Download as BibTeX: All PEASEC Paper
Year
PEASEC primarily publishes its research in peer-reviewed journals and conferences in the fields of human–computer interaction, cybersecurity and privacy, peace and conflict research, crisis informatics, and information systems.
2026
Ranking
Disclaimer: Not all rankings are appropriate to measure research on the intersection of different disciplines.
- CORE-Ranking (Focus: Computer Science, Cyber Security, Human-Computer-Interaction)
- VHB-Ranking (Focus: Information Systems)
- Impact Factor (Focus: Social Sciences, General)
CORE-Ranking
Quellen: CORE Conference Portal, CORE Journal Ranks
CORE-A*
[BibTeX] [Abstract] [Download PDF]
Active learning is designed to minimize annotation efforts by prioritizing instances that most enhance learning. However, many active learning strategies struggle with a ‘coldstart’ problem, needing substantial initial data to be effective. This limitation reduces their utility in the increasingly relevant fewshot scenarios, where the instance selection has a substantial impact. To address this, we introduce ActiveLLM, a novel active learning approach that leverages Large Language Models such as GPT-4, o1, Llama 3, or Mistral Large for selecting instances. We demonstrate that ActiveLLM significantly enhances the classification performance of BERT classifiers in few-shot scenarios, outperforming traditional active learning methods as well as improving the few-shot learning methods ADAPET, PERFECT, and Set- Fit. Additionally, ActiveLLM can be extended to non-few-shot scenarios, allowing for iterative selections. In this way, ActiveLLM can even help other active learning strategies to overcome their cold-start problem. Our results suggest that ActiveLLM offers a promising solution for improving model performance across various learning setups.
@article{bayerActiveLLMLargeLanguage2026,
title = {{ActiveLLM}: {Large} {Language} {Model}-based {Active} {Learning} for {Textual} {Few}-{Shot} {Scenarios}},
volume = {14},
url = {https://doi.org/10.1162/TACL.a.63},
doi = {10.1162/TACL.a.63},
abstract = {Active learning is designed to minimize annotation
efforts by prioritizing instances that
most enhance learning. However, many active
learning strategies struggle with a ‘coldstart’
problem, needing substantial initial
data to be effective. This limitation reduces
their utility in the increasingly relevant fewshot
scenarios, where the instance selection
has a substantial impact. To address this, we
introduce ActiveLLM, a novel active learning
approach that leverages Large Language
Models such as GPT-4, o1, Llama 3, or
Mistral Large for selecting instances. We
demonstrate that ActiveLLM significantly
enhances the classification performance of
BERT classifiers in few-shot scenarios, outperforming
traditional active learning methods
as well as improving the few-shot learning
methods ADAPET, PERFECT, and Set-
Fit. Additionally, ActiveLLM can be extended
to non-few-shot scenarios, allowing
for iterative selections. In this way, ActiveLLM
can even help other active learning
strategies to overcome their cold-start problem.
Our results suggest that ActiveLLM
offers a promising solution for improving
model performance across various learning
setups.},
journal = {Transactions of the Association for Computational Linguistics (TACL)},
author = {Bayer, Markus and Lutz, Justin and Reuter, Christian},
year = {2026},
keywords = {A-Paper, Projekt-ATHENE-CyAware, Student, Security, UsableSec, Projekt-CYLENCE, Ranking-CORE-A*},
pages = {1--22},
}
[BibTeX] [Abstract] [Download PDF]
Misinformation interventions are often evaluated under ideal conditions, yet real-world systems are rarely flawless. We report on an online experiment (𝑁 = 1, 004) comparing five state-of-the-art interventions – inoculation, accuracy prompt, community note, fact-check, and indicators – across TikTok, Telegram, and X. We examined efficacy and user perceptions under flawless and erroneous implementations. Misinformation accompanied by fact-checks andindicators was rated as significantly less accurate, while community notes showed weaker effects. Modality did not significantly influence intervention efficacy and had only minor effects on user acceptance. Community notes, fact-checks, and indicators were rated as more helpful but also more annoying than the less informative accuracy prompts. Notably, the efficacy of interventions disappeared under erroneous conditions. This highlights the crucial role of intervention quality in fostering trust and acceptance. Our findings provide (1) a cross-platform evaluation of interventions and (2) empirical evidence that accuracy and reliability are crucial in complex social media environments.
@inproceedings{hartwigTikTokTelegramCrossPlatform2026,
address = {New York, NY, USA},
series = {{CHI} '26},
title = {From {TikTok} to {Telegram}: {Cross}-{Platform} {Efficacy} and {User} {Acceptance} of {Erroneous} and {Flawless} {Misinformation} {Interventions}},
url = {https://peasec.de/paper/2026/2026_HartwigBiselliSchneiderLampReuter_TikTokToTelegram_CHI.pdf},
abstract = {Misinformation interventions are often evaluated under ideal conditions, yet real-world systems are rarely flawless. We report on an online experiment (𝑁 = 1, 004) comparing five state-of-the-art interventions – inoculation, accuracy prompt, community note, fact-check, and indicators – across TikTok, Telegram, and X. We examined efficacy and user perceptions under flawless and erroneous implementations. Misinformation accompanied by fact-checks andindicators was rated as significantly less accurate, while community notes showed weaker effects. Modality did not significantly influence intervention efficacy and had only minor effects on user acceptance. Community notes, fact-checks, and indicators were
rated as more helpful but also more annoying than the less informative accuracy prompts. Notably, the efficacy of interventions disappeared under erroneous conditions. This highlights the crucial role of intervention quality in fostering trust and acceptance. Our findings provide (1) a cross-platform evaluation of interventions and (2) empirical evidence that accuracy and reliability are crucial in complex social media environments.},
booktitle = {Proceedings of the {Conference} on {Human} {Factors} in {Computing} {Systems} ({CHI})},
publisher = {Association for Computing Machinery},
author = {Hartwig, Katrin and Biselli, Tom and Schneider, Franziska and Lamp, Immanuel and Reuter, Christian},
year = {2026},
keywords = {A-Paper, AuswahlCrisis, Crisis, HCI, Projekt-ATHENE-PriVis, Projekt-NEBULA, Ranking-CORE-A*, Security, Selected, UsableSec},
}
[BibTeX] [Abstract] [Download PDF]
In light of the increasing vulnerability of citizens against cyberattacks, we conducted three representative surveys with German citizens in 2021 (N=1,093), 2023 (N=1,011), and 2024 (N=1,004) to examine their cyber threat awareness, use of protective security measures, and preferred information channels. While our findings attest large proportions of the German population a high level of cyber threat awareness, many citizens feel inadequately informed about coping with cyberattacks and show little confidence in German security authorities to protect citizens and infrastructures. While age correlated with citizens’ awareness and behavior, we only saw minor temporal differences between datasets. Finally, we provide design and policy implications for enhancing citizens’ awareness of cyber threats and implementing security measures.
@inproceedings{kaufhold_cyber_2025,
address = {Yokohama, Japan},
series = {{CHI} '25},
title = {Cyber {Threat} {Awareness}, {Protective} {Measures} and {Communication} {Preferences} in {Germany}: {Implications} from {Three} {Representative} {Surveys} (2021-2024)},
url = {https://www.peasec.de/paper/2025/2025_KaufholdBäumlerBajorskiReuter_ComparativeCybersecuritySurvey_CHI.pdf},
doi = {10.1145/3706598.3713795},
abstract = {In light of the increasing vulnerability of citizens against cyberattacks, we conducted three representative surveys with German citizens in 2021 (N=1,093), 2023 (N=1,011), and 2024 (N=1,004) to examine their cyber threat awareness, use of protective security measures, and preferred information channels. While our findings attest large proportions of the German population a high level of cyber threat awareness, many citizens feel inadequately informed about coping with cyberattacks and show little confidence in German security authorities to protect citizens and infrastructures. While age correlated with citizens’ awareness and behavior, we only saw minor temporal differences between datasets. Finally, we provide design and policy implications for enhancing citizens’ awareness of cyber threats and implementing security measures.},
booktitle = {Proceedings of the {Conference} on {Human} {Factors} in {Computing} {Systems} ({CHI})},
publisher = {Association for Computing Machinery},
author = {Kaufhold, Marc-André and Bäumler, Julian and Bajorski, Marius and Reuter, Christian},
year = {2025},
keywords = {HCI, A-Paper, Projekt-ATHENE-CyAware, Security, UsableSec, Projekt-CYLENCE, Selected, AuswahlUsableSec, Ranking-CORE-A*, HabilitationKaufhold},
}
[BibTeX] [Abstract] [Download PDF]
Using smartphone apps during crises is well-established, proving critical for efficient crisis response. However, such apps become futile without an Internet connection, which is a common issue during crises. The ongoing 6G standardization explores the capability to provide local cellular connectivity for areas cut off from the Internet in crises. This paper introduces to the HCI community the concept of cellular island connectivity in isolated areas, promising a seamless transition from normal operation to island operation with local-only cellular connectivity. It presents findings from a survey (N = 857) among adult smartphone users from major German cities regarding their smartphone usage preferences in this model. Results show a shift in app demand, with users favoring general-purpose apps over dedicated crisis apps in specific scenarios. We prioritize smartphone services based on their criticality, distinguishing between apps essential for crisis response and those supporting routines. Our findings provide operators, developers, and authorities insights into making user-centric design decisions for implementing island-ready 6G communication.
@inproceedings{janzenUserPerspectiveIslandReady2025,
address = {Yokohama, Japan},
series = {{CHI} '25},
title = {The {User} {Perspective} on {Island}-{Ready} {6G} {Communication}: {A} {Survey} of {Future} {Smartphone} {Usage} in {Crisis}-{Struck} {Areas} with {Local} {Cellular} {Connectivity}},
url = {https://www.peasec.de/paper/2025/2025_JanzenPutzKaufholdStraubHollick_UserPerspective6GCommunication_CHI.pdf},
doi = {10.1145/3706598.3714324},
abstract = {Using smartphone apps during crises is well-established, proving critical for efficient crisis response. However, such apps become futile without an Internet connection, which is a common issue during crises. The ongoing 6G standardization explores the capability to provide local cellular connectivity for areas cut off from the Internet in crises. This paper introduces to the HCI community the concept of cellular island connectivity in isolated areas, promising a seamless transition from normal operation to island operation with local-only cellular connectivity. It presents findings from a survey (N = 857) among adult smartphone users from major German cities regarding their smartphone usage preferences in this model. Results show a shift in app demand, with users favoring general-purpose apps over dedicated crisis apps in specific scenarios. We prioritize smartphone services based on their criticality, distinguishing between apps essential for crisis response and those supporting routines. Our findings provide operators, developers, and authorities insights into making user-centric design decisions for implementing island-ready 6G communication.},
booktitle = {Proceedings of the {Conference} on {Human} {Factors} in {Computing} {Systems} ({CHI}) ({Honorable} {Mentions})},
publisher = {Association for Computing Machinery},
author = {Janzen, Leon and Putz, Florentin and Kaufhold, Marc-André and Straub, Kolja and Hollick, Matthias},
year = {2025},
keywords = {HCI, Projekt-emergenCITY, A-Paper, Security, UsableSec, Projekt-CYLENCE, AuswahlCrisis, Ranking-CORE-A*, emergenCITY\_INF, emergenCITY\_SG},
}
[BibTeX] [Abstract] [Download PDF]
As smart home technology becomes integral to modern living, researchers must consider safety aspects. While single-purpose devices alert users to specific dangers, integrating them within comprehensive smart home warning systems (SHWSs) offers new safety potentials by allowing actuators to respond to threats based on predefined protocols. Key questions include whether user preferences for automation levels in smart homes are affected by different warning scenarios, and how unwanted automation or false positives influence acceptance. To explore this, we conduct two studies: (1) A lab study in a smart home with various actuators, where participants (N = 48) encounter warnings across three automation levels. (2) A follow-up interview study (N = 16) further evaluating our prototype and unwanted automation situations. Results show that participants preferred higher automation during warnings and were more receptive to smart technology in dangerous situations, though customization remains essential to ensure acceptance. While higher automation levels reduced perceived interruption, some still preferred less intense warnings. Others preferred not receiving warnings of mild dangers, fully relying on automation. Finally, we find that specific safety protocols and handling of false positive alarms must be chosen carefully to avoid mistrust, users feeling a loss of control, and damage through unwanted executions.
@article{henkelHouseThatSaves2025,
title = {The {House} {That} {Saves} {Me}? {Assessing} the {Role} of {Smart} {Home} {Automation} in {Warning} {Scenarios}},
volume = {9},
shorttitle = {The {House} {That} {Saves} {Me}?},
url = {https://www.peasec.de/paper/2025/2025_HenkelHaeslerAlNajmiHesselReuter_HouseThatSavesMe_IMWUT.pdf},
doi = {10.1145/3712269},
abstract = {As smart home technology becomes integral to modern living, researchers must consider safety aspects. While single-purpose devices alert users to specific dangers, integrating them within comprehensive smart home warning systems (SHWSs) offers new safety potentials by allowing actuators to respond to threats based on predefined protocols. Key questions include whether user preferences for automation levels in smart homes are affected by different warning scenarios, and how unwanted automation or false positives influence acceptance. To explore this, we conduct two studies: (1) A lab study in a smart home with various actuators, where participants (N = 48) encounter warnings across three automation levels. (2) A follow-up interview study (N = 16) further evaluating our prototype and unwanted automation situations. Results show that participants preferred higher automation during warnings and were more receptive to smart technology in dangerous situations, though customization remains essential to ensure acceptance. While higher automation levels reduced perceived interruption, some still preferred less intense warnings. Others preferred not receiving warnings of mild dangers, fully relying on automation. Finally, we find that specific safety protocols and handling of false positive alarms must be chosen carefully to avoid mistrust, users feeling a loss of control, and damage through unwanted executions.},
number = {1},
journal = {Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies (IMWUT)},
author = {Henkel, Markus and Haesler, Steffen and Al-Najmi, Hiba and Hessel, Frank and Reuter, Christian},
year = {2025},
keywords = {Crisis, HCI, Projekt-emergenCITY, A-Paper, Student, Projekt-ATHENE-SecUrban, AuswahlCrisis, Ranking-CORE-A*, emergenCITY\_INF, emergenCITY\_SG},
pages = {5:1--5:32},
}
[BibTeX] [Abstract] [Download PDF]
Youth are particularly likely to encounter hateful internet content, which can severely impact their well-being. While most social media provide reporting mechanisms, in several countries, severe hateful content can alternatively be reported to law enforcement or dedicated reporting centers. However, in Germany, many youth never resort to reporting. While research in human-computer interaction has investigated adults’ views on platform-based reporting, youth perspectives and platform-independent alternatives have received little attention. By involving a diverse group of 47 German adolescents and young adults in eight focus group interviews, we investigate how youth-sensitive reporting systems for hateful content can be designed. We explore German youth’s reporting barriers, finding that on platforms, they feel particularly discouraged by deficient rule enforcement and feedback, while platform-independent alternatives are rather unknown and perceived as time-consuming and disruptive. We further elicit their requirements for platform-independent reporting tools and contribute with heuristics for designing youth-sensitive and inclusive reporting systems.
@inproceedings{baumlerYouthSensitiveHatefulContent2025,
address = {Yokohama, Japan},
series = {{CHI} '25},
title = {Towards {Youth}-{Sensitive} {Hateful} {Content} {Reporting}: {An} {Inclusive} {Focus} {Group} {Study} in {Germany}},
url = {https://www.peasec.de/paper/2025/2025_BäumlerBaderKaufholdReuter_HatefulContentReporting_CHI.pdf},
doi = {10.1145/3706598.3713542},
abstract = {Youth are particularly likely to encounter hateful internet content, which can severely impact their well-being. While most social media provide reporting mechanisms, in several countries, severe hateful content can alternatively be reported to law enforcement or dedicated reporting centers. However, in Germany, many youth never resort to reporting. While research in human-computer interaction has investigated adults’ views on platform-based reporting, youth perspectives and platform-independent alternatives have received little attention. By involving a diverse group of 47 German adolescents and young adults in eight focus group interviews, we investigate how youth-sensitive reporting systems for hateful content can be designed. We explore German youth’s reporting barriers, finding that on platforms, they feel particularly discouraged by deficient rule enforcement and feedback, while platform-independent alternatives are rather unknown and perceived as time-consuming and disruptive. We further elicit their requirements for platform-independent reporting tools and contribute with heuristics for designing youth-sensitive and inclusive reporting systems.},
booktitle = {Proceedings of the {Conference} on {Human} {Factors} in {Computing} {Systems} ({CHI}) ({Honorable} {Mentions})},
publisher = {Association for Computing Machinery},
author = {Bäumler, Julian and Bader, Helen and Kaufhold, Marc-André and Reuter, Christian},
year = {2025},
keywords = {Crisis, HCI, A-Paper, Projekt-ATHENE-CyAware, Student, Projekt-CYLENCE, AuswahlCrisis, Selected, Ranking-CORE-A*},
}
[BibTeX] [Abstract] [Download PDF]
Research in Augmented Reality (AR) and Virtual Reality (VR) has mostly viewed them in isolation. Yet, when used together in practical settings, AR and VR each offer unique strengths, necessitating multiple transitions to harness their advantages. This paper investigates potential challenges in Cross-Reality (CR) transitions to inform future application design. We implemented a CR system featuring a 3D modeling task that requires users to switch between PC, AR, and VR. Using a talk-aloud study (n=12) and thematic analysis, we revealed that frictions primarily arose when transitions conflicted with users’ Spatial Mental Model (SMM). Furthermore, we found five transition archetypes employed to enhance productivity once an SMM was established. Our findings uncover that transitions have to focus on establishing and upholding the SMM of users across realities, by communicating differences between them.
@inproceedings{10.1145/3706598.3713921,
address = {New York, NY, USA},
series = {Chi '25},
title = {A {Qualitative} {Investigation} of {User} {Transitions} and {Frictions} in {Cross}-{Reality} {Applications}},
isbn = {979-8-4007-1394-1},
url = {https://www.peasec.de/paper/2025/2025_VonWillichNellesTsengGugenheimerGüntherMühlhäuser_FrictionsCrossReality_CHI.pdf},
doi = {10.1145/3706598.3713921},
abstract = {Research in Augmented Reality (AR) and Virtual Reality (VR) has mostly viewed them in isolation. Yet, when used together in practical settings, AR and VR each offer unique strengths, necessitating multiple transitions to harness their advantages. This paper investigates potential challenges in Cross-Reality (CR) transitions to inform future application design. We implemented a CR system featuring a 3D modeling task that requires users to switch between PC, AR, and VR. Using a talk-aloud study (n=12) and thematic analysis, we revealed that frictions primarily arose when transitions conflicted with users’ Spatial Mental Model (SMM). Furthermore, we found five transition archetypes employed to enhance productivity once an SMM was established. Our findings uncover that transitions have to focus on establishing and upholding the SMM of users across realities, by communicating differences between them.},
booktitle = {Proceedings of the {Conference} on {Human} {Factors} in {Computing} {Systems} ({CHI})},
publisher = {Association for Computing Machinery},
author = {von Willich, Julius and Nelles, Frank and Tseng, Wen-Jie and Gugenheimer, Jan and Günther, Sebastian and Mühlhäuser, Max},
year = {2025},
note = {Number of pages: 18
tex.articleno: 808},
keywords = {HCI, Projekt-emergenCITY, A-Paper, Projekt-ATHENE, Ranking-CORE-A*, emergenCITY\_INF, emergenCITY\_SG},
}
[BibTeX] [Abstract] [Download PDF]
Activists’ use of ICTs in contexts affected by violence poses challenges like digital surveillance. Based on 92 interviews with activists from Bolivia, Cameroon, Costa Rica, Colombia, India, Myanmar, and Nicaragua, this study explores their protection and coping strategies against technology-facilitated violence. Findings show limited emphasis on digital security and privacy-enhancing technologies, primarily due to the usability and familiarity with popular applications, coupled with relative unfamiliarity with other features. Generally, some precautions, like avoiding real-time location sharing, are common. While many protection strategies are similar, some are shaped by local factors like internet shutdowns and different adversaries’ capabilities. The findings demonstrate that some tools and features, such as VPN, may offer protection but also pose risks, e.g., in the case of criminalization, highlighting the crucial role of local context. Designing secure and usable features that account for the varying levels of limitations, such as poor connectivity and risks activists face, is essential.
@article{Guntrum2025,
title = {Activists' {Strategies} for {Coping} with {Technology}-{Facilitated} {Violence} in the {Global} {South}},
volume = {32},
issn = {1073-0516},
url = {https://doi.org/10.1145/3762811},
doi = {10.1145/3762811},
abstract = {Activists' use of ICTs in contexts affected by violence poses challenges like digital surveillance. Based on 92 interviews with activists from Bolivia, Cameroon, Costa Rica, Colombia, India, Myanmar, and Nicaragua, this study explores their protection and coping strategies against technology-facilitated violence. Findings show limited emphasis on digital security and privacy-enhancing technologies, primarily due to the usability and familiarity with popular applications, coupled with relative unfamiliarity with other features. Generally, some precautions, like avoiding real-time location sharing, are common. While many protection strategies are similar, some are shaped by local factors like internet shutdowns and different adversaries' capabilities. The findings demonstrate that some tools and features, such as VPN, may offer protection but also pose risks, e.g., in the case of criminalization, highlighting the crucial role of local context. Designing secure and usable features that account for the varying levels of limitations, such as poor connectivity and risks activists face, is essential.},
number = {6},
journal = {ACM Transactions on Computer-Human Interaction (TOCHI)},
author = {Guntrum, Laura and Reuter, Christian},
year = {2025},
keywords = {Peace, Projekt-TraCe, A-Paper, AuswahlPeace, Projekt-ATHENE-PriVis, Ranking-CORE-A*},
pages = {1--38},
}
[BibTeX] [Abstract] [Download PDF]
Misinformation represent a key challenge for society. User-centered misinformation interventions as digital countermeasures that exert a direct influence on users represent a promising means to deal with the large amounts of information available. While an extensive body of research on this topic exists, researchers are confronted with a diverse research landscape spanning multiple disciplines. This review systematizes the landscape of user-centered misinformation interventions to facilitate knowledge transfer, identify trends, and enable informed decision-making. Over 3,700 scholarly publications were screened and a systematic literature review (N=108) was conducted. A taxonomy was derived regarding intervention design (e.g., binary label), user interaction (active or passive), and timing (e.g., post exposure to misinformation). We provide a structured overview of approaches across multiple disciplines, and derive six overarching challenges for future research.
@article{hartwigLandscapeUsercenteredMisinformation2024,
title = {The {Landscape} of {User}-centered {Misinformation} {Interventions} – {A} {Systematic} {Literature} {Review}},
volume = {56},
issn = {0360-0300},
url = {https://peasec.de/paper/2024/2024_HartwigDoellReuter_LandscapeUserCentredMisinfoInterventions_CSUR.pdf},
doi = {10.1145/3674724},
abstract = {Misinformation represent a key challenge for society. User-centered misinformation interventions as digital countermeasures that exert a direct influence on users represent a promising means to deal with the large amounts of information available. While an extensive body of research on this topic exists, researchers are confronted with a diverse research landscape spanning multiple disciplines. This review systematizes the landscape of user-centered misinformation interventions to facilitate knowledge transfer, identify trends, and enable informed decision-making. Over 3,700 scholarly publications were screened and a systematic literature review (N=108) was conducted. A taxonomy was derived regarding intervention design (e.g., binary label), user interaction (active or passive), and timing (e.g., post exposure to misinformation). We provide a structured overview of approaches across multiple disciplines, and derive six overarching challenges for future research.},
number = {11},
journal = {ACM Computing Surveys (CSUR)},
author = {Hartwig, Katrin and Doell, Frederic and Reuter, Christian},
month = jul,
year = {2024},
keywords = {HCI, Peace, Projekt-NEBULA, A-Paper, Ranking-ImpactFactor, Student, Projekt-ATHENE, Selected, Ranking-CORE-A*},
}
[BibTeX] [Abstract] [Download PDF]
Computer Emergency Response Teams (CERTs) have been established in the public sector globally to provide advisory, preventive and reactive cybersecurity services for government agencies, citizens, and businesses. Nevertheless, their responsibility of monitoring, analyzing, and communicating cyber threats and security vulnerabilities have become increasingly challenging due to the growing volume and varying quality of information disseminated through public and social channels. Based on a design case study conducted from 2021 to 2023, this paper combines three iterations of expert interviews (N=25), design workshops (N=4) and cognitive walkthroughs (N=25) to design an automated, cross-platform and real-time cybersecurity dashboard. By adopting the notion of cyber situational awareness, the study further extracts user requirements and design heuristics for enhanced threat intelligence and mission awareness in CERTs, discussing the aspects of source integration, data management, customizable visualization, relationship awareness, information assessment, software integration, (inter-)organizational collaboration, and communication of stakeholder warnings.
@inproceedings{kaufhold_we_2024,
address = {Honolulu, HI, USA},
series = {{CHI} '24},
title = {'{We} {Do} {Not} {Have} the {Capacity} to {Monitor} {All} {Media}': {A} {Design} {Case} {Study} on {Cyber} {Situational} {Awareness} in {Computer} {Emergency} {Response} {Teams}},
isbn = {979-8-4007-0330-0},
url = {https://peasec.de/paper/2024/2024_KaufholdRiebeBayerReuter_CertDesignCaseStudy_CHI.pdf},
doi = {10.1145/3613904.3642368},
abstract = {Computer Emergency Response Teams (CERTs) have been established in the public sector globally to provide advisory, preventive and reactive cybersecurity services for government agencies, citizens, and businesses. Nevertheless, their responsibility of monitoring, analyzing, and communicating cyber threats and security vulnerabilities have become increasingly challenging due to the growing volume and varying quality of information disseminated through public and social channels. Based on a design case study conducted from 2021 to 2023, this paper combines three iterations of expert interviews (N=25), design workshops (N=4) and cognitive walkthroughs (N=25) to design an automated, cross-platform and real-time cybersecurity dashboard. By adopting the notion of cyber situational awareness, the study further extracts user requirements and design heuristics for enhanced threat intelligence and mission awareness in CERTs, discussing the aspects of source integration, data management, customizable visualization, relationship awareness, information assessment, software integration, (inter-)organizational collaboration, and communication of stakeholder warnings.},
booktitle = {Proceedings of the {Conference} on {Human} {Factors} in {Computing} {Systems} ({CHI}) ({Best} {Paper} {Award})},
publisher = {Association for Computing Machinery},
author = {Kaufhold, Marc-André and Riebe, Thea and Bayer, Markus and Reuter, Christian},
year = {2024},
keywords = {HCI, A-Paper, Projekt-ATHENE-CyAware, Security, UsableSec, Projekt-CYLENCE, Projekt-CYWARN, Selected, AuswahlUsableSec, Ranking-CORE-A*, AuswahlKaufhold, HabilitationKaufhold},
}
[BibTeX] [Abstract] [Download PDF]
Misinformation poses a recurrent challenge for video-sharing platforms (VSPs) like TikTok. Obtaining user perspectives on digital interventions addressing the need for transparency (e.g., through indicators) is essential. This article offers a thorough examination of the comprehensibility, usefulness, and limitations of an indicator-based intervention from an adolescents’ perspective. This study (𝑁 = 39; aged 13-16 years) comprised two qualitative steps: (1) focus group discussions and (2) think-aloud sessions, where participants engaged with a smartphone-app for TikTok. The results offer new insights into how video-based indicators can assist adolescents’ assessments. The intervention received positive feedback, especially for its transparency, and could be applicable to new content. This paper sheds light on how adolescents are expected to be experts while also being prone to video-based misinformation, with limited understanding of an intervention’s limitations. By adopting teenagers’ perspectives, we contribute to HCI research and provide new insights into the chances and limitations of interventions for VSPs.
@inproceedings{hartwigAdolescentsEyesAssessing2024,
address = {New York, NY, USA},
series = {{CHI} '24},
title = {From {Adolescents}' {Eyes}: {Assessing} an {Indicator}-{Based} {Intervention} to {Combat} {Misinformation} on {TikTok}},
isbn = {979-8-4007-0330-0},
url = {https://peasec.de/paper/2024/2024_HartwigBiselliSchneiderReuter_MisinfoTikTok_CHI.pdf},
doi = {10.1145/3613904.3642264},
abstract = {Misinformation poses a recurrent challenge for video-sharing platforms (VSPs) like TikTok. Obtaining user perspectives on digital interventions addressing the need for transparency (e.g., through indicators) is essential. This article offers a thorough examination of the comprehensibility, usefulness, and limitations of an indicator-based intervention from an adolescents’ perspective. This study (𝑁 = 39; aged 13-16 years) comprised two qualitative steps: (1) focus group discussions and (2) think-aloud sessions, where participants
engaged with a smartphone-app for TikTok. The results offer new insights into how video-based indicators can assist adolescents’ assessments. The intervention received positive feedback, especially for its transparency, and could be applicable to new content. This paper sheds light on how adolescents are expected to be experts while also being prone to video-based misinformation, with limited understanding of an intervention’s limitations. By adopting
teenagers’ perspectives, we contribute to HCI research and provide new insights into the chances and limitations of interventions for VSPs.},
booktitle = {Proceedings of the {Conference} on {Human} {Factors} in {Computing} {Systems} ({CHI})},
publisher = {Association for Computing Machinery},
author = {Hartwig, Katrin and Biselli, Tom and Schneider, Franziska and Reuter, Christian},
year = {2024},
keywords = {Crisis, HCI, Projekt-NEBULA, A-Paper, Security, UsableSec, Projekt-ATHENE-PriVis, AuswahlCrisis, Selected, Ranking-CORE-A*},
}
[BibTeX] [Abstract] [Download PDF]
Amidst the ongoing anti-military protests in Myanmar since 2021, there is a noticeable research gap on ICT-supported activism. Generally, ICTs play an important role during political crises in conjunction with activists’ practices on the ground. Inspired by Resource Mobilization Theory, I conducted qualitative interviews (N=16) and a qualitative online survey (N=34), which demonstrate the intersection between analog and digital domains, showcasing the ingenuity of the activists, and the rapid adoption of ICTs in a country that has experienced a digital revolution within the last few years. As not all people were able to protest on-the-ground, they acted as keyboard fighters to organize protests, to share information, and to support the civil disobedience movement in Myanmar. The study identifies, inter alia, the need for better offline applications with wider coverage in times of internet shutdowns, applications that cannot be easily identified during physical controls, and providing free and secure VPN access.
@inproceedings{guntrumKeyboardFightersUse2024,
address = {New York, NY, USA},
series = {{CHI} '24},
title = {Keyboard {Fighters}: {The} {Use} of {ICTs} by {Activists} in {Times} of {Military} {Coup} in {Myanmar}},
isbn = {979-8-4007-0330-0},
url = {https://peasec.de/paper/2024/2024_Guntrum_KeyboardFightersSMParticipationInMyanmar_CHI.pdf},
doi = {10.1145/3613904.3642279},
abstract = {Amidst the ongoing anti-military protests in Myanmar since 2021, there is a noticeable research gap on ICT-supported activism. Generally, ICTs play an important role during political crises in conjunction with activists’ practices on the ground. Inspired by Resource Mobilization Theory, I conducted qualitative interviews (N=16) and a qualitative online survey (N=34), which demonstrate the intersection between analog and digital domains, showcasing the ingenuity of the activists, and the rapid adoption of ICTs in a country that has experienced a digital revolution within the last few years. As not all people were able to protest on-the-ground, they acted as keyboard fighters to organize protests, to share information, and to support the civil disobedience movement in Myanmar. The study identifies, inter alia, the need for better offline applications with wider coverage in times of internet shutdowns, applications that cannot be easily identified during physical controls, and providing free and secure VPN access.},
booktitle = {Proceedings of the {Conference} on {Human} {Factors} in {Computing} {Systems} ({CHI})},
publisher = {Association for Computing Machinery},
author = {Guntrum, Laura},
year = {2024},
keywords = {HCI, Peace, Projekt-TraCe, A-Paper, Projekt-ATHENE, Selected, Ranking-CORE-A*},
}
[BibTeX] [Abstract] [Download PDF]
Data augmentation, the artificial creation of training data for machine learning by transformations, is a widely studied research field across machine learning disciplines. While it is useful for increasing a model’s generalization capabilities, it can also address many other challenges and problems, from overcoming a limited amount of training data, to regularizing the objective, to limiting the amount data used to protect privacy. Based on a precise description of the goals and applications of data augmentation and a taxonomy for existing works, this survey is concerned with data augmentation methods for textual classification and aims to provide a concise and comprehensive overview for researchers and practitioners. Derived from the taxonomy, we divide more than 100 methods into 12 different groupings and give state-of-the-art references expounding which methods are highly promising by relating them to each other. Finally, research perspectives that may constitute a building block for future work are provided.
@article{bayer_survey_2023,
title = {A {Survey} on {Data} {Augmentation} for {Text} {Classification}},
volume = {55},
url = {http://www.peasec.de/paper/2023/2023_BayerKaufholdReuter_SurveyDataAugmentationTextClassification_CSUR.pdf},
doi = {10.1145/3544558},
abstract = {Data augmentation, the artificial creation of training data for machine learning by transformations, is a widely studied research field across machine learning disciplines. While it is useful for increasing a model's generalization capabilities, it can also address many other challenges and problems, from overcoming a limited amount of training data, to regularizing the objective, to limiting the amount data used to protect privacy. Based on a precise description of the goals and applications of data augmentation and a taxonomy for existing works, this survey is concerned with data augmentation methods for textual classification and aims to provide a concise and comprehensive overview for researchers and practitioners. Derived from the taxonomy, we divide more than 100 methods into 12 different groupings and give state-of-the-art references expounding which methods are highly promising by relating them to each other. Finally, research perspectives that may constitute a building block for future work are provided.},
number = {7},
journal = {ACM Computing Surveys (CSUR)},
author = {Bayer, Markus and Kaufhold, Marc-André and Reuter, Christian},
year = {2023},
keywords = {Crisis, Projekt-emergenCITY, A-Paper, Ranking-ImpactFactor, Projekt-ATHENE-SecUrban, Projekt-CYWARN, AuswahlCrisis, Selected, Ranking-CORE-A*, AuswahlKaufhold, HabilitationKaufhold},
pages = {1--39},
}
[BibTeX] [Abstract] [Download PDF]
Modern smartphones support FIDO2 passwordless authentication using either external security keys or internal biometric authentication, but it is unclear whether users appreciate and accept these new forms of web authentication for their own accounts. We present the first lab study (N=87) comparing platform and roaming authentication on smartphones, determining the practical strengths and weaknesses of FIDO2 as perceived by users in a mobile scenario. Most participants were willing to adopt passwordless authentication during our in-person user study, but closer analysis shows that participants prioritize usability, security, and availability differently depending on the account type. We identify remaining adoption barriers that prevent FIDO2 from succeeding password authentication, such as missing support for contemporary usage patterns, including account delegation and usage on multiple clients.
@inproceedings{wurschingFIDO2RescuePlatform2023,
address = {New York, NY, USA},
series = {{CHI} '23},
title = {{FIDO2} the {Rescue}? {Platform} vs. {Roaming} {Authentication} on {Smartphones}},
url = {https://peasec.de/paper/2023/2023_WuerschingPutzHaeslerHollick_PlatformvsRoamingAuthenticationonSmartphones_CHI.pdf},
doi = {10.1145/3544548.3580993},
abstract = {Modern smartphones support FIDO2 passwordless authentication using either external security keys or internal biometric authentication, but it is unclear whether users appreciate and accept these new forms of web authentication for their own accounts. We present the first lab study (N=87) comparing platform and roaming authentication on smartphones, determining the practical strengths and weaknesses of FIDO2 as perceived by users in a mobile scenario. Most participants were willing to adopt passwordless authentication during our in-person user study, but closer analysis shows that participants prioritize usability, security, and availability differently depending on the account type. We identify remaining adoption barriers that prevent FIDO2 from succeeding password authentication, such as missing support for contemporary usage patterns, including account delegation and usage on multiple clients.},
booktitle = {Proceedings of the {Conference} on {Human} {Factors} in {Computing} {Systems} ({CHI}) ({Best} {Paper} {Award})},
publisher = {Association for Computing Machinery},
author = {Würsching, Leon and Putz, Florentin and Haesler, Steffen and Hollick, Matthias},
year = {2023},
keywords = {HCI, Projekt-emergenCITY, A-Paper, Security, UsableSec, AuswahlUsableSec, Ranking-CORE-A*},
}
[BibTeX] [Abstract] [Download PDF]
Recent disasters have shown an increase in the significance of social media for both affected citizens and volunteers alike in the coordination of information and organization of relief activities, often independently of and in addition to the official emergency response. Existing research mainly focuses on the way in which individual platforms are used by volunteers in response to disasters. This paper examines the use of social media during the European Floods of 2013 and proposes a novel cross-social-media application for volunteers. Besides comprehensive analysis of volunteer communities, interviews were conducted with “digital volunteers” such as Facebook moderators of disaster-related groups. Based on the challenges identified, we designed and implemented the cross-social-media application “XHELP”, which allows information to be both, acquired and distributed cross-media and cross-channel. The evaluation with 20 users leads to further design requirements for applications aiming to support volunteer moderators during disasters.
@inproceedings{reuterXHELPDesignCrossPlatform2015,
address = {Seoul, Korea},
title = {{XHELP}: {Design} of a {Cross}-{Platform} {Social}-{Media} {Application} to {Support} {Volunteer} {Moderators} in {Disasters}},
url = {http://www.peasec.de/paper/2015/2015_ReuterLudwigKaufholdPipek_XHELP_CHI.pdf},
doi = {10.1145/2702123.2702171},
abstract = {Recent disasters have shown an increase in the significance of social media for both affected citizens and volunteers alike in the coordination of information and organization of relief activities, often independently of and in addition to the official emergency response. Existing research mainly focuses on the way in which individual platforms are used by volunteers in response to disasters. This paper examines the use of social media during the European Floods of 2013 and proposes a novel cross-social-media application for volunteers. Besides comprehensive analysis of volunteer communities, interviews were conducted with "digital volunteers" such as Facebook moderators of disaster-related groups. Based on the challenges identified, we designed and implemented the cross-social-media application "XHELP", which allows information to be both, acquired and distributed cross-media and cross-channel. The evaluation with 20 users leads to further design requirements for applications aiming to support volunteer moderators during disasters.},
booktitle = {Proceedings of the {Conference} on {Human} {Factors} in {Computing} {Systems} ({CHI})},
publisher = {ACM Press},
author = {Reuter, Christian and Ludwig, Thomas and Kaufhold, Marc-André and Pipek, Volkmar},
year = {2015},
keywords = {Crisis, HCI, A-Paper, SocialMedia, AuswahlCrisis, Selected, Ranking-WKWI-A, Ranking-CORE-A*, Projekt-EmerGent, AuswahlKaufhold, Cooperation},
pages = {4093--4102},
}
[BibTeX] [Abstract] [Download PDF]
Emergencies such as the 2013 Central European flood or the 2013 typhoon Haiyan in Philippines have shown how citizens can organize themselves and coordinate private relief activities. These activities can be found in (physical) groups of affected people, but also within (digital) social media communities. There is an evident need, however, for a clearer picture of what exactly is going on to be available for use by the official emergency services: to enlist them, to keep them safe, to support their efforts and to avoid need-less duplications or conflicts. Aligning emergency services and volunteer activities is, then, crucial. In this paper we present a mobile crowd sensing based concept, which was designed as well as implemented as the application CrowdMonitor and facilitates the detection of physical and digital activities and the assignment of specific tasks to citizens. Finally, we outline the findings of its evaluation.
@inproceedings{ludwigCrowdMonitorMobileCrowd2015,
address = {New York, USA},
title = {{CrowdMonitor}: {Mobile} {Crowd} {Sensing} for {Assessing} {Physical} and {Digital} {Activities} of {Citizens} during {Emergencies}},
url = {https://www.wineme.uni-siegen.de/paper/2015/2015_ludwigreutersiebigterothpipek_crowdmonitor_chi.pdf},
abstract = {Emergencies such as the 2013 Central European flood or the 2013 typhoon Haiyan in Philippines have shown how citizens can organize themselves and coordinate private relief activities. These activities can be found in (physical) groups of affected people, but also within (digital) social media communities. There is an evident need, however, for a clearer picture of what exactly is going on to be available for use by the official emergency services: to enlist them, to keep them safe, to support their efforts and to avoid need-less duplications or conflicts. Aligning emergency services and volunteer activities is, then, crucial. In this paper we present a mobile crowd sensing based concept, which was designed as well as implemented as the application CrowdMonitor and facilitates the detection of physical and digital activities and the assignment of specific tasks to citizens. Finally, we outline the findings of its evaluation.},
booktitle = {Proceedings of the {Conference} on {Human} {Factors} in {Computing} {Systems} ({CHI})},
publisher = {ACM Press},
author = {Ludwig, Thomas and Reuter, Christian and Siebigteroth, Tim and Pipek, Volkmar},
editor = {Begole, Bo and Jinwoo, Kim and Kor, Inkpeni and Woontack, Woo},
year = {2015},
keywords = {Crisis, HCI, A-Paper, Student, Ranking-WKWI-A, Ranking-CORE-A*, Projekt-EmerGent, Cooperation},
pages = {4083--4092},
}
[BibTeX] [Abstract] [Download PDF]
People all over the world are regularly affected by disasters and emergencies. Besides official emergency services, ordinary citizens are getting increasingly involved in crisis response work. They are usually present on-site at the place of incident and use social media to share information about the event. For emergency services, the large amount of citizen-generated content in social media, however, means that finding high-quality information is similar to “finding a needle in a haystack”. This article presents an approach to how a dynamic and subjective quality assessment of citizen-generated content could support the work of emergency services. First, we present results of our empirical study concerning the usage of citizen-generated content by emergency services. Based on our literature review and empirical study, we derive design guidelines and describe a concept for dynamic quality measurement that is implemented as a service-oriented web-application “Social Haystack.” Finally, we outline findings of its evaluation and implications thereof.
@article{ludwigSocialHaystackDynamic2015,
title = {Social {Haystack}: {Dynamic} {Quality} {Assessment} of {Citizen}-{Generated} {Content} during {Emergencies}},
volume = {21},
url = {https://www.wineme.uni-siegen.de/paper/2015/2015_ludwigreuterpipek_socialhaystack_tochi.pdf},
doi = {10.1145/2749461},
abstract = {People all over the world are regularly affected by disasters and emergencies. Besides official emergency services, ordinary citizens are getting increasingly involved in crisis response work. They are usually present on-site at the place of incident and use social media to share information about the event. For emergency services, the large amount of citizen-generated content in social media, however, means that finding high-quality information is similar to “finding a needle in a haystack”. This article presents an approach to how a dynamic and subjective quality assessment of citizen-generated content could support the work of emergency services. First, we present results of our empirical study concerning the usage of citizen-generated content by emergency services. Based on our literature review and empirical study, we derive design guidelines and describe a concept for dynamic quality measurement that is implemented as a service-oriented web-application “Social Haystack.” Finally, we outline findings of its evaluation and implications thereof.},
number = {4},
journal = {ACM Transactions on Computer-Human Interaction (TOCHI)},
author = {Ludwig, Thomas and Reuter, Christian and Pipek, Volkmar},
year = {2015},
keywords = {Crisis, HCI, A-Paper, Ranking-ImpactFactor, SocialMedia, Ranking-WKWI-A, Ranking-CORE-A*, Projekt-EmerGent, Ranking-VHB-B},
pages = {Article 17},
}
[BibTeX] [Abstract] [Download PDF]
Emergencies are characterized by high complexity and unpredictability. In order to assess and manage them successfully, improvisation work and informal communication, even beyond local and organizational boundaries, is needed. Such informal practices can facilitate ad hoc participation of units in situation assessment, but this may lack overall situation awareness. This paper presents a study on how emergent ‘collaboration needs’ in current work of response teams, who are located on-site and in the control center, could be supported by mobile geo-collaboration systems. First, we present the results of an empirical study about informal work and mobile collaboration practices of emergency services. Then we describe the concept of a mobile geo-collaboration system that addresses the aspects detected in the empirical study and that was implemented as an Android application using web sockets, a technology enabling full-duplex ad hoc communication. Finally we outline the findings of its evaluation in practice and its implications.
@article{reuterAdHocParticipation2014,
title = {Ad {Hoc} {Participation} in {Situation} {Assessment}: {Supporting} {Mobile} {Collaboration} in {Emergencies}},
volume = {21},
url = {http://www.wineme.uni-siegen.de/paper/2014/2014_reuterludwigpipek_adhocparticipation_tochi.pdf},
doi = {10.1145/2651365},
abstract = {Emergencies are characterized by high complexity and unpredictability. In order to assess and manage them successfully, improvisation work and informal communication, even beyond local and organizational boundaries, is needed. Such informal practices can facilitate ad hoc participation of units in situation assessment, but this may lack overall situation awareness. This paper presents a study on how emergent ‘collaboration needs' in current work of response teams, who are located on-site and in the control center, could be supported by mobile geo-collaboration systems. First, we present the results of an empirical study about informal work and mobile collaboration practices of emergency services. Then we describe the concept of a mobile geo-collaboration system that addresses the aspects detected in the empirical study and that was implemented as an Android application using web sockets, a technology enabling full-duplex ad hoc communication. Finally we outline the findings of its evaluation in practice and its implications.},
number = {5},
journal = {ACM Transactions on Computer-Human Interaction (TOCHI)},
publisher = {ACM},
author = {Reuter, Christian and Ludwig, Thomas and Pipek, Volkmar},
month = nov,
year = {2014},
keywords = {Crisis, HCI, A-Paper, Ranking-ImpactFactor, UsableSec, Selected, Ranking-WKWI-A, AuswahlUsableSec, Ranking-CORE-A*, Projekt-InfoStrom, Ranking-VHB-B, Cooperation},
pages = {1--26},
}
[BibTeX] [Abstract] [Download PDF]
Improvisation is necessary when planned decision-making as the main managerial activity does not fit the conditions the practice provides. In these cases, information technology should not just automate planned and structured decisions, but support improvisational practice. In this contribution we present an empirical study about the improvisation work in scenarios of medium to large power outages in Germany. Our focus is on inter-organizational cooperation practices, thus we examined the cooperation of fire departments, police, public administration, electricity infrastructure operators and citizens. Our empirical material allows to describe reasons and conditions for improvisation. Our resulting recommendations address the support of aggregation and visualization of information, a necessary individualization of information compositions, options for collaborative situation assessment, requirements for informal and formal communication, and accessibility of information resources.
@inproceedings{leySupportingImprovisationWork2012,
address = {New York, USA},
title = {Supporting improvisation work in inter-organizational crisis management},
isbn = {978-1-4503-1015-4},
url = {http://www.peasec.de/paper/2012/2012_LeyPipekReuterWiedenhoefer_ImprovisationWork_CHI.pdf},
doi = {10.1145/2207676.2208617},
abstract = {Improvisation is necessary when planned decision-making as the main managerial activity does not fit the conditions the practice provides. In these cases, information technology should not just automate planned and structured decisions, but support improvisational practice. In this contribution we present an empirical study about the improvisation work in scenarios of medium to large power outages in Germany. Our focus is on inter-organizational cooperation practices, thus we examined the cooperation of fire departments, police, public administration, electricity infrastructure operators and citizens. Our empirical material allows to describe reasons and conditions for improvisation. Our resulting recommendations address the support of aggregation and visualization of information, a necessary individualization of information compositions, options for collaborative situation assessment, requirements for informal and formal communication, and accessibility of information resources.},
booktitle = {Proceedings of the {Conference} on {Human} {Factors} in {Computing} {Systems} ({CHI})},
publisher = {ACM Press},
author = {Ley, Benedikt and Pipek, Volkmar and Reuter, Christian and Wiedenhoefer, Torben},
year = {2012},
keywords = {Crisis, HCI, A-Paper, Ranking-WKWI-A, Ranking-CORE-A*, Projekt-InfoStrom, Cooperation, Projekt-RSBE},
pages = {1529},
}
CORE-A
[BibTeX]
@article{kaufholdHighAwarenessModerate2026,
title = {High {Awareness}, {Moderate} {Preparedness} and {Low} {Trust} in {Agencies}: {A} {Trend} {Study} on {Cybersecurity} {Behavior} and {Perceptions} of {German} {Citizens}},
language = {en},
number = {Accepted},
journal = {ACM Transactions on Privacy and Security (TOPS)},
author = {Kaufhold, Marc-André and Bäumler, Julian and Bajorski, Marius and Reuter, Christian},
year = {2026},
keywords = {HCI, A-Paper, Ranking-CORE-A, Projekt-ATHENE-CyAware, Security, UsableSec, Projekt-CYLENCE, Projekt-CYWARN},
}
[BibTeX] [Abstract]
Ensuring that privacy policies accurately reflect the real-world behavior of software systems is a complex socio-technical challenge. Despite the importance of privacy policies for user trust and regulatory compliance, prior research has paid limited attention to how software developers perceive their own activities in achieving alignment between privacy policies and actual software behavior and which organizational factors they identify as leading to misalignment. This perspective is particularly important because developers’ implementation practices directly shape how software handles personal data. To address this research gap, we conducted 15 semi-structured interviews with software developers directly involved in implementing privacy-relevant functionality. Our findings identify several alignment activities performed by developers and highlight symbolic compliance as an important organizational factor contributing to gaps between documented privacy commitments and actual software behavior. Our study offers implications for researchers investigating privacy challenges in software development and provides valuable insights for organizations and developers seeking to better align privacy policies with actual software behavior.
@article{riapriankasaha_lines_2026,
title = {From {Lines} of {Code} to {Lines} of {Policy}? {Exploring} {Software} {Developers}’ {Perceptions} of {Their} {Privacy} {Policy}-{Related} {Activities}},
abstract = {Ensuring that privacy policies accurately reflect the real-world behavior of software systems is a complex socio-technical challenge. Despite the importance of privacy policies for user trust and regulatory compliance, prior research has paid limited attention to how software developers perceive their own activities in achieving alignment between privacy policies and actual software behavior and which organizational factors they identify as leading to misalignment. This perspective is particularly important because developers’ implementation practices directly shape how software handles personal data. To address this research gap, we conducted 15 semi-structured interviews with software developers directly involved in implementing privacy-relevant functionality. Our findings identify several alignment activities performed by developers and highlight symbolic compliance as an important organizational factor contributing to gaps between documented privacy commitments and actual software behavior. Our study offers implications for researchers investigating privacy challenges in software development and provides valuable insights for organizations and developers seeking to better align privacy policies with actual software behavior.},
journal = {Proceedings on Privacy Enhancing Technologies Symposium},
author = {Saha, Ria Prianka and Stäcker, Daniel and Stromberg, Jonas and Steven Lamarr, Reynolds and Demuth, Kilian and Nelles, Frank and Reuter, Christian and Kohlhammer, Jörn and Benlian, Alexander},
year = {2026},
keywords = {HCI, Ranking-CORE-A, UsableSec, Projekt-ATHENE-PriVis},
}
[BibTeX] [Abstract] [Download PDF]
In conflict-ridden environments, timely and accurate information is critical for those dealing with the dynamic of events. When individuals have to flee, it becomes evident that refugees frequently rely on information and communication technologies (ICT) for information acquisition, travel coordination, and maintaining connections with related parties. Based on 17 interviews, this research explores how Ukrainian refugees, who sought protection in Germany due to the 2022 Russian full-scale invasion, use ICT before, during, and after their flight. By providing empirical findings, the results show in depth how contextual factors, such as infrastructural instability, privacy concerns and an advanced digitalization, interrelate with user behaviors. Analyzing the multifaceted civilian ICT use in the context of war and flight, this exploratory research contributes to the existing research on HCI in migration contexts and connects to several topics of CSCW. By contrasting case specifics, this work highlights what makes Ukraine a special case in this research area. Furthermore, this paper examines both existing and emerging affordances of ICT in the context of flight, and identifies the crucial role of messenger groups for information gathering in all phases of the flight. Lastly, collaborative dimensions of the identified affordances are discussed.
@article{steinbrinkSmartphoneICTUse2025,
title = {Smartphone and {ICT} {Use} {Among} {Ukrainian} {Refugees}: {Technology} {Support} during {War}, {Flight}, and {Adaptation} in {Germany}},
url = {https://www.peasec.de/paper/2025/2025_SteinbrinkGuntrumReuter_Ukraine_CSCW.pdf},
doi = {10.1145/3711067},
abstract = {In conflict-ridden environments, timely and accurate information is critical for those dealing with the dynamic of events. When individuals have to flee, it becomes evident that refugees frequently rely on information and communication technologies (ICT) for information acquisition, travel coordination, and maintaining connections with related parties. Based on 17 interviews, this research explores how Ukrainian refugees, who sought protection in Germany due to the 2022 Russian full-scale invasion, use ICT before, during, and after their flight. By providing empirical findings, the results show in depth how contextual factors, such as infrastructural instability, privacy concerns and an advanced digitalization, interrelate with user behaviors. Analyzing the multifaceted civilian ICT use in the context of war and flight, this exploratory research contributes to the existing research on HCI in migration contexts and connects to several topics of CSCW. By contrasting case specifics, this work highlights what makes Ukraine a special case in this research area. Furthermore, this paper examines both existing and emerging affordances of ICT in the context of flight, and identifies the crucial role of messenger groups for information gathering in all phases of the flight. Lastly, collaborative dimensions of the identified affordances are discussed.},
number = {CSCW},
journal = {Proceedings of the ACM: Human Computer Interaction (PACM): Computer-Supported Cooperative Work and Social Computing},
publisher = {Association for Computing Machinery},
author = {Steinbrink, Enno and Guntrum, Laura and Reuter, Christian},
year = {2025},
note = {Place: New York, NY, USA},
keywords = {Crisis, HCI, Projekt-TraCe, A-Paper, Ranking-CORE-A, UsableSec, Projekt-ATHENE, Projekt-GRKPrivacy},
}
[BibTeX] [Abstract]
The rise of fake news and misinformation in the digital age poses serious risks for individuals and society, particularly during crises like the Israel-Hamas war, the Russian-Ukraine war, or the COVID-19 pandemic. Misinformation serves as a tool to manipulate public opinion and create discord. Vulnerability to manipulation increases in online spaces during crises, where authoritative information is scarce. Emergency management, public health, political and public administration, as well as media professionals and citizens express concern and seek solutions to enhance information quality during such critical times. This article highlights user-centred approaches to countering fake news and misinformation, tracing their historical evolution from ancient Greece to the present, focussing on their relevance during the COVID-19 crisis and in contemporary information warfare. It describes the vulnerability of audiences to misinformation and outlines prevailing trends in user-centred countermeasures. This article also introduces recent research on the effectiveness of media literacy interventions on truth discernment, a cross-cultural comparison of the perception of negative consequences and the injunctive norm, a comparison of video and text to promote lateral reading in adolescents, content-specific indicators on Twitter from a user perspective, a learning system for detecting misinformation as well as ethical and security considerations in automated detection.
@book{reuterSpecialIssueCombating2025,
title = {Special {Issue} on {Combating} {Information} {Warfare}: {User}-{Centered} {Countermeasures} against {Fake} {News} and {Misinformation} - {Behaviour} \& {Information} {Technology} ({BIT})},
abstract = {The rise of fake news and misinformation in the digital age poses serious risks for individuals and society, particularly during crises like the Israel-Hamas war, the Russian-Ukraine war, or the COVID-19 pandemic. Misinformation serves as a tool to manipulate public opinion and create discord. Vulnerability to manipulation increases in online spaces during crises, where authoritative information is scarce. Emergency management, public health, political and public administration, as well as media professionals and citizens express concern and seek solutions to enhance information quality during such critical times. This article highlights user-centred approaches to countering fake news and misinformation, tracing their historical evolution from ancient Greece to the present, focussing on their relevance during the COVID-19 crisis and in contemporary information warfare. It describes the vulnerability of audiences to misinformation and outlines prevailing trends in user-centred countermeasures. This article also introduces recent research on the effectiveness of media literacy interventions on truth discernment, a cross-cultural comparison of the perception of negative consequences and the injunctive norm, a comparison of video and text to promote lateral reading in adolescents, content-specific indicators on Twitter from a user perspective, a learning system for detecting misinformation as well as ethical and security considerations in automated detection.},
publisher = {Taylor \& Francis},
author = {Reuter, Christian and Hughes, Amanda Lee and Buntain, Cody},
year = {2025},
note = {Publication Title: Behaviour \& Information Technology (BIT)},
keywords = {Crisis, HCI, Peace, A-Paper, Ranking-CORE-A, Ranking-ImpactFactor, SocialMedia},
}
[BibTeX] [Abstract] [Download PDF]
In Germany and other countries, specialized non-profit reporting centers combat online hate speech by submitting criminal content to law enforcement agencies, forwarding deletion requests to social media platforms, and providing counseling to victims, thus contributing to the governance mechanism of content moderation as intermediaries between victims and various organizations. Whereas research in computer-supported cooperative work has extensively explored collaboration of and automation for content moderators, there are no works that focus on reporting centers. Based on expert interviews with their staff (N=15), this study finds that most German centers share a collaborative workflow, of which multiple tasks are heavily dependent on inter-organizational exchange. However, there are differences in their implementation of monitoring, content assessment, automation technology adoption, and external collaborators. As the centers are faced with diverse challenges, such as borderline case assessment, psychological burdens, limited visibility, conflicting goals with other actors, and manual repetitive work, our study contributes with nine implications for designing and researching supportive technologies. They provide suggestions for improving hate speech gathering and reporting, researching hate speech prioritization and assessment algorithms, and designing case processing systems. Beyond that, we outline directions for research on inter-organizational collaboration.
@article{baumlerHarnessingInterOrganizationalCollaboration2025,
title = {Harnessing {Inter}-{Organizational} {Collaboration} and {Automation} to {Combat} {Online} {Hate} {Speech}: {A} {Qualitative} {Study} with {German} {Reporting} {Centers}},
url = {https://dl.acm.org/doi/10.1145/3710991},
doi = {10.1145/3710991},
abstract = {In Germany and other countries, specialized non-profit reporting centers combat online hate speech by submitting criminal content to law enforcement agencies, forwarding deletion requests to social media platforms, and providing counseling to victims, thus contributing to the governance mechanism of content moderation as intermediaries between victims and various organizations. Whereas research in computer-supported cooperative work has extensively explored collaboration of and automation for content moderators, there are no works that focus on reporting centers. Based on expert interviews with their staff (N=15), this study finds that most German centers share a collaborative workflow, of which multiple tasks are heavily dependent on inter-organizational exchange. However, there are differences in their implementation of monitoring, content assessment, automation technology adoption, and external collaborators. As the centers are faced with diverse challenges, such as borderline case assessment, psychological burdens, limited visibility, conflicting goals with other actors, and manual repetitive work, our study contributes with nine implications for designing and researching supportive technologies. They provide suggestions for improving hate speech gathering and reporting, researching hate speech prioritization and assessment algorithms, and designing case processing systems. Beyond that, we outline directions for research on inter-organizational collaboration.},
journal = {Proceedings of the ACM: Human Computer Interaction (PACM): Computer-Supported Cooperative Work and Social Computing},
author = {Bäumler, Julian and Riebe, Thea and Kaufhold, Marc-André and Reuter, Christian},
year = {2025},
keywords = {Crisis, HCI, A-Paper, Ranking-CORE-A, Projekt-CYLENCE, Projekt-CYWARN, AuswahlCrisis},
}
[BibTeX] [Abstract] [Download PDF]
The ongoing challenge of misinformation on social media motivates ongoing efforts to find effective countermeasures. In this study, we evaluated the potential of personalised nudging to reduce the sharing of misinformation on social media, as personalised support has been successfully applied in other areas of critical information handling. In an online experiment (N = 396) exposing users to social media posts, we assessed the degree of misinformation sharing between groups receiving (1) no nudges, (2) non-personalised nudges, and (3) personalised nudges. Personalisation was based on three psychometric dimensions – general decision-making style, consideration of future consequences, need for cognition – to assign the most appropriate nudge from a pool of five nudges. The results showed significant differences (p {\textless} .05) between all three groups, with the personalised nudge group sharing the least misinformation. Detailed analyses at the nudge level revealed that one nudge was universally effective and two nudges were effective only in their personalised form. The results generally confirm the potential of personalisation, although the effect is limited in scope. These findings shed light on the nuanced results of nudging studies, highlight the benefits of personalisation, and raise ethical considerations regarding the privacy implications of personalisation and those inherent in nudges.
@article{biselliMitigatingMisinformationSharing2025,
title = {Mitigating {Misinformation} {Sharing} on {Social} {Media} through {Personalised} {Nudging}},
volume = {9},
url = {https://www.peasec.de/paper/2025/2025_BiselliHartwigReuter_PersonalisedNudges_CSCW.pdf},
doi = {10.1145/3711034},
abstract = {The ongoing challenge of misinformation on social media motivates ongoing efforts to find effective countermeasures.
In this study, we evaluated the potential of personalised nudging to reduce the sharing of misinformation on social media, as personalised support has been successfully applied in other areas of critical information handling.
In an online experiment (N = 396) exposing users to social media posts, we assessed the degree of misinformation sharing between groups receiving (1) no nudges, (2) non-personalised nudges, and (3) personalised nudges. Personalisation was based on three psychometric dimensions - general decision-making style, consideration of future consequences, need for cognition - to assign the most appropriate nudge from a pool of five nudges.
The results showed significant differences (p {\textless} .05) between all three groups, with the personalised nudge group sharing the least misinformation. Detailed analyses at the nudge level revealed that one nudge was universally effective and two nudges were effective only in their personalised form.
The results generally confirm the potential of personalisation, although the effect is limited in scope.
These findings shed light on the nuanced results of nudging studies, highlight the benefits of personalisation, and raise ethical considerations regarding the privacy implications of personalisation and those inherent in nudges.},
number = {2},
journal = {Proceedings of the ACM: Human Computer Interaction (PACM): Computer-Supported Cooperative Work and Social Computing},
author = {Biselli, Tom and Hartwig, Katrin and Reuter, Christian},
year = {2025},
keywords = {Crisis, HCI, Projekt-NEBULA, A-Paper, Ranking-CORE-A, Projekt-ATHENE-PriVis},
}
[BibTeX] [Abstract] [Download PDF]
Misinformation through data visualisation is particularly dangerous because charts are often perceived as objective data representations. While past efforts to counter misinformation have focused on text and, to some extent, images and video, developing user-centred strategies to combat misleading charts remains an unresolved challenge. This study presents a conceptual approach through ChartChecker, a browser-plugin that aims to automatically extract line and bar chart data and detect potentially misleading features such as non-linear axis scales. A participatory design approach was used to develop a user-centred interface to provide transparent, comprehensible information about potentially misleading features in charts. Finally, a think-aloud study (N = 15) with ChartChecker revealed overall satisfaction with the tools’ user interface, comprehensibility, functionality, and usefulness. The results are discussed in terms of improving user engagement, increasing transparency and optimising tools designed to counter misleading information in charts, leading to overarching design implications for user-centred strategies for the visual domain.
@inproceedings{biselliChartCheckerUserCentredApproach2025,
series = {{DIS} '25},
title = {{ChartChecker}: {A} {User}-{Centred} {Approach} to {Support} the {Understanding} of {Misleading} {Charts}},
url = {https://www.peasec.de/paper/2025/2025_BiselliHartwigKneisslPouiliotReuter_ChartChecker_DIS.pdf},
doi = {10.1145/3715336.3735784},
abstract = {Misinformation through data visualisation is particularly dangerous because charts are often perceived as objective data representations. While past efforts to counter misinformation have focused on text and, to some extent, images and video, developing user-centred strategies to combat misleading charts remains an unresolved challenge.
This study presents a conceptual approach through ChartChecker, a browser-plugin that aims to automatically extract line and bar chart data and detect potentially misleading features such as non-linear axis scales. A participatory design approach was used to develop a user-centred interface to provide transparent, comprehensible information about potentially misleading features in charts. Finally, a think-aloud study (N = 15) with ChartChecker revealed overall satisfaction with the tools' user interface, comprehensibility, functionality, and usefulness. The results are discussed in terms of improving user engagement, increasing transparency and optimising tools designed to counter misleading information in charts, leading to overarching design implications for user-centred strategies for the visual domain.},
booktitle = {Proceedings of the {ACM} {Designing} {Interactive} {Systems} {Conference} ({DIS})},
publisher = {Association for Computing Machinery},
author = {Biselli, Tom and Hartwig, Katrin and Kneissl, Niklas and Pouliot, Louis and Reuter, Christian},
year = {2025},
keywords = {Crisis, HCI, Projekt-NEBULA, A-Paper, Ranking-CORE-A, Student, Projekt-ATHENE-PriVis},
}
[BibTeX] [Download PDF]
@article{gaballahItsNotMy2025,
title = {“{It}’s {Not} {My} {Data} {Anymore}”: {Exploring} {Non}-{Users}’ {Privacy} {Perceptions} of {Medical} {Data} {Donation} {Apps}},
issn = {2299-0984},
shorttitle = {“{It}’s {Not} {My} {Data} {Anymore}”},
url = {https://petsymposium.org/popets/2025/popets-2025-0035.php},
doi = {10.56553/popets-2025-0035},
urldate = {2026-02-05},
journal = {Proceedings on Privacy Enhancing Technologies},
author = {Gaballah, Sarah Abdelwahab and Abdullah, Lamya and Zimmer, Ephraim and Fahl, Sascha and Mühlhäuser, Max and Marky, Karola},
year = {2025},
keywords = {HCI, A-Paper, Ranking-CORE-A, Security, UsableSec, Projekt-ATHENE-PriVis},
}
[BibTeX] [Abstract] [Download PDF]
The rise of fake news and misinformation in the digital age poses serious risks for individuals and society, particularly during crises like the Israel-Hamas war, the Russian-Ukraine war, or the COVID-19 pandemic. Misinformation serves as a tool to manipulate public opinion and create discord. Vulnerability to manipulation increases in online spaces during crises, where authoritative information is scarce. Emergency management, public health, political and public administration, as well as media professionals and citizens express concern and seek solutions to enhance information quality during such critical times. This article highlights user-centred approaches to countering fake news and misinformation, tracing their historical evolution from ancient Greece to the present, focussing on their relevance during the COVID-19 crisis and in contemporary information warfare. It describes the vulnerability of audiences to misinformation and outlines prevailing trends in user-centred countermeasures. This article also introduces recent research on the effectiveness of media literacy interventions on truth discernment, a cross-cultural comparison of the perception of negative consequences and the injunctive norm, a comparison of video and text to promote lateral reading in adolescents, content-specific indicators on Twitter from a user perspective, a learning system for detecting misinformation as well as ethical and security considerations in automated detection.
@article{reuterCombatingInformationWarfare2025,
title = {Combating {Information} {Warfare}: {State} and {Trends} in {User}-{Centered} {Countermeasures} against {Fake} {News} and {Misinformation}},
volume = {44},
issn = {0144-929X},
url = {https://doi.org/10.1080/0144929X.2024.2442486},
doi = {10.1080/0144929X.2024.2442486},
abstract = {The rise of fake news and misinformation in the digital age poses serious risks for individuals and society, particularly during crises like the Israel-Hamas war, the Russian-Ukraine war, or the COVID-19 pandemic. Misinformation serves as a tool to manipulate public opinion and create discord. Vulnerability to manipulation increases in online spaces during crises, where authoritative information is scarce. Emergency management, public health, political and public administration, as well as media professionals and citizens express concern and seek solutions to enhance information quality during such critical times. This article highlights user-centred approaches to countering fake news and misinformation, tracing their historical evolution from ancient Greece to the present, focussing on their relevance during the COVID-19 crisis and in contemporary information warfare. It describes the vulnerability of audiences to misinformation and outlines prevailing trends in user-centred countermeasures. This article also introduces recent research on the effectiveness of media literacy interventions on truth discernment, a cross-cultural comparison of the perception of negative consequences and the injunctive norm, a comparison of video and text to promote lateral reading in adolescents, content-specific indicators on Twitter from a user perspective, a learning system for detecting misinformation as well as ethical and security considerations in automated detection.},
number = {13},
journal = {Behaviour \& Information Technology (BIT)},
author = {Reuter, Christian and Hughes, Amanda Lee and Buntain, Cody},
year = {2024},
keywords = {Crisis, HCI, Peace, Projekt-NEBULA, A-Paper, Ranking-CORE-A, Ranking-ImpactFactor, SocialMedia},
pages = {3348--3361},
}
[BibTeX] [Abstract] [Download PDF]
In many applications and websites people use in their everyday life, their privacy and data is threatened, e.g., by script tracking during browsing. Although researchers and companies have developed privacy-enhancing technologies (PETs), they are often difficult to use for lay users. In this paper, we conducted a literature review to classify users into different support personas based on their privacy competence and privacy concern. With developers of PETs in mind, support personas were envisioned to facilitate the customization of software according to the support needs of different users. In order to demonstrate the usefulness of support personas and based on workshop sessions with 15 participants, we designed a browser extension which supports users with the issue of script tracking by providing different user interfaces for different support personas. The following qualitative evaluation with 31 participants showed that the developed UI elements worked as intended for the different support personas. Therefore, we conclude the concept of support personas is useful in the development process of usable applications that enhance the privacy of the users while also educating them and thus potentially increasing their privacy literacy.
@article{demuthSupportPersonasConcept2024,
title = {Support {Personas}: {A} {Concept} for {Tailored} {Support} of {Users} of {Privacy}-{Enhancing} {Technologies}},
issn = {2299-0984},
url = {https://petsymposium.org/popets/2024/popets-2024-0142.pdf},
doi = {10.56553/popets-2024-0142},
abstract = {In many applications and websites people use in their everyday life, their privacy and data is threatened, e.g., by script tracking during browsing. Although researchers and companies have developed privacy-enhancing technologies (PETs), they are often difficult to use for lay users. In this paper, we conducted a literature review to classify users into different support personas based on their privacy competence and privacy concern. With developers of PETs in mind, support personas were envisioned to facilitate the customization of software according to the support needs of different users. In order to demonstrate the usefulness of support personas and based on workshop sessions with 15 participants, we designed a browser extension which supports users with the issue of script tracking by providing different user interfaces for different support personas. The following qualitative evaluation with 31 participants showed that the developed UI elements worked as intended for the different support personas. Therefore, we conclude the concept of support personas is useful in the development process of usable applications that enhance the privacy of the users while also educating them and thus potentially increasing their privacy literacy.},
number = {4},
journal = {Proceedings on Privacy Enhancing Technologies (PoPETs)},
author = {Demuth, Kilian and Linsner, Sebastian and Biselli, Tom and Kaufhold, Marc-André and Reuter, Christian},
year = {2024},
keywords = {HCI, A-Paper, Ranking-CORE-A, Security, UsableSec, Projekt-ATHENE-PriVis, Projekt-CROSSING},
pages = {797--817},
}
[BibTeX] [Abstract] [Download PDF]
Securely exchanging contact information is essential for establishing trustworthy communication channels that facilitate effective online collaboration. However, current methods are neither user-friendly nor scalable for large groups of users. In response, we introduce PairSonic, a novel group pairing protocol that extends trust from physical encounters to online communication. PairSonic simplifies the pairing process by automating the tedious verification tasks of previous methods through an acoustic out-of-band channel using smartphones’ built-in hardware. Our protocol not only facilitates connecting users for computer-supported collaboration, but also provides a more user-friendly and scalable solution to the authentication ceremonies currently used in end-to-end encrypted messengers like Signal or WhatsApp. PairSonic is available as open-source software: https://github.com/seemoo-lab/pairsonic
@inproceedings{putzPairSonicHelpingGroups2024,
title = {{PairSonic}: {Helping} {Groups} {Securely} {Exchange} {Contact} {Information}},
url = {https://peasec.de/paper/2024/2024_PutzHaeslerVölklGehringRollshausenHollick_PairSonic_CSCW.pdf},
doi = {10.1145/3678884.3681818},
abstract = {Securely exchanging contact information is essential for establishing trustworthy communication channels that facilitate effective online collaboration. However, current methods are neither user-friendly nor scalable for large groups of users. In response, we introduce PairSonic, a novel group pairing protocol that extends trust from physical encounters to online communication. PairSonic simplifies the pairing process by automating the tedious verification tasks of previous methods through an acoustic out-of-band channel using smartphones' built-in hardware. Our protocol not only facilitates connecting users for computer-supported collaboration, but also provides a more user-friendly and scalable solution to the authentication ceremonies currently used in end-to-end encrypted messengers like Signal or WhatsApp. PairSonic is available as open-source software: https://github.com/seemoo-lab/pairsonic},
booktitle = {{CSCW} '24 {Companion}: {Conference} {Companion} {Publication} of the 2024 on {Computer} {Supported} {Cooperative} {Work} and {Social} {Computing}},
author = {Putz, Florentin and Haesler, Steffen and Völkl, Thomas and Gehring, Maximilian and Rollshausen, Nils and Hollick, Matthias},
year = {2024},
note = {Place: San Jose, Costa Rica},
keywords = {HCI, Projekt-emergenCITY, Ranking-CORE-A, Security, UsableSec},
}
[BibTeX] [Abstract] [Download PDF]
Trustworthy digital communication requires the secure exchange of contact information, but current approaches lack usability and scalability for larger groups of users. We evaluate the usability of two secure contact exchange systems: the current state of the art, SafeSlinger, and our newly designed protocol, PairSonic, which extends trust from physical encounters to spontaneous online communication. Our lab study (N=45) demonstrates PairSonic’s superior usability, automating the tedious verification tasks from previous approaches via an acoustic out-of-band channel. Although participants significantly preferred our system, minimizing user effort surprisingly decreased the perceived security for some users, who associated security with complexity. We discuss user perceptions of the different protocol components and identify remaining usability barriers for CSCW application scenarios.
@article{putzSoundsGoodFast2024,
title = {Sounds {Good}? {Fast} and {Secure} {Contact} {Exchange} in {Groups}},
volume = {8},
url = {https://peasec.de/paper/2024/2024_PutzHaeslerHollick_GroupPairing_CSCW},
doi = {10.1145/3686964},
abstract = {Trustworthy digital communication requires the secure exchange of contact information, but current approaches lack usability and scalability for larger groups of users. We evaluate the usability of two secure contact exchange systems: the current state of the art, SafeSlinger, and our newly designed protocol, PairSonic, which extends trust from physical encounters to spontaneous online communication. Our lab study (N=45) demonstrates PairSonic's superior usability, automating the tedious verification tasks from previous approaches via an acoustic out-of-band channel. Although participants significantly preferred our system, minimizing user effort surprisingly decreased the perceived security for some users, who associated security with complexity. We discuss user perceptions of the different protocol components and identify remaining usability barriers for CSCW application scenarios.},
number = {CSCW2},
journal = {Proceedings of the ACM: Human Computer Interaction (PACM): Computer-Supported Cooperative Work and Social Computing (Best Paper Award)},
author = {Putz, Florentin and Haesler, Steffen and Hollick, Matthias},
year = {2024},
keywords = {HCI, Projekt-emergenCITY, A-Paper, Ranking-CORE-A, Security, UsableSec},
}
[BibTeX] [Abstract] [Download PDF]
In today’s world, cyber-attacks are becoming more frequent and thus proactive protection against them is becoming more important. Cyber Threat Intelligence (CTI) is a possible solution, as it collects threat information in various information sources and derives stakeholder intelligence to protect one’s infrastructure. The current focus of CTI in research is the clear web, but the dark web may contain further information. To further advance protection, this work analyzes the dark web as Open Source Intelligence (OSINT) data source to complement current CTI information. The underlying assumption is that hackers use the dark web to exchange, develop, and share information and assets. This work aims to understand the structure of the dark web and identify the amount of its openly available CTI related information. We conducted a comprehensive literature review for dark web research and CTI. To follow this up we manually investigated and analyzed 65 dark web forum (DWF), 7 single-vendor shops, and 72 dark web marketplace (DWM). We documented the content and relevance of DWFs and DWMs for CTI, as well as challenges during the extraction and provide mitigations. During our investigation we identified IT security relevant information in both DWFs and DWMs, ranging from malware toolboxes to hacking-as-a-service. One of the most present challenges during our manual analysis were necessary interactions to access information and anti-crawling measures, i.e., CAPTCHAs. This analysis showed 88\% of marketplaces and 53\% of forums contained relevant data. Our complementary semi-automated analysis of 1,186,906 onion addresses indicates, that the necessary interaction makes it difficult to see the dark web as an open, but rather treat it as specialized information source, when clear web information does not suffice.
@article{kuehnNavigatingShadowsManual2024,
title = {Navigating the {Shadows}: {Manual} and {Semi}-{Automated} {Evaluation} of the {Dark} {Web} for {Cyber} {Threat} {Intelligence}},
volume = {12},
issn = {2169-3536},
shorttitle = {Navigating the {Shadows}},
url = {https://ieeexplore.ieee.org/document/10643518},
doi = {10.1109/ACCESS.2024.3448247},
abstract = {In today’s world, cyber-attacks are becoming more frequent and thus proactive protection against them is becoming more important. Cyber Threat Intelligence (CTI) is a possible solution, as it collects threat information in various information sources and derives stakeholder intelligence to protect one’s infrastructure. The current focus of CTI in research is the clear web, but the dark web may contain further information. To further advance protection, this work analyzes the dark web as Open Source Intelligence (OSINT) data source to complement current CTI information. The underlying assumption is that hackers use the dark web to exchange, develop, and share information and assets. This work aims to understand the structure of the dark web and identify the amount of its openly available CTI related information. We conducted a comprehensive literature review for dark web research and CTI. To follow this up we manually investigated and analyzed 65 dark web forum (DWF), 7 single-vendor shops, and 72 dark web marketplace (DWM). We documented the content and relevance of DWFs and DWMs for CTI, as well as challenges during the extraction and provide mitigations. During our investigation we identified IT security relevant information in both DWFs and DWMs, ranging from malware toolboxes to hacking-as-a-service. One of the most present challenges during our manual analysis were necessary interactions to access information and anti-crawling measures, i.e., CAPTCHAs. This analysis showed 88\% of marketplaces and 53\% of forums contained relevant data. Our complementary semi-automated analysis of 1,186,906 onion addresses indicates, that the necessary interaction makes it difficult to see the dark web as an open, but rather treat it as specialized information source, when clear web information does not suffice.},
journal = {IEEE Access},
author = {Kuehn, Philipp and Wittorf, Kyra and Reuter, Christian},
year = {2024},
keywords = {Ranking-CORE-A, Ranking-ImpactFactor, Student, Security, UsableSec, Projekt-ATHENE-SecUrban, Projekt-CYWARN},
pages = {118903--118922},
}
[BibTeX] [Abstract] [Download PDF]
In many scenarios users have to communicate sensitive data with third parties such as doctors, lawyers, insurance companies, social workers or online shops. Handing over personal data is necessary to use those services but the delegation of tasks to increase efficiency still poses the risk that personal data might be leaked. To minimize this risk and further enhance the privacy of users, we propose an interaction concept that uses layered encryption of messages to provide a trade-off between privacy and usability. Users can choose which data is additionally encrypted in an inner layer, say, for the eyes of their doctor only, and which data is available in an outer (encrypted or unencrypted) layer for all staff members. Another benefit is the hiding of sensitive data from package inspection or crawling algorithms over emails, while less critical parts can still be processed by these systems via the partial access. To investigate this concept, we derive relevant use cases for form-based communication over email from a quantitative pre-study with 1011 participants, showing that general practitioners are the most suitable use case. We developed demonstrators for this use case and evaluated them in a qualitative study with 42 participants. Our results show that the possibility of minimizing the propagation of sensitive data through additional encryption is highly appreciated and the usage of form-based communication is a promising approach for the digital transformation.
@article{linsnerDecisionbasedDataDistribution2024,
title = {Decision-based {Data} {Distribution} ({D}³): {Enabling} {Users} to {Minimize} {Data} {Propagation} in {Privacy}-sensitive {Scenarios}},
issn = {2299-0984},
url = {https://petsymposium.org/popets/2024/popets-2024-0113.php},
doi = {10.56553/popets-2024-0113},
abstract = {In many scenarios users have to communicate sensitive data with third parties such as doctors, lawyers, insurance companies, social workers or online shops. Handing over personal data is necessary to use those services but the delegation of tasks to increase efficiency still poses the risk that personal data might be leaked. To minimize this risk and further enhance the privacy of users, we propose an interaction concept that uses layered encryption of messages to provide a trade-off between privacy and usability. Users can choose which data is additionally encrypted in an inner layer, say, for the eyes of their doctor only, and which data is available in an outer (encrypted or unencrypted) layer for all staff members. Another benefit is the hiding of sensitive data from package inspection or crawling algorithms over emails, while less critical parts can still be processed by these systems via the partial access. To investigate this concept, we derive relevant use cases for form-based communication over email from a quantitative pre-study with 1011 participants, showing that general practitioners are the most suitable use case. We developed demonstrators for this use case and evaluated them in a qualitative study with 42 participants. Our results show that the possibility of minimizing the propagation of sensitive data through additional encryption is highly appreciated and the usage of form-based communication is a promising approach for the digital transformation.},
number = {4},
journal = {Proceedings on Privacy Enhancing Technologies (PoPETs)},
author = {Linsner, Sebastian and Demuth, Kilian and Fischlin, Marc and Reuter, Christian},
year = {2024},
keywords = {HCI, A-Paper, Ranking-CORE-A, Security, UsableSec, Projekt-ATHENE-PriVis, Projekt-CROSSING, Selected},
}
[BibTeX] [Abstract] [Download PDF]
The field of cybersecurity is evolving fast. Security professionals are in need of intelligence on past, current and – ideally – on upcoming threats, because attacks are becoming more advanced and are increasingly targeting larger and more complex systems. Since the processing and analysis of such large amounts of information cannot be addressed manually, cybersecurity experts rely on machine learning techniques. In the textual domain, pre-trained language models like BERT have proven to be helpful as they provide a good baseline for further fine-tuning. However, due to the domain-knowledge and the many technical terms in cybersecurity, general language models might miss the gist of textual information. For this reason, we create a high-quality dataset and present a language model specifically tailored to the cybersecurity domain which can serve as a basic building block for cybersecurity systems. The model is compared on 15 tasks: Domain-dependent extrinsic tasks for measuring the performance on specific problems, intrinsic tasks for measuring the performance of the internal representations of the model as well as general tasks from the SuperGLUE benchmark. The results of the intrinsic tasks show that our model improves the internal representation space of domain words compared to the other models. The extrinsic, domain-dependent tasks, consisting of sequence tagging and classification, show that the model performs best in cybersecurity scenarios. In addition, we pay special attention to the choice of hyperparameters against catastrophic forgetting, as pre-trained models tend to forget the original knowledge during further training.
@article{bayerCySecBERTDomainAdaptedLanguage2024,
title = {{CySecBERT}: {A} {Domain}-{Adapted} {Language} {Model} for the {Cybersecurity} {Domain}},
volume = {27},
issn = {2471-2566},
url = {https://peasec.de/paper/2024/2024_BayerKuehnShanesazReuter_CySecBERT_TOPS.pdf},
doi = {10.1145/3652594},
abstract = {The field of cybersecurity is evolving fast. Security professionals are in need of intelligence on past, current and - ideally - on upcoming threats, because attacks are becoming more advanced and are increasingly targeting larger and more complex systems. Since the processing and analysis of such large amounts of information cannot be addressed manually, cybersecurity experts rely on machine learning techniques. In the textual domain, pre-trained language models like BERT have proven to be helpful as they provide a good baseline for further fine-tuning. However, due to the domain-knowledge and the many technical terms in cybersecurity, general language models might miss the gist of textual information. For this reason, we create a high-quality dataset and present a language model specifically tailored to the cybersecurity domain which can serve as a basic building block for cybersecurity systems. The model is compared on 15 tasks: Domain-dependent extrinsic tasks for measuring the performance on specific problems, intrinsic tasks for measuring the performance of the internal representations of the model as well as general tasks from the SuperGLUE benchmark. The results of the intrinsic tasks show that our model improves the internal representation space of domain words compared to the other models. The extrinsic, domain-dependent tasks, consisting of sequence tagging and classification, show that the model performs best in cybersecurity scenarios. In addition, we pay special attention to the choice of hyperparameters against catastrophic forgetting, as pre-trained models tend to forget the original knowledge during further training.},
number = {2},
journal = {ACM Transactions on Privacy and Security (TOPS)},
publisher = {Association for Computing Machinery},
author = {Bayer, Markus and Kuehn, Philipp and Shanehsaz, Ramin and Reuter, Christian},
month = apr,
year = {2024},
note = {Place: New York, NY, USA},
keywords = {A-Paper, Ranking-CORE-A, Ranking-ImpactFactor, Projekt-ATHENE-CyAware, Student, Security, UsableSec, Projekt-CYLENCE, Projekt-CYWARN},
}
[BibTeX] [Abstract] [Download PDF]
Adversarial examples, capable of misleading machine learning models into making erroneous predictions, pose significant risks in safety-critical domains such as crisis informatics, medicine, and autonomous driving. To counter this, we introduce a novel textual adversarial example method that identifies falsely learned word indicators by leveraging explainable AI methods as importance functions on incorrectly predicted instances, thus revealing and understanding the weaknesses of a model. Coupled with adversarial training, this approach guides models to adopt complex decision rules when necessary and simpler ones otherwise, enhancing their robustness. To evaluate the effectiveness of our approach, we conduct a human and a transfer evaluation and propose a novel adversarial training evaluation setting for better robustness assessment. While outperforming current adversarial example and training methods, the results also show our method’s potential in facilitating the development of more resilient transformer models by detecting and rectifying biases and patterns in training data, showing baseline improvements of up to 23 percentage points in accuracy on adversarial tasks. The code of our approach is freely available for further exploration and use.
@inproceedings{bayerXAIAttackUtilizingExplainable2024,
address = {Torino, Italia},
title = {{XAI}-{Attack}: {Utilizing} {Explainable} {AI} to {Find} {Incorrectly} {Learned} {Patterns} for {Black}-{Box} {Adversarial} {Example} {Creation}},
url = {https://aclanthology.org/2024.lrec-main.1542.pdf},
abstract = {Adversarial examples, capable of misleading machine learning models into making erroneous predictions, pose significant risks in safety-critical domains such as crisis informatics, medicine, and autonomous driving. To counter this, we introduce a novel textual adversarial example method that identifies falsely learned word indicators by leveraging explainable AI methods as importance functions on incorrectly predicted instances, thus revealing and understanding the weaknesses of a model. Coupled with adversarial training, this approach guides models to adopt complex decision rules when necessary and simpler ones otherwise, enhancing their robustness. To evaluate the effectiveness of our approach, we conduct a human and a transfer evaluation and propose a novel adversarial training evaluation setting for better robustness assessment. While outperforming current adversarial example and training methods, the results also show our method's potential in facilitating the development of more resilient transformer models by detecting and rectifying biases and patterns in training data, showing baseline improvements of up to 23 percentage points in accuracy on adversarial tasks. The code of our approach is freely available for further exploration and use.},
booktitle = {Proceedings of the 2024 {Joint} {International} {Conference} on {Computational} {Linguistics}, {Language} {Resources} and {Evaluation} ({LREC}-{COLING})},
publisher = {ELRA and ICCL},
author = {Bayer, Markus and Neiczer, Markus and Samsinger, Maximilian and Buchhold, Björn and Reuter, Christian},
month = may,
year = {2024},
keywords = {Ranking-CORE-A, Projekt-ATHENE-CyAware, Security, UsableSec, Projekt-CYLENCE},
pages = {17725--17738},
}
[BibTeX] [Abstract] [Download PDF]
Recent crises like the COVID-19 pandemic provoked an increasing appearance of misleading information, emphasizing the need for effective user-centered countermeasures as an important field in HCI research. This work investigates how content-specific user-centered indicators can contribute to an informed approach to misleading information. In a threefold study, we conducted an in-depth content analysis of 2,382 German tweets on Twitter (now X) to identify topical (e.g., 5G), formal (e.g., links), and rhetorical (e.g., sarcasm) characteristics through manual coding, followed by a qualitative online survey to evaluate which indicators users already use autonomously to assess a tweet’s credibility. Subsequently, in a think-aloud study participants qualitatively evaluated the identified indicators in terms of perceived comprehensibility and usefulness. While a number of indicators were found to be particularly comprehensible and useful (e.g., claim for absolute truth and rhetorical questions), our findings reveal limitations of indicator-based interventions, particularly for people with entrenched conspiracy theory views. We derive four implications for digitally supporting users in dealing with misleading information, especially during crises.
@article{hartwigMisleadingInformationCrises2024,
title = {Misleading {Information} in {Crises}: {Exploring} {Content}-specific {Indicators} on {Twitter} from a {User} {Perspective}},
issn = {0144-929X},
url = {https://doi.org/10.1080/0144929X.2024.2373166},
doi = {10.1080/0144929X.2024.2373166},
abstract = {Recent crises like the COVID-19 pandemic provoked an increasing appearance of misleading information,
emphasizing the need for effective user-centered countermeasures as an important field in HCI research. This
work investigates how content-specific user-centered indicators can contribute to an informed approach to
misleading information. In a threefold study, we conducted an in-depth content analysis of 2,382 German
tweets on Twitter (now X) to identify topical (e.g., 5G), formal (e.g., links), and rhetorical (e.g., sarcasm)
characteristics through manual coding, followed by a qualitative online survey to evaluate which indicators
users already use autonomously to assess a tweet’s credibility. Subsequently, in a think-aloud study participants
qualitatively evaluated the identified indicators in terms of perceived comprehensibility and usefulness. While
a number of indicators were found to be particularly comprehensible and useful (e.g., claim for absolute truth
and rhetorical questions), our findings reveal limitations of indicator-based interventions, particularly for
people with entrenched conspiracy theory views. We derive four implications for digitally supporting users in
dealing with misleading information, especially during crises.},
journal = {Behaviour \& Information Technology (BIT)},
author = {Hartwig, Katrin and Schmid, Stefka and Biselli, Tom and Pleil, Helene and Reuter, Christian},
year = {2024},
keywords = {Crisis, HCI, Projekt-NEBULA, A-Paper, Ranking-CORE-A, Ranking-ImpactFactor, Projekt-ATHENE-PriVis},
pages = {1--34},
}
[BibTeX] [Abstract] [Download PDF]
Browser cookies, especially those from third parties, pose a threat to individual privacy. While it is possible in principle to control the number of cookies accepted, this choice is often neither usable nor truly informed. To address this issue, this study used semi-structured interviews (N=19) to identify attitudes and user requirements to develop an alternative personalised cookie banner, which was evaluated in an online experiment (N=157). The cookie banner explanations were tailored to the privacy knowledge of three groups of users: low, medium and high. The online experiment measured cookie choices and perceived usability of the cookie banner across three groups: an experimental group that viewed the novel cookie banner with personalisation (personalised privacy assistant), a control group that viewed the novel cookie banner without personalisation (privacy assistant) and a control group that viewed the standard cookie banner provided by the website. The results indicate that the novel cookie banner (with or without personalisation) generally resulted in significantly fewer accepted cookies and increased usability compared to the standard cookie window. In addition, the personalised cookie banner resulted in significantly fewer accepted cookies and higher usability than the non-personalised cookie banner. These results suggest that tailoring cookie banners to users’ privacy knowledge can be an effective approach to empowering users to make informed choices and better protect their privacy.
@article{biselliSupportingInformedChoices2024,
title = {Supporting {Informed} {Choices} about {Browser} {Cookies}: {The} {Impact} of {Personalised} {Cookie} {Banners}},
url = {https://petsymposium.org/popets/2024/popets-2024-0011.pdf},
doi = {10.56553/popets-2024-0011},
abstract = {Browser cookies, especially those from third parties, pose a threat to individual privacy. While it is possible in principle to control the number of cookies accepted, this choice is often neither usable nor truly informed. To address this issue, this study used semi-structured interviews (N=19) to identify attitudes and user requirements to develop an alternative personalised cookie banner, which was evaluated in an online experiment (N=157). The cookie banner explanations were tailored to the privacy knowledge of three groups of users: low, medium and high. The online experiment measured cookie choices and perceived usability of the cookie banner across three groups: an experimental group that viewed the novel cookie banner with personalisation (personalised privacy assistant), a control group that viewed the novel cookie banner without personalisation (privacy assistant) and a control group that viewed the standard cookie banner provided by the website. The results indicate that the novel cookie banner (with or without personalisation) generally resulted in significantly fewer accepted cookies and increased usability compared to the standard cookie window. In addition, the personalised cookie banner resulted in significantly fewer accepted cookies and higher usability than the non-personalised cookie banner. These results suggest that tailoring cookie banners to users' privacy knowledge can be an effective approach to empowering users to make informed choices and better protect their privacy.},
number = {1},
journal = {Proceedings on Privacy Enhancing Technologies (PoPETs)},
author = {Biselli, Tom and Utz, Laura and Reuter, Christian},
year = {2024},
keywords = {HCI, A-Paper, Ranking-CORE-A, Student, Security, UsableSec, Projekt-ATHENE-PriVis, Projekt-CROSSING, Selected, AuswahlUsableSec},
pages = {171--191},
}
[BibTeX] [Abstract] [Download PDF]
Farm Management Information Systems (FMIS) are an important core component of modern farming companies as they allow, e.g., to document activities, create fertilization plans, and feed digital equipment with required data. Since the entire agricultural sector is an essential component of food production, high standards of resilience should be established in the involved companies. Accordingly, the used software should also be designed with high standards on reliability and crisis capability. Based on a literature review, we found that software for farmers with certain resilience needs is lacking. Thus, we designed and evaluated a new FMIS concept with the user-centered design method. By conducting focus groups (two rounds, total N=57) in 2017 and 2019, we raised specific front-end and back-end requirements of farmers. Based on the requirements, we developed our concept for both front- and back-end in terms of a decentralized and offline-working FMIS. Through the evaluation with practitioners (N=16) of the implemented concept, we derived findings and implications, highlighting the need for privacy, stability, and offline-capability, as well as the UI-requirement to be supportive, e.g., with easy to understand icons and terms.
@article{kuntkeGeoBoxDesignEvaluation2023,
title = {{GeoBox}: {Design} and {Evaluation} of a {Tool} for {Resilient} and {Decentralized} {Data} {Management} in {Agriculture}},
volume = {43},
issn = {0144-929X},
url = {https://peasec.de/paper/2023/2023_KuntkeKaufholdLinsnerReuter_GeoBox_BIT.pdf},
doi = {10.1080/0144929X.2023.2185747},
abstract = {Farm Management Information Systems (FMIS) are an important core component of modern farming companies as they allow, e.g., to document activities, create fertilization plans, and feed digital equipment with required data. Since the entire agricultural sector is an essential component of food production, high standards of resilience should be established in the involved companies. Accordingly, the used software should also be designed with high standards on reliability and crisis capability. Based on a literature review, we found that software for farmers with certain resilience needs is lacking. Thus, we designed and evaluated a new FMIS concept with the user-centered design method. By conducting focus groups (two rounds, total N=57) in 2017 and 2019, we raised specific front-end and back-end requirements of farmers. Based on the requirements, we developed our concept for both front- and back-end in terms of a decentralized and offline-working FMIS. Through the evaluation with practitioners (N=16) of the implemented concept, we derived findings and implications, highlighting the need for privacy, stability, and offline-capability, as well as the UI-requirement to be supportive, e.g., with easy to understand icons and terms.},
number = {4},
journal = {Behaviour \& Information Technology (BIT)},
publisher = {Taylor \& Francis},
author = {Kuntke, Franz and Kaufhold, Marc-André and Linsner, Sebastian and Reuter, Christian},
year = {2023},
keywords = {A-Paper, Ranking-CORE-A, Ranking-ImpactFactor, Security, UsableSec, Projekt-AgriRegio, Projekt-GeoBox, Selected, AuswahlUsableSec},
pages = {764--786},
}
[BibTeX] [Abstract] [Download PDF]
The use of Open Source Intelligence (OSINT) to monitor and detect cybersecurity threats is gaining popularity among Cybersecurity Emergency or Incident Response Teams (CERTs/CSIRTs). They increasingly use semi-automated OSINT approaches when monitoring cyber threats for public infrastructure services and incident response. Most of the systems use publicly available data, often focusing on social media due to timely data for situational assessment. As indirect and affected stakeholders, the acceptance of OSINT systems by users, as well as the conditions which influence the acceptance, are relevant for the development of OSINT systems for cybersecurity. Therefore, as part of the ethical and social technology assessment, we conducted a survey (N=1,093), in which we asked participants about their acceptance of OSINT systems, their perceived need for open source surveillance, as well as their privacy behavior and concerns. Further, we tested if the awareness of OSINT is an interactive factor that affects other factors. Our results indicate that cyber threat perception and the perceived need for OSINT are positively related to acceptance, while privacy concerns are negatively related. The awareness of OSINT, however, has only shown effects on people with higher privacy concerns. Here, particularly high OSINT awareness and limited privacy concerns were associated with higher OSINT acceptance. Lastly, we provide implications for further research and the use of OSINT systems for cybersecurity by authorities. As OSINT is a framework rather than a single technology, approaches can be selected and combined to adhere to data minimization and anonymization as well as to leverage improvements in privacy-preserving computation and machine learning innovations. Regarding the use of OSINT, the results suggest to favor approaches that provide transparency to users regarding the use of the systems and the data they gather.
@article{riebePrivacyConcernsAcceptance2023,
title = {Privacy {Concerns} and {Acceptance} {Factors} of {OSINT} for {Cybersecurity}: {A} {Representative} {Survey}},
url = {https://petsymposium.org/popets/2023/popets-2023-0028.pdf},
doi = {10.56553/popets-2023-0028},
abstract = {The use of Open Source Intelligence (OSINT) to monitor and detect cybersecurity threats is gaining popularity among Cybersecurity Emergency or Incident Response Teams (CERTs/CSIRTs). They increasingly use semi-automated OSINT approaches when monitoring cyber threats for public infrastructure services and incident response. Most of the systems use publicly available data, often focusing on social media due to timely data for situational assessment. As indirect and affected stakeholders, the acceptance of OSINT systems by users, as well as the conditions which influence the acceptance, are relevant for the development of OSINT systems for cybersecurity. Therefore, as part of the ethical and social technology assessment, we conducted a survey (N=1,093), in which we asked participants about their acceptance of OSINT systems, their perceived need for open source surveillance, as well as their privacy behavior and concerns. Further, we tested if the awareness of OSINT is an interactive factor that affects other factors. Our results indicate that cyber threat perception and the perceived need for OSINT are positively related to acceptance, while privacy concerns are negatively related. The awareness of OSINT, however, has only shown effects on people with higher privacy concerns. Here, particularly high OSINT awareness and limited privacy concerns were associated with higher OSINT acceptance. Lastly, we provide implications for further research and the use of OSINT systems for cybersecurity by authorities. As OSINT is a framework rather than a single technology, approaches can be selected and combined to adhere to data minimization and anonymization as well as to leverage improvements in privacy-preserving computation and machine learning innovations. Regarding the use of OSINT, the results suggest to favor approaches that provide transparency to users regarding the use of the systems and the data they gather.},
number = {1},
journal = {Proceedings on Privacy Enhancing Technologies (PoPETs)},
author = {Riebe, Thea and Biselli, Tom and Kaufhold, Marc-André and Reuter, Christian},
year = {2023},
keywords = {HCI, A-Paper, Ranking-CORE-A, Security, UsableSec, Projekt-CYWARN, Projekt-ATHENE-FANCY, AuswahlUsableSec},
pages = {477--493},
}
[BibTeX] [Abstract] [Download PDF]
About half a billion households are expected to use smart home systems by 2025. Although many IoT sensors, such as smoke detectors or security cameras, are available and governmental crisis warning systems are in place, little is known about how to warn appropriately in smart home environments. We created a Raspberry Pi based prototype with a speaker, a display, and a connected smart light bulb. Together with a focus group, we developed a taxonomy for warning messages in smart home environments, dividing them into five classes with different stimuli. We evaluated the taxonomy using the Experience Sampling Method (ESM) in a field study at participants’ (N = 13) homes testing 331 warnings. The results show that taxonomy-based warning stimuli are perceived to be appropriate and participants could imagine using such a warning system. We propose a deeper integration of warning capabilities into smart home environments to enhance the safety of citizens.
@inproceedings{haeslerGettingResidentsAttention2023,
address = {New York, NY, USA},
series = {{DIS} '23},
title = {Getting the {Residents}' {Attention}: {The} {Perception} of {Warning} {Channels} in {Smart} {Home} {Warning} {Systems}},
isbn = {978-1-4503-9893-0},
url = {https://peasec.de/paper/2023/2023_HaeslerWendelbornReuter_SmartHomeWarningSystems_DIS},
doi = {10.1145/3563657.3596076},
abstract = {About half a billion households are expected to use smart home systems by 2025. Although many IoT sensors, such as smoke detectors or security cameras, are available and governmental crisis warning systems are in place, little is known about how to warn appropriately in smart home environments. We created a Raspberry Pi based prototype with a speaker, a display, and a connected smart light bulb. Together with a focus group, we developed a taxonomy for warning messages in smart home environments, dividing them into five classes with different stimuli. We evaluated the taxonomy using the Experience Sampling Method (ESM) in a field study at participants' (N = 13) homes testing 331 warnings. The results show that taxonomy-based warning stimuli are perceived to be appropriate and participants could imagine using such a warning system. We propose a deeper integration of warning capabilities into smart home environments to enhance the safety of citizens.},
booktitle = {Proceedings of the {ACM} {Designing} {Interactive} {Systems} {Conference} ({DIS})},
publisher = {Association for Computing Machinery},
author = {Haesler, Steffen and Wendelborn, Marc and Reuter, Christian},
year = {2023},
keywords = {Crisis, HCI, Projekt-emergenCITY, A-Paper, Ranking-CORE-A, Student, Projekt-ATHENE-SecUrban},
pages = {1114--1127},
}
[BibTeX] [Abstract] [Download PDF]
Concise instruments to determine privacy personas – typical privacy-related user groups – are not available at present. Consequently, we aimed to identify them on a privacy knowledge–privacy behavior ratio based on a self-developed instrument. To achieve this, we conducted an item analysis (N = 820) and a confirmatory factor analysis (CFA) (N = 656) of data based on an online study with German participants. Starting with 81 items, we reduced those to an eleven-item questionnaire with the two scales privacy knowledge and privacy behavior. A subsequent cluster analysis (N = 656) revealed three distinct user groups: (1) Fundamentalists scoring high in privacy knowledge and behavior, (2) Pragmatists scoring average in privacy knowledge and behavior and (3) Unconcerned scoring low in privacy knowledge and behavior. In a closer inspection of the questionnaire, the CFAs supported the model with a close global fit based on RMSEA in a training and to a lesser extent in a cross-validation sample. Deficient local fit as well as validity and reliability coefficients well below generally accepted thresholds, however, revealed that the questionnaire in its current form cannot be considered a suitable measurement instrument for determining privacy personas. The results are discussed in terms of related persona conceptualizations, the importance of a methodologically sound investigation of corresponding privacy dimensions and our lessons learned.
@article{biselliChallengesDevelopingConcise2022,
title = {On the {Challenges} of {Developing} a {Concise} {Questionnaire} to {Identify} {Privacy} {Personas}},
url = {https://petsymposium.org/2022/files/papers/issue4/popets-2022-0126.pdf},
doi = {10.56553/popets-2022-0126},
abstract = {Concise instruments to determine privacy personas – typical privacy-related user groups – are not available at present. Consequently, we aimed to identify them on a privacy knowledge–privacy behavior ratio based on a self-developed instrument. To achieve this, we conducted an item analysis (N = 820) and a confirmatory factor analysis (CFA) (N = 656) of data based on an online study with German participants. Starting with 81 items, we reduced those to an eleven-item questionnaire with the two scales privacy knowledge and privacy behavior. A subsequent cluster analysis (N = 656) revealed three distinct user groups: (1) Fundamentalists scoring high in privacy knowledge and behavior, (2) Pragmatists scoring average in privacy knowledge and behavior and (3) Unconcerned scoring low in privacy knowledge and behavior. In a closer inspection of the questionnaire, the CFAs supported the model with a close global fit based on RMSEA in a training and to a lesser extent in a cross-validation sample. Deficient local fit as well as validity and reliability coefficients well below generally accepted thresholds, however, revealed that the questionnaire in its current form cannot be considered a suitable measurement instrument for determining privacy personas. The results are discussed in terms of related persona conceptualizations, the importance of a methodologically sound investigation of corresponding privacy dimensions and our lessons learned.},
number = {4},
journal = {Proceedings on Privacy Enhancing Technologies (PoPETs)},
author = {Biselli, Tom and Steinbrink, Enno and Herbert, Franziska and Schmidbauer-Wolf, Gina Maria and Reuter, Christian},
year = {2022},
keywords = {HCI, A-Paper, Ranking-CORE-A, Security, UsableSec, Projekt-GRKPrivacy, Projekt-CROSSING, Projekt-ATHENE-FANCY, AuswahlUsableSec},
pages = {645--669},
}
[BibTeX] [Download PDF]
@book{reuterSpecialIssueUsable2022,
title = {Special {Issue} on {Usable} {Security} and {Privacy} with {User}-{Centered} {Interventions} and {Transparency} {Mechanisms} - {Behaviour} \& {Information} {Technology} ({BIT})},
url = {https://www.tandfonline.com/toc/tbit20/41/10?nav=tocList},
publisher = {Taylor \& Francis},
author = {Reuter, Christian and Lo Iacono, Luigi and Benlian, Alexander},
year = {2022},
note = {Publication Title: Behaviour \& Information Technology (BIT)},
keywords = {Crisis, HCI, Peace, A-Paper, Ranking-CORE-A, Ranking-ImpactFactor, SocialMedia, UsableSec, Projekt-ATHENE, Projekt-CROSSING},
}
[BibTeX] [Abstract] [Download PDF]
Business collaboration in the era of digital transformation requires the exchange of operational data. Since data are hardly controllable once they have been published or shared with others, it is highly important that users are clearly informed about who has access to which data and how certain settings can prevent the disclosure of sensitive data. However, giving end users more control over their data through increased transparency could also lead to information overload. This is particularly true in the field of agriculture, where tight schedules put pressure on employees of small enterprises. We conduct an empirical prestudy with 52 German farmers to investigate current data sharing scenarios. From these insights, we derive requirements and a concept for data sharing solutions providing data flow transparency for users. To investigate the behavior of users and the effects of transparent UI controls, we evaluate a prototype with 18 persons. Our evaluation shows that farmers demand flexible and secure tools that adjust to their workflows. Also, data should be stored and processed locally, granting farmers data sovereignty. Although the controls require additional effort, the evaluated transparent controls for data disclosure are easy to use and raise user awareness.
@article{linsnerSupportingUsersData2022,
title = {Supporting {Users} in {Data} {Disclosure} {Scenarios} in {Agriculture} through {Transparency}},
volume = {41},
url = {http://www.peasec.de/paper/2022/2022_LinsnerSteinbrinkKuntkeFrankenReuter_SupportingDataDisclosureScenariosAgriculture_BIT.pdf},
doi = {10.1080/0144929X.2022.2068070},
abstract = {Business collaboration in the era of digital transformation requires the exchange of operational data. Since data are hardly controllable once they have been published or shared with others, it is highly important that users are clearly informed about who has access to which data and how certain settings can prevent the disclosure of sensitive data. However, giving end users more control over their data through increased transparency could also lead to information overload. This is particularly true in the field of agriculture, where tight schedules put pressure on employees of small enterprises. We conduct an empirical prestudy with 52 German farmers to investigate current data sharing scenarios. From these insights, we derive requirements and a concept for data sharing solutions providing data flow transparency for users. To investigate the behavior of users and the effects of transparent UI controls, we evaluate a prototype with 18 persons. Our evaluation shows that farmers demand flexible and secure tools that adjust to their workflows. Also, data should be stored and processed locally, granting farmers data sovereignty. Although the controls require additional effort, the evaluated transparent controls for data disclosure are easy to use and raise user awareness.},
number = {10},
journal = {Behaviour \& Information Technology (BIT)},
author = {Linsner, Sebastian and Steinbrink, Enno and Kuntke, Franz and Franken, Jonas and Reuter, Christian},
year = {2022},
keywords = {A-Paper, Ranking-CORE-A, Ranking-ImpactFactor, Security, UsableSec, Projekt-GRKPrivacy, Projekt-AgriRegio, RSF, Projekt-HyServ},
pages = {2137--2159},
}
[BibTeX] [Abstract] [Download PDF]
Besides the merits of increasing digitization and networking, societies are increasling exposed to cyberattacks. In Germany, Computer Emerrgency Response Teams (CERTs) of the public sector operate on federal and state level to provide preventative and reactive information security services for authorities, citizens, and enterprises. Their tasks of monitoring, analyzing, and communicating threats is getting more complex by the increasing information quantity disseminated into relevant public channels. Using the lens of design science research, this paper contributes with the design and evaluation of a cross-platform cybersecurity dashboard for CERTs. Based on expert scenario-based walkthroughs in combination with semi-structured interviews (N=12), it discusses six design implications, including the customizability of data sources and filtering of displayed entities, modular integration of additional information sources, interrelation between different information feeds, intelligent algorithms for content assessment and filtering, integration with security software and systems, as well as export, sharing and communication of relevant data.
@inproceedings{kaufhold_cyber_2022,
address = {Timisoara, Romania},
title = {Cyber {Threat} {Observatory}: {Design} and {Evaluation} of an {Interactive} {Dashboard} for {Computer} {Emergency} {Response} {Teams}},
url = {http://www.peasec.de/paper/2022/2022_KaufholdBasyurtEyilmezStoettingerReuter_CyberThreatObservatory_ECIS.pdf},
abstract = {Besides the merits of increasing digitization and networking, societies are increasling exposed to cyberattacks. In Germany, Computer Emerrgency Response Teams (CERTs) of the public sector operate on federal and state level to provide preventative and reactive information security services for authorities, citizens, and enterprises. Their tasks of monitoring, analyzing, and communicating threats is getting more complex by the increasing information quantity disseminated into relevant public channels. Using the lens of design science research, this paper contributes with the design and evaluation of a cross-platform cybersecurity dashboard for CERTs. Based on expert scenario-based walkthroughs in combination with semi-structured interviews (N=12), it discusses six design implications, including the customizability of data sources and filtering of displayed entities, modular integration of additional information sources, interrelation between different information feeds, intelligent algorithms for content assessment and filtering, integration with security software and systems, as well as export, sharing and communication of relevant data.},
booktitle = {Proceedings of the {European} {Conference} on {Information} {Systems} ({ECIS})},
author = {Kaufhold, Marc-André and Basyurt, Ali Sercan and Eyilmez, Kaan and Stöttinger, Marc and Reuter, Christian},
year = {2022},
keywords = {HCI, A-Paper, Ranking-CORE-A, Security, UsableSec, Projekt-ATHENE-SecUrban, Projekt-CYWARN, HabilitationKaufhold},
}
[BibTeX] [Abstract] [Download PDF]
In the last decades, research has shown that both technical solutions and user perceptions are important to improve security and privacy in the digital realm. The field of ‘usable security’ already started to emerge in the mid-90s, primarily focussed on password and email security. Later on, the research field of ”usable security and privacy” evolved and broadened the aim to design concepts and tools to assist users in enhancing their behaviour with regard to both privacy and security. Nevertheless, many user interventions are not as effective as desired. Because of highly diverse usage contexts, leading to different privacy and security requirements and not always to one-size-fits-all approaches, tailorability is necessary to address this issue. Furthermore, transparency is a crucial requirement, as providing comprehensible information may counter reactance towards security interventions. This article first provides a brief history of the research field in its first quarter-century and then highlights research on the transparency and tailorability of user interventions. Based on this, this article then presents six contributions with regard to (1) privacy concerns in times of COVID-19, (2) authentication on mobile devices, (3) GDPR-compliant data management, (4) privacy notices on websites, (5) data disclosure scenarios in agriculture, as well as (6) rights under data protection law and the concrete process should data subjects want to claim those rights. This article concludes with several research directions on user-centred transparency and tailorability.
@article{reuterQuarterCenturyUsable2022,
title = {A {Quarter} {Century} of {Usable} {Security} and {Privacy} {Research}: {Transparency}, {Tailorability}, and the {Road} {Ahead}},
volume = {41},
issn = {0144-929X},
url = {https://www.peasec.de/paper/2022/2022_ReuterLoIaconoBenlian_QuarterCenturyUsableSecurityandPrivacyResearch_BIT.pdf},
doi = {10.1080/0144929X.2022.2080908},
abstract = {In the last decades, research has shown that both technical solutions and user perceptions are important to improve security and privacy in the digital realm. The field of ‘usable security’ already started to emerge in the mid-90s, primarily focussed on password and email security. Later on, the research field of ”usable security and privacy” evolved and broadened the aim to design concepts and tools to assist users in enhancing their behaviour with regard to both privacy and security. Nevertheless, many user interventions are not as effective as desired. Because of highly diverse usage contexts, leading to different privacy and security requirements and not always to one-size-fits-all approaches, tailorability is necessary to address this issue. Furthermore, transparency is a crucial requirement, as providing comprehensible information may counter reactance towards security interventions. This article first provides a brief history of the research field in its first quarter-century and then highlights research on the transparency and tailorability of user interventions. Based on this, this article then presents six contributions with regard to (1) privacy concerns in times of COVID-19, (2) authentication on mobile devices, (3) GDPR-compliant data management, (4) privacy notices on websites, (5) data disclosure scenarios in agriculture, as well as (6) rights under data protection law and the concrete process should data subjects want to claim those rights. This article concludes with several research directions on user-centred transparency and tailorability.},
number = {10},
journal = {Behaviour \& Information Technology (BIT)},
author = {Reuter, Christian and Lo Iacono, Luigi and Benlian, Alexander},
year = {2022},
keywords = {Crisis, HCI, A-Paper, Ranking-CORE-A, Ranking-ImpactFactor, SocialMedia, Security, UsableSec, Projekt-CROSSING, Projekt-ATHENE-SecUrban},
pages = {2035--2048},
}
[BibTeX] [Abstract] [Download PDF]
Nudging users to keep them secure online has become a growing research field in cybersecurity. While existing approaches are mainly blackbox based, showing aggregated visualisations as one-size-fits-all nudges, personalisation turned out promising to enhance the efficacy of nudges within the high variance of users and contexts. This article presents a disaggregated whitebox-based visualisation of critical information as a novel nudge. By segmenting users according to their decision-making and information processing styles, we investigate if the novel nudge is more effective for specific users than a common black-box nudge. Based on existing literature about critical factors in password security, we designed a dynamic radar chart and parallel coordinates as disaggregated visualisations. We evaluated the short-term effectiveness and users’ perception of the nudges in a think-aloud prestudy and a representative online evaluation (N=1.012). Our findings suggest that dynamic radar charts present a moderately effective nudge towards stronger passwords regarding short-term efficacy and are appreciated particularly by players of role-playing games.
@article{hartwigNudgingUsersBetter2022,
title = {Nudging {Users} {Towards} {Better} {Security} {Decisions} in {Password} {Creation} {Using} {Whitebox}-based {Multidimensional} {Visualizations}},
volume = {41},
url = {https://peasec.de/paper/2022/2022_HartwigReuter_WhiteboxMultidimensionalNudges_BIT.pdf},
doi = {10.1080/0144929X.2021.1876167},
abstract = {Nudging users to keep them secure online has become a growing research field in cybersecurity. While existing approaches are mainly blackbox based, showing aggregated visualisations as one-size-fits-all nudges, personalisation turned out promising to enhance the efficacy of nudges within the high variance of users and contexts. This article presents a disaggregated whitebox-based visualisation of critical information as a novel nudge. By segmenting users according to their decision-making and information processing styles, we investigate if the novel nudge is more effective for specific users than a common black-box nudge. Based on existing literature about critical factors in password security, we designed a dynamic radar chart and parallel coordinates as disaggregated visualisations. We evaluated the short-term effectiveness and users' perception of the nudges in a think-aloud prestudy and a representative online evaluation (N=1.012). Our findings suggest that dynamic radar charts present a moderately effective nudge towards stronger passwords regarding short-term efficacy and are appreciated particularly by players of role-playing games.},
number = {7},
journal = {Behaviour \& Information Technology (BIT)},
author = {Hartwig, Katrin and Reuter, Christian},
year = {2022},
keywords = {HCI, A-Paper, Ranking-CORE-A, Ranking-ImpactFactor, Security, UsableSec, Projekt-CROSSING, Selected, Projekt-ATHENE-FANCY, AuswahlUsableSec},
pages = {1357--1380},
}
[BibTeX] [Abstract] [Download PDF]
Past studies in the domains of information systems have analysed the potentials and barriers of social media in emergencies. While information disseminated in social media can lead to valuable insights, emergency services and researchers face the challenge of information overload as data quickly exceeds the manageable amount. We propose an embedding-based clustering approach and a method for the automated labelling of clusters. Given that the clustering quality is highly dependent on embeddings, we evaluate 19 embedding models with respect to time, internal cluster quality, and language invariance. The results show that it may be sensible to use embedding models that were already trained on other crisis datasets. However, one must ensure that the training data generalizes enough, so that the clustering can adapt to new situations. Confirming this, we found out that some embeddings were not able to perform as well on a German dataset as on an English dataset.
@inproceedings{bayerInformationOverloadCrisis2021,
title = {Information {Overload} in {Crisis} {Management}: {Bilingual} {Evaluation} of {Embedding} {Models} for {Clustering} {Social} {Media} {Posts} in {Emergencies}},
url = {https://peasec.de/paper/2021/2021_BayerKaufholdReuter_InformationOverloadInCrisisManagementBilingualEvaluation_ECIS.pdf},
abstract = {Past studies in the domains of information systems have analysed the potentials and barriers of social media in emergencies. While information disseminated in social media can lead to valuable insights, emergency services and researchers face the challenge of information overload as data quickly exceeds the manageable amount. We propose an embedding-based clustering approach and a method for the automated labelling of clusters. Given that the clustering quality is highly dependent on embeddings, we evaluate 19 embedding models with respect to time, internal cluster quality, and language invariance. The results show that it may be sensible to use embedding models that were already trained on other crisis datasets. However, one must ensure that the training data generalizes enough, so that the clustering can adapt to new situations. Confirming this, we found out that some embeddings were not able to perform as well on a German dataset as on an English dataset.},
booktitle = {Proceedings of the {European} {Conference} on {Information} {Systems} ({ECIS})},
author = {Bayer, Markus and Kaufhold, Marc-André and Reuter, Christian},
year = {2021},
keywords = {Crisis, Projekt-emergenCITY, A-Paper, Ranking-CORE-A, SocialMedia, Projekt-ATHENE-SecUrban, Projekt-CYWARN},
pages = {1--18},
}
[BibTeX] [Abstract] [Download PDF]
Technological progress can disrupt domains and change the way we work and collaborate. This paper presents a qualitative study with 52 German farmers that investigates the impact of the ongoing digitalization process in agriculture and discusses the implications for privacy research. As in other domains, the introduction of digital tools and services leads to the data itself becoming a resource. Sharing this data with products along the supply chain is favored by retailers and consumers, who benefit from traceability through transparency. However, transparency can pose a privacy risk. Having insight into the business data of others along the supply chain provides an advantage in terms of market position. This is particularly true in agriculture, where there is already a significant imbalance of power between actors. A multitude of small and medium-sized farming businesses are opposed by large upstream and downstream players that drive technological innovation. Further weakening the market position of farmers could lead to severe consequences for the entire sector. We found that on the one hand, privacy behaviors are affected by adoption of digitalization, and on the other hand, privacy itself influences adoption of digital tools. Our study sheds light on the emerging challenges for farmers and the role of privacy in the process of digitalization in agriculture.
@article{linsnerRolePrivacyDigitalization2021,
title = {The {Role} of {Privacy} in {Digitalization} – {Analysing} the {German} {Farmers}' {Perspective}},
volume = {2021},
url = {https://www.petsymposium.org/2021/files/papers/issue3/popets-2021-0050.pdf},
doi = {10.2478/popets-2021-0050},
abstract = {Technological progress can disrupt domains
and change the way we work and collaborate. This paper presents a qualitative study with 52 German farmers
that investigates the impact of the ongoing digitalization process in agriculture and discusses the implications for privacy research. As in other domains, the introduction of digital tools and services leads to the data
itself becoming a resource. Sharing this data with products along the supply chain is favored by retailers and
consumers, who benefit from traceability through transparency. However, transparency can pose a privacy risk.
Having insight into the business data of others along the
supply chain provides an advantage in terms of market
position. This is particularly true in agriculture, where
there is already a significant imbalance of power between actors. A multitude of small and medium-sized
farming businesses are opposed by large upstream and
downstream players that drive technological innovation.
Further weakening the market position of farmers could
lead to severe consequences for the entire sector. We
found that on the one hand, privacy behaviors are affected by adoption of digitalization, and on the other
hand, privacy itself influences adoption of digital tools.
Our study sheds light on the emerging challenges for
farmers and the role of privacy in the process of digitalization in agriculture.},
number = {3},
journal = {Proceedings on Privacy Enhancing Technologies (PoPETs)},
author = {Linsner, Sebastian and Kuntke, Franz and Steinbrink, Enno and Franken, Jonas and Reuter, Christian},
year = {2021},
keywords = {HCI, A-Paper, Ranking-CORE-A, Ranking-ImpactFactor, Security, UsableSec, Projekt-GRKPrivacy, Projekt-GeoBox, Selected, AuswahlUsableSec, Projekt-HyServ},
pages = {334--350},
}
[BibTeX] [Abstract] [Download PDF]
Besides the merits of increasing digitization and interconnectedness in private and professional spaces, critical infrastructures and societies are more and more exposed to cyberattacks. In order to enhance the preventative and reactive capabilities against cyberattacks, Computer Emergency Response Teams (CERTs) are deployed in many countries and organizations. In Germany, CERTs in the public sector operate on federal and state level to provide information security services for authorities, citizens, and enterprises. Their tasks of monitoring, analyzing, and communicating threats and incidents is getting more complex due to the increasing amount of information disseminated into public channels. By adopting the perspectives of Computer-Supported Cooperative Work (CSCW) and Crisis Informatics, we contribute to the study of organizational structures, technology use, and the impact on collaborative practices in and between state CERTs with empirical research based on expert interviews with representatives of German state CERTs (N=15) and supplementary document analyses (N=25). We derive design and policy implications from our findings, including the need for interoperable and modular architecture, a shift towards service level agreements, cross-platform monitoring and analysis of incident data, use of deduplication techniques and standardized threat exchange formats, a reduction of resource costs through process automation, and transparent reporting and tool structures for information exchange.
@article{riebe_impact_2021,
title = {The {Impact} of {Organizational} {Structure} and {Technology} {Use} on {Collaborative} {Practices} in {Computer} {Emergency} {Response} {Teams}: {An} {Empirical} {Study}},
volume = {5},
url = {https://www.peasec.de/paper/2021/2021_RiebeKaufholdReuter_ComputerEmegencyResponseTeams_CSCW.pdf},
doi = {10.1145/3479865},
abstract = {Besides the merits of increasing digitization and interconnectedness in private and professional spaces, critical infrastructures and societies are more and more exposed to cyberattacks. In order to enhance the preventative and reactive capabilities against cyberattacks, Computer Emergency Response Teams (CERTs) are deployed in many countries and organizations. In Germany, CERTs in the public sector operate on federal and state level to provide information security services for authorities, citizens, and enterprises. Their tasks of monitoring, analyzing, and communicating threats and incidents is getting more complex due to the increasing amount of information disseminated into public channels. By adopting the perspectives of Computer-Supported Cooperative Work (CSCW) and Crisis Informatics, we contribute to the study of organizational structures, technology use, and the impact on collaborative practices in and between state CERTs with empirical research based on expert interviews with representatives of German state CERTs (N=15) and supplementary document analyses (N=25). We derive design and policy implications from our findings, including the need for interoperable and modular architecture, a shift towards service level agreements, cross-platform monitoring and analysis of incident data, use of deduplication techniques and standardized threat exchange formats, a reduction of resource costs through process automation, and transparent reporting and tool structures for information exchange.},
number = {CSCW2},
journal = {Proceedings of the ACM: Human Computer Interaction (PACM): Computer-Supported Cooperative Work and Social Computing},
author = {Riebe, Thea and Kaufhold, Marc-André and Reuter, Christian},
year = {2021},
keywords = {Crisis, A-Paper, Ranking-CORE-A, Security, UsableSec, Projekt-ATHENE-SecUrban, Projekt-CYWARN, AuswahlUsableSec, Projekt-KontiKat, AuswahlKaufhold, HabilitationKaufhold},
}
[BibTeX] [Abstract] [Download PDF]
Since 2015, an increased number of asylum seekers is coming to Europe. These migration movements increasingly rely on digital infrastructure, such as mobile internet access and online services, in order to reach their targeted destination countries. Asylum seekers often use smartphones for information and communication purposes. Even though there are many positive aspects in the use of such technologies, researchers have to consider the perceived risks of this specific user group. This work aims at investigating the use of mobile information technologies by asylum seekers during their flight, especially taking privacy into account. Thus, it examines asylum seekers’ digital privacy perceptions and identifies privacy protection behaviors by conducting a qualitative interview study with 14 asylum seekers who applied for asylum in Germany. The results show that asylum seekers are often aware of the various risks deriving from the use of smartphones and ICT, such as surveillance and persecution by state or non-state actors as well as extortion by criminals. Based on this, this work furthermore outlines different strategies used to manage these risks. Since the lack of privacy and trust leads to avoidance behavior, the insights of this study provide valuable information for the design of assistance apps and collaboration platforms, which appropriately address the specific needs for digital privacy in the context of flight, or for the conception of privacy-enhancing technologies helping to achieve this.
@article{steinbrinkDigitalPrivacyPerceptions2021,
title = {Digital {Privacy} {Perceptions} of {Asylum} {Seekers} in {Germany} - {An} {Empirical} {Study} about {Smartphone} {Usage} during the {Flight}},
volume = {5},
url = {https://www.peasec.de/paper/2021/2021_SteinbrinkReichertMendeReuter_DigitalPrivacyPerceptionAsylumSeekers_CSCW.pdf},
doi = {10.1145/3479526},
abstract = {Since 2015, an increased number of asylum seekers is coming to Europe. These migration movements increasingly rely on digital infrastructure, such as mobile internet access and online services, in order to reach their targeted destination countries. Asylum seekers often use smartphones for information and communication purposes. Even though there are many positive aspects in the use of such technologies, researchers have to consider the perceived risks of this specific user group. This work aims at investigating the use of mobile information technologies by asylum seekers during their flight, especially taking privacy into account. Thus, it examines asylum seekers’ digital privacy perceptions and identifies privacy protection behaviors by conducting a qualitative interview study with 14 asylum seekers who applied for asylum in Germany. The results show that asylum seekers are often aware of the various risks deriving from the use of smartphones and ICT, such as surveillance and persecution by state or non-state actors as well as extortion by criminals. Based on this, this work furthermore outlines different strategies used to manage these risks. Since the lack of privacy and trust leads to avoidance behavior, the insights of this study provide valuable information for the design of assistance apps and collaboration platforms, which appropriately address the specific needs for digital privacy in the context of flight, or for the conception of privacy-enhancing technologies helping to achieve this.},
number = {CSCW2},
journal = {Proceedings of the ACM: Human Computer Interaction (PACM): Computer-Supported Cooperative Work and Social Computing},
author = {Steinbrink, Enno and Reichert, Lilian and Mende, Michelle and Reuter, Christian},
year = {2021},
keywords = {A-Paper, Ranking-CORE-A, Ranking-ImpactFactor, Student, Security, UsableSec, Projekt-GRKPrivacy, Projekt-ATHENE-FANCY, AuswahlUsableSec},
}
[BibTeX] [Abstract] [Download PDF]
During crises such as the COVID-19 pandemic, people spontaneously initiate support groups, while establishedorganizations like soccer clubs set non-regular goals, both offering help. Interested in the coordination of suchhelp and potential challenges of collaboration, we conducted a virtual ethnography of a multi-level networklocated in Germany. We focused on aims, activities, and technological mediation, with Activity Theory astheoretical framework. Our findings show that the organizational aim of coordinating help was successfullyachieved by connecting heterogeneous actors through digitization and institutionalization. Enabled by thecontext of the COVID-19 pandemic crisis, the network acted virtually, but was also able to integrate analogspaces of help. We identified six crucial implications regarding the use of technology and collaboration forbuilding a successful volunteering network.
@article{haeslerStrongerTogetherHow2021,
title = {Stronger {Together}: {How} {Neighborhood} {Groups} {Build} up a {Virtual} {Network} during the {COVID}-19 {Pandemic}},
volume = {5},
url = {https://peasec.de/paper/2021/2021_HaeslerSchmidVierneiselReuter_StrongerTogetherVirtualNetworkCOVID19_CSCW.pdf},
doi = {10.1145/3476045},
abstract = {During crises such as the COVID-19 pandemic, people spontaneously initiate support groups, while establishedorganizations like soccer clubs set non-regular goals, both offering help. Interested in the coordination of suchhelp and potential challenges of collaboration, we conducted a virtual ethnography of a multi-level networklocated in Germany. We focused on aims, activities, and technological mediation, with Activity Theory astheoretical framework. Our findings show that the organizational aim of coordinating help was successfullyachieved by connecting heterogeneous actors through digitization and institutionalization. Enabled by thecontext of the COVID-19 pandemic crisis, the network acted virtually, but was also able to integrate analogspaces of help. We identified six crucial implications regarding the use of technology and collaboration forbuilding a successful volunteering network.},
number = {CSCW2},
journal = {Proceedings of the ACM: Human Computer Interaction (PACM): Computer-Supported Cooperative Work and Social Computing},
author = {Haesler, Steffen and Schmid, Stefka and Vierneisel, Annemike Sophia and Reuter, Christian},
year = {2021},
keywords = {Crisis, HCI, Projekt-emergenCITY, A-Paper, Ranking-CORE-A, Projekt-ATHENE-SecUrban, AuswahlCrisis, Selected},
}
[BibTeX] [Abstract] [Download PDF]
The growing importance of social media in conflicts and crises is accompanied by an ever-increasing research interest in the crisis informatics field in order to identify potential benefits and develop measures against the technology’s abuse. This special issue sets out to give an overview of current research on the use of social media in conflicts and crises. In doing so, it focuses on both good and malicious aspects of social media and includes a variety of papers of conceptual, theoretical and empirical nature. In six sections, the special issue presents an overview of the field, analytical methods, technical challenges, current advancements and the accepted papers before concluding. Specific topics range from cyber deception over information trustworthiness to mining and near-real-time processing of social media data.
@article{reuterSocialMediaConflicts2020,
title = {Social media in conflicts and crises},
volume = {39},
issn = {0144-929X},
url = {https://peasec.de/paper/2020/2020_ReuterStieglitzImran_SocialMediainConflictsandCrises_BIT.pdf},
doi = {10.1080/0144929X.2019.1629025},
abstract = {The growing importance of social media in conflicts and crises is accompanied by an ever-increasing research interest in the crisis informatics field in order to identify potential benefits and develop measures against the technology's abuse. This special issue sets out to give an overview of current research on the use of social media in conflicts and crises. In doing so, it focuses on both good and malicious aspects of social media and includes a variety of papers of conceptual, theoretical and empirical nature. In six sections, the special issue presents an overview of the field, analytical methods, technical challenges, current advancements and the accepted papers before concluding. Specific topics range from cyber deception over information trustworthiness to mining and near-real-time processing of social media data.},
number = {1},
journal = {Behaviour \& Information Technology (BIT)},
author = {Reuter, Christian and Stieglitz, Stefan and Imran, Muhammad},
year = {2020},
keywords = {Crisis, HCI, Peace, A-Paper, Ranking-CORE-A, Ranking-ImpactFactor, SocialMedia, Projekt-ATHENE, Projekt-CROSSING, Projekt-MAKI},
pages = {241--251},
}
[BibTeX] [Abstract] [Download PDF]
Since the emergence of so-called fake news on the internet and in social media, platforms such as Facebook have started to take countermeasures, and researchers have begun looking into this phenomenon from a variety of perspectives. A large number of scientific work has investigated ways to detect fake news automatically. Less attention has been paid to the subsequent step, i.e., what to do when you are aware of the inaccuracy of claims in social media. This work takes a user-centered approach on means to counter identified mis- and disinformation in social media. We conduct a three-step study design on how approaches in social media should be presented to respect the users’ needs and experiences and how effective they are. As our first step, in an online survey representative for some factors to the German adult population, we enquire regarding their strategies on handling information in social media, and their opinion regarding possible solutions — focusing on the approach of displaying a warning on inaccurate posts. In a second step, we present five potential approaches for countermeasures identified in related work to interviewees for qualitative input. We discuss (1) warning, (2) related articles, (3) reducing the size, (4) covering, and (5) requiring confirmation. Based on the interview feedback, as the third step of this study, we select, improve, and examine four promising approaches on how to counter misinformation. We conduct an online experiment to test their effectiveness on the perceived accuracy of false headlines and also ask for the users’ preferences. In this study, we find that users welcome warning-based approaches to counter fake news and are somewhat critical with less transparent methods. Moreover, users want social media platforms to explain why a post was marked as disputed. The results regarding effectiveness are similar: Warning-based approaches are shown to be effective in reducing the perceived accuracy of false headlines. Moreover, adding an explanation to the warning leads to the most significant results. In contrast, we could not find a significant effect on one of Facebook’s current approaches (reduced post size and fact-checks in related articles).
@article{kirchnerCounteringFakeNews2020,
title = {Countering {Fake} {News}: {A} {Comparison} of {Possible} {Solutions} {Regarding} {User} {Acceptance} and {Effectiveness}},
volume = {4},
url = {http://www.peasec.de/paper/2020/2020_KirchnerReuter_CounteringFakeNews_CSCW.pdf},
doi = {10.1145/3415211},
abstract = {Since the emergence of so-called fake news on the internet and in social media, platforms such as Facebook have started to take countermeasures, and researchers have begun looking into this phenomenon from a variety of perspectives. A large number of scientific work has investigated ways to detect fake news automatically. Less attention has been paid to the subsequent step, i.e., what to do when you are aware of the inaccuracy of claims in social media. This work takes a user-centered approach on means to counter identified mis- and disinformation in social media. We conduct a three-step study design on how approaches in social media should be presented to respect the users' needs and experiences and how effective they are. As our first step, in an online survey representative for some factors to the German adult population, we enquire regarding their strategies on handling information in social media, and their opinion regarding possible solutions — focusing on the approach of displaying a warning on inaccurate posts. In a second step, we present five potential approaches for countermeasures identified in related work to interviewees for qualitative input. We discuss (1) warning, (2) related articles, (3) reducing the size, (4) covering, and (5) requiring confirmation. Based on the interview feedback, as the third step of this study, we select, improve, and examine four promising approaches on how to counter misinformation. We conduct an online experiment to test their effectiveness on the perceived accuracy of false headlines and also ask for the users' preferences. In this study, we find that users welcome warning-based approaches to counter fake news and are somewhat critical with less transparent methods. Moreover, users want social media platforms to explain why a post was marked as disputed. The results regarding effectiveness are similar: Warning-based approaches are shown to be effective in reducing the perceived accuracy of false headlines. Moreover, adding an explanation to the warning leads to the most significant results. In contrast, we could not find a significant effect on one of Facebook's current approaches (reduced post size and fact-checks in related articles).},
number = {CSCW2},
journal = {Proceedings of the ACM: Human Computer Interaction (PACM): Computer-Supported Cooperative Work and Social Computing},
publisher = {ACM},
author = {Kirchner, Jan and Reuter, Christian},
year = {2020},
note = {Place: Austin, USA},
keywords = {Crisis, HCI, Projekt-emergenCITY, A-Paper, Ranking-CORE-A, Ranking-ImpactFactor, Student, Projekt-ATHENE, AuswahlCrisis, Selected, Cooperation},
pages = {140:1--140:28},
}
[BibTeX] [Abstract] [Download PDF]
As part of information systems, the research field of crisis informatics increasingly investigates the potentials and limitations of mobile crisis apps, which constitute a relatively new public service for citizens and are specifically designed for the dissemination of disaster‐related information and communication between authorities, organizations and citizens. While existing crisis apps, such as KATWARN or NINA in Germany, focus on preparatory information and warning functionality, there is a need for apps and research on police-related functionality, such as information on cybercrime, fraud offences, or search for missing persons. Based on a workshop with civil protection (N=12) and police officers (N=15), we designed a questionnaire and conducted a representative survey of German citizens (N=1.219) on the past, current and future use, perceived helpfulness, deployment and behavioural preferences, configurability and most important functionality of mobile crisis apps. Our results indicate that in addition to emergency and weather warnings, crime- and health-related warnings are also desired by many, as is the possibility for bidirectional communication. People also want one central app and are resistant to installing more than one crisis app. Furthermore, there are few significant differences between socioeconomic groups.
@inproceedings{kaufhold_warning_2020,
title = {Warning the {Public}: {A} {Survey} on {Attitudes}, {Expectations} and {Use} of {Mobile} {Crisis} {Apps} in {Germany}},
url = {http://www.peasec.de/paper/2020/2020_KaufholdHaunschildReuter_WarningthePublic_ECIS.pdf},
abstract = {As part of information systems, the research field of crisis informatics increasingly investigates the potentials and limitations of mobile crisis apps, which constitute a relatively new public service for citizens and are specifically designed for the dissemination of disaster‐related information and communication between authorities, organizations and citizens. While existing crisis apps, such as KATWARN or NINA in Germany, focus on preparatory information and warning functionality, there is a need for apps and research on police-related functionality, such as information on cybercrime, fraud offences, or search for missing persons. Based on a workshop with civil protection (N=12) and police officers (N=15), we designed a questionnaire and conducted a representative survey of German citizens (N=1.219) on the past, current and future use, perceived helpfulness, deployment and behavioural preferences, configurability and most important functionality of mobile crisis apps. Our results indicate that in addition to emergency and weather warnings, crime- and health-related warnings are also desired by many, as is the possibility for bidirectional communication. People also want one central app and are resistant to installing more than one crisis app. Furthermore, there are few significant differences between socioeconomic groups.},
booktitle = {Proceedings of the {European} {Conference} on {Information} {Systems} ({ECIS})},
publisher = {AIS},
author = {Kaufhold, Marc-André and Haunschild, Jasmin and Reuter, Christian},
year = {2020},
keywords = {Crisis, Projekt-emergenCITY, A-Paper, Ranking-CORE-A, Projekt-ATHENE-SecUrban, Projekt-ATHENE-FANCY, Ranking-WKWI-A, Ranking-VHB-B, HabilitationKaufhold},
}
[BibTeX] [Abstract] [Download PDF]
The growing importance of social media in conflicts and crises is accompanied by an ever-increasing research interest in the crisis informatics field in order to identify potential benefits and develop measures against the technology’s abuse. This special issue sets out to give an overview of current research on the use of social media in conflicts and crises. In doing so, it focuses on both good and malicious aspects of social media and includes a variety of papers of conceptual, theoretical and empirical nature. In six sections, the special issue presents an overview of the field, analytical methods, technical challenges, current advancements and the accepted papers before concluding. Specific topics range from cyber deception over information trustworthiness to mining and near-real-time processing of social media data.
@book{reuterSpecialIssueSocial2020,
title = {Special {Issue} on {Social} {Media} in {Conflicts} and {Crises} - {Behaviour} \& {Information} {Technology} ({BIT})},
volume = {39},
url = {https://www.tandfonline.com/toc/tbit20/39/3},
abstract = {The growing importance of social media in conflicts and crises is accompanied by an ever-increasing research interest in the crisis informatics field in order to identify potential benefits and develop measures against the technology's abuse. This special issue sets out to give an overview of current research on the use of social media in conflicts and crises. In doing so, it focuses on both good and malicious aspects of social media and includes a variety of papers of conceptual, theoretical and empirical nature. In six sections, the special issue presents an overview of the field, analytical methods, technical challenges, current advancements and the accepted papers before concluding. Specific topics range from cyber deception over information trustworthiness to mining and near-real-time processing of social media data.},
number = {1},
publisher = {Taylor \& Francis},
author = {Reuter, Christian and Stieglitz, Stefan and Imran, Muhammad},
year = {2020},
note = {Publication Title: Behaviour \& Information Technology (BIT)},
keywords = {Crisis, HCI, Peace, A-Paper, Ranking-CORE-A, Ranking-ImpactFactor, SocialMedia, Projekt-ATHENE, Projekt-CROSSING, Projekt-MAKI},
}
[BibTeX] [Abstract] [Download PDF]
The research field of crisis informatics examines, amongst others, the potentials and barriers of social media use during disasters and emergencies. Social media allow emergency services to receive valuable information (e.g., eyewitness reports, pictures, or videos) from social media. However, the vast amount of data generated during large-scale incidents can lead to issue of information overload. Research indicates that supervised machine learning techniques are sui- table for identifying relevant messages and filter out irrelevant messages, thus mitigating in- formation overload. Still, they require a considerable amount of labeled data, clear criteria for relevance classification, a usable interface to facilitate the labeling process and a mechanism to rapidly deploy retrained classifiers. To overcome these issues, we present (1) a system for social media monitoring, analysis and relevance classification, (2) abstract and precise criteria for re- levance classification in social media during disasters and emergencies, (3) the evaluation of a well-performing Random Forest algorithm for relevance classification incorporating metadata from social media into a batch learning approach (e.g., 91.28\%/89.19\% accuracy, 98.3\%/89.6\% precision and 80.4\%/87.5\% recall with a fast training time with feature subset selection on the European floods/BASF SE incident datasets), as well as (4) an approach and preliminary eva- luation for relevance classification including active, incremental and online learning to reduce the amount of required labeled data and to correct misclassifications of the algorithm by feed- back classification. Using the latter approach, we achieved a well-performing classifier based on the European floods dataset by only requiring a quarter of labeled data compared to the tradi- tional batch learning approach. Despite a lesser effect on the BASF SE incident dataset, still a substantial improvement could be determined.
@article{kaufholdRapidRelevanceClassification2020,
title = {Rapid relevance classification of social media posts in disasters and emergencies: {A} system and evaluation featuring active, incremental and online learning},
volume = {57},
url = {https://peasec.de/paper/2020/2020_KaufholdBayerReuter_RapidRelevanceClassification_IPM.pdf},
doi = {10.1016/j.ipm.2019.102132},
abstract = {The research field of crisis informatics examines, amongst others, the potentials and barriers of social media use during disasters and emergencies. Social media allow emergency services to receive valuable information (e.g., eyewitness reports, pictures, or videos) from social media. However, the vast amount of data generated during large-scale incidents can lead to issue of information overload. Research indicates that supervised machine learning techniques are sui- table for identifying relevant messages and filter out irrelevant messages, thus mitigating in- formation overload. Still, they require a considerable amount of labeled data, clear criteria for relevance classification, a usable interface to facilitate the labeling process and a mechanism to rapidly deploy retrained classifiers. To overcome these issues, we present (1) a system for social media monitoring, analysis and relevance classification, (2) abstract and precise criteria for re- levance classification in social media during disasters and emergencies, (3) the evaluation of a well-performing Random Forest algorithm for relevance classification incorporating metadata from social media into a batch learning approach (e.g., 91.28\%/89.19\% accuracy, 98.3\%/89.6\% precision and 80.4\%/87.5\% recall with a fast training time with feature subset selection on the European floods/BASF SE incident datasets), as well as (4) an approach and preliminary eva- luation for relevance classification including active, incremental and online learning to reduce the amount of required labeled data and to correct misclassifications of the algorithm by feed- back classification. Using the latter approach, we achieved a well-performing classifier based on the European floods dataset by only requiring a quarter of labeled data compared to the tradi- tional batch learning approach. Despite a lesser effect on the BASF SE incident dataset, still a substantial improvement could be determined.},
number = {1},
journal = {Information Processing \& Management (IPM)},
author = {Kaufhold, Marc-André and Bayer, Markus and Reuter, Christian},
year = {2020},
keywords = {Crisis, Projekt-emergenCITY, A-Paper, Ranking-CORE-A, Ranking-ImpactFactor, SocialMedia, Projekt-ATHENE-SecUrban, Ranking-WKWI-B, AuswahlKaufhold},
pages = {1--32},
}
[BibTeX] [Abstract] [Download PDF]
The research field of crisis informatics examines, amongst others, the potentials and barriers of social media use during conflicts and crises. Social media allow emergency services to reach the public easily in the context of crisis communication and receive valuable information (e.g. pictures) from social media data. However, the vast amount of data generated during large-scale incidents can lead to issues of information overload and quality. To mitigate these issues, this paper proposes the semi-automatic creation of alerts including keyword, relevance and information quality filters based on cross-platform social media data. We conducted empirical studies and workshops with emergency services across Europe to raise requirements, then iteratively designed and implemented an approach to support emergency services, and performed multiple evaluations, including live demonstrations and field trials, to research the potentials of social media-based alerts. Finally, we present the findings and implications based on semi-structured interviews with emergency services, highlighting the need for usable configurability and white-box algorithm representation.
@article{kaufholdMitigatingInformationOverload2020,
title = {Mitigating {Information} {Overload} in {Social} {Media} during {Conflicts} and {Crises}: {Design} and {Evaluation} of a {Cross}-{Platform} {Alerting} {System}},
volume = {39},
url = {https://peasec.de/paper/2020/2020_KaufholdRuppReuterHabdank_MitigatingInformationOverload_BIT.pdf},
doi = {10.1080/0144929X.2019.1620334},
abstract = {The research field of crisis informatics examines, amongst others, the potentials and barriers of social media use during conflicts and crises. Social media allow emergency services to reach the public easily in the context of crisis communication and receive valuable information (e.g. pictures) from social media data. However, the vast amount of data generated during large-scale incidents can lead to issues of information overload and quality. To mitigate these issues, this paper proposes the semi-automatic creation of alerts including keyword, relevance and information quality filters based on cross-platform social media data. We conducted empirical studies and workshops with emergency services across Europe to raise requirements, then iteratively designed and implemented an approach to support emergency services, and performed multiple evaluations, including live demonstrations and field trials, to research the potentials of social media-based alerts. Finally, we present the findings and implications based on semi-structured interviews with emergency services, highlighting the need for usable configurability and white-box algorithm representation.},
number = {3},
journal = {Behaviour \& Information Technology (BIT)},
author = {Kaufhold, Marc-André and Rupp, Nicola and Reuter, Christian and Habdank, Matthias},
year = {2020},
keywords = {Crisis, HCI, A-Paper, Ranking-CORE-A, Ranking-ImpactFactor, SocialMedia, Security, AuswahlCrisis, Selected, Projekt-ATHENE-FANCY, Projekt-KontiKat, AuswahlKaufhold},
pages = {319--342},
}
[BibTeX] [Abstract] [Download PDF]
In positive psychology, flow is described as a holistic mental condition in which an individual delves into an activity with full concentration. Even in software engineering, the promotion of flow experience fosters effects such as positive affect, improved learning, and higher product loyalty in computer-aided environments. However, from a practice-based perspective it is not obvious how to design ICT to support flow experience. With this paper, we, therefore, contribute concrete design implications, paving the way for a good flow experience in ICT. This paper be-gins by examining the current state of flow research in the field of Human-Computer Interaction. We then go on to present a study comprising the development and evaluation of design options that aim to support flow in integrated development environments such as Eclipse, one of the most prominent open-source IDEs. The findings reveal practical implications on the use of four flow design options for software engineering and are integrated into a preliminary research framework.
@inproceedings{kaufholdFlowExperienceSoftware2019,
address = {Stockholm and Uppsala, Sweden},
title = {Flow {Experience} in {Software} {Engineering}: {Development} and {Evaluation} of {Design} {Options} for {Eclipse}},
isbn = {978-1-7336325-0-8},
url = {https://aisel.aisnet.org/ecis2019_rip/17/},
abstract = {In positive psychology, flow is described as a holistic mental condition in which an individual delves into an activity with full concentration. Even in software engineering, the promotion of flow experience fosters effects such as positive affect, improved learning, and higher product loyalty in computer-aided environments. However, from a practice-based perspective it is not obvious how to design ICT to support flow experience. With this paper, we, therefore, contribute concrete design implications, paving the way for a good flow experience in ICT. This paper be-gins by examining the current state of flow research in the field of Human-Computer Interaction. We then go on to present a study comprising the development and evaluation of design options that aim to support flow in integrated development environments such as Eclipse, one of the most prominent open-source IDEs. The findings reveal practical implications on the use of four flow design options for software engineering and are integrated into a preliminary research framework.},
booktitle = {Proceedings of the {European} {Conference} on {Information} {Systems} ({ECIS})},
publisher = {AIS},
author = {Kaufhold, Marc-André and Reuter, Christian and Ludwig, Thomas},
year = {2019},
keywords = {Ranking-CORE-A, Ranking-WKWI-A, Projekt-KontiKat, Ranking-VHB-B, Projekt-CRISP},
}
[BibTeX] [Abstract] [Download PDF]
Emergencies threaten human lives and overall societal continuity, whether or not the crises and disas- ters are induced by nature, such as earthquakes, floods and hurricanes, or by human beings, such as accidents, terror attacks and uprisings. In such situations, not only do citizens demand information about the damage and safe behaviour, but emergency services also require high quality information to improve situational awareness. For this purpose, there are currently two kinds of apps available: Gen- eral-purpose apps, such as Facebook Safety Check or Twitter Alerts, already integrate safety features. Specific crisis apps, such as KATWARN in Germany or FEMA in the US, provide information on how to behave before, during and after emergencies, and capabilities for reporting incidents or receiving disaster warnings. In this paper, we analyse authorities’ and citizens’ information demands and features of crisis apps. Moreover, we present the concept, implementation and evaluation of a crisis app for incident reporting and bidirectional communication between authorities and citizens. Using the app, citizens may (1) report incidents by providing a category, description, location and multimedia files and (2) receive broadcasts and responses from authorities. Finally, we outline features, requirements and contextual factors for incident reporting and bidirectional communication via mobile app.
@inproceedings{kaufhold112SOCIALDesign2018,
address = {Portsmouth, UK},
title = {112.{SOCIAL}: {Design} and {Evaluation} of a {Mobile} {Crisis} {App} for {Bidirectional} {Communication} between {Emergency} {Services} and {Citizen}},
url = {https://peasec.de/paper/2018/2018_KaufholdRuppReuterAmelunxenCristaldi_112Social_ECIS.pdf},
abstract = {Emergencies threaten human lives and overall societal continuity, whether or not the crises and disas- ters are induced by nature, such as earthquakes, floods and hurricanes, or by human beings, such as accidents, terror attacks and uprisings. In such situations, not only do citizens demand information about the damage and safe behaviour, but emergency services also require high quality information to improve situational awareness. For this purpose, there are currently two kinds of apps available: Gen- eral-purpose apps, such as Facebook Safety Check or Twitter Alerts, already integrate safety features. Specific crisis apps, such as KATWARN in Germany or FEMA in the US, provide information on how to behave before, during and after emergencies, and capabilities for reporting incidents or receiving disaster warnings. In this paper, we analyse authorities' and citizens' information demands and features of crisis apps. Moreover, we present the concept, implementation and evaluation of a crisis app for incident reporting and bidirectional communication between authorities and citizens. Using the app, citizens may (1) report incidents by providing a category, description, location and multimedia files and (2) receive broadcasts and responses from authorities. Finally, we outline features, requirements and contextual factors for incident reporting and bidirectional communication via mobile app.},
booktitle = {Proceedings of the {European} {Conference} on {Information} {Systems} ({ECIS})},
publisher = {AIS},
author = {Kaufhold, Marc-André and Rupp, Nicola and Reuter, Christian and Amelunxen, Christoph and Cristaldi, Massimo},
year = {2018},
keywords = {Crisis, HCI, A-Paper, Ranking-CORE-A, Ranking-WKWI-A, Projekt-EmerGent, Projekt-KontiKat, Ranking-VHB-B, Cooperation},
pages = {1--17},
}
[BibTeX] [Abstract] [Download PDF]
The value of social media in crises, disasters, and emergencies across different events (e.g. floods, storms, terroristic attacks), countries, and for heterogeneous participants (e.g. citizens, emergency services) is now well-attested. Existing work has examined the potentials and weaknesses of its use during specific events. Fewer studies, however, have focused on citizens’ perceptions of social media in emergencies, and none have deployed a representative sample to examine this. We present the results of the first representative study on citizens’ perception of social media in emergencies that we have conducted in Germany. Our study highlights, for example, that around half (45\%) of people have used social media during an emergency to share and / or look for information. In contrast, false rumours on social media (74\%) are perceived as a threat. Moreover, only a minority of people have downloaded a smartphone app for emergencies (16\%), with the most popular ones’ weather and first aid apps.
@article{reuterSocialMediaEmergencies2017,
title = {Social {Media} in {Emergencies}: {A} {Representative} {Study} on {Citizens}' {Perception} in {Germany}},
volume = {1},
url = {http://www.peasec.de/paper/2017/2017_ReuterKaufholdSpielhoferHahne_SocialMediaEmergenciesGermany_CSCW.pdf},
doi = {10.1145/3134725},
abstract = {The value of social media in crises, disasters, and emergencies across different events (e.g. floods, storms, terroristic attacks), countries, and for heterogeneous participants (e.g. citizens, emergency services) is now well-attested. Existing work has examined the potentials and weaknesses of its use during specific events. Fewer studies, however, have focused on citizens' perceptions of social media in emergencies, and none have deployed a representative sample to examine this. We present the results of the first representative study on citizens' perception of social media in emergencies that we have conducted in Germany. Our study highlights, for example, that around half (45\%) of people have used social media during an emergency to share and / or look for information. In contrast, false rumours on social media (74\%) are perceived as a threat. Moreover, only a minority of people have downloaded a smartphone app for emergencies (16\%), with the most popular ones' weather and first aid apps.},
number = {2},
journal = {Proceedings of the ACM: Human Computer Interaction (PACM): Computer-Supported Cooperative Work and Social Computing},
author = {Reuter, Christian and Kaufhold, Marc-André and Spielhofer, Thomas and Hahne, Anna Sophie},
year = {2017},
note = {Place: New York, USA},
keywords = {Crisis, HCI, A-Paper, Ranking-CORE-A, SocialMedia, Projekt-EmerGent, Projekt-KontiKat, Ranking-WKWI-B},
pages = {1--19},
}
[BibTeX] [Abstract] [Download PDF]
Abstract Although emergency services have already recognized the importance of citizen-initiated activities during disasters, still questions with regard to the coordination of spontaneous volunteers and their activities arise. Within our article, we will present a technological approach based on public displays which aims to foster situated crowdsourcing between affected citizens, spontaneous volunteers as well as official emergency services. We will address the research question: How can the situated tasks performed by spontaneous volunteers be supported by the use of public displays during disasters? First we will present the current state of the art with regard to the coordination practices of spontaneous volunteers and emergency services within disaster situations as well as related problems, potentials and specifics of situated crowdsourcing and public displays. To gain insight into actual coordination practices, we conducted an empirical study with 18 different stakeholders involved in disaster management. Based on the literature review and our empirical study, we have derived a technical concept that supports the task and activity management of spontaneous volunteers as well as the coordination both of the demands of affected people and the offers from spontaneous volunteers. We have implemented our concept as the public display application ‘City-Share’, which provides a robust communication infrastructure and encompasses situated crowdsourcing mechanisms for managing offers and demands of activities on-the-ground. Based on its evaluation with several users, we will discuss our findings with regard to the assignment of tasks on-the-ground and situated crowdsourcing during emergencies. We outline that City-Share can improve a community’s disaster resilience, especially when focusing on the kind of collaborative resilience emerging between official stakeholders and spontaneous volunteers or affected citizens at a local level.
@article{ludwigSituatedCrowdsourcingDisasters2017,
title = {Situated crowdsourcing during disasters: {Managing} the tasks of spontaneous volunteers through public displays},
volume = {102},
url = {http://www.peasec.de/paper/2017/2017_Ludwigetal_SituatedCrowdsourcingPublicDisplay_IJHCS.pdf},
doi = {10.1016/j.ijhcs.2016.09.008},
abstract = {Abstract Although emergency services have already recognized the importance of citizen-initiated activities during disasters, still questions with regard to the coordination of spontaneous volunteers and their activities arise. Within our article, we will present a technological approach based on public displays which aims to foster situated crowdsourcing between affected citizens, spontaneous volunteers as well as official emergency services. We will address the research question: How can the situated tasks performed by spontaneous volunteers be supported by the use of public displays during disasters? First we will present the current state of the art with regard to the coordination practices of spontaneous volunteers and emergency services within disaster situations as well as related problems, potentials and specifics of situated crowdsourcing and public displays. To gain insight into actual coordination practices, we conducted an empirical study with 18 different stakeholders involved in disaster management. Based on the literature review and our empirical study, we have derived a technical concept that supports the task and activity management of spontaneous volunteers as well as the coordination both of the demands of affected people and the offers from spontaneous volunteers. We have implemented our concept as the public display application ‘City-Share', which provides a robust communication infrastructure and encompasses situated crowdsourcing mechanisms for managing offers and demands of activities on-the-ground. Based on its evaluation with several users, we will discuss our findings with regard to the assignment of tasks on-the-ground and situated crowdsourcing during emergencies. We outline that City-Share can improve a community's disaster resilience, especially when focusing on the kind of collaborative resilience emerging between official stakeholders and spontaneous volunteers or affected citizens at a local level.},
number = {C},
journal = {International Journal on Human-Computer Studies (IJHCS)},
author = {Ludwig, Thomas and Kotthaus, Christoph and Reuter, Christian and Dongen, Sören Van and Pipek, Volkmar},
year = {2017},
keywords = {Crisis, HCI, A-Paper, Ranking-CORE-A, Ranking-ImpactFactor, Student, Ranking-WKWI-B, Projekt-KOKOS, Cooperation},
pages = {103--121},
}
[BibTeX] [Abstract] [Download PDF]
Crises, such as thunderstorms and an increasing number of (recognised) terroristic attacks in 2015, 2016, and 2017, do not only lead to extensive monetary damage, but also threaten human lives and influence citizens’ perceptions of safety and security. In such situations, the population demands information about the damage and safe behaviour. Although some apps are available to provide this information, the number of users seems relatively low. Focussing on Germany, this study aims to research (1) the distribution of crisis apps in the population, (2) the kinds of crisis apps currently used, as well as (3) needed core functionalities of warning apps. This multi-method study analyses crisis apps by investigating their utilisation quantitatively in a snowball-based survey in Europe (n=1,034) and in a representative survey in Germany (n=1,369). Based on this, the German warning apps Katwarn and NINA and the US-American app FEMA are evaluated qualitatively (n=22). The results revealed requirements which informed the implementation of a warning app prototype. The prototype combines the identified advantages of the apps evaluated in the study, containing warnings and all-clear, recommendations for action, functions to contact friends and helpers. The contributions of this work are findings on the distribution of crisis apps in Europe and Germany (both 16\%), the kinds of crisis apps used (mostly weather and warning apps), and empirically based requirements for warning apps which can be integrated in further developments of existing apps and a prototype for such an app.
@inproceedings{reuterKatwarnNINAFEMA2017,
address = {Guimarães, Portugal},
title = {Katwarn, {NINA} or {FEMA}? {Multi}-{Method} {Study} on {Distribution}, {Use} and {Public} {Views} on {Crisis} {Apps}},
url = {http://www.peasec.de/paper/2017/2017_ReuterKaufholdLeopoldKnipp_CrisisApps_ECIS.pdf},
abstract = {Crises, such as thunderstorms and an increasing number of (recognised) terroristic attacks in 2015, 2016, and 2017, do not only lead to extensive monetary damage, but also threaten human lives and influence citizens' perceptions of safety and security. In such situations, the population demands information about the damage and safe behaviour. Although some apps are available to provide this information, the number of users seems relatively low. Focussing on Germany, this study aims to research (1) the distribution of crisis apps in the population, (2) the kinds of crisis apps currently used, as well as (3) needed core functionalities of warning apps. This multi-method study analyses crisis apps by investigating their utilisation quantitatively in a snowball-based survey in Europe (n=1,034) and in a representative survey in Germany (n=1,369). Based on this, the German warning apps Katwarn and NINA and the US-American app FEMA are evaluated qualitatively (n=22). The results revealed requirements which informed the implementation of a warning app prototype. The prototype combines the identified advantages of the apps evaluated in the study, containing warnings and all-clear, recommendations for action, functions to contact friends and helpers. The contributions of this work are findings on the distribution of crisis apps in Europe and Germany (both 16\%), the kinds of crisis apps used (mostly weather and warning apps), and empirically based requirements for warning apps which can be integrated in further developments of existing apps and a prototype for such an app.},
booktitle = {European {Conference} on {Information} {Systems} ({ECIS})},
publisher = {AIS},
author = {Reuter, Christian and Kaufhold, Marc-André and Leopold, Inken and Knipp, Hannah},
year = {2017},
keywords = {Crisis, HCI, Peace, A-Paper, Ranking-CORE-A, Student, Ranking-WKWI-A, Projekt-EmerGent, Projekt-KontiKat, Ranking-VHB-B},
pages = {2187--2201},
}
[BibTeX] [Abstract] [Download PDF]
Various studies show that social media is used in emergencies – and that in spite of possible challenges for emergency services, beneficial use cases can be identified. However, relatively little empirical data is available regarding the attitudes of emergency services towards social media, and almost none of a comparative nature. This article summarizes the findings of a survey conducted of the EU project ‘EmerGent’ with 761 emergency service staff across 32 European countries from September to December 2014. The main aims of the survey were to explore the attitudes expressed by emergency service staff towards social media for private and organizational use as well as the levels and main factors influencing the current and likely future use of social media in their organizations. Based on our results, we discuss possible enhancements of the emergency management cycle using social media.
@article{reuterEmergencyServicesAttitudes2016,
title = {Emergency {Services} {Attitudes} towards {Social} {Media}: {A} {Quantitative} and {Qualitative} {Survey} across {Europe}},
volume = {95},
url = {https://peasec.de/paper/2016/2016_ReuterLudwigKaufholdSpielhofer_EmergencyServicesAttiudesSurveySocialMedia_IJHCS.pdf},
doi = {10.1016/j.ijhcs.2016.03.005},
abstract = {Various studies show that social media is used in emergencies – and that in spite of possible challenges for emergency services, beneficial use cases can be identified. However, relatively little empirical data is available regarding the attitudes of emergency services towards social media, and almost none of a comparative nature. This article summarizes the findings of a survey conducted of the EU project ‘EmerGent' with 761 emergency service staff across 32 European countries from September to December 2014. The main aims of the survey were to explore the attitudes expressed by emergency service staff towards social media for private and organizational use as well as the levels and main factors influencing the current and likely future use of social media in their organizations. Based on our results, we discuss possible enhancements of the emergency management cycle using social media.},
journal = {International Journal on Human-Computer Studies (IJHCS)},
author = {Reuter, Christian and Ludwig, Thomas and Kaufhold, Marc-André and Spielhofer, Thomas},
year = {2016},
keywords = {Crisis, HCI, A-Paper, Ranking-CORE-A, Ranking-ImpactFactor, SocialMedia, AuswahlCrisis, Selected, Projekt-EmerGent, Ranking-WKWI-B, AuswahlKaufhold},
pages = {96--111},
}
CORE-B
[BibTeX] [Abstract] [Download PDF]
Computer Emergency Response Teams provide advisory, preventive, and reactive cybersecurity services for authorities, citizens, and businesses. However, their responsibility of establishing cyber situational awareness by monitoring and analyzing security advisories and vulnerabilities has become challenging due to the growing volume of information disseminated through public channels. Thus, this paper presents the preliminary design of a system for automatically retrieving and extracting security advisory documents from Common Security Advisory Framework (CSAF), HTML, and RSS sources. The evaluation with various security advisory sources (N=53) shows that the developed system can retrieve 90\% of the published advisory documents, which is a significant improvement over systems only relying on the retrieval from RSS feeds (30\%).
@inproceedings{kaufhold_advisoryhub_2025,
address = {Cham},
title = {{AdvisoryHub}: {Design} and {Evaluation} of a {Cross}-{Platform} {Security} {Advisory} {System} for {Cyber} {Situational} {Awareness}},
isbn = {978-3-032-00627-1},
url = {https://www.peasec.de/paper/2025/2025_KaufholdBäumlerKoukalReuter_SecurityAdvisoryExtractionSystem_ARES.pdf},
doi = {10.1007/978-3-032-00627-1_3},
abstract = {Computer Emergency Response Teams provide advisory, preventive, and reactive cybersecurity services for authorities, citizens, and businesses. However, their responsibility of establishing cyber situational awareness by monitoring and analyzing security advisories and vulnerabilities has become challenging due to the growing volume of information disseminated through public channels. Thus, this paper presents the preliminary design of a system for automatically retrieving and extracting security advisory documents from Common Security Advisory Framework (CSAF), HTML, and RSS sources. The evaluation with various security advisory sources (N=53) shows that the developed system can retrieve 90\% of the published advisory documents, which is a significant improvement over systems only relying on the retrieval from RSS feeds (30\%).},
language = {en},
booktitle = {Proceedings of the 20th {International} {Conference} on {Availability}, {Reliability} and {Security} ({ARES} 2025)},
publisher = {Springer Nature Switzerland},
author = {Kaufhold, Marc-André and Bäumler, Julian and Koukal, Nicolai and Reuter, Christian},
editor = {Dalla Preda, Mila and Schrittwieser, Sebastian and Naessens, Vincent and De Sutter, Bjorn},
year = {2025},
keywords = {HCI, Projekt-ATHENE-CyAware, UsableSec, Projekt-CYLENCE, Ranking-CORE-B, HabilitationKaufhold},
pages = {47--68},
}
[BibTeX] [Abstract] [Download PDF]
Computer Security Incident Response Teams (CSIRTs) face increasing challenges processing the growing volume of security-related information. Daily manual analysis of threat reports, security advisories, and vulnerability announcements leads to information overload, contributing to burnout and attrition among security professionals. Clustering such information to cope with the initial information volume and enables security professionals to grasp the current overview of the situation more easily and decide on actions. This work evaluates 196 combinations of clustering algorithms and embedding models across five security-related datasets to identify optimal approaches for automated information consolidation. We demonstrate that clustering can reduce information overload by over 90 \% while maintaining semantic coherence. Our evaluation indicates a minimal need of configuration to successfully cluster information within a reasonable timespan on consumer hardware. The findings suggest that clustering approaches can significantly enhance CSIRT operational efficiency while maintaining analytical integrity. However, complex threat reports require careful parameter tuning to achieve acceptable performance, indicating areas for future optimization (The code is made publicly available at the following URL: https://github.com/PEASEC/reducing-information-overload)
@inproceedings{kuehn_reducing_2025,
address = {Cham},
title = {Reducing {Information} {Overload}: {Because} {Even} {Security} {Experts} {Need} to {Blink}},
isbn = {978-3-032-00633-2},
shorttitle = {Reducing {Information} {Overload}},
url = {https://link.springer.com/chapter/10.1007/978-3-032-00633-2_9},
doi = {10.1007/978-3-032-00633-2_9},
abstract = {Computer Security Incident Response Teams (CSIRTs) face increasing challenges processing the growing volume of security-related information. Daily manual analysis of threat reports, security advisories, and vulnerability announcements leads to information overload, contributing to burnout and attrition among security professionals. Clustering such information to cope with the initial information volume and enables security professionals to grasp the current overview of the situation more easily and decide on actions. This work evaluates 196 combinations of clustering algorithms and embedding models across five security-related datasets to identify optimal approaches for automated information consolidation. We demonstrate that clustering can reduce information overload by over 90 \% while maintaining semantic coherence. Our evaluation indicates a minimal need of configuration to successfully cluster information within a reasonable timespan on consumer hardware. The findings suggest that clustering approaches can significantly enhance CSIRT operational efficiency while maintaining analytical integrity. However, complex threat reports require careful parameter tuning to achieve acceptable performance, indicating areas for future optimization (The code is made publicly available at the following URL: https://github.com/PEASEC/reducing-information-overload)},
language = {en},
booktitle = {International {Conference} on {Availability}, {Reliability} and {Security} ({ARES} 2025)},
publisher = {Springer Nature Switzerland},
author = {Kuehn, Philipp and Bayer, Markus and Frey, Tobias and Kerk, Moritz and Reuter, Christian},
editor = {Coppens, Bart and Volckaert, Bruno and Naessens, Vincent and De Sutter, Bjorn},
year = {2025},
keywords = {Projekt-ATHENE-CyAware, Student, Security, UsableSec, Projekt-CYWARN, Ranking-CORE-B},
pages = {139--155},
}
[BibTeX] [Abstract] [Download PDF]
The negotiation of stakeholder values as a collaborative process throughout technology development has been studied extensively within the fields of Computer Supported Cooperative Work and Human-Computer Interaction. Despite their increasing significance for cybersecurity incident response, there is a gap in research on values of importance to the design of open-source intelligence (OSINT) technologies for this purpose. In this paper, we investigate which values and value conflicts emerge due to the application and development of machine learning (ML) based OSINT technologies to assist cyber security incident response operators. For this purpose, we employ a triangulation of methods, consisting of a systematic survey of the technical literature on the development of OSINT artefacts for cybersecurity (N = 73) and an empirical value sensitive design case study, comprising semi-structured interviews with stakeholders (N = 9) as well as a focus group (N = 7) with developers. Based on our results, we identify implications relevant to the research on and design of OSINT artefacts for cybersecurity incident response.
@article{riebeValuesValueConflicts2023,
title = {Values and {Value} {Conflicts} in the {Context} of {OSINT} {Technologies} for {Cybersecurity} {Incident} {Response}: {A} {Value} {Sensitive} {Design} {Perspective}},
url = {https://link.springer.com/article/10.1007/s10606-022-09453-4},
doi = {10.1007/s10606-022-09453-4},
abstract = {The negotiation of stakeholder values as a collaborative process throughout technology development has been studied extensively within the fields of Computer Supported Cooperative Work and Human-Computer Interaction. Despite their increasing significance for cybersecurity incident response, there is a gap in research on values of importance to the design of open-source intelligence (OSINT) technologies for this purpose. In this paper, we investigate which values and value conflicts emerge due to the application and development of machine learning (ML) based OSINT technologies to assist cyber security incident response operators. For this purpose, we employ a triangulation of methods, consisting of a systematic survey of the technical literature on the development of OSINT artefacts for cybersecurity (N = 73) and an empirical value sensitive design case study, comprising semi-structured interviews with stakeholders (N = 9) as well as a focus group (N = 7) with developers. Based on our results, we identify implications relevant to the research on and design of OSINT artefacts for cybersecurity incident response.},
journal = {Computer Supported Cooperative Work: The Journal of Collaborative Computing (JCSCW)},
author = {Riebe, Thea and Bäumler, Julian and Kaufhold, Marc-André and Reuter, Christian},
year = {2023},
keywords = {HCI, A-Paper, Ranking-ImpactFactor, Student, Security, UsableSec, Projekt-CROSSING, Projekt-ATHENE-SecUrban, Projekt-CYWARN, Ranking-CORE-B},
}
[BibTeX] [Abstract] [Download PDF]
From the perspective of end-users, IoT devices behave like a black box: As long as they work as intended, users will not detect any compromise. Users have minimal control over the software. Hence, it is very likely that the user misses that illegal recordings and transmissions occur if a security camera or a smart speaker is hacked. In this paper, we present SCAtt-man, the first remote attestation scheme that is specifically designed with the user in mind. SCAtt-man deploys software-based attestation to check the integrity of remote devices, allowing users to verify the integrity of IoT devices with their smartphones. The key novelty of SCAtt-man resides in the utilization of user-observable side-channels such as light or sound in the attestation protocol. Our proof-of-concept implementation targets a smart speaker and an attestation protocol that is based on a data-over-sound protocol. Our evaluation demonstrates the effectiveness of toolname against a variety of attacks and its usability based on a user study with 20 participants.
@inproceedings{surminskiSCAttmanSideChannelBasedRemote2023,
address = {New York, NY, USA},
series = {{CODASPY} '23},
title = {{SCAtt}-man: {Side}-{Channel}-{Based} {Remote} {Attestation} for {Embedded} {Devices} that {Users} {Understand}},
isbn = {979-8-4007-0067-5},
url = {https://peasec.de/paper/2023/2023_SurminskiNieslerLinsnerDaviReuter_SideChannelBasedRemoteAttestation_CODASPY.pdf},
doi = {10.1145/3577923.3583652},
abstract = {From the perspective of end-users, IoT devices behave like a black box: As long as they work as intended, users will not detect any compromise. Users have minimal control over the software. Hence, it is very likely that the user misses that illegal recordings and transmissions occur if a security camera or a smart speaker is hacked. In this paper, we present SCAtt-man, the first remote attestation scheme that is specifically designed with the user in mind. SCAtt-man deploys software-based attestation to check the integrity of remote devices, allowing users to verify the integrity of IoT devices with their smartphones. The key novelty of SCAtt-man resides in the utilization of user-observable side-channels such as light or sound in the attestation protocol. Our proof-of-concept implementation targets a smart speaker and an attestation protocol that is based on a data-over-sound protocol. Our evaluation demonstrates the effectiveness of toolname against a variety of attacks and its usability based on a user study with 20 participants.},
booktitle = {Proceedings of the {Thirteenth} {ACM} {Conference} on {Data} and {Application} {Security} and {Privacy}},
publisher = {Association for Computing Machinery},
author = {Surminski, Sebastian and Niesler, Christian and Linsner, Sebastian and Davi, Lucas and Reuter, Christian},
year = {2023},
keywords = {HCI, Security, UsableSec, Projekt-CROSSING, Ranking-CORE-B},
pages = {225--236},
}
[BibTeX] [Abstract] [Download PDF]
The number of newly published vulnerabilities is constantly increasing. Until now, the information available when a new vulnerability is published is manually assessed by experts using a ()cvss vector and score. This assessment is time consuming and requires expertise. Various works already try to predict vectors or scores using machine learning based on the textual descriptions of the vulnerability to enable faster assessment. However, for this purpose, previous works only use the texts available in databases such as nvd. With this work, the publicly available web pages referenced in the nvd are analyzed and made available as sources of texts through web scraping. A dl based method for predicting the vector is implemented and evaluated. The present work provides a classification of the nvd’s reference texts based on the suitability and crawlability of their texts. While we identified the overall influence of the additional texts is negligible, we outperformed the state-of-the-art with our dl prediction models.
@article{kuehnCommonVulnerabilityScoring2023,
title = {Common vulnerability scoring system prediction based on open source intelligence information sources},
url = {https://peasec.de/paper/2023/2023_KuehnRelkeReuter_CommonVulnerabilityScoringSystemOSINT_CompSec.pdf},
doi = {10.1016/j.cose.2023.103286},
abstract = {The number of newly published vulnerabilities is constantly increasing. Until now, the information available when a new vulnerability is published is manually assessed by experts using a ()cvss vector and score. This assessment is time consuming and requires expertise. Various works already try to predict vectors or scores using machine learning based on the textual descriptions of the vulnerability to enable faster assessment. However, for this purpose, previous works only use the texts available in databases such as nvd. With this work, the publicly available web pages referenced in the nvd are analyzed and made available as sources of texts through web scraping. A dl based method for predicting the vector is implemented and evaluated. The present work provides a classification of the nvd’s reference texts based on the suitability and crawlability of their texts. While we identified the overall influence of the additional texts is negligible, we outperformed the state-of-the-art with our dl prediction models.},
journal = {Computers \& Security},
author = {Kuehn, Philipp and Relke, David N. and Reuter, Christian},
year = {2023},
keywords = {Ranking-ImpactFactor, Student, Security, UsableSec, Projekt-ATHENE-SecUrban, Projekt-CYWARN, Ranking-CORE-B},
}
[BibTeX] [Abstract] [Download PDF]
Agriculture is subject to high demands regarding resilience as it is an essential component of the food production chain. In the agricultural sector, there is an increasing usage of digital tools that rely on communication and energy infrastructures. Should disruption occur, such strengthened dependencies on other infrastructures increase the probability of ripple effects. Thus, there is a need to analyze the resilience of the agricultural sector with a specific focus on the effects of digitalization. This study works out resilience capacities of the interconnected technologies used in farm systems based on the experiences and opinions of farmers. Information was gathered through focus group interviews with farmers (N = 52) and a survey with participants from the agricultural sector (N = 118). In particular, the focus is put on the digital tools and other information and communication technologies they use. Based on a definition of resilience capacities, we evaluate resilience regarding energy and communication demands in various types of farm systems. Especially important are the resilience aspects of modern systems’ digital communication as well as the poorly developed and nonresilient network infrastructure in rural areas that contrast with the claim for a resilient agriculture. The result is a low robustness capacity, as our analysis concludes with the risk of food production losses.
@article{kuntkeResilienceAgricultureCommunication2022,
title = {Resilience in {Agriculture}: {Communication} and {Energy} {Infrastructure} {Dependencies} of {German} {Farmers}},
volume = {13},
issn = {2192-6395},
url = {https://link.springer.com/article/10.1007/s13753-022-00404-7},
doi = {10.1007/s13753-022-00404-7},
abstract = {Agriculture is subject to high demands regarding resilience as it is an essential component of the food production chain. In the agricultural sector, there is an increasing usage of digital tools that rely on communication and energy infrastructures. Should disruption occur, such strengthened dependencies on other infrastructures increase the probability of ripple effects. Thus, there is a need to analyze the resilience of the agricultural sector with a specific focus on the effects of digitalization. This study works out resilience capacities of the interconnected technologies used in farm systems based on the experiences and opinions of farmers. Information was gathered through focus group interviews with farmers (N = 52) and a survey with participants from the agricultural sector (N = 118). In particular, the focus is put on the digital tools and other information and communication technologies they use. Based on a definition of resilience capacities, we evaluate resilience regarding energy and communication demands in various types of farm systems. Especially important are the resilience aspects of modern systems’ digital communication as well as the poorly developed and nonresilient network infrastructure in rural areas that contrast with the claim for a resilient agriculture. The result is a low robustness capacity, as our analysis concludes with the risk of food production losses.},
number = {2},
journal = {International Journal of Disaster Risk Science (IJDRS)},
author = {Kuntke, Franz and Linsner, Sebastian and Steinbrink, Enno and Franken, Jonas and Reuter, Christian},
month = apr,
year = {2022},
keywords = {A-Paper, Ranking-ImpactFactor, Security, Projekt-GRKPrivacy, Projekt-AgriRegio, Projekt-GeoBox, RSF, Selected, Projekt-HyServ, Ranking-CORE-B},
pages = {214--229},
}
[BibTeX] [Abstract] [Download PDF]
Social media have an enormous impact on modern life but are prone to the dissemination of false information. In several domains, such as crisis management or political communication, it is of utmost importance to detect false and to promote credible information. Although educational measures might help individuals to detect false information, the sheer volume of social big data, which sometimes need to be anal- ysed under time-critical constraints, calls for automated and (near) real- time assessment methods. Hence, this paper reviews existing approaches before designing and evaluating three deep learning models (MLP, RNN, BERT) for real-time credibility assessment using the example of Twitter posts. While our BERT implementation achieved best results with an accuracy of up to 87.07\% and an F1 score of 0.8764 when using meta- data, text, and user features, MLP and RNN showed lower classification quality but better performance for real-time application. Furthermore, the paper contributes with a novel dataset for credibility assessment.
@inproceedings{kaufhold_design_2021,
address = {Bratislava},
title = {Design and {Evaluation} of {Deep} {Learning} {Models} for {Real}-{Time} {Credibility} {Assessment} in {Twitter}},
url = {https://peasec.de/paper/2021/2021_KaufholdBayerHartungReuter_DeepLearningCredibilityAssessmentTwitter_ICANN.pdf},
doi = {10.1007/978-3-030-86383-8_32},
abstract = {Social media have an enormous impact on modern life but are prone to the dissemination of false information. In several domains, such as crisis management or political communication, it is of utmost importance to detect false and to promote credible information. Although educational measures might help individuals to detect false information, the sheer volume of social big data, which sometimes need to be anal- ysed under time-critical constraints, calls for automated and (near) real- time assessment methods. Hence, this paper reviews existing approaches before designing and evaluating three deep learning models (MLP, RNN, BERT) for real-time credibility assessment using the example of Twitter posts. While our BERT implementation achieved best results with an accuracy of up to 87.07\% and an F1 score of 0.8764 when using meta- data, text, and user features, MLP and RNN showed lower classification quality but better performance for real-time application. Furthermore, the paper contributes with a novel dataset for credibility assessment.},
booktitle = {30th {International} {Conference} on {Artificial} {Neural} {Networks} ({ICANN} 2021)},
author = {Kaufhold, Marc-André and Bayer, Markus and Hartung, Daniel and Reuter, Christian},
year = {2021},
keywords = {Student, Security, Projekt-ATHENE-SecUrban, Projekt-CYWARN, Ranking-CORE-B, HabilitationKaufhold},
pages = {1--13},
}
[BibTeX] [Abstract] [Download PDF]
Vulnerability databases are one of the main information sources for IT security experts. Hence, the quality of their information is of utmost importance for anyone working in this area. Previous work has shown that machine readable information is either missing, incorrect, or inconsistent with other data sources. In this paper, we introduce a system called Overt Vulnerability source ANAlysis (OVANA), utilizing state-of-the-art machine learning (ML) and natural-language processing (NLP) techniques, which analyzes the information quality (IQ) of vulnerability databases, searches the free-form description for relevant information missing from structured fields, and updates it accordingly. Our paper shows that OVANA is able to improve the IQ of the National Vulnerability Database by 51.23\% based on the indicators of accuracy, completeness, and uniqueness. Moreover, we present information which should be incorporated into the structured fields to increase the uniqueness of vulnerability entries and improve the discriminability of different vulnerability entries. The identified information from OVANA enables a more targeted vulnerability search and provides guidance for IT security experts in finding relevant information in vulnerability descriptions for severity assessment.
@inproceedings{kuehnOVANAApproachAnalyze2021,
title = {{OVANA}: {An} {Approach} to {Analyze} and {Improve} the {Information} {Quality} of {Vulnerability} {Databases}},
isbn = {978-1-4503-9051-4},
url = {https://peasec.de/paper/2021/2021_KuehnBayerWendelbornReuter_OVANAQualityVulnerabilityDatabases_ARES.pdf},
doi = {10.1145/3465481.3465744},
abstract = {Vulnerability databases are one of the main information sources for IT security experts. Hence, the quality of their information is of utmost importance for anyone working in this area. Previous work has shown that machine readable information is either missing, incorrect, or inconsistent with other data sources. In this paper, we introduce a system called Overt Vulnerability source ANAlysis (OVANA), utilizing state-of-the-art machine learning (ML) and natural-language processing (NLP) techniques, which analyzes the information quality (IQ) of vulnerability databases, searches the free-form description for relevant information missing from structured fields, and updates it accordingly. Our paper shows that OVANA is able to improve the IQ of the National Vulnerability Database by 51.23\% based on the indicators of accuracy, completeness, and uniqueness. Moreover, we present information which should be incorporated into the structured fields to increase the uniqueness of vulnerability entries and improve the discriminability of different vulnerability entries. The identified information from OVANA enables a more targeted vulnerability search and provides guidance for IT security experts in finding relevant information in vulnerability descriptions for severity assessment.},
booktitle = {Proceedings of the 16th {International} {Conference} on {Availability}, {Reliability} and {Security} ({ARES} 2021)},
publisher = {ACM},
author = {Kuehn, Philipp and Bayer, Markus and Wendelborn, Marc and Reuter, Christian},
year = {2021},
keywords = {Peace, Security, Projekt-ATHENE-SecUrban, Projekt-CYWARN, Ranking-CORE-B},
pages = {1--11},
}
[BibTeX] [Abstract] [Download PDF]
Phishing is a prevalent cyber threat, targeting individuals and organizations alike. Previous approaches on anti-phishing measures have started to recognize the role of the user, who, at the center of the target, builds the last line of defense. However, user-oriented phishing interventions are fragmented across a diverse research landscape, which has not been systematized to date. This makes it challenging to gain an overview of the various approaches taken by prior works. In this paper, we present a taxonomy of phishing interventions based on a systematic literature analysis. We shed light on the diversity of existing approaches by analyzing them with respect to the intervention type, the addressed phishing attack vector, the time at which the intervention takes place, and the required user interaction. Furthermore, we highlight shortcomings and challenges emerging from both our literature sample and prior meta-analyses, and discuss them in the light of current movements in the field of usable security. With this article, we hope to provide useful directions for future works on phishing interventions.
@inproceedings{franzStillPlentyPhish2021,
title = {{SoK}: {Still} {Plenty} of {Phish} in the {Sea} — {A} {Review} of {User}-{Oriented} {Phishing} {Interventions} and {Avenues} for {Future} {Research}},
isbn = {978-1-939133-25-0},
url = {https://www.usenix.org/system/files/soups2021-franz.pdf},
abstract = {Phishing is a prevalent cyber threat, targeting individuals and
organizations alike. Previous approaches on anti-phishing
measures have started to recognize the role of the user, who,
at the center of the target, builds the last line of defense.
However, user-oriented phishing interventions are fragmented
across a diverse research landscape, which has not been
systematized to date. This makes it challenging to gain an
overview of the various approaches taken by prior works.
In this paper, we present a taxonomy of phishing interventions
based on a systematic literature analysis. We shed light
on the diversity of existing approaches by analyzing them
with respect to the intervention type, the addressed phishing
attack vector, the time at which the intervention takes place,
and the required user interaction. Furthermore, we highlight
shortcomings and challenges emerging from both our literature
sample and prior meta-analyses, and discuss them in
the light of current movements in the field of usable security.
With this article, we hope to provide useful directions for
future works on phishing interventions.},
booktitle = {{USENIX} {Symposium} on {Usable} {Privacy} and {Security} ({SOUPS})},
author = {Franz, Anjuli and Albrecht, Gregor and Zimmermann, Verena and Hartwig, Katrin and Reuter, Christian and Benlian, Alexander and Vogt, Joachim},
year = {2021},
keywords = {Security, UsableSec, Projekt-CROSSING, AuswahlUsableSec, Ranking-CORE-B},
}
[BibTeX] [Abstract] [Download PDF]
Receiving relevant information on possible cyber threats, attacks, and data breaches in a timely manner is crucial for early response. The social media platform Twitter hosts an active cyber security community. Their activities are often monitored manually by security experts, such as Computer Emergency Response Teams (CERTs). We thus propose a Twitter-based alert generation system that issues alerts to a system operator as soon as new relevant cyber security related topics emerge. Thereby, our system allows us to monitor user accounts with significantly less workload. Our system applies a supervised classifier, based on active learning, that detects tweets containing relevant information. The results indicate that uncertainty sampling can reduce the amount of manual relevance classification effort and enhance the classifier performance substantially compared to random sampling. Our approach reduces the number of accounts and tweets that are needed for the classifier training, thus making the tool easily and rapidly adaptable to the specific context while also supporting data minimization for Open Source Intelligence (OSINT). Relevant tweets are clustered by a greedy stream clustering algorithm in order to identify significant events. The proposed system is able to work near real-time within the required 15-minutes time frame and detects up to 93.8\% of relevant events with a false alert rate of 14.81\%.
@inproceedings{riebeCySecAlertAlertGeneration2021,
title = {{CySecAlert}: {An} {Alert} {Generation} {System} for {Cyber} {Security} {Events} {Using} {Open} {Source} {Intelligence} {Data}},
url = {https://peasec.de/paper/2021/2021_RiebeWirthBayerKuehnKaufholdKnautheGutheReuter_CySecAlertOpenSourceIntelligence_ICICS.pdf},
doi = {10.1007/978-3-030-86890-1_24},
abstract = {Receiving relevant information on possible cyber threats, attacks, and data breaches in a timely manner is crucial for early response. The social media platform Twitter hosts an active cyber security community. Their activities are often monitored manually by security experts, such as Computer Emergency Response Teams (CERTs). We thus propose a Twitter-based alert generation system that issues alerts to a system operator as soon as new relevant cyber security related topics emerge. Thereby, our system allows us to monitor user accounts with significantly less workload. Our system applies a supervised classifier, based on active learning, that detects tweets containing relevant information. The results indicate that uncertainty sampling can reduce the amount of manual relevance classification effort and enhance the classifier performance substantially compared to random sampling. Our approach reduces the number of accounts and tweets that are needed for the classifier training, thus making the tool easily and rapidly adaptable to the specific context while also supporting data minimization for Open Source Intelligence (OSINT). Relevant tweets are clustered by a greedy stream clustering algorithm in order to identify significant events. The proposed system is able to work near real-time within the required 15-minutes time frame and detects up to 93.8\% of relevant events with a false alert rate of 14.81\%.},
booktitle = {Information and {Communications} {Security} ({ICICS})},
author = {Riebe, Thea and Wirth, Tristan and Bayer, Markus and Kuehn, Philipp and Kaufhold, Marc-André and Knauthe, Volker and Guthe, Stefan and Reuter, Christian},
year = {2021},
keywords = {Student, Security, UsableSec, Projekt-ATHENE-SecUrban, Projekt-CYWARN, Ranking-CORE-B},
pages = {429--446},
}
[BibTeX] [Abstract] [Download PDF]
Digitalization and interconnectedness, facilitated by the Internet of Things (IoT) and the widespread distribution of mobile devices, can be used to tackle important societal challenges. This is maybe most prominently visible in the response to the COVID-2019 Pandemic. However, the design of mobile technology, functionality and underlying infrastructures must be resilient against disruptions caused by man-made (e.g. bombings, hacking) and natural (e.g. earthquakes, hurricanes) crises, emergencies and threats. To explore challenges, designs and potentials of interactive technologies, this workshop investigates the overlapping space of mobile technologies and resilient systems, including future application domains such as smart cities.
@inproceedings{reuterMobileResilienceDesigning2020,
title = {Mobile {Resilience}: {Designing} {Mobile} {Interactive} {Systems} for {Societal} and {Technical} {Resilience}},
url = {http://www.peasec.de/paper/2020/2020_ReuterKaufholdComesKnodtMuehlhaeuser_MobileResilience_MobileHCI.pdf},
doi = {10.1145/3406324.3424590},
abstract = {Digitalization and interconnectedness, facilitated by the Internet of Things (IoT) and the widespread distribution of mobile devices, can be used to tackle important societal challenges. This is maybe most prominently visible in the response to the COVID-2019 Pandemic. However, the design of mobile technology, functionality and underlying infrastructures must be resilient against disruptions caused by man-made (e.g. bombings, hacking) and natural (e.g. earthquakes, hurricanes) crises, emergencies and threats. To explore challenges, designs and potentials of interactive technologies, this workshop investigates the overlapping space of mobile technologies and resilient systems, including future application domains such as smart cities.},
booktitle = {{MobileHCI} '20: 22nd {International} {Conference} on {Human}-{Computer} {Interaction} with {Mobile} {Devices} and {Services}},
author = {Reuter, Christian and Kaufhold, Marc-André and Comes, Tina and Knodt, Michèle and Mühlhäuser, Max},
year = {2020},
keywords = {Crisis, HCI, Projekt-emergenCITY, SocialMedia, Projekt-ATHENE-SecUrban, Projekt-CYWARN, Ranking-CORE-B},
pages = {1--3},
}
[BibTeX] [Abstract] [Download PDF]
In this paper, we explore a specialized type of knowledge, “nomadic knowledge” to understand its implications in knowledge sharing process. Nomadic knowledge is enacted in a discontinuous pattern with a changing set of actors and further flows on a definedtrajectory. This knowledge is quite important but is required sporadically, so it has a varying level of importance for stakeholders at different instances of time. The limited interest of knowledge holders after the creation of knowledge makes the knowledge sharing processcomplex. Furthermore, new sets of actors overloaded with tasks often ignore the knowledge sharing aspect due to the urgency of tasks at hand. Using a long-term field study we describe a particular practice that is not well supported technologically. The objective of this paper is to outline the concept of nomadic knowledge and associated implications, so that respective practices can be supported by the knowledge management community with appropriate technology.
@article{saeedNomadicKnowledgeSharing2019,
title = {Nomadic {Knowledge} {Sharing} {Practices} and {Challenges}: {Findings} from a {Long}-term {Case} {Study}},
volume = {7},
url = {https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=8715497},
doi = {10.1109/ACCESS.2019.2916903},
abstract = {In this paper, we explore a specialized type of knowledge, "nomadic knowledge" to understand its implications in knowledge sharing process. Nomadic knowledge is enacted in a discontinuous pattern with a changing set of actors and further flows on a definedtrajectory. This knowledge is quite important but is required sporadically, so it has a varying level of importance for stakeholders at different instances of time. The limited interest of knowledge holders after the creation of knowledge makes the knowledge sharing processcomplex. Furthermore, new sets of actors overloaded with tasks often ignore the knowledge sharing aspect due to the urgency of tasks at hand. Using a long-term field study we describe a particular practice that is not well supported technologically. The objective of this paper is to outline the concept of nomadic knowledge and associated implications, so that respective practices can be supported by the knowledge management community with appropriate technology.},
number = {1},
journal = {IEEE Access},
author = {Saeed, Saqib and Pipek, Volkmar and Rohde, Markus and Reuter, Christian and Pinatti De Carvalho, Aparecido Fabiano and Wulf, Volker},
year = {2019},
keywords = {HCI, A-Paper, Ranking-ImpactFactor, Ranking-CORE-B, Cooperation},
pages = {63564--63577},
}
[BibTeX] [Abstract] [Download PDF]
On-site work of emergency service teams consists of highly cooperative tasks. Especially during distributed search and rescue tasks there is a constant mix of routinized and non-routinized activities. Within this paper we focus on the work practices of the German Red Cross Rescue Dog Units who deal with several uncertainties regarding the involved dogs, the fragility of the respective situations as well as issues of using technologies under enormous time pressure. Smart glasses provide possibilities for enhanced and hands-free interaction in various contexts and a number of approaches have already been applied, aiming at efficient use of the respective technological innovation in private and professional contexts. However, the collaborative potential of smart glasses in time-critical and uncertain situations is still unexplored. Our design case study examines how the on-site work of emergency service teams can be supported by smart glasses: Based on examining the work practices of the German Red Cross Rescue Dogs, we introduce ‘RescueGlass’ as a coordinative concept, encompassing hands-free head-mounted display (HMD) application as well as a corresponding smartphone application. Finally, we describe the evaluation of its use in the field of emergency response and management. We show how current features such as ‘fog of war’ or various sensors support the cooperative practices of dog handlers, and outline current technical limitations offering future research questions. Our paper provides an initial design probe using smart glasses to engage in the field of collaborative professional mobile tasks.
@article{reuterRescueGlassCollaborativeApplications2019,
title = {{RescueGlass}: {Collaborative} {Applications} involving {Head}-{Mounted} {Displays} for {Red} {Cross} {Rescue} {Dog} {Units}},
volume = {28},
url = {http://www.peasec.de/paper/2019/2019_ReuterLudwigMischur_RescueGlass_JCSCW.pdf},
doi = {10.1007/s10606-018-9339-8},
abstract = {On-site work of emergency service teams consists of highly cooperative tasks. Especially during distributed search and rescue tasks there is a constant mix of routinized and non-routinized activities. Within this paper we focus on the work practices of the German Red Cross Rescue Dog Units who deal with several uncertainties regarding the involved dogs, the fragility of the respective situations as well as issues of using technologies under enormous time pressure. Smart glasses provide possibilities for enhanced and hands-free interaction in various contexts and a number of approaches have already been applied, aiming at efficient use of the respective technological innovation in private and professional contexts. However, the collaborative potential of smart glasses in time-critical and uncertain situations is still unexplored. Our design case study examines how the on-site work of emergency service teams can be supported by smart glasses: Based on examining the work practices of the German Red Cross Rescue Dogs, we introduce ‘RescueGlass' as a coordinative concept, encompassing hands-free head-mounted display (HMD) application as well as a corresponding smartphone application. Finally, we describe the evaluation of its use in the field of emergency response and management. We show how current features such as ‘fog of war' or various sensors support the cooperative practices of dog handlers, and outline current technical limitations offering future research questions. Our paper provides an initial design probe using smart glasses to engage in the field of collaborative professional mobile tasks.},
number = {1-2},
journal = {Computer Supported Cooperative Work: The Journal of Collaborative Computing (JCSCW)},
author = {Reuter, Christian and Ludwig, Thomas and Mischur, Patrick},
year = {2019},
keywords = {Crisis, HCI, A-Paper, Ranking-ImpactFactor, Security, UsableSec, Infrastructure, Projekt-KontiKat, Projekt-KOKOS, Ranking-VHB-B, Ranking-CORE-B, Cooperation},
pages = {209--246},
}
[BibTeX] [Abstract] [Download PDF]
Since the terrorist attacks of 9/11, the use of social media in emergency and crisis events has greatly increased and many studies have concentrated on the use of ICT and social media be-fore, during or after these events. The field of research that these studies fall under is called cri-sis informatics. In this paper, we evaluate and analyze crisis informatics research by looking at case studies of social media use in emergencies, outlining the types of research found in crisis informatics, and expounding upon the forms of interaction that have been researched. Finally, we summarize the achievements from an HCI perspective and outline trends and challenges for future research.
@article{reuterSocialMediaCrisis2018,
title = {Social {Media} in {Crisis} {Management}: {An} {Evaluation} and {Analysis} of {Crisis} {Informatics} {Research}},
volume = {34},
url = {http://www.peasec.de/paper/2018/2018_ReuterHughesKaufhold_SocialMediaCrisisManagementEvaluation_IJHCI.pdf},
doi = {10.1080/10447318.2018.1427832},
abstract = {Since the terrorist attacks of 9/11, the use of social media in emergency and crisis events has greatly increased and many studies have concentrated on the use of ICT and social media be-fore, during or after these events. The field of research that these studies fall under is called cri-sis informatics. In this paper, we evaluate and analyze crisis informatics research by looking at case studies of social media use in emergencies, outlining the types of research found in crisis informatics, and expounding upon the forms of interaction that have been researched. Finally, we summarize the achievements from an HCI perspective and outline trends and challenges for future research.},
number = {4},
journal = {International Journal on Human-Computer Interaction (IJHCI)},
author = {Reuter, Christian and Hughes, Amanda Lee and Kaufhold, Marc-André},
year = {2018},
keywords = {Crisis, HCI, Peace, A-Paper, Ranking-ImpactFactor, SocialMedia, AuswahlCrisis, Selected, Projekt-KontiKat, Ranking-WKWI-B, Ranking-CORE-B},
pages = {280--294},
}
[BibTeX] [Abstract] [Download PDF]
Social media is gaining more and more importance in crisis management: “Social media continue to evolve, and so does their use in emergency and crisis events” (Reuter et al., 2018). Related research is sometimes called “crisis informatics” (Palen et al., 2009). This special issue was initiated based on the track “Social Media Studies” at previous ISCRAM (Information Systems for Crisis Response and Management) conferences. It is usually one of the tracks with the most submissions, however we (successfully) aimed to also invite scholars from other venues to contribute.
@article{reuterEditorialSpecialIssue2018,
title = {Editorial of the {Special} {Issue} on {Social} {Media} in {Crisis} {Management}},
volume = {34},
url = {http://www.peasec.de/paper/2018/2018_ReuterHughesHiltzImranPlotnik_EditorialSpecialIssueSocialMediaCrisisManagement_IJHCI.pdf},
doi = {10.1080/10447318.2018.1427833},
abstract = {Social media is gaining more and more importance in crisis management: “Social media continue to evolve, and so does their use in emergency and crisis events” (Reuter et al., 2018). Related research is sometimes called “crisis informatics” (Palen et al., 2009). This special issue was initiated based on the track “Social Media Studies” at previous ISCRAM (Information Systems for Crisis Response and Management) conferences. It is usually one of the tracks with the most submissions, however we (successfully) aimed to also invite scholars from other venues to contribute.},
number = {4},
journal = {International Journal on Human-Computer Interaction (IJHCI)},
author = {Reuter, Christian and Hughes, Amanda Lee and Hiltz, Starr Roxanne and Imran, Muhammad and Plotnick, Linda},
year = {2018},
keywords = {Crisis, HCI, Ranking-ImpactFactor, SocialMedia, RSF, Projekt-KontiKat, Ranking-WKWI-B, Ranking-CORE-B},
pages = {277--279},
}
[BibTeX] [Download PDF]
@book{reuterSpecialIssueSocial2018,
title = {Special {Issue} on {Social} {Media} in {Crisis} {Management} - {International} {Journal} on {Human}-{Computer} {Interaction} ({IJHCI})},
volume = {34},
url = {https://www.tandfonline.com/toc/hihc20/34/4?nav=tocList},
author = {Reuter, Christian and Hughes, Amanda Lee and Hiltz, Starr Roxanne and Imran, Muhammad and Plotnick, Linda},
year = {2018},
note = {Publication Title: International Journal on Human-Computer Interaction (IJHCI)},
keywords = {Crisis, HCI, Ranking-ImpactFactor, SocialMedia, Projekt-KontiKat, Ranking-WKWI-B, Ranking-CORE-B},
}
[BibTeX] [Abstract] [Download PDF]
In recent years, social media have increased the resources that individuals and organizations are able to mobilize for the development of socially innovative practices. In this article, we engage with a naturally occurring development in a Trentinian neighbourhood to examine the cooperative interactions amongst members of a local community. The first author and local residents of the neighbourhood participated in online discussions, decision making, and physical activities that led to material changes in the area. The interventions are motivated by and based on the concept of Social Street that combines online interactions in a closed Facebook group with face-to-face meetings seeking to practically engage the collective in accomplishing certain immediate or ongoing needs. Over the course of two years, we studied this local instantiation of Social Street in Trento, Italy by way of an action-oriented (digital) ethnography. Through this work, we demonstrate how urban neighbourhoods might benefit from hybrid forms of community engagement that are enacted through a constant back and forth between online and face-to-face interactions. We further argue that the infrastructuring of local urban collectives should follow strategies that pay attention to the multiple issues in urban neighbourhoods and people’s attachments to them. Overall, the paper reflects upon the challenges and configurations of participation that this form of community-work entails.
@article{mosconiFacebookNeighbourhoodInfrastructuring2017,
title = {From {Facebook} to the {Neighbourhood}: {Infrastructuring} of {Hybrid} {Community} {Engagement}},
volume = {26},
url = {https://link.springer.com/article/10.1007/s10606-017-9291-z},
doi = {10.1007/s10606-017-9291-z},
abstract = {In recent years, social media have increased the resources that individuals and organizations are able to mobilize for the development of socially innovative practices. In this article, we engage with a naturally occurring development in a Trentinian neighbourhood to examine the cooperative interactions amongst members of a local community. The first author and local residents of the neighbourhood participated in online discussions, decision making, and physical activities that led to material changes in the area. The interventions are motivated by and based on the concept of Social Street that combines online interactions in a closed Facebook group with face-to-face meetings seeking to practically engage the collective in accomplishing certain immediate or ongoing needs. Over the course of two years, we studied this local instantiation of Social Street in Trento, Italy by way of an action-oriented (digital) ethnography. Through this work, we demonstrate how urban neighbourhoods might benefit from hybrid forms of community engagement that are enacted through a constant back and forth between online and face-to-face interactions. We further argue that the infrastructuring of local urban collectives should follow strategies that pay attention to the multiple issues in urban neighbourhoods and people's attachments to them. Overall, the paper reflects upon the challenges and configurations of participation that this form of community-work entails.},
number = {4-6},
journal = {Computer Supported Cooperative Work: The Journal of Collaborative Computing (JCSCW)},
author = {Mosconi, Gaia and Korn, Matthias and Reuter, Christian and Tolmie, Peter and Teli, Maurizio and Pipek, Volkmar},
year = {2017},
keywords = {Crisis, HCI, A-Paper, Ranking-ImpactFactor, SocialMedia, Projekt-KOKOS, Ranking-VHB-B, Ranking-CORE-B},
pages = {959--1003},
}
[BibTeX] [Abstract] [Download PDF]
In recent years, citizens’ movements such as the Arab Spring or Euromaidan protests have clearly shown that, whenever affected — whether negatively or positively — by the state and government decisions, citizens act to deal with the shared issues. Groups of people who organize themselves to address (mainly political) issues were defined as a `public’ by the philosopher John Dewey. He believed it is necessary to improve communication to create a `Great Community’ as a cohesive group of a public. Although information and communication technologies (ICT) lead to ambivalent effects on pursuing this goal and often distract the mass of people from discussing these issues, we argue that nowadays ICT can improve communication and has the potential to foster the detection of issues and therefore promote the (trans-)formation of a public into an issue-based community. As our foundation we took a literature study covering the formation of publics and their potential to evolve into communities, as well as their interplay with technology. This formed the basis for the development of our operational model that `follows the issues’ for capturing the (trans-)formation of a public. Based on our model, we outline different perspectives on detecting shared issues as early indicators for publics based on ICT and derive implications for researching this process from a practical perspective.
@article{ludwigPublicsCommunitiesResearching2016,
title = {From {Publics} to {Communities}: {Researching} the {Path} of {Shared} {Issues} {Through} {ICT}},
volume = {25},
url = {https://www.wineme.uni-siegen.de/paper/2016/2016_ludwigreuterpipek_frompublicstocommunities_jcscw.pdf},
doi = {10.1007/s10606-016-9252-y},
abstract = {In recent years, citizens' movements such as the Arab Spring or Euromaidan protests have clearly shown that, whenever affected — whether negatively or positively — by the state and government decisions, citizens act to deal with the shared issues. Groups of people who organize themselves to address (mainly political) issues were defined as a `public' by the philosopher John Dewey. He believed it is necessary to improve communication to create a `Great Community' as a cohesive group of a public. Although information and communication technologies (ICT) lead to ambivalent effects on pursuing this goal and often distract the mass of people from discussing these issues, we argue that nowadays ICT can improve communication and has the potential to foster the detection of issues and therefore promote the (trans-)formation of a public into an issue-based community. As our foundation we took a literature study covering the formation of publics and their potential to evolve into communities, as well as their interplay with technology. This formed the basis for the development of our operational model that `follows the issues' for capturing the (trans-)formation of a public. Based on our model, we outline different perspectives on detecting shared issues as early indicators for publics based on ICT and derive implications for researching this process from a practical perspective.},
number = {2-3},
journal = {Computer Supported Cooperative Work: The Journal of Collaborative Computing (JCSCW)},
publisher = {Kluwer Academic Publishers},
author = {Ludwig, Thomas and Reuter, Christian and Pipek, Volkmar},
year = {2016},
note = {Place: Norwell, MA, USA},
keywords = {HCI, A-Paper, Ranking-ImpactFactor, SocialMedia, Projekt-EmerGent, Ranking-VHB-B, Ranking-CORE-B, Cooperation},
pages = {193--225},
}
[BibTeX] [Abstract] [Download PDF]
Emergency or crisis management, as is well-attested, is a complex management problem. A variety of agencies need to collaborate and coordinate in real-time and with an urgency that is not always present in other domains. It follows that accurate information of varying kinds (e.g. geographical and weather conditions; available skills and expertises; state-of-play; current dispositions and deployments) needs to be made available in a timely fashion to the organizations and individuals who need it. By definition, this information will come from a number of sources both within and across organizations. Large-scale events in particular necessitate collaboration with other organizations. Of course, plans and processes exist to deal with such events but the number of dynamically changing factors as well as the high number of heterogeneous organizations and the high degree of interdependency involved make it impossible to plan for all contingencies. A degree of ongoing improvisation, which typically occurs by means of a variety of information and expertise sharing practices, therefore becomes necessary. This, however, faces many challenges, such as different organizational cultures, distinct individual and coordinative work practices and discrete information systems. Our work entails an examination of the practices of information and expertise sharing, and the obstacles to it, in inter-organizational crisis management. We conceive of this as a design case study, such that we examine a problem area and its scope; conduct detailed enquiries into practice in that area, and provide design recommendations for implementation and evaluation. First, we will present the results of an empirical study of collaboration practices between organizations and public authorities with security responsibilities such as the police, fire departments, public administration and electricity network operators, mainly in scenarios of medium to large power outages in Germany. Based on these results, we will describe a concept, which was designed, implemented and evaluated as a system prototype, in two iterations. While the first iteration focuses on situation assessment, the second iteration also includes inter-organizational collaboration functionalities. Based on the findings of our evaluations with practitioners, we will discuss how to support collaboration with a particular focus on information and expertise sharing.
@article{leyInformationExpertiseSharing2014,
title = {Information and {Expertise} {Sharing} in {Inter}-{Organizational} {Crisis} {Management}},
volume = {23},
url = {https://www.wineme.uni-siegen.de/paper/2014/2014_informationsharingcrisis_jcscw.pdf},
doi = {10.1007/s10606-014-9205-2},
abstract = {Emergency or crisis management, as is well-attested, is a complex management problem. A variety of agencies need to collaborate and coordinate in real-time and with an urgency that is not always present in other domains. It follows that accurate information of varying kinds (e.g. geographical and weather conditions; available skills and expertises; state-of-play; current dispositions and deployments) needs to be made available in a timely fashion to the organizations and individuals who need it. By definition, this information will come from a number of sources both within and across organizations. Large-scale events in particular necessitate collaboration with other organizations. Of course, plans and processes exist to deal with such events but the number of dynamically changing factors as well as the high number of heterogeneous organizations and the high degree of interdependency involved make it impossible to plan for all contingencies. A degree of ongoing improvisation, which typically occurs by means of a variety of information and expertise sharing practices, therefore becomes necessary. This, however, faces many challenges, such as different organizational cultures, distinct individual and coordinative work practices and discrete information systems. Our work entails an examination of the practices of information and expertise sharing, and the obstacles to it, in inter-organizational crisis management. We conceive of this as a design case study, such that we examine a problem area and its scope; conduct detailed enquiries into practice in that area, and provide design recommendations for implementation and evaluation. First, we will present the results of an empirical study of collaboration practices between organizations and public authorities with security responsibilities such as the police, fire departments, public administration and electricity network operators, mainly in scenarios of medium to large power outages in Germany. Based on these results, we will describe a concept, which was designed, implemented and evaluated as a system prototype, in two iterations. While the first iteration focuses on situation assessment, the second iteration also includes inter-organizational collaboration functionalities. Based on the findings of our evaluations with practitioners, we will discuss how to support collaboration with a particular focus on information and expertise sharing.},
number = {4-6},
journal = {Computer Supported Cooperative Work: The Journal of Collaborative Computing (JCSCW)},
author = {Ley, Benedikt and Ludwig, Thomas and Pipek, Volkmar and Randall, Dave and Reuter, Christian and Wiedenhoefer, Torben},
year = {2014},
keywords = {Crisis, HCI, A-Paper, Ranking-ImpactFactor, Projekt-InfoStrom, Ranking-VHB-B, Ranking-CORE-B, Cooperation},
pages = {347--387},
}
[BibTeX] [Abstract] [Download PDF]
Decisions of emergency response organisations (police, fire fighters, infrastructure providers, etc.) rely on accurate and timely information. Some necessary information is integrated into control centre’s IT (weather, availability of electricity, gauge information, etc.), but almost every decision needs to be based on very specific information of the current crisis situation. Due to the unpredictable nature of a crisis, gathering this kind of information requires much improvisation and articulation work which we aim to support. We present a study on how different emergency response organisations communicate with teams on-site to generate necessary information for the coordinating instances, and we described, implemented and evaluated an interaction concept as well as a prototype to support this communication by a semi-structured request-and-report system based on Android devices. We learned that (1) the accuracy of request and reports can be improved by using an appropriate metadata structure in addition to creating multimedia-based information content, (2) requirements of trusted and fast information need to be respected in support concepts although they may even be contradictory, and (3) the coordination strategy of the emergency response organisation also shapes the way this interaction needs to be designed.
@inproceedings{ludwigWhatYouSee2013,
address = {Paphos, Cyrus},
title = {What {You} {See} {Is} {What} {I} {Need}: {Mobile} {Reporting} {Practices} in {Emergencies}},
isbn = {http://link.springer.com/chapter/10.1007/978-1-4471-5346-7\_10},
url = {http://www.peasec.de/paper/2013/2013_LudwigReuterPipek_WYSIWIN-MoRep_ECSCW.pdf},
doi = {10.1007/978-1-4471-5346-7_10},
abstract = {Decisions of emergency response organisations (police, fire fighters, infrastructure providers, etc.) rely on accurate and timely information. Some necessary information is integrated into control centre's IT (weather, availability of electricity, gauge information, etc.), but almost every decision needs to be based on very specific information of the current crisis situation. Due to the unpredictable nature of a crisis, gathering this kind of information requires much improvisation and articulation work which we aim to support. We present a study on how different emergency response organisations communicate with teams on-site to generate necessary information for the coordinating instances, and we described, implemented and evaluated an interaction concept as well as a prototype to support this communication by a semi-structured request-and-report system based on Android devices. We learned that (1) the accuracy of request and reports can be improved by using an appropriate metadata structure in addition to creating multimedia-based information content, (2) requirements of trusted and fast information need to be respected in support concepts although they may even be contradictory, and (3) the coordination strategy of the emergency response organisation also shapes the way this interaction needs to be designed.},
booktitle = {Proceedings of the {European} {Conference} on {Computer} {Supported} {Cooperative} {Work} ({ECSCW})},
publisher = {Springer},
author = {Ludwig, Thomas and Reuter, Christian and Pipek, Volkmar},
editor = {Bertelsen, Olav W. and Ciolfi, Luigina and Grasso, Antonietta and Papadopoulos, George Angelos},
year = {2013},
keywords = {Crisis, HCI, A-Paper, Projekt-InfoStrom, Ranking-CORE-B, Cooperation},
pages = {181--206},
}
Hoher Impact-Factor (A*, A, B)
[BibTeX] [Abstract]
Racism extends into the digital realm, manifesting in various forms of technology-facilitated violence (TFV). Although much research centers on the Global North, it is es-sential to investigate this issue in other settings, such as Colombia, where activists are par-ticularly vulnerable to TFV. This study enriches the debate with a qualitative approach, conducting 18 interviews with activists from Chocó and Bogotá. The literature on race and TFV reveals that technology can exacerbate racism through social media, like anonymity, and introduce new forms of racist violence, including deepfakes and algorithmic bias. However, these forms were not prevalent in our interviews. For activists, structural racism, especially limited internet, and electricity access emerged as a primary factor in their ex-periences with racist TFV. Overt TFV escalates to offline threats, silencing dissenting voices. This research emphasizes the need to understand TFV within non-Western regions, advocating for nuanced approaches to addressing digital racism in diverse contexts.
@article{CabanzoValencia2025,
title = {Race, ethnicity, and technology-facilitated violence: {The} experience of activists in chocó, colombia},
doi = {10.1177/14614448251344286},
abstract = {Racism extends into the digital realm, manifesting in various forms of technology-facilitated violence (TFV). Although much research centers on the Global North, it is es-sential to investigate this issue in other settings, such as Colombia, where activists are par-ticularly vulnerable to TFV. This study enriches the debate with a qualitative approach, conducting 18 interviews with activists from Chocó and Bogotá. The literature on race and TFV reveals that technology can exacerbate racism through social media, like anonymity, and introduce new forms of racist violence, including deepfakes and algorithmic bias. However, these forms were not prevalent in our interviews. For activists, structural racism, especially limited internet, and electricity access emerged as a primary factor in their ex-periences with racist TFV. Overt TFV escalates to offline threats, silencing dissenting voices. This research emphasizes the need to understand TFV within non-Western regions, advocating for nuanced approaches to addressing digital racism in diverse contexts.},
journal = {New Media and Society},
author = {Valencia, Miyerlandy Cabanzo and Guntrum, Laura},
year = {2026},
keywords = {Peace, Projekt-TraCe, A-Paper, Ranking-ImpactFactor, Security},
}
[BibTeX] [Abstract] [Download PDF]
In rural areas, where restoring public network infrastructure can take time, an alternative communication channel can be particularly valuable. This study explores the potential of repurposing Long Range Wide Area Networks (LoRaWAN) gateways as multi-hop network nodes to create a digital emergency communication system. Farmers, who are increasingly adopting Low Power Wide Area Networks (LPWANs) and are geographically spread, are identified as key stakeholders for such a system. Using OpenStreetMap data on farm locations, we found that connecting farm communities through LoRa communication is theoretically possible in many areas. Simulations using delay-tolerant network routing protocols confirm the feasibility of this approach under various scenarios. A proof-of-concept implementation demonstrates that small messages can be transmitted successfully using real hardware, validating the concept of a decentralized communication infrastructure based on existing equipment. Additionally, we conducted experiments to measure energy consumption, bandwidth usage, and latency in actual hardware setups. This work contributes to various Sustainable Development Goals by supporting resilient communication infrastructure in underserved areas (SDG 9: Industry, Innovation and Infrastructure), strengthening rural communities that are often the last to recover after emergencies (SDG 10: Reduced Inequalities, SDG 11: Sustainable Cities and Communities), and ultimately helping safeguard food systems through improved agricultural coordination and communication (SDG 2: Zero Hunger).
@article{kuntke2025crisis,
title = {Crisis-{Communication} {Between} {Farms}: {Disruption}-{Tolerant} {Networking} with {Commodity} {LoRaWAN} {Hardware}},
volume = {32},
url = {https://aisel.aisnet.org/itd/vol32/iss1/15/},
abstract = {In rural areas, where restoring public network infrastructure can take time, an alternative communication channel can be particularly valuable. This study explores the potential of repurposing Long Range Wide Area Networks (LoRaWAN) gateways as multi-hop network nodes to create a digital emergency communication system. Farmers, who are increasingly adopting Low Power Wide Area Networks (LPWANs) and are geographically spread, are identified as key stakeholders for such a system. Using OpenStreetMap data on farm locations, we found that connecting farm communities through LoRa communication is theoretically possible in many areas. Simulations using delay-tolerant network routing protocols confirm the feasibility of this approach under various scenarios. A proof-of-concept implementation demonstrates that small messages can be transmitted successfully using real hardware, validating the concept of a decentralized communication infrastructure based on existing equipment. Additionally, we conducted experiments to measure energy consumption, bandwidth usage, and latency in actual hardware setups. This work contributes to various Sustainable Development Goals by supporting resilient communication infrastructure in underserved areas (SDG 9: Industry, Innovation and Infrastructure), strengthening rural communities that are often the last to recover after emergencies (SDG 10: Reduced Inequalities, SDG 11: Sustainable Cities and Communities), and ultimately helping safeguard food systems through improved agricultural coordination and communication (SDG 2: Zero Hunger).},
number = {1},
journal = {Information Technology for Development},
author = {Kuntke, Franz and Baumgärtner, Lars and Franken, Jonas and Reuter, Christian},
year = {2026},
keywords = {Projekt-emergenCITY, A-Paper, Ranking-ImpactFactor, Security, UsableSec, Projekt-AgriRegio, emergenCITY\_INF, emergenCITY\_SG},
}
[BibTeX] [Abstract] [Download PDF]
The development of artificial intelligence and autonomous functions in the military domain has an immense impact on technologies being developed by the private defence industry. Defence firms contribute to the narratives and visions on autonomous weapon systems and the future of warfare, e.g. in the form of strategic marketing of their products. However, their role has so far been understudied, especially regarding autonomous weapon systems. As the normative debate revolves around aspects of human control, this work examines the narratives of (meaningful) human control in the marketing of autonomous military systems by defence manufacturers. Based on a comprehensive content analysis of twenty defence firms, we identified three main narratives, which envision autonomy as a military advantage, the role of the human in the future of warfare, and human-machine teaming. Based on the results, we argue that defence companies reproduce and adapt narratives which shape expectations and visions of human control of autonomous weapon systems in anticipation of emerging norms for (meaningful) human control. However, without specifications and verification mechanisms, there is no indication that human control will be meaningful.
@article{riebeEnvisioningHumanMachineInteraction2025,
title = {Envisioning {Human}-{Machine} {Interaction} in {Future} {Warfare}: {Defence} {Industry} {Narratives} on {Human} {Control} of {Autonomous} {Weapon} {Systems}},
volume = {39},
issn = {1360-0826},
url = {https://doi.org/10.1080/13600826.2024.2436966},
doi = {10.1080/13600826.2024.2436966},
abstract = {The development of artificial intelligence and autonomous functions in the military domain has an immense impact on technologies being developed by the private defence industry. Defence firms contribute to the narratives and visions on autonomous weapon systems and the future of warfare, e.g. in the form of strategic marketing of their products. However, their role has so far been understudied, especially regarding autonomous weapon systems. As the normative debate revolves around aspects of human control, this work examines the narratives of (meaningful) human control in the marketing of autonomous military systems by defence manufacturers. Based on a comprehensive content analysis of twenty defence firms, we identified three main narratives, which envision autonomy as a military advantage, the role of the human in the future of warfare, and human-machine teaming. Based on the results, we argue that defence companies reproduce and adapt narratives which shape expectations and visions of human control of autonomous weapon systems in anticipation of emerging norms for (meaningful) human control. However, without specifications and verification mechanisms, there is no indication that human control will be meaningful.},
number = {4},
journal = {Global Society},
author = {Riebe, Thea and Gonsior, Anja-Liisa and Reichert, Lilian and Reuter, Christian},
year = {2025},
keywords = {HCI, Peace, Projekt-TraCe, A-Paper, Ranking-ImpactFactor, AuswahlPeace, Projekt-ATHENE-CyAware, Student},
pages = {421--445},
}
[BibTeX] [Abstract]
The rise of fake news and misinformation in the digital age poses serious risks for individuals and society, particularly during crises like the Israel-Hamas war, the Russian-Ukraine war, or the COVID-19 pandemic. Misinformation serves as a tool to manipulate public opinion and create discord. Vulnerability to manipulation increases in online spaces during crises, where authoritative information is scarce. Emergency management, public health, political and public administration, as well as media professionals and citizens express concern and seek solutions to enhance information quality during such critical times. This article highlights user-centred approaches to countering fake news and misinformation, tracing their historical evolution from ancient Greece to the present, focussing on their relevance during the COVID-19 crisis and in contemporary information warfare. It describes the vulnerability of audiences to misinformation and outlines prevailing trends in user-centred countermeasures. This article also introduces recent research on the effectiveness of media literacy interventions on truth discernment, a cross-cultural comparison of the perception of negative consequences and the injunctive norm, a comparison of video and text to promote lateral reading in adolescents, content-specific indicators on Twitter from a user perspective, a learning system for detecting misinformation as well as ethical and security considerations in automated detection.
@book{reuterSpecialIssueCombating2025,
title = {Special {Issue} on {Combating} {Information} {Warfare}: {User}-{Centered} {Countermeasures} against {Fake} {News} and {Misinformation} - {Behaviour} \& {Information} {Technology} ({BIT})},
abstract = {The rise of fake news and misinformation in the digital age poses serious risks for individuals and society, particularly during crises like the Israel-Hamas war, the Russian-Ukraine war, or the COVID-19 pandemic. Misinformation serves as a tool to manipulate public opinion and create discord. Vulnerability to manipulation increases in online spaces during crises, where authoritative information is scarce. Emergency management, public health, political and public administration, as well as media professionals and citizens express concern and seek solutions to enhance information quality during such critical times. This article highlights user-centred approaches to countering fake news and misinformation, tracing their historical evolution from ancient Greece to the present, focussing on their relevance during the COVID-19 crisis and in contemporary information warfare. It describes the vulnerability of audiences to misinformation and outlines prevailing trends in user-centred countermeasures. This article also introduces recent research on the effectiveness of media literacy interventions on truth discernment, a cross-cultural comparison of the perception of negative consequences and the injunctive norm, a comparison of video and text to promote lateral reading in adolescents, content-specific indicators on Twitter from a user perspective, a learning system for detecting misinformation as well as ethical and security considerations in automated detection.},
publisher = {Taylor \& Francis},
author = {Reuter, Christian and Hughes, Amanda Lee and Buntain, Cody},
year = {2025},
note = {Publication Title: Behaviour \& Information Technology (BIT)},
keywords = {Crisis, HCI, Peace, A-Paper, Ranking-CORE-A, Ranking-ImpactFactor, SocialMedia},
}
[BibTeX] [Abstract] [Download PDF]
China, the United States, and the European Union have spoken of a global competition surrounding Artificial Intelligence (AI). There is widespread talk of an ‘AI Arms Race’. But what is the nature of this race? We argue that the arms race metaphor does not capture the dynamics of global competition in the AI sector. Instead, we propose the notion of a ‘geopolitical innovation race’ for technological leadership in a networked global economy. Based on an analysis of government documents, we find that actors (1) are open to both zero-sum or positive-sum approaches in AI development, (2) organise actor networks differently based on national innovation cultures, (3) prioritise economics and status next to security concerns, and (4) are open to how AI should be interpreted. Referring to the competitive race of AI research and development, the three technopoles perpetuate the geopoliticisation of innovation and intertwine security and economic interests.
@article{schmidArmsRaceInnovation2025,
title = {Arms {Race} or {Innovation} {Race}? {Geopolitical} {AI} {Development}},
volume = {30},
issn = {1465-0045},
url = {https://doi.org/10.1080/14650045.2025.2456019},
doi = {10.1080/14650045.2025.2456019},
abstract = {China, the United States, and the European Union have spoken of a global competition surrounding Artificial Intelligence (AI). There is widespread talk of an ‘AI Arms Race’. But what is the nature of this race? We argue that the arms race metaphor does not capture the dynamics of global competition in the AI sector. Instead, we propose the notion of a ‘geopolitical innovation race’ for technological leadership in a networked global economy. Based on an analysis of government documents, we find that actors (1) are open to both zero-sum or positive-sum approaches in AI development, (2) organise actor networks differently based on national innovation cultures, (3) prioritise economics and status next to security concerns, and (4) are open to how AI should be interpreted. Referring to the competitive race of AI research and development, the three technopoles perpetuate the geopoliticisation of innovation and intertwine security and economic interests.},
number = {4},
journal = {Geopolitics},
publisher = {Routledge},
author = {Schmid, Stefka and Lambach, Daniel and Diehl, Carlo and Reuter, Christian},
year = {2025},
keywords = {Peace, Projekt-TraCe, A-Paper, Ranking-ImpactFactor, AuswahlPeace, Projekt-ATHENE, Selected},
pages = {1907--1936},
}
[BibTeX] [Abstract] [Download PDF]
Information and Communication Technologies (ICTs) offer valuable tools for fostering social cohesion and conflict resolution, yet little is known about women’s roles in this domain. This study draws on 14 interviews to explore how female Cameroonian peacebuilders used ICTs during the Anglophone Crisis. Findings indicate that low-tech tools, like WhatsApp groups, play a key role in information dissemination, while more advanced technologies remain largely absent despite their growing presence in peacebuilding literature. Whilst this study demonstrates the capacity of ICTs to promote women’s involvement in peacebuilding by facilitating participation, protection, and prevention, it also examines existing challenges, including restricted accessibility and technology-facilitated violence. By exploring the intersection of digital peacebuilding and the UN’s Women, Peace, and Security Agenda through the lens of the Cameroonian case, we propose an intersectional feminist digital peacebuilding framework, incorporating gender-responsive and locally grounded strategies to better support women’s engagement in peacebuilding efforts.
@article{guntrumIncludingPerspectivesWomen2025,
title = {Including {Perspectives} of {Women} {Using} {ICTs} to {Promote} {Peace} in the {Anglophone} {Cameroon} {Crisis}},
volume = {60},
url = {https://journals.sagepub.com/doi/10.1177/00020397251408495},
doi = {10.1177/00020397251408495},
abstract = {Information and Communication Technologies (ICTs) offer valuable tools for fostering social cohesion and conflict resolution, yet little is known about women’s roles in this domain. This study draws on 14 interviews to explore how female Cameroonian peacebuilders used ICTs during the Anglophone Crisis. Findings indicate that low-tech tools, like WhatsApp groups, play a key role in information dissemination, while more advanced technologies remain largely absent despite their growing presence in peacebuilding literature. Whilst this study demonstrates the capacity of ICTs to promote women’s involvement in peacebuilding by facilitating participation, protection, and prevention, it also examines existing challenges, including restricted accessibility and technology-facilitated violence. By exploring the intersection of digital peacebuilding and the UN’s Women, Peace, and Security Agenda through the lens of the Cameroonian case, we propose an intersectional feminist digital peacebuilding framework, incorporating gender-responsive and locally grounded strategies to better support women’s engagement in peacebuilding efforts.},
number = {1},
journal = {Africa Spectrum},
author = {Guntrum, Laura and Sunjo, Emile and Cockburn, Lynn},
year = {2025},
keywords = {Peace, Projekt-TraCe, A-Paper, Ranking-ImpactFactor},
}
[BibTeX] [Abstract] [Download PDF]
Misinformation represent a key challenge for society. User-centered misinformation interventions as digital countermeasures that exert a direct influence on users represent a promising means to deal with the large amounts of information available. While an extensive body of research on this topic exists, researchers are confronted with a diverse research landscape spanning multiple disciplines. This review systematizes the landscape of user-centered misinformation interventions to facilitate knowledge transfer, identify trends, and enable informed decision-making. Over 3,700 scholarly publications were screened and a systematic literature review (N=108) was conducted. A taxonomy was derived regarding intervention design (e.g., binary label), user interaction (active or passive), and timing (e.g., post exposure to misinformation). We provide a structured overview of approaches across multiple disciplines, and derive six overarching challenges for future research.
@article{hartwigLandscapeUsercenteredMisinformation2024,
title = {The {Landscape} of {User}-centered {Misinformation} {Interventions} – {A} {Systematic} {Literature} {Review}},
volume = {56},
issn = {0360-0300},
url = {https://peasec.de/paper/2024/2024_HartwigDoellReuter_LandscapeUserCentredMisinfoInterventions_CSUR.pdf},
doi = {10.1145/3674724},
abstract = {Misinformation represent a key challenge for society. User-centered misinformation interventions as digital countermeasures that exert a direct influence on users represent a promising means to deal with the large amounts of information available. While an extensive body of research on this topic exists, researchers are confronted with a diverse research landscape spanning multiple disciplines. This review systematizes the landscape of user-centered misinformation interventions to facilitate knowledge transfer, identify trends, and enable informed decision-making. Over 3,700 scholarly publications were screened and a systematic literature review (N=108) was conducted. A taxonomy was derived regarding intervention design (e.g., binary label), user interaction (active or passive), and timing (e.g., post exposure to misinformation). We provide a structured overview of approaches across multiple disciplines, and derive six overarching challenges for future research.},
number = {11},
journal = {ACM Computing Surveys (CSUR)},
author = {Hartwig, Katrin and Doell, Frederic and Reuter, Christian},
month = jul,
year = {2024},
keywords = {HCI, Peace, Projekt-NEBULA, A-Paper, Ranking-ImpactFactor, Student, Projekt-ATHENE, Selected, Ranking-CORE-A*},
}
[BibTeX] [Abstract] [Download PDF]
The rise of fake news and misinformation in the digital age poses serious risks for individuals and society, particularly during crises like the Israel-Hamas war, the Russian-Ukraine war, or the COVID-19 pandemic. Misinformation serves as a tool to manipulate public opinion and create discord. Vulnerability to manipulation increases in online spaces during crises, where authoritative information is scarce. Emergency management, public health, political and public administration, as well as media professionals and citizens express concern and seek solutions to enhance information quality during such critical times. This article highlights user-centred approaches to countering fake news and misinformation, tracing their historical evolution from ancient Greece to the present, focussing on their relevance during the COVID-19 crisis and in contemporary information warfare. It describes the vulnerability of audiences to misinformation and outlines prevailing trends in user-centred countermeasures. This article also introduces recent research on the effectiveness of media literacy interventions on truth discernment, a cross-cultural comparison of the perception of negative consequences and the injunctive norm, a comparison of video and text to promote lateral reading in adolescents, content-specific indicators on Twitter from a user perspective, a learning system for detecting misinformation as well as ethical and security considerations in automated detection.
@article{reuterCombatingInformationWarfare2025,
title = {Combating {Information} {Warfare}: {State} and {Trends} in {User}-{Centered} {Countermeasures} against {Fake} {News} and {Misinformation}},
volume = {44},
issn = {0144-929X},
url = {https://doi.org/10.1080/0144929X.2024.2442486},
doi = {10.1080/0144929X.2024.2442486},
abstract = {The rise of fake news and misinformation in the digital age poses serious risks for individuals and society, particularly during crises like the Israel-Hamas war, the Russian-Ukraine war, or the COVID-19 pandemic. Misinformation serves as a tool to manipulate public opinion and create discord. Vulnerability to manipulation increases in online spaces during crises, where authoritative information is scarce. Emergency management, public health, political and public administration, as well as media professionals and citizens express concern and seek solutions to enhance information quality during such critical times. This article highlights user-centred approaches to countering fake news and misinformation, tracing their historical evolution from ancient Greece to the present, focussing on their relevance during the COVID-19 crisis and in contemporary information warfare. It describes the vulnerability of audiences to misinformation and outlines prevailing trends in user-centred countermeasures. This article also introduces recent research on the effectiveness of media literacy interventions on truth discernment, a cross-cultural comparison of the perception of negative consequences and the injunctive norm, a comparison of video and text to promote lateral reading in adolescents, content-specific indicators on Twitter from a user perspective, a learning system for detecting misinformation as well as ethical and security considerations in automated detection.},
number = {13},
journal = {Behaviour \& Information Technology (BIT)},
author = {Reuter, Christian and Hughes, Amanda Lee and Buntain, Cody},
year = {2024},
keywords = {Crisis, HCI, Peace, Projekt-NEBULA, A-Paper, Ranking-CORE-A, Ranking-ImpactFactor, SocialMedia},
pages = {3348--3361},
}
[BibTeX] [Abstract] [Download PDF]
In today’s world, cyber-attacks are becoming more frequent and thus proactive protection against them is becoming more important. Cyber Threat Intelligence (CTI) is a possible solution, as it collects threat information in various information sources and derives stakeholder intelligence to protect one’s infrastructure. The current focus of CTI in research is the clear web, but the dark web may contain further information. To further advance protection, this work analyzes the dark web as Open Source Intelligence (OSINT) data source to complement current CTI information. The underlying assumption is that hackers use the dark web to exchange, develop, and share information and assets. This work aims to understand the structure of the dark web and identify the amount of its openly available CTI related information. We conducted a comprehensive literature review for dark web research and CTI. To follow this up we manually investigated and analyzed 65 dark web forum (DWF), 7 single-vendor shops, and 72 dark web marketplace (DWM). We documented the content and relevance of DWFs and DWMs for CTI, as well as challenges during the extraction and provide mitigations. During our investigation we identified IT security relevant information in both DWFs and DWMs, ranging from malware toolboxes to hacking-as-a-service. One of the most present challenges during our manual analysis were necessary interactions to access information and anti-crawling measures, i.e., CAPTCHAs. This analysis showed 88\% of marketplaces and 53\% of forums contained relevant data. Our complementary semi-automated analysis of 1,186,906 onion addresses indicates, that the necessary interaction makes it difficult to see the dark web as an open, but rather treat it as specialized information source, when clear web information does not suffice.
@article{kuehnNavigatingShadowsManual2024,
title = {Navigating the {Shadows}: {Manual} and {Semi}-{Automated} {Evaluation} of the {Dark} {Web} for {Cyber} {Threat} {Intelligence}},
volume = {12},
issn = {2169-3536},
shorttitle = {Navigating the {Shadows}},
url = {https://ieeexplore.ieee.org/document/10643518},
doi = {10.1109/ACCESS.2024.3448247},
abstract = {In today’s world, cyber-attacks are becoming more frequent and thus proactive protection against them is becoming more important. Cyber Threat Intelligence (CTI) is a possible solution, as it collects threat information in various information sources and derives stakeholder intelligence to protect one’s infrastructure. The current focus of CTI in research is the clear web, but the dark web may contain further information. To further advance protection, this work analyzes the dark web as Open Source Intelligence (OSINT) data source to complement current CTI information. The underlying assumption is that hackers use the dark web to exchange, develop, and share information and assets. This work aims to understand the structure of the dark web and identify the amount of its openly available CTI related information. We conducted a comprehensive literature review for dark web research and CTI. To follow this up we manually investigated and analyzed 65 dark web forum (DWF), 7 single-vendor shops, and 72 dark web marketplace (DWM). We documented the content and relevance of DWFs and DWMs for CTI, as well as challenges during the extraction and provide mitigations. During our investigation we identified IT security relevant information in both DWFs and DWMs, ranging from malware toolboxes to hacking-as-a-service. One of the most present challenges during our manual analysis were necessary interactions to access information and anti-crawling measures, i.e., CAPTCHAs. This analysis showed 88\% of marketplaces and 53\% of forums contained relevant data. Our complementary semi-automated analysis of 1,186,906 onion addresses indicates, that the necessary interaction makes it difficult to see the dark web as an open, but rather treat it as specialized information source, when clear web information does not suffice.},
journal = {IEEE Access},
author = {Kuehn, Philipp and Wittorf, Kyra and Reuter, Christian},
year = {2024},
keywords = {Ranking-CORE-A, Ranking-ImpactFactor, Student, Security, UsableSec, Projekt-ATHENE-SecUrban, Projekt-CYWARN},
pages = {118903--118922},
}
[BibTeX] [Abstract] [Download PDF]
Internet of Things (IoT) devices have become increasingly important within the smart home domain, making the security of the devices a critical aspect. The majority of IoT devices are black-box systems running closed and pre-installed firmware. This raises concerns about the trustworthiness of these devices, especially considering that some of them are shipped with a microphone or a camera. Remote attestation aims at validating the trustworthiness of these devices by verifying the integrity of the software. However, users cannot validate whether the attestation has actually taken place and has not been manipulated by an attacker, raising the need for HCI research on trust and understandability. We conducted a qualitative study with 35 participants, investigating trust in the attestation process and whether this trust can be improved by additional explanations in the application. We developed an application that allows users to attest a smart speaker using their smartphone over an audio channel to identify the attested device and observe the attestation process. In order to observe the differences between the applications with and without explanations, we performed A/B testing. We discovered that trust increases when additional explanations of the technical process are provided, improving the understanding of the attestation process.
@article{linsnerBuildingTrustRemote2024,
title = {Building {Trust} in {Remote} {Attestation} {Through} {Transparency} – {A} {Qualitative} {User} {Study} on {Observable} {Attestation}},
issn = {0144-929X},
url = {https://doi.org/10.1080/0144929X.2024.2374889},
doi = {10.1080/0144929X.2024.2374889},
abstract = {Internet of Things (IoT) devices have become increasingly important within the smart home domain, making the security of the devices a critical aspect. The majority of IoT devices are black-box systems running closed and pre-installed firmware. This raises concerns about the trustworthiness of these devices, especially considering that some of them are shipped with a microphone or a camera. Remote attestation aims at validating the trustworthiness of these devices by verifying the integrity of the software. However, users cannot validate whether the attestation has actually taken place and has not been manipulated by an attacker, raising the need for HCI research on trust and understandability. We conducted a qualitative study with 35 participants, investigating trust in the attestation process and whether this trust can be improved by additional explanations in the application. We developed an application that allows users to attest a smart speaker using their smartphone over an audio channel to identify the attested device and observe the attestation process. In order to observe the differences between the applications with and without explanations, we performed A/B testing. We discovered that trust increases when additional explanations of the technical process are provided, improving the understanding of the attestation process.},
journal = {Behaviour \& Information Technology (BIT)},
publisher = {Taylor \& Francis},
author = {Linsner, Sebastian and Demuth, Kilian and Surminski, Sebastian and Davi, Lucas and Reuter, Christian},
year = {2024},
keywords = {A-Paper, Ranking-ImpactFactor, Security, UsableSec, Projekt-ATHENE-PriVis, Projekt-CROSSING},
pages = {1--21},
}
[BibTeX] [Abstract] [Download PDF]
Digital technology and smartphones provide great opportunities to support crisis response measures. During the COVID-19 pandemic, many countries introduced contact tracing apps (CTAs) to prevent the virus’s spread and identify infection clusters. Because wide acceptance is necessary for these apps to work, it has been a subject of research. Past research often highlighted the role of trust for acceptance and suggested that technical transparency by opening the source code can help to build trust. For this reason, we studied the acceptance of two German apps: the Corona-Warn-App (CWA), which was developed as open-source software early on, and the Luca app, which did not publish the source code initially. We conducted a multinomial logistic regression testing effects on the adoption of (1) only the CWA, (2) only the Luca app, or (3) both apps. As predictors, we considered the role of trust in the app publisher and the government and controlled for predictors relevant to past research. We found trust to have a significant effect on the acceptance of the apps. A self-reported understanding of the term “open-source software” and a perceived threat by COVID-19 had a positive effect for the Corona-Warn-App or both apps but not for the Luca app alone. Being from Eastern Germany lowered the acceptance of the Luca app or both apps. Our findings can add to previous CTA acceptance research and provide insights for policymakers for future digital crisis measures, especially for populations comparable to the German population regarding government trust and privacy attitudes.
@article{steinbrinkImpactTransparencyTrust2024,
title = {The {Impact} of {Transparency} and {Trust} on {User} {Acceptance} of {Contact} {Tracing} {Apps}: {Implications} for the {Adoption} of {Crisis} {Response} {Apps}},
issn = {2212-4209},
url = {https://www.sciencedirect.com/science/article/pii/S2212420924004230},
doi = {10.1016/j.ijdrr.2024.104661},
abstract = {Digital technology and smartphones provide great opportunities to support crisis response measures. During the COVID-19 pandemic, many countries introduced contact tracing apps (CTAs) to prevent the virus’s spread and identify infection clusters. Because wide acceptance is necessary for these apps to work, it has been a subject of research. Past research often highlighted the role of trust for acceptance and suggested that technical transparency by opening the source code can help to build trust. For this reason, we studied the acceptance of two German apps: the Corona-Warn-App (CWA), which was developed as open-source software early on, and the Luca app, which did not publish the source code initially. We conducted a multinomial logistic regression testing effects on the adoption of (1) only the CWA, (2) only the Luca app, or (3) both apps. As predictors, we considered the role of trust in the app publisher and the government and controlled for predictors relevant to past research. We found trust to have a significant effect on the acceptance of the apps. A self-reported understanding of the term “open-source software” and a perceived threat by COVID-19 had a positive effect for the Corona-Warn-App or both apps but not for the Luca app alone. Being from Eastern Germany lowered the acceptance of the Luca app or both apps. Our findings can add to previous CTA acceptance research and provide insights for policymakers for future digital crisis measures, especially for populations comparable to the German population regarding government trust and privacy attitudes.},
journal = {International Journal of Disaster Risk Reduction},
author = {Steinbrink, Enno and Reuter, Christian},
month = jul,
year = {2024},
keywords = {Crisis, HCI, A-Paper, Ranking-ImpactFactor, Projekt-GRKPrivacy, Projekt-ATHENE-PriVis},
pages = {104661},
}
[BibTeX] [Abstract] [Download PDF]
The field of cybersecurity is evolving fast. Security professionals are in need of intelligence on past, current and – ideally – on upcoming threats, because attacks are becoming more advanced and are increasingly targeting larger and more complex systems. Since the processing and analysis of such large amounts of information cannot be addressed manually, cybersecurity experts rely on machine learning techniques. In the textual domain, pre-trained language models like BERT have proven to be helpful as they provide a good baseline for further fine-tuning. However, due to the domain-knowledge and the many technical terms in cybersecurity, general language models might miss the gist of textual information. For this reason, we create a high-quality dataset and present a language model specifically tailored to the cybersecurity domain which can serve as a basic building block for cybersecurity systems. The model is compared on 15 tasks: Domain-dependent extrinsic tasks for measuring the performance on specific problems, intrinsic tasks for measuring the performance of the internal representations of the model as well as general tasks from the SuperGLUE benchmark. The results of the intrinsic tasks show that our model improves the internal representation space of domain words compared to the other models. The extrinsic, domain-dependent tasks, consisting of sequence tagging and classification, show that the model performs best in cybersecurity scenarios. In addition, we pay special attention to the choice of hyperparameters against catastrophic forgetting, as pre-trained models tend to forget the original knowledge during further training.
@article{bayerCySecBERTDomainAdaptedLanguage2024,
title = {{CySecBERT}: {A} {Domain}-{Adapted} {Language} {Model} for the {Cybersecurity} {Domain}},
volume = {27},
issn = {2471-2566},
url = {https://peasec.de/paper/2024/2024_BayerKuehnShanesazReuter_CySecBERT_TOPS.pdf},
doi = {10.1145/3652594},
abstract = {The field of cybersecurity is evolving fast. Security professionals are in need of intelligence on past, current and - ideally - on upcoming threats, because attacks are becoming more advanced and are increasingly targeting larger and more complex systems. Since the processing and analysis of such large amounts of information cannot be addressed manually, cybersecurity experts rely on machine learning techniques. In the textual domain, pre-trained language models like BERT have proven to be helpful as they provide a good baseline for further fine-tuning. However, due to the domain-knowledge and the many technical terms in cybersecurity, general language models might miss the gist of textual information. For this reason, we create a high-quality dataset and present a language model specifically tailored to the cybersecurity domain which can serve as a basic building block for cybersecurity systems. The model is compared on 15 tasks: Domain-dependent extrinsic tasks for measuring the performance on specific problems, intrinsic tasks for measuring the performance of the internal representations of the model as well as general tasks from the SuperGLUE benchmark. The results of the intrinsic tasks show that our model improves the internal representation space of domain words compared to the other models. The extrinsic, domain-dependent tasks, consisting of sequence tagging and classification, show that the model performs best in cybersecurity scenarios. In addition, we pay special attention to the choice of hyperparameters against catastrophic forgetting, as pre-trained models tend to forget the original knowledge during further training.},
number = {2},
journal = {ACM Transactions on Privacy and Security (TOPS)},
publisher = {Association for Computing Machinery},
author = {Bayer, Markus and Kuehn, Philipp and Shanehsaz, Ramin and Reuter, Christian},
month = apr,
year = {2024},
note = {Place: New York, NY, USA},
keywords = {A-Paper, Ranking-CORE-A, Ranking-ImpactFactor, Projekt-ATHENE-CyAware, Student, Security, UsableSec, Projekt-CYLENCE, Projekt-CYWARN},
}
[BibTeX] [Abstract] [Download PDF]
With developments in Artificial Intelligence widely framed as security concern in both military and civilian realms, governments have turned their attention to regulating and governing AI. In a study of US, Chinese, and EU AI documents, we go beyond instrumental understandings of AI as a technological capability, which serves states’ self-interests and the maintenance of their (supra)national security. Our specific interest lies in how AI policies tap into both problem-solving approaches and affective registers to achieve both physical as well as ontological security. We find that in governmental visions, AI is perceived as a capability that enhances societal, and geopolitical interests while its risks are framed as manageable. This echoes strands within Human-Computer Interaction that draw on human-centered perceptions of technology and assumptions about human-AI relationships of trust. Despite different cultural and institutional settings, the visions of future AI development are shaped by this (shared) understanding of human-AI interaction, offering common ground in the navigation of innovation policies.
@article{schmidTrustArtificialIntelligence2024,
title = {Trust in {Artificial} {Intelligence}: {Producing} {Ontological} {Security} through {Governmental} {Visions}},
url = {https://peasec.de/paper/2024/2024_SchmidPhamFerl_TrustinAI_CooperationConflict.pdf},
doi = {10.1177/00108367241288073},
abstract = {With developments in Artificial Intelligence widely framed as security concern in both military and civilian realms, governments have turned their attention to regulating and governing AI. In a study of US, Chinese, and EU AI documents, we go beyond instrumental understandings of AI as a technological capability, which serves states' self-interests and the maintenance of their (supra)national security. Our specific interest lies in how AI policies tap into both problem-solving approaches and affective registers to achieve both physical as well as ontological security. We find that in governmental visions, AI is perceived as a capability that enhances societal, and geopolitical interests while its risks are framed as manageable. This echoes strands within Human-Computer Interaction that draw on human-centered perceptions of technology and assumptions about human-AI relationships of trust. Despite different cultural and institutional settings, the visions of future AI development are shaped by this (shared) understanding of human-AI interaction, offering common ground in the navigation of innovation policies.},
journal = {Cooperation and Conflict},
author = {Schmid, Stefka and Pham, Bao-Chau and Ferl, Anna-Katharina},
year = {2024},
keywords = {Peace, Projekt-TraCe, A-Paper, Ranking-ImpactFactor, AuswahlPeace},
}
[BibTeX] [Abstract] [Download PDF]
This article explores two key facets of institutionalized ethical review processes in Germany: (1) their importance in shaping ethical research and (2) their associated challenges, with a specific focus on their implications within the social sciences. Ethical considerations play a pivotal role in (social science) research, safeguarding, amongst others, the rights and well-being of participants and ensuring research integrity. Despite notable progress in promoting research ethics, German research institutions still need to significantly improve their ethics review processes. To address these challenges, this article emphasizes the need for expanding the current management of research ethics and implementing what we call ?Institutionalized Research Ethics Practices?? (IREPs), which include but go beyond the scope of common Institutional Review Boards (IRBs). Drawing on two workshops with researchers and IRB members, and a systematic review of existing IRBs in the German social sciences, we propose concrete recommendations for developing and enhancing IREPs, including a conducive environment, accessibility, fairness, and fostering expertise (CAFE). These enhancements aim to strengthen Germany?s research ethics infrastructure and promote responsible and ethical research practices in the social sciences.
@article{crawfordEthicalResearchGerman2024,
title = {Ethical research in the {German} social sciences: {Exploring} the significance and challenges of institutionalized research ethics practices},
issn = {1747-0161},
url = {https://doi.org/10.1177/17470161241270787},
doi = {10.1177/17470161241270787},
abstract = {This article explores two key facets of institutionalized ethical review processes in Germany: (1) their importance in shaping ethical research and (2) their associated challenges, with a specific focus on their implications within the social sciences. Ethical considerations play a pivotal role in (social science) research, safeguarding, amongst others, the rights and well-being of participants and ensuring research integrity. Despite notable progress in promoting research ethics, German research institutions still need to significantly improve their ethics review processes. To address these challenges, this article emphasizes the need for expanding the current management of research ethics and implementing what we call ?Institutionalized Research Ethics Practices?? (IREPs), which include but go beyond the scope of common Institutional Review Boards (IRBs). Drawing on two workshops with researchers and IRB members, and a systematic review of existing IRBs in the German social sciences, we propose concrete recommendations for developing and enhancing IREPs, including a conducive environment, accessibility, fairness, and fostering expertise (CAFE). These enhancements aim to strengthen Germany?s research ethics infrastructure and promote responsible and ethical research practices in the social sciences.},
urldate = {2024-08-19},
journal = {Research Ethics},
publisher = {SAGE Publications Ltd},
author = {Crawford, Andrew and Fichtner, Laura and Guntrum, Laura and Jänsch, Stephanie and Krösche, Niklas and Soulier, Eloïse and Süß, Clara-Auguste},
month = aug,
year = {2024},
keywords = {Peace, Projekt-TraCe, Ranking-ImpactFactor},
pages = {17470161241270787},
}
[BibTeX] [Abstract] [Download PDF]
Recent crises like the COVID-19 pandemic provoked an increasing appearance of misleading information, emphasizing the need for effective user-centered countermeasures as an important field in HCI research. This work investigates how content-specific user-centered indicators can contribute to an informed approach to misleading information. In a threefold study, we conducted an in-depth content analysis of 2,382 German tweets on Twitter (now X) to identify topical (e.g., 5G), formal (e.g., links), and rhetorical (e.g., sarcasm) characteristics through manual coding, followed by a qualitative online survey to evaluate which indicators users already use autonomously to assess a tweet’s credibility. Subsequently, in a think-aloud study participants qualitatively evaluated the identified indicators in terms of perceived comprehensibility and usefulness. While a number of indicators were found to be particularly comprehensible and useful (e.g., claim for absolute truth and rhetorical questions), our findings reveal limitations of indicator-based interventions, particularly for people with entrenched conspiracy theory views. We derive four implications for digitally supporting users in dealing with misleading information, especially during crises.
@article{hartwigMisleadingInformationCrises2024,
title = {Misleading {Information} in {Crises}: {Exploring} {Content}-specific {Indicators} on {Twitter} from a {User} {Perspective}},
issn = {0144-929X},
url = {https://doi.org/10.1080/0144929X.2024.2373166},
doi = {10.1080/0144929X.2024.2373166},
abstract = {Recent crises like the COVID-19 pandemic provoked an increasing appearance of misleading information,
emphasizing the need for effective user-centered countermeasures as an important field in HCI research. This
work investigates how content-specific user-centered indicators can contribute to an informed approach to
misleading information. In a threefold study, we conducted an in-depth content analysis of 2,382 German
tweets on Twitter (now X) to identify topical (e.g., 5G), formal (e.g., links), and rhetorical (e.g., sarcasm)
characteristics through manual coding, followed by a qualitative online survey to evaluate which indicators
users already use autonomously to assess a tweet’s credibility. Subsequently, in a think-aloud study participants
qualitatively evaluated the identified indicators in terms of perceived comprehensibility and usefulness. While
a number of indicators were found to be particularly comprehensible and useful (e.g., claim for absolute truth
and rhetorical questions), our findings reveal limitations of indicator-based interventions, particularly for
people with entrenched conspiracy theory views. We derive four implications for digitally supporting users in
dealing with misleading information, especially during crises.},
journal = {Behaviour \& Information Technology (BIT)},
author = {Hartwig, Katrin and Schmid, Stefka and Biselli, Tom and Pleil, Helene and Reuter, Christian},
year = {2024},
keywords = {Crisis, HCI, Projekt-NEBULA, A-Paper, Ranking-CORE-A, Ranking-ImpactFactor, Projekt-ATHENE-PriVis},
pages = {1--34},
}
[BibTeX] [Abstract] [Download PDF]
Misinformation presents a challenge to democracies, particularly in times of crisis. One way in which misinformation is spread is through voice messages sent via messenger groups, which enable members to share information on a larger scale. Gaining user perspectives on digital misinformation interventions as countermeasure after detection is crucial. In this paper, we extract potential features of misinformation in voice messages from literature, implement them within a program that automatically processes voice messages, and evaluate their perceived usefulness and comprehensibility as user-centered indicators.We propose 35 features extracted from audio files at the character, word, sentence, audio and creator levels to assist (1) private individuals in conducting credibility assessments, (2) government agencies faced with data overload during crises, and (3) researchers seeking to gather features for automatic detection approaches. We conducted a think-aloud study with laypersons (N = 20) to provide initial insight into how individuals autonomously assess the credibility of voice messages, as well as which automatically extracted features they find to be clear and convincing indicators of misinformation. Our study provides qualitative and quantitative insights into valuable indicators, particularly when they relate directly to the content or its creator, and uncovers challenges in user interface design.
@article{hartwigNavigatingMisinformationVoice2024,
title = {Navigating {Misinformation} in {Voice} {Messages}: {Identification} of {User}-{Centered} {Features} for {Digital} {Interventions}},
issn = {1944-4079},
url = {https://peasec.de/paper/2024/2024_HartwigSandlerReuter_NavigatingMisinfoVoiceMessages_RiskHazards.pdf},
doi = {10.1002/rhc3.12296},
abstract = {Misinformation presents a challenge to democracies, particularly in times of crisis. One way in which misinformation is spread is through voice messages sent via messenger groups, which enable members to share information on a larger scale. Gaining user perspectives on digital misinformation interventions as countermeasure after detection is crucial. In this paper, we extract potential features of misinformation in voice messages from literature, implement them within a program that automatically processes voice messages, and evaluate their perceived usefulness and comprehensibility as user-centered indicators.We propose 35 features extracted from audio files at the character, word, sentence, audio and creator levels to assist (1) private individuals in conducting credibility assessments, (2) government agencies faced with data overload during crises, and (3) researchers seeking to gather features for automatic detection approaches. We conducted a think-aloud study with laypersons (N = 20) to provide initial insight into how individuals autonomously assess the credibility of voice messages, as well as which automatically extracted features they find to be clear and convincing indicators of misinformation. Our study provides qualitative and quantitative insights into valuable indicators, particularly when they relate directly to the content or its creator, and uncovers challenges in user interface design.},
journal = {Risk, Hazards, \& Crisis in Public Policy (RHCPP)},
publisher = {John Wiley \& Sons, Ltd},
author = {Hartwig, Katrin and Sandler, Ruslan and Reuter, Christian},
year = {2024},
keywords = {Crisis, HCI, Projekt-NEBULA, A-Paper, Ranking-ImpactFactor, SocialMedia, Student, UsableSec, Projekt-ATHENE, Projekt-CYLENCE, Cyberwar},
}
[BibTeX] [Abstract] [Download PDF]
Farm Management Information Systems (FMIS) are an important core component of modern farming companies as they allow, e.g., to document activities, create fertilization plans, and feed digital equipment with required data. Since the entire agricultural sector is an essential component of food production, high standards of resilience should be established in the involved companies. Accordingly, the used software should also be designed with high standards on reliability and crisis capability. Based on a literature review, we found that software for farmers with certain resilience needs is lacking. Thus, we designed and evaluated a new FMIS concept with the user-centered design method. By conducting focus groups (two rounds, total N=57) in 2017 and 2019, we raised specific front-end and back-end requirements of farmers. Based on the requirements, we developed our concept for both front- and back-end in terms of a decentralized and offline-working FMIS. Through the evaluation with practitioners (N=16) of the implemented concept, we derived findings and implications, highlighting the need for privacy, stability, and offline-capability, as well as the UI-requirement to be supportive, e.g., with easy to understand icons and terms.
@article{kuntkeGeoBoxDesignEvaluation2023,
title = {{GeoBox}: {Design} and {Evaluation} of a {Tool} for {Resilient} and {Decentralized} {Data} {Management} in {Agriculture}},
volume = {43},
issn = {0144-929X},
url = {https://peasec.de/paper/2023/2023_KuntkeKaufholdLinsnerReuter_GeoBox_BIT.pdf},
doi = {10.1080/0144929X.2023.2185747},
abstract = {Farm Management Information Systems (FMIS) are an important core component of modern farming companies as they allow, e.g., to document activities, create fertilization plans, and feed digital equipment with required data. Since the entire agricultural sector is an essential component of food production, high standards of resilience should be established in the involved companies. Accordingly, the used software should also be designed with high standards on reliability and crisis capability. Based on a literature review, we found that software for farmers with certain resilience needs is lacking. Thus, we designed and evaluated a new FMIS concept with the user-centered design method. By conducting focus groups (two rounds, total N=57) in 2017 and 2019, we raised specific front-end and back-end requirements of farmers. Based on the requirements, we developed our concept for both front- and back-end in terms of a decentralized and offline-working FMIS. Through the evaluation with practitioners (N=16) of the implemented concept, we derived findings and implications, highlighting the need for privacy, stability, and offline-capability, as well as the UI-requirement to be supportive, e.g., with easy to understand icons and terms.},
number = {4},
journal = {Behaviour \& Information Technology (BIT)},
publisher = {Taylor \& Francis},
author = {Kuntke, Franz and Kaufhold, Marc-André and Linsner, Sebastian and Reuter, Christian},
year = {2023},
keywords = {A-Paper, Ranking-CORE-A, Ranking-ImpactFactor, Security, UsableSec, Projekt-AgriRegio, Projekt-GeoBox, Selected, AuswahlUsableSec},
pages = {764--786},
}
[BibTeX] [Abstract] [Download PDF]
Warning apps are used by many to receive warnings about imminent disasters. However, their potential for increasing awareness about general hazards and for increasing preparedness is currently underused. With a mixed-method design that includes a representative survey of the German population, a design workshop and an app evaluation experiment, this study investigates users’ preferences regarding non-acute preparedness alerts’ inclusion in crisis apps and the effectiveness of Nudging in this context. The experiment shows that while the social influence nudge had no significant effect compared to the control group without a nudging condition, the confrontational nudge increased the number of taken recommended preparedness measures. The evaluation indicates that the preparedness alerts increased users’ knowledge and their motivation to use a warning app. This motivation is, in contrast, decreased when the messages are perceived as a disruption. While many oppose push notifications, favor finding persuasively designed preparedness advice in a separate menu or as an optional notification.
@article{haunschildPreparednessNudgingWarning2023,
title = {Preparedness {Nudging} for {Warning} {Apps}? {A} {Mixed}-{Method} {Study} {Investigating} {Popularity} and {Effects} of {Preparedness} {Alerts} in {Warning} {Apps}},
volume = {172},
issn = {1071-5819},
url = {https://peasec.de/paper/2023/2023_HaunschildPauliReuter_NudgingWarningApps_IJHCS.pdf},
doi = {https://doi.org/10.1016/j.ijhcs.2023.102995},
abstract = {Warning apps are used by many to receive warnings about imminent disasters. However, their potential for increasing awareness about general hazards and for increasing preparedness is currently underused. With a mixed-method design that includes a representative survey of the German population, a design workshop and an app evaluation experiment, this study investigates users’ preferences regarding non-acute preparedness alerts’ inclusion in crisis apps and the effectiveness of Nudging in this context. The experiment shows that while the social influence nudge had no significant effect compared to the control group without a nudging condition, the confrontational nudge increased the number of taken recommended preparedness measures. The evaluation indicates that the preparedness alerts increased users’ knowledge and their motivation to use a warning app. This motivation is, in contrast, decreased when the messages are perceived as a disruption. While many oppose push notifications, favor finding persuasively designed preparedness advice in a separate menu or as an optional notification.},
journal = {International Journal on Human-Computer Studies (IJHCS)},
author = {Haunschild, Jasmin and Pauli, Selina and Reuter, Christian},
year = {2023},
keywords = {Crisis, Projekt-emergenCITY, A-Paper, Ranking-ImpactFactor, Student, Projekt-ATHENE-SecUrban, AuswahlCrisis, Selected},
pages = {102995},
}
[BibTeX] [Abstract] [Download PDF]
A Design Science Artefact for Cyber Threat Detection and Actor Specific Communication
@article{bayerMultiLevelFineTuningData2023,
title = {Multi-{Level} {Fine}-{Tuning}, {Data} {Augmentation}, and {Few}-{Shot} {Learning} for {Specialized} {Cyber} {Threat} {Intelligence}},
issn = {0167-4048},
url = {https://peasec.de/paper/2023/2023_BayerFreyReuter_MultiLevelFineTuningForCyberThreatIntelligence_CS.pdf},
doi = {10.1016/j.cose.2023.103430},
abstract = {A Design Science Artefact for Cyber Threat Detection and Actor Specific Communication},
journal = {Computers \& Security},
author = {Bayer, Markus and Frey, Tobias and Reuter, Christian},
year = {2023},
keywords = {A-Paper, Ranking-ImpactFactor, Student, Security, Projekt-ATHENE, Projekt-CROSSING, Projekt-CYWARN},
}
[BibTeX] [Abstract] [Download PDF]
Data augmentation, the artificial creation of training data for machine learning by transformations, is a widely studied research field across machine learning disciplines. While it is useful for increasing a model’s generalization capabilities, it can also address many other challenges and problems, from overcoming a limited amount of training data, to regularizing the objective, to limiting the amount data used to protect privacy. Based on a precise description of the goals and applications of data augmentation and a taxonomy for existing works, this survey is concerned with data augmentation methods for textual classification and aims to provide a concise and comprehensive overview for researchers and practitioners. Derived from the taxonomy, we divide more than 100 methods into 12 different groupings and give state-of-the-art references expounding which methods are highly promising by relating them to each other. Finally, research perspectives that may constitute a building block for future work are provided.
@article{bayer_survey_2023,
title = {A {Survey} on {Data} {Augmentation} for {Text} {Classification}},
volume = {55},
url = {http://www.peasec.de/paper/2023/2023_BayerKaufholdReuter_SurveyDataAugmentationTextClassification_CSUR.pdf},
doi = {10.1145/3544558},
abstract = {Data augmentation, the artificial creation of training data for machine learning by transformations, is a widely studied research field across machine learning disciplines. While it is useful for increasing a model's generalization capabilities, it can also address many other challenges and problems, from overcoming a limited amount of training data, to regularizing the objective, to limiting the amount data used to protect privacy. Based on a precise description of the goals and applications of data augmentation and a taxonomy for existing works, this survey is concerned with data augmentation methods for textual classification and aims to provide a concise and comprehensive overview for researchers and practitioners. Derived from the taxonomy, we divide more than 100 methods into 12 different groupings and give state-of-the-art references expounding which methods are highly promising by relating them to each other. Finally, research perspectives that may constitute a building block for future work are provided.},
number = {7},
journal = {ACM Computing Surveys (CSUR)},
author = {Bayer, Markus and Kaufhold, Marc-André and Reuter, Christian},
year = {2023},
keywords = {Crisis, Projekt-emergenCITY, A-Paper, Ranking-ImpactFactor, Projekt-ATHENE-SecUrban, Projekt-CYWARN, AuswahlCrisis, Selected, Ranking-CORE-A*, AuswahlKaufhold, HabilitationKaufhold},
pages = {1--39},
}
[BibTeX] [Abstract] [Download PDF]
The negotiation of stakeholder values as a collaborative process throughout technology development has been studied extensively within the fields of Computer Supported Cooperative Work and Human-Computer Interaction. Despite their increasing significance for cybersecurity incident response, there is a gap in research on values of importance to the design of open-source intelligence (OSINT) technologies for this purpose. In this paper, we investigate which values and value conflicts emerge due to the application and development of machine learning (ML) based OSINT technologies to assist cyber security incident response operators. For this purpose, we employ a triangulation of methods, consisting of a systematic survey of the technical literature on the development of OSINT artefacts for cybersecurity (N = 73) and an empirical value sensitive design case study, comprising semi-structured interviews with stakeholders (N = 9) as well as a focus group (N = 7) with developers. Based on our results, we identify implications relevant to the research on and design of OSINT artefacts for cybersecurity incident response.
@article{riebeValuesValueConflicts2023,
title = {Values and {Value} {Conflicts} in the {Context} of {OSINT} {Technologies} for {Cybersecurity} {Incident} {Response}: {A} {Value} {Sensitive} {Design} {Perspective}},
url = {https://link.springer.com/article/10.1007/s10606-022-09453-4},
doi = {10.1007/s10606-022-09453-4},
abstract = {The negotiation of stakeholder values as a collaborative process throughout technology development has been studied extensively within the fields of Computer Supported Cooperative Work and Human-Computer Interaction. Despite their increasing significance for cybersecurity incident response, there is a gap in research on values of importance to the design of open-source intelligence (OSINT) technologies for this purpose. In this paper, we investigate which values and value conflicts emerge due to the application and development of machine learning (ML) based OSINT technologies to assist cyber security incident response operators. For this purpose, we employ a triangulation of methods, consisting of a systematic survey of the technical literature on the development of OSINT artefacts for cybersecurity (N = 73) and an empirical value sensitive design case study, comprising semi-structured interviews with stakeholders (N = 9) as well as a focus group (N = 7) with developers. Based on our results, we identify implications relevant to the research on and design of OSINT artefacts for cybersecurity incident response.},
journal = {Computer Supported Cooperative Work: The Journal of Collaborative Computing (JCSCW)},
author = {Riebe, Thea and Bäumler, Julian and Kaufhold, Marc-André and Reuter, Christian},
year = {2023},
keywords = {HCI, A-Paper, Ranking-ImpactFactor, Student, Security, UsableSec, Projekt-CROSSING, Projekt-ATHENE-SecUrban, Projekt-CYWARN, Ranking-CORE-B},
}
[BibTeX] [Abstract] [Download PDF]
The value of social media in crises, disasters, and emergencies across different events, participants, and states is now well-examined in crisis informatics research. Previous research has contributed to the state of the art with empirical insights on the use of social media, approaches for the gathering and processing of big social data, the design and evaluation of information systems, and the analysis of cumulative and longitudinal data. While some studies examined social media use representatively for their target audience, these usually only comprise a single point of inquiry and do not allow for a trend analysis. This work provides results (1) of a representative survey with German citizens from 2021 on use patterns, perceptions, and expectations regarding social media during emergencies. Furthermore, it (2) compares these results to previous surveys and provides insights on temporal changes and trends from 2017, over 2019 to 2021. Our findings highlight that social media use in emergencies increased in 2021 and 2019 compared to 2017. Between 2019 and 2021, the amount of information shared on social media remained on a similar level, while the perceived disadvantages of social media in emergencies significantly increased. In light of demographic variables, the results of the 2021 survey confirm previous findings, according to which older individuals (45+ years) use social media in emergencies less often than younger individuals (18-24 years). Furthermore, while the quicker availability of information was one of the reasons for social media use, especially the potential information overload was a key factor for not using social media in emergencies. The results are discussed in light of the dynamic nature of attitudes regarding social media in emergencies and the need to account for heterogeneity in user expectations to build trustworthy information ecosystems in social media.
@article{reuterIncreasingAdoptionPerceived2023,
title = {Increasing {Adoption} {Despite} {Perceived} {Limitations} of {Social} {Media} in {Emergencies}: {Representative} {Insights} on {German} {Citizens}’ {Perception} and {Trends} from 2017 to 2021},
volume = {96},
issn = {2212-4209},
url = {https://peasec.de/paper/2023/2023_ReuterKaufholdBiselliPleil_SocialMediaEmergenciesSurvey_IJDRR.pdf},
doi = {10.1016/j.ijdrr.2023.103880},
abstract = {The value of social media in crises, disasters, and emergencies across different events, participants, and states is now well-examined in crisis informatics research. Previous research has contributed to the state of the art with empirical insights on the use of social media, approaches for the gathering and processing of big social data, the design and evaluation of information systems, and the analysis of cumulative and longitudinal data. While some studies examined social media use representatively for their target audience, these usually only comprise a single point of inquiry and do not allow for a trend analysis. This work provides results (1) of a representative survey with German citizens from 2021 on use patterns, perceptions, and expectations regarding social media during emergencies. Furthermore, it (2) compares these results to previous surveys and provides insights on temporal changes and trends from 2017, over 2019 to 2021. Our findings highlight that social media use in emergencies increased in 2021 and 2019 compared to 2017. Between 2019 and 2021, the amount of information shared on social media remained on a similar level, while the perceived disadvantages of social media in emergencies significantly increased. In light of demographic variables, the results of the 2021 survey confirm previous findings, according to which older individuals (45+ years) use social media in emergencies less often than younger individuals (18-24 years). Furthermore, while the quicker availability of information was one of the reasons for social media use, especially the potential information overload was a key factor for not using social media in emergencies. The results are discussed in light of the dynamic nature of attitudes regarding social media in emergencies and the need to account for heterogeneity in user expectations to build trustworthy information ecosystems in social media.},
journal = {International Journal of Disaster Risk Reduction (IJDRR)},
author = {Reuter, Christian and Kaufhold, Marc-André and Biselli, Tom and Pleil, Helene},
year = {2023},
keywords = {Crisis, Projekt-emergenCITY, Projekt-NEBULA, A-Paper, Ranking-ImpactFactor, SocialMedia, Student, Projekt-CYLENCE, AuswahlCrisis},
}
[BibTeX] [Abstract] [Download PDF]
The number of newly published vulnerabilities is constantly increasing. Until now, the information available when a new vulnerability is published is manually assessed by experts using a ()cvss vector and score. This assessment is time consuming and requires expertise. Various works already try to predict vectors or scores using machine learning based on the textual descriptions of the vulnerability to enable faster assessment. However, for this purpose, previous works only use the texts available in databases such as nvd. With this work, the publicly available web pages referenced in the nvd are analyzed and made available as sources of texts through web scraping. A dl based method for predicting the vector is implemented and evaluated. The present work provides a classification of the nvd’s reference texts based on the suitability and crawlability of their texts. While we identified the overall influence of the additional texts is negligible, we outperformed the state-of-the-art with our dl prediction models.
@article{kuehnCommonVulnerabilityScoring2023,
title = {Common vulnerability scoring system prediction based on open source intelligence information sources},
url = {https://peasec.de/paper/2023/2023_KuehnRelkeReuter_CommonVulnerabilityScoringSystemOSINT_CompSec.pdf},
doi = {10.1016/j.cose.2023.103286},
abstract = {The number of newly published vulnerabilities is constantly increasing. Until now, the information available when a new vulnerability is published is manually assessed by experts using a ()cvss vector and score. This assessment is time consuming and requires expertise. Various works already try to predict vectors or scores using machine learning based on the textual descriptions of the vulnerability to enable faster assessment. However, for this purpose, previous works only use the texts available in databases such as nvd. With this work, the publicly available web pages referenced in the nvd are analyzed and made available as sources of texts through web scraping. A dl based method for predicting the vector is implemented and evaluated. The present work provides a classification of the nvd’s reference texts based on the suitability and crawlability of their texts. While we identified the overall influence of the additional texts is negligible, we outperformed the state-of-the-art with our dl prediction models.},
journal = {Computers \& Security},
author = {Kuehn, Philipp and Relke, David N. and Reuter, Christian},
year = {2023},
keywords = {Ranking-ImpactFactor, Student, Security, UsableSec, Projekt-ATHENE-SecUrban, Projekt-CYWARN, Ranking-CORE-B},
}
[BibTeX] [Abstract] [Download PDF]
The Internet of Things (IoT) is a major trend that is seen as a great opportunity to improve efficiency in many domains, including agriculture. This technology could transform the sector, improving the management and quality of agricultural operations, for example, crop farming. The most promising data transmission standard for this domain seems to be Long Range Wide Area Network (LoRaWAN), a popular representative of low power wide area network technologies today. LoRaWAN, like any wireless protocol, has properties that can be exploited by attackers, which has been a topic of multiple research papers in recent years. By conducting a systematic literature review, we build a recent list of attacks, as well as collect mitigation options. Taking a look at a concrete use case (IoT in agriculture) allows us to evaluate the practicality of both exploiting the vulnerabilities and implementing the countermeasures. We detected 16 attacks that we grouped into six attack types. Along with the attacks, we collect countermeasures for attack mitigation. Developers can use our findings to minimize the risks when developing applications based on LoRaWAN. These mostly theoretical security recommendations should encourage future works to evaluate the mitigations in practice.
@article{kuntkeLoRaWANSecurityIssues2022,
title = {{LoRaWAN} {Security} {Issues} and {Mitigation} {Options} by the {Example} of {Agricultural} {IoT} {Scenarios}},
volume = {33},
issn = {2161-3915},
url = {https://www.peasec.de/paper/2022/2022_KuntkeRomanenkoLinsnerSteinbrinkReuter_LoRaWANsecurityAgriculture_ETT.pdf},
doi = {10.1002/ett.4452},
abstract = {The Internet of Things (IoT) is a major trend that is seen as a great opportunity to improve efficiency in many domains, including agriculture. This technology could transform the sector, improving the management and quality of agricultural operations, for example, crop farming. The most promising data transmission standard for this domain seems to be Long Range Wide Area Network (LoRaWAN), a popular representative of low power wide area network technologies today. LoRaWAN, like any wireless protocol, has properties that can be exploited by attackers, which has been a topic of multiple research papers in recent years. By conducting a systematic literature review, we build a recent list of attacks, as well as collect mitigation options. Taking a look at a concrete use case (IoT in agriculture) allows us to evaluate the practicality of both exploiting the vulnerabilities and implementing the countermeasures. We detected 16 attacks that we grouped into six attack types. Along with the attacks, we collect countermeasures for attack mitigation. Developers can use our findings to minimize the risks when developing applications based on LoRaWAN. These mostly theoretical security recommendations should encourage future works to evaluate the mitigations in practice.},
number = {5},
journal = {Transactions on Emerging Telecommunications Technologies (ETT)},
author = {Kuntke, Franz and Romanenko, Vladimir and Linsner, Sebastian and Steinbrink, Enno and Reuter, Christian},
month = may,
year = {2022},
keywords = {A-Paper, Ranking-ImpactFactor, Student, Security, Projekt-GRKPrivacy, Projekt-AgriRegio, Projekt-GeoBox, RSF, Projekt-HyServ},
pages = {e4452},
}
[BibTeX] [Abstract] [Download PDF]
Agriculture is subject to high demands regarding resilience as it is an essential component of the food production chain. In the agricultural sector, there is an increasing usage of digital tools that rely on communication and energy infrastructures. Should disruption occur, such strengthened dependencies on other infrastructures increase the probability of ripple effects. Thus, there is a need to analyze the resilience of the agricultural sector with a specific focus on the effects of digitalization. This study works out resilience capacities of the interconnected technologies used in farm systems based on the experiences and opinions of farmers. Information was gathered through focus group interviews with farmers (N = 52) and a survey with participants from the agricultural sector (N = 118). In particular, the focus is put on the digital tools and other information and communication technologies they use. Based on a definition of resilience capacities, we evaluate resilience regarding energy and communication demands in various types of farm systems. Especially important are the resilience aspects of modern systems’ digital communication as well as the poorly developed and nonresilient network infrastructure in rural areas that contrast with the claim for a resilient agriculture. The result is a low robustness capacity, as our analysis concludes with the risk of food production losses.
@article{kuntkeResilienceAgricultureCommunication2022,
title = {Resilience in {Agriculture}: {Communication} and {Energy} {Infrastructure} {Dependencies} of {German} {Farmers}},
volume = {13},
issn = {2192-6395},
url = {https://link.springer.com/article/10.1007/s13753-022-00404-7},
doi = {10.1007/s13753-022-00404-7},
abstract = {Agriculture is subject to high demands regarding resilience as it is an essential component of the food production chain. In the agricultural sector, there is an increasing usage of digital tools that rely on communication and energy infrastructures. Should disruption occur, such strengthened dependencies on other infrastructures increase the probability of ripple effects. Thus, there is a need to analyze the resilience of the agricultural sector with a specific focus on the effects of digitalization. This study works out resilience capacities of the interconnected technologies used in farm systems based on the experiences and opinions of farmers. Information was gathered through focus group interviews with farmers (N = 52) and a survey with participants from the agricultural sector (N = 118). In particular, the focus is put on the digital tools and other information and communication technologies they use. Based on a definition of resilience capacities, we evaluate resilience regarding energy and communication demands in various types of farm systems. Especially important are the resilience aspects of modern systems’ digital communication as well as the poorly developed and nonresilient network infrastructure in rural areas that contrast with the claim for a resilient agriculture. The result is a low robustness capacity, as our analysis concludes with the risk of food production losses.},
number = {2},
journal = {International Journal of Disaster Risk Science (IJDRS)},
author = {Kuntke, Franz and Linsner, Sebastian and Steinbrink, Enno and Franken, Jonas and Reuter, Christian},
month = apr,
year = {2022},
keywords = {A-Paper, Ranking-ImpactFactor, Security, Projekt-GRKPrivacy, Projekt-AgriRegio, Projekt-GeoBox, RSF, Selected, Projekt-HyServ, Ranking-CORE-B},
pages = {214--229},
}
[BibTeX] [Download PDF]
@book{reuterSpecialIssueUsable2022,
title = {Special {Issue} on {Usable} {Security} and {Privacy} with {User}-{Centered} {Interventions} and {Transparency} {Mechanisms} - {Behaviour} \& {Information} {Technology} ({BIT})},
url = {https://www.tandfonline.com/toc/tbit20/41/10?nav=tocList},
publisher = {Taylor \& Francis},
author = {Reuter, Christian and Lo Iacono, Luigi and Benlian, Alexander},
year = {2022},
note = {Publication Title: Behaviour \& Information Technology (BIT)},
keywords = {Crisis, HCI, Peace, A-Paper, Ranking-CORE-A, Ranking-ImpactFactor, SocialMedia, UsableSec, Projekt-ATHENE, Projekt-CROSSING},
}
[BibTeX] [Abstract] [Download PDF]
Business collaboration in the era of digital transformation requires the exchange of operational data. Since data are hardly controllable once they have been published or shared with others, it is highly important that users are clearly informed about who has access to which data and how certain settings can prevent the disclosure of sensitive data. However, giving end users more control over their data through increased transparency could also lead to information overload. This is particularly true in the field of agriculture, where tight schedules put pressure on employees of small enterprises. We conduct an empirical prestudy with 52 German farmers to investigate current data sharing scenarios. From these insights, we derive requirements and a concept for data sharing solutions providing data flow transparency for users. To investigate the behavior of users and the effects of transparent UI controls, we evaluate a prototype with 18 persons. Our evaluation shows that farmers demand flexible and secure tools that adjust to their workflows. Also, data should be stored and processed locally, granting farmers data sovereignty. Although the controls require additional effort, the evaluated transparent controls for data disclosure are easy to use and raise user awareness.
@article{linsnerSupportingUsersData2022,
title = {Supporting {Users} in {Data} {Disclosure} {Scenarios} in {Agriculture} through {Transparency}},
volume = {41},
url = {http://www.peasec.de/paper/2022/2022_LinsnerSteinbrinkKuntkeFrankenReuter_SupportingDataDisclosureScenariosAgriculture_BIT.pdf},
doi = {10.1080/0144929X.2022.2068070},
abstract = {Business collaboration in the era of digital transformation requires the exchange of operational data. Since data are hardly controllable once they have been published or shared with others, it is highly important that users are clearly informed about who has access to which data and how certain settings can prevent the disclosure of sensitive data. However, giving end users more control over their data through increased transparency could also lead to information overload. This is particularly true in the field of agriculture, where tight schedules put pressure on employees of small enterprises. We conduct an empirical prestudy with 52 German farmers to investigate current data sharing scenarios. From these insights, we derive requirements and a concept for data sharing solutions providing data flow transparency for users. To investigate the behavior of users and the effects of transparent UI controls, we evaluate a prototype with 18 persons. Our evaluation shows that farmers demand flexible and secure tools that adjust to their workflows. Also, data should be stored and processed locally, granting farmers data sovereignty. Although the controls require additional effort, the evaluated transparent controls for data disclosure are easy to use and raise user awareness.},
number = {10},
journal = {Behaviour \& Information Technology (BIT)},
author = {Linsner, Sebastian and Steinbrink, Enno and Kuntke, Franz and Franken, Jonas and Reuter, Christian},
year = {2022},
keywords = {A-Paper, Ranking-CORE-A, Ranking-ImpactFactor, Security, UsableSec, Projekt-GRKPrivacy, Projekt-AgriRegio, RSF, Projekt-HyServ},
pages = {2137--2159},
}
[BibTeX] [Abstract] [Download PDF]
Within CSCW and HCI, an increasing body of literature has been demonstrating the essential relevance of infrastructures and infrastructuring to the work of people engaging in technologically mediated nomadicity. Tech Nomads – or T-Nomads, as they are sometimes called – not only rely on technological, human, and environmental infrastructural components – such as Wi-Fi, technical support, space, and basic resources such as light and power outlets – but they also have to engage in infrastructuring to mobilise their workplaces and effectively accomplish work in and across different locations. In this article, we bring an infrastructuring perspective to understanding nomadic practices concerning the organisation of complex collaborative events. We introduce findings from a long-term investigation focusing on how infrastructures are re-instantiated with the help of digital technologies, according to emerging demands from T-Nomads. Our findings demonstrate the need for a ‘nonessentialist’ approach to nomadicity, one which recognises the character of nomadic work and its varied aspects in different contexts. We extend the infrastructuring literature by demonstrating how infrastructuring work is done in a complex collaborative initiative, as the organisation of the annual European Social Forum.
@article{pinattidecarvalhoUnderstandingNomadicPractices2022,
title = {Understanding {Nomadic} {Practices} of {Social} {Activist} {Networks} through the {Lens} of {Infrastructuring}: {The} {Case} of the {European} {Social} {Forum}},
url = {https://link.springer.com/article/10.1007/s10606-022-09442-7},
doi = {10.1007/s10606-022-09442-7},
abstract = {Within CSCW and HCI, an increasing body of literature has been demonstrating the essential relevance of infrastructures and infrastructuring to the work of people engaging in technologically mediated nomadicity. Tech Nomads – or T-Nomads, as they are sometimes called – not only rely on technological, human, and environmental infrastructural components – such as Wi-Fi, technical support, space, and basic resources such as light and power outlets – but they also have to engage in infrastructuring to mobilise their workplaces and effectively accomplish work in and across different locations. In this article, we bring an infrastructuring perspective to understanding nomadic practices concerning the organisation of complex collaborative events. We introduce findings from a long-term investigation focusing on how infrastructures are re-instantiated with the help of digital technologies, according to emerging demands from T-Nomads. Our findings demonstrate the need for a ‘nonessentialist’ approach to nomadicity, one which recognises the character of nomadic work and its varied aspects in different contexts. We extend the infrastructuring literature by demonstrating how infrastructuring work is done in a complex collaborative initiative, as the organisation of the annual European Social Forum.},
journal = {Computer Supported Cooperative Work: The Journal of Collaborative Computing (JCSCW)},
author = {Pinatti De Carvalho, Aparecido Fabiano and Saeed, Saqib and Reuter, Christian and Rohde, Markus and Randall, Dave and Pipek, Volkmar and Wulf, Volker},
year = {2022},
keywords = {Crisis, HCI, A-Paper, Ranking-ImpactFactor},
}
[BibTeX] [Abstract] [Download PDF]
In many cases of machine learning, research suggests that the development of training data might have a higher relevance than the choice and modelling of classifiers themselves. Thus, data augmentation methods have been developed to improve classifiers by artificially created training data. In NLP, there is the challenge of establishing universal rules for text transformations which provide new linguistic patterns. In this paper, we present and evaluate a text generation method suitable to increase the performance of classifiers for long and short texts. We achieved promising improvements when evaluating short as well as long text tasks with the enhancement by our text generation method. Especially with regard to small data analytics, additive accuracy gains of up to 15.53\% and 3.56\% are achieved within a constructed low data regime, compared to the no augmentation baseline and another data augmentation technique. As the current track of these constructed regimes is not universally applicable, we also show major improvements in several real world low data tasks (up to +4.84 F1-score). Since we are evaluating the method from many perspectives (in total 11 datasets), we also observe situations where the method might not be suitable. We discuss implications and patterns for the successful application of our approach on different types of datasets.
@article{bayer_data_2022,
title = {Data {Augmentation} in {Natural} {Language} {Processing}: {A} {Novel} {Text} {Generation} {Approach} for {Long} and {Short} {Text} {Classifiers}},
url = {https://link.springer.com/article/10.1007/s13042-022-01553-3},
doi = {10.1007/s13042-022-01553-3},
abstract = {In many cases of machine learning, research suggests that the development of training data might have a higher relevance than the choice and modelling of classifiers themselves. Thus, data augmentation methods have been developed to improve classifiers by artificially created training data. In NLP, there is the challenge of establishing universal rules for text transformations which provide new linguistic patterns. In this paper, we present and evaluate a text generation method suitable to increase the performance of classifiers for long and short texts. We achieved promising improvements when evaluating short as well as long text tasks with the enhancement by our text generation method. Especially with regard to small data analytics, additive accuracy gains of up to 15.53\% and 3.56\% are achieved within a constructed low data regime, compared to the no augmentation baseline and another data augmentation technique. As the current track of these constructed regimes is not universally applicable, we also show major improvements in several real world low data tasks (up to +4.84 F1-score). Since we are evaluating the method from many perspectives (in total 11 datasets), we also observe situations where the method might not be suitable. We discuss implications and patterns for the successful application of our approach on different types of datasets.},
journal = {International Journal of Machine Learning and Cybernetics (IJMLC)},
author = {Bayer, Markus and Kaufhold, Marc-André and Buchhold, Björn and Keller, Marcel and Dallmeyer, Jörg and Reuter, Christian},
year = {2022},
keywords = {Projekt-emergenCITY, A-Paper, Ranking-ImpactFactor, Student, Security, Projekt-CYWARN, HabilitationKaufhold},
}
[BibTeX] [Abstract] [Download PDF]
Artificial Intelligence (AI) seems to be impacting all industry sectors, while becoming a motor for innovation. The diffusion of AI from the civilian sector to the defense sector, and AI’s dual-use potential has drawn attention from security and ethics scholars. With the publication of the ethical guideline Trustworthy AI by the European Union (EU), normative questions on the application of AI have been further evaluated. In order to draw conclusions on Trustworthy AI as a point of reference for responsible research and development (R&D), we approach the diffusion of AI across both civilian and military spheres in the EU. We capture the extent of technological diffusion and derive European and German patent citation networks. Both networks indicate a low degree of diffusion of AI between civilian and defense sectors. A qualitative investigation of project descriptions of a research institute’s work in both civilian and military fields shows that military AI applications stress accuracy or robustness, while civilian AI reflects a focus on human-centric values. Our work represents a first approach by linking processes of technology diffusion with normative evaluations of R&D.
@article{schmidDualUseTrustworthyMixed2022,
title = {Dual-{Use} and {Trustworthy}? {A} {Mixed} {Methods} {Analysis} of {AI} {Diffusion} between {Civilian} and {Defense} {R}\&{D}},
volume = {28},
url = {https://peasec.de/paper/2022/2022_SchmidRiebeReuter_DualUseandTrustworthy_ScienceEngineeringEthics.pdf},
doi = {10.1007/s11948-022-00364-7},
abstract = {Artificial Intelligence (AI) seems to be impacting all industry sectors, while becoming a motor for innovation. The diffusion of AI from the civilian sector to the defense sector, and AI’s dual-use potential has drawn attention from security and ethics scholars. With the publication of the ethical guideline Trustworthy AI by the European Union (EU), normative questions on the application of AI have been further evaluated. In order to draw conclusions on Trustworthy AI as a point of reference for responsible research and development (R\&D), we approach the diffusion of AI across both civilian and military spheres in the EU. We capture the extent of technological diffusion and derive European and German patent citation networks. Both networks indicate a low degree of diffusion of AI between civilian and defense sectors. A qualitative investigation of project descriptions of a research institute’s work in both civilian and military fields shows that military AI applications stress accuracy or robustness, while civilian AI reflects a focus on human-centric values. Our work represents a first approach by linking processes of technology diffusion with normative evaluations of R\&D.},
number = {12},
journal = {Science and Engineering Ethics},
author = {Schmid, Stefka and Riebe, Thea and Reuter, Christian},
year = {2022},
keywords = {Peace, A-Paper, Ranking-ImpactFactor, AuswahlPeace, Projekt-CYWARN, Projekt-KontiKat},
pages = {1--23},
}
[BibTeX] [Abstract] [Download PDF]
In the last decades, research has shown that both technical solutions and user perceptions are important to improve security and privacy in the digital realm. The field of ‘usable security’ already started to emerge in the mid-90s, primarily focussed on password and email security. Later on, the research field of ”usable security and privacy” evolved and broadened the aim to design concepts and tools to assist users in enhancing their behaviour with regard to both privacy and security. Nevertheless, many user interventions are not as effective as desired. Because of highly diverse usage contexts, leading to different privacy and security requirements and not always to one-size-fits-all approaches, tailorability is necessary to address this issue. Furthermore, transparency is a crucial requirement, as providing comprehensible information may counter reactance towards security interventions. This article first provides a brief history of the research field in its first quarter-century and then highlights research on the transparency and tailorability of user interventions. Based on this, this article then presents six contributions with regard to (1) privacy concerns in times of COVID-19, (2) authentication on mobile devices, (3) GDPR-compliant data management, (4) privacy notices on websites, (5) data disclosure scenarios in agriculture, as well as (6) rights under data protection law and the concrete process should data subjects want to claim those rights. This article concludes with several research directions on user-centred transparency and tailorability.
@article{reuterQuarterCenturyUsable2022,
title = {A {Quarter} {Century} of {Usable} {Security} and {Privacy} {Research}: {Transparency}, {Tailorability}, and the {Road} {Ahead}},
volume = {41},
issn = {0144-929X},
url = {https://www.peasec.de/paper/2022/2022_ReuterLoIaconoBenlian_QuarterCenturyUsableSecurityandPrivacyResearch_BIT.pdf},
doi = {10.1080/0144929X.2022.2080908},
abstract = {In the last decades, research has shown that both technical solutions and user perceptions are important to improve security and privacy in the digital realm. The field of ‘usable security’ already started to emerge in the mid-90s, primarily focussed on password and email security. Later on, the research field of ”usable security and privacy” evolved and broadened the aim to design concepts and tools to assist users in enhancing their behaviour with regard to both privacy and security. Nevertheless, many user interventions are not as effective as desired. Because of highly diverse usage contexts, leading to different privacy and security requirements and not always to one-size-fits-all approaches, tailorability is necessary to address this issue. Furthermore, transparency is a crucial requirement, as providing comprehensible information may counter reactance towards security interventions. This article first provides a brief history of the research field in its first quarter-century and then highlights research on the transparency and tailorability of user interventions. Based on this, this article then presents six contributions with regard to (1) privacy concerns in times of COVID-19, (2) authentication on mobile devices, (3) GDPR-compliant data management, (4) privacy notices on websites, (5) data disclosure scenarios in agriculture, as well as (6) rights under data protection law and the concrete process should data subjects want to claim those rights. This article concludes with several research directions on user-centred transparency and tailorability.},
number = {10},
journal = {Behaviour \& Information Technology (BIT)},
author = {Reuter, Christian and Lo Iacono, Luigi and Benlian, Alexander},
year = {2022},
keywords = {Crisis, HCI, A-Paper, Ranking-CORE-A, Ranking-ImpactFactor, SocialMedia, Security, UsableSec, Projekt-CROSSING, Projekt-ATHENE-SecUrban},
pages = {2035--2048},
}
[BibTeX] [Abstract] [Download PDF]
Nudging users to keep them secure online has become a growing research field in cybersecurity. While existing approaches are mainly blackbox based, showing aggregated visualisations as one-size-fits-all nudges, personalisation turned out promising to enhance the efficacy of nudges within the high variance of users and contexts. This article presents a disaggregated whitebox-based visualisation of critical information as a novel nudge. By segmenting users according to their decision-making and information processing styles, we investigate if the novel nudge is more effective for specific users than a common black-box nudge. Based on existing literature about critical factors in password security, we designed a dynamic radar chart and parallel coordinates as disaggregated visualisations. We evaluated the short-term effectiveness and users’ perception of the nudges in a think-aloud prestudy and a representative online evaluation (N=1.012). Our findings suggest that dynamic radar charts present a moderately effective nudge towards stronger passwords regarding short-term efficacy and are appreciated particularly by players of role-playing games.
@article{hartwigNudgingUsersBetter2022,
title = {Nudging {Users} {Towards} {Better} {Security} {Decisions} in {Password} {Creation} {Using} {Whitebox}-based {Multidimensional} {Visualizations}},
volume = {41},
url = {https://peasec.de/paper/2022/2022_HartwigReuter_WhiteboxMultidimensionalNudges_BIT.pdf},
doi = {10.1080/0144929X.2021.1876167},
abstract = {Nudging users to keep them secure online has become a growing research field in cybersecurity. While existing approaches are mainly blackbox based, showing aggregated visualisations as one-size-fits-all nudges, personalisation turned out promising to enhance the efficacy of nudges within the high variance of users and contexts. This article presents a disaggregated whitebox-based visualisation of critical information as a novel nudge. By segmenting users according to their decision-making and information processing styles, we investigate if the novel nudge is more effective for specific users than a common black-box nudge. Based on existing literature about critical factors in password security, we designed a dynamic radar chart and parallel coordinates as disaggregated visualisations. We evaluated the short-term effectiveness and users' perception of the nudges in a think-aloud prestudy and a representative online evaluation (N=1.012). Our findings suggest that dynamic radar charts present a moderately effective nudge towards stronger passwords regarding short-term efficacy and are appreciated particularly by players of role-playing games.},
number = {7},
journal = {Behaviour \& Information Technology (BIT)},
author = {Hartwig, Katrin and Reuter, Christian},
year = {2022},
keywords = {HCI, A-Paper, Ranking-CORE-A, Ranking-ImpactFactor, Security, UsableSec, Projekt-CROSSING, Selected, Projekt-ATHENE-FANCY, AuswahlUsableSec},
pages = {1357--1380},
}
[BibTeX] [Abstract] [Download PDF]
In the digital age, the vision of autonomous vehicles (AVs) is vibrant. Research is being conducted worldwide to inte-grate AVs into our everyday lives in the future, spending consid-erable amounts of money in the development process. Actors from both engineering as well as social sciences are involved in this re-search, with technical disciplines strongly dominating. In addition to perceived progress of numerous newly developed technologies such as AVs, challenges should also be referred to. According to research analysis, the transferability of autonomous cars to the military sphere seems to be frequently forgotten or ignored (dual-use). Since not much research has been conducted in Germany on the potential deployment of autonomous driving development steps into military domains, 25 semi-structured interviews with de-velopers and researchers and actors involved in the field, were conducted in 2020. The paper identifies that the majority of re-spondents interviewed were aware of general existing dual-use de-bates, however, few had reflected about dual-use issues regarding a possible transfer of their own development processes in the con-text of autonomous driving to military applications, intensively. One reason is the small-scale nature of research, another is the complexity of the field, which enables the engineer’s alienation from their responsibility for the artefacts’ use. Moreover, it has become clear that hardly any conversations among colleagues oc-cur about possible misuse and that no standardized policy guide-lines exist, which provide information about possible risk. To raise dual-use awareness, scientific contributions, risk education, and interdisciplinary discussions are essential.
@article{schwartzVisionThreatAwareness2022,
title = {Vision or {Threat} – {Awareness} for {Dual}-{Use} in the {Development} of {Autonomous} {Driving}},
volume = {3},
issn = {2637-6415},
url = {https://www.peasec.de/paper/2022/2022_SchwartzGuntrumReuter_VisionorThreatAwarenessDualUseAutonomousDriving_IEEE-TTS.pdf},
doi = {10.1109/TTS.2022.3182310},
abstract = {In the digital age, the vision of autonomous vehicles (AVs) is vibrant. Research is being conducted worldwide to inte-grate AVs into our everyday lives in the future, spending consid-erable amounts of money in the development process. Actors from both engineering as well as social sciences are involved in this re-search, with technical disciplines strongly dominating. In addition to perceived progress of numerous newly developed technologies such as AVs, challenges should also be referred to. According to research analysis, the transferability of autonomous cars to the military sphere seems to be frequently forgotten or ignored (dual-use). Since not much research has been conducted in Germany on the potential deployment of autonomous driving development steps into military domains, 25 semi-structured interviews with de-velopers and researchers and actors involved in the field, were conducted in 2020. The paper identifies that the majority of re-spondents interviewed were aware of general existing dual-use de-bates, however, few had reflected about dual-use issues regarding a possible transfer of their own development processes in the con-text of autonomous driving to military applications, intensively. One reason is the small-scale nature of research, another is the complexity of the field, which enables the engineer’s alienation from their responsibility for the artefacts’ use. Moreover, it has become clear that hardly any conversations among colleagues oc-cur about possible misuse and that no standardized policy guide-lines exist, which provide information about possible risk. To raise dual-use awareness, scientific contributions, risk education, and interdisciplinary discussions are essential.},
language = {en},
number = {3},
journal = {IEEE Transactions on Technology and Society},
author = {Schwartz, Sebastian and Guntrum, Laura and Reuter, Christian},
year = {2022},
keywords = {Peace, Projekt-TraCe, A-Paper, Ranking-ImpactFactor, AuswahlPeace, Selected, Projekt-ATHENE-FANCY},
pages = {163--174},
}
[BibTeX] [Abstract] [Download PDF]
The backbone network of submarine communication cables (SCC) carries 98\% of international internet traffic. Coastal and island states strongly depend on this physical internet infrastructure to provide internet connectivity. Although about 100 SCC breakdowns of human or natural origin occur at yearly average, a literature review reveals that there is no approach to assess individual state vulnerability to SCC failure in global comparison. In this article, the global SCC network is modeled based on publicly available data. Besides the analysis of the global network properties, a focus is put on remaining bandwidth capacities in three different failure scenario simulations of SCC breakdowns. As a result, this study identifies 15 highly vulnerable states and overseas territories, and another 28 territories that are classified as partially vulnerable to SCC failures. Since economic market decisions shape the structure of the SCC network, an uneven distribution of redundancies and the resulting vulnerability of disadvantaged economies can be confirmed. Therefore, the study’s findings may contribute to a better assessment of the necessity of preventive protection measures of critical telecommunication infrastructures in states and territories characterized by high and medium vulnerability.
@article{frankenDigitalDivideState2022,
title = {The {Digital} {Divide} in {State} {Vulnerability} to {Submarine} {Communications} {Cable} {Failure}},
volume = {38},
url = {https://peasec.de/paper/2022/2022_FrankenReinholdReichertReuter_DigitalDivideStateVulnerabilitySubmarineCommunicationsCable_IJCIP.pdf},
doi = {10.1016/j.ijcip.2022.100522},
abstract = {The backbone network of submarine communication cables (SCC) carries 98\% of international internet traffic. Coastal and island states strongly depend on this physical internet infrastructure to provide internet connectivity. Although about 100 SCC breakdowns of human or natural origin occur at yearly average, a literature review reveals that there is no approach to assess individual state vulnerability to SCC failure in global comparison. In this article, the global SCC network is modeled based on publicly available data. Besides the analysis of the global network properties, a focus is put on remaining bandwidth capacities in three different failure scenario simulations of SCC breakdowns. As a result, this study identifies 15 highly vulnerable states and overseas territories, and another 28 territories that are classified as partially vulnerable to SCC failures. Since economic market decisions shape the structure of the SCC network, an uneven distribution of redundancies and the resulting vulnerability of disadvantaged economies can be confirmed. Therefore, the study's findings may contribute to a better assessment of the necessity of preventive protection measures of critical telecommunication infrastructures in states and territories characterized by high and medium vulnerability.},
number = {100522},
journal = {International Journal of Critical Infrastructure Protection (IJCIP)},
author = {Franken, Jonas and Reinhold, Thomas and Reichert, Lilian and Reuter, Christian},
year = {2022},
keywords = {A-Paper, Ranking-ImpactFactor, AuswahlPeace, Student, Security, Projekt-AgriRegio, Projekt-ATHENE-SecUrban, Selected},
pages = {1--15},
}
[BibTeX] [Abstract] [Download PDF]
Social media have come to play a vital role not only in our everyday lives, but also in times of conflict and crisis such as natural disasters or civil wars. Recent research has highlighted, on the one hand, the use of social media as a means of recruitment by terrorists and, on the other hand, the use of Facebook, Twitter etc. to gain the support of the population during insurgencies. This article conducts a qualitative content analysis of content on Twitter concerning the conflict in the Jammu and Kashmir region. The tweets following the death of a popular militant, Burhan Wani, cover three different themes: (1) criticism of intellectuals, (2) Burhan Wani’s impact on the conflict, and (3) tweets referring to the conflict itself. Generally, people use Twitter to make their own point of view clear to others and discredit the opposing party, at the same time tweets are reflecting the antagonism between the two parties to the conflict, India and Pakistan. The sample of tweets reflects the lack of awareness among people in the region regarding the motivations of the new generation of militancy emerging in Kashmir after 1990.
@article{gabelDiscussingConflictSocial2022,
title = {Discussing {Conflict} in {Social} {Media} – {The} {Use} of {Twitter} in the {Jammu} and {Kashmir} {Conflict}},
volume = {15},
url = {https://journals.sagepub.com/doi/full/10.1177/1750635220970997},
abstract = {Social media have come to play a vital role not only in our everyday lives, but also in times of conflict and crisis such as natural disasters or civil wars. Recent research has highlighted, on the one hand, the use of social media as a means of recruitment by terrorists and, on the other hand, the use of Facebook, Twitter etc. to gain the support of the population during insurgencies. This article conducts a qualitative content analysis of content on Twitter concerning the conflict in the Jammu and Kashmir region. The tweets following the death of a popular militant, Burhan Wani, cover three different themes: (1) criticism of intellectuals, (2) Burhan Wani's impact on the conflict, and (3) tweets referring to the conflict itself. Generally, people use Twitter to make their own point of view clear to others and discredit the opposing party, at the same time tweets are reflecting the antagonism between the two parties to the conflict, India and Pakistan. The sample of tweets reflects the lack of awareness among people in the region regarding the motivations of the new generation of militancy emerging in Kashmir after 1990.},
number = {4},
journal = {Media, War \& Conflict},
author = {Gabel, Sabrina and Reichert, Lilian and Reuter, Christian},
year = {2022},
keywords = {Crisis, HCI, Peace, Ranking-ImpactFactor, SocialMedia, Projekt-ATHENE-SecUrban},
pages = {1--26},
}
[BibTeX] [Abstract] [Download PDF]
The revelation of the Stuxnet malware in 2010 shed light on the presence of state actors that are willing and capable of developing and using highly sophisticated, specialized malicious software for their political interests. These tools -often dubbed cyber weapons -are expected to become the next major advancement in weaponry technology. Besides the threats of offensive cyber operations for civil IT systems due to the interconnected nature of the cyberspace, international regulation of cyber weapons is -among other aspects -hindered by the fact that the military development and the strategic and tactical deployment of cyber weapons differ significantly from other weapons technologies. In order to establish measures of cyber arms related control treaties, it is crucial to identify these particular characteristics. Based on this premise, the article analyzes the current perspectives on cyber weapons, identifying their weaknesses of being either based on assumptions about adversarial actors or being applicable only after the usage of a malicious tool. In contrast to these approaches, the article focuses on the specific functional aspects of malware and presents an indicator-based assessment model based on parameters that can be measured prior to the application of malicious software. This enables the categorization of malicious tools as cyber weapons. Besides this, the article aims to introduce thought-provoking impulses with regard to social responsibility in computer science.
@article{reinholdCyberWeaponsAssessment2022,
title = {Towards a {Cyber} {Weapons} {Assessment} {Model} – {Assessment} of the {Technical} {Features} of {Malicious} {Software}},
volume = {3},
issn = {2637-6415},
url = {https://peasec.de/paper/2021/2021_ReinholdReuter_CyberWeapons_IEEETransactionsTechnologySociety.pdf},
doi = {10.1109/TTS.2021.3131817},
abstract = {The revelation of the Stuxnet malware in 2010 shed light on the presence of state actors that are willing and capable of developing and using highly sophisticated, specialized malicious software for their political interests. These tools -often dubbed cyber weapons -are expected to become the next major advancement in weaponry technology. Besides the threats of offensive cyber operations for civil IT systems due to the interconnected nature of the cyberspace, international regulation of cyber weapons is -among other aspects -hindered by the fact that the military development and the strategic and tactical deployment of cyber weapons differ significantly from other weapons technologies. In order to establish measures of cyber arms related control treaties, it is crucial to identify these particular characteristics. Based on this premise, the article analyzes the current perspectives on cyber weapons, identifying their weaknesses of being either based on assumptions about adversarial actors or being applicable only after the usage of a malicious tool. In contrast to these approaches, the article focuses on the specific functional aspects of malware and presents an indicator-based assessment model based on parameters that can be measured prior to the application of malicious software. This enables the categorization of malicious tools as cyber weapons. Besides this, the article aims to introduce thought-provoking impulses with regard to social responsibility in computer science.},
language = {en},
number = {3},
journal = {IEEE Transactions on Technology and Society},
author = {Reinhold, Thomas and Reuter, Christian},
month = sep,
year = {2022},
keywords = {Peace, A-Paper, Ranking-ImpactFactor, AuswahlPeace, Projekt-ATHENE-SecUrban, Cyberwar},
pages = {226--239},
}
[BibTeX] [Abstract] [Download PDF]
Technological progress can disrupt domains and change the way we work and collaborate. This paper presents a qualitative study with 52 German farmers that investigates the impact of the ongoing digitalization process in agriculture and discusses the implications for privacy research. As in other domains, the introduction of digital tools and services leads to the data itself becoming a resource. Sharing this data with products along the supply chain is favored by retailers and consumers, who benefit from traceability through transparency. However, transparency can pose a privacy risk. Having insight into the business data of others along the supply chain provides an advantage in terms of market position. This is particularly true in agriculture, where there is already a significant imbalance of power between actors. A multitude of small and medium-sized farming businesses are opposed by large upstream and downstream players that drive technological innovation. Further weakening the market position of farmers could lead to severe consequences for the entire sector. We found that on the one hand, privacy behaviors are affected by adoption of digitalization, and on the other hand, privacy itself influences adoption of digital tools. Our study sheds light on the emerging challenges for farmers and the role of privacy in the process of digitalization in agriculture.
@article{linsnerRolePrivacyDigitalization2021,
title = {The {Role} of {Privacy} in {Digitalization} – {Analysing} the {German} {Farmers}' {Perspective}},
volume = {2021},
url = {https://www.petsymposium.org/2021/files/papers/issue3/popets-2021-0050.pdf},
doi = {10.2478/popets-2021-0050},
abstract = {Technological progress can disrupt domains
and change the way we work and collaborate. This paper presents a qualitative study with 52 German farmers
that investigates the impact of the ongoing digitalization process in agriculture and discusses the implications for privacy research. As in other domains, the introduction of digital tools and services leads to the data
itself becoming a resource. Sharing this data with products along the supply chain is favored by retailers and
consumers, who benefit from traceability through transparency. However, transparency can pose a privacy risk.
Having insight into the business data of others along the
supply chain provides an advantage in terms of market
position. This is particularly true in agriculture, where
there is already a significant imbalance of power between actors. A multitude of small and medium-sized
farming businesses are opposed by large upstream and
downstream players that drive technological innovation.
Further weakening the market position of farmers could
lead to severe consequences for the entire sector. We
found that on the one hand, privacy behaviors are affected by adoption of digitalization, and on the other
hand, privacy itself influences adoption of digital tools.
Our study sheds light on the emerging challenges for
farmers and the role of privacy in the process of digitalization in agriculture.},
number = {3},
journal = {Proceedings on Privacy Enhancing Technologies (PoPETs)},
author = {Linsner, Sebastian and Kuntke, Franz and Steinbrink, Enno and Franken, Jonas and Reuter, Christian},
year = {2021},
keywords = {HCI, A-Paper, Ranking-CORE-A, Ranking-ImpactFactor, Security, UsableSec, Projekt-GRKPrivacy, Projekt-GeoBox, Selected, AuswahlUsableSec, Projekt-HyServ},
pages = {334--350},
}
[BibTeX] [Abstract] [Download PDF]
Since 2015, an increased number of asylum seekers is coming to Europe. These migration movements increasingly rely on digital infrastructure, such as mobile internet access and online services, in order to reach their targeted destination countries. Asylum seekers often use smartphones for information and communication purposes. Even though there are many positive aspects in the use of such technologies, researchers have to consider the perceived risks of this specific user group. This work aims at investigating the use of mobile information technologies by asylum seekers during their flight, especially taking privacy into account. Thus, it examines asylum seekers’ digital privacy perceptions and identifies privacy protection behaviors by conducting a qualitative interview study with 14 asylum seekers who applied for asylum in Germany. The results show that asylum seekers are often aware of the various risks deriving from the use of smartphones and ICT, such as surveillance and persecution by state or non-state actors as well as extortion by criminals. Based on this, this work furthermore outlines different strategies used to manage these risks. Since the lack of privacy and trust leads to avoidance behavior, the insights of this study provide valuable information for the design of assistance apps and collaboration platforms, which appropriately address the specific needs for digital privacy in the context of flight, or for the conception of privacy-enhancing technologies helping to achieve this.
@article{steinbrinkDigitalPrivacyPerceptions2021,
title = {Digital {Privacy} {Perceptions} of {Asylum} {Seekers} in {Germany} - {An} {Empirical} {Study} about {Smartphone} {Usage} during the {Flight}},
volume = {5},
url = {https://www.peasec.de/paper/2021/2021_SteinbrinkReichertMendeReuter_DigitalPrivacyPerceptionAsylumSeekers_CSCW.pdf},
doi = {10.1145/3479526},
abstract = {Since 2015, an increased number of asylum seekers is coming to Europe. These migration movements increasingly rely on digital infrastructure, such as mobile internet access and online services, in order to reach their targeted destination countries. Asylum seekers often use smartphones for information and communication purposes. Even though there are many positive aspects in the use of such technologies, researchers have to consider the perceived risks of this specific user group. This work aims at investigating the use of mobile information technologies by asylum seekers during their flight, especially taking privacy into account. Thus, it examines asylum seekers’ digital privacy perceptions and identifies privacy protection behaviors by conducting a qualitative interview study with 14 asylum seekers who applied for asylum in Germany. The results show that asylum seekers are often aware of the various risks deriving from the use of smartphones and ICT, such as surveillance and persecution by state or non-state actors as well as extortion by criminals. Based on this, this work furthermore outlines different strategies used to manage these risks. Since the lack of privacy and trust leads to avoidance behavior, the insights of this study provide valuable information for the design of assistance apps and collaboration platforms, which appropriately address the specific needs for digital privacy in the context of flight, or for the conception of privacy-enhancing technologies helping to achieve this.},
number = {CSCW2},
journal = {Proceedings of the ACM: Human Computer Interaction (PACM): Computer-Supported Cooperative Work and Social Computing},
author = {Steinbrink, Enno and Reichert, Lilian and Mende, Michelle and Reuter, Christian},
year = {2021},
keywords = {A-Paper, Ranking-CORE-A, Ranking-ImpactFactor, Student, Security, UsableSec, Projekt-GRKPrivacy, Projekt-ATHENE-FANCY, AuswahlUsableSec},
}
[BibTeX] [Abstract] [Download PDF]
Spillover effects describe the process of a company benefiting from the R&D activities of another one and thereby gaining an economic advantage. One prominent approach for measuring spillover effects is based on the analysis of patent citation networks. Taking social media analytics and knowledge economics into account, this paper presents a complementary approach to quantify spillover effects from defense to civilian research and development, analyzing 513 employment biographies from the social network LinkedIn. Using descriptive network analysis, we investigate the emigration of personnel of the German defense industry to other civilian producers. Thereby, our study reveals that in the last decade, employees of defense suppliers have changed positions significantly less often, with 3.24 changes on average than professionals who have worked more than 50\% of their jobs in the civilian sector, having changed 4.61 times on average. Our work illustrates the churn behavior and how spillover effects between defense and civilian sectors can be measured using social career networks such as LinkedIn.
@article{riebeMeasuringSpilloverEffects2021,
title = {Measuring {Spillover} {Effects} from {Defense} to {Civilian} {Sectors} – {A} {Quantitative} {Approach} {Using} {LinkedIn}},
volume = {32},
url = {https://peasec.de/paper/2021/2021_RiebeSchmidReuter_SpilloverEffectsDefensetoCivilianLinkedIn_PDE.pdf},
doi = {10.1080/10242694.2020.1755787},
abstract = {Spillover effects describe the process of a company benefiting from the R\&D activities of another one and thereby gaining an economic advantage. One prominent approach for measuring spillover effects is based on the analysis of patent citation networks. Taking social media analytics and knowledge economics into account, this paper presents a complementary approach to quantify spillover effects from defense to civilian research and development, analyzing 513 employment biographies from the social network LinkedIn. Using descriptive network analysis, we investigate the emigration of personnel of the German defense industry to other civilian producers. Thereby, our study reveals that in the last decade, employees of defense suppliers have changed positions significantly less often, with 3.24 changes on average than professionals who have worked more than 50\% of their jobs in the civilian sector, having changed 4.61 times on average. Our work illustrates the churn behavior and how spillover effects between defense and civilian sectors can be measured using social career networks such as LinkedIn.},
number = {7},
journal = {Defence and Peace Economics},
author = {Riebe, Thea and Schmid, Stefka and Reuter, Christian},
year = {2021},
keywords = {Peace, A-Paper, Ranking-ImpactFactor, AuswahlPeace, Projekt-ATHENE-SecUrban, Selected, Cyberwar, Projekt-DualUse},
pages = {773--785},
}
[BibTeX] [Abstract] [Download PDF]
Due to the increase in natural disasters in the past years, Disaster Response Organizations (DROs) are faced with the challenge of coping with more and larger operations. Currently appointed Information and Communications Technology (ICT) used for coordination and communication is sometimes outdated and does not scale, while novel technologies have the potential to greatly improve disaster response efficiency. To allow adoption of these novel technologies, ICT system designers have to take into account the particular needs of DROs and characteristics of International Disaster Response (IDR). This work attempts to bring the humanitarian and ICT communities closer together. In this work, we analyze IDR-related documents and conduct expert interviews. Using open coding, we extract empirical insights and translate the peculiarities of DRO coordination and operation into tangible ICT design requirements. This information is based on interviews with active IDR staff as well as DRO guidelines and reports. Ultimately, the goal of this paper is to serve as a reference for future ICT research endeavors to support and increase the efficiency of IDR operations.
@article{stuteEmpiricalInsightsDesigning2020,
title = {Empirical {Insights} for {Designing} {Information} and {Communication} {Technology} for {International} {Disaster} {Response}},
volume = {47},
url = {https://www.sciencedirect.com/science/article/pii/S2212420919309501},
doi = {10.1016/j.ijdrr.2020.101598},
abstract = {Due to the increase in natural disasters in the past years, Disaster Response Organizations (DROs) are faced with the challenge of coping with more and larger operations. Currently appointed Information and Communications Technology (ICT) used for coordination and communication is sometimes outdated and does not scale, while novel technologies have the potential to greatly improve disaster response efficiency. To allow adoption of these novel technologies, ICT system designers have to take into account the particular needs of DROs and characteristics of International Disaster Response (IDR). This work attempts to bring the humanitarian and ICT communities closer together. In this work, we analyze IDR-related documents and conduct expert interviews. Using open coding, we extract empirical insights and translate the peculiarities of DRO coordination and operation into tangible ICT design requirements. This information is based on interviews with active IDR staff as well as DRO guidelines and reports. Ultimately, the goal of this paper is to serve as a reference for future ICT research endeavors to support and increase the efficiency of IDR operations.},
number = {101598},
journal = {International Journal of Disaster Risk Reduction (IJDRR)},
author = {Stute, Milan and Maass, Max and Schons, Tom and Kaufhold, Marc-André and Reuter, Christian and Hollick, Matthias},
year = {2020},
keywords = {Crisis, Projekt-emergenCITY, A-Paper, Ranking-ImpactFactor, Student, UsableSec, Projekt-GRKPrivacy},
pages = {1--10},
}
[BibTeX] [Abstract] [Download PDF]
The growing importance of social media in conflicts and crises is accompanied by an ever-increasing research interest in the crisis informatics field in order to identify potential benefits and develop measures against the technology’s abuse. This special issue sets out to give an overview of current research on the use of social media in conflicts and crises. In doing so, it focuses on both good and malicious aspects of social media and includes a variety of papers of conceptual, theoretical and empirical nature. In six sections, the special issue presents an overview of the field, analytical methods, technical challenges, current advancements and the accepted papers before concluding. Specific topics range from cyber deception over information trustworthiness to mining and near-real-time processing of social media data.
@article{reuterSocialMediaConflicts2020,
title = {Social media in conflicts and crises},
volume = {39},
issn = {0144-929X},
url = {https://peasec.de/paper/2020/2020_ReuterStieglitzImran_SocialMediainConflictsandCrises_BIT.pdf},
doi = {10.1080/0144929X.2019.1629025},
abstract = {The growing importance of social media in conflicts and crises is accompanied by an ever-increasing research interest in the crisis informatics field in order to identify potential benefits and develop measures against the technology's abuse. This special issue sets out to give an overview of current research on the use of social media in conflicts and crises. In doing so, it focuses on both good and malicious aspects of social media and includes a variety of papers of conceptual, theoretical and empirical nature. In six sections, the special issue presents an overview of the field, analytical methods, technical challenges, current advancements and the accepted papers before concluding. Specific topics range from cyber deception over information trustworthiness to mining and near-real-time processing of social media data.},
number = {1},
journal = {Behaviour \& Information Technology (BIT)},
author = {Reuter, Christian and Stieglitz, Stefan and Imran, Muhammad},
year = {2020},
keywords = {Crisis, HCI, Peace, A-Paper, Ranking-CORE-A, Ranking-ImpactFactor, SocialMedia, Projekt-ATHENE, Projekt-CROSSING, Projekt-MAKI},
pages = {241--251},
}
[BibTeX] [Abstract] [Download PDF]
Since the emergence of so-called fake news on the internet and in social media, platforms such as Facebook have started to take countermeasures, and researchers have begun looking into this phenomenon from a variety of perspectives. A large number of scientific work has investigated ways to detect fake news automatically. Less attention has been paid to the subsequent step, i.e., what to do when you are aware of the inaccuracy of claims in social media. This work takes a user-centered approach on means to counter identified mis- and disinformation in social media. We conduct a three-step study design on how approaches in social media should be presented to respect the users’ needs and experiences and how effective they are. As our first step, in an online survey representative for some factors to the German adult population, we enquire regarding their strategies on handling information in social media, and their opinion regarding possible solutions — focusing on the approach of displaying a warning on inaccurate posts. In a second step, we present five potential approaches for countermeasures identified in related work to interviewees for qualitative input. We discuss (1) warning, (2) related articles, (3) reducing the size, (4) covering, and (5) requiring confirmation. Based on the interview feedback, as the third step of this study, we select, improve, and examine four promising approaches on how to counter misinformation. We conduct an online experiment to test their effectiveness on the perceived accuracy of false headlines and also ask for the users’ preferences. In this study, we find that users welcome warning-based approaches to counter fake news and are somewhat critical with less transparent methods. Moreover, users want social media platforms to explain why a post was marked as disputed. The results regarding effectiveness are similar: Warning-based approaches are shown to be effective in reducing the perceived accuracy of false headlines. Moreover, adding an explanation to the warning leads to the most significant results. In contrast, we could not find a significant effect on one of Facebook’s current approaches (reduced post size and fact-checks in related articles).
@article{kirchnerCounteringFakeNews2020,
title = {Countering {Fake} {News}: {A} {Comparison} of {Possible} {Solutions} {Regarding} {User} {Acceptance} and {Effectiveness}},
volume = {4},
url = {http://www.peasec.de/paper/2020/2020_KirchnerReuter_CounteringFakeNews_CSCW.pdf},
doi = {10.1145/3415211},
abstract = {Since the emergence of so-called fake news on the internet and in social media, platforms such as Facebook have started to take countermeasures, and researchers have begun looking into this phenomenon from a variety of perspectives. A large number of scientific work has investigated ways to detect fake news automatically. Less attention has been paid to the subsequent step, i.e., what to do when you are aware of the inaccuracy of claims in social media. This work takes a user-centered approach on means to counter identified mis- and disinformation in social media. We conduct a three-step study design on how approaches in social media should be presented to respect the users' needs and experiences and how effective they are. As our first step, in an online survey representative for some factors to the German adult population, we enquire regarding their strategies on handling information in social media, and their opinion regarding possible solutions — focusing on the approach of displaying a warning on inaccurate posts. In a second step, we present five potential approaches for countermeasures identified in related work to interviewees for qualitative input. We discuss (1) warning, (2) related articles, (3) reducing the size, (4) covering, and (5) requiring confirmation. Based on the interview feedback, as the third step of this study, we select, improve, and examine four promising approaches on how to counter misinformation. We conduct an online experiment to test their effectiveness on the perceived accuracy of false headlines and also ask for the users' preferences. In this study, we find that users welcome warning-based approaches to counter fake news and are somewhat critical with less transparent methods. Moreover, users want social media platforms to explain why a post was marked as disputed. The results regarding effectiveness are similar: Warning-based approaches are shown to be effective in reducing the perceived accuracy of false headlines. Moreover, adding an explanation to the warning leads to the most significant results. In contrast, we could not find a significant effect on one of Facebook's current approaches (reduced post size and fact-checks in related articles).},
number = {CSCW2},
journal = {Proceedings of the ACM: Human Computer Interaction (PACM): Computer-Supported Cooperative Work and Social Computing},
publisher = {ACM},
author = {Kirchner, Jan and Reuter, Christian},
year = {2020},
note = {Place: Austin, USA},
keywords = {Crisis, HCI, Projekt-emergenCITY, A-Paper, Ranking-CORE-A, Ranking-ImpactFactor, Student, Projekt-ATHENE, AuswahlCrisis, Selected, Cooperation},
pages = {140:1--140:28},
}
[BibTeX] [Abstract] [Download PDF]
The growing importance of social media in conflicts and crises is accompanied by an ever-increasing research interest in the crisis informatics field in order to identify potential benefits and develop measures against the technology’s abuse. This special issue sets out to give an overview of current research on the use of social media in conflicts and crises. In doing so, it focuses on both good and malicious aspects of social media and includes a variety of papers of conceptual, theoretical and empirical nature. In six sections, the special issue presents an overview of the field, analytical methods, technical challenges, current advancements and the accepted papers before concluding. Specific topics range from cyber deception over information trustworthiness to mining and near-real-time processing of social media data.
@book{reuterSpecialIssueSocial2020,
title = {Special {Issue} on {Social} {Media} in {Conflicts} and {Crises} - {Behaviour} \& {Information} {Technology} ({BIT})},
volume = {39},
url = {https://www.tandfonline.com/toc/tbit20/39/3},
abstract = {The growing importance of social media in conflicts and crises is accompanied by an ever-increasing research interest in the crisis informatics field in order to identify potential benefits and develop measures against the technology's abuse. This special issue sets out to give an overview of current research on the use of social media in conflicts and crises. In doing so, it focuses on both good and malicious aspects of social media and includes a variety of papers of conceptual, theoretical and empirical nature. In six sections, the special issue presents an overview of the field, analytical methods, technical challenges, current advancements and the accepted papers before concluding. Specific topics range from cyber deception over information trustworthiness to mining and near-real-time processing of social media data.},
number = {1},
publisher = {Taylor \& Francis},
author = {Reuter, Christian and Stieglitz, Stefan and Imran, Muhammad},
year = {2020},
note = {Publication Title: Behaviour \& Information Technology (BIT)},
keywords = {Crisis, HCI, Peace, A-Paper, Ranking-CORE-A, Ranking-ImpactFactor, SocialMedia, Projekt-ATHENE, Projekt-CROSSING, Projekt-MAKI},
}
[BibTeX] [Abstract] [Download PDF]
The research field of crisis informatics examines, amongst others, the potentials and barriers of social media use during disasters and emergencies. Social media allow emergency services to receive valuable information (e.g., eyewitness reports, pictures, or videos) from social media. However, the vast amount of data generated during large-scale incidents can lead to issue of information overload. Research indicates that supervised machine learning techniques are sui- table for identifying relevant messages and filter out irrelevant messages, thus mitigating in- formation overload. Still, they require a considerable amount of labeled data, clear criteria for relevance classification, a usable interface to facilitate the labeling process and a mechanism to rapidly deploy retrained classifiers. To overcome these issues, we present (1) a system for social media monitoring, analysis and relevance classification, (2) abstract and precise criteria for re- levance classification in social media during disasters and emergencies, (3) the evaluation of a well-performing Random Forest algorithm for relevance classification incorporating metadata from social media into a batch learning approach (e.g., 91.28\%/89.19\% accuracy, 98.3\%/89.6\% precision and 80.4\%/87.5\% recall with a fast training time with feature subset selection on the European floods/BASF SE incident datasets), as well as (4) an approach and preliminary eva- luation for relevance classification including active, incremental and online learning to reduce the amount of required labeled data and to correct misclassifications of the algorithm by feed- back classification. Using the latter approach, we achieved a well-performing classifier based on the European floods dataset by only requiring a quarter of labeled data compared to the tradi- tional batch learning approach. Despite a lesser effect on the BASF SE incident dataset, still a substantial improvement could be determined.
@article{kaufholdRapidRelevanceClassification2020,
title = {Rapid relevance classification of social media posts in disasters and emergencies: {A} system and evaluation featuring active, incremental and online learning},
volume = {57},
url = {https://peasec.de/paper/2020/2020_KaufholdBayerReuter_RapidRelevanceClassification_IPM.pdf},
doi = {10.1016/j.ipm.2019.102132},
abstract = {The research field of crisis informatics examines, amongst others, the potentials and barriers of social media use during disasters and emergencies. Social media allow emergency services to receive valuable information (e.g., eyewitness reports, pictures, or videos) from social media. However, the vast amount of data generated during large-scale incidents can lead to issue of information overload. Research indicates that supervised machine learning techniques are sui- table for identifying relevant messages and filter out irrelevant messages, thus mitigating in- formation overload. Still, they require a considerable amount of labeled data, clear criteria for relevance classification, a usable interface to facilitate the labeling process and a mechanism to rapidly deploy retrained classifiers. To overcome these issues, we present (1) a system for social media monitoring, analysis and relevance classification, (2) abstract and precise criteria for re- levance classification in social media during disasters and emergencies, (3) the evaluation of a well-performing Random Forest algorithm for relevance classification incorporating metadata from social media into a batch learning approach (e.g., 91.28\%/89.19\% accuracy, 98.3\%/89.6\% precision and 80.4\%/87.5\% recall with a fast training time with feature subset selection on the European floods/BASF SE incident datasets), as well as (4) an approach and preliminary eva- luation for relevance classification including active, incremental and online learning to reduce the amount of required labeled data and to correct misclassifications of the algorithm by feed- back classification. Using the latter approach, we achieved a well-performing classifier based on the European floods dataset by only requiring a quarter of labeled data compared to the tradi- tional batch learning approach. Despite a lesser effect on the BASF SE incident dataset, still a substantial improvement could be determined.},
number = {1},
journal = {Information Processing \& Management (IPM)},
author = {Kaufhold, Marc-André and Bayer, Markus and Reuter, Christian},
year = {2020},
keywords = {Crisis, Projekt-emergenCITY, A-Paper, Ranking-CORE-A, Ranking-ImpactFactor, SocialMedia, Projekt-ATHENE-SecUrban, Ranking-WKWI-B, AuswahlKaufhold},
pages = {1--32},
}
[BibTeX] [Abstract] [Download PDF]
The debate on the development and deployment of lethal autonomous weapon systems (LAWS) as an emerging technology is of increasing importance, with discussions stalling and technological development progressing. Monitoring the progress of increasingly autonomous weapons systems in civilian and military use as well as regulating possible autonomous systems early on is demanded by civil society actors, like the Campaign to Stop Killer Robots and the International Committee of the Red Cross (ICRC), while nation states follow a variety of interests and strategies, showing little room for consensus on central terms and questions [2], [3]. This article therefore sheds light on the work of the Group of Governmental Experts (GGE) of the UN Convention of Certain Conventional Weapons (CCW). The CCW, offering an arena for international cooperation, has dedicated itself to the purpose of finding common ground with respect to an understanding of LAWS, as well as to the necessary degree of human control. From an ethical perspective, the concept of Meaningful Human Control (MHC) supports a human-centric approach. Several IEEE projects, series and publications are dedicated to this prioritization, especially regarding civilian use. As autonomous technology is increasingly at the center of contemporary military innovations, questions of (human) agency and responsibility in warfare have become even more pressing. As stressed by the United Nations Institute for Disarmament Research (UNIDIR), the concept of MHC may prove useful in the context of development and use of (semi-) autonomous weaponry.
@article{riebeMeaningfulHumanControl2020,
title = {Meaningful {Human} {Control} of {Lethal} {Autonomous} {Weapon} {Systems}: {The} {CCW}-{Debate} and its {Implications} for {Value}-{Sensitive} {Design}},
volume = {39},
url = {https://peasec.de/paper/2020/2020_RiebeSchmidReuter_MHC_IEEETechScieMag.pdf},
doi = {10.1109/MTS.2020.3031846},
abstract = {The debate on the development and deployment of lethal autonomous weapon systems (LAWS) as an emerging technology is of increasing importance, with discussions stalling and technological development progressing. Monitoring the progress of increasingly autonomous weapons systems in civilian and military use as well as regulating possible autonomous systems early on is demanded by civil society actors, like the Campaign to Stop Killer Robots and the International Committee of the Red Cross (ICRC), while nation states follow a variety of interests and strategies, showing little room for consensus on central terms and questions [2], [3]. This article therefore sheds light on the work of the Group of Governmental Experts (GGE) of the UN Convention of Certain Conventional Weapons (CCW). The CCW, offering an arena for international cooperation, has dedicated itself to the purpose of finding common ground with respect to an understanding of LAWS, as well as to the necessary degree of human control. From an ethical perspective, the concept of Meaningful Human Control (MHC) supports a human-centric approach. Several IEEE projects, series and publications are dedicated to this prioritization, especially regarding civilian use. As autonomous technology is increasingly at the center of contemporary military innovations, questions of (human) agency and responsibility in warfare have become even more pressing. As stressed by the United Nations Institute for Disarmament Research (UNIDIR), the concept of MHC may prove useful in the context of development and use of (semi-) autonomous weaponry.},
number = {4},
journal = {IEEE Technology and Society Magazine},
author = {Riebe, Thea and Schmid, Stefka and Reuter, Christian},
year = {2020},
keywords = {Peace, A-Paper, Ranking-ImpactFactor, AuswahlPeace, Cyberwar, Projekt-DualUse, Projekt-KontiKat},
pages = {36--51},
}
[BibTeX] [Abstract] [Download PDF]
The research field of crisis informatics examines, amongst others, the potentials and barriers of social media use during conflicts and crises. Social media allow emergency services to reach the public easily in the context of crisis communication and receive valuable information (e.g. pictures) from social media data. However, the vast amount of data generated during large-scale incidents can lead to issues of information overload and quality. To mitigate these issues, this paper proposes the semi-automatic creation of alerts including keyword, relevance and information quality filters based on cross-platform social media data. We conducted empirical studies and workshops with emergency services across Europe to raise requirements, then iteratively designed and implemented an approach to support emergency services, and performed multiple evaluations, including live demonstrations and field trials, to research the potentials of social media-based alerts. Finally, we present the findings and implications based on semi-structured interviews with emergency services, highlighting the need for usable configurability and white-box algorithm representation.
@article{kaufholdMitigatingInformationOverload2020,
title = {Mitigating {Information} {Overload} in {Social} {Media} during {Conflicts} and {Crises}: {Design} and {Evaluation} of a {Cross}-{Platform} {Alerting} {System}},
volume = {39},
url = {https://peasec.de/paper/2020/2020_KaufholdRuppReuterHabdank_MitigatingInformationOverload_BIT.pdf},
doi = {10.1080/0144929X.2019.1620334},
abstract = {The research field of crisis informatics examines, amongst others, the potentials and barriers of social media use during conflicts and crises. Social media allow emergency services to reach the public easily in the context of crisis communication and receive valuable information (e.g. pictures) from social media data. However, the vast amount of data generated during large-scale incidents can lead to issues of information overload and quality. To mitigate these issues, this paper proposes the semi-automatic creation of alerts including keyword, relevance and information quality filters based on cross-platform social media data. We conducted empirical studies and workshops with emergency services across Europe to raise requirements, then iteratively designed and implemented an approach to support emergency services, and performed multiple evaluations, including live demonstrations and field trials, to research the potentials of social media-based alerts. Finally, we present the findings and implications based on semi-structured interviews with emergency services, highlighting the need for usable configurability and white-box algorithm representation.},
number = {3},
journal = {Behaviour \& Information Technology (BIT)},
author = {Kaufhold, Marc-André and Rupp, Nicola and Reuter, Christian and Habdank, Matthias},
year = {2020},
keywords = {Crisis, HCI, A-Paper, Ranking-CORE-A, Ranking-ImpactFactor, SocialMedia, Security, AuswahlCrisis, Selected, Projekt-ATHENE-FANCY, Projekt-KontiKat, AuswahlKaufhold},
pages = {319--342},
}
[BibTeX] [Abstract] [Download PDF]
Finding a way to ensure an effective use of social media has become increasingly important to emergency services over the past decade. Despite all efforts to determine the utility of social media for emergency organisations, it is necessary to benefit from such institutions’ staffs’ opinions to establish effective use. To provide empirical evidence we present a comparison of two surveys, conducted across Europe with emergency services in 2014 and 2017 respectively, with a total of 1169 answers. The analysis shows that personal experience has an effect on how organisational usage of social media is perceived and how emergency service staff view the future use of social media. Furthermore, the use has increased. This article not only shows emergency services what their staff think about their social media usage but also discusses challenges and future directions for the design of systems that can be useful for further development of optimized organisational social media usage.
@article{reuterEmergencyServiceStaff2020,
title = {Emergency {Service} {Staff} and {Social} {Media} – {A} {Comparative} {Empirical} {Study} of the {Perception} by {Emergency} {Services} {Members} in {Europe} in 2014 and 2017},
volume = {46},
url = {https://peasec.de/paper/2020/2020_ReuterKaufholdSpahrSpielhoferHahne_EmergencyServiceSocialMediaAttitude20142017_IJDRR.pdf},
doi = {10.1016/j.ijdrr.2020.101516},
abstract = {Finding a way to ensure an effective use of social media has become increasingly important to emergency services over the past decade. Despite all efforts to determine the utility of social media for emergency organisations, it is necessary to benefit from such institutions' staffs' opinions to establish effective use. To provide empirical evidence we present a comparison of two surveys, conducted across Europe with emergency services in 2014 and 2017 respectively, with a total of 1169 answers. The analysis shows that personal experience has an effect on how organisational usage of social media is perceived and how emergency service staff view the future use of social media. Furthermore, the use has increased. This article not only shows emergency services what their staff think about their social media usage but also discusses challenges and future directions for the design of systems that can be useful for further development of optimized organisational social media usage.},
number = {101516},
journal = {International Journal of Disaster Risk Reduction (IJDRR)},
author = {Reuter, Christian and Kaufhold, Marc-André and Spahr, Fabian and Spielhofer, Thomas and Hahne, Anna Sophie},
year = {2020},
keywords = {Crisis, Projekt-emergenCITY, A-Paper, Ranking-ImpactFactor, SocialMedia, Student, Projekt-EmerGent, Projekt-KontiKat},
}
[BibTeX] [Abstract] [Download PDF]
In this paper, we explore a specialized type of knowledge, “nomadic knowledge” to understand its implications in knowledge sharing process. Nomadic knowledge is enacted in a discontinuous pattern with a changing set of actors and further flows on a definedtrajectory. This knowledge is quite important but is required sporadically, so it has a varying level of importance for stakeholders at different instances of time. The limited interest of knowledge holders after the creation of knowledge makes the knowledge sharing processcomplex. Furthermore, new sets of actors overloaded with tasks often ignore the knowledge sharing aspect due to the urgency of tasks at hand. Using a long-term field study we describe a particular practice that is not well supported technologically. The objective of this paper is to outline the concept of nomadic knowledge and associated implications, so that respective practices can be supported by the knowledge management community with appropriate technology.
@article{saeedNomadicKnowledgeSharing2019,
title = {Nomadic {Knowledge} {Sharing} {Practices} and {Challenges}: {Findings} from a {Long}-term {Case} {Study}},
volume = {7},
url = {https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=8715497},
doi = {10.1109/ACCESS.2019.2916903},
abstract = {In this paper, we explore a specialized type of knowledge, "nomadic knowledge" to understand its implications in knowledge sharing process. Nomadic knowledge is enacted in a discontinuous pattern with a changing set of actors and further flows on a definedtrajectory. This knowledge is quite important but is required sporadically, so it has a varying level of importance for stakeholders at different instances of time. The limited interest of knowledge holders after the creation of knowledge makes the knowledge sharing processcomplex. Furthermore, new sets of actors overloaded with tasks often ignore the knowledge sharing aspect due to the urgency of tasks at hand. Using a long-term field study we describe a particular practice that is not well supported technologically. The objective of this paper is to outline the concept of nomadic knowledge and associated implications, so that respective practices can be supported by the knowledge management community with appropriate technology.},
number = {1},
journal = {IEEE Access},
author = {Saeed, Saqib and Pipek, Volkmar and Rohde, Markus and Reuter, Christian and Pinatti De Carvalho, Aparecido Fabiano and Wulf, Volker},
year = {2019},
keywords = {HCI, A-Paper, Ranking-ImpactFactor, Ranking-CORE-B, Cooperation},
pages = {63564--63577},
}
[BibTeX] [Abstract] [Download PDF]
On-site work of emergency service teams consists of highly cooperative tasks. Especially during distributed search and rescue tasks there is a constant mix of routinized and non-routinized activities. Within this paper we focus on the work practices of the German Red Cross Rescue Dog Units who deal with several uncertainties regarding the involved dogs, the fragility of the respective situations as well as issues of using technologies under enormous time pressure. Smart glasses provide possibilities for enhanced and hands-free interaction in various contexts and a number of approaches have already been applied, aiming at efficient use of the respective technological innovation in private and professional contexts. However, the collaborative potential of smart glasses in time-critical and uncertain situations is still unexplored. Our design case study examines how the on-site work of emergency service teams can be supported by smart glasses: Based on examining the work practices of the German Red Cross Rescue Dogs, we introduce ‘RescueGlass’ as a coordinative concept, encompassing hands-free head-mounted display (HMD) application as well as a corresponding smartphone application. Finally, we describe the evaluation of its use in the field of emergency response and management. We show how current features such as ‘fog of war’ or various sensors support the cooperative practices of dog handlers, and outline current technical limitations offering future research questions. Our paper provides an initial design probe using smart glasses to engage in the field of collaborative professional mobile tasks.
@article{reuterRescueGlassCollaborativeApplications2019,
title = {{RescueGlass}: {Collaborative} {Applications} involving {Head}-{Mounted} {Displays} for {Red} {Cross} {Rescue} {Dog} {Units}},
volume = {28},
url = {http://www.peasec.de/paper/2019/2019_ReuterLudwigMischur_RescueGlass_JCSCW.pdf},
doi = {10.1007/s10606-018-9339-8},
abstract = {On-site work of emergency service teams consists of highly cooperative tasks. Especially during distributed search and rescue tasks there is a constant mix of routinized and non-routinized activities. Within this paper we focus on the work practices of the German Red Cross Rescue Dog Units who deal with several uncertainties regarding the involved dogs, the fragility of the respective situations as well as issues of using technologies under enormous time pressure. Smart glasses provide possibilities for enhanced and hands-free interaction in various contexts and a number of approaches have already been applied, aiming at efficient use of the respective technological innovation in private and professional contexts. However, the collaborative potential of smart glasses in time-critical and uncertain situations is still unexplored. Our design case study examines how the on-site work of emergency service teams can be supported by smart glasses: Based on examining the work practices of the German Red Cross Rescue Dogs, we introduce ‘RescueGlass' as a coordinative concept, encompassing hands-free head-mounted display (HMD) application as well as a corresponding smartphone application. Finally, we describe the evaluation of its use in the field of emergency response and management. We show how current features such as ‘fog of war' or various sensors support the cooperative practices of dog handlers, and outline current technical limitations offering future research questions. Our paper provides an initial design probe using smart glasses to engage in the field of collaborative professional mobile tasks.},
number = {1-2},
journal = {Computer Supported Cooperative Work: The Journal of Collaborative Computing (JCSCW)},
author = {Reuter, Christian and Ludwig, Thomas and Mischur, Patrick},
year = {2019},
keywords = {Crisis, HCI, A-Paper, Ranking-ImpactFactor, Security, UsableSec, Infrastructure, Projekt-KontiKat, Projekt-KOKOS, Ranking-VHB-B, Ranking-CORE-B, Cooperation},
pages = {209--246},
}
[BibTeX] [Abstract] [Download PDF]
Usage of social media during emergencies and respective perceptions vary across countries. Our representative survey of 7,071 citizens in Europe (Germany, Italy, the Netherlands and the United Kingdom) shows differences of current use of social media in emergencies, expectations towards authorities monitoring social media, intensity of perceiving barriers regarding the use as well as variances concerning the (likelihood of future) use of mobile apps. While German and British participants’ frequency of use of social media is medium and low, respectively, Italian and Dutch respondents use them relatively frequently. Our comparison of the four countries allows for an interpretation of divergent behavior across countries with respect to risk cultures as well as expanding the respective model to social media contexts. At the same time, our findings stress that across the four European countries participants assessed similar advantages like dissemination of information and barriers like false rumors with respect to use social media during emergencies. Distributed equally across nations, age and gender showed significant relationships with social media usage which, among other findings, suggests being helpful for effective implementation of management structures using new technologies.
@article{reuterImpactRiskCultures2019,
title = {The {Impact} of {Risk} {Cultures}: {Citizens}' {Perception} of {Social} {Media} {Use} in {Emergencies} across {Europe}},
volume = {148},
url = {http://www.peasec.de/paper/2019/2019_ReuterKaufholdSchmidSpielhoferHahne_TheImpactofRiskCultures_TFSC.pdf},
doi = {10.1016/j.techfore.2019.119724},
abstract = {Usage of social media during emergencies and respective perceptions vary across countries. Our representative survey of 7,071 citizens in Europe (Germany, Italy, the Netherlands and the United Kingdom) shows differences of current use of social media in emergencies, expectations towards authorities monitoring social media, intensity of perceiving barriers regarding the use as well as variances concerning the (likelihood of future) use of mobile apps. While German and British participants' frequency of use of social media is medium and low, respectively, Italian and Dutch respondents use them relatively frequently. Our comparison of the four countries allows for an interpretation of divergent behavior across countries with respect to risk cultures as well as expanding the respective model to social media contexts. At the same time, our findings stress that across the four European countries participants assessed similar advantages like dissemination of information and barriers like false rumors with respect to use social media during emergencies. Distributed equally across nations, age and gender showed significant relationships with social media usage which, among other findings, suggests being helpful for effective implementation of management structures using new technologies.},
number = {119724},
journal = {Technological Forecasting and Social Change (TFSC)},
author = {Reuter, Christian and Kaufhold, Marc-André and Schmid, Stefka and Spielhofer, Thomas and Hahne, Anna Sophie},
year = {2019},
keywords = {Crisis, HCI, A-Paper, Ranking-ImpactFactor, SocialMedia, AuswahlCrisis, Selected, Projekt-EmerGent, Ranking-VHB-B},
pages = {1--17},
}
[BibTeX] [Abstract] [Download PDF]
Social media have been established in many natural disasters or human‐induced crises and emergencies. Nowadays, authorities, such as emergency services, and citizens engage with social media in different phases of the emergency management cycle. However, as research in crisis informatics highlights, one remaining issue constitutes the chaotic use of social media by citizens during emergencies, which has the potential to increase the complexity of tasks, uncertainty, and pressure for emergency services. To counter these risks, besides implementing supportive technology, social media guidelines may help putting artefact and theoretical contributions into practical use for authorities and citizens. This paper presents the design and evaluation (with 1,024 participants) of citizens’ guidelines for using social media before, during, and after emergencies.
@article{kaufholdAvoidingChaoticUse2019,
title = {Avoiding {Chaotic} {Use} of {Social} {Media} before, during, and after {Emergencies}: {Design} and {Evaluation} of {Citizens}' {Guidelines}},
volume = {27},
url = {http://www.peasec.de/paper/2019/2019_KaufholdGizikisReuterHabdankGrinko_DesignEvaluationCitizenGuidelines_JCCM.pdf},
doi = {10.1111/1468-5973.12249},
abstract = {Social media have been established in many natural disasters or human‐induced crises and emergencies. Nowadays, authorities, such as emergency services, and citizens engage with social media in different phases of the emergency management cycle. However, as research in crisis informatics highlights, one remaining issue constitutes the chaotic use of social media by citizens during emergencies, which has the potential to increase the complexity of tasks, uncertainty, and pressure for emergency services. To counter these risks, besides implementing supportive technology, social media guidelines may help putting artefact and theoretical contributions into practical use for authorities and citizens. This paper presents the design and evaluation (with 1,024 participants) of citizens' guidelines for using social media before, during, and after emergencies.},
number = {3},
journal = {Journal of Contingencies and Crisis Management (JCCM)},
author = {Kaufhold, Marc-André and Gizikis, Alexis and Reuter, Christian and Habdank, Matthias and Grinko, Margarita},
year = {2019},
keywords = {Crisis, HCI, A-Paper, Ranking-ImpactFactor, SocialMedia, Projekt-EmerGent, Projekt-KontiKat, AuswahlKaufhold},
pages = {198--213},
}
[BibTeX] [Download PDF]
@article{reuterHumanComputerInteractionSocialMedia2018,
title = {Human-{Computer}-{Interaction} and {Social} {Media} in {Safety}-{Critical} {Systems} – {Editorial}},
volume = {26},
url = {http://onlinelibrary.wiley.com/doi/10.1111/1468-5973.12192/abstract},
doi = {10.1111/1468-5973.12192},
number = {1},
journal = {Journal of Contingencies and Crisis Management (JCCM)},
author = {Reuter, Christian and Mentler, Tilo},
year = {2018},
keywords = {Crisis, HCI, Ranking-ImpactFactor, SocialMedia, Projekt-EmerGent, Projekt-KontiKat},
pages = {2--3},
}
[BibTeX] [Abstract] [Download PDF]
Since the terrorist attacks of 9/11, the use of social media in emergency and crisis events has greatly increased and many studies have concentrated on the use of ICT and social media be-fore, during or after these events. The field of research that these studies fall under is called cri-sis informatics. In this paper, we evaluate and analyze crisis informatics research by looking at case studies of social media use in emergencies, outlining the types of research found in crisis informatics, and expounding upon the forms of interaction that have been researched. Finally, we summarize the achievements from an HCI perspective and outline trends and challenges for future research.
@article{reuterSocialMediaCrisis2018,
title = {Social {Media} in {Crisis} {Management}: {An} {Evaluation} and {Analysis} of {Crisis} {Informatics} {Research}},
volume = {34},
url = {http://www.peasec.de/paper/2018/2018_ReuterHughesKaufhold_SocialMediaCrisisManagementEvaluation_IJHCI.pdf},
doi = {10.1080/10447318.2018.1427832},
abstract = {Since the terrorist attacks of 9/11, the use of social media in emergency and crisis events has greatly increased and many studies have concentrated on the use of ICT and social media be-fore, during or after these events. The field of research that these studies fall under is called cri-sis informatics. In this paper, we evaluate and analyze crisis informatics research by looking at case studies of social media use in emergencies, outlining the types of research found in crisis informatics, and expounding upon the forms of interaction that have been researched. Finally, we summarize the achievements from an HCI perspective and outline trends and challenges for future research.},
number = {4},
journal = {International Journal on Human-Computer Interaction (IJHCI)},
author = {Reuter, Christian and Hughes, Amanda Lee and Kaufhold, Marc-André},
year = {2018},
keywords = {Crisis, HCI, Peace, A-Paper, Ranking-ImpactFactor, SocialMedia, AuswahlCrisis, Selected, Projekt-KontiKat, Ranking-WKWI-B, Ranking-CORE-B},
pages = {280--294},
}
[BibTeX] [Abstract] [Download PDF]
Social media is gaining more and more importance in crisis management: “Social media continue to evolve, and so does their use in emergency and crisis events” (Reuter et al., 2018). Related research is sometimes called “crisis informatics” (Palen et al., 2009). This special issue was initiated based on the track “Social Media Studies” at previous ISCRAM (Information Systems for Crisis Response and Management) conferences. It is usually one of the tracks with the most submissions, however we (successfully) aimed to also invite scholars from other venues to contribute.
@article{reuterEditorialSpecialIssue2018,
title = {Editorial of the {Special} {Issue} on {Social} {Media} in {Crisis} {Management}},
volume = {34},
url = {http://www.peasec.de/paper/2018/2018_ReuterHughesHiltzImranPlotnik_EditorialSpecialIssueSocialMediaCrisisManagement_IJHCI.pdf},
doi = {10.1080/10447318.2018.1427833},
abstract = {Social media is gaining more and more importance in crisis management: “Social media continue to evolve, and so does their use in emergency and crisis events” (Reuter et al., 2018). Related research is sometimes called “crisis informatics” (Palen et al., 2009). This special issue was initiated based on the track “Social Media Studies” at previous ISCRAM (Information Systems for Crisis Response and Management) conferences. It is usually one of the tracks with the most submissions, however we (successfully) aimed to also invite scholars from other venues to contribute.},
number = {4},
journal = {International Journal on Human-Computer Interaction (IJHCI)},
author = {Reuter, Christian and Hughes, Amanda Lee and Hiltz, Starr Roxanne and Imran, Muhammad and Plotnick, Linda},
year = {2018},
keywords = {Crisis, HCI, Ranking-ImpactFactor, SocialMedia, RSF, Projekt-KontiKat, Ranking-WKWI-B, Ranking-CORE-B},
pages = {277--279},
}
[BibTeX] [Download PDF]
@book{reuterSpecialIssueSocial2018,
title = {Special {Issue} on {Social} {Media} in {Crisis} {Management} - {International} {Journal} on {Human}-{Computer} {Interaction} ({IJHCI})},
volume = {34},
url = {https://www.tandfonline.com/toc/hihc20/34/4?nav=tocList},
author = {Reuter, Christian and Hughes, Amanda Lee and Hiltz, Starr Roxanne and Imran, Muhammad and Plotnick, Linda},
year = {2018},
note = {Publication Title: International Journal on Human-Computer Interaction (IJHCI)},
keywords = {Crisis, HCI, Ranking-ImpactFactor, SocialMedia, Projekt-KontiKat, Ranking-WKWI-B, Ranking-CORE-B},
}
[BibTeX] [Download PDF]
@book{reuterSpecialIssueHumanComputerInteraction2018,
title = {Special {Issue} on {Human}-{Computer}-{Interaction} and {Social} {Media} in {Safety}-{Critical} {Systems} - {Journal} of {Contingencies} and {Crisis} {Management} ({JCCM})},
volume = {26},
url = {http://onlinelibrary.wiley.com/doi/10.1111/jccm.2018.26.issue-1/issuetoc},
number = {1},
publisher = {Wiley},
author = {Reuter, Christian},
year = {2018},
note = {Publication Title: Journal of Contingencies and Crisis Management (JCCM)},
keywords = {Crisis, HCI, Ranking-ImpactFactor, SocialMedia, Security, Projekt-EmerGent, Projekt-KontiKat},
}
[BibTeX] [Abstract] [Download PDF]
Social media has been established in many larger emergencies and crises. This process has not started just a few years ago, but already 15 years ago in 2001 after the terrorist attacks of 9/11. In the following years, especially in the last 10, sometimes summarized under the term crisis informatics, a variety of studies focusing on the use of ICT and social media before, during or after nearly every crisis and emergency has arisen. This article aims to recapitulate 15 years of social media in emergencies and its research with a special emphasis on use patterns, role patterns and perception patterns that can be found across different cases in order to point out what has been achieved so far, and what future potentials exist.
@article{reuterFifteenYearsSocial2018,
title = {Fifteen {Years} of {Social} {Media} in {Emergencies}: {A} {Retrospective} {Review} and {Future} {Directions} for {Crisis} {Informatics}},
volume = {26},
url = {http://www.peasec.de/paper/2018/2018_ReuterKaufhold_FifteenYearsSocialMediaEmergencies_JCCM.pdf},
doi = {10.1111/1468-5973.12196},
abstract = {Social media has been established in many larger emergencies and crises. This process has not started just a few years ago, but already 15 years ago in 2001 after the terrorist attacks of 9/11. In the following years, especially in the last 10, sometimes summarized under the term crisis informatics, a variety of studies focusing on the use of ICT and social media before, during or after nearly every crisis and emergency has arisen. This article aims to recapitulate 15 years of social media in emergencies and its research with a special emphasis on use patterns, role patterns and perception patterns that can be found across different cases in order to point out what has been achieved so far, and what future potentials exist.},
number = {1},
journal = {Journal of Contingencies and Crisis Management (JCCM)},
author = {Reuter, Christian and Kaufhold, Marc-André},
year = {2018},
keywords = {Crisis, HCI, Peace, A-Paper, Ranking-ImpactFactor, SocialMedia, AuswahlCrisis, Selected, Projekt-EmerGent, Projekt-KontiKat, AuswahlKaufhold, Projekt-KOKOS},
pages = {41--57},
}
[BibTeX] [Abstract] [Download PDF]
In recent years, social media have increased the resources that individuals and organizations are able to mobilize for the development of socially innovative practices. In this article, we engage with a naturally occurring development in a Trentinian neighbourhood to examine the cooperative interactions amongst members of a local community. The first author and local residents of the neighbourhood participated in online discussions, decision making, and physical activities that led to material changes in the area. The interventions are motivated by and based on the concept of Social Street that combines online interactions in a closed Facebook group with face-to-face meetings seeking to practically engage the collective in accomplishing certain immediate or ongoing needs. Over the course of two years, we studied this local instantiation of Social Street in Trento, Italy by way of an action-oriented (digital) ethnography. Through this work, we demonstrate how urban neighbourhoods might benefit from hybrid forms of community engagement that are enacted through a constant back and forth between online and face-to-face interactions. We further argue that the infrastructuring of local urban collectives should follow strategies that pay attention to the multiple issues in urban neighbourhoods and people’s attachments to them. Overall, the paper reflects upon the challenges and configurations of participation that this form of community-work entails.
@article{mosconiFacebookNeighbourhoodInfrastructuring2017,
title = {From {Facebook} to the {Neighbourhood}: {Infrastructuring} of {Hybrid} {Community} {Engagement}},
volume = {26},
url = {https://link.springer.com/article/10.1007/s10606-017-9291-z},
doi = {10.1007/s10606-017-9291-z},
abstract = {In recent years, social media have increased the resources that individuals and organizations are able to mobilize for the development of socially innovative practices. In this article, we engage with a naturally occurring development in a Trentinian neighbourhood to examine the cooperative interactions amongst members of a local community. The first author and local residents of the neighbourhood participated in online discussions, decision making, and physical activities that led to material changes in the area. The interventions are motivated by and based on the concept of Social Street that combines online interactions in a closed Facebook group with face-to-face meetings seeking to practically engage the collective in accomplishing certain immediate or ongoing needs. Over the course of two years, we studied this local instantiation of Social Street in Trento, Italy by way of an action-oriented (digital) ethnography. Through this work, we demonstrate how urban neighbourhoods might benefit from hybrid forms of community engagement that are enacted through a constant back and forth between online and face-to-face interactions. We further argue that the infrastructuring of local urban collectives should follow strategies that pay attention to the multiple issues in urban neighbourhoods and people's attachments to them. Overall, the paper reflects upon the challenges and configurations of participation that this form of community-work entails.},
number = {4-6},
journal = {Computer Supported Cooperative Work: The Journal of Collaborative Computing (JCSCW)},
author = {Mosconi, Gaia and Korn, Matthias and Reuter, Christian and Tolmie, Peter and Teli, Maurizio and Pipek, Volkmar},
year = {2017},
keywords = {Crisis, HCI, A-Paper, Ranking-ImpactFactor, SocialMedia, Projekt-KOKOS, Ranking-VHB-B, Ranking-CORE-B},
pages = {959--1003},
}
[BibTeX] [Abstract] [Download PDF]
Social media is increasingly being used during emergencies. Most available studies are focused on how citizens and/or authorities use these technologies in concrete events. However, larger quantitative studies with significant results on attitudes, needs and future plans of citizens in such events are not available – especially such of a comparative nature related to emergency services. As part of the EU project ‘EmerGent’ this article presents the findings of a survey of 1034 citizens across 30 European countries conducted between February and June 2015 to explore citizens’ attitudes towards the use of social media for private purposes and in emergency situations. The article briefly compares these findings with a second survey conducted with 761 emergency service staff across 32 European countries from September to December 2014. The aim of the overall study is to discuss citizens’ attitudes towards social media in emergencies in order to derive challenges and opportunities for social resilience.
@article{reuterSocialResilienceQuantitative2017,
title = {Towards {Social} {Resilience}: {A} {Quantitative} and {Qualitative} {Survey} on {Citizens}' {Perception} of {Social} {Media} in {Emergencies} in {Europe}},
volume = {121},
url = {http://www.peasec.de/paper/2017/2017_ReuterSpielhoefer_TowardsSocialResilience-CitizenSurvey_TFSC.pdf},
doi = {10.1016/j.techfore.2016.07.038},
abstract = {Social media is increasingly being used during emergencies. Most available studies are focused on how citizens and/or authorities use these technologies in concrete events. However, larger quantitative studies with significant results on attitudes, needs and future plans of citizens in such events are not available - especially such of a comparative nature related to emergency services. As part of the EU project ‘EmerGent' this article presents the findings of a survey of 1034 citizens across 30 European countries conducted between February and June 2015 to explore citizens' attitudes towards the use of social media for private purposes and in emergency situations. The article briefly compares these findings with a second survey conducted with 761 emergency service staff across 32 European countries from September to December 2014. The aim of the overall study is to discuss citizens' attitudes towards social media in emergencies in order to derive challenges and opportunities for social resilience.},
journal = {Technological Forecasting and Social Change (TFSC)},
author = {Reuter, Christian and Spielhofer, Thomas},
year = {2017},
keywords = {Crisis, HCI, A-Paper, Ranking-ImpactFactor, SocialMedia, RSF, Projekt-EmerGent, Ranking-VHB-B},
pages = {168--180},
}
[BibTeX] [Abstract] [Download PDF]
Abstract Although emergency services have already recognized the importance of citizen-initiated activities during disasters, still questions with regard to the coordination of spontaneous volunteers and their activities arise. Within our article, we will present a technological approach based on public displays which aims to foster situated crowdsourcing between affected citizens, spontaneous volunteers as well as official emergency services. We will address the research question: How can the situated tasks performed by spontaneous volunteers be supported by the use of public displays during disasters? First we will present the current state of the art with regard to the coordination practices of spontaneous volunteers and emergency services within disaster situations as well as related problems, potentials and specifics of situated crowdsourcing and public displays. To gain insight into actual coordination practices, we conducted an empirical study with 18 different stakeholders involved in disaster management. Based on the literature review and our empirical study, we have derived a technical concept that supports the task and activity management of spontaneous volunteers as well as the coordination both of the demands of affected people and the offers from spontaneous volunteers. We have implemented our concept as the public display application ‘City-Share’, which provides a robust communication infrastructure and encompasses situated crowdsourcing mechanisms for managing offers and demands of activities on-the-ground. Based on its evaluation with several users, we will discuss our findings with regard to the assignment of tasks on-the-ground and situated crowdsourcing during emergencies. We outline that City-Share can improve a community’s disaster resilience, especially when focusing on the kind of collaborative resilience emerging between official stakeholders and spontaneous volunteers or affected citizens at a local level.
@article{ludwigSituatedCrowdsourcingDisasters2017,
title = {Situated crowdsourcing during disasters: {Managing} the tasks of spontaneous volunteers through public displays},
volume = {102},
url = {http://www.peasec.de/paper/2017/2017_Ludwigetal_SituatedCrowdsourcingPublicDisplay_IJHCS.pdf},
doi = {10.1016/j.ijhcs.2016.09.008},
abstract = {Abstract Although emergency services have already recognized the importance of citizen-initiated activities during disasters, still questions with regard to the coordination of spontaneous volunteers and their activities arise. Within our article, we will present a technological approach based on public displays which aims to foster situated crowdsourcing between affected citizens, spontaneous volunteers as well as official emergency services. We will address the research question: How can the situated tasks performed by spontaneous volunteers be supported by the use of public displays during disasters? First we will present the current state of the art with regard to the coordination practices of spontaneous volunteers and emergency services within disaster situations as well as related problems, potentials and specifics of situated crowdsourcing and public displays. To gain insight into actual coordination practices, we conducted an empirical study with 18 different stakeholders involved in disaster management. Based on the literature review and our empirical study, we have derived a technical concept that supports the task and activity management of spontaneous volunteers as well as the coordination both of the demands of affected people and the offers from spontaneous volunteers. We have implemented our concept as the public display application ‘City-Share', which provides a robust communication infrastructure and encompasses situated crowdsourcing mechanisms for managing offers and demands of activities on-the-ground. Based on its evaluation with several users, we will discuss our findings with regard to the assignment of tasks on-the-ground and situated crowdsourcing during emergencies. We outline that City-Share can improve a community's disaster resilience, especially when focusing on the kind of collaborative resilience emerging between official stakeholders and spontaneous volunteers or affected citizens at a local level.},
number = {C},
journal = {International Journal on Human-Computer Studies (IJHCS)},
author = {Ludwig, Thomas and Kotthaus, Christoph and Reuter, Christian and Dongen, Sören Van and Pipek, Volkmar},
year = {2017},
keywords = {Crisis, HCI, A-Paper, Ranking-CORE-A, Ranking-ImpactFactor, Student, Ranking-WKWI-B, Projekt-KOKOS, Cooperation},
pages = {103--121},
}
[BibTeX] [Abstract] [Download PDF]
Various studies show that social media is used in emergencies – and that in spite of possible challenges for emergency services, beneficial use cases can be identified. However, relatively little empirical data is available regarding the attitudes of emergency services towards social media, and almost none of a comparative nature. This article summarizes the findings of a survey conducted of the EU project ‘EmerGent’ with 761 emergency service staff across 32 European countries from September to December 2014. The main aims of the survey were to explore the attitudes expressed by emergency service staff towards social media for private and organizational use as well as the levels and main factors influencing the current and likely future use of social media in their organizations. Based on our results, we discuss possible enhancements of the emergency management cycle using social media.
@article{reuterEmergencyServicesAttitudes2016,
title = {Emergency {Services} {Attitudes} towards {Social} {Media}: {A} {Quantitative} and {Qualitative} {Survey} across {Europe}},
volume = {95},
url = {https://peasec.de/paper/2016/2016_ReuterLudwigKaufholdSpielhofer_EmergencyServicesAttiudesSurveySocialMedia_IJHCS.pdf},
doi = {10.1016/j.ijhcs.2016.03.005},
abstract = {Various studies show that social media is used in emergencies – and that in spite of possible challenges for emergency services, beneficial use cases can be identified. However, relatively little empirical data is available regarding the attitudes of emergency services towards social media, and almost none of a comparative nature. This article summarizes the findings of a survey conducted of the EU project ‘EmerGent' with 761 emergency service staff across 32 European countries from September to December 2014. The main aims of the survey were to explore the attitudes expressed by emergency service staff towards social media for private and organizational use as well as the levels and main factors influencing the current and likely future use of social media in their organizations. Based on our results, we discuss possible enhancements of the emergency management cycle using social media.},
journal = {International Journal on Human-Computer Studies (IJHCS)},
author = {Reuter, Christian and Ludwig, Thomas and Kaufhold, Marc-André and Spielhofer, Thomas},
year = {2016},
keywords = {Crisis, HCI, A-Paper, Ranking-CORE-A, Ranking-ImpactFactor, SocialMedia, AuswahlCrisis, Selected, Projekt-EmerGent, Ranking-WKWI-B, AuswahlKaufhold},
pages = {96--111},
}
[BibTeX] [Abstract] [Download PDF]
In recent years, citizens’ movements such as the Arab Spring or Euromaidan protests have clearly shown that, whenever affected — whether negatively or positively — by the state and government decisions, citizens act to deal with the shared issues. Groups of people who organize themselves to address (mainly political) issues were defined as a `public’ by the philosopher John Dewey. He believed it is necessary to improve communication to create a `Great Community’ as a cohesive group of a public. Although information and communication technologies (ICT) lead to ambivalent effects on pursuing this goal and often distract the mass of people from discussing these issues, we argue that nowadays ICT can improve communication and has the potential to foster the detection of issues and therefore promote the (trans-)formation of a public into an issue-based community. As our foundation we took a literature study covering the formation of publics and their potential to evolve into communities, as well as their interplay with technology. This formed the basis for the development of our operational model that `follows the issues’ for capturing the (trans-)formation of a public. Based on our model, we outline different perspectives on detecting shared issues as early indicators for publics based on ICT and derive implications for researching this process from a practical perspective.
@article{ludwigPublicsCommunitiesResearching2016,
title = {From {Publics} to {Communities}: {Researching} the {Path} of {Shared} {Issues} {Through} {ICT}},
volume = {25},
url = {https://www.wineme.uni-siegen.de/paper/2016/2016_ludwigreuterpipek_frompublicstocommunities_jcscw.pdf},
doi = {10.1007/s10606-016-9252-y},
abstract = {In recent years, citizens' movements such as the Arab Spring or Euromaidan protests have clearly shown that, whenever affected — whether negatively or positively — by the state and government decisions, citizens act to deal with the shared issues. Groups of people who organize themselves to address (mainly political) issues were defined as a `public' by the philosopher John Dewey. He believed it is necessary to improve communication to create a `Great Community' as a cohesive group of a public. Although information and communication technologies (ICT) lead to ambivalent effects on pursuing this goal and often distract the mass of people from discussing these issues, we argue that nowadays ICT can improve communication and has the potential to foster the detection of issues and therefore promote the (trans-)formation of a public into an issue-based community. As our foundation we took a literature study covering the formation of publics and their potential to evolve into communities, as well as their interplay with technology. This formed the basis for the development of our operational model that `follows the issues' for capturing the (trans-)formation of a public. Based on our model, we outline different perspectives on detecting shared issues as early indicators for publics based on ICT and derive implications for researching this process from a practical perspective.},
number = {2-3},
journal = {Computer Supported Cooperative Work: The Journal of Collaborative Computing (JCSCW)},
publisher = {Kluwer Academic Publishers},
author = {Ludwig, Thomas and Reuter, Christian and Pipek, Volkmar},
year = {2016},
note = {Place: Norwell, MA, USA},
keywords = {HCI, A-Paper, Ranking-ImpactFactor, SocialMedia, Projekt-EmerGent, Ranking-VHB-B, Ranking-CORE-B, Cooperation},
pages = {193--225},
}
[BibTeX] [Abstract] [Download PDF]
People all over the world are regularly affected by disasters and emergencies. Besides official emergency services, ordinary citizens are getting increasingly involved in crisis response work. They are usually present on-site at the place of incident and use social media to share information about the event. For emergency services, the large amount of citizen-generated content in social media, however, means that finding high-quality information is similar to “finding a needle in a haystack”. This article presents an approach to how a dynamic and subjective quality assessment of citizen-generated content could support the work of emergency services. First, we present results of our empirical study concerning the usage of citizen-generated content by emergency services. Based on our literature review and empirical study, we derive design guidelines and describe a concept for dynamic quality measurement that is implemented as a service-oriented web-application “Social Haystack.” Finally, we outline findings of its evaluation and implications thereof.
@article{ludwigSocialHaystackDynamic2015,
title = {Social {Haystack}: {Dynamic} {Quality} {Assessment} of {Citizen}-{Generated} {Content} during {Emergencies}},
volume = {21},
url = {https://www.wineme.uni-siegen.de/paper/2015/2015_ludwigreuterpipek_socialhaystack_tochi.pdf},
doi = {10.1145/2749461},
abstract = {People all over the world are regularly affected by disasters and emergencies. Besides official emergency services, ordinary citizens are getting increasingly involved in crisis response work. They are usually present on-site at the place of incident and use social media to share information about the event. For emergency services, the large amount of citizen-generated content in social media, however, means that finding high-quality information is similar to “finding a needle in a haystack”. This article presents an approach to how a dynamic and subjective quality assessment of citizen-generated content could support the work of emergency services. First, we present results of our empirical study concerning the usage of citizen-generated content by emergency services. Based on our literature review and empirical study, we derive design guidelines and describe a concept for dynamic quality measurement that is implemented as a service-oriented web-application “Social Haystack.” Finally, we outline findings of its evaluation and implications thereof.},
number = {4},
journal = {ACM Transactions on Computer-Human Interaction (TOCHI)},
author = {Ludwig, Thomas and Reuter, Christian and Pipek, Volkmar},
year = {2015},
keywords = {Crisis, HCI, A-Paper, Ranking-ImpactFactor, SocialMedia, Ranking-WKWI-A, Ranking-CORE-A*, Projekt-EmerGent, Ranking-VHB-B},
pages = {Article 17},
}
[BibTeX] [Abstract] [Download PDF]
Emergencies are characterized by high complexity and unpredictability. In order to assess and manage them successfully, improvisation work and informal communication, even beyond local and organizational boundaries, is needed. Such informal practices can facilitate ad hoc participation of units in situation assessment, but this may lack overall situation awareness. This paper presents a study on how emergent ‘collaboration needs’ in current work of response teams, who are located on-site and in the control center, could be supported by mobile geo-collaboration systems. First, we present the results of an empirical study about informal work and mobile collaboration practices of emergency services. Then we describe the concept of a mobile geo-collaboration system that addresses the aspects detected in the empirical study and that was implemented as an Android application using web sockets, a technology enabling full-duplex ad hoc communication. Finally we outline the findings of its evaluation in practice and its implications.
@article{reuterAdHocParticipation2014,
title = {Ad {Hoc} {Participation} in {Situation} {Assessment}: {Supporting} {Mobile} {Collaboration} in {Emergencies}},
volume = {21},
url = {http://www.wineme.uni-siegen.de/paper/2014/2014_reuterludwigpipek_adhocparticipation_tochi.pdf},
doi = {10.1145/2651365},
abstract = {Emergencies are characterized by high complexity and unpredictability. In order to assess and manage them successfully, improvisation work and informal communication, even beyond local and organizational boundaries, is needed. Such informal practices can facilitate ad hoc participation of units in situation assessment, but this may lack overall situation awareness. This paper presents a study on how emergent ‘collaboration needs' in current work of response teams, who are located on-site and in the control center, could be supported by mobile geo-collaboration systems. First, we present the results of an empirical study about informal work and mobile collaboration practices of emergency services. Then we describe the concept of a mobile geo-collaboration system that addresses the aspects detected in the empirical study and that was implemented as an Android application using web sockets, a technology enabling full-duplex ad hoc communication. Finally we outline the findings of its evaluation in practice and its implications.},
number = {5},
journal = {ACM Transactions on Computer-Human Interaction (TOCHI)},
publisher = {ACM},
author = {Reuter, Christian and Ludwig, Thomas and Pipek, Volkmar},
month = nov,
year = {2014},
keywords = {Crisis, HCI, A-Paper, Ranking-ImpactFactor, UsableSec, Selected, Ranking-WKWI-A, AuswahlUsableSec, Ranking-CORE-A*, Projekt-InfoStrom, Ranking-VHB-B, Cooperation},
pages = {1--26},
}
[BibTeX] [Abstract] [Download PDF]
Emergency or crisis management, as is well-attested, is a complex management problem. A variety of agencies need to collaborate and coordinate in real-time and with an urgency that is not always present in other domains. It follows that accurate information of varying kinds (e.g. geographical and weather conditions; available skills and expertises; state-of-play; current dispositions and deployments) needs to be made available in a timely fashion to the organizations and individuals who need it. By definition, this information will come from a number of sources both within and across organizations. Large-scale events in particular necessitate collaboration with other organizations. Of course, plans and processes exist to deal with such events but the number of dynamically changing factors as well as the high number of heterogeneous organizations and the high degree of interdependency involved make it impossible to plan for all contingencies. A degree of ongoing improvisation, which typically occurs by means of a variety of information and expertise sharing practices, therefore becomes necessary. This, however, faces many challenges, such as different organizational cultures, distinct individual and coordinative work practices and discrete information systems. Our work entails an examination of the practices of information and expertise sharing, and the obstacles to it, in inter-organizational crisis management. We conceive of this as a design case study, such that we examine a problem area and its scope; conduct detailed enquiries into practice in that area, and provide design recommendations for implementation and evaluation. First, we will present the results of an empirical study of collaboration practices between organizations and public authorities with security responsibilities such as the police, fire departments, public administration and electricity network operators, mainly in scenarios of medium to large power outages in Germany. Based on these results, we will describe a concept, which was designed, implemented and evaluated as a system prototype, in two iterations. While the first iteration focuses on situation assessment, the second iteration also includes inter-organizational collaboration functionalities. Based on the findings of our evaluations with practitioners, we will discuss how to support collaboration with a particular focus on information and expertise sharing.
@article{leyInformationExpertiseSharing2014,
title = {Information and {Expertise} {Sharing} in {Inter}-{Organizational} {Crisis} {Management}},
volume = {23},
url = {https://www.wineme.uni-siegen.de/paper/2014/2014_informationsharingcrisis_jcscw.pdf},
doi = {10.1007/s10606-014-9205-2},
abstract = {Emergency or crisis management, as is well-attested, is a complex management problem. A variety of agencies need to collaborate and coordinate in real-time and with an urgency that is not always present in other domains. It follows that accurate information of varying kinds (e.g. geographical and weather conditions; available skills and expertises; state-of-play; current dispositions and deployments) needs to be made available in a timely fashion to the organizations and individuals who need it. By definition, this information will come from a number of sources both within and across organizations. Large-scale events in particular necessitate collaboration with other organizations. Of course, plans and processes exist to deal with such events but the number of dynamically changing factors as well as the high number of heterogeneous organizations and the high degree of interdependency involved make it impossible to plan for all contingencies. A degree of ongoing improvisation, which typically occurs by means of a variety of information and expertise sharing practices, therefore becomes necessary. This, however, faces many challenges, such as different organizational cultures, distinct individual and coordinative work practices and discrete information systems. Our work entails an examination of the practices of information and expertise sharing, and the obstacles to it, in inter-organizational crisis management. We conceive of this as a design case study, such that we examine a problem area and its scope; conduct detailed enquiries into practice in that area, and provide design recommendations for implementation and evaluation. First, we will present the results of an empirical study of collaboration practices between organizations and public authorities with security responsibilities such as the police, fire departments, public administration and electricity network operators, mainly in scenarios of medium to large power outages in Germany. Based on these results, we will describe a concept, which was designed, implemented and evaluated as a system prototype, in two iterations. While the first iteration focuses on situation assessment, the second iteration also includes inter-organizational collaboration functionalities. Based on the findings of our evaluations with practitioners, we will discuss how to support collaboration with a particular focus on information and expertise sharing.},
number = {4-6},
journal = {Computer Supported Cooperative Work: The Journal of Collaborative Computing (JCSCW)},
author = {Ley, Benedikt and Ludwig, Thomas and Pipek, Volkmar and Randall, Dave and Reuter, Christian and Wiedenhoefer, Torben},
year = {2014},
keywords = {Crisis, HCI, A-Paper, Ranking-ImpactFactor, Projekt-InfoStrom, Ranking-VHB-B, Ranking-CORE-B, Cooperation},
pages = {347--387},
}
[BibTeX] [Abstract] [Download PDF]
Adaptations of business processes are important in work environments, specifically when process-support needs to be tailored according to changing needs. The creation, management, and adaptation of the process models require typically modeling-experts. While these actors are knowledgeable in formalizing and operationalizing processes end-users who do not necessarily possess sophisticated modeling skills know typically local practices and framing conditions best. In this paper, we present an approach to support users in articulating their needs and to involve them into the (re-)design of process specifications. We explore how end-users reflect upon and articulate about business processes. Based on results of a qualitative study, we present a new, paper-based interaction technique, which enables users with little skills to model processes. The resulting process specifications can be transferred either in paper or in digital form into traditional modeling systems for further elaboration.
@article{hessSupportingEndUserArticulations2012,
title = {Supporting {End}-{User} {Articulations} in {Evolving} {Business} {Processes}: {A} {Case} {Study} to explore {Intuitive} {Notations} and {Interaction} {Designs}},
volume = {21},
url = {https://www.wineme.uni-siegen.de/paper/2012/2012_hessreuterpipekwulf_supportingenduserarticulations_ijcis.pdf},
doi = {10.1142/S0218843012500049},
abstract = {Adaptations of business processes are important in work environments, specifically when process-support needs to be tailored according to changing needs. The creation, management, and adaptation of the process models require typically modeling-experts. While these actors are knowledgeable in formalizing and operationalizing processes end-users who do not necessarily possess sophisticated modeling skills know typically local practices and framing conditions best. In this paper, we present an approach to support users in articulating their needs and to involve them into the (re-)design of process specifications. We explore how end-users reflect upon and articulate about business processes. Based on results of a qualitative study, we present a new, paper-based interaction technique, which enables users with little skills to model processes. The resulting process specifications can be transferred either in paper or in digital form into traditional modeling systems for further elaboration.},
number = {4},
journal = {International Journal of Cooperative Information Systems (IJCIS)},
author = {Hess, Jan and Reuter, Christian and Pipek, Volkmar and Wulf, Volker},
year = {2012},
keywords = {HCI, A-Paper, Ranking-ImpactFactor, Ranking-CORE-C, Projekt-InfoStrom, Ranking-VHB-B},
pages = {263--296},
}
[BibTeX] [Download PDF]
@article{reuterEntwicklungWebbasiertenDokumentenmanagementSystems2008,
title = {Entwicklung eines webbasierten {Dokumentenmanagement}-{Systems} für eine {Fluggesellschaft}},
volume = {50},
url = {http://www.peasec.de/paper/2008/2008_ReuterGeorg_EntwicklungWebbasiertesDMSFluggesellschaft_WI.pdf},
doi = {10.1365/s11576-008-0026-0},
number = {2},
journal = {Journal WIRTSCHAFTSINFORMATIK},
author = {Reuter, Christian and Georg, Christopher},
year = {2008},
keywords = {HCI, A-Paper, Ranking-ImpactFactor, Student, Ranking-WKWI-A, Ranking-VHB-B, Cooperation},
pages = {142--145},
}
A-Paper
(CORE≥A v VHB≥A v High-Impact-Factor)
2026
[BibTeX] [Abstract] [Download PDF]
Active learning is designed to minimize annotation efforts by prioritizing instances that most enhance learning. However, many active learning strategies struggle with a ‘coldstart’ problem, needing substantial initial data to be effective. This limitation reduces their utility in the increasingly relevant fewshot scenarios, where the instance selection has a substantial impact. To address this, we introduce ActiveLLM, a novel active learning approach that leverages Large Language Models such as GPT-4, o1, Llama 3, or Mistral Large for selecting instances. We demonstrate that ActiveLLM significantly enhances the classification performance of BERT classifiers in few-shot scenarios, outperforming traditional active learning methods as well as improving the few-shot learning methods ADAPET, PERFECT, and Set- Fit. Additionally, ActiveLLM can be extended to non-few-shot scenarios, allowing for iterative selections. In this way, ActiveLLM can even help other active learning strategies to overcome their cold-start problem. Our results suggest that ActiveLLM offers a promising solution for improving model performance across various learning setups.
@article{bayerActiveLLMLargeLanguage2026,
title = {{ActiveLLM}: {Large} {Language} {Model}-based {Active} {Learning} for {Textual} {Few}-{Shot} {Scenarios}},
volume = {14},
url = {https://doi.org/10.1162/TACL.a.63},
doi = {10.1162/TACL.a.63},
abstract = {Active learning is designed to minimize annotation
efforts by prioritizing instances that
most enhance learning. However, many active
learning strategies struggle with a ‘coldstart’
problem, needing substantial initial
data to be effective. This limitation reduces
their utility in the increasingly relevant fewshot
scenarios, where the instance selection
has a substantial impact. To address this, we
introduce ActiveLLM, a novel active learning
approach that leverages Large Language
Models such as GPT-4, o1, Llama 3, or
Mistral Large for selecting instances. We
demonstrate that ActiveLLM significantly
enhances the classification performance of
BERT classifiers in few-shot scenarios, outperforming
traditional active learning methods
as well as improving the few-shot learning
methods ADAPET, PERFECT, and Set-
Fit. Additionally, ActiveLLM can be extended
to non-few-shot scenarios, allowing
for iterative selections. In this way, ActiveLLM
can even help other active learning
strategies to overcome their cold-start problem.
Our results suggest that ActiveLLM
offers a promising solution for improving
model performance across various learning
setups.},
journal = {Transactions of the Association for Computational Linguistics (TACL)},
author = {Bayer, Markus and Lutz, Justin and Reuter, Christian},
year = {2026},
keywords = {A-Paper, Projekt-ATHENE-CyAware, Student, Security, UsableSec, Projekt-CYLENCE, Ranking-CORE-A*},
pages = {1--22},
}
[BibTeX] [Abstract] [Download PDF]
Misinformation interventions are often evaluated under ideal conditions, yet real-world systems are rarely flawless. We report on an online experiment (𝑁 = 1, 004) comparing five state-of-the-art interventions – inoculation, accuracy prompt, community note, fact-check, and indicators – across TikTok, Telegram, and X. We examined efficacy and user perceptions under flawless and erroneous implementations. Misinformation accompanied by fact-checks andindicators was rated as significantly less accurate, while community notes showed weaker effects. Modality did not significantly influence intervention efficacy and had only minor effects on user acceptance. Community notes, fact-checks, and indicators were rated as more helpful but also more annoying than the less informative accuracy prompts. Notably, the efficacy of interventions disappeared under erroneous conditions. This highlights the crucial role of intervention quality in fostering trust and acceptance. Our findings provide (1) a cross-platform evaluation of interventions and (2) empirical evidence that accuracy and reliability are crucial in complex social media environments.
@inproceedings{hartwigTikTokTelegramCrossPlatform2026,
address = {New York, NY, USA},
series = {{CHI} '26},
title = {From {TikTok} to {Telegram}: {Cross}-{Platform} {Efficacy} and {User} {Acceptance} of {Erroneous} and {Flawless} {Misinformation} {Interventions}},
url = {https://peasec.de/paper/2026/2026_HartwigBiselliSchneiderLampReuter_TikTokToTelegram_CHI.pdf},
abstract = {Misinformation interventions are often evaluated under ideal conditions, yet real-world systems are rarely flawless. We report on an online experiment (𝑁 = 1, 004) comparing five state-of-the-art interventions – inoculation, accuracy prompt, community note, fact-check, and indicators – across TikTok, Telegram, and X. We examined efficacy and user perceptions under flawless and erroneous implementations. Misinformation accompanied by fact-checks andindicators was rated as significantly less accurate, while community notes showed weaker effects. Modality did not significantly influence intervention efficacy and had only minor effects on user acceptance. Community notes, fact-checks, and indicators were
rated as more helpful but also more annoying than the less informative accuracy prompts. Notably, the efficacy of interventions disappeared under erroneous conditions. This highlights the crucial role of intervention quality in fostering trust and acceptance. Our findings provide (1) a cross-platform evaluation of interventions and (2) empirical evidence that accuracy and reliability are crucial in complex social media environments.},
booktitle = {Proceedings of the {Conference} on {Human} {Factors} in {Computing} {Systems} ({CHI})},
publisher = {Association for Computing Machinery},
author = {Hartwig, Katrin and Biselli, Tom and Schneider, Franziska and Lamp, Immanuel and Reuter, Christian},
year = {2026},
keywords = {A-Paper, AuswahlCrisis, Crisis, HCI, Projekt-ATHENE-PriVis, Projekt-NEBULA, Ranking-CORE-A*, Security, Selected, UsableSec},
}
[BibTeX]
@article{kaufholdHighAwarenessModerate2026,
title = {High {Awareness}, {Moderate} {Preparedness} and {Low} {Trust} in {Agencies}: {A} {Trend} {Study} on {Cybersecurity} {Behavior} and {Perceptions} of {German} {Citizens}},
language = {en},
number = {Accepted},
journal = {ACM Transactions on Privacy and Security (TOPS)},
author = {Kaufhold, Marc-André and Bäumler, Julian and Bajorski, Marius and Reuter, Christian},
year = {2026},
keywords = {HCI, A-Paper, Ranking-CORE-A, Projekt-ATHENE-CyAware, Security, UsableSec, Projekt-CYLENCE, Projekt-CYWARN},
}
[BibTeX] [Abstract] [Download PDF]
In rural areas, where restoring public network infrastructure can take time, an alternative communication channel can be particularly valuable. This study explores the potential of repurposing Long Range Wide Area Networks (LoRaWAN) gateways as multi-hop network nodes to create a digital emergency communication system. Farmers, who are increasingly adopting Low Power Wide Area Networks (LPWANs) and are geographically spread, are identified as key stakeholders for such a system. Using OpenStreetMap data on farm locations, we found that connecting farm communities through LoRa communication is theoretically possible in many areas. Simulations using delay-tolerant network routing protocols confirm the feasibility of this approach under various scenarios. A proof-of-concept implementation demonstrates that small messages can be transmitted successfully using real hardware, validating the concept of a decentralized communication infrastructure based on existing equipment. Additionally, we conducted experiments to measure energy consumption, bandwidth usage, and latency in actual hardware setups. This work contributes to various Sustainable Development Goals by supporting resilient communication infrastructure in underserved areas (SDG 9: Industry, Innovation and Infrastructure), strengthening rural communities that are often the last to recover after emergencies (SDG 10: Reduced Inequalities, SDG 11: Sustainable Cities and Communities), and ultimately helping safeguard food systems through improved agricultural coordination and communication (SDG 2: Zero Hunger).
@article{kuntke2025crisis,
title = {Crisis-{Communication} {Between} {Farms}: {Disruption}-{Tolerant} {Networking} with {Commodity} {LoRaWAN} {Hardware}},
volume = {32},
url = {https://aisel.aisnet.org/itd/vol32/iss1/15/},
abstract = {In rural areas, where restoring public network infrastructure can take time, an alternative communication channel can be particularly valuable. This study explores the potential of repurposing Long Range Wide Area Networks (LoRaWAN) gateways as multi-hop network nodes to create a digital emergency communication system. Farmers, who are increasingly adopting Low Power Wide Area Networks (LPWANs) and are geographically spread, are identified as key stakeholders for such a system. Using OpenStreetMap data on farm locations, we found that connecting farm communities through LoRa communication is theoretically possible in many areas. Simulations using delay-tolerant network routing protocols confirm the feasibility of this approach under various scenarios. A proof-of-concept implementation demonstrates that small messages can be transmitted successfully using real hardware, validating the concept of a decentralized communication infrastructure based on existing equipment. Additionally, we conducted experiments to measure energy consumption, bandwidth usage, and latency in actual hardware setups. This work contributes to various Sustainable Development Goals by supporting resilient communication infrastructure in underserved areas (SDG 9: Industry, Innovation and Infrastructure), strengthening rural communities that are often the last to recover after emergencies (SDG 10: Reduced Inequalities, SDG 11: Sustainable Cities and Communities), and ultimately helping safeguard food systems through improved agricultural coordination and communication (SDG 2: Zero Hunger).},
number = {1},
journal = {Information Technology for Development},
author = {Kuntke, Franz and Baumgärtner, Lars and Franken, Jonas and Reuter, Christian},
year = {2026},
keywords = {Projekt-emergenCITY, A-Paper, Ranking-ImpactFactor, Security, UsableSec, Projekt-AgriRegio, emergenCITY\_INF, emergenCITY\_SG},
}
[BibTeX] [Abstract]
Racism extends into the digital realm, manifesting in various forms of technology-facilitated violence (TFV). Although much research centers on the Global North, it is es-sential to investigate this issue in other settings, such as Colombia, where activists are par-ticularly vulnerable to TFV. This study enriches the debate with a qualitative approach, conducting 18 interviews with activists from Chocó and Bogotá. The literature on race and TFV reveals that technology can exacerbate racism through social media, like anonymity, and introduce new forms of racist violence, including deepfakes and algorithmic bias. However, these forms were not prevalent in our interviews. For activists, structural racism, especially limited internet, and electricity access emerged as a primary factor in their ex-periences with racist TFV. Overt TFV escalates to offline threats, silencing dissenting voices. This research emphasizes the need to understand TFV within non-Western regions, advocating for nuanced approaches to addressing digital racism in diverse contexts.
@article{CabanzoValencia2025,
title = {Race, ethnicity, and technology-facilitated violence: {The} experience of activists in chocó, colombia},
doi = {10.1177/14614448251344286},
abstract = {Racism extends into the digital realm, manifesting in various forms of technology-facilitated violence (TFV). Although much research centers on the Global North, it is es-sential to investigate this issue in other settings, such as Colombia, where activists are par-ticularly vulnerable to TFV. This study enriches the debate with a qualitative approach, conducting 18 interviews with activists from Chocó and Bogotá. The literature on race and TFV reveals that technology can exacerbate racism through social media, like anonymity, and introduce new forms of racist violence, including deepfakes and algorithmic bias. However, these forms were not prevalent in our interviews. For activists, structural racism, especially limited internet, and electricity access emerged as a primary factor in their ex-periences with racist TFV. Overt TFV escalates to offline threats, silencing dissenting voices. This research emphasizes the need to understand TFV within non-Western regions, advocating for nuanced approaches to addressing digital racism in diverse contexts.},
journal = {New Media and Society},
author = {Valencia, Miyerlandy Cabanzo and Guntrum, Laura},
year = {2026},
keywords = {Peace, Projekt-TraCe, A-Paper, Ranking-ImpactFactor, Security},
}
2025
[BibTeX] [Abstract] [Download PDF]
The ongoing challenge of misinformation on social media motivates ongoing efforts to find effective countermeasures. In this study, we evaluated the potential of personalised nudging to reduce the sharing of misinformation on social media, as personalised support has been successfully applied in other areas of critical information handling. In an online experiment (N = 396) exposing users to social media posts, we assessed the degree of misinformation sharing between groups receiving (1) no nudges, (2) non-personalised nudges, and (3) personalised nudges. Personalisation was based on three psychometric dimensions – general decision-making style, consideration of future consequences, need for cognition – to assign the most appropriate nudge from a pool of five nudges. The results showed significant differences (p {\textless} .05) between all three groups, with the personalised nudge group sharing the least misinformation. Detailed analyses at the nudge level revealed that one nudge was universally effective and two nudges were effective only in their personalised form. The results generally confirm the potential of personalisation, although the effect is limited in scope. These findings shed light on the nuanced results of nudging studies, highlight the benefits of personalisation, and raise ethical considerations regarding the privacy implications of personalisation and those inherent in nudges.
@article{biselliMitigatingMisinformationSharing2025,
title = {Mitigating {Misinformation} {Sharing} on {Social} {Media} through {Personalised} {Nudging}},
volume = {9},
url = {https://www.peasec.de/paper/2025/2025_BiselliHartwigReuter_PersonalisedNudges_CSCW.pdf},
doi = {10.1145/3711034},
abstract = {The ongoing challenge of misinformation on social media motivates ongoing efforts to find effective countermeasures.
In this study, we evaluated the potential of personalised nudging to reduce the sharing of misinformation on social media, as personalised support has been successfully applied in other areas of critical information handling.
In an online experiment (N = 396) exposing users to social media posts, we assessed the degree of misinformation sharing between groups receiving (1) no nudges, (2) non-personalised nudges, and (3) personalised nudges. Personalisation was based on three psychometric dimensions - general decision-making style, consideration of future consequences, need for cognition - to assign the most appropriate nudge from a pool of five nudges.
The results showed significant differences (p {\textless} .05) between all three groups, with the personalised nudge group sharing the least misinformation. Detailed analyses at the nudge level revealed that one nudge was universally effective and two nudges were effective only in their personalised form.
The results generally confirm the potential of personalisation, although the effect is limited in scope.
These findings shed light on the nuanced results of nudging studies, highlight the benefits of personalisation, and raise ethical considerations regarding the privacy implications of personalisation and those inherent in nudges.},
number = {2},
journal = {Proceedings of the ACM: Human Computer Interaction (PACM): Computer-Supported Cooperative Work and Social Computing},
author = {Biselli, Tom and Hartwig, Katrin and Reuter, Christian},
year = {2025},
keywords = {Crisis, HCI, Projekt-NEBULA, A-Paper, Ranking-CORE-A, Projekt-ATHENE-PriVis},
}
[BibTeX] [Abstract] [Download PDF]
Misinformation through data visualisation is particularly dangerous because charts are often perceived as objective data representations. While past efforts to counter misinformation have focused on text and, to some extent, images and video, developing user-centred strategies to combat misleading charts remains an unresolved challenge. This study presents a conceptual approach through ChartChecker, a browser-plugin that aims to automatically extract line and bar chart data and detect potentially misleading features such as non-linear axis scales. A participatory design approach was used to develop a user-centred interface to provide transparent, comprehensible information about potentially misleading features in charts. Finally, a think-aloud study (N = 15) with ChartChecker revealed overall satisfaction with the tools’ user interface, comprehensibility, functionality, and usefulness. The results are discussed in terms of improving user engagement, increasing transparency and optimising tools designed to counter misleading information in charts, leading to overarching design implications for user-centred strategies for the visual domain.
@inproceedings{biselliChartCheckerUserCentredApproach2025,
series = {{DIS} '25},
title = {{ChartChecker}: {A} {User}-{Centred} {Approach} to {Support} the {Understanding} of {Misleading} {Charts}},
url = {https://www.peasec.de/paper/2025/2025_BiselliHartwigKneisslPouiliotReuter_ChartChecker_DIS.pdf},
doi = {10.1145/3715336.3735784},
abstract = {Misinformation through data visualisation is particularly dangerous because charts are often perceived as objective data representations. While past efforts to counter misinformation have focused on text and, to some extent, images and video, developing user-centred strategies to combat misleading charts remains an unresolved challenge.
This study presents a conceptual approach through ChartChecker, a browser-plugin that aims to automatically extract line and bar chart data and detect potentially misleading features such as non-linear axis scales. A participatory design approach was used to develop a user-centred interface to provide transparent, comprehensible information about potentially misleading features in charts. Finally, a think-aloud study (N = 15) with ChartChecker revealed overall satisfaction with the tools' user interface, comprehensibility, functionality, and usefulness. The results are discussed in terms of improving user engagement, increasing transparency and optimising tools designed to counter misleading information in charts, leading to overarching design implications for user-centred strategies for the visual domain.},
booktitle = {Proceedings of the {ACM} {Designing} {Interactive} {Systems} {Conference} ({DIS})},
publisher = {Association for Computing Machinery},
author = {Biselli, Tom and Hartwig, Katrin and Kneissl, Niklas and Pouliot, Louis and Reuter, Christian},
year = {2025},
keywords = {Crisis, HCI, Projekt-NEBULA, A-Paper, Ranking-CORE-A, Student, Projekt-ATHENE-PriVis},
}
[BibTeX] [Abstract] [Download PDF]
In Germany and other countries, specialized non-profit reporting centers combat online hate speech by submitting criminal content to law enforcement agencies, forwarding deletion requests to social media platforms, and providing counseling to victims, thus contributing to the governance mechanism of content moderation as intermediaries between victims and various organizations. Whereas research in computer-supported cooperative work has extensively explored collaboration of and automation for content moderators, there are no works that focus on reporting centers. Based on expert interviews with their staff (N=15), this study finds that most German centers share a collaborative workflow, of which multiple tasks are heavily dependent on inter-organizational exchange. However, there are differences in their implementation of monitoring, content assessment, automation technology adoption, and external collaborators. As the centers are faced with diverse challenges, such as borderline case assessment, psychological burdens, limited visibility, conflicting goals with other actors, and manual repetitive work, our study contributes with nine implications for designing and researching supportive technologies. They provide suggestions for improving hate speech gathering and reporting, researching hate speech prioritization and assessment algorithms, and designing case processing systems. Beyond that, we outline directions for research on inter-organizational collaboration.
@article{baumlerHarnessingInterOrganizationalCollaboration2025,
title = {Harnessing {Inter}-{Organizational} {Collaboration} and {Automation} to {Combat} {Online} {Hate} {Speech}: {A} {Qualitative} {Study} with {German} {Reporting} {Centers}},
url = {https://dl.acm.org/doi/10.1145/3710991},
doi = {10.1145/3710991},
abstract = {In Germany and other countries, specialized non-profit reporting centers combat online hate speech by submitting criminal content to law enforcement agencies, forwarding deletion requests to social media platforms, and providing counseling to victims, thus contributing to the governance mechanism of content moderation as intermediaries between victims and various organizations. Whereas research in computer-supported cooperative work has extensively explored collaboration of and automation for content moderators, there are no works that focus on reporting centers. Based on expert interviews with their staff (N=15), this study finds that most German centers share a collaborative workflow, of which multiple tasks are heavily dependent on inter-organizational exchange. However, there are differences in their implementation of monitoring, content assessment, automation technology adoption, and external collaborators. As the centers are faced with diverse challenges, such as borderline case assessment, psychological burdens, limited visibility, conflicting goals with other actors, and manual repetitive work, our study contributes with nine implications for designing and researching supportive technologies. They provide suggestions for improving hate speech gathering and reporting, researching hate speech prioritization and assessment algorithms, and designing case processing systems. Beyond that, we outline directions for research on inter-organizational collaboration.},
journal = {Proceedings of the ACM: Human Computer Interaction (PACM): Computer-Supported Cooperative Work and Social Computing},
author = {Bäumler, Julian and Riebe, Thea and Kaufhold, Marc-André and Reuter, Christian},
year = {2025},
keywords = {Crisis, HCI, A-Paper, Ranking-CORE-A, Projekt-CYLENCE, Projekt-CYWARN, AuswahlCrisis},
}
[BibTeX] [Abstract] [Download PDF]
Youth are particularly likely to encounter hateful internet content, which can severely impact their well-being. While most social media provide reporting mechanisms, in several countries, severe hateful content can alternatively be reported to law enforcement or dedicated reporting centers. However, in Germany, many youth never resort to reporting. While research in human-computer interaction has investigated adults’ views on platform-based reporting, youth perspectives and platform-independent alternatives have received little attention. By involving a diverse group of 47 German adolescents and young adults in eight focus group interviews, we investigate how youth-sensitive reporting systems for hateful content can be designed. We explore German youth’s reporting barriers, finding that on platforms, they feel particularly discouraged by deficient rule enforcement and feedback, while platform-independent alternatives are rather unknown and perceived as time-consuming and disruptive. We further elicit their requirements for platform-independent reporting tools and contribute with heuristics for designing youth-sensitive and inclusive reporting systems.
@inproceedings{baumlerYouthSensitiveHatefulContent2025,
address = {Yokohama, Japan},
series = {{CHI} '25},
title = {Towards {Youth}-{Sensitive} {Hateful} {Content} {Reporting}: {An} {Inclusive} {Focus} {Group} {Study} in {Germany}},
url = {https://www.peasec.de/paper/2025/2025_BäumlerBaderKaufholdReuter_HatefulContentReporting_CHI.pdf},
doi = {10.1145/3706598.3713542},
abstract = {Youth are particularly likely to encounter hateful internet content, which can severely impact their well-being. While most social media provide reporting mechanisms, in several countries, severe hateful content can alternatively be reported to law enforcement or dedicated reporting centers. However, in Germany, many youth never resort to reporting. While research in human-computer interaction has investigated adults’ views on platform-based reporting, youth perspectives and platform-independent alternatives have received little attention. By involving a diverse group of 47 German adolescents and young adults in eight focus group interviews, we investigate how youth-sensitive reporting systems for hateful content can be designed. We explore German youth’s reporting barriers, finding that on platforms, they feel particularly discouraged by deficient rule enforcement and feedback, while platform-independent alternatives are rather unknown and perceived as time-consuming and disruptive. We further elicit their requirements for platform-independent reporting tools and contribute with heuristics for designing youth-sensitive and inclusive reporting systems.},
booktitle = {Proceedings of the {Conference} on {Human} {Factors} in {Computing} {Systems} ({CHI}) ({Honorable} {Mentions})},
publisher = {Association for Computing Machinery},
author = {Bäumler, Julian and Bader, Helen and Kaufhold, Marc-André and Reuter, Christian},
year = {2025},
keywords = {Crisis, HCI, A-Paper, Projekt-ATHENE-CyAware, Student, Projekt-CYLENCE, AuswahlCrisis, Selected, Ranking-CORE-A*},
}
[BibTeX] [Abstract] [Download PDF]
The network of subsea data cables (SDC) transmits the majority of international and intercontinental data exchanges. After thirty years of fiber-optic SDC installation across the oceans, almost all coastal and island countries gained access to the only global fixed infrastructure network. Still, there is considerable inequality in the number of available SDC accesses, creating deficits in redundancy for less connected states. Previous research hypothesized multiple factors that influenced the build-up of internet infrastructures but failed to verify these assumptions through inferential statistics. This work highlights the national-level factors that made backbone access provision more – or less – attractive to SDC project decision-makers. Our regression analysis of global country-year data (n = 4916) found that socio-economic (population, GDP), political (state fragility, conflict), and geographic factors (seismic hazard, neighboring territories) significantly influenced the number of active and planned accesses. This work can serve as a foundation for further research leveraging quantitative statistics to unveil hidden structures in the construction of material internet infrastructures and support sustainability in the future allocation of international infrastructure development resources in general.
@article{frankenHiddenStructuresGlobal2025,
title = {Hidden structures of a global infrastructure: {Expansion} factors of the subsea data cable network},
volume = {215},
issn = {0040-1625},
shorttitle = {Hidden structures of a global infrastructure},
url = {https://www.peasec.de/paper/2025/2025_FrankenReinholdDörnfeldReuter_TechForecasting.pdf},
doi = {10.1016/j.techfore.2025.124068},
abstract = {The network of subsea data cables (SDC) transmits the majority of international and intercontinental data exchanges. After thirty years of fiber-optic SDC installation across the oceans, almost all coastal and island countries gained access to the only global fixed infrastructure network. Still, there is considerable inequality in the number of available SDC accesses, creating deficits in redundancy for less connected states. Previous research hypothesized multiple factors that influenced the build-up of internet infrastructures but failed to verify these assumptions through inferential statistics. This work highlights the national-level factors that made backbone access provision more – or less – attractive to SDC project decision-makers. Our regression analysis of global country-year data (n = 4916) found that socio-economic (population, GDP), political (state fragility, conflict), and geographic factors (seismic hazard, neighboring territories) significantly influenced the number of active and planned accesses. This work can serve as a foundation for further research leveraging quantitative statistics to unveil hidden structures in the construction of material internet infrastructures and support sustainability in the future allocation of international infrastructure development resources in general.},
urldate = {2025-03-03},
journal = {Technological Forecasting and Social Change (TFSC)},
author = {Franken, Jonas and Reinhold, Thomas and Dörnfeld, Timon and Reuter, Christian},
month = jun,
year = {2025},
keywords = {Peace, A-Paper, AuswahlPeace, Security, Selected, Projekt-ATHENE-SecFOCI},
pages = {124068},
}
[BibTeX] [Download PDF]
@article{gaballahItsNotMy2025,
title = {“{It}’s {Not} {My} {Data} {Anymore}”: {Exploring} {Non}-{Users}’ {Privacy} {Perceptions} of {Medical} {Data} {Donation} {Apps}},
issn = {2299-0984},
shorttitle = {“{It}’s {Not} {My} {Data} {Anymore}”},
url = {https://petsymposium.org/popets/2025/popets-2025-0035.php},
doi = {10.56553/popets-2025-0035},
urldate = {2026-02-05},
journal = {Proceedings on Privacy Enhancing Technologies},
author = {Gaballah, Sarah Abdelwahab and Abdullah, Lamya and Zimmer, Ephraim and Fahl, Sascha and Mühlhäuser, Max and Marky, Karola},
year = {2025},
keywords = {HCI, A-Paper, Ranking-CORE-A, Security, UsableSec, Projekt-ATHENE-PriVis},
}
[BibTeX] [Abstract] [Download PDF]
Those engaged in the defense of human and land rights, particularly in areas of resource extraction, are increasingly exposed to violence, including a growing number of digital threats. In Colombia, the legacy of decades of armed conflict has overshadowed concerns regarding digital rights, resulting in reports of digital surveillance and online harassment without the requisite judicial oversight. Due to the paucity of research on this topic, this study examines the experiences of 37 environmental and human rights defenders (EHRDs) in La Guajira, North Colombia, who are leveraging information and communication technologies (ICTs) to amplify their concerns in an extractivist region with a history of human rights abuses. The findings indicate a significant prevalence of technology-facilitated violence (TFV) against EHRDs, including death threats, hacking, and hate speech through various digital channels. The spectrum of threats is attributed to several sources, including armed groups, multinational companies, and individuals within the affected communities. The study emphasizes the necessity of adopting a comprehensive approach to violence, integrating TFV into a more expansive conceptualization of violence. Failing to acknowledge the prevalence of TFV may result in an incomplete understanding of the experiences of EHRDs and the consequences of such violence, including self-censorship and emotional harm. Given the increasing overlap between digital and physical violence, we present a framework to enhance the capture and understanding of TFV. Furthermore, this study demonstrates the shortcomings of current security protocols in addressing the multifaceted violence directed at EHRDs due to their opposition to extractive agendas.
@article{guntrumUnmaskingDigitalThreats2025,
title = {Unmasking digital threats in the pursuit of human rights and environmental defense in {La} {Guajira}, {North} {Colombia}},
issn = {1369-118X},
url = {https://www.peasec.de/paper/2025/2025_GuntrumLassoMenaReuter_UnmaskingDigitalThreats_InfoCommSoc.pdf},
doi = {10.1080/1369118X.2025.2503444},
abstract = {Those engaged in the defense of human and land rights, particularly in areas of resource extraction, are increasingly exposed to violence, including a growing number of digital threats. In Colombia, the legacy of decades of armed conflict has overshadowed concerns regarding digital rights, resulting in reports of digital surveillance and online harassment without the requisite judicial oversight. Due to the paucity of research on this topic, this study examines the experiences of 37 environmental and human rights defenders (EHRDs) in La Guajira, North Colombia, who are leveraging information and communication technologies (ICTs) to amplify their concerns in an extractivist region with a history of human rights abuses. The findings indicate a significant prevalence of technology-facilitated violence (TFV) against EHRDs, including death threats, hacking, and hate speech through various digital channels. The spectrum of threats is attributed to several sources, including armed groups, multinational companies, and individuals within the affected communities. The study emphasizes the necessity of adopting a comprehensive approach to violence, integrating TFV into a more expansive conceptualization of violence. Failing to acknowledge the prevalence of TFV may result in an incomplete understanding of the experiences of EHRDs and the consequences of such violence, including self-censorship and emotional harm. Given the increasing overlap between digital and physical violence, we present a framework to enhance the capture and understanding of TFV. Furthermore, this study demonstrates the shortcomings of current security protocols in addressing the multifaceted violence directed at EHRDs due to their opposition to extractive agendas.},
journal = {Information, Communication \& Society},
publisher = {Routledge},
author = {Guntrum, Laura and Mena, Verena Lasso},
year = {2025},
keywords = {Peace, Projekt-TraCe, A-Paper},
pages = {1--22},
}
[BibTeX] [Abstract] [Download PDF]
Activists’ use of ICTs in contexts affected by violence poses challenges like digital surveillance. Based on 92 interviews with activists from Bolivia, Cameroon, Costa Rica, Colombia, India, Myanmar, and Nicaragua, this study explores their protection and coping strategies against technology-facilitated violence. Findings show limited emphasis on digital security and privacy-enhancing technologies, primarily due to the usability and familiarity with popular applications, coupled with relative unfamiliarity with other features. Generally, some precautions, like avoiding real-time location sharing, are common. While many protection strategies are similar, some are shaped by local factors like internet shutdowns and different adversaries’ capabilities. The findings demonstrate that some tools and features, such as VPN, may offer protection but also pose risks, e.g., in the case of criminalization, highlighting the crucial role of local context. Designing secure and usable features that account for the varying levels of limitations, such as poor connectivity and risks activists face, is essential.
@article{Guntrum2025,
title = {Activists' {Strategies} for {Coping} with {Technology}-{Facilitated} {Violence} in the {Global} {South}},
volume = {32},
issn = {1073-0516},
url = {https://doi.org/10.1145/3762811},
doi = {10.1145/3762811},
abstract = {Activists' use of ICTs in contexts affected by violence poses challenges like digital surveillance. Based on 92 interviews with activists from Bolivia, Cameroon, Costa Rica, Colombia, India, Myanmar, and Nicaragua, this study explores their protection and coping strategies against technology-facilitated violence. Findings show limited emphasis on digital security and privacy-enhancing technologies, primarily due to the usability and familiarity with popular applications, coupled with relative unfamiliarity with other features. Generally, some precautions, like avoiding real-time location sharing, are common. While many protection strategies are similar, some are shaped by local factors like internet shutdowns and different adversaries' capabilities. The findings demonstrate that some tools and features, such as VPN, may offer protection but also pose risks, e.g., in the case of criminalization, highlighting the crucial role of local context. Designing secure and usable features that account for the varying levels of limitations, such as poor connectivity and risks activists face, is essential.},
number = {6},
journal = {ACM Transactions on Computer-Human Interaction (TOCHI)},
author = {Guntrum, Laura and Reuter, Christian},
year = {2025},
keywords = {Peace, Projekt-TraCe, A-Paper, AuswahlPeace, Projekt-ATHENE-PriVis, Ranking-CORE-A*},
pages = {1--38},
}
[BibTeX] [Abstract] [Download PDF]
Information and Communication Technologies (ICTs) offer valuable tools for fostering social cohesion and conflict resolution, yet little is known about women’s roles in this domain. This study draws on 14 interviews to explore how female Cameroonian peacebuilders used ICTs during the Anglophone Crisis. Findings indicate that low-tech tools, like WhatsApp groups, play a key role in information dissemination, while more advanced technologies remain largely absent despite their growing presence in peacebuilding literature. Whilst this study demonstrates the capacity of ICTs to promote women’s involvement in peacebuilding by facilitating participation, protection, and prevention, it also examines existing challenges, including restricted accessibility and technology-facilitated violence. By exploring the intersection of digital peacebuilding and the UN’s Women, Peace, and Security Agenda through the lens of the Cameroonian case, we propose an intersectional feminist digital peacebuilding framework, incorporating gender-responsive and locally grounded strategies to better support women’s engagement in peacebuilding efforts.
@article{guntrumIncludingPerspectivesWomen2025,
title = {Including {Perspectives} of {Women} {Using} {ICTs} to {Promote} {Peace} in the {Anglophone} {Cameroon} {Crisis}},
volume = {60},
url = {https://journals.sagepub.com/doi/10.1177/00020397251408495},
doi = {10.1177/00020397251408495},
abstract = {Information and Communication Technologies (ICTs) offer valuable tools for fostering social cohesion and conflict resolution, yet little is known about women’s roles in this domain. This study draws on 14 interviews to explore how female Cameroonian peacebuilders used ICTs during the Anglophone Crisis. Findings indicate that low-tech tools, like WhatsApp groups, play a key role in information dissemination, while more advanced technologies remain largely absent despite their growing presence in peacebuilding literature. Whilst this study demonstrates the capacity of ICTs to promote women’s involvement in peacebuilding by facilitating participation, protection, and prevention, it also examines existing challenges, including restricted accessibility and technology-facilitated violence. By exploring the intersection of digital peacebuilding and the UN’s Women, Peace, and Security Agenda through the lens of the Cameroonian case, we propose an intersectional feminist digital peacebuilding framework, incorporating gender-responsive and locally grounded strategies to better support women’s engagement in peacebuilding efforts.},
number = {1},
journal = {Africa Spectrum},
author = {Guntrum, Laura and Sunjo, Emile and Cockburn, Lynn},
year = {2025},
keywords = {Peace, Projekt-TraCe, A-Paper, Ranking-ImpactFactor},
}
[BibTeX] [Abstract] [Download PDF]
As smart home technology becomes integral to modern living, researchers must consider safety aspects. While single-purpose devices alert users to specific dangers, integrating them within comprehensive smart home warning systems (SHWSs) offers new safety potentials by allowing actuators to respond to threats based on predefined protocols. Key questions include whether user preferences for automation levels in smart homes are affected by different warning scenarios, and how unwanted automation or false positives influence acceptance. To explore this, we conduct two studies: (1) A lab study in a smart home with various actuators, where participants (N = 48) encounter warnings across three automation levels. (2) A follow-up interview study (N = 16) further evaluating our prototype and unwanted automation situations. Results show that participants preferred higher automation during warnings and were more receptive to smart technology in dangerous situations, though customization remains essential to ensure acceptance. While higher automation levels reduced perceived interruption, some still preferred less intense warnings. Others preferred not receiving warnings of mild dangers, fully relying on automation. Finally, we find that specific safety protocols and handling of false positive alarms must be chosen carefully to avoid mistrust, users feeling a loss of control, and damage through unwanted executions.
@article{henkelHouseThatSaves2025,
title = {The {House} {That} {Saves} {Me}? {Assessing} the {Role} of {Smart} {Home} {Automation} in {Warning} {Scenarios}},
volume = {9},
shorttitle = {The {House} {That} {Saves} {Me}?},
url = {https://www.peasec.de/paper/2025/2025_HenkelHaeslerAlNajmiHesselReuter_HouseThatSavesMe_IMWUT.pdf},
doi = {10.1145/3712269},
abstract = {As smart home technology becomes integral to modern living, researchers must consider safety aspects. While single-purpose devices alert users to specific dangers, integrating them within comprehensive smart home warning systems (SHWSs) offers new safety potentials by allowing actuators to respond to threats based on predefined protocols. Key questions include whether user preferences for automation levels in smart homes are affected by different warning scenarios, and how unwanted automation or false positives influence acceptance. To explore this, we conduct two studies: (1) A lab study in a smart home with various actuators, where participants (N = 48) encounter warnings across three automation levels. (2) A follow-up interview study (N = 16) further evaluating our prototype and unwanted automation situations. Results show that participants preferred higher automation during warnings and were more receptive to smart technology in dangerous situations, though customization remains essential to ensure acceptance. While higher automation levels reduced perceived interruption, some still preferred less intense warnings. Others preferred not receiving warnings of mild dangers, fully relying on automation. Finally, we find that specific safety protocols and handling of false positive alarms must be chosen carefully to avoid mistrust, users feeling a loss of control, and damage through unwanted executions.},
number = {1},
journal = {Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies (IMWUT)},
author = {Henkel, Markus and Haesler, Steffen and Al-Najmi, Hiba and Hessel, Frank and Reuter, Christian},
year = {2025},
keywords = {Crisis, HCI, Projekt-emergenCITY, A-Paper, Student, Projekt-ATHENE-SecUrban, AuswahlCrisis, Ranking-CORE-A*, emergenCITY\_INF, emergenCITY\_SG},
pages = {5:1--5:32},
}
[BibTeX] [Abstract] [Download PDF]
Using smartphone apps during crises is well-established, proving critical for efficient crisis response. However, such apps become futile without an Internet connection, which is a common issue during crises. The ongoing 6G standardization explores the capability to provide local cellular connectivity for areas cut off from the Internet in crises. This paper introduces to the HCI community the concept of cellular island connectivity in isolated areas, promising a seamless transition from normal operation to island operation with local-only cellular connectivity. It presents findings from a survey (N = 857) among adult smartphone users from major German cities regarding their smartphone usage preferences in this model. Results show a shift in app demand, with users favoring general-purpose apps over dedicated crisis apps in specific scenarios. We prioritize smartphone services based on their criticality, distinguishing between apps essential for crisis response and those supporting routines. Our findings provide operators, developers, and authorities insights into making user-centric design decisions for implementing island-ready 6G communication.
@inproceedings{janzenUserPerspectiveIslandReady2025,
address = {Yokohama, Japan},
series = {{CHI} '25},
title = {The {User} {Perspective} on {Island}-{Ready} {6G} {Communication}: {A} {Survey} of {Future} {Smartphone} {Usage} in {Crisis}-{Struck} {Areas} with {Local} {Cellular} {Connectivity}},
url = {https://www.peasec.de/paper/2025/2025_JanzenPutzKaufholdStraubHollick_UserPerspective6GCommunication_CHI.pdf},
doi = {10.1145/3706598.3714324},
abstract = {Using smartphone apps during crises is well-established, proving critical for efficient crisis response. However, such apps become futile without an Internet connection, which is a common issue during crises. The ongoing 6G standardization explores the capability to provide local cellular connectivity for areas cut off from the Internet in crises. This paper introduces to the HCI community the concept of cellular island connectivity in isolated areas, promising a seamless transition from normal operation to island operation with local-only cellular connectivity. It presents findings from a survey (N = 857) among adult smartphone users from major German cities regarding their smartphone usage preferences in this model. Results show a shift in app demand, with users favoring general-purpose apps over dedicated crisis apps in specific scenarios. We prioritize smartphone services based on their criticality, distinguishing between apps essential for crisis response and those supporting routines. Our findings provide operators, developers, and authorities insights into making user-centric design decisions for implementing island-ready 6G communication.},
booktitle = {Proceedings of the {Conference} on {Human} {Factors} in {Computing} {Systems} ({CHI}) ({Honorable} {Mentions})},
publisher = {Association for Computing Machinery},
author = {Janzen, Leon and Putz, Florentin and Kaufhold, Marc-André and Straub, Kolja and Hollick, Matthias},
year = {2025},
keywords = {HCI, Projekt-emergenCITY, A-Paper, Security, UsableSec, Projekt-CYLENCE, AuswahlCrisis, Ranking-CORE-A*, emergenCITY\_INF, emergenCITY\_SG},
}
[BibTeX] [Abstract] [Download PDF]
In light of the increasing vulnerability of citizens against cyberattacks, we conducted three representative surveys with German citizens in 2021 (N=1,093), 2023 (N=1,011), and 2024 (N=1,004) to examine their cyber threat awareness, use of protective security measures, and preferred information channels. While our findings attest large proportions of the German population a high level of cyber threat awareness, many citizens feel inadequately informed about coping with cyberattacks and show little confidence in German security authorities to protect citizens and infrastructures. While age correlated with citizens’ awareness and behavior, we only saw minor temporal differences between datasets. Finally, we provide design and policy implications for enhancing citizens’ awareness of cyber threats and implementing security measures.
@inproceedings{kaufhold_cyber_2025,
address = {Yokohama, Japan},
series = {{CHI} '25},
title = {Cyber {Threat} {Awareness}, {Protective} {Measures} and {Communication} {Preferences} in {Germany}: {Implications} from {Three} {Representative} {Surveys} (2021-2024)},
url = {https://www.peasec.de/paper/2025/2025_KaufholdBäumlerBajorskiReuter_ComparativeCybersecuritySurvey_CHI.pdf},
doi = {10.1145/3706598.3713795},
abstract = {In light of the increasing vulnerability of citizens against cyberattacks, we conducted three representative surveys with German citizens in 2021 (N=1,093), 2023 (N=1,011), and 2024 (N=1,004) to examine their cyber threat awareness, use of protective security measures, and preferred information channels. While our findings attest large proportions of the German population a high level of cyber threat awareness, many citizens feel inadequately informed about coping with cyberattacks and show little confidence in German security authorities to protect citizens and infrastructures. While age correlated with citizens’ awareness and behavior, we only saw minor temporal differences between datasets. Finally, we provide design and policy implications for enhancing citizens’ awareness of cyber threats and implementing security measures.},
booktitle = {Proceedings of the {Conference} on {Human} {Factors} in {Computing} {Systems} ({CHI})},
publisher = {Association for Computing Machinery},
author = {Kaufhold, Marc-André and Bäumler, Julian and Bajorski, Marius and Reuter, Christian},
year = {2025},
keywords = {HCI, A-Paper, Projekt-ATHENE-CyAware, Security, UsableSec, Projekt-CYLENCE, Selected, AuswahlUsableSec, Ranking-CORE-A*, HabilitationKaufhold},
}
[BibTeX] [Abstract]
The rise of fake news and misinformation in the digital age poses serious risks for individuals and society, particularly during crises like the Israel-Hamas war, the Russian-Ukraine war, or the COVID-19 pandemic. Misinformation serves as a tool to manipulate public opinion and create discord. Vulnerability to manipulation increases in online spaces during crises, where authoritative information is scarce. Emergency management, public health, political and public administration, as well as media professionals and citizens express concern and seek solutions to enhance information quality during such critical times. This article highlights user-centred approaches to countering fake news and misinformation, tracing their historical evolution from ancient Greece to the present, focussing on their relevance during the COVID-19 crisis and in contemporary information warfare. It describes the vulnerability of audiences to misinformation and outlines prevailing trends in user-centred countermeasures. This article also introduces recent research on the effectiveness of media literacy interventions on truth discernment, a cross-cultural comparison of the perception of negative consequences and the injunctive norm, a comparison of video and text to promote lateral reading in adolescents, content-specific indicators on Twitter from a user perspective, a learning system for detecting misinformation as well as ethical and security considerations in automated detection.
@book{reuterSpecialIssueCombating2025,
title = {Special {Issue} on {Combating} {Information} {Warfare}: {User}-{Centered} {Countermeasures} against {Fake} {News} and {Misinformation} - {Behaviour} \& {Information} {Technology} ({BIT})},
abstract = {The rise of fake news and misinformation in the digital age poses serious risks for individuals and society, particularly during crises like the Israel-Hamas war, the Russian-Ukraine war, or the COVID-19 pandemic. Misinformation serves as a tool to manipulate public opinion and create discord. Vulnerability to manipulation increases in online spaces during crises, where authoritative information is scarce. Emergency management, public health, political and public administration, as well as media professionals and citizens express concern and seek solutions to enhance information quality during such critical times. This article highlights user-centred approaches to countering fake news and misinformation, tracing their historical evolution from ancient Greece to the present, focussing on their relevance during the COVID-19 crisis and in contemporary information warfare. It describes the vulnerability of audiences to misinformation and outlines prevailing trends in user-centred countermeasures. This article also introduces recent research on the effectiveness of media literacy interventions on truth discernment, a cross-cultural comparison of the perception of negative consequences and the injunctive norm, a comparison of video and text to promote lateral reading in adolescents, content-specific indicators on Twitter from a user perspective, a learning system for detecting misinformation as well as ethical and security considerations in automated detection.},
publisher = {Taylor \& Francis},
author = {Reuter, Christian and Hughes, Amanda Lee and Buntain, Cody},
year = {2025},
note = {Publication Title: Behaviour \& Information Technology (BIT)},
keywords = {Crisis, HCI, Peace, A-Paper, Ranking-CORE-A, Ranking-ImpactFactor, SocialMedia},
}
[BibTeX] [Abstract] [Download PDF]
The development of artificial intelligence and autonomous functions in the military domain has an immense impact on technologies being developed by the private defence industry. Defence firms contribute to the narratives and visions on autonomous weapon systems and the future of warfare, e.g. in the form of strategic marketing of their products. However, their role has so far been understudied, especially regarding autonomous weapon systems. As the normative debate revolves around aspects of human control, this work examines the narratives of (meaningful) human control in the marketing of autonomous military systems by defence manufacturers. Based on a comprehensive content analysis of twenty defence firms, we identified three main narratives, which envision autonomy as a military advantage, the role of the human in the future of warfare, and human-machine teaming. Based on the results, we argue that defence companies reproduce and adapt narratives which shape expectations and visions of human control of autonomous weapon systems in anticipation of emerging norms for (meaningful) human control. However, without specifications and verification mechanisms, there is no indication that human control will be meaningful.
@article{riebeEnvisioningHumanMachineInteraction2025,
title = {Envisioning {Human}-{Machine} {Interaction} in {Future} {Warfare}: {Defence} {Industry} {Narratives} on {Human} {Control} of {Autonomous} {Weapon} {Systems}},
volume = {39},
issn = {1360-0826},
url = {https://doi.org/10.1080/13600826.2024.2436966},
doi = {10.1080/13600826.2024.2436966},
abstract = {The development of artificial intelligence and autonomous functions in the military domain has an immense impact on technologies being developed by the private defence industry. Defence firms contribute to the narratives and visions on autonomous weapon systems and the future of warfare, e.g. in the form of strategic marketing of their products. However, their role has so far been understudied, especially regarding autonomous weapon systems. As the normative debate revolves around aspects of human control, this work examines the narratives of (meaningful) human control in the marketing of autonomous military systems by defence manufacturers. Based on a comprehensive content analysis of twenty defence firms, we identified three main narratives, which envision autonomy as a military advantage, the role of the human in the future of warfare, and human-machine teaming. Based on the results, we argue that defence companies reproduce and adapt narratives which shape expectations and visions of human control of autonomous weapon systems in anticipation of emerging norms for (meaningful) human control. However, without specifications and verification mechanisms, there is no indication that human control will be meaningful.},
number = {4},
journal = {Global Society},
author = {Riebe, Thea and Gonsior, Anja-Liisa and Reichert, Lilian and Reuter, Christian},
year = {2025},
keywords = {HCI, Peace, Projekt-TraCe, A-Paper, Ranking-ImpactFactor, AuswahlPeace, Projekt-ATHENE-CyAware, Student},
pages = {421--445},
}
[BibTeX] [Abstract] [Download PDF]
China, the United States, and the European Union have spoken of a global competition surrounding Artificial Intelligence (AI). There is widespread talk of an ‘AI Arms Race’. But what is the nature of this race? We argue that the arms race metaphor does not capture the dynamics of global competition in the AI sector. Instead, we propose the notion of a ‘geopolitical innovation race’ for technological leadership in a networked global economy. Based on an analysis of government documents, we find that actors (1) are open to both zero-sum or positive-sum approaches in AI development, (2) organise actor networks differently based on national innovation cultures, (3) prioritise economics and status next to security concerns, and (4) are open to how AI should be interpreted. Referring to the competitive race of AI research and development, the three technopoles perpetuate the geopoliticisation of innovation and intertwine security and economic interests.
@article{schmidArmsRaceInnovation2025,
title = {Arms {Race} or {Innovation} {Race}? {Geopolitical} {AI} {Development}},
volume = {30},
issn = {1465-0045},
url = {https://doi.org/10.1080/14650045.2025.2456019},
doi = {10.1080/14650045.2025.2456019},
abstract = {China, the United States, and the European Union have spoken of a global competition surrounding Artificial Intelligence (AI). There is widespread talk of an ‘AI Arms Race’. But what is the nature of this race? We argue that the arms race metaphor does not capture the dynamics of global competition in the AI sector. Instead, we propose the notion of a ‘geopolitical innovation race’ for technological leadership in a networked global economy. Based on an analysis of government documents, we find that actors (1) are open to both zero-sum or positive-sum approaches in AI development, (2) organise actor networks differently based on national innovation cultures, (3) prioritise economics and status next to security concerns, and (4) are open to how AI should be interpreted. Referring to the competitive race of AI research and development, the three technopoles perpetuate the geopoliticisation of innovation and intertwine security and economic interests.},
number = {4},
journal = {Geopolitics},
publisher = {Routledge},
author = {Schmid, Stefka and Lambach, Daniel and Diehl, Carlo and Reuter, Christian},
year = {2025},
keywords = {Peace, Projekt-TraCe, A-Paper, Ranking-ImpactFactor, AuswahlPeace, Projekt-ATHENE, Selected},
pages = {1907--1936},
}
[BibTeX] [Abstract] [Download PDF]
In conflict-ridden environments, timely and accurate information is critical for those dealing with the dynamic of events. When individuals have to flee, it becomes evident that refugees frequently rely on information and communication technologies (ICT) for information acquisition, travel coordination, and maintaining connections with related parties. Based on 17 interviews, this research explores how Ukrainian refugees, who sought protection in Germany due to the 2022 Russian full-scale invasion, use ICT before, during, and after their flight. By providing empirical findings, the results show in depth how contextual factors, such as infrastructural instability, privacy concerns and an advanced digitalization, interrelate with user behaviors. Analyzing the multifaceted civilian ICT use in the context of war and flight, this exploratory research contributes to the existing research on HCI in migration contexts and connects to several topics of CSCW. By contrasting case specifics, this work highlights what makes Ukraine a special case in this research area. Furthermore, this paper examines both existing and emerging affordances of ICT in the context of flight, and identifies the crucial role of messenger groups for information gathering in all phases of the flight. Lastly, collaborative dimensions of the identified affordances are discussed.
@article{steinbrinkSmartphoneICTUse2025,
title = {Smartphone and {ICT} {Use} {Among} {Ukrainian} {Refugees}: {Technology} {Support} during {War}, {Flight}, and {Adaptation} in {Germany}},
url = {https://www.peasec.de/paper/2025/2025_SteinbrinkGuntrumReuter_Ukraine_CSCW.pdf},
doi = {10.1145/3711067},
abstract = {In conflict-ridden environments, timely and accurate information is critical for those dealing with the dynamic of events. When individuals have to flee, it becomes evident that refugees frequently rely on information and communication technologies (ICT) for information acquisition, travel coordination, and maintaining connections with related parties. Based on 17 interviews, this research explores how Ukrainian refugees, who sought protection in Germany due to the 2022 Russian full-scale invasion, use ICT before, during, and after their flight. By providing empirical findings, the results show in depth how contextual factors, such as infrastructural instability, privacy concerns and an advanced digitalization, interrelate with user behaviors. Analyzing the multifaceted civilian ICT use in the context of war and flight, this exploratory research contributes to the existing research on HCI in migration contexts and connects to several topics of CSCW. By contrasting case specifics, this work highlights what makes Ukraine a special case in this research area. Furthermore, this paper examines both existing and emerging affordances of ICT in the context of flight, and identifies the crucial role of messenger groups for information gathering in all phases of the flight. Lastly, collaborative dimensions of the identified affordances are discussed.},
number = {CSCW},
journal = {Proceedings of the ACM: Human Computer Interaction (PACM): Computer-Supported Cooperative Work and Social Computing},
publisher = {Association for Computing Machinery},
author = {Steinbrink, Enno and Guntrum, Laura and Reuter, Christian},
year = {2025},
note = {Place: New York, NY, USA},
keywords = {Crisis, HCI, Projekt-TraCe, A-Paper, Ranking-CORE-A, UsableSec, Projekt-ATHENE, Projekt-GRKPrivacy},
}
[BibTeX] [Abstract] [Download PDF]
Research in Augmented Reality (AR) and Virtual Reality (VR) has mostly viewed them in isolation. Yet, when used together in practical settings, AR and VR each offer unique strengths, necessitating multiple transitions to harness their advantages. This paper investigates potential challenges in Cross-Reality (CR) transitions to inform future application design. We implemented a CR system featuring a 3D modeling task that requires users to switch between PC, AR, and VR. Using a talk-aloud study (n=12) and thematic analysis, we revealed that frictions primarily arose when transitions conflicted with users’ Spatial Mental Model (SMM). Furthermore, we found five transition archetypes employed to enhance productivity once an SMM was established. Our findings uncover that transitions have to focus on establishing and upholding the SMM of users across realities, by communicating differences between them.
@inproceedings{10.1145/3706598.3713921,
address = {New York, NY, USA},
series = {Chi '25},
title = {A {Qualitative} {Investigation} of {User} {Transitions} and {Frictions} in {Cross}-{Reality} {Applications}},
isbn = {979-8-4007-1394-1},
url = {https://www.peasec.de/paper/2025/2025_VonWillichNellesTsengGugenheimerGüntherMühlhäuser_FrictionsCrossReality_CHI.pdf},
doi = {10.1145/3706598.3713921},
abstract = {Research in Augmented Reality (AR) and Virtual Reality (VR) has mostly viewed them in isolation. Yet, when used together in practical settings, AR and VR each offer unique strengths, necessitating multiple transitions to harness their advantages. This paper investigates potential challenges in Cross-Reality (CR) transitions to inform future application design. We implemented a CR system featuring a 3D modeling task that requires users to switch between PC, AR, and VR. Using a talk-aloud study (n=12) and thematic analysis, we revealed that frictions primarily arose when transitions conflicted with users’ Spatial Mental Model (SMM). Furthermore, we found five transition archetypes employed to enhance productivity once an SMM was established. Our findings uncover that transitions have to focus on establishing and upholding the SMM of users across realities, by communicating differences between them.},
booktitle = {Proceedings of the {Conference} on {Human} {Factors} in {Computing} {Systems} ({CHI})},
publisher = {Association for Computing Machinery},
author = {von Willich, Julius and Nelles, Frank and Tseng, Wen-Jie and Gugenheimer, Jan and Günther, Sebastian and Mühlhäuser, Max},
year = {2025},
note = {Number of pages: 18
tex.articleno: 808},
keywords = {HCI, Projekt-emergenCITY, A-Paper, Projekt-ATHENE, Ranking-CORE-A*, emergenCITY\_INF, emergenCITY\_SG},
}
2024
[BibTeX] [Abstract] [Download PDF]
The field of cybersecurity is evolving fast. Security professionals are in need of intelligence on past, current and – ideally – on upcoming threats, because attacks are becoming more advanced and are increasingly targeting larger and more complex systems. Since the processing and analysis of such large amounts of information cannot be addressed manually, cybersecurity experts rely on machine learning techniques. In the textual domain, pre-trained language models like BERT have proven to be helpful as they provide a good baseline for further fine-tuning. However, due to the domain-knowledge and the many technical terms in cybersecurity, general language models might miss the gist of textual information. For this reason, we create a high-quality dataset and present a language model specifically tailored to the cybersecurity domain which can serve as a basic building block for cybersecurity systems. The model is compared on 15 tasks: Domain-dependent extrinsic tasks for measuring the performance on specific problems, intrinsic tasks for measuring the performance of the internal representations of the model as well as general tasks from the SuperGLUE benchmark. The results of the intrinsic tasks show that our model improves the internal representation space of domain words compared to the other models. The extrinsic, domain-dependent tasks, consisting of sequence tagging and classification, show that the model performs best in cybersecurity scenarios. In addition, we pay special attention to the choice of hyperparameters against catastrophic forgetting, as pre-trained models tend to forget the original knowledge during further training.
@article{bayerCySecBERTDomainAdaptedLanguage2024,
title = {{CySecBERT}: {A} {Domain}-{Adapted} {Language} {Model} for the {Cybersecurity} {Domain}},
volume = {27},
issn = {2471-2566},
url = {https://peasec.de/paper/2024/2024_BayerKuehnShanesazReuter_CySecBERT_TOPS.pdf},
doi = {10.1145/3652594},
abstract = {The field of cybersecurity is evolving fast. Security professionals are in need of intelligence on past, current and - ideally - on upcoming threats, because attacks are becoming more advanced and are increasingly targeting larger and more complex systems. Since the processing and analysis of such large amounts of information cannot be addressed manually, cybersecurity experts rely on machine learning techniques. In the textual domain, pre-trained language models like BERT have proven to be helpful as they provide a good baseline for further fine-tuning. However, due to the domain-knowledge and the many technical terms in cybersecurity, general language models might miss the gist of textual information. For this reason, we create a high-quality dataset and present a language model specifically tailored to the cybersecurity domain which can serve as a basic building block for cybersecurity systems. The model is compared on 15 tasks: Domain-dependent extrinsic tasks for measuring the performance on specific problems, intrinsic tasks for measuring the performance of the internal representations of the model as well as general tasks from the SuperGLUE benchmark. The results of the intrinsic tasks show that our model improves the internal representation space of domain words compared to the other models. The extrinsic, domain-dependent tasks, consisting of sequence tagging and classification, show that the model performs best in cybersecurity scenarios. In addition, we pay special attention to the choice of hyperparameters against catastrophic forgetting, as pre-trained models tend to forget the original knowledge during further training.},
number = {2},
journal = {ACM Transactions on Privacy and Security (TOPS)},
publisher = {Association for Computing Machinery},
author = {Bayer, Markus and Kuehn, Philipp and Shanehsaz, Ramin and Reuter, Christian},
month = apr,
year = {2024},
note = {Place: New York, NY, USA},
keywords = {A-Paper, Ranking-CORE-A, Ranking-ImpactFactor, Projekt-ATHENE-CyAware, Student, Security, UsableSec, Projekt-CYLENCE, Projekt-CYWARN},
}
[BibTeX] [Abstract] [Download PDF]
Browser cookies, especially those from third parties, pose a threat to individual privacy. While it is possible in principle to control the number of cookies accepted, this choice is often neither usable nor truly informed. To address this issue, this study used semi-structured interviews (N=19) to identify attitudes and user requirements to develop an alternative personalised cookie banner, which was evaluated in an online experiment (N=157). The cookie banner explanations were tailored to the privacy knowledge of three groups of users: low, medium and high. The online experiment measured cookie choices and perceived usability of the cookie banner across three groups: an experimental group that viewed the novel cookie banner with personalisation (personalised privacy assistant), a control group that viewed the novel cookie banner without personalisation (privacy assistant) and a control group that viewed the standard cookie banner provided by the website. The results indicate that the novel cookie banner (with or without personalisation) generally resulted in significantly fewer accepted cookies and increased usability compared to the standard cookie window. In addition, the personalised cookie banner resulted in significantly fewer accepted cookies and higher usability than the non-personalised cookie banner. These results suggest that tailoring cookie banners to users’ privacy knowledge can be an effective approach to empowering users to make informed choices and better protect their privacy.
@article{biselliSupportingInformedChoices2024,
title = {Supporting {Informed} {Choices} about {Browser} {Cookies}: {The} {Impact} of {Personalised} {Cookie} {Banners}},
url = {https://petsymposium.org/popets/2024/popets-2024-0011.pdf},
doi = {10.56553/popets-2024-0011},
abstract = {Browser cookies, especially those from third parties, pose a threat to individual privacy. While it is possible in principle to control the number of cookies accepted, this choice is often neither usable nor truly informed. To address this issue, this study used semi-structured interviews (N=19) to identify attitudes and user requirements to develop an alternative personalised cookie banner, which was evaluated in an online experiment (N=157). The cookie banner explanations were tailored to the privacy knowledge of three groups of users: low, medium and high. The online experiment measured cookie choices and perceived usability of the cookie banner across three groups: an experimental group that viewed the novel cookie banner with personalisation (personalised privacy assistant), a control group that viewed the novel cookie banner without personalisation (privacy assistant) and a control group that viewed the standard cookie banner provided by the website. The results indicate that the novel cookie banner (with or without personalisation) generally resulted in significantly fewer accepted cookies and increased usability compared to the standard cookie window. In addition, the personalised cookie banner resulted in significantly fewer accepted cookies and higher usability than the non-personalised cookie banner. These results suggest that tailoring cookie banners to users' privacy knowledge can be an effective approach to empowering users to make informed choices and better protect their privacy.},
number = {1},
journal = {Proceedings on Privacy Enhancing Technologies (PoPETs)},
author = {Biselli, Tom and Utz, Laura and Reuter, Christian},
year = {2024},
keywords = {HCI, A-Paper, Ranking-CORE-A, Student, Security, UsableSec, Projekt-ATHENE-PriVis, Projekt-CROSSING, Selected, AuswahlUsableSec},
pages = {171--191},
}
[BibTeX] [Abstract] [Download PDF]
In many applications and websites people use in their everyday life, their privacy and data is threatened, e.g., by script tracking during browsing. Although researchers and companies have developed privacy-enhancing technologies (PETs), they are often difficult to use for lay users. In this paper, we conducted a literature review to classify users into different support personas based on their privacy competence and privacy concern. With developers of PETs in mind, support personas were envisioned to facilitate the customization of software according to the support needs of different users. In order to demonstrate the usefulness of support personas and based on workshop sessions with 15 participants, we designed a browser extension which supports users with the issue of script tracking by providing different user interfaces for different support personas. The following qualitative evaluation with 31 participants showed that the developed UI elements worked as intended for the different support personas. Therefore, we conclude the concept of support personas is useful in the development process of usable applications that enhance the privacy of the users while also educating them and thus potentially increasing their privacy literacy.
@article{demuthSupportPersonasConcept2024,
title = {Support {Personas}: {A} {Concept} for {Tailored} {Support} of {Users} of {Privacy}-{Enhancing} {Technologies}},
issn = {2299-0984},
url = {https://petsymposium.org/popets/2024/popets-2024-0142.pdf},
doi = {10.56553/popets-2024-0142},
abstract = {In many applications and websites people use in their everyday life, their privacy and data is threatened, e.g., by script tracking during browsing. Although researchers and companies have developed privacy-enhancing technologies (PETs), they are often difficult to use for lay users. In this paper, we conducted a literature review to classify users into different support personas based on their privacy competence and privacy concern. With developers of PETs in mind, support personas were envisioned to facilitate the customization of software according to the support needs of different users. In order to demonstrate the usefulness of support personas and based on workshop sessions with 15 participants, we designed a browser extension which supports users with the issue of script tracking by providing different user interfaces for different support personas. The following qualitative evaluation with 31 participants showed that the developed UI elements worked as intended for the different support personas. Therefore, we conclude the concept of support personas is useful in the development process of usable applications that enhance the privacy of the users while also educating them and thus potentially increasing their privacy literacy.},
number = {4},
journal = {Proceedings on Privacy Enhancing Technologies (PoPETs)},
author = {Demuth, Kilian and Linsner, Sebastian and Biselli, Tom and Kaufhold, Marc-André and Reuter, Christian},
year = {2024},
keywords = {HCI, A-Paper, Ranking-CORE-A, Security, UsableSec, Projekt-ATHENE-PriVis, Projekt-CROSSING},
pages = {797--817},
}
[BibTeX] [Abstract] [Download PDF]
Amidst the ongoing anti-military protests in Myanmar since 2021, there is a noticeable research gap on ICT-supported activism. Generally, ICTs play an important role during political crises in conjunction with activists’ practices on the ground. Inspired by Resource Mobilization Theory, I conducted qualitative interviews (N=16) and a qualitative online survey (N=34), which demonstrate the intersection between analog and digital domains, showcasing the ingenuity of the activists, and the rapid adoption of ICTs in a country that has experienced a digital revolution within the last few years. As not all people were able to protest on-the-ground, they acted as keyboard fighters to organize protests, to share information, and to support the civil disobedience movement in Myanmar. The study identifies, inter alia, the need for better offline applications with wider coverage in times of internet shutdowns, applications that cannot be easily identified during physical controls, and providing free and secure VPN access.
@inproceedings{guntrumKeyboardFightersUse2024,
address = {New York, NY, USA},
series = {{CHI} '24},
title = {Keyboard {Fighters}: {The} {Use} of {ICTs} by {Activists} in {Times} of {Military} {Coup} in {Myanmar}},
isbn = {979-8-4007-0330-0},
url = {https://peasec.de/paper/2024/2024_Guntrum_KeyboardFightersSMParticipationInMyanmar_CHI.pdf},
doi = {10.1145/3613904.3642279},
abstract = {Amidst the ongoing anti-military protests in Myanmar since 2021, there is a noticeable research gap on ICT-supported activism. Generally, ICTs play an important role during political crises in conjunction with activists’ practices on the ground. Inspired by Resource Mobilization Theory, I conducted qualitative interviews (N=16) and a qualitative online survey (N=34), which demonstrate the intersection between analog and digital domains, showcasing the ingenuity of the activists, and the rapid adoption of ICTs in a country that has experienced a digital revolution within the last few years. As not all people were able to protest on-the-ground, they acted as keyboard fighters to organize protests, to share information, and to support the civil disobedience movement in Myanmar. The study identifies, inter alia, the need for better offline applications with wider coverage in times of internet shutdowns, applications that cannot be easily identified during physical controls, and providing free and secure VPN access.},
booktitle = {Proceedings of the {Conference} on {Human} {Factors} in {Computing} {Systems} ({CHI})},
publisher = {Association for Computing Machinery},
author = {Guntrum, Laura},
year = {2024},
keywords = {HCI, Peace, Projekt-TraCe, A-Paper, Projekt-ATHENE, Selected, Ranking-CORE-A*},
}
[BibTeX] [Abstract] [Download PDF]
Misinformation represent a key challenge for society. User-centered misinformation interventions as digital countermeasures that exert a direct influence on users represent a promising means to deal with the large amounts of information available. While an extensive body of research on this topic exists, researchers are confronted with a diverse research landscape spanning multiple disciplines. This review systematizes the landscape of user-centered misinformation interventions to facilitate knowledge transfer, identify trends, and enable informed decision-making. Over 3,700 scholarly publications were screened and a systematic literature review (N=108) was conducted. A taxonomy was derived regarding intervention design (e.g., binary label), user interaction (active or passive), and timing (e.g., post exposure to misinformation). We provide a structured overview of approaches across multiple disciplines, and derive six overarching challenges for future research.
@article{hartwigLandscapeUsercenteredMisinformation2024,
title = {The {Landscape} of {User}-centered {Misinformation} {Interventions} – {A} {Systematic} {Literature} {Review}},
volume = {56},
issn = {0360-0300},
url = {https://peasec.de/paper/2024/2024_HartwigDoellReuter_LandscapeUserCentredMisinfoInterventions_CSUR.pdf},
doi = {10.1145/3674724},
abstract = {Misinformation represent a key challenge for society. User-centered misinformation interventions as digital countermeasures that exert a direct influence on users represent a promising means to deal with the large amounts of information available. While an extensive body of research on this topic exists, researchers are confronted with a diverse research landscape spanning multiple disciplines. This review systematizes the landscape of user-centered misinformation interventions to facilitate knowledge transfer, identify trends, and enable informed decision-making. Over 3,700 scholarly publications were screened and a systematic literature review (N=108) was conducted. A taxonomy was derived regarding intervention design (e.g., binary label), user interaction (active or passive), and timing (e.g., post exposure to misinformation). We provide a structured overview of approaches across multiple disciplines, and derive six overarching challenges for future research.},
number = {11},
journal = {ACM Computing Surveys (CSUR)},
author = {Hartwig, Katrin and Doell, Frederic and Reuter, Christian},
month = jul,
year = {2024},
keywords = {HCI, Peace, Projekt-NEBULA, A-Paper, Ranking-ImpactFactor, Student, Projekt-ATHENE, Selected, Ranking-CORE-A*},
}
[BibTeX] [Abstract] [Download PDF]
Recent crises like the COVID-19 pandemic provoked an increasing appearance of misleading information, emphasizing the need for effective user-centered countermeasures as an important field in HCI research. This work investigates how content-specific user-centered indicators can contribute to an informed approach to misleading information. In a threefold study, we conducted an in-depth content analysis of 2,382 German tweets on Twitter (now X) to identify topical (e.g., 5G), formal (e.g., links), and rhetorical (e.g., sarcasm) characteristics through manual coding, followed by a qualitative online survey to evaluate which indicators users already use autonomously to assess a tweet’s credibility. Subsequently, in a think-aloud study participants qualitatively evaluated the identified indicators in terms of perceived comprehensibility and usefulness. While a number of indicators were found to be particularly comprehensible and useful (e.g., claim for absolute truth and rhetorical questions), our findings reveal limitations of indicator-based interventions, particularly for people with entrenched conspiracy theory views. We derive four implications for digitally supporting users in dealing with misleading information, especially during crises.
@article{hartwigMisleadingInformationCrises2024,
title = {Misleading {Information} in {Crises}: {Exploring} {Content}-specific {Indicators} on {Twitter} from a {User} {Perspective}},
issn = {0144-929X},
url = {https://doi.org/10.1080/0144929X.2024.2373166},
doi = {10.1080/0144929X.2024.2373166},
abstract = {Recent crises like the COVID-19 pandemic provoked an increasing appearance of misleading information,
emphasizing the need for effective user-centered countermeasures as an important field in HCI research. This
work investigates how content-specific user-centered indicators can contribute to an informed approach to
misleading information. In a threefold study, we conducted an in-depth content analysis of 2,382 German
tweets on Twitter (now X) to identify topical (e.g., 5G), formal (e.g., links), and rhetorical (e.g., sarcasm)
characteristics through manual coding, followed by a qualitative online survey to evaluate which indicators
users already use autonomously to assess a tweet’s credibility. Subsequently, in a think-aloud study participants
qualitatively evaluated the identified indicators in terms of perceived comprehensibility and usefulness. While
a number of indicators were found to be particularly comprehensible and useful (e.g., claim for absolute truth
and rhetorical questions), our findings reveal limitations of indicator-based interventions, particularly for
people with entrenched conspiracy theory views. We derive four implications for digitally supporting users in
dealing with misleading information, especially during crises.},
journal = {Behaviour \& Information Technology (BIT)},
author = {Hartwig, Katrin and Schmid, Stefka and Biselli, Tom and Pleil, Helene and Reuter, Christian},
year = {2024},
keywords = {Crisis, HCI, Projekt-NEBULA, A-Paper, Ranking-CORE-A, Ranking-ImpactFactor, Projekt-ATHENE-PriVis},
pages = {1--34},
}
[BibTeX] [Abstract] [Download PDF]
Misinformation poses a recurrent challenge for video-sharing platforms (VSPs) like TikTok. Obtaining user perspectives on digital interventions addressing the need for transparency (e.g., through indicators) is essential. This article offers a thorough examination of the comprehensibility, usefulness, and limitations of an indicator-based intervention from an adolescents’ perspective. This study (𝑁 = 39; aged 13-16 years) comprised two qualitative steps: (1) focus group discussions and (2) think-aloud sessions, where participants engaged with a smartphone-app for TikTok. The results offer new insights into how video-based indicators can assist adolescents’ assessments. The intervention received positive feedback, especially for its transparency, and could be applicable to new content. This paper sheds light on how adolescents are expected to be experts while also being prone to video-based misinformation, with limited understanding of an intervention’s limitations. By adopting teenagers’ perspectives, we contribute to HCI research and provide new insights into the chances and limitations of interventions for VSPs.
@inproceedings{hartwigAdolescentsEyesAssessing2024,
address = {New York, NY, USA},
series = {{CHI} '24},
title = {From {Adolescents}' {Eyes}: {Assessing} an {Indicator}-{Based} {Intervention} to {Combat} {Misinformation} on {TikTok}},
isbn = {979-8-4007-0330-0},
url = {https://peasec.de/paper/2024/2024_HartwigBiselliSchneiderReuter_MisinfoTikTok_CHI.pdf},
doi = {10.1145/3613904.3642264},
abstract = {Misinformation poses a recurrent challenge for video-sharing platforms (VSPs) like TikTok. Obtaining user perspectives on digital interventions addressing the need for transparency (e.g., through indicators) is essential. This article offers a thorough examination of the comprehensibility, usefulness, and limitations of an indicator-based intervention from an adolescents’ perspective. This study (𝑁 = 39; aged 13-16 years) comprised two qualitative steps: (1) focus group discussions and (2) think-aloud sessions, where participants
engaged with a smartphone-app for TikTok. The results offer new insights into how video-based indicators can assist adolescents’ assessments. The intervention received positive feedback, especially for its transparency, and could be applicable to new content. This paper sheds light on how adolescents are expected to be experts while also being prone to video-based misinformation, with limited understanding of an intervention’s limitations. By adopting
teenagers’ perspectives, we contribute to HCI research and provide new insights into the chances and limitations of interventions for VSPs.},
booktitle = {Proceedings of the {Conference} on {Human} {Factors} in {Computing} {Systems} ({CHI})},
publisher = {Association for Computing Machinery},
author = {Hartwig, Katrin and Biselli, Tom and Schneider, Franziska and Reuter, Christian},
year = {2024},
keywords = {Crisis, HCI, Projekt-NEBULA, A-Paper, Security, UsableSec, Projekt-ATHENE-PriVis, AuswahlCrisis, Selected, Ranking-CORE-A*},
}
[BibTeX] [Abstract] [Download PDF]
Misinformation presents a challenge to democracies, particularly in times of crisis. One way in which misinformation is spread is through voice messages sent via messenger groups, which enable members to share information on a larger scale. Gaining user perspectives on digital misinformation interventions as countermeasure after detection is crucial. In this paper, we extract potential features of misinformation in voice messages from literature, implement them within a program that automatically processes voice messages, and evaluate their perceived usefulness and comprehensibility as user-centered indicators.We propose 35 features extracted from audio files at the character, word, sentence, audio and creator levels to assist (1) private individuals in conducting credibility assessments, (2) government agencies faced with data overload during crises, and (3) researchers seeking to gather features for automatic detection approaches. We conducted a think-aloud study with laypersons (N = 20) to provide initial insight into how individuals autonomously assess the credibility of voice messages, as well as which automatically extracted features they find to be clear and convincing indicators of misinformation. Our study provides qualitative and quantitative insights into valuable indicators, particularly when they relate directly to the content or its creator, and uncovers challenges in user interface design.
@article{hartwigNavigatingMisinformationVoice2024,
title = {Navigating {Misinformation} in {Voice} {Messages}: {Identification} of {User}-{Centered} {Features} for {Digital} {Interventions}},
issn = {1944-4079},
url = {https://peasec.de/paper/2024/2024_HartwigSandlerReuter_NavigatingMisinfoVoiceMessages_RiskHazards.pdf},
doi = {10.1002/rhc3.12296},
abstract = {Misinformation presents a challenge to democracies, particularly in times of crisis. One way in which misinformation is spread is through voice messages sent via messenger groups, which enable members to share information on a larger scale. Gaining user perspectives on digital misinformation interventions as countermeasure after detection is crucial. In this paper, we extract potential features of misinformation in voice messages from literature, implement them within a program that automatically processes voice messages, and evaluate their perceived usefulness and comprehensibility as user-centered indicators.We propose 35 features extracted from audio files at the character, word, sentence, audio and creator levels to assist (1) private individuals in conducting credibility assessments, (2) government agencies faced with data overload during crises, and (3) researchers seeking to gather features for automatic detection approaches. We conducted a think-aloud study with laypersons (N = 20) to provide initial insight into how individuals autonomously assess the credibility of voice messages, as well as which automatically extracted features they find to be clear and convincing indicators of misinformation. Our study provides qualitative and quantitative insights into valuable indicators, particularly when they relate directly to the content or its creator, and uncovers challenges in user interface design.},
journal = {Risk, Hazards, \& Crisis in Public Policy (RHCPP)},
publisher = {John Wiley \& Sons, Ltd},
author = {Hartwig, Katrin and Sandler, Ruslan and Reuter, Christian},
year = {2024},
keywords = {Crisis, HCI, Projekt-NEBULA, A-Paper, Ranking-ImpactFactor, SocialMedia, Student, UsableSec, Projekt-ATHENE, Projekt-CYLENCE, Cyberwar},
}
[BibTeX] [Abstract] [Download PDF]
Computer Emergency Response Teams (CERTs) have been established in the public sector globally to provide advisory, preventive and reactive cybersecurity services for government agencies, citizens, and businesses. Nevertheless, their responsibility of monitoring, analyzing, and communicating cyber threats and security vulnerabilities have become increasingly challenging due to the growing volume and varying quality of information disseminated through public and social channels. Based on a design case study conducted from 2021 to 2023, this paper combines three iterations of expert interviews (N=25), design workshops (N=4) and cognitive walkthroughs (N=25) to design an automated, cross-platform and real-time cybersecurity dashboard. By adopting the notion of cyber situational awareness, the study further extracts user requirements and design heuristics for enhanced threat intelligence and mission awareness in CERTs, discussing the aspects of source integration, data management, customizable visualization, relationship awareness, information assessment, software integration, (inter-)organizational collaboration, and communication of stakeholder warnings.
@inproceedings{kaufhold_we_2024,
address = {Honolulu, HI, USA},
series = {{CHI} '24},
title = {'{We} {Do} {Not} {Have} the {Capacity} to {Monitor} {All} {Media}': {A} {Design} {Case} {Study} on {Cyber} {Situational} {Awareness} in {Computer} {Emergency} {Response} {Teams}},
isbn = {979-8-4007-0330-0},
url = {https://peasec.de/paper/2024/2024_KaufholdRiebeBayerReuter_CertDesignCaseStudy_CHI.pdf},
doi = {10.1145/3613904.3642368},
abstract = {Computer Emergency Response Teams (CERTs) have been established in the public sector globally to provide advisory, preventive and reactive cybersecurity services for government agencies, citizens, and businesses. Nevertheless, their responsibility of monitoring, analyzing, and communicating cyber threats and security vulnerabilities have become increasingly challenging due to the growing volume and varying quality of information disseminated through public and social channels. Based on a design case study conducted from 2021 to 2023, this paper combines three iterations of expert interviews (N=25), design workshops (N=4) and cognitive walkthroughs (N=25) to design an automated, cross-platform and real-time cybersecurity dashboard. By adopting the notion of cyber situational awareness, the study further extracts user requirements and design heuristics for enhanced threat intelligence and mission awareness in CERTs, discussing the aspects of source integration, data management, customizable visualization, relationship awareness, information assessment, software integration, (inter-)organizational collaboration, and communication of stakeholder warnings.},
booktitle = {Proceedings of the {Conference} on {Human} {Factors} in {Computing} {Systems} ({CHI}) ({Best} {Paper} {Award})},
publisher = {Association for Computing Machinery},
author = {Kaufhold, Marc-André and Riebe, Thea and Bayer, Markus and Reuter, Christian},
year = {2024},
keywords = {HCI, A-Paper, Projekt-ATHENE-CyAware, Security, UsableSec, Projekt-CYLENCE, Projekt-CYWARN, Selected, AuswahlUsableSec, Ranking-CORE-A*, AuswahlKaufhold, HabilitationKaufhold},
}
[BibTeX] [Abstract] [Download PDF]
Internet of Things (IoT) devices have become increasingly important within the smart home domain, making the security of the devices a critical aspect. The majority of IoT devices are black-box systems running closed and pre-installed firmware. This raises concerns about the trustworthiness of these devices, especially considering that some of them are shipped with a microphone or a camera. Remote attestation aims at validating the trustworthiness of these devices by verifying the integrity of the software. However, users cannot validate whether the attestation has actually taken place and has not been manipulated by an attacker, raising the need for HCI research on trust and understandability. We conducted a qualitative study with 35 participants, investigating trust in the attestation process and whether this trust can be improved by additional explanations in the application. We developed an application that allows users to attest a smart speaker using their smartphone over an audio channel to identify the attested device and observe the attestation process. In order to observe the differences between the applications with and without explanations, we performed A/B testing. We discovered that trust increases when additional explanations of the technical process are provided, improving the understanding of the attestation process.
@article{linsnerBuildingTrustRemote2024,
title = {Building {Trust} in {Remote} {Attestation} {Through} {Transparency} – {A} {Qualitative} {User} {Study} on {Observable} {Attestation}},
issn = {0144-929X},
url = {https://doi.org/10.1080/0144929X.2024.2374889},
doi = {10.1080/0144929X.2024.2374889},
abstract = {Internet of Things (IoT) devices have become increasingly important within the smart home domain, making the security of the devices a critical aspect. The majority of IoT devices are black-box systems running closed and pre-installed firmware. This raises concerns about the trustworthiness of these devices, especially considering that some of them are shipped with a microphone or a camera. Remote attestation aims at validating the trustworthiness of these devices by verifying the integrity of the software. However, users cannot validate whether the attestation has actually taken place and has not been manipulated by an attacker, raising the need for HCI research on trust and understandability. We conducted a qualitative study with 35 participants, investigating trust in the attestation process and whether this trust can be improved by additional explanations in the application. We developed an application that allows users to attest a smart speaker using their smartphone over an audio channel to identify the attested device and observe the attestation process. In order to observe the differences between the applications with and without explanations, we performed A/B testing. We discovered that trust increases when additional explanations of the technical process are provided, improving the understanding of the attestation process.},
journal = {Behaviour \& Information Technology (BIT)},
publisher = {Taylor \& Francis},
author = {Linsner, Sebastian and Demuth, Kilian and Surminski, Sebastian and Davi, Lucas and Reuter, Christian},
year = {2024},
keywords = {A-Paper, Ranking-ImpactFactor, Security, UsableSec, Projekt-ATHENE-PriVis, Projekt-CROSSING},
pages = {1--21},
}
[BibTeX] [Abstract] [Download PDF]
In many scenarios users have to communicate sensitive data with third parties such as doctors, lawyers, insurance companies, social workers or online shops. Handing over personal data is necessary to use those services but the delegation of tasks to increase efficiency still poses the risk that personal data might be leaked. To minimize this risk and further enhance the privacy of users, we propose an interaction concept that uses layered encryption of messages to provide a trade-off between privacy and usability. Users can choose which data is additionally encrypted in an inner layer, say, for the eyes of their doctor only, and which data is available in an outer (encrypted or unencrypted) layer for all staff members. Another benefit is the hiding of sensitive data from package inspection or crawling algorithms over emails, while less critical parts can still be processed by these systems via the partial access. To investigate this concept, we derive relevant use cases for form-based communication over email from a quantitative pre-study with 1011 participants, showing that general practitioners are the most suitable use case. We developed demonstrators for this use case and evaluated them in a qualitative study with 42 participants. Our results show that the possibility of minimizing the propagation of sensitive data through additional encryption is highly appreciated and the usage of form-based communication is a promising approach for the digital transformation.
@article{linsnerDecisionbasedDataDistribution2024,
title = {Decision-based {Data} {Distribution} ({D}³): {Enabling} {Users} to {Minimize} {Data} {Propagation} in {Privacy}-sensitive {Scenarios}},
issn = {2299-0984},
url = {https://petsymposium.org/popets/2024/popets-2024-0113.php},
doi = {10.56553/popets-2024-0113},
abstract = {In many scenarios users have to communicate sensitive data with third parties such as doctors, lawyers, insurance companies, social workers or online shops. Handing over personal data is necessary to use those services but the delegation of tasks to increase efficiency still poses the risk that personal data might be leaked. To minimize this risk and further enhance the privacy of users, we propose an interaction concept that uses layered encryption of messages to provide a trade-off between privacy and usability. Users can choose which data is additionally encrypted in an inner layer, say, for the eyes of their doctor only, and which data is available in an outer (encrypted or unencrypted) layer for all staff members. Another benefit is the hiding of sensitive data from package inspection or crawling algorithms over emails, while less critical parts can still be processed by these systems via the partial access. To investigate this concept, we derive relevant use cases for form-based communication over email from a quantitative pre-study with 1011 participants, showing that general practitioners are the most suitable use case. We developed demonstrators for this use case and evaluated them in a qualitative study with 42 participants. Our results show that the possibility of minimizing the propagation of sensitive data through additional encryption is highly appreciated and the usage of form-based communication is a promising approach for the digital transformation.},
number = {4},
journal = {Proceedings on Privacy Enhancing Technologies (PoPETs)},
author = {Linsner, Sebastian and Demuth, Kilian and Fischlin, Marc and Reuter, Christian},
year = {2024},
keywords = {HCI, A-Paper, Ranking-CORE-A, Security, UsableSec, Projekt-ATHENE-PriVis, Projekt-CROSSING, Selected},
}
[BibTeX] [Abstract] [Download PDF]
Trustworthy digital communication requires the secure exchange of contact information, but current approaches lack usability and scalability for larger groups of users. We evaluate the usability of two secure contact exchange systems: the current state of the art, SafeSlinger, and our newly designed protocol, PairSonic, which extends trust from physical encounters to spontaneous online communication. Our lab study (N=45) demonstrates PairSonic’s superior usability, automating the tedious verification tasks from previous approaches via an acoustic out-of-band channel. Although participants significantly preferred our system, minimizing user effort surprisingly decreased the perceived security for some users, who associated security with complexity. We discuss user perceptions of the different protocol components and identify remaining usability barriers for CSCW application scenarios.
@article{putzSoundsGoodFast2024,
title = {Sounds {Good}? {Fast} and {Secure} {Contact} {Exchange} in {Groups}},
volume = {8},
url = {https://peasec.de/paper/2024/2024_PutzHaeslerHollick_GroupPairing_CSCW},
doi = {10.1145/3686964},
abstract = {Trustworthy digital communication requires the secure exchange of contact information, but current approaches lack usability and scalability for larger groups of users. We evaluate the usability of two secure contact exchange systems: the current state of the art, SafeSlinger, and our newly designed protocol, PairSonic, which extends trust from physical encounters to spontaneous online communication. Our lab study (N=45) demonstrates PairSonic's superior usability, automating the tedious verification tasks from previous approaches via an acoustic out-of-band channel. Although participants significantly preferred our system, minimizing user effort surprisingly decreased the perceived security for some users, who associated security with complexity. We discuss user perceptions of the different protocol components and identify remaining usability barriers for CSCW application scenarios.},
number = {CSCW2},
journal = {Proceedings of the ACM: Human Computer Interaction (PACM): Computer-Supported Cooperative Work and Social Computing (Best Paper Award)},
author = {Putz, Florentin and Haesler, Steffen and Hollick, Matthias},
year = {2024},
keywords = {HCI, Projekt-emergenCITY, A-Paper, Ranking-CORE-A, Security, UsableSec},
}
[BibTeX] [Abstract] [Download PDF]
The rise of fake news and misinformation in the digital age poses serious risks for individuals and society, particularly during crises like the Israel-Hamas war, the Russian-Ukraine war, or the COVID-19 pandemic. Misinformation serves as a tool to manipulate public opinion and create discord. Vulnerability to manipulation increases in online spaces during crises, where authoritative information is scarce. Emergency management, public health, political and public administration, as well as media professionals and citizens express concern and seek solutions to enhance information quality during such critical times. This article highlights user-centred approaches to countering fake news and misinformation, tracing their historical evolution from ancient Greece to the present, focussing on their relevance during the COVID-19 crisis and in contemporary information warfare. It describes the vulnerability of audiences to misinformation and outlines prevailing trends in user-centred countermeasures. This article also introduces recent research on the effectiveness of media literacy interventions on truth discernment, a cross-cultural comparison of the perception of negative consequences and the injunctive norm, a comparison of video and text to promote lateral reading in adolescents, content-specific indicators on Twitter from a user perspective, a learning system for detecting misinformation as well as ethical and security considerations in automated detection.
@article{reuterCombatingInformationWarfare2025,
title = {Combating {Information} {Warfare}: {State} and {Trends} in {User}-{Centered} {Countermeasures} against {Fake} {News} and {Misinformation}},
volume = {44},
issn = {0144-929X},
url = {https://doi.org/10.1080/0144929X.2024.2442486},
doi = {10.1080/0144929X.2024.2442486},
abstract = {The rise of fake news and misinformation in the digital age poses serious risks for individuals and society, particularly during crises like the Israel-Hamas war, the Russian-Ukraine war, or the COVID-19 pandemic. Misinformation serves as a tool to manipulate public opinion and create discord. Vulnerability to manipulation increases in online spaces during crises, where authoritative information is scarce. Emergency management, public health, political and public administration, as well as media professionals and citizens express concern and seek solutions to enhance information quality during such critical times. This article highlights user-centred approaches to countering fake news and misinformation, tracing their historical evolution from ancient Greece to the present, focussing on their relevance during the COVID-19 crisis and in contemporary information warfare. It describes the vulnerability of audiences to misinformation and outlines prevailing trends in user-centred countermeasures. This article also introduces recent research on the effectiveness of media literacy interventions on truth discernment, a cross-cultural comparison of the perception of negative consequences and the injunctive norm, a comparison of video and text to promote lateral reading in adolescents, content-specific indicators on Twitter from a user perspective, a learning system for detecting misinformation as well as ethical and security considerations in automated detection.},
number = {13},
journal = {Behaviour \& Information Technology (BIT)},
author = {Reuter, Christian and Hughes, Amanda Lee and Buntain, Cody},
year = {2024},
keywords = {Crisis, HCI, Peace, Projekt-NEBULA, A-Paper, Ranking-CORE-A, Ranking-ImpactFactor, SocialMedia},
pages = {3348--3361},
}
[BibTeX] [Abstract] [Download PDF]
With developments in Artificial Intelligence widely framed as security concern in both military and civilian realms, governments have turned their attention to regulating and governing AI. In a study of US, Chinese, and EU AI documents, we go beyond instrumental understandings of AI as a technological capability, which serves states’ self-interests and the maintenance of their (supra)national security. Our specific interest lies in how AI policies tap into both problem-solving approaches and affective registers to achieve both physical as well as ontological security. We find that in governmental visions, AI is perceived as a capability that enhances societal, and geopolitical interests while its risks are framed as manageable. This echoes strands within Human-Computer Interaction that draw on human-centered perceptions of technology and assumptions about human-AI relationships of trust. Despite different cultural and institutional settings, the visions of future AI development are shaped by this (shared) understanding of human-AI interaction, offering common ground in the navigation of innovation policies.
@article{schmidTrustArtificialIntelligence2024,
title = {Trust in {Artificial} {Intelligence}: {Producing} {Ontological} {Security} through {Governmental} {Visions}},
url = {https://peasec.de/paper/2024/2024_SchmidPhamFerl_TrustinAI_CooperationConflict.pdf},
doi = {10.1177/00108367241288073},
abstract = {With developments in Artificial Intelligence widely framed as security concern in both military and civilian realms, governments have turned their attention to regulating and governing AI. In a study of US, Chinese, and EU AI documents, we go beyond instrumental understandings of AI as a technological capability, which serves states' self-interests and the maintenance of their (supra)national security. Our specific interest lies in how AI policies tap into both problem-solving approaches and affective registers to achieve both physical as well as ontological security. We find that in governmental visions, AI is perceived as a capability that enhances societal, and geopolitical interests while its risks are framed as manageable. This echoes strands within Human-Computer Interaction that draw on human-centered perceptions of technology and assumptions about human-AI relationships of trust. Despite different cultural and institutional settings, the visions of future AI development are shaped by this (shared) understanding of human-AI interaction, offering common ground in the navigation of innovation policies.},
journal = {Cooperation and Conflict},
author = {Schmid, Stefka and Pham, Bao-Chau and Ferl, Anna-Katharina},
year = {2024},
keywords = {Peace, Projekt-TraCe, A-Paper, Ranking-ImpactFactor, AuswahlPeace},
}
[BibTeX] [Abstract] [Download PDF]
In crises such as the COVID-19 pandemic, it is crucial to support users when dealing with social media content. Considering digital resilience, we propose a web app based on Social Network Analysis (SNA) to provide an overview of potentially misleading vs. non-misleading content on Twitter, which can be explored by users and enable foundational learning. The latter aims at systematically identifying thematic patterns which may be associated with misleading information. Additionally, it entails reflecting on indicators of misleading tweets which are proposed to approach classification of tweets. Paying special attention to non-expert users of social media, we conducted a two-step Think Aloud study for evaluation. While participants valued the opportunity to generate new knowledge and the diversity of the application, qualities such as equality and rapidity may be further improved. However, learning effects outweighed individual costs as all users were able to shift focus onto relevant features, such as hashtags, while readily pointing out content characteristics. Our design artifact connects to learning-oriented interventions regarding the spread of misleading information and tackles information overload by a SNA-based plug-in.
@article{schmidDigitalResilienceDealing2024,
title = {Digital {Resilience} in {Dealing} with {Misinformation} on {Social} {Media} during {COVID}-19: {A} {Web} {Application} to {Assist} {Users} in {Crises}},
volume = {26},
issn = {1572-9419},
url = {https://doi.org/10.1007/s10796-022-10347-5},
doi = {10.1007/s10796-022-10347-5},
abstract = {In crises such as the COVID-19 pandemic, it is crucial to support users when dealing with social media content. Considering digital resilience, we propose a web app based on Social Network Analysis (SNA) to provide an overview of potentially misleading vs. non-misleading content on Twitter, which can be explored by users and enable foundational learning. The latter aims at systematically identifying thematic patterns which may be associated with misleading information. Additionally, it entails reflecting on indicators of misleading tweets which are proposed to approach classification of tweets. Paying special attention to non-expert users of social media, we conducted a two-step Think Aloud study for evaluation. While participants valued the opportunity to generate new knowledge and the diversity of the application, qualities such as equality and rapidity may be further improved. However, learning effects outweighed individual costs as all users were able to shift focus onto relevant features, such as hashtags, while readily pointing out content characteristics. Our design artifact connects to learning-oriented interventions regarding the spread of misleading information and tackles information overload by a SNA-based plug-in.},
number = {2},
journal = {Information Systems Frontiers (ISF)},
author = {Schmid, Stefka and Hartwig, Katrin and Cieslinski, Robert and Reuter, Christian},
month = apr,
year = {2024},
keywords = {Crisis, Projekt-emergenCITY, Projekt-NEBULA, Projekt-TraCe, A-Paper, Student},
pages = {477--499},
}
[BibTeX] [Abstract] [Download PDF]
Digital technology and smartphones provide great opportunities to support crisis response measures. During the COVID-19 pandemic, many countries introduced contact tracing apps (CTAs) to prevent the virus’s spread and identify infection clusters. Because wide acceptance is necessary for these apps to work, it has been a subject of research. Past research often highlighted the role of trust for acceptance and suggested that technical transparency by opening the source code can help to build trust. For this reason, we studied the acceptance of two German apps: the Corona-Warn-App (CWA), which was developed as open-source software early on, and the Luca app, which did not publish the source code initially. We conducted a multinomial logistic regression testing effects on the adoption of (1) only the CWA, (2) only the Luca app, or (3) both apps. As predictors, we considered the role of trust in the app publisher and the government and controlled for predictors relevant to past research. We found trust to have a significant effect on the acceptance of the apps. A self-reported understanding of the term “open-source software” and a perceived threat by COVID-19 had a positive effect for the Corona-Warn-App or both apps but not for the Luca app alone. Being from Eastern Germany lowered the acceptance of the Luca app or both apps. Our findings can add to previous CTA acceptance research and provide insights for policymakers for future digital crisis measures, especially for populations comparable to the German population regarding government trust and privacy attitudes.
@article{steinbrinkImpactTransparencyTrust2024,
title = {The {Impact} of {Transparency} and {Trust} on {User} {Acceptance} of {Contact} {Tracing} {Apps}: {Implications} for the {Adoption} of {Crisis} {Response} {Apps}},
issn = {2212-4209},
url = {https://www.sciencedirect.com/science/article/pii/S2212420924004230},
doi = {10.1016/j.ijdrr.2024.104661},
abstract = {Digital technology and smartphones provide great opportunities to support crisis response measures. During the COVID-19 pandemic, many countries introduced contact tracing apps (CTAs) to prevent the virus’s spread and identify infection clusters. Because wide acceptance is necessary for these apps to work, it has been a subject of research. Past research often highlighted the role of trust for acceptance and suggested that technical transparency by opening the source code can help to build trust. For this reason, we studied the acceptance of two German apps: the Corona-Warn-App (CWA), which was developed as open-source software early on, and the Luca app, which did not publish the source code initially. We conducted a multinomial logistic regression testing effects on the adoption of (1) only the CWA, (2) only the Luca app, or (3) both apps. As predictors, we considered the role of trust in the app publisher and the government and controlled for predictors relevant to past research. We found trust to have a significant effect on the acceptance of the apps. A self-reported understanding of the term “open-source software” and a perceived threat by COVID-19 had a positive effect for the Corona-Warn-App or both apps but not for the Luca app alone. Being from Eastern Germany lowered the acceptance of the Luca app or both apps. Our findings can add to previous CTA acceptance research and provide insights for policymakers for future digital crisis measures, especially for populations comparable to the German population regarding government trust and privacy attitudes.},
journal = {International Journal of Disaster Risk Reduction},
author = {Steinbrink, Enno and Reuter, Christian},
month = jul,
year = {2024},
keywords = {Crisis, HCI, A-Paper, Ranking-ImpactFactor, Projekt-GRKPrivacy, Projekt-ATHENE-PriVis},
pages = {104661},
}
2023
[BibTeX] [Abstract] [Download PDF]
A Design Science Artefact for Cyber Threat Detection and Actor Specific Communication
@article{bayerMultiLevelFineTuningData2023,
title = {Multi-{Level} {Fine}-{Tuning}, {Data} {Augmentation}, and {Few}-{Shot} {Learning} for {Specialized} {Cyber} {Threat} {Intelligence}},
issn = {0167-4048},
url = {https://peasec.de/paper/2023/2023_BayerFreyReuter_MultiLevelFineTuningForCyberThreatIntelligence_CS.pdf},
doi = {10.1016/j.cose.2023.103430},
abstract = {A Design Science Artefact for Cyber Threat Detection and Actor Specific Communication},
journal = {Computers \& Security},
author = {Bayer, Markus and Frey, Tobias and Reuter, Christian},
year = {2023},
keywords = {A-Paper, Ranking-ImpactFactor, Student, Security, Projekt-ATHENE, Projekt-CROSSING, Projekt-CYWARN},
}
[BibTeX] [Abstract] [Download PDF]
Data augmentation, the artificial creation of training data for machine learning by transformations, is a widely studied research field across machine learning disciplines. While it is useful for increasing a model’s generalization capabilities, it can also address many other challenges and problems, from overcoming a limited amount of training data, to regularizing the objective, to limiting the amount data used to protect privacy. Based on a precise description of the goals and applications of data augmentation and a taxonomy for existing works, this survey is concerned with data augmentation methods for textual classification and aims to provide a concise and comprehensive overview for researchers and practitioners. Derived from the taxonomy, we divide more than 100 methods into 12 different groupings and give state-of-the-art references expounding which methods are highly promising by relating them to each other. Finally, research perspectives that may constitute a building block for future work are provided.
@article{bayer_survey_2023,
title = {A {Survey} on {Data} {Augmentation} for {Text} {Classification}},
volume = {55},
url = {http://www.peasec.de/paper/2023/2023_BayerKaufholdReuter_SurveyDataAugmentationTextClassification_CSUR.pdf},
doi = {10.1145/3544558},
abstract = {Data augmentation, the artificial creation of training data for machine learning by transformations, is a widely studied research field across machine learning disciplines. While it is useful for increasing a model's generalization capabilities, it can also address many other challenges and problems, from overcoming a limited amount of training data, to regularizing the objective, to limiting the amount data used to protect privacy. Based on a precise description of the goals and applications of data augmentation and a taxonomy for existing works, this survey is concerned with data augmentation methods for textual classification and aims to provide a concise and comprehensive overview for researchers and practitioners. Derived from the taxonomy, we divide more than 100 methods into 12 different groupings and give state-of-the-art references expounding which methods are highly promising by relating them to each other. Finally, research perspectives that may constitute a building block for future work are provided.},
number = {7},
journal = {ACM Computing Surveys (CSUR)},
author = {Bayer, Markus and Kaufhold, Marc-André and Reuter, Christian},
year = {2023},
keywords = {Crisis, Projekt-emergenCITY, A-Paper, Ranking-ImpactFactor, Projekt-ATHENE-SecUrban, Projekt-CYWARN, AuswahlCrisis, Selected, Ranking-CORE-A*, AuswahlKaufhold, HabilitationKaufhold},
pages = {1--39},
}
[BibTeX] [Abstract] [Download PDF]
About half a billion households are expected to use smart home systems by 2025. Although many IoT sensors, such as smoke detectors or security cameras, are available and governmental crisis warning systems are in place, little is known about how to warn appropriately in smart home environments. We created a Raspberry Pi based prototype with a speaker, a display, and a connected smart light bulb. Together with a focus group, we developed a taxonomy for warning messages in smart home environments, dividing them into five classes with different stimuli. We evaluated the taxonomy using the Experience Sampling Method (ESM) in a field study at participants’ (N = 13) homes testing 331 warnings. The results show that taxonomy-based warning stimuli are perceived to be appropriate and participants could imagine using such a warning system. We propose a deeper integration of warning capabilities into smart home environments to enhance the safety of citizens.
@inproceedings{haeslerGettingResidentsAttention2023,
address = {New York, NY, USA},
series = {{DIS} '23},
title = {Getting the {Residents}' {Attention}: {The} {Perception} of {Warning} {Channels} in {Smart} {Home} {Warning} {Systems}},
isbn = {978-1-4503-9893-0},
url = {https://peasec.de/paper/2023/2023_HaeslerWendelbornReuter_SmartHomeWarningSystems_DIS},
doi = {10.1145/3563657.3596076},
abstract = {About half a billion households are expected to use smart home systems by 2025. Although many IoT sensors, such as smoke detectors or security cameras, are available and governmental crisis warning systems are in place, little is known about how to warn appropriately in smart home environments. We created a Raspberry Pi based prototype with a speaker, a display, and a connected smart light bulb. Together with a focus group, we developed a taxonomy for warning messages in smart home environments, dividing them into five classes with different stimuli. We evaluated the taxonomy using the Experience Sampling Method (ESM) in a field study at participants' (N = 13) homes testing 331 warnings. The results show that taxonomy-based warning stimuli are perceived to be appropriate and participants could imagine using such a warning system. We propose a deeper integration of warning capabilities into smart home environments to enhance the safety of citizens.},
booktitle = {Proceedings of the {ACM} {Designing} {Interactive} {Systems} {Conference} ({DIS})},
publisher = {Association for Computing Machinery},
author = {Haesler, Steffen and Wendelborn, Marc and Reuter, Christian},
year = {2023},
keywords = {Crisis, HCI, Projekt-emergenCITY, A-Paper, Ranking-CORE-A, Student, Projekt-ATHENE-SecUrban},
pages = {1114--1127},
}
[BibTeX] [Abstract] [Download PDF]
Warning apps are used by many to receive warnings about imminent disasters. However, their potential for increasing awareness about general hazards and for increasing preparedness is currently underused. With a mixed-method design that includes a representative survey of the German population, a design workshop and an app evaluation experiment, this study investigates users’ preferences regarding non-acute preparedness alerts’ inclusion in crisis apps and the effectiveness of Nudging in this context. The experiment shows that while the social influence nudge had no significant effect compared to the control group without a nudging condition, the confrontational nudge increased the number of taken recommended preparedness measures. The evaluation indicates that the preparedness alerts increased users’ knowledge and their motivation to use a warning app. This motivation is, in contrast, decreased when the messages are perceived as a disruption. While many oppose push notifications, favor finding persuasively designed preparedness advice in a separate menu or as an optional notification.
@article{haunschildPreparednessNudgingWarning2023,
title = {Preparedness {Nudging} for {Warning} {Apps}? {A} {Mixed}-{Method} {Study} {Investigating} {Popularity} and {Effects} of {Preparedness} {Alerts} in {Warning} {Apps}},
volume = {172},
issn = {1071-5819},
url = {https://peasec.de/paper/2023/2023_HaunschildPauliReuter_NudgingWarningApps_IJHCS.pdf},
doi = {https://doi.org/10.1016/j.ijhcs.2023.102995},
abstract = {Warning apps are used by many to receive warnings about imminent disasters. However, their potential for increasing awareness about general hazards and for increasing preparedness is currently underused. With a mixed-method design that includes a representative survey of the German population, a design workshop and an app evaluation experiment, this study investigates users’ preferences regarding non-acute preparedness alerts’ inclusion in crisis apps and the effectiveness of Nudging in this context. The experiment shows that while the social influence nudge had no significant effect compared to the control group without a nudging condition, the confrontational nudge increased the number of taken recommended preparedness measures. The evaluation indicates that the preparedness alerts increased users’ knowledge and their motivation to use a warning app. This motivation is, in contrast, decreased when the messages are perceived as a disruption. While many oppose push notifications, favor finding persuasively designed preparedness advice in a separate menu or as an optional notification.},
journal = {International Journal on Human-Computer Studies (IJHCS)},
author = {Haunschild, Jasmin and Pauli, Selina and Reuter, Christian},
year = {2023},
keywords = {Crisis, Projekt-emergenCITY, A-Paper, Ranking-ImpactFactor, Student, Projekt-ATHENE-SecUrban, AuswahlCrisis, Selected},
pages = {102995},
}
[BibTeX] [Abstract] [Download PDF]
Farm Management Information Systems (FMIS) are an important core component of modern farming companies as they allow, e.g., to document activities, create fertilization plans, and feed digital equipment with required data. Since the entire agricultural sector is an essential component of food production, high standards of resilience should be established in the involved companies. Accordingly, the used software should also be designed with high standards on reliability and crisis capability. Based on a literature review, we found that software for farmers with certain resilience needs is lacking. Thus, we designed and evaluated a new FMIS concept with the user-centered design method. By conducting focus groups (two rounds, total N=57) in 2017 and 2019, we raised specific front-end and back-end requirements of farmers. Based on the requirements, we developed our concept for both front- and back-end in terms of a decentralized and offline-working FMIS. Through the evaluation with practitioners (N=16) of the implemented concept, we derived findings and implications, highlighting the need for privacy, stability, and offline-capability, as well as the UI-requirement to be supportive, e.g., with easy to understand icons and terms.
@article{kuntkeGeoBoxDesignEvaluation2023,
title = {{GeoBox}: {Design} and {Evaluation} of a {Tool} for {Resilient} and {Decentralized} {Data} {Management} in {Agriculture}},
volume = {43},
issn = {0144-929X},
url = {https://peasec.de/paper/2023/2023_KuntkeKaufholdLinsnerReuter_GeoBox_BIT.pdf},
doi = {10.1080/0144929X.2023.2185747},
abstract = {Farm Management Information Systems (FMIS) are an important core component of modern farming companies as they allow, e.g., to document activities, create fertilization plans, and feed digital equipment with required data. Since the entire agricultural sector is an essential component of food production, high standards of resilience should be established in the involved companies. Accordingly, the used software should also be designed with high standards on reliability and crisis capability. Based on a literature review, we found that software for farmers with certain resilience needs is lacking. Thus, we designed and evaluated a new FMIS concept with the user-centered design method. By conducting focus groups (two rounds, total N=57) in 2017 and 2019, we raised specific front-end and back-end requirements of farmers. Based on the requirements, we developed our concept for both front- and back-end in terms of a decentralized and offline-working FMIS. Through the evaluation with practitioners (N=16) of the implemented concept, we derived findings and implications, highlighting the need for privacy, stability, and offline-capability, as well as the UI-requirement to be supportive, e.g., with easy to understand icons and terms.},
number = {4},
journal = {Behaviour \& Information Technology (BIT)},
publisher = {Taylor \& Francis},
author = {Kuntke, Franz and Kaufhold, Marc-André and Linsner, Sebastian and Reuter, Christian},
year = {2023},
keywords = {A-Paper, Ranking-CORE-A, Ranking-ImpactFactor, Security, UsableSec, Projekt-AgriRegio, Projekt-GeoBox, Selected, AuswahlUsableSec},
pages = {764--786},
}
[BibTeX] [Abstract] [Download PDF]
Cyberspace is a fragile construct threatened by malicious cyber operations of different actors, with vulnerabilities in IT hardware and software forming the basis for such activities, thus also posing a threat to global IT security. Advancements in the field of artificial intelligence accelerate this development, either with artificial intelligence enabled cyber weapons, automated cyber defense measures, or artificial intelligence-based threat and vulnerability detection. Especially state actors, with their long-term strategic security interests, often stockpile such knowledge of vulnerabilities and exploits to enable their military or intelligence service cyberspace operations. While treaties and regulations to limit these developments and to enhance global IT security by disclosing vulnerabilities are currently being discussed on the international level, these efforts are hindered by state concerns about the disclosure of unique knowledge and about giving up tactical advantages. This leads to a situation where multiple states are likely to stockpile at least some identical exploits, with technical measures to enable a depletion process for these stockpiles that preserve state secrecy interests and consider the special constraints of interacting states as well as the requirements within such environments being non-existent. This paper proposes such a privacy-preserving approach that allows multiple state parties to privately compare their stock of vulnerabilities and exploits to check for items that occur in multiple stockpiles without revealing them so that their disclosure can be considered. We call our system ExTRUST and show that it is scalable and can withstand several attack scenarios. Beyond the intergovernmental setting, ExTRUST can also be used for other zero-trust use cases, such as bug-bounty programs.
@article{reinholdExTRUSTReducingExploit2023,
title = {{ExTRUST}: {Reducing} {Exploit} {Stockpiles} {With} a {Privacy}-{Preserving} {Depletion} {Systems} for {Inter}-{State} {Relationships}},
volume = {4},
url = {https://peasec.de/paper/2023/2023_ReinholdKuehnGuentherSchneiderReuter_ExTrust-ehem-BlockED_TTaS.pdf},
doi = {10.1109/TTS.2023.3280356},
abstract = {Cyberspace is a fragile construct threatened by malicious cyber operations of different actors, with vulnerabilities in IT hardware and software forming the basis for such activities, thus also posing a threat to global IT security. Advancements in the field of artificial intelligence accelerate this development, either with artificial intelligence enabled cyber weapons, automated cyber defense measures, or artificial intelligence-based threat and vulnerability detection. Especially state actors, with their long-term strategic security interests, often stockpile such knowledge of vulnerabilities and exploits to enable their military or intelligence service cyberspace operations. While treaties and regulations to limit these developments and to enhance global IT security by disclosing vulnerabilities are currently being discussed on the international level, these efforts are hindered by state concerns about the disclosure of unique knowledge and about giving up tactical advantages. This leads to a situation where multiple states are likely to stockpile at least some identical exploits, with technical measures to enable a depletion process for these stockpiles that preserve state secrecy interests and consider the special constraints of interacting states as well as the requirements within such environments being non-existent. This paper proposes such a privacy-preserving approach that allows multiple state parties to privately compare their stock of vulnerabilities and exploits to check for items that occur in multiple stockpiles without revealing them so that their disclosure can be considered. We call our system ExTRUST and show that it is scalable and can withstand several attack scenarios. Beyond the intergovernmental setting, ExTRUST can also be used for other zero-trust use cases, such as bug-bounty programs.},
number = {2},
journal = {IEEE Transactions on Technology and Society},
author = {Reinhold, Thomas and Kuehn, Philipp and Günther, Daniel and Schneider, Thomas and Reuter, Christian},
year = {2023},
keywords = {Peace, A-Paper, AuswahlPeace, Student, Projekt-GRKPrivacy, Projekt-CROSSING, Projekt-ATHENE-SecUrban, Selected, Cyberwar},
pages = {158--170},
}
[BibTeX] [Abstract] [Download PDF]
The value of social media in crises, disasters, and emergencies across different events, participants, and states is now well-examined in crisis informatics research. Previous research has contributed to the state of the art with empirical insights on the use of social media, approaches for the gathering and processing of big social data, the design and evaluation of information systems, and the analysis of cumulative and longitudinal data. While some studies examined social media use representatively for their target audience, these usually only comprise a single point of inquiry and do not allow for a trend analysis. This work provides results (1) of a representative survey with German citizens from 2021 on use patterns, perceptions, and expectations regarding social media during emergencies. Furthermore, it (2) compares these results to previous surveys and provides insights on temporal changes and trends from 2017, over 2019 to 2021. Our findings highlight that social media use in emergencies increased in 2021 and 2019 compared to 2017. Between 2019 and 2021, the amount of information shared on social media remained on a similar level, while the perceived disadvantages of social media in emergencies significantly increased. In light of demographic variables, the results of the 2021 survey confirm previous findings, according to which older individuals (45+ years) use social media in emergencies less often than younger individuals (18-24 years). Furthermore, while the quicker availability of information was one of the reasons for social media use, especially the potential information overload was a key factor for not using social media in emergencies. The results are discussed in light of the dynamic nature of attitudes regarding social media in emergencies and the need to account for heterogeneity in user expectations to build trustworthy information ecosystems in social media.
@article{reuterIncreasingAdoptionPerceived2023,
title = {Increasing {Adoption} {Despite} {Perceived} {Limitations} of {Social} {Media} in {Emergencies}: {Representative} {Insights} on {German} {Citizens}’ {Perception} and {Trends} from 2017 to 2021},
volume = {96},
issn = {2212-4209},
url = {https://peasec.de/paper/2023/2023_ReuterKaufholdBiselliPleil_SocialMediaEmergenciesSurvey_IJDRR.pdf},
doi = {10.1016/j.ijdrr.2023.103880},
abstract = {The value of social media in crises, disasters, and emergencies across different events, participants, and states is now well-examined in crisis informatics research. Previous research has contributed to the state of the art with empirical insights on the use of social media, approaches for the gathering and processing of big social data, the design and evaluation of information systems, and the analysis of cumulative and longitudinal data. While some studies examined social media use representatively for their target audience, these usually only comprise a single point of inquiry and do not allow for a trend analysis. This work provides results (1) of a representative survey with German citizens from 2021 on use patterns, perceptions, and expectations regarding social media during emergencies. Furthermore, it (2) compares these results to previous surveys and provides insights on temporal changes and trends from 2017, over 2019 to 2021. Our findings highlight that social media use in emergencies increased in 2021 and 2019 compared to 2017. Between 2019 and 2021, the amount of information shared on social media remained on a similar level, while the perceived disadvantages of social media in emergencies significantly increased. In light of demographic variables, the results of the 2021 survey confirm previous findings, according to which older individuals (45+ years) use social media in emergencies less often than younger individuals (18-24 years). Furthermore, while the quicker availability of information was one of the reasons for social media use, especially the potential information overload was a key factor for not using social media in emergencies. The results are discussed in light of the dynamic nature of attitudes regarding social media in emergencies and the need to account for heterogeneity in user expectations to build trustworthy information ecosystems in social media.},
journal = {International Journal of Disaster Risk Reduction (IJDRR)},
author = {Reuter, Christian and Kaufhold, Marc-André and Biselli, Tom and Pleil, Helene},
year = {2023},
keywords = {Crisis, Projekt-emergenCITY, Projekt-NEBULA, A-Paper, Ranking-ImpactFactor, SocialMedia, Student, Projekt-CYLENCE, AuswahlCrisis},
}
[BibTeX] [Abstract] [Download PDF]
The use of Open Source Intelligence (OSINT) to monitor and detect cybersecurity threats is gaining popularity among Cybersecurity Emergency or Incident Response Teams (CERTs/CSIRTs). They increasingly use semi-automated OSINT approaches when monitoring cyber threats for public infrastructure services and incident response. Most of the systems use publicly available data, often focusing on social media due to timely data for situational assessment. As indirect and affected stakeholders, the acceptance of OSINT systems by users, as well as the conditions which influence the acceptance, are relevant for the development of OSINT systems for cybersecurity. Therefore, as part of the ethical and social technology assessment, we conducted a survey (N=1,093), in which we asked participants about their acceptance of OSINT systems, their perceived need for open source surveillance, as well as their privacy behavior and concerns. Further, we tested if the awareness of OSINT is an interactive factor that affects other factors. Our results indicate that cyber threat perception and the perceived need for OSINT are positively related to acceptance, while privacy concerns are negatively related. The awareness of OSINT, however, has only shown effects on people with higher privacy concerns. Here, particularly high OSINT awareness and limited privacy concerns were associated with higher OSINT acceptance. Lastly, we provide implications for further research and the use of OSINT systems for cybersecurity by authorities. As OSINT is a framework rather than a single technology, approaches can be selected and combined to adhere to data minimization and anonymization as well as to leverage improvements in privacy-preserving computation and machine learning innovations. Regarding the use of OSINT, the results suggest to favor approaches that provide transparency to users regarding the use of the systems and the data they gather.
@article{riebePrivacyConcernsAcceptance2023,
title = {Privacy {Concerns} and {Acceptance} {Factors} of {OSINT} for {Cybersecurity}: {A} {Representative} {Survey}},
url = {https://petsymposium.org/popets/2023/popets-2023-0028.pdf},
doi = {10.56553/popets-2023-0028},
abstract = {The use of Open Source Intelligence (OSINT) to monitor and detect cybersecurity threats is gaining popularity among Cybersecurity Emergency or Incident Response Teams (CERTs/CSIRTs). They increasingly use semi-automated OSINT approaches when monitoring cyber threats for public infrastructure services and incident response. Most of the systems use publicly available data, often focusing on social media due to timely data for situational assessment. As indirect and affected stakeholders, the acceptance of OSINT systems by users, as well as the conditions which influence the acceptance, are relevant for the development of OSINT systems for cybersecurity. Therefore, as part of the ethical and social technology assessment, we conducted a survey (N=1,093), in which we asked participants about their acceptance of OSINT systems, their perceived need for open source surveillance, as well as their privacy behavior and concerns. Further, we tested if the awareness of OSINT is an interactive factor that affects other factors. Our results indicate that cyber threat perception and the perceived need for OSINT are positively related to acceptance, while privacy concerns are negatively related. The awareness of OSINT, however, has only shown effects on people with higher privacy concerns. Here, particularly high OSINT awareness and limited privacy concerns were associated with higher OSINT acceptance. Lastly, we provide implications for further research and the use of OSINT systems for cybersecurity by authorities. As OSINT is a framework rather than a single technology, approaches can be selected and combined to adhere to data minimization and anonymization as well as to leverage improvements in privacy-preserving computation and machine learning innovations. Regarding the use of OSINT, the results suggest to favor approaches that provide transparency to users regarding the use of the systems and the data they gather.},
number = {1},
journal = {Proceedings on Privacy Enhancing Technologies (PoPETs)},
author = {Riebe, Thea and Biselli, Tom and Kaufhold, Marc-André and Reuter, Christian},
year = {2023},
keywords = {HCI, A-Paper, Ranking-CORE-A, Security, UsableSec, Projekt-CYWARN, Projekt-ATHENE-FANCY, AuswahlUsableSec},
pages = {477--493},
}
[BibTeX] [Abstract] [Download PDF]
The negotiation of stakeholder values as a collaborative process throughout technology development has been studied extensively within the fields of Computer Supported Cooperative Work and Human-Computer Interaction. Despite their increasing significance for cybersecurity incident response, there is a gap in research on values of importance to the design of open-source intelligence (OSINT) technologies for this purpose. In this paper, we investigate which values and value conflicts emerge due to the application and development of machine learning (ML) based OSINT technologies to assist cyber security incident response operators. For this purpose, we employ a triangulation of methods, consisting of a systematic survey of the technical literature on the development of OSINT artefacts for cybersecurity (N = 73) and an empirical value sensitive design case study, comprising semi-structured interviews with stakeholders (N = 9) as well as a focus group (N = 7) with developers. Based on our results, we identify implications relevant to the research on and design of OSINT artefacts for cybersecurity incident response.
@article{riebeValuesValueConflicts2023,
title = {Values and {Value} {Conflicts} in the {Context} of {OSINT} {Technologies} for {Cybersecurity} {Incident} {Response}: {A} {Value} {Sensitive} {Design} {Perspective}},
url = {https://link.springer.com/article/10.1007/s10606-022-09453-4},
doi = {10.1007/s10606-022-09453-4},
abstract = {The negotiation of stakeholder values as a collaborative process throughout technology development has been studied extensively within the fields of Computer Supported Cooperative Work and Human-Computer Interaction. Despite their increasing significance for cybersecurity incident response, there is a gap in research on values of importance to the design of open-source intelligence (OSINT) technologies for this purpose. In this paper, we investigate which values and value conflicts emerge due to the application and development of machine learning (ML) based OSINT technologies to assist cyber security incident response operators. For this purpose, we employ a triangulation of methods, consisting of a systematic survey of the technical literature on the development of OSINT artefacts for cybersecurity (N = 73) and an empirical value sensitive design case study, comprising semi-structured interviews with stakeholders (N = 9) as well as a focus group (N = 7) with developers. Based on our results, we identify implications relevant to the research on and design of OSINT artefacts for cybersecurity incident response.},
journal = {Computer Supported Cooperative Work: The Journal of Collaborative Computing (JCSCW)},
author = {Riebe, Thea and Bäumler, Julian and Kaufhold, Marc-André and Reuter, Christian},
year = {2023},
keywords = {HCI, A-Paper, Ranking-ImpactFactor, Student, Security, UsableSec, Projekt-CROSSING, Projekt-ATHENE-SecUrban, Projekt-CYWARN, Ranking-CORE-B},
}
[BibTeX] [Abstract] [Download PDF]
Modern smartphones support FIDO2 passwordless authentication using either external security keys or internal biometric authentication, but it is unclear whether users appreciate and accept these new forms of web authentication for their own accounts. We present the first lab study (N=87) comparing platform and roaming authentication on smartphones, determining the practical strengths and weaknesses of FIDO2 as perceived by users in a mobile scenario. Most participants were willing to adopt passwordless authentication during our in-person user study, but closer analysis shows that participants prioritize usability, security, and availability differently depending on the account type. We identify remaining adoption barriers that prevent FIDO2 from succeeding password authentication, such as missing support for contemporary usage patterns, including account delegation and usage on multiple clients.
@inproceedings{wurschingFIDO2RescuePlatform2023,
address = {New York, NY, USA},
series = {{CHI} '23},
title = {{FIDO2} the {Rescue}? {Platform} vs. {Roaming} {Authentication} on {Smartphones}},
url = {https://peasec.de/paper/2023/2023_WuerschingPutzHaeslerHollick_PlatformvsRoamingAuthenticationonSmartphones_CHI.pdf},
doi = {10.1145/3544548.3580993},
abstract = {Modern smartphones support FIDO2 passwordless authentication using either external security keys or internal biometric authentication, but it is unclear whether users appreciate and accept these new forms of web authentication for their own accounts. We present the first lab study (N=87) comparing platform and roaming authentication on smartphones, determining the practical strengths and weaknesses of FIDO2 as perceived by users in a mobile scenario. Most participants were willing to adopt passwordless authentication during our in-person user study, but closer analysis shows that participants prioritize usability, security, and availability differently depending on the account type. We identify remaining adoption barriers that prevent FIDO2 from succeeding password authentication, such as missing support for contemporary usage patterns, including account delegation and usage on multiple clients.},
booktitle = {Proceedings of the {Conference} on {Human} {Factors} in {Computing} {Systems} ({CHI}) ({Best} {Paper} {Award})},
publisher = {Association for Computing Machinery},
author = {Würsching, Leon and Putz, Florentin and Haesler, Steffen and Hollick, Matthias},
year = {2023},
keywords = {HCI, Projekt-emergenCITY, A-Paper, Security, UsableSec, AuswahlUsableSec, Ranking-CORE-A*},
}
2022
[BibTeX] [Abstract] [Download PDF]
In many cases of machine learning, research suggests that the development of training data might have a higher relevance than the choice and modelling of classifiers themselves. Thus, data augmentation methods have been developed to improve classifiers by artificially created training data. In NLP, there is the challenge of establishing universal rules for text transformations which provide new linguistic patterns. In this paper, we present and evaluate a text generation method suitable to increase the performance of classifiers for long and short texts. We achieved promising improvements when evaluating short as well as long text tasks with the enhancement by our text generation method. Especially with regard to small data analytics, additive accuracy gains of up to 15.53\% and 3.56\% are achieved within a constructed low data regime, compared to the no augmentation baseline and another data augmentation technique. As the current track of these constructed regimes is not universally applicable, we also show major improvements in several real world low data tasks (up to +4.84 F1-score). Since we are evaluating the method from many perspectives (in total 11 datasets), we also observe situations where the method might not be suitable. We discuss implications and patterns for the successful application of our approach on different types of datasets.
@article{bayer_data_2022,
title = {Data {Augmentation} in {Natural} {Language} {Processing}: {A} {Novel} {Text} {Generation} {Approach} for {Long} and {Short} {Text} {Classifiers}},
url = {https://link.springer.com/article/10.1007/s13042-022-01553-3},
doi = {10.1007/s13042-022-01553-3},
abstract = {In many cases of machine learning, research suggests that the development of training data might have a higher relevance than the choice and modelling of classifiers themselves. Thus, data augmentation methods have been developed to improve classifiers by artificially created training data. In NLP, there is the challenge of establishing universal rules for text transformations which provide new linguistic patterns. In this paper, we present and evaluate a text generation method suitable to increase the performance of classifiers for long and short texts. We achieved promising improvements when evaluating short as well as long text tasks with the enhancement by our text generation method. Especially with regard to small data analytics, additive accuracy gains of up to 15.53\% and 3.56\% are achieved within a constructed low data regime, compared to the no augmentation baseline and another data augmentation technique. As the current track of these constructed regimes is not universally applicable, we also show major improvements in several real world low data tasks (up to +4.84 F1-score). Since we are evaluating the method from many perspectives (in total 11 datasets), we also observe situations where the method might not be suitable. We discuss implications and patterns for the successful application of our approach on different types of datasets.},
journal = {International Journal of Machine Learning and Cybernetics (IJMLC)},
author = {Bayer, Markus and Kaufhold, Marc-André and Buchhold, Björn and Keller, Marcel and Dallmeyer, Jörg and Reuter, Christian},
year = {2022},
keywords = {Projekt-emergenCITY, A-Paper, Ranking-ImpactFactor, Student, Security, Projekt-CYWARN, HabilitationKaufhold},
}
[BibTeX] [Abstract] [Download PDF]
Concise instruments to determine privacy personas – typical privacy-related user groups – are not available at present. Consequently, we aimed to identify them on a privacy knowledge–privacy behavior ratio based on a self-developed instrument. To achieve this, we conducted an item analysis (N = 820) and a confirmatory factor analysis (CFA) (N = 656) of data based on an online study with German participants. Starting with 81 items, we reduced those to an eleven-item questionnaire with the two scales privacy knowledge and privacy behavior. A subsequent cluster analysis (N = 656) revealed three distinct user groups: (1) Fundamentalists scoring high in privacy knowledge and behavior, (2) Pragmatists scoring average in privacy knowledge and behavior and (3) Unconcerned scoring low in privacy knowledge and behavior. In a closer inspection of the questionnaire, the CFAs supported the model with a close global fit based on RMSEA in a training and to a lesser extent in a cross-validation sample. Deficient local fit as well as validity and reliability coefficients well below generally accepted thresholds, however, revealed that the questionnaire in its current form cannot be considered a suitable measurement instrument for determining privacy personas. The results are discussed in terms of related persona conceptualizations, the importance of a methodologically sound investigation of corresponding privacy dimensions and our lessons learned.
@article{biselliChallengesDevelopingConcise2022,
title = {On the {Challenges} of {Developing} a {Concise} {Questionnaire} to {Identify} {Privacy} {Personas}},
url = {https://petsymposium.org/2022/files/papers/issue4/popets-2022-0126.pdf},
doi = {10.56553/popets-2022-0126},
abstract = {Concise instruments to determine privacy personas – typical privacy-related user groups – are not available at present. Consequently, we aimed to identify them on a privacy knowledge–privacy behavior ratio based on a self-developed instrument. To achieve this, we conducted an item analysis (N = 820) and a confirmatory factor analysis (CFA) (N = 656) of data based on an online study with German participants. Starting with 81 items, we reduced those to an eleven-item questionnaire with the two scales privacy knowledge and privacy behavior. A subsequent cluster analysis (N = 656) revealed three distinct user groups: (1) Fundamentalists scoring high in privacy knowledge and behavior, (2) Pragmatists scoring average in privacy knowledge and behavior and (3) Unconcerned scoring low in privacy knowledge and behavior. In a closer inspection of the questionnaire, the CFAs supported the model with a close global fit based on RMSEA in a training and to a lesser extent in a cross-validation sample. Deficient local fit as well as validity and reliability coefficients well below generally accepted thresholds, however, revealed that the questionnaire in its current form cannot be considered a suitable measurement instrument for determining privacy personas. The results are discussed in terms of related persona conceptualizations, the importance of a methodologically sound investigation of corresponding privacy dimensions and our lessons learned.},
number = {4},
journal = {Proceedings on Privacy Enhancing Technologies (PoPETs)},
author = {Biselli, Tom and Steinbrink, Enno and Herbert, Franziska and Schmidbauer-Wolf, Gina Maria and Reuter, Christian},
year = {2022},
keywords = {HCI, A-Paper, Ranking-CORE-A, Security, UsableSec, Projekt-GRKPrivacy, Projekt-CROSSING, Projekt-ATHENE-FANCY, AuswahlUsableSec},
pages = {645--669},
}
[BibTeX] [Abstract] [Download PDF]
The backbone network of submarine communication cables (SCC) carries 98\% of international internet traffic. Coastal and island states strongly depend on this physical internet infrastructure to provide internet connectivity. Although about 100 SCC breakdowns of human or natural origin occur at yearly average, a literature review reveals that there is no approach to assess individual state vulnerability to SCC failure in global comparison. In this article, the global SCC network is modeled based on publicly available data. Besides the analysis of the global network properties, a focus is put on remaining bandwidth capacities in three different failure scenario simulations of SCC breakdowns. As a result, this study identifies 15 highly vulnerable states and overseas territories, and another 28 territories that are classified as partially vulnerable to SCC failures. Since economic market decisions shape the structure of the SCC network, an uneven distribution of redundancies and the resulting vulnerability of disadvantaged economies can be confirmed. Therefore, the study’s findings may contribute to a better assessment of the necessity of preventive protection measures of critical telecommunication infrastructures in states and territories characterized by high and medium vulnerability.
@article{frankenDigitalDivideState2022,
title = {The {Digital} {Divide} in {State} {Vulnerability} to {Submarine} {Communications} {Cable} {Failure}},
volume = {38},
url = {https://peasec.de/paper/2022/2022_FrankenReinholdReichertReuter_DigitalDivideStateVulnerabilitySubmarineCommunicationsCable_IJCIP.pdf},
doi = {10.1016/j.ijcip.2022.100522},
abstract = {The backbone network of submarine communication cables (SCC) carries 98\% of international internet traffic. Coastal and island states strongly depend on this physical internet infrastructure to provide internet connectivity. Although about 100 SCC breakdowns of human or natural origin occur at yearly average, a literature review reveals that there is no approach to assess individual state vulnerability to SCC failure in global comparison. In this article, the global SCC network is modeled based on publicly available data. Besides the analysis of the global network properties, a focus is put on remaining bandwidth capacities in three different failure scenario simulations of SCC breakdowns. As a result, this study identifies 15 highly vulnerable states and overseas territories, and another 28 territories that are classified as partially vulnerable to SCC failures. Since economic market decisions shape the structure of the SCC network, an uneven distribution of redundancies and the resulting vulnerability of disadvantaged economies can be confirmed. Therefore, the study's findings may contribute to a better assessment of the necessity of preventive protection measures of critical telecommunication infrastructures in states and territories characterized by high and medium vulnerability.},
number = {100522},
journal = {International Journal of Critical Infrastructure Protection (IJCIP)},
author = {Franken, Jonas and Reinhold, Thomas and Reichert, Lilian and Reuter, Christian},
year = {2022},
keywords = {A-Paper, Ranking-ImpactFactor, AuswahlPeace, Student, Security, Projekt-AgriRegio, Projekt-ATHENE-SecUrban, Selected},
pages = {1--15},
}
[BibTeX] [Abstract] [Download PDF]
Nudging users to keep them secure online has become a growing research field in cybersecurity. While existing approaches are mainly blackbox based, showing aggregated visualisations as one-size-fits-all nudges, personalisation turned out promising to enhance the efficacy of nudges within the high variance of users and contexts. This article presents a disaggregated whitebox-based visualisation of critical information as a novel nudge. By segmenting users according to their decision-making and information processing styles, we investigate if the novel nudge is more effective for specific users than a common black-box nudge. Based on existing literature about critical factors in password security, we designed a dynamic radar chart and parallel coordinates as disaggregated visualisations. We evaluated the short-term effectiveness and users’ perception of the nudges in a think-aloud prestudy and a representative online evaluation (N=1.012). Our findings suggest that dynamic radar charts present a moderately effective nudge towards stronger passwords regarding short-term efficacy and are appreciated particularly by players of role-playing games.
@article{hartwigNudgingUsersBetter2022,
title = {Nudging {Users} {Towards} {Better} {Security} {Decisions} in {Password} {Creation} {Using} {Whitebox}-based {Multidimensional} {Visualizations}},
volume = {41},
url = {https://peasec.de/paper/2022/2022_HartwigReuter_WhiteboxMultidimensionalNudges_BIT.pdf},
doi = {10.1080/0144929X.2021.1876167},
abstract = {Nudging users to keep them secure online has become a growing research field in cybersecurity. While existing approaches are mainly blackbox based, showing aggregated visualisations as one-size-fits-all nudges, personalisation turned out promising to enhance the efficacy of nudges within the high variance of users and contexts. This article presents a disaggregated whitebox-based visualisation of critical information as a novel nudge. By segmenting users according to their decision-making and information processing styles, we investigate if the novel nudge is more effective for specific users than a common black-box nudge. Based on existing literature about critical factors in password security, we designed a dynamic radar chart and parallel coordinates as disaggregated visualisations. We evaluated the short-term effectiveness and users' perception of the nudges in a think-aloud prestudy and a representative online evaluation (N=1.012). Our findings suggest that dynamic radar charts present a moderately effective nudge towards stronger passwords regarding short-term efficacy and are appreciated particularly by players of role-playing games.},
number = {7},
journal = {Behaviour \& Information Technology (BIT)},
author = {Hartwig, Katrin and Reuter, Christian},
year = {2022},
keywords = {HCI, A-Paper, Ranking-CORE-A, Ranking-ImpactFactor, Security, UsableSec, Projekt-CROSSING, Selected, Projekt-ATHENE-FANCY, AuswahlUsableSec},
pages = {1357--1380},
}
[BibTeX] [Abstract] [Download PDF]
Besides the merits of increasing digitization and networking, societies are increasling exposed to cyberattacks. In Germany, Computer Emerrgency Response Teams (CERTs) of the public sector operate on federal and state level to provide preventative and reactive information security services for authorities, citizens, and enterprises. Their tasks of monitoring, analyzing, and communicating threats is getting more complex by the increasing information quantity disseminated into relevant public channels. Using the lens of design science research, this paper contributes with the design and evaluation of a cross-platform cybersecurity dashboard for CERTs. Based on expert scenario-based walkthroughs in combination with semi-structured interviews (N=12), it discusses six design implications, including the customizability of data sources and filtering of displayed entities, modular integration of additional information sources, interrelation between different information feeds, intelligent algorithms for content assessment and filtering, integration with security software and systems, as well as export, sharing and communication of relevant data.
@inproceedings{kaufhold_cyber_2022,
address = {Timisoara, Romania},
title = {Cyber {Threat} {Observatory}: {Design} and {Evaluation} of an {Interactive} {Dashboard} for {Computer} {Emergency} {Response} {Teams}},
url = {http://www.peasec.de/paper/2022/2022_KaufholdBasyurtEyilmezStoettingerReuter_CyberThreatObservatory_ECIS.pdf},
abstract = {Besides the merits of increasing digitization and networking, societies are increasling exposed to cyberattacks. In Germany, Computer Emerrgency Response Teams (CERTs) of the public sector operate on federal and state level to provide preventative and reactive information security services for authorities, citizens, and enterprises. Their tasks of monitoring, analyzing, and communicating threats is getting more complex by the increasing information quantity disseminated into relevant public channels. Using the lens of design science research, this paper contributes with the design and evaluation of a cross-platform cybersecurity dashboard for CERTs. Based on expert scenario-based walkthroughs in combination with semi-structured interviews (N=12), it discusses six design implications, including the customizability of data sources and filtering of displayed entities, modular integration of additional information sources, interrelation between different information feeds, intelligent algorithms for content assessment and filtering, integration with security software and systems, as well as export, sharing and communication of relevant data.},
booktitle = {Proceedings of the {European} {Conference} on {Information} {Systems} ({ECIS})},
author = {Kaufhold, Marc-André and Basyurt, Ali Sercan and Eyilmez, Kaan and Stöttinger, Marc and Reuter, Christian},
year = {2022},
keywords = {HCI, A-Paper, Ranking-CORE-A, Security, UsableSec, Projekt-ATHENE-SecUrban, Projekt-CYWARN, HabilitationKaufhold},
}
[BibTeX] [Abstract] [Download PDF]
Agriculture is subject to high demands regarding resilience as it is an essential component of the food production chain. In the agricultural sector, there is an increasing usage of digital tools that rely on communication and energy infrastructures. Should disruption occur, such strengthened dependencies on other infrastructures increase the probability of ripple effects. Thus, there is a need to analyze the resilience of the agricultural sector with a specific focus on the effects of digitalization. This study works out resilience capacities of the interconnected technologies used in farm systems based on the experiences and opinions of farmers. Information was gathered through focus group interviews with farmers (N = 52) and a survey with participants from the agricultural sector (N = 118). In particular, the focus is put on the digital tools and other information and communication technologies they use. Based on a definition of resilience capacities, we evaluate resilience regarding energy and communication demands in various types of farm systems. Especially important are the resilience aspects of modern systems’ digital communication as well as the poorly developed and nonresilient network infrastructure in rural areas that contrast with the claim for a resilient agriculture. The result is a low robustness capacity, as our analysis concludes with the risk of food production losses.
@article{kuntkeResilienceAgricultureCommunication2022,
title = {Resilience in {Agriculture}: {Communication} and {Energy} {Infrastructure} {Dependencies} of {German} {Farmers}},
volume = {13},
issn = {2192-6395},
url = {https://link.springer.com/article/10.1007/s13753-022-00404-7},
doi = {10.1007/s13753-022-00404-7},
abstract = {Agriculture is subject to high demands regarding resilience as it is an essential component of the food production chain. In the agricultural sector, there is an increasing usage of digital tools that rely on communication and energy infrastructures. Should disruption occur, such strengthened dependencies on other infrastructures increase the probability of ripple effects. Thus, there is a need to analyze the resilience of the agricultural sector with a specific focus on the effects of digitalization. This study works out resilience capacities of the interconnected technologies used in farm systems based on the experiences and opinions of farmers. Information was gathered through focus group interviews with farmers (N = 52) and a survey with participants from the agricultural sector (N = 118). In particular, the focus is put on the digital tools and other information and communication technologies they use. Based on a definition of resilience capacities, we evaluate resilience regarding energy and communication demands in various types of farm systems. Especially important are the resilience aspects of modern systems’ digital communication as well as the poorly developed and nonresilient network infrastructure in rural areas that contrast with the claim for a resilient agriculture. The result is a low robustness capacity, as our analysis concludes with the risk of food production losses.},
number = {2},
journal = {International Journal of Disaster Risk Science (IJDRS)},
author = {Kuntke, Franz and Linsner, Sebastian and Steinbrink, Enno and Franken, Jonas and Reuter, Christian},
month = apr,
year = {2022},
keywords = {A-Paper, Ranking-ImpactFactor, Security, Projekt-GRKPrivacy, Projekt-AgriRegio, Projekt-GeoBox, RSF, Selected, Projekt-HyServ, Ranking-CORE-B},
pages = {214--229},
}
[BibTeX] [Abstract] [Download PDF]
The Internet of Things (IoT) is a major trend that is seen as a great opportunity to improve efficiency in many domains, including agriculture. This technology could transform the sector, improving the management and quality of agricultural operations, for example, crop farming. The most promising data transmission standard for this domain seems to be Long Range Wide Area Network (LoRaWAN), a popular representative of low power wide area network technologies today. LoRaWAN, like any wireless protocol, has properties that can be exploited by attackers, which has been a topic of multiple research papers in recent years. By conducting a systematic literature review, we build a recent list of attacks, as well as collect mitigation options. Taking a look at a concrete use case (IoT in agriculture) allows us to evaluate the practicality of both exploiting the vulnerabilities and implementing the countermeasures. We detected 16 attacks that we grouped into six attack types. Along with the attacks, we collect countermeasures for attack mitigation. Developers can use our findings to minimize the risks when developing applications based on LoRaWAN. These mostly theoretical security recommendations should encourage future works to evaluate the mitigations in practice.
@article{kuntkeLoRaWANSecurityIssues2022,
title = {{LoRaWAN} {Security} {Issues} and {Mitigation} {Options} by the {Example} of {Agricultural} {IoT} {Scenarios}},
volume = {33},
issn = {2161-3915},
url = {https://www.peasec.de/paper/2022/2022_KuntkeRomanenkoLinsnerSteinbrinkReuter_LoRaWANsecurityAgriculture_ETT.pdf},
doi = {10.1002/ett.4452},
abstract = {The Internet of Things (IoT) is a major trend that is seen as a great opportunity to improve efficiency in many domains, including agriculture. This technology could transform the sector, improving the management and quality of agricultural operations, for example, crop farming. The most promising data transmission standard for this domain seems to be Long Range Wide Area Network (LoRaWAN), a popular representative of low power wide area network technologies today. LoRaWAN, like any wireless protocol, has properties that can be exploited by attackers, which has been a topic of multiple research papers in recent years. By conducting a systematic literature review, we build a recent list of attacks, as well as collect mitigation options. Taking a look at a concrete use case (IoT in agriculture) allows us to evaluate the practicality of both exploiting the vulnerabilities and implementing the countermeasures. We detected 16 attacks that we grouped into six attack types. Along with the attacks, we collect countermeasures for attack mitigation. Developers can use our findings to minimize the risks when developing applications based on LoRaWAN. These mostly theoretical security recommendations should encourage future works to evaluate the mitigations in practice.},
number = {5},
journal = {Transactions on Emerging Telecommunications Technologies (ETT)},
author = {Kuntke, Franz and Romanenko, Vladimir and Linsner, Sebastian and Steinbrink, Enno and Reuter, Christian},
month = may,
year = {2022},
keywords = {A-Paper, Ranking-ImpactFactor, Student, Security, Projekt-GRKPrivacy, Projekt-AgriRegio, Projekt-GeoBox, RSF, Projekt-HyServ},
pages = {e4452},
}
[BibTeX] [Abstract] [Download PDF]
Business collaboration in the era of digital transformation requires the exchange of operational data. Since data are hardly controllable once they have been published or shared with others, it is highly important that users are clearly informed about who has access to which data and how certain settings can prevent the disclosure of sensitive data. However, giving end users more control over their data through increased transparency could also lead to information overload. This is particularly true in the field of agriculture, where tight schedules put pressure on employees of small enterprises. We conduct an empirical prestudy with 52 German farmers to investigate current data sharing scenarios. From these insights, we derive requirements and a concept for data sharing solutions providing data flow transparency for users. To investigate the behavior of users and the effects of transparent UI controls, we evaluate a prototype with 18 persons. Our evaluation shows that farmers demand flexible and secure tools that adjust to their workflows. Also, data should be stored and processed locally, granting farmers data sovereignty. Although the controls require additional effort, the evaluated transparent controls for data disclosure are easy to use and raise user awareness.
@article{linsnerSupportingUsersData2022,
title = {Supporting {Users} in {Data} {Disclosure} {Scenarios} in {Agriculture} through {Transparency}},
volume = {41},
url = {http://www.peasec.de/paper/2022/2022_LinsnerSteinbrinkKuntkeFrankenReuter_SupportingDataDisclosureScenariosAgriculture_BIT.pdf},
doi = {10.1080/0144929X.2022.2068070},
abstract = {Business collaboration in the era of digital transformation requires the exchange of operational data. Since data are hardly controllable once they have been published or shared with others, it is highly important that users are clearly informed about who has access to which data and how certain settings can prevent the disclosure of sensitive data. However, giving end users more control over their data through increased transparency could also lead to information overload. This is particularly true in the field of agriculture, where tight schedules put pressure on employees of small enterprises. We conduct an empirical prestudy with 52 German farmers to investigate current data sharing scenarios. From these insights, we derive requirements and a concept for data sharing solutions providing data flow transparency for users. To investigate the behavior of users and the effects of transparent UI controls, we evaluate a prototype with 18 persons. Our evaluation shows that farmers demand flexible and secure tools that adjust to their workflows. Also, data should be stored and processed locally, granting farmers data sovereignty. Although the controls require additional effort, the evaluated transparent controls for data disclosure are easy to use and raise user awareness.},
number = {10},
journal = {Behaviour \& Information Technology (BIT)},
author = {Linsner, Sebastian and Steinbrink, Enno and Kuntke, Franz and Franken, Jonas and Reuter, Christian},
year = {2022},
keywords = {A-Paper, Ranking-CORE-A, Ranking-ImpactFactor, Security, UsableSec, Projekt-GRKPrivacy, Projekt-AgriRegio, RSF, Projekt-HyServ},
pages = {2137--2159},
}
[BibTeX] [Abstract] [Download PDF]
Within CSCW and HCI, an increasing body of literature has been demonstrating the essential relevance of infrastructures and infrastructuring to the work of people engaging in technologically mediated nomadicity. Tech Nomads – or T-Nomads, as they are sometimes called – not only rely on technological, human, and environmental infrastructural components – such as Wi-Fi, technical support, space, and basic resources such as light and power outlets – but they also have to engage in infrastructuring to mobilise their workplaces and effectively accomplish work in and across different locations. In this article, we bring an infrastructuring perspective to understanding nomadic practices concerning the organisation of complex collaborative events. We introduce findings from a long-term investigation focusing on how infrastructures are re-instantiated with the help of digital technologies, according to emerging demands from T-Nomads. Our findings demonstrate the need for a ‘nonessentialist’ approach to nomadicity, one which recognises the character of nomadic work and its varied aspects in different contexts. We extend the infrastructuring literature by demonstrating how infrastructuring work is done in a complex collaborative initiative, as the organisation of the annual European Social Forum.
@article{pinattidecarvalhoUnderstandingNomadicPractices2022,
title = {Understanding {Nomadic} {Practices} of {Social} {Activist} {Networks} through the {Lens} of {Infrastructuring}: {The} {Case} of the {European} {Social} {Forum}},
url = {https://link.springer.com/article/10.1007/s10606-022-09442-7},
doi = {10.1007/s10606-022-09442-7},
abstract = {Within CSCW and HCI, an increasing body of literature has been demonstrating the essential relevance of infrastructures and infrastructuring to the work of people engaging in technologically mediated nomadicity. Tech Nomads – or T-Nomads, as they are sometimes called – not only rely on technological, human, and environmental infrastructural components – such as Wi-Fi, technical support, space, and basic resources such as light and power outlets – but they also have to engage in infrastructuring to mobilise their workplaces and effectively accomplish work in and across different locations. In this article, we bring an infrastructuring perspective to understanding nomadic practices concerning the organisation of complex collaborative events. We introduce findings from a long-term investigation focusing on how infrastructures are re-instantiated with the help of digital technologies, according to emerging demands from T-Nomads. Our findings demonstrate the need for a ‘nonessentialist’ approach to nomadicity, one which recognises the character of nomadic work and its varied aspects in different contexts. We extend the infrastructuring literature by demonstrating how infrastructuring work is done in a complex collaborative initiative, as the organisation of the annual European Social Forum.},
journal = {Computer Supported Cooperative Work: The Journal of Collaborative Computing (JCSCW)},
author = {Pinatti De Carvalho, Aparecido Fabiano and Saeed, Saqib and Reuter, Christian and Rohde, Markus and Randall, Dave and Pipek, Volkmar and Wulf, Volker},
year = {2022},
keywords = {Crisis, HCI, A-Paper, Ranking-ImpactFactor},
}
[BibTeX] [Abstract] [Download PDF]
The revelation of the Stuxnet malware in 2010 shed light on the presence of state actors that are willing and capable of developing and using highly sophisticated, specialized malicious software for their political interests. These tools -often dubbed cyber weapons -are expected to become the next major advancement in weaponry technology. Besides the threats of offensive cyber operations for civil IT systems due to the interconnected nature of the cyberspace, international regulation of cyber weapons is -among other aspects -hindered by the fact that the military development and the strategic and tactical deployment of cyber weapons differ significantly from other weapons technologies. In order to establish measures of cyber arms related control treaties, it is crucial to identify these particular characteristics. Based on this premise, the article analyzes the current perspectives on cyber weapons, identifying their weaknesses of being either based on assumptions about adversarial actors or being applicable only after the usage of a malicious tool. In contrast to these approaches, the article focuses on the specific functional aspects of malware and presents an indicator-based assessment model based on parameters that can be measured prior to the application of malicious software. This enables the categorization of malicious tools as cyber weapons. Besides this, the article aims to introduce thought-provoking impulses with regard to social responsibility in computer science.
@article{reinholdCyberWeaponsAssessment2022,
title = {Towards a {Cyber} {Weapons} {Assessment} {Model} – {Assessment} of the {Technical} {Features} of {Malicious} {Software}},
volume = {3},
issn = {2637-6415},
url = {https://peasec.de/paper/2021/2021_ReinholdReuter_CyberWeapons_IEEETransactionsTechnologySociety.pdf},
doi = {10.1109/TTS.2021.3131817},
abstract = {The revelation of the Stuxnet malware in 2010 shed light on the presence of state actors that are willing and capable of developing and using highly sophisticated, specialized malicious software for their political interests. These tools -often dubbed cyber weapons -are expected to become the next major advancement in weaponry technology. Besides the threats of offensive cyber operations for civil IT systems due to the interconnected nature of the cyberspace, international regulation of cyber weapons is -among other aspects -hindered by the fact that the military development and the strategic and tactical deployment of cyber weapons differ significantly from other weapons technologies. In order to establish measures of cyber arms related control treaties, it is crucial to identify these particular characteristics. Based on this premise, the article analyzes the current perspectives on cyber weapons, identifying their weaknesses of being either based on assumptions about adversarial actors or being applicable only after the usage of a malicious tool. In contrast to these approaches, the article focuses on the specific functional aspects of malware and presents an indicator-based assessment model based on parameters that can be measured prior to the application of malicious software. This enables the categorization of malicious tools as cyber weapons. Besides this, the article aims to introduce thought-provoking impulses with regard to social responsibility in computer science.},
language = {en},
number = {3},
journal = {IEEE Transactions on Technology and Society},
author = {Reinhold, Thomas and Reuter, Christian},
month = sep,
year = {2022},
keywords = {Peace, A-Paper, Ranking-ImpactFactor, AuswahlPeace, Projekt-ATHENE-SecUrban, Cyberwar},
pages = {226--239},
}
[BibTeX] [Download PDF]
@book{reuterSpecialIssueUsable2022,
title = {Special {Issue} on {Usable} {Security} and {Privacy} with {User}-{Centered} {Interventions} and {Transparency} {Mechanisms} - {Behaviour} \& {Information} {Technology} ({BIT})},
url = {https://www.tandfonline.com/toc/tbit20/41/10?nav=tocList},
publisher = {Taylor \& Francis},
author = {Reuter, Christian and Lo Iacono, Luigi and Benlian, Alexander},
year = {2022},
note = {Publication Title: Behaviour \& Information Technology (BIT)},
keywords = {Crisis, HCI, Peace, A-Paper, Ranking-CORE-A, Ranking-ImpactFactor, SocialMedia, UsableSec, Projekt-ATHENE, Projekt-CROSSING},
}
[BibTeX] [Abstract] [Download PDF]
In the last decades, research has shown that both technical solutions and user perceptions are important to improve security and privacy in the digital realm. The field of ‘usable security’ already started to emerge in the mid-90s, primarily focussed on password and email security. Later on, the research field of ”usable security and privacy” evolved and broadened the aim to design concepts and tools to assist users in enhancing their behaviour with regard to both privacy and security. Nevertheless, many user interventions are not as effective as desired. Because of highly diverse usage contexts, leading to different privacy and security requirements and not always to one-size-fits-all approaches, tailorability is necessary to address this issue. Furthermore, transparency is a crucial requirement, as providing comprehensible information may counter reactance towards security interventions. This article first provides a brief history of the research field in its first quarter-century and then highlights research on the transparency and tailorability of user interventions. Based on this, this article then presents six contributions with regard to (1) privacy concerns in times of COVID-19, (2) authentication on mobile devices, (3) GDPR-compliant data management, (4) privacy notices on websites, (5) data disclosure scenarios in agriculture, as well as (6) rights under data protection law and the concrete process should data subjects want to claim those rights. This article concludes with several research directions on user-centred transparency and tailorability.
@article{reuterQuarterCenturyUsable2022,
title = {A {Quarter} {Century} of {Usable} {Security} and {Privacy} {Research}: {Transparency}, {Tailorability}, and the {Road} {Ahead}},
volume = {41},
issn = {0144-929X},
url = {https://www.peasec.de/paper/2022/2022_ReuterLoIaconoBenlian_QuarterCenturyUsableSecurityandPrivacyResearch_BIT.pdf},
doi = {10.1080/0144929X.2022.2080908},
abstract = {In the last decades, research has shown that both technical solutions and user perceptions are important to improve security and privacy in the digital realm. The field of ‘usable security’ already started to emerge in the mid-90s, primarily focussed on password and email security. Later on, the research field of ”usable security and privacy” evolved and broadened the aim to design concepts and tools to assist users in enhancing their behaviour with regard to both privacy and security. Nevertheless, many user interventions are not as effective as desired. Because of highly diverse usage contexts, leading to different privacy and security requirements and not always to one-size-fits-all approaches, tailorability is necessary to address this issue. Furthermore, transparency is a crucial requirement, as providing comprehensible information may counter reactance towards security interventions. This article first provides a brief history of the research field in its first quarter-century and then highlights research on the transparency and tailorability of user interventions. Based on this, this article then presents six contributions with regard to (1) privacy concerns in times of COVID-19, (2) authentication on mobile devices, (3) GDPR-compliant data management, (4) privacy notices on websites, (5) data disclosure scenarios in agriculture, as well as (6) rights under data protection law and the concrete process should data subjects want to claim those rights. This article concludes with several research directions on user-centred transparency and tailorability.},
number = {10},
journal = {Behaviour \& Information Technology (BIT)},
author = {Reuter, Christian and Lo Iacono, Luigi and Benlian, Alexander},
year = {2022},
keywords = {Crisis, HCI, A-Paper, Ranking-CORE-A, Ranking-ImpactFactor, SocialMedia, Security, UsableSec, Projekt-CROSSING, Projekt-ATHENE-SecUrban},
pages = {2035--2048},
}
[BibTeX] [Abstract] [Download PDF]
Artificial Intelligence (AI) seems to be impacting all industry sectors, while becoming a motor for innovation. The diffusion of AI from the civilian sector to the defense sector, and AI’s dual-use potential has drawn attention from security and ethics scholars. With the publication of the ethical guideline Trustworthy AI by the European Union (EU), normative questions on the application of AI have been further evaluated. In order to draw conclusions on Trustworthy AI as a point of reference for responsible research and development (R&D), we approach the diffusion of AI across both civilian and military spheres in the EU. We capture the extent of technological diffusion and derive European and German patent citation networks. Both networks indicate a low degree of diffusion of AI between civilian and defense sectors. A qualitative investigation of project descriptions of a research institute’s work in both civilian and military fields shows that military AI applications stress accuracy or robustness, while civilian AI reflects a focus on human-centric values. Our work represents a first approach by linking processes of technology diffusion with normative evaluations of R&D.
@article{schmidDualUseTrustworthyMixed2022,
title = {Dual-{Use} and {Trustworthy}? {A} {Mixed} {Methods} {Analysis} of {AI} {Diffusion} between {Civilian} and {Defense} {R}\&{D}},
volume = {28},
url = {https://peasec.de/paper/2022/2022_SchmidRiebeReuter_DualUseandTrustworthy_ScienceEngineeringEthics.pdf},
doi = {10.1007/s11948-022-00364-7},
abstract = {Artificial Intelligence (AI) seems to be impacting all industry sectors, while becoming a motor for innovation. The diffusion of AI from the civilian sector to the defense sector, and AI’s dual-use potential has drawn attention from security and ethics scholars. With the publication of the ethical guideline Trustworthy AI by the European Union (EU), normative questions on the application of AI have been further evaluated. In order to draw conclusions on Trustworthy AI as a point of reference for responsible research and development (R\&D), we approach the diffusion of AI across both civilian and military spheres in the EU. We capture the extent of technological diffusion and derive European and German patent citation networks. Both networks indicate a low degree of diffusion of AI between civilian and defense sectors. A qualitative investigation of project descriptions of a research institute’s work in both civilian and military fields shows that military AI applications stress accuracy or robustness, while civilian AI reflects a focus on human-centric values. Our work represents a first approach by linking processes of technology diffusion with normative evaluations of R\&D.},
number = {12},
journal = {Science and Engineering Ethics},
author = {Schmid, Stefka and Riebe, Thea and Reuter, Christian},
year = {2022},
keywords = {Peace, A-Paper, Ranking-ImpactFactor, AuswahlPeace, Projekt-CYWARN, Projekt-KontiKat},
pages = {1--23},
}
[BibTeX] [Abstract] [Download PDF]
In the digital age, the vision of autonomous vehicles (AVs) is vibrant. Research is being conducted worldwide to inte-grate AVs into our everyday lives in the future, spending consid-erable amounts of money in the development process. Actors from both engineering as well as social sciences are involved in this re-search, with technical disciplines strongly dominating. In addition to perceived progress of numerous newly developed technologies such as AVs, challenges should also be referred to. According to research analysis, the transferability of autonomous cars to the military sphere seems to be frequently forgotten or ignored (dual-use). Since not much research has been conducted in Germany on the potential deployment of autonomous driving development steps into military domains, 25 semi-structured interviews with de-velopers and researchers and actors involved in the field, were conducted in 2020. The paper identifies that the majority of re-spondents interviewed were aware of general existing dual-use de-bates, however, few had reflected about dual-use issues regarding a possible transfer of their own development processes in the con-text of autonomous driving to military applications, intensively. One reason is the small-scale nature of research, another is the complexity of the field, which enables the engineer’s alienation from their responsibility for the artefacts’ use. Moreover, it has become clear that hardly any conversations among colleagues oc-cur about possible misuse and that no standardized policy guide-lines exist, which provide information about possible risk. To raise dual-use awareness, scientific contributions, risk education, and interdisciplinary discussions are essential.
@article{schwartzVisionThreatAwareness2022,
title = {Vision or {Threat} – {Awareness} for {Dual}-{Use} in the {Development} of {Autonomous} {Driving}},
volume = {3},
issn = {2637-6415},
url = {https://www.peasec.de/paper/2022/2022_SchwartzGuntrumReuter_VisionorThreatAwarenessDualUseAutonomousDriving_IEEE-TTS.pdf},
doi = {10.1109/TTS.2022.3182310},
abstract = {In the digital age, the vision of autonomous vehicles (AVs) is vibrant. Research is being conducted worldwide to inte-grate AVs into our everyday lives in the future, spending consid-erable amounts of money in the development process. Actors from both engineering as well as social sciences are involved in this re-search, with technical disciplines strongly dominating. In addition to perceived progress of numerous newly developed technologies such as AVs, challenges should also be referred to. According to research analysis, the transferability of autonomous cars to the military sphere seems to be frequently forgotten or ignored (dual-use). Since not much research has been conducted in Germany on the potential deployment of autonomous driving development steps into military domains, 25 semi-structured interviews with de-velopers and researchers and actors involved in the field, were conducted in 2020. The paper identifies that the majority of re-spondents interviewed were aware of general existing dual-use de-bates, however, few had reflected about dual-use issues regarding a possible transfer of their own development processes in the con-text of autonomous driving to military applications, intensively. One reason is the small-scale nature of research, another is the complexity of the field, which enables the engineer’s alienation from their responsibility for the artefacts’ use. Moreover, it has become clear that hardly any conversations among colleagues oc-cur about possible misuse and that no standardized policy guide-lines exist, which provide information about possible risk. To raise dual-use awareness, scientific contributions, risk education, and interdisciplinary discussions are essential.},
language = {en},
number = {3},
journal = {IEEE Transactions on Technology and Society},
author = {Schwartz, Sebastian and Guntrum, Laura and Reuter, Christian},
year = {2022},
keywords = {Peace, Projekt-TraCe, A-Paper, Ranking-ImpactFactor, AuswahlPeace, Selected, Projekt-ATHENE-FANCY},
pages = {163--174},
}
2021
[BibTeX] [Abstract] [Download PDF]
Past studies in the domains of information systems have analysed the potentials and barriers of social media in emergencies. While information disseminated in social media can lead to valuable insights, emergency services and researchers face the challenge of information overload as data quickly exceeds the manageable amount. We propose an embedding-based clustering approach and a method for the automated labelling of clusters. Given that the clustering quality is highly dependent on embeddings, we evaluate 19 embedding models with respect to time, internal cluster quality, and language invariance. The results show that it may be sensible to use embedding models that were already trained on other crisis datasets. However, one must ensure that the training data generalizes enough, so that the clustering can adapt to new situations. Confirming this, we found out that some embeddings were not able to perform as well on a German dataset as on an English dataset.
@inproceedings{bayerInformationOverloadCrisis2021,
title = {Information {Overload} in {Crisis} {Management}: {Bilingual} {Evaluation} of {Embedding} {Models} for {Clustering} {Social} {Media} {Posts} in {Emergencies}},
url = {https://peasec.de/paper/2021/2021_BayerKaufholdReuter_InformationOverloadInCrisisManagementBilingualEvaluation_ECIS.pdf},
abstract = {Past studies in the domains of information systems have analysed the potentials and barriers of social media in emergencies. While information disseminated in social media can lead to valuable insights, emergency services and researchers face the challenge of information overload as data quickly exceeds the manageable amount. We propose an embedding-based clustering approach and a method for the automated labelling of clusters. Given that the clustering quality is highly dependent on embeddings, we evaluate 19 embedding models with respect to time, internal cluster quality, and language invariance. The results show that it may be sensible to use embedding models that were already trained on other crisis datasets. However, one must ensure that the training data generalizes enough, so that the clustering can adapt to new situations. Confirming this, we found out that some embeddings were not able to perform as well on a German dataset as on an English dataset.},
booktitle = {Proceedings of the {European} {Conference} on {Information} {Systems} ({ECIS})},
author = {Bayer, Markus and Kaufhold, Marc-André and Reuter, Christian},
year = {2021},
keywords = {Crisis, Projekt-emergenCITY, A-Paper, Ranking-CORE-A, SocialMedia, Projekt-ATHENE-SecUrban, Projekt-CYWARN},
pages = {1--18},
}
[BibTeX] [Abstract] [Download PDF]
During crises such as the COVID-19 pandemic, people spontaneously initiate support groups, while establishedorganizations like soccer clubs set non-regular goals, both offering help. Interested in the coordination of suchhelp and potential challenges of collaboration, we conducted a virtual ethnography of a multi-level networklocated in Germany. We focused on aims, activities, and technological mediation, with Activity Theory astheoretical framework. Our findings show that the organizational aim of coordinating help was successfullyachieved by connecting heterogeneous actors through digitization and institutionalization. Enabled by thecontext of the COVID-19 pandemic crisis, the network acted virtually, but was also able to integrate analogspaces of help. We identified six crucial implications regarding the use of technology and collaboration forbuilding a successful volunteering network.
@article{haeslerStrongerTogetherHow2021,
title = {Stronger {Together}: {How} {Neighborhood} {Groups} {Build} up a {Virtual} {Network} during the {COVID}-19 {Pandemic}},
volume = {5},
url = {https://peasec.de/paper/2021/2021_HaeslerSchmidVierneiselReuter_StrongerTogetherVirtualNetworkCOVID19_CSCW.pdf},
doi = {10.1145/3476045},
abstract = {During crises such as the COVID-19 pandemic, people spontaneously initiate support groups, while establishedorganizations like soccer clubs set non-regular goals, both offering help. Interested in the coordination of suchhelp and potential challenges of collaboration, we conducted a virtual ethnography of a multi-level networklocated in Germany. We focused on aims, activities, and technological mediation, with Activity Theory astheoretical framework. Our findings show that the organizational aim of coordinating help was successfullyachieved by connecting heterogeneous actors through digitization and institutionalization. Enabled by thecontext of the COVID-19 pandemic crisis, the network acted virtually, but was also able to integrate analogspaces of help. We identified six crucial implications regarding the use of technology and collaboration forbuilding a successful volunteering network.},
number = {CSCW2},
journal = {Proceedings of the ACM: Human Computer Interaction (PACM): Computer-Supported Cooperative Work and Social Computing},
author = {Haesler, Steffen and Schmid, Stefka and Vierneisel, Annemike Sophia and Reuter, Christian},
year = {2021},
keywords = {Crisis, HCI, Projekt-emergenCITY, A-Paper, Ranking-CORE-A, Projekt-ATHENE-SecUrban, AuswahlCrisis, Selected},
}
[BibTeX] [Abstract] [Download PDF]
Technological progress can disrupt domains and change the way we work and collaborate. This paper presents a qualitative study with 52 German farmers that investigates the impact of the ongoing digitalization process in agriculture and discusses the implications for privacy research. As in other domains, the introduction of digital tools and services leads to the data itself becoming a resource. Sharing this data with products along the supply chain is favored by retailers and consumers, who benefit from traceability through transparency. However, transparency can pose a privacy risk. Having insight into the business data of others along the supply chain provides an advantage in terms of market position. This is particularly true in agriculture, where there is already a significant imbalance of power between actors. A multitude of small and medium-sized farming businesses are opposed by large upstream and downstream players that drive technological innovation. Further weakening the market position of farmers could lead to severe consequences for the entire sector. We found that on the one hand, privacy behaviors are affected by adoption of digitalization, and on the other hand, privacy itself influences adoption of digital tools. Our study sheds light on the emerging challenges for farmers and the role of privacy in the process of digitalization in agriculture.
@article{linsnerRolePrivacyDigitalization2021,
title = {The {Role} of {Privacy} in {Digitalization} – {Analysing} the {German} {Farmers}' {Perspective}},
volume = {2021},
url = {https://www.petsymposium.org/2021/files/papers/issue3/popets-2021-0050.pdf},
doi = {10.2478/popets-2021-0050},
abstract = {Technological progress can disrupt domains
and change the way we work and collaborate. This paper presents a qualitative study with 52 German farmers
that investigates the impact of the ongoing digitalization process in agriculture and discusses the implications for privacy research. As in other domains, the introduction of digital tools and services leads to the data
itself becoming a resource. Sharing this data with products along the supply chain is favored by retailers and
consumers, who benefit from traceability through transparency. However, transparency can pose a privacy risk.
Having insight into the business data of others along the
supply chain provides an advantage in terms of market
position. This is particularly true in agriculture, where
there is already a significant imbalance of power between actors. A multitude of small and medium-sized
farming businesses are opposed by large upstream and
downstream players that drive technological innovation.
Further weakening the market position of farmers could
lead to severe consequences for the entire sector. We
found that on the one hand, privacy behaviors are affected by adoption of digitalization, and on the other
hand, privacy itself influences adoption of digital tools.
Our study sheds light on the emerging challenges for
farmers and the role of privacy in the process of digitalization in agriculture.},
number = {3},
journal = {Proceedings on Privacy Enhancing Technologies (PoPETs)},
author = {Linsner, Sebastian and Kuntke, Franz and Steinbrink, Enno and Franken, Jonas and Reuter, Christian},
year = {2021},
keywords = {HCI, A-Paper, Ranking-CORE-A, Ranking-ImpactFactor, Security, UsableSec, Projekt-GRKPrivacy, Projekt-GeoBox, Selected, AuswahlUsableSec, Projekt-HyServ},
pages = {334--350},
}
[BibTeX] [Abstract] [Download PDF]
Besides the merits of increasing digitization and interconnectedness in private and professional spaces, critical infrastructures and societies are more and more exposed to cyberattacks. In order to enhance the preventative and reactive capabilities against cyberattacks, Computer Emergency Response Teams (CERTs) are deployed in many countries and organizations. In Germany, CERTs in the public sector operate on federal and state level to provide information security services for authorities, citizens, and enterprises. Their tasks of monitoring, analyzing, and communicating threats and incidents is getting more complex due to the increasing amount of information disseminated into public channels. By adopting the perspectives of Computer-Supported Cooperative Work (CSCW) and Crisis Informatics, we contribute to the study of organizational structures, technology use, and the impact on collaborative practices in and between state CERTs with empirical research based on expert interviews with representatives of German state CERTs (N=15) and supplementary document analyses (N=25). We derive design and policy implications from our findings, including the need for interoperable and modular architecture, a shift towards service level agreements, cross-platform monitoring and analysis of incident data, use of deduplication techniques and standardized threat exchange formats, a reduction of resource costs through process automation, and transparent reporting and tool structures for information exchange.
@article{riebe_impact_2021,
title = {The {Impact} of {Organizational} {Structure} and {Technology} {Use} on {Collaborative} {Practices} in {Computer} {Emergency} {Response} {Teams}: {An} {Empirical} {Study}},
volume = {5},
url = {https://www.peasec.de/paper/2021/2021_RiebeKaufholdReuter_ComputerEmegencyResponseTeams_CSCW.pdf},
doi = {10.1145/3479865},
abstract = {Besides the merits of increasing digitization and interconnectedness in private and professional spaces, critical infrastructures and societies are more and more exposed to cyberattacks. In order to enhance the preventative and reactive capabilities against cyberattacks, Computer Emergency Response Teams (CERTs) are deployed in many countries and organizations. In Germany, CERTs in the public sector operate on federal and state level to provide information security services for authorities, citizens, and enterprises. Their tasks of monitoring, analyzing, and communicating threats and incidents is getting more complex due to the increasing amount of information disseminated into public channels. By adopting the perspectives of Computer-Supported Cooperative Work (CSCW) and Crisis Informatics, we contribute to the study of organizational structures, technology use, and the impact on collaborative practices in and between state CERTs with empirical research based on expert interviews with representatives of German state CERTs (N=15) and supplementary document analyses (N=25). We derive design and policy implications from our findings, including the need for interoperable and modular architecture, a shift towards service level agreements, cross-platform monitoring and analysis of incident data, use of deduplication techniques and standardized threat exchange formats, a reduction of resource costs through process automation, and transparent reporting and tool structures for information exchange.},
number = {CSCW2},
journal = {Proceedings of the ACM: Human Computer Interaction (PACM): Computer-Supported Cooperative Work and Social Computing},
author = {Riebe, Thea and Kaufhold, Marc-André and Reuter, Christian},
year = {2021},
keywords = {Crisis, A-Paper, Ranking-CORE-A, Security, UsableSec, Projekt-ATHENE-SecUrban, Projekt-CYWARN, AuswahlUsableSec, Projekt-KontiKat, AuswahlKaufhold, HabilitationKaufhold},
}
[BibTeX] [Abstract] [Download PDF]
Spillover effects describe the process of a company benefiting from the R&D activities of another one and thereby gaining an economic advantage. One prominent approach for measuring spillover effects is based on the analysis of patent citation networks. Taking social media analytics and knowledge economics into account, this paper presents a complementary approach to quantify spillover effects from defense to civilian research and development, analyzing 513 employment biographies from the social network LinkedIn. Using descriptive network analysis, we investigate the emigration of personnel of the German defense industry to other civilian producers. Thereby, our study reveals that in the last decade, employees of defense suppliers have changed positions significantly less often, with 3.24 changes on average than professionals who have worked more than 50\% of their jobs in the civilian sector, having changed 4.61 times on average. Our work illustrates the churn behavior and how spillover effects between defense and civilian sectors can be measured using social career networks such as LinkedIn.
@article{riebeMeasuringSpilloverEffects2021,
title = {Measuring {Spillover} {Effects} from {Defense} to {Civilian} {Sectors} – {A} {Quantitative} {Approach} {Using} {LinkedIn}},
volume = {32},
url = {https://peasec.de/paper/2021/2021_RiebeSchmidReuter_SpilloverEffectsDefensetoCivilianLinkedIn_PDE.pdf},
doi = {10.1080/10242694.2020.1755787},
abstract = {Spillover effects describe the process of a company benefiting from the R\&D activities of another one and thereby gaining an economic advantage. One prominent approach for measuring spillover effects is based on the analysis of patent citation networks. Taking social media analytics and knowledge economics into account, this paper presents a complementary approach to quantify spillover effects from defense to civilian research and development, analyzing 513 employment biographies from the social network LinkedIn. Using descriptive network analysis, we investigate the emigration of personnel of the German defense industry to other civilian producers. Thereby, our study reveals that in the last decade, employees of defense suppliers have changed positions significantly less often, with 3.24 changes on average than professionals who have worked more than 50\% of their jobs in the civilian sector, having changed 4.61 times on average. Our work illustrates the churn behavior and how spillover effects between defense and civilian sectors can be measured using social career networks such as LinkedIn.},
number = {7},
journal = {Defence and Peace Economics},
author = {Riebe, Thea and Schmid, Stefka and Reuter, Christian},
year = {2021},
keywords = {Peace, A-Paper, Ranking-ImpactFactor, AuswahlPeace, Projekt-ATHENE-SecUrban, Selected, Cyberwar, Projekt-DualUse},
pages = {773--785},
}
[BibTeX] [Abstract] [Download PDF]
Since 2015, an increased number of asylum seekers is coming to Europe. These migration movements increasingly rely on digital infrastructure, such as mobile internet access and online services, in order to reach their targeted destination countries. Asylum seekers often use smartphones for information and communication purposes. Even though there are many positive aspects in the use of such technologies, researchers have to consider the perceived risks of this specific user group. This work aims at investigating the use of mobile information technologies by asylum seekers during their flight, especially taking privacy into account. Thus, it examines asylum seekers’ digital privacy perceptions and identifies privacy protection behaviors by conducting a qualitative interview study with 14 asylum seekers who applied for asylum in Germany. The results show that asylum seekers are often aware of the various risks deriving from the use of smartphones and ICT, such as surveillance and persecution by state or non-state actors as well as extortion by criminals. Based on this, this work furthermore outlines different strategies used to manage these risks. Since the lack of privacy and trust leads to avoidance behavior, the insights of this study provide valuable information for the design of assistance apps and collaboration platforms, which appropriately address the specific needs for digital privacy in the context of flight, or for the conception of privacy-enhancing technologies helping to achieve this.
@article{steinbrinkDigitalPrivacyPerceptions2021,
title = {Digital {Privacy} {Perceptions} of {Asylum} {Seekers} in {Germany} - {An} {Empirical} {Study} about {Smartphone} {Usage} during the {Flight}},
volume = {5},
url = {https://www.peasec.de/paper/2021/2021_SteinbrinkReichertMendeReuter_DigitalPrivacyPerceptionAsylumSeekers_CSCW.pdf},
doi = {10.1145/3479526},
abstract = {Since 2015, an increased number of asylum seekers is coming to Europe. These migration movements increasingly rely on digital infrastructure, such as mobile internet access and online services, in order to reach their targeted destination countries. Asylum seekers often use smartphones for information and communication purposes. Even though there are many positive aspects in the use of such technologies, researchers have to consider the perceived risks of this specific user group. This work aims at investigating the use of mobile information technologies by asylum seekers during their flight, especially taking privacy into account. Thus, it examines asylum seekers’ digital privacy perceptions and identifies privacy protection behaviors by conducting a qualitative interview study with 14 asylum seekers who applied for asylum in Germany. The results show that asylum seekers are often aware of the various risks deriving from the use of smartphones and ICT, such as surveillance and persecution by state or non-state actors as well as extortion by criminals. Based on this, this work furthermore outlines different strategies used to manage these risks. Since the lack of privacy and trust leads to avoidance behavior, the insights of this study provide valuable information for the design of assistance apps and collaboration platforms, which appropriately address the specific needs for digital privacy in the context of flight, or for the conception of privacy-enhancing technologies helping to achieve this.},
number = {CSCW2},
journal = {Proceedings of the ACM: Human Computer Interaction (PACM): Computer-Supported Cooperative Work and Social Computing},
author = {Steinbrink, Enno and Reichert, Lilian and Mende, Michelle and Reuter, Christian},
year = {2021},
keywords = {A-Paper, Ranking-CORE-A, Ranking-ImpactFactor, Student, Security, UsableSec, Projekt-GRKPrivacy, Projekt-ATHENE-FANCY, AuswahlUsableSec},
}
2020
[BibTeX] [Abstract] [Download PDF]
As part of information systems, the research field of crisis informatics increasingly investigates the potentials and limitations of mobile crisis apps, which constitute a relatively new public service for citizens and are specifically designed for the dissemination of disaster‐related information and communication between authorities, organizations and citizens. While existing crisis apps, such as KATWARN or NINA in Germany, focus on preparatory information and warning functionality, there is a need for apps and research on police-related functionality, such as information on cybercrime, fraud offences, or search for missing persons. Based on a workshop with civil protection (N=12) and police officers (N=15), we designed a questionnaire and conducted a representative survey of German citizens (N=1.219) on the past, current and future use, perceived helpfulness, deployment and behavioural preferences, configurability and most important functionality of mobile crisis apps. Our results indicate that in addition to emergency and weather warnings, crime- and health-related warnings are also desired by many, as is the possibility for bidirectional communication. People also want one central app and are resistant to installing more than one crisis app. Furthermore, there are few significant differences between socioeconomic groups.
@inproceedings{kaufhold_warning_2020,
title = {Warning the {Public}: {A} {Survey} on {Attitudes}, {Expectations} and {Use} of {Mobile} {Crisis} {Apps} in {Germany}},
url = {http://www.peasec.de/paper/2020/2020_KaufholdHaunschildReuter_WarningthePublic_ECIS.pdf},
abstract = {As part of information systems, the research field of crisis informatics increasingly investigates the potentials and limitations of mobile crisis apps, which constitute a relatively new public service for citizens and are specifically designed for the dissemination of disaster‐related information and communication between authorities, organizations and citizens. While existing crisis apps, such as KATWARN or NINA in Germany, focus on preparatory information and warning functionality, there is a need for apps and research on police-related functionality, such as information on cybercrime, fraud offences, or search for missing persons. Based on a workshop with civil protection (N=12) and police officers (N=15), we designed a questionnaire and conducted a representative survey of German citizens (N=1.219) on the past, current and future use, perceived helpfulness, deployment and behavioural preferences, configurability and most important functionality of mobile crisis apps. Our results indicate that in addition to emergency and weather warnings, crime- and health-related warnings are also desired by many, as is the possibility for bidirectional communication. People also want one central app and are resistant to installing more than one crisis app. Furthermore, there are few significant differences between socioeconomic groups.},
booktitle = {Proceedings of the {European} {Conference} on {Information} {Systems} ({ECIS})},
publisher = {AIS},
author = {Kaufhold, Marc-André and Haunschild, Jasmin and Reuter, Christian},
year = {2020},
keywords = {Crisis, Projekt-emergenCITY, A-Paper, Ranking-CORE-A, Projekt-ATHENE-SecUrban, Projekt-ATHENE-FANCY, Ranking-WKWI-A, Ranking-VHB-B, HabilitationKaufhold},
}
[BibTeX] [Abstract] [Download PDF]
The research field of crisis informatics examines, amongst others, the potentials and barriers of social media use during disasters and emergencies. Social media allow emergency services to receive valuable information (e.g., eyewitness reports, pictures, or videos) from social media. However, the vast amount of data generated during large-scale incidents can lead to issue of information overload. Research indicates that supervised machine learning techniques are sui- table for identifying relevant messages and filter out irrelevant messages, thus mitigating in- formation overload. Still, they require a considerable amount of labeled data, clear criteria for relevance classification, a usable interface to facilitate the labeling process and a mechanism to rapidly deploy retrained classifiers. To overcome these issues, we present (1) a system for social media monitoring, analysis and relevance classification, (2) abstract and precise criteria for re- levance classification in social media during disasters and emergencies, (3) the evaluation of a well-performing Random Forest algorithm for relevance classification incorporating metadata from social media into a batch learning approach (e.g., 91.28\%/89.19\% accuracy, 98.3\%/89.6\% precision and 80.4\%/87.5\% recall with a fast training time with feature subset selection on the European floods/BASF SE incident datasets), as well as (4) an approach and preliminary eva- luation for relevance classification including active, incremental and online learning to reduce the amount of required labeled data and to correct misclassifications of the algorithm by feed- back classification. Using the latter approach, we achieved a well-performing classifier based on the European floods dataset by only requiring a quarter of labeled data compared to the tradi- tional batch learning approach. Despite a lesser effect on the BASF SE incident dataset, still a substantial improvement could be determined.
@article{kaufholdRapidRelevanceClassification2020,
title = {Rapid relevance classification of social media posts in disasters and emergencies: {A} system and evaluation featuring active, incremental and online learning},
volume = {57},
url = {https://peasec.de/paper/2020/2020_KaufholdBayerReuter_RapidRelevanceClassification_IPM.pdf},
doi = {10.1016/j.ipm.2019.102132},
abstract = {The research field of crisis informatics examines, amongst others, the potentials and barriers of social media use during disasters and emergencies. Social media allow emergency services to receive valuable information (e.g., eyewitness reports, pictures, or videos) from social media. However, the vast amount of data generated during large-scale incidents can lead to issue of information overload. Research indicates that supervised machine learning techniques are sui- table for identifying relevant messages and filter out irrelevant messages, thus mitigating in- formation overload. Still, they require a considerable amount of labeled data, clear criteria for relevance classification, a usable interface to facilitate the labeling process and a mechanism to rapidly deploy retrained classifiers. To overcome these issues, we present (1) a system for social media monitoring, analysis and relevance classification, (2) abstract and precise criteria for re- levance classification in social media during disasters and emergencies, (3) the evaluation of a well-performing Random Forest algorithm for relevance classification incorporating metadata from social media into a batch learning approach (e.g., 91.28\%/89.19\% accuracy, 98.3\%/89.6\% precision and 80.4\%/87.5\% recall with a fast training time with feature subset selection on the European floods/BASF SE incident datasets), as well as (4) an approach and preliminary eva- luation for relevance classification including active, incremental and online learning to reduce the amount of required labeled data and to correct misclassifications of the algorithm by feed- back classification. Using the latter approach, we achieved a well-performing classifier based on the European floods dataset by only requiring a quarter of labeled data compared to the tradi- tional batch learning approach. Despite a lesser effect on the BASF SE incident dataset, still a substantial improvement could be determined.},
number = {1},
journal = {Information Processing \& Management (IPM)},
author = {Kaufhold, Marc-André and Bayer, Markus and Reuter, Christian},
year = {2020},
keywords = {Crisis, Projekt-emergenCITY, A-Paper, Ranking-CORE-A, Ranking-ImpactFactor, SocialMedia, Projekt-ATHENE-SecUrban, Ranking-WKWI-B, AuswahlKaufhold},
pages = {1--32},
}
[BibTeX] [Abstract] [Download PDF]
The research field of crisis informatics examines, amongst others, the potentials and barriers of social media use during conflicts and crises. Social media allow emergency services to reach the public easily in the context of crisis communication and receive valuable information (e.g. pictures) from social media data. However, the vast amount of data generated during large-scale incidents can lead to issues of information overload and quality. To mitigate these issues, this paper proposes the semi-automatic creation of alerts including keyword, relevance and information quality filters based on cross-platform social media data. We conducted empirical studies and workshops with emergency services across Europe to raise requirements, then iteratively designed and implemented an approach to support emergency services, and performed multiple evaluations, including live demonstrations and field trials, to research the potentials of social media-based alerts. Finally, we present the findings and implications based on semi-structured interviews with emergency services, highlighting the need for usable configurability and white-box algorithm representation.
@article{kaufholdMitigatingInformationOverload2020,
title = {Mitigating {Information} {Overload} in {Social} {Media} during {Conflicts} and {Crises}: {Design} and {Evaluation} of a {Cross}-{Platform} {Alerting} {System}},
volume = {39},
url = {https://peasec.de/paper/2020/2020_KaufholdRuppReuterHabdank_MitigatingInformationOverload_BIT.pdf},
doi = {10.1080/0144929X.2019.1620334},
abstract = {The research field of crisis informatics examines, amongst others, the potentials and barriers of social media use during conflicts and crises. Social media allow emergency services to reach the public easily in the context of crisis communication and receive valuable information (e.g. pictures) from social media data. However, the vast amount of data generated during large-scale incidents can lead to issues of information overload and quality. To mitigate these issues, this paper proposes the semi-automatic creation of alerts including keyword, relevance and information quality filters based on cross-platform social media data. We conducted empirical studies and workshops with emergency services across Europe to raise requirements, then iteratively designed and implemented an approach to support emergency services, and performed multiple evaluations, including live demonstrations and field trials, to research the potentials of social media-based alerts. Finally, we present the findings and implications based on semi-structured interviews with emergency services, highlighting the need for usable configurability and white-box algorithm representation.},
number = {3},
journal = {Behaviour \& Information Technology (BIT)},
author = {Kaufhold, Marc-André and Rupp, Nicola and Reuter, Christian and Habdank, Matthias},
year = {2020},
keywords = {Crisis, HCI, A-Paper, Ranking-CORE-A, Ranking-ImpactFactor, SocialMedia, Security, AuswahlCrisis, Selected, Projekt-ATHENE-FANCY, Projekt-KontiKat, AuswahlKaufhold},
pages = {319--342},
}
[BibTeX] [Abstract] [Download PDF]
Since the emergence of so-called fake news on the internet and in social media, platforms such as Facebook have started to take countermeasures, and researchers have begun looking into this phenomenon from a variety of perspectives. A large number of scientific work has investigated ways to detect fake news automatically. Less attention has been paid to the subsequent step, i.e., what to do when you are aware of the inaccuracy of claims in social media. This work takes a user-centered approach on means to counter identified mis- and disinformation in social media. We conduct a three-step study design on how approaches in social media should be presented to respect the users’ needs and experiences and how effective they are. As our first step, in an online survey representative for some factors to the German adult population, we enquire regarding their strategies on handling information in social media, and their opinion regarding possible solutions — focusing on the approach of displaying a warning on inaccurate posts. In a second step, we present five potential approaches for countermeasures identified in related work to interviewees for qualitative input. We discuss (1) warning, (2) related articles, (3) reducing the size, (4) covering, and (5) requiring confirmation. Based on the interview feedback, as the third step of this study, we select, improve, and examine four promising approaches on how to counter misinformation. We conduct an online experiment to test their effectiveness on the perceived accuracy of false headlines and also ask for the users’ preferences. In this study, we find that users welcome warning-based approaches to counter fake news and are somewhat critical with less transparent methods. Moreover, users want social media platforms to explain why a post was marked as disputed. The results regarding effectiveness are similar: Warning-based approaches are shown to be effective in reducing the perceived accuracy of false headlines. Moreover, adding an explanation to the warning leads to the most significant results. In contrast, we could not find a significant effect on one of Facebook’s current approaches (reduced post size and fact-checks in related articles).
@article{kirchnerCounteringFakeNews2020,
title = {Countering {Fake} {News}: {A} {Comparison} of {Possible} {Solutions} {Regarding} {User} {Acceptance} and {Effectiveness}},
volume = {4},
url = {http://www.peasec.de/paper/2020/2020_KirchnerReuter_CounteringFakeNews_CSCW.pdf},
doi = {10.1145/3415211},
abstract = {Since the emergence of so-called fake news on the internet and in social media, platforms such as Facebook have started to take countermeasures, and researchers have begun looking into this phenomenon from a variety of perspectives. A large number of scientific work has investigated ways to detect fake news automatically. Less attention has been paid to the subsequent step, i.e., what to do when you are aware of the inaccuracy of claims in social media. This work takes a user-centered approach on means to counter identified mis- and disinformation in social media. We conduct a three-step study design on how approaches in social media should be presented to respect the users' needs and experiences and how effective they are. As our first step, in an online survey representative for some factors to the German adult population, we enquire regarding their strategies on handling information in social media, and their opinion regarding possible solutions — focusing on the approach of displaying a warning on inaccurate posts. In a second step, we present five potential approaches for countermeasures identified in related work to interviewees for qualitative input. We discuss (1) warning, (2) related articles, (3) reducing the size, (4) covering, and (5) requiring confirmation. Based on the interview feedback, as the third step of this study, we select, improve, and examine four promising approaches on how to counter misinformation. We conduct an online experiment to test their effectiveness on the perceived accuracy of false headlines and also ask for the users' preferences. In this study, we find that users welcome warning-based approaches to counter fake news and are somewhat critical with less transparent methods. Moreover, users want social media platforms to explain why a post was marked as disputed. The results regarding effectiveness are similar: Warning-based approaches are shown to be effective in reducing the perceived accuracy of false headlines. Moreover, adding an explanation to the warning leads to the most significant results. In contrast, we could not find a significant effect on one of Facebook's current approaches (reduced post size and fact-checks in related articles).},
number = {CSCW2},
journal = {Proceedings of the ACM: Human Computer Interaction (PACM): Computer-Supported Cooperative Work and Social Computing},
publisher = {ACM},
author = {Kirchner, Jan and Reuter, Christian},
year = {2020},
note = {Place: Austin, USA},
keywords = {Crisis, HCI, Projekt-emergenCITY, A-Paper, Ranking-CORE-A, Ranking-ImpactFactor, Student, Projekt-ATHENE, AuswahlCrisis, Selected, Cooperation},
pages = {140:1--140:28},
}
[BibTeX] [Abstract] [Download PDF]
The growing importance of social media in conflicts and crises is accompanied by an ever-increasing research interest in the crisis informatics field in order to identify potential benefits and develop measures against the technology’s abuse. This special issue sets out to give an overview of current research on the use of social media in conflicts and crises. In doing so, it focuses on both good and malicious aspects of social media and includes a variety of papers of conceptual, theoretical and empirical nature. In six sections, the special issue presents an overview of the field, analytical methods, technical challenges, current advancements and the accepted papers before concluding. Specific topics range from cyber deception over information trustworthiness to mining and near-real-time processing of social media data.
@article{reuterSocialMediaConflicts2020,
title = {Social media in conflicts and crises},
volume = {39},
issn = {0144-929X},
url = {https://peasec.de/paper/2020/2020_ReuterStieglitzImran_SocialMediainConflictsandCrises_BIT.pdf},
doi = {10.1080/0144929X.2019.1629025},
abstract = {The growing importance of social media in conflicts and crises is accompanied by an ever-increasing research interest in the crisis informatics field in order to identify potential benefits and develop measures against the technology's abuse. This special issue sets out to give an overview of current research on the use of social media in conflicts and crises. In doing so, it focuses on both good and malicious aspects of social media and includes a variety of papers of conceptual, theoretical and empirical nature. In six sections, the special issue presents an overview of the field, analytical methods, technical challenges, current advancements and the accepted papers before concluding. Specific topics range from cyber deception over information trustworthiness to mining and near-real-time processing of social media data.},
number = {1},
journal = {Behaviour \& Information Technology (BIT)},
author = {Reuter, Christian and Stieglitz, Stefan and Imran, Muhammad},
year = {2020},
keywords = {Crisis, HCI, Peace, A-Paper, Ranking-CORE-A, Ranking-ImpactFactor, SocialMedia, Projekt-ATHENE, Projekt-CROSSING, Projekt-MAKI},
pages = {241--251},
}
[BibTeX] [Abstract] [Download PDF]
The growing importance of social media in conflicts and crises is accompanied by an ever-increasing research interest in the crisis informatics field in order to identify potential benefits and develop measures against the technology’s abuse. This special issue sets out to give an overview of current research on the use of social media in conflicts and crises. In doing so, it focuses on both good and malicious aspects of social media and includes a variety of papers of conceptual, theoretical and empirical nature. In six sections, the special issue presents an overview of the field, analytical methods, technical challenges, current advancements and the accepted papers before concluding. Specific topics range from cyber deception over information trustworthiness to mining and near-real-time processing of social media data.
@book{reuterSpecialIssueSocial2020,
title = {Special {Issue} on {Social} {Media} in {Conflicts} and {Crises} - {Behaviour} \& {Information} {Technology} ({BIT})},
volume = {39},
url = {https://www.tandfonline.com/toc/tbit20/39/3},
abstract = {The growing importance of social media in conflicts and crises is accompanied by an ever-increasing research interest in the crisis informatics field in order to identify potential benefits and develop measures against the technology's abuse. This special issue sets out to give an overview of current research on the use of social media in conflicts and crises. In doing so, it focuses on both good and malicious aspects of social media and includes a variety of papers of conceptual, theoretical and empirical nature. In six sections, the special issue presents an overview of the field, analytical methods, technical challenges, current advancements and the accepted papers before concluding. Specific topics range from cyber deception over information trustworthiness to mining and near-real-time processing of social media data.},
number = {1},
publisher = {Taylor \& Francis},
author = {Reuter, Christian and Stieglitz, Stefan and Imran, Muhammad},
year = {2020},
note = {Publication Title: Behaviour \& Information Technology (BIT)},
keywords = {Crisis, HCI, Peace, A-Paper, Ranking-CORE-A, Ranking-ImpactFactor, SocialMedia, Projekt-ATHENE, Projekt-CROSSING, Projekt-MAKI},
}
[BibTeX] [Abstract] [Download PDF]
Finding a way to ensure an effective use of social media has become increasingly important to emergency services over the past decade. Despite all efforts to determine the utility of social media for emergency organisations, it is necessary to benefit from such institutions’ staffs’ opinions to establish effective use. To provide empirical evidence we present a comparison of two surveys, conducted across Europe with emergency services in 2014 and 2017 respectively, with a total of 1169 answers. The analysis shows that personal experience has an effect on how organisational usage of social media is perceived and how emergency service staff view the future use of social media. Furthermore, the use has increased. This article not only shows emergency services what their staff think about their social media usage but also discusses challenges and future directions for the design of systems that can be useful for further development of optimized organisational social media usage.
@article{reuterEmergencyServiceStaff2020,
title = {Emergency {Service} {Staff} and {Social} {Media} – {A} {Comparative} {Empirical} {Study} of the {Perception} by {Emergency} {Services} {Members} in {Europe} in 2014 and 2017},
volume = {46},
url = {https://peasec.de/paper/2020/2020_ReuterKaufholdSpahrSpielhoferHahne_EmergencyServiceSocialMediaAttitude20142017_IJDRR.pdf},
doi = {10.1016/j.ijdrr.2020.101516},
abstract = {Finding a way to ensure an effective use of social media has become increasingly important to emergency services over the past decade. Despite all efforts to determine the utility of social media for emergency organisations, it is necessary to benefit from such institutions' staffs' opinions to establish effective use. To provide empirical evidence we present a comparison of two surveys, conducted across Europe with emergency services in 2014 and 2017 respectively, with a total of 1169 answers. The analysis shows that personal experience has an effect on how organisational usage of social media is perceived and how emergency service staff view the future use of social media. Furthermore, the use has increased. This article not only shows emergency services what their staff think about their social media usage but also discusses challenges and future directions for the design of systems that can be useful for further development of optimized organisational social media usage.},
number = {101516},
journal = {International Journal of Disaster Risk Reduction (IJDRR)},
author = {Reuter, Christian and Kaufhold, Marc-André and Spahr, Fabian and Spielhofer, Thomas and Hahne, Anna Sophie},
year = {2020},
keywords = {Crisis, Projekt-emergenCITY, A-Paper, Ranking-ImpactFactor, SocialMedia, Student, Projekt-EmerGent, Projekt-KontiKat},
}
[BibTeX] [Abstract] [Download PDF]
The debate on the development and deployment of lethal autonomous weapon systems (LAWS) as an emerging technology is of increasing importance, with discussions stalling and technological development progressing. Monitoring the progress of increasingly autonomous weapons systems in civilian and military use as well as regulating possible autonomous systems early on is demanded by civil society actors, like the Campaign to Stop Killer Robots and the International Committee of the Red Cross (ICRC), while nation states follow a variety of interests and strategies, showing little room for consensus on central terms and questions [2], [3]. This article therefore sheds light on the work of the Group of Governmental Experts (GGE) of the UN Convention of Certain Conventional Weapons (CCW). The CCW, offering an arena for international cooperation, has dedicated itself to the purpose of finding common ground with respect to an understanding of LAWS, as well as to the necessary degree of human control. From an ethical perspective, the concept of Meaningful Human Control (MHC) supports a human-centric approach. Several IEEE projects, series and publications are dedicated to this prioritization, especially regarding civilian use. As autonomous technology is increasingly at the center of contemporary military innovations, questions of (human) agency and responsibility in warfare have become even more pressing. As stressed by the United Nations Institute for Disarmament Research (UNIDIR), the concept of MHC may prove useful in the context of development and use of (semi-) autonomous weaponry.
@article{riebeMeaningfulHumanControl2020,
title = {Meaningful {Human} {Control} of {Lethal} {Autonomous} {Weapon} {Systems}: {The} {CCW}-{Debate} and its {Implications} for {Value}-{Sensitive} {Design}},
volume = {39},
url = {https://peasec.de/paper/2020/2020_RiebeSchmidReuter_MHC_IEEETechScieMag.pdf},
doi = {10.1109/MTS.2020.3031846},
abstract = {The debate on the development and deployment of lethal autonomous weapon systems (LAWS) as an emerging technology is of increasing importance, with discussions stalling and technological development progressing. Monitoring the progress of increasingly autonomous weapons systems in civilian and military use as well as regulating possible autonomous systems early on is demanded by civil society actors, like the Campaign to Stop Killer Robots and the International Committee of the Red Cross (ICRC), while nation states follow a variety of interests and strategies, showing little room for consensus on central terms and questions [2], [3]. This article therefore sheds light on the work of the Group of Governmental Experts (GGE) of the UN Convention of Certain Conventional Weapons (CCW). The CCW, offering an arena for international cooperation, has dedicated itself to the purpose of finding common ground with respect to an understanding of LAWS, as well as to the necessary degree of human control. From an ethical perspective, the concept of Meaningful Human Control (MHC) supports a human-centric approach. Several IEEE projects, series and publications are dedicated to this prioritization, especially regarding civilian use. As autonomous technology is increasingly at the center of contemporary military innovations, questions of (human) agency and responsibility in warfare have become even more pressing. As stressed by the United Nations Institute for Disarmament Research (UNIDIR), the concept of MHC may prove useful in the context of development and use of (semi-) autonomous weaponry.},
number = {4},
journal = {IEEE Technology and Society Magazine},
author = {Riebe, Thea and Schmid, Stefka and Reuter, Christian},
year = {2020},
keywords = {Peace, A-Paper, Ranking-ImpactFactor, AuswahlPeace, Cyberwar, Projekt-DualUse, Projekt-KontiKat},
pages = {36--51},
}
[BibTeX] [Abstract] [Download PDF]
Due to the increase in natural disasters in the past years, Disaster Response Organizations (DROs) are faced with the challenge of coping with more and larger operations. Currently appointed Information and Communications Technology (ICT) used for coordination and communication is sometimes outdated and does not scale, while novel technologies have the potential to greatly improve disaster response efficiency. To allow adoption of these novel technologies, ICT system designers have to take into account the particular needs of DROs and characteristics of International Disaster Response (IDR). This work attempts to bring the humanitarian and ICT communities closer together. In this work, we analyze IDR-related documents and conduct expert interviews. Using open coding, we extract empirical insights and translate the peculiarities of DRO coordination and operation into tangible ICT design requirements. This information is based on interviews with active IDR staff as well as DRO guidelines and reports. Ultimately, the goal of this paper is to serve as a reference for future ICT research endeavors to support and increase the efficiency of IDR operations.
@article{stuteEmpiricalInsightsDesigning2020,
title = {Empirical {Insights} for {Designing} {Information} and {Communication} {Technology} for {International} {Disaster} {Response}},
volume = {47},
url = {https://www.sciencedirect.com/science/article/pii/S2212420919309501},
doi = {10.1016/j.ijdrr.2020.101598},
abstract = {Due to the increase in natural disasters in the past years, Disaster Response Organizations (DROs) are faced with the challenge of coping with more and larger operations. Currently appointed Information and Communications Technology (ICT) used for coordination and communication is sometimes outdated and does not scale, while novel technologies have the potential to greatly improve disaster response efficiency. To allow adoption of these novel technologies, ICT system designers have to take into account the particular needs of DROs and characteristics of International Disaster Response (IDR). This work attempts to bring the humanitarian and ICT communities closer together. In this work, we analyze IDR-related documents and conduct expert interviews. Using open coding, we extract empirical insights and translate the peculiarities of DRO coordination and operation into tangible ICT design requirements. This information is based on interviews with active IDR staff as well as DRO guidelines and reports. Ultimately, the goal of this paper is to serve as a reference for future ICT research endeavors to support and increase the efficiency of IDR operations.},
number = {101598},
journal = {International Journal of Disaster Risk Reduction (IJDRR)},
author = {Stute, Milan and Maass, Max and Schons, Tom and Kaufhold, Marc-André and Reuter, Christian and Hollick, Matthias},
year = {2020},
keywords = {Crisis, Projekt-emergenCITY, A-Paper, Ranking-ImpactFactor, Student, UsableSec, Projekt-GRKPrivacy},
pages = {1--10},
}
2019
[BibTeX] [Abstract] [Download PDF]
Social media have been established in many natural disasters or human‐induced crises and emergencies. Nowadays, authorities, such as emergency services, and citizens engage with social media in different phases of the emergency management cycle. However, as research in crisis informatics highlights, one remaining issue constitutes the chaotic use of social media by citizens during emergencies, which has the potential to increase the complexity of tasks, uncertainty, and pressure for emergency services. To counter these risks, besides implementing supportive technology, social media guidelines may help putting artefact and theoretical contributions into practical use for authorities and citizens. This paper presents the design and evaluation (with 1,024 participants) of citizens’ guidelines for using social media before, during, and after emergencies.
@article{kaufholdAvoidingChaoticUse2019,
title = {Avoiding {Chaotic} {Use} of {Social} {Media} before, during, and after {Emergencies}: {Design} and {Evaluation} of {Citizens}' {Guidelines}},
volume = {27},
url = {http://www.peasec.de/paper/2019/2019_KaufholdGizikisReuterHabdankGrinko_DesignEvaluationCitizenGuidelines_JCCM.pdf},
doi = {10.1111/1468-5973.12249},
abstract = {Social media have been established in many natural disasters or human‐induced crises and emergencies. Nowadays, authorities, such as emergency services, and citizens engage with social media in different phases of the emergency management cycle. However, as research in crisis informatics highlights, one remaining issue constitutes the chaotic use of social media by citizens during emergencies, which has the potential to increase the complexity of tasks, uncertainty, and pressure for emergency services. To counter these risks, besides implementing supportive technology, social media guidelines may help putting artefact and theoretical contributions into practical use for authorities and citizens. This paper presents the design and evaluation (with 1,024 participants) of citizens' guidelines for using social media before, during, and after emergencies.},
number = {3},
journal = {Journal of Contingencies and Crisis Management (JCCM)},
author = {Kaufhold, Marc-André and Gizikis, Alexis and Reuter, Christian and Habdank, Matthias and Grinko, Margarita},
year = {2019},
keywords = {Crisis, HCI, A-Paper, Ranking-ImpactFactor, SocialMedia, Projekt-EmerGent, Projekt-KontiKat, AuswahlKaufhold},
pages = {198--213},
}
[BibTeX] [Abstract] [Download PDF]
On-site work of emergency service teams consists of highly cooperative tasks. Especially during distributed search and rescue tasks there is a constant mix of routinized and non-routinized activities. Within this paper we focus on the work practices of the German Red Cross Rescue Dog Units who deal with several uncertainties regarding the involved dogs, the fragility of the respective situations as well as issues of using technologies under enormous time pressure. Smart glasses provide possibilities for enhanced and hands-free interaction in various contexts and a number of approaches have already been applied, aiming at efficient use of the respective technological innovation in private and professional contexts. However, the collaborative potential of smart glasses in time-critical and uncertain situations is still unexplored. Our design case study examines how the on-site work of emergency service teams can be supported by smart glasses: Based on examining the work practices of the German Red Cross Rescue Dogs, we introduce ‘RescueGlass’ as a coordinative concept, encompassing hands-free head-mounted display (HMD) application as well as a corresponding smartphone application. Finally, we describe the evaluation of its use in the field of emergency response and management. We show how current features such as ‘fog of war’ or various sensors support the cooperative practices of dog handlers, and outline current technical limitations offering future research questions. Our paper provides an initial design probe using smart glasses to engage in the field of collaborative professional mobile tasks.
@article{reuterRescueGlassCollaborativeApplications2019,
title = {{RescueGlass}: {Collaborative} {Applications} involving {Head}-{Mounted} {Displays} for {Red} {Cross} {Rescue} {Dog} {Units}},
volume = {28},
url = {http://www.peasec.de/paper/2019/2019_ReuterLudwigMischur_RescueGlass_JCSCW.pdf},
doi = {10.1007/s10606-018-9339-8},
abstract = {On-site work of emergency service teams consists of highly cooperative tasks. Especially during distributed search and rescue tasks there is a constant mix of routinized and non-routinized activities. Within this paper we focus on the work practices of the German Red Cross Rescue Dog Units who deal with several uncertainties regarding the involved dogs, the fragility of the respective situations as well as issues of using technologies under enormous time pressure. Smart glasses provide possibilities for enhanced and hands-free interaction in various contexts and a number of approaches have already been applied, aiming at efficient use of the respective technological innovation in private and professional contexts. However, the collaborative potential of smart glasses in time-critical and uncertain situations is still unexplored. Our design case study examines how the on-site work of emergency service teams can be supported by smart glasses: Based on examining the work practices of the German Red Cross Rescue Dogs, we introduce ‘RescueGlass' as a coordinative concept, encompassing hands-free head-mounted display (HMD) application as well as a corresponding smartphone application. Finally, we describe the evaluation of its use in the field of emergency response and management. We show how current features such as ‘fog of war' or various sensors support the cooperative practices of dog handlers, and outline current technical limitations offering future research questions. Our paper provides an initial design probe using smart glasses to engage in the field of collaborative professional mobile tasks.},
number = {1-2},
journal = {Computer Supported Cooperative Work: The Journal of Collaborative Computing (JCSCW)},
author = {Reuter, Christian and Ludwig, Thomas and Mischur, Patrick},
year = {2019},
keywords = {Crisis, HCI, A-Paper, Ranking-ImpactFactor, Security, UsableSec, Infrastructure, Projekt-KontiKat, Projekt-KOKOS, Ranking-VHB-B, Ranking-CORE-B, Cooperation},
pages = {209--246},
}
[BibTeX] [Abstract] [Download PDF]
Usage of social media during emergencies and respective perceptions vary across countries. Our representative survey of 7,071 citizens in Europe (Germany, Italy, the Netherlands and the United Kingdom) shows differences of current use of social media in emergencies, expectations towards authorities monitoring social media, intensity of perceiving barriers regarding the use as well as variances concerning the (likelihood of future) use of mobile apps. While German and British participants’ frequency of use of social media is medium and low, respectively, Italian and Dutch respondents use them relatively frequently. Our comparison of the four countries allows for an interpretation of divergent behavior across countries with respect to risk cultures as well as expanding the respective model to social media contexts. At the same time, our findings stress that across the four European countries participants assessed similar advantages like dissemination of information and barriers like false rumors with respect to use social media during emergencies. Distributed equally across nations, age and gender showed significant relationships with social media usage which, among other findings, suggests being helpful for effective implementation of management structures using new technologies.
@article{reuterImpactRiskCultures2019,
title = {The {Impact} of {Risk} {Cultures}: {Citizens}' {Perception} of {Social} {Media} {Use} in {Emergencies} across {Europe}},
volume = {148},
url = {http://www.peasec.de/paper/2019/2019_ReuterKaufholdSchmidSpielhoferHahne_TheImpactofRiskCultures_TFSC.pdf},
doi = {10.1016/j.techfore.2019.119724},
abstract = {Usage of social media during emergencies and respective perceptions vary across countries. Our representative survey of 7,071 citizens in Europe (Germany, Italy, the Netherlands and the United Kingdom) shows differences of current use of social media in emergencies, expectations towards authorities monitoring social media, intensity of perceiving barriers regarding the use as well as variances concerning the (likelihood of future) use of mobile apps. While German and British participants' frequency of use of social media is medium and low, respectively, Italian and Dutch respondents use them relatively frequently. Our comparison of the four countries allows for an interpretation of divergent behavior across countries with respect to risk cultures as well as expanding the respective model to social media contexts. At the same time, our findings stress that across the four European countries participants assessed similar advantages like dissemination of information and barriers like false rumors with respect to use social media during emergencies. Distributed equally across nations, age and gender showed significant relationships with social media usage which, among other findings, suggests being helpful for effective implementation of management structures using new technologies.},
number = {119724},
journal = {Technological Forecasting and Social Change (TFSC)},
author = {Reuter, Christian and Kaufhold, Marc-André and Schmid, Stefka and Spielhofer, Thomas and Hahne, Anna Sophie},
year = {2019},
keywords = {Crisis, HCI, A-Paper, Ranking-ImpactFactor, SocialMedia, AuswahlCrisis, Selected, Projekt-EmerGent, Ranking-VHB-B},
pages = {1--17},
}
[BibTeX] [Abstract] [Download PDF]
In this paper, we explore a specialized type of knowledge, “nomadic knowledge” to understand its implications in knowledge sharing process. Nomadic knowledge is enacted in a discontinuous pattern with a changing set of actors and further flows on a definedtrajectory. This knowledge is quite important but is required sporadically, so it has a varying level of importance for stakeholders at different instances of time. The limited interest of knowledge holders after the creation of knowledge makes the knowledge sharing processcomplex. Furthermore, new sets of actors overloaded with tasks often ignore the knowledge sharing aspect due to the urgency of tasks at hand. Using a long-term field study we describe a particular practice that is not well supported technologically. The objective of this paper is to outline the concept of nomadic knowledge and associated implications, so that respective practices can be supported by the knowledge management community with appropriate technology.
@article{saeedNomadicKnowledgeSharing2019,
title = {Nomadic {Knowledge} {Sharing} {Practices} and {Challenges}: {Findings} from a {Long}-term {Case} {Study}},
volume = {7},
url = {https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=8715497},
doi = {10.1109/ACCESS.2019.2916903},
abstract = {In this paper, we explore a specialized type of knowledge, "nomadic knowledge" to understand its implications in knowledge sharing process. Nomadic knowledge is enacted in a discontinuous pattern with a changing set of actors and further flows on a definedtrajectory. This knowledge is quite important but is required sporadically, so it has a varying level of importance for stakeholders at different instances of time. The limited interest of knowledge holders after the creation of knowledge makes the knowledge sharing processcomplex. Furthermore, new sets of actors overloaded with tasks often ignore the knowledge sharing aspect due to the urgency of tasks at hand. Using a long-term field study we describe a particular practice that is not well supported technologically. The objective of this paper is to outline the concept of nomadic knowledge and associated implications, so that respective practices can be supported by the knowledge management community with appropriate technology.},
number = {1},
journal = {IEEE Access},
author = {Saeed, Saqib and Pipek, Volkmar and Rohde, Markus and Reuter, Christian and Pinatti De Carvalho, Aparecido Fabiano and Wulf, Volker},
year = {2019},
keywords = {HCI, A-Paper, Ranking-ImpactFactor, Ranking-CORE-B, Cooperation},
pages = {63564--63577},
}
2018
[BibTeX] [Abstract] [Download PDF]
Emergencies threaten human lives and overall societal continuity, whether or not the crises and disas- ters are induced by nature, such as earthquakes, floods and hurricanes, or by human beings, such as accidents, terror attacks and uprisings. In such situations, not only do citizens demand information about the damage and safe behaviour, but emergency services also require high quality information to improve situational awareness. For this purpose, there are currently two kinds of apps available: Gen- eral-purpose apps, such as Facebook Safety Check or Twitter Alerts, already integrate safety features. Specific crisis apps, such as KATWARN in Germany or FEMA in the US, provide information on how to behave before, during and after emergencies, and capabilities for reporting incidents or receiving disaster warnings. In this paper, we analyse authorities’ and citizens’ information demands and features of crisis apps. Moreover, we present the concept, implementation and evaluation of a crisis app for incident reporting and bidirectional communication between authorities and citizens. Using the app, citizens may (1) report incidents by providing a category, description, location and multimedia files and (2) receive broadcasts and responses from authorities. Finally, we outline features, requirements and contextual factors for incident reporting and bidirectional communication via mobile app.
@inproceedings{kaufhold112SOCIALDesign2018,
address = {Portsmouth, UK},
title = {112.{SOCIAL}: {Design} and {Evaluation} of a {Mobile} {Crisis} {App} for {Bidirectional} {Communication} between {Emergency} {Services} and {Citizen}},
url = {https://peasec.de/paper/2018/2018_KaufholdRuppReuterAmelunxenCristaldi_112Social_ECIS.pdf},
abstract = {Emergencies threaten human lives and overall societal continuity, whether or not the crises and disas- ters are induced by nature, such as earthquakes, floods and hurricanes, or by human beings, such as accidents, terror attacks and uprisings. In such situations, not only do citizens demand information about the damage and safe behaviour, but emergency services also require high quality information to improve situational awareness. For this purpose, there are currently two kinds of apps available: Gen- eral-purpose apps, such as Facebook Safety Check or Twitter Alerts, already integrate safety features. Specific crisis apps, such as KATWARN in Germany or FEMA in the US, provide information on how to behave before, during and after emergencies, and capabilities for reporting incidents or receiving disaster warnings. In this paper, we analyse authorities' and citizens' information demands and features of crisis apps. Moreover, we present the concept, implementation and evaluation of a crisis app for incident reporting and bidirectional communication between authorities and citizens. Using the app, citizens may (1) report incidents by providing a category, description, location and multimedia files and (2) receive broadcasts and responses from authorities. Finally, we outline features, requirements and contextual factors for incident reporting and bidirectional communication via mobile app.},
booktitle = {Proceedings of the {European} {Conference} on {Information} {Systems} ({ECIS})},
publisher = {AIS},
author = {Kaufhold, Marc-André and Rupp, Nicola and Reuter, Christian and Amelunxen, Christoph and Cristaldi, Massimo},
year = {2018},
keywords = {Crisis, HCI, A-Paper, Ranking-CORE-A, Ranking-WKWI-A, Projekt-EmerGent, Projekt-KontiKat, Ranking-VHB-B, Cooperation},
pages = {1--17},
}
[BibTeX] [Abstract] [Download PDF]
Since the terrorist attacks of 9/11, the use of social media in emergency and crisis events has greatly increased and many studies have concentrated on the use of ICT and social media be-fore, during or after these events. The field of research that these studies fall under is called cri-sis informatics. In this paper, we evaluate and analyze crisis informatics research by looking at case studies of social media use in emergencies, outlining the types of research found in crisis informatics, and expounding upon the forms of interaction that have been researched. Finally, we summarize the achievements from an HCI perspective and outline trends and challenges for future research.
@article{reuterSocialMediaCrisis2018,
title = {Social {Media} in {Crisis} {Management}: {An} {Evaluation} and {Analysis} of {Crisis} {Informatics} {Research}},
volume = {34},
url = {http://www.peasec.de/paper/2018/2018_ReuterHughesKaufhold_SocialMediaCrisisManagementEvaluation_IJHCI.pdf},
doi = {10.1080/10447318.2018.1427832},
abstract = {Since the terrorist attacks of 9/11, the use of social media in emergency and crisis events has greatly increased and many studies have concentrated on the use of ICT and social media be-fore, during or after these events. The field of research that these studies fall under is called cri-sis informatics. In this paper, we evaluate and analyze crisis informatics research by looking at case studies of social media use in emergencies, outlining the types of research found in crisis informatics, and expounding upon the forms of interaction that have been researched. Finally, we summarize the achievements from an HCI perspective and outline trends and challenges for future research.},
number = {4},
journal = {International Journal on Human-Computer Interaction (IJHCI)},
author = {Reuter, Christian and Hughes, Amanda Lee and Kaufhold, Marc-André},
year = {2018},
keywords = {Crisis, HCI, Peace, A-Paper, Ranking-ImpactFactor, SocialMedia, AuswahlCrisis, Selected, Projekt-KontiKat, Ranking-WKWI-B, Ranking-CORE-B},
pages = {280--294},
}
[BibTeX] [Abstract] [Download PDF]
Social media has been established in many larger emergencies and crises. This process has not started just a few years ago, but already 15 years ago in 2001 after the terrorist attacks of 9/11. In the following years, especially in the last 10, sometimes summarized under the term crisis informatics, a variety of studies focusing on the use of ICT and social media before, during or after nearly every crisis and emergency has arisen. This article aims to recapitulate 15 years of social media in emergencies and its research with a special emphasis on use patterns, role patterns and perception patterns that can be found across different cases in order to point out what has been achieved so far, and what future potentials exist.
@article{reuterFifteenYearsSocial2018,
title = {Fifteen {Years} of {Social} {Media} in {Emergencies}: {A} {Retrospective} {Review} and {Future} {Directions} for {Crisis} {Informatics}},
volume = {26},
url = {http://www.peasec.de/paper/2018/2018_ReuterKaufhold_FifteenYearsSocialMediaEmergencies_JCCM.pdf},
doi = {10.1111/1468-5973.12196},
abstract = {Social media has been established in many larger emergencies and crises. This process has not started just a few years ago, but already 15 years ago in 2001 after the terrorist attacks of 9/11. In the following years, especially in the last 10, sometimes summarized under the term crisis informatics, a variety of studies focusing on the use of ICT and social media before, during or after nearly every crisis and emergency has arisen. This article aims to recapitulate 15 years of social media in emergencies and its research with a special emphasis on use patterns, role patterns and perception patterns that can be found across different cases in order to point out what has been achieved so far, and what future potentials exist.},
number = {1},
journal = {Journal of Contingencies and Crisis Management (JCCM)},
author = {Reuter, Christian and Kaufhold, Marc-André},
year = {2018},
keywords = {Crisis, HCI, Peace, A-Paper, Ranking-ImpactFactor, SocialMedia, AuswahlCrisis, Selected, Projekt-EmerGent, Projekt-KontiKat, AuswahlKaufhold, Projekt-KOKOS},
pages = {41--57},
}
2017
[BibTeX] [Abstract] [Download PDF]
Abstract Although emergency services have already recognized the importance of citizen-initiated activities during disasters, still questions with regard to the coordination of spontaneous volunteers and their activities arise. Within our article, we will present a technological approach based on public displays which aims to foster situated crowdsourcing between affected citizens, spontaneous volunteers as well as official emergency services. We will address the research question: How can the situated tasks performed by spontaneous volunteers be supported by the use of public displays during disasters? First we will present the current state of the art with regard to the coordination practices of spontaneous volunteers and emergency services within disaster situations as well as related problems, potentials and specifics of situated crowdsourcing and public displays. To gain insight into actual coordination practices, we conducted an empirical study with 18 different stakeholders involved in disaster management. Based on the literature review and our empirical study, we have derived a technical concept that supports the task and activity management of spontaneous volunteers as well as the coordination both of the demands of affected people and the offers from spontaneous volunteers. We have implemented our concept as the public display application ‘City-Share’, which provides a robust communication infrastructure and encompasses situated crowdsourcing mechanisms for managing offers and demands of activities on-the-ground. Based on its evaluation with several users, we will discuss our findings with regard to the assignment of tasks on-the-ground and situated crowdsourcing during emergencies. We outline that City-Share can improve a community’s disaster resilience, especially when focusing on the kind of collaborative resilience emerging between official stakeholders and spontaneous volunteers or affected citizens at a local level.
@article{ludwigSituatedCrowdsourcingDisasters2017,
title = {Situated crowdsourcing during disasters: {Managing} the tasks of spontaneous volunteers through public displays},
volume = {102},
url = {http://www.peasec.de/paper/2017/2017_Ludwigetal_SituatedCrowdsourcingPublicDisplay_IJHCS.pdf},
doi = {10.1016/j.ijhcs.2016.09.008},
abstract = {Abstract Although emergency services have already recognized the importance of citizen-initiated activities during disasters, still questions with regard to the coordination of spontaneous volunteers and their activities arise. Within our article, we will present a technological approach based on public displays which aims to foster situated crowdsourcing between affected citizens, spontaneous volunteers as well as official emergency services. We will address the research question: How can the situated tasks performed by spontaneous volunteers be supported by the use of public displays during disasters? First we will present the current state of the art with regard to the coordination practices of spontaneous volunteers and emergency services within disaster situations as well as related problems, potentials and specifics of situated crowdsourcing and public displays. To gain insight into actual coordination practices, we conducted an empirical study with 18 different stakeholders involved in disaster management. Based on the literature review and our empirical study, we have derived a technical concept that supports the task and activity management of spontaneous volunteers as well as the coordination both of the demands of affected people and the offers from spontaneous volunteers. We have implemented our concept as the public display application ‘City-Share', which provides a robust communication infrastructure and encompasses situated crowdsourcing mechanisms for managing offers and demands of activities on-the-ground. Based on its evaluation with several users, we will discuss our findings with regard to the assignment of tasks on-the-ground and situated crowdsourcing during emergencies. We outline that City-Share can improve a community's disaster resilience, especially when focusing on the kind of collaborative resilience emerging between official stakeholders and spontaneous volunteers or affected citizens at a local level.},
number = {C},
journal = {International Journal on Human-Computer Studies (IJHCS)},
author = {Ludwig, Thomas and Kotthaus, Christoph and Reuter, Christian and Dongen, Sören Van and Pipek, Volkmar},
year = {2017},
keywords = {Crisis, HCI, A-Paper, Ranking-CORE-A, Ranking-ImpactFactor, Student, Ranking-WKWI-B, Projekt-KOKOS, Cooperation},
pages = {103--121},
}
[BibTeX] [Abstract] [Download PDF]
In recent years, social media have increased the resources that individuals and organizations are able to mobilize for the development of socially innovative practices. In this article, we engage with a naturally occurring development in a Trentinian neighbourhood to examine the cooperative interactions amongst members of a local community. The first author and local residents of the neighbourhood participated in online discussions, decision making, and physical activities that led to material changes in the area. The interventions are motivated by and based on the concept of Social Street that combines online interactions in a closed Facebook group with face-to-face meetings seeking to practically engage the collective in accomplishing certain immediate or ongoing needs. Over the course of two years, we studied this local instantiation of Social Street in Trento, Italy by way of an action-oriented (digital) ethnography. Through this work, we demonstrate how urban neighbourhoods might benefit from hybrid forms of community engagement that are enacted through a constant back and forth between online and face-to-face interactions. We further argue that the infrastructuring of local urban collectives should follow strategies that pay attention to the multiple issues in urban neighbourhoods and people’s attachments to them. Overall, the paper reflects upon the challenges and configurations of participation that this form of community-work entails.
@article{mosconiFacebookNeighbourhoodInfrastructuring2017,
title = {From {Facebook} to the {Neighbourhood}: {Infrastructuring} of {Hybrid} {Community} {Engagement}},
volume = {26},
url = {https://link.springer.com/article/10.1007/s10606-017-9291-z},
doi = {10.1007/s10606-017-9291-z},
abstract = {In recent years, social media have increased the resources that individuals and organizations are able to mobilize for the development of socially innovative practices. In this article, we engage with a naturally occurring development in a Trentinian neighbourhood to examine the cooperative interactions amongst members of a local community. The first author and local residents of the neighbourhood participated in online discussions, decision making, and physical activities that led to material changes in the area. The interventions are motivated by and based on the concept of Social Street that combines online interactions in a closed Facebook group with face-to-face meetings seeking to practically engage the collective in accomplishing certain immediate or ongoing needs. Over the course of two years, we studied this local instantiation of Social Street in Trento, Italy by way of an action-oriented (digital) ethnography. Through this work, we demonstrate how urban neighbourhoods might benefit from hybrid forms of community engagement that are enacted through a constant back and forth between online and face-to-face interactions. We further argue that the infrastructuring of local urban collectives should follow strategies that pay attention to the multiple issues in urban neighbourhoods and people's attachments to them. Overall, the paper reflects upon the challenges and configurations of participation that this form of community-work entails.},
number = {4-6},
journal = {Computer Supported Cooperative Work: The Journal of Collaborative Computing (JCSCW)},
author = {Mosconi, Gaia and Korn, Matthias and Reuter, Christian and Tolmie, Peter and Teli, Maurizio and Pipek, Volkmar},
year = {2017},
keywords = {Crisis, HCI, A-Paper, Ranking-ImpactFactor, SocialMedia, Projekt-KOKOS, Ranking-VHB-B, Ranking-CORE-B},
pages = {959--1003},
}
[BibTeX] [Abstract] [Download PDF]
The value of social media in crises, disasters, and emergencies across different events (e.g. floods, storms, terroristic attacks), countries, and for heterogeneous participants (e.g. citizens, emergency services) is now well-attested. Existing work has examined the potentials and weaknesses of its use during specific events. Fewer studies, however, have focused on citizens’ perceptions of social media in emergencies, and none have deployed a representative sample to examine this. We present the results of the first representative study on citizens’ perception of social media in emergencies that we have conducted in Germany. Our study highlights, for example, that around half (45\%) of people have used social media during an emergency to share and / or look for information. In contrast, false rumours on social media (74\%) are perceived as a threat. Moreover, only a minority of people have downloaded a smartphone app for emergencies (16\%), with the most popular ones’ weather and first aid apps.
@article{reuterSocialMediaEmergencies2017,
title = {Social {Media} in {Emergencies}: {A} {Representative} {Study} on {Citizens}' {Perception} in {Germany}},
volume = {1},
url = {http://www.peasec.de/paper/2017/2017_ReuterKaufholdSpielhoferHahne_SocialMediaEmergenciesGermany_CSCW.pdf},
doi = {10.1145/3134725},
abstract = {The value of social media in crises, disasters, and emergencies across different events (e.g. floods, storms, terroristic attacks), countries, and for heterogeneous participants (e.g. citizens, emergency services) is now well-attested. Existing work has examined the potentials and weaknesses of its use during specific events. Fewer studies, however, have focused on citizens' perceptions of social media in emergencies, and none have deployed a representative sample to examine this. We present the results of the first representative study on citizens' perception of social media in emergencies that we have conducted in Germany. Our study highlights, for example, that around half (45\%) of people have used social media during an emergency to share and / or look for information. In contrast, false rumours on social media (74\%) are perceived as a threat. Moreover, only a minority of people have downloaded a smartphone app for emergencies (16\%), with the most popular ones' weather and first aid apps.},
number = {2},
journal = {Proceedings of the ACM: Human Computer Interaction (PACM): Computer-Supported Cooperative Work and Social Computing},
author = {Reuter, Christian and Kaufhold, Marc-André and Spielhofer, Thomas and Hahne, Anna Sophie},
year = {2017},
note = {Place: New York, USA},
keywords = {Crisis, HCI, A-Paper, Ranking-CORE-A, SocialMedia, Projekt-EmerGent, Projekt-KontiKat, Ranking-WKWI-B},
pages = {1--19},
}
[BibTeX] [Abstract] [Download PDF]
Social media is increasingly being used during emergencies. Most available studies are focused on how citizens and/or authorities use these technologies in concrete events. However, larger quantitative studies with significant results on attitudes, needs and future plans of citizens in such events are not available – especially such of a comparative nature related to emergency services. As part of the EU project ‘EmerGent’ this article presents the findings of a survey of 1034 citizens across 30 European countries conducted between February and June 2015 to explore citizens’ attitudes towards the use of social media for private purposes and in emergency situations. The article briefly compares these findings with a second survey conducted with 761 emergency service staff across 32 European countries from September to December 2014. The aim of the overall study is to discuss citizens’ attitudes towards social media in emergencies in order to derive challenges and opportunities for social resilience.
@article{reuterSocialResilienceQuantitative2017,
title = {Towards {Social} {Resilience}: {A} {Quantitative} and {Qualitative} {Survey} on {Citizens}' {Perception} of {Social} {Media} in {Emergencies} in {Europe}},
volume = {121},
url = {http://www.peasec.de/paper/2017/2017_ReuterSpielhoefer_TowardsSocialResilience-CitizenSurvey_TFSC.pdf},
doi = {10.1016/j.techfore.2016.07.038},
abstract = {Social media is increasingly being used during emergencies. Most available studies are focused on how citizens and/or authorities use these technologies in concrete events. However, larger quantitative studies with significant results on attitudes, needs and future plans of citizens in such events are not available - especially such of a comparative nature related to emergency services. As part of the EU project ‘EmerGent' this article presents the findings of a survey of 1034 citizens across 30 European countries conducted between February and June 2015 to explore citizens' attitudes towards the use of social media for private purposes and in emergency situations. The article briefly compares these findings with a second survey conducted with 761 emergency service staff across 32 European countries from September to December 2014. The aim of the overall study is to discuss citizens' attitudes towards social media in emergencies in order to derive challenges and opportunities for social resilience.},
journal = {Technological Forecasting and Social Change (TFSC)},
author = {Reuter, Christian and Spielhofer, Thomas},
year = {2017},
keywords = {Crisis, HCI, A-Paper, Ranking-ImpactFactor, SocialMedia, RSF, Projekt-EmerGent, Ranking-VHB-B},
pages = {168--180},
}
[BibTeX] [Abstract] [Download PDF]
Crises, such as thunderstorms and an increasing number of (recognised) terroristic attacks in 2015, 2016, and 2017, do not only lead to extensive monetary damage, but also threaten human lives and influence citizens’ perceptions of safety and security. In such situations, the population demands information about the damage and safe behaviour. Although some apps are available to provide this information, the number of users seems relatively low. Focussing on Germany, this study aims to research (1) the distribution of crisis apps in the population, (2) the kinds of crisis apps currently used, as well as (3) needed core functionalities of warning apps. This multi-method study analyses crisis apps by investigating their utilisation quantitatively in a snowball-based survey in Europe (n=1,034) and in a representative survey in Germany (n=1,369). Based on this, the German warning apps Katwarn and NINA and the US-American app FEMA are evaluated qualitatively (n=22). The results revealed requirements which informed the implementation of a warning app prototype. The prototype combines the identified advantages of the apps evaluated in the study, containing warnings and all-clear, recommendations for action, functions to contact friends and helpers. The contributions of this work are findings on the distribution of crisis apps in Europe and Germany (both 16\%), the kinds of crisis apps used (mostly weather and warning apps), and empirically based requirements for warning apps which can be integrated in further developments of existing apps and a prototype for such an app.
@inproceedings{reuterKatwarnNINAFEMA2017,
address = {Guimarães, Portugal},
title = {Katwarn, {NINA} or {FEMA}? {Multi}-{Method} {Study} on {Distribution}, {Use} and {Public} {Views} on {Crisis} {Apps}},
url = {http://www.peasec.de/paper/2017/2017_ReuterKaufholdLeopoldKnipp_CrisisApps_ECIS.pdf},
abstract = {Crises, such as thunderstorms and an increasing number of (recognised) terroristic attacks in 2015, 2016, and 2017, do not only lead to extensive monetary damage, but also threaten human lives and influence citizens' perceptions of safety and security. In such situations, the population demands information about the damage and safe behaviour. Although some apps are available to provide this information, the number of users seems relatively low. Focussing on Germany, this study aims to research (1) the distribution of crisis apps in the population, (2) the kinds of crisis apps currently used, as well as (3) needed core functionalities of warning apps. This multi-method study analyses crisis apps by investigating their utilisation quantitatively in a snowball-based survey in Europe (n=1,034) and in a representative survey in Germany (n=1,369). Based on this, the German warning apps Katwarn and NINA and the US-American app FEMA are evaluated qualitatively (n=22). The results revealed requirements which informed the implementation of a warning app prototype. The prototype combines the identified advantages of the apps evaluated in the study, containing warnings and all-clear, recommendations for action, functions to contact friends and helpers. The contributions of this work are findings on the distribution of crisis apps in Europe and Germany (both 16\%), the kinds of crisis apps used (mostly weather and warning apps), and empirically based requirements for warning apps which can be integrated in further developments of existing apps and a prototype for such an app.},
booktitle = {European {Conference} on {Information} {Systems} ({ECIS})},
publisher = {AIS},
author = {Reuter, Christian and Kaufhold, Marc-André and Leopold, Inken and Knipp, Hannah},
year = {2017},
keywords = {Crisis, HCI, Peace, A-Paper, Ranking-CORE-A, Student, Ranking-WKWI-A, Projekt-EmerGent, Projekt-KontiKat, Ranking-VHB-B},
pages = {2187--2201},
}
2016
[BibTeX] [Abstract] [Download PDF]
In recent years, citizens’ movements such as the Arab Spring or Euromaidan protests have clearly shown that, whenever affected — whether negatively or positively — by the state and government decisions, citizens act to deal with the shared issues. Groups of people who organize themselves to address (mainly political) issues were defined as a `public’ by the philosopher John Dewey. He believed it is necessary to improve communication to create a `Great Community’ as a cohesive group of a public. Although information and communication technologies (ICT) lead to ambivalent effects on pursuing this goal and often distract the mass of people from discussing these issues, we argue that nowadays ICT can improve communication and has the potential to foster the detection of issues and therefore promote the (trans-)formation of a public into an issue-based community. As our foundation we took a literature study covering the formation of publics and their potential to evolve into communities, as well as their interplay with technology. This formed the basis for the development of our operational model that `follows the issues’ for capturing the (trans-)formation of a public. Based on our model, we outline different perspectives on detecting shared issues as early indicators for publics based on ICT and derive implications for researching this process from a practical perspective.
@article{ludwigPublicsCommunitiesResearching2016,
title = {From {Publics} to {Communities}: {Researching} the {Path} of {Shared} {Issues} {Through} {ICT}},
volume = {25},
url = {https://www.wineme.uni-siegen.de/paper/2016/2016_ludwigreuterpipek_frompublicstocommunities_jcscw.pdf},
doi = {10.1007/s10606-016-9252-y},
abstract = {In recent years, citizens' movements such as the Arab Spring or Euromaidan protests have clearly shown that, whenever affected — whether negatively or positively — by the state and government decisions, citizens act to deal with the shared issues. Groups of people who organize themselves to address (mainly political) issues were defined as a `public' by the philosopher John Dewey. He believed it is necessary to improve communication to create a `Great Community' as a cohesive group of a public. Although information and communication technologies (ICT) lead to ambivalent effects on pursuing this goal and often distract the mass of people from discussing these issues, we argue that nowadays ICT can improve communication and has the potential to foster the detection of issues and therefore promote the (trans-)formation of a public into an issue-based community. As our foundation we took a literature study covering the formation of publics and their potential to evolve into communities, as well as their interplay with technology. This formed the basis for the development of our operational model that `follows the issues' for capturing the (trans-)formation of a public. Based on our model, we outline different perspectives on detecting shared issues as early indicators for publics based on ICT and derive implications for researching this process from a practical perspective.},
number = {2-3},
journal = {Computer Supported Cooperative Work: The Journal of Collaborative Computing (JCSCW)},
publisher = {Kluwer Academic Publishers},
author = {Ludwig, Thomas and Reuter, Christian and Pipek, Volkmar},
year = {2016},
note = {Place: Norwell, MA, USA},
keywords = {HCI, A-Paper, Ranking-ImpactFactor, SocialMedia, Projekt-EmerGent, Ranking-VHB-B, Ranking-CORE-B, Cooperation},
pages = {193--225},
}
[BibTeX] [Abstract] [Download PDF]
Various studies show that social media is used in emergencies – and that in spite of possible challenges for emergency services, beneficial use cases can be identified. However, relatively little empirical data is available regarding the attitudes of emergency services towards social media, and almost none of a comparative nature. This article summarizes the findings of a survey conducted of the EU project ‘EmerGent’ with 761 emergency service staff across 32 European countries from September to December 2014. The main aims of the survey were to explore the attitudes expressed by emergency service staff towards social media for private and organizational use as well as the levels and main factors influencing the current and likely future use of social media in their organizations. Based on our results, we discuss possible enhancements of the emergency management cycle using social media.
@article{reuterEmergencyServicesAttitudes2016,
title = {Emergency {Services} {Attitudes} towards {Social} {Media}: {A} {Quantitative} and {Qualitative} {Survey} across {Europe}},
volume = {95},
url = {https://peasec.de/paper/2016/2016_ReuterLudwigKaufholdSpielhofer_EmergencyServicesAttiudesSurveySocialMedia_IJHCS.pdf},
doi = {10.1016/j.ijhcs.2016.03.005},
abstract = {Various studies show that social media is used in emergencies – and that in spite of possible challenges for emergency services, beneficial use cases can be identified. However, relatively little empirical data is available regarding the attitudes of emergency services towards social media, and almost none of a comparative nature. This article summarizes the findings of a survey conducted of the EU project ‘EmerGent' with 761 emergency service staff across 32 European countries from September to December 2014. The main aims of the survey were to explore the attitudes expressed by emergency service staff towards social media for private and organizational use as well as the levels and main factors influencing the current and likely future use of social media in their organizations. Based on our results, we discuss possible enhancements of the emergency management cycle using social media.},
journal = {International Journal on Human-Computer Studies (IJHCS)},
author = {Reuter, Christian and Ludwig, Thomas and Kaufhold, Marc-André and Spielhofer, Thomas},
year = {2016},
keywords = {Crisis, HCI, A-Paper, Ranking-CORE-A, Ranking-ImpactFactor, SocialMedia, AuswahlCrisis, Selected, Projekt-EmerGent, Ranking-WKWI-B, AuswahlKaufhold},
pages = {96--111},
}
2015
[BibTeX] [Abstract] [Download PDF]
Emergencies such as the 2013 Central European flood or the 2013 typhoon Haiyan in Philippines have shown how citizens can organize themselves and coordinate private relief activities. These activities can be found in (physical) groups of affected people, but also within (digital) social media communities. There is an evident need, however, for a clearer picture of what exactly is going on to be available for use by the official emergency services: to enlist them, to keep them safe, to support their efforts and to avoid need-less duplications or conflicts. Aligning emergency services and volunteer activities is, then, crucial. In this paper we present a mobile crowd sensing based concept, which was designed as well as implemented as the application CrowdMonitor and facilitates the detection of physical and digital activities and the assignment of specific tasks to citizens. Finally, we outline the findings of its evaluation.
@inproceedings{ludwigCrowdMonitorMobileCrowd2015,
address = {New York, USA},
title = {{CrowdMonitor}: {Mobile} {Crowd} {Sensing} for {Assessing} {Physical} and {Digital} {Activities} of {Citizens} during {Emergencies}},
url = {https://www.wineme.uni-siegen.de/paper/2015/2015_ludwigreutersiebigterothpipek_crowdmonitor_chi.pdf},
abstract = {Emergencies such as the 2013 Central European flood or the 2013 typhoon Haiyan in Philippines have shown how citizens can organize themselves and coordinate private relief activities. These activities can be found in (physical) groups of affected people, but also within (digital) social media communities. There is an evident need, however, for a clearer picture of what exactly is going on to be available for use by the official emergency services: to enlist them, to keep them safe, to support their efforts and to avoid need-less duplications or conflicts. Aligning emergency services and volunteer activities is, then, crucial. In this paper we present a mobile crowd sensing based concept, which was designed as well as implemented as the application CrowdMonitor and facilitates the detection of physical and digital activities and the assignment of specific tasks to citizens. Finally, we outline the findings of its evaluation.},
booktitle = {Proceedings of the {Conference} on {Human} {Factors} in {Computing} {Systems} ({CHI})},
publisher = {ACM Press},
author = {Ludwig, Thomas and Reuter, Christian and Siebigteroth, Tim and Pipek, Volkmar},
editor = {Begole, Bo and Jinwoo, Kim and Kor, Inkpeni and Woontack, Woo},
year = {2015},
keywords = {Crisis, HCI, A-Paper, Student, Ranking-WKWI-A, Ranking-CORE-A*, Projekt-EmerGent, Cooperation},
pages = {4083--4092},
}
[BibTeX] [Abstract] [Download PDF]
People all over the world are regularly affected by disasters and emergencies. Besides official emergency services, ordinary citizens are getting increasingly involved in crisis response work. They are usually present on-site at the place of incident and use social media to share information about the event. For emergency services, the large amount of citizen-generated content in social media, however, means that finding high-quality information is similar to “finding a needle in a haystack”. This article presents an approach to how a dynamic and subjective quality assessment of citizen-generated content could support the work of emergency services. First, we present results of our empirical study concerning the usage of citizen-generated content by emergency services. Based on our literature review and empirical study, we derive design guidelines and describe a concept for dynamic quality measurement that is implemented as a service-oriented web-application “Social Haystack.” Finally, we outline findings of its evaluation and implications thereof.
@article{ludwigSocialHaystackDynamic2015,
title = {Social {Haystack}: {Dynamic} {Quality} {Assessment} of {Citizen}-{Generated} {Content} during {Emergencies}},
volume = {21},
url = {https://www.wineme.uni-siegen.de/paper/2015/2015_ludwigreuterpipek_socialhaystack_tochi.pdf},
doi = {10.1145/2749461},
abstract = {People all over the world are regularly affected by disasters and emergencies. Besides official emergency services, ordinary citizens are getting increasingly involved in crisis response work. They are usually present on-site at the place of incident and use social media to share information about the event. For emergency services, the large amount of citizen-generated content in social media, however, means that finding high-quality information is similar to “finding a needle in a haystack”. This article presents an approach to how a dynamic and subjective quality assessment of citizen-generated content could support the work of emergency services. First, we present results of our empirical study concerning the usage of citizen-generated content by emergency services. Based on our literature review and empirical study, we derive design guidelines and describe a concept for dynamic quality measurement that is implemented as a service-oriented web-application “Social Haystack.” Finally, we outline findings of its evaluation and implications thereof.},
number = {4},
journal = {ACM Transactions on Computer-Human Interaction (TOCHI)},
author = {Ludwig, Thomas and Reuter, Christian and Pipek, Volkmar},
year = {2015},
keywords = {Crisis, HCI, A-Paper, Ranking-ImpactFactor, SocialMedia, Ranking-WKWI-A, Ranking-CORE-A*, Projekt-EmerGent, Ranking-VHB-B},
pages = {Article 17},
}
[BibTeX] [Abstract] [Download PDF]
Recent disasters have shown an increase in the significance of social media for both affected citizens and volunteers alike in the coordination of information and organization of relief activities, often independently of and in addition to the official emergency response. Existing research mainly focuses on the way in which individual platforms are used by volunteers in response to disasters. This paper examines the use of social media during the European Floods of 2013 and proposes a novel cross-social-media application for volunteers. Besides comprehensive analysis of volunteer communities, interviews were conducted with “digital volunteers” such as Facebook moderators of disaster-related groups. Based on the challenges identified, we designed and implemented the cross-social-media application “XHELP”, which allows information to be both, acquired and distributed cross-media and cross-channel. The evaluation with 20 users leads to further design requirements for applications aiming to support volunteer moderators during disasters.
@inproceedings{reuterXHELPDesignCrossPlatform2015,
address = {Seoul, Korea},
title = {{XHELP}: {Design} of a {Cross}-{Platform} {Social}-{Media} {Application} to {Support} {Volunteer} {Moderators} in {Disasters}},
url = {http://www.peasec.de/paper/2015/2015_ReuterLudwigKaufholdPipek_XHELP_CHI.pdf},
doi = {10.1145/2702123.2702171},
abstract = {Recent disasters have shown an increase in the significance of social media for both affected citizens and volunteers alike in the coordination of information and organization of relief activities, often independently of and in addition to the official emergency response. Existing research mainly focuses on the way in which individual platforms are used by volunteers in response to disasters. This paper examines the use of social media during the European Floods of 2013 and proposes a novel cross-social-media application for volunteers. Besides comprehensive analysis of volunteer communities, interviews were conducted with "digital volunteers" such as Facebook moderators of disaster-related groups. Based on the challenges identified, we designed and implemented the cross-social-media application "XHELP", which allows information to be both, acquired and distributed cross-media and cross-channel. The evaluation with 20 users leads to further design requirements for applications aiming to support volunteer moderators during disasters.},
booktitle = {Proceedings of the {Conference} on {Human} {Factors} in {Computing} {Systems} ({CHI})},
publisher = {ACM Press},
author = {Reuter, Christian and Ludwig, Thomas and Kaufhold, Marc-André and Pipek, Volkmar},
year = {2015},
keywords = {Crisis, HCI, A-Paper, SocialMedia, AuswahlCrisis, Selected, Ranking-WKWI-A, Ranking-CORE-A*, Projekt-EmerGent, AuswahlKaufhold, Cooperation},
pages = {4093--4102},
}
2014
[BibTeX] [Abstract] [Download PDF]
Emergency or crisis management, as is well-attested, is a complex management problem. A variety of agencies need to collaborate and coordinate in real-time and with an urgency that is not always present in other domains. It follows that accurate information of varying kinds (e.g. geographical and weather conditions; available skills and expertises; state-of-play; current dispositions and deployments) needs to be made available in a timely fashion to the organizations and individuals who need it. By definition, this information will come from a number of sources both within and across organizations. Large-scale events in particular necessitate collaboration with other organizations. Of course, plans and processes exist to deal with such events but the number of dynamically changing factors as well as the high number of heterogeneous organizations and the high degree of interdependency involved make it impossible to plan for all contingencies. A degree of ongoing improvisation, which typically occurs by means of a variety of information and expertise sharing practices, therefore becomes necessary. This, however, faces many challenges, such as different organizational cultures, distinct individual and coordinative work practices and discrete information systems. Our work entails an examination of the practices of information and expertise sharing, and the obstacles to it, in inter-organizational crisis management. We conceive of this as a design case study, such that we examine a problem area and its scope; conduct detailed enquiries into practice in that area, and provide design recommendations for implementation and evaluation. First, we will present the results of an empirical study of collaboration practices between organizations and public authorities with security responsibilities such as the police, fire departments, public administration and electricity network operators, mainly in scenarios of medium to large power outages in Germany. Based on these results, we will describe a concept, which was designed, implemented and evaluated as a system prototype, in two iterations. While the first iteration focuses on situation assessment, the second iteration also includes inter-organizational collaboration functionalities. Based on the findings of our evaluations with practitioners, we will discuss how to support collaboration with a particular focus on information and expertise sharing.
@article{leyInformationExpertiseSharing2014,
title = {Information and {Expertise} {Sharing} in {Inter}-{Organizational} {Crisis} {Management}},
volume = {23},
url = {https://www.wineme.uni-siegen.de/paper/2014/2014_informationsharingcrisis_jcscw.pdf},
doi = {10.1007/s10606-014-9205-2},
abstract = {Emergency or crisis management, as is well-attested, is a complex management problem. A variety of agencies need to collaborate and coordinate in real-time and with an urgency that is not always present in other domains. It follows that accurate information of varying kinds (e.g. geographical and weather conditions; available skills and expertises; state-of-play; current dispositions and deployments) needs to be made available in a timely fashion to the organizations and individuals who need it. By definition, this information will come from a number of sources both within and across organizations. Large-scale events in particular necessitate collaboration with other organizations. Of course, plans and processes exist to deal with such events but the number of dynamically changing factors as well as the high number of heterogeneous organizations and the high degree of interdependency involved make it impossible to plan for all contingencies. A degree of ongoing improvisation, which typically occurs by means of a variety of information and expertise sharing practices, therefore becomes necessary. This, however, faces many challenges, such as different organizational cultures, distinct individual and coordinative work practices and discrete information systems. Our work entails an examination of the practices of information and expertise sharing, and the obstacles to it, in inter-organizational crisis management. We conceive of this as a design case study, such that we examine a problem area and its scope; conduct detailed enquiries into practice in that area, and provide design recommendations for implementation and evaluation. First, we will present the results of an empirical study of collaboration practices between organizations and public authorities with security responsibilities such as the police, fire departments, public administration and electricity network operators, mainly in scenarios of medium to large power outages in Germany. Based on these results, we will describe a concept, which was designed, implemented and evaluated as a system prototype, in two iterations. While the first iteration focuses on situation assessment, the second iteration also includes inter-organizational collaboration functionalities. Based on the findings of our evaluations with practitioners, we will discuss how to support collaboration with a particular focus on information and expertise sharing.},
number = {4-6},
journal = {Computer Supported Cooperative Work: The Journal of Collaborative Computing (JCSCW)},
author = {Ley, Benedikt and Ludwig, Thomas and Pipek, Volkmar and Randall, Dave and Reuter, Christian and Wiedenhoefer, Torben},
year = {2014},
keywords = {Crisis, HCI, A-Paper, Ranking-ImpactFactor, Projekt-InfoStrom, Ranking-VHB-B, Ranking-CORE-B, Cooperation},
pages = {347--387},
}
[BibTeX] [Abstract] [Download PDF]
Emergencies are characterized by high complexity and unpredictability. In order to assess and manage them successfully, improvisation work and informal communication, even beyond local and organizational boundaries, is needed. Such informal practices can facilitate ad hoc participation of units in situation assessment, but this may lack overall situation awareness. This paper presents a study on how emergent ‘collaboration needs’ in current work of response teams, who are located on-site and in the control center, could be supported by mobile geo-collaboration systems. First, we present the results of an empirical study about informal work and mobile collaboration practices of emergency services. Then we describe the concept of a mobile geo-collaboration system that addresses the aspects detected in the empirical study and that was implemented as an Android application using web sockets, a technology enabling full-duplex ad hoc communication. Finally we outline the findings of its evaluation in practice and its implications.
@article{reuterAdHocParticipation2014,
title = {Ad {Hoc} {Participation} in {Situation} {Assessment}: {Supporting} {Mobile} {Collaboration} in {Emergencies}},
volume = {21},
url = {http://www.wineme.uni-siegen.de/paper/2014/2014_reuterludwigpipek_adhocparticipation_tochi.pdf},
doi = {10.1145/2651365},
abstract = {Emergencies are characterized by high complexity and unpredictability. In order to assess and manage them successfully, improvisation work and informal communication, even beyond local and organizational boundaries, is needed. Such informal practices can facilitate ad hoc participation of units in situation assessment, but this may lack overall situation awareness. This paper presents a study on how emergent ‘collaboration needs' in current work of response teams, who are located on-site and in the control center, could be supported by mobile geo-collaboration systems. First, we present the results of an empirical study about informal work and mobile collaboration practices of emergency services. Then we describe the concept of a mobile geo-collaboration system that addresses the aspects detected in the empirical study and that was implemented as an Android application using web sockets, a technology enabling full-duplex ad hoc communication. Finally we outline the findings of its evaluation in practice and its implications.},
number = {5},
journal = {ACM Transactions on Computer-Human Interaction (TOCHI)},
publisher = {ACM},
author = {Reuter, Christian and Ludwig, Thomas and Pipek, Volkmar},
month = nov,
year = {2014},
keywords = {Crisis, HCI, A-Paper, Ranking-ImpactFactor, UsableSec, Selected, Ranking-WKWI-A, AuswahlUsableSec, Ranking-CORE-A*, Projekt-InfoStrom, Ranking-VHB-B, Cooperation},
pages = {1--26},
}
2013
[BibTeX] [Abstract] [Download PDF]
Decisions of emergency response organisations (police, fire fighters, infrastructure providers, etc.) rely on accurate and timely information. Some necessary information is integrated into control centre’s IT (weather, availability of electricity, gauge information, etc.), but almost every decision needs to be based on very specific information of the current crisis situation. Due to the unpredictable nature of a crisis, gathering this kind of information requires much improvisation and articulation work which we aim to support. We present a study on how different emergency response organisations communicate with teams on-site to generate necessary information for the coordinating instances, and we described, implemented and evaluated an interaction concept as well as a prototype to support this communication by a semi-structured request-and-report system based on Android devices. We learned that (1) the accuracy of request and reports can be improved by using an appropriate metadata structure in addition to creating multimedia-based information content, (2) requirements of trusted and fast information need to be respected in support concepts although they may even be contradictory, and (3) the coordination strategy of the emergency response organisation also shapes the way this interaction needs to be designed.
@inproceedings{ludwigWhatYouSee2013,
address = {Paphos, Cyrus},
title = {What {You} {See} {Is} {What} {I} {Need}: {Mobile} {Reporting} {Practices} in {Emergencies}},
isbn = {http://link.springer.com/chapter/10.1007/978-1-4471-5346-7\_10},
url = {http://www.peasec.de/paper/2013/2013_LudwigReuterPipek_WYSIWIN-MoRep_ECSCW.pdf},
doi = {10.1007/978-1-4471-5346-7_10},
abstract = {Decisions of emergency response organisations (police, fire fighters, infrastructure providers, etc.) rely on accurate and timely information. Some necessary information is integrated into control centre's IT (weather, availability of electricity, gauge information, etc.), but almost every decision needs to be based on very specific information of the current crisis situation. Due to the unpredictable nature of a crisis, gathering this kind of information requires much improvisation and articulation work which we aim to support. We present a study on how different emergency response organisations communicate with teams on-site to generate necessary information for the coordinating instances, and we described, implemented and evaluated an interaction concept as well as a prototype to support this communication by a semi-structured request-and-report system based on Android devices. We learned that (1) the accuracy of request and reports can be improved by using an appropriate metadata structure in addition to creating multimedia-based information content, (2) requirements of trusted and fast information need to be respected in support concepts although they may even be contradictory, and (3) the coordination strategy of the emergency response organisation also shapes the way this interaction needs to be designed.},
booktitle = {Proceedings of the {European} {Conference} on {Computer} {Supported} {Cooperative} {Work} ({ECSCW})},
publisher = {Springer},
author = {Ludwig, Thomas and Reuter, Christian and Pipek, Volkmar},
editor = {Bertelsen, Olav W. and Ciolfi, Luigina and Grasso, Antonietta and Papadopoulos, George Angelos},
year = {2013},
keywords = {Crisis, HCI, A-Paper, Projekt-InfoStrom, Ranking-CORE-B, Cooperation},
pages = {181--206},
}
2012
[BibTeX] [Abstract] [Download PDF]
Adaptations of business processes are important in work environments, specifically when process-support needs to be tailored according to changing needs. The creation, management, and adaptation of the process models require typically modeling-experts. While these actors are knowledgeable in formalizing and operationalizing processes end-users who do not necessarily possess sophisticated modeling skills know typically local practices and framing conditions best. In this paper, we present an approach to support users in articulating their needs and to involve them into the (re-)design of process specifications. We explore how end-users reflect upon and articulate about business processes. Based on results of a qualitative study, we present a new, paper-based interaction technique, which enables users with little skills to model processes. The resulting process specifications can be transferred either in paper or in digital form into traditional modeling systems for further elaboration.
@article{hessSupportingEndUserArticulations2012,
title = {Supporting {End}-{User} {Articulations} in {Evolving} {Business} {Processes}: {A} {Case} {Study} to explore {Intuitive} {Notations} and {Interaction} {Designs}},
volume = {21},
url = {https://www.wineme.uni-siegen.de/paper/2012/2012_hessreuterpipekwulf_supportingenduserarticulations_ijcis.pdf},
doi = {10.1142/S0218843012500049},
abstract = {Adaptations of business processes are important in work environments, specifically when process-support needs to be tailored according to changing needs. The creation, management, and adaptation of the process models require typically modeling-experts. While these actors are knowledgeable in formalizing and operationalizing processes end-users who do not necessarily possess sophisticated modeling skills know typically local practices and framing conditions best. In this paper, we present an approach to support users in articulating their needs and to involve them into the (re-)design of process specifications. We explore how end-users reflect upon and articulate about business processes. Based on results of a qualitative study, we present a new, paper-based interaction technique, which enables users with little skills to model processes. The resulting process specifications can be transferred either in paper or in digital form into traditional modeling systems for further elaboration.},
number = {4},
journal = {International Journal of Cooperative Information Systems (IJCIS)},
author = {Hess, Jan and Reuter, Christian and Pipek, Volkmar and Wulf, Volker},
year = {2012},
keywords = {HCI, A-Paper, Ranking-ImpactFactor, Ranking-CORE-C, Projekt-InfoStrom, Ranking-VHB-B},
pages = {263--296},
}
[BibTeX] [Abstract] [Download PDF]
Improvisation is necessary when planned decision-making as the main managerial activity does not fit the conditions the practice provides. In these cases, information technology should not just automate planned and structured decisions, but support improvisational practice. In this contribution we present an empirical study about the improvisation work in scenarios of medium to large power outages in Germany. Our focus is on inter-organizational cooperation practices, thus we examined the cooperation of fire departments, police, public administration, electricity infrastructure operators and citizens. Our empirical material allows to describe reasons and conditions for improvisation. Our resulting recommendations address the support of aggregation and visualization of information, a necessary individualization of information compositions, options for collaborative situation assessment, requirements for informal and formal communication, and accessibility of information resources.
@inproceedings{leySupportingImprovisationWork2012,
address = {New York, USA},
title = {Supporting improvisation work in inter-organizational crisis management},
isbn = {978-1-4503-1015-4},
url = {http://www.peasec.de/paper/2012/2012_LeyPipekReuterWiedenhoefer_ImprovisationWork_CHI.pdf},
doi = {10.1145/2207676.2208617},
abstract = {Improvisation is necessary when planned decision-making as the main managerial activity does not fit the conditions the practice provides. In these cases, information technology should not just automate planned and structured decisions, but support improvisational practice. In this contribution we present an empirical study about the improvisation work in scenarios of medium to large power outages in Germany. Our focus is on inter-organizational cooperation practices, thus we examined the cooperation of fire departments, police, public administration, electricity infrastructure operators and citizens. Our empirical material allows to describe reasons and conditions for improvisation. Our resulting recommendations address the support of aggregation and visualization of information, a necessary individualization of information compositions, options for collaborative situation assessment, requirements for informal and formal communication, and accessibility of information resources.},
booktitle = {Proceedings of the {Conference} on {Human} {Factors} in {Computing} {Systems} ({CHI})},
publisher = {ACM Press},
author = {Ley, Benedikt and Pipek, Volkmar and Reuter, Christian and Wiedenhoefer, Torben},
year = {2012},
keywords = {Crisis, HCI, A-Paper, Ranking-WKWI-A, Ranking-CORE-A*, Projekt-InfoStrom, Cooperation, Projekt-RSBE},
pages = {1529},
}
2008
[BibTeX] [Download PDF]
@article{reuterEntwicklungWebbasiertenDokumentenmanagementSystems2008,
title = {Entwicklung eines webbasierten {Dokumentenmanagement}-{Systems} für eine {Fluggesellschaft}},
volume = {50},
url = {http://www.peasec.de/paper/2008/2008_ReuterGeorg_EntwicklungWebbasiertesDMSFluggesellschaft_WI.pdf},
doi = {10.1365/s11576-008-0026-0},
number = {2},
journal = {Journal WIRTSCHAFTSINFORMATIK},
author = {Reuter, Christian and Georg, Christopher},
year = {2008},
keywords = {HCI, A-Paper, Ranking-ImpactFactor, Student, Ranking-WKWI-A, Ranking-VHB-B, Cooperation},
pages = {142--145},
}
Selection
2026
[BibTeX] [Abstract] [Download PDF]
Misinformation interventions are often evaluated under ideal conditions, yet real-world systems are rarely flawless. We report on an online experiment (𝑁 = 1, 004) comparing five state-of-the-art interventions – inoculation, accuracy prompt, community note, fact-check, and indicators – across TikTok, Telegram, and X. We examined efficacy and user perceptions under flawless and erroneous implementations. Misinformation accompanied by fact-checks andindicators was rated as significantly less accurate, while community notes showed weaker effects. Modality did not significantly influence intervention efficacy and had only minor effects on user acceptance. Community notes, fact-checks, and indicators were rated as more helpful but also more annoying than the less informative accuracy prompts. Notably, the efficacy of interventions disappeared under erroneous conditions. This highlights the crucial role of intervention quality in fostering trust and acceptance. Our findings provide (1) a cross-platform evaluation of interventions and (2) empirical evidence that accuracy and reliability are crucial in complex social media environments.
@inproceedings{hartwigTikTokTelegramCrossPlatform2026,
address = {New York, NY, USA},
series = {{CHI} '26},
title = {From {TikTok} to {Telegram}: {Cross}-{Platform} {Efficacy} and {User} {Acceptance} of {Erroneous} and {Flawless} {Misinformation} {Interventions}},
url = {https://peasec.de/paper/2026/2026_HartwigBiselliSchneiderLampReuter_TikTokToTelegram_CHI.pdf},
abstract = {Misinformation interventions are often evaluated under ideal conditions, yet real-world systems are rarely flawless. We report on an online experiment (𝑁 = 1, 004) comparing five state-of-the-art interventions – inoculation, accuracy prompt, community note, fact-check, and indicators – across TikTok, Telegram, and X. We examined efficacy and user perceptions under flawless and erroneous implementations. Misinformation accompanied by fact-checks andindicators was rated as significantly less accurate, while community notes showed weaker effects. Modality did not significantly influence intervention efficacy and had only minor effects on user acceptance. Community notes, fact-checks, and indicators were
rated as more helpful but also more annoying than the less informative accuracy prompts. Notably, the efficacy of interventions disappeared under erroneous conditions. This highlights the crucial role of intervention quality in fostering trust and acceptance. Our findings provide (1) a cross-platform evaluation of interventions and (2) empirical evidence that accuracy and reliability are crucial in complex social media environments.},
booktitle = {Proceedings of the {Conference} on {Human} {Factors} in {Computing} {Systems} ({CHI})},
publisher = {Association for Computing Machinery},
author = {Hartwig, Katrin and Biselli, Tom and Schneider, Franziska and Lamp, Immanuel and Reuter, Christian},
year = {2026},
keywords = {A-Paper, AuswahlCrisis, Crisis, HCI, Projekt-ATHENE-PriVis, Projekt-NEBULA, Ranking-CORE-A*, Security, Selected, UsableSec},
}
2025
[BibTeX] [Abstract] [Download PDF]
China, the United States, and the European Union have spoken of a global competition surrounding Artificial Intelligence (AI). There is widespread talk of an ‘AI Arms Race’. But what is the nature of this race? We argue that the arms race metaphor does not capture the dynamics of global competition in the AI sector. Instead, we propose the notion of a ‘geopolitical innovation race’ for technological leadership in a networked global economy. Based on an analysis of government documents, we find that actors (1) are open to both zero-sum or positive-sum approaches in AI development, (2) organise actor networks differently based on national innovation cultures, (3) prioritise economics and status next to security concerns, and (4) are open to how AI should be interpreted. Referring to the competitive race of AI research and development, the three technopoles perpetuate the geopoliticisation of innovation and intertwine security and economic interests.
@article{schmidArmsRaceInnovation2025,
title = {Arms {Race} or {Innovation} {Race}? {Geopolitical} {AI} {Development}},
volume = {30},
issn = {1465-0045},
url = {https://doi.org/10.1080/14650045.2025.2456019},
doi = {10.1080/14650045.2025.2456019},
abstract = {China, the United States, and the European Union have spoken of a global competition surrounding Artificial Intelligence (AI). There is widespread talk of an ‘AI Arms Race’. But what is the nature of this race? We argue that the arms race metaphor does not capture the dynamics of global competition in the AI sector. Instead, we propose the notion of a ‘geopolitical innovation race’ for technological leadership in a networked global economy. Based on an analysis of government documents, we find that actors (1) are open to both zero-sum or positive-sum approaches in AI development, (2) organise actor networks differently based on national innovation cultures, (3) prioritise economics and status next to security concerns, and (4) are open to how AI should be interpreted. Referring to the competitive race of AI research and development, the three technopoles perpetuate the geopoliticisation of innovation and intertwine security and economic interests.},
number = {4},
journal = {Geopolitics},
publisher = {Routledge},
author = {Schmid, Stefka and Lambach, Daniel and Diehl, Carlo and Reuter, Christian},
year = {2025},
keywords = {Peace, Projekt-TraCe, A-Paper, Ranking-ImpactFactor, AuswahlPeace, Projekt-ATHENE, Selected},
pages = {1907--1936},
}
[BibTeX] [Abstract] [Download PDF]
In light of the increasing vulnerability of citizens against cyberattacks, we conducted three representative surveys with German citizens in 2021 (N=1,093), 2023 (N=1,011), and 2024 (N=1,004) to examine their cyber threat awareness, use of protective security measures, and preferred information channels. While our findings attest large proportions of the German population a high level of cyber threat awareness, many citizens feel inadequately informed about coping with cyberattacks and show little confidence in German security authorities to protect citizens and infrastructures. While age correlated with citizens’ awareness and behavior, we only saw minor temporal differences between datasets. Finally, we provide design and policy implications for enhancing citizens’ awareness of cyber threats and implementing security measures.
@inproceedings{kaufhold_cyber_2025,
address = {Yokohama, Japan},
series = {{CHI} '25},
title = {Cyber {Threat} {Awareness}, {Protective} {Measures} and {Communication} {Preferences} in {Germany}: {Implications} from {Three} {Representative} {Surveys} (2021-2024)},
url = {https://www.peasec.de/paper/2025/2025_KaufholdBäumlerBajorskiReuter_ComparativeCybersecuritySurvey_CHI.pdf},
doi = {10.1145/3706598.3713795},
abstract = {In light of the increasing vulnerability of citizens against cyberattacks, we conducted three representative surveys with German citizens in 2021 (N=1,093), 2023 (N=1,011), and 2024 (N=1,004) to examine their cyber threat awareness, use of protective security measures, and preferred information channels. While our findings attest large proportions of the German population a high level of cyber threat awareness, many citizens feel inadequately informed about coping with cyberattacks and show little confidence in German security authorities to protect citizens and infrastructures. While age correlated with citizens’ awareness and behavior, we only saw minor temporal differences between datasets. Finally, we provide design and policy implications for enhancing citizens’ awareness of cyber threats and implementing security measures.},
booktitle = {Proceedings of the {Conference} on {Human} {Factors} in {Computing} {Systems} ({CHI})},
publisher = {Association for Computing Machinery},
author = {Kaufhold, Marc-André and Bäumler, Julian and Bajorski, Marius and Reuter, Christian},
year = {2025},
keywords = {HCI, A-Paper, Projekt-ATHENE-CyAware, Security, UsableSec, Projekt-CYLENCE, Selected, AuswahlUsableSec, Ranking-CORE-A*, HabilitationKaufhold},
}
[BibTeX] [Abstract] [Download PDF]
The network of subsea data cables (SDC) transmits the majority of international and intercontinental data exchanges. After thirty years of fiber-optic SDC installation across the oceans, almost all coastal and island countries gained access to the only global fixed infrastructure network. Still, there is considerable inequality in the number of available SDC accesses, creating deficits in redundancy for less connected states. Previous research hypothesized multiple factors that influenced the build-up of internet infrastructures but failed to verify these assumptions through inferential statistics. This work highlights the national-level factors that made backbone access provision more – or less – attractive to SDC project decision-makers. Our regression analysis of global country-year data (n = 4916) found that socio-economic (population, GDP), political (state fragility, conflict), and geographic factors (seismic hazard, neighboring territories) significantly influenced the number of active and planned accesses. This work can serve as a foundation for further research leveraging quantitative statistics to unveil hidden structures in the construction of material internet infrastructures and support sustainability in the future allocation of international infrastructure development resources in general.
@article{frankenHiddenStructuresGlobal2025,
title = {Hidden structures of a global infrastructure: {Expansion} factors of the subsea data cable network},
volume = {215},
issn = {0040-1625},
shorttitle = {Hidden structures of a global infrastructure},
url = {https://www.peasec.de/paper/2025/2025_FrankenReinholdDörnfeldReuter_TechForecasting.pdf},
doi = {10.1016/j.techfore.2025.124068},
abstract = {The network of subsea data cables (SDC) transmits the majority of international and intercontinental data exchanges. After thirty years of fiber-optic SDC installation across the oceans, almost all coastal and island countries gained access to the only global fixed infrastructure network. Still, there is considerable inequality in the number of available SDC accesses, creating deficits in redundancy for less connected states. Previous research hypothesized multiple factors that influenced the build-up of internet infrastructures but failed to verify these assumptions through inferential statistics. This work highlights the national-level factors that made backbone access provision more – or less – attractive to SDC project decision-makers. Our regression analysis of global country-year data (n = 4916) found that socio-economic (population, GDP), political (state fragility, conflict), and geographic factors (seismic hazard, neighboring territories) significantly influenced the number of active and planned accesses. This work can serve as a foundation for further research leveraging quantitative statistics to unveil hidden structures in the construction of material internet infrastructures and support sustainability in the future allocation of international infrastructure development resources in general.},
urldate = {2025-03-03},
journal = {Technological Forecasting and Social Change (TFSC)},
author = {Franken, Jonas and Reinhold, Thomas and Dörnfeld, Timon and Reuter, Christian},
month = jun,
year = {2025},
keywords = {Peace, A-Paper, AuswahlPeace, Security, Selected, Projekt-ATHENE-SecFOCI},
pages = {124068},
}
[BibTeX] [Abstract] [Download PDF]
Youth are particularly likely to encounter hateful internet content, which can severely impact their well-being. While most social media provide reporting mechanisms, in several countries, severe hateful content can alternatively be reported to law enforcement or dedicated reporting centers. However, in Germany, many youth never resort to reporting. While research in human-computer interaction has investigated adults’ views on platform-based reporting, youth perspectives and platform-independent alternatives have received little attention. By involving a diverse group of 47 German adolescents and young adults in eight focus group interviews, we investigate how youth-sensitive reporting systems for hateful content can be designed. We explore German youth’s reporting barriers, finding that on platforms, they feel particularly discouraged by deficient rule enforcement and feedback, while platform-independent alternatives are rather unknown and perceived as time-consuming and disruptive. We further elicit their requirements for platform-independent reporting tools and contribute with heuristics for designing youth-sensitive and inclusive reporting systems.
@inproceedings{baumlerYouthSensitiveHatefulContent2025,
address = {Yokohama, Japan},
series = {{CHI} '25},
title = {Towards {Youth}-{Sensitive} {Hateful} {Content} {Reporting}: {An} {Inclusive} {Focus} {Group} {Study} in {Germany}},
url = {https://www.peasec.de/paper/2025/2025_BäumlerBaderKaufholdReuter_HatefulContentReporting_CHI.pdf},
doi = {10.1145/3706598.3713542},
abstract = {Youth are particularly likely to encounter hateful internet content, which can severely impact their well-being. While most social media provide reporting mechanisms, in several countries, severe hateful content can alternatively be reported to law enforcement or dedicated reporting centers. However, in Germany, many youth never resort to reporting. While research in human-computer interaction has investigated adults’ views on platform-based reporting, youth perspectives and platform-independent alternatives have received little attention. By involving a diverse group of 47 German adolescents and young adults in eight focus group interviews, we investigate how youth-sensitive reporting systems for hateful content can be designed. We explore German youth’s reporting barriers, finding that on platforms, they feel particularly discouraged by deficient rule enforcement and feedback, while platform-independent alternatives are rather unknown and perceived as time-consuming and disruptive. We further elicit their requirements for platform-independent reporting tools and contribute with heuristics for designing youth-sensitive and inclusive reporting systems.},
booktitle = {Proceedings of the {Conference} on {Human} {Factors} in {Computing} {Systems} ({CHI}) ({Honorable} {Mentions})},
publisher = {Association for Computing Machinery},
author = {Bäumler, Julian and Bader, Helen and Kaufhold, Marc-André and Reuter, Christian},
year = {2025},
keywords = {Crisis, HCI, A-Paper, Projekt-ATHENE-CyAware, Student, Projekt-CYLENCE, AuswahlCrisis, Selected, Ranking-CORE-A*},
}
2024
[BibTeX] [Abstract] [Download PDF]
Technological and scientific progress, especially the rapid development in information technology (IT) and artificial intelligence (AI), plays a crucial role regarding questions of peace and security. This textbook, extended and updated in its second edition, addresses the significance, potential of IT, as well as the challenges it poses, with regard to peace and security. It introduces the reader to the concepts of peace, conflict, and security research, especially focusing on natural, technical and computer science perspectives. In the following sections, it sheds light on cyber conflicts, war and peace, cyber arms control, cyber attribution, infrastructures, artificial intelligence, as well ICT in peace and conflict.
@book{reuterInformationTechnologyPeace2024,
address = {Wiesbaden, Germany},
edition = {2},
title = {Information {Technology} for {Peace} and {Security} - {IT} {Applications} and {Infrastructures} in {Conflicts}, {Crises}, {War}, and {Peace}},
isbn = {978-3-658-44809-7},
url = {https://doi.org/10.1007/978-3-658-44810-3},
abstract = {Technological and scientific progress, especially the rapid development in information technology (IT) and artificial intelligence (AI), plays a crucial role regarding questions of peace and security. This textbook, extended and updated in its second edition, addresses the significance, potential of IT, as well as the challenges it poses, with regard to peace and security.
It introduces the reader to the concepts of peace, conflict, and security research, especially focusing on natural, technical and computer science perspectives. In the following sections, it sheds light on cyber conflicts, war and peace, cyber arms control, cyber attribution, infrastructures, artificial intelligence, as well ICT in peace and conflict.},
publisher = {Springer Vieweg},
author = {Reuter, Christian},
year = {2024},
keywords = {Peace, Projekt-TraCe, AuswahlPeace, Security, Projekt-CROSSING, Selected, Infrastructure, Cyberwar},
}
[BibTeX] [Abstract] [Download PDF]
In many scenarios users have to communicate sensitive data with third parties such as doctors, lawyers, insurance companies, social workers or online shops. Handing over personal data is necessary to use those services but the delegation of tasks to increase efficiency still poses the risk that personal data might be leaked. To minimize this risk and further enhance the privacy of users, we propose an interaction concept that uses layered encryption of messages to provide a trade-off between privacy and usability. Users can choose which data is additionally encrypted in an inner layer, say, for the eyes of their doctor only, and which data is available in an outer (encrypted or unencrypted) layer for all staff members. Another benefit is the hiding of sensitive data from package inspection or crawling algorithms over emails, while less critical parts can still be processed by these systems via the partial access. To investigate this concept, we derive relevant use cases for form-based communication over email from a quantitative pre-study with 1011 participants, showing that general practitioners are the most suitable use case. We developed demonstrators for this use case and evaluated them in a qualitative study with 42 participants. Our results show that the possibility of minimizing the propagation of sensitive data through additional encryption is highly appreciated and the usage of form-based communication is a promising approach for the digital transformation.
@article{linsnerDecisionbasedDataDistribution2024,
title = {Decision-based {Data} {Distribution} ({D}³): {Enabling} {Users} to {Minimize} {Data} {Propagation} in {Privacy}-sensitive {Scenarios}},
issn = {2299-0984},
url = {https://petsymposium.org/popets/2024/popets-2024-0113.php},
doi = {10.56553/popets-2024-0113},
abstract = {In many scenarios users have to communicate sensitive data with third parties such as doctors, lawyers, insurance companies, social workers or online shops. Handing over personal data is necessary to use those services but the delegation of tasks to increase efficiency still poses the risk that personal data might be leaked. To minimize this risk and further enhance the privacy of users, we propose an interaction concept that uses layered encryption of messages to provide a trade-off between privacy and usability. Users can choose which data is additionally encrypted in an inner layer, say, for the eyes of their doctor only, and which data is available in an outer (encrypted or unencrypted) layer for all staff members. Another benefit is the hiding of sensitive data from package inspection or crawling algorithms over emails, while less critical parts can still be processed by these systems via the partial access. To investigate this concept, we derive relevant use cases for form-based communication over email from a quantitative pre-study with 1011 participants, showing that general practitioners are the most suitable use case. We developed demonstrators for this use case and evaluated them in a qualitative study with 42 participants. Our results show that the possibility of minimizing the propagation of sensitive data through additional encryption is highly appreciated and the usage of form-based communication is a promising approach for the digital transformation.},
number = {4},
journal = {Proceedings on Privacy Enhancing Technologies (PoPETs)},
author = {Linsner, Sebastian and Demuth, Kilian and Fischlin, Marc and Reuter, Christian},
year = {2024},
keywords = {HCI, A-Paper, Ranking-CORE-A, Security, UsableSec, Projekt-ATHENE-PriVis, Projekt-CROSSING, Selected},
}
[BibTeX] [Abstract] [Download PDF]
Computer Emergency Response Teams (CERTs) have been established in the public sector globally to provide advisory, preventive and reactive cybersecurity services for government agencies, citizens, and businesses. Nevertheless, their responsibility of monitoring, analyzing, and communicating cyber threats and security vulnerabilities have become increasingly challenging due to the growing volume and varying quality of information disseminated through public and social channels. Based on a design case study conducted from 2021 to 2023, this paper combines three iterations of expert interviews (N=25), design workshops (N=4) and cognitive walkthroughs (N=25) to design an automated, cross-platform and real-time cybersecurity dashboard. By adopting the notion of cyber situational awareness, the study further extracts user requirements and design heuristics for enhanced threat intelligence and mission awareness in CERTs, discussing the aspects of source integration, data management, customizable visualization, relationship awareness, information assessment, software integration, (inter-)organizational collaboration, and communication of stakeholder warnings.
@inproceedings{kaufhold_we_2024,
address = {Honolulu, HI, USA},
series = {{CHI} '24},
title = {'{We} {Do} {Not} {Have} the {Capacity} to {Monitor} {All} {Media}': {A} {Design} {Case} {Study} on {Cyber} {Situational} {Awareness} in {Computer} {Emergency} {Response} {Teams}},
isbn = {979-8-4007-0330-0},
url = {https://peasec.de/paper/2024/2024_KaufholdRiebeBayerReuter_CertDesignCaseStudy_CHI.pdf},
doi = {10.1145/3613904.3642368},
abstract = {Computer Emergency Response Teams (CERTs) have been established in the public sector globally to provide advisory, preventive and reactive cybersecurity services for government agencies, citizens, and businesses. Nevertheless, their responsibility of monitoring, analyzing, and communicating cyber threats and security vulnerabilities have become increasingly challenging due to the growing volume and varying quality of information disseminated through public and social channels. Based on a design case study conducted from 2021 to 2023, this paper combines three iterations of expert interviews (N=25), design workshops (N=4) and cognitive walkthroughs (N=25) to design an automated, cross-platform and real-time cybersecurity dashboard. By adopting the notion of cyber situational awareness, the study further extracts user requirements and design heuristics for enhanced threat intelligence and mission awareness in CERTs, discussing the aspects of source integration, data management, customizable visualization, relationship awareness, information assessment, software integration, (inter-)organizational collaboration, and communication of stakeholder warnings.},
booktitle = {Proceedings of the {Conference} on {Human} {Factors} in {Computing} {Systems} ({CHI}) ({Best} {Paper} {Award})},
publisher = {Association for Computing Machinery},
author = {Kaufhold, Marc-André and Riebe, Thea and Bayer, Markus and Reuter, Christian},
year = {2024},
keywords = {HCI, A-Paper, Projekt-ATHENE-CyAware, Security, UsableSec, Projekt-CYLENCE, Projekt-CYWARN, Selected, AuswahlUsableSec, Ranking-CORE-A*, AuswahlKaufhold, HabilitationKaufhold},
}
[BibTeX] [Abstract] [Download PDF]
Misinformation represent a key challenge for society. User-centered misinformation interventions as digital countermeasures that exert a direct influence on users represent a promising means to deal with the large amounts of information available. While an extensive body of research on this topic exists, researchers are confronted with a diverse research landscape spanning multiple disciplines. This review systematizes the landscape of user-centered misinformation interventions to facilitate knowledge transfer, identify trends, and enable informed decision-making. Over 3,700 scholarly publications were screened and a systematic literature review (N=108) was conducted. A taxonomy was derived regarding intervention design (e.g., binary label), user interaction (active or passive), and timing (e.g., post exposure to misinformation). We provide a structured overview of approaches across multiple disciplines, and derive six overarching challenges for future research.
@article{hartwigLandscapeUsercenteredMisinformation2024,
title = {The {Landscape} of {User}-centered {Misinformation} {Interventions} – {A} {Systematic} {Literature} {Review}},
volume = {56},
issn = {0360-0300},
url = {https://peasec.de/paper/2024/2024_HartwigDoellReuter_LandscapeUserCentredMisinfoInterventions_CSUR.pdf},
doi = {10.1145/3674724},
abstract = {Misinformation represent a key challenge for society. User-centered misinformation interventions as digital countermeasures that exert a direct influence on users represent a promising means to deal with the large amounts of information available. While an extensive body of research on this topic exists, researchers are confronted with a diverse research landscape spanning multiple disciplines. This review systematizes the landscape of user-centered misinformation interventions to facilitate knowledge transfer, identify trends, and enable informed decision-making. Over 3,700 scholarly publications were screened and a systematic literature review (N=108) was conducted. A taxonomy was derived regarding intervention design (e.g., binary label), user interaction (active or passive), and timing (e.g., post exposure to misinformation). We provide a structured overview of approaches across multiple disciplines, and derive six overarching challenges for future research.},
number = {11},
journal = {ACM Computing Surveys (CSUR)},
author = {Hartwig, Katrin and Doell, Frederic and Reuter, Christian},
month = jul,
year = {2024},
keywords = {HCI, Peace, Projekt-NEBULA, A-Paper, Ranking-ImpactFactor, Student, Projekt-ATHENE, Selected, Ranking-CORE-A*},
}
[BibTeX] [Abstract] [Download PDF]
Misinformation poses a recurrent challenge for video-sharing platforms (VSPs) like TikTok. Obtaining user perspectives on digital interventions addressing the need for transparency (e.g., through indicators) is essential. This article offers a thorough examination of the comprehensibility, usefulness, and limitations of an indicator-based intervention from an adolescents’ perspective. This study (𝑁 = 39; aged 13-16 years) comprised two qualitative steps: (1) focus group discussions and (2) think-aloud sessions, where participants engaged with a smartphone-app for TikTok. The results offer new insights into how video-based indicators can assist adolescents’ assessments. The intervention received positive feedback, especially for its transparency, and could be applicable to new content. This paper sheds light on how adolescents are expected to be experts while also being prone to video-based misinformation, with limited understanding of an intervention’s limitations. By adopting teenagers’ perspectives, we contribute to HCI research and provide new insights into the chances and limitations of interventions for VSPs.
@inproceedings{hartwigAdolescentsEyesAssessing2024,
address = {New York, NY, USA},
series = {{CHI} '24},
title = {From {Adolescents}' {Eyes}: {Assessing} an {Indicator}-{Based} {Intervention} to {Combat} {Misinformation} on {TikTok}},
isbn = {979-8-4007-0330-0},
url = {https://peasec.de/paper/2024/2024_HartwigBiselliSchneiderReuter_MisinfoTikTok_CHI.pdf},
doi = {10.1145/3613904.3642264},
abstract = {Misinformation poses a recurrent challenge for video-sharing platforms (VSPs) like TikTok. Obtaining user perspectives on digital interventions addressing the need for transparency (e.g., through indicators) is essential. This article offers a thorough examination of the comprehensibility, usefulness, and limitations of an indicator-based intervention from an adolescents’ perspective. This study (𝑁 = 39; aged 13-16 years) comprised two qualitative steps: (1) focus group discussions and (2) think-aloud sessions, where participants
engaged with a smartphone-app for TikTok. The results offer new insights into how video-based indicators can assist adolescents’ assessments. The intervention received positive feedback, especially for its transparency, and could be applicable to new content. This paper sheds light on how adolescents are expected to be experts while also being prone to video-based misinformation, with limited understanding of an intervention’s limitations. By adopting
teenagers’ perspectives, we contribute to HCI research and provide new insights into the chances and limitations of interventions for VSPs.},
booktitle = {Proceedings of the {Conference} on {Human} {Factors} in {Computing} {Systems} ({CHI})},
publisher = {Association for Computing Machinery},
author = {Hartwig, Katrin and Biselli, Tom and Schneider, Franziska and Reuter, Christian},
year = {2024},
keywords = {Crisis, HCI, Projekt-NEBULA, A-Paper, Security, UsableSec, Projekt-ATHENE-PriVis, AuswahlCrisis, Selected, Ranking-CORE-A*},
}
[BibTeX] [Abstract] [Download PDF]
Amidst the ongoing anti-military protests in Myanmar since 2021, there is a noticeable research gap on ICT-supported activism. Generally, ICTs play an important role during political crises in conjunction with activists’ practices on the ground. Inspired by Resource Mobilization Theory, I conducted qualitative interviews (N=16) and a qualitative online survey (N=34), which demonstrate the intersection between analog and digital domains, showcasing the ingenuity of the activists, and the rapid adoption of ICTs in a country that has experienced a digital revolution within the last few years. As not all people were able to protest on-the-ground, they acted as keyboard fighters to organize protests, to share information, and to support the civil disobedience movement in Myanmar. The study identifies, inter alia, the need for better offline applications with wider coverage in times of internet shutdowns, applications that cannot be easily identified during physical controls, and providing free and secure VPN access.
@inproceedings{guntrumKeyboardFightersUse2024,
address = {New York, NY, USA},
series = {{CHI} '24},
title = {Keyboard {Fighters}: {The} {Use} of {ICTs} by {Activists} in {Times} of {Military} {Coup} in {Myanmar}},
isbn = {979-8-4007-0330-0},
url = {https://peasec.de/paper/2024/2024_Guntrum_KeyboardFightersSMParticipationInMyanmar_CHI.pdf},
doi = {10.1145/3613904.3642279},
abstract = {Amidst the ongoing anti-military protests in Myanmar since 2021, there is a noticeable research gap on ICT-supported activism. Generally, ICTs play an important role during political crises in conjunction with activists’ practices on the ground. Inspired by Resource Mobilization Theory, I conducted qualitative interviews (N=16) and a qualitative online survey (N=34), which demonstrate the intersection between analog and digital domains, showcasing the ingenuity of the activists, and the rapid adoption of ICTs in a country that has experienced a digital revolution within the last few years. As not all people were able to protest on-the-ground, they acted as keyboard fighters to organize protests, to share information, and to support the civil disobedience movement in Myanmar. The study identifies, inter alia, the need for better offline applications with wider coverage in times of internet shutdowns, applications that cannot be easily identified during physical controls, and providing free and secure VPN access.},
booktitle = {Proceedings of the {Conference} on {Human} {Factors} in {Computing} {Systems} ({CHI})},
publisher = {Association for Computing Machinery},
author = {Guntrum, Laura},
year = {2024},
keywords = {HCI, Peace, Projekt-TraCe, A-Paper, Projekt-ATHENE, Selected, Ranking-CORE-A*},
}
[BibTeX] [Abstract] [Download PDF]
Browser cookies, especially those from third parties, pose a threat to individual privacy. While it is possible in principle to control the number of cookies accepted, this choice is often neither usable nor truly informed. To address this issue, this study used semi-structured interviews (N=19) to identify attitudes and user requirements to develop an alternative personalised cookie banner, which was evaluated in an online experiment (N=157). The cookie banner explanations were tailored to the privacy knowledge of three groups of users: low, medium and high. The online experiment measured cookie choices and perceived usability of the cookie banner across three groups: an experimental group that viewed the novel cookie banner with personalisation (personalised privacy assistant), a control group that viewed the novel cookie banner without personalisation (privacy assistant) and a control group that viewed the standard cookie banner provided by the website. The results indicate that the novel cookie banner (with or without personalisation) generally resulted in significantly fewer accepted cookies and increased usability compared to the standard cookie window. In addition, the personalised cookie banner resulted in significantly fewer accepted cookies and higher usability than the non-personalised cookie banner. These results suggest that tailoring cookie banners to users’ privacy knowledge can be an effective approach to empowering users to make informed choices and better protect their privacy.
@article{biselliSupportingInformedChoices2024,
title = {Supporting {Informed} {Choices} about {Browser} {Cookies}: {The} {Impact} of {Personalised} {Cookie} {Banners}},
url = {https://petsymposium.org/popets/2024/popets-2024-0011.pdf},
doi = {10.56553/popets-2024-0011},
abstract = {Browser cookies, especially those from third parties, pose a threat to individual privacy. While it is possible in principle to control the number of cookies accepted, this choice is often neither usable nor truly informed. To address this issue, this study used semi-structured interviews (N=19) to identify attitudes and user requirements to develop an alternative personalised cookie banner, which was evaluated in an online experiment (N=157). The cookie banner explanations were tailored to the privacy knowledge of three groups of users: low, medium and high. The online experiment measured cookie choices and perceived usability of the cookie banner across three groups: an experimental group that viewed the novel cookie banner with personalisation (personalised privacy assistant), a control group that viewed the novel cookie banner without personalisation (privacy assistant) and a control group that viewed the standard cookie banner provided by the website. The results indicate that the novel cookie banner (with or without personalisation) generally resulted in significantly fewer accepted cookies and increased usability compared to the standard cookie window. In addition, the personalised cookie banner resulted in significantly fewer accepted cookies and higher usability than the non-personalised cookie banner. These results suggest that tailoring cookie banners to users' privacy knowledge can be an effective approach to empowering users to make informed choices and better protect their privacy.},
number = {1},
journal = {Proceedings on Privacy Enhancing Technologies (PoPETs)},
author = {Biselli, Tom and Utz, Laura and Reuter, Christian},
year = {2024},
keywords = {HCI, A-Paper, Ranking-CORE-A, Student, Security, UsableSec, Projekt-ATHENE-PriVis, Projekt-CROSSING, Selected, AuswahlUsableSec},
pages = {171--191},
}
2023
[BibTeX] [Abstract] [Download PDF]
Cyberspace is a fragile construct threatened by malicious cyber operations of different actors, with vulnerabilities in IT hardware and software forming the basis for such activities, thus also posing a threat to global IT security. Advancements in the field of artificial intelligence accelerate this development, either with artificial intelligence enabled cyber weapons, automated cyber defense measures, or artificial intelligence-based threat and vulnerability detection. Especially state actors, with their long-term strategic security interests, often stockpile such knowledge of vulnerabilities and exploits to enable their military or intelligence service cyberspace operations. While treaties and regulations to limit these developments and to enhance global IT security by disclosing vulnerabilities are currently being discussed on the international level, these efforts are hindered by state concerns about the disclosure of unique knowledge and about giving up tactical advantages. This leads to a situation where multiple states are likely to stockpile at least some identical exploits, with technical measures to enable a depletion process for these stockpiles that preserve state secrecy interests and consider the special constraints of interacting states as well as the requirements within such environments being non-existent. This paper proposes such a privacy-preserving approach that allows multiple state parties to privately compare their stock of vulnerabilities and exploits to check for items that occur in multiple stockpiles without revealing them so that their disclosure can be considered. We call our system ExTRUST and show that it is scalable and can withstand several attack scenarios. Beyond the intergovernmental setting, ExTRUST can also be used for other zero-trust use cases, such as bug-bounty programs.
@article{reinholdExTRUSTReducingExploit2023,
title = {{ExTRUST}: {Reducing} {Exploit} {Stockpiles} {With} a {Privacy}-{Preserving} {Depletion} {Systems} for {Inter}-{State} {Relationships}},
volume = {4},
url = {https://peasec.de/paper/2023/2023_ReinholdKuehnGuentherSchneiderReuter_ExTrust-ehem-BlockED_TTaS.pdf},
doi = {10.1109/TTS.2023.3280356},
abstract = {Cyberspace is a fragile construct threatened by malicious cyber operations of different actors, with vulnerabilities in IT hardware and software forming the basis for such activities, thus also posing a threat to global IT security. Advancements in the field of artificial intelligence accelerate this development, either with artificial intelligence enabled cyber weapons, automated cyber defense measures, or artificial intelligence-based threat and vulnerability detection. Especially state actors, with their long-term strategic security interests, often stockpile such knowledge of vulnerabilities and exploits to enable their military or intelligence service cyberspace operations. While treaties and regulations to limit these developments and to enhance global IT security by disclosing vulnerabilities are currently being discussed on the international level, these efforts are hindered by state concerns about the disclosure of unique knowledge and about giving up tactical advantages. This leads to a situation where multiple states are likely to stockpile at least some identical exploits, with technical measures to enable a depletion process for these stockpiles that preserve state secrecy interests and consider the special constraints of interacting states as well as the requirements within such environments being non-existent. This paper proposes such a privacy-preserving approach that allows multiple state parties to privately compare their stock of vulnerabilities and exploits to check for items that occur in multiple stockpiles without revealing them so that their disclosure can be considered. We call our system ExTRUST and show that it is scalable and can withstand several attack scenarios. Beyond the intergovernmental setting, ExTRUST can also be used for other zero-trust use cases, such as bug-bounty programs.},
number = {2},
journal = {IEEE Transactions on Technology and Society},
author = {Reinhold, Thomas and Kuehn, Philipp and Günther, Daniel and Schneider, Thomas and Reuter, Christian},
year = {2023},
keywords = {Peace, A-Paper, AuswahlPeace, Student, Projekt-GRKPrivacy, Projekt-CROSSING, Projekt-ATHENE-SecUrban, Selected, Cyberwar},
pages = {158--170},
}
[BibTeX] [Abstract] [Download PDF]
Farm Management Information Systems (FMIS) are an important core component of modern farming companies as they allow, e.g., to document activities, create fertilization plans, and feed digital equipment with required data. Since the entire agricultural sector is an essential component of food production, high standards of resilience should be established in the involved companies. Accordingly, the used software should also be designed with high standards on reliability and crisis capability. Based on a literature review, we found that software for farmers with certain resilience needs is lacking. Thus, we designed and evaluated a new FMIS concept with the user-centered design method. By conducting focus groups (two rounds, total N=57) in 2017 and 2019, we raised specific front-end and back-end requirements of farmers. Based on the requirements, we developed our concept for both front- and back-end in terms of a decentralized and offline-working FMIS. Through the evaluation with practitioners (N=16) of the implemented concept, we derived findings and implications, highlighting the need for privacy, stability, and offline-capability, as well as the UI-requirement to be supportive, e.g., with easy to understand icons and terms.
@article{kuntkeGeoBoxDesignEvaluation2023,
title = {{GeoBox}: {Design} and {Evaluation} of a {Tool} for {Resilient} and {Decentralized} {Data} {Management} in {Agriculture}},
volume = {43},
issn = {0144-929X},
url = {https://peasec.de/paper/2023/2023_KuntkeKaufholdLinsnerReuter_GeoBox_BIT.pdf},
doi = {10.1080/0144929X.2023.2185747},
abstract = {Farm Management Information Systems (FMIS) are an important core component of modern farming companies as they allow, e.g., to document activities, create fertilization plans, and feed digital equipment with required data. Since the entire agricultural sector is an essential component of food production, high standards of resilience should be established in the involved companies. Accordingly, the used software should also be designed with high standards on reliability and crisis capability. Based on a literature review, we found that software for farmers with certain resilience needs is lacking. Thus, we designed and evaluated a new FMIS concept with the user-centered design method. By conducting focus groups (two rounds, total N=57) in 2017 and 2019, we raised specific front-end and back-end requirements of farmers. Based on the requirements, we developed our concept for both front- and back-end in terms of a decentralized and offline-working FMIS. Through the evaluation with practitioners (N=16) of the implemented concept, we derived findings and implications, highlighting the need for privacy, stability, and offline-capability, as well as the UI-requirement to be supportive, e.g., with easy to understand icons and terms.},
number = {4},
journal = {Behaviour \& Information Technology (BIT)},
publisher = {Taylor \& Francis},
author = {Kuntke, Franz and Kaufhold, Marc-André and Linsner, Sebastian and Reuter, Christian},
year = {2023},
keywords = {A-Paper, Ranking-CORE-A, Ranking-ImpactFactor, Security, UsableSec, Projekt-AgriRegio, Projekt-GeoBox, Selected, AuswahlUsableSec},
pages = {764--786},
}
[BibTeX] [Abstract] [Download PDF]
Warning apps are used by many to receive warnings about imminent disasters. However, their potential for increasing awareness about general hazards and for increasing preparedness is currently underused. With a mixed-method design that includes a representative survey of the German population, a design workshop and an app evaluation experiment, this study investigates users’ preferences regarding non-acute preparedness alerts’ inclusion in crisis apps and the effectiveness of Nudging in this context. The experiment shows that while the social influence nudge had no significant effect compared to the control group without a nudging condition, the confrontational nudge increased the number of taken recommended preparedness measures. The evaluation indicates that the preparedness alerts increased users’ knowledge and their motivation to use a warning app. This motivation is, in contrast, decreased when the messages are perceived as a disruption. While many oppose push notifications, favor finding persuasively designed preparedness advice in a separate menu or as an optional notification.
@article{haunschildPreparednessNudgingWarning2023,
title = {Preparedness {Nudging} for {Warning} {Apps}? {A} {Mixed}-{Method} {Study} {Investigating} {Popularity} and {Effects} of {Preparedness} {Alerts} in {Warning} {Apps}},
volume = {172},
issn = {1071-5819},
url = {https://peasec.de/paper/2023/2023_HaunschildPauliReuter_NudgingWarningApps_IJHCS.pdf},
doi = {https://doi.org/10.1016/j.ijhcs.2023.102995},
abstract = {Warning apps are used by many to receive warnings about imminent disasters. However, their potential for increasing awareness about general hazards and for increasing preparedness is currently underused. With a mixed-method design that includes a representative survey of the German population, a design workshop and an app evaluation experiment, this study investigates users’ preferences regarding non-acute preparedness alerts’ inclusion in crisis apps and the effectiveness of Nudging in this context. The experiment shows that while the social influence nudge had no significant effect compared to the control group without a nudging condition, the confrontational nudge increased the number of taken recommended preparedness measures. The evaluation indicates that the preparedness alerts increased users’ knowledge and their motivation to use a warning app. This motivation is, in contrast, decreased when the messages are perceived as a disruption. While many oppose push notifications, favor finding persuasively designed preparedness advice in a separate menu or as an optional notification.},
journal = {International Journal on Human-Computer Studies (IJHCS)},
author = {Haunschild, Jasmin and Pauli, Selina and Reuter, Christian},
year = {2023},
keywords = {Crisis, Projekt-emergenCITY, A-Paper, Ranking-ImpactFactor, Student, Projekt-ATHENE-SecUrban, AuswahlCrisis, Selected},
pages = {102995},
}
[BibTeX] [Abstract] [Download PDF]
Data augmentation, the artificial creation of training data for machine learning by transformations, is a widely studied research field across machine learning disciplines. While it is useful for increasing a model’s generalization capabilities, it can also address many other challenges and problems, from overcoming a limited amount of training data, to regularizing the objective, to limiting the amount data used to protect privacy. Based on a precise description of the goals and applications of data augmentation and a taxonomy for existing works, this survey is concerned with data augmentation methods for textual classification and aims to provide a concise and comprehensive overview for researchers and practitioners. Derived from the taxonomy, we divide more than 100 methods into 12 different groupings and give state-of-the-art references expounding which methods are highly promising by relating them to each other. Finally, research perspectives that may constitute a building block for future work are provided.
@article{bayer_survey_2023,
title = {A {Survey} on {Data} {Augmentation} for {Text} {Classification}},
volume = {55},
url = {http://www.peasec.de/paper/2023/2023_BayerKaufholdReuter_SurveyDataAugmentationTextClassification_CSUR.pdf},
doi = {10.1145/3544558},
abstract = {Data augmentation, the artificial creation of training data for machine learning by transformations, is a widely studied research field across machine learning disciplines. While it is useful for increasing a model's generalization capabilities, it can also address many other challenges and problems, from overcoming a limited amount of training data, to regularizing the objective, to limiting the amount data used to protect privacy. Based on a precise description of the goals and applications of data augmentation and a taxonomy for existing works, this survey is concerned with data augmentation methods for textual classification and aims to provide a concise and comprehensive overview for researchers and practitioners. Derived from the taxonomy, we divide more than 100 methods into 12 different groupings and give state-of-the-art references expounding which methods are highly promising by relating them to each other. Finally, research perspectives that may constitute a building block for future work are provided.},
number = {7},
journal = {ACM Computing Surveys (CSUR)},
author = {Bayer, Markus and Kaufhold, Marc-André and Reuter, Christian},
year = {2023},
keywords = {Crisis, Projekt-emergenCITY, A-Paper, Ranking-ImpactFactor, Projekt-ATHENE-SecUrban, Projekt-CYWARN, AuswahlCrisis, Selected, Ranking-CORE-A*, AuswahlKaufhold, HabilitationKaufhold},
pages = {1--39},
}
2022
[BibTeX] [Abstract] [Download PDF]
In the digital age, the vision of autonomous vehicles (AVs) is vibrant. Research is being conducted worldwide to inte-grate AVs into our everyday lives in the future, spending consid-erable amounts of money in the development process. Actors from both engineering as well as social sciences are involved in this re-search, with technical disciplines strongly dominating. In addition to perceived progress of numerous newly developed technologies such as AVs, challenges should also be referred to. According to research analysis, the transferability of autonomous cars to the military sphere seems to be frequently forgotten or ignored (dual-use). Since not much research has been conducted in Germany on the potential deployment of autonomous driving development steps into military domains, 25 semi-structured interviews with de-velopers and researchers and actors involved in the field, were conducted in 2020. The paper identifies that the majority of re-spondents interviewed were aware of general existing dual-use de-bates, however, few had reflected about dual-use issues regarding a possible transfer of their own development processes in the con-text of autonomous driving to military applications, intensively. One reason is the small-scale nature of research, another is the complexity of the field, which enables the engineer’s alienation from their responsibility for the artefacts’ use. Moreover, it has become clear that hardly any conversations among colleagues oc-cur about possible misuse and that no standardized policy guide-lines exist, which provide information about possible risk. To raise dual-use awareness, scientific contributions, risk education, and interdisciplinary discussions are essential.
@article{schwartzVisionThreatAwareness2022,
title = {Vision or {Threat} – {Awareness} for {Dual}-{Use} in the {Development} of {Autonomous} {Driving}},
volume = {3},
issn = {2637-6415},
url = {https://www.peasec.de/paper/2022/2022_SchwartzGuntrumReuter_VisionorThreatAwarenessDualUseAutonomousDriving_IEEE-TTS.pdf},
doi = {10.1109/TTS.2022.3182310},
abstract = {In the digital age, the vision of autonomous vehicles (AVs) is vibrant. Research is being conducted worldwide to inte-grate AVs into our everyday lives in the future, spending consid-erable amounts of money in the development process. Actors from both engineering as well as social sciences are involved in this re-search, with technical disciplines strongly dominating. In addition to perceived progress of numerous newly developed technologies such as AVs, challenges should also be referred to. According to research analysis, the transferability of autonomous cars to the military sphere seems to be frequently forgotten or ignored (dual-use). Since not much research has been conducted in Germany on the potential deployment of autonomous driving development steps into military domains, 25 semi-structured interviews with de-velopers and researchers and actors involved in the field, were conducted in 2020. The paper identifies that the majority of re-spondents interviewed were aware of general existing dual-use de-bates, however, few had reflected about dual-use issues regarding a possible transfer of their own development processes in the con-text of autonomous driving to military applications, intensively. One reason is the small-scale nature of research, another is the complexity of the field, which enables the engineer’s alienation from their responsibility for the artefacts’ use. Moreover, it has become clear that hardly any conversations among colleagues oc-cur about possible misuse and that no standardized policy guide-lines exist, which provide information about possible risk. To raise dual-use awareness, scientific contributions, risk education, and interdisciplinary discussions are essential.},
language = {en},
number = {3},
journal = {IEEE Transactions on Technology and Society},
author = {Schwartz, Sebastian and Guntrum, Laura and Reuter, Christian},
year = {2022},
keywords = {Peace, Projekt-TraCe, A-Paper, Ranking-ImpactFactor, AuswahlPeace, Selected, Projekt-ATHENE-FANCY},
pages = {163--174},
}
[BibTeX] [Abstract] [Download PDF]
Mobilising helpers in the event of a flood or letting friends know that you are okay in the event of a terrorist attack – more and more people are using social media in emergency, crisis or disaster situations. Storms, floods, attacks or pandemics (esp. COVID-19) show that citizens use social media to inform themselves or to coordinate. This thesis presents qualitative and quantitative studies on the attitudes of emergency services and citizens in Europe towards social media in emergencies. Across the individual sub-studies, almost 10,000 people are surveyed including representative studies in the Netherlands, Germany, the UK and Italy. The work empirically shows that social media is increasingly important for emergency services, both for prevention and during crises; that private use of social media is a driving force in shaping opinions for organisational use; and that citizens have high expectations towards authorities, especially monitoring social media is expected, and sometimes responses within one hour. Depending on the risk culture, the data show further differences, e.g. whether the state (Germany) or the individual (Netherlands) is seen as primarily responsible for coping with the situation.
@book{reuterEuropeanPerspectiveCrisis2022a,
address = {Nijmegen},
title = {A {European} {Perspective} on {Crisis} {Informatics}: {Citizens}' and {Authorities}' attitudes towards {Social} {Media} for {Public} {Safety} and {Security}},
url = {https://repository.ubn.ru.nl/handle/2066/253000},
doi = {10.1007/978-3-658-39720-3},
abstract = {Mobilising helpers in the event of a flood or letting friends know that you are okay in the event of a terrorist attack – more and more people are using social media in emergency, crisis or disaster situations. Storms, floods, attacks or pandemics (esp. COVID-19) show that citizens use social media to inform themselves or to coordinate. This thesis presents qualitative and quantitative studies on the attitudes of emergency services and citizens in Europe towards social media in emergencies. Across the individual sub-studies, almost 10,000 people are surveyed including representative studies in the Netherlands, Germany, the UK and Italy. The work empirically shows that social media is increasingly important for emergency services, both for prevention and during crises; that private use of social media is a driving force in shaping opinions for organisational use; and that citizens have high expectations towards authorities, especially monitoring social media is expected, and sometimes responses within one hour. Depending on the risk culture, the data show further differences, e.g. whether the state (Germany) or the individual (Netherlands) is seen as primarily responsible for coping with the situation.},
publisher = {The Radboud University Thesis Repository},
author = {Reuter, Christian},
year = {2022},
keywords = {Crisis, HCI, Projekt-emergenCITY, SocialMedia, Projekt-ATHENE-SecUrban, AuswahlCrisis, Selected, Dissertation, Projekt-EmerGent, Projekt-KontiKat},
}
[BibTeX] [Abstract] [Download PDF]
Agriculture is subject to high demands regarding resilience as it is an essential component of the food production chain. In the agricultural sector, there is an increasing usage of digital tools that rely on communication and energy infrastructures. Should disruption occur, such strengthened dependencies on other infrastructures increase the probability of ripple effects. Thus, there is a need to analyze the resilience of the agricultural sector with a specific focus on the effects of digitalization. This study works out resilience capacities of the interconnected technologies used in farm systems based on the experiences and opinions of farmers. Information was gathered through focus group interviews with farmers (N = 52) and a survey with participants from the agricultural sector (N = 118). In particular, the focus is put on the digital tools and other information and communication technologies they use. Based on a definition of resilience capacities, we evaluate resilience regarding energy and communication demands in various types of farm systems. Especially important are the resilience aspects of modern systems’ digital communication as well as the poorly developed and nonresilient network infrastructure in rural areas that contrast with the claim for a resilient agriculture. The result is a low robustness capacity, as our analysis concludes with the risk of food production losses.
@article{kuntkeResilienceAgricultureCommunication2022,
title = {Resilience in {Agriculture}: {Communication} and {Energy} {Infrastructure} {Dependencies} of {German} {Farmers}},
volume = {13},
issn = {2192-6395},
url = {https://link.springer.com/article/10.1007/s13753-022-00404-7},
doi = {10.1007/s13753-022-00404-7},
abstract = {Agriculture is subject to high demands regarding resilience as it is an essential component of the food production chain. In the agricultural sector, there is an increasing usage of digital tools that rely on communication and energy infrastructures. Should disruption occur, such strengthened dependencies on other infrastructures increase the probability of ripple effects. Thus, there is a need to analyze the resilience of the agricultural sector with a specific focus on the effects of digitalization. This study works out resilience capacities of the interconnected technologies used in farm systems based on the experiences and opinions of farmers. Information was gathered through focus group interviews with farmers (N = 52) and a survey with participants from the agricultural sector (N = 118). In particular, the focus is put on the digital tools and other information and communication technologies they use. Based on a definition of resilience capacities, we evaluate resilience regarding energy and communication demands in various types of farm systems. Especially important are the resilience aspects of modern systems’ digital communication as well as the poorly developed and nonresilient network infrastructure in rural areas that contrast with the claim for a resilient agriculture. The result is a low robustness capacity, as our analysis concludes with the risk of food production losses.},
number = {2},
journal = {International Journal of Disaster Risk Science (IJDRS)},
author = {Kuntke, Franz and Linsner, Sebastian and Steinbrink, Enno and Franken, Jonas and Reuter, Christian},
month = apr,
year = {2022},
keywords = {A-Paper, Ranking-ImpactFactor, Security, Projekt-GRKPrivacy, Projekt-AgriRegio, Projekt-GeoBox, RSF, Selected, Projekt-HyServ, Ranking-CORE-B},
pages = {214--229},
}
[BibTeX] [Abstract] [Download PDF]
Nudging users to keep them secure online has become a growing research field in cybersecurity. While existing approaches are mainly blackbox based, showing aggregated visualisations as one-size-fits-all nudges, personalisation turned out promising to enhance the efficacy of nudges within the high variance of users and contexts. This article presents a disaggregated whitebox-based visualisation of critical information as a novel nudge. By segmenting users according to their decision-making and information processing styles, we investigate if the novel nudge is more effective for specific users than a common black-box nudge. Based on existing literature about critical factors in password security, we designed a dynamic radar chart and parallel coordinates as disaggregated visualisations. We evaluated the short-term effectiveness and users’ perception of the nudges in a think-aloud prestudy and a representative online evaluation (N=1.012). Our findings suggest that dynamic radar charts present a moderately effective nudge towards stronger passwords regarding short-term efficacy and are appreciated particularly by players of role-playing games.
@article{hartwigNudgingUsersBetter2022,
title = {Nudging {Users} {Towards} {Better} {Security} {Decisions} in {Password} {Creation} {Using} {Whitebox}-based {Multidimensional} {Visualizations}},
volume = {41},
url = {https://peasec.de/paper/2022/2022_HartwigReuter_WhiteboxMultidimensionalNudges_BIT.pdf},
doi = {10.1080/0144929X.2021.1876167},
abstract = {Nudging users to keep them secure online has become a growing research field in cybersecurity. While existing approaches are mainly blackbox based, showing aggregated visualisations as one-size-fits-all nudges, personalisation turned out promising to enhance the efficacy of nudges within the high variance of users and contexts. This article presents a disaggregated whitebox-based visualisation of critical information as a novel nudge. By segmenting users according to their decision-making and information processing styles, we investigate if the novel nudge is more effective for specific users than a common black-box nudge. Based on existing literature about critical factors in password security, we designed a dynamic radar chart and parallel coordinates as disaggregated visualisations. We evaluated the short-term effectiveness and users' perception of the nudges in a think-aloud prestudy and a representative online evaluation (N=1.012). Our findings suggest that dynamic radar charts present a moderately effective nudge towards stronger passwords regarding short-term efficacy and are appreciated particularly by players of role-playing games.},
number = {7},
journal = {Behaviour \& Information Technology (BIT)},
author = {Hartwig, Katrin and Reuter, Christian},
year = {2022},
keywords = {HCI, A-Paper, Ranking-CORE-A, Ranking-ImpactFactor, Security, UsableSec, Projekt-CROSSING, Selected, Projekt-ATHENE-FANCY, AuswahlUsableSec},
pages = {1357--1380},
}
[BibTeX] [Abstract] [Download PDF]
The backbone network of submarine communication cables (SCC) carries 98\% of international internet traffic. Coastal and island states strongly depend on this physical internet infrastructure to provide internet connectivity. Although about 100 SCC breakdowns of human or natural origin occur at yearly average, a literature review reveals that there is no approach to assess individual state vulnerability to SCC failure in global comparison. In this article, the global SCC network is modeled based on publicly available data. Besides the analysis of the global network properties, a focus is put on remaining bandwidth capacities in three different failure scenario simulations of SCC breakdowns. As a result, this study identifies 15 highly vulnerable states and overseas territories, and another 28 territories that are classified as partially vulnerable to SCC failures. Since economic market decisions shape the structure of the SCC network, an uneven distribution of redundancies and the resulting vulnerability of disadvantaged economies can be confirmed. Therefore, the study’s findings may contribute to a better assessment of the necessity of preventive protection measures of critical telecommunication infrastructures in states and territories characterized by high and medium vulnerability.
@article{frankenDigitalDivideState2022,
title = {The {Digital} {Divide} in {State} {Vulnerability} to {Submarine} {Communications} {Cable} {Failure}},
volume = {38},
url = {https://peasec.de/paper/2022/2022_FrankenReinholdReichertReuter_DigitalDivideStateVulnerabilitySubmarineCommunicationsCable_IJCIP.pdf},
doi = {10.1016/j.ijcip.2022.100522},
abstract = {The backbone network of submarine communication cables (SCC) carries 98\% of international internet traffic. Coastal and island states strongly depend on this physical internet infrastructure to provide internet connectivity. Although about 100 SCC breakdowns of human or natural origin occur at yearly average, a literature review reveals that there is no approach to assess individual state vulnerability to SCC failure in global comparison. In this article, the global SCC network is modeled based on publicly available data. Besides the analysis of the global network properties, a focus is put on remaining bandwidth capacities in three different failure scenario simulations of SCC breakdowns. As a result, this study identifies 15 highly vulnerable states and overseas territories, and another 28 territories that are classified as partially vulnerable to SCC failures. Since economic market decisions shape the structure of the SCC network, an uneven distribution of redundancies and the resulting vulnerability of disadvantaged economies can be confirmed. Therefore, the study's findings may contribute to a better assessment of the necessity of preventive protection measures of critical telecommunication infrastructures in states and territories characterized by high and medium vulnerability.},
number = {100522},
journal = {International Journal of Critical Infrastructure Protection (IJCIP)},
author = {Franken, Jonas and Reinhold, Thomas and Reichert, Lilian and Reuter, Christian},
year = {2022},
keywords = {A-Paper, Ranking-ImpactFactor, AuswahlPeace, Student, Security, Projekt-AgriRegio, Projekt-ATHENE-SecUrban, Selected},
pages = {1--15},
}
2021
[BibTeX] [Abstract] [Download PDF]
Spillover effects describe the process of a company benefiting from the R&D activities of another one and thereby gaining an economic advantage. One prominent approach for measuring spillover effects is based on the analysis of patent citation networks. Taking social media analytics and knowledge economics into account, this paper presents a complementary approach to quantify spillover effects from defense to civilian research and development, analyzing 513 employment biographies from the social network LinkedIn. Using descriptive network analysis, we investigate the emigration of personnel of the German defense industry to other civilian producers. Thereby, our study reveals that in the last decade, employees of defense suppliers have changed positions significantly less often, with 3.24 changes on average than professionals who have worked more than 50\% of their jobs in the civilian sector, having changed 4.61 times on average. Our work illustrates the churn behavior and how spillover effects between defense and civilian sectors can be measured using social career networks such as LinkedIn.
@article{riebeMeasuringSpilloverEffects2021,
title = {Measuring {Spillover} {Effects} from {Defense} to {Civilian} {Sectors} – {A} {Quantitative} {Approach} {Using} {LinkedIn}},
volume = {32},
url = {https://peasec.de/paper/2021/2021_RiebeSchmidReuter_SpilloverEffectsDefensetoCivilianLinkedIn_PDE.pdf},
doi = {10.1080/10242694.2020.1755787},
abstract = {Spillover effects describe the process of a company benefiting from the R\&D activities of another one and thereby gaining an economic advantage. One prominent approach for measuring spillover effects is based on the analysis of patent citation networks. Taking social media analytics and knowledge economics into account, this paper presents a complementary approach to quantify spillover effects from defense to civilian research and development, analyzing 513 employment biographies from the social network LinkedIn. Using descriptive network analysis, we investigate the emigration of personnel of the German defense industry to other civilian producers. Thereby, our study reveals that in the last decade, employees of defense suppliers have changed positions significantly less often, with 3.24 changes on average than professionals who have worked more than 50\% of their jobs in the civilian sector, having changed 4.61 times on average. Our work illustrates the churn behavior and how spillover effects between defense and civilian sectors can be measured using social career networks such as LinkedIn.},
number = {7},
journal = {Defence and Peace Economics},
author = {Riebe, Thea and Schmid, Stefka and Reuter, Christian},
year = {2021},
keywords = {Peace, A-Paper, Ranking-ImpactFactor, AuswahlPeace, Projekt-ATHENE-SecUrban, Selected, Cyberwar, Projekt-DualUse},
pages = {773--785},
}
[BibTeX] [Abstract] [Download PDF]
Die zweite, aktualisierte Auflage dieses Lehr- und Fachbuchs gibt eine fundierte und praxisbezogene Einführung sowie einen Überblick über Grundlagen, Methoden und Anwendungen der Mensch-Computer-Interaktion im Kontext von Sicherheit, Notfällen, Krisen, Katastrophen, Krieg und Frieden. Dies adressierend werden interaktive, mobile, ubiquitäre und kooperative Technologien sowie soziale Medien vorgestellt. Hierbei finden klassische Themen wie benutzbare (IT-)Sicherheit, Industrie 4.0, Katastrophenschutz, Medizin und Automobil, aber auch Augmented Reality, Crowdsourcing, Shitstorm Management, Social Media Analytics und Cyberwar ihren Platz. Methodisch wird das Spektrum von Usable Safety bis Usable Security Engineering von Analyse über Design bis Evaluation abgedeckt. Das Buch eignet sich ebenso als Lehrbuch für Studierende wie als Handbuch für Wissenschaftler, Designer, Entwickler und Anwender.
@book{reuterSicherheitskritischeMenschComputerInteraktionInteraktive2021,
address = {Wiesbaden},
edition = {2},
title = {Sicherheitskritische {Mensch}-{Computer}-{Interaktion}: {Interaktive} {Technologien} und {Soziale} {Medien} im {Krisen}- und {Sicherheitsmanagement} ({Zweite} {Auflage})},
isbn = {978-3-658-32795-8},
url = {https://www.springer.com/de/book/9783658327941},
abstract = {Die zweite, aktualisierte Auflage dieses Lehr- und Fachbuchs gibt eine fundierte und praxisbezogene Einführung sowie einen Überblick über Grundlagen, Methoden und Anwendungen der Mensch-Computer-Interaktion im Kontext von Sicherheit, Notfällen, Krisen, Katastrophen, Krieg und Frieden. Dies adressierend werden interaktive, mobile, ubiquitäre und kooperative Technologien sowie soziale Medien vorgestellt. Hierbei finden klassische Themen wie benutzbare (IT-)Sicherheit, Industrie 4.0, Katastrophenschutz, Medizin und Automobil, aber auch Augmented Reality, Crowdsourcing, Shitstorm Management, Social Media Analytics und Cyberwar ihren Platz. Methodisch wird das Spektrum von Usable Safety bis Usable Security Engineering von Analyse über Design bis Evaluation abgedeckt. Das Buch eignet sich ebenso als Lehrbuch für Studierende wie als Handbuch für Wissenschaftler, Designer, Entwickler und Anwender.},
publisher = {Springer Vieweg},
author = {Reuter, Christian},
year = {2021},
keywords = {HCI, Projekt-emergenCITY, Peace, SocialMedia, Security, UsableSec, Projekt-ATHENE-SecUrban, Projekt-CYWARN, AuswahlCrisis, Selected, Infrastructure, Projekt-KontiKat},
}
[BibTeX] [Abstract] [Download PDF]
Technological progress can disrupt domains and change the way we work and collaborate. This paper presents a qualitative study with 52 German farmers that investigates the impact of the ongoing digitalization process in agriculture and discusses the implications for privacy research. As in other domains, the introduction of digital tools and services leads to the data itself becoming a resource. Sharing this data with products along the supply chain is favored by retailers and consumers, who benefit from traceability through transparency. However, transparency can pose a privacy risk. Having insight into the business data of others along the supply chain provides an advantage in terms of market position. This is particularly true in agriculture, where there is already a significant imbalance of power between actors. A multitude of small and medium-sized farming businesses are opposed by large upstream and downstream players that drive technological innovation. Further weakening the market position of farmers could lead to severe consequences for the entire sector. We found that on the one hand, privacy behaviors are affected by adoption of digitalization, and on the other hand, privacy itself influences adoption of digital tools. Our study sheds light on the emerging challenges for farmers and the role of privacy in the process of digitalization in agriculture.
@article{linsnerRolePrivacyDigitalization2021,
title = {The {Role} of {Privacy} in {Digitalization} – {Analysing} the {German} {Farmers}' {Perspective}},
volume = {2021},
url = {https://www.petsymposium.org/2021/files/papers/issue3/popets-2021-0050.pdf},
doi = {10.2478/popets-2021-0050},
abstract = {Technological progress can disrupt domains
and change the way we work and collaborate. This paper presents a qualitative study with 52 German farmers
that investigates the impact of the ongoing digitalization process in agriculture and discusses the implications for privacy research. As in other domains, the introduction of digital tools and services leads to the data
itself becoming a resource. Sharing this data with products along the supply chain is favored by retailers and
consumers, who benefit from traceability through transparency. However, transparency can pose a privacy risk.
Having insight into the business data of others along the
supply chain provides an advantage in terms of market
position. This is particularly true in agriculture, where
there is already a significant imbalance of power between actors. A multitude of small and medium-sized
farming businesses are opposed by large upstream and
downstream players that drive technological innovation.
Further weakening the market position of farmers could
lead to severe consequences for the entire sector. We
found that on the one hand, privacy behaviors are affected by adoption of digitalization, and on the other
hand, privacy itself influences adoption of digital tools.
Our study sheds light on the emerging challenges for
farmers and the role of privacy in the process of digitalization in agriculture.},
number = {3},
journal = {Proceedings on Privacy Enhancing Technologies (PoPETs)},
author = {Linsner, Sebastian and Kuntke, Franz and Steinbrink, Enno and Franken, Jonas and Reuter, Christian},
year = {2021},
keywords = {HCI, A-Paper, Ranking-CORE-A, Ranking-ImpactFactor, Security, UsableSec, Projekt-GRKPrivacy, Projekt-GeoBox, Selected, AuswahlUsableSec, Projekt-HyServ},
pages = {334--350},
}
[BibTeX] [Abstract] [Download PDF]
During crises such as the COVID-19 pandemic, people spontaneously initiate support groups, while establishedorganizations like soccer clubs set non-regular goals, both offering help. Interested in the coordination of suchhelp and potential challenges of collaboration, we conducted a virtual ethnography of a multi-level networklocated in Germany. We focused on aims, activities, and technological mediation, with Activity Theory astheoretical framework. Our findings show that the organizational aim of coordinating help was successfullyachieved by connecting heterogeneous actors through digitization and institutionalization. Enabled by thecontext of the COVID-19 pandemic crisis, the network acted virtually, but was also able to integrate analogspaces of help. We identified six crucial implications regarding the use of technology and collaboration forbuilding a successful volunteering network.
@article{haeslerStrongerTogetherHow2021,
title = {Stronger {Together}: {How} {Neighborhood} {Groups} {Build} up a {Virtual} {Network} during the {COVID}-19 {Pandemic}},
volume = {5},
url = {https://peasec.de/paper/2021/2021_HaeslerSchmidVierneiselReuter_StrongerTogetherVirtualNetworkCOVID19_CSCW.pdf},
doi = {10.1145/3476045},
abstract = {During crises such as the COVID-19 pandemic, people spontaneously initiate support groups, while establishedorganizations like soccer clubs set non-regular goals, both offering help. Interested in the coordination of suchhelp and potential challenges of collaboration, we conducted a virtual ethnography of a multi-level networklocated in Germany. We focused on aims, activities, and technological mediation, with Activity Theory astheoretical framework. Our findings show that the organizational aim of coordinating help was successfullyachieved by connecting heterogeneous actors through digitization and institutionalization. Enabled by thecontext of the COVID-19 pandemic crisis, the network acted virtually, but was also able to integrate analogspaces of help. We identified six crucial implications regarding the use of technology and collaboration forbuilding a successful volunteering network.},
number = {CSCW2},
journal = {Proceedings of the ACM: Human Computer Interaction (PACM): Computer-Supported Cooperative Work and Social Computing},
author = {Haesler, Steffen and Schmid, Stefka and Vierneisel, Annemike Sophia and Reuter, Christian},
year = {2021},
keywords = {Crisis, HCI, Projekt-emergenCITY, A-Paper, Ranking-CORE-A, Projekt-ATHENE-SecUrban, AuswahlCrisis, Selected},
}
2020
[BibTeX] [Abstract] [Download PDF]
Since the emergence of so-called fake news on the internet and in social media, platforms such as Facebook have started to take countermeasures, and researchers have begun looking into this phenomenon from a variety of perspectives. A large number of scientific work has investigated ways to detect fake news automatically. Less attention has been paid to the subsequent step, i.e., what to do when you are aware of the inaccuracy of claims in social media. This work takes a user-centered approach on means to counter identified mis- and disinformation in social media. We conduct a three-step study design on how approaches in social media should be presented to respect the users’ needs and experiences and how effective they are. As our first step, in an online survey representative for some factors to the German adult population, we enquire regarding their strategies on handling information in social media, and their opinion regarding possible solutions — focusing on the approach of displaying a warning on inaccurate posts. In a second step, we present five potential approaches for countermeasures identified in related work to interviewees for qualitative input. We discuss (1) warning, (2) related articles, (3) reducing the size, (4) covering, and (5) requiring confirmation. Based on the interview feedback, as the third step of this study, we select, improve, and examine four promising approaches on how to counter misinformation. We conduct an online experiment to test their effectiveness on the perceived accuracy of false headlines and also ask for the users’ preferences. In this study, we find that users welcome warning-based approaches to counter fake news and are somewhat critical with less transparent methods. Moreover, users want social media platforms to explain why a post was marked as disputed. The results regarding effectiveness are similar: Warning-based approaches are shown to be effective in reducing the perceived accuracy of false headlines. Moreover, adding an explanation to the warning leads to the most significant results. In contrast, we could not find a significant effect on one of Facebook’s current approaches (reduced post size and fact-checks in related articles).
@article{kirchnerCounteringFakeNews2020,
title = {Countering {Fake} {News}: {A} {Comparison} of {Possible} {Solutions} {Regarding} {User} {Acceptance} and {Effectiveness}},
volume = {4},
url = {http://www.peasec.de/paper/2020/2020_KirchnerReuter_CounteringFakeNews_CSCW.pdf},
doi = {10.1145/3415211},
abstract = {Since the emergence of so-called fake news on the internet and in social media, platforms such as Facebook have started to take countermeasures, and researchers have begun looking into this phenomenon from a variety of perspectives. A large number of scientific work has investigated ways to detect fake news automatically. Less attention has been paid to the subsequent step, i.e., what to do when you are aware of the inaccuracy of claims in social media. This work takes a user-centered approach on means to counter identified mis- and disinformation in social media. We conduct a three-step study design on how approaches in social media should be presented to respect the users' needs and experiences and how effective they are. As our first step, in an online survey representative for some factors to the German adult population, we enquire regarding their strategies on handling information in social media, and their opinion regarding possible solutions — focusing on the approach of displaying a warning on inaccurate posts. In a second step, we present five potential approaches for countermeasures identified in related work to interviewees for qualitative input. We discuss (1) warning, (2) related articles, (3) reducing the size, (4) covering, and (5) requiring confirmation. Based on the interview feedback, as the third step of this study, we select, improve, and examine four promising approaches on how to counter misinformation. We conduct an online experiment to test their effectiveness on the perceived accuracy of false headlines and also ask for the users' preferences. In this study, we find that users welcome warning-based approaches to counter fake news and are somewhat critical with less transparent methods. Moreover, users want social media platforms to explain why a post was marked as disputed. The results regarding effectiveness are similar: Warning-based approaches are shown to be effective in reducing the perceived accuracy of false headlines. Moreover, adding an explanation to the warning leads to the most significant results. In contrast, we could not find a significant effect on one of Facebook's current approaches (reduced post size and fact-checks in related articles).},
number = {CSCW2},
journal = {Proceedings of the ACM: Human Computer Interaction (PACM): Computer-Supported Cooperative Work and Social Computing},
publisher = {ACM},
author = {Kirchner, Jan and Reuter, Christian},
year = {2020},
note = {Place: Austin, USA},
keywords = {Crisis, HCI, Projekt-emergenCITY, A-Paper, Ranking-CORE-A, Ranking-ImpactFactor, Student, Projekt-ATHENE, AuswahlCrisis, Selected, Cooperation},
pages = {140:1--140:28},
}
[BibTeX] [Abstract] [Download PDF]
The research field of crisis informatics examines, amongst others, the potentials and barriers of social media use during conflicts and crises. Social media allow emergency services to reach the public easily in the context of crisis communication and receive valuable information (e.g. pictures) from social media data. However, the vast amount of data generated during large-scale incidents can lead to issues of information overload and quality. To mitigate these issues, this paper proposes the semi-automatic creation of alerts including keyword, relevance and information quality filters based on cross-platform social media data. We conducted empirical studies and workshops with emergency services across Europe to raise requirements, then iteratively designed and implemented an approach to support emergency services, and performed multiple evaluations, including live demonstrations and field trials, to research the potentials of social media-based alerts. Finally, we present the findings and implications based on semi-structured interviews with emergency services, highlighting the need for usable configurability and white-box algorithm representation.
@article{kaufholdMitigatingInformationOverload2020,
title = {Mitigating {Information} {Overload} in {Social} {Media} during {Conflicts} and {Crises}: {Design} and {Evaluation} of a {Cross}-{Platform} {Alerting} {System}},
volume = {39},
url = {https://peasec.de/paper/2020/2020_KaufholdRuppReuterHabdank_MitigatingInformationOverload_BIT.pdf},
doi = {10.1080/0144929X.2019.1620334},
abstract = {The research field of crisis informatics examines, amongst others, the potentials and barriers of social media use during conflicts and crises. Social media allow emergency services to reach the public easily in the context of crisis communication and receive valuable information (e.g. pictures) from social media data. However, the vast amount of data generated during large-scale incidents can lead to issues of information overload and quality. To mitigate these issues, this paper proposes the semi-automatic creation of alerts including keyword, relevance and information quality filters based on cross-platform social media data. We conducted empirical studies and workshops with emergency services across Europe to raise requirements, then iteratively designed and implemented an approach to support emergency services, and performed multiple evaluations, including live demonstrations and field trials, to research the potentials of social media-based alerts. Finally, we present the findings and implications based on semi-structured interviews with emergency services, highlighting the need for usable configurability and white-box algorithm representation.},
number = {3},
journal = {Behaviour \& Information Technology (BIT)},
author = {Kaufhold, Marc-André and Rupp, Nicola and Reuter, Christian and Habdank, Matthias},
year = {2020},
keywords = {Crisis, HCI, A-Paper, Ranking-CORE-A, Ranking-ImpactFactor, SocialMedia, Security, AuswahlCrisis, Selected, Projekt-ATHENE-FANCY, Projekt-KontiKat, AuswahlKaufhold},
pages = {319--342},
}
2019
[BibTeX] [Abstract] [Download PDF]
Usage of social media during emergencies and respective perceptions vary across countries. Our representative survey of 7,071 citizens in Europe (Germany, Italy, the Netherlands and the United Kingdom) shows differences of current use of social media in emergencies, expectations towards authorities monitoring social media, intensity of perceiving barriers regarding the use as well as variances concerning the (likelihood of future) use of mobile apps. While German and British participants’ frequency of use of social media is medium and low, respectively, Italian and Dutch respondents use them relatively frequently. Our comparison of the four countries allows for an interpretation of divergent behavior across countries with respect to risk cultures as well as expanding the respective model to social media contexts. At the same time, our findings stress that across the four European countries participants assessed similar advantages like dissemination of information and barriers like false rumors with respect to use social media during emergencies. Distributed equally across nations, age and gender showed significant relationships with social media usage which, among other findings, suggests being helpful for effective implementation of management structures using new technologies.
@article{reuterImpactRiskCultures2019,
title = {The {Impact} of {Risk} {Cultures}: {Citizens}' {Perception} of {Social} {Media} {Use} in {Emergencies} across {Europe}},
volume = {148},
url = {http://www.peasec.de/paper/2019/2019_ReuterKaufholdSchmidSpielhoferHahne_TheImpactofRiskCultures_TFSC.pdf},
doi = {10.1016/j.techfore.2019.119724},
abstract = {Usage of social media during emergencies and respective perceptions vary across countries. Our representative survey of 7,071 citizens in Europe (Germany, Italy, the Netherlands and the United Kingdom) shows differences of current use of social media in emergencies, expectations towards authorities monitoring social media, intensity of perceiving barriers regarding the use as well as variances concerning the (likelihood of future) use of mobile apps. While German and British participants' frequency of use of social media is medium and low, respectively, Italian and Dutch respondents use them relatively frequently. Our comparison of the four countries allows for an interpretation of divergent behavior across countries with respect to risk cultures as well as expanding the respective model to social media contexts. At the same time, our findings stress that across the four European countries participants assessed similar advantages like dissemination of information and barriers like false rumors with respect to use social media during emergencies. Distributed equally across nations, age and gender showed significant relationships with social media usage which, among other findings, suggests being helpful for effective implementation of management structures using new technologies.},
number = {119724},
journal = {Technological Forecasting and Social Change (TFSC)},
author = {Reuter, Christian and Kaufhold, Marc-André and Schmid, Stefka and Spielhofer, Thomas and Hahne, Anna Sophie},
year = {2019},
keywords = {Crisis, HCI, A-Paper, Ranking-ImpactFactor, SocialMedia, AuswahlCrisis, Selected, Projekt-EmerGent, Ranking-VHB-B},
pages = {1--17},
}
[BibTeX] [Abstract] [Download PDF]
Technological and scientific progress, especially the rapid development in information technology (IT), plays a crucial role regarding questions of peace and security. This textbook addresses the significance, potentials and challenges of IT for peace and securi-ty. For this purpose, the book offers an introduction to peace, conflict, and security research, thereby focusing on natural-science, technical and computer science perspec-tives. In the following, it sheds light on cyber conflicts, war and peace, cyber arms con-trol, cyber attribution and infrastructures as well as culture and interaction before an outlook is given.
@book{reuterInformationTechnologyPeace2019a,
address = {Wiesbaden, Germany},
title = {Information {Technology} for {Peace} and {Security} - {IT} {Applications} and {Infrastructures} in {Conflicts}, {Crises}, {War}, and {Peace}},
isbn = {978-3-658-25652-4},
url = {https://www.springer.com/de/book/9783658256517},
doi = {10.1007/978-3-658-25652-4},
abstract = {Technological and scientific progress, especially the rapid development in information technology (IT), plays a crucial role regarding questions of peace and security. This textbook addresses the significance, potentials and challenges of IT for peace and securi-ty. For this purpose, the book offers an introduction to peace, conflict, and security research, thereby focusing on natural-science, technical and computer science perspec-tives. In the following, it sheds light on cyber conflicts, war and peace, cyber arms con-trol, cyber attribution and infrastructures as well as culture and interaction before an outlook is given.},
publisher = {Springer Vieweg},
author = {Reuter, Christian},
year = {2019},
keywords = {Crisis, Peace, AuswahlPeace, Security, RSF, Projekt-CROSSING, Selected, Infrastructure, Cyberwar, Projekt-DualUse, Projekt-MAKI, Projekt-CRISP},
}
2018
[BibTeX] [Abstract] [Download PDF]
Since the terrorist attacks of 9/11, the use of social media in emergency and crisis events has greatly increased and many studies have concentrated on the use of ICT and social media be-fore, during or after these events. The field of research that these studies fall under is called cri-sis informatics. In this paper, we evaluate and analyze crisis informatics research by looking at case studies of social media use in emergencies, outlining the types of research found in crisis informatics, and expounding upon the forms of interaction that have been researched. Finally, we summarize the achievements from an HCI perspective and outline trends and challenges for future research.
@article{reuterSocialMediaCrisis2018,
title = {Social {Media} in {Crisis} {Management}: {An} {Evaluation} and {Analysis} of {Crisis} {Informatics} {Research}},
volume = {34},
url = {http://www.peasec.de/paper/2018/2018_ReuterHughesKaufhold_SocialMediaCrisisManagementEvaluation_IJHCI.pdf},
doi = {10.1080/10447318.2018.1427832},
abstract = {Since the terrorist attacks of 9/11, the use of social media in emergency and crisis events has greatly increased and many studies have concentrated on the use of ICT and social media be-fore, during or after these events. The field of research that these studies fall under is called cri-sis informatics. In this paper, we evaluate and analyze crisis informatics research by looking at case studies of social media use in emergencies, outlining the types of research found in crisis informatics, and expounding upon the forms of interaction that have been researched. Finally, we summarize the achievements from an HCI perspective and outline trends and challenges for future research.},
number = {4},
journal = {International Journal on Human-Computer Interaction (IJHCI)},
author = {Reuter, Christian and Hughes, Amanda Lee and Kaufhold, Marc-André},
year = {2018},
keywords = {Crisis, HCI, Peace, A-Paper, Ranking-ImpactFactor, SocialMedia, AuswahlCrisis, Selected, Projekt-KontiKat, Ranking-WKWI-B, Ranking-CORE-B},
pages = {280--294},
}
[BibTeX] [Abstract] [Download PDF]
Social media has been established in many larger emergencies and crises. This process has not started just a few years ago, but already 15 years ago in 2001 after the terrorist attacks of 9/11. In the following years, especially in the last 10, sometimes summarized under the term crisis informatics, a variety of studies focusing on the use of ICT and social media before, during or after nearly every crisis and emergency has arisen. This article aims to recapitulate 15 years of social media in emergencies and its research with a special emphasis on use patterns, role patterns and perception patterns that can be found across different cases in order to point out what has been achieved so far, and what future potentials exist.
@article{reuterFifteenYearsSocial2018,
title = {Fifteen {Years} of {Social} {Media} in {Emergencies}: {A} {Retrospective} {Review} and {Future} {Directions} for {Crisis} {Informatics}},
volume = {26},
url = {http://www.peasec.de/paper/2018/2018_ReuterKaufhold_FifteenYearsSocialMediaEmergencies_JCCM.pdf},
doi = {10.1111/1468-5973.12196},
abstract = {Social media has been established in many larger emergencies and crises. This process has not started just a few years ago, but already 15 years ago in 2001 after the terrorist attacks of 9/11. In the following years, especially in the last 10, sometimes summarized under the term crisis informatics, a variety of studies focusing on the use of ICT and social media before, during or after nearly every crisis and emergency has arisen. This article aims to recapitulate 15 years of social media in emergencies and its research with a special emphasis on use patterns, role patterns and perception patterns that can be found across different cases in order to point out what has been achieved so far, and what future potentials exist.},
number = {1},
journal = {Journal of Contingencies and Crisis Management (JCCM)},
author = {Reuter, Christian and Kaufhold, Marc-André},
year = {2018},
keywords = {Crisis, HCI, Peace, A-Paper, Ranking-ImpactFactor, SocialMedia, AuswahlCrisis, Selected, Projekt-EmerGent, Projekt-KontiKat, AuswahlKaufhold, Projekt-KOKOS},
pages = {41--57},
}
2016
[BibTeX] [Abstract] [Download PDF]
Various studies show that social media is used in emergencies – and that in spite of possible challenges for emergency services, beneficial use cases can be identified. However, relatively little empirical data is available regarding the attitudes of emergency services towards social media, and almost none of a comparative nature. This article summarizes the findings of a survey conducted of the EU project ‘EmerGent’ with 761 emergency service staff across 32 European countries from September to December 2014. The main aims of the survey were to explore the attitudes expressed by emergency service staff towards social media for private and organizational use as well as the levels and main factors influencing the current and likely future use of social media in their organizations. Based on our results, we discuss possible enhancements of the emergency management cycle using social media.
@article{reuterEmergencyServicesAttitudes2016,
title = {Emergency {Services} {Attitudes} towards {Social} {Media}: {A} {Quantitative} and {Qualitative} {Survey} across {Europe}},
volume = {95},
url = {https://peasec.de/paper/2016/2016_ReuterLudwigKaufholdSpielhofer_EmergencyServicesAttiudesSurveySocialMedia_IJHCS.pdf},
doi = {10.1016/j.ijhcs.2016.03.005},
abstract = {Various studies show that social media is used in emergencies – and that in spite of possible challenges for emergency services, beneficial use cases can be identified. However, relatively little empirical data is available regarding the attitudes of emergency services towards social media, and almost none of a comparative nature. This article summarizes the findings of a survey conducted of the EU project ‘EmerGent' with 761 emergency service staff across 32 European countries from September to December 2014. The main aims of the survey were to explore the attitudes expressed by emergency service staff towards social media for private and organizational use as well as the levels and main factors influencing the current and likely future use of social media in their organizations. Based on our results, we discuss possible enhancements of the emergency management cycle using social media.},
journal = {International Journal on Human-Computer Studies (IJHCS)},
author = {Reuter, Christian and Ludwig, Thomas and Kaufhold, Marc-André and Spielhofer, Thomas},
year = {2016},
keywords = {Crisis, HCI, A-Paper, Ranking-CORE-A, Ranking-ImpactFactor, SocialMedia, AuswahlCrisis, Selected, Projekt-EmerGent, Ranking-WKWI-B, AuswahlKaufhold},
pages = {96--111},
}
2015
[BibTeX] [Abstract] [Download PDF]
Recent disasters have shown an increase in the significance of social media for both affected citizens and volunteers alike in the coordination of information and organization of relief activities, often independently of and in addition to the official emergency response. Existing research mainly focuses on the way in which individual platforms are used by volunteers in response to disasters. This paper examines the use of social media during the European Floods of 2013 and proposes a novel cross-social-media application for volunteers. Besides comprehensive analysis of volunteer communities, interviews were conducted with “digital volunteers” such as Facebook moderators of disaster-related groups. Based on the challenges identified, we designed and implemented the cross-social-media application “XHELP”, which allows information to be both, acquired and distributed cross-media and cross-channel. The evaluation with 20 users leads to further design requirements for applications aiming to support volunteer moderators during disasters.
@inproceedings{reuterXHELPDesignCrossPlatform2015,
address = {Seoul, Korea},
title = {{XHELP}: {Design} of a {Cross}-{Platform} {Social}-{Media} {Application} to {Support} {Volunteer} {Moderators} in {Disasters}},
url = {http://www.peasec.de/paper/2015/2015_ReuterLudwigKaufholdPipek_XHELP_CHI.pdf},
doi = {10.1145/2702123.2702171},
abstract = {Recent disasters have shown an increase in the significance of social media for both affected citizens and volunteers alike in the coordination of information and organization of relief activities, often independently of and in addition to the official emergency response. Existing research mainly focuses on the way in which individual platforms are used by volunteers in response to disasters. This paper examines the use of social media during the European Floods of 2013 and proposes a novel cross-social-media application for volunteers. Besides comprehensive analysis of volunteer communities, interviews were conducted with "digital volunteers" such as Facebook moderators of disaster-related groups. Based on the challenges identified, we designed and implemented the cross-social-media application "XHELP", which allows information to be both, acquired and distributed cross-media and cross-channel. The evaluation with 20 users leads to further design requirements for applications aiming to support volunteer moderators during disasters.},
booktitle = {Proceedings of the {Conference} on {Human} {Factors} in {Computing} {Systems} ({CHI})},
publisher = {ACM Press},
author = {Reuter, Christian and Ludwig, Thomas and Kaufhold, Marc-André and Pipek, Volkmar},
year = {2015},
keywords = {Crisis, HCI, A-Paper, SocialMedia, AuswahlCrisis, Selected, Ranking-WKWI-A, Ranking-CORE-A*, Projekt-EmerGent, AuswahlKaufhold, Cooperation},
pages = {4093--4102},
}
2014
[BibTeX] [Abstract] [Download PDF]
Using the domain of crisis management, Christian Reuter explores challenges and opportunities for technology design in emergent environments. He therefore empirically analyzes collaborative work in inter-organizational crisis – such as the police, fire departments, energy network operators and citizens – in order to identify collaboration practices that reveal work infrastructure limitations. He also designs, implements and evaluates novel concepts and ICT artifacts towards the support of emergent collaboration. Besides the discovery of potential organizational effects on the ability to deal with emergence he presents methodological implications for technology design.
@book{reuterEmergentCollaborationInfrastructures2014,
address = {University of Siegen, Institute for Information Systems, Germany},
title = {Emergent {Collaboration} {Infrastructures}: {Technology} {Design} for {Inter}-{Organizational} {Crisis} {Management} ({Ph}.{D}. {Thesis})},
isbn = {978-3-658-08585-8},
url = {http://www.springer.com/springer+gabler/bwl/wirtschaftsinformatik/book/978-3-658-08585-8},
doi = {10.1007/978-3-658-08586-5},
abstract = {Using the domain of crisis management, Christian Reuter explores challenges and opportunities for technology design in emergent environments. He therefore empirically analyzes collaborative work in inter-organizational crisis – such as the police, fire departments, energy network operators and citizens – in order to identify collaboration practices that reveal work infrastructure limitations. He also designs, implements and evaluates novel concepts and ICT artifacts towards the support of emergent collaboration. Besides the discovery of potential organizational effects on the ability to deal with emergence he presents methodological implications for technology design.},
publisher = {Springer Gabler},
author = {Reuter, Christian},
year = {2014},
note = {Backup Publisher: University of Siegen},
keywords = {DissPublisher, HCI, SocialMedia, UsableSec, Selected, Infrastructure, AuswahlUsableSec, Projekt-EmerGent, Projekt-InfoStrom},
}
[BibTeX] [Abstract] [Download PDF]
Emergencies are characterized by high complexity and unpredictability. In order to assess and manage them successfully, improvisation work and informal communication, even beyond local and organizational boundaries, is needed. Such informal practices can facilitate ad hoc participation of units in situation assessment, but this may lack overall situation awareness. This paper presents a study on how emergent ‘collaboration needs’ in current work of response teams, who are located on-site and in the control center, could be supported by mobile geo-collaboration systems. First, we present the results of an empirical study about informal work and mobile collaboration practices of emergency services. Then we describe the concept of a mobile geo-collaboration system that addresses the aspects detected in the empirical study and that was implemented as an Android application using web sockets, a technology enabling full-duplex ad hoc communication. Finally we outline the findings of its evaluation in practice and its implications.
@article{reuterAdHocParticipation2014,
title = {Ad {Hoc} {Participation} in {Situation} {Assessment}: {Supporting} {Mobile} {Collaboration} in {Emergencies}},
volume = {21},
url = {http://www.wineme.uni-siegen.de/paper/2014/2014_reuterludwigpipek_adhocparticipation_tochi.pdf},
doi = {10.1145/2651365},
abstract = {Emergencies are characterized by high complexity and unpredictability. In order to assess and manage them successfully, improvisation work and informal communication, even beyond local and organizational boundaries, is needed. Such informal practices can facilitate ad hoc participation of units in situation assessment, but this may lack overall situation awareness. This paper presents a study on how emergent ‘collaboration needs' in current work of response teams, who are located on-site and in the control center, could be supported by mobile geo-collaboration systems. First, we present the results of an empirical study about informal work and mobile collaboration practices of emergency services. Then we describe the concept of a mobile geo-collaboration system that addresses the aspects detected in the empirical study and that was implemented as an Android application using web sockets, a technology enabling full-duplex ad hoc communication. Finally we outline the findings of its evaluation in practice and its implications.},
number = {5},
journal = {ACM Transactions on Computer-Human Interaction (TOCHI)},
publisher = {ACM},
author = {Reuter, Christian and Ludwig, Thomas and Pipek, Volkmar},
month = nov,
year = {2014},
keywords = {Crisis, HCI, A-Paper, Ranking-ImpactFactor, UsableSec, Selected, Ranking-WKWI-A, AuswahlUsableSec, Ranking-CORE-A*, Projekt-InfoStrom, Ranking-VHB-B, Cooperation},
pages = {1--26},
}
2013
[BibTeX] [Abstract] [Download PDF]
Recent studies have called attention to the improvement of “collaborative resilience” by fostering the collaboration potentials of public and private stakeholders during disasters. With our research we consider real and virtual volunteers in order to detect conditions for cooperation among those citizen groups through social media. Therefore we analysed the usage of Twitter during a tornado crisis to look for role patterns and aspects that helped volunteer groups in the virtual to emerge, and matched the data with an interview study on experiences, attitudes, concerns and potentials professional emergency services recounted in the emergence of volunteer groups in the real. While virtual groups seem to easily form and collaborate, the engagement of real volunteers is decreasing according to the perception of professionals. We discuss the dynamics in both tendencies and suggest design implications (use of existing social networks, promotion and awareness, connection among volunteers, connection to emergency services and systems) to support both types of volunteer groups, which lead to a software prototype.
@inproceedings{reuterCombiningRealVirtual2013,
address = {Baden-Baden, Germany},
title = {Combining {Real} and {Virtual} {Volunteers} through {Social} {Media}},
url = {http://www.peasec.de/paper/2013/2013_ReuterHegerPipek_RealVirtualVolunteersSocialMedia_ISCRAM.pdf},
abstract = {Recent studies have called attention to the improvement of “collaborative resilience” by fostering the collaboration potentials of public and private stakeholders during disasters. With our research we consider real and virtual volunteers in order to detect conditions for cooperation among those citizen groups through social media. Therefore we analysed the usage of Twitter during a tornado crisis to look for role patterns and aspects that helped volunteer groups in the virtual to emerge, and matched the data with an interview study on experiences, attitudes, concerns and potentials professional emergency services recounted in the emergence of volunteer groups in the real. While virtual groups seem to easily form and collaborate, the engagement of real volunteers is decreasing according to the perception of professionals. We discuss the dynamics in both tendencies and suggest design implications (use of existing social networks, promotion and awareness, connection among volunteers, connection to emergency services and systems) to support both types of volunteer groups, which lead to a software prototype.},
booktitle = {Proceedings of the {Information} {Systems} for {Crisis} {Response} and {Management} ({ISCRAM})},
publisher = {ISCRAM},
author = {Reuter, Christian and Heger, Oliver and Pipek, Volkmar},
editor = {Comes, T. and Fiedrich, F. and Fortier, S. and Geldermann, J. and Müller, Tim},
year = {2013},
keywords = {Crisis, HCI, SocialMedia, Student, AuswahlCrisis, Selected, Projekt-InfoStrom, Cooperation},
pages = {780--790},
}
2012
[BibTeX] [Abstract] [Download PDF]
The contribution of this paper is to propose a systematization of social software use in crisis situations pointing out different types of cooperation and its challenges. We will discuss how the organizational actors involved in crisis management (police, fire-fighters, organizations etc.) and the affected citizens are communicating and can communicate and collaborate through the use of social software. After defining the term ‘social software’ we will outline the state-of-the-art about its use in crisis management. Drawing from this, we will present two case studies where we have examined the use of social software in 2010: first during the disruption of air travel caused by the eruptions of the volcano Eyjafjallajökull in Iceland and second during the mass panic at the Love Parade music festival in Germany. Based on both previous work and case studies we will discuss potentials and weaknesses and propose a classification matrix for different types of cooperation as a step towards a systematization of social software use in crisis situations.
@article{reuterCrisisManagementSystematization2012,
title = {Crisis {Management} 2.0: {Towards} a {Systematization} of {Social} {Software} {Use} in {Crisis} {Situations}},
volume = {4},
url = {http://www.peasec.de/paper/2012/2012_ReuterMarxPipek_CrisisManagement20-SystematizationSocialSoftware_IJISCRAM.pdf},
doi = {10.4018/jiscrm.2012010101},
abstract = {The contribution of this paper is to propose a systematization of social software use in crisis situations pointing out different types of cooperation and its challenges. We will discuss how the organizational actors involved in crisis management (police, fire-fighters, organizations etc.) and the affected citizens are communicating and can communicate and collaborate through the use of social software. After defining the term ‘social software' we will outline the state-of-the-art about its use in crisis management. Drawing from this, we will present two case studies where we have examined the use of social software in 2010: first during the disruption of air travel caused by the eruptions of the volcano Eyjafjallajökull in Iceland and second during the mass panic at the Love Parade music festival in Germany. Based on both previous work and case studies we will discuss potentials and weaknesses and propose a classification matrix for different types of cooperation as a step towards a systematization of social software use in crisis situations.},
number = {1},
journal = {International Journal of Information Systems for Crisis Response and Management (IJISCRAM)},
author = {Reuter, Christian and Marx, Alexandra and Pipek, Volkmar},
year = {2012},
keywords = {Crisis, HCI, SocialMedia, Student, AuswahlCrisis, Selected, Projekt-InfoStrom, Cooperation, Projekt-RSBE},
pages = {1--16},
}
Datenressourcen
- Hier finden Sie unsere aktuellen Code-Repositories zu unserer Forschung: https://github.com/PEASEC
- Hier finden Sie verschiedene Datensätze, welche während unserer Forschung erstellt wurden: https://tudatalib.ulb.tu-darmstadt.de/handle/tudatalib/1387
