Definition und ausgewählte Publikationen

Friedensinformatik beschäftigt sich mit der Rolle technischer Erkenntnisse und Entwicklungen aus der Informatik im Kontext von Krieg und Frieden, Auf- und Abrüstung.

Zur Definition des Bereichs

Christian Reuter (2020) Towards IT Peace Research: Challenges at the Intersection of Peace and Conflict Research and Computer Science, S+F Sicherheit und Frieden / Peace and Security 38(1), S. 10-16, pdf, doi:10.5771/0175-274X-2020-1-10

Christian Reuter (2019) Information Technology for Peace and Security – IT-Applications and Infrastructures in Conflicts, Crises, War, and Peace, S. 1-424, Wiesbaden, Germany: Springer Vieweg, url, doi:10.1007/978-3-658-25652-4

Ausgewählte Publikationen

  • Christian Reuter (2024)
    Information Technology for Peace and Security – IT-Applications and Infrastructures in Conflicts, Crises, War, and Peace
    Wiesbaden, Germany: Springer Vieweg.
    [BibTeX]

    @book{reuter_information_2024,
    address = {Wiesbaden, Germany},
    title = {Information {Technology} for {Peace} and {Security} - {IT}-{Applications} and {Infrastructures} in {Conflicts}, {Crises}, {War}, and {Peace}},
    publisher = {Springer Vieweg},
    author = {Reuter, Christian},
    year = {2024},
    keywords = {Selected, Security, Peace, Infrastructure, Projekt-CROSSING, AuswahlPeace, Cyberwar, Projekt-TraCe},
    }

  • Thomas Reinhold, Philipp Kuehn, Daniel Günther, Thomas Schneider, Christian Reuter (2023)
    ExTRUST: Reducing Exploit Stockpiles With a Privacy-Preserving Depletion Systems for Inter-State Relationships
    IEEE Transactions on Technology and Society ;4(2):158–170. doi:10.1109/TTS.2023.3280356
    [BibTeX] [Abstract] [Download PDF]

    Cyberspace is a fragile construct threatened by malicious cyber operations of different actors, with vulnerabilities in IT hardware and software forming the basis for such activities, thus also posing a threat to global IT security. Advancements in the field of artificial intelligence accelerate this development, either with artificial intelligence enabled cyber weapons, automated cyber defense measures, or artificial intelligence-based threat and vulnerability detection. Especially state actors, with their long-term strategic security interests, often stockpile such knowledge of vulnerabilities and exploits to enable their military or intelligence service cyberspace operations. While treaties and regulations to limit these developments and to enhance global IT security by disclosing vulnerabilities are currently being discussed on the international level, these efforts are hindered by state concerns about the disclosure of unique knowledge and about giving up tactical advantages. This leads to a situation where multiple states are likely to stockpile at least some identical exploits, with technical measures to enable a depletion process for these stockpiles that preserve state secrecy interests and consider the special constraints of interacting states as well as the requirements within such environments being non-existent. This paper proposes such a privacy-preserving approach that allows multiple state parties to privately compare their stock of vulnerabilities and exploits to check for items that occur in multiple stockpiles without revealing them so that their disclosure can be considered. We call our system ExTRUST and show that it is scalable and can withstand several attack scenarios. Beyond the intergovernmental setting, ExTRUST can also be used for other zero-trust use cases, such as bug-bounty programs.

    @article{reinhold_extrust_2023,
    title = {{ExTRUST}: {Reducing} {Exploit} {Stockpiles} {With} a {Privacy}-{Preserving} {Depletion} {Systems} for {Inter}-{State} {Relationships}},
    volume = {4},
    url = {https://peasec.de/paper/2023/2023_ReinholdKuehnGuentherSchneiderReuter_ExTrust-ehem-BlockED_TTaS.pdf},
    doi = {10.1109/TTS.2023.3280356},
    abstract = {Cyberspace is a fragile construct threatened by malicious cyber operations of different actors, with vulnerabilities in IT hardware and software forming the basis for such activities, thus also posing a threat to global IT security. Advancements in the field of artificial intelligence accelerate this development, either with artificial intelligence enabled cyber weapons, automated cyber defense measures, or artificial intelligence-based threat and vulnerability detection. Especially state actors, with their long-term strategic security interests, often stockpile such knowledge of vulnerabilities and exploits to enable their military or intelligence service cyberspace operations. While treaties and regulations to limit these developments and to enhance global IT security by disclosing vulnerabilities are currently being discussed on the international level, these efforts are hindered by state concerns about the disclosure of unique knowledge and about giving up tactical advantages. This leads to a situation where multiple states are likely to stockpile at least some identical exploits, with technical measures to enable a depletion process for these stockpiles that preserve state secrecy interests and consider the special constraints of interacting states as well as the requirements within such environments being non-existent. This paper proposes such a privacy-preserving approach that allows multiple state parties to privately compare their stock of vulnerabilities and exploits to check for items that occur in multiple stockpiles without revealing them so that their disclosure can be considered. We call our system ExTRUST and show that it is scalable and can withstand several attack scenarios. Beyond the intergovernmental setting, ExTRUST can also be used for other zero-trust use cases, such as bug-bounty programs.},
    number = {2},
    journal = {IEEE Transactions on Technology and Society},
    author = {Reinhold, Thomas and Kuehn, Philipp and Günther, Daniel and Schneider, Thomas and Reuter, Christian},
    year = {2023},
    keywords = {Selected, Student, A-Paper, Peace, Projekt-CROSSING, AuswahlPeace, Cyberwar, Projekt-ATHENE-SecUrban, Projekt-GRKPrivacy},
    pages = {158--170},
    }

  • Sebastian Schwartz, Laura Guntrum, Christian Reuter (2022)
    Vision or Threat – Awareness for Dual-Use in the Development of Autonomous Driving
    IEEE Transactions on Technology and Society ;3(3):163–174. doi:10.1109/TTS.2022.3182310
    [BibTeX] [Abstract] [Download PDF]

    In the digital age, the vision of autonomous vehicles (AVs) is vibrant. Research is being conducted worldwide to inte-grate AVs into our everyday lives in the future, spending consid-erable amounts of money in the development process. Actors from both engineering as well as social sciences are involved in this re-search, with technical disciplines strongly dominating. In addition to perceived progress of numerous newly developed technologies such as AVs, challenges should also be referred to. According to research analysis, the transferability of autonomous cars to the military sphere seems to be frequently forgotten or ignored (dual-use). Since not much research has been conducted in Germany on the potential deployment of autonomous driving development steps into military domains, 25 semi-structured interviews with de-velopers and researchers and actors involved in the field, were conducted in 2020. The paper identifies that the majority of re-spondents interviewed were aware of general existing dual-use de-bates, however, few had reflected about dual-use issues regarding a possible transfer of their own development processes in the con-text of autonomous driving to military applications, intensively. One reason is the small-scale nature of research, another is the complexity of the field, which enables the engineer’s alienation from their responsibility for the artefacts’ use. Moreover, it has become clear that hardly any conversations among colleagues oc-cur about possible misuse and that no standardized policy guide-lines exist, which provide information about possible risk. To raise dual-use awareness, scientific contributions, risk education, and interdisciplinary discussions are essential.

    @article{schwartz_vision_2022,
    title = {Vision or {Threat} – {Awareness} for {Dual}-{Use} in the {Development} of {Autonomous} {Driving}},
    volume = {3},
    issn = {2637-6415},
    url = {https://www.peasec.de/paper/2022/2022_SchwartzGuntrumReuter_VisionorThreatAwarenessDualUseAutonomousDriving_IEEE-TTS.pdf},
    doi = {10.1109/TTS.2022.3182310},
    abstract = {In the digital age, the vision of autonomous vehicles (AVs) is vibrant. Research is being conducted worldwide to inte-grate AVs into our everyday lives in the future, spending consid-erable amounts of money in the development process. Actors from both engineering as well as social sciences are involved in this re-search, with technical disciplines strongly dominating. In addition to perceived progress of numerous newly developed technologies such as AVs, challenges should also be referred to. According to research analysis, the transferability of autonomous cars to the military sphere seems to be frequently forgotten or ignored (dual-use). Since not much research has been conducted in Germany on the potential deployment of autonomous driving development steps into military domains, 25 semi-structured interviews with de-velopers and researchers and actors involved in the field, were conducted in 2020. The paper identifies that the majority of re-spondents interviewed were aware of general existing dual-use de-bates, however, few had reflected about dual-use issues regarding a possible transfer of their own development processes in the con-text of autonomous driving to military applications, intensively. One reason is the small-scale nature of research, another is the complexity of the field, which enables the engineer’s alienation from their responsibility for the artefacts’ use. Moreover, it has become clear that hardly any conversations among colleagues oc-cur about possible misuse and that no standardized policy guide-lines exist, which provide information about possible risk. To raise dual-use awareness, scientific contributions, risk education, and interdisciplinary discussions are essential.},
    language = {en},
    number = {3},
    journal = {IEEE Transactions on Technology and Society},
    author = {Schwartz, Sebastian and Guntrum, Laura and Reuter, Christian},
    year = {2022},
    keywords = {Selected, A-Paper, Ranking-ImpactFactor, Peace, AuswahlPeace, Projekt-ATHENE-FANCY, Projekt-TraCe},
    pages = {163--174},
    }

  • Jonas Franken, Thomas Reinhold, Lilian Reichert, Christian Reuter (2022)
    The Digital Divide in State Vulnerability to Submarine Communications Cable Failure
    International Journal of Critical Infrastructure Protection (IJCIP) ;38(100522):1–15. doi:10.1016/j.ijcip.2022.100522
    [BibTeX] [Abstract] [Download PDF]

    The backbone network of submarine communication cables (SCC) carries 98\% of international internet traffic. Coastal and island states strongly depend on this physical internet infrastructure to provide internet connectivity. Although about 100 SCC breakdowns of human or natural origin occur at yearly average, a literature review reveals that there is no approach to assess individual state vulnerability to SCC failure in global comparison. In this article, the global SCC network is modeled based on publicly available data. Besides the analysis of the global network properties, a focus is put on remaining bandwidth capacities in three different failure scenario simulations of SCC breakdowns. As a result, this study identifies 15 highly vulnerable states and overseas territories, and another 28 territories that are classified as partially vulnerable to SCC failures. Since economic market decisions shape the structure of the SCC network, an uneven distribution of redundancies and the resulting vulnerability of disadvantaged economies can be confirmed. Therefore, the study’s findings may contribute to a better assessment of the necessity of preventive protection measures of critical telecommunication infrastructures in states and territories characterized by high and medium vulnerability.

    @article{franken_digital_2022,
    title = {The {Digital} {Divide} in {State} {Vulnerability} to {Submarine} {Communications} {Cable} {Failure}},
    volume = {38},
    url = {https://peasec.de/paper/2022/2022_FrankenReinholdReichertReuter_DigitalDivideStateVulnerabilitySubmarineCommunicationsCable_IJCIP.pdf},
    doi = {10.1016/j.ijcip.2022.100522},
    abstract = {The backbone network of submarine communication cables (SCC) carries 98\% of international internet traffic. Coastal and island states strongly depend on this physical internet infrastructure to provide internet connectivity. Although about 100 SCC breakdowns of human or natural origin occur at yearly average, a literature review reveals that there is no approach to assess individual state vulnerability to SCC failure in global comparison. In this article, the global SCC network is modeled based on publicly available data. Besides the analysis of the global network properties, a focus is put on remaining bandwidth capacities in three different failure scenario simulations of SCC breakdowns. As a result, this study identifies 15 highly vulnerable states and overseas territories, and another 28 territories that are classified as partially vulnerable to SCC failures. Since economic market decisions shape the structure of the SCC network, an uneven distribution of redundancies and the resulting vulnerability of disadvantaged economies can be confirmed. Therefore, the study's findings may contribute to a better assessment of the necessity of preventive protection measures of critical telecommunication infrastructures in states and territories characterized by high and medium vulnerability.},
    number = {100522},
    journal = {International Journal of Critical Infrastructure Protection (IJCIP)},
    author = {Franken, Jonas and Reinhold, Thomas and Reichert, Lilian and Reuter, Christian},
    year = {2022},
    keywords = {Selected, Student, Security, A-Paper, Ranking-ImpactFactor, AuswahlPeace, Projekt-ATHENE-SecUrban, Projekt-AgriRegio},
    pages = {1--15},
    }

  • Stefka Schmid, Thea Riebe, Christian Reuter (2022)
    Dual-Use and Trustworthy? A Mixed Methods Analysis of AI Diffusion between Civilian and Defense R&D
    Science and Engineering Ethics ;28(12):1–23. doi:10.1007/s11948-022-00364-7
    [BibTeX] [Abstract] [Download PDF]

    Artificial Intelligence (AI) seems to be impacting all industry sectors, while becoming a motor for innovation. The diffusion of AI from the civilian sector to the defense sector, and AI’s dual-use potential has drawn attention from security and ethics scholars. With the publication of the ethical guideline Trustworthy AI by the European Union (EU), normative questions on the application of AI have been further evaluated. In order to draw conclusions on Trustworthy AI as a point of reference for responsible research and development (R&D), we approach the diffusion of AI across both civilian and military spheres in the EU. We capture the extent of technological diffusion and derive European and German patent citation networks. Both networks indicate a low degree of diffusion of AI between civilian and defense sectors. A qualitative investigation of project descriptions of a research institute’s work in both civilian and military fields shows that military AI applications stress accuracy or robustness, while civilian AI reflects a focus on human-centric values. Our work represents a first approach by linking processes of technology diffusion with normative evaluations of R&D.

    @article{schmid_dual-use_2022,
    title = {Dual-{Use} and {Trustworthy}? {A} {Mixed} {Methods} {Analysis} of {AI} {Diffusion} between {Civilian} and {Defense} {R}\&{D}},
    volume = {28},
    url = {https://peasec.de/paper/2022/2022_SchmidRiebeReuter_DualUseandTrustworthy_ScienceEngineeringEthics.pdf},
    doi = {10.1007/s11948-022-00364-7},
    abstract = {Artificial Intelligence (AI) seems to be impacting all industry sectors, while becoming a motor for innovation. The diffusion of AI from the civilian sector to the defense sector, and AI’s dual-use potential has drawn attention from security and ethics scholars. With the publication of the ethical guideline Trustworthy AI by the European Union (EU), normative questions on the application of AI have been further evaluated. In order to draw conclusions on Trustworthy AI as a point of reference for responsible research and development (R\&D), we approach the diffusion of AI across both civilian and military spheres in the EU. We capture the extent of technological diffusion and derive European and German patent citation networks. Both networks indicate a low degree of diffusion of AI between civilian and defense sectors. A qualitative investigation of project descriptions of a research institute’s work in both civilian and military fields shows that military AI applications stress accuracy or robustness, while civilian AI reflects a focus on human-centric values. Our work represents a first approach by linking processes of technology diffusion with normative evaluations of R\&D.},
    number = {12},
    journal = {Science and Engineering Ethics},
    author = {Schmid, Stefka and Riebe, Thea and Reuter, Christian},
    year = {2022},
    keywords = {A-Paper, Ranking-ImpactFactor, Projekt-KontiKat, Peace, AuswahlPeace, Projekt-CYWARN},
    pages = {1--23},
    }

  • Thomas Reinhold, Christian Reuter (2022)
    Towards a Cyber Weapons Assessment Model – Assessment of the Technical Features of Malicious Software
    IEEE Transactions on Technology and Society ;3(3):226–239. doi:10.1109/TTS.2021.3131817
    [BibTeX] [Abstract] [Download PDF]

    The revelation of the Stuxnet malware in 2010 shed light on the presence of state actors that are willing and capable of developing and using highly sophisticated, specialized malicious software for their political interests. These tools -often dubbed cyber weapons -are expected to become the next major advancement in weaponry technology. Besides the threats of offensive cyber operations for civil IT systems due to the interconnected nature of the cyberspace, international regulation of cyber weapons is -among other aspects -hindered by the fact that the military development and the strategic and tactical deployment of cyber weapons differ significantly from other weapons technologies. In order to establish measures of cyber arms related control treaties, it is crucial to identify these particular characteristics. Based on this premise, the article analyzes the current perspectives on cyber weapons, identifying their weaknesses of being either based on assumptions about adversarial actors or being applicable only after the usage of a malicious tool. In contrast to these approaches, the article focuses on the specific functional aspects of malware and presents an indicator-based assessment model based on parameters that can be measured prior to the application of malicious software. This enables the categorization of malicious tools as cyber weapons. Besides this, the article aims to introduce thought-provoking impulses with regard to social responsibility in computer science.

    @article{reinhold_towards_2022,
    title = {Towards a {Cyber} {Weapons} {Assessment} {Model} – {Assessment} of the {Technical} {Features} of {Malicious} {Software}},
    volume = {3},
    issn = {2637-6415},
    url = {https://peasec.de/paper/2021/2021_ReinholdReuter_CyberWeapons_IEEETransactionsTechnologySociety.pdf},
    doi = {10.1109/TTS.2021.3131817},
    abstract = {The revelation of the Stuxnet malware in 2010 shed light on the presence of state actors that are willing and capable of developing and using highly sophisticated, specialized malicious software for their political interests. These tools -often dubbed cyber weapons -are expected to become the next major advancement in weaponry technology. Besides the threats of offensive cyber operations for civil IT systems due to the interconnected nature of the cyberspace, international regulation of cyber weapons is -among other aspects -hindered by the fact that the military development and the strategic and tactical deployment of cyber weapons differ significantly from other weapons technologies. In order to establish measures of cyber arms related control treaties, it is crucial to identify these particular characteristics. Based on this premise, the article analyzes the current perspectives on cyber weapons, identifying their weaknesses of being either based on assumptions about adversarial actors or being applicable only after the usage of a malicious tool. In contrast to these approaches, the article focuses on the specific functional aspects of malware and presents an indicator-based assessment model based on parameters that can be measured prior to the application of malicious software. This enables the categorization of malicious tools as cyber weapons. Besides this, the article aims to introduce thought-provoking impulses with regard to social responsibility in computer science.},
    language = {en},
    number = {3},
    journal = {IEEE Transactions on Technology and Society},
    author = {Reinhold, Thomas and Reuter, Christian},
    month = sep,
    year = {2022},
    keywords = {A-Paper, Ranking-ImpactFactor, Peace, AuswahlPeace, Cyberwar, Projekt-ATHENE-SecUrban},
    pages = {226--239},
    }

  • Philipp Kuehn, Markus Bayer, Marc Wendelborn, Christian Reuter (2021)
    OVANA: An Approach to Analyze and Improve the Information Quality of Vulnerability Databases
    Proceedings of the 16th International Conference on Availability, Reliability and Security (ARES 2021) . doi:10.1145/3465481.3465744
    [BibTeX] [Abstract] [Download PDF]

    Vulnerability databases are one of the main information sources for IT security experts. Hence, the quality of their information is of utmost importance for anyone working in this area. Previous work has shown that machine readable information is either missing, incorrect, or inconsistent with other data sources. In this paper, we introduce a system called Overt Vulnerability source ANAlysis (OVANA), utilizing state-of-the-art machine learning (ML) and natural-language processing (NLP) techniques, which analyzes the information quality (IQ) of vulnerability databases, searches the free-form description for relevant information missing from structured fields, and updates it accordingly. Our paper shows that OVANA is able to improve the IQ of the National Vulnerability Database by 51.23\% based on the indicators of accuracy, completeness, and uniqueness. Moreover, we present information which should be incorporated into the structured fields to increase the uniqueness of vulnerability entries and improve the discriminability of different vulnerability entries. The identified information from OVANA enables a more targeted vulnerability search and provides guidance for IT security experts in finding relevant information in vulnerability descriptions for severity assessment.

    @inproceedings{kuehn_ovana_2021,
    title = {{OVANA}: {An} {Approach} to {Analyze} and {Improve} the {Information} {Quality} of {Vulnerability} {Databases}},
    isbn = {978-1-4503-9051-4},
    url = {https://peasec.de/paper/2021/2021_KuehnBayerWendelbornReuter_OVANAQualityVulnerabilityDatabases_ARES.pdf},
    doi = {10.1145/3465481.3465744},
    abstract = {Vulnerability databases are one of the main information sources for IT security experts. Hence, the quality of their information is of utmost importance for anyone working in this area. Previous work has shown that machine readable information is either missing, incorrect, or inconsistent with other data sources. In this paper, we introduce a system called Overt Vulnerability source ANAlysis (OVANA), utilizing state-of-the-art machine learning (ML) and natural-language processing (NLP) techniques, which analyzes the information quality (IQ) of vulnerability databases, searches the free-form description for relevant information missing from structured fields, and updates it accordingly. Our paper shows that OVANA is able to improve the IQ of the National Vulnerability Database by 51.23\% based on the indicators of accuracy, completeness, and uniqueness. Moreover, we present information which should be incorporated into the structured fields to increase the uniqueness of vulnerability entries and improve the discriminability of different vulnerability entries. The identified information from OVANA enables a more targeted vulnerability search and provides guidance for IT security experts in finding relevant information in vulnerability descriptions for severity assessment.},
    booktitle = {Proceedings of the 16th {International} {Conference} on {Availability}, {Reliability} and {Security} ({ARES} 2021)},
    publisher = {ACM},
    author = {Kuehn, Philipp and Bayer, Markus and Wendelborn, Marc and Reuter, Christian},
    year = {2021},
    keywords = {Security, Peace, Ranking-CORE-B, AuswahlPeace, Projekt-ATHENE-SecUrban, Projekt-CYWARN},
    pages = {1--11},
    }

  • Thea Riebe, Stefka Schmid, Christian Reuter (2021)
    Measuring Spillover Effects from Defense to Civilian Sectors – A Quantitative Approach Using LinkedIn
    Defence and Peace Economics ;32(7):773–785. doi:10.1080/10242694.2020.1755787
    [BibTeX] [Abstract] [Download PDF]

    Spillover effects describe the process of a company benefiting from the R&D activities of another one and thereby gaining an economic advantage. One prominent approach for measuring spillover effects is based on the analysis of patent citation networks. Taking social media analytics and knowledge economics into account, this paper presents a complementary approach to quantify spillover effects from defense to civilian research and development, analyzing 513 employment biographies from the social network LinkedIn. Using descriptive network analysis, we investigate the emigration of personnel of the German defense industry to other civilian producers. Thereby, our study reveals that in the last decade, employees of defense suppliers have changed positions significantly less often, with 3.24 changes on average than professionals who have worked more than 50\% of their jobs in the civilian sector, having changed 4.61 times on average. Our work illustrates the churn behavior and how spillover effects between defense and civilian sectors can be measured using social career networks such as LinkedIn.

    @article{riebe_measuring_2021,
    title = {Measuring {Spillover} {Effects} from {Defense} to {Civilian} {Sectors} – {A} {Quantitative} {Approach} {Using} {LinkedIn}},
    volume = {32},
    url = {https://peasec.de/paper/2021/2021_RiebeSchmidReuter_SpilloverEffectsDefensetoCivilianLinkedIn_PDE.pdf},
    doi = {10.1080/10242694.2020.1755787},
    abstract = {Spillover effects describe the process of a company benefiting from the R\&D activities of another one and thereby gaining an economic advantage. One prominent approach for measuring spillover effects is based on the analysis of patent citation networks. Taking social media analytics and knowledge economics into account, this paper presents a complementary approach to quantify spillover effects from defense to civilian research and development, analyzing 513 employment biographies from the social network LinkedIn. Using descriptive network analysis, we investigate the emigration of personnel of the German defense industry to other civilian producers. Thereby, our study reveals that in the last decade, employees of defense suppliers have changed positions significantly less often, with 3.24 changes on average than professionals who have worked more than 50\% of their jobs in the civilian sector, having changed 4.61 times on average. Our work illustrates the churn behavior and how spillover effects between defense and civilian sectors can be measured using social career networks such as LinkedIn.},
    number = {7},
    journal = {Defence and Peace Economics},
    author = {Riebe, Thea and Schmid, Stefka and Reuter, Christian},
    year = {2021},
    keywords = {Selected, A-Paper, Ranking-ImpactFactor, Peace, Projekt-DualUse, AuswahlPeace, Cyberwar, Projekt-ATHENE-SecUrban},
    pages = {773--785},
    }

  • Thea Riebe, Stefka Schmid, Christian Reuter (2020)
    Meaningful Human Control of Lethal Autonomous Weapon System: The CCW-Debate and its Implications for Value-Sensitive Design
    IEEE Technology and Society Magazine ;39(4):36–51. doi:10.1109/MTS.2020.3031846
    [BibTeX] [Abstract] [Download PDF]

    The debate on the development and deployment of lethal autonomous weapon systems (LAWS) as an emerging technology is of increasing importance, with discussions stalling and technological development progressing. Monitoring the progress of increasingly autonomous weapons systems in civilian and military use as well as regulating possible autonomous systems early on is demanded by civil society actors, like the Campaign to Stop Killer Robots and the International Committee of the Red Cross (ICRC), while nation states follow a variety of interests and strategies, showing little room for consensus on central terms and questions [2], [3]. This article therefore sheds light on the work of the Group of Governmental Experts (GGE) of the UN Convention of Certain Conventional Weapons (CCW). The CCW, offering an arena for international cooperation, has dedicated itself to the purpose of finding common ground with respect to an understanding of LAWS, as well as to the necessary degree of human control. From an ethical perspective, the concept of Meaningful Human Control (MHC) supports a human-centric approach. Several IEEE projects, series and publications are dedicated to this prioritization, especially regarding civilian use. As autonomous technology is increasingly at the center of contemporary military innovations, questions of (human) agency and responsibility in warfare have become even more pressing. As stressed by the United Nations Institute for Disarmament Research (UNIDIR), the concept of MHC may prove useful in the context of development and use of (semi-) autonomous weaponry.

    @article{riebe_meaningful_2020,
    title = {Meaningful {Human} {Control} of {Lethal} {Autonomous} {Weapon} {System}: {The} {CCW}-{Debate} and its {Implications} for {Value}-{Sensitive} {Design}},
    volume = {39},
    url = {https://peasec.de/paper/2020/2020_RiebeSchmidReuter_MHC_IEEETechScieMag.pdf},
    doi = {10.1109/MTS.2020.3031846},
    abstract = {The debate on the development and deployment of lethal autonomous weapon systems (LAWS) as an emerging technology is of increasing importance, with discussions stalling and technological development progressing. Monitoring the progress of increasingly autonomous weapons systems in civilian and military use as well as regulating possible autonomous systems early on is demanded by civil society actors, like the Campaign to Stop Killer Robots and the International Committee of the Red Cross (ICRC), while nation states follow a variety of interests and strategies, showing little room for consensus on central terms and questions [2], [3]. This article therefore sheds light on the work of the Group of Governmental Experts (GGE) of the UN Convention of Certain Conventional Weapons (CCW). The CCW, offering an arena for international cooperation, has dedicated itself to the purpose of finding common ground with respect to an understanding of LAWS, as well as to the necessary degree of human control. From an ethical perspective, the concept of Meaningful Human Control (MHC) supports a human-centric approach. Several IEEE projects, series and publications are dedicated to this prioritization, especially regarding civilian use. As autonomous technology is increasingly at the center of contemporary military innovations, questions of (human) agency and responsibility in warfare have become even more pressing. As stressed by the United Nations Institute for Disarmament Research (UNIDIR), the concept of MHC may prove useful in the context of development and use of (semi-) autonomous weaponry.},
    number = {4},
    journal = {IEEE Technology and Society Magazine},
    author = {Riebe, Thea and Schmid, Stefka and Reuter, Christian},
    year = {2020},
    keywords = {A-Paper, Ranking-ImpactFactor, Projekt-KontiKat, Peace, Projekt-DualUse, AuswahlPeace, Cyberwar},
    pages = {36--51},
    }

  • Christian Reuter (2020)
    Towards IT Peace Research: Challenges at the Intersection of Peace and Conflict Research and Computer Science
    S+F Sicherheit und Frieden / Peace and Security ;38(1):10–16. doi:10.5771/0175-274X-2020-1-10
    [BibTeX] [Abstract] [Download PDF]

    Advances in science and technology, including information technology (IT), play a crucial role in the context of peace and security. However, research on the intersection of peace and conflict research as well as computer science is not well established yet. This article highlights the need for further work in the area of research “IT peace research”, which includes both empirical research on the role of IT in peace and security, as well as technical research to design technologies and applications. Based on the elaboration of the disciplines, central challenges, such as insecurity, actors, attribution and laws, are outlined.

    @article{reuter_towards_2020-1,
    title = {Towards {IT} {Peace} {Research}: {Challenges} at the {Intersection} of {Peace} and {Conflict} {Research} and {Computer} {Science}},
    volume = {38},
    url = {https://www.nomos-elibrary.de/10.5771/0175-274X-2020-1-10.pdf},
    doi = {10.5771/0175-274X-2020-1-10},
    abstract = {Advances in science and technology, including information technology (IT), play a crucial role in the context of peace and security. However, research on the intersection of peace and conflict research as well as computer science is not well established yet. This article highlights the need for further work in the area of research “IT peace research”, which includes both empirical research on the role of IT in peace and security, as well as technical research to design technologies and applications. Based on the elaboration of the disciplines, central challenges, such as insecurity, actors, attribution and laws, are outlined.},
    number = {1},
    journal = {S+F Sicherheit und Frieden / Peace and Security},
    author = {Reuter, Christian},
    year = {2020},
    keywords = {Security, Peace, Projekt-DualUse, AuswahlPeace, Cyberwar, Projekt-ATHENE-SecUrban},
    pages = {10--16},
    }

  • Christian Reuter, Jürgen Altmann, Malte Göttsche, Mirko Himmel (2020)
    Special Issue: Interdisciplinary Contributions to Natural Science/Technical Peace Research – S+F Sicherheit und Frieden / Peace and Security
    Nomos. doi:10.5771/0175-274X-2020-1
    [BibTeX] [Download PDF]

    @book{reuter_special_2020-1,
    title = {Special {Issue}: {Interdisciplinary} {Contributions} to {Natural} {Science}/{Technical} {Peace} {Research} - {S}+{F} {Sicherheit} und {Frieden} / {Peace} and {Security}},
    volume = {38},
    url = {https://peasec.de/paper/2020/2020_ReuterAltmannGoettscheHimmel_SpecIss_NaturalScienceTechnicalPeaceResarch_SF.pdf},
    number = {1},
    publisher = {Nomos},
    author = {Reuter, Christian and Altmann, Jürgen and Göttsche, Malte and Himmel, Mirko},
    year = {2020},
    doi = {10.5771/0175-274X-2020-1},
    note = {Publication Title: S+F Sicherheit und Frieden / Peace and Security},
    keywords = {Peace, Projekt-DualUse, AuswahlPeace},
    }

  • Christian Reuter (2019)
    Information Technology for Peace and Security – IT-Applications and Infrastructures in Conflicts, Crises, War, and Peace
    Wiesbaden, Germany: Springer Vieweg. doi:10.1007/978-3-658-25652-4
    [BibTeX] [Abstract] [Download PDF]

    Technological and scientific progress, especially the rapid development in information technology (IT), plays a crucial role regarding questions of peace and security. This textbook addresses the significance, potentials and challenges of IT for peace and securi-ty. For this purpose, the book offers an introduction to peace, conflict, and security research, thereby focusing on natural-science, technical and computer science perspec-tives. In the following, it sheds light on cyber conflicts, war and peace, cyber arms con-trol, cyber attribution and infrastructures as well as culture and interaction before an outlook is given.

    @book{reuter_information_2019-1,
    address = {Wiesbaden, Germany},
    title = {Information {Technology} for {Peace} and {Security} - {IT}-{Applications} and {Infrastructures} in {Conflicts}, {Crises}, {War}, and {Peace}},
    isbn = {978-3-658-25652-4},
    url = {https://www.springer.com/de/book/9783658256517},
    abstract = {Technological and scientific progress, especially the rapid development in information technology (IT), plays a crucial role regarding questions of peace and security. This textbook addresses the significance, potentials and challenges of IT for peace and securi-ty. For this purpose, the book offers an introduction to peace, conflict, and security research, thereby focusing on natural-science, technical and computer science perspec-tives. In the following, it sheds light on cyber conflicts, war and peace, cyber arms con-trol, cyber attribution and infrastructures as well as culture and interaction before an outlook is given.},
    publisher = {Springer Vieweg},
    author = {Reuter, Christian},
    year = {2019},
    doi = {10.1007/978-3-658-25652-4},
    keywords = {Crisis, Selected, Security, Peace, Infrastructure, Projekt-CRISP, Projekt-DualUse, RSF, Projekt-CROSSING, AuswahlPeace, Cyberwar, Projekt-MAKI},
    }

    Alle Publikationen

    2024

  • Jasmin Haunschild, Laura Guntrum, Sofía Cerrillo, Franziska Bujara, Christian Reuter (2024)
    Towards a Digitally Mediated Transitional Justice Process? An Analysis of Colombian Transitional Justice Organisations’ Posting Behaviour on Facebook
    Peace and Conflict Studies .
    [BibTeX] [Abstract]

    In Colombia, Transitional Justice (TJ) institutions were established after years of violent conflict as part of the 2016 peace agreement between the FARC and the Colombian government. By analysing the posting behaviour of the government-appointed TJ institutions on Facebook, we show how general TJ aims and opportunities for citizen participation were promoted in 2019. Our analysis reveals that the organisations rarely address topics related to reconciliation and that active online participation and two-way communication are rather scarce. Instead, Facebook is mainly used by the TJ organisations to increase solidarity with victims and disseminate information about their work and the TJ process. Reflecting on existing literature on TJ and social media participation, we identify great potential for expanding TJ goals and community engagement on social media, to use it as a resource for facilitating the TJ processes, creating exchange, and enabling participation.

    @article{haunschild_towards_2024,
    title = {Towards a {Digitally} {Mediated} {Transitional} {Justice} {Process}? {An} {Analysis} of {Colombian} {Transitional} {Justice} {Organisations}’ {Posting} {Behaviour} on {Facebook}},
    abstract = {In Colombia, Transitional Justice (TJ) institutions were established after years of violent conflict as part of the 2016 peace agreement between the FARC and the Colombian government. By analysing the posting behaviour of the government-appointed TJ institutions on Facebook, we show how general TJ aims and opportunities for citizen participation were promoted in 2019. Our analysis reveals that the organisations rarely address topics related to reconciliation and that active online participation and two-way communication are rather scarce. Instead, Facebook is mainly used by the TJ organisations to increase solidarity with victims and disseminate information about their work and the TJ process. Reflecting on existing literature on TJ and social media participation, we identify great potential for expanding TJ goals and community engagement on social media, to use it as a resource for facilitating the TJ processes, creating exchange, and enabling participation.},
    journal = {Peace and Conflict Studies},
    author = {Haunschild, Jasmin and Guntrum, Laura and Cerrillo, Sofía and Bujara, Franziska and Reuter, Christian},
    year = {2024},
    keywords = {SocialMedia, Student, Peace, Projekt-ATHENE-SecUrban},
    }

  • Christian Reuter (2024)
    Information Technology for Peace and Security – IT-Applications and Infrastructures in Conflicts, Crises, War, and Peace
    Wiesbaden, Germany: Springer Vieweg.
    [BibTeX]

    @book{reuter_information_2024,
    address = {Wiesbaden, Germany},
    title = {Information {Technology} for {Peace} and {Security} - {IT}-{Applications} and {Infrastructures} in {Conflicts}, {Crises}, {War}, and {Peace}},
    publisher = {Springer Vieweg},
    author = {Reuter, Christian},
    year = {2024},
    keywords = {Selected, Security, Peace, Infrastructure, Projekt-CROSSING, AuswahlPeace, Cyberwar, Projekt-TraCe},
    }

  • Christian Reuter, Anja-Liisa Gonsior, Thea Riebe, Marc-André Kaufhold (2024)
    Peace Informatics: Bridging Peace and Conflict Studies with Computer Science
    In: Christian Reuter: Information Technology for Peace and Security – IT-Applications and Infrastructures in Conflicts, Crises, War, and Peace. Wiesbaden, Germany: Springer Vieweg.
    [BibTeX] [Abstract]

    Advances in science and technology play a crucial role in the context of peace, conflict and security. As information technology (IT) is becoming omnipresent, this includes both the resilience of IT infrastructures e.g. as a target in cases of conflict and the role of IT applications to prevent and manage conflicts, crises and disasters. This chapter is an introduction to IT and its role in war and peace, in conflicts and crises as well as in safety and security. Based on those connections a new field of research has emerged: IT peace research. It is introduced in this chapter which provides an overview of the inter-disciplinary concepts of peace, conflict and security. In addition, the research disciplines computer science and peace and conflict studies as the basis of IT peace research are explained. Moreover, the chapter focuses on the specific research topics of IT peace research and presents the institutionalised research landscape in Germany.

    @incollection{reuter_peace_2024,
    address = {Wiesbaden, Germany},
    title = {Peace {Informatics}: {Bridging} {Peace} and {Conflict} {Studies} with {Computer} {Science}},
    abstract = {Advances in science and technology play a crucial role in the context of peace, conflict and security. As information technology (IT) is becoming omnipresent, this includes both the resilience of IT infrastructures e.g. as a target in cases of conflict and the role of IT applications to prevent and manage conflicts, crises and disasters. This chapter is an introduction to IT and its role in war and peace, in conflicts and crises as well as in safety and security. Based on those connections a new field of research has emerged: IT peace research. It is introduced in this chapter which provides an overview of the inter-disciplinary concepts of peace, conflict and security. In addition, the research disciplines computer science and peace and conflict studies as the basis of IT peace research are explained. Moreover, the chapter focuses on the specific research topics of IT peace research and presents the institutionalised research landscape in Germany.},
    booktitle = {Information {Technology} for {Peace} and {Security} - {IT}-{Applications} and {Infrastructures} in {Conflicts}, {Crises}, {War}, and {Peace}},
    publisher = {Springer Vieweg},
    author = {Reuter, Christian and Gonsior, Anja-Liisa and Riebe, Thea and Kaufhold, Marc-André},
    editor = {Reuter, Christian},
    year = {2024},
    keywords = {Infrastructure, Peace, Security},
    }

  • Christian Reuter, Konstantin Aal, Jürgen Altmann, Ute Bernhardt, Kai Denker, Anja-Liisa Gonsior, Dominik Herrmann, Matthias Hollick, Marc-André Kaufhold, Thomas Reinhold, Thea Riebe, Ingo Ruhmann, Klaus-Peter Saalbach, Niklas Schörnig, Ali Sunyaev, Volker Wulf, Laura Guntrum, Jonas Franken, Stefka Schmid (2024)
    Outlook: The Future of IT in Peace and Security
    In: Christian Reuter: Information Technology for Peace and Security – IT-Applications and Infrastructures in Conflicts, Crises, War, and Peace. Wiesbaden, Germany: Springer Vieweg.
    [BibTeX] [Abstract]

    Not only today, but also in the future information technology and the advances in the field of computer science will have a high relevance for peace and security. Naturally, a textbook like this can only cover a selective part of research and a certain point in time. Nonetheless, it can be attempted to identify trends, challenges and venture an outlook into the future. That is exactly what we want to achieve in this chapter: To predict fu-ture developments and try to classify them correctly. These considerations were made both by the editor and the authors involved alike. Therefore, an outlook based on fun-damentals, cyber conflicts and war, cyber peace, cyber arms control, infrastructures as well as social interaction is given.

    @incollection{reuter_outlook_2024,
    address = {Wiesbaden, Germany},
    title = {Outlook: {The} {Future} of {IT} in {Peace} and {Security}},
    abstract = {Not only today, but also in the future information technology and the advances in the field of computer science will have a high relevance for peace and security. Naturally, a textbook like this can only cover a selective part of research and a certain point in time. Nonetheless, it can be attempted to identify trends, challenges and venture an outlook into the future. That is exactly what we want to achieve in this chapter: To predict fu-ture developments and try to classify them correctly. These considerations were made both by the editor and the authors involved alike. Therefore, an outlook based on fun-damentals, cyber conflicts and war, cyber peace, cyber arms control, infrastructures as well as social interaction is given.},
    booktitle = {Information {Technology} for {Peace} and {Security} - {IT}-{Applications} and {Infrastructures} in {Conflicts}, {Crises}, {War}, and {Peace}},
    publisher = {Springer Vieweg},
    author = {Reuter, Christian and Aal, Konstantin and Altmann, Jürgen and Bernhardt, Ute and Denker, Kai and Gonsior, Anja-Liisa and Herrmann, Dominik and Hollick, Matthias and Kaufhold, Marc-André and Reinhold, Thomas and Riebe, Thea and Ruhmann, Ingo and Saalbach, Klaus-Peter and Schörnig, Niklas and Sunyaev, Ali and Wulf, Volker and Guntrum, Laura and Franken, Jonas and Schmid, Stefka},
    editor = {Reuter, Christian},
    year = {2024},
    keywords = {Security, Peace, Projekt-CROSSING},
    }

  • Christian Reuter, Jonas Franken, Anja-Liisa Gonsior, Laura Guntrum, Stefka Schmid, Thea Riebe (2024)
    An Overview and Introduction to Information Technology for Peace and Security
    In: Christian Reuter: Information Technology for Peace and Security – IT-Applications and Infrastructures in Conflicts, Crises, War, and Peace. Wiesbaden, Germany: Springer Vieweg.
    [BibTeX] [Abstract]

    Technological and scientific progress, especially the rapid development in information technology (IT), plays a crucial role regarding questions of peace and security. This textbook addresses the significance, potentials and challenges of IT for peace and securi-ty. For this purpose, the book offers an introduction to peace, conflict, and security research, thereby focusing on natural science, technical and computer science perspec-tives. In the following, it sheds light on fundamentals (e.g. IT in peace, conflict and security, natural-science/technical peace research), cyber conflicts and war (e.g. infor-mation warfare, cyber espionage, cyber defence, Darknet), cyber peace (e.g. dual-use, technology assessment, confidence and security building measures), cyber arms control (e.g. arms control in the cyberspace, unmanned systems, verification), cyber attribution and infrastructures (e.g. attribution of cyber attacks, resilient infrastructures, secure critical information infrastructures), culture and interaction (e.g. safety and security, cultural violence, social media), before an outlook is given. This chapter provides an overview of all chapters in this book.

    @incollection{reuter_overview_2024,
    address = {Wiesbaden, Germany},
    title = {An {Overview} and {Introduction} to {Information} {Technology} for {Peace} and {Security}},
    abstract = {Technological and scientific progress, especially the rapid development in information technology (IT), plays a crucial role regarding questions of peace and security. This textbook addresses the significance, potentials and challenges of IT for peace and securi-ty. For this purpose, the book offers an introduction to peace, conflict, and security research, thereby focusing on natural science, technical and computer science perspec-tives. In the following, it sheds light on fundamentals (e.g. IT in peace, conflict and security, natural-science/technical peace research), cyber conflicts and war (e.g. infor-mation warfare, cyber espionage, cyber defence, Darknet), cyber peace (e.g. dual-use, technology assessment, confidence and security building measures), cyber arms control (e.g. arms control in the cyberspace, unmanned systems, verification), cyber attribution and infrastructures (e.g. attribution of cyber attacks, resilient infrastructures, secure critical information infrastructures), culture and interaction (e.g. safety and security, cultural violence, social media), before an outlook is given. This chapter provides an overview of all chapters in this book.},
    booktitle = {Information {Technology} for {Peace} and {Security} - {IT}-{Applications} and {Infrastructures} in {Conflicts}, {Crises}, {War}, and {Peace}},
    publisher = {Springer Vieweg},
    author = {Reuter, Christian and Franken, Jonas and Gonsior, Anja-Liisa and Guntrum, Laura and Schmid, Stefka and Riebe, Thea},
    editor = {Reuter, Christian},
    year = {2024},
    keywords = {Security, Peace, Projekt-CROSSING},
    }

  • Thomas Reinhold, Christian Reuter (2024)
    Verification in Cyberspace
    In: Christian Reuter: Information Technology for Peace and Security – IT-Applications and Infrastructures in Conflicts, Crises, War, and Peace. Wiesbaden, Germany: Springer Vieweg.
    [BibTeX] [Abstract]

    Verification is one of the pillars of arms control and non-proliferation treaties as well as an important part of confidence building measures. It defines practical measures that enable treaty members to check the treaty compliance by observing, counting or moni-toring specific actions and their accordance with the respective rules. In contrast to his-torical examples of former military technologies, cyberspace features some unique char-acteristics making it hard to apply established measures. The chapter describes these peculiarities and assesses distinguishing problems compared to selected verification measures for nuclear, biological and chemicals weapons technology. Yet, cyberspace is a human-made domain and adjusting its technical setting, rules and principles may help to reduce the threat of ongoing militarisation. Offering some alternatives, the chapter elaborates on suitable and measurable parameters for this domain and presents potential-ly useful verification approaches.

    @incollection{reinhold_verification_2024,
    address = {Wiesbaden, Germany},
    title = {Verification in {Cyberspace}},
    abstract = {Verification is one of the pillars of arms control and non-proliferation treaties as well as an important part of confidence building measures. It defines practical measures that enable treaty members to check the treaty compliance by observing, counting or moni-toring specific actions and their accordance with the respective rules. In contrast to his-torical examples of former military technologies, cyberspace features some unique char-acteristics making it hard to apply established measures. The chapter describes these peculiarities and assesses distinguishing problems compared to selected verification measures for nuclear, biological and chemicals weapons technology. Yet, cyberspace is a human-made domain and adjusting its technical setting, rules and principles may help to reduce the threat of ongoing militarisation. Offering some alternatives, the chapter elaborates on suitable and measurable parameters for this domain and presents potential-ly useful verification approaches.},
    booktitle = {Information {Technology} for {Peace} and {Security} - {IT}-{Applications} and {Infrastructures} in {Conflicts}, {Crises}, {War}, and {Peace}},
    publisher = {Springer Vieweg},
    author = {Reinhold, Thomas and Reuter, Christian},
    editor = {Reuter, Christian},
    year = {2024},
    keywords = {Security, Peace, Projekt-CNTR},
    }

  • Thomas Reinhold, Christian Reuter (2024)
    From Cyber War to Cyber Peace
    In: Christian Reuter: Information Technology for Peace and Security – IT-Applications and Infrastructures in Conflicts, Crises, War, and Peace. Wiesbaden, Germany: Springer Vieweg.
    [BibTeX] [Abstract]

    The encompassing trend of digitalisation and widespread dependencies on IT systems triggers adjustments also in the military forces. Besides necessary enhancements of IT security and defensive measures for cyberspace, a growing number of states are estab-lishing offensive military capabilities for this domain. Looking at historical develop-ments and transformations due to advancements in military technologies, the chapter discusses the political progress made and tools developed since. Both of these have con-tributed to handling challenges and confining threats to international security. With this background, the text assesses a possible application of these efforts to developments concerning cyberspace, as well as obstacles that need to be tackled for it to be success-ful. The chapter points out political advancements already in progress, the role of social initiatives, such as the cyber peace campaign of the Forum of Computer Scientists for Peace and Societal Responsibility (FifF), as well as potential consequences of the rising probability of cyber war as opposed to the prospects of cyber peace.

    @incollection{reinhold_cyber_2024,
    address = {Wiesbaden, Germany},
    title = {From {Cyber} {War} to {Cyber} {Peace}},
    abstract = {The encompassing trend of digitalisation and widespread dependencies on IT systems triggers adjustments also in the military forces. Besides necessary enhancements of IT security and defensive measures for cyberspace, a growing number of states are estab-lishing offensive military capabilities for this domain. Looking at historical develop-ments and transformations due to advancements in military technologies, the chapter discusses the political progress made and tools developed since. Both of these have con-tributed to handling challenges and confining threats to international security. With this background, the text assesses a possible application of these efforts to developments concerning cyberspace, as well as obstacles that need to be tackled for it to be success-ful. The chapter points out political advancements already in progress, the role of social initiatives, such as the cyber peace campaign of the Forum of Computer Scientists for Peace and Societal Responsibility (FifF), as well as potential consequences of the rising probability of cyber war as opposed to the prospects of cyber peace.},
    booktitle = {Information {Technology} for {Peace} and {Security} - {IT}-{Applications} and {Infrastructures} in {Conflicts}, {Crises}, {War}, and {Peace}},
    publisher = {Springer Vieweg},
    author = {Reinhold, Thomas and Reuter, Christian},
    editor = {Reuter, Christian},
    year = {2024},
    keywords = {Security, Peace, Projekt-CROSSING, Cyberwar, Projekt-CNTR},
    }

  • Thomas Reinhold, Christian Reuter (2024)
    Arms Control and its Applicability to Cyberspace
    In: Christian Reuter: Information Technology for Peace and Security – IT-Applications and Infrastructures in Conflicts, Crises, War, and Peace. Wiesbaden: Springer Fachmedien Wiesbaden.
    [BibTeX] [Abstract]

    Arms control aims at preventing conflicts and fostering stability in inter-state relations by either reducing the probability of usage of a specific weapon or regulating its use and thus, reducing the costs of armament. Several approaches to arms control exist: limiting or reducing numbers of weapons and armed forces, disarmament (“down to zero”) or prohibiting certain weapons. To illustrate these further, this chapter elaborates on the necessity of arms control and presents some historical examples, including an overview of existing measures of arms control. Extrapolating from these, the general architecture of arms control regimes and the complex issue of establishing and verifying compliance with agreements will be discussed, not least with respect to cyberspace. Building on these theoretical considerations, the chapter presents important treaties and first approaches, including the Wassenaar Arrangement, the recommendations of the OSCE, and the UN GGE 2015.

    @incollection{reuter_arms_2024,
    address = {Wiesbaden},
    title = {Arms {Control} and its {Applicability} to {Cyberspace}},
    abstract = {Arms control aims at preventing conflicts and fostering stability in inter-state relations by either reducing the probability of usage of a specific weapon or regulating its use and thus, reducing the costs of armament. Several approaches to arms control exist: limiting or reducing numbers of weapons and armed forces, disarmament (“down to zero”) or prohibiting certain weapons. To illustrate these further, this chapter elaborates on the necessity of arms control and presents some historical examples, including an overview of existing measures of arms control. Extrapolating from these, the general architecture of arms control regimes and the complex issue of establishing and verifying compliance with agreements will be discussed, not least with respect to cyberspace. Building on these theoretical considerations, the chapter presents important treaties and first approaches, including the Wassenaar Arrangement, the recommendations of the OSCE, and the UN GGE 2015.},
    language = {en},
    booktitle = {Information {Technology} for {Peace} and {Security} - {IT}-{Applications} and {Infrastructures} in {Conflicts}, {Crises}, {War}, and {Peace}},
    publisher = {Springer Fachmedien Wiesbaden},
    author = {Reinhold, Thomas and Reuter, Christian},
    editor = {Reuter, Christian},
    year = {2024},
    keywords = {Peace, Projekt-CNTR},
    }

  • Marc-André Kaufhold, Jasmin Haunschild, Christian Reuter (2024)
    Cultural Violence and Peace Interventions in Social Media
    In: Christian Reuter: Information Technology for Peace and Security – IT-Applications and Infrastructures in Conflicts, Crises, War, and Peace. Wiesbaden, Germany: Springer Vieweg.
    [BibTeX] [Abstract]

    Over the last decade, social media services had an enormous impact on modern culture. They are nowadays widely established in everyday life, but also during natural and man-made crises and conflicts. For instance, Facebook was part of the Arabic Spring, in which the tool facilitated the communication and interaction between participants of political protests. On the contrary, terrorists may recruit new members and disseminate ideologies, and social bots may influence social and political processes. Based on the notions of cultural violence and cultural peace as well as the phenomena of fake news, terrorism and social bots, this exploratory review firstly presents human cultural inter-ventions in social media (e.g. dissemination of fake news and terroristic propaganda) and respective countermeasures (e.g. fake news detection and counter-narratives). Sec-ondly, it discusses automatic cultural interventions realised via social bots (e.g. astro-turfing, misdirection and smoke screening) and countermeasures (e.g. crowdsourcing and social bot detection). Finally, this chapter concludes with a range of cultural inter-ventions and information and communication technology (ICT) in terms of actors and intentions to identify future research potential for supporting situational assessments during conflicts.

    @incollection{kaufhold_cultural_2024,
    address = {Wiesbaden, Germany},
    title = {Cultural {Violence} and {Peace} {Interventions} in {Social} {Media}},
    abstract = {Over the last decade, social media services had an enormous impact on modern culture. They are nowadays widely established in everyday life, but also during natural and man-made crises and conflicts. For instance, Facebook was part of the Arabic Spring, in which the tool facilitated the communication and interaction between participants of political protests. On the contrary, terrorists may recruit new members and disseminate ideologies, and social bots may influence social and political processes. Based on the notions of cultural violence and cultural peace as well as the phenomena of fake news, terrorism and social bots, this exploratory review firstly presents human cultural inter-ventions in social media (e.g. dissemination of fake news and terroristic propaganda) and respective countermeasures (e.g. fake news detection and counter-narratives). Sec-ondly, it discusses automatic cultural interventions realised via social bots (e.g. astro-turfing, misdirection and smoke screening) and countermeasures (e.g. crowdsourcing and social bot detection). Finally, this chapter concludes with a range of cultural inter-ventions and information and communication technology (ICT) in terms of actors and intentions to identify future research potential for supporting situational assessments during conflicts.},
    booktitle = {Information {Technology} for {Peace} and {Security} - {IT}-{Applications} and {Infrastructures} in {Conflicts}, {Crises}, {War}, and {Peace}},
    publisher = {Springer Vieweg},
    author = {Kaufhold, Marc-André and Haunschild, Jasmin and Reuter, Christian},
    editor = {Reuter, Christian},
    year = {2024},
    keywords = {Crisis, HCI, SocialMedia, Peace, Projekt-CYLENCE},
    }

  • Thea Riebe, Stefka Schmid, Christian Reuter (2024)
    Dual-Use Technology: Research, Development and Governance of Security-relevant IT
    In: Christian Reuter: Information Technology for Peace and Security – IT-Applications and Infrastructures in Conflicts, Crises, War, and Peace. Wiesbaden, Germany: Springer Vieweg.
    [BibTeX]

    @incollection{riebe_dual-use_2024,
    address = {Wiesbaden, Germany},
    title = {Dual-{Use} {Technology}: {Research}, {Development} and {Governance} of {Security}-relevant {IT}},
    isbn = {978-3-658-25652-4},
    booktitle = {Information {Technology} for {Peace} and {Security} - {IT}-{Applications} and {Infrastructures} in {Conflicts}, {Crises}, {War}, and {Peace}},
    publisher = {Springer Vieweg},
    author = {Riebe, Thea and Schmid, Stefka and Reuter, Christian},
    editor = {Reuter, Christian},
    year = {2024},
    keywords = {Peace},
    }

  • Christian Reuter, Thea Riebe, Laura Guntrum (2024)
    ​​Technologie und die Transformation Politischer Gewalt
    Wissenschaft und Frieden: 2024.
    [BibTeX] [Abstract] [Download PDF]

    Die Konferenz Science · Peace · Security ’23 fand vom 20. bis 22. September 2023 an der Technischen Universität Darmstadt statt. Sie widmete sich dem Wandel von Technologien, deren Rolle in Kriegen und Konflikten sowie Fragen der Rüstungskontrolle. Ausgerichtet wurde die englischsprachige Konferenz von TraCe, einem hessischen BMBF-Forschungsverbund zu Transformationen politischer Gewalt, vom DFG-Sonderforschungsbereich CROSSING zu kryptografiebasierten Sicherheitslösungen und vom Forschungsverbund Naturwissenschaft, Abrüstung und internationale Sicherheit FONAS. Der Krieg Russlands gegen die Ukraine macht die Bedeutung der Friedens- und Konfliktforschung und deren technische Dimension, unter anderem, offensichtlich. Bereits 2019 hat der Wissenschaftsrat als wichtigstes wissenschaftspolitisches Beratungsgremium in Deutschland seine Empfehlungen zur Weiterentwicklung der Friedens- und Konfliktforschung veröffentlicht. Darin weist er auf einen dringenden Handlungsbedarf zur Stärkung der naturwissenschaftlich-technischen Friedens- und Konfliktforschung hin. Die Konferenzreihe Science · Peace · Security möchte einen kleinen Beitrag dazu leisten. Sie wurde 2019 in Darmstadt gegründet, fand 2021 an der RWTH Aachen statt, und soll 2025 am Forschungszentrum Jülich stattfinden.

    @techreport{reuter_technologie_2024,
    address = {Wissenschaft und Frieden},
    title = {​​{Technologie} und die {Transformation} {Politischer} {Gewalt}},
    url = {http://www.peasec.de/paper/2024/2024_ReuterRiebeGuntrum_TechnologieTransformationPolitischeGewalt_WundF.pdf},
    abstract = {Die Konferenz Science · Peace · Security ’23 fand vom 20. bis 22. September 2023 an der Technischen Universität Darmstadt statt. Sie widmete sich dem Wandel von Technologien, deren Rolle in Kriegen und Konflikten sowie Fragen der Rüstungskontrolle. Ausgerichtet wurde die englischsprachige Konferenz von TraCe, einem hessischen BMBF-Forschungsverbund zu Transformationen politischer Gewalt, vom DFG-Sonderforschungsbereich CROSSING zu kryptografiebasierten Sicherheitslösungen und vom Forschungsverbund Naturwissenschaft, Abrüstung und internationale Sicherheit FONAS.
    Der Krieg Russlands gegen die Ukraine macht die Bedeutung der Friedens- und Konfliktforschung und deren technische Dimension, unter anderem, offensichtlich. Bereits 2019 hat der Wissenschaftsrat als wichtigstes wissenschaftspolitisches Beratungsgremium in Deutschland seine Empfehlungen zur Weiterentwicklung der Friedens- und Konfliktforschung veröffentlicht. Darin weist er auf einen dringenden Handlungsbedarf zur Stärkung der naturwissenschaftlich-technischen Friedens- und Konfliktforschung hin. Die Konferenzreihe Science · Peace · Security möchte einen kleinen Beitrag dazu leisten. Sie wurde 2019 in Darmstadt gegründet, fand 2021 an der RWTH Aachen statt, und soll 2025 am Forschungszentrum Jülich stattfinden.},
    author = {Reuter, Christian and Riebe, Thea and Guntrum, Laura},
    year = {2024},
    keywords = {Peace},
    }

  • Christian Reuter, Thea Riebe, Jasmin Haunschild, Thomas Reinhold, Stefka Schmid (2024)
    Interdisciplinary Teaching Experiences in Peace Informatics
    In: Christian Reuter: Information Technology for Peace and Security – IT-Applications and Infrastructures in Conflicts, Crises, War, and Peace. Wiesbaden, Germany: Springer Vieweg.
    [BibTeX]

    @incollection{reuter_interdisciplinary_2024,
    address = {Wiesbaden, Germany},
    title = {Interdisciplinary {Teaching} {Experiences} in {Peace} {Informatics}},
    booktitle = {Information {Technology} for {Peace} and {Security} - {IT}-{Applications} and {Infrastructures} in {Conflicts}, {Crises}, {War}, and {Peace}},
    publisher = {Springer Vieweg},
    author = {Reuter, Christian and Riebe, Thea and Haunschild, Jasmin and Reinhold, Thomas and Schmid, Stefka},
    editor = {Reuter, Christian},
    year = {2024},
    keywords = {Security, Peace, Infrastructure},
    }

  • Thomas Reinhold (2024)
    Towards a Peaceful Development of Cyberspace: Challenges and Technical Measures for the De-Escalation of State-Led Cyberconflicts and Arms Control of Cyberweapons
    Springer Fachmedien Wiesbaden.
    [BibTeX] [Abstract]

    Cyberspace, already a few decades old, has become a matter of course for most of us, part of our everyday life. At the same time, this space and the global infrastructure behind it are essential for our civilizations, the economy and administration, and thus an essential expression and lifeline of a globalized world. However, these developments also create vulnerabilities and thus, cyberspace is increasingly developing into an intelligence and military operational area – for the defense and security of states but also as a component of offensive military planning, visible in the creation of military cyber-departments and the integration of cyberspace into states‘ security and defense strategies. In order to contain and regulate the conflict and escalation potential of technology used by military forces, over the last decades, a complex tool set of transparency, de-escalation and arms control measures has been developed and proof-tested. Unfortunately, many of these established measures do not work for cyberspace due to its specific technical characteristics. Even more, the concept of what constitutes a weapon – an essential requirement for regulation – starts to blur for this domain. Against this background, this thesis aims to answer how measures for the de-escalation of state-led conflicts in cyberspace and arms control of cyberweapons can be developed. In order to answer this question, the dissertation takes a specifically technical perspective on these problems and the underlying political challenges of state behavior and international humanitarian law in cyberspace to identify starting points for technical measures of transparency, arms control and verification. Based on this approach of adopting already existing technical measures from other fields of computer science, the thesis will provide proof of concepts approaches for some mentioned challenges like a classification system for cyberweapons that is based on technical measurable features, an approach for the mutual reduction of vulnerability stockpiles and an approach to plausibly assure the non-involvement in a cyberconflict as a measure for de-escalation. All these initial approaches and the questions of how and by which measures arms control and conflict reduction can work for cyberspace are still quite new and subject to not too many debates. Indeed, the approach of deliberately self-restricting the capabilities of technology in order to serve a bigger goal, like the reduction of its destructive usage, is yet not very common for the engineering thinking of computer science. Therefore, this dissertation also aims to provide some impulses regarding the responsibility and creative options of computer science with a view to the peaceful development and use of cyberspace.

    @book{reinhold_towards_2024,
    title = {Towards a {Peaceful} {Development} of {Cyberspace}: {Challenges} and {Technical} {Measures} for the {De}-{Escalation} of {State}-{Led} {Cyberconflicts} and {Arms} {Control} of {Cyberweapons}},
    abstract = {Cyberspace, already a few decades old, has become a matter of course for most of us, part of our everyday life. At the same time, this space and the global infrastructure behind it are essential for our civilizations, the economy and administration, and thus an essential expression and lifeline of a globalized world. However, these developments also create vulnerabilities and thus, cyberspace is increasingly developing into an intelligence and military operational area – for the defense and security of states but also as a component of offensive military planning, visible in the creation of military cyber-departments and the integration of cyberspace into states' security and defense strategies. In order to contain and regulate the conflict and escalation potential of technology used by military forces, over the last decades, a complex tool set of transparency, de-escalation and arms control measures has been developed and proof-tested. Unfortunately, many of these established measures do not work for cyberspace due to its specific technical characteristics. Even more, the concept of what constitutes a weapon – an essential requirement for regulation – starts to blur for this domain. Against this background, this thesis aims to answer how measures for the de-escalation of state-led conflicts in cyberspace and arms control of cyberweapons can be developed. In order to answer this question, the dissertation takes a specifically technical perspective on these problems and the underlying political challenges of state behavior and international humanitarian law in cyberspace to identify starting points for technical measures of transparency, arms control and verification. Based on this approach of adopting already existing technical measures from other fields of computer science, the thesis will provide proof of concepts approaches for some mentioned challenges like a classification system for cyberweapons that is based on technical measurable features, an approach for the mutual reduction of vulnerability stockpiles and an approach to plausibly assure the non-involvement in a cyberconflict as a measure for de-escalation. All these initial approaches and the questions of how and by which measures arms control and conflict reduction can work for cyberspace are still quite new and subject to not too many debates. Indeed, the approach of deliberately self-restricting the capabilities of technology in order to serve a bigger goal, like the reduction of its destructive usage, is yet not very common for the engineering thinking of computer science. Therefore, this dissertation also aims to provide some impulses regarding the responsibility and creative options of computer science with a view to the peaceful development and use of cyberspace.},
    publisher = {Springer Fachmedien Wiesbaden},
    author = {Reinhold, Thomas},
    year = {2024},
    keywords = {Security, Peace, Projekt-CROSSING, Projekt-ATHENE, Dissertation},
    }

  • Jonas Franken, Christian Reuter (2024)
    Secure Critical Infrastructures: Sectors, Concepts and Actors
    In: Christian Reuter: Information Technology for Peace and Security – IT-Applications and Infrastructures in Conflicts, Crises, War, and Peace. Wiesbaden, Germany: Springer Vieweg.
    [BibTeX]

    @incollection{franken_secure_2024,
    address = {Wiesbaden, Germany},
    title = {Secure {Critical} {Infrastructures}: {Sectors}, {Concepts} and {Actors}},
    booktitle = {Information {Technology} for {Peace} and {Security} - {IT}-{Applications} and {Infrastructures} in {Conflicts}, {Crises}, {War}, and {Peace}},
    publisher = {Springer Vieweg},
    author = {Franken, Jonas and Reuter, Christian},
    editor = {Reuter, Christian},
    year = {2024},
    keywords = {Security, Peace, Infrastructure},
    }

  • Laura Guntrum (2024)
    Keyboard Fighters: The Use of ICTs by Activists in Times of Military Coup in Myanmar
    Proceedings of the Conference on Human Factors in Computing Systems (CHI) .
    [BibTeX] [Abstract]

    Amidst the ongoing anti-military protests in Myanmar since 2021, there is a noticeable research gap on ICT-supported activism. Generally, ICTs play an important role during political crises in conjunction with activists’ practices on the ground. Inspired by Resource Mobilization Theory, I conducted qualitative interviews (N=16) and a qualitative online survey (N=34), which demonstrate the intersection between analog and digital domains, showcasing the ingenuity of the activists, and the rapid adoption of ICTs in a country that has experienced a digital revolution within the last few years. As not all people were able to protest on-the-ground, they acted as keyboard fighters to organize protests, to share information, and to support the civil disobedience movement in Myanmar. The study identifies, inter alia, the need for better offline applications with wider coverage in times of internet shutdowns, applications that cannot be easily identified during physical controls, and providing free and secure VPN access.

    @inproceedings{guntrum_keyboard_2024,
    series = {{CHI} '24},
    title = {Keyboard {Fighters}: {The} {Use} of {ICTs} by {Activists} in {Times} of {Military} {Coup} in {Myanmar}},
    abstract = {Amidst the ongoing anti-military protests in Myanmar since 2021, there is a noticeable research gap on ICT-supported activism. Generally, ICTs play an important role during political crises in conjunction with activists’ practices on the ground. Inspired by Resource Mobilization Theory, I conducted qualitative interviews (N=16) and a qualitative online survey (N=34), which demonstrate the intersection between analog and digital domains, showcasing the ingenuity of the activists, and the rapid adoption of ICTs in a country that has experienced a digital revolution within the last few years. As not all people were able to protest on-the-ground, they acted as keyboard fighters to organize protests, to share information, and to support the civil disobedience movement in Myanmar. The study identifies, inter alia, the need for better offline applications with wider coverage in times of internet shutdowns, applications that cannot be easily identified during physical controls, and providing free and secure VPN access.},
    booktitle = {Proceedings of the {Conference} on {Human} {Factors} in {Computing} {Systems} ({CHI})},
    publisher = {Association for Computing Machinery},
    author = {Guntrum, Laura},
    year = {2024},
    keywords = {HCI, Selected, A-Paper, Ranking-CORE-A*, Peace, Projekt-TraCe, Projekt-ATHENE},
    }

  • Thea Riebe, Stefka Schmid, Christian Reuter (2024)
    Creative Uses of Technology: Dual Use Governance, Assessment and Design
    In: Amy Hagopian, Marion Birch: Conflict & Health Handbook. De Gruyter.
    [BibTeX]

    @incollection{riebe_creative_2024,
    title = {Creative {Uses} of {Technology}: {Dual} {Use} {Governance}, {Assessment} and {Design}},
    booktitle = {Conflict \& {Health} {Handbook}},
    publisher = {De Gruyter},
    author = {Riebe, Thea and Schmid, Stefka and Reuter, Christian},
    editor = {Hagopian, Amy and Birch, Marion},
    year = {2024},
    keywords = {Peace},
    }

    2023

  • Stefka Schmid, Laura Guntrum, Steffen Haesler, Lisa Schultheiß, Christian Reuter (2023)
    Digital Volunteers During the COVID-19 Pandemic: Care Work on Social Media for Socio-technical Resilience
    Weizenbaum Journal of the Digital Society ;3(1). doi:10.34669/WI.WJDS/3.3.6
    [BibTeX] [Abstract] [Download PDF]

    Like past crises, the COVID-19 pandemic has also activated individual volunteers to help to respond to the crisis. This includes digital volunteers, who have organized physical aid and conducted activities on social media. Analyzing German volunteering support groups on Facebook and related Reddit threads in the context of the COVID-19 pandemic, we {\textbackslash}updatedshow what type of help is offered and how social media users interact with each other, trying to cope with the situation. We reveal that most users offering help online conduct mostly typical care work, such as buying groceries or giving advice. Crucially, volunteering is characterized by relationships of care and thus builds on affirmative interactions. Albeit some misdirected offers and regressive interruptions, people use the possibility to make their voices heard and, showing empathy, help each other to cope with crisis. Social media like Facebook mediate societal structures, including relationships of care, offering a space for continuous, cumulatively resilient conduct of care work. Reflecting on the traditional division of labor in crisis volunteering and counter-productive dynamics of care and empathy, we aim for feminist ethics of care which allows for interactions on social media that foster generative computer-supported collaboration.

    @article{schmid_digital_2023,
    title = {Digital {Volunteers} {During} the {COVID}-19 {Pandemic}: {Care} {Work} on {Social} {Media} for {Socio}-technical {Resilience}},
    volume = {3},
    issn = {2748-5625},
    url = {https://ojs.weizenbaum-institut.de/index.php/wjds/article/view/78},
    doi = {10.34669/WI.WJDS/3.3.6},
    abstract = {Like past crises, the COVID-19 pandemic has also activated individual volunteers to help to respond to the crisis. This includes digital volunteers, who have organized physical aid and conducted activities on social media. Analyzing German volunteering support groups on Facebook and related Reddit threads in the context of the COVID-19 pandemic, we {\textbackslash}updatedshow what type of help is offered and how social media users interact with each other, trying to cope with the situation. We reveal that most users offering help online conduct mostly typical care work, such as buying groceries or giving advice. Crucially, volunteering is characterized by relationships of care and thus builds on affirmative interactions. Albeit some misdirected offers and regressive interruptions, people use the possibility to make their voices heard and, showing empathy, help each other to cope with crisis. Social media like Facebook mediate societal structures, including relationships of care, offering a space for continuous, cumulatively resilient conduct of care work. Reflecting on the traditional division of labor in crisis volunteering and counter-productive dynamics of care and empathy, we aim for feminist ethics of care which allows for interactions on social media that foster generative computer-supported collaboration.},
    number = {1},
    journal = {Weizenbaum Journal of the Digital Society},
    author = {Schmid, Stefka and Guntrum, Laura and Haesler, Steffen and Schultheiß, Lisa and Reuter, Christian},
    month = may,
    year = {2023},
    keywords = {Crisis, HCI, SocialMedia, Student, Peace, Projekt-ATHENE-SecUrban, Projekt-emergenCITY, Projekt-TraCe},
    }

  • Thomas Reinhold, Christian Reuter (2023)
    Preventing the escalation of cyber conflicts: towards an approach to plausibly assure the non-involvement in a cyberattack
    Zeitschrift für Friedens- und Konfliktforschung (ZeFKo) ;12(1):31–58. doi:10.1007/s42597-023-00099-7
    [BibTeX] [Abstract] [Download PDF]

    While cyberspace has evolved into a commonly shared space vital to our individual lives and societies, malicious cyber activities by state actors as part of espionage operations, regarding defense strategies, or as part of traditional conflicts have strongly increased. In contrast, attributing the origin of such activities remains problematic. The ambiguity of digital data raises the problem of misinterpreting available information, increasing the risk of misinformed reactions and conflict escalation. In order to reduce this risk, this paper proposes a transparency system based on technologies which usually already exist for IT security measures that an accused actor in a specific incident can use to provide credible information which plausibly assures his non-involvement. The paper analyses the technical requirements, presents the technical concept and discusses the necessary adjustments to existing IT networks for its implementation. Intended as a measure for conflict de-escalation, the paper further discusses the limitations of this approach, especially with regard to technical limits as well as the political motivation and behavior of states.

    @article{reinhold_preventing_2023,
    title = {Preventing the escalation of cyber conflicts: towards an approach to plausibly assure the non-involvement in a cyberattack},
    volume = {12},
    issn = {2524-6976},
    url = {https://doi.org/10.1007/s42597-023-00099-7},
    doi = {10.1007/s42597-023-00099-7},
    abstract = {While cyberspace has evolved into a commonly shared space vital to our individual lives and societies, malicious cyber activities by state actors as part of espionage operations, regarding defense strategies, or as part of traditional conflicts have strongly increased. In contrast, attributing the origin of such activities remains problematic. The ambiguity of digital data raises the problem of misinterpreting available information, increasing the risk of misinformed reactions and conflict escalation. In order to reduce this risk, this paper proposes a transparency system based on technologies which usually already exist for IT security measures that an accused actor in a specific incident can use to provide credible information which plausibly assures his non-involvement. The paper analyses the technical requirements, presents the technical concept and discusses the necessary adjustments to existing IT networks for its implementation. Intended as a measure for conflict de-escalation, the paper further discusses the limitations of this approach, especially with regard to technical limits as well as the political motivation and behavior of states.},
    number = {1},
    journal = {Zeitschrift für Friedens- und Konfliktforschung (ZeFKo)},
    author = {Reinhold, Thomas and Reuter, Christian},
    month = apr,
    year = {2023},
    keywords = {Security, Peace, Projekt-CROSSING, Projekt-ATHENE-SecUrban},
    pages = {31--58},
    }

  • Thea Riebe (2023)
    Technology Assessment of Dual-Use ICTs – How to assess Diffusion, Governance and Design
    Darmstadt, Germany: Dissertation (Dr. rer. nat.), Department of Computer Science, Technische Universität Darmstadt. doi:10.26083/tuprints-00022849
    [BibTeX] [Abstract] [Download PDF]

    Technologies that can be used in military and civilian applications are referred to as dual-use. The dual-use nature of many information and communications technologies (ICTs) raises new questions for research and development for national, international, and human security. Measures to deal with the risks associated with the various dual-use technologies, including proliferation control, design approaches, and policy measures, vary widely. For example, Autonomous Weapon Systems (AWS) have not yet been regulated, while cryptographic products are subject to export and import controls. Innovations in artificial intelligence (AI), robotics, cybersecurity, and automated analysis of publicly available data raise new questions about their respective dual-use risks. Dual-use risks have been systematically discussed so far, especially in the life sciences, which have contributed to the development of methods for assessment and risk management. Dual-use risks arise, among other things, from the fact that safety-critical technologies can be easily disseminated or modified, as well as used as part of a weapon system. Therefore, the development and adaptation of robots and software requires an independent consideration that builds on the insights of related dual-use discourses. Therefore, this dissertation considers the management of such risks in terms of the proliferation, regulation, and design of individual dual-use information technologies. Technology Assessment (TA) is the epistemological framework for this work, bringing together the concepts and approaches of Critical Security Studies (CSS) and Human-Computer Interaction (HCI) to help evaluate and shape dual-use technologies. In order to identify the diffusion of dual-use at an early stage, the dissertation first examines the diffusion of dual-use innovations between civilian and military research in expert networks on LinkedIn, as well as on the basis of AI patents in a patent network. The results show low diffusion and tend to confirm existing studies on diffusion in patent networks. In the following section, the regulation of dual-use technologies is examined in the paper through two case studies. The first study uses a discourse analysis to show the value conflicts with regard to the regulation of autonomous weapons systems using the concept of Meaningful Human Control (MHC), while a second study, as a long-term comparative case study, analyzes the change and consequences of the regulation of strong cryptography in the U.S. as well as the programs of intelligence agencies for mass surveillance. Both cases point to the central role of private companies, both in the production of AWS and as intermediaries for the dissemination of encryption, as well as surveillance intermediaries. Subsequently, the dissertation examines the design of a dual-use technology using an Open Source Intelligence System (OSINT) for cybersecurity. For this purpose, conceptual, empirical, and technical studies are conducted as part of the Value-Sensitive Design (VSD) framework. During the studies, implications for research on and design of OSINT were identified. For example, the representative survey of the German population has shown that transparency of use while reducing mistrust is associated with higher acceptance of such systems. Additionally, it has been shown that data sparsity through the use of expert networks has many positive effects, not only improving the performance of the system, but is also preferable for legal and social reasons. Thus, the work contributes to the understanding of specific dual-use risks of AI, the regulation of AWS and cryptography, and the design of OSINT in cybersecurity. By combining concepts from CSS and participatory design methods in HCI, this work provides an interdisciplinary and multi-method contribution.

    @book{riebe_technology_2023,
    address = {Darmstadt, Germany},
    title = {Technology {Assessment} of {Dual}-{Use} {ICTs} – {How} to assess {Diffusion}, {Governance} and {Design}},
    url = {https://tuprints.ulb.tu-darmstadt.de/22849/},
    abstract = {Technologies that can be used in military and civilian applications are referred to as dual-use. The dual-use nature of many information and communications technologies (ICTs) raises new questions for research and development for national, international, and human security. Measures to deal with the risks associated with the various dual-use technologies, including proliferation control, design approaches, and policy measures, vary widely. For example, Autonomous Weapon Systems (AWS) have not yet been regulated, while cryptographic products are subject to export and import controls. Innovations in artificial intelligence (AI), robotics, cybersecurity, and automated analysis of publicly available data raise new questions about their respective dual-use risks.
    Dual-use risks have been systematically discussed so far, especially in the life sciences, which have contributed to the development of methods for assessment and risk management. Dual-use risks arise, among other things, from the fact that safety-critical technologies can be easily disseminated or modified, as well as used as part of a weapon system. Therefore, the development and adaptation of robots and software requires an independent consideration that builds on the insights of related dual-use discourses. Therefore, this dissertation considers the management of such risks in terms of the proliferation, regulation, and design of individual dual-use information technologies. Technology Assessment (TA) is the epistemological framework for this work, bringing together the concepts and approaches of Critical Security Studies (CSS) and Human-Computer Interaction (HCI) to help evaluate and shape dual-use technologies.
    In order to identify the diffusion of dual-use at an early stage, the dissertation first examines the diffusion of dual-use innovations between civilian and military research in expert networks on LinkedIn, as well as on the basis of AI patents in a patent network. The results show low diffusion and tend to confirm existing studies on diffusion in patent networks. In the following section, the regulation of dual-use technologies is examined in the paper through two case studies. The first study uses a discourse analysis to show the value conflicts with regard to the regulation of autonomous weapons systems using the concept of Meaningful Human Control (MHC), while a second study, as a long-term comparative case study, analyzes the change and consequences of the regulation of strong cryptography in the U.S. as well as the programs of intelligence agencies for mass surveillance. Both cases point to the central role of private companies, both in the production of AWS and as intermediaries for the dissemination of encryption, as well as surveillance intermediaries. Subsequently, the dissertation examines the design of a dual-use technology using an Open Source Intelligence System (OSINT) for cybersecurity. For this purpose, conceptual, empirical, and technical studies are conducted as part of the Value-Sensitive Design (VSD) framework. During the studies, implications for research on and design of OSINT were identified. For example, the representative survey of the German population has shown that transparency of use while reducing mistrust is associated with higher acceptance of such systems. Additionally, it has been shown that data sparsity through the use of expert networks has many positive effects, not only improving the performance of the system, but is also preferable for legal and social reasons. Thus, the work contributes to the understanding of specific dual-use risks of AI, the regulation of AWS and cryptography, and the design of OSINT in cybersecurity. By combining concepts from CSS and participatory design methods in HCI, this work provides an interdisciplinary and multi-method contribution.},
    publisher = {Dissertation (Dr. rer. nat.), Department of Computer Science, Technische Universität Darmstadt},
    author = {Riebe, Thea},
    year = {2023},
    doi = {10.26083/tuprints-00022849},
    keywords = {HCI, Projekt-KontiKat, Peace, Projekt-DualUse, Projekt-CYWARN, Dissertation},
    }

  • Jonas Franken, Franziska Schneider, Christian Reuter (2023)
    The Internet’s Plumbing Consists of Garden Hoses: A Critical Analysis of the Advantages and Pitfalls of Metaphors Use for Critical Maritime Infrastructures
    Dreizack 23 Kiel.
    [BibTeX] [Download PDF]

    @inproceedings{franken_internets_2023,
    address = {Kiel},
    title = {The {Internet}’s {Plumbing} {Consists} of {Garden} {Hoses}: {A} {Critical} {Analysis} of the {Advantages} and {Pitfalls} of {Metaphors} {Use} for {Critical} {Maritime} {Infrastructures}},
    url = {https://peasec.de/paper/2023/2023_FrankenSchneiderReuter_MetaphernMarKRITIS_Dreizack23.pdf},
    booktitle = {Dreizack 23},
    publisher = {The Kiel Seapower Series},
    author = {Franken, Jonas and Schneider, Franziska and Reuter, Christian},
    editor = {Schilling, Henrik},
    year = {2023},
    keywords = {Security, Peace, Projekt-ATHENE-SecUrban, Projekt-AgriRegio, Projekt-NetzGeschichte},
    pages = {1--8},
    }

  • Anja-Liisa Gonsior, Thea Riebe, Stefka Schmid, Thomas Reinhold, Christian Reuter (2023)
    Friedensinformatik: heute und morgen
    FIfF-Kommunikation: Zeitschrift für Informatik und Gesellschaft ;2023(4):34–37.
    [BibTeX] [Download PDF]

    @article{gonsior_friedensinformatik_2023,
    title = {Friedensinformatik: heute und morgen},
    volume = {2023},
    url = {https://peasec.de/paper/2023/2023_GonsiorRiebeSchmidReinholdReuter_FriedensinformatikHeuteMorgen_WundF.pdf},
    number = {4},
    journal = {FIfF-Kommunikation: Zeitschrift für Informatik und Gesellschaft},
    author = {Gonsior, Anja-Liisa and Riebe, Thea and Schmid, Stefka and Reinhold, Thomas and Reuter, Christian},
    year = {2023},
    keywords = {Peace},
    pages = {34--37},
    }

  • Christian Reuter, Thea Riebe, Laura Guntrum (2023)
    Science Peace Security ‘23 – Proceedings of the Interdisciplinary Conference on Technical Peace and Security Research
    Darmstadt, Germany: TUprints. doi:10.26083/tuprints-00024777
    [BibTeX] [Abstract] [Download PDF]

    The conference Science · Peace · Security ’23 took place from September 20 to 22, 2023, at the Georg-Christoph-Lichtenberg-Haus of the Technical University of Darmstadt. It focused on the transformation of technologies, their role in wars and conflicts, and issues related to arms control. The three-day scientific conference welcomed over 110 participants from Germany and speakers from the United Kingdom, Sweden, the USA, Colombia, India, Italy, Switzerland, Norway, the Czech Republic, Iraq, Austria, and the Netherlands. More than 50 different organizations were represented, ensuring interdisciplinary exchange. The program covered a wide range of topics reflecting societal discourses in light of a changing global security landscape. In total, the conference featured 40 presentations, workshops, discussions, and panels that discussed current and future challenges in the field of technical peace and conflict research. Particularly relevant topics included: Artificial Intelligence, Unmanned Weapons Systems, Rocket and Space Technologies (Nuclear) Arms Control, Regulation of Biological and Chemical Weapons, Information Technologies for Surveillance and Oppression of Civilians, (Civilian) Critical Infrastructures, Digital Peacebuilding, Human-Machine Interaction, Dual-Used, Cyber Attacks and Relevant Technology and Security Policies.

    @book{reuter_science_2023,
    address = {Darmstadt, Germany},
    title = {Science {Peace} {Security} ‘23 - {Proceedings} of the {Interdisciplinary} {Conference} on {Technical} {Peace} and {Security} {Research}},
    url = {https://tuprints.ulb.tu-darmstadt.de/id/eprint/24777},
    abstract = {The conference Science · Peace · Security '23 took place from September 20 to 22, 2023, at the Georg-Christoph-Lichtenberg-Haus of the Technical University of Darmstadt. It focused on the transformation of technologies, their role in wars and conflicts, and issues related to arms control. The three-day scientific conference welcomed over 110 participants from Germany and speakers from the United Kingdom, Sweden, the USA, Colombia, India, Italy, Switzerland, Norway, the Czech Republic, Iraq, Austria, and the Netherlands. More than 50 different organizations were represented, ensuring interdisciplinary exchange. The program covered a wide range of topics reflecting societal discourses in light of a changing global security landscape. In total, the conference featured 40 presentations, workshops, discussions, and panels that discussed current and future challenges in the field of technical peace and conflict research. Particularly relevant topics included: Artificial Intelligence, Unmanned Weapons Systems, Rocket and Space Technologies (Nuclear) Arms Control, Regulation of Biological and Chemical Weapons, Information Technologies for Surveillance and Oppression of Civilians, (Civilian) Critical Infrastructures, Digital Peacebuilding, Human-Machine Interaction, Dual-Used, Cyber Attacks and Relevant Technology and Security Policies.},
    publisher = {TUprints},
    author = {Reuter, Christian and Riebe, Thea and Guntrum, Laura},
    year = {2023},
    doi = {10.26083/tuprints-00024777},
    keywords = {Security, Peace, Projekt-CROSSING, Projekt-TraCe},
    }

  • Thomas Reinhold (2023)
    Towards a Peaceful Development of Cyberspace: Challenges and Technical Measures for the De-Escalation of State-Led Cyberconflicts and Arms Control of Cyberweapons
    Darmstadt, Germany: Dissertation (Dr. rer. nat.), Department of Computer Science, Technische Universität Darmstadt. doi:10.26083/tuprints-00024559
    [BibTeX] [Abstract] [Download PDF]

    Cyberspace, already a few decades old, has become a matter of course for most of us, part of our everyday life. At the same time, this space and the global infrastructure behind it are essential for our civilizations, the economy and administration, and thus an essential expression and lifeline of a globalized world. However, these developments also create vulnerabilities and thus, cyberspace is increasingly developing into an intelligence and military operational area – for the defense and security of states but also as a component of offensive military planning, visible in the creation of military cyber-departments and the integration of cyberspace into states‘ security and defense strategies. In order to contain and regulate the conflict and escalation potential of technology used by military forces, over the last decades, a complex tool set of transparency, de-escalation and arms control measures has been developed and proof-tested. Unfortunately, many of these established measures do not work for cyberspace due to its specific technical characteristics. Even more, the concept of what constitutes a weapon – an essential requirement for regulation – starts to blur for this domain. Against this background, this thesis aims to answer how measures for the de-escalation of state-led conflicts in cyberspace and arms control of cyberweapons can be developed. In order to answer this question, the dissertation takes a specifically technical perspective on these problems and the underlying political challenges of state behavior and international humanitarian law in cyberspace to identify starting points for technical measures of transparency, arms control and verification. Based on this approach of adopting already existing technical measures from other fields of computer science, the thesis will provide proof of concepts approaches for some mentioned challenges like a classification system for cyberweapons that is based on technical measurable features, an approach for the mutual reduction of vulnerability stockpiles and an approach to plausibly assure the non-involvement in a cyberconflict as a measure for de-escalation. All these initial approaches and the questions of how and by which measures arms control and conflict reduction can work for cyberspace are still quite new and subject to not too many debates. Indeed, the approach of deliberately self-restricting the capabilities of technology in order to serve a bigger goal, like the reduction of its destructive usage, is yet not very common for the engineering thinking of computer science. Therefore, this dissertation also aims to provide some impulses regarding the responsibility and creative options of computer science with a view to the peaceful development and use of cyberspace.

    @book{reinhold_towards_2023,
    address = {Darmstadt, Germany},
    title = {Towards a {Peaceful} {Development} of {Cyberspace}: {Challenges} and {Technical} {Measures} for the {De}-{Escalation} of {State}-{Led} {Cyberconflicts} and {Arms} {Control} of {Cyberweapons}},
    url = {https://tuprints.ulb.tu-darmstadt.de/24559/},
    abstract = {Cyberspace, already a few decades old, has become a matter of course for most of us, part of our everyday life. At the same time, this space and the global infrastructure behind it are essential for our civilizations, the economy and administration, and thus an essential expression and lifeline of a globalized world. However, these developments also create vulnerabilities and thus, cyberspace is increasingly developing into an intelligence and military operational area – for the defense and security of states but also as a component of offensive military planning, visible in the creation of military cyber-departments and the integration of cyberspace into states' security and defense strategies. In order to contain and regulate the conflict and escalation potential of technology used by military forces, over the last decades, a complex tool set of transparency, de-escalation and arms control measures has been developed and proof-tested. Unfortunately, many of these established measures do not work for cyberspace due to its specific technical characteristics. Even more, the concept of what constitutes a weapon – an essential requirement for regulation – starts to blur for this domain. Against this background, this thesis aims to answer how measures for the de-escalation of state-led conflicts in cyberspace and arms control of cyberweapons can be developed. In order to answer this question, the dissertation takes a specifically technical perspective on these problems and the underlying political challenges of state behavior and international humanitarian law in cyberspace to identify starting points for technical measures of transparency, arms control and verification. Based on this approach of adopting already existing technical measures from other fields of computer science, the thesis will provide proof of concepts approaches for some mentioned challenges like a classification system for cyberweapons that is based on technical measurable features, an approach for the mutual reduction of vulnerability stockpiles and an approach to plausibly assure the non-involvement in a cyberconflict as a measure for de-escalation. All these initial approaches and the questions of how and by which measures arms control and conflict reduction can work for cyberspace are still quite new and subject to not too many debates. Indeed, the approach of deliberately self-restricting the capabilities of technology in order to serve a bigger goal, like the reduction of its destructive usage, is yet not very common for the engineering thinking of computer science. Therefore, this dissertation also aims to provide some impulses regarding the responsibility and creative options of computer science with a view to the peaceful development and use of cyberspace.},
    publisher = {Dissertation (Dr. rer. nat.), Department of Computer Science, Technische Universität Darmstadt},
    author = {Reinhold, Thomas},
    year = {2023},
    doi = {10.26083/tuprints-00024559},
    keywords = {Security, Peace, Projekt-CROSSING, Projekt-ATHENE, Dissertation},
    }

  • Verena Zimmermann, Jasmin Haunschild, Alina Stöver, Nina Gerber (2023)
    Safe AND Secure Infrastructures? – Studying Human Aspects of Safety and Security Incidents with Experts from both Domains
    Mensch und Computer – Workshopband Rapperswil, Switzerland. doi:10.18420/muc2023-mci-ws01-225
    [BibTeX] [Abstract] [Download PDF]

    In today’s digitalized and interconnected world, the traditionally distinct concepts security and safety are increasingly intertwined. For example, a cyber attack on a hospital can negatively impact the patients’ physical safety. Thus, security research and practice should consider these interactions. To explore human-related challenges at the intersection of safety and security, we conducted three focus group workshops with N= 16 experts from both domains. We introduced two scenarios leading to a power outage, one with a safety-related cause (snow storm) and one with a security-related cause (cyber attack). The experts discussed interactions, differences and parallels in coping with the scenarios. Additionally, potential solutions for building response capacity by including volunteers were explored. The findings indicate similar consequences resulting from the safety- vs. security-related incidents. However, the experts identified relevant differences in the challenges preparing for and coping with the scenarios. While security-related challenges included the incalculable time horizon, impact and cascading effects as well as lack of emergency plans and training, safety challengesmainly concerned accessibility of the affected area. The implications for future work are discussed.

    @inproceedings{zimmermann_safe_2023,
    address = {Rapperswil, Switzerland},
    title = {Safe {AND} {Secure} {Infrastructures}? – {Studying} {Human} {Aspects} of {Safety} and {Security} {Incidents} with {Experts} from both {Domains}},
    url = {https://dl.gi.de/items/9c1d2bd5-229f-4db0-a764-6126cf92ef5f},
    doi = {10.18420/muc2023-mci-ws01-225},
    abstract = {In today’s digitalized and interconnected world, the traditionally distinct concepts security and safety are increasingly intertwined. For example, a cyber attack on a hospital can negatively impact the patients’ physical safety. Thus, security research and practice should consider these interactions. To explore human-related challenges at the intersection of safety and security, we conducted three focus group workshops with N= 16 experts from both domains. We introduced two scenarios leading to a power outage, one with a safety-related cause (snow storm) and one with a security-related cause (cyber attack). The experts discussed interactions, differences and parallels in coping with the scenarios. Additionally, potential solutions for building response capacity by including volunteers were explored. The findings indicate similar consequences resulting from the safety- vs. security-related incidents. However, the experts identified relevant differences in the challenges preparing for and coping with the scenarios. While security-related challenges included the incalculable time horizon, impact and cascading effects as well as lack of emergency plans and training, safety challengesmainly concerned accessibility of the affected area. The implications for future work are discussed.},
    language = {de},
    booktitle = {Mensch und {Computer} - {Workshopband}},
    publisher = {Gesellschaft für Informatik e.V.},
    author = {Zimmermann, Verena and Haunschild, Jasmin and Stöver, Alina and Gerber, Nina},
    year = {2023},
    keywords = {Security, Peace, Projekt-ATHENE-SecUrban, Projekt-GRKPrivacy},
    }

  • Stefka Schmid (2023)
    Safe and Secure? Visions of Military Human-Computer Interaction
    Mensch und Computer – Workshopband Rapperswil, Switzerland. doi:10.18420/muc2023-mci-ws01-365
    [BibTeX] [Abstract] [Download PDF]

    Safety-critical human-computer interaction has focused on technology use in life-critical situations, including military operations. Due to the practical relevance of HCI and disciplinary debates about human-centered design, this literature review studies HCI scholarships’ visions of military human-computer interaction. Through text analysis and categorization of publications, it is found that interaction is envisioned to take place in the context of both missionoriented operational (e.g., target detection) as well as organizational tasks (e.g., military training). While artificial intelligence, virtual/augmented reality, and robots are most frequently defined as technological environments, goals, such as situation awareness, enjoyment, and trust are predominantly associated with them. Considering scholarly references to application contexts and different factors of the context of use allows to systematically approach how military human-computer interaction is imagined. Offering insight into research trends in HCI, this first overview of research endeavors also contributes to interdisciplinary debates, such as Security Studies and technology assessment.

    @inproceedings{schmid_safe_2023,
    address = {Rapperswil, Switzerland},
    title = {Safe and {Secure}? {Visions} of {Military} {Human}-{Computer} {Interaction}},
    url = {https://dl.gi.de/items/841cc5bd-8e25-40de-804f-8fb4fedddf11},
    doi = {10.18420/muc2023-mci-ws01-365},
    abstract = {Safety-critical human-computer interaction has focused on technology use in life-critical situations, including military operations. Due to the practical relevance of HCI and disciplinary debates about human-centered design, this literature review studies HCI scholarships’ visions of military human-computer interaction. Through text analysis and categorization of publications, it is found that interaction is envisioned to take place in the context of both missionoriented operational (e.g., target detection) as well as organizational tasks (e.g., military training). While artificial intelligence, virtual/augmented reality, and robots are most frequently defined as technological environments, goals, such as situation awareness, enjoyment, and trust are predominantly associated with them. Considering scholarly references to application contexts and different factors of the context of use allows to systematically approach how military human-computer interaction is imagined. Offering insight into research trends in HCI, this first overview of research endeavors also contributes to interdisciplinary debates, such as Security Studies and technology assessment.},
    language = {de},
    booktitle = {Mensch und {Computer} - {Workshopband}},
    publisher = {Gesellschaft für Informatik e.V.},
    author = {Schmid, Stefka},
    year = {2023},
    keywords = {Peace, Projekt-ATHENE-SecUrban, Projekt-TraCe},
    }

  • Thomas Reinhold, Philipp Kuehn, Daniel Günther, Thomas Schneider, Christian Reuter (2023)
    ExTRUST: Reducing Exploit Stockpiles With a Privacy-Preserving Depletion Systems for Inter-State Relationships
    IEEE Transactions on Technology and Society ;4(2):158–170. doi:10.1109/TTS.2023.3280356
    [BibTeX] [Abstract] [Download PDF]

    Cyberspace is a fragile construct threatened by malicious cyber operations of different actors, with vulnerabilities in IT hardware and software forming the basis for such activities, thus also posing a threat to global IT security. Advancements in the field of artificial intelligence accelerate this development, either with artificial intelligence enabled cyber weapons, automated cyber defense measures, or artificial intelligence-based threat and vulnerability detection. Especially state actors, with their long-term strategic security interests, often stockpile such knowledge of vulnerabilities and exploits to enable their military or intelligence service cyberspace operations. While treaties and regulations to limit these developments and to enhance global IT security by disclosing vulnerabilities are currently being discussed on the international level, these efforts are hindered by state concerns about the disclosure of unique knowledge and about giving up tactical advantages. This leads to a situation where multiple states are likely to stockpile at least some identical exploits, with technical measures to enable a depletion process for these stockpiles that preserve state secrecy interests and consider the special constraints of interacting states as well as the requirements within such environments being non-existent. This paper proposes such a privacy-preserving approach that allows multiple state parties to privately compare their stock of vulnerabilities and exploits to check for items that occur in multiple stockpiles without revealing them so that their disclosure can be considered. We call our system ExTRUST and show that it is scalable and can withstand several attack scenarios. Beyond the intergovernmental setting, ExTRUST can also be used for other zero-trust use cases, such as bug-bounty programs.

    @article{reinhold_extrust_2023,
    title = {{ExTRUST}: {Reducing} {Exploit} {Stockpiles} {With} a {Privacy}-{Preserving} {Depletion} {Systems} for {Inter}-{State} {Relationships}},
    volume = {4},
    url = {https://peasec.de/paper/2023/2023_ReinholdKuehnGuentherSchneiderReuter_ExTrust-ehem-BlockED_TTaS.pdf},
    doi = {10.1109/TTS.2023.3280356},
    abstract = {Cyberspace is a fragile construct threatened by malicious cyber operations of different actors, with vulnerabilities in IT hardware and software forming the basis for such activities, thus also posing a threat to global IT security. Advancements in the field of artificial intelligence accelerate this development, either with artificial intelligence enabled cyber weapons, automated cyber defense measures, or artificial intelligence-based threat and vulnerability detection. Especially state actors, with their long-term strategic security interests, often stockpile such knowledge of vulnerabilities and exploits to enable their military or intelligence service cyberspace operations. While treaties and regulations to limit these developments and to enhance global IT security by disclosing vulnerabilities are currently being discussed on the international level, these efforts are hindered by state concerns about the disclosure of unique knowledge and about giving up tactical advantages. This leads to a situation where multiple states are likely to stockpile at least some identical exploits, with technical measures to enable a depletion process for these stockpiles that preserve state secrecy interests and consider the special constraints of interacting states as well as the requirements within such environments being non-existent. This paper proposes such a privacy-preserving approach that allows multiple state parties to privately compare their stock of vulnerabilities and exploits to check for items that occur in multiple stockpiles without revealing them so that their disclosure can be considered. We call our system ExTRUST and show that it is scalable and can withstand several attack scenarios. Beyond the intergovernmental setting, ExTRUST can also be used for other zero-trust use cases, such as bug-bounty programs.},
    number = {2},
    journal = {IEEE Transactions on Technology and Society},
    author = {Reinhold, Thomas and Kuehn, Philipp and Günther, Daniel and Schneider, Thomas and Reuter, Christian},
    year = {2023},
    keywords = {Selected, Student, A-Paper, Peace, Projekt-CROSSING, AuswahlPeace, Cyberwar, Projekt-ATHENE-SecUrban, Projekt-GRKPrivacy},
    pages = {158--170},
    }

  • Thomas Reinhold, Helene Pleil, Christian Reuter (2023)
    Challenges for Cyber Arms Control: A Qualitative Expert Interview Study
    Zeitschrift für Außen- und Sicherheitspolitik (ZfAS) ;16(3):289–310. doi:10.1007/s12399-023-00960-w
    [BibTeX] [Abstract] [Download PDF]

    The militarization of cyberspace has been a topic in international fora and scientific debates for several years. However, the development of applicable, and verifiable arms control measures that can effectively reduce the risk of military escalations in cyberspace is still hindered by the characteristics of this domain. The article analyses challenges and obstacles of dual-use, proliferation, constant technological progress, the importance of the private sector, difficulties in defining and verifying weapons and difficulties in attributing attacks.

    @article{reinhold_challenges_2023,
    title = {Challenges for {Cyber} {Arms} {Control}: {A} {Qualitative} {Expert} {Interview} {Study}},
    volume = {16},
    issn = {1866-2196},
    url = {https://doi.org/10.1007/s12399-023-00960-w},
    doi = {10.1007/s12399-023-00960-w},
    abstract = {The militarization of cyberspace has been a topic in international fora and scientific debates for several years. However, the development of applicable, and verifiable arms control measures that can effectively reduce the risk of military escalations in cyberspace is still hindered by the characteristics of this domain. The article analyses challenges and obstacles of dual-use, proliferation, constant technological progress, the importance of the private sector, difficulties in defining and verifying weapons and difficulties in attributing attacks.},
    number = {3},
    journal = {Zeitschrift für Außen- und Sicherheitspolitik (ZfAS)},
    author = {Reinhold, Thomas and Pleil, Helene and Reuter, Christian},
    month = aug,
    year = {2023},
    keywords = {Security, Peace, Projekt-CROSSING, Projekt-ATHENE-SecUrban},
    pages = {289--310},
    }

  • Laura Guntrum, Benjamin Güldenring, Franz Kuntke, Christian Reuter (2023)
    Using Digitally Mediated Methods in Sensitive Contexts: A Threat Analysis and Critical Reflection on Security, Privacy, and Ethical Concerns in the Case of Afghanistan
    Zeitschrift für Friedens- und Konfliktforschung (ZeFKo) ;11(2):95–128. doi:10.1007/s42597-022-00088-2
    [BibTeX] [Abstract] [Download PDF]

    Given the lack of empirical examples of how research can be conducted via digital means in sensitive contexts, this paper provides a threat model using Afghanistan, where the Taliban took power in August 2021, as an example. Both technical and non-technical research-related risks are analyzed, paying attention to research ethics, data security, and privacy. We argue that any threat model and risk analysis is highly context-dependent. Our analysis reveals that in certain research processes, human security does not necessarily coincide with data security and that an ambivalence exists between privacy and usability. In addition to the concrete threat analysis, the paper identifies some general technical solutions (e.g., encryption methods, communication software) for different research steps to foster secure and ethically justifiable research.

    @article{guntrum_using_2023,
    title = {Using {Digitally} {Mediated} {Methods} in {Sensitive} {Contexts}: {A} {Threat} {Analysis} and {Critical} {Reflection} on {Security}, {Privacy}, and {Ethical} {Concerns} in the {Case} of {Afghanistan}},
    volume = {11},
    issn = {2524-6976},
    url = {https://link.springer.com/article/10.1007/s42597-022-00088-2},
    doi = {10.1007/s42597-022-00088-2},
    abstract = {Given the lack of empirical examples of how research can be conducted via digital means in sensitive contexts, this paper provides a threat model using Afghanistan, where the Taliban took power in August 2021, as an example. Both technical and non-technical research-related risks are analyzed, paying attention to research ethics, data security, and privacy. We argue that any threat model and risk analysis is highly context-dependent. Our analysis reveals that in certain research processes, human security does not necessarily coincide with data security and that an ambivalence exists between privacy and usability. In addition to the concrete threat analysis, the paper identifies some general technical solutions (e.g., encryption methods, communication software) for different research steps to foster secure and ethically justifiable research.},
    number = {2},
    journal = {Zeitschrift für Friedens- und Konfliktforschung (ZeFKo)},
    author = {Guntrum, Laura and Güldenring, Benjamin and Kuntke, Franz and Reuter, Christian},
    month = oct,
    year = {2023},
    keywords = {Peace, Projekt-ATHENE-FANCY, Projekt-TraCe},
    pages = {95--128},
    }

  • Jonas Franken, Christian Reuter (2023)
    Buchrezension: Stahlhut, Björn/Lammert, Martin (Hrsg.): Gesamtstaatliche Sicherheitsvorsorge – gerüstet für den Ernstfall!?, 200 S., BWV, Berlin 2022.
    Neue Politische Literatur (NPL) . doi:https://doi.org/10.1007/s42520-023-00496-5
    [BibTeX] [Download PDF]

    @article{franken_buchrezension_2023,
    title = {Buchrezension: {Stahlhut}, {Björn}/{Lammert}, {Martin} ({Hrsg}.): {Gesamtstaatliche} {Sicherheitsvorsorge} – gerüstet für den {Ernstfall}!?, 200 {S}., {BWV}, {Berlin} 2022.},
    issn = {2197-6082},
    url = {https://link.springer.com/article/10.1007/s42520-023-00496-5},
    doi = {https://doi.org/10.1007/s42520-023-00496-5},
    journal = {Neue Politische Literatur (NPL)},
    author = {Franken, Jonas and Reuter, Christian},
    year = {2023},
    keywords = {Peace},
    }

  • Laura Guntrum, Sebastian Schwartz, Christian Reuter (2023)
    Dual-Use Technologies in the Context of Autonomous Driving: An Empirical Case Study From Germany
    Zeitschrift für Außen- und Sicherheitspolitik (ZfAS) . doi:10.1007/s12399-022-00935-3
    [BibTeX] [Abstract] [Download PDF]

    The article examines which technical aspects of autonomous driving are potentially transferable to the military sector. Through expert interviews the strong fragmentation of technologies in the field of autonomous driving becomes apparent. This hinders the clear identification of a specific dual-use technology. Environmental perception, artificial intelligence and sensors are considered to have the highest transferability rate from civil research to the military sector. Therefore, sensor development should receive special attention.

    @article{guntrum_dual-use_2023,
    title = {Dual-{Use} {Technologies} in the {Context} of {Autonomous} {Driving}: {An} {Empirical} {Case} {Study} {From} {Germany}},
    issn = {1866-2196},
    url = {https://doi.org/10.1007/s12399-022-00935-3},
    doi = {10.1007/s12399-022-00935-3},
    abstract = {The article examines which technical aspects of autonomous driving are potentially transferable to the military sector. Through expert interviews the strong fragmentation of technologies in the field of autonomous driving becomes apparent. This hinders the clear identification of a specific dual-use technology. Environmental perception, artificial intelligence and sensors are considered to have the highest transferability rate from civil research to the military sector. Therefore, sensor development should receive special attention.},
    journal = {Zeitschrift für Außen- und Sicherheitspolitik (ZfAS)},
    author = {Guntrum, Laura and Schwartz, Sebastian and Reuter, Christian},
    month = jan,
    year = {2023},
    keywords = {Peace, Projekt-ATHENE-SecUrban, Projekt-TraCe},
    }

  • Thomas Reinhold, Christian Reuter (2023)
    Zur Debatte über die Einhegung eines Cyberwars: Analyse militärischer Cyberaktivitäten im Krieg Russlands gegen die Ukraine
    Zeitschrift für Friedens- und Konfliktforschung (ZeFKo) . doi:10.1007/s42597-023-00094-y
    [BibTeX] [Abstract] [Download PDF]

    Der Überfall Russlands auf die Ukraine und der sich anschließende Krieg haben neben vielen anderen sicherheitspolitischen Gewissheiten auch zum ersten Mal die Rolle des Cyberspace in einem offenen Angriffskrieg demonstriert und bedenkenswerte Entwicklungen offenbart. Ziel dieses Beitrags ist es, die militärischen Aktivitäten im Cyberspace im Rahmen des Krieges Russlands gegen die Ukraine auf der Grundlage der öffentlich verfügbaren Informationen zu analysieren und im Hinblick auf die bis dato gängigen Vorstellungen eines Cyberwars zu bewerten. Darauf aufbauend werden mögliche Schlussfolgerungen betrachtet, zum einen mit Blick auf die zukünftige Bedeutung von Cyberaktivitäten für Russland, hinsichtlich des generellen militärischen Einsatzes von Cyberwirkmitteln und dessen weiterer Entwicklung, und in Bezug auf zukünftige internationale Debatten zur Einhegung von Cyberwars und des schädigenden Einsatzes von Cyberwirkmitteln.

    @article{reinhold_zur_2023,
    title = {Zur {Debatte} über die {Einhegung} eines {Cyberwars}: {Analyse} militärischer {Cyberaktivitäten} im {Krieg} {Russlands} gegen die {Ukraine}},
    issn = {2524-6976},
    url = {https://doi.org/10.1007/s42597-023-00094-y},
    doi = {10.1007/s42597-023-00094-y},
    abstract = {Der Überfall Russlands auf die Ukraine und der sich anschließende Krieg haben neben vielen anderen sicherheitspolitischen Gewissheiten auch zum ersten Mal die Rolle des Cyberspace in einem offenen Angriffskrieg demonstriert und bedenkenswerte Entwicklungen offenbart. Ziel dieses Beitrags ist es, die militärischen Aktivitäten im Cyberspace im Rahmen des Krieges Russlands gegen die Ukraine auf der Grundlage der öffentlich verfügbaren Informationen zu analysieren und im Hinblick auf die bis dato gängigen Vorstellungen eines Cyberwars zu bewerten. Darauf aufbauend werden mögliche Schlussfolgerungen betrachtet, zum einen mit Blick auf die zukünftige Bedeutung von Cyberaktivitäten für Russland, hinsichtlich des generellen militärischen Einsatzes von Cyberwirkmitteln und dessen weiterer Entwicklung, und in Bezug auf zukünftige internationale Debatten zur Einhegung von Cyberwars und des schädigenden Einsatzes von Cyberwirkmitteln.},
    journal = {Zeitschrift für Friedens- und Konfliktforschung (ZeFKo)},
    author = {Reinhold, Thomas and Reuter, Christian},
    month = mar,
    year = {2023},
    keywords = {Security, Peace, Projekt-ATHENE-SecUrban, Projekt-TraCe},
    }

  • Katrin Hartwig, Frederic Doell, Christian Reuter (2023)
    The Landscape of User-centered Misinformation Interventions – A Systematic Literature Review
    2023. doi:10.48550/ARXIV.2301.06517
    [BibTeX] [Abstract] [Download PDF]

    Misinformation represent a key challenge for society. User-centered misinformation interventions as digital countermeasures that exert a direct influence on users represent a promising means to deal with the large amounts of information available. While an extensive body of research on this topic exists, researchers are confronted with a diverse research landscape spanning multiple disciplines. This review systematizes the landscape of user-centered misinformation interventions to facilitate knowledge transfer, identify trends, and enable informed decision-making. Over 3,700 scholarly publications were screened and a systematic literature review (N=108) was conducted. A taxonomy was derived regarding intervention design (e.g., binary label), user interaction (active or passive), and timing (e.g., post exposure to misinformation). We provide a structured overview of approaches across multiple disciplines, and derive six overarching challenges for future research.

    @techreport{hartwig_landscape_2023,
    title = {The {Landscape} of {User}-centered {Misinformation} {Interventions} – {A} {Systematic} {Literature} {Review}},
    copyright = {arXiv.org perpetual, non-exclusive license},
    url = {https://arxiv.org/abs/2301.06517},
    abstract = {Misinformation represent a key challenge for society. User-centered misinformation interventions as digital countermeasures that exert a direct influence on users represent a promising means to deal with the large amounts of information available. While an extensive body of research on this topic exists, researchers are confronted with a diverse research landscape spanning multiple disciplines. This review systematizes the landscape of user-centered misinformation interventions to facilitate knowledge transfer, identify trends, and enable informed decision-making. Over 3,700 scholarly publications were screened and a systematic literature review (N=108) was conducted. A taxonomy was derived regarding intervention design (e.g., binary label), user interaction (active or passive), and timing (e.g., post exposure to misinformation). We provide a structured overview of approaches across multiple disciplines, and derive six overarching challenges for future research.},
    institution = {arXiv},
    author = {Hartwig, Katrin and Doell, Frederic and Reuter, Christian},
    year = {2023},
    doi = {10.48550/ARXIV.2301.06517},
    keywords = {HCI, Peace, Projekt-NEBULA},
    }

  • Thea Riebe (2023)
    Technology Assessment of Dual-Use ICTs – How to assess Diffusion, Governance and Design
    Wiesbaden, Germany: Springer Vieweg.
    [BibTeX] [Abstract] [Download PDF]

    Technologies that can be used in military and civilian applications are referred to as dual-use. The dual-use nature of many information and communications technologies (ICTs) raises new questions for research and development for national, international, and human security. Measures to deal with the risks associated with the various dual-use technologies, including proliferation control, design approaches, and policy measures, vary widely. For example, Autonomous Weapon Systems (AWS) have not yet been regulated, while cryptographic products are subject to export and import controls. Innovations in artificial intelligence (AI), robotics, cybersecurity, and automated analysis of publicly available data raise new questions about their respective dual-use risks. Dual-use risks have been systematically discussed so far, especially in the life sciences, which have contributed to the development of methods for assessment and risk management. Dual-use risks arise, among other things, from the fact that safety-critical technologies can be easily disseminated or modified, as well as used as part of a weapon system. Therefore, the development and adaptation of robots and software requires an independent consideration that builds on the insights of related dual-use discourses. Therefore, this dissertation considers the management of such risks in terms of the proliferation, regulation, and design of individual dual-use information technologies. Technology Assessment (TA) is the epistemological framework for this work, bringing together the concepts and approaches of Critical Security Studies (CSS) and Human-Computer Interaction (HCI) to help evaluate and shape dual-use technologies. In order to identify the diffusion of dual-use at an early stage, the dissertation first examines the diffusion of dual-use innovations between civilian and military research in expert networks on LinkedIn, as well as on the basis of AI patents in a patent network. The results show low diffusion and tend to confirm existing studies on diffusion in patent networks. In the following section, the regulation of dual-use technologies is examined in the paper through two case studies. The first study uses a discourse analysis to show the value conflicts with regard to the regulation of autonomous weapons systems using the concept of Meaningful Human Control (MHC), while a second study, as a long-term comparative case study, analyzes the change and consequences of the regulation of strong cryptography in the U.S. as well as the programs of intelligence agencies for mass surveillance. Both cases point to the central role of private companies, both in the production of AWS and as intermediaries for the dissemination of encryption, as well as surveillance intermediaries. Subsequently, the dissertation examines the design of a dual-use technology using an Open Source Intelligence System (OSINT) for cybersecurity. For this purpose, conceptual, empirical, and technical studies are conducted as part of the Value-Sensitive Design (VSD) framework. During the studies, implications for research on and design of OSINT were identified. For example, the representative survey of the German population has shown that transparency of use while reducing mistrust is associated with higher acceptance of such systems. Additionally, it has been shown that data sparsity through the use of expert networks has many positive effects, not only improving the performance of the system, but is also preferable for legal and social reasons. Thus, the work contributes to the understanding of specific dual-use risks of AI, the regulation of AWS and cryptography, and the design of OSINT in cybersecurity. By combining concepts from CSS and participatory design methods in HCI, this work provides an interdisciplinary and multi-method contribution.

    @book{riebe_technology_2023-1,
    address = {Wiesbaden, Germany},
    title = {Technology {Assessment} of {Dual}-{Use} {ICTs} – {How} to assess {Diffusion}, {Governance} and {Design}},
    isbn = {978-3-658-41666-9},
    url = {https://link.springer.com/book/10.1007/978-3-658-41667-6},
    abstract = {Technologies that can be used in military and civilian applications are referred to as dual-use. The dual-use nature of many information and communications technologies (ICTs) raises new questions for research and development for national, international, and human security. Measures to deal with the risks associated with the various dual-use technologies, including proliferation control, design approaches, and policy measures, vary widely. For example, Autonomous Weapon Systems (AWS) have not yet been regulated, while cryptographic products are subject to export and import controls. Innovations in artificial intelligence (AI), robotics, cybersecurity, and automated analysis of publicly available data raise new questions about their respective dual-use risks.
    Dual-use risks have been systematically discussed so far, especially in the life sciences, which have contributed to the development of methods for assessment and risk management. Dual-use risks arise, among other things, from the fact that safety-critical technologies can be easily disseminated or modified, as well as used as part of a weapon system. Therefore, the development and adaptation of robots and software requires an independent consideration that builds on the insights of related dual-use discourses. Therefore, this dissertation considers the management of such risks in terms of the proliferation, regulation, and design of individual dual-use information technologies. Technology Assessment (TA) is the epistemological framework for this work, bringing together the concepts and approaches of Critical Security Studies (CSS) and Human-Computer Interaction (HCI) to help evaluate and shape dual-use technologies.
    In order to identify the diffusion of dual-use at an early stage, the dissertation first examines the diffusion of dual-use innovations between civilian and military research in expert networks on LinkedIn, as well as on the basis of AI patents in a patent network. The results show low diffusion and tend to confirm existing studies on diffusion in patent networks. In the following section, the regulation of dual-use technologies is examined in the paper through two case studies. The first study uses a discourse analysis to show the value conflicts with regard to the regulation of autonomous weapons systems using the concept of Meaningful Human Control (MHC), while a second study, as a long-term comparative case study, analyzes the change and consequences of the regulation of strong cryptography in the U.S. as well as the programs of intelligence agencies for mass surveillance. Both cases point to the central role of private companies, both in the production of AWS and as intermediaries for the dissemination of encryption, as well as surveillance intermediaries. Subsequently, the dissertation examines the design of a dual-use technology using an Open Source Intelligence System (OSINT) for cybersecurity. For this purpose, conceptual, empirical, and technical studies are conducted as part of the Value-Sensitive Design (VSD) framework. During the studies, implications for research on and design of OSINT were identified. For example, the representative survey of the German population has shown that transparency of use while reducing mistrust is associated with higher acceptance of such systems. Additionally, it has been shown that data sparsity through the use of expert networks has many positive effects, not only improving the performance of the system, but is also preferable for legal and social reasons. Thus, the work contributes to the understanding of specific dual-use risks of AI, the regulation of AWS and cryptography, and the design of OSINT in cybersecurity. By combining concepts from CSS and participatory design methods in HCI, this work provides an interdisciplinary and multi-method contribution.},
    publisher = {Springer Vieweg},
    author = {Riebe, Thea},
    year = {2023},
    note = {https://doi.org/10.1007/978-3-658-41667-6},
    keywords = {HCI, Projekt-KontiKat, Peace, Projekt-DualUse, Projekt-CYWARN, Dissertation},
    }

  • Christian Reuter, Marc-André Kaufhold (2023)
    Crisis Informatics
    In: Zheng Yan: Cambridge Handbook of Cyber Behavior. Cambridge University Press.
    [BibTeX] [Abstract]

    In summary, crisis informatics has established itself as an important research area in the ever-increasing complexity of the cyber world. Its importance is further amplified by the time-critical constraints of emergencies and disasters. However, crisis informatics will be challenged to evolve quickly to tackle global-scale emergencies, such as the ongoing COVID-19 pandemic and the increasing risks of natural hazards due to climate change. This chapter seeks to supplement this effort by analyzing interaction, role, information, and perception patterns, which were prevalent in the past 20 years of social media use in crises.

    @incollection{reuter_crisis_2023,
    title = {Crisis {Informatics}},
    isbn = {978-1-00-905708-0},
    abstract = {In summary, crisis informatics has established itself as an important research area in the ever-increasing complexity of the cyber world. Its importance is further amplified by the time-critical constraints of emergencies and disasters. However, crisis informatics will be challenged to evolve quickly to tackle global-scale emergencies, such as the ongoing COVID-19 pandemic and the increasing risks of natural hazards due to climate change. This chapter seeks to supplement this effort by analyzing interaction, role, information, and perception patterns, which were prevalent in the past 20 years of social media use in crises.},
    booktitle = {Cambridge {Handbook} of {Cyber} {Behavior}},
    publisher = {Cambridge University Press},
    author = {Reuter, Christian and Kaufhold, Marc-André},
    editor = {Yan, Zheng},
    year = {2023},
    keywords = {Crisis, HCI, Peace, Projekt-CYWARN, Projekt-ATHENE-FANCY, Projekt-emergenCITY},
    }

  • Christian Reuter, Thea Riebe, Laura Guntrum (2023)
    Science Peace Security ’23: Editorial of the Proceedings of the Interdisciplinary Conference on Technical Peace and Security Research
    In: Christian Reuter, Thea Riebe, Laura Guntrum: Science Peace Security ’23: Proceedings of the Interdisciplinary Conference on Technical Peace and Security Research. Darmstadt, Germany: TUprints, , 9–13. doi:10.26083/tuprints-00024777
    [BibTeX] [Abstract] [Download PDF]

    The conference Science · Peace · Security ’23 took place from September 20 to 22, 2023, at the Georg-Christoph-Lichtenberg-Haus of the Technical University of Darmstadt. It focused on the transformation of technologies, their role in wars and conflicts, and issues related to arms control. The three-day scientific conference welcomed over 110 participants from Germany and speakers from the United Kingdom, Sweden, the USA, Colombia, India, Italy, Switzerland, Norway, the Czech Republic, Iraq, Austria, and the Netherlands. More than 50 different organizations were represented, ensuring interdisciplinary exchange. The program covered a wide range of topics reflecting societal discourses in light of a changing global security landscape. In total, the conference featured 40 presentations, workshops, discussions, and panels that discussed current and future challenges in the field of technical peace and conflict research. Particularly relevant topics included: Artificial Intelligence, Unmanned Weapons Systems, Rocket and Space Technologies (Nuclear) Arms Control, Regulation of Biological and Chemical Weapons, Information Technologies for Surveillance and Oppression of Civilians, (Civilian) Critical Infrastructures, Digital Peacebuilding, Human-Machine Interaction, Dual-Used, Cyber Attacks and Relevant Technology and Security Policies.

    @incollection{reuter_science_2023-1,
    address = {Darmstadt, Germany},
    title = {Science {Peace} {Security} ’23: {Editorial} of the {Proceedings} of the {Interdisciplinary} {Conference} on {Technical} {Peace} and {Security} {Research}},
    url = {https://tuprints.ulb.tu-darmstadt.de/id/eprint/24777},
    abstract = {The conference Science · Peace · Security '23 took place from September 20 to 22, 2023, at the Georg-Christoph-Lichtenberg-Haus of the Technical University of Darmstadt. It focused on the transformation of technologies, their role in wars and conflicts, and issues related to arms control. The three-day scientific conference welcomed over 110 participants from Germany and speakers from the United Kingdom, Sweden, the USA, Colombia, India, Italy, Switzerland, Norway, the Czech Republic, Iraq, Austria, and the Netherlands. More than 50 different organizations were represented, ensuring interdisciplinary exchange. The program covered a wide range of topics reflecting societal discourses in light of a changing global security landscape. In total, the conference featured 40 presentations, workshops, discussions, and panels that discussed current and future challenges in the field of technical peace and conflict research. Particularly relevant topics included: Artificial Intelligence, Unmanned Weapons Systems, Rocket and Space Technologies (Nuclear) Arms Control, Regulation of Biological and Chemical Weapons, Information Technologies for Surveillance and Oppression of Civilians, (Civilian) Critical Infrastructures, Digital Peacebuilding, Human-Machine Interaction, Dual-Used, Cyber Attacks and Relevant Technology and Security Policies.},
    booktitle = {Science {Peace} {Security} ’23: {Proceedings} of the {Interdisciplinary} {Conference} on {Technical} {Peace} and {Security} {Research}},
    publisher = {TUprints},
    author = {Reuter, Christian and Riebe, Thea and Guntrum, Laura},
    editor = {Reuter, Christian and Riebe, Thea and Guntrum, Laura},
    year = {2023},
    doi = {10.26083/tuprints-00024777},
    keywords = {Security, Peace, Projekt-CROSSING, Projekt-TraCe},
    pages = {9--13},
    }

    2022

  • Christian Reuter, Thea Riebe, Jasmin Haunschild, Thomas Reinhold, Stefka Schmid (2022)
    Zur Schnittmenge von Informatik mit Friedens- und Sicherheitsforschung: Erfahrungen aus der interdisziplinären Lehre in der Friedensinformatik
    Zeitschrift für Friedens- und Konfliktforschung (ZeFKo) ;11(2):129–140. doi:10.1007/s42597-022-00078-4
    [BibTeX] [Abstract] [Download PDF]

    Interdisziplinäre Forschung und Lehre zwischen Informatik sowie Friedens- und Sicherheitsforschung ist vor dem Hintergrund, dass Konflikte im Cyberspace nicht mehr eine in der Zukunft liegende Fiktion, sondern eine realitätsnahe Möglichkeit darstellen, unabdingbar. Auch wenn zahlreiche etablierte Lehrveranstaltungen und Lehrbücher in der einen oder anderen Disziplin existieren, gilt dies nicht für deren Schnittmenge. Dieser Beitrag reflektiert die Einführung der in Bezug auf Thematik und Hörer*innenschaft interdisziplinären Lehrveranstaltung „Informationstechnologie für Frieden und Sicherheit“ für Studierende der Informatik, IT-Sicherheit und Wirtschaftsinformatik der Technischen Universität Darmstadt, sowie Friedens- und Konfliktforschung der TU Darmstadt in Kooperation mit der Goethe-Universität Frankfurt. Hierbei werden Herausforderungen und Lösungsansätze der interdisziplinären Lehre dargestellt und die Bedeutung dieser Lehre hervorgehoben.

    @article{reuter_zur_2022,
    title = {Zur {Schnittmenge} von {Informatik} mit {Friedens}- und {Sicherheitsforschung}: {Erfahrungen} aus der interdisziplinären {Lehre} in der {Friedensinformatik}},
    volume = {11},
    issn = {2524-6976},
    url = {https://link.springer.com/content/pdf/10.1007/s42597-022-00078-4.pdf},
    doi = {10.1007/s42597-022-00078-4},
    abstract = {Interdisziplinäre Forschung und Lehre zwischen Informatik sowie Friedens- und Sicherheitsforschung ist vor dem Hintergrund, dass Konflikte im Cyberspace nicht mehr eine in der Zukunft liegende Fiktion, sondern eine realitätsnahe Möglichkeit darstellen, unabdingbar. Auch wenn zahlreiche etablierte Lehrveranstaltungen und Lehrbücher in der einen oder anderen Disziplin existieren, gilt dies nicht für deren Schnittmenge. Dieser Beitrag reflektiert die Einführung der in Bezug auf Thematik und Hörer*innenschaft interdisziplinären Lehrveranstaltung „Informationstechnologie für Frieden und Sicherheit“ für Studierende der Informatik, IT-Sicherheit und Wirtschaftsinformatik der Technischen Universität Darmstadt, sowie Friedens- und Konfliktforschung der TU Darmstadt in Kooperation mit der Goethe-Universität Frankfurt. Hierbei werden Herausforderungen und Lösungsansätze der interdisziplinären Lehre dargestellt und die Bedeutung dieser Lehre hervorgehoben.},
    number = {2},
    journal = {Zeitschrift für Friedens- und Konfliktforschung (ZeFKo)},
    author = {Reuter, Christian and Riebe, Thea and Haunschild, Jasmin and Reinhold, Thomas and Schmid, Stefka},
    month = oct,
    year = {2022},
    keywords = {Security, Peace},
    pages = {129--140},
    }

  • Christian Reuter, Luigi Lo Iacono, Alexander Benlian (2022)
    Special Issue on Usable Security and Privacy with User-Centered Interventions and Transparency Mechanisms – Behaviour & Information Technology (BIT)
    Taylor & Francis.
    [BibTeX] [Download PDF]

    @book{reuter_special_2022,
    title = {Special {Issue} on {Usable} {Security} and {Privacy} with {User}-{Centered} {Interventions} and {Transparency} {Mechanisms} - {Behaviour} \& {Information} {Technology} ({BIT})},
    url = {https://www.tandfonline.com/toc/tbit20/41/10?nav=tocList},
    publisher = {Taylor \& Francis},
    author = {Reuter, Christian and Lo Iacono, Luigi and Benlian, Alexander},
    year = {2022},
    note = {Publication Title: Behaviour \& Information Technology (BIT)},
    keywords = {Crisis, HCI, SocialMedia, UsableSec, A-Paper, Ranking-ImpactFactor, Ranking-CORE-A, Peace},
    }

  • Thomas Reinhold, Christian Reuter (2022)
    Book Review: Artificial Intelligence and The Future of Warfare, James Johnson (2021)
    Zeitschrift für Außen- und Sicherheitspolitik (ZfAS) . doi:10.1007/s12399-022-00918-4
    [BibTeX] [Abstract] [Download PDF]

    Technological and scientific progress, especially the rapid development of information technology (IT), plays a crucial role in peace and security issuesFootnote1. Artificial Intelligence (AI) is one example. AI is a sub-discipline of computer science, dealing with computer systems capable of performing tasks which require human intelligenceFootnote2. According to James Johnson, PhD, Lecturer in Strategic Studies in the Department of Politics & International Relations at the University of Aberdeen and author of the book Artificial Intelligence and the Future of Warfare, the hype around this has made it easy to overstate the opportunities and challenges posed by the development and deployment of AI in the military sphere. The author argues, that “speculations about super intelligent AI or the threat of superman AI to humanity” are entirely disconnected from today’s capabilities of AI. The book aims to address this problem by deciphering “proven capabilities and applications from mere speculation”, with a strong focus on the challenges AI poses to strategic stability, nuclear deterrence and how AI might influence nuclear weapon systems. The author concludes with implications and policy recommendations on how states could manage the escalatory risks posed by AI.

    @article{reinhold_book_2022,
    title = {Book {Review}: {Artificial} {Intelligence} and {The} {Future} of {Warfare}, {James} {Johnson} (2021)},
    url = {https://link.springer.com/article/10.1007/s12399-022-00918-4},
    doi = {10.1007/s12399-022-00918-4},
    abstract = {Technological and scientific progress, especially the rapid development of information technology (IT), plays a crucial role in peace and security issuesFootnote1. Artificial Intelligence (AI) is one example. AI is a sub-discipline of computer science, dealing with computer systems capable of performing tasks which require human intelligenceFootnote2. According to James Johnson, PhD, Lecturer in Strategic Studies in the Department of Politics \& International Relations at the University of Aberdeen and author of the book Artificial Intelligence and the Future of Warfare, the hype around this has made it easy to overstate the opportunities and challenges posed by the development and deployment of AI in the military sphere. The author argues, that “speculations about super intelligent AI or the threat of superman AI to humanity” are entirely disconnected from today’s capabilities of AI. The book aims to address this problem by deciphering “proven capabilities and applications from mere speculation”, with a strong focus on the challenges AI poses to strategic stability, nuclear deterrence and how AI might influence nuclear weapon systems. The author concludes with implications and policy recommendations on how states could manage the escalatory risks posed by AI.},
    journal = {Zeitschrift für Außen- und Sicherheitspolitik (ZfAS)},
    author = {Reinhold, Thomas and Reuter, Christian},
    year = {2022},
    keywords = {Peace, Projekt-ATHENE-SecUrban},
    }

  • Laura Guntrum, Mira Keßler, Jignesh Patel, Anna Varfolomeeva (2022)
    Remotely Accessing the Field and Building Trust with Distant Sources. Perspectives from Journalism Practice for Ethnographic Research
    Global Media Journal – German Edition ;12(1).
    [BibTeX] [Abstract] [Download PDF]

    Journalists and ethnographic researchers, such as anthropologists, sociologists or media scholars, have comparable ways of establishing initial contacts with people from their fields of interest. Due to the ongoing COVID-19 pandemic and consequential travel restrictions and social distancing, it has become increasingly difficult to access a field. Taking inspiration from social anthropologist Ulf Hannerz (2004, p. 226), who compared journalists and anthropologists as “neighboring groups engaged in a somehow parallel pursuit,” this article explores what researchers may learn from practitioners who conduct research without being on-site. Fed by various practical journalists’ experiences, the article aims to investigate how information and communication technologies (ICTs) and digitally mediated methods, such as online search tools and social media, can be used to establish contacts and gain trust remotely. Here, the relevance of these methods for accessing a field in general goes beyond the limitations imposed during the COVID-19 pandemic and can be of interest to all those who face difficulties of field access of any kind. Ultimately, this article reflects on corresponding ethical challenges that may arise while conducting research remotely.

    @article{guntrum_remotely_2022,
    title = {Remotely {Accessing} the {Field} and {Building} {Trust} with {Distant} {Sources}. {Perspectives} from {Journalism} {Practice} for {Ethnographic} {Research}},
    volume = {12},
    url = {https://globalmediajournal.de/index.php/gmj/article/view/220},
    abstract = {Journalists and ethnographic researchers, such as anthropologists, sociologists or media scholars, have comparable ways of establishing initial contacts with people from their fields of interest. Due to the ongoing COVID-19 pandemic and consequential travel restrictions and social distancing, it has become increasingly difficult to access a field. Taking inspiration from social anthropologist Ulf Hannerz (2004, p. 226), who compared journalists and anthropologists as “neighboring groups engaged in a somehow parallel pursuit,” this article explores what researchers may learn from practitioners who conduct research without being on-site. Fed by various practical journalists’ experiences, the article aims to investigate how information and communication technologies (ICTs) and digitally mediated methods, such as online search tools and social media, can be used to establish contacts and gain trust remotely. Here, the relevance of these methods for accessing a field in general goes beyond the limitations imposed during the COVID-19 pandemic and can be of interest to all those who face difficulties of field access of any kind. Ultimately, this article reflects on corresponding ethical challenges that may arise while conducting research remotely.},
    number = {1},
    journal = {Global Media Journal - German Edition},
    author = {Guntrum, Laura and Keßler, Mira and Patel, Jignesh and Varfolomeeva, Anna},
    year = {2022},
    keywords = {Peace, Projekt-TraCe},
    }

  • Thomas Reinhold, Christian Reuter (2022)
    Towards a Cyber Weapons Assessment Model – Assessment of the Technical Features of Malicious Software
    IEEE Transactions on Technology and Society ;3(3):226–239. doi:10.1109/TTS.2021.3131817
    [BibTeX] [Abstract] [Download PDF]

    The revelation of the Stuxnet malware in 2010 shed light on the presence of state actors that are willing and capable of developing and using highly sophisticated, specialized malicious software for their political interests. These tools -often dubbed cyber weapons -are expected to become the next major advancement in weaponry technology. Besides the threats of offensive cyber operations for civil IT systems due to the interconnected nature of the cyberspace, international regulation of cyber weapons is -among other aspects -hindered by the fact that the military development and the strategic and tactical deployment of cyber weapons differ significantly from other weapons technologies. In order to establish measures of cyber arms related control treaties, it is crucial to identify these particular characteristics. Based on this premise, the article analyzes the current perspectives on cyber weapons, identifying their weaknesses of being either based on assumptions about adversarial actors or being applicable only after the usage of a malicious tool. In contrast to these approaches, the article focuses on the specific functional aspects of malware and presents an indicator-based assessment model based on parameters that can be measured prior to the application of malicious software. This enables the categorization of malicious tools as cyber weapons. Besides this, the article aims to introduce thought-provoking impulses with regard to social responsibility in computer science.

    @article{reinhold_towards_2022,
    title = {Towards a {Cyber} {Weapons} {Assessment} {Model} – {Assessment} of the {Technical} {Features} of {Malicious} {Software}},
    volume = {3},
    issn = {2637-6415},
    url = {https://peasec.de/paper/2021/2021_ReinholdReuter_CyberWeapons_IEEETransactionsTechnologySociety.pdf},
    doi = {10.1109/TTS.2021.3131817},
    abstract = {The revelation of the Stuxnet malware in 2010 shed light on the presence of state actors that are willing and capable of developing and using highly sophisticated, specialized malicious software for their political interests. These tools -often dubbed cyber weapons -are expected to become the next major advancement in weaponry technology. Besides the threats of offensive cyber operations for civil IT systems due to the interconnected nature of the cyberspace, international regulation of cyber weapons is -among other aspects -hindered by the fact that the military development and the strategic and tactical deployment of cyber weapons differ significantly from other weapons technologies. In order to establish measures of cyber arms related control treaties, it is crucial to identify these particular characteristics. Based on this premise, the article analyzes the current perspectives on cyber weapons, identifying their weaknesses of being either based on assumptions about adversarial actors or being applicable only after the usage of a malicious tool. In contrast to these approaches, the article focuses on the specific functional aspects of malware and presents an indicator-based assessment model based on parameters that can be measured prior to the application of malicious software. This enables the categorization of malicious tools as cyber weapons. Besides this, the article aims to introduce thought-provoking impulses with regard to social responsibility in computer science.},
    language = {en},
    number = {3},
    journal = {IEEE Transactions on Technology and Society},
    author = {Reinhold, Thomas and Reuter, Christian},
    month = sep,
    year = {2022},
    keywords = {A-Paper, Ranking-ImpactFactor, Peace, AuswahlPeace, Cyberwar, Projekt-ATHENE-SecUrban},
    pages = {226--239},
    }

  • Niklas Schörnig, Thomas Reinhold (2022)
    Armament, Arms Control and Artificial Intelligence – The Janus-faced Nature of Machine Learning in the Military Realm
    1 ed. Springer. doi:https://doi.org/10.1007/978-3-031-11043-6
    [BibTeX] [Abstract] [Download PDF]

    Looking at a variety of armament sectors, the book examines how Artificial Intelligence (AI) impacts the fields of armament and arms control, how existing arms control measures will be affected by AI, and what new approaches based on AI have been or are currently developed. The significant increase in computing power, the increasing reliance on software, and the advent of (narrow) AI and deep-learning algorithms all have the potential to lead to disruptive changes for military operations and warfare, rendering many classical arms control instruments less effective, or even useless. On the other hand, AI might lead to completely new arms control approaches, raising the effectiveness and reliability of new verification measures. To provide a common understanding, the book starts by presenting a general introduction to the state of the art in artificial intelligence and arms control, and how the two topics are interrelated. The second part of the book looks at examples from various fields of weapon technology, including weapons of mass destruction (WMD), conventional armament, and emerging technologies. The final section offers a cross-cutting perspective based on the examples presented in the second part. This volume will appeal to students and scholars of international relations, as well as policy-makers and practitioners interested in a better understanding of peace and security studies in general, and armament and arms control in particular with a strong focus on AI.

    @book{schornig_armament_2022,
    edition = {1},
    title = {Armament, {Arms} {Control} and {Artificial} {Intelligence} - {The} {Janus}-faced {Nature} of {Machine} {Learning} in the {Military} {Realm}},
    isbn = {978-3-031-11043-6},
    url = {https://link.springer.com/book/10.1007/978-3-031-11043-6},
    abstract = {Looking at a variety of armament sectors, the book examines how Artificial Intelligence (AI) impacts the fields of armament and arms control, how existing arms control measures will be affected by AI, and what new approaches based on AI have been or are currently developed.
    The significant increase in computing power, the increasing reliance on software, and the advent of (narrow) AI and deep-learning algorithms all have the potential to lead to disruptive changes for military operations and warfare, rendering many classical arms control instruments less effective, or even useless. On the other hand, AI might lead to completely new arms control approaches, raising the effectiveness and reliability of new verification measures. To provide a common understanding, the book starts by presenting a general introduction to the state of the art in artificial intelligence and arms control, and how the two topics are interrelated. The second part of the book looks at examples from various fields of weapon technology, including weapons of mass destruction (WMD), conventional armament, and emerging technologies. The final section offers a cross-cutting perspective based on the examples presented in the second part.
    This volume will appeal to students and scholars of international relations, as well as policy-makers and practitioners interested in a better understanding of peace and security studies in general, and armament and arms control in particular with a strong focus on AI.},
    language = {en},
    publisher = {Springer},
    author = {Schörnig, Niklas and Reinhold, Thomas},
    year = {2022},
    doi = {https://doi.org/10.1007/978-3-031-11043-6},
    keywords = {Security, Peace, Projekt-ATHENE-SecUrban},
    }

  • Thomas Reinhold (2022)
    Arms Control for Artificial Intelligence
    In: Niklas Schörnig, Thomas ReinholdArmament, Arms Control and Artificial Intelligence – The Janus-faced Nature of Machine Learning in the Military Realm. 1 ed. Springer, , 211–226. doi:https://doi.org/10.1007/978-3-031-11043-6_15
    [BibTeX] [Abstract] [Download PDF]

    With military weapon systems getting more and more improved by artificial intelligence and states competing about the leading role in this development, the question arises how arms control measures can be applied to decrease this equipment spiral. The ongoing debates on cyber weapons have already highlighted the problems with controlling or limiting digital technologies, not to mention the dual use problems. While still in an early stage, this chapter develops possible approaches for AI arms control by considering the different life cycle steps of a typical AI enabled system, based on lessons learned from other arms control approaches. It will discuss the different starting points, their arms control potential as well as its limitations to provide a holistic perspective for necessary further develops and debates.

    @incollection{reinhold_arms_2022,
    edition = {1},
    title = {Arms {Control} for {Artificial} {Intelligence}},
    isbn = {978-3-031-11043-6},
    url = {https://peasec.de/paper/2022/2022_Reinhold_ ArmsControlforAI_AI-Book.pdf},
    abstract = {With military weapon systems getting more and more improved by artificial intelligence and states competing about the leading role in this development, the question arises how arms control measures can be applied to decrease this equipment spiral. The ongoing debates on cyber weapons have already highlighted the problems with controlling or limiting digital technologies, not to mention the dual use problems. While still in an early stage, this chapter develops possible approaches for AI arms control by considering the different life cycle steps of a typical AI enabled system, based on lessons learned from other arms control approaches. It will discuss the different starting points, their arms control potential as well as its limitations to provide a holistic perspective for necessary further develops and debates.},
    language = {en},
    booktitle = {Armament, {Arms} {Control} and {Artificial} {Intelligence} - {The} {Janus}-faced {Nature} of {Machine} {Learning} in the {Military} {Realm}},
    publisher = {Springer},
    author = {Reinhold, Thomas},
    editor = {Schörnig, Niklas and Reinhold, Thomas},
    year = {2022},
    doi = {https://doi.org/10.1007/978-3-031-11043-6_15},
    keywords = {Security, Peace, Projekt-ATHENE-SecUrban},
    pages = {211--226},
    }

  • Thomas Reinhold, Christian Reuter (2022)
    Cyber Weapons and Artificial Intelligence: Impact, Influence and the Challenges for Arms Control
    In: Niklas Schörnig, Thomas ReinholdArmament, Arms Control and Artificial Intelligence – The Janus-faced Nature of Machine Learning in the Military Realm. 1 ed. Springer, , 145–158. doi:https://doi.org/10.1007/978-3-031-11043-6_11
    [BibTeX] [Abstract] [Download PDF]

    As cyber weapons and artificial intelligence technologies share the same technological foundation of bits and bytes, there is a strong trend of connecting both, thus addressing the imminent challenge of cyber weapons of processing, filtering and aggregating huge amounts of digital data in real time into decisions and actions. This chapter will analyze this development and highlight the increasing tendency towards AI enabled autonomous decisions in defensive as well as offensive cyber weapons, the arising additional challenges for attributing cyberattacks and the problems for developing arms control measures for this “technology fusion”. However, the article also ventures an outlook how AI methods can help to mitigate these challenges if applied for arms control measures itself.

    @incollection{reinhold_cyber_2022,
    edition = {1},
    title = {Cyber {Weapons} and {Artificial} {Intelligence}: {Impact}, {Influence} and the {Challenges} for {Arms} {Control}},
    isbn = {978-3-031-11043-6},
    url = {https://peasec.de/paper/2022/2022_ReinholdReuter_CyberWeaponsAIImpactInfluenceChallenges_AI-Book.pdf},
    abstract = {As cyber weapons and artificial intelligence technologies share the same technological foundation of bits and bytes, there is a strong trend of connecting both, thus addressing the imminent challenge of cyber weapons of processing, filtering and aggregating huge amounts of digital data in real time into decisions and actions. This chapter will analyze this development and highlight the increasing tendency towards AI enabled autonomous decisions in defensive as well as offensive cyber weapons, the arising additional challenges for attributing cyberattacks and the problems for developing arms control measures for this “technology fusion”. However, the article also ventures an outlook how AI methods can help to mitigate these challenges if applied for arms control measures itself.},
    language = {en},
    booktitle = {Armament, {Arms} {Control} and {Artificial} {Intelligence} - {The} {Janus}-faced {Nature} of {Machine} {Learning} in the {Military} {Realm}},
    publisher = {Springer},
    author = {Reinhold, Thomas and Reuter, Christian},
    editor = {Schörnig, Niklas and Reinhold, Thomas},
    year = {2022},
    doi = {https://doi.org/10.1007/978-3-031-11043-6_11},
    keywords = {Security, Peace, Projekt-ATHENE-SecUrban},
    pages = {145--158},
    }

  • Niklas Schörnig, Thomas Reinhold (2022)
    Introduction
    In: Niklas Schörnig, Thomas ReinholdArmament, Arms Control and Artificial Intelligence – The Janus-faced Nature of Machine Learning in the Military Realm. 1 ed. Springer, , 1–9. doi:https://doi.org/10.1007/978-3-031-11043-6_1
    [BibTeX] [Abstract] [Download PDF]

    In 1987, Allan Din published the seminal book “Arms and Artificial Intelligence,” in which he argued that the future military use of AI would be a double-edged sword. Warning about control failures and accidental war on one hand, Din also pointed out the potential of AI to enhance arms control. 35 years later, what was a niche technology in Din’s day has since become one of the most influential technologies in both the civilian and military sectors. In addition, AI has evolved from sophisticated yet deterministic expert systems to machine learning algorithms. Today, AI is about to be introduced in almost every branch of the military, with a variety of implications for arms control. This book reflects the work of the individual authors and identifies common themes and areas where AI can be used for the greater good or where its use calls for particular vigilance. It offers an essential primer for interested readers, while also encouraging experts from the arms control community to dig more deeply into the issues.

    @incollection{schornig_introduction_2022,
    edition = {1},
    title = {Introduction},
    isbn = {978-3-031-11043-6},
    url = {http://www.peasec.de/paper/2022/2022_SchoernigReinhold_Intro_AI-Book.pdf},
    abstract = {In 1987, Allan Din published the seminal book “Arms and Artificial Intelligence,” in which he argued that the future military use of AI would be a double-edged sword. Warning about control failures and accidental war on one hand, Din also pointed out the potential of AI to enhance arms control. 35 years later, what was a niche technology in Din’s day has since become one of the most influential technologies in both the civilian and military sectors. In addition, AI has evolved from sophisticated yet deterministic expert systems to machine learning algorithms. Today, AI is about to be introduced in almost every branch of the military, with a variety of implications for arms control. This book reflects the work of the individual authors and identifies common themes and areas where AI can be used for the greater good or where its use calls for particular vigilance. It offers an essential primer for interested readers, while also encouraging experts from the arms control community to dig more deeply into the issues.},
    language = {en},
    booktitle = {Armament, {Arms} {Control} and {Artificial} {Intelligence} - {The} {Janus}-faced {Nature} of {Machine} {Learning} in the {Military} {Realm}},
    publisher = {Springer},
    author = {Schörnig, Niklas and Reinhold, Thomas},
    editor = {Schörnig, Niklas and Reinhold, Thomas},
    year = {2022},
    doi = {https://doi.org/10.1007/978-3-031-11043-6_1},
    keywords = {Security, Peace, Projekt-ATHENE-SecUrban},
    pages = {1--9},
    }

  • Sabrina Gabel, Lilian Reichert, Christian Reuter (2022)
    Discussing Conflict in Social Media – The Use of Twitter in the Jammu and Kashmir Conflict
    Media, War & Conflict ;15(4):1–26.
    [BibTeX] [Abstract] [Download PDF]

    Social media have come to play a vital role not only in our everyday lives, but also in times of conflict and crisis such as natural disasters or civil wars. Recent research has highlighted, on the one hand, the use of social media as a means of recruitment by terrorists and, on the other hand, the use of Facebook, Twitter etc. to gain the support of the population during insurgencies. This article conducts a qualitative content analysis of content on Twitter concerning the conflict in the Jammu and Kashmir region. The tweets following the death of a popular militant, Burhan Wani, cover three different themes: (1) criticism of intellectuals, (2) Burhan Wani’s impact on the conflict, and (3) tweets referring to the conflict itself. Generally, people use Twitter to make their own point of view clear to others and discredit the opposing party, at the same time tweets are reflecting the antagonism between the two parties to the conflict, India and Pakistan. The sample of tweets reflects the lack of awareness among people in the region regarding the motivations of the new generation of militancy emerging in Kashmir after 1990.

    @article{gabel_discussing_2022,
    title = {Discussing {Conflict} in {Social} {Media} – {The} {Use} of {Twitter} in the {Jammu} and {Kashmir} {Conflict}},
    volume = {15},
    url = {https://journals.sagepub.com/doi/full/10.1177/1750635220970997},
    abstract = {Social media have come to play a vital role not only in our everyday lives, but also in times of conflict and crisis such as natural disasters or civil wars. Recent research has highlighted, on the one hand, the use of social media as a means of recruitment by terrorists and, on the other hand, the use of Facebook, Twitter etc. to gain the support of the population during insurgencies. This article conducts a qualitative content analysis of content on Twitter concerning the conflict in the Jammu and Kashmir region. The tweets following the death of a popular militant, Burhan Wani, cover three different themes: (1) criticism of intellectuals, (2) Burhan Wani's impact on the conflict, and (3) tweets referring to the conflict itself. Generally, people use Twitter to make their own point of view clear to others and discredit the opposing party, at the same time tweets are reflecting the antagonism between the two parties to the conflict, India and Pakistan. The sample of tweets reflects the lack of awareness among people in the region regarding the motivations of the new generation of militancy emerging in Kashmir after 1990.},
    number = {4},
    journal = {Media, War \& Conflict},
    author = {Gabel, Sabrina and Reichert, Lilian and Reuter, Christian},
    year = {2022},
    keywords = {Crisis, HCI, SocialMedia, Ranking-ImpactFactor, Peace, Projekt-ATHENE-SecUrban},
    pages = {1--26},
    }

  • Stefka Schmid, Thea Riebe, Christian Reuter (2022)
    Dual-Use and Trustworthy? A Mixed Methods Analysis of AI Diffusion between Civilian and Defense R&D
    Science and Engineering Ethics ;28(12):1–23. doi:10.1007/s11948-022-00364-7
    [BibTeX] [Abstract] [Download PDF]

    Artificial Intelligence (AI) seems to be impacting all industry sectors, while becoming a motor for innovation. The diffusion of AI from the civilian sector to the defense sector, and AI’s dual-use potential has drawn attention from security and ethics scholars. With the publication of the ethical guideline Trustworthy AI by the European Union (EU), normative questions on the application of AI have been further evaluated. In order to draw conclusions on Trustworthy AI as a point of reference for responsible research and development (R&D), we approach the diffusion of AI across both civilian and military spheres in the EU. We capture the extent of technological diffusion and derive European and German patent citation networks. Both networks indicate a low degree of diffusion of AI between civilian and defense sectors. A qualitative investigation of project descriptions of a research institute’s work in both civilian and military fields shows that military AI applications stress accuracy or robustness, while civilian AI reflects a focus on human-centric values. Our work represents a first approach by linking processes of technology diffusion with normative evaluations of R&D.

    @article{schmid_dual-use_2022,
    title = {Dual-{Use} and {Trustworthy}? {A} {Mixed} {Methods} {Analysis} of {AI} {Diffusion} between {Civilian} and {Defense} {R}\&{D}},
    volume = {28},
    url = {https://peasec.de/paper/2022/2022_SchmidRiebeReuter_DualUseandTrustworthy_ScienceEngineeringEthics.pdf},
    doi = {10.1007/s11948-022-00364-7},
    abstract = {Artificial Intelligence (AI) seems to be impacting all industry sectors, while becoming a motor for innovation. The diffusion of AI from the civilian sector to the defense sector, and AI’s dual-use potential has drawn attention from security and ethics scholars. With the publication of the ethical guideline Trustworthy AI by the European Union (EU), normative questions on the application of AI have been further evaluated. In order to draw conclusions on Trustworthy AI as a point of reference for responsible research and development (R\&D), we approach the diffusion of AI across both civilian and military spheres in the EU. We capture the extent of technological diffusion and derive European and German patent citation networks. Both networks indicate a low degree of diffusion of AI between civilian and defense sectors. A qualitative investigation of project descriptions of a research institute’s work in both civilian and military fields shows that military AI applications stress accuracy or robustness, while civilian AI reflects a focus on human-centric values. Our work represents a first approach by linking processes of technology diffusion with normative evaluations of R\&D.},
    number = {12},
    journal = {Science and Engineering Ethics},
    author = {Schmid, Stefka and Riebe, Thea and Reuter, Christian},
    year = {2022},
    keywords = {A-Paper, Ranking-ImpactFactor, Projekt-KontiKat, Peace, AuswahlPeace, Projekt-CYWARN},
    pages = {1--23},
    }

  • Jasmin Haunschild, Marc-André Kaufhold, Christian Reuter (2022)
    Cultural Violence and Fragmentation on Social Media: Interventions and Countermeasures by Humans and Social Bots
    In: Myriam Dunn Cavelty, Andreas Wenger: Cyber Security Politics: Socio-Technological Transformations and Political Fragmentation. Routledge, , 48–63.
    [BibTeX] [Abstract] [Download PDF]

    Mobile technologies and social media services are among the socio-technological innovations that have an enormous impact transforming modern culture and political processes. Social media are often defined as a “group of internet-based applications […] that allow the creation and exchange of user-generated content” (Kaplan and Haenlein 2010). Shaping opinions, politics, participation, and protest (Wulf et al. 2013), they are used by citizens for news consumption and social exchange (Robinson et al. 2017); by journalists for reporting, analyzing, and collecting information (Stieglitz et al. 2018a); and by organizations to monitor crises, emergencies, customer feedback, and sentiment, among others (Haunschild et al. 2020). Large-scale international events, such as the 2010 Arab Spring, showcased the potential of socio-technological transformations: Citizens were not passive victims but active and autonomous participants utilizing social media to coordinate protest and for crisis response (Reuter and Kaufhold 2018). However, in other cases, citizens’ activities coordinated via social media also increased the complexity of tasks and pressure for formal authorities, since the lack of state control has not had only empowering or benign effects. Instead, on social media, false information spreads fast and it is easy for groups to find an audience there, either to enhance their profit or to target vulnerable groups with dangerous ideology.

    @incollection{haunschild_cultural_2022,
    title = {Cultural {Violence} and {Fragmentation} on {Social} {Media}: {Interventions} and {Countermeasures} by {Humans} and {Social} {Bots}},
    isbn = {978-0-367-62674-7},
    url = {https://peasec.de/paper/2022/2022_HaunschildKaufholdReuter_SocialMediaAndFragmentation_Routledge.pdf},
    abstract = {Mobile technologies and social media services are among the socio-technological innovations that have an enormous impact transforming modern culture and political processes. Social media are often defined as a “group of internet-based applications […] that allow the creation and exchange of user-generated content” (Kaplan and Haenlein 2010). Shaping opinions, politics, participation, and protest (Wulf et al. 2013), they are used by citizens for news consumption and social exchange (Robinson et al. 2017); by journalists for reporting, analyzing, and collecting information (Stieglitz et al. 2018a); and by organizations to monitor crises, emergencies, customer feedback, and sentiment, among others (Haunschild et al. 2020). Large-scale international events, such as the 2010 Arab Spring, showcased the potential of socio-technological transformations: Citizens were not passive victims but active and autonomous participants utilizing social media to coordinate protest and for crisis response (Reuter and Kaufhold 2018). However, in other cases, citizens’ activities coordinated via social media also increased the complexity of tasks and pressure for formal authorities, since the lack of state control has not had only empowering or benign effects. Instead, on social media, false information spreads fast and it is easy for groups to find an audience there, either to enhance their profit or to target vulnerable groups with dangerous ideology.},
    booktitle = {Cyber {Security} {Politics}: {Socio}-{Technological} {Transformations} and {Political} {Fragmentation}},
    publisher = {Routledge},
    author = {Haunschild, Jasmin and Kaufhold, Marc-André and Reuter, Christian},
    editor = {Cavelty, Myriam Dunn and Wenger, Andreas},
    year = {2022},
    keywords = {Crisis, SocialMedia, Peace, Projekt-ATHENE-SecUrban, Projekt-CYWARN, Projekt-emergenCITY},
    pages = {48--63},
    }

  • Laura Guntrum (2022)
    Justice-oriented Research in Peace and Conflict Studies in Times of Social Distancing
    Mensch und Computer – Workshopband Darmstadt. doi:10.18420/muc2022-mci-ws10-216
    [BibTeX] [Abstract] [Download PDF]

    Not only since the COVID-19 pandemic, many research processes had already been increasingly digitized to maintain global ex-change of information efficiently. For years, scientific empirical studies have been conducted in politically sensitive contexts using digitally mediated methods, entailing numerous risks as well as potentials. One goal of digital research is to also capture marginal-ized voices. With emerging risks related to digital research, such as digital surveillance and social media monitoring by adversaries (e.g., the military in Myanmar), research needs to be more thoughtfully conducted. Considering research ethics, an evolving discrepancy between security measures and values of social jus-tice, such as accessibility and representation, appears as most data-secure applications are not used widely and offers such as “Free Basics” entice people to use rather data-unsecure applica-tions. Reflecting on this existing discrepancy in ethical require-ments, I illustrate challenges of the German research context re-lated to digitally conducted research focusing on overt conflictive social contexts.

    @inproceedings{guntrum_justice-oriented_2022,
    address = {Darmstadt},
    series = {Mensch und {Computer} 2022 - {Workshopband}},
    title = {Justice-oriented {Research} in {Peace} and {Conflict} {Studies} in {Times} of {Social} {Distancing}},
    url = {https://dl.gi.de/handle/20.500.12116/39092},
    doi = {10.18420/muc2022-mci-ws10-216},
    abstract = {Not only since the COVID-19 pandemic, many research processes had already been increasingly digitized to maintain global ex-change of information efficiently. For years, scientific empirical studies have been conducted in politically sensitive contexts using digitally mediated methods, entailing numerous risks as well as potentials. One goal of digital research is to also capture marginal-ized voices. With emerging risks related to digital research, such as digital surveillance and social media monitoring by adversaries (e.g., the military in Myanmar), research needs to be more thoughtfully conducted. Considering research ethics, an evolving discrepancy between security measures and values of social jus-tice, such as accessibility and representation, appears as most data-secure applications are not used widely and offers such as “Free Basics” entice people to use rather data-unsecure applica-tions. Reflecting on this existing discrepancy in ethical require-ments, I illustrate challenges of the German research context re-lated to digitally conducted research focusing on overt conflictive social contexts.},
    language = {en},
    booktitle = {Mensch und {Computer} - {Workshopband}},
    publisher = {Gesellschaft für Informatik},
    author = {Guntrum, Laura},
    year = {2022},
    keywords = {Security, Peace, Projekt-ATHENE-FANCY, Projekt-TraCe},
    }

  • Oliver Meier, Michael Brzoska, Anna-Katharina Ferl, Sascha Hach, Markus Bayer (2), Max Mutschler, Berenike Prem, Thomas Reinhold, Stefka Schmid, Matthias Schwarz (2022)
    Für eine umfassende, globale und aktive Abrüstungs- und Rüstungskontrollpolitik
    2022.
    [BibTeX] [Abstract] [Download PDF]

    Eine vorausschauende und global ausgerichtete deutsche Rüstungskontrollpolitik hat enorme sicherheitspolitische Potenziale. Denn: Eine aktive Rüstungskontrollpolitik Deutschlands kann helfen, die Gefahren der weltweiten Aufrüstung und regionaler Rüstungs- und Eskalationsdynamiken zu mindern. Rüstungskontrollpolitische Instrumente müssen jede Vereinbarung über das Ende des Kriegs gegen die Ukraine stützen. Vereinbarungen über die Nichtverbreitung von Massenvernichtungswaffen bestimmen Regeln, die den militärischen Missbrauch von dual use-Technologien verhindern können. Abrüstung und Rüstungskontrolle mindern schon jetzt menschliches Leid in anderen Weltregionen. Abrüstung kann dazu beitragen, das vorherrschende und im Krieg gegen die Ukraine zunehmend unberechenbare Abschreckungsparadigma zu überwinden. Eine engagierte Rüstungskontrollpolitik fügt sich dann in die feministische Außenpolitik der Bundesregierung, wenn sie partizipativ und restriktiv angelegt ist und negative Folgen von Aufrüstung und Krieg besonders für Frauen und marginalisierte Gruppen reduziert. Um diese sicherheitspolitischen Potenziale auszuschöpfen, sollte die Nationale Sicherheitsstrategie Eckpunkte einer eigenständigen deutschen Rüstungskontrollpolitik beschreiben. Drei Prinzipien können eine solche Politik anleiten.

    @techreport{meier_fur_2022,
    title = {Für eine umfassende, globale und aktive {Abrüstungs}- und {Rüstungskontrollpolitik}},
    url = {https://fourninesecurity.de/2022/11/10/fuer-eine-umfassende-globale-und-aktive-abruestungs-und-ruestungskontrollpolitik},
    abstract = {Eine vorausschauende und global ausgerichtete deutsche Rüstungskontrollpolitik hat enorme sicherheitspolitische Potenziale. Denn: Eine aktive Rüstungskontrollpolitik Deutschlands kann helfen, die Gefahren der weltweiten Aufrüstung und regionaler Rüstungs- und Eskalationsdynamiken zu mindern. Rüstungskontrollpolitische Instrumente müssen jede Vereinbarung über das Ende des Kriegs gegen die Ukraine stützen. Vereinbarungen über die Nichtverbreitung von Massenvernichtungswaffen bestimmen Regeln, die den militärischen Missbrauch von dual use-Technologien verhindern können. Abrüstung und Rüstungskontrolle mindern schon jetzt menschliches Leid in anderen Weltregionen. Abrüstung kann dazu beitragen, das vorherrschende und im Krieg gegen die Ukraine zunehmend unberechenbare Abschreckungsparadigma zu überwinden. Eine engagierte Rüstungskontrollpolitik fügt sich dann in die feministische Außenpolitik der Bundesregierung, wenn sie partizipativ und restriktiv angelegt ist und negative Folgen von Aufrüstung und Krieg besonders für Frauen und marginalisierte Gruppen reduziert.
    Um diese sicherheitspolitischen Potenziale auszuschöpfen, sollte die Nationale Sicherheitsstrategie Eckpunkte einer eigenständigen deutschen Rüstungskontrollpolitik beschreiben. Drei Prinzipien können eine solche Politik anleiten.},
    language = {de},
    author = {Meier, Oliver and Brzoska, Michael and Ferl, Anna-Katharina and Hach, Sascha and Bayer (2), Markus and Mutschler, Max and Prem, Berenike and Reinhold, Thomas and Schmid, Stefka and Schwarz, Matthias},
    year = {2022},
    keywords = {Peace},
    }

  • Anja P. Jakobi, Jasmin Haunschild (2022)
    Transnational organisierte Kriminalität und internationale Politik
    In: Frank Sauer, Luba von Hauff, Carlo Masala: Handbuch Internationale Beziehungen. Wiesbaden: VS Verlag für Sozialwissenschaften, , 1–25. doi:10.1007/978-3-531-19954-2_40-4
    [BibTeX] [Abstract] [Download PDF]

    Der Beitrag analysiert die unterschiedlichen Formen und Voraussetzungen der Bekämpfung, Verfolgung und Prävention transnational organisierter Kriminalität in der internationalen Politik. Dazu führen wir zunächst in die Definition und die Grundlagen in diesem Bereich ein, auch im Hinblick auf eine Einordnung in Debatten der Internationalen Beziehungen, bevor einzelne Politikbereiche – Drogenhandel, Menschenhandel und -schmuggel, Waffenhandel, Geldwäsche und Terrorismusfinanzierung, Konfliktmineralien – vorgestellt werden. Die Schlussfolgerungen bieten einen Ausblick in weitere Teilbereiche und erläutern die Rolle von staatlichen und nicht-staatlichen Akteuren in der Bekämpfung transnational organisierter Kriminalität.

    @incollection{jakobi_transnational_2022,
    address = {Wiesbaden},
    title = {Transnational organisierte {Kriminalität} und internationale {Politik}},
    isbn = {978-3-531-19954-2},
    url = {https://doi.org/10.1007/978-3-531-19954-2_40-4},
    abstract = {Der Beitrag analysiert die unterschiedlichen Formen und Voraussetzungen der Bekämpfung, Verfolgung und Prävention transnational organisierter Kriminalität in der internationalen Politik. Dazu führen wir zunächst in die Definition und die Grundlagen in diesem Bereich ein, auch im Hinblick auf eine Einordnung in Debatten der Internationalen Beziehungen, bevor einzelne Politikbereiche – Drogenhandel, Menschenhandel und -schmuggel, Waffenhandel, Geldwäsche und Terrorismusfinanzierung, Konfliktmineralien – vorgestellt werden. Die Schlussfolgerungen bieten einen Ausblick in weitere Teilbereiche und erläutern die Rolle von staatlichen und nicht-staatlichen Akteuren in der Bekämpfung transnational organisierter Kriminalität.},
    booktitle = {Handbuch {Internationale} {Beziehungen}},
    publisher = {VS Verlag für Sozialwissenschaften},
    author = {Jakobi, Anja P. and Haunschild, Jasmin},
    editor = {Sauer, Frank and von Hauff, Luba and Masala, Carlo},
    year = {2022},
    doi = {10.1007/978-3-531-19954-2_40-4},
    keywords = {Peace},
    pages = {1--25},
    }

  • Stefka Schmid (2022)
    Trustworthy and Explainable: A European Vision of (Weaponised) Artificial Intelligence
    Die Friedens-Warte / Journal of International Peace and Organization (JIPO) ;95(3-4):290–315. doi:10.35998/fw-2022-0013
    [BibTeX] [Abstract] [Download PDF]

    The European Union (EU) has undertaken policies which address the research and development of artificial intelligence (AI). In light of debates of technology assessment which focus on risks for humans and questions of control of AI, the EU has propagated an ethical, human-centred approach of the application of AI. It is important to identify how the EU envisions AI as this may guide emerging norms in AI governance and today’s research and development of (weaponised) AI. Building on works of Human-Computer Interaction (HCI), this work derives the actor’s understanding of human-AI interaction, including conceptualisations of explainability, interpretability, and risks. Analysis of EU documents on the implementation of AI as a general-purpose technology and for military application reveals that explainability and risk identification are crucial elements for trust, which itself is a necessary component in the uptake of AI. Interdisciplinary approaches allow for a more detailed understanding of actors’ fundamental views on human control of AI, which further contributes to debates on technology assessment in professionalised political contexts.

    @article{schmid_trustworthy_2022,
    title = {Trustworthy and {Explainable}: {A} {European} {Vision} of ({Weaponised}) {Artificial} {Intelligence}},
    volume = {95},
    url = {https://elibrary.bwv-verlag.de/article/10.35998/fw-2022-0013},
    doi = {10.35998/fw-2022-0013},
    abstract = {The European Union (EU) has undertaken policies which address the research and development of artificial intelligence (AI). In light of debates of technology assessment which focus on risks for humans and questions of control of AI, the EU has propagated an ethical, human-centred approach of the application of AI. It is important to identify how the EU envisions AI as this may guide emerging norms in AI governance and today’s research and development of (weaponised) AI. Building on works of Human-Computer Interaction (HCI), this work derives the actor’s understanding of human-AI interaction, including conceptualisations of explainability, interpretability, and risks. Analysis of EU documents on the implementation of AI as a general-purpose technology and for military application reveals that explainability and risk identification are crucial elements for trust, which itself is a necessary component in the uptake of AI. Interdisciplinary approaches allow for a more detailed understanding of actors’ fundamental views on human control of AI, which further contributes to debates on technology assessment in professionalised political contexts.},
    number = {3-4},
    journal = {Die Friedens-Warte / Journal of International Peace and Organization (JIPO)},
    author = {Schmid, Stefka},
    year = {2022},
    keywords = {Peace, Projekt-ATHENE-SecUrban, Projekt-TraCe},
    pages = {290--315},
    }

  • Christian Reuter, Malte Göttsche, Friederike Frieß, Pierre Thielbörger, Johannes Vüllers (2022)
    Special Issue on Between Destabilization and Enabling Resilience: Perspectives from the Technical Sciences, Social Sciences, and Law – Die Friedens-Warte / Journal of International Peace and Organization (JIPO)
    Berliner Wissenschafts-Verlag.
    [BibTeX] [Abstract] [Download PDF]

    In this special issue of the “Journal of International Peace and Organization”, we approach the topic of resilience from the different perspectives of the technical sciences (with a focus on new technologies), the social sciences, and law. In our view such interdisciplinary exchange of views within the research field of peace and conflict research is highly important, yet at the same time all too rare. Today’s international security environment is marked by the demise of the classical arms control architecture, the return of great power politics, and eroding trust among states. New developments in military and dual use technology as well as weapon modernization programs add complexity to any effort towards peace and security. The importance of dealing with these issues in an informed manner has been widely accepted since Russia’s invasion of Ukraine in February 2022. The first part of this special issue is based on the interdisciplinary conference Science Peace Security 2021 in Aachen, which examined the impacts of new technologies on resilience. It sought concepts on how a more resilient security environment can be achieved through scientific contributions and policy measures towards crisis resolution, risk assessments, confidence-building, and arms limitations. Nuclear, biological, chemical, and space threats as well as developments in information technology such as cyber or artificial intelligence issues, and any other relevant technical fields, were examined.

    @book{reuter_special_2022-1,
    title = {Special {Issue} on {Between} {Destabilization} and {Enabling} {Resilience}: {Perspectives} from the {Technical} {Sciences}, {Social} {Sciences}, and {Law} - {Die} {Friedens}-{Warte} / {Journal} of {International} {Peace} and {Organization} ({JIPO})},
    volume = {95},
    url = {https://elibrary.bwv-verlag.de/journal/fw/95/3-4},
    abstract = {In this special issue of the “Journal of International Peace and Organization”, we approach the topic of resilience from the different perspectives of the technical sciences (with a focus on new technologies), the social sciences, and law. In our view such interdisciplinary exchange of views within the research field of peace and conflict research is highly important, yet at the same time all too rare.
    Today’s international security environment is marked by the demise of the classical arms control architecture, the return of great power politics, and eroding trust among states. New developments in military and dual use technology as well as weapon modernization programs add complexity to any effort towards peace and security. The importance of dealing with these issues in an informed manner has been widely accepted since Russia’s invasion of Ukraine in February 2022.
    The first part of this special issue is based on the interdisciplinary conference Science Peace Security 2021 in Aachen, which examined the impacts of new technologies on resilience. It sought concepts on how a more resilient security environment can be achieved through scientific contributions and policy measures towards crisis resolution, risk assessments, confidence-building, and arms limitations. Nuclear, biological, chemical, and space threats as well as developments in information technology such as cyber or artificial intelligence issues, and any other relevant technical fields, were examined.},
    publisher = {Berliner Wissenschafts-Verlag},
    author = {Reuter, Christian and Göttsche, Malte and Frieß, Friederike and Thielbörger, Pierre and Vüllers, Johannes},
    year = {2022},
    keywords = {Peace},
    }

  • Christian Reuter, Malte Göttsche, Friederike Frieß, Pierre Thielbörger, Johannes Vüllers (2022)
    Between Destabilization and Enabling Resilience: Perspectives from the Technical Sciences, Political Science and Law
    Die Friedens-Warte / Journal of International Peace and Organization (JIPO) ;95(3-4):244–246.
    [BibTeX] [Abstract] [Download PDF]

    In this special issue of the “Journal of International Peace and Organization”, we approach the topic of resilience from the different perspectives of the technical sciences (with a focus on new technologies), the social sciences, and law. In our view such interdisciplinary exchange of views within the research field of peace and conflict research is highly important, yet at the same time all too rare. Today’s international security environment is marked by the demise of the classical arms control architecture, the return of great power politics, and eroding trust among states. New developments in military and dual use technology as well as weapon modernization programs add complexity to any effort towards peace and security. The importance of dealing with these issues in an informed manner has been widely accepted since Russia’s invasion of Ukraine in February 2022. The first part of this special issue is based on the interdisciplinary conference Science Peace Security 2021 in Aachen, which examined the impacts of new technologies on resilience. It sought concepts on how a more resilient security environment can be achieved through scientific contributions and policy measures towards crisis resolution, risk assessments, confidence-building, and arms limitations. Nuclear, biological, chemical, and space threats as well as developments in information technology such as cyber or artificial intelligence issues, and any other relevant technical fields, were examined.

    @article{reuter_between_2022,
    title = {Between {Destabilization} and {Enabling} {Resilience}: {Perspectives} from the {Technical} {Sciences}, {Political} {Science} and {Law}},
    volume = {95},
    url = {https://elibrary.bwv-verlag.de/article/99.105025/fw202203024401},
    abstract = {In this special issue of the “Journal of International Peace and Organization”, we approach the topic of resilience from the different perspectives of the technical sciences (with a focus on new technologies), the social sciences, and law. In our view such interdisciplinary exchange of views within the research field of peace and conflict research is highly important, yet at the same time all too rare.
    Today’s international security environment is marked by the demise of the classical arms control architecture, the return of great power politics, and eroding trust among states. New developments in military and dual use technology as well as weapon modernization programs add complexity to any effort towards peace and security. The importance of dealing with these issues in an informed manner has been widely accepted since Russia’s invasion of Ukraine in February 2022.
    The first part of this special issue is based on the interdisciplinary conference Science Peace Security 2021 in Aachen, which examined the impacts of new technologies on resilience. It sought concepts on how a more resilient security environment can be achieved through scientific contributions and policy measures towards crisis resolution, risk assessments, confidence-building, and arms limitations. Nuclear, biological, chemical, and space threats as well as developments in information technology such as cyber or artificial intelligence issues, and any other relevant technical fields, were examined.},
    number = {3-4},
    journal = {Die Friedens-Warte / Journal of International Peace and Organization (JIPO)},
    author = {Reuter, Christian and Göttsche, Malte and Frieß, Friederike and Thielbörger, Pierre and Vüllers, Johannes},
    year = {2022},
    keywords = {Peace},
    pages = {244--246},
    }

  • Christian Reuter, Malte Göttsche, Friederike Frieß, Pierre Thielbörger, Johannes Vüllers (2022)
    Zwischen Destabilisierung und der Ermöglichung von Resilienz: Perspektiven aus den Technikwissenschaften, den Sozialwissenschaften und den Rechtswissenschaften
    Die Friedens-Warte / Journal of International Peace and Organization (JIPO) ;95(3-4):241–243.
    [BibTeX] [Abstract] [Download PDF]

    In dieser Sonderausgabe von „Die Friedens-Warte“ nähern wir uns dem Thema Resilienz aus den unterschiedlichen Perspektiven der Technikwissenschaften (mit einem Schwerpunkt auf neuen Technologien), den Sozialwissenschaften und den Rechtswissenschaften. Ein solcher interdisziplinärer Austausch innerhalb des Forschungsfeldes der Friedens- und Konfliktforschung ist aus unserer Sicht immens wichtig, zurzeit jedoch noch allzu rar. Das heutige internationale Sicherheitsumfeld ist gekennzeichnet durch den Niedergang der klassischen Rüstungskontrollarchitektur, die Rückkehr der Großmachtpolitik und das schwindende Vertrauen zwischen den Staaten. Neue Entwicklungen im Bereich der Militärtechnologie und der Technologien mit Doppelverwendungsfähigkeit sowie Modernisierungsprogramme für Waffen machen die Bemühungen um Frieden und Sicherheit noch komplexer. Seit dem Einmarsch Russlands in die Ukraine im Februar 2022 ist allgemein anerkannt, wie wichtig es ist, sich mit diesen Fragen sachkundig auseinanderzusetzen. Der erste Teil dieser Sonderausgabe basiert auf der interdisziplinären Konferenz Science Peace Security 2021 in Aachen, die sich mit den Auswirkungen neuer Technologien auf die Resilienz befasste. Gesucht wurden Konzepte zur Erreichung eines widerstandsfähigeren Sicherheitsumfeldes durch wissenschaftliche Beiträge und politische Maßnahmen zur Krisenbewältigung, Risikobewertung, Vertrauensbildung und Rüstungsbegrenzung. Untersucht wurden nukleare, biologische, chemische und weltraumgestützte Bedrohungen sowie Entwicklungen in der Informationstechnologie, wie z. B. Cyber- oder künstliche Intelligenz, sowie weitere relevante technischen Bereiche.

    @article{reuter_zwischen_2022,
    title = {Zwischen {Destabilisierung} und der {Ermöglichung} von {Resilienz}: {Perspektiven} aus den {Technikwissenschaften}, den {Sozialwissenschaften} und den {Rechtswissenschaften}},
    volume = {95},
    url = {https://elibrary.bwv-verlag.de/article/99.105025/fw202203024101},
    abstract = {In dieser Sonderausgabe von „Die Friedens-Warte“ nähern wir uns dem Thema Resilienz aus den unterschiedlichen Perspektiven der Technikwissenschaften (mit einem Schwerpunkt auf neuen Technologien), den Sozialwissenschaften und den Rechtswissenschaften. Ein solcher interdisziplinärer Austausch innerhalb des Forschungsfeldes der Friedens- und Konfliktforschung ist aus unserer Sicht immens wichtig, zurzeit jedoch noch allzu rar.
    Das heutige internationale Sicherheitsumfeld ist gekennzeichnet durch den Niedergang der klassischen Rüstungskontrollarchitektur, die Rückkehr der Großmachtpolitik und das schwindende Vertrauen zwischen den Staaten. Neue Entwicklungen im Bereich der Militärtechnologie und der Technologien mit Doppelverwendungsfähigkeit sowie Modernisierungsprogramme für Waffen machen die Bemühungen um Frieden und Sicherheit noch komplexer. Seit dem Einmarsch Russlands in die Ukraine im Februar 2022 ist allgemein anerkannt, wie wichtig es ist, sich mit diesen Fragen sachkundig auseinanderzusetzen.
    Der erste Teil dieser Sonderausgabe basiert auf der interdisziplinären Konferenz Science Peace Security 2021 in Aachen, die sich mit den Auswirkungen neuer Technologien auf die Resilienz befasste. Gesucht wurden Konzepte zur Erreichung eines widerstandsfähigeren Sicherheitsumfeldes durch wissenschaftliche Beiträge und politische Maßnahmen zur Krisenbewältigung, Risikobewertung, Vertrauensbildung und Rüstungsbegrenzung. Untersucht wurden nukleare, biologische, chemische und weltraumgestützte Bedrohungen sowie Entwicklungen in der Informationstechnologie, wie z. B. Cyber- oder künstliche Intelligenz, sowie weitere relevante technischen Bereiche.},
    number = {3-4},
    journal = {Die Friedens-Warte / Journal of International Peace and Organization (JIPO)},
    author = {Reuter, Christian and Göttsche, Malte and Frieß, Friederike and Thielbörger, Pierre and Vüllers, Johannes},
    year = {2022},
    keywords = {Peace},
    pages = {241--243},
    }

  • Sebastian Schwartz, Laura Guntrum, Christian Reuter (2022)
    Vision or Threat – Awareness for Dual-Use in the Development of Autonomous Driving
    IEEE Transactions on Technology and Society ;3(3):163–174. doi:10.1109/TTS.2022.3182310
    [BibTeX] [Abstract] [Download PDF]

    In the digital age, the vision of autonomous vehicles (AVs) is vibrant. Research is being conducted worldwide to inte-grate AVs into our everyday lives in the future, spending consid-erable amounts of money in the development process. Actors from both engineering as well as social sciences are involved in this re-search, with technical disciplines strongly dominating. In addition to perceived progress of numerous newly developed technologies such as AVs, challenges should also be referred to. According to research analysis, the transferability of autonomous cars to the military sphere seems to be frequently forgotten or ignored (dual-use). Since not much research has been conducted in Germany on the potential deployment of autonomous driving development steps into military domains, 25 semi-structured interviews with de-velopers and researchers and actors involved in the field, were conducted in 2020. The paper identifies that the majority of re-spondents interviewed were aware of general existing dual-use de-bates, however, few had reflected about dual-use issues regarding a possible transfer of their own development processes in the con-text of autonomous driving to military applications, intensively. One reason is the small-scale nature of research, another is the complexity of the field, which enables the engineer’s alienation from their responsibility for the artefacts’ use. Moreover, it has become clear that hardly any conversations among colleagues oc-cur about possible misuse and that no standardized policy guide-lines exist, which provide information about possible risk. To raise dual-use awareness, scientific contributions, risk education, and interdisciplinary discussions are essential.

    @article{schwartz_vision_2022,
    title = {Vision or {Threat} – {Awareness} for {Dual}-{Use} in the {Development} of {Autonomous} {Driving}},
    volume = {3},
    issn = {2637-6415},
    url = {https://www.peasec.de/paper/2022/2022_SchwartzGuntrumReuter_VisionorThreatAwarenessDualUseAutonomousDriving_IEEE-TTS.pdf},
    doi = {10.1109/TTS.2022.3182310},
    abstract = {In the digital age, the vision of autonomous vehicles (AVs) is vibrant. Research is being conducted worldwide to inte-grate AVs into our everyday lives in the future, spending consid-erable amounts of money in the development process. Actors from both engineering as well as social sciences are involved in this re-search, with technical disciplines strongly dominating. In addition to perceived progress of numerous newly developed technologies such as AVs, challenges should also be referred to. According to research analysis, the transferability of autonomous cars to the military sphere seems to be frequently forgotten or ignored (dual-use). Since not much research has been conducted in Germany on the potential deployment of autonomous driving development steps into military domains, 25 semi-structured interviews with de-velopers and researchers and actors involved in the field, were conducted in 2020. The paper identifies that the majority of re-spondents interviewed were aware of general existing dual-use de-bates, however, few had reflected about dual-use issues regarding a possible transfer of their own development processes in the con-text of autonomous driving to military applications, intensively. One reason is the small-scale nature of research, another is the complexity of the field, which enables the engineer’s alienation from their responsibility for the artefacts’ use. Moreover, it has become clear that hardly any conversations among colleagues oc-cur about possible misuse and that no standardized policy guide-lines exist, which provide information about possible risk. To raise dual-use awareness, scientific contributions, risk education, and interdisciplinary discussions are essential.},
    language = {en},
    number = {3},
    journal = {IEEE Transactions on Technology and Society},
    author = {Schwartz, Sebastian and Guntrum, Laura and Reuter, Christian},
    year = {2022},
    keywords = {Selected, A-Paper, Ranking-ImpactFactor, Peace, AuswahlPeace, Projekt-ATHENE-FANCY, Projekt-TraCe},
    pages = {163--174},
    }

  • Malte Göttsche, Sibylle Bauer, Anja Dahlmann, Friederike Frieß, Filippa Lentzos, Götz Neuneck, Irmgard Niemeyer, Thea Riebe, Jantje Silomon, Christian Reuter, Jakob Brochhaus, Lukas Rademacher (2022)
    Conference Proceedings : Science, Peace, Security ’21 : The Impact of new Technologies: Destabilizing or Enabling Resilience? : 8-10 September 2021
    Aachen: RWTH Aachen University. doi:10.18154/RWTH-2022-02256
    [BibTeX] [Abstract] [Download PDF]

    The impact of the rapid technological change on peace and security continuously grows and becomes increasingly complex. Against the background of a quickly deteriorating security environment, the international conference SCIENCE · PEACE · SECURITY ’21 (RWTH Aachen University, 8-10 September 2021) examined the role of emerging technologies. The 60 speakers and 220 participants came from the natural, technical and social sciences. Diplomats and representatives from international organisations participated in the discussions. Topics included nuclear, chemical and biological arms control, autonomy in weapon systems, cybersecurity and the militarization of space among others. The main outcome was that all of these issues could be more effectively addressed by new approaches to rigorous interdisciplinary research collaboration to create policy-relevant knowledge and by tightening the nexus between the scientist and policy communities. Both can only be achieved and sustained by funding novel structures that enable scientific-technical scholars to engage on these topics. Key problems to be addressed by integrating natural, technical and social science perspectives include early risk assessment of potential dual-use research and technologies – especially in bio-security and epidemiology as well as IT and robotic research. Ways forward are the inclusion of norms into technology design as well as addressing questions of responsibility and standards. For military-usable technologies, entirely new regulatory approaches are necessary to prevent escalatory dynamics and to maintain accountability structures, moving from object-based to behaviour-based approaches. Scientific-technical research contributes to peace and security in positive ways. A prominent example are nuclear verification techniques. While instruments to monitor nonproliferation and test ban commitments benefit from further improvement, many gaps on how to verify future arms control and disarmament agreements still exist and must be urgently closed. The best cutting-edge scientific and academic expertise that is required for these complex research tasks is found in universities and other independent research institutes. Typically, however, decisionmakers draw knowledge from governmental institutions because of ease and existing connections. Therefore, efforts should be made to better connect the policy and academic communities. Communication between both can be improved by meeting on a regular basis and not only when advice on a specific issue is sought. This can foster more stable relationships and increase an understanding of each other. Lastly, opportunities should be improved for the younger generation of scientists and technologists to engage with policymakers. It is crucial to educate and engage early-on the next generation of scientifically-literate policymakers and security-aware scientists.

    @book{gottsche_conference_2022,
    address = {Aachen},
    title = {Conference {Proceedings} : {Science}, {Peace}, {Security} '21 : {The} {Impact} of new {Technologies}: {Destabilizing} or {Enabling} {Resilience}? : 8-10 {September} 2021},
    url = {https://peasec.de/paper/2022/2022_Goettscheetal_ProceedingsSciencePeaceSecurity21ImpactOfNewTechnologies.pdf},
    abstract = {The impact of the rapid technological change on peace and security continuously grows and becomes increasingly complex. Against the background of a quickly deteriorating security environment, the international conference SCIENCE · PEACE · SECURITY ’21 (RWTH Aachen University, 8-10 September 2021) examined the role of emerging technologies. The 60 speakers and 220 participants came from the natural, technical and social sciences. Diplomats and representatives from international organisations participated in the discussions. Topics included nuclear, chemical and biological arms control, autonomy in weapon systems, cybersecurity and the militarization of space among others.
    The main outcome was that all of these issues could be more effectively addressed by new approaches to rigorous interdisciplinary research collaboration to create policy-relevant knowledge and by tightening the nexus between the scientist and policy communities. Both can only be achieved and sustained by funding novel structures that enable scientific-technical scholars to engage on these topics.
    Key problems to be addressed by integrating natural, technical and social science perspectives include early risk assessment of potential dual-use research and technologies – especially in bio-security and epidemiology as well as IT and robotic research. Ways forward are the inclusion of norms into technology design as well as addressing questions of responsibility and standards. For military-usable technologies, entirely new regulatory approaches are necessary to prevent escalatory dynamics and to maintain accountability structures, moving from object-based to behaviour-based approaches.
    Scientific-technical research contributes to peace and security in positive ways. A prominent example are nuclear verification techniques. While instruments to monitor nonproliferation and test ban commitments benefit from further improvement, many gaps on how to verify future arms control and disarmament agreements still exist and must be urgently closed.
    The best cutting-edge scientific and academic expertise that is required for these complex research tasks is found in universities and other independent research institutes. Typically, however, decisionmakers draw knowledge from governmental institutions because of ease and existing connections. Therefore, efforts should be made to better connect the policy and academic communities. Communication between both can be improved by meeting on a regular basis and not only when advice on a specific issue is sought. This can foster more stable relationships and increase an understanding of each other.
    Lastly, opportunities should be improved for the younger generation of scientists and technologists to engage with policymakers. It is crucial to educate and engage early-on the next generation of scientifically-literate policymakers and security-aware scientists.},
    publisher = {RWTH Aachen University},
    author = {Göttsche, Malte and Bauer, Sibylle and Dahlmann, Anja and Frieß, Friederike and Lentzos, Filippa and Neuneck, Götz and Niemeyer, Irmgard and Riebe, Thea and Silomon, Jantje and Reuter, Christian and Brochhaus, Jakob and Rademacher, Lukas},
    year = {2022},
    doi = {10.18154/RWTH-2022-02256},
    keywords = {Peace},
    }

    2021

  • Thea Riebe, Stefka Schmid, Christian Reuter (2021)
    LinkedIn als Barometer: Austausch zwischen ziviler und militärischer F&E
    Wissenschaft & Frieden: 2021.
    [BibTeX] [Abstract] [Download PDF]

    Gibt es Wissenstransfers zwischen militärischer und ziviler Forschung? Wenn ja, in welchem Umfang? Um die Art und Weise zu untersuchen, wie Unternehmen durch sogenannte »Spillover«-Effekte von den Aktivitäten in den Bereichen »Forschung und Entwicklung« (F&E) eines anderen Unternehmens profi tieren, existieren bereits Methoden, die die Mobilität von Arbeitskräften als Initiator von Wissenstransfers untersuchen. Dieser Beitrag stellt einen ergänzenden Ansatz vor, der auf »Social Media Analytics« (SMA) beruht. Er soll helfen, die »Spillover«-Eff ekte vom Verteidigungsbereich in die zivile F&E quantifi zieren zu können und beruht auf der Analyse von Angaben zum Beschäftigungswechsel aus dem sozialen Netzwerk »LinkedIn«.

    @techreport{riebe_linkedin_2021,
    address = {Wissenschaft \& Frieden},
    title = {{LinkedIn} als {Barometer}: {Austausch} zwischen ziviler und militärischer {F}\&{E}},
    url = {https://peasec.de/paper/2021/2021_RiebeSchmidReuter_LinkedInalsBarometer_WuF.pdf},
    abstract = {Gibt es Wissenstransfers zwischen militärischer und ziviler Forschung? Wenn ja, in welchem Umfang? Um die Art und Weise zu untersuchen, wie Unternehmen durch sogenannte »Spillover«-Effekte von den Aktivitäten in den Bereichen »Forschung und Entwicklung« (F\&E) eines anderen Unternehmens profi tieren, existieren bereits Methoden, die die Mobilität von Arbeitskräften als Initiator von Wissenstransfers untersuchen. Dieser Beitrag stellt einen ergänzenden Ansatz vor, der auf »Social Media Analytics« (SMA) beruht. Er soll helfen, die »Spillover«-Eff ekte vom Verteidigungsbereich in die zivile F\&E quantifi zieren zu können und beruht auf der Analyse von Angaben zum Beschäftigungswechsel aus dem sozialen Netzwerk »LinkedIn«.},
    author = {Riebe, Thea and Schmid, Stefka and Reuter, Christian},
    year = {2021},
    keywords = {Peace, Projekt-DualUse},
    }

  • Christian Reuter (2021)
    Sicherheitskritische Mensch-Computer-Interaktion: Interaktive Technologien und Soziale Medien im Krisen- und Sicherheitsmanagement (Zweite Auflage)
    2 ed. Wiesbaden: Springer Vieweg.
    [BibTeX] [Abstract] [Download PDF]

    Die zweite, aktualisierte Auflage dieses Lehr- und Fachbuchs gibt eine fundierte und praxisbezogene Einführung sowie einen Überblick über Grundlagen, Methoden und Anwendungen der Mensch-Computer-Interaktion im Kontext von Sicherheit, Notfällen, Krisen, Katastrophen, Krieg und Frieden. Dies adressierend werden interaktive, mobile, ubiquitäre und kooperative Technologien sowie soziale Medien vorgestellt. Hierbei finden klassische Themen wie benutzbare (IT-)Sicherheit, Industrie 4.0, Katastrophenschutz, Medizin und Automobil, aber auch Augmented Reality, Crowdsourcing, Shitstorm Management, Social Media Analytics und Cyberwar ihren Platz. Methodisch wird das Spektrum von Usable Safety bis Usable Security Engineering von Analyse über Design bis Evaluation abgedeckt. Das Buch eignet sich ebenso als Lehrbuch für Studierende wie als Handbuch für Wissenschaftler, Designer, Entwickler und Anwender.

    @book{reuter_sicherheitskritische_2021,
    address = {Wiesbaden},
    edition = {2},
    title = {Sicherheitskritische {Mensch}-{Computer}-{Interaktion}: {Interaktive} {Technologien} und {Soziale} {Medien} im {Krisen}- und {Sicherheitsmanagement} ({Zweite} {Auflage})},
    isbn = {978-3-658-32795-8},
    url = {https://www.springer.com/de/book/9783658327941},
    abstract = {Die zweite, aktualisierte Auflage dieses Lehr- und Fachbuchs gibt eine fundierte und praxisbezogene Einführung sowie einen Überblick über Grundlagen, Methoden und Anwendungen der Mensch-Computer-Interaktion im Kontext von Sicherheit, Notfällen, Krisen, Katastrophen, Krieg und Frieden. Dies adressierend werden interaktive, mobile, ubiquitäre und kooperative Technologien sowie soziale Medien vorgestellt. Hierbei finden klassische Themen wie benutzbare (IT-)Sicherheit, Industrie 4.0, Katastrophenschutz, Medizin und Automobil, aber auch Augmented Reality, Crowdsourcing, Shitstorm Management, Social Media Analytics und Cyberwar ihren Platz. Methodisch wird das Spektrum von Usable Safety bis Usable Security Engineering von Analyse über Design bis Evaluation abgedeckt. Das Buch eignet sich ebenso als Lehrbuch für Studierende wie als Handbuch für Wissenschaftler, Designer, Entwickler und Anwender.},
    publisher = {Springer Vieweg},
    author = {Reuter, Christian},
    year = {2021},
    keywords = {AuswahlCrisis, HCI, Selected, SocialMedia, UsableSec, Security, Projekt-KontiKat, Peace, Infrastructure, Projekt-ATHENE-SecUrban, Projekt-CYWARN, Projekt-emergenCITY},
    }

  • Christian Reuter, Marc-André Kaufhold (2021)
    Soziale Medien in Notfällen, Krisen und Katastrophen
    In: Christian ReuterSicherheitskritische Mensch-Computer-Interaktion: Interaktive Technologien und Soziale Medien im Krisen- und Sicherheitsmanagement (Zweite Auflage). 2 ed. Wiesbaden, Germany: Springer Vieweg, , 407–430.
    [BibTeX] [Abstract] [Download PDF]

    Die Nutzung sozialer Medien hat sich nicht nur im Alltag, sondern auch in vielen ver-schiedenen Notfällen, Krisen und Katastrophen etabliert. Dieser Prozess begann bereits vor etwa 20 Jahren nach den Terroranschlägen vom 11. September 2001. In den darauf-folgenden Jahren, vor allem aber dem letzten Jahrzehnt, wurde eine Vielzahl von Stu-dien veröffentlicht, die sich auf den Gebrauch von Informations- und Kommunikations-technologien einschließlich der sozialen Medien vor, während oder nach Notfällen kon-zentrieren. Dieser Forschungsbereich wird auch unter dem Begriff Crisis Informatics zusammengefasst. Das Ziel dieses Kapitels ist es, den Gebrauch von und die Forschung über soziale Medien in Katastrophen und Notfällen in den vergangenen 20 Jahren mit besonderem Schwerpunkt auf identifizierbare Nutzungsmuster und deren Wahrnehmung zusammenzufassen, um die bisherigen Ergebnisse und zukünftigen Potenziale herauszu-stellen.

    @incollection{reuter_soziale_2021,
    address = {Wiesbaden, Germany},
    edition = {2},
    title = {Soziale {Medien} in {Notfällen}, {Krisen} und {Katastrophen}},
    isbn = {978-3-658-32794-1},
    url = {https://doi.org/10.1007/978-3-658-32795-8_19},
    abstract = {Die Nutzung sozialer Medien hat sich nicht nur im Alltag, sondern auch in vielen ver-schiedenen Notfällen, Krisen und Katastrophen etabliert. Dieser Prozess begann bereits vor etwa 20 Jahren nach den Terroranschlägen vom 11. September 2001. In den darauf-folgenden Jahren, vor allem aber dem letzten Jahrzehnt, wurde eine Vielzahl von Stu-dien veröffentlicht, die sich auf den Gebrauch von Informations- und Kommunikations-technologien einschließlich der sozialen Medien vor, während oder nach Notfällen kon-zentrieren. Dieser Forschungsbereich wird auch unter dem Begriff Crisis Informatics zusammengefasst. Das Ziel dieses Kapitels ist es, den Gebrauch von und die Forschung über soziale Medien in Katastrophen und Notfällen in den vergangenen 20 Jahren mit besonderem Schwerpunkt auf identifizierbare Nutzungsmuster und deren Wahrnehmung zusammenzufassen, um die bisherigen Ergebnisse und zukünftigen Potenziale herauszu-stellen.},
    booktitle = {Sicherheitskritische {Mensch}-{Computer}-{Interaktion}: {Interaktive} {Technologien} und {Soziale} {Medien} im {Krisen}- und {Sicherheitsmanagement} ({Zweite} {Auflage})},
    publisher = {Springer Vieweg},
    author = {Reuter, Christian and Kaufhold, Marc-André},
    editor = {Reuter, Christian},
    year = {2021},
    keywords = {Crisis, Security, Peace, Projekt-CYWARN},
    pages = {407--430},
    }

  • Christian Reuter, Marc-André Kaufhold (2021)
    Informatik für Frieden-, Konflikt- und Sicherheitsforschung
    In: Christian ReuterSicherheitskritische Mensch-Computer-Interaktion: Interaktive Technologien und Soziale Medien im Krisen- und Sicherheitsmanagement (Zweite Auflage). 2 ed. Wiesbaden, Germany: Springer Vieweg, , 605–630.
    [BibTeX] [Abstract] [Download PDF]

    Seit jeher hatten die Erkenntnisse aus Naturwissenschaft und Technik einen großen Einfluss auf die Art und Weise, wie Kriege und Konflikte ausgetragen wurden bezie-hungsweise werden. Im Kontext von Frieden und Sicherheit können Erkenntnisse, die eigentlich für zivile Kontexte gewonnen wurden, auch für militärische Auseinanderset-zungen genutzt werden (Dual-Use-Problematik). Seit einigen Jahren betrifft dies insbe-sondere die Informatik, die durch die militärische Nutzung von Computern, Cyberwar, Cyberspionage Information Warfare, aber auch in Bereichen wie Desinformationen kon-fliktäre Auseinandersetzungen unterstützen (und verstärken) kann. Auch werden Kon-flikte vermehrt im digitalen Raum ausgetragen, mit erschwerter Zuordnungsmöglichkeit von einzelnen (angreifenden) Akteur*innen. Im Gegenzug dazu bietet die Informatik jedoch auch für friedensstiftende Aktivitäten zahlreiche Einsatzmöglichkeiten. Dieses Kapitel möchte eine Einführung in die zunehmend an Bedeutung gewinnende Thematik liefern.

    @incollection{reuter_informatik_2021,
    address = {Wiesbaden, Germany},
    edition = {2},
    title = {Informatik für {Frieden}-, {Konflikt}- und {Sicherheitsforschung}},
    isbn = {978-3-658-32794-1},
    url = {https://doi.org/10.1007/978-3-658-32795-8_28},
    abstract = {Seit jeher hatten die Erkenntnisse aus Naturwissenschaft und Technik einen großen Einfluss auf die Art und Weise, wie Kriege und Konflikte ausgetragen wurden bezie-hungsweise werden. Im Kontext von Frieden und Sicherheit können Erkenntnisse, die eigentlich für zivile Kontexte gewonnen wurden, auch für militärische Auseinanderset-zungen genutzt werden (Dual-Use-Problematik). Seit einigen Jahren betrifft dies insbe-sondere die Informatik, die durch die militärische Nutzung von Computern, Cyberwar, Cyberspionage Information Warfare, aber auch in Bereichen wie Desinformationen kon-fliktäre Auseinandersetzungen unterstützen (und verstärken) kann. Auch werden Kon-flikte vermehrt im digitalen Raum ausgetragen, mit erschwerter Zuordnungsmöglichkeit von einzelnen (angreifenden) Akteur*innen. Im Gegenzug dazu bietet die Informatik jedoch auch für friedensstiftende Aktivitäten zahlreiche Einsatzmöglichkeiten. Dieses Kapitel möchte eine Einführung in die zunehmend an Bedeutung gewinnende Thematik liefern.},
    booktitle = {Sicherheitskritische {Mensch}-{Computer}-{Interaktion}: {Interaktive} {Technologien} und {Soziale} {Medien} im {Krisen}- und {Sicherheitsmanagement} ({Zweite} {Auflage})},
    publisher = {Springer Vieweg},
    author = {Reuter, Christian and Kaufhold, Marc-André},
    editor = {Reuter, Christian},
    year = {2021},
    keywords = {Security, Peace, Projekt-DualUse, Projekt-CYWARN},
    pages = {605--630},
    }

  • Philipp Kuehn, Markus Bayer, Marc Wendelborn, Christian Reuter (2021)
    OVANA: An Approach to Analyze and Improve the Information Quality of Vulnerability Databases
    Proceedings of the 16th International Conference on Availability, Reliability and Security (ARES 2021) . doi:10.1145/3465481.3465744
    [BibTeX] [Abstract] [Download PDF]

    Vulnerability databases are one of the main information sources for IT security experts. Hence, the quality of their information is of utmost importance for anyone working in this area. Previous work has shown that machine readable information is either missing, incorrect, or inconsistent with other data sources. In this paper, we introduce a system called Overt Vulnerability source ANAlysis (OVANA), utilizing state-of-the-art machine learning (ML) and natural-language processing (NLP) techniques, which analyzes the information quality (IQ) of vulnerability databases, searches the free-form description for relevant information missing from structured fields, and updates it accordingly. Our paper shows that OVANA is able to improve the IQ of the National Vulnerability Database by 51.23\% based on the indicators of accuracy, completeness, and uniqueness. Moreover, we present information which should be incorporated into the structured fields to increase the uniqueness of vulnerability entries and improve the discriminability of different vulnerability entries. The identified information from OVANA enables a more targeted vulnerability search and provides guidance for IT security experts in finding relevant information in vulnerability descriptions for severity assessment.

    @inproceedings{kuehn_ovana_2021,
    title = {{OVANA}: {An} {Approach} to {Analyze} and {Improve} the {Information} {Quality} of {Vulnerability} {Databases}},
    isbn = {978-1-4503-9051-4},
    url = {https://peasec.de/paper/2021/2021_KuehnBayerWendelbornReuter_OVANAQualityVulnerabilityDatabases_ARES.pdf},
    doi = {10.1145/3465481.3465744},
    abstract = {Vulnerability databases are one of the main information sources for IT security experts. Hence, the quality of their information is of utmost importance for anyone working in this area. Previous work has shown that machine readable information is either missing, incorrect, or inconsistent with other data sources. In this paper, we introduce a system called Overt Vulnerability source ANAlysis (OVANA), utilizing state-of-the-art machine learning (ML) and natural-language processing (NLP) techniques, which analyzes the information quality (IQ) of vulnerability databases, searches the free-form description for relevant information missing from structured fields, and updates it accordingly. Our paper shows that OVANA is able to improve the IQ of the National Vulnerability Database by 51.23\% based on the indicators of accuracy, completeness, and uniqueness. Moreover, we present information which should be incorporated into the structured fields to increase the uniqueness of vulnerability entries and improve the discriminability of different vulnerability entries. The identified information from OVANA enables a more targeted vulnerability search and provides guidance for IT security experts in finding relevant information in vulnerability descriptions for severity assessment.},
    booktitle = {Proceedings of the 16th {International} {Conference} on {Availability}, {Reliability} and {Security} ({ARES} 2021)},
    publisher = {ACM},
    author = {Kuehn, Philipp and Bayer, Markus and Wendelborn, Marc and Reuter, Christian},
    year = {2021},
    keywords = {Security, Peace, Ranking-CORE-B, AuswahlPeace, Projekt-ATHENE-SecUrban, Projekt-CYWARN},
    pages = {1--11},
    }

  • Thea Riebe, Stefka Schmid, Christian Reuter (2021)
    Measuring Spillover Effects from Defense to Civilian Sectors – A Quantitative Approach Using LinkedIn
    Defence and Peace Economics ;32(7):773–785. doi:10.1080/10242694.2020.1755787
    [BibTeX] [Abstract] [Download PDF]

    Spillover effects describe the process of a company benefiting from the R&D activities of another one and thereby gaining an economic advantage. One prominent approach for measuring spillover effects is based on the analysis of patent citation networks. Taking social media analytics and knowledge economics into account, this paper presents a complementary approach to quantify spillover effects from defense to civilian research and development, analyzing 513 employment biographies from the social network LinkedIn. Using descriptive network analysis, we investigate the emigration of personnel of the German defense industry to other civilian producers. Thereby, our study reveals that in the last decade, employees of defense suppliers have changed positions significantly less often, with 3.24 changes on average than professionals who have worked more than 50\% of their jobs in the civilian sector, having changed 4.61 times on average. Our work illustrates the churn behavior and how spillover effects between defense and civilian sectors can be measured using social career networks such as LinkedIn.

    @article{riebe_measuring_2021,
    title = {Measuring {Spillover} {Effects} from {Defense} to {Civilian} {Sectors} – {A} {Quantitative} {Approach} {Using} {LinkedIn}},
    volume = {32},
    url = {https://peasec.de/paper/2021/2021_RiebeSchmidReuter_SpilloverEffectsDefensetoCivilianLinkedIn_PDE.pdf},
    doi = {10.1080/10242694.2020.1755787},
    abstract = {Spillover effects describe the process of a company benefiting from the R\&D activities of another one and thereby gaining an economic advantage. One prominent approach for measuring spillover effects is based on the analysis of patent citation networks. Taking social media analytics and knowledge economics into account, this paper presents a complementary approach to quantify spillover effects from defense to civilian research and development, analyzing 513 employment biographies from the social network LinkedIn. Using descriptive network analysis, we investigate the emigration of personnel of the German defense industry to other civilian producers. Thereby, our study reveals that in the last decade, employees of defense suppliers have changed positions significantly less often, with 3.24 changes on average than professionals who have worked more than 50\% of their jobs in the civilian sector, having changed 4.61 times on average. Our work illustrates the churn behavior and how spillover effects between defense and civilian sectors can be measured using social career networks such as LinkedIn.},
    number = {7},
    journal = {Defence and Peace Economics},
    author = {Riebe, Thea and Schmid, Stefka and Reuter, Christian},
    year = {2021},
    keywords = {Selected, A-Paper, Ranking-ImpactFactor, Peace, Projekt-DualUse, AuswahlPeace, Cyberwar, Projekt-ATHENE-SecUrban},
    pages = {773--785},
    }

  • Thomas Reinhold (2021)
    Zur Rolle und Verantwortung der Informatik für die Friedensforschung und Rüstungskontrolle
    FIfF-Kommunikation ;38:47–49.
    [BibTeX] [Download PDF]

    @article{reinhold_zur_2021,
    title = {Zur {Rolle} und {Verantwortung} der {Informatik} für die {Friedensforschung} und {Rüstungskontrolle}},
    volume = {38},
    url = {https://peasec.de/paper/2021/2021_Reinhold_RolleVerantwortungInformatikFriedensforschung_FIFF.pdf},
    journal = {FIfF-Kommunikation},
    author = {Reinhold, Thomas},
    year = {2021},
    keywords = {Security, Peace, Projekt-DualUse, Cyberwar},
    pages = {47--49},
    }

  • Katrin Hartwig, Christian Reuter (2021)
    Fake News technisch begegnen – Detektions- und Behandlungsansätze zur Unterstützung von NutzerInnen
    In: Peter Klimczak, Thomas Zoglauer: Wahrheit und Fake News im postfaktischen Zeitalter. Wiesbaden: Springer Vieweg, , 133–150.
    [BibTeX] [Abstract] [Download PDF]

    Die Bedeutung des Umgangs mit Fake News hat sowohl im politischen als auch im sozialen Kontext zugenommen: Während sich bestehende Studien vor allem darauf konzentrieren, wie man gefälschte Nachrichten erkennt und kennzeichnet, fehlen Ansätze zur Unterstützung der NutzerInnen bei der eigenen Einschätzung weitgehend. Dieser Artikel stellt bestehende Black-Box- und White-Box-Ansätze vor und vergleicht Vor- und Nachteile. Dabei zeigen sich White-Box-Ansätze insbesondere als vielversprechend, um gegen Reaktanzen zu wirken, während Black-Box-Ansätze Fake News mit deutlich größerer Genauigkeit detektieren. Vorgestellt wird auch das von uns entwickelte Browser-Plugin TrustyTweet, welches die BenutzerInnen bei der Bewertung von Tweets auf Twitter unterstützt, indem es politisch neutrale und intuitive Warnungen anzeigt, ohne Reaktanz zu erzeugen.

    @incollection{hartwig_fake_2021,
    address = {Wiesbaden},
    series = {ars digitalis},
    title = {Fake {News} technisch begegnen – {Detektions}- und {Behandlungsansätze} zur {Unterstützung} von {NutzerInnen}},
    volume = {3},
    isbn = {978-3-658-32956-3},
    url = {https://peasec.de/paper/2021/2021_HartwigReuter_FakeNewstechnischbegegnen_WahrheitundFake.pdf},
    abstract = {Die Bedeutung des Umgangs mit Fake News hat sowohl im politischen als auch im sozialen Kontext zugenommen: Während sich bestehende Studien vor allem darauf konzentrieren, wie man gefälschte Nachrichten erkennt und kennzeichnet, fehlen Ansätze zur Unterstützung der NutzerInnen bei der eigenen Einschätzung weitgehend. Dieser Artikel stellt bestehende Black-Box- und White-Box-Ansätze vor und vergleicht Vor- und Nachteile. Dabei zeigen sich White-Box-Ansätze insbesondere als vielversprechend, um gegen Reaktanzen zu wirken, während Black-Box-Ansätze Fake News mit deutlich größerer Genauigkeit detektieren. Vorgestellt wird auch das von uns entwickelte Browser-Plugin TrustyTweet, welches die BenutzerInnen bei der Bewertung von Tweets auf Twitter unterstützt, indem es politisch neutrale und intuitive Warnungen anzeigt, ohne Reaktanz zu erzeugen.},
    language = {de},
    booktitle = {Wahrheit und {Fake} {News} im postfaktischen {Zeitalter}},
    publisher = {Springer Vieweg},
    author = {Hartwig, Katrin and Reuter, Christian},
    editor = {Klimczak, Peter and Zoglauer, Thomas},
    year = {2021},
    keywords = {Crisis, HCI, SocialMedia, Peace},
    pages = {133--150},
    }

  • Thea Riebe, Christian Reuter (2021)
    Neue Technologien und Resilienz
    Wissenschaft und Frieden: 2021.
    [BibTeX] [Abstract] [Download PDF]

    Die Science · Peace · Security ’21 (SPS21) Konferenz fand in diesem Jahr virtuell statt. Ausgerichtet wurde sie durch Prof. Malte Göttsche, Leiter der Forschungsgruppe »Nukleare Verifikation und Abrüstung« an der RWTH Aachen mit Unterstützung eines international besetzten Programmkomitees. Die Konferenz brachte Wissenschaftler*innen aus vielen Disziplinen und aus aller Welt, Diplomat*innen sowie Mitglieder der Bundeswehr zusammen, um über aktuelle Fragen der Rüstungskontrolle und Abrüstung unter dem diesjährigen Motto »The Impact of New Technologies: Destabilizing or Enabling Resilience?« zu diskutieren.

    @techreport{riebe_neue_2021,
    address = {Wissenschaft und Frieden},
    title = {Neue {Technologien} und {Resilienz}},
    url = {https://peasec.de/paper/2021/2021_RiebeReuter_NeueTechnologienResilienz.pdf},
    abstract = {Die Science · Peace · Security ’21 (SPS21) Konferenz fand in diesem Jahr virtuell statt. Ausgerichtet wurde sie durch Prof. Malte Göttsche, Leiter der Forschungsgruppe »Nukleare Verifikation und Abrüstung« an der RWTH Aachen mit Unterstützung eines international besetzten Programmkomitees. Die Konferenz brachte Wissenschaftler*innen aus vielen Disziplinen und aus aller Welt, Diplomat*innen sowie Mitglieder der Bundeswehr zusammen, um über aktuelle Fragen der Rüstungskontrolle und Abrüstung unter dem diesjährigen Motto »The Impact of New Technologies: Destabilizing or Enabling Resilience?« zu diskutieren.},
    author = {Riebe, Thea and Reuter, Christian},
    year = {2021},
    keywords = {Peace},
    }

    2020

  • Christian Reuter, Stefan Stieglitz, Muhammad Imran (2020)
    Social media in conflicts and crises
    Behaviour & Information Technology (BIT) ;39(1):241–251. doi:10.1080/0144929X.2019.1629025
    [BibTeX] [Abstract] [Download PDF]

    The growing importance of social media in conflicts and crises is accompanied by an ever-increasing research interest in the crisis informatics field in order to identify potential benefits and develop measures against the technology’s abuse. This special issue sets out to give an overview of current research on the use of social media in conflicts and crises. In doing so, it focuses on both good and malicious aspects of social media and includes a variety of papers of conceptual, theoretical and empirical nature. In six sections, the special issue presents an overview of the field, analytical methods, technical challenges, current advancements and the accepted papers before concluding. Specific topics range from cyber deception over information trustworthiness to mining and near-real-time processing of social media data.

    @article{reuter_social_2020,
    title = {Social media in conflicts and crises},
    volume = {39},
    issn = {0144-929X},
    url = {https://peasec.de/paper/2020/2020_ReuterStieglitzImran_SocialMediainConflictsandCrises_BIT.pdf},
    doi = {10.1080/0144929X.2019.1629025},
    abstract = {The growing importance of social media in conflicts and crises is accompanied by an ever-increasing research interest in the crisis informatics field in order to identify potential benefits and develop measures against the technology's abuse. This special issue sets out to give an overview of current research on the use of social media in conflicts and crises. In doing so, it focuses on both good and malicious aspects of social media and includes a variety of papers of conceptual, theoretical and empirical nature. In six sections, the special issue presents an overview of the field, analytical methods, technical challenges, current advancements and the accepted papers before concluding. Specific topics range from cyber deception over information trustworthiness to mining and near-real-time processing of social media data.},
    number = {1},
    journal = {Behaviour \& Information Technology (BIT)},
    author = {Reuter, Christian and Stieglitz, Stefan and Imran, Muhammad},
    year = {2020},
    keywords = {Crisis, HCI, SocialMedia, A-Paper, Ranking-ImpactFactor, Ranking-CORE-A, Peace},
    pages = {241--251},
    }

  • Thea Riebe, Jasmin Haunschild, Felix Divo, Matthias Lang, Gerbert Roitburd, Jonas Franken, Christian Reuter (2020)
    Die Veränderung der Vorratsdatenspeicherung in Europa
    Datenschutz und Datensicherheit – DuD ;44(5):316–321. doi:10.1007/s11623-020-1275-3
    [BibTeX] [Abstract] [Download PDF]

    Die Diskussion um die Vorratsdatenspeicherung ist europaweit weiterhin relevant, da es keine einheitliche Gesetzgebung der EU-Mitgliedsstaaten gibt. So werden in einigen EU-Staaten weiterhin Vorratsdaten gespeichert, obwohl der EuGH die Vorratsdatenspeicherung für teilweise rechtswidrig erklärt hat. Dabei unterscheiden sich die Speicherdauer, die erhobenen Daten und die Rechte der Behörden erheblich. Der Beitrag vergleicht den Umgang mit der Vorratsdatenspeicherung in zehn EU- und Schengen-Staaten im Hinblick auf Einführung und Aussetzung, Speicherdauer, Speicherinhalte und Zugriffsrechte.

    @article{riebe_veranderung_2020,
    title = {Die {Veränderung} der {Vorratsdatenspeicherung} in {Europa}},
    volume = {44},
    url = {https://www.peasec.de/paper/2020/2020_Riebeetal_VDSinEuropa_DuD.pdf},
    doi = {10.1007/s11623-020-1275-3},
    abstract = {Die Diskussion um die Vorratsdatenspeicherung ist europaweit weiterhin relevant, da es keine einheitliche Gesetzgebung der EU-Mitgliedsstaaten gibt. So werden in einigen EU-Staaten weiterhin Vorratsdaten gespeichert, obwohl der EuGH die Vorratsdatenspeicherung für teilweise rechtswidrig erklärt hat. Dabei unterscheiden sich die Speicherdauer, die erhobenen Daten und die Rechte der Behörden erheblich. Der Beitrag vergleicht den Umgang mit der Vorratsdatenspeicherung in zehn EU- und Schengen-Staaten im Hinblick auf Einführung und Aussetzung, Speicherdauer, Speicherinhalte und Zugriffsrechte.},
    number = {5},
    journal = {Datenschutz und Datensicherheit - DuD},
    author = {Riebe, Thea and Haunschild, Jasmin and Divo, Felix and Lang, Matthias and Roitburd, Gerbert and Franken, Jonas and Reuter, Christian},
    year = {2020},
    keywords = {Student, Security, Projekt-KontiKat, Peace, Projekt-DualUse, Projekt-ATHENE-SecUrban},
    pages = {316--321},
    }

  • Philipp Imperatori, Thea Riebe, Christian Reuter (2020)
    Verschlüsselungspolitik der USA: Vom Clipper-Chip zu Edward Snowden
    FIfF-Kommunikation ;37:77–80.
    [BibTeX] [Download PDF]

    @article{imperatori_verschlusselungspolitik_2020,
    title = {Verschlüsselungspolitik der {USA}: {Vom} {Clipper}-{Chip} zu {Edward} {Snowden}},
    volume = {37},
    url = {https://tuprints.ulb.tu-darmstadt.de/20060/1/fk-1-20-p77.pdf},
    journal = {FIfF-Kommunikation},
    author = {Imperatori, Philipp and Riebe, Thea and Reuter, Christian},
    year = {2020},
    keywords = {Student, Security, Peace, Projekt-DualUse, Projekt-CROSSING},
    pages = {77--80},
    }

  • Christian Reuter, Stefan Stieglitz, Muhammad Imran (2020)
    Special Issue on Social Media in Conflicts and Crises – Behaviour & Information Technology (BIT)
    Taylor & Francis.
    [BibTeX] [Abstract] [Download PDF]

    The growing importance of social media in conflicts and crises is accompanied by an ever-increasing research interest in the crisis informatics field in order to identify potential benefits and develop measures against the technology’s abuse. This special issue sets out to give an overview of current research on the use of social media in conflicts and crises. In doing so, it focuses on both good and malicious aspects of social media and includes a variety of papers of conceptual, theoretical and empirical nature. In six sections, the special issue presents an overview of the field, analytical methods, technical challenges, current advancements and the accepted papers before concluding. Specific topics range from cyber deception over information trustworthiness to mining and near-real-time processing of social media data.

    @book{reuter_special_2020,
    title = {Special {Issue} on {Social} {Media} in {Conflicts} and {Crises} - {Behaviour} \& {Information} {Technology} ({BIT})},
    volume = {39},
    url = {https://www.tandfonline.com/toc/tbit20/39/3},
    abstract = {The growing importance of social media in conflicts and crises is accompanied by an ever-increasing research interest in the crisis informatics field in order to identify potential benefits and develop measures against the technology's abuse. This special issue sets out to give an overview of current research on the use of social media in conflicts and crises. In doing so, it focuses on both good and malicious aspects of social media and includes a variety of papers of conceptual, theoretical and empirical nature. In six sections, the special issue presents an overview of the field, analytical methods, technical challenges, current advancements and the accepted papers before concluding. Specific topics range from cyber deception over information trustworthiness to mining and near-real-time processing of social media data.},
    number = {1},
    publisher = {Taylor \& Francis},
    author = {Reuter, Christian and Stieglitz, Stefan and Imran, Muhammad},
    year = {2020},
    note = {Publication Title: Behaviour \& Information Technology (BIT)},
    keywords = {Crisis, HCI, SocialMedia, A-Paper, Ranking-ImpactFactor, Ranking-CORE-A, Peace},
    }

  • Thea Riebe, Stefka Schmid, Christian Reuter (2020)
    Meaningful Human Control of Lethal Autonomous Weapon System: The CCW-Debate and its Implications for Value-Sensitive Design
    IEEE Technology and Society Magazine ;39(4):36–51. doi:10.1109/MTS.2020.3031846
    [BibTeX] [Abstract] [Download PDF]

    The debate on the development and deployment of lethal autonomous weapon systems (LAWS) as an emerging technology is of increasing importance, with discussions stalling and technological development progressing. Monitoring the progress of increasingly autonomous weapons systems in civilian and military use as well as regulating possible autonomous systems early on is demanded by civil society actors, like the Campaign to Stop Killer Robots and the International Committee of the Red Cross (ICRC), while nation states follow a variety of interests and strategies, showing little room for consensus on central terms and questions [2], [3]. This article therefore sheds light on the work of the Group of Governmental Experts (GGE) of the UN Convention of Certain Conventional Weapons (CCW). The CCW, offering an arena for international cooperation, has dedicated itself to the purpose of finding common ground with respect to an understanding of LAWS, as well as to the necessary degree of human control. From an ethical perspective, the concept of Meaningful Human Control (MHC) supports a human-centric approach. Several IEEE projects, series and publications are dedicated to this prioritization, especially regarding civilian use. As autonomous technology is increasingly at the center of contemporary military innovations, questions of (human) agency and responsibility in warfare have become even more pressing. As stressed by the United Nations Institute for Disarmament Research (UNIDIR), the concept of MHC may prove useful in the context of development and use of (semi-) autonomous weaponry.

    @article{riebe_meaningful_2020,
    title = {Meaningful {Human} {Control} of {Lethal} {Autonomous} {Weapon} {System}: {The} {CCW}-{Debate} and its {Implications} for {Value}-{Sensitive} {Design}},
    volume = {39},
    url = {https://peasec.de/paper/2020/2020_RiebeSchmidReuter_MHC_IEEETechScieMag.pdf},
    doi = {10.1109/MTS.2020.3031846},
    abstract = {The debate on the development and deployment of lethal autonomous weapon systems (LAWS) as an emerging technology is of increasing importance, with discussions stalling and technological development progressing. Monitoring the progress of increasingly autonomous weapons systems in civilian and military use as well as regulating possible autonomous systems early on is demanded by civil society actors, like the Campaign to Stop Killer Robots and the International Committee of the Red Cross (ICRC), while nation states follow a variety of interests and strategies, showing little room for consensus on central terms and questions [2], [3]. This article therefore sheds light on the work of the Group of Governmental Experts (GGE) of the UN Convention of Certain Conventional Weapons (CCW). The CCW, offering an arena for international cooperation, has dedicated itself to the purpose of finding common ground with respect to an understanding of LAWS, as well as to the necessary degree of human control. From an ethical perspective, the concept of Meaningful Human Control (MHC) supports a human-centric approach. Several IEEE projects, series and publications are dedicated to this prioritization, especially regarding civilian use. As autonomous technology is increasingly at the center of contemporary military innovations, questions of (human) agency and responsibility in warfare have become even more pressing. As stressed by the United Nations Institute for Disarmament Research (UNIDIR), the concept of MHC may prove useful in the context of development and use of (semi-) autonomous weaponry.},
    number = {4},
    journal = {IEEE Technology and Society Magazine},
    author = {Riebe, Thea and Schmid, Stefka and Reuter, Christian},
    year = {2020},
    keywords = {A-Paper, Ranking-ImpactFactor, Projekt-KontiKat, Peace, Projekt-DualUse, AuswahlPeace, Cyberwar},
    pages = {36--51},
    }

  • Sebastian Schwartz, Christian Reuter (2020)
    90.000 Tonnen Diplomatie 2.0: Die Integration von unbemannten Systemen in den operativen Flugzeugträgerbetrieb am Beispiel der X-47B
    Zeitschrift für Außen- und Sicherheitspolitik (ZfAS) ;13(1). doi:10.1007/s12399-020-00803-y
    [BibTeX] [Abstract] [Download PDF]

    Die Debatte um die Integration von autonomen Systemen in Streitkräfte wird oftmals auf einer (militär-)strategischen Ebene geführt. Die technisch-operativen Aspekte werden außerhalb des Fachpublikums häufig nur am Rande erwähnt. Der Beitrag analysiert die Integration von U(C)AVs in den operativen Flugzeugträgerbetrieb am Beispiel der X‑47B. Die Studie zeigt, dass es keine fundamentalen Probleme bei der Integration gibt, U(C)AVs in einem Fünf-Jahres-Horizont zur neuen maritimen Realität gehören und die Gefahr eines Rüstungswettlaufs in Bezug auf autonome Waffensysteme steigen wird.

    @article{schwartz_90000_2020,
    title = {90.000 {Tonnen} {Diplomatie} 2.0: {Die} {Integration} von unbemannten {Systemen} in den operativen {Flugzeugträgerbetrieb} am {Beispiel} der {X}-{47B}},
    volume = {13},
    url = {https://link.springer.com/content/pdf/10.1007/s12399-020-00803-y.pdf},
    doi = {10.1007/s12399-020-00803-y},
    abstract = {Die Debatte um die Integration von autonomen Systemen in Streitkräfte wird oftmals auf einer (militär-)strategischen Ebene geführt. Die technisch-operativen Aspekte werden außerhalb des Fachpublikums häufig nur am Rande erwähnt. Der Beitrag analysiert die Integration von U(C)AVs in den operativen Flugzeugträgerbetrieb am Beispiel der X‑47B. Die Studie zeigt, dass es keine fundamentalen Probleme bei der Integration gibt, U(C)AVs in einem Fünf-Jahres-Horizont zur neuen maritimen Realität gehören und die Gefahr eines Rüstungswettlaufs in Bezug auf autonome Waffensysteme steigen wird.},
    number = {1},
    journal = {Zeitschrift für Außen- und Sicherheitspolitik (ZfAS)},
    author = {Schwartz, Sebastian and Reuter, Christian},
    year = {2020},
    keywords = {Peace, Projekt-DualUse},
    }

  • Christian Reuter, Jürgen Altmann, Malte Göttsche, Mirko Himmel (2020)
    Natural Science and Technical Peace Research: Definition, History and Current Work
    S+F Sicherheit und Frieden / Peace and Security ;38(1):1–4. doi:10.5771/0175-274X-2020-1-1
    [BibTeX] [Abstract] [Download PDF]

    Scientific discoveries and technological innovations have always exerted a great influence on peace and security. New civil and military technologies are revolutionizing warfare. Particularly striking areas are cyber warfare and the rapid development of uninhabited weapon systems. Issues of nuclear disarmament, missile defence or space armament as well as chemical and biological weapons remain urgent. The conference SCIENCE · PEACE · SECURITY ’19 aimed for an accurate understanding and fruitful discussions of today’s and tomorrow’s peace and security challenges. This includes natural science/technical as well as interdisciplinary contribu-tions, focusing on problems of international security and peace-building as well as contributions dedicated to transparency, trust-building, arms control, disarmament, and conflict management. This special issue presents selected contributions based on discussions at the conference.

    @article{reuter_natural_2020,
    title = {Natural {Science} and {Technical} {Peace} {Research}: {Definition}, {History} and {Current} {Work}},
    volume = {38},
    url = {https://peasec.de/paper/2020/2020_ReuterAltmannGoettscheHimmel_NaturalScienceTechnicalPeaceResarchDefinitionHistoryWork_SF.pdf},
    doi = {10.5771/0175-274X-2020-1-1},
    abstract = {Scientific discoveries and technological innovations have always exerted a great influence on peace and security. New civil and military technologies are revolutionizing warfare. Particularly striking areas are cyber warfare and the rapid development of uninhabited weapon systems. Issues of nuclear disarmament, missile defence or space armament as well as chemical and biological weapons remain urgent. The conference SCIENCE · PEACE · SECURITY '19 aimed for an accurate understanding and fruitful discussions of today's and tomorrow's peace and security challenges. This includes natural science/technical as well as interdisciplinary contribu-tions, focusing on problems of international security and peace-building as well as contributions dedicated to transparency, trust-building, arms control, disarmament, and conflict management. This special issue presents selected contributions based on discussions at the conference.},
    number = {1},
    journal = {S+F Sicherheit und Frieden / Peace and Security},
    author = {Reuter, Christian and Altmann, Jürgen and Göttsche, Malte and Himmel, Mirko},
    year = {2020},
    keywords = {Security, Peace},
    pages = {1--4},
    }

  • Christian Reuter, Jürgen Altmann, Malte Göttsche, Mirko Himmel (2020)
    Editorial: Interdisciplinary Contributions to Natural-Science/Technical Peace Research
    S+F Sicherheit und Frieden / Peace and Security ;38(1):III–IV. doi:10.5771/0175-274X-2020-1-I
    [BibTeX] [Abstract] [Download PDF]

    This compilation of different articles, which is based on the conference SCIENCE PEACE SECURITY ’19 in Darmstadt, gives good insights into current research. Furthermore, this special issue aims at enhancing the understanding of current peace and security challenges. It includes contributions from natural science, technical peace research as well as interdis-ciplinary contributions.

    @article{reuter_editorial_2020,
    title = {Editorial: {Interdisciplinary} {Contributions} to {Natural}-{Science}/{Technical} {Peace} {Research}},
    volume = {38},
    url = {https://peasec.de/paper/2020/2020_ReuterAltmannGoettscheHimmel_Editorial_NaturalScienceTechnicalPeaceResarch_SF.pdf},
    doi = {10.5771/0175-274X-2020-1-I},
    abstract = {This compilation of different articles, which is based on the conference SCIENCE PEACE SECURITY '19 in Darmstadt, gives good insights into current research. Furthermore, this special issue aims at enhancing the understanding of current peace and security challenges. It includes contributions from natural science, technical peace research as well as interdis-ciplinary contributions.},
    number = {1},
    journal = {S+F Sicherheit und Frieden / Peace and Security},
    author = {Reuter, Christian and Altmann, Jürgen and Göttsche, Malte and Himmel, Mirko},
    year = {2020},
    keywords = {Peace},
    pages = {III--IV},
    }

  • Philipp Kuehn, Thea Riebe, Lynn Apelt, Max Jansen, Christian Reuter (2020)
    Sharing of Cyber Threat Intelligence between States
    S+F Sicherheit und Frieden / Peace and Security ;38(1):22–28. doi:10.5771/0175-274X-2020-1-22
    [BibTeX] [Abstract] [Download PDF]

    Threats in cyberspace have increased in recent years due to the increment of offensive capabilities by states. Approaches to mitigate the security dilemma in cyberspace within the UN are deadlocked, as states have not been able to achieve agreements. However, from the perspective of IT-Security, there are Cyber Threat Intelligence (CTI) platforms to share and analyze cyber threats for a collective crisis management. To investigate, whether or not CTI platforms can be used as a confidence-building measure between states and international organizations, we portray current CTI platforms, showcase political requirements, and answer the question of how CTI communication may contribute to confidence-building in international affairs. Our results suggest the need to further develop analytical capabilities, as well as the implementation of a broad social, political, and legal environment for international CTI sharing.

    @article{kuehn_sharing_2020,
    title = {Sharing of {Cyber} {Threat} {Intelligence} between {States}},
    volume = {38},
    url = {http://www.peasec.de/paper/2020/2020_KuehnRiebeApeltJansenReuter_SharingCyberThreatIntelligence_SF.pdf},
    doi = {10.5771/0175-274X-2020-1-22},
    abstract = {Threats in cyberspace have increased in recent years due to the increment of offensive capabilities by states. Approaches to mitigate the security dilemma in cyberspace within the UN are deadlocked, as states have not been able to achieve agreements. However, from the perspective of IT-Security, there are Cyber Threat Intelligence (CTI) platforms to share and analyze cyber threats for a collective crisis management. To investigate, whether or not CTI platforms can be used as a confidence-building measure between states and international organizations, we portray current CTI platforms, showcase political requirements, and answer the question of how CTI communication may contribute to confidence-building in international affairs. Our results suggest the need to further develop analytical capabilities, as well as the implementation of a broad social, political, and legal environment for international CTI sharing.},
    number = {1},
    journal = {S+F Sicherheit und Frieden / Peace and Security},
    author = {Kuehn, Philipp and Riebe, Thea and Apelt, Lynn and Jansen, Max and Reuter, Christian},
    year = {2020},
    keywords = {Student, Security, Peace, Projekt-DualUse, Cyberwar, Projekt-ATHENE-SecUrban, Projekt-CYWARN},
    pages = {22--28},
    }

  • Christian Reuter, Jürgen Altmann, Malte Göttsche, Mirko Himmel (2020)
    Zur naturwissenschaftlich-technischen Friedens- und Konfliktforschung – Aktuelle Herausforderungen und Bewertung der Empfehlungen des Wissenschaftsrats
    Zeitschrift für Friedens- und Konfliktforschung (ZeFKo) ;9(1):143–154. doi:10.1007/s42597-020-00035-z
    [BibTeX] [Abstract] [Download PDF]

    ie besorgniserregende Aufkündigung des INF-Vertrags, der wiederholte Einsatz von Chemiewaffen in Syrien, kontroverse Diskussionen über die Einführung autonomer Waffensysteme oder zunehmende Cyber-Bedrohungen prägen das aktuelle politische Weltgeschehen. Besonders in einer Zeit, in der nukleare, biologische und chemische Abrüstung- und Rüstungskontrollmaßnahmen vor großen Herausforderungen stehen und gleichzeitig neue Technologien veränderte Anforderungen an diese Kontrollmechanismen mit sich bringen, gewinnt die naturwissenschaftlich-technische Friedensforschung enorm an Bedeutung. Sie beschäftigt sich auf der Grundlage von Erkenntnissen aus verschiedenen Naturwissenschaften und technischen Fachrichtungen (z. B. Physik, Chemie, Biologie, Informatik) mit der Rolle naturwissenschaftlicher und technischer Möglichkeiten im Kontext von Krieg und Frieden sowie Rüstung und Abrüstung. Sie unterstützt die politischen Prozesse der Kriegsprävention, der Abrüstung und der Vertrauensbildung mit Analysen der Eigenschaften und Folgen neuer Waffenarten und Technologien. Aus dieser Forschung werden Vorschläge für die Begrenzung neuer Waffenentwicklungen ebenso entwickelt wie technische Lösungen für eine verbesserte Rüstungskontrolle. Dieser Artikel benennt aktuelle Herausforderungen der naturwissenschaftlich-technischen Friedensforschung und geht dabei auch auf die aktuellen Empfehlungen des Wissenschaftsrats zur Weiterentwicklung der Friedens- und Konfliktforschung aus dem Jahr 2019 ein.

    @article{reuter_zur_2020,
    title = {Zur naturwissenschaftlich-technischen {Friedens}- und {Konfliktforschung} – {Aktuelle} {Herausforderungen} und {Bewertung} der {Empfehlungen} des {Wissenschaftsrats}},
    volume = {9},
    url = {https://link.springer.com/content/pdf/10.1007/s42597-020-00035-z.pdf},
    doi = {10.1007/s42597-020-00035-z},
    abstract = {ie besorgniserregende Aufkündigung des INF-Vertrags, der wiederholte Einsatz von Chemiewaffen in Syrien, kontroverse Diskussionen über die Einführung autonomer Waffensysteme oder zunehmende Cyber-Bedrohungen prägen das aktuelle politische Weltgeschehen. Besonders in einer Zeit, in der nukleare, biologische und chemische Abrüstung- und Rüstungskontrollmaßnahmen vor großen Herausforderungen stehen und gleichzeitig neue Technologien veränderte Anforderungen an diese Kontrollmechanismen mit sich bringen, gewinnt die naturwissenschaftlich-technische Friedensforschung enorm an Bedeutung. Sie beschäftigt sich auf der Grundlage von Erkenntnissen aus verschiedenen Naturwissenschaften und technischen Fachrichtungen (z. B. Physik, Chemie, Biologie, Informatik) mit der Rolle naturwissenschaftlicher und technischer Möglichkeiten im Kontext von Krieg und Frieden sowie Rüstung und Abrüstung. Sie unterstützt die politischen Prozesse der Kriegsprävention, der Abrüstung und der Vertrauensbildung mit Analysen der Eigenschaften und Folgen neuer Waffenarten und Technologien. Aus dieser Forschung werden Vorschläge für die Begrenzung neuer Waffenentwicklungen ebenso entwickelt wie technische Lösungen für eine verbesserte Rüstungskontrolle. Dieser Artikel benennt aktuelle Herausforderungen der naturwissenschaftlich-technischen Friedensforschung und geht dabei auch auf die aktuellen Empfehlungen des Wissenschaftsrats zur Weiterentwicklung der Friedens- und Konfliktforschung aus dem Jahr 2019 ein.},
    number = {1},
    journal = {Zeitschrift für Friedens- und Konfliktforschung (ZeFKo)},
    author = {Reuter, Christian and Altmann, Jürgen and Göttsche, Malte and Himmel, Mirko},
    year = {2020},
    keywords = {Security, Peace, Projekt-CROSSING, Cyberwar, Projekt-ATHENE-SecUrban},
    pages = {143--154},
    }

  • Christian Reuter (2020)
    Towards IT Peace Research: Challenges at the Intersection of Peace and Conflict Research and Computer Science
    S+F Sicherheit und Frieden / Peace and Security ;38(1):10–16. doi:10.5771/0175-274X-2020-1-10
    [BibTeX] [Abstract] [Download PDF]

    Advances in science and technology, including information technology (IT), play a crucial role in the context of peace and security. However, research on the intersection of peace and conflict research as well as computer science is not well established yet. This article highlights the need for further work in the area of research “IT peace research”, which includes both empirical research on the role of IT in peace and security, as well as technical research to design technologies and applications. Based on the elaboration of the disciplines, central challenges, such as insecurity, actors, attribution and laws, are outlined.

    @article{reuter_towards_2020-1,
    title = {Towards {IT} {Peace} {Research}: {Challenges} at the {Intersection} of {Peace} and {Conflict} {Research} and {Computer} {Science}},
    volume = {38},
    url = {https://www.nomos-elibrary.de/10.5771/0175-274X-2020-1-10.pdf},
    doi = {10.5771/0175-274X-2020-1-10},
    abstract = {Advances in science and technology, including information technology (IT), play a crucial role in the context of peace and security. However, research on the intersection of peace and conflict research as well as computer science is not well established yet. This article highlights the need for further work in the area of research “IT peace research”, which includes both empirical research on the role of IT in peace and security, as well as technical research to design technologies and applications. Based on the elaboration of the disciplines, central challenges, such as insecurity, actors, attribution and laws, are outlined.},
    number = {1},
    journal = {S+F Sicherheit und Frieden / Peace and Security},
    author = {Reuter, Christian},
    year = {2020},
    keywords = {Security, Peace, Projekt-DualUse, AuswahlPeace, Cyberwar, Projekt-ATHENE-SecUrban},
    pages = {10--16},
    }

  • Christian Reuter, Jürgen Altmann, Malte Göttsche, Mirko Himmel (2020)
    Special Issue: Interdisciplinary Contributions to Natural Science/Technical Peace Research – S+F Sicherheit und Frieden / Peace and Security
    Nomos. doi:10.5771/0175-274X-2020-1
    [BibTeX] [Download PDF]

    @book{reuter_special_2020-1,
    title = {Special {Issue}: {Interdisciplinary} {Contributions} to {Natural} {Science}/{Technical} {Peace} {Research} - {S}+{F} {Sicherheit} und {Frieden} / {Peace} and {Security}},
    volume = {38},
    url = {https://peasec.de/paper/2020/2020_ReuterAltmannGoettscheHimmel_SpecIss_NaturalScienceTechnicalPeaceResarch_SF.pdf},
    number = {1},
    publisher = {Nomos},
    author = {Reuter, Christian and Altmann, Jürgen and Göttsche, Malte and Himmel, Mirko},
    year = {2020},
    doi = {10.5771/0175-274X-2020-1},
    note = {Publication Title: S+F Sicherheit und Frieden / Peace and Security},
    keywords = {Peace, Projekt-DualUse, AuswahlPeace},
    }

  • Thomas Reinhold (2020)
    Verfassungs- und völkerrechtliche Fragen im militärischen Cyber- und Informationsraum unter besonderer Berücksichtigung des Parlamentsvorbehalts, der Zurechenbarkeit von Cyberangriffen sowie einer möglichen Anpassung nationaler und internationaler Normen
    In: : Deutscher Bundestag, Verteidigungsausschuss. Deutscher Bundestag, Verteidigungsausschuss, , 1–9.
    [BibTeX] [Download PDF]

    @incollection{reinhold_verfassungs-_2020,
    title = {Verfassungs- und völkerrechtliche {Fragen} im militärischen {Cyber}- und {Informationsraum} unter besonderer {Berücksichtigung} des {Parlamentsvorbehalts}, der {Zurechenbarkeit} von {Cyberangriffen} sowie einer möglichen {Anpassung} nationaler und internationaler {Normen}},
    url = {https://www.bundestag.de/resource/blob/824622/67fc9db4f856a8445355562500d2a134/stellungnahme-Thomas-Reinhold_15-03-2021-data.pdf},
    booktitle = {Deutscher {Bundestag}, {Verteidigungsausschuss}},
    publisher = {Deutscher Bundestag, Verteidigungsausschuss},
    author = {Reinhold, Thomas},
    year = {2020},
    keywords = {Security, Peace, Cyberwar, Projekt-ATHENE-SecUrban},
    pages = {1--9},
    }

  • Thea Riebe (2020)
    Umgang mit Killerrobotern
    2020.
    [BibTeX] [Download PDF]

    @techreport{riebe_umgang_2020,
    title = {Umgang mit {Killerrobotern}},
    url = {https://peasec.de/paper/2020/2020_Riebe_UmgangmitKillerbotobern_WF.pdf},
    author = {Riebe, Thea},
    year = {2020},
    keywords = {Peace, Projekt-DualUse},
    }

    2019

  • Christian Reuter (2019)
    Fake News und manipulierte Meinungsbildung
    In: Christian Reuter, Tanjev Schultz, Christian Stegbauer: Die Digitalisierung der Kommunikation: Gesellschaftliche Trends und der Wandel von Organisationen. Frankfurt am Main: Mercator Science-Policy Fellowship-Programme, , 15–19.
    [BibTeX] [Abstract] [Download PDF]

    Konsequentes Vorgehen von Behörden gegen gezielte Falschnachrichten – das wünscht sich laut einer repräsentativen Studie eine große Mehrheit der Bevölkerung in Deutschland. Das Fachgebiet Wissenschaft und Technik für Frieden und Sicherheit (PEASEC) der Technischen Universität Darmstadt fragte unter anderem danach, wie Bürgerinnen und Bürger Fake News wahrnehmen und auf sie reagieren und welche Gegenmaßnahmen als sinnvoll erachtet werden.

    @incollection{reuter_fake_2019,
    address = {Frankfurt am Main},
    title = {Fake {News} und manipulierte {Meinungsbildung}},
    url = {http://publikationen.ub.uni-frankfurt.de/opus4/files/47852/PolicyPaper5_Digitalisierung_Kommunikation_deutsch.pdf},
    abstract = {Konsequentes Vorgehen von Behörden gegen gezielte Falschnachrichten – das wünscht sich laut einer repräsentativen Studie eine große Mehrheit der Bevölkerung in Deutschland. Das Fachgebiet Wissenschaft und Technik für Frieden und Sicherheit (PEASEC) der Technischen Universität Darmstadt fragte unter anderem danach, wie Bürgerinnen und Bürger Fake News wahrnehmen und auf sie reagieren und welche Gegenmaßnahmen als sinnvoll erachtet werden.},
    booktitle = {Die {Digitalisierung} der {Kommunikation}: {Gesellschaftliche} {Trends} und der {Wandel} von {Organisationen}},
    publisher = {Mercator Science-Policy Fellowship-Programme},
    author = {Reuter, Christian},
    editor = {Reuter, Christian and Schultz, Tanjev and Stegbauer, Christian},
    year = {2019},
    keywords = {Crisis, HCI, SocialMedia, Peace},
    pages = {15--19},
    }

  • Christian Reuter, Thea Riebe, Larissa Aldehoff, Marc-André Kaufhold, Thomas Reinhold (2019)
    Cyberwar zwischen Fiktion und Realität – technologische Möglichkeiten
    In: Ines-Jacqueline Werkner, Niklas Schörnig: Cyberwar – die Digitalisierung der Kriegsführung. Springer VS, , 15–38. doi:10.1007/978-3-658-27713-0
    [BibTeX] [Abstract] [Download PDF]

    Im Dezember 2017 wurde eine Invasion des deutschen Regierungsnetzwerks entdeckt; dieses vernetzt Bundesministerien und Behörden (vgl. Reinhold 2018a). Die Angreifer nutzten das Intranet der Hochschule des Bundes für öffentliche Verwaltung und der Bundesakademie für öffentliche Verwaltung als Einfallstor. Dieses ist der am wenigsten gesicherte Teil des Systems, da externe Teilnehmerinnen und Teilnehmer auch außerhalb der Einrichtung darauf zugreifen müssen, beispielsweise für Fortbildungen des Auswärtigen Amtes.

    @incollection{reuter_cyberwar_2019,
    title = {Cyberwar zwischen {Fiktion} und {Realität} – technologische {Möglichkeiten}},
    isbn = {978-3-658-27713-0},
    url = {https://peasec.de/paper/2019/2019_ReuterRiebeAldehoffKaufholdReinhold2019_CyberwarZwischenFiktionUndReal_Cyberwar.pdf},
    abstract = {Im Dezember 2017 wurde eine Invasion des deutschen Regierungsnetzwerks entdeckt; dieses vernetzt Bundesministerien und Behörden (vgl. Reinhold 2018a). Die Angreifer nutzten das Intranet der Hochschule des Bundes für öffentliche Verwaltung und der Bundesakademie für öffentliche Verwaltung als Einfallstor. Dieses ist der am wenigsten gesicherte Teil des Systems, da externe Teilnehmerinnen und Teilnehmer auch außerhalb der Einrichtung darauf zugreifen müssen, beispielsweise für Fortbildungen des Auswärtigen Amtes.},
    booktitle = {Cyberwar – die {Digitalisierung} der {Kriegsführung}},
    publisher = {Springer VS},
    author = {Reuter, Christian and Riebe, Thea and Aldehoff, Larissa and Kaufhold, Marc-André and Reinhold, Thomas},
    editor = {Werkner, Ines-Jacqueline and Schörnig, Niklas},
    year = {2019},
    doi = {10.1007/978-3-658-27713-0},
    keywords = {Security, Peace, Projekt-DualUse, Cyberwar},
    pages = {15--38},
    }

  • Katrin Hartwig, Christian Reuter (2019)
    TrustyTweet: An Indicator-based Browser-Plugin to Assist Users in Dealing with Fake News on Twitter
    Proceedings of the International Conference on Wirtschaftsinformatik (WI) Siegen, Germany.
    [BibTeX] [Abstract] [Download PDF]

    The importance of dealing withfake newsonsocial mediahas increased both in political and social contexts.While existing studies focus mainly on how to detect and label fake news, approaches to assist usersin making their own assessments are largely missing. This article presents a study on how Twitter-users’assessmentscan be supported by an indicator-based white-box approach.First, we gathered potential indicators for fake news that have proven to be promising in previous studies and that fit our idea of awhite-box approach. Based on those indicators we then designed and implemented the browser-plugin TrusyTweet, which assists users on Twitterin assessing tweetsby showing politically neutral and intuitive warnings without creating reactance. Finally, we suggest the findings of our evaluations with a total of 27 participants which lead to further design implicationsfor approachesto assistusers in dealing with fake news.

    @inproceedings{hartwig_trustytweet_2019,
    address = {Siegen, Germany},
    title = {{TrustyTweet}: {An} {Indicator}-based {Browser}-{Plugin} to {Assist} {Users} in {Dealing} with {Fake} {News} on {Twitter}},
    url = {http://www.peasec.de/paper/2019/2019_HartwigReuter_TrustyTweet_WI.pdf},
    abstract = {The importance of dealing withfake newsonsocial mediahas increased both in political and social contexts.While existing studies focus mainly on how to detect and label fake news, approaches to assist usersin making their own assessments are largely missing. This article presents a study on how Twitter-users'assessmentscan be supported by an indicator-based white-box approach.First, we gathered potential indicators for fake news that have proven to be promising in previous studies and that fit our idea of awhite-box approach. Based on those indicators we then designed and implemented the browser-plugin TrusyTweet, which assists users on Twitterin assessing tweetsby showing politically neutral and intuitive warnings without creating reactance. Finally, we suggest the findings of our evaluations with a total of 27 participants which lead to further design implicationsfor approachesto assistusers in dealing with fake news.},
    booktitle = {Proceedings of the {International} {Conference} on {Wirtschaftsinformatik} ({WI})},
    publisher = {AIS},
    author = {Hartwig, Katrin and Reuter, Christian},
    year = {2019},
    keywords = {Crisis, HCI, SocialMedia, Student, Ranking-CORE-C, Ranking-VHB-C, Ranking-WKWI-A, Peace, Projekt-CRISP, Projekt-ATHENE-FANCY},
    pages = {1858--1869},
    }

  • Thea Riebe, Christian Reuter (2019)
    Accessing Dual Use in IT Development
    SCIENCE PEACE SECURITY ’19 – Proceedings of the Interdisciplinary Conference on Technical Peace and Security Research Darmstadt, Germany.
    [BibTeX] [Abstract] [Download PDF]

    The use of information technology (IT) in peace, conflict and security raises some questions, i.e. whether the use of IT can be limited exclusively to so-called advantageous purposes and applications and whether improper use can be prevented. This ambivalence is called a dual- use dilemma, meaning that objects, knowledge and technology can find both useful and harm- ful applications. Dual-use questions have been addressed in various disciplines, in particular in nuclear technology and the production of nuclear weapons, but also in chemistry and biology. In all these disciplines, dual-use topics in technical development and education have been discussed and addressed. Nevertheless, the importance of dual-use differs slightly, depending on the technology and its risks, as well as its distribution and application. Nuclear technology is less accessible than biotechnology, which in turn is less accessible than IT.

    @inproceedings{riebe_accessing_2019,
    address = {Darmstadt, Germany},
    title = {Accessing {Dual} {Use} in {IT} {Development}},
    url = {https://peasec.de/paper/2019/2019_RiebeReuter_AccessingDualUse_ProcSciencePeaceSecurity-TUprints.pdf},
    abstract = {The use of information technology (IT) in peace, conflict and security raises some questions, i.e. whether the use of IT can be limited exclusively to so-called advantageous purposes and applications and whether improper use can be prevented. This ambivalence is called a dual- use dilemma, meaning that objects, knowledge and technology can find both useful and harm- ful applications. Dual-use questions have been addressed in various disciplines, in particular in nuclear technology and the production of nuclear weapons, but also in chemistry and biology. In all these disciplines, dual-use topics in technical development and education have been discussed and addressed. Nevertheless, the importance of dual-use differs slightly, depending on the technology and its risks, as well as its distribution and application. Nuclear technology is less accessible than biotechnology, which in turn is less accessible than IT.},
    booktitle = {{SCIENCE} {PEACE} {SECURITY} '19 - {Proceedings} of the {Interdisciplinary} {Conference} on {Technical} {Peace} and {Security} {Research}},
    publisher = {TUprints},
    author = {Riebe, Thea and Reuter, Christian},
    year = {2019},
    keywords = {Peace, Projekt-DualUse},
    pages = {46--49},
    }

  • Christian Reuter, Jürgen Altmann, Malte Göttsche, Mirko Himmel (2019)
    SCIENCE PEACE SECURITY ’19 – An Editorial
    In: Christian Reuter, Jürgen Altmann, Malte Göttsche, Mirko Himmel: SCIENCE PEACE SECURITY ’19 – Proceedings of the Interdisciplinary Conference on Technical Peace and Security Research. Darmstadt, Germany: TUprints, , 7–10.
    [BibTeX] [Abstract] [Download PDF]

    In its recommendations for the further development of peace and conflict research published in July 2019, the German Council of Science and Humanities (Wissenschaftsrat), as the most important science policy advisory body in Germany, stated that urgent action was needed to strengthen scientific and technical peace and conflict research. As a positive example of the permanent establishment of this field of research at a university, the TU Darmstadt was named. This is where the first edition of the conference series „SCIENCE · PEACE · SECURITY“ took place.

    @incollection{reuter_science_2019-1,
    address = {Darmstadt, Germany},
    title = {{SCIENCE} {PEACE} {SECURITY} '19 – {An} {Editorial}},
    url = {https://tuprints.ulb.tu-darmstadt.de/id/eprint/9164},
    abstract = {In its recommendations for the further development of peace and conflict research published in July 2019, the German Council of Science and Humanities (Wissenschaftsrat), as the most important science policy advisory body in Germany, stated that urgent action was needed to strengthen scientific and technical peace and conflict research. As a positive example of the permanent establishment of this field of research at a university, the TU Darmstadt was named. This is where the first edition of the conference series "SCIENCE · PEACE · SECURITY" took place.},
    booktitle = {{SCIENCE} {PEACE} {SECURITY} '19 - {Proceedings} of the {Interdisciplinary} {Conference} on {Technical} {Peace} and {Security} {Research}},
    publisher = {TUprints},
    author = {Reuter, Christian and Altmann, Jürgen and Göttsche, Malte and Himmel, Mirko},
    editor = {Reuter, Christian and Altmann, Jürgen and Göttsche, Malte and Himmel, Mirko},
    year = {2019},
    keywords = {Security, Peace},
    pages = {7--10},
    }

  • Marc-André Kaufhold, Christian Reuter (2019)
    Social Media Misuse: Cultural Violence, Peace and Security in Digital Networks
    SCIENCE PEACE SECURITY ’19 – Proceedings of the Interdisciplinary Conference on Technical Peace and Security Research Darmstadt, Germany.
    [BibTeX] [Abstract] [Download PDF]

    Over the last decade, social media established an enormous impact on modern culture not only for everyday life uses, but also during natural and man-made crises and conflicts. For instance, Facebook was part of the Arabic Spring, in which the tool facilitated the communication and interaction between participants of political protests. However, social media is not only used for good purposes and offers potentials for misuse: fake news manipulate public discourses, cyber terrorism aims to recruit new members and disseminate ideologies, and social bots in- fluence economic as well as political processes. Based on the notions of cultural violence and cultural peace as well as the phenomena of fake news, terrorism, and social bots, this paper outlines countermeasures to facilitate cultural peace and security.

    @inproceedings{kaufhold_social_2019,
    address = {Darmstadt, Germany},
    title = {Social {Media} {Misuse}: {Cultural} {Violence}, {Peace} and {Security} in {Digital} {Networks}},
    url = {https://tuprints.ulb.tu-darmstadt.de/id/eprint/9164},
    abstract = {Over the last decade, social media established an enormous impact on modern culture not only for everyday life uses, but also during natural and man-made crises and conflicts. For instance, Facebook was part of the Arabic Spring, in which the tool facilitated the communication and interaction between participants of political protests. However, social media is not only used for good purposes and offers potentials for misuse: fake news manipulate public discourses, cyber terrorism aims to recruit new members and disseminate ideologies, and social bots in- fluence economic as well as political processes. Based on the notions of cultural violence and cultural peace as well as the phenomena of fake news, terrorism, and social bots, this paper outlines countermeasures to facilitate cultural peace and security.},
    booktitle = {{SCIENCE} {PEACE} {SECURITY} '19 - {Proceedings} of the {Interdisciplinary} {Conference} on {Technical} {Peace} and {Security} {Research}},
    publisher = {TUprints},
    author = {Kaufhold, Marc-André and Reuter, Christian},
    editor = {Reuter, Christian and Altmann, Jürgen and Göttsche, Malte and Himmel, Mirko},
    year = {2019},
    keywords = {Crisis, SocialMedia, Peace},
    pages = {61--66},
    }

  • Marc-André Kaufhold, Christian Reuter (2019)
    Cultural Violence and Peace in Social Media
    In: Christian Reuter: Information Technology for Peace and Security – IT-Applications and Infrastructures in Conflicts, Crises, War, and Peace. Wiesbaden, Germany: Springer Vieweg, , 361–381. doi:10.1007/978-3-658-25652-4_17
    [BibTeX] [Abstract] [Download PDF]

    Over the last decade, social media services had an enormous impact on modern culture. They are nowadays widely established in everyday life, but also during natural and man-made crises and conflicts. For instance, Facebook was part of the Arabic Spring, in which the tool facilitated the communication and interaction between participants of political protests. On the contrary, terrorists may recruit new members and disseminate ideologies, and social bots may influence social and political processes. Based on the notions of cultural violence and cultural peace as well as the phenomena of fake news, terrorism and social bots, this exploratory review firstly presents human cultural inter-ventions in social media (e.g. dissemination of fake news and terroristic propaganda) and respective countermeasures (e.g. fake news detection and counter-narratives). Sec-ondly, it discusses automatic cultural interventions realised via social bots (e.g. astro-turfing, misdirection and smoke screening) and countermeasures (e.g. crowdsourcing and social bot detection). Finally, this chapter concludes with a range of cultural inter-ventions and information and communication technology (ICT) in terms of actors and intentions to identify future research potential for supporting situational assessments during conflicts.

    @incollection{kaufhold_cultural_2019,
    address = {Wiesbaden, Germany},
    title = {Cultural {Violence} and {Peace} in {Social} {Media}},
    isbn = {978-3-658-25652-4},
    url = {https://www.springer.com/de/book/9783658256517},
    abstract = {Over the last decade, social media services had an enormous impact on modern culture. They are nowadays widely established in everyday life, but also during natural and man-made crises and conflicts. For instance, Facebook was part of the Arabic Spring, in which the tool facilitated the communication and interaction between participants of political protests. On the contrary, terrorists may recruit new members and disseminate ideologies, and social bots may influence social and political processes. Based on the notions of cultural violence and cultural peace as well as the phenomena of fake news, terrorism and social bots, this exploratory review firstly presents human cultural inter-ventions in social media (e.g. dissemination of fake news and terroristic propaganda) and respective countermeasures (e.g. fake news detection and counter-narratives). Sec-ondly, it discusses automatic cultural interventions realised via social bots (e.g. astro-turfing, misdirection and smoke screening) and countermeasures (e.g. crowdsourcing and social bot detection). Finally, this chapter concludes with a range of cultural inter-ventions and information and communication technology (ICT) in terms of actors and intentions to identify future research potential for supporting situational assessments during conflicts.},
    booktitle = {Information {Technology} for {Peace} and {Security} - {IT}-{Applications} and {Infrastructures} in {Conflicts}, {Crises}, {War}, and {Peace}},
    publisher = {Springer Vieweg},
    author = {Kaufhold, Marc-André and Reuter, Christian},
    editor = {Reuter, Christian},
    year = {2019},
    doi = {10.1007/978-3-658-25652-4_17},
    keywords = {Crisis, HCI, SocialMedia, Peace, Projekt-CRISP},
    pages = {361--381},
    }

  • Christian Reuter (2019)
    Information Technology for Peace and Security – IT-Applications and Infrastructures in Conflicts, Crises, War, and Peace
    Wiesbaden, Germany: Springer Vieweg. doi:10.1007/978-3-658-25652-4
    [BibTeX] [Abstract] [Download PDF]

    Technological and scientific progress, especially the rapid development in information technology (IT), plays a crucial role regarding questions of peace and security. This textbook addresses the significance, potentials and challenges of IT for peace and securi-ty. For this purpose, the book offers an introduction to peace, conflict, and security research, thereby focusing on natural-science, technical and computer science perspec-tives. In the following, it sheds light on cyber conflicts, war and peace, cyber arms con-trol, cyber attribution and infrastructures as well as culture and interaction before an outlook is given.

    @book{reuter_information_2019-1,
    address = {Wiesbaden, Germany},
    title = {Information {Technology} for {Peace} and {Security} - {IT}-{Applications} and {Infrastructures} in {Conflicts}, {Crises}, {War}, and {Peace}},
    isbn = {978-3-658-25652-4},
    url = {https://www.springer.com/de/book/9783658256517},
    abstract = {Technological and scientific progress, especially the rapid development in information technology (IT), plays a crucial role regarding questions of peace and security. This textbook addresses the significance, potentials and challenges of IT for peace and securi-ty. For this purpose, the book offers an introduction to peace, conflict, and security research, thereby focusing on natural-science, technical and computer science perspec-tives. In the following, it sheds light on cyber conflicts, war and peace, cyber arms con-trol, cyber attribution and infrastructures as well as culture and interaction before an outlook is given.},
    publisher = {Springer Vieweg},
    author = {Reuter, Christian},
    year = {2019},
    doi = {10.1007/978-3-658-25652-4},
    keywords = {Crisis, Selected, Security, Peace, Infrastructure, Projekt-CRISP, Projekt-DualUse, RSF, Projekt-CROSSING, AuswahlPeace, Cyberwar, Projekt-MAKI},
    }

  • Stefka Schmid, Thea Riebe, Christian Reuter (2019)
    Meaningful Human Control of Lethal Autonomous Weapon Systems
    In: Christian Reuter, Jürgen Altmann, Malte Göttsche, Mirko Himmel: SCIENCE PEACE SECURITY ’19 – Proceedings of the Interdisciplinary Conference on Technical Peace and Security Research. Darmstadt, Germany: TUprints, , 196–200.
    [BibTeX] [Abstract] [Download PDF]

    In the discussion of lethal autonomous weapon systems (LAWS) in the expert forum of the Convention on Certain Conventional Weapons (CCW), the interpretation of crucial concepts such as autonomy and human control is decisive for the future direction of international hu- manitarian law. Starting from the perspective of a synthesis of Actor-Network Theory (ANT) and Value-Sensitive-Design (VSD), we aim to analyse the discourse of LAWS and ask for pos- sibilities to implement Meaningful Human Control.

    @incollection{schmid_meaningful_2019,
    address = {Darmstadt, Germany},
    title = {Meaningful {Human} {Control} of {Lethal} {Autonomous} {Weapon} {Systems}},
    url = {https://tuprints.ulb.tu-darmstadt.de/id/eprint/9164},
    abstract = {In the discussion of lethal autonomous weapon systems (LAWS) in the expert forum of the Convention on Certain Conventional Weapons (CCW), the interpretation of crucial concepts such as autonomy and human control is decisive for the future direction of international hu- manitarian law. Starting from the perspective of a synthesis of Actor-Network Theory (ANT) and Value-Sensitive-Design (VSD), we aim to analyse the discourse of LAWS and ask for pos- sibilities to implement Meaningful Human Control.},
    booktitle = {{SCIENCE} {PEACE} {SECURITY} '19 - {Proceedings} of the {Interdisciplinary} {Conference} on {Technical} {Peace} and {Security} {Research}},
    publisher = {TUprints},
    author = {Schmid, Stefka and Riebe, Thea and Reuter, Christian},
    editor = {Reuter, Christian and Altmann, Jürgen and Göttsche, Malte and Himmel, Mirko},
    year = {2019},
    keywords = {Student, Security, Peace, Projekt-DualUse},
    pages = {196--200},
    }

  • Thomas Reinhold, Christian Reuter (2019)
    From Cyber War to Cyber Peace
    In: Christian Reuter: Information Technology for Peace and Security – IT-Applications and Infrastructures in Conflicts, Crises, War, and Peace. Wiesbaden, Germany: Springer Vieweg, , 139–164. doi:10.1007/978-3-658-25652-4_7
    [BibTeX] [Abstract] [Download PDF]

    The encompassing trend of digitalisation and widespread dependencies on IT systems triggers adjustments also in the military forces. Besides necessary enhancements of IT security and defensive measures for cyberspace, a growing number of states are estab-lishing offensive military capabilities for this domain. Looking at historical develop-ments and transformations due to advancements in military technologies, the chapter discusses the political progress made and tools developed since. Both of these have con-tributed to handling challenges and confining threats to international security. With this background, the text assesses a possible application of these efforts to developments concerning cyberspace, as well as obstacles that need to be tackled for it to be success-ful. The chapter points out political advancements already in progress, the role of social initiatives, such as the cyber peace campaign of the Forum of Computer Scientists for Peace and Societal Responsibility (FifF), as well as potential consequences of the rising probability of cyber war as opposed to the prospects of cyber peace.

    @incollection{reinhold_cyber_2019,
    address = {Wiesbaden, Germany},
    title = {From {Cyber} {War} to {Cyber} {Peace}},
    isbn = {978-3-658-25652-4},
    url = {https://www.springer.com/de/book/9783658256517},
    abstract = {The encompassing trend of digitalisation and widespread dependencies on IT systems triggers adjustments also in the military forces. Besides necessary enhancements of IT security and defensive measures for cyberspace, a growing number of states are estab-lishing offensive military capabilities for this domain. Looking at historical develop-ments and transformations due to advancements in military technologies, the chapter discusses the political progress made and tools developed since. Both of these have con-tributed to handling challenges and confining threats to international security. With this background, the text assesses a possible application of these efforts to developments concerning cyberspace, as well as obstacles that need to be tackled for it to be success-ful. The chapter points out political advancements already in progress, the role of social initiatives, such as the cyber peace campaign of the Forum of Computer Scientists for Peace and Societal Responsibility (FifF), as well as potential consequences of the rising probability of cyber war as opposed to the prospects of cyber peace.},
    booktitle = {Information {Technology} for {Peace} and {Security} - {IT}-{Applications} and {Infrastructures} in {Conflicts}, {Crises}, {War}, and {Peace}},
    publisher = {Springer Vieweg},
    author = {Reinhold, Thomas and Reuter, Christian},
    editor = {Reuter, Christian},
    year = {2019},
    doi = {10.1007/978-3-658-25652-4_7},
    keywords = {Security, Peace, Projekt-CRISP, Projekt-DualUse, Projekt-CROSSING, Cyberwar},
    pages = {139--164},
    }

  • Christian Reuter (2019)
    Fake News and the Manipulation of Public Opinion
    In: Christian Reuter, Tanjev Schultz, Christian Stegbauer: Digitalisation and Communication: Societal Trends and the Change in Organisations. Frankfurt am Main: Mercator Science-Policy Fellowship-Programme, , 13–16.
    [BibTeX] [Abstract] [Download PDF]

    Per a recent study, a majority of Germans wants to see strict action taken against the targeted spread of disinformation in the news. Researchers in the Science and Technology for Peace and Security (PEASEC) research group at Technische Universität Darmstadt investigated how German citizens perceive and react to fake news and asked them what countermeasures they would consider to be most appropriate.

    @incollection{reuter_fake_2019-1,
    address = {Frankfurt am Main},
    title = {Fake {News} and the {Manipulation} of {Public} {Opinion}},
    url = {http://publikationen.ub.uni-frankfurt.de/opus4/files/47853/SPPaper6_Digitalisation_Communication_English.pdf},
    abstract = {Per a recent study, a majority of Germans wants to see strict action taken against the targeted spread of disinformation in the news. Researchers in the Science and Technology for Peace and Security (PEASEC) research group at Technische Universität Darmstadt investigated how German citizens perceive and react to fake news and asked them what countermeasures they would consider to be most appropriate.},
    booktitle = {Digitalisation and {Communication}: {Societal} {Trends} and the {Change} in {Organisations}},
    publisher = {Mercator Science-Policy Fellowship-Programme},
    author = {Reuter, Christian},
    editor = {Reuter, Christian and Schultz, Tanjev and Stegbauer, Christian},
    year = {2019},
    keywords = {Crisis, Peace},
    pages = {13--16},
    }

  • Amanda Langer, Marc-André Kaufhold, Elena Runft, Christian Reuter, Margarita Grinko, Volkmar Pipek (2019)
    Counter Narratives in Social Media: An Empirical Study on Combat and Prevention of Terrorism
    Proceedings of the Information Systems for Crisis Response and Management (ISCRAM) València, Spain.
    [BibTeX] [Abstract] [Download PDF]

    With the increase of terrorist attacks and spreading extremism worldwide, countermeasures advance as well. Often social media is used for recruitment and radicalization of susceptible target groups. Counter narratives are trying to disclose the illusion created by radical and extremist groups through a purposive and educational counter statement, and to initiate a rethinking in the affected individuals via thought-provoking impulses and advice. This exploratory study investigates counter narrative campaigns with regard to their fight and prevention against terrorism in social media. Posts with strong emotions and a personal reference to affected individuals achieved the highest impact and most reactions from the target group. Furthermore, our results illustrate that the impact of a counter narrative campaign cannot be measured solely according to the reaction rate to their postings and that further analysis steps are therefore necessary for the final evaluation of the campaigns.

    @inproceedings{langer_counter_2019,
    address = {València, Spain},
    title = {Counter {Narratives} in {Social} {Media}: {An} {Empirical} {Study} on {Combat} and {Prevention} of {Terrorism}},
    url = {http://www.peasec.de/paper/2019/2019_Langeretal_Counternarratives_ISCRAM.pdf},
    abstract = {With the increase of terrorist attacks and spreading extremism worldwide, countermeasures advance as well. Often social media is used for recruitment and radicalization of susceptible target groups. Counter narratives are trying to disclose the illusion created by radical and extremist groups through a purposive and educational counter statement, and to initiate a rethinking in the affected individuals via thought-provoking impulses and advice. This exploratory study investigates counter narrative campaigns with regard to their fight and prevention against terrorism in social media. Posts with strong emotions and a personal reference to affected individuals achieved the highest impact and most reactions from the target group. Furthermore, our results illustrate that the impact of a counter narrative campaign cannot be measured solely according to the reaction rate to their postings and that further analysis steps are therefore necessary for the final evaluation of the campaigns.},
    booktitle = {Proceedings of the {Information} {Systems} for {Crisis} {Response} and {Management} ({ISCRAM})},
    publisher = {ISCRAM Association},
    author = {Langer, Amanda and Kaufhold, Marc-André and Runft, Elena and Reuter, Christian and Grinko, Margarita and Pipek, Volkmar},
    editor = {Franco, Zeno and González, José J. and Canós, José H.},
    year = {2019},
    keywords = {Crisis, SocialMedia, Student, Projekt-KontiKat, Peace},
    pages = {746--755},
    }

  • Katrin Hartwig, Christian Reuter (2019)
    Fighting Misinformation on Twitter: The Plugin based approach TrustyTweet
    SCIENCE PEACE SECURITY ’19 – Proceedings of the Interdisciplinary Conference on Technical Peace and Security Research Darmstadt, Germany.
    [BibTeX] [Abstract] [Download PDF]

    Finding a responsible way to address fake news on social media has become an urgent matter both in political and social contexts. Existing studies focus mainly on how to detect and label fake news. However, approaches to assist users in making their own assessments are largely missing. In this article we present a study on how an indicator-based white-box approach can support Twitter-users in assessing tweets. In a first step, we identified indicators for fake news that have shown to be promising in previous studies and that are suitable for our idea of a white-box approach. Building on that basis of indicators we then designed and implemented the browser-plugin TrustyTweet, which aims to assist users on Twitter in assessing tweets by showing politically neutral and intuitive warnings without creating reactance. Finally, we present the findings of our evaluations carried out with a total of 27 participants, which result in further design implications for approaches to assist users in dealing with fake news.

    @inproceedings{hartwig_fighting_2019,
    address = {Darmstadt, Germany},
    title = {Fighting {Misinformation} on {Twitter}: {The} {Plugin} based approach {TrustyTweet}},
    url = {https://tuprints.ulb.tu-darmstadt.de/id/eprint/9164},
    abstract = {Finding a responsible way to address fake news on social media has become an urgent matter both in political and social contexts. Existing studies focus mainly on how to detect and label fake news. However, approaches to assist users in making their own assessments are largely missing. In this article we present a study on how an indicator-based white-box approach can support Twitter-users in assessing tweets. In a first step, we identified indicators for fake news that have shown to be promising in previous studies and that are suitable for our idea of a white-box approach. Building on that basis of indicators we then designed and implemented the browser-plugin TrustyTweet, which aims to assist users on Twitter in assessing tweets by showing politically neutral and intuitive warnings without creating reactance. Finally, we present the findings of our evaluations carried out with a total of 27 participants, which result in further design implications for approaches to assist users in dealing with fake news.},
    booktitle = {{SCIENCE} {PEACE} {SECURITY} '19 - {Proceedings} of the {Interdisciplinary} {Conference} on {Technical} {Peace} and {Security} {Research}},
    publisher = {TUprints},
    author = {Hartwig, Katrin and Reuter, Christian},
    editor = {Reuter, Christian and Altmann, Jürgen and Göttsche, Malte and Himmel, Mirko},
    year = {2019},
    keywords = {Crisis, HCI, SocialMedia, Peace},
    pages = {67--69},
    }

  • Larissa Aldehoff, Meri Dankenbring, Christian Reuter (2019)
    Renouncing Privacy in Crisis Management? People’s View on Social Media Monitoring and Surveillance
    Proceedings of the Information Systems for Crisis Response and Management (ISCRAM) València, Spain.
    [BibTeX] [Abstract] [Download PDF]

    Social media is used during crises and disasters by state authorities and citizens to communicate and provide, gain and analyze information. Monitoring of platforms in such cases is both a well-established practice and a research area. The question, whether people are willing to renounce privacy in social media during critical incidents, or even allow surveillance in order to contribute to public security, remains unanswered. Our survey of 1,024 German inhabitants is the first empirical study on people’s views on social media monitoring and surveillance in crisis management. We find the willingness to share data during an imminent threat depends mostly on the type of data: a majority (63\% and 67\%, respectively) would give access to addresses and telephone numbers, whereas the willingness to share content of chats or telephone calls is significantly lower (27\%). Our analysis reveals diverging opinions among participants and some effects of sociodemographic variables on the acceptance of invasions into privacy.

    @inproceedings{aldehoff_renouncing_2019,
    address = {València, Spain},
    title = {Renouncing {Privacy} in {Crisis} {Management}? {People}'s {View} on {Social} {Media} {Monitoring} and {Surveillance}},
    url = {http://www.peasec.de/paper/2019/2019_AldehoffDankenbringReuter_RenouncingPrivacyCrisisManagement_ISCRAM.pdf},
    abstract = {Social media is used during crises and disasters by state authorities and citizens to communicate and provide, gain and analyze information. Monitoring of platforms in such cases is both a well-established practice and a research area. The question, whether people are willing to renounce privacy in social media during critical incidents, or even allow surveillance in order to contribute to public security, remains unanswered. Our survey of 1,024 German inhabitants is the first empirical study on people's views on social media monitoring and surveillance in crisis management. We find the willingness to share data during an imminent threat depends mostly on the type of data: a majority (63\% and 67\%, respectively) would give access to addresses and telephone numbers, whereas the willingness to share content of chats or telephone calls is significantly lower (27\%). Our analysis reveals diverging opinions among participants and some effects of sociodemographic variables on the acceptance of invasions into privacy.},
    booktitle = {Proceedings of the {Information} {Systems} for {Crisis} {Response} and {Management} ({ISCRAM})},
    publisher = {ISCRAM Association},
    author = {Aldehoff, Larissa and Dankenbring, Meri and Reuter, Christian},
    editor = {Franco, Zeno and González, José J. and Canós, José H.},
    year = {2019},
    keywords = {Crisis, SocialMedia, Student, UsableSec, Security, Peace, Projekt-CRISP, Projekt-DualUse, Projekt-CROSSING, Projekt-ATHENE-FANCY},
    pages = {1184--1197},
    }

  • Thomas Reinhold, Christian Reuter (2019)
    Verification in Cyberspace
    In: Christian Reuter: Information Technology for Peace and Security – IT-Applications and Infrastructures in Conflicts, Crises, War, and Peace. Wiesbaden, Germany: Springer Vieweg, , 257–276. doi:10.1007/978-3-658-25652-4_12
    [BibTeX] [Abstract] [Download PDF]

    Verification is one of the pillars of arms control and non-proliferation treaties as well as an important part of confidence building measures. It defines practical measures that enable treaty members to check the treaty compliance by observing, counting or moni-toring specific actions and their accordance with the respective rules. In contrast to his-torical examples of former military technologies, cyberspace features some unique char-acteristics making it hard to apply established measures. The chapter describes these peculiarities and assesses distinguishing problems compared to selected verification measures for nuclear, biological and chemicals weapons technology. Yet, cyberspace is a human-made domain and adjusting its technical setting, rules and principles may help to reduce the threat of ongoing militarisation. Offering some alternatives, the chapter elaborates on suitable and measurable parameters for this domain and presents potential-ly useful verification approaches.

    @incollection{reinhold_verification_2019,
    address = {Wiesbaden, Germany},
    title = {Verification in {Cyberspace}},
    isbn = {978-3-658-25652-4},
    url = {https://www.springer.com/de/book/9783658256517},
    abstract = {Verification is one of the pillars of arms control and non-proliferation treaties as well as an important part of confidence building measures. It defines practical measures that enable treaty members to check the treaty compliance by observing, counting or moni-toring specific actions and their accordance with the respective rules. In contrast to his-torical examples of former military technologies, cyberspace features some unique char-acteristics making it hard to apply established measures. The chapter describes these peculiarities and assesses distinguishing problems compared to selected verification measures for nuclear, biological and chemicals weapons technology. Yet, cyberspace is a human-made domain and adjusting its technical setting, rules and principles may help to reduce the threat of ongoing militarisation. Offering some alternatives, the chapter elaborates on suitable and measurable parameters for this domain and presents potential-ly useful verification approaches.},
    booktitle = {Information {Technology} for {Peace} and {Security} - {IT}-{Applications} and {Infrastructures} in {Conflicts}, {Crises}, {War}, and {Peace}},
    publisher = {Springer Vieweg},
    author = {Reinhold, Thomas and Reuter, Christian},
    editor = {Reuter, Christian},
    year = {2019},
    doi = {10.1007/978-3-658-25652-4_12},
    keywords = {Security, Peace, Projekt-CRISP},
    pages = {257--276},
    }

  • Christian Reuter (2019)
    Information Technology for Peace and Security – Introduction and Overview
    In: Christian Reuter: Information Technology for Peace and Security – IT-Applications and Infrastructures in Conflicts, Crises, War, and Peace. Wiesbaden, Germany: Springer Vieweg, , 3–9. doi:10.1007/978-3-658-25652-4_1
    [BibTeX] [Abstract] [Download PDF]

    Technological and scientific progress, especially the rapid development in information technology (IT), plays a crucial role regarding questions of peace and security. This textbook addresses the significance, potentials and challenges of IT for peace and securi-ty. For this purpose, the book offers an introduction to peace, conflict, and security research, thereby focusing on natural science, technical and computer science perspec-tives. In the following, it sheds light on fundamentals (e.g. IT in peace, conflict and security, natural-science/technical peace research), cyber conflicts and war (e.g. infor-mation warfare, cyber espionage, cyber defence, Darknet), cyber peace (e.g. dual-use, technology assessment, confidence and security building measures), cyber arms control (e.g. arms control in the cyberspace, unmanned systems, verification), cyber attribution and infrastructures (e.g. attribution of cyber attacks, resilient infrastructures, secure critical information infrastructures), culture and interaction (e.g. safety and security, cultural violence, social media), before an outlook is given. This chapter provides an overview of all chapters in this book.

    @incollection{reuter_information_2019,
    address = {Wiesbaden, Germany},
    title = {Information {Technology} for {Peace} and {Security} - {Introduction} and {Overview}},
    isbn = {978-3-658-25652-4},
    url = {https://www.springer.com/de/book/9783658256517},
    abstract = {Technological and scientific progress, especially the rapid development in information technology (IT), plays a crucial role regarding questions of peace and security. This textbook addresses the significance, potentials and challenges of IT for peace and securi-ty. For this purpose, the book offers an introduction to peace, conflict, and security research, thereby focusing on natural science, technical and computer science perspec-tives. In the following, it sheds light on fundamentals (e.g. IT in peace, conflict and security, natural-science/technical peace research), cyber conflicts and war (e.g. infor-mation warfare, cyber espionage, cyber defence, Darknet), cyber peace (e.g. dual-use, technology assessment, confidence and security building measures), cyber arms control (e.g. arms control in the cyberspace, unmanned systems, verification), cyber attribution and infrastructures (e.g. attribution of cyber attacks, resilient infrastructures, secure critical information infrastructures), culture and interaction (e.g. safety and security, cultural violence, social media), before an outlook is given. This chapter provides an overview of all chapters in this book.},
    booktitle = {Information {Technology} for {Peace} and {Security} - {IT}-{Applications} and {Infrastructures} in {Conflicts}, {Crises}, {War}, and {Peace}},
    publisher = {Springer Vieweg},
    author = {Reuter, Christian},
    editor = {Reuter, Christian},
    year = {2019},
    doi = {10.1007/978-3-658-25652-4_1},
    keywords = {Crisis, Security, Peace, Projekt-CRISP, Projekt-CROSSING},
    pages = {3--9},
    }

  • Christian Reuter, Larissa Aldehoff, Thea Riebe, Marc-André Kaufhold (2019)
    IT in Peace, Conflict, and Security Research
    In: Christian Reuter: Information Technology for Peace and Security – IT-Applications and Infrastructures in Conflicts, Crises, War, and Peace. Wiesbaden, Germany: Springer Vieweg, , 11–37. doi:10.1007/978-3-658-25652-4_2
    [BibTeX] [Abstract] [Download PDF]

    Advances in science and technology play a crucial role in the context of peace, conflict and security. As information technology (IT) is becoming omnipresent, this includes both the resilience of IT infrastructures e.g. as a target in cases of conflict and the role of IT applications to prevent and manage conflicts, crises and disasters. This chapter is an introduction to IT and its role in war and peace, in conflicts and crises as well as in safety and security. Based on those connections a new field of research has emerged: IT peace research. It is introduced in this chapter which provides an overview of the inter-disciplinary concepts of peace, conflict and security. In addition, the research disciplines computer science and peace and conflict studies as the basis of IT peace research are explained. Moreover, the chapter focuses on the specific research topics of IT peace research and presents the institutionalised research landscape in Germany.

    @incollection{reuter_it_2019,
    address = {Wiesbaden, Germany},
    title = {{IT} in {Peace}, {Conflict}, and {Security} {Research}},
    isbn = {978-3-658-25652-4},
    url = {https://www.springer.com/de/book/9783658256517},
    abstract = {Advances in science and technology play a crucial role in the context of peace, conflict and security. As information technology (IT) is becoming omnipresent, this includes both the resilience of IT infrastructures e.g. as a target in cases of conflict and the role of IT applications to prevent and manage conflicts, crises and disasters. This chapter is an introduction to IT and its role in war and peace, in conflicts and crises as well as in safety and security. Based on those connections a new field of research has emerged: IT peace research. It is introduced in this chapter which provides an overview of the inter-disciplinary concepts of peace, conflict and security. In addition, the research disciplines computer science and peace and conflict studies as the basis of IT peace research are explained. Moreover, the chapter focuses on the specific research topics of IT peace research and presents the institutionalised research landscape in Germany.},
    booktitle = {Information {Technology} for {Peace} and {Security} - {IT}-{Applications} and {Infrastructures} in {Conflicts}, {Crises}, {War}, and {Peace}},
    publisher = {Springer Vieweg},
    author = {Reuter, Christian and Aldehoff, Larissa and Riebe, Thea and Kaufhold, Marc-André},
    editor = {Reuter, Christian},
    year = {2019},
    doi = {10.1007/978-3-658-25652-4_2},
    keywords = {HCI, Security, Peace, Infrastructure, Projekt-CRISP},
    pages = {11--37},
    }

  • Christian Reuter, Jürgen Altmann, Malte Göttsche, Mirko Himmel (2019)
    SCIENCE PEACE SECURITY ’19 – Proceedings of the Interdisciplinary Conference on Technical Peace and Security Research
    Darmstadt, Germany: TUprints.
    [BibTeX] [Abstract] [Download PDF]

    Scientific discoveries and technological innovations have always exerted a great influence on peace and security. New civil and military technologies are revolutionizing warfare. Particularly striking areas are cyber warfare and the rapid development of unmanned weapons systems. Issues of nuclear disarmament, missile defence or space armament as well as chemical and biological weapons are again becoming more urgent. The conference SCIENCE · PEACE · SECURITY ’19 aimed for an accurate understanding and fruitful discussions of today’s and tomorrow’s peace and security challenges. This includes scientific-technical as well as inter- disciplinary contributions, focusing on problems of international security and peace-building as well as contributions dedicated to transparency, trust-building, arms control, disarmament, and conflict management.

    @book{reuter_science_2019,
    address = {Darmstadt, Germany},
    title = {{SCIENCE} {PEACE} {SECURITY} '19 - {Proceedings} of the {Interdisciplinary} {Conference} on {Technical} {Peace} and {Security} {Research}},
    url = {https://tuprints.ulb.tu-darmstadt.de/id/eprint/9164},
    abstract = {Scientific discoveries and technological innovations have always exerted a great influence on peace and security. New civil and military technologies are revolutionizing warfare. Particularly striking areas are cyber warfare and the rapid development of unmanned weapons systems. Issues of nuclear disarmament, missile defence or space armament as well as chemical and biological weapons are again becoming more urgent. The conference SCIENCE · PEACE · SECURITY '19 aimed for an accurate understanding and fruitful discussions of today's and tomorrow's peace and security challenges. This includes scientific-technical as well as inter- disciplinary contributions, focusing on problems of international security and peace-building as well as contributions dedicated to transparency, trust-building, arms control, disarmament, and conflict management.},
    publisher = {TUprints},
    author = {Reuter, Christian and Altmann, Jürgen and Göttsche, Malte and Himmel, Mirko},
    year = {2019},
    keywords = {Crisis, Security, Peace, Projekt-DualUse},
    }

  • Thea Riebe, Christian Reuter (2019)
    Dual-Use in der IT: Bewertung in der Softwareentwicklung
    Wissenschaft & Frieden 2019-1: 2019.
    [BibTeX] [Abstract] [Download PDF]

    Der Einsatz von Informationstechnologie (IT) im Frieden ebenso wie in Konflikten und für Sicherheitszwecke wirft einige Fragen auf (Reuter 2019), u.a. ob die Nutzung von IT auf so genannte förderliche Zwecke und Anwendungen begrenzt und eine schädliche Nutzung verhindert werden kann (Riebe und Reuter 2019). Diese Ambivalenz wird als Dual-use-Dilemma bezeichnet und bedeutet, dass Gegenstände, Wissen und Technologie sowohl nützliche als auch schädliche Anwendung fi nden können. Dual-use-Fragen stellen sich in ganz unterschiedlichen technischen und naturwissenschaftlichen Disziplinen, insbesondere in der Nukleartechnologie sowie in der Chemie und Biologie. Dabei unterscheidet sich die Bedeutung von Dual-use je nach Technologie, ihren spezifi schen Risiken und Szenarien sowie ihrer Distribution und Anwendung. Konkret bedeutet dies: Sicherheitspolitische Risikoszenarien und Anwender der Nukleartechnologie unterscheiden sich erheblich von denen der IT.

    @techreport{riebe_dual-use_2019,
    address = {Wissenschaft \& Frieden 2019-1},
    title = {Dual-{Use} in der {IT}: {Bewertung} in der {Softwareentwicklung}},
    url = {http://www.peasec.de/paper/2019/2019_RiebeReuter_DualUse_WuF.pdf},
    abstract = {Der Einsatz von Informationstechnologie (IT) im Frieden ebenso wie in Konflikten und für Sicherheitszwecke wirft einige Fragen auf (Reuter 2019), u.a. ob die Nutzung von IT auf so genannte förderliche Zwecke und Anwendungen begrenzt und eine schädliche Nutzung verhindert werden kann (Riebe und Reuter 2019). Diese Ambivalenz wird als Dual-use-Dilemma bezeichnet und bedeutet, dass Gegenstände, Wissen und Technologie sowohl nützliche als auch schädliche Anwendung fi nden können. Dual-use-Fragen stellen sich in ganz unterschiedlichen technischen und naturwissenschaftlichen Disziplinen, insbesondere in der Nukleartechnologie sowie in der Chemie und Biologie. Dabei unterscheidet sich die Bedeutung von Dual-use je nach Technologie, ihren spezifi schen Risiken und Szenarien sowie ihrer Distribution und Anwendung. Konkret bedeutet dies: Sicherheitspolitische Risikoszenarien und Anwender der Nukleartechnologie unterscheiden sich erheblich von denen der IT.},
    author = {Riebe, Thea and Reuter, Christian},
    year = {2019},
    keywords = {Projekt-KontiKat, Peace, Projekt-DualUse},
    pages = {46--48},
    }

  • Thea Riebe, Christian Reuter (2019)
    Dual Use and Dilemmas for Cybersecurity, Peace and Technology Assessment
    In: Christian Reuter: Information Technology for Peace and Security – IT-Applications and Infrastructures in Conflicts, Crises, War, and Peace. Wiesbaden, Germany: Springer Vieweg, , 165–184. doi:10.1007/978-3-658-25652-4_8
    [BibTeX] [Abstract] [Download PDF]

    Dual-use in information technology is a pressing issue: how can we prevent, control or manage the risk of a harmful application of IT? How can dual-use awareness and regu-lation help to mitigate the risks to peace and security on the national and international level? As the cyberspace has been declared a military domain, IT is of increasing im-portance for civil and military infrastructures. How can researchers, developers and decision makers make sure that IT is not misused to cause harm? For nuclear, biological and chemical technologies this has been discussed as the dual-use problem. This chapter illustrates the approaches towards different dual-use concepts, how to conduct a tech-nology assessment and provides insight into the implementation of dual-use assessment guidelines at TU Darmstadt, the so-called Civil Clause.

    @incollection{riebe_dual_2019,
    address = {Wiesbaden, Germany},
    title = {Dual {Use} and {Dilemmas} for {Cybersecurity}, {Peace} and {Technology} {Assessment}},
    isbn = {978-3-658-25652-4},
    url = {https://link.springer.com/chapter/10.1007/978-3-658-25652-4_8},
    abstract = {Dual-use in information technology is a pressing issue: how can we prevent, control or manage the risk of a harmful application of IT? How can dual-use awareness and regu-lation help to mitigate the risks to peace and security on the national and international level? As the cyberspace has been declared a military domain, IT is of increasing im-portance for civil and military infrastructures. How can researchers, developers and decision makers make sure that IT is not misused to cause harm? For nuclear, biological and chemical technologies this has been discussed as the dual-use problem. This chapter illustrates the approaches towards different dual-use concepts, how to conduct a tech-nology assessment and provides insight into the implementation of dual-use assessment guidelines at TU Darmstadt, the so-called Civil Clause.},
    booktitle = {Information {Technology} for {Peace} and {Security} - {IT}-{Applications} and {Infrastructures} in {Conflicts}, {Crises}, {War}, and {Peace}},
    publisher = {Springer Vieweg},
    author = {Riebe, Thea and Reuter, Christian},
    editor = {Reuter, Christian},
    year = {2019},
    doi = {10.1007/978-3-658-25652-4_8},
    keywords = {Projekt-KontiKat, Peace, Projekt-CRISP, Projekt-DualUse},
    pages = {165--184},
    }

  • Thea Riebe, Marc-André Kaufhold, Tarun Kumar, Thomas Reinhold, Christian Reuter (2019)
    Threat Intelligence Application for Cyber Attribution
    SCIENCE PEACE SECURITY ’19 – Proceedings of the Interdisciplinary Conference on Technical Peace and Security Research Darmstadt, Germany.
    [BibTeX] [Abstract] [Download PDF]

    Attribution consists of technical, legal and politically defined processes. However, the interna- tional community has not yet defined processes unilaterally, even though the UN GGE has proposed to address the increase of cyber operations. Taking existing threat exchange stand- ards into account, this paper presents an approach to support efforts for more effective attrib- ution by developing a platform with the common open source threat exchange formats STIX and MEAC. Furthermore, the platform is evaluated in terms of usability.

    @inproceedings{riebe_threat_2019,
    address = {Darmstadt, Germany},
    title = {Threat {Intelligence} {Application} for {Cyber} {Attribution}},
    url = {https://tuprints.ulb.tu-darmstadt.de/id/eprint/9164},
    abstract = {Attribution consists of technical, legal and politically defined processes. However, the interna- tional community has not yet defined processes unilaterally, even though the UN GGE has proposed to address the increase of cyber operations. Taking existing threat exchange stand- ards into account, this paper presents an approach to support efforts for more effective attrib- ution by developing a platform with the common open source threat exchange formats STIX and MEAC. Furthermore, the platform is evaluated in terms of usability.},
    booktitle = {{SCIENCE} {PEACE} {SECURITY} '19 - {Proceedings} of the {Interdisciplinary} {Conference} on {Technical} {Peace} and {Security} {Research}},
    publisher = {TUprints},
    author = {Riebe, Thea and Kaufhold, Marc-André and Kumar, Tarun and Reinhold, Thomas and Reuter, Christian},
    editor = {Reuter, Christian and Altmann, Jürgen and Göttsche, Malte and Himmel, Mirko},
    year = {2019},
    keywords = {Student, Security, Peace, Projekt-DualUse},
    pages = {56--60},
    }

  • Christian Reuter, Konstantin Aal, Larissa Aldehoff, Jürgen Altmann, Johannes Buchmann, Ute Bernhardt, Kai Denker, Dominik Herrmann, Matthias Hollick, Stefan Katzenbeisser, Marc-André Kaufhold, Alfred Nordmann, Thomas Reinhold, Thea Riebe, Annette Ripper, Ingo Ruhmann, Klaus-Peter Saalbach, Niklas Schörnig, Ali Sunyaev, Volker Wulf (2019)
    The Future of IT in Peace and Security
    In: Christian Reuter: Information Technology for Peace and Security – IT-Applications and Infrastructures in Conflicts, Crises, War, and Peace. Wiesbaden, Germany: Springer Vieweg, , 405–413. doi:10.1007/978-3-658-25652-4_19
    [BibTeX] [Abstract] [Download PDF]

    Not only today, but also in the future information technology and the advances in the field of computer science will have a high relevance for peace and security. Naturally, a textbook like this can only cover a selective part of research and a certain point in time. Nonetheless, it can be attempted to identify trends, challenges and venture an outlook into the future. That is exactly what we want to achieve in this chapter: To predict fu-ture developments and try to classify them correctly. These considerations were made both by the editor and the authors involved alike. Therefore, an outlook based on fun-damentals, cyber conflicts and war, cyber peace, cyber arms control, infrastructures as well as social interaction is given.

    @incollection{reuter_future_2019,
    address = {Wiesbaden, Germany},
    title = {The {Future} of {IT} in {Peace} and {Security}},
    isbn = {978-3-658-25652-4},
    url = {https://www.springer.com/de/book/9783658256517},
    abstract = {Not only today, but also in the future information technology and the advances in the field of computer science will have a high relevance for peace and security. Naturally, a textbook like this can only cover a selective part of research and a certain point in time. Nonetheless, it can be attempted to identify trends, challenges and venture an outlook into the future. That is exactly what we want to achieve in this chapter: To predict fu-ture developments and try to classify them correctly. These considerations were made both by the editor and the authors involved alike. Therefore, an outlook based on fun-damentals, cyber conflicts and war, cyber peace, cyber arms control, infrastructures as well as social interaction is given.},
    booktitle = {Information {Technology} for {Peace} and {Security} - {IT}-{Applications} and {Infrastructures} in {Conflicts}, {Crises}, {War}, and {Peace}},
    publisher = {Springer Vieweg},
    author = {Reuter, Christian and Aal, Konstantin and Aldehoff, Larissa and Altmann, Jürgen and Buchmann, Johannes and Bernhardt, Ute and Denker, Kai and Herrmann, Dominik and Hollick, Matthias and Katzenbeisser, Stefan and Kaufhold, Marc-André and Nordmann, Alfred and Reinhold, Thomas and Riebe, Thea and Ripper, Annette and Ruhmann, Ingo and Saalbach, Klaus-Peter and Schörnig, Niklas and Sunyaev, Ali and Wulf, Volker},
    editor = {Reuter, Christian},
    year = {2019},
    doi = {10.1007/978-3-658-25652-4_19},
    keywords = {HCI, UsableSec, Security, Peace, Projekt-CRISP, Projekt-CROSSING},
    pages = {405--413},
    }

  • Thea Riebe, Amanda Langer, Marc-André Kaufhold, Nina Katharina Kretschmer, Christian Reuter (2019)
    Werte und Wertekonflikte in sozialen Medien für die Vernetzung ungebundener Helfer in Krisensituationen – Ein Value-Sensitive Design Ansatz
    Mensch und Computer – Workshopband Hamburg, Germany. doi:10.18420/muc2019-ws-133-05
    [BibTeX] [Abstract] [Download PDF]

    Bereits während des Hochwassers in Mitteleuropa 2013 und der Flüchtlingskrise in Europa ab 2015 wurde deutlich, dass freiwillige HelferInnen die Bewältigung von Krisensituationen unterstützen. Durch die vermehrte Koordination der Helfenden, auch unter Ein- satz sozialer Medien, kommt es zunehmend zu Konflikten zwi- schen den teilweise kollidierenden Erwartungshaltungen periodi- sierter Werte der eingebundenen Akteure. Die Entwicklung von Kollaborationswerkzeugen mit Hilfe der Methode des Value-Sen- sitive Designs kann bereits im Vorfeld solche Konflikte aufzeigen und gezielt verhindern oder moderieren. Dazu wurde in einer Fall- studie anhand des Hochwassers 2013 induktiv abgeleitet, welche Werte und Erwartungen die unterschiedlichen Stakeholder haben, und welche Konflikte sich daraus im Hinblick auf die Anforderun- gen ergeben. Diese Studie zeigt insbesondere die Konfliktpotenzi- ale für freiwillige HelferInnen in sozialen Medien in Bezug auf den Schutz der Privatsphäre und vor Diskriminierung auf und leistet damit einen Beitrag für die Konflikt-Optimierung und Akzeptanz- steigerung des Einsatzes sozialer Medien im Katastrophenschutz.

    @inproceedings{riebe_werte_2019,
    address = {Hamburg, Germany},
    title = {Werte und {Wertekonflikte} in sozialen {Medien} für die {Vernetzung} ungebundener {Helfer} in {Krisensituationen} – {Ein} {Value}-{Sensitive} {Design} {Ansatz}},
    url = {https://dl.gi.de/bitstream/handle/20.500.12116/25150/133-05.pdf},
    doi = {10.18420/muc2019-ws-133-05},
    abstract = {Bereits während des Hochwassers in Mitteleuropa 2013 und der Flüchtlingskrise in Europa ab 2015 wurde deutlich, dass freiwillige HelferInnen die Bewältigung von Krisensituationen unterstützen. Durch die vermehrte Koordination der Helfenden, auch unter Ein- satz sozialer Medien, kommt es zunehmend zu Konflikten zwi- schen den teilweise kollidierenden Erwartungshaltungen periodi- sierter Werte der eingebundenen Akteure. Die Entwicklung von Kollaborationswerkzeugen mit Hilfe der Methode des Value-Sen- sitive Designs kann bereits im Vorfeld solche Konflikte aufzeigen und gezielt verhindern oder moderieren. Dazu wurde in einer Fall- studie anhand des Hochwassers 2013 induktiv abgeleitet, welche Werte und Erwartungen die unterschiedlichen Stakeholder haben, und welche Konflikte sich daraus im Hinblick auf die Anforderun- gen ergeben. Diese Studie zeigt insbesondere die Konfliktpotenzi- ale für freiwillige HelferInnen in sozialen Medien in Bezug auf den Schutz der Privatsphäre und vor Diskriminierung auf und leistet damit einen Beitrag für die Konflikt-Optimierung und Akzeptanz- steigerung des Einsatzes sozialer Medien im Katastrophenschutz.},
    booktitle = {Mensch und {Computer} - {Workshopband}},
    publisher = {Gesellschaft für Informatik e.V.},
    author = {Riebe, Thea and Langer, Amanda and Kaufhold, Marc-André and Kretschmer, Nina Katharina and Reuter, Christian},
    year = {2019},
    keywords = {Crisis, SocialMedia, Student, Security, Projekt-KontiKat, Peace, Projekt-DualUse},
    pages = {308--318},
    }

  • Christian Reuter, Katrin Hartwig, Jan Kirchner, Noah Schlegel (2019)
    Fake News Perception in Germany: A Representative Study of People’s Attitudes and Approaches to Counteract Disinformation
    Proceedings of the International Conference on Wirtschaftsinformatik (WI) Siegen, Germany.
    [BibTeX] [Abstract] [Download PDF]

    Fake news has become an important topic in our social and political environment. While research is coming up for the U.S. and European countries, many aspects remain uncovered as long as existing work only marginally inves-tigates people’s attitudes towards fake news. In this work, we present the results of a representative study (N=1023) in Germany asking participants about their attitudes towards fake news and approaches to counteract disinformation. More than 80\% of the participants agree that fake news poses a threat. 78\% see fake news as harming democracy. Even though about half of the respondents (48\%) have noticed fake news, most participants stated to have never liked, shared or commented on fake news. Regarding demographic factors, our findings support the view of younger and relatively educated people being more informed about fake news. Concerning ideological motives, the evaluation suggests left-wing or liberal respondents to be more critical of fake news

    @inproceedings{reuter_fake_2019-2,
    address = {Siegen, Germany},
    title = {Fake {News} {Perception} in {Germany}: {A} {Representative} {Study} of {People}'s {Attitudes} and {Approaches} to {Counteract} {Disinformation}},
    url = {http://www.peasec.de/paper/2019/2019_ReuterHartwigKirchnerSchlegel_FakeNewsPerceptionGermany_WI.pdf},
    abstract = {Fake news has become an important topic in our social and political environment. While research is coming up for the U.S. and European countries, many aspects remain uncovered as long as existing work only marginally inves-tigates people's attitudes towards fake news. In this work, we present the results of a representative study (N=1023) in Germany asking participants about their attitudes towards fake news and approaches to counteract disinformation. More than 80\% of the participants agree that fake news poses a threat. 78\% see fake news as harming democracy. Even though about half of the respondents (48\%) have noticed fake news, most participants stated to have never liked, shared or commented on fake news. Regarding demographic factors, our findings support the view of younger and relatively educated people being more informed about fake news. Concerning ideological motives, the evaluation suggests left-wing or liberal respondents to be more critical of fake news},
    booktitle = {Proceedings of the {International} {Conference} on {Wirtschaftsinformatik} ({WI})},
    publisher = {AIS},
    author = {Reuter, Christian and Hartwig, Katrin and Kirchner, Jan and Schlegel, Noah},
    year = {2019},
    keywords = {Crisis, HCI, SocialMedia, Student, Ranking-CORE-C, Ranking-VHB-C, Ranking-WKWI-A, Peace},
    pages = {1069--1083},
    }

    2018

  • Christian Reuter, Marc-André Kaufhold (2018)
    Informatik für Frieden und Sicherheit
    In: Christian Reuter: Sicherheitskritische Mensch-Computer-Interaktion: Interaktive Technologien und Soziale Medien im Krisen- und Sicherheitsmanagement. Wiesbaden, Germany: Springer Vieweg, , 573–595. doi:10.1007/978-3-658-19523-6_28
    [BibTeX] [Abstract] [Download PDF]

    Die Erkenntnisse aus Naturwissenschaft und Technik hatten bereits immer einen großen Einfluss auf die Art und Weise, wie Kriege und Konflikte ausgetragen werden konnten und ausgetragen wurden. Im Kontext von Frieden und Sicherheit können Erkenntnisse, die eigentlich für zivile Kontexte entwickelt wurden, auch für militärische Auseinandersetzungen genutzt werden (Dual-Use). Seit einigen Jahren betrifft dies insbesondere die Informatik, die durch die militärische Nutzung von Computern, Cyberwar, Information Warfare, einschließlich terroristischer Propaganda, Fake News, Ausspähung und Hacking konfliktäre Auseinandersetzungen unterstützen kann. Auch werden Konflikte vermehrt im digitalen Raum ausgetragen, mit erschwerter Zurechenbarkeit zu einzelnen (angreifenden) Akteuren. Die Informatik bietet jedoch auch für friedensstiftende Aktivitäten einige Möglichkeiten. Dieses Kapitel möchte eine Einführung in dieses an Bedeutung gewinnende Gebiet liefern.

    @incollection{reuter_informatik_2018,
    address = {Wiesbaden, Germany},
    title = {Informatik für {Frieden} und {Sicherheit}},
    isbn = {978-3-658-19523-6},
    url = {https://link.springer.com/chapter/10.1007/978-3-658-19523-6_28},
    abstract = {Die Erkenntnisse aus Naturwissenschaft und Technik hatten bereits immer einen großen Einfluss auf die Art und Weise, wie Kriege und Konflikte ausgetragen werden konnten und ausgetragen wurden. Im Kontext von Frieden und Sicherheit können Erkenntnisse, die eigentlich für zivile Kontexte entwickelt wurden, auch für militärische Auseinandersetzungen genutzt werden (Dual-Use). Seit einigen Jahren betrifft dies insbesondere die Informatik, die durch die militärische Nutzung von Computern, Cyberwar, Information Warfare, einschließlich terroristischer Propaganda, Fake News, Ausspähung und Hacking konfliktäre Auseinandersetzungen unterstützen kann. Auch werden Konflikte vermehrt im digitalen Raum ausgetragen, mit erschwerter Zurechenbarkeit zu einzelnen (angreifenden) Akteuren. Die Informatik bietet jedoch auch für friedensstiftende Aktivitäten einige Möglichkeiten. Dieses Kapitel möchte eine Einführung in dieses an Bedeutung gewinnende Gebiet liefern.},
    booktitle = {Sicherheitskritische {Mensch}-{Computer}-{Interaktion}: {Interaktive} {Technologien} und {Soziale} {Medien} im {Krisen}- und {Sicherheitsmanagement}},
    publisher = {Springer Vieweg},
    author = {Reuter, Christian and Kaufhold, Marc-André},
    editor = {Reuter, Christian},
    year = {2018},
    doi = {10.1007/978-3-658-19523-6_28},
    keywords = {Crisis, Security, Projekt-KontiKat, Peace, Projekt-CRISP},
    pages = {573--595},
    }

  • Thea Riebe, Katja Pätsch, Marc-André Kaufhold, Christian Reuter (2018)
    From Conspiracies to Insults: A Case Study of Radicalisation in Social Media Discourse
    Mensch und Computer – Workshopband Dresden, Germany.
    [BibTeX] [Abstract] [Download PDF]

    Online radicalisation is often linked to discourses on social media. In this context, the question arises how populist online discourses radicalise in social media platforms. With a quantitative content analysis of supporters of the German party “Alternative für Deutschland (AfD)” and their contributions on Facebook between March 2014 and May 2017, this preliminary analysis illustrates how the discourse shifts from a dominantly neutral debate to insult-driven and dis-criminatory contributions. It provides insights into the dynamic of political social media dis-courses and shows a tendency of correlating language style and topics that can be further studied in Social Media Analytics.

    @inproceedings{riebe_conspiracies_2018,
    address = {Dresden, Germany},
    title = {From {Conspiracies} to {Insults}: {A} {Case} {Study} of {Radicalisation} in {Social} {Media} {Discourse}},
    url = {https://dl.gi.de/bitstream/handle/20.500.12116/16795/Beitrag_449_final__a.pdf},
    abstract = {Online radicalisation is often linked to discourses on social media. In this context, the question arises how populist online discourses radicalise in social media platforms. With a quantitative content analysis of supporters of the German party “Alternative für Deutschland (AfD)” and their contributions on Facebook between March 2014 and May 2017, this preliminary analysis illustrates how the discourse shifts from a dominantly neutral debate to insult-driven and dis-criminatory contributions. It provides insights into the dynamic of political social media dis-courses and shows a tendency of correlating language style and topics that can be further studied in Social Media Analytics.},
    booktitle = {Mensch und {Computer} - {Workshopband}},
    publisher = {Gesellschaft für Informatik e.V.},
    author = {Riebe, Thea and Pätsch, Katja and Kaufhold, Marc-André and Reuter, Christian},
    editor = {Dachselt, Raimund and Weber, Gerhard},
    year = {2018},
    keywords = {Crisis, HCI, SocialMedia, Student, Projekt-KontiKat, Peace, Projekt-CRISP},
    pages = {595--603},
    }

  • Markus Lederer, Alfred Nordmann, Christian Reuter (2018)
    IANUS am FiF und darüber hinaus: Die Bedeutung natur- und ingenieurwissenschaftlicher Friedensforschung für die TU Darmstadt
    In: Andreas Großmann, Heike Krebs, Josef Wiemeyer: Zwischendrin. 10 Jahre Forum interdisziplinäre Forschung der TU Darmstadt. Darmstadt: , , 71–89.
    [BibTeX] [Abstract] [Download PDF]

    IANUS steht seit 30 wechselhaften Jahren für natur- und ingenieur- wissenschaftliche Friedensforschung im Austausch mit den Sozial- und Geisteswissenschaften. Seit Januar 2018 ist IANUS ein Teil des Forums interdisziplinäre Forschung. Das FiF stellt das Dach, unter dem einige Aspekte der bisherigen IANUS-Arbeit weitergeführt werden sollen. Insofern das FiF nicht selbst wissenschaftlich arbeitet oder ein inhalt- liches Programm verfolgt, besteht das gemeinsame Dach in der admini- strativen Zusammenarbeit und dem Gedanken der Interdisziplinarität. Insofern IANUS von weitreichenderen Ambitionen geprägt ist, kann es unter dem gemeinsamen Dach derzeit nur auf sehr kleiner Flamme wei- terarbeiten. Freilich ergeben sich andererseits auch neue Perspektiven. Und wenn sich diese Perspektiven fruchtbar entwickeln lassen, würde ein erneuertes IANUS wesentlich zur internationalen Sichtbarkeit des FiF als Ausweis einer verantwortungsbewussten Forschungskultur an der TU Darmstadt beitragen. Was war IANUS und wofür steht es? Was ist IANUS heute – was kann und will es? Was könnte ein erneuertes IANUS werden – wie kann sein friedenspolitisch ausgerichteter wissenschaftlicher Anspruch zukünftig für das FiF und die TU Darmstadt wirksam werden? Diesen drei Fragen wenden sich die folgenden Abschnitte zu – und feiern somit, was nach 10 Jahren FiF, 30 Jahren IANUS und 140 Jahren TH/TU Darmstadt im Wandel der Forschungskulturen möglich war, ist und wird.

    @incollection{lederer_ianus_2018,
    address = {Darmstadt},
    title = {{IANUS} am {FiF} und darüber hinaus: {Die} {Bedeutung} natur- und ingenieurwissenschaftlicher {Friedensforschung} für die {TU} {Darmstadt}},
    url = {http://www.peasec.de/paper/2018/2018_LedererNordmannReuter_IANUS_FIF-Festschrift.pdf},
    abstract = {IANUS steht seit 30 wechselhaften Jahren für natur- und ingenieur- wissenschaftliche Friedensforschung im Austausch mit den Sozial- und Geisteswissenschaften. Seit Januar 2018 ist IANUS ein Teil des Forums interdisziplinäre Forschung. Das FiF stellt das Dach, unter dem einige Aspekte der bisherigen IANUS-Arbeit weitergeführt werden sollen. Insofern das FiF nicht selbst wissenschaftlich arbeitet oder ein inhalt- liches Programm verfolgt, besteht das gemeinsame Dach in der admini- strativen Zusammenarbeit und dem Gedanken der Interdisziplinarität. Insofern IANUS von weitreichenderen Ambitionen geprägt ist, kann es unter dem gemeinsamen Dach derzeit nur auf sehr kleiner Flamme wei- terarbeiten. Freilich ergeben sich andererseits auch neue Perspektiven. Und wenn sich diese Perspektiven fruchtbar entwickeln lassen, würde ein erneuertes IANUS wesentlich zur internationalen Sichtbarkeit des FiF als Ausweis einer verantwortungsbewussten Forschungskultur an der TU Darmstadt beitragen. Was war IANUS und wofür steht es? Was ist IANUS heute – was kann und will es? Was könnte ein erneuertes IANUS werden – wie kann sein friedenspolitisch ausgerichteter wissenschaftlicher Anspruch zukünftig für das FiF und die TU Darmstadt wirksam werden? Diesen drei Fragen wenden sich die folgenden Abschnitte zu – und feiern somit, was nach 10 Jahren FiF, 30 Jahren IANUS und 140 Jahren TH/TU Darmstadt im Wandel der Forschungskulturen möglich war, ist und wird.},
    booktitle = {Zwischendrin. 10 {Jahre} {Forum} interdisziplinäre {Forschung} der {TU} {Darmstadt}},
    author = {Lederer, Markus and Nordmann, Alfred and Reuter, Christian},
    editor = {Großmann, Andreas and Krebs, Heike and Wiemeyer, Josef},
    year = {2018},
    keywords = {Peace, Projekt-DualUse},
    pages = {71--89},
    }

  • Thea Riebe, Alfred Nordmann, Christian Reuter (2018)
    Responsible Research and Innovation: Interdisziplinärer Workshop von IANUS und Schader-Stiftung
    Wissenschaft & Frieden: 2018.
    [BibTeX] [Abstract] [Download PDF]

    Statt der Forschung ethische, rechtliche, gesellschaftliche Refl exion nur beizuge-sellen, verlangt Responsible Research and Innovation (RRI), dass sich Forschung an europäischen Werten – den Werten der Europäischen Union – orientiert. Um diese Öff nung zu gewährleisten, setzt RRI zunächst nicht auf spezifi sche Werte, sondern prozedural auf eine Forschung, die Folgen antizipiert, unterschiedliche Interessen und Wertvorstellungen inklu-diert, sich selbst refl ektiert und in die Verantwortung nehmen lässt. Doch was heißt das ?

    @techreport{riebe_responsible_2018,
    address = {Wissenschaft \& Frieden},
    title = {Responsible {Research} and {Innovation}: {Interdisziplinärer} {Workshop} von {IANUS} und {Schader}-{Stiftung}},
    url = {http://www.peasec.de/paper/2018/2018_RiebeNordmannReuter_RRI_WuF.pdf},
    abstract = {Statt der Forschung ethische, rechtliche, gesellschaftliche Refl exion nur beizuge-sellen, verlangt Responsible Research and Innovation (RRI), dass sich Forschung an europäischen Werten – den Werten der Europäischen Union – orientiert. Um diese Öff nung zu gewährleisten, setzt RRI zunächst nicht auf spezifi sche Werte, sondern prozedural auf eine Forschung, die Folgen antizipiert, unterschiedliche Interessen und Wertvorstellungen inklu-diert, sich selbst refl ektiert und in die Verantwortung nehmen lässt. Doch was heißt das ?},
    author = {Riebe, Thea and Nordmann, Alfred and Reuter, Christian},
    year = {2018},
    keywords = {Projekt-KontiKat, Peace, Projekt-CRISP, Projekt-DualUse},
    pages = {60--61},
    }

  • Christian Reuter, Amanda Lee Hughes, Marc-André Kaufhold (2018)
    Social Media in Crisis Management: An Evaluation and Analysis of Crisis Informatics Research
    International Journal on Human-Computer Interaction (IJHCI) ;34(4):280–294. doi:10.1080/10447318.2018.1427832
    [BibTeX] [Abstract] [Download PDF]

    Since the terrorist attacks of 9/11, the use of social media in emergency and crisis events has greatly increased and many studies have concentrated on the use of ICT and social media be-fore, during or after these events. The field of research that these studies fall under is called cri-sis informatics. In this paper, we evaluate and analyze crisis informatics research by looking at case studies of social media use in emergencies, outlining the types of research found in crisis informatics, and expounding upon the forms of interaction that have been researched. Finally, we summarize the achievements from an HCI perspective and outline trends and challenges for future research.

    @article{reuter_social_2018,
    title = {Social {Media} in {Crisis} {Management}: {An} {Evaluation} and {Analysis} of {Crisis} {Informatics} {Research}},
    volume = {34},
    url = {http://www.peasec.de/paper/2018/2018_ReuterHughesKaufhold_SocialMediaCrisisManagementEvaluation_IJHCI.pdf},
    doi = {10.1080/10447318.2018.1427832},
    abstract = {Since the terrorist attacks of 9/11, the use of social media in emergency and crisis events has greatly increased and many studies have concentrated on the use of ICT and social media be-fore, during or after these events. The field of research that these studies fall under is called cri-sis informatics. In this paper, we evaluate and analyze crisis informatics research by looking at case studies of social media use in emergencies, outlining the types of research found in crisis informatics, and expounding upon the forms of interaction that have been researched. Finally, we summarize the achievements from an HCI perspective and outline trends and challenges for future research.},
    number = {4},
    journal = {International Journal on Human-Computer Interaction (IJHCI)},
    author = {Reuter, Christian and Hughes, Amanda Lee and Kaufhold, Marc-André},
    year = {2018},
    keywords = {AuswahlCrisis, Crisis, HCI, Selected, SocialMedia, A-Paper, Ranking-ImpactFactor, Ranking-WKWI-B, Projekt-KontiKat, Peace, Ranking-CORE-B},
    pages = {280--294},
    }

  • Christian Reuter (2018)
    Sicherheitskritische Mensch-Computer-Interaktion: Interaktive Technologien und Soziale Medien im Krisen- und Sicherheitsmanagement (Erste Auflage)
    Wiesbaden: Springer Vieweg. doi:10.1007/978-3-658-19523-6
    [BibTeX] [Abstract] [Download PDF]

    Dieses Lehr- und Fachbuch gibt eine fundierte und praxisbezogene Einführung sowie einen Überblick über Grundlagen, Methoden und Anwendungen der Mensch-Computer-Interaktion im Kontext von Sicherheit, Notfällen, Krisen, Katastrophen, Krieg und Frieden. Dies adressierend werden interaktive, mobile, ubiquitäre und kooperative Technologien sowie Soziale Medien vorgestellt. Hierbei finden klassische Themen wie benutzbare (IT-)Sicherheit, Industrie 4.0, Katastrophenschutz, Medizin und Automobil, aber auch Augmented Reality, Crowdsourcing, Shitstorm Management, Social Media Analytics und Cyberwar ihren Platz. Methodisch wird das Spektrum von Usable Safety- bis Usable Security Engineering von Analyse über Design bis Evaluation abgedeckt. Das Buch eignet sich ebenso als Lehrbuch für Studierende wie als Handbuch für Wissenschaftler, Designer, Entwickler und Anwender.

    @book{reuter_sicherheitskritische_2018-1,
    address = {Wiesbaden},
    title = {Sicherheitskritische {Mensch}-{Computer}-{Interaktion}: {Interaktive} {Technologien} und {Soziale} {Medien} im {Krisen}- und {Sicherheitsmanagement} ({Erste} {Auflage})},
    isbn = {978-3-658-19522-9},
    url = {http://www.springer.com/de/book/9783658195229},
    abstract = {Dieses Lehr- und Fachbuch gibt eine fundierte und praxisbezogene Einführung sowie einen Überblick über Grundlagen, Methoden und Anwendungen der Mensch-Computer-Interaktion im Kontext von Sicherheit, Notfällen, Krisen, Katastrophen, Krieg und Frieden. Dies adressierend werden interaktive, mobile, ubiquitäre und kooperative Technologien sowie Soziale Medien vorgestellt. Hierbei finden klassische Themen wie benutzbare (IT-)Sicherheit, Industrie 4.0, Katastrophenschutz, Medizin und Automobil, aber auch Augmented Reality, Crowdsourcing, Shitstorm Management, Social Media Analytics und Cyberwar ihren Platz. Methodisch wird das Spektrum von Usable Safety- bis Usable Security Engineering von Analyse über Design bis Evaluation abgedeckt. Das Buch eignet sich ebenso als Lehrbuch für Studierende wie als Handbuch für Wissenschaftler, Designer, Entwickler und Anwender.},
    publisher = {Springer Vieweg},
    author = {Reuter, Christian},
    year = {2018},
    doi = {10.1007/978-3-658-19523-6},
    keywords = {HCI, SocialMedia, Projekt-EmerGent, UsableSec, Security, Projekt-KontiKat, Peace, Infrastructure, RSF, AuswahlUsableSec},
    }

  • Christian Reuter, Marc-André Kaufhold (2018)
    Fifteen Years of Social Media in Emergencies: A Retrospective Review and Future Directions for Crisis Informatics
    Journal of Contingencies and Crisis Management (JCCM) ;26(1):41–57. doi:10.1111/1468-5973.12196
    [BibTeX] [Abstract] [Download PDF]

    Social media has been established in many larger emergencies and crises. This process has not started just a few years ago, but already 15 years ago in 2001 after the terrorist attacks of 9/11. In the following years, especially in the last 10, sometimes summarized under the term crisis informatics, a variety of studies focusing on the use of ICT and social media before, during or after nearly every crisis and emergency has arisen. This article aims to recapitulate 15 years of social media in emergencies and its research with a special emphasis on use patterns, role patterns and perception patterns that can be found across different cases in order to point out what has been achieved so far, and what future potentials exist.

    @article{reuter_fifteen_2018,
    title = {Fifteen {Years} of {Social} {Media} in {Emergencies}: {A} {Retrospective} {Review} and {Future} {Directions} for {Crisis} {Informatics}},
    volume = {26},
    url = {http://www.peasec.de/paper/2018/2018_ReuterKaufhold_FifteenYearsSocialMediaEmergencies_JCCM.pdf},
    doi = {10.1111/1468-5973.12196},
    abstract = {Social media has been established in many larger emergencies and crises. This process has not started just a few years ago, but already 15 years ago in 2001 after the terrorist attacks of 9/11. In the following years, especially in the last 10, sometimes summarized under the term crisis informatics, a variety of studies focusing on the use of ICT and social media before, during or after nearly every crisis and emergency has arisen. This article aims to recapitulate 15 years of social media in emergencies and its research with a special emphasis on use patterns, role patterns and perception patterns that can be found across different cases in order to point out what has been achieved so far, and what future potentials exist.},
    number = {1},
    journal = {Journal of Contingencies and Crisis Management (JCCM)},
    author = {Reuter, Christian and Kaufhold, Marc-André},
    year = {2018},
    keywords = {AuswahlCrisis, Crisis, HCI, Selected, SocialMedia, Projekt-EmerGent, A-Paper, Ranking-ImpactFactor, Peace, Projekt-KOKOS, AuswahlKaufhold},
    pages = {41--57},
    }

    2017

  • Christian Reuter, Katja Pätsch, Elena Runft (2017)
    IT for Peace? Fighting Against Terrorism in Social Media – An Explorative Twitter Study
    i-com – Journal of Interactive Media ;16(2):181–195. doi:10.1515/icom-2017-0013
    [BibTeX] [Abstract] [Download PDF]

    The Internet and especially social media are not only used for supposedly good purposes. For example, the recruitment of new members and the dissemination of ideologies of terrorism also takes place in the media. However, the fight against terrorism also makes use of the same tools. The type of these countermeasures, as well as the methods, are covered in this work. In the first part, the state of the art is summarized. The second part presents an explorative empirical study of the fight against terrorism in social media, especially on Twitter. Different, preferably characteristic forms are structured within the scope with the example of Twitter. The aim of this work is to approach this highly relevant subject with the goal of peace, safety and safety from the perspective of information systems. Moreover, it should serve following researches in this field as basis and starting point.

    @article{reuter_it_2017,
    title = {{IT} for {Peace}? {Fighting} {Against} {Terrorism} in {Social} {Media} – {An} {Explorative} {Twitter} {Study}},
    volume = {16},
    url = {http://www.peasec.de/paper/2017/2017_ReuterPaetschRunft_ITforPeaceTerrorismSocialMedia_ICOM.pdf},
    doi = {10.1515/icom-2017-0013},
    abstract = {The Internet and especially social media are not only used for supposedly good purposes. For example, the recruitment of new members and the dissemination of ideologies of terrorism also takes place in the media. However, the fight against terrorism also makes use of the same tools. The type of these countermeasures, as well as the methods, are covered in this work. In the first part, the state of the art is summarized. The second part presents an explorative empirical study of the fight against terrorism in social media, especially on Twitter. Different, preferably characteristic forms are structured within the scope with the example of Twitter. The aim of this work is to approach this highly relevant subject with the goal of peace, safety and safety from the perspective of information systems. Moreover, it should serve following researches in this field as basis and starting point.},
    number = {2},
    journal = {i-com - Journal of Interactive Media},
    author = {Reuter, Christian and Pätsch, Katja and Runft, Elena},
    year = {2017},
    keywords = {Crisis, HCI, SocialMedia, Student, Projekt-EmerGent, Projekt-KontiKat, Peace},
    pages = {181--195},
    }

  • Marc-André Kaufhold, Christian Reuter, Marvin Stefan (2017)
    Gesellschaftliche Herausforderungen des Missbrauchs von Bots und sozialen Medien
    Mensch und Computer – Workshopband Regensburg, Germany. doi:10.18420/muc2017-ws01-0386
    [BibTeX] [Abstract] [Download PDF]

    Soziale Medien wie Facebook oder Twitter haben sich als alltägliche Kommunikationskanäle etabliert. Aufgrund der großen Reichweite sind diese Medien für den privaten oder öffentlichen Austausch unter Freunden und Gruppierungen sowie zur Produkt- und Unternehmenswerbung geeignet, unterliegen aber auch der Gefahr der Manipulation öffentlicher Diskurse oder des Missbrauchs der jeweiligen Plattformfunktionen. Hierzu werden unter anderem Bots, und spezifischer „Social Bots“, als automatisierte Programme eingesetzt, um einen Einfluss auf ökonomische, politische und soziale Prozesse auszuüben. Dieser Beitrag stellt die vorläufigen Ergebnisse einer systematischen Literaturstudie und thematischen Analyse dar, welche gesellschaftliche Herausforderungen sowie zugehörige Methoden und Vorgehensweisen des Missbrauchs von Bots und sozialen Medien umfassen.

    @inproceedings{kaufhold_gesellschaftliche_2017,
    address = {Regensburg, Germany},
    title = {Gesellschaftliche {Herausforderungen} des {Missbrauchs} von {Bots} und sozialen {Medien}},
    url = {https://dl.gi.de/bitstream/handle/20.500.12116/3236/2017_WS01_386.pdf?sequence=1&isAllowed=y},
    doi = {10.18420/muc2017-ws01-0386},
    abstract = {Soziale Medien wie Facebook oder Twitter haben sich als alltägliche Kommunikationskanäle etabliert. Aufgrund der großen Reichweite sind diese Medien für den privaten oder öffentlichen Austausch unter Freunden und Gruppierungen sowie zur Produkt- und Unternehmenswerbung geeignet, unterliegen aber auch der Gefahr der Manipulation öffentlicher Diskurse oder des Missbrauchs der jeweiligen Plattformfunktionen. Hierzu werden unter anderem Bots, und spezifischer „Social Bots“, als automatisierte Programme eingesetzt, um einen Einfluss auf ökonomische, politische und soziale Prozesse auszuüben. Dieser Beitrag stellt die vorläufigen Ergebnisse einer systematischen Literaturstudie und thematischen Analyse dar, welche gesellschaftliche Herausforderungen sowie zugehörige Methoden und Vorgehensweisen des Missbrauchs von Bots und sozialen Medien umfassen.},
    booktitle = {Mensch und {Computer} - {Workshopband}},
    publisher = {Gesellschaft für Informatik e.V.},
    author = {Kaufhold, Marc-André and Reuter, Christian and Stefan, Marvin},
    editor = {Burghardt, M. and Wimmer, R. and Wolff, C. and Womser-Hacker, C.},
    year = {2017},
    keywords = {SocialMedia, Student, Projekt-KontiKat, Peace},
    pages = {51--58},
    }

  • Aparecido Fabiano Pinatti de Carvalho, Saqib Saeed, Christian Reuter, Volker Wulf (2017)
    The Role of Technological Infrastructure in Nomadic Practices of a Social Activist Community
    Proceedings of the ECSCW-Workshop on Nomadic Culture Beyond Work Practices, International Reports on Socio-Informatics (IRSI) Sheffield, UK.
    [BibTeX] [Abstract] [Download PDF]

    Infrastructure is undoubtedly a key resource for people engaged in technologically-mediated nomadicity. Tech-Nomads rely on technological infrastructure components, such as Wi-Fi availability, to mobilise their workplaces and effectively accomplish their productive activities. In this paper, we introduce findings from an investigation focusing on how technological infrastructures are re-instantiated according to emerging demands. We focus particularly on the European Social Forum (ESF) (an activists‘ platform) and the problems faced by the members of this network in mobilising its infrastructure, stressing findings from the literature about the importanceof making infrastructure visible for nomadic practices, which have not yet been sufficiently explored. We suggest that infrastructure (re-) design methods would be a relevant resource for Tech-Nomads engaged in activities such as the ones from ESF

    @inproceedings{pinatti_de_carvalho_role_2017,
    address = {Sheffield, UK},
    title = {The {Role} of {Technological} {Infrastructure} in {Nomadic} {Practices} of a {Social} {Activist} {Community}},
    url = {https://www.iisi.de/wp-content/uploads/2018/07/6_decarvalho-et-al_v14_n3.pdf},
    abstract = {Infrastructure is undoubtedly a key resource for people engaged in technologically-mediated nomadicity. Tech-Nomads rely on technological infrastructure components, such as Wi-Fi availability, to mobilise their workplaces and effectively accomplish their productive activities. In this paper, we introduce findings from an investigation focusing on how technological infrastructures are re-instantiated according to emerging demands. We focus particularly on the European Social Forum (ESF) (an activists' platform) and the problems faced by the members of this network in mobilising its infrastructure, stressing findings from the literature about the importanceof making infrastructure visible for nomadic practices, which have not yet been sufficiently explored. We suggest that infrastructure (re-) design methods would be a relevant resource for Tech-Nomads engaged in activities such as the ones from ESF},
    booktitle = {Proceedings of the {ECSCW}-{Workshop} on {Nomadic} {Culture} {Beyond} {Work} {Practices}, {International} {Reports} on {Socio}-{Informatics} ({IRSI})},
    author = {Pinatti de Carvalho, Aparecido Fabiano and Saeed, Saqib and Reuter, Christian and Wulf, Volker},
    year = {2017},
    keywords = {HCI, Peace, Infrastructure, Ranking-WKWI-C},
    pages = {41--47},
    }

  • Christian Reuter, Marc-André Kaufhold, Inken Leopold, Hannah Knipp (2017)
    Informing the Population: Mobile Warning Apps
    In: Michael Klafft: Risk and Crisis Communication in Disaster Prevention and Management. Wilhelmshaven: epubli, , 31–41.
    [BibTeX] [Abstract] [Download PDF]

    Catastrophes like the storms in Europe in spring 2016, but also terrorist attacks regularly not only lead to extensive monetary damage but also threaten human lives. In such situations, the population desires information about the status of damage and safe behaviours. Apps can address this potentially, but comparatively, record a low number of users. Based on Reuter et al. (2017), this article shows the importance of information in disaster situations and illustrates features from current mobile warning apps.

    @incollection{reuter_informing_2017,
    address = {Wilhelmshaven},
    title = {Informing the {Population}: {Mobile} {Warning} {Apps}},
    isbn = {978-3-7450-5448-4},
    url = {https://peasec.de/paper/2017/2017_ReuterKaufholdLeopoldKnipp_InformingthePopulation.pdf},
    abstract = {Catastrophes like the storms in Europe in spring 2016, but also terrorist attacks regularly not only lead to extensive monetary damage but also threaten human lives. In such situations, the population desires information about the status of damage and safe behaviours. Apps can address this potentially, but comparatively, record a low number of users. Based on Reuter et al. (2017), this article shows the importance of information in disaster situations and illustrates features from current mobile warning apps.},
    booktitle = {Risk and {Crisis} {Communication} in {Disaster} {Prevention} and {Management}},
    publisher = {epubli},
    author = {Reuter, Christian and Kaufhold, Marc-André and Leopold, Inken and Knipp, Hannah},
    editor = {Klafft, Michael},
    year = {2017},
    keywords = {Crisis, HCI, Student, Projekt-KontiKat, Peace},
    pages = {31--41},
    }

  • Christian Reuter, Marc-André Kaufhold, René Steinfort (2017)
    Rumors, Fake News and Social Bots in Conflicts and Emergencies: Towards a Model for Believability in Social Media
    Proceedings of the Information Systems for Crisis Response and Management (ISCRAM) Albi, France.
    [BibTeX] [Abstract] [Download PDF]

    The use of social media is gaining more and more in importance in ordinary life but also in conflicts and emergencies. The social big data, generated by users, is partially also used as a source for situation assessment, e.g. to receive pictures or to assess the general mood. However, the information’s believability is hard to control and can deceive. Rumors, fake news and social bots are phenomenons that challenge the easy consumption of social media. To address this, our paper explores the believability of content in social media. Based on foundations of information quality we conducted a literature study to derive a three-level model for assessing believability. It summarizes existing assessment approaches, assessment criteria and related measures. On this basis, we describe several steps towards the development of an assessment approach that works across different types of social media.

    @inproceedings{reuter_rumors_2017,
    address = {Albi, France},
    title = {Rumors, {Fake} {News} and {Social} {Bots} in {Conflicts} and {Emergencies}: {Towards} a {Model} for {Believability} in {Social} {Media}},
    url = {http://www.peasec.de/paper/2017/2017_ReuterKaufholdSteinfort_RumorsFakeNewsBotsBelievability_ISCRAM.pdf},
    abstract = {The use of social media is gaining more and more in importance in ordinary life but also in conflicts and emergencies. The social big data, generated by users, is partially also used as a source for situation assessment, e.g. to receive pictures or to assess the general mood. However, the information's believability is hard to control and can deceive. Rumors, fake news and social bots are phenomenons that challenge the easy consumption of social media. To address this, our paper explores the believability of content in social media. Based on foundations of information quality we conducted a literature study to derive a three-level model for assessing believability. It summarizes existing assessment approaches, assessment criteria and related measures. On this basis, we describe several steps towards the development of an assessment approach that works across different types of social media.},
    booktitle = {Proceedings of the {Information} {Systems} for {Crisis} {Response} and {Management} ({ISCRAM})},
    publisher = {ISCRAM},
    author = {Reuter, Christian and Kaufhold, Marc-André and Steinfort, René},
    editor = {Comes, Tina and Bénaben, Frédérick and Hanachi, Chihab and Lauras, Matthieu},
    year = {2017},
    keywords = {Crisis, HCI, SocialMedia, Student, Projekt-KontiKat, Peace},
    pages = {583--591},
    }

  • Christian Reuter, Marc-André Kaufhold, Inken Leopold, Hannah Knipp (2017)
    Katwarn, NINA or FEMA? Multi-Method Study on Distribution, Use and Public Views on Crisis Apps
    European Conference on Information Systems (ECIS) Guimarães, Portugal.
    [BibTeX] [Abstract] [Download PDF]

    Crises, such as thunderstorms and an increasing number of (recognised) terroristic attacks in 2015, 2016, and 2017, do not only lead to extensive monetary damage, but also threaten human lives and influence citizens‘ perceptions of safety and security. In such situations, the population demands information about the damage and safe behaviour. Although some apps are available to provide this information, the number of users seems relatively low. Focussing on Germany, this study aims to research (1) the distribution of crisis apps in the population, (2) the kinds of crisis apps currently used, as well as (3) needed core functionalities of warning apps. This multi-method study analyses crisis apps by investigating their utilisation quantitatively in a snowball-based survey in Europe (n=1,034) and in a representative survey in Germany (n=1,369). Based on this, the German warning apps Katwarn and NINA and the US-American app FEMA are evaluated qualitatively (n=22). The results revealed requirements which informed the implementation of a warning app prototype. The prototype combines the identified advantages of the apps evaluated in the study, containing warnings and all-clear, recommendations for action, functions to contact friends and helpers. The contributions of this work are findings on the distribution of crisis apps in Europe and Germany (both 16\%), the kinds of crisis apps used (mostly weather and warning apps), and empirically based requirements for warning apps which can be integrated in further developments of existing apps and a prototype for such an app.

    @inproceedings{reuter_katwarn_2017,
    address = {Guimarães, Portugal},
    title = {Katwarn, {NINA} or {FEMA}? {Multi}-{Method} {Study} on {Distribution}, {Use} and {Public} {Views} on {Crisis} {Apps}},
    url = {http://www.peasec.de/paper/2017/2017_ReuterKaufholdLeopoldKnipp_CrisisApps_ECIS.pdf},
    abstract = {Crises, such as thunderstorms and an increasing number of (recognised) terroristic attacks in 2015, 2016, and 2017, do not only lead to extensive monetary damage, but also threaten human lives and influence citizens' perceptions of safety and security. In such situations, the population demands information about the damage and safe behaviour. Although some apps are available to provide this information, the number of users seems relatively low. Focussing on Germany, this study aims to research (1) the distribution of crisis apps in the population, (2) the kinds of crisis apps currently used, as well as (3) needed core functionalities of warning apps. This multi-method study analyses crisis apps by investigating their utilisation quantitatively in a snowball-based survey in Europe (n=1,034) and in a representative survey in Germany (n=1,369). Based on this, the German warning apps Katwarn and NINA and the US-American app FEMA are evaluated qualitatively (n=22). The results revealed requirements which informed the implementation of a warning app prototype. The prototype combines the identified advantages of the apps evaluated in the study, containing warnings and all-clear, recommendations for action, functions to contact friends and helpers. The contributions of this work are findings on the distribution of crisis apps in Europe and Germany (both 16\%), the kinds of crisis apps used (mostly weather and warning apps), and empirically based requirements for warning apps which can be integrated in further developments of existing apps and a prototype for such an app.},
    booktitle = {European {Conference} on {Information} {Systems} ({ECIS})},
    publisher = {AIS},
    author = {Reuter, Christian and Kaufhold, Marc-André and Leopold, Inken and Knipp, Hannah},
    year = {2017},
    keywords = {Crisis, HCI, Student, Projekt-EmerGent, A-Paper, Ranking-VHB-B, Ranking-WKWI-A, Ranking-CORE-A, Projekt-KontiKat, Peace},
    pages = {2187--2201},
    }

  • Christian Reuter, Katja Pätsch, Elena Runft (2017)
    Terrorbekämpfung mithilfe sozialer Medien – ein explorativer Einblick am Beispiel von Twitter
    Proceedings of the International Conference on Wirtschaftsinformatik (WI) St. Gallen, Switzerland.
    [BibTeX] [Abstract] [Download PDF]

    Das Internet und insbesondere soziale Medien werden bekanntermaßen nicht nur zu vermeintlich guten Zwecken genutzt. So findet die Rekrutierung neuer Mitglieder und die Verbreitung von Ideologien des Terrorismus ebenfalls über dieses Medium statt. Aber auch die Terrorismusbekämpfung bedient sich gleicher Werkzeuge. Die Art und Weise dieser Gegenmaßnahmen sowie die Vorgehensweisen sollen in diesem Artikel thematisiert werden. Im ersten Teil wird der Forschungsstand zusammengefasst. Der zweite Teil stellt eine explorative empirische Studie der Terrorismusbekämpfung in sozialen Medien, insbesondere in Twitter, dar. Verschiedene, möglichst charakteristische Formen werden in diesem Rahmen am Beispiel von Twitter strukturiert. Ziel ist es, sich diesem hochrelevanten Gebiet mit dem Ziel von Frieden und Sicherheit aus Perspektive der Wirtschaftsinformatik zu nähern und weiteren Forschungsarbeiten in diesem Gebiet als Grundlage und Ausgangspunkt dienen zu können.

    @inproceedings{reuter_terrorbekampfung_2017,
    address = {St. Gallen, Switzerland},
    title = {Terrorbekämpfung mithilfe sozialer {Medien} – ein explorativer {Einblick} am {Beispiel} von {Twitter}},
    url = {http://www.wineme.uni-siegen.de/paper/2017/2017_ReuterPaetschRunft_TerrorbekaempfungSozialeMedien_WI.pdf},
    abstract = {Das Internet und insbesondere soziale Medien werden bekanntermaßen nicht nur zu vermeintlich guten Zwecken genutzt. So findet die Rekrutierung neuer Mitglieder und die Verbreitung von Ideologien des Terrorismus ebenfalls über dieses Medium statt. Aber auch die Terrorismusbekämpfung bedient sich gleicher Werkzeuge. Die Art und Weise dieser Gegenmaßnahmen sowie die Vorgehensweisen sollen in diesem Artikel thematisiert werden. Im ersten Teil wird der Forschungsstand zusammengefasst. Der zweite Teil stellt eine explorative empirische Studie der Terrorismusbekämpfung in sozialen Medien, insbesondere in Twitter, dar. Verschiedene, möglichst charakteristische Formen werden in diesem Rahmen am Beispiel von Twitter strukturiert. Ziel ist es, sich diesem hochrelevanten Gebiet mit dem Ziel von Frieden und Sicherheit aus Perspektive der Wirtschaftsinformatik zu nähern und weiteren Forschungsarbeiten in diesem Gebiet als Grundlage und Ausgangspunkt dienen zu können.},
    booktitle = {Proceedings of the {International} {Conference} on {Wirtschaftsinformatik} ({WI})},
    publisher = {AIS},
    author = {Reuter, Christian and Pätsch, Katja and Runft, Elena},
    editor = {Leimeister, J.M. and Brenner, W.},
    year = {2017},
    keywords = {Crisis, HCI, SocialMedia, Student, Projekt-EmerGent, Ranking-CORE-C, Ranking-VHB-C, Ranking-WKWI-A, Peace},
    pages = {649--663},
    }

    2016

  • Christian Reuter, Gordian Geilen, Robin Gellert (2016)
    Sicherheit vs. Privatsphäre: Zur Akzeptanz von Überwachung in sozialen Medien im Kontext von Terrorkrisen
    Informatik 2016: von Menschen für Menschen Klagenfurt.
    [BibTeX] [Abstract] [Download PDF]

    Nach den terroristischen Anschlägen in Paris 2015 und Brüssel 2016 wurde das Bedürfnis nach mehr Sicherheit und Überwachung im Internet laut. Als Folge der Enthüllungen der Überwachungs- und Spionagetechniken der National Security Agency (NSA) durch Edward Snowden 2013 konnte in der Bevölkerung aber auch ein Aufschrei nach erhöhtem Schutz der Privatsphäre im Internet wahrgenommen werden. Die geschilderten Ereignisse verdeutlichen die gegensätzlichen Wünsche nach Sicherheit und Überwachung im Internet sowie Schutz der Privatsphäre. Im ersten Teil dieses Beitrags stellen wir den Stand der Forschung im Bereich Terror, Sicherheit und Privatsphäre in sozialen Medien dar. Im zweiten Teil führen wir eine explorative Studie durch, um zu beleuchten, ob Bürgerinnen und Bürger in Krisenzeiten bereit wären, ihre Privatsphäre im Internet, vor allem in sozialen Netzwerken, zugunsten von Sicherheit zu reduzieren. Basierend auf qualitativen Daten zeigt diese Arbeit Meinungscluster und Tendenzen in Bezug auf das Nullsummenspiel „Sicherheit und Privatsphäre“.

    @inproceedings{reuter_sicherheit_2016,
    address = {Klagenfurt},
    title = {Sicherheit vs. {Privatsphäre}: {Zur} {Akzeptanz} von Überwachung in sozialen {Medien} im {Kontext} von {Terrorkrisen}},
    url = {http://subs.emis.de/LNI/Proceedings/Proceedings259/P-259.pdf#page=1760},
    abstract = {Nach den terroristischen Anschlägen in Paris 2015 und Brüssel 2016 wurde das Bedürfnis nach mehr Sicherheit und Überwachung im Internet laut. Als Folge der Enthüllungen der Überwachungs- und Spionagetechniken der National Security Agency (NSA) durch Edward Snowden 2013 konnte in der Bevölkerung aber auch ein Aufschrei nach erhöhtem Schutz der Privatsphäre im Internet wahrgenommen werden. Die geschilderten Ereignisse verdeutlichen die gegensätzlichen Wünsche nach Sicherheit und Überwachung im Internet sowie Schutz der Privatsphäre. Im ersten Teil dieses Beitrags stellen wir den Stand der Forschung im Bereich Terror, Sicherheit und Privatsphäre in sozialen Medien dar. Im zweiten Teil führen wir eine explorative Studie durch, um zu beleuchten, ob Bürgerinnen und Bürger in Krisenzeiten bereit wären, ihre Privatsphäre im Internet, vor allem in sozialen Netzwerken, zugunsten von Sicherheit zu reduzieren. Basierend auf qualitativen Daten zeigt diese Arbeit Meinungscluster und Tendenzen in Bezug auf das Nullsummenspiel „Sicherheit und Privatsphäre“.},
    booktitle = {Informatik 2016: von {Menschen} für {Menschen}},
    publisher = {GI-Edition-Lecture Notes in Informatics (LNI)},
    author = {Reuter, Christian and Geilen, Gordian and Gellert, Robin},
    editor = {Mayr, Heinrich C. and Pinzger, Martin},
    year = {2016},
    keywords = {HCI, SocialMedia, Student, Ranking-CORE-C, Ranking-VHB-C, UsableSec, Security, Peace, Projekt-KOKOS},
    }

  • Christian Reuter, Robin Gellert, Gordian Geilen (2016)
    Reception of Terror in Germany – Security, Privacy and Social Media
    Environmental Informatics – Stability, Continuity, Innovation. Current trends and future perspectives based on 30 years of history. Adjunct Proceedings of the EnviroInfo 2016 conference Berlin.
    [BibTeX] [Download PDF]

    @inproceedings{reuter_reception_2016,
    address = {Berlin},
    title = {Reception of {Terror} in {Germany} – {Security}, {Privacy} and {Social} {Media}},
    url = {http://www.peasec.de/paper/2016/2016_ReuterGeilenGellert_ReceptionTerrorGermany-SecurityPrivacySocialMedia_EnviroInfo_selbst.pdf},
    booktitle = {Environmental {Informatics} – {Stability}, {Continuity}, {Innovation}. {Current} trends and future perspectives based on 30 years of history. {Adjunct} {Proceedings} of the {EnviroInfo} 2016 conference},
    author = {Reuter, Christian and Gellert, Robin and Geilen, Gordian},
    editor = {Wohlgemuth, Volker and Fuchs-Kittowski, Frank and Wittmann, Jochen},
    year = {2016},
    keywords = {SocialMedia, UsableSec, Security, Peace, Projekt-KOKOS},
    pages = {151--156},
    }

  • Christian Reuter, Katja Pätsch, Elena Runft (2016)
    Terrorismus und soziale Medien – Propaganda und Gegenpropaganda
    Mensch und Computer – Tagungsband Aachen, Germany. doi:10.18420/muc2016-mci-0209
    [BibTeX] [Abstract] [Download PDF]

    Der Terrorismus nutzt das Internet und insbesondere soziale Medien bereits seit einiger Zeit zur Rekrutierung neuer Mitglieder und zur Verbreitung ihrer Ideologie. Aber auch deren Gegner nutzen das Internet zur Terrorbekämpfung. Auch wenn es zum Einsatz sozialer Medien in Krisen bereits zahlreiche Veröffentlichungen gibt, wurde deren Einsatz im Terrorismus, einer besonderen Art der Krise, insbesondere in der digitalen Terrorbekämpfung, noch weniger betrachtet. Dieser Artikel fasst im ersten Teil den Stand der Forschung in jenem Bereich zusammen. Im zweiten Teil stellt er eine explorative empirische Studie zur Terrorismusbekämpfung in sozialen Medien dar. Hierzu werden verschiedene, möglichst repräsentative Formen am Beispiel von Twitter analysiert und gegliedert. Ziel ist die Schaffung eines Überblicks, der weiteren Forschungsarbeiten als Grundlage dienen kann.

    @inproceedings{reuter_terrorismus_2016,
    address = {Aachen, Germany},
    title = {Terrorismus und soziale {Medien} – {Propaganda} und {Gegenpropaganda}},
    url = {https://dl.gi.de/bitstream/handle/20.500.12116/178/bitstream_8792.pdf},
    doi = {10.18420/muc2016-mci-0209},
    abstract = {Der Terrorismus nutzt das Internet und insbesondere soziale Medien bereits seit einiger Zeit zur Rekrutierung neuer Mitglieder und zur Verbreitung ihrer Ideologie. Aber auch deren Gegner nutzen das Internet zur Terrorbekämpfung. Auch wenn es zum Einsatz sozialer Medien in Krisen bereits zahlreiche Veröffentlichungen gibt, wurde deren Einsatz im Terrorismus, einer besonderen Art der Krise, insbesondere in der digitalen Terrorbekämpfung, noch weniger betrachtet. Dieser Artikel fasst im ersten Teil den Stand der Forschung in jenem Bereich zusammen. Im zweiten Teil stellt er eine explorative empirische Studie zur Terrorismusbekämpfung in sozialen Medien dar. Hierzu werden verschiedene, möglichst repräsentative Formen am Beispiel von Twitter analysiert und gegliedert. Ziel ist die Schaffung eines Überblicks, der weiteren Forschungsarbeiten als Grundlage dienen kann.},
    booktitle = {Mensch und {Computer} - {Tagungsband}},
    publisher = {Gesellschaft für Informatik e.V.},
    author = {Reuter, Christian and Pätsch, Katja and Runft, Elena},
    editor = {Prinz, W. and Borchers, J. and Jarke, M.},
    year = {2016},
    keywords = {SocialMedia, Student, Peace},
    }