Working list of wildlife overpasses worldwide – 2026 Update
Interstate 11 Wildlife Overpass – Boulder City, Nevada – Source: conteches.comThe following working list identifies wildlife overpasses, bridges, and ecoducts built across roadways, railways, canals, and highways around the globe. Other synonyms used to describe these structures include, but are not limited to:
The term “Ecoduct” seem to have become the most commonly used term in Europe and can be defined as an arched viaduct (land bridge) for ecological uses such as wildlife. “Wildlife Overpass” tends to be most often used in North America.
The list does not include underpasses, tunnels, and similar structures for wildlife to use. In certain places, ecoducts are referred to as tunnels. Those that are actually ecoducts are included on this list. In addition, those green bridges in England that are primarily meant for farm animal movement have not been included.
Fauna Rope Bridge in Australia – Source: faunatech.com.auWildlife overpasses/ecoducts can now be found on every continent except Antarctica, with them now in existence in nearly 40 nations that are listed below. Some surprising nations where no ecoducts have been identified thus far include Italy, Japan, New Zealand, Norway, South Africa, and Taiwan. As this is a working list, any additions, corrections, or suggestions are most appreciated.
Highway 101 Ecoduct in Argentina – Source: conservationleadershipprogramme.orgArgentina
Australia
Other(s)
Austria
Belgium
Brazil
Canada
China
Costa Rica
Croatia
Czechia
Denmark
Estonia
Finland
France
Germany
Greece
India
Ireland
Israel
Kenya
Latvia
Luxembourg
Malaysia
Netherlands
New Zealand
Poland
Romania
Singapore
Slovakia
Slovenia
South Korea
Spain
Sweden
Switzerland
Thailand
Turkiye
United Kingdom
United States
*”The overpass is the single largest bridge structure for wildlife in North America and one of the largest in the world at 200 feet wide and 209 feet long covering 41,800 square feet, nearly an acre.” – Source: governors office.colorado.gov
Those seen by post author in the USA and Canada are shown in italics.
Liberty Canyon Wildlife Overpass – California – Source: usatoday.comSOURCES:
#1 #11 #2 #40 #5 #animalBridges #animals #bridges #ecoBridges #ecoLinks #ecoducts #ecopont #ecosystems #faunaBridges #Grünbrücke #greenBridges #landBridges #nature #natureBridges #overcrossings #ropeBridges #wildlife #wildlifeOverpasses
DrWeb’s Top Ten Christmas Movies…
National Lampoon’s Christmas Vacation (Photo credit: Wikipedia)DrWeb’s Top Ten Christmas Movies – 2025 update
[originally published 12/24 in 2004, from my old blog]
Here’s my favorite Christmas movies, with links to see more about them at the Internet Movie Database..
I know I said top ten, but I’m adding a movie to the mix this year, let’s call it an extra listing #11.. see below.. if you haven’t seen the “Office Christmas Party,” settle in for some hilarious, over-the-top spoofing of holiday parties and office culture…
enjoy the holidays…
1) A Christmas Carol – The early version from 1951 with Alastair Sim is still my favorite, and favorite version of this Dickens’ tale…
2) National Lampoon’s Christmas Vacation – The Griswald Family Christmas is a holiday fun treat, with enough silly gags, laughs, and even risque fun.. there’s nothing like an old-fashioned family Christmas…
3) Christmas in Connecticut – Old black and white that never fails to make me laugh, and tug at the heartstrings.. yes, sentimental but a favorite…
4) Love Actually – New onto my list this year, I can’t quite get that Christmas is All Around song out of my head, nor the criss-star-crossed lovers in this homage to British love in all its variety.. a new holiday favorite.. and I want the soundtrack CD…
5) Serendipity – Another romantic comedy, which happens to take place in part at Christmas.. it’s magical, lyrical, funny, and lifts you up where you belong…
6) A Christmas Carol – To my mind, this version with Patrick Stewart steals the thunder of classic-redone well, and puts to shame some other versions other there.. for a modern retelling with power, try this one.. made for tv, but looks very good…
7) Home Alone – The original still sings a tale of lonely boy, loser criminals, and a lost family, at Christmastime.. good, and pass on the sequels…
8) A Christmas Story – Hilarious romp in the 1940s with a boy, a BB gun, Santa, elves, dogs eating turkey, and more…
9) It’s a Wonderful Life – No list would be complete for Christmas without this favorite look at life without *you* and the magic we all make in each life we touch.. always good to view on Christmas Eve…
10) White Christmas – Irving Berlin’s music, Danny Kaye and Bing Crosby and some wonderful ladies led by Rosemary Clooney make a holiday winner.. complete with shows, trains, snow, and post-WWII moments to reflect on…
11) Office Christmas Party – “When his uptight CEO sister threatens to shut down his branch, the branch manager throws an epic Christmas party in order to land a big client and save the day, but the party gets way out of hand…” -IMDB ..it’s wild and wacky, but somehow, it all works.. maybe don’t show to the whole family, has some rough language, etc. But, I laugh every time I watch…
Merry Christmas Eve to all, and to all, a good night…
Dec 24, 2004 10:47:41 AM | Current Affairs, Film #11 #2025Update #Blog #ChristmasMovies #DrWeb #DrWebSDomain #TopTenPEASEC 2025: The Year: 3 Completed PhDs (Governing (In)Security, Threat Intelligence, Information Sovereignty), Conclusion as Dean, New Positions, 7 Awards
Dear Members, Collaborators and Friends of PEASEC,
As 2025 draws to a close, we thank you for your continued support. In a year shaped by ongoing global challenges, our work aims to contribute – however modestly – to addressing them:
All of this has only been possible thanks to our strong team and dedicated network. Thank you for being part of our journey throughout 2025.
Wishing you a peaceful holiday season and a successful start into the New Year. We look forward to continuing our collaboration in 2026!
Warm regards,
The PEASEC Team
Doctoral Theses
Staff Developments
Leadership
Teaching
Publications and Awards
Projects, Events and Outreach
News 2025
2025 (54)
A-Paper 2025
(CORE≥A v VHB≥A v WKWI≥A v Thomson Reuters JIF≥1 v GI-CSCW≥A)
2025
Christian Reuter, Amanda Lee Hughes, Cody Buntain (2025)The rise of fake news and misinformation in the digital age poses serious risks for individuals and society, particularly during crises like the Israel-Hamas war, the Russian-Ukraine war, or the COVID-19 pandemic. Misinformation serves as a tool to manipulate public opinion and create discord. Vulnerability to manipulation increases in online spaces during crises, where authoritative information is scarce. Emergency management, public health, political and public administration, as well as media professionals and citizens express concern and seek solutions to enhance information quality during such critical times. This article highlights user-centred approaches to countering fake news and misinformation, tracing their historical evolution from ancient Greece to the present, focussing on their relevance during the COVID-19 crisis and in contemporary information warfare. It describes the vulnerability of audiences to misinformation and outlines prevailing trends in user-centred countermeasures. This article also introduces recent research on the effectiveness of media literacy interventions on truth discernment, a cross-cultural comparison of the perception of negative consequences and the injunctive norm, a comparison of video and text to promote lateral reading in adolescents, content-specific indicators on Twitter from a user perspective, a learning system for detecting misinformation as well as ethical and security considerations in automated detection.
@article{reuter_combating_2025,
title = {Combating {Information} {Warfare}: {State} and {Trends} in {User}-{Centered} {Countermeasures} against {Fake} {News} and {Misinformation}},
volume = {44},
issn = {0144-929X},
url = {https://doi.org/10.1080/0144929X.2024.2442486},
doi = {10.1080/0144929X.2024.2442486},
abstract = {The rise of fake news and misinformation in the digital age poses serious risks for individuals and society, particularly during crises like the Israel-Hamas war, the Russian-Ukraine war, or the COVID-19 pandemic. Misinformation serves as a tool to manipulate public opinion and create discord. Vulnerability to manipulation increases in online spaces during crises, where authoritative information is scarce. Emergency management, public health, political and public administration, as well as media professionals and citizens express concern and seek solutions to enhance information quality during such critical times. This article highlights user-centred approaches to countering fake news and misinformation, tracing their historical evolution from ancient Greece to the present, focussing on their relevance during the COVID-19 crisis and in contemporary information warfare. It describes the vulnerability of audiences to misinformation and outlines prevailing trends in user-centred countermeasures. This article also introduces recent research on the effectiveness of media literacy interventions on truth discernment, a cross-cultural comparison of the perception of negative consequences and the injunctive norm, a comparison of video and text to promote lateral reading in adolescents, content-specific indicators on Twitter from a user perspective, a learning system for detecting misinformation as well as ethical and security considerations in automated detection.},
number = {13},
journal = {Behaviour \& Information Technology (BIT)},
author = {Reuter, Christian and Hughes, Amanda Lee and Buntain, Cody},
year = {2025},
keywords = {Crisis, HCI, Peace, Projekt-NEBULA, A-Paper, Ranking-CORE-A, Ranking-ImpactFactor, SocialMedia},
pages = {3348--3361},
} Thea Riebe, Anja-Liisa Gonsior, Lilian Reichert, Christian Reuter (2025)The development of artificial intelligence and autonomous functions in the military domain has an immense impact on technologies being developed by the private defence industry. Defence firms contribute to the narratives and visions on autonomous weapon systems and the future of warfare, e.g. in the form of strategic marketing of their products. However, their role has so far been understudied, especially regarding autonomous weapon systems. As the normative debate revolves around aspects of human control, this work examines the narratives of (meaningful) human control in the marketing of autonomous military systems by defence manufacturers. Based on a comprehensive content analysis of twenty defence firms, we identified three main narratives, which envision autonomy as a military advantage, the role of the human in the future of warfare, and human-machine teaming. Based on the results, we argue that defence companies reproduce and adapt narratives which shape expectations and visions of human control of autonomous weapon systems in anticipation of emerging norms for (meaningful) human control. However, without specifications and verification mechanisms, there is no indication that human control will be meaningful.
@article{riebe_envisioning_2025,
title = {Envisioning {Human}-{Machine} {Interaction} in {Future} {Warfare}: {Defence} {Industry} {Narratives} on {Human} {Control} of {Autonomous} {Weapon} {Systems}},
volume = {39},
issn = {1360-0826},
url = {https://doi.org/10.1080/13600826.2024.2436966},
doi = {10.1080/13600826.2024.2436966},
abstract = {The development of artificial intelligence and autonomous functions in the military domain has an immense impact on technologies being developed by the private defence industry. Defence firms contribute to the narratives and visions on autonomous weapon systems and the future of warfare, e.g. in the form of strategic marketing of their products. However, their role has so far been understudied, especially regarding autonomous weapon systems. As the normative debate revolves around aspects of human control, this work examines the narratives of (meaningful) human control in the marketing of autonomous military systems by defence manufacturers. Based on a comprehensive content analysis of twenty defence firms, we identified three main narratives, which envision autonomy as a military advantage, the role of the human in the future of warfare, and human-machine teaming. Based on the results, we argue that defence companies reproduce and adapt narratives which shape expectations and visions of human control of autonomous weapon systems in anticipation of emerging norms for (meaningful) human control. However, without specifications and verification mechanisms, there is no indication that human control will be meaningful.},
number = {4},
journal = {Global Society},
author = {Riebe, Thea and Gonsior, Anja-Liisa and Reichert, Lilian and Reuter, Christian},
year = {2025},
keywords = {HCI, Peace, Projekt-TraCe, A-Paper, Ranking-ImpactFactor, AuswahlPeace, Projekt-ATHENE-CyAware, Student},
pages = {421--445},
} Enno Steinbrink, Laura Guntrum, Christian Reuter (2025)In conflict-ridden environments, timely and accurate information is critical for those dealing with the dynamic of events. When individuals have to flee, it becomes evident that refugees frequently rely on information and communication technologies (ICT) for information acquisition, travel coordination, and maintaining connections with related parties. Based on 17 interviews, this research explores how Ukrainian refugees, who sought protection in Germany due to the 2022 Russian full-scale invasion, use ICT before, during, and after their flight. By providing empirical findings, the results show in depth how contextual factors, such as infrastructural instability, privacy concerns and an advanced digitalization, interrelate with user behaviors. Analyzing the multifaceted civilian ICT use in the context of war and flight, this exploratory research contributes to the existing research on HCI in migration contexts and connects to several topics of CSCW. By contrasting case specifics, this work highlights what makes Ukraine a special case in this research area. Furthermore, this paper examines both existing and emerging affordances of ICT in the context of flight, and identifies the crucial role of messenger groups for information gathering in all phases of the flight. Lastly, collaborative dimensions of the identified affordances are discussed.
@article{steinbrink_smartphone_2025,
title = {Smartphone and {ICT} {Use} {Among} {Ukrainian} {Refugees}: {Technology} {Support} during {War}, {Flight}, and {Adaptation} in {Germany}},
url = {https://www.peasec.de/paper/2025/2025_SteinbrinkGuntrumReuter_Ukraine_CSCW.pdf},
doi = {10.1145/3711067},
abstract = {In conflict-ridden environments, timely and accurate information is critical for those dealing with the dynamic of events. When individuals have to flee, it becomes evident that refugees frequently rely on information and communication technologies (ICT) for information acquisition, travel coordination, and maintaining connections with related parties. Based on 17 interviews, this research explores how Ukrainian refugees, who sought protection in Germany due to the 2022 Russian full-scale invasion, use ICT before, during, and after their flight. By providing empirical findings, the results show in depth how contextual factors, such as infrastructural instability, privacy concerns and an advanced digitalization, interrelate with user behaviors. Analyzing the multifaceted civilian ICT use in the context of war and flight, this exploratory research contributes to the existing research on HCI in migration contexts and connects to several topics of CSCW. By contrasting case specifics, this work highlights what makes Ukraine a special case in this research area. Furthermore, this paper examines both existing and emerging affordances of ICT in the context of flight, and identifies the crucial role of messenger groups for information gathering in all phases of the flight. Lastly, collaborative dimensions of the identified affordances are discussed.},
number = {CSCW},
journal = {Proceedings of the ACM: Human Computer Interaction (PACM): Computer-Supported Cooperative Work and Social Computing},
author = {Steinbrink, Enno and Guntrum, Laura and Reuter, Christian},
year = {2025},
note = {Place: New York, NY, USA
Publisher: Association for Computing Machinery},
keywords = {Crisis, HCI, Projekt-TraCe, A-Paper, Ranking-CORE-A, UsableSec, Projekt-ATHENE, Projekt-GRKPrivacy},
} Markus Bayer, Justin Lutz, Christian Reuter (2025)Active learning is designed to minimize annotation efforts by prioritizing instances that most enhance learning. However, many active learning strategies struggle with a ‘coldstart’ problem, needing substantial initial data to be effective. This limitation reduces their utility in the increasingly relevant fewshot scenarios, where the instance selection has a substantial impact. To address this, we introduce ActiveLLM, a novel active learning approach that leverages Large Language Models such as GPT-4, o1, Llama 3, or Mistral Large for selecting instances. We demonstrate that ActiveLLM significantly enhances the classification performance of BERT classifiers in few-shot scenarios, outperforming traditional active learning methods as well as improving the few-shot learning methods ADAPET, PERFECT, and Set- Fit. Additionally, ActiveLLM can be extended to non-few-shot scenarios, allowing for iterative selections. In this way, ActiveLLM can even help other active learning strategies to overcome their cold-start problem. Our results suggest that ActiveLLM offers a promising solution for improving model performance across various learning setups.
@article{bayer_activellm_2025,
title = {{ActiveLLM}: {Large} {Language} {Model}-based {Active} {Learning} for {Textual} {Few}-{Shot} {Scenarios}},
url = {https://arxiv.org/pdf/2405.10808},
doi = {10.48550/arXiv.2405.10808},
abstract = {Active learning is designed to minimize annotation
efforts by prioritizing instances that
most enhance learning. However, many active
learning strategies struggle with a ‘coldstart’
problem, needing substantial initial
data to be effective. This limitation reduces
their utility in the increasingly relevant fewshot
scenarios, where the instance selection
has a substantial impact. To address this, we
introduce ActiveLLM, a novel active learning
approach that leverages Large Language
Models such as GPT-4, o1, Llama 3, or
Mistral Large for selecting instances. We
demonstrate that ActiveLLM significantly
enhances the classification performance of
BERT classifiers in few-shot scenarios, outperforming
traditional active learning methods
as well as improving the few-shot learning
methods ADAPET, PERFECT, and Set-
Fit. Additionally, ActiveLLM can be extended
to non-few-shot scenarios, allowing
for iterative selections. In this way, ActiveLLM
can even help other active learning
strategies to overcome their cold-start problem.
Our results suggest that ActiveLLM
offers a promising solution for improving
model performance across various learning
setups.},
journal = {Transactions of the Association for Computational Linguistics (TACL)},
author = {Bayer, Markus and Lutz, Justin and Reuter, Christian},
year = {2025},
keywords = {A-Paper, Projekt-ATHENE-CyAware, Student, Security, UsableSec, Projekt-CYLENCE, CORE-A*},
} Christian Reuter, Amanda Lee Hughes, Cody Buntain (2025)The rise of fake news and misinformation in the digital age poses serious risks for individuals and society, particularly during crises like the Israel-Hamas war, the Russian-Ukraine war, or the COVID-19 pandemic. Misinformation serves as a tool to manipulate public opinion and create discord. Vulnerability to manipulation increases in online spaces during crises, where authoritative information is scarce. Emergency management, public health, political and public administration, as well as media professionals and citizens express concern and seek solutions to enhance information quality during such critical times. This article highlights user-centred approaches to countering fake news and misinformation, tracing their historical evolution from ancient Greece to the present, focussing on their relevance during the COVID-19 crisis and in contemporary information warfare. It describes the vulnerability of audiences to misinformation and outlines prevailing trends in user-centred countermeasures. This article also introduces recent research on the effectiveness of media literacy interventions on truth discernment, a cross-cultural comparison of the perception of negative consequences and the injunctive norm, a comparison of video and text to promote lateral reading in adolescents, content-specific indicators on Twitter from a user perspective, a learning system for detecting misinformation as well as ethical and security considerations in automated detection.
@book{reuter_special_2025,
title = {Special {Issue} on {Combating} {Information} {Warfare}: {User}-{Centered} {Countermeasures} against {Fake} {News} and {Misinformation} - {Behaviour} \& {Information} {Technology} ({BIT})},
abstract = {The rise of fake news and misinformation in the digital age poses serious risks for individuals and society, particularly during crises like the Israel-Hamas war, the Russian-Ukraine war, or the COVID-19 pandemic. Misinformation serves as a tool to manipulate public opinion and create discord. Vulnerability to manipulation increases in online spaces during crises, where authoritative information is scarce. Emergency management, public health, political and public administration, as well as media professionals and citizens express concern and seek solutions to enhance information quality during such critical times. This article highlights user-centred approaches to countering fake news and misinformation, tracing their historical evolution from ancient Greece to the present, focussing on their relevance during the COVID-19 crisis and in contemporary information warfare. It describes the vulnerability of audiences to misinformation and outlines prevailing trends in user-centred countermeasures. This article also introduces recent research on the effectiveness of media literacy interventions on truth discernment, a cross-cultural comparison of the perception of negative consequences and the injunctive norm, a comparison of video and text to promote lateral reading in adolescents, content-specific indicators on Twitter from a user perspective, a learning system for detecting misinformation as well as ethical and security considerations in automated detection.},
publisher = {Taylor \& Francis},
author = {Reuter, Christian and Hughes, Amanda Lee and Buntain, Cody},
year = {2025},
note = {Publication Title: Behaviour \& Information Technology (BIT)},
keywords = {Crisis, HCI, Peace, A-Paper, Ranking-CORE-A, Ranking-ImpactFactor, SocialMedia},
} Julian Bäumler, Thea Riebe, Marc-André Kaufhold, Christian Reuter (2025)In Germany and other countries, specialized non-profit reporting centers combat online hate speech by submitting criminal content to law enforcement agencies, forwarding deletion requests to social media platforms, and providing counseling to victims, thus contributing to the governance mechanism of content moderation as intermediaries between victims and various organizations. Whereas research in computer-supported cooperative work has extensively explored collaboration of and automation for content moderators, there are no works that focus on reporting centers. Based on expert interviews with their staff (N=15), this study finds that most German centers share a collaborative workflow, of which multiple tasks are heavily dependent on inter-organizational exchange. However, there are differences in their implementation of monitoring, content assessment, automation technology adoption, and external collaborators. As the centers are faced with diverse challenges, such as borderline case assessment, psychological burdens, limited visibility, conflicting goals with other actors, and manual repetitive work, our study contributes with nine implications for designing and researching supportive technologies. They provide suggestions for improving hate speech gathering and reporting, researching hate speech prioritization and assessment algorithms, and designing case processing systems. Beyond that, we outline directions for research on inter-organizational collaboration.
@article{baumler_harnessing_2025,
title = {Harnessing {Inter}-{Organizational} {Collaboration} and {Automation} to {Combat} {Online} {Hate} {Speech}: {A} {Qualitative} {Study} with {German} {Reporting} {Centers}},
url = {https://dl.acm.org/doi/10.1145/3710991},
doi = {10.1145/3710991},
abstract = {In Germany and other countries, specialized non-profit reporting centers combat online hate speech by submitting criminal content to law enforcement agencies, forwarding deletion requests to social media platforms, and providing counseling to victims, thus contributing to the governance mechanism of content moderation as intermediaries between victims and various organizations. Whereas research in computer-supported cooperative work has extensively explored collaboration of and automation for content moderators, there are no works that focus on reporting centers. Based on expert interviews with their staff (N=15), this study finds that most German centers share a collaborative workflow, of which multiple tasks are heavily dependent on inter-organizational exchange. However, there are differences in their implementation of monitoring, content assessment, automation technology adoption, and external collaborators. As the centers are faced with diverse challenges, such as borderline case assessment, psychological burdens, limited visibility, conflicting goals with other actors, and manual repetitive work, our study contributes with nine implications for designing and researching supportive technologies. They provide suggestions for improving hate speech gathering and reporting, researching hate speech prioritization and assessment algorithms, and designing case processing systems. Beyond that, we outline directions for research on inter-organizational collaboration.},
journal = {Proceedings of the ACM: Human Computer Interaction (PACM): Computer-Supported Cooperative Work and Social Computing},
author = {Bäumler, Julian and Riebe, Thea and Kaufhold, Marc-André and Reuter, Christian},
year = {2025},
keywords = {Crisis, HCI, A-Paper, Ranking-CORE-A, Projekt-CYLENCE, Projekt-CYWARN, AuswahlCrisis},
} Tom Biselli, Katrin Hartwig, Christian Reuter (2025)The ongoing challenge of misinformation on social media motivates ongoing efforts to find effective countermeasures. In this study, we evaluated the potential of personalised nudging to reduce the sharing of misinformation on social media, as personalised support has been successfully applied in other areas of critical information handling. In an online experiment (N = 396) exposing users to social media posts, we assessed the degree of misinformation sharing between groups receiving (1) no nudges, (2) non-personalised nudges, and (3) personalised nudges. Personalisation was based on three psychometric dimensions – general decision-making style, consideration of future consequences, need for cognition – to assign the most appropriate nudge from a pool of five nudges. The results showed significant differences (p {\textless} .05) between all three groups, with the personalised nudge group sharing the least misinformation. Detailed analyses at the nudge level revealed that one nudge was universally effective and two nudges were effective only in their personalised form. The results generally confirm the potential of personalisation, although the effect is limited in scope. These findings shed light on the nuanced results of nudging studies, highlight the benefits of personalisation, and raise ethical considerations regarding the privacy implications of personalisation and those inherent in nudges.
@article{biselli_mitigating_2025,
title = {Mitigating {Misinformation} {Sharing} on {Social} {Media} through {Personalised} {Nudging}},
volume = {9},
url = {https://www.peasec.de/paper/2025/2025_BiselliHartwigReuter_PersonalisedNudges_CSCW.pdf},
doi = {https://doi.org/10.1145/3711034},
abstract = {The ongoing challenge of misinformation on social media motivates ongoing efforts to find effective countermeasures.
In this study, we evaluated the potential of personalised nudging to reduce the sharing of misinformation on social media, as personalised support has been successfully applied in other areas of critical information handling.
In an online experiment (N = 396) exposing users to social media posts, we assessed the degree of misinformation sharing between groups receiving (1) no nudges, (2) non-personalised nudges, and (3) personalised nudges. Personalisation was based on three psychometric dimensions - general decision-making style, consideration of future consequences, need for cognition - to assign the most appropriate nudge from a pool of five nudges.
The results showed significant differences (p {\textless} .05) between all three groups, with the personalised nudge group sharing the least misinformation. Detailed analyses at the nudge level revealed that one nudge was universally effective and two nudges were effective only in their personalised form.
The results generally confirm the potential of personalisation, although the effect is limited in scope.
These findings shed light on the nuanced results of nudging studies, highlight the benefits of personalisation, and raise ethical considerations regarding the privacy implications of personalisation and those inherent in nudges.},
number = {2},
journal = {Proceedings of the ACM: Human Computer Interaction (PACM): Computer-Supported Cooperative Work and Social Computing},
author = {Biselli, Tom and Hartwig, Katrin and Reuter, Christian},
year = {2025},
keywords = {Crisis, HCI, Projekt-NEBULA, A-Paper, Ranking-CORE-A, Projekt-ATHENE-PriVis},
} Stefka Schmid, Daniel Lambach, Carlo Diehl, Christian Reuter (2025)China, the United States, and the European Union have spoken of a global competition surrounding Artificial Intelligence (AI). There is widespread talk of an ‘AI Arms Race’. But what is the nature of this race? We argue that the arms race metaphor does not capture the dynamics of global competition in the AI sector. Instead, we propose the notion of a ‘geopolitical innovation race’ for technological leadership in a networked global economy. Based on an analysis of government documents, we find that actors (1) are open to both zero-sum or positive-sum approaches in AI development, (2) organise actor networks differently based on national innovation cultures, (3) prioritise economics and status next to security concerns, and (4) are open to how AI should be interpreted. Referring to the competitive race of AI research and development, the three technopoles perpetuate the geopoliticisation of innovation and intertwine security and economic interests.
@article{schmid_arms_2025,
title = {Arms {Race} or {Innovation} {Race}? {Geopolitical} {AI} {Development}},
volume = {30},
issn = {1465-0045},
url = {https://doi.org/10.1080/14650045.2025.2456019},
doi = {10.1080/14650045.2025.2456019},
abstract = {China, the United States, and the European Union have spoken of a global competition surrounding Artificial Intelligence (AI). There is widespread talk of an ‘AI Arms Race’. But what is the nature of this race? We argue that the arms race metaphor does not capture the dynamics of global competition in the AI sector. Instead, we propose the notion of a ‘geopolitical innovation race’ for technological leadership in a networked global economy. Based on an analysis of government documents, we find that actors (1) are open to both zero-sum or positive-sum approaches in AI development, (2) organise actor networks differently based on national innovation cultures, (3) prioritise economics and status next to security concerns, and (4) are open to how AI should be interpreted. Referring to the competitive race of AI research and development, the three technopoles perpetuate the geopoliticisation of innovation and intertwine security and economic interests.},
number = {4},
journal = {Geopolitics},
author = {Schmid, Stefka and Lambach, Daniel and Diehl, Carlo and Reuter, Christian},
year = {2025},
note = {Publisher: Routledge},
keywords = {Peace, Projekt-TraCe, A-Paper, Ranking-ImpactFactor, AuswahlPeace, Projekt-ATHENE, Selected},
pages = {1907--1936},
} Marc-André Kaufhold, Julian Bäumler, Marius Bajorski, Christian Reuter (2025)In light of the increasing vulnerability of citizens against cyberattacks, we conducted three representative surveys with German citizens in 2021 (N=1,093), 2023 (N=1,011), and 2024 (N=1,004) to examine their cyber threat awareness, use of protective security measures, and preferred information channels. While our findings attest large proportions of the German population a high level of cyber threat awareness, many citizens feel inadequately informed about coping with cyberattacks and show little confidence in German security authorities to protect citizens and infrastructures. While age correlated with citizens’ awareness and behavior, we only saw minor temporal differences between datasets. Finally, we provide design and policy implications for enhancing citizens’ awareness of cyber threats and implementing security measures.
@inproceedings{kaufhold_cyber_2025,
address = {Yokohama, Japan},
series = {{CHI} '25},
title = {Cyber {Threat} {Awareness}, {Protective} {Measures} and {Communication} {Preferences} in {Germany}: {Implications} from {Three} {Representative} {Surveys} (2021-2024)},
url = {https://www.peasec.de/paper/2025/2025_KaufholdBäumlerBajorskiReuter_ComparativeCybersecuritySurvey_CHI.pdf},
doi = {10.1145/3706598.3713795},
abstract = {In light of the increasing vulnerability of citizens against cyberattacks, we conducted three representative surveys with German citizens in 2021 (N=1,093), 2023 (N=1,011), and 2024 (N=1,004) to examine their cyber threat awareness, use of protective security measures, and preferred information channels. While our findings attest large proportions of the German population a high level of cyber threat awareness, many citizens feel inadequately informed about coping with cyberattacks and show little confidence in German security authorities to protect citizens and infrastructures. While age correlated with citizens’ awareness and behavior, we only saw minor temporal differences between datasets. Finally, we provide design and policy implications for enhancing citizens’ awareness of cyber threats and implementing security measures.},
booktitle = {Proceedings of the {Conference} on {Human} {Factors} in {Computing} {Systems} ({CHI})},
publisher = {Association for Computing Machinery},
author = {Kaufhold, Marc-André and Bäumler, Julian and Bajorski, Marius and Reuter, Christian},
year = {2025},
keywords = {HCI, A-Paper, Projekt-ATHENE-CyAware, Security, UsableSec, Projekt-CYLENCE, Selected, AuswahlUsableSec, Ranking-CORE-A*},
} Leon Janzen, Florentin Putz, Marc-André Kaufhold, Kolja Straub, Matthias Hollick (2025)Using smartphone apps during crises is well-established, proving critical for efficient crisis response. However, such apps become futile without an Internet connection, which is a common issue during crises. The ongoing 6G standardization explores the capability to provide local cellular connectivity for areas cut off from the Internet in crises. This paper introduces to the HCI community the concept of cellular island connectivity in isolated areas, promising a seamless transition from normal operation to island operation with local-only cellular connectivity. It presents findings from a survey (N = 857) among adult smartphone users from major German cities regarding their smartphone usage preferences in this model. Results show a shift in app demand, with users favoring general-purpose apps over dedicated crisis apps in specific scenarios. We prioritize smartphone services based on their criticality, distinguishing between apps essential for crisis response and those supporting routines. Our findings provide operators, developers, and authorities insights into making user-centric design decisions for implementing island-ready 6G communication.
@inproceedings{janzen_user_2025,
address = {Yokohama, Japan},
series = {{CHI} '25},
title = {The {User} {Perspective} on {Island}-{Ready} {6G} {Communication}: {A} {Survey} of {Future} {Smartphone} {Usage} in {Crisis}-{Struck} {Areas} with {Local} {Cellular} {Connectivity}},
url = {https://www.peasec.de/paper/2025/2025_JanzenPutzKaufholdStraubHollick_UserPerspective6GCommunication_CHI.pdf},
doi = {10.1145/3706598.3714324},
abstract = {Using smartphone apps during crises is well-established, proving critical for efficient crisis response. However, such apps become futile without an Internet connection, which is a common issue during crises. The ongoing 6G standardization explores the capability to provide local cellular connectivity for areas cut off from the Internet in crises. This paper introduces to the HCI community the concept of cellular island connectivity in isolated areas, promising a seamless transition from normal operation to island operation with local-only cellular connectivity. It presents findings from a survey (N = 857) among adult smartphone users from major German cities regarding their smartphone usage preferences in this model. Results show a shift in app demand, with users favoring general-purpose apps over dedicated crisis apps in specific scenarios. We prioritize smartphone services based on their criticality, distinguishing between apps essential for crisis response and those supporting routines. Our findings provide operators, developers, and authorities insights into making user-centric design decisions for implementing island-ready 6G communication.},
booktitle = {Proceedings of the {Conference} on {Human} {Factors} in {Computing} {Systems} ({CHI}) ({Honorable} {Mentions})},
publisher = {Association for Computing Machinery},
author = {Janzen, Leon and Putz, Florentin and Kaufhold, Marc-André and Straub, Kolja and Hollick, Matthias},
year = {2025},
keywords = {HCI, Projekt-emergenCITY, A-Paper, Security, UsableSec, Projekt-CYLENCE, AuswahlCrisis, Ranking-CORE-A*, emergenCITY\_INF, emergenCITY\_SG},
} Markus Henkel, Steffen Haesler, Hiba Al-Najmi, Frank Hessel, Christian Reuter (2025)As smart home technology becomes integral to modern living, researchers must consider safety aspects. While single-purpose devices alert users to specific dangers, integrating them within comprehensive smart home warning systems (SHWSs) offers new safety potentials by allowing actuators to respond to threats based on predefined protocols. Key questions include whether user preferences for automation levels in smart homes are affected by different warning scenarios, and how unwanted automation or false positives influence acceptance. To explore this, we conduct two studies: (1) A lab study in a smart home with various actuators, where participants (N = 48) encounter warnings across three automation levels. (2) A follow-up interview study (N = 16) further evaluating our prototype and unwanted automation situations. Results show that participants preferred higher automation during warnings and were more receptive to smart technology in dangerous situations, though customization remains essential to ensure acceptance. While higher automation levels reduced perceived interruption, some still preferred less intense warnings. Others preferred not receiving warnings of mild dangers, fully relying on automation. Finally, we find that specific safety protocols and handling of false positive alarms must be chosen carefully to avoid mistrust, users feeling a loss of control, and damage through unwanted executions.
@article{henkel_house_2025,
title = {The {House} {That} {Saves} {Me}? {Assessing} the {Role} of {Smart} {Home} {Automation} in {Warning} {Scenarios}},
volume = {9},
shorttitle = {The {House} {That} {Saves} {Me}?},
url = {https://www.peasec.de/paper/2025/2025_HenkelHaeslerAlNajmiHesselReuter_HouseThatSavesMe_IMWUT.pdf},
doi = {10.1145/3712269},
abstract = {As smart home technology becomes integral to modern living, researchers must consider safety aspects. While single-purpose devices alert users to specific dangers, integrating them within comprehensive smart home warning systems (SHWSs) offers new safety potentials by allowing actuators to respond to threats based on predefined protocols. Key questions include whether user preferences for automation levels in smart homes are affected by different warning scenarios, and how unwanted automation or false positives influence acceptance. To explore this, we conduct two studies: (1) A lab study in a smart home with various actuators, where participants (N = 48) encounter warnings across three automation levels. (2) A follow-up interview study (N = 16) further evaluating our prototype and unwanted automation situations. Results show that participants preferred higher automation during warnings and were more receptive to smart technology in dangerous situations, though customization remains essential to ensure acceptance. While higher automation levels reduced perceived interruption, some still preferred less intense warnings. Others preferred not receiving warnings of mild dangers, fully relying on automation. Finally, we find that specific safety protocols and handling of false positive alarms must be chosen carefully to avoid mistrust, users feeling a loss of control, and damage through unwanted executions.},
number = {1},
journal = {Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies (IMWUT)},
author = {Henkel, Markus and Haesler, Steffen and Al-Najmi, Hiba and Hessel, Frank and Reuter, Christian},
year = {2025},
keywords = {Crisis, HCI, Projekt-emergenCITY, A-Paper, Student, Projekt-ATHENE-SecUrban, AuswahlCrisis, Ranking-CORE-A*, emergenCITY\_INF, emergenCITY\_SG},
pages = {5:1--5:32},
} Julian Bäumler, Helen Bader, Marc-André Kaufhold, Christian Reuter (2025)Youth are particularly likely to encounter hateful internet content, which can severely impact their well-being. While most social media provide reporting mechanisms, in several countries, severe hateful content can alternatively be reported to law enforcement or dedicated reporting centers. However, in Germany, many youth never resort to reporting. While research in human-computer interaction has investigated adults’ views on platform-based reporting, youth perspectives and platform-independent alternatives have received little attention. By involving a diverse group of 47 German adolescents and young adults in eight focus group interviews, we investigate how youth-sensitive reporting systems for hateful content can be designed. We explore German youth’s reporting barriers, finding that on platforms, they feel particularly discouraged by deficient rule enforcement and feedback, while platform-independent alternatives are rather unknown and perceived as time-consuming and disruptive. We further elicit their requirements for platform-independent reporting tools and contribute with heuristics for designing youth-sensitive and inclusive reporting systems.
@inproceedings{baumlerYouthSensitiveHatefulContent2025,
address = {Yokohama, Japan},
series = {{CHI} '25},
title = {Towards {Youth}-{Sensitive} {Hateful} {Content} {Reporting}: {An} {Inclusive} {Focus} {Group} {Study} in {Germany}},
url = {https://www.peasec.de/paper/2025/2025_BäumlerBaderKaufholdReuter_HatefulContentReporting_CHI.pdf},
doi = {10.1145/3706598.3713542},
abstract = {Youth are particularly likely to encounter hateful internet content, which can severely impact their well-being. While most social media provide reporting mechanisms, in several countries, severe hateful content can alternatively be reported to law enforcement or dedicated reporting centers. However, in Germany, many youth never resort to reporting. While research in human-computer interaction has investigated adults’ views on platform-based reporting, youth perspectives and platform-independent alternatives have received little attention. By involving a diverse group of 47 German adolescents and young adults in eight focus group interviews, we investigate how youth-sensitive reporting systems for hateful content can be designed. We explore German youth’s reporting barriers, finding that on platforms, they feel particularly discouraged by deficient rule enforcement and feedback, while platform-independent alternatives are rather unknown and perceived as time-consuming and disruptive. We further elicit their requirements for platform-independent reporting tools and contribute with heuristics for designing youth-sensitive and inclusive reporting systems.},
booktitle = {Proceedings of the {Conference} on {Human} {Factors} in {Computing} {Systems} ({CHI}) ({Honorable} {Mentions})},
publisher = {Association for Computing Machinery},
author = {Bäumler, Julian and Bader, Helen and Kaufhold, Marc-André and Reuter, Christian},
year = {2025},
keywords = {Crisis, HCI, A-Paper, Projekt-ATHENE-CyAware, Student, Projekt-CYLENCE, AuswahlCrisis, Selected, Ranking-CORE-A*},
} Jonas Franken, Thomas Reinhold, Timon Dörnfeld, Christian Reuter (2025)The network of subsea data cables (SDC) transmits the majority of international and intercontinental data exchanges. After thirty years of fiber-optic SDC installation across the oceans, almost all coastal and island countries gained access to the only global fixed infrastructure network. Still, there is considerable inequality in the number of available SDC accesses, creating deficits in redundancy for less connected states. Previous research hypothesized multiple factors that influenced the build-up of internet infrastructures but failed to verify these assumptions through inferential statistics. This work highlights the national-level factors that made backbone access provision more – or less – attractive to SDC project decision-makers. Our regression analysis of global country-year data (n = 4916) found that socio-economic (population, GDP), political (state fragility, conflict), and geographic factors (seismic hazard, neighboring territories) significantly influenced the number of active and planned accesses. This work can serve as a foundation for further research leveraging quantitative statistics to unveil hidden structures in the construction of material internet infrastructures and support sustainability in the future allocation of international infrastructure development resources in general.
@article{franken_hidden_2025,
title = {Hidden structures of a global infrastructure: {Expansion} factors of the subsea data cable network},
volume = {215},
issn = {0040-1625},
shorttitle = {Hidden structures of a global infrastructure},
url = {https://www.peasec.de/paper/2025/2025_FrankenReinholdDörnfeldReuter_TechForecasting.pdf},
doi = {10.1016/j.techfore.2025.124068},
abstract = {The network of subsea data cables (SDC) transmits the majority of international and intercontinental data exchanges. After thirty years of fiber-optic SDC installation across the oceans, almost all coastal and island countries gained access to the only global fixed infrastructure network. Still, there is considerable inequality in the number of available SDC accesses, creating deficits in redundancy for less connected states. Previous research hypothesized multiple factors that influenced the build-up of internet infrastructures but failed to verify these assumptions through inferential statistics. This work highlights the national-level factors that made backbone access provision more – or less – attractive to SDC project decision-makers. Our regression analysis of global country-year data (n = 4916) found that socio-economic (population, GDP), political (state fragility, conflict), and geographic factors (seismic hazard, neighboring territories) significantly influenced the number of active and planned accesses. This work can serve as a foundation for further research leveraging quantitative statistics to unveil hidden structures in the construction of material internet infrastructures and support sustainability in the future allocation of international infrastructure development resources in general.},
urldate = {2025-03-03},
journal = {Technological Forecasting and Social Change (TFSC)},
author = {Franken, Jonas and Reinhold, Thomas and Dörnfeld, Timon and Reuter, Christian},
month = jun,
year = {2025},
keywords = {Peace, A-Paper, AuswahlPeace, Security, Projekt-ATHENE-SecUrban, Selected},
pages = {124068},
} Miyerlandy Cabanzo Valencia, Laura Guntrum (2025)Racism extends into the digital realm, manifesting in various forms of technology-facilitated violence (TFV). Although much research centers on the Global North, it is es-sential to investigate this issue in other settings, such as Colombia, where activists are par-ticularly vulnerable to TFV. This study enriches the debate with a qualitative approach, conducting 18 interviews with activists from Chocó and Bogotá. The literature on race and TFV reveals that technology can exacerbate racism through social media, like anonymity, and introduce new forms of racist violence, including deepfakes and algorithmic bias. However, these forms were not prevalent in our interviews. For activists, structural racism, especially limited internet, and electricity access emerged as a primary factor in their ex-periences with racist TFV. Overt TFV escalates to offline threats, silencing dissenting voices. This research emphasizes the need to understand TFV within non-Western regions, advocating for nuanced approaches to addressing digital racism in diverse contexts.
@article{CabanzoValencia2025,
title = {Race, ethnicity, and technology-facilitated violence: {The} experience of activists in chocó, colombia},
doi = {10.1177/14614448251344286},
abstract = {Racism extends into the digital realm, manifesting in various forms of technology-facilitated violence (TFV). Although much research centers on the Global North, it is es-sential to investigate this issue in other settings, such as Colombia, where activists are par-ticularly vulnerable to TFV. This study enriches the debate with a qualitative approach, conducting 18 interviews with activists from Chocó and Bogotá. The literature on race and TFV reveals that technology can exacerbate racism through social media, like anonymity, and introduce new forms of racist violence, including deepfakes and algorithmic bias. However, these forms were not prevalent in our interviews. For activists, structural racism, especially limited internet, and electricity access emerged as a primary factor in their ex-periences with racist TFV. Overt TFV escalates to offline threats, silencing dissenting voices. This research emphasizes the need to understand TFV within non-Western regions, advocating for nuanced approaches to addressing digital racism in diverse contexts.},
journal = {New Media and Society},
author = {Valencia, Miyerlandy Cabanzo and Guntrum, Laura},
year = {2025},
keywords = {Peace, Projekt-TraCe, A-Paper, Security, Ranking-ImpfactFactor},
} Tom Biselli, Katrin Hartwig, Niklas Kneissl, Louis Pouliot, Christian Reuter (2025)Misinformation through data visualisation is particularly dangerous because charts are often perceived as objective data representations. While past efforts to counter misinformation have focused on text and, to some extent, images and video, developing user-centred strategies to combat misleading charts remains an unresolved challenge. This study presents a conceptual approach through ChartChecker, a browser-plugin that aims to automatically extract line and bar chart data and detect potentially misleading features such as non-linear axis scales. A participatory design approach was used to develop a user-centred interface to provide transparent, comprehensible information about potentially misleading features in charts. Finally, a think-aloud study (N = 15) with ChartChecker revealed overall satisfaction with the tools’ user interface, comprehensibility, functionality, and usefulness. The results are discussed in terms of improving user engagement, increasing transparency and optimising tools designed to counter misleading information in charts, leading to overarching design implications for user-centred strategies for the visual domain.
@inproceedings{biselli_chartchecker_2025,
series = {{DIS} '25},
title = {{ChartChecker}: {A} {User}-{Centred} {Approach} to {Support} the {Understanding} of {Misleading} {Charts}},
url = {https://www.peasec.de/paper/2025/2025_BiselliHartwigKneisslPouiliotReuter_ChartChecker_DIS.pdf},
doi = {10.1145/3715336.3735784},
abstract = {Misinformation through data visualisation is particularly dangerous because charts are often perceived as objective data representations. While past efforts to counter misinformation have focused on text and, to some extent, images and video, developing user-centred strategies to combat misleading charts remains an unresolved challenge.
This study presents a conceptual approach through ChartChecker, a browser-plugin that aims to automatically extract line and bar chart data and detect potentially misleading features such as non-linear axis scales. A participatory design approach was used to develop a user-centred interface to provide transparent, comprehensible information about potentially misleading features in charts. Finally, a think-aloud study (N = 15) with ChartChecker revealed overall satisfaction with the tools' user interface, comprehensibility, functionality, and usefulness. The results are discussed in terms of improving user engagement, increasing transparency and optimising tools designed to counter misleading information in charts, leading to overarching design implications for user-centred strategies for the visual domain.},
booktitle = {Proceedings of the {ACM} {Designing} {Interactive} {Systems} {Conference} ({DIS})},
publisher = {Association for Computing Machinery},
author = {Biselli, Tom and Hartwig, Katrin and Kneissl, Niklas and Pouliot, Louis and Reuter, Christian},
year = {2025},
keywords = {Crisis, HCI, Projekt-NEBULA, A-Paper, Ranking-CORE-A, Student, Projekt-ATHENE-PriVis},
} Laura Guntrum, Verena Lasso Mena (2025)Those engaged in the defense of human and land rights, particularly in areas of resource extraction, are increasingly exposed to violence, including a growing number of digital threats. In Colombia, the legacy of decades of armed conflict has overshadowed concerns regarding digital rights, resulting in reports of digital surveillance and online harassment without the requisite judicial oversight. Due to the paucity of research on this topic, this study examines the experiences of 37 environmental and human rights defenders (EHRDs) in La Guajira, North Colombia, who are leveraging information and communication technologies (ICTs) to amplify their concerns in an extractivist region with a history of human rights abuses. The findings indicate a significant prevalence of technology-facilitated violence (TFV) against EHRDs, including death threats, hacking, and hate speech through various digital channels. The spectrum of threats is attributed to several sources, including armed groups, multinational companies, and individuals within the affected communities. The study emphasizes the necessity of adopting a comprehensive approach to violence, integrating TFV into a more expansive conceptualization of violence. Failing to acknowledge the prevalence of TFV may result in an incomplete understanding of the experiences of EHRDs and the consequences of such violence, including self-censorship and emotional harm. Given the increasing overlap between digital and physical violence, we present a framework to enhance the capture and understanding of TFV. Furthermore, this study demonstrates the shortcomings of current security protocols in addressing the multifaceted violence directed at EHRDs due to their opposition to extractive agendas.
@article{guntrum_unmasking_2025,
title = {Unmasking digital threats in the pursuit of human rights and environmental defense in {La} {Guajira}, {North} {Colombia}},
issn = {1369-118X},
url = {https://www.peasec.de/paper/2025/2025_GuntrumLassoMenaReuter_UnmaskingDigitalThreats_InfoCommSoc.pdf},
doi = {10.1080/1369118X.2025.2503444},
abstract = {Those engaged in the defense of human and land rights, particularly in areas of resource extraction, are increasingly exposed to violence, including a growing number of digital threats. In Colombia, the legacy of decades of armed conflict has overshadowed concerns regarding digital rights, resulting in reports of digital surveillance and online harassment without the requisite judicial oversight. Due to the paucity of research on this topic, this study examines the experiences of 37 environmental and human rights defenders (EHRDs) in La Guajira, North Colombia, who are leveraging information and communication technologies (ICTs) to amplify their concerns in an extractivist region with a history of human rights abuses. The findings indicate a significant prevalence of technology-facilitated violence (TFV) against EHRDs, including death threats, hacking, and hate speech through various digital channels. The spectrum of threats is attributed to several sources, including armed groups, multinational companies, and individuals within the affected communities. The study emphasizes the necessity of adopting a comprehensive approach to violence, integrating TFV into a more expansive conceptualization of violence. Failing to acknowledge the prevalence of TFV may result in an incomplete understanding of the experiences of EHRDs and the consequences of such violence, including self-censorship and emotional harm. Given the increasing overlap between digital and physical violence, we present a framework to enhance the capture and understanding of TFV. Furthermore, this study demonstrates the shortcomings of current security protocols in addressing the multifaceted violence directed at EHRDs due to their opposition to extractive agendas.},
journal = {Information, Communication \& Society},
author = {Guntrum, Laura and Mena, Verena Lasso},
year = {2025},
note = {Publisher: Routledge},
keywords = {Peace, Projekt-TraCe, A-Paper},
pages = {1--22},
} Franz Kuntke, Lars Baumgärtner, Jonas Franken, Christian Reuter (2025)The reliability of communication networks can be compromised by various factors, including natural disasters, which highlights the need for backup systems. In rural areas, where restoring public network infrastructure can take time, an alternative communication channel can be particularly valuable. This study explores the potential of repurposing Long Range Wide Area Networks (LoRaWAN) gateways as multi-hop network nodes to create a digital emergency communication system. Farmers, who are increasingly adopting Low Power Wide Area Networks (LPWANs) and are geographically spread, are identified as key stakeholders for such a system. Using OpenStreetMap data on farm locations, we found that connecting farm communities through LoRa communication is theoretically possible in many areas. Simulations using delay-tolerant network routing protocols confirm the feasibility of this approach under various scenarios. While the general feasability was first evaluated with data from Germany, we also conduct analyses for Uganda. A proof-of-concept implementation demonstrates that small messages can be transmitted successfully using real hardware, validating the concept of a decentralized communication infrastructure based on existing equipment. Additionally, we conducted experiments to measure energy consumption, bandwidth usage, and latency in actual hardware setups. This work contributes to various Sustainable Development Goals by supporting resilient communication infrastructure in underserved areas (SDG 9: Industry, Innovation and Infrastructure), strengthening rural communities that are often the last to recover after emergencies (SDG 10: Reduced Inequalities, SDG 11: Sustainable Cities and Communities), and ultimately helping safeguard food systems through improved agricultural coordination and communication (SDG 2: Zero Hunger).
@article{kuntke2025crisis,
title = {Crisis-communication between farms: {Disruption}-tolerant networking with commodity {LoRaWAN} hardware},
abstract = {The reliability of communication networks can be compromised by various factors, including natural disasters, which highlights the need for backup systems. In rural areas, where restoring public network infrastructure can take time, an alternative communication channel can be particularly valuable. This study explores the potential of repurposing Long Range Wide Area Networks (LoRaWAN) gateways as multi-hop network nodes to create a digital emergency communication system. Farmers, who are increasingly adopting Low Power Wide Area Networks (LPWANs) and are geographically spread, are identified as key stakeholders for such a system. Using OpenStreetMap data on farm locations, we found that connecting farm communities through LoRa communication is theoretically possible in many areas. Simulations using delay-tolerant network routing protocols confirm the feasibility of this approach under various scenarios. While the general feasability was first evaluated with data from Germany, we also conduct analyses for Uganda. A proof-of-concept implementation demonstrates that small messages can be transmitted successfully using real hardware, validating the concept of a decentralized communication infrastructure based on existing equipment. Additionally, we conducted experiments to measure energy consumption, bandwidth usage, and latency in actual hardware setups. This work contributes to various Sustainable Development Goals by supporting resilient communication infrastructure in underserved areas (SDG 9: Industry, Innovation and Infrastructure), strengthening rural communities that are often the last to recover after emergencies (SDG 10: Reduced Inequalities, SDG 11: Sustainable Cities and Communities), and ultimately helping safeguard food systems through improved agricultural coordination and communication (SDG 2: Zero Hunger).},
journal = {Information Technology for Development},
author = {Kuntke, Franz and Baumgärtner, Lars and Franken, Jonas and Reuter, Christian},
year = {2025},
keywords = {Projekt-emergenCITY, A-Paper, Security, UsableSec, Projekt-AgriRegio, emergenCITY\_INF, emergenCITY\_SG},
} Julius von Willich, Frank Nelles, Wen-Jie Tseng, Jan Gugenheimer, Sebastian Günther, Max Mühlhäuser (2025)Research in Augmented Reality (AR) and Virtual Reality (VR) has mostly viewed them in isolation. Yet, when used together in practical settings, AR and VR each offer unique strengths, necessitating multiple transitions to harness their advantages. This paper investigates potential challenges in Cross-Reality (CR) transitions to inform future application design. We implemented a CR system featuring a 3D modeling task that requires users to switch between PC, AR, and VR. Using a talk-aloud study (n=12) and thematic analysis, we revealed that frictions primarily arose when transitions conflicted with users’ Spatial Mental Model (SMM). Furthermore, we found five transition archetypes employed to enhance productivity once an SMM was established. Our findings uncover that transitions have to focus on establishing and upholding the SMM of users across realities, by communicating differences between them.
@inproceedings{10.1145/3706598.3713921,
address = {New York, NY, USA},
series = {Chi '25},
title = {A {Qualitative} {Investigation} of {User} {Transitions} and {Frictions} in {Cross}-{Reality} {Applications}},
isbn = {979-8-4007-1394-1},
url = {https://www.peasec.de/paper/2025/2025_VonWillichNellesTsengGugenheimerGüntherMühlhäuser_FrictionsCrossReality_CHI.pdf},
doi = {10.1145/3706598.3713921},
abstract = {Research in Augmented Reality (AR) and Virtual Reality (VR) has mostly viewed them in isolation. Yet, when used together in practical settings, AR and VR each offer unique strengths, necessitating multiple transitions to harness their advantages. This paper investigates potential challenges in Cross-Reality (CR) transitions to inform future application design. We implemented a CR system featuring a 3D modeling task that requires users to switch between PC, AR, and VR. Using a talk-aloud study (n=12) and thematic analysis, we revealed that frictions primarily arose when transitions conflicted with users’ Spatial Mental Model (SMM). Furthermore, we found five transition archetypes employed to enhance productivity once an SMM was established. Our findings uncover that transitions have to focus on establishing and upholding the SMM of users across realities, by communicating differences between them.},
booktitle = {Proceedings of the {Conference} on {Human} {Factors} in {Computing} {Systems} ({CHI})},
publisher = {Association for Computing Machinery},
author = {von Willich, Julius and Nelles, Frank and Tseng, Wen-Jie and Gugenheimer, Jan and Günther, Sebastian and Mühlhäuser, Max},
year = {2025},
note = {Number of pages: 18
tex.articleno: 808},
keywords = {HCI, Projekt-emergenCITY, A-Paper, Projekt-ATHENE, Ranking-CORE-A*, emergenCITY\_INF, emergenCITY\_SG},
} Laura Guntrum, Christian Reuter (2025)Activists’ use of ICTs in contexts affected by violence poses challenges like digital surveillance. Based on 92 interviews with activists from Bolivia, Cameroon, Costa Rica, Colombia, India, Myanmar, and Nicaragua, this study explores their protection and coping strategies against technology-facilitated violence. Findings show limited emphasis on digital security and privacy-enhancing technologies, primarily due to the usability and familiarity with popular applications, coupled with relative unfamiliarity with other features. Generally, some precautions, like avoiding real-time location sharing, are common. While many protection strategies are similar, some are shaped by local factors like internet shutdowns and different adversaries’ capabilities. The findings demonstrate that some tools and features, such as VPN, may offer protection but also pose risks, e.g., in the case of criminalization, highlighting the crucial role of local context. Designing secure and usable features that account for the varying levels of limitations, such as poor connectivity and risks activists face, is essential.
@article{Guntrum2025,
title = {Activists' strategies for coping with technology-facilitated violence in the global south},
volume = {32},
issn = {1073-0516},
url = {https://doi.org/10.1145/3762811},
doi = {10.1145/3762811},
abstract = {Activists' use of ICTs in contexts affected by violence poses challenges like digital surveillance. Based on 92 interviews with activists from Bolivia, Cameroon, Costa Rica, Colombia, India, Myanmar, and Nicaragua, this study explores their protection and coping strategies against technology-facilitated violence. Findings show limited emphasis on digital security and privacy-enhancing technologies, primarily due to the usability and familiarity with popular applications, coupled with relative unfamiliarity with other features. Generally, some precautions, like avoiding real-time location sharing, are common. While many protection strategies are similar, some are shaped by local factors like internet shutdowns and different adversaries' capabilities. The findings demonstrate that some tools and features, such as VPN, may offer protection but also pose risks, e.g., in the case of criminalization, highlighting the crucial role of local context. Designing secure and usable features that account for the varying levels of limitations, such as poor connectivity and risks activists face, is essential.},
number = {6},
journal = {ACM Transactions on Computer-Human Interaction (TOCHI)},
author = {Guntrum, Laura and Reuter, Christian},
year = {2025},
keywords = {A-Paper, AuswahlPeace, Peace, Projekt-ATHENE-PriVis, Projekt-TraCe, Ranking-CORE-A*},
pages = {1--38},
} Alle Paper 2025
Begutachtete Zeitschriften / Peer-reviewed Journals
Thea Riebe, Laura Guntrum, Lilian Reichert, Christian Reuter (2025)Social media plays a crucial role in United Nations (UN) peace operations, which are typically deployed in regions affected by conflict to promote peace, facilitate political dialogue, and support post-conflict reconstruction efforts. The UN has introduced the concept of the digital peacekeeper, whose role is to collect and analyse public data, with a particular focus on social media. This article explores the role of official social media use by African peace operations (POs) between 2003 and 2024 through a qualitative analysis of 126 UN documents. The findings reveal that African POs employ a diverse communication strategy, primarily centred on disseminating information, education, and access to reliable information in disrupted contexts. However, the full potential of social media is not realised, resulting in a predominantly one-way communication model. Using affordance theory for social media, the paper demonstrates how bidirectional interactions could support sustainable peace efforts.
@article{riebe_social_2025,
title = {Social media in crisis communication: insights from peace operations on the {African} continent},
volume = {24},
copyright = {De Gruyter expressly reserves the right to use all content for commercial text and data mining within the meaning of Section 44b of the German Copyright Act.},
issn = {2196-6826},
shorttitle = {Social media in crisis communication},
url = {https://www.degruyterbrill.com/document/doi/10.1515/icom-2025-0006/html},
doi = {10.1515/icom-2025-0006},
abstract = {Social media plays a crucial role in United Nations (UN) peace operations, which are typically deployed in regions affected by conflict to promote peace, facilitate political dialogue, and support post-conflict reconstruction efforts. The UN has introduced the concept of the digital peacekeeper, whose role is to collect and analyse public data, with a particular focus on social media. This article explores the role of official social media use by African peace operations (POs) between 2003 and 2024 through a qualitative analysis of 126 UN documents. The findings reveal that African POs employ a diverse communication strategy, primarily centred on disseminating information, education, and access to reliable information in disrupted contexts. However, the full potential of social media is not realised, resulting in a predominantly one-way communication model. Using affordance theory for social media, the paper demonstrates how bidirectional interactions could support sustainable peace efforts.},
language = {en},
number = {2},
urldate = {2025-10-07},
journal = {i-com},
author = {Riebe, Thea and Guntrum, Laura and Reichert, Lilian and Reuter, Christian},
month = aug,
year = {2025},
note = {Publisher: Oldenbourg Wissenschaftsverlag},
keywords = {Peace, Student, Projekt-ATHENE},
pages = {363--384},
} Laura Guntrum, Daniela Forero Nuñez, Christian Reuter (2025)The shrinking of secure online spaces and incidents of technology-facilitated (gender-based) violence (TF(GB)V) against female feminists have partially led to self-censorship, thereby constricting public discourse. To unravel the impact of increasing TF(GB)V on feminist mobilization, 22 interviews with Costa Rican and Colombian, female feminists advocating for feminist issues, such as reproductive rights, were conducted. All interviewees, advocating for often perceived controversial topics within patriarchal societies, have experienced forms of TF(GB)V, including misogynistic hate speech. In reaction to this violence, interviewees respond in varying ways – some reduce their social media activity, while others develop personal coping strategies. In fact, most interviewees engage in both chilling and resistance mechanisms concurrently. Increased awareness of potential consequences and coping mechanisms of female feminists when experiencing TF(GB)V helps to develop gender-sensitive mechanisms to protect (female) activists and foster a safer online environment. While measures such as IT security training for activists, enhanced content moderation on platforms, and gender-sensitive design approaches are crucial, addressing the underlying issue – the targeting of feminists with violence – is imperative. Without such efforts, there is a risk that affected individuals withdraw from digital spaces, thereby limiting the diversity of narratives that shape public discourse online.
@article{guntrum_chilling_2025,
title = {Chilling or resisting? {Exploring} the influence of technology-facilitated (gender-based) violence on female feminists in {Colombia} and {Costa} {Rica}},
volume = {24},
issn = {2196-6826},
shorttitle = {Chilling or resisting?},
url = {https://www.degruyterbrill.com/document/doi/10.1515/icom-2025-0004/html},
doi = {10.1515/icom-2025-0004},
abstract = {The shrinking of secure online spaces and incidents of technology-facilitated (gender-based) violence (TF(GB)V) against female feminists have partially led to self-censorship, thereby constricting public discourse. To unravel the impact of increasing TF(GB)V on feminist mobilization, 22 interviews with Costa Rican and Colombian, female feminists advocating for feminist issues, such as reproductive rights, were conducted. All interviewees, advocating for often perceived controversial topics within patriarchal societies, have experienced forms of TF(GB)V, including misogynistic hate speech. In reaction to this violence, interviewees respond in varying ways – some reduce their social media activity, while others develop personal coping strategies. In fact, most interviewees engage in both chilling and resistance mechanisms concurrently. Increased awareness of potential consequences and coping mechanisms of female feminists when experiencing TF(GB)V helps to develop gender-sensitive mechanisms to protect (female) activists and foster a safer online environment. While measures such as IT security training for activists, enhanced content moderation on platforms, and gender-sensitive design approaches are crucial, addressing the underlying issue – the targeting of feminists with violence – is imperative. Without such efforts, there is a risk that affected individuals withdraw from digital spaces, thereby limiting the diversity of narratives that shape public discourse online.},
language = {en},
number = {2},
journal = {i-com – Journal of Interactive Media},
author = {Guntrum, Laura and Nuñez, Daniela Forero and Reuter, Christian},
month = jul,
year = {2025},
note = {Publisher: Oldenbourg Wissenschaftsverlag},
keywords = {HCI, Peace, Projekt-TraCe, Projekt-ATHENE},
pages = {433--455},
} Christian Reuter, Amanda Lee Hughes, Cody Buntain (2025)The rise of fake news and misinformation in the digital age poses serious risks for individuals and society, particularly during crises like the Israel-Hamas war, the Russian-Ukraine war, or the COVID-19 pandemic. Misinformation serves as a tool to manipulate public opinion and create discord. Vulnerability to manipulation increases in online spaces during crises, where authoritative information is scarce. Emergency management, public health, political and public administration, as well as media professionals and citizens express concern and seek solutions to enhance information quality during such critical times. This article highlights user-centred approaches to countering fake news and misinformation, tracing their historical evolution from ancient Greece to the present, focussing on their relevance during the COVID-19 crisis and in contemporary information warfare. It describes the vulnerability of audiences to misinformation and outlines prevailing trends in user-centred countermeasures. This article also introduces recent research on the effectiveness of media literacy interventions on truth discernment, a cross-cultural comparison of the perception of negative consequences and the injunctive norm, a comparison of video and text to promote lateral reading in adolescents, content-specific indicators on Twitter from a user perspective, a learning system for detecting misinformation as well as ethical and security considerations in automated detection.
@article{reuter_combating_2025,
title = {Combating {Information} {Warfare}: {State} and {Trends} in {User}-{Centered} {Countermeasures} against {Fake} {News} and {Misinformation}},
volume = {44},
issn = {0144-929X},
url = {https://doi.org/10.1080/0144929X.2024.2442486},
doi = {10.1080/0144929X.2024.2442486},
abstract = {The rise of fake news and misinformation in the digital age poses serious risks for individuals and society, particularly during crises like the Israel-Hamas war, the Russian-Ukraine war, or the COVID-19 pandemic. Misinformation serves as a tool to manipulate public opinion and create discord. Vulnerability to manipulation increases in online spaces during crises, where authoritative information is scarce. Emergency management, public health, political and public administration, as well as media professionals and citizens express concern and seek solutions to enhance information quality during such critical times. This article highlights user-centred approaches to countering fake news and misinformation, tracing their historical evolution from ancient Greece to the present, focussing on their relevance during the COVID-19 crisis and in contemporary information warfare. It describes the vulnerability of audiences to misinformation and outlines prevailing trends in user-centred countermeasures. This article also introduces recent research on the effectiveness of media literacy interventions on truth discernment, a cross-cultural comparison of the perception of negative consequences and the injunctive norm, a comparison of video and text to promote lateral reading in adolescents, content-specific indicators on Twitter from a user perspective, a learning system for detecting misinformation as well as ethical and security considerations in automated detection.},
number = {13},
journal = {Behaviour \& Information Technology (BIT)},
author = {Reuter, Christian and Hughes, Amanda Lee and Buntain, Cody},
year = {2025},
keywords = {Crisis, HCI, Peace, Projekt-NEBULA, A-Paper, Ranking-CORE-A, Ranking-ImpactFactor, SocialMedia},
pages = {3348--3361},
} Thea Riebe, Anja-Liisa Gonsior, Lilian Reichert, Christian Reuter (2025)The development of artificial intelligence and autonomous functions in the military domain has an immense impact on technologies being developed by the private defence industry. Defence firms contribute to the narratives and visions on autonomous weapon systems and the future of warfare, e.g. in the form of strategic marketing of their products. However, their role has so far been understudied, especially regarding autonomous weapon systems. As the normative debate revolves around aspects of human control, this work examines the narratives of (meaningful) human control in the marketing of autonomous military systems by defence manufacturers. Based on a comprehensive content analysis of twenty defence firms, we identified three main narratives, which envision autonomy as a military advantage, the role of the human in the future of warfare, and human-machine teaming. Based on the results, we argue that defence companies reproduce and adapt narratives which shape expectations and visions of human control of autonomous weapon systems in anticipation of emerging norms for (meaningful) human control. However, without specifications and verification mechanisms, there is no indication that human control will be meaningful.
@article{riebe_envisioning_2025,
title = {Envisioning {Human}-{Machine} {Interaction} in {Future} {Warfare}: {Defence} {Industry} {Narratives} on {Human} {Control} of {Autonomous} {Weapon} {Systems}},
volume = {39},
issn = {1360-0826},
url = {https://doi.org/10.1080/13600826.2024.2436966},
doi = {10.1080/13600826.2024.2436966},
abstract = {The development of artificial intelligence and autonomous functions in the military domain has an immense impact on technologies being developed by the private defence industry. Defence firms contribute to the narratives and visions on autonomous weapon systems and the future of warfare, e.g. in the form of strategic marketing of their products. However, their role has so far been understudied, especially regarding autonomous weapon systems. As the normative debate revolves around aspects of human control, this work examines the narratives of (meaningful) human control in the marketing of autonomous military systems by defence manufacturers. Based on a comprehensive content analysis of twenty defence firms, we identified three main narratives, which envision autonomy as a military advantage, the role of the human in the future of warfare, and human-machine teaming. Based on the results, we argue that defence companies reproduce and adapt narratives which shape expectations and visions of human control of autonomous weapon systems in anticipation of emerging norms for (meaningful) human control. However, without specifications and verification mechanisms, there is no indication that human control will be meaningful.},
number = {4},
journal = {Global Society},
author = {Riebe, Thea and Gonsior, Anja-Liisa and Reichert, Lilian and Reuter, Christian},
year = {2025},
keywords = {HCI, Peace, Projekt-TraCe, A-Paper, Ranking-ImpactFactor, AuswahlPeace, Projekt-ATHENE-CyAware, Student},
pages = {421--445},
} Enno Steinbrink, Laura Guntrum, Christian Reuter (2025)In conflict-ridden environments, timely and accurate information is critical for those dealing with the dynamic of events. When individuals have to flee, it becomes evident that refugees frequently rely on information and communication technologies (ICT) for information acquisition, travel coordination, and maintaining connections with related parties. Based on 17 interviews, this research explores how Ukrainian refugees, who sought protection in Germany due to the 2022 Russian full-scale invasion, use ICT before, during, and after their flight. By providing empirical findings, the results show in depth how contextual factors, such as infrastructural instability, privacy concerns and an advanced digitalization, interrelate with user behaviors. Analyzing the multifaceted civilian ICT use in the context of war and flight, this exploratory research contributes to the existing research on HCI in migration contexts and connects to several topics of CSCW. By contrasting case specifics, this work highlights what makes Ukraine a special case in this research area. Furthermore, this paper examines both existing and emerging affordances of ICT in the context of flight, and identifies the crucial role of messenger groups for information gathering in all phases of the flight. Lastly, collaborative dimensions of the identified affordances are discussed.
@article{steinbrink_smartphone_2025,
title = {Smartphone and {ICT} {Use} {Among} {Ukrainian} {Refugees}: {Technology} {Support} during {War}, {Flight}, and {Adaptation} in {Germany}},
url = {https://www.peasec.de/paper/2025/2025_SteinbrinkGuntrumReuter_Ukraine_CSCW.pdf},
doi = {10.1145/3711067},
abstract = {In conflict-ridden environments, timely and accurate information is critical for those dealing with the dynamic of events. When individuals have to flee, it becomes evident that refugees frequently rely on information and communication technologies (ICT) for information acquisition, travel coordination, and maintaining connections with related parties. Based on 17 interviews, this research explores how Ukrainian refugees, who sought protection in Germany due to the 2022 Russian full-scale invasion, use ICT before, during, and after their flight. By providing empirical findings, the results show in depth how contextual factors, such as infrastructural instability, privacy concerns and an advanced digitalization, interrelate with user behaviors. Analyzing the multifaceted civilian ICT use in the context of war and flight, this exploratory research contributes to the existing research on HCI in migration contexts and connects to several topics of CSCW. By contrasting case specifics, this work highlights what makes Ukraine a special case in this research area. Furthermore, this paper examines both existing and emerging affordances of ICT in the context of flight, and identifies the crucial role of messenger groups for information gathering in all phases of the flight. Lastly, collaborative dimensions of the identified affordances are discussed.},
number = {CSCW},
journal = {Proceedings of the ACM: Human Computer Interaction (PACM): Computer-Supported Cooperative Work and Social Computing},
author = {Steinbrink, Enno and Guntrum, Laura and Reuter, Christian},
year = {2025},
note = {Place: New York, NY, USA
Publisher: Association for Computing Machinery},
keywords = {Crisis, HCI, Projekt-TraCe, A-Paper, Ranking-CORE-A, UsableSec, Projekt-ATHENE, Projekt-GRKPrivacy},
} Markus Bayer, Justin Lutz, Christian Reuter (2025)Active learning is designed to minimize annotation efforts by prioritizing instances that most enhance learning. However, many active learning strategies struggle with a ‘coldstart’ problem, needing substantial initial data to be effective. This limitation reduces their utility in the increasingly relevant fewshot scenarios, where the instance selection has a substantial impact. To address this, we introduce ActiveLLM, a novel active learning approach that leverages Large Language Models such as GPT-4, o1, Llama 3, or Mistral Large for selecting instances. We demonstrate that ActiveLLM significantly enhances the classification performance of BERT classifiers in few-shot scenarios, outperforming traditional active learning methods as well as improving the few-shot learning methods ADAPET, PERFECT, and Set- Fit. Additionally, ActiveLLM can be extended to non-few-shot scenarios, allowing for iterative selections. In this way, ActiveLLM can even help other active learning strategies to overcome their cold-start problem. Our results suggest that ActiveLLM offers a promising solution for improving model performance across various learning setups.
@article{bayer_activellm_2025,
title = {{ActiveLLM}: {Large} {Language} {Model}-based {Active} {Learning} for {Textual} {Few}-{Shot} {Scenarios}},
url = {https://arxiv.org/pdf/2405.10808},
doi = {10.48550/arXiv.2405.10808},
abstract = {Active learning is designed to minimize annotation
efforts by prioritizing instances that
most enhance learning. However, many active
learning strategies struggle with a ‘coldstart’
problem, needing substantial initial
data to be effective. This limitation reduces
their utility in the increasingly relevant fewshot
scenarios, where the instance selection
has a substantial impact. To address this, we
introduce ActiveLLM, a novel active learning
approach that leverages Large Language
Models such as GPT-4, o1, Llama 3, or
Mistral Large for selecting instances. We
demonstrate that ActiveLLM significantly
enhances the classification performance of
BERT classifiers in few-shot scenarios, outperforming
traditional active learning methods
as well as improving the few-shot learning
methods ADAPET, PERFECT, and Set-
Fit. Additionally, ActiveLLM can be extended
to non-few-shot scenarios, allowing
for iterative selections. In this way, ActiveLLM
can even help other active learning
strategies to overcome their cold-start problem.
Our results suggest that ActiveLLM
offers a promising solution for improving
model performance across various learning
setups.},
journal = {Transactions of the Association for Computational Linguistics (TACL)},
author = {Bayer, Markus and Lutz, Justin and Reuter, Christian},
year = {2025},
keywords = {A-Paper, Projekt-ATHENE-CyAware, Student, Security, UsableSec, Projekt-CYLENCE, CORE-A*},
} Julian Bäumler, Thea Riebe, Marc-André Kaufhold, Christian Reuter (2025)In Germany and other countries, specialized non-profit reporting centers combat online hate speech by submitting criminal content to law enforcement agencies, forwarding deletion requests to social media platforms, and providing counseling to victims, thus contributing to the governance mechanism of content moderation as intermediaries between victims and various organizations. Whereas research in computer-supported cooperative work has extensively explored collaboration of and automation for content moderators, there are no works that focus on reporting centers. Based on expert interviews with their staff (N=15), this study finds that most German centers share a collaborative workflow, of which multiple tasks are heavily dependent on inter-organizational exchange. However, there are differences in their implementation of monitoring, content assessment, automation technology adoption, and external collaborators. As the centers are faced with diverse challenges, such as borderline case assessment, psychological burdens, limited visibility, conflicting goals with other actors, and manual repetitive work, our study contributes with nine implications for designing and researching supportive technologies. They provide suggestions for improving hate speech gathering and reporting, researching hate speech prioritization and assessment algorithms, and designing case processing systems. Beyond that, we outline directions for research on inter-organizational collaboration.
@article{baumler_harnessing_2025,
title = {Harnessing {Inter}-{Organizational} {Collaboration} and {Automation} to {Combat} {Online} {Hate} {Speech}: {A} {Qualitative} {Study} with {German} {Reporting} {Centers}},
url = {https://dl.acm.org/doi/10.1145/3710991},
doi = {10.1145/3710991},
abstract = {In Germany and other countries, specialized non-profit reporting centers combat online hate speech by submitting criminal content to law enforcement agencies, forwarding deletion requests to social media platforms, and providing counseling to victims, thus contributing to the governance mechanism of content moderation as intermediaries between victims and various organizations. Whereas research in computer-supported cooperative work has extensively explored collaboration of and automation for content moderators, there are no works that focus on reporting centers. Based on expert interviews with their staff (N=15), this study finds that most German centers share a collaborative workflow, of which multiple tasks are heavily dependent on inter-organizational exchange. However, there are differences in their implementation of monitoring, content assessment, automation technology adoption, and external collaborators. As the centers are faced with diverse challenges, such as borderline case assessment, psychological burdens, limited visibility, conflicting goals with other actors, and manual repetitive work, our study contributes with nine implications for designing and researching supportive technologies. They provide suggestions for improving hate speech gathering and reporting, researching hate speech prioritization and assessment algorithms, and designing case processing systems. Beyond that, we outline directions for research on inter-organizational collaboration.},
journal = {Proceedings of the ACM: Human Computer Interaction (PACM): Computer-Supported Cooperative Work and Social Computing},
author = {Bäumler, Julian and Riebe, Thea and Kaufhold, Marc-André and Reuter, Christian},
year = {2025},
keywords = {Crisis, HCI, A-Paper, Ranking-CORE-A, Projekt-CYLENCE, Projekt-CYWARN, AuswahlCrisis},
} Tom Biselli, Katrin Hartwig, Christian Reuter (2025)The ongoing challenge of misinformation on social media motivates ongoing efforts to find effective countermeasures. In this study, we evaluated the potential of personalised nudging to reduce the sharing of misinformation on social media, as personalised support has been successfully applied in other areas of critical information handling. In an online experiment (N = 396) exposing users to social media posts, we assessed the degree of misinformation sharing between groups receiving (1) no nudges, (2) non-personalised nudges, and (3) personalised nudges. Personalisation was based on three psychometric dimensions – general decision-making style, consideration of future consequences, need for cognition – to assign the most appropriate nudge from a pool of five nudges. The results showed significant differences (p {\textless} .05) between all three groups, with the personalised nudge group sharing the least misinformation. Detailed analyses at the nudge level revealed that one nudge was universally effective and two nudges were effective only in their personalised form. The results generally confirm the potential of personalisation, although the effect is limited in scope. These findings shed light on the nuanced results of nudging studies, highlight the benefits of personalisation, and raise ethical considerations regarding the privacy implications of personalisation and those inherent in nudges.
@article{biselli_mitigating_2025,
title = {Mitigating {Misinformation} {Sharing} on {Social} {Media} through {Personalised} {Nudging}},
volume = {9},
url = {https://www.peasec.de/paper/2025/2025_BiselliHartwigReuter_PersonalisedNudges_CSCW.pdf},
doi = {https://doi.org/10.1145/3711034},
abstract = {The ongoing challenge of misinformation on social media motivates ongoing efforts to find effective countermeasures.
In this study, we evaluated the potential of personalised nudging to reduce the sharing of misinformation on social media, as personalised support has been successfully applied in other areas of critical information handling.
In an online experiment (N = 396) exposing users to social media posts, we assessed the degree of misinformation sharing between groups receiving (1) no nudges, (2) non-personalised nudges, and (3) personalised nudges. Personalisation was based on three psychometric dimensions - general decision-making style, consideration of future consequences, need for cognition - to assign the most appropriate nudge from a pool of five nudges.
The results showed significant differences (p {\textless} .05) between all three groups, with the personalised nudge group sharing the least misinformation. Detailed analyses at the nudge level revealed that one nudge was universally effective and two nudges were effective only in their personalised form.
The results generally confirm the potential of personalisation, although the effect is limited in scope.
These findings shed light on the nuanced results of nudging studies, highlight the benefits of personalisation, and raise ethical considerations regarding the privacy implications of personalisation and those inherent in nudges.},
number = {2},
journal = {Proceedings of the ACM: Human Computer Interaction (PACM): Computer-Supported Cooperative Work and Social Computing},
author = {Biselli, Tom and Hartwig, Katrin and Reuter, Christian},
year = {2025},
keywords = {Crisis, HCI, Projekt-NEBULA, A-Paper, Ranking-CORE-A, Projekt-ATHENE-PriVis},
} Stefka Schmid, Daniel Lambach, Carlo Diehl, Christian Reuter (2025)China, the United States, and the European Union have spoken of a global competition surrounding Artificial Intelligence (AI). There is widespread talk of an ‘AI Arms Race’. But what is the nature of this race? We argue that the arms race metaphor does not capture the dynamics of global competition in the AI sector. Instead, we propose the notion of a ‘geopolitical innovation race’ for technological leadership in a networked global economy. Based on an analysis of government documents, we find that actors (1) are open to both zero-sum or positive-sum approaches in AI development, (2) organise actor networks differently based on national innovation cultures, (3) prioritise economics and status next to security concerns, and (4) are open to how AI should be interpreted. Referring to the competitive race of AI research and development, the three technopoles perpetuate the geopoliticisation of innovation and intertwine security and economic interests.
@article{schmid_arms_2025,
title = {Arms {Race} or {Innovation} {Race}? {Geopolitical} {AI} {Development}},
volume = {30},
issn = {1465-0045},
url = {https://doi.org/10.1080/14650045.2025.2456019},
doi = {10.1080/14650045.2025.2456019},
abstract = {China, the United States, and the European Union have spoken of a global competition surrounding Artificial Intelligence (AI). There is widespread talk of an ‘AI Arms Race’. But what is the nature of this race? We argue that the arms race metaphor does not capture the dynamics of global competition in the AI sector. Instead, we propose the notion of a ‘geopolitical innovation race’ for technological leadership in a networked global economy. Based on an analysis of government documents, we find that actors (1) are open to both zero-sum or positive-sum approaches in AI development, (2) organise actor networks differently based on national innovation cultures, (3) prioritise economics and status next to security concerns, and (4) are open to how AI should be interpreted. Referring to the competitive race of AI research and development, the three technopoles perpetuate the geopoliticisation of innovation and intertwine security and economic interests.},
number = {4},
journal = {Geopolitics},
author = {Schmid, Stefka and Lambach, Daniel and Diehl, Carlo and Reuter, Christian},
year = {2025},
note = {Publisher: Routledge},
keywords = {Peace, Projekt-TraCe, A-Paper, Ranking-ImpactFactor, AuswahlPeace, Projekt-ATHENE, Selected},
pages = {1907--1936},
} Thea Riebe, Christian Reuter (2025)The global efforts to reduce armament after the end of the Cold War have been stalled due to rising nationalist ambitions. Within this dynamic, military technologies are evolving and contributing to the changing dynamics of arms races. These challenges posed by new and established arms technologies were discussed in the interdisciplinary conference “Science – Peace – Security ’23” (SPS’23) held from September 20 to Friday, September 22, 2023, at the Technical University of Darmstadt. The conference brought together interdisciplinary scholars to discuss the role of these technologies in wars and conflicts, as well as approaches toward arms control and non-proliferation. Three of the contributions are part of this special section. Almuntaser Albalawi and Kristoffer provide an in-depth analysis of the four primary mechanisms investigating alleged chemical weapons use in Syria. Zenobia S. Homan and Saman Omar explore the influence of media coverage on chemical weapon attacks in the Kurdistan Region of Iraq. Bandarra et al. examine the critical role of International Atomic Energy Agency (IAEA) safeguards in preventing nuclear weapons proliferation. All these contributions highlight the need to critically assess and update arms control regimes, mechanisms, and instruments to adapt to the transformation of political violence, e.g., providing access to information and improving trust in institutions and international cooperation.
@article{riebe_technology_2025,
title = {Technology and the {Transformation} of {Political} {Violence} - {Editorial} of the {ZeFKo} {Special} {Section}},
volume = {15},
url = {https://link.springer.com/article/10.1007/s42597-025-00142-9},
doi = {10.1007/s42597-025-00142-9},
abstract = {The global efforts to reduce armament after the end of the Cold War have been stalled due to rising nationalist ambitions. Within this dynamic, military technologies are evolving and contributing to the changing dynamics of arms races. These challenges posed by new and established arms technologies were discussed in the interdisciplinary conference "Science - Peace - Security '23" (SPS'23) held from September 20 to Friday, September 22, 2023, at the Technical University of Darmstadt. The conference brought together interdisciplinary scholars to discuss the role of these technologies in wars and conflicts, as well as approaches toward arms control and non-proliferation. Three of the contributions are part of this special section. Almuntaser Albalawi and Kristoffer provide an in-depth analysis of the four primary mechanisms investigating alleged chemical weapons use in Syria. Zenobia S. Homan and Saman Omar explore the influence of media coverage on chemical weapon attacks in the Kurdistan Region of Iraq. Bandarra et al. examine the critical role of International Atomic Energy Agency (IAEA) safeguards in preventing nuclear weapons proliferation. All these contributions highlight the need to critically assess and update arms control regimes, mechanisms, and instruments to adapt to the transformation of political violence, e.g., providing access to information and improving trust in institutions and international cooperation.},
number = {1},
journal = {Zeitschrift für Friedens- und Konfliktforschung (ZeFKo)},
author = {Riebe, Thea and Reuter, Christian},
year = {2025},
keywords = {Peace, Projekt-TraCe, Security, Projekt-CROSSING},
} Markus Henkel, Steffen Haesler, Hiba Al-Najmi, Frank Hessel, Christian Reuter (2025)As smart home technology becomes integral to modern living, researchers must consider safety aspects. While single-purpose devices alert users to specific dangers, integrating them within comprehensive smart home warning systems (SHWSs) offers new safety potentials by allowing actuators to respond to threats based on predefined protocols. Key questions include whether user preferences for automation levels in smart homes are affected by different warning scenarios, and how unwanted automation or false positives influence acceptance. To explore this, we conduct two studies: (1) A lab study in a smart home with various actuators, where participants (N = 48) encounter warnings across three automation levels. (2) A follow-up interview study (N = 16) further evaluating our prototype and unwanted automation situations. Results show that participants preferred higher automation during warnings and were more receptive to smart technology in dangerous situations, though customization remains essential to ensure acceptance. While higher automation levels reduced perceived interruption, some still preferred less intense warnings. Others preferred not receiving warnings of mild dangers, fully relying on automation. Finally, we find that specific safety protocols and handling of false positive alarms must be chosen carefully to avoid mistrust, users feeling a loss of control, and damage through unwanted executions.
@article{henkel_house_2025,
title = {The {House} {That} {Saves} {Me}? {Assessing} the {Role} of {Smart} {Home} {Automation} in {Warning} {Scenarios}},
volume = {9},
shorttitle = {The {House} {That} {Saves} {Me}?},
url = {https://www.peasec.de/paper/2025/2025_HenkelHaeslerAlNajmiHesselReuter_HouseThatSavesMe_IMWUT.pdf},
doi = {10.1145/3712269},
abstract = {As smart home technology becomes integral to modern living, researchers must consider safety aspects. While single-purpose devices alert users to specific dangers, integrating them within comprehensive smart home warning systems (SHWSs) offers new safety potentials by allowing actuators to respond to threats based on predefined protocols. Key questions include whether user preferences for automation levels in smart homes are affected by different warning scenarios, and how unwanted automation or false positives influence acceptance. To explore this, we conduct two studies: (1) A lab study in a smart home with various actuators, where participants (N = 48) encounter warnings across three automation levels. (2) A follow-up interview study (N = 16) further evaluating our prototype and unwanted automation situations. Results show that participants preferred higher automation during warnings and were more receptive to smart technology in dangerous situations, though customization remains essential to ensure acceptance. While higher automation levels reduced perceived interruption, some still preferred less intense warnings. Others preferred not receiving warnings of mild dangers, fully relying on automation. Finally, we find that specific safety protocols and handling of false positive alarms must be chosen carefully to avoid mistrust, users feeling a loss of control, and damage through unwanted executions.},
number = {1},
journal = {Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies (IMWUT)},
author = {Henkel, Markus and Haesler, Steffen and Al-Najmi, Hiba and Hessel, Frank and Reuter, Christian},
year = {2025},
keywords = {Crisis, HCI, Projekt-emergenCITY, A-Paper, Student, Projekt-ATHENE-SecUrban, AuswahlCrisis, Ranking-CORE-A*, emergenCITY\_INF, emergenCITY\_SG},
pages = {5:1--5:32},
} Julian Bäumler, Georg Voronin, Marc-André Kaufhold (2025)In Germany, both law enforcement agencies (LEAs) and dedicated reporting centers (RCs) engage in various activities to counter illegal online hate speech (HS). Due to the high volume of such content and against the background of limited resources, their personnel can be confronted with the issue of information overload. To mitigate this issue, information filtering, classification, prioritization, and visualization technologies offer great potential. However, a nuanced understanding of situational awareness is required to inform the domain-sensitive implementation of supportive technology and adequate decision-making. Although previous research has explored the concept of situational awareness in policing, it has not been studied in relation to online HS. Based on a qualitative research design employing a thematic analysis of qualitative expert interviews with practitioners from German LEAs and RCs (N=29), we will contribute to the state of research in human-computer interaction with a systematization of 23 information types of relevance for situational awareness of online HS in the law enforcement and RC domain. On that basis, we identify victim, perpetrator, context, evidence, legal, and threat awareness as domain-specific situational awareness sub-types and formulate ten implications for designing reporting, open-source intelligence, classification, and visual analytics tools.
@article{baumler_cyber_2025,
title = {Cyber {Hate} {Awareness}: {Information} {Types} and {Technologies} {Relevant} to the {Law} {Enforcement} and {Reporting} {Center} {Domain}},
volume = {24},
issn = {2196-6826},
shorttitle = {Cyber hate awareness},
url = {https://www.degruyter.com/document/doi/10.1515/icom-2024-0062/html},
doi = {10.1515/icom-2024-0062},
abstract = {In Germany, both law enforcement agencies (LEAs) and dedicated reporting centers (RCs) engage in various activities to counter illegal online hate speech (HS). Due to the high volume of such content and against the background of limited resources, their personnel can be confronted with the issue of information overload. To mitigate this issue, information filtering, classification, prioritization, and visualization technologies offer great potential. However, a nuanced understanding of situational awareness is required to inform the domain-sensitive implementation of supportive technology and adequate decision-making. Although previous research has explored the concept of situational awareness in policing, it has not been studied in relation to online HS. Based on a qualitative research design employing a thematic analysis of qualitative expert interviews with practitioners from German LEAs and RCs (N=29), we will contribute to the state of research in human-computer interaction with a systematization of 23 information types of relevance for situational awareness of online HS in the law enforcement and RC domain. On that basis, we identify victim, perpetrator, context, evidence, legal, and threat awareness as domain-specific situational awareness sub-types and formulate ten implications for designing reporting, open-source intelligence, classification, and visual analytics tools.},
number = {1},
journal = {i-com - Journal of Interactive Media},
author = {Bäumler, Julian and Voronin, Georg and Kaufhold, Marc-André},
year = {2025},
keywords = {Crisis, HCI, Projekt-ATHENE-CyAware, Projekt-CYLENCE},
} Jasmin Haunschild, Markus Henkel, Christian Reuter (2025)In crisis situations, citizens’ situational awareness is paramount for an effective response. While warning apps offer location-based alerts, their usage is relatively low. We propose a personalised messaging app channel as an alternative, presenting a warning bot that may lower adoption barriers. We employ the design science research process to define user requirements and iteratively evaluate and improve the bot’s usability and usefulness. The results showcase high usability, with over 40\% expressing an interest in utilising such a warning channel, stressing as reasons the added value of proactive warnings for personalised locations while not requiring a separate app. The derived requirements and design solutions, such as graphically enhanced user interface elements as guardrails for effective and error-free communication, demonstrate that a suitable warning chatbot does not necessarily require complex language processing capabilities. Additionally, our findings facilitate further research on accessibility via conversational design in the realm of crisis warnings.
@article{haunschild_breaking_2025,
title = {Breaking {Down} {Barriers} to {Warning} {Technology} {Adoption}: {Usability} and {Usefulness} of a {Messenger} {App} {Warning} {Bot}},
volume = {24},
copyright = {De Gruyter expressly reserves the right to use all content for commercial text and data mining within the meaning of Section 44b of the German Copyright Act.},
issn = {2196-6826},
shorttitle = {Breaking down barriers to warning technology adoption},
url = {https://www.degruyter.com/document/doi/10.1515/icom-2024-0067/html},
doi = {10.1515/icom-2024-0067},
abstract = {In crisis situations, citizens' situational awareness is paramount for an effective response. While warning apps offer location-based alerts, their usage is relatively low. We propose a personalised messaging app channel as an alternative, presenting a warning bot that may lower adoption barriers. We employ the design science research process to define user requirements and iteratively evaluate and improve the bot's usability and usefulness. The results showcase high usability, with over 40\% expressing an interest in utilising such a warning channel, stressing as reasons the added value of proactive warnings for personalised locations while not requiring a separate app. The derived requirements and design solutions, such as graphically enhanced user interface elements as guardrails for effective and error-free communication, demonstrate that a suitable warning chatbot does not necessarily require complex language processing capabilities. Additionally, our findings facilitate further research on accessibility via conversational design in the realm of crisis warnings.},
language = {en},
number = {1},
journal = {i-com - Journal of Interactive Media},
author = {Haunschild, Jasmin and Henkel, Markus and Reuter, Christian},
month = feb,
year = {2025},
note = {Publisher: Oldenbourg Wissenschaftsverlag},
keywords = {Crisis, HCI, Projekt-emergenCITY, Projekt-ATHENE-SecUrban, emergenCITY\_INF, emergenCITY\_SG},
} Jonas Franken, Thomas Reinhold, Timon Dörnfeld, Christian Reuter (2025)The network of subsea data cables (SDC) transmits the majority of international and intercontinental data exchanges. After thirty years of fiber-optic SDC installation across the oceans, almost all coastal and island countries gained access to the only global fixed infrastructure network. Still, there is considerable inequality in the number of available SDC accesses, creating deficits in redundancy for less connected states. Previous research hypothesized multiple factors that influenced the build-up of internet infrastructures but failed to verify these assumptions through inferential statistics. This work highlights the national-level factors that made backbone access provision more – or less – attractive to SDC project decision-makers. Our regression analysis of global country-year data (n = 4916) found that socio-economic (population, GDP), political (state fragility, conflict), and geographic factors (seismic hazard, neighboring territories) significantly influenced the number of active and planned accesses. This work can serve as a foundation for further research leveraging quantitative statistics to unveil hidden structures in the construction of material internet infrastructures and support sustainability in the future allocation of international infrastructure development resources in general.
@article{franken_hidden_2025,
title = {Hidden structures of a global infrastructure: {Expansion} factors of the subsea data cable network},
volume = {215},
issn = {0040-1625},
shorttitle = {Hidden structures of a global infrastructure},
url = {https://www.peasec.de/paper/2025/2025_FrankenReinholdDörnfeldReuter_TechForecasting.pdf},
doi = {10.1016/j.techfore.2025.124068},
abstract = {The network of subsea data cables (SDC) transmits the majority of international and intercontinental data exchanges. After thirty years of fiber-optic SDC installation across the oceans, almost all coastal and island countries gained access to the only global fixed infrastructure network. Still, there is considerable inequality in the number of available SDC accesses, creating deficits in redundancy for less connected states. Previous research hypothesized multiple factors that influenced the build-up of internet infrastructures but failed to verify these assumptions through inferential statistics. This work highlights the national-level factors that made backbone access provision more – or less – attractive to SDC project decision-makers. Our regression analysis of global country-year data (n = 4916) found that socio-economic (population, GDP), political (state fragility, conflict), and geographic factors (seismic hazard, neighboring territories) significantly influenced the number of active and planned accesses. This work can serve as a foundation for further research leveraging quantitative statistics to unveil hidden structures in the construction of material internet infrastructures and support sustainability in the future allocation of international infrastructure development resources in general.},
urldate = {2025-03-03},
journal = {Technological Forecasting and Social Change (TFSC)},
author = {Franken, Jonas and Reinhold, Thomas and Dörnfeld, Timon and Reuter, Christian},
month = jun,
year = {2025},
keywords = {Peace, A-Paper, AuswahlPeace, Security, Projekt-ATHENE-SecUrban, Selected},
pages = {124068},
} Marc-André Kaufhold, Tilo Mentler, Simon Nestler, Christian Reuter (2025)Local disasters such as the Ahr Valley flood in Germany, the international backdrop of the RussoUkrainian War, or the global impact of the COVID-19 pandemic place high demands on the people and organisations that are involved in these situations and contexts to save lives, mitigate damage, provide comfort, or organise reconstruction. Novel technologies are constantly making their way into everyday life, such as artificial intelligence, big data, decentralised networks, internet of things, or virtual reality. Their adaptation, acceptance, usability, usefulness, and legal framework conditions for safety-critical systems must be researched and tested thoroughly. In this special issue, we investigate the use of computer-based solutions in areas and situations of direct relevance to people’s lives and well-being (Usable Safety), as well as contributions to user-oriented resilience concepts of sociotechnical systems concerning potential attacks (Usable Security) and data protection mechanisms (Usable Privacy).
@article{kaufhold_tension_2025,
title = {The {Tension} of {Usable} {Safety}, {Security} and {Privacy}},
volume = {24},
url = {https://www.degruyterbrill.com/document/doi/10.1515/icom-2025-0009/html},
doi = {10.1515/icom-2025-0009},
abstract = {Local disasters such as the Ahr Valley flood in Germany, the international backdrop of the RussoUkrainian War, or the global impact of the COVID-19 pandemic place high demands on the people and organisations that are involved in these situations and contexts to save lives, mitigate damage, provide comfort, or organise reconstruction. Novel technologies are constantly making their way into everyday life, such as artificial intelligence, big data, decentralised networks, internet of things, or virtual reality. Their adaptation, acceptance, usability, usefulness, and legal framework conditions for safety-critical systems must be researched and tested thoroughly. In this special issue, we investigate the use of computer-based solutions in areas and situations of direct relevance to people’s lives and well-being (Usable Safety), as well as contributions to user-oriented resilience concepts of sociotechnical systems concerning potential attacks (Usable Security) and data protection mechanisms (Usable Privacy).},
language = {en},
number = {1},
journal = {i-com - Journal of Interactive Media},
author = {Kaufhold, Marc-André and Mentler, Tilo and Nestler, Simon and Reuter, Christian},
year = {2025},
keywords = {HCI, Security, UsableSec, Projekt-ATHENE, Projekt-CROSSING},
} Julian Bäumler, Louis Blöcher, Lars-Joel Frey, Xian Chen, Markus Bayer, Christian Reuter (2025)The dissemination of online hate speech can have serious negative consequences for individuals, online communities, and entire societies. This and the large volume of hateful online content prompted both practitioners’, i.e., in content moderation or law enforcement, and researchers’ interest in machine learning models to automatically classify instances of hate speech. Whereas most scientific works address hate speech classification as a binary task, practice often requires a differentiation into sub-types, e.g., according to target, severity, or legality, which may overlap for individual content. Hence, researchers created datasets and machine learning models that approach hate speech classification in textual data as a multi-label problem. This work presents the first systematic and comprehensive survey of scientific literature on this emerging research landscape in English (N=46). We contribute with a concise overview of 28 datasets suited for training multi-label classification models that reveals significant heterogeneity regarding label-set, size, meta-concept, annotation process, and inter-annotator agreement. Our analysis of 24 publications proposing suitable classification models further establishes inconsistency in evaluation and a preference for architectures based on Bidirectional Encoder Representation from Transformers (BERT) and Recurrent Neural Networks (RNNs). We identify imbalanced training data, reliance on crowdsourcing platforms, small and sparse datasets, and missing methodological alignment as critical open issues and formulate ten recommendations for research.
@article{baumlerSurveyMachineLearningModels,
title = {A survey of machine learning models and datasets for the multi-label classification of textual hate speech in english},
url = {https://arxiv.org/abs/2504.08609},
doi = {10.48550/arXiv.2504.08609},
abstract = {The dissemination of online hate speech can have serious negative consequences for individuals, online communities, and entire societies. This and the large volume of hateful online content prompted both practitioners', i.e., in content moderation or law enforcement, and researchers' interest in machine learning models to automatically classify instances of hate speech. Whereas most scientific works address hate speech classification as a binary task, practice often requires a differentiation into sub-types, e.g., according to target, severity, or legality, which may overlap for individual content. Hence, researchers created datasets and machine learning models that approach hate speech classification in textual data as a multi-label problem. This work presents the first systematic and comprehensive survey of scientific literature on this emerging research landscape in English (N=46). We contribute with a concise overview of 28 datasets suited for training multi-label classification models that reveals significant heterogeneity regarding label-set, size, meta-concept, annotation process, and inter-annotator agreement. Our analysis of 24 publications proposing suitable classification models further establishes inconsistency in evaluation and a preference for architectures based on Bidirectional Encoder Representation from Transformers (BERT) and Recurrent Neural Networks (RNNs). We identify imbalanced training data, reliance on crowdsourcing platforms, small and sparse datasets, and missing methodological alignment as critical open issues and formulate ten recommendations for research.},
journal = {arXiv},
author = {Bäumler, Julian and Blöcher, Louis and Frey, Lars-Joel and Chen, Xian and Bayer, Markus and Reuter, Christian},
year = {2025},
keywords = {Crisis, HCI, Projekt-ATHENE-CyAware, Student, Projekt-CYLENCE},
} Markus Henkel, Steffen Haesler, Hiba Al-Najmi, Frank Hessel, Christian Reuter (2025)Deutschland nutzt einen breiten Mix aus verschiedenen Warnmitteln, um möglichst große Teile der Bevölkerung vor Gefahren zu warnen. Smart Homes können den Warnmittelmix ergänzen, da sie vor regionalen und lokalen Gefahren warnen und automatisch auf solche reagieren können. Unsere Studien zeigen, dass sich die Probandinnen und Probanden die zukünftige Nutzung von Smart Home Warnsystemen situationsangepasst vorstellen können.
@article{henkelSH,
title = {Smart {Homes} als {Ergänzung} des {Warnmittelmixes}?},
url = {https://www.peasec.de/paper/2025/2025_HenkelHaeslerAlNajmiHesselReuter_SmartHomeErgaenzung_bbk.pdf},
abstract = {Deutschland nutzt einen breiten Mix aus verschiedenen Warnmitteln, um möglichst große Teile der Bevölkerung vor Gefahren zu warnen. Smart Homes können den Warnmittelmix ergänzen, da sie vor regionalen und lokalen Gefahren warnen und automatisch auf solche reagieren können. Unsere Studien zeigen, dass sich die Probandinnen und Probanden die zukünftige Nutzung von Smart Home Warnsystemen situationsangepasst vorstellen können.},
journal = {Fachkongress Forschung für den Bevölkerungsschutz 2025},
author = {Henkel, Markus and Haesler, Steffen and Al-Najmi, Hiba and Hessel, Frank and Reuter, Christian},
year = {2025},
keywords = {Crisis, HCI, Projekt-emergenCITY, Student, Projekt-ATHENE-SecUrban, emergenCITY\_INF, emergenCITY\_SG},
} Miyerlandy Cabanzo Valencia, Laura Guntrum (2025)Racism extends into the digital realm, manifesting in various forms of technology-facilitated violence (TFV). Although much research centers on the Global North, it is es-sential to investigate this issue in other settings, such as Colombia, where activists are par-ticularly vulnerable to TFV. This study enriches the debate with a qualitative approach, conducting 18 interviews with activists from Chocó and Bogotá. The literature on race and TFV reveals that technology can exacerbate racism through social media, like anonymity, and introduce new forms of racist violence, including deepfakes and algorithmic bias. However, these forms were not prevalent in our interviews. For activists, structural racism, especially limited internet, and electricity access emerged as a primary factor in their ex-periences with racist TFV. Overt TFV escalates to offline threats, silencing dissenting voices. This research emphasizes the need to understand TFV within non-Western regions, advocating for nuanced approaches to addressing digital racism in diverse contexts.
@article{CabanzoValencia2025,
title = {Race, ethnicity, and technology-facilitated violence: {The} experience of activists in chocó, colombia},
doi = {10.1177/14614448251344286},
abstract = {Racism extends into the digital realm, manifesting in various forms of technology-facilitated violence (TFV). Although much research centers on the Global North, it is es-sential to investigate this issue in other settings, such as Colombia, where activists are par-ticularly vulnerable to TFV. This study enriches the debate with a qualitative approach, conducting 18 interviews with activists from Chocó and Bogotá. The literature on race and TFV reveals that technology can exacerbate racism through social media, like anonymity, and introduce new forms of racist violence, including deepfakes and algorithmic bias. However, these forms were not prevalent in our interviews. For activists, structural racism, especially limited internet, and electricity access emerged as a primary factor in their ex-periences with racist TFV. Overt TFV escalates to offline threats, silencing dissenting voices. This research emphasizes the need to understand TFV within non-Western regions, advocating for nuanced approaches to addressing digital racism in diverse contexts.},
journal = {New Media and Society},
author = {Valencia, Miyerlandy Cabanzo and Guntrum, Laura},
year = {2025},
keywords = {Peace, Projekt-TraCe, A-Paper, Security, Ranking-ImpfactFactor},
} Laura Guntrum, Verena Lasso Mena (2025)Those engaged in the defense of human and land rights, particularly in areas of resource extraction, are increasingly exposed to violence, including a growing number of digital threats. In Colombia, the legacy of decades of armed conflict has overshadowed concerns regarding digital rights, resulting in reports of digital surveillance and online harassment without the requisite judicial oversight. Due to the paucity of research on this topic, this study examines the experiences of 37 environmental and human rights defenders (EHRDs) in La Guajira, North Colombia, who are leveraging information and communication technologies (ICTs) to amplify their concerns in an extractivist region with a history of human rights abuses. The findings indicate a significant prevalence of technology-facilitated violence (TFV) against EHRDs, including death threats, hacking, and hate speech through various digital channels. The spectrum of threats is attributed to several sources, including armed groups, multinational companies, and individuals within the affected communities. The study emphasizes the necessity of adopting a comprehensive approach to violence, integrating TFV into a more expansive conceptualization of violence. Failing to acknowledge the prevalence of TFV may result in an incomplete understanding of the experiences of EHRDs and the consequences of such violence, including self-censorship and emotional harm. Given the increasing overlap between digital and physical violence, we present a framework to enhance the capture and understanding of TFV. Furthermore, this study demonstrates the shortcomings of current security protocols in addressing the multifaceted violence directed at EHRDs due to their opposition to extractive agendas.
@article{guntrum_unmasking_2025,
title = {Unmasking digital threats in the pursuit of human rights and environmental defense in {La} {Guajira}, {North} {Colombia}},
issn = {1369-118X},
url = {https://www.peasec.de/paper/2025/2025_GuntrumLassoMenaReuter_UnmaskingDigitalThreats_InfoCommSoc.pdf},
doi = {10.1080/1369118X.2025.2503444},
abstract = {Those engaged in the defense of human and land rights, particularly in areas of resource extraction, are increasingly exposed to violence, including a growing number of digital threats. In Colombia, the legacy of decades of armed conflict has overshadowed concerns regarding digital rights, resulting in reports of digital surveillance and online harassment without the requisite judicial oversight. Due to the paucity of research on this topic, this study examines the experiences of 37 environmental and human rights defenders (EHRDs) in La Guajira, North Colombia, who are leveraging information and communication technologies (ICTs) to amplify their concerns in an extractivist region with a history of human rights abuses. The findings indicate a significant prevalence of technology-facilitated violence (TFV) against EHRDs, including death threats, hacking, and hate speech through various digital channels. The spectrum of threats is attributed to several sources, including armed groups, multinational companies, and individuals within the affected communities. The study emphasizes the necessity of adopting a comprehensive approach to violence, integrating TFV into a more expansive conceptualization of violence. Failing to acknowledge the prevalence of TFV may result in an incomplete understanding of the experiences of EHRDs and the consequences of such violence, including self-censorship and emotional harm. Given the increasing overlap between digital and physical violence, we present a framework to enhance the capture and understanding of TFV. Furthermore, this study demonstrates the shortcomings of current security protocols in addressing the multifaceted violence directed at EHRDs due to their opposition to extractive agendas.},
journal = {Information, Communication \& Society},
author = {Guntrum, Laura and Mena, Verena Lasso},
year = {2025},
note = {Publisher: Routledge},
keywords = {Peace, Projekt-TraCe, A-Paper},
pages = {1--22},
} Franz Kuntke, Lars Baumgärtner, Jonas Franken, Christian Reuter (2025)The reliability of communication networks can be compromised by various factors, including natural disasters, which highlights the need for backup systems. In rural areas, where restoring public network infrastructure can take time, an alternative communication channel can be particularly valuable. This study explores the potential of repurposing Long Range Wide Area Networks (LoRaWAN) gateways as multi-hop network nodes to create a digital emergency communication system. Farmers, who are increasingly adopting Low Power Wide Area Networks (LPWANs) and are geographically spread, are identified as key stakeholders for such a system. Using OpenStreetMap data on farm locations, we found that connecting farm communities through LoRa communication is theoretically possible in many areas. Simulations using delay-tolerant network routing protocols confirm the feasibility of this approach under various scenarios. While the general feasability was first evaluated with data from Germany, we also conduct analyses for Uganda. A proof-of-concept implementation demonstrates that small messages can be transmitted successfully using real hardware, validating the concept of a decentralized communication infrastructure based on existing equipment. Additionally, we conducted experiments to measure energy consumption, bandwidth usage, and latency in actual hardware setups. This work contributes to various Sustainable Development Goals by supporting resilient communication infrastructure in underserved areas (SDG 9: Industry, Innovation and Infrastructure), strengthening rural communities that are often the last to recover after emergencies (SDG 10: Reduced Inequalities, SDG 11: Sustainable Cities and Communities), and ultimately helping safeguard food systems through improved agricultural coordination and communication (SDG 2: Zero Hunger).
@article{kuntke2025crisis,
title = {Crisis-communication between farms: {Disruption}-tolerant networking with commodity {LoRaWAN} hardware},
abstract = {The reliability of communication networks can be compromised by various factors, including natural disasters, which highlights the need for backup systems. In rural areas, where restoring public network infrastructure can take time, an alternative communication channel can be particularly valuable. This study explores the potential of repurposing Long Range Wide Area Networks (LoRaWAN) gateways as multi-hop network nodes to create a digital emergency communication system. Farmers, who are increasingly adopting Low Power Wide Area Networks (LPWANs) and are geographically spread, are identified as key stakeholders for such a system. Using OpenStreetMap data on farm locations, we found that connecting farm communities through LoRa communication is theoretically possible in many areas. Simulations using delay-tolerant network routing protocols confirm the feasibility of this approach under various scenarios. While the general feasability was first evaluated with data from Germany, we also conduct analyses for Uganda. A proof-of-concept implementation demonstrates that small messages can be transmitted successfully using real hardware, validating the concept of a decentralized communication infrastructure based on existing equipment. Additionally, we conducted experiments to measure energy consumption, bandwidth usage, and latency in actual hardware setups. This work contributes to various Sustainable Development Goals by supporting resilient communication infrastructure in underserved areas (SDG 9: Industry, Innovation and Infrastructure), strengthening rural communities that are often the last to recover after emergencies (SDG 10: Reduced Inequalities, SDG 11: Sustainable Cities and Communities), and ultimately helping safeguard food systems through improved agricultural coordination and communication (SDG 2: Zero Hunger).},
journal = {Information Technology for Development},
author = {Kuntke, Franz and Baumgärtner, Lars and Franken, Jonas and Reuter, Christian},
year = {2025},
keywords = {Projekt-emergenCITY, A-Paper, Security, UsableSec, Projekt-AgriRegio, emergenCITY\_INF, emergenCITY\_SG},
} Laura Guntrum, Christian Reuter (2025)Activists’ use of ICTs in contexts affected by violence poses challenges like digital surveillance. Based on 92 interviews with activists from Bolivia, Cameroon, Costa Rica, Colombia, India, Myanmar, and Nicaragua, this study explores their protection and coping strategies against technology-facilitated violence. Findings show limited emphasis on digital security and privacy-enhancing technologies, primarily due to the usability and familiarity with popular applications, coupled with relative unfamiliarity with other features. Generally, some precautions, like avoiding real-time location sharing, are common. While many protection strategies are similar, some are shaped by local factors like internet shutdowns and different adversaries’ capabilities. The findings demonstrate that some tools and features, such as VPN, may offer protection but also pose risks, e.g., in the case of criminalization, highlighting the crucial role of local context. Designing secure and usable features that account for the varying levels of limitations, such as poor connectivity and risks activists face, is essential.
@article{Guntrum2025,
title = {Activists' strategies for coping with technology-facilitated violence in the global south},
volume = {32},
issn = {1073-0516},
url = {https://doi.org/10.1145/3762811},
doi = {10.1145/3762811},
abstract = {Activists' use of ICTs in contexts affected by violence poses challenges like digital surveillance. Based on 92 interviews with activists from Bolivia, Cameroon, Costa Rica, Colombia, India, Myanmar, and Nicaragua, this study explores their protection and coping strategies against technology-facilitated violence. Findings show limited emphasis on digital security and privacy-enhancing technologies, primarily due to the usability and familiarity with popular applications, coupled with relative unfamiliarity with other features. Generally, some precautions, like avoiding real-time location sharing, are common. While many protection strategies are similar, some are shaped by local factors like internet shutdowns and different adversaries' capabilities. The findings demonstrate that some tools and features, such as VPN, may offer protection but also pose risks, e.g., in the case of criminalization, highlighting the crucial role of local context. Designing secure and usable features that account for the varying levels of limitations, such as poor connectivity and risks activists face, is essential.},
number = {6},
journal = {ACM Transactions on Computer-Human Interaction (TOCHI)},
author = {Guntrum, Laura and Reuter, Christian},
year = {2025},
keywords = {A-Paper, AuswahlPeace, Peace, Projekt-ATHENE-PriVis, Projekt-TraCe, Ranking-CORE-A*},
pages = {1--38},
} Bücher und herausgegebene Zeitschriften / Books and Edited Special Issues in Journals
Christian Reuter, Amanda Lee Hughes, Cody Buntain (2025)The rise of fake news and misinformation in the digital age poses serious risks for individuals and society, particularly during crises like the Israel-Hamas war, the Russian-Ukraine war, or the COVID-19 pandemic. Misinformation serves as a tool to manipulate public opinion and create discord. Vulnerability to manipulation increases in online spaces during crises, where authoritative information is scarce. Emergency management, public health, political and public administration, as well as media professionals and citizens express concern and seek solutions to enhance information quality during such critical times. This article highlights user-centred approaches to countering fake news and misinformation, tracing their historical evolution from ancient Greece to the present, focussing on their relevance during the COVID-19 crisis and in contemporary information warfare. It describes the vulnerability of audiences to misinformation and outlines prevailing trends in user-centred countermeasures. This article also introduces recent research on the effectiveness of media literacy interventions on truth discernment, a cross-cultural comparison of the perception of negative consequences and the injunctive norm, a comparison of video and text to promote lateral reading in adolescents, content-specific indicators on Twitter from a user perspective, a learning system for detecting misinformation as well as ethical and security considerations in automated detection.
@book{reuter_special_2025,
title = {Special {Issue} on {Combating} {Information} {Warfare}: {User}-{Centered} {Countermeasures} against {Fake} {News} and {Misinformation} - {Behaviour} \& {Information} {Technology} ({BIT})},
abstract = {The rise of fake news and misinformation in the digital age poses serious risks for individuals and society, particularly during crises like the Israel-Hamas war, the Russian-Ukraine war, or the COVID-19 pandemic. Misinformation serves as a tool to manipulate public opinion and create discord. Vulnerability to manipulation increases in online spaces during crises, where authoritative information is scarce. Emergency management, public health, political and public administration, as well as media professionals and citizens express concern and seek solutions to enhance information quality during such critical times. This article highlights user-centred approaches to countering fake news and misinformation, tracing their historical evolution from ancient Greece to the present, focussing on their relevance during the COVID-19 crisis and in contemporary information warfare. It describes the vulnerability of audiences to misinformation and outlines prevailing trends in user-centred countermeasures. This article also introduces recent research on the effectiveness of media literacy interventions on truth discernment, a cross-cultural comparison of the perception of negative consequences and the injunctive norm, a comparison of video and text to promote lateral reading in adolescents, content-specific indicators on Twitter from a user perspective, a learning system for detecting misinformation as well as ethical and security considerations in automated detection.},
publisher = {Taylor \& Francis},
author = {Reuter, Christian and Hughes, Amanda Lee and Buntain, Cody},
year = {2025},
note = {Publication Title: Behaviour \& Information Technology (BIT)},
keywords = {Crisis, HCI, Peace, A-Paper, Ranking-CORE-A, Ranking-ImpactFactor, SocialMedia},
} Stefka Schmid (2025)Information technology is used across the globe, permeating different spheres of life. In particular, advances of artificial intelligence (AI) and broad adoption of social media re-negotiate human interactions with the world. In the midst of geopolitical tensions and multiple crises, as indicated by the Russian invasion of Ukraine in 2022 or the COVID-19 pandemic, technology has become highly important to security governance. For example, the EU has formulated policies on the use of “high risk AI” while political actors use social media for (disinformation) campaigns or war reporting. Against the backdrop of multiple crises and political actors’ reliance on technological solutions, critical security studies (CSS) has been dedicated to deconstructing governmental security politics as stabilizers of the status quo, with insecurities persisting, enacted through technologically mediated practices. While attention has specifically been paid to the role of expertise in “critical” contexts, my work is interested in how socio-technical expert knowledge plays into the problematization of broader innovation policies. Further, although various practices and forms of labor have been studied, their collaborative character and informal actors’ productive self-governance have been investigated less prominently. Connecting to human-computer interaction (HCI) as a community of socio-technical practice, it becomes possible to identify user-centric design characteristics and “agnostic” framing of contexts of use being traded into both spheres of political and technological practice. I focus on socio-technical practices that are enacted in different fields: (1) AI innovation policies, (2) safety-critical scenarios, and (3) misinformation on social media. In these, security is negotiated and on high demand. AI innovation policies are formulated in the context of global competition and address both commercial and military applications. Safety-critical scenarios, in which uncertainty is high, are experienced by both formal and informal non-governmental actors. Misinformation on social media, especially in the context of rising authoritarianism, has been identified a threat and is aimed to be mitigated by technological solutions. Thus, the first part finds that Chinese, EU and US policies refer to design characteristics in the problematization of AI innovation. AI is presented as an opaque and abstract issue that is realized across multiple contexts of use. Risks and threats are posed by the “black box” character of AI and technology use by “others”. Future innovation is seen as a solution, with characteristics ranging from reliability to explainability being used as points of reference. The second part investigates computer-supported cooperative work (CSCW) of both formal and informal collectives in safety-critical scenarios. Self-governance in crises requires cooperative and collaborative work, comprising routines and teamwork. Actors’ perceptions of criticality are governed self-referentially, with emphasis put on situation awareness as a goal in formal settings. Successful coping with insecurities points out the productive side of self-governance by informal actors, building on both physically and virtually enacted care practices. The third part addresses (de)politicization in the context of technological measures aiming at mitigating the spread of misinformation on social media. Reflecting on user studies that resulted in prototyping of a learning-oriented approach, depoliticization is notable considering user-centered design on the grounds of responsibilization and technological solutionism. Yet, this also entails politicization of user interventions regarding their transparency. Situated in HCI and as an interdisciplinary endeavor, this work allows for a reflexive approach that both integrates and reflects on problem solving approaches that are co-constitutive to security governance.
@book{schmid_governing_2025,
address = {Darmstadt, Germany},
title = {Governing ({In}){Security}: {Socio}-technical {Interactions} in {International} {Relations}},
url = {https://tuprints.ulb.tu-darmstadt.de/30095/},
abstract = {Information technology is used across the globe, permeating different spheres of life. In particular, advances of artificial intelligence (AI) and broad adoption of social media re-negotiate human interactions with the world. In the midst of geopolitical tensions and multiple crises, as indicated by the Russian invasion of Ukraine in 2022 or the COVID-19 pandemic, technology has become highly important to security governance. For example, the EU has formulated policies on the use of "high risk AI" while political actors use social media for (disinformation) campaigns or war reporting.
Against the backdrop of multiple crises and political actors' reliance on technological solutions, critical security studies (CSS) has been dedicated to deconstructing governmental security politics as stabilizers of the status quo, with insecurities persisting, enacted through technologically mediated practices. While attention has specifically been paid to the role of expertise in "critical" contexts, my work is interested in how socio-technical expert knowledge plays into the problematization of broader innovation policies. Further, although various practices and forms of labor have been studied, their collaborative character and informal actors' productive self-governance have been investigated less prominently. Connecting to human-computer interaction (HCI) as a community of socio-technical practice, it becomes possible to identify user-centric design characteristics and "agnostic" framing of contexts of use being traded into both spheres of political and technological practice. I focus on socio-technical practices that are enacted in different fields: (1) AI innovation policies, (2) safety-critical scenarios, and (3) misinformation on social media. In these, security is negotiated and on high demand. AI innovation policies are formulated in the context of global competition and address both commercial and military applications. Safety-critical scenarios, in which uncertainty is high, are experienced by both formal and informal non-governmental actors. Misinformation on social media, especially in the context of rising authoritarianism, has been identified a threat and is aimed to be mitigated by technological solutions.
Thus, the first part finds that Chinese, EU and US policies refer to design characteristics in the problematization of AI innovation. AI is presented as an opaque and abstract issue that is realized across multiple contexts of use. Risks and threats are posed by the "black box" character of AI and technology use by "others". Future innovation is seen as a solution, with characteristics ranging from reliability to explainability being used as points of reference. The second part investigates computer-supported cooperative work (CSCW) of both formal and informal collectives in safety-critical scenarios. Self-governance in crises requires cooperative and collaborative work, comprising routines and teamwork. Actors' perceptions of criticality are governed self-referentially, with emphasis put on situation awareness as a goal in formal settings. Successful coping with insecurities points out the productive side of self-governance by informal actors, building on both physically and virtually enacted care practices. The third part addresses (de)politicization in the context of technological measures aiming at mitigating the spread of misinformation on social media. Reflecting on user studies that resulted in prototyping of a learning-oriented approach, depoliticization is notable considering user-centered design on the grounds of responsibilization and technological solutionism. Yet, this also entails politicization of user interventions regarding their transparency. Situated in HCI and as an interdisciplinary endeavor, this work allows for a reflexive approach that both integrates and reflects on problem solving approaches that are co-constitutive to security governance.},
publisher = {Dissertation (Dr. phil.), Department of History and Social Sciences, Technische Universität Darmstadt},
author = {Schmid, Stefka},
year = {2025},
doi = {10.26083/tuprints-00030095},
keywords = {Crisis, Peace, Projekt-NEBULA, Projekt-TraCe, Dissertation},
} Katrin Hartwig (2025)Informed navigation of misinformation on social media constitutes a major challenge. The field of Human-Computer Interaction (HCI) suggests digital misinformation interventions as user-centered countermeasures. This book clusters (1) existing misinformation interventions within a taxonomy encompassing designs, interaction types, and timings. The book demonstrates that current research mostly addresses higher-educated participants, and targets Twitter/X and Facebook. It highlights trends toward comprehensible interventions in contrast to top-down approaches. The findings informed (2) the design, implementation, and evaluation of simulated apps for TikTok, voice messages, and Twitter/X as indicator-based interventions. Therefore, (3) the book identified misinformation indicators for various modalities that were perceived as comprehensible.The book empirically demonstrates that (4) indicator-based interventions are positively received due to their transparency. However, they also come with challenges, such as users’ blind trust and lack of realistic assessments of biases. This research outlines chances and implications for future research.
@book{hartwig_navigating_2025,
address = {Wiesbaden, Germany},
title = {Navigating {Misinformation}: {User}-{Centered} {Design} and {Evaluation} of {Indicator}-{Based} {Digital} {Interventions}},
isbn = {978-3-658-47884-1},
url = {https://link.springer.com/book/10.1007/978-3-658-47885-8},
abstract = {Informed navigation of misinformation on social media constitutes a major challenge. The field of Human-Computer Interaction (HCI) suggests digital misinformation interventions as user-centered countermeasures. This book clusters (1) existing misinformation interventions within a taxonomy encompassing designs, interaction types, and timings. The book demonstrates that current research mostly addresses higher-educated participants, and targets Twitter/X and Facebook. It highlights trends toward comprehensible interventions in contrast to top-down approaches. The findings informed (2) the design, implementation, and evaluation of simulated apps for TikTok, voice messages, and Twitter/X as indicator-based interventions. Therefore, (3) the book identified misinformation indicators for various modalities that were perceived as comprehensible.The book empirically demonstrates that (4) indicator-based interventions are positively received due to their transparency. However, they also come with challenges, such as users' blind trust and lack of realistic assessments of biases. This research outlines chances and implications for future research.},
publisher = {Springer Vieweg},
author = {Hartwig, Katrin},
year = {2025},
doi = {10.1007/978-3-658-47885-8},
keywords = {Crisis, DissPublisher, HCI, Projekt-NEBULA, Projekt-ATHENE, Projekt-CROSSING, Projekt-CYLENCE},
} Markus Bayer (2025)In today’s fast-paced cybersecurity landscape, professionals are increasingly challenged by the vast volumes of cyber threat data, making it difficult to identify and mitigate threats effectively. Traditional clustering methods help in broadly categorizing threats but fall short when it comes to the fine-grained analysis necessary for precise threat management. Supervised machine learning offers a potential solution, but the rapidly changing nature of cyber threats renders static models ineffective and the creation of new models too labor-intensive. This book addresses these challenges by introducing innovative low-data regime methods that enhance the machine learning process with minimal labeled data. The proposed approach spans four key stages: Data Acquisition: Leveraging active learning with advanced models like GPT-4 to optimize data labeling. Preprocessing: Utilizing GPT-2 and GPT-3 for data augmentation to enrich and diversify datasets. Model Selection: Developing a specialized cybersecurity language model and using multi-level transfer learning. Prediction: Introducing a novel adversarial example generation method, grounded in explainable AI, to improve model accuracy and resilience.
@book{bayer_deep_2025,
address = {Wiesbaden, Germany},
title = {Deep {Learning} in {Textual} {Low}-{Data} {Regimes} for {Cybersecurity}},
isbn = {978-3-658-48777-5},
url = {https://link.springer.com/book/10.1007/978-3-658-48778-2},
abstract = {In today's fast-paced cybersecurity landscape, professionals are increasingly challenged by the vast volumes of cyber threat data, making it difficult to identify and mitigate threats effectively. Traditional clustering methods help in broadly categorizing threats but fall short when it comes to the fine-grained analysis necessary for precise threat management. Supervised machine learning offers a potential solution, but the rapidly changing nature of cyber threats renders static models ineffective and the creation of new models too labor-intensive. This book addresses these challenges by introducing innovative low-data regime methods that enhance the machine learning process with minimal labeled data. The proposed approach spans four key stages:
Data Acquisition: Leveraging active learning with advanced models like GPT-4 to optimize data labeling.
Preprocessing: Utilizing GPT-2 and GPT-3 for data augmentation to enrich and diversify datasets.
Model Selection: Developing a specialized cybersecurity language model and using multi-level transfer learning.
Prediction: Introducing a novel adversarial example generation method, grounded in explainable AI, to improve model accuracy and resilience.},
publisher = {Springer Vieweg},
author = {Bayer, Markus},
year = {2025},
doi = {10.1007/978-3-658-48778-2},
keywords = {DissPublisher, Projekt-ATHENE-CyAware, Security, Projekt-CYLENCE, Projekt-CYWARN},
} Sebastian Linsner (2025)Users face many situations in which they have to disclose their data to others. In many cases, they are not properly informed about the usage of their data or the consequences of data disclosure. This book investigates how users can be supported by researching three core aspects: Firstly, problems and risks that lead to (unintended) data disclosure or arise from it have to be identified. Secondly, measures are investigated that developers can apply to mitigate these risks and meet the needs of the users. Finally, the developed solutions have to be adopted into practice. Strategies to bring security- and privacy-enhancing technologies to use are essential because a tool that is not used cannot protect anyone. The investigated scenarios are twofold: Firstly, business-to-business (B2B) collaborations, especially highlighting the perspective of owners of small and medium enterprises (SMEs) who are forced to provide data for business processes. Secondly, scenarios of everyday usage for private users that require the disclosure of data are investigated.
@book{linsner_privacy_2025,
address = {Wiesbaden, Germany},
title = {Privacy {Preserving} {Data} {Management} – {Assisting} {Users} in {Data} {Disclosure} {Scenarios}},
url = {https://link.springer.com/book/9783658474447},
abstract = {Users face many situations in which they have to disclose their data to others. In many cases, they are not properly informed about the usage of their data or the consequences of data disclosure. This book investigates how users can be supported by researching three core aspects: Firstly, problems and risks that lead to (unintended) data disclosure or arise from it have to be identified. Secondly, measures are investigated that developers can apply to mitigate these risks and meet the needs of the users. Finally, the developed solutions have to be adopted into practice. Strategies to bring security- and privacy-enhancing technologies to use are essential because a tool that is not used cannot protect anyone.
The investigated scenarios are twofold: Firstly, business-to-business (B2B) collaborations, especially highlighting the perspective of owners of small and medium enterprises (SMEs) who are forced to provide data for business processes. Secondly, scenarios of everyday usage for private users that require the disclosure of data are investigated.},
publisher = {Springer Vieweg},
author = {Linsner, Sebastian},
year = {2025},
doi = {10.1007/978-3-658-47445-4},
keywords = {DissPublisher, Security, UsableSec, Projekt-ATHENE-PriVis, Projekt-CROSSING},
} Jasmin Haunschild (2025)The COVID-19 pandemic and the war in Ukraine emphasize the need for greater disaster resilience and preparedness. This book investigates how these apps can enhance crisis awareness and citizen involvement in disaster prevention and response. By examining user perspectives and the impact of crisis experiences, the book explores how to increase the adoption and effectiveness of warning apps. The research uses qualitative and quantitative methods, including surveys and design interventions, to reveal current usage, changes over time and desired features. It shows that while citizens find warning apps helpful, more safety-related features and two-way communication could increase their appeal. Additionally, the integration of preparedness features into these apps can increase their perceived usefulness, though challenges remain in addressing user expectations and design preferences across different crises and cultural contexts.
@book{haunschild_enhancing_2025,
address = {Wiesbaden, Germany},
title = {Enhancing {Citizens}’ {Role} in {Public} {Safety}: {Interaction}, {Perception} and {Design} of {Mobile} {Warning} {Apps}},
isbn = {978-3-658-46488-2},
url = {https://link.springer.com/book/10.1007/978-3-658-46489-9},
abstract = {The COVID-19 pandemic and the war in Ukraine emphasize the need for greater disaster resilience and preparedness. This book investigates how these apps can enhance crisis awareness and citizen involvement in disaster prevention and response. By examining user perspectives and the impact of crisis experiences, the book explores how to increase the adoption and effectiveness of warning apps. The research uses qualitative and quantitative methods, including surveys and design interventions, to reveal current usage, changes over time and desired features. It shows that while citizens find warning apps helpful, more safety-related features and two-way communication could increase their appeal. Additionally, the integration of preparedness features into these apps can increase their perceived usefulness, though challenges remain in addressing user expectations and design preferences across different crises and cultural contexts.},
publisher = {Springer Vieweg},
author = {Haunschild, Jasmin},
year = {2025},
doi = {10.1007/978-3-658-46489-9},
keywords = {Crisis, DissPublisher, HCI, Projekt-emergenCITY, Projekt-ATHENE-SecUrban, emergenCITY\_INF, emergenCITY\_SG},
} Jasmin Haunschild (2025)@book{haunschild_enhancing_2025-1,
address = {Darmstadt, Germany},
title = {Enhancing {Citizens}’ {Role} in {Public} {Safety}: {Interaction}, {Perception} and {Design} of {Mobile} {Warning} {Apps}},
publisher = {Dissertation (Dr. rer. nat.), Department of Computer Science, Technische Universität Darmstadt},
author = {Haunschild, Jasmin},
year = {2025},
keywords = {Crisis, HCI, Projekt-emergenCITY, Projekt-ATHENE-SecUrban, Dissertation, emergenCITY\_INF, emergenCITY\_SG},
} Sebastian Linsner (2025)@book{linsner_privacy_2025-1,
address = {Darmstadt, Germany},
title = {Privacy {Preserving} {Data} {Management} – {Assisting} {Users} in {Data} {Disclosure} {Scenarios}},
publisher = {Dissertation (Dr.-Ing.), Department of Computer Science, Technische Universität Darmstadt},
author = {Linsner, Sebastian},
year = {2025},
keywords = {Security, UsableSec, Projekt-ATHENE-PriVis, Projekt-CROSSING, Dissertation},
} Katrin Hartwig (2025)Informed navigation of misinformation on social media constitutes a major challenge. The field of Human-Computer Interaction (HCI) suggests digital misinformation interventions as user-centered countermeasures. This book clusters (1) existing misinformation interventions within a taxonomy encompassing designs, interaction types, and timings. The book demonstrates that current research mostly addresses higher-educated participants, and targets Twitter/X and Facebook. It highlights trends toward comprehensible interventions in contrast to top-down approaches. The findings informed (2) the design, implementation, and evaluation of simulated apps for TikTok, voice messages, and Twitter/X as indicator-based interventions. Therefore, (3) the book identified misinformation indicators for various modalities that were perceived as comprehensible.The book empirically demonstrates that (4) indicator-based interventions are positively received due to their transparency. However, they also come with challenges, such as users’ blind trust and lack of realistic assessments of biases. This research outlines chances and implications for future research.
@book{hartwig_navigating_2025-1,
address = {Darmstadt, Germany},
title = {Navigating {Misinformation}: {User}-{Centered} {Design} and {Evaluation} of {Indicator}-{Based} {Digital} {Interventions}},
url = {https://tuprints.ulb.tu-darmstadt.de/id/eprint/28112},
abstract = {Informed navigation of misinformation on social media constitutes a major challenge. The field of Human-Computer Interaction (HCI) suggests digital misinformation interventions as user-centered countermeasures. This book clusters (1) existing misinformation interventions within a taxonomy encompassing designs, interaction types, and timings. The book demonstrates that current research mostly addresses higher-educated participants, and targets Twitter/X and Facebook. It highlights trends toward comprehensible interventions in contrast to top-down approaches. The findings informed (2) the design, implementation, and evaluation of simulated apps for TikTok, voice messages, and Twitter/X as indicator-based interventions. Therefore, (3) the book identified misinformation indicators for various modalities that were perceived as comprehensible.The book empirically demonstrates that (4) indicator-based interventions are positively received due to their transparency. However, they also come with challenges, such as users' blind trust and lack of realistic assessments of biases. This research outlines chances and implications for future research.},
publisher = {Dissertation (Dr.-Ing.), Department of Computer Science, Technische Universität Darmstadt},
author = {Hartwig, Katrin},
year = {2025},
note = {http://nbn-resolving.de/urn:nbn:de:tuda-tuprints-281126},
keywords = {Crisis, HCI, Projekt-NEBULA, Projekt-CROSSING, Dissertation},
} Markus Bayer (2025)In today’s fast-paced cybersecurity landscape, professionals are increasingly challenged by the vast volumes of cyber threat data, making it difficult to identify and mitigate threats effectively. Traditional clustering methods help in broadly categorizing threats but fall short when it comes to the fine-grained analysis necessary for precise threat management. Supervised machine learning offers a potential solution, but the rapidly changing nature of cyber threats renders static models ineffective and the creation of new models too labor-intensive. This book addresses these challenges by introducing innovative low-data regime methods that enhance the machine learning process with minimal labeled data. The proposed approach spans four key stages: Data Acquisition: Leveraging active learning with advanced models like GPT-4 to optimize data labeling. Preprocessing: Utilizing GPT-2 and GPT-3 for data augmentation to enrich and diversify datasets. Model Selection: Developing a specialized cybersecurity language model and using multi-level transfer learning. Prediction: Introducing a novel adversarial example generation method, grounded in explainable AI, to improve model accuracy and resilience.
@book{bayer_deep_2025-1,
address = {Darmstadt, Germany},
title = {Deep {Learning} in {Textual} {Low}-{Data} {Regimes} for {Cybersecurity}},
url = {https://tuprints.ulb.tu-darmstadt.de/id/eprint/30046},
abstract = {In today's fast-paced cybersecurity landscape, professionals are increasingly challenged by the vast volumes of cyber threat data, making it difficult to identify and mitigate threats effectively. Traditional clustering methods help in broadly categorizing threats but fall short when it comes to the fine-grained analysis necessary for precise threat management. Supervised machine learning offers a potential solution, but the rapidly changing nature of cyber threats renders static models ineffective and the creation of new models too labor-intensive. This book addresses these challenges by introducing innovative low-data regime methods that enhance the machine learning process with minimal labeled data. The proposed approach spans four key stages:
Data Acquisition: Leveraging active learning with advanced models like GPT-4 to optimize data labeling.
Preprocessing: Utilizing GPT-2 and GPT-3 for data augmentation to enrich and diversify datasets.
Model Selection: Developing a specialized cybersecurity language model and using multi-level transfer learning.
Prediction: Introducing a novel adversarial example generation method, grounded in explainable AI, to improve model accuracy and resilience.},
publisher = {Dissertation (Dr. rer. nat.), Department of Computer Science, Technische Universität Darmstadt},
author = {Bayer, Markus},
year = {2025},
note = {urn:nbn:de:tuda-tuprints-300460},
keywords = {Projekt-ATHENE-CyAware, Security, Projekt-CYLENCE, Projekt-CYWARN, Dissertation},
} Livani Charikleia, Franziska Schraut, Laura Guntrum, Julian Lawrence (2025)Security is paramount – online and offline.Maria, Alex, Sarah, and Daniel are four friends deeply committed to human rights activism in a country grappling with increasing authoritarianism. Their efforts to organize and amplify their message on social media are met with relentless challenges: internet shutdowns, hacked accounts, direct threats, and constant surveillance – tactics aimed at silencing dissent and instilling fear. Daniel’s arrest for this involvement in the protests serves as a stark reminder of the dangers they all face.Follow Maria as she strives to learn more about digital safety and what is means for activists in four short comic stories.
@book{ComicCodeofCourage,
address = {Darmstadt, Germany},
title = {Code of {Courage}: {A} {Comic} {About} {Digital} {Security} for {Activists} [{Available} in {German}, {Russian}, {Spanish} under "{Download} {PDF}"]},
url = {https://peasec.de/2025/comic/},
abstract = {Security is paramount - online and offline.Maria, Alex, Sarah, and Daniel are four friends deeply committed to human rights activism in a country grappling with increasing authoritarianism. Their efforts to organize and amplify their message on social media are met with relentless challenges: internet shutdowns, hacked accounts, direct threats, and constant surveillance - tactics aimed at silencing dissent and instilling fear. Daniel's arrest for this involvement in the protests serves as a stark reminder of the dangers they all face.Follow Maria as she strives to learn more about digital safety and what is means for activists in four short comic stories.},
publisher = {Universitäts- und Landesbibliothek Darmstadt},
author = {Charikleia, Livani and Schraut, Franziska and Guntrum, Laura and Lawrence, Julian},
year = {2025},
doi = {10.26083/tuprints-00029108},
keywords = {Peace, Projekt-TraCe},
} Philipp Kuehn (2025)This book explores innovative methods to enhance cybersecurity by leveraging official and unofficial information sources on the web. While traditional approaches like Cyber Threat Intelligence (CTI) and Security Information and Event Management (SIEM) rely on past breaches, this work emphasizes a proactive stance, utilizing Open Source Intelligence (OSINT) to predict and prepare for emerging threats. Drawing from crisis informatics and data mining, the research introduces automated approaches for collecting, enriching, and analyzing cybersecurity information across diverse web sources, providing security teams with tools to identify emerging threats while reducing manual workload. For security professionals and researchers, this work demonstrates how automation can enhance human expertise in cybersecurity, paving the way for more robust and proactive threat detection.
@book{kuehn_proactive_2025,
address = {Darmstadt, Germany},
title = {Proactive {Cyber} {Threat} {Intelligence}: {Automating} the {Intelligence} {Cycle} based on {Open} {Sources}},
url = {https://tuprints.ulb.tu-darmstadt.de/handle/tuda/14750},
abstract = {This book explores innovative methods to enhance cybersecurity by leveraging official and unofficial information sources on the web. While traditional approaches like Cyber Threat Intelligence (CTI) and Security Information and Event Management (SIEM) rely on past breaches, this work emphasizes a proactive stance, utilizing Open Source Intelligence (OSINT) to predict and prepare for emerging threats. Drawing from crisis informatics and data mining, the research introduces automated approaches for collecting, enriching, and analyzing cybersecurity information across diverse web sources, providing security teams with tools to identify emerging threats while reducing manual workload. For security professionals and researchers, this work demonstrates how automation can enhance human expertise in cybersecurity, paving the way for more robust and proactive threat detection.},
publisher = {Dissertation (Dr.-Ing.), Department of Computer Science, Technische Universität Darmstadt},
author = {Kuehn, Philipp},
year = {2025},
keywords = {Security, UsableSec, Projekt-ATHENE-SecUrban, Projekt-CYWARN, Dissertation},
} Tom Biselli (2025)In an ever more complex and opaque digital information landscape, individuals increasingly share sensitive data and rely on various digital sources for information. In doing so, they face increasing challenges in engaging with digital information flows. This dissertation explores two critical directions of digital information flows: (1) the disclosure of sensitive information related to privacy and (2) the consumption of information, with a particular focus on misinformation. To effectively address these challenges, individuals require support in regaining their information sovereignty, which this dissertation conceptualises as a form of autonomy, control, and competence in navigating digital information flows related to privacy and misinformation. Overall, this dissertation provides a user-centred perspective rooted in Human-Computer Interaction to explore conceptual and methodological insights, user perspectives, and design implications for digital interventions with the overarching aim of supporting Individual Information Sovereignty. To do this, this dissertation employs a range of qualitative and quantitative research methods, including representative surveys, interviews, focus groups, think-aloud studies, and online experiments. Findings on conceptual and methodological insights demonstrate how precise operationalisation and measurement of concepts such as privacy and corresponding behaviour are essential prerequisites for accurately determining user needs. Findings on user perspectives highlight diverse, context-dependent, and evolving perspectives and patterns in digital technology use as well as support needs. Users express a fundamental tension between the advantages of digital information availability and the risk of information overload, leading to challenges in maintaining control over digital information flows. In the context of emergencies, for example, the use of social media is especially hindered by perceived privacy implications and the risk of false rumours. In general, users desire greater transparency and comprehensibility when navigating privacy and misinformation, suggesting that interventions should prioritise empowering user autonomy through tailored, clear and well-structured information. Finally, findings on design implications for digital interventions to support navigating privacy and misinformation highlight the potential of transparent and personalised approaches. For instance, personalised cookie banners tailored to users’ privacy knowledge reduce the acceptance of browser cookies. Additionally, personalised nudges and transparent, indicator-based interventions support the identification of misleading information in text, videos, and charts. Overall, this dissertation demonstrates the heterogeneity of user perspectives and the potential of transparent and personalised interventions to support Individual Information Sovereignty. This approach aims to empower users to navigate digital information flows in a more informed and self-determined way.
@book{biselli_individual_2025,
address = {Darmstadt, Germany},
title = {Individual {Information} {Sovereignty}: {User} {Perspectives} and {Digital} {Interventions} for {Navigating} {Privacy} and {Misinformation}},
url = {https://tuprints.ulb.tu-darmstadt.de/entities/publication/f5508aab-cf31-41c6-8e7d-f7a36dc265f5},
abstract = {In an ever more complex and opaque digital information landscape, individuals increasingly share sensitive data and rely on various digital sources for information. In doing so, they face increasing challenges in engaging with digital information flows. This dissertation explores two critical directions of digital information flows: (1) the disclosure of sensitive information related to privacy and (2) the consumption of information, with a particular focus on misinformation. To effectively address these challenges, individuals require support in regaining their information sovereignty, which this dissertation conceptualises as a form of autonomy, control, and competence in navigating digital information flows related to privacy and misinformation. Overall, this dissertation provides a user-centred perspective rooted in Human-Computer Interaction to explore conceptual and methodological insights, user perspectives, and design implications for digital interventions with the overarching aim of supporting Individual Information Sovereignty. To do this, this dissertation employs a range of qualitative and quantitative research methods, including representative surveys, interviews, focus groups, think-aloud studies, and online experiments.
Findings on conceptual and methodological insights demonstrate how precise operationalisation and measurement of concepts such as privacy and corresponding behaviour are essential prerequisites for accurately determining user needs. Findings on user perspectives highlight diverse, context-dependent, and evolving perspectives and patterns in digital technology use as well as support needs. Users express a fundamental tension between the advantages of digital information availability and the risk of information overload, leading to challenges in maintaining control over digital information flows. In the context of emergencies, for example, the use of social media is especially hindered by perceived privacy implications and the risk of false rumours. In general, users desire greater transparency and comprehensibility when navigating privacy and misinformation, suggesting that interventions should prioritise empowering user autonomy through tailored, clear and well-structured information. Finally, findings on design implications for digital interventions to support navigating privacy and misinformation highlight the potential of transparent and personalised approaches. For instance, personalised cookie banners tailored to users' privacy knowledge reduce the acceptance of browser cookies. Additionally, personalised nudges and transparent, indicator-based interventions support the identification of misleading information in text, videos, and charts.
Overall, this dissertation demonstrates the heterogeneity of user perspectives and the potential of transparent and personalised interventions to support Individual Information Sovereignty. This approach aims to empower users to navigate digital information flows in a more informed and self-determined way.},
publisher = {Dissertation (Dr. rer. nat.), Department of Computer Science, Technische Universität Darmstadt},
author = {Biselli, Tom},
year = {2025},
doi = {10.26083/tuprints-00030183},
keywords = {Crisis, HCI, Projekt-NEBULA, Projekt-ATHENE, Dissertation},
} Philipp Kuehn (2025)This book explores innovative methods to enhance cybersecurity by leveraging official and unofficial information sources on the web. While traditional approaches like Cyber Threat Intelligence (CTI) and Security Information and Event Management (SIEM) rely on past breaches, this work emphasizes a proactive stance, utilizing Open Source Intelligence (OSINT) to predict and prepare for emerging threats. Drawing from crisis informatics and data mining, the research introduces automated approaches for collecting, enriching, and analyzing cybersecurity information across diverse web sources, providing security teams with tools to identify emerging threats while reducing manual workload. For security professionals and researchers, this work demonstrates how automation can enhance human expertise in cybersecurity, paving the way for more robust and proactive threat detection.
@book{kuehn_proactive_2025-1,
address = {Wiesbaden, Germany},
title = {Proactive {Cyber} {Threat} {Intelligence}: {Automating} the {Intelligence} {Cycle} based on {Open} {Sources}},
isbn = {978-3-658-49240-3},
url = {https://link.springer.com/book/10.1007/978-3-658-49241-0},
abstract = {This book explores innovative methods to enhance cybersecurity by leveraging official and unofficial information sources on the web. While traditional approaches like Cyber Threat Intelligence (CTI) and Security Information and Event Management (SIEM) rely on past breaches, this work emphasizes a proactive stance, utilizing Open Source Intelligence (OSINT) to predict and prepare for emerging threats. Drawing from crisis informatics and data mining, the research introduces automated approaches for collecting, enriching, and analyzing cybersecurity information across diverse web sources, providing security teams with tools to identify emerging threats while reducing manual workload. For security professionals and researchers, this work demonstrates how automation can enhance human expertise in cybersecurity, paving the way for more robust and proactive threat detection.},
publisher = {Springer Vieweg},
author = {Kuehn, Philipp},
year = {2025},
keywords = {DissPublisher, Security, UsableSec, Projekt-ATHENE-SecUrban, Projekt-CYWARN},
} Kapitel in Büchern
Stefka Schmid, Carlo Diehl, Christian Reuter (2025)China, the U.S., and the EU all frame AI as part of global competition, often described as an ‘AI arms race’. The metaphor casts AI as a zero-sum struggle for technological supremacy, with winners gaining economic, political, and strategic advantages over adversaries. We argue that the arms race framing is misleading because AI development can be positivesum and combines national innovation with transnational collaboration, serves economic and status as well as security goals, and involves both civilian and military applications. We propose instead the concept of a geopolitical innovation race: competition for technological leadership alongside collaboration, unfolding across networks of companies, states, and research institutions. Political actors may adopt the arms race framing to preserve leadership or highlight capability gaps, but this is more rhetoric than description. Such framing risks encouraging speed of action over safety and ethics. 2 Amidst rising geopolitical tensions and contestation of civil rights and democracy, AI policies should go beyond nationalistic visions of technological capabilities and reflect openness to cooperation as well as competition.
@incollection{schmid_CNTR_2025,
title = {Navigating {AI} in a {Geopolitical} {Innovation} {Race}},
url = {https://www.cntrarmscontrol.org/fileadmin/Medien/Monitor/CNTR_Monitor_2025_EN.pdf},
abstract = {China, the U.S., and the EU all frame AI as part of global competition, often described as an ‘AI arms race’. The metaphor casts AI as a zero-sum struggle for technological supremacy, with winners gaining economic, political, and strategic advantages over adversaries. We argue that the arms race framing is misleading because AI development can be positivesum and combines national innovation with transnational collaboration, serves economic and status as well as security goals, and involves both civilian and military applications. We propose instead the concept of a geopolitical innovation race: competition for technological leadership alongside collaboration, unfolding across networks of companies, states, and research institutions. Political actors may adopt the arms race framing to preserve leadership or highlight capability gaps, but this is more rhetoric than description. Such framing risks encouraging speed of action over safety and ethics. 2 Amidst rising geopolitical tensions and contestation of civil rights and democracy, AI policies should go beyond nationalistic visions of technological capabilities and reflect openness to cooperation as well as competition.},
booktitle = {{CNTR} {Monitor} 2025: {New} {Realities} of {AI} in {Global} {Security}},
publisher = {CNTR Cluster for Natural and Technical Science Arms Control Research},
author = {Schmid, Stefka and Diehl, Carlo and Reuter, Christian},
editor = {Göttsche, Malte and Reis, Kadri and Daase, Christopher},
month = nov,
year = {2025},
keywords = {Peace, Projekt-TraCe, Security, Projekt-CNTR},
pages = {22--25},
} Publikationen in Konferenzbänden / Peer-reviewed Conference Papers
Marc-André Kaufhold, Julian Bäumler, Marius Bajorski, Christian Reuter (2025)In light of the increasing vulnerability of citizens against cyberattacks, we conducted three representative surveys with German citizens in 2021 (N=1,093), 2023 (N=1,011), and 2024 (N=1,004) to examine their cyber threat awareness, use of protective security measures, and preferred information channels. While our findings attest large proportions of the German population a high level of cyber threat awareness, many citizens feel inadequately informed about coping with cyberattacks and show little confidence in German security authorities to protect citizens and infrastructures. While age correlated with citizens’ awareness and behavior, we only saw minor temporal differences between datasets. Finally, we provide design and policy implications for enhancing citizens’ awareness of cyber threats and implementing security measures.
@inproceedings{kaufhold_cyber_2025,
address = {Yokohama, Japan},
series = {{CHI} '25},
title = {Cyber {Threat} {Awareness}, {Protective} {Measures} and {Communication} {Preferences} in {Germany}: {Implications} from {Three} {Representative} {Surveys} (2021-2024)},
url = {https://www.peasec.de/paper/2025/2025_KaufholdBäumlerBajorskiReuter_ComparativeCybersecuritySurvey_CHI.pdf},
doi = {10.1145/3706598.3713795},
abstract = {In light of the increasing vulnerability of citizens against cyberattacks, we conducted three representative surveys with German citizens in 2021 (N=1,093), 2023 (N=1,011), and 2024 (N=1,004) to examine their cyber threat awareness, use of protective security measures, and preferred information channels. While our findings attest large proportions of the German population a high level of cyber threat awareness, many citizens feel inadequately informed about coping with cyberattacks and show little confidence in German security authorities to protect citizens and infrastructures. While age correlated with citizens’ awareness and behavior, we only saw minor temporal differences between datasets. Finally, we provide design and policy implications for enhancing citizens’ awareness of cyber threats and implementing security measures.},
booktitle = {Proceedings of the {Conference} on {Human} {Factors} in {Computing} {Systems} ({CHI})},
publisher = {Association for Computing Machinery},
author = {Kaufhold, Marc-André and Bäumler, Julian and Bajorski, Marius and Reuter, Christian},
year = {2025},
keywords = {HCI, A-Paper, Projekt-ATHENE-CyAware, Security, UsableSec, Projekt-CYLENCE, Selected, AuswahlUsableSec, Ranking-CORE-A*},
} Leon Janzen, Florentin Putz, Marc-André Kaufhold, Kolja Straub, Matthias Hollick (2025)Using smartphone apps during crises is well-established, proving critical for efficient crisis response. However, such apps become futile without an Internet connection, which is a common issue during crises. The ongoing 6G standardization explores the capability to provide local cellular connectivity for areas cut off from the Internet in crises. This paper introduces to the HCI community the concept of cellular island connectivity in isolated areas, promising a seamless transition from normal operation to island operation with local-only cellular connectivity. It presents findings from a survey (N = 857) among adult smartphone users from major German cities regarding their smartphone usage preferences in this model. Results show a shift in app demand, with users favoring general-purpose apps over dedicated crisis apps in specific scenarios. We prioritize smartphone services based on their criticality, distinguishing between apps essential for crisis response and those supporting routines. Our findings provide operators, developers, and authorities insights into making user-centric design decisions for implementing island-ready 6G communication.
@inproceedings{janzen_user_2025,
address = {Yokohama, Japan},
series = {{CHI} '25},
title = {The {User} {Perspective} on {Island}-{Ready} {6G} {Communication}: {A} {Survey} of {Future} {Smartphone} {Usage} in {Crisis}-{Struck} {Areas} with {Local} {Cellular} {Connectivity}},
url = {https://www.peasec.de/paper/2025/2025_JanzenPutzKaufholdStraubHollick_UserPerspective6GCommunication_CHI.pdf},
doi = {10.1145/3706598.3714324},
abstract = {Using smartphone apps during crises is well-established, proving critical for efficient crisis response. However, such apps become futile without an Internet connection, which is a common issue during crises. The ongoing 6G standardization explores the capability to provide local cellular connectivity for areas cut off from the Internet in crises. This paper introduces to the HCI community the concept of cellular island connectivity in isolated areas, promising a seamless transition from normal operation to island operation with local-only cellular connectivity. It presents findings from a survey (N = 857) among adult smartphone users from major German cities regarding their smartphone usage preferences in this model. Results show a shift in app demand, with users favoring general-purpose apps over dedicated crisis apps in specific scenarios. We prioritize smartphone services based on their criticality, distinguishing between apps essential for crisis response and those supporting routines. Our findings provide operators, developers, and authorities insights into making user-centric design decisions for implementing island-ready 6G communication.},
booktitle = {Proceedings of the {Conference} on {Human} {Factors} in {Computing} {Systems} ({CHI}) ({Honorable} {Mentions})},
publisher = {Association for Computing Machinery},
author = {Janzen, Leon and Putz, Florentin and Kaufhold, Marc-André and Straub, Kolja and Hollick, Matthias},
year = {2025},
keywords = {HCI, Projekt-emergenCITY, A-Paper, Security, UsableSec, Projekt-CYLENCE, AuswahlCrisis, Ranking-CORE-A*, emergenCITY\_INF, emergenCITY\_SG},
} Julian Bäumler, Helen Bader, Marc-André Kaufhold, Christian Reuter (2025)Youth are particularly likely to encounter hateful internet content, which can severely impact their well-being. While most social media provide reporting mechanisms, in several countries, severe hateful content can alternatively be reported to law enforcement or dedicated reporting centers. However, in Germany, many youth never resort to reporting. While research in human-computer interaction has investigated adults’ views on platform-based reporting, youth perspectives and platform-independent alternatives have received little attention. By involving a diverse group of 47 German adolescents and young adults in eight focus group interviews, we investigate how youth-sensitive reporting systems for hateful content can be designed. We explore German youth’s reporting barriers, finding that on platforms, they feel particularly discouraged by deficient rule enforcement and feedback, while platform-independent alternatives are rather unknown and perceived as time-consuming and disruptive. We further elicit their requirements for platform-independent reporting tools and contribute with heuristics for designing youth-sensitive and inclusive reporting systems.
@inproceedings{baumlerYouthSensitiveHatefulContent2025,
address = {Yokohama, Japan},
series = {{CHI} '25},
title = {Towards {Youth}-{Sensitive} {Hateful} {Content} {Reporting}: {An} {Inclusive} {Focus} {Group} {Study} in {Germany}},
url = {https://www.peasec.de/paper/2025/2025_BäumlerBaderKaufholdReuter_HatefulContentReporting_CHI.pdf},
doi = {10.1145/3706598.3713542},
abstract = {Youth are particularly likely to encounter hateful internet content, which can severely impact their well-being. While most social media provide reporting mechanisms, in several countries, severe hateful content can alternatively be reported to law enforcement or dedicated reporting centers. However, in Germany, many youth never resort to reporting. While research in human-computer interaction has investigated adults’ views on platform-based reporting, youth perspectives and platform-independent alternatives have received little attention. By involving a diverse group of 47 German adolescents and young adults in eight focus group interviews, we investigate how youth-sensitive reporting systems for hateful content can be designed. We explore German youth’s reporting barriers, finding that on platforms, they feel particularly discouraged by deficient rule enforcement and feedback, while platform-independent alternatives are rather unknown and perceived as time-consuming and disruptive. We further elicit their requirements for platform-independent reporting tools and contribute with heuristics for designing youth-sensitive and inclusive reporting systems.},
booktitle = {Proceedings of the {Conference} on {Human} {Factors} in {Computing} {Systems} ({CHI}) ({Honorable} {Mentions})},
publisher = {Association for Computing Machinery},
author = {Bäumler, Julian and Bader, Helen and Kaufhold, Marc-André and Reuter, Christian},
year = {2025},
keywords = {Crisis, HCI, A-Paper, Projekt-ATHENE-CyAware, Student, Projekt-CYLENCE, AuswahlCrisis, Selected, Ranking-CORE-A*},
} Marc-André Kaufhold, Tilo Mentler, Simon Nestler, Katrin Hartwig, Christian Reuter (2025)Im Zentrum dieses Workshops steht die Interaktion von Mensch und Technik in sicherheitskritischen Kontexten. Hierzu zählen Bereiche, die bereits seit Jahrzehnten Gegenstand der Forschung sind (z.B. Prozessführung in Leitwarten), aber auch aktuelle Herausforderungen (z.B. Social Media im Katastrophenschutz). In diesen und vielen weiteren Bereichen gilt, dass sichere Systemzustände nur durch die ganzheitliche Betrachtung von Mensch, Technik und Organisation gewährleistet bzw. schnellstmöglich wieder erreicht werden können. In diesem Zusammenhang ist der Workshop auch der Nutzbarkeit und Akzeptanz von Sicherheitskonzepten sowie einer bewussteren Auseinandersetzung der Nutzenden mit diesem Thema gewidmet.
@inproceedings{kaufhold_12_2025,
address = {Chemnitz, Germany},
title = {12. {Workshop} {Mensch}-{Maschine}-{Interaktion} in sicherheitskritischen {Systemen}},
url = {https://dl.gi.de/items/1deb68fe-4141-4475-8e2b-51188ef57566},
doi = {10.18420/muc2025-mci-ws-102},
abstract = {Im Zentrum dieses Workshops steht die Interaktion von Mensch und Technik in sicherheitskritischen Kontexten. Hierzu zählen Bereiche, die bereits seit Jahrzehnten Gegenstand der Forschung sind (z.B. Prozessführung in Leitwarten), aber auch aktuelle Herausforderungen (z.B. Social Media im Katastrophenschutz). In diesen und vielen weiteren Bereichen gilt, dass sichere Systemzustände nur durch die ganzheitliche Betrachtung von Mensch, Technik und Organisation gewährleistet bzw. schnellstmöglich wieder erreicht werden können. In diesem Zusammenhang ist der Workshop auch der Nutzbarkeit und Akzeptanz von Sicherheitskonzepten sowie einer bewussteren Auseinandersetzung der Nutzenden mit diesem Thema gewidmet.},
language = {de},
booktitle = {Mensch und {Computer} 2025 - {Workshopband}},
publisher = {Gesellschaft für Informatik e.V.},
author = {Kaufhold, Marc-André and Mentler, Tilo and Nestler, Simon and Hartwig, Katrin and Reuter, Christian},
year = {2025},
keywords = {HCI, Security, UsableSec, Projekt-ATHENE, Projekt-CYLENCE},
} Marc-André Kaufhold, Julian Bäumler, Nicolai Koukal, Christian Reuter (2025)Computer Emergency Response Teams provide advisory, preventive, and reactive cybersecurity services for authorities, citizens, and businesses. However, their responsibility of establishing cyber situational awareness by monitoring and analyzing security advisories and vulnerabilities has become challenging due to the growing volume of information disseminated through public channels. Thus, this paper presents the preliminary design of a system for automatically retrieving and extracting security advisory documents from Common Security Advisory Framework (CSAF), HTML, and RSS sources. The evaluation with various security advisory sources (N=53) shows that the developed system can retrieve 90\% of the published advisory documents, which is a significant improvement over systems only relying on the retrieval from RSS feeds (30\%).
@inproceedings{kaufhold_advisoryhub_2025,
address = {Cham},
title = {{AdvisoryHub}: {Design} and {Evaluation} of a {Cross}-{Platform} {Security} {Advisory} {System} for {Cyber} {Situational} {Awareness}},
isbn = {978-3-032-00627-1},
url = {https://www.peasec.de/paper/2025/2025_KaufholdBäumlerKoukalReuter_SecurityAdvisoryExtractionSystem_ARES.pdf},
doi = {10.1007/978-3-032-00627-1_3},
abstract = {Computer Emergency Response Teams provide advisory, preventive, and reactive cybersecurity services for authorities, citizens, and businesses. However, their responsibility of establishing cyber situational awareness by monitoring and analyzing security advisories and vulnerabilities has become challenging due to the growing volume of information disseminated through public channels. Thus, this paper presents the preliminary design of a system for automatically retrieving and extracting security advisory documents from Common Security Advisory Framework (CSAF), HTML, and RSS sources. The evaluation with various security advisory sources (N=53) shows that the developed system can retrieve 90\% of the published advisory documents, which is a significant improvement over systems only relying on the retrieval from RSS feeds (30\%).},
language = {en},
booktitle = {Proceedings of the 20th {International} {Conference} on {Availability}, {Reliability} and {Security} ({ARES} 2025)},
publisher = {Springer Nature Switzerland},
author = {Kaufhold, Marc-André and Bäumler, Julian and Koukal, Nicolai and Reuter, Christian},
editor = {Dalla Preda, Mila and Schrittwieser, Sebastian and Naessens, Vincent and De Sutter, Bjorn},
year = {2025},
keywords = {HCI, Projekt-ATHENE-CyAware, UsableSec, Projekt-CYLENCE, Ranking-CORE-B},
pages = {47--68},
} Tom Biselli, Katrin Hartwig, Niklas Kneissl, Louis Pouliot, Christian Reuter (2025)Misinformation through data visualisation is particularly dangerous because charts are often perceived as objective data representations. While past efforts to counter misinformation have focused on text and, to some extent, images and video, developing user-centred strategies to combat misleading charts remains an unresolved challenge. This study presents a conceptual approach through ChartChecker, a browser-plugin that aims to automatically extract line and bar chart data and detect potentially misleading features such as non-linear axis scales. A participatory design approach was used to develop a user-centred interface to provide transparent, comprehensible information about potentially misleading features in charts. Finally, a think-aloud study (N = 15) with ChartChecker revealed overall satisfaction with the tools’ user interface, comprehensibility, functionality, and usefulness. The results are discussed in terms of improving user engagement, increasing transparency and optimising tools designed to counter misleading information in charts, leading to overarching design implications for user-centred strategies for the visual domain.
@inproceedings{biselli_chartchecker_2025,
series = {{DIS} '25},
title = {{ChartChecker}: {A} {User}-{Centred} {Approach} to {Support} the {Understanding} of {Misleading} {Charts}},
url = {https://www.peasec.de/paper/2025/2025_BiselliHartwigKneisslPouiliotReuter_ChartChecker_DIS.pdf},
doi = {10.1145/3715336.3735784},
abstract = {Misinformation through data visualisation is particularly dangerous because charts are often perceived as objective data representations. While past efforts to counter misinformation have focused on text and, to some extent, images and video, developing user-centred strategies to combat misleading charts remains an unresolved challenge.
This study presents a conceptual approach through ChartChecker, a browser-plugin that aims to automatically extract line and bar chart data and detect potentially misleading features such as non-linear axis scales. A participatory design approach was used to develop a user-centred interface to provide transparent, comprehensible information about potentially misleading features in charts. Finally, a think-aloud study (N = 15) with ChartChecker revealed overall satisfaction with the tools' user interface, comprehensibility, functionality, and usefulness. The results are discussed in terms of improving user engagement, increasing transparency and optimising tools designed to counter misleading information in charts, leading to overarching design implications for user-centred strategies for the visual domain.},
booktitle = {Proceedings of the {ACM} {Designing} {Interactive} {Systems} {Conference} ({DIS})},
publisher = {Association for Computing Machinery},
author = {Biselli, Tom and Hartwig, Katrin and Kneissl, Niklas and Pouliot, Louis and Reuter, Christian},
year = {2025},
keywords = {Crisis, HCI, Projekt-NEBULA, A-Paper, Ranking-CORE-A, Student, Projekt-ATHENE-PriVis},
} Julius von Willich, Frank Nelles, Wen-Jie Tseng, Jan Gugenheimer, Sebastian Günther, Max Mühlhäuser (2025)Research in Augmented Reality (AR) and Virtual Reality (VR) has mostly viewed them in isolation. Yet, when used together in practical settings, AR and VR each offer unique strengths, necessitating multiple transitions to harness their advantages. This paper investigates potential challenges in Cross-Reality (CR) transitions to inform future application design. We implemented a CR system featuring a 3D modeling task that requires users to switch between PC, AR, and VR. Using a talk-aloud study (n=12) and thematic analysis, we revealed that frictions primarily arose when transitions conflicted with users’ Spatial Mental Model (SMM). Furthermore, we found five transition archetypes employed to enhance productivity once an SMM was established. Our findings uncover that transitions have to focus on establishing and upholding the SMM of users across realities, by communicating differences between them.
@inproceedings{10.1145/3706598.3713921,
address = {New York, NY, USA},
series = {Chi '25},
title = {A {Qualitative} {Investigation} of {User} {Transitions} and {Frictions} in {Cross}-{Reality} {Applications}},
isbn = {979-8-4007-1394-1},
url = {https://www.peasec.de/paper/2025/2025_VonWillichNellesTsengGugenheimerGüntherMühlhäuser_FrictionsCrossReality_CHI.pdf},
doi = {10.1145/3706598.3713921},
abstract = {Research in Augmented Reality (AR) and Virtual Reality (VR) has mostly viewed them in isolation. Yet, when used together in practical settings, AR and VR each offer unique strengths, necessitating multiple transitions to harness their advantages. This paper investigates potential challenges in Cross-Reality (CR) transitions to inform future application design. We implemented a CR system featuring a 3D modeling task that requires users to switch between PC, AR, and VR. Using a talk-aloud study (n=12) and thematic analysis, we revealed that frictions primarily arose when transitions conflicted with users’ Spatial Mental Model (SMM). Furthermore, we found five transition archetypes employed to enhance productivity once an SMM was established. Our findings uncover that transitions have to focus on establishing and upholding the SMM of users across realities, by communicating differences between them.},
booktitle = {Proceedings of the {Conference} on {Human} {Factors} in {Computing} {Systems} ({CHI})},
publisher = {Association for Computing Machinery},
author = {von Willich, Julius and Nelles, Frank and Tseng, Wen-Jie and Gugenheimer, Jan and Günther, Sebastian and Mühlhäuser, Max},
year = {2025},
note = {Number of pages: 18
tex.articleno: 808},
keywords = {HCI, Projekt-emergenCITY, A-Paper, Projekt-ATHENE, Ranking-CORE-A*, emergenCITY\_INF, emergenCITY\_SG},
} Steffen Haesler, Marc-André Kaufhold, Nadja Thiessen, Michaela Lestakova, Michele Knodt, Christian Reuter (2025)Digital self-organization and collaboration in crisis are hindered not only by the absence of preparedness of citizens but also because of infrastructure disruptions. While citizens want to operate digitally, as they do outside a crisis event, they are often forced to fall back to analog actions. We conducted a survey with affected citizens (N=404) after the 2021 European floods, in which widespread infrastructure blackouts happened. With this survey, we conduct a contextual analysis of digital needs and actions. We investigate how far these were subject to infrastructure outages, how citizens were prepared, and to what degree they participated in informal neighborhood networks. Results show a massive disruption in all infrastructures, which led many citizens to fall back to analog actions. To cope with this, we suggest enhancing digital resilience by rethinking connectivity and understanding preparedness in a digital manner with the proposal of five requirements for digital self-organization in crisis to consider: (1) Digital collaboration should be preferred over analog workarounds; (2) support resilient communication technologies, including (3) being offline in the design; (4) crisis apps should be convenient and use internet-based communication when available; and (5) think of preparedness of citizens by integrating digital tools and actions.
@inproceedings{haesler_how_2025,
title = {How to stay {Connected}: {Citizens}' {Needs} on {Digital} {Self}-{Organization} in {Neighborhoods} during a {Crisis}},
url = {https://dl.gi.de/items/f58b6f20-ded9-46c4-a709-9c37840d435f},
doi = {10.18420/muc2025-mci-ws01-131},
abstract = {Digital self-organization and collaboration in crisis are hindered not only by the absence of preparedness of citizens but also because of infrastructure disruptions. While citizens want to operate digitally, as they do outside a crisis event, they are often forced to fall back to analog actions. We conducted a survey with affected citizens (N=404) after the 2021 European floods, in which widespread infrastructure blackouts happened. With this survey, we conduct a contextual analysis of digital needs and actions. We investigate how far these were subject to infrastructure outages, how citizens were prepared, and to what degree they participated in informal neighborhood networks. Results show a massive disruption in all infrastructures, which led many citizens to fall back to analog actions. To cope with this, we suggest enhancing digital resilience by rethinking connectivity and understanding preparedness in a digital manner with the proposal of five requirements for digital self-organization in crisis to consider: (1) Digital collaboration should be preferred over analog workarounds; (2) support resilient communication technologies, including (3) being offline in the design; (4) crisis apps should be convenient and use internet-based communication when available; and (5) think of preparedness of citizens by integrating digital tools and actions.},
language = {en},
booktitle = {Mensch und {Computer} 2025 - {Workshopband}},
publisher = {Gesellschaft für Informatik e.V.},
author = {Haesler, Steffen and Kaufhold, Marc-André and Thiessen, Nadja and Lestakova, Michaela and Knodt, Michele and Reuter, Christian},
year = {2025},
keywords = {HCI, Projekt-emergenCITY, UsableSec, Projekt-ATHENE-SecUrban},
} Philipp Kuehn, Markus Bayer, Tobias Frey, Moritz Kerk, Christian Reuter (2025)Computer Security Incident Response Teams (CSIRTs) face increasing challenges processing the growing volume of security-related information. Daily manual analysis of threat reports, security advisories, and vulnerability announcements leads to information overload, contributing to burnout and attrition among security professionals. Clustering such information to cope with the initial information volume and enables security professionals to grasp the current overview of the situation more easily and decide on actions. This work evaluates 196 combinations of clustering algorithms and embedding models across five security-related datasets to identify optimal approaches for automated information consolidation. We demonstrate that clustering can reduce information overload by over 90 \% while maintaining semantic coherence. Our evaluation indicates a minimal need of configuration to successfully cluster information within a reasonable timespan on consumer hardware. The findings suggest that clustering approaches can significantly enhance CSIRT operational efficiency while maintaining analytical integrity. However, complex threat reports require careful parameter tuning to achieve acceptable performance, indicating areas for future optimization (The code is made publicly available at the following URL: https://github.com/PEASEC/reducing-information-overload)
@inproceedings{kuehn_reducing_2025,
address = {Cham},
title = {Reducing {Information} {Overload}: {Because} {Even} {Security} {Experts} {Need} to {Blink}},
isbn = {978-3-032-00633-2},
shorttitle = {Reducing {Information} {Overload}},
url = {https://link.springer.com/chapter/10.1007/978-3-032-00633-2_9},
doi = {10.1007/978-3-032-00633-2_9},
abstract = {Computer Security Incident Response Teams (CSIRTs) face increasing challenges processing the growing volume of security-related information. Daily manual analysis of threat reports, security advisories, and vulnerability announcements leads to information overload, contributing to burnout and attrition among security professionals. Clustering such information to cope with the initial information volume and enables security professionals to grasp the current overview of the situation more easily and decide on actions. This work evaluates 196 combinations of clustering algorithms and embedding models across five security-related datasets to identify optimal approaches for automated information consolidation. We demonstrate that clustering can reduce information overload by over 90 \% while maintaining semantic coherence. Our evaluation indicates a minimal need of configuration to successfully cluster information within a reasonable timespan on consumer hardware. The findings suggest that clustering approaches can significantly enhance CSIRT operational efficiency while maintaining analytical integrity. However, complex threat reports require careful parameter tuning to achieve acceptable performance, indicating areas for future optimization (The code is made publicly available at the following URL: https://github.com/PEASEC/reducing-information-overload)},
language = {en},
booktitle = {Availability, {Reliability} and {Security}},
publisher = {Springer Nature Switzerland},
author = {Kuehn, Philipp and Bayer, Markus and Frey, Tobias and Kerk, Moritz and Reuter, Christian},
editor = {Coppens, Bart and Volckaert, Bruno and Naessens, Vincent and De Sutter, Bjorn},
year = {2025},
keywords = {Projekt-ATHENE-CyAware, Student, Security, UsableSec, Projekt-CYWARN, Ranking-CORE-B},
pages = {139--155},
} Anja-Liisa Gonsior (2025)In view of the increasing number of emerging disruptive technologies {\textbackslash}ac\{edts\} in military and warfare contexts, their regulation is becoming ever more urgent. {\textbackslash}ac\{edts\} encompass a very wide range of weapons technologies. In this article, I focus on technologies and applications in the fields of autonomy, artificial intelligence and cyber technologies. Dealing with the regulation of these technologies is particularly relevant as they are increasingly used in military contexts, yet at the same time there is no uniform international regulation approach to these {\textbackslash}ac\{edts\}. Moreover, this is a field in which different disciplines come into play. While social science research in this field focuses, for example, on the development of norms and political processes, aspects of human-machine interaction play an equally central role in this context, for example with regard to autonomous weapon systems. It becomes apparent that normative processes with regard to {\textbackslash}ac\{edts\} in the military sector take on a different dynamic and that soft law approaches are becoming increasingly important in view of unsuccessful regulatory and arms control efforts. In this paper, this focus of current research is considered in relation to the respective disciplines.
@inproceedings{gonsior_is_2025,
title = {Is {Soft} {Law} the {New} {Law}? {Exploring} {Discourses} on {Governance} and {Regulation} of {Emerging} {Disruptive} {Technologies} in the {Military} {Domain}},
url = {https://dl.gi.de/items/342b1381-6cfd-456f-96bf-4e9b6caf49a4},
doi = {10.18420/muc2025-mci-ws01-172},
abstract = {In view of the increasing number of emerging disruptive technologies {\textbackslash}ac\{edts\} in military and warfare contexts, their regulation is becoming ever more urgent. {\textbackslash}ac\{edts\} encompass a very wide range of weapons technologies. In this article, I focus on technologies and applications in the fields of autonomy, artificial intelligence and cyber technologies. Dealing with the regulation of these technologies is particularly relevant as they are increasingly used in military contexts, yet at the same time there is no uniform international regulation approach to these {\textbackslash}ac\{edts\}. Moreover, this is a field in which different disciplines come into play. While social science research in this field focuses, for example, on the development of norms and political processes, aspects of human-machine interaction play an equally central role in this context, for example with regard to autonomous weapon systems. It becomes apparent that normative processes with regard to {\textbackslash}ac\{edts\} in the military sector take on a different dynamic and that soft law approaches are becoming increasingly important in view of unsuccessful regulatory and arms control efforts. In this paper, this focus of current research is considered in relation to the respective disciplines.},
language = {en},
booktitle = {Mensch und {Computer} 2025 - {Workshopband}},
publisher = {Gesellschaft für Informatik e.V.},
author = {Gonsior, Anja-Liisa},
year = {2025},
keywords = {Peace, Projekt-TraCe, Security},
} Jonas Franken, Kasimir Romer, Timon Dörnfeld, Paula Meissner, Christian Reuter (2025)This paper investigates the potential of Large Language Models (LLMs) in automating the extraction and analysis of Subsea Data Cables (SDCs)-related information from unstructured media sources. A comprehensive LLM-based information extraction module was developed and integrated into an existing SDC database. By systematically comparing different LLMs, including GPT-4o, Gemini 1.5 Flash, Claude 3.5 Sonnet, and Llama 3.1, this work identifies optimal model configurations for SDC news processing, considering accuracy, hallucination rate, and processing speed. The system implements Claude 3.5 Sonnet and GPT4-o as primary models, incorporating domain-specific prompt engineering and robust output validation mechanisms. Performance evaluation demonstrates substantial improvements over rule-based methods. While excelling at natural language understanding tasks, the system revealed limitations in extracting more specific technical details such as construction costs and capacity measurements. The implementation provides a modular, adaptable framework for automated information extraction in specialised technical domains. The results demonstrate that LLMs, when properly implemented with structured prompts and validation mechanisms, can significantly enhance the automated monitoring and analysis of SDC-related events.
@inproceedings{franken_between_2025,
address = {Rostock, Germany},
title = {Between the {Lines}: {Leveraging} {LLMs} for {Information} {Extraction} of {Subsea} {Data} {Cable} {News}},
doi = {https://doi.org/10.5281/zenodo.17119935},
abstract = {This paper investigates the potential of Large Language Models (LLMs) in automating the extraction and analysis of Subsea Data Cables (SDCs)-related information from unstructured media sources. A comprehensive LLM-based information extraction module was developed and integrated into an existing SDC database. By systematically comparing different LLMs, including GPT-4o, Gemini 1.5 Flash, Claude 3.5 Sonnet, and Llama 3.1, this work identifies optimal model configurations for SDC news processing, considering accuracy, hallucination rate, and processing speed. The system implements Claude 3.5 Sonnet and GPT4-o as primary models, incorporating domain-specific prompt engineering and robust output validation mechanisms. Performance evaluation demonstrates substantial improvements over rule-based methods. While excelling at natural language understanding tasks, the system revealed limitations in extracting more specific technical details such as construction costs and capacity measurements. The implementation provides a modular, adaptable framework for automated information extraction in specialised technical domains. The results demonstrate that LLMs, when properly implemented with structured prompts and validation mechanisms, can significantly enhance the automated monitoring and analysis of SDC-related events.},
booktitle = {Proceedings of the {MARESEC} 2025},
author = {Franken, Jonas and Romer, Kasimir and Dörnfeld, Timon and Meissner, Paula and Reuter, Christian},
year = {2025},
keywords = {Projekt-emergenCITY, Student, Security, emergenCITY\_INF, emergenCITY\_SG, Projekt-ATHENE-SecFOCI},
} Weitere Publikationen / Other Publications
Philipp Kuehn, Dilara Nadermahmoodi, Markus Bayer, Christian Reuter (2025)Public information contains valuable Cyber Threat Intelligence (CTI) that is used to prevent future attacks. While standards exist for sharing this information, much appears in non-standardized news articles or blogs. Monitoring online sources for threats is time-consuming and source selection is uncertain. Current research focuses on extracting Indicators of Compromise from known sources, rarely addressing new source identification. This paper proposes a CTI-focused crawler using multi-armed bandit (MAB) and various crawling strategies. It employs SBERT to identify relevant documents while dynamically adapting its crawling path. Our system ThreatCrawl achieves a harvest rate exceeding 25\% and expands its seed by over 300\% while maintaining topical focus. Additionally, the crawler identifies previously unknown but highly relevant overview pages, datasets, and domains.
@techreport{kuehn_bandit_2025,
address = {arXiv},
title = {Bandit on the {Hunt}: {Dynamic} {Crawling} for {Cyber} {Threat} {Intelligence}},
shorttitle = {Bandit on the {Hunt}},
url = {http://arxiv.org/abs/2504.18375},
abstract = {Public information contains valuable Cyber Threat Intelligence (CTI) that is used to prevent future attacks. While standards exist for sharing this information, much appears in non-standardized news articles or blogs. Monitoring online sources for threats is time-consuming and source selection is uncertain. Current research focuses on extracting Indicators of Compromise from known sources, rarely addressing new source identification. This paper proposes a CTI-focused crawler using multi-armed bandit (MAB) and various crawling strategies. It employs SBERT to identify relevant documents while dynamically adapting its crawling path. Our system ThreatCrawl achieves a harvest rate exceeding 25\% and expands its seed by over 300\% while maintaining topical focus. Additionally, the crawler identifies previously unknown but highly relevant overview pages, datasets, and domains.},
number = {arXiv:2504.18375},
urldate = {2025-05-20},
institution = {arXiv},
author = {Kuehn, Philipp and Nadermahmoodi, Dilara and Bayer, Markus and Reuter, Christian},
month = apr,
year = {2025},
note = {arXiv:2504.18375 [cs]},
keywords = {Student, Security, UsableSec, Projekt-ATHENE-SecUrban, Projekt-CYWARN},
} Laura Guntrum, Christian Reuter (2025)Seit den frühen 2010er Jahren, insbesondere während der Proteste in Ägypten und Tunesien, wurde die Rolle von Informations- und Kommunikationstechnologien (IKT) für aktivistische Tätigkeiten immer wichtiger. Dies zeigt sich beispielsweise an der Nutzung sozialer Medien durch Aktivist:innen in Myanmar, die nach dem Militärputsch 2021 internationale Aufmerksamkeit erlangen wollten. IKTs bieten zahlreiche Vorteile wie Kosteneinsparungen, Zugang zu alternativen Informationsquellen und die Demokratisierung politischer Beteiligung. Jedoch sind Aktivist:innen mit vielfältigen Herausforderungen und unterschiedlichen Formen von digitaler Gewalt konfrontiert, darunter Internetabschaltungen, Hassrede und Zensurmaßnahmen. Auch ist ein Anstieg digitaler Überwachung, Propaganda und der Manipulation von Informationen zu verzeichnen. Die zunehmende Verbreitung digitaler Gewalt stellt für Aktivist:innen und soziale Bewegungen ein signifikantes Problem dar, was dazu führt, dass sich immer mehr Aktivist:innen selbst zensieren und sich aus den Online-Räumen zurückziehen.
@techreport{Guntrum2025,
address = {GI Radar},
title = {Digitale {Gewalt} gegen {Aktivist}:innen: {Risiken} und mögliche {Handlungsmöglichkeiten}},
url = {https://gi-radar.de/373-digitale-gewalt/},
abstract = {Seit den frühen 2010er Jahren, insbesondere während der Proteste in Ägypten und Tunesien, wurde die Rolle von Informations- und Kommunikationstechnologien (IKT) für aktivistische Tätigkeiten immer wichtiger. Dies zeigt sich beispielsweise an der Nutzung sozialer Medien durch Aktivist:innen in Myanmar, die nach dem Militärputsch 2021 internationale Aufmerksamkeit erlangen wollten. IKTs bieten zahlreiche Vorteile wie Kosteneinsparungen, Zugang zu alternativen Informationsquellen und die Demokratisierung politischer Beteiligung. Jedoch sind Aktivist:innen mit vielfältigen Herausforderungen und unterschiedlichen Formen von digitaler Gewalt konfrontiert, darunter Internetabschaltungen, Hassrede und Zensurmaßnahmen. Auch ist ein Anstieg digitaler Überwachung, Propaganda und der Manipulation von Informationen zu verzeichnen. Die zunehmende Verbreitung digitaler Gewalt stellt für Aktivist:innen und soziale Bewegungen ein signifikantes Problem dar, was dazu führt, dass sich immer mehr Aktivist:innen selbst zensieren und sich aus den Online-Räumen zurückziehen.},
institution = {Gesellschaft für Informatik},
author = {Guntrum, Laura and Reuter, Christian},
month = feb,
year = {2025},
keywords = {Peace, Projekt-TraCe},
} Jonas Franken (2025)More than 600 subsea data cables connect nearly every coastal country of the world, amounting to a cumulative length of more than 1.5 million km. These fibre optic cables are responsible for over 99\% of intercontinental data traffic. They are the digital lifelines of our modern world. Yet, external factors frequently expose vulnerabilities in the network and its supporting infrastructure. While around 150 cable faults occur globally each year, a growing number of cable faults are suspected to be linked to hybrid or malicious activity. In this context, and following recent cable disruptions in the Baltic Sea, the European Union has put forth an EU Action Plan on Cable Security. Recognising that many states around the world face similar risks, this Action Plan proposes to establish “an advanced cable diplomacy” . But cable diplomacy is not a one-size-fits-all strategy. Technological sensitivities, dual-use military aspects and geopolitical considerations demand a tailored approach.This policy brief therefore addresses a key question: Where and how should the EU build effective cable diplomacy partnerships? To address this, the EU’s cable diplomacy should be structured around three geographic pillars, reflecting regional contexts and strategic opportunities. Alongside these regional priorities, the EU must also reinforce its role in shaping global governance for undersea infrastructure, working through multilateral institutions and international standard-setting bodies. By doing so, the European Union can strengthen global resilience of subsea infrastructure and position itself as a security enhancer in the field of critical infrastructure.
@techreport{franken_cable_2025,
address = {Böll EU Brief},
title = {Cable diplomacy: {Securing} influence, data and global rules},
url = {https://www.peasec.de/paper/2025/2025_Franken_CableDiplomacy_BoellEU.pdf},
abstract = {More than 600 subsea data cables connect nearly every coastal country of the world, amounting to a cumulative length of more than 1.5 million km. These fibre optic cables are responsible for over 99\% of intercontinental data traffic. They are the digital lifelines of our modern world. Yet, external factors frequently expose vulnerabilities in the network and its supporting infrastructure. While around 150 cable faults occur globally each year, a growing number of cable faults are suspected to be linked to hybrid or malicious activity. In this context, and following recent cable disruptions in the Baltic Sea, the European Union has put forth an EU Action Plan on Cable Security. Recognising that many states around the world face similar risks, this Action Plan proposes to establish “an advanced cable diplomacy” . But cable diplomacy is not a one-size-fits-all strategy. Technological sensitivities, dual-use military aspects and geopolitical considerations demand a tailored approach.This policy brief therefore addresses a key question: Where and how should the EU build effective cable diplomacy partnerships? To address this, the EU’s cable diplomacy should be structured around three geographic pillars, reflecting regional contexts and strategic opportunities. Alongside these regional priorities, the EU must also reinforce its role in shaping global governance for undersea infrastructure, working through multilateral institutions and international standard-setting bodies. By doing so, the European Union can strengthen global resilience of subsea infrastructure and position itself as a security enhancer in the field of critical infrastructure.},
institution = {Böll EU Brief},
author = {Franken, Jonas},
year = {2025},
keywords = {Peace, Projekt-NetzGeschichte, Projekt-ATHENE-SecFOCI},
} Camino Kavanagh, Jonas Franken, Wenting He (2025)Today, submarine fibre-optic telecommunications cable systems are the backbone of our data and communications infrastructure, essential to the general functioning and integrity of the internet and the broader information and communications technology (ICT) ecosystem. While satellites and the new constellations in low Earth orbit are breaking ground, especially in terms of lowering costs and accessibility, they are still no match to the high capacity and low latency that today’s subsea cable systems provide. As more countries are connected, the security and resilience of the infrastructure becomes ever more critical. In 2023, UNIDIR published its first report on subsea cables, entitled Wading Murky Waters: Subsea Communications Cables and Responsible State Behaviour. The initial scoping study sought to raise awareness of this essential transmission technology. Since then, a slew of new initiatives have been proposed, including at the international level, signalling both the strategic importance of the infrastructure and the need to strengthen security and resilience across all of its components.This follow-on study sets out to understand what it means in policy and practice when governments qualify or designate subsea telecommunications cables as critical infrastructure (CI). The report draws from the CI literature to frame government approaches to security and resilience, identifying how government policy and practice interact with core CI concepts such as absorptive, restorative and adaptive resilience capacities. While subsea cable systems are generally designed and deployed with these capacities in mind, effective government action on security and resilience can contribute to strengthening them.
@techreport{kavanagh_achieving_2025,
address = {Geneva, Switzerland},
title = {Achieving {Depth}: {Subsea} {Telecommunications} {Cables} as {Critical} {Infrastructure}},
url = {https://unidir.org/publication/achieving-depth-subsea-telecommunications-cables-as-critical-infrastructure/},
abstract = {Today, submarine fibre-optic telecommunications cable systems are the backbone of our data and communications infrastructure, essential to the general functioning and integrity of the internet and the broader information and communications technology (ICT) ecosystem. While satellites and the new constellations in low Earth orbit are breaking ground, especially in terms of lowering costs and accessibility, they are still no match to the high capacity and low latency that today’s subsea cable systems provide. As more countries are connected, the security and resilience of the infrastructure becomes ever more critical. In 2023, UNIDIR published its first report on subsea cables, entitled Wading Murky Waters: Subsea Communications Cables and Responsible State Behaviour. The initial scoping study sought to raise awareness of this essential transmission technology. Since then, a slew of new initiatives have been proposed, including at the international level, signalling both the strategic importance of the infrastructure and the need to strengthen security and resilience across all of its components.This follow-on study sets out to understand what it means in policy and practice when governments qualify or designate subsea telecommunications cables as critical infrastructure (CI). The report draws from the CI literature to frame government approaches to security and resilience, identifying how government policy and practice interact with core CI concepts such as absorptive, restorative and adaptive resilience capacities. While subsea cable systems are generally designed and deployed with these capacities in mind, effective government action on security and resilience can contribute to strengthening them.},
institution = {United Nations Institute for Disarmament Research},
author = {Kavanagh, Camino and Franken, Jonas and He, Wenting},
year = {2025},
keywords = {Peace, Security, Projekt-ATHENE-SecFOCI},
} Stefka Schmid, Julia Mahlberg (2025)The geopolitical innovation race is structured around four key dimensions: (1) pay-off structure, (2) actor networks, (3) motivation, and (4) social construction of technology that differentiate it from an `arms race’ and `innovation race’. The term `geopolitical innovation race’ tries to capture current dynamics of tech governance. Border control is neither the most prominent nor publicly discussed field of AI application, but we still find that related EU politics reflect notions of a `geopolitical innovation race’. From a technocratic, problem-solving perspective, border control represents just another `context of use’ of AI, neglecting that involved humans face impactful consequences of technology use. Characteristics of a geopolitical innovation race are notable in innovation projects for border control, illustrating a similar mode of politics across application contexts but with less ethical obligations to implement `trustworthy AI’ compared to commercial products.
@techreport{schmidAIBorderEU2025,
address = {Border Criminologies},
title = {{AI} for border control – a `geopolitical innovation race' at the {EU}'s external borders},
url = {https://blogs.law.ox.ac.uk/border-criminologies-blog/blog-post/2025/07/ai-border-control-geopolitical-innovation-race-eus},
abstract = {The geopolitical innovation race is structured around four key dimensions: (1) pay-off structure, (2) actor networks, (3) motivation, and (4) social construction of technology that differentiate it from an `arms race' and `innovation race'. The term `geopolitical innovation race' tries to capture current dynamics of tech governance. Border control is neither the most prominent nor publicly discussed field of AI application, but we still find that related EU politics reflect notions of a `geopolitical innovation race'. From a technocratic, problem-solving perspective, border control represents just another `context of use' of AI, neglecting that involved humans face impactful consequences of technology use. Characteristics of a geopolitical innovation race are notable in innovation projects for border control, illustrating a similar mode of politics across application contexts but with less ethical obligations to implement `trustworthy AI' compared to commercial products.},
author = {Schmid, Stefka and Mahlberg, Julia},
year = {2025},
keywords = {Peace, Projekt-TraCe, Student, Projekt-CNTR},
} Stefka Schmid, Diehl Carlo, Christian Reuter (2025)Künstliche Intelligenz ist zu einem zentralen Feld des globalen Wettbewerbs geworden, das von China, den USA und der EU häufig als Teil eines „KI-Wettrüstens“ verstanden wird. Wir argumentieren jedoch, dass diese Metapher die Dynamiken der KI-Entwicklung verzerrt. Stattdessen schlagen wir den Begriff eines „geopolitischen Innovationswettlaufs“ um technologische Vorherrschaft in einer vernetzten globalen Wirtschaft vor. Auf Basis einer Analyse von Strategiepapieren zeigen wir, dass die Akteure (1) zwischen Nullsummen- und Positivsummenlogiken schwanken, (2) ihre Netzwerke entsprechend nationaler Innovationskulturen unterschiedlich organisieren, (3) neben Sicherheitsinteressen auch wirtschaftliche und statusbezogene Ziele verfolgen und (4) die Bedeutung von KI bewusst offenhalten. Übergreifend trägt die „Wettlauf“-Metapher dazu bei, die „Geopolitisierung“ von Innovation zu verfestigen und Sicherheit eng mit wirtschaftlichen Interessen zu verknüpfen. Vor diesem Hintergrund identifizieren wir folgende zentrale Punkte: 1. Die Metapher des „Wettrüstens“ sollte vermieden werden. Sie vereinfacht die KI-Entwicklung zu stark und birgt Eskalationsrisiken. Ein geopolitischer Innovationswettlauf basiert dagegen sowohl auf Wettbewerb als auch auf Zusammenarbeit. 2. Rhetorik zählt. Kommunikation, die auf einer nationalistischen Redeweise von „Wettrüsten“ aufbaut, fördert nur eine „Rückkehr zur Geopolitik“. Es ist zwar wichtig, Probleme transparent zu machen, sie sollten aber auf differenzierte Weise kommuniziert werden. 3. Kooperative Rahmenordnungen sollten gestärkt werden. Internationale Standards und Regulierung können Rivalitäten abmildern und, je nach ihrem Aufbau, Raum für verantwortungsvollere und diversere Innovation schaffen.
@techreport{schmid_gefahrliche_2025,
address = {FIfF-Kommunikation},
title = {Das gefährliche {Bild} des „{KI}-{Wettrüstens}“: {Wie} {Metaphern} die globale {KI}-{Politik} prägen},
abstract = {Künstliche Intelligenz ist zu einem zentralen Feld des globalen Wettbewerbs geworden, das von China, den USA und der EU häufig als Teil eines „KI-Wettrüstens“ verstanden wird. Wir argumentieren jedoch, dass diese Metapher die Dynamiken der KI-Entwicklung verzerrt. Stattdessen schlagen wir den Begriff eines „geopolitischen Innovationswettlaufs“ um technologische Vorherrschaft in einer vernetzten globalen Wirtschaft vor. Auf Basis einer Analyse von Strategiepapieren zeigen wir, dass die Akteure (1) zwischen Nullsummen- und Positivsummenlogiken schwanken, (2) ihre Netzwerke entsprechend nationaler Innovationskulturen unterschiedlich organisieren, (3) neben Sicherheitsinteressen auch wirtschaftliche und statusbezogene Ziele verfolgen und (4) die Bedeutung von KI bewusst offenhalten. Übergreifend trägt die „Wettlauf“-Metapher dazu bei, die „Geopolitisierung“ von Innovation zu verfestigen und Sicherheit eng mit wirtschaftlichen Interessen zu verknüpfen. Vor diesem Hintergrund identifizieren wir folgende zentrale Punkte:
1. Die Metapher des „Wettrüstens“ sollte vermieden werden. Sie vereinfacht die KI-Entwicklung zu stark und birgt Eskalationsrisiken. Ein geopolitischer Innovationswettlauf basiert dagegen sowohl auf Wettbewerb als auch auf Zusammenarbeit.
2. Rhetorik zählt. Kommunikation, die auf einer nationalistischen Redeweise von „Wettrüsten“ aufbaut, fördert nur eine „Rückkehr zur Geopolitik“. Es ist zwar wichtig, Probleme transparent zu machen, sie sollten aber auf differenzierte Weise kommuniziert werden.
3. Kooperative Rahmenordnungen sollten gestärkt werden. Internationale Standards und Regulierung können Rivalitäten abmildern und, je nach ihrem Aufbau, Raum für verantwortungsvollere und diversere Innovation schaffen.},
author = {Schmid, Stefka and Carlo, Diehl and Reuter, Christian},
year = {2025},
keywords = {Peace, Projekt-TraCe, Security, Projekt-CNTR},
} Tina Comes, Verónica Bolón-Canedo, Joachim Denzler, Nick Jennings, Thomas Kox, Markus Reichstein, Christian Reuter, Andrej Zwitter (2025)@techreport{comes_artificial_2025,
address = {Munich},
title = {Artificial intelligence in emergency and crisis management: {Rapid} evidence review report.},
url = {https://doi.org/10.5281/zenodo.17737962},
institution = {SAPEA},
author = {Comes, Tina and Bolón-Canedo, Verónica and Denzler, Joachim and Jennings, Nick and Kox, Thomas and Reichstein, Markus and Reuter, Christian and Zwitter, Andrej},
year = {2025},
}
#10 #11 #12@ShaulaEvans in hindsight i guess ive made quite a few. I think it was gradual but exponential change. Like as a little kid I spent time learning about the problem and making little inventions to try and help. But that kind of thought and effort would only happen like once a year, at most. As an adult it became this ever growing and quickening process of "what if I did X from now on" in a target rich environment. Net result has been these, in no particular order because i can't remember when i started each one:
1. Focused actively on replacing each direct fossil fuel using thing in the home. Lawn equipment, vehicles, heating and cooling, and cooking equipment were all swapped to electrification or renewables.
2. Then a big chunk of my personal time got invested into lobbying local power company to shift my electric sourcing off fossil. Lobbying is a lifestyle it takes a lot of time and planning to make it effectove, measure progress toward goal.
3. Replaced all my home cleaning supplies with low waste / renewable / reusable alternatives. Paper towels became biodegradable cloths, and paper towels that i still get (along with toilet paper), became sourced from companies that use waste paper or recycled paper to make their products. Tissues are still a battle, the household is picky about that and has rejected my product attempts.
4. Shifted how I grocery shop significantly. Joined a local farm share. Stopped putting veggies in plastic produce bags i just flop them right into my reusable bags since it's all getting washed/cooked anyway (including leafy greens). Shifted toward products that come in no packaging, paper packaging, or reusable/recyclable packaging like aluminum or glass. Industrial Compostable is a last pick, and dead last is plastic packaging. Even the plastic packaging i scrutinize between. I'll favor a simple shaped clear Number 1 over a mixed-type funky flashy set of packaging. Basically if you're packaging your product in a plastic, I am actively deflecting to your competition.
5. Shifted many personal hygiene to low waste / sustainable / reusable options. Shampoo and conditioner bars, soap bars, especially ones in no packaging or biodegradable packaging. Shaving soap bars and solid metal razors with replacable safety razors instead of plastic cartidge heads. Biodegradable dental floss. Last things im still looking for are biodegradable electric toothbrush heads and a repairable electric toothbrush. My two plastic indulgences have been toothpaste (tried the tablets but the texture makes me gag). I wanna find a non mint toothpaste thats not in a plastic tube. So my lesser of evils pick has been a kids fruit toothpaste that comes in a #1 plastic bottle. The other is my deoderant. Ive tried 3 or 4 low waste deoderants but they either irritate my skin or werent effective, or both. So still on a plastic bottle there too for now.
6. Food consumption has been a bit of a dance. For several years I was vegan. But i wasnt good at it, I found that i often still went for questionable processed choices. ("Oh cool, Oreos are vegan!"). I admire the faux-meat industry, but I had a hard time squaring that it was more environmentally sound to mono crop far away indigenous land and ship the product to me than it was to eat the eggs from the little local farm share where i could get them in a non-emitting vehicle and see how the chickens were being treated / meet the chickens regularly. So my diet became "distance and verification" based. I prioritize local food from farms i can visit or pitch in at so i can confirm how the workers are treated, how the food is produced and sourced, and how animals are or arent involved. I deprioritized meat as a focal point of a meal, so there are times where meals may have no meat at all because im no longer planning the meal based on "what sides will complement this big meat dish", instead it's "ok how am i getting protein and fiber this time around" and sometimes that involves meat and sometimes it does not. When I do have meat, I prefer meats that are lower effort to obtain or farm. And I will happily eat the heck out of invasives, plant or animal. I've become interested in both foraging and growing my own food but haven't yet accomplished big shifts there.
7. I have however been happy with changes i made to my yard. I invest time every year into that. I removed about 40 feet of impervious surface from the yard. I've chipped away at reclaiming the grass yard into garden beds of native plants. I've planted 11 kinds of native trees and shrubs (8 have survived so far) with more planned. I eliminated any chemical pest or weed prevention methods. And I have been curating native plants that I can harvest herbal tea ingredients from, which resulted in a shift away from packaged teas in favor of steeping loose leaf that i harvest myself in a reusable steeper.
8. I started getting into visible mending to extend my clothing life.
9. I actively avoid disposable cutlery/straws/cups as often as I can.
10. A weird little habit I have is any time I go to do something, a thought pops in my head of "do I want someone 2,000 years from now to know I did this? Is it worth it? Is it worth being seen 2000 years from now?" and this results in a lot less consumption from me in general. It doesn't always stop me from do8ng something wasteful or materialistic, but it adds up to a significant number of times that I buy less, waste less, or repurpose stuff.
11. I started getting into ewaste reduction. When the time came to get new devices, I started to focus on repairability. And i have started to teach myself how to self host so that i can upcycle my computer parts instead of throwing them away. Started learning Linux so I could extend the life of my older hardware.
I think that's everything. Most of it wasn't taken on until I was an adult, and 11, 8, and 5 were all in the same year and are the most recent
Mevs
UPDATE: Now all my puzzles are listed in this post. Most recent ones at the top of each sub-section.
The Independent. I thought I’d make a post so I could keep track of all my Mev puzzles in The Independent in one place. I’ll update this as they come along. […]
https://tlmb.net/blog/mevs/ #1 #10 #11 #12 #13 #14 #15 #2 #3 #4 #5 #6 #7 #8 #9 #crossword #crosswords #cryptic #crypticCrosswords #cryptics #mevIch habe gerade bei 1&1 nachgefragt, wie der Stand meiner Umstellung auf Glasfaser ist, die ich im April dieses Jahres beantragt habe. Vorgesehen ist der Dezember nächsten Jahres - das hat mich erst einmal umgehauen. Das hat bestimmt damit zu tun, dass viele Firmen da mit drin hängen und wohl auch die Politik da noch was zu sagen hat.
Verzögerungen kommen vor, aber was mich daran sehr stört, dass 1&1 das nicht kommuniziert.
#1&1 #1und1 #glasfaser #umstellungaufglasfaser #firmen #politik #kommunikation
EYELASH MAN #11
Eyelash Man #11: “Binary Star System”
Poetry by Harleen Kaur Dhillon, Visuals by Jessi Wood
I am a star
I wandered
Bewildered,
Untethered as the
Cloud that made me
Before me was
Nothing
I will be nothing
I wandered complete
as a cloud–
I needed nothing
And then I met you
And I am happy.
I, with no beginning or
End.
I, with neither family nor
Friend.
I, with no hope and fear.
I, who sees nothing, is
Nothing.
I–
Look at you
And feel again.
#11 #binaryStarSystem #Comic #companionship #Cosmic #cosmos #eye #eyelash #eyelashMan #Floating #fullPageComic #galaxy #Love #Pop #purple #Space #stars #Tuth
Spinal Tap - "These go to eleven....
https://outcast.am/videos/watch/e485cc71-f744-4226-9803-6b1b16cb7d87
Baby Name Bonanza: Oliver Still Rules the Roost in South West Wales – But There’s a Surge in Classic Favourites
The age-old question of what to name the baby has a familiar answer in South West Wales: Oliver.
Newly released data from the Office for National Statistics reveals that Oliver remains the most popular name for baby boys across nearly every local authority in the Swansea Bay region in 2024 — topping the charts in Swansea (29 babies), Carmarthenshire (20), Pembrokeshire (19), and Neath Port Talbot (21). Only Bridgend broke ranks, with Jacob taking top spot there (16 babies).
The name Oliver’s reign doesn’t stop at regional borders — it was the most popular boys’ name in 98 separate local authorities across England and Wales, including Cardiff, Wrexham, and Newport.
Swansea – Top 10 Baby Boy Names (2024)
RankNameCount1Oliver292Noah223Jacob214Charlie195Jack186Leo177Oscar168George159Harry1410Theo13Oliver leads the pack, but Noah and Jacob are close contenders — with a strong showing from classic names like George and Harry.
Neath Port Talbot – Top 10 Baby Boy Names (2024)
RankNameCount1Oliver212Jacob193Jack174Charlie165Harry156George147Oscar138Alfie129Leo1110Theo10Neath Port Talbot mirrors Swansea’s taste, with Oliver again on top — but Jacob and Jack are hot on his heels.
Bridgend – Top 10 Baby Boy Names (2024)
RankNameCount1Jacob162Oliver143Jack134Charlie125Harry116George107Oscar98Alfie89Leo810Theo7Bridgend bucks the regional trend with Jacob in the lead — a strong showing for traditional names across the board.
Carmarthenshire – Top 10 Baby Boy Names (2024)
RankNameCount1Oliver202Jack173Charlie154Harry145George136Oscar127Alfie118Leo109Jacob1010Theo9Carmarthenshire mirrors Swansea and Neath Port Talbot with Oliver on top — but Jack and Charlie are close behind.
Pembrokeshire – Top 10 Baby Boy Names (2024)
RankNameCount1Charlie192Oliver173Jack154Harry145George136Oscar127Alfie118Leo109Jacob910Theo8Pembrokeshire stands out with Charlie taking the top spot — a coastal favourite with enduring charm.
A Resurgence of Welsh Names
While names like Oliver, Leo, and Oscar dominate the UK charts, families in Wales are quietly reviving names with cultural heritage. Tomos, Jac, Rhys, and Osian are among the highest-ranking Welsh-language names chosen by parents in 2024 — with Tomos now sitting just outside the overall top 10 at #11.
This trend points to a renewed embrace of Welsh identity, particularly in bilingual regions such as Ceredigion, Gwynedd, and Powys. Parents are selecting names not just for sound, but for meaning — tapping into poetry, mythology, and local pride.
Top 10 Welsh Language Baby Boy Names in Wales (2024)
Welsh NameOverall Rank in WalesNotesJac#10Welsh form of Jack; strong in North WalesTomos#11Highest-ranked Welsh name; rising in bilingual homesOsian#17Literary and lyrical; popular in West WalesElis#21Short, stylish; gaining traction in urban areasHarri#23Welsh form of Harry; consistent across regionsDylan#27Mythological roots; strong in coastal countiesMacsen#36Historic and regal; niche but growingEllis#40Dual-language appeal; used in both Welsh and EnglishIoan#67Welsh form of John; steady in bilingual communitiesCai#85Short and punchy; chosen in Welsh-speaking familiesWider Trends: Muhammad’s Rising Star and the Age Divide
Across the UK, Muhammad (including variants such as Mohammed and Muhammed) was the most popular name overall — topping the charts in 1 in 6 urban local authorities including Birmingham (406 babies), Manchester (150), and Bradford (273).
There’s also a generational twist:
Top 10 Baby Boy Names in England & Wales Overall (2024)
RankNameCountNotes1Muhammad406 (Birmingham), 150 (Manchester), 273 (Bradford)Most popular in 1 in 6 urban districts2Oliver98 countiesMost popular in nearly 100 local authorities3NoahTop 3 in all age groupsEspecially popular among younger mothers4GeorgeTop 5 for older mothersClassic name with enduring appeal5Leo#3 for mothers aged 35+Rising star across regions6ArthurTop 5 for 25–34 age groupsVintage revival7JackTop name in rural areasStrong showing in Wales and North England8TheodoreRising across all age groupsModern classic9OscarConsistently top 10Popular in both urban and rural areas10JudeQuiet climberEspecially popular with older parentsMuhammad leads nationally, especially in urban centres, while Oliver dominates in rural and coastal areas. The top 10 reflects a blend of tradition, trend, and cultural diversity.
Names Inspired by Nature, Pop Culture and Heritage
In Pembrokeshire, the rise of names like Charlie and Oscar mirror national influences from British pop culture and celebrity parents. Nature-inspired names — such as River, Rowan, and Oakley — were popular among under-30s in Wales, perhaps reflecting an earthy aesthetic that resonates with outdoor-loving families.
Notably, Logan made a surprise appearance as the most popular name in Norwich and Blaenau Gwent — suggesting a cross-regional affection for this softly strong choice.
Top 10 Baby Boy Names in Wales (2024)
RankNameBirth Count#1Noah320#2Oliver310#3Luca295#4Leo280#5Arthur270#6Oscar260#7Theo250#8Freddie240#9George230#10Jac220Final Thoughts
While Oliver may reign supreme, it’s clear that families in Swansea Bay are opting for names that blend classic British charm with modern creativity and cultural depth. Whether it’s Jacob’s gentle reliability in Bridgend or Muhammad’s enduring presence in urban centres, every name tells a story — one that begins right here in South West Wales.
And increasingly, those stories are being told in Welsh.
#11 #Alfie #Arthur #babyBoy #babyNames #boyNames #Cai #Charlie #Dylan #Elis #Ellis #featured #Freddie #George #Harri #Ioan #Jac #Jack #Jacob #Jude #Leo #Luca #Macsen #Mohammed #Muhammad #Muhammed #Noah #Oliver #ONS #Oscar #Osian #statistics #Theo #Tomos
Exploration Log 9: Three More Interviews with Clifford D. Simak (1904-1988)
Back in July 2024, I posted six interviews with Clifford D. Simak (1904-1988). Since then I’ve tracked down three more. As in that post, I’ll provide a rundown of each interview and provide quotes of interesting passages. In the interviews, Simak comes across as an author deeply suspicious of rigorous generic distinctions, passionate about all life, and open to science fiction as an ever-changing and evolving entity.
As readers of the site know, I have a substantial interest in Simak’s SF that culminated last year in my September article “‘We Must Start Over Again and Find Some Other Way of Life’: The Role of Organized Labor in the 1940s and ’50s Science Fiction of Clifford D. Simak” (2024) in Journey Planet #84. Since then I’ve posted an Exploration Log on his 1971 Worldcon speech, reviewed Best Science Fiction Stories of Clifford D. Simak (1957), and contributed to a podcast on “The Huddling Place” (1944) (the second City story).
Enjoy! And if you know of more interviews (or are able to update the Internet Speculative Fiction Database entry as it only includes five of the nine interviews I’ve covered) let me know.
THE INTERVIEWS
1. Jim Young interviews Simak in Rune # 43 (May 1975). You can read it online here. The review was conducted at his home in Minnetonka, Minnesota in May, 1973. Rune was the fanzine for The Minnesota Science Fiction Society.
Young’s interview, titled “Science Fiction and Meaningful Existence,” starts with a summary of Simak’s achievements and impressions of the “kind, fatherly” man. The meat of the interview begins with a rumination on the concept of “mainstream fiction.” Simak posits that “there is no such thing as mainstream fiction, there is simply fiction.” As with many other interviews, he argues that part of the problem with defining science fiction is our inability to recognize it as “fantasy.” He, personally, has no special guidelines when writing.
Conversation shifts to favorite authors (Steinbeck, Faulkner, Proust, etc.). Simak states he reads Grapes of Wrath “almost once a year.” In other interviews, Simak seems reluctant to identify specific SF works that he admires–he often mentions authors instead. Here is an exception: “I think that one of the finest books ever written in science fiction is Walter Miller, Jr.’s A Canticle for Leibowitz (fix-up 1959). He also, surprisingly (at least to me), identifies Larry Niven as a favorite.
Conversation shifts to the New Wave movement. While Simak is open to experimentation (see his WorldCon speech), he states his personal preferences that a story should still be present in SF — “I’d hate to see us lose that.” Young does not ask for examples. Young presses him on whether SF should “try to warn people about problems that might come up in the future.” Simak, confusingly, suggests in response that contemporary SF is somehow losing its “universality.” He suggests stories on life post-nuclear war are the most successful SF has been exploring a future potentiality. Other than warnings about the “atomic threat,” Simak does not believe SF has been very effective at “placing ourselves in the position of pamphleteers rather than writers.”
Simak moves into a moment of speculation that echoes and interacts with a lot of his own writing. He imagines two futures for humanity (if it survives): 1) humanity continues to be a “great technological race, and we will go out into space and probably the stars — despite the limitations of the speed of light” or 2) once they have gone so far in that direction, they will drop technology, and they will no longer have these technological triumphs — it won’t mean anything to them any longer.” His work almost systematically explores these two paths. See for example A Choice of Gods (1971) (ignore my rating — I imagine I would enjoy this one more now) and my article of his 40s and 50s stories. Simak brings up the Counterculture as an example of people who are not talking about technology or worldly success but instead “meaningful existence.” He acknowledges that this particular movement might not exist for long but another future version might position them as the “forerunners of the future.”
The conversations flows into a discussion of ESP. Simak comes off as a true believer who does not buy current scientific views discounting its existence: “we either don’t have the instruments to measure it, or it may not be measurable.” He returns to his desire that “we’ll probably try to simplify our lives in another hundred years, and possibly to use less energy” with more focus on “happiness.” I’m with you Simak on these two points! On ESP? nah. He concludes the interview with a proclamation of his love of history (despite claiming that he does not use it as background in his stories).
Ultimately this interview treads familiar ground with the other six surveyed. Simak is a bit less diplomatic than he can be on the New Wave.
2. Dave Truesdale and Paul McGuire interview Simak in Tangent # 2 (May 1975). You can read it online here. The link also contains an audio file with some short commentary “erroneously omitted from the 1975 print interview.” This was not a planned interview but rather a brief, unprepared, discussion after a panel at Minicon 10 in April 1975.
The first questions cover Simak’s writing habits (planning plots, polishing, having fun while writing), current projects, and the personal and thematic evolution of his work. On the later point Simak reiterates a comment claim he makes that “the Golden Age is right now” (he’s explained in other interviews that early SF was often quite poor and anyone could get published as there were so few authors). He points out that even his masterpiece City (fix-up 1959) contains writing that is somewhat “crude and juvenile” that he has moved on from. He puts contemporary claims that the 30s were a “Golden Age” to nostalgic: “you’re young, and this is a new experience, and you think, how wonderful it is.”
Dave and Paul bring up Richard (Dick) Geis, who “seems to only like one certain type of science fiction,” and his claims about genre. Simak takes issue with Geis’ view: “Dick has created a pedestal on which he stands and screams to the high heavens that there’s only one kind of fiction.” Simak, on the other hand, believes “that’s not fact. The strength of science fiction lies in its diversity today.”
He concludes the interview emphasizing praising new voices like Joe Haldeman–“he’s beautiful.” And he knows that in the future SF will evolve further: “there will be kids starting out who are writing kind of, uh, punk stories.” He feels that this range and evolution is part of SF’s strength and we shouldn’t get “faddish” and write only one kind of story.
3. George J. Laskowski, Jr. (Lan) and Maia interview Simak in Lan’s Lantern # 11 (July 1981). You can read it online here. The interview was conducted at Minicon, 1980 in Minneapolis. The issue is a “Cliff Simak Special” with art inspired by his work and various remembrances by George R. R. Martin, Jack Williamson, Algis J. Budrys, James E. Gunn, Gregory Benford, Ben Bova, and many others, etc.
The interview starts with a discussion of Simak’s earliest SF stories and his early desire to write. He mentions that he only knew that “The Cubes of Ganymede” had been published when he saw a news release in a fanzine that he had been accepted (by that point he had published numerous other stories)! However, as T. O’Conner Sloane was a notoriously slow editor, he received his copy of the story back three years later with a note saying that he could no longer publish it as it had “become outdated.” Simak confesses that the story was terrible anyway. Lan points out that Simak’s first published short story (1931’s “The World of the Red Sun”) contains an early, if not the first, example of psychology used as a weapon. Unlike E. E. “Doc” Smith, Simak points out that you can’t rely on “mass technology” and power lies “within the mind.” This becomes a central tenet of his SF. He also indicates his “quarrel” with the argument that SF should end happily. We might not win against aliens or gain intelligence — our “egocentrism” might get in the way.
Unlike some of the other more surface and predictable interviews, Lan and Maia quickly dive into a meaty discussion of Simak’s robots (while they don’t mention it by name, they clearly discuss the 1960 story “All the Traps of Earth” in addition to the robots in the 1959 fix-up City). He mentions that he treats robots in his stories as “surrogate humans”–humanity will make robots “so much like himself” even if there’s the possibility that they have “no soul.” Regardless, Simak believes we will make robots as “tools” even if they have names. Simak’s penchant for weird-looking aliens comes up next: “while it may be repulsive to us, we may be just as repulsive to it. If you strip off that repulsive outer cover of both of us, and try to get at what’s inside, there will certainly be, I think, some coming basis for understanding, or if not understand, at least sympathy.” A lengthy tangent begins in which Simak returns to his idea that perhaps in the far future something “greater than intelligence” and the use of tools will become important to future humans.
The Hugo-winning Way Station comes up next. Simak calls it “one of my three best novels.” He points out what he would rewrite if he could. “The Big Front Yard” (1958) and Mastodonia (1978)” come up next and the interaction between the two. The conversation moves to the issue of “faith-inspired” and “faith-inhibited” as concepts. Simak has a “theory that we might become a better race if we didn’t cling so closely to this faith” that he knows of towns in which inhabitants won’t go to stores run by members of another congregation (or religion). This is a more stridently critical stance towards religion than earlier interviews. In connection to dogmatism, they move on to discuss other dogmatic stances towards left-handedness and people who might not be viewed as traditionally productive members of society. Simak comes of, as is often the case, as open to diversity in all its forms.’
Simak discusses old age and the impact of illness on the elderly. His story “Shotgun Cure” (1961) comes up in which a price is given for an alien cure-all. Simak argues the story reiterates that “technology itself was a disease, and it was perhaps the greatest disease of all which will be cured. Well, not necessarily technology itself, but this rat-race, this high-pressured society we live in, which can be tied directly to technology.” Naturally the interview moves to Simak in retirement and why he waited until 72 to retired (something about Social Security and having a small income from writing).
Other topics briefly discussed in the rather unfocused end to the discussion: technological obsolescence, “Dusty Zebra” (1954), oddities like “Mr. Meek Plays Polo” (1944) in Planet Stories, his two collaborations, Time is the Simplest Thing (1961), “Lulu” (1957) (mysteriously “one of his favorites”), Project Pope (1981), Cosmic Engineers (1950), The Visitors (1980), and City (fix-up 1952).
I highly recommend this interview due to the preparation of the interviewers and the specific short stories and novels that come up beyond the predictable handful.
For book reviews consult the INDEX
For cover art posts consult the INDEX
For TV and film reviews consult the INDEX
#11 #1970s #1980s #2 #43 #84 #bookReviews #CliffordDSimak #sciFi #scienceFiction #technology
Secret Cakes and Frostings Grandma Swore: Especially #11
If you’ve ever wondered what made Grandma’s cakes and frostings so unforgettable, you’re about to find out—especially when you hit #11! These sweet recipes feel like a warm hug from the past, with rich Southern pound cakes, dreamy frostings, and no-bake treats that make dessert feel extra special. This roundup is packed with easy, nostalgic favorites that bring big flavor with simple […]
https://intentionalhospitality.com/secret-cakes-and-frostings-grandma-swore-especially-11/
We kunnen stellen dat wij in de westerse wereld vrij zijn. Maar wat betekent vrijheid voor ons? Paulo Coelho (1947) schrijft over vrijheid in zijn boek “De Zahir”:
„Vrijheid is niet dat men geen verplichtingen heeft, maar dat men de mogelijkheid heeft te kiezen, en daarop in te gaan, waarvan men denkt dat het het beste is.”
Bij het maken van keuzes gaat het met name om geestelijke vrijheid. De enige die jouw geestelijke vrijheid in de weg staat, ben je vaak zelf omdat je je gebonden ziet aan regels en conventies. Kan je je daarvan bevrijden? Ik denk niet helemaal, maar als je het wilt proberen is het belangrijk inzicht te krijgen welke verplichtingen, regels en conventies je jezelf oplegt en welke door anderen worden bepaald. De keuze wat je wilt volgen, blijft desondanks bij jou.
Emotionele vrijheid is ook belangrijk, maar ook daar is het inzicht in wat je gelukkig en vrij maakt wezenlijk. Voorop staat dat je mag houden van wie je wilt en van zoveel mensen als je wilt. Ik heb een groot hart waarin geen concurrentie bestaat en ik vond het dan ook laatst weer behoorlijk ergerlijk, dat er vraagtekens werden gezet bij de vriendschap tussen mij en een man, omdat men graag invult dat man+vrouw=seks. Een bekrompen opvatting die mij in mijn vrijheid beperkt.
Recentelijk leverde ook vergeving mij emotionele vrijheid. In het boek “Vrijheid is” van Brandon Bays (1953) staat beschreven hoe vergeving tot bevrijding kan leiden. Bays stelt dat je zonder verongelijkt ego geen gevoelens van wrok of boosheid kunt koesteren. Het is dus de vraag welke winst je denkt te kunnen behalen als je ervoor kiest een ander niet te vergeven en of je echt denk dat je met je boosheid die ander op afstand kunt bestraffen of het bewijs kunt leveren dat jij degene bent die in zijn recht staat? En als je zo zeker weet dat je gelijk hebt, waarom kun je de zaak dan niet laten rusten? Zou je onmacht om een ander te vergeven misschien iets met jezelf te maken kunnen hebben? Spelen latente minderwaardigheidsgevoelens, gekrenkte trots of oud zeer daarbij misschien een rol? Door te vergeven bewijs je jezelf dat je hart (de liefde) veel groter is dan je ego én dat je wel degelijk in staat bent op eigen kracht het verleden van je af te schudden. Ik heb dit gedaan en dit inzicht leidde tot een grote bevrijding en veel positieve energie.
Lichamelijke vrijheid betekent voor mij niet zozeer dat ik overal heen kan reizen. Ik heb in mijn leven veel gereisd, maar ben er steeds meer van overtuigd dat het inderdaad zo is dat de dwaas het geluk in de verte zoekt en het bij de wijze onder zijn schoenzolen groeit. Lichamelijke vrijheid uit zich voor mij daarom meer in fit genoeg zijn om je vrij te kunnen bewegen. Ik werd daarmee weer geconfronteerd toen ik tijdens het schrijven van dit boek door een val de banden van mijn rechtervoet scheurde en zes weken gedwongen was zeer weinig te bewegen.
Merendeels voel ik mij in al de bovengenoemde opzichten vrij en het enige wat mij onvrij maakt, is bezit en dan met name materieel bezit. Na het overlijden van mijn zus heb ik van veel onnodig materieel bezit afstand gedaan, omdat ik niet wilde dat mijn nabestaanden dat eens zouden moeten opruimen. Door het overlijden van mijn ouders kwam er echter weer veel, inclusief een huis, bij. En omdat ik niet graag wil dat bezit mij bezit, heb ik besloten het huis te verkopen.
Tot slot heeft ook Jean Pierre Rawie (zie hoofdstuk 6. “Jaargetijden”) treffende woorden over bezit geschreven:
Waar ik mijn hart aan heb verpand
in mijn verspild verleden,
het ging voorbij, het hield geen stand,
het is als zand vergleden.
Ik heb mij steeds het meest gehecht
aan sterfelijke zaken,
aan dingen die ik nimmer echt
tot mijn bezit kon maken.
Maar alles wat zo dierbaar was
dat ik het heb verloren,
is mij sinds ik het kwijt ben pas
voorgoed gaan toebehoren.
Dit is een automatisch geplaatst bericht via ActivityPub.
#11 #BrandonBays #EmotioneleVrijheid #geestelijkeVrijheid #JeanPierreRawie #LichamelijkeVrijheid #PauloCoelho #vrijheid #wilJeWetenWatIkDenk_
The Watchman (Elvis Cole, #11; Joe Pike, #1): goodreads.com
Selects – das Streaming der Kinemathek
Cult and Quirky – Selects #11 | 1.2.–30.4.25
Agenten, Kosmonautinnen, größenwahnsinnige und gescheiterte Existenzen tanzen, singen und morden in neun Filmen, die sich zwischen Kult, Genre und Trash bewegen. Immer geht es um das große Ganze: Liebe, Sex, die Abgründe der Seele und die Rettung der Welt vor dem Bösen. Mal pathetisch, mal komisch, aber auf jeden Fall schräg –
https://www.deutsche-kinemathek.de/de/online/streaming
#11 #CultAndQuirky #DeutscheKinemathek #Film #Selects #StreamingDerKinemathek
Es wird die falsche Karte eingeführt!
Stellungnahme zur Einführung der „Bezahlkarte“ und weiteren Änderungen des Asylbewerberleistungsgesetz (AsylbLG)
In Deutschland unterliegen Personen, die Leistungen nach dem Asylbewerberleistungsgesetz (AsylblG) erhalten, bereits seit Einführung des so genannten „Rückführungsverbesserungsgesetzes“ im Februar 2024 verlängerten Leistungseinschränkungen in der Gesundheitsversorgung. Nun sollen sie durch eine weitere Änderung des AsylbLG zudem mit einer Bezahlkarte gegängelt werden, die ihnen unter Anderem das Abheben von Bargeld oberhalb einer festgelegten Grenze unmöglich macht.
Das stellt eine massive Teilhabeeinschränkung und Diskriminierung von Asylbewerber*innen dar.
Als Begründung für die Einführung der Bezahlkarte werden populistische Narrative genutzt, wie Geflüchtete würden Unsummen an Sozialleistungen in ihre Herkunftsländer überweisen. Belastbare Zahlen liegen hierzu nicht vor. Einige Städte und Kommunen haben mit der Einführung der Bezahlkarte bereits begonnen; bis zum Spätsommer 2024 könnten bundesweit alle Geflüchteten eine Bezahlkarte anstatt Bargeld oder Überweisungen der Leistungen auf ihr Konto erhalten. Der Gesetzgeber überlässt die Entscheidung über die tatsächliche Einführung den jeweiligen Leistungsbehörden. Zu erwarten ist dabei, dass sich Landkreise und Kommunen, die das AsylbLG bereits besonders restriktiv und diskriminierend anwenden, für eine verschärfte Auslegung des Bezahlkartensystems entscheiden werden. Sie können beispielsweise festlegen, die Nutzung der Karte regional zu begrenzen und nur Einkaufsmöglichkeiten bei bestimmten Handelsunternehmen zu akzeptieren. In Deutschland, einem Land, das noch in großen Teilen auf Bargeldnutzung fußt, bedeutet das eine Eingrenzung des Konsumverhaltens. Flohmärkte, der Einkauf in Läden ohne Kartenzahlung und Privatkäufe werden quasi unmöglich, genauso wie die Partizipation an Unternehmungen, die außerhalb des zugelassenen Postleitzahl-Bereichs liegen. Handyverträge abschließen, Mietzahlungen tätigen oder das Abonnements von ÖPNV-Tickets können, je nach kommunaler Regelung, ebenfalls schwierig oder unmöglich werden, da Überweisungen eingeschränkt werden können.
Dies führt zu einer weiteren Prekarisierung, Ausschluss von gesellschaftlicher Teilhabe, Integrationshindernissen und Armut. Seit Jahrzehnten ist bekannt, dass diese sozialen Determinanten krank machen.
Zuletzt hatte sich im Februar mit der Verabschiedung des „Rückführungsverbesserungsgesetzes“ der Bezugszeitraum der eingeschränkten Gesundheits- und Sozialleistungen für Asylbewerber*innen auf 36 Monate verdoppelt. So lange müssen Geflüchtete inzwischen warten, um Leistungen der Gesundheitsversorgung in Anspruch nehmen zu können. In der Zwischenzeit haben sie nur Zugang zu eingeschränkten Leistungen. Erkrankungen werden so später erkannt und behandelt, akute Krankheitsproblematiken chronifizieren zum Teil. Schwere Krankheitsverläufe, vermehrte Notaufnahmebesuche, mehr und längere Krankenhausaufenthalte und aufwändigere Diagnostik und Therapien werden die Konsequenz sein. Es ist bekannt, dass illegalisierte, geflüchtete und migrierte Menschen sowie Menschen ohne Krankenversicherung, egal welcher Generation, schon im Moment schlechter gesundheitlich versorgt und betroffen von Armut sind. Dies erhöht die Wahrscheinlichkeit schwerer zu erkranken und früher zu versterben. Zusätzlich führt dies zu einer Zunahme an Verwaltungsaufwand und damit einhergehenden Kosten für die Behörden. Auch für ein Gesundheitssystem, das spätestens seit der Coronapandemie ächzt, wird dies zu einer weiteren Qualitätsverschlechterung und Unterversorgung für alle führen.
Die politische Unerwünschtheit einer Verbesserung der gesundheitlichen Situation geflüchteter Menschen und das freimütige Annehmen und Vorantreiben menschenverachtender und rassistischer Maßnahmen gegen sie, mit dem Ziel rechte Politik und Wahlkampfrhetorik zu befrieden, entsetzt uns. Während uns jahrelang von staatlicher und behördlicher Seite versichert wurde, über nicht genug finanzielle Mittel zu verfügen, um die Situation verbessern zu können, melden Städte und Landkreise sich nun freiwillig und kurzsichtig für Testläufe mit Bezahlkarten. Und im nächsten Atemzug wird von Stimmen der CDU und FDP die Frage aufgeworfen, was gegen die Einführung der Bezahlkarte auch für andere Personengruppen spricht, die staatliche Leistungen beziehen. Die systematische Aushebelung von Menschen- und Grundrechten verurteilen wir scharf.
Medibüros und Medinetze im ganzen Bundesgebiet setzen sich seit über zehn Jahren für die Einführung einer elektronischen Gesundheitskarte (eGK) für Alle ein, um die faktische Gesundheitsversorgung von Asylbewerber*innen endlich an ihren menschenrechtlichen Anspruch anzupassen. Mit den diesjährigen Änderungen des AsylbLG sind stattdessen ausschließlich Rückschritte und Verschlechterungen beschlossen worden.
Wir finden: Es wurde die falsche Karte eingeführt! Für die bundesweite Einführung einer obligatorischen elektronischen Gesundheitskarte (eGK) gibt es bereits funktionierende Vorbilder und belastbare Evaluationen, die eine verbesserte Versorgung sowie entstehende Kosteneinsparungen für die Länder belegen. Beispielhaft war dies bereits bei der schnellen und unbürokratischen Handhabe für Ukrainer*innen, die bereits nach wenigen Monaten eine Chipkarte und vollen Leistungsanspruch erhielten, sichtbar. Die Bezahlkarte „gegen“ Geflüchtete verschärft hingegen Diskriminierung, schafft einen enormen behördlichen Mehraufwand und wird Verwaltungsprozesse chaotisieren.
Die unterzeichnenden Medinetze und Medibüros fordern weiterhin die alternativlose Abschaffung des Asylbewerberleistungsgesetzes und der damit einhergehenden diskriminierenden Einschränkungen für Asylsuchende, sowie Gesundheitsleistungen für Geflüchtete wie im Leistungskatalog der gesetzlichen Krankenversicherung gesetzlich zu verankern.
Wir fordern die Rücknahme der Bezahlkarten und ein absolutes Absehen weiterer Sanktionsmaßnahmen gegen geflüchtete Menschen und Menschen, die auf Transferleistungen aus welchen Gründen auch immer, angewiesen sind. Wir fordern ein klares Benennen rassistischer und rechtspopulistischer Narrative und eine deutliche Abgrenzung davon.
Rechte Politik und Meinungsmache wird durch Gesetze und Maßnahmen, die sich gegen Geflüchtete oder arme Menschen richten, nicht befriedet, sondern weiter befeuert.
Wir fordern ein solidarisches Handeln für und mit Menschen, die von Bezahlkarten betroffen sein werden: tauscht Gutscheine, die mit der Bezahlkarte erworben werden können, gegen Bargeld! Organisiert sichere Orte und überlegt euch gemeinsam Strategien, um die Bezahlkarte und ihre falschen Versprechungen zu widerlegen und auszuhöhlen!
Mitgezeichnet von:
Medinetz Magdeburg e.V.
Medinetz Halle/Saale e.V.
Medinetz Dresden e.V.
Medinetz Rostock e.V.
Medinetz Chemnitz e.V.
Medinetz Leipzig e.V.
Medinetz Jena e.V.
在听 时差 in-betweenness - #11 民族建构,文化身份,他者想象 | Constructing ethnicity, imagining otherness
#11 民族身份、认同和他者想象|这一集讨论了好多东西,信息密度很大,我完全不是研究这一块的,但是这一部分却和我自身的身份构成有紧密的联系,真的学到了很多我过去完全不关心也不感兴趣的知识,感谢。收获很大的地方:中国的「民族」实际上是个社会构建的概念(而且是从20世纪初开始的)——並不是說民族文化的不存在的,而是說當今的「民族」視野其實是粗糙而且概括性的,光靠這個不足以仔細檢視不同族群的文化差異;歷史上的内部殖民主义(internal colonialism),尤其是西北和西南“少数”民族的聚居地(這讓我想起明朝時期來到西南地區的移居者們);“少数”民族的概念本身的复杂性;以色列这个民族概念的其背后并非单纯种族(人种)还包括很大部分的「宗教」;穆斯林、回族、伊斯兰三个概念的交叠、异同,恐穆斯林话语的流变。算是给了解这一领域非常好的领路入门了。
Ostara 2024
Ostara is the celebration of the Spring Equinox and is a time of renewal and rebirth. In 2024, Ostara will occur on March 19th (for the Northern Hemisphere and September 19th for the Southern Hemisphere), marking the day when day and night are of equal length, symbolizing balance and harmony in the natural world123.
Celebrating Ostara 2024
As the snow melts and the first green shoots emerge, Ostara invites us to embrace the new life that surrounds us. It’s a time to plant seeds, both literally in our gardens and metaphorically in our lives, setting intentions for the growth we wish to see in the coming months.
Rituals & Traditions
Foods &
Colors
Community & Self-Care
Corres-pondence
Here’s a list of correspondences for Ostara, which can be used to enhance your celebration and rituals:
Animals
Colors
Crystals
Foods
Goddesses
Gods
Herb & Plants
Incence
Oils
Spells
Symbolism
Conclusion
Ostara 2024 is an opportunity to celebrate the balance of light and dark, to welcome the warmth of the sun, and to prepare for the abundance of summer. It’s a time to come together, to share in the joy of the earth’s renewal, and to plant the seeds for a fruitful future.
Embrace the spirit of Ostara, and may your celebrations be filled with joy, growth, and harmony.
For those interested in learning more about Ostara and how to celebrate it, consider exploring resources such as the free Ostara E-Course offered by Mabon House1, or the comprehensive holiday calendars available for Wiccans and Pagans2. These can provide valuable insights and ideas for making the most of this vibrant and meaningful time of year.
The Witch's Online Resource
Buy Tarot Readings & Spells Support Me on My Facebook Page Check out My Facebook GroupIvyjaded Wyldfyre
**Ivy Jaded WyldFyre**, based in **Manitowoc, WI**, is a multi-talented individual with a fascinating blend of interests and skills. Let us explore her diverse background:
**Author and Writer**:
Ivy is a writer who weaves words into captivating stories, poems, and other literary works. Her creativity knows no bounds, and her writing reflects her deep connection to mystics and magicals.
– As an author, she explores themes related to spirituality, witchcraft, and esoterics. Her words resonate with those that seek wisdom and inspiration.
**Tarot Reader**:
– Ivy delves into the ancient art of tarot reading. Through the symbolism of tarot cards, she provides insights, guidance, and intuitive interpretations for those who seek clarity.
– Her tarot readings are like opening a door to hidden realms, where each card reveals a piece of cosmic puzzle.
**Website Designer**:
– Ivy’s skills extend beyond written words. She is a website designer crafting digital spaces that reflect her unique aesthetics and purpose.
– Whether it is a personal blog, an online store, or a platform for spiritual exploration, Ivy brings her artistic flair into every web design project.
**Pagan Essentials**:
Ivy is associated with **Pagan Essentials**, a platform that invites seekers to discover the secrets of magick and nature.
– Pagan Essentials offers an extensive range of resources, including information on lunar phases, gemstone properties, candle colors, herb characteristics, essential oils, and more⁵.
– It is a haven for those drawn to earth-based spirituality and the mystical arts.
**Numerology**:
Ivy’s connection to numerology is fascinating. She resonates with the **Master Number 11** in numerology.
– Master Numbers hold immense power and meaning. The number 11 represents intuition, spiritual awakening, and enlightenment.
As an #11, Ivy embodies these qualities, channeling them into her creative endeavors.
**Year of the Dragon**:
– Born in the year of the Dragon, Ivy carries the fiery energy associated with this mythical creature.
– Dragons symbolize strength, transformation, and wisdom. Ivy’s journey aligns with the dragon’s spirit: bold, fierce, and ever evolving.
In summary, Ivy Jaded WyldFyre is a modern-day enchantress: a writer, tarot reader, web designer, and keeper of ancient wisdom. Her path is illuminated by flames of creativity, and she invites others to join her in exploring the mystical tapestry of existence. 🌟🔮🐉
Sources:
1. How to Celebrate Ostara in 2024 — Mabon House
2. 2024 Wiccan & Pagan Holiday Calendar – Spells8
4. FESTIVAL OSTARA 2024 Portland Line-up, Tickets & Dates Mar 2024 – Songkick
Proudly Powered by WordPress
Tumblr / Instagram / Email
Designed with WordPress
#11 #AltarIdeas #Correspondence #Magic #Magick #Ostara #Pagan #Sabbats #SpringEquinox #wheelOfTheYear #Witch #Witchcraft
South Carolina Women’s Basketball just beat #11 UConn by 18 points, without leading scorer Kamilla Cardoso who is off this week playing for Brazil in Olympic qualifying. This team is incredible. I think it’s the best team Dawn Staley has assembled, and that’s saying something.
Dégooglisez vos photos de rues avec GeoVisio [Adrien Pavie]