möglich ist, sind diese Ansätze dann eher durch e‑Government oder Participatory Design inspiriert.},
journal = {HMD Praxis der Wirtschaftsinformatik},
author = {Haunschild, Jasmin and Demuth, Kilian and Geiß, Henri-Jacques and Richter, Christian and Reuter, Christian},
year = {2021},
keywords = {Student, HCI, Projekt-emergenCITY, Projekt-ATHENE-SecUrban},
}
[BibTeX] [Abstract] [Download PDF]
Marc-André Kaufhold explores user expectations and design implications for the utilization of new media in crisis management and response. He develops a novel framework for information refinement, which integrates the event, organisational, societal, and technological perspectives of crises. Therefore, he reviews the state of the art on crisis informatics and empirically examines the use, potentials and barriers of both social media and mobile apps. Based on these insights, he designs and evaluates ICT concepts and artifacts with the aim to overcome the issues of information overload and quality in large-scale crises, concluding with practical and theoretical implications for technology adaptation and design.
@book{kaufhold_information_2021,
address = {Wiesbaden, Germany},
title = {Information {Refinement} {Technologies} for {Crisis} {Informatics}: {User} {Expectations} and {Design} {Principles} for {Social} {Media} and {Mobile} {Apps}},
isbn = {978-3-658-33343-0},
url = {https://www.springer.com/gp/book/9783658333430},
abstract = {Marc-André Kaufhold explores user expectations and design implications for the utilization of new media in crisis management and response. He develops a novel framework for information refinement, which integrates the event, organisational, societal, and technological perspectives of crises. Therefore, he reviews the state of the art on crisis informatics and empirically examines the use, potentials and barriers of both social media and mobile apps. Based on these insights, he designs and evaluates ICT concepts and artifacts with the aim to overcome the issues of information overload and quality in large-scale crises, concluding with practical and theoretical implications for technology adaptation and design.},
publisher = {Springer Vieweg},
author = {Kaufhold, Marc-André},
year = {2021},
doi = {10.1007/978-3-658-33341-6},
keywords = {Crisis, Projekt-CYWARN, Projekt-ATHENE-SecUrban, AuswahlKaufhold, Projekt-KontiKat, DissPublisher},
}
[BibTeX] [Abstract] [Download PDF]
Social media have an enormous impact on modern life but are prone to the dissemination of false information. In several domains, such as crisis management or political communication, it is of utmost importance to detect false and to promote credible information. Although educational measures might help individuals to detect false information, the sheer volume of social big data, which sometimes need to be anal- ysed under time-critical constraints, calls for automated and (near) real- time assessment methods. Hence, this paper reviews existing approaches before designing and evaluating three deep learning models (MLP, RNN, BERT) for real-time credibility assessment using the example of Twitter posts. While our BERT implementation achieved best results with an accuracy of up to 87.07\% and an F1 score of 0.8764 when using meta- data, text, and user features, MLP and RNN showed lower classification quality but better performance for real-time application. Furthermore, the paper contributes with a novel dataset for credibility assessment.
@inproceedings{kaufhold_design_2021,
address = {Bratislava},
title = {Design and {Evaluation} of {Deep} {Learning} {Models} for {Real}-{Time} {Credibility} {Assessment} in {Twitter}},
url = {https://peasec.de/paper/2021/2021_KaufholdBayerHartungReuter_DeepLearningCredibilityAssessmentTwitter_ICANN.pdf},
doi = {https://doi.org/10.1007/978-3-030-86383-8_32},
abstract = {Social media have an enormous impact on modern life but are prone to the dissemination of false information. In several domains, such as crisis management or political communication, it is of utmost importance to detect false and to promote credible information. Although educational measures might help individuals to detect false information, the sheer volume of social big data, which sometimes need to be anal- ysed under time-critical constraints, calls for automated and (near) real- time assessment methods. Hence, this paper reviews existing approaches before designing and evaluating three deep learning models (MLP, RNN, BERT) for real-time credibility assessment using the example of Twitter posts. While our BERT implementation achieved best results with an accuracy of up to 87.07\% and an F1 score of 0.8764 when using meta- data, text, and user features, MLP and RNN showed lower classification quality but better performance for real-time application. Furthermore, the paper contributes with a novel dataset for credibility assessment.},
booktitle = {30th {International} {Conference} on {Artificial} {Neural} {Networks} ({ICANN2021})},
author = {Kaufhold, Marc-André and Bayer, Markus and Hartung, Daniel and Reuter, Christian},
year = {2021},
keywords = {Student, Security, Projekt-CYWARN, Projekt-ATHENE-SecUrban, Ranking-CORE-B},
pages = {1--13},
}
[BibTeX] [Abstract] [Download PDF]
Vulnerability databases are one of the main information sources for IT security experts. Hence, the quality of their information is of utmost importance for anyone working in this area. Previous work has shown that machine readable information is either missing, incorrect, or inconsistent with other data sources. In this paper, we introduce a system called Overt Vulnerability source ANAlysis (OVANA), utilizing state-of-the-art machine learning (ML) and natural-language processing (NLP) techniques, which analyzes the information quality (IQ) of vulnerability databases, searches the free-form description for relevant information missing from structured fields, and updates it accordingly. Our paper shows that OVANA is able to improve the IQ of the National Vulnerability Database by 51.23\% based on the indicators of accuracy, completeness, and uniqueness. Moreover, we present information which should be incorporated into the structured fields to increase the uniqueness of vulnerability entries and improve the discriminability of different vulnerability entries. The identified information from OVANA enables a more targeted vulnerability search and provides guidance for IT security experts in finding relevant information in vulnerability descriptions for severity assessment.
@inproceedings{kuehn_ovana_2021,
title = {{OVANA}: {An} {Approach} to {Analyze} and {Improve} the {Information} {Quality} of {Vulnerability} {Databases}},
isbn = {978-1-4503-9051-4},
url = {https://peasec.de/paper/2021/2021_KuehnBayerWendelbornReuter_OVANAQualityVulnerabilityDatabases_ARES.pdf},
doi = {10.1145/3465481.3465744},
abstract = {Vulnerability databases are one of the main information sources for IT security experts. Hence, the quality of their information is of utmost importance for anyone working in this area. Previous work has shown that machine readable information is either missing, incorrect, or inconsistent with other data sources. In this paper, we introduce a system called Overt Vulnerability source ANAlysis (OVANA), utilizing state-of-the-art machine learning (ML) and natural-language processing (NLP) techniques, which analyzes the information quality (IQ) of vulnerability databases, searches the free-form description for relevant information missing from structured fields, and updates it accordingly. Our paper shows that OVANA is able to improve the IQ of the National Vulnerability Database by 51.23\% based on the indicators of accuracy, completeness, and uniqueness. Moreover, we present information which should be incorporated into the structured fields to increase the uniqueness of vulnerability entries and improve the discriminability of different vulnerability entries. The identified information from OVANA enables a more targeted vulnerability search and provides guidance for IT security experts in finding relevant information in vulnerability descriptions for severity assessment.},
booktitle = {Proceedings of the 16th {International} {Conference} on {Availability}, {Reliability} and {Security} ({ARES} 2021)},
publisher = {ACM},
author = {Kuehn, Philipp and Bayer, Markus and Wendelborn, Marc and Reuter, Christian},
year = {2021},
keywords = {Peace, Security, Projekt-CYWARN, Projekt-ATHENE-SecUrban, AuswahlPeace, Ranking-CORE-B},
pages = {1--11},
}
[BibTeX] [Abstract] [Download PDF]
Die zweite, aktualisierte Auflage dieses Lehr- und Fachbuchs gibt eine fundierte und praxisbezogene Einführung sowie einen Überblick über Grundlagen, Methoden und Anwendungen der Mensch-Computer-Interaktion im Kontext von Sicherheit, Notfällen, Krisen, Katastrophen, Krieg und Frieden. Dies adressierend werden interaktive, mobile, ubiquitäre und kooperative Technologien sowie soziale Medien vorgestellt. Hierbei finden klassische Themen wie benutzbare (IT-)Sicherheit, Industrie 4.0, Katastrophenschutz, Medizin und Automobil, aber auch Augmented Reality, Crowdsourcing, Shitstorm Management, Social Media Analytics und Cyberwar ihren Platz. Methodisch wird das Spektrum von Usable Safety bis Usable Security Engineering von Analyse über Design bis Evaluation abgedeckt. Das Buch eignet sich ebenso als Lehrbuch für Studierende wie als Handbuch für Wissenschaftler, Designer, Entwickler und Anwender.
@book{reuter_sicherheitskritische_2021,
address = {Wiesbaden},
edition = {2},
title = {Sicherheitskritische {Mensch}-{Computer}-{Interaktion}: {Interaktive} {Technologien} und {Soziale} {Medien} im {Krisen}- und {Sicherheitsmanagement} ({Zweite} {Auflage})},
isbn = {978-3-658-32795-8},
url = {https://www.springer.com/de/book/9783658327941},
abstract = {Die zweite, aktualisierte Auflage dieses Lehr- und Fachbuchs gibt eine fundierte und praxisbezogene Einführung sowie einen Überblick über Grundlagen, Methoden und Anwendungen der Mensch-Computer-Interaktion im Kontext von Sicherheit, Notfällen, Krisen, Katastrophen, Krieg und Frieden. Dies adressierend werden interaktive, mobile, ubiquitäre und kooperative Technologien sowie soziale Medien vorgestellt. Hierbei finden klassische Themen wie benutzbare (IT-)Sicherheit, Industrie 4.0, Katastrophenschutz, Medizin und Automobil, aber auch Augmented Reality, Crowdsourcing, Shitstorm Management, Social Media Analytics und Cyberwar ihren Platz. Methodisch wird das Spektrum von Usable Safety bis Usable Security Engineering von Analyse über Design bis Evaluation abgedeckt. Das Buch eignet sich ebenso als Lehrbuch für Studierende wie als Handbuch für Wissenschaftler, Designer, Entwickler und Anwender.},
publisher = {Springer Vieweg},
author = {Reuter, Christian},
year = {2021},
keywords = {Peace, Security, UsableSec, HCI, Projekt-CYWARN, Projekt-emergenCITY, Projekt-ATHENE-SecUrban, Selected, AuswahlCrisis, SocialMedia, Projekt-KontiKat, Infrastructure},
}
[BibTeX] [Abstract] [Download PDF]
Besides the merits of increasing digitization and interconnectedness in private and professional spaces, critical infrastructures and societies are more and more exposed to cyberattacks. In order to enhance the preventative and reactive capabilities against cyberattacks, Computer Emergency Response Teams (CERTs) are deployed in many countries and organizations. In Germany, CERTs in the public sector operate on federal and state level to provide information security services for authorities, citizens, and enterprises. Their tasks of monitoring, analyzing, and communicating threats and incidents is getting more complex due to the increasing amount of information disseminated into public channels. By adopting the perspectives of Computer-Supported Cooperative Work (CSCW) and Crisis Informatics, we contribute to the study of organizational structures, technology use, and the impact on collaborative practices in and between state CERTs with empirical research based on expert interviews with representatives of German state CERTs (N=15) and supplementary document analyses (N=25). We derive design and policy implications from our findings, including the need for interoperable and modular architecture, a shift towards service level agreements, cross-platform monitoring and analysis of incident data, use of deduplication techniques and standardized threat exchange formats, a reduction of resource costs through process automation, and transparent reporting and tool structures for information exchange.
@article{riebe_impact_2021,
title = {The {Impact} of {Organizational} {Structure} and {Technology} {Use} on {Collaborative} {Practices} in {Computer} {Emergency} {Response} {Teams}: {An} {Empirical} {Study}},
volume = {5},
url = {https://www.peasec.de/paper/2021/2021_RiebeKaufholdReuter_ComputerEmegencyResponseTeams_CSCW.pdf},
doi = {10.1145/3479865},
abstract = {Besides the merits of increasing digitization and interconnectedness in private and professional spaces, critical infrastructures and societies are more and more exposed to cyberattacks. In order to enhance the preventative and reactive capabilities against cyberattacks, Computer Emergency Response Teams (CERTs) are deployed in many countries and organizations. In Germany, CERTs in the public sector operate on federal and state level to provide information security services for authorities, citizens, and enterprises. Their tasks of monitoring, analyzing, and communicating threats and incidents is getting more complex due to the increasing amount of information disseminated into public channels. By adopting the perspectives of Computer-Supported Cooperative Work (CSCW) and Crisis Informatics, we contribute to the study of organizational structures, technology use, and the impact on collaborative practices in and between state CERTs with empirical research based on expert interviews with representatives of German state CERTs (N=15) and supplementary document analyses (N=25). We derive design and policy implications from our findings, including the need for interoperable and modular architecture, a shift towards service level agreements, cross-platform monitoring and analysis of incident data, use of deduplication techniques and standardized threat exchange formats, a reduction of resource costs through process automation, and transparent reporting and tool structures for information exchange.},
number = {CSCW2},
journal = {Proceedings of the ACM: Human Computer Interaction (PACM): Computer-Supported Cooperative Work and Social Computing},
author = {Riebe, Thea and Kaufhold, Marc-André and Reuter, Christian},
year = {2021},
keywords = {Security, UsableSec, Crisis, Projekt-CYWARN, Projekt-ATHENE-SecUrban, A-Paper, AuswahlKaufhold, AuswahlUsableSec, Ranking-CORE-A, Projekt-KontiKat},
}
[BibTeX] [Abstract] [Download PDF]
Receiving relevant information on possible cyber threats, attacks, and data breaches in a timely manner is crucial for early response. The social media platform Twitter hosts an active cyber security community. Their activities are often monitored manually by security experts, such as Computer Emergency Response Teams (CERTs). We thus propose a Twitter-based alert generation system that issues alerts to a system operator as soon as new relevant cyber security related topics emerge. Thereby, our system allows us to monitor user accounts with significantly less workload. Our system applies a supervised classifier, based on active learning, that detects tweets containing relevant information. The results indicate that uncertainty sampling can reduce the amount of manual relevance classification effort and enhance the classifier performance substantially compared to random sampling. Our approach reduces the number of accounts and tweets that are needed for the classifier training, thus making the tool easily and rapidly adaptable to the specific context while also supporting data minimization for Open Source Intelligence (OSINT). Relevant tweets are clustered by a greedy stream clustering algorithm in order to identify significant events. The proposed system is able to work near real-time within the required 15-minutes time frame and detects up to 93.8\% of relevant events with a false alert rate of 14.81\%.
@inproceedings{riebe_cysecalert_2021,
title = {{CySecAlert}: {An} {Alert} {Generation} {System} for {Cyber} {Security} {Events} {Using} {Open} {Source} {Intelligence} {Data}},
url = {https://peasec.de/paper/2021/2021_RiebeWirthBayerKuehnKaufholdKnautheGutheReuter_CySecAlertOpenSourceIntelligence_ICICS.pdf},
doi = {10.1007/978-3-030-86890-1_24},
abstract = {Receiving relevant information on possible cyber threats, attacks, and data breaches in a timely manner is crucial for early response. The social media platform Twitter hosts an active cyber security community. Their activities are often monitored manually by security experts, such as Computer Emergency Response Teams (CERTs). We thus propose a Twitter-based alert generation system that issues alerts to a system operator as soon as new relevant cyber security related topics emerge. Thereby, our system allows us to monitor user accounts with significantly less workload. Our system applies a supervised classifier, based on active learning, that detects tweets containing relevant information. The results indicate that uncertainty sampling can reduce the amount of manual relevance classification effort and enhance the classifier performance substantially compared to random sampling. Our approach reduces the number of accounts and tweets that are needed for the classifier training, thus making the tool easily and rapidly adaptable to the specific context while also supporting data minimization for Open Source Intelligence (OSINT). Relevant tweets are clustered by a greedy stream clustering algorithm in order to identify significant events. The proposed system is able to work near real-time within the required 15-minutes time frame and detects up to 93.8\% of relevant events with a false alert rate of 14.81\%.},
booktitle = {Information and {Communications} {Security} ({ICICS})},
author = {Riebe, Thea and Wirth, Tristan and Bayer, Markus and Kuehn, Philipp and Kaufhold, Marc-André and Knauthe, Volker and Guthe, Stefan and Reuter, Christian},
year = {2021},
keywords = {Student, Security, UsableSec, Projekt-CYWARN, Projekt-ATHENE-SecUrban, Ranking-CORE-B},
pages = {429--446},
}
[BibTeX] [Abstract] [Download PDF]
Spillover effects describe the process of a company benefiting from the R&D activities of another one and thereby gaining an economic advantage. One prominent approach for measuring spillover effects is based on the analysis of patent citation networks. Taking social media analytics and knowledge economics into account, this paper presents a complementary approach to quantify spillover effects from defense to civilian research and development, analyzing 513 employment biographies from the social network LinkedIn. Using descriptive network analysis, we investigate the emigration of personnel of the German defense industry to other civilian producers. Thereby, our study reveals that in the last decade, employees of defense suppliers have changed positions significantly less often, with 3.24 changes on average than professionals who have worked more than 50\% of their jobs in the civilian sector, having changed 4.61 times on average. Our work illustrates the churn behavior and how spillover effects between defense and civilian sectors can be measured using social career networks such as LinkedIn.
@article{riebe_measuring_2021,
title = {Measuring {Spillover} {Effects} from {Defense} to {Civilian} {Sectors} – {A} {Quantitative} {Approach} {Using} {LinkedIn}},
volume = {32},
url = {https://peasec.de/paper/2021/2021_RiebeSchmidReuter_SpilloverEffectsDefensetoCivilianLinkedIn_PDE.pdf},
doi = {10.1080/10242694.2020.1755787},
abstract = {Spillover effects describe the process of a company benefiting from the R\&D activities of another one and thereby gaining an economic advantage. One prominent approach for measuring spillover effects is based on the analysis of patent citation networks. Taking social media analytics and knowledge economics into account, this paper presents a complementary approach to quantify spillover effects from defense to civilian research and development, analyzing 513 employment biographies from the social network LinkedIn. Using descriptive network analysis, we investigate the emigration of personnel of the German defense industry to other civilian producers. Thereby, our study reveals that in the last decade, employees of defense suppliers have changed positions significantly less often, with 3.24 changes on average than professionals who have worked more than 50\% of their jobs in the civilian sector, having changed 4.61 times on average. Our work illustrates the churn behavior and how spillover effects between defense and civilian sectors can be measured using social career networks such as LinkedIn.},
number = {7},
journal = {Defence and Peace Economics},
author = {Riebe, Thea and Schmid, Stefka and Reuter, Christian},
year = {2021},
keywords = {Peace, Projekt-ATHENE-SecUrban, A-Paper, Selected, Ranking-ImpactFactor, Cyberwar, AuswahlPeace, Projekt-DualUse},
pages = {773--785},
}
2020
[BibTeX] [Abstract] [Download PDF]
The hackathon \#WirVsVirus in March 2020 was one of the biggest hackathons in history. Under the patronage of the federal government of Germany, 28,361 participants worked together in 1,498 projects, finding innovative apps and solutions against the COVID-19 pandemic. Three months after the event, we present an exemplifying analysis of the topics, used technologies and remaining activity of these projects. Shedding light on this instance of citizen science allows to highlight the potential of hackathons and startup culture regarding socio-technological resilience. At the same time, it may be understood as an impulse for crisis informatics to consider new forms of volunteering in the course of crisis management.
@inproceedings{haesler_crisis_2020,
title = {Crisis {Volunteering} {Nerds}: {Three} {Months} {After} {COVID}-19 {Hackathon} \#{WirVsVirus}},
url = {https://dl.acm.org/doi/pdf/10.1145/3406324.3424584},
doi = {10.1145/3406324.3424584},
abstract = {The hackathon \#WirVsVirus in March 2020 was one of the biggest hackathons in history. Under the patronage of the federal government of Germany, 28,361 participants worked together in 1,498 projects, finding innovative apps and solutions against the COVID-19 pandemic. Three months after the event, we present an exemplifying analysis of the topics, used technologies and remaining activity of these projects. Shedding light on this instance of citizen science allows to highlight the potential of hackathons and startup culture regarding socio-technological resilience. At the same time, it may be understood as an impulse for crisis informatics to consider new forms of volunteering in the course of crisis management.},
booktitle = {{MobileHCI} '20: 22nd {International} {Conference} on {Human}-{Computer} {Interaction} with {Mobile} {Devices} and {Services}},
publisher = {ACM},
author = {Haesler, Steffen and Schmid, Stefka and Reuter, Christian},
year = {2020},
keywords = {Crisis, HCI, Projekt-emergenCITY, Projekt-ATHENE-SecUrban},
pages = {1--56},
}
[BibTeX] [Abstract] [Download PDF]
Crisis informatics has examined the use, potentials and weaknesses of social media in emergencies across different events (e.g., man-made, natural or hybrid), countries and heterogeneous participants (e.g., citizens or emergency services) for almost two decades. While most research analyzes specific cases, few studies have focused on citizens‘ perceptions of different social media platforms in emergencies using a representative sample. Basing our questionnaire on a workshop with police officers, we present the results of a representative study on citizens‘ perception of social media in emergencies that we conducted in Germany. Our study suggests that when it comes to emergencies, socio-demographic differences are largely insignificant and no clear preferences for emergency services‘ social media strategies exist. Due to the widespread searching behavior on some platforms, emergency services can reach a wide audience by turning to certain channels but should account for groups with distinct preferences.
@inproceedings{haunschild_sticking_2020,
address = {Potsdam, Germany},
title = {Sticking with {Landlines}? {Citizens}' and {Police} {Social} {Media} {Use} and {Expectation} {During} {Emergencies}},
url = {http://www.peasec.de/paper/2020/2020_HaunschildKaufholdReuter_SocialMediaPoliceSurvey_WI.pdf},
doi = {10.30844/wi_2020_o2-haunschild},
abstract = {Crisis informatics has examined the use, potentials and weaknesses of social media in emergencies across different events (e.g., man-made, natural or hybrid), countries and heterogeneous participants (e.g., citizens or emergency services) for almost two decades. While most research analyzes specific cases, few studies have focused on citizens' perceptions of different social media platforms in emergencies using a representative sample. Basing our questionnaire on a workshop with police officers, we present the results of a representative study on citizens' perception of social media in emergencies that we conducted in Germany. Our study suggests that when it comes to emergencies, socio-demographic differences are largely insignificant and no clear preferences for emergency services' social media strategies exist. Due to the widespread searching behavior on some platforms, emergency services can reach a wide audience by turning to certain channels but should account for groups with distinct preferences.},
booktitle = {Proceedings of the {International} {Conference} on {Wirtschaftsinformatik} ({WI}) ({Best} {Paper} {Social} {Impact} {Award})},
publisher = {AIS Electronic Library (AISel)},
author = {Haunschild, Jasmin and Kaufhold, Marc-André and Reuter, Christian},
year = {2020},
keywords = {Crisis, Projekt-emergenCITY, Projekt-ATHENE-SecUrban, Projekt-MAKI, Ranking-CORE-C, Ranking-VHB-C, Ranking-WKWI-A},
pages = {1--16},
}
[BibTeX] [Abstract] [Download PDF]
In den letzten 20 Jahren haben sich mobile Technologien und soziale Medien nicht nur im Alltag, sondern auch in Krisensituationen etabliert. Insbesondere großflächige Ereignisse wie der Hurrikan Sandy (2012) oder das mitteleuropäische Hochwasser (2013) haben gezeigt, dass sich die Bevölkerung aktiv mit Informations- und Kommunikationstechnologie (IKT) an der Schadensbewältigung beteiligt (Reuter, Hughes, et al., 2018). Daraus ist das Forschungsfeld der Kriseninformatik entstanden, welches Wissen der Informatik und Gesellschaftswissenschaften kombiniert und zudem in Disziplinen wie der MenschMaschine-Interaktion (HCI), Computerunterstützten Gruppenarbeit (CSCW) und Wirtschaftsinformatik (WI) verankert ist. Während die Bevölkerung IKT einsetzt, um die Unsicherheiten in Krisen zu bewältigen, nutzen Behörden und Organisationen mit Sicherheitsaufgaben (BOS), etwa Feuerwehr und Polizei, öffentliche Daten, um das Situationsbewusstsein und die Entscheidungsfindung für eine bessere Schadensbewältigung zu verbessern (Palen & Anderson, 2016). Noch größere Katastrophen wie die aktuelle COVID-19-Pandemie verstärken dabei die Herausforderungen der Kriseninformatik (Xie et al., 2020). Für BOS stellt die umfangreiche Menge heterogener und semantisch verknüpfter Daten, auch Social Big Data genannt (Olshannikova et al., 2017), eine große Herausforderung im Hinblick auf die Qualität, Quantität und den Zugriff auf relevante Informationen dar. Um ein Situationsbewusstsein und nutzbare Informationen, d. h. die richtigen Informationen zur richtigen Zeit bei der richtigen Person, zu erhalten (Zade et al., 2018), müssen Informationen auf die Bedingungen des Ereignisses, organisationale Anforderungen, soziale Rahmenbedingungen und technische Möglichkeiten verfeinert werden. Diese Dissertation kombiniert das methodische Framework der Designfallstudien (Wulf et al., 2011) mit den Prinzipien der Design-Science-Forschung (Hevner et al., 2004), um das Thema der Informationsverfeinerung (Information Refinement) in vier Phasen zu untersuchen, wovon jede unterschiedliche Forschungsbeiträge hervorbringt. Die Arbeit begutachtet zunächst Nutzungs-, Rollen- und Wahrnehmungsmuster in der Kriseninformatik und stellt die Potenziale sozialer Medien zur öffentlichen Teilhabe an der Krisenbewältigung heraus. Die empirische Studien mit der deutschen Bevölkerung zeigen die positiven Einstellungen und die steigende Nutzung mobiler und sozialer Technologien in Krisen, stellen aber auch Barrieren heraus und zeigen die Erwartung, dass BOS in soziale Medien aktiv sind. Die Ergebnisse fundieren das Design innovativer IKT-Artefakte, darunter visuelle Bevölkerungsrichtlinien für soziale Medien in Krisen (SMG), ein Web-Interface für BOS zur Aggregation mobiler und sozialer Daten (ESI), ein Algorithmus zur Extraktion relevanter Informationen in sozialen Medien (SMO), und eine mobile App für die bidirektionale Kommunikation zwischen BOS und Bevölkerung (112.social). Die Evaluation der Artefakte involviert EndnutzerInnen aus dem Anwendungsfeld des Krisenmanagements, um potenziale für Verbesserungen und zukünftige Forschung zu identifizieren. Die Arbeit schließt mit einem Framework zur Informationsverfeinerung für die Kriseninformatik ab, welche die event-, gesellschafts-, organisation- und technologiebasierte Perspektive integriert.
@book{kaufhold_information_2020,
address = {Darmstadt, Germany},
title = {Information {Refinement} {Technologies} for {Crisis} {Informatics}: {User} {Expectations} and {Design} {Implications} for {Social} {Media} and {Mobile} {Apps} in {Crisis}},
url = {https://doi.org/10.26083/tuprints-00017474},
abstract = {In den letzten 20 Jahren haben sich mobile Technologien und soziale Medien nicht nur im Alltag, sondern auch in Krisensituationen etabliert. Insbesondere großflächige Ereignisse wie der Hurrikan Sandy (2012) oder das mitteleuropäische Hochwasser (2013) haben gezeigt, dass sich die Bevölkerung aktiv mit Informations- und Kommunikationstechnologie (IKT) an der Schadensbewältigung beteiligt (Reuter, Hughes, et al., 2018). Daraus ist das Forschungsfeld der Kriseninformatik entstanden, welches Wissen der Informatik und Gesellschaftswissenschaften kombiniert und zudem in Disziplinen wie der MenschMaschine-Interaktion (HCI), Computerunterstützten Gruppenarbeit (CSCW) und Wirtschaftsinformatik (WI) verankert ist. Während die Bevölkerung IKT einsetzt, um die Unsicherheiten in Krisen zu bewältigen, nutzen Behörden und Organisationen mit Sicherheitsaufgaben (BOS), etwa Feuerwehr und Polizei, öffentliche Daten, um das Situationsbewusstsein und die Entscheidungsfindung für eine bessere Schadensbewältigung zu verbessern (Palen \& Anderson, 2016). Noch größere Katastrophen wie die aktuelle COVID-19-Pandemie verstärken dabei die Herausforderungen der Kriseninformatik (Xie et al., 2020). Für BOS stellt die umfangreiche Menge heterogener und semantisch verknüpfter Daten, auch Social Big Data genannt (Olshannikova et al., 2017), eine große Herausforderung im Hinblick auf die Qualität, Quantität und den Zugriff auf relevante Informationen dar. Um ein Situationsbewusstsein und nutzbare Informationen, d. h. die richtigen Informationen zur richtigen Zeit bei der richtigen Person, zu erhalten (Zade et al., 2018), müssen Informationen auf die Bedingungen des Ereignisses, organisationale Anforderungen, soziale Rahmenbedingungen und technische Möglichkeiten verfeinert werden. Diese Dissertation kombiniert das methodische Framework der Designfallstudien (Wulf et al., 2011) mit den Prinzipien der Design-Science-Forschung (Hevner et al., 2004), um das Thema der Informationsverfeinerung (Information Refinement) in vier Phasen zu untersuchen, wovon jede unterschiedliche Forschungsbeiträge hervorbringt. Die Arbeit begutachtet zunächst Nutzungs-, Rollen- und Wahrnehmungsmuster in der Kriseninformatik und stellt die Potenziale sozialer Medien zur öffentlichen Teilhabe an der Krisenbewältigung heraus. Die empirische Studien mit der deutschen Bevölkerung zeigen die positiven Einstellungen und die steigende Nutzung mobiler und sozialer Technologien in Krisen, stellen aber auch Barrieren heraus und zeigen die Erwartung, dass BOS in soziale Medien aktiv sind. Die Ergebnisse fundieren das Design innovativer IKT-Artefakte, darunter visuelle Bevölkerungsrichtlinien für soziale Medien in Krisen (SMG), ein Web-Interface für BOS zur Aggregation mobiler und sozialer Daten (ESI), ein Algorithmus zur Extraktion relevanter Informationen in sozialen Medien (SMO), und eine mobile App für die bidirektionale Kommunikation zwischen BOS und Bevölkerung (112.social). Die Evaluation der Artefakte involviert EndnutzerInnen aus dem Anwendungsfeld des Krisenmanagements, um potenziale für Verbesserungen und zukünftige Forschung zu identifizieren. Die Arbeit schließt mit einem Framework zur Informationsverfeinerung für die Kriseninformatik ab, welche die event-, gesellschafts-, organisation- und technologiebasierte Perspektive integriert.},
publisher = {Dissertation (Dr. rer. nat.), Department of Computer Science, Technische Unviersität Darmstadt},
author = {Kaufhold, Marc-André},
year = {2020},
keywords = {Crisis, Projekt-CYWARN, Projekt-ATHENE-SecUrban, Projekt-KontiKat, Dissertation},
}
[BibTeX] [Abstract] [Download PDF]
The research field of crisis informatics examines, amongst others, the potentials and barriers of social media use during disasters and emergencies. Social media allow emergency services to receive valuable information (e.g., eyewitness reports, pictures, or videos) from social media. However, the vast amount of data generated during large-scale incidents can lead to issue of information overload. Research indicates that supervised machine learning techniques are sui- table for identifying relevant messages and filter out irrelevant messages, thus mitigating in- formation overload. Still, they require a considerable amount of labeled data, clear criteria for relevance classification, a usable interface to facilitate the labeling process and a mechanism to rapidly deploy retrained classifiers. To overcome these issues, we present (1) a system for social media monitoring, analysis and relevance classification, (2) abstract and precise criteria for re- levance classification in social media during disasters and emergencies, (3) the evaluation of a well-performing Random Forest algorithm for relevance classification incorporating metadata from social media into a batch learning approach (e.g., 91.28\%/89.19\% accuracy, 98.3\%/89.6\% precision and 80.4\%/87.5\% recall with a fast training time with feature subset selection on the European floods/BASF SE incident datasets), as well as (4) an approach and preliminary eva- luation for relevance classification including active, incremental and online learning to reduce the amount of required labeled data and to correct misclassifications of the algorithm by feed- back classification. Using the latter approach, we achieved a well-performing classifier based on the European floods dataset by only requiring a quarter of labeled data compared to the tradi- tional batch learning approach. Despite a lesser effect on the BASF SE incident dataset, still a substantial improvement could be determined.
@article{kaufhold_rapid_2020,
title = {Rapid relevance classification of social media posts in disasters and emergencies: {A} system and evaluation featuring active, incremental and online learning},
volume = {57},
url = {https://peasec.de/paper/2020/2020_KaufholdBayerReuter_RapidRelevanceClassification_IPM.pdf},
abstract = {The research field of crisis informatics examines, amongst others, the potentials and barriers of social media use during disasters and emergencies. Social media allow emergency services to receive valuable information (e.g., eyewitness reports, pictures, or videos) from social media. However, the vast amount of data generated during large-scale incidents can lead to issue of information overload. Research indicates that supervised machine learning techniques are sui- table for identifying relevant messages and filter out irrelevant messages, thus mitigating in- formation overload. Still, they require a considerable amount of labeled data, clear criteria for relevance classification, a usable interface to facilitate the labeling process and a mechanism to rapidly deploy retrained classifiers. To overcome these issues, we present (1) a system for social media monitoring, analysis and relevance classification, (2) abstract and precise criteria for re- levance classification in social media during disasters and emergencies, (3) the evaluation of a well-performing Random Forest algorithm for relevance classification incorporating metadata from social media into a batch learning approach (e.g., 91.28\%/89.19\% accuracy, 98.3\%/89.6\% precision and 80.4\%/87.5\% recall with a fast training time with feature subset selection on the European floods/BASF SE incident datasets), as well as (4) an approach and preliminary eva- luation for relevance classification including active, incremental and online learning to reduce the amount of required labeled data and to correct misclassifications of the algorithm by feed- back classification. Using the latter approach, we achieved a well-performing classifier based on the European floods dataset by only requiring a quarter of labeled data compared to the tradi- tional batch learning approach. Despite a lesser effect on the BASF SE incident dataset, still a substantial improvement could be determined.},
number = {1},
journal = {Information Processing \& Management (IPM)},
author = {Kaufhold, Marc-André and Bayer, Markus and Reuter, Christian},
year = {2020},
keywords = {Crisis, Projekt-emergenCITY, Projekt-ATHENE-SecUrban, A-Paper, AuswahlKaufhold, Ranking-CORE-A, Ranking-ImpactFactor, SocialMedia, Ranking-WKWI-B},
pages = {1--32},
}
[BibTeX] [Abstract] [Download PDF]
As part of information systems, the research field of crisis informatics increasingly investigates the potentials and limitations of mobile crisis apps, which constitute a relatively new public service for citizens and are specifically designed for the dissemination of disaster‐related information and communication between authorities, organizations and citizens. While existing crisis apps, such as KATWARN or NINA in Germany, focus on preparatory information and warning functionality, there is a need for apps and research on police-related functionality, such as information on cybercrime, fraud offences, or search for missing persons. Based on a workshop with civil protection (N=12) and police officers (N=15), we designed a questionnaire and conducted a representative survey of German citizens (N=1.219) on the past, current and future use, perceived helpfulness, deployment and behavioural preferences, configurability and most important functionality of mobile crisis apps. Our results indicate that in addition to emergency and weather warnings, crime- and health-related warnings are also desired by many, as is the possibility for bidirectional communication. People also want one central app and are resistant to installing more than one crisis app. Furthermore, there are few significant differences between socioeconomic groups.
@inproceedings{kaufhold_warning_2020,
title = {Warning the {Public}: {A} {Survey} on {Attitudes}, {Expectations} and {Use} of {Mobile} {Crisis} {Apps} in {Germany}},
url = {http://www.peasec.de/paper/2020/2020_KaufholdHaunschildReuter_WarningthePublic_ECIS.pdf},
abstract = {As part of information systems, the research field of crisis informatics increasingly investigates the potentials and limitations of mobile crisis apps, which constitute a relatively new public service for citizens and are specifically designed for the dissemination of disaster‐related information and communication between authorities, organizations and citizens. While existing crisis apps, such as KATWARN or NINA in Germany, focus on preparatory information and warning functionality, there is a need for apps and research on police-related functionality, such as information on cybercrime, fraud offences, or search for missing persons. Based on a workshop with civil protection (N=12) and police officers (N=15), we designed a questionnaire and conducted a representative survey of German citizens (N=1.219) on the past, current and future use, perceived helpfulness, deployment and behavioural preferences, configurability and most important functionality of mobile crisis apps. Our results indicate that in addition to emergency and weather warnings, crime- and health-related warnings are also desired by many, as is the possibility for bidirectional communication. People also want one central app and are resistant to installing more than one crisis app. Furthermore, there are few significant differences between socioeconomic groups.},
booktitle = {Proceedings of the {European} {Conference} on {Information} {Systems} ({ECIS})},
publisher = {AIS},
author = {Kaufhold, Marc-André and Haunschild, Jasmin and Reuter, Christian},
year = {2020},
keywords = {Crisis, Projekt-ATHENE-FANCY, Projekt-emergenCITY, Projekt-ATHENE-SecUrban, A-Paper, Ranking-CORE-A, Ranking-VHB-B, Ranking-WKWI-A},
}
[BibTeX] [Abstract] [Download PDF]
Threats in cyberspace have increased in recent years due to the increment of offensive capabilities by states. Approaches to mitigate the security dilemma in cyberspace within the UN are deadlocked, as states have not been able to achieve agreements. However, from the perspective of IT-Security, there are Cyber Threat Intelligence (CTI) platforms to share and analyze cyber threats for a collective crisis management. To investigate, whether or not CTI platforms can be used as a confidence-building measure between states and international organizations, we portray current CTI platforms, showcase political requirements, and answer the question of how CTI communication may contribute to confidence-building in international affairs. Our results suggest the need to further develop analytical capabilities, as well as the implementation of a broad social, political, and legal environment for international CTI sharing.
@article{kuehn_sharing_2020,
title = {Sharing of {Cyber} {Threat} {Intelligence} between {States}},
volume = {38},
url = {http://www.peasec.de/paper/2020/2020_KuehnRiebeApeltJansenReuter_SharingCyberThreatIntelligence_SF.pdf},
doi = {10.5771/0175-274X-2020-1-22},
abstract = {Threats in cyberspace have increased in recent years due to the increment of offensive capabilities by states. Approaches to mitigate the security dilemma in cyberspace within the UN are deadlocked, as states have not been able to achieve agreements. However, from the perspective of IT-Security, there are Cyber Threat Intelligence (CTI) platforms to share and analyze cyber threats for a collective crisis management. To investigate, whether or not CTI platforms can be used as a confidence-building measure between states and international organizations, we portray current CTI platforms, showcase political requirements, and answer the question of how CTI communication may contribute to confidence-building in international affairs. Our results suggest the need to further develop analytical capabilities, as well as the implementation of a broad social, political, and legal environment for international CTI sharing.},
number = {1},
journal = {S+F Sicherheit und Frieden / Peace and Security},
author = {Kuehn, Philipp and Riebe, Thea and Apelt, Lynn and Jansen, Max and Reuter, Christian},
year = {2020},
keywords = {Peace, Student, Security, Projekt-CYWARN, Projekt-ATHENE-SecUrban, Cyberwar, Projekt-DualUse},
pages = {22--28},
}
[BibTeX] [Download PDF]
@incollection{reinhold_verfassungs-_2020,
title = {Verfassungs- und völkerrechtliche {Fragen} im militärischen {Cyber}- und {Informationsraum} unter besonderer {Berücksichtigung} des {Parlamentsvorbehalts}, der {Zurechenbarkeit} von {Cyberangriffen} sowie einer möglichen {Anpassung} nationaler und internationaler {Normen}},
url = {https://www.bundestag.de/resource/blob/824622/67fc9db4f856a8445355562500d2a134/stellungnahme-Thomas-Reinhold_15-03-2021-data.pdf},
booktitle = {Deutscher {Bundestag}, {Verteidigungsausschuss}},
publisher = {Deutscher Bundestag, Verteidigungsausschuss},
author = {Reinhold, Thomas},
year = {2020},
keywords = {Peace, Security, Projekt-ATHENE-SecUrban, Cyberwar},
pages = {1--9},
}
[BibTeX] [Abstract] [Download PDF]
Digitalization and interconnectedness, facilitated by the Internet of Things (IoT) and the widespread distribution of mobile devices, can be used to tackle important societal challenges. This is maybe most prominently visible in the response to the COVID-2019 Pandemic. However, the design of mobile technology, functionality and underlying infrastructures must be resilient against disruptions caused by man-made (e.g. bombings, hacking) and natural (e.g. earthquakes, hurricanes) crises, emergencies and threats. To explore challenges, designs and potentials of interactive technologies, this workshop investigates the overlapping space of mobile technologies and resilient systems, including future application domains such as smart cities.
@inproceedings{reuter_mobile_2020,
title = {Mobile {Resilience}: {Designing} {Mobile} {Interactive} {Systems} for {Societal} and {Technical} {Resilience}},
url = {https://dl.acm.org/doi/pdf/10.1145/3406324.3424590},
doi = {10.1145/3406324.3424590},
abstract = {Digitalization and interconnectedness, facilitated by the Internet of Things (IoT) and the widespread distribution of mobile devices, can be used to tackle important societal challenges. This is maybe most prominently visible in the response to the COVID-2019 Pandemic. However, the design of mobile technology, functionality and underlying infrastructures must be resilient against disruptions caused by man-made (e.g. bombings, hacking) and natural (e.g. earthquakes, hurricanes) crises, emergencies and threats. To explore challenges, designs and potentials of interactive technologies, this workshop investigates the overlapping space of mobile technologies and resilient systems, including future application domains such as smart cities.},
booktitle = {{MobileHCI} '20: 22nd {International} {Conference} on {Human}-{Computer} {Interaction} with {Mobile} {Devices} and {Services}},
author = {Reuter, Christian and Kaufhold, Marc-André and Comes, Tina and Knodt, Michèle and Mühlhäuser, Max},
year = {2020},
keywords = {Crisis, HCI, Projekt-CYWARN, Projekt-emergenCITY, Projekt-ATHENE-SecUrban, SocialMedia, Ranking-CORE-B},
pages = {1--3},
}
[BibTeX] [Abstract] [Download PDF]
The growth of cities continues to be a global megatrend. As more and more people live in urban areas and urban services and infrastructures are under growing strain, technologies are increasingly being researched and used to make city life more efficient and comfortable. As a result, so-called “Smart Cities” have complex IT infrastructures and cyber-physical systems such as sensor/actuator networks for the general population and are developing worldwide. Urban infrastructure must be secured against attacks, ensuring reliable and resilient services for citizens as well as privacy and data security. This paper introduces selected challenges faced by infrastructure providers, citizens and decision-makers in handling attacks aimed at information and communication technologies (ICT) of urban infrastructures and presents current research avenues for tackling cyberattacks and for developing tools for creating, portraying and disseminating actiona-ble information as one important response to security challenges. It then presents findings from a representative survey conducted in Germany (N=1091) on the experiences and perceptions of citizens concerning the relevance of cyberat-tacks will be presented.
@inproceedings{reuter_towards_2020,
address = {Magdeburg},
title = {Towards {Secure} {Urban} {Infrastructures}: {Cyber} {Security} {Challenges} to {Information} and {Communication} {Technology} in {Smart} {Cities}},
url = {https://dl.gi.de/bitstream/handle/20.500.12116/33550/muc2020-ws-408.pdf},
doi = {10.18420/muc2020-ws117-408},
abstract = {The growth of cities continues to be a global megatrend. As more and more people live in urban areas and urban services and infrastructures are under growing strain, technologies are increasingly being researched and used to make city life more efficient and comfortable. As a result, so-called “Smart Cities” have complex IT infrastructures and cyber-physical systems such as sensor/actuator networks for the general population and are developing worldwide. Urban infrastructure must be secured against attacks, ensuring reliable and resilient services for citizens as well as privacy and data security. This paper introduces selected challenges faced by infrastructure providers, citizens and decision-makers in handling attacks aimed at information and communication technologies (ICT) of urban infrastructures and presents current research avenues for tackling cyberattacks and for developing tools for creating, portraying and disseminating actiona-ble information as one important response to security challenges. It then presents findings from a representative survey conducted in Germany (N=1091) on the experiences and perceptions of citizens concerning the relevance of cyberat-tacks will be presented.},
booktitle = {Mensch und {Computer} 2020 - {Workshopband}},
publisher = {Gesellschaft für Informatik e.V.},
author = {Reuter, Christian and Haunschild, Jasmin and Hollick, Matthias and Mühlhäuser, Max and Vogt, Joachim and Kreutzer, Michael},
editor = {Hansen, C. and Nürnberger, A. and Preim, B.},
year = {2020},
keywords = {Security, UsableSec, Crisis, Projekt-emergenCITY, Projekt-ATHENE-SecUrban, Infrastructure},
pages = {1--7},
}
[BibTeX] [Abstract] [Download PDF]
ie besorgniserregende Aufkündigung des INF-Vertrags, der wiederholte Einsatz von Chemiewaffen in Syrien, kontroverse Diskussionen über die Einführung autonomer Waffensysteme oder zunehmende Cyber-Bedrohungen prägen das aktuelle politische Weltgeschehen. Besonders in einer Zeit, in der nukleare, biologische und chemische Abrüstung- und Rüstungskontrollmaßnahmen vor großen Herausforderungen stehen und gleichzeitig neue Technologien veränderte Anforderungen an diese Kontrollmechanismen mit sich bringen, gewinnt die naturwissenschaftlich-technische Friedensforschung enorm an Bedeutung. Sie beschäftigt sich auf der Grundlage von Erkenntnissen aus verschiedenen Naturwissenschaften und technischen Fachrichtungen (z. B. Physik, Chemie, Biologie, Informatik) mit der Rolle naturwissenschaftlicher und technischer Möglichkeiten im Kontext von Krieg und Frieden sowie Rüstung und Abrüstung. Sie unterstützt die politischen Prozesse der Kriegsprävention, der Abrüstung und der Vertrauensbildung mit Analysen der Eigenschaften und Folgen neuer Waffenarten und Technologien. Aus dieser Forschung werden Vorschläge für die Begrenzung neuer Waffenentwicklungen ebenso entwickelt wie technische Lösungen für eine verbesserte Rüstungskontrolle. Dieser Artikel benennt aktuelle Herausforderungen der naturwissenschaftlich-technischen Friedensforschung und geht dabei auch auf die aktuellen Empfehlungen des Wissenschaftsrats zur Weiterentwicklung der Friedens- und Konfliktforschung aus dem Jahr 2019 ein.
@article{reuter_zur_2020,
title = {Zur naturwissenschaftlich-technischen {Friedens}- und {Konfliktforschung} – {Aktuelle} {Herausforderungen} und {Bewertung} der {Empfehlungen} des {Wissenschaftsrats}},
volume = {9},
url = {https://link.springer.com/content/pdf/10.1007/s42597-020-00035-z.pdf},
doi = {10.1007/s42597-020-00035-z},
abstract = {ie besorgniserregende Aufkündigung des INF-Vertrags, der wiederholte Einsatz von Chemiewaffen in Syrien, kontroverse Diskussionen über die Einführung autonomer Waffensysteme oder zunehmende Cyber-Bedrohungen prägen das aktuelle politische Weltgeschehen. Besonders in einer Zeit, in der nukleare, biologische und chemische Abrüstung- und Rüstungskontrollmaßnahmen vor großen Herausforderungen stehen und gleichzeitig neue Technologien veränderte Anforderungen an diese Kontrollmechanismen mit sich bringen, gewinnt die naturwissenschaftlich-technische Friedensforschung enorm an Bedeutung. Sie beschäftigt sich auf der Grundlage von Erkenntnissen aus verschiedenen Naturwissenschaften und technischen Fachrichtungen (z. B. Physik, Chemie, Biologie, Informatik) mit der Rolle naturwissenschaftlicher und technischer Möglichkeiten im Kontext von Krieg und Frieden sowie Rüstung und Abrüstung. Sie unterstützt die politischen Prozesse der Kriegsprävention, der Abrüstung und der Vertrauensbildung mit Analysen der Eigenschaften und Folgen neuer Waffenarten und Technologien. Aus dieser Forschung werden Vorschläge für die Begrenzung neuer Waffenentwicklungen ebenso entwickelt wie technische Lösungen für eine verbesserte Rüstungskontrolle. Dieser Artikel benennt aktuelle Herausforderungen der naturwissenschaftlich-technischen Friedensforschung und geht dabei auch auf die aktuellen Empfehlungen des Wissenschaftsrats zur Weiterentwicklung der Friedens- und Konfliktforschung aus dem Jahr 2019 ein.},
number = {1},
journal = {Zeitschrift für Friedens- und Konfliktforschung (ZeFKo)},
author = {Reuter, Christian and Altmann, Jürgen and Göttsche, Malte and Himmel, Mirko},
year = {2020},
keywords = {Peace, Security, Projekt-ATHENE-SecUrban, Projekt-CROSSING, Cyberwar},
pages = {143--154},
}
[BibTeX] [Abstract] [Download PDF]
Advances in science and technology, including information technology (IT), play a crucial role in the context of peace and security. However, research on the intersection of peace and conflict research as well as computer science is not well established yet. This article highlights the need for further work in the area of research “IT peace research”, which includes both empirical research on the role of IT in peace and security, as well as technical research to design technologies and applications. Based on the elaboration of the disciplines, central challenges, such as insecurity, actors, attribution and laws, are outlined.
@article{reuter_towards_2020-1,
title = {Towards {IT} {Peace} {Research}: {Challenges} at the {Intersection} of {Peace} and {Conflict} {Research} and {Computer} {Science}},
volume = {38},
url = {https://www.nomos-elibrary.de/10.5771/0175-274X-2020-1-10.pdf},
doi = {10.5771/0175-274X-2020-1-10},
abstract = {Advances in science and technology, including information technology (IT), play a crucial role in the context of peace and security. However, research on the intersection of peace and conflict research as well as computer science is not well established yet. This article highlights the need for further work in the area of research “IT peace research”, which includes both empirical research on the role of IT in peace and security, as well as technical research to design technologies and applications. Based on the elaboration of the disciplines, central challenges, such as insecurity, actors, attribution and laws, are outlined.},
number = {1},
journal = {S+F Sicherheit und Frieden / Peace and Security},
author = {Reuter, Christian},
year = {2020},
keywords = {Peace, Security, Projekt-ATHENE-SecUrban, Cyberwar, AuswahlPeace, Projekt-DualUse},
pages = {10--16},
}
[BibTeX] [Abstract] [Download PDF]
Die Diskussion um die Vorratsdatenspeicherung ist europaweit weiterhin relevant, da es keine einheitliche Gesetzgebung der EU-Mitgliedsstaaten gibt. So werden in einigen EU-Staaten weiterhin Vorratsdaten gespeichert, obwohl der EuGH die Vorratsdatenspeicherung für teilweise rechtswidrig erklärt hat. Dabei unterscheiden sich die Speicherdauer, die erhobenen Daten und die Rechte der Behörden erheblich. Der Beitrag vergleicht den Umgang mit der Vorratsdatenspeicherung in zehn EU- und Schengen-Staaten im Hinblick auf Einführung und Aussetzung, Speicherdauer, Speicherinhalte und Zugriffsrechte.
@article{riebe_veranderung_2020,
title = {Die {Veränderung} der {Vorratsdatenspeicherung} in {Europa}},
volume = {44},
url = {https://www.peasec.de/paper/2020/2020_Riebeetal_VDSinEuropa_DuD.pdf},
doi = {10.1007/s11623-020-1275-3},
abstract = {Die Diskussion um die Vorratsdatenspeicherung ist europaweit weiterhin relevant, da es keine einheitliche Gesetzgebung der EU-Mitgliedsstaaten gibt. So werden in einigen EU-Staaten weiterhin Vorratsdaten gespeichert, obwohl der EuGH die Vorratsdatenspeicherung für teilweise rechtswidrig erklärt hat. Dabei unterscheiden sich die Speicherdauer, die erhobenen Daten und die Rechte der Behörden erheblich. Der Beitrag vergleicht den Umgang mit der Vorratsdatenspeicherung in zehn EU- und Schengen-Staaten im Hinblick auf Einführung und Aussetzung, Speicherdauer, Speicherinhalte und Zugriffsrechte.},
number = {5},
journal = {Datenschutz und Datensicherheit - DuD},
author = {Riebe, Thea and Haunschild, Jasmin and Divo, Felix and Lang, Matthias and Roitburd, Gerbert and Franken, Jonas and Reuter, Christian},
year = {2020},
keywords = {Peace, Student, Security, Projekt-ATHENE-SecUrban, Projekt-DualUse, Projekt-KontiKat},
pages = {316--321},
}