Alle wichtigen Informationen sind im Moodle-Kurs des Bachelor-/Master-Kolloquiums verfügbar.

Der Lehrstuhl Wissenschaft und Technik für Frieden und Sicherheit (PEASEC) im Fachbereich Informatik sowie Gesellschafts- und Geschichtswissenschaften der Technischen Universität Darmstadt verbindet Informatik mit Friedens- und Sicherheitsforschung.

Wir bieten interessante Abschlussarbeiten schwerpunktmäßig an für:

  • Informatik-Studiengänge, insb. Informatik (B.Sc./M.Sc.) inkl. IT-Sicherheit (M.Sc.) und Wirtschaftsinformatik (M.Sc.)
  • Internationale Studien/Friedens- und Konfliktforschung (M.A.)
  • Weitere Studiengänge nach Absprache

Eine Abschlussarbeit bei uns bietet Ihnen diese Vorteile:

  • interessante Aufgabenstellung durch praxisrelevante Arbeiten zu aktuellen Forschungsthemen
  • intensive, interdisziplinäre und forschungsorientierte Betreuung (individuelle Beratungstermine, Bachelor-/Master-Kolloquium für Gruppenfeedback, Einbindung in Forschungsprojekte)
  • vielfältige Perspektiven nach der Abschlussarbeit bei Partnern aus der Praxis oder als studentische oder wissenschaftliche Hilfskraft oder wissenschaftliche*r Mitarbeiter*in zur Promotion
  • mögliche Auszeichnungen: mehrere bei uns betreute Abschlussarbeiten wurden erfolgreich wissenschaftlich publiziert, für Best Student Paper Awards nominiert und u.a. mit dem IANUS-Preis sowie dem FIfF Weizenbaum-Studienpreis ausgezeichnet.

Themenbereiche

Wir beziehen Studierende aktiv in unsere Forschung ein, um so interessante Abschlussarbeiten in den Disziplinen Mensch-Computer-Interaktion, Cyber-Sicherheit und -Privatheit sowie Friedens- und Konfliktforschung bzw. besonders den folgenden Themenbereichen anzubieten:

  1. Friedensinformatik und technische Friedensforschung
    • Cyber-Peace, -War, -Rüstungskontrolle
    • Dual Use in der Informatik
  2. Kriseninformatik und Information Warfare
    • Soziale Medien in Konflikt- und Krisenlagen
    • Meinungsmanipulation und Fake News
  3. Benutzbare Sicherheit und Privatheit
    • Resiliente digitale Landwirtschaft / Städte
    • Sicherheits- und privatheitsfördernde Maßnahmen

Aktuelle Themen und Bewerbung in Moodle: www.thesis.peasec.de

Aktuelle Themen und Informationen zur Bewerbungen finden Sie in Moodle!

Melden Sie sich!

Nachdem Sie die ersten Schritte in Moodle erledigt haben: Senden Sie uns Ihre Unterlagen in einem einzigen PDF-Dokument (benannt als JahrMonatTag_ BewerbungLevelThesisFach_ VornameNachname.pdf mit Level={BSc|MSc|MA} und Fach={Inf|ITSec|WInf|ISFK…}) an thesis@peasec.de.

  1. kurzes Motivationsschreiben mit Themeninteresse (expliziter Bezug zu unseren in Moodle ausgeschriebenen Themen stark erwünscht, aber auch eigene Ideen möglich) und explizite Beschreibung Ihrer Kompetenzen (Programmierung, qualitative/quantitative empirische Methoden…)
  2. Lebenslauf mit Foto
  3. Zeugnisse (wenn im Master: Bachelorzeugnis) / aktueller Leistungsspiegel
  4. Optional weitere Unterlagen, die Ihre Kompetenzen oder Arbeitserfahrung dokumentieren, oder Beispiele vorheriger wissenschaftlicher Arbeiten (Seminararbeit, Bachelorarbeit), um Ihre Kompetenzen zu unterstreichen.

Tragen Sie sich zusätzlich bitte in die Mailingliste ein.

Vergangene Abschlussarbeiten

Vergangene Abschlussarbeiten

Wir betreuen über 30 Bachelor-/Masterarbeiten pro Jahr.

Bei PEASEC stehen Ihnen viele Möglichkeiten für Ihre Abschlussarbeit zur Verfügung. Ein Ausschnitt von vergangenen Arbeiten soll Ihnen greifbar machen, welche vielseitigen Themen Studierende bei uns bereits erarbeitet haben:

  1. Verschlüsselungspolitik der USA. Eine vergleichende Analyse der historischen Entwicklung
    – Bachelorarbeit von Philipp Imperatori, ausgezeichnet mit dem Weizenbaum-Studienpreis
  2. IoT in der Landwirtschaft durch Integration von LoRaWAN in lokale Mini-Server
    – Bachelorarbeit von Julian Schindel
  3. Trustworthy AI? Technological Diffusion of Civilian and Military Applications Across the EU
    – Masterarbeit von Stefka Schmid, ausgezeichnet mit dem IANUS-Preis
  4. Design eines Algorithmus zur automatisierten Analyse der Glaubwürdigkeit von Tweets
    – Masterarbeit von Daniel Hartung
Wissenschaftliche Artikel gemeinsam mit Studierenden

Bei PEASEC werden Studierende aktiv im Sinne forschungsorientierter Lehre in die Forschung einbezogen – welches auch über zusammen mit Studierenden verfasste wissenschaftliche Veröffentlichungen sichtbar ist. Beispiele?

2024

  • Laura Guntrum, Sofía Cerrillo, Christian Reuter (2024)
    Navigating the Pandemic through Technology: Colombian NGOs Promoting Peace during the COVID-19 era
    Peacebuilding & Development .
    [BibTeX] [Abstract]

    This article examines how Colombian NGOs use Information and Communication Technologies (ICTs) for peacebuilding attempts amid the COVID-19 pandemic. Drawing from 17 interviews with NGO members, the study underscores the pivotal role of digital peacebuilding in sustaining and expanding peace attempts, effective data management, and a broader engagement of target groups beyond in-person activities often associated with safety and financial concerns. The findings also identify prevailing challenges of incorporating ICTs in NGO’s peacebuilding activities, ranging from privacy-related concerns to connectivity issues. The article points out the potential for NGOs to enhance interactivity, knowledge transfer, and to diversify their activities, including IT-security training and awareness campaigns on hate speech and propaganda. It also emphasizes the importance of developing risk reduction strategies tailored to the specific needs of different target groups.

    @article{guntrum_navigating_2024,
    title = {Navigating the {Pandemic} through {Technology}: {Colombian} {NGOs} {Promoting} {Peace} during the {COVID}-19 era},
    abstract = {This article examines how Colombian NGOs use Information and Communication Technologies (ICTs) for peacebuilding attempts amid the COVID-19 pandemic. Drawing from 17 interviews with NGO members, the study underscores the pivotal role of digital peacebuilding in sustaining and expanding peace attempts, effective data management, and a broader engagement of target groups beyond in-person activities often associated with safety and financial concerns. The findings also identify prevailing challenges of incorporating ICTs in NGO's peacebuilding activities, ranging from privacy-related concerns to connectivity issues. The article points out the potential for NGOs to enhance interactivity, knowledge transfer, and to diversify their activities, including IT-security training and awareness campaigns on hate speech and propaganda. It also emphasizes the importance of developing risk reduction strategies tailored to the specific needs of different target groups.},
    journal = {Peacebuilding \& Development},
    author = {Guntrum, Laura and Cerrillo, Sofía and Reuter, Christian},
    year = {2024},
    keywords = {Peace, Projekt-TraCe, Student},
    }

  • Philipp Kuehn, Dilara Nadermahmoodi, Moritz Kerk, Christian Reuter (2024)
    ThreatCluster: Threat Clustering for Information Overload Reduction in Computer Emergency Response Teams
    arXiv. doi:10.48550/arXiv.2210.14067
    [BibTeX] [Abstract] [Download PDF]

    The ever-increasing number of threats and the existing diversity of information sources pose challenges for Computer Emergency Response Teams (CERTs). To respond to emerging threats, CERTs must gather information in a timely and comprehensive manner. But the volume of sources and information leads to information overload. This paper contributes to the question of how to reduce information overload for CERTs. We propose clustering incoming information as scanning this information is one of the most tiresome, but necessary, manual steps. Based on current studies, we establish conditions for such a framework. Different types of evaluation metrics are used and selected in relation to the framework conditions. Furthermore, different document embeddings and distance measures are evaluated and interpreted in combination with clustering methods. We use three different corpora for the evaluation, a novel ground truth corpus based on threat reports, one security bug report (SBR) corpus, and one with news articles. Our work shows, it is possible to reduce the information overload by up to 84.8\% with homogeneous clusters. A runtime analysis of the clustering methods strengthens the decision of selected clustering methods. The source code and dataset will be made publicly available after acceptance.

    @misc{kuehn_threatcluster_2024,
    title = {{ThreatCluster}: {Threat} {Clustering} for {Information} {Overload} {Reduction} in {Computer} {Emergency} {Response} {Teams}},
    shorttitle = {{ThreatCluster}},
    url = {http://arxiv.org/abs/2210.14067},
    doi = {10.48550/arXiv.2210.14067},
    abstract = {The ever-increasing number of threats and the existing diversity of information sources pose challenges for Computer Emergency Response Teams (CERTs). To respond to emerging threats, CERTs must gather information in a timely and comprehensive manner. But the volume of sources and information leads to information overload. This paper contributes to the question of how to reduce information overload for CERTs. We propose clustering incoming information as scanning this information is one of the most tiresome, but necessary, manual steps. Based on current studies, we establish conditions for such a framework. Different types of evaluation metrics are used and selected in relation to the framework conditions. Furthermore, different document embeddings and distance measures are evaluated and interpreted in combination with clustering methods. We use three different corpora for the evaluation, a novel ground truth corpus based on threat reports, one security bug report (SBR) corpus, and one with news articles. Our work shows, it is possible to reduce the information overload by up to 84.8\% with homogeneous clusters. A runtime analysis of the clustering methods strengthens the decision of selected clustering methods. The source code and dataset will be made publicly available after acceptance.},
    urldate = {2024-03-18},
    publisher = {arXiv},
    author = {Kuehn, Philipp and Nadermahmoodi, Dilara and Kerk, Moritz and Reuter, Christian},
    month = mar,
    year = {2024},
    note = {arXiv:2210.14067 [cs]
    version: 2},
    keywords = {Student, Security, UsableSec, Projekt-CYWARN, Projekt-ATHENE-SecUrban},
    }

  • Stefka Schmid, Katrin Hartwig, Robert Cieslinski, Christian Reuter (2024)
    Digital Resilience in Dealing with Misinformation on Social Media during COVID-19: A Web Application to Assist Users in Crises
    Information Systems Frontiers (ISF) ;26(2):477–499. doi:10.1007/s10796-022-10347-5
    [BibTeX] [Abstract] [Download PDF]

    In crises such as the COVID-19 pandemic, it is crucial to support users when dealing with social media content. Considering digital resilience, we propose a web app based on Social Network Analysis (SNA) to provide an overview of potentially misleading vs. non-misleading content on Twitter, which can be explored by users and enable foundational learning. The latter aims at systematically identifying thematic patterns which may be associated with misleading information. Additionally, it entails reflecting on indicators of misleading tweets which are proposed to approach classification of tweets. Paying special attention to non-expert users of social media, we conducted a two-step Think Aloud study for evaluation. While participants valued the opportunity to generate new knowledge and the diversity of the application, qualities such as equality and rapidity may be further improved. However, learning effects outweighed individual costs as all users were able to shift focus onto relevant features, such as hashtags, while readily pointing out content characteristics. Our design artifact connects to learning-oriented interventions regarding the spread of misleading information and tackles information overload by a SNA-based plug-in.

    @article{schmid_digital_2024,
    title = {Digital {Resilience} in {Dealing} with {Misinformation} on {Social} {Media} during {COVID}-19: {A} {Web} {Application} to {Assist} {Users} in {Crises}},
    volume = {26},
    issn = {1572-9419},
    url = {https://doi.org/10.1007/s10796-022-10347-5},
    doi = {10.1007/s10796-022-10347-5},
    abstract = {In crises such as the COVID-19 pandemic, it is crucial to support users when dealing with social media content. Considering digital resilience, we propose a web app based on Social Network Analysis (SNA) to provide an overview of potentially misleading vs. non-misleading content on Twitter, which can be explored by users and enable foundational learning. The latter aims at systematically identifying thematic patterns which may be associated with misleading information. Additionally, it entails reflecting on indicators of misleading tweets which are proposed to approach classification of tweets. Paying special attention to non-expert users of social media, we conducted a two-step Think Aloud study for evaluation. While participants valued the opportunity to generate new knowledge and the diversity of the application, qualities such as equality and rapidity may be further improved. However, learning effects outweighed individual costs as all users were able to shift focus onto relevant features, such as hashtags, while readily pointing out content characteristics. Our design artifact connects to learning-oriented interventions regarding the spread of misleading information and tackles information overload by a SNA-based plug-in.},
    number = {2},
    journal = {Information Systems Frontiers (ISF)},
    author = {Schmid, Stefka and Hartwig, Katrin and Cieslinski, Robert and Reuter, Christian},
    month = apr,
    year = {2024},
    keywords = {Projekt-TraCe, Student, Crisis, A-Paper, Projekt-NEBULA},
    pages = {477--499},
    }

  • Katrin Hartwig, Ruslan Sandler, Christian Reuter (2024)
    Navigating Misinformation in Voice Messages: Identification of User-Centered Features for Digital Interventions
    Risk, Hazards, & Crisis in Public Policy (RHCPP) . doi:10.1002/rhc3.12296
    [BibTeX] [Abstract] [Download PDF]

    Misinformation presents a challenge to democracies, particularly in times of crisis. One way in which misinformation is spread is through voice messages sent via messenger groups, which enable members to share information on a larger scale. Gaining user perspectives on digital misinformation interventions as countermeasure after detection is crucial. In this paper, we extract potential features of misinformation in voice messages from literature, implement them within a program that automatically processes voice messages, and evaluate their perceived usefulness and comprehensibility as user-centered indicators.We propose 35 features extracted from audio files at the character, word, sentence, audio and creator levels to assist (1) private individuals in conducting credibility assessments, (2) government agencies faced with data overload during crises, and (3) researchers seeking to gather features for automatic detection approaches. We conducted a think-aloud study with laypersons (N = 20) to provide initial insight into how individuals autonomously assess the credibility of voice messages, as well as which automatically extracted features they find to be clear and convincing indicators of misinformation. Our study provides qualitative and quantitative insights into valuable indicators, particularly when they relate directly to the content or its creator, and uncovers challenges in user interface design.

    @article{hartwig_navigating_2024,
    title = {Navigating {Misinformation} in {Voice} {Messages}: {Identification} of {User}-{Centered} {Features} for {Digital} {Interventions}},
    issn = {1944-4079},
    url = {https://peasec.de/paper/2024/2024_HartwigSandlerReuter_NavigatingMisinfoVoiceMessages_RiskHazards.pdf},
    doi = {10.1002/rhc3.12296},
    abstract = {Misinformation presents a challenge to democracies, particularly in times of crisis. One way in which misinformation is spread is through voice messages sent via messenger groups, which enable members to share information on a larger scale. Gaining user perspectives on digital misinformation interventions as countermeasure after detection is crucial. In this paper, we extract potential features of misinformation in voice messages from literature, implement them within a program that automatically processes voice messages, and evaluate their perceived usefulness and comprehensibility as user-centered indicators.We propose 35 features extracted from audio files at the character, word, sentence, audio and creator levels to assist (1) private individuals in conducting credibility assessments, (2) government agencies faced with data overload during crises, and (3) researchers seeking to gather features for automatic detection approaches. We conducted a think-aloud study with laypersons (N = 20) to provide initial insight into how individuals autonomously assess the credibility of voice messages, as well as which automatically extracted features they find to be clear and convincing indicators of misinformation. Our study provides qualitative and quantitative insights into valuable indicators, particularly when they relate directly to the content or its creator, and uncovers challenges in user interface design.},
    journal = {Risk, Hazards, \& Crisis in Public Policy (RHCPP)},
    author = {Hartwig, Katrin and Sandler, Ruslan and Reuter, Christian},
    year = {2024},
    note = {Publisher: John Wiley \& Sons, Ltd},
    keywords = {Student, UsableSec, Crisis, HCI, Projekt-CYLENCE, A-Paper, Projekt-NEBULA, Projekt-ATHENE, Ranking-ImpactFactor, SocialMedia, Cyberwar},
    }

  • Markus Bayer, Philipp Kuehn, Ramin Shanehsaz, Christian Reuter (2024)
    CySecBERT: A Domain-Adapted Language Model for the Cybersecurity Domain
    ACM Transactions on Privacy and Security (TOPS) ;27(2). doi:10.1145/3652594
    [BibTeX] [Abstract] [Download PDF]

    The field of cybersecurity is evolving fast. Security professionals are in need of intelligence on past, current and – ideally – on upcoming threats, because attacks are becoming more advanced and are increasingly targeting larger and more complex systems. Since the processing and analysis of such large amounts of information cannot be addressed manually, cybersecurity experts rely on machine learning techniques. In the textual domain, pre-trained language models like BERT have proven to be helpful as they provide a good baseline for further fine-tuning. However, due to the domain-knowledge and the many technical terms in cybersecurity, general language models might miss the gist of textual information. For this reason, we create a high-quality dataset and present a language model specifically tailored to the cybersecurity domain which can serve as a basic building block for cybersecurity systems. The model is compared on 15 tasks: Domain-dependent extrinsic tasks for measuring the performance on specific problems, intrinsic tasks for measuring the performance of the internal representations of the model as well as general tasks from the SuperGLUE benchmark. The results of the intrinsic tasks show that our model improves the internal representation space of domain words compared to the other models. The extrinsic, domain-dependent tasks, consisting of sequence tagging and classification, show that the model performs best in cybersecurity scenarios. In addition, we pay special attention to the choice of hyperparameters against catastrophic forgetting, as pre-trained models tend to forget the original knowledge during further training.

    @article{bayer_cysecbert_2024,
    title = {{CySecBERT}: {A} {Domain}-{Adapted} {Language} {Model} for the {Cybersecurity} {Domain}},
    volume = {27},
    issn = {2471-2566},
    url = {https://doi.org/10.1145/3652594},
    doi = {10.1145/3652594},
    abstract = {The field of cybersecurity is evolving fast. Security professionals are in need of intelligence on past, current and - ideally - on upcoming threats, because attacks are becoming more advanced and are increasingly targeting larger and more complex systems. Since the processing and analysis of such large amounts of information cannot be addressed manually, cybersecurity experts rely on machine learning techniques. In the textual domain, pre-trained language models like BERT have proven to be helpful as they provide a good baseline for further fine-tuning. However, due to the domain-knowledge and the many technical terms in cybersecurity, general language models might miss the gist of textual information. For this reason, we create a high-quality dataset and present a language model specifically tailored to the cybersecurity domain which can serve as a basic building block for cybersecurity systems. The model is compared on 15 tasks: Domain-dependent extrinsic tasks for measuring the performance on specific problems, intrinsic tasks for measuring the performance of the internal representations of the model as well as general tasks from the SuperGLUE benchmark. The results of the intrinsic tasks show that our model improves the internal representation space of domain words compared to the other models. The extrinsic, domain-dependent tasks, consisting of sequence tagging and classification, show that the model performs best in cybersecurity scenarios. In addition, we pay special attention to the choice of hyperparameters against catastrophic forgetting, as pre-trained models tend to forget the original knowledge during further training.},
    number = {2},
    journal = {ACM Transactions on Privacy and Security (TOPS)},
    author = {Bayer, Markus and Kuehn, Philipp and Shanehsaz, Ramin and Reuter, Christian},
    month = apr,
    year = {2024},
    note = {Place: New York, NY, USA
    Publisher: Association for Computing Machinery},
    keywords = {Student, Security, UsableSec, Projekt-CYWARN, Projekt-ATHENE-CyAware, Projekt-CYLENCE, A-Paper, Ranking-CORE-A, Ranking-ImpactFactor},
    }

  • Tom Biselli, Laura Utz, Christian Reuter (2024)
    Supporting Informed Choices about Browser Cookies: The Impact of Personalised Cookie Banners
    Proceedings on Privacy Enhancing Technologies (PoPETs) (1):171–191. doi:https://doi.org/10.56553/popets-2024-0011
    [BibTeX] [Abstract] [Download PDF]

    Browser cookies, especially those from third parties, pose a threat to individual privacy. While it is possible in principle to control the number of cookies accepted, this choice is often neither usable nor truly informed. To address this issue, this study used semi-structured interviews (N=19) to identify attitudes and user requirements to develop an alternative personalised cookie banner, which was evaluated in an online experiment (N=157). The cookie banner explanations were tailored to the privacy knowledge of three groups of users: low, medium and high. The online experiment measured cookie choices and perceived usability of the cookie banner across three groups: an experimental group that viewed the novel cookie banner with personalisation (personalised privacy assistant), a control group that viewed the novel cookie banner without personalisation (privacy assistant) and a control group that viewed the standard cookie banner provided by the website. The results indicate that the novel cookie banner (with or without personalisation) generally resulted in significantly fewer accepted cookies and increased usability compared to the standard cookie window. In addition, the personalised cookie banner resulted in significantly fewer accepted cookies and higher usability than the non-personalised cookie banner. These results suggest that tailoring cookie banners to users‘ privacy knowledge can be an effective approach to empowering users to make informed choices and better protect their privacy.

    @article{biselli_supporting_2024,
    title = {Supporting {Informed} {Choices} about {Browser} {Cookies}: {The} {Impact} of {Personalised} {Cookie} {Banners}},
    url = {https://petsymposium.org/popets/2024/popets-2024-0011.pdf},
    doi = {https://doi.org/10.56553/popets-2024-0011},
    abstract = {Browser cookies, especially those from third parties, pose a threat to individual privacy. While it is possible in principle to control the number of cookies accepted, this choice is often neither usable nor truly informed. To address this issue, this study used semi-structured interviews (N=19) to identify attitudes and user requirements to develop an alternative personalised cookie banner, which was evaluated in an online experiment (N=157). The cookie banner explanations were tailored to the privacy knowledge of three groups of users: low, medium and high. The online experiment measured cookie choices and perceived usability of the cookie banner across three groups: an experimental group that viewed the novel cookie banner with personalisation (personalised privacy assistant), a control group that viewed the novel cookie banner without personalisation (privacy assistant) and a control group that viewed the standard cookie banner provided by the website. The results indicate that the novel cookie banner (with or without personalisation) generally resulted in significantly fewer accepted cookies and increased usability compared to the standard cookie window. In addition, the personalised cookie banner resulted in significantly fewer accepted cookies and higher usability than the non-personalised cookie banner. These results suggest that tailoring cookie banners to users' privacy knowledge can be an effective approach to empowering users to make informed choices and better protect their privacy.},
    number = {1},
    journal = {Proceedings on Privacy Enhancing Technologies (PoPETs)},
    author = {Biselli, Tom and Utz, Laura and Reuter, Christian},
    year = {2024},
    keywords = {Student, Security, UsableSec, HCI, Projekt-CROSSING, A-Paper, AuswahlUsableSec, Selected, Ranking-CORE-A},
    pages = {171--191},
    }

  • Philipp Kuehn, Kyra Wittorf, Christian Reuter (2024)
    Navigating the Shadows: Manual and Semi-Automated Evaluation of the Dark Web for Cyber Threat Intelligence
    IEEE Access ;12:118903–118922. doi:10.1109/ACCESS.2024.3448247
    [BibTeX] [Abstract] [Download PDF]

    In today’s world, cyber-attacks are becoming more frequent and thus proactive protection against them is becoming more important. Cyber Threat Intelligence (CTI) is a possible solution, as it collects threat information in various information sources and derives stakeholder intelligence to protect one’s infrastructure. The current focus of CTI in research is the clear web, but the dark web may contain further information. To further advance protection, this work analyzes the dark web as Open Source Intelligence (OSINT) data source to complement current CTI information. The underlying assumption is that hackers use the dark web to exchange, develop, and share information and assets. This work aims to understand the structure of the dark web and identify the amount of its openly available CTI related information. We conducted a comprehensive literature review for dark web research and CTI. To follow this up we manually investigated and analyzed 65 dark web forum (DWF), 7 single-vendor shops, and 72 dark web marketplace (DWM). We documented the content and relevance of DWFs and DWMs for CTI, as well as challenges during the extraction and provide mitigations. During our investigation we identified IT security relevant information in both DWFs and DWMs, ranging from malware toolboxes to hacking-as-a-service. One of the most present challenges during our manual analysis were necessary interactions to access information and anti-crawling measures, i.e., CAPTCHAs. This analysis showed 88\% of marketplaces and 53\% of forums contained relevant data. Our complementary semi-automated analysis of 1,186,906 onion addresses indicates, that the necessary interaction makes it difficult to see the dark web as an open, but rather treat it as specialized information source, when clear web information does not suffice.

    @article{kuehn_navigating_2024,
    title = {Navigating the {Shadows}: {Manual} and {Semi}-{Automated} {Evaluation} of the {Dark} {Web} for {Cyber} {Threat} {Intelligence}},
    volume = {12},
    issn = {2169-3536},
    shorttitle = {Navigating the {Shadows}},
    url = {https://ieeexplore.ieee.org/document/10643518},
    doi = {10.1109/ACCESS.2024.3448247},
    abstract = {In today’s world, cyber-attacks are becoming more frequent and thus proactive protection against them is becoming more important. Cyber Threat Intelligence (CTI) is a possible solution, as it collects threat information in various information sources and derives stakeholder intelligence to protect one’s infrastructure. The current focus of CTI in research is the clear web, but the dark web may contain further information. To further advance protection, this work analyzes the dark web as Open Source Intelligence (OSINT) data source to complement current CTI information. The underlying assumption is that hackers use the dark web to exchange, develop, and share information and assets. This work aims to understand the structure of the dark web and identify the amount of its openly available CTI related information. We conducted a comprehensive literature review for dark web research and CTI. To follow this up we manually investigated and analyzed 65 dark web forum (DWF), 7 single-vendor shops, and 72 dark web marketplace (DWM). We documented the content and relevance of DWFs and DWMs for CTI, as well as challenges during the extraction and provide mitigations. During our investigation we identified IT security relevant information in both DWFs and DWMs, ranging from malware toolboxes to hacking-as-a-service. One of the most present challenges during our manual analysis were necessary interactions to access information and anti-crawling measures, i.e., CAPTCHAs. This analysis showed 88\% of marketplaces and 53\% of forums contained relevant data. Our complementary semi-automated analysis of 1,186,906 onion addresses indicates, that the necessary interaction makes it difficult to see the dark web as an open, but rather treat it as specialized information source, when clear web information does not suffice.},
    journal = {IEEE Access},
    author = {Kuehn, Philipp and Wittorf, Kyra and Reuter, Christian},
    year = {2024},
    keywords = {Student, Security, UsableSec, Projekt-CYWARN, Projekt-ATHENE-SecUrban, Ranking-ImpactFactor, Ranking-Core-A},
    pages = {118903--118922},
    }

  • Katrin Hartwig, Frederic Doell, Christian Reuter (2024)
    The Landscape of User-centered Misinformation Interventions – A Systematic Literature Review
    ACM Computing Surveys (CSUR) ;56(11). doi:10.1145/3674724
    [BibTeX] [Abstract] [Download PDF]

    Misinformation represent a key challenge for society. User-centered misinformation interventions as digital countermeasures that exert a direct influence on users represent a promising means to deal with the large amounts of information available. While an extensive body of research on this topic exists, researchers are confronted with a diverse research landscape spanning multiple disciplines. This review systematizes the landscape of user-centered misinformation interventions to facilitate knowledge transfer, identify trends, and enable informed decision-making. Over 3,700 scholarly publications were screened and a systematic literature review (N=108) was conducted. A taxonomy was derived regarding intervention design (e.g., binary label), user interaction (active or passive), and timing (e.g., post exposure to misinformation). We provide a structured overview of approaches across multiple disciplines, and derive six overarching challenges for future research.

    @article{hartwig_landscape_2024,
    title = {The {Landscape} of {User}-centered {Misinformation} {Interventions} – {A} {Systematic} {Literature} {Review}},
    volume = {56},
    issn = {0360-0300},
    url = {https://peasec.de/paper/2024/2024_HartwigDoellReuter_LandscapeUserCentredMisinfoInterventions_CSUR.pdf},
    doi = {10.1145/3674724},
    abstract = {Misinformation represent a key challenge for society. User-centered misinformation interventions as digital countermeasures that exert a direct influence on users represent a promising means to deal with the large amounts of information available. While an extensive body of research on this topic exists, researchers are confronted with a diverse research landscape spanning multiple disciplines. This review systematizes the landscape of user-centered misinformation interventions to facilitate knowledge transfer, identify trends, and enable informed decision-making. Over 3,700 scholarly publications were screened and a systematic literature review (N=108) was conducted. A taxonomy was derived regarding intervention design (e.g., binary label), user interaction (active or passive), and timing (e.g., post exposure to misinformation). We provide a structured overview of approaches across multiple disciplines, and derive six overarching challenges for future research.},
    number = {11},
    journal = {ACM Computing Surveys (CSUR)},
    author = {Hartwig, Katrin and Doell, Frederic and Reuter, Christian},
    month = jul,
    year = {2024},
    keywords = {Peace, Student, HCI, A-Paper, Ranking-CORE-A*, Selected, Projekt-NEBULA, Ranking-ImpactFactor},
    }

  • Jasmin Haunschild, Laura Guntrum, Sofía Cerrillo, Franziska Bujara, Christian Reuter (2024)
    Towards a Digitally Mediated Transitional Justice Process? An Analysis of Colombian Transitional Justice Organisations’ Posting Behaviour on Facebook
    Peace and Conflict Studies ;30(2).
    [BibTeX] [Abstract] [Download PDF]

    In Colombia, Transitional Justice (TJ) institutions were established after years of violent conflict as part of the 2016 peace agreement between the FARC and the Colombian government. By analysing the posting behaviour of the government-appointed TJ institutions on Facebook, we show how general TJ aims and opportunities for citizen participation were promoted in 2019. Our analysis reveals that the organisations rarely address topics related to reconciliation and that active online participation and two-way communication are rather scarce. Instead, Facebook is mainly used by the TJ organisations to increase solidarity with victims and disseminate information about their work and the TJ process. Reflecting on existing literature on TJ and social media participation, we identify great potential for expanding TJ goals and community engagement on social media, to use it as a resource for facilitating the TJ processes, creating exchange, and enabling participation.

    @article{haunschild_towards_2024,
    title = {Towards a {Digitally} {Mediated} {Transitional} {Justice} {Process}? {An} {Analysis} of {Colombian} {Transitional} {Justice} {Organisations}’ {Posting} {Behaviour} on {Facebook}},
    volume = {30},
    issn = {1082-7307},
    url = {https://nsuworks.nova.edu/pcs/vol30/iss2/4/},
    abstract = {In Colombia, Transitional Justice (TJ) institutions were established after years of violent conflict as part of the 2016 peace agreement between the FARC and the Colombian government. By analysing the posting behaviour of the government-appointed TJ institutions on Facebook, we show how general TJ aims and opportunities for citizen participation were promoted in 2019. Our analysis reveals that the organisations rarely address topics related to reconciliation and that active online participation and two-way communication are rather scarce. Instead, Facebook is mainly used by the TJ organisations to increase solidarity with victims and disseminate information about their work and the TJ process. Reflecting on existing literature on TJ and social media participation, we identify great potential for expanding TJ goals and community engagement on social media, to use it as a resource for facilitating the TJ processes, creating exchange, and enabling participation.},
    number = {2},
    journal = {Peace and Conflict Studies},
    author = {Haunschild, Jasmin and Guntrum, Laura and Cerrillo, Sofía and Bujara, Franziska and Reuter, Christian},
    year = {2024},
    keywords = {Peace, Student, Projekt-ATHENE-SecUrban, SocialMedia},
    }

  • Jasmin Haunschild, Felix Burger, Christian Reuter (2024)
    Understanding Crisis Preparedness: Insights from Personal Values, Beliefs, Social Norms, and Personal Norms
    Proceedings of the Information Systems for Crisis Response and Management (ISCRAM) (Best Paper Award) ;21.
    [BibTeX] [Abstract] [Download PDF]

    In disasters and crises, crisis preparation at the household level is crucial for societal resilience. However, motivating citizens to take personal responsibility and to implement preparedness measures remains challenging. This study investigates the impact of values, beliefs and norms on preparedness. Through a survey in Germany on resource-oriented crisis preparedness and participants’ values, a group of more prepared and less prepared individuals was differentiated. We quantitatively analyzed the correlation between values and crisis preparedness. A quantitative analysis revealed a significant association between the value of benevolence and higher preparedness. Follow-up interviews (N=30) explored participants&\#039; beliefs and norms, showing minimal group differences. Although crisis preparedness is generally viewed positively, strong negativity exists towards perceived “hoarders”. The study discusses implication for crisis communication and the design of nudges and persuasive systems, emphasizing intervention that can trigger benevolence to foster preparedness and appeal to the social benefits to counter the narrative of anti-social crisis preparedness.

    @article{haunschild_understanding_2024,
    title = {Understanding {Crisis} {Preparedness}: {Insights} from {Personal} {Values}, {Beliefs}, {Social} {Norms}, and {Personal} {Norms}},
    volume = {21},
    url = {https://ojs.iscram.org/index.php/Proceedings/article/view/19},
    abstract = {In disasters and crises, crisis preparation at the household level is crucial for societal resilience. However, motivating citizens to take personal responsibility and to implement preparedness measures remains challenging. This study investigates the impact of values, beliefs and norms on preparedness. Through a survey in Germany on resource-oriented crisis preparedness and participants’ values, a group of more prepared and less prepared individuals was differentiated. We quantitatively analyzed the correlation between values and crisis preparedness. A quantitative analysis revealed a significant association between the value of benevolence and higher preparedness. Follow-up interviews (N=30) explored participants\&\#039; beliefs and norms, showing minimal group differences. Although crisis preparedness is generally viewed positively, strong negativity exists towards perceived “hoarders”. The study discusses implication for crisis communication and the design of nudges and persuasive systems, emphasizing intervention that can trigger benevolence to foster preparedness and appeal to the social benefits to counter the narrative of anti-social crisis preparedness.},
    urldate = {2024-05-27},
    journal = {Proceedings of the Information Systems for Crisis Response and Management (ISCRAM) (Best Paper Award)},
    author = {Haunschild, Jasmin and Burger, Felix and Reuter, Christian},
    month = may,
    year = {2024},
    note = {Section: ISCRAM Proceedings},
    keywords = {Student, Crisis, Projekt-emergenCITY, Projekt-ATHENE-SecUrban},
    }

    2023

  • Jasmin Haunschild, Leon Jung, Christian Reuter (2023)
    Dual-use in volunteer operations? Attitudes of computer science students regarding the establishment of a cyber security volunteer force
    In: Gerber Nina, Verena Zimmermann: International Symposium on Technikpsychologie (TecPsy). Sciendo, , 66–81.
    [BibTeX] [Abstract] [Download PDF]

    The digitalisation of critical infrastructure has increased the risk of large-scale cyber incidents. In contrast to the management of conventional emergencies by established civil protection organisations involving volunteers in Germany, few response capacities exist for these events. The concept of a volunteer force for cyber security could close this protection gap. However, such involvement also poses practical and ethical challenges. By conducting interviews with computer science students (N = 11), this paper analyses potential volunteers’ attitudes towards ethical implications of a cyber volunteer force, as well as practical aspects that might motivate or hinder their participation. A qualitative content analysis reveals that students are largely unaware of potential dilemmas connected to vulnerabilities handling and national cybersecurity interests. Ethical guidelines and means of motivating and encouraging potential volunteers are discussed.

    @incollection{haunschild_dual-use_2023,
    title = {Dual-use in volunteer operations? {Attitudes} of computer science students regarding the establishment of a cyber security volunteer force},
    isbn = {978-83-66675-89-6},
    url = {https://sciendo.com/chapter/9788366675896/10.2478/9788366675896-006},
    abstract = {The digitalisation of critical infrastructure has increased the risk of large-scale cyber incidents. In contrast to the management of conventional emergencies by established civil protection organisations involving volunteers in Germany, few response capacities exist for these events. The concept of a volunteer force for cyber security could close this protection gap. However, such involvement also poses practical and ethical challenges. By conducting interviews with computer science students (N = 11), this paper analyses potential volunteers’ attitudes towards ethical implications of a cyber volunteer force, as well as practical aspects that might motivate or hinder their participation. A qualitative
    content analysis reveals that students are largely unaware of potential dilemmas connected to vulnerabilities handling and national cybersecurity interests. Ethical guidelines and means of motivating and encouraging potential volunteers
    are discussed.},
    booktitle = {International {Symposium} on {Technikpsychologie} ({TecPsy})},
    publisher = {Sciendo},
    author = {Haunschild, Jasmin and Jung, Leon and Reuter, Christian},
    editor = {Nina, Gerber and Zimmermann, Verena},
    year = {2023},
    keywords = {Student, Security, UsableSec, Crisis, Projekt-emergenCITY, Projekt-ATHENE-SecUrban},
    pages = {66--81},
    }

  • Denis Orlov, Franz Kuntke, Christian Reuter (2023)
    Optimierte Messenger-Applikation zur Notfallkommunikation via LoRaWAN-DTN
    In: : INFORMATIK 2023 – Designing Futures: Zukünfte gestalten. Gesellschaft für Informatik e. V., , 1–6. doi:10.18420/inf2023_160
    [BibTeX] [Abstract] [Download PDF]

    Die vorliegende Arbeit präsentiert die Entwicklung einer Messenger-App mit Schwerpunkt auf Benutzerfreundlichkeit, für die Nutzung mit einem bestehenden LoRaWAN-DTN-Backend. Die App ermöglicht den Austausch von Nachrichten mit anderen Personen über ein vorhandenes Kommunikationssystem auf LoRaWAN-Basis. Das grundlegende Softwaregerüst wurde mithilfe agiler Softwareentwicklungsmethoden als Progressive-Web-App entwickelt und iterativ verbessert. Das Ergebnis ist eine plattformübergreifende App für Desktop-PCs und Android-Smartphones. Die App bietet grundlegende Messenger-Funktionen wie Kontaktverwaltung, Chatverlauf-Speicher und Benachrichtigungen. Zusätzlich enthält die App erweiterte Funktionen wie einen leicht zugänglichen SOS-Button, um Notfallnachrichten schnell absetzen zu können. Ziel der Entwicklung war es, die Gebrauchstauglichkeit gegenüber einem ersten Prototyp zu verbessern. Die App soll effektive Kommunikation zwischen Helfern und Betroffenen ermöglichen, während und nach Krisenereignissen wie beispielsweise der europäischen Flutkatastrophe 2021. In folgenden Arbeiten soll das System unter Nutzung dieser App im Einsatz getestet werden.

    @incollection{orlov_optimierte_2023,
    title = {Optimierte {Messenger}-{Applikation} zur {Notfallkommunikation} via {LoRaWAN}-{DTN}},
    url = {https://peasec.de/paper/2023/2023_OrlovKuntkeReuter_OptimierteMessengerApplikation_GI.pdf},
    abstract = {Die vorliegende Arbeit präsentiert die Entwicklung einer Messenger-App mit Schwerpunkt auf Benutzerfreundlichkeit, für die Nutzung mit einem bestehenden LoRaWAN-DTN-Backend. Die App ermöglicht den Austausch von Nachrichten mit anderen Personen über ein vorhandenes Kommunikationssystem auf LoRaWAN-Basis. Das grundlegende Softwaregerüst wurde mithilfe agiler Softwareentwicklungsmethoden als Progressive-Web-App entwickelt und iterativ verbessert. Das Ergebnis ist eine plattformübergreifende App für Desktop-PCs und Android-Smartphones. Die App bietet grundlegende Messenger-Funktionen wie Kontaktverwaltung, Chatverlauf-Speicher und Benachrichtigungen. Zusätzlich enthält die App erweiterte Funktionen wie einen leicht zugänglichen SOS-Button, um Notfallnachrichten schnell absetzen zu können. Ziel der Entwicklung war es, die Gebrauchstauglichkeit gegenüber einem ersten Prototyp zu verbessern. Die App soll effektive Kommunikation zwischen Helfern und Betroffenen ermöglichen, während und nach Krisenereignissen wie beispielsweise der europäischen Flutkatastrophe 2021. In folgenden Arbeiten soll das System unter Nutzung dieser App im Einsatz getestet werden.},
    booktitle = {{INFORMATIK} 2023 - {Designing} {Futures}: {Zukünfte} gestalten},
    publisher = {Gesellschaft für Informatik e. V.},
    author = {Orlov, Denis and Kuntke, Franz and Reuter, Christian},
    year = {2023},
    doi = {10.18420/inf2023_160},
    keywords = {Student, Projekt-AgriRegio, RSF, Crisis},
    pages = {1--6},
    }

  • Steffen Haesler, Marc Wendelborn, Christian Reuter (2023)
    Getting the Residents‘ Attention: The Perception of Warning Channels in Smart Home Warning Systems
    Proceedings of the ACM Designing Interactive Systems Conference (DIS) New York, NY, USA. doi:10.1145/3563657.3596076
    [BibTeX] [Abstract] [Download PDF]

    About half a billion households are expected to use smart home systems by 2025. Although many IoT sensors, such as smoke detectors or security cameras, are available and governmental crisis warning systems are in place, little is known about how to warn appropriately in smart home environments. We created a Raspberry Pi based prototype with a speaker, a display, and a connected smart light bulb. Together with a focus group, we developed a taxonomy for warning messages in smart home environments, dividing them into five classes with different stimuli. We evaluated the taxonomy using the Experience Sampling Method (ESM) in a field study at participants‘ (N = 13) homes testing 331 warnings. The results show that taxonomy-based warning stimuli are perceived to be appropriate and participants could imagine using such a warning system. We propose a deeper integration of warning capabilities into smart home environments to enhance the safety of citizens.

    @inproceedings{haesler_getting_2023,
    address = {New York, NY, USA},
    series = {{DIS} '23},
    title = {Getting the {Residents}' {Attention}: {The} {Perception} of {Warning} {Channels} in {Smart} {Home} {Warning} {Systems}},
    isbn = {978-1-4503-9893-0},
    url = {https://peasec.de/paper/2023/2023_HaeslerWendelbornReuter_SmartHomeWarningSystems_DIS},
    doi = {10.1145/3563657.3596076},
    abstract = {About half a billion households are expected to use smart home systems by 2025. Although many IoT sensors, such as smoke detectors or security cameras, are available and governmental crisis warning systems are in place, little is known about how to warn appropriately in smart home environments. We created a Raspberry Pi based prototype with a speaker, a display, and a connected smart light bulb. Together with a focus group, we developed a taxonomy for warning messages in smart home environments, dividing them into five classes with different stimuli. We evaluated the taxonomy using the Experience Sampling Method (ESM) in a field study at participants' (N = 13) homes testing 331 warnings. The results show that taxonomy-based warning stimuli are perceived to be appropriate and participants could imagine using such a warning system. We propose a deeper integration of warning capabilities into smart home environments to enhance the safety of citizens.},
    booktitle = {Proceedings of the {ACM} {Designing} {Interactive} {Systems} {Conference} ({DIS})},
    publisher = {Association for Computing Machinery},
    author = {Haesler, Steffen and Wendelborn, Marc and Reuter, Christian},
    year = {2023},
    note = {event-place: Pittsburgh, PA, USA},
    keywords = {Student, Crisis, HCI, Projekt-emergenCITY, Projekt-ATHENE-SecUrban, A-Paper, Ranking-CORE-A},
    pages = {1114--1127},
    }

  • Jasmin Haunschild, Selina Pauli, Christian Reuter (2023)
    Preparedness Nudging for Warning Apps? A Mixed-Method Study Investigating Popularity and Effects of Preparedness Alerts in Warning Apps
    International Journal on Human-Computer Studies (IJHCS) ;172:102995. doi:https://doi.org/10.1016/j.ijhcs.2023.102995
    [BibTeX] [Abstract] [Download PDF]

    Warning apps are used by many to receive warnings about imminent disasters. However, their potential for increasing awareness about general hazards and for increasing preparedness is currently underused. With a mixed-method design that includes a representative survey of the German population, a design workshop and an app evaluation experiment, this study investigates users’ preferences regarding non-acute preparedness alerts’ inclusion in crisis apps and the effectiveness of Nudging in this context. The experiment shows that while the social influence nudge had no significant effect compared to the control group without a nudging condition, the confrontational nudge increased the number of taken recommended preparedness measures. The evaluation indicates that the preparedness alerts increased users’ knowledge and their motivation to use a warning app. This motivation is, in contrast, decreased when the messages are perceived as a disruption. While many oppose push notifications, favor finding persuasively designed preparedness advice in a separate menu or as an optional notification.

    @article{haunschild_preparedness_2023,
    title = {Preparedness {Nudging} for {Warning} {Apps}? {A} {Mixed}-{Method} {Study} {Investigating} {Popularity} and {Effects} of {Preparedness} {Alerts} in {Warning} {Apps}},
    volume = {172},
    issn = {1071-5819},
    url = {https://peasec.de/paper/2023/2023_HaunschildPauliReuter_NudgingWarningApps_IJHCS.pdf},
    doi = {https://doi.org/10.1016/j.ijhcs.2023.102995},
    abstract = {Warning apps are used by many to receive warnings about imminent disasters. However, their potential for increasing awareness about general hazards and for increasing preparedness is currently underused. With a mixed-method design that includes a representative survey of the German population, a design workshop and an app evaluation experiment, this study investigates users’ preferences regarding non-acute preparedness alerts’ inclusion in crisis apps and the effectiveness of Nudging in this context. The experiment shows that while the social influence nudge had no significant effect compared to the control group without a nudging condition, the confrontational nudge increased the number of taken recommended preparedness measures. The evaluation indicates that the preparedness alerts increased users’ knowledge and their motivation to use a warning app. This motivation is, in contrast, decreased when the messages are perceived as a disruption. While many oppose push notifications, favor finding persuasively designed preparedness advice in a separate menu or as an optional notification.},
    journal = {International Journal on Human-Computer Studies (IJHCS)},
    author = {Haunschild, Jasmin and Pauli, Selina and Reuter, Christian},
    year = {2023},
    keywords = {Student, Crisis, Projekt-emergenCITY, Projekt-ATHENE-SecUrban, A-Paper, Selected, AuswahlCrisis, Ranking-ImpactFactor},
    pages = {102995},
    }

  • Markus Bayer, Tobias Frey, Christian Reuter (2023)
    Multi-Level Fine-Tuning, Data Augmentation, and Few-Shot Learning for Specialized Cyber Threat Intelligence
    Computers & Security . doi:10.1016/j.cose.2023.103430
    [BibTeX] [Abstract] [Download PDF]

    A Design Science Artefact for Cyber Threat Detection and Actor Specific Communication

    @article{bayer_multi-level_2023,
    title = {Multi-{Level} {Fine}-{Tuning}, {Data} {Augmentation}, and {Few}-{Shot} {Learning} for {Specialized} {Cyber} {Threat} {Intelligence}},
    issn = {0167-4048},
    url = {https://peasec.de/paper/2023/2023_BayerFreyReuter_MultiLevelFineTuningForCyberThreatIntelligence_CS.pdf},
    doi = {10.1016/j.cose.2023.103430},
    abstract = {A Design Science Artefact for Cyber Threat Detection and Actor Specific Communication},
    journal = {Computers \& Security},
    author = {Bayer, Markus and Frey, Tobias and Reuter, Christian},
    year = {2023},
    keywords = {Student, Security, Projekt-CYWARN, Projekt-CROSSING, A-Paper, Projekt-ATHENE, Ranking-ImpactFactor},
    }

  • Elise Özalp, Katrin Hartwig, Christian Reuter (2023)
    Trends in Explainable Artificial Intelligence for Non-Experts
    In: Peter Klimczak, Christer Petersen: AI – Limits and Prospects of Artificial Intelligence. Bielefeld: Transcript Verlag, , 223–243.
    [BibTeX] [Abstract] [Download PDF]

    In this paper we provide an overview of XAI by introducing fundamental terminology and the goals of XAI, as well as recent research findings. Whilst doing this, we pay special attention to strategies for non-expert stakeholders. This leads us to our first research question: “What are the trends in explainable AI strategies for non-experts?”. In order to illustrate the current state of these trends, we further want to study an exemplary and very relevant application domain. According to Abdul et al. (2018), one of the first domains where researchers pursued XAI is the medical domain. This leads to our second research question: “What are the approaches of XAI in the medical domain for non-expert stakeholders?” These research questions will provide an overview of current topics in XAI and show possible research extensions for specific domains.

    @incollection{ozalp_trends_2023,
    address = {Bielefeld},
    title = {Trends in {Explainable} {Artificial} {Intelligence} for {Non}-{Experts}},
    url = {https://www.transcript-verlag.de/978-3-8376-5732-6/ai-limits-and-prospects-of-artificial-intelligence/?c=313000019},
    abstract = {In this paper we provide an overview of XAI by introducing fundamental terminology and the goals of XAI, as well as recent research findings. Whilst doing this, we pay special attention to strategies for non-expert stakeholders. This leads us to our first research question: “What are the trends in explainable AI strategies for non-experts?”. In order to illustrate the current state of these trends, we further want to study an exemplary and very relevant application domain. According to Abdul et al. (2018), one of the first domains where researchers pursued XAI is the medical domain. This leads to our second research question: “What are the approaches of XAI in the medical domain for non-expert stakeholders?” These research questions will provide an overview of current topics in XAI and show possible research extensions for specific domains.},
    booktitle = {{AI} - {Limits} and {Prospects} of {Artificial} {Intelligence}},
    publisher = {Transcript Verlag},
    author = {Özalp, Elise and Hartwig, Katrin and Reuter, Christian},
    editor = {Klimczak, Peter and Petersen, Christer},
    year = {2023},
    keywords = {Student, UsableSec, HCI, Projekt-CYWARN, Projekt-ATHENE-SecUrban, Projekt-CROSSING},
    pages = {223--243},
    }

  • Franz Kuntke, Merve Bektas, Laura Buhleier, Ella Pohl, Rebekka Schiller, Christian Reuter (2023)
    How Would Emergency Communication Based on LoRaWAN Perform? Empirical Findings of Signal Propagation in Rural Areas
    Proceedings of Information Systems for Crisis Response and Management (ISCRAM) .
    [BibTeX] [Abstract] [Download PDF]

    Low Power Wide Area Network (LPWAN) technologies are typically promoted for Internet-of-Things (IoT) applications, but are also of interest for emergency communications systems when regular fixed and mobile networks break down. Although LoRaWAN is a frequently used representative here, there are sometimes large differences between the proposed range and the results of some practical evaluations. Since previous work has focused on urban environments or has conducted simulations, this work aims to gather concrete knowledge on the transmission characteristics in rural environments. Extensive field studies with varying geographic conditions and comparative tests in urban environments were performed using two different hardware implementations. Overall, it was found that the collected values in rural areas are significantly lower than the theoretical values. Nevertheless, the results certify that LoRaWAN technology has a high range that cannot be achieved with other common technologies for emergency communications.

    @inproceedings{kuntke_how_2023,
    title = {How {Would} {Emergency} {Communication} {Based} on {LoRaWAN} {Perform}? {Empirical} {Findings} of {Signal} {Propagation} in {Rural} {Areas}},
    url = {https://idl.iscram.org/files/kuntke/2023/2586_Kuntke_etal2023.pdf},
    abstract = {Low Power Wide Area Network (LPWAN) technologies are typically promoted for Internet-of-Things (IoT) applications, but are also of interest for emergency communications systems when regular fixed and mobile networks break down. Although LoRaWAN is a frequently used representative here, there are sometimes large differences between the proposed range and the results of some practical evaluations. Since previous work has focused on urban environments or has conducted simulations, this work aims to gather concrete knowledge on the transmission characteristics in rural environments. Extensive field studies with varying geographic conditions and comparative tests in urban environments were performed using two different hardware implementations. Overall, it was found that the collected values in rural areas are significantly lower than the theoretical values. Nevertheless, the results certify that LoRaWAN technology has a high range that cannot be achieved with other common technologies for emergency communications.},
    booktitle = {Proceedings of {Information} {Systems} for {Crisis} {Response} and {Management} ({ISCRAM})},
    author = {Kuntke, Franz and Bektas, Merve and Buhleier, Laura and Pohl, Ella and Schiller, Rebekka and Reuter, Christian},
    year = {2023},
    keywords = {Student, Projekt-AgriRegio, Projekt-GeoBox, RSF, Crisis},
    pages = {1--8},
    }

  • Thomas Reinhold, Philipp Kuehn, Daniel Günther, Thomas Schneider, Christian Reuter (2023)
    ExTRUST: Reducing Exploit Stockpiles With a Privacy-Preserving Depletion Systems for Inter-State Relationships
    IEEE Transactions on Technology and Society ;4(2):158–170. doi:10.1109/TTS.2023.3280356
    [BibTeX] [Abstract] [Download PDF]

    Cyberspace is a fragile construct threatened by malicious cyber operations of different actors, with vulnerabilities in IT hardware and software forming the basis for such activities, thus also posing a threat to global IT security. Advancements in the field of artificial intelligence accelerate this development, either with artificial intelligence enabled cyber weapons, automated cyber defense measures, or artificial intelligence-based threat and vulnerability detection. Especially state actors, with their long-term strategic security interests, often stockpile such knowledge of vulnerabilities and exploits to enable their military or intelligence service cyberspace operations. While treaties and regulations to limit these developments and to enhance global IT security by disclosing vulnerabilities are currently being discussed on the international level, these efforts are hindered by state concerns about the disclosure of unique knowledge and about giving up tactical advantages. This leads to a situation where multiple states are likely to stockpile at least some identical exploits, with technical measures to enable a depletion process for these stockpiles that preserve state secrecy interests and consider the special constraints of interacting states as well as the requirements within such environments being non-existent. This paper proposes such a privacy-preserving approach that allows multiple state parties to privately compare their stock of vulnerabilities and exploits to check for items that occur in multiple stockpiles without revealing them so that their disclosure can be considered. We call our system ExTRUST and show that it is scalable and can withstand several attack scenarios. Beyond the intergovernmental setting, ExTRUST can also be used for other zero-trust use cases, such as bug-bounty programs.

    @article{reinhold_extrust_2023,
    title = {{ExTRUST}: {Reducing} {Exploit} {Stockpiles} {With} a {Privacy}-{Preserving} {Depletion} {Systems} for {Inter}-{State} {Relationships}},
    volume = {4},
    url = {https://peasec.de/paper/2023/2023_ReinholdKuehnGuentherSchneiderReuter_ExTrust-ehem-BlockED_TTaS.pdf},
    doi = {10.1109/TTS.2023.3280356},
    abstract = {Cyberspace is a fragile construct threatened by malicious cyber operations of different actors, with vulnerabilities in IT hardware and software forming the basis for such activities, thus also posing a threat to global IT security. Advancements in the field of artificial intelligence accelerate this development, either with artificial intelligence enabled cyber weapons, automated cyber defense measures, or artificial intelligence-based threat and vulnerability detection. Especially state actors, with their long-term strategic security interests, often stockpile such knowledge of vulnerabilities and exploits to enable their military or intelligence service cyberspace operations. While treaties and regulations to limit these developments and to enhance global IT security by disclosing vulnerabilities are currently being discussed on the international level, these efforts are hindered by state concerns about the disclosure of unique knowledge and about giving up tactical advantages. This leads to a situation where multiple states are likely to stockpile at least some identical exploits, with technical measures to enable a depletion process for these stockpiles that preserve state secrecy interests and consider the special constraints of interacting states as well as the requirements within such environments being non-existent. This paper proposes such a privacy-preserving approach that allows multiple state parties to privately compare their stock of vulnerabilities and exploits to check for items that occur in multiple stockpiles without revealing them so that their disclosure can be considered. We call our system ExTRUST and show that it is scalable and can withstand several attack scenarios. Beyond the intergovernmental setting, ExTRUST can also be used for other zero-trust use cases, such as bug-bounty programs.},
    number = {2},
    journal = {IEEE Transactions on Technology and Society},
    author = {Reinhold, Thomas and Kuehn, Philipp and Günther, Daniel and Schneider, Thomas and Reuter, Christian},
    year = {2023},
    keywords = {Peace, Student, Projekt-ATHENE-SecUrban, Projekt-CROSSING, A-Paper, Selected, Cyberwar, AuswahlPeace, Projekt-GRKPrivacy},
    pages = {158--170},
    }

  • Thea Riebe, Julian Bäumler, Marc-André Kaufhold, Christian Reuter (2023)
    Values and Value Conflicts in the Context of OSINT Technologies for Cybersecurity Incident Response: A Value Sensitive Design Perspective
    Computer Supported Cooperative Work: The Journal of Collaborative Computing (JCSCW) . doi:10.1007/s10606-022-09453-4
    [BibTeX] [Abstract] [Download PDF]

    The negotiation of stakeholder values as a collaborative process throughout technology development has been studied extensively within the fields of Computer Supported Cooperative Work and Human-Computer Interaction. Despite their increasing significance for cybersecurity incident response, there is a gap in research on values of importance to the design of open-source intelligence (OSINT) technologies for this purpose. In this paper, we investigate which values and value conflicts emerge due to the application and development of machine learning (ML) based OSINT technologies to assist cyber security incident response operators. For this purpose, we employ a triangulation of methods, consisting of a systematic survey of the technical literature on the development of OSINT artefacts for cybersecurity (N = 73) and an empirical value sensitive design case study, comprising semi-structured interviews with stakeholders (N = 9) as well as a focus group (N = 7) with developers. Based on our results, we identify implications relevant to the research on and design of OSINT artefacts for cybersecurity incident response.

    @article{riebe_values_2023,
    title = {Values and {Value} {Conflicts} in the {Context} of {OSINT} {Technologies} for {Cybersecurity} {Incident} {Response}: {A} {Value} {Sensitive} {Design} {Perspective}},
    url = {https://link.springer.com/article/10.1007/s10606-022-09453-4},
    doi = {10.1007/s10606-022-09453-4},
    abstract = {The negotiation of stakeholder values as a collaborative process throughout technology development has been studied extensively within the fields of Computer Supported Cooperative Work and Human-Computer Interaction. Despite their increasing significance for cybersecurity incident response, there is a gap in research on values of importance to the design of open-source intelligence (OSINT) technologies for this purpose. In this paper, we investigate which values and value conflicts emerge due to the application and development of machine learning (ML) based OSINT technologies to assist cyber security incident response operators. For this purpose, we employ a triangulation of methods, consisting of a systematic survey of the technical literature on the development of OSINT artefacts for cybersecurity (N = 73) and an empirical value sensitive design case study, comprising semi-structured interviews with stakeholders (N = 9) as well as a focus group (N = 7) with developers. Based on our results, we identify implications relevant to the research on and design of OSINT artefacts for cybersecurity incident response.},
    journal = {Computer Supported Cooperative Work: The Journal of Collaborative Computing (JCSCW)},
    author = {Riebe, Thea and Bäumler, Julian and Kaufhold, Marc-André and Reuter, Christian},
    year = {2023},
    keywords = {Student, Security, UsableSec, HCI, Projekt-CYWARN, Projekt-ATHENE-SecUrban, Projekt-CROSSING, A-Paper, Ranking-ImpactFactor, Ranking-CORE-B},
    }

  • Christian Reuter, Marc-André Kaufhold, Tom Biselli, Helene Pleil (2023)
    Increasing Adoption Despite Perceived Limitations of Social Media in Emergencies: Representative Insights on German Citizens’ Perception and Trends from 2017 to 2021
    International Journal of Disaster Risk Reduction (IJDRR) ;96. doi:https://doi.org/10.1016/j.ijdrr.2023.103880
    [BibTeX] [Abstract] [Download PDF]

    The value of social media in crises, disasters, and emergencies across different events, participants, and states is now well-examined in crisis informatics research. Previous research has contributed to the state of the art with empirical insights on the use of social media, approaches for the gathering and processing of big social data, the design and evaluation of information systems, and the analysis of cumulative and longitudinal data. While some studies examined social media use representatively for their target audience, these usually only comprise a single point of inquiry and do not allow for a trend analysis. This work provides results (1) of a representative survey with German citizens from 2021 on use patterns, perceptions, and expectations regarding social media during emergencies. Furthermore, it (2) compares these results to previous surveys and provides insights on temporal changes and trends from 2017, over 2019 to 2021. Our findings highlight that social media use in emergencies increased in 2021 and 2019 compared to 2017. Between 2019 and 2021, the amount of information shared on social media remained on a similar level, while the perceived disadvantages of social media in emergencies significantly increased. In light of demographic variables, the results of the 2021 survey confirm previous findings, according to which older individuals (45+ years) use social media in emergencies less often than younger individuals (18-24 years). Furthermore, while the quicker availability of information was one of the reasons for social media use, especially the potential information overload was a key factor for not using social media in emergencies. The results are discussed in light of the dynamic nature of attitudes regarding social media in emergencies and the need to account for heterogeneity in user expectations to build trustworthy information ecosystems in social media.

    @article{reuter_increasing_2023,
    title = {Increasing {Adoption} {Despite} {Perceived} {Limitations} of {Social} {Media} in {Emergencies}: {Representative} {Insights} on {German} {Citizens}’ {Perception} and {Trends} from 2017 to 2021},
    volume = {96},
    issn = {2212-4209},
    url = {https://peasec.de/paper/2023/2023_ReuterKaufholdBiselliPleil_SocialMediaEmergenciesSurvey_IJDRR.pdf},
    doi = {https://doi.org/10.1016/j.ijdrr.2023.103880},
    abstract = {The value of social media in crises, disasters, and emergencies across different events, participants, and states is now well-examined in crisis informatics research. Previous research has contributed to the state of the art with empirical insights on the use of social media, approaches for the gathering and processing of big social data, the design and evaluation of information systems, and the analysis of cumulative and longitudinal data. While some studies examined social media use representatively for their target audience, these usually only comprise a single point of inquiry and do not allow for a trend analysis. This work provides results (1) of a representative survey with German citizens from 2021 on use patterns, perceptions, and expectations regarding social media during emergencies. Furthermore, it (2) compares these results to previous surveys and provides insights on temporal changes and trends from 2017, over 2019 to 2021. Our findings highlight that social media use in emergencies increased in 2021 and 2019 compared to 2017. Between 2019 and 2021, the amount of information shared on social media remained on a similar level, while the perceived disadvantages of social media in emergencies significantly increased. In light of demographic variables, the results of the 2021 survey confirm previous findings, according to which older individuals (45+ years) use social media in emergencies less often than younger individuals (18-24 years). Furthermore, while the quicker availability of information was one of the reasons for social media use, especially the potential information overload was a key factor for not using social media in emergencies. The results are discussed in light of the dynamic nature of attitudes regarding social media in emergencies and the need to account for heterogeneity in user expectations to build trustworthy information ecosystems in social media.},
    journal = {International Journal of Disaster Risk Reduction (IJDRR)},
    author = {Reuter, Christian and Kaufhold, Marc-André and Biselli, Tom and Pleil, Helene},
    year = {2023},
    keywords = {Student, Crisis, Projekt-emergenCITY, Projekt-CYLENCE, A-Paper, AuswahlCrisis, Projekt-NEBULA, Ranking-ImpactFactor, SocialMedia},
    }

  • Stefka Schmid, Laura Guntrum, Steffen Haesler, Lisa Schultheiß, Christian Reuter (2023)
    Digital Volunteers During the COVID-19 Pandemic: Care Work on Social Media for Socio-technical Resilience
    Weizenbaum Journal of the Digital Society ;3(1). doi:10.34669/WI.WJDS/3.3.6
    [BibTeX] [Abstract] [Download PDF]

    Like past crises, the COVID-19 pandemic has also activated individual volunteers to help to respond to the crisis. This includes digital volunteers, who have organized physical aid and conducted activities on social media. Analyzing German volunteering support groups on Facebook and related Reddit threads in the context of the COVID-19 pandemic, we {\textbackslash}updatedshow what type of help is offered and how social media users interact with each other, trying to cope with the situation. We reveal that most users offering help online conduct mostly typical care work, such as buying groceries or giving advice. Crucially, volunteering is characterized by relationships of care and thus builds on affirmative interactions. Albeit some misdirected offers and regressive interruptions, people use the possibility to make their voices heard and, showing empathy, help each other to cope with crisis. Social media like Facebook mediate societal structures, including relationships of care, offering a space for continuous, cumulatively resilient conduct of care work. Reflecting on the traditional division of labor in crisis volunteering and counter-productive dynamics of care and empathy, we aim for feminist ethics of care which allows for interactions on social media that foster generative computer-supported collaboration.

    @article{schmid_digital_2023,
    title = {Digital {Volunteers} {During} the {COVID}-19 {Pandemic}: {Care} {Work} on {Social} {Media} for {Socio}-technical {Resilience}},
    volume = {3},
    issn = {2748-5625},
    url = {https://ojs.weizenbaum-institut.de/index.php/wjds/article/view/78},
    doi = {10.34669/WI.WJDS/3.3.6},
    abstract = {Like past crises, the COVID-19 pandemic has also activated individual volunteers to help to respond to the crisis. This includes digital volunteers, who have organized physical aid and conducted activities on social media. Analyzing German volunteering support groups on Facebook and related Reddit threads in the context of the COVID-19 pandemic, we {\textbackslash}updatedshow what type of help is offered and how social media users interact with each other, trying to cope with the situation. We reveal that most users offering help online conduct mostly typical care work, such as buying groceries or giving advice. Crucially, volunteering is characterized by relationships of care and thus builds on affirmative interactions. Albeit some misdirected offers and regressive interruptions, people use the possibility to make their voices heard and, showing empathy, help each other to cope with crisis. Social media like Facebook mediate societal structures, including relationships of care, offering a space for continuous, cumulatively resilient conduct of care work. Reflecting on the traditional division of labor in crisis volunteering and counter-productive dynamics of care and empathy, we aim for feminist ethics of care which allows for interactions on social media that foster generative computer-supported collaboration.},
    number = {1},
    journal = {Weizenbaum Journal of the Digital Society},
    author = {Schmid, Stefka and Guntrum, Laura and Haesler, Steffen and Schultheiß, Lisa and Reuter, Christian},
    month = may,
    year = {2023},
    keywords = {Peace, Projekt-TraCe, Student, Crisis, HCI, Projekt-emergenCITY, Projekt-ATHENE-SecUrban, SocialMedia},
    }

  • Philipp Kuehn, Mike Schmidt, Markus Bayer, Christian Reuter (2023)
    ThreatCrawl: A BERT-based Focused Crawler for the Cybersecurity Domain
    2023.
    [BibTeX] [Abstract] [Download PDF]

    Publicly available information contains valuable information for Cyber Threat Intelligence (CTI). This can be used to prevent attacks that have already taken place on other systems. Ideally, only the initial attack succeeds and all subsequent ones are detected and stopped. But while there are different standards to exchange this information, a lot of it is shared in articles or blog posts in non-standardized ways. Manually scanning through multiple online portals and news pages to discover new threats and extracting them is a time-consuming task. To automize parts of this scanning process, multiple papers propose extractors that use Natural Language Processing (NLP) to extract Indicators of Compromise (IOCs) from documents. However, while this already solves the problem of extracting the information out of documents, the search for these documents is rarely considered. In this paper, a new focused crawler is proposed called ThreatCrawl, which uses Bidirectional Encoder Representations from Transformers (BERT)-based models to classify documents and adapt its crawling path dynamically. While ThreatCrawl has difficulties to classify the specific type of Open Source Intelligence (OSINT) named in texts, e.g., IOC content, it can successfully find relevant documents and modify its path accordingly. It yields harvest rates of up to 52\%, which are, to the best of our knowledge, better than the current state of the art.

    @techreport{kuehn_threatcrawl_2023,
    title = {{ThreatCrawl}: {A} {BERT}-based {Focused} {Crawler} for the {Cybersecurity} {Domain}},
    shorttitle = {{ThreatCrawl}},
    url = {http://arxiv.org/abs/2304.11960},
    abstract = {Publicly available information contains valuable information for Cyber Threat Intelligence (CTI). This can be used to prevent attacks that have already taken place on other systems. Ideally, only the initial attack succeeds and all subsequent ones are detected and stopped. But while there are different standards to exchange this information, a lot of it is shared in articles or blog posts in non-standardized ways. Manually scanning through multiple online portals and news pages to discover new threats and extracting them is a time-consuming task. To automize parts of this scanning process, multiple papers propose extractors that use Natural Language Processing (NLP) to extract Indicators of Compromise (IOCs) from documents. However, while this already solves the problem of extracting the information out of documents, the search for these documents is rarely considered. In this paper, a new focused crawler is proposed called ThreatCrawl, which uses Bidirectional Encoder Representations from Transformers (BERT)-based models to classify documents and adapt its crawling path dynamically. While ThreatCrawl has difficulties to classify the specific type of Open Source Intelligence (OSINT) named in texts, e.g., IOC content, it can successfully find relevant documents and modify its path accordingly. It yields harvest rates of up to 52\%, which are, to the best of our knowledge, better than the current state of the art.},
    number = {arXiv:2304.11960},
    urldate = {2023-04-27},
    institution = {arXiv},
    author = {Kuehn, Philipp and Schmidt, Mike and Bayer, Markus and Reuter, Christian},
    month = apr,
    year = {2023},
    note = {arXiv:2304.11960 [cs]},
    keywords = {Student, Security, Projekt-CYWARN, Projekt-ATHENE-SecUrban},
    }

  • Philipp Kuehn, David N. Relke, Christian Reuter (2023)
    Common vulnerability scoring system prediction based on open source intelligence information sources
    Computers & Security . doi:10.1016/j.cose.2023.103286
    [BibTeX] [Abstract] [Download PDF]

    The number of newly published vulnerabilities is constantly increasing. Until now, the information available when a new vulnerability is published is manually assessed by experts using a ()cvss vector and score. This assessment is time consuming and requires expertise. Various works already try to predict vectors or scores using machine learning based on the textual descriptions of the vulnerability to enable faster assessment. However, for this purpose, previous works only use the texts available in databases such as nvd. With this work, the publicly available web pages referenced in the nvd are analyzed and made available as sources of texts through web scraping. A dl based method for predicting the vector is implemented and evaluated. The present work provides a classification of the nvd’s reference texts based on the suitability and crawlability of their texts. While we identified the overall influence of the additional texts is negligible, we outperformed the state-of-the-art with our dl prediction models.

    @article{kuehn_common_2023,
    title = {Common vulnerability scoring system prediction based on open source intelligence information sources},
    url = {https://peasec.de/paper/2023/2023_KuehnRelkeReuter_CommonVulnerabilityScoringSystemOSINT_CompSec.pdf},
    doi = {10.1016/j.cose.2023.103286},
    abstract = {The number of newly published vulnerabilities is constantly increasing. Until now, the information available when a new vulnerability is published is manually assessed by experts using a ()cvss vector and score. This assessment is time consuming and requires expertise. Various works already try to predict vectors or scores using machine learning based on the textual descriptions of the vulnerability to enable faster assessment. However, for this purpose, previous works only use the texts available in databases such as nvd. With this work, the publicly available web pages referenced in the nvd are analyzed and made available as sources of texts through web scraping. A dl based method for predicting the vector is implemented and evaluated. The present work provides a classification of the nvd’s reference texts based on the suitability and crawlability of their texts. While we identified the overall influence of the additional texts is negligible, we outperformed the state-of-the-art with our dl prediction models.},
    journal = {Computers \& Security},
    author = {Kuehn, Philipp and Relke, David N. and Reuter, Christian},
    year = {2023},
    keywords = {Student, Security, UsableSec, Projekt-CYWARN, Projekt-ATHENE-SecUrban, Ranking-ImpactFactor, Ranking-CORE-B},
    }

    2022

  • Franz Kuntke, Vladimir Romanenko, Sebastian Linsner, Enno Steinbrink, Christian Reuter (2022)
    LoRaWAN Security Issues and Mitigation Options by the Example of Agricultural IoT Scenarios
    Transactions on Emerging Telecommunications Technologies (ETT) ;33(5):e4452. doi:10.1002/ett.4452
    [BibTeX] [Abstract] [Download PDF]

    The Internet of Things (IoT) is a major trend that is seen as a great opportunity to improve efficiency in many domains, including agriculture. This technology could transform the sector, improving the management and quality of agricultural operations, for example, crop farming. The most promising data transmission standard for this domain seems to be Long Range Wide Area Network (LoRaWAN), a popular representative of low power wide area network technologies today. LoRaWAN, like any wireless protocol, has properties that can be exploited by attackers, which has been a topic of multiple research papers in recent years. By conducting a systematic literature review, we build a recent list of attacks, as well as collect mitigation options. Taking a look at a concrete use case (IoT in agriculture) allows us to evaluate the practicality of both exploiting the vulnerabilities and implementing the countermeasures. We detected 16 attacks that we grouped into six attack types. Along with the attacks, we collect countermeasures for attack mitigation. Developers can use our findings to minimize the risks when developing applications based on LoRaWAN. These mostly theoretical security recommendations should encourage future works to evaluate the mitigations in practice.

    @article{kuntke_lorawan_2022,
    title = {{LoRaWAN} {Security} {Issues} and {Mitigation} {Options} by the {Example} of {Agricultural} {IoT} {Scenarios}},
    volume = {33},
    issn = {2161-3915},
    url = {https://www.peasec.de/paper/2022/2022_KuntkeRomanenkoLinsnerSteinbrinkReuter_LoRaWANsecurityAgriculture_ETT.pdf},
    doi = {10.1002/ett.4452},
    abstract = {The Internet of Things (IoT) is a major trend that is seen as a great opportunity to improve efficiency in many domains, including agriculture. This technology could transform the sector, improving the management and quality of agricultural operations, for example, crop farming. The most promising data transmission standard for this domain seems to be Long Range Wide Area Network (LoRaWAN), a popular representative of low power wide area network technologies today. LoRaWAN, like any wireless protocol, has properties that can be exploited by attackers, which has been a topic of multiple research papers in recent years. By conducting a systematic literature review, we build a recent list of attacks, as well as collect mitigation options. Taking a look at a concrete use case (IoT in agriculture) allows us to evaluate the practicality of both exploiting the vulnerabilities and implementing the countermeasures. We detected 16 attacks that we grouped into six attack types. Along with the attacks, we collect countermeasures for attack mitigation. Developers can use our findings to minimize the risks when developing applications based on LoRaWAN. These mostly theoretical security recommendations should encourage future works to evaluate the mitigations in practice.},
    number = {5},
    journal = {Transactions on Emerging Telecommunications Technologies (ETT)},
    author = {Kuntke, Franz and Romanenko, Vladimir and Linsner, Sebastian and Steinbrink, Enno and Reuter, Christian},
    month = may,
    year = {2022},
    keywords = {Student, Projekt-AgriRegio, Projekt-GeoBox, RSF, Security, A-Paper, Ranking-ImpactFactor, Projekt-HyServ, Projekt-GRKPrivacy},
    pages = {e4452},
    }

  • Markus Bayer, Marc-André Kaufhold, Björn Buchhold, Marcel Keller, Jörg Dallmeyer, Christian Reuter (2022)
    Data Augmentation in Natural Language Processing: A Novel Text Generation Approach for Long and Short Text Classifiers
    International Journal of Machine Learning and Cybernetics (IJMLC) . doi:10.1007/s13042-022-01553-3
    [BibTeX] [Abstract] [Download PDF]

    In many cases of machine learning, research suggests that the development of training data might have a higher relevance than the choice and modelling of classifiers themselves. Thus, data augmentation methods have been developed to improve classifiers by artificially created training data. In NLP, there is the challenge of establishing universal rules for text transformations which provide new linguistic patterns. In this paper, we present and evaluate a text generation method suitable to increase the performance of classifiers for long and short texts. We achieved promising improvements when evaluating short as well as long text tasks with the enhancement by our text generation method. Especially with regard to small data analytics, additive accuracy gains of up to 15.53\% and 3.56\% are achieved within a constructed low data regime, compared to the no augmentation baseline and another data augmentation technique. As the current track of these constructed regimes is not universally applicable, we also show major improvements in several real world low data tasks (up to +4.84 F1-score). Since we are evaluating the method from many perspectives (in total 11 datasets), we also observe situations where the method might not be suitable. We discuss implications and patterns for the successful application of our approach on different types of datasets.

    @article{bayer_data_2022,
    title = {Data {Augmentation} in {Natural} {Language} {Processing}: {A} {Novel} {Text} {Generation} {Approach} for {Long} and {Short} {Text} {Classifiers}},
    url = {https://link.springer.com/article/10.1007/s13042-022-01553-3},
    doi = {10.1007/s13042-022-01553-3},
    abstract = {In many cases of machine learning, research suggests that the development of training data might have a higher relevance than the choice and modelling of classifiers themselves. Thus, data augmentation methods have been developed to improve classifiers by artificially created training data. In NLP, there is the challenge of establishing universal rules for text transformations which provide new linguistic patterns. In this paper, we present and evaluate a text generation method suitable to increase the performance of classifiers for long and short texts. We achieved promising improvements when evaluating short as well as long text tasks with the enhancement by our text generation method. Especially with regard to small data analytics, additive accuracy gains of up to 15.53\% and 3.56\% are achieved within a constructed low data regime, compared to the no augmentation baseline and another data augmentation technique. As the current track of these constructed regimes is not universally applicable, we also show major improvements in several real world low data tasks (up to +4.84 F1-score). Since we are evaluating the method from many perspectives (in total 11 datasets), we also observe situations where the method might not be suitable. We discuss implications and patterns for the successful application of our approach on different types of datasets.},
    journal = {International Journal of Machine Learning and Cybernetics (IJMLC)},
    author = {Bayer, Markus and Kaufhold, Marc-André and Buchhold, Björn and Keller, Marcel and Dallmeyer, Jörg and Reuter, Christian},
    year = {2022},
    keywords = {Student, Security, Projekt-CYWARN, Projekt-emergenCITY, A-Paper, Ranking-ImpactFactor},
    }

  • Thea Riebe, Philipp Kuehn, Philipp Imperatori, Christian Reuter (2022)
    U.S. Security Policy: The Dual-Use Regulation of Cryptography and its Effects on Surveillance
    European Journal for Security Research (EJSR) . doi:10.1007/s41125-022-00080-0
    [BibTeX] [Abstract] [Download PDF]

    Cryptography has become ubiquitous in communication technology and is considered a necessary part of information security. However, both the regulation to restrict access to cryptography, as well as practices to weaken or break encryption, are part of the States’ security policies. The United States (U.S.) regulate cryptography for export in international trade as a dual-use good. However, the regulation has been increasingly loosened and transferred to bilateral agreements with Information and Communication Technology companies. At the same time, the National Security Agency attempted to implement a government encryption standard to guarantee itself easier access to data, thus progressively expanding surveillance on non-U.S. citizens. In this paper, using comparative policy analysis, we examine the evolution of both security policies by tracing the historical development of U.S. regulation of cryptography as a dual-use good, and surveillance technologies, and practices used from the 1990s to today. We conclude that the impact of the dual-use regulation has affected the efficiency of surveillance technology, by loosening regulations only for mass communication services, thereby supporting the proliferation of surveillance intermediaries, while working on strategies to collaborate and exploit their coverage.

    @article{riebe_us_2022,
    title = {U.{S}. {Security} {Policy}: {The} {Dual}-{Use} {Regulation} of {Cryptography} and its {Effects} on {Surveillance}},
    url = {https://link.springer.com/content/pdf/10.1007/s41125-022-00080-0.pdf},
    doi = {10.1007/s41125-022-00080-0},
    abstract = {Cryptography has become ubiquitous in communication technology and is considered a necessary part of information security. However, both the regulation to restrict access to cryptography, as well as practices to weaken or break encryption, are part of the States’ security policies. The United States (U.S.) regulate cryptography for export in international trade as a dual-use good. However, the regulation has been increasingly loosened and transferred to bilateral agreements with Information and Communication Technology companies. At the same time, the National Security Agency attempted to implement a government encryption standard to guarantee itself easier access to data, thus progressively expanding surveillance on non-U.S. citizens. In this paper, using comparative policy analysis, we examine the evolution of both security policies by tracing the historical development of U.S. regulation of cryptography as a dual-use good, and surveillance technologies, and practices used from the 1990s to today. We conclude that the impact of the dual-use regulation has affected the efficiency of surveillance technology, by loosening regulations only for mass communication services, thereby supporting the proliferation of surveillance intermediaries, while working on strategies to collaborate and exploit their coverage.},
    journal = {European Journal for Security Research (EJSR)},
    author = {Riebe, Thea and Kuehn, Philipp and Imperatori, Philipp and Reuter, Christian},
    year = {2022},
    keywords = {Student, Security, Projekt-CYWARN, Projekt-KontiKat},
    }

  • Laura Buhleier, Patrick Gantner, Tobias Frey, Michael Boers, Marc-André Kaufhold, Christian Reuter (2022)
    Effizienz und Nachhaltigkeit durch Green-IT: ein systematischer Literaturüberblick im Kontext der Klimakrise
    INFORMATIK 2022: 52. Jahrestagung der Gesellschaft für Informatik – Informatik für Gesellschaft (Workshop-Beiträge), Lecture Notes in Informatics (LNI) Hamburg, Germany. doi:10.18420/inf2022_83
    [BibTeX] [Abstract] [Download PDF]

    Die Klimakrise gehört zu den aktuell größten Herausforderungen unserer Zeit. Informations- und Kommunikationstechnologien (IKT) können hierbei eine entscheidende Rolle spielen. Einerseits, da eine Effizienzsteigerung von oder durch IKT zu einer klimafreundlicheren Nutzung beitragen kann, und andererseits, da IKT zu einem erhöhten Ressourcenverbrauch führen kann. Um diese Thematik weiter zu untersuchen, wird in dieser Arbeit eine systematische Literaturrecherche durchgeführt, um Herausforderungen und Potenziale in der Adressierung der Klimakrise durch eine effiziente und nachhaltige Entwicklung des IKT-Sektors zu analysieren. Die dabei untersuchte Literatur beinhaltet Herausforderungen wie zum Beispiel den hohen Energie- und Materialverbrauch der IKT-Geräte und Datenzentren sowie die entstehenden Entsorgungskosten und das Konsumverhalten der Nutzer*innen. Deswegen sollten die Nutzer*innen mehr Informationen zur Wartung, zum Kauf gebrauchter Geräte, und zum Recyceln/Entsorgen erhalten. Die Analyse lieferte aber auch viele Potenziale. Durch IKT können Effizienzsteigerungen in den Bereich Industrie, Landwirtschaft, Verkehr und Transport erreicht und auch umweltschädliche Geräte substituiert werden. Durch diese Potenziale kann es aber, wie in anderen Bereichen, zu einem Rebound-Effekt kommen.

    @inproceedings{buhleier_effizienz_2022,
    address = {Hamburg, Germany},
    title = {Effizienz und {Nachhaltigkeit} durch {Green}-{IT}: ein systematischer {Literaturüberblick} im {Kontext} der {Klimakrise}},
    isbn = {978-3-88579-720-3},
    url = {https://dl.gi.de/bitstream/handle/20.500.12116/39590/rsflab_06.pdf?sequence=1&isAllowed=y},
    doi = {10.18420/inf2022_83},
    abstract = {Die Klimakrise gehört zu den aktuell größten Herausforderungen unserer Zeit. Informations- und Kommunikationstechnologien (IKT) können hierbei eine entscheidende Rolle spielen. Einerseits, da eine Effizienzsteigerung von oder durch IKT zu einer klimafreundlicheren Nutzung beitragen kann, und andererseits, da IKT zu einem erhöhten Ressourcenverbrauch führen kann. Um diese Thematik weiter zu untersuchen, wird in dieser Arbeit eine systematische Literaturrecherche durchgeführt, um Herausforderungen und Potenziale in der Adressierung der Klimakrise durch eine effiziente und nachhaltige Entwicklung des IKT-Sektors zu analysieren. Die dabei untersuchte Literatur beinhaltet Herausforderungen wie zum Beispiel den hohen Energie- und Materialverbrauch der IKT-Geräte und Datenzentren sowie die entstehenden Entsorgungskosten und das Konsumverhalten der Nutzer*innen. Deswegen sollten die Nutzer*innen mehr Informationen zur Wartung, zum Kauf gebrauchter Geräte, und zum Recyceln/Entsorgen erhalten. Die Analyse lieferte aber auch viele Potenziale. Durch IKT können Effizienzsteigerungen in den Bereich Industrie, Landwirtschaft, Verkehr und Transport erreicht und auch umweltschädliche Geräte substituiert werden. Durch diese Potenziale kann es aber, wie in anderen Bereichen, zu einem Rebound-Effekt kommen.},
    language = {de},
    booktitle = {{INFORMATIK} 2022: 52. {Jahrestagung} der {Gesellschaft} für {Informatik} – {Informatik} für {Gesellschaft} ({Workshop}-{Beiträge}), {Lecture} {Notes} in {Informatics} ({LNI})},
    publisher = {Gesellschaft für Informatik e. V.},
    author = {Buhleier, Laura and Gantner, Patrick and Frey, Tobias and Boers, Michael and Kaufhold, Marc-André and Reuter, Christian},
    editor = {Demmler, D. and Krupka, D. and Federrath, H.},
    year = {2022},
    keywords = {Student, Projekt-AgriRegio, Projekt-GeoBox, Security, Ranking-CORE-C, Ranking-VHB-C},
    pages = {995--1012},
    }

  • Philipp Kuehn, Julian Bäumler, Marc-André Kaufhold, Marc Wendelborn, Christian Reuter (2022)
    The Notion of Relevance in Cybersecurity: A Categorization of Security Tools and Deduction of Relevance Notions
    Mensch und Computer 2022 – Workshopband Darmstadt. doi:10.18420/muc2022-mci-ws01-220
    [BibTeX] [Abstract] [Download PDF]

    Proper cybersecurity requires timely information to defend the IT infrastructure. In a dynamic field like cybersecurity, gathering up-to-date information is usually a manual, time-consuming, and exhaustive task. Automatic and usable approaches are supposed to be a solution to this problem, but for this, they require a notion of information relevance to distinguish relevant from irrelevant information. First, on the basis of a literature review, this paper proposes a novel cybersecurity tool categorization based on corresponding tool types with their respective definitions and core features. Second, it elaborates information used in each category and deduces notions of relevance. Third, it outlines how these findings informed the design of a security dashboard to guide computer emergency response team staff in identifying current threats in open source intelligence sources while mitigating information overload.

    @inproceedings{kuehn_notion_2022,
    address = {Darmstadt},
    series = {Mensch und {Computer} 2022 - {Workshopband}},
    title = {The {Notion} of {Relevance} in {Cybersecurity}: {A} {Categorization} of {Security} {Tools} and {Deduction} of {Relevance} {Notions}},
    url = {https://dl.gi.de/handle/20.500.12116/39072},
    doi = {10.18420/muc2022-mci-ws01-220},
    abstract = {Proper cybersecurity requires timely information to defend the IT infrastructure. In a dynamic field like cybersecurity, gathering up-to-date information is usually a manual, time-consuming, and exhaustive task. Automatic and usable approaches are supposed to be a solution to this problem, but for this, they require a notion of information relevance to distinguish relevant from irrelevant information. First, on the basis of a literature review, this paper proposes a novel cybersecurity tool categorization based on corresponding tool types with their respective definitions and core features. Second, it elaborates information used in each category and deduces notions of relevance. Third, it outlines how these findings informed the design of a security dashboard to guide computer emergency response team staff in identifying current threats in open source intelligence sources while mitigating information overload.},
    language = {en},
    booktitle = {Mensch und {Computer} 2022 - {Workshopband}},
    publisher = {Gesellschaft für Informatik},
    author = {Kuehn, Philipp and Bäumler, Julian and Kaufhold, Marc-André and Wendelborn, Marc and Reuter, Christian},
    year = {2022},
    keywords = {Student, Security, UsableSec, Projekt-CYWARN, Projekt-ATHENE-SecUrban},
    }

  • Marc-André Kaufhold, Julian Bäumler, Christian Reuter (2022)
    The Implementation of Protective Measures and Communication of Cybersecurity Alerts in Germany – A Representative Survey of the Population
    Mensch und Computer 2022 – Workshopband Darmstadt. doi:10.18420/muc2022-mci-ws01-228
    [BibTeX] [Abstract] [Download PDF]

    Despite the merits of digitization in private and professional spaces, critical infrastructures and societies are increasingly exposed to cyberattacks. We conducted a representative survey with German citizens (N=1,093) to examine how they assess the current and future cyber threat situation as well as possible protective measures in cyberspace. Furthermore, we asked what information and channels citizens need to be aware of cyber threats. Our findings indicate that large proportions of the German population feel inadequately informed about cyber threats and tend to only apply enforced security measures by programs (e.g., updates) and services (e.g., two-factor authentication). Furthermore, institutions such as state-level Computer Emergency Response Teams (CERTs) are relatively unknown among the population and respondents showed little confidence in German security authorities to cope with largescale attacks and ultimately protect citizens. Still, our participants prefer to receive cybersecurity information via installed security applications, television channels, or emergency warning apps.

    @inproceedings{kaufhold_implementation_2022,
    address = {Darmstadt},
    series = {Mensch und {Computer} 2022 - {Workshopband}},
    title = {The {Implementation} of {Protective} {Measures} and {Communication} of {Cybersecurity} {Alerts} in {Germany} - {A} {Representative} {Survey} of the {Population}},
    url = {https://dl.gi.de/handle/20.500.12116/39061},
    doi = {10.18420/muc2022-mci-ws01-228},
    abstract = {Despite the merits of digitization in private and professional spaces, critical infrastructures and societies are increasingly exposed to cyberattacks. We conducted a representative survey with German citizens (N=1,093) to examine how they assess the current and future cyber threat situation as well as possible protective measures in cyberspace. Furthermore, we asked what information and channels citizens need to be aware of cyber threats. Our findings indicate that large proportions of the German population feel inadequately informed about cyber threats and tend to only apply enforced security measures by programs (e.g., updates) and services (e.g., two-factor authentication). Furthermore, institutions such as state-level Computer Emergency Response Teams (CERTs) are relatively unknown among the population and respondents showed little confidence in German security authorities to cope with largescale attacks and ultimately protect citizens. Still, our participants prefer to receive cybersecurity information via installed security applications, television channels, or emergency warning apps.},
    language = {en},
    booktitle = {Mensch und {Computer} 2022 - {Workshopband}},
    publisher = {Gesellschaft für Informatik},
    author = {Kaufhold, Marc-André and Bäumler, Julian and Reuter, Christian},
    year = {2022},
    keywords = {Student, Security, UsableSec, HCI, Projekt-CYWARN, Projekt-ATHENE-SecUrban},
    }

  • Laura Buhleier, Sebastian Linsner, Enno Steinbrink, Christian Reuter (2022)
    Eine Klassifikation sicherheitskritischer UX-Design-Patterns
    Mensch und Computer 2022 – Workshopband Darmstadt. doi:10.18420/muc2022-mci-ws10-275
    [BibTeX] [Abstract] [Download PDF]

    User Experience ist von zunehmender Relevanz für die Entwicklung digitaler Designentscheidungen und hat somit weitgehende Auswirkungen auf das Nutzerverhalten. Dass dies besonders für die Sicherheit und Vertraulichkeit nicht nur von Vorteil sein kann, sondern Nutzer*innen negativ beeinflussen kann, wird in dieser Arbeit ersichtlich. Betrachtetwerden dafür die Themengebiete Anti-Patterns, Grey Patterns und Dark-Patterns. Anti-Patterns bezeichnen wiederkehrende Lösungen für ein Konzept eines User Interfaces, die trotz guter Intention ungewünschte Nebeneffekte oder Konsequenzen haben. Dark-Patterns dagegen stellen Designentscheidungen dar, die durch Täuschung oder Ausnutzung psychischen Drucks versuchen Nutzer*innen zu Handlungen zu verleiten, von denen die Ersteller*innen des Dark-Patterns mehr profitieren als die Anwender* innen. Der Begriff Grey Patterns wird in dieser Arbeit für alle Design Patterns genutzt, die sich nicht direkt zuordnen lassen. Da es bisher kaum vergleichendeWerke und keinen Konsens zu diesen Themengebieten gibt, ist das Ziel dieser Arbeit ein grundlegendes Modell aufzustellen. Dabei wird durch die Untersuchung bestehender Literatur eine zusammenfassende Taxonomie und ein Vorgehen zur Unterscheidung von Anti-Patterns und Dark-Patterns erarbeitet, die als Grundlage für weitere Arbeiten und zur Entwicklung von Gegenmaßnahmen genutzt werden können.

    @inproceedings{buhleier_klassifikation_2022,
    address = {Darmstadt},
    series = {Mensch und {Computer} 2022 - {Workshopband}},
    title = {Eine {Klassifikation} sicherheitskritischer {UX}-{Design}-{Patterns}},
    url = {https://dl.gi.de/handle/20.500.12116/39087},
    doi = {10.18420/muc2022-mci-ws10-275},
    abstract = {User Experience ist von zunehmender Relevanz für die Entwicklung digitaler Designentscheidungen und hat somit weitgehende Auswirkungen auf das Nutzerverhalten. Dass dies besonders für die Sicherheit und Vertraulichkeit nicht nur von Vorteil sein kann, sondern Nutzer*innen negativ beeinflussen kann, wird in dieser Arbeit ersichtlich. Betrachtetwerden dafür die Themengebiete Anti-Patterns, Grey Patterns und Dark-Patterns. Anti-Patterns bezeichnen wiederkehrende Lösungen für ein Konzept eines User Interfaces, die trotz guter Intention ungewünschte Nebeneffekte oder Konsequenzen haben. Dark-Patterns dagegen stellen Designentscheidungen dar, die durch Täuschung oder Ausnutzung psychischen Drucks versuchen Nutzer*innen zu Handlungen zu verleiten, von denen die Ersteller*innen des Dark-Patterns mehr profitieren als die Anwender* innen. Der Begriff Grey Patterns wird in dieser Arbeit für alle Design Patterns genutzt, die sich nicht direkt zuordnen lassen. Da es bisher kaum vergleichendeWerke und keinen Konsens zu diesen Themengebieten gibt, ist das Ziel dieser Arbeit ein grundlegendes Modell aufzustellen. Dabei wird durch die Untersuchung bestehender Literatur eine zusammenfassende Taxonomie und ein Vorgehen zur Unterscheidung von Anti-Patterns und Dark-Patterns erarbeitet, die als Grundlage für weitere Arbeiten und zur Entwicklung von Gegenmaßnahmen genutzt werden können.},
    language = {de},
    booktitle = {Mensch und {Computer} 2022 - {Workshopband}},
    publisher = {Gesellschaft für Informatik},
    author = {Buhleier, Laura and Linsner, Sebastian and Steinbrink, Enno and Reuter, Christian},
    year = {2022},
    keywords = {Student, Security, UsableSec, HCI, Projekt-CROSSING, Projekt-GRKPrivacy},
    }

  • Denis Orlov, Simon Möller, Sven Düfler, Steffen Haesler, Christian Reuter (2022)
    Detecting a Crisis: Comparison of Self-Reported vs. Automated Internet Outage Measuring Methods
    Mensch und Computer 2022 – Workshopband Darmstadt. doi:10.18420/muc2022-mci-ws10-321
    [BibTeX] [Abstract] [Download PDF]

    Every day, there are internet disruptions or outages around the world that affect our daily lives. In this paper, we analyzed these events in Germany in recent years and found out how they can be detected, and what impact they have on citizens, especially in crisis situations. For this purpose, we take a look at two different approaches to recording internet outages, namely the self-reporting of citizens and automatic reporting by algorithmic examination of the availability of IP networks. We evaluate the data of six major events with regard to their meaningfulness in quality and quantity. We found that due to the amount of data and the inherent imprecision of the methods used, it is difficult to detect outages through algorithmic examination. But once an event is publicly known by self-reporting, they have advantages to capture the temporal and spatial dimensions of the outage due to its nature of objective measurements. As a result, we propose that users’ crowdsourcing can enhance the detection of outages and should be seen as an important starting point to even begin an analysis with algorithm-based techniques, but it is to ISPs and regulatory authorities to support that.

    @inproceedings{orlov_detecting_2022,
    address = {Darmstadt},
    series = {Mensch und {Computer} 2022 - {Workshopband}},
    title = {Detecting a {Crisis}: {Comparison} of {Self}-{Reported} vs. {Automated} {Internet} {Outage} {Measuring} {Methods}},
    url = {https://dl.gi.de/handle/20.500.12116/39089},
    doi = {10.18420/muc2022-mci-ws10-321},
    abstract = {Every day, there are internet disruptions or outages around the world that affect our daily lives. In this paper, we analyzed these events in Germany in recent years and found out how they can be detected, and what impact they have on citizens, especially in crisis situations. For this purpose, we take a look at two different approaches to recording internet outages, namely the self-reporting of citizens and automatic reporting by algorithmic examination of the availability of IP networks. We evaluate the data of six major events with regard to their meaningfulness in quality and quantity. We found that due to the amount of data and the inherent imprecision of the methods used, it is difficult to detect outages through algorithmic examination. But once an event is publicly known by self-reporting, they have advantages to capture the temporal and spatial dimensions of the outage due to its nature of objective measurements. As a result, we propose that users’ crowdsourcing can enhance the detection of outages and should be seen as an important starting point to even begin an analysis with algorithm-based techniques, but it is to ISPs and regulatory authorities to support that.},
    language = {en},
    booktitle = {Mensch und {Computer} 2022 - {Workshopband}},
    publisher = {Gesellschaft für Informatik},
    author = {Orlov, Denis and Möller, Simon and Düfler, Sven and Haesler, Steffen and Reuter, Christian},
    year = {2022},
    keywords = {Student, Security, UsableSec, HCI, Projekt-emergenCITY, Projekt-ATHENE-SecUrban},
    }

  • Kaan Eyilmez, Ali Sercan Basyurt, Stefan Stieglitz, Christoph Fuchss, Marc-André Kaufhold, Christian Reuter, Milad Mirabaie (2022)
    A Design Science Artefact for Cyber Threat Detection and Actor Specific Communication
    Australasian Conference on Information Systems (ACIS) .
    [BibTeX] [Abstract] [Download PDF]

    Over the past few decades, the number and variety of cyberattacks and malware patterns have increased immensely. As a countermeasure, computer emergency response teams were established with the responsibility of securing the cyber environment. However, recent studies revealed that currently performed manual processes and the unavailability of adequate tools impede the achievement of cybersecurity. To address these challenges, we followed the Design Science paradigm to develop an artefact that improves the evaluation of open-source intelligence obtained from Twitter as well as the actor-specific communication of cyber threat information. Subsequently, the implemented artefact will be evaluated through semi-structured interviews with subject matter experts. This research in progress article presents the identified research gap and describes the development process and the endeavor to contribute to the cybersecurity domain theoretically with design principles for the development of an instrument and practically by implementing an artefact that supports domain experts in their work.

    @inproceedings{eyilmez_design_2022,
    title = {A {Design} {Science} {Artefact} for {Cyber} {Threat} {Detection} and {Actor} {Specific} {Communication}},
    url = {https://aisel.aisnet.org/cgi/viewcontent.cgi?article=1049&context=acis2022},
    abstract = {Over the past few decades, the number and variety of cyberattacks and malware patterns have increased immensely. As a countermeasure, computer emergency response teams were established with the responsibility of securing the cyber environment. However, recent studies revealed that currently performed manual processes and the unavailability of adequate tools impede the achievement of cybersecurity. To address these challenges, we followed the Design Science paradigm to develop an artefact that improves the evaluation of open-source intelligence obtained from Twitter as well as the actor-specific communication of cyber threat information. Subsequently, the implemented artefact will be evaluated through semi-structured interviews with subject matter experts. This research in progress article presents the identified research gap and describes the development process and the endeavor to contribute to the cybersecurity domain theoretically with design principles for the development of an instrument and practically by implementing an artefact that supports domain experts in their work.},
    booktitle = {Australasian {Conference} on {Information} {Systems} ({ACIS})},
    publisher = {AIS Electronic Library (AISel)},
    author = {Eyilmez, Kaan and Basyurt, Ali Sercan and Stieglitz, Stefan and Fuchss, Christoph and Kaufhold, Marc-André and Reuter, Christian and Mirabaie, Milad},
    year = {2022},
    keywords = {Student, Security, Projekt-CYWARN},
    }

  • Jonas Franken (2022)
    Seekabel als Maritime Kritische Infrastruktur
    Dreizack 21: Von historischen bis zukünftigen Herausforderungen im maritimen Raum Laboe/Kiel.
    [BibTeX] [Download PDF]

    @inproceedings{franken_seekabel_2022,
    address = {Laboe/Kiel},
    title = {Seekabel als {Maritime} {Kritische} {Infrastruktur}},
    url = {https://www.kielseapowerseries.com/files/ispk/content/workshops/Dreizack/Sammelband zum Dreizack21.pdf},
    booktitle = {Dreizack 21: {Von} historischen bis zukünftigen {Herausforderungen} im maritimen {Raum}},
    author = {Franken, Jonas},
    editor = {Schilling, Henrik},
    year = {2022},
    keywords = {Student, Security, Projekt-ATHENE-SecUrban},
    pages = {22--25},
    }

  • Jonas Franken, Thomas Reinhold, Lilian Reichert, Christian Reuter (2022)
    The Digital Divide in State Vulnerability to Submarine Communications Cable Failure
    International Journal of Critical Infrastructure Protection (IJCIP) ;38(100522):1–15. doi:10.1016/j.ijcip.2022.100522
    [BibTeX] [Abstract] [Download PDF]

    The backbone network of submarine communication cables (SCC) carries 98\% of international internet traffic. Coastal and island states strongly depend on this physical internet infrastructure to provide internet connectivity. Although about 100 SCC breakdowns of human or natural origin occur at yearly average, a literature review reveals that there is no approach to assess individual state vulnerability to SCC failure in global comparison. In this article, the global SCC network is modeled based on publicly available data. Besides the analysis of the global network properties, a focus is put on remaining bandwidth capacities in three different failure scenario simulations of SCC breakdowns. As a result, this study identifies 15 highly vulnerable states and overseas territories, and another 28 territories that are classified as partially vulnerable to SCC failures. Since economic market decisions shape the structure of the SCC network, an uneven distribution of redundancies and the resulting vulnerability of disadvantaged economies can be confirmed. Therefore, the study’s findings may contribute to a better assessment of the necessity of preventive protection measures of critical telecommunication infrastructures in states and territories characterized by high and medium vulnerability.

    @article{franken_digital_2022,
    title = {The {Digital} {Divide} in {State} {Vulnerability} to {Submarine} {Communications} {Cable} {Failure}},
    volume = {38},
    url = {https://peasec.de/paper/2022/2022_FrankenReinholdReichertReuter_DigitalDivideStateVulnerabilitySubmarineCommunicationsCable_IJCIP.pdf},
    doi = {10.1016/j.ijcip.2022.100522},
    abstract = {The backbone network of submarine communication cables (SCC) carries 98\% of international internet traffic. Coastal and island states strongly depend on this physical internet infrastructure to provide internet connectivity. Although about 100 SCC breakdowns of human or natural origin occur at yearly average, a literature review reveals that there is no approach to assess individual state vulnerability to SCC failure in global comparison. In this article, the global SCC network is modeled based on publicly available data. Besides the analysis of the global network properties, a focus is put on remaining bandwidth capacities in three different failure scenario simulations of SCC breakdowns. As a result, this study identifies 15 highly vulnerable states and overseas territories, and another 28 territories that are classified as partially vulnerable to SCC failures. Since economic market decisions shape the structure of the SCC network, an uneven distribution of redundancies and the resulting vulnerability of disadvantaged economies can be confirmed. Therefore, the study's findings may contribute to a better assessment of the necessity of preventive protection measures of critical telecommunication infrastructures in states and territories characterized by high and medium vulnerability.},
    number = {100522},
    journal = {International Journal of Critical Infrastructure Protection (IJCIP)},
    author = {Franken, Jonas and Reinhold, Thomas and Reichert, Lilian and Reuter, Christian},
    year = {2022},
    keywords = {Student, Projekt-AgriRegio, Security, Projekt-ATHENE-SecUrban, A-Paper, Selected, Ranking-ImpactFactor, AuswahlPeace},
    pages = {1--15},
    }

  • Christian Bueger, Tobias Liebetrau, Jonas Franken (2022)
    Security threats to undersea communications cables and infrastructure – consequences for the EU
    Brussels: European Parliament.
    [BibTeX] [Abstract] [Download PDF]

    The EU’s subsea data cable network is both vital for global connectivity and vulnerable. This study provides a systematic review of the current security threats, as well as the actors at the origin of these threats. Building on reports and expert input, the paper takes stock of current awareness, preparedness and response mechanisms, both at the EU and Member State level. A number of recommendations suggest how to improve the resilience of the cable network. Proposals build on the need to enhance EU-wide awareness, improve coordination and share information across EU institutions and Member States. In addition, surveillance capabilities must be advanced, response and repair mechanisms strengthened, and the topic mainstreamed across external action.

    @book{bueger_security_2022,
    address = {Brussels},
    title = {Security threats to undersea communications cables and infrastructure – consequences for the {EU}},
    url = {https://www.europarl.europa.eu/thinktank/en/document/EXPO_IDA(2022)702557},
    abstract = {The EU’s subsea data cable network is both vital for global connectivity and vulnerable. This study provides a systematic review of the current security threats, as well as the actors at the origin of these threats. Building on reports and expert input, the paper takes stock of current awareness, preparedness and response mechanisms, both at the EU and Member State level. A number of recommendations suggest how to improve the resilience of the cable network. Proposals build on the need to enhance EU-wide awareness, improve coordination and share information across EU institutions and Member States. In addition, surveillance capabilities must be advanced, response and repair mechanisms strengthened, and the topic mainstreamed across external action.},
    publisher = {European Parliament},
    author = {Bueger, Christian and Liebetrau, Tobias and Franken, Jonas},
    year = {2022},
    keywords = {Student, Security, Projekt-emergenCITY, Projekt-ATHENE-SecUrban, Cyberwar, Infrastructure},
    }

    2021

  • Franz Kuntke, Marcel Sinn, Christian Reuter (2021)
    Reliable Data Transmission using Low Power Wide Area Networks (LPWAN) for Agricultural Applications
    Proceedings of the 16th International Conference on Availability, Reliability and Security (ARES 2021) . doi:10.1145/3465481.3469191
    [BibTeX] [Abstract] [Download PDF]

    Reliable IT-based communication in agriculture is becoming increasingly important for regular operations. For example, if a farmer is in the field during a network outage, such as a failure of the mobile network, an alternative communication channel is needed to continue to connect to IT components and required data. With increasing digitalization, Low Power Wide Area Network (LPWAN) technologies are being used more and more frequently, e.g. for sensor networks. The LPWAN technologies offer a high range and can be used autonomously for the most part, but do not allow classic TCP/IP communication. In this work, a popular LPWAN technology, namely LoRaWAN, is experimentally supplemented by AX.25 on OSI layer 2 (Data Link Layer) to allow end devices TCP/IP-based communication over long distances. The evaluation shows that classic low-bandwidth applications are thus functional and can enable reliable, crisis-capable data transmission.

    @inproceedings{kuntke_reliable_2021,
    title = {Reliable {Data} {Transmission} using {Low} {Power} {Wide} {Area} {Networks} ({LPWAN}) for {Agricultural} {Applications}},
    url = {http://www.peasec.de/paper/2021/2021_KuntkeSinnReuter_LPWANAgriculture_FARES.pdf},
    doi = {10.1145/3465481.3469191},
    abstract = {Reliable IT-based communication in agriculture is becoming increasingly important for regular operations. For example, if a farmer is in the field during a network outage, such as a failure of the mobile network, an alternative communication channel is needed to continue to connect to IT components and required data. With increasing digitalization, Low Power Wide Area Network (LPWAN) technologies are being used more and more frequently, e.g. for sensor networks. The LPWAN technologies offer a high range and can be used autonomously for the most part, but do not allow classic TCP/IP communication. In this work, a popular LPWAN technology, namely LoRaWAN, is experimentally supplemented by AX.25 on OSI layer 2 (Data Link Layer) to allow end devices TCP/IP-based communication over long distances. The evaluation shows that classic low-bandwidth applications are thus functional and can enable reliable, crisis-capable data transmission.},
    booktitle = {Proceedings of the 16th {International} {Conference} on {Availability}, {Reliability} and {Security} ({ARES} 2021)},
    author = {Kuntke, Franz and Sinn, Marcel and Reuter, Christian},
    year = {2021},
    keywords = {Student, Projekt-GeoBox, Security, Projekt-HyServ},
    pages = {1--9},
    }

  • Thea Riebe, Tristan Wirth, Markus Bayer, Philipp Kuehn, Marc-André Kaufhold, Volker Knauthe, Stefan Guthe, Christian Reuter (2021)
    CySecAlert: An Alert Generation System for Cyber Security Events Using Open Source Intelligence Data
    Information and Communications Security (ICICS) . doi:10.1007/978-3-030-86890-1_24
    [BibTeX] [Abstract] [Download PDF]

    Receiving relevant information on possible cyber threats, attacks, and data breaches in a timely manner is crucial for early response. The social media platform Twitter hosts an active cyber security community. Their activities are often monitored manually by security experts, such as Computer Emergency Response Teams (CERTs). We thus propose a Twitter-based alert generation system that issues alerts to a system operator as soon as new relevant cyber security related topics emerge. Thereby, our system allows us to monitor user accounts with significantly less workload. Our system applies a supervised classifier, based on active learning, that detects tweets containing relevant information. The results indicate that uncertainty sampling can reduce the amount of manual relevance classification effort and enhance the classifier performance substantially compared to random sampling. Our approach reduces the number of accounts and tweets that are needed for the classifier training, thus making the tool easily and rapidly adaptable to the specific context while also supporting data minimization for Open Source Intelligence (OSINT). Relevant tweets are clustered by a greedy stream clustering algorithm in order to identify significant events. The proposed system is able to work near real-time within the required 15-minutes time frame and detects up to 93.8\% of relevant events with a false alert rate of 14.81\%.

    @inproceedings{riebe_cysecalert_2021,
    title = {{CySecAlert}: {An} {Alert} {Generation} {System} for {Cyber} {Security} {Events} {Using} {Open} {Source} {Intelligence} {Data}},
    url = {https://peasec.de/paper/2021/2021_RiebeWirthBayerKuehnKaufholdKnautheGutheReuter_CySecAlertOpenSourceIntelligence_ICICS.pdf},
    doi = {10.1007/978-3-030-86890-1_24},
    abstract = {Receiving relevant information on possible cyber threats, attacks, and data breaches in a timely manner is crucial for early response. The social media platform Twitter hosts an active cyber security community. Their activities are often monitored manually by security experts, such as Computer Emergency Response Teams (CERTs). We thus propose a Twitter-based alert generation system that issues alerts to a system operator as soon as new relevant cyber security related topics emerge. Thereby, our system allows us to monitor user accounts with significantly less workload. Our system applies a supervised classifier, based on active learning, that detects tweets containing relevant information. The results indicate that uncertainty sampling can reduce the amount of manual relevance classification effort and enhance the classifier performance substantially compared to random sampling. Our approach reduces the number of accounts and tweets that are needed for the classifier training, thus making the tool easily and rapidly adaptable to the specific context while also supporting data minimization for Open Source Intelligence (OSINT). Relevant tweets are clustered by a greedy stream clustering algorithm in order to identify significant events. The proposed system is able to work near real-time within the required 15-minutes time frame and detects up to 93.8\% of relevant events with a false alert rate of 14.81\%.},
    booktitle = {Information and {Communications} {Security} ({ICICS})},
    author = {Riebe, Thea and Wirth, Tristan and Bayer, Markus and Kuehn, Philipp and Kaufhold, Marc-André and Knauthe, Volker and Guthe, Stefan and Reuter, Christian},
    year = {2021},
    keywords = {Student, Security, UsableSec, Projekt-CYWARN, Projekt-ATHENE-SecUrban, Ranking-CORE-B},
    pages = {429--446},
    }

  • Katrin Hartwig, Atlas Englisch, Jan Pelle Thomson, Christian Reuter (2021)
    Finding Secret Treasure? Improving Memorized Secrets Through Gamification
    European Symposium on Usable Security (EuroUSEC) Karlsruhe, Germany. doi:10.1145/3481357.3481509
    [BibTeX] [Abstract] [Download PDF]

    Users tend to bypass systems that are designed to increase their personal security and privacy while limiting their perceived freedom. Nudges present a possible solution to this problem, offering security benefits without taking away perceived freedom. We have identified a lack of research comparing concrete implementations of nudging concepts in an emulated real-world scenario to assess their relative value as a nudge. Comparing multiple nudging implementations in an emulated real-world scenario including a novel avatar nudge with gamification elements, this publication discusses the advantages of nudging for stronger user-created passwords regarding efficacy, usability, and memorability.We investigated the effect of gamification in nudges, performing two studies (𝑁1 = 16, 𝑁2 = 1, 000) to refine and evaluate implementations of current and novel nudging concepts. Our research found a gamified nudge, which integrates a personalizable avatar guide into the registration process, to perform less effectively than state-of-the-art nudges, independently of participants’ gaming frequency.

    @inproceedings{hartwig_finding_2021,
    address = {Karlsruhe, Germany},
    title = {Finding {Secret} {Treasure}? {Improving} {Memorized} {Secrets} {Through} {Gamification}},
    url = {https://peasec.de/paper/2021/2021_HartwigEnglischThomsonReuter_MemorizedSecretsThroughGamification_EuroUSEC.pdf},
    doi = {10.1145/3481357.3481509},
    abstract = {Users tend to bypass systems that are designed to increase their personal security and privacy while limiting their perceived freedom.
    Nudges present a possible solution to this problem, offering security benefits without taking away perceived freedom. We have
    identified a lack of research comparing concrete implementations of nudging concepts in an emulated real-world scenario to assess their
    relative value as a nudge. Comparing multiple nudging implementations in an emulated real-world scenario including a novel avatar
    nudge with gamification elements, this publication discusses the advantages of nudging for stronger user-created passwords regarding
    efficacy, usability, and memorability.We investigated the effect of gamification in nudges, performing two studies (𝑁1 = 16, 𝑁2 = 1, 000)
    to refine and evaluate implementations of current and novel nudging concepts. Our research found a gamified nudge, which integrates
    a personalizable avatar guide into the registration process, to perform less effectively than state-of-the-art nudges, independently of
    participants’ gaming frequency.},
    booktitle = {European {Symposium} on {Usable} {Security} ({EuroUSEC})},
    publisher = {ACM},
    author = {Hartwig, Katrin and Englisch, Atlas and Thomson, Jan Pelle and Reuter, Christian},
    year = {2021},
    keywords = {Student, Security, UsableSec, Projekt-ATHENE-SecUrban, Projekt-CROSSING},
    pages = {105--117},
    }

  • Enno Steinbrink, Lilian Reichert, Michelle Mende, Christian Reuter (2021)
    Digital Privacy Perceptions of Asylum Seekers in Germany – An Empirical Study about Smartphone Usage during the Flight
    Proceedings of the ACM: Human Computer Interaction (PACM): Computer-Supported Cooperative Work and Social Computing ;5(CSCW2). doi:10.1145/3479526
    [BibTeX] [Abstract] [Download PDF]

    Since 2015, an increased number of asylum seekers is coming to Europe. These migration movements increasingly rely on digital infrastructure, such as mobile internet access and online services, in order to reach their targeted destination countries. Asylum seekers often use smartphones for information and communication purposes. Even though there are many positive aspects in the use of such technologies, researchers have to consider the perceived risks of this specific user group. This work aims at investigating the use of mobile information technologies by asylum seekers during their flight, especially taking privacy into account. Thus, it examines asylum seekers’ digital privacy perceptions and identifies privacy protection behaviors by conducting a qualitative interview study with 14 asylum seekers who applied for asylum in Germany. The results show that asylum seekers are often aware of the various risks deriving from the use of smartphones and ICT, such as surveillance and persecution by state or non-state actors as well as extortion by criminals. Based on this, this work furthermore outlines different strategies used to manage these risks. Since the lack of privacy and trust leads to avoidance behavior, the insights of this study provide valuable information for the design of assistance apps and collaboration platforms, which appropriately address the specific needs for digital privacy in the context of flight, or for the conception of privacy-enhancing technologies helping to achieve this.

    @article{steinbrink_digital_2021,
    title = {Digital {Privacy} {Perceptions} of {Asylum} {Seekers} in {Germany} - {An} {Empirical} {Study} about {Smartphone} {Usage} during the {Flight}},
    volume = {5},
    url = {https://www.peasec.de/paper/2021/2021_SteinbrinkReichertMendeReuter_DigitalPrivacyPerceptionAsylumSeekers_CSCW.pdf},
    doi = {10.1145/3479526},
    abstract = {Since 2015, an increased number of asylum seekers is coming to Europe. These migration movements increasingly rely on digital infrastructure, such as mobile internet access and online services, in order to reach their targeted destination countries. Asylum seekers often use smartphones for information and communication purposes. Even though there are many positive aspects in the use of such technologies, researchers have to consider the perceived risks of this specific user group. This work aims at investigating the use of mobile information technologies by asylum seekers during their flight, especially taking privacy into account. Thus, it examines asylum seekers’ digital privacy perceptions and identifies privacy protection behaviors by conducting a qualitative interview study with 14 asylum seekers who applied for asylum in Germany. The results show that asylum seekers are often aware of the various risks deriving from the use of smartphones and ICT, such as surveillance and persecution by state or non-state actors as well as extortion by criminals. Based on this, this work furthermore outlines different strategies used to manage these risks. Since the lack of privacy and trust leads to avoidance behavior, the insights of this study provide valuable information for the design of assistance apps and collaboration platforms, which appropriately address the specific needs for digital privacy in the context of flight, or for the conception of privacy-enhancing technologies helping to achieve this.},
    number = {CSCW2},
    journal = {Proceedings of the ACM: Human Computer Interaction (PACM): Computer-Supported Cooperative Work and Social Computing},
    author = {Steinbrink, Enno and Reichert, Lilian and Mende, Michelle and Reuter, Christian},
    year = {2021},
    keywords = {Student, Security, UsableSec, Projekt-ATHENE-FANCY, A-Paper, AuswahlUsableSec, Ranking-CORE-A, Ranking-ImpactFactor, Projekt-GRKPrivacy},
    }

  • Marc-André Kaufhold, Markus Bayer, Daniel Hartung, Christian Reuter (2021)
    Design and Evaluation of Deep Learning Models for Real-Time Credibility Assessment in Twitter
    30th International Conference on Artificial Neural Networks (ICANN2021) Bratislava. doi:https://doi.org/10.1007/978-3-030-86383-8_32
    [BibTeX] [Abstract] [Download PDF]

    Social media have an enormous impact on modern life but are prone to the dissemination of false information. In several domains, such as crisis management or political communication, it is of utmost importance to detect false and to promote credible information. Although educational measures might help individuals to detect false information, the sheer volume of social big data, which sometimes need to be anal- ysed under time-critical constraints, calls for automated and (near) real- time assessment methods. Hence, this paper reviews existing approaches before designing and evaluating three deep learning models (MLP, RNN, BERT) for real-time credibility assessment using the example of Twitter posts. While our BERT implementation achieved best results with an accuracy of up to 87.07\% and an F1 score of 0.8764 when using meta- data, text, and user features, MLP and RNN showed lower classification quality but better performance for real-time application. Furthermore, the paper contributes with a novel dataset for credibility assessment.

    @inproceedings{kaufhold_design_2021,
    address = {Bratislava},
    title = {Design and {Evaluation} of {Deep} {Learning} {Models} for {Real}-{Time} {Credibility} {Assessment} in {Twitter}},
    url = {https://peasec.de/paper/2021/2021_KaufholdBayerHartungReuter_DeepLearningCredibilityAssessmentTwitter_ICANN.pdf},
    doi = {https://doi.org/10.1007/978-3-030-86383-8_32},
    abstract = {Social media have an enormous impact on modern life but are prone to the dissemination of false information. In several domains, such as crisis management or political communication, it is of utmost importance to detect false and to promote credible information. Although educational measures might help individuals to detect false information, the sheer volume of social big data, which sometimes need to be anal- ysed under time-critical constraints, calls for automated and (near) real- time assessment methods. Hence, this paper reviews existing approaches before designing and evaluating three deep learning models (MLP, RNN, BERT) for real-time credibility assessment using the example of Twitter posts. While our BERT implementation achieved best results with an accuracy of up to 87.07\% and an F1 score of 0.8764 when using meta- data, text, and user features, MLP and RNN showed lower classification quality but better performance for real-time application. Furthermore, the paper contributes with a novel dataset for credibility assessment.},
    booktitle = {30th {International} {Conference} on {Artificial} {Neural} {Networks} ({ICANN2021})},
    author = {Kaufhold, Marc-André and Bayer, Markus and Hartung, Daniel and Reuter, Christian},
    year = {2021},
    keywords = {Student, Security, Projekt-CYWARN, Projekt-ATHENE-SecUrban, Ranking-CORE-B},
    pages = {1--13},
    }

  • Jasmin Haunschild, Kilian Demuth, HenriJacques Geiß, Christian Richter, Christian Reuter (2021)
    Nutzer, Sammler, Entscheidungsträger? Arten der Bürgerbeteiligung in Smart Cities
    HMD Praxis der Wirtschaftsinformatik ;58. doi:10.1365/s40702-021-00770-8
    [BibTeX] [Abstract] [Download PDF]

    Digitalisierung ist ein präsenter Faktor in vielen Städten. So existieren bereits viele Smart-City-Initiativen, bei denen Städte versuchen, ihre Prozesse durch Erfassung und Verknüpfung von Daten, oft unter Zuhilfenahme von Datenplattformen, zu optimieren. In Anbetracht der damit einhergehenden großen Investitionen und Veränderungen wird Bürgerbeteiligung als zentraler Faktor für den Erfolg solcher Initiativen betrachtet. Bisher ist allerdings nicht klar, was typische Beteiligungsformate von Smart-City-Initiativen sind und welche Rolle(n) BürgerInnen dabei einnehmen. Dieser Beitrag leitet mittels einer Literaturanalyse zu Smart Cities ein Kategorienschema zu typischen Bürgerbeteiligungsarten ab. Die Analyse ergab, dass sich Einbindung von BürgerInnen in politische Entscheidungen und bei der Entwicklung technischer Artefakte maßgeblich auf e‑Government oder Participatory Design bezieht. Im Hinblick auf die Beteiligungsarten zeigt sich, dass Makrofabriken, Living Labs und Open-Data-Plattformen häufige Ansätze sind, um BürgerInnen als Co-Creators einzubinden. Zudem werden BürgerInnen mit Citizen Sensing zur Erfassung von Daten oder Missständen einbezogen. Dabei zeigen sich sowohl aktivere, als auch eher passive Beteiligungsarten. Die Analyse zeigt, dass die Einbindung von BürgerInnen häufig entweder auf eine Beteiligung an politischen Entscheidungen oder an der Entwicklung technischer Artefakte abzielt. Auch wenn keine klare Abgrenzung möglich ist, sind diese Ansätze dann eher durch e‑Government oder Participatory Design inspiriert.

    @article{haunschild_nutzer_2021,
    title = {Nutzer, {Sammler}, {Entscheidungsträger}? {Arten} der {Bürgerbeteiligung} in {Smart} {Cities}},
    volume = {58},
    url = {https://peasec.de/paper/2021/2021_HaunschildDemuthGeissRichterReuter_NutzerSammlerEntscheidungstragerBuergerbeteiligungSmartCities_HMD.pdf},
    doi = {10.1365/s40702-021-00770-8},
    abstract = {Digitalisierung ist ein präsenter Faktor in vielen Städten. So existieren bereits viele Smart-City-Initiativen, bei denen Städte versuchen, ihre Prozesse durch Erfassung und Verknüpfung von Daten, oft unter Zuhilfenahme von Datenplattformen, zu optimieren. In Anbetracht der damit einhergehenden großen Investitionen und Veränderungen wird Bürgerbeteiligung als zentraler Faktor für den Erfolg solcher Initiativen betrachtet. Bisher ist allerdings nicht klar, was typische Beteiligungsformate von Smart-City-Initiativen sind und welche Rolle(n) BürgerInnen dabei einnehmen. Dieser Beitrag leitet mittels einer Literaturanalyse zu Smart Cities ein Kategorienschema zu typischen Bürgerbeteiligungsarten ab. Die Analyse ergab, dass sich Einbindung von BürgerInnen in politische Entscheidungen und bei der Entwicklung technischer Artefakte maßgeblich auf e‑Government oder Participatory Design bezieht. Im Hinblick auf die Beteiligungsarten zeigt sich, dass Makrofabriken, Living Labs und Open-Data-Plattformen häufige Ansätze sind, um BürgerInnen als Co-Creators einzubinden. Zudem werden BürgerInnen mit Citizen Sensing zur Erfassung von Daten oder Missständen einbezogen. Dabei zeigen sich sowohl aktivere, als auch eher passive Beteiligungsarten. Die Analyse zeigt, dass die Einbindung von BürgerInnen häufig entweder auf eine Beteiligung an politischen Entscheidungen oder an der Entwicklung technischer Artefakte abzielt. Auch wenn keine klare Abgrenzung möglich ist, sind diese Ansätze dann eher durch e‑Government oder Participatory Design inspiriert.},
    journal = {HMD Praxis der Wirtschaftsinformatik},
    author = {Haunschild, Jasmin and Demuth, Kilian and Geiß, Henri-Jacques and Richter, Christian and Reuter, Christian},
    year = {2021},
    keywords = {Student, HCI, Projekt-emergenCITY, Projekt-ATHENE-SecUrban},
    }

    2020

  • Jan Kirchner, Christian Reuter (2020)
    Countering Fake News: A Comparison of Possible Solutions Regarding User Acceptance and Effectiveness
    Proceedings of the ACM: Human Computer Interaction (PACM): Computer-Supported Cooperative Work and Social Computing ;4(CSCW2):140:1–140:28. doi:10.1145/3415211
    [BibTeX] [Abstract] [Download PDF]

    Since the emergence of so-called fake news on the internet and in social media, platforms such as Facebook have started to take countermeasures, and researchers have begun looking into this phenomenon from a variety of perspectives. A large number of scientific work has investigated ways to detect fake news automatically. Less attention has been paid to the subsequent step, i.e., what to do when you are aware of the inaccuracy of claims in social media. This work takes a user-centered approach on means to counter identified mis- and disinformation in social media. We conduct a three-step study design on how approaches in social media should be presented to respect the users‘ needs and experiences and how effective they are. As our first step, in an online survey representative for some factors to the German adult population, we enquire regarding their strategies on handling information in social media, and their opinion regarding possible solutions — focusing on the approach of displaying a warning on inaccurate posts. In a second step, we present five potential approaches for countermeasures identified in related work to interviewees for qualitative input. We discuss (1) warning, (2) related articles, (3) reducing the size, (4) covering, and (5) requiring confirmation. Based on the interview feedback, as the third step of this study, we select, improve, and examine four promising approaches on how to counter misinformation. We conduct an online experiment to test their effectiveness on the perceived accuracy of false headlines and also ask for the users‘ preferences. In this study, we find that users welcome warning-based approaches to counter fake news and are somewhat critical with less transparent methods. Moreover, users want social media platforms to explain why a post was marked as disputed. The results regarding effectiveness are similar: Warning-based approaches are shown to be effective in reducing the perceived accuracy of false headlines. Moreover, adding an explanation to the warning leads to the most significant results. In contrast, we could not find a significant effect on one of Facebook’s current approaches (reduced post size and fact-checks in related articles).

    @article{kirchner_countering_2020,
    title = {Countering {Fake} {News}: {A} {Comparison} of {Possible} {Solutions} {Regarding} {User} {Acceptance} and {Effectiveness}},
    volume = {4},
    url = {https://dl.acm.org/doi/10.1145/3415211},
    doi = {10.1145/3415211},
    abstract = {Since the emergence of so-called fake news on the internet and in social media, platforms such as Facebook have started to take countermeasures, and researchers have begun looking into this phenomenon from a variety of perspectives. A large number of scientific work has investigated ways to detect fake news automatically. Less attention has been paid to the subsequent step, i.e., what to do when you are aware of the inaccuracy of claims in social media. This work takes a user-centered approach on means to counter identified mis- and disinformation in social media. We conduct a three-step study design on how approaches in social media should be presented to respect the users' needs and experiences and how effective they are. As our first step, in an online survey representative for some factors to the German adult population, we enquire regarding their strategies on handling information in social media, and their opinion regarding possible solutions — focusing on the approach of displaying a warning on inaccurate posts. In a second step, we present five potential approaches for countermeasures identified in related work to interviewees for qualitative input. We discuss (1) warning, (2) related articles, (3) reducing the size, (4) covering, and (5) requiring confirmation. Based on the interview feedback, as the third step of this study, we select, improve, and examine four promising approaches on how to counter misinformation. We conduct an online experiment to test their effectiveness on the perceived accuracy of false headlines and also ask for the users' preferences. In this study, we find that users welcome warning-based approaches to counter fake news and are somewhat critical with less transparent methods. Moreover, users want social media platforms to explain why a post was marked as disputed. The results regarding effectiveness are similar: Warning-based approaches are shown to be effective in reducing the perceived accuracy of false headlines. Moreover, adding an explanation to the warning leads to the most significant results. In contrast, we could not find a significant effect on one of Facebook's current approaches (reduced post size and fact-checks in related articles).},
    number = {CSCW2},
    journal = {Proceedings of the ACM: Human Computer Interaction (PACM): Computer-Supported Cooperative Work and Social Computing},
    author = {Kirchner, Jan and Reuter, Christian},
    year = {2020},
    note = {Place: Austin, USA
    Publisher: ACM},
    keywords = {Student, Crisis, HCI, A-Paper, Selected, AuswahlCrisis, Ranking-CORE-A, Ranking-ImpactFactor, Cooperation},
    pages = {140:1--140:28},
    }

  • Thea Riebe, Jasmin Haunschild, Felix Divo, Matthias Lang, Gerbert Roitburd, Jonas Franken, Christian Reuter (2020)
    Die Veränderung der Vorratsdatenspeicherung in Europa
    Datenschutz und Datensicherheit – DuD ;44(5):316–321. doi:10.1007/s11623-020-1275-3
    [BibTeX] [Abstract] [Download PDF]

    Die Diskussion um die Vorratsdatenspeicherung ist europaweit weiterhin relevant, da es keine einheitliche Gesetzgebung der EU-Mitgliedsstaaten gibt. So werden in einigen EU-Staaten weiterhin Vorratsdaten gespeichert, obwohl der EuGH die Vorratsdatenspeicherung für teilweise rechtswidrig erklärt hat. Dabei unterscheiden sich die Speicherdauer, die erhobenen Daten und die Rechte der Behörden erheblich. Der Beitrag vergleicht den Umgang mit der Vorratsdatenspeicherung in zehn EU- und Schengen-Staaten im Hinblick auf Einführung und Aussetzung, Speicherdauer, Speicherinhalte und Zugriffsrechte.

    @article{riebe_veranderung_2020,
    title = {Die {Veränderung} der {Vorratsdatenspeicherung} in {Europa}},
    volume = {44},
    url = {https://www.peasec.de/paper/2020/2020_Riebeetal_VDSinEuropa_DuD.pdf},
    doi = {10.1007/s11623-020-1275-3},
    abstract = {Die Diskussion um die Vorratsdatenspeicherung ist europaweit weiterhin relevant, da es keine einheitliche Gesetzgebung der EU-Mitgliedsstaaten gibt. So werden in einigen EU-Staaten weiterhin Vorratsdaten gespeichert, obwohl der EuGH die Vorratsdatenspeicherung für teilweise rechtswidrig erklärt hat. Dabei unterscheiden sich die Speicherdauer, die erhobenen Daten und die Rechte der Behörden erheblich. Der Beitrag vergleicht den Umgang mit der Vorratsdatenspeicherung in zehn EU- und Schengen-Staaten im Hinblick auf Einführung und Aussetzung, Speicherdauer, Speicherinhalte und Zugriffsrechte.},
    number = {5},
    journal = {Datenschutz und Datensicherheit - DuD},
    author = {Riebe, Thea and Haunschild, Jasmin and Divo, Felix and Lang, Matthias and Roitburd, Gerbert and Franken, Jonas and Reuter, Christian},
    year = {2020},
    keywords = {Peace, Student, Security, Projekt-ATHENE-SecUrban, Projekt-DualUse, Projekt-KontiKat},
    pages = {316--321},
    }

  • Philipp Imperatori, Thea Riebe, Christian Reuter (2020)
    Verschlüsselungspolitik der USA: Vom Clipper-Chip zu Edward Snowden
    2020.
    [BibTeX] [Download PDF]

    @techreport{imperatori_verschlusselungspolitik_2020,
    title = {Verschlüsselungspolitik der {USA}: {Vom} {Clipper}-{Chip} zu {Edward} {Snowden}},
    url = {https://tuprints.ulb.tu-darmstadt.de/20060/1/fk-1-20-p77.pdf},
    author = {Imperatori, Philipp and Riebe, Thea and Reuter, Christian},
    year = {2020},
    keywords = {Peace, Student, Security, Projekt-CROSSING, Projekt-DualUse},
    pages = {77--80},
    }

  • Christian Reuter, Marc-André Kaufhold, Fabian Spahr, Thomas Spielhofer, Anna Sophie Hahne (2020)
    Emergency Service Staff and Social Media – A Comparative Empirical Study of the Perception by Emergency Services Members in Europe in 2014 and 2017
    International Journal of Disaster Risk Reduction (IJDRR) ;46(101516). doi:10.1016/j.ijdrr.2020.101516
    [BibTeX] [Abstract] [Download PDF]

    Finding a way to ensure an effective use of social media has become increasingly important to emergency services over the past decade. Despite all efforts to determine the utility of social media for emergency organisations, it is necessary to benefit from such institutions‘ staffs‘ opinions to establish effective use. To provide empirical evidence we present a comparison of two surveys, conducted across Europe with emergency services in 2014 and 2017 respectively, with a total of 1169 answers. The analysis shows that personal experience has an effect on how organisational usage of social media is perceived and how emergency service staff view the future use of social media. Furthermore, the use has increased. This article not only shows emergency services what their staff think about their social media usage but also discusses challenges and future directions for the design of systems that can be useful for further development of optimized organisational social media usage.

    @article{reuter_emergency_2020,
    title = {Emergency {Service} {Staff} and {Social} {Media} – {A} {Comparative} {Empirical} {Study} of the {Perception} by {Emergency} {Services} {Members} in {Europe} in 2014 and 2017},
    volume = {46},
    url = {https://peasec.de/paper/2020/2020_ReuterKaufholdSpahrSpielhoferHahne_EmergencyServiceSocialMediaAttitude20142017_IJDRR.pdf},
    doi = {10.1016/j.ijdrr.2020.101516},
    abstract = {Finding a way to ensure an effective use of social media has become increasingly important to emergency services over the past decade. Despite all efforts to determine the utility of social media for emergency organisations, it is necessary to benefit from such institutions' staffs' opinions to establish effective use. To provide empirical evidence we present a comparison of two surveys, conducted across Europe with emergency services in 2014 and 2017 respectively, with a total of 1169 answers. The analysis shows that personal experience has an effect on how organisational usage of social media is perceived and how emergency service staff view the future use of social media. Furthermore, the use has increased. This article not only shows emergency services what their staff think about their social media usage but also discusses challenges and future directions for the design of systems that can be useful for further development of optimized organisational social media usage.},
    number = {101516},
    journal = {International Journal of Disaster Risk Reduction (IJDRR)},
    author = {Reuter, Christian and Kaufhold, Marc-André and Spahr, Fabian and Spielhofer, Thomas and Hahne, Anna Sophie},
    year = {2020},
    keywords = {Student, Crisis, Projekt-emergenCITY, A-Paper, Ranking-ImpactFactor, SocialMedia},
    }

  • Milan Stute, Max Maass, Tom Schons, Marc-André Kaufhold, Christian Reuter, Matthias Hollick (2020)
    Empirical Insights for Designing Information and Communication Technology for International Disaster Response
    International Journal of Disaster Risk Reduction (IJDRR) ;47(101598):1–10. doi:10.1016/j.ijdrr.2020.101598
    [BibTeX] [Abstract] [Download PDF]

    Due to the increase in natural disasters in the past years, Disaster Response Organizations (DROs) are faced with the challenge of coping with more and larger operations. Currently appointed Information and Communications Technology (ICT) used for coordination and communication is sometimes outdated and does not scale, while novel technologies have the potential to greatly improve disaster response efficiency. To allow adoption of these novel technologies, ICT system designers have to take into account the particular needs of DROs and characteristics of International Disaster Response (IDR). This work attempts to bring the humanitarian and ICT communities closer together. In this work, we analyze IDR-related documents and conduct expert interviews. Using open coding, we extract empirical insights and translate the peculiarities of DRO coordination and operation into tangible ICT design requirements. This information is based on interviews with active IDR staff as well as DRO guidelines and reports. Ultimately, the goal of this paper is to serve as a reference for future ICT research endeavors to support and increase the efficiency of IDR operations.

    @article{stute_empirical_2020,
    title = {Empirical {Insights} for {Designing} {Information} and {Communication} {Technology} for {International} {Disaster} {Response}},
    volume = {47},
    url = {https://www.sciencedirect.com/science/article/pii/S2212420919309501},
    doi = {10.1016/j.ijdrr.2020.101598},
    abstract = {Due to the increase in natural disasters in the past years, Disaster Response Organizations (DROs) are faced with the challenge of coping with more and larger operations. Currently appointed Information and Communications Technology (ICT) used for coordination and communication is sometimes outdated and does not scale, while novel technologies have the potential to greatly improve disaster response efficiency. To allow adoption of these novel technologies, ICT system designers have to take into account the particular needs of DROs and characteristics of International Disaster Response (IDR). This work attempts to bring the humanitarian and ICT communities closer together. In this work, we analyze IDR-related documents and conduct expert interviews. Using open coding, we extract empirical insights and translate the peculiarities of DRO coordination and operation into tangible ICT design requirements. This information is based on interviews with active IDR staff as well as DRO guidelines and reports. Ultimately, the goal of this paper is to serve as a reference for future ICT research endeavors to support and increase the efficiency of IDR operations.},
    number = {101598},
    journal = {International Journal of Disaster Risk Reduction (IJDRR)},
    author = {Stute, Milan and Maass, Max and Schons, Tom and Kaufhold, Marc-André and Reuter, Christian and Hollick, Matthias},
    year = {2020},
    keywords = {Student, UsableSec, Crisis, Projekt-emergenCITY, A-Paper, Ranking-ImpactFactor},
    pages = {1--10},
    }

  • Philipp Kuehn, Thea Riebe, Lynn Apelt, Max Jansen, Christian Reuter (2020)
    Sharing of Cyber Threat Intelligence between States
    S+F Sicherheit und Frieden / Peace and Security ;38(1):22–28. doi:10.5771/0175-274X-2020-1-22
    [BibTeX] [Abstract] [Download PDF]

    Threats in cyberspace have increased in recent years due to the increment of offensive capabilities by states. Approaches to mitigate the security dilemma in cyberspace within the UN are deadlocked, as states have not been able to achieve agreements. However, from the perspective of IT-Security, there are Cyber Threat Intelligence (CTI) platforms to share and analyze cyber threats for a collective crisis management. To investigate, whether or not CTI platforms can be used as a confidence-building measure between states and international organizations, we portray current CTI platforms, showcase political requirements, and answer the question of how CTI communication may contribute to confidence-building in international affairs. Our results suggest the need to further develop analytical capabilities, as well as the implementation of a broad social, political, and legal environment for international CTI sharing.

    @article{kuehn_sharing_2020,
    title = {Sharing of {Cyber} {Threat} {Intelligence} between {States}},
    volume = {38},
    url = {http://www.peasec.de/paper/2020/2020_KuehnRiebeApeltJansenReuter_SharingCyberThreatIntelligence_SF.pdf},
    doi = {10.5771/0175-274X-2020-1-22},
    abstract = {Threats in cyberspace have increased in recent years due to the increment of offensive capabilities by states. Approaches to mitigate the security dilemma in cyberspace within the UN are deadlocked, as states have not been able to achieve agreements. However, from the perspective of IT-Security, there are Cyber Threat Intelligence (CTI) platforms to share and analyze cyber threats for a collective crisis management. To investigate, whether or not CTI platforms can be used as a confidence-building measure between states and international organizations, we portray current CTI platforms, showcase political requirements, and answer the question of how CTI communication may contribute to confidence-building in international affairs. Our results suggest the need to further develop analytical capabilities, as well as the implementation of a broad social, political, and legal environment for international CTI sharing.},
    number = {1},
    journal = {S+F Sicherheit und Frieden / Peace and Security},
    author = {Kuehn, Philipp and Riebe, Thea and Apelt, Lynn and Jansen, Max and Reuter, Christian},
    year = {2020},
    keywords = {Peace, Student, Security, Projekt-CYWARN, Projekt-ATHENE-SecUrban, Cyberwar, Projekt-DualUse},
    pages = {22--28},
    }

    2019

  • Margarita Grinko, Marc-André Kaufhold, Christian Reuter (2019)
    Adoption, Use and Diffusion of Crisis Apps in Germany: A Representative Survey
    Mensch und Computer – Tagungsband Hamburg, Germany. doi:10.1145/3340764.3340782
    [BibTeX] [Abstract] [Download PDF]

    The research field of crisis informatics examines the potentials and limitations of information and communication technology in crises, disasters, and emergencies. Although ICT plays an increasingly large role in crisis response and management, in-depth studies on crisis apps and similar technology in the context of an emergency have been missing. Based on responses by 1024 participants in Germany, we examine the diffusion, usage, perception and adoption of mobile crisis apps as well as required functions and improvements. We conclude that crisis apps are still a little-known form of disaster ICT, but have potential for enhancing communication, keeping users up to date and providing a more effective crisis management as supplement to other media channels dependent on different underlying infrastructures. However, they should be adaptable to user characteristics, consider privacy, allow communication and offer valuable information to raise awareness of potential disasters without creating an overload. Also, the familiarity with and trust in crisis apps should be addressed to maximize their beneficial impact on crisis communication and management. We discuss further implications as well as directions for future research with larger target groups and specific usage scenarios.

    @inproceedings{grinko_adoption_2019,
    address = {Hamburg, Germany},
    title = {Adoption, {Use} and {Diffusion} of {Crisis} {Apps} in {Germany}: {A} {Representative} {Survey}},
    url = {https://dl.acm.org/citation.cfm?id=3340782},
    doi = {10.1145/3340764.3340782},
    abstract = {The research field of crisis informatics examines the potentials and limitations of information and communication technology in crises, disasters, and emergencies. Although ICT plays an increasingly large role in crisis response and management, in-depth studies on crisis apps and similar technology in the context of an emergency have been missing. Based on responses by 1024 participants in Germany, we examine the diffusion, usage, perception and adoption of mobile crisis apps as well as required functions and improvements. We conclude that crisis apps are still a little-known form of disaster ICT, but have potential for enhancing communication, keeping users up to date and providing a more effective crisis management as supplement to other media channels dependent on different underlying infrastructures. However, they should be adaptable to user characteristics, consider privacy, allow communication and offer valuable information to raise awareness of potential disasters without creating an overload. Also, the familiarity with and trust in crisis apps should be addressed to maximize their beneficial impact on crisis communication and management. We discuss further implications as well as directions for future research with larger target groups and specific usage scenarios.},
    booktitle = {Mensch und {Computer} - {Tagungsband}},
    publisher = {ACM},
    author = {Grinko, Margarita and Kaufhold, Marc-André and Reuter, Christian},
    editor = {Alt, Florian and Bulling, Andreas and Döring, Tanja},
    year = {2019},
    keywords = {Student, UsableSec, Crisis, Projekt-KontiKat, Projekt-MAKI},
    pages = {263--274},
    }

  • Christian Reuter, Katja Häusser, Mona Bien, Franziska Herbert (2019)
    Between Effort and Security: User Assessment of the Adequacy of Security Mechanisms for App Categories
    Mensch und Computer – Tagungsband Hamburg, Germany. doi:10.1145/3340764.3340770
    [BibTeX] [Abstract] [Download PDF]

    With the increasing popularity of the smartphone, the number of people using it for financial transactions such as online shopping, online banking or mobile payment is also growing. Apps used in these contexts store sensitive and valuable data, creating a need for security measures. It has not yet been researched to what extent certain authentication mechanisms, which can be information-, biometric- as well as token-based, are suitable for individual apps and the respective data. The goal of this work is to assess how perceived security and estimated effort of using such mechanisms, as well as the degree to which app data is considered worth protecting, influence users‘ choices of appropriate measures to protect app categories. Therefore, we conducted a representative study (n=1024). On the one hand, our results show that a positive correlation between perceived security and effort exists for all investigated non-biometric authentication methods. On the other hand, the study sheds light on the differences between the investigated app categories and the users‘ choice of the appropriate security mechanisms for the particular category. In contrast to perceived security having a positive influence on a user’s preference of mechanism, a relation can hardly be identified for effort. Moreover, app data sensitivity does not seem relevant for the users‘ choice of security mechanism.

    @inproceedings{reuter_between_2019,
    address = {Hamburg, Germany},
    title = {Between {Effort} and {Security}: {User} {Assessment} of the {Adequacy} of {Security} {Mechanisms} for {App} {Categories}},
    url = {http://www.peasec.de/paper/2019/2019_ReuterHaeusserBienHerbert_EffortSecurity_MuC.pdf},
    doi = {10.1145/3340764.3340770},
    abstract = {With the increasing popularity of the smartphone, the number of people using it for financial transactions such as online shopping, online banking or mobile payment is also growing. Apps used in these contexts store sensitive and valuable data, creating a need for security measures. It has not yet been researched to what extent certain authentication mechanisms, which can be information-, biometric- as well as token-based, are suitable for individual apps and the respective data. The goal of this work is to assess how perceived security and estimated effort of using such mechanisms, as well as the degree to which app data is considered worth protecting, influence users' choices of appropriate measures to protect app categories. Therefore, we conducted a representative study (n=1024). On the one hand, our results show that a positive correlation between perceived security and effort exists for all investigated non-biometric authentication methods. On the other hand, the study sheds light on the differences between the investigated app categories and the users' choice of the appropriate security mechanisms for the particular category. In contrast to perceived security having a positive influence on a user's preference of mechanism, a relation can hardly be identified for effort. Moreover, app data sensitivity does not seem relevant for the users' choice of security mechanism.},
    booktitle = {Mensch und {Computer} - {Tagungsband}},
    publisher = {ACM},
    author = {Reuter, Christian and Häusser, Katja and Bien, Mona and Herbert, Franziska},
    editor = {Alt, Florian and Bulling, Andreas and Döring, Tanja},
    year = {2019},
    keywords = {Student, Security, UsableSec, HCI, Projekt-ATHENE-FANCY, Projekt-CROSSING, Projekt-CRISP},
    pages = {287--297},
    }

  • Gina Maria Schmidbauer-Wolf, Markus Guder (2019)
    Usability and UX of a Gaze Interaction Tool for Front Seat Passengers: Evaluation of a Gaze Controlled Optical Feedback System in a Car
    MuC’19: Proceedings of Mensch und Computer 2019 Hamburg, Germany. doi:10.1145/3340764.3344890
    [BibTeX] [Abstract] [Download PDF]

    Input modalities generally as well as in cars are evolving quickly regarding their spread and reliability. One possible input technique is gaze interaction, a topic still being researched. What are the front seat passengers‘ feelings towards gaze interaction, are they comfortable using it and do they think it is necessary? A laboratory experiment was conducted with 13 student participants, using a driving simulator, eye tracker, lamp and a driving wheel. Qualitative data was collected during and after the experiment through observation and a semi-structured interview. Quantitative data was collected through questionnaires (ATI, CTAM, SUS). The results were that the usability of the system was high but participants did not feel well using it.

    @inproceedings{schmidbauer-wolf_usability_2019,
    address = {Hamburg, Germany},
    title = {Usability and {UX} of a {Gaze} {Interaction} {Tool} for {Front} {Seat} {Passengers}: {Evaluation} of a {Gaze} {Controlled} {Optical} {Feedback} {System} in a {Car}},
    url = {www.peasec.de/paper/2019/2019_SchmidbauerWolfGuder_UsabilityUXGazeInteractionTool.pdf},
    doi = {10.1145/3340764.3344890},
    abstract = {Input modalities generally as well as in cars are evolving quickly regarding their spread and reliability. One possible input technique is gaze interaction, a topic still being researched. What are the front seat passengers' feelings towards gaze interaction, are they comfortable using it and do they think it is necessary? A laboratory experiment was conducted with 13 student participants, using a driving simulator, eye tracker, lamp and a driving wheel. Qualitative data was collected during and after the experiment through observation and a semi-structured interview. Quantitative data was collected through questionnaires (ATI, CTAM, SUS). The results were that the usability of the system was high but participants did not feel well using it.},
    booktitle = {{MuC}’19: {Proceedings} of {Mensch} und {Computer} 2019},
    publisher = {Gesellschaft für Informatik e.V.},
    author = {Schmidbauer-Wolf, Gina Maria and Guder, Markus},
    year = {2019},
    keywords = {Student, HCI},
    pages = {677--681},
    }

  • Timo Kalle, Marc-André Kaufhold, Franz Kuntke, Christian Reuter, Amr Rizk, Ralf Steinmetz (2019)
    Resilience in Security and Crises through Adaptions and Transitions
    INFORMATIK 2019: 50 Jahre Gesellschaft für Informatik – Informatik für Gesellschaft (Workshop-Beiträge), Lecture Notes in Informatics (LNI) Kassel, Germany. doi:10.18420/inf2019_ws60
    [BibTeX] [Abstract] [Download PDF]

    Currently, there is a tremendous number of communication technology and tems in use. Not only in the private user space, but also in business operations and societal areas, they are deeply involved: Ranging from messaging services or navigation over (critical) SCADA systems to whole digital cities and communities. Consequently, the view on communication networks in security and particularly crisis scenarios becomes inevitable. This paper examines the notions of resilience, adaption and transition within communication networks with a specific focus on crises. Based on a structured literature review, the fundamentals of resilience and communication networks are introduced. The paper then discusses the characteristics of (a) evolvability, accessibility, usability and diversity as well as (b) self-organization, -management, -optimization, – monitoring, -healing and -protection for communication network resilience. Finally, it outlines challenges and potentials of communication network resilience based in the use cases of security and crises.

    @inproceedings{kalle_resilience_2019,
    address = {Kassel, Germany},
    title = {Resilience in {Security} and {Crises} through {Adaptions} and {Transitions}},
    url = {https://dl.gi.de/bitstream/handle/20.500.12116/25097/paper12_02.pdf},
    doi = {10.18420/inf2019_ws60},
    abstract = {Currently, there is a tremendous number of communication technology and tems in use. Not only in the private user space, but also in business operations and societal areas, they are deeply involved: Ranging from messaging services or navigation over (critical) SCADA systems to whole digital cities and communities. Consequently, the view on communication networks in security and particularly crisis scenarios becomes inevitable. This paper examines the notions of resilience, adaption and transition within communication networks with a specific focus on crises. Based on a structured literature review, the fundamentals of resilience and communication networks are introduced. The paper then discusses the characteristics of (a) evolvability, accessibility, usability and diversity as well as (b) self-organization, -management, -optimization, - monitoring, -healing and -protection for communication network resilience. Finally, it outlines challenges and potentials of communication network resilience based in the use cases of security and crises.},
    booktitle = {{INFORMATIK} 2019: 50 {Jahre} {Gesellschaft} für {Informatik} – {Informatik} für {Gesellschaft} ({Workshop}-{Beiträge}), {Lecture} {Notes} in {Informatics} ({LNI})},
    publisher = {Gesellschaft für Informatik e. V.},
    author = {Kalle, Timo and Kaufhold, Marc-André and Kuntke, Franz and Reuter, Christian and Rizk, Amr and Steinmetz, Ralf},
    editor = {Draude, C. and Lange, M. and Sick, B.},
    year = {2019},
    keywords = {Student, Projekt-GeoBox, Security, UsableSec, Crisis, HCI, Projekt-MAKI, Ranking-CORE-C, Ranking-VHB-C},
    pages = {571--584},
    }

  • Thea Riebe, Marc-André Kaufhold, Tarun Kumar, Thomas Reinhold, Christian Reuter (2019)
    Threat Intelligence Application for Cyber Attribution
    SCIENCE PEACE SECURITY ’19 – Proceedings of the Interdisciplinary Conference on Technical Peace and Security Research Darmstadt, Germany.
    [BibTeX] [Abstract] [Download PDF]

    Attribution consists of technical, legal and politically defined processes. However, the interna- tional community has not yet defined processes unilaterally, even though the UN GGE has proposed to address the increase of cyber operations. Taking existing threat exchange stand- ards into account, this paper presents an approach to support efforts for more effective attrib- ution by developing a platform with the common open source threat exchange formats STIX and MEAC. Furthermore, the platform is evaluated in terms of usability.

    @inproceedings{riebe_threat_2019,
    address = {Darmstadt, Germany},
    title = {Threat {Intelligence} {Application} for {Cyber} {Attribution}},
    url = {https://tuprints.ulb.tu-darmstadt.de/id/eprint/9164},
    abstract = {Attribution consists of technical, legal and politically defined processes. However, the interna- tional community has not yet defined processes unilaterally, even though the UN GGE has proposed to address the increase of cyber operations. Taking existing threat exchange stand- ards into account, this paper presents an approach to support efforts for more effective attrib- ution by developing a platform with the common open source threat exchange formats STIX and MEAC. Furthermore, the platform is evaluated in terms of usability.},
    booktitle = {{SCIENCE} {PEACE} {SECURITY} '19 - {Proceedings} of the {Interdisciplinary} {Conference} on {Technical} {Peace} and {Security} {Research}},
    publisher = {TUprints},
    author = {Riebe, Thea and Kaufhold, Marc-André and Kumar, Tarun and Reinhold, Thomas and Reuter, Christian},
    editor = {Reuter, Christian and Altmann, Jürgen and Göttsche, Malte and Himmel, Mirko},
    year = {2019},
    keywords = {Peace, Student, Security, Projekt-DualUse},
    pages = {56--60},
    }

  • Sebastian Linsner, Rashmi Varma, Christian Reuter (2019)
    Vulnerability Assessment in the Smart Farming Infrastructure through Cyberattacks
    39. GIL-Jahrestagung: Informatik in der Land-, Forst- und Ernährungswirtschaft Fokus; Digitalisierung für landwirtschaftliche Betriebe in kleinstrukturierten Regionen – ein Widerspruch in sich?, Lecture Notes in Informatics (LNI) Wien, Austria.
    [BibTeX] [Abstract] [Download PDF]

    The Internet of Things (IoT) has a significant impact on agriculture. So-called Smart Farming uses drones and a variety of sensors to measure climate, irrigation, soil moisture or GPS position. With this rapid influx of technology increases the threat that vulnerabilities in those technologies are being exploited for malicious intent. To show the impact of cyberattacks on agriculture, we present a simulation of several attacks on a ZigBee-based wireless sensor network. We conduct a delay attack, an interference attack and three different routing attacks (sinkhole, blackhole and selective forwarding attack). Those attacks are simulated using NETA with the OMNET++ framework. We will show that the security of WSN is influenced by factors like energy consumption or computation power, which can conflict with other interests like low per-unit costs.

    @inproceedings{linsner_vulnerability_2019,
    address = {Wien, Austria},
    title = {Vulnerability {Assessment} in the {Smart} {Farming} {Infrastructure} through {Cyberattacks}},
    url = {http://gil-net.de/Publikationen/139_119.pdf},
    abstract = {The Internet of Things (IoT) has a significant impact on agriculture. So-called Smart Farming uses drones and a variety of sensors to measure climate, irrigation, soil moisture or GPS position. With this rapid influx of technology increases the threat that vulnerabilities in those technologies are being exploited for malicious intent. To show the impact of cyberattacks on agriculture, we present a simulation of several attacks on a ZigBee-based wireless sensor network. We conduct a delay attack, an interference attack and three different routing attacks (sinkhole, blackhole and selective forwarding attack). Those attacks are simulated using NETA with the OMNET++ framework. We will show that the security of WSN is influenced by factors like energy consumption or computation power, which can conflict with other interests like low per-unit costs.},
    booktitle = {39. {GIL}-{Jahrestagung}: {Informatik} in der {Land}-, {Forst}- und {Ernährungswirtschaft} {Fokus}; {Digitalisierung} für landwirtschaftliche {Betriebe} in kleinstrukturierten {Regionen} – ein {Widerspruch} in sich?, {Lecture} {Notes} in {Informatics} ({LNI})},
    publisher = {Gesellschaft für Informatik},
    author = {Linsner, Sebastian and Varma, Rashmi and Reuter, Christian},
    editor = {Meyer-Aurich, A.},
    year = {2019},
    keywords = {Student, Projekt-GeoBox, RSF, Security, Projekt-CROSSING, Infrastructure, Projekt-HyServ, Ranking-CORE-C, Ranking-VHB-C},
    pages = {119--124},
    }

  • Larissa Aldehoff, Meri Dankenbring, Christian Reuter (2019)
    Renouncing Privacy in Crisis Management? People’s View on Social Media Monitoring and Surveillance
    Proceedings of the Information Systems for Crisis Response and Management (ISCRAM) València, Spain.
    [BibTeX] [Abstract] [Download PDF]

    Social media is used during crises and disasters by state authorities and citizens to communicate and provide, gain and analyze information. Monitoring of platforms in such cases is both a well-established practice and a research area. The question, whether people are willing to renounce privacy in social media during critical incidents, or even allow surveillance in order to contribute to public security, remains unanswered. Our survey of 1,024 German inhabitants is the first empirical study on people’s views on social media monitoring and surveillance in crisis management. We find the willingness to share data during an imminent threat depends mostly on the type of data: a majority (63\% and 67\%, respectively) would give access to addresses and telephone numbers, whereas the willingness to share content of chats or telephone calls is significantly lower (27\%). Our analysis reveals diverging opinions among participants and some effects of sociodemographic variables on the acceptance of invasions into privacy.

    @inproceedings{aldehoff_renouncing_2019,
    address = {València, Spain},
    title = {Renouncing {Privacy} in {Crisis} {Management}? {People}'s {View} on {Social} {Media} {Monitoring} and {Surveillance}},
    url = {http://www.peasec.de/paper/2019/2019_AldehoffDankenbringReuter_RenouncingPrivacyCrisisManagement_ISCRAM.pdf},
    abstract = {Social media is used during crises and disasters by state authorities and citizens to communicate and provide, gain and analyze information. Monitoring of platforms in such cases is both a well-established practice and a research area. The question, whether people are willing to renounce privacy in social media during critical incidents, or even allow surveillance in order to contribute to public security, remains unanswered. Our survey of 1,024 German inhabitants is the first empirical study on people's views on social media monitoring and surveillance in crisis management. We find the willingness to share data during an imminent threat depends mostly on the type of data: a majority (63\% and 67\%, respectively) would give access to addresses and telephone numbers, whereas the willingness to share content of chats or telephone calls is significantly lower (27\%). Our analysis reveals diverging opinions among participants and some effects of sociodemographic variables on the acceptance of invasions into privacy.},
    booktitle = {Proceedings of the {Information} {Systems} for {Crisis} {Response} and {Management} ({ISCRAM})},
    publisher = {ISCRAM Association},
    author = {Aldehoff, Larissa and Dankenbring, Meri and Reuter, Christian},
    editor = {Franco, Zeno and González, José J. and Canós, José H.},
    year = {2019},
    keywords = {Peace, Student, Security, UsableSec, Crisis, Projekt-ATHENE-FANCY, Projekt-CROSSING, SocialMedia, Projekt-DualUse, Projekt-CRISP},
    pages = {1184--1197},
    }

  • Amanda Langer, Marc-André Kaufhold, Elena Runft, Christian Reuter, Margarita Grinko, Volkmar Pipek (2019)
    Counter Narratives in Social Media: An Empirical Study on Combat and Prevention of Terrorism
    Proceedings of the Information Systems for Crisis Response and Management (ISCRAM) València, Spain.
    [BibTeX] [Abstract] [Download PDF]

    With the increase of terrorist attacks and spreading extremism worldwide, countermeasures advance as well. Often social media is used for recruitment and radicalization of susceptible target groups. Counter narratives are trying to disclose the illusion created by radical and extremist groups through a purposive and educational counter statement, and to initiate a rethinking in the affected individuals via thought-provoking impulses and advice. This exploratory study investigates counter narrative campaigns with regard to their fight and prevention against terrorism in social media. Posts with strong emotions and a personal reference to affected individuals achieved the highest impact and most reactions from the target group. Furthermore, our results illustrate that the impact of a counter narrative campaign cannot be measured solely according to the reaction rate to their postings and that further analysis steps are therefore necessary for the final evaluation of the campaigns.

    @inproceedings{langer_counter_2019,
    address = {València, Spain},
    title = {Counter {Narratives} in {Social} {Media}: {An} {Empirical} {Study} on {Combat} and {Prevention} of {Terrorism}},
    url = {http://www.peasec.de/paper/2019/2019_Langeretal_Counternarratives_ISCRAM.pdf},
    abstract = {With the increase of terrorist attacks and spreading extremism worldwide, countermeasures advance as well. Often social media is used for recruitment and radicalization of susceptible target groups. Counter narratives are trying to disclose the illusion created by radical and extremist groups through a purposive and educational counter statement, and to initiate a rethinking in the affected individuals via thought-provoking impulses and advice. This exploratory study investigates counter narrative campaigns with regard to their fight and prevention against terrorism in social media. Posts with strong emotions and a personal reference to affected individuals achieved the highest impact and most reactions from the target group. Furthermore, our results illustrate that the impact of a counter narrative campaign cannot be measured solely according to the reaction rate to their postings and that further analysis steps are therefore necessary for the final evaluation of the campaigns.},
    booktitle = {Proceedings of the {Information} {Systems} for {Crisis} {Response} and {Management} ({ISCRAM})},
    publisher = {ISCRAM Association},
    author = {Langer, Amanda and Kaufhold, Marc-André and Runft, Elena and Reuter, Christian and Grinko, Margarita and Pipek, Volkmar},
    editor = {Franco, Zeno and González, José J. and Canós, José H.},
    year = {2019},
    keywords = {Peace, Student, Crisis, SocialMedia, Projekt-KontiKat},
    pages = {746--755},
    }

  • Thea Riebe, Amanda Langer, Marc-André Kaufhold, Nina Katharina Kretschmer, Christian Reuter (2019)
    Werte und Wertekonflikte in sozialen Medien für die Vernetzung ungebundener Helfer in Krisensituationen – Ein Value-Sensitive Design Ansatz
    Mensch und Computer 2019 – Workshopband Hamburg, Germany. doi:10.18420/muc2019-ws-133-05
    [BibTeX] [Abstract] [Download PDF]

    Bereits während des Hochwassers in Mitteleuropa 2013 und der Flüchtlingskrise in Europa ab 2015 wurde deutlich, dass freiwillige HelferInnen die Bewältigung von Krisensituationen unterstützen. Durch die vermehrte Koordination der Helfenden, auch unter Ein- satz sozialer Medien, kommt es zunehmend zu Konflikten zwi- schen den teilweise kollidierenden Erwartungshaltungen periodi- sierter Werte der eingebundenen Akteure. Die Entwicklung von Kollaborationswerkzeugen mit Hilfe der Methode des Value-Sen- sitive Designs kann bereits im Vorfeld solche Konflikte aufzeigen und gezielt verhindern oder moderieren. Dazu wurde in einer Fall- studie anhand des Hochwassers 2013 induktiv abgeleitet, welche Werte und Erwartungen die unterschiedlichen Stakeholder haben, und welche Konflikte sich daraus im Hinblick auf die Anforderun- gen ergeben. Diese Studie zeigt insbesondere die Konfliktpotenzi- ale für freiwillige HelferInnen in sozialen Medien in Bezug auf den Schutz der Privatsphäre und vor Diskriminierung auf und leistet damit einen Beitrag für die Konflikt-Optimierung und Akzeptanz- steigerung des Einsatzes sozialer Medien im Katastrophenschutz.

    @inproceedings{riebe_werte_2019,
    address = {Hamburg, Germany},
    title = {Werte und {Wertekonflikte} in sozialen {Medien} für die {Vernetzung} ungebundener {Helfer} in {Krisensituationen} – {Ein} {Value}-{Sensitive} {Design} {Ansatz}},
    url = {https://dl.gi.de/bitstream/handle/20.500.12116/25150/133-05.pdf},
    doi = {10.18420/muc2019-ws-133-05},
    abstract = {Bereits während des Hochwassers in Mitteleuropa 2013 und der Flüchtlingskrise in Europa ab 2015 wurde deutlich, dass freiwillige HelferInnen die Bewältigung von Krisensituationen unterstützen. Durch die vermehrte Koordination der Helfenden, auch unter Ein- satz sozialer Medien, kommt es zunehmend zu Konflikten zwi- schen den teilweise kollidierenden Erwartungshaltungen periodi- sierter Werte der eingebundenen Akteure. Die Entwicklung von Kollaborationswerkzeugen mit Hilfe der Methode des Value-Sen- sitive Designs kann bereits im Vorfeld solche Konflikte aufzeigen und gezielt verhindern oder moderieren. Dazu wurde in einer Fall- studie anhand des Hochwassers 2013 induktiv abgeleitet, welche Werte und Erwartungen die unterschiedlichen Stakeholder haben, und welche Konflikte sich daraus im Hinblick auf die Anforderun- gen ergeben. Diese Studie zeigt insbesondere die Konfliktpotenzi- ale für freiwillige HelferInnen in sozialen Medien in Bezug auf den Schutz der Privatsphäre und vor Diskriminierung auf und leistet damit einen Beitrag für die Konflikt-Optimierung und Akzeptanz- steigerung des Einsatzes sozialer Medien im Katastrophenschutz.},
    booktitle = {Mensch und {Computer} 2019 - {Workshopband}},
    publisher = {Gesellschaft für Informatik e.V.},
    author = {Riebe, Thea and Langer, Amanda and Kaufhold, Marc-André and Kretschmer, Nina Katharina and Reuter, Christian},
    year = {2019},
    keywords = {Peace, Student, Security, Crisis, SocialMedia, Projekt-DualUse, Projekt-KontiKat},
    pages = {308--318},
    }

  • Katrin Hartwig, Christian Reuter (2019)
    TrustyTweet: An Indicator-based Browser-Plugin to Assist Users in Dealing with Fake News on Twitter
    Proceedings of the International Conference on Wirtschaftsinformatik (WI) Siegen, Germany.
    [BibTeX] [Abstract] [Download PDF]

    The importance of dealing withfake newsonsocial mediahas increased both in political and social contexts.While existing studies focus mainly on how to detect and label fake news, approaches to assist usersin making their own assessments are largely missing. This article presents a study on how Twitter-users’assessmentscan be supported by an indicator-based white-box approach.First, we gathered potential indicators for fake news that have proven to be promising in previous studies and that fit our idea of awhite-box approach. Based on those indicators we then designed and implemented the browser-plugin TrusyTweet, which assists users on Twitterin assessing tweetsby showing politically neutral and intuitive warnings without creating reactance. Finally, we suggest the findings of our evaluations with a total of 27 participants which lead to further design implicationsfor approachesto assistusers in dealing with fake news.

    @inproceedings{hartwig_trustytweet_2019,
    address = {Siegen, Germany},
    title = {{TrustyTweet}: {An} {Indicator}-based {Browser}-{Plugin} to {Assist} {Users} in {Dealing} with {Fake} {News} on {Twitter}},
    url = {http://www.peasec.de/paper/2019/2019_HartwigReuter_TrustyTweet_WI.pdf},
    abstract = {The importance of dealing withfake newsonsocial mediahas increased both in political and social contexts.While existing studies focus mainly on how to detect and label fake news, approaches to assist usersin making their own assessments are largely missing. This article presents a study on how Twitter-users'assessmentscan be supported by an indicator-based white-box approach.First, we gathered potential indicators for fake news that have proven to be promising in previous studies and that fit our idea of awhite-box approach. Based on those indicators we then designed and implemented the browser-plugin TrusyTweet, which assists users on Twitterin assessing tweetsby showing politically neutral and intuitive warnings without creating reactance. Finally, we suggest the findings of our evaluations with a total of 27 participants which lead to further design implicationsfor approachesto assistusers in dealing with fake news.},
    booktitle = {Proceedings of the {International} {Conference} on {Wirtschaftsinformatik} ({WI})},
    publisher = {AIS},
    author = {Hartwig, Katrin and Reuter, Christian},
    year = {2019},
    keywords = {Peace, Student, Crisis, HCI, Projekt-ATHENE-FANCY, SocialMedia, Projekt-CRISP, Ranking-CORE-C, Ranking-VHB-C, Ranking-WKWI-A},
    pages = {1858--1869},
    }

  • Christian Reuter, Katrin Hartwig, Jan Kirchner, Noah Schlegel (2019)
    Fake News Perception in Germany: A Representative Study of People’s Attitudes and Approaches to Counteract Disinformation
    Proceedings of the International Conference on Wirtschaftsinformatik (WI) Siegen, Germany.
    [BibTeX] [Abstract] [Download PDF]

    Fake news has become an important topic in our social and political environment. While research is coming up for the U.S. and European countries, many aspects remain uncovered as long as existing work only marginally inves-tigates people’s attitudes towards fake news. In this work, we present the results of a representative study (N=1023) in Germany asking participants about their attitudes towards fake news and approaches to counteract disinformation. More than 80\% of the participants agree that fake news poses a threat. 78\% see fake news as harming democracy. Even though about half of the respondents (48\%) have noticed fake news, most participants stated to have never liked, shared or commented on fake news. Regarding demographic factors, our findings support the view of younger and relatively educated people being more informed about fake news. Concerning ideological motives, the evaluation suggests left-wing or liberal respondents to be more critical of fake news

    @inproceedings{reuter_fake_2019-1,
    address = {Siegen, Germany},
    title = {Fake {News} {Perception} in {Germany}: {A} {Representative} {Study} of {People}'s {Attitudes} and {Approaches} to {Counteract} {Disinformation}},
    url = {http://www.peasec.de/paper/2019/2019_ReuterHartwigKirchnerSchlegel_FakeNewsPerceptionGermany_WI.pdf},
    abstract = {Fake news has become an important topic in our social and political environment. While research is coming up for the U.S. and European countries, many aspects remain uncovered as long as existing work only marginally inves-tigates people's attitudes towards fake news. In this work, we present the results of a representative study (N=1023) in Germany asking participants about their attitudes towards fake news and approaches to counteract disinformation. More than 80\% of the participants agree that fake news poses a threat. 78\% see fake news as harming democracy. Even though about half of the respondents (48\%) have noticed fake news, most participants stated to have never liked, shared or commented on fake news. Regarding demographic factors, our findings support the view of younger and relatively educated people being more informed about fake news. Concerning ideological motives, the evaluation suggests left-wing or liberal respondents to be more critical of fake news},
    booktitle = {Proceedings of the {International} {Conference} on {Wirtschaftsinformatik} ({WI})},
    publisher = {AIS},
    author = {Reuter, Christian and Hartwig, Katrin and Kirchner, Jan and Schlegel, Noah},
    year = {2019},
    keywords = {Peace, Student, Crisis, HCI, SocialMedia, Ranking-CORE-C, Ranking-VHB-C, Ranking-WKWI-A},
    pages = {1069--1083},
    }

  • Stefka Schmid, Thea Riebe, Christian Reuter (2019)
    Meaningful Human Control of Lethal Autonomous Weapon Systems
    In: Christian Reuter, Jürgen Altmann, Malte Göttsche, Mirko Himmel: SCIENCE PEACE SECURITY ’19 – Proceedings of the Interdisciplinary Conference on Technical Peace and Security Research. Darmstadt, Germany: TUprints, , 196–200.
    [BibTeX] [Abstract] [Download PDF]

    In the discussion of lethal autonomous weapon systems (LAWS) in the expert forum of the Convention on Certain Conventional Weapons (CCW), the interpretation of crucial concepts such as autonomy and human control is decisive for the future direction of international hu- manitarian law. Starting from the perspective of a synthesis of Actor-Network Theory (ANT) and Value-Sensitive-Design (VSD), we aim to analyse the discourse of LAWS and ask for pos- sibilities to implement Meaningful Human Control.

    @incollection{schmid_meaningful_2019,
    address = {Darmstadt, Germany},
    title = {Meaningful {Human} {Control} of {Lethal} {Autonomous} {Weapon} {Systems}},
    url = {https://tuprints.ulb.tu-darmstadt.de/id/eprint/9164},
    abstract = {In the discussion of lethal autonomous weapon systems (LAWS) in the expert forum of the Convention on Certain Conventional Weapons (CCW), the interpretation of crucial concepts such as autonomy and human control is decisive for the future direction of international hu- manitarian law. Starting from the perspective of a synthesis of Actor-Network Theory (ANT) and Value-Sensitive-Design (VSD), we aim to analyse the discourse of LAWS and ask for pos- sibilities to implement Meaningful Human Control.},
    booktitle = {{SCIENCE} {PEACE} {SECURITY} '19 - {Proceedings} of the {Interdisciplinary} {Conference} on {Technical} {Peace} and {Security} {Research}},
    publisher = {TUprints},
    author = {Schmid, Stefka and Riebe, Thea and Reuter, Christian},
    editor = {Reuter, Christian and Altmann, Jürgen and Göttsche, Malte and Himmel, Mirko},
    year = {2019},
    keywords = {Peace, Student, Security, Projekt-DualUse},
    pages = {196--200},
    }

    2018

  • Simon Scholl, Christian Reuter, Thomas Ludwig, Marc-André Kaufhold (2018)
    SocialML: EUD im Maschine Learning zur Analyse sozialer Medien
    Mensch und Computer – Tagungsband Dresden, Germany.
    [BibTeX] [Abstract] [Download PDF]

    Die Analyse sozialer Medien hat eine enorme Bedeutung für die verschiedensten Bereiche, wie bei-spielsweise die Lagebeurteilung, journalistische Recherchen oder unternehmerische Analysen. Dabei sind die entsprechenden Analysten unterschiedlichen Kontextfaktoren unterworfen. Sei es durch ihren organisationalen Hintergrund, durch tätigkeitsbezogene Rollen oder den geografischen und zeitlichen Rahmen. Um den ständig im Wandel begriffenen Kontexten gerecht zu werden, ergeben sich permanent neue Herausforderungen für die Anpassbarkeit der Analyse. Dieser Beitrag untersucht, wie ein auf Machine Lear-ning (ML) basierendes Tool zur Social Media Analyse (SMA) im Sinne des End-User Development (EUD) auf verschiedenen Komplexitäts- und Schrittebenen umgesetzt werden kann.

    @inproceedings{scholl_socialml_2018,
    address = {Dresden, Germany},
    title = {{SocialML}: {EUD} im {Maschine} {Learning} zur {Analyse} sozialer {Medien}},
    url = {https://dl.gi.de/bitstream/handle/20.500.12116/16668/Beitrag_347_final__a.pdf},
    abstract = {Die Analyse sozialer Medien hat eine enorme Bedeutung für die verschiedensten Bereiche, wie bei-spielsweise die Lagebeurteilung, journalistische Recherchen oder unternehmerische Analysen. Dabei sind die entsprechenden Analysten unterschiedlichen Kontextfaktoren unterworfen. Sei es durch ihren organisationalen Hintergrund, durch tätigkeitsbezogene Rollen oder den geografischen und zeitlichen Rahmen. Um den ständig im Wandel begriffenen Kontexten gerecht zu werden, ergeben sich permanent neue Herausforderungen für die Anpassbarkeit der Analyse. Dieser Beitrag untersucht, wie ein auf Machine Lear-ning (ML) basierendes Tool zur Social Media Analyse (SMA) im Sinne des End-User Development (EUD) auf verschiedenen Komplexitäts- und Schrittebenen umgesetzt werden kann.},
    booktitle = {Mensch und {Computer} - {Tagungsband}},
    publisher = {Gesellschaft für Informatik e.V.},
    author = {Scholl, Simon and Reuter, Christian and Ludwig, Thomas and Kaufhold, Marc-André},
    year = {2018},
    keywords = {Student, Crisis, HCI, SocialMedia, Projekt-KontiKat},
    pages = {443--446},
    }

  • Marc-André Kaufhold, Christian Reuter, Tobias Ermert (2018)
    Interaktionsdesign eines Risiko-Bewertungskonzepts für KMU
    Mensch und Computer – Tagungsband Dresden, Germany.
    [BibTeX] [Abstract] [Download PDF]

    Betriebsstörungen, Naturkatastrophen und andere Notfallszenarien bedrohen die Fortdauer von Unternehmen. Hierzu stellt Business Continuity Management (BCM) Maßnahmen zur Identifika-tion von Bedrohungen und Risiken sowie zum Aufbau der Belastbarkeit von Organisationen bereit. In der Forschung mangelt es jedoch an Ansätzen, welche BCM in kleinen und mittleren Unternehmen (KMU) unterstützen. In diesem Kurzbeitrag wird ein Konzept für KMU vorgestellt, welches die Identifikation und Bewertung von Risiken unterstützt, Bewältigungsmaßnahmen anbietet und unternehmensspezifische Risikoinformationen auf einem Dashboard visualisiert.

    @inproceedings{kaufhold_interaktionsdesign_2018,
    address = {Dresden, Germany},
    title = {Interaktionsdesign eines {Risiko}-{Bewertungskonzepts} für {KMU}},
    url = {https://dl.gi.de/bitstream/handle/20.500.12116/16626/Beitrag_356_final__a.pdf},
    abstract = {Betriebsstörungen, Naturkatastrophen und andere Notfallszenarien bedrohen die Fortdauer von Unternehmen. Hierzu stellt Business Continuity Management (BCM) Maßnahmen zur Identifika-tion von Bedrohungen und Risiken sowie zum Aufbau der Belastbarkeit von Organisationen bereit. In der Forschung mangelt es jedoch an Ansätzen, welche BCM in kleinen und mittleren Unternehmen (KMU) unterstützen. In diesem Kurzbeitrag wird ein Konzept für KMU vorgestellt, welches die Identifikation und Bewertung von Risiken unterstützt, Bewältigungsmaßnahmen anbietet und unternehmensspezifische Risikoinformationen auf einem Dashboard visualisiert.},
    booktitle = {Mensch und {Computer} - {Tagungsband}},
    publisher = {Gesellschaft für Informatik e.V.},
    author = {Kaufhold, Marc-André and Reuter, Christian and Ermert, Tobias},
    year = {2018},
    keywords = {Student, RSF, Security, UsableSec, Crisis, HCI, Projekt-KontiKat, Projekt-CRISP, Infrastructure, Projekt-HyServ},
    pages = {309--312},
    }

  • Marc-André Kaufhold, Thea Riebe, Christian Reuter, Julian Hester, Danny Jeske, Lisa Knüver, Viktoria Richert (2018)
    Business Continuity Management in Micro Enterprises: Perception, Strategies and Use of ICT
    International Journal of Information Systems for Crisis Response and Management (IJISCRAM) ;10(1):1–19. doi:10.4018/IJISCRAM.2018010101
    [BibTeX] [Abstract] [Download PDF]

    Small and medium-sized enterprises (SMEs) represent 99\% of enterprises in Germany and more than 95\% in the European Union. Given the recent increase of natural disasters and man-made crises and emergencies, it seems an important economic goal to ascertain that SMEs are capable of maintaining their work, revenue and profit at an acceptable level. According to ISO 22301, business continuity management (BCM) is a holistic management process which identifies potential threats and their impact to an organization and serves as a framework to increase organizational resilience and response capabilities. Prior research identified that BCM is under-represented in SMEs and that their security level is partially in an uneconomical range. This article presents the analysis of interviews with 19 independent micro enterprises highlighting findings on their low crisis awareness, varying technical dependency, existing action strategies and communication strategies and proposing a categorization of micro enterprises as preventive technicians, data-intensive chains or pragmatic jumpers.

    @article{kaufhold_business_2018,
    title = {Business {Continuity} {Management} in {Micro} {Enterprises}: {Perception}, {Strategies} and {Use} of {ICT}},
    volume = {10},
    url = {http://www.peasec.de/paper/2018/2018_KaufholdRiebeReuteretal_BusinessContinuityManagementinMicroEnterprises_IJISCRAM.pdf},
    doi = {10.4018/IJISCRAM.2018010101},
    abstract = {Small and medium-sized enterprises (SMEs) represent 99\% of enterprises in Germany and more than 95\% in the European Union. Given the recent increase of natural disasters and man-made crises and emergencies, it seems an important economic goal to ascertain that SMEs are capable of maintaining their work, revenue and profit at an acceptable level. According to ISO 22301, business continuity management (BCM) is a holistic management process which identifies potential threats and their impact to an organization and serves as a framework to increase organizational resilience and response capabilities. Prior research identified that BCM is under-represented in SMEs and that their security level is partially in an uneconomical range. This article presents the analysis of interviews with 19 independent micro enterprises highlighting findings on their low crisis awareness, varying technical dependency, existing action strategies and communication strategies and proposing a categorization of micro enterprises as preventive technicians, data-intensive chains or pragmatic jumpers.},
    number = {1},
    journal = {International Journal of Information Systems for Crisis Response and Management (IJISCRAM)},
    author = {Kaufhold, Marc-André and Riebe, Thea and Reuter, Christian and Hester, Julian and Jeske, Danny and Knüver, Lisa and Richert, Viktoria},
    year = {2018},
    keywords = {Student, RSF, Security, Crisis, Projekt-KontiKat, Infrastructure, Projekt-MAKI, Cooperation},
    pages = {1--19},
    }

  • Christian Reuter, Gerhard Backfried, Marc-André Kaufhold, Fabian Spahr (2018)
    ISCRAM turns 15: A Trend Analysis of Social Media Papers 2004-2017
    Proceedings of the Information Systems for Crisis Response and Management (ISCRAM) Rochester, New York, USA.
    [BibTeX] [Abstract] [Download PDF]

    In 2004, Information Systems for Crisis Response and Management (ISCRAM) was a new area of research. Pio- neering researchers from different continents and disciplines found fellowship at the first ISCRAM workshop. Around the same time, the use of social media in crises was first recognized in academia. In 2018, the 15 th IS- CRAM conference will take place, which gives us the possibility to look back on what has already been achieved with regard to IT support in crises using social media. With this article, we examine trends and developments with a specific focus on social media. We analyzed all papers published at previous ISCRAMs (n=1339). Our analysis shows that various platforms, the use of language and coverage of different types of disasters follow certain trends – most noticeably a dominance of Twitter, English and crises with large impacts such as hurricanes or earthquakes can be seen.

    @inproceedings{reuter_iscram_2018,
    address = {Rochester, New York, USA},
    title = {{ISCRAM} turns 15: {A} {Trend} {Analysis} of {Social} {Media} {Papers} 2004-2017},
    url = {http://www.peasec.de/paper/2018/2018_ReuterBackfriedKaufholdSpahn_15YearsISCRAM.pdf},
    abstract = {In 2004, Information Systems for Crisis Response and Management (ISCRAM) was a new area of research. Pio- neering researchers from different continents and disciplines found fellowship at the first ISCRAM workshop. Around the same time, the use of social media in crises was first recognized in academia. In 2018, the 15 th IS- CRAM conference will take place, which gives us the possibility to look back on what has already been achieved with regard to IT support in crises using social media. With this article, we examine trends and developments with a specific focus on social media. We analyzed all papers published at previous ISCRAMs (n=1339). Our analysis shows that various platforms, the use of language and coverage of different types of disasters follow certain trends – most noticeably a dominance of Twitter, English and crises with large impacts such as hurricanes or earthquakes can be seen.},
    booktitle = {Proceedings of the {Information} {Systems} for {Crisis} {Response} and {Management} ({ISCRAM})},
    publisher = {ISCRAM},
    author = {Reuter, Christian and Backfried, Gerhard and Kaufhold, Marc-André and Spahr, Fabian},
    editor = {Boersma, Kees and Tomaszewski, Brian},
    year = {2018},
    keywords = {Student, Crisis, HCI, SocialMedia, Projekt-KontiKat},
    pages = {1--14},
    }

  • Christian Reuter, Wolfgang Schneider, Daniel Eberz, Markus Bayer, Daniel Hartung, Cemal Kaygusuz (2018)
    Resiliente Digitalisierung der kritischen Infrastruktur Landwirtschaft – mobil, dezentral, ausfallsicher
    Mensch und Computer 2018 – Workshopband Dresden, Germany.
    [BibTeX] [Abstract] [Download PDF]

    Diese Arbeit befasst sich mit der zunehmenden Digitalisierung der kritischen Infrastruktur Ernährungswirtschaft und setzt den Fokus insbesondere auf die dadurch resultierenden in-formationstechnologischen Folgen bezüglich der Angriffs- und Ausfallsicherheit in der Landwirtschaft und von ihr abhängigen Sektoren. In diesem Kontext wird die Modernisie-rungen der Landmaschinen und deren Vernetzung sowie das Cloud-Computing in der Landwirtschaft analysiert und zu treffende Maßnahmen bezüglich einer resilienten Struktur erläutert. In vielen Bereichen wird dabei aufgezeigt, dass das Ausfallrisiko der Produktion zugunsten von Vorteilen wie Ertrags- und Qualitätssteigerung vernachlässigt wird.

    @inproceedings{reuter_resiliente_2018,
    address = {Dresden, Germany},
    title = {Resiliente {Digitalisierung} der kritischen {Infrastruktur} {Landwirtschaft} - mobil, dezentral, ausfallsicher},
    url = {https://dl.gi.de/bitstream/handle/20.500.12116/16930/Beitrag_330_final__a.pdf},
    abstract = {Diese Arbeit befasst sich mit der zunehmenden Digitalisierung der kritischen Infrastruktur Ernährungswirtschaft und setzt den Fokus insbesondere auf die dadurch resultierenden in-formationstechnologischen Folgen bezüglich der Angriffs- und Ausfallsicherheit in der Landwirtschaft und von ihr abhängigen Sektoren. In diesem Kontext wird die Modernisie-rungen der Landmaschinen und deren Vernetzung sowie das Cloud-Computing in der Landwirtschaft analysiert und zu treffende Maßnahmen bezüglich einer resilienten Struktur erläutert. In vielen Bereichen wird dabei aufgezeigt, dass das Ausfallrisiko der Produktion zugunsten von Vorteilen wie Ertrags- und Qualitätssteigerung vernachlässigt wird.},
    booktitle = {Mensch und {Computer} 2018 - {Workshopband}},
    publisher = {Gesellschaft für Informatik e.V.},
    author = {Reuter, Christian and Schneider, Wolfgang and Eberz, Daniel and Bayer, Markus and Hartung, Daniel and Kaygusuz, Cemal},
    editor = {Dachselt, Raimund and Weber, Gerhard},
    year = {2018},
    keywords = {Student, Projekt-GeoBox, RSF, Crisis, Projekt-KontiKat, Infrastructure, Projekt-MAKI, Projekt-HyServ},
    pages = {623--632},
    }

  • Thea Riebe, Katja Pätsch, Marc-André Kaufhold, Christian Reuter (2018)
    From Conspiracies to Insults: A Case Study of Radicalisation in Social Media Discourse
    Mensch und Computer 2018 – Workshopband Dresden, Germany.
    [BibTeX] [Abstract] [Download PDF]

    Online radicalisation is often linked to discourses on social media. In this context, the question arises how populist online discourses radicalise in social media platforms. With a quantitative content analysis of supporters of the German party “Alternative für Deutschland (AfD)” and their contributions on Facebook between March 2014 and May 2017, this preliminary analysis illustrates how the discourse shifts from a dominantly neutral debate to insult-driven and dis-criminatory contributions. It provides insights into the dynamic of political social media dis-courses and shows a tendency of correlating language style and topics that can be further studied in Social Media Analytics.

    @inproceedings{riebe_conspiracies_2018,
    address = {Dresden, Germany},
    title = {From {Conspiracies} to {Insults}: {A} {Case} {Study} of {Radicalisation} in {Social} {Media} {Discourse}},
    url = {https://dl.gi.de/bitstream/handle/20.500.12116/16795/Beitrag_449_final__a.pdf},
    abstract = {Online radicalisation is often linked to discourses on social media. In this context, the question arises how populist online discourses radicalise in social media platforms. With a quantitative content analysis of supporters of the German party “Alternative für Deutschland (AfD)” and their contributions on Facebook between March 2014 and May 2017, this preliminary analysis illustrates how the discourse shifts from a dominantly neutral debate to insult-driven and dis-criminatory contributions. It provides insights into the dynamic of political social media dis-courses and shows a tendency of correlating language style and topics that can be further studied in Social Media Analytics.},
    booktitle = {Mensch und {Computer} 2018 - {Workshopband}},
    publisher = {Gesellschaft für Informatik e.V.},
    author = {Riebe, Thea and Pätsch, Katja and Kaufhold, Marc-André and Reuter, Christian},
    editor = {Dachselt, Raimund and Weber, Gerhard},
    year = {2018},
    keywords = {Peace, Student, Crisis, HCI, SocialMedia, Projekt-KontiKat, Projekt-CRISP},
    pages = {595--603},
    }

  • Marc-André Kaufhold, Christian Reuter, Thea Riebe, Elmar von Radziewski (2018)
    Design eines BCM-Dashboards für kleine und mittlere Unternehmen
    Mensch und Computer 2018 – Workshopband Dresden, Germany.
    [BibTeX] [Abstract] [Download PDF]

    Business Continuity Management (BCM) ist definiert als ganzheitlicher Managementprozess, der poten-zielle Bedrohungen für Organisationen und die Auswirkungen ermittelt, sowie ein Gerüst zum Aufbau der Belastbarkeit einer Organisation bereitstellt. Bereits existierende Ansätze in der Forschung legen den Fokus allerdings auf große Konzerne, während die Umsetzung eines BCM-Konzepts für kleine und mittlere Unternehmen (KMU) oft an den knappen finanziellen und personellen Ressourcen, aber auch an der Komplexität des BCM scheitert. Um KMU bei der Implementierung eines an deren Bedürfnisse angepasstem BCM-Systems (BCMS) zu unterstützen, gibt es in der Forschung nur wenige Lösungsan-sätze. Dieser Artikel stellt auf Basis einer empirischen Studie, welche Umsetzungsfaktoren für BCM und Anforderungen für BCMS untersucht, das prototypische Design eines BCM-Dashboards vor, welches mit wenig Konfigurationsaufwand möglichst relevante externe und interne Gefahrenquellen in einer kom-pakten Übersicht darzustellen vermag.

    @inproceedings{kaufhold_design_2018,
    address = {Dresden, Germany},
    title = {Design eines {BCM}-{Dashboards} für kleine und mittlere {Unternehmen}},
    url = {https://dl.gi.de/bitstream/handle/20.500.12116/16796/Beitrag_453_final__a.pdf},
    abstract = {Business Continuity Management (BCM) ist definiert als ganzheitlicher Managementprozess, der poten-zielle Bedrohungen für Organisationen und die Auswirkungen ermittelt, sowie ein Gerüst zum Aufbau der Belastbarkeit einer Organisation bereitstellt. Bereits existierende Ansätze in der Forschung legen den Fokus allerdings auf große Konzerne, während die Umsetzung eines BCM-Konzepts für kleine und mittlere Unternehmen (KMU) oft an den knappen finanziellen und personellen Ressourcen, aber auch an der Komplexität des BCM scheitert. Um KMU bei der Implementierung eines an deren Bedürfnisse angepasstem BCM-Systems (BCMS) zu unterstützen, gibt es in der Forschung nur wenige Lösungsan-sätze. Dieser Artikel stellt auf Basis einer empirischen Studie, welche Umsetzungsfaktoren für BCM und Anforderungen für BCMS untersucht, das prototypische Design eines BCM-Dashboards vor, welches mit wenig Konfigurationsaufwand möglichst relevante externe und interne Gefahrenquellen in einer kom-pakten Übersicht darzustellen vermag.},
    booktitle = {Mensch und {Computer} 2018 - {Workshopband}},
    publisher = {Gesellschaft für Informatik e.V.},
    author = {Kaufhold, Marc-André and Reuter, Christian and Riebe, Thea and von Radziewski, Elmar},
    editor = {Dachselt, Raimund and Weber, Gerhard},
    year = {2018},
    keywords = {Student, Crisis, HCI, Projekt-KontiKat, Infrastructure},
    pages = {579--586},
    }

    2017

  • Inken Leopold, Christian Reuter (2017)
    Kundenakzeptanz von Bluetooth-Beacons im Lebensmittelhandel
    Mensch und Computer – Tagungsband Regensburg, Germany. doi:10.18420/muc2017-mci-0350
    [BibTeX] [Abstract] [Download PDF]

    Die Nutzung des Internets hat zu einem veränderten Kaufverhalten der Gesellschaft geführt, was wiederum Auswirkungen auf den stationären Einzelhandel hat. Da die Anzahl an Smartphone-Nutzern ebenfalls kontinuierlich steigt, werden mobile Anwendungen immer wichtiger. Durch den Einsatz von Bluetooth-Beacons – kleinen, beliebig platzierbaren Funksendern, dessen Signale von einer entsprechenden App verarbeitet werden können – kann der Einkauf sowohl erleichtert als auch erlebnisreicher gestaltet werden. Der Gebrauch von Beacons in Deutschland ist weniger verbreitet und erforscht. Pilotprojekte stützen sich lediglich auf Nutzungsdaten und Reaktionszeiten, jedoch nicht auf Kundenmeinungen. Diese Arbeit untersucht Nutzungsmöglichkeiten und Kundenakzeptanz von auf Beacons basierenden Konzepten im Einzelhandel mittels einer Online-Kundenumfrage.

    @inproceedings{leopold_kundenakzeptanz_2017,
    address = {Regensburg, Germany},
    title = {Kundenakzeptanz von {Bluetooth}-{Beacons} im {Lebensmittelhandel}},
    url = {http://www.peasec.de/paper/2017/2017_LeopoldReuter_BeaconLebensmittelhandel_MuC.pdf},
    doi = {10.18420/muc2017-mci-0350},
    abstract = {Die Nutzung des Internets hat zu einem veränderten Kaufverhalten der Gesellschaft geführt, was wiederum Auswirkungen auf den stationären Einzelhandel hat. Da die Anzahl an Smartphone-Nutzern ebenfalls kontinuierlich steigt, werden mobile Anwendungen immer wichtiger. Durch den Einsatz von Bluetooth-Beacons – kleinen, beliebig platzierbaren Funksendern, dessen Signale von einer entsprechenden App verarbeitet werden können – kann der Einkauf sowohl erleichtert als auch erlebnisreicher gestaltet werden. Der Gebrauch von Beacons in Deutschland ist weniger verbreitet und erforscht. Pilotprojekte stützen sich lediglich auf Nutzungsdaten und Reaktionszeiten, jedoch nicht auf Kundenmeinungen. Diese Arbeit untersucht Nutzungsmöglichkeiten und Kundenakzeptanz von auf Beacons basierenden Konzepten im Einzelhandel mittels einer Online-Kundenumfrage.},
    booktitle = {Mensch und {Computer} - {Tagungsband}},
    publisher = {Gesellschaft für Informatik e.V.},
    author = {Leopold, Inken and Reuter, Christian},
    editor = {Burghardt, M. and Wimmer, R. and Wolff, C. and Womser-Hacker, C.},
    year = {2017},
    keywords = {Student, HCI, Cooperation},
    pages = {361--364},
    }

  • Christian Reuter, Daniel Wiegärtner, Claudia Müller (2017)
    DIVOA – Unterstützung der älteren Bevölkerung bei Schadenslagen
    Mensch und Computer – Tagungsband Regensburg, Germany. doi:10.18420/muc2017-mci-0352
    [BibTeX] [Abstract] [Download PDF]

    Der demographische Wandel und die Urbanisierung können als die Megatrends der kommenden Jahre betrachten werden, wodurch sich neue Herausforderungen und Chancen für Städte ergeben. Gerade im Kontext von Katastrophen und Gefahren benötigt das System Stadt resiliente Ansätze, die mittels neuer Technologien gewährleistet werden können. Da IKT zeitnahe, kontextspezifische und persönliche Informationen ortsunabhängig liefern können, ist diese Entwicklung von hoher Relevanz für die Sicherstellung des Systems Stadt und dessen Bewohner. Im Kontext von Katastrophen und Gefahren weisen ältere Menschen aufgrund ihrer eingeschränkten physischen, sozialen und ökonomischen Fähigkeiten jedoch eine erhöhte Vulnerabilität auf. Diese Arbeit möchte, dies adressierend, einen Beitrag zur Integration der älteren Bevölkerung bei Schadenslagen darstellen und ein Konzept vorstellen.

    @inproceedings{reuter_divoa_2017,
    address = {Regensburg, Germany},
    title = {{DIVOA} – {Unterstützung} der älteren {Bevölkerung} bei {Schadenslagen}},
    url = {https://dl.gi.de/bitstream/handle/20.500.12116/3279/2017_MCI_352.pdf},
    doi = {10.18420/muc2017-mci-0352},
    abstract = {Der demographische Wandel und die Urbanisierung können als die Megatrends der kommenden Jahre betrachten werden, wodurch sich neue Herausforderungen und Chancen für Städte ergeben. Gerade im Kontext von Katastrophen und Gefahren benötigt das System Stadt resiliente Ansätze, die mittels neuer Technologien gewährleistet werden können. Da IKT zeitnahe, kontextspezifische und persönliche Informationen ortsunabhängig liefern können, ist diese Entwicklung von hoher Relevanz für die Sicherstellung des Systems Stadt und dessen Bewohner. Im Kontext von Katastrophen und Gefahren weisen ältere Menschen aufgrund ihrer eingeschränkten physischen, sozialen und ökonomischen Fähigkeiten jedoch eine erhöhte Vulnerabilität auf. Diese Arbeit möchte, dies adressierend, einen Beitrag zur Integration der älteren Bevölkerung bei Schadenslagen darstellen und ein Konzept vorstellen.},
    booktitle = {Mensch und {Computer} - {Tagungsband}},
    publisher = {Gesellschaft für Informatik e.V.},
    author = {Reuter, Christian and Wiegärtner, Daniel and Müller, Claudia},
    editor = {Burghardt, M. and Wimmer, R. and Wolff, C. and Womser-Hacker, C.},
    year = {2017},
    keywords = {Student, Crisis, HCI, Projekt-KontiKat},
    pages = {295--298},
    }

  • Christian Reuter, Katja Pätsch, Elena Runft (2017)
    IT for Peace? Fighting Against Terrorism in Social Media – An Explorative Twitter Study
    i-com – Journal of Interactive Media ;16(2):181–195. doi:10.1515/icom-2017-0013
    [BibTeX] [Abstract] [Download PDF]

    The Internet and especially social media are not only used for supposedly good purposes. For example, the recruitment of new members and the dissemination of ideologies of terrorism also takes place in the media. However, the fight against terrorism also makes use of the same tools. The type of these countermeasures, as well as the methods, are covered in this work. In the first part, the state of the art is summarized. The second part presents an explorative empirical study of the fight against terrorism in social media, especially on Twitter. Different, preferably characteristic forms are structured within the scope with the example of Twitter. The aim of this work is to approach this highly relevant subject with the goal of peace, safety and safety from the perspective of information systems. Moreover, it should serve following researches in this field as basis and starting point.

    @article{reuter_it_2017,
    title = {{IT} for {Peace}? {Fighting} {Against} {Terrorism} in {Social} {Media} – {An} {Explorative} {Twitter} {Study}},
    volume = {16},
    url = {http://www.peasec.de/paper/2017/2017_ReuterPaetschRunft_ITforPeaceTerrorismSocialMedia_ICOM.pdf},
    doi = {10.1515/icom-2017-0013},
    abstract = {The Internet and especially social media are not only used for supposedly good purposes. For example, the recruitment of new members and the dissemination of ideologies of terrorism also takes place in the media. However, the fight against terrorism also makes use of the same tools. The type of these countermeasures, as well as the methods, are covered in this work. In the first part, the state of the art is summarized. The second part presents an explorative empirical study of the fight against terrorism in social media, especially on Twitter. Different, preferably characteristic forms are structured within the scope with the example of Twitter. The aim of this work is to approach this highly relevant subject with the goal of peace, safety and safety from the perspective of information systems. Moreover, it should serve following researches in this field as basis and starting point.},
    number = {2},
    journal = {i-com - Journal of Interactive Media},
    author = {Reuter, Christian and Pätsch, Katja and Runft, Elena},
    year = {2017},
    keywords = {Peace, Student, Crisis, HCI, SocialMedia, Projekt-KontiKat, Projekt-EmerGent},
    pages = {181--195},
    }

  • Christian Reuter, Marc-André Kaufhold, Inken Leopold, Hannah Knipp (2017)
    Informing the Population: Mobile Warning Apps
    In: Michael Klafft: Risk and Crisis Communication in Disaster Prevention and Management. Wilhelmshaven: epubli, , 31–41.
    [BibTeX] [Abstract] [Download PDF]

    Catastrophes like the storms in Europe in spring 2016, but also terrorist attacks regularly not only lead to extensive monetary damage but also threaten human lives. In such situations, the population desires information about the status of damage and safe behaviours. Apps can address this potentially, but comparatively, record a low number of users. Based on Reuter et al. (2017), this article shows the importance of information in disaster situations and illustrates features from current mobile warning apps.

    @incollection{reuter_informing_2017,
    address = {Wilhelmshaven},
    title = {Informing the {Population}: {Mobile} {Warning} {Apps}},
    isbn = {978-3-7450-5448-4},
    url = {https://peasec.de/paper/2017/2017_ReuterKaufholdLeopoldKnipp_InformingthePopulation.pdf},
    abstract = {Catastrophes like the storms in Europe in spring 2016, but also terrorist attacks regularly not only lead to extensive monetary damage but also threaten human lives. In such situations, the population desires information about the status of damage and safe behaviours. Apps can address this potentially, but comparatively, record a low number of users. Based on Reuter et al. (2017), this article shows the importance of information in disaster situations and illustrates features from current mobile warning apps.},
    booktitle = {Risk and {Crisis} {Communication} in {Disaster} {Prevention} and {Management}},
    publisher = {epubli},
    author = {Reuter, Christian and Kaufhold, Marc-André and Leopold, Inken and Knipp, Hannah},
    editor = {Klafft, Michael},
    year = {2017},
    keywords = {Peace, Student, Crisis, HCI, Projekt-KontiKat},
    pages = {31--41},
    }

  • Marc-André Kaufhold, Christian Reuter, Thomas Ludwig, Simon Scholl (2017)
    Social Media Analytics: Eine Marktstudie im Krisenmanagement
    INFORMATIK 2017, Lecture Notes in Informatics (LNI), Gesellschaft für Informatik Bonn.
    [BibTeX] [Abstract] [Download PDF]

    Mit zunehmender Zahl an Nutzern sozialer Medien steigt auch die Menge produzierter Datenmengen, welche häufig unter dem Schlagwort Big Social Data diskutiert werden. Um Informationen aus diesen großen Datenmengen generieren zu können, existiert aktuell bereits eine Vielzahl verschiedener Systeme, welche sich des Data Minings bedienen, um die Analyse zu erleichtern. Je nachdem für welche Fragestellung diese Datenmengen herangezogen werden sollen, kommen verschiedene Systeme in Frage, die jeweils ihre Stärken und Schwächen haben. Innerhalb dieses Beitrages geben wir eine Übersicht aktueller Systeme zur Analyse sozialer Medien im Generellen sowie im speziellen Kontext des Krisenmanagements. Auf Basis verschiedener Attribute wie der Möglichkeit zur Kommunikation, des Setzens eines Alarms oder der Tonalität sowie einer darauf basierenden Marktanalyse werden die Systeme in die drei Klassen Intelligence-, Management- und spezialisierten Analysesysteme klassifiziert und im Hinblick auf ihre Eignung für die Analyse sozialer Medien kategorisiert.

    @inproceedings{kaufhold_social_2017,
    address = {Bonn},
    title = {Social {Media} {Analytics}: {Eine} {Marktstudie} im {Krisenmanagement}},
    url = {http://www.peasec.de/paper/2017/2017_KaufholdReuterLudwigScholl_SocialMediaAnalytcisMarktstudie_INF.pdf},
    abstract = {Mit zunehmender Zahl an Nutzern sozialer Medien steigt auch die Menge produzierter Datenmengen, welche häufig unter dem Schlagwort Big Social Data diskutiert werden. Um Informationen aus diesen großen Datenmengen generieren zu können, existiert aktuell bereits eine Vielzahl verschiedener Systeme, welche sich des Data Minings bedienen, um die Analyse zu erleichtern. Je nachdem für welche Fragestellung diese Datenmengen herangezogen werden sollen, kommen verschiedene Systeme in Frage, die jeweils ihre Stärken und Schwächen haben. Innerhalb dieses Beitrages geben wir eine Übersicht aktueller Systeme zur Analyse sozialer Medien im Generellen sowie im speziellen Kontext des Krisenmanagements. Auf Basis verschiedener Attribute wie der Möglichkeit zur Kommunikation, des Setzens eines Alarms oder der Tonalität sowie einer darauf basierenden Marktanalyse werden die Systeme in die drei Klassen Intelligence-, Management- und spezialisierten Analysesysteme klassifiziert und im Hinblick auf ihre Eignung für die Analyse sozialer Medien kategorisiert.},
    booktitle = {{INFORMATIK} 2017, {Lecture} {Notes} in {Informatics} ({LNI}), {Gesellschaft} für {Informatik}},
    author = {Kaufhold, Marc-André and Reuter, Christian and Ludwig, Thomas and Scholl, Simon},
    editor = {Eibl, Maximilian and Gaedke, Martin},
    year = {2017},
    keywords = {Student, Crisis, HCI, SocialMedia, Projekt-KontiKat, Ranking-CORE-C, Ranking-VHB-C},
    pages = {1325--1338},
    }

  • Thomas Ludwig, Christoph Kotthaus, Christian Reuter, Sören Van Dongen, Volkmar Pipek (2017)
    Situated crowdsourcing during disasters: Managing the tasks of spontaneous volunteers through public displays
    International Journal on Human-Computer Studies (IJHCS) ;102(C):103–121. doi:10.1016/j.ijhcs.2016.09.008
    [BibTeX] [Abstract] [Download PDF]

    Abstract Although emergency services have already recognized the importance of citizen-initiated activities during disasters, still questions with regard to the coordination of spontaneous volunteers and their activities arise. Within our article, we will present a technological approach based on public displays which aims to foster situated crowdsourcing between affected citizens, spontaneous volunteers as well as official emergency services. We will address the research question: How can the situated tasks performed by spontaneous volunteers be supported by the use of public displays during disasters? First we will present the current state of the art with regard to the coordination practices of spontaneous volunteers and emergency services within disaster situations as well as related problems, potentials and specifics of situated crowdsourcing and public displays. To gain insight into actual coordination practices, we conducted an empirical study with 18 different stakeholders involved in disaster management. Based on the literature review and our empirical study, we have derived a technical concept that supports the task and activity management of spontaneous volunteers as well as the coordination both of the demands of affected people and the offers from spontaneous volunteers. We have implemented our concept as the public display application ‘City-Share‘, which provides a robust communication infrastructure and encompasses situated crowdsourcing mechanisms for managing offers and demands of activities on-the-ground. Based on its evaluation with several users, we will discuss our findings with regard to the assignment of tasks on-the-ground and situated crowdsourcing during emergencies. We outline that City-Share can improve a community’s disaster resilience, especially when focusing on the kind of collaborative resilience emerging between official stakeholders and spontaneous volunteers or affected citizens at a local level.

    @article{ludwig_situated_2017,
    title = {Situated crowdsourcing during disasters: {Managing} the tasks of spontaneous volunteers through public displays},
    volume = {102},
    url = {http://www.peasec.de/paper/2017/2017_Ludwigetal_SituatedCrowdsourcingPublicDisplay_IJHCS.pdf},
    doi = {10.1016/j.ijhcs.2016.09.008},
    abstract = {Abstract Although emergency services have already recognized the importance of citizen-initiated activities during disasters, still questions with regard to the coordination of spontaneous volunteers and their activities arise. Within our article, we will present a technological approach based on public displays which aims to foster situated crowdsourcing between affected citizens, spontaneous volunteers as well as official emergency services. We will address the research question: How can the situated tasks performed by spontaneous volunteers be supported by the use of public displays during disasters? First we will present the current state of the art with regard to the coordination practices of spontaneous volunteers and emergency services within disaster situations as well as related problems, potentials and specifics of situated crowdsourcing and public displays. To gain insight into actual coordination practices, we conducted an empirical study with 18 different stakeholders involved in disaster management. Based on the literature review and our empirical study, we have derived a technical concept that supports the task and activity management of spontaneous volunteers as well as the coordination both of the demands of affected people and the offers from spontaneous volunteers. We have implemented our concept as the public display application ‘City-Share', which provides a robust communication infrastructure and encompasses situated crowdsourcing mechanisms for managing offers and demands of activities on-the-ground. Based on its evaluation with several users, we will discuss our findings with regard to the assignment of tasks on-the-ground and situated crowdsourcing during emergencies. We outline that City-Share can improve a community's disaster resilience, especially when focusing on the kind of collaborative resilience emerging between official stakeholders and spontaneous volunteers or affected citizens at a local level.},
    number = {C},
    journal = {International Journal on Human-Computer Studies (IJHCS)},
    author = {Ludwig, Thomas and Kotthaus, Christoph and Reuter, Christian and Dongen, Sören Van and Pipek, Volkmar},
    year = {2017},
    keywords = {Student, Crisis, HCI, A-Paper, Ranking-CORE-A, Ranking-ImpactFactor, Cooperation, Projekt-KOKOS, Ranking-WKWI-B},
    pages = {103--121},
    }

  • Christian Reuter, Marc-André Kaufhold, René Steinfort (2017)
    Rumors, Fake News and Social Bots in Conflicts and Emergencies: Towards a Model for Believability in Social Media
    Proceedings of the Information Systems for Crisis Response and Management (ISCRAM) Albi, France.
    [BibTeX] [Abstract] [Download PDF]

    The use of social media is gaining more and more in importance in ordinary life but also in conflicts and emergencies. The social big data, generated by users, is partially also used as a source for situation assessment, e.g. to receive pictures or to assess the general mood. However, the information’s believability is hard to control and can deceive. Rumors, fake news and social bots are phenomenons that challenge the easy consumption of social media. To address this, our paper explores the believability of content in social media. Based on foundations of information quality we conducted a literature study to derive a three-level model for assessing believability. It summarizes existing assessment approaches, assessment criteria and related measures. On this basis, we describe several steps towards the development of an assessment approach that works across different types of social media.

    @inproceedings{reuter_rumors_2017,
    address = {Albi, France},
    title = {Rumors, {Fake} {News} and {Social} {Bots} in {Conflicts} and {Emergencies}: {Towards} a {Model} for {Believability} in {Social} {Media}},
    url = {http://www.peasec.de/paper/2017/2017_ReuterKaufholdSteinfort_RumorsFakeNewsBotsBelievability_ISCRAM.pdf},
    abstract = {The use of social media is gaining more and more in importance in ordinary life but also in conflicts and emergencies. The social big data, generated by users, is partially also used as a source for situation assessment, e.g. to receive pictures or to assess the general mood. However, the information's believability is hard to control and can deceive. Rumors, fake news and social bots are phenomenons that challenge the easy consumption of social media. To address this, our paper explores the believability of content in social media. Based on foundations of information quality we conducted a literature study to derive a three-level model for assessing believability. It summarizes existing assessment approaches, assessment criteria and related measures. On this basis, we describe several steps towards the development of an assessment approach that works across different types of social media.},
    booktitle = {Proceedings of the {Information} {Systems} for {Crisis} {Response} and {Management} ({ISCRAM})},
    publisher = {ISCRAM},
    author = {Reuter, Christian and Kaufhold, Marc-André and Steinfort, René},
    editor = {Comes, Tina and Bénaben, Frédérick and Hanachi, Chihab and Lauras, Matthieu},
    year = {2017},
    keywords = {Peace, Student, Crisis, HCI, SocialMedia, Projekt-KontiKat},
    pages = {583--591},
    }

  • Christian Reuter, Marc-André Kaufhold, Inken Leopold, Hannah Knipp (2017)
    Katwarn, NINA or FEMA? Multi-Method Study on Distribution, Use and Public Views on Crisis Apps
    European Conference on Information Systems (ECIS) Guimarães, Portugal.
    [BibTeX] [Abstract] [Download PDF]

    Crises, such as thunderstorms and an increasing number of (recognised) terroristic attacks in 2015, 2016, and 2017, do not only lead to extensive monetary damage, but also threaten human lives and influence citizens‘ perceptions of safety and security. In such situations, the population demands information about the damage and safe behaviour. Although some apps are available to provide this information, the number of users seems relatively low. Focussing on Germany, this study aims to research (1) the distribution of crisis apps in the population, (2) the kinds of crisis apps currently used, as well as (3) needed core functionalities of warning apps. This multi-method study analyses crisis apps by investigating their utilisation quantitatively in a snowball-based survey in Europe (n=1,034) and in a representative survey in Germany (n=1,369). Based on this, the German warning apps Katwarn and NINA and the US-American app FEMA are evaluated qualitatively (n=22). The results revealed requirements which informed the implementation of a warning app prototype. The prototype combines the identified advantages of the apps evaluated in the study, containing warnings and all-clear, recommendations for action, functions to contact friends and helpers. The contributions of this work are findings on the distribution of crisis apps in Europe and Germany (both 16\%), the kinds of crisis apps used (mostly weather and warning apps), and empirically based requirements for warning apps which can be integrated in further developments of existing apps and a prototype for such an app.

    @inproceedings{reuter_katwarn_2017,
    address = {Guimarães, Portugal},
    title = {Katwarn, {NINA} or {FEMA}? {Multi}-{Method} {Study} on {Distribution}, {Use} and {Public} {Views} on {Crisis} {Apps}},
    url = {http://www.peasec.de/paper/2017/2017_ReuterKaufholdLeopoldKnipp_CrisisApps_ECIS.pdf},
    abstract = {Crises, such as thunderstorms and an increasing number of (recognised) terroristic attacks in 2015, 2016, and 2017, do not only lead to extensive monetary damage, but also threaten human lives and influence citizens' perceptions of safety and security. In such situations, the population demands information about the damage and safe behaviour. Although some apps are available to provide this information, the number of users seems relatively low. Focussing on Germany, this study aims to research (1) the distribution of crisis apps in the population, (2) the kinds of crisis apps currently used, as well as (3) needed core functionalities of warning apps. This multi-method study analyses crisis apps by investigating their utilisation quantitatively in a snowball-based survey in Europe (n=1,034) and in a representative survey in Germany (n=1,369). Based on this, the German warning apps Katwarn and NINA and the US-American app FEMA are evaluated qualitatively (n=22). The results revealed requirements which informed the implementation of a warning app prototype. The prototype combines the identified advantages of the apps evaluated in the study, containing warnings and all-clear, recommendations for action, functions to contact friends and helpers. The contributions of this work are findings on the distribution of crisis apps in Europe and Germany (both 16\%), the kinds of crisis apps used (mostly weather and warning apps), and empirically based requirements for warning apps which can be integrated in further developments of existing apps and a prototype for such an app.},
    booktitle = {European {Conference} on {Information} {Systems} ({ECIS})},
    publisher = {AIS},
    author = {Reuter, Christian and Kaufhold, Marc-André and Leopold, Inken and Knipp, Hannah},
    year = {2017},
    keywords = {Peace, Student, Crisis, HCI, A-Paper, Ranking-CORE-A, Projekt-KontiKat, Projekt-EmerGent, Ranking-VHB-B, Ranking-WKWI-A},
    pages = {2187--2201},
    }

  • Marc-André Kaufhold, Christian Reuter, Marvin Stefan (2017)
    Gesellschaftliche Herausforderungen des Missbrauchs von Bots und sozialen Medien
    Mensch und Computer 2017 – Workshopband Regensburg, Germany. doi:10.18420/muc2017-ws01-0386
    [BibTeX] [Abstract] [Download PDF]

    Soziale Medien wie Facebook oder Twitter haben sich als alltägliche Kommunikationskanäle etabliert. Aufgrund der großen Reichweite sind diese Medien für den privaten oder öffentlichen Austausch unter Freunden und Gruppierungen sowie zur Produkt- und Unternehmenswerbung geeignet, unterliegen aber auch der Gefahr der Manipulation öffentlicher Diskurse oder des Missbrauchs der jeweiligen Plattformfunktionen. Hierzu werden unter anderem Bots, und spezifischer „Social Bots“, als automatisierte Programme eingesetzt, um einen Einfluss auf ökonomische, politische und soziale Prozesse auszuüben. Dieser Beitrag stellt die vorläufigen Ergebnisse einer systematischen Literaturstudie und thematischen Analyse dar, welche gesellschaftliche Herausforderungen sowie zugehörige Methoden und Vorgehensweisen des Missbrauchs von Bots und sozialen Medien umfassen.

    @inproceedings{kaufhold_gesellschaftliche_2017,
    address = {Regensburg, Germany},
    title = {Gesellschaftliche {Herausforderungen} des {Missbrauchs} von {Bots} und sozialen {Medien}},
    url = {https://dl.gi.de/bitstream/handle/20.500.12116/3236/2017_WS01_386.pdf?sequence=1&isAllowed=y},
    doi = {10.18420/muc2017-ws01-0386},
    abstract = {Soziale Medien wie Facebook oder Twitter haben sich als alltägliche Kommunikationskanäle etabliert. Aufgrund der großen Reichweite sind diese Medien für den privaten oder öffentlichen Austausch unter Freunden und Gruppierungen sowie zur Produkt- und Unternehmenswerbung geeignet, unterliegen aber auch der Gefahr der Manipulation öffentlicher Diskurse oder des Missbrauchs der jeweiligen Plattformfunktionen. Hierzu werden unter anderem Bots, und spezifischer „Social Bots“, als automatisierte Programme eingesetzt, um einen Einfluss auf ökonomische, politische und soziale Prozesse auszuüben. Dieser Beitrag stellt die vorläufigen Ergebnisse einer systematischen Literaturstudie und thematischen Analyse dar, welche gesellschaftliche Herausforderungen sowie zugehörige Methoden und Vorgehensweisen des Missbrauchs von Bots und sozialen Medien umfassen.},
    booktitle = {Mensch und {Computer} 2017 - {Workshopband}},
    publisher = {Gesellschaft für Informatik e.V.},
    author = {Kaufhold, Marc-André and Reuter, Christian and Stefan, Marvin},
    editor = {Burghardt, M. and Wimmer, R. and Wolff, C. and Womser-Hacker, C.},
    year = {2017},
    keywords = {Peace, Student, SocialMedia, Projekt-KontiKat},
    pages = {51--58},
    }

  • Daniel Wiegärtner, Christian Reuter, Claudia Müller (2017)
    Erwartungen der älteren Bevölkerung an IKT für Krisenkommunikation
    Mensch und Computer 2017 – Workshopband Regensburg, Germany. doi:10.18420/muc2017-ws17-0416
    [BibTeX] [Abstract] [Download PDF]

    Aufgrund des demographischen Wandels und der zunehmenden Bevölkerungsdichte im urbanen Raum wird es in Zukunft zu neuen Herausforderungen in der Planung und Vorbereitung von Katastrophen-lagen in Städten kommen. Dabei wird vor allem der Nutzen von IKT für ältere Menschen in Bezug auf (Groß-)Schadenslagen von hoher Relevanz sein, der in der bisherigen Forschung nicht angemessen be-trachtet wurde. Mittels eines nutzerzentrierten Ansatzes wird untersucht, wie eine geeignete Krisenkommunikation durch IKT für ältere Menschen funktionieren könnte. Ziel der Arbeit ist es, die Vorbereitung für die ältere Population in Großstädten im Falle einer (Groß-)Schadenslage zu untersuchen und zu un-terstützen. Gerade für das System Stadt sind die Ergebnisse dieser Arbeit von Relevanz und können hel-fen, den urbanen Raum resilienter gegen mögliche Katastrophen zu gestalten.

    @inproceedings{wiegartner_erwartungen_2017,
    address = {Regensburg, Germany},
    title = {Erwartungen der älteren {Bevölkerung} an {IKT} für {Krisenkommunikation}},
    url = {https://dl.gi.de/bitstream/handle/20.500.12116/3243/2017_WS17_416.pdf},
    doi = {10.18420/muc2017-ws17-0416},
    abstract = {Aufgrund des demographischen Wandels und der zunehmenden Bevölkerungsdichte im urbanen Raum wird es in Zukunft zu neuen Herausforderungen in der Planung und Vorbereitung von Katastrophen-lagen in Städten kommen. Dabei wird vor allem der Nutzen von IKT für ältere Menschen in Bezug auf (Groß-)Schadenslagen von hoher Relevanz sein, der in der bisherigen Forschung nicht angemessen be-trachtet wurde. Mittels eines nutzerzentrierten Ansatzes wird untersucht, wie eine geeignete Krisenkommunikation durch IKT für ältere Menschen funktionieren könnte. Ziel der Arbeit ist es, die Vorbereitung für die ältere Population in Großstädten im Falle einer (Groß-)Schadenslage zu untersuchen und zu un-terstützen. Gerade für das System Stadt sind die Ergebnisse dieser Arbeit von Relevanz und können hel-fen, den urbanen Raum resilienter gegen mögliche Katastrophen zu gestalten.},
    booktitle = {Mensch und {Computer} 2017 - {Workshopband}},
    publisher = {Gesellschaft für Informatik e.V.},
    author = {Wiegärtner, Daniel and Reuter, Christian and Müller, Claudia},
    editor = {Burghardt, M. and Wimmer, R. and Wolff, C. and Womser-Hacker, C.},
    year = {2017},
    keywords = {Student, Crisis, HCI, Projekt-KontiKat},
    pages = {609--614},
    }

  • Christian Reuter, Marc-André Kaufhold, Jonas Klös (2017)
    Benutzbare Sicherheit: Usability, Safety und Security bei Passwörtern
    Mensch und Computer 2017 – Workshopband Regensburg, Germany. doi:10.18420/muc2017-ws01-0384
    [BibTeX] [Abstract] [Download PDF]

    Obwohl Usability und Sicherheit beides relevante Anforderungen für Anwendungssysteme sind, stehen sie in einem Spannungsfeld. Sicherheit kann als Schutz vor Angriffen von außen (Security), aber auch für das sichere Funktionieren (Safety) dieser Anwendungssysteme verstanden werden. Durch die immer größere Vernetzung klassischer Safety-Domänen, wie dem Katastrophenschutz, gewinnen Security-Aspekte dort ebenfalls an Bedeutung. Die Übertragung von kritischen und vertraulichen Informationen auf mobile Endgeräte muss zugleich passwortgeschützt als auch schnell verfügbar sein; zeitintensive Authentifizierungsmechanismen können hier stören. In dieser Studie werden die Nutzung von Passwörtern vor dem Hintergrund der Abwägung von Sicherheit und Usability exploriert und Hypothesen zum Umgang mit Passwörtern aufgestellt, die im Kontext der Digitalisierung in der zivilen Sicherheit sowie mobilen und ubiquitären Geräte im Katastrophenschutz an enormer Bedeutung gewinnen.

    @inproceedings{reuter_benutzbare_2017,
    address = {Regensburg, Germany},
    title = {Benutzbare {Sicherheit}: {Usability}, {Safety} und {Security} bei {Passwörtern}},
    url = {https://dl.gi.de/bitstream/handle/20.500.12116/3214/2017_WS01_384.pdf?sequence=1&isAllowed=y},
    doi = {10.18420/muc2017-ws01-0384},
    abstract = {Obwohl Usability und Sicherheit beides relevante Anforderungen für Anwendungssysteme sind, stehen sie in einem Spannungsfeld. Sicherheit kann als Schutz vor Angriffen von außen (Security), aber auch für das sichere Funktionieren (Safety) dieser Anwendungssysteme verstanden werden. Durch die immer größere Vernetzung klassischer Safety-Domänen, wie dem Katastrophenschutz, gewinnen Security-Aspekte dort ebenfalls an Bedeutung. Die Übertragung von kritischen und vertraulichen Informationen auf mobile Endgeräte muss zugleich passwortgeschützt als auch schnell verfügbar sein; zeitintensive Authentifizierungsmechanismen können hier stören. In dieser Studie werden die Nutzung von Passwörtern vor dem Hintergrund der Abwägung von Sicherheit und Usability exploriert und Hypothesen zum Umgang mit Passwörtern aufgestellt, die im Kontext der Digitalisierung in der zivilen Sicherheit sowie mobilen und ubiquitären Geräte im Katastrophenschutz an enormer Bedeutung gewinnen.},
    booktitle = {Mensch und {Computer} 2017 - {Workshopband}},
    publisher = {Gesellschaft für Informatik e.V.},
    author = {Reuter, Christian and Kaufhold, Marc-André and Klös, Jonas},
    editor = {Burghardt, M. and Wimmer, R. and Wolff, C. and Womser-Hacker, C.},
    year = {2017},
    keywords = {Student, Security, UsableSec, HCI, Projekt-CROSSING, Projekt-KontiKat, Projekt-CRISP},
    pages = {33--41},
    }

  • Christian Reuter, Katja Pätsch, Elena Runft (2017)
    Terrorbekämpfung mithilfe sozialer Medien – ein explorativer Einblick am Beispiel von Twitter
    Proceedings of the International Conference on Wirtschaftsinformatik (WI) St. Gallen, Switzerland.
    [BibTeX] [Abstract] [Download PDF]

    Das Internet und insbesondere soziale Medien werden bekanntermaßen nicht nur zu vermeintlich guten Zwecken genutzt. So findet die Rekrutierung neuer Mitglieder und die Verbreitung von Ideologien des Terrorismus ebenfalls über dieses Medium statt. Aber auch die Terrorismusbekämpfung bedient sich gleicher Werkzeuge. Die Art und Weise dieser Gegenmaßnahmen sowie die Vorgehensweisen sollen in diesem Artikel thematisiert werden. Im ersten Teil wird der Forschungsstand zusammengefasst. Der zweite Teil stellt eine explorative empirische Studie der Terrorismusbekämpfung in sozialen Medien, insbesondere in Twitter, dar. Verschiedene, möglichst charakteristische Formen werden in diesem Rahmen am Beispiel von Twitter strukturiert. Ziel ist es, sich diesem hochrelevanten Gebiet mit dem Ziel von Frieden und Sicherheit aus Perspektive der Wirtschaftsinformatik zu nähern und weiteren Forschungsarbeiten in diesem Gebiet als Grundlage und Ausgangspunkt dienen zu können.

    @inproceedings{reuter_terrorbekampfung_2017,
    address = {St. Gallen, Switzerland},
    title = {Terrorbekämpfung mithilfe sozialer {Medien} – ein explorativer {Einblick} am {Beispiel} von {Twitter}},
    url = {http://www.wineme.uni-siegen.de/paper/2017/2017_ReuterPaetschRunft_TerrorbekaempfungSozialeMedien_WI.pdf},
    abstract = {Das Internet und insbesondere soziale Medien werden bekanntermaßen nicht nur zu vermeintlich guten Zwecken genutzt. So findet die Rekrutierung neuer Mitglieder und die Verbreitung von Ideologien des Terrorismus ebenfalls über dieses Medium statt. Aber auch die Terrorismusbekämpfung bedient sich gleicher Werkzeuge. Die Art und Weise dieser Gegenmaßnahmen sowie die Vorgehensweisen sollen in diesem Artikel thematisiert werden. Im ersten Teil wird der Forschungsstand zusammengefasst. Der zweite Teil stellt eine explorative empirische Studie der Terrorismusbekämpfung in sozialen Medien, insbesondere in Twitter, dar. Verschiedene, möglichst charakteristische Formen werden in diesem Rahmen am Beispiel von Twitter strukturiert. Ziel ist es, sich diesem hochrelevanten Gebiet mit dem Ziel von Frieden und Sicherheit aus Perspektive der Wirtschaftsinformatik zu nähern und weiteren Forschungsarbeiten in diesem Gebiet als Grundlage und Ausgangspunkt dienen zu können.},
    booktitle = {Proceedings of the {International} {Conference} on {Wirtschaftsinformatik} ({WI})},
    publisher = {AIS},
    author = {Reuter, Christian and Pätsch, Katja and Runft, Elena},
    editor = {Leimeister, J.M. and Brenner, W.},
    year = {2017},
    keywords = {Peace, Student, Crisis, HCI, SocialMedia, Projekt-EmerGent, Ranking-CORE-C, Ranking-VHB-C, Ranking-WKWI-A},
    pages = {649--663},
    }

    2016

  • Christian Reuter, Katja Pätsch, Elena Runft (2016)
    Terrorismus und soziale Medien – Propaganda und Gegenpropaganda
    Mensch und Computer – Tagungsband Aachen, Germany. doi:10.18420/muc2016-mci-0209
    [BibTeX] [Abstract] [Download PDF]

    Der Terrorismus nutzt das Internet und insbesondere soziale Medien bereits seit einiger Zeit zur Rekrutierung neuer Mitglieder und zur Verbreitung ihrer Ideologie. Aber auch deren Gegner nutzen das Internet zur Terrorbekämpfung. Auch wenn es zum Einsatz sozialer Medien in Krisen bereits zahlreiche Veröffentlichungen gibt, wurde deren Einsatz im Terrorismus, einer besonderen Art der Krise, insbesondere in der digitalen Terrorbekämpfung, noch weniger betrachtet. Dieser Artikel fasst im ersten Teil den Stand der Forschung in jenem Bereich zusammen. Im zweiten Teil stellt er eine explorative empirische Studie zur Terrorismusbekämpfung in sozialen Medien dar. Hierzu werden verschiedene, möglichst repräsentative Formen am Beispiel von Twitter analysiert und gegliedert. Ziel ist die Schaffung eines Überblicks, der weiteren Forschungsarbeiten als Grundlage dienen kann.

    @inproceedings{reuter_terrorismus_2016,
    address = {Aachen, Germany},
    title = {Terrorismus und soziale {Medien} – {Propaganda} und {Gegenpropaganda}},
    url = {https://dl.gi.de/bitstream/handle/20.500.12116/178/bitstream_8792.pdf},
    doi = {10.18420/muc2016-mci-0209},
    abstract = {Der Terrorismus nutzt das Internet und insbesondere soziale Medien bereits seit einiger Zeit zur Rekrutierung neuer Mitglieder und zur Verbreitung ihrer Ideologie. Aber auch deren Gegner nutzen das Internet zur Terrorbekämpfung. Auch wenn es zum Einsatz sozialer Medien in Krisen bereits zahlreiche Veröffentlichungen gibt, wurde deren Einsatz im Terrorismus, einer besonderen Art der Krise, insbesondere in der digitalen Terrorbekämpfung, noch weniger betrachtet. Dieser Artikel fasst im ersten Teil den Stand der Forschung in jenem Bereich zusammen. Im zweiten Teil stellt er eine explorative empirische Studie zur Terrorismusbekämpfung in sozialen Medien dar. Hierzu werden verschiedene, möglichst repräsentative Formen am Beispiel von Twitter analysiert und gegliedert. Ziel ist die Schaffung eines Überblicks, der weiteren Forschungsarbeiten als Grundlage dienen kann.},
    booktitle = {Mensch und {Computer} - {Tagungsband}},
    publisher = {Gesellschaft für Informatik e.V.},
    author = {Reuter, Christian and Pätsch, Katja and Runft, Elena},
    editor = {Prinz, W. and Borchers, J. and Jarke, M.},
    year = {2016},
    keywords = {Peace, Student, SocialMedia},
    }

  • Christian Reuter, Oliver Heger (2016)
    Informelle E-Partizipation in Parteien
    Mensch und Computer – Tagungsband Aachen, Germany. doi:http://dx.doi.org/10.18420/muc2016-mci-0215
    [BibTeX] [Abstract] [Download PDF]

    Politische Partizipation im Internet hat zunehmenden Einfluss auf reale politische Willensbildungsprozesse. Parteien, die ein Kernelement des politischen Systems in Deutschland bilden, stehen vor einer wichtigen Gestaltungsaufgabe, wenn sie den Strukturwandel der politischen Kommunikation erfolgreich bewältigen möchten. Ziel unseres Beitrags ist es, Erkenntnisse für diese Gestaltungsaufgabe zu liefern. Dafür wurden 91 Vorschläge von CDU-Mitgliedern ausgewertet und ergänzende Interviews geführt, um Praktiken der (E-)Partizipation sowie ihre Defizite und Bedingungen zu identifizieren. Aus den Ergebnissen leiten wir die Notwendigkeit von insbesondere informellen E-Partizipations-und Vernetzungs-Technologien für den Einsatz in der CDU, potentiell aber auch anderen Parteien, ab

    @inproceedings{reuter_informelle_2016,
    address = {Aachen, Germany},
    title = {Informelle {E}-{Partizipation} in {Parteien}},
    url = {https://dl.gi.de/bitstream/handle/20.500.12116/182/bitstream_8804.pdf},
    doi = {http://dx.doi.org/10.18420/muc2016-mci-0215},
    abstract = {Politische Partizipation im Internet hat zunehmenden Einfluss auf reale politische Willensbildungsprozesse. Parteien, die ein Kernelement des politischen Systems in Deutschland bilden, stehen vor einer wichtigen Gestaltungsaufgabe, wenn sie den Strukturwandel der politischen Kommunikation erfolgreich bewältigen möchten. Ziel unseres Beitrags ist es, Erkenntnisse für diese Gestaltungsaufgabe zu liefern. Dafür wurden 91 Vorschläge von CDU-Mitgliedern ausgewertet und ergänzende Interviews geführt, um Praktiken der (E-)Partizipation sowie ihre Defizite und Bedingungen zu identifizieren. Aus den Ergebnissen leiten wir die Notwendigkeit von insbesondere informellen E-Partizipations-und Vernetzungs-Technologien für den Einsatz in der CDU, potentiell aber auch anderen Parteien, ab},
    booktitle = {Mensch und {Computer} - {Tagungsband}},
    publisher = {Gesellschaft für Informatik e.V.},
    author = {Reuter, Christian and Heger, Oliver},
    editor = {Prinz, W. and Borchers, J. and Jarke, M.},
    year = {2016},
    keywords = {Student, HCI, SocialMedia, Cooperation},
    }

  • Christian Reuter, Julian Hupertz (2016)
    Sozial auch ohne Netz – Soziale Medien bei Infrastrukturproblemen
    Mensch und Computer 2016 – Workshopband Aachen, Germany. doi:http://dx.doi.org/10.18420/muc2016-ws01-0004
    [BibTeX] [Abstract] [Download PDF]

    Menschen tauschen sich aus und gerade in schwierigen Situationen ist Kommunikation sehr wichtig. In Katastrophenlagen, wie schweren Unwettern, sind jedoch teilweise zentrale Kommunikationsinfrastrukturen betroffen durch der durch Kommunikationsmedien unterstützte Informationsaustausch naturgemäß schwerer möglich als in Zeiten ohne solche Ausfälle. In jenen Fällen ist Kreativität erforderlich. Den Ansatz des Infrastructuring, d.h. der Re-Konzeptualisierung der eigenen Arbeit im Kontext bestehender und potentieller Werkzeuge, aufgreifend werden in diesem Artikel Kommunikationsmöglichkeiten in solchen Fällen untersucht. Basierend auf der Analyse der Verfügbarkeit von Kommunikationsinfrastrukturen wird betrachtet, welche Ansätze zur Kommunikation basierend auf alternativen und dezentralen Infrastrukturen wie MANETs, Wi-Fi und Bluetooth existieren und mithilfe von Smartphones nutzbar gemacht werden können.

    @inproceedings{reuter_sozial_2016,
    address = {Aachen, Germany},
    title = {Sozial auch ohne {Netz} – {Soziale} {Medien} bei {Infrastrukturproblemen}},
    url = {https://dl.gi.de/handle/20.500.12116/287},
    doi = {http://dx.doi.org/10.18420/muc2016-ws01-0004},
    abstract = {Menschen tauschen sich aus und gerade in schwierigen Situationen ist Kommunikation sehr wichtig. In Katastrophenlagen, wie schweren Unwettern, sind jedoch teilweise zentrale Kommunikationsinfrastrukturen betroffen durch der durch Kommunikationsmedien unterstützte Informationsaustausch naturgemäß schwerer möglich als in Zeiten ohne solche Ausfälle. In jenen Fällen ist Kreativität erforderlich. Den Ansatz des Infrastructuring, d.h. der Re-Konzeptualisierung der eigenen Arbeit im Kontext bestehender und potentieller Werkzeuge, aufgreifend werden in diesem Artikel Kommunikationsmöglichkeiten in solchen Fällen untersucht. Basierend auf der Analyse der Verfügbarkeit von Kommunikationsinfrastrukturen wird betrachtet, welche Ansätze zur Kommunikation basierend auf alternativen und dezentralen Infrastrukturen wie MANETs, Wi-Fi und Bluetooth existieren und mithilfe von Smartphones nutzbar gemacht werden können.},
    booktitle = {Mensch und {Computer} 2016 - {Workshopband}},
    publisher = {Gesellschaft für Informatik e.V.},
    author = {Reuter, Christian and Hupertz, Julian},
    editor = {Weyers, B. and Dittmar, A.},
    year = {2016},
    keywords = {Student, RSF, Crisis, HCI, SocialMedia, Infrastructure, Projekt-EmerGent, Projekt-KOKOS},
    }

  • Christian Reuter, Gordian Geilen, Robin Gellert (2016)
    Sicherheit vs. Privatsphäre: Zur Akzeptanz von Überwachung in sozialen Medien im Kontext von Terrorkrisen
    Informatik 2016: von Menschen für Menschen Klagenfurt.
    [BibTeX] [Abstract] [Download PDF]

    Nach den terroristischen Anschlägen in Paris 2015 und Brüssel 2016 wurde das Bedürfnis nach mehr Sicherheit und Überwachung im Internet laut. Als Folge der Enthüllungen der Überwachungs- und Spionagetechniken der National Security Agency (NSA) durch Edward Snowden 2013 konnte in der Bevölkerung aber auch ein Aufschrei nach erhöhtem Schutz der Privatsphäre im Internet wahrgenommen werden. Die geschilderten Ereignisse verdeutlichen die gegensätzlichen Wünsche nach Sicherheit und Überwachung im Internet sowie Schutz der Privatsphäre. Im ersten Teil dieses Beitrags stellen wir den Stand der Forschung im Bereich Terror, Sicherheit und Privatsphäre in sozialen Medien dar. Im zweiten Teil führen wir eine explorative Studie durch, um zu beleuchten, ob Bürgerinnen und Bürger in Krisenzeiten bereit wären, ihre Privatsphäre im Internet, vor allem in sozialen Netzwerken, zugunsten von Sicherheit zu reduzieren. Basierend auf qualitativen Daten zeigt diese Arbeit Meinungscluster und Tendenzen in Bezug auf das Nullsummenspiel „Sicherheit und Privatsphäre“.

    @inproceedings{reuter_sicherheit_2016,
    address = {Klagenfurt},
    title = {Sicherheit vs. {Privatsphäre}: {Zur} {Akzeptanz} von Überwachung in sozialen {Medien} im {Kontext} von {Terrorkrisen}},
    url = {http://subs.emis.de/LNI/Proceedings/Proceedings259/P-259.pdf#page=1760},
    abstract = {Nach den terroristischen Anschlägen in Paris 2015 und Brüssel 2016 wurde das Bedürfnis nach mehr Sicherheit und Überwachung im Internet laut. Als Folge der Enthüllungen der Überwachungs- und Spionagetechniken der National Security Agency (NSA) durch Edward Snowden 2013 konnte in der Bevölkerung aber auch ein Aufschrei nach erhöhtem Schutz der Privatsphäre im Internet wahrgenommen werden. Die geschilderten Ereignisse verdeutlichen die gegensätzlichen Wünsche nach Sicherheit und Überwachung im Internet sowie Schutz der Privatsphäre. Im ersten Teil dieses Beitrags stellen wir den Stand der Forschung im Bereich Terror, Sicherheit und Privatsphäre in sozialen Medien dar. Im zweiten Teil führen wir eine explorative Studie durch, um zu beleuchten, ob Bürgerinnen und Bürger in Krisenzeiten bereit wären, ihre Privatsphäre im Internet, vor allem in sozialen Netzwerken, zugunsten von Sicherheit zu reduzieren. Basierend auf qualitativen Daten zeigt diese Arbeit Meinungscluster und Tendenzen in Bezug auf das Nullsummenspiel „Sicherheit und Privatsphäre“.},
    booktitle = {Informatik 2016: von {Menschen} für {Menschen}},
    publisher = {GI-Edition-Lecture Notes in Informatics (LNI)},
    author = {Reuter, Christian and Geilen, Gordian and Gellert, Robin},
    editor = {Mayr, Heinrich C. and Pinzger, Martin},
    year = {2016},
    keywords = {Peace, Student, Security, UsableSec, HCI, SocialMedia, Projekt-KOKOS, Ranking-CORE-C, Ranking-VHB-C},
    }

    2015

  • Christian Reuter, Julian Schröter (2015)
    Microblogging during the European Floods 2013: What Twitter May Contribute in German Emergencies
    International Journal of Information Systems for Crisis Response and Management (IJISCRAM) ;7(1):22–41.
    [BibTeX] [Abstract] [Download PDF]

    Social media is becoming more and more important in crisis management. However its analysis by emergency services still bears unaddressed challenges and the majority of studies focus on the use of social media in the USA. In this paper German tweets of the European Flood 2013 are therefore captured and analyzed using descriptive statistics, qualitative data coding, and computational algorithms. Our work illustrates that this event provided sufficient German traffic and geo-locations as well as enough original data (not derivative). However, up-to-date Named Entity Recognizer (NER) with German classifier could not recognize German rivers and highways satisfactorily. Furthermore our analysis revealed pragmatic (linguistic) barriers resulting from irony, wordplay, and ambiguity, as well as in retweet-behavior. To ease the analysis of data we suggest a retweet ratio, which is illustrated to be higher with important tweets and may help selecting tweets for mining. We argue that existing software has to be adapted and improved for German language characteristics, also to detect markedness, seriousness and truth

    @article{reuter_microblogging_2015,
    title = {Microblogging during the {European} {Floods} 2013: {What} {Twitter} {May} {Contribute} in {German} {Emergencies}},
    volume = {7},
    url = {http://www.peasec.de/paper/2015/2015_ReuterSchroeter_MicrobloggingEuropeanFloods_IJISCRAM.pdf},
    abstract = {Social media is becoming more and more important in crisis management. However its analysis by emergency services still bears unaddressed challenges and the majority of studies focus on the use of social media in the USA. In this paper German tweets of the European Flood 2013 are therefore captured and analyzed using descriptive statistics, qualitative data coding, and computational algorithms. Our work illustrates that this event provided sufficient German traffic and geo-locations as well as enough original data (not derivative). However, up-to-date Named Entity Recognizer (NER) with German classifier could not recognize German rivers and highways satisfactorily. Furthermore our analysis revealed pragmatic (linguistic) barriers resulting from irony, wordplay, and ambiguity, as well as in retweet-behavior. To ease the analysis of data we suggest a retweet ratio, which is illustrated to be higher with important tweets and may help selecting tweets for mining. We argue that existing software has to be adapted and improved for German language characteristics, also to detect markedness, seriousness and truth},
    number = {1},
    journal = {International Journal of Information Systems for Crisis Response and Management (IJISCRAM)},
    author = {Reuter, Christian and Schröter, Julian},
    year = {2015},
    keywords = {Student, Crisis, HCI, SocialMedia, Cooperation, Projekt-EmerGent},
    pages = {22--41},
    }

  • Thomas Ludwig, Christian Reuter, Tim Siebigteroth, Volkmar Pipek (2015)
    CrowdMonitor: Mobile Crowd Sensing for Assessing Physical and Digital Activities of Citizens during Emergencies
    Proceedings of the Conference on Human Factors in Computing Systems (CHI) New York, USA.
    [BibTeX] [Abstract] [Download PDF]

    Emergencies such as the 2013 Central European flood or the 2013 typhoon Haiyan in Philippines have shown how citizens can organize themselves and coordinate private relief activities. These activities can be found in (physical) groups of affected people, but also within (digital) social media communities. There is an evident need, however, for a clearer picture of what exactly is going on to be available for use by the official emergency services: to enlist them, to keep them safe, to support their efforts and to avoid need-less duplications or conflicts. Aligning emergency services and volunteer activities is, then, crucial. In this paper we present a mobile crowd sensing based concept, which was designed as well as implemented as the application CrowdMonitor and facilitates the detection of physical and digital activities and the assignment of specific tasks to citizens. Finally, we outline the findings of its evaluation.

    @inproceedings{ludwig_crowdmonitor_2015,
    address = {New York, USA},
    title = {{CrowdMonitor}: {Mobile} {Crowd} {Sensing} for {Assessing} {Physical} and {Digital} {Activities} of {Citizens} during {Emergencies}},
    url = {https://www.wineme.uni-siegen.de/paper/2015/2015_ludwigreutersiebigterothpipek_crowdmonitor_chi.pdf},
    abstract = {Emergencies such as the 2013 Central European flood or the 2013 typhoon Haiyan in Philippines have shown how citizens can organize themselves and coordinate private relief activities. These activities can be found in (physical) groups of affected people, but also within (digital) social media communities. There is an evident need, however, for a clearer picture of what exactly is going on to be available for use by the official emergency services: to enlist them, to keep them safe, to support their efforts and to avoid need-less duplications or conflicts. Aligning emergency services and volunteer activities is, then, crucial. In this paper we present a mobile crowd sensing based concept, which was designed as well as implemented as the application CrowdMonitor and facilitates the detection of physical and digital activities and the assignment of specific tasks to citizens. Finally, we outline the findings of its evaluation.},
    booktitle = {Proceedings of the {Conference} on {Human} {Factors} in {Computing} {Systems} ({CHI})},
    publisher = {ACM Press},
    author = {Ludwig, Thomas and Reuter, Christian and Siebigteroth, Tim and Pipek, Volkmar},
    editor = {Begole, Bo and Jinwoo, Kim and Kor, Inkpeni and Woontack, Woo},
    year = {2015},
    keywords = {Student, Crisis, HCI, A-Paper, Ranking-CORE-A*, Cooperation, Projekt-EmerGent, Ranking-WKWI-A},
    pages = {4083--4092},
    }

  • Thomas Ludwig, Christian Reuter, Ralf Heukäufer (2015)
    CoTable: Collaborative Social Media Analysis with Multi-Touch Tables
    Proceedings of the Information Systems for Crisis Response and Management (ISCRAM) Kristiansand, Norway.
    [BibTeX] [Abstract] [Download PDF]

    To be able to take efficient measures in crisis management, it is essential for emergency services to get as much details about an actual situation on-site as possible. Currently content from social media plays an important role since those platforms are used to spread crisis-relevant data within the population. Our contribution presents a concept which supports the situation assessment practices of emergency services by collaboratively evaluating and by analyzing citizen-generated content from social media using a multi-touch table. The concept was implemented based on a Microsoft PixelSense and evaluated with 14 participants. The results reveal the impact of subjectivity of the participants, their positioning around the table as well as the uniqueness of social media posts on the collaborative situation assessment with multi-touch tables

    @inproceedings{ludwig_cotable_2015,
    address = {Kristiansand, Norway},
    title = {{CoTable}: {Collaborative} {Social} {Media} {Analysis} with {Multi}-{Touch} {Tables}},
    url = {https://www.wineme.uni-siegen.de/paper/2015/2015_ludwigreuterheukaeuferpipek_cotable_iscram.pdf},
    abstract = {To be able to take efficient measures in crisis management, it is essential for emergency services to get as much details about an actual situation on-site as possible. Currently content from social media plays an important role since those platforms are used to spread crisis-relevant data within the population. Our contribution presents a concept which supports the situation assessment practices of emergency services by collaboratively evaluating and by analyzing citizen-generated content from social media using a multi-touch table. The concept was implemented based on a Microsoft PixelSense and evaluated with 14 participants. The results reveal the impact of subjectivity of the participants, their positioning around the table as well as the uniqueness of social media posts on the collaborative situation assessment with multi-touch tables},
    booktitle = {Proceedings of the {Information} {Systems} for {Crisis} {Response} and {Management} ({ISCRAM})},
    publisher = {ISCRAM},
    author = {Ludwig, Thomas and Reuter, Christian and Heukäufer, Ralf},
    editor = {Palen, Leysia and Büscher, Monika and Comes, Tina and Hughes, Amanda Lee},
    year = {2015},
    keywords = {Student, Crisis, HCI, SocialMedia, Cooperation, Projekt-EmerGent},
    }

  • Christian Reuter, Thomas Ludwig, Timo Funke, Volkmar Pipek (2015)
    SOMAP: Network Independent Social-Offline-Map-Mashup
    Proceedings of the Information Systems for Crisis Response and Management (ISCRAM) Kristiansand, Norway.
    [BibTeX] [Abstract] [Download PDF]

    Maps, showing the tactical or the administrative situation at any particular time, play a central role in disaster management. They can be realized as interactive map mashups. In addition to classical information (weather, water levels, energy network, forces), they can also be used to present a view on citizen-generated content, e.g. from social media. In this paper we offer insights into how mobile map mashups can assist citizens during infrastructure failures that often occur in large-scale emergencies. Based on a review of approaches and mobile applications from literature and especially from practice, we present SOMAP (social offline map), a mobile app we developed in Android. It offers offline map functionality in terms of (A) pro-active loading and storing of potentially needed maps of the respective area as well as (B) the possibility of exchanging information from social media using Bluetooth. The application was evaluated qualitatively, to gain insights into the potential of such applications.

    @inproceedings{reuter_somap_2015,
    address = {Kristiansand, Norway},
    title = {{SOMAP}: {Network} {Independent} {Social}-{Offline}-{Map}-{Mashup}},
    url = {https://www.wineme.uni-siegen.de/paper/2015/2015_reuterludwigfunkepipek_somap-socialofflinemap_iscram.pdf},
    abstract = {Maps, showing the tactical or the administrative situation at any particular time, play a central role in disaster management. They can be realized as interactive map mashups. In addition to classical information (weather, water levels, energy network, forces), they can also be used to present a view on citizen-generated content, e.g. from social media. In this paper we offer insights into how mobile map mashups can assist citizens during infrastructure failures that often occur in large-scale emergencies. Based on a review of approaches and mobile applications from literature and especially from practice, we present SOMAP (social offline map), a mobile app we developed in Android. It offers offline map functionality in terms of (A) pro-active loading and storing of potentially needed maps of the respective area as well as (B) the possibility of exchanging information from social media using Bluetooth. The application was evaluated qualitatively, to gain insights into the potential of such applications.},
    booktitle = {Proceedings of the {Information} {Systems} for {Crisis} {Response} and {Management} ({ISCRAM})},
    publisher = {ISCRAM},
    author = {Reuter, Christian and Ludwig, Thomas and Funke, Timo and Pipek, Volkmar},
    editor = {Palen, Leysia and Büscher, Monika and Comes, Tina and Hughes, Amanda Lee},
    year = {2015},
    keywords = {Student, Security, UsableSec, HCI, SocialMedia, Infrastructure, Cooperation, Projekt-EmerGent},
    }

    2014

  • Christian Reuter, Simon Scholl (2014)
    Technical Limitations for Designing Applications for Social Media
    Mensch und Computer 2014 – Workshopband München, Germany.
    [BibTeX] [Abstract] [Download PDF]

    Social media content is used in various applications for businesses, organizations and citizens. However, there are technical limitations for analyzing content from social media; these include the way how data can be gained and which safety regulations as well as query limitations have to be considered. They are of specific importance when designing applications for time critical scenarios, such as crisis management. This paper analyzes these limitations (in June 2014) for the most important social media. The selection of social media is based on the Monthly Active Users (MAU), which counts unique users over 30 days. Besides the identification of various limitations, this paper outlines ap proaches to access the data and summarizes design considerations.

    @inproceedings{reuter_technical_2014,
    address = {München, Germany},
    title = {Technical {Limitations} for {Designing} {Applications} for {Social} {Media}},
    url = {http://www.peasec.de/paper/2014/2014_ReuterScholl_TechnicalLimitationsSocialMedia_MuC.pdf},
    abstract = {Social media content is used in various applications for businesses, organizations and citizens. However, there are technical limitations for analyzing content from social media; these include the way how data can be gained and which safety regulations as well as query limitations have to be considered. They are of specific importance when designing applications for time critical scenarios, such as crisis management. This paper analyzes these limitations (in June 2014) for the most important social media. The selection of social media is based on the Monthly Active Users (MAU), which counts unique users over 30 days. Besides the identification of various limitations, this paper outlines ap proaches to access the data and summarizes design considerations.},
    booktitle = {Mensch und {Computer} 2014 - {Workshopband}},
    publisher = {Oldenbourg-Verlag},
    author = {Reuter, Christian and Scholl, Simon},
    editor = {Koch, M. and Butz, A. and Schlichter, J.},
    year = {2014},
    keywords = {Student, SocialMedia, Infrastructure},
    pages = {131--140},
    }

  • Christian Reuter, Michael Ritzkatis (2014)
    Adaptierbare Bewertung bürgergenerierter Inhalte aus sozialen Medien
    Mensch & Computer: Interaktiv unterwegs – Freiräume gestalten München, Germany.
    [BibTeX] [Abstract] [Download PDF]

    Zwei Drittel aller Internetnutzer in Deutschland nutzen soziale Medien. Neben der Kommunikation mit eigenen Kontakten werden dort auch vermehrt Fotos, Filme und Inhalte ganz bewusst öffentlich geteilt. Vergangene Ereignisse, wie das Hochwasser in Mitteleuropa im Juni 2013, haben gezeigt, dass diese alltäglichen Verhaltensweisen ebenso in Ausnahmesituationen fortgeführt werden und bürgergenierte Inhalte auch dann beispielsweise über Facebook und Twitter verbreitet werden. Diese werden in Teilen von Behörden und Organisationen mit Sicherheitsaufgaben (BOS), wie der Polizei und Feuerwehr, ausgewertet und für die Lagebeurteilung genutzt. Dieser Beitrag stellt, basierend auf einer Analyse verwandter Arbeiten, die Ergebnisse einer empirischen Untersuchung zur Nutzung bürgergenerierter Inhalte und die Bedingungen für deren Integration in die Lagebeurteilung durch BOS dar. Die hieraus gewonnenen Erkenntnisse münden in Anforderungen an einen adaptierbaren Bewertungsmechanismus für bürgergenerierte Inhalte aus sozialen Medien.

    @inproceedings{reuter_adaptierbare_2014,
    address = {München, Germany},
    title = {Adaptierbare {Bewertung} bürgergenerierter {Inhalte} aus sozialen {Medien}},
    url = {https://dl.gi.de/bitstream/handle/20.500.12116/7536/Reuter_Ritzkatis_2014.pdf},
    abstract = {Zwei Drittel aller Internetnutzer in Deutschland nutzen soziale Medien. Neben der Kommunikation mit eigenen Kontakten werden dort auch vermehrt Fotos, Filme und Inhalte ganz bewusst öffentlich geteilt. Vergangene Ereignisse, wie das Hochwasser in Mitteleuropa im Juni 2013, haben gezeigt, dass diese alltäglichen Verhaltensweisen ebenso in Ausnahmesituationen fortgeführt werden und bürgergenierte Inhalte auch dann beispielsweise über Facebook und Twitter verbreitet werden. Diese werden in Teilen von Behörden und Organisationen mit Sicherheitsaufgaben (BOS), wie der Polizei und Feuerwehr, ausgewertet und für die Lagebeurteilung genutzt. Dieser Beitrag stellt, basierend auf einer Analyse verwandter Arbeiten, die Ergebnisse einer empirischen Untersuchung zur Nutzung bürgergenerierter Inhalte und die Bedingungen für deren Integration in die Lagebeurteilung durch BOS dar. Die hieraus gewonnenen Erkenntnisse münden in Anforderungen an einen adaptierbaren Bewertungsmechanismus für bürgergenerierte Inhalte aus sozialen Medien.},
    booktitle = {Mensch \& {Computer}: {Interaktiv} unterwegs – {Freiräume} gestalten},
    publisher = {Oldenbourg-Verlag},
    author = {Reuter, Christian and Ritzkatis, Michael},
    editor = {Koch, Michael and Butz, Andreas and Schlichter, Johann},
    year = {2014},
    keywords = {Student, Crisis, HCI, SocialMedia, Projekt-EmerGent},
    pages = {115--124},
    }

    2013

  • Christian Reuter, Oliver Heger, Volkmar Pipek (2013)
    Combining Real and Virtual Volunteers through Social Media
    Proceedings of the Information Systems for Crisis Response and Management (ISCRAM) Baden-Baden, Germany.
    [BibTeX] [Abstract] [Download PDF]

    Recent studies have called attention to the improvement of “collaborative resilience” by fostering the collaboration potentials of public and private stakeholders during disasters. With our research we consider real and virtual volunteers in order to detect conditions for cooperation among those citizen groups through social media. Therefore we analysed the usage of Twitter during a tornado crisis to look for role patterns and aspects that helped volunteer groups in the virtual to emerge, and matched the data with an interview study on experiences, attitudes, concerns and potentials professional emergency services recounted in the emergence of volunteer groups in the real. While virtual groups seem to easily form and collaborate, the engagement of real volunteers is decreasing according to the perception of professionals. We discuss the dynamics in both tendencies and suggest design implications (use of existing social networks, promotion and awareness, connection among volunteers, connection to emergency services and systems) to support both types of volunteer groups, which lead to a software prototype.

    @inproceedings{reuter_combining_2013,
    address = {Baden-Baden, Germany},
    title = {Combining {Real} and {Virtual} {Volunteers} through {Social} {Media}},
    url = {http://www.peasec.de/paper/2013/2013_ReuterHegerPipek_RealVirtualVolunteersSocialMedia_ISCRAM.pdf},
    abstract = {Recent studies have called attention to the improvement of “collaborative resilience” by fostering the collaboration potentials of public and private stakeholders during disasters. With our research we consider real and virtual volunteers in order to detect conditions for cooperation among those citizen groups through social media. Therefore we analysed the usage of Twitter during a tornado crisis to look for role patterns and aspects that helped volunteer groups in the virtual to emerge, and matched the data with an interview study on experiences, attitudes, concerns and potentials professional emergency services recounted in the emergence of volunteer groups in the real. While virtual groups seem to easily form and collaborate, the engagement of real volunteers is decreasing according to the perception of professionals. We discuss the dynamics in both tendencies and suggest design implications (use of existing social networks, promotion and awareness, connection among volunteers, connection to emergency services and systems) to support both types of volunteer groups, which lead to a software prototype.},
    booktitle = {Proceedings of the {Information} {Systems} for {Crisis} {Response} and {Management} ({ISCRAM})},
    publisher = {ISCRAM},
    author = {Reuter, Christian and Heger, Oliver and Pipek, Volkmar},
    editor = {Comes, T. and Fiedrich, F. and Fortier, S. and Geldermann, J. and Müller, Tim},
    year = {2013},
    keywords = {Student, Crisis, HCI, Selected, AuswahlCrisis, SocialMedia, Cooperation, Projekt-InfoStrom},
    pages = {780--790},
    }

  • Christian Reuter, Michael Ritzkatis (2013)
    Unterstützung mobiler Geo-Kollaboration zur Lageeinschätzung von Feuerwehr und Polizei
    Proceedings of the International Conference on Wirtschaftsinformatik (WI) (Best Paper Award Nominee) Leipzig, Germany.
    [BibTeX] [Abstract] [Download PDF]

    Aufgrund komplexer und dringlicher Aufgaben steht die Zusammenarbeit über örtliche und organisationale Grenzen hinweg bei Behörden und Organisationen mit Sicherheitsaufgaben (BOS), wie Feuerwehr und Polizei, an der Tagesordnung. Ziel dieses Beitrags ist es zu untersuchen, wie die Kollaboration von Einsatzkräften vor Ort und jenen in der Leitstelle durch mobile Geokollaborationssysteme unterstützt werden kann. Nach einer Darstellung verwandter Arbeiten werden anhand einer qualitativen empirischen Studie die Informations- und Kommunikationspraktiken mobiler Einsatzkräfte vorgestellt. Hierauf aufbauend folgt die Konzeptionierung und Umsetzung eines mobilen Geokolla- borationssystems, welches an ein bestehendes Krisenmanagementsystem und Geoinformationssystem (GIS) angebunden ist und als Android-App realisiert wurde. Abschließend werden die Evaluationsergebnisse dieses Systems im Anwendungsfeld vorgestellt.

    @inproceedings{reuter_unterstutzung_2013,
    address = {Leipzig, Germany},
    title = {Unterstützung mobiler {Geo}-{Kollaboration} zur {Lageeinschätzung} von {Feuerwehr} und {Polizei}},
    url = {http://www.peasec.de/paper/2013/2013_ReuterRitzkatis_MobileGeoKollaboration_WI.pdf},
    abstract = {Aufgrund komplexer und dringlicher Aufgaben steht die Zusammenarbeit über örtliche und organisationale Grenzen hinweg bei Behörden und Organisationen mit Sicherheitsaufgaben (BOS), wie Feuerwehr und Polizei, an der Tagesordnung. Ziel dieses Beitrags ist es zu untersuchen, wie die Kollaboration von Einsatzkräften vor Ort und jenen in der Leitstelle durch mobile Geokollaborationssysteme unterstützt werden kann. Nach einer Darstellung verwandter Arbeiten werden anhand einer qualitativen empirischen Studie die Informations- und Kommunikationspraktiken mobiler Einsatzkräfte vorgestellt. Hierauf aufbauend folgt die Konzeptionierung und Umsetzung eines mobilen Geokolla- borationssystems, welches an ein bestehendes Krisenmanagementsystem und Geoinformationssystem (GIS) angebunden ist und als Android-App realisiert wurde. Abschließend werden die Evaluationsergebnisse dieses Systems im Anwendungsfeld vorgestellt.},
    booktitle = {Proceedings of the {International} {Conference} on {Wirtschaftsinformatik} ({WI}) ({Best} {Paper} {Award} {Nominee})},
    author = {Reuter, Christian and Ritzkatis, Michael},
    editor = {Alt, Rainer and Franczyk, Bogdan},
    year = {2013},
    keywords = {Student, UsableSec, Crisis, HCI, SocialMedia, Cooperation, Ranking-CORE-C, Ranking-VHB-C, Ranking-WKWI-A, Projekt-InfoStrom},
    pages = {1877--1891},
    }

    2012

  • Christian Reuter, Alexandra Marx, Volkmar Pipek (2012)
    Crisis Management 2.0: Towards a Systematization of Social Software Use in Crisis Situations
    International Journal of Information Systems for Crisis Response and Management (IJISCRAM) ;4(1):1–16. doi:10.4018/jiscrm.2012010101
    [BibTeX] [Abstract] [Download PDF]

    The contribution of this paper is to propose a systematization of social software use in crisis situations pointing out different types of cooperation and its challenges. We will discuss how the organizational actors involved in crisis management (police, fire-fighters, organizations etc.) and the affected citizens are communicating and can communicate and collaborate through the use of social software. After defining the term ‘social software‘ we will outline the state-of-the-art about its use in crisis management. Drawing from this, we will present two case studies where we have examined the use of social software in 2010: first during the disruption of air travel caused by the eruptions of the volcano Eyjafjallajökull in Iceland and second during the mass panic at the Love Parade music festival in Germany. Based on both previous work and case studies we will discuss potentials and weaknesses and propose a classification matrix for different types of cooperation as a step towards a systematization of social software use in crisis situations.

    @article{reuter_crisis_2012,
    title = {Crisis {Management} 2.0: {Towards} a {Systematization} of {Social} {Software} {Use} in {Crisis} {Situations}},
    volume = {4},
    url = {http://www.peasec.de/paper/2012/2012_ReuterMarxPipek_CrisisManagement20-SystematizationSocialSoftware_IJISCRAM.pdf},
    doi = {10.4018/jiscrm.2012010101},
    abstract = {The contribution of this paper is to propose a systematization of social software use in crisis situations pointing out different types of cooperation and its challenges. We will discuss how the organizational actors involved in crisis management (police, fire-fighters, organizations etc.) and the affected citizens are communicating and can communicate and collaborate through the use of social software. After defining the term ‘social software' we will outline the state-of-the-art about its use in crisis management. Drawing from this, we will present two case studies where we have examined the use of social software in 2010: first during the disruption of air travel caused by the eruptions of the volcano Eyjafjallajökull in Iceland and second during the mass panic at the Love Parade music festival in Germany. Based on both previous work and case studies we will discuss potentials and weaknesses and propose a classification matrix for different types of cooperation as a step towards a systematization of social software use in crisis situations.},
    number = {1},
    journal = {International Journal of Information Systems for Crisis Response and Management (IJISCRAM)},
    author = {Reuter, Christian and Marx, Alexandra and Pipek, Volkmar},
    year = {2012},
    keywords = {Student, Crisis, HCI, Selected, AuswahlCrisis, SocialMedia, Cooperation, Projekt-InfoStrom, Projekt-RSBE},
    pages = {1--16},
    }

  • Christian Reuter, Oliver Heger, Volkmar Pipek (2012)
    Social Media for Supporting Emergent Groups in Crisis Management
    Proceedings of the CSCW Workshop on Collaboration and Crisis Informatics, International Reports on Socio Informatics Bonn, Germany.
    [BibTeX] [Abstract] [Download PDF]

    The great importance of Social Media for our today’s life causes an increasing use of internet-based platforms in crisis situations. Our work intends to show how so-called Emergent Groups, which arise as a result of crises, consist of private citizens and are not yet institutionalized organizations, can be supported by Social Media. At first, our literature review’s objective is to define the term ‘Emergent Group‘ and to outline their usage of Social Media as well as software-based requirements and suitable concepts to support such groups. A following quantitative and qualitative empirical analysis of a tornado crisis in the USA enables a closer look at especially virtual working Emergent Groups. Building on our literature review and empirical analysis, we discuss implications, derive further requirements and present a concept for the design of appropriate Social Software. We finally conclude by giving some potential research issues.

    @inproceedings{reuter_social_2012,
    address = {Bonn, Germany},
    title = {Social {Media} for {Supporting} {Emergent} {Groups} in {Crisis} {Management}},
    url = {http://www.peasec.de/paper/2012/2012_ReuterHegerPipek_SocialMediaEmergentGroups_CSCW-WS.pdf},
    abstract = {The great importance of Social Media for our today's life causes an increasing use of internet-based platforms in crisis situations. Our work intends to show how so-called Emergent Groups, which arise as a result of crises, consist of private citizens and are not yet institutionalized organizations, can be supported by Social Media. At first, our literature review's objective is to define the term ‘Emergent Group' and to outline their usage of Social Media as well as software-based requirements and suitable concepts to support such groups. A following quantitative and qualitative empirical analysis of a tornado crisis in the USA enables a closer look at especially virtual working Emergent Groups. Building on our literature review and empirical analysis, we discuss implications, derive further requirements and present a concept for the design of appropriate Social Software. We finally conclude by giving some potential research issues.},
    booktitle = {Proceedings of the {CSCW} {Workshop} on {Collaboration} and {Crisis} {Informatics}, {International} {Reports} on {Socio} {Informatics}},
    author = {Reuter, Christian and Heger, Oliver and Pipek, Volkmar},
    editor = {Pipek, Volkmar and Palen, Leysia and Landgren, Jonas},
    year = {2012},
    keywords = {Student, Crisis, HCI, SocialMedia, Cooperation, Projekt-InfoStrom},
    pages = {84--92},
    }

    2011

  • Christian Reuter, Patrik Pohl, Volkmar Pipek (2011)
    Umgang mit Terminologien in inter- organisationaler Krisenkooperation – eine explorative Empirie
    Mensch & Computer 2011: Übermedien Übermorgen München, Germany.
    [BibTeX] [Abstract] [Download PDF]

    Ziel dieser Arbeit ist es, die Auswirkungen terminologischer Mehrdeutigkeiten, d.h. unterschiedlicher Begriffs-Verständnisse heterogener Akteursgruppen, auf die Gestaltung organisationsübergreifender Kooperationssysteme herauszustellen. Nach einer Darstellung theoretischer Ansätze des Umgangs mit Terminologien stellen wir unsere explorative empirische Studie, die wir am Beispiel des organisationsübergreifenden Krisenmanagements durchgeführt haben, vor. Hierauf aufbauend präsentieren wir unsere Befunde, leiten Anforderungen ab und schlagen technische Lösungen vor. Auch diskutieren wir Ansätze des Terminologiemanagements bezüglich ihrer Anwendbarkeit und stellen kooperative Ansätze zum Umgang mit Terminologien in interorganisationalen Kooperationssystemen vor.

    @inproceedings{reuter_umgang_2011,
    address = {München, Germany},
    title = {Umgang mit {Terminologien} in inter- organisationaler {Krisenkooperation} - eine explorative {Empirie}},
    isbn = {978-3-486-71235-3},
    url = {http://www.peasec.de/paper/2011/2011_ReuterPohlPipek_UmgangTerminologienKrisenkooperation_MenschComputer.pdf},
    abstract = {Ziel dieser Arbeit ist es, die Auswirkungen terminologischer Mehrdeutigkeiten, d.h. unterschiedlicher Begriffs-Verständnisse heterogener Akteursgruppen, auf die Gestaltung organisationsübergreifender Kooperationssysteme herauszustellen. Nach einer Darstellung theoretischer Ansätze des Umgangs mit Terminologien stellen wir unsere explorative empirische Studie, die wir am Beispiel des organisationsübergreifenden Krisenmanagements durchgeführt haben, vor. Hierauf aufbauend präsentieren wir unsere Befunde, leiten Anforderungen ab und schlagen technische Lösungen vor. Auch diskutieren wir Ansätze des Terminologiemanagements bezüglich ihrer Anwendbarkeit und stellen kooperative Ansätze zum Umgang mit Terminologien in interorganisationalen Kooperationssystemen vor.},
    booktitle = {Mensch \& {Computer} 2011: Übermedien Übermorgen},
    publisher = {Oldenbourg-Verlag},
    author = {Reuter, Christian and Pohl, Patrik and Pipek, Volkmar},
    editor = {Eibl, Maximilian},
    year = {2011},
    keywords = {Student, Crisis, HCI, Cooperation, Projekt-InfoStrom, Projekt-RSBE},
    pages = {171--180},
    }

  • Christian Reuter, Alexandra Marx, Volkmar Pipek (2011)
    Social Software as an Infrastructure for Crisis Management – a Case Study about Current Practice and Potential Usage
    Proceedings of the Information Systems for Crisis Response and Management (ISCRAM) Lisbon, Portugal.
    [BibTeX] [Abstract] [Download PDF]

    In this paper we will be discussing how the (semi-)professional actors involved in crisis management (police, fire-fighters, etc.) and the affected citizens can communicate and collaborate by the use of social software. After the definition of the term ‘social software‘ we will provide the state-of-the-art on current social software use in crisis management. Drawing from this, we will present two case studies where we examined the social software use in 2010: First during the disruption of air travel due to the eruptions of Eyjafjallajökull volcano in Iceland, second during the crisis at a stampede at the Love Parade music festival in Germany. We identified weak points and further potentials and tested the validity of the American case study findings from literature for Europe. We will conclude with a concept for using citizens in inter-organizational crisis management with a social software infrastructure and a communication matrix for crisis management.

    @inproceedings{reuter_social_2011,
    address = {Lisbon, Portugal},
    title = {Social {Software} as an {Infrastructure} for {Crisis} {Management} – a {Case} {Study} about {Current} {Practice} and {Potential} {Usage}},
    url = {http://www.peasec.de/paper/2011/2011_ReuterMarxPipek_SocialSoftwareInfrastructure_ISCRAM.pdf},
    abstract = {In this paper we will be discussing how the (semi-)professional actors involved in crisis management (police, fire-fighters, etc.) and the affected citizens can communicate and collaborate by the use of social software. After the definition of the term ‘social software' we will provide the state-of-the-art on current social software use in crisis management. Drawing from this, we will present two case studies where we examined the social software use in 2010: First during the disruption of air travel due to the eruptions of Eyjafjallajökull volcano in Iceland, second during the crisis at a stampede at the Love Parade music festival in Germany. We identified weak points and further potentials and tested the validity of the American case study findings from literature for Europe. We will conclude with a concept for using citizens in inter-organizational crisis management with a social software infrastructure and a communication matrix for crisis management.},
    booktitle = {Proceedings of the {Information} {Systems} for {Crisis} {Response} and {Management} ({ISCRAM})},
    publisher = {ISCRAM},
    author = {Reuter, Christian and Marx, Alexandra and Pipek, Volkmar},
    year = {2011},
    keywords = {Student, Crisis, HCI, SocialMedia, Infrastructure, Cooperation, Projekt-InfoStrom, Projekt-RSBE},
    pages = {1--10},
    }

  • Christian Reuter, Alexandra Marx, Volkmar Pipek (2011)
    Desaster 2.0: Einbeziehung von Bürgern in das Krisenmanagement
    Mensch & Computer 2011: Übermedien Übermorgen München, Germany.
    [BibTeX] [Abstract] [Download PDF]

    In dieser Arbeit soll untersucht werden, wie die im Krisenmanagement beteiligten Akteure (wie Polizei, Feuerwehr, Hilfsorganisationen, Infrastrukturbetreiber) und die betroffenen Bürger mittels Social Software kommunizieren und kollaborieren können. Anhand unserer Literaturstudie stellen wir einen Überblick über vergangene Forschung in diesem Bereich dar. Hierauf aufbauend präsentieren wir unsere beiden Fallstudien zur Nutzung von Social Software in Krisen: Zum einen während der Flugausfälle im Zuge des Vulkanausbruchs auf Island im April 2010, zum anderen im Zuge des Loveparade-Unglücks am 24.07.2010. Anschließend stellen wir identifizierte Stärken und Schwächen dar und fassen identifizierte Potentiale in einer Klassifikationsmatrix für Social Software im Krisenmanagement zusammen.

    @inproceedings{reuter_desaster_2011,
    address = {München, Germany},
    title = {Desaster 2.0: {Einbeziehung} von {Bürgern} in das {Krisenmanagement}},
    isbn = {978-3-486-71235-3},
    url = {http://www.peasec.de/paper/2011/2011_ReuterMarxPipek_Desaster20-EinbeziehungBuergerKrisenmanagement_MuC.pdf},
    abstract = {In dieser Arbeit soll untersucht werden, wie die im Krisenmanagement beteiligten Akteure (wie Polizei, Feuerwehr, Hilfsorganisationen, Infrastrukturbetreiber) und die betroffenen Bürger mittels Social Software kommunizieren und kollaborieren können. Anhand unserer Literaturstudie stellen wir einen Überblick über vergangene Forschung in diesem Bereich dar. Hierauf aufbauend präsentieren wir unsere beiden Fallstudien zur Nutzung von Social Software in Krisen: Zum einen während der Flugausfälle im Zuge des Vulkanausbruchs auf Island im April 2010, zum anderen im Zuge des Loveparade-Unglücks am 24.07.2010. Anschließend stellen wir identifizierte Stärken und Schwächen dar und fassen identifizierte Potentiale in einer Klassifikationsmatrix für Social Software im Krisenmanagement zusammen.},
    booktitle = {Mensch \& {Computer} 2011: Übermedien Übermorgen},
    publisher = {Oldenbourg-Verlag},
    author = {Reuter, Christian and Marx, Alexandra and Pipek, Volkmar},
    editor = {Eibl, Maximilian},
    year = {2011},
    keywords = {Student, HCI, SocialMedia, Cooperation, Projekt-InfoStrom, Projekt-RSBE},
    pages = {141--150},
    }

    2008

  • Christian Reuter, Christopher Georg (2008)
    Entwicklung eines webbasierten Dokumentenmanagement-Systems für eine Fluggesellschaft
    Journal WIRTSCHAFTSINFORMATIK ;50(2):142–145. doi:10.1365/s11576-008-0026-0
    [BibTeX] [Download PDF]

    @article{reuter_entwicklung_2008,
    title = {Entwicklung eines webbasierten {Dokumentenmanagement}-{Systems} für eine {Fluggesellschaft}},
    volume = {50},
    url = {http://www.peasec.de/paper/2008/2008_ReuterGeorg_EntwicklungWebbasiertesDMSFluggesellschaft_WI.pdf},
    doi = {10.1365/s11576-008-0026-0},
    number = {2},
    journal = {Journal WIRTSCHAFTSINFORMATIK},
    author = {Reuter, Christian and Georg, Christopher},
    year = {2008},
    keywords = {Student, HCI, A-Paper, Ranking-ImpactFactor, Cooperation, Ranking-VHB-B, Ranking-WKWI-A},
    pages = {142--145},
    }