- Begutachtete Zeitschriften / Peer-reviewed Journals
- Bücher und herausgegebene Zeitschriften / Books and Edited Special Issues in Journals
- Kapitel in Büchern
- Publikationen in Konferenzbänden / Peer-reviewed Conference Papers
- Sonstige Publikationen / Other Papers
Begutachtete Zeitschriften / Peer-reviewed Journals
2024
[BibTeX] [Abstract] [Download PDF]
The field of cybersecurity is evolving fast. Security professionals are in need of intelligence on past, current and – ideally – on upcoming threats, because attacks are becoming more advanced and are increasingly targeting larger and more complex systems. Since the processing and analysis of such large amounts of information cannot be addressed manually, cybersecurity experts rely on machine learning techniques. In the textual domain, pre-trained language models like BERT have proven to be helpful as they provide a good baseline for further fine-tuning. However, due to the domain-knowledge and the many technical terms in cybersecurity, general language models might miss the gist of textual information. For this reason, we create a high-quality dataset and present a language model specifically tailored to the cybersecurity domain which can serve as a basic building block for cybersecurity systems. The model is compared on 15 tasks: Domain-dependent extrinsic tasks for measuring the performance on specific problems, intrinsic tasks for measuring the performance of the internal representations of the model as well as general tasks from the SuperGLUE benchmark. The results of the intrinsic tasks show that our model improves the internal representation space of domain words compared to the other models. The extrinsic, domain-dependent tasks, consisting of sequence tagging and classification, show that the model performs best in cybersecurity scenarios. In addition, we pay special attention to the choice of hyperparameters against catastrophic forgetting, as pre-trained models tend to forget the original knowledge during further training.
@article{bayer_cysecbert_2024,
title = {{CySecBERT}: {A} {Domain}-{Adapted} {Language} {Model} for the {Cybersecurity} {Domain}},
volume = {27},
issn = {2471-2566},
url = {https://doi.org/10.1145/3652594},
doi = {10.1145/3652594},
abstract = {The field of cybersecurity is evolving fast. Security professionals are in need of intelligence on past, current and - ideally - on upcoming threats, because attacks are becoming more advanced and are increasingly targeting larger and more complex systems. Since the processing and analysis of such large amounts of information cannot be addressed manually, cybersecurity experts rely on machine learning techniques. In the textual domain, pre-trained language models like BERT have proven to be helpful as they provide a good baseline for further fine-tuning. However, due to the domain-knowledge and the many technical terms in cybersecurity, general language models might miss the gist of textual information. For this reason, we create a high-quality dataset and present a language model specifically tailored to the cybersecurity domain which can serve as a basic building block for cybersecurity systems. The model is compared on 15 tasks: Domain-dependent extrinsic tasks for measuring the performance on specific problems, intrinsic tasks for measuring the performance of the internal representations of the model as well as general tasks from the SuperGLUE benchmark. The results of the intrinsic tasks show that our model improves the internal representation space of domain words compared to the other models. The extrinsic, domain-dependent tasks, consisting of sequence tagging and classification, show that the model performs best in cybersecurity scenarios. In addition, we pay special attention to the choice of hyperparameters against catastrophic forgetting, as pre-trained models tend to forget the original knowledge during further training.},
number = {2},
journal = {ACM Transactions on Privacy and Security (TOPS)},
author = {Bayer, Markus and Kuehn, Philipp and Shanehsaz, Ramin and Reuter, Christian},
month = apr,
year = {2024},
note = {Place: New York, NY, USA
Publisher: Association for Computing Machinery},
keywords = {Student, UsableSec, Security, A-Paper, Ranking-ImpactFactor, Ranking-CORE-A, Projekt-CYWARN, Projekt-CYLENCE, Projekt-ATHENE-CyAware},
}
[BibTeX] [Abstract] [Download PDF]
Active learning is designed to minimize annotation efforts by prioritizing instances that most enhance learning. However, many active learning strategies struggle with a ‚cold start‘ problem, needing substantial initial data to be effective. This limitation often reduces their utility for pre-trained models, which already perform well in few-shot scenarios. To address this, we introduce ActiveLLM, a novel active learning approach that leverages large language models such as GPT-4, Llama 3, and Mistral Large for selecting instances. We demonstrate that ActiveLLM significantly enhances the classification performance of BERT classifiers in few-shot scenarios, outperforming both traditional active learning methods and the few-shot learning method SetFit. Additionally, ActiveLLM can be extended to non-few-shot scenarios, allowing for iterative selections. In this way, ActiveLLM can even help other active learning strategies to overcome their cold start problem. Our results suggest that ActiveLLM offers a promising solution for improving model performance across various learning setups.
@article{bayer_activellm_2024,
title = {{ActiveLLM}: {Large} {Language} {Model}-based {Active} {Learning} for {Textual} {Few}-{Shot} {Scenarios}},
url = {https://arxiv.org/pdf/2405.10808},
abstract = {Active learning is designed to minimize annotation efforts by prioritizing instances that most enhance learning. However, many active learning strategies struggle with a 'cold start' problem, needing substantial initial data to be effective. This limitation often reduces their utility for pre-trained models, which already perform well in few-shot scenarios. To address this, we introduce ActiveLLM, a novel active learning approach that leverages large language models such as GPT-4, Llama 3, and Mistral Large for selecting instances. We demonstrate that ActiveLLM significantly enhances the classification performance of BERT classifiers in few-shot scenarios, outperforming both traditional active learning methods and the few-shot learning method SetFit. Additionally, ActiveLLM can be extended to non-few-shot scenarios, allowing for iterative selections. In this way, ActiveLLM can even help other active learning strategies to overcome their cold start problem. Our results suggest that ActiveLLM offers a promising solution for improving model performance across various learning setups.},
journal = {arXiv},
author = {Bayer, Markus and Reuter, Christian},
year = {2024},
keywords = {UsableSec, Security, Projekt-CYLENCE, Projekt-ATHENE-CyAware},
}
[BibTeX] [Abstract] [Download PDF]
Browser cookies, especially those from third parties, pose a threat to individual privacy. While it is possible in principle to control the number of cookies accepted, this choice is often neither usable nor truly informed. To address this issue, this study used semi-structured interviews (N=19) to identify attitudes and user requirements to develop an alternative personalised cookie banner, which was evaluated in an online experiment (N=157). The cookie banner explanations were tailored to the privacy knowledge of three groups of users: low, medium and high. The online experiment measured cookie choices and perceived usability of the cookie banner across three groups: an experimental group that viewed the novel cookie banner with personalisation (personalised privacy assistant), a control group that viewed the novel cookie banner without personalisation (privacy assistant) and a control group that viewed the standard cookie banner provided by the website. The results indicate that the novel cookie banner (with or without personalisation) generally resulted in significantly fewer accepted cookies and increased usability compared to the standard cookie window. In addition, the personalised cookie banner resulted in significantly fewer accepted cookies and higher usability than the non-personalised cookie banner. These results suggest that tailoring cookie banners to users‘ privacy knowledge can be an effective approach to empowering users to make informed choices and better protect their privacy.
@article{biselli_supporting_2024,
title = {Supporting {Informed} {Choices} about {Browser} {Cookies}: {The} {Impact} of {Personalised} {Cookie} {Banners}},
url = {https://petsymposium.org/popets/2024/popets-2024-0011.pdf},
doi = {https://doi.org/10.56553/popets-2024-0011},
abstract = {Browser cookies, especially those from third parties, pose a threat to individual privacy. While it is possible in principle to control the number of cookies accepted, this choice is often neither usable nor truly informed. To address this issue, this study used semi-structured interviews (N=19) to identify attitudes and user requirements to develop an alternative personalised cookie banner, which was evaluated in an online experiment (N=157). The cookie banner explanations were tailored to the privacy knowledge of three groups of users: low, medium and high. The online experiment measured cookie choices and perceived usability of the cookie banner across three groups: an experimental group that viewed the novel cookie banner with personalisation (personalised privacy assistant), a control group that viewed the novel cookie banner without personalisation (privacy assistant) and a control group that viewed the standard cookie banner provided by the website. The results indicate that the novel cookie banner (with or without personalisation) generally resulted in significantly fewer accepted cookies and increased usability compared to the standard cookie window. In addition, the personalised cookie banner resulted in significantly fewer accepted cookies and higher usability than the non-personalised cookie banner. These results suggest that tailoring cookie banners to users' privacy knowledge can be an effective approach to empowering users to make informed choices and better protect their privacy.},
number = {1},
journal = {Proceedings on Privacy Enhancing Technologies (PoPETs)},
author = {Biselli, Tom and Utz, Laura and Reuter, Christian},
year = {2024},
keywords = {HCI, Selected, Student, UsableSec, Security, A-Paper, Ranking-CORE-A, Projekt-CROSSING, AuswahlUsableSec},
pages = {171--191},
}
[BibTeX] [Abstract] [Download PDF]
This article explores two key facets of institutionalized ethical review processes in Germany: (1) their importance in shaping ethical research and (2) their associated challenges, with a specific focus on their implications within the social sciences. Ethical considerations play a pivotal role in (social science) research, safeguarding, amongst others, the rights and well-being of participants and ensuring research integrity. Despite notable progress in promoting research ethics, German research institutions still need to significantly improve their ethics review processes. To address these challenges, this article emphasizes the need for expanding the current management of research ethics and implementing what we call ?Institutionalized Research Ethics Practices?? (IREPs), which include but go beyond the scope of common Institutional Review Boards (IRBs). Drawing on two workshops with researchers and IRB members, and a systematic review of existing IRBs in the German social sciences, we propose concrete recommendations for developing and enhancing IREPs, including a conducive environment, accessibility, fairness, and fostering expertise (CAFE). These enhancements aim to strengthen Germany?s research ethics infrastructure and promote responsible and ethical research practices in the social sciences.
@article{crawford_ethical_2024,
title = {Ethical research in the {German} social sciences: {Exploring} the significance and challenges of institutionalized research ethics practices},
issn = {1747-0161},
url = {https://doi.org/10.1177/17470161241270787},
doi = {10.1177/17470161241270787},
abstract = {This article explores two key facets of institutionalized ethical review processes in Germany: (1) their importance in shaping ethical research and (2) their associated challenges, with a specific focus on their implications within the social sciences. Ethical considerations play a pivotal role in (social science) research, safeguarding, amongst others, the rights and well-being of participants and ensuring research integrity. Despite notable progress in promoting research ethics, German research institutions still need to significantly improve their ethics review processes. To address these challenges, this article emphasizes the need for expanding the current management of research ethics and implementing what we call ?Institutionalized Research Ethics Practices?? (IREPs), which include but go beyond the scope of common Institutional Review Boards (IRBs). Drawing on two workshops with researchers and IRB members, and a systematic review of existing IRBs in the German social sciences, we propose concrete recommendations for developing and enhancing IREPs, including a conducive environment, accessibility, fairness, and fostering expertise (CAFE). These enhancements aim to strengthen Germany?s research ethics infrastructure and promote responsible and ethical research practices in the social sciences.},
urldate = {2024-08-19},
journal = {Research Ethics},
author = {Crawford, Andrew and Fichtner, Laura and Guntrum, Laura and Jänsch, Stephanie and Krösche, Niklas and Soulier, Eloïse and Süß, Clara-Auguste},
month = aug,
year = {2024},
note = {Publisher: SAGE Publications Ltd},
keywords = {Ranking-ImpactFactor, Peace},
pages = {17470161241270787},
}
[BibTeX] [Abstract]
In many applications and websites people use in their everyday life, their privacy and data is threatened, e.g., by script tracking during browsing. Although researchers and companies have developed privacy-enhancing technologies (PETs), they are often difficult to use for lay users. In this paper, we conducted a literature review to classify users into different support personas based on their privacy competence and privacy concern. With developers of PETs in mind, support personas were envisioned to facilitate the customization of software according to the support needs of different users. In order to demonstrate the usefulness of support personas and based on workshop sessions with 15 participants, we designed a browser extension which supports users with the issue of script tracking by providing different user interfaces for different support personas. The following qualitative evaluation with 31 participants showed that the developed UI elements worked as intended for the different support personas. Therefore, we conclude the concept of support personas is useful in the development process of usable applications that enhance the privacy of the users while also educating them and thus potentially increasing their privacy literacy.
@article{demuth_support_2024,
title = {Support {Personas}: {A} {Concept} for {Tailored} {Support} of {Users} of {Privacy}-{Enhancing} {Technologies}},
abstract = {In many applications and websites people use in their everyday life, their privacy and data is threatened, e.g., by script tracking during browsing. Although researchers and companies have developed privacy-enhancing technologies (PETs), they are often difficult to use for lay users. In this paper, we conducted a literature review to classify users into different support personas based on their privacy competence and privacy concern. With developers of PETs in mind, support personas were envisioned to facilitate the customization of software according to the support needs of different users. In order to demonstrate the usefulness of support personas and based on workshop sessions with 15 participants, we designed a browser extension which supports users with the issue of script tracking by providing different user interfaces for different support personas. The following qualitative evaluation with 31 participants showed that the developed UI elements worked as intended for the different support personas. Therefore, we conclude the concept of support personas is useful in the development process of usable applications that enhance the privacy of the users while also educating them and thus potentially increasing their privacy literacy.},
number = {4},
journal = {Proceedings on Privacy Enhancing Technologies (PoPETs)},
author = {Demuth, Kilian and Linsner, Sebastian and Biselli, Tom and Kaufhold, Marc-André and Reuter, Christian},
year = {2024},
keywords = {HCI, UsableSec, Security, A-Paper, Ranking-CORE-A, Projekt-CROSSING, Projekt-ATHENE-PriVis},
}
[BibTeX] [Abstract] [Download PDF]
Die Entwicklung letaler (teil)autonomer Waffensysteme (LAWS) gewinnt zunehmend an Bedeutung. Seit 2013 wird das Thema innerhalb der UN Convention on Certain Conventional Weapons zwischen Mitgliedsstaaten, Zivilgesellschaft und Fachexpert*innen diskutiert. Während sich die Debatte zu Beginn stark mit definitorischen Fragen von LAWS auseinandersetzte, so dominieren im Forum derzeit technische und rechtliche Fragen, was sich auch im entsprechenden wissenschaftlichen Diskurs widerspiegelt. Andererseits haben auch zivilgesellschaftliche Akteure den Verhandlungsprozess wesentlich beeinflusst, nicht zuletzt die Campaign to Stop Killer Robots, welche an der Initiierung des Verhandlungsrahmens maßgeblich beteiligt war. Einer der zentralen Argumentationsstränge dieser zivilgesellschaftlichen Akteure konzentriert sich auf eine intersektionale Perspektive, die unter anderem auf Bias in Technologien und Anwendungen aufmerksam macht, und versucht, diese Perspektiven in die GGE zu LAWS einzubringen und zu stärken. Die Analyse von 51 UN-Dokumenten und Gespräche mit Expert*innen zeigen, dass – im Hinblick auf Intersektionalität – insbesondere die Konzepte Gender und Race in den GGE-Diskussionen berücksichtigt werden, wenn auch nur mit geringem Gewicht. NGOs konnten jedoch die Gesamtdebatte beeinflussen und neue Themen einbringen, indem sie an etabliertere Diskurse in der Debatte anknüpften, wie z. B. an rechtliche oder technische Diskurse.
@article{gonsior_intersektionale_2024,
title = {Die intersektionale {Perspektive} auf letale autonome {Waffensysteme}: {Eine} {Analyse} der {Diskurse} innerhalb der {UN}-{Waffenkonvention}},
issn = {1866-2196},
url = {https://doi.org/10.1007/s12399-024-00999-3},
doi = {10.1007/s12399-024-00999-3},
abstract = {Die Entwicklung letaler (teil)autonomer Waffensysteme (LAWS) gewinnt zunehmend an Bedeutung. Seit 2013 wird das Thema innerhalb der UN Convention on Certain Conventional Weapons zwischen Mitgliedsstaaten, Zivilgesellschaft und Fachexpert*innen diskutiert. Während sich die Debatte zu Beginn stark mit definitorischen Fragen von LAWS auseinandersetzte, so dominieren im Forum derzeit technische und rechtliche Fragen, was sich auch im entsprechenden wissenschaftlichen Diskurs widerspiegelt. Andererseits haben auch zivilgesellschaftliche Akteure den Verhandlungsprozess wesentlich beeinflusst, nicht zuletzt die Campaign to Stop Killer Robots, welche an der Initiierung des Verhandlungsrahmens maßgeblich beteiligt war. Einer der zentralen Argumentationsstränge dieser zivilgesellschaftlichen Akteure konzentriert sich auf eine intersektionale Perspektive, die unter anderem auf Bias in Technologien und Anwendungen aufmerksam macht, und versucht, diese Perspektiven in die GGE zu LAWS einzubringen und zu stärken. Die Analyse von 51 UN-Dokumenten und Gespräche mit Expert*innen zeigen, dass – im Hinblick auf Intersektionalität – insbesondere die Konzepte Gender und Race in den GGE-Diskussionen berücksichtigt werden, wenn auch nur mit geringem Gewicht. NGOs konnten jedoch die Gesamtdebatte beeinflussen und neue Themen einbringen, indem sie an etabliertere Diskurse in der Debatte anknüpften, wie z. B. an rechtliche oder technische Diskurse.},
journal = {Zeitschrift für Außen- und Sicherheitspolitik (ZfAS)},
author = {Gonsior, Anja-Liisa},
month = jul,
year = {2024},
keywords = {Peace, Projekt-TraCe, Projekt-ATHENE-CyAware},
}
[BibTeX] [Abstract]
This article examines how Colombian NGOs use Information and Communication Technologies (ICTs) for peacebuilding attempts amid the COVID-19 pandemic. Drawing from 17 interviews with NGO members, the study underscores the pivotal role of digital peacebuilding in sustaining and expanding peace attempts, effective data management, and a broader engagement of target groups beyond in-person activities often associated with safety and financial concerns. The findings also identify prevailing challenges of incorporating ICTs in NGO’s peacebuilding activities, ranging from privacy-related concerns to connectivity issues. The article points out the potential for NGOs to enhance interactivity, knowledge transfer, and to diversify their activities, including IT-security training and awareness campaigns on hate speech and propaganda. It also emphasizes the importance of developing risk reduction strategies tailored to the specific needs of different target groups.
@article{guntrum_navigating_2024,
title = {Navigating the {Pandemic} through {Technology}: {Colombian} {NGOs} {Promoting} {Peace} during the {COVID}-19 era},
abstract = {This article examines how Colombian NGOs use Information and Communication Technologies (ICTs) for peacebuilding attempts amid the COVID-19 pandemic. Drawing from 17 interviews with NGO members, the study underscores the pivotal role of digital peacebuilding in sustaining and expanding peace attempts, effective data management, and a broader engagement of target groups beyond in-person activities often associated with safety and financial concerns. The findings also identify prevailing challenges of incorporating ICTs in NGO's peacebuilding activities, ranging from privacy-related concerns to connectivity issues. The article points out the potential for NGOs to enhance interactivity, knowledge transfer, and to diversify their activities, including IT-security training and awareness campaigns on hate speech and propaganda. It also emphasizes the importance of developing risk reduction strategies tailored to the specific needs of different target groups.},
journal = {Peacebuilding \& Development},
author = {Guntrum, Laura and Cerrillo, Sofía and Reuter, Christian},
year = {2024},
keywords = {Student, Peace, Projekt-TraCe},
}
[BibTeX] [Abstract] [Download PDF]
Misinformation represent a key challenge for society. User-centered misinformation interventions as digital countermeasures that exert a direct influence on users represent a promising means to deal with the large amounts of information available. While an extensive body of research on this topic exists, researchers are confronted with a diverse research landscape spanning multiple disciplines. This review systematizes the landscape of user-centered misinformation interventions to facilitate knowledge transfer, identify trends, and enable informed decision-making. Over 3,700 scholarly publications were screened and a systematic literature review (N=108) was conducted. A taxonomy was derived regarding intervention design (e.g., binary label), user interaction (active or passive), and timing (e.g., post exposure to misinformation). We provide a structured overview of approaches across multiple disciplines, and derive six overarching challenges for future research.
@article{hartwig_landscape_2024,
title = {The {Landscape} of {User}-centered {Misinformation} {Interventions} – {A} {Systematic} {Literature} {Review}},
volume = {56},
issn = {0360-0300},
url = {https://peasec.de/paper/2024/2024_HartwigDoellReuter_LandscapeUserCentredMisinfoInterventions_CSUR.pdf},
doi = {10.1145/3674724},
abstract = {Misinformation represent a key challenge for society. User-centered misinformation interventions as digital countermeasures that exert a direct influence on users represent a promising means to deal with the large amounts of information available. While an extensive body of research on this topic exists, researchers are confronted with a diverse research landscape spanning multiple disciplines. This review systematizes the landscape of user-centered misinformation interventions to facilitate knowledge transfer, identify trends, and enable informed decision-making. Over 3,700 scholarly publications were screened and a systematic literature review (N=108) was conducted. A taxonomy was derived regarding intervention design (e.g., binary label), user interaction (active or passive), and timing (e.g., post exposure to misinformation). We provide a structured overview of approaches across multiple disciplines, and derive six overarching challenges for future research.},
number = {11},
journal = {ACM Computing Surveys (CSUR)},
author = {Hartwig, Katrin and Doell, Frederic and Reuter, Christian},
month = jul,
year = {2024},
keywords = {HCI, Selected, Student, A-Paper, Ranking-CORE-A*, Ranking-ImpactFactor, Peace, Projekt-NEBULA},
}
[BibTeX] [Abstract] [Download PDF]
Misinformation presents a challenge to democracies, particularly in times of crisis. One way in which misinformation is spread is through voice messages sent via messenger groups, which enable members to share information on a larger scale. Gaining user perspectives on digital misinformation interventions as countermeasure after detection is crucial. In this paper, we extract potential features of misinformation in voice messages from literature, implement them within a program that automatically processes voice messages, and evaluate their perceived usefulness and comprehensibility as user-centered indicators.We propose 35 features extracted from audio files at the character, word, sentence, audio and creator levels to assist (1) private individuals in conducting credibility assessments, (2) government agencies faced with data overload during crises, and (3) researchers seeking to gather features for automatic detection approaches. We conducted a think-aloud study with laypersons (N = 20) to provide initial insight into how individuals autonomously assess the credibility of voice messages, as well as which automatically extracted features they find to be clear and convincing indicators of misinformation. Our study provides qualitative and quantitative insights into valuable indicators, particularly when they relate directly to the content or its creator, and uncovers challenges in user interface design.
@article{hartwig_navigating_2024,
title = {Navigating {Misinformation} in {Voice} {Messages}: {Identification} of {User}-{Centered} {Features} for {Digital} {Interventions}},
issn = {1944-4079},
url = {https://peasec.de/paper/2024/2024_HartwigSandlerReuter_NavigatingMisinfoVoiceMessages_RiskHazards.pdf},
doi = {10.1002/rhc3.12296},
abstract = {Misinformation presents a challenge to democracies, particularly in times of crisis. One way in which misinformation is spread is through voice messages sent via messenger groups, which enable members to share information on a larger scale. Gaining user perspectives on digital misinformation interventions as countermeasure after detection is crucial. In this paper, we extract potential features of misinformation in voice messages from literature, implement them within a program that automatically processes voice messages, and evaluate their perceived usefulness and comprehensibility as user-centered indicators.We propose 35 features extracted from audio files at the character, word, sentence, audio and creator levels to assist (1) private individuals in conducting credibility assessments, (2) government agencies faced with data overload during crises, and (3) researchers seeking to gather features for automatic detection approaches. We conducted a think-aloud study with laypersons (N = 20) to provide initial insight into how individuals autonomously assess the credibility of voice messages, as well as which automatically extracted features they find to be clear and convincing indicators of misinformation. Our study provides qualitative and quantitative insights into valuable indicators, particularly when they relate directly to the content or its creator, and uncovers challenges in user interface design.},
journal = {Risk, Hazards, \& Crisis in Public Policy (RHCPP)},
author = {Hartwig, Katrin and Sandler, Ruslan and Reuter, Christian},
year = {2024},
note = {Publisher: John Wiley \& Sons, Ltd},
keywords = {Crisis, HCI, SocialMedia, Student, UsableSec, A-Paper, Ranking-ImpactFactor, Cyberwar, Projekt-NEBULA, Projekt-CYLENCE, Projekt-ATHENE},
}
[BibTeX] [Abstract] [Download PDF]
Recent crises like the COVID-19 pandemic provoked an increasing appearance of misleading information, emphasizing the need for effective user-centered countermeasures as an important field in HCI research. This work investigates how content-specific user-centered indicators can contribute to an informed approach to misleading information. In a threefold study, we conducted an in-depth content analysis of 2,382 German tweets on Twitter (now X) to identify topical (e.g., 5G), formal (e.g., links), and rhetorical (e.g., sarcasm) characteristics through manual coding, followed by a qualitative online survey to evaluate which indicators users already use autonomously to assess a tweet’s credibility. Subsequently, in a think-aloud study participants qualitatively evaluated the identified indicators in terms of perceived comprehensibility and usefulness. While a number of indicators were found to be particularly comprehensible and useful (e.g., claim for absolute truth and rhetorical questions), our findings reveal limitations of indicator-based interventions, particularly for people with entrenched conspiracy theory views. We derive four implications for digitally supporting users in dealing with misleading information, especially during crises.
@article{hartwig_misleading_2024,
title = {Misleading {Information} in {Crises}: {Exploring} {Content}-specific {Indicators} on {Twitter} from a {User} {Perspective}},
issn = {0144-929X},
url = {https://doi.org/10.1080/0144929X.2024.2373166},
doi = {10.1080/0144929X.2024.2373166},
abstract = {Recent crises like the COVID-19 pandemic provoked an increasing appearance of misleading information,
emphasizing the need for effective user-centered countermeasures as an important field in HCI research. This
work investigates how content-specific user-centered indicators can contribute to an informed approach to
misleading information. In a threefold study, we conducted an in-depth content analysis of 2,382 German
tweets on Twitter (now X) to identify topical (e.g., 5G), formal (e.g., links), and rhetorical (e.g., sarcasm)
characteristics through manual coding, followed by a qualitative online survey to evaluate which indicators
users already use autonomously to assess a tweet’s credibility. Subsequently, in a think-aloud study participants
qualitatively evaluated the identified indicators in terms of perceived comprehensibility and usefulness. While
a number of indicators were found to be particularly comprehensible and useful (e.g., claim for absolute truth
and rhetorical questions), our findings reveal limitations of indicator-based interventions, particularly for
people with entrenched conspiracy theory views. We derive four implications for digitally supporting users in
dealing with misleading information, especially during crises.},
journal = {Behaviour \& Information Technology (BIT)},
author = {Hartwig, Katrin and Schmid, Stefka and Biselli, Tom and Pleil, Helene and Reuter, Christian},
year = {2024},
keywords = {Crisis, HCI, A-Paper, Ranking-ImpactFactor, Ranking-CORE-A, Projekt-NEBULA, Projekt-ATHENE-PriVis},
pages = {1--34},
}
[BibTeX] [Abstract] [Download PDF]
In Colombia, Transitional Justice (TJ) institutions were established after years of violent conflict as part of the 2016 peace agreement between the FARC and the Colombian government. By analysing the posting behaviour of the government-appointed TJ institutions on Facebook, we show how general TJ aims and opportunities for citizen participation were promoted in 2019. Our analysis reveals that the organisations rarely address topics related to reconciliation and that active online participation and two-way communication are rather scarce. Instead, Facebook is mainly used by the TJ organisations to increase solidarity with victims and disseminate information about their work and the TJ process. Reflecting on existing literature on TJ and social media participation, we identify great potential for expanding TJ goals and community engagement on social media, to use it as a resource for facilitating the TJ processes, creating exchange, and enabling participation.
@article{haunschild_towards_2024,
title = {Towards a {Digitally} {Mediated} {Transitional} {Justice} {Process}? {An} {Analysis} of {Colombian} {Transitional} {Justice} {Organisations}’ {Posting} {Behaviour} on {Facebook}},
volume = {30},
issn = {1082-7307},
url = {https://nsuworks.nova.edu/pcs/vol30/iss2/4/},
abstract = {In Colombia, Transitional Justice (TJ) institutions were established after years of violent conflict as part of the 2016 peace agreement between the FARC and the Colombian government. By analysing the posting behaviour of the government-appointed TJ institutions on Facebook, we show how general TJ aims and opportunities for citizen participation were promoted in 2019. Our analysis reveals that the organisations rarely address topics related to reconciliation and that active online participation and two-way communication are rather scarce. Instead, Facebook is mainly used by the TJ organisations to increase solidarity with victims and disseminate information about their work and the TJ process. Reflecting on existing literature on TJ and social media participation, we identify great potential for expanding TJ goals and community engagement on social media, to use it as a resource for facilitating the TJ processes, creating exchange, and enabling participation.},
number = {2},
journal = {Peace and Conflict Studies},
author = {Haunschild, Jasmin and Guntrum, Laura and Cerrillo, Sofía and Bujara, Franziska and Reuter, Christian},
year = {2024},
keywords = {SocialMedia, Student, Peace, Projekt-ATHENE-SecUrban},
}
[BibTeX] [Abstract] [Download PDF]
In disasters and crises, crisis preparation at the household level is crucial for societal resilience. However, motivating citizens to take personal responsibility and to implement preparedness measures remains challenging. This study investigates the impact of values, beliefs and norms on preparedness. Through a survey in Germany on resource-oriented crisis preparedness and participants’ values, a group of more prepared and less prepared individuals was differentiated. We quantitatively analyzed the correlation between values and crisis preparedness. A quantitative analysis revealed a significant association between the value of benevolence and higher preparedness. Follow-up interviews (N=30) explored participants&\#039; beliefs and norms, showing minimal group differences. Although crisis preparedness is generally viewed positively, strong negativity exists towards perceived “hoarders”. The study discusses implication for crisis communication and the design of nudges and persuasive systems, emphasizing intervention that can trigger benevolence to foster preparedness and appeal to the social benefits to counter the narrative of anti-social crisis preparedness.
@article{haunschild_understanding_2024,
title = {Understanding {Crisis} {Preparedness}: {Insights} from {Personal} {Values}, {Beliefs}, {Social} {Norms}, and {Personal} {Norms}},
volume = {21},
url = {https://ojs.iscram.org/index.php/Proceedings/article/view/19},
abstract = {In disasters and crises, crisis preparation at the household level is crucial for societal resilience. However, motivating citizens to take personal responsibility and to implement preparedness measures remains challenging. This study investigates the impact of values, beliefs and norms on preparedness. Through a survey in Germany on resource-oriented crisis preparedness and participants’ values, a group of more prepared and less prepared individuals was differentiated. We quantitatively analyzed the correlation between values and crisis preparedness. A quantitative analysis revealed a significant association between the value of benevolence and higher preparedness. Follow-up interviews (N=30) explored participants\&\#039; beliefs and norms, showing minimal group differences. Although crisis preparedness is generally viewed positively, strong negativity exists towards perceived “hoarders”. The study discusses implication for crisis communication and the design of nudges and persuasive systems, emphasizing intervention that can trigger benevolence to foster preparedness and appeal to the social benefits to counter the narrative of anti-social crisis preparedness.},
urldate = {2024-05-27},
journal = {Proceedings of the Information Systems for Crisis Response and Management (ISCRAM) (Best Paper Award)},
author = {Haunschild, Jasmin and Burger, Felix and Reuter, Christian},
month = may,
year = {2024},
note = {Section: ISCRAM Proceedings},
keywords = {Crisis, Student, Projekt-ATHENE-SecUrban, Projekt-emergenCITY},
}
[BibTeX] [Abstract] [Download PDF]
Modern Information and Communication Technology (ICT) has been used in safety-critical situations for over twenty years. Rooted in Human-Computer Interaction (HCI) and related disciplines, the field of crisis informatics made considerable efforts to investigate social media use and role patterns in crises, facilitate the collection, processing and refinement of social media data, design and evaluate supportive ICT, and provide cumulative and longitudinal research. This narrative review examines contemporary challenges of human-centred crisis informatics and envision trends for the following decade, including (I) a broadening scope of crisis informatics, (II) the professionalisation of cross-platform collaboration of citizen communities and emergency services, (III) expert interfaces for explainable and multimodal artificial intelligence for user-generated content assessment, (IV) internet of things and mobile apps for bidirectional communication and warnings in disruption-tolerant networks, as well as (V) digital twins and virtual reality for the effective training of multi-agency collaboration in hybrid hazards.
@article{kaufhold_exploring_2024,
title = {Exploring the evolving landscape of human-centred crisis informatics: current challenges and future trends},
volume = {23},
issn = {2196-6826},
url = {https://doi.org/10.1515/icom-2024-0002},
doi = {10.1515/icom-2024-0002},
abstract = {Modern Information and Communication Technology (ICT) has been used in safety-critical situations for over twenty years. Rooted in Human-Computer Interaction (HCI) and related disciplines, the field of crisis informatics made considerable efforts to investigate social media use and role patterns in crises, facilitate the collection, processing and refinement of social media data, design and evaluate supportive ICT, and provide cumulative and longitudinal research. This narrative review examines contemporary challenges of human-centred crisis informatics and envision trends for the following decade, including (I) a broadening scope of crisis informatics, (II) the professionalisation of cross-platform collaboration of citizen communities and emergency services, (III) expert interfaces for explainable and multimodal artificial intelligence for user-generated content assessment, (IV) internet of things and mobile apps for bidirectional communication and warnings in disruption-tolerant networks, as well as (V) digital twins and virtual reality for the effective training of multi-agency collaboration in hybrid hazards.},
number = {2},
journal = {i-com - Journal of Interactive Media},
author = {Kaufhold, Marc-André},
year = {2024},
keywords = {AuswahlCrisis, Crisis, HCI, Projekt-emergenCITY, Projekt-CYLENCE, Projekt-ATHENE-CyAware},
pages = {155--163},
}
[BibTeX] [Abstract] [Download PDF]
Farm Management Information Systems (FMIS) are an important core component of modern farming companies as they allow, e.g., to document activities, create fertilization plans, and feed digital equipment with required data. Since the entire agricultural sector is an essential component of food production, high standards of resilience should be established in the involved companies. Accordingly, the used software should also be designed with high standards on reliability and crisis capability. Based on a literature review, we found that software for farmers with certain resilience needs is lacking. Thus, we designed and evaluated a new FMIS concept with the user-centered design method. By conducting focus groups (two rounds, total N=57) in 2017 and 2019, we raised specific front-end and back-end requirements of farmers. Based on the requirements, we developed our concept for both front- and back-end in terms of a decentralized and offline-working FMIS. Through the evaluation with practitioners (N=16) of the implemented concept, we derived findings and implications, highlighting the need for privacy, stability, and offline-capability, as well as the UI-requirement to be supportive, e.g., with easy to understand icons and terms.
@article{kuntke_geobox_2024,
title = {{GeoBox}: {Design} and {Evaluation} of a {Tool} for {Resilient} and {Decentralized} {Data} {Management} in {Agriculture}},
volume = {43},
issn = {0144-929X},
url = {https://peasec.de/paper/2023/2023_KuntkeKaufholdLinsnerReuter_GeoBox_BIT.pdf},
doi = {10.1080/0144929X.2023.2185747},
abstract = {Farm Management Information Systems (FMIS) are an important core component of modern farming companies as they allow, e.g., to document activities, create fertilization plans, and feed digital equipment with required data. Since the entire agricultural sector is an essential component of food production, high standards of resilience should be established in the involved companies. Accordingly, the used software should also be designed with high standards on reliability and crisis capability. Based on a literature review, we found that software for farmers with certain resilience needs is lacking. Thus, we designed and evaluated a new FMIS concept with the user-centered design method. By conducting focus groups (two rounds, total N=57) in 2017 and 2019, we raised specific front-end and back-end requirements of farmers. Based on the requirements, we developed our concept for both front- and back-end in terms of a decentralized and offline-working FMIS. Through the evaluation with practitioners (N=16) of the implemented concept, we derived findings and implications, highlighting the need for privacy, stability, and offline-capability, as well as the UI-requirement to be supportive, e.g., with easy to understand icons and terms.},
number = {4},
journal = {Behaviour \& Information Technology (BIT)},
author = {Kuntke, Franz and Kaufhold, Marc-André and Linsner, Sebastian and Reuter, Christian},
month = mar,
year = {2024},
note = {Publisher: Taylor \& Francis},
keywords = {Selected, UsableSec, Security, A-Paper, Ranking-ImpactFactor, Ranking-CORE-A, AuswahlUsableSec, Projekt-GeoBox, Projekt-AgriRegio},
pages = {764--786},
}
[BibTeX] [Abstract]
In today’s world, cyber-attacks are becoming more frequent and thus proactive protection against them is becoming more important. Cyber Threat Intelligence (CTI) is a possible solution, as it collects threat information in various information sources and derives stakeholder intelligence to protect one’s infrastructure. The current focus of CTI in research is the clear web, but the dark web may contain further information. To further advance protection, this work analyzes the dark web as Open Source Intelligence (OSINT) data source to complement current CTI information. The underlying assumption is that hackers use the dark web to exchange, develop, and share information and assets. This work aims to understand the structure of the dark web and identify the amount of its openly available CTI related information. We conducted a comprehensive literature review for dark web research and CTI. To follow this up we manually investigated and analyzed 65 dark web forum (DWF), 7 single-vendor shops, and 72 dark web marketplace (DWM). We documented the content and relevance of DWFs and DWMs for CTI, as well as challenges during the extraction and provide mitigations. During our investigation we identified IT security relevant information in both DWFs and DWMs, ranging from malware toolboxes to hacking-as-a-service. One of the most present challenges during our manual analysis were necessary interactions to access information and anti-crawling measures, i.e., CAPTCHAs. This analysis showed 88\% of marketplaces and 53\% of forums contained relevant data. Our complementary semi-automated analysis of 1,186,906 onion addresses indicates, that the necessary interaction makes it difficult to see the dark web as an open, but rather treat it as specialized information source, when clear web information does not suffice.
@article{kuhn_navigating_2024,
title = {Navigating the {Shadows}: {Manual} and {Semi}-{Automated} {Evaluation} of the {Dark} {Web} for {Cyber} {Threat} {Intelligence}},
issn = {2169-3536},
doi = {10.1109/ACCESS.2024.3448247},
abstract = {In today’s world, cyber-attacks are becoming more frequent and thus proactive protection against them is becoming more important. Cyber Threat Intelligence (CTI) is a possible solution, as it collects threat information in various information sources and derives stakeholder intelligence to protect one’s infrastructure. The current focus of CTI in research is the clear web, but the dark web may contain further information. To further advance protection, this work analyzes the dark web as Open Source Intelligence (OSINT) data source to complement current CTI information. The underlying assumption is that hackers use the dark web to exchange, develop, and share information and assets. This work aims to understand the structure of the dark web and identify the amount of its openly available CTI related information. We conducted a comprehensive literature review for dark web research and CTI. To follow this up we manually investigated and analyzed 65 dark web forum (DWF), 7 single-vendor shops, and 72 dark web marketplace (DWM). We documented the content and relevance of DWFs and DWMs for CTI, as well as challenges during the extraction and provide mitigations. During our investigation we identified IT security relevant information in both DWFs and DWMs, ranging from malware toolboxes to hacking-as-a-service. One of the most present challenges during our manual analysis were necessary interactions to access information and anti-crawling measures, i.e., CAPTCHAs. This analysis showed 88\% of marketplaces and 53\% of forums contained relevant data. Our complementary semi-automated analysis of 1,186,906 onion addresses indicates, that the necessary interaction makes it difficult to see the dark web as an open, but rather treat it as specialized information source, when clear web information does not suffice.},
journal = {IEEE Access},
author = {Kühn, Philipp and Wittorf, Kyra and Reuter, Christian},
year = {2024},
keywords = {Student, UsableSec, Security, Ranking-ImpactFactor, Projekt-ATHENE-SecUrban, Projekt-CYWARN, Ranking-Core-A},
}
[BibTeX] [Abstract] [Download PDF]
In many scenarios users have to communicate sensitive data with third parties such as doctors, lawyers, insurance companies, social workers or online shops. Handing over personal data is necessary to use those services but the delegation of tasks to increase efficiency still poses the risk that personal data might be leaked. To minimize this risk and further enhance the privacy of users, we propose an interaction concept that uses layered encryption of messages to provide a trade-off between privacy and usability. Users can choose which data is additionally encrypted in an inner layer, say, for the eyes of their doctor only, and which data is available in an outer (encrypted or unencrypted) layer for all staff members. Another benefit is the hiding of sensitive data from package inspection or crawling algorithms over emails, while less critical parts can still be processed by these systems via the partial access. To investigate this concept, we derive relevant use cases for form-based communication over email from a quantitative pre-study with 1011 participants, showing that general practitioners are the most suitable use case. We developed demonstrators for this use case and evaluated them in a qualitative study with 42 participants. Our results show that the possibility of minimizing the propagation of sensitive data through additional encryption is highly appreciated and the usage of form-based communication is a promising approach for the digital transformation.
@article{linsner_decision-based_2024,
title = {Decision-based {Data} {Distribution} ({D}³): {Enabling} {Users} to {Minimize} {Data} {Propagation} in {Privacy}-sensitive {Scenarios}},
issn = {2299-0984},
url = {https://petsymposium.org/popets/2024/popets-2024-0113.php},
doi = {https://doi.org/10.56553/popets-2024-0113},
abstract = {In many scenarios users have to communicate sensitive data with third parties such as doctors, lawyers, insurance companies, social workers or online shops. Handing over personal data is necessary to use those services but the delegation of tasks to increase efficiency still poses the risk that personal data might be leaked. To minimize this risk and further enhance the privacy of users, we propose an interaction concept that uses layered encryption of messages to provide a trade-off between privacy and usability. Users can choose which data is additionally encrypted in an inner layer, say, for the eyes of their doctor only, and which data is available in an outer (encrypted or unencrypted) layer for all staff members. Another benefit is the hiding of sensitive data from package inspection or crawling algorithms over emails, while less critical parts can still be processed by these systems via the partial access. To investigate this concept, we derive relevant use cases for form-based communication over email from a quantitative pre-study with 1011 participants, showing that general practitioners are the most suitable use case. We developed demonstrators for this use case and evaluated them in a qualitative study with 42 participants. Our results show that the possibility of minimizing the propagation of sensitive data through additional encryption is highly appreciated and the usage of form-based communication is a promising approach for the digital transformation.},
number = {4},
journal = {Proceedings on Privacy Enhancing Technologies (PoPETs)},
author = {Linsner, Sebastian and Demuth, Kilian and Fischlin, Marc and Reuter, Christian},
year = {2024},
keywords = {HCI, Selected, UsableSec, Security, A-Paper, Ranking-CORE-A, Projekt-CROSSING, Projekt-ATHENE-PriVis},
}
[BibTeX] [Abstract] [Download PDF]
Internet of Things (IoT) devices have become increasingly important within the smart home domain, making the security of the devices a critical aspect. The majority of IoT devices are black-box systems running closed and pre-installed firmware. This raises concerns about the trustworthiness of these devices, especially considering that some of them are shipped with a microphone or a camera. Remote attestation aims at validating the trustworthiness of these devices by verifying the integrity of the software. However, users cannot validate whether the attestation has actually taken place and has not been manipulated by an attacker, raising the need for HCI research on trust and understandability. We conducted a qualitative study with 35 participants, investigating trust in the attestation process and whether this trust can be improved by additional explanations in the application. We developed an application that allows users to attest a smart speaker using their smartphone over an audio channel to identify the attested device and observe the attestation process. In order to observe the differences between the applications with and without explanations, we performed A/B testing. We discovered that trust increases when additional explanations of the technical process are provided, improving the understanding of the attestation process.
@article{linsner_building_2024,
title = {Building {Trust} in {Remote} {Attestation} {Through} {Transparency} – {A} {Qualitative} {User} {Study} on {Observable} {Attestation}},
issn = {0144-929X},
url = {https://doi.org/10.1080/0144929X.2024.2374889},
doi = {10.1080/0144929X.2024.2374889},
abstract = {Internet of Things (IoT) devices have become increasingly important within the smart home domain, making the security of the devices a critical aspect. The majority of IoT devices are black-box systems running closed and pre-installed firmware. This raises concerns about the trustworthiness of these devices, especially considering that some of them are shipped with a microphone or a camera. Remote attestation aims at validating the trustworthiness of these devices by verifying the integrity of the software. However, users cannot validate whether the attestation has actually taken place and has not been manipulated by an attacker, raising the need for HCI research on trust and understandability. We conducted a qualitative study with 35 participants, investigating trust in the attestation process and whether this trust can be improved by additional explanations in the application. We developed an application that allows users to attest a smart speaker using their smartphone over an audio channel to identify the attested device and observe the attestation process. In order to observe the differences between the applications with and without explanations, we performed A/B testing. We discovered that trust increases when additional explanations of the technical process are provided, improving the understanding of the attestation process.},
journal = {Behaviour \& Information Technology},
author = {Linsner, Sebastian and Demuth, Kilian and Surminski, Sebastian and Davi, Lucas and Reuter, Christian},
year = {2024},
note = {Publisher: Taylor \& Francis},
keywords = {Security, A-Paper, Ranking-ImpactFactor, Projekt-CROSSING, Projekt-ATHENE-PriVis, Usable security},
pages = {1--21},
}
[BibTeX] [Abstract]
Trustworthy digital communication requires the secure exchange of contact information, but current approaches lack usability and scalability for larger groups of users. We evaluate the usability of two secure contact exchange systems: the current state of the art, SafeSlinger, and our newly designed protocol, PairSonic, which extends trust from physical encounters to spontaneous online communication. Our lab study (N=45) demonstrates PairSonic’s superior usability, automating the tedious verification tasks from previous approaches via an acoustic out-of-band channel. Although participants significantly preferred our system, minimizing user effort surprisingly decreased the perceived security for some users, who associated security with complexity. We discuss user perceptions of the different protocol components and identify remaining usability barriers for CSCW application scenarios.
@article{putz_sounds_2024,
title = {Sounds {Good}? {Fast} and {Secure} {Contact} {Exchange} in {Groups}},
volume = {8},
doi = {10.1145/3686964},
abstract = {Trustworthy digital communication requires the secure exchange of contact information, but current approaches lack usability and scalability for larger groups of users. We evaluate the usability of two secure contact exchange systems: the current state of the art, SafeSlinger, and our newly designed protocol, PairSonic, which extends trust from physical encounters to spontaneous online communication. Our lab study (N=45) demonstrates PairSonic's superior usability, automating the tedious verification tasks from previous approaches via an acoustic out-of-band channel. Although participants significantly preferred our system, minimizing user effort surprisingly decreased the perceived security for some users, who associated security with complexity. We discuss user perceptions of the different protocol components and identify remaining usability barriers for CSCW application scenarios.},
number = {CSCW2},
journal = {Proceedings of the ACM: Human Computer Interaction (PACM): Computer-Supported Cooperative Work and Social Computing},
author = {Putz, Florentin and Haesler, Steffen and Hollick, Matthias},
year = {2024},
keywords = {HCI, UsableSec, Security, A-Paper, Ranking-CORE-A, Projekt-emergenCITY},
}
[BibTeX]
@article{reuter_combating_2024,
title = {Combating {Information} {Warfare}: {State} and {Trends} in {User}-{Centered} {Countermeasures} against {Fake} {News} and {Misinformation}},
journal = {Behaviour \& Information Technology (BIT)},
author = {Reuter, Christian and Hughes, Amanda Lee and Buntain, Cody},
year = {2024},
keywords = {Crisis, HCI, SocialMedia, A-Paper, Ranking-ImpactFactor, Ranking-CORE-A, Peace},
}
[BibTeX] [Download PDF]
@article{reuter_informatik_2024,
title = {Informatik für den {Frieden}: {Perspektive} von {PEASEC} zu 40 {Jahren} {FIfF}},
url = {https://peasec.de/paper/2024/2024_Reuteretal_InformatikFuerFrieden_fiff.pdf},
journal = {FIfF-Kommunikation},
author = {Reuter, Christian and Franken, Jonas and Reinhold, Thomas and Kuehn, Philipp and Kaufhold, Marc-André and Riebe, Thea and Hartwig, Katrin and Biselli, Tom and Schmid, Stefka and Guntrum, Laura and Haesler, Steffen},
year = {2024},
keywords = {Security, Peace},
}
[BibTeX] [Abstract] [Download PDF]
In crises such as the COVID-19 pandemic, it is crucial to support users when dealing with social media content. Considering digital resilience, we propose a web app based on Social Network Analysis (SNA) to provide an overview of potentially misleading vs. non-misleading content on Twitter, which can be explored by users and enable foundational learning. The latter aims at systematically identifying thematic patterns which may be associated with misleading information. Additionally, it entails reflecting on indicators of misleading tweets which are proposed to approach classification of tweets. Paying special attention to non-expert users of social media, we conducted a two-step Think Aloud study for evaluation. While participants valued the opportunity to generate new knowledge and the diversity of the application, qualities such as equality and rapidity may be further improved. However, learning effects outweighed individual costs as all users were able to shift focus onto relevant features, such as hashtags, while readily pointing out content characteristics. Our design artifact connects to learning-oriented interventions regarding the spread of misleading information and tackles information overload by a SNA-based plug-in.
@article{schmid_digital_2024,
title = {Digital {Resilience} in {Dealing} with {Misinformation} on {Social} {Media} during {COVID}-19: {A} {Web} {Application} to {Assist} {Users} in {Crises}},
volume = {26},
issn = {1572-9419},
url = {https://doi.org/10.1007/s10796-022-10347-5},
doi = {10.1007/s10796-022-10347-5},
abstract = {In crises such as the COVID-19 pandemic, it is crucial to support users when dealing with social media content. Considering digital resilience, we propose a web app based on Social Network Analysis (SNA) to provide an overview of potentially misleading vs. non-misleading content on Twitter, which can be explored by users and enable foundational learning. The latter aims at systematically identifying thematic patterns which may be associated with misleading information. Additionally, it entails reflecting on indicators of misleading tweets which are proposed to approach classification of tweets. Paying special attention to non-expert users of social media, we conducted a two-step Think Aloud study for evaluation. While participants valued the opportunity to generate new knowledge and the diversity of the application, qualities such as equality and rapidity may be further improved. However, learning effects outweighed individual costs as all users were able to shift focus onto relevant features, such as hashtags, while readily pointing out content characteristics. Our design artifact connects to learning-oriented interventions regarding the spread of misleading information and tackles information overload by a SNA-based plug-in.},
number = {2},
journal = {Information Systems Frontiers (ISF)},
author = {Schmid, Stefka and Hartwig, Katrin and Cieslinski, Robert and Reuter, Christian},
month = apr,
year = {2024},
keywords = {Crisis, Student, A-Paper, Projekt-TraCe, Projekt-NEBULA},
pages = {477--499},
}
[BibTeX] [Abstract] [Download PDF]
Digital technology and smartphones provide great opportunities to support crisis response measures. During the COVID-19 pandemic, many countries introduced contact tracing apps (CTAs) to prevent the virus’s spread and identify infection clusters. Because wide acceptance is necessary for these apps to work, it has been a subject of research. Past research often highlighted the role of trust for acceptance and suggested that technical transparency by opening the source code can help to build trust. For this reason, we studied the acceptance of two German apps: the Corona-Warn-App (CWA), which was developed as open-source software early on, and the Luca app, which did not publish the source code initially. We conducted a multinomial logistic regression testing effects on the adoption of (1) only the CWA, (2) only the Luca app, or (3) both apps. As predictors, we considered the role of trust in the app publisher and the government and controlled for predictors relevant to past research. We found trust to have a significant effect on the acceptance of the apps. A self-reported understanding of the term “open-source software” and a perceived threat by COVID-19 had a positive effect for the Corona-Warn-App or both apps but not for the Luca app alone. Being from Eastern Germany lowered the acceptance of the Luca app or both apps. Our findings can add to previous CTA acceptance research and provide insights for policymakers for future digital crisis measures, especially for populations comparable to the German population regarding government trust and privacy attitudes.
@article{steinbrink_impact_2024,
title = {The {Impact} of {Transparency} and {Trust} on {User} {Acceptance} of {Contact} {Tracing} {Apps}: {Implications} for the {Adoption} of {Crisis} {Response} {Apps}},
issn = {2212-4209},
url = {https://www.sciencedirect.com/science/article/pii/S2212420924004230},
doi = {10.1016/j.ijdrr.2024.104661},
abstract = {Digital technology and smartphones provide great opportunities to support crisis response measures. During the COVID-19 pandemic, many countries introduced contact tracing apps (CTAs) to prevent the virus’s spread and identify infection clusters. Because wide acceptance is necessary for these apps to work, it has been a subject of research. Past research often highlighted the role of trust for acceptance and suggested that technical transparency by opening the source code can help to build trust. For this reason, we studied the acceptance of two German apps: the Corona-Warn-App (CWA), which was developed as open-source software early on, and the Luca app, which did not publish the source code initially. We conducted a multinomial logistic regression testing effects on the adoption of (1) only the CWA, (2) only the Luca app, or (3) both apps. As predictors, we considered the role of trust in the app publisher and the government and controlled for predictors relevant to past research. We found trust to have a significant effect on the acceptance of the apps. A self-reported understanding of the term “open-source software” and a perceived threat by COVID-19 had a positive effect for the Corona-Warn-App or both apps but not for the Luca app alone. Being from Eastern Germany lowered the acceptance of the Luca app or both apps. Our findings can add to previous CTA acceptance research and provide insights for policymakers for future digital crisis measures, especially for populations comparable to the German population regarding government trust and privacy attitudes.},
journal = {International Journal of Disaster Risk Reduction},
author = {Steinbrink, Enno and Reuter, Christian},
month = jul,
year = {2024},
keywords = {Crisis, HCI, A-Paper, Ranking-ImpactFactor, Projekt-GRKPrivacy, Projekt-ATHENE-PriVis},
pages = {104661},
}
2023
[BibTeX] [Abstract] [Download PDF]
Data augmentation, the artificial creation of training data for machine learning by transformations, is a widely studied research field across machine learning disciplines. While it is useful for increasing a model’s generalization capabilities, it can also address many other challenges and problems, from overcoming a limited amount of training data, to regularizing the objective, to limiting the amount data used to protect privacy. Based on a precise description of the goals and applications of data augmentation and a taxonomy for existing works, this survey is concerned with data augmentation methods for textual classification and aims to provide a concise and comprehensive overview for researchers and practitioners. Derived from the taxonomy, we divide more than 100 methods into 12 different groupings and give state-of-the-art references expounding which methods are highly promising by relating them to each other. Finally, research perspectives that may constitute a building block for future work are provided.
@article{bayer_survey_2023,
title = {A {Survey} on {Data} {Augmentation} for {Text} {Classification}},
volume = {55},
url = {https://dl.acm.org/doi/pdf/10.1145/3544558},
doi = {10.1145/3544558},
abstract = {Data augmentation, the artificial creation of training data for machine learning by transformations, is a widely studied research field across machine learning disciplines. While it is useful for increasing a model's generalization capabilities, it can also address many other challenges and problems, from overcoming a limited amount of training data, to regularizing the objective, to limiting the amount data used to protect privacy. Based on a precise description of the goals and applications of data augmentation and a taxonomy for existing works, this survey is concerned with data augmentation methods for textual classification and aims to provide a concise and comprehensive overview for researchers and practitioners. Derived from the taxonomy, we divide more than 100 methods into 12 different groupings and give state-of-the-art references expounding which methods are highly promising by relating them to each other. Finally, research perspectives that may constitute a building block for future work are provided.},
number = {7},
journal = {ACM Computing Surveys (CSUR)},
author = {Bayer, Markus and Kaufhold, Marc-André and Reuter, Christian},
year = {2023},
keywords = {AuswahlCrisis, Crisis, Selected, A-Paper, Ranking-CORE-A*, Ranking-ImpactFactor, Projekt-ATHENE-SecUrban, Projekt-CYWARN, Projekt-emergenCITY, AuswahlKaufhold},
pages = {1--39},
}
[BibTeX] [Abstract] [Download PDF]
A Design Science Artefact for Cyber Threat Detection and Actor Specific Communication
@article{bayer_multi-level_2023,
title = {Multi-{Level} {Fine}-{Tuning}, {Data} {Augmentation}, and {Few}-{Shot} {Learning} for {Specialized} {Cyber} {Threat} {Intelligence}},
issn = {0167-4048},
url = {https://peasec.de/paper/2023/2023_BayerFreyReuter_MultiLevelFineTuningForCyberThreatIntelligence_CS.pdf},
doi = {10.1016/j.cose.2023.103430},
abstract = {A Design Science Artefact for Cyber Threat Detection and Actor Specific Communication},
journal = {Computers \& Security},
author = {Bayer, Markus and Frey, Tobias and Reuter, Christian},
year = {2023},
keywords = {Student, Security, A-Paper, Ranking-ImpactFactor, Projekt-CROSSING, Projekt-CYWARN, Projekt-ATHENE},
}
[BibTeX] [Download PDF]
@article{franken_buchrezension_2023,
title = {Buchrezension: {Stahlhut}, {Björn}/{Lammert}, {Martin} ({Hrsg}.): {Gesamtstaatliche} {Sicherheitsvorsorge} – gerüstet für den {Ernstfall}!?, 200 {S}., {BWV}, {Berlin} 2022.},
issn = {2197-6082},
url = {https://link.springer.com/article/10.1007/s42520-023-00496-5},
doi = {https://doi.org/10.1007/s42520-023-00496-5},
journal = {Neue Politische Literatur (NPL)},
author = {Franken, Jonas and Reuter, Christian},
year = {2023},
keywords = {Peace},
}
[BibTeX] [Download PDF]
@article{gonsior_friedensinformatik_2023,
title = {Friedensinformatik: heute und morgen},
volume = {2023},
url = {https://peasec.de/paper/2023/2023_GonsiorRiebeSchmidReinholdReuter_FriedensinformatikHeuteMorgen_WundF.pdf},
number = {4},
journal = {FIfF-Kommunikation},
author = {Gonsior, Anja-Liisa and Riebe, Thea and Schmid, Stefka and Reinhold, Thomas and Reuter, Christian},
year = {2023},
keywords = {Peace},
pages = {34--37},
}
[BibTeX] [Abstract] [Download PDF]
Given the lack of empirical examples of how research can be conducted via digital means in sensitive contexts, this paper provides a threat model using Afghanistan, where the Taliban took power in August 2021, as an example. Both technical and non-technical research-related risks are analyzed, paying attention to research ethics, data security, and privacy. We argue that any threat model and risk analysis is highly context-dependent. Our analysis reveals that in certain research processes, human security does not necessarily coincide with data security and that an ambivalence exists between privacy and usability. In addition to the concrete threat analysis, the paper identifies some general technical solutions (e.g., encryption methods, communication software) for different research steps to foster secure and ethically justifiable research.
@article{guntrum_using_2023,
title = {Using {Digitally} {Mediated} {Methods} in {Sensitive} {Contexts}: {A} {Threat} {Analysis} and {Critical} {Reflection} on {Security}, {Privacy}, and {Ethical} {Concerns} in the {Case} of {Afghanistan}},
volume = {11},
issn = {2524-6976},
url = {https://link.springer.com/article/10.1007/s42597-022-00088-2},
doi = {10.1007/s42597-022-00088-2},
abstract = {Given the lack of empirical examples of how research can be conducted via digital means in sensitive contexts, this paper provides a threat model using Afghanistan, where the Taliban took power in August 2021, as an example. Both technical and non-technical research-related risks are analyzed, paying attention to research ethics, data security, and privacy. We argue that any threat model and risk analysis is highly context-dependent. Our analysis reveals that in certain research processes, human security does not necessarily coincide with data security and that an ambivalence exists between privacy and usability. In addition to the concrete threat analysis, the paper identifies some general technical solutions (e.g., encryption methods, communication software) for different research steps to foster secure and ethically justifiable research.},
number = {2},
journal = {Zeitschrift für Friedens- und Konfliktforschung (ZeFKo)},
author = {Guntrum, Laura and Güldenring, Benjamin and Kuntke, Franz and Reuter, Christian},
month = oct,
year = {2023},
keywords = {Peace, Projekt-ATHENE-FANCY, Projekt-TraCe},
pages = {95--128},
}
[BibTeX] [Abstract] [Download PDF]
The article examines which technical aspects of autonomous driving are potentially transferable to the military sector. Through expert interviews the strong fragmentation of technologies in the field of autonomous driving becomes apparent. This hinders the clear identification of a specific dual-use technology. Environmental perception, artificial intelligence and sensors are considered to have the highest transferability rate from civil research to the military sector. Therefore, sensor development should receive special attention.
@article{guntrum_dual-use_2023,
title = {Dual-{Use} {Technologies} in the {Context} of {Autonomous} {Driving}: {An} {Empirical} {Case} {Study} {From} {Germany}},
issn = {1866-2196},
url = {https://doi.org/10.1007/s12399-022-00935-3},
doi = {10.1007/s12399-022-00935-3},
abstract = {The article examines which technical aspects of autonomous driving are potentially transferable to the military sector. Through expert interviews the strong fragmentation of technologies in the field of autonomous driving becomes apparent. This hinders the clear identification of a specific dual-use technology. Environmental perception, artificial intelligence and sensors are considered to have the highest transferability rate from civil research to the military sector. Therefore, sensor development should receive special attention.},
journal = {Zeitschrift für Außen- und Sicherheitspolitik (ZfAS)},
author = {Guntrum, Laura and Schwartz, Sebastian and Reuter, Christian},
month = jan,
year = {2023},
keywords = {Peace, Projekt-ATHENE-SecUrban, Projekt-TraCe},
}
[BibTeX] [Abstract] [Download PDF]
Warning apps are used by many to receive warnings about imminent disasters. However, their potential for increasing awareness about general hazards and for increasing preparedness is currently underused. With a mixed-method design that includes a representative survey of the German population, a design workshop and an app evaluation experiment, this study investigates users’ preferences regarding non-acute preparedness alerts’ inclusion in crisis apps and the effectiveness of Nudging in this context. The experiment shows that while the social influence nudge had no significant effect compared to the control group without a nudging condition, the confrontational nudge increased the number of taken recommended preparedness measures. The evaluation indicates that the preparedness alerts increased users’ knowledge and their motivation to use a warning app. This motivation is, in contrast, decreased when the messages are perceived as a disruption. While many oppose push notifications, favor finding persuasively designed preparedness advice in a separate menu or as an optional notification.
@article{haunschild_preparedness_2023,
title = {Preparedness {Nudging} for {Warning} {Apps}? {A} {Mixed}-{Method} {Study} {Investigating} {Popularity} and {Effects} of {Preparedness} {Alerts} in {Warning} {Apps}},
volume = {172},
issn = {1071-5819},
url = {https://peasec.de/paper/2023/2023_HaunschildPauliReuter_NudgingWarningApps_IJHCS.pdf},
doi = {https://doi.org/10.1016/j.ijhcs.2023.102995},
abstract = {Warning apps are used by many to receive warnings about imminent disasters. However, their potential for increasing awareness about general hazards and for increasing preparedness is currently underused. With a mixed-method design that includes a representative survey of the German population, a design workshop and an app evaluation experiment, this study investigates users’ preferences regarding non-acute preparedness alerts’ inclusion in crisis apps and the effectiveness of Nudging in this context. The experiment shows that while the social influence nudge had no significant effect compared to the control group without a nudging condition, the confrontational nudge increased the number of taken recommended preparedness measures. The evaluation indicates that the preparedness alerts increased users’ knowledge and their motivation to use a warning app. This motivation is, in contrast, decreased when the messages are perceived as a disruption. While many oppose push notifications, favor finding persuasively designed preparedness advice in a separate menu or as an optional notification.},
journal = {International Journal on Human-Computer Studies (IJHCS)},
author = {Haunschild, Jasmin and Pauli, Selina and Reuter, Christian},
year = {2023},
keywords = {AuswahlCrisis, Crisis, Selected, Student, A-Paper, Ranking-ImpactFactor, Projekt-ATHENE-SecUrban, Projekt-emergenCITY},
pages = {102995},
}
[BibTeX] [Abstract] [Download PDF]
The number of newly published vulnerabilities is constantly increasing. Until now, the information available when a new vulnerability is published is manually assessed by experts using a ()cvss vector and score. This assessment is time consuming and requires expertise. Various works already try to predict vectors or scores using machine learning based on the textual descriptions of the vulnerability to enable faster assessment. However, for this purpose, previous works only use the texts available in databases such as nvd. With this work, the publicly available web pages referenced in the nvd are analyzed and made available as sources of texts through web scraping. A dl based method for predicting the vector is implemented and evaluated. The present work provides a classification of the nvd’s reference texts based on the suitability and crawlability of their texts. While we identified the overall influence of the additional texts is negligible, we outperformed the state-of-the-art with our dl prediction models.
@article{kuehn_common_2023,
title = {Common vulnerability scoring system prediction based on open source intelligence information sources},
url = {https://peasec.de/paper/2023/2023_KuehnRelkeReuter_CommonVulnerabilityScoringSystemOSINT_CompSec.pdf},
doi = {10.1016/j.cose.2023.103286},
abstract = {The number of newly published vulnerabilities is constantly increasing. Until now, the information available when a new vulnerability is published is manually assessed by experts using a ()cvss vector and score. This assessment is time consuming and requires expertise. Various works already try to predict vectors or scores using machine learning based on the textual descriptions of the vulnerability to enable faster assessment. However, for this purpose, previous works only use the texts available in databases such as nvd. With this work, the publicly available web pages referenced in the nvd are analyzed and made available as sources of texts through web scraping. A dl based method for predicting the vector is implemented and evaluated. The present work provides a classification of the nvd’s reference texts based on the suitability and crawlability of their texts. While we identified the overall influence of the additional texts is negligible, we outperformed the state-of-the-art with our dl prediction models.},
journal = {Computers \& Security},
author = {Kuehn, Philipp and Relke, David N. and Reuter, Christian},
year = {2023},
keywords = {Student, UsableSec, Security, Ranking-ImpactFactor, Ranking-CORE-B, Projekt-ATHENE-SecUrban, Projekt-CYWARN},
}
[BibTeX] [Abstract] [Download PDF]
Der Überfall Russlands auf die Ukraine und der sich anschließende Krieg haben neben vielen anderen sicherheitspolitischen Gewissheiten auch zum ersten Mal die Rolle des Cyberspace in einem offenen Angriffskrieg demonstriert und bedenkenswerte Entwicklungen offenbart. Ziel dieses Beitrags ist es, die militärischen Aktivitäten im Cyberspace im Rahmen des Krieges Russlands gegen die Ukraine auf der Grundlage der öffentlich verfügbaren Informationen zu analysieren und im Hinblick auf die bis dato gängigen Vorstellungen eines Cyberwars zu bewerten. Darauf aufbauend werden mögliche Schlussfolgerungen betrachtet, zum einen mit Blick auf die zukünftige Bedeutung von Cyberaktivitäten für Russland, hinsichtlich des generellen militärischen Einsatzes von Cyberwirkmitteln und dessen weiterer Entwicklung, und in Bezug auf zukünftige internationale Debatten zur Einhegung von Cyberwars und des schädigenden Einsatzes von Cyberwirkmitteln.
@article{reinhold_zur_2023,
title = {Zur {Debatte} über die {Einhegung} eines {Cyberwars}: {Analyse} militärischer {Cyberaktivitäten} im {Krieg} {Russlands} gegen die {Ukraine}},
issn = {2524-6976},
url = {https://doi.org/10.1007/s42597-023-00094-y},
doi = {10.1007/s42597-023-00094-y},
abstract = {Der Überfall Russlands auf die Ukraine und der sich anschließende Krieg haben neben vielen anderen sicherheitspolitischen Gewissheiten auch zum ersten Mal die Rolle des Cyberspace in einem offenen Angriffskrieg demonstriert und bedenkenswerte Entwicklungen offenbart. Ziel dieses Beitrags ist es, die militärischen Aktivitäten im Cyberspace im Rahmen des Krieges Russlands gegen die Ukraine auf der Grundlage der öffentlich verfügbaren Informationen zu analysieren und im Hinblick auf die bis dato gängigen Vorstellungen eines Cyberwars zu bewerten. Darauf aufbauend werden mögliche Schlussfolgerungen betrachtet, zum einen mit Blick auf die zukünftige Bedeutung von Cyberaktivitäten für Russland, hinsichtlich des generellen militärischen Einsatzes von Cyberwirkmitteln und dessen weiterer Entwicklung, und in Bezug auf zukünftige internationale Debatten zur Einhegung von Cyberwars und des schädigenden Einsatzes von Cyberwirkmitteln.},
journal = {Zeitschrift für Friedens- und Konfliktforschung (ZeFKo)},
author = {Reinhold, Thomas and Reuter, Christian},
month = mar,
year = {2023},
keywords = {Security, Peace, Projekt-ATHENE-SecUrban, Projekt-TraCe},
}
[BibTeX] [Abstract] [Download PDF]
The militarization of cyberspace has been a topic in international fora and scientific debates for several years. However, the development of applicable, and verifiable arms control measures that can effectively reduce the risk of military escalations in cyberspace is still hindered by the characteristics of this domain. The article analyses challenges and obstacles of dual-use, proliferation, constant technological progress, the importance of the private sector, difficulties in defining and verifying weapons and difficulties in attributing attacks.
@article{reinhold_challenges_2023,
title = {Challenges for {Cyber} {Arms} {Control}: {A} {Qualitative} {Expert} {Interview} {Study}},
volume = {16},
issn = {1866-2196},
url = {https://doi.org/10.1007/s12399-023-00960-w},
doi = {10.1007/s12399-023-00960-w},
abstract = {The militarization of cyberspace has been a topic in international fora and scientific debates for several years. However, the development of applicable, and verifiable arms control measures that can effectively reduce the risk of military escalations in cyberspace is still hindered by the characteristics of this domain. The article analyses challenges and obstacles of dual-use, proliferation, constant technological progress, the importance of the private sector, difficulties in defining and verifying weapons and difficulties in attributing attacks.},
number = {3},
journal = {Zeitschrift für Außen- und Sicherheitspolitik (ZfAS)},
author = {Reinhold, Thomas and Pleil, Helene and Reuter, Christian},
month = aug,
year = {2023},
keywords = {Security, Peace, Projekt-CROSSING, Projekt-ATHENE-SecUrban},
pages = {289--310},
}
[BibTeX] [Abstract] [Download PDF]
While cyberspace has evolved into a commonly shared space vital to our individual lives and societies, malicious cyber activities by state actors as part of espionage operations, regarding defense strategies, or as part of traditional conflicts have strongly increased. In contrast, attributing the origin of such activities remains problematic. The ambiguity of digital data raises the problem of misinterpreting available information, increasing the risk of misinformed reactions and conflict escalation. In order to reduce this risk, this paper proposes a transparency system based on technologies which usually already exist for IT security measures that an accused actor in a specific incident can use to provide credible information which plausibly assures his non-involvement. The paper analyses the technical requirements, presents the technical concept and discusses the necessary adjustments to existing IT networks for its implementation. Intended as a measure for conflict de-escalation, the paper further discusses the limitations of this approach, especially with regard to technical limits as well as the political motivation and behavior of states.
@article{reinhold_preventing_2023,
title = {Preventing the escalation of cyber conflicts: towards an approach to plausibly assure the non-involvement in a cyberattack},
volume = {12},
issn = {2524-6976},
url = {https://doi.org/10.1007/s42597-023-00099-7},
doi = {10.1007/s42597-023-00099-7},
abstract = {While cyberspace has evolved into a commonly shared space vital to our individual lives and societies, malicious cyber activities by state actors as part of espionage operations, regarding defense strategies, or as part of traditional conflicts have strongly increased. In contrast, attributing the origin of such activities remains problematic. The ambiguity of digital data raises the problem of misinterpreting available information, increasing the risk of misinformed reactions and conflict escalation. In order to reduce this risk, this paper proposes a transparency system based on technologies which usually already exist for IT security measures that an accused actor in a specific incident can use to provide credible information which plausibly assures his non-involvement. The paper analyses the technical requirements, presents the technical concept and discusses the necessary adjustments to existing IT networks for its implementation. Intended as a measure for conflict de-escalation, the paper further discusses the limitations of this approach, especially with regard to technical limits as well as the political motivation and behavior of states.},
number = {1},
journal = {Zeitschrift für Friedens- und Konfliktforschung (ZeFKo)},
author = {Reinhold, Thomas and Reuter, Christian},
month = apr,
year = {2023},
keywords = {Security, Peace, Projekt-CROSSING, Projekt-ATHENE-SecUrban},
pages = {31--58},
}
[BibTeX] [Abstract] [Download PDF]
Cyberspace is a fragile construct threatened by malicious cyber operations of different actors, with vulnerabilities in IT hardware and software forming the basis for such activities, thus also posing a threat to global IT security. Advancements in the field of artificial intelligence accelerate this development, either with artificial intelligence enabled cyber weapons, automated cyber defense measures, or artificial intelligence-based threat and vulnerability detection. Especially state actors, with their long-term strategic security interests, often stockpile such knowledge of vulnerabilities and exploits to enable their military or intelligence service cyberspace operations. While treaties and regulations to limit these developments and to enhance global IT security by disclosing vulnerabilities are currently being discussed on the international level, these efforts are hindered by state concerns about the disclosure of unique knowledge and about giving up tactical advantages. This leads to a situation where multiple states are likely to stockpile at least some identical exploits, with technical measures to enable a depletion process for these stockpiles that preserve state secrecy interests and consider the special constraints of interacting states as well as the requirements within such environments being non-existent. This paper proposes such a privacy-preserving approach that allows multiple state parties to privately compare their stock of vulnerabilities and exploits to check for items that occur in multiple stockpiles without revealing them so that their disclosure can be considered. We call our system ExTRUST and show that it is scalable and can withstand several attack scenarios. Beyond the intergovernmental setting, ExTRUST can also be used for other zero-trust use cases, such as bug-bounty programs.
@article{reinhold_extrust_2023,
title = {{ExTRUST}: {Reducing} {Exploit} {Stockpiles} {With} a {Privacy}-{Preserving} {Depletion} {Systems} for {Inter}-{State} {Relationships}},
volume = {4},
url = {https://peasec.de/paper/2023/2023_ReinholdKuehnGuentherSchneiderReuter_ExTrust-ehem-BlockED_TTaS.pdf},
doi = {10.1109/TTS.2023.3280356},
abstract = {Cyberspace is a fragile construct threatened by malicious cyber operations of different actors, with vulnerabilities in IT hardware and software forming the basis for such activities, thus also posing a threat to global IT security. Advancements in the field of artificial intelligence accelerate this development, either with artificial intelligence enabled cyber weapons, automated cyber defense measures, or artificial intelligence-based threat and vulnerability detection. Especially state actors, with their long-term strategic security interests, often stockpile such knowledge of vulnerabilities and exploits to enable their military or intelligence service cyberspace operations. While treaties and regulations to limit these developments and to enhance global IT security by disclosing vulnerabilities are currently being discussed on the international level, these efforts are hindered by state concerns about the disclosure of unique knowledge and about giving up tactical advantages. This leads to a situation where multiple states are likely to stockpile at least some identical exploits, with technical measures to enable a depletion process for these stockpiles that preserve state secrecy interests and consider the special constraints of interacting states as well as the requirements within such environments being non-existent. This paper proposes such a privacy-preserving approach that allows multiple state parties to privately compare their stock of vulnerabilities and exploits to check for items that occur in multiple stockpiles without revealing them so that their disclosure can be considered. We call our system ExTRUST and show that it is scalable and can withstand several attack scenarios. Beyond the intergovernmental setting, ExTRUST can also be used for other zero-trust use cases, such as bug-bounty programs.},
number = {2},
journal = {IEEE Transactions on Technology and Society},
author = {Reinhold, Thomas and Kuehn, Philipp and Günther, Daniel and Schneider, Thomas and Reuter, Christian},
year = {2023},
keywords = {Selected, Student, A-Paper, Peace, Projekt-CROSSING, AuswahlPeace, Cyberwar, Projekt-ATHENE-SecUrban, Projekt-GRKPrivacy},
pages = {158--170},
}
[BibTeX] [Abstract] [Download PDF]
The value of social media in crises, disasters, and emergencies across different events, participants, and states is now well-examined in crisis informatics research. Previous research has contributed to the state of the art with empirical insights on the use of social media, approaches for the gathering and processing of big social data, the design and evaluation of information systems, and the analysis of cumulative and longitudinal data. While some studies examined social media use representatively for their target audience, these usually only comprise a single point of inquiry and do not allow for a trend analysis. This work provides results (1) of a representative survey with German citizens from 2021 on use patterns, perceptions, and expectations regarding social media during emergencies. Furthermore, it (2) compares these results to previous surveys and provides insights on temporal changes and trends from 2017, over 2019 to 2021. Our findings highlight that social media use in emergencies increased in 2021 and 2019 compared to 2017. Between 2019 and 2021, the amount of information shared on social media remained on a similar level, while the perceived disadvantages of social media in emergencies significantly increased. In light of demographic variables, the results of the 2021 survey confirm previous findings, according to which older individuals (45+ years) use social media in emergencies less often than younger individuals (18-24 years). Furthermore, while the quicker availability of information was one of the reasons for social media use, especially the potential information overload was a key factor for not using social media in emergencies. The results are discussed in light of the dynamic nature of attitudes regarding social media in emergencies and the need to account for heterogeneity in user expectations to build trustworthy information ecosystems in social media.
@article{reuter_increasing_2023,
title = {Increasing {Adoption} {Despite} {Perceived} {Limitations} of {Social} {Media} in {Emergencies}: {Representative} {Insights} on {German} {Citizens}’ {Perception} and {Trends} from 2017 to 2021},
volume = {96},
issn = {2212-4209},
url = {https://peasec.de/paper/2023/2023_ReuterKaufholdBiselliPleil_SocialMediaEmergenciesSurvey_IJDRR.pdf},
doi = {https://doi.org/10.1016/j.ijdrr.2023.103880},
abstract = {The value of social media in crises, disasters, and emergencies across different events, participants, and states is now well-examined in crisis informatics research. Previous research has contributed to the state of the art with empirical insights on the use of social media, approaches for the gathering and processing of big social data, the design and evaluation of information systems, and the analysis of cumulative and longitudinal data. While some studies examined social media use representatively for their target audience, these usually only comprise a single point of inquiry and do not allow for a trend analysis. This work provides results (1) of a representative survey with German citizens from 2021 on use patterns, perceptions, and expectations regarding social media during emergencies. Furthermore, it (2) compares these results to previous surveys and provides insights on temporal changes and trends from 2017, over 2019 to 2021. Our findings highlight that social media use in emergencies increased in 2021 and 2019 compared to 2017. Between 2019 and 2021, the amount of information shared on social media remained on a similar level, while the perceived disadvantages of social media in emergencies significantly increased. In light of demographic variables, the results of the 2021 survey confirm previous findings, according to which older individuals (45+ years) use social media in emergencies less often than younger individuals (18-24 years). Furthermore, while the quicker availability of information was one of the reasons for social media use, especially the potential information overload was a key factor for not using social media in emergencies. The results are discussed in light of the dynamic nature of attitudes regarding social media in emergencies and the need to account for heterogeneity in user expectations to build trustworthy information ecosystems in social media.},
journal = {International Journal of Disaster Risk Reduction (IJDRR)},
author = {Reuter, Christian and Kaufhold, Marc-André and Biselli, Tom and Pleil, Helene},
year = {2023},
keywords = {AuswahlCrisis, Crisis, SocialMedia, Student, A-Paper, Ranking-ImpactFactor, Projekt-emergenCITY, Projekt-NEBULA, Projekt-CYLENCE},
}
[BibTeX] [Abstract] [Download PDF]
The negotiation of stakeholder values as a collaborative process throughout technology development has been studied extensively within the fields of Computer Supported Cooperative Work and Human-Computer Interaction. Despite their increasing significance for cybersecurity incident response, there is a gap in research on values of importance to the design of open-source intelligence (OSINT) technologies for this purpose. In this paper, we investigate which values and value conflicts emerge due to the application and development of machine learning (ML) based OSINT technologies to assist cyber security incident response operators. For this purpose, we employ a triangulation of methods, consisting of a systematic survey of the technical literature on the development of OSINT artefacts for cybersecurity (N = 73) and an empirical value sensitive design case study, comprising semi-structured interviews with stakeholders (N = 9) as well as a focus group (N = 7) with developers. Based on our results, we identify implications relevant to the research on and design of OSINT artefacts for cybersecurity incident response.
@article{riebe_values_2023,
title = {Values and {Value} {Conflicts} in the {Context} of {OSINT} {Technologies} for {Cybersecurity} {Incident} {Response}: {A} {Value} {Sensitive} {Design} {Perspective}},
url = {https://link.springer.com/article/10.1007/s10606-022-09453-4},
doi = {10.1007/s10606-022-09453-4},
abstract = {The negotiation of stakeholder values as a collaborative process throughout technology development has been studied extensively within the fields of Computer Supported Cooperative Work and Human-Computer Interaction. Despite their increasing significance for cybersecurity incident response, there is a gap in research on values of importance to the design of open-source intelligence (OSINT) technologies for this purpose. In this paper, we investigate which values and value conflicts emerge due to the application and development of machine learning (ML) based OSINT technologies to assist cyber security incident response operators. For this purpose, we employ a triangulation of methods, consisting of a systematic survey of the technical literature on the development of OSINT artefacts for cybersecurity (N = 73) and an empirical value sensitive design case study, comprising semi-structured interviews with stakeholders (N = 9) as well as a focus group (N = 7) with developers. Based on our results, we identify implications relevant to the research on and design of OSINT artefacts for cybersecurity incident response.},
journal = {Computer Supported Cooperative Work: The Journal of Collaborative Computing (JCSCW)},
author = {Riebe, Thea and Bäumler, Julian and Kaufhold, Marc-André and Reuter, Christian},
year = {2023},
keywords = {HCI, Student, UsableSec, Security, A-Paper, Ranking-ImpactFactor, Ranking-CORE-B, Projekt-CROSSING, Projekt-ATHENE-SecUrban, Projekt-CYWARN},
}
[BibTeX] [Abstract] [Download PDF]
The use of Open Source Intelligence (OSINT) to monitor and detect cybersecurity threats is gaining popularity among Cybersecurity Emergency or Incident Response Teams (CERTs/CSIRTs). They increasingly use semi-automated OSINT approaches when monitoring cyber threats for public infrastructure services and incident response. Most of the systems use publicly available data, often focusing on social media due to timely data for situational assessment. As indirect and affected stakeholders, the acceptance of OSINT systems by users, as well as the conditions which influence the acceptance, are relevant for the development of OSINT systems for cybersecurity. Therefore, as part of the ethical and social technology assessment, we conducted a survey (N=1,093), in which we asked participants about their acceptance of OSINT systems, their perceived need for open source surveillance, as well as their privacy behavior and concerns. Further, we tested if the awareness of OSINT is an interactive factor that affects other factors. Our results indicate that cyber threat perception and the perceived need for OSINT are positively related to acceptance, while privacy concerns are negatively related. The awareness of OSINT, however, has only shown effects on people with higher privacy concerns. Here, particularly high OSINT awareness and limited privacy concerns were associated with higher OSINT acceptance. Lastly, we provide implications for further research and the use of OSINT systems for cybersecurity by authorities. As OSINT is a framework rather than a single technology, approaches can be selected and combined to adhere to data minimization and anonymization as well as to leverage improvements in privacy-preserving computation and machine learning innovations. Regarding the use of OSINT, the results suggest to favor approaches that provide transparency to users regarding the use of the systems and the data they gather.
@article{riebe_privacy_2023,
title = {Privacy {Concerns} and {Acceptance} {Factors} of {OSINT} for {Cybersecurity}: {A} {Representative} {Survey}},
url = {https://petsymposium.org/popets/2023/popets-2023-0028.pdf},
doi = {https://doi.org/10.56553/popets-2023-0028},
abstract = {The use of Open Source Intelligence (OSINT) to monitor and detect cybersecurity threats is gaining popularity among Cybersecurity Emergency or Incident Response Teams (CERTs/CSIRTs). They increasingly use semi-automated OSINT approaches when monitoring cyber threats for public infrastructure services and incident response. Most of the systems use publicly available data, often focusing on social media due to timely data for situational assessment. As indirect and affected stakeholders, the acceptance of OSINT systems by users, as well as the conditions which influence the acceptance, are relevant for the development of OSINT systems for cybersecurity. Therefore, as part of the ethical and social technology assessment, we conducted a survey (N=1,093), in which we asked participants about their acceptance of OSINT systems, their perceived need for open source surveillance, as well as their privacy behavior and concerns. Further, we tested if the awareness of OSINT is an interactive factor that affects other factors. Our results indicate that cyber threat perception and the perceived need for OSINT are positively related to acceptance, while privacy concerns are negatively related. The awareness of OSINT, however, has only shown effects on people with higher privacy concerns. Here, particularly high OSINT awareness and limited privacy concerns were associated with higher OSINT acceptance. Lastly, we provide implications for further research and the use of OSINT systems for cybersecurity by authorities. As OSINT is a framework rather than a single technology, approaches can be selected and combined to adhere to data minimization and anonymization as well as to leverage improvements in privacy-preserving computation and machine learning innovations. Regarding the use of OSINT, the results suggest to favor approaches that provide transparency to users regarding the use of the systems and the data they gather.},
number = {1},
journal = {Proceedings on Privacy Enhancing Technologies (PoPETs)},
author = {Riebe, Thea and Biselli, Tom and Kaufhold, Marc-André and Reuter, Christian},
year = {2023},
keywords = {HCI, UsableSec, Security, A-Paper, Ranking-CORE-A, Projekt-CYWARN, Projekt-ATHENE-FANCY, AuswahlUsableSec},
pages = {477--493},
}
[BibTeX] [Abstract] [Download PDF]
Like past crises, the COVID-19 pandemic has also activated individual volunteers to help to respond to the crisis. This includes digital volunteers, who have organized physical aid and conducted activities on social media. Analyzing German volunteering support groups on Facebook and related Reddit threads in the context of the COVID-19 pandemic, we {\textbackslash}updatedshow what type of help is offered and how social media users interact with each other, trying to cope with the situation. We reveal that most users offering help online conduct mostly typical care work, such as buying groceries or giving advice. Crucially, volunteering is characterized by relationships of care and thus builds on affirmative interactions. Albeit some misdirected offers and regressive interruptions, people use the possibility to make their voices heard and, showing empathy, help each other to cope with crisis. Social media like Facebook mediate societal structures, including relationships of care, offering a space for continuous, cumulatively resilient conduct of care work. Reflecting on the traditional division of labor in crisis volunteering and counter-productive dynamics of care and empathy, we aim for feminist ethics of care which allows for interactions on social media that foster generative computer-supported collaboration.
@article{schmid_digital_2023,
title = {Digital {Volunteers} {During} the {COVID}-19 {Pandemic}: {Care} {Work} on {Social} {Media} for {Socio}-technical {Resilience}},
volume = {3},
issn = {2748-5625},
url = {https://ojs.weizenbaum-institut.de/index.php/wjds/article/view/78},
doi = {10.34669/WI.WJDS/3.3.6},
abstract = {Like past crises, the COVID-19 pandemic has also activated individual volunteers to help to respond to the crisis. This includes digital volunteers, who have organized physical aid and conducted activities on social media. Analyzing German volunteering support groups on Facebook and related Reddit threads in the context of the COVID-19 pandemic, we {\textbackslash}updatedshow what type of help is offered and how social media users interact with each other, trying to cope with the situation. We reveal that most users offering help online conduct mostly typical care work, such as buying groceries or giving advice. Crucially, volunteering is characterized by relationships of care and thus builds on affirmative interactions. Albeit some misdirected offers and regressive interruptions, people use the possibility to make their voices heard and, showing empathy, help each other to cope with crisis. Social media like Facebook mediate societal structures, including relationships of care, offering a space for continuous, cumulatively resilient conduct of care work. Reflecting on the traditional division of labor in crisis volunteering and counter-productive dynamics of care and empathy, we aim for feminist ethics of care which allows for interactions on social media that foster generative computer-supported collaboration.},
number = {1},
journal = {Weizenbaum Journal of the Digital Society},
author = {Schmid, Stefka and Guntrum, Laura and Haesler, Steffen and Schultheiß, Lisa and Reuter, Christian},
month = may,
year = {2023},
keywords = {Crisis, HCI, SocialMedia, Student, Peace, Projekt-ATHENE-SecUrban, Projekt-emergenCITY, Projekt-TraCe},
}
2022
[BibTeX] [Abstract] [Download PDF]
In many cases of machine learning, research suggests that the development of training data might have a higher relevance than the choice and modelling of classifiers themselves. Thus, data augmentation methods have been developed to improve classifiers by artificially created training data. In NLP, there is the challenge of establishing universal rules for text transformations which provide new linguistic patterns. In this paper, we present and evaluate a text generation method suitable to increase the performance of classifiers for long and short texts. We achieved promising improvements when evaluating short as well as long text tasks with the enhancement by our text generation method. Especially with regard to small data analytics, additive accuracy gains of up to 15.53\% and 3.56\% are achieved within a constructed low data regime, compared to the no augmentation baseline and another data augmentation technique. As the current track of these constructed regimes is not universally applicable, we also show major improvements in several real world low data tasks (up to +4.84 F1-score). Since we are evaluating the method from many perspectives (in total 11 datasets), we also observe situations where the method might not be suitable. We discuss implications and patterns for the successful application of our approach on different types of datasets.
@article{bayer_data_2022,
title = {Data {Augmentation} in {Natural} {Language} {Processing}: {A} {Novel} {Text} {Generation} {Approach} for {Long} and {Short} {Text} {Classifiers}},
url = {https://link.springer.com/article/10.1007/s13042-022-01553-3},
doi = {10.1007/s13042-022-01553-3},
abstract = {In many cases of machine learning, research suggests that the development of training data might have a higher relevance than the choice and modelling of classifiers themselves. Thus, data augmentation methods have been developed to improve classifiers by artificially created training data. In NLP, there is the challenge of establishing universal rules for text transformations which provide new linguistic patterns. In this paper, we present and evaluate a text generation method suitable to increase the performance of classifiers for long and short texts. We achieved promising improvements when evaluating short as well as long text tasks with the enhancement by our text generation method. Especially with regard to small data analytics, additive accuracy gains of up to 15.53\% and 3.56\% are achieved within a constructed low data regime, compared to the no augmentation baseline and another data augmentation technique. As the current track of these constructed regimes is not universally applicable, we also show major improvements in several real world low data tasks (up to +4.84 F1-score). Since we are evaluating the method from many perspectives (in total 11 datasets), we also observe situations where the method might not be suitable. We discuss implications and patterns for the successful application of our approach on different types of datasets.},
journal = {International Journal of Machine Learning and Cybernetics (IJMLC)},
author = {Bayer, Markus and Kaufhold, Marc-André and Buchhold, Björn and Keller, Marcel and Dallmeyer, Jörg and Reuter, Christian},
year = {2022},
keywords = {Student, Security, A-Paper, Ranking-ImpactFactor, Projekt-CYWARN, Projekt-emergenCITY},
}
[BibTeX] [Abstract] [Download PDF]
Concise instruments to determine privacy personas – typical privacy-related user groups – are not available at present. Consequently, we aimed to identify them on a privacy knowledge–privacy behavior ratio based on a self-developed instrument. To achieve this, we conducted an item analysis (N = 820) and a confirmatory factor analysis (CFA) (N = 656) of data based on an online study with German participants. Starting with 81 items, we reduced those to an eleven-item questionnaire with the two scales privacy knowledge and privacy behavior. A subsequent cluster analysis (N = 656) revealed three distinct user groups: (1) Fundamentalists scoring high in privacy knowledge and behavior, (2) Pragmatists scoring average in privacy knowledge and behavior and (3) Unconcerned scoring low in privacy knowledge and behavior. In a closer inspection of the questionnaire, the CFAs supported the model with a close global fit based on RMSEA in a training and to a lesser extent in a cross-validation sample. Deficient local fit as well as validity and reliability coefficients well below generally accepted thresholds, however, revealed that the questionnaire in its current form cannot be considered a suitable measurement instrument for determining privacy personas. The results are discussed in terms of related persona conceptualizations, the importance of a methodologically sound investigation of corresponding privacy dimensions and our lessons learned.
@article{biselli_challenges_2022,
title = {On the {Challenges} of {Developing} a {Concise} {Questionnaire} to {Identify} {Privacy} {Personas}},
url = {https://petsymposium.org/2022/files/papers/issue4/popets-2022-0126.pdf},
doi = {10.56553/popets-2022-0126},
abstract = {Concise instruments to determine privacy personas – typical privacy-related user groups – are not available at present. Consequently, we aimed to identify them on a privacy knowledge–privacy behavior ratio based on a self-developed instrument. To achieve this, we conducted an item analysis (N = 820) and a confirmatory factor analysis (CFA) (N = 656) of data based on an online study with German participants. Starting with 81 items, we reduced those to an eleven-item questionnaire with the two scales privacy knowledge and privacy behavior. A subsequent cluster analysis (N = 656) revealed three distinct user groups: (1) Fundamentalists scoring high in privacy knowledge and behavior, (2) Pragmatists scoring average in privacy knowledge and behavior and (3) Unconcerned scoring low in privacy knowledge and behavior. In a closer inspection of the questionnaire, the CFAs supported the model with a close global fit based on RMSEA in a training and to a lesser extent in a cross-validation sample. Deficient local fit as well as validity and reliability coefficients well below generally accepted thresholds, however, revealed that the questionnaire in its current form cannot be considered a suitable measurement instrument for determining privacy personas. The results are discussed in terms of related persona conceptualizations, the importance of a methodologically sound investigation of corresponding privacy dimensions and our lessons learned.},
number = {4},
journal = {Proceedings on Privacy Enhancing Technologies (PoPETs)},
author = {Biselli, Tom and Steinbrink, Enno and Herbert, Franziska and Schmidbauer-Wolf, Gina Maria and Reuter, Christian},
year = {2022},
keywords = {HCI, UsableSec, Security, A-Paper, Ranking-CORE-A, Projekt-CROSSING, Projekt-ATHENE-FANCY, AuswahlUsableSec, Projekt-GRKPrivacy},
pages = {645--669},
}
[BibTeX] [Abstract] [Download PDF]
The backbone network of submarine communication cables (SCC) carries 98\% of international internet traffic. Coastal and island states strongly depend on this physical internet infrastructure to provide internet connectivity. Although about 100 SCC breakdowns of human or natural origin occur at yearly average, a literature review reveals that there is no approach to assess individual state vulnerability to SCC failure in global comparison. In this article, the global SCC network is modeled based on publicly available data. Besides the analysis of the global network properties, a focus is put on remaining bandwidth capacities in three different failure scenario simulations of SCC breakdowns. As a result, this study identifies 15 highly vulnerable states and overseas territories, and another 28 territories that are classified as partially vulnerable to SCC failures. Since economic market decisions shape the structure of the SCC network, an uneven distribution of redundancies and the resulting vulnerability of disadvantaged economies can be confirmed. Therefore, the study’s findings may contribute to a better assessment of the necessity of preventive protection measures of critical telecommunication infrastructures in states and territories characterized by high and medium vulnerability.
@article{franken_digital_2022,
title = {The {Digital} {Divide} in {State} {Vulnerability} to {Submarine} {Communications} {Cable} {Failure}},
volume = {38},
url = {https://peasec.de/paper/2022/2022_FrankenReinholdReichertReuter_DigitalDivideStateVulnerabilitySubmarineCommunicationsCable_IJCIP.pdf},
doi = {10.1016/j.ijcip.2022.100522},
abstract = {The backbone network of submarine communication cables (SCC) carries 98\% of international internet traffic. Coastal and island states strongly depend on this physical internet infrastructure to provide internet connectivity. Although about 100 SCC breakdowns of human or natural origin occur at yearly average, a literature review reveals that there is no approach to assess individual state vulnerability to SCC failure in global comparison. In this article, the global SCC network is modeled based on publicly available data. Besides the analysis of the global network properties, a focus is put on remaining bandwidth capacities in three different failure scenario simulations of SCC breakdowns. As a result, this study identifies 15 highly vulnerable states and overseas territories, and another 28 territories that are classified as partially vulnerable to SCC failures. Since economic market decisions shape the structure of the SCC network, an uneven distribution of redundancies and the resulting vulnerability of disadvantaged economies can be confirmed. Therefore, the study's findings may contribute to a better assessment of the necessity of preventive protection measures of critical telecommunication infrastructures in states and territories characterized by high and medium vulnerability.},
number = {100522},
journal = {International Journal of Critical Infrastructure Protection (IJCIP)},
author = {Franken, Jonas and Reinhold, Thomas and Reichert, Lilian and Reuter, Christian},
year = {2022},
keywords = {Selected, Student, Security, A-Paper, Ranking-ImpactFactor, AuswahlPeace, Projekt-ATHENE-SecUrban, Projekt-AgriRegio},
pages = {1--15},
}
[BibTeX] [Abstract] [Download PDF]
Social media have come to play a vital role not only in our everyday lives, but also in times of conflict and crisis such as natural disasters or civil wars. Recent research has highlighted, on the one hand, the use of social media as a means of recruitment by terrorists and, on the other hand, the use of Facebook, Twitter etc. to gain the support of the population during insurgencies. This article conducts a qualitative content analysis of content on Twitter concerning the conflict in the Jammu and Kashmir region. The tweets following the death of a popular militant, Burhan Wani, cover three different themes: (1) criticism of intellectuals, (2) Burhan Wani’s impact on the conflict, and (3) tweets referring to the conflict itself. Generally, people use Twitter to make their own point of view clear to others and discredit the opposing party, at the same time tweets are reflecting the antagonism between the two parties to the conflict, India and Pakistan. The sample of tweets reflects the lack of awareness among people in the region regarding the motivations of the new generation of militancy emerging in Kashmir after 1990.
@article{gabel_discussing_2022,
title = {Discussing {Conflict} in {Social} {Media} – {The} {Use} of {Twitter} in the {Jammu} and {Kashmir} {Conflict}},
volume = {15},
url = {https://journals.sagepub.com/doi/full/10.1177/1750635220970997},
abstract = {Social media have come to play a vital role not only in our everyday lives, but also in times of conflict and crisis such as natural disasters or civil wars. Recent research has highlighted, on the one hand, the use of social media as a means of recruitment by terrorists and, on the other hand, the use of Facebook, Twitter etc. to gain the support of the population during insurgencies. This article conducts a qualitative content analysis of content on Twitter concerning the conflict in the Jammu and Kashmir region. The tweets following the death of a popular militant, Burhan Wani, cover three different themes: (1) criticism of intellectuals, (2) Burhan Wani's impact on the conflict, and (3) tweets referring to the conflict itself. Generally, people use Twitter to make their own point of view clear to others and discredit the opposing party, at the same time tweets are reflecting the antagonism between the two parties to the conflict, India and Pakistan. The sample of tweets reflects the lack of awareness among people in the region regarding the motivations of the new generation of militancy emerging in Kashmir after 1990.},
number = {4},
journal = {Media, War \& Conflict},
author = {Gabel, Sabrina and Reichert, Lilian and Reuter, Christian},
year = {2022},
keywords = {Crisis, HCI, SocialMedia, Ranking-ImpactFactor, Peace, Projekt-ATHENE-SecUrban},
pages = {1--26},
}
[BibTeX] [Abstract] [Download PDF]
Journalists and ethnographic researchers, such as anthropologists, sociologists or media scholars, have comparable ways of establishing initial contacts with people from their fields of interest. Due to the ongoing COVID-19 pandemic and consequential travel restrictions and social distancing, it has become increasingly difficult to access a field. Taking inspiration from social anthropologist Ulf Hannerz (2004, p. 226), who compared journalists and anthropologists as “neighboring groups engaged in a somehow parallel pursuit,” this article explores what researchers may learn from practitioners who conduct research without being on-site. Fed by various practical journalists’ experiences, the article aims to investigate how information and communication technologies (ICTs) and digitally mediated methods, such as online search tools and social media, can be used to establish contacts and gain trust remotely. Here, the relevance of these methods for accessing a field in general goes beyond the limitations imposed during the COVID-19 pandemic and can be of interest to all those who face difficulties of field access of any kind. Ultimately, this article reflects on corresponding ethical challenges that may arise while conducting research remotely.
@article{guntrum_remotely_2022,
title = {Remotely {Accessing} the {Field} and {Building} {Trust} with {Distant} {Sources}. {Perspectives} from {Journalism} {Practice} for {Ethnographic} {Research}},
volume = {12},
url = {https://globalmediajournal.de/index.php/gmj/article/view/220},
abstract = {Journalists and ethnographic researchers, such as anthropologists, sociologists or media scholars, have comparable ways of establishing initial contacts with people from their fields of interest. Due to the ongoing COVID-19 pandemic and consequential travel restrictions and social distancing, it has become increasingly difficult to access a field. Taking inspiration from social anthropologist Ulf Hannerz (2004, p. 226), who compared journalists and anthropologists as “neighboring groups engaged in a somehow parallel pursuit,” this article explores what researchers may learn from practitioners who conduct research without being on-site. Fed by various practical journalists’ experiences, the article aims to investigate how information and communication technologies (ICTs) and digitally mediated methods, such as online search tools and social media, can be used to establish contacts and gain trust remotely. Here, the relevance of these methods for accessing a field in general goes beyond the limitations imposed during the COVID-19 pandemic and can be of interest to all those who face difficulties of field access of any kind. Ultimately, this article reflects on corresponding ethical challenges that may arise while conducting research remotely.},
number = {1},
journal = {Global Media Journal - German Edition},
author = {Guntrum, Laura and Keßler, Mira and Patel, Jignesh and Varfolomeeva, Anna},
year = {2022},
keywords = {Peace, Projekt-TraCe},
}
[BibTeX] [Abstract] [Download PDF]
Nudging users to keep them secure online has become a growing research field in cybersecurity. While existing approaches are mainly blackbox based, showing aggregated visualisations as one-size-fits-all nudges, personalisation turned out promising to enhance the efficacy of nudges within the high variance of users and contexts. This article presents a disaggregated whitebox-based visualisation of critical information as a novel nudge. By segmenting users according to their decision-making and information processing styles, we investigate if the novel nudge is more effective for specific users than a common black-box nudge. Based on existing literature about critical factors in password security, we designed a dynamic radar chart and parallel coordinates as disaggregated visualisations. We evaluated the short-term effectiveness and users‘ perception of the nudges in a think-aloud prestudy and a representative online evaluation (N=1.012). Our findings suggest that dynamic radar charts present a moderately effective nudge towards stronger passwords regarding short-term efficacy and are appreciated particularly by players of role-playing games.
@article{hartwig_nudging_2022,
title = {Nudging {Users} {Towards} {Better} {Security} {Decisions} in {Password} {Creation} {Using} {Whitebox}-based {Multidimensional} {Visualizations}},
volume = {41},
url = {https://peasec.de/paper/2022/2022_HartwigReuter_WhiteboxMultidimensionalNudges_BIT.pdf},
doi = {10.1080/0144929X.2021.1876167},
abstract = {Nudging users to keep them secure online has become a growing research field in cybersecurity. While existing approaches are mainly blackbox based, showing aggregated visualisations as one-size-fits-all nudges, personalisation turned out promising to enhance the efficacy of nudges within the high variance of users and contexts. This article presents a disaggregated whitebox-based visualisation of critical information as a novel nudge. By segmenting users according to their decision-making and information processing styles, we investigate if the novel nudge is more effective for specific users than a common black-box nudge. Based on existing literature about critical factors in password security, we designed a dynamic radar chart and parallel coordinates as disaggregated visualisations. We evaluated the short-term effectiveness and users' perception of the nudges in a think-aloud prestudy and a representative online evaluation (N=1.012). Our findings suggest that dynamic radar charts present a moderately effective nudge towards stronger passwords regarding short-term efficacy and are appreciated particularly by players of role-playing games.},
number = {7},
journal = {Behaviour \& Information Technology (BIT)},
author = {Hartwig, Katrin and Reuter, Christian},
year = {2022},
keywords = {HCI, Selected, UsableSec, Security, A-Paper, Ranking-ImpactFactor, Ranking-CORE-A, Projekt-CROSSING, Projekt-ATHENE-FANCY, AuswahlUsableSec},
pages = {1357--1380},
}
[BibTeX] [Abstract] [Download PDF]
The Internet of Things (IoT) is a major trend that is seen as a great opportunity to improve efficiency in many domains, including agriculture. This technology could transform the sector, improving the management and quality of agricultural operations, for example, crop farming. The most promising data transmission standard for this domain seems to be Long Range Wide Area Network (LoRaWAN), a popular representative of low power wide area network technologies today. LoRaWAN, like any wireless protocol, has properties that can be exploited by attackers, which has been a topic of multiple research papers in recent years. By conducting a systematic literature review, we build a recent list of attacks, as well as collect mitigation options. Taking a look at a concrete use case (IoT in agriculture) allows us to evaluate the practicality of both exploiting the vulnerabilities and implementing the countermeasures. We detected 16 attacks that we grouped into six attack types. Along with the attacks, we collect countermeasures for attack mitigation. Developers can use our findings to minimize the risks when developing applications based on LoRaWAN. These mostly theoretical security recommendations should encourage future works to evaluate the mitigations in practice.
@article{kuntke_lorawan_2022,
title = {{LoRaWAN} {Security} {Issues} and {Mitigation} {Options} by the {Example} of {Agricultural} {IoT} {Scenarios}},
volume = {33},
issn = {2161-3915},
url = {https://www.peasec.de/paper/2022/2022_KuntkeRomanenkoLinsnerSteinbrinkReuter_LoRaWANsecurityAgriculture_ETT.pdf},
doi = {10.1002/ett.4452},
abstract = {The Internet of Things (IoT) is a major trend that is seen as a great opportunity to improve efficiency in many domains, including agriculture. This technology could transform the sector, improving the management and quality of agricultural operations, for example, crop farming. The most promising data transmission standard for this domain seems to be Long Range Wide Area Network (LoRaWAN), a popular representative of low power wide area network technologies today. LoRaWAN, like any wireless protocol, has properties that can be exploited by attackers, which has been a topic of multiple research papers in recent years. By conducting a systematic literature review, we build a recent list of attacks, as well as collect mitigation options. Taking a look at a concrete use case (IoT in agriculture) allows us to evaluate the practicality of both exploiting the vulnerabilities and implementing the countermeasures. We detected 16 attacks that we grouped into six attack types. Along with the attacks, we collect countermeasures for attack mitigation. Developers can use our findings to minimize the risks when developing applications based on LoRaWAN. These mostly theoretical security recommendations should encourage future works to evaluate the mitigations in practice.},
number = {5},
journal = {Transactions on Emerging Telecommunications Technologies (ETT)},
author = {Kuntke, Franz and Romanenko, Vladimir and Linsner, Sebastian and Steinbrink, Enno and Reuter, Christian},
month = may,
year = {2022},
keywords = {Student, Security, A-Paper, Ranking-ImpactFactor, RSF, Projekt-GeoBox, Projekt-GRKPrivacy, Projekt-HyServ, Projekt-AgriRegio},
pages = {e4452},
}
[BibTeX] [Abstract] [Download PDF]
Agriculture is subject to high demands regarding resilience as it is an essential component of the food production chain. In the agricultural sector, there is an increasing usage of digital tools that rely on communication and energy infrastructures. Should disruption occur, such strengthened dependencies on other infrastructures increase the probability of ripple effects. Thus, there is a need to analyze the resilience of the agricultural sector with a specific focus on the effects of digitalization. This study works out resilience capacities of the interconnected technologies used in farm systems based on the experiences and opinions of farmers. Information was gathered through focus group interviews with farmers (N = 52) and a survey with participants from the agricultural sector (N = 118). In particular, the focus is put on the digital tools and other information and communication technologies they use. Based on a definition of resilience capacities, we evaluate resilience regarding energy and communication demands in various types of farm systems. Especially important are the resilience aspects of modern systems’ digital communication as well as the poorly developed and nonresilient network infrastructure in rural areas that contrast with the claim for a resilient agriculture. The result is a low robustness capacity, as our analysis concludes with the risk of food production losses.
@article{kuntke_resilience_2022,
title = {Resilience in {Agriculture}: {Communication} and {Energy} {Infrastructure} {Dependencies} of {German} {Farmers}},
volume = {13},
issn = {2192-6395},
url = {https://link.springer.com/article/10.1007/s13753-022-00404-7},
doi = {10.1007/s13753-022-00404-7},
abstract = {Agriculture is subject to high demands regarding resilience as it is an essential component of the food production chain. In the agricultural sector, there is an increasing usage of digital tools that rely on communication and energy infrastructures. Should disruption occur, such strengthened dependencies on other infrastructures increase the probability of ripple effects. Thus, there is a need to analyze the resilience of the agricultural sector with a specific focus on the effects of digitalization. This study works out resilience capacities of the interconnected technologies used in farm systems based on the experiences and opinions of farmers. Information was gathered through focus group interviews with farmers (N = 52) and a survey with participants from the agricultural sector (N = 118). In particular, the focus is put on the digital tools and other information and communication technologies they use. Based on a definition of resilience capacities, we evaluate resilience regarding energy and communication demands in various types of farm systems. Especially important are the resilience aspects of modern systems’ digital communication as well as the poorly developed and nonresilient network infrastructure in rural areas that contrast with the claim for a resilient agriculture. The result is a low robustness capacity, as our analysis concludes with the risk of food production losses.},
number = {2},
journal = {International Journal of Disaster Risk Science (IJDRS)},
author = {Kuntke, Franz and Linsner, Sebastian and Steinbrink, Enno and Franken, Jonas and Reuter, Christian},
month = apr,
year = {2022},
keywords = {Selected, Security, A-Paper, Ranking-ImpactFactor, Ranking-CORE-B, RSF, Projekt-GeoBox, Projekt-GRKPrivacy, Projekt-HyServ, Projekt-AgriRegio},
pages = {214--229},
}
[BibTeX] [Abstract] [Download PDF]
Business collaboration in the era of digital transformation requires the exchange of operational data. Since data are hardly controllable once they have been published or shared with others, it is highly important that users are clearly informed about who has access to which data and how certain settings can prevent the disclosure of sensitive data. However, giving end users more control over their data through increased transparency could also lead to information overload. This is particularly true in the field of agriculture, where tight schedules put pressure on employees of small enterprises. We conduct an empirical prestudy with 52 German farmers to investigate current data sharing scenarios. From these insights, we derive requirements and a concept for data sharing solutions providing data flow transparency for users. To investigate the behavior of users and the effects of transparent UI controls, we evaluate a prototype with 18 persons. Our evaluation shows that farmers demand flexible and secure tools that adjust to their workflows. Also, data should be stored and processed locally, granting farmers data sovereignty. Although the controls require additional effort, the evaluated transparent controls for data disclosure are easy to use and raise user awareness.
@article{linsner_supporting_2022,
title = {Supporting {Users} in {Data} {Disclosure} {Scenarios} in {Agriculture} through {Transparency}},
volume = {41},
url = {http://www.peasec.de/paper/2022/2022_LinsnerSteinbrinkKuntkeFrankenReuter_SupportingDataDisclosureScenariosAgriculture_BIT.pdf},
doi = {10.1080/0144929X.2022.2068070},
abstract = {Business collaboration in the era of digital transformation requires the exchange of operational data. Since data are hardly controllable once they have been published or shared with others, it is highly important that users are clearly informed about who has access to which data and how certain settings can prevent the disclosure of sensitive data. However, giving end users more control over their data through increased transparency could also lead to information overload. This is particularly true in the field of agriculture, where tight schedules put pressure on employees of small enterprises. We conduct an empirical prestudy with 52 German farmers to investigate current data sharing scenarios. From these insights, we derive requirements and a concept for data sharing solutions providing data flow transparency for users. To investigate the behavior of users and the effects of transparent UI controls, we evaluate a prototype with 18 persons. Our evaluation shows that farmers demand flexible and secure tools that adjust to their workflows. Also, data should be stored and processed locally, granting farmers data sovereignty. Although the controls require additional effort, the evaluated transparent controls for data disclosure are easy to use and raise user awareness.},
number = {10},
journal = {Behaviour \& Information Technology (BIT)},
author = {Linsner, Sebastian and Steinbrink, Enno and Kuntke, Franz and Franken, Jonas and Reuter, Christian},
year = {2022},
keywords = {UsableSec, Security, A-Paper, Ranking-ImpactFactor, Ranking-CORE-A, RSF, Projekt-GRKPrivacy, Projekt-HyServ, Projekt-AgriRegio},
pages = {2137--2159},
}
[BibTeX] [Abstract] [Download PDF]
Within CSCW and HCI, an increasing body of literature has been demonstrating the essential relevance of infrastructures and infrastructuring to the work of people engaging in technologically mediated nomadicity. Tech Nomads – or T-Nomads, as they are sometimes called – not only rely on technological, human, and environmental infrastructural components – such as Wi-Fi, technical support, space, and basic resources such as light and power outlets – but they also have to engage in infrastructuring to mobilise their workplaces and effectively accomplish work in and across different locations. In this article, we bring an infrastructuring perspective to understanding nomadic practices concerning the organisation of complex collaborative events. We introduce findings from a long-term investigation focusing on how infrastructures are re-instantiated with the help of digital technologies, according to emerging demands from T-Nomads. Our findings demonstrate the need for a ‘nonessentialist’ approach to nomadicity, one which recognises the character of nomadic work and its varied aspects in different contexts. We extend the infrastructuring literature by demonstrating how infrastructuring work is done in a complex collaborative initiative, as the organisation of the annual European Social Forum.
@article{pinatti_de_carvalho_understanding_2022,
title = {Understanding {Nomadic} {Practices} of {Social} {Activist} {Networks} through the {Lens} of {Infrastructuring}: {The} {Case} of the {European} {Social} {Forum}},
url = {https://link.springer.com/article/10.1007/s10606-022-09442-7},
doi = {10.1007/s10606-022-09442-7},
abstract = {Within CSCW and HCI, an increasing body of literature has been demonstrating the essential relevance of infrastructures and infrastructuring to the work of people engaging in technologically mediated nomadicity. Tech Nomads – or T-Nomads, as they are sometimes called – not only rely on technological, human, and environmental infrastructural components – such as Wi-Fi, technical support, space, and basic resources such as light and power outlets – but they also have to engage in infrastructuring to mobilise their workplaces and effectively accomplish work in and across different locations. In this article, we bring an infrastructuring perspective to understanding nomadic practices concerning the organisation of complex collaborative events. We introduce findings from a long-term investigation focusing on how infrastructures are re-instantiated with the help of digital technologies, according to emerging demands from T-Nomads. Our findings demonstrate the need for a ‘nonessentialist’ approach to nomadicity, one which recognises the character of nomadic work and its varied aspects in different contexts. We extend the infrastructuring literature by demonstrating how infrastructuring work is done in a complex collaborative initiative, as the organisation of the annual European Social Forum.},
journal = {Computer Supported Cooperative Work: The Journal of Collaborative Computing (JCSCW)},
author = {Pinatti De Carvalho, Aparecido Fabiano and Saeed, Saqib and Reuter, Christian and Rohde, Markus and Randall, Dave and Pipek, Volkmar and Wulf, Volker},
year = {2022},
keywords = {Crisis, HCI, A-Paper, Ranking-ImpactFactor},
}
[BibTeX] [Abstract] [Download PDF]
Technological and scientific progress, especially the rapid development of information technology (IT), plays a crucial role in peace and security issuesFootnote1. Artificial Intelligence (AI) is one example. AI is a sub-discipline of computer science, dealing with computer systems capable of performing tasks which require human intelligenceFootnote2. According to James Johnson, PhD, Lecturer in Strategic Studies in the Department of Politics & International Relations at the University of Aberdeen and author of the book Artificial Intelligence and the Future of Warfare, the hype around this has made it easy to overstate the opportunities and challenges posed by the development and deployment of AI in the military sphere. The author argues, that “speculations about super intelligent AI or the threat of superman AI to humanity” are entirely disconnected from today’s capabilities of AI. The book aims to address this problem by deciphering “proven capabilities and applications from mere speculation”, with a strong focus on the challenges AI poses to strategic stability, nuclear deterrence and how AI might influence nuclear weapon systems. The author concludes with implications and policy recommendations on how states could manage the escalatory risks posed by AI.
@article{reinhold_book_2022,
title = {Book {Review}: {Artificial} {Intelligence} and {The} {Future} of {Warfare}, {James} {Johnson} (2021)},
url = {https://link.springer.com/article/10.1007/s12399-022-00918-4},
doi = {10.1007/s12399-022-00918-4},
abstract = {Technological and scientific progress, especially the rapid development of information technology (IT), plays a crucial role in peace and security issuesFootnote1. Artificial Intelligence (AI) is one example. AI is a sub-discipline of computer science, dealing with computer systems capable of performing tasks which require human intelligenceFootnote2. According to James Johnson, PhD, Lecturer in Strategic Studies in the Department of Politics \& International Relations at the University of Aberdeen and author of the book Artificial Intelligence and the Future of Warfare, the hype around this has made it easy to overstate the opportunities and challenges posed by the development and deployment of AI in the military sphere. The author argues, that “speculations about super intelligent AI or the threat of superman AI to humanity” are entirely disconnected from today’s capabilities of AI. The book aims to address this problem by deciphering “proven capabilities and applications from mere speculation”, with a strong focus on the challenges AI poses to strategic stability, nuclear deterrence and how AI might influence nuclear weapon systems. The author concludes with implications and policy recommendations on how states could manage the escalatory risks posed by AI.},
journal = {Zeitschrift für Außen- und Sicherheitspolitik (ZfAS)},
author = {Reinhold, Thomas and Reuter, Christian},
year = {2022},
keywords = {Peace, Projekt-ATHENE-SecUrban},
}
[BibTeX] [Abstract] [Download PDF]
The revelation of the Stuxnet malware in 2010 shed light on the presence of state actors that are willing and capable of developing and using highly sophisticated, specialized malicious software for their political interests. These tools -often dubbed cyber weapons -are expected to become the next major advancement in weaponry technology. Besides the threats of offensive cyber operations for civil IT systems due to the interconnected nature of the cyberspace, international regulation of cyber weapons is -among other aspects -hindered by the fact that the military development and the strategic and tactical deployment of cyber weapons differ significantly from other weapons technologies. In order to establish measures of cyber arms related control treaties, it is crucial to identify these particular characteristics. Based on this premise, the article analyzes the current perspectives on cyber weapons, identifying their weaknesses of being either based on assumptions about adversarial actors or being applicable only after the usage of a malicious tool. In contrast to these approaches, the article focuses on the specific functional aspects of malware and presents an indicator-based assessment model based on parameters that can be measured prior to the application of malicious software. This enables the categorization of malicious tools as cyber weapons. Besides this, the article aims to introduce thought-provoking impulses with regard to social responsibility in computer science.
@article{reinhold_towards_2022,
title = {Towards a {Cyber} {Weapons} {Assessment} {Model} – {Assessment} of the {Technical} {Features} of {Malicious} {Software}},
volume = {3},
issn = {2637-6415},
url = {https://peasec.de/paper/2021/2021_ReinholdReuter_CyberWeapons_IEEETransactionsTechnologySociety.pdf},
doi = {10.1109/TTS.2021.3131817},
abstract = {The revelation of the Stuxnet malware in 2010 shed light on the presence of state actors that are willing and capable of developing and using highly sophisticated, specialized malicious software for their political interests. These tools -often dubbed cyber weapons -are expected to become the next major advancement in weaponry technology. Besides the threats of offensive cyber operations for civil IT systems due to the interconnected nature of the cyberspace, international regulation of cyber weapons is -among other aspects -hindered by the fact that the military development and the strategic and tactical deployment of cyber weapons differ significantly from other weapons technologies. In order to establish measures of cyber arms related control treaties, it is crucial to identify these particular characteristics. Based on this premise, the article analyzes the current perspectives on cyber weapons, identifying their weaknesses of being either based on assumptions about adversarial actors or being applicable only after the usage of a malicious tool. In contrast to these approaches, the article focuses on the specific functional aspects of malware and presents an indicator-based assessment model based on parameters that can be measured prior to the application of malicious software. This enables the categorization of malicious tools as cyber weapons. Besides this, the article aims to introduce thought-provoking impulses with regard to social responsibility in computer science.},
language = {en},
number = {3},
journal = {IEEE Transactions on Technology and Society},
author = {Reinhold, Thomas and Reuter, Christian},
month = sep,
year = {2022},
keywords = {A-Paper, Ranking-ImpactFactor, Peace, AuswahlPeace, Cyberwar, Projekt-ATHENE-SecUrban},
pages = {226--239},
}
[BibTeX] [Abstract] [Download PDF]
In the last decades, research has shown that both technical solutions and user perceptions are important to improve security and privacy in the digital realm. The field of ‘usable security’ already started to emerge in the mid-90s, primarily focussed on password and email security. Later on, the research field of ”usable security and privacy” evolved and broadened the aim to design concepts and tools to assist users in enhancing their behaviour with regard to both privacy and security. Nevertheless, many user interventions are not as effective as desired. Because of highly diverse usage contexts, leading to different privacy and security requirements and not always to one-size-fits-all approaches, tailorability is necessary to address this issue. Furthermore, transparency is a crucial requirement, as providing comprehensible information may counter reactance towards security interventions. This article first provides a brief history of the research field in its first quarter-century and then highlights research on the transparency and tailorability of user interventions. Based on this, this article then presents six contributions with regard to (1) privacy concerns in times of COVID-19, (2) authentication on mobile devices, (3) GDPR-compliant data management, (4) privacy notices on websites, (5) data disclosure scenarios in agriculture, as well as (6) rights under data protection law and the concrete process should data subjects want to claim those rights. This article concludes with several research directions on user-centred transparency and tailorability.
@article{reuter_quarter_2022,
title = {A {Quarter} {Century} of {Usable} {Security} and {Privacy} {Research}: {Transparency}, {Tailorability}, and the {Road} {Ahead}},
volume = {41},
issn = {0144-929X},
url = {https://www.tandfonline.com/toc/tbit20/41/10},
doi = {10.1080/0144929X.2022.2080908},
abstract = {In the last decades, research has shown that both technical solutions and user perceptions are important to improve security and privacy in the digital realm. The field of ‘usable security’ already started to emerge in the mid-90s, primarily focussed on password and email security. Later on, the research field of ”usable security and privacy” evolved and broadened the aim to design concepts and tools to assist users in enhancing their behaviour with regard to both privacy and security. Nevertheless, many user interventions are not as effective as desired. Because of highly diverse usage contexts, leading to different privacy and security requirements and not always to one-size-fits-all approaches, tailorability is necessary to address this issue. Furthermore, transparency is a crucial requirement, as providing comprehensible information may counter reactance towards security interventions. This article first provides a brief history of the research field in its first quarter-century and then highlights research on the transparency and tailorability of user interventions. Based on this, this article then presents six contributions with regard to (1) privacy concerns in times of COVID-19, (2) authentication on mobile devices, (3) GDPR-compliant data management, (4) privacy notices on websites, (5) data disclosure scenarios in agriculture, as well as (6) rights under data protection law and the concrete process should data subjects want to claim those rights. This article concludes with several research directions on user-centred transparency and tailorability.},
number = {10},
journal = {Behaviour \& Information Technology (BIT)},
author = {Reuter, Christian and Lo Iacono, Luigi and Benlian, Alexander},
year = {2022},
keywords = {Crisis, HCI, SocialMedia, UsableSec, Security, A-Paper, Ranking-ImpactFactor, Ranking-CORE-A, Projekt-CROSSING, Projekt-ATHENE-SecUrban},
pages = {2035--2048},
}
[BibTeX] [Abstract] [Download PDF]
In dieser Sonderausgabe von „Die Friedens-Warte“ nähern wir uns dem Thema Resilienz aus den unterschiedlichen Perspektiven der Technikwissenschaften (mit einem Schwerpunkt auf neuen Technologien), den Sozialwissenschaften und den Rechtswissenschaften. Ein solcher interdisziplinärer Austausch innerhalb des Forschungsfeldes der Friedens- und Konfliktforschung ist aus unserer Sicht immens wichtig, zurzeit jedoch noch allzu rar. Das heutige internationale Sicherheitsumfeld ist gekennzeichnet durch den Niedergang der klassischen Rüstungskontrollarchitektur, die Rückkehr der Großmachtpolitik und das schwindende Vertrauen zwischen den Staaten. Neue Entwicklungen im Bereich der Militärtechnologie und der Technologien mit Doppelverwendungsfähigkeit sowie Modernisierungsprogramme für Waffen machen die Bemühungen um Frieden und Sicherheit noch komplexer. Seit dem Einmarsch Russlands in die Ukraine im Februar 2022 ist allgemein anerkannt, wie wichtig es ist, sich mit diesen Fragen sachkundig auseinanderzusetzen. Der erste Teil dieser Sonderausgabe basiert auf der interdisziplinären Konferenz Science Peace Security 2021 in Aachen, die sich mit den Auswirkungen neuer Technologien auf die Resilienz befasste. Gesucht wurden Konzepte zur Erreichung eines widerstandsfähigeren Sicherheitsumfeldes durch wissenschaftliche Beiträge und politische Maßnahmen zur Krisenbewältigung, Risikobewertung, Vertrauensbildung und Rüstungsbegrenzung. Untersucht wurden nukleare, biologische, chemische und weltraumgestützte Bedrohungen sowie Entwicklungen in der Informationstechnologie, wie z. B. Cyber- oder künstliche Intelligenz, sowie weitere relevante technischen Bereiche.
@article{reuter_zwischen_2022,
title = {Zwischen {Destabilisierung} und der {Ermöglichung} von {Resilienz}: {Perspektiven} aus den {Technikwissenschaften}, den {Sozialwissenschaften} und den {Rechtswissenschaften}},
volume = {95},
url = {https://elibrary.bwv-verlag.de/article/99.105025/fw202203024101},
abstract = {In dieser Sonderausgabe von „Die Friedens-Warte“ nähern wir uns dem Thema Resilienz aus den unterschiedlichen Perspektiven der Technikwissenschaften (mit einem Schwerpunkt auf neuen Technologien), den Sozialwissenschaften und den Rechtswissenschaften. Ein solcher interdisziplinärer Austausch innerhalb des Forschungsfeldes der Friedens- und Konfliktforschung ist aus unserer Sicht immens wichtig, zurzeit jedoch noch allzu rar.
Das heutige internationale Sicherheitsumfeld ist gekennzeichnet durch den Niedergang der klassischen Rüstungskontrollarchitektur, die Rückkehr der Großmachtpolitik und das schwindende Vertrauen zwischen den Staaten. Neue Entwicklungen im Bereich der Militärtechnologie und der Technologien mit Doppelverwendungsfähigkeit sowie Modernisierungsprogramme für Waffen machen die Bemühungen um Frieden und Sicherheit noch komplexer. Seit dem Einmarsch Russlands in die Ukraine im Februar 2022 ist allgemein anerkannt, wie wichtig es ist, sich mit diesen Fragen sachkundig auseinanderzusetzen.
Der erste Teil dieser Sonderausgabe basiert auf der interdisziplinären Konferenz Science Peace Security 2021 in Aachen, die sich mit den Auswirkungen neuer Technologien auf die Resilienz befasste. Gesucht wurden Konzepte zur Erreichung eines widerstandsfähigeren Sicherheitsumfeldes durch wissenschaftliche Beiträge und politische Maßnahmen zur Krisenbewältigung, Risikobewertung, Vertrauensbildung und Rüstungsbegrenzung. Untersucht wurden nukleare, biologische, chemische und weltraumgestützte Bedrohungen sowie Entwicklungen in der Informationstechnologie, wie z. B. Cyber- oder künstliche Intelligenz, sowie weitere relevante technischen Bereiche.},
number = {3-4},
journal = {Die Friedens-Warte / Journal of International Peace and Organization (JIPO)},
author = {Reuter, Christian and Göttsche, Malte and Frieß, Friederike and Thielbörger, Pierre and Vüllers, Johannes},
year = {2022},
keywords = {Peace},
pages = {241--243},
}
[BibTeX] [Abstract] [Download PDF]
In this special issue of the “Journal of International Peace and Organization”, we approach the topic of resilience from the different perspectives of the technical sciences (with a focus on new technologies), the social sciences, and law. In our view such interdisciplinary exchange of views within the research field of peace and conflict research is highly important, yet at the same time all too rare. Today’s international security environment is marked by the demise of the classical arms control architecture, the return of great power politics, and eroding trust among states. New developments in military and dual use technology as well as weapon modernization programs add complexity to any effort towards peace and security. The importance of dealing with these issues in an informed manner has been widely accepted since Russia’s invasion of Ukraine in February 2022. The first part of this special issue is based on the interdisciplinary conference Science Peace Security 2021 in Aachen, which examined the impacts of new technologies on resilience. It sought concepts on how a more resilient security environment can be achieved through scientific contributions and policy measures towards crisis resolution, risk assessments, confidence-building, and arms limitations. Nuclear, biological, chemical, and space threats as well as developments in information technology such as cyber or artificial intelligence issues, and any other relevant technical fields, were examined.
@article{reuter_between_2022,
title = {Between {Destabilization} and {Enabling} {Resilience}: {Perspectives} from the {Technical} {Sciences}, {Political} {Science} and {Law}},
volume = {95},
url = {https://elibrary.bwv-verlag.de/article/99.105025/fw202203024401},
abstract = {In this special issue of the “Journal of International Peace and Organization”, we approach the topic of resilience from the different perspectives of the technical sciences (with a focus on new technologies), the social sciences, and law. In our view such interdisciplinary exchange of views within the research field of peace and conflict research is highly important, yet at the same time all too rare.
Today’s international security environment is marked by the demise of the classical arms control architecture, the return of great power politics, and eroding trust among states. New developments in military and dual use technology as well as weapon modernization programs add complexity to any effort towards peace and security. The importance of dealing with these issues in an informed manner has been widely accepted since Russia’s invasion of Ukraine in February 2022.
The first part of this special issue is based on the interdisciplinary conference Science Peace Security 2021 in Aachen, which examined the impacts of new technologies on resilience. It sought concepts on how a more resilient security environment can be achieved through scientific contributions and policy measures towards crisis resolution, risk assessments, confidence-building, and arms limitations. Nuclear, biological, chemical, and space threats as well as developments in information technology such as cyber or artificial intelligence issues, and any other relevant technical fields, were examined.},
number = {3-4},
journal = {Die Friedens-Warte / Journal of International Peace and Organization (JIPO)},
author = {Reuter, Christian and Göttsche, Malte and Frieß, Friederike and Thielbörger, Pierre and Vüllers, Johannes},
year = {2022},
keywords = {Peace},
pages = {244--246},
}
[BibTeX] [Abstract] [Download PDF]
Interdisziplinäre Forschung und Lehre zwischen Informatik sowie Friedens- und Sicherheitsforschung ist vor dem Hintergrund, dass Konflikte im Cyberspace nicht mehr eine in der Zukunft liegende Fiktion, sondern eine realitätsnahe Möglichkeit darstellen, unabdingbar. Auch wenn zahlreiche etablierte Lehrveranstaltungen und Lehrbücher in der einen oder anderen Disziplin existieren, gilt dies nicht für deren Schnittmenge. Dieser Beitrag reflektiert die Einführung der in Bezug auf Thematik und Hörer*innenschaft interdisziplinären Lehrveranstaltung „Informationstechnologie für Frieden und Sicherheit“ für Studierende der Informatik, IT-Sicherheit und Wirtschaftsinformatik der Technischen Universität Darmstadt, sowie Friedens- und Konfliktforschung der TU Darmstadt in Kooperation mit der Goethe-Universität Frankfurt. Hierbei werden Herausforderungen und Lösungsansätze der interdisziplinären Lehre dargestellt und die Bedeutung dieser Lehre hervorgehoben.
@article{reuter_zur_2022,
title = {Zur {Schnittmenge} von {Informatik} mit {Friedens}- und {Sicherheitsforschung}: {Erfahrungen} aus der interdisziplinären {Lehre} in der {Friedensinformatik}},
volume = {11},
issn = {2524-6976},
url = {https://link.springer.com/content/pdf/10.1007/s42597-022-00078-4.pdf},
doi = {10.1007/s42597-022-00078-4},
abstract = {Interdisziplinäre Forschung und Lehre zwischen Informatik sowie Friedens- und Sicherheitsforschung ist vor dem Hintergrund, dass Konflikte im Cyberspace nicht mehr eine in der Zukunft liegende Fiktion, sondern eine realitätsnahe Möglichkeit darstellen, unabdingbar. Auch wenn zahlreiche etablierte Lehrveranstaltungen und Lehrbücher in der einen oder anderen Disziplin existieren, gilt dies nicht für deren Schnittmenge. Dieser Beitrag reflektiert die Einführung der in Bezug auf Thematik und Hörer*innenschaft interdisziplinären Lehrveranstaltung „Informationstechnologie für Frieden und Sicherheit“ für Studierende der Informatik, IT-Sicherheit und Wirtschaftsinformatik der Technischen Universität Darmstadt, sowie Friedens- und Konfliktforschung der TU Darmstadt in Kooperation mit der Goethe-Universität Frankfurt. Hierbei werden Herausforderungen und Lösungsansätze der interdisziplinären Lehre dargestellt und die Bedeutung dieser Lehre hervorgehoben.},
number = {2},
journal = {Zeitschrift für Friedens- und Konfliktforschung (ZeFKo)},
author = {Reuter, Christian and Riebe, Thea and Haunschild, Jasmin and Reinhold, Thomas and Schmid, Stefka},
month = oct,
year = {2022},
keywords = {Security, Peace},
pages = {129--140},
}
[BibTeX] [Abstract] [Download PDF]
Cryptography has become ubiquitous in communication technology and is considered a necessary part of information security. However, both the regulation to restrict access to cryptography, as well as practices to weaken or break encryption, are part of the States’ security policies. The United States (U.S.) regulate cryptography for export in international trade as a dual-use good. However, the regulation has been increasingly loosened and transferred to bilateral agreements with Information and Communication Technology companies. At the same time, the National Security Agency attempted to implement a government encryption standard to guarantee itself easier access to data, thus progressively expanding surveillance on non-U.S. citizens. In this paper, using comparative policy analysis, we examine the evolution of both security policies by tracing the historical development of U.S. regulation of cryptography as a dual-use good, and surveillance technologies, and practices used from the 1990s to today. We conclude that the impact of the dual-use regulation has affected the efficiency of surveillance technology, by loosening regulations only for mass communication services, thereby supporting the proliferation of surveillance intermediaries, while working on strategies to collaborate and exploit their coverage.
@article{riebe_us_2022,
title = {U.{S}. {Security} {Policy}: {The} {Dual}-{Use} {Regulation} of {Cryptography} and its {Effects} on {Surveillance}},
url = {https://link.springer.com/content/pdf/10.1007/s41125-022-00080-0.pdf},
doi = {10.1007/s41125-022-00080-0},
abstract = {Cryptography has become ubiquitous in communication technology and is considered a necessary part of information security. However, both the regulation to restrict access to cryptography, as well as practices to weaken or break encryption, are part of the States’ security policies. The United States (U.S.) regulate cryptography for export in international trade as a dual-use good. However, the regulation has been increasingly loosened and transferred to bilateral agreements with Information and Communication Technology companies. At the same time, the National Security Agency attempted to implement a government encryption standard to guarantee itself easier access to data, thus progressively expanding surveillance on non-U.S. citizens. In this paper, using comparative policy analysis, we examine the evolution of both security policies by tracing the historical development of U.S. regulation of cryptography as a dual-use good, and surveillance technologies, and practices used from the 1990s to today. We conclude that the impact of the dual-use regulation has affected the efficiency of surveillance technology, by loosening regulations only for mass communication services, thereby supporting the proliferation of surveillance intermediaries, while working on strategies to collaborate and exploit their coverage.},
journal = {European Journal for Security Research (EJSR)},
author = {Riebe, Thea and Kuehn, Philipp and Imperatori, Philipp and Reuter, Christian},
year = {2022},
keywords = {Student, Security, Projekt-KontiKat, Projekt-CYWARN},
}
[BibTeX] [Abstract] [Download PDF]
The European Union (EU) has undertaken policies which address the research and development of artificial intelligence (AI). In light of debates of technology assessment which focus on risks for humans and questions of control of AI, the EU has propagated an ethical, human-centred approach of the application of AI. It is important to identify how the EU envisions AI as this may guide emerging norms in AI governance and today’s research and development of (weaponised) AI. Building on works of Human-Computer Interaction (HCI), this work derives the actor’s understanding of human-AI interaction, including conceptualisations of explainability, interpretability, and risks. Analysis of EU documents on the implementation of AI as a general-purpose technology and for military application reveals that explainability and risk identification are crucial elements for trust, which itself is a necessary component in the uptake of AI. Interdisciplinary approaches allow for a more detailed understanding of actors’ fundamental views on human control of AI, which further contributes to debates on technology assessment in professionalised political contexts.
@article{schmid_trustworthy_2022,
title = {Trustworthy and {Explainable}: {A} {European} {Vision} of ({Weaponised}) {Artificial} {Intelligence}},
volume = {95},
url = {https://elibrary.bwv-verlag.de/article/10.35998/fw-2022-0013},
doi = {10.35998/fw-2022-0013},
abstract = {The European Union (EU) has undertaken policies which address the research and development of artificial intelligence (AI). In light of debates of technology assessment which focus on risks for humans and questions of control of AI, the EU has propagated an ethical, human-centred approach of the application of AI. It is important to identify how the EU envisions AI as this may guide emerging norms in AI governance and today’s research and development of (weaponised) AI. Building on works of Human-Computer Interaction (HCI), this work derives the actor’s understanding of human-AI interaction, including conceptualisations of explainability, interpretability, and risks. Analysis of EU documents on the implementation of AI as a general-purpose technology and for military application reveals that explainability and risk identification are crucial elements for trust, which itself is a necessary component in the uptake of AI. Interdisciplinary approaches allow for a more detailed understanding of actors’ fundamental views on human control of AI, which further contributes to debates on technology assessment in professionalised political contexts.},
number = {3-4},
journal = {Die Friedens-Warte / Journal of International Peace and Organization (JIPO)},
author = {Schmid, Stefka},
year = {2022},
keywords = {Peace, Projekt-ATHENE-SecUrban, Projekt-TraCe},
pages = {290--315},
}
[BibTeX] [Abstract] [Download PDF]
Artificial Intelligence (AI) seems to be impacting all industry sectors, while becoming a motor for innovation. The diffusion of AI from the civilian sector to the defense sector, and AI’s dual-use potential has drawn attention from security and ethics scholars. With the publication of the ethical guideline Trustworthy AI by the European Union (EU), normative questions on the application of AI have been further evaluated. In order to draw conclusions on Trustworthy AI as a point of reference for responsible research and development (R&D), we approach the diffusion of AI across both civilian and military spheres in the EU. We capture the extent of technological diffusion and derive European and German patent citation networks. Both networks indicate a low degree of diffusion of AI between civilian and defense sectors. A qualitative investigation of project descriptions of a research institute’s work in both civilian and military fields shows that military AI applications stress accuracy or robustness, while civilian AI reflects a focus on human-centric values. Our work represents a first approach by linking processes of technology diffusion with normative evaluations of R&D.
@article{schmid_dual-use_2022,
title = {Dual-{Use} and {Trustworthy}? {A} {Mixed} {Methods} {Analysis} of {AI} {Diffusion} between {Civilian} and {Defense} {R}\&{D}},
volume = {28},
url = {https://peasec.de/paper/2022/2022_SchmidRiebeReuter_DualUseandTrustworthy_ScienceEngineeringEthics.pdf},
doi = {10.1007/s11948-022-00364-7},
abstract = {Artificial Intelligence (AI) seems to be impacting all industry sectors, while becoming a motor for innovation. The diffusion of AI from the civilian sector to the defense sector, and AI’s dual-use potential has drawn attention from security and ethics scholars. With the publication of the ethical guideline Trustworthy AI by the European Union (EU), normative questions on the application of AI have been further evaluated. In order to draw conclusions on Trustworthy AI as a point of reference for responsible research and development (R\&D), we approach the diffusion of AI across both civilian and military spheres in the EU. We capture the extent of technological diffusion and derive European and German patent citation networks. Both networks indicate a low degree of diffusion of AI between civilian and defense sectors. A qualitative investigation of project descriptions of a research institute’s work in both civilian and military fields shows that military AI applications stress accuracy or robustness, while civilian AI reflects a focus on human-centric values. Our work represents a first approach by linking processes of technology diffusion with normative evaluations of R\&D.},
number = {12},
journal = {Science and Engineering Ethics},
author = {Schmid, Stefka and Riebe, Thea and Reuter, Christian},
year = {2022},
keywords = {A-Paper, Ranking-ImpactFactor, Projekt-KontiKat, Peace, AuswahlPeace, Projekt-CYWARN},
pages = {1--23},
}
[BibTeX] [Abstract] [Download PDF]
In the digital age, the vision of autonomous vehicles (AVs) is vibrant. Research is being conducted worldwide to inte-grate AVs into our everyday lives in the future, spending consid-erable amounts of money in the development process. Actors from both engineering as well as social sciences are involved in this re-search, with technical disciplines strongly dominating. In addition to perceived progress of numerous newly developed technologies such as AVs, challenges should also be referred to. According to research analysis, the transferability of autonomous cars to the military sphere seems to be frequently forgotten or ignored (dual-use). Since not much research has been conducted in Germany on the potential deployment of autonomous driving development steps into military domains, 25 semi-structured interviews with de-velopers and researchers and actors involved in the field, were conducted in 2020. The paper identifies that the majority of re-spondents interviewed were aware of general existing dual-use de-bates, however, few had reflected about dual-use issues regarding a possible transfer of their own development processes in the con-text of autonomous driving to military applications, intensively. One reason is the small-scale nature of research, another is the complexity of the field, which enables the engineer’s alienation from their responsibility for the artefacts’ use. Moreover, it has become clear that hardly any conversations among colleagues oc-cur about possible misuse and that no standardized policy guide-lines exist, which provide information about possible risk. To raise dual-use awareness, scientific contributions, risk education, and interdisciplinary discussions are essential.
@article{schwartz_vision_2022,
title = {Vision or {Threat} – {Awareness} for {Dual}-{Use} in the {Development} of {Autonomous} {Driving}},
volume = {3},
issn = {2637-6415},
url = {https://www.peasec.de/paper/2022/2022_SchwartzGuntrumReuter_VisionorThreatAwarenessDualUseAutonomousDriving_IEEE-TTS.pdf},
doi = {10.1109/TTS.2022.3182310},
abstract = {In the digital age, the vision of autonomous vehicles (AVs) is vibrant. Research is being conducted worldwide to inte-grate AVs into our everyday lives in the future, spending consid-erable amounts of money in the development process. Actors from both engineering as well as social sciences are involved in this re-search, with technical disciplines strongly dominating. In addition to perceived progress of numerous newly developed technologies such as AVs, challenges should also be referred to. According to research analysis, the transferability of autonomous cars to the military sphere seems to be frequently forgotten or ignored (dual-use). Since not much research has been conducted in Germany on the potential deployment of autonomous driving development steps into military domains, 25 semi-structured interviews with de-velopers and researchers and actors involved in the field, were conducted in 2020. The paper identifies that the majority of re-spondents interviewed were aware of general existing dual-use de-bates, however, few had reflected about dual-use issues regarding a possible transfer of their own development processes in the con-text of autonomous driving to military applications, intensively. One reason is the small-scale nature of research, another is the complexity of the field, which enables the engineer’s alienation from their responsibility for the artefacts’ use. Moreover, it has become clear that hardly any conversations among colleagues oc-cur about possible misuse and that no standardized policy guide-lines exist, which provide information about possible risk. To raise dual-use awareness, scientific contributions, risk education, and interdisciplinary discussions are essential.},
language = {en},
number = {3},
journal = {IEEE Transactions on Technology and Society},
author = {Schwartz, Sebastian and Guntrum, Laura and Reuter, Christian},
year = {2022},
keywords = {Selected, A-Paper, Ranking-ImpactFactor, Peace, AuswahlPeace, Projekt-ATHENE-FANCY, Projekt-TraCe},
pages = {163--174},
}
[BibTeX] [Abstract] [Download PDF]
Viele Städte entwickeln sich hin zu einer „Smart City“. Der Trend birgt einerseits vielfältige Potenziale für Effizienz, Nachhaltigkeit und Sicherheit. Auf der anderen Seite ergeben sich neue Herausforderungen für den Schutz städtischer Infrastrukturen und der darin befindlichen Daten vor Ausfällen und (Cyber‑)Angriffen, die in ihrer Komplexität bisher nur wenig untersucht sind.
@article{zimmermann_sicherheitsherausforderungen_2022,
title = {Sicherheitsherausforderungen für {Smart} {City}-{Infrastrukturen}},
url = {https://link.springer.com/content/pdf/10.1365/s35764-022-00396-5.pdf},
doi = {10.1365/s35764-022-00396-5},
abstract = {Viele Städte entwickeln sich hin zu einer „Smart City“. Der Trend birgt einerseits vielfältige Potenziale für Effizienz, Nachhaltigkeit und Sicherheit. Auf der anderen Seite ergeben sich neue Herausforderungen für den Schutz städtischer Infrastrukturen und der darin befindlichen Daten vor Ausfällen und (Cyber‑)Angriffen, die in ihrer Komplexität bisher nur wenig untersucht sind.},
journal = {Wirtschaftsinformatik \& Management},
author = {Zimmermann, Verena and Haunschild, Jasmin and Unden, Marita and Gerber, Paul and Gerber, Nina},
year = {2022},
keywords = {UsableSec, Security, Projekt-ATHENE-SecUrban},
}
2021
[BibTeX] [Abstract] [Download PDF]
Smart cities aim at improving efficiency while providing safety and security by merging conventional infrastructures with information and communication technology. One strategy for mitigating hazardous situations and improving the overall resilience of the system is to involve citizens. For instance, smart grids involve prosumers – capable of producing and consuming electricity – who can adjust their electricity profile dynamically (i.e., decrease or increase electricity consumption), or use their local production to supply electricity to the grid. This mitigates the impact of peak-consumption periods on the grid and makes it easier for operators to control the grid. This involvement of prosumers is accompanied by numerous socio-technical challenges, including motivating citizens to contribute by adjusting their electricity consumption to the requirements of the energy grid. Towards this end, this work investigates motivational strategies and tools, including nudging, persuasive technologies, and incentives, that can be leveraged to increase the motivation of citizens. We discuss long-term and side effects and ethical and privacy considerations, before portraying bug bounty programs, gamification and apps as technologies and strategies to communicate the motivational strategies to citizens.
@article{egert_towards_2021,
series = {i-com},
title = {Towards {Resilient} {Critical} {Infrastructures} - {Motivating} {Users} to {Contribute} to {Smart} {Grid} {Resilience}},
volume = {20},
url = {https://www.degruyter.com/document/doi/10.1515/icom-2021-0021/html},
doi = {10.1515/icom-2021-0021},
abstract = {Smart cities aim at improving efficiency while providing safety and security by merging conventional infrastructures with information and communication technology. One strategy for mitigating hazardous situations and improving the overall resilience of the system is to involve citizens. For instance, smart grids involve prosumers - capable of producing and consuming electricity - who can adjust their electricity profile dynamically (i.e., decrease or increase electricity consumption), or use their local production to supply electricity to the grid. This mitigates the impact of peak-consumption periods on the grid and makes it easier for operators to control the grid. This involvement of prosumers is accompanied by numerous socio-technical challenges, including motivating citizens to contribute by adjusting their electricity consumption to the requirements of the energy grid. Towards this end, this work investigates motivational strategies and tools, including nudging, persuasive technologies, and incentives, that can be leveraged to increase the motivation of citizens. We discuss long-term and side effects and ethical and privacy considerations, before portraying bug bounty programs, gamification and apps as technologies and strategies to communicate the motivational strategies to citizens.},
number = {2},
journal = {i-com - Journal of Interactive Media},
author = {Egert, Rolf and Gerber, Nina and Haunschild, Jasmin and Kuehn, Philipp and Zimmermann, Verena},
year = {2021},
keywords = {Security, Infrastructure, Projekt-ATHENE-SecUrban, Projekt-CYWARN, Projekt-emergenCITY},
pages = {161--175},
}
[BibTeX] [Abstract] [Download PDF]
During crises such as the COVID-19 pandemic, people spontaneously initiate support groups, while establishedorganizations like soccer clubs set non-regular goals, both offering help. Interested in the coordination of suchhelp and potential challenges of collaboration, we conducted a virtual ethnography of a multi-level networklocated in Germany. We focused on aims, activities, and technological mediation, with Activity Theory astheoretical framework. Our findings show that the organizational aim of coordinating help was successfullyachieved by connecting heterogeneous actors through digitization and institutionalization. Enabled by thecontext of the COVID-19 pandemic crisis, the network acted virtually, but was also able to integrate analogspaces of help. We identified six crucial implications regarding the use of technology and collaboration forbuilding a successful volunteering network.
@article{haesler_stronger_2021,
title = {Stronger {Together}: {How} {Neighborhood} {Groups} {Build} up a {Virtual} {Network} during the {COVID}-19 {Pandemic}},
volume = {5},
url = {https://peasec.de/paper/2021/2021_HaeslerSchmidVierneiselReuter_StrongerTogetherVirtualNetworkCOVID19_CSCW.pdf},
abstract = {During crises such as the COVID-19 pandemic, people spontaneously initiate support groups, while establishedorganizations like soccer clubs set non-regular goals, both offering help. Interested in the coordination of suchhelp and potential challenges of collaboration, we conducted a virtual ethnography of a multi-level networklocated in Germany. We focused on aims, activities, and technological mediation, with Activity Theory astheoretical framework. Our findings show that the organizational aim of coordinating help was successfullyachieved by connecting heterogeneous actors through digitization and institutionalization. Enabled by thecontext of the COVID-19 pandemic crisis, the network acted virtually, but was also able to integrate analogspaces of help. We identified six crucial implications regarding the use of technology and collaboration forbuilding a successful volunteering network.},
number = {CSCW2},
journal = {Proceedings of the ACM: Human Computer Interaction (PACM): Computer-Supported Cooperative Work and Social Computing},
author = {Haesler, Steffen and Schmid, Stefka and Vierneisel, Annemike Sophia and Reuter, Christian},
year = {2021},
keywords = {AuswahlCrisis, Crisis, HCI, Selected, A-Paper, Ranking-CORE-A, Projekt-ATHENE-SecUrban, Projekt-emergenCITY},
}
[BibTeX] [Abstract] [Download PDF]
In den letzten Jahren haben sich soziale Medien wie Facebook und Twitter immer mehr zu wichtigen Informationsquellen entwickelt, welche die Verbreitung von nutzergenerierten Inhalten unterstützen. Durch die hohe Verbreitungsgeschwindigkeit, geringen Aufwand und (scheinbare) Anonymität nimmt gleichzeitig die Verbreitung von Fake News und ähnlichen Phänomenen zu. Bereits in den vergangenen Jahren aber insbesondere auch im Kontext der COVID-19 Pandemie hat sich gezeigt, dass Fake News und unbeabsichtigte Fehlinformationen ernsthafte und sogar lebensbedrohliche Konsequenzen mit sich tragen bringen können. Technische Unterstützungsmaßnahmen haben insbesondere in sozialen Medien ein großes Potenzial um Fake News effektiv zu bekämpfen. Hier sind zwei maßgebliche Schritte notwendig: (1) Fake News automatisiert detektieren und (2) nach der erfolgreichen Detektion sinnvolle technische Gegenmaßnahmen implementieren [2].
@article{hartwig_transparenz_2021,
title = {Transparenz im technischen {Umgang} mit {Fake} {News}},
url = {https://peasec.de/paper/2021/2021_HartwigReuter_TransparenzFakeNews_TechnikMenschVDI.pdf},
abstract = {In den letzten Jahren haben sich soziale Medien wie Facebook und Twitter immer mehr zu wichtigen Informationsquellen entwickelt, welche die Verbreitung von nutzergenerierten Inhalten unterstützen. Durch die hohe Verbreitungsgeschwindigkeit, geringen Aufwand und (scheinbare) Anonymität nimmt gleichzeitig die Verbreitung von Fake News und ähnlichen Phänomenen zu. Bereits in den vergangenen Jahren aber insbesondere auch im Kontext der COVID-19 Pandemie hat sich gezeigt, dass Fake News und unbeabsichtigte Fehlinformationen ernsthafte und sogar lebensbedrohliche Konsequenzen mit sich tragen bringen können. Technische Unterstützungsmaßnahmen haben insbesondere in sozialen Medien ein großes Potenzial um Fake News effektiv zu bekämpfen. Hier sind zwei maßgebliche Schritte notwendig: (1) Fake News automatisiert detektieren und (2) nach der erfolgreichen Detektion sinnvolle technische Gegenmaßnahmen implementieren [2].},
number = {2},
journal = {Technik \& Mensch},
author = {Hartwig, Katrin and Reuter, Christian},
year = {2021},
keywords = {Crisis},
pages = {9--11},
}
[BibTeX] [Abstract] [Download PDF]
Digitalisierung ist ein präsenter Faktor in vielen Städten. So existieren bereits viele Smart-City-Initiativen, bei denen Städte versuchen, ihre Prozesse durch Erfassung und Verknüpfung von Daten, oft unter Zuhilfenahme von Datenplattformen, zu optimieren. In Anbetracht der damit einhergehenden großen Investitionen und Veränderungen wird Bürgerbeteiligung als zentraler Faktor für den Erfolg solcher Initiativen betrachtet. Bisher ist allerdings nicht klar, was typische Beteiligungsformate von Smart-City-Initiativen sind und welche Rolle(n) BürgerInnen dabei einnehmen. Dieser Beitrag leitet mittels einer Literaturanalyse zu Smart Cities ein Kategorienschema zu typischen Bürgerbeteiligungsarten ab. Die Analyse ergab, dass sich Einbindung von BürgerInnen in politische Entscheidungen und bei der Entwicklung technischer Artefakte maßgeblich auf e‑Government oder Participatory Design bezieht. Im Hinblick auf die Beteiligungsarten zeigt sich, dass Makrofabriken, Living Labs und Open-Data-Plattformen häufige Ansätze sind, um BürgerInnen als Co-Creators einzubinden. Zudem werden BürgerInnen mit Citizen Sensing zur Erfassung von Daten oder Missständen einbezogen. Dabei zeigen sich sowohl aktivere, als auch eher passive Beteiligungsarten. Die Analyse zeigt, dass die Einbindung von BürgerInnen häufig entweder auf eine Beteiligung an politischen Entscheidungen oder an der Entwicklung technischer Artefakte abzielt. Auch wenn keine klare Abgrenzung möglich ist, sind diese Ansätze dann eher durch e‑Government oder Participatory Design inspiriert.
@article{haunschild_nutzer_2021,
title = {Nutzer, {Sammler}, {Entscheidungsträger}? {Arten} der {Bürgerbeteiligung} in {Smart} {Cities}},
volume = {58},
url = {https://peasec.de/paper/2021/2021_HaunschildDemuthGeissRichterReuter_NutzerSammlerEntscheidungstragerBuergerbeteiligungSmartCities_HMD.pdf},
doi = {10.1365/s40702-021-00770-8},
abstract = {Digitalisierung ist ein präsenter Faktor in vielen Städten. So existieren bereits viele Smart-City-Initiativen, bei denen Städte versuchen, ihre Prozesse durch Erfassung und Verknüpfung von Daten, oft unter Zuhilfenahme von Datenplattformen, zu optimieren. In Anbetracht der damit einhergehenden großen Investitionen und Veränderungen wird Bürgerbeteiligung als zentraler Faktor für den Erfolg solcher Initiativen betrachtet. Bisher ist allerdings nicht klar, was typische Beteiligungsformate von Smart-City-Initiativen sind und welche Rolle(n) BürgerInnen dabei einnehmen. Dieser Beitrag leitet mittels einer Literaturanalyse zu Smart Cities ein Kategorienschema zu typischen Bürgerbeteiligungsarten ab. Die Analyse ergab, dass sich Einbindung von BürgerInnen in politische Entscheidungen und bei der Entwicklung technischer Artefakte maßgeblich auf e‑Government oder Participatory Design bezieht. Im Hinblick auf die Beteiligungsarten zeigt sich, dass Makrofabriken, Living Labs und Open-Data-Plattformen häufige Ansätze sind, um BürgerInnen als Co-Creators einzubinden. Zudem werden BürgerInnen mit Citizen Sensing zur Erfassung von Daten oder Missständen einbezogen. Dabei zeigen sich sowohl aktivere, als auch eher passive Beteiligungsarten. Die Analyse zeigt, dass die Einbindung von BürgerInnen häufig entweder auf eine Beteiligung an politischen Entscheidungen oder an der Entwicklung technischer Artefakte abzielt. Auch wenn keine klare Abgrenzung möglich ist, sind diese Ansätze dann eher durch e‑Government oder Participatory Design inspiriert.},
journal = {HMD Praxis der Wirtschaftsinformatik},
author = {Haunschild, Jasmin and Demuth, Kilian and Geiß, Henri-Jacques and Richter, Christian and Reuter, Christian},
year = {2021},
keywords = {HCI, Student, Projekt-ATHENE-SecUrban, Projekt-emergenCITY},
}
[BibTeX] [Abstract] [Download PDF]
Information and communication technologies (ICT), including artificial intelligence, internet of things, and mobile applications, can be utilized to tackle important societal challenges, such as the ongoing COVID-19 pandemic. While they may increase societal resilience, their design, functionality, and underlying infrastructures must be resilient against disruptions caused by anthropogenic, natural and hybrid crises, emergencies, and threats. In order to research challenges, designs, and potentials of interactive technologies, the second iteration of the workshop investigates the space of mobile technologies and resilient systems for crisis response, including the application domains of cyber threat and pandemic response.
@article{kaufhold_2nd_2021,
series = {{MobileHCI} '21 {Adjunct}},
title = {2nd {Workshop} on {Mobile} {Resilience}: {Designing} {Mobile} {Interactive} {Systems} for {Crisis} {Response}},
url = {https://peasec.de/paper/2021/2021_KaufholdReuterComesMirbabaieStieglitz_2ndWorkshopMobileResilience_MobileHCI.pdf},
doi = {10.1145/3447527.3474869},
abstract = {Information and communication technologies (ICT), including artificial intelligence, internet of things, and mobile applications, can be utilized to tackle important societal challenges, such as the ongoing COVID-19 pandemic. While they may increase societal resilience, their design, functionality, and underlying infrastructures must be resilient against disruptions caused by anthropogenic, natural and hybrid crises, emergencies, and threats. In order to research challenges, designs, and potentials of interactive technologies, the second iteration of the workshop investigates the space of mobile technologies and resilient systems for crisis response, including the application domains of cyber threat and pandemic response.},
journal = {MobileHCI '21: 23nd International Conference on Human-Computer Interaction with Mobile Devices and Services},
author = {Kaufhold, Marc-André and Reuter, Christian and Comes, Tina and Mirbabaie, Milad and Stieglitz, Stefan},
year = {2021},
keywords = {Crisis, Projekt-CYWARN},
}
[BibTeX] [Abstract] [Download PDF]
Technological progress can disrupt domains and change the way we work and collaborate. This paper presents a qualitative study with 52 German farmers that investigates the impact of the ongoing digitalization process in agriculture and discusses the implications for privacy research. As in other domains, the introduction of digital tools and services leads to the data itself becoming a resource. Sharing this data with products along the supply chain is favored by retailers and consumers, who benefit from traceability through transparency. However, transparency can pose a privacy risk. Having insight into the business data of others along the supply chain provides an advantage in terms of market position. This is particularly true in agriculture, where there is already a significant imbalance of power between actors. A multitude of small and medium-sized farming businesses are opposed by large upstream and downstream players that drive technological innovation. Further weakening the market position of farmers could lead to severe consequences for the entire sector. We found that on the one hand, privacy behaviors are affected by adoption of digitalization, and on the other hand, privacy itself influences adoption of digital tools. Our study sheds light on the emerging challenges for farmers and the role of privacy in the process of digitalization in agriculture.
@article{linsner_role_2021,
title = {The {Role} of {Privacy} in {Digitalization} – {Analysing} the {German} {Farmers}' {Perspective}},
volume = {2021},
url = {https://www.petsymposium.org/2021/files/papers/issue3/popets-2021-0050.pdf},
doi = {10.2478/popets-2021-0050},
abstract = {Technological progress can disrupt domains
and change the way we work and collaborate. This paper presents a qualitative study with 52 German farmers
that investigates the impact of the ongoing digitalization process in agriculture and discusses the implications for privacy research. As in other domains, the introduction of digital tools and services leads to the data
itself becoming a resource. Sharing this data with products along the supply chain is favored by retailers and
consumers, who benefit from traceability through transparency. However, transparency can pose a privacy risk.
Having insight into the business data of others along the
supply chain provides an advantage in terms of market
position. This is particularly true in agriculture, where
there is already a significant imbalance of power between actors. A multitude of small and medium-sized
farming businesses are opposed by large upstream and
downstream players that drive technological innovation.
Further weakening the market position of farmers could
lead to severe consequences for the entire sector. We
found that on the one hand, privacy behaviors are affected by adoption of digitalization, and on the other
hand, privacy itself influences adoption of digital tools.
Our study sheds light on the emerging challenges for
farmers and the role of privacy in the process of digitalization in agriculture.},
number = {3},
journal = {Proceedings on Privacy Enhancing Technologies (PoPETs)},
author = {Linsner, Sebastian and Kuntke, Franz and Steinbrink, Enno and Franken, Jonas and Reuter, Christian},
year = {2021},
keywords = {HCI, Selected, UsableSec, Security, A-Paper, Ranking-ImpactFactor, Ranking-CORE-A, AuswahlUsableSec, Projekt-GeoBox, Projekt-GRKPrivacy, Projekt-HyServ},
pages = {334--350},
}
[BibTeX] [Download PDF]
@article{reinhold_zur_2021,
title = {Zur {Rolle} und {Verantwortung} der {Informatik} für die {Friedensforschung} und {Rüstungskontrolle}},
volume = {38},
url = {https://peasec.de/paper/2021/2021_Reinhold_RolleVerantwortungInformatikFriedensforschung_FIFF.pdf},
journal = {FIfF-Kommunikation},
author = {Reinhold, Thomas},
year = {2021},
keywords = {Security, Peace, Projekt-DualUse, Cyberwar},
pages = {47--49},
}
[BibTeX] [Abstract] [Download PDF]
Spillover effects describe the process of a company benefiting from the R&D activities of another one and thereby gaining an economic advantage. One prominent approach for measuring spillover effects is based on the analysis of patent citation networks. Taking social media analytics and knowledge economics into account, this paper presents a complementary approach to quantify spillover effects from defense to civilian research and development, analyzing 513 employment biographies from the social network LinkedIn. Using descriptive network analysis, we investigate the emigration of personnel of the German defense industry to other civilian producers. Thereby, our study reveals that in the last decade, employees of defense suppliers have changed positions significantly less often, with 3.24 changes on average than professionals who have worked more than 50\% of their jobs in the civilian sector, having changed 4.61 times on average. Our work illustrates the churn behavior and how spillover effects between defense and civilian sectors can be measured using social career networks such as LinkedIn.
@article{riebe_measuring_2021,
title = {Measuring {Spillover} {Effects} from {Defense} to {Civilian} {Sectors} – {A} {Quantitative} {Approach} {Using} {LinkedIn}},
volume = {32},
url = {https://peasec.de/paper/2021/2021_RiebeSchmidReuter_SpilloverEffectsDefensetoCivilianLinkedIn_PDE.pdf},
doi = {10.1080/10242694.2020.1755787},
abstract = {Spillover effects describe the process of a company benefiting from the R\&D activities of another one and thereby gaining an economic advantage. One prominent approach for measuring spillover effects is based on the analysis of patent citation networks. Taking social media analytics and knowledge economics into account, this paper presents a complementary approach to quantify spillover effects from defense to civilian research and development, analyzing 513 employment biographies from the social network LinkedIn. Using descriptive network analysis, we investigate the emigration of personnel of the German defense industry to other civilian producers. Thereby, our study reveals that in the last decade, employees of defense suppliers have changed positions significantly less often, with 3.24 changes on average than professionals who have worked more than 50\% of their jobs in the civilian sector, having changed 4.61 times on average. Our work illustrates the churn behavior and how spillover effects between defense and civilian sectors can be measured using social career networks such as LinkedIn.},
number = {7},
journal = {Defence and Peace Economics},
author = {Riebe, Thea and Schmid, Stefka and Reuter, Christian},
year = {2021},
keywords = {Selected, A-Paper, Ranking-ImpactFactor, Peace, Projekt-DualUse, AuswahlPeace, Cyberwar, Projekt-ATHENE-SecUrban},
pages = {773--785},
}
[BibTeX] [Abstract] [Download PDF]
Besides the merits of increasing digitization and interconnectedness in private and professional spaces, critical infrastructures and societies are more and more exposed to cyberattacks. In order to enhance the preventative and reactive capabilities against cyberattacks, Computer Emergency Response Teams (CERTs) are deployed in many countries and organizations. In Germany, CERTs in the public sector operate on federal and state level to provide information security services for authorities, citizens, and enterprises. Their tasks of monitoring, analyzing, and communicating threats and incidents is getting more complex due to the increasing amount of information disseminated into public channels. By adopting the perspectives of Computer-Supported Cooperative Work (CSCW) and Crisis Informatics, we contribute to the study of organizational structures, technology use, and the impact on collaborative practices in and between state CERTs with empirical research based on expert interviews with representatives of German state CERTs (N=15) and supplementary document analyses (N=25). We derive design and policy implications from our findings, including the need for interoperable and modular architecture, a shift towards service level agreements, cross-platform monitoring and analysis of incident data, use of deduplication techniques and standardized threat exchange formats, a reduction of resource costs through process automation, and transparent reporting and tool structures for information exchange.
@article{riebe_impact_2021,
title = {The {Impact} of {Organizational} {Structure} and {Technology} {Use} on {Collaborative} {Practices} in {Computer} {Emergency} {Response} {Teams}: {An} {Empirical} {Study}},
volume = {5},
url = {https://www.peasec.de/paper/2021/2021_RiebeKaufholdReuter_ComputerEmegencyResponseTeams_CSCW.pdf},
doi = {10.1145/3479865},
abstract = {Besides the merits of increasing digitization and interconnectedness in private and professional spaces, critical infrastructures and societies are more and more exposed to cyberattacks. In order to enhance the preventative and reactive capabilities against cyberattacks, Computer Emergency Response Teams (CERTs) are deployed in many countries and organizations. In Germany, CERTs in the public sector operate on federal and state level to provide information security services for authorities, citizens, and enterprises. Their tasks of monitoring, analyzing, and communicating threats and incidents is getting more complex due to the increasing amount of information disseminated into public channels. By adopting the perspectives of Computer-Supported Cooperative Work (CSCW) and Crisis Informatics, we contribute to the study of organizational structures, technology use, and the impact on collaborative practices in and between state CERTs with empirical research based on expert interviews with representatives of German state CERTs (N=15) and supplementary document analyses (N=25). We derive design and policy implications from our findings, including the need for interoperable and modular architecture, a shift towards service level agreements, cross-platform monitoring and analysis of incident data, use of deduplication techniques and standardized threat exchange formats, a reduction of resource costs through process automation, and transparent reporting and tool structures for information exchange.},
number = {CSCW2},
journal = {Proceedings of the ACM: Human Computer Interaction (PACM): Computer-Supported Cooperative Work and Social Computing},
author = {Riebe, Thea and Kaufhold, Marc-André and Reuter, Christian},
year = {2021},
keywords = {Crisis, UsableSec, Security, A-Paper, Ranking-CORE-A, Projekt-KontiKat, Projekt-ATHENE-SecUrban, Projekt-CYWARN, AuswahlUsableSec, AuswahlKaufhold},
}
[BibTeX] [Abstract] [Download PDF]
Since 2015, an increased number of asylum seekers is coming to Europe. These migration movements increasingly rely on digital infrastructure, such as mobile internet access and online services, in order to reach their targeted destination countries. Asylum seekers often use smartphones for information and communication purposes. Even though there are many positive aspects in the use of such technologies, researchers have to consider the perceived risks of this specific user group. This work aims at investigating the use of mobile information technologies by asylum seekers during their flight, especially taking privacy into account. Thus, it examines asylum seekers’ digital privacy perceptions and identifies privacy protection behaviors by conducting a qualitative interview study with 14 asylum seekers who applied for asylum in Germany. The results show that asylum seekers are often aware of the various risks deriving from the use of smartphones and ICT, such as surveillance and persecution by state or non-state actors as well as extortion by criminals. Based on this, this work furthermore outlines different strategies used to manage these risks. Since the lack of privacy and trust leads to avoidance behavior, the insights of this study provide valuable information for the design of assistance apps and collaboration platforms, which appropriately address the specific needs for digital privacy in the context of flight, or for the conception of privacy-enhancing technologies helping to achieve this.
@article{steinbrink_digital_2021,
title = {Digital {Privacy} {Perceptions} of {Asylum} {Seekers} in {Germany} - {An} {Empirical} {Study} about {Smartphone} {Usage} during the {Flight}},
volume = {5},
url = {https://www.peasec.de/paper/2021/2021_SteinbrinkReichertMendeReuter_DigitalPrivacyPerceptionAsylumSeekers_CSCW.pdf},
doi = {10.1145/3479526},
abstract = {Since 2015, an increased number of asylum seekers is coming to Europe. These migration movements increasingly rely on digital infrastructure, such as mobile internet access and online services, in order to reach their targeted destination countries. Asylum seekers often use smartphones for information and communication purposes. Even though there are many positive aspects in the use of such technologies, researchers have to consider the perceived risks of this specific user group. This work aims at investigating the use of mobile information technologies by asylum seekers during their flight, especially taking privacy into account. Thus, it examines asylum seekers’ digital privacy perceptions and identifies privacy protection behaviors by conducting a qualitative interview study with 14 asylum seekers who applied for asylum in Germany. The results show that asylum seekers are often aware of the various risks deriving from the use of smartphones and ICT, such as surveillance and persecution by state or non-state actors as well as extortion by criminals. Based on this, this work furthermore outlines different strategies used to manage these risks. Since the lack of privacy and trust leads to avoidance behavior, the insights of this study provide valuable information for the design of assistance apps and collaboration platforms, which appropriately address the specific needs for digital privacy in the context of flight, or for the conception of privacy-enhancing technologies helping to achieve this.},
number = {CSCW2},
journal = {Proceedings of the ACM: Human Computer Interaction (PACM): Computer-Supported Cooperative Work and Social Computing},
author = {Steinbrink, Enno and Reichert, Lilian and Mende, Michelle and Reuter, Christian},
year = {2021},
keywords = {Student, UsableSec, Security, A-Paper, Ranking-ImpactFactor, Ranking-CORE-A, Projekt-ATHENE-FANCY, AuswahlUsableSec, Projekt-GRKPrivacy},
}
2020
[BibTeX] [Download PDF]
@article{imperatori_verschlusselungspolitik_2020,
title = {Verschlüsselungspolitik der {USA}: {Vom} {Clipper}-{Chip} zu {Edward} {Snowden}},
volume = {37},
url = {https://tuprints.ulb.tu-darmstadt.de/20060/1/fk-1-20-p77.pdf},
journal = {FIfF-Kommunikation},
author = {Imperatori, Philipp and Riebe, Thea and Reuter, Christian},
year = {2020},
keywords = {Student, Security, Peace, Projekt-DualUse, Projekt-CROSSING},
pages = {77--80},
}
[BibTeX] [Abstract] [Download PDF]
The research field of crisis informatics examines, amongst others, the potentials and barriers of social media use during disasters and emergencies. Social media allow emergency services to receive valuable information (e.g., eyewitness reports, pictures, or videos) from social media. However, the vast amount of data generated during large-scale incidents can lead to issue of information overload. Research indicates that supervised machine learning techniques are sui- table for identifying relevant messages and filter out irrelevant messages, thus mitigating in- formation overload. Still, they require a considerable amount of labeled data, clear criteria for relevance classification, a usable interface to facilitate the labeling process and a mechanism to rapidly deploy retrained classifiers. To overcome these issues, we present (1) a system for social media monitoring, analysis and relevance classification, (2) abstract and precise criteria for re- levance classification in social media during disasters and emergencies, (3) the evaluation of a well-performing Random Forest algorithm for relevance classification incorporating metadata from social media into a batch learning approach (e.g., 91.28\%/89.19\% accuracy, 98.3\%/89.6\% precision and 80.4\%/87.5\% recall with a fast training time with feature subset selection on the European floods/BASF SE incident datasets), as well as (4) an approach and preliminary eva- luation for relevance classification including active, incremental and online learning to reduce the amount of required labeled data and to correct misclassifications of the algorithm by feed- back classification. Using the latter approach, we achieved a well-performing classifier based on the European floods dataset by only requiring a quarter of labeled data compared to the tradi- tional batch learning approach. Despite a lesser effect on the BASF SE incident dataset, still a substantial improvement could be determined.
@article{kaufhold_rapid_2020,
title = {Rapid relevance classification of social media posts in disasters and emergencies: {A} system and evaluation featuring active, incremental and online learning},
volume = {57},
url = {https://peasec.de/paper/2020/2020_KaufholdBayerReuter_RapidRelevanceClassification_IPM.pdf},
abstract = {The research field of crisis informatics examines, amongst others, the potentials and barriers of social media use during disasters and emergencies. Social media allow emergency services to receive valuable information (e.g., eyewitness reports, pictures, or videos) from social media. However, the vast amount of data generated during large-scale incidents can lead to issue of information overload. Research indicates that supervised machine learning techniques are sui- table for identifying relevant messages and filter out irrelevant messages, thus mitigating in- formation overload. Still, they require a considerable amount of labeled data, clear criteria for relevance classification, a usable interface to facilitate the labeling process and a mechanism to rapidly deploy retrained classifiers. To overcome these issues, we present (1) a system for social media monitoring, analysis and relevance classification, (2) abstract and precise criteria for re- levance classification in social media during disasters and emergencies, (3) the evaluation of a well-performing Random Forest algorithm for relevance classification incorporating metadata from social media into a batch learning approach (e.g., 91.28\%/89.19\% accuracy, 98.3\%/89.6\% precision and 80.4\%/87.5\% recall with a fast training time with feature subset selection on the European floods/BASF SE incident datasets), as well as (4) an approach and preliminary eva- luation for relevance classification including active, incremental and online learning to reduce the amount of required labeled data and to correct misclassifications of the algorithm by feed- back classification. Using the latter approach, we achieved a well-performing classifier based on the European floods dataset by only requiring a quarter of labeled data compared to the tradi- tional batch learning approach. Despite a lesser effect on the BASF SE incident dataset, still a substantial improvement could be determined.},
number = {1},
journal = {Information Processing \& Management (IPM)},
author = {Kaufhold, Marc-André and Bayer, Markus and Reuter, Christian},
year = {2020},
keywords = {Crisis, SocialMedia, A-Paper, Ranking-ImpactFactor, Ranking-CORE-A, Ranking-WKWI-B, Projekt-ATHENE-SecUrban, Projekt-emergenCITY, AuswahlKaufhold},
pages = {1--32},
}
[BibTeX] [Abstract] [Download PDF]
The research field of crisis informatics examines, amongst others, the potentials and barriers of social media use during conflicts and crises. Social media allow emergency services to reach the public easily in the context of crisis communication and receive valuable information (e.g. pictures) from social media data. However, the vast amount of data generated during large-scale incidents can lead to issues of information overload and quality. To mitigate these issues, this paper proposes the semi-automatic creation of alerts including keyword, relevance and information quality filters based on cross-platform social media data. We conducted empirical studies and workshops with emergency services across Europe to raise requirements, then iteratively designed and implemented an approach to support emergency services, and performed multiple evaluations, including live demonstrations and field trials, to research the potentials of social media-based alerts. Finally, we present the findings and implications based on semi-structured interviews with emergency services, highlighting the need for usable configurability and white-box algorithm representation.
@article{kaufhold_mitigating_2020,
title = {Mitigating {Information} {Overload} in {Social} {Media} during {Conflicts} and {Crises}: {Design} and {Evaluation} of a {Cross}-{Platform} {Alerting} {System}},
volume = {39},
url = {https://www.tandfonline.com/doi/full/10.1080/0144929X.2019.1620334},
doi = {10.1080/0144929X.2019.1620334},
abstract = {The research field of crisis informatics examines, amongst others, the potentials and barriers of social media use during conflicts and crises. Social media allow emergency services to reach the public easily in the context of crisis communication and receive valuable information (e.g. pictures) from social media data. However, the vast amount of data generated during large-scale incidents can lead to issues of information overload and quality. To mitigate these issues, this paper proposes the semi-automatic creation of alerts including keyword, relevance and information quality filters based on cross-platform social media data. We conducted empirical studies and workshops with emergency services across Europe to raise requirements, then iteratively designed and implemented an approach to support emergency services, and performed multiple evaluations, including live demonstrations and field trials, to research the potentials of social media-based alerts. Finally, we present the findings and implications based on semi-structured interviews with emergency services, highlighting the need for usable configurability and white-box algorithm representation.},
number = {3},
journal = {Behaviour \& Information Technology (BIT)},
author = {Kaufhold, Marc-André and Rupp, Nicola and Reuter, Christian and Habdank, Matthias},
year = {2020},
keywords = {AuswahlCrisis, Crisis, HCI, Selected, SocialMedia, Security, A-Paper, Ranking-ImpactFactor, Ranking-CORE-A, Projekt-KontiKat, Projekt-ATHENE-FANCY, AuswahlKaufhold},
pages = {319--342},
}
[BibTeX] [Abstract] [Download PDF]
Since the emergence of so-called fake news on the internet and in social media, platforms such as Facebook have started to take countermeasures, and researchers have begun looking into this phenomenon from a variety of perspectives. A large number of scientific work has investigated ways to detect fake news automatically. Less attention has been paid to the subsequent step, i.e., what to do when you are aware of the inaccuracy of claims in social media. This work takes a user-centered approach on means to counter identified mis- and disinformation in social media. We conduct a three-step study design on how approaches in social media should be presented to respect the users‘ needs and experiences and how effective they are. As our first step, in an online survey representative for some factors to the German adult population, we enquire regarding their strategies on handling information in social media, and their opinion regarding possible solutions — focusing on the approach of displaying a warning on inaccurate posts. In a second step, we present five potential approaches for countermeasures identified in related work to interviewees for qualitative input. We discuss (1) warning, (2) related articles, (3) reducing the size, (4) covering, and (5) requiring confirmation. Based on the interview feedback, as the third step of this study, we select, improve, and examine four promising approaches on how to counter misinformation. We conduct an online experiment to test their effectiveness on the perceived accuracy of false headlines and also ask for the users‘ preferences. In this study, we find that users welcome warning-based approaches to counter fake news and are somewhat critical with less transparent methods. Moreover, users want social media platforms to explain why a post was marked as disputed. The results regarding effectiveness are similar: Warning-based approaches are shown to be effective in reducing the perceived accuracy of false headlines. Moreover, adding an explanation to the warning leads to the most significant results. In contrast, we could not find a significant effect on one of Facebook’s current approaches (reduced post size and fact-checks in related articles).
@article{kirchner_countering_2020,
title = {Countering {Fake} {News}: {A} {Comparison} of {Possible} {Solutions} {Regarding} {User} {Acceptance} and {Effectiveness}},
volume = {4},
url = {https://dl.acm.org/doi/10.1145/3415211},
doi = {10.1145/3415211},
abstract = {Since the emergence of so-called fake news on the internet and in social media, platforms such as Facebook have started to take countermeasures, and researchers have begun looking into this phenomenon from a variety of perspectives. A large number of scientific work has investigated ways to detect fake news automatically. Less attention has been paid to the subsequent step, i.e., what to do when you are aware of the inaccuracy of claims in social media. This work takes a user-centered approach on means to counter identified mis- and disinformation in social media. We conduct a three-step study design on how approaches in social media should be presented to respect the users' needs and experiences and how effective they are. As our first step, in an online survey representative for some factors to the German adult population, we enquire regarding their strategies on handling information in social media, and their opinion regarding possible solutions — focusing on the approach of displaying a warning on inaccurate posts. In a second step, we present five potential approaches for countermeasures identified in related work to interviewees for qualitative input. We discuss (1) warning, (2) related articles, (3) reducing the size, (4) covering, and (5) requiring confirmation. Based on the interview feedback, as the third step of this study, we select, improve, and examine four promising approaches on how to counter misinformation. We conduct an online experiment to test their effectiveness on the perceived accuracy of false headlines and also ask for the users' preferences. In this study, we find that users welcome warning-based approaches to counter fake news and are somewhat critical with less transparent methods. Moreover, users want social media platforms to explain why a post was marked as disputed. The results regarding effectiveness are similar: Warning-based approaches are shown to be effective in reducing the perceived accuracy of false headlines. Moreover, adding an explanation to the warning leads to the most significant results. In contrast, we could not find a significant effect on one of Facebook's current approaches (reduced post size and fact-checks in related articles).},
number = {CSCW2},
journal = {Proceedings of the ACM: Human Computer Interaction (PACM): Computer-Supported Cooperative Work and Social Computing},
author = {Kirchner, Jan and Reuter, Christian},
year = {2020},
note = {Place: Austin, USA
Publisher: ACM},
keywords = {AuswahlCrisis, Cooperation, Crisis, HCI, Selected, Student, A-Paper, Ranking-ImpactFactor, Ranking-CORE-A},
pages = {140:1--140:28},
}
[BibTeX] [Abstract] [Download PDF]
Mensch-Computer-Interaktion (MCI) beschäftigt sich mit Fragen rund um die benutzer- und kontextegerechte Gestaltung von IT-Systemen. Ohne MCI ist die vielbeschworene digitale Transformation nicht möglich, da Systeme, die nicht benutzbar (gebrauchstauglich) sind, für ihre Nutzer wertlos oder sogar gefährlich sind – erst Nutzbarkeit schafft Nutzen! In diesem Beitrag sammeln wir einige Beispiele dafür, wo und wie MCI in der Entwicklung zukünftiger IT-Systeme relevant ist – von nutzerzentrierter künstlicher Intelligenz über benutzbare Sicherheit, cyberphysische Systeme und digital Arbeit hin zu Augmented Reality und Virtual Reality.
@article{koch_mensch-computer-interaktion_2020,
title = {Mensch-{Computer}-{Interaktion} als zentrales {Gebiet} der {Informatik} - {Bestandsaufnahme}, {Trends} und {Herausforderungen}},
url = {https://link.springer.com/content/pdf/10.1007/s00287-020-01299-8.pdf},
doi = {10.1007/s00287-020-01299-8},
abstract = {Mensch-Computer-Interaktion (MCI) beschäftigt sich mit Fragen rund um die benutzer- und kontextegerechte Gestaltung von IT-Systemen. Ohne MCI ist die vielbeschworene digitale Transformation nicht möglich, da Systeme, die nicht benutzbar (gebrauchstauglich) sind, für ihre Nutzer wertlos oder sogar gefährlich sind – erst Nutzbarkeit schafft Nutzen! In diesem Beitrag sammeln wir einige Beispiele dafür, wo und wie MCI in der Entwicklung zukünftiger IT-Systeme relevant ist – von nutzerzentrierter künstlicher Intelligenz über benutzbare Sicherheit, cyberphysische Systeme und digital Arbeit hin zu Augmented Reality und Virtual Reality.},
journal = {Informatik-Spektrum},
author = {Koch, Michael and Ziegler, Jürgen and Reuter, Christian and Schlegel, Thomas and Prilla, Michael},
year = {2020},
keywords = {HCI, UsableSec},
}
[BibTeX] [Abstract] [Download PDF]
Threats in cyberspace have increased in recent years due to the increment of offensive capabilities by states. Approaches to mitigate the security dilemma in cyberspace within the UN are deadlocked, as states have not been able to achieve agreements. However, from the perspective of IT-Security, there are Cyber Threat Intelligence (CTI) platforms to share and analyze cyber threats for a collective crisis management. To investigate, whether or not CTI platforms can be used as a confidence-building measure between states and international organizations, we portray current CTI platforms, showcase political requirements, and answer the question of how CTI communication may contribute to confidence-building in international affairs. Our results suggest the need to further develop analytical capabilities, as well as the implementation of a broad social, political, and legal environment for international CTI sharing.
@article{kuehn_sharing_2020,
title = {Sharing of {Cyber} {Threat} {Intelligence} between {States}},
volume = {38},
url = {http://www.peasec.de/paper/2020/2020_KuehnRiebeApeltJansenReuter_SharingCyberThreatIntelligence_SF.pdf},
doi = {10.5771/0175-274X-2020-1-22},
abstract = {Threats in cyberspace have increased in recent years due to the increment of offensive capabilities by states. Approaches to mitigate the security dilemma in cyberspace within the UN are deadlocked, as states have not been able to achieve agreements. However, from the perspective of IT-Security, there are Cyber Threat Intelligence (CTI) platforms to share and analyze cyber threats for a collective crisis management. To investigate, whether or not CTI platforms can be used as a confidence-building measure between states and international organizations, we portray current CTI platforms, showcase political requirements, and answer the question of how CTI communication may contribute to confidence-building in international affairs. Our results suggest the need to further develop analytical capabilities, as well as the implementation of a broad social, political, and legal environment for international CTI sharing.},
number = {1},
journal = {S+F Sicherheit und Frieden / Peace and Security},
author = {Kuehn, Philipp and Riebe, Thea and Apelt, Lynn and Jansen, Max and Reuter, Christian},
year = {2020},
keywords = {Student, Security, Peace, Projekt-DualUse, Cyberwar, Projekt-ATHENE-SecUrban, Projekt-CYWARN},
pages = {22--28},
}
[BibTeX] [Abstract] [Download PDF]
The growing importance of social media in conflicts and crises is accompanied by an ever-increasing research interest in the crisis informatics field in order to identify potential benefits and develop measures against the technology’s abuse. This special issue sets out to give an overview of current research on the use of social media in conflicts and crises. In doing so, it focuses on both good and malicious aspects of social media and includes a variety of papers of conceptual, theoretical and empirical nature. In six sections, the special issue presents an overview of the field, analytical methods, technical challenges, current advancements and the accepted papers before concluding. Specific topics range from cyber deception over information trustworthiness to mining and near-real-time processing of social media data.
@article{reuter_social_2020,
title = {Social media in conflicts and crises},
volume = {39},
issn = {0144-929X},
url = {https://peasec.de/paper/2020/2020_ReuterStieglitzImran_SocialMediainConflictsandCrises_BIT.pdf},
doi = {10.1080/0144929X.2019.1629025},
abstract = {The growing importance of social media in conflicts and crises is accompanied by an ever-increasing research interest in the crisis informatics field in order to identify potential benefits and develop measures against the technology's abuse. This special issue sets out to give an overview of current research on the use of social media in conflicts and crises. In doing so, it focuses on both good and malicious aspects of social media and includes a variety of papers of conceptual, theoretical and empirical nature. In six sections, the special issue presents an overview of the field, analytical methods, technical challenges, current advancements and the accepted papers before concluding. Specific topics range from cyber deception over information trustworthiness to mining and near-real-time processing of social media data.},
number = {1},
journal = {Behaviour \& Information Technology (BIT)},
author = {Reuter, Christian and Stieglitz, Stefan and Imran, Muhammad},
year = {2020},
keywords = {Crisis, HCI, SocialMedia, A-Paper, Ranking-ImpactFactor, Ranking-CORE-A, Peace},
pages = {241--251},
}
[BibTeX] [Abstract] [Download PDF]
Scientific discoveries and technological innovations have always exerted a great influence on peace and security. New civil and military technologies are revolutionizing warfare. Particularly striking areas are cyber warfare and the rapid development of uninhabited weapon systems. Issues of nuclear disarmament, missile defence or space armament as well as chemical and biological weapons remain urgent. The conference SCIENCE · PEACE · SECURITY ’19 aimed for an accurate understanding and fruitful discussions of today’s and tomorrow’s peace and security challenges. This includes natural science/technical as well as interdisciplinary contribu-tions, focusing on problems of international security and peace-building as well as contributions dedicated to transparency, trust-building, arms control, disarmament, and conflict management. This special issue presents selected contributions based on discussions at the conference.
@article{reuter_natural_2020,
title = {Natural {Science} and {Technical} {Peace} {Research}: {Definition}, {History} and {Current} {Work}},
volume = {38},
url = {https://peasec.de/paper/2020/2020_ReuterAltmannGoettscheHimmel_NaturalScienceTechnicalPeaceResarchDefinitionHistoryWork_SF.pdf},
doi = {10.5771/0175-274X-2020-1-1},
abstract = {Scientific discoveries and technological innovations have always exerted a great influence on peace and security. New civil and military technologies are revolutionizing warfare. Particularly striking areas are cyber warfare and the rapid development of uninhabited weapon systems. Issues of nuclear disarmament, missile defence or space armament as well as chemical and biological weapons remain urgent. The conference SCIENCE · PEACE · SECURITY '19 aimed for an accurate understanding and fruitful discussions of today's and tomorrow's peace and security challenges. This includes natural science/technical as well as interdisciplinary contribu-tions, focusing on problems of international security and peace-building as well as contributions dedicated to transparency, trust-building, arms control, disarmament, and conflict management. This special issue presents selected contributions based on discussions at the conference.},
number = {1},
journal = {S+F Sicherheit und Frieden / Peace and Security},
author = {Reuter, Christian and Altmann, Jürgen and Göttsche, Malte and Himmel, Mirko},
year = {2020},
keywords = {Security, Peace},
pages = {1--4},
}
[BibTeX] [Abstract] [Download PDF]
This compilation of different articles, which is based on the conference SCIENCE PEACE SECURITY ’19 in Darmstadt, gives good insights into current research. Furthermore, this special issue aims at enhancing the understanding of current peace and security challenges. It includes contributions from natural science, technical peace research as well as interdis-ciplinary contributions.
@article{reuter_editorial_2020,
title = {Editorial: {Interdisciplinary} {Contributions} to {Natural}-{Science}/{Technical} {Peace} {Research}},
volume = {38},
url = {https://peasec.de/paper/2020/2020_ReuterAltmannGoettscheHimmel_Editorial_NaturalScienceTechnicalPeaceResarch_SF.pdf},
doi = {10.5771/0175-274X-2020-1-I},
abstract = {This compilation of different articles, which is based on the conference SCIENCE PEACE SECURITY '19 in Darmstadt, gives good insights into current research. Furthermore, this special issue aims at enhancing the understanding of current peace and security challenges. It includes contributions from natural science, technical peace research as well as interdis-ciplinary contributions.},
number = {1},
journal = {S+F Sicherheit und Frieden / Peace and Security},
author = {Reuter, Christian and Altmann, Jürgen and Göttsche, Malte and Himmel, Mirko},
year = {2020},
keywords = {Peace},
pages = {III--IV},
}
[BibTeX] [Abstract] [Download PDF]
Finding a way to ensure an effective use of social media has become increasingly important to emergency services over the past decade. Despite all efforts to determine the utility of social media for emergency organisations, it is necessary to benefit from such institutions‘ staffs‘ opinions to establish effective use. To provide empirical evidence we present a comparison of two surveys, conducted across Europe with emergency services in 2014 and 2017 respectively, with a total of 1169 answers. The analysis shows that personal experience has an effect on how organisational usage of social media is perceived and how emergency service staff view the future use of social media. Furthermore, the use has increased. This article not only shows emergency services what their staff think about their social media usage but also discusses challenges and future directions for the design of systems that can be useful for further development of optimized organisational social media usage.
@article{reuter_emergency_2020,
title = {Emergency {Service} {Staff} and {Social} {Media} – {A} {Comparative} {Empirical} {Study} of the {Perception} by {Emergency} {Services} {Members} in {Europe} in 2014 and 2017},
volume = {46},
url = {https://peasec.de/paper/2020/2020_ReuterKaufholdSpahrSpielhoferHahne_EmergencyServiceSocialMediaAttitude20142017_IJDRR.pdf},
doi = {10.1016/j.ijdrr.2020.101516},
abstract = {Finding a way to ensure an effective use of social media has become increasingly important to emergency services over the past decade. Despite all efforts to determine the utility of social media for emergency organisations, it is necessary to benefit from such institutions' staffs' opinions to establish effective use. To provide empirical evidence we present a comparison of two surveys, conducted across Europe with emergency services in 2014 and 2017 respectively, with a total of 1169 answers. The analysis shows that personal experience has an effect on how organisational usage of social media is perceived and how emergency service staff view the future use of social media. Furthermore, the use has increased. This article not only shows emergency services what their staff think about their social media usage but also discusses challenges and future directions for the design of systems that can be useful for further development of optimized organisational social media usage.},
number = {101516},
journal = {International Journal of Disaster Risk Reduction (IJDRR)},
author = {Reuter, Christian and Kaufhold, Marc-André and Spahr, Fabian and Spielhofer, Thomas and Hahne, Anna Sophie},
year = {2020},
keywords = {Crisis, SocialMedia, Student, A-Paper, Ranking-ImpactFactor, Projekt-emergenCITY},
}
[BibTeX] [Abstract] [Download PDF]
ie besorgniserregende Aufkündigung des INF-Vertrags, der wiederholte Einsatz von Chemiewaffen in Syrien, kontroverse Diskussionen über die Einführung autonomer Waffensysteme oder zunehmende Cyber-Bedrohungen prägen das aktuelle politische Weltgeschehen. Besonders in einer Zeit, in der nukleare, biologische und chemische Abrüstung- und Rüstungskontrollmaßnahmen vor großen Herausforderungen stehen und gleichzeitig neue Technologien veränderte Anforderungen an diese Kontrollmechanismen mit sich bringen, gewinnt die naturwissenschaftlich-technische Friedensforschung enorm an Bedeutung. Sie beschäftigt sich auf der Grundlage von Erkenntnissen aus verschiedenen Naturwissenschaften und technischen Fachrichtungen (z. B. Physik, Chemie, Biologie, Informatik) mit der Rolle naturwissenschaftlicher und technischer Möglichkeiten im Kontext von Krieg und Frieden sowie Rüstung und Abrüstung. Sie unterstützt die politischen Prozesse der Kriegsprävention, der Abrüstung und der Vertrauensbildung mit Analysen der Eigenschaften und Folgen neuer Waffenarten und Technologien. Aus dieser Forschung werden Vorschläge für die Begrenzung neuer Waffenentwicklungen ebenso entwickelt wie technische Lösungen für eine verbesserte Rüstungskontrolle. Dieser Artikel benennt aktuelle Herausforderungen der naturwissenschaftlich-technischen Friedensforschung und geht dabei auch auf die aktuellen Empfehlungen des Wissenschaftsrats zur Weiterentwicklung der Friedens- und Konfliktforschung aus dem Jahr 2019 ein.
@article{reuter_zur_2020,
title = {Zur naturwissenschaftlich-technischen {Friedens}- und {Konfliktforschung} – {Aktuelle} {Herausforderungen} und {Bewertung} der {Empfehlungen} des {Wissenschaftsrats}},
volume = {9},
url = {https://link.springer.com/content/pdf/10.1007/s42597-020-00035-z.pdf},
doi = {10.1007/s42597-020-00035-z},
abstract = {ie besorgniserregende Aufkündigung des INF-Vertrags, der wiederholte Einsatz von Chemiewaffen in Syrien, kontroverse Diskussionen über die Einführung autonomer Waffensysteme oder zunehmende Cyber-Bedrohungen prägen das aktuelle politische Weltgeschehen. Besonders in einer Zeit, in der nukleare, biologische und chemische Abrüstung- und Rüstungskontrollmaßnahmen vor großen Herausforderungen stehen und gleichzeitig neue Technologien veränderte Anforderungen an diese Kontrollmechanismen mit sich bringen, gewinnt die naturwissenschaftlich-technische Friedensforschung enorm an Bedeutung. Sie beschäftigt sich auf der Grundlage von Erkenntnissen aus verschiedenen Naturwissenschaften und technischen Fachrichtungen (z. B. Physik, Chemie, Biologie, Informatik) mit der Rolle naturwissenschaftlicher und technischer Möglichkeiten im Kontext von Krieg und Frieden sowie Rüstung und Abrüstung. Sie unterstützt die politischen Prozesse der Kriegsprävention, der Abrüstung und der Vertrauensbildung mit Analysen der Eigenschaften und Folgen neuer Waffenarten und Technologien. Aus dieser Forschung werden Vorschläge für die Begrenzung neuer Waffenentwicklungen ebenso entwickelt wie technische Lösungen für eine verbesserte Rüstungskontrolle. Dieser Artikel benennt aktuelle Herausforderungen der naturwissenschaftlich-technischen Friedensforschung und geht dabei auch auf die aktuellen Empfehlungen des Wissenschaftsrats zur Weiterentwicklung der Friedens- und Konfliktforschung aus dem Jahr 2019 ein.},
number = {1},
journal = {Zeitschrift für Friedens- und Konfliktforschung (ZeFKo)},
author = {Reuter, Christian and Altmann, Jürgen and Göttsche, Malte and Himmel, Mirko},
year = {2020},
keywords = {Security, Peace, Projekt-CROSSING, Cyberwar, Projekt-ATHENE-SecUrban},
pages = {143--154},
}
[BibTeX] [Abstract] [Download PDF]
Advances in science and technology, including information technology (IT), play a crucial role in the context of peace and security. However, research on the intersection of peace and conflict research as well as computer science is not well established yet. This article highlights the need for further work in the area of research “IT peace research”, which includes both empirical research on the role of IT in peace and security, as well as technical research to design technologies and applications. Based on the elaboration of the disciplines, central challenges, such as insecurity, actors, attribution and laws, are outlined.
@article{reuter_towards_2020-1,
title = {Towards {IT} {Peace} {Research}: {Challenges} at the {Intersection} of {Peace} and {Conflict} {Research} and {Computer} {Science}},
volume = {38},
url = {https://www.nomos-elibrary.de/10.5771/0175-274X-2020-1-10.pdf},
doi = {10.5771/0175-274X-2020-1-10},
abstract = {Advances in science and technology, including information technology (IT), play a crucial role in the context of peace and security. However, research on the intersection of peace and conflict research as well as computer science is not well established yet. This article highlights the need for further work in the area of research “IT peace research”, which includes both empirical research on the role of IT in peace and security, as well as technical research to design technologies and applications. Based on the elaboration of the disciplines, central challenges, such as insecurity, actors, attribution and laws, are outlined.},
number = {1},
journal = {S+F Sicherheit und Frieden / Peace and Security},
author = {Reuter, Christian},
year = {2020},
keywords = {Security, Peace, Projekt-DualUse, AuswahlPeace, Cyberwar, Projekt-ATHENE-SecUrban},
pages = {10--16},
}
[BibTeX] [Abstract] [Download PDF]
Die Diskussion um die Vorratsdatenspeicherung ist europaweit weiterhin relevant, da es keine einheitliche Gesetzgebung der EU-Mitgliedsstaaten gibt. So werden in einigen EU-Staaten weiterhin Vorratsdaten gespeichert, obwohl der EuGH die Vorratsdatenspeicherung für teilweise rechtswidrig erklärt hat. Dabei unterscheiden sich die Speicherdauer, die erhobenen Daten und die Rechte der Behörden erheblich. Der Beitrag vergleicht den Umgang mit der Vorratsdatenspeicherung in zehn EU- und Schengen-Staaten im Hinblick auf Einführung und Aussetzung, Speicherdauer, Speicherinhalte und Zugriffsrechte.
@article{riebe_veranderung_2020,
title = {Die {Veränderung} der {Vorratsdatenspeicherung} in {Europa}},
volume = {44},
url = {https://www.peasec.de/paper/2020/2020_Riebeetal_VDSinEuropa_DuD.pdf},
doi = {10.1007/s11623-020-1275-3},
abstract = {Die Diskussion um die Vorratsdatenspeicherung ist europaweit weiterhin relevant, da es keine einheitliche Gesetzgebung der EU-Mitgliedsstaaten gibt. So werden in einigen EU-Staaten weiterhin Vorratsdaten gespeichert, obwohl der EuGH die Vorratsdatenspeicherung für teilweise rechtswidrig erklärt hat. Dabei unterscheiden sich die Speicherdauer, die erhobenen Daten und die Rechte der Behörden erheblich. Der Beitrag vergleicht den Umgang mit der Vorratsdatenspeicherung in zehn EU- und Schengen-Staaten im Hinblick auf Einführung und Aussetzung, Speicherdauer, Speicherinhalte und Zugriffsrechte.},
number = {5},
journal = {Datenschutz und Datensicherheit - DuD},
author = {Riebe, Thea and Haunschild, Jasmin and Divo, Felix and Lang, Matthias and Roitburd, Gerbert and Franken, Jonas and Reuter, Christian},
year = {2020},
keywords = {Student, Security, Projekt-KontiKat, Peace, Projekt-DualUse, Projekt-ATHENE-SecUrban},
pages = {316--321},
}
[BibTeX] [Abstract] [Download PDF]
The debate on the development and deployment of lethal autonomous weapon systems (LAWS) as an emerging technology is of increasing importance, with discussions stalling and technological development progressing. Monitoring the progress of increasingly autonomous weapons systems in civilian and military use as well as regulating possible autonomous systems early on is demanded by civil society actors, like the Campaign to Stop Killer Robots and the International Committee of the Red Cross (ICRC), while nation states follow a variety of interests and strategies, showing little room for consensus on central terms and questions [2], [3]. This article therefore sheds light on the work of the Group of Governmental Experts (GGE) of the UN Convention of Certain Conventional Weapons (CCW). The CCW, offering an arena for international cooperation, has dedicated itself to the purpose of finding common ground with respect to an understanding of LAWS, as well as to the necessary degree of human control. From an ethical perspective, the concept of Meaningful Human Control (MHC) supports a human-centric approach. Several IEEE projects, series and publications are dedicated to this prioritization, especially regarding civilian use. As autonomous technology is increasingly at the center of contemporary military innovations, questions of (human) agency and responsibility in warfare have become even more pressing. As stressed by the United Nations Institute for Disarmament Research (UNIDIR), the concept of MHC may prove useful in the context of development and use of (semi-) autonomous weaponry.
@article{riebe_meaningful_2020,
title = {Meaningful {Human} {Control} of {Lethal} {Autonomous} {Weapon} {Systems}: {The} {CCW}-{Debate} and its {Implications} for {Value}-{Sensitive} {Design}},
volume = {39},
url = {https://peasec.de/paper/2020/2020_RiebeSchmidReuter_MHC_IEEETechScieMag.pdf},
doi = {10.1109/MTS.2020.3031846},
abstract = {The debate on the development and deployment of lethal autonomous weapon systems (LAWS) as an emerging technology is of increasing importance, with discussions stalling and technological development progressing. Monitoring the progress of increasingly autonomous weapons systems in civilian and military use as well as regulating possible autonomous systems early on is demanded by civil society actors, like the Campaign to Stop Killer Robots and the International Committee of the Red Cross (ICRC), while nation states follow a variety of interests and strategies, showing little room for consensus on central terms and questions [2], [3]. This article therefore sheds light on the work of the Group of Governmental Experts (GGE) of the UN Convention of Certain Conventional Weapons (CCW). The CCW, offering an arena for international cooperation, has dedicated itself to the purpose of finding common ground with respect to an understanding of LAWS, as well as to the necessary degree of human control. From an ethical perspective, the concept of Meaningful Human Control (MHC) supports a human-centric approach. Several IEEE projects, series and publications are dedicated to this prioritization, especially regarding civilian use. As autonomous technology is increasingly at the center of contemporary military innovations, questions of (human) agency and responsibility in warfare have become even more pressing. As stressed by the United Nations Institute for Disarmament Research (UNIDIR), the concept of MHC may prove useful in the context of development and use of (semi-) autonomous weaponry.},
number = {4},
journal = {IEEE Technology and Society Magazine},
author = {Riebe, Thea and Schmid, Stefka and Reuter, Christian},
year = {2020},
keywords = {A-Paper, Ranking-ImpactFactor, Projekt-KontiKat, Peace, Projekt-DualUse, AuswahlPeace, Cyberwar},
pages = {36--51},
}
[BibTeX] [Abstract] [Download PDF]
Social media and public cloud computing (SM&PC) have emerged as important resources of small and medium enterprises (SMEs), but not all SMEs use SM&PC. The existing research predominantly focuses on the role of either the features of social media and cloud computing in relation to the perceptions of decision makers or the internal capabilities of organization concerning new innovation adoption. By integrating multidisciplinary literature, we, instead, argues that both the perception- and capability-related factors could play an important role in the adoption of new ICT technology, such as SM&PC. Therefore, we empirically investigated the decision maker’s perception-related and SME’s capability-related factors that may influence the adoption of SM&PC in SMEs in Germany. We used quantitative research methods to examine the proposed hypotheses on a sample of 2,404 SMEs from 17 industrial sectors. The results demonstrate that the decisions of German SMEs to engage in social media and cloud computing are not only influenced by the perceptions of SME owners about the usefulness, security aspects, and the implementation costs of SM&PC, but also by the internal capabilities of an SME, namely the innovativeness of an SME. The results and potential contributions of our research are discussed.
@article{s_hassan_perception_2020,
title = {Perception or capability? – {An} empirical investigation of the factors influencing the adoption of social media and public cloud in {German} {SMEs}},
volume = {2150002},
url = {https://peasec.de/paper/2020/2020_HassanReuterBzhalava_AdoptionSocialMediaSME_IJIM.pdf},
doi = {10.1142/S136391962150002X},
abstract = {Social media and public cloud computing (SM\&PC) have emerged as important resources of small and medium enterprises (SMEs), but not all SMEs use SM\&PC. The existing research predominantly focuses on the role of either the features of social media and cloud computing in relation to the perceptions of decision makers or the internal capabilities of organization concerning new innovation adoption. By integrating multidisciplinary literature, we, instead, argues that both the perception- and capability-related factors could play an important role in the adoption of new ICT technology, such as SM\&PC. Therefore, we empirically investigated the decision maker's perception-related and SME's capability-related factors that may influence the adoption of SM\&PC in SMEs in Germany. We used quantitative research methods to examine the proposed hypotheses on a sample of 2,404 SMEs from 17 industrial sectors. The results demonstrate that the decisions of German SMEs to engage in social media and cloud computing are not only influenced by the perceptions of SME owners about the usefulness, security aspects, and the implementation costs of SM\&PC, but also by the internal capabilities of an SME, namely the innovativeness of an SME. The results and potential contributions of our research are discussed.},
journal = {International Journal of Innovation Management},
author = {S. Hassan, Sohaib and Reuter, Christian and Bzhalava, Levan},
year = {2020},
keywords = {HCI, SocialMedia, UsableSec, Ranking-VHB-B, Projekt-KontiKat, Projekt-HyServ},
pages = {1--26},
}
[BibTeX] [Abstract] [Download PDF]
Die Debatte um die Integration von autonomen Systemen in Streitkräfte wird oftmals auf einer (militär-)strategischen Ebene geführt. Die technisch-operativen Aspekte werden außerhalb des Fachpublikums häufig nur am Rande erwähnt. Der Beitrag analysiert die Integration von U(C)AVs in den operativen Flugzeugträgerbetrieb am Beispiel der X‑47B. Die Studie zeigt, dass es keine fundamentalen Probleme bei der Integration gibt, U(C)AVs in einem Fünf-Jahres-Horizont zur neuen maritimen Realität gehören und die Gefahr eines Rüstungswettlaufs in Bezug auf autonome Waffensysteme steigen wird.
@article{schwartz_90000_2020,
title = {90.000 {Tonnen} {Diplomatie} 2.0: {Die} {Integration} von unbemannten {Systemen} in den operativen {Flugzeugträgerbetrieb} am {Beispiel} der {X}-{47B}},
volume = {13},
url = {https://link.springer.com/content/pdf/10.1007/s12399-020-00803-y.pdf},
doi = {10.1007/s12399-020-00803-y},
abstract = {Die Debatte um die Integration von autonomen Systemen in Streitkräfte wird oftmals auf einer (militär-)strategischen Ebene geführt. Die technisch-operativen Aspekte werden außerhalb des Fachpublikums häufig nur am Rande erwähnt. Der Beitrag analysiert die Integration von U(C)AVs in den operativen Flugzeugträgerbetrieb am Beispiel der X‑47B. Die Studie zeigt, dass es keine fundamentalen Probleme bei der Integration gibt, U(C)AVs in einem Fünf-Jahres-Horizont zur neuen maritimen Realität gehören und die Gefahr eines Rüstungswettlaufs in Bezug auf autonome Waffensysteme steigen wird.},
number = {1},
journal = {Zeitschrift für Außen- und Sicherheitspolitik (ZfAS)},
author = {Schwartz, Sebastian and Reuter, Christian},
year = {2020},
keywords = {Peace, Projekt-DualUse},
}
[BibTeX] [Abstract] [Download PDF]
Due to the increase in natural disasters in the past years, Disaster Response Organizations (DROs) are faced with the challenge of coping with more and larger operations. Currently appointed Information and Communications Technology (ICT) used for coordination and communication is sometimes outdated and does not scale, while novel technologies have the potential to greatly improve disaster response efficiency. To allow adoption of these novel technologies, ICT system designers have to take into account the particular needs of DROs and characteristics of International Disaster Response (IDR). This work attempts to bring the humanitarian and ICT communities closer together. In this work, we analyze IDR-related documents and conduct expert interviews. Using open coding, we extract empirical insights and translate the peculiarities of DRO coordination and operation into tangible ICT design requirements. This information is based on interviews with active IDR staff as well as DRO guidelines and reports. Ultimately, the goal of this paper is to serve as a reference for future ICT research endeavors to support and increase the efficiency of IDR operations.
@article{stute_empirical_2020,
title = {Empirical {Insights} for {Designing} {Information} and {Communication} {Technology} for {International} {Disaster} {Response}},
volume = {47},
url = {https://www.sciencedirect.com/science/article/pii/S2212420919309501},
doi = {10.1016/j.ijdrr.2020.101598},
abstract = {Due to the increase in natural disasters in the past years, Disaster Response Organizations (DROs) are faced with the challenge of coping with more and larger operations. Currently appointed Information and Communications Technology (ICT) used for coordination and communication is sometimes outdated and does not scale, while novel technologies have the potential to greatly improve disaster response efficiency. To allow adoption of these novel technologies, ICT system designers have to take into account the particular needs of DROs and characteristics of International Disaster Response (IDR). This work attempts to bring the humanitarian and ICT communities closer together. In this work, we analyze IDR-related documents and conduct expert interviews. Using open coding, we extract empirical insights and translate the peculiarities of DRO coordination and operation into tangible ICT design requirements. This information is based on interviews with active IDR staff as well as DRO guidelines and reports. Ultimately, the goal of this paper is to serve as a reference for future ICT research endeavors to support and increase the efficiency of IDR operations.},
number = {101598},
journal = {International Journal of Disaster Risk Reduction (IJDRR)},
author = {Stute, Milan and Maass, Max and Schons, Tom and Kaufhold, Marc-André and Reuter, Christian and Hollick, Matthias},
year = {2020},
keywords = {Crisis, Student, UsableSec, A-Paper, Ranking-ImpactFactor, Projekt-emergenCITY},
pages = {1--10},
}
2019
[BibTeX] [Abstract] [Download PDF]
Social media have been established in many natural disasters or human‐induced crises and emergencies. Nowadays, authorities, such as emergency services, and citizens engage with social media in different phases of the emergency management cycle. However, as research in crisis informatics highlights, one remaining issue constitutes the chaotic use of social media by citizens during emergencies, which has the potential to increase the complexity of tasks, uncertainty, and pressure for emergency services. To counter these risks, besides implementing supportive technology, social media guidelines may help putting artefact and theoretical contributions into practical use for authorities and citizens. This paper presents the design and evaluation (with 1,024 participants) of citizens‘ guidelines for using social media before, during, and after emergencies.
@article{kaufhold_avoiding_2019,
title = {Avoiding {Chaotic} {Use} of {Social} {Media} before, during, and after {Emergencies}: {Design} and {Evaluation} of {Citizens}' {Guidelines}},
volume = {27},
url = {http://www.peasec.de/paper/2019/2019_KaufholdGizikisReuterHabdankGrinko_DesignEvaluationCitizenGuidelines_JCCM.pdf},
doi = {10.1111/1468-5973.12249},
abstract = {Social media have been established in many natural disasters or human‐induced crises and emergencies. Nowadays, authorities, such as emergency services, and citizens engage with social media in different phases of the emergency management cycle. However, as research in crisis informatics highlights, one remaining issue constitutes the chaotic use of social media by citizens during emergencies, which has the potential to increase the complexity of tasks, uncertainty, and pressure for emergency services. To counter these risks, besides implementing supportive technology, social media guidelines may help putting artefact and theoretical contributions into practical use for authorities and citizens. This paper presents the design and evaluation (with 1,024 participants) of citizens' guidelines for using social media before, during, and after emergencies.},
number = {3},
journal = {Journal of Contingencies and Crisis Management (JCCM)},
author = {Kaufhold, Marc-André and Gizikis, Alexis and Reuter, Christian and Habdank, Matthias and Grinko, Margarita},
year = {2019},
keywords = {Crisis, HCI, SocialMedia, Projekt-EmerGent, A-Paper, Ranking-ImpactFactor, Projekt-KontiKat, AuswahlKaufhold},
pages = {198--213},
}
[BibTeX] [Abstract] [Download PDF]
On-site work of emergency service teams consists of highly cooperative tasks. Especially during distributed search and rescue tasks there is a constant mix of routinized and non-routinized activities. Within this paper we focus on the work practices of the German Red Cross Rescue Dog Units who deal with several uncertainties regarding the involved dogs, the fragility of the respective situations as well as issues of using technologies under enormous time pressure. Smart glasses provide possibilities for enhanced and hands-free interaction in various contexts and a number of approaches have already been applied, aiming at efficient use of the respective technological innovation in private and professional contexts. However, the collaborative potential of smart glasses in time-critical and uncertain situations is still unexplored. Our design case study examines how the on-site work of emergency service teams can be supported by smart glasses: Based on examining the work practices of the German Red Cross Rescue Dogs, we introduce ‘RescueGlass‘ as a coordinative concept, encompassing hands-free head-mounted display (HMD) application as well as a corresponding smartphone application. Finally, we describe the evaluation of its use in the field of emergency response and management. We show how current features such as ‘fog of war‘ or various sensors support the cooperative practices of dog handlers, and outline current technical limitations offering future research questions. Our paper provides an initial design probe using smart glasses to engage in the field of collaborative professional mobile tasks.
@article{reuter_rescueglass_2019,
title = {{RescueGlass}: {Collaborative} {Applications} involving {Head}-{Mounted} {Displays} for {Red} {Cross} {Rescue} {Dog} {Units}},
volume = {28},
url = {http://www.peasec.de/paper/2019/2019_ReuterLudwigMischur_RescueGlass_JCSCW.pdf},
doi = {10.1007/s10606-018-9339-8},
abstract = {On-site work of emergency service teams consists of highly cooperative tasks. Especially during distributed search and rescue tasks there is a constant mix of routinized and non-routinized activities. Within this paper we focus on the work practices of the German Red Cross Rescue Dog Units who deal with several uncertainties regarding the involved dogs, the fragility of the respective situations as well as issues of using technologies under enormous time pressure. Smart glasses provide possibilities for enhanced and hands-free interaction in various contexts and a number of approaches have already been applied, aiming at efficient use of the respective technological innovation in private and professional contexts. However, the collaborative potential of smart glasses in time-critical and uncertain situations is still unexplored. Our design case study examines how the on-site work of emergency service teams can be supported by smart glasses: Based on examining the work practices of the German Red Cross Rescue Dogs, we introduce ‘RescueGlass' as a coordinative concept, encompassing hands-free head-mounted display (HMD) application as well as a corresponding smartphone application. Finally, we describe the evaluation of its use in the field of emergency response and management. We show how current features such as ‘fog of war' or various sensors support the cooperative practices of dog handlers, and outline current technical limitations offering future research questions. Our paper provides an initial design probe using smart glasses to engage in the field of collaborative professional mobile tasks.},
number = {1-2},
journal = {Computer Supported Cooperative Work: The Journal of Collaborative Computing (JCSCW)},
author = {Reuter, Christian and Ludwig, Thomas and Mischur, Patrick},
year = {2019},
keywords = {Cooperation, Crisis, HCI, UsableSec, Security, A-Paper, Ranking-ImpactFactor, Ranking-VHB-B, Projekt-KontiKat, Projekt-KOKOS, Ranking-CORE-B, Infrastructure},
pages = {209--246},
}
[BibTeX] [Abstract] [Download PDF]
Usage of social media during emergencies and respective perceptions vary across countries. Our representative survey of 7,071 citizens in Europe (Germany, Italy, the Netherlands and the United Kingdom) shows differences of current use of social media in emergencies, expectations towards authorities monitoring social media, intensity of perceiving barriers regarding the use as well as variances concerning the (likelihood of future) use of mobile apps. While German and British participants‘ frequency of use of social media is medium and low, respectively, Italian and Dutch respondents use them relatively frequently. Our comparison of the four countries allows for an interpretation of divergent behavior across countries with respect to risk cultures as well as expanding the respective model to social media contexts. At the same time, our findings stress that across the four European countries participants assessed similar advantages like dissemination of information and barriers like false rumors with respect to use social media during emergencies. Distributed equally across nations, age and gender showed significant relationships with social media usage which, among other findings, suggests being helpful for effective implementation of management structures using new technologies.
@article{reuter_impact_2019,
title = {The {Impact} of {Risk} {Cultures}: {Citizens}' {Perception} of {Social} {Media} {Use} in {Emergencies} across {Europe}},
volume = {148},
url = {http://www.peasec.de/paper/2019/2019_ReuterKaufholdSchmidSpielhoferHahne_TheImpactofRiskCultures_TFSC.pdf},
doi = {10.1016/j.techfore.2019.119724},
abstract = {Usage of social media during emergencies and respective perceptions vary across countries. Our representative survey of 7,071 citizens in Europe (Germany, Italy, the Netherlands and the United Kingdom) shows differences of current use of social media in emergencies, expectations towards authorities monitoring social media, intensity of perceiving barriers regarding the use as well as variances concerning the (likelihood of future) use of mobile apps. While German and British participants' frequency of use of social media is medium and low, respectively, Italian and Dutch respondents use them relatively frequently. Our comparison of the four countries allows for an interpretation of divergent behavior across countries with respect to risk cultures as well as expanding the respective model to social media contexts. At the same time, our findings stress that across the four European countries participants assessed similar advantages like dissemination of information and barriers like false rumors with respect to use social media during emergencies. Distributed equally across nations, age and gender showed significant relationships with social media usage which, among other findings, suggests being helpful for effective implementation of management structures using new technologies.},
number = {119724},
journal = {Technological Forecasting and Social Change (TFSC)},
author = {Reuter, Christian and Kaufhold, Marc-André and Schmid, Stefka and Spielhofer, Thomas and Hahne, Anna Sophie},
year = {2019},
keywords = {AuswahlCrisis, Crisis, HCI, Selected, SocialMedia, Projekt-EmerGent, A-Paper, Ranking-ImpactFactor, Ranking-VHB-B},
pages = {1--17},
}
[BibTeX] [Abstract] [Download PDF]
In this paper, we explore a specialized type of knowledge, „nomadic knowledge“ to understand its implications in knowledge sharing process. Nomadic knowledge is enacted in a discontinuous pattern with a changing set of actors and further flows on a definedtrajectory. This knowledge is quite important but is required sporadically, so it has a varying level of importance for stakeholders at different instances of time. The limited interest of knowledge holders after the creation of knowledge makes the knowledge sharing processcomplex. Furthermore, new sets of actors overloaded with tasks often ignore the knowledge sharing aspect due to the urgency of tasks at hand. Using a long-term field study we describe a particular practice that is not well supported technologically. The objective of this paper is to outline the concept of nomadic knowledge and associated implications, so that respective practices can be supported by the knowledge management community with appropriate technology.
@article{saeed_nomadic_2019,
title = {Nomadic {Knowledge} {Sharing} {Practices} and {Challenges}: {Findings} from a {Long}-term {Case} {Study}},
volume = {7},
url = {https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=8715497},
doi = {10.1109/ACCESS.2019.2916903},
abstract = {In this paper, we explore a specialized type of knowledge, "nomadic knowledge" to understand its implications in knowledge sharing process. Nomadic knowledge is enacted in a discontinuous pattern with a changing set of actors and further flows on a definedtrajectory. This knowledge is quite important but is required sporadically, so it has a varying level of importance for stakeholders at different instances of time. The limited interest of knowledge holders after the creation of knowledge makes the knowledge sharing processcomplex. Furthermore, new sets of actors overloaded with tasks often ignore the knowledge sharing aspect due to the urgency of tasks at hand. Using a long-term field study we describe a particular practice that is not well supported technologically. The objective of this paper is to outline the concept of nomadic knowledge and associated implications, so that respective practices can be supported by the knowledge management community with appropriate technology.},
number = {1},
journal = {IEEE Access},
author = {Saeed, Saqib and Pipek, Volkmar and Rohde, Markus and Reuter, Christian and Pinatti De Carvalho, Aparecido Fabiano and Wulf, Volker},
year = {2019},
keywords = {Cooperation, HCI, A-Paper, Ranking-ImpactFactor, Ranking-CORE-B},
pages = {63564--63577},
}
2018
[BibTeX] [Abstract] [Download PDF]
Small and medium-sized enterprises (SMEs) represent 99\% of enterprises in Germany and more than 95\% in the European Union. Given the recent increase of natural disasters and man-made crises and emergencies, it seems an important economic goal to ascertain that SMEs are capable of maintaining their work, revenue and profit at an acceptable level. According to ISO 22301, business continuity management (BCM) is a holistic management process which identifies potential threats and their impact to an organization and serves as a framework to increase organizational resilience and response capabilities. Prior research identified that BCM is under-represented in SMEs and that their security level is partially in an uneconomical range. This article presents the analysis of interviews with 19 independent micro enterprises highlighting findings on their low crisis awareness, varying technical dependency, existing action strategies and communication strategies and proposing a categorization of micro enterprises as preventive technicians, data-intensive chains or pragmatic jumpers.
@article{kaufhold_business_2018,
title = {Business {Continuity} {Management} in {Micro} {Enterprises}: {Perception}, {Strategies} and {Use} of {ICT}},
volume = {10},
url = {http://www.peasec.de/paper/2018/2018_KaufholdRiebeReuteretal_BusinessContinuityManagementinMicroEnterprises_IJISCRAM.pdf},
doi = {10.4018/IJISCRAM.2018010101},
abstract = {Small and medium-sized enterprises (SMEs) represent 99\% of enterprises in Germany and more than 95\% in the European Union. Given the recent increase of natural disasters and man-made crises and emergencies, it seems an important economic goal to ascertain that SMEs are capable of maintaining their work, revenue and profit at an acceptable level. According to ISO 22301, business continuity management (BCM) is a holistic management process which identifies potential threats and their impact to an organization and serves as a framework to increase organizational resilience and response capabilities. Prior research identified that BCM is under-represented in SMEs and that their security level is partially in an uneconomical range. This article presents the analysis of interviews with 19 independent micro enterprises highlighting findings on their low crisis awareness, varying technical dependency, existing action strategies and communication strategies and proposing a categorization of micro enterprises as preventive technicians, data-intensive chains or pragmatic jumpers.},
number = {1},
journal = {International Journal of Information Systems for Crisis Response and Management (IJISCRAM)},
author = {Kaufhold, Marc-André and Riebe, Thea and Reuter, Christian and Hester, Julian and Jeske, Danny and Knüver, Lisa and Richert, Viktoria},
year = {2018},
keywords = {Cooperation, Crisis, Student, Security, Projekt-KontiKat, Infrastructure, RSF, Projekt-MAKI},
pages = {1--19},
}
[BibTeX] [Abstract] [Download PDF]
Since the terrorist attacks of 9/11, the use of social media in emergency and crisis events has greatly increased and many studies have concentrated on the use of ICT and social media be-fore, during or after these events. The field of research that these studies fall under is called cri-sis informatics. In this paper, we evaluate and analyze crisis informatics research by looking at case studies of social media use in emergencies, outlining the types of research found in crisis informatics, and expounding upon the forms of interaction that have been researched. Finally, we summarize the achievements from an HCI perspective and outline trends and challenges for future research.
@article{reuter_social_2018,
title = {Social {Media} in {Crisis} {Management}: {An} {Evaluation} and {Analysis} of {Crisis} {Informatics} {Research}},
volume = {34},
url = {http://www.peasec.de/paper/2018/2018_ReuterHughesKaufhold_SocialMediaCrisisManagementEvaluation_IJHCI.pdf},
doi = {10.1080/10447318.2018.1427832},
abstract = {Since the terrorist attacks of 9/11, the use of social media in emergency and crisis events has greatly increased and many studies have concentrated on the use of ICT and social media be-fore, during or after these events. The field of research that these studies fall under is called cri-sis informatics. In this paper, we evaluate and analyze crisis informatics research by looking at case studies of social media use in emergencies, outlining the types of research found in crisis informatics, and expounding upon the forms of interaction that have been researched. Finally, we summarize the achievements from an HCI perspective and outline trends and challenges for future research.},
number = {4},
journal = {International Journal on Human-Computer Interaction (IJHCI)},
author = {Reuter, Christian and Hughes, Amanda Lee and Kaufhold, Marc-André},
year = {2018},
keywords = {AuswahlCrisis, Crisis, HCI, Selected, SocialMedia, A-Paper, Ranking-ImpactFactor, Ranking-WKWI-B, Projekt-KontiKat, Peace, Ranking-CORE-B},
pages = {280--294},
}
[BibTeX] [Abstract] [Download PDF]
The Internet has changed consumer behavior, having an impact on local retail. At the same time, the number of smartphone users is continuously increasing, making mobile applications more and more important. By using Bluetooth beacons – small radio transmitters which can be placed everywhere and processed by an according app – shopping can be facilitated and made more enjoyable. Even though some supermarkets, especially in the USA, are already using beacons, their use is not common and less researched in Germany. Pilot projects only refer to usage data and reaction times while customers are rarely asked for their opinion. This work analyzes potentials of usage and customer acceptance of concepts based on beacons in retail via an online consumer survey, the conception of an app as well as a subsequent qualitative evaluation. As a starting point for our concept development and app implementation, the previous online survey of 203 participants emphasizes the importance of user-friendly settings as well as costumers‘ interest in informative communica-tion. Throughout all steps of our design case study, concerns for data privacy linked with interest in transparency were apparent and included, respectively. The field experiment stresses users‘ perceptions of potentially useful functions, and highlights design-related aspects for improvement, offering useful implications for future design of shopping apps.
@article{reuter_mobile_2018,
title = {Mobile and {Interactive} {Media} in the {Store}? {Design} {Case} {Study} on {Bluetooth} {Beacon} {Concepts} for {Food} {Retail}},
volume = {1},
url = {http://www.peasec.de/paper/2018/2018_ReuterLeopold_Beacon_MediaInAction.pdf},
abstract = {The Internet has changed consumer behavior, having an impact on local retail. At the same time, the number of smartphone users is continuously increasing, making mobile applications more and more important. By using Bluetooth beacons – small radio transmitters which can be placed everywhere and processed by an according app – shopping can be facilitated and made more enjoyable. Even though some supermarkets, especially in the USA, are already using beacons, their use is not common and less researched in Germany. Pilot projects only refer to usage data and reaction times while customers are rarely asked for their opinion. This work analyzes potentials of usage and customer acceptance of concepts based on beacons in retail via an online consumer survey, the conception of an app as well as a subsequent qualitative evaluation. As a starting point for our concept development and app implementation, the previous online survey of 203 participants emphasizes the importance of user-friendly settings as well as costumers' interest in informative communica-tion. Throughout all steps of our design case study, concerns for data privacy linked with interest in transparency were apparent and included, respectively. The field experiment stresses users' perceptions of potentially useful functions, and highlights design-related aspects for improvement, offering useful implications for future design of shopping apps.},
number = {99-134},
journal = {Media in Action: An Interdisciplinary Journal on Cooperative Media},
author = {Reuter, Christian and Leopold, Inken},
year = {2018},
keywords = {HCI},
}
[BibTeX] [Abstract] [Download PDF]
Social media is gaining more and more importance in crisis management: “Social media continue to evolve, and so does their use in emergency and crisis events” (Reuter et al., 2018). Related research is sometimes called “crisis informatics” (Palen et al., 2009). This special issue was initiated based on the track “Social Media Studies” at previous ISCRAM (Information Systems for Crisis Response and Management) conferences. It is usually one of the tracks with the most submissions, however we (successfully) aimed to also invite scholars from other venues to contribute.
@article{reuter_editorial_2018,
title = {Editorial of the {Special} {Issue} on {Social} {Media} in {Crisis} {Management}},
volume = {34},
url = {http://www.peasec.de/paper/2018/2018_ReuterHughesHiltzImranPlotnik_EditorialSpecialIssueSocialMediaCrisisManagement_IJHCI.pdf},
doi = {10.1080/10447318.2018.1427833},
abstract = {Social media is gaining more and more importance in crisis management: “Social media continue to evolve, and so does their use in emergency and crisis events” (Reuter et al., 2018). Related research is sometimes called “crisis informatics” (Palen et al., 2009). This special issue was initiated based on the track “Social Media Studies” at previous ISCRAM (Information Systems for Crisis Response and Management) conferences. It is usually one of the tracks with the most submissions, however we (successfully) aimed to also invite scholars from other venues to contribute.},
number = {4},
journal = {International Journal on Human-Computer Interaction (IJHCI)},
author = {Reuter, Christian and Hughes, Amanda Lee and Hiltz, Starr Roxanne and Imran, Muhammad and Plotnick, Linda},
year = {2018},
keywords = {Crisis, HCI, SocialMedia, Ranking-ImpactFactor, Ranking-WKWI-B, Projekt-KontiKat, Ranking-CORE-B, RSF},
pages = {277--279},
}
[BibTeX] [Download PDF]
@article{reuter_guest_2018,
title = {Guest {Editorial} {Preface}: {Special} {Issue} on {IT}-{Support} for {Crisis} and {Continuity} {Management}},
volume = {10},
url = {http://www.peasec.de/paper/2018/2018_ReuterPottebaum_EditorialCrisisContinuityManagement_IJISCRAM.pdf},
number = {1},
journal = {International Journal of Information Systems for Crisis Response and Management (IJISCRAM)},
author = {Reuter, Christian and Pottebaum, Jens},
year = {2018},
keywords = {Crisis, Projekt-KontiKat, Infrastructure, RSF},
pages = {v--viii},
}
[BibTeX] [Download PDF]
@article{reuter_human-computer-interaction_2018,
title = {Human-{Computer}-{Interaction} and {Social} {Media} in {Safety}-{Critical} {Systems} – {Editorial}},
volume = {26},
url = {http://onlinelibrary.wiley.com/doi/10.1111/1468-5973.12192/abstract},
doi = {10.1111/1468-5973.12192},
number = {1},
journal = {Journal of Contingencies and Crisis Management (JCCM)},
author = {Reuter, Christian and Mentler, Tilo},
year = {2018},
keywords = {Crisis, HCI, SocialMedia, Projekt-EmerGent, Ranking-ImpactFactor, Projekt-KontiKat},
pages = {2--3},
}
[BibTeX] [Abstract] [Download PDF]
Social media has been established in many larger emergencies and crises. This process has not started just a few years ago, but already 15 years ago in 2001 after the terrorist attacks of 9/11. In the following years, especially in the last 10, sometimes summarized under the term crisis informatics, a variety of studies focusing on the use of ICT and social media before, during or after nearly every crisis and emergency has arisen. This article aims to recapitulate 15 years of social media in emergencies and its research with a special emphasis on use patterns, role patterns and perception patterns that can be found across different cases in order to point out what has been achieved so far, and what future potentials exist.
@article{reuter_fifteen_2018,
title = {Fifteen {Years} of {Social} {Media} in {Emergencies}: {A} {Retrospective} {Review} and {Future} {Directions} for {Crisis} {Informatics}},
volume = {26},
url = {http://www.peasec.de/paper/2018/2018_ReuterKaufhold_FifteenYearsSocialMediaEmergencies_JCCM.pdf},
doi = {10.1111/1468-5973.12196},
abstract = {Social media has been established in many larger emergencies and crises. This process has not started just a few years ago, but already 15 years ago in 2001 after the terrorist attacks of 9/11. In the following years, especially in the last 10, sometimes summarized under the term crisis informatics, a variety of studies focusing on the use of ICT and social media before, during or after nearly every crisis and emergency has arisen. This article aims to recapitulate 15 years of social media in emergencies and its research with a special emphasis on use patterns, role patterns and perception patterns that can be found across different cases in order to point out what has been achieved so far, and what future potentials exist.},
number = {1},
journal = {Journal of Contingencies and Crisis Management (JCCM)},
author = {Reuter, Christian and Kaufhold, Marc-André},
year = {2018},
keywords = {AuswahlCrisis, Crisis, HCI, Selected, SocialMedia, Projekt-EmerGent, A-Paper, Ranking-ImpactFactor, Peace, Projekt-KOKOS, AuswahlKaufhold},
pages = {41--57},
}
2017
[BibTeX] [Abstract] [Download PDF]
Flow-Erleben beschreibt das „reflexionsfreie, gänzliche Aufgehen in einer glatt laufenden Tätigkeit, die man trotz hoher Beanspruchung noch unter Kontrolle hat“. Dabei zeigt die bestehende Literatur vielversprechende Effekte der Flow-Theorie auf, etwa positiver Affekt, verbessertes Lernen, Mitarbeiterproduktivität und Kundenloyalität, die einen Mehrwert in der Mensch-Computer-Interaktion und der Gestaltung interaktiver Systeme darstellen. Die Betrachtung der theoretischen Grundlagen zeigt, dass Flow ein komponentenreiches Konstrukt ist, welches kontextsensitiv erforscht werden muss: Die Beschaffenheit der gegenwärtigen Aufgabe und des interaktiven Systems, sowie demografische, individuelle und situative Faktoren beeinflussen das Flow-erleben. Zur Messung des Flow-erlebens wurden eine Reihe unterschiedlicher Messmethoden entwickelt, welche die gegenwärtige Erfahrung, etwa der FQ oder die esM, oder eine vergangene Erfahrung im Nachgang, etwa komponentenbasierte Fragebogen und qualitative Methoden, erfassen. In der Gestaltung interaktiver Systeme im Sinne der MCI wird einerseits die Betrachtung pragmatischer Qualitätskriterien (Effizienz, Durchschaubarkeit, Verlässlichkeit) der Usability und hedonistischer Qualitätskriterien (Attraktivität, Neuheit, Stimulation) der User Experience angestrebt. Andererseits untersucht ein separater Forschungsstrang die Relevanz der Flow-Theorie für die MCI. Während der Einfluss theoretischer Konstrukte des Flow-erlebens bereits deutlich untersucht wurde, fehlt die systematische Verknüpfung zu konkreten Designanforderungen zur Unterstützung des Flow-erlebens in interaktiven Systemen. Damit die Potenziale der Flow-Theorie in der Gestaltung interaktiver Systeme bestmöglich berücksichtigt werden können, sind vor allem vier Herausforderungen in der Forschung und Praxis zu adressieren: 1. Definition der theoretischen Kontextfaktoren: Wie kann die Flow-Theorie in der Mensch-Computer-Interaktion ganzheitlich bestimmt werden? 2. Operationalisierung der Flow-Theorie: Wie können Bedingungen, Erleben und Auswirkungen des Flow-erlebens genau und systematisch gemessen werden? 3. Integration in die Mensch-Computer-Interaktion: In welchem exakten Zusammenhang stehen die Konzepte Flow, Usability und User Experience? 4. Ableitung praktischer Designanforderungen: Wie können praktische Anforderungen zum Design des Flow-erlebens in interaktiven Systemen abgeleitet werden? Dieser Beitrag hat dazu die theoretischen Grundlagen des Flow-erlebens, bestehende Methoden und Metriken sowie verwandte Konzepte der MCI eingeleitet und diskutiert, um einerseits die systematische Erforschung der Flow-Theorie in der MCI und andererseits die Ableitung praktischer Design-Anforderungen zu motivieren.
@article{kaufhold_integration_2017,
title = {Integration von {Flow} in die {Mensch}- {Computer}-{Interaktion}? {Potenziale} für die {Gestaltung} interaktiver {Systeme}},
volume = {7},
url = {http://www.peasec.de/paper/2017/2017_KaufholdReuter_FlowMCI_MittelstandDigital.pdf},
abstract = {Flow-Erleben beschreibt das „reflexionsfreie, gänzliche Aufgehen in einer glatt laufenden Tätigkeit, die man trotz hoher Beanspruchung noch unter Kontrolle hat“. Dabei zeigt die bestehende Literatur vielversprechende Effekte der Flow-Theorie auf, etwa positiver Affekt, verbessertes Lernen, Mitarbeiterproduktivität und Kundenloyalität, die einen Mehrwert in der Mensch-Computer-Interaktion und der Gestaltung interaktiver Systeme darstellen. Die Betrachtung der theoretischen Grundlagen zeigt, dass Flow ein komponentenreiches Konstrukt ist, welches kontextsensitiv erforscht werden muss: Die Beschaffenheit der gegenwärtigen Aufgabe und des interaktiven Systems, sowie demografische, individuelle und situative Faktoren beeinflussen das Flow-erleben. Zur Messung des Flow-erlebens wurden eine Reihe unterschiedlicher Messmethoden entwickelt, welche die gegenwärtige Erfahrung, etwa der FQ oder die esM, oder eine vergangene Erfahrung im Nachgang, etwa komponentenbasierte Fragebogen und qualitative Methoden, erfassen. In der Gestaltung interaktiver Systeme im Sinne der MCI wird einerseits die Betrachtung pragmatischer Qualitätskriterien (Effizienz, Durchschaubarkeit, Verlässlichkeit) der Usability und hedonistischer Qualitätskriterien (Attraktivität, Neuheit, Stimulation) der User Experience angestrebt. Andererseits untersucht ein separater Forschungsstrang die Relevanz der Flow-Theorie für die MCI. Während der Einfluss theoretischer Konstrukte des Flow-erlebens bereits deutlich untersucht wurde, fehlt die systematische Verknüpfung zu konkreten Designanforderungen zur Unterstützung des Flow-erlebens in interaktiven Systemen. Damit die Potenziale der Flow-Theorie in der Gestaltung interaktiver Systeme bestmöglich berücksichtigt werden können, sind vor allem vier Herausforderungen in der Forschung und Praxis zu adressieren: 1. Definition der theoretischen Kontextfaktoren: Wie kann die Flow-Theorie in der Mensch-Computer-Interaktion ganzheitlich bestimmt werden? 2. Operationalisierung der Flow-Theorie: Wie können Bedingungen, Erleben und Auswirkungen des Flow-erlebens genau und systematisch gemessen werden? 3. Integration in die Mensch-Computer-Interaktion: In welchem exakten Zusammenhang stehen die Konzepte Flow, Usability und User Experience? 4. Ableitung praktischer Designanforderungen: Wie können praktische Anforderungen zum Design des Flow-erlebens in interaktiven Systemen abgeleitet werden? Dieser Beitrag hat dazu die theoretischen Grundlagen des Flow-erlebens, bestehende Methoden und Metriken sowie verwandte Konzepte der MCI eingeleitet und diskutiert, um einerseits die systematische Erforschung der Flow-Theorie in der MCI und andererseits die Ableitung praktischer Design-Anforderungen zu motivieren.},
number = {1},
journal = {Mittelstand-Digital "Wissenschaft trifft Praxis"},
author = {Kaufhold, Marc-André and Reuter, Christian},
year = {2017},
keywords = {HCI, Projekt-KontiKat},
pages = {78--88},
}
[BibTeX] [Abstract] [Download PDF]
Abstract Although emergency services have already recognized the importance of citizen-initiated activities during disasters, still questions with regard to the coordination of spontaneous volunteers and their activities arise. Within our article, we will present a technological approach based on public displays which aims to foster situated crowdsourcing between affected citizens, spontaneous volunteers as well as official emergency services. We will address the research question: How can the situated tasks performed by spontaneous volunteers be supported by the use of public displays during disasters? First we will present the current state of the art with regard to the coordination practices of spontaneous volunteers and emergency services within disaster situations as well as related problems, potentials and specifics of situated crowdsourcing and public displays. To gain insight into actual coordination practices, we conducted an empirical study with 18 different stakeholders involved in disaster management. Based on the literature review and our empirical study, we have derived a technical concept that supports the task and activity management of spontaneous volunteers as well as the coordination both of the demands of affected people and the offers from spontaneous volunteers. We have implemented our concept as the public display application ‘City-Share‘, which provides a robust communication infrastructure and encompasses situated crowdsourcing mechanisms for managing offers and demands of activities on-the-ground. Based on its evaluation with several users, we will discuss our findings with regard to the assignment of tasks on-the-ground and situated crowdsourcing during emergencies. We outline that City-Share can improve a community’s disaster resilience, especially when focusing on the kind of collaborative resilience emerging between official stakeholders and spontaneous volunteers or affected citizens at a local level.
@article{ludwig_situated_2017,
title = {Situated crowdsourcing during disasters: {Managing} the tasks of spontaneous volunteers through public displays},
volume = {102},
url = {http://www.peasec.de/paper/2017/2017_Ludwigetal_SituatedCrowdsourcingPublicDisplay_IJHCS.pdf},
doi = {10.1016/j.ijhcs.2016.09.008},
abstract = {Abstract Although emergency services have already recognized the importance of citizen-initiated activities during disasters, still questions with regard to the coordination of spontaneous volunteers and their activities arise. Within our article, we will present a technological approach based on public displays which aims to foster situated crowdsourcing between affected citizens, spontaneous volunteers as well as official emergency services. We will address the research question: How can the situated tasks performed by spontaneous volunteers be supported by the use of public displays during disasters? First we will present the current state of the art with regard to the coordination practices of spontaneous volunteers and emergency services within disaster situations as well as related problems, potentials and specifics of situated crowdsourcing and public displays. To gain insight into actual coordination practices, we conducted an empirical study with 18 different stakeholders involved in disaster management. Based on the literature review and our empirical study, we have derived a technical concept that supports the task and activity management of spontaneous volunteers as well as the coordination both of the demands of affected people and the offers from spontaneous volunteers. We have implemented our concept as the public display application ‘City-Share', which provides a robust communication infrastructure and encompasses situated crowdsourcing mechanisms for managing offers and demands of activities on-the-ground. Based on its evaluation with several users, we will discuss our findings with regard to the assignment of tasks on-the-ground and situated crowdsourcing during emergencies. We outline that City-Share can improve a community's disaster resilience, especially when focusing on the kind of collaborative resilience emerging between official stakeholders and spontaneous volunteers or affected citizens at a local level.},
number = {C},
journal = {International Journal on Human-Computer Studies (IJHCS)},
author = {Ludwig, Thomas and Kotthaus, Christoph and Reuter, Christian and Dongen, Sören Van and Pipek, Volkmar},
year = {2017},
keywords = {Cooperation, Crisis, HCI, Student, A-Paper, Ranking-ImpactFactor, Ranking-CORE-A, Ranking-WKWI-B, Projekt-KOKOS},
pages = {103--121},
}
[BibTeX] [Abstract] [Download PDF]
In recent years, social media have increased the resources that individuals and organizations are able to mobilize for the development of socially innovative practices. In this article, we engage with a naturally occurring development in a Trentinian neighbourhood to examine the cooperative interactions amongst members of a local community. The first author and local residents of the neighbourhood participated in online discussions, decision making, and physical activities that led to material changes in the area. The interventions are motivated by and based on the concept of Social Street that combines online interactions in a closed Facebook group with face-to-face meetings seeking to practically engage the collective in accomplishing certain immediate or ongoing needs. Over the course of two years, we studied this local instantiation of Social Street in Trento, Italy by way of an action-oriented (digital) ethnography. Through this work, we demonstrate how urban neighbourhoods might benefit from hybrid forms of community engagement that are enacted through a constant back and forth between online and face-to-face interactions. We further argue that the infrastructuring of local urban collectives should follow strategies that pay attention to the multiple issues in urban neighbourhoods and people’s attachments to them. Overall, the paper reflects upon the challenges and configurations of participation that this form of community-work entails.
@article{mosconi_facebook_2017,
title = {From {Facebook} to the {Neighbourhood}: {Infrastructuring} of {Hybrid} {Community} {Engagement}},
volume = {26},
url = {https://link.springer.com/article/10.1007/s10606-017-9291-z},
doi = {10.1007/s10606-017-9291-z},
abstract = {In recent years, social media have increased the resources that individuals and organizations are able to mobilize for the development of socially innovative practices. In this article, we engage with a naturally occurring development in a Trentinian neighbourhood to examine the cooperative interactions amongst members of a local community. The first author and local residents of the neighbourhood participated in online discussions, decision making, and physical activities that led to material changes in the area. The interventions are motivated by and based on the concept of Social Street that combines online interactions in a closed Facebook group with face-to-face meetings seeking to practically engage the collective in accomplishing certain immediate or ongoing needs. Over the course of two years, we studied this local instantiation of Social Street in Trento, Italy by way of an action-oriented (digital) ethnography. Through this work, we demonstrate how urban neighbourhoods might benefit from hybrid forms of community engagement that are enacted through a constant back and forth between online and face-to-face interactions. We further argue that the infrastructuring of local urban collectives should follow strategies that pay attention to the multiple issues in urban neighbourhoods and people's attachments to them. Overall, the paper reflects upon the challenges and configurations of participation that this form of community-work entails.},
number = {4-6},
journal = {Computer Supported Cooperative Work: The Journal of Collaborative Computing (JCSCW)},
author = {Mosconi, Gaia and Korn, Matthias and Reuter, Christian and Tolmie, Peter and Teli, Maurizio and Pipek, Volkmar},
year = {2017},
keywords = {Crisis, HCI, SocialMedia, A-Paper, Ranking-ImpactFactor, Ranking-VHB-B, Projekt-KOKOS, Ranking-CORE-B},
pages = {959--1003},
}
[BibTeX] [Download PDF]
@article{pottebaum_guest_2017,
title = {Guest {Editorial} {Preface}: {Special} {Issue} on {IT}-{Support} for {Critical} {Infrastructure} {Protection}},
volume = {9},
url = {http://www.peasec.de/paper/2017/2017_PottebaumReuter_EditorialCriticalInfrastructureProtection_IJISCRAM.pdf},
number = {4},
journal = {International Journal of Information Systems for Crisis Response and Management (IJISCRAM)},
author = {Pottebaum, Jens and Reuter, Christian},
year = {2017},
keywords = {Crisis, Projekt-KontiKat, Infrastructure},
pages = {iv--vii},
}
[BibTeX] [Abstract] [Download PDF]
The Internet and especially social media are not only used for supposedly good purposes. For example, the recruitment of new members and the dissemination of ideologies of terrorism also takes place in the media. However, the fight against terrorism also makes use of the same tools. The type of these countermeasures, as well as the methods, are covered in this work. In the first part, the state of the art is summarized. The second part presents an explorative empirical study of the fight against terrorism in social media, especially on Twitter. Different, preferably characteristic forms are structured within the scope with the example of Twitter. The aim of this work is to approach this highly relevant subject with the goal of peace, safety and safety from the perspective of information systems. Moreover, it should serve following researches in this field as basis and starting point.
@article{reuter_it_2017,
title = {{IT} for {Peace}? {Fighting} {Against} {Terrorism} in {Social} {Media} – {An} {Explorative} {Twitter} {Study}},
volume = {16},
url = {http://www.peasec.de/paper/2017/2017_ReuterPaetschRunft_ITforPeaceTerrorismSocialMedia_ICOM.pdf},
doi = {10.1515/icom-2017-0013},
abstract = {The Internet and especially social media are not only used for supposedly good purposes. For example, the recruitment of new members and the dissemination of ideologies of terrorism also takes place in the media. However, the fight against terrorism also makes use of the same tools. The type of these countermeasures, as well as the methods, are covered in this work. In the first part, the state of the art is summarized. The second part presents an explorative empirical study of the fight against terrorism in social media, especially on Twitter. Different, preferably characteristic forms are structured within the scope with the example of Twitter. The aim of this work is to approach this highly relevant subject with the goal of peace, safety and safety from the perspective of information systems. Moreover, it should serve following researches in this field as basis and starting point.},
number = {2},
journal = {i-com - Journal of Interactive Media},
author = {Reuter, Christian and Pätsch, Katja and Runft, Elena},
year = {2017},
keywords = {Crisis, HCI, SocialMedia, Student, Projekt-EmerGent, Projekt-KontiKat, Peace},
pages = {181--195},
}
[BibTeX] [Abstract] [Download PDF]
Social media is increasingly being used during emergencies. Most available studies are focused on how citizens and/or authorities use these technologies in concrete events. However, larger quantitative studies with significant results on attitudes, needs and future plans of citizens in such events are not available – especially such of a comparative nature related to emergency services. As part of the EU project ‘EmerGent‘ this article presents the findings of a survey of 1034 citizens across 30 European countries conducted between February and June 2015 to explore citizens‘ attitudes towards the use of social media for private purposes and in emergency situations. The article briefly compares these findings with a second survey conducted with 761 emergency service staff across 32 European countries from September to December 2014. The aim of the overall study is to discuss citizens‘ attitudes towards social media in emergencies in order to derive challenges and opportunities for social resilience.
@article{reuter_towards_2017,
title = {Towards {Social} {Resilience}: {A} {Quantitative} and {Qualitative} {Survey} on {Citizens}' {Perception} of {Social} {Media} in {Emergencies} in {Europe}},
volume = {121},
url = {http://www.sciencedirect.com/science/article/pii/S0040162516301986},
doi = {10.1016/j.techfore.2016.07.038},
abstract = {Social media is increasingly being used during emergencies. Most available studies are focused on how citizens and/or authorities use these technologies in concrete events. However, larger quantitative studies with significant results on attitudes, needs and future plans of citizens in such events are not available - especially such of a comparative nature related to emergency services. As part of the EU project ‘EmerGent' this article presents the findings of a survey of 1034 citizens across 30 European countries conducted between February and June 2015 to explore citizens' attitudes towards the use of social media for private purposes and in emergency situations. The article briefly compares these findings with a second survey conducted with 761 emergency service staff across 32 European countries from September to December 2014. The aim of the overall study is to discuss citizens' attitudes towards social media in emergencies in order to derive challenges and opportunities for social resilience.},
journal = {Journal Technological Forecasting and Social Change (TFSC)},
author = {Reuter, Christian and Spielhofer, Thomas},
year = {2017},
keywords = {Crisis, HCI, SocialMedia, Projekt-EmerGent, A-Paper, Ranking-ImpactFactor, Ranking-VHB-B, RSF},
pages = {168--180},
}
[BibTeX] [Abstract] [Download PDF]
The value of social media in crises, disasters, and emergencies across different events (e.g. floods, storms, terroristic attacks), countries, and for heterogeneous participants (e.g. citizens, emergency services) is now well-attested. Existing work has examined the potentials and weaknesses of its use during specific events. Fewer studies, however, have focused on citizens‘ perceptions of social media in emergencies, and none have deployed a representative sample to examine this. We present the results of the first representative study on citizens‘ perception of social media in emergencies that we have conducted in Germany. Our study highlights, for example, that around half (45\%) of people have used social media during an emergency to share and / or look for information. In contrast, false rumours on social media (74\%) are perceived as a threat. Moreover, only a minority of people have downloaded a smartphone app for emergencies (16\%), with the most popular ones‘ weather and first aid apps.
@article{reuter_social_2017-1,
title = {Social {Media} in {Emergencies}: {A} {Representative} {Study} on {Citizens}' {Perception} in {Germany}},
volume = {1},
url = {http://www.peasec.de/paper/2017/2017_ReuterKaufholdSpielhoferHahne_SocialMediaEmergenciesGermany_CSCW.pdf},
doi = {10.1145/3134725},
abstract = {The value of social media in crises, disasters, and emergencies across different events (e.g. floods, storms, terroristic attacks), countries, and for heterogeneous participants (e.g. citizens, emergency services) is now well-attested. Existing work has examined the potentials and weaknesses of its use during specific events. Fewer studies, however, have focused on citizens' perceptions of social media in emergencies, and none have deployed a representative sample to examine this. We present the results of the first representative study on citizens' perception of social media in emergencies that we have conducted in Germany. Our study highlights, for example, that around half (45\%) of people have used social media during an emergency to share and / or look for information. In contrast, false rumours on social media (74\%) are perceived as a threat. Moreover, only a minority of people have downloaded a smartphone app for emergencies (16\%), with the most popular ones' weather and first aid apps.},
number = {2},
journal = {Proceedings of the ACM: Human Computer Interaction (PACM): Computer-Supported Cooperative Work and Social Computing},
author = {Reuter, Christian and Kaufhold, Marc-André and Spielhofer, Thomas and Hahne, Anna Sophie},
year = {2017},
note = {Place: New York, USA},
keywords = {Crisis, HCI, SocialMedia, Projekt-EmerGent, A-Paper, Ranking-CORE-A, Ranking-WKWI-B, Projekt-KontiKat},
pages = {1--19},
}
2016
[BibTeX] [Abstract] [Download PDF]
For almost 15 years, social media have been regularly used during emergencies. One of the most recent, and instructive, examples of its widespread use during a large scale scenario in Europe were the 2013 European floods. Public reporting during the event indicated, and our analysis confirms, that Twitter, Facebook (FB), Google Maps and other services were frequently used by affected citizen and volunteers to coordinate help activities among themselves. We conducted a qualitative analysis of selected emergent volunteer communities in Germany on FB and Twitter among others, and subsequently conducted interviews with FB group founders and activists. Our aim was to analyze the use of social media during this particular event, especially by digital volunteers. Our study illustrates the relevance of social media for German citizens in cases of disaster, focusing especially on the role of the moderator. Our specific emphasis was the embedding of social media in the organizing work done by said volunteers, emphasizing both the patterns of social media use and the challenges that result. We show that different social media were used in different ways: Twitter was used in the main for status updates while FB-pages were mostly intended to provide an overview. FB-groups also coordinated a multitude of activities.
@article{kaufhold_self-organization_2016,
title = {The {Self}-{Organization} of {Digital} {Volunteers} across {Social} {Media}: {The} {Case} of the 2013 {European} {Floods} in {Germany}},
volume = {13},
url = {http://wineme.uni-siegen.de/paper/2016/2016_KaufholdReuter_SelfOrganizationDigitalVolunteersEuropeanFloods_JHSEM.pdf},
doi = {10.1515/jhsem-2015-0063},
abstract = {For almost 15 years, social media have been regularly used during emergencies. One of the most recent, and instructive, examples of its widespread use during a large scale scenario in Europe were the 2013 European floods. Public reporting during the event indicated, and our analysis confirms, that Twitter, Facebook (FB), Google Maps and other services were frequently used by affected citizen and volunteers to coordinate help activities among themselves. We conducted a qualitative analysis of selected emergent volunteer communities in Germany on FB and Twitter among others, and subsequently conducted interviews with FB group founders and activists. Our aim was to analyze the use of social media during this particular event, especially by digital volunteers. Our study illustrates the relevance of social media for German citizens in cases of disaster, focusing especially on the role of the moderator. Our specific emphasis was the embedding of social media in the organizing work done by said volunteers, emphasizing both the patterns of social media use and the challenges that result. We show that different social media were used in different ways: Twitter was used in the main for status updates while FB-pages were mostly intended to provide an overview. FB-groups also coordinated a multitude of activities.},
number = {1},
journal = {Journal of Homeland Security and Emergency Management (JHSEM)},
author = {Kaufhold, Marc-André and Reuter, Christian},
year = {2016},
keywords = {Cooperation, Crisis, HCI, SocialMedia, Projekt-EmerGent, Projekt-KOKOS, AuswahlKaufhold},
pages = {137--166},
}
[BibTeX] [Abstract] [Download PDF]
In recent years, citizens‘ movements such as the Arab Spring or Euromaidan protests have clearly shown that, whenever affected — whether negatively or positively — by the state and government decisions, citizens act to deal with the shared issues. Groups of people who organize themselves to address (mainly political) issues were defined as a `public‘ by the philosopher John Dewey. He believed it is necessary to improve communication to create a `Great Community‘ as a cohesive group of a public. Although information and communication technologies (ICT) lead to ambivalent effects on pursuing this goal and often distract the mass of people from discussing these issues, we argue that nowadays ICT can improve communication and has the potential to foster the detection of issues and therefore promote the (trans-)formation of a public into an issue-based community. As our foundation we took a literature study covering the formation of publics and their potential to evolve into communities, as well as their interplay with technology. This formed the basis for the development of our operational model that `follows the issues‘ for capturing the (trans-)formation of a public. Based on our model, we outline different perspectives on detecting shared issues as early indicators for publics based on ICT and derive implications for researching this process from a practical perspective.
@article{ludwig_publics_2016,
title = {From {Publics} to {Communities}: {Researching} the {Path} of {Shared} {Issues} {Through} {ICT}},
volume = {25},
url = {https://www.wineme.uni-siegen.de/paper/2016/2016_ludwigreuterpipek_frompublicstocommunities_jcscw.pdf},
doi = {10.1007/s10606-016-9252-y},
abstract = {In recent years, citizens' movements such as the Arab Spring or Euromaidan protests have clearly shown that, whenever affected — whether negatively or positively — by the state and government decisions, citizens act to deal with the shared issues. Groups of people who organize themselves to address (mainly political) issues were defined as a `public' by the philosopher John Dewey. He believed it is necessary to improve communication to create a `Great Community' as a cohesive group of a public. Although information and communication technologies (ICT) lead to ambivalent effects on pursuing this goal and often distract the mass of people from discussing these issues, we argue that nowadays ICT can improve communication and has the potential to foster the detection of issues and therefore promote the (trans-)formation of a public into an issue-based community. As our foundation we took a literature study covering the formation of publics and their potential to evolve into communities, as well as their interplay with technology. This formed the basis for the development of our operational model that `follows the issues' for capturing the (trans-)formation of a public. Based on our model, we outline different perspectives on detecting shared issues as early indicators for publics based on ICT and derive implications for researching this process from a practical perspective.},
number = {2-3},
journal = {Computer Supported Cooperative Work: The Journal of Collaborative Computing (JCSCW)},
author = {Ludwig, Thomas and Reuter, Christian and Pipek, Volkmar},
year = {2016},
note = {Place: Norwell, MA, USA
Publisher: Kluwer Academic Publishers},
keywords = {Cooperation, HCI, SocialMedia, Projekt-EmerGent, A-Paper, Ranking-ImpactFactor, Ranking-VHB-B, Ranking-CORE-B},
pages = {193--225},
}
[BibTeX] [Abstract] [Download PDF]
Mission- and safety-critical domains are more and more characterized by interactive and multimedia systems varying from large-scale technologies (e. g. airplanes) to wearable devices (e. g. smartglasses) operated by professional staff or volunteering laypeople. While technical availability, reliability and security of computer-based systems are of utmost importance, outcomes and performances increasingly depend on sufficient human-machine interaction or even cooperation to a large extent. While this i-com Special Issue on “Human-Machine Interaction and Cooperation in Safety-Critical Systems” presents recent research results from specific application domains like aviation, automotive, crisis management and healthcare, this introductory paper outlines the diversity of users, technologies and interaction or cooperation models involved.
@article{mentler_introduction_2016,
title = {Introduction to this {Special} {Issue} on “{Human}-{Machine} {Interaction} and {Cooperation} in {Safety}-{Critical} {Systems}”},
volume = {15},
url = {https://www.degruyter.com/view/j/icom.2016.15.issue-3/icom-2016-0037/icom-2016-0037.xml?format=INT},
doi = {https://doi.org/10.1515/icom-2016-0037},
abstract = {Mission- and safety-critical domains are more and more characterized by interactive and multimedia systems varying from large-scale technologies (e. g. airplanes) to wearable devices (e. g. smartglasses) operated by professional staff or volunteering laypeople. While technical availability, reliability and security of computer-based systems are of utmost importance, outcomes and performances increasingly depend on sufficient human-machine interaction or even cooperation to a large extent. While this i-com Special Issue on “Human-Machine Interaction and Cooperation in Safety-Critical Systems” presents recent research results from specific application domains like aviation, automotive, crisis management and healthcare, this introductory paper outlines the diversity of users, technologies and interaction or cooperation models involved.},
number = {3},
journal = {i-com - Journal of Interactive Media},
author = {Mentler, Tilo and Reuter, Christian and Geisler, Stefan},
year = {2016},
keywords = {Cooperation, Crisis, HCI, Projekt-EmerGent, Infrastructure},
pages = {219--226},
}
[BibTeX] [Abstract] [Download PDF]
Während das Konzept der Resilienz in den Ingenieurwissenschaften vornehmlich auf die Verfügbarkeit technischer Systeme fokussiert ist, betrachtet unser Beitrag Resilienz als soziotechnisches Konstrukt und zeigt Möglichkeiten zur Förderung kooperativer Resilienz, insbesondere durch Kooperationstechnologie, auf. Nach einer Definition von Resilienz im Allgemeinen und im Katastrophenschutz – unserem Anwendungsfeld – sowie im Kontext kooperativer Strukturen, stellen wir unsere Methodik und die entwickelten Kooperationstechnologien vor. Diese adressieren die Zusammenarbeit verschiedener Akteure (z. B. Feuerwehr, Polizei, Bevölkerung) in Schadenslagen. Abschließend diskutieren wir den Beitrag dieser Technologien zur kooperativen Resilienz als Fähigkeit, Krisen der Kooperation durch Anpassungsfähigkeit an geänderte Realitäten mithilfe von Kooperationstechnologie zu überstehen.
@article{reuter_kooperative_2016,
title = {Kooperative {Resilienz} – ein soziotechnischer {Ansatz} durch {Kooperationstechnologien} im {Krisenmanagement}},
volume = {47},
url = {https://www.wineme.uni-siegen.de/paper/2016/2016_reuterludwigpipek_kooperativeresilienz_gio.pdf},
doi = {10.1007/s11612-016-0317-7},
abstract = {Während das Konzept der Resilienz in den Ingenieurwissenschaften vornehmlich auf die Verfügbarkeit technischer Systeme fokussiert ist, betrachtet unser Beitrag Resilienz als soziotechnisches Konstrukt und zeigt Möglichkeiten zur Förderung kooperativer Resilienz, insbesondere durch Kooperationstechnologie, auf. Nach einer Definition von Resilienz im Allgemeinen und im Katastrophenschutz – unserem Anwendungsfeld – sowie im Kontext kooperativer Strukturen, stellen wir unsere Methodik und die entwickelten Kooperationstechnologien vor. Diese adressieren die Zusammenarbeit verschiedener Akteure (z. B. Feuerwehr, Polizei, Bevölkerung) in Schadenslagen. Abschließend diskutieren wir den Beitrag dieser Technologien zur kooperativen Resilienz als Fähigkeit, Krisen der Kooperation durch Anpassungsfähigkeit an geänderte Realitäten mithilfe von Kooperationstechnologie zu überstehen.},
number = {2},
journal = {Gruppe. Interaktion. Organisation. Zeitschrift für Angewandte Organisationspsychologie (GIO)},
author = {Reuter, Christian and Ludwig, Thomas and Pipek, Volkmar},
year = {2016},
keywords = {Cooperation, Crisis, HCI, Projekt-InfoStrom, Projekt-EmerGent, Projekt-KOKOS, RSF},
pages = {159--169},
}
[BibTeX] [Abstract] [Download PDF]
A growing body of research in the area of information systems for crisis management is based on data from social media. After almost every larger disaster studies emerge with the focus on the specific use of social media. Much of this research is based on Twitter data, due to the ease of access of this (mainly public) data, compared to (more closed) data, such as Facebook or Google+. Based on the experience gained from a research project on social media in emergencies and our task to collect social media data sets for other partners, we present the design and evaluation of a graphical user interface that supports those stakeholders (such as emergency services or researchers) that are interested in creating social media datasets for further crisis management research. We do not specifically focus on the analysis of social media data. Rather we aim to support the gathering process and how actors without sophisticated technical skills can be supported to get what they want and especially need: relevant social media data. Within this article, we present a practice-oriented approach and implications for designing tools that support the collection of social media data as well as future work.
@article{reuter_big_2016,
title = {Big {Data} in a {Crisis}? {Creating} {Social} {Media} {Datasets} for {Emergency} {Management} {Research}},
volume = {15},
url = {http://wineme.uni-siegen.de/paper/2016/2016_Reuteretal_BigDatainCrisisDatasets_ICOM.pdf},
doi = {10.1515/icom-2016-0036},
abstract = {A growing body of research in the area of information systems for crisis management is based on data from social media. After almost every larger disaster studies emerge with the focus on the specific use of social media. Much of this research is based on Twitter data, due to the ease of access of this (mainly public) data, compared to (more closed) data, such as Facebook or Google+. Based on the experience gained from a research project on social media in emergencies and our task to collect social media data sets for other partners, we present the design and evaluation of a graphical user interface that supports those stakeholders (such as emergency services or researchers) that are interested in creating social media datasets for further crisis management research. We do not specifically focus on the analysis of social media data. Rather we aim to support the gathering process and how actors without sophisticated technical skills can be supported to get what they want and especially need: relevant social media data. Within this article, we present a practice-oriented approach and implications for designing tools that support the collection of social media data as well as future work.},
number = {3},
journal = {i-com - Journal of Interactive Media},
author = {Reuter, Christian and Ludwig, Thomas and Kotthaus, Christoph and Kaufhold, Marc-André and von Radziewski, Elmar and Pipek, Volkmar},
year = {2016},
keywords = {HCI, SocialMedia, Projekt-EmerGent, Projekt-KOKOS},
pages = {249--264},
}
[BibTeX] [Abstract] [Download PDF]
Various studies show that social media is used in emergencies – and that in spite of possible challenges for emergency services, beneficial use cases can be identified. However, relatively little empirical data is available regarding the attitudes of emergency services towards social media, and almost none of a comparative nature. This article summarizes the findings of a survey conducted of the EU project ‘EmerGent‘ with 761 emergency service staff across 32 European countries from September to December 2014. The main aims of the survey were to explore the attitudes expressed by emergency service staff towards social media for private and organizational use as well as the levels and main factors influencing the current and likely future use of social media in their organizations. Based on our results, we discuss possible enhancements of the emergency management cycle using social media.
@article{reuter_emergency_2016,
title = {Emergency {Services} {Attitudes} towards {Social} {Media}: {A} {Quantitative} and {Qualitative} {Survey} across {Europe}},
volume = {95},
url = {https://peasec.de/paper/2016/2016_ReuterLudwigKaufholdSpielhofer_EmergencyServicesAttiudesSurveySocialMedia_IJHCS.pdf},
doi = {10.1016/j.ijhcs.2016.03.005},
abstract = {Various studies show that social media is used in emergencies – and that in spite of possible challenges for emergency services, beneficial use cases can be identified. However, relatively little empirical data is available regarding the attitudes of emergency services towards social media, and almost none of a comparative nature. This article summarizes the findings of a survey conducted of the EU project ‘EmerGent' with 761 emergency service staff across 32 European countries from September to December 2014. The main aims of the survey were to explore the attitudes expressed by emergency service staff towards social media for private and organizational use as well as the levels and main factors influencing the current and likely future use of social media in their organizations. Based on our results, we discuss possible enhancements of the emergency management cycle using social media.},
journal = {International Journal on Human-Computer Studies (IJHCS)},
author = {Reuter, Christian and Ludwig, Thomas and Kaufhold, Marc-André and Spielhofer, Thomas},
year = {2016},
keywords = {AuswahlCrisis, Crisis, HCI, Selected, SocialMedia, Projekt-EmerGent, A-Paper, Ranking-ImpactFactor, Ranking-CORE-A, Ranking-WKWI-B, AuswahlKaufhold},
pages = {96--111},
}
2015
[BibTeX] [Abstract] [Download PDF]
People all over the world are regularly affected by disasters and emergencies. Besides official emergency services, ordinary citizens are getting increasingly involved in crisis response work. They are usually present on-site at the place of incident and use social media to share information about the event. For emergency services, the large amount of citizen-generated content in social media, however, means that finding high-quality information is similar to “finding a needle in a haystack”. This article presents an approach to how a dynamic and subjective quality assessment of citizen-generated content could support the work of emergency services. First, we present results of our empirical study concerning the usage of citizen-generated content by emergency services. Based on our literature review and empirical study, we derive design guidelines and describe a concept for dynamic quality measurement that is implemented as a service-oriented web-application “Social Haystack.” Finally, we outline findings of its evaluation and implications thereof.
@article{ludwig_social_2015,
title = {Social {Haystack}: {Dynamic} {Quality} {Assessment} of {Citizen}-{Generated} {Content} during {Emergencies}},
volume = {21},
url = {https://www.wineme.uni-siegen.de/paper/2015/2015_ludwigreuterpipek_socialhaystack_tochi.pdf},
doi = {10.1145/2749461},
abstract = {People all over the world are regularly affected by disasters and emergencies. Besides official emergency services, ordinary citizens are getting increasingly involved in crisis response work. They are usually present on-site at the place of incident and use social media to share information about the event. For emergency services, the large amount of citizen-generated content in social media, however, means that finding high-quality information is similar to “finding a needle in a haystack”. This article presents an approach to how a dynamic and subjective quality assessment of citizen-generated content could support the work of emergency services. First, we present results of our empirical study concerning the usage of citizen-generated content by emergency services. Based on our literature review and empirical study, we derive design guidelines and describe a concept for dynamic quality measurement that is implemented as a service-oriented web-application “Social Haystack.” Finally, we outline findings of its evaluation and implications thereof.},
number = {4},
journal = {ACM Transactions on Computer-Human Interaction (TOCHI)},
author = {Ludwig, Thomas and Reuter, Christian and Pipek, Volkmar},
year = {2015},
keywords = {Crisis, HCI, SocialMedia, Projekt-EmerGent, A-Paper, Ranking-CORE-A*, Ranking-ImpactFactor, Ranking-VHB-B, Ranking-WKWI-A},
pages = {Article 17},
}
[BibTeX] [Abstract] [Download PDF]
Social media is becoming more and more important in crisis management. However its analysis by emergency services still bears unaddressed challenges and the majority of studies focus on the use of social media in the USA. In this paper German tweets of the European Flood 2013 are therefore captured and analyzed using descriptive statistics, qualitative data coding, and computational algorithms. Our work illustrates that this event provided sufficient German traffic and geo-locations as well as enough original data (not derivative). However, up-to-date Named Entity Recognizer (NER) with German classifier could not recognize German rivers and highways satisfactorily. Furthermore our analysis revealed pragmatic (linguistic) barriers resulting from irony, wordplay, and ambiguity, as well as in retweet-behavior. To ease the analysis of data we suggest a retweet ratio, which is illustrated to be higher with important tweets and may help selecting tweets for mining. We argue that existing software has to be adapted and improved for German language characteristics, also to detect markedness, seriousness and truth
@article{reuter_microblogging_2015,
title = {Microblogging during the {European} {Floods} 2013: {What} {Twitter} {May} {Contribute} in {German} {Emergencies}},
volume = {7},
url = {http://www.peasec.de/paper/2015/2015_ReuterSchroeter_MicrobloggingEuropeanFloods_IJISCRAM.pdf},
abstract = {Social media is becoming more and more important in crisis management. However its analysis by emergency services still bears unaddressed challenges and the majority of studies focus on the use of social media in the USA. In this paper German tweets of the European Flood 2013 are therefore captured and analyzed using descriptive statistics, qualitative data coding, and computational algorithms. Our work illustrates that this event provided sufficient German traffic and geo-locations as well as enough original data (not derivative). However, up-to-date Named Entity Recognizer (NER) with German classifier could not recognize German rivers and highways satisfactorily. Furthermore our analysis revealed pragmatic (linguistic) barriers resulting from irony, wordplay, and ambiguity, as well as in retweet-behavior. To ease the analysis of data we suggest a retweet ratio, which is illustrated to be higher with important tweets and may help selecting tweets for mining. We argue that existing software has to be adapted and improved for German language characteristics, also to detect markedness, seriousness and truth},
number = {1},
journal = {International Journal of Information Systems for Crisis Response and Management (IJISCRAM)},
author = {Reuter, Christian and Schröter, Julian},
year = {2015},
keywords = {Cooperation, Crisis, HCI, SocialMedia, Student, Projekt-EmerGent},
pages = {22--41},
}
[BibTeX] [Abstract] [Download PDF]
Der umfassende Einsatz sozialer Medien in Katastrophenlagen wurde in Deutschland erstmalig während des mitteleuropäischen Hochwassers im Frühjahr 2013 von einer breiten Öffentlichkeit wahrgenommen. Über Twitter, Facebook, Google Maps und weitere Plattformen koordinierten betroffene Bürger und freiwillige Helfer untereinander Hilfsaktivitäten und unterstützten den Katastrophenschutz. Zahlreiche Medien berichteten über dieses Phänomen. Dieser Artikel soll einen kleinen Überblick über das Thema geben.
@article{reuter_einsatz_2015,
title = {Der {Einsatz} sozialer {Medien} in {Katastrophenlagen}},
volume = {5},
url = {https://www.wineme.uni-siegen.de/paper/2015/2015_reuter_dereinsatzsozialermedieninkatastrophenlagen_crisisprevention.pdf},
abstract = {Der umfassende Einsatz sozialer Medien in Katastrophenlagen wurde in Deutschland erstmalig während des mitteleuropäischen Hochwassers im Frühjahr 2013 von einer breiten Öffentlichkeit wahrgenommen. Über Twitter, Facebook, Google Maps und weitere Plattformen koordinierten betroffene Bürger und freiwillige Helfer untereinander Hilfsaktivitäten und unterstützten den Katastrophenschutz. Zahlreiche Medien berichteten über dieses Phänomen. Dieser Artikel soll einen kleinen Überblick über das Thema geben.},
number = {4},
journal = {Crisis Prevention – Fachmagazin für Innere Sicherheit, Bevölkerungsschutz und Katastrophenhilfe},
author = {Reuter, Christian},
year = {2015},
keywords = {Crisis, HCI, SocialMedia, Projekt-EmerGent, Projekt-KOKOS},
pages = {43--44},
}
[BibTeX] [Abstract] [Download PDF]
Business Continuity Management BCM is an integral part of civil security in terms of corporate crisis management. According to the ISO 22301 2014 BCM is defined as a holistic management process which identifies potential threats to an organization and the impacts those threats might have on business operations. Looking at the current situation of studies conducted in this field it seems to be obvious that the use of BCM in Small and Medium Enterprises SME is underrepresented and that the security level is partially located in an uneconomical range. This paper presents a literature research on the use of BCM in SME and discusses research findings concerning this matter. Based on this a matrix for possible impacts vs. quality of the crisis management for different actors is derived. The article concludes with the presentation of lightweight und easy to handle BCM security solutions in form of Smart Services, as a possible solution for the increasingly IT relaying industry 4.0.
@article{reuter_towards_2015,
title = {Towards {Efficient} {Security}: {Business} {Continuity} {Management} in {Small} and {Medium} {Enterprises}},
volume = {7},
url = {https://www.wineme.uni-siegen.de/paper/2015/2015_reuter_towardsefficientsecurity-bcminsme.pdf},
doi = {10.4018/IJISCRAM.2015070105},
abstract = {Business Continuity Management BCM is an integral part of civil security in terms of corporate crisis management. According to the ISO 22301 2014 BCM is defined as a holistic management process which identifies potential threats to an organization and the impacts those threats might have on business operations. Looking at the current situation of studies conducted in this field it seems to be obvious that the use of BCM in Small and Medium Enterprises SME is underrepresented and that the security level is partially located in an uneconomical range. This paper presents a literature research on the use of BCM in SME and discusses research findings concerning this matter. Based on this a matrix for possible impacts vs. quality of the crisis management for different actors is derived. The article concludes with the presentation of lightweight und easy to handle BCM security solutions in form of Smart Services, as a possible solution for the increasingly IT relaying industry 4.0.},
number = {3},
journal = {International Journal of Information Systems for Crisis Response and Management (IJISCRAM)},
author = {Reuter, Christian},
year = {2015},
keywords = {Projekt-KOKOS, Infrastructure, RSF},
pages = {69--79},
}
[BibTeX] [Abstract] [Download PDF]
Human computer interaction in security and time-critical systems is an interdisciplinary challenge at the seams of human factors, engineering, information systems and computer science. Application fields include control systems, critical infrastructures, vehicle and traffic management, production technology, business continuity management, medical technology, crisis management and civil protection. Nowadays in many areas mobile and ubiquitous computing as well as social media and collaborative technologies also plays an important role. The specific challenges require the discussion and development of new methods and approaches in order to design information systems. These are going to be addressed in this special issue with a particular focus on technologies for critical practices for authorities and industry.
@article{reuter_guest_2015,
title = {Guest {Editorial} {Preface}: {Special} {Issue} on {Human} {Computer} {Interaction} in {Critical} {Systems} {II}: {Authorities} and {Industry}},
volume = {7},
url = {http://www.wineme.uni-siegen.de/paper/2015/2015_reuter_editorial-specialissue-hci-criticalsystems-ii.pdf},
abstract = {Human computer interaction in security and time-critical systems is an interdisciplinary challenge at the seams of human factors, engineering, information systems and computer science. Application fields include control systems, critical infrastructures, vehicle and traffic management, production technology, business continuity management, medical technology, crisis management and civil protection. Nowadays in many areas mobile and ubiquitous computing as well as social media and collaborative technologies also plays an important role. The specific challenges require the discussion and development of new methods and approaches in order to design information systems. These are going to be addressed in this special issue with a particular focus on technologies for critical practices for authorities and industry.},
number = {3},
journal = {International Journal of Information Systems for Crisis Response and Management (IJISCRAM)},
author = {Reuter, Christian},
year = {2015},
keywords = {HCI, SocialMedia, Projekt-EmerGent},
pages = {iv--vi},
}
[BibTeX] [Abstract] [Download PDF]
Human computer interaction in security and time-critical systems is an interdisciplinary challenge at the seams of human factors, engineering, information systems and computer science. Application fields include control systems, critical infrastructures, vehicle and traffic management, production technology, business continuity management, medical technology, crisis management and civil protection. Nowadays in many areas mobile and ubiquitous computing as well as social media and collaborative technologies also plays an important role. The specific challenges require the discussion and development of new methods and approaches in order to design information systems. These are going to be addressed in this special issue with a particular focus on technologies for citizen and volunteers in emergencies.
@article{reuter_guest_2015-1,
title = {Guest {Editorial} {Preface}: {Special} {Issue} on {Human} {Computer} {Interaction} in {Critical} {Systems} {I}: {Citizen} and {Volunteers}},
volume = {7},
url = {http://www.wineme.uni-siegen.de/paper/2015/2015_reuter_editorial-specialissue-hci-criticalsystems-i.pdf},
abstract = {Human computer interaction in security and time-critical systems is an interdisciplinary challenge at the seams of human factors, engineering, information systems and computer science. Application fields include control systems, critical infrastructures, vehicle and traffic management, production technology, business continuity management, medical technology, crisis management and civil protection. Nowadays in many areas mobile and ubiquitous computing as well as social media and collaborative technologies also plays an important role. The specific challenges require the discussion and development of new methods and approaches in order to design information systems. These are going to be addressed in this special issue with a particular focus on technologies for citizen and volunteers in emergencies.},
number = {2},
journal = {International Journal of Information Systems for Crisis Response and Management (IJISCRAM)},
author = {Reuter, Christian and Mentler, Tilo and Geisler, Stefan},
year = {2015},
keywords = {Crisis, HCI, SocialMedia, Projekt-EmerGent},
pages = {i--ix},
}
[BibTeX] [Abstract] [Download PDF]
Social media is much just used for private as well as business purposes, obviously, also during emergencies. Emergency services are often confronted with the amount of information from social media and might consider using them – or not using them. This article highlights the perception of emergency services on social media during emergencies. Within their European research project EMERGENT, the authors therefore conducted an interview study with emergency service staff (N=11) from seven European countries and eight different cities. Their results highlight the current and potential use of social media, the emergency service’s participation in research on social media as well as current challenges, benefits and future plans.
@article{reuter_social_2015,
title = {Social {Media} and {Emergency} {Services}? {Interview} {Study} on {Current} and {Potential} {Use} in 7 {European} {Countries}},
volume = {7},
url = {https://www.wineme.uni-siegen.de/paper/2015/2015_reuteretal_socialmediaemergencyservices-interview-study_ijiscram.pdf},
doi = {10.4018/IJISCRAM.2015040103},
abstract = {Social media is much just used for private as well as business purposes, obviously, also during emergencies. Emergency services are often confronted with the amount of information from social media and might consider using them – or not using them. This article highlights the perception of emergency services on social media during emergencies. Within their European research project EMERGENT, the authors therefore conducted an interview study with emergency service staff (N=11) from seven European countries and eight different cities. Their results highlight the current and potential use of social media, the emergency service's participation in research on social media as well as current challenges, benefits and future plans.},
number = {2},
journal = {International Journal of Information Systems for Crisis Response and Management (IJISCRAM)},
author = {Reuter, Christian and Ludwig, Thomas and Friberg, Therese and Pratzler-Wanczura, Sylvia and Gizikis, Alexis},
year = {2015},
keywords = {Crisis, HCI, SocialMedia, Projekt-EmerGent},
pages = {36--58},
}
2014
[BibTeX] [Abstract] [Download PDF]
Dieser Artikel untersucht den Einsatz sozialer Medien während des Hochwassers 2013 in Deutschland. Über Twitter, Facebook, Google Maps und auf weiteren Plattformen koordinierten betroffene Bürger und freiwillige Helfer untereinander Hilfsaktivitäten und lieferten dabei einen ergänzenden und signifikanten Beitrag zum offiziellen Katastrophenschutz. Neben der qualitativen Analyse ausgewählter, entstandener Hilfsnetzwerke wurden zusätzlich Interviews mit Facebook-Gruppengründern geführt. Die Ziele dieser Studie liegen zum einen in der Analyse des Benutzungsverhaltens sozialer Medien in Katastrophenlagen, zum anderen in der Identifikation von Gestaltungs- und Erweiterungspotenzialen für soziale Medien im Katastrophenschutz.
@article{kaufhold_vernetzte_2014,
title = {Vernetzte {Selbsthilfe} in {Sozialen} {Medien} am {Beispiel} des {Hochwassers} 2013 / {Linked} {Self}-{Help} in {Social} {Media} using the example of the {Floods} 2013 in {Germany}},
volume = {13},
url = {https://www.wineme.uni-siegen.de/paper/2014/2014_kaufholdreuter_vernetzteselbsthilfehochwasser_icom.pdf},
doi = {https://doi.org/10.1515/icom-2014-0004},
abstract = {Dieser Artikel untersucht den Einsatz sozialer Medien während des Hochwassers 2013 in Deutschland. Über Twitter, Facebook, Google Maps und auf weiteren Plattformen koordinierten betroffene Bürger und freiwillige Helfer untereinander Hilfsaktivitäten und lieferten dabei einen ergänzenden und signifikanten Beitrag zum offiziellen Katastrophenschutz. Neben der qualitativen Analyse ausgewählter, entstandener Hilfsnetzwerke wurden zusätzlich Interviews mit Facebook-Gruppengründern geführt. Die Ziele dieser Studie liegen zum einen in der Analyse des Benutzungsverhaltens sozialer Medien in Katastrophenlagen, zum anderen in der Identifikation von Gestaltungs- und Erweiterungspotenzialen für soziale Medien im Katastrophenschutz.},
number = {1},
journal = {i-com - Zeitschrift für interaktive und kooperative Medien},
author = {Kaufhold, Marc-André and Reuter, Christian},
editor = {Pipek, Volkmar and Reuter, Christian},
year = {2014},
keywords = {Cooperation, Crisis, HCI, SocialMedia, Projekt-EmerGent},
pages = {20--28},
}
[BibTeX] [Abstract] [Download PDF]
Emergency or crisis management, as is well-attested, is a complex management problem. A variety of agencies need to collaborate and coordinate in real-time and with an urgency that is not always present in other domains. It follows that accurate information of varying kinds (e.g. geographical and weather conditions; available skills and expertises; state-of-play; current dispositions and deployments) needs to be made available in a timely fashion to the organizations and individuals who need it. By definition, this information will come from a number of sources both within and across organizations. Large-scale events in particular necessitate collaboration with other organizations. Of course, plans and processes exist to deal with such events but the number of dynamically changing factors as well as the high number of heterogeneous organizations and the high degree of interdependency involved make it impossible to plan for all contingencies. A degree of ongoing improvisation, which typically occurs by means of a variety of information and expertise sharing practices, therefore becomes necessary. This, however, faces many challenges, such as different organizational cultures, distinct individual and coordinative work practices and discrete information systems. Our work entails an examination of the practices of information and expertise sharing, and the obstacles to it, in inter-organizational crisis management. We conceive of this as a design case study, such that we examine a problem area and its scope; conduct detailed enquiries into practice in that area, and provide design recommendations for implementation and evaluation. First, we will present the results of an empirical study of collaboration practices between organizations and public authorities with security responsibilities such as the police, fire departments, public administration and electricity network operators, mainly in scenarios of medium to large power outages in Germany. Based on these results, we will describe a concept, which was designed, implemented and evaluated as a system prototype, in two iterations. While the first iteration focuses on situation assessment, the second iteration also includes inter-organizational collaboration functionalities. Based on the findings of our evaluations with practitioners, we will discuss how to support collaboration with a particular focus on information and expertise sharing.
@article{ley_information_2014,
title = {Information and {Expertise} {Sharing} in {Inter}-{Organizational} {Crisis} {Management}},
volume = {23},
url = {https://www.wineme.uni-siegen.de/paper/2014/2014_informationsharingcrisis_jcscw.pdf},
doi = {10.1007/s10606-014-9205-2},
abstract = {Emergency or crisis management, as is well-attested, is a complex management problem. A variety of agencies need to collaborate and coordinate in real-time and with an urgency that is not always present in other domains. It follows that accurate information of varying kinds (e.g. geographical and weather conditions; available skills and expertises; state-of-play; current dispositions and deployments) needs to be made available in a timely fashion to the organizations and individuals who need it. By definition, this information will come from a number of sources both within and across organizations. Large-scale events in particular necessitate collaboration with other organizations. Of course, plans and processes exist to deal with such events but the number of dynamically changing factors as well as the high number of heterogeneous organizations and the high degree of interdependency involved make it impossible to plan for all contingencies. A degree of ongoing improvisation, which typically occurs by means of a variety of information and expertise sharing practices, therefore becomes necessary. This, however, faces many challenges, such as different organizational cultures, distinct individual and coordinative work practices and discrete information systems. Our work entails an examination of the practices of information and expertise sharing, and the obstacles to it, in inter-organizational crisis management. We conceive of this as a design case study, such that we examine a problem area and its scope; conduct detailed enquiries into practice in that area, and provide design recommendations for implementation and evaluation. First, we will present the results of an empirical study of collaboration practices between organizations and public authorities with security responsibilities such as the police, fire departments, public administration and electricity network operators, mainly in scenarios of medium to large power outages in Germany. Based on these results, we will describe a concept, which was designed, implemented and evaluated as a system prototype, in two iterations. While the first iteration focuses on situation assessment, the second iteration also includes inter-organizational collaboration functionalities. Based on the findings of our evaluations with practitioners, we will discuss how to support collaboration with a particular focus on information and expertise sharing.},
number = {4-6},
journal = {Computer Supported Cooperative Work: The Journal of Collaborative Computing (JCSCW)},
author = {Ley, Benedikt and Ludwig, Thomas and Pipek, Volkmar and Randall, Dave and Reuter, Christian and Wiedenhoefer, Torben},
year = {2014},
keywords = {Cooperation, Crisis, HCI, Projekt-InfoStrom, A-Paper, Ranking-ImpactFactor, Ranking-VHB-B, Ranking-CORE-B},
pages = {347--387},
}
[BibTeX] [Download PDF]
@article{pipek_forschungsherausforderungen_2014,
title = {Forschungsherausforderungen der {Interaktion} und {Kooperation} im {Krisenmanagement}},
volume = {13},
url = {https://www.wineme.uni-siegen.de/paper/2014/2014_pipekreuter_forschungsherausforderungenkrisen_icom.pdf},
number = {1},
journal = {i-com - Zeitschrift für interaktive und kooperative Medien},
author = {Pipek, Volkmar and Reuter, Christian},
year = {2014},
keywords = {Cooperation, HCI, Projekt-EmerGent},
pages = {1--3},
}
[BibTeX] [Abstract] [Download PDF]
Emergencies are characterized by high complexity and unpredictability. In order to assess and manage them successfully, improvisation work and informal communication, even beyond local and organizational boundaries, is needed. Such informal practices can facilitate ad hoc participation of units in situation assessment, but this may lack overall situation awareness. This paper presents a study on how emergent ‘collaboration needs‘ in current work of response teams, who are located on-site and in the control center, could be supported by mobile geo-collaboration systems. First, we present the results of an empirical study about informal work and mobile collaboration practices of emergency services. Then we describe the concept of a mobile geo-collaboration system that addresses the aspects detected in the empirical study and that was implemented as an Android application using web sockets, a technology enabling full-duplex ad hoc communication. Finally we outline the findings of its evaluation in practice and its implications.
@article{reuter_ad_2014,
title = {Ad {Hoc} {Participation} in {Situation} {Assessment}: {Supporting} {Mobile} {Collaboration} in {Emergencies}},
volume = {21},
url = {http://www.wineme.uni-siegen.de/paper/2014/2014_reuterludwigpipek_adhocparticipation_tochi.pdf},
doi = {10.1145/2651365},
abstract = {Emergencies are characterized by high complexity and unpredictability. In order to assess and manage them successfully, improvisation work and informal communication, even beyond local and organizational boundaries, is needed. Such informal practices can facilitate ad hoc participation of units in situation assessment, but this may lack overall situation awareness. This paper presents a study on how emergent ‘collaboration needs' in current work of response teams, who are located on-site and in the control center, could be supported by mobile geo-collaboration systems. First, we present the results of an empirical study about informal work and mobile collaboration practices of emergency services. Then we describe the concept of a mobile geo-collaboration system that addresses the aspects detected in the empirical study and that was implemented as an Android application using web sockets, a technology enabling full-duplex ad hoc communication. Finally we outline the findings of its evaluation in practice and its implications.},
number = {5},
journal = {ACM Transactions on Computer-Human Interaction (TOCHI)},
author = {Reuter, Christian and Ludwig, Thomas and Pipek, Volkmar},
month = nov,
year = {2014},
note = {Publisher: ACM},
keywords = {Cooperation, Crisis, HCI, Projekt-InfoStrom, Selected, UsableSec, A-Paper, Ranking-CORE-A*, Ranking-ImpactFactor, Ranking-VHB-B, Ranking-WKWI-A, AuswahlUsableSec},
pages = {1--26},
}
[BibTeX] [Abstract] [Download PDF]
In cases of power outages the communication of organizations responsible for recovery work (emergency services, public administration, energy network operators) to the public poses several challenges, primarily the breakdowns of many communication infrastructures and therefore the limitations of the use of classical communication media. This paper surveys technical concepts to support crisis communication during blackouts. Therefore it first investigates the perception and information demands of citizens and communication infrastructures in different scenarios. Furthermore, it analyzes communication infrastructures and their availability in different scenarios. Finally it proposes ‘BlaCom‘, an ICT-based concept for blackout communication, which addresses the time span between the occurrence of the energy blackout and the possible overload of the mobile phone network. It combines general information with location-specific and setting-specific information, was implemented as a prototype smartphone application and evaluated with 12 potential end users.
@article{reuter_communication_2014,
title = {Communication between {Power} {Blackout} and {Mobile} {Network} {Overload}},
volume = {6},
url = {https://peasec.de/paper/2014/2014_Reuter_BlackoutCommunication_IJISCRAM.pdf},
doi = {10.4018/ijiscram.2014040103},
abstract = {In cases of power outages the communication of organizations responsible for recovery work (emergency services, public administration, energy network operators) to the public poses several challenges, primarily the breakdowns of many communication infrastructures and therefore the limitations of the use of classical communication media. This paper surveys technical concepts to support crisis communication during blackouts. Therefore it first investigates the perception and information demands of citizens and communication infrastructures in different scenarios. Furthermore, it analyzes communication infrastructures and their availability in different scenarios. Finally it proposes ‘BlaCom', an ICT-based concept for blackout communication, which addresses the time span between the occurrence of the energy blackout and the possible overload of the mobile phone network. It combines general information with location-specific and setting-specific information, was implemented as a prototype smartphone application and evaluated with 12 potential end users.},
number = {2},
journal = {International Journal of Information Systems for Crisis Response and Management (IJISCRAM)},
author = {Reuter, Christian},
year = {2014},
keywords = {Projekt-InfoStrom, Infrastructure, RSF},
pages = {38--53},
}
2013
[BibTeX] [Abstract] [Download PDF]
Collaborative software supports teams involved in a common task in generating and sharing information over geographic distances. Such software is used in the cooperation between organisations, companies or individuals. The overall quality of the resulting information product depends on the quality of the individual contributions as well as on an underlying consolidation process. We therefore present different ‘composition functions‘ indicating how the qualities of the contributions by single actors (qi) influence the quality of the aggregated information product (Q). Based upon a qualitative empirical study of inter-organizational crisis management in Germany we match use cases with those composition functions and derive implications for the design of collaborative software.
@article{christofzik_aggregation_2013,
title = {The {Aggregation} of {Information} {Qualities} in {Collaborative} {Software}},
volume = {5},
url = {http://www.peasec.de/paper/2013/2013_ChristofzikReuter_InformationQualities_IJEV.pdf},
abstract = {Collaborative software supports teams involved in a common task in generating and sharing information over geographic distances. Such software is used in the cooperation between organisations, companies or individuals. The overall quality of the resulting information product depends on the quality of the individual contributions as well as on an underlying consolidation process. We therefore present different ‘composition functions' indicating how the qualities of the contributions by single actors (qi) influence the quality of the aggregated information product (Q). Based upon a qualitative empirical study of inter-organizational crisis management in Germany we match use cases with those composition functions and derive implications for the design of collaborative software.},
number = {3},
journal = {International Journal of Entrepreneurial Venturing (IJEV)},
author = {Christofzik, Désirée and Reuter, Christian},
year = {2013},
keywords = {HCI, Projekt-InfoStrom, SocialMedia, Ranking-VHB-B},
pages = {257--271},
}
2012
[BibTeX] [Abstract] [Download PDF]
Adaptations of business processes are important in work environments, specifically when process-support needs to be tailored according to changing needs. The creation, management, and adaptation of the process models require typically modeling-experts. While these actors are knowledgeable in formalizing and operationalizing processes end-users who do not necessarily possess sophisticated modeling skills know typically local practices and framing conditions best. In this paper, we present an approach to support users in articulating their needs and to involve them into the (re-)design of process specifications. We explore how end-users reflect upon and articulate about business processes. Based on results of a qualitative study, we present a new, paper-based interaction technique, which enables users with little skills to model processes. The resulting process specifications can be transferred either in paper or in digital form into traditional modeling systems for further elaboration.
@article{hess_supporting_2012,
title = {Supporting {End}-{User} {Articulations} in {Evolving} {Business} {Processes}: {A} {Case} {Study} to explore {Intuitive} {Notations} and {Interaction} {Designs}},
volume = {21},
url = {https://www.wineme.uni-siegen.de/paper/2012/2012_hessreuterpipekwulf_supportingenduserarticulations_ijcis.pdf},
doi = {10.1142/S0218843012500049},
abstract = {Adaptations of business processes are important in work environments, specifically when process-support needs to be tailored according to changing needs. The creation, management, and adaptation of the process models require typically modeling-experts. While these actors are knowledgeable in formalizing and operationalizing processes end-users who do not necessarily possess sophisticated modeling skills know typically local practices and framing conditions best. In this paper, we present an approach to support users in articulating their needs and to involve them into the (re-)design of process specifications. We explore how end-users reflect upon and articulate about business processes. Based on results of a qualitative study, we present a new, paper-based interaction technique, which enables users with little skills to model processes. The resulting process specifications can be transferred either in paper or in digital form into traditional modeling systems for further elaboration.},
number = {4},
journal = {International Journal of Cooperative Information Systems (IJCIS)},
author = {Hess, Jan and Reuter, Christian and Pipek, Volkmar and Wulf, Volker},
year = {2012},
keywords = {HCI, Projekt-InfoStrom, Ranking-CORE-C, A-Paper, Ranking-ImpactFactor, Ranking-VHB-B},
pages = {263--296},
}
[BibTeX] [Abstract] [Download PDF]
The contribution of this paper is to propose a systematization of social software use in crisis situations pointing out different types of cooperation and its challenges. We will discuss how the organizational actors involved in crisis management (police, fire-fighters, organizations etc.) and the affected citizens are communicating and can communicate and collaborate through the use of social software. After defining the term ‘social software‘ we will outline the state-of-the-art about its use in crisis management. Drawing from this, we will present two case studies where we have examined the use of social software in 2010: first during the disruption of air travel caused by the eruptions of the volcano Eyjafjallajökull in Iceland and second during the mass panic at the Love Parade music festival in Germany. Based on both previous work and case studies we will discuss potentials and weaknesses and propose a classification matrix for different types of cooperation as a step towards a systematization of social software use in crisis situations.
@article{reuter_crisis_2012,
title = {Crisis {Management} 2.0: {Towards} a {Systematization} of {Social} {Software} {Use} in {Crisis} {Situations}},
volume = {4},
url = {http://www.peasec.de/paper/2012/2012_ReuterMarxPipek_CrisisManagement20-SystematizationSocialSoftware_IJISCRAM.pdf},
doi = {10.4018/jiscrm.2012010101},
abstract = {The contribution of this paper is to propose a systematization of social software use in crisis situations pointing out different types of cooperation and its challenges. We will discuss how the organizational actors involved in crisis management (police, fire-fighters, organizations etc.) and the affected citizens are communicating and can communicate and collaborate through the use of social software. After defining the term ‘social software' we will outline the state-of-the-art about its use in crisis management. Drawing from this, we will present two case studies where we have examined the use of social software in 2010: first during the disruption of air travel caused by the eruptions of the volcano Eyjafjallajökull in Iceland and second during the mass panic at the Love Parade music festival in Germany. Based on both previous work and case studies we will discuss potentials and weaknesses and propose a classification matrix for different types of cooperation as a step towards a systematization of social software use in crisis situations.},
number = {1},
journal = {International Journal of Information Systems for Crisis Response and Management (IJISCRAM)},
author = {Reuter, Christian and Marx, Alexandra and Pipek, Volkmar},
year = {2012},
keywords = {AuswahlCrisis, Cooperation, Crisis, HCI, Projekt-InfoStrom, Selected, SocialMedia, Student, Projekt-RSBE},
pages = {1--16},
}
2009
[BibTeX] [Abstract] [Download PDF]
Crisis management requires stakeholders not only to show strategic, organisational preparedness for crisis events (e.g., by systematising and professionalising coping with work), but also to develop skills in dealing with unanticipated events and other stakeholders involved in the same crisis. They should not only rely on established information flows and behaviour patterns, but also be able to deal with situational aspects. This usually involves communication work within and between organisations involved in crisis management. We describe the practice of the crisis communication training of a German Electricity Provider (GEP) and the prototype we developed, implemented and evaluated. The collaborative training tool targets not only the local practice, but also interorganisational training that will allow improving the mutual understanding of communication practices and meeting the information needs of other stakeholders.
@article{reuter_avoiding_2009,
title = {Avoiding crisis in communication: a computer-supported training approach for emergency management},
volume = {6},
url = {http://www.peasec.de/paper/2009/2009_ReuterPipekMueller_AvoidingCrisisinCommunication_IJEM.pdf},
abstract = {Crisis management requires stakeholders not only to show strategic, organisational preparedness for crisis events (e.g., by systematising and professionalising coping with work), but also to develop skills in dealing with unanticipated events and other stakeholders involved in the same crisis. They should not only rely on established information flows and behaviour patterns, but also be able to deal with situational aspects. This usually involves communication work within and between organisations involved in crisis management. We describe the practice of the crisis communication training of a German Electricity Provider (GEP) and the prototype we developed, implemented and evaluated. The collaborative training tool targets not only the local practice, but also interorganisational training that will allow improving the mutual understanding of communication practices and meeting the information needs of other stakeholders.},
number = {3-4},
journal = {International Journal of Emergency Management (IJEM)},
author = {Reuter, Christian and Pipek, Volkmar and Mueller, Claudia},
year = {2009},
keywords = {Crisis, HCI, Projekt-RWE},
pages = {356--368},
}
2008
[BibTeX] [Download PDF]
@article{reuter_entwicklung_2008,
title = {Entwicklung eines webbasierten {Dokumentenmanagement}-{Systems} für eine {Fluggesellschaft}},
volume = {50},
url = {http://www.peasec.de/paper/2008/2008_ReuterGeorg_EntwicklungWebbasiertesDMSFluggesellschaft_WI.pdf},
doi = {10.1365/s11576-008-0026-0},
number = {2},
journal = {Journal WIRTSCHAFTSINFORMATIK},
author = {Reuter, Christian and Georg, Christopher},
year = {2008},
keywords = {Cooperation, HCI, Student, A-Paper, Ranking-ImpactFactor, Ranking-VHB-B, Ranking-WKWI-A},
pages = {142--145},
}
Bücher und herausgegebene Zeitschriften / Books and Edited Special Issues in Journals
2024
[BibTeX]
@book{bayer_deep_2024,
address = {Darmstadt, Germany},
title = {Deep {Learning} in {Textual} {Low}-{Data} {Regimes} for {Cybersecurity}},
publisher = {Dissertation (Dr. rer. nat.), Department of Computer Science, Technische Universität Darmstadt},
author = {Bayer, Markus},
year = {2024},
keywords = {Security, Projekt-CYWARN, Projekt-CYLENCE, Dissertation, Projekt-ATHENE-CyAware},
}
[BibTeX]
@book{haesler_citizens_2024,
address = {Darmstadt, Germany},
title = {Citizens in {Crises}: {Behavior}, {Dependencies}, and {Technological} {Support} of {Digital} {Self}-{Organization}},
publisher = {Dissertation (Dr. rer. nat.), Department of Computer Science, Technische Universität Darmstadt},
author = {Haesler, Steffen},
year = {2024},
keywords = {Crisis, HCI, Projekt-emergenCITY, Dissertation},
}
[BibTeX]
@book{hartwig_navigating_2024-1,
address = {Darmstadt, Germany},
title = {Navigating {Misinformation}: {User}-{Centered} {Design} and {Evaluation} of {Indicator}-{Based} {Digital} {Interventions}},
publisher = {Dissertation (Dr.-Ing.), Department of Computer Science, Technische Universität Darmstadt},
author = {Hartwig, Katrin},
year = {2024},
keywords = {Crisis, HCI, Projekt-NEBULA, Dissertation},
}
[BibTeX]
@book{haunschild_enhancing_2024,
address = {Darmstadt, Germany},
title = {Enhancing {Citizens}’ {Role} in {Public} {Safety}: {Interaction}, {Perception} and {Design} of {Mobile} {Warning} {Apps}},
publisher = {Dissertation (Dr. rer. nat.), Department of Computer Science, Technische Universität Darmstadt},
author = {Haunschild, Jasmin},
year = {2024},
keywords = {Crisis, HCI, Projekt-ATHENE-SecUrban, Projekt-emergenCITY, Dissertation},
}
[BibTeX]
@book{haunschild_enhancing_2024-1,
address = {Wiesbaden, Germany},
title = {Enhancing {Citizens}’ {Role} in {Public} {Safety}: {Interaction}, {Perception} and {Design} of {Mobile} {Warning} {Apps}},
publisher = {Springer Vieweg},
author = {Haunschild, Jasmin},
year = {2024},
keywords = {Crisis, HCI, Projekt-ATHENE-SecUrban, Projekt-emergenCITY, DissPublisher},
}
[BibTeX] [Abstract] [Download PDF]
Like many sectors, agriculture is experiencing a continuous digitalization, i.e. an increase in data-driven technologies used. In contrast to companies of other critical infrastructures – e.g. energy or telecommunication – a typical farm is comparatively small and often run as a family business. Accordingly, the demands on farming technology, its implementation, and regulations are different in many terms. Furthermore, the circumstances that influence crisis risks and crisis management are different in agriculture – and as digitalization introduces new potential risks, this process should be reviewed critically. Currently, the most advanced approaches for agriculture are typically referred to as smart farming and agriculture 4.0, which incorporate more precise cultivation with less manual effort. But such new agriculture technology developments usually lack an assessment about its impact on the sector’s resilience and dependencies on other infrastructures. The research domains of crisis informatics and IT security mostly focuses on other topics, apart from agriculture. The resilience research in agriculture itself is currently intensifying, however, this line of research focuses more on problems resulting from the climate crisis and social change. For these reasons it remains unclear, how digitalization impacts the resilience of food production and food safety. Therefore, it is not well researched which technological developments may lead to undesired effects in the future. How modern systems should be designed to allow for both, positive impacts on efficiency, and prevention of negative effects in terms of reduced resilience capacities, is also not answered by current literature. The aim of the present work is to close this research gap at the intersection of agriculture, digitalization, and resilience. To answer the question to what extent current technologies used by farmers are at risk of failure, the dissertation first presents a snapshot of the resilience state of agricultural companies and the technologies used. This involves interviews with stakeholders, mainly farmers, as well as surveying security issues of the LoRaWAN protocol, a transmission technology especially useful for agricultural Internet of Things. Which desires of farmers exist regarding software focusing on aspects of business continuity and secured operations, is another open question. This dissertation aims to also answer this question with empirical methods, mainly focus groups and usability tests. Then the rise of Internet of Things in agriculture raises another question, whether such technologies acquired for smart farming could also have benefits for resilience against internet-connection-lost situations. This question is answered by empirical evaluation of LoRaWAN range characteristics in agricultural landscapes, as well as artifact generation for resilient communication channels on top of LoRaWAN transmission devices. Several findings are derived from the conducted research: There is a lack of understanding of how strong the used tools in agriculture depend on ICT, and many tools require a working internet connection. Moreover, IT employed by agricultural enterprises presents security concerns similar to those encountered in other domains. Based on these findings, developments, and evaluations of new software approaches are presented: Derived design criteria and own system designs that allow for modern data-driven business operations, including IoT integration based on LoRaWAN. The developed solutions show an increase in resilience capacities by enhancing the communication possibilities in crisis situations. The detected low absorption capacities against communication infrastructure outages shows room for improvement. To improve agricultural ITs‘ resilience, software engineers could use the concepts and designs of this dissertation for their product development, like a modular offline-capable farm management storage that allows an exchange of small data in an autarkic manner via commodity LoRaWAN hardware. But also technology advisors and farmers benefit from the technological analyses and suggestions embedded in this work, like using multiple LoRaWAN gateways with an overlapping coverage to mitigate security vulnerabilities.
@book{kuntke_resilient_2024,
address = {Wiesbaden, Germany},
title = {Resilient {Smart} {Farming}: {Crisis}-{Capable} {Information} and {Communication} {Technologies} for {Agriculture}},
isbn = {978-3-658-44156-2},
shorttitle = {Resilient {Smart} {Farming}},
url = {https://link.springer.com/book/10.1007/978-3-658-44157-9},
abstract = {Like many sectors, agriculture is experiencing a continuous digitalization, i.e. an increase in data-driven technologies used. In contrast to companies of other critical infrastructures – e.g. energy or telecommunication – a typical farm is comparatively small and often run as a family business.
Accordingly, the demands on farming technology, its implementation, and regulations are different in many terms.
Furthermore, the circumstances that influence crisis risks and crisis management are different in agriculture – and as digitalization introduces new potential risks, this process should be reviewed critically.
Currently, the most advanced approaches for agriculture are typically referred to as smart farming and agriculture 4.0, which incorporate more precise cultivation with less manual effort.
But such new agriculture technology developments usually lack an assessment about its impact on the sector's resilience and dependencies on other infrastructures.
The research domains of crisis informatics and IT security mostly focuses on other topics, apart from agriculture.
The resilience research in agriculture itself is currently intensifying, however, this line of research focuses more on problems resulting from the climate crisis and social change.
For these reasons it remains unclear, how digitalization impacts the resilience of food production and food safety.
Therefore, it is not well researched which technological developments may lead to undesired effects in the future.
How modern systems should be designed to allow for both, positive impacts on efficiency, and prevention of negative effects in terms of reduced resilience capacities, is also not answered by current literature.
The aim of the present work is to close this research gap at the intersection of agriculture, digitalization, and resilience.
To answer the question to what extent current technologies used by farmers are at risk of failure, the dissertation first presents a snapshot of the resilience state of agricultural companies and the technologies used.
This involves interviews with stakeholders, mainly farmers, as well as surveying security issues of the LoRaWAN protocol, a transmission technology especially useful for agricultural Internet of Things.
Which desires of farmers exist regarding software focusing on aspects of business continuity and secured operations, is another open question.
This dissertation aims to also answer this question with empirical methods, mainly focus groups and usability tests.
Then the rise of Internet of Things in agriculture raises another question, whether such technologies acquired for smart farming could also have benefits for resilience against internet-connection-lost situations.
This question is answered by empirical evaluation of LoRaWAN range characteristics in agricultural landscapes, as well as artifact generation for resilient communication channels on top of LoRaWAN transmission devices.
Several findings are derived from the conducted research:
There is a lack of understanding of how strong the used tools in agriculture depend on ICT, and many tools require a working internet connection.
Moreover, IT employed by agricultural enterprises presents security concerns similar to those encountered in other domains.
Based on these findings, developments, and evaluations of new software approaches are presented:
Derived design criteria and own system designs that allow for modern data-driven business operations, including IoT integration based on LoRaWAN.
The developed solutions show an increase in resilience capacities by enhancing the communication possibilities in crisis situations.
The detected low absorption capacities against communication infrastructure outages shows room for improvement.
To improve agricultural ITs' resilience, software engineers could use the concepts and designs of this dissertation for their product development, like a modular offline-capable farm management storage that allows an exchange of small data in an autarkic manner via commodity LoRaWAN hardware.
But also technology advisors and farmers benefit from the technological analyses and suggestions embedded in this work, like using multiple LoRaWAN gateways with an overlapping coverage to mitigate security vulnerabilities.},
publisher = {Springer Vieweg},
author = {Kuntke, Franz},
year = {2024},
doi = {10.1007/978-3-658-44157-9},
keywords = {Crisis, HCI, UsableSec, Security, RSF, Projekt-ATHENE-SecUrban, Projekt-emergenCITY, DissPublisher},
}
[BibTeX] [Abstract] [Download PDF]
Like many sectors, agriculture is experiencing a continuous digitalization, i.e. an increase in data-driven technologies used. In contrast to companies of other critical infrastructures – e.g. energy or telecommunication – a typical farm is comparatively small and often run as a family business. Accordingly, the demands on farming technology, its implementation, and regulations are different in many terms. Furthermore, the circumstances that influence crisis risks and crisis management are different in agriculture – and as digitalization introduces new potential risks, this process should be reviewed critically. Currently, the most advanced approaches for agriculture are typically referred to as smart farming and agriculture 4.0, which incorporate more precise cultivation with less manual effort. But such new agriculture technology developments usually lack an assessment about its impact on the sector’s resilience and dependencies on other infrastructures. The research domains of crisis informatics and IT security mostly focuses on other topics, apart from agriculture. The resilience research in agriculture itself is currently intensifying, however, this line of research focuses more on problems resulting from the climate crisis and social change. For these reasons it remains unclear, how digitalization impacts the resilience of food production and food safety. Therefore, it is not well researched which technological developments may lead to undesired effects in the future. How modern systems should be designed to allow for both, positive impacts on efficiency, and prevention of negative effects in terms of reduced resilience capacities, is also not answered by current literature. The aim of the present work is to close this research gap at the intersection of agriculture, digitalization, and resilience. To answer the question to what extent current technologies used by farmers are at risk of failure, the dissertation first presents a snapshot of the resilience state of agricultural companies and the technologies used. This involves interviews with stakeholders, mainly farmers, as well as surveying security issues of the LoRaWAN protocol, a transmission technology especially useful for agricultural Internet of Things. Which desires of farmers exist regarding software focusing on aspects of business continuity and secured operations, is another open question. This dissertation aims to also answer this question with empirical methods, mainly focus groups and usability tests. Then the rise of Internet of Things in agriculture raises another question, whether such technologies acquired for smart farming could also have benefits for resilience against internet-connection-lost situations. This question is answered by empirical evaluation of LoRaWAN range characteristics in agricultural landscapes, as well as artifact generation for resilient communication channels on top of LoRaWAN transmission devices. Several findings are derived from the conducted research: There is a lack of understanding of how strong the used tools in agriculture depend on ICT, and many tools require a working internet connection. Moreover, IT employed by agricultural enterprises presents security concerns similar to those encountered in other domains. Based on these findings, developments, and evaluations of new software approaches are presented: Derived design criteria and own system designs that allow for modern data-driven business operations, including IoT integration based on LoRaWAN. The developed solutions show an increase in resilience capacities by enhancing the communication possibilities in crisis situations. The detected low absorption capacities against communication infrastructure outages shows room for improvement. To improve agricultural ITs‘ resilience, software engineers could use the concepts and designs of this dissertation for their product development, like a modular offline-capable farm management storage that allows an exchange of small data in an autarkic manner via commodity LoRaWAN hardware. But also technology advisors and farmers benefit from the technological analyses and suggestions embedded in this work, like using multiple LoRaWAN gateways with an overlapping coverage to mitigate security vulnerabilities.
@book{kuntke_resilient_2024-1,
address = {Darmstadt, Germany},
title = {Resilient {Smart} {Farming}: {Crisis}-{Capable} {Information} and {Communication} {Technologies} for {Agriculture}},
url = {http://tuprints.ulb.tu-darmstadt.de/26496/},
abstract = {Like many sectors, agriculture is experiencing a continuous digitalization, i.e. an increase in data-driven technologies used. In contrast to companies of other critical infrastructures – e.g. energy or telecommunication – a typical farm is comparatively small and often run as a family business.
Accordingly, the demands on farming technology, its implementation, and regulations are different in many terms.
Furthermore, the circumstances that influence crisis risks and crisis management are different in agriculture – and as digitalization introduces new potential risks, this process should be reviewed critically.
Currently, the most advanced approaches for agriculture are typically referred to as smart farming and agriculture 4.0, which incorporate more precise cultivation with less manual effort.
But such new agriculture technology developments usually lack an assessment about its impact on the sector's resilience and dependencies on other infrastructures.
The research domains of crisis informatics and IT security mostly focuses on other topics, apart from agriculture.
The resilience research in agriculture itself is currently intensifying, however, this line of research focuses more on problems resulting from the climate crisis and social change.
For these reasons it remains unclear, how digitalization impacts the resilience of food production and food safety.
Therefore, it is not well researched which technological developments may lead to undesired effects in the future.
How modern systems should be designed to allow for both, positive impacts on efficiency, and prevention of negative effects in terms of reduced resilience capacities, is also not answered by current literature.
The aim of the present work is to close this research gap at the intersection of agriculture, digitalization, and resilience.
To answer the question to what extent current technologies used by farmers are at risk of failure, the dissertation first presents a snapshot of the resilience state of agricultural companies and the technologies used.
This involves interviews with stakeholders, mainly farmers, as well as surveying security issues of the LoRaWAN protocol, a transmission technology especially useful for agricultural Internet of Things.
Which desires of farmers exist regarding software focusing on aspects of business continuity and secured operations, is another open question.
This dissertation aims to also answer this question with empirical methods, mainly focus groups and usability tests.
Then the rise of Internet of Things in agriculture raises another question, whether such technologies acquired for smart farming could also have benefits for resilience against internet-connection-lost situations.
This question is answered by empirical evaluation of LoRaWAN range characteristics in agricultural landscapes, as well as artifact generation for resilient communication channels on top of LoRaWAN transmission devices.
Several findings are derived from the conducted research:
There is a lack of understanding of how strong the used tools in agriculture depend on ICT, and many tools require a working internet connection.
Moreover, IT employed by agricultural enterprises presents security concerns similar to those encountered in other domains.
Based on these findings, developments, and evaluations of new software approaches are presented:
Derived design criteria and own system designs that allow for modern data-driven business operations, including IoT integration based on LoRaWAN.
The developed solutions show an increase in resilience capacities by enhancing the communication possibilities in crisis situations.
The detected low absorption capacities against communication infrastructure outages shows room for improvement.
To improve agricultural ITs' resilience, software engineers could use the concepts and designs of this dissertation for their product development, like a modular offline-capable farm management storage that allows an exchange of small data in an autarkic manner via commodity LoRaWAN hardware.
But also technology advisors and farmers benefit from the technological analyses and suggestions embedded in this work, like using multiple LoRaWAN gateways with an overlapping coverage to mitigate security vulnerabilities.},
publisher = {Dissertation (Dr.-Ing.), Department of Computer Science, Technische Universität Darmstadt},
author = {Kuntke, Franz},
year = {2024},
doi = {10.26083/tuprints-00026496},
keywords = {Crisis, HCI, UsableSec, Security, RSF, Dissertation},
}
[BibTeX]
@book{linsner_privacy_2024,
address = {Darmstadt, Germany},
title = {Privacy {Preserving} {Data} {Management} – {Assisting} {Users} in {Data} {Disclosure} {Scenarios}},
publisher = {Dissertation (Dr.-Ing.), Department of Computer Science, Technische Universität Darmstadt},
author = {Linsner, Sebastian},
year = {2024},
keywords = {UsableSec, Security, Projekt-CROSSING, Dissertation, Projekt-ATHENE-PriVis},
}
[BibTeX] [Abstract] [Download PDF]
Cyberspace, already a few decades old, has become a matter of course for most of us, part of our everyday life. At the same time, this space and the global infrastructure behind it are essential for our civilizations, the economy and administration, and thus an essential expression and lifeline of a globalized world. However, these developments also create vulnerabilities and thus, cyberspace is increasingly developing into an intelligence and military operational area – for the defense and security of states but also as a component of offensive military planning, visible in the creation of military cyber-departments and the integration of cyberspace into states‘ security and defense strategies. In order to contain and regulate the conflict and escalation potential of technology used by military forces, over the last decades, a complex tool set of transparency, de-escalation and arms control measures has been developed and proof-tested. Unfortunately, many of these established measures do not work for cyberspace due to its specific technical characteristics. Even more, the concept of what constitutes a weapon – an essential requirement for regulation – starts to blur for this domain. Against this background, this thesis aims to answer how measures for the de-escalation of state-led conflicts in cyberspace and arms control of cyberweapons can be developed. In order to answer this question, the dissertation takes a specifically technical perspective on these problems and the underlying political challenges of state behavior and international humanitarian law in cyberspace to identify starting points for technical measures of transparency, arms control and verification. Based on this approach of adopting already existing technical measures from other fields of computer science, the thesis will provide proof of concepts approaches for some mentioned challenges like a classification system for cyberweapons that is based on technical measurable features, an approach for the mutual reduction of vulnerability stockpiles and an approach to plausibly assure the non-involvement in a cyberconflict as a measure for de-escalation. All these initial approaches and the questions of how and by which measures arms control and conflict reduction can work for cyberspace are still quite new and subject to not too many debates. Indeed, the approach of deliberately self-restricting the capabilities of technology in order to serve a bigger goal, like the reduction of its destructive usage, is yet not very common for the engineering thinking of computer science. Therefore, this dissertation also aims to provide some impulses regarding the responsibility and creative options of computer science with a view to the peaceful development and use of cyberspace.
@book{reinhold_towards_2024,
address = {Wiesbaden, Germany},
title = {Towards a {Peaceful} {Development} of {Cyberspace}: {Challenges} and {Technical} {Measures} for the {De}-{Escalation} of {State}-{Led} {Cyberconflicts} and {Arms} {Control} of {Cyberweapons}},
isbn = {978-3-658-43950-7},
url = {https://link.springer.com/book/10.1007/978-3-658-43951-4},
abstract = {Cyberspace, already a few decades old, has become a matter of course for most of us, part of our everyday life. At the same time, this space and the global infrastructure behind it are essential for our civilizations, the economy and administration, and thus an essential expression and lifeline of a globalized world. However, these developments also create vulnerabilities and thus, cyberspace is increasingly developing into an intelligence and military operational area – for the defense and security of states but also as a component of offensive military planning, visible in the creation of military cyber-departments and the integration of cyberspace into states' security and defense strategies. In order to contain and regulate the conflict and escalation potential of technology used by military forces, over the last decades, a complex tool set of transparency, de-escalation and arms control measures has been developed and proof-tested. Unfortunately, many of these established measures do not work for cyberspace due to its specific technical characteristics. Even more, the concept of what constitutes a weapon – an essential requirement for regulation – starts to blur for this domain. Against this background, this thesis aims to answer how measures for the de-escalation of state-led conflicts in cyberspace and arms control of cyberweapons can be developed. In order to answer this question, the dissertation takes a specifically technical perspective on these problems and the underlying political challenges of state behavior and international humanitarian law in cyberspace to identify starting points for technical measures of transparency, arms control and verification. Based on this approach of adopting already existing technical measures from other fields of computer science, the thesis will provide proof of concepts approaches for some mentioned challenges like a classification system for cyberweapons that is based on technical measurable features, an approach for the mutual reduction of vulnerability stockpiles and an approach to plausibly assure the non-involvement in a cyberconflict as a measure for de-escalation. All these initial approaches and the questions of how and by which measures arms control and conflict reduction can work for cyberspace are still quite new and subject to not too many debates. Indeed, the approach of deliberately self-restricting the capabilities of technology in order to serve a bigger goal, like the reduction of its destructive usage, is yet not very common for the engineering thinking of computer science. Therefore, this dissertation also aims to provide some impulses regarding the responsibility and creative options of computer science with a view to the peaceful development and use of cyberspace.},
publisher = {Springer Vieweg},
author = {Reinhold, Thomas},
year = {2024},
doi = {10.1007/978-3-658-43951-4},
keywords = {Security, Peace, Projekt-CROSSING, Projekt-ATHENE, DissPublisher},
}
[BibTeX]
@book{reuter_information_2024,
address = {Wiesbaden, Germany},
edition = {2},
title = {Information {Technology} for {Peace} and {Security} - {IT} {Applications} and {Infrastructures} in {Conflicts}, {Crises}, {War}, and {Peace}},
publisher = {Springer Vieweg},
author = {Reuter, Christian},
year = {2024},
keywords = {Selected, Security, Peace, Infrastructure, Projekt-CROSSING, AuswahlPeace, Cyberwar, Projekt-TraCe},
}
[BibTeX]
@book{reuter_special_2024,
title = {Special {Issue} on {Combating} {Information} {Warfare}: {User}-{Centered} {Countermeasures} against {Fake} {News} and {Misinformation} - {Behaviour} \& {Information} {Technology} ({BIT})},
publisher = {Taylor \& Francis},
author = {Reuter, Christian and Hughes, Amanda Lee and Buntain, Cody},
year = {2024},
note = {Publication Title: Behaviour \& Information Technology (BIT)},
keywords = {Crisis, HCI, SocialMedia, A-Paper, Ranking-ImpactFactor, Ranking-CORE-A, Peace},
}
2023
[BibTeX] [Abstract] [Download PDF]
Cyberspace, already a few decades old, has become a matter of course for most of us, part of our everyday life. At the same time, this space and the global infrastructure behind it are essential for our civilizations, the economy and administration, and thus an essential expression and lifeline of a globalized world. However, these developments also create vulnerabilities and thus, cyberspace is increasingly developing into an intelligence and military operational area – for the defense and security of states but also as a component of offensive military planning, visible in the creation of military cyber-departments and the integration of cyberspace into states‘ security and defense strategies. In order to contain and regulate the conflict and escalation potential of technology used by military forces, over the last decades, a complex tool set of transparency, de-escalation and arms control measures has been developed and proof-tested. Unfortunately, many of these established measures do not work for cyberspace due to its specific technical characteristics. Even more, the concept of what constitutes a weapon – an essential requirement for regulation – starts to blur for this domain. Against this background, this thesis aims to answer how measures for the de-escalation of state-led conflicts in cyberspace and arms control of cyberweapons can be developed. In order to answer this question, the dissertation takes a specifically technical perspective on these problems and the underlying political challenges of state behavior and international humanitarian law in cyberspace to identify starting points for technical measures of transparency, arms control and verification. Based on this approach of adopting already existing technical measures from other fields of computer science, the thesis will provide proof of concepts approaches for some mentioned challenges like a classification system for cyberweapons that is based on technical measurable features, an approach for the mutual reduction of vulnerability stockpiles and an approach to plausibly assure the non-involvement in a cyberconflict as a measure for de-escalation. All these initial approaches and the questions of how and by which measures arms control and conflict reduction can work for cyberspace are still quite new and subject to not too many debates. Indeed, the approach of deliberately self-restricting the capabilities of technology in order to serve a bigger goal, like the reduction of its destructive usage, is yet not very common for the engineering thinking of computer science. Therefore, this dissertation also aims to provide some impulses regarding the responsibility and creative options of computer science with a view to the peaceful development and use of cyberspace.
@book{reinhold_towards_2023,
address = {Darmstadt, Germany},
title = {Towards a {Peaceful} {Development} of {Cyberspace}: {Challenges} and {Technical} {Measures} for the {De}-{Escalation} of {State}-{Led} {Cyberconflicts} and {Arms} {Control} of {Cyberweapons}},
url = {https://tuprints.ulb.tu-darmstadt.de/24559/},
abstract = {Cyberspace, already a few decades old, has become a matter of course for most of us, part of our everyday life. At the same time, this space and the global infrastructure behind it are essential for our civilizations, the economy and administration, and thus an essential expression and lifeline of a globalized world. However, these developments also create vulnerabilities and thus, cyberspace is increasingly developing into an intelligence and military operational area – for the defense and security of states but also as a component of offensive military planning, visible in the creation of military cyber-departments and the integration of cyberspace into states' security and defense strategies. In order to contain and regulate the conflict and escalation potential of technology used by military forces, over the last decades, a complex tool set of transparency, de-escalation and arms control measures has been developed and proof-tested. Unfortunately, many of these established measures do not work for cyberspace due to its specific technical characteristics. Even more, the concept of what constitutes a weapon – an essential requirement for regulation – starts to blur for this domain. Against this background, this thesis aims to answer how measures for the de-escalation of state-led conflicts in cyberspace and arms control of cyberweapons can be developed. In order to answer this question, the dissertation takes a specifically technical perspective on these problems and the underlying political challenges of state behavior and international humanitarian law in cyberspace to identify starting points for technical measures of transparency, arms control and verification. Based on this approach of adopting already existing technical measures from other fields of computer science, the thesis will provide proof of concepts approaches for some mentioned challenges like a classification system for cyberweapons that is based on technical measurable features, an approach for the mutual reduction of vulnerability stockpiles and an approach to plausibly assure the non-involvement in a cyberconflict as a measure for de-escalation. All these initial approaches and the questions of how and by which measures arms control and conflict reduction can work for cyberspace are still quite new and subject to not too many debates. Indeed, the approach of deliberately self-restricting the capabilities of technology in order to serve a bigger goal, like the reduction of its destructive usage, is yet not very common for the engineering thinking of computer science. Therefore, this dissertation also aims to provide some impulses regarding the responsibility and creative options of computer science with a view to the peaceful development and use of cyberspace.},
publisher = {Dissertation (Dr. rer. nat.), Department of Computer Science, Technische Universität Darmstadt},
author = {Reinhold, Thomas},
year = {2023},
doi = {10.26083/tuprints-00024559},
keywords = {Security, Peace, Projekt-CROSSING, Projekt-ATHENE, Dissertation},
}
[BibTeX] [Abstract] [Download PDF]
The conference Science · Peace · Security ’23 took place from September 20 to 22, 2023, at the Georg-Christoph-Lichtenberg-Haus of the Technical University of Darmstadt. It focused on the transformation of technologies, their role in wars and conflicts, and issues related to arms control. The three-day scientific conference welcomed over 110 participants from Germany and speakers from the United Kingdom, Sweden, the USA, Colombia, India, Italy, Switzerland, Norway, the Czech Republic, Iraq, Austria, and the Netherlands. More than 50 different organizations were represented, ensuring interdisciplinary exchange. The program covered a wide range of topics reflecting societal discourses in light of a changing global security landscape. In total, the conference featured 40 presentations, workshops, discussions, and panels that discussed current and future challenges in the field of technical peace and conflict research. Particularly relevant topics included: Artificial Intelligence, Unmanned Weapons Systems, Rocket and Space Technologies (Nuclear) Arms Control, Regulation of Biological and Chemical Weapons, Information Technologies for Surveillance and Oppression of Civilians, (Civilian) Critical Infrastructures, Digital Peacebuilding, Human-Machine Interaction, Dual-Used, Cyber Attacks and Relevant Technology and Security Policies.
@book{reuter_science_2023,
address = {Darmstadt, Germany},
title = {Science {Peace} {Security} ‘23 - {Proceedings} of the {Interdisciplinary} {Conference} on {Technical} {Peace} and {Security} {Research}},
url = {https://tuprints.ulb.tu-darmstadt.de/id/eprint/24777},
abstract = {The conference Science · Peace · Security '23 took place from September 20 to 22, 2023, at the Georg-Christoph-Lichtenberg-Haus of the Technical University of Darmstadt. It focused on the transformation of technologies, their role in wars and conflicts, and issues related to arms control. The three-day scientific conference welcomed over 110 participants from Germany and speakers from the United Kingdom, Sweden, the USA, Colombia, India, Italy, Switzerland, Norway, the Czech Republic, Iraq, Austria, and the Netherlands. More than 50 different organizations were represented, ensuring interdisciplinary exchange. The program covered a wide range of topics reflecting societal discourses in light of a changing global security landscape. In total, the conference featured 40 presentations, workshops, discussions, and panels that discussed current and future challenges in the field of technical peace and conflict research. Particularly relevant topics included: Artificial Intelligence, Unmanned Weapons Systems, Rocket and Space Technologies (Nuclear) Arms Control, Regulation of Biological and Chemical Weapons, Information Technologies for Surveillance and Oppression of Civilians, (Civilian) Critical Infrastructures, Digital Peacebuilding, Human-Machine Interaction, Dual-Used, Cyber Attacks and Relevant Technology and Security Policies.},
publisher = {TUprints},
author = {Reuter, Christian and Riebe, Thea and Guntrum, Laura},
year = {2023},
doi = {10.26083/tuprints-00024777},
keywords = {Security, Peace, Projekt-CROSSING, Projekt-TraCe},
}
[BibTeX] [Abstract] [Download PDF]
Technologies that can be used in military and civilian applications are referred to as dual-use. The dual-use nature of many information and communications technologies (ICTs) raises new questions for research and development for national, international, and human security. Measures to deal with the risks associated with the various dual-use technologies, including proliferation control, design approaches, and policy measures, vary widely. For example, Autonomous Weapon Systems (AWS) have not yet been regulated, while cryptographic products are subject to export and import controls. Innovations in artificial intelligence (AI), robotics, cybersecurity, and automated analysis of publicly available data raise new questions about their respective dual-use risks. Dual-use risks have been systematically discussed so far, especially in the life sciences, which have contributed to the development of methods for assessment and risk management. Dual-use risks arise, among other things, from the fact that safety-critical technologies can be easily disseminated or modified, as well as used as part of a weapon system. Therefore, the development and adaptation of robots and software requires an independent consideration that builds on the insights of related dual-use discourses. Therefore, this dissertation considers the management of such risks in terms of the proliferation, regulation, and design of individual dual-use information technologies. Technology Assessment (TA) is the epistemological framework for this work, bringing together the concepts and approaches of Critical Security Studies (CSS) and Human-Computer Interaction (HCI) to help evaluate and shape dual-use technologies. In order to identify the diffusion of dual-use at an early stage, the dissertation first examines the diffusion of dual-use innovations between civilian and military research in expert networks on LinkedIn, as well as on the basis of AI patents in a patent network. The results show low diffusion and tend to confirm existing studies on diffusion in patent networks. In the following section, the regulation of dual-use technologies is examined in the paper through two case studies. The first study uses a discourse analysis to show the value conflicts with regard to the regulation of autonomous weapons systems using the concept of Meaningful Human Control (MHC), while a second study, as a long-term comparative case study, analyzes the change and consequences of the regulation of strong cryptography in the U.S. as well as the programs of intelligence agencies for mass surveillance. Both cases point to the central role of private companies, both in the production of AWS and as intermediaries for the dissemination of encryption, as well as surveillance intermediaries. Subsequently, the dissertation examines the design of a dual-use technology using an Open Source Intelligence System (OSINT) for cybersecurity. For this purpose, conceptual, empirical, and technical studies are conducted as part of the Value-Sensitive Design (VSD) framework. During the studies, implications for research on and design of OSINT were identified. For example, the representative survey of the German population has shown that transparency of use while reducing mistrust is associated with higher acceptance of such systems. Additionally, it has been shown that data sparsity through the use of expert networks has many positive effects, not only improving the performance of the system, but is also preferable for legal and social reasons. Thus, the work contributes to the understanding of specific dual-use risks of AI, the regulation of AWS and cryptography, and the design of OSINT in cybersecurity. By combining concepts from CSS and participatory design methods in HCI, this work provides an interdisciplinary and multi-method contribution.
@book{riebe_technology_2023,
address = {Darmstadt, Germany},
title = {Technology {Assessment} of {Dual}-{Use} {ICTs} – {How} to assess {Diffusion}, {Governance} and {Design}},
url = {https://tuprints.ulb.tu-darmstadt.de/22849/},
abstract = {Technologies that can be used in military and civilian applications are referred to as dual-use. The dual-use nature of many information and communications technologies (ICTs) raises new questions for research and development for national, international, and human security. Measures to deal with the risks associated with the various dual-use technologies, including proliferation control, design approaches, and policy measures, vary widely. For example, Autonomous Weapon Systems (AWS) have not yet been regulated, while cryptographic products are subject to export and import controls. Innovations in artificial intelligence (AI), robotics, cybersecurity, and automated analysis of publicly available data raise new questions about their respective dual-use risks.
Dual-use risks have been systematically discussed so far, especially in the life sciences, which have contributed to the development of methods for assessment and risk management. Dual-use risks arise, among other things, from the fact that safety-critical technologies can be easily disseminated or modified, as well as used as part of a weapon system. Therefore, the development and adaptation of robots and software requires an independent consideration that builds on the insights of related dual-use discourses. Therefore, this dissertation considers the management of such risks in terms of the proliferation, regulation, and design of individual dual-use information technologies. Technology Assessment (TA) is the epistemological framework for this work, bringing together the concepts and approaches of Critical Security Studies (CSS) and Human-Computer Interaction (HCI) to help evaluate and shape dual-use technologies.
In order to identify the diffusion of dual-use at an early stage, the dissertation first examines the diffusion of dual-use innovations between civilian and military research in expert networks on LinkedIn, as well as on the basis of AI patents in a patent network. The results show low diffusion and tend to confirm existing studies on diffusion in patent networks. In the following section, the regulation of dual-use technologies is examined in the paper through two case studies. The first study uses a discourse analysis to show the value conflicts with regard to the regulation of autonomous weapons systems using the concept of Meaningful Human Control (MHC), while a second study, as a long-term comparative case study, analyzes the change and consequences of the regulation of strong cryptography in the U.S. as well as the programs of intelligence agencies for mass surveillance. Both cases point to the central role of private companies, both in the production of AWS and as intermediaries for the dissemination of encryption, as well as surveillance intermediaries. Subsequently, the dissertation examines the design of a dual-use technology using an Open Source Intelligence System (OSINT) for cybersecurity. For this purpose, conceptual, empirical, and technical studies are conducted as part of the Value-Sensitive Design (VSD) framework. During the studies, implications for research on and design of OSINT were identified. For example, the representative survey of the German population has shown that transparency of use while reducing mistrust is associated with higher acceptance of such systems. Additionally, it has been shown that data sparsity through the use of expert networks has many positive effects, not only improving the performance of the system, but is also preferable for legal and social reasons. Thus, the work contributes to the understanding of specific dual-use risks of AI, the regulation of AWS and cryptography, and the design of OSINT in cybersecurity. By combining concepts from CSS and participatory design methods in HCI, this work provides an interdisciplinary and multi-method contribution.},
publisher = {Dissertation (Dr. rer. nat.), Department of Computer Science, Technische Universität Darmstadt},
author = {Riebe, Thea},
year = {2023},
doi = {10.26083/tuprints-00022849},
keywords = {HCI, Projekt-KontiKat, Peace, Projekt-DualUse, Projekt-CYWARN, Dissertation},
}
[BibTeX] [Abstract] [Download PDF]
Technologies that can be used in military and civilian applications are referred to as dual-use. The dual-use nature of many information and communications technologies (ICTs) raises new questions for research and development for national, international, and human security. Measures to deal with the risks associated with the various dual-use technologies, including proliferation control, design approaches, and policy measures, vary widely. For example, Autonomous Weapon Systems (AWS) have not yet been regulated, while cryptographic products are subject to export and import controls. Innovations in artificial intelligence (AI), robotics, cybersecurity, and automated analysis of publicly available data raise new questions about their respective dual-use risks. Dual-use risks have been systematically discussed so far, especially in the life sciences, which have contributed to the development of methods for assessment and risk management. Dual-use risks arise, among other things, from the fact that safety-critical technologies can be easily disseminated or modified, as well as used as part of a weapon system. Therefore, the development and adaptation of robots and software requires an independent consideration that builds on the insights of related dual-use discourses. Therefore, this dissertation considers the management of such risks in terms of the proliferation, regulation, and design of individual dual-use information technologies. Technology Assessment (TA) is the epistemological framework for this work, bringing together the concepts and approaches of Critical Security Studies (CSS) and Human-Computer Interaction (HCI) to help evaluate and shape dual-use technologies. In order to identify the diffusion of dual-use at an early stage, the dissertation first examines the diffusion of dual-use innovations between civilian and military research in expert networks on LinkedIn, as well as on the basis of AI patents in a patent network. The results show low diffusion and tend to confirm existing studies on diffusion in patent networks. In the following section, the regulation of dual-use technologies is examined in the paper through two case studies. The first study uses a discourse analysis to show the value conflicts with regard to the regulation of autonomous weapons systems using the concept of Meaningful Human Control (MHC), while a second study, as a long-term comparative case study, analyzes the change and consequences of the regulation of strong cryptography in the U.S. as well as the programs of intelligence agencies for mass surveillance. Both cases point to the central role of private companies, both in the production of AWS and as intermediaries for the dissemination of encryption, as well as surveillance intermediaries. Subsequently, the dissertation examines the design of a dual-use technology using an Open Source Intelligence System (OSINT) for cybersecurity. For this purpose, conceptual, empirical, and technical studies are conducted as part of the Value-Sensitive Design (VSD) framework. During the studies, implications for research on and design of OSINT were identified. For example, the representative survey of the German population has shown that transparency of use while reducing mistrust is associated with higher acceptance of such systems. Additionally, it has been shown that data sparsity through the use of expert networks has many positive effects, not only improving the performance of the system, but is also preferable for legal and social reasons. Thus, the work contributes to the understanding of specific dual-use risks of AI, the regulation of AWS and cryptography, and the design of OSINT in cybersecurity. By combining concepts from CSS and participatory design methods in HCI, this work provides an interdisciplinary and multi-method contribution.
@book{riebe_technology_2023-1,
address = {Wiesbaden, Germany},
title = {Technology {Assessment} of {Dual}-{Use} {ICTs} – {How} to assess {Diffusion}, {Governance} and {Design}},
isbn = {978-3-658-41666-9},
url = {https://link.springer.com/book/10.1007/978-3-658-41667-6},
abstract = {Technologies that can be used in military and civilian applications are referred to as dual-use. The dual-use nature of many information and communications technologies (ICTs) raises new questions for research and development for national, international, and human security. Measures to deal with the risks associated with the various dual-use technologies, including proliferation control, design approaches, and policy measures, vary widely. For example, Autonomous Weapon Systems (AWS) have not yet been regulated, while cryptographic products are subject to export and import controls. Innovations in artificial intelligence (AI), robotics, cybersecurity, and automated analysis of publicly available data raise new questions about their respective dual-use risks.
Dual-use risks have been systematically discussed so far, especially in the life sciences, which have contributed to the development of methods for assessment and risk management. Dual-use risks arise, among other things, from the fact that safety-critical technologies can be easily disseminated or modified, as well as used as part of a weapon system. Therefore, the development and adaptation of robots and software requires an independent consideration that builds on the insights of related dual-use discourses. Therefore, this dissertation considers the management of such risks in terms of the proliferation, regulation, and design of individual dual-use information technologies. Technology Assessment (TA) is the epistemological framework for this work, bringing together the concepts and approaches of Critical Security Studies (CSS) and Human-Computer Interaction (HCI) to help evaluate and shape dual-use technologies.
In order to identify the diffusion of dual-use at an early stage, the dissertation first examines the diffusion of dual-use innovations between civilian and military research in expert networks on LinkedIn, as well as on the basis of AI patents in a patent network. The results show low diffusion and tend to confirm existing studies on diffusion in patent networks. In the following section, the regulation of dual-use technologies is examined in the paper through two case studies. The first study uses a discourse analysis to show the value conflicts with regard to the regulation of autonomous weapons systems using the concept of Meaningful Human Control (MHC), while a second study, as a long-term comparative case study, analyzes the change and consequences of the regulation of strong cryptography in the U.S. as well as the programs of intelligence agencies for mass surveillance. Both cases point to the central role of private companies, both in the production of AWS and as intermediaries for the dissemination of encryption, as well as surveillance intermediaries. Subsequently, the dissertation examines the design of a dual-use technology using an Open Source Intelligence System (OSINT) for cybersecurity. For this purpose, conceptual, empirical, and technical studies are conducted as part of the Value-Sensitive Design (VSD) framework. During the studies, implications for research on and design of OSINT were identified. For example, the representative survey of the German population has shown that transparency of use while reducing mistrust is associated with higher acceptance of such systems. Additionally, it has been shown that data sparsity through the use of expert networks has many positive effects, not only improving the performance of the system, but is also preferable for legal and social reasons. Thus, the work contributes to the understanding of specific dual-use risks of AI, the regulation of AWS and cryptography, and the design of OSINT in cybersecurity. By combining concepts from CSS and participatory design methods in HCI, this work provides an interdisciplinary and multi-method contribution.},
publisher = {Springer Vieweg},
author = {Riebe, Thea},
year = {2023},
doi = {10.1007/978-3-658-41667-6},
keywords = {HCI, Projekt-KontiKat, Peace, Projekt-DualUse, Projekt-CYWARN, DissPublisher},
}
2022
[BibTeX] [Abstract] [Download PDF]
The EU’s subsea data cable network is both vital for global connectivity and vulnerable. This study provides a systematic review of the current security threats, as well as the actors at the origin of these threats. Building on reports and expert input, the paper takes stock of current awareness, preparedness and response mechanisms, both at the EU and Member State level. A number of recommendations suggest how to improve the resilience of the cable network. Proposals build on the need to enhance EU-wide awareness, improve coordination and share information across EU institutions and Member States. In addition, surveillance capabilities must be advanced, response and repair mechanisms strengthened, and the topic mainstreamed across external action.
@book{bueger_security_2022,
address = {Brussels},
title = {Security threats to undersea communications cables and infrastructure – consequences for the {EU}},
url = {https://www.europarl.europa.eu/thinktank/en/document/EXPO_IDA(2022)702557},
abstract = {The EU’s subsea data cable network is both vital for global connectivity and vulnerable. This study provides a systematic review of the current security threats, as well as the actors at the origin of these threats. Building on reports and expert input, the paper takes stock of current awareness, preparedness and response mechanisms, both at the EU and Member State level. A number of recommendations suggest how to improve the resilience of the cable network. Proposals build on the need to enhance EU-wide awareness, improve coordination and share information across EU institutions and Member States. In addition, surveillance capabilities must be advanced, response and repair mechanisms strengthened, and the topic mainstreamed across external action.},
publisher = {European Parliament},
author = {Bueger, Christian and Liebetrau, Tobias and Franken, Jonas},
year = {2022},
keywords = {Student, Security, Infrastructure, Cyberwar, Projekt-ATHENE-SecUrban, Projekt-emergenCITY},
}
[BibTeX] [Abstract] [Download PDF]
The impact of the rapid technological change on peace and security continuously grows and becomes increasingly complex. Against the background of a quickly deteriorating security environment, the international conference SCIENCE · PEACE · SECURITY ’21 (RWTH Aachen University, 8-10 September 2021) examined the role of emerging technologies. The 60 speakers and 220 participants came from the natural, technical and social sciences. Diplomats and representatives from international organisations participated in the discussions. Topics included nuclear, chemical and biological arms control, autonomy in weapon systems, cybersecurity and the militarization of space among others. The main outcome was that all of these issues could be more effectively addressed by new approaches to rigorous interdisciplinary research collaboration to create policy-relevant knowledge and by tightening the nexus between the scientist and policy communities. Both can only be achieved and sustained by funding novel structures that enable scientific-technical scholars to engage on these topics. Key problems to be addressed by integrating natural, technical and social science perspectives include early risk assessment of potential dual-use research and technologies – especially in bio-security and epidemiology as well as IT and robotic research. Ways forward are the inclusion of norms into technology design as well as addressing questions of responsibility and standards. For military-usable technologies, entirely new regulatory approaches are necessary to prevent escalatory dynamics and to maintain accountability structures, moving from object-based to behaviour-based approaches. Scientific-technical research contributes to peace and security in positive ways. A prominent example are nuclear verification techniques. While instruments to monitor nonproliferation and test ban commitments benefit from further improvement, many gaps on how to verify future arms control and disarmament agreements still exist and must be urgently closed. The best cutting-edge scientific and academic expertise that is required for these complex research tasks is found in universities and other independent research institutes. Typically, however, decisionmakers draw knowledge from governmental institutions because of ease and existing connections. Therefore, efforts should be made to better connect the policy and academic communities. Communication between both can be improved by meeting on a regular basis and not only when advice on a specific issue is sought. This can foster more stable relationships and increase an understanding of each other. Lastly, opportunities should be improved for the younger generation of scientists and technologists to engage with policymakers. It is crucial to educate and engage early-on the next generation of scientifically-literate policymakers and security-aware scientists.
@book{gottsche_conference_2022,
address = {Aachen},
title = {Conference {Proceedings} : {Science}, {Peace}, {Security} '21 : {The} {Impact} of new {Technologies}: {Destabilizing} or {Enabling} {Resilience}? : 8-10 {September} 2021},
url = {https://peasec.de/paper/2022/2022_Goettscheetal_ProceedingsSciencePeaceSecurity21ImpactOfNewTechnologies.pdf},
abstract = {The impact of the rapid technological change on peace and security continuously grows and becomes increasingly complex. Against the background of a quickly deteriorating security environment, the international conference SCIENCE · PEACE · SECURITY ’21 (RWTH Aachen University, 8-10 September 2021) examined the role of emerging technologies. The 60 speakers and 220 participants came from the natural, technical and social sciences. Diplomats and representatives from international organisations participated in the discussions. Topics included nuclear, chemical and biological arms control, autonomy in weapon systems, cybersecurity and the militarization of space among others.
The main outcome was that all of these issues could be more effectively addressed by new approaches to rigorous interdisciplinary research collaboration to create policy-relevant knowledge and by tightening the nexus between the scientist and policy communities. Both can only be achieved and sustained by funding novel structures that enable scientific-technical scholars to engage on these topics.
Key problems to be addressed by integrating natural, technical and social science perspectives include early risk assessment of potential dual-use research and technologies – especially in bio-security and epidemiology as well as IT and robotic research. Ways forward are the inclusion of norms into technology design as well as addressing questions of responsibility and standards. For military-usable technologies, entirely new regulatory approaches are necessary to prevent escalatory dynamics and to maintain accountability structures, moving from object-based to behaviour-based approaches.
Scientific-technical research contributes to peace and security in positive ways. A prominent example are nuclear verification techniques. While instruments to monitor nonproliferation and test ban commitments benefit from further improvement, many gaps on how to verify future arms control and disarmament agreements still exist and must be urgently closed.
The best cutting-edge scientific and academic expertise that is required for these complex research tasks is found in universities and other independent research institutes. Typically, however, decisionmakers draw knowledge from governmental institutions because of ease and existing connections. Therefore, efforts should be made to better connect the policy and academic communities. Communication between both can be improved by meeting on a regular basis and not only when advice on a specific issue is sought. This can foster more stable relationships and increase an understanding of each other.
Lastly, opportunities should be improved for the younger generation of scientists and technologists to engage with policymakers. It is crucial to educate and engage early-on the next generation of scientifically-literate policymakers and security-aware scientists.},
publisher = {RWTH Aachen University},
author = {Göttsche, Malte and Bauer, Sibylle and Dahlmann, Anja and Frieß, Friederike and Lentzos, Filippa and Neuneck, Götz and Niemeyer, Irmgard and Riebe, Thea and Silomon, Jantje and Reuter, Christian and Brochhaus, Jakob and Rademacher, Lukas},
year = {2022},
doi = {10.18154/RWTH-2022-02256},
keywords = {Peace},
}
[BibTeX] [Abstract] [Download PDF]
Information and communication technologies (ICT), including artificial intelligence, internet of things, and mobile applications can be utilized to tackle important societal challenges, such as the ongoing COVID-19 pandemic. While they may increase societal resilience, their design, functionality, and underlying infrastructures must be resilient against disruptions caused by anthropogenic, natural and hybrid crises, emergencies, and threats. In order to research challenges, designs, and potentials of interactive technologies, this workshop investigated the space of mobile technologies and resilient systems for crisis response, including the application domains of cyber threat and pandemic response.
@book{kaufhold_proceedings_2022,
address = {Darmstadt},
title = {Proceedings of the 2nd {Workshop} on {Mobile} {Resilience}: {Designing} {Interactive} {Systems} for {Crisis} {Response}},
url = {http://www.peasec.de/paper/2022/2022_KaufholdReuterComesMirbabaieStieglitz_Proceedings2ndWorkshopMobileResilience.pdf},
abstract = {Information and communication technologies (ICT), including artificial intelligence, internet of things, and mobile applications can be utilized to tackle important societal challenges, such as the ongoing COVID-19 pandemic. While they may increase societal resilience, their design, functionality, and underlying infrastructures must be resilient against disruptions caused by anthropogenic, natural and hybrid crises, emergencies, and threats. In order to research challenges, designs, and potentials of interactive technologies, this workshop investigated the space of mobile technologies and resilient systems for crisis response, including the application domains of cyber threat and pandemic response.},
publisher = {TUprints},
author = {Kaufhold, Marc-André and Reuter, Christian and Comes, Tina and Mirabaie, Milad and Stieglitz, Stefan},
year = {2022},
keywords = {Crisis, Projekt-CYWARN},
}
[BibTeX] [Abstract] [Download PDF]
Die 2001 ins Leben gerufene Konferenz „Mensch und Computer“ (MuC) ist die größte Tagungsreihe der Mensch-Computer-Interaktion in Europa. Teilnehmenden aus Wissenschaft und Industrie bietet die MuC eine Plattform für Beiträge und Diskussionen zu innovativen Formen der Interaktion zwischen Menschen und digitaler Technik, zu nutzerorientierten Entwicklungsmethoden, interaktiven Anwendungen und weiteren Themen aus dem Spannungsfeld zwischen Nutzenden, Teams und Communities einerseits sowie den genutzten Informations- und Kommunikationstechnologien andererseits. Ziel der Tagung ist es, innovative Forschungsergebnisse zu diskutieren, den Informationsaustausch zwischen Wissenschaft und Praxis zu fördern, Forschungsaktivitäten und Ausbildung anzuregen sowie Wissenschaft, Praxis und Öffentlichkeit für die Relevanz nutzungs- und aufgabengerechter Technikgestaltung zu sensibilisieren. Hauptsächlich englischsprachige Fachbeiträge und deren Veröffentlichung in der „ACM Digital Library“ bzw. Digitalen Bibliothek der GI fördern die weltweite Sichtbarkeit der wissenschaftlichen Resultate der MuC.
@book{muhlhauser_proceedings_2022,
title = {Proceedings of {Mensch} und {Computer} 2022: {Facing} {Realities}},
isbn = {978-1-4503-9690-5},
url = {https://dl.acm.org/doi/proceedings/10.1145/3543758},
abstract = {Die 2001 ins Leben gerufene Konferenz „Mensch und Computer“ (MuC) ist die größte Tagungsreihe der
Mensch-Computer-Interaktion in Europa. Teilnehmenden aus Wissenschaft und Industrie bietet die MuC
eine Plattform für Beiträge und Diskussionen zu innovativen Formen der Interaktion zwischen Menschen und digitaler Technik, zu nutzerorientierten Entwicklungsmethoden, interaktiven Anwendungen und weiteren Themen aus dem Spannungsfeld zwischen Nutzenden, Teams und Communities einerseits sowie den genutzten Informations- und Kommunikationstechnologien andererseits. Ziel der Tagung ist es, innovative Forschungsergebnisse zu diskutieren, den Informationsaustausch zwischen Wissenschaft und Praxis zu fördern, Forschungsaktivitäten und Ausbildung anzuregen sowie Wissenschaft, Praxis und Öffentlichkeit
für die Relevanz nutzungs- und aufgabengerechter Technikgestaltung zu sensibilisieren. Hauptsächlich englischsprachige Fachbeiträge und deren Veröffentlichung in der „ACM Digital Library“ bzw. Digitalen Bibliothek der GI fördern die weltweite Sichtbarkeit der wissenschaftlichen Resultate der MuC.},
publisher = {ACM},
author = {Mühlhäuser, Max and Reuter, Christian and Pfleging, Bastian and Kosch, Thomas and Matviienko, Andrii and Gerling, Katrin and Mayer, Sven and Heuten, Wilko and Döring, Tanja and Müller, Florian and Schmitz, Martin},
year = {2022},
keywords = {HCI, UsableSec},
}
[BibTeX] [Download PDF]
@book{reuter_special_2022,
title = {Special {Issue} on {Usable} {Security} and {Privacy} with {User}-{Centered} {Interventions} and {Transparency} {Mechanisms} - {Behaviour} \& {Information} {Technology} ({BIT})},
url = {https://www.tandfonline.com/toc/tbit20/41/10?nav=tocList},
publisher = {Taylor \& Francis},
author = {Reuter, Christian and Lo Iacono, Luigi and Benlian, Alexander},
year = {2022},
note = {Publication Title: Behaviour \& Information Technology (BIT)},
keywords = {Crisis, HCI, SocialMedia, UsableSec, A-Paper, Ranking-ImpactFactor, Ranking-CORE-A, Peace},
}
[BibTeX] [Abstract] [Download PDF]
Mobilising helpers in the event of a flood or letting friends know that you are okay in the event of a terrorist attack – more and more people are using social media in emergency, crisis or disaster situations. Storms, floods, attacks or pandemics (esp. COVID-19) show that citizens use social media to inform themselves or to coordinate. This thesis presents qualitative and quantitative studies on the attitudes of emergency services and citizens in Europe towards social media in emergencies. Across the individual sub-studies, almost 10,000 people are surveyed including representative studies in the Netherlands, Germany, the UK and Italy. The work empirically shows that social media is increasingly important for emergency services, both for prevention and during crises; that private use of social media is a driving force in shaping opinions for organisational use; and that citizens have high expectations towards authorities, especially monitoring social media is expected, and sometimes responses within one hour. Depending on the risk culture, the data show further differences, e.g. whether the state (Germany) or the individual (Netherlands) is seen as primarily responsible for coping with the situation.
@book{reuter_european_2022,
address = {Wiesbaden},
edition = {1},
title = {A {European} {Perspective} on {Crisis} {Informatics}: {Citizens}' and {Authorities}' attitudes towards {Social} {Media} for {Public} {Safety} and {Security}},
isbn = {978-3-658-39719-7},
url = {https://link.springer.com/book/10.1007/978-3-658-39720-3},
abstract = {Mobilising helpers in the event of a flood or letting friends know that you are okay in the event of a terrorist attack – more and more people are using social media in emergency, crisis or disaster situations. Storms, floods, attacks or pandemics (esp. COVID-19) show that citizens use social media to inform themselves or to coordinate. This thesis presents qualitative and quantitative studies on the attitudes of emergency services and citizens in Europe towards social media in emergencies. Across the individual sub-studies, almost 10,000 people are surveyed including representative studies in the Netherlands, Germany, the UK and Italy. The work empirically shows that social media is increasingly important for emergency services, both for prevention and during crises; that private use of social media is a driving force in shaping opinions for organisational use; and that citizens have high expectations towards authorities, especially monitoring social media is expected, and sometimes responses within one hour. Depending on the risk culture, the data show further differences, e.g. whether the state (Germany) or the individual (Netherlands) is seen as primarily responsible for coping with the situation.},
language = {en},
publisher = {Springer Vieweg},
author = {Reuter, Christian},
year = {2022},
doi = {https://doi.org/10.1007/978-3-658-39720-3},
keywords = {Crisis, HCI, SocialMedia, Projekt-EmerGent, Projekt-KontiKat, Projekt-ATHENE-SecUrban, Projekt-emergenCITY, DissPublisher},
}
[BibTeX] [Abstract] [Download PDF]
In this special issue of the “Journal of International Peace and Organization”, we approach the topic of resilience from the different perspectives of the technical sciences (with a focus on new technologies), the social sciences, and law. In our view such interdisciplinary exchange of views within the research field of peace and conflict research is highly important, yet at the same time all too rare. Today’s international security environment is marked by the demise of the classical arms control architecture, the return of great power politics, and eroding trust among states. New developments in military and dual use technology as well as weapon modernization programs add complexity to any effort towards peace and security. The importance of dealing with these issues in an informed manner has been widely accepted since Russia’s invasion of Ukraine in February 2022. The first part of this special issue is based on the interdisciplinary conference Science Peace Security 2021 in Aachen, which examined the impacts of new technologies on resilience. It sought concepts on how a more resilient security environment can be achieved through scientific contributions and policy measures towards crisis resolution, risk assessments, confidence-building, and arms limitations. Nuclear, biological, chemical, and space threats as well as developments in information technology such as cyber or artificial intelligence issues, and any other relevant technical fields, were examined.
@book{reuter_special_2022-1,
title = {Special {Issue} on {Between} {Destabilization} and {Enabling} {Resilience}: {Perspectives} from the {Technical} {Sciences}, {Social} {Sciences}, and {Law} - {Die} {Friedens}-{Warte} / {Journal} of {International} {Peace} and {Organization} ({JIPO})},
volume = {95},
url = {https://elibrary.bwv-verlag.de/journal/fw/95/3-4},
abstract = {In this special issue of the “Journal of International Peace and Organization”, we approach the topic of resilience from the different perspectives of the technical sciences (with a focus on new technologies), the social sciences, and law. In our view such interdisciplinary exchange of views within the research field of peace and conflict research is highly important, yet at the same time all too rare.
Today’s international security environment is marked by the demise of the classical arms control architecture, the return of great power politics, and eroding trust among states. New developments in military and dual use technology as well as weapon modernization programs add complexity to any effort towards peace and security. The importance of dealing with these issues in an informed manner has been widely accepted since Russia’s invasion of Ukraine in February 2022.
The first part of this special issue is based on the interdisciplinary conference Science Peace Security 2021 in Aachen, which examined the impacts of new technologies on resilience. It sought concepts on how a more resilient security environment can be achieved through scientific contributions and policy measures towards crisis resolution, risk assessments, confidence-building, and arms limitations. Nuclear, biological, chemical, and space threats as well as developments in information technology such as cyber or artificial intelligence issues, and any other relevant technical fields, were examined.},
publisher = {Berliner Wissenschafts-Verlag},
author = {Reuter, Christian and Göttsche, Malte and Frieß, Friederike and Thielbörger, Pierre and Vüllers, Johannes},
year = {2022},
keywords = {Peace},
}
[BibTeX] [Abstract] [Download PDF]
Mobilising helpers in the event of a flood or letting friends know that you are okay in the event of a terrorist attack – more and more people are using social media in emergency, crisis or disaster situations. Storms, floods, attacks or pandemics (esp. COVID-19) show that citizens use social media to inform themselves or to coordinate. This thesis presents qualitative and quantitative studies on the attitudes of emergency services and citizens in Europe towards social media in emergencies. Across the individual sub-studies, almost 10,000 people are surveyed including representative studies in the Netherlands, Germany, the UK and Italy. The work empirically shows that social media is increasingly important for emergency services, both for prevention and during crises; that private use of social media is a driving force in shaping opinions for organisational use; and that citizens have high expectations towards authorities, especially monitoring social media is expected, and sometimes responses within one hour. Depending on the risk culture, the data show further differences, e.g. whether the state (Germany) or the individual (Netherlands) is seen as primarily responsible for coping with the situation.
@book{reuter_european_2022-1,
address = {Nijmegen},
title = {A {European} {Perspective} on {Crisis} {Informatics}: {Citizens}' and {Authorities}' attitudes towards {Social} {Media} for {Public} {Safety} and {Security}},
url = {https://repository.ubn.ru.nl/handle/2066/253000},
abstract = {Mobilising helpers in the event of a flood or letting friends know that you are okay in the event of a terrorist attack – more and more people are using social media in emergency, crisis or disaster situations. Storms, floods, attacks or pandemics (esp. COVID-19) show that citizens use social media to inform themselves or to coordinate. This thesis presents qualitative and quantitative studies on the attitudes of emergency services and citizens in Europe towards social media in emergencies. Across the individual sub-studies, almost 10,000 people are surveyed including representative studies in the Netherlands, Germany, the UK and Italy. The work empirically shows that social media is increasingly important for emergency services, both for prevention and during crises; that private use of social media is a driving force in shaping opinions for organisational use; and that citizens have high expectations towards authorities, especially monitoring social media is expected, and sometimes responses within one hour. Depending on the risk culture, the data show further differences, e.g. whether the state (Germany) or the individual (Netherlands) is seen as primarily responsible for coping with the situation.},
publisher = {The Radboud University Thesis Repository},
author = {Reuter, Christian},
year = {2022},
doi = {10.1007/978-3-658-39720-3},
keywords = {AuswahlCrisis, Crisis, HCI, Selected, SocialMedia, Projekt-EmerGent, Projekt-KontiKat, Projekt-ATHENE-SecUrban, Projekt-emergenCITY, Dissertation},
}
[BibTeX] [Abstract] [Download PDF]
Looking at a variety of armament sectors, the book examines how Artificial Intelligence (AI) impacts the fields of armament and arms control, how existing arms control measures will be affected by AI, and what new approaches based on AI have been or are currently developed. The significant increase in computing power, the increasing reliance on software, and the advent of (narrow) AI and deep-learning algorithms all have the potential to lead to disruptive changes for military operations and warfare, rendering many classical arms control instruments less effective, or even useless. On the other hand, AI might lead to completely new arms control approaches, raising the effectiveness and reliability of new verification measures. To provide a common understanding, the book starts by presenting a general introduction to the state of the art in artificial intelligence and arms control, and how the two topics are interrelated. The second part of the book looks at examples from various fields of weapon technology, including weapons of mass destruction (WMD), conventional armament, and emerging technologies. The final section offers a cross-cutting perspective based on the examples presented in the second part. This volume will appeal to students and scholars of international relations, as well as policy-makers and practitioners interested in a better understanding of peace and security studies in general, and armament and arms control in particular with a strong focus on AI.
@book{schornig_armament_2022,
edition = {1},
title = {Armament, {Arms} {Control} and {Artificial} {Intelligence} - {The} {Janus}-faced {Nature} of {Machine} {Learning} in the {Military} {Realm}},
isbn = {978-3-031-11043-6},
url = {https://link.springer.com/book/10.1007/978-3-031-11043-6},
abstract = {Looking at a variety of armament sectors, the book examines how Artificial Intelligence (AI) impacts the fields of armament and arms control, how existing arms control measures will be affected by AI, and what new approaches based on AI have been or are currently developed.
The significant increase in computing power, the increasing reliance on software, and the advent of (narrow) AI and deep-learning algorithms all have the potential to lead to disruptive changes for military operations and warfare, rendering many classical arms control instruments less effective, or even useless. On the other hand, AI might lead to completely new arms control approaches, raising the effectiveness and reliability of new verification measures. To provide a common understanding, the book starts by presenting a general introduction to the state of the art in artificial intelligence and arms control, and how the two topics are interrelated. The second part of the book looks at examples from various fields of weapon technology, including weapons of mass destruction (WMD), conventional armament, and emerging technologies. The final section offers a cross-cutting perspective based on the examples presented in the second part.
This volume will appeal to students and scholars of international relations, as well as policy-makers and practitioners interested in a better understanding of peace and security studies in general, and armament and arms control in particular with a strong focus on AI.},
language = {en},
publisher = {Springer},
author = {Schörnig, Niklas and Reinhold, Thomas},
year = {2022},
doi = {https://doi.org/10.1007/978-3-031-11043-6},
keywords = {Security, Peace, Projekt-ATHENE-SecUrban},
}
2021
[BibTeX] [Abstract] [Download PDF]
Marc-André Kaufhold explores user expectations and design implications for the utilization of new media in crisis management and response. He develops a novel framework for information refinement, which integrates the event, organisational, societal, and technological perspectives of crises. Therefore, he reviews the state of the art on crisis informatics and empirically examines the use, potentials and barriers of both social media and mobile apps. Based on these insights, he designs and evaluates ICT concepts and artifacts with the aim to overcome the issues of information overload and quality in large-scale crises, concluding with practical and theoretical implications for technology adaptation and design.
@book{kaufhold_information_2021,
address = {Wiesbaden, Germany},
title = {Information {Refinement} {Technologies} for {Crisis} {Informatics}: {User} {Expectations} and {Design} {Principles} for {Social} {Media} and {Mobile} {Apps}},
isbn = {978-3-658-33343-0},
url = {https://www.springer.com/gp/book/9783658333430},
abstract = {Marc-André Kaufhold explores user expectations and design implications for the utilization of new media in crisis management and response. He develops a novel framework for information refinement, which integrates the event, organisational, societal, and technological perspectives of crises. Therefore, he reviews the state of the art on crisis informatics and empirically examines the use, potentials and barriers of both social media and mobile apps. Based on these insights, he designs and evaluates ICT concepts and artifacts with the aim to overcome the issues of information overload and quality in large-scale crises, concluding with practical and theoretical implications for technology adaptation and design.},
publisher = {Springer Vieweg},
author = {Kaufhold, Marc-André},
year = {2021},
doi = {10.1007/978-3-658-33341-6},
keywords = {Crisis, Projekt-KontiKat, Projekt-ATHENE-SecUrban, Projekt-CYWARN, AuswahlKaufhold, DissPublisher},
}
[BibTeX] [Abstract] [Download PDF]
Die zweite, aktualisierte Auflage dieses Lehr- und Fachbuchs gibt eine fundierte und praxisbezogene Einführung sowie einen Überblick über Grundlagen, Methoden und Anwendungen der Mensch-Computer-Interaktion im Kontext von Sicherheit, Notfällen, Krisen, Katastrophen, Krieg und Frieden. Dies adressierend werden interaktive, mobile, ubiquitäre und kooperative Technologien sowie soziale Medien vorgestellt. Hierbei finden klassische Themen wie benutzbare (IT-)Sicherheit, Industrie 4.0, Katastrophenschutz, Medizin und Automobil, aber auch Augmented Reality, Crowdsourcing, Shitstorm Management, Social Media Analytics und Cyberwar ihren Platz. Methodisch wird das Spektrum von Usable Safety bis Usable Security Engineering von Analyse über Design bis Evaluation abgedeckt. Das Buch eignet sich ebenso als Lehrbuch für Studierende wie als Handbuch für Wissenschaftler, Designer, Entwickler und Anwender.
@book{reuter_sicherheitskritische_2021,
address = {Wiesbaden},
edition = {2},
title = {Sicherheitskritische {Mensch}-{Computer}-{Interaktion}: {Interaktive} {Technologien} und {Soziale} {Medien} im {Krisen}- und {Sicherheitsmanagement} ({Zweite} {Auflage})},
isbn = {978-3-658-32795-8},
url = {https://www.springer.com/de/book/9783658327941},
abstract = {Die zweite, aktualisierte Auflage dieses Lehr- und Fachbuchs gibt eine fundierte und praxisbezogene Einführung sowie einen Überblick über Grundlagen, Methoden und Anwendungen der Mensch-Computer-Interaktion im Kontext von Sicherheit, Notfällen, Krisen, Katastrophen, Krieg und Frieden. Dies adressierend werden interaktive, mobile, ubiquitäre und kooperative Technologien sowie soziale Medien vorgestellt. Hierbei finden klassische Themen wie benutzbare (IT-)Sicherheit, Industrie 4.0, Katastrophenschutz, Medizin und Automobil, aber auch Augmented Reality, Crowdsourcing, Shitstorm Management, Social Media Analytics und Cyberwar ihren Platz. Methodisch wird das Spektrum von Usable Safety bis Usable Security Engineering von Analyse über Design bis Evaluation abgedeckt. Das Buch eignet sich ebenso als Lehrbuch für Studierende wie als Handbuch für Wissenschaftler, Designer, Entwickler und Anwender.},
publisher = {Springer Vieweg},
author = {Reuter, Christian},
year = {2021},
keywords = {AuswahlCrisis, HCI, Selected, SocialMedia, UsableSec, Security, Projekt-KontiKat, Peace, Infrastructure, Projekt-ATHENE-SecUrban, Projekt-CYWARN, Projekt-emergenCITY},
}
2020
[BibTeX] [Abstract] [Download PDF]
In den letzten 20 Jahren haben sich mobile Technologien und soziale Medien nicht nur im Alltag, sondern auch in Krisensituationen etabliert. Insbesondere großflächige Ereignisse wie der Hurrikan Sandy (2012) oder das mitteleuropäische Hochwasser (2013) haben gezeigt, dass sich die Bevölkerung aktiv mit Informations- und Kommunikationstechnologie (IKT) an der Schadensbewältigung beteiligt (Reuter, Hughes, et al., 2018). Daraus ist das Forschungsfeld der Kriseninformatik entstanden, welches Wissen der Informatik und Gesellschaftswissenschaften kombiniert und zudem in Disziplinen wie der MenschMaschine-Interaktion (HCI), Computerunterstützten Gruppenarbeit (CSCW) und Wirtschaftsinformatik (WI) verankert ist. Während die Bevölkerung IKT einsetzt, um die Unsicherheiten in Krisen zu bewältigen, nutzen Behörden und Organisationen mit Sicherheitsaufgaben (BOS), etwa Feuerwehr und Polizei, öffentliche Daten, um das Situationsbewusstsein und die Entscheidungsfindung für eine bessere Schadensbewältigung zu verbessern (Palen & Anderson, 2016). Noch größere Katastrophen wie die aktuelle COVID-19-Pandemie verstärken dabei die Herausforderungen der Kriseninformatik (Xie et al., 2020). Für BOS stellt die umfangreiche Menge heterogener und semantisch verknüpfter Daten, auch Social Big Data genannt (Olshannikova et al., 2017), eine große Herausforderung im Hinblick auf die Qualität, Quantität und den Zugriff auf relevante Informationen dar. Um ein Situationsbewusstsein und nutzbare Informationen, d. h. die richtigen Informationen zur richtigen Zeit bei der richtigen Person, zu erhalten (Zade et al., 2018), müssen Informationen auf die Bedingungen des Ereignisses, organisationale Anforderungen, soziale Rahmenbedingungen und technische Möglichkeiten verfeinert werden. Diese Dissertation kombiniert das methodische Framework der Designfallstudien (Wulf et al., 2011) mit den Prinzipien der Design-Science-Forschung (Hevner et al., 2004), um das Thema der Informationsverfeinerung (Information Refinement) in vier Phasen zu untersuchen, wovon jede unterschiedliche Forschungsbeiträge hervorbringt. Die Arbeit begutachtet zunächst Nutzungs-, Rollen- und Wahrnehmungsmuster in der Kriseninformatik und stellt die Potenziale sozialer Medien zur öffentlichen Teilhabe an der Krisenbewältigung heraus. Die empirische Studien mit der deutschen Bevölkerung zeigen die positiven Einstellungen und die steigende Nutzung mobiler und sozialer Technologien in Krisen, stellen aber auch Barrieren heraus und zeigen die Erwartung, dass BOS in soziale Medien aktiv sind. Die Ergebnisse fundieren das Design innovativer IKT-Artefakte, darunter visuelle Bevölkerungsrichtlinien für soziale Medien in Krisen (SMG), ein Web-Interface für BOS zur Aggregation mobiler und sozialer Daten (ESI), ein Algorithmus zur Extraktion relevanter Informationen in sozialen Medien (SMO), und eine mobile App für die bidirektionale Kommunikation zwischen BOS und Bevölkerung (112.social). Die Evaluation der Artefakte involviert EndnutzerInnen aus dem Anwendungsfeld des Krisenmanagements, um potenziale für Verbesserungen und zukünftige Forschung zu identifizieren. Die Arbeit schließt mit einem Framework zur Informationsverfeinerung für die Kriseninformatik ab, welche die event-, gesellschafts-, organisation- und technologiebasierte Perspektive integriert.
@book{kaufhold_information_2020,
address = {Darmstadt, Germany},
title = {Information {Refinement} {Technologies} for {Crisis} {Informatics}: {User} {Expectations} and {Design} {Implications} for {Social} {Media} and {Mobile} {Apps} in {Crisis}},
url = {https://doi.org/10.26083/tuprints-00017474},
abstract = {In den letzten 20 Jahren haben sich mobile Technologien und soziale Medien nicht nur im Alltag, sondern auch in Krisensituationen etabliert. Insbesondere großflächige Ereignisse wie der Hurrikan Sandy (2012) oder das mitteleuropäische Hochwasser (2013) haben gezeigt, dass sich die Bevölkerung aktiv mit Informations- und Kommunikationstechnologie (IKT) an der Schadensbewältigung beteiligt (Reuter, Hughes, et al., 2018). Daraus ist das Forschungsfeld der Kriseninformatik entstanden, welches Wissen der Informatik und Gesellschaftswissenschaften kombiniert und zudem in Disziplinen wie der MenschMaschine-Interaktion (HCI), Computerunterstützten Gruppenarbeit (CSCW) und Wirtschaftsinformatik (WI) verankert ist. Während die Bevölkerung IKT einsetzt, um die Unsicherheiten in Krisen zu bewältigen, nutzen Behörden und Organisationen mit Sicherheitsaufgaben (BOS), etwa Feuerwehr und Polizei, öffentliche Daten, um das Situationsbewusstsein und die Entscheidungsfindung für eine bessere Schadensbewältigung zu verbessern (Palen \& Anderson, 2016). Noch größere Katastrophen wie die aktuelle COVID-19-Pandemie verstärken dabei die Herausforderungen der Kriseninformatik (Xie et al., 2020). Für BOS stellt die umfangreiche Menge heterogener und semantisch verknüpfter Daten, auch Social Big Data genannt (Olshannikova et al., 2017), eine große Herausforderung im Hinblick auf die Qualität, Quantität und den Zugriff auf relevante Informationen dar. Um ein Situationsbewusstsein und nutzbare Informationen, d. h. die richtigen Informationen zur richtigen Zeit bei der richtigen Person, zu erhalten (Zade et al., 2018), müssen Informationen auf die Bedingungen des Ereignisses, organisationale Anforderungen, soziale Rahmenbedingungen und technische Möglichkeiten verfeinert werden. Diese Dissertation kombiniert das methodische Framework der Designfallstudien (Wulf et al., 2011) mit den Prinzipien der Design-Science-Forschung (Hevner et al., 2004), um das Thema der Informationsverfeinerung (Information Refinement) in vier Phasen zu untersuchen, wovon jede unterschiedliche Forschungsbeiträge hervorbringt. Die Arbeit begutachtet zunächst Nutzungs-, Rollen- und Wahrnehmungsmuster in der Kriseninformatik und stellt die Potenziale sozialer Medien zur öffentlichen Teilhabe an der Krisenbewältigung heraus. Die empirische Studien mit der deutschen Bevölkerung zeigen die positiven Einstellungen und die steigende Nutzung mobiler und sozialer Technologien in Krisen, stellen aber auch Barrieren heraus und zeigen die Erwartung, dass BOS in soziale Medien aktiv sind. Die Ergebnisse fundieren das Design innovativer IKT-Artefakte, darunter visuelle Bevölkerungsrichtlinien für soziale Medien in Krisen (SMG), ein Web-Interface für BOS zur Aggregation mobiler und sozialer Daten (ESI), ein Algorithmus zur Extraktion relevanter Informationen in sozialen Medien (SMO), und eine mobile App für die bidirektionale Kommunikation zwischen BOS und Bevölkerung (112.social). Die Evaluation der Artefakte involviert EndnutzerInnen aus dem Anwendungsfeld des Krisenmanagements, um potenziale für Verbesserungen und zukünftige Forschung zu identifizieren. Die Arbeit schließt mit einem Framework zur Informationsverfeinerung für die Kriseninformatik ab, welche die event-, gesellschafts-, organisation- und technologiebasierte Perspektive integriert.},
publisher = {Dissertation (Dr. rer. nat.), Department of Computer Science, Technische Unviersität Darmstadt},
author = {Kaufhold, Marc-André},
year = {2020},
keywords = {Crisis, Projekt-KontiKat, Projekt-ATHENE-SecUrban, Projekt-CYWARN, Dissertation},
}
[BibTeX] [Abstract] [Download PDF]
The growing importance of social media in conflicts and crises is accompanied by an ever-increasing research interest in the crisis informatics field in order to identify potential benefits and develop measures against the technology’s abuse. This special issue sets out to give an overview of current research on the use of social media in conflicts and crises. In doing so, it focuses on both good and malicious aspects of social media and includes a variety of papers of conceptual, theoretical and empirical nature. In six sections, the special issue presents an overview of the field, analytical methods, technical challenges, current advancements and the accepted papers before concluding. Specific topics range from cyber deception over information trustworthiness to mining and near-real-time processing of social media data.
@book{reuter_special_2020,
title = {Special {Issue} on {Social} {Media} in {Conflicts} and {Crises} - {Behaviour} \& {Information} {Technology} ({BIT})},
volume = {39},
url = {https://www.tandfonline.com/toc/tbit20/39/3},
abstract = {The growing importance of social media in conflicts and crises is accompanied by an ever-increasing research interest in the crisis informatics field in order to identify potential benefits and develop measures against the technology's abuse. This special issue sets out to give an overview of current research on the use of social media in conflicts and crises. In doing so, it focuses on both good and malicious aspects of social media and includes a variety of papers of conceptual, theoretical and empirical nature. In six sections, the special issue presents an overview of the field, analytical methods, technical challenges, current advancements and the accepted papers before concluding. Specific topics range from cyber deception over information trustworthiness to mining and near-real-time processing of social media data.},
number = {1},
publisher = {Taylor \& Francis},
author = {Reuter, Christian and Stieglitz, Stefan and Imran, Muhammad},
year = {2020},
note = {Publication Title: Behaviour \& Information Technology (BIT)},
keywords = {Crisis, HCI, SocialMedia, A-Paper, Ranking-ImpactFactor, Ranking-CORE-A, Peace},
}
[BibTeX] [Download PDF]
@book{reuter_special_2020-1,
title = {Special {Issue}: {Interdisciplinary} {Contributions} to {Natural} {Science}/{Technical} {Peace} {Research} - {S}+{F} {Sicherheit} und {Frieden} / {Peace} and {Security}},
volume = {38},
url = {https://peasec.de/paper/2020/2020_ReuterAltmannGoettscheHimmel_SpecIss_NaturalScienceTechnicalPeaceResarch_SF.pdf},
number = {1},
publisher = {Nomos},
author = {Reuter, Christian and Altmann, Jürgen and Göttsche, Malte and Himmel, Mirko},
year = {2020},
doi = {10.5771/0175-274X-2020-1},
note = {Publication Title: S+F Sicherheit und Frieden / Peace and Security},
keywords = {Peace, Projekt-DualUse, AuswahlPeace},
}
2019
[BibTeX] [Abstract] [Download PDF]
Bereits seit den 80er-Jahren erleben wir die Digitalisierung der Kommunikation. Mit dem Siegeszug des Internets in den 90er-Jahren intensivierte sich dieser Prozess und erreichte ab Mitte der 2000er mit der Verbreitung sozialer Medien und Smartphones eine neue Dimension. Neue technische Möglichkeiten haben neue gesellschaftliche Trends hervorgebracht bzw. verstärkt. Die Digitalisierung der Kommunikation verändert aber auch traditionelle Organisationsformen in atemberaubender Geschwindigkeit. Diese Publikation bietet einen Überblick zu diesen beiden Entwicklungen: gesellschaftliche Entwicklungen wie die Auflösung von realer und digitaler Welt, ständige Vernetztheit, Fake News und Shitstorm auf der einen Seite und die Auswirkungen dieser Prozesse auf traditionelle Medien, Arbeitswelt, Schulen, Nichtregierungsorganisationen und den Sportsektor auf der anderen Seite.
@book{reuter_digitalisierung_2019,
address = {Frankfurt am Main},
title = {Die {Digitalisierung} der {Kommunikation}: {Gesellschaftliche} {Trends} und der {Wandel} von {Organisationen}},
url = {http://publikationen.ub.uni-frankfurt.de/opus4/files/47852/PolicyPaper5_Digitalisierung_Kommunikation_deutsch.pdf},
abstract = {Bereits seit den 80er-Jahren erleben wir die Digitalisierung der Kommunikation. Mit dem Siegeszug des Internets in den 90er-Jahren intensivierte sich dieser Prozess und erreichte ab Mitte der 2000er mit der Verbreitung sozialer Medien und Smartphones eine neue Dimension. Neue technische Möglichkeiten haben neue gesellschaftliche Trends hervorgebracht bzw. verstärkt. Die Digitalisierung der Kommunikation verändert aber auch traditionelle Organisationsformen in atemberaubender Geschwindigkeit. Diese Publikation bietet einen Überblick zu diesen beiden Entwicklungen: gesellschaftliche Entwicklungen wie die Auflösung von realer und digitaler Welt, ständige Vernetztheit, Fake News und Shitstorm auf der einen Seite und die Auswirkungen dieser Prozesse auf traditionelle Medien, Arbeitswelt, Schulen, Nichtregierungsorganisationen und den Sportsektor auf der anderen Seite.},
publisher = {Mercator Science-Policy Fellowship-Programme},
author = {Reuter, Christian and Schultz, Tanjev and Stegbauer, Christian},
year = {2019},
keywords = {HCI, SocialMedia},
}
[BibTeX] [Abstract] [Download PDF]
Scientific discoveries and technological innovations have always exerted a great influence on peace and security. New civil and military technologies are revolutionizing warfare. Particularly striking areas are cyber warfare and the rapid development of unmanned weapons systems. Issues of nuclear disarmament, missile defence or space armament as well as chemical and biological weapons are again becoming more urgent. The conference SCIENCE · PEACE · SECURITY ’19 aimed for an accurate understanding and fruitful discussions of today’s and tomorrow’s peace and security challenges. This includes scientific-technical as well as inter- disciplinary contributions, focusing on problems of international security and peace-building as well as contributions dedicated to transparency, trust-building, arms control, disarmament, and conflict management.
@book{reuter_science_2019,
address = {Darmstadt, Germany},
title = {{SCIENCE} {PEACE} {SECURITY} '19 - {Proceedings} of the {Interdisciplinary} {Conference} on {Technical} {Peace} and {Security} {Research}},
url = {https://tuprints.ulb.tu-darmstadt.de/id/eprint/9164},
abstract = {Scientific discoveries and technological innovations have always exerted a great influence on peace and security. New civil and military technologies are revolutionizing warfare. Particularly striking areas are cyber warfare and the rapid development of unmanned weapons systems. Issues of nuclear disarmament, missile defence or space armament as well as chemical and biological weapons are again becoming more urgent. The conference SCIENCE · PEACE · SECURITY '19 aimed for an accurate understanding and fruitful discussions of today's and tomorrow's peace and security challenges. This includes scientific-technical as well as inter- disciplinary contributions, focusing on problems of international security and peace-building as well as contributions dedicated to transparency, trust-building, arms control, disarmament, and conflict management.},
publisher = {TUprints},
author = {Reuter, Christian and Altmann, Jürgen and Göttsche, Malte and Himmel, Mirko},
year = {2019},
keywords = {Crisis, Security, Peace, Projekt-DualUse},
}
[BibTeX] [Abstract] [Download PDF]
Technological and scientific progress, especially the rapid development in information technology (IT), plays a crucial role regarding questions of peace and security. This textbook addresses the significance, potentials and challenges of IT for peace and securi-ty. For this purpose, the book offers an introduction to peace, conflict, and security research, thereby focusing on natural-science, technical and computer science perspec-tives. In the following, it sheds light on cyber conflicts, war and peace, cyber arms con-trol, cyber attribution and infrastructures as well as culture and interaction before an outlook is given.
@book{reuter_information_2019-1,
address = {Wiesbaden, Germany},
title = {Information {Technology} for {Peace} and {Security} - {IT} {Applications} and {Infrastructures} in {Conflicts}, {Crises}, {War}, and {Peace}},
isbn = {978-3-658-25652-4},
url = {https://www.springer.com/de/book/9783658256517},
abstract = {Technological and scientific progress, especially the rapid development in information technology (IT), plays a crucial role regarding questions of peace and security. This textbook addresses the significance, potentials and challenges of IT for peace and securi-ty. For this purpose, the book offers an introduction to peace, conflict, and security research, thereby focusing on natural-science, technical and computer science perspec-tives. In the following, it sheds light on cyber conflicts, war and peace, cyber arms con-trol, cyber attribution and infrastructures as well as culture and interaction before an outlook is given.},
publisher = {Springer Vieweg},
author = {Reuter, Christian},
year = {2019},
doi = {10.1007/978-3-658-25652-4},
keywords = {Crisis, Selected, Security, Peace, Infrastructure, Projekt-CRISP, Projekt-DualUse, RSF, Projekt-CROSSING, AuswahlPeace, Cyberwar, Projekt-MAKI},
}
[BibTeX] [Abstract] [Download PDF]
The digitalisation of communication started as early as the 1980s. With the rise of the internet in the mid-90s the digitalisation process intensified; then it took on another dimension with the spread of social media and smartphones in the mid noughties. These new technologies are providing new possibilities that are unveiling, or rather, strengthening societal trends. What’s more, traditional forms of organisation are also being transformed at breakneck speed. This publication provides an overview of both developments: On the one hand we have societal developments such as the blurring of boundaries between real and digital worlds, constant connectivity, fake news, and social media outrage. On the other, we have the effects on traditional media, the workplace, schools, non-governmental organisations and sports.
@book{reuter_digitalisation_2019,
address = {Frankfurt am Main},
title = {Digitalisation and {Communication}: {Societal} {Trends} and the {Change} in {Organisations}},
url = {http://publikationen.ub.uni-frankfurt.de/opus4/files/47853/SPPaper6_Digitalisation_Communication_English.pdf},
abstract = {The digitalisation of communication started as early as the 1980s. With the rise of the internet in the mid-90s the digitalisation process intensified; then it took on another dimension with the spread of social media and smartphones in the mid noughties. These new technologies are providing new possibilities that are unveiling, or rather, strengthening societal trends. What's more, traditional forms of organisation are also being transformed at breakneck speed. This publication provides an overview of both developments: On the one hand we have societal developments such as the blurring of boundaries between real and digital worlds, constant connectivity, fake news, and social media outrage. On the other, we have the effects on traditional media, the workplace, schools, non-governmental organisations and sports.},
publisher = {Mercator Science-Policy Fellowship-Programme},
author = {Reuter, Christian and Schultz, Tanjev and Stegbauer, Christian},
year = {2019},
keywords = {HCI, SocialMedia},
}
2018
[BibTeX] [Download PDF]
@book{reuter_special_2018,
title = {Special {Issue} on {Social} {Media} in {Crisis} {Management} - {International} {Journal} on {Human}-{Computer} {Interaction} ({IJHCI})},
volume = {34},
url = {https://www.tandfonline.com/toc/hihc20/34/4?nav=tocList},
author = {Reuter, Christian and Hughes, Amanda Lee and Hiltz, Starr Roxanne and Imran, Muhammad and Plotnick, Linda},
year = {2018},
note = {Publication Title: International Journal on Human-Computer Interaction (IJHCI)},
keywords = {Crisis, HCI, SocialMedia, Ranking-ImpactFactor, Ranking-WKWI-B, Projekt-KontiKat, Ranking-CORE-B},
}
[BibTeX] [Download PDF]
@book{reuter_special_2018-1,
title = {Special {Issue} on {IT} {Support} for {Crisis} and {Continuity} {Management} - {International} {Journal} of {Information} {Systems} for {Crisis} {Response} and {Management} ({IJISCRAM})},
volume = {10},
url = {https://www.igi-global.com/journals/open-access/table-of-contents/international-journal-information-systems-crisis/1119?v=10&sitid=212700},
number = {1},
author = {Reuter, Christian and Pottebaum, Jens},
year = {2018},
note = {Publication Title: International Journal of Information Systems for Crisis Response and Management (IJISCRAM)},
keywords = {Crisis, Projekt-KontiKat, Infrastructure, RSF},
}
[BibTeX] [Abstract] [Download PDF]
Dieses Lehr- und Fachbuch gibt eine fundierte und praxisbezogene Einführung sowie einen Überblick über Grundlagen, Methoden und Anwendungen der Mensch-Computer-Interaktion im Kontext von Sicherheit, Notfällen, Krisen, Katastrophen, Krieg und Frieden. Dies adressierend werden interaktive, mobile, ubiquitäre und kooperative Technologien sowie Soziale Medien vorgestellt. Hierbei finden klassische Themen wie benutzbare (IT-)Sicherheit, Industrie 4.0, Katastrophenschutz, Medizin und Automobil, aber auch Augmented Reality, Crowdsourcing, Shitstorm Management, Social Media Analytics und Cyberwar ihren Platz. Methodisch wird das Spektrum von Usable Safety- bis Usable Security Engineering von Analyse über Design bis Evaluation abgedeckt. Das Buch eignet sich ebenso als Lehrbuch für Studierende wie als Handbuch für Wissenschaftler, Designer, Entwickler und Anwender.
@book{reuter_sicherheitskritische_2018-1,
address = {Wiesbaden},
title = {Sicherheitskritische {Mensch}-{Computer}-{Interaktion}: {Interaktive} {Technologien} und {Soziale} {Medien} im {Krisen}- und {Sicherheitsmanagement} ({Erste} {Auflage})},
isbn = {978-3-658-19522-9},
url = {http://www.springer.com/de/book/9783658195229},
abstract = {Dieses Lehr- und Fachbuch gibt eine fundierte und praxisbezogene Einführung sowie einen Überblick über Grundlagen, Methoden und Anwendungen der Mensch-Computer-Interaktion im Kontext von Sicherheit, Notfällen, Krisen, Katastrophen, Krieg und Frieden. Dies adressierend werden interaktive, mobile, ubiquitäre und kooperative Technologien sowie Soziale Medien vorgestellt. Hierbei finden klassische Themen wie benutzbare (IT-)Sicherheit, Industrie 4.0, Katastrophenschutz, Medizin und Automobil, aber auch Augmented Reality, Crowdsourcing, Shitstorm Management, Social Media Analytics und Cyberwar ihren Platz. Methodisch wird das Spektrum von Usable Safety- bis Usable Security Engineering von Analyse über Design bis Evaluation abgedeckt. Das Buch eignet sich ebenso als Lehrbuch für Studierende wie als Handbuch für Wissenschaftler, Designer, Entwickler und Anwender.},
publisher = {Springer Vieweg},
author = {Reuter, Christian},
year = {2018},
doi = {10.1007/978-3-658-19523-6},
keywords = {HCI, SocialMedia, Projekt-EmerGent, UsableSec, Security, Projekt-KontiKat, Peace, Infrastructure, RSF, AuswahlUsableSec},
}
[BibTeX] [Download PDF]
@book{reuter_special_2018-2,
title = {Special {Issue} on {Human}-{Computer}-{Interaction} and {Social} {Media} in {Safety}-{Critical} {Systems} - {Journal} of {Contingencies} and {Crisis} {Management} ({JCCM})},
volume = {26},
url = {http://onlinelibrary.wiley.com/doi/10.1111/jccm.2018.26.issue-1/issuetoc},
number = {1},
publisher = {Wiley},
author = {Reuter, Christian},
year = {2018},
note = {Publication Title: Journal of Contingencies and Crisis Management (JCCM)},
keywords = {Crisis, HCI, SocialMedia, Projekt-EmerGent, Security, Ranking-ImpactFactor, Projekt-KontiKat},
}
2017
[BibTeX] [Download PDF]
@book{pottebaum_special_2017,
title = {Special {Issue} on {IT}-{Support} for {Critical} {Infrastructure} {Protection} - {International} {Journal} of {Information} {Systems} for {Crisis} {Response} and {Management} ({IJISCRAM})},
volume = {9},
url = {https://www.igi-global.com/journals/open-access/table-of-contents/international-journal-information-systems-crisis/1119?v=9&sitid=213219},
number = {4},
publisher = {IGI Global},
author = {Pottebaum, Jens and Reuter, Christian},
year = {2017},
note = {Publication Title: International Journal of Information Systems for Crisis Response and Management (IJISCRAM)},
keywords = {Crisis, Projekt-KontiKat, Infrastructure, RSF},
}
2016
[BibTeX] [Download PDF]
@book{mentler_special_2016,
title = {Special {Issue} on {Human}-{Machine} {Interaction} and {Cooperation} in {Safety}-{Critical} {Systems} - i-com - {Journal} of {Interactive} {Media}},
volume = {15},
url = {https://peasec.de/paper/2016/2016_MentlerReuterGeisler_SpecialIssueHumanMachineInteractionSafetyCriticalSystems_ICOM.pdf},
number = {3},
publisher = {De Gruyter},
author = {Mentler, Tilo and Reuter, Christian and Geisler, Stefan},
year = {2016},
note = {Publication Title: i-com: Journal of Interactive Media},
keywords = {Crisis, HCI, Projekt-EmerGent, Security},
}
[BibTeX] [Download PDF]
@book{reuter_proceedings_2016,
address = {Aachen, Germany},
title = {Proceedings des {Workshops} "{Mensch}-{Computer}-{Interaktion} in sicherheitskritischen {Systemen}"},
url = {https://www.wineme.uni-siegen.de/paper/2016/2016_proc-sicherheitskritischemmi_muc.pdf},
publisher = {Gesellschaft für Informatik e.V.},
author = {Reuter, Christian and Mentler, Tilo and Geisler, Stefan and Herczeg, Michael and Ludwig, Thomas and Pipek, Volkmar and Nestler, Simon and Sautter, Johannes},
editor = {Weyers, B. and Dittmar, A.},
year = {2016},
note = {Publication Title: Mensch \& Computer: Workshopband},
keywords = {Crisis, HCI, Projekt-EmerGent, UsableSec},
}
2015
[BibTeX] [Abstract] [Download PDF]
Human computer interaction in security and time-critical systems is an interdisciplinary challenge at the seams of human factors, engineering, information systems and computer science. Application fields include control systems, critical infrastructures, vehicle and traffic management, production technology, business continuity management, medical technology, crisis management and civil protection. Nowadays in many areas mobile and ubiquitous computing as well as social media and collaborative technologies also plays an important role. The specific challenges require the discussion and development of new methods and approaches in order to design information systems. These are going to be addressed in this special issue with a particular focus on technologies for citizen and volunteers in emergencies.
@book{reuter_special_2015,
title = {Special {Issue} on {Human} {Computer} {Interaction} in {Critical} {Systems} {I}: {Citizen} and {Volunteers} - {International} {Journal} of {Information} {Systems} for {Crisis} {Response} and {Management} ({IJISCRAM})},
volume = {7},
url = {https://www.wineme.uni-siegen.de/paper/2015/2015_ijiscram-specialissue_hci-criticalsystems-i.pdf},
abstract = {Human computer interaction in security and time-critical systems is an interdisciplinary challenge at the seams of human factors, engineering, information systems and computer science. Application fields include control systems, critical infrastructures, vehicle and traffic management, production technology, business continuity management, medical technology, crisis management and civil protection. Nowadays in many areas mobile and ubiquitous computing as well as social media and collaborative technologies also plays an important role. The specific challenges require the discussion and development of new methods and approaches in order to design information systems. These are going to be addressed in this special issue with a particular focus on technologies for citizen and volunteers in emergencies.},
number = {2},
publisher = {IGI Global},
author = {Reuter, Christian and Mentler, Tilo and Geisler, Stefan},
year = {2015},
note = {Publication Title: International Journal of Information Systems for Crisis Response and Management (IJISCRAM)},
keywords = {Crisis, HCI, SocialMedia, Projekt-EmerGent, Projekt-KOKOS},
}
[BibTeX] [Abstract] [Download PDF]
Human computer interaction in security and time-critical systems is an interdisciplinary challenge at the seams of human factors, engineering, information systems and computer science. Application fields include control systems, critical infrastructures, vehicle and traffic management, production technology, business continuity management, medical technology, crisis management and civil protection. Nowadays in many areas mobile and ubiquitous computing as well as social media and collaborative technologies also plays an important role. The specific challenges require the discussion and development of new methods and approaches in order to design information systems. These are going to be addressed in this special issue with a particular focus on technologies for critical practices for authorities and industry.
@book{reuter_special_2015-1,
title = {Special {Issue} on {Human} {Computer} {Interaction} in {Critical} {Systems} {II}: {Authorities} and {Industry} - {International} {Journal} of {Information} {Systems} for {Crisis} {Response} and {Management} ({IJISCRAM})},
volume = {7},
url = {https://www.wineme.uni-siegen.de/paper/2015/2015_ijiscram-specialissue_hci-criticalsystems-ii.pdf},
abstract = {Human computer interaction in security and time-critical systems is an interdisciplinary challenge at the seams of human factors, engineering, information systems and computer science. Application fields include control systems, critical infrastructures, vehicle and traffic management, production technology, business continuity management, medical technology, crisis management and civil protection. Nowadays in many areas mobile and ubiquitous computing as well as social media and collaborative technologies also plays an important role. The specific challenges require the discussion and development of new methods and approaches in order to design information systems. These are going to be addressed in this special issue with a particular focus on technologies for critical practices for authorities and industry.},
number = {3},
publisher = {IGI Global},
author = {Reuter, Christian},
year = {2015},
note = {Publication Title: International Journal of Information Systems for Crisis Response and Management (IJISCRAM)},
keywords = {HCI, SocialMedia, Projekt-EmerGent, Projekt-KOKOS},
}
2014
[BibTeX] [Download PDF]
@book{pipek_special_2014,
title = {Special {Issue} zu "{Interaktion} und {Kooperation} im {Krisenmanagement}" - i-com - {Zeitschrift} für interaktive und kooperative {Medien}},
volume = {13},
url = {http://www.peasec.de/paper/2014/2014_PipekReuter_Eds_SpecialIssueKrisenmanagement_ICOM.pdf},
number = {1},
author = {Pipek, Volkmar and Reuter, Christian},
year = {2014},
note = {Publication Title: i-com - Zeitschrift für interaktive und kooperative Medien},
keywords = {Crisis, HCI},
}
[BibTeX] [Abstract] [Download PDF]
Using the domain of crisis management, Christian Reuter explores challenges and opportunities for technology design in emergent environments. He therefore empirically analyzes collaborative work in inter-organizational crisis – such as the police, fire departments, energy network operators and citizens – in order to identify collaboration practices that reveal work infrastructure limitations. He also designs, implements and evaluates novel concepts and ICT artifacts towards the support of emergent collaboration. Besides the discovery of potential organizational effects on the ability to deal with emergence he presents methodological implications for technology design.
@book{reuter_emergent_2014,
address = {University of Siegen, Institute for Information Systems, Germany},
title = {Emergent {Collaboration} {Infrastructures}: {Technology} {Design} for {Inter}-{Organizational} {Crisis} {Management} ({Ph}.{D}. {Thesis})},
isbn = {978-3-658-08585-8},
url = {http://www.springer.com/springer+gabler/bwl/wirtschaftsinformatik/book/978-3-658-08585-8},
abstract = {Using the domain of crisis management, Christian Reuter explores challenges and opportunities for technology design in emergent environments. He therefore empirically analyzes collaborative work in inter-organizational crisis – such as the police, fire departments, energy network operators and citizens – in order to identify collaboration practices that reveal work infrastructure limitations. He also designs, implements and evaluates novel concepts and ICT artifacts towards the support of emergent collaboration. Besides the discovery of potential organizational effects on the ability to deal with emergence he presents methodological implications for technology design.},
publisher = {Springer Gabler},
author = {Reuter, Christian},
year = {2014},
doi = {10.1007/978-3-658-08586-5},
note = {Backup Publisher: University of Siegen},
keywords = {HCI, Projekt-InfoStrom, Selected, SocialMedia, Projekt-EmerGent, UsableSec, Infrastructure, AuswahlUsableSec, DissPublisher},
}
[BibTeX] [Abstract] [Download PDF]
The complexity and interconnectedness of current working environments encourages organizations, businesses and individuals to collaborate beyond spatial, temporal as well as organizational boundaries. These collaborations are potentially supported by information and communication technology (ICT) among mobile and ubiquitous systems. The academic field Computer-Supported Cooperative Work (CSCW) is primarily recognized for focusing on ICT support for collaboration practices as opposed to the computerizing of formal procedures. ICT, in this view, needs to reflect the dynamic nature of cooperation and collaboration. The notion emergence as coined by Lewes (1875) and interpreted by Goldstein (1999) refers to dynamic contexts that cannot be anticipated in their full extent before they actually occur. Emergent collaboration refers to the need for spontaneous collaboration in novel and changing structures and occurs in application fields such as inter-organizational crisis and emergency management, which by definition contain the unforeseeable. This dissertation contributes to research into infrastructures for emergent collaboration. Using the example of crisis management, it addresses (1) emergent collaboration practices and how they reveal work infrastructure limitations, (2) novel concepts and artifacts to support emergent collaboration, (3) their effects on the ability to deal with emergent situations and (4) methodological implications for technology design for emergent collaboration infrastructures in inter-organizational settings. Design case studies (Wulf et al., 2011), inspired by action research (Lewin, 1958) and following Hevner and Chatterjee’s suggestion (2010) to integrate action research with design research, are applied as a practice oriented research method. They contain three phases: an empirical analysis of the practices in the field, the development of innovative ICT artifacts with continuous participation of end-users related to the empirical findings and the evaluation of their appropriation (Pipek, 2005) in practice. In the case reported here, the empirical study on emergent collaboration by police and fire services, aid agencies, energy network operators and citizens in emergencies in two counties in Germany outlined the importance of improvisation work in situation assessment as well as mobile collaboration and reporting practices. The ICT design aimed towards the support of these emergent practices, illustrated by various concepts and prototypes. They comprise (1) an inter-organizational social network for emergency management (SiRena), (2) an inter-organizational situation assessment client (ISAC) aswell as mobile applications for (3) the ad hoc participation in mobile collaboration (MoCo) and (4) the articulation of information needs in mobile reporting (MoRep). Based on the empirical, technical and practical findings, the subsequent analysis uses the concept of infrastructuring (Pipek & Wulf, 2009), the integrated perspective on the design and use of information systems, and derives implications for emergent collaboration infrastructures, which contribute overall to the academic fields CSCW, Human Computer Interaction (HCI) and Information Systems (IS).
@book{reuter_emergent_2014-1,
address = {University of Siegen, Institute for Information Systems, Germany},
title = {Emergent {Collaboration} {Infrastructures}: {Technology} {Design} for {Inter}-{Organizational} {Crisis} {Management} ({Ph}.{D}. {Thesis})},
url = {http://dx.doi.org/10.25819/ubsi/10370},
abstract = {The complexity and interconnectedness of current working environments encourages organizations, businesses and individuals to collaborate beyond spatial, temporal as well as organizational boundaries. These collaborations are potentially supported by information and communication technology (ICT) among mobile and ubiquitous systems. The academic field Computer-Supported Cooperative Work (CSCW) is primarily recognized for focusing on ICT support for collaboration practices as opposed to the computerizing of formal procedures. ICT, in this view, needs to reflect the dynamic nature of cooperation and collaboration. The notion emergence as coined by Lewes (1875) and interpreted by Goldstein (1999) refers to dynamic contexts that cannot be anticipated in their full extent before they actually occur. Emergent collaboration refers to the need for spontaneous collaboration in novel and changing structures and occurs in application fields such as inter-organizational crisis and emergency management, which by definition contain the unforeseeable.
This dissertation contributes to research into infrastructures for emergent collaboration. Using the example of crisis management, it addresses (1) emergent collaboration practices and how they reveal work infrastructure limitations, (2) novel concepts and artifacts to support emergent collaboration, (3) their effects on the ability to deal with emergent situations and (4) methodological implications for technology design for emergent collaboration infrastructures in inter-organizational settings.
Design case studies (Wulf et al., 2011), inspired by action research (Lewin, 1958) and following Hevner and Chatterjee’s suggestion (2010) to integrate action research with design research, are applied as a practice oriented research method. They contain three phases: an empirical analysis of the practices in the field, the development of innovative ICT artifacts with continuous participation of end-users related to the empirical findings and the evaluation of their appropriation (Pipek, 2005) in practice. In the case reported here, the empirical study on emergent collaboration by police and fire services, aid agencies, energy network operators and citizens in emergencies in two counties in Germany outlined the importance of improvisation work in situation assessment as well as mobile collaboration and reporting practices. The ICT design aimed towards the support of these emergent practices, illustrated by various concepts and prototypes. They comprise (1) an inter-organizational social network for emergency management (SiRena), (2) an inter-organizational situation assessment client (ISAC) aswell as mobile applications for (3) the ad hoc participation in mobile collaboration (MoCo) and (4) the articulation of information needs in mobile reporting (MoRep).
Based on the empirical, technical and practical findings, the subsequent analysis uses the concept of infrastructuring (Pipek \& Wulf, 2009), the integrated perspective on the design and use of information systems, and derives implications for emergent collaboration infrastructures, which contribute overall to the academic fields CSCW, Human Computer Interaction (HCI) and Information Systems (IS).},
publisher = {Universitätsbibliothek Siegen},
author = {Reuter, Christian},
year = {2014},
doi = {http://dx.doi.org/10.25819/ubsi/10370},
keywords = {HCI, Projekt-InfoStrom, SocialMedia, Projekt-EmerGent, UsableSec, Infrastructure, Dissertation},
}
2008
[BibTeX] [Download PDF]
@book{reuter_computerunterstutztes_2008,
address = {Siegen},
title = {Computerunterstütztes kollaboratives {Training} im {Krisenkommunikations}-{Management} am {Beispiel} eines {Energieversorgungsunternehmens} ({Diplomarbeit})},
url = {https://peasec.de/paper/2008/2008_Reuter_KrisentrainingEnergieversorger_Diplomarbeit_Auszug.pdf},
author = {Reuter, Christian},
editor = {Pipek, Volkmar and Wulf, Volker},
year = {2008},
keywords = {Cooperation, Crisis, HCI, UsableSec, Security, Projekt-RWE},
}
Kapitel in Büchern
2024
[BibTeX]
@incollection{franken_secure_2024,
address = {Wiesbaden, Germany},
title = {Secure {Critical} {Infrastructures}},
booktitle = {Information {Technology} for {Peace} and {Security} - {IT} {Applications} and {Infrastructures} in {Conflicts}, {Crises}, {War}, and {Peace}},
publisher = {Springer Vieweg},
author = {Franken, Jonas and Reuter, Christian},
editor = {Reuter, Christian},
year = {2024},
keywords = {Security, Peace, Infrastructure},
}
[BibTeX]
@incollection{haesler_moderne_2024,
title = {Moderne {Technologien} und {Resilienz}},
booktitle = {Resilienz und {Schockereignisse}},
publisher = {Kohlhammer},
author = {Haesler, Steffen and Reuter, Christian},
editor = {Karsten, Andreas H. and Voßschmidt, Stefan and Becker, Uwe},
year = {2024},
keywords = {UsableSec, Security, Projekt-emergenCITY},
}
[BibTeX] [Abstract]
Over the last decade, social media services had an enormous impact on modern culture. They are nowadays widely established in everyday life, but also during natural and man-made crises and conflicts. For instance, Facebook was part of the Arabic Spring, in which the tool facilitated the communication and interaction between participants of political protests. On the contrary, terrorists may recruit new members and disseminate ideologies, and social bots may influence social and political processes. Based on the notions of cultural violence and cultural peace as well as the phenomena of fake news, terrorism and social bots, this exploratory review firstly presents human cultural inter-ventions in social media (e.g. dissemination of fake news and terroristic propaganda) and respective countermeasures (e.g. fake news detection and counter-narratives). Sec-ondly, it discusses automatic cultural interventions realised via social bots (e.g. astro-turfing, misdirection and smoke screening) and countermeasures (e.g. crowdsourcing and social bot detection). Finally, this chapter concludes with a range of cultural inter-ventions and information and communication technology (ICT) in terms of actors and intentions to identify future research potential for supporting situational assessments during conflicts.
@incollection{kaufhold_cultural_2024,
address = {Wiesbaden, Germany},
title = {Cultural {Violence} and {Peace} {Interventions} in {Social} {Media}},
abstract = {Over the last decade, social media services had an enormous impact on modern culture. They are nowadays widely established in everyday life, but also during natural and man-made crises and conflicts. For instance, Facebook was part of the Arabic Spring, in which the tool facilitated the communication and interaction between participants of political protests. On the contrary, terrorists may recruit new members and disseminate ideologies, and social bots may influence social and political processes. Based on the notions of cultural violence and cultural peace as well as the phenomena of fake news, terrorism and social bots, this exploratory review firstly presents human cultural inter-ventions in social media (e.g. dissemination of fake news and terroristic propaganda) and respective countermeasures (e.g. fake news detection and counter-narratives). Sec-ondly, it discusses automatic cultural interventions realised via social bots (e.g. astro-turfing, misdirection and smoke screening) and countermeasures (e.g. crowdsourcing and social bot detection). Finally, this chapter concludes with a range of cultural inter-ventions and information and communication technology (ICT) in terms of actors and intentions to identify future research potential for supporting situational assessments during conflicts.},
booktitle = {Information {Technology} for {Peace} and {Security} - {IT} {Applications} and {Infrastructures} in {Conflicts}, {Crises}, {War}, and {Peace}},
publisher = {Springer Vieweg},
author = {Kaufhold, Marc-André and Haunschild, Jasmin and Reuter, Christian},
editor = {Reuter, Christian},
year = {2024},
keywords = {Crisis, HCI, SocialMedia, Peace, Projekt-CYLENCE},
}
[BibTeX] [Abstract]
Verification is one of the pillars of arms control and non-proliferation treaties as well as an important part of confidence building measures. It defines practical measures that enable treaty members to check the treaty compliance by observing, counting or moni-toring specific actions and their accordance with the respective rules. In contrast to his-torical examples of former military technologies, cyberspace features some unique char-acteristics making it hard to apply established measures. The chapter describes these peculiarities and assesses distinguishing problems compared to selected verification measures for nuclear, biological and chemicals weapons technology. Yet, cyberspace is a human-made domain and adjusting its technical setting, rules and principles may help to reduce the threat of ongoing militarisation. Offering some alternatives, the chapter elaborates on suitable and measurable parameters for this domain and presents potential-ly useful verification approaches.
@incollection{reinhold_verification_2024,
address = {Wiesbaden, Germany},
title = {Verification in {Cyberspace}},
abstract = {Verification is one of the pillars of arms control and non-proliferation treaties as well as an important part of confidence building measures. It defines practical measures that enable treaty members to check the treaty compliance by observing, counting or moni-toring specific actions and their accordance with the respective rules. In contrast to his-torical examples of former military technologies, cyberspace features some unique char-acteristics making it hard to apply established measures. The chapter describes these peculiarities and assesses distinguishing problems compared to selected verification measures for nuclear, biological and chemicals weapons technology. Yet, cyberspace is a human-made domain and adjusting its technical setting, rules and principles may help to reduce the threat of ongoing militarisation. Offering some alternatives, the chapter elaborates on suitable and measurable parameters for this domain and presents potential-ly useful verification approaches.},
booktitle = {Information {Technology} for {Peace} and {Security} - {IT} {Applications} and {Infrastructures} in {Conflicts}, {Crises}, {War}, and {Peace}},
publisher = {Springer Vieweg},
author = {Reinhold, Thomas and Reuter, Christian},
editor = {Reuter, Christian},
year = {2024},
keywords = {Security, Peace, Projekt-CNTR},
}
[BibTeX] [Abstract]
The encompassing trend of digitalisation and widespread dependencies on IT systems triggers adjustments also in the military forces. Besides necessary enhancements of IT security and defensive measures for cyberspace, a growing number of states are estab-lishing offensive military capabilities for this domain. Looking at historical develop-ments and transformations due to advancements in military technologies, the chapter discusses the political progress made and tools developed since. Both of these have con-tributed to handling challenges and confining threats to international security. With this background, the text assesses a possible application of these efforts to developments concerning cyberspace, as well as obstacles that need to be tackled for it to be success-ful. The chapter points out political advancements already in progress, the role of social initiatives, such as the cyber peace campaign of the Forum of Computer Scientists for Peace and Societal Responsibility (FifF), as well as potential consequences of the rising probability of cyber war as opposed to the prospects of cyber peace.
@incollection{reinhold_cyber_2024,
address = {Wiesbaden, Germany},
title = {From {Cyber} {War} to {Cyber} {Peace}},
abstract = {The encompassing trend of digitalisation and widespread dependencies on IT systems triggers adjustments also in the military forces. Besides necessary enhancements of IT security and defensive measures for cyberspace, a growing number of states are estab-lishing offensive military capabilities for this domain. Looking at historical develop-ments and transformations due to advancements in military technologies, the chapter discusses the political progress made and tools developed since. Both of these have con-tributed to handling challenges and confining threats to international security. With this background, the text assesses a possible application of these efforts to developments concerning cyberspace, as well as obstacles that need to be tackled for it to be success-ful. The chapter points out political advancements already in progress, the role of social initiatives, such as the cyber peace campaign of the Forum of Computer Scientists for Peace and Societal Responsibility (FifF), as well as potential consequences of the rising probability of cyber war as opposed to the prospects of cyber peace.},
booktitle = {Information {Technology} for {Peace} and {Security} - {IT} {Applications} and {Infrastructures} in {Conflicts}, {Crises}, {War}, and {Peace}},
publisher = {Springer Vieweg},
author = {Reinhold, Thomas and Reuter, Christian},
editor = {Reuter, Christian},
year = {2024},
keywords = {Security, Peace, Projekt-CROSSING, Cyberwar, Projekt-CNTR},
}
[BibTeX] [Abstract]
Arms control aims at preventing conflicts and fostering stability in inter-state relations by either reducing the probability of usage of a specific weapon or regulating its use and thus, reducing the costs of armament. Several approaches to arms control exist: limiting or reducing numbers of weapons and armed forces, disarmament (“down to zero”) or prohibiting certain weapons. To illustrate these further, this chapter elaborates on the necessity of arms control and presents some historical examples, including an overview of existing measures of arms control. Extrapolating from these, the general architecture of arms control regimes and the complex issue of establishing and verifying compliance with agreements will be discussed, not least with respect to cyberspace. Building on these theoretical considerations, the chapter presents important treaties and first approaches, including the Wassenaar Arrangement, the recommendations of the OSCE, and the UN GGE 2015.
@incollection{reuter_arms_2024,
address = {Wiesbaden},
title = {Arms {Control} and its {Applicability} to {Cyberspace}},
abstract = {Arms control aims at preventing conflicts and fostering stability in inter-state relations by either reducing the probability of usage of a specific weapon or regulating its use and thus, reducing the costs of armament. Several approaches to arms control exist: limiting or reducing numbers of weapons and armed forces, disarmament (“down to zero”) or prohibiting certain weapons. To illustrate these further, this chapter elaborates on the necessity of arms control and presents some historical examples, including an overview of existing measures of arms control. Extrapolating from these, the general architecture of arms control regimes and the complex issue of establishing and verifying compliance with agreements will be discussed, not least with respect to cyberspace. Building on these theoretical considerations, the chapter presents important treaties and first approaches, including the Wassenaar Arrangement, the recommendations of the OSCE, and the UN GGE 2015.},
language = {en},
booktitle = {Information {Technology} for {Peace} and {Security} - {IT} {Applications} and {Infrastructures} in {Conflicts}, {Crises}, {War}, and {Peace}},
publisher = {Springer Fachmedien Wiesbaden},
author = {Reinhold, Thomas and Reuter, Christian},
editor = {Reuter, Christian},
year = {2024},
keywords = {Peace, Projekt-CNTR},
}
[BibTeX] [Abstract]
Advances in science and technology play a crucial role in the context of peace, conflict and security. As information technology (IT) is becoming omnipresent, this includes both the resilience of IT infrastructures e.g. as a target in cases of conflict and the role of IT applications to prevent and manage conflicts, crises and disasters. This chapter is an introduction to IT and its role in war and peace, in conflicts and crises as well as in safety and security. Based on those connections a new field of research has emerged: IT peace research. It is introduced in this chapter which provides an overview of the inter-disciplinary concepts of peace, conflict and security. In addition, the research disciplines computer science and peace and conflict studies as the basis of IT peace research are explained. Moreover, the chapter focuses on the specific research topics of IT peace research and presents the institutionalised research landscape in Germany.
@incollection{reuter_peace_2024,
address = {Wiesbaden, Germany},
title = {Peace {Informatics}: {Bridging} {Peace} and {Conflict} {Studies} with {Computer} {Science}},
abstract = {Advances in science and technology play a crucial role in the context of peace, conflict and security. As information technology (IT) is becoming omnipresent, this includes both the resilience of IT infrastructures e.g. as a target in cases of conflict and the role of IT applications to prevent and manage conflicts, crises and disasters. This chapter is an introduction to IT and its role in war and peace, in conflicts and crises as well as in safety and security. Based on those connections a new field of research has emerged: IT peace research. It is introduced in this chapter which provides an overview of the inter-disciplinary concepts of peace, conflict and security. In addition, the research disciplines computer science and peace and conflict studies as the basis of IT peace research are explained. Moreover, the chapter focuses on the specific research topics of IT peace research and presents the institutionalised research landscape in Germany.},
booktitle = {Information {Technology} for {Peace} and {Security} - {IT} {Applications} and {Infrastructures} in {Conflicts}, {Crises}, {War}, and {Peace}},
publisher = {Springer Vieweg},
author = {Reuter, Christian and Gonsior, Anja-Liisa and Riebe, Thea and Kaufhold, Marc-André},
editor = {Reuter, Christian},
year = {2024},
keywords = {Security, Peace, Infrastructure},
}
[BibTeX] [Abstract]
Not only today, but also in the future information technology and the advances in the field of computer science will have a high relevance for peace and security. Naturally, a textbook like this can only cover a selective part of research and a certain point in time. Nonetheless, it can be attempted to identify trends, challenges and venture an outlook into the future. That is exactly what we want to achieve in this chapter: To predict fu-ture developments and try to classify them correctly. These considerations were made both by the editor and the authors involved alike. Therefore, an outlook based on fun-damentals, cyber conflicts and war, cyber peace, cyber arms control, infrastructures as well as social interaction is given.
@incollection{reuter_outlook_2024,
address = {Wiesbaden, Germany},
title = {Outlook: {The} {Future} of {IT} in {Peace} and {Security}},
abstract = {Not only today, but also in the future information technology and the advances in the field of computer science will have a high relevance for peace and security. Naturally, a textbook like this can only cover a selective part of research and a certain point in time. Nonetheless, it can be attempted to identify trends, challenges and venture an outlook into the future. That is exactly what we want to achieve in this chapter: To predict fu-ture developments and try to classify them correctly. These considerations were made both by the editor and the authors involved alike. Therefore, an outlook based on fun-damentals, cyber conflicts and war, cyber peace, cyber arms control, infrastructures as well as social interaction is given.},
booktitle = {Information {Technology} for {Peace} and {Security} - {IT} {Applications} and {Infrastructures} in {Conflicts}, {Crises}, {War}, and {Peace}},
publisher = {Springer Vieweg},
author = {Reuter, Christian and Aal, Konstantin and Altmann, Jürgen and Bernhardt, Ute and Denker, Kai and Franken, Jonas and Gonsior, Anja-Liisa and Guntrum, Laura and Herrmann, Dominik and Hollick, Matthias and Katzenbeisser, Stefan and Kaufhold, Marc-André and Reinhold, Thomas and Riebe, Thea and Ruhmann, Ingo and Saalbach, Klaus-Peter and Schirch, Lisa and Schmid, Stefka and Schörnig, Niklas and Sunyaev, Ali and Wulf, Volker},
editor = {Reuter, Christian},
year = {2024},
keywords = {Security, Peace, Projekt-CROSSING},
}
[BibTeX] [Abstract]
Technological and scientific progress, especially the rapid development in information technology (IT), plays a crucial role regarding questions of peace and security. This textbook addresses the significance, potentials and challenges of IT for peace and securi-ty. For this purpose, the book offers an introduction to peace, conflict, and security research, thereby focusing on natural science, technical and computer science perspec-tives. In the following, it sheds light on fundamentals (e.g. IT in peace, conflict and security, natural-science/technical peace research), cyber conflicts and war (e.g. infor-mation warfare, cyber espionage, cyber defence, Darknet), cyber peace (e.g. dual-use, technology assessment, confidence and security building measures), cyber arms control (e.g. arms control in the cyberspace, unmanned systems, verification), cyber attribution and infrastructures (e.g. attribution of cyber attacks, resilient infrastructures, secure critical information infrastructures), culture and interaction (e.g. safety and security, cultural violence, social media), before an outlook is given. This chapter provides an overview of all chapters in this book.
@incollection{reuter_overview_2024,
address = {Wiesbaden, Germany},
title = {An {Overview} and {Introduction} to {Information} {Technology} for {Peace} and {Security}},
abstract = {Technological and scientific progress, especially the rapid development in information technology (IT), plays a crucial role regarding questions of peace and security. This textbook addresses the significance, potentials and challenges of IT for peace and securi-ty. For this purpose, the book offers an introduction to peace, conflict, and security research, thereby focusing on natural science, technical and computer science perspec-tives. In the following, it sheds light on fundamentals (e.g. IT in peace, conflict and security, natural-science/technical peace research), cyber conflicts and war (e.g. infor-mation warfare, cyber espionage, cyber defence, Darknet), cyber peace (e.g. dual-use, technology assessment, confidence and security building measures), cyber arms control (e.g. arms control in the cyberspace, unmanned systems, verification), cyber attribution and infrastructures (e.g. attribution of cyber attacks, resilient infrastructures, secure critical information infrastructures), culture and interaction (e.g. safety and security, cultural violence, social media), before an outlook is given. This chapter provides an overview of all chapters in this book.},
booktitle = {Information {Technology} for {Peace} and {Security} - {IT} {Applications} and {Infrastructures} in {Conflicts}, {Crises}, {War}, and {Peace}},
publisher = {Springer Vieweg},
author = {Reuter, Christian and Franken, Jonas and Gonsior, Anja-Liisa and Guntrum, Laura and Schmid, Stefka},
editor = {Reuter, Christian},
year = {2024},
keywords = {Security, Peace, Projekt-CROSSING},
}
[BibTeX]
@incollection{reuter_teaching_2024,
address = {Wiesbaden, Germany},
title = {Teaching {Peace} {Informatics}: {Reflections} from {Lectures} and {Exercises}},
booktitle = {Information {Technology} for {Peace} and {Security} - {IT} {Applications} and {Infrastructures} in {Conflicts}, {Crises}, {War}, and {Peace}},
publisher = {Springer Vieweg},
author = {Reuter, Christian and Riebe, Thea and Haunschild, Jasmin and Reinhold, Thomas and Schmid, Stefka},
editor = {Reuter, Christian},
year = {2024},
keywords = {Security, Peace, Infrastructure},
}
[BibTeX]
@incollection{riebe_dual-use_2024,
address = {Wiesbaden, Germany},
title = {Dual-{Use} {Information} {Technology}: {Research}, {Development} and {Governance}},
isbn = {978-3-658-25652-4},
booktitle = {Information {Technology} for {Peace} and {Security} - {IT} {Applications} and {Infrastructures} in {Conflicts}, {Crises}, {War}, and {Peace}},
publisher = {Springer Vieweg},
author = {Riebe, Thea and Schmid, Stefka and Reuter, Christian},
editor = {Reuter, Christian},
year = {2024},
keywords = {Peace},
}
[BibTeX]
@incollection{riebe_creative_2024,
title = {Creative {Uses} of {Technology}: {Dual} {Use} {Governance}, {Assessment} and {Design}},
booktitle = {Conflict \& {Health} {Handbook}},
publisher = {De Gruyter},
author = {Riebe, Thea and Schmid, Stefka and Reuter, Christian},
editor = {Hagopian, Amy and Birch, Marion},
year = {2024},
keywords = {Peace},
}
2023
[BibTeX] [Abstract] [Download PDF]
Kritische Infrastrukturen sind häufig über Jahrzehnte gewachsene, komplexe Netze. Dennoch fehlt derzeit die historische Perspektive auf die Aufschichtungstendenzen von Technologien in den Sektoren, die für die Gesellschaft essenzielle Dienste bereitstellen. Ein besseres Verständnis von Ausbreitungs-, Ausbau-, Ersatz- und Ausmusterungsprozessen kann Entscheidungshilfe und Orientierung für resilientere Versorgungsnetzarchitekturen in der Zukunft geben. Kompatibilitätsprobleme mit Legacy-Soft- und Hardware sind bekannte Phänomene in vielen KRITIS-Einrichtungen. Entsprechend gewinnen Wissens- und Erfahrungstransfers bei zunehmend komplexen, dennoch über Jahrzehnte verwendete Technologien in landwirtschaftlichen Betrieben enorm an Bedeutung. Der Beitrag vollzieht die Konzeption und Fragestellungen eines interdisziplinären Forschungsprojekts nach, in welchem die Verwundbarkeit der kritischen Infrastruktursektoren Verkehr und Kommunikation im Rhein-Main-Gebiet analysiert wird. Von den Leistungen beider Sektoren hängt die digitale Landwirtschaft stark ab. Insbesondere rurale, beim digitalen und Schienennetzausbau häufig vernachlässigte Gebiete werden dabei mittels explorativer Interviewstudie und anschließender archivbasierter, quantitativer Überprüfung der zuvor generierten Hypothesen aus einer raum-zeitlichen und technischen Perspektive untersucht.
@incollection{franken_netz_2023,
address = {Bonn},
title = {Das {Netz} hat {Geschichte}: {Historisch}-technische {Analyse} der kritischen {Infrastrukturen} in der {Region} {Rhein}/{Main}},
url = {https://peasec.de/paper/2023/2023_FrankenZivkovicThiessenEngelsReuter_NetzGeschichte_GI.pdf},
abstract = {Kritische Infrastrukturen sind häufig über Jahrzehnte gewachsene, komplexe Netze. Dennoch fehlt derzeit die historische Perspektive auf die Aufschichtungstendenzen von Technologien in den Sektoren, die für die Gesellschaft essenzielle Dienste bereitstellen. Ein besseres Verständnis von Ausbreitungs-, Ausbau-, Ersatz- und Ausmusterungsprozessen kann Entscheidungshilfe und Orientierung für resilientere Versorgungsnetzarchitekturen in der Zukunft geben. Kompatibilitätsprobleme mit Legacy-Soft- und Hardware sind bekannte Phänomene in vielen KRITIS-Einrichtungen. Entsprechend gewinnen Wissens- und Erfahrungstransfers bei zunehmend komplexen, dennoch über Jahrzehnte verwendete Technologien in landwirtschaftlichen Betrieben enorm an Bedeutung. Der Beitrag vollzieht die Konzeption und Fragestellungen eines interdisziplinären Forschungsprojekts nach, in welchem die Verwundbarkeit der kritischen Infrastruktursektoren Verkehr und Kommunikation im Rhein-Main-Gebiet analysiert wird. Von den Leistungen beider Sektoren hängt die digitale Landwirtschaft stark ab. Insbesondere rurale, beim digitalen und Schienennetzausbau häufig vernachlässigte Gebiete werden dabei mittels explorativer Interviewstudie und anschließender archivbasierter, quantitativer Überprüfung der zuvor generierten Hypothesen aus einer raum-zeitlichen und technischen Perspektive untersucht.},
booktitle = {{INFORMATIK} 2023 - {Designing} {Futures}: {Zukünfte} gestalten},
publisher = {Gesellschaft für Informatik e. V.},
author = {Franken, Jonas and Zivkovic, Marco and Thiessen, Nadja and Engels, Jens Ivo and Reuter, Christian},
year = {2023},
doi = {10.18420/inf2023_159},
keywords = {Security, Infrastructure, Projekt-ATHENE-SecUrban, Projekt-emergenCITY, Projekt-AgriRegio},
pages = {1--6},
}
[BibTeX] [Abstract] [Download PDF]
The importance of dealing with fake newsfake news has increased in both political and social contexts: While existing studies mainly focus on how to detect and label fake news, approaches to help users make their own assessments are largely lacking. This article presents existing black-boxblack box and white-boxwhite box approaches and compares advantages and disadvantages. In particular, white-box approaches show promise in counteracting reactance, while black-box approaches detect fake news with much greater accuracy. We also present the browser plugin TrustyTweetTrustyTweet, which we developed to help users evaluate tweets on Twitter by displaying politically neutral and intuitive warnings without generating reactance.
@incollection{hartwig_countering_2023,
address = {Wiesbaden},
title = {Countering {Fake} {News} {Technically} – {Detection} and {Countermeasure} {Approaches} to {Support} {Users}},
isbn = {978-3-658-40406-2},
url = {https://peasec.de/paper/2023/2023_HartwigReuter_CounteringFakeNews_TruthFakePostTruth.pdf},
abstract = {The importance of dealing with fake newsfake news has increased in both political and social contexts: While existing studies mainly focus on how to detect and label fake news, approaches to help users make their own assessments are largely lacking. This article presents existing black-boxblack box and white-boxwhite box approaches and compares advantages and disadvantages. In particular, white-box approaches show promise in counteracting reactance, while black-box approaches detect fake news with much greater accuracy. We also present the browser plugin TrustyTweetTrustyTweet, which we developed to help users evaluate tweets on Twitter by displaying politically neutral and intuitive warnings without generating reactance.},
booktitle = {Truth and {Fake} in the {Post}-{Factual} {Digital} {Age}: {Distinctions} in the {Humanities} and {IT} {Sciences}},
publisher = {Springer Fachmedien Wiesbaden},
author = {Hartwig, Katrin and Reuter, Christian},
editor = {Klimczak, Peter and Zoglauer, Thomas},
year = {2023},
doi = {10.1007/978-3-658-40406-2_7},
keywords = {Crisis, HCI, SocialMedia, Projekt-CROSSING, Projekt-ATHENE},
pages = {131--147},
}
[BibTeX] [Abstract] [Download PDF]
The digitalisation of critical infrastructure has increased the risk of large-scale cyber incidents. In contrast to the management of conventional emergencies by established civil protection organisations involving volunteers in Germany, few response capacities exist for these events. The concept of a volunteer force for cyber security could close this protection gap. However, such involvement also poses practical and ethical challenges. By conducting interviews with computer science students (N = 11), this paper analyses potential volunteers’ attitudes towards ethical implications of a cyber volunteer force, as well as practical aspects that might motivate or hinder their participation. A qualitative content analysis reveals that students are largely unaware of potential dilemmas connected to vulnerabilities handling and national cybersecurity interests. Ethical guidelines and means of motivating and encouraging potential volunteers are discussed.
@incollection{haunschild_dual-use_2023,
title = {Dual-use in volunteer operations? {Attitudes} of computer science students regarding the establishment of a cyber security volunteer force},
isbn = {978-83-66675-89-6},
url = {https://sciendo.com/chapter/9788366675896/10.2478/9788366675896-006},
abstract = {The digitalisation of critical infrastructure has increased the risk of large-scale cyber incidents. In contrast to the management of conventional emergencies by established civil protection organisations involving volunteers in Germany, few response capacities exist for these events. The concept of a volunteer force for cyber security could close this protection gap. However, such involvement also poses practical and ethical challenges. By conducting interviews with computer science students (N = 11), this paper analyses potential volunteers’ attitudes towards ethical implications of a cyber volunteer force, as well as practical aspects that might motivate or hinder their participation. A qualitative
content analysis reveals that students are largely unaware of potential dilemmas connected to vulnerabilities handling and national cybersecurity interests. Ethical guidelines and means of motivating and encouraging potential volunteers
are discussed.},
booktitle = {International {Symposium} on {Technikpsychologie} ({TecPsy})},
publisher = {Sciendo},
author = {Haunschild, Jasmin and Jung, Leon and Reuter, Christian},
editor = {Nina, Gerber and Zimmermann, Verena},
year = {2023},
keywords = {Crisis, Student, UsableSec, Security, Projekt-ATHENE-SecUrban, Projekt-emergenCITY},
pages = {66--81},
}
[BibTeX] [Abstract] [Download PDF]
The use of social media today is not only ubiquitous and an integral part of everyday life but is also increasingly relevant before, during, or after emergencies. Data produced in these contexts, such as situational updates and multimedia content, is disseminated across different social media platforms and can be leveraged by various actors, including emergency services or volunteer communities. However, the dissemination of several thousand or even millions of messages during large-scale emergencies confronts analysts with challenges of information quality and overload. Hence, crisis informatics as a research domain seeks to explore and develop systems that support the collection, analysis, and dissemination of valuable social media information in emergencies. This chapter presents the social media API (SMA), which is a multi-platform service for gathering big social data across different social media channels and analyzing the credibility and relevance of collected data by the means of machine learning models. Based on the lessons learned from both the implementation process and user-centered evaluations in multiple emergency settings, this chapter discusses core challenges and potentials of the SMA and similar services, focusing on (1) the multi-platform gathering and management of data, (2) the mitigation of information overload by relevance assessment and message grouping, (3) the assessment of credibility and information quality, and (4) user-centered tailorability and adjustable data operations.
@incollection{kaufhold_big_2023,
address = {Singapore},
title = {Big {Data} and {Multi}-platform {Social} {Media} {Services} in {Disaster} {Management}},
isbn = {978-981-16-8800-3},
url = {https://peasec.de/paper/2023/2023_KaufholdReuterLudwig_BigDataMultiPlatformSocialMediaDisaster_HandbookDisaster.pdf},
abstract = {The use of social media today is not only ubiquitous and an integral part of everyday life but is also increasingly relevant before, during, or after emergencies. Data produced in these contexts, such as situational updates and multimedia content, is disseminated across different social media platforms and can be leveraged by various actors, including emergency services or volunteer communities. However, the dissemination of several thousand or even millions of messages during large-scale emergencies confronts analysts with challenges of information quality and overload. Hence, crisis informatics as a research domain seeks to explore and develop systems that support the collection, analysis, and dissemination of valuable social media information in emergencies. This chapter presents the social media API (SMA), which is a multi-platform service for gathering big social data across different social media channels and analyzing the credibility and relevance of collected data by the means of machine learning models. Based on the lessons learned from both the implementation process and user-centered evaluations in multiple emergency settings, this chapter discusses core challenges and potentials of the SMA and similar services, focusing on (1) the multi-platform gathering and management of data, (2) the mitigation of information overload by relevance assessment and message grouping, (3) the assessment of credibility and information quality, and (4) user-centered tailorability and adjustable data operations.},
booktitle = {International {Handbook} of {Disaster} {Research}},
publisher = {Springer Nature Singapore},
author = {Kaufhold, Marc-André and Reuter, Christian and Ludwig, Thomas},
editor = {Singh, Amita},
year = {2023},
keywords = {Crisis, HCI, Projekt-KOKOS, Projekt-CYWARN, Projekt-emergenCITY},
pages = {1--21},
}
[BibTeX] [Abstract] [Download PDF]
Neben positiven Aspekten wie der Produktivitätssteigerung bringt die Digitalisierung auch neue Gefahren mit sich. Entsprechend muss der Prozess gerade in Bereichen von gesellschaftlich enormer Bedeutung kritisch begleitet werden, um eine fundierte Entscheidung bei Auswahl und Entwicklung neuer Technologien zu treffen. Die Vision ist hierbei ein resilientes Smart Farming (RSF), bei dem die Fortschritte der Digitalisierung in der Landwirtschaft genutzt werden, ohne dabei die Ausfallsicherheit der landwirtschaftlichen Primärproduktion und somit die Lebensmittelversorgung der Verbraucher zu gefährden. Dieser Workshop konzentriert sich auf die Bewältigung dieser Forschungsherausforderungen und liefert Beiträge zu verschiedenen Themenbereichen. Dazu gehören (1) ein Hofbox-Ansatz basierend auf etablierten Open-Source Werkzeugen, (2) ein mobiles Assistenzsystem für den Transport von künstlichen Besamungsportionen, (3) die historische Perspektive auf kritische Infrastrukturen in der Region Rhein/Main, und (4) eine Messenger-Applikation zur Notfallkommunikation mittels LoRaWAN-basierten IoT-Setups.
@incollection{kuntke_rsf-lab23_2023,
address = {Bonn},
title = {{RSF}-{Lab}'23: {Konzepte} und {Anwendungen} zur resilienten digitalen {Landwirtschaft}},
isbn = {978-3-88579-731-9},
url = {https://peasec.de/paper/2023/2023_KuntkeEberzEderTrappReuter_KonzepteAnwendungen_GI.pdf},
abstract = {Neben positiven Aspekten wie der Produktivitätssteigerung bringt die Digitalisierung auch neue Gefahren mit sich. Entsprechend muss der Prozess gerade in Bereichen von gesellschaftlich enormer Bedeutung kritisch begleitet werden, um eine fundierte Entscheidung bei Auswahl und Entwicklung neuer Technologien zu treffen. Die Vision ist hierbei ein resilientes Smart Farming (RSF), bei dem die Fortschritte der Digitalisierung in der Landwirtschaft genutzt werden, ohne dabei die Ausfallsicherheit der landwirtschaftlichen Primärproduktion und somit die Lebensmittelversorgung der Verbraucher zu gefährden. Dieser Workshop konzentriert sich auf die Bewältigung dieser Forschungsherausforderungen und liefert Beiträge zu verschiedenen Themenbereichen. Dazu gehören (1) ein Hofbox-Ansatz basierend auf etablierten Open-Source Werkzeugen, (2) ein mobiles Assistenzsystem für den Transport von künstlichen Besamungsportionen, (3) die historische Perspektive auf kritische Infrastrukturen in der Region Rhein/Main, und (4) eine Messenger-Applikation zur Notfallkommunikation mittels LoRaWAN-basierten IoT-Setups.},
booktitle = {{INFORMATIK} 2023 - {Designing} {Futures}: {Zukünfte} gestalten},
publisher = {Gesellschaft für Informatik e. V.},
author = {Kuntke, Franz and Eberz-Eder, Daniel and Trapp, Matthias and Reuter, Christian},
year = {2023},
doi = {10.18420/inf2023_156},
keywords = {Security, RSF, Projekt-AgriRegio},
pages = {1529--1533},
}
[BibTeX] [Abstract] [Download PDF]
Die vorliegende Arbeit präsentiert die Entwicklung einer Messenger-App mit Schwerpunkt auf Benutzerfreundlichkeit, für die Nutzung mit einem bestehenden LoRaWAN-DTN-Backend. Die App ermöglicht den Austausch von Nachrichten mit anderen Personen über ein vorhandenes Kommunikationssystem auf LoRaWAN-Basis. Das grundlegende Softwaregerüst wurde mithilfe agiler Softwareentwicklungsmethoden als Progressive-Web-App entwickelt und iterativ verbessert. Das Ergebnis ist eine plattformübergreifende App für Desktop-PCs und Android-Smartphones. Die App bietet grundlegende Messenger-Funktionen wie Kontaktverwaltung, Chatverlauf-Speicher und Benachrichtigungen. Zusätzlich enthält die App erweiterte Funktionen wie einen leicht zugänglichen SOS-Button, um Notfallnachrichten schnell absetzen zu können. Ziel der Entwicklung war es, die Gebrauchstauglichkeit gegenüber einem ersten Prototyp zu verbessern. Die App soll effektive Kommunikation zwischen Helfern und Betroffenen ermöglichen, während und nach Krisenereignissen wie beispielsweise der europäischen Flutkatastrophe 2021. In folgenden Arbeiten soll das System unter Nutzung dieser App im Einsatz getestet werden.
@incollection{orlov_optimierte_2023,
title = {Optimierte {Messenger}-{Applikation} zur {Notfallkommunikation} via {LoRaWAN}-{DTN}},
url = {https://peasec.de/paper/2023/2023_OrlovKuntkeReuter_OptimierteMessengerApplikation_GI.pdf},
abstract = {Die vorliegende Arbeit präsentiert die Entwicklung einer Messenger-App mit Schwerpunkt auf Benutzerfreundlichkeit, für die Nutzung mit einem bestehenden LoRaWAN-DTN-Backend. Die App ermöglicht den Austausch von Nachrichten mit anderen Personen über ein vorhandenes Kommunikationssystem auf LoRaWAN-Basis. Das grundlegende Softwaregerüst wurde mithilfe agiler Softwareentwicklungsmethoden als Progressive-Web-App entwickelt und iterativ verbessert. Das Ergebnis ist eine plattformübergreifende App für Desktop-PCs und Android-Smartphones. Die App bietet grundlegende Messenger-Funktionen wie Kontaktverwaltung, Chatverlauf-Speicher und Benachrichtigungen. Zusätzlich enthält die App erweiterte Funktionen wie einen leicht zugänglichen SOS-Button, um Notfallnachrichten schnell absetzen zu können. Ziel der Entwicklung war es, die Gebrauchstauglichkeit gegenüber einem ersten Prototyp zu verbessern. Die App soll effektive Kommunikation zwischen Helfern und Betroffenen ermöglichen, während und nach Krisenereignissen wie beispielsweise der europäischen Flutkatastrophe 2021. In folgenden Arbeiten soll das System unter Nutzung dieser App im Einsatz getestet werden.},
booktitle = {{INFORMATIK} 2023 - {Designing} {Futures}: {Zukünfte} gestalten},
publisher = {Gesellschaft für Informatik e. V.},
author = {Orlov, Denis and Kuntke, Franz and Reuter, Christian},
year = {2023},
doi = {10.18420/inf2023_160},
keywords = {Crisis, Student, RSF, Projekt-AgriRegio},
pages = {1--6},
}
[BibTeX] [Abstract] [Download PDF]
In summary, crisis informatics has established itself as an important research area in the ever-increasing complexity of the cyber world. Its importance is further amplified by the time-critical constraints of emergencies and disasters. However, crisis informatics will be challenged to evolve quickly to tackle global-scale emergencies, such as the ongoing COVID-19 pandemic and the increasing risks of natural hazards due to climate change. This chapter seeks to supplement this effort by analyzing interaction, role, information, and perception patterns, which were prevalent in the past 20 years of social media use in crises.
@incollection{reuter_crisis_2023,
title = {Crisis {Informatics}},
isbn = {978-1-00-905708-0},
url = {https://www.cambridge.org/de/universitypress/subjects/psychology/applied-psychology/cambridge-handbook-cyber-behavior?format=WX&isbn=9781316616956},
abstract = {In summary, crisis informatics has established itself as an important research area in the ever-increasing complexity of the cyber world. Its importance is further amplified by the time-critical constraints of emergencies and disasters. However, crisis informatics will be challenged to evolve quickly to tackle global-scale emergencies, such as the ongoing COVID-19 pandemic and the increasing risks of natural hazards due to climate change. This chapter seeks to supplement this effort by analyzing interaction, role, information, and perception patterns, which were prevalent in the past 20 years of social media use in crises.},
booktitle = {Cambridge {Handbook} of {Cyber} {Behavior}},
publisher = {Cambridge University Press},
author = {Reuter, Christian and Kaufhold, Marc-André},
editor = {Yan, Zheng},
year = {2023},
keywords = {Crisis, HCI, Peace, Projekt-CYWARN, Projekt-ATHENE-FANCY, Projekt-emergenCITY},
}
[BibTeX] [Abstract] [Download PDF]
The conference Science · Peace · Security ’23 took place from September 20 to 22, 2023, at the Georg-Christoph-Lichtenberg-Haus of the Technical University of Darmstadt. It focused on the transformation of technologies, their role in wars and conflicts, and issues related to arms control. The three-day scientific conference welcomed over 110 participants from Germany and speakers from the United Kingdom, Sweden, the USA, Colombia, India, Italy, Switzerland, Norway, the Czech Republic, Iraq, Austria, and the Netherlands. More than 50 different organizations were represented, ensuring interdisciplinary exchange. The program covered a wide range of topics reflecting societal discourses in light of a changing global security landscape. In total, the conference featured 40 presentations, workshops, discussions, and panels that discussed current and future challenges in the field of technical peace and conflict research. Particularly relevant topics included: Artificial Intelligence, Unmanned Weapons Systems, Rocket and Space Technologies (Nuclear) Arms Control, Regulation of Biological and Chemical Weapons, Information Technologies for Surveillance and Oppression of Civilians, (Civilian) Critical Infrastructures, Digital Peacebuilding, Human-Machine Interaction, Dual-Used, Cyber Attacks and Relevant Technology and Security Policies.
@incollection{reuter_science_2023-1,
address = {Darmstadt, Germany},
title = {Science {Peace} {Security} ’23: {Editorial} of the {Proceedings} of the {Interdisciplinary} {Conference} on {Technical} {Peace} and {Security} {Research}},
url = {https://tuprints.ulb.tu-darmstadt.de/id/eprint/24777},
abstract = {The conference Science · Peace · Security '23 took place from September 20 to 22, 2023, at the Georg-Christoph-Lichtenberg-Haus of the Technical University of Darmstadt. It focused on the transformation of technologies, their role in wars and conflicts, and issues related to arms control. The three-day scientific conference welcomed over 110 participants from Germany and speakers from the United Kingdom, Sweden, the USA, Colombia, India, Italy, Switzerland, Norway, the Czech Republic, Iraq, Austria, and the Netherlands. More than 50 different organizations were represented, ensuring interdisciplinary exchange. The program covered a wide range of topics reflecting societal discourses in light of a changing global security landscape. In total, the conference featured 40 presentations, workshops, discussions, and panels that discussed current and future challenges in the field of technical peace and conflict research. Particularly relevant topics included: Artificial Intelligence, Unmanned Weapons Systems, Rocket and Space Technologies (Nuclear) Arms Control, Regulation of Biological and Chemical Weapons, Information Technologies for Surveillance and Oppression of Civilians, (Civilian) Critical Infrastructures, Digital Peacebuilding, Human-Machine Interaction, Dual-Used, Cyber Attacks and Relevant Technology and Security Policies.},
booktitle = {Science {Peace} {Security} ’23: {Proceedings} of the {Interdisciplinary} {Conference} on {Technical} {Peace} and {Security} {Research}},
publisher = {TUprints},
author = {Reuter, Christian and Riebe, Thea and Guntrum, Laura},
editor = {Reuter, Christian and Riebe, Thea and Guntrum, Laura},
year = {2023},
doi = {10.26083/tuprints-00024777},
keywords = {Security, Peace, Projekt-CROSSING, Projekt-TraCe},
pages = {9--13},
}
[BibTeX] [Abstract] [Download PDF]
When considering privacy, context, and environmental circumstances can have a strong influence on individual decisions and user behavior. Especially in crises or threatening situations, privacy may conflict with other values, such as personal safety and health. In other cases, personal or public safety can also be dependent on privacy: the context of flight shows how, for those affected, the value of data protection can increase as a result of an increased threat situation. Thus, when individual sovereignty—the autonomous development of one’s own will—or safety is highly dependent on information flows, people tend to be more protective of their privacy in order to maintain their information sovereignty. But also, the context of agriculture, as part of the critical infrastructure, shows how privacy concerns can affect the adoption of digital tools. With these two examples, flight and migration as well as agriculture, this chapter presents some exemplary results that illustrate the importance of the influence of situational factors on perceived information sovereignty and the evaluation of privacy.
@incollection{steinbrink_privacy_2023,
address = {Cham},
title = {Privacy {Perception} and {Behaviour} in {Safety}-{Critical} {Environments}},
isbn = {978-3-031-28643-8},
url = {https://doi.org/10.1007/978-3-031-28643-8_12},
abstract = {When considering privacy, context, and environmental circumstances can have a strong influence on individual decisions and user behavior. Especially in crises or threatening situations, privacy may conflict with other values, such as personal safety and health. In other cases, personal or public safety can also be dependent on privacy: the context of flight shows how, for those affected, the value of data protection can increase as a result of an increased threat situation. Thus, when individual sovereignty—the autonomous development of one’s own will—or safety is highly dependent on information flows, people tend to be more protective of their privacy in order to maintain their information sovereignty. But also, the context of agriculture, as part of the critical infrastructure, shows how privacy concerns can affect the adoption of digital tools. With these two examples, flight and migration as well as agriculture, this chapter presents some exemplary results that illustrate the importance of the influence of situational factors on perceived information sovereignty and the evaluation of privacy.},
booktitle = {Human {Factors} in {Privacy} {Research}},
publisher = {Springer International Publishing},
author = {Steinbrink, Enno and Biselli, Tom and Linsner, Sebastian and Herbert, Franziska and Reuter, Christian},
editor = {Gerber, Nina and Stöver, Alina and Marky, Karola},
year = {2023},
keywords = {HCI, UsableSec, Security, Projekt-CROSSING, Projekt-ATHENE-FANCY, Projekt-GRKPrivacy},
pages = {237--251},
}
[BibTeX] [Abstract] [Download PDF]
In this paper we provide an overview of XAI by introducing fundamental terminology and the goals of XAI, as well as recent research findings. Whilst doing this, we pay special attention to strategies for non-expert stakeholders. This leads us to our first research question: “What are the trends in explainable AI strategies for non-experts?”. In order to illustrate the current state of these trends, we further want to study an exemplary and very relevant application domain. According to Abdul et al. (2018), one of the first domains where researchers pursued XAI is the medical domain. This leads to our second research question: “What are the approaches of XAI in the medical domain for non-expert stakeholders?” These research questions will provide an overview of current topics in XAI and show possible research extensions for specific domains.
@incollection{ozalp_trends_2023,
address = {Bielefeld},
title = {Trends in {Explainable} {Artificial} {Intelligence} for {Non}-{Experts}},
url = {https://www.transcript-verlag.de/978-3-8376-5732-6/ai-limits-and-prospects-of-artificial-intelligence/?c=313000019},
abstract = {In this paper we provide an overview of XAI by introducing fundamental terminology and the goals of XAI, as well as recent research findings. Whilst doing this, we pay special attention to strategies for non-expert stakeholders. This leads us to our first research question: “What are the trends in explainable AI strategies for non-experts?”. In order to illustrate the current state of these trends, we further want to study an exemplary and very relevant application domain. According to Abdul et al. (2018), one of the first domains where researchers pursued XAI is the medical domain. This leads to our second research question: “What are the approaches of XAI in the medical domain for non-expert stakeholders?” These research questions will provide an overview of current topics in XAI and show possible research extensions for specific domains.},
booktitle = {{AI} - {Limits} and {Prospects} of {Artificial} {Intelligence}},
publisher = {Transcript Verlag},
author = {Özalp, Elise and Hartwig, Katrin and Reuter, Christian},
editor = {Klimczak, Peter and Petersen, Christer},
year = {2023},
keywords = {HCI, Student, UsableSec, Projekt-CROSSING, Projekt-ATHENE-SecUrban, Projekt-CYWARN},
pages = {223--243},
}
2022
[BibTeX] [Abstract] [Download PDF]
Mobile technologies and social media services are among the socio-technological innovations that have an enormous impact transforming modern culture and political processes. Social media are often defined as a “group of internet-based applications […] that allow the creation and exchange of user-generated content” (Kaplan and Haenlein 2010). Shaping opinions, politics, participation, and protest (Wulf et al. 2013), they are used by citizens for news consumption and social exchange (Robinson et al. 2017); by journalists for reporting, analyzing, and collecting information (Stieglitz et al. 2018a); and by organizations to monitor crises, emergencies, customer feedback, and sentiment, among others (Haunschild et al. 2020). Large-scale international events, such as the 2010 Arab Spring, showcased the potential of socio-technological transformations: Citizens were not passive victims but active and autonomous participants utilizing social media to coordinate protest and for crisis response (Reuter and Kaufhold 2018). However, in other cases, citizens’ activities coordinated via social media also increased the complexity of tasks and pressure for formal authorities, since the lack of state control has not had only empowering or benign effects. Instead, on social media, false information spreads fast and it is easy for groups to find an audience there, either to enhance their profit or to target vulnerable groups with dangerous ideology.
@incollection{haunschild_cultural_2022,
title = {Cultural {Violence} and {Fragmentation} on {Social} {Media}: {Interventions} and {Countermeasures} by {Humans} and {Social} {Bots}},
isbn = {978-0-367-62674-7},
url = {https://peasec.de/paper/2022/2022_HaunschildKaufholdReuter_SocialMediaAndFragmentation_Routledge.pdf},
abstract = {Mobile technologies and social media services are among the socio-technological innovations that have an enormous impact transforming modern culture and political processes. Social media are often defined as a “group of internet-based applications […] that allow the creation and exchange of user-generated content” (Kaplan and Haenlein 2010). Shaping opinions, politics, participation, and protest (Wulf et al. 2013), they are used by citizens for news consumption and social exchange (Robinson et al. 2017); by journalists for reporting, analyzing, and collecting information (Stieglitz et al. 2018a); and by organizations to monitor crises, emergencies, customer feedback, and sentiment, among others (Haunschild et al. 2020). Large-scale international events, such as the 2010 Arab Spring, showcased the potential of socio-technological transformations: Citizens were not passive victims but active and autonomous participants utilizing social media to coordinate protest and for crisis response (Reuter and Kaufhold 2018). However, in other cases, citizens’ activities coordinated via social media also increased the complexity of tasks and pressure for formal authorities, since the lack of state control has not had only empowering or benign effects. Instead, on social media, false information spreads fast and it is easy for groups to find an audience there, either to enhance their profit or to target vulnerable groups with dangerous ideology.},
booktitle = {Cyber {Security} {Politics}: {Socio}-{Technological} {Transformations} and {Political} {Fragmentation}},
publisher = {Routledge},
author = {Haunschild, Jasmin and Kaufhold, Marc-André and Reuter, Christian},
editor = {Cavelty, Myriam Dunn and Wenger, Andreas},
year = {2022},
keywords = {Crisis, SocialMedia, Peace, Projekt-ATHENE-SecUrban, Projekt-CYWARN, Projekt-emergenCITY},
pages = {48--63},
}
[BibTeX] [Abstract] [Download PDF]
As cyber weapons and artificial intelligence technologies share the same technological foundation of bits and bytes, there is a strong trend of connecting both, thus addressing the imminent challenge of cyber weapons of processing, filtering and aggregating huge amounts of digital data in real time into decisions and actions. This chapter will analyze this development and highlight the increasing tendency towards AI enabled autonomous decisions in defensive as well as offensive cyber weapons, the arising additional challenges for attributing cyberattacks and the problems for developing arms control measures for this “technology fusion”. However, the article also ventures an outlook how AI methods can help to mitigate these challenges if applied for arms control measures itself.
@incollection{reinhold_cyber_2022,
edition = {1},
title = {Cyber {Weapons} and {Artificial} {Intelligence}: {Impact}, {Influence} and the {Challenges} for {Arms} {Control}},
isbn = {978-3-031-11043-6},
url = {https://peasec.de/paper/2022/2022_ReinholdReuter_CyberWeaponsAIImpactInfluenceChallenges_AI-Book.pdf},
abstract = {As cyber weapons and artificial intelligence technologies share the same technological foundation of bits and bytes, there is a strong trend of connecting both, thus addressing the imminent challenge of cyber weapons of processing, filtering and aggregating huge amounts of digital data in real time into decisions and actions. This chapter will analyze this development and highlight the increasing tendency towards AI enabled autonomous decisions in defensive as well as offensive cyber weapons, the arising additional challenges for attributing cyberattacks and the problems for developing arms control measures for this “technology fusion”. However, the article also ventures an outlook how AI methods can help to mitigate these challenges if applied for arms control measures itself.},
language = {en},
booktitle = {Armament, {Arms} {Control} and {Artificial} {Intelligence} - {The} {Janus}-faced {Nature} of {Machine} {Learning} in the {Military} {Realm}},
publisher = {Springer},
author = {Reinhold, Thomas and Reuter, Christian},
editor = {Schörnig, Niklas and Reinhold, Thomas},
year = {2022},
doi = {https://doi.org/10.1007/978-3-031-11043-6_11},
keywords = {Security, Peace, Projekt-ATHENE-SecUrban},
pages = {145--158},
}
2021
[BibTeX] [Abstract] [Download PDF]
Die Bedeutung des Umgangs mit Fake News hat sowohl im politischen als auch im sozialen Kontext zugenommen: Während sich bestehende Studien vor allem darauf konzentrieren, wie man gefälschte Nachrichten erkennt und kennzeichnet, fehlen Ansätze zur Unterstützung der NutzerInnen bei der eigenen Einschätzung weitgehend. Dieser Artikel stellt bestehende Black-Box- und White-Box-Ansätze vor und vergleicht Vor- und Nachteile. Dabei zeigen sich White-Box-Ansätze insbesondere als vielversprechend, um gegen Reaktanzen zu wirken, während Black-Box-Ansätze Fake News mit deutlich größerer Genauigkeit detektieren. Vorgestellt wird auch das von uns entwickelte Browser-Plugin TrustyTweet, welches die BenutzerInnen bei der Bewertung von Tweets auf Twitter unterstützt, indem es politisch neutrale und intuitive Warnungen anzeigt, ohne Reaktanz zu erzeugen.
@incollection{hartwig_fake_2021,
address = {Wiesbaden},
series = {ars digitalis},
title = {Fake {News} technisch begegnen – {Detektions}- und {Behandlungsansätze} zur {Unterstützung} von {NutzerInnen}},
volume = {3},
isbn = {978-3-658-32956-3},
url = {https://peasec.de/paper/2021/2021_HartwigReuter_FakeNewstechnischbegegnen_WahrheitundFake.pdf},
abstract = {Die Bedeutung des Umgangs mit Fake News hat sowohl im politischen als auch im sozialen Kontext zugenommen: Während sich bestehende Studien vor allem darauf konzentrieren, wie man gefälschte Nachrichten erkennt und kennzeichnet, fehlen Ansätze zur Unterstützung der NutzerInnen bei der eigenen Einschätzung weitgehend. Dieser Artikel stellt bestehende Black-Box- und White-Box-Ansätze vor und vergleicht Vor- und Nachteile. Dabei zeigen sich White-Box-Ansätze insbesondere als vielversprechend, um gegen Reaktanzen zu wirken, während Black-Box-Ansätze Fake News mit deutlich größerer Genauigkeit detektieren. Vorgestellt wird auch das von uns entwickelte Browser-Plugin TrustyTweet, welches die BenutzerInnen bei der Bewertung von Tweets auf Twitter unterstützt, indem es politisch neutrale und intuitive Warnungen anzeigt, ohne Reaktanz zu erzeugen.},
language = {de},
booktitle = {Wahrheit und {Fake} {News} im postfaktischen {Zeitalter}},
publisher = {Springer Vieweg},
author = {Hartwig, Katrin and Reuter, Christian},
editor = {Klimczak, Peter and Zoglauer, Thomas},
year = {2021},
keywords = {Crisis, HCI, SocialMedia, Peace},
pages = {133--150},
}
[BibTeX] [Abstract] [Download PDF]
Die sicherheitskritische Mensch-Computer-Interaktion (MCI) ist eine interdisziplinäre Herausforderung und ein für die Informatik und die jeweiligen Anwendungsdomänen ein zunehmend an Bedeutung gewinnendes Thema. Dieses Kapitel bietet eine Einfüh-rung in das Lehr- und Fachbuch „Sicherheitskritische Mensch-Computer-Interaktion – Interaktive Technologien und Soziale Medien im Krisen- und Sicherheitsmanagement“. Als didaktisch aufbereiteter, umfassender Überblick über Grundlagen, Methoden und Anwendungsgebiete soll es sowohl als vorlesungsbegleitende Lektüre als auch als Nach-schlagewerk für Personen aus Wissenschaft, Design und Entwicklung dienen. Dies ad-ressierend werden interaktive, mobile, ubiquitäre und kooperative Technologien sowie soziale Medien vorgestellt. Hierbei finden klassische Themen wie benutzbare (IT-)Sicherheit, Industrie 4.0, Katastrophenschutz, Medizin und Automobil, aber auch Augmented Reality, Crowdsourcing, Shitstorm Management, Social Media Analytics und Cyberwar ihren Platz. Methodisch wird das Spektrum von Usable Safety bis Usable Security Engineering, von Analyse über Design bis Evaluation abgedeckt.
@incollection{reuter_einleitung_2021,
address = {Wiesbaden, Germany},
edition = {2},
title = {Einleitung in die sicherheitskritische {Mensch}-{Computer}-{Interaktion}},
isbn = {978-3-658-32794-1},
url = {https://doi.org/10.1007/978-3-658-32795-8_1},
abstract = {Die sicherheitskritische Mensch-Computer-Interaktion (MCI) ist eine interdisziplinäre Herausforderung und ein für die Informatik und die jeweiligen Anwendungsdomänen ein zunehmend an Bedeutung gewinnendes Thema. Dieses Kapitel bietet eine Einfüh-rung in das Lehr- und Fachbuch „Sicherheitskritische Mensch-Computer-Interaktion – Interaktive Technologien und Soziale Medien im Krisen- und Sicherheitsmanagement“. Als didaktisch aufbereiteter, umfassender Überblick über Grundlagen, Methoden und Anwendungsgebiete soll es sowohl als vorlesungsbegleitende Lektüre als auch als Nach-schlagewerk für Personen aus Wissenschaft, Design und Entwicklung dienen. Dies ad-ressierend werden interaktive, mobile, ubiquitäre und kooperative Technologien sowie soziale Medien vorgestellt. Hierbei finden klassische Themen wie benutzbare (IT-)Sicherheit, Industrie 4.0, Katastrophenschutz, Medizin und Automobil, aber auch Augmented Reality, Crowdsourcing, Shitstorm Management, Social Media Analytics und Cyberwar ihren Platz. Methodisch wird das Spektrum von Usable Safety bis Usable Security Engineering, von Analyse über Design bis Evaluation abgedeckt.},
booktitle = {Sicherheitskritische {Mensch}-{Computer}-{Interaktion}: {Interaktive} {Technologien} und {Soziale} {Medien} im {Krisen}- und {Sicherheitsmanagement} ({Zweite} {Auflage})},
publisher = {Springer Vieweg},
author = {Reuter, Christian},
editor = {Reuter, Christian},
year = {2021},
keywords = {Crisis, HCI, UsableSec, Security, Projekt-CYWARN},
pages = {3--17},
}
[BibTeX] [Abstract] [Download PDF]
Die Nutzung sozialer Medien hat sich nicht nur im Alltag, sondern auch in vielen ver-schiedenen Notfällen, Krisen und Katastrophen etabliert. Dieser Prozess begann bereits vor etwa 20 Jahren nach den Terroranschlägen vom 11. September 2001. In den darauf-folgenden Jahren, vor allem aber dem letzten Jahrzehnt, wurde eine Vielzahl von Stu-dien veröffentlicht, die sich auf den Gebrauch von Informations- und Kommunikations-technologien einschließlich der sozialen Medien vor, während oder nach Notfällen kon-zentrieren. Dieser Forschungsbereich wird auch unter dem Begriff Crisis Informatics zusammengefasst. Das Ziel dieses Kapitels ist es, den Gebrauch von und die Forschung über soziale Medien in Katastrophen und Notfällen in den vergangenen 20 Jahren mit besonderem Schwerpunkt auf identifizierbare Nutzungsmuster und deren Wahrnehmung zusammenzufassen, um die bisherigen Ergebnisse und zukünftigen Potenziale herauszu-stellen.
@incollection{reuter_soziale_2021,
address = {Wiesbaden, Germany},
edition = {2},
title = {Soziale {Medien} in {Notfällen}, {Krisen} und {Katastrophen}},
isbn = {978-3-658-32794-1},
url = {https://doi.org/10.1007/978-3-658-32795-8_19},
abstract = {Die Nutzung sozialer Medien hat sich nicht nur im Alltag, sondern auch in vielen ver-schiedenen Notfällen, Krisen und Katastrophen etabliert. Dieser Prozess begann bereits vor etwa 20 Jahren nach den Terroranschlägen vom 11. September 2001. In den darauf-folgenden Jahren, vor allem aber dem letzten Jahrzehnt, wurde eine Vielzahl von Stu-dien veröffentlicht, die sich auf den Gebrauch von Informations- und Kommunikations-technologien einschließlich der sozialen Medien vor, während oder nach Notfällen kon-zentrieren. Dieser Forschungsbereich wird auch unter dem Begriff Crisis Informatics zusammengefasst. Das Ziel dieses Kapitels ist es, den Gebrauch von und die Forschung über soziale Medien in Katastrophen und Notfällen in den vergangenen 20 Jahren mit besonderem Schwerpunkt auf identifizierbare Nutzungsmuster und deren Wahrnehmung zusammenzufassen, um die bisherigen Ergebnisse und zukünftigen Potenziale herauszu-stellen.},
booktitle = {Sicherheitskritische {Mensch}-{Computer}-{Interaktion}: {Interaktive} {Technologien} und {Soziale} {Medien} im {Krisen}- und {Sicherheitsmanagement} ({Zweite} {Auflage})},
publisher = {Springer Vieweg},
author = {Reuter, Christian and Kaufhold, Marc-André},
editor = {Reuter, Christian},
year = {2021},
keywords = {Crisis, Security, Peace, Projekt-CYWARN},
pages = {407--430},
}
[BibTeX] [Abstract] [Download PDF]
Sicherheitskritische Mensch-Computer-Interaktion ist nicht nur derzeit ein hochaktuel-les Thema, sondern wird dies auch in Zukunft bleiben. Insofern ist ein Lehr- und Fach-buch wie dieses immer nur eine Momentaufnahme, und kann immer nur einen punktuel-len Stand abdecken. Dennoch kann der Versuch unternommen werden, aktuelle Trends zu identifizieren und einen Ausblick in die Zukunft zu wagen. Genau das möchte dieses Kapitel erreichen: Es sollen zukünftige Entwicklungen vorausgesagt und versucht wer-den, diese korrekt einzuordnen. Das ist an dieser Stelle nicht nur durch den Herausgeber, sondern durch Abfrage bei zahlreichen am Lehrbuch beteiligten Autor*innen geschehen. Neben einem Ausblick auf Grundlagen und Methoden werden dementsprechend auch sicherheitskritische interaktive Systeme und sicherheitskritische kooperative Systeme abgedeckt.
@incollection{reuter_zukunft_2021,
address = {Wiesbaden, Germany},
edition = {2},
title = {Die {Zukunft} sicherheitskritischer {Mensch}-{Computer}-{Interaktion}},
isbn = {978-3-658-19523-6},
url = {https://doi.org/10.1007/978-3-658-32795-8_31},
abstract = {Sicherheitskritische Mensch-Computer-Interaktion ist nicht nur derzeit ein hochaktuel-les Thema, sondern wird dies auch in Zukunft bleiben. Insofern ist ein Lehr- und Fach-buch wie dieses immer nur eine Momentaufnahme, und kann immer nur einen punktuel-len Stand abdecken. Dennoch kann der Versuch unternommen werden, aktuelle Trends zu identifizieren und einen Ausblick in die Zukunft zu wagen. Genau das möchte dieses Kapitel erreichen: Es sollen zukünftige Entwicklungen vorausgesagt und versucht wer-den, diese korrekt einzuordnen. Das ist an dieser Stelle nicht nur durch den Herausgeber, sondern durch Abfrage bei zahlreichen am Lehrbuch beteiligten Autor*innen geschehen. Neben einem Ausblick auf Grundlagen und Methoden werden dementsprechend auch sicherheitskritische interaktive Systeme und sicherheitskritische kooperative Systeme abgedeckt.},
booktitle = {Sicherheitskritische {Mensch}-{Computer}-{Interaktion}: {Interaktive} {Technologien} und {Soziale} {Medien} im {Krisen}- und {Sicherheitsmanagement} (2. {Auflage})},
publisher = {Springer Vieweg},
author = {Reuter, Christian and Aal, Konstantin and Beham, Frank and Boden, Alexander and Brauner, Florian and Ludwig, Thomas and Lukosch, Stephan and Fiedrich, Frank and Fuchs-Kittowski, Frank and Geisler, Stefan and Gennen, Klaus and Herrmann, Dominik and Kaufhold, Marc-André and Klafft, Michael and Lipprandt, Myriam and Lo Iacono, Luigi and Pipek, Volkmar and Mentler, Tilo and Nestler, Simon and Pottebaum, Jens and Quadflieg, Sven and Stieglitz, Stefan and Sturm, Christian and Rusch, Gebhard and Sackmann, Stefan and Volkamer, Melanie and Wulf, Volker},
editor = {Reuter, Christian},
year = {2021},
note = {https://doi.org/10.1007/978-3-658-32795-8\_31},
keywords = {Crisis, HCI, SocialMedia, UsableSec, Security, Projekt-KontiKat, Projekt-CYWARN},
pages = {673--681},
}
[BibTeX] [Abstract] [Download PDF]
Seit jeher hatten die Erkenntnisse aus Naturwissenschaft und Technik einen großen Einfluss auf die Art und Weise, wie Kriege und Konflikte ausgetragen wurden bezie-hungsweise werden. Im Kontext von Frieden und Sicherheit können Erkenntnisse, die eigentlich für zivile Kontexte gewonnen wurden, auch für militärische Auseinanderset-zungen genutzt werden (Dual-Use-Problematik). Seit einigen Jahren betrifft dies insbe-sondere die Informatik, die durch die militärische Nutzung von Computern, Cyberwar, Cyberspionage Information Warfare, aber auch in Bereichen wie Desinformationen kon-fliktäre Auseinandersetzungen unterstützen (und verstärken) kann. Auch werden Kon-flikte vermehrt im digitalen Raum ausgetragen, mit erschwerter Zuordnungsmöglichkeit von einzelnen (angreifenden) Akteur*innen. Im Gegenzug dazu bietet die Informatik jedoch auch für friedensstiftende Aktivitäten zahlreiche Einsatzmöglichkeiten. Dieses Kapitel möchte eine Einführung in die zunehmend an Bedeutung gewinnende Thematik liefern.
@incollection{reuter_informatik_2021,
address = {Wiesbaden, Germany},
edition = {2},
title = {Informatik für {Frieden}-, {Konflikt}- und {Sicherheitsforschung}},
isbn = {978-3-658-32794-1},
url = {https://doi.org/10.1007/978-3-658-32795-8_28},
abstract = {Seit jeher hatten die Erkenntnisse aus Naturwissenschaft und Technik einen großen Einfluss auf die Art und Weise, wie Kriege und Konflikte ausgetragen wurden bezie-hungsweise werden. Im Kontext von Frieden und Sicherheit können Erkenntnisse, die eigentlich für zivile Kontexte gewonnen wurden, auch für militärische Auseinanderset-zungen genutzt werden (Dual-Use-Problematik). Seit einigen Jahren betrifft dies insbe-sondere die Informatik, die durch die militärische Nutzung von Computern, Cyberwar, Cyberspionage Information Warfare, aber auch in Bereichen wie Desinformationen kon-fliktäre Auseinandersetzungen unterstützen (und verstärken) kann. Auch werden Kon-flikte vermehrt im digitalen Raum ausgetragen, mit erschwerter Zuordnungsmöglichkeit von einzelnen (angreifenden) Akteur*innen. Im Gegenzug dazu bietet die Informatik jedoch auch für friedensstiftende Aktivitäten zahlreiche Einsatzmöglichkeiten. Dieses Kapitel möchte eine Einführung in die zunehmend an Bedeutung gewinnende Thematik liefern.},
booktitle = {Sicherheitskritische {Mensch}-{Computer}-{Interaktion}: {Interaktive} {Technologien} und {Soziale} {Medien} im {Krisen}- und {Sicherheitsmanagement} ({Zweite} {Auflage})},
publisher = {Springer Vieweg},
author = {Reuter, Christian and Kaufhold, Marc-André},
editor = {Reuter, Christian},
year = {2021},
keywords = {Security, Peace, Projekt-DualUse, Projekt-CYWARN},
pages = {605--630},
}
[BibTeX] [Abstract] [Download PDF]
Kooperationstechnologien spielen in sicherheitskritischen Systemen eine große Rolle, da in vielen Anwendungsfeldern nicht nur die Interaktion von Mensch und Computer, sondern auch die durch IT unterstützte Kooperation zwischen Menschen notwendig ist, um Aufgaben bewältigen zu können. Solche Technologien müssen verschiedene Anfor-derungen erfüllen und können ebenfalls zur Resilienz beitragen. Unter Resilienz durch Kooperation verstehen wir die Fähigkeit, Krisen durch die Anpassungsfähigkeit an ge-änderte Realitäten ohne nachhaltigen Schaden mithilfe von Kooperation zu überstehen. Während das Konzept der Resilienz in den Ingenieurwissenschaften vornehmlich die Verfügbarkeit technischer Systeme fokussiert, betrachten wir Resilienz als soziotechni-sches Konstrukt, unter expliziter Betrachtung der beteiligten Akteur*innen. Basierend auf Grundlagen zu Kooperationstechnologien zeigt dieses Kapitel anhand von prakti-schen exemplarisch umgesetzten Kooperationstechnologien (soziales Netzwerk, GIS-System, Smartphone Apps, Facebook App und Social Media Analytics-Plattform), wie Kooperation unterstützt wird und zu kooperativer Resilienz beitragen kann.
@incollection{reuter_resilienz_2021,
address = {Wiesbaden, Germany},
title = {Resilienz durch {Kooperationstechnologien}},
isbn = {978-3-658-32795-8},
url = {http://www.peasec.de/paper/2021/2021_ReuterLudwigPipek_ResilienzKooperationstechnologien_SecMCI-Kap22.pdf},
abstract = {Kooperationstechnologien spielen in sicherheitskritischen Systemen eine große Rolle, da in vielen Anwendungsfeldern nicht nur die Interaktion von Mensch und Computer, sondern auch die durch IT unterstützte Kooperation zwischen Menschen notwendig ist, um Aufgaben bewältigen zu können. Solche Technologien müssen verschiedene Anfor-derungen erfüllen und können ebenfalls zur Resilienz beitragen. Unter Resilienz durch Kooperation verstehen wir die Fähigkeit, Krisen durch die Anpassungsfähigkeit an ge-änderte Realitäten ohne nachhaltigen Schaden mithilfe von Kooperation zu überstehen. Während das Konzept der Resilienz in den Ingenieurwissenschaften vornehmlich die Verfügbarkeit technischer Systeme fokussiert, betrachten wir Resilienz als soziotechni-sches Konstrukt, unter expliziter Betrachtung der beteiligten Akteur*innen. Basierend auf Grundlagen zu Kooperationstechnologien zeigt dieses Kapitel anhand von prakti-schen exemplarisch umgesetzten Kooperationstechnologien (soziales Netzwerk, GIS-System, Smartphone Apps, Facebook App und Social Media Analytics-Plattform), wie Kooperation unterstützt wird und zu kooperativer Resilienz beitragen kann.},
booktitle = {Sicherheitskritische {Mensch}-{Computer}-{Interaktion}: {Interaktive} {Technologien} und {Soziale} {Medien} im {Krisen}- und {Sicherheitsmanagement}},
publisher = {Springer Vieweg},
author = {Reuter, Christian and Ludwig, Thomas and Pipek, Volkmar},
editor = {Reuter, Christian},
year = {2021},
doi = {10.1007/978-3-658-32795-8_22},
keywords = {Cooperation, HCI, SocialMedia, Projekt-KontiKat, Infrastructure, RSF},
pages = {473--493},
}
[BibTeX] [Abstract] [Download PDF]
Die Gestaltung gebrauchstauglicher, interaktiver und kooperativer Systeme wird bereits seit den 1980er Jahren in der Disziplin Mensch-Computer-Interaktion (MCI) und Com-puterunterstützte Gruppenarbeit (CSCW) behandelt. Es gibt jedoch einige Besonderhei-ten der MCI im Kontext sicherheitskritischer Systeme, insbesondere der störungsfreien Nutzung von IT (Safety) zu beachten. Dieses Kapitel stellt die wichtigsten Merkmale der Anwendung von Gestaltungsmethoden der MCI in sicherheitskritischen Systemen dar. Hierfür werden zu Beginn die Grundlagen der beiden Gebiete – der MCI sowie des Kri-sen- und Sicherheitsmanagements – erläutert. Darauf aufbauend werden Ansätze und Methoden der Analyse, des Designs und der Entwicklung sowie der Evaluation der MCI unter besonderer Berücksichtigung sicherheitskritischer Systeme diskutiert. Aspekte wie Risikoanalysen in der Anforderungsanalyse, die Einkalkulierung von Bedienfehlern und Rückfallebenen im Systemdesign gehören ebenso dazu wie besondere Herausforderun-gen bei Evaluationen.
@incollection{reuter_usable_2021,
address = {Wiesbaden, Germany},
title = {Usable {Safety} {Engineering} sicherheitskritischer interaktiver {Systeme}},
isbn = {978-3-658-32795-8},
url = {https://link.springer.com/chapter/10.1007/978-3-658-32795-8_2},
abstract = {Die Gestaltung gebrauchstauglicher, interaktiver und kooperativer Systeme wird bereits seit den 1980er Jahren in der Disziplin Mensch-Computer-Interaktion (MCI) und Com-puterunterstützte Gruppenarbeit (CSCW) behandelt. Es gibt jedoch einige Besonderhei-ten der MCI im Kontext sicherheitskritischer Systeme, insbesondere der störungsfreien Nutzung von IT (Safety) zu beachten. Dieses Kapitel stellt die wichtigsten Merkmale der Anwendung von Gestaltungsmethoden der MCI in sicherheitskritischen Systemen dar. Hierfür werden zu Beginn die Grundlagen der beiden Gebiete – der MCI sowie des Kri-sen- und Sicherheitsmanagements – erläutert. Darauf aufbauend werden Ansätze und Methoden der Analyse, des Designs und der Entwicklung sowie der Evaluation der MCI unter besonderer Berücksichtigung sicherheitskritischer Systeme diskutiert. Aspekte wie Risikoanalysen in der Anforderungsanalyse, die Einkalkulierung von Bedienfehlern und Rückfallebenen im Systemdesign gehören ebenso dazu wie besondere Herausforderun-gen bei Evaluationen.},
booktitle = {Sicherheitskritische {Mensch}-{Computer}-{Interaktion}: {Interaktive} {Technologien} und {Soziale} {Medien} im {Krisen}- und {Sicherheitsmanagement}},
publisher = {Springer Vieweg},
author = {Reuter, Christian and Kaufhold, Marc-André},
editor = {Reuter, Christian},
year = {2021},
doi = {10.1007/978-3-658-32795-8_2},
keywords = {HCI, UsableSec, Security, Projekt-KontiKat, Projekt-CRISP},
pages = {23--45},
}
2020
[BibTeX] [Abstract] [Download PDF]
Wie sieht ein digitalisierter Bevölkerungsschutz aus? Wie lassen sich „digitalisiert“ Leben retten? Was braucht es, um Bevölkerungsschutz zu digitalisieren? Dieses Kapitel soll erste Antworten geben, indem zunächst klären was mit Digitalisierung und sozialen Medien gemeint ist. Anschließend soll die Digitalisierung im Bevölkerungsschutz sowie zuletzt soziale Medien im Bevölkerungsschutz betrachtet werden, bevor ein Fazit gezogen wird.
@incollection{reuter_quo_2020,
title = {Quo {Vadis}? {Digitalisierung} und {Social} {Media} im {Bevölkerungsschutz}},
isbn = {978-3-8487-6250-7},
url = {https://peasec.de/paper/2020/2020_Reuter_QuoVadisDigitalisierungSocialMediaBevoelkerungsschutz_DigitalisierungSozialWohlfahrtswesen.pdf},
abstract = {Wie sieht ein digitalisierter Bevölkerungsschutz aus? Wie lassen sich „digitalisiert“ Leben retten? Was braucht es, um Bevölkerungsschutz zu digitalisieren? Dieses Kapitel soll erste Antworten geben, indem zunächst klären was mit Digitalisierung und sozialen Medien gemeint ist. Anschließend soll die Digitalisierung im Bevölkerungsschutz sowie zuletzt soziale Medien im Bevölkerungsschutz betrachtet werden, bevor ein Fazit gezogen wird.},
booktitle = {Digitalisierung als {Erfolgsfaktor} für das {Sozial}- und {Wohlfahrtswesen}},
publisher = {Nomos},
author = {Reuter, Christian},
editor = {Ückert, Sandra and Sürgit, Hasan and Diesel, Gerd},
year = {2020},
keywords = {Crisis, SocialMedia, Projekt-KontiKat},
pages = {311--318},
}
2019
[BibTeX] [Abstract] [Download PDF]
Over the last decade, social media services had an enormous impact on modern culture. They are nowadays widely established in everyday life, but also during natural and man-made crises and conflicts. For instance, Facebook was part of the Arabic Spring, in which the tool facilitated the communication and interaction between participants of political protests. On the contrary, terrorists may recruit new members and disseminate ideologies, and social bots may influence social and political processes. Based on the notions of cultural violence and cultural peace as well as the phenomena of fake news, terrorism and social bots, this exploratory review firstly presents human cultural inter-ventions in social media (e.g. dissemination of fake news and terroristic propaganda) and respective countermeasures (e.g. fake news detection and counter-narratives). Sec-ondly, it discusses automatic cultural interventions realised via social bots (e.g. astro-turfing, misdirection and smoke screening) and countermeasures (e.g. crowdsourcing and social bot detection). Finally, this chapter concludes with a range of cultural inter-ventions and information and communication technology (ICT) in terms of actors and intentions to identify future research potential for supporting situational assessments during conflicts.
@incollection{kaufhold_cultural_2019,
address = {Wiesbaden, Germany},
title = {Cultural {Violence} and {Peace} in {Social} {Media}},
isbn = {978-3-658-25652-4},
url = {https://www.springer.com/de/book/9783658256517},
abstract = {Over the last decade, social media services had an enormous impact on modern culture. They are nowadays widely established in everyday life, but also during natural and man-made crises and conflicts. For instance, Facebook was part of the Arabic Spring, in which the tool facilitated the communication and interaction between participants of political protests. On the contrary, terrorists may recruit new members and disseminate ideologies, and social bots may influence social and political processes. Based on the notions of cultural violence and cultural peace as well as the phenomena of fake news, terrorism and social bots, this exploratory review firstly presents human cultural inter-ventions in social media (e.g. dissemination of fake news and terroristic propaganda) and respective countermeasures (e.g. fake news detection and counter-narratives). Sec-ondly, it discusses automatic cultural interventions realised via social bots (e.g. astro-turfing, misdirection and smoke screening) and countermeasures (e.g. crowdsourcing and social bot detection). Finally, this chapter concludes with a range of cultural inter-ventions and information and communication technology (ICT) in terms of actors and intentions to identify future research potential for supporting situational assessments during conflicts.},
booktitle = {Information {Technology} for {Peace} and {Security} - {IT} {Applications} and {Infrastructures} in {Conflicts}, {Crises}, {War}, and {Peace}},
publisher = {Springer Vieweg},
author = {Kaufhold, Marc-André and Reuter, Christian},
editor = {Reuter, Christian},
year = {2019},
doi = {10.1007/978-3-658-25652-4_17},
keywords = {Crisis, HCI, SocialMedia, Peace, Projekt-CRISP},
pages = {361--381},
}
[BibTeX] [Abstract] [Download PDF]
Arms control aims at preventing conflicts and fostering stability in inter-state relations by either reducing the probability of usage of a specific weapon or regulating its use and thus, reducing the costs of armament. Several approaches to arms control exist: limiting or reducing numbers of weapons and armed forces, disarmament (“down to zero”) or prohibiting certain weapons. To illustrate these further, this chapter elaborates on the necessity of arms control and presents some historical examples, including an overview of existing measures of arms control. Extrapolating from these, the general architecture of arms control regimes and the complex issue of establishing and verifying compliance with agreements will be discussed, not least with respect to cyberspace. Building on these theoretical considerations, the chapter presents important treaties and first approaches, including the Wassenaar Arrangement, the recommendations of the OSCE, and the UN GGE 2015.
@incollection{reuter_arms_2019,
address = {Wiesbaden},
title = {Arms {Control} and its {Applicability} to {Cyberspace}},
isbn = {978-3-658-25651-7 978-3-658-25652-4},
url = {http://link.springer.com/10.1007/978-3-658-25652-4_10},
abstract = {Arms control aims at preventing conflicts and fostering stability in inter-state relations by either reducing the probability of usage of a specific weapon or regulating its use and thus, reducing the costs of armament. Several approaches to arms control exist: limiting or reducing numbers of weapons and armed forces, disarmament (“down to zero”) or prohibiting certain weapons. To illustrate these further, this chapter elaborates on the necessity of arms control and presents some historical examples, including an overview of existing measures of arms control. Extrapolating from these, the general architecture of arms control regimes and the complex issue of establishing and verifying compliance with agreements will be discussed, not least with respect to cyberspace. Building on these theoretical considerations, the chapter presents important treaties and first approaches, including the Wassenaar Arrangement, the recommendations of the OSCE, and the UN GGE 2015.},
language = {en},
urldate = {2021-05-11},
booktitle = {Information {Technology} for {Peace} and {Security} - {IT} {Applications} and {Infrastructures} in {Conflicts}, {Crises}, {War}, and {Peace}},
publisher = {Springer Fachmedien Wiesbaden},
author = {Reinhold, Thomas and Reuter, Christian},
editor = {Reuter, Christian},
year = {2019},
doi = {10.1007/978-3-658-25652-4_10},
pages = {207--231},
}
[BibTeX] [Abstract] [Download PDF]
Verification is one of the pillars of arms control and non-proliferation treaties as well as an important part of confidence building measures. It defines practical measures that enable treaty members to check the treaty compliance by observing, counting or moni-toring specific actions and their accordance with the respective rules. In contrast to his-torical examples of former military technologies, cyberspace features some unique char-acteristics making it hard to apply established measures. The chapter describes these peculiarities and assesses distinguishing problems compared to selected verification measures for nuclear, biological and chemicals weapons technology. Yet, cyberspace is a human-made domain and adjusting its technical setting, rules and principles may help to reduce the threat of ongoing militarisation. Offering some alternatives, the chapter elaborates on suitable and measurable parameters for this domain and presents potential-ly useful verification approaches.
@incollection{reinhold_verification_2019,
address = {Wiesbaden, Germany},
title = {Verification in {Cyberspace}},
isbn = {978-3-658-25652-4},
url = {https://www.springer.com/de/book/9783658256517},
abstract = {Verification is one of the pillars of arms control and non-proliferation treaties as well as an important part of confidence building measures. It defines practical measures that enable treaty members to check the treaty compliance by observing, counting or moni-toring specific actions and their accordance with the respective rules. In contrast to his-torical examples of former military technologies, cyberspace features some unique char-acteristics making it hard to apply established measures. The chapter describes these peculiarities and assesses distinguishing problems compared to selected verification measures for nuclear, biological and chemicals weapons technology. Yet, cyberspace is a human-made domain and adjusting its technical setting, rules and principles may help to reduce the threat of ongoing militarisation. Offering some alternatives, the chapter elaborates on suitable and measurable parameters for this domain and presents potential-ly useful verification approaches.},
booktitle = {Information {Technology} for {Peace} and {Security} - {IT} {Applications} and {Infrastructures} in {Conflicts}, {Crises}, {War}, and {Peace}},
publisher = {Springer Vieweg},
author = {Reinhold, Thomas and Reuter, Christian},
editor = {Reuter, Christian},
year = {2019},
doi = {10.1007/978-3-658-25652-4_12},
keywords = {Security, Peace, Projekt-CRISP},
pages = {257--276},
}
[BibTeX] [Abstract] [Download PDF]
The encompassing trend of digitalisation and widespread dependencies on IT systems triggers adjustments also in the military forces. Besides necessary enhancements of IT security and defensive measures for cyberspace, a growing number of states are estab-lishing offensive military capabilities for this domain. Looking at historical develop-ments and transformations due to advancements in military technologies, the chapter discusses the political progress made and tools developed since. Both of these have con-tributed to handling challenges and confining threats to international security. With this background, the text assesses a possible application of these efforts to developments concerning cyberspace, as well as obstacles that need to be tackled for it to be success-ful. The chapter points out political advancements already in progress, the role of social initiatives, such as the cyber peace campaign of the Forum of Computer Scientists for Peace and Societal Responsibility (FifF), as well as potential consequences of the rising probability of cyber war as opposed to the prospects of cyber peace.
@incollection{reinhold_cyber_2019,
address = {Wiesbaden, Germany},
title = {From {Cyber} {War} to {Cyber} {Peace}},
isbn = {978-3-658-25652-4},
url = {https://www.springer.com/de/book/9783658256517},
abstract = {The encompassing trend of digitalisation and widespread dependencies on IT systems triggers adjustments also in the military forces. Besides necessary enhancements of IT security and defensive measures for cyberspace, a growing number of states are estab-lishing offensive military capabilities for this domain. Looking at historical develop-ments and transformations due to advancements in military technologies, the chapter discusses the political progress made and tools developed since. Both of these have con-tributed to handling challenges and confining threats to international security. With this background, the text assesses a possible application of these efforts to developments concerning cyberspace, as well as obstacles that need to be tackled for it to be success-ful. The chapter points out political advancements already in progress, the role of social initiatives, such as the cyber peace campaign of the Forum of Computer Scientists for Peace and Societal Responsibility (FifF), as well as potential consequences of the rising probability of cyber war as opposed to the prospects of cyber peace.},
booktitle = {Information {Technology} for {Peace} and {Security} - {IT} {Applications} and {Infrastructures} in {Conflicts}, {Crises}, {War}, and {Peace}},
publisher = {Springer Vieweg},
author = {Reinhold, Thomas and Reuter, Christian},
editor = {Reuter, Christian},
year = {2019},
doi = {10.1007/978-3-658-25652-4_7},
keywords = {Security, Peace, Projekt-CRISP, Projekt-DualUse, Projekt-CROSSING, Cyberwar},
pages = {139--164},
}
[BibTeX] [Abstract] [Download PDF]
Konsequentes Vorgehen von Behörden gegen gezielte Falschnachrichten – das wünscht sich laut einer repräsentativen Studie eine große Mehrheit der Bevölkerung in Deutschland. Das Fachgebiet Wissenschaft und Technik für Frieden und Sicherheit (PEASEC) der Technischen Universität Darmstadt fragte unter anderem danach, wie Bürgerinnen und Bürger Fake News wahrnehmen und auf sie reagieren und welche Gegenmaßnahmen als sinnvoll erachtet werden.
@incollection{reuter_fake_2019,
address = {Frankfurt am Main},
title = {Fake {News} und manipulierte {Meinungsbildung}},
url = {http://publikationen.ub.uni-frankfurt.de/opus4/files/47852/PolicyPaper5_Digitalisierung_Kommunikation_deutsch.pdf},
abstract = {Konsequentes Vorgehen von Behörden gegen gezielte Falschnachrichten – das wünscht sich laut einer repräsentativen Studie eine große Mehrheit der Bevölkerung in Deutschland. Das Fachgebiet Wissenschaft und Technik für Frieden und Sicherheit (PEASEC) der Technischen Universität Darmstadt fragte unter anderem danach, wie Bürgerinnen und Bürger Fake News wahrnehmen und auf sie reagieren und welche Gegenmaßnahmen als sinnvoll erachtet werden.},
booktitle = {Die {Digitalisierung} der {Kommunikation}: {Gesellschaftliche} {Trends} und der {Wandel} von {Organisationen}},
publisher = {Mercator Science-Policy Fellowship-Programme},
author = {Reuter, Christian},
editor = {Reuter, Christian and Schultz, Tanjev and Stegbauer, Christian},
year = {2019},
keywords = {Crisis, HCI, SocialMedia, Peace},
pages = {15--19},
}
[BibTeX] [Abstract] [Download PDF]
Not only today, but also in the future information technology and the advances in the field of computer science will have a high relevance for peace and security. Naturally, a textbook like this can only cover a selective part of research and a certain point in time. Nonetheless, it can be attempted to identify trends, challenges and venture an outlook into the future. That is exactly what we want to achieve in this chapter: To predict fu-ture developments and try to classify them correctly. These considerations were made both by the editor and the authors involved alike. Therefore, an outlook based on fun-damentals, cyber conflicts and war, cyber peace, cyber arms control, infrastructures as well as social interaction is given.
@incollection{reuter_future_2019,
address = {Wiesbaden, Germany},
title = {The {Future} of {IT} in {Peace} and {Security}},
isbn = {978-3-658-25652-4},
url = {https://www.springer.com/de/book/9783658256517},
abstract = {Not only today, but also in the future information technology and the advances in the field of computer science will have a high relevance for peace and security. Naturally, a textbook like this can only cover a selective part of research and a certain point in time. Nonetheless, it can be attempted to identify trends, challenges and venture an outlook into the future. That is exactly what we want to achieve in this chapter: To predict fu-ture developments and try to classify them correctly. These considerations were made both by the editor and the authors involved alike. Therefore, an outlook based on fun-damentals, cyber conflicts and war, cyber peace, cyber arms control, infrastructures as well as social interaction is given.},
booktitle = {Information {Technology} for {Peace} and {Security} - {IT} {Applications} and {Infrastructures} in {Conflicts}, {Crises}, {War}, and {Peace}},
publisher = {Springer Vieweg},
author = {Reuter, Christian and Aal, Konstantin and Aldehoff, Larissa and Altmann, Jürgen and Buchmann, Johannes and Bernhardt, Ute and Denker, Kai and Herrmann, Dominik and Hollick, Matthias and Katzenbeisser, Stefan and Kaufhold, Marc-André and Nordmann, Alfred and Reinhold, Thomas and Riebe, Thea and Ripper, Annette and Ruhmann, Ingo and Saalbach, Klaus-Peter and Schörnig, Niklas and Sunyaev, Ali and Wulf, Volker},
editor = {Reuter, Christian},
year = {2019},
doi = {10.1007/978-3-658-25652-4_19},
keywords = {HCI, UsableSec, Security, Peace, Projekt-CRISP, Projekt-CROSSING},
pages = {405--413},
}
[BibTeX] [Abstract] [Download PDF]
Advances in science and technology play a crucial role in the context of peace, conflict and security. As information technology (IT) is becoming omnipresent, this includes both the resilience of IT infrastructures e.g. as a target in cases of conflict and the role of IT applications to prevent and manage conflicts, crises and disasters. This chapter is an introduction to IT and its role in war and peace, in conflicts and crises as well as in safety and security. Based on those connections a new field of research has emerged: IT peace research. It is introduced in this chapter which provides an overview of the inter-disciplinary concepts of peace, conflict and security. In addition, the research disciplines computer science and peace and conflict studies as the basis of IT peace research are explained. Moreover, the chapter focuses on the specific research topics of IT peace research and presents the institutionalised research landscape in Germany.
@incollection{reuter_it_2019,
address = {Wiesbaden, Germany},
title = {{IT} in {Peace}, {Conflict}, and {Security} {Research}},
isbn = {978-3-658-25652-4},
url = {https://www.springer.com/de/book/9783658256517},
abstract = {Advances in science and technology play a crucial role in the context of peace, conflict and security. As information technology (IT) is becoming omnipresent, this includes both the resilience of IT infrastructures e.g. as a target in cases of conflict and the role of IT applications to prevent and manage conflicts, crises and disasters. This chapter is an introduction to IT and its role in war and peace, in conflicts and crises as well as in safety and security. Based on those connections a new field of research has emerged: IT peace research. It is introduced in this chapter which provides an overview of the inter-disciplinary concepts of peace, conflict and security. In addition, the research disciplines computer science and peace and conflict studies as the basis of IT peace research are explained. Moreover, the chapter focuses on the specific research topics of IT peace research and presents the institutionalised research landscape in Germany.},
booktitle = {Information {Technology} for {Peace} and {Security} - {IT} {Applications} and {Infrastructures} in {Conflicts}, {Crises}, {War}, and {Peace}},
publisher = {Springer Vieweg},
author = {Reuter, Christian and Aldehoff, Larissa and Riebe, Thea and Kaufhold, Marc-André},
editor = {Reuter, Christian},
year = {2019},
doi = {10.1007/978-3-658-25652-4_2},
keywords = {HCI, Security, Peace, Infrastructure, Projekt-CRISP},
pages = {11--37},
}
[BibTeX] [Abstract] [Download PDF]
Technological and scientific progress, especially the rapid development in information technology (IT), plays a crucial role regarding questions of peace and security. This textbook addresses the significance, potentials and challenges of IT for peace and securi-ty. For this purpose, the book offers an introduction to peace, conflict, and security research, thereby focusing on natural science, technical and computer science perspec-tives. In the following, it sheds light on fundamentals (e.g. IT in peace, conflict and security, natural-science/technical peace research), cyber conflicts and war (e.g. infor-mation warfare, cyber espionage, cyber defence, Darknet), cyber peace (e.g. dual-use, technology assessment, confidence and security building measures), cyber arms control (e.g. arms control in the cyberspace, unmanned systems, verification), cyber attribution and infrastructures (e.g. attribution of cyber attacks, resilient infrastructures, secure critical information infrastructures), culture and interaction (e.g. safety and security, cultural violence, social media), before an outlook is given. This chapter provides an overview of all chapters in this book.
@incollection{reuter_information_2019,
address = {Wiesbaden, Germany},
title = {Information {Technology} for {Peace} and {Security} - {Introduction} and {Overview}},
isbn = {978-3-658-25652-4},
url = {https://www.springer.com/de/book/9783658256517},
abstract = {Technological and scientific progress, especially the rapid development in information technology (IT), plays a crucial role regarding questions of peace and security. This textbook addresses the significance, potentials and challenges of IT for peace and securi-ty. For this purpose, the book offers an introduction to peace, conflict, and security research, thereby focusing on natural science, technical and computer science perspec-tives. In the following, it sheds light on fundamentals (e.g. IT in peace, conflict and security, natural-science/technical peace research), cyber conflicts and war (e.g. infor-mation warfare, cyber espionage, cyber defence, Darknet), cyber peace (e.g. dual-use, technology assessment, confidence and security building measures), cyber arms control (e.g. arms control in the cyberspace, unmanned systems, verification), cyber attribution and infrastructures (e.g. attribution of cyber attacks, resilient infrastructures, secure critical information infrastructures), culture and interaction (e.g. safety and security, cultural violence, social media), before an outlook is given. This chapter provides an overview of all chapters in this book.},
booktitle = {Information {Technology} for {Peace} and {Security} - {IT} {Applications} and {Infrastructures} in {Conflicts}, {Crises}, {War}, and {Peace}},
publisher = {Springer Vieweg},
author = {Reuter, Christian},
editor = {Reuter, Christian},
year = {2019},
doi = {10.1007/978-3-658-25652-4_1},
keywords = {Crisis, Security, Peace, Projekt-CRISP, Projekt-CROSSING},
pages = {3--9},
}
[BibTeX] [Abstract] [Download PDF]
Im Dezember 2017 wurde eine Invasion des deutschen Regierungsnetzwerks entdeckt; dieses vernetzt Bundesministerien und Behörden (vgl. Reinhold 2018a). Die Angreifer nutzten das Intranet der Hochschule des Bundes für öffentliche Verwaltung und der Bundesakademie für öffentliche Verwaltung als Einfallstor. Dieses ist der am wenigsten gesicherte Teil des Systems, da externe Teilnehmerinnen und Teilnehmer auch außerhalb der Einrichtung darauf zugreifen müssen, beispielsweise für Fortbildungen des Auswärtigen Amtes.
@incollection{reuter_cyberwar_2019,
title = {Cyberwar zwischen {Fiktion} und {Realität} – technologische {Möglichkeiten}},
isbn = {978-3-658-27713-0},
url = {https://peasec.de/paper/2019/2019_ReuterRiebeAldehoffKaufholdReinhold2019_CyberwarZwischenFiktionUndReal_Cyberwar.pdf},
abstract = {Im Dezember 2017 wurde eine Invasion des deutschen Regierungsnetzwerks entdeckt; dieses vernetzt Bundesministerien und Behörden (vgl. Reinhold 2018a). Die Angreifer nutzten das Intranet der Hochschule des Bundes für öffentliche Verwaltung und der Bundesakademie für öffentliche Verwaltung als Einfallstor. Dieses ist der am wenigsten gesicherte Teil des Systems, da externe Teilnehmerinnen und Teilnehmer auch außerhalb der Einrichtung darauf zugreifen müssen, beispielsweise für Fortbildungen des Auswärtigen Amtes.},
booktitle = {Cyberwar – die {Digitalisierung} der {Kriegsführung}},
publisher = {Springer VS},
author = {Reuter, Christian and Riebe, Thea and Aldehoff, Larissa and Kaufhold, Marc-André and Reinhold, Thomas},
editor = {Werkner, Ines-Jacqueline and Schörnig, Niklas},
year = {2019},
doi = {10.1007/978-3-658-27713-0},
keywords = {Security, Peace, Projekt-DualUse, Cyberwar},
pages = {15--38},
}
[BibTeX] [Abstract] [Download PDF]
Per a recent study, a majority of Germans wants to see strict action taken against the targeted spread of disinformation in the news. Researchers in the Science and Technology for Peace and Security (PEASEC) research group at Technische Universität Darmstadt investigated how German citizens perceive and react to fake news and asked them what countermeasures they would consider to be most appropriate.
@incollection{reuter_fake_2019-1,
address = {Frankfurt am Main},
title = {Fake {News} and the {Manipulation} of {Public} {Opinion}},
url = {http://publikationen.ub.uni-frankfurt.de/opus4/files/47853/SPPaper6_Digitalisation_Communication_English.pdf},
abstract = {Per a recent study, a majority of Germans wants to see strict action taken against the targeted spread of disinformation in the news. Researchers in the Science and Technology for Peace and Security (PEASEC) research group at Technische Universität Darmstadt investigated how German citizens perceive and react to fake news and asked them what countermeasures they would consider to be most appropriate.},
booktitle = {Digitalisation and {Communication}: {Societal} {Trends} and the {Change} in {Organisations}},
publisher = {Mercator Science-Policy Fellowship-Programme},
author = {Reuter, Christian},
editor = {Reuter, Christian and Schultz, Tanjev and Stegbauer, Christian},
year = {2019},
keywords = {Crisis, Peace},
pages = {13--16},
}
[BibTeX] [Abstract] [Download PDF]
In its recommendations for the further development of peace and conflict research published in July 2019, the German Council of Science and Humanities (Wissenschaftsrat), as the most important science policy advisory body in Germany, stated that urgent action was needed to strengthen scientific and technical peace and conflict research. As a positive example of the permanent establishment of this field of research at a university, the TU Darmstadt was named. This is where the first edition of the conference series „SCIENCE · PEACE · SECURITY“ took place.
@incollection{reuter_science_2019-1,
address = {Darmstadt, Germany},
title = {{SCIENCE} {PEACE} {SECURITY} '19 – {An} {Editorial}},
url = {https://tuprints.ulb.tu-darmstadt.de/id/eprint/9164},
abstract = {In its recommendations for the further development of peace and conflict research published in July 2019, the German Council of Science and Humanities (Wissenschaftsrat), as the most important science policy advisory body in Germany, stated that urgent action was needed to strengthen scientific and technical peace and conflict research. As a positive example of the permanent establishment of this field of research at a university, the TU Darmstadt was named. This is where the first edition of the conference series "SCIENCE · PEACE · SECURITY" took place.},
booktitle = {{SCIENCE} {PEACE} {SECURITY} '19 - {Proceedings} of the {Interdisciplinary} {Conference} on {Technical} {Peace} and {Security} {Research}},
publisher = {TUprints},
author = {Reuter, Christian and Altmann, Jürgen and Göttsche, Malte and Himmel, Mirko},
editor = {Reuter, Christian and Altmann, Jürgen and Göttsche, Malte and Himmel, Mirko},
year = {2019},
keywords = {Security, Peace},
pages = {7--10},
}
[BibTeX] [Abstract] [Download PDF]
Dual-use in information technology is a pressing issue: how can we prevent, control or manage the risk of a harmful application of IT? How can dual-use awareness and regu-lation help to mitigate the risks to peace and security on the national and international level? As the cyberspace has been declared a military domain, IT is of increasing im-portance for civil and military infrastructures. How can researchers, developers and decision makers make sure that IT is not misused to cause harm? For nuclear, biological and chemical technologies this has been discussed as the dual-use problem. This chapter illustrates the approaches towards different dual-use concepts, how to conduct a tech-nology assessment and provides insight into the implementation of dual-use assessment guidelines at TU Darmstadt, the so-called Civil Clause.
@incollection{riebe_dual_2019,
address = {Wiesbaden, Germany},
title = {Dual {Use} and {Dilemmas} for {Cybersecurity}, {Peace} and {Technology} {Assessment}},
isbn = {978-3-658-25652-4},
url = {https://link.springer.com/chapter/10.1007/978-3-658-25652-4_8},
abstract = {Dual-use in information technology is a pressing issue: how can we prevent, control or manage the risk of a harmful application of IT? How can dual-use awareness and regu-lation help to mitigate the risks to peace and security on the national and international level? As the cyberspace has been declared a military domain, IT is of increasing im-portance for civil and military infrastructures. How can researchers, developers and decision makers make sure that IT is not misused to cause harm? For nuclear, biological and chemical technologies this has been discussed as the dual-use problem. This chapter illustrates the approaches towards different dual-use concepts, how to conduct a tech-nology assessment and provides insight into the implementation of dual-use assessment guidelines at TU Darmstadt, the so-called Civil Clause.},
booktitle = {Information {Technology} for {Peace} and {Security} - {IT} {Applications} and {Infrastructures} in {Conflicts}, {Crises}, {War}, and {Peace}},
publisher = {Springer Vieweg},
author = {Riebe, Thea and Reuter, Christian},
editor = {Reuter, Christian},
year = {2019},
doi = {10.1007/978-3-658-25652-4_8},
keywords = {Projekt-KontiKat, Peace, Projekt-CRISP, Projekt-DualUse},
pages = {165--184},
}
[BibTeX] [Abstract] [Download PDF]
In the discussion of lethal autonomous weapon systems (LAWS) in the expert forum of the Convention on Certain Conventional Weapons (CCW), the interpretation of crucial concepts such as autonomy and human control is decisive for the future direction of international hu- manitarian law. Starting from the perspective of a synthesis of Actor-Network Theory (ANT) and Value-Sensitive-Design (VSD), we aim to analyse the discourse of LAWS and ask for pos- sibilities to implement Meaningful Human Control.
@incollection{schmid_meaningful_2019,
address = {Darmstadt, Germany},
title = {Meaningful {Human} {Control} of {Lethal} {Autonomous} {Weapon} {Systems}},
url = {https://tuprints.ulb.tu-darmstadt.de/id/eprint/9164},
abstract = {In the discussion of lethal autonomous weapon systems (LAWS) in the expert forum of the Convention on Certain Conventional Weapons (CCW), the interpretation of crucial concepts such as autonomy and human control is decisive for the future direction of international hu- manitarian law. Starting from the perspective of a synthesis of Actor-Network Theory (ANT) and Value-Sensitive-Design (VSD), we aim to analyse the discourse of LAWS and ask for pos- sibilities to implement Meaningful Human Control.},
booktitle = {{SCIENCE} {PEACE} {SECURITY} '19 - {Proceedings} of the {Interdisciplinary} {Conference} on {Technical} {Peace} and {Security} {Research}},
publisher = {TUprints},
author = {Schmid, Stefka and Riebe, Thea and Reuter, Christian},
editor = {Reuter, Christian and Altmann, Jürgen and Göttsche, Malte and Himmel, Mirko},
year = {2019},
keywords = {Student, Security, Peace, Projekt-DualUse},
pages = {196--200},
}
2018
[BibTeX] [Abstract] [Download PDF]
IANUS steht seit 30 wechselhaften Jahren für natur- und ingenieur- wissenschaftliche Friedensforschung im Austausch mit den Sozial- und Geisteswissenschaften. Seit Januar 2018 ist IANUS ein Teil des Forums interdisziplinäre Forschung. Das FiF stellt das Dach, unter dem einige Aspekte der bisherigen IANUS-Arbeit weitergeführt werden sollen. Insofern das FiF nicht selbst wissenschaftlich arbeitet oder ein inhalt- liches Programm verfolgt, besteht das gemeinsame Dach in der admini- strativen Zusammenarbeit und dem Gedanken der Interdisziplinarität. Insofern IANUS von weitreichenderen Ambitionen geprägt ist, kann es unter dem gemeinsamen Dach derzeit nur auf sehr kleiner Flamme wei- terarbeiten. Freilich ergeben sich andererseits auch neue Perspektiven. Und wenn sich diese Perspektiven fruchtbar entwickeln lassen, würde ein erneuertes IANUS wesentlich zur internationalen Sichtbarkeit des FiF als Ausweis einer verantwortungsbewussten Forschungskultur an der TU Darmstadt beitragen. Was war IANUS und wofür steht es? Was ist IANUS heute – was kann und will es? Was könnte ein erneuertes IANUS werden – wie kann sein friedenspolitisch ausgerichteter wissenschaftlicher Anspruch zukünftig für das FiF und die TU Darmstadt wirksam werden? Diesen drei Fragen wenden sich die folgenden Abschnitte zu – und feiern somit, was nach 10 Jahren FiF, 30 Jahren IANUS und 140 Jahren TH/TU Darmstadt im Wandel der Forschungskulturen möglich war, ist und wird.
@incollection{lederer_ianus_2018,
address = {Darmstadt},
title = {{IANUS} am {FiF} und darüber hinaus: {Die} {Bedeutung} natur- und ingenieurwissenschaftlicher {Friedensforschung} für die {TU} {Darmstadt}},
url = {http://www.peasec.de/paper/2018/2018_LedererNordmannReuter_IANUS_FIF-Festschrift.pdf},
abstract = {IANUS steht seit 30 wechselhaften Jahren für natur- und ingenieur- wissenschaftliche Friedensforschung im Austausch mit den Sozial- und Geisteswissenschaften. Seit Januar 2018 ist IANUS ein Teil des Forums interdisziplinäre Forschung. Das FiF stellt das Dach, unter dem einige Aspekte der bisherigen IANUS-Arbeit weitergeführt werden sollen. Insofern das FiF nicht selbst wissenschaftlich arbeitet oder ein inhalt- liches Programm verfolgt, besteht das gemeinsame Dach in der admini- strativen Zusammenarbeit und dem Gedanken der Interdisziplinarität. Insofern IANUS von weitreichenderen Ambitionen geprägt ist, kann es unter dem gemeinsamen Dach derzeit nur auf sehr kleiner Flamme wei- terarbeiten. Freilich ergeben sich andererseits auch neue Perspektiven. Und wenn sich diese Perspektiven fruchtbar entwickeln lassen, würde ein erneuertes IANUS wesentlich zur internationalen Sichtbarkeit des FiF als Ausweis einer verantwortungsbewussten Forschungskultur an der TU Darmstadt beitragen. Was war IANUS und wofür steht es? Was ist IANUS heute – was kann und will es? Was könnte ein erneuertes IANUS werden – wie kann sein friedenspolitisch ausgerichteter wissenschaftlicher Anspruch zukünftig für das FiF und die TU Darmstadt wirksam werden? Diesen drei Fragen wenden sich die folgenden Abschnitte zu – und feiern somit, was nach 10 Jahren FiF, 30 Jahren IANUS und 140 Jahren TH/TU Darmstadt im Wandel der Forschungskulturen möglich war, ist und wird.},
booktitle = {Zwischendrin. 10 {Jahre} {Forum} interdisziplinäre {Forschung} der {TU} {Darmstadt}},
author = {Lederer, Markus and Nordmann, Alfred and Reuter, Christian},
editor = {Großmann, Andreas and Krebs, Heike and Wiemeyer, Josef},
year = {2018},
keywords = {Peace, Projekt-DualUse},
pages = {71--89},
}
[BibTeX] [Abstract] [Download PDF]
Die Erkenntnisse aus Naturwissenschaft und Technik hatten bereits immer einen großen Einfluss auf die Art und Weise, wie Kriege und Konflikte ausgetragen werden konnten und ausgetragen wurden. Im Kontext von Frieden und Sicherheit können Erkenntnisse, die eigentlich für zivile Kontexte entwickelt wurden, auch für militärische Auseinandersetzungen genutzt werden (Dual-Use). Seit einigen Jahren betrifft dies insbesondere die Informatik, die durch die militärische Nutzung von Computern, Cyberwar, Information Warfare, einschließlich terroristischer Propaganda, Fake News, Ausspähung und Hacking konfliktäre Auseinandersetzungen unterstützen kann. Auch werden Konflikte vermehrt im digitalen Raum ausgetragen, mit erschwerter Zurechenbarkeit zu einzelnen (angreifenden) Akteuren. Die Informatik bietet jedoch auch für friedensstiftende Aktivitäten einige Möglichkeiten. Dieses Kapitel möchte eine Einführung in dieses an Bedeutung gewinnende Gebiet liefern.
@incollection{reuter_informatik_2018,
address = {Wiesbaden, Germany},
title = {Informatik für {Frieden} und {Sicherheit}},
isbn = {978-3-658-19523-6},
url = {https://link.springer.com/chapter/10.1007/978-3-658-19523-6_28},
abstract = {Die Erkenntnisse aus Naturwissenschaft und Technik hatten bereits immer einen großen Einfluss auf die Art und Weise, wie Kriege und Konflikte ausgetragen werden konnten und ausgetragen wurden. Im Kontext von Frieden und Sicherheit können Erkenntnisse, die eigentlich für zivile Kontexte entwickelt wurden, auch für militärische Auseinandersetzungen genutzt werden (Dual-Use). Seit einigen Jahren betrifft dies insbesondere die Informatik, die durch die militärische Nutzung von Computern, Cyberwar, Information Warfare, einschließlich terroristischer Propaganda, Fake News, Ausspähung und Hacking konfliktäre Auseinandersetzungen unterstützen kann. Auch werden Konflikte vermehrt im digitalen Raum ausgetragen, mit erschwerter Zurechenbarkeit zu einzelnen (angreifenden) Akteuren. Die Informatik bietet jedoch auch für friedensstiftende Aktivitäten einige Möglichkeiten. Dieses Kapitel möchte eine Einführung in dieses an Bedeutung gewinnende Gebiet liefern.},
booktitle = {Sicherheitskritische {Mensch}-{Computer}-{Interaktion}: {Interaktive} {Technologien} und {Soziale} {Medien} im {Krisen}- und {Sicherheitsmanagement}},
publisher = {Springer Vieweg},
author = {Reuter, Christian and Kaufhold, Marc-André},
editor = {Reuter, Christian},
year = {2018},
doi = {10.1007/978-3-658-19523-6_28},
keywords = {Crisis, Security, Projekt-KontiKat, Peace, Projekt-CRISP},
pages = {573--595},
}
[BibTeX] [Abstract] [Download PDF]
Sicherheitskritische Mensch-Computer-Interaktion ist nicht nur derzeit, sondern auch zukünftig ein äußerst relevantes Thema. Hierbei kann ein Lehr- und Fachbuch, wie dieses, immer nur einen punktuellen Stand abdecken. Dennoch kann der Versuch unternommen werden, aktuelle Trends zu identifizieren und einen Ausblick in die Zukunft zu wagen. Genau das möchte dieses Kapitel erreichen: Es sollen zukünftige Entwicklungen vorausgesagt und versucht werden, diese korrekt einzuordnen. Das ist an dieser Stelle nicht nur durch den Herausgeber, sondern durch Abfrage bei zahlreichen am Lehrbuch beteiligten Autoren geschehen. Neben einem Ausblick auf Grundlagen und Methoden werden dementsprechend auch sicherheitskritische interaktive Systeme und sicherheitskritische kooperative Systeme abgedeckt.
@incollection{reuter_zukunft_2018,
address = {Wiesbaden, Germany},
title = {Die {Zukunft} sicherheitskritischer {Mensch}-{Computer}-{Interaktion}},
isbn = {978-3-658-19523-6},
url = {https://link.springer.com/chapter/10.1007/978-3-658-19523-6_30},
abstract = {Sicherheitskritische Mensch-Computer-Interaktion ist nicht nur derzeit, sondern auch zukünftig ein äußerst relevantes Thema. Hierbei kann ein Lehr- und Fachbuch, wie dieses, immer nur einen punktuellen Stand abdecken. Dennoch kann der Versuch unternommen werden, aktuelle Trends zu identifizieren und einen Ausblick in die Zukunft zu wagen. Genau das möchte dieses Kapitel erreichen: Es sollen zukünftige Entwicklungen vorausgesagt und versucht werden, diese korrekt einzuordnen. Das ist an dieser Stelle nicht nur durch den Herausgeber, sondern durch Abfrage bei zahlreichen am Lehrbuch beteiligten Autoren geschehen. Neben einem Ausblick auf Grundlagen und Methoden werden dementsprechend auch sicherheitskritische interaktive Systeme und sicherheitskritische kooperative Systeme abgedeckt.},
booktitle = {Sicherheitskritische {Mensch}-{Computer}-{Interaktion}: {Interaktive} {Technologien} und {Soziale} {Medien} im {Krisen}- und {Sicherheitsmanagement}},
publisher = {Springer Vieweg},
author = {Reuter, Christian and Aal, Konstantin and Beham, Frank and Boden, Alexander and Brauner, Florian and Ludwig, Thomas and Lukosch, Stephan and Fiedrich, Frank and Fuchs-Kittowski, Frank and Geisler, Stefan and Gennen, Klaus and Herrmann, Dominik and Kaufhold, Marc-André and Klafft, Michael and Lipprandt, Myriam and Lo Iacono, Luigi and Pipek, Volkmar and Pottebaum, Jens and Mentler, Tilo and Nestler, Simon and Stieglitz, Stefan and Sturm, Christian and Rusch, Gebhard and Sackmann, Stefan and Volkamer, Melanie and Wulf, Volker},
editor = {Reuter, Christian},
year = {2018},
doi = {10.1007/978-3-658-19523-6_30},
keywords = {Crisis, HCI, SocialMedia, UsableSec, Security, Projekt-KontiKat},
pages = {621--630},
}
[BibTeX] [Abstract] [Download PDF]
Die Gestaltung gebrauchstauglicher, interaktiver und kooperativer Systeme wird bereits seit den 1980er Jahren in der Disziplin Mensch-Computer-Interaktion (MCI) und Com-puterunterstützte Gruppenarbeit (CSCW) behandelt. Es gibt jedoch einige Besonderhei-ten der MCI im Kontext sicherheitskritischer Systeme, insbesondere der störungsfreien Nutzung von IT (Safety) zu beachten. Dieses Kapitel stellt die wichtigsten Merkmale der Anwendung von Gestaltungsmethoden der MCI in sicherheitskritischen Systemen dar. Hierfür werden zu Beginn die Grundlagen der beiden Gebiete – der MCI sowie des Kri-sen- und Sicherheitsmanagements – erläutert. Darauf aufbauend werden Ansätze und Methoden der Analyse, des Designs und der Entwicklung sowie der Evaluation der MCI unter besonderer Berücksichtigung sicherheitskritischer Systeme diskutiert. Aspekte wie Risikoanalysen in der Anforderungsanalyse, die Einkalkulierung von Bedienfehlern und Rückfallebenen im Systemdesign gehören ebenso dazu wie besondere Herausforderun-gen bei Evaluationen.
@incollection{reuter_usable_2018,
address = {Wiesbaden, Germany},
title = {Usable {Safety} {Engineering} sicherheitskritischer interaktiver {Systeme}},
isbn = {978-3-658-19523-6},
url = {https://link.springer.com/chapter/10.1007/978-3-658-19523-6_2},
abstract = {Die Gestaltung gebrauchstauglicher, interaktiver und kooperativer Systeme wird bereits seit den 1980er Jahren in der Disziplin Mensch-Computer-Interaktion (MCI) und Com-puterunterstützte Gruppenarbeit (CSCW) behandelt. Es gibt jedoch einige Besonderhei-ten der MCI im Kontext sicherheitskritischer Systeme, insbesondere der störungsfreien Nutzung von IT (Safety) zu beachten. Dieses Kapitel stellt die wichtigsten Merkmale der Anwendung von Gestaltungsmethoden der MCI in sicherheitskritischen Systemen dar. Hierfür werden zu Beginn die Grundlagen der beiden Gebiete – der MCI sowie des Kri-sen- und Sicherheitsmanagements – erläutert. Darauf aufbauend werden Ansätze und Methoden der Analyse, des Designs und der Entwicklung sowie der Evaluation der MCI unter besonderer Berücksichtigung sicherheitskritischer Systeme diskutiert. Aspekte wie Risikoanalysen in der Anforderungsanalyse, die Einkalkulierung von Bedienfehlern und Rückfallebenen im Systemdesign gehören ebenso dazu wie besondere Herausforderun-gen bei Evaluationen.},
booktitle = {Sicherheitskritische {Mensch}-{Computer}-{Interaktion}: {Interaktive} {Technologien} und {Soziale} {Medien} im {Krisen}- und {Sicherheitsmanagement}},
publisher = {Springer Vieweg},
author = {Reuter, Christian and Kaufhold, Marc-André},
editor = {Reuter, Christian},
year = {2018},
doi = {10.1007/978-3-658-19523-6_2},
keywords = {HCI, UsableSec, Security, Projekt-KontiKat, Projekt-CRISP},
pages = {17--40},
}
[BibTeX] [Abstract] [Download PDF]
Kooperationstechnologien spielen in sicherheitskritischen Systemen eine große Rolle, da in vielen Anwendungsfeldern nicht nur die Interaktion von Mensch und Computer, sondern auch die durch IT unterstützte Kooperation zwischen Menschen notwendig ist, um Aufgaben bewältigen zu können. Solche Technologien müssen verschiedene Anforderungen erfüllen und können ebenfalls zur Resilienz beitragen. Unter Resilienz durch Kooperation verstehen wir die Fähigkeit, Krisen durch die Anpassungsfähigkeit an geänderte Realitäten ohne nachhaltigen Schaden mithilfe von Kooperation zu überstehen. Während das Konzept der Resilienz in den Ingenieurwissenschaften vornehmlich die Verfügbarkeit technischer Systeme fokussiert, betrachten wir Resilienz als soziotechnisches Konstrukt, unter expliziter Betrachtung der beteiligten Akteure. Basierend auf Grundlagen zu Kooperationstechnologien zeigt unser Kapitel anhand von praktischen exemplarisch umgesetzten Kooperationstechnologien (soziales Netzwerk, GIS-System, Smartphone Apps, Facebook App und Social Media Analytics-Plattform), wie Kooperation unterstützt wird und zu kooperativer Resilienz beitragen kann.
@incollection{reuter_resilienz_2018,
address = {Wiesbaden, Germany},
title = {Resilienz durch {Kooperationstechnologien}},
isbn = {978-3-658-19523-6},
url = {https://link.springer.com/chapter/10.1007/978-3-658-19523-6_22},
abstract = {Kooperationstechnologien spielen in sicherheitskritischen Systemen eine große Rolle, da in vielen Anwendungsfeldern nicht nur die Interaktion von Mensch und Computer, sondern auch die durch IT unterstützte Kooperation zwischen Menschen notwendig ist, um Aufgaben bewältigen zu können. Solche Technologien müssen verschiedene Anforderungen erfüllen und können ebenfalls zur Resilienz beitragen. Unter Resilienz durch Kooperation verstehen wir die Fähigkeit, Krisen durch die Anpassungsfähigkeit an geänderte Realitäten ohne nachhaltigen Schaden mithilfe von Kooperation zu überstehen. Während das Konzept der Resilienz in den Ingenieurwissenschaften vornehmlich die Verfügbarkeit technischer Systeme fokussiert, betrachten wir Resilienz als soziotechnisches Konstrukt, unter expliziter Betrachtung der beteiligten Akteure. Basierend auf Grundlagen zu Kooperationstechnologien zeigt unser Kapitel anhand von praktischen exemplarisch umgesetzten Kooperationstechnologien (soziales Netzwerk, GIS-System, Smartphone Apps, Facebook App und Social Media Analytics-Plattform), wie Kooperation unterstützt wird und zu kooperativer Resilienz beitragen kann.},
booktitle = {Sicherheitskritische {Mensch}-{Computer}-{Interaktion}: {Interaktive} {Technologien} und {Soziale} {Medien} im {Krisen}- und {Sicherheitsmanagement}},
publisher = {Springer Vieweg},
author = {Reuter, Christian and Ludwig, Thomas and Pipek, Volkmar},
editor = {Reuter, Christian},
year = {2018},
doi = {10.1007/978-3-658-19523-6_22},
keywords = {Cooperation, HCI, SocialMedia, Projekt-KontiKat, Infrastructure, RSF},
pages = {443--465},
}
[BibTeX] [Abstract] [Download PDF]
Die Nutzung sozialer Medien hat sich nicht nur im Alltag, sondern auch in vielen verschiedenen Notfällen, Krisen und Katastrophen etabliert. Dieser Prozess begann bereits vor über 15 Jahren nach den Terroranschlägen vom 11. September 2001. In den darauffolgenden Jahren, vor allem in den vergangenen zehn, wurden eine Vielzahl von Studien veröffentlicht, die sich auf den Gebrauch von Informations- und Kommunikations-technologien und sozialen Medien vor, während oder nach Notfällen konzentrieren. Dieser Forschungsbereich wird auch unter dem Begriff Crisis Informatics zusammengefasst. Das Ziel dieses Kapitels ist es, den Gebrauch von und die Forschung über soziale Medien in Katastrophen und Notfällen in den vergangenen 15 Jahren und mit besonderem Schwerpunkt auf identifizierbare Nutzungsmuster und der Wahrnehmung zusammenzufassen, um die bisherigen Ergebnisse und zukünftigen Potenziale herauszustellen.
@incollection{reuter_soziale_2018-1,
address = {Wiesbaden},
title = {Soziale {Medien} in {Notfällen}, {Krisen} und {Katastrophen}},
isbn = {978-3-658-19523-6},
url = {https://link.springer.com/chapter/10.1007/978-3-658-19523-6_19},
abstract = {Die Nutzung sozialer Medien hat sich nicht nur im Alltag, sondern auch in vielen verschiedenen Notfällen, Krisen und Katastrophen etabliert. Dieser Prozess begann bereits vor über 15 Jahren nach den Terroranschlägen vom 11. September 2001. In den darauffolgenden Jahren, vor allem in den vergangenen zehn, wurden eine Vielzahl von Studien veröffentlicht, die sich auf den Gebrauch von Informations- und Kommunikations-technologien und sozialen Medien vor, während oder nach Notfällen konzentrieren. Dieser Forschungsbereich wird auch unter dem Begriff Crisis Informatics zusammengefasst. Das Ziel dieses Kapitels ist es, den Gebrauch von und die Forschung über soziale Medien in Katastrophen und Notfällen in den vergangenen 15 Jahren und mit besonderem Schwerpunkt auf identifizierbare Nutzungsmuster und der Wahrnehmung zusammenzufassen, um die bisherigen Ergebnisse und zukünftigen Potenziale herauszustellen.},
booktitle = {Sicherheitskritische {Mensch}-{Computer}-{Interaktion}: {Interaktive} {Technologien} und {Soziale} {Medien} im {Krisen}- und {Sicherheitsmanagement}},
publisher = {Springer Vieweg},
author = {Reuter, Christian and Kaufhold, Marc-André},
editor = {Reuter, Christian},
year = {2018},
doi = {10.1007/978-3-658-19523-6_19},
keywords = {Crisis, HCI, SocialMedia, Projekt-KontiKat},
pages = {379--402},
}
[BibTeX] [Abstract] [Download PDF]
Die sicherheitskritische Mensch-Computer-Interaktion (MCI) ist eine interdisziplinäre Herausforderung und ein für die Informatik und die jeweiligen Anwendungsdomänen in der Bedeutung zunehmendes Thema. Dieses Kapitel bietet eine Einführung in das Lehr- und Fachbuch „Sicherheitskritische Mensch-Computer-Interaktion – Interaktive Technologien und Soziale Medien im Krisen- und Sicherheitsmanagement“. Als didaktisch aufbereiteter, umfassender Überblick über Grundlagen, Methoden und Anwendungsgebiete soll es sowohl als vorlesungsbegleitende Lektüre als auch als Nachschlagewerk für Wissenschaftler, Designer und Entwickler dienen. Dies adressierend werden interaktive, mobile, ubiquitäre und kooperative Technologien sowie soziale Medien vorgestellt. Hierbei finden klassische Themen wie benutzbare (IT-)Sicherheit, Industrie 4.0, Kata-strophenschutz, Medizin und Automobil, aber auch Augmented Reality, Crowdsourcing, Shitstorm Management, Social Media Analytics und Cyberwar ihren Platz. Methodisch wird das Spektrum von Usable Safety bis Usable Security Engineering von Analyse über Design bis Evaluation abgedeckt.
@incollection{reuter_sicherheitskritische_2018,
address = {Wiesbaden, Germany},
title = {Sicherheitskritische {Mensch}-{Computer}-{Interaktion} – {Einleitung} und Überblick},
isbn = {978-3-658-19523-6},
url = {https://link.springer.com/chapter/10.1007/978-3-658-19523-6_1},
abstract = {Die sicherheitskritische Mensch-Computer-Interaktion (MCI) ist eine interdisziplinäre Herausforderung und ein für die Informatik und die jeweiligen Anwendungsdomänen in der Bedeutung zunehmendes Thema. Dieses Kapitel bietet eine Einführung in das Lehr- und Fachbuch „Sicherheitskritische Mensch-Computer-Interaktion – Interaktive Technologien und Soziale Medien im Krisen- und Sicherheitsmanagement“. Als didaktisch aufbereiteter, umfassender Überblick über Grundlagen, Methoden und Anwendungsgebiete soll es sowohl als vorlesungsbegleitende Lektüre als auch als Nachschlagewerk für Wissenschaftler, Designer und Entwickler dienen. Dies adressierend werden interaktive, mobile, ubiquitäre und kooperative Technologien sowie soziale Medien vorgestellt. Hierbei finden klassische Themen wie benutzbare (IT-)Sicherheit, Industrie 4.0, Kata-strophenschutz, Medizin und Automobil, aber auch Augmented Reality, Crowdsourcing, Shitstorm Management, Social Media Analytics und Cyberwar ihren Platz. Methodisch wird das Spektrum von Usable Safety bis Usable Security Engineering von Analyse über Design bis Evaluation abgedeckt.},
booktitle = {Sicherheitskritische {Mensch}-{Computer}-{Interaktion}: {Interaktive} {Technologien} und {Soziale} {Medien} im {Krisen}- und {Sicherheitsmanagement}},
publisher = {Springer Vieweg},
author = {Reuter, Christian},
editor = {Reuter, Christian},
year = {2018},
doi = {10.1007/978-3-658-19523-6_1},
keywords = {Crisis, HCI, SocialMedia, UsableSec, Projekt-KontiKat},
pages = {3--14},
}
2017
[BibTeX] [Abstract] [Download PDF]
The amount of data being available is increasing rapidly. Based on the technological advances with mobile and ubiquitous computing, the use of social media is getting more and more usual in daily life as well as in extraordinary situations, such as crises. Not surprisingly, this increasing use is one reason why data on the internet is also developing that fast. Currently, more than 3 billion people use the internet and the majority is also registered with social media services such as Facebook or Twitter. While processing this kind of data by the majority of non-technical users, concepts of End-User Development (EUD) are important. This chapter researches how concepts of EUD might be applied to handle social big data. Based on foundations and an empirical pre-study, we explore how EUD can support the gathering and assessment process of social media. In this context, we investigate how end-users can articulate their personal quality criteria appropriately and how the selection of relevant data can be supported by EUD approaches. We present a tailorable social media gathering service and quality assessment service for social media content, which has been implemented and integrated into an application for both volunteers and the emergency services.
@incollection{reuter_end-user_2017,
title = {End-{User} {Development} and {Social} {Big} {Data} - {Towards} {Tailorable} {Situation} {Assessment} with {Social} {Media}},
isbn = {978-3-319-60290-5},
url = {https://link.springer.com/chapter/10.1007/978-3-319-60291-2_12},
abstract = {The amount of data being available is increasing rapidly. Based on the technological advances with mobile and ubiquitous computing, the use of social media is getting more and more usual in daily life as well as in extraordinary situations, such as crises. Not surprisingly, this increasing use is one reason why data on the internet is also developing that fast. Currently, more than 3 billion people use the internet and the majority is also registered with social media services such as Facebook or Twitter. While processing this kind of data by the majority of non-technical users, concepts of End-User Development (EUD) are important. This chapter researches how concepts of EUD might be applied to handle social big data. Based on foundations and an empirical pre-study, we explore how EUD can support the gathering and assessment process of social media. In this context, we investigate how end-users can articulate their personal quality criteria appropriately and how the selection of relevant data can be supported by EUD approaches. We present a tailorable social media gathering service and quality assessment service for social media content, which has been implemented and integrated into an application for both volunteers and the emergency services.},
booktitle = {New {Perspectives} in {End}-{User} {Development}},
publisher = {Springer},
author = {Reuter, Christian and Kaufhold, Marc-André and Ludwig, Thomas},
editor = {Paternò, Fabio and Wulf, Volker},
year = {2017},
doi = {10.1007/978-3-319-60291-2_12},
keywords = {Crisis, HCI, SocialMedia, Projekt-EmerGent, Projekt-KOKOS},
pages = {307--332},
}
[BibTeX] [Abstract] [Download PDF]
Catastrophes like the storms in Europe in spring 2016, but also terrorist attacks regularly not only lead to extensive monetary damage but also threaten human lives. In such situations, the population desires information about the status of damage and safe behaviours. Apps can address this potentially, but comparatively, record a low number of users. Based on Reuter et al. (2017), this article shows the importance of information in disaster situations and illustrates features from current mobile warning apps.
@incollection{reuter_informing_2017,
address = {Wilhelmshaven},
title = {Informing the {Population}: {Mobile} {Warning} {Apps}},
isbn = {978-3-7450-5448-4},
url = {https://peasec.de/paper/2017/2017_ReuterKaufholdLeopoldKnipp_InformingthePopulation.pdf},
abstract = {Catastrophes like the storms in Europe in spring 2016, but also terrorist attacks regularly not only lead to extensive monetary damage but also threaten human lives. In such situations, the population desires information about the status of damage and safe behaviours. Apps can address this potentially, but comparatively, record a low number of users. Based on Reuter et al. (2017), this article shows the importance of information in disaster situations and illustrates features from current mobile warning apps.},
booktitle = {Risk and {Crisis} {Communication} in {Disaster} {Prevention} and {Management}},
publisher = {epubli},
author = {Reuter, Christian and Kaufhold, Marc-André and Leopold, Inken and Knipp, Hannah},
editor = {Klafft, Michael},
year = {2017},
keywords = {Crisis, HCI, Student, Projekt-KontiKat, Peace},
pages = {31--41},
}
[BibTeX] [Abstract] [Download PDF]
Das Thema Sicherheit durchzieht sowohl das Leben Einzelner als auch das Zusammenleben von Personenkollektiven. In diesem Heft geht es um das Wahrnehmen und Wertschätzen sowie die Stabilisierung von Situationen, in denen Gefahren und Risiken reduziert werden. Außerdem stehen die Instrumentarien, Methoden und Maßnahmen im Fokus, mit denen Sicherheit geschaffen werden soll. Besonders in komplexen Systemen wird Sicherheit zu einem schwierig zu fassenden Thema, zu dessen Begleiterscheinungen beispielsweise die Beschneidung von Freiheit zählt. Sicherheit wird in allen Lebensgebieten relevant – von der Politik, Gesellschaft, Wirtschaft und Recht über die Arbeitswelt bis hin in Medien, Technologie, Ökologie und Medizin. Zudem ist der Umgang mit Sicherheit landeskulturell geprägt.
@incollection{reuter_digitalisierung_2017,
address = {Göttingen},
title = {Digitalisierung und {Zivile} {Sicherheit}: {Zivilgesellschaftliche} und betriebliche {Kontinuität} in {Katastrophenlagen} ({KontiKat})},
isbn = {978-3-8471-0739-2},
url = {http://www.peasec.de/paper/2017/2017_ReuterKaufholdSchorchetal_DigitalisierungSicherheitKontiKat_Diagonal.pdf},
abstract = {Das Thema Sicherheit durchzieht sowohl das Leben Einzelner als auch das Zusammenleben von Personenkollektiven. In diesem Heft geht es um das Wahrnehmen und Wertschätzen sowie die Stabilisierung von Situationen, in denen Gefahren und Risiken reduziert werden. Außerdem stehen die Instrumentarien, Methoden und Maßnahmen im Fokus, mit denen Sicherheit geschaffen werden soll. Besonders in komplexen Systemen wird Sicherheit zu einem schwierig zu fassenden Thema, zu dessen Begleiterscheinungen beispielsweise die Beschneidung von Freiheit zählt. Sicherheit wird in allen Lebensgebieten relevant – von der Politik, Gesellschaft, Wirtschaft und Recht über die Arbeitswelt bis hin in Medien, Technologie, Ökologie und Medizin. Zudem ist der Umgang mit Sicherheit landeskulturell geprägt.},
booktitle = {Sicherheit ({DIAGONAL} {Jahrgang} 38)},
publisher = {Vandenhoeck \& Ruprecht},
author = {Reuter, Christian and Kaufhold, Marc-André and Schorch, Marén and Gerwinski, Jan and Soost, Christian and Hassan, Sohaib S. and Rusch, Gebhard and Moog, Petra and Pipek, Volkmar and Wulf, Volker},
editor = {Hoch, Gero and Schröteler von Brandt, Hildegard and Stein, Volker and Schwarz, Angela},
year = {2017},
doi = {10.14220/digo.2017.38.1.207},
keywords = {Cooperation, Crisis, HCI, SocialMedia, UsableSec, Projekt-KontiKat, Infrastructure, RSF},
pages = {207--224},
}
2016
[BibTeX] [Abstract] [Download PDF]
In cases of power outages the communication of organizations responsible for recovery work (emergency services, public administration, energy network operators) to the public poses several challenges, pri-marily the breakdowns of many communication infrastructures and therefore the limitations of the use of classical communication media. This paper surveys technical concepts to support crisis communica-tion during blackouts. Therefore it first investigates the perception and information demands of citizens and communication infrastructures in different scenarios. Furthermore, it analyzes communication infrastructures and their availability in different scenarios. Finally it proposes ‘BlaCom‘, an ICT-based concept for blackout communication, which addresses the time span between the occurrence of the energy blackout and the possible overload of the mobile phone network. It combines general information with location-specific and setting-specific information, was implemented as a prototype smartphone application and evaluated with 12 potential end users.
@incollection{reuter_chapter_2016,
title = {Chapter 44: {Communication} between {Power} {Blackout} and {Mobile} {Network} {Overload}},
volume = {II},
isbn = {978-1-4666-8756-1},
url = {https://www.wineme.uni-siegen.de/paper/2016/2016_reuter_communicationpowerblackoutnetworkoverload_ehealth.pdf},
abstract = {In cases of power outages the communication of organizations responsible for recovery work (emergency services, public administration, energy network operators) to the public poses several challenges, pri-marily the breakdowns of many communication infrastructures and therefore the limitations of the use of classical communication media. This paper surveys technical concepts to support crisis communica-tion during blackouts. Therefore it first investigates the perception and information demands of citizens and communication infrastructures in different scenarios. Furthermore, it analyzes communication infrastructures and their availability in different scenarios. Finally it proposes ‘BlaCom', an ICT-based concept for blackout communication, which addresses the time span between the occurrence of the energy blackout and the possible overload of the mobile phone network. It combines general information with location-specific and setting-specific information, was implemented as a prototype smartphone application and evaluated with 12 potential end users.},
booktitle = {E-{Health} and {Telemedicine}: {Concepts}, {Methodologies}, {Tools}, and {Applications}},
publisher = {IGI Global},
author = {Reuter, Christian},
editor = {{Mehdi Khosrow-Pour}},
year = {2016},
keywords = {Crisis, HCI, Projekt-InfoStrom, Projekt-EmerGent, Infrastructure, RSF},
pages = {876--891},
}
2015
[BibTeX] [Abstract] [Download PDF]