Wissenschaftlicher Mitarbeiter / Doktorand
Kontakt: +49 (0) 6151 / 1620942 | baeumler(at)peasec.tu-darmstadt.de
Technische Universität Darmstadt, Fachbereich Informatik, Wissenschaft und Technik für Frieden und Sicherheit (PEASEC) Pankratiusstraße 2, 64289 Darmstadt, Raum 110
DE
Julian Bäumler, M.A. ist wissenschaftlicher Mitarbeiter und Doktorand am Lehrstuhl Wissenschaft und Technik für Frieden und Sicherheit (PEASEC) im Fachbereich Informatik der Technischen Universität Darmstadt. Er arbeitet im BMBF-Projekt CYLENCE (2023-2027) zur Entwicklung von Strategien und Werkzeugen gegen Cybermobbing und Hassbotschaften.
Sein primäres Forschungsinteresse liegt auf der nutzerzentrierten Gestaltung von Technologien zur Erkennung, Meldung und Analyse von sowie Reaktion auf Hassbotschaften, mit einem besonderen Schwerpunkt auf der Anwendungsdomäne der Ermittlungs- und Strafverfolgungsbehörden. Außerdem interessiert er sich für Open-Source Intelligence (OSINT) in sicherheitskritischen Kontexten und ethische, rechtliche und soziale Implikationen von Sicherheitstechnologien.
Er studierte „Governance and Public Policy“ (B.A.) an der Universität Passau und der Higher School of Economics in Moskau und hat seinen Master „Internationale Studien / Friedens- und Konfliktforschung“ (M.A.) an der Goethe-Universität Frankfurt, der Technischen Universität Darmstadt und der Tallinn University of Technology im Sommer 2023 abgeschlossen. Seine Masterarbeit untersuchte die Kollaboration und Technologieunterstützung in Hate Speech Meldestellen. Während des Studiums arbeitete er als studentische Hilfskraft bei PEASEC im BMBF-Projekt CYWARN (2020-2024).
EN
Julian Bäumler, M.A. is a research associate and doctoral student at the Chair of Science and Technology for Peace and Security (PEASEC) in the Department of Computer Science at the Technical University of Darmstadt. He works in the BMBF project CYLENCE (2023-2027) on the development of strategies and tools against cyberbullying and hate speech.
His primary research interest lies in the user-centric design of technologies for detecting, reporting, analyzing, and responding to hate speech, with a particular focus on the law enforcement domain. He is also interested in open-source intelligence (OSINT) in security-critical contexts and the ethical, legal, and social implications of security technologies.
He studied „Governance and Public Policy“ (B.A.) at the University of Passau and the Higher School of Economics in Moscow and completed his Master’s degree in „International Studies / Peace and Conflict Research“ (M.A.) at Goethe University Frankfurt, Darmstadt University of Technology and Tallinn University of Technology in summer 2023. His master thesis investigated collaboration and technology support in hate speech reporting centers. During his study he worked as a student assistant at PEASEC in the BMBF project CYWARN (2020-2024).
Publikationen
2024
[BibTeX] [Abstract]
In Germany, both law enforcement agencies and dedicated reporting centers engage in various activities to counter illegal online hate speech. Due to the high volume of such content and against the background of limited resources, their personnel can be confronted with the issue of information overload. To mitigate this issue, technologies for information filtering, classification, prioritization, and visualization offer great potential. However, domainspecific classification schemes that differentiate subtypes of online hate speech are a prerequisite for the development of such assistive tools. There is a gap in research with regard to an empirically substantiated classification scheme for subtypes of hate speech for the German law enforcement and reporting center domain. Based on a review of relevant computer science publications (N=24) and qualitative interviews with practitioners (N=18), this work investigates practice-relevant subtypes of hate speech and finds that it is primarily differentiated with regard to targeted group affiliations, the conveyance of an immediate security threat, and criminal relevance. It contributes to the state of research with an empirically grounded online hate speech classification scheme for German law enforcement agencies and reporting centers (C1) and five implications for the user-centered design of hate speech classification tools (C2).
@inproceedings{baumler_towards_2024,
address = {Karlsruhe, Germany},
title = {Towards an {Online} {Hate} {Speech} {Classification} {Scheme} for {German} {Law} {Enforcement} and {Reporting} {Centers}: {Insights} from {Research} and {Practice}},
doi = {10.18420/muc2024-mci-ws13-133},
abstract = {In Germany, both law enforcement agencies and dedicated reporting centers engage in various activities to counter illegal online hate speech. Due to the high volume of such content and against the background of limited resources, their personnel can be confronted with the issue of information overload. To mitigate this issue, technologies for information filtering, classification, prioritization, and visualization offer great potential. However, domainspecific classification schemes that differentiate subtypes of online hate speech are a prerequisite for the development of such assistive tools. There is a gap in research with regard to an empirically substantiated classification scheme for subtypes of hate speech for the German law enforcement and reporting center domain. Based on a review of relevant computer science publications (N=24) and qualitative interviews with practitioners (N=18), this work investigates practice-relevant subtypes of hate speech and finds that it is primarily differentiated with regard to targeted group affiliations, the conveyance of an immediate security threat, and criminal relevance. It contributes to the state of research with an empirically grounded online hate speech classification scheme for German law enforcement agencies and reporting centers (C1) and five implications for the user-centered design of hate speech classification tools (C2).},
language = {en},
booktitle = {Mensch und {Computer} 2024 - {Workshopband}},
publisher = {Gesellschaft für Informatik e.V.},
author = {Bäumler, Julian and Kaufhold, Marc-André and Voronin, Georg and Reuter, Christian},
year = {2024},
keywords = {UsableSec, HCI, Projekt-ATHENE-CyAware, Projekt-CYLENCE},
}
[BibTeX] [Abstract]
Computer Emergency Response Teams provide advisory, preventive, and reactive cybersecurity services for authorities, citizens, and businesses. However, their responsibility of establishing cyber situational awareness by monitoring and analyzing security advisories and vulnerabilities has become challenging due to the growing volume of information disseminated through public channels. Thus, this paper presents the preliminary design of a system for automatically retrieving and extracting security advisory documents from Common Security Advisory Framework (CSAF), HTML, and RSS sources. The evaluation with various security advisory sources (N=53) shows that the developed system can retrieve 90\% of the published advisory documents, which is a significant improvement over systems only relying on the retrieval from RSS feeds (30\%).
@inproceedings{kaufhold_towards_2024,
address = {Karlsruhe, Germany},
title = {Towards a {Security} {Advisory} {Content} {Retrieval} and {Extraction} {System} for {Computer} {Emergency} {Response} {Teams}},
doi = {10.18420/muc2024-mci-ws13-124},
abstract = {Computer Emergency Response Teams provide advisory, preventive, and reactive cybersecurity services for authorities, citizens, and businesses. However, their responsibility of establishing cyber situational awareness by monitoring and analyzing security advisories and vulnerabilities has become challenging due to the growing volume of information disseminated through public channels. Thus, this paper presents the preliminary design of a system for automatically retrieving and extracting security advisory documents from Common Security Advisory Framework (CSAF), HTML, and RSS sources. The evaluation with various security advisory sources (N=53) shows that the developed system can retrieve 90\% of the published advisory documents, which is a significant improvement over systems only relying on the retrieval from RSS feeds (30\%).},
language = {en},
booktitle = {Mensch und {Computer} 2024 - {Workshopband}},
publisher = {Gesellschaft für Informatik e.V.},
author = {Kaufhold, Marc-André and Bäumler, Julian and Koukal, Nicolai and Reuter, Christian},
year = {2024},
keywords = {UsableSec, HCI, Projekt-ATHENE-CyAware, Projekt-CYLENCE},
}
2023
[BibTeX] [Abstract] [Download PDF]
Despite the merits of public and social media in private and professional spaces, citizens and professionals are increasingly exposed to cyberabuse, such as cyberbullying and hate speech. Thus, Law Enforcement Agencies (LEA) are deployed in many countries and organisations to enhance the preventive and reactive capabilities against cyberabuse. However, their tasks are getting more complex by the increasing amount and varying quality of information disseminated into public channels. Adopting the perspectives of Crisis Informatics and safety-critical Human-Computer Interaction (HCI) and based on both a narrative literature review and group discussions, this paper first outlines the research agenda of the CYLENCE project, which seeks to design strategies and tools for cross-media reporting, detection, and treatment of cyberbullying and hatespeech in investigative and law enforcement agencies. Second, it identifies and elaborates seven research challenges with regard to the monitoring, analysis and communication of cyberabuse in LEAs, which serve as a starting point for in-depth research within the project.
@inproceedings{kaufhold_cylence_2023,
address = {Rapperswil, Switzerland},
title = {{CYLENCE}: {Strategies} and {Tools} for {Cross}-{Media} {Reporting}, {Detection}, and {Treatment} of {Cyberbullying} and {Hatespeech} in {Law} {Enforcement} {Agencies}},
url = {https://dl.gi.de/items/0e0efe8f-64bf-400c-85f7-02b65f83189d},
doi = {10.18420/muc2023-mci-ws01-211},
abstract = {Despite the merits of public and social media in private and professional spaces, citizens and professionals are increasingly exposed to cyberabuse, such as cyberbullying and hate speech. Thus, Law Enforcement Agencies (LEA) are deployed in many countries and organisations to enhance the preventive and reactive capabilities against cyberabuse. However, their tasks are getting more complex by the increasing amount and varying quality of information disseminated into public channels. Adopting the perspectives of Crisis Informatics and safety-critical Human-Computer Interaction (HCI) and based on both a narrative literature review and group discussions, this paper first outlines the research agenda of the CYLENCE project, which seeks to design strategies and tools for cross-media reporting, detection, and treatment of cyberbullying and hatespeech in investigative and law enforcement agencies. Second, it identifies and elaborates seven research challenges with regard to the monitoring, analysis and communication of cyberabuse in LEAs, which serve as a starting point for in-depth research within the project.},
language = {de},
booktitle = {Mensch und {Computer} 2023 - {Workshopband}},
publisher = {Gesellschaft für Informatik e.V.},
author = {Kaufhold, Marc-André and Bayer, Markus and Bäumler, Julian and Reuter, Christian and Stieglitz, Stefan and Basyurt, Ali Sercan and Mirabaie, Milad and Fuchß, Christoph and Eyilmez, Kaan},
year = {2023},
keywords = {UsableSec, HCI, Projekt-CYLENCE},
}
[BibTeX] [Abstract] [Download PDF]
The negotiation of stakeholder values as a collaborative process throughout technology development has been studied extensively within the fields of Computer Supported Cooperative Work and Human-Computer Interaction. Despite their increasing significance for cybersecurity incident response, there is a gap in research on values of importance to the design of open-source intelligence (OSINT) technologies for this purpose. In this paper, we investigate which values and value conflicts emerge due to the application and development of machine learning (ML) based OSINT technologies to assist cyber security incident response operators. For this purpose, we employ a triangulation of methods, consisting of a systematic survey of the technical literature on the development of OSINT artefacts for cybersecurity (N = 73) and an empirical value sensitive design case study, comprising semi-structured interviews with stakeholders (N = 9) as well as a focus group (N = 7) with developers. Based on our results, we identify implications relevant to the research on and design of OSINT artefacts for cybersecurity incident response.
@article{riebe_values_2023,
title = {Values and {Value} {Conflicts} in the {Context} of {OSINT} {Technologies} for {Cybersecurity} {Incident} {Response}: {A} {Value} {Sensitive} {Design} {Perspective}},
url = {https://link.springer.com/article/10.1007/s10606-022-09453-4},
doi = {10.1007/s10606-022-09453-4},
abstract = {The negotiation of stakeholder values as a collaborative process throughout technology development has been studied extensively within the fields of Computer Supported Cooperative Work and Human-Computer Interaction. Despite their increasing significance for cybersecurity incident response, there is a gap in research on values of importance to the design of open-source intelligence (OSINT) technologies for this purpose. In this paper, we investigate which values and value conflicts emerge due to the application and development of machine learning (ML) based OSINT technologies to assist cyber security incident response operators. For this purpose, we employ a triangulation of methods, consisting of a systematic survey of the technical literature on the development of OSINT artefacts for cybersecurity (N = 73) and an empirical value sensitive design case study, comprising semi-structured interviews with stakeholders (N = 9) as well as a focus group (N = 7) with developers. Based on our results, we identify implications relevant to the research on and design of OSINT artefacts for cybersecurity incident response.},
journal = {Computer Supported Cooperative Work: The Journal of Collaborative Computing (JCSCW)},
author = {Riebe, Thea and Bäumler, Julian and Kaufhold, Marc-André and Reuter, Christian},
year = {2023},
keywords = {Student, Security, UsableSec, HCI, Projekt-CYWARN, Projekt-ATHENE-SecUrban, Projekt-CROSSING, A-Paper, Ranking-ImpactFactor, Ranking-CORE-B},
}
2022
[BibTeX] [Abstract] [Download PDF]
Despite the merits of digitization in private and professional spaces, critical infrastructures and societies are increasingly exposed to cyberattacks. We conducted a representative survey with German citizens (N=1,093) to examine how they assess the current and future cyber threat situation as well as possible protective measures in cyberspace. Furthermore, we asked what information and channels citizens need to be aware of cyber threats. Our findings indicate that large proportions of the German population feel inadequately informed about cyber threats and tend to only apply enforced security measures by programs (e.g., updates) and services (e.g., two-factor authentication). Furthermore, institutions such as state-level Computer Emergency Response Teams (CERTs) are relatively unknown among the population and respondents showed little confidence in German security authorities to cope with largescale attacks and ultimately protect citizens. Still, our participants prefer to receive cybersecurity information via installed security applications, television channels, or emergency warning apps.
@inproceedings{kaufhold_implementation_2022,
address = {Darmstadt},
series = {Mensch und {Computer} 2022 - {Workshopband}},
title = {The {Implementation} of {Protective} {Measures} and {Communication} of {Cybersecurity} {Alerts} in {Germany} - {A} {Representative} {Survey} of the {Population}},
url = {https://dl.gi.de/handle/20.500.12116/39061},
doi = {10.18420/muc2022-mci-ws01-228},
abstract = {Despite the merits of digitization in private and professional spaces, critical infrastructures and societies are increasingly exposed to cyberattacks. We conducted a representative survey with German citizens (N=1,093) to examine how they assess the current and future cyber threat situation as well as possible protective measures in cyberspace. Furthermore, we asked what information and channels citizens need to be aware of cyber threats. Our findings indicate that large proportions of the German population feel inadequately informed about cyber threats and tend to only apply enforced security measures by programs (e.g., updates) and services (e.g., two-factor authentication). Furthermore, institutions such as state-level Computer Emergency Response Teams (CERTs) are relatively unknown among the population and respondents showed little confidence in German security authorities to cope with largescale attacks and ultimately protect citizens. Still, our participants prefer to receive cybersecurity information via installed security applications, television channels, or emergency warning apps.},
language = {en},
booktitle = {Mensch und {Computer} 2022 - {Workshopband}},
publisher = {Gesellschaft für Informatik},
author = {Kaufhold, Marc-André and Bäumler, Julian and Reuter, Christian},
year = {2022},
keywords = {Student, Security, UsableSec, HCI, Projekt-CYWARN, Projekt-ATHENE-SecUrban},
}
[BibTeX] [Abstract] [Download PDF]
Proper cybersecurity requires timely information to defend the IT infrastructure. In a dynamic field like cybersecurity, gathering up-to-date information is usually a manual, time-consuming, and exhaustive task. Automatic and usable approaches are supposed to be a solution to this problem, but for this, they require a notion of information relevance to distinguish relevant from irrelevant information. First, on the basis of a literature review, this paper proposes a novel cybersecurity tool categorization based on corresponding tool types with their respective definitions and core features. Second, it elaborates information used in each category and deduces notions of relevance. Third, it outlines how these findings informed the design of a security dashboard to guide computer emergency response team staff in identifying current threats in open source intelligence sources while mitigating information overload.
@inproceedings{kuehn_notion_2022,
address = {Darmstadt},
series = {Mensch und {Computer} 2022 - {Workshopband}},
title = {The {Notion} of {Relevance} in {Cybersecurity}: {A} {Categorization} of {Security} {Tools} and {Deduction} of {Relevance} {Notions}},
url = {https://dl.gi.de/handle/20.500.12116/39072},
doi = {10.18420/muc2022-mci-ws01-220},
abstract = {Proper cybersecurity requires timely information to defend the IT infrastructure. In a dynamic field like cybersecurity, gathering up-to-date information is usually a manual, time-consuming, and exhaustive task. Automatic and usable approaches are supposed to be a solution to this problem, but for this, they require a notion of information relevance to distinguish relevant from irrelevant information. First, on the basis of a literature review, this paper proposes a novel cybersecurity tool categorization based on corresponding tool types with their respective definitions and core features. Second, it elaborates information used in each category and deduces notions of relevance. Third, it outlines how these findings informed the design of a security dashboard to guide computer emergency response team staff in identifying current threats in open source intelligence sources while mitigating information overload.},
language = {en},
booktitle = {Mensch und {Computer} 2022 - {Workshopband}},
publisher = {Gesellschaft für Informatik},
author = {Kuehn, Philipp and Bäumler, Julian and Kaufhold, Marc-André and Wendelborn, Marc and Reuter, Christian},
year = {2022},
keywords = {Student, Security, UsableSec, Projekt-CYWARN, Projekt-ATHENE-SecUrban},
}