HCI
Human-Computer-Interaction
2025
[BibTeX] [Abstract]
In Germany and other countries, specialized non-profit reporting centers combat online hate speech by submitting criminal content to law enforcement agencies, forwarding deletion requests to social media platforms, and providing counseling to victims, thus contributing to the governance mechanism of content moderation as intermediaries between victims and various organizations. Whereas research in computer-supported cooperative work has extensively explored collaboration of and automation for content moderators, there are no works that focus on reporting centers. Based on expert interviews with their staff (N=15), this study finds that most German centers share a collaborative workflow, of which multiple tasks are heavily dependent on inter-organizational exchange. However, there are differences in their implementation of monitoring, content assessment, automation technology adoption, and external collaborators. As the centers are faced with diverse challenges, such as borderline case assessment, psychological burdens, limited visibility, conflicting goals with other actors, and manual repetitive work, our study contributes with nine implications for designing and researching supportive technologies. They provide suggestions for improving hate speech gathering and reporting, researching hate speech prioritization and assessment algorithms, and designing case processing systems. Beyond that, we outline directions for research on inter-organizational collaboration.
@article{baumler_harnessing_2025,
title = {Harnessing {Inter}-{Organizational} {Collaboration} and {Automation} to {Combat} {Online} {Hate} {Speech}: {A} {Qualitative} {Study} with {German} {Reporting} {Centers}},
abstract = {In Germany and other countries, specialized non-profit reporting centers combat online hate speech by submitting criminal content to law enforcement agencies, forwarding deletion requests to social media platforms, and providing counseling to victims, thus contributing to the governance mechanism of content moderation as intermediaries between victims and various organizations. Whereas research in computer-supported cooperative work has extensively explored collaboration of and automation for content moderators, there are no works that focus on reporting centers. Based on expert interviews with their staff (N=15), this study finds that most German centers share a collaborative workflow, of which multiple tasks are heavily dependent on inter-organizational exchange. However, there are differences in their implementation of monitoring, content assessment, automation technology adoption, and external collaborators. As the centers are faced with diverse challenges, such as borderline case assessment, psychological burdens, limited visibility, conflicting goals with other actors, and manual repetitive work, our study contributes with nine implications for designing and researching supportive technologies. They provide suggestions for improving hate speech gathering and reporting, researching hate speech prioritization and assessment algorithms, and designing case processing systems. Beyond that, we outline directions for research on inter-organizational collaboration.},
journal = {Proceedings of the ACM: Human Computer Interaction (PACM): Computer-Supported Cooperative Work and Social Computing},
author = {Bäumler, Julian and Riebe, Thea and Kaufhold, Marc-André and Reuter, Christian},
year = {2025},
keywords = {Crisis, HCI, Projekt-CYWARN, Projekt-CYLENCE, A-Paper, AuswahlCrisis, Ranking-CORE-A},
}
[BibTeX]
@book{hartwig_navigating_2025,
address = {Wiesbaden, Germany},
title = {Navigating {Misinformation}: {User}-{Centered} {Design} and {Evaluation} of {Indicator}-{Based} {Digital} {Interventions}},
publisher = {Springer Vieweg},
author = {Hartwig, Katrin},
year = {2025},
keywords = {Crisis, HCI, Projekt-NEBULA, DissPublisher},
}
[BibTeX]
@book{haunschild_enhancing_2025,
address = {Wiesbaden, Germany},
title = {Enhancing {Citizens}’ {Role} in {Public} {Safety}: {Interaction}, {Perception} and {Design} of {Mobile} {Warning} {Apps}},
publisher = {Springer Vieweg},
author = {Haunschild, Jasmin},
year = {2025},
keywords = {Crisis, HCI, Projekt-emergenCITY, Projekt-ATHENE-SecUrban, DissPublisher},
}
[BibTeX]
@book{reuter_special_2025,
title = {Special {Issue} on {Combating} {Information} {Warfare}: {User}-{Centered} {Countermeasures} against {Fake} {News} and {Misinformation} - {Behaviour} \& {Information} {Technology} ({BIT})},
publisher = {Taylor \& Francis},
author = {Reuter, Christian and Hughes, Amanda Lee and Buntain, Cody},
year = {2025},
note = {Publication Title: Behaviour \& Information Technology (BIT)},
keywords = {Peace, Crisis, HCI, A-Paper, Ranking-CORE-A, Ranking-ImpactFactor, SocialMedia},
}
[BibTeX]
@article{reuter_combating_2025,
title = {Combating {Information} {Warfare}: {State} and {Trends} in {User}-{Centered} {Countermeasures} against {Fake} {News} and {Misinformation}},
journal = {Behaviour \& Information Technology (BIT)},
author = {Reuter, Christian and Hughes, Amanda Lee and Buntain, Cody},
year = {2025},
keywords = {Peace, Crisis, HCI, A-Paper, Ranking-CORE-A, Ranking-ImpactFactor, SocialMedia},
}
2024
[BibTeX] [Abstract] [Download PDF]
Browser cookies, especially those from third parties, pose a threat to individual privacy. While it is possible in principle to control the number of cookies accepted, this choice is often neither usable nor truly informed. To address this issue, this study used semi-structured interviews (N=19) to identify attitudes and user requirements to develop an alternative personalised cookie banner, which was evaluated in an online experiment (N=157). The cookie banner explanations were tailored to the privacy knowledge of three groups of users: low, medium and high. The online experiment measured cookie choices and perceived usability of the cookie banner across three groups: an experimental group that viewed the novel cookie banner with personalisation (personalised privacy assistant), a control group that viewed the novel cookie banner without personalisation (privacy assistant) and a control group that viewed the standard cookie banner provided by the website. The results indicate that the novel cookie banner (with or without personalisation) generally resulted in significantly fewer accepted cookies and increased usability compared to the standard cookie window. In addition, the personalised cookie banner resulted in significantly fewer accepted cookies and higher usability than the non-personalised cookie banner. These results suggest that tailoring cookie banners to users‘ privacy knowledge can be an effective approach to empowering users to make informed choices and better protect their privacy.
@article{biselli_supporting_2024,
title = {Supporting {Informed} {Choices} about {Browser} {Cookies}: {The} {Impact} of {Personalised} {Cookie} {Banners}},
url = {https://petsymposium.org/popets/2024/popets-2024-0011.pdf},
doi = {https://doi.org/10.56553/popets-2024-0011},
abstract = {Browser cookies, especially those from third parties, pose a threat to individual privacy. While it is possible in principle to control the number of cookies accepted, this choice is often neither usable nor truly informed. To address this issue, this study used semi-structured interviews (N=19) to identify attitudes and user requirements to develop an alternative personalised cookie banner, which was evaluated in an online experiment (N=157). The cookie banner explanations were tailored to the privacy knowledge of three groups of users: low, medium and high. The online experiment measured cookie choices and perceived usability of the cookie banner across three groups: an experimental group that viewed the novel cookie banner with personalisation (personalised privacy assistant), a control group that viewed the novel cookie banner without personalisation (privacy assistant) and a control group that viewed the standard cookie banner provided by the website. The results indicate that the novel cookie banner (with or without personalisation) generally resulted in significantly fewer accepted cookies and increased usability compared to the standard cookie window. In addition, the personalised cookie banner resulted in significantly fewer accepted cookies and higher usability than the non-personalised cookie banner. These results suggest that tailoring cookie banners to users' privacy knowledge can be an effective approach to empowering users to make informed choices and better protect their privacy.},
number = {1},
journal = {Proceedings on Privacy Enhancing Technologies (PoPETs)},
author = {Biselli, Tom and Utz, Laura and Reuter, Christian},
year = {2024},
keywords = {Student, Security, UsableSec, HCI, Projekt-CROSSING, A-Paper, AuswahlUsableSec, Selected, Ranking-CORE-A},
pages = {171--191},
}
[BibTeX] [Abstract] [Download PDF]
In Germany, both law enforcement agencies and dedicated reporting centers engage in various activities to counter illegal online hate speech. Due to the high volume of such content and against the background of limited resources, their personnel can be confronted with the issue of information overload. To mitigate this issue, technologies for information filtering, classification, prioritization, and visualization offer great potential. However, domainspecific classification schemes that differentiate subtypes of online hate speech are a prerequisite for the development of such assistive tools. There is a gap in research with regard to an empirically substantiated classification scheme for subtypes of hate speech for the German law enforcement and reporting center domain. Based on a review of relevant computer science publications (N=24) and qualitative interviews with practitioners (N=18), this work investigates practice-relevant subtypes of hate speech and finds that it is primarily differentiated with regard to targeted group affiliations, the conveyance of an immediate security threat, and criminal relevance. It contributes to the state of research with an empirically grounded online hate speech classification scheme for German law enforcement agencies and reporting centers (C1) and five implications for the user-centered design of hate speech classification tools (C2).
@inproceedings{baumler_towards_2024,
address = {Karlsruhe, Germany},
title = {Towards an {Online} {Hate} {Speech} {Classification} {Scheme} for {German} {Law} {Enforcement} and {Reporting} {Centers}: {Insights} from {Research} and {Practice}},
url = {https://dl.gi.de/items/2fa0ec97-d562-41d2-bab9-0b0539432c87},
doi = {10.18420/muc2024-mci-ws13-124},
abstract = {In Germany, both law enforcement agencies and dedicated reporting centers engage in various activities to counter illegal online hate speech. Due to the high volume of such content and against the background of limited resources, their personnel can be confronted with the issue of information overload. To mitigate this issue, technologies for information filtering, classification, prioritization, and visualization offer great potential. However, domainspecific classification schemes that differentiate subtypes of online hate speech are a prerequisite for the development of such assistive tools. There is a gap in research with regard to an empirically substantiated classification scheme for subtypes of hate speech for the German law enforcement and reporting center domain. Based on a review of relevant computer science publications (N=24) and qualitative interviews with practitioners (N=18), this work investigates practice-relevant subtypes of hate speech and finds that it is primarily differentiated with regard to targeted group affiliations, the conveyance of an immediate security threat, and criminal relevance. It contributes to the state of research with an empirically grounded online hate speech classification scheme for German law enforcement agencies and reporting centers (C1) and five implications for the user-centered design of hate speech classification tools (C2).},
language = {en},
booktitle = {Mensch und {Computer} 2024 - {Workshopband}},
publisher = {Gesellschaft für Informatik e.V.},
author = {Bäumler, Julian and Kaufhold, Marc-André and Voronin, Georg and Reuter, Christian},
year = {2024},
keywords = {UsableSec, HCI, Projekt-ATHENE-CyAware, Projekt-CYLENCE},
}
[BibTeX] [Abstract] [Download PDF]
In many applications and websites people use in their everyday life, their privacy and data is threatened, e.g., by script tracking during browsing. Although researchers and companies have developed privacy-enhancing technologies (PETs), they are often difficult to use for lay users. In this paper, we conducted a literature review to classify users into different support personas based on their privacy competence and privacy concern. With developers of PETs in mind, support personas were envisioned to facilitate the customization of software according to the support needs of different users. In order to demonstrate the usefulness of support personas and based on workshop sessions with 15 participants, we designed a browser extension which supports users with the issue of script tracking by providing different user interfaces for different support personas. The following qualitative evaluation with 31 participants showed that the developed UI elements worked as intended for the different support personas. Therefore, we conclude the concept of support personas is useful in the development process of usable applications that enhance the privacy of the users while also educating them and thus potentially increasing their privacy literacy.
@article{demuth_support_2024,
title = {Support {Personas}: {A} {Concept} for {Tailored} {Support} of {Users} of {Privacy}-{Enhancing} {Technologies}},
issn = {2299-0984},
url = {https://petsymposium.org/popets/2024/popets-2024-0142.pdf},
doi = {https://doi.org/10.56553/popets-2024-0142},
abstract = {In many applications and websites people use in their everyday life, their privacy and data is threatened, e.g., by script tracking during browsing. Although researchers and companies have developed privacy-enhancing technologies (PETs), they are often difficult to use for lay users. In this paper, we conducted a literature review to classify users into different support personas based on their privacy competence and privacy concern. With developers of PETs in mind, support personas were envisioned to facilitate the customization of software according to the support needs of different users. In order to demonstrate the usefulness of support personas and based on workshop sessions with 15 participants, we designed a browser extension which supports users with the issue of script tracking by providing different user interfaces for different support personas. The following qualitative evaluation with 31 participants showed that the developed UI elements worked as intended for the different support personas. Therefore, we conclude the concept of support personas is useful in the development process of usable applications that enhance the privacy of the users while also educating them and thus potentially increasing their privacy literacy.},
number = {4},
journal = {Proceedings on Privacy Enhancing Technologies (PoPETs)},
author = {Demuth, Kilian and Linsner, Sebastian and Biselli, Tom and Kaufhold, Marc-André and Reuter, Christian},
year = {2024},
keywords = {Security, UsableSec, HCI, Projekt-CROSSING, A-Paper, Projekt-ATHENE-PriVis, Ranking-CORE-A},
pages = {797--817},
}
[BibTeX] [Abstract] [Download PDF]
Amidst the ongoing anti-military protests in Myanmar since 2021, there is a noticeable research gap on ICT-supported activism. Generally, ICTs play an important role during political crises in conjunction with activists’ practices on the ground. Inspired by Resource Mobilization Theory, I conducted qualitative interviews (N=16) and a qualitative online survey (N=34), which demonstrate the intersection between analog and digital domains, showcasing the ingenuity of the activists, and the rapid adoption of ICTs in a country that has experienced a digital revolution within the last few years. As not all people were able to protest on-the-ground, they acted as keyboard fighters to organize protests, to share information, and to support the civil disobedience movement in Myanmar. The study identifies, inter alia, the need for better offline applications with wider coverage in times of internet shutdowns, applications that cannot be easily identified during physical controls, and providing free and secure VPN access.
@inproceedings{guntrum_keyboard_2024,
address = {New York, NY, USA},
series = {{CHI} '24},
title = {Keyboard {Fighters}: {The} {Use} of {ICTs} by {Activists} in {Times} of {Military} {Coup} in {Myanmar}},
isbn = {9798400703300},
url = {https://doi.org/10.1145/3613904.3642279},
doi = {10.1145/3613904.3642279},
abstract = {Amidst the ongoing anti-military protests in Myanmar since 2021, there is a noticeable research gap on ICT-supported activism. Generally, ICTs play an important role during political crises in conjunction with activists’ practices on the ground. Inspired by Resource Mobilization Theory, I conducted qualitative interviews (N=16) and a qualitative online survey (N=34), which demonstrate the intersection between analog and digital domains, showcasing the ingenuity of the activists, and the rapid adoption of ICTs in a country that has experienced a digital revolution within the last few years. As not all people were able to protest on-the-ground, they acted as keyboard fighters to organize protests, to share information, and to support the civil disobedience movement in Myanmar. The study identifies, inter alia, the need for better offline applications with wider coverage in times of internet shutdowns, applications that cannot be easily identified during physical controls, and providing free and secure VPN access.},
booktitle = {Proceedings of the {CHI} {Conference} on {Human} {Factors} in {Computing} {Systems}},
publisher = {Association for Computing Machinery},
author = {Guntrum, Laura},
year = {2024},
keywords = {Peace, Projekt-TraCe, HCI, A-Paper, Ranking-CORE-A*, Selected, Projekt-ATHENE},
}
[BibTeX]
@book{haesler_citizens_2024,
address = {Darmstadt, Germany},
title = {Citizens in {Crises}: {Behavior}, {Dependencies}, and {Technological} {Support} of {Digital} {Self}-{Organization}},
publisher = {Dissertation (Dr. rer. nat.), Department of Computer Science, Technische Universität Darmstadt},
author = {Haesler, Steffen},
year = {2024},
keywords = {Crisis, HCI, Projekt-emergenCITY, Dissertation},
}
[BibTeX] [Abstract] [Download PDF]
Misinformation poses a recurrent challenge for video-sharing platforms (VSPs) like TikTok. Obtaining user perspectives on digital interventions addressing the need for transparency (e.g., through indicators) is essential. This article offers a thorough examination of the comprehensibility, usefulness, and limitations of an indicator-based intervention from an adolescents’ perspective. This study (𝑁 = 39; aged 13-16 years) comprised two qualitative steps: (1) focus group discussions and (2) think-aloud sessions, where participants engaged with a smartphone-app for TikTok. The results offer new insights into how video-based indicators can assist adolescents’ assessments. The intervention received positive feedback, especially for its transparency, and could be applicable to new content. This paper sheds light on how adolescents are expected to be experts while also being prone to video-based misinformation, with limited understanding of an intervention’s limitations. By adopting teenagers’ perspectives, we contribute to HCI research and provide new insights into the chances and limitations of interventions for VSPs.
@inproceedings{hartwig_adolescents_2024,
address = {New York, NY, USA},
series = {{CHI} '24},
title = {From {Adolescents}' {Eyes}: {Assessing} an {Indicator}-{Based} {Intervention} to {Combat} {Misinformation} on {TikTok}},
isbn = {9798400703300},
url = {https://doi.org/10.1145/3613904.3642264},
doi = {10.1145/3613904.3642264},
abstract = {Misinformation poses a recurrent challenge for video-sharing platforms (VSPs) like TikTok. Obtaining user perspectives on digital interventions addressing the need for transparency (e.g., through indicators) is essential. This article offers a thorough examination of the comprehensibility, usefulness, and limitations of an indicator-based intervention from an adolescents’ perspective. This study (𝑁 = 39; aged 13-16 years) comprised two qualitative steps: (1) focus group discussions and (2) think-aloud sessions, where participants
engaged with a smartphone-app for TikTok. The results offer new insights into how video-based indicators can assist adolescents’ assessments. The intervention received positive feedback, especially for its transparency, and could be applicable to new content. This paper sheds light on how adolescents are expected to be experts while also being prone to video-based misinformation, with limited understanding of an intervention’s limitations. By adopting
teenagers’ perspectives, we contribute to HCI research and provide new insights into the chances and limitations of interventions for VSPs.},
booktitle = {Proceedings of the {Conference} on {Human} {Factors} in {Computing} {Systems} ({CHI})},
publisher = {Association for Computing Machinery},
author = {Hartwig, Katrin and Biselli, Tom and Schneider, Franziska and Reuter, Christian},
year = {2024},
keywords = {Security, UsableSec, HCI, A-Paper, Ranking-CORE-A*, Selected, AuswahlCrisis, Projekt-ATHENE-PriVis, Projekt-NEBULA},
}
[BibTeX] [Abstract] [Download PDF]
Misinformation presents a challenge to democracies, particularly in times of crisis. One way in which misinformation is spread is through voice messages sent via messenger groups, which enable members to share information on a larger scale. Gaining user perspectives on digital misinformation interventions as countermeasure after detection is crucial. In this paper, we extract potential features of misinformation in voice messages from literature, implement them within a program that automatically processes voice messages, and evaluate their perceived usefulness and comprehensibility as user-centered indicators.We propose 35 features extracted from audio files at the character, word, sentence, audio and creator levels to assist (1) private individuals in conducting credibility assessments, (2) government agencies faced with data overload during crises, and (3) researchers seeking to gather features for automatic detection approaches. We conducted a think-aloud study with laypersons (N = 20) to provide initial insight into how individuals autonomously assess the credibility of voice messages, as well as which automatically extracted features they find to be clear and convincing indicators of misinformation. Our study provides qualitative and quantitative insights into valuable indicators, particularly when they relate directly to the content or its creator, and uncovers challenges in user interface design.
@article{hartwig_navigating_2024,
title = {Navigating {Misinformation} in {Voice} {Messages}: {Identification} of {User}-{Centered} {Features} for {Digital} {Interventions}},
issn = {1944-4079},
url = {https://peasec.de/paper/2024/2024_HartwigSandlerReuter_NavigatingMisinfoVoiceMessages_RiskHazards.pdf},
doi = {10.1002/rhc3.12296},
abstract = {Misinformation presents a challenge to democracies, particularly in times of crisis. One way in which misinformation is spread is through voice messages sent via messenger groups, which enable members to share information on a larger scale. Gaining user perspectives on digital misinformation interventions as countermeasure after detection is crucial. In this paper, we extract potential features of misinformation in voice messages from literature, implement them within a program that automatically processes voice messages, and evaluate their perceived usefulness and comprehensibility as user-centered indicators.We propose 35 features extracted from audio files at the character, word, sentence, audio and creator levels to assist (1) private individuals in conducting credibility assessments, (2) government agencies faced with data overload during crises, and (3) researchers seeking to gather features for automatic detection approaches. We conducted a think-aloud study with laypersons (N = 20) to provide initial insight into how individuals autonomously assess the credibility of voice messages, as well as which automatically extracted features they find to be clear and convincing indicators of misinformation. Our study provides qualitative and quantitative insights into valuable indicators, particularly when they relate directly to the content or its creator, and uncovers challenges in user interface design.},
journal = {Risk, Hazards, \& Crisis in Public Policy (RHCPP)},
author = {Hartwig, Katrin and Sandler, Ruslan and Reuter, Christian},
year = {2024},
note = {Publisher: John Wiley \& Sons, Ltd},
keywords = {Student, UsableSec, Crisis, HCI, Projekt-CYLENCE, A-Paper, Projekt-NEBULA, Projekt-ATHENE, Ranking-ImpactFactor, SocialMedia, Cyberwar},
}
[BibTeX] [Abstract] [Download PDF]
Misinformation represent a key challenge for society. User-centered misinformation interventions as digital countermeasures that exert a direct influence on users represent a promising means to deal with the large amounts of information available. While an extensive body of research on this topic exists, researchers are confronted with a diverse research landscape spanning multiple disciplines. This review systematizes the landscape of user-centered misinformation interventions to facilitate knowledge transfer, identify trends, and enable informed decision-making. Over 3,700 scholarly publications were screened and a systematic literature review (N=108) was conducted. A taxonomy was derived regarding intervention design (e.g., binary label), user interaction (active or passive), and timing (e.g., post exposure to misinformation). We provide a structured overview of approaches across multiple disciplines, and derive six overarching challenges for future research.
@article{hartwig_landscape_2024,
title = {The {Landscape} of {User}-centered {Misinformation} {Interventions} – {A} {Systematic} {Literature} {Review}},
volume = {56},
issn = {0360-0300},
url = {https://peasec.de/paper/2024/2024_HartwigDoellReuter_LandscapeUserCentredMisinfoInterventions_CSUR.pdf},
doi = {10.1145/3674724},
abstract = {Misinformation represent a key challenge for society. User-centered misinformation interventions as digital countermeasures that exert a direct influence on users represent a promising means to deal with the large amounts of information available. While an extensive body of research on this topic exists, researchers are confronted with a diverse research landscape spanning multiple disciplines. This review systematizes the landscape of user-centered misinformation interventions to facilitate knowledge transfer, identify trends, and enable informed decision-making. Over 3,700 scholarly publications were screened and a systematic literature review (N=108) was conducted. A taxonomy was derived regarding intervention design (e.g., binary label), user interaction (active or passive), and timing (e.g., post exposure to misinformation). We provide a structured overview of approaches across multiple disciplines, and derive six overarching challenges for future research.},
number = {11},
journal = {ACM Computing Surveys (CSUR)},
author = {Hartwig, Katrin and Doell, Frederic and Reuter, Christian},
month = jul,
year = {2024},
keywords = {Peace, Student, HCI, A-Paper, Ranking-CORE-A*, Selected, Projekt-NEBULA, Ranking-ImpactFactor},
}
[BibTeX] [Abstract] [Download PDF]
Recent crises like the COVID-19 pandemic provoked an increasing appearance of misleading information, emphasizing the need for effective user-centered countermeasures as an important field in HCI research. This work investigates how content-specific user-centered indicators can contribute to an informed approach to misleading information. In a threefold study, we conducted an in-depth content analysis of 2,382 German tweets on Twitter (now X) to identify topical (e.g., 5G), formal (e.g., links), and rhetorical (e.g., sarcasm) characteristics through manual coding, followed by a qualitative online survey to evaluate which indicators users already use autonomously to assess a tweet’s credibility. Subsequently, in a think-aloud study participants qualitatively evaluated the identified indicators in terms of perceived comprehensibility and usefulness. While a number of indicators were found to be particularly comprehensible and useful (e.g., claim for absolute truth and rhetorical questions), our findings reveal limitations of indicator-based interventions, particularly for people with entrenched conspiracy theory views. We derive four implications for digitally supporting users in dealing with misleading information, especially during crises.
@article{hartwig_misleading_2024,
title = {Misleading {Information} in {Crises}: {Exploring} {Content}-specific {Indicators} on {Twitter} from a {User} {Perspective}},
issn = {0144-929X},
url = {https://doi.org/10.1080/0144929X.2024.2373166},
doi = {10.1080/0144929X.2024.2373166},
abstract = {Recent crises like the COVID-19 pandemic provoked an increasing appearance of misleading information,
emphasizing the need for effective user-centered countermeasures as an important field in HCI research. This
work investigates how content-specific user-centered indicators can contribute to an informed approach to
misleading information. In a threefold study, we conducted an in-depth content analysis of 2,382 German
tweets on Twitter (now X) to identify topical (e.g., 5G), formal (e.g., links), and rhetorical (e.g., sarcasm)
characteristics through manual coding, followed by a qualitative online survey to evaluate which indicators
users already use autonomously to assess a tweet’s credibility. Subsequently, in a think-aloud study participants
qualitatively evaluated the identified indicators in terms of perceived comprehensibility and usefulness. While
a number of indicators were found to be particularly comprehensible and useful (e.g., claim for absolute truth
and rhetorical questions), our findings reveal limitations of indicator-based interventions, particularly for
people with entrenched conspiracy theory views. We derive four implications for digitally supporting users in
dealing with misleading information, especially during crises.},
journal = {Behaviour \& Information Technology (BIT)},
author = {Hartwig, Katrin and Schmid, Stefka and Biselli, Tom and Pleil, Helene and Reuter, Christian},
year = {2024},
keywords = {Crisis, HCI, A-Paper, Projekt-ATHENE-PriVis, Projekt-NEBULA, Ranking-CORE-A, Ranking-ImpactFactor},
pages = {1--34},
}
[BibTeX]
@book{hartwig_navigating_2024-1,
address = {Darmstadt, Germany},
title = {Navigating {Misinformation}: {User}-{Centered} {Design} and {Evaluation} of {Indicator}-{Based} {Digital} {Interventions}},
publisher = {Dissertation (Dr.-Ing.), Department of Computer Science, Technische Universität Darmstadt},
author = {Hartwig, Katrin},
year = {2024},
keywords = {Crisis, HCI, Projekt-NEBULA, Dissertation},
}
[BibTeX]
@book{haunschild_enhancing_2024,
address = {Darmstadt, Germany},
title = {Enhancing {Citizens}’ {Role} in {Public} {Safety}: {Interaction}, {Perception} and {Design} of {Mobile} {Warning} {Apps}},
publisher = {Dissertation (Dr. rer. nat.), Department of Computer Science, Technische Universität Darmstadt},
author = {Haunschild, Jasmin},
year = {2024},
keywords = {Crisis, HCI, Projekt-emergenCITY, Projekt-ATHENE-SecUrban, Dissertation},
}
[BibTeX] [Abstract] [Download PDF]
Computer Emergency Response Teams (CERTs) have been established in the public sector globally to provide advisory, preventive and reactive cybersecurity services for government agencies, citizens, and businesses. Nevertheless, their responsibility of monitoring, analyzing, and communicating cyber threats and security vulnerabilities have become increasingly challenging due to the growing volume and varying quality of information disseminated through public and social channels. Based on a design case study conducted from 2021 to 2023, this paper combines three iterations of expert interviews (N=25), design workshops (N=4) and cognitive walkthroughs (N=25) to design an automated, cross-platform and real-time cybersecurity dashboard. By adopting the notion of cyber situational awareness, the study further extracts user requirements and design heuristics for enhanced threat intelligence and mission awareness in CERTs, discussing the aspects of source integration, data management, customizable visualization, relationship awareness, information assessment, software integration, (inter-)organizational collaboration, and communication of stakeholder warnings.
@inproceedings{kaufhold_we_2024,
address = {New York, NY, USA},
series = {{CHI} '24},
title = {'{We} {Do} {Not} {Have} the {Capacity} to {Monitor} {All} {Media}': {A} {Design} {Case} {Study} on {Cyber} {Situational} {Awareness} in {Computer} {Emergency} {Response} {Teams}},
isbn = {9798400703300},
url = {https://peasec.de/paper/2024/2024_KaufholdRiebeBayerReuter_CertDesignCaseStudy_CHI.pdf},
doi = {10.1145/3613904.3642368},
abstract = {Computer Emergency Response Teams (CERTs) have been established in the public sector globally to provide advisory, preventive and reactive cybersecurity services for government agencies, citizens, and businesses. Nevertheless, their responsibility of monitoring, analyzing, and communicating cyber threats and security vulnerabilities have become increasingly challenging due to the growing volume and varying quality of information disseminated through public and social channels. Based on a design case study conducted from 2021 to 2023, this paper combines three iterations of expert interviews (N=25), design workshops (N=4) and cognitive walkthroughs (N=25) to design an automated, cross-platform and real-time cybersecurity dashboard. By adopting the notion of cyber situational awareness, the study further extracts user requirements and design heuristics for enhanced threat intelligence and mission awareness in CERTs, discussing the aspects of source integration, data management, customizable visualization, relationship awareness, information assessment, software integration, (inter-)organizational collaboration, and communication of stakeholder warnings.},
booktitle = {Proceedings of the {Conference} on {Human} {Factors} in {Computing} {Systems} ({CHI}) ({Best} {Paper} {Award})},
publisher = {Association for Computing Machinery},
author = {Kaufhold, Marc-André and Riebe, Thea and Bayer, Markus and Reuter, Christian},
year = {2024},
keywords = {Security, UsableSec, HCI, Projekt-CYWARN, Projekt-ATHENE-CyAware, Projekt-CYLENCE, A-Paper, AuswahlKaufhold, AuswahlUsableSec, Ranking-CORE-A*, Selected},
}
[BibTeX] [Abstract] [Download PDF]
Over the last decade, social media services had an enormous impact on modern culture. They are nowadays widely established in everyday life, but also during natural and man-made crises and conflicts. For instance, Facebook was part of the Arabic Spring, in which the tool facilitated the communication and interaction between participants of political protests. On the contrary, terrorists may recruit new members and disseminate ideologies, and social bots may influence social and political processes. Based on the notions of cultural violence and cultural peace as well as the phenomena of fake news, terrorism and social bots, this exploratory review firstly presents human cultural inter-ventions in social media (e.g. dissemination of fake news and terroristic propaganda) and respective countermeasures (e.g. fake news detection and counter-narratives). Sec-ondly, it discusses automatic cultural interventions realised via social bots (e.g. astro-turfing, misdirection and smoke screening) and countermeasures (e.g. crowdsourcing and social bot detection). Finally, this chapter concludes with a range of cultural inter-ventions and information and communication technology (ICT) in terms of actors and intentions to identify future research potential for supporting situational assessments during conflicts.
@incollection{kaufhold_cultural_2024,
address = {Wiesbaden, Germany},
title = {Cultural {Violence} and {Peace} {Interventions} in {Social} {Media}},
url = {https://link.springer.com/chapter/10.1007/978-3-658-44810-3_18},
abstract = {Over the last decade, social media services had an enormous impact on modern culture. They are nowadays widely established in everyday life, but also during natural and man-made crises and conflicts. For instance, Facebook was part of the Arabic Spring, in which the tool facilitated the communication and interaction between participants of political protests. On the contrary, terrorists may recruit new members and disseminate ideologies, and social bots may influence social and political processes. Based on the notions of cultural violence and cultural peace as well as the phenomena of fake news, terrorism and social bots, this exploratory review firstly presents human cultural inter-ventions in social media (e.g. dissemination of fake news and terroristic propaganda) and respective countermeasures (e.g. fake news detection and counter-narratives). Sec-ondly, it discusses automatic cultural interventions realised via social bots (e.g. astro-turfing, misdirection and smoke screening) and countermeasures (e.g. crowdsourcing and social bot detection). Finally, this chapter concludes with a range of cultural inter-ventions and information and communication technology (ICT) in terms of actors and intentions to identify future research potential for supporting situational assessments during conflicts.},
booktitle = {Information {Technology} for {Peace} and {Security} - {IT} {Applications} and {Infrastructures} in {Conflicts}, {Crises}, {War}, and {Peace}},
publisher = {Springer Vieweg},
author = {Kaufhold, Marc-André and Haunschild, Jasmin and Reuter, Christian},
editor = {Reuter, Christian},
year = {2024},
note = {https://doi.org/10.1007/978-3-658-44810-3\_18},
keywords = {Peace, Crisis, HCI, Projekt-CYLENCE, SocialMedia},
}
[BibTeX] [Abstract] [Download PDF]
Modern Information and Communication Technology (ICT) has been used in safety-critical situations for over twenty years. Rooted in Human-Computer Interaction (HCI) and related disciplines, the field of crisis informatics made considerable efforts to investigate social media use and role patterns in crises, facilitate the collection, processing and refinement of social media data, design and evaluate supportive ICT, and provide cumulative and longitudinal research. This narrative review examines contemporary challenges of human-centred crisis informatics and envision trends for the following decade, including (I) a broadening scope of crisis informatics, (II) the professionalisation of cross-platform collaboration of citizen communities and emergency services, (III) expert interfaces for explainable and multimodal artificial intelligence for user-generated content assessment, (IV) internet of things and mobile apps for bidirectional communication and warnings in disruption-tolerant networks, as well as (V) digital twins and virtual reality for the effective training of multi-agency collaboration in hybrid hazards.
@article{kaufhold_exploring_2024,
title = {Exploring the evolving landscape of human-centred crisis informatics: current challenges and future trends},
volume = {23},
issn = {2196-6826},
url = {https://doi.org/10.1515/icom-2024-0002},
doi = {10.1515/icom-2024-0002},
abstract = {Modern Information and Communication Technology (ICT) has been used in safety-critical situations for over twenty years. Rooted in Human-Computer Interaction (HCI) and related disciplines, the field of crisis informatics made considerable efforts to investigate social media use and role patterns in crises, facilitate the collection, processing and refinement of social media data, design and evaluate supportive ICT, and provide cumulative and longitudinal research. This narrative review examines contemporary challenges of human-centred crisis informatics and envision trends for the following decade, including (I) a broadening scope of crisis informatics, (II) the professionalisation of cross-platform collaboration of citizen communities and emergency services, (III) expert interfaces for explainable and multimodal artificial intelligence for user-generated content assessment, (IV) internet of things and mobile apps for bidirectional communication and warnings in disruption-tolerant networks, as well as (V) digital twins and virtual reality for the effective training of multi-agency collaboration in hybrid hazards.},
number = {2},
journal = {i-com - Journal of Interactive Media},
author = {Kaufhold, Marc-André},
year = {2024},
keywords = {Crisis, HCI, Projekt-emergenCITY, Projekt-ATHENE-CyAware, Projekt-CYLENCE, AuswahlCrisis},
pages = {155--163},
}
[BibTeX] [Abstract] [Download PDF]
Computer Emergency Response Teams provide advisory, preventive, and reactive cybersecurity services for authorities, citizens, and businesses. However, their responsibility of establishing cyber situational awareness by monitoring and analyzing security advisories and vulnerabilities has become challenging due to the growing volume of information disseminated through public channels. Thus, this paper presents the preliminary design of a system for automatically retrieving and extracting security advisory documents from Common Security Advisory Framework (CSAF), HTML, and RSS sources. The evaluation with various security advisory sources (N=53) shows that the developed system can retrieve 90\% of the published advisory documents, which is a significant improvement over systems only relying on the retrieval from RSS feeds (30\%).
@inproceedings{kaufhold_towards_2024,
address = {Karlsruhe, Germany},
title = {Towards a {Security} {Advisory} {Content} {Retrieval} and {Extraction} {System} for {Computer} {Emergency} {Response} {Teams}},
url = {https://dl.gi.de/items/6ee00080-4245-44c0-ae9c-1a9cdea7fa3a},
doi = {10.18420/muc2024-mci-ws13-133},
abstract = {Computer Emergency Response Teams provide advisory, preventive, and reactive cybersecurity services for authorities, citizens, and businesses. However, their responsibility of establishing cyber situational awareness by monitoring and analyzing security advisories and vulnerabilities has become challenging due to the growing volume of information disseminated through public channels. Thus, this paper presents the preliminary design of a system for automatically retrieving and extracting security advisory documents from Common Security Advisory Framework (CSAF), HTML, and RSS sources. The evaluation with various security advisory sources (N=53) shows that the developed system can retrieve 90\% of the published advisory documents, which is a significant improvement over systems only relying on the retrieval from RSS feeds (30\%).},
language = {en},
booktitle = {Mensch und {Computer} 2024 - {Workshopband}},
publisher = {Gesellschaft für Informatik e.V.},
author = {Kaufhold, Marc-André and Bäumler, Julian and Koukal, Nicolai and Reuter, Christian},
year = {2024},
keywords = {UsableSec, HCI, Projekt-ATHENE-CyAware, Projekt-CYLENCE},
}
[BibTeX] [Abstract] [Download PDF]
Im Zentrum dieses Workshops steht die Interaktion von Mensch und Technik in sicherheitskritischen Kontexten. Hierzu zählen Bereiche, die bereits seit Jahrzehnten Gegenstand der Forschung sind (z.B. Prozessführung in Leitwarten), aber auch aktuelle Herausforderungen (z.B. Social Media im Katastrophenschutz). In diesen und vielen weiteren Bereichen gilt, dass sichere Systemzustände nur durch die ganzheitliche Betrachtung von Mensch, Technik und Organisation gewährleistet bzw. schnellstmöglich wieder erreicht werden können. In diesem Zusammenhang ist der Workshop auch der Nutzbarkeit und Akzeptanz von Sicherheitskonzepten sowie einer bewussteren Auseinandersetzung der Nutzenden mit diesem Thema gewidmet.
@inproceedings{kaufhold_11_2024,
address = {Karlsruhe, Germany},
title = {11. {Workshop} {Mensch}-{Maschine}-{Interaktion} in sicherheitskritischen {Systemen}},
url = {https://dl.gi.de/items/6a526522-0cbf-4672-af8d-d7580cf97f92},
doi = {10.18420/muc2024-mci-ws13-101},
abstract = {Im Zentrum dieses Workshops steht die Interaktion von Mensch und Technik in sicherheitskritischen Kontexten. Hierzu zählen Bereiche, die bereits seit Jahrzehnten Gegenstand der Forschung sind (z.B. Prozessführung in Leitwarten), aber auch aktuelle Herausforderungen (z.B. Social Media im Katastrophenschutz). In diesen und vielen weiteren Bereichen gilt, dass sichere Systemzustände nur durch die ganzheitliche Betrachtung von Mensch, Technik und Organisation gewährleistet bzw. schnellstmöglich wieder erreicht werden können. In diesem Zusammenhang ist der Workshop auch der Nutzbarkeit und Akzeptanz von Sicherheitskonzepten sowie einer bewussteren Auseinandersetzung der Nutzenden mit diesem Thema gewidmet.},
language = {de},
booktitle = {Mensch und {Computer} 2024 - {Workshopband}},
publisher = {Gesellschaft für Informatik e.V.},
author = {Kaufhold, Marc-André and Mentler, Tilo and Nestler, Simon and Reuter, Christian},
year = {2024},
keywords = {Security, UsableSec, HCI, Projekt-CYLENCE},
}
[BibTeX] [Abstract] [Download PDF]
Like many sectors, agriculture is experiencing a continuous digitalization, i.e. an increase in data-driven technologies used. In contrast to companies of other critical infrastructures – e.g. energy or telecommunication – a typical farm is comparatively small and often run as a family business. Accordingly, the demands on farming technology, its implementation, and regulations are different in many terms. Furthermore, the circumstances that influence crisis risks and crisis management are different in agriculture – and as digitalization introduces new potential risks, this process should be reviewed critically. Currently, the most advanced approaches for agriculture are typically referred to as smart farming and agriculture 4.0, which incorporate more precise cultivation with less manual effort. But such new agriculture technology developments usually lack an assessment about its impact on the sector’s resilience and dependencies on other infrastructures. The research domains of crisis informatics and IT security mostly focuses on other topics, apart from agriculture. The resilience research in agriculture itself is currently intensifying, however, this line of research focuses more on problems resulting from the climate crisis and social change. For these reasons it remains unclear, how digitalization impacts the resilience of food production and food safety. Therefore, it is not well researched which technological developments may lead to undesired effects in the future. How modern systems should be designed to allow for both, positive impacts on efficiency, and prevention of negative effects in terms of reduced resilience capacities, is also not answered by current literature. The aim of the present work is to close this research gap at the intersection of agriculture, digitalization, and resilience. To answer the question to what extent current technologies used by farmers are at risk of failure, the dissertation first presents a snapshot of the resilience state of agricultural companies and the technologies used. This involves interviews with stakeholders, mainly farmers, as well as surveying security issues of the LoRaWAN protocol, a transmission technology especially useful for agricultural Internet of Things. Which desires of farmers exist regarding software focusing on aspects of business continuity and secured operations, is another open question. This dissertation aims to also answer this question with empirical methods, mainly focus groups and usability tests. Then the rise of Internet of Things in agriculture raises another question, whether such technologies acquired for smart farming could also have benefits for resilience against internet-connection-lost situations. This question is answered by empirical evaluation of LoRaWAN range characteristics in agricultural landscapes, as well as artifact generation for resilient communication channels on top of LoRaWAN transmission devices. Several findings are derived from the conducted research: There is a lack of understanding of how strong the used tools in agriculture depend on ICT, and many tools require a working internet connection. Moreover, IT employed by agricultural enterprises presents security concerns similar to those encountered in other domains. Based on these findings, developments, and evaluations of new software approaches are presented: Derived design criteria and own system designs that allow for modern data-driven business operations, including IoT integration based on LoRaWAN. The developed solutions show an increase in resilience capacities by enhancing the communication possibilities in crisis situations. The detected low absorption capacities against communication infrastructure outages shows room for improvement. To improve agricultural ITs‘ resilience, software engineers could use the concepts and designs of this dissertation for their product development, like a modular offline-capable farm management storage that allows an exchange of small data in an autarkic manner via commodity LoRaWAN hardware. But also technology advisors and farmers benefit from the technological analyses and suggestions embedded in this work, like using multiple LoRaWAN gateways with an overlapping coverage to mitigate security vulnerabilities.
@book{kuntke_resilient_2024,
address = {Wiesbaden, Germany},
title = {Resilient {Smart} {Farming}: {Crisis}-{Capable} {Information} and {Communication} {Technologies} for {Agriculture}},
isbn = {978-3-658-44156-2},
shorttitle = {Resilient {Smart} {Farming}},
url = {https://link.springer.com/book/10.1007/978-3-658-44157-9},
abstract = {Like many sectors, agriculture is experiencing a continuous digitalization, i.e. an increase in data-driven technologies used. In contrast to companies of other critical infrastructures – e.g. energy or telecommunication – a typical farm is comparatively small and often run as a family business.
Accordingly, the demands on farming technology, its implementation, and regulations are different in many terms.
Furthermore, the circumstances that influence crisis risks and crisis management are different in agriculture – and as digitalization introduces new potential risks, this process should be reviewed critically.
Currently, the most advanced approaches for agriculture are typically referred to as smart farming and agriculture 4.0, which incorporate more precise cultivation with less manual effort.
But such new agriculture technology developments usually lack an assessment about its impact on the sector's resilience and dependencies on other infrastructures.
The research domains of crisis informatics and IT security mostly focuses on other topics, apart from agriculture.
The resilience research in agriculture itself is currently intensifying, however, this line of research focuses more on problems resulting from the climate crisis and social change.
For these reasons it remains unclear, how digitalization impacts the resilience of food production and food safety.
Therefore, it is not well researched which technological developments may lead to undesired effects in the future.
How modern systems should be designed to allow for both, positive impacts on efficiency, and prevention of negative effects in terms of reduced resilience capacities, is also not answered by current literature.
The aim of the present work is to close this research gap at the intersection of agriculture, digitalization, and resilience.
To answer the question to what extent current technologies used by farmers are at risk of failure, the dissertation first presents a snapshot of the resilience state of agricultural companies and the technologies used.
This involves interviews with stakeholders, mainly farmers, as well as surveying security issues of the LoRaWAN protocol, a transmission technology especially useful for agricultural Internet of Things.
Which desires of farmers exist regarding software focusing on aspects of business continuity and secured operations, is another open question.
This dissertation aims to also answer this question with empirical methods, mainly focus groups and usability tests.
Then the rise of Internet of Things in agriculture raises another question, whether such technologies acquired for smart farming could also have benefits for resilience against internet-connection-lost situations.
This question is answered by empirical evaluation of LoRaWAN range characteristics in agricultural landscapes, as well as artifact generation for resilient communication channels on top of LoRaWAN transmission devices.
Several findings are derived from the conducted research:
There is a lack of understanding of how strong the used tools in agriculture depend on ICT, and many tools require a working internet connection.
Moreover, IT employed by agricultural enterprises presents security concerns similar to those encountered in other domains.
Based on these findings, developments, and evaluations of new software approaches are presented:
Derived design criteria and own system designs that allow for modern data-driven business operations, including IoT integration based on LoRaWAN.
The developed solutions show an increase in resilience capacities by enhancing the communication possibilities in crisis situations.
The detected low absorption capacities against communication infrastructure outages shows room for improvement.
To improve agricultural ITs' resilience, software engineers could use the concepts and designs of this dissertation for their product development, like a modular offline-capable farm management storage that allows an exchange of small data in an autarkic manner via commodity LoRaWAN hardware.
But also technology advisors and farmers benefit from the technological analyses and suggestions embedded in this work, like using multiple LoRaWAN gateways with an overlapping coverage to mitigate security vulnerabilities.},
publisher = {Springer Vieweg},
author = {Kuntke, Franz},
year = {2024},
doi = {10.1007/978-3-658-44157-9},
keywords = {Projekt-AgriRegio, Projekt-GeoBox, RSF, Security, UsableSec, Crisis, HCI, DissPublisher},
}
[BibTeX] [Abstract] [Download PDF]
Like many sectors, agriculture is experiencing a continuous digitalization, i.e. an increase in data-driven technologies used. In contrast to companies of other critical infrastructures – e.g. energy or telecommunication – a typical farm is comparatively small and often run as a family business. Accordingly, the demands on farming technology, its implementation, and regulations are different in many terms. Furthermore, the circumstances that influence crisis risks and crisis management are different in agriculture – and as digitalization introduces new potential risks, this process should be reviewed critically. Currently, the most advanced approaches for agriculture are typically referred to as smart farming and agriculture 4.0, which incorporate more precise cultivation with less manual effort. But such new agriculture technology developments usually lack an assessment about its impact on the sector’s resilience and dependencies on other infrastructures. The research domains of crisis informatics and IT security mostly focuses on other topics, apart from agriculture. The resilience research in agriculture itself is currently intensifying, however, this line of research focuses more on problems resulting from the climate crisis and social change. For these reasons it remains unclear, how digitalization impacts the resilience of food production and food safety. Therefore, it is not well researched which technological developments may lead to undesired effects in the future. How modern systems should be designed to allow for both, positive impacts on efficiency, and prevention of negative effects in terms of reduced resilience capacities, is also not answered by current literature. The aim of the present work is to close this research gap at the intersection of agriculture, digitalization, and resilience. To answer the question to what extent current technologies used by farmers are at risk of failure, the dissertation first presents a snapshot of the resilience state of agricultural companies and the technologies used. This involves interviews with stakeholders, mainly farmers, as well as surveying security issues of the LoRaWAN protocol, a transmission technology especially useful for agricultural Internet of Things. Which desires of farmers exist regarding software focusing on aspects of business continuity and secured operations, is another open question. This dissertation aims to also answer this question with empirical methods, mainly focus groups and usability tests. Then the rise of Internet of Things in agriculture raises another question, whether such technologies acquired for smart farming could also have benefits for resilience against internet-connection-lost situations. This question is answered by empirical evaluation of LoRaWAN range characteristics in agricultural landscapes, as well as artifact generation for resilient communication channels on top of LoRaWAN transmission devices. Several findings are derived from the conducted research: There is a lack of understanding of how strong the used tools in agriculture depend on ICT, and many tools require a working internet connection. Moreover, IT employed by agricultural enterprises presents security concerns similar to those encountered in other domains. Based on these findings, developments, and evaluations of new software approaches are presented: Derived design criteria and own system designs that allow for modern data-driven business operations, including IoT integration based on LoRaWAN. The developed solutions show an increase in resilience capacities by enhancing the communication possibilities in crisis situations. The detected low absorption capacities against communication infrastructure outages shows room for improvement. To improve agricultural ITs‘ resilience, software engineers could use the concepts and designs of this dissertation for their product development, like a modular offline-capable farm management storage that allows an exchange of small data in an autarkic manner via commodity LoRaWAN hardware. But also technology advisors and farmers benefit from the technological analyses and suggestions embedded in this work, like using multiple LoRaWAN gateways with an overlapping coverage to mitigate security vulnerabilities.
@book{kuntke_resilient_2024-1,
address = {Darmstadt, Germany},
title = {Resilient {Smart} {Farming}: {Crisis}-{Capable} {Information} and {Communication} {Technologies} for {Agriculture}},
url = {http://tuprints.ulb.tu-darmstadt.de/26496/},
abstract = {Like many sectors, agriculture is experiencing a continuous digitalization, i.e. an increase in data-driven technologies used. In contrast to companies of other critical infrastructures – e.g. energy or telecommunication – a typical farm is comparatively small and often run as a family business.
Accordingly, the demands on farming technology, its implementation, and regulations are different in many terms.
Furthermore, the circumstances that influence crisis risks and crisis management are different in agriculture – and as digitalization introduces new potential risks, this process should be reviewed critically.
Currently, the most advanced approaches for agriculture are typically referred to as smart farming and agriculture 4.0, which incorporate more precise cultivation with less manual effort.
But such new agriculture technology developments usually lack an assessment about its impact on the sector's resilience and dependencies on other infrastructures.
The research domains of crisis informatics and IT security mostly focuses on other topics, apart from agriculture.
The resilience research in agriculture itself is currently intensifying, however, this line of research focuses more on problems resulting from the climate crisis and social change.
For these reasons it remains unclear, how digitalization impacts the resilience of food production and food safety.
Therefore, it is not well researched which technological developments may lead to undesired effects in the future.
How modern systems should be designed to allow for both, positive impacts on efficiency, and prevention of negative effects in terms of reduced resilience capacities, is also not answered by current literature.
The aim of the present work is to close this research gap at the intersection of agriculture, digitalization, and resilience.
To answer the question to what extent current technologies used by farmers are at risk of failure, the dissertation first presents a snapshot of the resilience state of agricultural companies and the technologies used.
This involves interviews with stakeholders, mainly farmers, as well as surveying security issues of the LoRaWAN protocol, a transmission technology especially useful for agricultural Internet of Things.
Which desires of farmers exist regarding software focusing on aspects of business continuity and secured operations, is another open question.
This dissertation aims to also answer this question with empirical methods, mainly focus groups and usability tests.
Then the rise of Internet of Things in agriculture raises another question, whether such technologies acquired for smart farming could also have benefits for resilience against internet-connection-lost situations.
This question is answered by empirical evaluation of LoRaWAN range characteristics in agricultural landscapes, as well as artifact generation for resilient communication channels on top of LoRaWAN transmission devices.
Several findings are derived from the conducted research:
There is a lack of understanding of how strong the used tools in agriculture depend on ICT, and many tools require a working internet connection.
Moreover, IT employed by agricultural enterprises presents security concerns similar to those encountered in other domains.
Based on these findings, developments, and evaluations of new software approaches are presented:
Derived design criteria and own system designs that allow for modern data-driven business operations, including IoT integration based on LoRaWAN.
The developed solutions show an increase in resilience capacities by enhancing the communication possibilities in crisis situations.
The detected low absorption capacities against communication infrastructure outages shows room for improvement.
To improve agricultural ITs' resilience, software engineers could use the concepts and designs of this dissertation for their product development, like a modular offline-capable farm management storage that allows an exchange of small data in an autarkic manner via commodity LoRaWAN hardware.
But also technology advisors and farmers benefit from the technological analyses and suggestions embedded in this work, like using multiple LoRaWAN gateways with an overlapping coverage to mitigate security vulnerabilities.},
publisher = {Dissertation (Dr.-Ing.), Department of Computer Science, Technische Universität Darmstadt},
author = {Kuntke, Franz},
year = {2024},
doi = {10.26083/tuprints-00026496},
keywords = {Projekt-AgriRegio, Projekt-GeoBox, RSF, Security, UsableSec, Crisis, HCI, Dissertation},
}
[BibTeX] [Abstract] [Download PDF]
In many scenarios users have to communicate sensitive data with third parties such as doctors, lawyers, insurance companies, social workers or online shops. Handing over personal data is necessary to use those services but the delegation of tasks to increase efficiency still poses the risk that personal data might be leaked. To minimize this risk and further enhance the privacy of users, we propose an interaction concept that uses layered encryption of messages to provide a trade-off between privacy and usability. Users can choose which data is additionally encrypted in an inner layer, say, for the eyes of their doctor only, and which data is available in an outer (encrypted or unencrypted) layer for all staff members. Another benefit is the hiding of sensitive data from package inspection or crawling algorithms over emails, while less critical parts can still be processed by these systems via the partial access. To investigate this concept, we derive relevant use cases for form-based communication over email from a quantitative pre-study with 1011 participants, showing that general practitioners are the most suitable use case. We developed demonstrators for this use case and evaluated them in a qualitative study with 42 participants. Our results show that the possibility of minimizing the propagation of sensitive data through additional encryption is highly appreciated and the usage of form-based communication is a promising approach for the digital transformation.
@article{linsner_decision-based_2024,
title = {Decision-based {Data} {Distribution} ({D}³): {Enabling} {Users} to {Minimize} {Data} {Propagation} in {Privacy}-sensitive {Scenarios}},
issn = {2299-0984},
url = {https://petsymposium.org/popets/2024/popets-2024-0113.php},
doi = {10.56553/popets-2024-0113},
abstract = {In many scenarios users have to communicate sensitive data with third parties such as doctors, lawyers, insurance companies, social workers or online shops. Handing over personal data is necessary to use those services but the delegation of tasks to increase efficiency still poses the risk that personal data might be leaked. To minimize this risk and further enhance the privacy of users, we propose an interaction concept that uses layered encryption of messages to provide a trade-off between privacy and usability. Users can choose which data is additionally encrypted in an inner layer, say, for the eyes of their doctor only, and which data is available in an outer (encrypted or unencrypted) layer for all staff members. Another benefit is the hiding of sensitive data from package inspection or crawling algorithms over emails, while less critical parts can still be processed by these systems via the partial access. To investigate this concept, we derive relevant use cases for form-based communication over email from a quantitative pre-study with 1011 participants, showing that general practitioners are the most suitable use case. We developed demonstrators for this use case and evaluated them in a qualitative study with 42 participants. Our results show that the possibility of minimizing the propagation of sensitive data through additional encryption is highly appreciated and the usage of form-based communication is a promising approach for the digital transformation.},
number = {4},
journal = {Proceedings on Privacy Enhancing Technologies (PoPETs)},
author = {Linsner, Sebastian and Demuth, Kilian and Fischlin, Marc and Reuter, Christian},
year = {2024},
keywords = {Security, UsableSec, HCI, Projekt-CROSSING, A-Paper, Selected, Projekt-ATHENE-PriVis, Ranking-CORE-A},
}
[BibTeX] [Abstract] [Download PDF]
Securely exchanging contact information is essential for establishing trustworthy communication channels that facilitate effective online collaboration. However, current methods are neither user-friendly nor scalable for large groups of users. In response, we introduce PairSonic, a novel group pairing protocol that extends trust from physical encounters to online communication. PairSonic simplifies the pairing process by automating the tedious verification tasks of previous methods through an acoustic out-of-band channel using smartphones‘ built-in hardware. Our protocol not only facilitates connecting users for computer-supported collaboration, but also provides a more user-friendly and scalable solution to the authentication ceremonies currently used in end-to-end encrypted messengers like Signal or WhatsApp. PairSonic is available as open-source software: https://github.com/seemoo-lab/pairsonic
@inproceedings{putz_pairsonic_2024,
title = {{PairSonic}: {Helping} {Groups} {Securely} {Exchange} {Contact} {Information}},
url = {https://dl.acm.org/doi/10.1145/3678884.3681818},
doi = {10.1145/3678884.3681818},
abstract = {Securely exchanging contact information is essential for establishing trustworthy communication channels that facilitate effective online collaboration. However, current methods are neither user-friendly nor scalable for large groups of users. In response, we introduce PairSonic, a novel group pairing protocol that extends trust from physical encounters to online communication. PairSonic simplifies the pairing process by automating the tedious verification tasks of previous methods through an acoustic out-of-band channel using smartphones' built-in hardware. Our protocol not only facilitates connecting users for computer-supported collaboration, but also provides a more user-friendly and scalable solution to the authentication ceremonies currently used in end-to-end encrypted messengers like Signal or WhatsApp. PairSonic is available as open-source software: https://github.com/seemoo-lab/pairsonic},
booktitle = {{CSCW} '24 {Companion}: {Conference} {Companion} {Publication} of the 2024 on {Computer} {Supported} {Cooperative} {Work} and {Social} {Computing}},
author = {Putz, Florentin and Haesler, Steffen and Völkl, Thomas and Gehring, Maximilian and Rollshausen, Nils and Hollick, Matthias},
year = {2024},
note = {Place: San Jose, Costa Rica},
keywords = {Security, UsableSec, HCI, Projekt-emergenCITY},
}
[BibTeX] [Abstract] [Download PDF]
Trustworthy digital communication requires the secure exchange of contact information, but current approaches lack usability and scalability for larger groups of users. We evaluate the usability of two secure contact exchange systems: the current state of the art, SafeSlinger, and our newly designed protocol, PairSonic, which extends trust from physical encounters to spontaneous online communication. Our lab study (N=45) demonstrates PairSonic’s superior usability, automating the tedious verification tasks from previous approaches via an acoustic out-of-band channel. Although participants significantly preferred our system, minimizing user effort surprisingly decreased the perceived security for some users, who associated security with complexity. We discuss user perceptions of the different protocol components and identify remaining usability barriers for CSCW application scenarios.
@article{putz_sounds_2024,
title = {Sounds {Good}? {Fast} and {Secure} {Contact} {Exchange} in {Groups}},
volume = {8},
url = {https://dl.acm.org/doi/10.1145/3686964},
doi = {10.1145/3686964},
abstract = {Trustworthy digital communication requires the secure exchange of contact information, but current approaches lack usability and scalability for larger groups of users. We evaluate the usability of two secure contact exchange systems: the current state of the art, SafeSlinger, and our newly designed protocol, PairSonic, which extends trust from physical encounters to spontaneous online communication. Our lab study (N=45) demonstrates PairSonic's superior usability, automating the tedious verification tasks from previous approaches via an acoustic out-of-band channel. Although participants significantly preferred our system, minimizing user effort surprisingly decreased the perceived security for some users, who associated security with complexity. We discuss user perceptions of the different protocol components and identify remaining usability barriers for CSCW application scenarios.},
number = {CSCW2},
journal = {Proceedings of the ACM: Human Computer Interaction (PACM): Computer-Supported Cooperative Work and Social Computing (Best Paper Award)},
author = {Putz, Florentin and Haesler, Steffen and Hollick, Matthias},
year = {2024},
keywords = {Security, UsableSec, HCI, Projekt-emergenCITY, A-Paper, Ranking-CORE-A},
}
[BibTeX] [Abstract]
The development of artificial intelligence and autonomous functions in the military domain has an immense impact on technologies being developed by the private defence industry. Defence firms contribute to the narratives and visions on autonomous weapon systems and the future of warfare, e.g. in the form of strategic marketing of their products. However, their role has so far been understudied, especially regarding autonomous weapon systems. As the normative debate revolves around aspects of human control, this work examines the narratives of (meaningful) human control in the marketing of autonomous military systems by defence manufacturers. Based on a comprehensive content analysis of twenty defence firms, we identified three main narratives, which envision autonomy as a military advantage, the role of the human in the future of warfare, and human-machine teaming. Based on the results, we argue that defence companies reproduce and adapt narratives which shape expectations and visions of human control of autonomous weapon systems in anticipation of emerging norms for (meaningful) human control. However, without specifications and verification mechanisms, there is no indication that human control will be meaningful.
@article{riebe_envisioning_2024,
title = {Envisioning {Human}-{Machine} {Interaction} in {Future} {Warfare}: {Defence} {Industry} {Narratives} on {Human} {Control} of {Autonomous} {Weapon} {Systems}},
abstract = {The development of artificial intelligence and autonomous functions in the military domain has an immense impact on technologies being developed by the private defence industry. Defence firms contribute to the narratives and visions on autonomous weapon systems and the future of warfare, e.g. in the form of strategic marketing of their products. However, their role has so far been understudied, especially regarding autonomous weapon systems. As the normative debate revolves around aspects of human control, this work examines the narratives of (meaningful) human control in the marketing of autonomous military systems by defence manufacturers. Based on a comprehensive content analysis of twenty defence firms, we identified three main narratives, which envision autonomy as a military advantage, the role of the human in the future of warfare, and human-machine teaming. Based on the results, we argue that defence companies reproduce and adapt narratives which shape expectations and visions of human control of autonomous weapon systems in anticipation of emerging norms for (meaningful) human control. However, without specifications and verification mechanisms, there is no indication that human control will be meaningful.},
journal = {Global Society},
author = {Riebe, Thea and Reuter, Christian and Gonsior, Anja-Liisa and Reichert, Lilian},
year = {2024},
keywords = {Peace, Projekt-TraCe, Student, HCI, Projekt-ATHENE-CyAware, A-Paper, Ranking-ImpactFactor, AuswahlPeace},
}
[BibTeX] [Abstract] [Download PDF]
Digital technology and smartphones provide great opportunities to support crisis response measures. During the COVID-19 pandemic, many countries introduced contact tracing apps (CTAs) to prevent the virus’s spread and identify infection clusters. Because wide acceptance is necessary for these apps to work, it has been a subject of research. Past research often highlighted the role of trust for acceptance and suggested that technical transparency by opening the source code can help to build trust. For this reason, we studied the acceptance of two German apps: the Corona-Warn-App (CWA), which was developed as open-source software early on, and the Luca app, which did not publish the source code initially. We conducted a multinomial logistic regression testing effects on the adoption of (1) only the CWA, (2) only the Luca app, or (3) both apps. As predictors, we considered the role of trust in the app publisher and the government and controlled for predictors relevant to past research. We found trust to have a significant effect on the acceptance of the apps. A self-reported understanding of the term “open-source software” and a perceived threat by COVID-19 had a positive effect for the Corona-Warn-App or both apps but not for the Luca app alone. Being from Eastern Germany lowered the acceptance of the Luca app or both apps. Our findings can add to previous CTA acceptance research and provide insights for policymakers for future digital crisis measures, especially for populations comparable to the German population regarding government trust and privacy attitudes.
@article{steinbrink_impact_2024,
title = {The {Impact} of {Transparency} and {Trust} on {User} {Acceptance} of {Contact} {Tracing} {Apps}: {Implications} for the {Adoption} of {Crisis} {Response} {Apps}},
issn = {2212-4209},
url = {https://www.sciencedirect.com/science/article/pii/S2212420924004230},
doi = {10.1016/j.ijdrr.2024.104661},
abstract = {Digital technology and smartphones provide great opportunities to support crisis response measures. During the COVID-19 pandemic, many countries introduced contact tracing apps (CTAs) to prevent the virus’s spread and identify infection clusters. Because wide acceptance is necessary for these apps to work, it has been a subject of research. Past research often highlighted the role of trust for acceptance and suggested that technical transparency by opening the source code can help to build trust. For this reason, we studied the acceptance of two German apps: the Corona-Warn-App (CWA), which was developed as open-source software early on, and the Luca app, which did not publish the source code initially. We conducted a multinomial logistic regression testing effects on the adoption of (1) only the CWA, (2) only the Luca app, or (3) both apps. As predictors, we considered the role of trust in the app publisher and the government and controlled for predictors relevant to past research. We found trust to have a significant effect on the acceptance of the apps. A self-reported understanding of the term “open-source software” and a perceived threat by COVID-19 had a positive effect for the Corona-Warn-App or both apps but not for the Luca app alone. Being from Eastern Germany lowered the acceptance of the Luca app or both apps. Our findings can add to previous CTA acceptance research and provide insights for policymakers for future digital crisis measures, especially for populations comparable to the German population regarding government trust and privacy attitudes.},
journal = {International Journal of Disaster Risk Reduction},
author = {Steinbrink, Enno and Reuter, Christian},
month = jul,
year = {2024},
keywords = {Crisis, HCI, A-Paper, Projekt-ATHENE-PriVis, Ranking-ImpactFactor, Projekt-GRKPrivacy},
pages = {104661},
}
2023
[BibTeX] [Abstract] [Download PDF]
About half a billion households are expected to use smart home systems by 2025. Although many IoT sensors, such as smoke detectors or security cameras, are available and governmental crisis warning systems are in place, little is known about how to warn appropriately in smart home environments. We created a Raspberry Pi based prototype with a speaker, a display, and a connected smart light bulb. Together with a focus group, we developed a taxonomy for warning messages in smart home environments, dividing them into five classes with different stimuli. We evaluated the taxonomy using the Experience Sampling Method (ESM) in a field study at participants‘ (N = 13) homes testing 331 warnings. The results show that taxonomy-based warning stimuli are perceived to be appropriate and participants could imagine using such a warning system. We propose a deeper integration of warning capabilities into smart home environments to enhance the safety of citizens.
@inproceedings{haesler_getting_2023,
address = {New York, NY, USA},
series = {{DIS} '23},
title = {Getting the {Residents}' {Attention}: {The} {Perception} of {Warning} {Channels} in {Smart} {Home} {Warning} {Systems}},
isbn = {978-1-4503-9893-0},
url = {https://peasec.de/paper/2023/2023_HaeslerWendelbornReuter_SmartHomeWarningSystems_DIS},
doi = {10.1145/3563657.3596076},
abstract = {About half a billion households are expected to use smart home systems by 2025. Although many IoT sensors, such as smoke detectors or security cameras, are available and governmental crisis warning systems are in place, little is known about how to warn appropriately in smart home environments. We created a Raspberry Pi based prototype with a speaker, a display, and a connected smart light bulb. Together with a focus group, we developed a taxonomy for warning messages in smart home environments, dividing them into five classes with different stimuli. We evaluated the taxonomy using the Experience Sampling Method (ESM) in a field study at participants' (N = 13) homes testing 331 warnings. The results show that taxonomy-based warning stimuli are perceived to be appropriate and participants could imagine using such a warning system. We propose a deeper integration of warning capabilities into smart home environments to enhance the safety of citizens.},
booktitle = {Proceedings of the {ACM} {Designing} {Interactive} {Systems} {Conference} ({DIS})},
publisher = {Association for Computing Machinery},
author = {Haesler, Steffen and Wendelborn, Marc and Reuter, Christian},
year = {2023},
note = {event-place: Pittsburgh, PA, USA},
keywords = {Student, Crisis, HCI, Projekt-emergenCITY, Projekt-ATHENE-SecUrban, A-Paper, Ranking-CORE-A},
pages = {1114--1127},
}
[BibTeX] [Abstract] [Download PDF]
The importance of dealing with fake newsfake news has increased in both political and social contexts: While existing studies mainly focus on how to detect and label fake news, approaches to help users make their own assessments are largely lacking. This article presents existing black-boxblack box and white-boxwhite box approaches and compares advantages and disadvantages. In particular, white-box approaches show promise in counteracting reactance, while black-box approaches detect fake news with much greater accuracy. We also present the browser plugin TrustyTweetTrustyTweet, which we developed to help users evaluate tweets on Twitter by displaying politically neutral and intuitive warnings without generating reactance.
@incollection{hartwig_countering_2023,
address = {Wiesbaden},
title = {Countering {Fake} {News} {Technically} – {Detection} and {Countermeasure} {Approaches} to {Support} {Users}},
isbn = {978-3-658-40406-2},
url = {https://peasec.de/paper/2023/2023_HartwigReuter_CounteringFakeNews_TruthFakePostTruth.pdf},
abstract = {The importance of dealing with fake newsfake news has increased in both political and social contexts: While existing studies mainly focus on how to detect and label fake news, approaches to help users make their own assessments are largely lacking. This article presents existing black-boxblack box and white-boxwhite box approaches and compares advantages and disadvantages. In particular, white-box approaches show promise in counteracting reactance, while black-box approaches detect fake news with much greater accuracy. We also present the browser plugin TrustyTweetTrustyTweet, which we developed to help users evaluate tweets on Twitter by displaying politically neutral and intuitive warnings without generating reactance.},
booktitle = {Truth and {Fake} in the {Post}-{Factual} {Digital} {Age}: {Distinctions} in the {Humanities} and {IT} {Sciences}},
publisher = {Springer Fachmedien Wiesbaden},
author = {Hartwig, Katrin and Reuter, Christian},
editor = {Klimczak, Peter and Zoglauer, Thomas},
year = {2023},
doi = {10.1007/978-3-658-40406-2_7},
keywords = {Crisis, HCI, Projekt-CROSSING, Projekt-ATHENE, SocialMedia},
pages = {131--147},
}
[BibTeX] [Abstract] [Download PDF]
The use of social media today is not only ubiquitous and an integral part of everyday life but is also increasingly relevant before, during, or after emergencies. Data produced in these contexts, such as situational updates and multimedia content, is disseminated across different social media platforms and can be leveraged by various actors, including emergency services or volunteer communities. However, the dissemination of several thousand or even millions of messages during large-scale emergencies confronts analysts with challenges of information quality and overload. Hence, crisis informatics as a research domain seeks to explore and develop systems that support the collection, analysis, and dissemination of valuable social media information in emergencies. This chapter presents the social media API (SMA), which is a multi-platform service for gathering big social data across different social media channels and analyzing the credibility and relevance of collected data by the means of machine learning models. Based on the lessons learned from both the implementation process and user-centered evaluations in multiple emergency settings, this chapter discusses core challenges and potentials of the SMA and similar services, focusing on (1) the multi-platform gathering and management of data, (2) the mitigation of information overload by relevance assessment and message grouping, (3) the assessment of credibility and information quality, and (4) user-centered tailorability and adjustable data operations.
@incollection{kaufhold_big_2023,
address = {Singapore},
title = {Big {Data} and {Multi}-platform {Social} {Media} {Services} in {Disaster} {Management}},
isbn = {978-981-16-8800-3},
url = {https://peasec.de/paper/2023/2023_KaufholdReuterLudwig_BigDataMultiPlatformSocialMediaDisaster_HandbookDisaster.pdf},
abstract = {The use of social media today is not only ubiquitous and an integral part of everyday life but is also increasingly relevant before, during, or after emergencies. Data produced in these contexts, such as situational updates and multimedia content, is disseminated across different social media platforms and can be leveraged by various actors, including emergency services or volunteer communities. However, the dissemination of several thousand or even millions of messages during large-scale emergencies confronts analysts with challenges of information quality and overload. Hence, crisis informatics as a research domain seeks to explore and develop systems that support the collection, analysis, and dissemination of valuable social media information in emergencies. This chapter presents the social media API (SMA), which is a multi-platform service for gathering big social data across different social media channels and analyzing the credibility and relevance of collected data by the means of machine learning models. Based on the lessons learned from both the implementation process and user-centered evaluations in multiple emergency settings, this chapter discusses core challenges and potentials of the SMA and similar services, focusing on (1) the multi-platform gathering and management of data, (2) the mitigation of information overload by relevance assessment and message grouping, (3) the assessment of credibility and information quality, and (4) user-centered tailorability and adjustable data operations.},
booktitle = {International {Handbook} of {Disaster} {Research}},
publisher = {Springer Nature Singapore},
author = {Kaufhold, Marc-André and Reuter, Christian and Ludwig, Thomas},
editor = {Singh, Amita},
year = {2023},
keywords = {Crisis, HCI, Projekt-CYWARN, Projekt-emergenCITY, Projekt-KOKOS},
pages = {1--21},
}
[BibTeX] [Abstract] [Download PDF]
Despite the merits of public and social media in private and professional spaces, citizens and professionals are increasingly exposed to cyberabuse, such as cyberbullying and hate speech. Thus, Law Enforcement Agencies (LEA) are deployed in many countries and organisations to enhance the preventive and reactive capabilities against cyberabuse. However, their tasks are getting more complex by the increasing amount and varying quality of information disseminated into public channels. Adopting the perspectives of Crisis Informatics and safety-critical Human-Computer Interaction (HCI) and based on both a narrative literature review and group discussions, this paper first outlines the research agenda of the CYLENCE project, which seeks to design strategies and tools for cross-media reporting, detection, and treatment of cyberbullying and hatespeech in investigative and law enforcement agencies. Second, it identifies and elaborates seven research challenges with regard to the monitoring, analysis and communication of cyberabuse in LEAs, which serve as a starting point for in-depth research within the project.
@inproceedings{kaufhold_cylence_2023,
address = {Rapperswil, Switzerland},
title = {{CYLENCE}: {Strategies} and {Tools} for {Cross}-{Media} {Reporting}, {Detection}, and {Treatment} of {Cyberbullying} and {Hatespeech} in {Law} {Enforcement} {Agencies}},
url = {https://dl.gi.de/items/0e0efe8f-64bf-400c-85f7-02b65f83189d},
doi = {10.18420/muc2023-mci-ws01-211},
abstract = {Despite the merits of public and social media in private and professional spaces, citizens and professionals are increasingly exposed to cyberabuse, such as cyberbullying and hate speech. Thus, Law Enforcement Agencies (LEA) are deployed in many countries and organisations to enhance the preventive and reactive capabilities against cyberabuse. However, their tasks are getting more complex by the increasing amount and varying quality of information disseminated into public channels. Adopting the perspectives of Crisis Informatics and safety-critical Human-Computer Interaction (HCI) and based on both a narrative literature review and group discussions, this paper first outlines the research agenda of the CYLENCE project, which seeks to design strategies and tools for cross-media reporting, detection, and treatment of cyberbullying and hatespeech in investigative and law enforcement agencies. Second, it identifies and elaborates seven research challenges with regard to the monitoring, analysis and communication of cyberabuse in LEAs, which serve as a starting point for in-depth research within the project.},
language = {de},
booktitle = {Mensch und {Computer} 2023 - {Workshopband}},
publisher = {Gesellschaft für Informatik e.V.},
author = {Kaufhold, Marc-André and Bayer, Markus and Bäumler, Julian and Reuter, Christian and Stieglitz, Stefan and Basyurt, Ali Sercan and Mirabaie, Milad and Fuchß, Christoph and Eyilmez, Kaan},
year = {2023},
keywords = {UsableSec, HCI, Projekt-CYLENCE},
}
[BibTeX] [Abstract] [Download PDF]
Im Zentrum dieses Workshops steht die Interaktion von Mensch und Technik in sicherheitskritischen Kontexten. Hierzu zählen Bereiche, die bereits seit Jahrzehnten Gegenstand der Forschung sind (z.B. Prozessführung in Leitwarten), aber auch aktuelle Herausforderungen (z.B. Social Media im Katastrophenschutz). In diesen und vielen weiteren Bereichen gilt, dass sichere Systemzustände nur durch die ganzheitliche Betrachtung von Mensch, Technik und Organisation gewährleistet bzw. schnellstmöglich wieder erreicht werden können. In diesem Zusammenhang ist der Workshop auch der Nutzbarkeit und Akzeptanz von Sicherheitskonzepten sowie einer bewussteren Auseinandersetzung der Nutzenden mit diesem Thema gewidmet.
@inproceedings{kaufhold_10_2023,
address = {Rapperswil, Switzerland},
title = {10. {Workshop} {Mensch}-{Maschine}-{Interaktion} in sicherheitskritischen {Systemen}},
url = {https://dl.gi.de/items/d907ac5d-4c73-467d-adfc-4bafdb8b4cf0},
doi = {10.18420/muc2023-mci-ws01-102},
abstract = {Im Zentrum dieses Workshops steht die Interaktion von Mensch und Technik in sicherheitskritischen Kontexten. Hierzu zählen Bereiche, die bereits seit Jahrzehnten Gegenstand der Forschung sind (z.B. Prozessführung in Leitwarten), aber auch aktuelle Herausforderungen (z.B. Social Media im Katastrophenschutz). In diesen und vielen weiteren Bereichen gilt, dass sichere Systemzustände nur durch die ganzheitliche Betrachtung von Mensch, Technik und Organisation gewährleistet bzw. schnellstmöglich wieder erreicht werden können. In diesem Zusammenhang ist der Workshop auch der Nutzbarkeit und Akzeptanz von Sicherheitskonzepten sowie einer bewussteren Auseinandersetzung der Nutzenden mit diesem Thema gewidmet.},
language = {de},
booktitle = {Mensch und {Computer} 2023 - {Workshopband}},
publisher = {Gesellschaft für Informatik e.V.},
author = {Kaufhold, Marc-André and Mentler, Tilo and Nestler, Simon and Reuter, Christian},
year = {2023},
keywords = {Security, UsableSec, HCI},
}
[BibTeX] [Abstract] [Download PDF]
In summary, crisis informatics has established itself as an important research area in the ever-increasing complexity of the cyber world. Its importance is further amplified by the time-critical constraints of emergencies and disasters. However, crisis informatics will be challenged to evolve quickly to tackle global-scale emergencies, such as the ongoing COVID-19 pandemic and the increasing risks of natural hazards due to climate change. This chapter seeks to supplement this effort by analyzing interaction, role, information, and perception patterns, which were prevalent in the past 20 years of social media use in crises.
@incollection{reuter_crisis_2023,
title = {Crisis {Informatics}},
isbn = {978-1-00-905708-0},
url = {https://peasec.de/paper/2023/2023_ReuterKaufhold_CrisisInformatics_CambridgeHandbookCyber.pdf},
abstract = {In summary, crisis informatics has established itself as an important research area in the ever-increasing complexity of the cyber world. Its importance is further amplified by the time-critical constraints of emergencies and disasters. However, crisis informatics will be challenged to evolve quickly to tackle global-scale emergencies, such as the ongoing COVID-19 pandemic and the increasing risks of natural hazards due to climate change. This chapter seeks to supplement this effort by analyzing interaction, role, information, and perception patterns, which were prevalent in the past 20 years of social media use in crises.},
booktitle = {Cambridge {Handbook} of {Cyber} {Behavior}},
publisher = {Cambridge University Press},
author = {Reuter, Christian and Kaufhold, Marc-André},
editor = {Yan, Zheng},
year = {2023},
keywords = {Peace, Crisis, HCI, Projekt-ATHENE-FANCY, Projekt-CYWARN, Projekt-emergenCITY},
}
[BibTeX] [Abstract] [Download PDF]
The use of Open Source Intelligence (OSINT) to monitor and detect cybersecurity threats is gaining popularity among Cybersecurity Emergency or Incident Response Teams (CERTs/CSIRTs). They increasingly use semi-automated OSINT approaches when monitoring cyber threats for public infrastructure services and incident response. Most of the systems use publicly available data, often focusing on social media due to timely data for situational assessment. As indirect and affected stakeholders, the acceptance of OSINT systems by users, as well as the conditions which influence the acceptance, are relevant for the development of OSINT systems for cybersecurity. Therefore, as part of the ethical and social technology assessment, we conducted a survey (N=1,093), in which we asked participants about their acceptance of OSINT systems, their perceived need for open source surveillance, as well as their privacy behavior and concerns. Further, we tested if the awareness of OSINT is an interactive factor that affects other factors. Our results indicate that cyber threat perception and the perceived need for OSINT are positively related to acceptance, while privacy concerns are negatively related. The awareness of OSINT, however, has only shown effects on people with higher privacy concerns. Here, particularly high OSINT awareness and limited privacy concerns were associated with higher OSINT acceptance. Lastly, we provide implications for further research and the use of OSINT systems for cybersecurity by authorities. As OSINT is a framework rather than a single technology, approaches can be selected and combined to adhere to data minimization and anonymization as well as to leverage improvements in privacy-preserving computation and machine learning innovations. Regarding the use of OSINT, the results suggest to favor approaches that provide transparency to users regarding the use of the systems and the data they gather.
@article{riebe_privacy_2023,
title = {Privacy {Concerns} and {Acceptance} {Factors} of {OSINT} for {Cybersecurity}: {A} {Representative} {Survey}},
url = {https://petsymposium.org/popets/2023/popets-2023-0028.pdf},
doi = {https://doi.org/10.56553/popets-2023-0028},
abstract = {The use of Open Source Intelligence (OSINT) to monitor and detect cybersecurity threats is gaining popularity among Cybersecurity Emergency or Incident Response Teams (CERTs/CSIRTs). They increasingly use semi-automated OSINT approaches when monitoring cyber threats for public infrastructure services and incident response. Most of the systems use publicly available data, often focusing on social media due to timely data for situational assessment. As indirect and affected stakeholders, the acceptance of OSINT systems by users, as well as the conditions which influence the acceptance, are relevant for the development of OSINT systems for cybersecurity. Therefore, as part of the ethical and social technology assessment, we conducted a survey (N=1,093), in which we asked participants about their acceptance of OSINT systems, their perceived need for open source surveillance, as well as their privacy behavior and concerns. Further, we tested if the awareness of OSINT is an interactive factor that affects other factors. Our results indicate that cyber threat perception and the perceived need for OSINT are positively related to acceptance, while privacy concerns are negatively related. The awareness of OSINT, however, has only shown effects on people with higher privacy concerns. Here, particularly high OSINT awareness and limited privacy concerns were associated with higher OSINT acceptance. Lastly, we provide implications for further research and the use of OSINT systems for cybersecurity by authorities. As OSINT is a framework rather than a single technology, approaches can be selected and combined to adhere to data minimization and anonymization as well as to leverage improvements in privacy-preserving computation and machine learning innovations. Regarding the use of OSINT, the results suggest to favor approaches that provide transparency to users regarding the use of the systems and the data they gather.},
number = {1},
journal = {Proceedings on Privacy Enhancing Technologies (PoPETs)},
author = {Riebe, Thea and Biselli, Tom and Kaufhold, Marc-André and Reuter, Christian},
year = {2023},
keywords = {Security, UsableSec, HCI, Projekt-ATHENE-FANCY, Projekt-CYWARN, A-Paper, AuswahlUsableSec, Ranking-CORE-A},
pages = {477--493},
}
[BibTeX] [Abstract] [Download PDF]
Technologies that can be used in military and civilian applications are referred to as dual-use. The dual-use nature of many information and communications technologies (ICTs) raises new questions for research and development for national, international, and human security. Measures to deal with the risks associated with the various dual-use technologies, including proliferation control, design approaches, and policy measures, vary widely. For example, Autonomous Weapon Systems (AWS) have not yet been regulated, while cryptographic products are subject to export and import controls. Innovations in artificial intelligence (AI), robotics, cybersecurity, and automated analysis of publicly available data raise new questions about their respective dual-use risks. Dual-use risks have been systematically discussed so far, especially in the life sciences, which have contributed to the development of methods for assessment and risk management. Dual-use risks arise, among other things, from the fact that safety-critical technologies can be easily disseminated or modified, as well as used as part of a weapon system. Therefore, the development and adaptation of robots and software requires an independent consideration that builds on the insights of related dual-use discourses. Therefore, this dissertation considers the management of such risks in terms of the proliferation, regulation, and design of individual dual-use information technologies. Technology Assessment (TA) is the epistemological framework for this work, bringing together the concepts and approaches of Critical Security Studies (CSS) and Human-Computer Interaction (HCI) to help evaluate and shape dual-use technologies. In order to identify the diffusion of dual-use at an early stage, the dissertation first examines the diffusion of dual-use innovations between civilian and military research in expert networks on LinkedIn, as well as on the basis of AI patents in a patent network. The results show low diffusion and tend to confirm existing studies on diffusion in patent networks. In the following section, the regulation of dual-use technologies is examined in the paper through two case studies. The first study uses a discourse analysis to show the value conflicts with regard to the regulation of autonomous weapons systems using the concept of Meaningful Human Control (MHC), while a second study, as a long-term comparative case study, analyzes the change and consequences of the regulation of strong cryptography in the U.S. as well as the programs of intelligence agencies for mass surveillance. Both cases point to the central role of private companies, both in the production of AWS and as intermediaries for the dissemination of encryption, as well as surveillance intermediaries. Subsequently, the dissertation examines the design of a dual-use technology using an Open Source Intelligence System (OSINT) for cybersecurity. For this purpose, conceptual, empirical, and technical studies are conducted as part of the Value-Sensitive Design (VSD) framework. During the studies, implications for research on and design of OSINT were identified. For example, the representative survey of the German population has shown that transparency of use while reducing mistrust is associated with higher acceptance of such systems. Additionally, it has been shown that data sparsity through the use of expert networks has many positive effects, not only improving the performance of the system, but is also preferable for legal and social reasons. Thus, the work contributes to the understanding of specific dual-use risks of AI, the regulation of AWS and cryptography, and the design of OSINT in cybersecurity. By combining concepts from CSS and participatory design methods in HCI, this work provides an interdisciplinary and multi-method contribution.
@book{riebe_technology_2023,
address = {Darmstadt, Germany},
title = {Technology {Assessment} of {Dual}-{Use} {ICTs} – {How} to assess {Diffusion}, {Governance} and {Design}},
url = {https://tuprints.ulb.tu-darmstadt.de/22849/},
abstract = {Technologies that can be used in military and civilian applications are referred to as dual-use. The dual-use nature of many information and communications technologies (ICTs) raises new questions for research and development for national, international, and human security. Measures to deal with the risks associated with the various dual-use technologies, including proliferation control, design approaches, and policy measures, vary widely. For example, Autonomous Weapon Systems (AWS) have not yet been regulated, while cryptographic products are subject to export and import controls. Innovations in artificial intelligence (AI), robotics, cybersecurity, and automated analysis of publicly available data raise new questions about their respective dual-use risks.
Dual-use risks have been systematically discussed so far, especially in the life sciences, which have contributed to the development of methods for assessment and risk management. Dual-use risks arise, among other things, from the fact that safety-critical technologies can be easily disseminated or modified, as well as used as part of a weapon system. Therefore, the development and adaptation of robots and software requires an independent consideration that builds on the insights of related dual-use discourses. Therefore, this dissertation considers the management of such risks in terms of the proliferation, regulation, and design of individual dual-use information technologies. Technology Assessment (TA) is the epistemological framework for this work, bringing together the concepts and approaches of Critical Security Studies (CSS) and Human-Computer Interaction (HCI) to help evaluate and shape dual-use technologies.
In order to identify the diffusion of dual-use at an early stage, the dissertation first examines the diffusion of dual-use innovations between civilian and military research in expert networks on LinkedIn, as well as on the basis of AI patents in a patent network. The results show low diffusion and tend to confirm existing studies on diffusion in patent networks. In the following section, the regulation of dual-use technologies is examined in the paper through two case studies. The first study uses a discourse analysis to show the value conflicts with regard to the regulation of autonomous weapons systems using the concept of Meaningful Human Control (MHC), while a second study, as a long-term comparative case study, analyzes the change and consequences of the regulation of strong cryptography in the U.S. as well as the programs of intelligence agencies for mass surveillance. Both cases point to the central role of private companies, both in the production of AWS and as intermediaries for the dissemination of encryption, as well as surveillance intermediaries. Subsequently, the dissertation examines the design of a dual-use technology using an Open Source Intelligence System (OSINT) for cybersecurity. For this purpose, conceptual, empirical, and technical studies are conducted as part of the Value-Sensitive Design (VSD) framework. During the studies, implications for research on and design of OSINT were identified. For example, the representative survey of the German population has shown that transparency of use while reducing mistrust is associated with higher acceptance of such systems. Additionally, it has been shown that data sparsity through the use of expert networks has many positive effects, not only improving the performance of the system, but is also preferable for legal and social reasons. Thus, the work contributes to the understanding of specific dual-use risks of AI, the regulation of AWS and cryptography, and the design of OSINT in cybersecurity. By combining concepts from CSS and participatory design methods in HCI, this work provides an interdisciplinary and multi-method contribution.},
publisher = {Dissertation (Dr. rer. nat.), Department of Computer Science, Technische Universität Darmstadt},
author = {Riebe, Thea},
year = {2023},
doi = {10.26083/tuprints-00022849},
keywords = {Peace, HCI, Projekt-CYWARN, Projekt-DualUse, Projekt-KontiKat, Dissertation},
}
[BibTeX] [Abstract] [Download PDF]
The negotiation of stakeholder values as a collaborative process throughout technology development has been studied extensively within the fields of Computer Supported Cooperative Work and Human-Computer Interaction. Despite their increasing significance for cybersecurity incident response, there is a gap in research on values of importance to the design of open-source intelligence (OSINT) technologies for this purpose. In this paper, we investigate which values and value conflicts emerge due to the application and development of machine learning (ML) based OSINT technologies to assist cyber security incident response operators. For this purpose, we employ a triangulation of methods, consisting of a systematic survey of the technical literature on the development of OSINT artefacts for cybersecurity (N = 73) and an empirical value sensitive design case study, comprising semi-structured interviews with stakeholders (N = 9) as well as a focus group (N = 7) with developers. Based on our results, we identify implications relevant to the research on and design of OSINT artefacts for cybersecurity incident response.
@article{riebe_values_2023,
title = {Values and {Value} {Conflicts} in the {Context} of {OSINT} {Technologies} for {Cybersecurity} {Incident} {Response}: {A} {Value} {Sensitive} {Design} {Perspective}},
url = {https://link.springer.com/article/10.1007/s10606-022-09453-4},
doi = {10.1007/s10606-022-09453-4},
abstract = {The negotiation of stakeholder values as a collaborative process throughout technology development has been studied extensively within the fields of Computer Supported Cooperative Work and Human-Computer Interaction. Despite their increasing significance for cybersecurity incident response, there is a gap in research on values of importance to the design of open-source intelligence (OSINT) technologies for this purpose. In this paper, we investigate which values and value conflicts emerge due to the application and development of machine learning (ML) based OSINT technologies to assist cyber security incident response operators. For this purpose, we employ a triangulation of methods, consisting of a systematic survey of the technical literature on the development of OSINT artefacts for cybersecurity (N = 73) and an empirical value sensitive design case study, comprising semi-structured interviews with stakeholders (N = 9) as well as a focus group (N = 7) with developers. Based on our results, we identify implications relevant to the research on and design of OSINT artefacts for cybersecurity incident response.},
journal = {Computer Supported Cooperative Work: The Journal of Collaborative Computing (JCSCW)},
author = {Riebe, Thea and Bäumler, Julian and Kaufhold, Marc-André and Reuter, Christian},
year = {2023},
keywords = {Student, Security, UsableSec, HCI, Projekt-CYWARN, Projekt-ATHENE-SecUrban, Projekt-CROSSING, A-Paper, Ranking-ImpactFactor, Ranking-CORE-B},
}
[BibTeX] [Abstract] [Download PDF]
Technologies that can be used in military and civilian applications are referred to as dual-use. The dual-use nature of many information and communications technologies (ICTs) raises new questions for research and development for national, international, and human security. Measures to deal with the risks associated with the various dual-use technologies, including proliferation control, design approaches, and policy measures, vary widely. For example, Autonomous Weapon Systems (AWS) have not yet been regulated, while cryptographic products are subject to export and import controls. Innovations in artificial intelligence (AI), robotics, cybersecurity, and automated analysis of publicly available data raise new questions about their respective dual-use risks. Dual-use risks have been systematically discussed so far, especially in the life sciences, which have contributed to the development of methods for assessment and risk management. Dual-use risks arise, among other things, from the fact that safety-critical technologies can be easily disseminated or modified, as well as used as part of a weapon system. Therefore, the development and adaptation of robots and software requires an independent consideration that builds on the insights of related dual-use discourses. Therefore, this dissertation considers the management of such risks in terms of the proliferation, regulation, and design of individual dual-use information technologies. Technology Assessment (TA) is the epistemological framework for this work, bringing together the concepts and approaches of Critical Security Studies (CSS) and Human-Computer Interaction (HCI) to help evaluate and shape dual-use technologies. In order to identify the diffusion of dual-use at an early stage, the dissertation first examines the diffusion of dual-use innovations between civilian and military research in expert networks on LinkedIn, as well as on the basis of AI patents in a patent network. The results show low diffusion and tend to confirm existing studies on diffusion in patent networks. In the following section, the regulation of dual-use technologies is examined in the paper through two case studies. The first study uses a discourse analysis to show the value conflicts with regard to the regulation of autonomous weapons systems using the concept of Meaningful Human Control (MHC), while a second study, as a long-term comparative case study, analyzes the change and consequences of the regulation of strong cryptography in the U.S. as well as the programs of intelligence agencies for mass surveillance. Both cases point to the central role of private companies, both in the production of AWS and as intermediaries for the dissemination of encryption, as well as surveillance intermediaries. Subsequently, the dissertation examines the design of a dual-use technology using an Open Source Intelligence System (OSINT) for cybersecurity. For this purpose, conceptual, empirical, and technical studies are conducted as part of the Value-Sensitive Design (VSD) framework. During the studies, implications for research on and design of OSINT were identified. For example, the representative survey of the German population has shown that transparency of use while reducing mistrust is associated with higher acceptance of such systems. Additionally, it has been shown that data sparsity through the use of expert networks has many positive effects, not only improving the performance of the system, but is also preferable for legal and social reasons. Thus, the work contributes to the understanding of specific dual-use risks of AI, the regulation of AWS and cryptography, and the design of OSINT in cybersecurity. By combining concepts from CSS and participatory design methods in HCI, this work provides an interdisciplinary and multi-method contribution.
@book{riebe_technology_2023-1,
address = {Wiesbaden, Germany},
title = {Technology {Assessment} of {Dual}-{Use} {ICTs} – {How} to assess {Diffusion}, {Governance} and {Design}},
isbn = {978-3-658-41666-9},
url = {https://link.springer.com/book/10.1007/978-3-658-41667-6},
abstract = {Technologies that can be used in military and civilian applications are referred to as dual-use. The dual-use nature of many information and communications technologies (ICTs) raises new questions for research and development for national, international, and human security. Measures to deal with the risks associated with the various dual-use technologies, including proliferation control, design approaches, and policy measures, vary widely. For example, Autonomous Weapon Systems (AWS) have not yet been regulated, while cryptographic products are subject to export and import controls. Innovations in artificial intelligence (AI), robotics, cybersecurity, and automated analysis of publicly available data raise new questions about their respective dual-use risks.
Dual-use risks have been systematically discussed so far, especially in the life sciences, which have contributed to the development of methods for assessment and risk management. Dual-use risks arise, among other things, from the fact that safety-critical technologies can be easily disseminated or modified, as well as used as part of a weapon system. Therefore, the development and adaptation of robots and software requires an independent consideration that builds on the insights of related dual-use discourses. Therefore, this dissertation considers the management of such risks in terms of the proliferation, regulation, and design of individual dual-use information technologies. Technology Assessment (TA) is the epistemological framework for this work, bringing together the concepts and approaches of Critical Security Studies (CSS) and Human-Computer Interaction (HCI) to help evaluate and shape dual-use technologies.
In order to identify the diffusion of dual-use at an early stage, the dissertation first examines the diffusion of dual-use innovations between civilian and military research in expert networks on LinkedIn, as well as on the basis of AI patents in a patent network. The results show low diffusion and tend to confirm existing studies on diffusion in patent networks. In the following section, the regulation of dual-use technologies is examined in the paper through two case studies. The first study uses a discourse analysis to show the value conflicts with regard to the regulation of autonomous weapons systems using the concept of Meaningful Human Control (MHC), while a second study, as a long-term comparative case study, analyzes the change and consequences of the regulation of strong cryptography in the U.S. as well as the programs of intelligence agencies for mass surveillance. Both cases point to the central role of private companies, both in the production of AWS and as intermediaries for the dissemination of encryption, as well as surveillance intermediaries. Subsequently, the dissertation examines the design of a dual-use technology using an Open Source Intelligence System (OSINT) for cybersecurity. For this purpose, conceptual, empirical, and technical studies are conducted as part of the Value-Sensitive Design (VSD) framework. During the studies, implications for research on and design of OSINT were identified. For example, the representative survey of the German population has shown that transparency of use while reducing mistrust is associated with higher acceptance of such systems. Additionally, it has been shown that data sparsity through the use of expert networks has many positive effects, not only improving the performance of the system, but is also preferable for legal and social reasons. Thus, the work contributes to the understanding of specific dual-use risks of AI, the regulation of AWS and cryptography, and the design of OSINT in cybersecurity. By combining concepts from CSS and participatory design methods in HCI, this work provides an interdisciplinary and multi-method contribution.},
publisher = {Springer Vieweg},
author = {Riebe, Thea},
year = {2023},
doi = {10.1007/978-3-658-41667-6},
keywords = {Peace, HCI, Projekt-CYWARN, Projekt-DualUse, Projekt-KontiKat, DissPublisher},
}
[BibTeX] [Abstract] [Download PDF]
Like past crises, the COVID-19 pandemic has also activated individual volunteers to help to respond to the crisis. This includes digital volunteers, who have organized physical aid and conducted activities on social media. Analyzing German volunteering support groups on Facebook and related Reddit threads in the context of the COVID-19 pandemic, we {\textbackslash}updatedshow what type of help is offered and how social media users interact with each other, trying to cope with the situation. We reveal that most users offering help online conduct mostly typical care work, such as buying groceries or giving advice. Crucially, volunteering is characterized by relationships of care and thus builds on affirmative interactions. Albeit some misdirected offers and regressive interruptions, people use the possibility to make their voices heard and, showing empathy, help each other to cope with crisis. Social media like Facebook mediate societal structures, including relationships of care, offering a space for continuous, cumulatively resilient conduct of care work. Reflecting on the traditional division of labor in crisis volunteering and counter-productive dynamics of care and empathy, we aim for feminist ethics of care which allows for interactions on social media that foster generative computer-supported collaboration.
@article{schmid_digital_2023,
title = {Digital {Volunteers} {During} the {COVID}-19 {Pandemic}: {Care} {Work} on {Social} {Media} for {Socio}-technical {Resilience}},
volume = {3},
issn = {2748-5625},
url = {https://ojs.weizenbaum-institut.de/index.php/wjds/article/view/78},
doi = {10.34669/WI.WJDS/3.3.6},
abstract = {Like past crises, the COVID-19 pandemic has also activated individual volunteers to help to respond to the crisis. This includes digital volunteers, who have organized physical aid and conducted activities on social media. Analyzing German volunteering support groups on Facebook and related Reddit threads in the context of the COVID-19 pandemic, we {\textbackslash}updatedshow what type of help is offered and how social media users interact with each other, trying to cope with the situation. We reveal that most users offering help online conduct mostly typical care work, such as buying groceries or giving advice. Crucially, volunteering is characterized by relationships of care and thus builds on affirmative interactions. Albeit some misdirected offers and regressive interruptions, people use the possibility to make their voices heard and, showing empathy, help each other to cope with crisis. Social media like Facebook mediate societal structures, including relationships of care, offering a space for continuous, cumulatively resilient conduct of care work. Reflecting on the traditional division of labor in crisis volunteering and counter-productive dynamics of care and empathy, we aim for feminist ethics of care which allows for interactions on social media that foster generative computer-supported collaboration.},
number = {1},
journal = {Weizenbaum Journal of the Digital Society},
author = {Schmid, Stefka and Guntrum, Laura and Haesler, Steffen and Schultheiß, Lisa and Reuter, Christian},
month = may,
year = {2023},
keywords = {Peace, Projekt-TraCe, Student, Crisis, HCI, Projekt-emergenCITY, Projekt-ATHENE-SecUrban, SocialMedia},
}
[BibTeX] [Abstract] [Download PDF]
When considering privacy, context, and environmental circumstances can have a strong influence on individual decisions and user behavior. Especially in crises or threatening situations, privacy may conflict with other values, such as personal safety and health. In other cases, personal or public safety can also be dependent on privacy: the context of flight shows how, for those affected, the value of data protection can increase as a result of an increased threat situation. Thus, when individual sovereignty—the autonomous development of one’s own will—or safety is highly dependent on information flows, people tend to be more protective of their privacy in order to maintain their information sovereignty. But also, the context of agriculture, as part of the critical infrastructure, shows how privacy concerns can affect the adoption of digital tools. With these two examples, flight and migration as well as agriculture, this chapter presents some exemplary results that illustrate the importance of the influence of situational factors on perceived information sovereignty and the evaluation of privacy.
@incollection{steinbrink_privacy_2023,
address = {Cham},
title = {Privacy {Perception} and {Behaviour} in {Safety}-{Critical} {Environments}},
isbn = {978-3-031-28643-8},
url = {https://doi.org/10.1007/978-3-031-28643-8_12},
abstract = {When considering privacy, context, and environmental circumstances can have a strong influence on individual decisions and user behavior. Especially in crises or threatening situations, privacy may conflict with other values, such as personal safety and health. In other cases, personal or public safety can also be dependent on privacy: the context of flight shows how, for those affected, the value of data protection can increase as a result of an increased threat situation. Thus, when individual sovereignty—the autonomous development of one’s own will—or safety is highly dependent on information flows, people tend to be more protective of their privacy in order to maintain their information sovereignty. But also, the context of agriculture, as part of the critical infrastructure, shows how privacy concerns can affect the adoption of digital tools. With these two examples, flight and migration as well as agriculture, this chapter presents some exemplary results that illustrate the importance of the influence of situational factors on perceived information sovereignty and the evaluation of privacy.},
booktitle = {Human {Factors} in {Privacy} {Research}},
publisher = {Springer International Publishing},
author = {Steinbrink, Enno and Biselli, Tom and Linsner, Sebastian and Herbert, Franziska and Reuter, Christian},
editor = {Gerber, Nina and Stöver, Alina and Marky, Karola},
year = {2023},
keywords = {Security, UsableSec, HCI, Projekt-ATHENE-FANCY, Projekt-CROSSING, Projekt-GRKPrivacy},
pages = {237--251},
}
[BibTeX] [Abstract] [Download PDF]
From the perspective of end-users, IoT devices behave like a black box: As long as they work as intended, users will not detect any compromise. Users have minimal control over the software. Hence, it is very likely that the user misses that illegal recordings and transmissions occur if a security camera or a smart speaker is hacked. In this paper, we present SCAtt-man, the first remote attestation scheme that is specifically designed with the user in mind. SCAtt-man deploys software-based attestation to check the integrity of remote devices, allowing users to verify the integrity of IoT devices with their smartphones. The key novelty of SCAtt-man resides in the utilization of user-observable side-channels such as light or sound in the attestation protocol. Our proof-of-concept implementation targets a smart speaker and an attestation protocol that is based on a data-over-sound protocol. Our evaluation demonstrates the effectiveness of toolname against a variety of attacks and its usability based on a user study with 20 participants.
@inproceedings{surminski_scatt-man_2023,
address = {New York, NY, USA},
series = {{CODASPY} '23},
title = {{SCAtt}-man: {Side}-{Channel}-{Based} {Remote} {Attestation} for {Embedded} {Devices} that {Users} {Understand}},
isbn = {9798400700675},
url = {https://doi.org/10.1145/3577923.3583652},
doi = {10.1145/3577923.3583652},
abstract = {From the perspective of end-users, IoT devices behave like a black box: As long as they work as intended, users will not detect any compromise. Users have minimal control over the software. Hence, it is very likely that the user misses that illegal recordings and transmissions occur if a security camera or a smart speaker is hacked. In this paper, we present SCAtt-man, the first remote attestation scheme that is specifically designed with the user in mind. SCAtt-man deploys software-based attestation to check the integrity of remote devices, allowing users to verify the integrity of IoT devices with their smartphones. The key novelty of SCAtt-man resides in the utilization of user-observable side-channels such as light or sound in the attestation protocol. Our proof-of-concept implementation targets a smart speaker and an attestation protocol that is based on a data-over-sound protocol. Our evaluation demonstrates the effectiveness of toolname against a variety of attacks and its usability based on a user study with 20 participants.},
booktitle = {Proceedings of the {Thirteenth} {ACM} {Conference} on {Data} and {Application} {Security} and {Privacy}},
publisher = {Association for Computing Machinery},
author = {Surminski, Sebastian and Niesler, Christian and Linsner, Sebastian and Davi, Lucas and Reuter, Christian},
year = {2023},
keywords = {Security, UsableSec, HCI, Projekt-CROSSING, Ranking-CORE-B},
pages = {225--236},
}
[BibTeX] [Abstract] [Download PDF]
Modern smartphones support FIDO2 passwordless authentication using either external security keys or internal biometric authentication, but it is unclear whether users appreciate and accept these new forms of web authentication for their own accounts. We present the first lab study (N=87) comparing platform and roaming authentication on smartphones, determining the practical strengths and weaknesses of FIDO2 as perceived by users in a mobile scenario. Most participants were willing to adopt passwordless authentication during our in-person user study, but closer analysis shows that participants prioritize usability, security, and availability differently depending on the account type. We identify remaining adoption barriers that prevent FIDO2 from succeeding password authentication, such as missing support for contemporary usage patterns, including account delegation and usage on multiple clients.
@inproceedings{wursching_fido2_2023,
address = {New York, NY, USA},
series = {{CHI} '23},
title = {{FIDO2} the {Rescue}? {Platform} vs. {Roaming} {Authentication} on {Smartphones}},
url = {https://peasec.de/paper/2023/2023_WuerschingPutzHaeslerHollick_PlatformvsRoamingAuthenticationonSmartphones_CHI.pdf},
doi = {10.1145/3544548.3580993},
abstract = {Modern smartphones support FIDO2 passwordless authentication using either external security keys or internal biometric authentication, but it is unclear whether users appreciate and accept these new forms of web authentication for their own accounts. We present the first lab study (N=87) comparing platform and roaming authentication on smartphones, determining the practical strengths and weaknesses of FIDO2 as perceived by users in a mobile scenario. Most participants were willing to adopt passwordless authentication during our in-person user study, but closer analysis shows that participants prioritize usability, security, and availability differently depending on the account type. We identify remaining adoption barriers that prevent FIDO2 from succeeding password authentication, such as missing support for contemporary usage patterns, including account delegation and usage on multiple clients.},
booktitle = {Proceedings of the {Conference} on {Human} {Factors} in {Computing} {Systems} ({CHI}) ({Best} {Paper} {Award})},
publisher = {Association for Computing Machinery},
author = {Würsching, Leon and Putz, Florentin and Haesler, Steffen and Hollick, Matthias},
year = {2023},
note = {event-place: Hamburg, HH, Germany},
keywords = {Security, UsableSec, HCI, Projekt-emergenCITY, A-Paper, AuswahlUsableSec, Ranking-CORE-A*},
}
[BibTeX] [Abstract] [Download PDF]
In this paper we provide an overview of XAI by introducing fundamental terminology and the goals of XAI, as well as recent research findings. Whilst doing this, we pay special attention to strategies for non-expert stakeholders. This leads us to our first research question: “What are the trends in explainable AI strategies for non-experts?”. In order to illustrate the current state of these trends, we further want to study an exemplary and very relevant application domain. According to Abdul et al. (2018), one of the first domains where researchers pursued XAI is the medical domain. This leads to our second research question: “What are the approaches of XAI in the medical domain for non-expert stakeholders?” These research questions will provide an overview of current topics in XAI and show possible research extensions for specific domains.
@incollection{ozalp_trends_2023,
address = {Bielefeld},
title = {Trends in {Explainable} {Artificial} {Intelligence} for {Non}-{Experts}},
url = {https://www.transcript-verlag.de/978-3-8376-5732-6/ai-limits-and-prospects-of-artificial-intelligence/?c=313000019},
abstract = {In this paper we provide an overview of XAI by introducing fundamental terminology and the goals of XAI, as well as recent research findings. Whilst doing this, we pay special attention to strategies for non-expert stakeholders. This leads us to our first research question: “What are the trends in explainable AI strategies for non-experts?”. In order to illustrate the current state of these trends, we further want to study an exemplary and very relevant application domain. According to Abdul et al. (2018), one of the first domains where researchers pursued XAI is the medical domain. This leads to our second research question: “What are the approaches of XAI in the medical domain for non-expert stakeholders?” These research questions will provide an overview of current topics in XAI and show possible research extensions for specific domains.},
booktitle = {{AI} - {Limits} and {Prospects} of {Artificial} {Intelligence}},
publisher = {Transcript Verlag},
author = {Özalp, Elise and Hartwig, Katrin and Reuter, Christian},
editor = {Klimczak, Peter and Petersen, Christer},
year = {2023},
keywords = {Student, UsableSec, HCI, Projekt-CYWARN, Projekt-ATHENE-SecUrban, Projekt-CROSSING},
pages = {223--243},
}
2022
[BibTeX] [Abstract] [Download PDF]
Concise instruments to determine privacy personas – typical privacy-related user groups – are not available at present. Consequently, we aimed to identify them on a privacy knowledge–privacy behavior ratio based on a self-developed instrument. To achieve this, we conducted an item analysis (N = 820) and a confirmatory factor analysis (CFA) (N = 656) of data based on an online study with German participants. Starting with 81 items, we reduced those to an eleven-item questionnaire with the two scales privacy knowledge and privacy behavior. A subsequent cluster analysis (N = 656) revealed three distinct user groups: (1) Fundamentalists scoring high in privacy knowledge and behavior, (2) Pragmatists scoring average in privacy knowledge and behavior and (3) Unconcerned scoring low in privacy knowledge and behavior. In a closer inspection of the questionnaire, the CFAs supported the model with a close global fit based on RMSEA in a training and to a lesser extent in a cross-validation sample. Deficient local fit as well as validity and reliability coefficients well below generally accepted thresholds, however, revealed that the questionnaire in its current form cannot be considered a suitable measurement instrument for determining privacy personas. The results are discussed in terms of related persona conceptualizations, the importance of a methodologically sound investigation of corresponding privacy dimensions and our lessons learned.
@article{biselli_challenges_2022,
title = {On the {Challenges} of {Developing} a {Concise} {Questionnaire} to {Identify} {Privacy} {Personas}},
url = {https://petsymposium.org/2022/files/papers/issue4/popets-2022-0126.pdf},
doi = {10.56553/popets-2022-0126},
abstract = {Concise instruments to determine privacy personas – typical privacy-related user groups – are not available at present. Consequently, we aimed to identify them on a privacy knowledge–privacy behavior ratio based on a self-developed instrument. To achieve this, we conducted an item analysis (N = 820) and a confirmatory factor analysis (CFA) (N = 656) of data based on an online study with German participants. Starting with 81 items, we reduced those to an eleven-item questionnaire with the two scales privacy knowledge and privacy behavior. A subsequent cluster analysis (N = 656) revealed three distinct user groups: (1) Fundamentalists scoring high in privacy knowledge and behavior, (2) Pragmatists scoring average in privacy knowledge and behavior and (3) Unconcerned scoring low in privacy knowledge and behavior. In a closer inspection of the questionnaire, the CFAs supported the model with a close global fit based on RMSEA in a training and to a lesser extent in a cross-validation sample. Deficient local fit as well as validity and reliability coefficients well below generally accepted thresholds, however, revealed that the questionnaire in its current form cannot be considered a suitable measurement instrument for determining privacy personas. The results are discussed in terms of related persona conceptualizations, the importance of a methodologically sound investigation of corresponding privacy dimensions and our lessons learned.},
number = {4},
journal = {Proceedings on Privacy Enhancing Technologies (PoPETs)},
author = {Biselli, Tom and Steinbrink, Enno and Herbert, Franziska and Schmidbauer-Wolf, Gina Maria and Reuter, Christian},
year = {2022},
keywords = {Security, UsableSec, HCI, Projekt-ATHENE-FANCY, Projekt-CROSSING, A-Paper, AuswahlUsableSec, Ranking-CORE-A, Projekt-GRKPrivacy},
pages = {645--669},
}
[BibTeX] [Abstract] [Download PDF]
User Experience ist von zunehmender Relevanz für die Entwicklung digitaler Designentscheidungen und hat somit weitgehende Auswirkungen auf das Nutzerverhalten. Dass dies besonders für die Sicherheit und Vertraulichkeit nicht nur von Vorteil sein kann, sondern Nutzer*innen negativ beeinflussen kann, wird in dieser Arbeit ersichtlich. Betrachtetwerden dafür die Themengebiete Anti-Patterns, Grey Patterns und Dark-Patterns. Anti-Patterns bezeichnen wiederkehrende Lösungen für ein Konzept eines User Interfaces, die trotz guter Intention ungewünschte Nebeneffekte oder Konsequenzen haben. Dark-Patterns dagegen stellen Designentscheidungen dar, die durch Täuschung oder Ausnutzung psychischen Drucks versuchen Nutzer*innen zu Handlungen zu verleiten, von denen die Ersteller*innen des Dark-Patterns mehr profitieren als die Anwender* innen. Der Begriff Grey Patterns wird in dieser Arbeit für alle Design Patterns genutzt, die sich nicht direkt zuordnen lassen. Da es bisher kaum vergleichendeWerke und keinen Konsens zu diesen Themengebieten gibt, ist das Ziel dieser Arbeit ein grundlegendes Modell aufzustellen. Dabei wird durch die Untersuchung bestehender Literatur eine zusammenfassende Taxonomie und ein Vorgehen zur Unterscheidung von Anti-Patterns und Dark-Patterns erarbeitet, die als Grundlage für weitere Arbeiten und zur Entwicklung von Gegenmaßnahmen genutzt werden können.
@inproceedings{buhleier_klassifikation_2022,
address = {Darmstadt},
series = {Mensch und {Computer} 2022 - {Workshopband}},
title = {Eine {Klassifikation} sicherheitskritischer {UX}-{Design}-{Patterns}},
url = {https://dl.gi.de/handle/20.500.12116/39087},
doi = {10.18420/muc2022-mci-ws10-275},
abstract = {User Experience ist von zunehmender Relevanz für die Entwicklung digitaler Designentscheidungen und hat somit weitgehende Auswirkungen auf das Nutzerverhalten. Dass dies besonders für die Sicherheit und Vertraulichkeit nicht nur von Vorteil sein kann, sondern Nutzer*innen negativ beeinflussen kann, wird in dieser Arbeit ersichtlich. Betrachtetwerden dafür die Themengebiete Anti-Patterns, Grey Patterns und Dark-Patterns. Anti-Patterns bezeichnen wiederkehrende Lösungen für ein Konzept eines User Interfaces, die trotz guter Intention ungewünschte Nebeneffekte oder Konsequenzen haben. Dark-Patterns dagegen stellen Designentscheidungen dar, die durch Täuschung oder Ausnutzung psychischen Drucks versuchen Nutzer*innen zu Handlungen zu verleiten, von denen die Ersteller*innen des Dark-Patterns mehr profitieren als die Anwender* innen. Der Begriff Grey Patterns wird in dieser Arbeit für alle Design Patterns genutzt, die sich nicht direkt zuordnen lassen. Da es bisher kaum vergleichendeWerke und keinen Konsens zu diesen Themengebieten gibt, ist das Ziel dieser Arbeit ein grundlegendes Modell aufzustellen. Dabei wird durch die Untersuchung bestehender Literatur eine zusammenfassende Taxonomie und ein Vorgehen zur Unterscheidung von Anti-Patterns und Dark-Patterns erarbeitet, die als Grundlage für weitere Arbeiten und zur Entwicklung von Gegenmaßnahmen genutzt werden können.},
language = {de},
booktitle = {Mensch und {Computer} 2022 - {Workshopband}},
publisher = {Gesellschaft für Informatik},
author = {Buhleier, Laura and Linsner, Sebastian and Steinbrink, Enno and Reuter, Christian},
year = {2022},
keywords = {Student, Security, UsableSec, HCI, Projekt-CROSSING, Projekt-GRKPrivacy},
}
[BibTeX] [Abstract] [Download PDF]
Social media have come to play a vital role not only in our everyday lives, but also in times of conflict and crisis such as natural disasters or civil wars. Recent research has highlighted, on the one hand, the use of social media as a means of recruitment by terrorists and, on the other hand, the use of Facebook, Twitter etc. to gain the support of the population during insurgencies. This article conducts a qualitative content analysis of content on Twitter concerning the conflict in the Jammu and Kashmir region. The tweets following the death of a popular militant, Burhan Wani, cover three different themes: (1) criticism of intellectuals, (2) Burhan Wani’s impact on the conflict, and (3) tweets referring to the conflict itself. Generally, people use Twitter to make their own point of view clear to others and discredit the opposing party, at the same time tweets are reflecting the antagonism between the two parties to the conflict, India and Pakistan. The sample of tweets reflects the lack of awareness among people in the region regarding the motivations of the new generation of militancy emerging in Kashmir after 1990.
@article{gabel_discussing_2022,
title = {Discussing {Conflict} in {Social} {Media} – {The} {Use} of {Twitter} in the {Jammu} and {Kashmir} {Conflict}},
volume = {15},
url = {https://journals.sagepub.com/doi/full/10.1177/1750635220970997},
abstract = {Social media have come to play a vital role not only in our everyday lives, but also in times of conflict and crisis such as natural disasters or civil wars. Recent research has highlighted, on the one hand, the use of social media as a means of recruitment by terrorists and, on the other hand, the use of Facebook, Twitter etc. to gain the support of the population during insurgencies. This article conducts a qualitative content analysis of content on Twitter concerning the conflict in the Jammu and Kashmir region. The tweets following the death of a popular militant, Burhan Wani, cover three different themes: (1) criticism of intellectuals, (2) Burhan Wani's impact on the conflict, and (3) tweets referring to the conflict itself. Generally, people use Twitter to make their own point of view clear to others and discredit the opposing party, at the same time tweets are reflecting the antagonism between the two parties to the conflict, India and Pakistan. The sample of tweets reflects the lack of awareness among people in the region regarding the motivations of the new generation of militancy emerging in Kashmir after 1990.},
number = {4},
journal = {Media, War \& Conflict},
author = {Gabel, Sabrina and Reichert, Lilian and Reuter, Christian},
year = {2022},
keywords = {Peace, Crisis, HCI, Projekt-ATHENE-SecUrban, Ranking-ImpactFactor, SocialMedia},
pages = {1--26},
}
[BibTeX] [Abstract] [Download PDF]
Nudging users to keep them secure online has become a growing research field in cybersecurity. While existing approaches are mainly blackbox based, showing aggregated visualisations as one-size-fits-all nudges, personalisation turned out promising to enhance the efficacy of nudges within the high variance of users and contexts. This article presents a disaggregated whitebox-based visualisation of critical information as a novel nudge. By segmenting users according to their decision-making and information processing styles, we investigate if the novel nudge is more effective for specific users than a common black-box nudge. Based on existing literature about critical factors in password security, we designed a dynamic radar chart and parallel coordinates as disaggregated visualisations. We evaluated the short-term effectiveness and users‘ perception of the nudges in a think-aloud prestudy and a representative online evaluation (N=1.012). Our findings suggest that dynamic radar charts present a moderately effective nudge towards stronger passwords regarding short-term efficacy and are appreciated particularly by players of role-playing games.
@article{hartwig_nudging_2022,
title = {Nudging {Users} {Towards} {Better} {Security} {Decisions} in {Password} {Creation} {Using} {Whitebox}-based {Multidimensional} {Visualizations}},
volume = {41},
url = {https://peasec.de/paper/2022/2022_HartwigReuter_WhiteboxMultidimensionalNudges_BIT.pdf},
doi = {10.1080/0144929X.2021.1876167},
abstract = {Nudging users to keep them secure online has become a growing research field in cybersecurity. While existing approaches are mainly blackbox based, showing aggregated visualisations as one-size-fits-all nudges, personalisation turned out promising to enhance the efficacy of nudges within the high variance of users and contexts. This article presents a disaggregated whitebox-based visualisation of critical information as a novel nudge. By segmenting users according to their decision-making and information processing styles, we investigate if the novel nudge is more effective for specific users than a common black-box nudge. Based on existing literature about critical factors in password security, we designed a dynamic radar chart and parallel coordinates as disaggregated visualisations. We evaluated the short-term effectiveness and users' perception of the nudges in a think-aloud prestudy and a representative online evaluation (N=1.012). Our findings suggest that dynamic radar charts present a moderately effective nudge towards stronger passwords regarding short-term efficacy and are appreciated particularly by players of role-playing games.},
number = {7},
journal = {Behaviour \& Information Technology (BIT)},
author = {Hartwig, Katrin and Reuter, Christian},
year = {2022},
keywords = {Security, UsableSec, HCI, Projekt-ATHENE-FANCY, Projekt-CROSSING, A-Paper, AuswahlUsableSec, Selected, Ranking-CORE-A, Ranking-ImpactFactor},
pages = {1357--1380},
}
[BibTeX] [Abstract] [Download PDF]
Besides the merits of increasing digitization and networking, societies are increasling exposed to cyberattacks. In Germany, Computer Emerrgency Response Teams (CERTs) of the public sector operate on federal and state level to provide preventative and reactive information security services for authorities, citizens, and enterprises. Their tasks of monitoring, analyzing, and communicating threats is getting more complex by the increasing information quantity disseminated into relevant public channels. Using the lens of design science research, this paper contributes with the design and evaluation of a cross-platform cybersecurity dashboard for CERTs. Based on expert scenario-based walkthroughs in combination with semi-structured interviews (N=12), it discusses six design implications, including the customizability of data sources and filtering of displayed entities, modular integration of additional information sources, interrelation between different information feeds, intelligent algorithms for content assessment and filtering, integration with security software and systems, as well as export, sharing and communication of relevant data.
@inproceedings{kaufhold_cyber_2022,
address = {Timisoara, Romania},
title = {Cyber {Threat} {Observatory}: {Design} and {Evaluation} of an {Interactive} {Dashboard} for {Computer} {Emergency} {Response} {Teams}},
url = {http://www.peasec.de/paper/2022/2022_KaufholdBasyurtEyilmezStoettingerReuter_CyberThreatObservatory_ECIS.pdf},
abstract = {Besides the merits of increasing digitization and networking, societies are increasling exposed to cyberattacks. In Germany, Computer Emerrgency Response Teams (CERTs) of the public sector operate on federal and state level to provide preventative and reactive information security services for authorities, citizens, and enterprises. Their tasks of monitoring, analyzing, and communicating threats is getting more complex by the increasing information quantity disseminated into relevant public channels. Using the lens of design science research, this paper contributes with the design and evaluation of a cross-platform cybersecurity dashboard for CERTs. Based on expert scenario-based walkthroughs in combination with semi-structured interviews (N=12), it discusses six design implications, including the customizability of data sources and filtering of displayed entities, modular integration of additional information sources, interrelation between different information feeds, intelligent algorithms for content assessment and filtering, integration with security software and systems, as well as export, sharing and communication of relevant data.},
booktitle = {Proceedings of the {European} {Conference} on {Information} {Systems} ({ECIS})},
author = {Kaufhold, Marc-André and Basyurt, Ali Sercan and Eyilmez, Kaan and Stöttinger, Marc and Reuter, Christian},
year = {2022},
keywords = {Security, UsableSec, HCI, Projekt-CYWARN, Projekt-ATHENE-SecUrban, A-Paper, Ranking-CORE-A},
}
[BibTeX] [Abstract] [Download PDF]
Despite the merits of digitization in private and professional spaces, critical infrastructures and societies are increasingly exposed to cyberattacks. We conducted a representative survey with German citizens (N=1,093) to examine how they assess the current and future cyber threat situation as well as possible protective measures in cyberspace. Furthermore, we asked what information and channels citizens need to be aware of cyber threats. Our findings indicate that large proportions of the German population feel inadequately informed about cyber threats and tend to only apply enforced security measures by programs (e.g., updates) and services (e.g., two-factor authentication). Furthermore, institutions such as state-level Computer Emergency Response Teams (CERTs) are relatively unknown among the population and respondents showed little confidence in German security authorities to cope with largescale attacks and ultimately protect citizens. Still, our participants prefer to receive cybersecurity information via installed security applications, television channels, or emergency warning apps.
@inproceedings{kaufhold_implementation_2022,
address = {Darmstadt},
series = {Mensch und {Computer} 2022 - {Workshopband}},
title = {The {Implementation} of {Protective} {Measures} and {Communication} of {Cybersecurity} {Alerts} in {Germany} - {A} {Representative} {Survey} of the {Population}},
url = {https://dl.gi.de/handle/20.500.12116/39061},
doi = {10.18420/muc2022-mci-ws01-228},
abstract = {Despite the merits of digitization in private and professional spaces, critical infrastructures and societies are increasingly exposed to cyberattacks. We conducted a representative survey with German citizens (N=1,093) to examine how they assess the current and future cyber threat situation as well as possible protective measures in cyberspace. Furthermore, we asked what information and channels citizens need to be aware of cyber threats. Our findings indicate that large proportions of the German population feel inadequately informed about cyber threats and tend to only apply enforced security measures by programs (e.g., updates) and services (e.g., two-factor authentication). Furthermore, institutions such as state-level Computer Emergency Response Teams (CERTs) are relatively unknown among the population and respondents showed little confidence in German security authorities to cope with largescale attacks and ultimately protect citizens. Still, our participants prefer to receive cybersecurity information via installed security applications, television channels, or emergency warning apps.},
language = {en},
booktitle = {Mensch und {Computer} 2022 - {Workshopband}},
publisher = {Gesellschaft für Informatik},
author = {Kaufhold, Marc-André and Bäumler, Julian and Reuter, Christian},
year = {2022},
keywords = {Student, Security, UsableSec, HCI, Projekt-CYWARN, Projekt-ATHENE-SecUrban},
}
[BibTeX] [Abstract] [Download PDF]
Im Zentrum dieses Workshops steht die Interaktion von Mensch und Technik in sicherheitskritischen Kontexten. Hierzu zählen Bereiche, die bereits seit Jahrzehnten Gegenstand der Forschung sind (z.B. Prozessführung in Leitwarten), aber auch aktuelle Herausforderungen (z.B. Social Media im Katastrophenschutz). In diesen und vielen weiteren Bereichen gilt, dass sichere Systemzustände nur durch die ganzheitliche Betrachtung von Mensch, Technik und Organisation gewährleistet bzw. schnellstmöglich wieder erreicht werden können. In diesem Zusammenhang ist der Workshop auch der Nutzbarkeit und Akzeptanz von Sicherheitskonzepten sowie einer bewussteren Auseinandersetzung der Nutzenden mit diesem Thema gewidmet.
@inproceedings{mentler_9_2022,
address = {Darmstadt, Germany},
title = {9. {Workshop} {Mensch}-{Maschine}-{Interaktion} in sicherheitskritischen {Systemen}},
url = {https://dl.gi.de/handle/20.500.12116/39086},
doi = {10.18420/muc2022-mci-ws10-117},
abstract = {Im Zentrum dieses Workshops steht die Interaktion von Mensch und Technik in sicherheitskritischen Kontexten. Hierzu zählen Bereiche, die bereits seit Jahrzehnten Gegenstand der Forschung sind (z.B. Prozessführung in Leitwarten), aber auch aktuelle Herausforderungen (z.B. Social Media im Katastrophenschutz). In diesen und vielen weiteren Bereichen gilt, dass sichere Systemzustände nur durch die ganzheitliche Betrachtung von Mensch, Technik und Organisation gewährleistet bzw. schnellstmöglich wieder erreicht werden können. In diesem Zusammenhang ist der Workshop auch der Nutzbarkeit und Akzeptanz von Sicherheitskonzepten sowie einer bewussteren Auseinandersetzung der Nutzenden mit diesem Thema gewidmet.},
language = {de},
booktitle = {Mensch und {Computer} 2022 - {Workshopband}},
publisher = {Gesellschaft für Informatik e.V.},
author = {Mentler, Tilo and Reuter, Christian and Nestler, Simon and Kaufhold, Marc-André and Herczeg, Michael and Pottebaum, Jens},
year = {2022},
keywords = {Security, UsableSec, HCI},
}
[BibTeX] [Abstract] [Download PDF]
Die 2001 ins Leben gerufene Konferenz „Mensch und Computer“ (MuC) ist die größte Tagungsreihe der Mensch-Computer-Interaktion in Europa. Teilnehmenden aus Wissenschaft und Industrie bietet die MuC eine Plattform für Beiträge und Diskussionen zu innovativen Formen der Interaktion zwischen Menschen und digitaler Technik, zu nutzerorientierten Entwicklungsmethoden, interaktiven Anwendungen und weiteren Themen aus dem Spannungsfeld zwischen Nutzenden, Teams und Communities einerseits sowie den genutzten Informations- und Kommunikationstechnologien andererseits. Ziel der Tagung ist es, innovative Forschungsergebnisse zu diskutieren, den Informationsaustausch zwischen Wissenschaft und Praxis zu fördern, Forschungsaktivitäten und Ausbildung anzuregen sowie Wissenschaft, Praxis und Öffentlichkeit für die Relevanz nutzungs- und aufgabengerechter Technikgestaltung zu sensibilisieren. Hauptsächlich englischsprachige Fachbeiträge und deren Veröffentlichung in der „ACM Digital Library“ bzw. Digitalen Bibliothek der GI fördern die weltweite Sichtbarkeit der wissenschaftlichen Resultate der MuC.
@book{muhlhauser_proceedings_2022,
title = {Proceedings of {Mensch} und {Computer} 2022: {Facing} {Realities}},
isbn = {978-1-4503-9690-5},
url = {https://dl.acm.org/doi/proceedings/10.1145/3543758},
abstract = {Die 2001 ins Leben gerufene Konferenz „Mensch und Computer“ (MuC) ist die größte Tagungsreihe der
Mensch-Computer-Interaktion in Europa. Teilnehmenden aus Wissenschaft und Industrie bietet die MuC
eine Plattform für Beiträge und Diskussionen zu innovativen Formen der Interaktion zwischen Menschen und digitaler Technik, zu nutzerorientierten Entwicklungsmethoden, interaktiven Anwendungen und weiteren Themen aus dem Spannungsfeld zwischen Nutzenden, Teams und Communities einerseits sowie den genutzten Informations- und Kommunikationstechnologien andererseits. Ziel der Tagung ist es, innovative Forschungsergebnisse zu diskutieren, den Informationsaustausch zwischen Wissenschaft und Praxis zu fördern, Forschungsaktivitäten und Ausbildung anzuregen sowie Wissenschaft, Praxis und Öffentlichkeit
für die Relevanz nutzungs- und aufgabengerechter Technikgestaltung zu sensibilisieren. Hauptsächlich englischsprachige Fachbeiträge und deren Veröffentlichung in der „ACM Digital Library“ bzw. Digitalen Bibliothek der GI fördern die weltweite Sichtbarkeit der wissenschaftlichen Resultate der MuC.},
publisher = {ACM},
author = {Mühlhäuser, Max and Reuter, Christian and Pfleging, Bastian and Kosch, Thomas and Matviienko, Andrii and Gerling, Katrin and Mayer, Sven and Heuten, Wilko and Döring, Tanja and Müller, Florian and Schmitz, Martin},
year = {2022},
keywords = {UsableSec, HCI},
}
[BibTeX] [Abstract] [Download PDF]
Every day, there are internet disruptions or outages around the world that affect our daily lives. In this paper, we analyzed these events in Germany in recent years and found out how they can be detected, and what impact they have on citizens, especially in crisis situations. For this purpose, we take a look at two different approaches to recording internet outages, namely the self-reporting of citizens and automatic reporting by algorithmic examination of the availability of IP networks. We evaluate the data of six major events with regard to their meaningfulness in quality and quantity. We found that due to the amount of data and the inherent imprecision of the methods used, it is difficult to detect outages through algorithmic examination. But once an event is publicly known by self-reporting, they have advantages to capture the temporal and spatial dimensions of the outage due to its nature of objective measurements. As a result, we propose that users’ crowdsourcing can enhance the detection of outages and should be seen as an important starting point to even begin an analysis with algorithm-based techniques, but it is to ISPs and regulatory authorities to support that.
@inproceedings{orlov_detecting_2022,
address = {Darmstadt},
series = {Mensch und {Computer} 2022 - {Workshopband}},
title = {Detecting a {Crisis}: {Comparison} of {Self}-{Reported} vs. {Automated} {Internet} {Outage} {Measuring} {Methods}},
url = {https://dl.gi.de/handle/20.500.12116/39089},
doi = {10.18420/muc2022-mci-ws10-321},
abstract = {Every day, there are internet disruptions or outages around the world that affect our daily lives. In this paper, we analyzed these events in Germany in recent years and found out how they can be detected, and what impact they have on citizens, especially in crisis situations. For this purpose, we take a look at two different approaches to recording internet outages, namely the self-reporting of citizens and automatic reporting by algorithmic examination of the availability of IP networks. We evaluate the data of six major events with regard to their meaningfulness in quality and quantity. We found that due to the amount of data and the inherent imprecision of the methods used, it is difficult to detect outages through algorithmic examination. But once an event is publicly known by self-reporting, they have advantages to capture the temporal and spatial dimensions of the outage due to its nature of objective measurements. As a result, we propose that users’ crowdsourcing can enhance the detection of outages and should be seen as an important starting point to even begin an analysis with algorithm-based techniques, but it is to ISPs and regulatory authorities to support that.},
language = {en},
booktitle = {Mensch und {Computer} 2022 - {Workshopband}},
publisher = {Gesellschaft für Informatik},
author = {Orlov, Denis and Möller, Simon and Düfler, Sven and Haesler, Steffen and Reuter, Christian},
year = {2022},
keywords = {Student, Security, UsableSec, HCI, Projekt-emergenCITY, Projekt-ATHENE-SecUrban},
}
[BibTeX] [Abstract] [Download PDF]
Within CSCW and HCI, an increasing body of literature has been demonstrating the essential relevance of infrastructures and infrastructuring to the work of people engaging in technologically mediated nomadicity. Tech Nomads – or T-Nomads, as they are sometimes called – not only rely on technological, human, and environmental infrastructural components – such as Wi-Fi, technical support, space, and basic resources such as light and power outlets – but they also have to engage in infrastructuring to mobilise their workplaces and effectively accomplish work in and across different locations. In this article, we bring an infrastructuring perspective to understanding nomadic practices concerning the organisation of complex collaborative events. We introduce findings from a long-term investigation focusing on how infrastructures are re-instantiated with the help of digital technologies, according to emerging demands from T-Nomads. Our findings demonstrate the need for a ‘nonessentialist’ approach to nomadicity, one which recognises the character of nomadic work and its varied aspects in different contexts. We extend the infrastructuring literature by demonstrating how infrastructuring work is done in a complex collaborative initiative, as the organisation of the annual European Social Forum.
@article{pinatti_de_carvalho_understanding_2022,
title = {Understanding {Nomadic} {Practices} of {Social} {Activist} {Networks} through the {Lens} of {Infrastructuring}: {The} {Case} of the {European} {Social} {Forum}},
url = {https://link.springer.com/article/10.1007/s10606-022-09442-7},
doi = {10.1007/s10606-022-09442-7},
abstract = {Within CSCW and HCI, an increasing body of literature has been demonstrating the essential relevance of infrastructures and infrastructuring to the work of people engaging in technologically mediated nomadicity. Tech Nomads – or T-Nomads, as they are sometimes called – not only rely on technological, human, and environmental infrastructural components – such as Wi-Fi, technical support, space, and basic resources such as light and power outlets – but they also have to engage in infrastructuring to mobilise their workplaces and effectively accomplish work in and across different locations. In this article, we bring an infrastructuring perspective to understanding nomadic practices concerning the organisation of complex collaborative events. We introduce findings from a long-term investigation focusing on how infrastructures are re-instantiated with the help of digital technologies, according to emerging demands from T-Nomads. Our findings demonstrate the need for a ‘nonessentialist’ approach to nomadicity, one which recognises the character of nomadic work and its varied aspects in different contexts. We extend the infrastructuring literature by demonstrating how infrastructuring work is done in a complex collaborative initiative, as the organisation of the annual European Social Forum.},
journal = {Computer Supported Cooperative Work: The Journal of Collaborative Computing (JCSCW)},
author = {Pinatti De Carvalho, Aparecido Fabiano and Saeed, Saqib and Reuter, Christian and Rohde, Markus and Randall, Dave and Pipek, Volkmar and Wulf, Volker},
year = {2022},
keywords = {Crisis, HCI, A-Paper, Ranking-ImpactFactor},
}
[BibTeX] [Download PDF]
@book{reuter_special_2022,
title = {Special {Issue} on {Usable} {Security} and {Privacy} with {User}-{Centered} {Interventions} and {Transparency} {Mechanisms} - {Behaviour} \& {Information} {Technology} ({BIT})},
url = {https://www.tandfonline.com/toc/tbit20/41/10?nav=tocList},
publisher = {Taylor \& Francis},
author = {Reuter, Christian and Lo Iacono, Luigi and Benlian, Alexander},
year = {2022},
note = {Publication Title: Behaviour \& Information Technology (BIT)},
keywords = {Peace, UsableSec, Crisis, HCI, A-Paper, Ranking-CORE-A, Ranking-ImpactFactor, SocialMedia},
}
[BibTeX] [Abstract] [Download PDF]
In the last decades, research has shown that both technical solutions and user perceptions are important to improve security and privacy in the digital realm. The field of ‘usable security’ already started to emerge in the mid-90s, primarily focussed on password and email security. Later on, the research field of ”usable security and privacy” evolved and broadened the aim to design concepts and tools to assist users in enhancing their behaviour with regard to both privacy and security. Nevertheless, many user interventions are not as effective as desired. Because of highly diverse usage contexts, leading to different privacy and security requirements and not always to one-size-fits-all approaches, tailorability is necessary to address this issue. Furthermore, transparency is a crucial requirement, as providing comprehensible information may counter reactance towards security interventions. This article first provides a brief history of the research field in its first quarter-century and then highlights research on the transparency and tailorability of user interventions. Based on this, this article then presents six contributions with regard to (1) privacy concerns in times of COVID-19, (2) authentication on mobile devices, (3) GDPR-compliant data management, (4) privacy notices on websites, (5) data disclosure scenarios in agriculture, as well as (6) rights under data protection law and the concrete process should data subjects want to claim those rights. This article concludes with several research directions on user-centred transparency and tailorability.
@article{reuter_quarter_2022,
title = {A {Quarter} {Century} of {Usable} {Security} and {Privacy} {Research}: {Transparency}, {Tailorability}, and the {Road} {Ahead}},
volume = {41},
issn = {0144-929X},
url = {https://www.tandfonline.com/toc/tbit20/41/10},
doi = {10.1080/0144929X.2022.2080908},
abstract = {In the last decades, research has shown that both technical solutions and user perceptions are important to improve security and privacy in the digital realm. The field of ‘usable security’ already started to emerge in the mid-90s, primarily focussed on password and email security. Later on, the research field of ”usable security and privacy” evolved and broadened the aim to design concepts and tools to assist users in enhancing their behaviour with regard to both privacy and security. Nevertheless, many user interventions are not as effective as desired. Because of highly diverse usage contexts, leading to different privacy and security requirements and not always to one-size-fits-all approaches, tailorability is necessary to address this issue. Furthermore, transparency is a crucial requirement, as providing comprehensible information may counter reactance towards security interventions. This article first provides a brief history of the research field in its first quarter-century and then highlights research on the transparency and tailorability of user interventions. Based on this, this article then presents six contributions with regard to (1) privacy concerns in times of COVID-19, (2) authentication on mobile devices, (3) GDPR-compliant data management, (4) privacy notices on websites, (5) data disclosure scenarios in agriculture, as well as (6) rights under data protection law and the concrete process should data subjects want to claim those rights. This article concludes with several research directions on user-centred transparency and tailorability.},
number = {10},
journal = {Behaviour \& Information Technology (BIT)},
author = {Reuter, Christian and Lo Iacono, Luigi and Benlian, Alexander},
year = {2022},
keywords = {Security, UsableSec, Crisis, HCI, Projekt-ATHENE-SecUrban, Projekt-CROSSING, A-Paper, Ranking-CORE-A, Ranking-ImpactFactor, SocialMedia},
pages = {2035--2048},
}
[BibTeX] [Abstract] [Download PDF]
Mobilising helpers in the event of a flood or letting friends know that you are okay in the event of a terrorist attack – more and more people are using social media in emergency, crisis or disaster situations. Storms, floods, attacks or pandemics (esp. COVID-19) show that citizens use social media to inform themselves or to coordinate. This thesis presents qualitative and quantitative studies on the attitudes of emergency services and citizens in Europe towards social media in emergencies. Across the individual sub-studies, almost 10,000 people are surveyed including representative studies in the Netherlands, Germany, the UK and Italy. The work empirically shows that social media is increasingly important for emergency services, both for prevention and during crises; that private use of social media is a driving force in shaping opinions for organisational use; and that citizens have high expectations towards authorities, especially monitoring social media is expected, and sometimes responses within one hour. Depending on the risk culture, the data show further differences, e.g. whether the state (Germany) or the individual (Netherlands) is seen as primarily responsible for coping with the situation.
@book{reuter_european_2022,
address = {Nijmegen},
title = {A {European} {Perspective} on {Crisis} {Informatics}: {Citizens}' and {Authorities}' attitudes towards {Social} {Media} for {Public} {Safety} and {Security}},
url = {https://repository.ubn.ru.nl/handle/2066/253000},
abstract = {Mobilising helpers in the event of a flood or letting friends know that you are okay in the event of a terrorist attack – more and more people are using social media in emergency, crisis or disaster situations. Storms, floods, attacks or pandemics (esp. COVID-19) show that citizens use social media to inform themselves or to coordinate. This thesis presents qualitative and quantitative studies on the attitudes of emergency services and citizens in Europe towards social media in emergencies. Across the individual sub-studies, almost 10,000 people are surveyed including representative studies in the Netherlands, Germany, the UK and Italy. The work empirically shows that social media is increasingly important for emergency services, both for prevention and during crises; that private use of social media is a driving force in shaping opinions for organisational use; and that citizens have high expectations towards authorities, especially monitoring social media is expected, and sometimes responses within one hour. Depending on the risk culture, the data show further differences, e.g. whether the state (Germany) or the individual (Netherlands) is seen as primarily responsible for coping with the situation.},
publisher = {The Radboud University Thesis Repository},
author = {Reuter, Christian},
year = {2022},
doi = {10.1007/978-3-658-39720-3},
keywords = {Crisis, HCI, Projekt-emergenCITY, Projekt-ATHENE-SecUrban, Selected, AuswahlCrisis, SocialMedia, Projekt-KontiKat, Projekt-EmerGent, Dissertation},
}
[BibTeX] [Abstract] [Download PDF]
Mobilising helpers in the event of a flood or letting friends know that you are okay in the event of a terrorist attack – more and more people are using social media in emergency, crisis or disaster situations. Storms, floods, attacks or pandemics (esp. COVID-19) show that citizens use social media to inform themselves or to coordinate. This thesis presents qualitative and quantitative studies on the attitudes of emergency services and citizens in Europe towards social media in emergencies. Across the individual sub-studies, almost 10,000 people are surveyed including representative studies in the Netherlands, Germany, the UK and Italy. The work empirically shows that social media is increasingly important for emergency services, both for prevention and during crises; that private use of social media is a driving force in shaping opinions for organisational use; and that citizens have high expectations towards authorities, especially monitoring social media is expected, and sometimes responses within one hour. Depending on the risk culture, the data show further differences, e.g. whether the state (Germany) or the individual (Netherlands) is seen as primarily responsible for coping with the situation.
@book{reuter_european_2022-1,
address = {Wiesbaden},
edition = {1},
title = {A {European} {Perspective} on {Crisis} {Informatics}: {Citizens}' and {Authorities}' attitudes towards {Social} {Media} for {Public} {Safety} and {Security}},
isbn = {978-3-658-39719-7},
url = {https://link.springer.com/book/10.1007/978-3-658-39720-3},
abstract = {Mobilising helpers in the event of a flood or letting friends know that you are okay in the event of a terrorist attack – more and more people are using social media in emergency, crisis or disaster situations. Storms, floods, attacks or pandemics (esp. COVID-19) show that citizens use social media to inform themselves or to coordinate. This thesis presents qualitative and quantitative studies on the attitudes of emergency services and citizens in Europe towards social media in emergencies. Across the individual sub-studies, almost 10,000 people are surveyed including representative studies in the Netherlands, Germany, the UK and Italy. The work empirically shows that social media is increasingly important for emergency services, both for prevention and during crises; that private use of social media is a driving force in shaping opinions for organisational use; and that citizens have high expectations towards authorities, especially monitoring social media is expected, and sometimes responses within one hour. Depending on the risk culture, the data show further differences, e.g. whether the state (Germany) or the individual (Netherlands) is seen as primarily responsible for coping with the situation.},
language = {en},
publisher = {Springer Vieweg},
author = {Reuter, Christian},
year = {2022},
doi = {https://doi.org/10.1007/978-3-658-39720-3},
keywords = {Crisis, HCI, Projekt-emergenCITY, Projekt-ATHENE-SecUrban, SocialMedia, Projekt-KontiKat, Projekt-EmerGent, DissPublisher},
}
2021
[BibTeX] [Abstract] [Download PDF]
The relevance of adequate privacy and security behavior in the digital space is higher than ever. However, the exact relationship between privacy and security behavior is rarely discussed in the literature. This study investigates this relationship and the role of socio-demographic factors (gender, age, education, political opinions) in such behavior. Exploratory results of a survey of German private users (N=1,219) show that privacy and security behavior are only weakly correlated and not similarly influenced by socio-demographic factors. While se-curity behavior significantly differs between age and education groups (younger and less educated show less security behavior), no such differences exist for pri-vacy behavior. Additionally, political orientation and opinion has no influence on privacy and security behavior. Thus, this study sheds light on the concepts of privacy, security and corresponding behavior and emphasizes the need for a fine-grained differentiation if either privacy or security behavior is to be improved.
@inproceedings{biselli_relationship_2021,
address = {Potsdam, Germany},
title = {On the {Relationship} between {IT} {Privacy} and {Security} {Behavior}: {A} {Survey} among {German} {Private} {Users}},
isbn = {978-3-030-86797-3},
url = {https://peasec.de/paper/2021/2021_BiselliReuter_RelationshipITPrivacyandSecurityBehavior_WI.pdf},
doi = {https://doi.org/10.1007/978-3-030-86797-3_26},
abstract = {The relevance of adequate privacy and security behavior in the digital space is higher than ever. However, the exact relationship between privacy and security behavior is rarely discussed in the literature. This study investigates this relationship and the role of socio-demographic factors (gender, age, education, political opinions) in such behavior. Exploratory results of a survey of German private users (N=1,219) show that privacy and security behavior are only weakly correlated and not similarly influenced by socio-demographic factors. While se-curity behavior significantly differs between age and education groups (younger and less educated show less security behavior), no such differences exist for pri-vacy behavior. Additionally, political orientation and opinion has no influence on privacy and security behavior. Thus, this study sheds light on the concepts of privacy, security and corresponding behavior and emphasizes the need for a fine-grained differentiation if either privacy or security behavior is to be improved.},
booktitle = {Proceedings of the {International} {Conference} on {Wirtschaftsinformatik} ({WI})},
publisher = {AIS},
author = {Biselli, Tom and Reuter, Christian},
year = {2021},
keywords = {Security, UsableSec, HCI, Projekt-ATHENE-FANCY, Ranking-CORE-C, Ranking-WKWI-A},
pages = {1--17},
}
[BibTeX] [Abstract] [Download PDF]
During crises such as the COVID-19 pandemic, people spontaneously initiate support groups, while establishedorganizations like soccer clubs set non-regular goals, both offering help. Interested in the coordination of suchhelp and potential challenges of collaboration, we conducted a virtual ethnography of a multi-level networklocated in Germany. We focused on aims, activities, and technological mediation, with Activity Theory astheoretical framework. Our findings show that the organizational aim of coordinating help was successfullyachieved by connecting heterogeneous actors through digitization and institutionalization. Enabled by thecontext of the COVID-19 pandemic crisis, the network acted virtually, but was also able to integrate analogspaces of help. We identified six crucial implications regarding the use of technology and collaboration forbuilding a successful volunteering network.
@article{haesler_stronger_2021,
title = {Stronger {Together}: {How} {Neighborhood} {Groups} {Build} up a {Virtual} {Network} during the {COVID}-19 {Pandemic}},
volume = {5},
url = {https://peasec.de/paper/2021/2021_HaeslerSchmidVierneiselReuter_StrongerTogetherVirtualNetworkCOVID19_CSCW.pdf},
abstract = {During crises such as the COVID-19 pandemic, people spontaneously initiate support groups, while establishedorganizations like soccer clubs set non-regular goals, both offering help. Interested in the coordination of suchhelp and potential challenges of collaboration, we conducted a virtual ethnography of a multi-level networklocated in Germany. We focused on aims, activities, and technological mediation, with Activity Theory astheoretical framework. Our findings show that the organizational aim of coordinating help was successfullyachieved by connecting heterogeneous actors through digitization and institutionalization. Enabled by thecontext of the COVID-19 pandemic crisis, the network acted virtually, but was also able to integrate analogspaces of help. We identified six crucial implications regarding the use of technology and collaboration forbuilding a successful volunteering network.},
number = {CSCW2},
journal = {Proceedings of the ACM: Human Computer Interaction (PACM): Computer-Supported Cooperative Work and Social Computing},
author = {Haesler, Steffen and Schmid, Stefka and Vierneisel, Annemike Sophia and Reuter, Christian},
year = {2021},
keywords = {Crisis, HCI, Projekt-emergenCITY, Projekt-ATHENE-SecUrban, A-Paper, Selected, AuswahlCrisis, Ranking-CORE-A},
}
[BibTeX] [Abstract] [Download PDF]
Die Bedeutung des Umgangs mit Fake News hat sowohl im politischen als auch im sozialen Kontext zugenommen: Während sich bestehende Studien vor allem darauf konzentrieren, wie man gefälschte Nachrichten erkennt und kennzeichnet, fehlen Ansätze zur Unterstützung der NutzerInnen bei der eigenen Einschätzung weitgehend. Dieser Artikel stellt bestehende Black-Box- und White-Box-Ansätze vor und vergleicht Vor- und Nachteile. Dabei zeigen sich White-Box-Ansätze insbesondere als vielversprechend, um gegen Reaktanzen zu wirken, während Black-Box-Ansätze Fake News mit deutlich größerer Genauigkeit detektieren. Vorgestellt wird auch das von uns entwickelte Browser-Plugin TrustyTweet, welches die BenutzerInnen bei der Bewertung von Tweets auf Twitter unterstützt, indem es politisch neutrale und intuitive Warnungen anzeigt, ohne Reaktanz zu erzeugen.
@incollection{hartwig_fake_2021,
address = {Wiesbaden},
series = {ars digitalis},
title = {Fake {News} technisch begegnen – {Detektions}- und {Behandlungsansätze} zur {Unterstützung} von {NutzerInnen}},
volume = {3},
isbn = {978-3-658-32956-3},
url = {https://peasec.de/paper/2021/2021_HartwigReuter_FakeNewstechnischbegegnen_WahrheitundFake.pdf},
abstract = {Die Bedeutung des Umgangs mit Fake News hat sowohl im politischen als auch im sozialen Kontext zugenommen: Während sich bestehende Studien vor allem darauf konzentrieren, wie man gefälschte Nachrichten erkennt und kennzeichnet, fehlen Ansätze zur Unterstützung der NutzerInnen bei der eigenen Einschätzung weitgehend. Dieser Artikel stellt bestehende Black-Box- und White-Box-Ansätze vor und vergleicht Vor- und Nachteile. Dabei zeigen sich White-Box-Ansätze insbesondere als vielversprechend, um gegen Reaktanzen zu wirken, während Black-Box-Ansätze Fake News mit deutlich größerer Genauigkeit detektieren. Vorgestellt wird auch das von uns entwickelte Browser-Plugin TrustyTweet, welches die BenutzerInnen bei der Bewertung von Tweets auf Twitter unterstützt, indem es politisch neutrale und intuitive Warnungen anzeigt, ohne Reaktanz zu erzeugen.},
language = {de},
booktitle = {Wahrheit und {Fake} {News} im postfaktischen {Zeitalter}},
publisher = {Springer Vieweg},
author = {Hartwig, Katrin and Reuter, Christian},
editor = {Klimczak, Peter and Zoglauer, Thomas},
year = {2021},
keywords = {Peace, Crisis, HCI, SocialMedia},
pages = {133--150},
}
[BibTeX] [Abstract] [Download PDF]
Digitalisierung ist ein präsenter Faktor in vielen Städten. So existieren bereits viele Smart-City-Initiativen, bei denen Städte versuchen, ihre Prozesse durch Erfassung und Verknüpfung von Daten, oft unter Zuhilfenahme von Datenplattformen, zu optimieren. In Anbetracht der damit einhergehenden großen Investitionen und Veränderungen wird Bürgerbeteiligung als zentraler Faktor für den Erfolg solcher Initiativen betrachtet. Bisher ist allerdings nicht klar, was typische Beteiligungsformate von Smart-City-Initiativen sind und welche Rolle(n) BürgerInnen dabei einnehmen. Dieser Beitrag leitet mittels einer Literaturanalyse zu Smart Cities ein Kategorienschema zu typischen Bürgerbeteiligungsarten ab. Die Analyse ergab, dass sich Einbindung von BürgerInnen in politische Entscheidungen und bei der Entwicklung technischer Artefakte maßgeblich auf e‑Government oder Participatory Design bezieht. Im Hinblick auf die Beteiligungsarten zeigt sich, dass Makrofabriken, Living Labs und Open-Data-Plattformen häufige Ansätze sind, um BürgerInnen als Co-Creators einzubinden. Zudem werden BürgerInnen mit Citizen Sensing zur Erfassung von Daten oder Missständen einbezogen. Dabei zeigen sich sowohl aktivere, als auch eher passive Beteiligungsarten. Die Analyse zeigt, dass die Einbindung von BürgerInnen häufig entweder auf eine Beteiligung an politischen Entscheidungen oder an der Entwicklung technischer Artefakte abzielt. Auch wenn keine klare Abgrenzung möglich ist, sind diese Ansätze dann eher durch e‑Government oder Participatory Design inspiriert.
@article{haunschild_nutzer_2021,
title = {Nutzer, {Sammler}, {Entscheidungsträger}? {Arten} der {Bürgerbeteiligung} in {Smart} {Cities}},
volume = {58},
url = {https://peasec.de/paper/2021/2021_HaunschildDemuthGeissRichterReuter_NutzerSammlerEntscheidungstragerBuergerbeteiligungSmartCities_HMD.pdf},
doi = {10.1365/s40702-021-00770-8},
abstract = {Digitalisierung ist ein präsenter Faktor in vielen Städten. So existieren bereits viele Smart-City-Initiativen, bei denen Städte versuchen, ihre Prozesse durch Erfassung und Verknüpfung von Daten, oft unter Zuhilfenahme von Datenplattformen, zu optimieren. In Anbetracht der damit einhergehenden großen Investitionen und Veränderungen wird Bürgerbeteiligung als zentraler Faktor für den Erfolg solcher Initiativen betrachtet. Bisher ist allerdings nicht klar, was typische Beteiligungsformate von Smart-City-Initiativen sind und welche Rolle(n) BürgerInnen dabei einnehmen. Dieser Beitrag leitet mittels einer Literaturanalyse zu Smart Cities ein Kategorienschema zu typischen Bürgerbeteiligungsarten ab. Die Analyse ergab, dass sich Einbindung von BürgerInnen in politische Entscheidungen und bei der Entwicklung technischer Artefakte maßgeblich auf e‑Government oder Participatory Design bezieht. Im Hinblick auf die Beteiligungsarten zeigt sich, dass Makrofabriken, Living Labs und Open-Data-Plattformen häufige Ansätze sind, um BürgerInnen als Co-Creators einzubinden. Zudem werden BürgerInnen mit Citizen Sensing zur Erfassung von Daten oder Missständen einbezogen. Dabei zeigen sich sowohl aktivere, als auch eher passive Beteiligungsarten. Die Analyse zeigt, dass die Einbindung von BürgerInnen häufig entweder auf eine Beteiligung an politischen Entscheidungen oder an der Entwicklung technischer Artefakte abzielt. Auch wenn keine klare Abgrenzung möglich ist, sind diese Ansätze dann eher durch e‑Government oder Participatory Design inspiriert.},
journal = {HMD Praxis der Wirtschaftsinformatik},
author = {Haunschild, Jasmin and Demuth, Kilian and Geiß, Henri-Jacques and Richter, Christian and Reuter, Christian},
year = {2021},
keywords = {Student, HCI, Projekt-emergenCITY, Projekt-ATHENE-SecUrban},
}
[BibTeX] [Abstract] [Download PDF]
Technological progress can disrupt domains and change the way we work and collaborate. This paper presents a qualitative study with 52 German farmers that investigates the impact of the ongoing digitalization process in agriculture and discusses the implications for privacy research. As in other domains, the introduction of digital tools and services leads to the data itself becoming a resource. Sharing this data with products along the supply chain is favored by retailers and consumers, who benefit from traceability through transparency. However, transparency can pose a privacy risk. Having insight into the business data of others along the supply chain provides an advantage in terms of market position. This is particularly true in agriculture, where there is already a significant imbalance of power between actors. A multitude of small and medium-sized farming businesses are opposed by large upstream and downstream players that drive technological innovation. Further weakening the market position of farmers could lead to severe consequences for the entire sector. We found that on the one hand, privacy behaviors are affected by adoption of digitalization, and on the other hand, privacy itself influences adoption of digital tools. Our study sheds light on the emerging challenges for farmers and the role of privacy in the process of digitalization in agriculture.
@article{linsner_role_2021,
title = {The {Role} of {Privacy} in {Digitalization} – {Analysing} the {German} {Farmers}' {Perspective}},
volume = {2021},
url = {https://www.petsymposium.org/2021/files/papers/issue3/popets-2021-0050.pdf},
doi = {10.2478/popets-2021-0050},
abstract = {Technological progress can disrupt domains
and change the way we work and collaborate. This paper presents a qualitative study with 52 German farmers
that investigates the impact of the ongoing digitalization process in agriculture and discusses the implications for privacy research. As in other domains, the introduction of digital tools and services leads to the data
itself becoming a resource. Sharing this data with products along the supply chain is favored by retailers and
consumers, who benefit from traceability through transparency. However, transparency can pose a privacy risk.
Having insight into the business data of others along the
supply chain provides an advantage in terms of market
position. This is particularly true in agriculture, where
there is already a significant imbalance of power between actors. A multitude of small and medium-sized
farming businesses are opposed by large upstream and
downstream players that drive technological innovation.
Further weakening the market position of farmers could
lead to severe consequences for the entire sector. We
found that on the one hand, privacy behaviors are affected by adoption of digitalization, and on the other
hand, privacy itself influences adoption of digital tools.
Our study sheds light on the emerging challenges for
farmers and the role of privacy in the process of digitalization in agriculture.},
number = {3},
journal = {Proceedings on Privacy Enhancing Technologies (PoPETs)},
author = {Linsner, Sebastian and Kuntke, Franz and Steinbrink, Enno and Franken, Jonas and Reuter, Christian},
year = {2021},
keywords = {Projekt-GeoBox, Security, UsableSec, HCI, A-Paper, AuswahlUsableSec, Selected, Ranking-CORE-A, Ranking-ImpactFactor, Projekt-HyServ, Projekt-GRKPrivacy},
pages = {334--350},
}
[BibTeX] [Abstract] [Download PDF]
Im Zentrum dieses Workshops steht die Interaktion von Mensch und Technik in sicherheitskritischen Kontexten. Hierzu zählen Anwendungsfelder, die bereits seit vielen Jahren Gegenstand der Forschung und Entwicklung sind. Beispiele sind Katastrophen-schutz oder Medizin, aber auch kritische Infrastrukturen. In die-sen und vielen weiteren Bereichen gilt, dass sichere Systemzu-stände nur durch die ganzheitliche Betrachtung von Mensch, Technik und Organisation gewährleistet bzw. schnellstmöglich wieder erreicht werden können. In diesem Zusammenhang ist der Workshop auch der Nutzbarkeit und Akzeptanz von Sicher-heitskonzepten sowie einer bewussteren Auseinandersetzung der Nutzenden mit diesem Thema gewidmet. Dieser Beitrag stellt die Themenkomplexe des Workshops, die angenommenen Bei-träge und das Organisationsteam vor.
@inproceedings{mentler_8_2021,
address = {Ingolstadt},
title = {8. {Workshop} {Mensch}-{Maschine}-{Interaktion} in sicherheitskritischen {Systemen}: {Ausnahmezustand}},
url = {https://dl.gi.de/handle/20.500.12116/37338},
doi = {10.18420/muc2021-mci-ws08-117},
abstract = {Im Zentrum dieses Workshops steht die Interaktion von Mensch und Technik in sicherheitskritischen Kontexten. Hierzu zählen Anwendungsfelder, die bereits seit vielen Jahren Gegenstand der Forschung und Entwicklung sind. Beispiele sind Katastrophen-schutz oder Medizin, aber auch kritische Infrastrukturen. In die-sen und vielen weiteren Bereichen gilt, dass sichere Systemzu-stände nur durch die ganzheitliche Betrachtung von Mensch, Technik und Organisation gewährleistet bzw. schnellstmöglich wieder erreicht werden können. In diesem Zusammenhang ist der Workshop auch der Nutzbarkeit und Akzeptanz von Sicher-heitskonzepten sowie einer bewussteren Auseinandersetzung der Nutzenden mit diesem Thema gewidmet. Dieser Beitrag stellt die Themenkomplexe des Workshops, die angenommenen Bei-träge und das Organisationsteam vor.},
booktitle = {Mensch und {Computer} 2021 - {Workshopband}},
publisher = {Gesellschaft für Informatik e.V.},
author = {Mentler, Tilo and Reuter, Christian and Nestler, Simon and Kaufhold, Marc-André and Herczeg, Michael and Pottebaum, Jens},
year = {2021},
keywords = {Security, HCI, Projekt-CYWARN},
}
[BibTeX] [Abstract] [Download PDF]
Die zweite, aktualisierte Auflage dieses Lehr- und Fachbuchs gibt eine fundierte und praxisbezogene Einführung sowie einen Überblick über Grundlagen, Methoden und Anwendungen der Mensch-Computer-Interaktion im Kontext von Sicherheit, Notfällen, Krisen, Katastrophen, Krieg und Frieden. Dies adressierend werden interaktive, mobile, ubiquitäre und kooperative Technologien sowie soziale Medien vorgestellt. Hierbei finden klassische Themen wie benutzbare (IT-)Sicherheit, Industrie 4.0, Katastrophenschutz, Medizin und Automobil, aber auch Augmented Reality, Crowdsourcing, Shitstorm Management, Social Media Analytics und Cyberwar ihren Platz. Methodisch wird das Spektrum von Usable Safety bis Usable Security Engineering von Analyse über Design bis Evaluation abgedeckt. Das Buch eignet sich ebenso als Lehrbuch für Studierende wie als Handbuch für Wissenschaftler, Designer, Entwickler und Anwender.
@book{reuter_sicherheitskritische_2021,
address = {Wiesbaden},
edition = {2},
title = {Sicherheitskritische {Mensch}-{Computer}-{Interaktion}: {Interaktive} {Technologien} und {Soziale} {Medien} im {Krisen}- und {Sicherheitsmanagement} ({Zweite} {Auflage})},
isbn = {978-3-658-32795-8},
url = {https://www.springer.com/de/book/9783658327941},
abstract = {Die zweite, aktualisierte Auflage dieses Lehr- und Fachbuchs gibt eine fundierte und praxisbezogene Einführung sowie einen Überblick über Grundlagen, Methoden und Anwendungen der Mensch-Computer-Interaktion im Kontext von Sicherheit, Notfällen, Krisen, Katastrophen, Krieg und Frieden. Dies adressierend werden interaktive, mobile, ubiquitäre und kooperative Technologien sowie soziale Medien vorgestellt. Hierbei finden klassische Themen wie benutzbare (IT-)Sicherheit, Industrie 4.0, Katastrophenschutz, Medizin und Automobil, aber auch Augmented Reality, Crowdsourcing, Shitstorm Management, Social Media Analytics und Cyberwar ihren Platz. Methodisch wird das Spektrum von Usable Safety bis Usable Security Engineering von Analyse über Design bis Evaluation abgedeckt. Das Buch eignet sich ebenso als Lehrbuch für Studierende wie als Handbuch für Wissenschaftler, Designer, Entwickler und Anwender.},
publisher = {Springer Vieweg},
author = {Reuter, Christian},
year = {2021},
keywords = {Peace, Security, UsableSec, HCI, Projekt-CYWARN, Projekt-emergenCITY, Projekt-ATHENE-SecUrban, Selected, AuswahlCrisis, SocialMedia, Projekt-KontiKat, Infrastructure},
}
[BibTeX] [Abstract] [Download PDF]
Die sicherheitskritische Mensch-Computer-Interaktion (MCI) ist eine interdisziplinäre Herausforderung und ein für die Informatik und die jeweiligen Anwendungsdomänen ein zunehmend an Bedeutung gewinnendes Thema. Dieses Kapitel bietet eine Einfüh-rung in das Lehr- und Fachbuch „Sicherheitskritische Mensch-Computer-Interaktion – Interaktive Technologien und Soziale Medien im Krisen- und Sicherheitsmanagement“. Als didaktisch aufbereiteter, umfassender Überblick über Grundlagen, Methoden und Anwendungsgebiete soll es sowohl als vorlesungsbegleitende Lektüre als auch als Nach-schlagewerk für Personen aus Wissenschaft, Design und Entwicklung dienen. Dies ad-ressierend werden interaktive, mobile, ubiquitäre und kooperative Technologien sowie soziale Medien vorgestellt. Hierbei finden klassische Themen wie benutzbare (IT-)Sicherheit, Industrie 4.0, Katastrophenschutz, Medizin und Automobil, aber auch Augmented Reality, Crowdsourcing, Shitstorm Management, Social Media Analytics und Cyberwar ihren Platz. Methodisch wird das Spektrum von Usable Safety bis Usable Security Engineering, von Analyse über Design bis Evaluation abgedeckt.
@incollection{reuter_einleitung_2021,
address = {Wiesbaden, Germany},
edition = {2},
title = {Einleitung in die sicherheitskritische {Mensch}-{Computer}-{Interaktion}},
isbn = {978-3-658-32794-1},
url = {https://doi.org/10.1007/978-3-658-32795-8_1},
abstract = {Die sicherheitskritische Mensch-Computer-Interaktion (MCI) ist eine interdisziplinäre Herausforderung und ein für die Informatik und die jeweiligen Anwendungsdomänen ein zunehmend an Bedeutung gewinnendes Thema. Dieses Kapitel bietet eine Einfüh-rung in das Lehr- und Fachbuch „Sicherheitskritische Mensch-Computer-Interaktion – Interaktive Technologien und Soziale Medien im Krisen- und Sicherheitsmanagement“. Als didaktisch aufbereiteter, umfassender Überblick über Grundlagen, Methoden und Anwendungsgebiete soll es sowohl als vorlesungsbegleitende Lektüre als auch als Nach-schlagewerk für Personen aus Wissenschaft, Design und Entwicklung dienen. Dies ad-ressierend werden interaktive, mobile, ubiquitäre und kooperative Technologien sowie soziale Medien vorgestellt. Hierbei finden klassische Themen wie benutzbare (IT-)Sicherheit, Industrie 4.0, Katastrophenschutz, Medizin und Automobil, aber auch Augmented Reality, Crowdsourcing, Shitstorm Management, Social Media Analytics und Cyberwar ihren Platz. Methodisch wird das Spektrum von Usable Safety bis Usable Security Engineering, von Analyse über Design bis Evaluation abgedeckt.},
booktitle = {Sicherheitskritische {Mensch}-{Computer}-{Interaktion}: {Interaktive} {Technologien} und {Soziale} {Medien} im {Krisen}- und {Sicherheitsmanagement} ({Zweite} {Auflage})},
publisher = {Springer Vieweg},
author = {Reuter, Christian},
editor = {Reuter, Christian},
year = {2021},
keywords = {Security, UsableSec, Crisis, HCI, Projekt-CYWARN},
pages = {3--17},
}
[BibTeX] [Abstract] [Download PDF]
Sicherheitskritische Mensch-Computer-Interaktion ist nicht nur derzeit ein hochaktuel-les Thema, sondern wird dies auch in Zukunft bleiben. Insofern ist ein Lehr- und Fach-buch wie dieses immer nur eine Momentaufnahme, und kann immer nur einen punktuel-len Stand abdecken. Dennoch kann der Versuch unternommen werden, aktuelle Trends zu identifizieren und einen Ausblick in die Zukunft zu wagen. Genau das möchte dieses Kapitel erreichen: Es sollen zukünftige Entwicklungen vorausgesagt und versucht wer-den, diese korrekt einzuordnen. Das ist an dieser Stelle nicht nur durch den Herausgeber, sondern durch Abfrage bei zahlreichen am Lehrbuch beteiligten Autor*innen geschehen. Neben einem Ausblick auf Grundlagen und Methoden werden dementsprechend auch sicherheitskritische interaktive Systeme und sicherheitskritische kooperative Systeme abgedeckt.
@incollection{reuter_zukunft_2021,
address = {Wiesbaden, Germany},
edition = {2},
title = {Die {Zukunft} sicherheitskritischer {Mensch}-{Computer}-{Interaktion}},
isbn = {978-3-658-19523-6},
url = {https://doi.org/10.1007/978-3-658-32795-8_31},
abstract = {Sicherheitskritische Mensch-Computer-Interaktion ist nicht nur derzeit ein hochaktuel-les Thema, sondern wird dies auch in Zukunft bleiben. Insofern ist ein Lehr- und Fach-buch wie dieses immer nur eine Momentaufnahme, und kann immer nur einen punktuel-len Stand abdecken. Dennoch kann der Versuch unternommen werden, aktuelle Trends zu identifizieren und einen Ausblick in die Zukunft zu wagen. Genau das möchte dieses Kapitel erreichen: Es sollen zukünftige Entwicklungen vorausgesagt und versucht wer-den, diese korrekt einzuordnen. Das ist an dieser Stelle nicht nur durch den Herausgeber, sondern durch Abfrage bei zahlreichen am Lehrbuch beteiligten Autor*innen geschehen. Neben einem Ausblick auf Grundlagen und Methoden werden dementsprechend auch sicherheitskritische interaktive Systeme und sicherheitskritische kooperative Systeme abgedeckt.},
booktitle = {Sicherheitskritische {Mensch}-{Computer}-{Interaktion}: {Interaktive} {Technologien} und {Soziale} {Medien} im {Krisen}- und {Sicherheitsmanagement} (2. {Auflage})},
publisher = {Springer Vieweg},
author = {Reuter, Christian and Aal, Konstantin and Beham, Frank and Boden, Alexander and Brauner, Florian and Ludwig, Thomas and Lukosch, Stephan and Fiedrich, Frank and Fuchs-Kittowski, Frank and Geisler, Stefan and Gennen, Klaus and Herrmann, Dominik and Kaufhold, Marc-André and Klafft, Michael and Lipprandt, Myriam and Lo Iacono, Luigi and Pipek, Volkmar and Mentler, Tilo and Nestler, Simon and Pottebaum, Jens and Quadflieg, Sven and Stieglitz, Stefan and Sturm, Christian and Rusch, Gebhard and Sackmann, Stefan and Volkamer, Melanie and Wulf, Volker},
editor = {Reuter, Christian},
year = {2021},
note = {https://doi.org/10.1007/978-3-658-32795-8\_31},
keywords = {Security, UsableSec, Crisis, HCI, Projekt-CYWARN, SocialMedia, Projekt-KontiKat},
pages = {673--681},
}
[BibTeX] [Abstract] [Download PDF]
Die Gestaltung gebrauchstauglicher, interaktiver und kooperativer Systeme wird bereits seit den 1980er Jahren in der Disziplin Mensch-Computer-Interaktion (MCI) und Com-puterunterstützte Gruppenarbeit (CSCW) behandelt. Es gibt jedoch einige Besonderhei-ten der MCI im Kontext sicherheitskritischer Systeme, insbesondere der störungsfreien Nutzung von IT (Safety) zu beachten. Dieses Kapitel stellt die wichtigsten Merkmale der Anwendung von Gestaltungsmethoden der MCI in sicherheitskritischen Systemen dar. Hierfür werden zu Beginn die Grundlagen der beiden Gebiete – der MCI sowie des Kri-sen- und Sicherheitsmanagements – erläutert. Darauf aufbauend werden Ansätze und Methoden der Analyse, des Designs und der Entwicklung sowie der Evaluation der MCI unter besonderer Berücksichtigung sicherheitskritischer Systeme diskutiert. Aspekte wie Risikoanalysen in der Anforderungsanalyse, die Einkalkulierung von Bedienfehlern und Rückfallebenen im Systemdesign gehören ebenso dazu wie besondere Herausforderun-gen bei Evaluationen.
@incollection{reuter_usable_2021,
address = {Wiesbaden, Germany},
title = {Usable {Safety} {Engineering} sicherheitskritischer interaktiver {Systeme}},
isbn = {978-3-658-32795-8},
url = {https://link.springer.com/chapter/10.1007/978-3-658-32795-8_2},
abstract = {Die Gestaltung gebrauchstauglicher, interaktiver und kooperativer Systeme wird bereits seit den 1980er Jahren in der Disziplin Mensch-Computer-Interaktion (MCI) und Com-puterunterstützte Gruppenarbeit (CSCW) behandelt. Es gibt jedoch einige Besonderhei-ten der MCI im Kontext sicherheitskritischer Systeme, insbesondere der störungsfreien Nutzung von IT (Safety) zu beachten. Dieses Kapitel stellt die wichtigsten Merkmale der Anwendung von Gestaltungsmethoden der MCI in sicherheitskritischen Systemen dar. Hierfür werden zu Beginn die Grundlagen der beiden Gebiete – der MCI sowie des Kri-sen- und Sicherheitsmanagements – erläutert. Darauf aufbauend werden Ansätze und Methoden der Analyse, des Designs und der Entwicklung sowie der Evaluation der MCI unter besonderer Berücksichtigung sicherheitskritischer Systeme diskutiert. Aspekte wie Risikoanalysen in der Anforderungsanalyse, die Einkalkulierung von Bedienfehlern und Rückfallebenen im Systemdesign gehören ebenso dazu wie besondere Herausforderun-gen bei Evaluationen.},
booktitle = {Sicherheitskritische {Mensch}-{Computer}-{Interaktion}: {Interaktive} {Technologien} und {Soziale} {Medien} im {Krisen}- und {Sicherheitsmanagement}},
publisher = {Springer Vieweg},
author = {Reuter, Christian and Kaufhold, Marc-André},
editor = {Reuter, Christian},
year = {2021},
doi = {10.1007/978-3-658-32795-8_2},
keywords = {Security, UsableSec, HCI, Projekt-KontiKat, Projekt-CRISP},
pages = {23--45},
}
[BibTeX] [Abstract] [Download PDF]
Information and communication technologies affect all areas of civil society. Digitalization opens up new opportunities to address important social issues. The motor of digitalization can be social necessity, technical feasibility, and also a crisis, as the reaction to the COVID-19 pandemic demonstrates: Out of necessity, ideas are created, systems designed and implemented and the value of digital solutions to society becomes apparent. With the digitalization of everyday working and learning, apps for tracing information chains and containing new infections have potential, but also pose social risks. The current COVID-19 crisis seems to put the role of digitalization in a completely new light. Both, to evaluate the value of digital solutions to society and to identify space for innovation is important in times of intense digitalization efforts. To meet the societal challenges posed by digitalization, it is particularly important to understand how they arise. The use of digital solutions in safety-critical contexts entails dependencies and the threat of various dangers: Infrastructure disruptions and failures can be caused by criminal acts, terrorist attacks, natural disasters, operational disruptions, and system failures. In addition, there is a concern about data arising from the use of digital solutions. Data protection, data sovereignty, data security, and their social perception must always be closely observed. Furthermore, it is important to ensure that digitalization does not lead to a digital divide. New digital solutions require constant evaluation and assessment of the consequences.
@inproceedings{reuter_introduction_2021,
title = {Introduction to the {WI2021} {Track}: {Digitization} and {Society} – {Even} in {Times} of {Corona}},
isbn = {978-3-030-86797-3},
url = {http://www.peasec.de/paper/2021/2021_ReuterLechner_DigitisationandSocietyinTimesofCorona_WI.pdf},
doi = {https://doi.org/10.1007/978-3-030-86797-3},
abstract = {Information and communication technologies affect all areas of civil society. Digitalization opens up new opportunities to address important social issues. The motor of digitalization can be social necessity, technical feasibility, and also a crisis, as the reaction to the COVID-19 pandemic demonstrates: Out of necessity, ideas are created, systems designed and implemented and the value of digital solutions to society becomes apparent. With the digitalization of everyday working and learning, apps for tracing information chains and containing new infections have potential, but also pose social risks. The current COVID-19 crisis seems to put the role of digitalization in a completely new light. Both, to evaluate the value of digital solutions to society and to identify space for innovation is important in times of intense digitalization efforts.
To meet the societal challenges posed by digitalization, it is particularly important to understand how they arise. The use of digital solutions in safety-critical contexts entails dependencies and the threat of various dangers: Infrastructure disruptions and failures can be caused by criminal acts, terrorist attacks, natural disasters, operational disruptions, and system failures. In addition, there is a concern about data arising from the use of digital solutions. Data protection, data sovereignty, data security, and their social perception must always be closely observed. Furthermore, it is important to ensure that digitalization does not lead to a digital divide. New digital solutions require constant evaluation and assessment of the consequences.},
booktitle = {Innovation {Through} {Information} {Systems}. {WI} 2021: {Volume} {II}: {A} {Collection} of {Latest} {Research} on {Technology} {Issues}},
publisher = {Springer},
author = {Reuter, Christian and Lechner, Ulrike},
year = {2021},
keywords = {Security, UsableSec, HCI},
pages = {244--246},
}
[BibTeX] [Abstract] [Download PDF]
Kooperationstechnologien spielen in sicherheitskritischen Systemen eine große Rolle, da in vielen Anwendungsfeldern nicht nur die Interaktion von Mensch und Computer, sondern auch die durch IT unterstützte Kooperation zwischen Menschen notwendig ist, um Aufgaben bewältigen zu können. Solche Technologien müssen verschiedene Anfor-derungen erfüllen und können ebenfalls zur Resilienz beitragen. Unter Resilienz durch Kooperation verstehen wir die Fähigkeit, Krisen durch die Anpassungsfähigkeit an ge-änderte Realitäten ohne nachhaltigen Schaden mithilfe von Kooperation zu überstehen. Während das Konzept der Resilienz in den Ingenieurwissenschaften vornehmlich die Verfügbarkeit technischer Systeme fokussiert, betrachten wir Resilienz als soziotechni-sches Konstrukt, unter expliziter Betrachtung der beteiligten Akteur*innen. Basierend auf Grundlagen zu Kooperationstechnologien zeigt dieses Kapitel anhand von prakti-schen exemplarisch umgesetzten Kooperationstechnologien (soziales Netzwerk, GIS-System, Smartphone Apps, Facebook App und Social Media Analytics-Plattform), wie Kooperation unterstützt wird und zu kooperativer Resilienz beitragen kann.
@incollection{reuter_resilienz_2021,
address = {Wiesbaden, Germany},
title = {Resilienz durch {Kooperationstechnologien}},
isbn = {978-3-658-32795-8},
url = {http://www.peasec.de/paper/2021/2021_ReuterLudwigPipek_ResilienzKooperationstechnologien_SecMCI-Kap22.pdf},
abstract = {Kooperationstechnologien spielen in sicherheitskritischen Systemen eine große Rolle, da in vielen Anwendungsfeldern nicht nur die Interaktion von Mensch und Computer, sondern auch die durch IT unterstützte Kooperation zwischen Menschen notwendig ist, um Aufgaben bewältigen zu können. Solche Technologien müssen verschiedene Anfor-derungen erfüllen und können ebenfalls zur Resilienz beitragen. Unter Resilienz durch Kooperation verstehen wir die Fähigkeit, Krisen durch die Anpassungsfähigkeit an ge-änderte Realitäten ohne nachhaltigen Schaden mithilfe von Kooperation zu überstehen. Während das Konzept der Resilienz in den Ingenieurwissenschaften vornehmlich die Verfügbarkeit technischer Systeme fokussiert, betrachten wir Resilienz als soziotechni-sches Konstrukt, unter expliziter Betrachtung der beteiligten Akteur*innen. Basierend auf Grundlagen zu Kooperationstechnologien zeigt dieses Kapitel anhand von prakti-schen exemplarisch umgesetzten Kooperationstechnologien (soziales Netzwerk, GIS-System, Smartphone Apps, Facebook App und Social Media Analytics-Plattform), wie Kooperation unterstützt wird und zu kooperativer Resilienz beitragen kann.},
booktitle = {Sicherheitskritische {Mensch}-{Computer}-{Interaktion}: {Interaktive} {Technologien} und {Soziale} {Medien} im {Krisen}- und {Sicherheitsmanagement}},
publisher = {Springer Vieweg},
author = {Reuter, Christian and Ludwig, Thomas and Pipek, Volkmar},
editor = {Reuter, Christian},
year = {2021},
doi = {10.1007/978-3-658-32795-8_22},
keywords = {RSF, HCI, SocialMedia, Projekt-KontiKat, Infrastructure, Cooperation},
pages = {473--493},
}
2020
[BibTeX] [Abstract] [Download PDF]
The hackathon \#WirVsVirus in March 2020 was one of the biggest hackathons in history. Under the patronage of the federal government of Germany, 28,361 participants worked together in 1,498 projects, finding innovative apps and solutions against the COVID-19 pandemic. Three months after the event, we present an exemplifying analysis of the topics, used technologies and remaining activity of these projects. Shedding light on this instance of citizen science allows to highlight the potential of hackathons and startup culture regarding socio-technological resilience. At the same time, it may be understood as an impulse for crisis informatics to consider new forms of volunteering in the course of crisis management.
@inproceedings{haesler_crisis_2020,
title = {Crisis {Volunteering} {Nerds}: {Three} {Months} {After} {COVID}-19 {Hackathon} \#{WirVsVirus}},
url = {https://dl.acm.org/doi/pdf/10.1145/3406324.3424584},
doi = {10.1145/3406324.3424584},
abstract = {The hackathon \#WirVsVirus in March 2020 was one of the biggest hackathons in history. Under the patronage of the federal government of Germany, 28,361 participants worked together in 1,498 projects, finding innovative apps and solutions against the COVID-19 pandemic. Three months after the event, we present an exemplifying analysis of the topics, used technologies and remaining activity of these projects. Shedding light on this instance of citizen science allows to highlight the potential of hackathons and startup culture regarding socio-technological resilience. At the same time, it may be understood as an impulse for crisis informatics to consider new forms of volunteering in the course of crisis management.},
booktitle = {{MobileHCI} '20: 22nd {International} {Conference} on {Human}-{Computer} {Interaction} with {Mobile} {Devices} and {Services}},
publisher = {ACM},
author = {Haesler, Steffen and Schmid, Stefka and Reuter, Christian},
year = {2020},
keywords = {Crisis, HCI, Projekt-emergenCITY, Projekt-ATHENE-SecUrban},
pages = {1--56},
}
[BibTeX] [Abstract] [Download PDF]
The research field of crisis informatics examines, amongst others, the potentials and barriers of social media use during conflicts and crises. Social media allow emergency services to reach the public easily in the context of crisis communication and receive valuable information (e.g. pictures) from social media data. However, the vast amount of data generated during large-scale incidents can lead to issues of information overload and quality. To mitigate these issues, this paper proposes the semi-automatic creation of alerts including keyword, relevance and information quality filters based on cross-platform social media data. We conducted empirical studies and workshops with emergency services across Europe to raise requirements, then iteratively designed and implemented an approach to support emergency services, and performed multiple evaluations, including live demonstrations and field trials, to research the potentials of social media-based alerts. Finally, we present the findings and implications based on semi-structured interviews with emergency services, highlighting the need for usable configurability and white-box algorithm representation.
@article{kaufhold_mitigating_2020,
title = {Mitigating {Information} {Overload} in {Social} {Media} during {Conflicts} and {Crises}: {Design} and {Evaluation} of a {Cross}-{Platform} {Alerting} {System}},
volume = {39},
url = {https://www.tandfonline.com/doi/full/10.1080/0144929X.2019.1620334},
doi = {10.1080/0144929X.2019.1620334},
abstract = {The research field of crisis informatics examines, amongst others, the potentials and barriers of social media use during conflicts and crises. Social media allow emergency services to reach the public easily in the context of crisis communication and receive valuable information (e.g. pictures) from social media data. However, the vast amount of data generated during large-scale incidents can lead to issues of information overload and quality. To mitigate these issues, this paper proposes the semi-automatic creation of alerts including keyword, relevance and information quality filters based on cross-platform social media data. We conducted empirical studies and workshops with emergency services across Europe to raise requirements, then iteratively designed and implemented an approach to support emergency services, and performed multiple evaluations, including live demonstrations and field trials, to research the potentials of social media-based alerts. Finally, we present the findings and implications based on semi-structured interviews with emergency services, highlighting the need for usable configurability and white-box algorithm representation.},
number = {3},
journal = {Behaviour \& Information Technology (BIT)},
author = {Kaufhold, Marc-André and Rupp, Nicola and Reuter, Christian and Habdank, Matthias},
year = {2020},
keywords = {Security, Crisis, HCI, Projekt-ATHENE-FANCY, A-Paper, AuswahlKaufhold, Selected, AuswahlCrisis, Ranking-CORE-A, Ranking-ImpactFactor, SocialMedia, Projekt-KontiKat},
pages = {319--342},
}
[BibTeX] [Abstract] [Download PDF]
Since the emergence of so-called fake news on the internet and in social media, platforms such as Facebook have started to take countermeasures, and researchers have begun looking into this phenomenon from a variety of perspectives. A large number of scientific work has investigated ways to detect fake news automatically. Less attention has been paid to the subsequent step, i.e., what to do when you are aware of the inaccuracy of claims in social media. This work takes a user-centered approach on means to counter identified mis- and disinformation in social media. We conduct a three-step study design on how approaches in social media should be presented to respect the users‘ needs and experiences and how effective they are. As our first step, in an online survey representative for some factors to the German adult population, we enquire regarding their strategies on handling information in social media, and their opinion regarding possible solutions — focusing on the approach of displaying a warning on inaccurate posts. In a second step, we present five potential approaches for countermeasures identified in related work to interviewees for qualitative input. We discuss (1) warning, (2) related articles, (3) reducing the size, (4) covering, and (5) requiring confirmation. Based on the interview feedback, as the third step of this study, we select, improve, and examine four promising approaches on how to counter misinformation. We conduct an online experiment to test their effectiveness on the perceived accuracy of false headlines and also ask for the users‘ preferences. In this study, we find that users welcome warning-based approaches to counter fake news and are somewhat critical with less transparent methods. Moreover, users want social media platforms to explain why a post was marked as disputed. The results regarding effectiveness are similar: Warning-based approaches are shown to be effective in reducing the perceived accuracy of false headlines. Moreover, adding an explanation to the warning leads to the most significant results. In contrast, we could not find a significant effect on one of Facebook’s current approaches (reduced post size and fact-checks in related articles).
@article{kirchner_countering_2020,
title = {Countering {Fake} {News}: {A} {Comparison} of {Possible} {Solutions} {Regarding} {User} {Acceptance} and {Effectiveness}},
volume = {4},
url = {https://dl.acm.org/doi/10.1145/3415211},
doi = {10.1145/3415211},
abstract = {Since the emergence of so-called fake news on the internet and in social media, platforms such as Facebook have started to take countermeasures, and researchers have begun looking into this phenomenon from a variety of perspectives. A large number of scientific work has investigated ways to detect fake news automatically. Less attention has been paid to the subsequent step, i.e., what to do when you are aware of the inaccuracy of claims in social media. This work takes a user-centered approach on means to counter identified mis- and disinformation in social media. We conduct a three-step study design on how approaches in social media should be presented to respect the users' needs and experiences and how effective they are. As our first step, in an online survey representative for some factors to the German adult population, we enquire regarding their strategies on handling information in social media, and their opinion regarding possible solutions — focusing on the approach of displaying a warning on inaccurate posts. In a second step, we present five potential approaches for countermeasures identified in related work to interviewees for qualitative input. We discuss (1) warning, (2) related articles, (3) reducing the size, (4) covering, and (5) requiring confirmation. Based on the interview feedback, as the third step of this study, we select, improve, and examine four promising approaches on how to counter misinformation. We conduct an online experiment to test their effectiveness on the perceived accuracy of false headlines and also ask for the users' preferences. In this study, we find that users welcome warning-based approaches to counter fake news and are somewhat critical with less transparent methods. Moreover, users want social media platforms to explain why a post was marked as disputed. The results regarding effectiveness are similar: Warning-based approaches are shown to be effective in reducing the perceived accuracy of false headlines. Moreover, adding an explanation to the warning leads to the most significant results. In contrast, we could not find a significant effect on one of Facebook's current approaches (reduced post size and fact-checks in related articles).},
number = {CSCW2},
journal = {Proceedings of the ACM: Human Computer Interaction (PACM): Computer-Supported Cooperative Work and Social Computing},
author = {Kirchner, Jan and Reuter, Christian},
year = {2020},
note = {Place: Austin, USA
Publisher: ACM},
keywords = {Student, Crisis, HCI, A-Paper, Selected, AuswahlCrisis, Ranking-CORE-A, Ranking-ImpactFactor, Cooperation},
pages = {140:1--140:28},
}
[BibTeX] [Abstract] [Download PDF]
Mensch-Computer-Interaktion (MCI) beschäftigt sich mit Fragen rund um die benutzer- und kontextegerechte Gestaltung von IT-Systemen. Ohne MCI ist die vielbeschworene digitale Transformation nicht möglich, da Systeme, die nicht benutzbar (gebrauchstauglich) sind, für ihre Nutzer wertlos oder sogar gefährlich sind – erst Nutzbarkeit schafft Nutzen! In diesem Beitrag sammeln wir einige Beispiele dafür, wo und wie MCI in der Entwicklung zukünftiger IT-Systeme relevant ist – von nutzerzentrierter künstlicher Intelligenz über benutzbare Sicherheit, cyberphysische Systeme und digital Arbeit hin zu Augmented Reality und Virtual Reality.
@article{koch_mensch-computer-interaktion_2020,
title = {Mensch-{Computer}-{Interaktion} als zentrales {Gebiet} der {Informatik} - {Bestandsaufnahme}, {Trends} und {Herausforderungen}},
url = {https://link.springer.com/content/pdf/10.1007/s00287-020-01299-8.pdf},
doi = {10.1007/s00287-020-01299-8},
abstract = {Mensch-Computer-Interaktion (MCI) beschäftigt sich mit Fragen rund um die benutzer- und kontextegerechte Gestaltung von IT-Systemen. Ohne MCI ist die vielbeschworene digitale Transformation nicht möglich, da Systeme, die nicht benutzbar (gebrauchstauglich) sind, für ihre Nutzer wertlos oder sogar gefährlich sind – erst Nutzbarkeit schafft Nutzen! In diesem Beitrag sammeln wir einige Beispiele dafür, wo und wie MCI in der Entwicklung zukünftiger IT-Systeme relevant ist – von nutzerzentrierter künstlicher Intelligenz über benutzbare Sicherheit, cyberphysische Systeme und digital Arbeit hin zu Augmented Reality und Virtual Reality.},
journal = {Informatik-Spektrum},
author = {Koch, Michael and Ziegler, Jürgen and Reuter, Christian and Schlegel, Thomas and Prilla, Michael},
year = {2020},
keywords = {UsableSec, HCI},
}
[BibTeX] [Abstract] [Download PDF]
Computer unterstützen Menschen heute zunehmend in sicherheitskritischen Kontexten und Notfallsituationen: Beispielsweise in der Medizin und Produktion, aber auch im Verkehr und Katastrophenschutz begegnen wir immer häufiger digitalen Systemen, mit denen wir interagieren. Vor allem mobile Anwendungen haben im Laufe der letzten Jahre immer mehr an Relevanz gewonnen. Aufgrund vielfältiger Einsatzmöglichkeiten müssen hier diverse Disziplinen zusammenwirken, um die Kooperation zwischen Menschen und Maschinen sicher und effizient zu gestalten. Doch auch die Zusammenarbeit zwischen Menschen wird zunehmend technologisch unterstützt, was sich u.a. in der steigenden Popularität sozialer Medien widerspiegelt. Mithilfe solcher Systeme kann eine Kommunikation, Awareness und Koordination insbesondere in der Krisenbewältigung angestrebt und erreicht werden, sie bringen aufgrund ihrer teilweise technischen Komplexität aber auch Probleme mit sich. Im Zentrum dieses Workshops stehen Erkenntnisse zur Mensch-Computer-Interaktion in sicherheitskritischen Anwendungsgebieten.
@inproceedings{mentler_7_2020,
address = {Magdeburg, Germany},
title = {7. {Workshop} {Mensch}-{Maschine}-{Interaktion} in sicherheitskritischen {Systemen}},
url = {https://dl.gi.de/server/api/core/bitstreams/c9533821-ef3c-4b23-b000-adc172ea195b/content},
doi = {10.18420/muc2020-ws117},
abstract = {Computer unterstützen Menschen heute zunehmend in sicherheitskritischen Kontexten und Notfallsituationen: Beispielsweise in der Medizin und Produktion, aber auch im Verkehr und Katastrophenschutz begegnen wir immer häufiger digitalen Systemen, mit denen wir interagieren. Vor allem mobile Anwendungen haben im Laufe der letzten Jahre immer mehr an Relevanz gewonnen. Aufgrund vielfältiger Einsatzmöglichkeiten müssen hier diverse Disziplinen zusammenwirken, um die Kooperation zwischen Menschen und Maschinen sicher und effizient zu gestalten. Doch auch die Zusammenarbeit zwischen Menschen wird zunehmend technologisch unterstützt, was sich u.a. in der steigenden Popularität sozialer Medien widerspiegelt. Mithilfe solcher Systeme kann eine Kommunikation, Awareness und Koordination insbesondere in der Krisenbewältigung angestrebt und erreicht werden, sie bringen aufgrund ihrer teilweise technischen Komplexität aber auch Probleme mit sich. Im Zentrum dieses Workshops stehen Erkenntnisse zur Mensch-Computer-Interaktion in sicherheitskritischen Anwendungsgebieten.},
booktitle = {Mensch und {Computer} 2020 - {Workshopband}},
publisher = {Gesellschaft für Informatik e. V.},
author = {Mentler, Tilo and Reuter, Christian and Nestler, Simon and Kaufhold, Marc-André and Herczeg, Michael and Pottebaum, Jens},
year = {2020},
keywords = {Security, UsableSec, Crisis, HCI},
pages = {1--2},
}
[BibTeX] [Abstract] [Download PDF]
The growing importance of social media in conflicts and crises is accompanied by an ever-increasing research interest in the crisis informatics field in order to identify potential benefits and develop measures against the technology’s abuse. This special issue sets out to give an overview of current research on the use of social media in conflicts and crises. In doing so, it focuses on both good and malicious aspects of social media and includes a variety of papers of conceptual, theoretical and empirical nature. In six sections, the special issue presents an overview of the field, analytical methods, technical challenges, current advancements and the accepted papers before concluding. Specific topics range from cyber deception over information trustworthiness to mining and near-real-time processing of social media data.
@book{reuter_special_2020,
title = {Special {Issue} on {Social} {Media} in {Conflicts} and {Crises} - {Behaviour} \& {Information} {Technology} ({BIT})},
volume = {39},
url = {https://www.tandfonline.com/toc/tbit20/39/3},
abstract = {The growing importance of social media in conflicts and crises is accompanied by an ever-increasing research interest in the crisis informatics field in order to identify potential benefits and develop measures against the technology's abuse. This special issue sets out to give an overview of current research on the use of social media in conflicts and crises. In doing so, it focuses on both good and malicious aspects of social media and includes a variety of papers of conceptual, theoretical and empirical nature. In six sections, the special issue presents an overview of the field, analytical methods, technical challenges, current advancements and the accepted papers before concluding. Specific topics range from cyber deception over information trustworthiness to mining and near-real-time processing of social media data.},
number = {1},
publisher = {Taylor \& Francis},
author = {Reuter, Christian and Stieglitz, Stefan and Imran, Muhammad},
year = {2020},
note = {Publication Title: Behaviour \& Information Technology (BIT)},
keywords = {Peace, Crisis, HCI, A-Paper, Ranking-CORE-A, Ranking-ImpactFactor, SocialMedia},
}
[BibTeX] [Abstract] [Download PDF]
Digitalization and interconnectedness, facilitated by the Internet of Things (IoT) and the widespread distribution of mobile devices, can be used to tackle important societal challenges. This is maybe most prominently visible in the response to the COVID-2019 Pandemic. However, the design of mobile technology, functionality and underlying infrastructures must be resilient against disruptions caused by man-made (e.g. bombings, hacking) and natural (e.g. earthquakes, hurricanes) crises, emergencies and threats. To explore challenges, designs and potentials of interactive technologies, this workshop investigates the overlapping space of mobile technologies and resilient systems, including future application domains such as smart cities.
@inproceedings{reuter_mobile_2020,
title = {Mobile {Resilience}: {Designing} {Mobile} {Interactive} {Systems} for {Societal} and {Technical} {Resilience}},
url = {https://dl.acm.org/doi/pdf/10.1145/3406324.3424590},
doi = {10.1145/3406324.3424590},
abstract = {Digitalization and interconnectedness, facilitated by the Internet of Things (IoT) and the widespread distribution of mobile devices, can be used to tackle important societal challenges. This is maybe most prominently visible in the response to the COVID-2019 Pandemic. However, the design of mobile technology, functionality and underlying infrastructures must be resilient against disruptions caused by man-made (e.g. bombings, hacking) and natural (e.g. earthquakes, hurricanes) crises, emergencies and threats. To explore challenges, designs and potentials of interactive technologies, this workshop investigates the overlapping space of mobile technologies and resilient systems, including future application domains such as smart cities.},
booktitle = {{MobileHCI} '20: 22nd {International} {Conference} on {Human}-{Computer} {Interaction} with {Mobile} {Devices} and {Services}},
author = {Reuter, Christian and Kaufhold, Marc-André and Comes, Tina and Knodt, Michèle and Mühlhäuser, Max},
year = {2020},
keywords = {Crisis, HCI, Projekt-CYWARN, Projekt-emergenCITY, Projekt-ATHENE-SecUrban, SocialMedia, Ranking-CORE-B},
pages = {1--3},
}
[BibTeX] [Abstract] [Download PDF]
The growing importance of social media in conflicts and crises is accompanied by an ever-increasing research interest in the crisis informatics field in order to identify potential benefits and develop measures against the technology’s abuse. This special issue sets out to give an overview of current research on the use of social media in conflicts and crises. In doing so, it focuses on both good and malicious aspects of social media and includes a variety of papers of conceptual, theoretical and empirical nature. In six sections, the special issue presents an overview of the field, analytical methods, technical challenges, current advancements and the accepted papers before concluding. Specific topics range from cyber deception over information trustworthiness to mining and near-real-time processing of social media data.
@article{reuter_social_2020,
title = {Social media in conflicts and crises},
volume = {39},
issn = {0144-929X},
url = {https://peasec.de/paper/2020/2020_ReuterStieglitzImran_SocialMediainConflictsandCrises_BIT.pdf},
doi = {10.1080/0144929X.2019.1629025},
abstract = {The growing importance of social media in conflicts and crises is accompanied by an ever-increasing research interest in the crisis informatics field in order to identify potential benefits and develop measures against the technology's abuse. This special issue sets out to give an overview of current research on the use of social media in conflicts and crises. In doing so, it focuses on both good and malicious aspects of social media and includes a variety of papers of conceptual, theoretical and empirical nature. In six sections, the special issue presents an overview of the field, analytical methods, technical challenges, current advancements and the accepted papers before concluding. Specific topics range from cyber deception over information trustworthiness to mining and near-real-time processing of social media data.},
number = {1},
journal = {Behaviour \& Information Technology (BIT)},
author = {Reuter, Christian and Stieglitz, Stefan and Imran, Muhammad},
year = {2020},
keywords = {Peace, Crisis, HCI, A-Paper, Ranking-CORE-A, Ranking-ImpactFactor, SocialMedia},
pages = {241--251},
}
[BibTeX] [Abstract] [Download PDF]
Social media and public cloud computing (SM&PC) have emerged as important resources of small and medium enterprises (SMEs), but not all SMEs use SM&PC. The existing research predominantly focuses on the role of either the features of social media and cloud computing in relation to the perceptions of decision makers or the internal capabilities of organization concerning new innovation adoption. By integrating multidisciplinary literature, we, instead, argues that both the perception- and capability-related factors could play an important role in the adoption of new ICT technology, such as SM&PC. Therefore, we empirically investigated the decision maker’s perception-related and SME’s capability-related factors that may influence the adoption of SM&PC in SMEs in Germany. We used quantitative research methods to examine the proposed hypotheses on a sample of 2,404 SMEs from 17 industrial sectors. The results demonstrate that the decisions of German SMEs to engage in social media and cloud computing are not only influenced by the perceptions of SME owners about the usefulness, security aspects, and the implementation costs of SM&PC, but also by the internal capabilities of an SME, namely the innovativeness of an SME. The results and potential contributions of our research are discussed.
@article{s_hassan_perception_2020,
title = {Perception or capability? – {An} empirical investigation of the factors influencing the adoption of social media and public cloud in {German} {SMEs}},
volume = {2150002},
url = {https://peasec.de/paper/2020/2020_HassanReuterBzhalava_AdoptionSocialMediaSME_IJIM.pdf},
doi = {10.1142/S136391962150002X},
abstract = {Social media and public cloud computing (SM\&PC) have emerged as important resources of small and medium enterprises (SMEs), but not all SMEs use SM\&PC. The existing research predominantly focuses on the role of either the features of social media and cloud computing in relation to the perceptions of decision makers or the internal capabilities of organization concerning new innovation adoption. By integrating multidisciplinary literature, we, instead, argues that both the perception- and capability-related factors could play an important role in the adoption of new ICT technology, such as SM\&PC. Therefore, we empirically investigated the decision maker's perception-related and SME's capability-related factors that may influence the adoption of SM\&PC in SMEs in Germany. We used quantitative research methods to examine the proposed hypotheses on a sample of 2,404 SMEs from 17 industrial sectors. The results demonstrate that the decisions of German SMEs to engage in social media and cloud computing are not only influenced by the perceptions of SME owners about the usefulness, security aspects, and the implementation costs of SM\&PC, but also by the internal capabilities of an SME, namely the innovativeness of an SME. The results and potential contributions of our research are discussed.},
journal = {International Journal of Innovation Management},
author = {S. Hassan, Sohaib and Reuter, Christian and Bzhalava, Levan},
year = {2020},
keywords = {UsableSec, HCI, SocialMedia, Projekt-KontiKat, Projekt-HyServ, Ranking-VHB-B},
pages = {1--26},
}
2019
[BibTeX] [Abstract] [Download PDF]
Arbeitsteilung und Kooperation sind essentielle Bestandteil von Landwirtschaft, die sich im Laufe der Geschichte stetig weiterentwickelt haben. Nun ermöglicht die voranschreitende Digitalisierung in der Landwirtschaft erneut Innovationen und neue Arten der Kooperation. Moderne Dienstleistungen – wie optimierte Logistik oder umweltschonende Bewirtschaftung – verbinden zunehmend Maschinenleistungen und Datendienste zu untrennbaren Hybriden Services. Im Zuge dessen werden detaillierte Vereinbarungen bezüglich der bereitzustellenden betrieblichen Daten sowie der Verwendung der während der Dienstleistung erhobenen Messwerte getroffen. Im Rahmen des Projektes HyServ werden Servicekonzepte und Schnittstellen entwickelt, welche es den Akteuren erlauben, die Hoheit über die eigenen Daten zu behalten und dennoch kooperative Dienstleistungsverträge zu erstellen. Zu diesem Zweck werden dezentrale Strukturen mit kryptographisch gesichertem Austausch etabliert, welche als Infrastruktur für orchestrierte Micro-Services und Smart Contracts dienen.
@inproceedings{bernardi_hybride_2019,
address = {Vienna, Austria},
title = {Hybride {Dienstleistungen} in digitalisierten {Kooperationen} in der {Landwirtschaft}},
url = {http://gil-net.de/Publikationen/139_25-30.pdf},
abstract = {Arbeitsteilung und Kooperation sind essentielle Bestandteil von Landwirtschaft, die sich im Laufe der Geschichte stetig weiterentwickelt haben. Nun ermöglicht die voranschreitende Digitalisierung in der Landwirtschaft erneut Innovationen und neue Arten der Kooperation. Moderne Dienstleistungen – wie optimierte Logistik oder umweltschonende Bewirtschaftung – verbinden zunehmend Maschinenleistungen und Datendienste zu untrennbaren Hybriden Services. Im Zuge dessen werden detaillierte Vereinbarungen bezüglich der bereitzustellenden betrieblichen Daten sowie der Verwendung der während der Dienstleistung erhobenen Messwerte getroffen. Im Rahmen des Projektes HyServ werden Servicekonzepte und Schnittstellen entwickelt, welche es den Akteuren erlauben, die Hoheit über die eigenen Daten zu behalten und dennoch kooperative Dienstleistungsverträge zu erstellen. Zu diesem Zweck werden dezentrale Strukturen mit kryptographisch gesichertem Austausch etabliert, welche als Infrastruktur für orchestrierte Micro-Services und Smart Contracts dienen.},
booktitle = {39. {GIL}-{Jahrestagung}: {Informatik} in der {Land}-, {Forst}- und {Ernährungswirtschaft} {Fokus}; {Digitalisierung} für landwirtschaftliche {Betriebe} in kleinstrukturierten {Regionen} – ein {Widerspruch} in sich?, {Lecture} {Notes} in {Informatics} ({LNI})},
publisher = {Gesellschaft für Informatik},
author = {Bernardi, Ansgar and Reuter, Christian and Schneider, Wolfgang and Linsner, Sebastian and Kaufhold, Marc-André},
editor = {Meyer-Aurich, A.},
year = {2019},
keywords = {RSF, HCI, Infrastructure, Projekt-HyServ, Ranking-CORE-C, Ranking-VHB-C},
pages = {25--30},
}
[BibTeX] [Abstract] [Download PDF]
Finding a responsible way to address fake news on social media has become an urgent matter both in political and social contexts. Existing studies focus mainly on how to detect and label fake news. However, approaches to assist users in making their own assessments are largely missing. In this article we present a study on how an indicator-based white-box approach can support Twitter-users in assessing tweets. In a first step, we identified indicators for fake news that have shown to be promising in previous studies and that are suitable for our idea of a white-box approach. Building on that basis of indicators we then designed and implemented the browser-plugin TrustyTweet, which aims to assist users on Twitter in assessing tweets by showing politically neutral and intuitive warnings without creating reactance. Finally, we present the findings of our evaluations carried out with a total of 27 participants, which result in further design implications for approaches to assist users in dealing with fake news.
@inproceedings{hartwig_fighting_2019,
address = {Darmstadt, Germany},
title = {Fighting {Misinformation} on {Twitter}: {The} {Plugin} based approach {TrustyTweet}},
url = {https://tuprints.ulb.tu-darmstadt.de/id/eprint/9164},
abstract = {Finding a responsible way to address fake news on social media has become an urgent matter both in political and social contexts. Existing studies focus mainly on how to detect and label fake news. However, approaches to assist users in making their own assessments are largely missing. In this article we present a study on how an indicator-based white-box approach can support Twitter-users in assessing tweets. In a first step, we identified indicators for fake news that have shown to be promising in previous studies and that are suitable for our idea of a white-box approach. Building on that basis of indicators we then designed and implemented the browser-plugin TrustyTweet, which aims to assist users on Twitter in assessing tweets by showing politically neutral and intuitive warnings without creating reactance. Finally, we present the findings of our evaluations carried out with a total of 27 participants, which result in further design implications for approaches to assist users in dealing with fake news.},
booktitle = {{SCIENCE} {PEACE} {SECURITY} '19 - {Proceedings} of the {Interdisciplinary} {Conference} on {Technical} {Peace} and {Security} {Research}},
publisher = {TUprints},
author = {Hartwig, Katrin and Reuter, Christian},
editor = {Reuter, Christian and Altmann, Jürgen and Göttsche, Malte and Himmel, Mirko},
year = {2019},
keywords = {Peace, Crisis, HCI, SocialMedia},
pages = {67--69},
}
[BibTeX] [Abstract] [Download PDF]
The importance of dealing withfake newsonsocial mediahas increased both in political and social contexts.While existing studies focus mainly on how to detect and label fake news, approaches to assist usersin making their own assessments are largely missing. This article presents a study on how Twitter-users’assessmentscan be supported by an indicator-based white-box approach.First, we gathered potential indicators for fake news that have proven to be promising in previous studies and that fit our idea of awhite-box approach. Based on those indicators we then designed and implemented the browser-plugin TrusyTweet, which assists users on Twitterin assessing tweetsby showing politically neutral and intuitive warnings without creating reactance. Finally, we suggest the findings of our evaluations with a total of 27 participants which lead to further design implicationsfor approachesto assistusers in dealing with fake news.
@inproceedings{hartwig_trustytweet_2019,
address = {Siegen, Germany},
title = {{TrustyTweet}: {An} {Indicator}-based {Browser}-{Plugin} to {Assist} {Users} in {Dealing} with {Fake} {News} on {Twitter}},
url = {http://www.peasec.de/paper/2019/2019_HartwigReuter_TrustyTweet_WI.pdf},
abstract = {The importance of dealing withfake newsonsocial mediahas increased both in political and social contexts.While existing studies focus mainly on how to detect and label fake news, approaches to assist usersin making their own assessments are largely missing. This article presents a study on how Twitter-users'assessmentscan be supported by an indicator-based white-box approach.First, we gathered potential indicators for fake news that have proven to be promising in previous studies and that fit our idea of awhite-box approach. Based on those indicators we then designed and implemented the browser-plugin TrusyTweet, which assists users on Twitterin assessing tweetsby showing politically neutral and intuitive warnings without creating reactance. Finally, we suggest the findings of our evaluations with a total of 27 participants which lead to further design implicationsfor approachesto assistusers in dealing with fake news.},
booktitle = {Proceedings of the {International} {Conference} on {Wirtschaftsinformatik} ({WI})},
publisher = {AIS},
author = {Hartwig, Katrin and Reuter, Christian},
year = {2019},
keywords = {Peace, Student, Crisis, HCI, Projekt-ATHENE-FANCY, SocialMedia, Projekt-CRISP, Ranking-CORE-C, Ranking-VHB-C, Ranking-WKWI-A},
pages = {1858--1869},
}
[BibTeX] [Abstract] [Download PDF]
Currently, there is a tremendous number of communication technology and tems in use. Not only in the private user space, but also in business operations and societal areas, they are deeply involved: Ranging from messaging services or navigation over (critical) SCADA systems to whole digital cities and communities. Consequently, the view on communication networks in security and particularly crisis scenarios becomes inevitable. This paper examines the notions of resilience, adaption and transition within communication networks with a specific focus on crises. Based on a structured literature review, the fundamentals of resilience and communication networks are introduced. The paper then discusses the characteristics of (a) evolvability, accessibility, usability and diversity as well as (b) self-organization, -management, -optimization, – monitoring, -healing and -protection for communication network resilience. Finally, it outlines challenges and potentials of communication network resilience based in the use cases of security and crises.
@inproceedings{kalle_resilience_2019,
address = {Kassel, Germany},
title = {Resilience in {Security} and {Crises} through {Adaptions} and {Transitions}},
url = {https://dl.gi.de/bitstream/handle/20.500.12116/25097/paper12_02.pdf},
doi = {10.18420/inf2019_ws60},
abstract = {Currently, there is a tremendous number of communication technology and tems in use. Not only in the private user space, but also in business operations and societal areas, they are deeply involved: Ranging from messaging services or navigation over (critical) SCADA systems to whole digital cities and communities. Consequently, the view on communication networks in security and particularly crisis scenarios becomes inevitable. This paper examines the notions of resilience, adaption and transition within communication networks with a specific focus on crises. Based on a structured literature review, the fundamentals of resilience and communication networks are introduced. The paper then discusses the characteristics of (a) evolvability, accessibility, usability and diversity as well as (b) self-organization, -management, -optimization, - monitoring, -healing and -protection for communication network resilience. Finally, it outlines challenges and potentials of communication network resilience based in the use cases of security and crises.},
booktitle = {{INFORMATIK} 2019: 50 {Jahre} {Gesellschaft} für {Informatik} – {Informatik} für {Gesellschaft} ({Workshop}-{Beiträge}), {Lecture} {Notes} in {Informatics} ({LNI})},
publisher = {Gesellschaft für Informatik e. V.},
author = {Kalle, Timo and Kaufhold, Marc-André and Kuntke, Franz and Reuter, Christian and Rizk, Amr and Steinmetz, Ralf},
editor = {Draude, C. and Lange, M. and Sick, B.},
year = {2019},
keywords = {Student, Projekt-GeoBox, Security, UsableSec, Crisis, HCI, Projekt-MAKI, Ranking-CORE-C, Ranking-VHB-C},
pages = {571--584},
}
[BibTeX] [Abstract] [Download PDF]
Over the last decade, social media services had an enormous impact on modern culture. They are nowadays widely established in everyday life, but also during natural and man-made crises and conflicts. For instance, Facebook was part of the Arabic Spring, in which the tool facilitated the communication and interaction between participants of political protests. On the contrary, terrorists may recruit new members and disseminate ideologies, and social bots may influence social and political processes. Based on the notions of cultural violence and cultural peace as well as the phenomena of fake news, terrorism and social bots, this exploratory review firstly presents human cultural inter-ventions in social media (e.g. dissemination of fake news and terroristic propaganda) and respective countermeasures (e.g. fake news detection and counter-narratives). Sec-ondly, it discusses automatic cultural interventions realised via social bots (e.g. astro-turfing, misdirection and smoke screening) and countermeasures (e.g. crowdsourcing and social bot detection). Finally, this chapter concludes with a range of cultural inter-ventions and information and communication technology (ICT) in terms of actors and intentions to identify future research potential for supporting situational assessments during conflicts.
@incollection{kaufhold_cultural_2019,
address = {Wiesbaden, Germany},
title = {Cultural {Violence} and {Peace} in {Social} {Media}},
isbn = {978-3-658-25652-4},
url = {https://www.springer.com/de/book/9783658256517},
abstract = {Over the last decade, social media services had an enormous impact on modern culture. They are nowadays widely established in everyday life, but also during natural and man-made crises and conflicts. For instance, Facebook was part of the Arabic Spring, in which the tool facilitated the communication and interaction between participants of political protests. On the contrary, terrorists may recruit new members and disseminate ideologies, and social bots may influence social and political processes. Based on the notions of cultural violence and cultural peace as well as the phenomena of fake news, terrorism and social bots, this exploratory review firstly presents human cultural inter-ventions in social media (e.g. dissemination of fake news and terroristic propaganda) and respective countermeasures (e.g. fake news detection and counter-narratives). Sec-ondly, it discusses automatic cultural interventions realised via social bots (e.g. astro-turfing, misdirection and smoke screening) and countermeasures (e.g. crowdsourcing and social bot detection). Finally, this chapter concludes with a range of cultural inter-ventions and information and communication technology (ICT) in terms of actors and intentions to identify future research potential for supporting situational assessments during conflicts.},
booktitle = {Information {Technology} for {Peace} and {Security} - {IT} {Applications} and {Infrastructures} in {Conflicts}, {Crises}, {War}, and {Peace}},
publisher = {Springer Vieweg},
author = {Kaufhold, Marc-André and Reuter, Christian},
editor = {Reuter, Christian},
year = {2019},
doi = {10.1007/978-3-658-25652-4_17},
keywords = {Peace, Crisis, HCI, SocialMedia, Projekt-CRISP},
pages = {361--381},
}
[BibTeX] [Abstract] [Download PDF]
Social media have been established in many natural disasters or human‐induced crises and emergencies. Nowadays, authorities, such as emergency services, and citizens engage with social media in different phases of the emergency management cycle. However, as research in crisis informatics highlights, one remaining issue constitutes the chaotic use of social media by citizens during emergencies, which has the potential to increase the complexity of tasks, uncertainty, and pressure for emergency services. To counter these risks, besides implementing supportive technology, social media guidelines may help putting artefact and theoretical contributions into practical use for authorities and citizens. This paper presents the design and evaluation (with 1,024 participants) of citizens‘ guidelines for using social media before, during, and after emergencies.
@article{kaufhold_avoiding_2019,
title = {Avoiding {Chaotic} {Use} of {Social} {Media} before, during, and after {Emergencies}: {Design} and {Evaluation} of {Citizens}' {Guidelines}},
volume = {27},
url = {http://www.peasec.de/paper/2019/2019_KaufholdGizikisReuterHabdankGrinko_DesignEvaluationCitizenGuidelines_JCCM.pdf},
doi = {10.1111/1468-5973.12249},
abstract = {Social media have been established in many natural disasters or human‐induced crises and emergencies. Nowadays, authorities, such as emergency services, and citizens engage with social media in different phases of the emergency management cycle. However, as research in crisis informatics highlights, one remaining issue constitutes the chaotic use of social media by citizens during emergencies, which has the potential to increase the complexity of tasks, uncertainty, and pressure for emergency services. To counter these risks, besides implementing supportive technology, social media guidelines may help putting artefact and theoretical contributions into practical use for authorities and citizens. This paper presents the design and evaluation (with 1,024 participants) of citizens' guidelines for using social media before, during, and after emergencies.},
number = {3},
journal = {Journal of Contingencies and Crisis Management (JCCM)},
author = {Kaufhold, Marc-André and Gizikis, Alexis and Reuter, Christian and Habdank, Matthias and Grinko, Margarita},
year = {2019},
keywords = {Crisis, HCI, A-Paper, AuswahlKaufhold, Ranking-ImpactFactor, SocialMedia, Projekt-KontiKat, Projekt-EmerGent},
pages = {198--213},
}
[BibTeX] [Abstract] [Download PDF]
In der Sicherheits- und Krisenforschung stehen bislang primär Fragen der Vulne-rabilität, Stärkung von Resilienz und Erhaltung bzw. Wiederherstellung kritischer Infrastrukturen (KRITIS) im Mittelpunkt; zunehmend wird auch die Bedeutung von Sozialen Medien und Krisen-Apps erkannt. Inwiefern ist die Zivilbevölke-rung in Deutschland aber auf das Eintreten einer Krise tatsächlich vorbereitet? Welche Informations- und Kommunikationstechniken (IKT) werden im Alltag und bei einem potentiellen Infrastrukturausfall genutzt? Unser Beitrag stellt die Ergebnisse einer repräsentativen Umfrage mit 1024 Teilnehmern in Deutschland vor, die belegen, dass Gefahrenbewusstsein, Vorbereitung, effektives Krisenma-nagement und Verbreitung von Krisen-Apps in Deutschland noch relativ gering sind, während traditionelle Kommunikations- und Informationskanäle sowie in-formelle Informationsnetzwerke bevorzugt werden. Die Ergebnisse stellen wei-terhin die beträchtlichen Unterstützungspotentiale von IKT in derartigen Krisensi-tuationen heraus, die zur Erhöhung des Risikobewusstseins, der Erleichterung des Informationstransfers und der Verbesserung der Kommunikation zwischen Zivilbevölkerung, KRITIS-Betreibern und Behörden und Organisationen mit Si-cherheitsaufgaben (BOS) entscheidend beitragen können.
@inproceedings{kaufhold_potentiale_2019,
address = {Siegen, Germany},
title = {Potentiale von {IKT} beim {Ausfall} kritischer {Infrastrukturen}: {Erwartungen}, {Informationsgewinnung} und {Mediennutzung} der {Zivilbevölkerung} in {Deutschland}},
url = {http://www.peasec.de/paper/2019/2019_KaufholdGrinkoReuterSchorschLangerSkudelnyHollick_InfrastrukturAusfall_WI.pdf},
abstract = {In der Sicherheits- und Krisenforschung stehen bislang primär Fragen der Vulne-rabilität, Stärkung von Resilienz und Erhaltung bzw. Wiederherstellung kritischer Infrastrukturen (KRITIS) im Mittelpunkt; zunehmend wird auch die Bedeutung von Sozialen Medien und Krisen-Apps erkannt. Inwiefern ist die Zivilbevölke-rung in Deutschland aber auf das Eintreten einer Krise tatsächlich vorbereitet? Welche Informations- und Kommunikationstechniken (IKT) werden im Alltag und bei einem potentiellen Infrastrukturausfall genutzt? Unser Beitrag stellt die Ergebnisse einer repräsentativen Umfrage mit 1024 Teilnehmern in Deutschland vor, die belegen, dass Gefahrenbewusstsein, Vorbereitung, effektives Krisenma-nagement und Verbreitung von Krisen-Apps in Deutschland noch relativ gering sind, während traditionelle Kommunikations- und Informationskanäle sowie in-formelle Informationsnetzwerke bevorzugt werden. Die Ergebnisse stellen wei-terhin die beträchtlichen Unterstützungspotentiale von IKT in derartigen Krisensi-tuationen heraus, die zur Erhöhung des Risikobewusstseins, der Erleichterung des Informationstransfers und der Verbesserung der Kommunikation zwischen Zivilbevölkerung, KRITIS-Betreibern und Behörden und Organisationen mit Si-cherheitsaufgaben (BOS) entscheidend beitragen können.},
booktitle = {Proceedings of the {International} {Conference} on {Wirtschaftsinformatik} ({WI})},
publisher = {AIS},
author = {Kaufhold, Marc-André and Grinko, Margarita and Reuter, Christian and Schorch, Marén and Langer, Amanda and Skudelny, Sascha and Hollick, Matthias},
year = {2019},
keywords = {Projekt-GeoBox, RSF, Crisis, HCI, SocialMedia, Projekt-KontiKat, Infrastructure, Projekt-MAKI, Projekt-HyServ, Ranking-CORE-C, Ranking-VHB-C, Ranking-WKWI-A},
pages = {1054--1068},
}
[BibTeX] [Abstract] [Download PDF]
Digitalization, which proceeds in all branches, as well in agriculture, by using new technology, sensors and networking, requires responsible usage of data. One possibility to manage data and use them to create value is the blockchain-technology. It is primary enforced by the food industries and consumers to ensure traceability and transparency. To put blockchain-technology into beneficial use in agriculture, this domain has to be analyzed regarding social and business aspects. This paper presents the results of a qualitative study where 41 actors from the agricultural do-main participated in focus groups and delivered a written statement. It was found that farmers are interested in adapting new markets and technologies early to get an economic advantage. On the other hand, the fear of losing traditional local business partners and the social surroundings of the farmers must be considered
@inproceedings{linsner_blockchain_2019,
address = {Hamburg, Germany},
title = {Blockchain in der {Landwirtschaft} 4.0 - {Empirische} {Studie} zu {Erwartungen} von {Landwirt}\_innen gegenüber dezentralen {Services} auf {Basis} von {Distributed} {Ledger} {Technology}},
url = {https://dl.acm.org/citation.cfm?id=3340799},
doi = {10.1145/3340764.3340799},
abstract = {Digitalization, which proceeds in all branches, as well in agriculture, by using new technology, sensors and networking, requires responsible usage of data. One possibility to manage data and use them to create value is the blockchain-technology. It is primary enforced by the food industries and consumers to ensure traceability and transparency. To put blockchain-technology into beneficial use in agriculture, this domain has to be analyzed regarding social and business aspects. This paper presents the results of a qualitative study where 41 actors from the agricultural do-main participated in focus groups and delivered a written statement. It was found that farmers are interested in adapting new markets and technologies early to get an economic advantage. On the other hand, the fear of losing traditional local business partners and the social surroundings of the farmers must be considered},
booktitle = {Mensch und {Computer} - {Tagungsband}},
publisher = {ACM},
author = {Linsner, Sebastian and Kuntke, Franz and Schmidbauer-Wolf, Gina Maria and Reuter, Christian},
editor = {Alt, Florian and Bulling, Andreas and Döring, Tanja},
year = {2019},
keywords = {Projekt-GeoBox, HCI, Projekt-CROSSING, Projekt-CRISP, Projekt-MAKI, Projekt-HyServ, Cooperation},
pages = {103--113},
}
[BibTeX] [Abstract] [Download PDF]
Advances in science and technology play a crucial role in the context of peace, conflict and security. As information technology (IT) is becoming omnipresent, this includes both the resilience of IT infrastructures e.g. as a target in cases of conflict and the role of IT applications to prevent and manage conflicts, crises and disasters. This chapter is an introduction to IT and its role in war and peace, in conflicts and crises as well as in safety and security. Based on those connections a new field of research has emerged: IT peace research. It is introduced in this chapter which provides an overview of the inter-disciplinary concepts of peace, conflict and security. In addition, the research disciplines computer science and peace and conflict studies as the basis of IT peace research are explained. Moreover, the chapter focuses on the specific research topics of IT peace research and presents the institutionalised research landscape in Germany.
@incollection{reuter_it_2019,
address = {Wiesbaden, Germany},
title = {{IT} in {Peace}, {Conflict}, and {Security} {Research}},
isbn = {978-3-658-25652-4},
url = {https://www.springer.com/de/book/9783658256517},
abstract = {Advances in science and technology play a crucial role in the context of peace, conflict and security. As information technology (IT) is becoming omnipresent, this includes both the resilience of IT infrastructures e.g. as a target in cases of conflict and the role of IT applications to prevent and manage conflicts, crises and disasters. This chapter is an introduction to IT and its role in war and peace, in conflicts and crises as well as in safety and security. Based on those connections a new field of research has emerged: IT peace research. It is introduced in this chapter which provides an overview of the inter-disciplinary concepts of peace, conflict and security. In addition, the research disciplines computer science and peace and conflict studies as the basis of IT peace research are explained. Moreover, the chapter focuses on the specific research topics of IT peace research and presents the institutionalised research landscape in Germany.},
booktitle = {Information {Technology} for {Peace} and {Security} - {IT} {Applications} and {Infrastructures} in {Conflicts}, {Crises}, {War}, and {Peace}},
publisher = {Springer Vieweg},
author = {Reuter, Christian and Aldehoff, Larissa and Riebe, Thea and Kaufhold, Marc-André},
editor = {Reuter, Christian},
year = {2019},
doi = {10.1007/978-3-658-25652-4_2},
keywords = {Peace, Security, HCI, Projekt-CRISP, Infrastructure},
pages = {11--37},
}
[BibTeX] [Abstract] [Download PDF]
Not only today, but also in the future information technology and the advances in the field of computer science will have a high relevance for peace and security. Naturally, a textbook like this can only cover a selective part of research and a certain point in time. Nonetheless, it can be attempted to identify trends, challenges and venture an outlook into the future. That is exactly what we want to achieve in this chapter: To predict fu-ture developments and try to classify them correctly. These considerations were made both by the editor and the authors involved alike. Therefore, an outlook based on fun-damentals, cyber conflicts and war, cyber peace, cyber arms control, infrastructures as well as social interaction is given.
@incollection{reuter_future_2019,
address = {Wiesbaden, Germany},
title = {The {Future} of {IT} in {Peace} and {Security}},
isbn = {978-3-658-25652-4},
url = {https://www.springer.com/de/book/9783658256517},
abstract = {Not only today, but also in the future information technology and the advances in the field of computer science will have a high relevance for peace and security. Naturally, a textbook like this can only cover a selective part of research and a certain point in time. Nonetheless, it can be attempted to identify trends, challenges and venture an outlook into the future. That is exactly what we want to achieve in this chapter: To predict fu-ture developments and try to classify them correctly. These considerations were made both by the editor and the authors involved alike. Therefore, an outlook based on fun-damentals, cyber conflicts and war, cyber peace, cyber arms control, infrastructures as well as social interaction is given.},
booktitle = {Information {Technology} for {Peace} and {Security} - {IT} {Applications} and {Infrastructures} in {Conflicts}, {Crises}, {War}, and {Peace}},
publisher = {Springer Vieweg},
author = {Reuter, Christian and Aal, Konstantin and Aldehoff, Larissa and Altmann, Jürgen and Buchmann, Johannes and Bernhardt, Ute and Denker, Kai and Herrmann, Dominik and Hollick, Matthias and Katzenbeisser, Stefan and Kaufhold, Marc-André and Nordmann, Alfred and Reinhold, Thomas and Riebe, Thea and Ripper, Annette and Ruhmann, Ingo and Saalbach, Klaus-Peter and Schörnig, Niklas and Sunyaev, Ali and Wulf, Volker},
editor = {Reuter, Christian},
year = {2019},
doi = {10.1007/978-3-658-25652-4_19},
keywords = {Peace, Security, UsableSec, HCI, Projekt-CROSSING, Projekt-CRISP},
pages = {405--413},
}
[BibTeX] [Abstract] [Download PDF]
With the increasing popularity of the smartphone, the number of people using it for financial transactions such as online shopping, online banking or mobile payment is also growing. Apps used in these contexts store sensitive and valuable data, creating a need for security measures. It has not yet been researched to what extent certain authentication mechanisms, which can be information-, biometric- as well as token-based, are suitable for individual apps and the respective data. The goal of this work is to assess how perceived security and estimated effort of using such mechanisms, as well as the degree to which app data is considered worth protecting, influence users‘ choices of appropriate measures to protect app categories. Therefore, we conducted a representative study (n=1024). On the one hand, our results show that a positive correlation between perceived security and effort exists for all investigated non-biometric authentication methods. On the other hand, the study sheds light on the differences between the investigated app categories and the users‘ choice of the appropriate security mechanisms for the particular category. In contrast to perceived security having a positive influence on a user’s preference of mechanism, a relation can hardly be identified for effort. Moreover, app data sensitivity does not seem relevant for the users‘ choice of security mechanism.
@inproceedings{reuter_between_2019,
address = {Hamburg, Germany},
title = {Between {Effort} and {Security}: {User} {Assessment} of the {Adequacy} of {Security} {Mechanisms} for {App} {Categories}},
url = {http://www.peasec.de/paper/2019/2019_ReuterHaeusserBienHerbert_EffortSecurity_MuC.pdf},
doi = {10.1145/3340764.3340770},
abstract = {With the increasing popularity of the smartphone, the number of people using it for financial transactions such as online shopping, online banking or mobile payment is also growing. Apps used in these contexts store sensitive and valuable data, creating a need for security measures. It has not yet been researched to what extent certain authentication mechanisms, which can be information-, biometric- as well as token-based, are suitable for individual apps and the respective data. The goal of this work is to assess how perceived security and estimated effort of using such mechanisms, as well as the degree to which app data is considered worth protecting, influence users' choices of appropriate measures to protect app categories. Therefore, we conducted a representative study (n=1024). On the one hand, our results show that a positive correlation between perceived security and effort exists for all investigated non-biometric authentication methods. On the other hand, the study sheds light on the differences between the investigated app categories and the users' choice of the appropriate security mechanisms for the particular category. In contrast to perceived security having a positive influence on a user's preference of mechanism, a relation can hardly be identified for effort. Moreover, app data sensitivity does not seem relevant for the users' choice of security mechanism.},
booktitle = {Mensch und {Computer} - {Tagungsband}},
publisher = {ACM},
author = {Reuter, Christian and Häusser, Katja and Bien, Mona and Herbert, Franziska},
editor = {Alt, Florian and Bulling, Andreas and Döring, Tanja},
year = {2019},
keywords = {Student, Security, UsableSec, HCI, Projekt-ATHENE-FANCY, Projekt-CROSSING, Projekt-CRISP},
pages = {287--297},
}
[BibTeX] [Abstract] [Download PDF]
Technological and scientific progress, especially the rapid development in information technology (IT), plays a crucial role regarding questions of peace and security. This short overview addresses the significance, potentials and challenges of IT for peace and security. For this purpose, the talk offers an introduction to peace, conflict, and security research, thereby focusing on natural science, technical and computer science perspectives. In the following, it sheds light on fundamentals (e.g. IT in peace, conflict and security, natural science/ technical peace research), cyber conflicts and war (e.g. information warfare, cyber espionage, cyber defence, Darknet), cyber peace (e.g. dual-use, technology assessment, confidence and security building measures), cyber arms control (e.g. arms control in the cyberspace, unmanned systems, verification), cyber attribution and infrastructures (e.g. attribution of cyber-attacks, resilient infrastructures, secure critical information infrastructures), culture and interaction (e.g. safety and security, cultural violence, social media), before an outlook is given.
@inproceedings{reuter_information_2019-2,
address = {Darmstadt, Germany},
title = {Information {Technology} for {Peace} and {Security} – {An} {Emerging} {Research} {Field}},
url = {www.peasec.de/paper/2019/2019_Reuter_ITPeaceSecurityEmergingField_ProcSciencePeaceSecurity-TUprints.pdf},
abstract = {Technological and scientific progress, especially the rapid development in information technology (IT), plays a crucial role regarding questions of peace and security. This short overview addresses the significance, potentials and challenges of IT for peace and security. For this purpose, the talk offers an introduction to peace, conflict, and security research, thereby focusing on natural science, technical and computer science perspectives. In the following, it sheds light on fundamentals (e.g. IT in peace, conflict and security, natural science/ technical peace research), cyber conflicts and war (e.g. information warfare, cyber espionage, cyber defence, Darknet), cyber peace (e.g. dual-use, technology assessment, confidence and security building measures), cyber arms control (e.g. arms control in the cyberspace, unmanned systems, verification), cyber attribution and infrastructures (e.g. attribution of cyber-attacks, resilient infrastructures, secure critical information infrastructures), culture and interaction (e.g. safety and security, cultural violence, social media), before an outlook is given.},
booktitle = {{SCIENCE} {PEACE} {SECURITY} '19 - {Proceedings} of the {Interdisciplinary} {Conference} on {Technical} {Peace} and {Security} {Research}},
publisher = {TUprints},
author = {Reuter, Christian},
editor = {Reuter, Christian and Altmann, Jürgen and Göttsche, Malte and Himmel, Mirko},
year = {2019},
keywords = {Security, UsableSec, HCI, Projekt-ATHENE-FANCY, Projekt-CRISP},
pages = {18--20},
}
[BibTeX] [Abstract] [Download PDF]
Usage of social media during emergencies and respective perceptions vary across countries. Our representative survey of 7,071 citizens in Europe (Germany, Italy, the Netherlands and the United Kingdom) shows differences of current use of social media in emergencies, expectations towards authorities monitoring social media, intensity of perceiving barriers regarding the use as well as variances concerning the (likelihood of future) use of mobile apps. While German and British participants‘ frequency of use of social media is medium and low, respectively, Italian and Dutch respondents use them relatively frequently. Our comparison of the four countries allows for an interpretation of divergent behavior across countries with respect to risk cultures as well as expanding the respective model to social media contexts. At the same time, our findings stress that across the four European countries participants assessed similar advantages like dissemination of information and barriers like false rumors with respect to use social media during emergencies. Distributed equally across nations, age and gender showed significant relationships with social media usage which, among other findings, suggests being helpful for effective implementation of management structures using new technologies.
@article{reuter_impact_2019,
title = {The {Impact} of {Risk} {Cultures}: {Citizens}' {Perception} of {Social} {Media} {Use} in {Emergencies} across {Europe}},
volume = {148},
url = {http://www.peasec.de/paper/2019/2019_ReuterKaufholdSchmidSpielhoferHahne_TheImpactofRiskCultures_TFSC.pdf},
doi = {10.1016/j.techfore.2019.119724},
abstract = {Usage of social media during emergencies and respective perceptions vary across countries. Our representative survey of 7,071 citizens in Europe (Germany, Italy, the Netherlands and the United Kingdom) shows differences of current use of social media in emergencies, expectations towards authorities monitoring social media, intensity of perceiving barriers regarding the use as well as variances concerning the (likelihood of future) use of mobile apps. While German and British participants' frequency of use of social media is medium and low, respectively, Italian and Dutch respondents use them relatively frequently. Our comparison of the four countries allows for an interpretation of divergent behavior across countries with respect to risk cultures as well as expanding the respective model to social media contexts. At the same time, our findings stress that across the four European countries participants assessed similar advantages like dissemination of information and barriers like false rumors with respect to use social media during emergencies. Distributed equally across nations, age and gender showed significant relationships with social media usage which, among other findings, suggests being helpful for effective implementation of management structures using new technologies.},
number = {119724},
journal = {Technological Forecasting and Social Change (TFSC)},
author = {Reuter, Christian and Kaufhold, Marc-André and Schmid, Stefka and Spielhofer, Thomas and Hahne, Anna Sophie},
year = {2019},
keywords = {Crisis, HCI, A-Paper, Selected, AuswahlCrisis, Ranking-ImpactFactor, SocialMedia, Projekt-EmerGent, Ranking-VHB-B},
pages = {1--17},
}
[BibTeX] [Abstract] [Download PDF]
The digitalisation of communication started as early as the 1980s. With the rise of the internet in the mid-90s the digitalisation process intensified; then it took on another dimension with the spread of social media and smartphones in the mid noughties. These new technologies are providing new possibilities that are unveiling, or rather, strengthening societal trends. What’s more, traditional forms of organisation are also being transformed at breakneck speed. This publication provides an overview of both developments: On the one hand we have societal developments such as the blurring of boundaries between real and digital worlds, constant connectivity, fake news, and social media outrage. On the other, we have the effects on traditional media, the workplace, schools, non-governmental organisations and sports.
@book{reuter_digitalisation_2019,
address = {Frankfurt am Main},
title = {Digitalisation and {Communication}: {Societal} {Trends} and the {Change} in {Organisations}},
url = {http://publikationen.ub.uni-frankfurt.de/opus4/files/47853/SPPaper6_Digitalisation_Communication_English.pdf},
abstract = {The digitalisation of communication started as early as the 1980s. With the rise of the internet in the mid-90s the digitalisation process intensified; then it took on another dimension with the spread of social media and smartphones in the mid noughties. These new technologies are providing new possibilities that are unveiling, or rather, strengthening societal trends. What's more, traditional forms of organisation are also being transformed at breakneck speed. This publication provides an overview of both developments: On the one hand we have societal developments such as the blurring of boundaries between real and digital worlds, constant connectivity, fake news, and social media outrage. On the other, we have the effects on traditional media, the workplace, schools, non-governmental organisations and sports.},
publisher = {Mercator Science-Policy Fellowship-Programme},
author = {Reuter, Christian and Schultz, Tanjev and Stegbauer, Christian},
year = {2019},
keywords = {HCI, SocialMedia},
}
[BibTeX] [Abstract] [Download PDF]
Konsequentes Vorgehen von Behörden gegen gezielte Falschnachrichten – das wünscht sich laut einer repräsentativen Studie eine große Mehrheit der Bevölkerung in Deutschland. Das Fachgebiet Wissenschaft und Technik für Frieden und Sicherheit (PEASEC) der Technischen Universität Darmstadt fragte unter anderem danach, wie Bürgerinnen und Bürger Fake News wahrnehmen und auf sie reagieren und welche Gegenmaßnahmen als sinnvoll erachtet werden.
@incollection{reuter_fake_2019,
address = {Frankfurt am Main},
title = {Fake {News} und manipulierte {Meinungsbildung}},
url = {http://publikationen.ub.uni-frankfurt.de/opus4/files/47852/PolicyPaper5_Digitalisierung_Kommunikation_deutsch.pdf},
abstract = {Konsequentes Vorgehen von Behörden gegen gezielte Falschnachrichten – das wünscht sich laut einer repräsentativen Studie eine große Mehrheit der Bevölkerung in Deutschland. Das Fachgebiet Wissenschaft und Technik für Frieden und Sicherheit (PEASEC) der Technischen Universität Darmstadt fragte unter anderem danach, wie Bürgerinnen und Bürger Fake News wahrnehmen und auf sie reagieren und welche Gegenmaßnahmen als sinnvoll erachtet werden.},
booktitle = {Die {Digitalisierung} der {Kommunikation}: {Gesellschaftliche} {Trends} und der {Wandel} von {Organisationen}},
publisher = {Mercator Science-Policy Fellowship-Programme},
author = {Reuter, Christian},
editor = {Reuter, Christian and Schultz, Tanjev and Stegbauer, Christian},
year = {2019},
keywords = {Peace, Crisis, HCI, SocialMedia},
pages = {15--19},
}
[BibTeX] [Abstract] [Download PDF]
Bereits seit den 80er-Jahren erleben wir die Digitalisierung der Kommunikation. Mit dem Siegeszug des Internets in den 90er-Jahren intensivierte sich dieser Prozess und erreichte ab Mitte der 2000er mit der Verbreitung sozialer Medien und Smartphones eine neue Dimension. Neue technische Möglichkeiten haben neue gesellschaftliche Trends hervorgebracht bzw. verstärkt. Die Digitalisierung der Kommunikation verändert aber auch traditionelle Organisationsformen in atemberaubender Geschwindigkeit. Diese Publikation bietet einen Überblick zu diesen beiden Entwicklungen: gesellschaftliche Entwicklungen wie die Auflösung von realer und digitaler Welt, ständige Vernetztheit, Fake News und Shitstorm auf der einen Seite und die Auswirkungen dieser Prozesse auf traditionelle Medien, Arbeitswelt, Schulen, Nichtregierungsorganisationen und den Sportsektor auf der anderen Seite.
@book{reuter_digitalisierung_2019,
address = {Frankfurt am Main},
title = {Die {Digitalisierung} der {Kommunikation}: {Gesellschaftliche} {Trends} und der {Wandel} von {Organisationen}},
url = {http://publikationen.ub.uni-frankfurt.de/opus4/files/47852/PolicyPaper5_Digitalisierung_Kommunikation_deutsch.pdf},
abstract = {Bereits seit den 80er-Jahren erleben wir die Digitalisierung der Kommunikation. Mit dem Siegeszug des Internets in den 90er-Jahren intensivierte sich dieser Prozess und erreichte ab Mitte der 2000er mit der Verbreitung sozialer Medien und Smartphones eine neue Dimension. Neue technische Möglichkeiten haben neue gesellschaftliche Trends hervorgebracht bzw. verstärkt. Die Digitalisierung der Kommunikation verändert aber auch traditionelle Organisationsformen in atemberaubender Geschwindigkeit. Diese Publikation bietet einen Überblick zu diesen beiden Entwicklungen: gesellschaftliche Entwicklungen wie die Auflösung von realer und digitaler Welt, ständige Vernetztheit, Fake News und Shitstorm auf der einen Seite und die Auswirkungen dieser Prozesse auf traditionelle Medien, Arbeitswelt, Schulen, Nichtregierungsorganisationen und den Sportsektor auf der anderen Seite.},
publisher = {Mercator Science-Policy Fellowship-Programme},
author = {Reuter, Christian and Schultz, Tanjev and Stegbauer, Christian},
year = {2019},
keywords = {HCI, SocialMedia},
}
[BibTeX] [Abstract] [Download PDF]
On-site work of emergency service teams consists of highly cooperative tasks. Especially during distributed search and rescue tasks there is a constant mix of routinized and non-routinized activities. Within this paper we focus on the work practices of the German Red Cross Rescue Dog Units who deal with several uncertainties regarding the involved dogs, the fragility of the respective situations as well as issues of using technologies under enormous time pressure. Smart glasses provide possibilities for enhanced and hands-free interaction in various contexts and a number of approaches have already been applied, aiming at efficient use of the respective technological innovation in private and professional contexts. However, the collaborative potential of smart glasses in time-critical and uncertain situations is still unexplored. Our design case study examines how the on-site work of emergency service teams can be supported by smart glasses: Based on examining the work practices of the German Red Cross Rescue Dogs, we introduce ‘RescueGlass‘ as a coordinative concept, encompassing hands-free head-mounted display (HMD) application as well as a corresponding smartphone application. Finally, we describe the evaluation of its use in the field of emergency response and management. We show how current features such as ‘fog of war‘ or various sensors support the cooperative practices of dog handlers, and outline current technical limitations offering future research questions. Our paper provides an initial design probe using smart glasses to engage in the field of collaborative professional mobile tasks.
@article{reuter_rescueglass_2019,
title = {{RescueGlass}: {Collaborative} {Applications} involving {Head}-{Mounted} {Displays} for {Red} {Cross} {Rescue} {Dog} {Units}},
volume = {28},
url = {http://www.peasec.de/paper/2019/2019_ReuterLudwigMischur_RescueGlass_JCSCW.pdf},
doi = {10.1007/s10606-018-9339-8},
abstract = {On-site work of emergency service teams consists of highly cooperative tasks. Especially during distributed search and rescue tasks there is a constant mix of routinized and non-routinized activities. Within this paper we focus on the work practices of the German Red Cross Rescue Dog Units who deal with several uncertainties regarding the involved dogs, the fragility of the respective situations as well as issues of using technologies under enormous time pressure. Smart glasses provide possibilities for enhanced and hands-free interaction in various contexts and a number of approaches have already been applied, aiming at efficient use of the respective technological innovation in private and professional contexts. However, the collaborative potential of smart glasses in time-critical and uncertain situations is still unexplored. Our design case study examines how the on-site work of emergency service teams can be supported by smart glasses: Based on examining the work practices of the German Red Cross Rescue Dogs, we introduce ‘RescueGlass' as a coordinative concept, encompassing hands-free head-mounted display (HMD) application as well as a corresponding smartphone application. Finally, we describe the evaluation of its use in the field of emergency response and management. We show how current features such as ‘fog of war' or various sensors support the cooperative practices of dog handlers, and outline current technical limitations offering future research questions. Our paper provides an initial design probe using smart glasses to engage in the field of collaborative professional mobile tasks.},
number = {1-2},
journal = {Computer Supported Cooperative Work: The Journal of Collaborative Computing (JCSCW)},
author = {Reuter, Christian and Ludwig, Thomas and Mischur, Patrick},
year = {2019},
keywords = {Security, UsableSec, Crisis, HCI, A-Paper, Ranking-ImpactFactor, Projekt-KontiKat, Infrastructure, Cooperation, Ranking-CORE-B, Projekt-KOKOS, Ranking-VHB-B},
pages = {209--246},
}
[BibTeX] [Abstract] [Download PDF]
Nur wenn die technischen (z.B. Zuverlässigkeit) und nutzungs- orientierten Aspekte (z.B. Gebrauchstauglichkeit) angemessen und integriert berücksichtigt werden, können computerbasierte Systeme und vor allem deren Anwendung in komplexen Situati- onen sicher sein. Eine gute Benutzbarkeit ist dabei kein Zusatz, sondern zentraler Bestandteil bei der Verbesserung der System- sicherheit. Im Zentrum dieses Workshops stehen Erkenntnisse zur Mensch-Computer-Interaktion in sicherheitskritischen An- wendungsgebieten. Dazu werden Konzepte der Krisenkommuni- kation, der Nutzung sozialer Medien, neuartige Interaktionskon- zepte und Reflektionen zu Forschungsprojekten vorgestellt.
@inproceedings{reuter_6_2019,
address = {Hamburg, Germany},
title = {6. {Workshop} {Mensch}-{Maschine}-{Interaktion} in sicherheitskritischen {Systemen} - {Neue} digitale {Realitäten}},
url = {https://dl.gi.de/server/api/core/bitstreams/0f34b4af-542f-4a0e-8793-ceaf0602dee2/content},
abstract = {Nur wenn die technischen (z.B. Zuverlässigkeit) und nutzungs- orientierten Aspekte (z.B. Gebrauchstauglichkeit) angemessen und integriert berücksichtigt werden, können computerbasierte Systeme und vor allem deren Anwendung in komplexen Situati- onen sicher sein. Eine gute Benutzbarkeit ist dabei kein Zusatz, sondern zentraler Bestandteil bei der Verbesserung der System- sicherheit. Im Zentrum dieses Workshops stehen Erkenntnisse zur Mensch-Computer-Interaktion in sicherheitskritischen An- wendungsgebieten. Dazu werden Konzepte der Krisenkommuni- kation, der Nutzung sozialer Medien, neuartige Interaktionskon- zepte und Reflektionen zu Forschungsprojekten vorgestellt.},
booktitle = {Mensch und {Computer} 2019 - {Workshopband}},
publisher = {Gesellschaft für Informatik e.V.},
author = {Reuter, Christian and Mentler, Tilo and Nestler, Simon and Herczeg, Michael and Ludwig, Thomas and Pottebaum, Jens and Kaufhold, Marc-André},
year = {2019},
keywords = {Security, UsableSec, Crisis, HCI},
pages = {278--280},
}
[BibTeX] [Abstract] [Download PDF]
Fake news has become an important topic in our social and political environment. While research is coming up for the U.S. and European countries, many aspects remain uncovered as long as existing work only marginally inves-tigates people’s attitudes towards fake news. In this work, we present the results of a representative study (N=1023) in Germany asking participants about their attitudes towards fake news and approaches to counteract disinformation. More than 80\% of the participants agree that fake news poses a threat. 78\% see fake news as harming democracy. Even though about half of the respondents (48\%) have noticed fake news, most participants stated to have never liked, shared or commented on fake news. Regarding demographic factors, our findings support the view of younger and relatively educated people being more informed about fake news. Concerning ideological motives, the evaluation suggests left-wing or liberal respondents to be more critical of fake news
@inproceedings{reuter_fake_2019-1,
address = {Siegen, Germany},
title = {Fake {News} {Perception} in {Germany}: {A} {Representative} {Study} of {People}'s {Attitudes} and {Approaches} to {Counteract} {Disinformation}},
url = {http://www.peasec.de/paper/2019/2019_ReuterHartwigKirchnerSchlegel_FakeNewsPerceptionGermany_WI.pdf},
abstract = {Fake news has become an important topic in our social and political environment. While research is coming up for the U.S. and European countries, many aspects remain uncovered as long as existing work only marginally inves-tigates people's attitudes towards fake news. In this work, we present the results of a representative study (N=1023) in Germany asking participants about their attitudes towards fake news and approaches to counteract disinformation. More than 80\% of the participants agree that fake news poses a threat. 78\% see fake news as harming democracy. Even though about half of the respondents (48\%) have noticed fake news, most participants stated to have never liked, shared or commented on fake news. Regarding demographic factors, our findings support the view of younger and relatively educated people being more informed about fake news. Concerning ideological motives, the evaluation suggests left-wing or liberal respondents to be more critical of fake news},
booktitle = {Proceedings of the {International} {Conference} on {Wirtschaftsinformatik} ({WI})},
publisher = {AIS},
author = {Reuter, Christian and Hartwig, Katrin and Kirchner, Jan and Schlegel, Noah},
year = {2019},
keywords = {Peace, Student, Crisis, HCI, SocialMedia, Ranking-CORE-C, Ranking-VHB-C, Ranking-WKWI-A},
pages = {1069--1083},
}
[BibTeX] [Abstract] [Download PDF]
In this paper, we explore a specialized type of knowledge, „nomadic knowledge“ to understand its implications in knowledge sharing process. Nomadic knowledge is enacted in a discontinuous pattern with a changing set of actors and further flows on a definedtrajectory. This knowledge is quite important but is required sporadically, so it has a varying level of importance for stakeholders at different instances of time. The limited interest of knowledge holders after the creation of knowledge makes the knowledge sharing processcomplex. Furthermore, new sets of actors overloaded with tasks often ignore the knowledge sharing aspect due to the urgency of tasks at hand. Using a long-term field study we describe a particular practice that is not well supported technologically. The objective of this paper is to outline the concept of nomadic knowledge and associated implications, so that respective practices can be supported by the knowledge management community with appropriate technology.
@article{saeed_nomadic_2019,
title = {Nomadic {Knowledge} {Sharing} {Practices} and {Challenges}: {Findings} from a {Long}-term {Case} {Study}},
volume = {7},
url = {https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=8715497},
doi = {10.1109/ACCESS.2019.2916903},
abstract = {In this paper, we explore a specialized type of knowledge, "nomadic knowledge" to understand its implications in knowledge sharing process. Nomadic knowledge is enacted in a discontinuous pattern with a changing set of actors and further flows on a definedtrajectory. This knowledge is quite important but is required sporadically, so it has a varying level of importance for stakeholders at different instances of time. The limited interest of knowledge holders after the creation of knowledge makes the knowledge sharing processcomplex. Furthermore, new sets of actors overloaded with tasks often ignore the knowledge sharing aspect due to the urgency of tasks at hand. Using a long-term field study we describe a particular practice that is not well supported technologically. The objective of this paper is to outline the concept of nomadic knowledge and associated implications, so that respective practices can be supported by the knowledge management community with appropriate technology.},
number = {1},
journal = {IEEE Access},
author = {Saeed, Saqib and Pipek, Volkmar and Rohde, Markus and Reuter, Christian and Pinatti De Carvalho, Aparecido Fabiano and Wulf, Volker},
year = {2019},
keywords = {HCI, A-Paper, Ranking-ImpactFactor, Cooperation, Ranking-CORE-B},
pages = {63564--63577},
}
[BibTeX] [Abstract] [Download PDF]
Input modalities generally as well as in cars are evolving quickly regarding their spread and reliability. One possible input technique is gaze interaction, a topic still being researched. What are the front seat passengers‘ feelings towards gaze interaction, are they comfortable using it and do they think it is necessary? A laboratory experiment was conducted with 13 student participants, using a driving simulator, eye tracker, lamp and a driving wheel. Qualitative data was collected during and after the experiment through observation and a semi-structured interview. Quantitative data was collected through questionnaires (ATI, CTAM, SUS). The results were that the usability of the system was high but participants did not feel well using it.
@inproceedings{schmidbauer-wolf_usability_2019,
address = {Hamburg, Germany},
title = {Usability and {UX} of a {Gaze} {Interaction} {Tool} for {Front} {Seat} {Passengers}: {Evaluation} of a {Gaze} {Controlled} {Optical} {Feedback} {System} in a {Car}},
url = {www.peasec.de/paper/2019/2019_SchmidbauerWolfGuder_UsabilityUXGazeInteractionTool.pdf},
doi = {10.1145/3340764.3344890},
abstract = {Input modalities generally as well as in cars are evolving quickly regarding their spread and reliability. One possible input technique is gaze interaction, a topic still being researched. What are the front seat passengers' feelings towards gaze interaction, are they comfortable using it and do they think it is necessary? A laboratory experiment was conducted with 13 student participants, using a driving simulator, eye tracker, lamp and a driving wheel. Qualitative data was collected during and after the experiment through observation and a semi-structured interview. Quantitative data was collected through questionnaires (ATI, CTAM, SUS). The results were that the usability of the system was high but participants did not feel well using it.},
booktitle = {{MuC}’19: {Proceedings} of {Mensch} und {Computer} 2019},
publisher = {Gesellschaft für Informatik e.V.},
author = {Schmidbauer-Wolf, Gina Maria and Guder, Markus},
year = {2019},
keywords = {Student, HCI},
pages = {677--681},
}
[BibTeX] [Abstract] [Download PDF]
Smart cities want to provide a better life to their citizens, e.g. regarding health care, infrastruc- ture, better safety and security. This can be achieved by using more and new technology and by interconnecting and analysing new and existent devices. Thus, public spaces and buildings will be equipped with more interconnected input and output modalities. This ongoing technolo- gization of public spaces creates opportunities for making everyone’s life more secure, while at the same time everyone’s personal privacy is endangered. So how is this balancing act tackled and dealt with right now? What fears do citizens have regarding their security as well as their privacy? This paper provides first insights into the topic privacy in smart cities regarding that smart cities need data which can be provided by and of people. The paper raises the question if collecting people’s data, and thus enabling smart cities, is ethical and if not, how it can be assured to be ethical.
@inproceedings{schmidbauer-wolf_responsible_2019,
address = {Darmstadt, Germany},
title = {Responsible {Data} {Usage} in {Smart} {Cities}: {Privacy} in {Everyday} {Life} vs. {Reacting} to {Emergency} {Situations}},
url = {https://tuprints.ulb.tu-darmstadt.de/id/eprint/9164},
abstract = {Smart cities want to provide a better life to their citizens, e.g. regarding health care, infrastruc- ture, better safety and security. This can be achieved by using more and new technology and by interconnecting and analysing new and existent devices. Thus, public spaces and buildings will be equipped with more interconnected input and output modalities. This ongoing technolo- gization of public spaces creates opportunities for making everyone's life more secure, while at the same time everyone's personal privacy is endangered. So how is this balancing act tackled and dealt with right now? What fears do citizens have regarding their security as well as their privacy? This paper provides first insights into the topic privacy in smart cities regarding that smart cities need data which can be provided by and of people. The paper raises the question if collecting people's data, and thus enabling smart cities, is ethical and if not, how it can be assured to be ethical.},
booktitle = {{SCIENCE} {PEACE} {SECURITY} '19 - {Proceedings} of the {Interdisciplinary} {Conference} on {Technical} {Peace} and {Security} {Research}},
publisher = {TUprints},
author = {Schmidbauer-Wolf, Gina Maria and Herbert, Franziska and Reuter, Christian},
editor = {Reuter, Christian and Altmann, Jürgen and Göttsche, Malte and Himmel, Mirko},
year = {2019},
keywords = {Security, UsableSec, HCI, Projekt-ATHENE-FANCY, Projekt-CRISP},
pages = {70--74},
}
[BibTeX] [Abstract] [Download PDF]
People use social media in various ways including looking for or sharing information during crises or emergencies (e.g. floods, storms, terrorist attacks). Few studies have focused on European citizens‘ perceptions, and just one has deployed a representative sample to examine this. This article presents the results of one of the first representative studies on this topic conducted in the United Kingdom. The study shows that around a third (34\%) have used social media during an emergency and that such use is more widespread among younger people. In contrast, the main reasons for not using social media in an emergency include technological concerns and that the trustworthiness of social media content is doubtful. However, there is a growing trend towards increased use. The article deduces and explores implications of these findings, including problems potentially arising with more citizens sharing information on social media during emergencies and expecting a response.
@inproceedings{spielhofer_social_2019,
address = {València, Spain},
title = {Social {Media} {Use} in {Emergencies} of {Citizens} in the {United} {Kingdom}},
url = {http://www.peasec.de/paper/2019/2019_SpielhoferHahneReuterKaufholdSchmid_SocialMediaCrisesUK_ISCRAM.pdf},
abstract = {People use social media in various ways including looking for or sharing information during crises or emergencies (e.g. floods, storms, terrorist attacks). Few studies have focused on European citizens' perceptions, and just one has deployed a representative sample to examine this. This article presents the results of one of the first representative studies on this topic conducted in the United Kingdom. The study shows that around a third (34\%) have used social media during an emergency and that such use is more widespread among younger people. In contrast, the main reasons for not using social media in an emergency include technological concerns and that the trustworthiness of social media content is doubtful. However, there is a growing trend towards increased use. The article deduces and explores implications of these findings, including problems potentially arising with more citizens sharing information on social media during emergencies and expecting a response.},
booktitle = {Proceedings of the {Information} {Systems} for {Crisis} {Response} and {Management} ({ISCRAM})},
publisher = {ISCRAM Association},
author = {Spielhofer, Thomas and Hahne, Anna Sophie and Reuter, Christian and Kaufhold, Marc-André and Schmid, Stefka},
editor = {Franco, Zeno and González, José J. and Canós, José H.},
year = {2019},
keywords = {Crisis, HCI, SocialMedia, Projekt-KontiKat, Cooperation, Projekt-EmerGent},
}
2018
[BibTeX] [Abstract] [Download PDF]
Betriebsstörungen, Naturkatastrophen und andere Notfallszenarien bedrohen die Fortdauer von Unternehmen. Hierzu stellt Business Continuity Management (BCM) Maßnahmen zur Identifika-tion von Bedrohungen und Risiken sowie zum Aufbau der Belastbarkeit von Organisationen bereit. In der Forschung mangelt es jedoch an Ansätzen, welche BCM in kleinen und mittleren Unternehmen (KMU) unterstützen. In diesem Kurzbeitrag wird ein Konzept für KMU vorgestellt, welches die Identifikation und Bewertung von Risiken unterstützt, Bewältigungsmaßnahmen anbietet und unternehmensspezifische Risikoinformationen auf einem Dashboard visualisiert.
@inproceedings{kaufhold_interaktionsdesign_2018,
address = {Dresden, Germany},
title = {Interaktionsdesign eines {Risiko}-{Bewertungskonzepts} für {KMU}},
url = {https://dl.gi.de/bitstream/handle/20.500.12116/16626/Beitrag_356_final__a.pdf},
abstract = {Betriebsstörungen, Naturkatastrophen und andere Notfallszenarien bedrohen die Fortdauer von Unternehmen. Hierzu stellt Business Continuity Management (BCM) Maßnahmen zur Identifika-tion von Bedrohungen und Risiken sowie zum Aufbau der Belastbarkeit von Organisationen bereit. In der Forschung mangelt es jedoch an Ansätzen, welche BCM in kleinen und mittleren Unternehmen (KMU) unterstützen. In diesem Kurzbeitrag wird ein Konzept für KMU vorgestellt, welches die Identifikation und Bewertung von Risiken unterstützt, Bewältigungsmaßnahmen anbietet und unternehmensspezifische Risikoinformationen auf einem Dashboard visualisiert.},
booktitle = {Mensch und {Computer} - {Tagungsband}},
publisher = {Gesellschaft für Informatik e.V.},
author = {Kaufhold, Marc-André and Reuter, Christian and Ermert, Tobias},
year = {2018},
keywords = {Student, RSF, Security, UsableSec, Crisis, HCI, Projekt-KontiKat, Projekt-CRISP, Infrastructure, Projekt-HyServ},
pages = {309--312},
}
[BibTeX] [Abstract] [Download PDF]
Business Continuity Management (BCM) ist definiert als ganzheitlicher Managementprozess, der poten-zielle Bedrohungen für Organisationen und die Auswirkungen ermittelt, sowie ein Gerüst zum Aufbau der Belastbarkeit einer Organisation bereitstellt. Bereits existierende Ansätze in der Forschung legen den Fokus allerdings auf große Konzerne, während die Umsetzung eines BCM-Konzepts für kleine und mittlere Unternehmen (KMU) oft an den knappen finanziellen und personellen Ressourcen, aber auch an der Komplexität des BCM scheitert. Um KMU bei der Implementierung eines an deren Bedürfnisse angepasstem BCM-Systems (BCMS) zu unterstützen, gibt es in der Forschung nur wenige Lösungsan-sätze. Dieser Artikel stellt auf Basis einer empirischen Studie, welche Umsetzungsfaktoren für BCM und Anforderungen für BCMS untersucht, das prototypische Design eines BCM-Dashboards vor, welches mit wenig Konfigurationsaufwand möglichst relevante externe und interne Gefahrenquellen in einer kom-pakten Übersicht darzustellen vermag.
@inproceedings{kaufhold_design_2018,
address = {Dresden, Germany},
title = {Design eines {BCM}-{Dashboards} für kleine und mittlere {Unternehmen}},
url = {https://dl.gi.de/bitstream/handle/20.500.12116/16796/Beitrag_453_final__a.pdf},
abstract = {Business Continuity Management (BCM) ist definiert als ganzheitlicher Managementprozess, der poten-zielle Bedrohungen für Organisationen und die Auswirkungen ermittelt, sowie ein Gerüst zum Aufbau der Belastbarkeit einer Organisation bereitstellt. Bereits existierende Ansätze in der Forschung legen den Fokus allerdings auf große Konzerne, während die Umsetzung eines BCM-Konzepts für kleine und mittlere Unternehmen (KMU) oft an den knappen finanziellen und personellen Ressourcen, aber auch an der Komplexität des BCM scheitert. Um KMU bei der Implementierung eines an deren Bedürfnisse angepasstem BCM-Systems (BCMS) zu unterstützen, gibt es in der Forschung nur wenige Lösungsan-sätze. Dieser Artikel stellt auf Basis einer empirischen Studie, welche Umsetzungsfaktoren für BCM und Anforderungen für BCMS untersucht, das prototypische Design eines BCM-Dashboards vor, welches mit wenig Konfigurationsaufwand möglichst relevante externe und interne Gefahrenquellen in einer kom-pakten Übersicht darzustellen vermag.},
booktitle = {Mensch und {Computer} 2018 - {Workshopband}},
publisher = {Gesellschaft für Informatik e.V.},
author = {Kaufhold, Marc-André and Reuter, Christian and Riebe, Thea and von Radziewski, Elmar},
editor = {Dachselt, Raimund and Weber, Gerhard},
year = {2018},
keywords = {Student, Crisis, HCI, Projekt-KontiKat, Infrastructure},
pages = {579--586},
}
[BibTeX] [Abstract] [Download PDF]
Emergencies threaten human lives and overall societal continuity, whether or not the crises and disas- ters are induced by nature, such as earthquakes, floods and hurricanes, or by human beings, such as accidents, terror attacks and uprisings. In such situations, not only do citizens demand information about the damage and safe behaviour, but emergency services also require high quality information to improve situational awareness. For this purpose, there are currently two kinds of apps available: Gen- eral-purpose apps, such as Facebook Safety Check or Twitter Alerts, already integrate safety features. Specific crisis apps, such as KATWARN in Germany or FEMA in the US, provide information on how to behave before, during and after emergencies, and capabilities for reporting incidents or receiving disaster warnings. In this paper, we analyse authorities‘ and citizens‘ information demands and features of crisis apps. Moreover, we present the concept, implementation and evaluation of a crisis app for incident reporting and bidirectional communication between authorities and citizens. Using the app, citizens may (1) report incidents by providing a category, description, location and multimedia files and (2) receive broadcasts and responses from authorities. Finally, we outline features, requirements and contextual factors for incident reporting and bidirectional communication via mobile app.
@inproceedings{kaufhold_112social_2018,
address = {Portsmouth, UK},
title = {112.{SOCIAL}: {Design} and {Evaluation} of a {Mobile} {Crisis} {App} for {Bidirectional} {Communication} between {Emergency} {Services} and {Citizen}},
url = {https://peasec.de/paper/2018/2018_KaufholdRuppReuterAmelunxenCristaldi_112Social_ECIS.pdf},
abstract = {Emergencies threaten human lives and overall societal continuity, whether or not the crises and disas- ters are induced by nature, such as earthquakes, floods and hurricanes, or by human beings, such as accidents, terror attacks and uprisings. In such situations, not only do citizens demand information about the damage and safe behaviour, but emergency services also require high quality information to improve situational awareness. For this purpose, there are currently two kinds of apps available: Gen- eral-purpose apps, such as Facebook Safety Check or Twitter Alerts, already integrate safety features. Specific crisis apps, such as KATWARN in Germany or FEMA in the US, provide information on how to behave before, during and after emergencies, and capabilities for reporting incidents or receiving disaster warnings. In this paper, we analyse authorities' and citizens' information demands and features of crisis apps. Moreover, we present the concept, implementation and evaluation of a crisis app for incident reporting and bidirectional communication between authorities and citizens. Using the app, citizens may (1) report incidents by providing a category, description, location and multimedia files and (2) receive broadcasts and responses from authorities. Finally, we outline features, requirements and contextual factors for incident reporting and bidirectional communication via mobile app.},
booktitle = {Proceedings of the {European} {Conference} on {Information} {Systems} ({ECIS})},
publisher = {AIS},
author = {Kaufhold, Marc-André and Rupp, Nicola and Reuter, Christian and Amelunxen, Christoph and Cristaldi, Massimo},
year = {2018},
keywords = {Crisis, HCI, A-Paper, Ranking-CORE-A, Projekt-KontiKat, Cooperation, Projekt-EmerGent, Ranking-VHB-B, Ranking-WKWI-A},
pages = {1--17},
}
[BibTeX] [Download PDF]
@book{reuter_special_2018,
title = {Special {Issue} on {Social} {Media} in {Crisis} {Management} - {International} {Journal} on {Human}-{Computer} {Interaction} ({IJHCI})},
volume = {34},
url = {https://www.tandfonline.com/toc/hihc20/34/4?nav=tocList},
author = {Reuter, Christian and Hughes, Amanda Lee and Hiltz, Starr Roxanne and Imran, Muhammad and Plotnick, Linda},
year = {2018},
note = {Publication Title: International Journal on Human-Computer Interaction (IJHCI)},
keywords = {Crisis, HCI, Ranking-ImpactFactor, SocialMedia, Projekt-KontiKat, Ranking-CORE-B, Ranking-WKWI-B},
}
[BibTeX] [Download PDF]
@book{reuter_special_2018-2,
title = {Special {Issue} on {Human}-{Computer}-{Interaction} and {Social} {Media} in {Safety}-{Critical} {Systems} - {Journal} of {Contingencies} and {Crisis} {Management} ({JCCM})},
volume = {26},
url = {http://onlinelibrary.wiley.com/doi/10.1111/jccm.2018.26.issue-1/issuetoc},
number = {1},
publisher = {Wiley},
author = {Reuter, Christian},
year = {2018},
note = {Publication Title: Journal of Contingencies and Crisis Management (JCCM)},
keywords = {Security, Crisis, HCI, Ranking-ImpactFactor, SocialMedia, Projekt-KontiKat, Projekt-EmerGent},
}
[BibTeX] [Download PDF]
@techreport{reuter_studie_2018,
address = {Crisis Prevention},
title = {Studie: {Wie} sehen {Mitarbeiter} von {Feuerwehr} und {THW} den {Einsatz} sozialer {Medien} in {Gefahrenlagen}?},
url = {http://www.peasec.de/paper/2018/2018_ReuterLudwigKaufholdSpielhofer_FeuerwehrTHWSozialeMedienGefahrenlagen_CrisisPrevention.pdf},
author = {Reuter, Christian and Ludwig, Thomas and Kaufhold, Marc-André and Spielhofer, Thomas},
year = {2018},
keywords = {Crisis, HCI, SocialMedia, Projekt-KontiKat, Projekt-EmerGent},
pages = {64--66},
}
[BibTeX] [Abstract] [Download PDF]
Dieses Lehr- und Fachbuch gibt eine fundierte und praxisbezogene Einführung sowie einen Überblick über Grundlagen, Methoden und Anwendungen der Mensch-Computer-Interaktion im Kontext von Sicherheit, Notfällen, Krisen, Katastrophen, Krieg und Frieden. Dies adressierend werden interaktive, mobile, ubiquitäre und kooperative Technologien sowie Soziale Medien vorgestellt. Hierbei finden klassische Themen wie benutzbare (IT-)Sicherheit, Industrie 4.0, Katastrophenschutz, Medizin und Automobil, aber auch Augmented Reality, Crowdsourcing, Shitstorm Management, Social Media Analytics und Cyberwar ihren Platz. Methodisch wird das Spektrum von Usable Safety- bis Usable Security Engineering von Analyse über Design bis Evaluation abgedeckt. Das Buch eignet sich ebenso als Lehrbuch für Studierende wie als Handbuch für Wissenschaftler, Designer, Entwickler und Anwender.
@book{reuter_sicherheitskritische_2018,
address = {Wiesbaden},
title = {Sicherheitskritische {Mensch}-{Computer}-{Interaktion}: {Interaktive} {Technologien} und {Soziale} {Medien} im {Krisen}- und {Sicherheitsmanagement} ({Erste} {Auflage})},
isbn = {978-3-658-19522-9},
url = {http://www.springer.com/de/book/9783658195229},
abstract = {Dieses Lehr- und Fachbuch gibt eine fundierte und praxisbezogene Einführung sowie einen Überblick über Grundlagen, Methoden und Anwendungen der Mensch-Computer-Interaktion im Kontext von Sicherheit, Notfällen, Krisen, Katastrophen, Krieg und Frieden. Dies adressierend werden interaktive, mobile, ubiquitäre und kooperative Technologien sowie Soziale Medien vorgestellt. Hierbei finden klassische Themen wie benutzbare (IT-)Sicherheit, Industrie 4.0, Katastrophenschutz, Medizin und Automobil, aber auch Augmented Reality, Crowdsourcing, Shitstorm Management, Social Media Analytics und Cyberwar ihren Platz. Methodisch wird das Spektrum von Usable Safety- bis Usable Security Engineering von Analyse über Design bis Evaluation abgedeckt. Das Buch eignet sich ebenso als Lehrbuch für Studierende wie als Handbuch für Wissenschaftler, Designer, Entwickler und Anwender.},
publisher = {Springer Vieweg},
author = {Reuter, Christian},
year = {2018},
doi = {10.1007/978-3-658-19523-6},
keywords = {Peace, RSF, Security, UsableSec, HCI, AuswahlUsableSec, SocialMedia, Projekt-KontiKat, Infrastructure, Projekt-EmerGent},
}
[BibTeX] [Abstract] [Download PDF]
Sicherheitskritische Mensch-Computer-Interaktion ist nicht nur derzeit, sondern auch zukünftig ein äußerst relevantes Thema. Hierbei kann ein Lehr- und Fachbuch, wie dieses, immer nur einen punktuellen Stand abdecken. Dennoch kann der Versuch unternommen werden, aktuelle Trends zu identifizieren und einen Ausblick in die Zukunft zu wagen. Genau das möchte dieses Kapitel erreichen: Es sollen zukünftige Entwicklungen vorausgesagt und versucht werden, diese korrekt einzuordnen. Das ist an dieser Stelle nicht nur durch den Herausgeber, sondern durch Abfrage bei zahlreichen am Lehrbuch beteiligten Autoren geschehen. Neben einem Ausblick auf Grundlagen und Methoden werden dementsprechend auch sicherheitskritische interaktive Systeme und sicherheitskritische kooperative Systeme abgedeckt.
@incollection{reuter_zukunft_2018,
address = {Wiesbaden, Germany},
title = {Die {Zukunft} sicherheitskritischer {Mensch}-{Computer}-{Interaktion}},
isbn = {978-3-658-19523-6},
url = {https://link.springer.com/chapter/10.1007/978-3-658-19523-6_30},
abstract = {Sicherheitskritische Mensch-Computer-Interaktion ist nicht nur derzeit, sondern auch zukünftig ein äußerst relevantes Thema. Hierbei kann ein Lehr- und Fachbuch, wie dieses, immer nur einen punktuellen Stand abdecken. Dennoch kann der Versuch unternommen werden, aktuelle Trends zu identifizieren und einen Ausblick in die Zukunft zu wagen. Genau das möchte dieses Kapitel erreichen: Es sollen zukünftige Entwicklungen vorausgesagt und versucht werden, diese korrekt einzuordnen. Das ist an dieser Stelle nicht nur durch den Herausgeber, sondern durch Abfrage bei zahlreichen am Lehrbuch beteiligten Autoren geschehen. Neben einem Ausblick auf Grundlagen und Methoden werden dementsprechend auch sicherheitskritische interaktive Systeme und sicherheitskritische kooperative Systeme abgedeckt.},
booktitle = {Sicherheitskritische {Mensch}-{Computer}-{Interaktion}: {Interaktive} {Technologien} und {Soziale} {Medien} im {Krisen}- und {Sicherheitsmanagement}},
publisher = {Springer Vieweg},
author = {Reuter, Christian and Aal, Konstantin and Beham, Frank and Boden, Alexander and Brauner, Florian and Ludwig, Thomas and Lukosch, Stephan and Fiedrich, Frank and Fuchs-Kittowski, Frank and Geisler, Stefan and Gennen, Klaus and Herrmann, Dominik and Kaufhold, Marc-André and Klafft, Michael and Lipprandt, Myriam and Lo Iacono, Luigi and Pipek, Volkmar and Pottebaum, Jens and Mentler, Tilo and Nestler, Simon and Stieglitz, Stefan and Sturm, Christian and Rusch, Gebhard and Sackmann, Stefan and Volkamer, Melanie and Wulf, Volker},
editor = {Reuter, Christian},
year = {2018},
doi = {10.1007/978-3-658-19523-6_30},
keywords = {Security, UsableSec, Crisis, HCI, SocialMedia, Projekt-KontiKat},
pages = {621--630},
}
[BibTeX] [Abstract] [Download PDF]
Since the terrorist attacks of 9/11, the use of social media in emergency and crisis events has greatly increased and many studies have concentrated on the use of ICT and social media be-fore, during or after these events. The field of research that these studies fall under is called cri-sis informatics. In this paper, we evaluate and analyze crisis informatics research by looking at case studies of social media use in emergencies, outlining the types of research found in crisis informatics, and expounding upon the forms of interaction that have been researched. Finally, we summarize the achievements from an HCI perspective and outline trends and challenges for future research.
@article{reuter_social_2018,
title = {Social {Media} in {Crisis} {Management}: {An} {Evaluation} and {Analysis} of {Crisis} {Informatics} {Research}},
volume = {34},
url = {http://www.peasec.de/paper/2018/2018_ReuterHughesKaufhold_SocialMediaCrisisManagementEvaluation_IJHCI.pdf},
doi = {10.1080/10447318.2018.1427832},
abstract = {Since the terrorist attacks of 9/11, the use of social media in emergency and crisis events has greatly increased and many studies have concentrated on the use of ICT and social media be-fore, during or after these events. The field of research that these studies fall under is called cri-sis informatics. In this paper, we evaluate and analyze crisis informatics research by looking at case studies of social media use in emergencies, outlining the types of research found in crisis informatics, and expounding upon the forms of interaction that have been researched. Finally, we summarize the achievements from an HCI perspective and outline trends and challenges for future research.},
number = {4},
journal = {International Journal on Human-Computer Interaction (IJHCI)},
author = {Reuter, Christian and Hughes, Amanda Lee and Kaufhold, Marc-André},
year = {2018},
keywords = {Peace, Crisis, HCI, A-Paper, Selected, AuswahlCrisis, Ranking-ImpactFactor, SocialMedia, Projekt-KontiKat, Ranking-CORE-B, Ranking-WKWI-B},
pages = {280--294},
}
[BibTeX] [Abstract] [Download PDF]
Helfer bei Hochwassergefahr mobilisieren oder bei einem Terroranschlag Freunden auf Facebook mitteilen, dass es einem gut geht – immer mehr Menschen nutzen soziale Medien in Notsituationen, Krisen- oder Katastrophenlagen. Schließlich ist es heute kein Geheimnis mehr, dass soziale Medien in jenen Lagen (z. B. Überschwemmungen, Stürme, terroristische Anschläge) für diverse Gruppen (z. B. Bürger, Rettungsdienste) von Nutzen sein können. Während Stärken und Schwächen dieser Nutzung bereits eingehend erforscht wurden, widmen sich nur wenige Studien den betreffenden Wahrnehmungen innerhalb der Bevölkerung. Unsere repräsentative Untersuchung von Einstellungen der Bevölkerung in Deutschland gegenüber der Nutzung sozialer Medien in Notsituationen stellt die erste ihrer Art dar. Dabei zeigt sich, dass ungefähr die Hälfte der Befragten (44 \%) bereits in Notsituationen zum Zwecke des Teilens und / oder Herausfindens von Informationen auf soziale Medien zurückgegriffen hat. Zudem werden falsche Gerüchte in sozialen Medien mehrheitlich (74 \%) als Bedrohung empfunden. Notfall-Apps für das eigene Smartphone werden selten (16 \%) heruntergeladen, wobei Wetter- und Erste-Hilfe-Apps am beliebtesten sind.
@techreport{reuter_soziale_2018,
address = {BBK Bevölkerungsschutz},
title = {Soziale {Medien} und {Apps} in {Notsituationen}: {Eine} repräsentative {Studie} über die {Wahrnehmung} in {Deutschland}},
url = {http://www.peasec.de/paper/2018/2018_ReuterKaufholdSpielhoferHahne_SozialeMedienAppsNotsituationen_BBK.pdf},
abstract = {Helfer bei Hochwassergefahr mobilisieren oder bei einem Terroranschlag Freunden auf Facebook mitteilen, dass es einem gut geht – immer mehr Menschen nutzen soziale Medien in Notsituationen, Krisen- oder Katastrophenlagen. Schließlich ist es heute kein Geheimnis mehr, dass soziale Medien in jenen Lagen (z. B. Überschwemmungen, Stürme, terroristische Anschläge) für diverse Gruppen (z. B. Bürger, Rettungsdienste) von Nutzen sein können. Während Stärken und Schwächen dieser Nutzung bereits eingehend erforscht wurden, widmen sich nur wenige Studien den betreffenden Wahrnehmungen innerhalb der Bevölkerung. Unsere repräsentative Untersuchung von Einstellungen der Bevölkerung in Deutschland gegenüber der Nutzung sozialer Medien in Notsituationen stellt die erste ihrer Art dar. Dabei zeigt sich, dass ungefähr die Hälfte der Befragten (44 \%) bereits in Notsituationen zum Zwecke des Teilens und / oder Herausfindens von Informationen auf soziale Medien zurückgegriffen hat. Zudem werden falsche Gerüchte in sozialen Medien mehrheitlich (74 \%) als Bedrohung empfunden. Notfall-Apps für das eigene Smartphone werden selten (16 \%) heruntergeladen, wobei Wetter- und Erste-Hilfe-Apps am beliebtesten sind.},
author = {Reuter, Christian and Kaufhold, Marc-André and Spielhofer, Thomas and Hahne, Anna Sophie},
year = {2018},
keywords = {Crisis, HCI, SocialMedia, Projekt-KontiKat, Projekt-EmerGent},
pages = {22--24},
}
[BibTeX] [Abstract] [Download PDF]
The Internet has changed consumer behavior, having an impact on local retail. At the same time, the number of smartphone users is continuously increasing, making mobile applications more and more important. By using Bluetooth beacons – small radio transmitters which can be placed everywhere and processed by an according app – shopping can be facilitated and made more enjoyable. Even though some supermarkets, especially in the USA, are already using beacons, their use is not common and less researched in Germany. Pilot projects only refer to usage data and reaction times while customers are rarely asked for their opinion. This work analyzes potentials of usage and customer acceptance of concepts based on beacons in retail via an online consumer survey, the conception of an app as well as a subsequent qualitative evaluation. As a starting point for our concept development and app implementation, the previous online survey of 203 participants emphasizes the importance of user-friendly settings as well as costumers‘ interest in informative communica-tion. Throughout all steps of our design case study, concerns for data privacy linked with interest in transparency were apparent and included, respectively. The field experiment stresses users‘ perceptions of potentially useful functions, and highlights design-related aspects for improvement, offering useful implications for future design of shopping apps.
@article{reuter_mobile_2018,
title = {Mobile and {Interactive} {Media} in the {Store}? {Design} {Case} {Study} on {Bluetooth} {Beacon} {Concepts} for {Food} {Retail}},
volume = {1},
url = {http://www.peasec.de/paper/2018/2018_ReuterLeopold_Beacon_MediaInAction.pdf},
abstract = {The Internet has changed consumer behavior, having an impact on local retail. At the same time, the number of smartphone users is continuously increasing, making mobile applications more and more important. By using Bluetooth beacons – small radio transmitters which can be placed everywhere and processed by an according app – shopping can be facilitated and made more enjoyable. Even though some supermarkets, especially in the USA, are already using beacons, their use is not common and less researched in Germany. Pilot projects only refer to usage data and reaction times while customers are rarely asked for their opinion. This work analyzes potentials of usage and customer acceptance of concepts based on beacons in retail via an online consumer survey, the conception of an app as well as a subsequent qualitative evaluation. As a starting point for our concept development and app implementation, the previous online survey of 203 participants emphasizes the importance of user-friendly settings as well as costumers' interest in informative communica-tion. Throughout all steps of our design case study, concerns for data privacy linked with interest in transparency were apparent and included, respectively. The field experiment stresses users' perceptions of potentially useful functions, and highlights design-related aspects for improvement, offering useful implications for future design of shopping apps.},
number = {99-134},
journal = {Media in Action: An Interdisciplinary Journal on Cooperative Media},
author = {Reuter, Christian and Leopold, Inken},
year = {2018},
keywords = {HCI},
}
[BibTeX] [Abstract] [Download PDF]
In 2004, Information Systems for Crisis Response and Management (ISCRAM) was a new area of research. Pio- neering researchers from different continents and disciplines found fellowship at the first ISCRAM workshop. Around the same time, the use of social media in crises was first recognized in academia. In 2018, the 15 th IS- CRAM conference will take place, which gives us the possibility to look back on what has already been achieved with regard to IT support in crises using social media. With this article, we examine trends and developments with a specific focus on social media. We analyzed all papers published at previous ISCRAMs (n=1339). Our analysis shows that various platforms, the use of language and coverage of different types of disasters follow certain trends – most noticeably a dominance of Twitter, English and crises with large impacts such as hurricanes or earthquakes can be seen.
@inproceedings{reuter_iscram_2018,
address = {Rochester, New York, USA},
title = {{ISCRAM} turns 15: {A} {Trend} {Analysis} of {Social} {Media} {Papers} 2004-2017},
url = {http://www.peasec.de/paper/2018/2018_ReuterBackfriedKaufholdSpahn_15YearsISCRAM.pdf},
abstract = {In 2004, Information Systems for Crisis Response and Management (ISCRAM) was a new area of research. Pio- neering researchers from different continents and disciplines found fellowship at the first ISCRAM workshop. Around the same time, the use of social media in crises was first recognized in academia. In 2018, the 15 th IS- CRAM conference will take place, which gives us the possibility to look back on what has already been achieved with regard to IT support in crises using social media. With this article, we examine trends and developments with a specific focus on social media. We analyzed all papers published at previous ISCRAMs (n=1339). Our analysis shows that various platforms, the use of language and coverage of different types of disasters follow certain trends – most noticeably a dominance of Twitter, English and crises with large impacts such as hurricanes or earthquakes can be seen.},
booktitle = {Proceedings of the {Information} {Systems} for {Crisis} {Response} and {Management} ({ISCRAM})},
publisher = {ISCRAM},
author = {Reuter, Christian and Backfried, Gerhard and Kaufhold, Marc-André and Spahr, Fabian},
editor = {Boersma, Kees and Tomaszewski, Brian},
year = {2018},
keywords = {Student, Crisis, HCI, SocialMedia, Projekt-KontiKat},
pages = {1--14},
}
[BibTeX] [Abstract] [Download PDF]
Social media is gaining more and more importance in crisis management: “Social media continue to evolve, and so does their use in emergency and crisis events” (Reuter et al., 2018). Related research is sometimes called “crisis informatics” (Palen et al., 2009). This special issue was initiated based on the track “Social Media Studies” at previous ISCRAM (Information Systems for Crisis Response and Management) conferences. It is usually one of the tracks with the most submissions, however we (successfully) aimed to also invite scholars from other venues to contribute.
@article{reuter_editorial_2018,
title = {Editorial of the {Special} {Issue} on {Social} {Media} in {Crisis} {Management}},
volume = {34},
url = {http://www.peasec.de/paper/2018/2018_ReuterHughesHiltzImranPlotnik_EditorialSpecialIssueSocialMediaCrisisManagement_IJHCI.pdf},
doi = {10.1080/10447318.2018.1427833},
abstract = {Social media is gaining more and more importance in crisis management: “Social media continue to evolve, and so does their use in emergency and crisis events” (Reuter et al., 2018). Related research is sometimes called “crisis informatics” (Palen et al., 2009). This special issue was initiated based on the track “Social Media Studies” at previous ISCRAM (Information Systems for Crisis Response and Management) conferences. It is usually one of the tracks with the most submissions, however we (successfully) aimed to also invite scholars from other venues to contribute.},
number = {4},
journal = {International Journal on Human-Computer Interaction (IJHCI)},
author = {Reuter, Christian and Hughes, Amanda Lee and Hiltz, Starr Roxanne and Imran, Muhammad and Plotnick, Linda},
year = {2018},
keywords = {RSF, Crisis, HCI, Ranking-ImpactFactor, SocialMedia, Projekt-KontiKat, Ranking-CORE-B, Ranking-WKWI-B},
pages = {277--279},
}
[BibTeX] [Abstract] [Download PDF]
Im Zentrum dieses Workshops stehen Erkenntnisse zur Mensch-Computer-Interaktion (MCI) in sicherheitskritischen Anwendungsgebieten. Da in solchen Feldern – etwa Katastrophenmanagement, Verkehr, Produktion oder Medizin – MCI eine immer größere Relevanz erhält, sind viele wissenschaftliche Gebiete, unter anderem die Informatik oder Mensch-Maschine Interaktion, zunehmend gefragt. Die Herausfor-derung besteht darin, bestehende Ansätze und Methoden zu diskutieren, anzupassen und innovative Lösungen zu entwickeln, die von den Nutzenden sicher und effizient verwendet werden können.
@inproceedings{reuter_5_2018,
address = {Dresden, Germany},
title = {5. {Workshop} {Mensch}-{Maschine}-{Interaktion} in sicherheitskritischen {Systemen}},
url = {https://dl.gi.de/bitstream/handle/20.500.12116/16929/Beitrag_328_final__a.pdf},
abstract = {Im Zentrum dieses Workshops stehen Erkenntnisse zur Mensch-Computer-Interaktion (MCI) in sicherheitskritischen Anwendungsgebieten. Da in solchen Feldern – etwa Katastrophenmanagement, Verkehr, Produktion oder Medizin – MCI eine immer größere Relevanz erhält, sind viele wissenschaftliche Gebiete, unter anderem die Informatik oder Mensch-Maschine Interaktion, zunehmend gefragt. Die Herausfor-derung besteht darin, bestehende Ansätze und Methoden zu diskutieren, anzupassen und innovative Lösungen zu entwickeln, die von den Nutzenden sicher und effizient verwendet werden können.},
booktitle = {Mensch und {Computer} 2018 - {Workshopband}},
publisher = {Gesellschaft für Informatik e.V.},
author = {Reuter, Christian and Mentler, Tilo and Nestler, Simon and Herczeg, Michael and Geisler, Stefan and Ludwig, Thomas and Pipek, Volkmar and Pottebaum, Jens},
editor = {Dachselt, Raimund and Weber, Gerhard},
year = {2018},
keywords = {Security, UsableSec, Crisis, HCI, Projekt-KontiKat},
pages = {565--569},
}
[BibTeX] [Abstract] [Download PDF]
Social media has been established in many larger emergencies and crises. This process has not started just a few years ago, but already 15 years ago in 2001 after the terrorist attacks of 9/11. In the following years, especially in the last 10, sometimes summarized under the term crisis informatics, a variety of studies focusing on the use of ICT and social media before, during or after nearly every crisis and emergency has arisen. This article aims to recapitulate 15 years of social media in emergencies and its research with a special emphasis on use patterns, role patterns and perception patterns that can be found across different cases in order to point out what has been achieved so far, and what future potentials exist.
@article{reuter_fifteen_2018,
title = {Fifteen {Years} of {Social} {Media} in {Emergencies}: {A} {Retrospective} {Review} and {Future} {Directions} for {Crisis} {Informatics}},
volume = {26},
url = {http://www.peasec.de/paper/2018/2018_ReuterKaufhold_FifteenYearsSocialMediaEmergencies_JCCM.pdf},
doi = {10.1111/1468-5973.12196},
abstract = {Social media has been established in many larger emergencies and crises. This process has not started just a few years ago, but already 15 years ago in 2001 after the terrorist attacks of 9/11. In the following years, especially in the last 10, sometimes summarized under the term crisis informatics, a variety of studies focusing on the use of ICT and social media before, during or after nearly every crisis and emergency has arisen. This article aims to recapitulate 15 years of social media in emergencies and its research with a special emphasis on use patterns, role patterns and perception patterns that can be found across different cases in order to point out what has been achieved so far, and what future potentials exist.},
number = {1},
journal = {Journal of Contingencies and Crisis Management (JCCM)},
author = {Reuter, Christian and Kaufhold, Marc-André},
year = {2018},
keywords = {Peace, Crisis, HCI, A-Paper, AuswahlKaufhold, Selected, AuswahlCrisis, Ranking-ImpactFactor, SocialMedia, Projekt-EmerGent, Projekt-KOKOS},
pages = {41--57},
}
[BibTeX] [Abstract] [Download PDF]
Die Gestaltung gebrauchstauglicher, interaktiver und kooperativer Systeme wird bereits seit den 1980er Jahren in der Disziplin Mensch-Computer-Interaktion (MCI) und Com-puterunterstützte Gruppenarbeit (CSCW) behandelt. Es gibt jedoch einige Besonderhei-ten der MCI im Kontext sicherheitskritischer Systeme, insbesondere der störungsfreien Nutzung von IT (Safety) zu beachten. Dieses Kapitel stellt die wichtigsten Merkmale der Anwendung von Gestaltungsmethoden der MCI in sicherheitskritischen Systemen dar. Hierfür werden zu Beginn die Grundlagen der beiden Gebiete – der MCI sowie des Kri-sen- und Sicherheitsmanagements – erläutert. Darauf aufbauend werden Ansätze und Methoden der Analyse, des Designs und der Entwicklung sowie der Evaluation der MCI unter besonderer Berücksichtigung sicherheitskritischer Systeme diskutiert. Aspekte wie Risikoanalysen in der Anforderungsanalyse, die Einkalkulierung von Bedienfehlern und Rückfallebenen im Systemdesign gehören ebenso dazu wie besondere Herausforderun-gen bei Evaluationen.
@incollection{reuter_usable_2018,
address = {Wiesbaden, Germany},
title = {Usable {Safety} {Engineering} sicherheitskritischer interaktiver {Systeme}},
isbn = {978-3-658-19523-6},
url = {https://link.springer.com/chapter/10.1007/978-3-658-19523-6_2},
abstract = {Die Gestaltung gebrauchstauglicher, interaktiver und kooperativer Systeme wird bereits seit den 1980er Jahren in der Disziplin Mensch-Computer-Interaktion (MCI) und Com-puterunterstützte Gruppenarbeit (CSCW) behandelt. Es gibt jedoch einige Besonderhei-ten der MCI im Kontext sicherheitskritischer Systeme, insbesondere der störungsfreien Nutzung von IT (Safety) zu beachten. Dieses Kapitel stellt die wichtigsten Merkmale der Anwendung von Gestaltungsmethoden der MCI in sicherheitskritischen Systemen dar. Hierfür werden zu Beginn die Grundlagen der beiden Gebiete – der MCI sowie des Kri-sen- und Sicherheitsmanagements – erläutert. Darauf aufbauend werden Ansätze und Methoden der Analyse, des Designs und der Entwicklung sowie der Evaluation der MCI unter besonderer Berücksichtigung sicherheitskritischer Systeme diskutiert. Aspekte wie Risikoanalysen in der Anforderungsanalyse, die Einkalkulierung von Bedienfehlern und Rückfallebenen im Systemdesign gehören ebenso dazu wie besondere Herausforderun-gen bei Evaluationen.},
booktitle = {Sicherheitskritische {Mensch}-{Computer}-{Interaktion}: {Interaktive} {Technologien} und {Soziale} {Medien} im {Krisen}- und {Sicherheitsmanagement}},
publisher = {Springer Vieweg},
author = {Reuter, Christian and Kaufhold, Marc-André},
editor = {Reuter, Christian},
year = {2018},
doi = {10.1007/978-3-658-19523-6_2},
keywords = {Security, UsableSec, HCI, Projekt-KontiKat, Projekt-CRISP},
pages = {17--40},
}
[BibTeX] [Abstract] [Download PDF]
Kooperationstechnologien spielen in sicherheitskritischen Systemen eine große Rolle, da in vielen Anwendungsfeldern nicht nur die Interaktion von Mensch und Computer, sondern auch die durch IT unterstützte Kooperation zwischen Menschen notwendig ist, um Aufgaben bewältigen zu können. Solche Technologien müssen verschiedene Anforderungen erfüllen und können ebenfalls zur Resilienz beitragen. Unter Resilienz durch Kooperation verstehen wir die Fähigkeit, Krisen durch die Anpassungsfähigkeit an geänderte Realitäten ohne nachhaltigen Schaden mithilfe von Kooperation zu überstehen. Während das Konzept der Resilienz in den Ingenieurwissenschaften vornehmlich die Verfügbarkeit technischer Systeme fokussiert, betrachten wir Resilienz als soziotechnisches Konstrukt, unter expliziter Betrachtung der beteiligten Akteure. Basierend auf Grundlagen zu Kooperationstechnologien zeigt unser Kapitel anhand von praktischen exemplarisch umgesetzten Kooperationstechnologien (soziales Netzwerk, GIS-System, Smartphone Apps, Facebook App und Social Media Analytics-Plattform), wie Kooperation unterstützt wird und zu kooperativer Resilienz beitragen kann.
@incollection{reuter_resilienz_2018,
address = {Wiesbaden, Germany},
title = {Resilienz durch {Kooperationstechnologien}},
isbn = {978-3-658-19523-6},
url = {https://link.springer.com/chapter/10.1007/978-3-658-19523-6_22},
abstract = {Kooperationstechnologien spielen in sicherheitskritischen Systemen eine große Rolle, da in vielen Anwendungsfeldern nicht nur die Interaktion von Mensch und Computer, sondern auch die durch IT unterstützte Kooperation zwischen Menschen notwendig ist, um Aufgaben bewältigen zu können. Solche Technologien müssen verschiedene Anforderungen erfüllen und können ebenfalls zur Resilienz beitragen. Unter Resilienz durch Kooperation verstehen wir die Fähigkeit, Krisen durch die Anpassungsfähigkeit an geänderte Realitäten ohne nachhaltigen Schaden mithilfe von Kooperation zu überstehen. Während das Konzept der Resilienz in den Ingenieurwissenschaften vornehmlich die Verfügbarkeit technischer Systeme fokussiert, betrachten wir Resilienz als soziotechnisches Konstrukt, unter expliziter Betrachtung der beteiligten Akteure. Basierend auf Grundlagen zu Kooperationstechnologien zeigt unser Kapitel anhand von praktischen exemplarisch umgesetzten Kooperationstechnologien (soziales Netzwerk, GIS-System, Smartphone Apps, Facebook App und Social Media Analytics-Plattform), wie Kooperation unterstützt wird und zu kooperativer Resilienz beitragen kann.},
booktitle = {Sicherheitskritische {Mensch}-{Computer}-{Interaktion}: {Interaktive} {Technologien} und {Soziale} {Medien} im {Krisen}- und {Sicherheitsmanagement}},
publisher = {Springer Vieweg},
author = {Reuter, Christian and Ludwig, Thomas and Pipek, Volkmar},
editor = {Reuter, Christian},
year = {2018},
doi = {10.1007/978-3-658-19523-6_22},
keywords = {RSF, HCI, SocialMedia, Projekt-KontiKat, Infrastructure, Cooperation},
pages = {443--465},
}
[BibTeX] [Abstract] [Download PDF]
Die Nutzung sozialer Medien hat sich nicht nur im Alltag, sondern auch in vielen verschiedenen Notfällen, Krisen und Katastrophen etabliert. Dieser Prozess begann bereits vor über 15 Jahren nach den Terroranschlägen vom 11. September 2001. In den darauffolgenden Jahren, vor allem in den vergangenen zehn, wurden eine Vielzahl von Studien veröffentlicht, die sich auf den Gebrauch von Informations- und Kommunikations-technologien und sozialen Medien vor, während oder nach Notfällen konzentrieren. Dieser Forschungsbereich wird auch unter dem Begriff Crisis Informatics zusammengefasst. Das Ziel dieses Kapitels ist es, den Gebrauch von und die Forschung über soziale Medien in Katastrophen und Notfällen in den vergangenen 15 Jahren und mit besonderem Schwerpunkt auf identifizierbare Nutzungsmuster und der Wahrnehmung zusammenzufassen, um die bisherigen Ergebnisse und zukünftigen Potenziale herauszustellen.
@incollection{reuter_soziale_2018-1,
address = {Wiesbaden},
title = {Soziale {Medien} in {Notfällen}, {Krisen} und {Katastrophen}},
isbn = {978-3-658-19523-6},
url = {https://link.springer.com/chapter/10.1007/978-3-658-19523-6_19},
abstract = {Die Nutzung sozialer Medien hat sich nicht nur im Alltag, sondern auch in vielen verschiedenen Notfällen, Krisen und Katastrophen etabliert. Dieser Prozess begann bereits vor über 15 Jahren nach den Terroranschlägen vom 11. September 2001. In den darauffolgenden Jahren, vor allem in den vergangenen zehn, wurden eine Vielzahl von Studien veröffentlicht, die sich auf den Gebrauch von Informations- und Kommunikations-technologien und sozialen Medien vor, während oder nach Notfällen konzentrieren. Dieser Forschungsbereich wird auch unter dem Begriff Crisis Informatics zusammengefasst. Das Ziel dieses Kapitels ist es, den Gebrauch von und die Forschung über soziale Medien in Katastrophen und Notfällen in den vergangenen 15 Jahren und mit besonderem Schwerpunkt auf identifizierbare Nutzungsmuster und der Wahrnehmung zusammenzufassen, um die bisherigen Ergebnisse und zukünftigen Potenziale herauszustellen.},
booktitle = {Sicherheitskritische {Mensch}-{Computer}-{Interaktion}: {Interaktive} {Technologien} und {Soziale} {Medien} im {Krisen}- und {Sicherheitsmanagement}},
publisher = {Springer Vieweg},
author = {Reuter, Christian and Kaufhold, Marc-André},
editor = {Reuter, Christian},
year = {2018},
doi = {10.1007/978-3-658-19523-6_19},
keywords = {Crisis, HCI, SocialMedia, Projekt-KontiKat},
pages = {379--402},
}
[BibTeX] [Abstract] [Download PDF]
Die sicherheitskritische Mensch-Computer-Interaktion (MCI) ist eine interdisziplinäre Herausforderung und ein für die Informatik und die jeweiligen Anwendungsdomänen in der Bedeutung zunehmendes Thema. Dieses Kapitel bietet eine Einführung in das Lehr- und Fachbuch „Sicherheitskritische Mensch-Computer-Interaktion – Interaktive Technologien und Soziale Medien im Krisen- und Sicherheitsmanagement“. Als didaktisch aufbereiteter, umfassender Überblick über Grundlagen, Methoden und Anwendungsgebiete soll es sowohl als vorlesungsbegleitende Lektüre als auch als Nachschlagewerk für Wissenschaftler, Designer und Entwickler dienen. Dies adressierend werden interaktive, mobile, ubiquitäre und kooperative Technologien sowie soziale Medien vorgestellt. Hierbei finden klassische Themen wie benutzbare (IT-)Sicherheit, Industrie 4.0, Kata-strophenschutz, Medizin und Automobil, aber auch Augmented Reality, Crowdsourcing, Shitstorm Management, Social Media Analytics und Cyberwar ihren Platz. Methodisch wird das Spektrum von Usable Safety bis Usable Security Engineering von Analyse über Design bis Evaluation abgedeckt.
@incollection{reuter_sicherheitskritische_2018-1,
address = {Wiesbaden, Germany},
title = {Sicherheitskritische {Mensch}-{Computer}-{Interaktion} – {Einleitung} und Überblick},
isbn = {978-3-658-19523-6},
url = {https://link.springer.com/chapter/10.1007/978-3-658-19523-6_1},
abstract = {Die sicherheitskritische Mensch-Computer-Interaktion (MCI) ist eine interdisziplinäre Herausforderung und ein für die Informatik und die jeweiligen Anwendungsdomänen in der Bedeutung zunehmendes Thema. Dieses Kapitel bietet eine Einführung in das Lehr- und Fachbuch „Sicherheitskritische Mensch-Computer-Interaktion – Interaktive Technologien und Soziale Medien im Krisen- und Sicherheitsmanagement“. Als didaktisch aufbereiteter, umfassender Überblick über Grundlagen, Methoden und Anwendungsgebiete soll es sowohl als vorlesungsbegleitende Lektüre als auch als Nachschlagewerk für Wissenschaftler, Designer und Entwickler dienen. Dies adressierend werden interaktive, mobile, ubiquitäre und kooperative Technologien sowie soziale Medien vorgestellt. Hierbei finden klassische Themen wie benutzbare (IT-)Sicherheit, Industrie 4.0, Kata-strophenschutz, Medizin und Automobil, aber auch Augmented Reality, Crowdsourcing, Shitstorm Management, Social Media Analytics und Cyberwar ihren Platz. Methodisch wird das Spektrum von Usable Safety bis Usable Security Engineering von Analyse über Design bis Evaluation abgedeckt.},
booktitle = {Sicherheitskritische {Mensch}-{Computer}-{Interaktion}: {Interaktive} {Technologien} und {Soziale} {Medien} im {Krisen}- und {Sicherheitsmanagement}},
publisher = {Springer Vieweg},
author = {Reuter, Christian},
editor = {Reuter, Christian},
year = {2018},
doi = {10.1007/978-3-658-19523-6_1},
keywords = {UsableSec, Crisis, HCI, SocialMedia, Projekt-KontiKat},
pages = {3--14},
}
[BibTeX] [Download PDF]
@article{reuter_human-computer-interaction_2018,
title = {Human-{Computer}-{Interaction} and {Social} {Media} in {Safety}-{Critical} {Systems} – {Editorial}},
volume = {26},
url = {http://onlinelibrary.wiley.com/doi/10.1111/1468-5973.12192/abstract},
doi = {10.1111/1468-5973.12192},
number = {1},
journal = {Journal of Contingencies and Crisis Management (JCCM)},
author = {Reuter, Christian and Mentler, Tilo},
year = {2018},
keywords = {Crisis, HCI, Ranking-ImpactFactor, SocialMedia, Projekt-KontiKat, Projekt-EmerGent},
pages = {2--3},
}
[BibTeX] [Abstract] [Download PDF]
Online radicalisation is often linked to discourses on social media. In this context, the question arises how populist online discourses radicalise in social media platforms. With a quantitative content analysis of supporters of the German party “Alternative für Deutschland (AfD)” and their contributions on Facebook between March 2014 and May 2017, this preliminary analysis illustrates how the discourse shifts from a dominantly neutral debate to insult-driven and dis-criminatory contributions. It provides insights into the dynamic of political social media dis-courses and shows a tendency of correlating language style and topics that can be further studied in Social Media Analytics.
@inproceedings{riebe_conspiracies_2018,
address = {Dresden, Germany},
title = {From {Conspiracies} to {Insults}: {A} {Case} {Study} of {Radicalisation} in {Social} {Media} {Discourse}},
url = {https://dl.gi.de/bitstream/handle/20.500.12116/16795/Beitrag_449_final__a.pdf},
abstract = {Online radicalisation is often linked to discourses on social media. In this context, the question arises how populist online discourses radicalise in social media platforms. With a quantitative content analysis of supporters of the German party “Alternative für Deutschland (AfD)” and their contributions on Facebook between March 2014 and May 2017, this preliminary analysis illustrates how the discourse shifts from a dominantly neutral debate to insult-driven and dis-criminatory contributions. It provides insights into the dynamic of political social media dis-courses and shows a tendency of correlating language style and topics that can be further studied in Social Media Analytics.},
booktitle = {Mensch und {Computer} 2018 - {Workshopband}},
publisher = {Gesellschaft für Informatik e.V.},
author = {Riebe, Thea and Pätsch, Katja and Kaufhold, Marc-André and Reuter, Christian},
editor = {Dachselt, Raimund and Weber, Gerhard},
year = {2018},
keywords = {Peace, Student, Crisis, HCI, SocialMedia, Projekt-KontiKat, Projekt-CRISP},
pages = {595--603},
}
[BibTeX] [Abstract] [Download PDF]
Die Analyse sozialer Medien hat eine enorme Bedeutung für die verschiedensten Bereiche, wie bei-spielsweise die Lagebeurteilung, journalistische Recherchen oder unternehmerische Analysen. Dabei sind die entsprechenden Analysten unterschiedlichen Kontextfaktoren unterworfen. Sei es durch ihren organisationalen Hintergrund, durch tätigkeitsbezogene Rollen oder den geografischen und zeitlichen Rahmen. Um den ständig im Wandel begriffenen Kontexten gerecht zu werden, ergeben sich permanent neue Herausforderungen für die Anpassbarkeit der Analyse. Dieser Beitrag untersucht, wie ein auf Machine Lear-ning (ML) basierendes Tool zur Social Media Analyse (SMA) im Sinne des End-User Development (EUD) auf verschiedenen Komplexitäts- und Schrittebenen umgesetzt werden kann.
@inproceedings{scholl_socialml_2018,
address = {Dresden, Germany},
title = {{SocialML}: {EUD} im {Maschine} {Learning} zur {Analyse} sozialer {Medien}},
url = {https://dl.gi.de/bitstream/handle/20.500.12116/16668/Beitrag_347_final__a.pdf},
abstract = {Die Analyse sozialer Medien hat eine enorme Bedeutung für die verschiedensten Bereiche, wie bei-spielsweise die Lagebeurteilung, journalistische Recherchen oder unternehmerische Analysen. Dabei sind die entsprechenden Analysten unterschiedlichen Kontextfaktoren unterworfen. Sei es durch ihren organisationalen Hintergrund, durch tätigkeitsbezogene Rollen oder den geografischen und zeitlichen Rahmen. Um den ständig im Wandel begriffenen Kontexten gerecht zu werden, ergeben sich permanent neue Herausforderungen für die Anpassbarkeit der Analyse. Dieser Beitrag untersucht, wie ein auf Machine Lear-ning (ML) basierendes Tool zur Social Media Analyse (SMA) im Sinne des End-User Development (EUD) auf verschiedenen Komplexitäts- und Schrittebenen umgesetzt werden kann.},
booktitle = {Mensch und {Computer} - {Tagungsband}},
publisher = {Gesellschaft für Informatik e.V.},
author = {Scholl, Simon and Reuter, Christian and Ludwig, Thomas and Kaufhold, Marc-André},
year = {2018},
keywords = {Student, Crisis, HCI, SocialMedia, Projekt-KontiKat},
pages = {443--446},
}
2017
[BibTeX] [Abstract] [Download PDF]
The use of social media is not only part of everyday life but also of crises and emergencies. Many studies focus on the concrete use of social media during a specific emergency, but the prevalence of social media, data access and published research studies allows the examination in a broader and more integrated manner. This work-in-progress paper presents the results of a case study with the Fire Department Frankfurt, which is one of the biggest and most modern fire departments in Germany. The findings relate to social media technologies, organizational structure and roles, information validation, staff skills and resources, and the importance of volunteer communities. In the next step, the results will be integrated into the frame of a comparative case study with the overall aim of examining the impact of social media on how emergency services respond and react in an emergency.
@inproceedings{kaufhold_impact_2017,
address = {Albi, France},
title = {The {Impact} of {Social} {Media} for {Emergency} {Situations}: {A} {Case} {Study} with the {Fire} {Department} of {Frankfurt}},
url = {http://www.peasec.de/paper/2017/2017_KaufholdReuter_ImpactSocialMediaFrankfurt_ISCRAM.pdf},
abstract = {The use of social media is not only part of everyday life but also of crises and emergencies. Many studies focus on the concrete use of social media during a specific emergency, but the prevalence of social media, data access and published research studies allows the examination in a broader and more integrated manner. This work-in-progress paper presents the results of a case study with the Fire Department Frankfurt, which is one of the biggest and most modern fire departments in Germany. The findings relate to social media technologies, organizational structure and roles, information validation, staff skills and resources, and the importance of volunteer communities. In the next step, the results will be integrated into the frame of a comparative case study with the overall aim of examining the impact of social media on how emergency services respond and react in an emergency.},
booktitle = {Proceedings of the {Information} {Systems} for {Crisis} {Response} and {Management} ({ISCRAM})},
publisher = {ISCRAM},
author = {Kaufhold, Marc-André and Reuter, Christian},
editor = {Comes, Tina and Bénaben, Frédérick and Hanachi, Chihab and Lauras, Matthieu},
year = {2017},
keywords = {Crisis, HCI, SocialMedia, Projekt-KontiKat, Projekt-EmerGent},
pages = {603--612},
}
[BibTeX] [Abstract] [Download PDF]
Mit zunehmender Zahl an Nutzern sozialer Medien steigt auch die Menge produzierter Datenmengen, welche häufig unter dem Schlagwort Big Social Data diskutiert werden. Um Informationen aus diesen großen Datenmengen generieren zu können, existiert aktuell bereits eine Vielzahl verschiedener Systeme, welche sich des Data Minings bedienen, um die Analyse zu erleichtern. Je nachdem für welche Fragestellung diese Datenmengen herangezogen werden sollen, kommen verschiedene Systeme in Frage, die jeweils ihre Stärken und Schwächen haben. Innerhalb dieses Beitrages geben wir eine Übersicht aktueller Systeme zur Analyse sozialer Medien im Generellen sowie im speziellen Kontext des Krisenmanagements. Auf Basis verschiedener Attribute wie der Möglichkeit zur Kommunikation, des Setzens eines Alarms oder der Tonalität sowie einer darauf basierenden Marktanalyse werden die Systeme in die drei Klassen Intelligence-, Management- und spezialisierten Analysesysteme klassifiziert und im Hinblick auf ihre Eignung für die Analyse sozialer Medien kategorisiert.
@inproceedings{kaufhold_social_2017,
address = {Bonn},
title = {Social {Media} {Analytics}: {Eine} {Marktstudie} im {Krisenmanagement}},
url = {http://www.peasec.de/paper/2017/2017_KaufholdReuterLudwigScholl_SocialMediaAnalytcisMarktstudie_INF.pdf},
abstract = {Mit zunehmender Zahl an Nutzern sozialer Medien steigt auch die Menge produzierter Datenmengen, welche häufig unter dem Schlagwort Big Social Data diskutiert werden. Um Informationen aus diesen großen Datenmengen generieren zu können, existiert aktuell bereits eine Vielzahl verschiedener Systeme, welche sich des Data Minings bedienen, um die Analyse zu erleichtern. Je nachdem für welche Fragestellung diese Datenmengen herangezogen werden sollen, kommen verschiedene Systeme in Frage, die jeweils ihre Stärken und Schwächen haben. Innerhalb dieses Beitrages geben wir eine Übersicht aktueller Systeme zur Analyse sozialer Medien im Generellen sowie im speziellen Kontext des Krisenmanagements. Auf Basis verschiedener Attribute wie der Möglichkeit zur Kommunikation, des Setzens eines Alarms oder der Tonalität sowie einer darauf basierenden Marktanalyse werden die Systeme in die drei Klassen Intelligence-, Management- und spezialisierten Analysesysteme klassifiziert und im Hinblick auf ihre Eignung für die Analyse sozialer Medien kategorisiert.},
booktitle = {{INFORMATIK} 2017, {Lecture} {Notes} in {Informatics} ({LNI}), {Gesellschaft} für {Informatik}},
author = {Kaufhold, Marc-André and Reuter, Christian and Ludwig, Thomas and Scholl, Simon},
editor = {Eibl, Maximilian and Gaedke, Martin},
year = {2017},
keywords = {Student, Crisis, HCI, SocialMedia, Projekt-KontiKat, Ranking-CORE-C, Ranking-VHB-C},
pages = {1325--1338},
}
[BibTeX] [Abstract] [Download PDF]
Flow-Erleben beschreibt das „reflexionsfreie, gänzliche Aufgehen in einer glatt laufenden Tätigkeit, die man trotz hoher Beanspruchung noch unter Kontrolle hat“. Dabei zeigt die bestehende Literatur vielversprechende Effekte der Flow-Theorie auf, etwa positiver Affekt, verbessertes Lernen, Mitarbeiterproduktivität und Kundenloyalität, die einen Mehrwert in der Mensch-Computer-Interaktion und der Gestaltung interaktiver Systeme darstellen. Die Betrachtung der theoretischen Grundlagen zeigt, dass Flow ein komponentenreiches Konstrukt ist, welches kontextsensitiv erforscht werden muss: Die Beschaffenheit der gegenwärtigen Aufgabe und des interaktiven Systems, sowie demografische, individuelle und situative Faktoren beeinflussen das Flow-erleben. Zur Messung des Flow-erlebens wurden eine Reihe unterschiedlicher Messmethoden entwickelt, welche die gegenwärtige Erfahrung, etwa der FQ oder die esM, oder eine vergangene Erfahrung im Nachgang, etwa komponentenbasierte Fragebogen und qualitative Methoden, erfassen. In der Gestaltung interaktiver Systeme im Sinne der MCI wird einerseits die Betrachtung pragmatischer Qualitätskriterien (Effizienz, Durchschaubarkeit, Verlässlichkeit) der Usability und hedonistischer Qualitätskriterien (Attraktivität, Neuheit, Stimulation) der User Experience angestrebt. Andererseits untersucht ein separater Forschungsstrang die Relevanz der Flow-Theorie für die MCI. Während der Einfluss theoretischer Konstrukte des Flow-erlebens bereits deutlich untersucht wurde, fehlt die systematische Verknüpfung zu konkreten Designanforderungen zur Unterstützung des Flow-erlebens in interaktiven Systemen. Damit die Potenziale der Flow-Theorie in der Gestaltung interaktiver Systeme bestmöglich berücksichtigt werden können, sind vor allem vier Herausforderungen in der Forschung und Praxis zu adressieren: 1. Definition der theoretischen Kontextfaktoren: Wie kann die Flow-Theorie in der Mensch-Computer-Interaktion ganzheitlich bestimmt werden? 2. Operationalisierung der Flow-Theorie: Wie können Bedingungen, Erleben und Auswirkungen des Flow-erlebens genau und systematisch gemessen werden? 3. Integration in die Mensch-Computer-Interaktion: In welchem exakten Zusammenhang stehen die Konzepte Flow, Usability und User Experience? 4. Ableitung praktischer Designanforderungen: Wie können praktische Anforderungen zum Design des Flow-erlebens in interaktiven Systemen abgeleitet werden? Dieser Beitrag hat dazu die theoretischen Grundlagen des Flow-erlebens, bestehende Methoden und Metriken sowie verwandte Konzepte der MCI eingeleitet und diskutiert, um einerseits die systematische Erforschung der Flow-Theorie in der MCI und andererseits die Ableitung praktischer Design-Anforderungen zu motivieren.
@article{kaufhold_integration_2017,
title = {Integration von {Flow} in die {Mensch}- {Computer}-{Interaktion}? {Potenziale} für die {Gestaltung} interaktiver {Systeme}},
volume = {7},
url = {http://www.peasec.de/paper/2017/2017_KaufholdReuter_FlowMCI_MittelstandDigital.pdf},
abstract = {Flow-Erleben beschreibt das „reflexionsfreie, gänzliche Aufgehen in einer glatt laufenden Tätigkeit, die man trotz hoher Beanspruchung noch unter Kontrolle hat“. Dabei zeigt die bestehende Literatur vielversprechende Effekte der Flow-Theorie auf, etwa positiver Affekt, verbessertes Lernen, Mitarbeiterproduktivität und Kundenloyalität, die einen Mehrwert in der Mensch-Computer-Interaktion und der Gestaltung interaktiver Systeme darstellen. Die Betrachtung der theoretischen Grundlagen zeigt, dass Flow ein komponentenreiches Konstrukt ist, welches kontextsensitiv erforscht werden muss: Die Beschaffenheit der gegenwärtigen Aufgabe und des interaktiven Systems, sowie demografische, individuelle und situative Faktoren beeinflussen das Flow-erleben. Zur Messung des Flow-erlebens wurden eine Reihe unterschiedlicher Messmethoden entwickelt, welche die gegenwärtige Erfahrung, etwa der FQ oder die esM, oder eine vergangene Erfahrung im Nachgang, etwa komponentenbasierte Fragebogen und qualitative Methoden, erfassen. In der Gestaltung interaktiver Systeme im Sinne der MCI wird einerseits die Betrachtung pragmatischer Qualitätskriterien (Effizienz, Durchschaubarkeit, Verlässlichkeit) der Usability und hedonistischer Qualitätskriterien (Attraktivität, Neuheit, Stimulation) der User Experience angestrebt. Andererseits untersucht ein separater Forschungsstrang die Relevanz der Flow-Theorie für die MCI. Während der Einfluss theoretischer Konstrukte des Flow-erlebens bereits deutlich untersucht wurde, fehlt die systematische Verknüpfung zu konkreten Designanforderungen zur Unterstützung des Flow-erlebens in interaktiven Systemen. Damit die Potenziale der Flow-Theorie in der Gestaltung interaktiver Systeme bestmöglich berücksichtigt werden können, sind vor allem vier Herausforderungen in der Forschung und Praxis zu adressieren: 1. Definition der theoretischen Kontextfaktoren: Wie kann die Flow-Theorie in der Mensch-Computer-Interaktion ganzheitlich bestimmt werden? 2. Operationalisierung der Flow-Theorie: Wie können Bedingungen, Erleben und Auswirkungen des Flow-erlebens genau und systematisch gemessen werden? 3. Integration in die Mensch-Computer-Interaktion: In welchem exakten Zusammenhang stehen die Konzepte Flow, Usability und User Experience? 4. Ableitung praktischer Designanforderungen: Wie können praktische Anforderungen zum Design des Flow-erlebens in interaktiven Systemen abgeleitet werden? Dieser Beitrag hat dazu die theoretischen Grundlagen des Flow-erlebens, bestehende Methoden und Metriken sowie verwandte Konzepte der MCI eingeleitet und diskutiert, um einerseits die systematische Erforschung der Flow-Theorie in der MCI und andererseits die Ableitung praktischer Design-Anforderungen zu motivieren.},
number = {1},
journal = {Mittelstand-Digital "Wissenschaft trifft Praxis"},
author = {Kaufhold, Marc-André and Reuter, Christian},
year = {2017},
keywords = {HCI, Projekt-KontiKat},
pages = {78--88},
}
[BibTeX] [Abstract] [Download PDF]
Die Nutzung des Internets hat zu einem veränderten Kaufverhalten der Gesellschaft geführt, was wiederum Auswirkungen auf den stationären Einzelhandel hat. Da die Anzahl an Smartphone-Nutzern ebenfalls kontinuierlich steigt, werden mobile Anwendungen immer wichtiger. Durch den Einsatz von Bluetooth-Beacons – kleinen, beliebig platzierbaren Funksendern, dessen Signale von einer entsprechenden App verarbeitet werden können – kann der Einkauf sowohl erleichtert als auch erlebnisreicher gestaltet werden. Der Gebrauch von Beacons in Deutschland ist weniger verbreitet und erforscht. Pilotprojekte stützen sich lediglich auf Nutzungsdaten und Reaktionszeiten, jedoch nicht auf Kundenmeinungen. Diese Arbeit untersucht Nutzungsmöglichkeiten und Kundenakzeptanz von auf Beacons basierenden Konzepten im Einzelhandel mittels einer Online-Kundenumfrage.
@inproceedings{leopold_kundenakzeptanz_2017,
address = {Regensburg, Germany},
title = {Kundenakzeptanz von {Bluetooth}-{Beacons} im {Lebensmittelhandel}},
url = {http://www.peasec.de/paper/2017/2017_LeopoldReuter_BeaconLebensmittelhandel_MuC.pdf},
doi = {10.18420/muc2017-mci-0350},
abstract = {Die Nutzung des Internets hat zu einem veränderten Kaufverhalten der Gesellschaft geführt, was wiederum Auswirkungen auf den stationären Einzelhandel hat. Da die Anzahl an Smartphone-Nutzern ebenfalls kontinuierlich steigt, werden mobile Anwendungen immer wichtiger. Durch den Einsatz von Bluetooth-Beacons – kleinen, beliebig platzierbaren Funksendern, dessen Signale von einer entsprechenden App verarbeitet werden können – kann der Einkauf sowohl erleichtert als auch erlebnisreicher gestaltet werden. Der Gebrauch von Beacons in Deutschland ist weniger verbreitet und erforscht. Pilotprojekte stützen sich lediglich auf Nutzungsdaten und Reaktionszeiten, jedoch nicht auf Kundenmeinungen. Diese Arbeit untersucht Nutzungsmöglichkeiten und Kundenakzeptanz von auf Beacons basierenden Konzepten im Einzelhandel mittels einer Online-Kundenumfrage.},
booktitle = {Mensch und {Computer} - {Tagungsband}},
publisher = {Gesellschaft für Informatik e.V.},
author = {Leopold, Inken and Reuter, Christian},
editor = {Burghardt, M. and Wimmer, R. and Wolff, C. and Womser-Hacker, C.},
year = {2017},
keywords = {Student, HCI, Cooperation},
pages = {361--364},
}
[BibTeX] [Abstract] [Download PDF]
Abstract Although emergency services have already recognized the importance of citizen-initiated activities during disasters, still questions with regard to the coordination of spontaneous volunteers and their activities arise. Within our article, we will present a technological approach based on public displays which aims to foster situated crowdsourcing between affected citizens, spontaneous volunteers as well as official emergency services. We will address the research question: How can the situated tasks performed by spontaneous volunteers be supported by the use of public displays during disasters? First we will present the current state of the art with regard to the coordination practices of spontaneous volunteers and emergency services within disaster situations as well as related problems, potentials and specifics of situated crowdsourcing and public displays. To gain insight into actual coordination practices, we conducted an empirical study with 18 different stakeholders involved in disaster management. Based on the literature review and our empirical study, we have derived a technical concept that supports the task and activity management of spontaneous volunteers as well as the coordination both of the demands of affected people and the offers from spontaneous volunteers. We have implemented our concept as the public display application ‘City-Share‘, which provides a robust communication infrastructure and encompasses situated crowdsourcing mechanisms for managing offers and demands of activities on-the-ground. Based on its evaluation with several users, we will discuss our findings with regard to the assignment of tasks on-the-ground and situated crowdsourcing during emergencies. We outline that City-Share can improve a community’s disaster resilience, especially when focusing on the kind of collaborative resilience emerging between official stakeholders and spontaneous volunteers or affected citizens at a local level.
@article{ludwig_situated_2017,
title = {Situated crowdsourcing during disasters: {Managing} the tasks of spontaneous volunteers through public displays},
volume = {102},
url = {http://www.peasec.de/paper/2017/2017_Ludwigetal_SituatedCrowdsourcingPublicDisplay_IJHCS.pdf},
doi = {10.1016/j.ijhcs.2016.09.008},
abstract = {Abstract Although emergency services have already recognized the importance of citizen-initiated activities during disasters, still questions with regard to the coordination of spontaneous volunteers and their activities arise. Within our article, we will present a technological approach based on public displays which aims to foster situated crowdsourcing between affected citizens, spontaneous volunteers as well as official emergency services. We will address the research question: How can the situated tasks performed by spontaneous volunteers be supported by the use of public displays during disasters? First we will present the current state of the art with regard to the coordination practices of spontaneous volunteers and emergency services within disaster situations as well as related problems, potentials and specifics of situated crowdsourcing and public displays. To gain insight into actual coordination practices, we conducted an empirical study with 18 different stakeholders involved in disaster management. Based on the literature review and our empirical study, we have derived a technical concept that supports the task and activity management of spontaneous volunteers as well as the coordination both of the demands of affected people and the offers from spontaneous volunteers. We have implemented our concept as the public display application ‘City-Share', which provides a robust communication infrastructure and encompasses situated crowdsourcing mechanisms for managing offers and demands of activities on-the-ground. Based on its evaluation with several users, we will discuss our findings with regard to the assignment of tasks on-the-ground and situated crowdsourcing during emergencies. We outline that City-Share can improve a community's disaster resilience, especially when focusing on the kind of collaborative resilience emerging between official stakeholders and spontaneous volunteers or affected citizens at a local level.},
number = {C},
journal = {International Journal on Human-Computer Studies (IJHCS)},
author = {Ludwig, Thomas and Kotthaus, Christoph and Reuter, Christian and Dongen, Sören Van and Pipek, Volkmar},
year = {2017},
keywords = {Student, Crisis, HCI, A-Paper, Ranking-CORE-A, Ranking-ImpactFactor, Cooperation, Projekt-KOKOS, Ranking-WKWI-B},
pages = {103--121},
}
[BibTeX] [Abstract] [Download PDF]
In recent years, social media have increased the resources that individuals and organizations are able to mobilize for the development of socially innovative practices. In this article, we engage with a naturally occurring development in a Trentinian neighbourhood to examine the cooperative interactions amongst members of a local community. The first author and local residents of the neighbourhood participated in online discussions, decision making, and physical activities that led to material changes in the area. The interventions are motivated by and based on the concept of Social Street that combines online interactions in a closed Facebook group with face-to-face meetings seeking to practically engage the collective in accomplishing certain immediate or ongoing needs. Over the course of two years, we studied this local instantiation of Social Street in Trento, Italy by way of an action-oriented (digital) ethnography. Through this work, we demonstrate how urban neighbourhoods might benefit from hybrid forms of community engagement that are enacted through a constant back and forth between online and face-to-face interactions. We further argue that the infrastructuring of local urban collectives should follow strategies that pay attention to the multiple issues in urban neighbourhoods and people’s attachments to them. Overall, the paper reflects upon the challenges and configurations of participation that this form of community-work entails.
@article{mosconi_facebook_2017,
title = {From {Facebook} to the {Neighbourhood}: {Infrastructuring} of {Hybrid} {Community} {Engagement}},
volume = {26},
url = {https://link.springer.com/article/10.1007/s10606-017-9291-z},
doi = {10.1007/s10606-017-9291-z},
abstract = {In recent years, social media have increased the resources that individuals and organizations are able to mobilize for the development of socially innovative practices. In this article, we engage with a naturally occurring development in a Trentinian neighbourhood to examine the cooperative interactions amongst members of a local community. The first author and local residents of the neighbourhood participated in online discussions, decision making, and physical activities that led to material changes in the area. The interventions are motivated by and based on the concept of Social Street that combines online interactions in a closed Facebook group with face-to-face meetings seeking to practically engage the collective in accomplishing certain immediate or ongoing needs. Over the course of two years, we studied this local instantiation of Social Street in Trento, Italy by way of an action-oriented (digital) ethnography. Through this work, we demonstrate how urban neighbourhoods might benefit from hybrid forms of community engagement that are enacted through a constant back and forth between online and face-to-face interactions. We further argue that the infrastructuring of local urban collectives should follow strategies that pay attention to the multiple issues in urban neighbourhoods and people's attachments to them. Overall, the paper reflects upon the challenges and configurations of participation that this form of community-work entails.},
number = {4-6},
journal = {Computer Supported Cooperative Work: The Journal of Collaborative Computing (JCSCW)},
author = {Mosconi, Gaia and Korn, Matthias and Reuter, Christian and Tolmie, Peter and Teli, Maurizio and Pipek, Volkmar},
year = {2017},
keywords = {Crisis, HCI, A-Paper, Ranking-ImpactFactor, SocialMedia, Ranking-CORE-B, Projekt-KOKOS, Ranking-VHB-B},
pages = {959--1003},
}
[BibTeX] [Abstract] [Download PDF]
Infrastructure is undoubtedly a key resource for people engaged in technologically-mediated nomadicity. Tech-Nomads rely on technological infrastructure components, such as Wi-Fi availability, to mobilise their workplaces and effectively accomplish their productive activities. In this paper, we introduce findings from an investigation focusing on how technological infrastructures are re-instantiated according to emerging demands. We focus particularly on the European Social Forum (ESF) (an activists‘ platform) and the problems faced by the members of this network in mobilising its infrastructure, stressing findings from the literature about the importanceof making infrastructure visible for nomadic practices, which have not yet been sufficiently explored. We suggest that infrastructure (re-) design methods would be a relevant resource for Tech-Nomads engaged in activities such as the ones from ESF
@inproceedings{pinatti_de_carvalho_role_2017,
address = {Sheffield, UK},
title = {The {Role} of {Technological} {Infrastructure} in {Nomadic} {Practices} of a {Social} {Activist} {Community}},
url = {https://www.iisi.de/wp-content/uploads/2018/07/6_decarvalho-et-al_v14_n3.pdf},
abstract = {Infrastructure is undoubtedly a key resource for people engaged in technologically-mediated nomadicity. Tech-Nomads rely on technological infrastructure components, such as Wi-Fi availability, to mobilise their workplaces and effectively accomplish their productive activities. In this paper, we introduce findings from an investigation focusing on how technological infrastructures are re-instantiated according to emerging demands. We focus particularly on the European Social Forum (ESF) (an activists' platform) and the problems faced by the members of this network in mobilising its infrastructure, stressing findings from the literature about the importanceof making infrastructure visible for nomadic practices, which have not yet been sufficiently explored. We suggest that infrastructure (re-) design methods would be a relevant resource for Tech-Nomads engaged in activities such as the ones from ESF},
booktitle = {Proceedings of the {ECSCW}-{Workshop} on {Nomadic} {Culture} {Beyond} {Work} {Practices}, {International} {Reports} on {Socio}-{Informatics} ({IRSI})},
author = {Pinatti de Carvalho, Aparecido Fabiano and Saeed, Saqib and Reuter, Christian and Wulf, Volker},
year = {2017},
keywords = {Peace, HCI, Infrastructure, Ranking-WKWI-C},
pages = {41--47},
}
[BibTeX] [Abstract] [Download PDF]
Der demographische Wandel und die Urbanisierung können als die Megatrends der kommenden Jahre betrachten werden, wodurch sich neue Herausforderungen und Chancen für Städte ergeben. Gerade im Kontext von Katastrophen und Gefahren benötigt das System Stadt resiliente Ansätze, die mittels neuer Technologien gewährleistet werden können. Da IKT zeitnahe, kontextspezifische und persönliche Informationen ortsunabhängig liefern können, ist diese Entwicklung von hoher Relevanz für die Sicherstellung des Systems Stadt und dessen Bewohner. Im Kontext von Katastrophen und Gefahren weisen ältere Menschen aufgrund ihrer eingeschränkten physischen, sozialen und ökonomischen Fähigkeiten jedoch eine erhöhte Vulnerabilität auf. Diese Arbeit möchte, dies adressierend, einen Beitrag zur Integration der älteren Bevölkerung bei Schadenslagen darstellen und ein Konzept vorstellen.
@inproceedings{reuter_divoa_2017,
address = {Regensburg, Germany},
title = {{DIVOA} – {Unterstützung} der älteren {Bevölkerung} bei {Schadenslagen}},
url = {https://dl.gi.de/bitstream/handle/20.500.12116/3279/2017_MCI_352.pdf},
doi = {10.18420/muc2017-mci-0352},
abstract = {Der demographische Wandel und die Urbanisierung können als die Megatrends der kommenden Jahre betrachten werden, wodurch sich neue Herausforderungen und Chancen für Städte ergeben. Gerade im Kontext von Katastrophen und Gefahren benötigt das System Stadt resiliente Ansätze, die mittels neuer Technologien gewährleistet werden können. Da IKT zeitnahe, kontextspezifische und persönliche Informationen ortsunabhängig liefern können, ist diese Entwicklung von hoher Relevanz für die Sicherstellung des Systems Stadt und dessen Bewohner. Im Kontext von Katastrophen und Gefahren weisen ältere Menschen aufgrund ihrer eingeschränkten physischen, sozialen und ökonomischen Fähigkeiten jedoch eine erhöhte Vulnerabilität auf. Diese Arbeit möchte, dies adressierend, einen Beitrag zur Integration der älteren Bevölkerung bei Schadenslagen darstellen und ein Konzept vorstellen.},
booktitle = {Mensch und {Computer} - {Tagungsband}},
publisher = {Gesellschaft für Informatik e.V.},
author = {Reuter, Christian and Wiegärtner, Daniel and Müller, Claudia},
editor = {Burghardt, M. and Wimmer, R. and Wolff, C. and Womser-Hacker, C.},
year = {2017},
keywords = {Student, Crisis, HCI, Projekt-KontiKat},
pages = {295--298},
}
[BibTeX] [Abstract] [Download PDF]
The Internet and especially social media are not only used for supposedly good purposes. For example, the recruitment of new members and the dissemination of ideologies of terrorism also takes place in the media. However, the fight against terrorism also makes use of the same tools. The type of these countermeasures, as well as the methods, are covered in this work. In the first part, the state of the art is summarized. The second part presents an explorative empirical study of the fight against terrorism in social media, especially on Twitter. Different, preferably characteristic forms are structured within the scope with the example of Twitter. The aim of this work is to approach this highly relevant subject with the goal of peace, safety and safety from the perspective of information systems. Moreover, it should serve following researches in this field as basis and starting point.
@article{reuter_it_2017,
title = {{IT} for {Peace}? {Fighting} {Against} {Terrorism} in {Social} {Media} – {An} {Explorative} {Twitter} {Study}},
volume = {16},
url = {http://www.peasec.de/paper/2017/2017_ReuterPaetschRunft_ITforPeaceTerrorismSocialMedia_ICOM.pdf},
doi = {10.1515/icom-2017-0013},
abstract = {The Internet and especially social media are not only used for supposedly good purposes. For example, the recruitment of new members and the dissemination of ideologies of terrorism also takes place in the media. However, the fight against terrorism also makes use of the same tools. The type of these countermeasures, as well as the methods, are covered in this work. In the first part, the state of the art is summarized. The second part presents an explorative empirical study of the fight against terrorism in social media, especially on Twitter. Different, preferably characteristic forms are structured within the scope with the example of Twitter. The aim of this work is to approach this highly relevant subject with the goal of peace, safety and safety from the perspective of information systems. Moreover, it should serve following researches in this field as basis and starting point.},
number = {2},
journal = {i-com - Journal of Interactive Media},
author = {Reuter, Christian and Pätsch, Katja and Runft, Elena},
year = {2017},
keywords = {Peace, Student, Crisis, HCI, SocialMedia, Projekt-KontiKat, Projekt-EmerGent},
pages = {181--195},
}
[BibTeX] [Abstract] [Download PDF]
Catastrophes like the storms in Europe in spring 2016, but also terrorist attacks regularly not only lead to extensive monetary damage but also threaten human lives. In such situations, the population desires information about the status of damage and safe behaviours. Apps can address this potentially, but comparatively, record a low number of users. Based on Reuter et al. (2017), this article shows the importance of information in disaster situations and illustrates features from current mobile warning apps.
@incollection{reuter_informing_2017,
address = {Wilhelmshaven},
title = {Informing the {Population}: {Mobile} {Warning} {Apps}},
isbn = {978-3-7450-5448-4},
url = {https://peasec.de/paper/2017/2017_ReuterKaufholdLeopoldKnipp_InformingthePopulation.pdf},
abstract = {Catastrophes like the storms in Europe in spring 2016, but also terrorist attacks regularly not only lead to extensive monetary damage but also threaten human lives. In such situations, the population desires information about the status of damage and safe behaviours. Apps can address this potentially, but comparatively, record a low number of users. Based on Reuter et al. (2017), this article shows the importance of information in disaster situations and illustrates features from current mobile warning apps.},
booktitle = {Risk and {Crisis} {Communication} in {Disaster} {Prevention} and {Management}},
publisher = {epubli},
author = {Reuter, Christian and Kaufhold, Marc-André and Leopold, Inken and Knipp, Hannah},
editor = {Klafft, Michael},
year = {2017},
keywords = {Peace, Student, Crisis, HCI, Projekt-KontiKat},
pages = {31--41},
}
[BibTeX] [Abstract] [Download PDF]
Social media and instant messaging services are nowadays considered as important communication infrastructures on which people rely on. However, the exchange of content during breakdowns of the underlying technical infrastructures, which sometimes happens based on environmental occurrences, is challenging. Hence, with this paper, we examine the resilience of social media during breakdowns. We discuss communication options and examine ad-hoc functionality for the exchange of social media data between different actors in such cases. To address this, we have developed a concept, which makes use of mobile ad-hoc networks (MANETs) for the spontaneous exchange of information with smartphones. We implemented our concept as the mobile application Social Offline Map (SOMAP) and evaluated it within two iterations (1.0 and 2.0). Finally, we discuss our contribution within the context of related work and the limitations of our approach.
@inproceedings{reuter_social_2017,
address = {Berlin, Germany},
title = {Social {Media} {Resilience} during {Infrastructure} {Breakdowns} using {Mobile} {Ad}-{Hoc} {Networks}},
url = {http://www.wineme.uni-siegen.de/paper/2017/2017_Reuteretal_SocialMediaResilienceMANET_EnviroInfo.pdf},
doi = {10.1007/978-3-319-44711-7_7},
abstract = {Social media and instant messaging services are nowadays considered as important communication infrastructures on which people rely on. However, the exchange of content during breakdowns of the underlying technical infrastructures, which sometimes happens based on environmental occurrences, is challenging. Hence, with this paper, we examine the resilience of social media during breakdowns. We discuss communication options and examine ad-hoc functionality for the exchange of social media data between different actors in such cases. To address this, we have developed a concept, which makes use of mobile ad-hoc networks (MANETs) for the spontaneous exchange of information with smartphones. We implemented our concept as the mobile application Social Offline Map (SOMAP) and evaluated it within two iterations (1.0 and 2.0). Finally, we discuss our contribution within the context of related work and the limitations of our approach.},
booktitle = {Advances and {New} {Trends} in {Environmental} {Informatics} - {Proceedings} of the 30th {EnviroInfo} {Conference}},
publisher = {Springer},
author = {Reuter, Christian and Ludwig, Thomas and Kaufhold, Marc-André and Hupertz, Julian},
editor = {Wohlgemuth, V. and Fuchs-Kittowski, Frank and Wittmann, Jochen},
year = {2017},
keywords = {RSF, Security, Crisis, HCI, SocialMedia, Infrastructure, Projekt-EmerGent, Projekt-KOKOS},
pages = {75--88},
}
[BibTeX] [Abstract] [Download PDF]
Social media is increasingly being used during emergencies. Most available studies are focused on how citizens and/or authorities use these technologies in concrete events. However, larger quantitative studies with significant results on attitudes, needs and future plans of citizens in such events are not available – especially such of a comparative nature related to emergency services. As part of the EU project ‘EmerGent‘ this article presents the findings of a survey of 1034 citizens across 30 European countries conducted between February and June 2015 to explore citizens‘ attitudes towards the use of social media for private purposes and in emergency situations. The article briefly compares these findings with a second survey conducted with 761 emergency service staff across 32 European countries from September to December 2014. The aim of the overall study is to discuss citizens‘ attitudes towards social media in emergencies in order to derive challenges and opportunities for social resilience.
@article{reuter_towards_2017,
title = {Towards {Social} {Resilience}: {A} {Quantitative} and {Qualitative} {Survey} on {Citizens}' {Perception} of {Social} {Media} in {Emergencies} in {Europe}},
volume = {121},
url = {http://www.sciencedirect.com/science/article/pii/S0040162516301986},
doi = {10.1016/j.techfore.2016.07.038},
abstract = {Social media is increasingly being used during emergencies. Most available studies are focused on how citizens and/or authorities use these technologies in concrete events. However, larger quantitative studies with significant results on attitudes, needs and future plans of citizens in such events are not available - especially such of a comparative nature related to emergency services. As part of the EU project ‘EmerGent' this article presents the findings of a survey of 1034 citizens across 30 European countries conducted between February and June 2015 to explore citizens' attitudes towards the use of social media for private purposes and in emergency situations. The article briefly compares these findings with a second survey conducted with 761 emergency service staff across 32 European countries from September to December 2014. The aim of the overall study is to discuss citizens' attitudes towards social media in emergencies in order to derive challenges and opportunities for social resilience.},
journal = {Journal Technological Forecasting and Social Change (TFSC)},
author = {Reuter, Christian and Spielhofer, Thomas},
year = {2017},
keywords = {RSF, Crisis, HCI, A-Paper, Ranking-ImpactFactor, SocialMedia, Projekt-EmerGent, Ranking-VHB-B},
pages = {168--180},
}
[BibTeX] [Abstract] [Download PDF]
The amount of data being available is increasing rapidly. Based on the technological advances with mobile and ubiquitous computing, the use of social media is getting more and more usual in daily life as well as in extraordinary situations, such as crises. Not surprisingly, this increasing use is one reason why data on the internet is also developing that fast. Currently, more than 3 billion people use the internet and the majority is also registered with social media services such as Facebook or Twitter. While processing this kind of data by the majority of non-technical users, concepts of End-User Development (EUD) are important. This chapter researches how concepts of EUD might be applied to handle social big data. Based on foundations and an empirical pre-study, we explore how EUD can support the gathering and assessment process of social media. In this context, we investigate how end-users can articulate their personal quality criteria appropriately and how the selection of relevant data can be supported by EUD approaches. We present a tailorable social media gathering service and quality assessment service for social media content, which has been implemented and integrated into an application for both volunteers and the emergency services.
@incollection{reuter_end-user_2017,
title = {End-{User} {Development} and {Social} {Big} {Data} - {Towards} {Tailorable} {Situation} {Assessment} with {Social} {Media}},
isbn = {978-3-319-60290-5},
url = {https://link.springer.com/chapter/10.1007/978-3-319-60291-2_12},
abstract = {The amount of data being available is increasing rapidly. Based on the technological advances with mobile and ubiquitous computing, the use of social media is getting more and more usual in daily life as well as in extraordinary situations, such as crises. Not surprisingly, this increasing use is one reason why data on the internet is also developing that fast. Currently, more than 3 billion people use the internet and the majority is also registered with social media services such as Facebook or Twitter. While processing this kind of data by the majority of non-technical users, concepts of End-User Development (EUD) are important. This chapter researches how concepts of EUD might be applied to handle social big data. Based on foundations and an empirical pre-study, we explore how EUD can support the gathering and assessment process of social media. In this context, we investigate how end-users can articulate their personal quality criteria appropriately and how the selection of relevant data can be supported by EUD approaches. We present a tailorable social media gathering service and quality assessment service for social media content, which has been implemented and integrated into an application for both volunteers and the emergency services.},
booktitle = {New {Perspectives} in {End}-{User} {Development}},
publisher = {Springer},
author = {Reuter, Christian and Kaufhold, Marc-André and Ludwig, Thomas},
editor = {Paternò, Fabio and Wulf, Volker},
year = {2017},
doi = {10.1007/978-3-319-60291-2_12},
keywords = {Crisis, HCI, SocialMedia, Projekt-EmerGent, Projekt-KOKOS},
pages = {307--332},
}
[BibTeX] [Abstract] [Download PDF]
The use of social media is gaining more and more in importance in ordinary life but also in conflicts and emergencies. The social big data, generated by users, is partially also used as a source for situation assessment, e.g. to receive pictures or to assess the general mood. However, the information’s believability is hard to control and can deceive. Rumors, fake news and social bots are phenomenons that challenge the easy consumption of social media. To address this, our paper explores the believability of content in social media. Based on foundations of information quality we conducted a literature study to derive a three-level model for assessing believability. It summarizes existing assessment approaches, assessment criteria and related measures. On this basis, we describe several steps towards the development of an assessment approach that works across different types of social media.
@inproceedings{reuter_rumors_2017,
address = {Albi, France},
title = {Rumors, {Fake} {News} and {Social} {Bots} in {Conflicts} and {Emergencies}: {Towards} a {Model} for {Believability} in {Social} {Media}},
url = {http://www.peasec.de/paper/2017/2017_ReuterKaufholdSteinfort_RumorsFakeNewsBotsBelievability_ISCRAM.pdf},
abstract = {The use of social media is gaining more and more in importance in ordinary life but also in conflicts and emergencies. The social big data, generated by users, is partially also used as a source for situation assessment, e.g. to receive pictures or to assess the general mood. However, the information's believability is hard to control and can deceive. Rumors, fake news and social bots are phenomenons that challenge the easy consumption of social media. To address this, our paper explores the believability of content in social media. Based on foundations of information quality we conducted a literature study to derive a three-level model for assessing believability. It summarizes existing assessment approaches, assessment criteria and related measures. On this basis, we describe several steps towards the development of an assessment approach that works across different types of social media.},
booktitle = {Proceedings of the {Information} {Systems} for {Crisis} {Response} and {Management} ({ISCRAM})},
publisher = {ISCRAM},
author = {Reuter, Christian and Kaufhold, Marc-André and Steinfort, René},
editor = {Comes, Tina and Bénaben, Frédérick and Hanachi, Chihab and Lauras, Matthieu},
year = {2017},
keywords = {Peace, Student, Crisis, HCI, SocialMedia, Projekt-KontiKat},
pages = {583--591},
}
[BibTeX] [Abstract] [Download PDF]
Crises, such as thunderstorms and an increasing number of (recognised) terroristic attacks in 2015, 2016, and 2017, do not only lead to extensive monetary damage, but also threaten human lives and influence citizens‘ perceptions of safety and security. In such situations, the population demands information about the damage and safe behaviour. Although some apps are available to provide this information, the number of users seems relatively low. Focussing on Germany, this study aims to research (1) the distribution of crisis apps in the population, (2) the kinds of crisis apps currently used, as well as (3) needed core functionalities of warning apps. This multi-method study analyses crisis apps by investigating their utilisation quantitatively in a snowball-based survey in Europe (n=1,034) and in a representative survey in Germany (n=1,369). Based on this, the German warning apps Katwarn and NINA and the US-American app FEMA are evaluated qualitatively (n=22). The results revealed requirements which informed the implementation of a warning app prototype. The prototype combines the identified advantages of the apps evaluated in the study, containing warnings and all-clear, recommendations for action, functions to contact friends and helpers. The contributions of this work are findings on the distribution of crisis apps in Europe and Germany (both 16\%), the kinds of crisis apps used (mostly weather and warning apps), and empirically based requirements for warning apps which can be integrated in further developments of existing apps and a prototype for such an app.
@inproceedings{reuter_katwarn_2017,
address = {Guimarães, Portugal},
title = {Katwarn, {NINA} or {FEMA}? {Multi}-{Method} {Study} on {Distribution}, {Use} and {Public} {Views} on {Crisis} {Apps}},
url = {http://www.peasec.de/paper/2017/2017_ReuterKaufholdLeopoldKnipp_CrisisApps_ECIS.pdf},
abstract = {Crises, such as thunderstorms and an increasing number of (recognised) terroristic attacks in 2015, 2016, and 2017, do not only lead to extensive monetary damage, but also threaten human lives and influence citizens' perceptions of safety and security. In such situations, the population demands information about the damage and safe behaviour. Although some apps are available to provide this information, the number of users seems relatively low. Focussing on Germany, this study aims to research (1) the distribution of crisis apps in the population, (2) the kinds of crisis apps currently used, as well as (3) needed core functionalities of warning apps. This multi-method study analyses crisis apps by investigating their utilisation quantitatively in a snowball-based survey in Europe (n=1,034) and in a representative survey in Germany (n=1,369). Based on this, the German warning apps Katwarn and NINA and the US-American app FEMA are evaluated qualitatively (n=22). The results revealed requirements which informed the implementation of a warning app prototype. The prototype combines the identified advantages of the apps evaluated in the study, containing warnings and all-clear, recommendations for action, functions to contact friends and helpers. The contributions of this work are findings on the distribution of crisis apps in Europe and Germany (both 16\%), the kinds of crisis apps used (mostly weather and warning apps), and empirically based requirements for warning apps which can be integrated in further developments of existing apps and a prototype for such an app.},
booktitle = {European {Conference} on {Information} {Systems} ({ECIS})},
publisher = {AIS},
author = {Reuter, Christian and Kaufhold, Marc-André and Leopold, Inken and Knipp, Hannah},
year = {2017},
keywords = {Peace, Student, Crisis, HCI, A-Paper, Ranking-CORE-A, Projekt-KontiKat, Projekt-EmerGent, Ranking-VHB-B, Ranking-WKWI-A},
pages = {2187--2201},
}
[BibTeX] [Abstract] [Download PDF]
Das Thema Sicherheit durchzieht sowohl das Leben Einzelner als auch das Zusammenleben von Personenkollektiven. In diesem Heft geht es um das Wahrnehmen und Wertschätzen sowie die Stabilisierung von Situationen, in denen Gefahren und Risiken reduziert werden. Außerdem stehen die Instrumentarien, Methoden und Maßnahmen im Fokus, mit denen Sicherheit geschaffen werden soll. Besonders in komplexen Systemen wird Sicherheit zu einem schwierig zu fassenden Thema, zu dessen Begleiterscheinungen beispielsweise die Beschneidung von Freiheit zählt. Sicherheit wird in allen Lebensgebieten relevant – von der Politik, Gesellschaft, Wirtschaft und Recht über die Arbeitswelt bis hin in Medien, Technologie, Ökologie und Medizin. Zudem ist der Umgang mit Sicherheit landeskulturell geprägt.
@incollection{reuter_digitalisierung_2017,
address = {Göttingen},
title = {Digitalisierung und {Zivile} {Sicherheit}: {Zivilgesellschaftliche} und betriebliche {Kontinuität} in {Katastrophenlagen} ({KontiKat})},
isbn = {978-3-8471-0739-2},
url = {http://www.peasec.de/paper/2017/2017_ReuterKaufholdSchorchetal_DigitalisierungSicherheitKontiKat_Diagonal.pdf},
abstract = {Das Thema Sicherheit durchzieht sowohl das Leben Einzelner als auch das Zusammenleben von Personenkollektiven. In diesem Heft geht es um das Wahrnehmen und Wertschätzen sowie die Stabilisierung von Situationen, in denen Gefahren und Risiken reduziert werden. Außerdem stehen die Instrumentarien, Methoden und Maßnahmen im Fokus, mit denen Sicherheit geschaffen werden soll. Besonders in komplexen Systemen wird Sicherheit zu einem schwierig zu fassenden Thema, zu dessen Begleiterscheinungen beispielsweise die Beschneidung von Freiheit zählt. Sicherheit wird in allen Lebensgebieten relevant – von der Politik, Gesellschaft, Wirtschaft und Recht über die Arbeitswelt bis hin in Medien, Technologie, Ökologie und Medizin. Zudem ist der Umgang mit Sicherheit landeskulturell geprägt.},
booktitle = {Sicherheit ({DIAGONAL} {Jahrgang} 38)},
publisher = {Vandenhoeck \& Ruprecht},
author = {Reuter, Christian and Kaufhold, Marc-André and Schorch, Marén and Gerwinski, Jan and Soost, Christian and Hassan, Sohaib S. and Rusch, Gebhard and Moog, Petra and Pipek, Volkmar and Wulf, Volker},
editor = {Hoch, Gero and Schröteler von Brandt, Hildegard and Stein, Volker and Schwarz, Angela},
year = {2017},
doi = {10.14220/digo.2017.38.1.207},
keywords = {RSF, UsableSec, Crisis, HCI, SocialMedia, Projekt-KontiKat, Infrastructure, Cooperation},
pages = {207--224},
}
[BibTeX] [Abstract] [Download PDF]
The value of social media in crises, disasters, and emergencies across different events (e.g. floods, storms, terroristic attacks), countries, and for heterogeneous participants (e.g. citizens, emergency services) is now well-attested. Existing work has examined the potentials and weaknesses of its use during specific events. Fewer studies, however, have focused on citizens‘ perceptions of social media in emergencies, and none have deployed a representative sample to examine this. We present the results of the first representative study on citizens‘ perception of social media in emergencies that we have conducted in Germany. Our study highlights, for example, that around half (45\%) of people have used social media during an emergency to share and / or look for information. In contrast, false rumours on social media (74\%) are perceived as a threat. Moreover, only a minority of people have downloaded a smartphone app for emergencies (16\%), with the most popular ones‘ weather and first aid apps.
@article{reuter_social_2017-1,
title = {Social {Media} in {Emergencies}: {A} {Representative} {Study} on {Citizens}' {Perception} in {Germany}},
volume = {1},
url = {http://www.peasec.de/paper/2017/2017_ReuterKaufholdSpielhoferHahne_SocialMediaEmergenciesGermany_CSCW.pdf},
doi = {10.1145/3134725},
abstract = {The value of social media in crises, disasters, and emergencies across different events (e.g. floods, storms, terroristic attacks), countries, and for heterogeneous participants (e.g. citizens, emergency services) is now well-attested. Existing work has examined the potentials and weaknesses of its use during specific events. Fewer studies, however, have focused on citizens' perceptions of social media in emergencies, and none have deployed a representative sample to examine this. We present the results of the first representative study on citizens' perception of social media in emergencies that we have conducted in Germany. Our study highlights, for example, that around half (45\%) of people have used social media during an emergency to share and / or look for information. In contrast, false rumours on social media (74\%) are perceived as a threat. Moreover, only a minority of people have downloaded a smartphone app for emergencies (16\%), with the most popular ones' weather and first aid apps.},
number = {2},
journal = {Proceedings of the ACM: Human Computer Interaction (PACM): Computer-Supported Cooperative Work and Social Computing},
author = {Reuter, Christian and Kaufhold, Marc-André and Spielhofer, Thomas and Hahne, Anna Sophie},
year = {2017},
note = {Place: New York, USA},
keywords = {Crisis, HCI, A-Paper, Ranking-CORE-A, SocialMedia, Projekt-KontiKat, Projekt-EmerGent, Ranking-WKWI-B},
pages = {1--19},
}
[BibTeX] [Abstract] [Download PDF]
Obwohl Usability und Sicherheit beides relevante Anforderungen für Anwendungssysteme sind, stehen sie in einem Spannungsfeld. Sicherheit kann als Schutz vor Angriffen von außen (Security), aber auch für das sichere Funktionieren (Safety) dieser Anwendungssysteme verstanden werden. Durch die immer größere Vernetzung klassischer Safety-Domänen, wie dem Katastrophenschutz, gewinnen Security-Aspekte dort ebenfalls an Bedeutung. Die Übertragung von kritischen und vertraulichen Informationen auf mobile Endgeräte muss zugleich passwortgeschützt als auch schnell verfügbar sein; zeitintensive Authentifizierungsmechanismen können hier stören. In dieser Studie werden die Nutzung von Passwörtern vor dem Hintergrund der Abwägung von Sicherheit und Usability exploriert und Hypothesen zum Umgang mit Passwörtern aufgestellt, die im Kontext der Digitalisierung in der zivilen Sicherheit sowie mobilen und ubiquitären Geräte im Katastrophenschutz an enormer Bedeutung gewinnen.
@inproceedings{reuter_benutzbare_2017,
address = {Regensburg, Germany},
title = {Benutzbare {Sicherheit}: {Usability}, {Safety} und {Security} bei {Passwörtern}},
url = {https://dl.gi.de/bitstream/handle/20.500.12116/3214/2017_WS01_384.pdf?sequence=1&isAllowed=y},
doi = {10.18420/muc2017-ws01-0384},
abstract = {Obwohl Usability und Sicherheit beides relevante Anforderungen für Anwendungssysteme sind, stehen sie in einem Spannungsfeld. Sicherheit kann als Schutz vor Angriffen von außen (Security), aber auch für das sichere Funktionieren (Safety) dieser Anwendungssysteme verstanden werden. Durch die immer größere Vernetzung klassischer Safety-Domänen, wie dem Katastrophenschutz, gewinnen Security-Aspekte dort ebenfalls an Bedeutung. Die Übertragung von kritischen und vertraulichen Informationen auf mobile Endgeräte muss zugleich passwortgeschützt als auch schnell verfügbar sein; zeitintensive Authentifizierungsmechanismen können hier stören. In dieser Studie werden die Nutzung von Passwörtern vor dem Hintergrund der Abwägung von Sicherheit und Usability exploriert und Hypothesen zum Umgang mit Passwörtern aufgestellt, die im Kontext der Digitalisierung in der zivilen Sicherheit sowie mobilen und ubiquitären Geräte im Katastrophenschutz an enormer Bedeutung gewinnen.},
booktitle = {Mensch und {Computer} 2017 - {Workshopband}},
publisher = {Gesellschaft für Informatik e.V.},
author = {Reuter, Christian and Kaufhold, Marc-André and Klös, Jonas},
editor = {Burghardt, M. and Wimmer, R. and Wolff, C. and Womser-Hacker, C.},
year = {2017},
keywords = {Student, Security, UsableSec, HCI, Projekt-CROSSING, Projekt-KontiKat, Projekt-CRISP},
pages = {33--41},
}
[BibTeX] [Abstract] [Download PDF]
Die Interaktion und Kooperation zwischen Mensch und Computer in sicherheitskritischen Systemen ist eine interdisziplinäre Herausforderung und Gestaltungsaufgabe. Sicherheitskritische Anwendungsfelder sind vielfältig und umfassen verschiedene Branchen und Bereiche, beispielsweise Produktion, Medizin, Katastrophenschutz oder Verkehr. Neben stationären Rechnern und Maschinen haben mobile Kontexte und Endgeräte sowie soziale Medien bereits seit einigen Jahren an Bedeutung enorm zugenommen. Die spezifischen Herausforderungen der MCI in solchen sicherheitskritischen Kontexten bedürfen einer Diskussion in Bezug auf die Entwicklung bzw. Adaption von Methoden und Prozessen, aber auch auf Ergebnisse der Systementwicklung. Diese gilt es im Rahmen des Workshops zu adressieren, jedoch weniger im Hinblick auf die isolierten Technologien, sondern mit deutliche r Fokussierung auf das Zusammenwirken von Mensch, Technik und Organisation.
@inproceedings{reuter_4_2017,
address = {Regensburg, Germany},
title = {4. {Workshop} {Mensch}-{Maschine}-{Interaktion} in sicherheitskritischen {Systemen}},
url = {https://dl.gi.de/bitstream/handle/20.500.12116/3170/2017_WS01_380.pdf},
doi = {10.18420/muc2017-ws01-0380},
abstract = {Die Interaktion und Kooperation zwischen Mensch und Computer in sicherheitskritischen Systemen ist eine interdisziplinäre Herausforderung und Gestaltungsaufgabe. Sicherheitskritische Anwendungsfelder sind vielfältig und umfassen verschiedene Branchen und Bereiche, beispielsweise Produktion, Medizin, Katastrophenschutz oder Verkehr. Neben stationären Rechnern und Maschinen haben mobile Kontexte und Endgeräte sowie soziale Medien bereits seit einigen Jahren an Bedeutung enorm zugenommen. Die spezifischen Herausforderungen der MCI in solchen sicherheitskritischen Kontexten bedürfen einer Diskussion in Bezug auf die Entwicklung bzw. Adaption von Methoden und Prozessen, aber auch auf Ergebnisse der Systementwicklung. Diese gilt es im Rahmen des Workshops zu adressieren, jedoch weniger im Hinblick auf die isolierten Technologien, sondern mit deutliche r Fokussierung auf das Zusammenwirken von Mensch, Technik und Organisation.},
booktitle = {Mensch und {Computer} 2017 - {Workshopband}},
publisher = {Gesellschaft für Informatik e.V.},
author = {Reuter, Christian and Mentler, Tilo and Geisler, Stefan and Herczeg, Michael and Ludwig, Thomas and Pipek, Volkmar and Nestler, Simon},
editor = {Burghardt, M. and Wimmer, R. and Wolff, C. and Womser-Hacker, C.},
year = {2017},
keywords = {Security, UsableSec, Crisis, HCI, SocialMedia, Projekt-KontiKat},
pages = {5--8},
}
[BibTeX] [Abstract] [Download PDF]
Das Internet und insbesondere soziale Medien werden bekanntermaßen nicht nur zu vermeintlich guten Zwecken genutzt. So findet die Rekrutierung neuer Mitglieder und die Verbreitung von Ideologien des Terrorismus ebenfalls über dieses Medium statt. Aber auch die Terrorismusbekämpfung bedient sich gleicher Werkzeuge. Die Art und Weise dieser Gegenmaßnahmen sowie die Vorgehensweisen sollen in diesem Artikel thematisiert werden. Im ersten Teil wird der Forschungsstand zusammengefasst. Der zweite Teil stellt eine explorative empirische Studie der Terrorismusbekämpfung in sozialen Medien, insbesondere in Twitter, dar. Verschiedene, möglichst charakteristische Formen werden in diesem Rahmen am Beispiel von Twitter strukturiert. Ziel ist es, sich diesem hochrelevanten Gebiet mit dem Ziel von Frieden und Sicherheit aus Perspektive der Wirtschaftsinformatik zu nähern und weiteren Forschungsarbeiten in diesem Gebiet als Grundlage und Ausgangspunkt dienen zu können.
@inproceedings{reuter_terrorbekampfung_2017,
address = {St. Gallen, Switzerland},
title = {Terrorbekämpfung mithilfe sozialer {Medien} – ein explorativer {Einblick} am {Beispiel} von {Twitter}},
url = {http://www.wineme.uni-siegen.de/paper/2017/2017_ReuterPaetschRunft_TerrorbekaempfungSozialeMedien_WI.pdf},
abstract = {Das Internet und insbesondere soziale Medien werden bekanntermaßen nicht nur zu vermeintlich guten Zwecken genutzt. So findet die Rekrutierung neuer Mitglieder und die Verbreitung von Ideologien des Terrorismus ebenfalls über dieses Medium statt. Aber auch die Terrorismusbekämpfung bedient sich gleicher Werkzeuge. Die Art und Weise dieser Gegenmaßnahmen sowie die Vorgehensweisen sollen in diesem Artikel thematisiert werden. Im ersten Teil wird der Forschungsstand zusammengefasst. Der zweite Teil stellt eine explorative empirische Studie der Terrorismusbekämpfung in sozialen Medien, insbesondere in Twitter, dar. Verschiedene, möglichst charakteristische Formen werden in diesem Rahmen am Beispiel von Twitter strukturiert. Ziel ist es, sich diesem hochrelevanten Gebiet mit dem Ziel von Frieden und Sicherheit aus Perspektive der Wirtschaftsinformatik zu nähern und weiteren Forschungsarbeiten in diesem Gebiet als Grundlage und Ausgangspunkt dienen zu können.},
booktitle = {Proceedings of the {International} {Conference} on {Wirtschaftsinformatik} ({WI})},
publisher = {AIS},
author = {Reuter, Christian and Pätsch, Katja and Runft, Elena},
editor = {Leimeister, J.M. and Brenner, W.},
year = {2017},
keywords = {Peace, Student, Crisis, HCI, SocialMedia, Projekt-EmerGent, Ranking-CORE-C, Ranking-VHB-C, Ranking-WKWI-A},
pages = {649--663},
}
[BibTeX] [Abstract] [Download PDF]
Aufgrund des demographischen Wandels und der zunehmenden Bevölkerungsdichte im urbanen Raum wird es in Zukunft zu neuen Herausforderungen in der Planung und Vorbereitung von Katastrophen-lagen in Städten kommen. Dabei wird vor allem der Nutzen von IKT für ältere Menschen in Bezug auf (Groß-)Schadenslagen von hoher Relevanz sein, der in der bisherigen Forschung nicht angemessen be-trachtet wurde. Mittels eines nutzerzentrierten Ansatzes wird untersucht, wie eine geeignete Krisenkommunikation durch IKT für ältere Menschen funktionieren könnte. Ziel der Arbeit ist es, die Vorbereitung für die ältere Population in Großstädten im Falle einer (Groß-)Schadenslage zu untersuchen und zu un-terstützen. Gerade für das System Stadt sind die Ergebnisse dieser Arbeit von Relevanz und können hel-fen, den urbanen Raum resilienter gegen mögliche Katastrophen zu gestalten.
@inproceedings{wiegartner_erwartungen_2017,
address = {Regensburg, Germany},
title = {Erwartungen der älteren {Bevölkerung} an {IKT} für {Krisenkommunikation}},
url = {https://dl.gi.de/bitstream/handle/20.500.12116/3243/2017_WS17_416.pdf},
doi = {10.18420/muc2017-ws17-0416},
abstract = {Aufgrund des demographischen Wandels und der zunehmenden Bevölkerungsdichte im urbanen Raum wird es in Zukunft zu neuen Herausforderungen in der Planung und Vorbereitung von Katastrophen-lagen in Städten kommen. Dabei wird vor allem der Nutzen von IKT für ältere Menschen in Bezug auf (Groß-)Schadenslagen von hoher Relevanz sein, der in der bisherigen Forschung nicht angemessen be-trachtet wurde. Mittels eines nutzerzentrierten Ansatzes wird untersucht, wie eine geeignete Krisenkommunikation durch IKT für ältere Menschen funktionieren könnte. Ziel der Arbeit ist es, die Vorbereitung für die ältere Population in Großstädten im Falle einer (Groß-)Schadenslage zu untersuchen und zu un-terstützen. Gerade für das System Stadt sind die Ergebnisse dieser Arbeit von Relevanz und können hel-fen, den urbanen Raum resilienter gegen mögliche Katastrophen zu gestalten.},
booktitle = {Mensch und {Computer} 2017 - {Workshopband}},
publisher = {Gesellschaft für Informatik e.V.},
author = {Wiegärtner, Daniel and Reuter, Christian and Müller, Claudia},
editor = {Burghardt, M. and Wimmer, R. and Wolff, C. and Womser-Hacker, C.},
year = {2017},
keywords = {Student, Crisis, HCI, Projekt-KontiKat},
pages = {609--614},
}
2016
[BibTeX] [Abstract] [Download PDF]
For almost 15 years, social media have been regularly used during emergencies. One of the most recent, and instructive, examples of its widespread use during a large scale scenario in Europe were the 2013 European floods. Public reporting during the event indicated, and our analysis confirms, that Twitter, Facebook (FB), Google Maps and other services were frequently used by affected citizen and volunteers to coordinate help activities among themselves. We conducted a qualitative analysis of selected emergent volunteer communities in Germany on FB and Twitter among others, and subsequently conducted interviews with FB group founders and activists. Our aim was to analyze the use of social media during this particular event, especially by digital volunteers. Our study illustrates the relevance of social media for German citizens in cases of disaster, focusing especially on the role of the moderator. Our specific emphasis was the embedding of social media in the organizing work done by said volunteers, emphasizing both the patterns of social media use and the challenges that result. We show that different social media were used in different ways: Twitter was used in the main for status updates while FB-pages were mostly intended to provide an overview. FB-groups also coordinated a multitude of activities.
@article{kaufhold_self-organization_2016,
title = {The {Self}-{Organization} of {Digital} {Volunteers} across {Social} {Media}: {The} {Case} of the 2013 {European} {Floods} in {Germany}},
volume = {13},
url = {http://wineme.uni-siegen.de/paper/2016/2016_KaufholdReuter_SelfOrganizationDigitalVolunteersEuropeanFloods_JHSEM.pdf},
doi = {10.1515/jhsem-2015-0063},
abstract = {For almost 15 years, social media have been regularly used during emergencies. One of the most recent, and instructive, examples of its widespread use during a large scale scenario in Europe were the 2013 European floods. Public reporting during the event indicated, and our analysis confirms, that Twitter, Facebook (FB), Google Maps and other services were frequently used by affected citizen and volunteers to coordinate help activities among themselves. We conducted a qualitative analysis of selected emergent volunteer communities in Germany on FB and Twitter among others, and subsequently conducted interviews with FB group founders and activists. Our aim was to analyze the use of social media during this particular event, especially by digital volunteers. Our study illustrates the relevance of social media for German citizens in cases of disaster, focusing especially on the role of the moderator. Our specific emphasis was the embedding of social media in the organizing work done by said volunteers, emphasizing both the patterns of social media use and the challenges that result. We show that different social media were used in different ways: Twitter was used in the main for status updates while FB-pages were mostly intended to provide an overview. FB-groups also coordinated a multitude of activities.},
number = {1},
journal = {Journal of Homeland Security and Emergency Management (JHSEM)},
author = {Kaufhold, Marc-André and Reuter, Christian},
year = {2016},
keywords = {Crisis, HCI, AuswahlKaufhold, SocialMedia, Cooperation, Projekt-EmerGent, Projekt-KOKOS},
pages = {137--166},
}
[BibTeX] [Abstract] [Download PDF]
In recent years, citizens‘ movements such as the Arab Spring or Euromaidan protests have clearly shown that, whenever affected — whether negatively or positively — by the state and government decisions, citizens act to deal with the shared issues. Groups of people who organize themselves to address (mainly political) issues were defined as a `public‘ by the philosopher John Dewey. He believed it is necessary to improve communication to create a `Great Community‘ as a cohesive group of a public. Although information and communication technologies (ICT) lead to ambivalent effects on pursuing this goal and often distract the mass of people from discussing these issues, we argue that nowadays ICT can improve communication and has the potential to foster the detection of issues and therefore promote the (trans-)formation of a public into an issue-based community. As our foundation we took a literature study covering the formation of publics and their potential to evolve into communities, as well as their interplay with technology. This formed the basis for the development of our operational model that `follows the issues‘ for capturing the (trans-)formation of a public. Based on our model, we outline different perspectives on detecting shared issues as early indicators for publics based on ICT and derive implications for researching this process from a practical perspective.
@article{ludwig_publics_2016,
title = {From {Publics} to {Communities}: {Researching} the {Path} of {Shared} {Issues} {Through} {ICT}},
volume = {25},
url = {https://www.wineme.uni-siegen.de/paper/2016/2016_ludwigreuterpipek_frompublicstocommunities_jcscw.pdf},
doi = {10.1007/s10606-016-9252-y},
abstract = {In recent years, citizens' movements such as the Arab Spring or Euromaidan protests have clearly shown that, whenever affected — whether negatively or positively — by the state and government decisions, citizens act to deal with the shared issues. Groups of people who organize themselves to address (mainly political) issues were defined as a `public' by the philosopher John Dewey. He believed it is necessary to improve communication to create a `Great Community' as a cohesive group of a public. Although information and communication technologies (ICT) lead to ambivalent effects on pursuing this goal and often distract the mass of people from discussing these issues, we argue that nowadays ICT can improve communication and has the potential to foster the detection of issues and therefore promote the (trans-)formation of a public into an issue-based community. As our foundation we took a literature study covering the formation of publics and their potential to evolve into communities, as well as their interplay with technology. This formed the basis for the development of our operational model that `follows the issues' for capturing the (trans-)formation of a public. Based on our model, we outline different perspectives on detecting shared issues as early indicators for publics based on ICT and derive implications for researching this process from a practical perspective.},
number = {2-3},
journal = {Computer Supported Cooperative Work: The Journal of Collaborative Computing (JCSCW)},
author = {Ludwig, Thomas and Reuter, Christian and Pipek, Volkmar},
year = {2016},
note = {Place: Norwell, MA, USA
Publisher: Kluwer Academic Publishers},
keywords = {HCI, A-Paper, Ranking-ImpactFactor, SocialMedia, Cooperation, Projekt-EmerGent, Ranking-CORE-B, Ranking-VHB-B},
pages = {193--225},
}
[BibTeX] [Abstract] [Download PDF]
Mission- and safety-critical domains are more and more characterized by interactive and multimedia systems varying from large-scale technologies (e. g. airplanes) to wearable devices (e. g. smartglasses) operated by professional staff or volunteering laypeople. While technical availability, reliability and security of computer-based systems are of utmost importance, outcomes and performances increasingly depend on sufficient human-machine interaction or even cooperation to a large extent. While this i-com Special Issue on “Human-Machine Interaction and Cooperation in Safety-Critical Systems” presents recent research results from specific application domains like aviation, automotive, crisis management and healthcare, this introductory paper outlines the diversity of users, technologies and interaction or cooperation models involved.
@article{mentler_introduction_2016,
title = {Introduction to this {Special} {Issue} on “{Human}-{Machine} {Interaction} and {Cooperation} in {Safety}-{Critical} {Systems}”},
volume = {15},
url = {https://www.degruyter.com/view/j/icom.2016.15.issue-3/icom-2016-0037/icom-2016-0037.xml?format=INT},
doi = {https://doi.org/10.1515/icom-2016-0037},
abstract = {Mission- and safety-critical domains are more and more characterized by interactive and multimedia systems varying from large-scale technologies (e. g. airplanes) to wearable devices (e. g. smartglasses) operated by professional staff or volunteering laypeople. While technical availability, reliability and security of computer-based systems are of utmost importance, outcomes and performances increasingly depend on sufficient human-machine interaction or even cooperation to a large extent. While this i-com Special Issue on “Human-Machine Interaction and Cooperation in Safety-Critical Systems” presents recent research results from specific application domains like aviation, automotive, crisis management and healthcare, this introductory paper outlines the diversity of users, technologies and interaction or cooperation models involved.},
number = {3},
journal = {i-com - Journal of Interactive Media},
author = {Mentler, Tilo and Reuter, Christian and Geisler, Stefan},
year = {2016},
keywords = {Crisis, HCI, Infrastructure, Cooperation, Projekt-EmerGent},
pages = {219--226},
}
[BibTeX] [Download PDF]
@book{mentler_special_2016,
title = {Special {Issue} on {Human}-{Machine} {Interaction} and {Cooperation} in {Safety}-{Critical} {Systems} - i-com - {Journal} of {Interactive} {Media}},
volume = {15},
url = {https://peasec.de/paper/2016/2016_MentlerReuterGeisler_SpecialIssueHumanMachineInteractionSafetyCriticalSystems_ICOM.pdf},
number = {3},
publisher = {De Gruyter},
author = {Mentler, Tilo and Reuter, Christian and Geisler, Stefan},
year = {2016},
note = {Publication Title: i-com: Journal of Interactive Media},
keywords = {Security, Crisis, HCI, Projekt-EmerGent},
}
[BibTeX] [Abstract] [Download PDF]
Politische Partizipation im Internet hat zunehmenden Einfluss auf reale politische Willensbildungsprozesse. Parteien, die ein Kernelement des politischen Systems in Deutschland bilden, stehen vor einer wichtigen Gestaltungsaufgabe, wenn sie den Strukturwandel der politischen Kommunikation erfolgreich bewältigen möchten. Ziel unseres Beitrags ist es, Erkenntnisse für diese Gestaltungsaufgabe zu liefern. Dafür wurden 91 Vorschläge von CDU-Mitgliedern ausgewertet und ergänzende Interviews geführt, um Praktiken der (E-)Partizipation sowie ihre Defizite und Bedingungen zu identifizieren. Aus den Ergebnissen leiten wir die Notwendigkeit von insbesondere informellen E-Partizipations-und Vernetzungs-Technologien für den Einsatz in der CDU, potentiell aber auch anderen Parteien, ab
@inproceedings{reuter_informelle_2016,
address = {Aachen, Germany},
title = {Informelle {E}-{Partizipation} in {Parteien}},
url = {https://dl.gi.de/bitstream/handle/20.500.12116/182/bitstream_8804.pdf},
doi = {http://dx.doi.org/10.18420/muc2016-mci-0215},
abstract = {Politische Partizipation im Internet hat zunehmenden Einfluss auf reale politische Willensbildungsprozesse. Parteien, die ein Kernelement des politischen Systems in Deutschland bilden, stehen vor einer wichtigen Gestaltungsaufgabe, wenn sie den Strukturwandel der politischen Kommunikation erfolgreich bewältigen möchten. Ziel unseres Beitrags ist es, Erkenntnisse für diese Gestaltungsaufgabe zu liefern. Dafür wurden 91 Vorschläge von CDU-Mitgliedern ausgewertet und ergänzende Interviews geführt, um Praktiken der (E-)Partizipation sowie ihre Defizite und Bedingungen zu identifizieren. Aus den Ergebnissen leiten wir die Notwendigkeit von insbesondere informellen E-Partizipations-und Vernetzungs-Technologien für den Einsatz in der CDU, potentiell aber auch anderen Parteien, ab},
booktitle = {Mensch und {Computer} - {Tagungsband}},
publisher = {Gesellschaft für Informatik e.V.},
author = {Reuter, Christian and Heger, Oliver},
editor = {Prinz, W. and Borchers, J. and Jarke, M.},
year = {2016},
keywords = {Student, HCI, SocialMedia, Cooperation},
}
[BibTeX] [Abstract] [Download PDF]
A growing body of research in the area of information systems for crisis management is based on data from social media. After almost every larger disaster studies emerge with the focus on the specific use of social media. Much of this research is based on Twitter data, due to the ease of access of this (mainly public) data, compared to (more closed) data, such as Facebook or Google+. Based on the experience gained from a research project on social media in emergencies and our task to collect social media data sets for other partners, we present the design and evaluation of a graphical user interface that supports those stakeholders (such as emergency services or researchers) that are interested in creating social media datasets for further crisis management research. We do not specifically focus on the analysis of social media data. Rather we aim to support the gathering process and how actors without sophisticated technical skills can be supported to get what they want and especially need: relevant social media data. Within this article, we present a practice-oriented approach and implications for designing tools that support the collection of social media data as well as future work.
@article{reuter_big_2016,
title = {Big {Data} in a {Crisis}? {Creating} {Social} {Media} {Datasets} for {Emergency} {Management} {Research}},
volume = {15},
url = {http://wineme.uni-siegen.de/paper/2016/2016_Reuteretal_BigDatainCrisisDatasets_ICOM.pdf},
doi = {10.1515/icom-2016-0036},
abstract = {A growing body of research in the area of information systems for crisis management is based on data from social media. After almost every larger disaster studies emerge with the focus on the specific use of social media. Much of this research is based on Twitter data, due to the ease of access of this (mainly public) data, compared to (more closed) data, such as Facebook or Google+. Based on the experience gained from a research project on social media in emergencies and our task to collect social media data sets for other partners, we present the design and evaluation of a graphical user interface that supports those stakeholders (such as emergency services or researchers) that are interested in creating social media datasets for further crisis management research. We do not specifically focus on the analysis of social media data. Rather we aim to support the gathering process and how actors without sophisticated technical skills can be supported to get what they want and especially need: relevant social media data. Within this article, we present a practice-oriented approach and implications for designing tools that support the collection of social media data as well as future work.},
number = {3},
journal = {i-com - Journal of Interactive Media},
author = {Reuter, Christian and Ludwig, Thomas and Kotthaus, Christoph and Kaufhold, Marc-André and von Radziewski, Elmar and Pipek, Volkmar},
year = {2016},
keywords = {HCI, SocialMedia, Projekt-EmerGent, Projekt-KOKOS},
pages = {249--264},
}
[BibTeX] [Abstract] [Download PDF]
Während das Konzept der Resilienz in den Ingenieurwissenschaften vornehmlich auf die Verfügbarkeit technischer Systeme fokussiert ist, betrachtet unser Beitrag Resilienz als soziotechnisches Konstrukt und zeigt Möglichkeiten zur Förderung kooperativer Resilienz, insbesondere durch Kooperationstechnologie, auf. Nach einer Definition von Resilienz im Allgemeinen und im Katastrophenschutz – unserem Anwendungsfeld – sowie im Kontext kooperativer Strukturen, stellen wir unsere Methodik und die entwickelten Kooperationstechnologien vor. Diese adressieren die Zusammenarbeit verschiedener Akteure (z. B. Feuerwehr, Polizei, Bevölkerung) in Schadenslagen. Abschließend diskutieren wir den Beitrag dieser Technologien zur kooperativen Resilienz als Fähigkeit, Krisen der Kooperation durch Anpassungsfähigkeit an geänderte Realitäten mithilfe von Kooperationstechnologie zu überstehen.
@article{reuter_kooperative_2016,
title = {Kooperative {Resilienz} – ein soziotechnischer {Ansatz} durch {Kooperationstechnologien} im {Krisenmanagement}},
volume = {47},
url = {https://www.wineme.uni-siegen.de/paper/2016/2016_reuterludwigpipek_kooperativeresilienz_gio.pdf},
doi = {10.1007/s11612-016-0317-7},
abstract = {Während das Konzept der Resilienz in den Ingenieurwissenschaften vornehmlich auf die Verfügbarkeit technischer Systeme fokussiert ist, betrachtet unser Beitrag Resilienz als soziotechnisches Konstrukt und zeigt Möglichkeiten zur Förderung kooperativer Resilienz, insbesondere durch Kooperationstechnologie, auf. Nach einer Definition von Resilienz im Allgemeinen und im Katastrophenschutz – unserem Anwendungsfeld – sowie im Kontext kooperativer Strukturen, stellen wir unsere Methodik und die entwickelten Kooperationstechnologien vor. Diese adressieren die Zusammenarbeit verschiedener Akteure (z. B. Feuerwehr, Polizei, Bevölkerung) in Schadenslagen. Abschließend diskutieren wir den Beitrag dieser Technologien zur kooperativen Resilienz als Fähigkeit, Krisen der Kooperation durch Anpassungsfähigkeit an geänderte Realitäten mithilfe von Kooperationstechnologie zu überstehen.},
number = {2},
journal = {Gruppe. Interaktion. Organisation. Zeitschrift für Angewandte Organisationspsychologie (GIO)},
author = {Reuter, Christian and Ludwig, Thomas and Pipek, Volkmar},
year = {2016},
keywords = {RSF, Crisis, HCI, Cooperation, Projekt-EmerGent, Projekt-KOKOS, Projekt-InfoStrom},
pages = {159--169},
}
[BibTeX] [Abstract] [Download PDF]
Menschen tauschen sich aus und gerade in schwierigen Situationen ist Kommunikation sehr wichtig. In Katastrophenlagen, wie schweren Unwettern, sind jedoch teilweise zentrale Kommunikationsinfrastrukturen betroffen durch der durch Kommunikationsmedien unterstützte Informationsaustausch naturgemäß schwerer möglich als in Zeiten ohne solche Ausfälle. In jenen Fällen ist Kreativität erforderlich. Den Ansatz des Infrastructuring, d.h. der Re-Konzeptualisierung der eigenen Arbeit im Kontext bestehender und potentieller Werkzeuge, aufgreifend werden in diesem Artikel Kommunikationsmöglichkeiten in solchen Fällen untersucht. Basierend auf der Analyse der Verfügbarkeit von Kommunikationsinfrastrukturen wird betrachtet, welche Ansätze zur Kommunikation basierend auf alternativen und dezentralen Infrastrukturen wie MANETs, Wi-Fi und Bluetooth existieren und mithilfe von Smartphones nutzbar gemacht werden können.
@inproceedings{reuter_sozial_2016,
address = {Aachen, Germany},
title = {Sozial auch ohne {Netz} – {Soziale} {Medien} bei {Infrastrukturproblemen}},
url = {https://dl.gi.de/handle/20.500.12116/287},
doi = {http://dx.doi.org/10.18420/muc2016-ws01-0004},
abstract = {Menschen tauschen sich aus und gerade in schwierigen Situationen ist Kommunikation sehr wichtig. In Katastrophenlagen, wie schweren Unwettern, sind jedoch teilweise zentrale Kommunikationsinfrastrukturen betroffen durch der durch Kommunikationsmedien unterstützte Informationsaustausch naturgemäß schwerer möglich als in Zeiten ohne solche Ausfälle. In jenen Fällen ist Kreativität erforderlich. Den Ansatz des Infrastructuring, d.h. der Re-Konzeptualisierung der eigenen Arbeit im Kontext bestehender und potentieller Werkzeuge, aufgreifend werden in diesem Artikel Kommunikationsmöglichkeiten in solchen Fällen untersucht. Basierend auf der Analyse der Verfügbarkeit von Kommunikationsinfrastrukturen wird betrachtet, welche Ansätze zur Kommunikation basierend auf alternativen und dezentralen Infrastrukturen wie MANETs, Wi-Fi und Bluetooth existieren und mithilfe von Smartphones nutzbar gemacht werden können.},
booktitle = {Mensch und {Computer} 2016 - {Workshopband}},
publisher = {Gesellschaft für Informatik e.V.},
author = {Reuter, Christian and Hupertz, Julian},
editor = {Weyers, B. and Dittmar, A.},
year = {2016},
keywords = {Student, RSF, Crisis, HCI, SocialMedia, Infrastructure, Projekt-EmerGent, Projekt-KOKOS},
}
[BibTeX] [Abstract] [Download PDF]
Die zunehmende Durchdringung der Lebenswelt mit IT macht auch nicht vor sicherheitskritischen Systemen halt. Anwendungsfelder betreffen kritische Infrastrukturen, Leitstellensysteme, Fahrzeug- und Verkehrsführungssoftware, Prozessführungssysteme, Produktionstechnologien, Anwendung der Medizintechnik, des Krisenmanagements, der Gefahrenabwehr oder des Terrorismus. Die Mensch-Computer-Interaktion in solchen sicherheitskritischen Systemen und Anwendungsfeldern ist eine Herausforderung nicht nur für die Informatik, sondern eine interdisziplinäre Aufgabe an der Schnittstelle vieler Disziplinen. Zunehmend müssen auch mobile Kontexte und Endgeräte sowie soziale Netzwerke in die Betrachtungen einbezogen werden.
@inproceedings{reuter_aktuelle_2016,
address = {Aachen, Germany},
title = {Aktuelle {Ansätze} zur {Mensch}-{Computer}-{Interaktion} in sicherheitskritischen {Systemen}},
url = {https://dl.gi.de/bitstream/handle/20.500.12116/314/bitstream_9083.pdf?sequence=1&isAllowed=y},
doi = {10.18420/muc2016-ws01-0000},
abstract = {Die zunehmende Durchdringung der Lebenswelt mit IT macht auch nicht vor sicherheitskritischen Systemen halt. Anwendungsfelder betreffen kritische Infrastrukturen, Leitstellensysteme, Fahrzeug- und Verkehrsführungssoftware, Prozessführungssysteme, Produktionstechnologien, Anwendung der Medizintechnik, des Krisenmanagements, der Gefahrenabwehr oder des Terrorismus. Die Mensch-Computer-Interaktion in solchen sicherheitskritischen Systemen und Anwendungsfeldern ist eine Herausforderung nicht nur für die Informatik, sondern eine interdisziplinäre Aufgabe an der Schnittstelle vieler Disziplinen. Zunehmend müssen auch mobile Kontexte und Endgeräte sowie soziale Netzwerke in die Betrachtungen einbezogen werden.},
booktitle = {Mensch und {Computer} 2016 - {Workshopband}},
publisher = {Gesellschaft für Informatik e.V.},
author = {Reuter, Christian and Mentler, Tilo and Geisler, Stefan and Herczeg, Michael and Ludwig, Thomas and Pipek, Volkmar and Nestler, Simon and Sautter, Johannes},
editor = {Weyers, B. and Dittmar, A.},
year = {2016},
keywords = {HCI, SocialMedia, Projekt-EmerGent, Projekt-KOKOS},
}
[BibTeX] [Abstract] [Download PDF]
Various studies show that social media is used in emergencies – and that in spite of possible challenges for emergency services, beneficial use cases can be identified. However, relatively little empirical data is available regarding the attitudes of emergency services towards social media, and almost none of a comparative nature. This article summarizes the findings of a survey conducted of the EU project ‘EmerGent‘ with 761 emergency service staff across 32 European countries from September to December 2014. The main aims of the survey were to explore the attitudes expressed by emergency service staff towards social media for private and organizational use as well as the levels and main factors influencing the current and likely future use of social media in their organizations. Based on our results, we discuss possible enhancements of the emergency management cycle using social media.
@article{reuter_emergency_2016,
title = {Emergency {Services} {Attitudes} towards {Social} {Media}: {A} {Quantitative} and {Qualitative} {Survey} across {Europe}},
volume = {95},
url = {https://peasec.de/paper/2016/2016_ReuterLudwigKaufholdSpielhofer_EmergencyServicesAttiudesSurveySocialMedia_IJHCS.pdf},
doi = {10.1016/j.ijhcs.2016.03.005},
abstract = {Various studies show that social media is used in emergencies – and that in spite of possible challenges for emergency services, beneficial use cases can be identified. However, relatively little empirical data is available regarding the attitudes of emergency services towards social media, and almost none of a comparative nature. This article summarizes the findings of a survey conducted of the EU project ‘EmerGent' with 761 emergency service staff across 32 European countries from September to December 2014. The main aims of the survey were to explore the attitudes expressed by emergency service staff towards social media for private and organizational use as well as the levels and main factors influencing the current and likely future use of social media in their organizations. Based on our results, we discuss possible enhancements of the emergency management cycle using social media.},
journal = {International Journal on Human-Computer Studies (IJHCS)},
author = {Reuter, Christian and Ludwig, Thomas and Kaufhold, Marc-André and Spielhofer, Thomas},
year = {2016},
keywords = {Crisis, HCI, A-Paper, AuswahlKaufhold, Selected, AuswahlCrisis, Ranking-CORE-A, Ranking-ImpactFactor, SocialMedia, Projekt-EmerGent, Ranking-WKWI-B},
pages = {96--111},
}
[BibTeX] [Download PDF]
@book{reuter_proceedings_2016,
address = {Aachen, Germany},
title = {Proceedings des {Workshops} "{Mensch}-{Computer}-{Interaktion} in sicherheitskritischen {Systemen}"},
url = {https://www.wineme.uni-siegen.de/paper/2016/2016_proc-sicherheitskritischemmi_muc.pdf},
publisher = {Gesellschaft für Informatik e.V.},
author = {Reuter, Christian and Mentler, Tilo and Geisler, Stefan and Herczeg, Michael and Ludwig, Thomas and Pipek, Volkmar and Nestler, Simon and Sautter, Johannes},
editor = {Weyers, B. and Dittmar, A.},
year = {2016},
note = {Publication Title: Mensch \& Computer: Workshopband},
keywords = {UsableSec, Crisis, HCI, Projekt-EmerGent},
}
[BibTeX] [Abstract] [Download PDF]
The convergence of social networking and mobile media technology is shifting the way how people communicate and gain or share information. People are using social media to a greater extent, also in emergency situations. During disasters throughout the world, such as the 2010 Haiti earthquake, the 2013 European floods, or the terror attacks 2015 in Paris and 2016 in Brussels, this has been illustrated again. Often information about disasters even finds its way faster to social media than it reaches regular news companies and emergency services. However, approaches for processing and analyzing the vast quantities of data produced have even more potential. Yet many emergency services still have not found a way to put this potential to an effective use. Within our project EmerGent we are developing a system to process and analyse information from social media particularly tailored for the specific needs of emergency services. The aim is to transform the high volume of noisy data into a low volume of rich content that is useful to emergency personnel. In the first part of this paper we present our approach from a user interface perspective. The second part deals with the evaluation of the approach and the derivation of future potentials of the approach.
@inproceedings{reuter_semi-automatic_2016,
address = {Klagenfurt},
title = {Semi-{Automatic} {Alerts} and {Notifications} for {Emergency} {Services} based on {Cross}-{Platform} {Social} {Media} {Data} –{Evaluation} of a {Prototype}},
url = {http://subs.emis.de/LNI/Proceedings/Proceedings259/P-259.pdf#page=1806},
abstract = {The convergence of social networking and mobile media technology is shifting the way how people communicate and gain or share information. People are using social media to a greater extent, also in emergency situations. During disasters throughout the world, such as the 2010 Haiti earthquake, the 2013 European floods, or the terror attacks 2015 in Paris and 2016 in Brussels, this has been illustrated again. Often information about disasters even finds its way faster to social media than it reaches regular news companies and emergency services. However, approaches for processing and analyzing the vast quantities of data produced have even more potential. Yet many emergency services still have not found a way to put this potential to an effective use. Within our project EmerGent we are developing a system to process and analyse information from social media particularly tailored for the specific needs of emergency services. The aim is to transform the high volume of noisy data into a low volume of rich content that is useful to emergency personnel. In the first part of this paper we present our approach from a user interface perspective. The second part deals with the evaluation of the approach and the derivation of future potentials of the approach.},
booktitle = {Informatik 2016: von {Menschen} für {Menschen}, {Lecture} {Notes} in {Informatics} ({LNI})},
publisher = {Gesellschaft für Informatik},
author = {Reuter, Christian and Amelunxen, Christoph and Moi, Matthias},
editor = {Mayr, Heinrich C. and Pinzger, Martin},
year = {2016},
keywords = {HCI, SocialMedia, Cooperation, Projekt-EmerGent, Ranking-CORE-C, Ranking-VHB-C},
pages = {1805--1818},
}
[BibTeX] [Abstract] [Download PDF]
Nach den terroristischen Anschlägen in Paris 2015 und Brüssel 2016 wurde das Bedürfnis nach mehr Sicherheit und Überwachung im Internet laut. Als Folge der Enthüllungen der Überwachungs- und Spionagetechniken der National Security Agency (NSA) durch Edward Snowden 2013 konnte in der Bevölkerung aber auch ein Aufschrei nach erhöhtem Schutz der Privatsphäre im Internet wahrgenommen werden. Die geschilderten Ereignisse verdeutlichen die gegensätzlichen Wünsche nach Sicherheit und Überwachung im Internet sowie Schutz der Privatsphäre. Im ersten Teil dieses Beitrags stellen wir den Stand der Forschung im Bereich Terror, Sicherheit und Privatsphäre in sozialen Medien dar. Im zweiten Teil führen wir eine explorative Studie durch, um zu beleuchten, ob Bürgerinnen und Bürger in Krisenzeiten bereit wären, ihre Privatsphäre im Internet, vor allem in sozialen Netzwerken, zugunsten von Sicherheit zu reduzieren. Basierend auf qualitativen Daten zeigt diese Arbeit Meinungscluster und Tendenzen in Bezug auf das Nullsummenspiel „Sicherheit und Privatsphäre“.
@inproceedings{reuter_sicherheit_2016,
address = {Klagenfurt},
title = {Sicherheit vs. {Privatsphäre}: {Zur} {Akzeptanz} von Überwachung in sozialen {Medien} im {Kontext} von {Terrorkrisen}},
url = {http://subs.emis.de/LNI/Proceedings/Proceedings259/P-259.pdf#page=1760},
abstract = {Nach den terroristischen Anschlägen in Paris 2015 und Brüssel 2016 wurde das Bedürfnis nach mehr Sicherheit und Überwachung im Internet laut. Als Folge der Enthüllungen der Überwachungs- und Spionagetechniken der National Security Agency (NSA) durch Edward Snowden 2013 konnte in der Bevölkerung aber auch ein Aufschrei nach erhöhtem Schutz der Privatsphäre im Internet wahrgenommen werden. Die geschilderten Ereignisse verdeutlichen die gegensätzlichen Wünsche nach Sicherheit und Überwachung im Internet sowie Schutz der Privatsphäre. Im ersten Teil dieses Beitrags stellen wir den Stand der Forschung im Bereich Terror, Sicherheit und Privatsphäre in sozialen Medien dar. Im zweiten Teil führen wir eine explorative Studie durch, um zu beleuchten, ob Bürgerinnen und Bürger in Krisenzeiten bereit wären, ihre Privatsphäre im Internet, vor allem in sozialen Netzwerken, zugunsten von Sicherheit zu reduzieren. Basierend auf qualitativen Daten zeigt diese Arbeit Meinungscluster und Tendenzen in Bezug auf das Nullsummenspiel „Sicherheit und Privatsphäre“.},
booktitle = {Informatik 2016: von {Menschen} für {Menschen}},
publisher = {GI-Edition-Lecture Notes in Informatics (LNI)},
author = {Reuter, Christian and Geilen, Gordian and Gellert, Robin},
editor = {Mayr, Heinrich C. and Pinzger, Martin},
year = {2016},
keywords = {Peace, Student, Security, UsableSec, HCI, SocialMedia, Projekt-KOKOS, Ranking-CORE-C, Ranking-VHB-C},
}
[BibTeX] [Abstract] [Download PDF]
In cases of power outages the communication of organizations responsible for recovery work (emergency services, public administration, energy network operators) to the public poses several challenges, pri-marily the breakdowns of many communication infrastructures and therefore the limitations of the use of classical communication media. This paper surveys technical concepts to support crisis communica-tion during blackouts. Therefore it first investigates the perception and information demands of citizens and communication infrastructures in different scenarios. Furthermore, it analyzes communication infrastructures and their availability in different scenarios. Finally it proposes ‘BlaCom‘, an ICT-based concept for blackout communication, which addresses the time span between the occurrence of the energy blackout and the possible overload of the mobile phone network. It combines general information with location-specific and setting-specific information, was implemented as a prototype smartphone application and evaluated with 12 potential end users.
@incollection{reuter_chapter_2016,
title = {Chapter 44: {Communication} between {Power} {Blackout} and {Mobile} {Network} {Overload}},
volume = {II},
isbn = {978-1-4666-8756-1},
url = {https://www.wineme.uni-siegen.de/paper/2016/2016_reuter_communicationpowerblackoutnetworkoverload_ehealth.pdf},
abstract = {In cases of power outages the communication of organizations responsible for recovery work (emergency services, public administration, energy network operators) to the public poses several challenges, pri-marily the breakdowns of many communication infrastructures and therefore the limitations of the use of classical communication media. This paper surveys technical concepts to support crisis communica-tion during blackouts. Therefore it first investigates the perception and information demands of citizens and communication infrastructures in different scenarios. Furthermore, it analyzes communication infrastructures and their availability in different scenarios. Finally it proposes ‘BlaCom', an ICT-based concept for blackout communication, which addresses the time span between the occurrence of the energy blackout and the possible overload of the mobile phone network. It combines general information with location-specific and setting-specific information, was implemented as a prototype smartphone application and evaluated with 12 potential end users.},
booktitle = {E-{Health} and {Telemedicine}: {Concepts}, {Methodologies}, {Tools}, and {Applications}},
publisher = {IGI Global},
author = {Reuter, Christian},
editor = {{Mehdi Khosrow-Pour}},
year = {2016},
keywords = {RSF, Crisis, HCI, Infrastructure, Projekt-EmerGent, Projekt-InfoStrom},
pages = {876--891},
}
2015
[BibTeX] [Abstract] [Download PDF]
Das mitteleuropäische Hochwasser 2013 sorgte für große Schäden in weiten Teilen Deutschlands. Währenddessen und in der anschließenden Wiederherstellungsphase koordinierten betroffene und nicht betroffene Bürger ihre Hilfsaktivitäten nicht nur vor Ort, sondern auch in sozialen Medien wie Twitter, Facebook und mit Tools wie Google Maps. Basierend auf einer Vorstudie zu den Aktivitäten in Twitter und Facebook sowie Interviews mit „Digital Volunteers“ (hier: Gründer und Moderatoren von Facebook-Gruppen zum Hochwasser) stellt dieser Beitrag eine als Facebook-App realisierte crossmediale Applikation zur gruppen- und plattformübergreifenden Informationsbeschaffung und -Veröffentlichung vor, die der (Selbst-)Koordination ungebundener Helfer dienen soll. Diese wurde mit 20 Nutzern qualitativ evaluiert und zeigt Implikationen für die technische Unterstützung der Partizipation Freiwilliger in Katastrophenlagen auf.
@inproceedings{kaufhold_konzept_2015,
address = {Osnabrück, Germany},
title = {Konzept und {Evaluation} einer {Facebook}-{Applikation} zur crossmedialen {Selbstorganisation} freiwilliger {Helfer}},
url = {https://peasec.de/paper/2015/2015_KaufholdReuter_CrossmedialeSelbstorganisation_WI.pdf},
abstract = {Das mitteleuropäische Hochwasser 2013 sorgte für große Schäden in weiten Teilen Deutschlands. Währenddessen und in der anschließenden Wiederherstellungsphase koordinierten betroffene und nicht betroffene Bürger ihre Hilfsaktivitäten nicht nur vor Ort, sondern auch in sozialen Medien wie Twitter, Facebook und mit Tools wie Google Maps. Basierend auf einer Vorstudie zu den Aktivitäten in Twitter und Facebook sowie Interviews mit „Digital Volunteers“ (hier: Gründer und Moderatoren von Facebook-Gruppen zum Hochwasser) stellt dieser Beitrag eine als Facebook-App realisierte crossmediale Applikation zur gruppen- und plattformübergreifenden Informationsbeschaffung und -Veröffentlichung vor, die der (Selbst-)Koordination ungebundener Helfer dienen soll. Diese wurde mit 20 Nutzern qualitativ evaluiert und zeigt Implikationen für die technische Unterstützung der Partizipation Freiwilliger in Katastrophenlagen auf.},
booktitle = {Proceedings of the {International} {Conference} on {Wirtschaftsinformatik} ({WI}) ({Best} {Paper} {Award} {Nominee})},
publisher = {AIS},
author = {Kaufhold, Marc-André and Reuter, Christian},
year = {2015},
keywords = {Crisis, HCI, SocialMedia, Cooperation, Projekt-EmerGent, Ranking-CORE-C, Ranking-VHB-C, Ranking-WKWI-A},
pages = {1844--1858},
}
[BibTeX] [Abstract] [Download PDF]
Emergencies such as the 2013 Central European flood or the 2013 typhoon Haiyan in Philippines have shown how citizens can organize themselves and coordinate private relief activities. These activities can be found in (physical) groups of affected people, but also within (digital) social media communities. There is an evident need, however, for a clearer picture of what exactly is going on to be available for use by the official emergency services: to enlist them, to keep them safe, to support their efforts and to avoid need-less duplications or conflicts. Aligning emergency services and volunteer activities is, then, crucial. In this paper we present a mobile crowd sensing based concept, which was designed as well as implemented as the application CrowdMonitor and facilitates the detection of physical and digital activities and the assignment of specific tasks to citizens. Finally, we outline the findings of its evaluation.
@inproceedings{ludwig_crowdmonitor_2015,
address = {New York, USA},
title = {{CrowdMonitor}: {Mobile} {Crowd} {Sensing} for {Assessing} {Physical} and {Digital} {Activities} of {Citizens} during {Emergencies}},
url = {https://www.wineme.uni-siegen.de/paper/2015/2015_ludwigreutersiebigterothpipek_crowdmonitor_chi.pdf},
abstract = {Emergencies such as the 2013 Central European flood or the 2013 typhoon Haiyan in Philippines have shown how citizens can organize themselves and coordinate private relief activities. These activities can be found in (physical) groups of affected people, but also within (digital) social media communities. There is an evident need, however, for a clearer picture of what exactly is going on to be available for use by the official emergency services: to enlist them, to keep them safe, to support their efforts and to avoid need-less duplications or conflicts. Aligning emergency services and volunteer activities is, then, crucial. In this paper we present a mobile crowd sensing based concept, which was designed as well as implemented as the application CrowdMonitor and facilitates the detection of physical and digital activities and the assignment of specific tasks to citizens. Finally, we outline the findings of its evaluation.},
booktitle = {Proceedings of the {Conference} on {Human} {Factors} in {Computing} {Systems} ({CHI})},
publisher = {ACM Press},
author = {Ludwig, Thomas and Reuter, Christian and Siebigteroth, Tim and Pipek, Volkmar},
editor = {Begole, Bo and Jinwoo, Kim and Kor, Inkpeni and Woontack, Woo},
year = {2015},
keywords = {Student, Crisis, HCI, A-Paper, Ranking-CORE-A*, Cooperation, Projekt-EmerGent, Ranking-WKWI-A},
pages = {4083--4092},
}
[BibTeX] [Abstract] [Download PDF]
To be able to take efficient measures in crisis management, it is essential for emergency services to get as much details about an actual situation on-site as possible. Currently content from social media plays an important role since those platforms are used to spread crisis-relevant data within the population. Our contribution presents a concept which supports the situation assessment practices of emergency services by collaboratively evaluating and by analyzing citizen-generated content from social media using a multi-touch table. The concept was implemented based on a Microsoft PixelSense and evaluated with 14 participants. The results reveal the impact of subjectivity of the participants, their positioning around the table as well as the uniqueness of social media posts on the collaborative situation assessment with multi-touch tables
@inproceedings{ludwig_cotable_2015,
address = {Kristiansand, Norway},
title = {{CoTable}: {Collaborative} {Social} {Media} {Analysis} with {Multi}-{Touch} {Tables}},
url = {https://www.wineme.uni-siegen.de/paper/2015/2015_ludwigreuterheukaeuferpipek_cotable_iscram.pdf},
abstract = {To be able to take efficient measures in crisis management, it is essential for emergency services to get as much details about an actual situation on-site as possible. Currently content from social media plays an important role since those platforms are used to spread crisis-relevant data within the population. Our contribution presents a concept which supports the situation assessment practices of emergency services by collaboratively evaluating and by analyzing citizen-generated content from social media using a multi-touch table. The concept was implemented based on a Microsoft PixelSense and evaluated with 14 participants. The results reveal the impact of subjectivity of the participants, their positioning around the table as well as the uniqueness of social media posts on the collaborative situation assessment with multi-touch tables},
booktitle = {Proceedings of the {Information} {Systems} for {Crisis} {Response} and {Management} ({ISCRAM})},
publisher = {ISCRAM},
author = {Ludwig, Thomas and Reuter, Christian and Heukäufer, Ralf},
editor = {Palen, Leysia and Büscher, Monika and Comes, Tina and Hughes, Amanda Lee},
year = {2015},
keywords = {Student, Crisis, HCI, SocialMedia, Cooperation, Projekt-EmerGent},
}
[BibTeX] [Abstract] [Download PDF]
People all over the world are regularly affected by disasters and emergencies. Besides official emergency services, ordinary citizens are getting increasingly involved in crisis response work. They are usually present on-site at the place of incident and use social media to share information about the event. For emergency services, the large amount of citizen-generated content in social media, however, means that finding high-quality information is similar to “finding a needle in a haystack”. This article presents an approach to how a dynamic and subjective quality assessment of citizen-generated content could support the work of emergency services. First, we present results of our empirical study concerning the usage of citizen-generated content by emergency services. Based on our literature review and empirical study, we derive design guidelines and describe a concept for dynamic quality measurement that is implemented as a service-oriented web-application “Social Haystack.” Finally, we outline findings of its evaluation and implications thereof.
@article{ludwig_social_2015,
title = {Social {Haystack}: {Dynamic} {Quality} {Assessment} of {Citizen}-{Generated} {Content} during {Emergencies}},
volume = {21},
url = {https://www.wineme.uni-siegen.de/paper/2015/2015_ludwigreuterpipek_socialhaystack_tochi.pdf},
doi = {10.1145/2749461},
abstract = {People all over the world are regularly affected by disasters and emergencies. Besides official emergency services, ordinary citizens are getting increasingly involved in crisis response work. They are usually present on-site at the place of incident and use social media to share information about the event. For emergency services, the large amount of citizen-generated content in social media, however, means that finding high-quality information is similar to “finding a needle in a haystack”. This article presents an approach to how a dynamic and subjective quality assessment of citizen-generated content could support the work of emergency services. First, we present results of our empirical study concerning the usage of citizen-generated content by emergency services. Based on our literature review and empirical study, we derive design guidelines and describe a concept for dynamic quality measurement that is implemented as a service-oriented web-application “Social Haystack.” Finally, we outline findings of its evaluation and implications thereof.},
number = {4},
journal = {ACM Transactions on Computer-Human Interaction (TOCHI)},
author = {Ludwig, Thomas and Reuter, Christian and Pipek, Volkmar},
year = {2015},
keywords = {Crisis, HCI, A-Paper, Ranking-CORE-A*, Ranking-ImpactFactor, SocialMedia, Projekt-EmerGent, Ranking-VHB-B, Ranking-WKWI-A},
pages = {Article 17},
}
[BibTeX] [Abstract] [Download PDF]
Human computer interaction in security and time-critical systems is an interdisciplinary challenge at the seams of human factors, engineering, information systems and computer science. Application fields include control systems, critical infrastructures, vehicle and traffic management, production technology, business continuity management, medical technology, crisis management and civil protection. Nowadays in many areas mobile and ubiquitous computing as well as social media and collaborative technologies also plays an important role. The specific challenges require the discussion and development of new methods and approaches in order to design information systems. These are going to be addressed in this special issue with a particular focus on technologies for critical practices for authorities and industry.
@book{reuter_special_2015,
title = {Special {Issue} on {Human} {Computer} {Interaction} in {Critical} {Systems} {II}: {Authorities} and {Industry} - {International} {Journal} of {Information} {Systems} for {Crisis} {Response} and {Management} ({IJISCRAM})},
volume = {7},
url = {https://www.wineme.uni-siegen.de/paper/2015/2015_ijiscram-specialissue_hci-criticalsystems-ii.pdf},
abstract = {Human computer interaction in security and time-critical systems is an interdisciplinary challenge at the seams of human factors, engineering, information systems and computer science. Application fields include control systems, critical infrastructures, vehicle and traffic management, production technology, business continuity management, medical technology, crisis management and civil protection. Nowadays in many areas mobile and ubiquitous computing as well as social media and collaborative technologies also plays an important role. The specific challenges require the discussion and development of new methods and approaches in order to design information systems. These are going to be addressed in this special issue with a particular focus on technologies for critical practices for authorities and industry.},
number = {3},
publisher = {IGI Global},
author = {Reuter, Christian},
year = {2015},
note = {Publication Title: International Journal of Information Systems for Crisis Response and Management (IJISCRAM)},
keywords = {HCI, SocialMedia, Projekt-EmerGent, Projekt-KOKOS},
}
[BibTeX] [Abstract] [Download PDF]
Social media is becoming more and more important in crisis management. However its analysis by emergency services still bears unaddressed challenges and the majority of studies focus on the use of social media in the USA. In this paper German tweets of the European Flood 2013 are therefore captured and analyzed using descriptive statistics, qualitative data coding, and computational algorithms. Our work illustrates that this event provided sufficient German traffic and geo-locations as well as enough original data (not derivative). However, up-to-date Named Entity Recognizer (NER) with German classifier could not recognize German rivers and highways satisfactorily. Furthermore our analysis revealed pragmatic (linguistic) barriers resulting from irony, wordplay, and ambiguity, as well as in retweet-behavior. To ease the analysis of data we suggest a retweet ratio, which is illustrated to be higher with important tweets and may help selecting tweets for mining. We argue that existing software has to be adapted and improved for German language characteristics, also to detect markedness, seriousness and truth
@article{reuter_microblogging_2015,
title = {Microblogging during the {European} {Floods} 2013: {What} {Twitter} {May} {Contribute} in {German} {Emergencies}},
volume = {7},
url = {http://www.peasec.de/paper/2015/2015_ReuterSchroeter_MicrobloggingEuropeanFloods_IJISCRAM.pdf},
abstract = {Social media is becoming more and more important in crisis management. However its analysis by emergency services still bears unaddressed challenges and the majority of studies focus on the use of social media in the USA. In this paper German tweets of the European Flood 2013 are therefore captured and analyzed using descriptive statistics, qualitative data coding, and computational algorithms. Our work illustrates that this event provided sufficient German traffic and geo-locations as well as enough original data (not derivative). However, up-to-date Named Entity Recognizer (NER) with German classifier could not recognize German rivers and highways satisfactorily. Furthermore our analysis revealed pragmatic (linguistic) barriers resulting from irony, wordplay, and ambiguity, as well as in retweet-behavior. To ease the analysis of data we suggest a retweet ratio, which is illustrated to be higher with important tweets and may help selecting tweets for mining. We argue that existing software has to be adapted and improved for German language characteristics, also to detect markedness, seriousness and truth},
number = {1},
journal = {International Journal of Information Systems for Crisis Response and Management (IJISCRAM)},
author = {Reuter, Christian and Schröter, Julian},
year = {2015},
keywords = {Student, Crisis, HCI, SocialMedia, Cooperation, Projekt-EmerGent},
pages = {22--41},
}
[BibTeX] [Abstract] [Download PDF]
Mensch-Maschine-Interaktion in sicherheitskritischen Systemen ist ein für die Informatik und die jeweiligen Anwendungsdomänen in der Bedeutung weiter zunehmendes Thema. Dieser Workshop der GI-Fachgruppe „Mensch-Maschine-Interaktion in sicherheitskritischen Systemen“ innerhalb des Fachbereichs Mensch-Computer-Interaktion soll aktuelle Entwicklungen und Fragestellungen offenlegen und neue Impulse für das Forschungsgebiet geben.
@inproceedings{reuter_proceedings_2015,
title = {Proceedings des {Workshops} "{Mensch}-{Computer}-{Interaktion} und {Social} {Computing} in sicherheitskritischen {Systemen}"},
url = {https://peasec.de/paper/2015/2015_Reuteretal_Proc-KritischeMCI_MuC.pdf},
abstract = {Mensch-Maschine-Interaktion in sicherheitskritischen Systemen ist ein für die Informatik und die jeweiligen Anwendungsdomänen in der Bedeutung weiter zunehmendes Thema. Dieser Workshop der GI-Fachgruppe „Mensch-Maschine-Interaktion in sicherheitskritischen Systemen“ innerhalb des Fachbereichs Mensch-Computer-Interaktion soll aktuelle Entwicklungen und Fragestellungen offenlegen und neue Impulse für das Forschungsgebiet geben.},
booktitle = {Mensch und {Computer} 2015 - {Workshopband}},
publisher = {Oldenbourg-Verlag},
author = {Reuter, Christian and Mentler, Tilo and Geisler, Stefan and Herczeg, Michael and Ludwig, Thomas and Pipek, Volkmar and Nestler, Simon and Sautter, Johannes},
editor = {Weisbecker, Anette and Burmester, Michael and Schmidt, Albrecht},
year = {2015},
keywords = {Crisis, HCI, SocialMedia, Projekt-EmerGent},
}
[BibTeX] [Abstract] [Download PDF]
Mensch-Maschine-Interaktion in sicherheitskritischen Systemen ist ein für die Informatik und die jeweiligen Anwendungsdomänen in der Bedeutung weiter zunehmendes Thema. Dieser Workshop der GI-Fachgruppe „Mensch-Maschine-Interaktion in sicherheitskritischen Systemen“ innerhalb des Fach-bereichs Mensch-Computer-Interaktion soll aktuelle Entwicklungen und Fragestellungen offenlegen und neue Impulse für das Forschungsgebiet geben.
@inproceedings{reuter_editorial_2015,
title = {Editorial: {Mensch}-{Computer}-{Interaktion} und {Social} {Computing} in sicherheitskritischen {Systemen}},
url = {https://www.wineme.uni-siegen.de/paper/2015/2015_reuteretal_editorial-kritischehci_muc.pdf},
abstract = {Mensch-Maschine-Interaktion in sicherheitskritischen Systemen ist ein für die Informatik und die jeweiligen Anwendungsdomänen in der Bedeutung weiter zunehmendes Thema. Dieser Workshop der GI-Fachgruppe „Mensch-Maschine-Interaktion in sicherheitskritischen Systemen“ innerhalb des Fach-bereichs Mensch-Computer-Interaktion soll aktuelle Entwicklungen und Fragestellungen offenlegen und neue Impulse für das Forschungsgebiet geben.},
booktitle = {Mensch und {Computer} 2015 - {Workshopband}},
publisher = {Oldenbourg-Verlag},
author = {Reuter, Christian and Mentler, Tilo and Geisler, Stefan and Herczeg, Michael and Ludwig, Thomas and Pipek, Volkmar and Nestler, Simon and Sautter, Johannes},
editor = {Schmidt, Albrecht and Weisbecke, Anette and Burmester, Michael},
year = {2015},
keywords = {Crisis, HCI, SocialMedia, Projekt-EmerGent},
pages = {3--9},
}
[BibTeX] [Abstract] [Download PDF]
Der umfassende Einsatz sozialer Medien in Katastrophenlagen wurde in Deutschland erstmalig während des mitteleuropäischen Hochwassers im Frühjahr 2013 von einer breiten Öffentlichkeit wahrgenommen. Über Twitter, Facebook, Google Maps und weitere Plattformen koordinierten betroffene Bürger und freiwillige Helfer untereinander Hilfsaktivitäten und unterstützten den Katastrophenschutz. Zahlreiche Medien berichteten über dieses Phänomen. Dieser Artikel soll einen kleinen Überblick über das Thema geben.
@article{reuter_einsatz_2015,
title = {Der {Einsatz} sozialer {Medien} in {Katastrophenlagen}},
volume = {5},
url = {https://www.wineme.uni-siegen.de/paper/2015/2015_reuter_dereinsatzsozialermedieninkatastrophenlagen_crisisprevention.pdf},
abstract = {Der umfassende Einsatz sozialer Medien in Katastrophenlagen wurde in Deutschland erstmalig während des mitteleuropäischen Hochwassers im Frühjahr 2013 von einer breiten Öffentlichkeit wahrgenommen. Über Twitter, Facebook, Google Maps und weitere Plattformen koordinierten betroffene Bürger und freiwillige Helfer untereinander Hilfsaktivitäten und unterstützten den Katastrophenschutz. Zahlreiche Medien berichteten über dieses Phänomen. Dieser Artikel soll einen kleinen Überblick über das Thema geben.},
number = {4},
journal = {Crisis Prevention – Fachmagazin für Innere Sicherheit, Bevölkerungsschutz und Katastrophenhilfe},
author = {Reuter, Christian},
year = {2015},
keywords = {Crisis, HCI, SocialMedia, Projekt-EmerGent, Projekt-KOKOS},
pages = {43--44},
}
[BibTeX] [Abstract] [Download PDF]
Recent disasters have shown an increase in the significance of social media for both affected citizens and volunteers alike in the coordination of information and organization of relief activities, often independently of and in addition to the official emergency response. Existing research mainly focuses on the way in which individual platforms are used by volunteers in response to disasters. This paper examines the use of social media during the European Floods of 2013 and proposes a novel cross-social-media application for volunteers. Besides comprehensive analysis of volunteer communities, interviews were conducted with „digital volunteers“ such as Facebook moderators of disaster-related groups. Based on the challenges identified, we designed and implemented the cross-social-media application „XHELP“, which allows information to be both, acquired and distributed cross-media and cross-channel. The evaluation with 20 users leads to further design requirements for applications aiming to support volunteer moderators during disasters.
@inproceedings{reuter_xhelp_2015,
address = {Seoul, Korea},
title = {{XHELP}: {Design} of a {Cross}-{Platform} {Social}-{Media} {Application} to {Support} {Volunteer} {Moderators} in {Disasters}},
url = {http://www.peasec.de/paper/2015/2015_ReuterLudwigKaufholdPipek_XHELP_CHI.pdf},
doi = {10.1145/2702123.2702171},
abstract = {Recent disasters have shown an increase in the significance of social media for both affected citizens and volunteers alike in the coordination of information and organization of relief activities, often independently of and in addition to the official emergency response. Existing research mainly focuses on the way in which individual platforms are used by volunteers in response to disasters. This paper examines the use of social media during the European Floods of 2013 and proposes a novel cross-social-media application for volunteers. Besides comprehensive analysis of volunteer communities, interviews were conducted with "digital volunteers" such as Facebook moderators of disaster-related groups. Based on the challenges identified, we designed and implemented the cross-social-media application "XHELP", which allows information to be both, acquired and distributed cross-media and cross-channel. The evaluation with 20 users leads to further design requirements for applications aiming to support volunteer moderators during disasters.},
booktitle = {Proceedings of the {Conference} on {Human} {Factors} in {Computing} {Systems} ({CHI})},
publisher = {ACM Press},
author = {Reuter, Christian and Ludwig, Thomas and Kaufhold, Marc-André and Pipek, Volkmar},
year = {2015},
keywords = {Crisis, HCI, A-Paper, AuswahlKaufhold, Ranking-CORE-A*, Selected, AuswahlCrisis, SocialMedia, Cooperation, Projekt-EmerGent, Ranking-WKWI-A},
pages = {4093--4102},
}
[BibTeX] [Abstract] [Download PDF]
Human computer interaction in security and time-critical systems is an interdisciplinary challenge at the seams of human factors, engineering, information systems and computer science. Application fields include control systems, critical infrastructures, vehicle and traffic management, production technology, business continuity management, medical technology, crisis management and civil protection. Nowadays in many areas mobile and ubiquitous computing as well as social media and collaborative technologies also plays an important role. The specific challenges require the discussion and development of new methods and approaches in order to design information systems. These are going to be addressed in this special issue with a particular focus on technologies for citizen and volunteers in emergencies.
@book{reuter_special_2015-1,
title = {Special {Issue} on {Human} {Computer} {Interaction} in {Critical} {Systems} {I}: {Citizen} and {Volunteers} - {International} {Journal} of {Information} {Systems} for {Crisis} {Response} and {Management} ({IJISCRAM})},
volume = {7},
url = {https://www.wineme.uni-siegen.de/paper/2015/2015_ijiscram-specialissue_hci-criticalsystems-i.pdf},
abstract = {Human computer interaction in security and time-critical systems is an interdisciplinary challenge at the seams of human factors, engineering, information systems and computer science. Application fields include control systems, critical infrastructures, vehicle and traffic management, production technology, business continuity management, medical technology, crisis management and civil protection. Nowadays in many areas mobile and ubiquitous computing as well as social media and collaborative technologies also plays an important role. The specific challenges require the discussion and development of new methods and approaches in order to design information systems. These are going to be addressed in this special issue with a particular focus on technologies for citizen and volunteers in emergencies.},
number = {2},
publisher = {IGI Global},
author = {Reuter, Christian and Mentler, Tilo and Geisler, Stefan},
year = {2015},
note = {Publication Title: International Journal of Information Systems for Crisis Response and Management (IJISCRAM)},
keywords = {Crisis, HCI, SocialMedia, Projekt-EmerGent, Projekt-KOKOS},
}
[BibTeX] [Abstract] [Download PDF]
Human computer interaction in security and time-critical systems is an interdisciplinary challenge at the seams of human factors, engineering, information systems and computer science. Application fields include control systems, critical infrastructures, vehicle and traffic management, production technology, business continuity management, medical technology, crisis management and civil protection. Nowadays in many areas mobile and ubiquitous computing as well as social media and collaborative technologies also plays an important role. The specific challenges require the discussion and development of new methods and approaches in order to design information systems. These are going to be addressed in this special issue with a particular focus on technologies for critical practices for authorities and industry.
@article{reuter_guest_2015,
title = {Guest {Editorial} {Preface}: {Special} {Issue} on {Human} {Computer} {Interaction} in {Critical} {Systems} {II}: {Authorities} and {Industry}},
volume = {7},
url = {http://www.wineme.uni-siegen.de/paper/2015/2015_reuter_editorial-specialissue-hci-criticalsystems-ii.pdf},
abstract = {Human computer interaction in security and time-critical systems is an interdisciplinary challenge at the seams of human factors, engineering, information systems and computer science. Application fields include control systems, critical infrastructures, vehicle and traffic management, production technology, business continuity management, medical technology, crisis management and civil protection. Nowadays in many areas mobile and ubiquitous computing as well as social media and collaborative technologies also plays an important role. The specific challenges require the discussion and development of new methods and approaches in order to design information systems. These are going to be addressed in this special issue with a particular focus on technologies for critical practices for authorities and industry.},
number = {3},
journal = {International Journal of Information Systems for Crisis Response and Management (IJISCRAM)},
author = {Reuter, Christian},
year = {2015},
keywords = {HCI, SocialMedia, Projekt-EmerGent},
pages = {iv--vi},
}
[BibTeX] [Abstract] [Download PDF]
Maps, showing the tactical or the administrative situation at any particular time, play a central role in disaster management. They can be realized as interactive map mashups. In addition to classical information (weather, water levels, energy network, forces), they can also be used to present a view on citizen-generated content, e.g. from social media. In this paper we offer insights into how mobile map mashups can assist citizens during infrastructure failures that often occur in large-scale emergencies. Based on a review of approaches and mobile applications from literature and especially from practice, we present SOMAP (social offline map), a mobile app we developed in Android. It offers offline map functionality in terms of (A) pro-active loading and storing of potentially needed maps of the respective area as well as (B) the possibility of exchanging information from social media using Bluetooth. The application was evaluated qualitatively, to gain insights into the potential of such applications.
@inproceedings{reuter_somap_2015,
address = {Kristiansand, Norway},
title = {{SOMAP}: {Network} {Independent} {Social}-{Offline}-{Map}-{Mashup}},
url = {https://www.wineme.uni-siegen.de/paper/2015/2015_reuterludwigfunkepipek_somap-socialofflinemap_iscram.pdf},
abstract = {Maps, showing the tactical or the administrative situation at any particular time, play a central role in disaster management. They can be realized as interactive map mashups. In addition to classical information (weather, water levels, energy network, forces), they can also be used to present a view on citizen-generated content, e.g. from social media. In this paper we offer insights into how mobile map mashups can assist citizens during infrastructure failures that often occur in large-scale emergencies. Based on a review of approaches and mobile applications from literature and especially from practice, we present SOMAP (social offline map), a mobile app we developed in Android. It offers offline map functionality in terms of (A) pro-active loading and storing of potentially needed maps of the respective area as well as (B) the possibility of exchanging information from social media using Bluetooth. The application was evaluated qualitatively, to gain insights into the potential of such applications.},
booktitle = {Proceedings of the {Information} {Systems} for {Crisis} {Response} and {Management} ({ISCRAM})},
publisher = {ISCRAM},
author = {Reuter, Christian and Ludwig, Thomas and Funke, Timo and Pipek, Volkmar},
editor = {Palen, Leysia and Büscher, Monika and Comes, Tina and Hughes, Amanda Lee},
year = {2015},
keywords = {Student, Security, UsableSec, HCI, SocialMedia, Infrastructure, Cooperation, Projekt-EmerGent},
}
[BibTeX] [Abstract] [Download PDF]
Am Beispiel des Krisenmanagements untersucht die hier vorgestellte Dissertation die Herausforderungen und Möglichkeiten der Technologiegestaltung für emergente, d.h. dynamische und nicht vorhersehbare, Kontexte. Hierfür wird empirisch die kollaborative Arbeit von Polizei, Feuerwehr, Energienetzbetreibern und Bürgern im inter-organisationalen Katastrophenschutz erforscht, um exemplarische Kollaborationspraktiken zu ermitteln, die Limitationen der Arbeitsinfrastruktur aufdecken. Hierauf aufbauend werden neuartige Konzepte und IT-Artefakte gestaltet, implementiert und evaluiert, die emergente Kollaboration ermöglichen sollen. Neben der Erforschung potentieller organisationaler Effekte auf die Fähigkeit mit Emergenz umzugehen, werden methodische Implikationen für die Technologiegestaltung abgeleitet.
@incollection{reuter_emergente_2015,
title = {Emergente {Kollaborationsinfrastrukturen} – {Technologiegestaltung} am {Beispiel} des inter-organisationalen {Krisenmanagements}},
url = {https://www.wineme.uni-siegen.de/paper/2015/2015_reuter_emergentekollaborationstechnologien_gi-dissertationspreis.pdf},
abstract = {Am Beispiel des Krisenmanagements untersucht die hier vorgestellte Dissertation die Herausforderungen und Möglichkeiten der Technologiegestaltung für emergente, d.h. dynamische und nicht vorhersehbare, Kontexte. Hierfür wird empirisch die kollaborative Arbeit von Polizei, Feuerwehr, Energienetzbetreibern und Bürgern im inter-organisationalen Katastrophenschutz erforscht, um exemplarische Kollaborationspraktiken zu ermitteln, die Limitationen der Arbeitsinfrastruktur aufdecken. Hierauf aufbauend werden neuartige Konzepte und IT-Artefakte gestaltet, implementiert und evaluiert, die emergente Kollaboration ermöglichen sollen. Neben der Erforschung potentieller organisationaler Effekte auf die Fähigkeit mit Emergenz umzugehen, werden methodische Implikationen für die Technologiegestaltung abgeleitet.},
booktitle = {Ausgezeichnete {Informatikdissertationen} 2014. {GI}- {Edition}-{Lecture} {Notes} in {Informatics} ({LNI}), {D}-14},
publisher = {Bonner Köllen Verlag},
author = {Reuter, Christian},
editor = {Hölldobler, Steffen},
year = {2015},
keywords = {RSF, UsableSec, Crisis, HCI, SocialMedia, Infrastructure, Ranking-CORE-C, Ranking-VHB-C, Projekt-InfoStrom},
pages = {209--218},
}
[BibTeX] [Abstract] [Download PDF]
Human computer interaction in security and time-critical systems is an interdisciplinary challenge at the seams of human factors, engineering, information systems and computer science. Application fields include control systems, critical infrastructures, vehicle and traffic management, production technology, business continuity management, medical technology, crisis management and civil protection. Nowadays in many areas mobile and ubiquitous computing as well as social media and collaborative technologies also plays an important role. The specific challenges require the discussion and development of new methods and approaches in order to design information systems. These are going to be addressed in this special issue with a particular focus on technologies for citizen and volunteers in emergencies.
@article{reuter_guest_2015-1,
title = {Guest {Editorial} {Preface}: {Special} {Issue} on {Human} {Computer} {Interaction} in {Critical} {Systems} {I}: {Citizen} and {Volunteers}},
volume = {7},
url = {http://www.wineme.uni-siegen.de/paper/2015/2015_reuter_editorial-specialissue-hci-criticalsystems-i.pdf},
abstract = {Human computer interaction in security and time-critical systems is an interdisciplinary challenge at the seams of human factors, engineering, information systems and computer science. Application fields include control systems, critical infrastructures, vehicle and traffic management, production technology, business continuity management, medical technology, crisis management and civil protection. Nowadays in many areas mobile and ubiquitous computing as well as social media and collaborative technologies also plays an important role. The specific challenges require the discussion and development of new methods and approaches in order to design information systems. These are going to be addressed in this special issue with a particular focus on technologies for citizen and volunteers in emergencies.},
number = {2},
journal = {International Journal of Information Systems for Crisis Response and Management (IJISCRAM)},
author = {Reuter, Christian and Mentler, Tilo and Geisler, Stefan},
year = {2015},
keywords = {Crisis, HCI, SocialMedia, Projekt-EmerGent},
pages = {i--ix},
}
[BibTeX] [Abstract] [Download PDF]
Social media is much just used for private as well as business purposes, obviously, also during emergencies. Emergency services are often confronted with the amount of information from social media and might consider using them – or not using them. This article highlights the perception of emergency services on social media during emergencies. Within their European research project EMERGENT, the authors therefore conducted an interview study with emergency service staff (N=11) from seven European countries and eight different cities. Their results highlight the current and potential use of social media, the emergency service’s participation in research on social media as well as current challenges, benefits and future plans.
@article{reuter_social_2015,
title = {Social {Media} and {Emergency} {Services}? {Interview} {Study} on {Current} and {Potential} {Use} in 7 {European} {Countries}},
volume = {7},
url = {https://www.wineme.uni-siegen.de/paper/2015/2015_reuteretal_socialmediaemergencyservices-interview-study_ijiscram.pdf},
doi = {10.4018/IJISCRAM.2015040103},
abstract = {Social media is much just used for private as well as business purposes, obviously, also during emergencies. Emergency services are often confronted with the amount of information from social media and might consider using them – or not using them. This article highlights the perception of emergency services on social media during emergencies. Within their European research project EMERGENT, the authors therefore conducted an interview study with emergency service staff (N=11) from seven European countries and eight different cities. Their results highlight the current and potential use of social media, the emergency service's participation in research on social media as well as current challenges, benefits and future plans.},
number = {2},
journal = {International Journal of Information Systems for Crisis Response and Management (IJISCRAM)},
author = {Reuter, Christian and Ludwig, Thomas and Friberg, Therese and Pratzler-Wanczura, Sylvia and Gizikis, Alexis},
year = {2015},
keywords = {Crisis, HCI, SocialMedia, Projekt-EmerGent},
pages = {36--58},
}
2014
[BibTeX] [Abstract] [Download PDF]
This paper describes EmerGent which is a new EU FP7 project currently engaging with users, gathering requirements and writing initial technical specifications and deals with the impact of social media in emergency management. This paper describes the overall objectives of the project and the plans to create an online big data semantic store of social media will be outlined.
@inproceedings{greenlaw_emergent_2014,
address = {London, United Kingdom},
title = {The {EmerGent} project: {Emergency} {Management} in {Social} {Media} {Generation} – {Dealing} with {Big} {Data} from {Social} {Media} {Data} {Stream}},
url = {https://www.wineme.uni-siegen.de/paper/2014/2014_emergentbigdata_ucc.pdf},
doi = {10.1109/UCC.2014.111},
abstract = {This paper describes EmerGent which is a new EU FP7 project currently engaging with users, gathering requirements and writing initial technical specifications and deals with the impact of social media in emergency management. This paper describes the overall objectives of the project and the plans to create an online big data semantic store of social media will be outlined.},
booktitle = {Workshop on {Big} {Data}, {Intelligence} {Management} and {Analytics} {Workshop}. 7th {IEEE}/{ACM} {International} {Conference} on {Utility} and {Cloud} {Computing} ({UCC})},
author = {Greenlaw, Reynold and Muddiman, Andrew and Friberg, Therese and Moi, Matthias and Cristaldi, Massimo and Ludwig, Thomas and Reuter, Christian},
year = {2014},
keywords = {Crisis, HCI, SocialMedia, Projekt-EmerGent},
pages = {687--689},
}
[BibTeX] [Abstract] [Download PDF]
Dieser Artikel untersucht den Einsatz sozialer Medien während des Hochwassers 2013 in Deutschland. Über Twitter, Facebook, Google Maps und auf weiteren Plattformen koordinierten betroffene Bürger und freiwillige Helfer untereinander Hilfsaktivitäten und lieferten dabei einen ergänzenden und signifikanten Beitrag zum offiziellen Katastrophenschutz. Neben der qualitativen Analyse ausgewählter, entstandener Hilfsnetzwerke wurden zusätzlich Interviews mit Facebook-Gruppengründern geführt. Die Ziele dieser Studie liegen zum einen in der Analyse des Benutzungsverhaltens sozialer Medien in Katastrophenlagen, zum anderen in der Identifikation von Gestaltungs- und Erweiterungspotenzialen für soziale Medien im Katastrophenschutz.
@article{kaufhold_vernetzte_2014,
title = {Vernetzte {Selbsthilfe} in {Sozialen} {Medien} am {Beispiel} des {Hochwassers} 2013 / {Linked} {Self}-{Help} in {Social} {Media} using the example of the {Floods} 2013 in {Germany}},
volume = {13},
url = {https://www.wineme.uni-siegen.de/paper/2014/2014_kaufholdreuter_vernetzteselbsthilfehochwasser_icom.pdf},
doi = {https://doi.org/10.1515/icom-2014-0004},
abstract = {Dieser Artikel untersucht den Einsatz sozialer Medien während des Hochwassers 2013 in Deutschland. Über Twitter, Facebook, Google Maps und auf weiteren Plattformen koordinierten betroffene Bürger und freiwillige Helfer untereinander Hilfsaktivitäten und lieferten dabei einen ergänzenden und signifikanten Beitrag zum offiziellen Katastrophenschutz. Neben der qualitativen Analyse ausgewählter, entstandener Hilfsnetzwerke wurden zusätzlich Interviews mit Facebook-Gruppengründern geführt. Die Ziele dieser Studie liegen zum einen in der Analyse des Benutzungsverhaltens sozialer Medien in Katastrophenlagen, zum anderen in der Identifikation von Gestaltungs- und Erweiterungspotenzialen für soziale Medien im Katastrophenschutz.},
number = {1},
journal = {i-com - Zeitschrift für interaktive und kooperative Medien},
author = {Kaufhold, Marc-André and Reuter, Christian},
editor = {Pipek, Volkmar and Reuter, Christian},
year = {2014},
keywords = {Crisis, HCI, SocialMedia, Cooperation, Projekt-EmerGent},
pages = {20--28},
}
[BibTeX] [Abstract] [Download PDF]
Emergency or crisis management, as is well-attested, is a complex management problem. A variety of agencies need to collaborate and coordinate in real-time and with an urgency that is not always present in other domains. It follows that accurate information of varying kinds (e.g. geographical and weather conditions; available skills and expertises; state-of-play; current dispositions and deployments) needs to be made available in a timely fashion to the organizations and individuals who need it. By definition, this information will come from a number of sources both within and across organizations. Large-scale events in particular necessitate collaboration with other organizations. Of course, plans and processes exist to deal with such events but the number of dynamically changing factors as well as the high number of heterogeneous organizations and the high degree of interdependency involved make it impossible to plan for all contingencies. A degree of ongoing improvisation, which typically occurs by means of a variety of information and expertise sharing practices, therefore becomes necessary. This, however, faces many challenges, such as different organizational cultures, distinct individual and coordinative work practices and discrete information systems. Our work entails an examination of the practices of information and expertise sharing, and the obstacles to it, in inter-organizational crisis management. We conceive of this as a design case study, such that we examine a problem area and its scope; conduct detailed enquiries into practice in that area, and provide design recommendations for implementation and evaluation. First, we will present the results of an empirical study of collaboration practices between organizations and public authorities with security responsibilities such as the police, fire departments, public administration and electricity network operators, mainly in scenarios of medium to large power outages in Germany. Based on these results, we will describe a concept, which was designed, implemented and evaluated as a system prototype, in two iterations. While the first iteration focuses on situation assessment, the second iteration also includes inter-organizational collaboration functionalities. Based on the findings of our evaluations with practitioners, we will discuss how to support collaboration with a particular focus on information and expertise sharing.
@article{ley_information_2014,
title = {Information and {Expertise} {Sharing} in {Inter}-{Organizational} {Crisis} {Management}},
volume = {23},
url = {https://www.wineme.uni-siegen.de/paper/2014/2014_informationsharingcrisis_jcscw.pdf},
doi = {10.1007/s10606-014-9205-2},
abstract = {Emergency or crisis management, as is well-attested, is a complex management problem. A variety of agencies need to collaborate and coordinate in real-time and with an urgency that is not always present in other domains. It follows that accurate information of varying kinds (e.g. geographical and weather conditions; available skills and expertises; state-of-play; current dispositions and deployments) needs to be made available in a timely fashion to the organizations and individuals who need it. By definition, this information will come from a number of sources both within and across organizations. Large-scale events in particular necessitate collaboration with other organizations. Of course, plans and processes exist to deal with such events but the number of dynamically changing factors as well as the high number of heterogeneous organizations and the high degree of interdependency involved make it impossible to plan for all contingencies. A degree of ongoing improvisation, which typically occurs by means of a variety of information and expertise sharing practices, therefore becomes necessary. This, however, faces many challenges, such as different organizational cultures, distinct individual and coordinative work practices and discrete information systems. Our work entails an examination of the practices of information and expertise sharing, and the obstacles to it, in inter-organizational crisis management. We conceive of this as a design case study, such that we examine a problem area and its scope; conduct detailed enquiries into practice in that area, and provide design recommendations for implementation and evaluation. First, we will present the results of an empirical study of collaboration practices between organizations and public authorities with security responsibilities such as the police, fire departments, public administration and electricity network operators, mainly in scenarios of medium to large power outages in Germany. Based on these results, we will describe a concept, which was designed, implemented and evaluated as a system prototype, in two iterations. While the first iteration focuses on situation assessment, the second iteration also includes inter-organizational collaboration functionalities. Based on the findings of our evaluations with practitioners, we will discuss how to support collaboration with a particular focus on information and expertise sharing.},
number = {4-6},
journal = {Computer Supported Cooperative Work: The Journal of Collaborative Computing (JCSCW)},
author = {Ley, Benedikt and Ludwig, Thomas and Pipek, Volkmar and Randall, Dave and Reuter, Christian and Wiedenhoefer, Torben},
year = {2014},
keywords = {Crisis, HCI, A-Paper, Ranking-ImpactFactor, Cooperation, Ranking-CORE-B, Ranking-VHB-B, Projekt-InfoStrom},
pages = {347--387},
}
[BibTeX] [Abstract] [Download PDF]
Die im Katastrophenschutz beteiligten Behörden und Organisationen mit Sicherheitsaufgaben (BOS) benötigen für Entscheidungen stets möglichst aktuelle und genaue Informationen. Diese werden dabei je nach Lage von den Einsatzkräften, welche sich am Schadensort befinden, via Funk an die teilweise entfernt sitzenden Entscheidungsträger berichtet. Unsere Design-Fallstudie untersucht interaktive Unterstützungsmöglichkeiten dieser Berichts- bzw. Reporting-Prozesse: In einer qualitativen empirischen Studie deckten wir die Kommunikationspraktiken von BOS auf und entwickelten darauf aufbauend ein Konzept zur semi-strukturierten Artikulation von Informationsbedarfen, welches als mobile Android Applikation implementiert und mit potentiellen Nutzern evaluiert wurde. Unser Beitrag präsentiert, wie zielgerichtete Anfragen von Informationen unter Berücksichtigung angemessener Metadaten das Berichts- und Meldewesen örtlich verteilter Einsatzkräfte unterstützen können.
@inproceedings{ludwig_entwicklung_2014,
address = {Stuttgart, Germany},
title = {Entwicklung einer mobilen {Reporting}-{Applikation} zur {Artikulation} entscheidungsrelevanter {Informationsbedarfe} im {Katastrophenschutz}},
url = {https://www.wineme.uni-siegen.de/paper/2014/2014_ludwigreuter_morepartikulation_inf.pdf},
abstract = {Die im Katastrophenschutz beteiligten Behörden und Organisationen mit Sicherheitsaufgaben (BOS) benötigen für Entscheidungen stets möglichst aktuelle und genaue Informationen. Diese werden dabei je nach Lage von den Einsatzkräften, welche sich am Schadensort befinden, via Funk an die teilweise entfernt sitzenden Entscheidungsträger berichtet. Unsere Design-Fallstudie untersucht interaktive Unterstützungsmöglichkeiten dieser Berichts- bzw. Reporting-Prozesse: In einer qualitativen empirischen Studie deckten wir die Kommunikationspraktiken von BOS auf und entwickelten darauf aufbauend ein Konzept zur semi-strukturierten Artikulation von Informationsbedarfen, welches als mobile Android Applikation implementiert und mit potentiellen Nutzern evaluiert wurde. Unser Beitrag präsentiert, wie zielgerichtete Anfragen von Informationen unter Berücksichtigung angemessener Metadaten das Berichts- und Meldewesen örtlich verteilter Einsatzkräfte unterstützen können.},
booktitle = {Informatik 2014 - {Big} {Data} - {Komplexität} meistern},
publisher = {GI-Edition-Lecture Notes in Informatics (LNI)},
author = {Ludwig, Thomas and Reuter, Christian},
editor = {Plöderereder, E. and Grunske, L. and Schneider, E. and Ull, D.},
year = {2014},
keywords = {Crisis, HCI, Cooperation, Ranking-CORE-C, Ranking-VHB-C, Projekt-InfoStrom},
pages = {941--952},
}
[BibTeX] [Download PDF]
@book{pipek_special_2014,
title = {Special {Issue} zu "{Interaktion} und {Kooperation} im {Krisenmanagement}" - i-com - {Zeitschrift} für interaktive und kooperative {Medien}},
volume = {13},
url = {http://www.peasec.de/paper/2014/2014_PipekReuter_Eds_SpecialIssueKrisenmanagement_ICOM.pdf},
number = {1},
author = {Pipek, Volkmar and Reuter, Christian},
year = {2014},
note = {Publication Title: i-com - Zeitschrift für interaktive und kooperative Medien},
keywords = {Crisis, HCI},
}
[BibTeX] [Download PDF]
@article{pipek_forschungsherausforderungen_2014,
title = {Forschungsherausforderungen der {Interaktion} und {Kooperation} im {Krisenmanagement}},
volume = {13},
url = {https://www.wineme.uni-siegen.de/paper/2014/2014_pipekreuter_forschungsherausforderungenkrisen_icom.pdf},
number = {1},
journal = {i-com - Zeitschrift für interaktive und kooperative Medien},
author = {Pipek, Volkmar and Reuter, Christian},
year = {2014},
keywords = {HCI, Cooperation, Projekt-EmerGent},
pages = {1--3},
}
[BibTeX] [Abstract] [Download PDF]
The complexity and interconnectedness of current working environments encourages organizations, businesses and individuals to collaborate beyond spatial, temporal as well as organizational boundaries. These collaborations are potentially supported by information and communication technology (ICT) among mobile and ubiquitous systems. The academic field Computer-Supported Cooperative Work (CSCW) is primarily recognized for focusing on ICT support for collaboration practices as opposed to the computerizing of formal procedures. ICT, in this view, needs to reflect the dynamic nature of cooperation and collaboration. The notion emergence as coined by Lewes (1875) and interpreted by Goldstein (1999) refers to dynamic contexts that cannot be anticipated in their full extent before they actually occur. Emergent collaboration refers to the need for spontaneous collaboration in novel and changing structures and occurs in application fields such as inter-organizational crisis and emergency management, which by definition contain the unforeseeable. This dissertation contributes to research into infrastructures for emergent collaboration. Using the example of crisis management, it addresses (1) emergent collaboration practices and how they reveal work infrastructure limitations, (2) novel concepts and artifacts to support emergent collaboration, (3) their effects on the ability to deal with emergent situations and (4) methodological implications for technology design for emergent collaboration infrastructures in inter-organizational settings. Design case studies (Wulf et al., 2011), inspired by action research (Lewin, 1958) and following Hevner and Chatterjee’s suggestion (2010) to integrate action research with design research, are applied as a practice oriented research method. They contain three phases: an empirical analysis of the practices in the field, the development of innovative ICT artifacts with continuous participation of end-users related to the empirical findings and the evaluation of their appropriation (Pipek, 2005) in practice. In the case reported here, the empirical study on emergent collaboration by police and fire services, aid agencies, energy network operators and citizens in emergencies in two counties in Germany outlined the importance of improvisation work in situation assessment as well as mobile collaboration and reporting practices. The ICT design aimed towards the support of these emergent practices, illustrated by various concepts and prototypes. They comprise (1) an inter-organizational social network for emergency management (SiRena), (2) an inter-organizational situation assessment client (ISAC) aswell as mobile applications for (3) the ad hoc participation in mobile collaboration (MoCo) and (4) the articulation of information needs in mobile reporting (MoRep). Based on the empirical, technical and practical findings, the subsequent analysis uses the concept of infrastructuring (Pipek & Wulf, 2009), the integrated perspective on the design and use of information systems, and derives implications for emergent collaboration infrastructures, which contribute overall to the academic fields CSCW, Human Computer Interaction (HCI) and Information Systems (IS).
@book{reuter_emergent_2014,
address = {University of Siegen, Institute for Information Systems, Germany},
title = {Emergent {Collaboration} {Infrastructures}: {Technology} {Design} for {Inter}-{Organizational} {Crisis} {Management} ({Ph}.{D}. {Thesis})},
url = {http://dx.doi.org/10.25819/ubsi/10370},
abstract = {The complexity and interconnectedness of current working environments encourages organizations, businesses and individuals to collaborate beyond spatial, temporal as well as organizational boundaries. These collaborations are potentially supported by information and communication technology (ICT) among mobile and ubiquitous systems. The academic field Computer-Supported Cooperative Work (CSCW) is primarily recognized for focusing on ICT support for collaboration practices as opposed to the computerizing of formal procedures. ICT, in this view, needs to reflect the dynamic nature of cooperation and collaboration. The notion emergence as coined by Lewes (1875) and interpreted by Goldstein (1999) refers to dynamic contexts that cannot be anticipated in their full extent before they actually occur. Emergent collaboration refers to the need for spontaneous collaboration in novel and changing structures and occurs in application fields such as inter-organizational crisis and emergency management, which by definition contain the unforeseeable.
This dissertation contributes to research into infrastructures for emergent collaboration. Using the example of crisis management, it addresses (1) emergent collaboration practices and how they reveal work infrastructure limitations, (2) novel concepts and artifacts to support emergent collaboration, (3) their effects on the ability to deal with emergent situations and (4) methodological implications for technology design for emergent collaboration infrastructures in inter-organizational settings.
Design case studies (Wulf et al., 2011), inspired by action research (Lewin, 1958) and following Hevner and Chatterjee’s suggestion (2010) to integrate action research with design research, are applied as a practice oriented research method. They contain three phases: an empirical analysis of the practices in the field, the development of innovative ICT artifacts with continuous participation of end-users related to the empirical findings and the evaluation of their appropriation (Pipek, 2005) in practice. In the case reported here, the empirical study on emergent collaboration by police and fire services, aid agencies, energy network operators and citizens in emergencies in two counties in Germany outlined the importance of improvisation work in situation assessment as well as mobile collaboration and reporting practices. The ICT design aimed towards the support of these emergent practices, illustrated by various concepts and prototypes. They comprise (1) an inter-organizational social network for emergency management (SiRena), (2) an inter-organizational situation assessment client (ISAC) aswell as mobile applications for (3) the ad hoc participation in mobile collaboration (MoCo) and (4) the articulation of information needs in mobile reporting (MoRep).
Based on the empirical, technical and practical findings, the subsequent analysis uses the concept of infrastructuring (Pipek \& Wulf, 2009), the integrated perspective on the design and use of information systems, and derives implications for emergent collaboration infrastructures, which contribute overall to the academic fields CSCW, Human Computer Interaction (HCI) and Information Systems (IS).},
publisher = {Universitätsbibliothek Siegen},
author = {Reuter, Christian},
year = {2014},
doi = {http://dx.doi.org/10.25819/ubsi/10370},
keywords = {UsableSec, HCI, SocialMedia, Infrastructure, Projekt-EmerGent, Dissertation, Projekt-InfoStrom},
}
[BibTeX] [Abstract] [Download PDF]
Using the domain of crisis management, Christian Reuter explores challenges and opportunities for technology design in emergent environments. He therefore empirically analyzes collaborative work in inter-organizational crisis – such as the police, fire departments, energy network operators and citizens – in order to identify collaboration practices that reveal work infrastructure limitations. He also designs, implements and evaluates novel concepts and ICT artifacts towards the support of emergent collaboration. Besides the discovery of potential organizational effects on the ability to deal with emergence he presents methodological implications for technology design.
@book{reuter_emergent_2014-1,
address = {University of Siegen, Institute for Information Systems, Germany},
title = {Emergent {Collaboration} {Infrastructures}: {Technology} {Design} for {Inter}-{Organizational} {Crisis} {Management} ({Ph}.{D}. {Thesis})},
isbn = {978-3-658-08585-8},
url = {http://www.springer.com/springer+gabler/bwl/wirtschaftsinformatik/book/978-3-658-08585-8},
abstract = {Using the domain of crisis management, Christian Reuter explores challenges and opportunities for technology design in emergent environments. He therefore empirically analyzes collaborative work in inter-organizational crisis – such as the police, fire departments, energy network operators and citizens – in order to identify collaboration practices that reveal work infrastructure limitations. He also designs, implements and evaluates novel concepts and ICT artifacts towards the support of emergent collaboration. Besides the discovery of potential organizational effects on the ability to deal with emergence he presents methodological implications for technology design.},
publisher = {Springer Gabler},
author = {Reuter, Christian},
year = {2014},
doi = {10.1007/978-3-658-08586-5},
note = {Backup Publisher: University of Siegen},
keywords = {UsableSec, HCI, AuswahlUsableSec, Selected, SocialMedia, Infrastructure, Projekt-EmerGent, Projekt-InfoStrom, DissPublisher},
}
[BibTeX] [Abstract] [Download PDF]
Mensch-Computer-Interaktion und Social Computing spielen auch in Krisensituationen eine große Rolle. Durch die größere Verbreitung mobiler und ubiquitärer Technologien sowie die zunehmende Durchdringung sozialer und kooperativer Medien im Alltag haben sich auch im Bereich des Krisenmanagements und der zivilen Sicherheitsforschung neue Möglichkeiten und Potenziale, aber auch Problembereiche entwickelt, die besonderer Aufmerksamkeit bedürfen. Neue Ansätze und Prototypen adressieren Interaktionen und Kooperationen innerhalb und zwischen klassischen Behörden und Organisationen mit Sicherheitsaufgaben (BOS), aber zunehmend auch die Einbeziehung der von der Krise betroffenen Akteure aus den Bereichen der Industrie und der Bürger, die eine Rolle als aktive Krisenmanager wahrnehmen und BOS unterstützen.
@inproceedings{reuter_proceedings_2014,
address = {München, Germany},
title = {Proceedings des {Workshops} "{Mensch}-{Computer}-{Interaktion} und {Social} {Computing} in {Krisensituationen}"},
url = {https://peasec.de/paper/2014/2014_Reuteretal_Eds_KrisenMCI_MuC.pdf},
abstract = {Mensch-Computer-Interaktion und Social Computing spielen auch in Krisensituationen eine große Rolle. Durch die größere Verbreitung mobiler und ubiquitärer Technologien sowie die zunehmende Durchdringung sozialer und kooperativer Medien im Alltag haben sich auch im Bereich des Krisenmanagements und der zivilen Sicherheitsforschung neue Möglichkeiten und Potenziale, aber auch Problembereiche entwickelt, die besonderer Aufmerksamkeit bedürfen. Neue Ansätze und Prototypen adressieren Interaktionen und Kooperationen innerhalb und zwischen klassischen Behörden und Organisationen mit Sicherheitsaufgaben (BOS), aber zunehmend auch die Einbeziehung der von der Krise betroffenen Akteure aus den Bereichen der Industrie und der Bürger, die eine Rolle als aktive Krisenmanager wahrnehmen und BOS unterstützen.},
booktitle = {Mensch und {Computer} 2014 - {Workshopband}},
publisher = {Oldenbourg-Verlag},
author = {Reuter, Christian and Ludwig, Thomas and Pipek, Volkmar and Herczeg, Michael and Mentler, Tilo and Nestler, Simon and Sautter, Johannes},
editor = {Koch, Michael and Butz, Andreas and Schlichter, Johann},
year = {2014},
keywords = {Crisis, HCI, SocialMedia, Projekt-EmerGent},
pages = {99--140},
}
[BibTeX] [Abstract] [Download PDF]
Die Mensch-Computer-Interaktion und Social Computing in Krisensituationen wird auch in Zukunft eine große Rolle spielen. Mit diesem Workshop möchten wir einen kleinen Beitrag leisten, diese Entwicklung in sinnvoller Weise mitzugestalten.
@inproceedings{reuter_editorial_2014,
address = {München, Germany},
title = {Editorial: {Mensch}-{Computer}-{Interaktion} und {Social} {Computing} in {Krisensituationen}},
url = {https://www.wineme.uni-siegen.de/paper/2014/2014_reuteretal_mci-krisen-editorial_muc.pdf},
abstract = {Die Mensch-Computer-Interaktion und Social Computing in Krisensituationen wird auch in Zukunft eine große Rolle spielen. Mit diesem Workshop möchten wir einen kleinen Beitrag leisten, diese Entwicklung in sinnvoller Weise mitzugestalten.},
booktitle = {Mensch und {Computer} 2014 - {Workshopband}},
publisher = {Oldenbourg-Verlag},
author = {Reuter, Christian and Ludwig, Thomas and Pipek, Volkmar and Herczeg, Michael and Mentler, Tilo and Nestler, Simon and Sautter, Johannes},
editor = {Koch, Michael and Butz, Andreas and Schlichter, Johann},
year = {2014},
keywords = {Crisis, HCI, Projekt-EmerGent},
pages = {101--104},
}
[BibTeX] [Abstract] [Download PDF]
Dieser Beitrag soll aufzeigen, wie ein anpassbarer Bewertungsdienst die Nutzung bürgergenerierter Inhalte aus sozialen Medien unterstützen kann. Dabei soll insbesondere geklärt werden, wie dieser gestaltet werden kann und wie Nutzer die Qualitätskriterien angemessen artikulieren können. Nach einer Darstellung von Grundlagen und verwandten Arbeiten wird anhand einer empirischen Vorstudie der Umgang von Behörden und Organisationen mit Sicherheitsaufgaben (BOS) mit bürgergenerierten Informationen betrachtet. Basierend auf den dort gewonnen Erkenntnissen wurde ein service-orientierter Bewertungsdienst entwickelt und in eine Anwendung integriert, welche so den Zugang zu bürgergenerierten Informationen aus verschiedenen sozialen Medien inklusive einer anpassbaren Qualitätsbewertung ermöglicht. Eine abschließende Evaluation illustriert deren mögliche Anwendung in der Praxis.
@inproceedings{reuter_entwicklung_2014,
address = {Stuttgart, Germany},
title = {Entwicklung eines {SOA}-basierten und anpassbaren {Bewertungsdienstes} für {Inhalte} aus sozialen {Medien}},
url = {https://www.wineme.uni-siegen.de/paper/2014/2014_reuterritzkatisludwig-soabewertungsozialemedien_inf.pdf},
abstract = {Dieser Beitrag soll aufzeigen, wie ein anpassbarer Bewertungsdienst die Nutzung bürgergenerierter Inhalte aus sozialen Medien unterstützen kann. Dabei soll insbesondere geklärt werden, wie dieser gestaltet werden kann und wie Nutzer die Qualitätskriterien angemessen artikulieren können. Nach einer Darstellung von Grundlagen und verwandten Arbeiten wird anhand einer empirischen Vorstudie der Umgang von Behörden und Organisationen mit Sicherheitsaufgaben (BOS) mit bürgergenerierten Informationen betrachtet. Basierend auf den dort gewonnen Erkenntnissen wurde ein service-orientierter Bewertungsdienst entwickelt und in eine Anwendung integriert, welche so den Zugang zu bürgergenerierten Informationen aus verschiedenen sozialen Medien inklusive einer anpassbaren Qualitätsbewertung ermöglicht. Eine abschließende Evaluation illustriert deren mögliche Anwendung in der Praxis.},
booktitle = {Informatik 2014 - {Big} {Data} - {Komplexität} meistern},
publisher = {GI-Edition-Lecture Notes in Informatics (LNI)},
author = {Reuter, Christian and Ritzkatis, Michael and Ludwig, Thomas},
editor = {Plöderereder, E. and Grunske, L. and Schneider, E. and Ull, D.},
year = {2014},
keywords = {UsableSec, Crisis, HCI, SocialMedia, Projekt-EmerGent, Ranking-CORE-C, Ranking-VHB-C},
pages = {977--988},
}
[BibTeX] [Abstract] [Download PDF]
Zwei Drittel aller Internetnutzer in Deutschland nutzen soziale Medien. Neben der Kommunikation mit eigenen Kontakten werden dort auch vermehrt Fotos, Filme und Inhalte ganz bewusst öffentlich geteilt. Vergangene Ereignisse, wie das Hochwasser in Mitteleuropa im Juni 2013, haben gezeigt, dass diese alltäglichen Verhaltensweisen ebenso in Ausnahmesituationen fortgeführt werden und bürgergenierte Inhalte auch dann beispielsweise über Facebook und Twitter verbreitet werden. Diese werden in Teilen von Behörden und Organisationen mit Sicherheitsaufgaben (BOS), wie der Polizei und Feuerwehr, ausgewertet und für die Lagebeurteilung genutzt. Dieser Beitrag stellt, basierend auf einer Analyse verwandter Arbeiten, die Ergebnisse einer empirischen Untersuchung zur Nutzung bürgergenerierter Inhalte und die Bedingungen für deren Integration in die Lagebeurteilung durch BOS dar. Die hieraus gewonnenen Erkenntnisse münden in Anforderungen an einen adaptierbaren Bewertungsmechanismus für bürgergenerierte Inhalte aus sozialen Medien.
@inproceedings{reuter_adaptierbare_2014,
address = {München, Germany},
title = {Adaptierbare {Bewertung} bürgergenerierter {Inhalte} aus sozialen {Medien}},
url = {https://dl.gi.de/bitstream/handle/20.500.12116/7536/Reuter_Ritzkatis_2014.pdf},
abstract = {Zwei Drittel aller Internetnutzer in Deutschland nutzen soziale Medien. Neben der Kommunikation mit eigenen Kontakten werden dort auch vermehrt Fotos, Filme und Inhalte ganz bewusst öffentlich geteilt. Vergangene Ereignisse, wie das Hochwasser in Mitteleuropa im Juni 2013, haben gezeigt, dass diese alltäglichen Verhaltensweisen ebenso in Ausnahmesituationen fortgeführt werden und bürgergenierte Inhalte auch dann beispielsweise über Facebook und Twitter verbreitet werden. Diese werden in Teilen von Behörden und Organisationen mit Sicherheitsaufgaben (BOS), wie der Polizei und Feuerwehr, ausgewertet und für die Lagebeurteilung genutzt. Dieser Beitrag stellt, basierend auf einer Analyse verwandter Arbeiten, die Ergebnisse einer empirischen Untersuchung zur Nutzung bürgergenerierter Inhalte und die Bedingungen für deren Integration in die Lagebeurteilung durch BOS dar. Die hieraus gewonnenen Erkenntnisse münden in Anforderungen an einen adaptierbaren Bewertungsmechanismus für bürgergenerierte Inhalte aus sozialen Medien.},
booktitle = {Mensch \& {Computer}: {Interaktiv} unterwegs – {Freiräume} gestalten},
publisher = {Oldenbourg-Verlag},
author = {Reuter, Christian and Ritzkatis, Michael},
editor = {Koch, Michael and Butz, Andreas and Schlichter, Johann},
year = {2014},
keywords = {Student, Crisis, HCI, SocialMedia, Projekt-EmerGent},
pages = {115--124},
}
[BibTeX] [Abstract] [Download PDF]
Emergencies are characterized by high complexity and unpredictability. In order to assess and manage them successfully, improvisation work and informal communication, even beyond local and organizational boundaries, is needed. Such informal practices can facilitate ad hoc participation of units in situation assessment, but this may lack overall situation awareness. This paper presents a study on how emergent ‘collaboration needs‘ in current work of response teams, who are located on-site and in the control center, could be supported by mobile geo-collaboration systems. First, we present the results of an empirical study about informal work and mobile collaboration practices of emergency services. Then we describe the concept of a mobile geo-collaboration system that addresses the aspects detected in the empirical study and that was implemented as an Android application using web sockets, a technology enabling full-duplex ad hoc communication. Finally we outline the findings of its evaluation in practice and its implications.
@article{reuter_ad_2014,
title = {Ad {Hoc} {Participation} in {Situation} {Assessment}: {Supporting} {Mobile} {Collaboration} in {Emergencies}},
volume = {21},
url = {http://www.wineme.uni-siegen.de/paper/2014/2014_reuterludwigpipek_adhocparticipation_tochi.pdf},
doi = {10.1145/2651365},
abstract = {Emergencies are characterized by high complexity and unpredictability. In order to assess and manage them successfully, improvisation work and informal communication, even beyond local and organizational boundaries, is needed. Such informal practices can facilitate ad hoc participation of units in situation assessment, but this may lack overall situation awareness. This paper presents a study on how emergent ‘collaboration needs' in current work of response teams, who are located on-site and in the control center, could be supported by mobile geo-collaboration systems. First, we present the results of an empirical study about informal work and mobile collaboration practices of emergency services. Then we describe the concept of a mobile geo-collaboration system that addresses the aspects detected in the empirical study and that was implemented as an Android application using web sockets, a technology enabling full-duplex ad hoc communication. Finally we outline the findings of its evaluation in practice and its implications.},
number = {5},
journal = {ACM Transactions on Computer-Human Interaction (TOCHI)},
author = {Reuter, Christian and Ludwig, Thomas and Pipek, Volkmar},
month = nov,
year = {2014},
note = {Publisher: ACM},
keywords = {UsableSec, Crisis, HCI, A-Paper, AuswahlUsableSec, Ranking-CORE-A*, Selected, Ranking-ImpactFactor, Cooperation, Ranking-VHB-B, Ranking-WKWI-A, Projekt-InfoStrom},
pages = {1--26},
}
2013
[BibTeX] [Abstract] [Download PDF]
Collaborative software supports teams involved in a common task in generating and sharing information over geographic distances. Such software is used in the cooperation between organisations, companies or individuals. The overall quality of the resulting information product depends on the quality of the individual contributions as well as on an underlying consolidation process. We therefore present different ‘composition functions‘ indicating how the qualities of the contributions by single actors (qi) influence the quality of the aggregated information product (Q). Based upon a qualitative empirical study of inter-organizational crisis management in Germany we match use cases with those composition functions and derive implications for the design of collaborative software.
@article{christofzik_aggregation_2013,
title = {The {Aggregation} of {Information} {Qualities} in {Collaborative} {Software}},
volume = {5},
url = {http://www.peasec.de/paper/2013/2013_ChristofzikReuter_InformationQualities_IJEV.pdf},
abstract = {Collaborative software supports teams involved in a common task in generating and sharing information over geographic distances. Such software is used in the cooperation between organisations, companies or individuals. The overall quality of the resulting information product depends on the quality of the individual contributions as well as on an underlying consolidation process. We therefore present different ‘composition functions' indicating how the qualities of the contributions by single actors (qi) influence the quality of the aggregated information product (Q). Based upon a qualitative empirical study of inter-organizational crisis management in Germany we match use cases with those composition functions and derive implications for the design of collaborative software.},
number = {3},
journal = {International Journal of Entrepreneurial Venturing (IJEV)},
author = {Christofzik, Désirée and Reuter, Christian},
year = {2013},
keywords = {HCI, SocialMedia, Ranking-VHB-B, Projekt-InfoStrom},
pages = {257--271},
}
[BibTeX] [Abstract] [Download PDF]
Social Media wird zunehmend von Betroffenen und Selbsthilfegemeinschaften in Katastrophenlagen genutzt. In diesem Beitrag werden Studien zu ‚virtuellen‘ und ‚realen‘ Selbsthilfeaktivitäten dargestellt. Untersucht wurden zum einen ‚virtuelle‘ Selbsthilfeaktivitäten in Twitter während der Tornadokatastrophe in den USA am 27./28.4.2011 mit besonderem Fokus auf die zeitlichen Verläufe und Nutzergruppen; zum anderen ‚reale‘ Selbsthilfe anhand Interviews mit Behörden und Organisationen mit Sicherheitsaufgaben (BOS). Hierauf aufbauend werden Gestaltungsaspekte und Anforderungen für Social Media zur Unterstützung von Krisenhelfern bzw. Selbst- und Nachbarschafts- hilfe und zur Kombination von virtuellen und realen Aktivitäten im Katastrophenmanagement diskutiert.
@inproceedings{heger_it-basierte_2013,
address = {Leipzig, Germany},
title = {{IT}-basierte {Unterstützung} virtueller und realer {Selbsthilfegemeinschaften} in {Katastrophenlagen}},
url = {http://www.peasec.de/paper/2013/2013_HegerReuter_IT-Selbsthilfegemeinschaften_WI.pdf},
abstract = {Social Media wird zunehmend von Betroffenen und Selbsthilfegemeinschaften in Katastrophenlagen genutzt. In diesem Beitrag werden Studien zu ‚virtuellen‘ und ‚realen‘ Selbsthilfeaktivitäten dargestellt. Untersucht wurden zum einen ‚virtuelle‘ Selbsthilfeaktivitäten in Twitter während der Tornadokatastrophe in den USA am 27./28.4.2011 mit besonderem Fokus auf die zeitlichen Verläufe und Nutzergruppen; zum anderen ‚reale‘ Selbsthilfe anhand Interviews mit Behörden und Organisationen mit Sicherheitsaufgaben (BOS). Hierauf aufbauend werden Gestaltungsaspekte und Anforderungen für Social Media zur Unterstützung von Krisenhelfern bzw. Selbst- und Nachbarschafts- hilfe und zur Kombination von virtuellen und realen Aktivitäten im Katastrophenmanagement diskutiert.},
booktitle = {Proceedings of the {International} {Conference} on {Wirtschaftsinformatik} ({WI})},
author = {Heger, Oliver and Reuter, Christian},
editor = {Alt, Rainer and Franczyk, Bogdan},
year = {2013},
keywords = {Crisis, HCI, SocialMedia, Cooperation, Ranking-CORE-C, Ranking-VHB-C, Ranking-WKWI-A, Projekt-InfoStrom},
pages = {1861--1875},
}
[BibTeX] [Abstract] [Download PDF]
Decisions of emergency response organisations (police, fire fighters, infrastructure providers, etc.) rely on accurate and timely information. Some necessary information is integrated into control centre’s IT (weather, availability of electricity, gauge information, etc.), but almost every decision needs to be based on very specific information of the current crisis situation. Due to the unpredictable nature of a crisis, gathering this kind of information requires much improvisation and articulation work which we aim to support. We present a study on how different emergency response organisations communicate with teams on-site to generate necessary information for the coordinating instances, and we described, implemented and evaluated an interaction concept as well as a prototype to support this communication by a semi-structured request-and-report system based on Android devices. We learned that (1) the accuracy of request and reports can be improved by using an appropriate metadata structure in addition to creating multimedia-based information content, (2) requirements of trusted and fast information need to be respected in support concepts although they may even be contradictory, and (3) the coordination strategy of the emergency response organisation also shapes the way this interaction needs to be designed.
@inproceedings{ludwig_what_2013,
address = {Paphos, Cyrus},
title = {What {You} {See} {Is} {What} {I} {Need}: {Mobile} {Reporting} {Practices} in {Emergencies}},
url = {http://link.springer.com/chapter/10.1007/978-1-4471-5346-7_10},
doi = {10.1007/978-1-4471-5346-7_10},
abstract = {Decisions of emergency response organisations (police, fire fighters, infrastructure providers, etc.) rely on accurate and timely information. Some necessary information is integrated into control centre's IT (weather, availability of electricity, gauge information, etc.), but almost every decision needs to be based on very specific information of the current crisis situation. Due to the unpredictable nature of a crisis, gathering this kind of information requires much improvisation and articulation work which we aim to support. We present a study on how different emergency response organisations communicate with teams on-site to generate necessary information for the coordinating instances, and we described, implemented and evaluated an interaction concept as well as a prototype to support this communication by a semi-structured request-and-report system based on Android devices. We learned that (1) the accuracy of request and reports can be improved by using an appropriate metadata structure in addition to creating multimedia-based information content, (2) requirements of trusted and fast information need to be respected in support concepts although they may even be contradictory, and (3) the coordination strategy of the emergency response organisation also shapes the way this interaction needs to be designed.},
booktitle = {Proceedings of the {European} {Conference} on {Computer} {Supported} {Cooperative} {Work} ({ECSCW})},
publisher = {Springer},
author = {Ludwig, Thomas and Reuter, Christian and Pipek, Volkmar},
editor = {Bertelsen, Olav W. and Ciolfi, Luigina and Grasso, Antonietta and Papadopoulos, George Angelos},
year = {2013},
keywords = {Crisis, HCI, A-Paper, Cooperation, Ranking-CORE-B, Projekt-InfoStrom, Ranking-WKWI-C},
pages = {181--206},
}
[BibTeX] [Abstract] [Download PDF]
Die im Katastrophenschutz beteiligten Behörden und Organisationen mit Sicherheitsaufgaben (BOS) benötigen für Entscheidungen eine aktuelle und akkurate Informationsbasis. Einige dieser Informationen, z.B. Wetterinformationen, können über externe Dienste in Leitstellensystemen visualisiert werden. Andere müssen seitens der zuständigen Einheiten vor Ort via Funk gemeldet werden. Unsere Design-Fallstudie untersucht interaktive Unterstützungsmöglichkeiten dieser Reporting-Prozesse: In einer qualitativen empirischen Studie wurden die Kommunikationspraktiken von Polizei und Feuerwehr untersucht. Darauf aufbauend wurde ein Konzept zur semi-strukturierten Artikulation von Informationsbedarfen erstellt, welches als mobile Android Applikation implementiert und mit potentiellen Nutzern evaluiert wurde. Unser Beitrag illustriert, wie zielgerichtete Informationsanfragen unter Berück-sichtigung angemessener Metadaten das Reporting örtlich verteilter Einsatzkräfte unterstützen können.
@inproceedings{ludwig_mobiler_2013,
address = {Bremen, Germany},
title = {Mobiler {Reporting}-{Mechanismus} für örtlich verteilte {Einsatzkräfte}},
url = {http://www.peasec.de/paper/2013/2013_LudwigReuterPipek_MobileReporting_MenschComputer.pdf},
abstract = {Die im Katastrophenschutz beteiligten Behörden und Organisationen mit Sicherheitsaufgaben (BOS) benötigen für Entscheidungen eine aktuelle und akkurate Informationsbasis. Einige dieser Informationen, z.B. Wetterinformationen, können über externe Dienste in Leitstellensystemen visualisiert werden. Andere müssen seitens der zuständigen Einheiten vor Ort via Funk gemeldet werden. Unsere Design-Fallstudie untersucht interaktive Unterstützungsmöglichkeiten dieser Reporting-Prozesse: In einer qualitativen empirischen Studie wurden die Kommunikationspraktiken von Polizei und Feuerwehr untersucht. Darauf aufbauend wurde ein Konzept zur semi-strukturierten Artikulation von Informationsbedarfen erstellt, welches als mobile Android Applikation implementiert und mit potentiellen Nutzern evaluiert wurde. Unser Beitrag illustriert, wie zielgerichtete Informationsanfragen unter Berück-sichtigung angemessener Metadaten das Reporting örtlich verteilter Einsatzkräfte unterstützen können.},
booktitle = {Mensch \& {Computer} 2013: {Interaktive} {Vielfalt}},
publisher = {Oldenbourg-Verlag},
author = {Ludwig, Thomas and Reuter, Christian and Pipek, Volkmar},
editor = {Boll, Susanne and Maaß, Susanne and Malaka, Rainer},
year = {2013},
keywords = {UsableSec, HCI, SocialMedia, Cooperation, Projekt-InfoStrom},
pages = {317--320},
}
[BibTeX] [Download PDF]
@techreport{pipek_sicherheitsarena_2013,
address = {Bonn, Germany},
title = {Sicherheitsarena – {Ein} {Ansatz} zur {Verbesserung} des {Krisenmanagements} durch {Kooperation} und {Vernetzung}},
url = {http://www.peasec.de/paper/2013/2013_PipekReuterLeyLudwigWiedenhoefer_Sicherheitsarena_CrisisPrevention.pdf},
number = {3},
author = {Pipek, Volkmar and Reuter, Christian and Ley, Benedikt and Ludwig, Thomas and Wiedenhoefer, Torben},
year = {2013},
keywords = {UsableSec, Crisis, HCI, Cooperation, Projekt-InfoStrom},
pages = {58--59},
}
[BibTeX] [Abstract] [Download PDF]
Recent studies have called attention to the improvement of “collaborative resilience” by fostering the collaboration potentials of public and private stakeholders during disasters. With our research we consider real and virtual volunteers in order to detect conditions for cooperation among those citizen groups through social media. Therefore we analysed the usage of Twitter during a tornado crisis to look for role patterns and aspects that helped volunteer groups in the virtual to emerge, and matched the data with an interview study on experiences, attitudes, concerns and potentials professional emergency services recounted in the emergence of volunteer groups in the real. While virtual groups seem to easily form and collaborate, the engagement of real volunteers is decreasing according to the perception of professionals. We discuss the dynamics in both tendencies and suggest design implications (use of existing social networks, promotion and awareness, connection among volunteers, connection to emergency services and systems) to support both types of volunteer groups, which lead to a software prototype.
@inproceedings{reuter_combining_2013,
address = {Baden-Baden, Germany},
title = {Combining {Real} and {Virtual} {Volunteers} through {Social} {Media}},
url = {http://www.peasec.de/paper/2013/2013_ReuterHegerPipek_RealVirtualVolunteersSocialMedia_ISCRAM.pdf},
abstract = {Recent studies have called attention to the improvement of “collaborative resilience” by fostering the collaboration potentials of public and private stakeholders during disasters. With our research we consider real and virtual volunteers in order to detect conditions for cooperation among those citizen groups through social media. Therefore we analysed the usage of Twitter during a tornado crisis to look for role patterns and aspects that helped volunteer groups in the virtual to emerge, and matched the data with an interview study on experiences, attitudes, concerns and potentials professional emergency services recounted in the emergence of volunteer groups in the real. While virtual groups seem to easily form and collaborate, the engagement of real volunteers is decreasing according to the perception of professionals. We discuss the dynamics in both tendencies and suggest design implications (use of existing social networks, promotion and awareness, connection among volunteers, connection to emergency services and systems) to support both types of volunteer groups, which lead to a software prototype.},
booktitle = {Proceedings of the {Information} {Systems} for {Crisis} {Response} and {Management} ({ISCRAM})},
publisher = {ISCRAM},
author = {Reuter, Christian and Heger, Oliver and Pipek, Volkmar},
editor = {Comes, T. and Fiedrich, F. and Fortier, S. and Geldermann, J. and Müller, Tim},
year = {2013},
keywords = {Student, Crisis, HCI, Selected, AuswahlCrisis, SocialMedia, Cooperation, Projekt-InfoStrom},
pages = {780--790},
}
[BibTeX] [Abstract] [Download PDF]
Crisis communication during power outages poses several challenges. Frist, the causes of power outages are often events such as severe weather, which also lead to complications. Second, power outages themselves lead to limitations in everyday life. Third, communication infrastructures, that are necessary for crisis communication, are often affected. This work focuses on the communication of the organizations responsible for recovery work (emergency services, public administration, energy network operators) to the public affected by the power outage. Therefore this paper investigates the perception and the information demands of citizens and communication infrastructures in different scenarios. Taking the users‘ needs into consideration, an Information and Communication Technology (ICT) based concept for crisis communication, which combines general information with location-specific and setting-specific information was implemented as a prototype smartphone application and evaluated with 12 potential end users. ICT-based concepts can gain acceptance, however they should be understood as supplemental for some target groups and in some scenarios.
@inproceedings{reuter_power_2013,
address = {Baden-Baden, Germany},
title = {Power {Outage} {Communications}: {Survey} of {Needs}, {Infrastructures} and {Concepts}},
url = {http://www.peasec.de/paper/2013/2013_Reuter_PowerOutageCommunication_ISCRAM.pdf},
abstract = {Crisis communication during power outages poses several challenges. Frist, the causes of power outages are often events such as severe weather, which also lead to complications. Second, power outages themselves lead to limitations in everyday life. Third, communication infrastructures, that are necessary for crisis communication, are often affected. This work focuses on the communication of the organizations responsible for recovery work (emergency services, public administration, energy network operators) to the public affected by the power outage. Therefore this paper investigates the perception and the information demands of citizens and communication infrastructures in different scenarios. Taking the users' needs into consideration, an Information and Communication Technology (ICT) based concept for crisis communication, which combines general information with location-specific and setting-specific information was implemented as a prototype smartphone application and evaluated with 12 potential end users. ICT-based concepts can gain acceptance, however they should be understood as supplemental for some target groups and in some scenarios.},
booktitle = {Proceedings of the {Information} {Systems} for {Crisis} {Response} and {Management} ({ISCRAM})},
publisher = {ISCRAM},
author = {Reuter, Christian},
editor = {Comes, T. and Fiedrich, F. and Fortier, S. and Geldermann, J. and Müller, Tim},
year = {2013},
keywords = {RSF, Crisis, HCI, Infrastructure, Projekt-InfoStrom},
pages = {884--889},
}
[BibTeX] [Abstract] [Download PDF]
Aufgrund komplexer und dringlicher Aufgaben steht die Zusammenarbeit über örtliche und organisationale Grenzen hinweg bei Behörden und Organisationen mit Sicherheitsaufgaben (BOS), wie Feuerwehr und Polizei, an der Tagesordnung. Ziel dieses Beitrags ist es zu untersuchen, wie die Kollaboration von Einsatzkräften vor Ort und jenen in der Leitstelle durch mobile Geokollaborationssysteme unterstützt werden kann. Nach einer Darstellung verwandter Arbeiten werden anhand einer qualitativen empirischen Studie die Informations- und Kommunikationspraktiken mobiler Einsatzkräfte vorgestellt. Hierauf aufbauend folgt die Konzeptionierung und Umsetzung eines mobilen Geokolla- borationssystems, welches an ein bestehendes Krisenmanagementsystem und Geoinformationssystem (GIS) angebunden ist und als Android-App realisiert wurde. Abschließend werden die Evaluationsergebnisse dieses Systems im Anwendungsfeld vorgestellt.
@inproceedings{reuter_unterstutzung_2013,
address = {Leipzig, Germany},
title = {Unterstützung mobiler {Geo}-{Kollaboration} zur {Lageeinschätzung} von {Feuerwehr} und {Polizei}},
url = {http://www.peasec.de/paper/2013/2013_ReuterRitzkatis_MobileGeoKollaboration_WI.pdf},
abstract = {Aufgrund komplexer und dringlicher Aufgaben steht die Zusammenarbeit über örtliche und organisationale Grenzen hinweg bei Behörden und Organisationen mit Sicherheitsaufgaben (BOS), wie Feuerwehr und Polizei, an der Tagesordnung. Ziel dieses Beitrags ist es zu untersuchen, wie die Kollaboration von Einsatzkräften vor Ort und jenen in der Leitstelle durch mobile Geokollaborationssysteme unterstützt werden kann. Nach einer Darstellung verwandter Arbeiten werden anhand einer qualitativen empirischen Studie die Informations- und Kommunikationspraktiken mobiler Einsatzkräfte vorgestellt. Hierauf aufbauend folgt die Konzeptionierung und Umsetzung eines mobilen Geokolla- borationssystems, welches an ein bestehendes Krisenmanagementsystem und Geoinformationssystem (GIS) angebunden ist und als Android-App realisiert wurde. Abschließend werden die Evaluationsergebnisse dieses Systems im Anwendungsfeld vorgestellt.},
booktitle = {Proceedings of the {International} {Conference} on {Wirtschaftsinformatik} ({WI}) ({Best} {Paper} {Award} {Nominee})},
author = {Reuter, Christian and Ritzkatis, Michael},
editor = {Alt, Rainer and Franczyk, Bogdan},
year = {2013},
keywords = {Student, UsableSec, Crisis, HCI, SocialMedia, Cooperation, Ranking-CORE-C, Ranking-VHB-C, Ranking-WKWI-A, Projekt-InfoStrom},
pages = {1877--1891},
}
2012
[BibTeX] [Abstract] [Download PDF]
In dieser Arbeit analysieren wir die Gesamtqualität kollaborativ erstellter Informationen als Aggregation der Qualität von Einzelinformationen indem wir die Angemessenheit verschiedener Funktionen in Abhängigkeit von der jeweiligen Fragestellung betrachten. Ziel ist die Herausstellung von Implikationen für das Design kollaborativer Systeme. Die Untersuchung findet am Beispiel des interorganisationalen Krisenmanagements statt. Nach einer Darstellung möglicher Aggregationsfunktionen zeigen wir auf Basis qualitativ-empirischer Untersuchungen exemplarische Anwendungsfälle aus dem interorganisationalen Krisenmanagement auf. Anhand dieser werden Implikationen für das Design und die Implementierung von Softwarekomponenten für die Vernetzung der beteiligten Akteure gezogen und gezeigt, dass die jeweilige Fragestellung hierbei von besonderer Bedeutung ist.
@inproceedings{christofzik_einfluss_2012,
address = {Braunschweig, Germany},
title = {Einfluss der {Qualitätsermittlung} kollaborativ erstellter {Informationen} auf die {Gestaltung} interorganisationaler {Krisenmanagementsysteme}},
isbn = {978-3-942183-63-5},
url = {http://www.peasec.de/paper/2012/2012_ChristofzikReuter_QualitaetsermittlungKollaborativerInformationen_MKWI.pdf},
abstract = {In dieser Arbeit analysieren wir die Gesamtqualität kollaborativ erstellter Informationen als Aggregation der Qualität von Einzelinformationen indem wir die Angemessenheit verschiedener Funktionen in Abhängigkeit von der jeweiligen Fragestellung betrachten. Ziel ist die Herausstellung von Implikationen für das Design kollaborativer Systeme. Die Untersuchung findet am Beispiel des interorganisationalen Krisenmanagements statt. Nach einer Darstellung möglicher Aggregationsfunktionen zeigen wir auf Basis qualitativ-empirischer Untersuchungen exemplarische Anwendungsfälle aus dem interorganisationalen Krisenmanagement auf. Anhand dieser werden Implikationen für das Design und die Implementierung von Softwarekomponenten für die Vernetzung der beteiligten Akteure gezogen und gezeigt, dass die jeweilige Fragestellung hierbei von besonderer Bedeutung ist.},
booktitle = {Multikonferenz {Wirtschaftsinformatik} ({MKWI})},
publisher = {GITO-Verlag},
author = {Christofzik, Désirée and Reuter, Christian},
editor = {Mattfeld, Dirk Christian and Robra-Bissantz, Susanne},
year = {2012},
keywords = {HCI, Cooperation, Projekt-InfoStrom, Projekt-RSBE, Ranking-WKWI-C},
pages = {2049--2060},
}
[BibTeX] [Abstract] [Download PDF]
Adaptations of business processes are important in work environments, specifically when process-support needs to be tailored according to changing needs. The creation, management, and adaptation of the process models require typically modeling-experts. While these actors are knowledgeable in formalizing and operationalizing processes end-users who do not necessarily possess sophisticated modeling skills know typically local practices and framing conditions best. In this paper, we present an approach to support users in articulating their needs and to involve them into the (re-)design of process specifications. We explore how end-users reflect upon and articulate about business processes. Based on results of a qualitative study, we present a new, paper-based interaction technique, which enables users with little skills to model processes. The resulting process specifications can be transferred either in paper or in digital form into traditional modeling systems for further elaboration.
@article{hess_supporting_2012,
title = {Supporting {End}-{User} {Articulations} in {Evolving} {Business} {Processes}: {A} {Case} {Study} to explore {Intuitive} {Notations} and {Interaction} {Designs}},
volume = {21},
url = {https://www.wineme.uni-siegen.de/paper/2012/2012_hessreuterpipekwulf_supportingenduserarticulations_ijcis.pdf},
doi = {10.1142/S0218843012500049},
abstract = {Adaptations of business processes are important in work environments, specifically when process-support needs to be tailored according to changing needs. The creation, management, and adaptation of the process models require typically modeling-experts. While these actors are knowledgeable in formalizing and operationalizing processes end-users who do not necessarily possess sophisticated modeling skills know typically local practices and framing conditions best. In this paper, we present an approach to support users in articulating their needs and to involve them into the (re-)design of process specifications. We explore how end-users reflect upon and articulate about business processes. Based on results of a qualitative study, we present a new, paper-based interaction technique, which enables users with little skills to model processes. The resulting process specifications can be transferred either in paper or in digital form into traditional modeling systems for further elaboration.},
number = {4},
journal = {International Journal of Cooperative Information Systems (IJCIS)},
author = {Hess, Jan and Reuter, Christian and Pipek, Volkmar and Wulf, Volker},
year = {2012},
keywords = {HCI, A-Paper, Ranking-ImpactFactor, Ranking-CORE-C, Ranking-VHB-B, Projekt-InfoStrom},
pages = {263--296},
}
[BibTeX] [Abstract] [Download PDF]
Improvisation is necessary when planned decision-making as the main managerial activity does not fit the conditions the practice provides. In these cases, information technology should not just automate planned and structured decisions, but support improvisational practice. In this contribution we present an empirical study about the improvisation work in scenarios of medium to large power outages in Germany. Our focus is on inter-organizational cooperation practices, thus we examined the cooperation of fire departments, police, public administration, electricity infrastructure operators and citizens. Our empirical material allows to describe reasons and conditions for improvisation. Our resulting recommendations address the support of aggregation and visualization of information, a necessary individualization of information compositions, options for collaborative situation assessment, requirements for informal and formal communication, and accessibility of information resources.
@inproceedings{ley_supporting_2012,
address = {New York, USA},
title = {Supporting improvisation work in inter-organizational crisis management},
isbn = {978-1-4503-1015-4},
url = {http://www.peasec.de/paper/2012/2012_LeyPipekReuterWiedenhoefer_ImprovisationWork_CHI.pdf},
doi = {10.1145/2207676.2208617},
abstract = {Improvisation is necessary when planned decision-making as the main managerial activity does not fit the conditions the practice provides. In these cases, information technology should not just automate planned and structured decisions, but support improvisational practice. In this contribution we present an empirical study about the improvisation work in scenarios of medium to large power outages in Germany. Our focus is on inter-organizational cooperation practices, thus we examined the cooperation of fire departments, police, public administration, electricity infrastructure operators and citizens. Our empirical material allows to describe reasons and conditions for improvisation. Our resulting recommendations address the support of aggregation and visualization of information, a necessary individualization of information compositions, options for collaborative situation assessment, requirements for informal and formal communication, and accessibility of information resources.},
booktitle = {Proceedings of the {Conference} on {Human} {Factors} in {Computing} {Systems} ({CHI})},
publisher = {ACM Press},
author = {Ley, Benedikt and Pipek, Volkmar and Reuter, Christian and Wiedenhoefer, Torben},
year = {2012},
keywords = {Crisis, HCI, A-Paper, Ranking-CORE-A*, Cooperation, Ranking-WKWI-A, Projekt-InfoStrom, Projekt-RSBE},
pages = {1529},
}
[BibTeX] [Abstract] [Download PDF]
To assess current situation properly is crucial for effective decision-making in crisis management. However, gathering accurate information from incidence sites and providing appropriate support for assessment practices faces several challenges. The unique information demands of each crisis situation, the information availability or inter-organizational problems and obstacles to information exchange are important factors that need to be considered in designing ICT. In this contribution we present results from an empirical study about decision-making practices in scenarios of medium to large power outages in Germany. We focused on the needs and practices on information exchange at the level of inter-organizational cooperation. We examined the cooperation of fire departments, police, public administration, electricity infrastructure operators and citizens. Our empirical material reflects particularly conditions and challenges in current situation assessment practices, and we were able to derive some design requirements for an inter-organizational situation assessment client (ISAC) as a complementary tool for the crisis management infrastructures the individual organizations have already build for their own areas of responsibility: Support for the aggregation and visualization of information, for the individualization of information compositions, for a collaborative situation assessment and for appropriate structures for sharing and accessing information resources.
@inproceedings{ley_supporting_2012-1,
address = {Vancouver, Canada},
title = {Supporting {Inter}-organizational {Situation} {Assessment} in {Crisis} {Management}},
url = {http://www.peasec.de/paper/2012/2012_LeyPipekReuterWiedenhoefer_SituationAssessment_ISCRAM.pdf},
abstract = {To assess current situation properly is crucial for effective decision-making in crisis management. However, gathering accurate information from incidence sites and providing appropriate support for assessment practices faces several challenges. The unique information demands of each crisis situation, the information availability or inter-organizational problems and obstacles to information exchange are important factors that need to be considered in designing ICT. In this contribution we present results from an empirical study about decision-making practices in scenarios of medium to large power outages in Germany. We focused on the needs and practices on information exchange at the level of inter-organizational cooperation. We examined the cooperation of fire departments, police, public administration, electricity infrastructure operators and citizens. Our empirical material reflects particularly conditions and challenges in current situation assessment practices, and we were able to derive some design requirements for an inter-organizational situation assessment client (ISAC) as a complementary tool for the crisis management infrastructures the individual organizations have already build for their own areas of responsibility: Support for the aggregation and visualization of information, for the individualization of information compositions, for a collaborative situation assessment and for appropriate structures for sharing and accessing information resources.},
booktitle = {Proceedings of the {Information} {Systems} for {Crisis} {Response} and {Management} ({ISCRAM})},
publisher = {ISCRAM},
author = {Ley, Benedikt and Pipek, Volkmar and Reuter, Christian and Wiedenhoefer, Torben},
editor = {Rothkrantz, L. and Ristvey, J. and Franco, Z.},
year = {2012},
keywords = {Crisis, HCI, Cooperation, Projekt-InfoStrom, Projekt-RSBE},
}
[BibTeX] [Abstract] [Download PDF]
The contribution of this paper is to propose a systematization of social software use in crisis situations pointing out different types of cooperation and its challenges. We will discuss how the organizational actors involved in crisis management (police, fire-fighters, organizations etc.) and the affected citizens are communicating and can communicate and collaborate through the use of social software. After defining the term ‘social software‘ we will outline the state-of-the-art about its use in crisis management. Drawing from this, we will present two case studies where we have examined the use of social software in 2010: first during the disruption of air travel caused by the eruptions of the volcano Eyjafjallajökull in Iceland and second during the mass panic at the Love Parade music festival in Germany. Based on both previous work and case studies we will discuss potentials and weaknesses and propose a classification matrix for different types of cooperation as a step towards a systematization of social software use in crisis situations.
@article{reuter_crisis_2012,
title = {Crisis {Management} 2.0: {Towards} a {Systematization} of {Social} {Software} {Use} in {Crisis} {Situations}},
volume = {4},
url = {http://www.peasec.de/paper/2012/2012_ReuterMarxPipek_CrisisManagement20-SystematizationSocialSoftware_IJISCRAM.pdf},
doi = {10.4018/jiscrm.2012010101},
abstract = {The contribution of this paper is to propose a systematization of social software use in crisis situations pointing out different types of cooperation and its challenges. We will discuss how the organizational actors involved in crisis management (police, fire-fighters, organizations etc.) and the affected citizens are communicating and can communicate and collaborate through the use of social software. After defining the term ‘social software' we will outline the state-of-the-art about its use in crisis management. Drawing from this, we will present two case studies where we have examined the use of social software in 2010: first during the disruption of air travel caused by the eruptions of the volcano Eyjafjallajökull in Iceland and second during the mass panic at the Love Parade music festival in Germany. Based on both previous work and case studies we will discuss potentials and weaknesses and propose a classification matrix for different types of cooperation as a step towards a systematization of social software use in crisis situations.},
number = {1},
journal = {International Journal of Information Systems for Crisis Response and Management (IJISCRAM)},
author = {Reuter, Christian and Marx, Alexandra and Pipek, Volkmar},
year = {2012},
keywords = {Student, Crisis, HCI, Selected, AuswahlCrisis, SocialMedia, Cooperation, Projekt-InfoStrom, Projekt-RSBE},
pages = {1--16},
}
[BibTeX] [Abstract] [Download PDF]
The great importance of Social Media for our today’s life causes an increasing use of internet-based platforms in crisis situations. Our work intends to show how so-called Emergent Groups, which arise as a result of crises, consist of private citizens and are not yet institutionalized organizations, can be supported by Social Media. At first, our literature review’s objective is to define the term ‘Emergent Group‘ and to outline their usage of Social Media as well as software-based requirements and suitable concepts to support such groups. A following quantitative and qualitative empirical analysis of a tornado crisis in the USA enables a closer look at especially virtual working Emergent Groups. Building on our literature review and empirical analysis, we discuss implications, derive further requirements and present a concept for the design of appropriate Social Software. We finally conclude by giving some potential research issues.
@inproceedings{reuter_social_2012,
address = {Bonn, Germany},
title = {Social {Media} for {Supporting} {Emergent} {Groups} in {Crisis} {Management}},
url = {http://www.peasec.de/paper/2012/2012_ReuterHegerPipek_SocialMediaEmergentGroups_CSCW-WS.pdf},
abstract = {The great importance of Social Media for our today's life causes an increasing use of internet-based platforms in crisis situations. Our work intends to show how so-called Emergent Groups, which arise as a result of crises, consist of private citizens and are not yet institutionalized organizations, can be supported by Social Media. At first, our literature review's objective is to define the term ‘Emergent Group' and to outline their usage of Social Media as well as software-based requirements and suitable concepts to support such groups. A following quantitative and qualitative empirical analysis of a tornado crisis in the USA enables a closer look at especially virtual working Emergent Groups. Building on our literature review and empirical analysis, we discuss implications, derive further requirements and present a concept for the design of appropriate Social Software. We finally conclude by giving some potential research issues.},
booktitle = {Proceedings of the {CSCW} {Workshop} on {Collaboration} and {Crisis} {Informatics}, {International} {Reports} on {Socio} {Informatics}},
author = {Reuter, Christian and Heger, Oliver and Pipek, Volkmar},
editor = {Pipek, Volkmar and Palen, Leysia and Landgren, Jonas},
year = {2012},
keywords = {Student, Crisis, HCI, SocialMedia, Cooperation, Projekt-InfoStrom},
pages = {84--92},
}
[BibTeX] [Abstract] [Download PDF]
This paper presents approaches on how to deal with terminological ambiguities (different understandings of terms in heterogeneous groups of actors) in collaborative systems. First we will give some insight on the conceptual and theoretical foundation surrounding the ‘triangle of reference‘, a model of how linguistic symbols are related to the objects they represent. Then we will describe the results of our exploratory empirical study, which was conducted in Germany, and dealt with inter-organisational crisis communication. Based on this, we will then deduce requirements necessary for supporting and dealing with terminologies, and propose technical approaches for collaborative systems.
@inproceedings{reuter_dealing_2012,
address = {Vancouver, Canada},
title = {Dealing with terminologies in collaborative systems for crisis management},
url = {http://www.peasec.de/paper/2012/2012_ReuterPipekWiedenhoeferLey_TerminologiesCrisisManagement_ISCRAM.pdf},
abstract = {This paper presents approaches on how to deal with terminological ambiguities (different understandings of terms in heterogeneous groups of actors) in collaborative systems. First we will give some insight on the conceptual and theoretical foundation surrounding the ‘triangle of reference', a model of how linguistic symbols are related to the objects they represent. Then we will describe the results of our exploratory empirical study, which was conducted in Germany, and dealt with inter-organisational crisis communication. Based on this, we will then deduce requirements necessary for supporting and dealing with terminologies, and propose technical approaches for collaborative systems.},
booktitle = {Proceedings of the {Information} {Systems} for {Crisis} {Response} and {Management} ({ISCRAM})},
publisher = {ISCRAM},
author = {Reuter, Christian and Pipek, Volkmar and Wiedenhoefer, Torben and Ley, Benedikt},
editor = {Rothkrantz, L. and Ristvey, J. and Franco, Z.},
year = {2012},
keywords = {Crisis, HCI, Cooperation, Projekt-InfoStrom},
pages = {1--5},
}
2011
[BibTeX] [Abstract] [Download PDF]
Die Dezentralität einer Organisation hat maßgeblichen Einfluss auf die Ausgestaltung von Kooperationsprozessen und deren Unterstützung durch IT-basierte Kooperationssysteme. Mein Dissertationsvorhaben untersucht momentane und potentielle Kooperationsprozesse im Spannungsfeld von Behörden und Organisationen mit Sicherheitsaufgaben, Unternehmen, Organisationen und Bürgern im interorganisationalen Krisenmanagement bei Großschadenslagen. Ziel ist die Beantwortung der Frage, wie IT-basierte Kooperationsunterstützung dezentraler Organisationen am Beispiel des Krisenmanagements erfolgen kann.
@incollection{reuter_it-basierte_2011,
title = {{IT}-basierte {Kooperationsunterstützung} im interorganisationalen {Krisenmanagement}},
url = {https://peasec.de/paper/2011/2011_Reuter_ITbasierteKooperationsunterstuetzungKrisenmanagement-MuCDoc.pdf},
abstract = {Die Dezentralität einer Organisation hat maßgeblichen Einfluss auf die Ausgestaltung von Kooperationsprozessen und deren Unterstützung durch IT-basierte Kooperationssysteme. Mein Dissertationsvorhaben untersucht momentane und potentielle Kooperationsprozesse im Spannungsfeld von Behörden und Organisationen mit Sicherheitsaufgaben, Unternehmen, Organisationen und Bürgern im interorganisationalen Krisenmanagement bei Großschadenslagen. Ziel ist die Beantwortung der Frage, wie IT-basierte Kooperationsunterstützung dezentraler Organisationen am Beispiel des Krisenmanagements erfolgen kann.},
booktitle = {Doktoranden-{Kolloquium} der {Tagung} {Mensch} \& {Computer} 2011},
author = {Reuter, Christian},
editor = {Koch, Michael},
year = {2011},
keywords = {Security, UsableSec, Crisis, HCI, Cooperation, Projekt-InfoStrom, Projekt-RSBE},
}
[BibTeX] [Abstract] [Download PDF]
Ziel dieser Arbeit ist es, die Auswirkungen terminologischer Mehrdeutigkeiten, d.h. unterschiedlicher Begriffs-Verständnisse heterogener Akteursgruppen, auf die Gestaltung organisationsübergreifender Kooperationssysteme herauszustellen. Nach einer Darstellung theoretischer Ansätze des Umgangs mit Terminologien stellen wir unsere explorative empirische Studie, die wir am Beispiel des organisationsübergreifenden Krisenmanagements durchgeführt haben, vor. Hierauf aufbauend präsentieren wir unsere Befunde, leiten Anforderungen ab und schlagen technische Lösungen vor. Auch diskutieren wir Ansätze des Terminologiemanagements bezüglich ihrer Anwendbarkeit und stellen kooperative Ansätze zum Umgang mit Terminologien in interorganisationalen Kooperationssystemen vor.
@inproceedings{reuter_umgang_2011,
address = {München, Germany},
title = {Umgang mit {Terminologien} in inter- organisationaler {Krisenkooperation} - eine explorative {Empirie}},
isbn = {978-3-486-71235-3},
url = {http://www.peasec.de/paper/2011/2011_ReuterPohlPipek_UmgangTerminologienKrisenkooperation_MenschComputer.pdf},
abstract = {Ziel dieser Arbeit ist es, die Auswirkungen terminologischer Mehrdeutigkeiten, d.h. unterschiedlicher Begriffs-Verständnisse heterogener Akteursgruppen, auf die Gestaltung organisationsübergreifender Kooperationssysteme herauszustellen. Nach einer Darstellung theoretischer Ansätze des Umgangs mit Terminologien stellen wir unsere explorative empirische Studie, die wir am Beispiel des organisationsübergreifenden Krisenmanagements durchgeführt haben, vor. Hierauf aufbauend präsentieren wir unsere Befunde, leiten Anforderungen ab und schlagen technische Lösungen vor. Auch diskutieren wir Ansätze des Terminologiemanagements bezüglich ihrer Anwendbarkeit und stellen kooperative Ansätze zum Umgang mit Terminologien in interorganisationalen Kooperationssystemen vor.},
booktitle = {Mensch \& {Computer} 2011: Übermedien Übermorgen},
publisher = {Oldenbourg-Verlag},
author = {Reuter, Christian and Pohl, Patrik and Pipek, Volkmar},
editor = {Eibl, Maximilian},
year = {2011},
keywords = {Student, Crisis, HCI, Cooperation, Projekt-InfoStrom, Projekt-RSBE},
pages = {171--180},
}
[BibTeX] [Abstract] [Download PDF]
In this paper we will be discussing how the (semi-)professional actors involved in crisis management (police, fire-fighters, etc.) and the affected citizens can communicate and collaborate by the use of social software. After the definition of the term ‘social software‘ we will provide the state-of-the-art on current social software use in crisis management. Drawing from this, we will present two case studies where we examined the social software use in 2010: First during the disruption of air travel due to the eruptions of Eyjafjallajökull volcano in Iceland, second during the crisis at a stampede at the Love Parade music festival in Germany. We identified weak points and further potentials and tested the validity of the American case study findings from literature for Europe. We will conclude with a concept for using citizens in inter-organizational crisis management with a social software infrastructure and a communication matrix for crisis management.
@inproceedings{reuter_social_2011,
address = {Lisbon, Portugal},
title = {Social {Software} as an {Infrastructure} for {Crisis} {Management} – a {Case} {Study} about {Current} {Practice} and {Potential} {Usage}},
url = {http://www.peasec.de/paper/2011/2011_ReuterMarxPipek_SocialSoftwareInfrastructure_ISCRAM.pdf},
abstract = {In this paper we will be discussing how the (semi-)professional actors involved in crisis management (police, fire-fighters, etc.) and the affected citizens can communicate and collaborate by the use of social software. After the definition of the term ‘social software' we will provide the state-of-the-art on current social software use in crisis management. Drawing from this, we will present two case studies where we examined the social software use in 2010: First during the disruption of air travel due to the eruptions of Eyjafjallajökull volcano in Iceland, second during the crisis at a stampede at the Love Parade music festival in Germany. We identified weak points and further potentials and tested the validity of the American case study findings from literature for Europe. We will conclude with a concept for using citizens in inter-organizational crisis management with a social software infrastructure and a communication matrix for crisis management.},
booktitle = {Proceedings of the {Information} {Systems} for {Crisis} {Response} and {Management} ({ISCRAM})},
publisher = {ISCRAM},
author = {Reuter, Christian and Marx, Alexandra and Pipek, Volkmar},
year = {2011},
keywords = {Student, Crisis, HCI, SocialMedia, Infrastructure, Cooperation, Projekt-InfoStrom, Projekt-RSBE},
pages = {1--10},
}
[BibTeX] [Abstract] [Download PDF]
In dieser Arbeit soll untersucht werden, wie die im Krisenmanagement beteiligten Akteure (wie Polizei, Feuerwehr, Hilfsorganisationen, Infrastrukturbetreiber) und die betroffenen Bürger mittels Social Software kommunizieren und kollaborieren können. Anhand unserer Literaturstudie stellen wir einen Überblick über vergangene Forschung in diesem Bereich dar. Hierauf aufbauend präsentieren wir unsere beiden Fallstudien zur Nutzung von Social Software in Krisen: Zum einen während der Flugausfälle im Zuge des Vulkanausbruchs auf Island im April 2010, zum anderen im Zuge des Loveparade-Unglücks am 24.07.2010. Anschließend stellen wir identifizierte Stärken und Schwächen dar und fassen identifizierte Potentiale in einer Klassifikationsmatrix für Social Software im Krisenmanagement zusammen.
@inproceedings{reuter_desaster_2011,
address = {München, Germany},
title = {Desaster 2.0: {Einbeziehung} von {Bürgern} in das {Krisenmanagement}},
isbn = {978-3-486-71235-3},
url = {http://www.peasec.de/paper/2011/2011_ReuterMarxPipek_Desaster20-EinbeziehungBuergerKrisenmanagement_MuC.pdf},
abstract = {In dieser Arbeit soll untersucht werden, wie die im Krisenmanagement beteiligten Akteure (wie Polizei, Feuerwehr, Hilfsorganisationen, Infrastrukturbetreiber) und die betroffenen Bürger mittels Social Software kommunizieren und kollaborieren können. Anhand unserer Literaturstudie stellen wir einen Überblick über vergangene Forschung in diesem Bereich dar. Hierauf aufbauend präsentieren wir unsere beiden Fallstudien zur Nutzung von Social Software in Krisen: Zum einen während der Flugausfälle im Zuge des Vulkanausbruchs auf Island im April 2010, zum anderen im Zuge des Loveparade-Unglücks am 24.07.2010. Anschließend stellen wir identifizierte Stärken und Schwächen dar und fassen identifizierte Potentiale in einer Klassifikationsmatrix für Social Software im Krisenmanagement zusammen.},
booktitle = {Mensch \& {Computer} 2011: Übermedien Übermorgen},
publisher = {Oldenbourg-Verlag},
author = {Reuter, Christian and Marx, Alexandra and Pipek, Volkmar},
editor = {Eibl, Maximilian},
year = {2011},
keywords = {Student, HCI, SocialMedia, Cooperation, Projekt-InfoStrom, Projekt-RSBE},
pages = {141--150},
}
[BibTeX] [Abstract] [Download PDF]
Es existieren zahlreiche Motive und Barrieren zur Nutzung von Social Software in Unternehmen und Organisationen. Ein mögliches Anwendungsszenario ist das interorganisationale Krisenmanagement von Behörden und Organisationen mit Sicherheitsaufgaben, Unternehmen und Bürgern bei Großschadenslagen. In diesem Beitrag werden Motive und Barrieren der Nutzung von Social Software in Unternehmen herausgestellt. Hierauf aufbauend werden diese auf das interorganisationale Krisenmanagement übertragen und Besonderheiten herausgearbeitet. Ziel ist die Darstellung möglicher Motive zur Nutzung von Social Software in der interorganisationalen Krisenkooperation.
@inproceedings{reuter_motive_2011,
address = {Chemnitz, Germany},
title = {Motive und {Barrieren} für {Social} {Software} in {Organisationen} und im {Krisenmanagement}},
url = {http://www.peasec.de/paper/2011/2011_Reuter_MotiveBarrierenSocialSoftware_MuC-WS.pdf},
abstract = {Es existieren zahlreiche Motive und Barrieren zur Nutzung von Social Software in Unternehmen und Organisationen. Ein mögliches Anwendungsszenario ist das interorganisationale Krisenmanagement von Behörden und Organisationen mit Sicherheitsaufgaben, Unternehmen und Bürgern bei Großschadenslagen. In diesem Beitrag werden Motive und Barrieren der Nutzung von Social Software in Unternehmen herausgestellt. Hierauf aufbauend werden diese auf das interorganisationale Krisenmanagement übertragen und Besonderheiten herausgearbeitet. Ziel ist die Darstellung möglicher Motive zur Nutzung von Social Software in der interorganisationalen Krisenkooperation.},
booktitle = {Mensch und {Computer} 2011 - {Workshopband}},
publisher = {Universitätsverlag Chemnitz},
author = {Reuter, Christian},
editor = {Eibl, Maximilian and Ritter, Marc},
year = {2011},
keywords = {Crisis, HCI, SocialMedia, Projekt-InfoStrom, Projekt-RSBE},
pages = {87--90},
}
[BibTeX] [Abstract] [Download PDF]
Major electricity breakdowns like the Northeast Blackout (USA) in 2003 or the blackout in most parts of Western Europe in 2005, have shown the fundamental role of electricity in our everyday life. The experiences of these accidents show that power suppliers, firefighters, police, county administration and citizens face multifarious challenges in inter-organizational communication, information and coordination processes during coping and recovery work. In this work-in-progress paper we describe early research dealing with inter-organizational issues in emergency management (EM). We are mainly focusing on supporting social practices in inter-organizational EM, for example collaborative interpretation of emergency situations, ad-hoc coordination or supporting citizen communication and helping routines. Identified from our experiences from related projects, discussions and literature studies, we suggest potential questions and future topics in user-driven software engineering processes for EM and domain specific problems, such as supporting citizen participation, coping with information uncertainties and quality variations or enhancing inter-organizational learning.
@inproceedings{wiedenhoefer_inter-organizational_2011,
address = {Lisbon, Portugal},
title = {Inter-organizational crisis management infrastructures for electrical power breakdowns},
url = {http://www.peasec.de/paper/2011/2011_WiedenhoeferReuterLeyPipek_CrisisManagementInfrastructures_ISCRAM.pdf},
abstract = {Major electricity breakdowns like the Northeast Blackout (USA) in 2003 or the blackout in most parts of Western Europe in 2005, have shown the fundamental role of electricity in our everyday life. The experiences of these accidents show that power suppliers, firefighters, police, county administration and citizens face multifarious challenges in inter-organizational communication, information and coordination processes during coping and recovery work. In this work-in-progress paper we describe early research dealing with inter-organizational issues in emergency management (EM). We are mainly focusing on supporting social practices in inter-organizational EM, for example collaborative interpretation of emergency situations, ad-hoc coordination or supporting citizen communication and helping routines. Identified from our experiences from related projects, discussions and literature studies, we suggest potential questions and future topics in user-driven software engineering processes for EM and domain specific problems, such as supporting citizen participation, coping with information uncertainties and quality variations or enhancing inter-organizational learning.},
booktitle = {Proceedings of the {Information} {Systems} for {Crisis} {Response} and {Management} ({ISCRAM})},
publisher = {ISCRAM},
author = {Wiedenhoefer, Torben and Reuter, Christian and Ley, Benedikt and Pipek, Volkmar},
year = {2011},
keywords = {Security, UsableSec, Crisis, HCI, Cooperation, Projekt-InfoStrom, Projekt-RSBE},
}
2010
[BibTeX] [Abstract] [Download PDF]
One of the most important infrastructures in modern industrialized societies is the electricity network. Due to its fundamental role for many aspects of our everyday life, power infrastructures manifest a strong dependence between power suppliers and customers. Customers take the infrastructure for granted; it appears mostly invisible to them as long as it works, but in the case of breakdowns in power supply customers become aware of the dependence on electricity. They join professional actors in the recovery and coping work with regard to the electricity breakdown: Maintenance workers of the power provider, police, firefighters, red cross, etc. These institutions are professionalized for dealing with such situations, but the people affected by a power outage also need to be considered as actors.
@inproceedings{balduin_infostrom_2010,
address = {Berlin, Germany},
title = {{InfoStrom}: {Learning} information infrastructures for crisis management in case of medium to large electrical power breakdowns.},
url = {http://www.peasec.de/paper/2010/2010_Balduinetal_LearningInfrastructuresCrisisManagement_FutureSecurity.pdf},
abstract = {One of the most important infrastructures in modern industrialized societies is the electricity network. Due to its fundamental role for many aspects of our everyday life, power infrastructures manifest a strong dependence between power suppliers and customers. Customers take the infrastructure for granted; it appears mostly invisible to them as long as it works, but in the case of breakdowns in power supply customers become aware of the dependence on electricity. They join professional actors in the recovery and coping work with regard to the electricity breakdown: Maintenance workers of the power provider, police, firefighters, red cross, etc. These institutions are professionalized for dealing with such situations, but the people affected by a power outage also need to be considered as actors.},
booktitle = {Future {Security} - {Proceedings} of the {Security} {Research} {Conference}},
publisher = {Fraunhofer VVS},
author = {Balduin, Norbert and Becker, Georg and Brand, Jürgen and Görgen, Michael and Hannappel, Mario and Hasenfuß, Patrick and Ley, Benedikt and Pipek, Volkmar and Probst, Florian and Reuter, Christian and Rose, Thomas and Rusch, Gebhard and Wiedenhoefer, Torben and Zinnen, Andreas},
year = {2010},
keywords = {Security, UsableSec, Crisis, HCI, Infrastructure, Cooperation, Projekt-InfoStrom, Projekt-RSBE},
}
[BibTeX] [Abstract] [Download PDF]
Lokale Praxis und globale Informations- und Kommunikationstechnik (IT) gehen immer dann eine sichtbare Verbindung ein, wenn IT eingesetzt wird, um Echtzeit-Informationen an einen anderen Ort zu übertragen, so wie dies z.B. durch Mobiltelefone/ MMS, ferngesteuerte Sensoren oder Live-Webcams geschieht. Diese Arbeit beschreibt eine Feldstudie zu IT-unterstützter Wartungsarbeit innerhalb der Infrastruktur eines Energieversorgers. Die Studie möchte insbesondere die Relationen zwischen lokalen Praxen und der Gestaltung einer IT-Infrastruktur als „Location Based System“ hervorheben, die nicht auf den ersten Blick sichtbar sind. Besonders richten wir den Blick sowohl auf „das Globale“ als auch auf „das Lokale“ von Strom- und IT-Infrastruktur. Wir orientieren uns am Infrastruktur-Konzept von Star & Ruhleder (1996) für eine Beschreibung und Analyse zweier unterschiedlicher Wartungsteams vor dem Hintergrund sozio-räumlicher sowie sozio-technischer Aspekte der Energieversorgungsinfrastruktur, der Informations- und Kommunikations-Infrastruktur und der jeweilig resultierenden Arbeitspraxis und diskutieren Konsequenzen für eine infrastrukturorientierte Technikgestaltung.
@inproceedings{mueller_globale_2010,
address = {Duisburg, Germany},
title = {Globale {Infrastruktur} - lokales {Arbeiten}: {Praxis} {IT}-gestützter {Wartung} bei einem {Energieversorger}},
url = {http://www.peasec.de/paper/2010/2010_MuellerPipekReuter_GlobaleInfrastruktur-ITWartungEnergieversorger_MuC.pdf},
abstract = {Lokale Praxis und globale Informations- und Kommunikationstechnik (IT) gehen immer dann eine sichtbare Verbindung ein, wenn IT eingesetzt wird, um Echtzeit-Informationen an einen anderen Ort zu übertragen, so wie dies z.B. durch Mobiltelefone/ MMS, ferngesteuerte Sensoren oder Live-Webcams geschieht. Diese Arbeit beschreibt eine Feldstudie zu IT-unterstützter Wartungsarbeit innerhalb der Infrastruktur eines Energieversorgers. Die Studie möchte insbesondere die Relationen zwischen lokalen Praxen und der Gestaltung einer IT-Infrastruktur als „Location Based System“ hervorheben, die nicht auf den ersten Blick sichtbar sind. Besonders richten wir den Blick sowohl auf „das Globale“ als auch auf „das Lokale“ von Strom- und IT-Infrastruktur. Wir orientieren uns am Infrastruktur-Konzept von Star \& Ruhleder (1996) für eine Beschreibung und Analyse zweier unterschiedlicher Wartungsteams vor dem Hintergrund sozio-räumlicher sowie sozio-technischer Aspekte der Energieversorgungsinfrastruktur, der Informations- und Kommunikations-Infrastruktur und der jeweilig resultierenden Arbeitspraxis und diskutieren Konsequenzen für eine infrastrukturorientierte Technikgestaltung.},
booktitle = {Mensch \& {Computer} 2010: {Interaktive} {Kulturen}},
publisher = {Oldenbourg-Verlag},
author = {Mueller, Claudia and Pipek, Volkmar and Reuter, Christian},
editor = {Ziegler, Jürgen and Schmidt, Albrecht},
year = {2010},
keywords = {Crisis, HCI, Infrastructure, Cooperation, Projekt-InfoStrom, Projekt-RSBE, Projekt-RWE},
pages = {37--46},
}
2009
[BibTeX] [Abstract] [Download PDF]
Crisis management requires stakeholders not only to show strategic, organisational preparedness for crisis events (e.g., by systematising and professionalising coping with work), but also to develop skills in dealing with unanticipated events and other stakeholders involved in the same crisis. They should not only rely on established information flows and behaviour patterns, but also be able to deal with situational aspects. This usually involves communication work within and between organisations involved in crisis management. We describe the practice of the crisis communication training of a German Electricity Provider (GEP) and the prototype we developed, implemented and evaluated. The collaborative training tool targets not only the local practice, but also interorganisational training that will allow improving the mutual understanding of communication practices and meeting the information needs of other stakeholders.
@article{reuter_avoiding_2009,
title = {Avoiding crisis in communication: a computer-supported training approach for emergency management},
volume = {6},
url = {http://www.peasec.de/paper/2009/2009_ReuterPipekMueller_AvoidingCrisisinCommunication_IJEM.pdf},
abstract = {Crisis management requires stakeholders not only to show strategic, organisational preparedness for crisis events (e.g., by systematising and professionalising coping with work), but also to develop skills in dealing with unanticipated events and other stakeholders involved in the same crisis. They should not only rely on established information flows and behaviour patterns, but also be able to deal with situational aspects. This usually involves communication work within and between organisations involved in crisis management. We describe the practice of the crisis communication training of a German Electricity Provider (GEP) and the prototype we developed, implemented and evaluated. The collaborative training tool targets not only the local practice, but also interorganisational training that will allow improving the mutual understanding of communication practices and meeting the information needs of other stakeholders.},
number = {3-4},
journal = {International Journal of Emergency Management (IJEM)},
author = {Reuter, Christian and Pipek, Volkmar and Mueller, Claudia},
year = {2009},
keywords = {Crisis, HCI, Projekt-RWE},
pages = {356--368},
}
[BibTeX] [Abstract] [Download PDF]
Crisis management requires stakeholders to not only show strategic, organisational preparedness for crisis events (e.g. by systematising and professionalizing coping work), but also to develop skills to deal with unanticipated events and other stakeholders involved in the same crisis. They should not only rely on established information flows and behaviour patterns, but should be able to deal with situational aspects. This usually involves communication work within and between organisations involved in crisis management. We describe the practice of the crisis communication training of a German electricity provider and the prototype we developed, implemented and evaluated. The collaborative training tool targets not only the local practice, but aims at inter-organisational trainings that would also allow improving the mutual understanding for communication practices and information needs of other stakeholders.
@inproceedings{reuter_computer_2009,
address = {Gothenburg, Sweden},
title = {Computer {Supported} {Collaborative} {Training} in {Crisis} {Communication} {Management}},
url = {http://www.peasec.de/paper/2009/2009_ReuterPipekMueller_ComputerSupportedCollaborativeTraining_ISCRAM.pdf},
abstract = {Crisis management requires stakeholders to not only show strategic, organisational preparedness for crisis events (e.g. by systematising and professionalizing coping work), but also to develop skills to deal with unanticipated events and other stakeholders involved in the same crisis. They should not only rely on established information flows and behaviour patterns, but should be able to deal with situational aspects. This usually involves communication work within and between organisations involved in crisis management. We describe the practice of the crisis communication training of a German electricity provider and the prototype we developed, implemented and evaluated. The collaborative training tool targets not only the local practice, but aims at inter-organisational trainings that would also allow improving the mutual understanding for communication practices and information needs of other stakeholders.},
booktitle = {Proceedings of the {Information} {Systems} for {Crisis} {Response} and {Management} ({ISCRAM})},
publisher = {ISCRAM},
author = {Reuter, Christian and Pipek, Volkmar and Mueller, Claudia},
editor = {Landgren, Jonas and Jul, S},
year = {2009},
keywords = {Crisis, HCI, Projekt-RWE},
}
[BibTeX] [Abstract] [Download PDF]
Krisenmanagement fordert neben strategischer und organisationaler Vorbereitung auf die Bewältigungs- und Wiederherstellungsarbeit, auch Fähigkeiten, mit unvorhersehbaren Ereignissen und anderen Stakeholdern, die in die gleiche Krise involviert sind, umzugehen. Hier kann man sich nicht ausschließlich auf etablierte Informationsflüsse und Verhaltensmuster verlassen, sondern muss sich auch spontan-situativen Einflüssen stellen. Die für die Kommunikationsarbeit in und zwischen den involvierten Organisationen notwendigen Fähigkeiten müssen trainiert werden. Wir beschreiben die aktuelle Praxis des Krisenkommunikations-Trainings eines Energieversorgungsunternehmens (EVU) sowie den Prototypen zu dessen Unterstützung, den wir entwickelt, implementiert und evaluiert haben. Unser Trainingswerkzeug zielt nicht nur auf die lokale Praxis, sondern auch interorganisationale Trainings, was die Verbesserung eines gemeinsamen Verständnisses sowie der Informationsbedarfe anderer beinhaltet.
@inproceedings{reuter_krisenkommunikation_2009,
address = {Berlin, Germany},
title = {Krisenkommunikation trainieren: {Ein} webgestützter {Ansatz}},
url = {http://www.peasec.de/paper/2009/2009_ReuterPipek_KrisenkommunikationTrainieren_MenschComputer.pdf},
abstract = {Krisenmanagement fordert neben strategischer und organisationaler Vorbereitung auf die Bewältigungs- und Wiederherstellungsarbeit, auch Fähigkeiten, mit unvorhersehbaren Ereignissen und anderen Stakeholdern, die in die gleiche Krise involviert sind, umzugehen. Hier kann man sich nicht ausschließlich auf etablierte Informationsflüsse und Verhaltensmuster verlassen, sondern muss sich auch spontan-situativen Einflüssen stellen. Die für die Kommunikationsarbeit in und zwischen den involvierten Organisationen notwendigen Fähigkeiten müssen trainiert werden. Wir beschreiben die aktuelle Praxis des Krisenkommunikations-Trainings eines Energieversorgungsunternehmens (EVU) sowie den Prototypen zu dessen Unterstützung, den wir entwickelt, implementiert und evaluiert haben. Unser Trainingswerkzeug zielt nicht nur auf die lokale Praxis, sondern auch interorganisationale Trainings, was die Verbesserung eines gemeinsamen Verständnisses sowie der Informationsbedarfe anderer beinhaltet.},
booktitle = {Mensch \& {Computer} 2009: {Grenzenlos} frei?},
publisher = {Oldenbourg-Verlag},
author = {Reuter, Christian and Pipek, Volkmar},
editor = {Wandke, Hartmut and Kain, Saskia and Struve, Doreen},
year = {2009},
keywords = {Crisis, HCI, Projekt-RWE},
pages = {93--102},
}
[BibTeX] [Abstract] [Download PDF]
Web 2.0 Anwendungen haben in einigen Anwendungsfeldern zur Unterstützung von Kommunikation und Zusammenarbeit in Unternehmen Einzug gehalten. Dieser Beitrag stellt auch mithilfe von Beispielen dar, warum Social Software als kritische Informations-Infrastruktur (KII) betrachtet werden kann. Es wird gezeigt, dass das „kritisch“ im Bezug auf die „Infrastruktur“ Fallbezogen verschieden gedeutet werden kann: zum einen kann deren Ausfall betriebliche Prozesse lähmen, zum anderen kann durch dessen Verfügbarkeit eine explizite und ungewünschte Darstellung kritischer Sachverhalte erfolgen.
@inproceedings{reuter_social_2009,
address = {Berlin, Germany},
title = {Social {Software} als kritische {Informations}-{Infrastruktur}},
url = {http://www.peasec.de/paper/2009/2009_Reuter_SocialSoftwarealsKritischeInfrastruktur_MenschComputer-WS.pdf},
abstract = {Web 2.0 Anwendungen haben in einigen Anwendungsfeldern zur Unterstützung von Kommunikation und Zusammenarbeit in Unternehmen Einzug gehalten. Dieser Beitrag stellt auch mithilfe von Beispielen dar, warum Social Software als kritische Informations-Infrastruktur (KII) betrachtet werden kann. Es wird gezeigt, dass das „kritisch“ im Bezug auf die „Infrastruktur“ Fallbezogen verschieden gedeutet werden kann: zum einen kann deren Ausfall betriebliche Prozesse lähmen, zum anderen kann durch dessen Verfügbarkeit eine explizite und ungewünschte Darstellung kritischer Sachverhalte erfolgen.},
booktitle = {Mensch und {Computer} 2009 - {Workshopband}},
publisher = {Logos-Verlag},
author = {Reuter, Christian},
editor = {Kain, Saskia and Struve, Doreen and Wandke, Hartmut},
year = {2009},
keywords = {Crisis, HCI, SocialMedia, Infrastructure, Projekt-RWE},
pages = {140--144},
}
2008
[BibTeX] [Download PDF]
@book{reuter_computerunterstutztes_2008,
address = {Siegen},
title = {Computerunterstütztes kollaboratives {Training} im {Krisenkommunikations}-{Management} am {Beispiel} eines {Energieversorgungsunternehmens} ({Diplomarbeit})},
url = {https://peasec.de/paper/2008/2008_Reuter_KrisentrainingEnergieversorger_Diplomarbeit_Auszug.pdf},
author = {Reuter, Christian},
editor = {Pipek, Volkmar and Wulf, Volker},
year = {2008},
keywords = {Security, UsableSec, Crisis, HCI, Cooperation, Projekt-RWE},
}
[BibTeX] [Download PDF]
@article{reuter_entwicklung_2008,
title = {Entwicklung eines webbasierten {Dokumentenmanagement}-{Systems} für eine {Fluggesellschaft}},
volume = {50},
url = {http://www.peasec.de/paper/2008/2008_ReuterGeorg_EntwicklungWebbasiertesDMSFluggesellschaft_WI.pdf},
doi = {10.1365/s11576-008-0026-0},
number = {2},
journal = {Journal WIRTSCHAFTSINFORMATIK},
author = {Reuter, Christian and Georg, Christopher},
year = {2008},
keywords = {Student, HCI, A-Paper, Ranking-ImpactFactor, Cooperation, Ranking-VHB-B, Ranking-WKWI-A},
pages = {142--145},
}
Crisis
Crisis Informatics
Crisis informatics deals with the networking of people, organisations, information and IT (in particular social media and mobile devices) in crisis and disaster situations.
Selected:
[BibTeX] [Abstract] [Download PDF]
Data augmentation, the artificial creation of training data for machine learning by transformations, is a widely studied research field across machine learning disciplines. While it is useful for increasing a model’s generalization capabilities, it can also address many other challenges and problems, from overcoming a limited amount of training data, to regularizing the objective, to limiting the amount data used to protect privacy. Based on a precise description of the goals and applications of data augmentation and a taxonomy for existing works, this survey is concerned with data augmentation methods for textual classification and aims to provide a concise and comprehensive overview for researchers and practitioners. Derived from the taxonomy, we divide more than 100 methods into 12 different groupings and give state-of-the-art references expounding which methods are highly promising by relating them to each other. Finally, research perspectives that may constitute a building block for future work are provided.
@article{bayer_survey_2023,
title = {A {Survey} on {Data} {Augmentation} for {Text} {Classification}},
volume = {55},
url = {https://dl.acm.org/doi/pdf/10.1145/3544558},
doi = {10.1145/3544558},
abstract = {Data augmentation, the artificial creation of training data for machine learning by transformations, is a widely studied research field across machine learning disciplines. While it is useful for increasing a model's generalization capabilities, it can also address many other challenges and problems, from overcoming a limited amount of training data, to regularizing the objective, to limiting the amount data used to protect privacy. Based on a precise description of the goals and applications of data augmentation and a taxonomy for existing works, this survey is concerned with data augmentation methods for textual classification and aims to provide a concise and comprehensive overview for researchers and practitioners. Derived from the taxonomy, we divide more than 100 methods into 12 different groupings and give state-of-the-art references expounding which methods are highly promising by relating them to each other. Finally, research perspectives that may constitute a building block for future work are provided.},
number = {7},
journal = {ACM Computing Surveys (CSUR)},
author = {Bayer, Markus and Kaufhold, Marc-André and Reuter, Christian},
year = {2023},
keywords = {Crisis, Projekt-CYWARN, Projekt-emergenCITY, Projekt-ATHENE-SecUrban, A-Paper, AuswahlKaufhold, Ranking-CORE-A*, Selected, AuswahlCrisis, Ranking-ImpactFactor},
pages = {1--39},
}
[BibTeX] [Abstract]
In Germany and other countries, specialized non-profit reporting centers combat online hate speech by submitting criminal content to law enforcement agencies, forwarding deletion requests to social media platforms, and providing counseling to victims, thus contributing to the governance mechanism of content moderation as intermediaries between victims and various organizations. Whereas research in computer-supported cooperative work has extensively explored collaboration of and automation for content moderators, there are no works that focus on reporting centers. Based on expert interviews with their staff (N=15), this study finds that most German centers share a collaborative workflow, of which multiple tasks are heavily dependent on inter-organizational exchange. However, there are differences in their implementation of monitoring, content assessment, automation technology adoption, and external collaborators. As the centers are faced with diverse challenges, such as borderline case assessment, psychological burdens, limited visibility, conflicting goals with other actors, and manual repetitive work, our study contributes with nine implications for designing and researching supportive technologies. They provide suggestions for improving hate speech gathering and reporting, researching hate speech prioritization and assessment algorithms, and designing case processing systems. Beyond that, we outline directions for research on inter-organizational collaboration.
@article{baumler_harnessing_2025,
title = {Harnessing {Inter}-{Organizational} {Collaboration} and {Automation} to {Combat} {Online} {Hate} {Speech}: {A} {Qualitative} {Study} with {German} {Reporting} {Centers}},
abstract = {In Germany and other countries, specialized non-profit reporting centers combat online hate speech by submitting criminal content to law enforcement agencies, forwarding deletion requests to social media platforms, and providing counseling to victims, thus contributing to the governance mechanism of content moderation as intermediaries between victims and various organizations. Whereas research in computer-supported cooperative work has extensively explored collaboration of and automation for content moderators, there are no works that focus on reporting centers. Based on expert interviews with their staff (N=15), this study finds that most German centers share a collaborative workflow, of which multiple tasks are heavily dependent on inter-organizational exchange. However, there are differences in their implementation of monitoring, content assessment, automation technology adoption, and external collaborators. As the centers are faced with diverse challenges, such as borderline case assessment, psychological burdens, limited visibility, conflicting goals with other actors, and manual repetitive work, our study contributes with nine implications for designing and researching supportive technologies. They provide suggestions for improving hate speech gathering and reporting, researching hate speech prioritization and assessment algorithms, and designing case processing systems. Beyond that, we outline directions for research on inter-organizational collaboration.},
journal = {Proceedings of the ACM: Human Computer Interaction (PACM): Computer-Supported Cooperative Work and Social Computing},
author = {Bäumler, Julian and Riebe, Thea and Kaufhold, Marc-André and Reuter, Christian},
year = {2025},
keywords = {Crisis, HCI, Projekt-CYWARN, Projekt-CYLENCE, A-Paper, AuswahlCrisis, Ranking-CORE-A},
}
[BibTeX] [Abstract] [Download PDF]
During crises such as the COVID-19 pandemic, people spontaneously initiate support groups, while establishedorganizations like soccer clubs set non-regular goals, both offering help. Interested in the coordination of suchhelp and potential challenges of collaboration, we conducted a virtual ethnography of a multi-level networklocated in Germany. We focused on aims, activities, and technological mediation, with Activity Theory astheoretical framework. Our findings show that the organizational aim of coordinating help was successfullyachieved by connecting heterogeneous actors through digitization and institutionalization. Enabled by thecontext of the COVID-19 pandemic crisis, the network acted virtually, but was also able to integrate analogspaces of help. We identified six crucial implications regarding the use of technology and collaboration forbuilding a successful volunteering network.
@article{haesler_stronger_2021,
title = {Stronger {Together}: {How} {Neighborhood} {Groups} {Build} up a {Virtual} {Network} during the {COVID}-19 {Pandemic}},
volume = {5},
url = {https://peasec.de/paper/2021/2021_HaeslerSchmidVierneiselReuter_StrongerTogetherVirtualNetworkCOVID19_CSCW.pdf},
abstract = {During crises such as the COVID-19 pandemic, people spontaneously initiate support groups, while establishedorganizations like soccer clubs set non-regular goals, both offering help. Interested in the coordination of suchhelp and potential challenges of collaboration, we conducted a virtual ethnography of a multi-level networklocated in Germany. We focused on aims, activities, and technological mediation, with Activity Theory astheoretical framework. Our findings show that the organizational aim of coordinating help was successfullyachieved by connecting heterogeneous actors through digitization and institutionalization. Enabled by thecontext of the COVID-19 pandemic crisis, the network acted virtually, but was also able to integrate analogspaces of help. We identified six crucial implications regarding the use of technology and collaboration forbuilding a successful volunteering network.},
number = {CSCW2},
journal = {Proceedings of the ACM: Human Computer Interaction (PACM): Computer-Supported Cooperative Work and Social Computing},
author = {Haesler, Steffen and Schmid, Stefka and Vierneisel, Annemike Sophia and Reuter, Christian},
year = {2021},
keywords = {Crisis, HCI, Projekt-emergenCITY, Projekt-ATHENE-SecUrban, A-Paper, Selected, AuswahlCrisis, Ranking-CORE-A},
}
[BibTeX] [Abstract] [Download PDF]
Misinformation poses a recurrent challenge for video-sharing platforms (VSPs) like TikTok. Obtaining user perspectives on digital interventions addressing the need for transparency (e.g., through indicators) is essential. This article offers a thorough examination of the comprehensibility, usefulness, and limitations of an indicator-based intervention from an adolescents’ perspective. This study (𝑁 = 39; aged 13-16 years) comprised two qualitative steps: (1) focus group discussions and (2) think-aloud sessions, where participants engaged with a smartphone-app for TikTok. The results offer new insights into how video-based indicators can assist adolescents’ assessments. The intervention received positive feedback, especially for its transparency, and could be applicable to new content. This paper sheds light on how adolescents are expected to be experts while also being prone to video-based misinformation, with limited understanding of an intervention’s limitations. By adopting teenagers’ perspectives, we contribute to HCI research and provide new insights into the chances and limitations of interventions for VSPs.
@inproceedings{hartwig_adolescents_2024,
address = {New York, NY, USA},
series = {{CHI} '24},
title = {From {Adolescents}' {Eyes}: {Assessing} an {Indicator}-{Based} {Intervention} to {Combat} {Misinformation} on {TikTok}},
isbn = {9798400703300},
url = {https://doi.org/10.1145/3613904.3642264},
doi = {10.1145/3613904.3642264},
abstract = {Misinformation poses a recurrent challenge for video-sharing platforms (VSPs) like TikTok. Obtaining user perspectives on digital interventions addressing the need for transparency (e.g., through indicators) is essential. This article offers a thorough examination of the comprehensibility, usefulness, and limitations of an indicator-based intervention from an adolescents’ perspective. This study (𝑁 = 39; aged 13-16 years) comprised two qualitative steps: (1) focus group discussions and (2) think-aloud sessions, where participants
engaged with a smartphone-app for TikTok. The results offer new insights into how video-based indicators can assist adolescents’ assessments. The intervention received positive feedback, especially for its transparency, and could be applicable to new content. This paper sheds light on how adolescents are expected to be experts while also being prone to video-based misinformation, with limited understanding of an intervention’s limitations. By adopting
teenagers’ perspectives, we contribute to HCI research and provide new insights into the chances and limitations of interventions for VSPs.},
booktitle = {Proceedings of the {Conference} on {Human} {Factors} in {Computing} {Systems} ({CHI})},
publisher = {Association for Computing Machinery},
author = {Hartwig, Katrin and Biselli, Tom and Schneider, Franziska and Reuter, Christian},
year = {2024},
keywords = {Security, UsableSec, HCI, A-Paper, Ranking-CORE-A*, Selected, AuswahlCrisis, Projekt-ATHENE-PriVis, Projekt-NEBULA},
}
[BibTeX] [Abstract] [Download PDF]
Warning apps are used by many to receive warnings about imminent disasters. However, their potential for increasing awareness about general hazards and for increasing preparedness is currently underused. With a mixed-method design that includes a representative survey of the German population, a design workshop and an app evaluation experiment, this study investigates users’ preferences regarding non-acute preparedness alerts’ inclusion in crisis apps and the effectiveness of Nudging in this context. The experiment shows that while the social influence nudge had no significant effect compared to the control group without a nudging condition, the confrontational nudge increased the number of taken recommended preparedness measures. The evaluation indicates that the preparedness alerts increased users’ knowledge and their motivation to use a warning app. This motivation is, in contrast, decreased when the messages are perceived as a disruption. While many oppose push notifications, favor finding persuasively designed preparedness advice in a separate menu or as an optional notification.
@article{haunschild_preparedness_2023,
title = {Preparedness {Nudging} for {Warning} {Apps}? {A} {Mixed}-{Method} {Study} {Investigating} {Popularity} and {Effects} of {Preparedness} {Alerts} in {Warning} {Apps}},
volume = {172},
issn = {1071-5819},
url = {https://peasec.de/paper/2023/2023_HaunschildPauliReuter_NudgingWarningApps_IJHCS.pdf},
doi = {https://doi.org/10.1016/j.ijhcs.2023.102995},
abstract = {Warning apps are used by many to receive warnings about imminent disasters. However, their potential for increasing awareness about general hazards and for increasing preparedness is currently underused. With a mixed-method design that includes a representative survey of the German population, a design workshop and an app evaluation experiment, this study investigates users’ preferences regarding non-acute preparedness alerts’ inclusion in crisis apps and the effectiveness of Nudging in this context. The experiment shows that while the social influence nudge had no significant effect compared to the control group without a nudging condition, the confrontational nudge increased the number of taken recommended preparedness measures. The evaluation indicates that the preparedness alerts increased users’ knowledge and their motivation to use a warning app. This motivation is, in contrast, decreased when the messages are perceived as a disruption. While many oppose push notifications, favor finding persuasively designed preparedness advice in a separate menu or as an optional notification.},
journal = {International Journal on Human-Computer Studies (IJHCS)},
author = {Haunschild, Jasmin and Pauli, Selina and Reuter, Christian},
year = {2023},
keywords = {Student, Crisis, Projekt-emergenCITY, Projekt-ATHENE-SecUrban, A-Paper, Selected, AuswahlCrisis, Ranking-ImpactFactor},
pages = {102995},
}
[BibTeX] [Abstract] [Download PDF]
Modern Information and Communication Technology (ICT) has been used in safety-critical situations for over twenty years. Rooted in Human-Computer Interaction (HCI) and related disciplines, the field of crisis informatics made considerable efforts to investigate social media use and role patterns in crises, facilitate the collection, processing and refinement of social media data, design and evaluate supportive ICT, and provide cumulative and longitudinal research. This narrative review examines contemporary challenges of human-centred crisis informatics and envision trends for the following decade, including (I) a broadening scope of crisis informatics, (II) the professionalisation of cross-platform collaboration of citizen communities and emergency services, (III) expert interfaces for explainable and multimodal artificial intelligence for user-generated content assessment, (IV) internet of things and mobile apps for bidirectional communication and warnings in disruption-tolerant networks, as well as (V) digital twins and virtual reality for the effective training of multi-agency collaboration in hybrid hazards.
@article{kaufhold_exploring_2024,
title = {Exploring the evolving landscape of human-centred crisis informatics: current challenges and future trends},
volume = {23},
issn = {2196-6826},
url = {https://doi.org/10.1515/icom-2024-0002},
doi = {10.1515/icom-2024-0002},
abstract = {Modern Information and Communication Technology (ICT) has been used in safety-critical situations for over twenty years. Rooted in Human-Computer Interaction (HCI) and related disciplines, the field of crisis informatics made considerable efforts to investigate social media use and role patterns in crises, facilitate the collection, processing and refinement of social media data, design and evaluate supportive ICT, and provide cumulative and longitudinal research. This narrative review examines contemporary challenges of human-centred crisis informatics and envision trends for the following decade, including (I) a broadening scope of crisis informatics, (II) the professionalisation of cross-platform collaboration of citizen communities and emergency services, (III) expert interfaces for explainable and multimodal artificial intelligence for user-generated content assessment, (IV) internet of things and mobile apps for bidirectional communication and warnings in disruption-tolerant networks, as well as (V) digital twins and virtual reality for the effective training of multi-agency collaboration in hybrid hazards.},
number = {2},
journal = {i-com - Journal of Interactive Media},
author = {Kaufhold, Marc-André},
year = {2024},
keywords = {Crisis, HCI, Projekt-emergenCITY, Projekt-ATHENE-CyAware, Projekt-CYLENCE, AuswahlCrisis},
pages = {155--163},
}
[BibTeX] [Abstract] [Download PDF]
The research field of crisis informatics examines, amongst others, the potentials and barriers of social media use during conflicts and crises. Social media allow emergency services to reach the public easily in the context of crisis communication and receive valuable information (e.g. pictures) from social media data. However, the vast amount of data generated during large-scale incidents can lead to issues of information overload and quality. To mitigate these issues, this paper proposes the semi-automatic creation of alerts including keyword, relevance and information quality filters based on cross-platform social media data. We conducted empirical studies and workshops with emergency services across Europe to raise requirements, then iteratively designed and implemented an approach to support emergency services, and performed multiple evaluations, including live demonstrations and field trials, to research the potentials of social media-based alerts. Finally, we present the findings and implications based on semi-structured interviews with emergency services, highlighting the need for usable configurability and white-box algorithm representation.
@article{kaufhold_mitigating_2020,
title = {Mitigating {Information} {Overload} in {Social} {Media} during {Conflicts} and {Crises}: {Design} and {Evaluation} of a {Cross}-{Platform} {Alerting} {System}},
volume = {39},
url = {https://www.tandfonline.com/doi/full/10.1080/0144929X.2019.1620334},
doi = {10.1080/0144929X.2019.1620334},
abstract = {The research field of crisis informatics examines, amongst others, the potentials and barriers of social media use during conflicts and crises. Social media allow emergency services to reach the public easily in the context of crisis communication and receive valuable information (e.g. pictures) from social media data. However, the vast amount of data generated during large-scale incidents can lead to issues of information overload and quality. To mitigate these issues, this paper proposes the semi-automatic creation of alerts including keyword, relevance and information quality filters based on cross-platform social media data. We conducted empirical studies and workshops with emergency services across Europe to raise requirements, then iteratively designed and implemented an approach to support emergency services, and performed multiple evaluations, including live demonstrations and field trials, to research the potentials of social media-based alerts. Finally, we present the findings and implications based on semi-structured interviews with emergency services, highlighting the need for usable configurability and white-box algorithm representation.},
number = {3},
journal = {Behaviour \& Information Technology (BIT)},
author = {Kaufhold, Marc-André and Rupp, Nicola and Reuter, Christian and Habdank, Matthias},
year = {2020},
keywords = {Security, Crisis, HCI, Projekt-ATHENE-FANCY, A-Paper, AuswahlKaufhold, Selected, AuswahlCrisis, Ranking-CORE-A, Ranking-ImpactFactor, SocialMedia, Projekt-KontiKat},
pages = {319--342},
}
[BibTeX] [Abstract] [Download PDF]
Since the emergence of so-called fake news on the internet and in social media, platforms such as Facebook have started to take countermeasures, and researchers have begun looking into this phenomenon from a variety of perspectives. A large number of scientific work has investigated ways to detect fake news automatically. Less attention has been paid to the subsequent step, i.e., what to do when you are aware of the inaccuracy of claims in social media. This work takes a user-centered approach on means to counter identified mis- and disinformation in social media. We conduct a three-step study design on how approaches in social media should be presented to respect the users‘ needs and experiences and how effective they are. As our first step, in an online survey representative for some factors to the German adult population, we enquire regarding their strategies on handling information in social media, and their opinion regarding possible solutions — focusing on the approach of displaying a warning on inaccurate posts. In a second step, we present five potential approaches for countermeasures identified in related work to interviewees for qualitative input. We discuss (1) warning, (2) related articles, (3) reducing the size, (4) covering, and (5) requiring confirmation. Based on the interview feedback, as the third step of this study, we select, improve, and examine four promising approaches on how to counter misinformation. We conduct an online experiment to test their effectiveness on the perceived accuracy of false headlines and also ask for the users‘ preferences. In this study, we find that users welcome warning-based approaches to counter fake news and are somewhat critical with less transparent methods. Moreover, users want social media platforms to explain why a post was marked as disputed. The results regarding effectiveness are similar: Warning-based approaches are shown to be effective in reducing the perceived accuracy of false headlines. Moreover, adding an explanation to the warning leads to the most significant results. In contrast, we could not find a significant effect on one of Facebook’s current approaches (reduced post size and fact-checks in related articles).
@article{kirchner_countering_2020,
title = {Countering {Fake} {News}: {A} {Comparison} of {Possible} {Solutions} {Regarding} {User} {Acceptance} and {Effectiveness}},
volume = {4},
url = {https://dl.acm.org/doi/10.1145/3415211},
doi = {10.1145/3415211},
abstract = {Since the emergence of so-called fake news on the internet and in social media, platforms such as Facebook have started to take countermeasures, and researchers have begun looking into this phenomenon from a variety of perspectives. A large number of scientific work has investigated ways to detect fake news automatically. Less attention has been paid to the subsequent step, i.e., what to do when you are aware of the inaccuracy of claims in social media. This work takes a user-centered approach on means to counter identified mis- and disinformation in social media. We conduct a three-step study design on how approaches in social media should be presented to respect the users' needs and experiences and how effective they are. As our first step, in an online survey representative for some factors to the German adult population, we enquire regarding their strategies on handling information in social media, and their opinion regarding possible solutions — focusing on the approach of displaying a warning on inaccurate posts. In a second step, we present five potential approaches for countermeasures identified in related work to interviewees for qualitative input. We discuss (1) warning, (2) related articles, (3) reducing the size, (4) covering, and (5) requiring confirmation. Based on the interview feedback, as the third step of this study, we select, improve, and examine four promising approaches on how to counter misinformation. We conduct an online experiment to test their effectiveness on the perceived accuracy of false headlines and also ask for the users' preferences. In this study, we find that users welcome warning-based approaches to counter fake news and are somewhat critical with less transparent methods. Moreover, users want social media platforms to explain why a post was marked as disputed. The results regarding effectiveness are similar: Warning-based approaches are shown to be effective in reducing the perceived accuracy of false headlines. Moreover, adding an explanation to the warning leads to the most significant results. In contrast, we could not find a significant effect on one of Facebook's current approaches (reduced post size and fact-checks in related articles).},
number = {CSCW2},
journal = {Proceedings of the ACM: Human Computer Interaction (PACM): Computer-Supported Cooperative Work and Social Computing},
author = {Kirchner, Jan and Reuter, Christian},
year = {2020},
note = {Place: Austin, USA
Publisher: ACM},
keywords = {Student, Crisis, HCI, A-Paper, Selected, AuswahlCrisis, Ranking-CORE-A, Ranking-ImpactFactor, Cooperation},
pages = {140:1--140:28},
}
[BibTeX] [Abstract] [Download PDF]
Die zweite, aktualisierte Auflage dieses Lehr- und Fachbuchs gibt eine fundierte und praxisbezogene Einführung sowie einen Überblick über Grundlagen, Methoden und Anwendungen der Mensch-Computer-Interaktion im Kontext von Sicherheit, Notfällen, Krisen, Katastrophen, Krieg und Frieden. Dies adressierend werden interaktive, mobile, ubiquitäre und kooperative Technologien sowie soziale Medien vorgestellt. Hierbei finden klassische Themen wie benutzbare (IT-)Sicherheit, Industrie 4.0, Katastrophenschutz, Medizin und Automobil, aber auch Augmented Reality, Crowdsourcing, Shitstorm Management, Social Media Analytics und Cyberwar ihren Platz. Methodisch wird das Spektrum von Usable Safety bis Usable Security Engineering von Analyse über Design bis Evaluation abgedeckt. Das Buch eignet sich ebenso als Lehrbuch für Studierende wie als Handbuch für Wissenschaftler, Designer, Entwickler und Anwender.
@book{reuter_sicherheitskritische_2021,
address = {Wiesbaden},
edition = {2},
title = {Sicherheitskritische {Mensch}-{Computer}-{Interaktion}: {Interaktive} {Technologien} und {Soziale} {Medien} im {Krisen}- und {Sicherheitsmanagement} ({Zweite} {Auflage})},
isbn = {978-3-658-32795-8},
url = {https://www.springer.com/de/book/9783658327941},
abstract = {Die zweite, aktualisierte Auflage dieses Lehr- und Fachbuchs gibt eine fundierte und praxisbezogene Einführung sowie einen Überblick über Grundlagen, Methoden und Anwendungen der Mensch-Computer-Interaktion im Kontext von Sicherheit, Notfällen, Krisen, Katastrophen, Krieg und Frieden. Dies adressierend werden interaktive, mobile, ubiquitäre und kooperative Technologien sowie soziale Medien vorgestellt. Hierbei finden klassische Themen wie benutzbare (IT-)Sicherheit, Industrie 4.0, Katastrophenschutz, Medizin und Automobil, aber auch Augmented Reality, Crowdsourcing, Shitstorm Management, Social Media Analytics und Cyberwar ihren Platz. Methodisch wird das Spektrum von Usable Safety bis Usable Security Engineering von Analyse über Design bis Evaluation abgedeckt. Das Buch eignet sich ebenso als Lehrbuch für Studierende wie als Handbuch für Wissenschaftler, Designer, Entwickler und Anwender.},
publisher = {Springer Vieweg},
author = {Reuter, Christian},
year = {2021},
keywords = {Peace, Security, UsableSec, HCI, Projekt-CYWARN, Projekt-emergenCITY, Projekt-ATHENE-SecUrban, Selected, AuswahlCrisis, SocialMedia, Projekt-KontiKat, Infrastructure},
}
[BibTeX] [Abstract] [Download PDF]
The value of social media in crises, disasters, and emergencies across different events, participants, and states is now well-examined in crisis informatics research. Previous research has contributed to the state of the art with empirical insights on the use of social media, approaches for the gathering and processing of big social data, the design and evaluation of information systems, and the analysis of cumulative and longitudinal data. While some studies examined social media use representatively for their target audience, these usually only comprise a single point of inquiry and do not allow for a trend analysis. This work provides results (1) of a representative survey with German citizens from 2021 on use patterns, perceptions, and expectations regarding social media during emergencies. Furthermore, it (2) compares these results to previous surveys and provides insights on temporal changes and trends from 2017, over 2019 to 2021. Our findings highlight that social media use in emergencies increased in 2021 and 2019 compared to 2017. Between 2019 and 2021, the amount of information shared on social media remained on a similar level, while the perceived disadvantages of social media in emergencies significantly increased. In light of demographic variables, the results of the 2021 survey confirm previous findings, according to which older individuals (45+ years) use social media in emergencies less often than younger individuals (18-24 years). Furthermore, while the quicker availability of information was one of the reasons for social media use, especially the potential information overload was a key factor for not using social media in emergencies. The results are discussed in light of the dynamic nature of attitudes regarding social media in emergencies and the need to account for heterogeneity in user expectations to build trustworthy information ecosystems in social media.
@article{reuter_increasing_2023,
title = {Increasing {Adoption} {Despite} {Perceived} {Limitations} of {Social} {Media} in {Emergencies}: {Representative} {Insights} on {German} {Citizens}’ {Perception} and {Trends} from 2017 to 2021},
volume = {96},
issn = {2212-4209},
url = {https://peasec.de/paper/2023/2023_ReuterKaufholdBiselliPleil_SocialMediaEmergenciesSurvey_IJDRR.pdf},
doi = {https://doi.org/10.1016/j.ijdrr.2023.103880},
abstract = {The value of social media in crises, disasters, and emergencies across different events, participants, and states is now well-examined in crisis informatics research. Previous research has contributed to the state of the art with empirical insights on the use of social media, approaches for the gathering and processing of big social data, the design and evaluation of information systems, and the analysis of cumulative and longitudinal data. While some studies examined social media use representatively for their target audience, these usually only comprise a single point of inquiry and do not allow for a trend analysis. This work provides results (1) of a representative survey with German citizens from 2021 on use patterns, perceptions, and expectations regarding social media during emergencies. Furthermore, it (2) compares these results to previous surveys and provides insights on temporal changes and trends from 2017, over 2019 to 2021. Our findings highlight that social media use in emergencies increased in 2021 and 2019 compared to 2017. Between 2019 and 2021, the amount of information shared on social media remained on a similar level, while the perceived disadvantages of social media in emergencies significantly increased. In light of demographic variables, the results of the 2021 survey confirm previous findings, according to which older individuals (45+ years) use social media in emergencies less often than younger individuals (18-24 years). Furthermore, while the quicker availability of information was one of the reasons for social media use, especially the potential information overload was a key factor for not using social media in emergencies. The results are discussed in light of the dynamic nature of attitudes regarding social media in emergencies and the need to account for heterogeneity in user expectations to build trustworthy information ecosystems in social media.},
journal = {International Journal of Disaster Risk Reduction (IJDRR)},
author = {Reuter, Christian and Kaufhold, Marc-André and Biselli, Tom and Pleil, Helene},
year = {2023},
keywords = {Student, Crisis, Projekt-emergenCITY, Projekt-CYLENCE, A-Paper, AuswahlCrisis, Projekt-NEBULA, Ranking-ImpactFactor, SocialMedia},
}
[BibTeX] [Abstract] [Download PDF]
Usage of social media during emergencies and respective perceptions vary across countries. Our representative survey of 7,071 citizens in Europe (Germany, Italy, the Netherlands and the United Kingdom) shows differences of current use of social media in emergencies, expectations towards authorities monitoring social media, intensity of perceiving barriers regarding the use as well as variances concerning the (likelihood of future) use of mobile apps. While German and British participants‘ frequency of use of social media is medium and low, respectively, Italian and Dutch respondents use them relatively frequently. Our comparison of the four countries allows for an interpretation of divergent behavior across countries with respect to risk cultures as well as expanding the respective model to social media contexts. At the same time, our findings stress that across the four European countries participants assessed similar advantages like dissemination of information and barriers like false rumors with respect to use social media during emergencies. Distributed equally across nations, age and gender showed significant relationships with social media usage which, among other findings, suggests being helpful for effective implementation of management structures using new technologies.
@article{reuter_impact_2019,
title = {The {Impact} of {Risk} {Cultures}: {Citizens}' {Perception} of {Social} {Media} {Use} in {Emergencies} across {Europe}},
volume = {148},
url = {http://www.peasec.de/paper/2019/2019_ReuterKaufholdSchmidSpielhoferHahne_TheImpactofRiskCultures_TFSC.pdf},
doi = {10.1016/j.techfore.2019.119724},
abstract = {Usage of social media during emergencies and respective perceptions vary across countries. Our representative survey of 7,071 citizens in Europe (Germany, Italy, the Netherlands and the United Kingdom) shows differences of current use of social media in emergencies, expectations towards authorities monitoring social media, intensity of perceiving barriers regarding the use as well as variances concerning the (likelihood of future) use of mobile apps. While German and British participants' frequency of use of social media is medium and low, respectively, Italian and Dutch respondents use them relatively frequently. Our comparison of the four countries allows for an interpretation of divergent behavior across countries with respect to risk cultures as well as expanding the respective model to social media contexts. At the same time, our findings stress that across the four European countries participants assessed similar advantages like dissemination of information and barriers like false rumors with respect to use social media during emergencies. Distributed equally across nations, age and gender showed significant relationships with social media usage which, among other findings, suggests being helpful for effective implementation of management structures using new technologies.},
number = {119724},
journal = {Technological Forecasting and Social Change (TFSC)},
author = {Reuter, Christian and Kaufhold, Marc-André and Schmid, Stefka and Spielhofer, Thomas and Hahne, Anna Sophie},
year = {2019},
keywords = {Crisis, HCI, A-Paper, Selected, AuswahlCrisis, Ranking-ImpactFactor, SocialMedia, Projekt-EmerGent, Ranking-VHB-B},
pages = {1--17},
}
[BibTeX] [Abstract] [Download PDF]
Since the terrorist attacks of 9/11, the use of social media in emergency and crisis events has greatly increased and many studies have concentrated on the use of ICT and social media be-fore, during or after these events. The field of research that these studies fall under is called cri-sis informatics. In this paper, we evaluate and analyze crisis informatics research by looking at case studies of social media use in emergencies, outlining the types of research found in crisis informatics, and expounding upon the forms of interaction that have been researched. Finally, we summarize the achievements from an HCI perspective and outline trends and challenges for future research.
@article{reuter_social_2018,
title = {Social {Media} in {Crisis} {Management}: {An} {Evaluation} and {Analysis} of {Crisis} {Informatics} {Research}},
volume = {34},
url = {http://www.peasec.de/paper/2018/2018_ReuterHughesKaufhold_SocialMediaCrisisManagementEvaluation_IJHCI.pdf},
doi = {10.1080/10447318.2018.1427832},
abstract = {Since the terrorist attacks of 9/11, the use of social media in emergency and crisis events has greatly increased and many studies have concentrated on the use of ICT and social media be-fore, during or after these events. The field of research that these studies fall under is called cri-sis informatics. In this paper, we evaluate and analyze crisis informatics research by looking at case studies of social media use in emergencies, outlining the types of research found in crisis informatics, and expounding upon the forms of interaction that have been researched. Finally, we summarize the achievements from an HCI perspective and outline trends and challenges for future research.},
number = {4},
journal = {International Journal on Human-Computer Interaction (IJHCI)},
author = {Reuter, Christian and Hughes, Amanda Lee and Kaufhold, Marc-André},
year = {2018},
keywords = {Peace, Crisis, HCI, A-Paper, Selected, AuswahlCrisis, Ranking-ImpactFactor, SocialMedia, Projekt-KontiKat, Ranking-CORE-B, Ranking-WKWI-B},
pages = {280--294},
}