#7

2025-02-17

Pop Cryptid Spectator 7

Welcome to the Pop Cryptid Spectator no. 7. This edition is chock full of news, media, and pop cryptid information. Cryptid popularity is exploding. Even old cryptid ideas are resurfacing in new ways all the time, as we’ll see regarding sea serpents and living dinosaurs. Books, movies, internet content, and music work to spread the modern concepts of cryptids, leaving behind crusty old ideas of “unknown animals” and repackaging them as new and exciting entities that share whatever “reality” we wish to embrace.

In this edition:

  • Cryptozoology diploma
  • Saxsquatch in Rolling Stone
  • Past and future of Small Town Monsters
  • Modern resurgence of mokele-mbembe
  • Fresno Nightcrawler on Monstrum – Is it a cryptid?
  • Frogman Festival in March
  • Cryptid biographies
  • Book review: A Natural History of Sea Serpents

Cryptozoology Diploma

A participant on the Forteana Forums on the Pop Goes the Cryptid thread pointed me to a “Cryptozoology diploma” provided by the Centre for Excellence online shop. You can take a (paid) course that claims to teach you to able to “decide whether lake monsters, sea serpents, Thunderbirds and other mythical monsters are rumours or a reality”. That is, if your really need to pay for that! This tip was in response to the item in last PCS 6 exposing the ridiculous article on the Indeed job search site regarding “How to Become a Cryptozoologist”. This “diploma” is worthless as credentials but might be fun if you like learning new things you don’t known anything about. And, it shows just how mainstream the topic is. Unfortunately, as I discovered with a similar course, I can safely assume the instruction is terrible, the source material is low quality and full of errors, and the effort might make you more misinformed than educated in the topic.

Saxquatch in Rolling Stone

Regarding the Saxsquatch story from last week, he then appeared as a Creature Feature in Rolling Stone. He’s a very BIG deal!

Past and Future of STM

You really can’t talk about the spread of cryptids in popular culture in the US without recognizing Small Town Monsters, a production company founded by Seth Breedlove and friends, that has been making documentary films for 10 years now. They make little-known cryptids into icons, small towns into tourist attractions. I was a big fan of STM films starting with The Minerva Monster (Ohio) and Beast of Whitehall (New York). Since those early projects, it’s become increasingly difficult to keep track of, let alone watch, all the various monster and paranormal content that they put out. Every time I watch a new film or YouTube series episode, I see familiar faces from the field of high strangeness, and I learn new things. While STM prides themselves on being the only company who take an “objective” approach to their subjects, making an effort to let the witnesses and researchers do the talking, they have slanted more towards the extreme paranormal stuff as time has gone on. This tendency, however, is the normal trajectory of Pop Cryptids, so it’s altogether possible that STM isn’t just riding the wave, but also helping to steer the boat.

Seth has produced a new intro video for this year explaining some of the challenges to the small company, mainly distribution issues, that shed light on the seemingly chaotic release schedule. He also gives a preview of the movies for 2025.

  • The Kinderhook Creature is a story about a Bigfoot that terrorized families in the Catskills of New York in the 1980s. I am unfamiliar with this story which Breedlove calls “Minerva Monster writ large”. I fully expect the film treatment will launch this cryptid into the popular sphere.
  • Dawn of the Dogman promises to explore the origins of the Michigan dogman, which is known to have been popularized by a hoax story put into song. Breedlove says that Linda Godfrey was consulted on the project prior to her death in 2022. Again, really looking forward to this topic since Dogman is the current king of Pop Cryptids.
  • From the Beyond: The Bennington Triangle will take on the array of different phenomena reported in this area of southern Vermont. Window areas are of particular interest to me related to my Spooky Geology niche. I have written about the Bennington Triangle.

You can see Monster Chronicles: The Past and Future of STM on YouTube

https://www.youtube.com/watch?v=VE7xW4yfN5c

Modern resurgence of mokele-mbembe

Syfy website put out an article regarding the claim of living dinosaurs in the African Congo River Basin. The most famous of these is mokele-mbembe, which cryptozoologists interpret as a potential sauropod dinosaur. The article is, as you will often find, clickbait promotion, in this case linked to the next upcoming Jurassic Park franchise movie. It piggy backs off a Nat Geo article from early February about deforestation. Due to this environmental condition, encounters between locals and wildlife are becoming more frequent. People aren’t all that used to being so close to elephants and gorillas and seem to be attributing sounds and experiences to the folklore creature instead.

“In bigger settlements where habitats are being pushed into and people aren’t used to seeing large animals, they’re suddenly encountering them all the time,” says Laura Vlachova, a Czech conservationist. “It’s these people who tell me they’ve seen mokele-mbembe. I think what it really shows is how folklore is starting to reflect the reality of a shrinking ecosystem.”

Fresno Nightcrawler on Monstrum – Is it a cryptid?

Monstrum is a very popular PBS produced series on folklore creatures. The latest episode is on Pop Cryptid star, the Fresno Nightcrawler – a creature known from a grainy video from 2007 that shows a pale entity made up almost entirely of billowy legs and maybe a really tiny head on top. Host Emily Zarka can’t decide whether this is a “cryptid” or not, first calling it that but then suggesting it’s something else. She defines a cryptid as a biological creature that people say exists but science hasn’t documented, which, as I have shown in previous issues of PCS, can be problematic. The old school idea of a cryptid is zoological, however, the nightcrawler doesn’t seem to be perambulating anywhere near the path of zoological discovery. Mostly perceived as a hoax, I have seen some attempts to recreate it – digitally and manually. But nothing quite works. So the Nightcrawler remains a fun and creepy mystery. But, is it a cryptid?

  • Yes. People claim to encounter the creature in other areas after the original Fresno incident came to light. If we consider cryptids as a mysterious and unrecognized creature that, supported by anecdotal (and bad video) evidence, then it’s a cryptid.
  • Yes. Even if the supposition is that it’s an alien or spirit being, it’s a usually hidden entity that sometimes walks through our physical space. This is boosted by poorly sourced claims that it resembles some creature of Native American lore.
  • No. In no way does it depict a plausible biological creature, and there is no indication it can be captured or has a typical organic existence; it looks like a pair of puppet pants; it’s a made-up creature.
  • Yes. The Fresno nightcrawler always ranks high on lists of favorite cryptids. People remain fascinated by it, and it is the subject of a crazy amount of merchandise because it is cute and easy to draw! Pop cryptid all the way.

https://www.youtube.com/watch?v=QrGcxeyIPx4

Frogman Festival in March

Coming up on March 1-2 in Loveland, Ohio is the Frogman Festival celebrating the sightings of a humanoid frog- or lizard-like entity reported in 1955, 1972 and 2016. The festival features the usual family fun and merch vendors riding the Pop Cryptid wave. But the speakers are always my main interest. Among the paranormal and metaphysical “researchers” speaking at the event is an academic who is the most knowledgeable of all these presenters put together, Dr. Jeb Card. Unfortunately, this location is a bit too far for a day drive for me. If you are within reach, give it a go and let me know what you think.

Cryptid biographies

Incidentally, the Frogman has no well-researched cryptid biography. Surprisingly, neither does Mothman. Here are some recommended books to explore the “true” stories behind some famous cryptids:

  • Tracking the Chupacabra: The Vampire Beast in Fact, Fiction, and Folklore – Benjamin Radford, 2011
  • The Secret History of the Jersey Devil: How Quakers, Hucksters, and Benjamin Franklin Created a Monster – Brian Regal and Frank Esposito, 2018
  • The Untold Story of Champ: A social history of America’s Loch Ness Monster – Robert Bartholomew, 2012
  • Ogopogo: The True Story of the Okanagan Lake Million Dollar Monster – Arlene Gaal, 1955
  • The Beast of Boggy Creek: The True Story of the Fouke Monster – Lyle Blackburn, 2012
  • Lizard Man: The True Story of the Bishopville Monster – Lyle Blackburn, 2013
  • The Great Sea Serpent: An Historical and Critical Treatise – A.C. Oudemans, 1892
  • The Great New England Sea Serpent: An Account of Unknown Creatures Sighted by Many Respectable Persons Between 1638 and the Present Day – June P. O’Neill, 1999
  • Bigfoot: The Life and Times of a Legend – Joshua Blu Buhs, 2009
  • Bigfoot: The Yeti and Sasquatch in Myth and Reality – John Russell Napier, 1972

Might I suggest purchasing books from local or independent booksellers instead of Amazon. Try https://bookshop.org/ or https://www.ebooks.com/en-us/.

Book Review: A Natural History of Sea Serpents

A Natural History of Sea Serpents by Adrian Shine (Coming March 2025)
I am a tough book critic, particular regarding my favorite subject. No copy-paste, Wikipedia-sourced garbage passes muster with me. What I truly appreciate is a genuine expert, who has put in the time, presenting their well-reasoned arguments, supported by evidence. You can hardly get a better example of this than Adrian Shine’s new volume on sea serpents. Shine is the world’s foremost expert on the Loch Ness creature reports.

In this book, he guides us through the history of a long-bodied swimming creature that people have reported for centuries, how it changed, and what people probably saw. For example, early sea serpent sightings were of “loops” surfacing in the water with the suggestion of a flexible tubular animal. But around 1848, Shine explains the change to interpreting the same shape as “humps” connected to the back of an animal with a larger middle, like a plesiosaur. This version of the idea also continued into Loch Ness reports.

There are an array of historical sightings by sailors and other credible witnesses for which sensationalistic cryptid literature will label as representing mysterious creatures or unknown species. Shine declares what all reasonable people with some biology background already know – a hooping/looping animal is absurd. Maned water creatures, like cadborosaurus, make no sense. The volumes of eyewitness testimony, examined individually, is not compelling to suggest a mystery creature exists; there is a complete dearth of scientific evidence for these water cryptids.

Shine blasts a few worn tropes clear out of the water. First, locals and professionals don’t always know the animal they are seeing, if it’s an animal at all. Everyone can be fooled by viewing an unfamiliar or atypical situation. Second, there is no need to invent new animals to account for these sightings. Third, no single animal is going to account for all the various descriptions grouped under a single phenomenon, such as “Nessie” or “sea serpent”.

Shine provides convincing explanations for the most famous accounts cited by cryptid proponents, and he supports his conclusions with photographic examples. Even though no exotic cryptid is proposed as an explanation, his presentation is fascinating.

As with other cryptid-related books of outstanding scholarship, cryptozoological proponents will reject, ignore, or foolishly try to sink it. Back in 2012, a few big-mouthed and small-minded cryptid fans protested the book Abominable Science by Loxton and Prothero, probably because it spelled out cogent arguments against the zoological reality of famous cryptid creatures. The bottom line for sci-cryptozoologists is that they still lack substantive evidence for their extraordinary claims. I suspect they will dislike Shine’s book too. Their loss. Or, the accumulated wisdom he has will be acknowledged and respected.

Thanks for reading! Send comments, questions, or suggestions to popcryptid(at)proton.me. If you want to send some cryptid plushies or other merch, or books to review, email for my physical mailing address.

For more, click on Pop goes the Cryptid landing page. Make sure you subscribe to all the posts – it’s always free and I don’t send annoying spam. 

Pop Cryptid Spectator is also available on Substack. Please share this with cryptid fans you know!

Pop Cryptid Spectator Pop Cryptid Spectator 8

Pop Cryptid Spectator 8

Pop Cryptid Spectator Issue 6

Pop Cryptid Spectator Issue 6

Pop Cryptid Spectator #5

Pop Cryptid Spectator #5

Pop Cryptid Spectator #4

Pop Cryptid Spectator #4

Pop Cryptid Spectator #3

Pop Cryptid Spectator #3

Pop Cryptid Spectator #2

Pop Cryptid Spectator #2

Pop Cryptid Spectator #1

Pop Cryptid Spectator #1

#1 #chupacabra #cryptid #Cryptozoology #deathOfAUnicorn #popCryptid #reddit #rollerCoaster #scientific #seaSerpents #Skinwalker #Wendigo

sharonahill.com/?p=9144

2025-02-04

L’infolettre du 3 février 2025 : mondiaux de cyclo-cross, la situation au Rwanda, des retransmissions TV de plus en plus chères…

Mondiaux de cyclo-cross : les Néerlandais dominent, les Belges suivent… sans plus

Pour la deuxième année consécutive, la Belgique repart des championnats du monde de cyclo-cross sans le moindre titre mondial. Un bilan particulièrement difficile à comprendre au vu du reste de la saison, mais logique au vu des courses du week-end. La plus frustrante pour Belgian Cycling et les supporters belges est certainement l’épreuve réservée aux élites hommes. Le duel inattendu entre le Néerlandais Mathieu van der Poel et son rival Wout van Aert n’a finalement jamais eu lieu pour deux raisons : le règlement de l’Union Cycliste Internationale (UCI) qui a repoussé Wout van Aert en quatrième ligne à la suite de son classement UCI moins bon vu son programme allégé cet hiver, et un fait de course au premier virage, qui a vu le Belge freiné par un mauvais virage du Néerlandais Joris Nieuwenhuis, de l’Américain Eric Brunner et du Tchèque Michael Boros. Le temps de se relancer, Van Aert avait déjà perdu une quinzaine de places, encore plus loin que sa position de départ sur la ligne.

“J’avais l’impression que je n’ai pas beaucoup perdu de temps dès que j’ai eu la voie libre”, a commenté le N.1 belge au micro de la VRT après la course. Cela se confirme en regardant les écarts, avec près de 50 secondes quand Van Aert s’isole en poursuite et 45 secondes sur la ligne d’arrivée. Bien entendu, on ne saura jamais comment la course se serait déroulée si le sociétaire de Visma-Lease a Bike avait pu éviter le blocage au premier virage ou s’il était parti en première ligne comme Van der Poel. De même s’il avait bénéficié d’un plus grand appui d’une sélection belge qui n’a jamais semblé jouer la solidarité pour son leader annoncé. Cela aura au moins permis à Thibau Nys d’aller chercher une médaille de bronze intéressante. Mais la frustration d’avoir manqué ce duel reste, surtout au vu de la promenade de santé du Néerlandais, septuple champion du monde de cyclo-cross, comme l’autre recordman Eric De Vlaeminck. Âgé d’à peine 30 ans, Van der Poel a encore tout le luxe de battre le champion belge : “On verra, je vais d’abord profiter de ce titre”, a-t-il tempéré avant de savourer un nouveau maillot arc-en-ciel devant le public de Liévin.

Sur les autres épreuves, il était difficile d’envisager un autre résultat pour les représentants belges. Chez les élites femmes, personne ne pouvait faire face à la domination néerlandaise et au duel exceptionnel entre Lucinda Brand et Fem van Empel, finalement remporté par la tenante du titre, qui devient la plus jeune triple championne du monde de cyclo-cross de l’histoire à 22 ans à peine. Sanne Cant, pour son dernier Mondial, a connu la joie d’un Top 10, en neuvième place, alors que Marion Norbert Riberolle est passée tout proche de cet objectif, en onzième position. “Mon départ était bon, mais mes jambes ont bloqué ensuite. Cela m’arrive plutôt souvent, je suis vraiment un diesel”, a déploré la championne de Belgique, déçue de manquer son objectif pour quelques secondes.

Il n’y avait rien à faire non plus face au Néerlandais Tibor del Grosso chez les espoirs masculins. Le champion des Pays-Bas… chez les élites a réalisé la même course que Van der Poel, s’imposant avec près d’une minute d’avance sur deux Belges, Kay De Bruyckere et Jente Michels. Ces derniers étaient conscients que l’or était impossible à aller chercher : “Je suis fier de cette médaille. C’est comme de l’argent avec une touche d’or”, a commenté De Bruyckere, à peine 20 ans.

Sterre Vervloet visait un Top 15 chez les espoirs femmes et l’a obtenu avec une onzième place, malgré une “bête chute”, alors que Xaydee Van Sinaey a perdu beaucoup de temps, bloquée par une concurrente en début de course, et a dû se contenter d’une 16e position. Bien loin de la Britannique Zoe Bäckstedt, double championne du monde chez les moins de 23 ans.

L’objectif était atteint chez les juniors femmes pour Sanne Laurijssen, 19e d’une course dominée par la Française Lise Revol au bout d’une incroyable remontée face à la Tchèque Barbora Bukovska, qui a célébré trop vite sa première place provisoire… un tour trop tôt. Alors que Mats Vanden Eynde affichait sa déception après sa cinquième place chez les juniors hommes, estimant le podium atteignable. “Malheureusement, j’ai commis une erreur à la fin, ce qui m’a empêché de disputer le final avec Grigolini (bronze) et Noval Suarez (quatrième)”, a-t-il confié à l’arrivée, alors que l’Italien Mattia Agostinacchio a célébré son premier titre mondial après un sacre européen et une deuxième place en Coupe du monde.

Le premier bilan du sélectionneur Angelo De Clercq reste donc en demi-teinte : la plupart des objectifs semblent atteints selon les individualités, mais le tableau des médailles manque d’or pour que la fête soit complète. Le sélectionneur reste pour sa part satisfait : “Nous n’avions pas vraiment de favori dans une des catégories et nous avions tablé sur quatre médailles. Nous avons donc obtenu les résultats espérés”, a-t-il confié à la DH. Rendez-vous en 2026 à Hulst, pour la revanche.

➡️ Découvrez les photos de la deuxième journée des championnats du monde de cyclo-cross à Liévin par notre photographe Alain Vandepontseele

➡️ Découvrez les photos de la dernière journée des championnats du monde de cyclo-cross à Liévin par notre photographe Alain Vandepontseele

Grégory Ienco

➡️ S’inscrire à l’infolettre pour la recevoir gratuitement tous les lundis ⬅️

L’UCI maintient son rêve de championnats du monde au Rwanda

Il s’agit certainement de la plus grande fierté du président de l’Union Cycliste Internationale (UCI), David Lappartient : organiser des championnats du monde sur route sur le territoire africain. Le rêve évoqué lors de sa candidature à la présidence a pris forme avec la désignation de Kigali, capitale du Rwanda, comme hôte des Mondiaux de 2025. Les parcours ont été façonnés, l’organisation a dû être maintes fois remaniée en raison de problèmes de corruption au sein de la fédération rwandaise de cyclisme et incombe désormais en partie à ASO (organisateur du Tour de France) et Golazo (organisateur du Tour de Belgique ou du Renewi Tour) : tout semble donc prêt pour permettre cet événement historique dans l’histoire cycliste.

Sauf que depuis plusieurs semaines, plusieurs fédérations (les Pays-Bas et le Danemark notamment) évoquent les prix des vols et des hôtels sur place pour justifier leur décision de ne pas emmener d’équipes de jeunes sur place, ce qui réduit fortement l’intérêt sportif de ces championnats du monde. Cela pouvait déjà être le cas pour Wollongong, en Australie, et d’autres fédérations hors de l’Europe ont également évité des voyages vers des destinations européennes (comme Glasgow ou Zürich) en raison de coûts de voyage tout aussi prohibitifs. Cela avait cependant moins de poids médiatique, au grand dam de ces organisations.

Les problèmes ne s’arrêtent cependant pas là. Sur le plan géo-politique, il s’annonce difficile d’organiser de telles courses à Kigali alors qu’à 150 kilomètres de là, un conflit violent concerne justement des soldats rwandais, annoncés comme des soutiens officieux de la force congolaise antigouvernementale M23 face à l’armée congolaise, à l’est de la République démocratique du Congo (RDC). Ces violences ont déjà fait des centaines de morts et des dizaines de milliers de déplacés en RDC et entraînent une crise humanitaire et diplomatique rare dans la région.

L’UCI a toutefois tenu à réitérer son soutien envers le Rwanda, vendredi dernier, en adressant un communiqué destiné à répondre aux rumeurs d’un plan B pour organiser les championnats du monde sur route à Martigny, en Suisse. “Le conflit en cours est confiné à la RDC, et le Rwanda reste entièrement sûr pour le tourisme et les affaires”, estime l’UCI. “Nous espérons une résolution rapide et pacifique de la situation.”

Il est inenvisageable pour la fédération internationale de ne pas soutenir le Rwanda en vue de l’organisation des Mondiaux, vu tous les moyens jusqu’ici mis en place pour assurer ces courses. Mais la situation géopolitique sur place devient de plus en plus tendue, et il serait étonnant de voir la fédération ne pas préparer un plan de secours. Pour les fédérations, difficile également de poursuivre les préparations de ces championnats du monde sans s’inquiéter de la situation sur place, que ce soit pour les populations locales ou pour leur propre sécurité. L’UCI va rapidement devoir se prononcer dans les prochaines semaines, au risque de voir les forfaits s’accumuler d’ici au mois de septembre.

L’arrêt d’Eurosport au Royaume-Uni provoque une énorme inflation des retransmissions cyclistes

Il est loin le temps où tous les fans de cyclisme pouvait profiter d’une saison quasiment complète à moins de 60 euros par an grâce à l’abonnement annuel d’Eurosport. Ce temps semble si lointain, et pourtant, c’était encore le cas voici deux ans… Aujourd’hui, pour les amatrices et amateurs belges, il faut s’acquitter au minimum de 119,90 euros par an (avec publicités) via la plateforme Max pour profiter du même programme, soit près du double du précédent abonnement le plus avantageux, à des conditions moindres. Cela reste toutefois bien moins que la facture des Britanniques à partir du mois prochain : Eurosport va en effet disparaître au Royaume-Uni et en Irlande et tout le catalogue proposé sur ces chaînes passera sur TNT, les autres chaînes sportives (payantes) du groupe Warner Bros. Discovery. Cela signifie un tarif de 30,99 livres sterling par mois pour accéder aux courses cyclistes disponibles sur Eurosport. Soit, au taux de change actuel, 37,16 euros par mois. Avec l’abonnement annuel, on arrive à 370 livres ou 443 euros !

L’inquiétude est évidemment grande parmi la communauté cycliste britannique que ces nouveaux prix prohibitifs fassent finalement plus de mal que de bien au vélo. L’ancien vainqueur du Giro Tao Geoghegan Hart s’est lui-même fendu d’une publication sur Instagram pour déplorer cette décision de Warner Bros. Discovery : “Tous les sports sont en compétition pour la même audience”, rappelle le sociétaire de Lidl-Trek. “Je pense qu’il est maintenant très pertinent de se rendre compte où va l’argent (des droits télévisés) et où il ne va pas. Et peut-être de remettre en question le monopole autour de la couverture sportive au Royaume-Uni”, a-t-il ajouté.

À l’heure des réseaux sociaux et des plateformes qui augmentent déjà leurs prix tous les six mois, on voit mal qui d’autre que des supporters très motivés pourraient se permettre un tel abonnement aussi cher. L’accessibilité devient de plus en plus restreinte, au grand dam d’un sport qui était justement connu pour sa proximité avec celles et ceux qui font le spectacle chaque jour. Et si cette situation est pour l’instant constatée uniquement outre-Manche, elle ne doit pas être prise comme une exception. Le fait que l’abonnement d’Eurosport Player à Max est passé du simple au double l’an dernier le confirme : même la Belgique et la France pourraient subir de telles inflations à terme, sur décision de groupes qui ne voient la communauté cycliste (ou tennistique, ou de ski, ou de biathlon…) que comme un infime pourcentage d’une base de clients à agrandir tous les ans pour le plaisir de la Bourse.

Il reste dès lors aux organisations et aux équipes à rester solidaires et à imaginer des ponts pour assurer la couverture de leur sport au plus grand nombre. Cela peut passer par des challenges de régularité pour regrouper les droits télévisés et obtenir plus facilement des accords avec les diffuseurs. Comme la Coupe de France (diffusée sur Eurosport et France Télévisions) ou la Coupe de Belgique officieuse reprise par Golazo (diffusée sur Eurosport et la VRT, et en partie sur la RTBF). Alors que les courses d’ASO, de RCS Sport ou de Flanders Classics ont les reins solides pour avoir le choix de leurs diffuseurs. Mais ces organisations ne doivent pas se montrer trop gourmandes au risque de voir leur public s’effacer au fil des années. Ce qui serait un drame après tous les efforts pour tenter de rajeunir le public des courses cyclistes.

➡️ ✍ Vous souhaitez nous partager une info sur le monde cycliste professionnel ? Envoyez-nous un e-mail à greg@cyclismerevue.be

Les nouvelles des derniers jours

🏥 Sur la touche

  • La sélection néerlandaise n’a pu compter sur la multiple championne du monde de cyclo-cross Marianne Vos lors de la dernière édition des Mondiaux, le week-end dernier. La cycliste de 37 ans, qui espérait viser un neuvième titre mondial, a chuté lors de la Coupe du monde de cyclo-cross à Maasmechelen, une semaine plus tôt, et a été touché au mollet. Contrainte à l’abandon le lendemain à Hoogerheide, Vos a dû se rendre à l’évidence qu’une participation au Mondial était compromise. C’est ce qu’a confirmé la fédération néerlandaise de cyclisme mardi sur ses réseaux sociaux. La reprise sur route de la Néerlandaise est actuellement prévue sur la Semaine cycliste valencienne, du 13 au 16 février, avant Milan-Sanremo, le 22 mars.
  • L’Italien Stefano Oldani (Cofidis) a été malmené dès son premier week-end de course : après un abandon sur le GP Castellon, il a aussi renoncé sur le GP de Valence à la suite d’une collision avec un autre coureur qui a chuté devant lui. Il a terminé à l’hôpital avec une fracture du radius, une fracture du cubitus et une fracture du scaphoïde, a-t-il révélé sur Instagram. Il sera au moins un mois absent des pelotons.
  • Six membres de l’équipe nationale allemande de cyclisme sur piste ont été blessés à la suite d’une collision avec un automobiliste près de l’aéroport de Palma de Majorque, en Espagne. La fédération allemande de cyclisme, en charge de ce stage dédié à la préparation des championnats d’Europe de cyclisme sur piste, a rapporté l’accident lundi. L’ancien champion d’Europe espoirs Tobias Buck-Gramcko, Benjamin Boos, Bruno Kessler, Max-David Briese, Moritz Augenstein et Louis Gentzik ont été impliqués dans l’accident, causé par un conducteur de 89 ans. Kessler a pu sortir de l’hôpital dès lundi alors que Gentzik a subi une fracture à l’épaule, une commotion et des hématomes au poumon. La vie d’aucun d’entre eux n’a été en danger, a précisé la fédération allemande.
  • Victime d’une chute dans le final de la 3e étape de l’AlUla Tour et contraint à l’abandon après avoir percuté un poteau, le Néerlandais Nils Eekhoff (Team picnic-PostNL) a quitté l’Arabie saoudite avec une fracture de la mâchoire et une dent cassée. Il devrait être absent au moins six à huit semaines des pelotons.

❌ Sur le départ

  • Toujours sans contrat après la fin de son dernier engagement avec INEOS Grenadiers, l’Italien Elia Viviani n’a toujours pas officiellement annoncé sa retraite. Son départ des pelotons semble toutefois acté, selon le quotidien italien Il Giornale. Deux offres seraient sur la table de l’ancien champion du monde et olympique sur piste : un poste dans le staff technique d’INEOS Grenadiers ou une proposition comme sélectionneur de l’équipe italienne sur route (à la place de Daniele Bennati, sur la sellette) avec une supervision de l’équipe sur piste. Il reste désormais à Viviani à se positionner.
  • Le Français Anthony Delaplace (Arkéa-B&B Hôtels) a annoncé sa retraite à la fin de la saison 2025. Le coureur de 35 ans a confirmé son désir d’arrêter au bout de cette 16e saison parmi les professionnels. Delaplace a notamment remporté la Polynormande en 2011, le Tour de Normandie et le Duo Normand (avec Pierre-Luc Périchond) en 2017 et Paris-Camembert en 2022.

📅 Programme

  • Le parcours de la 77e édition du Critérium du Dauphiné a été officiellement présenté par les équipes d’ASO, mercredi dernier. La montagne sera une nouvelle fois la reine de cette semaine entre l’Auvergne et les Alpes. Le départ vallonné depuis Montluçon et les étapes suivantes arrivant à Issoire et démarrant à Brioude seront autant d’occasions de célébrer l’enfant de la région, Romain Bardet, qui a programmé sa retraite sur route à la sortie de ce Dauphiné. La quatrième étape permettra une première sélection pour le classement général avec un contre-la-montre individuel exigeant de 17,7 kilomètres. Après une nouvelle étape vallonnée vers Mâcon, la course prendra de la hauteur pour les trois dernières étapes dans les Alpes avec une arrivée pour puncheurs à Combloux (2,7 km à 8,2% de moyenne), avant deux journées de haut vol en altitude, vers Valmenier 1800 (16,5 km à 6,7%), après des passages sur la Madeleine et la Croix de Fer, puis vers le Plateau du Mont Cenis (9,6 km à 6,9%), après une étape en montée constante. Ce Dauphiné sera surtout la première occasion de revoir Tadej Pogacar, Jonas Vingegaard et Remco Evenepoel, les trois premiers du dernier Tour de France, s’affronter à nouveau.
  • Cliquez sur ce lien pour découvrir les détails des étapes

  • La Coupe de France connaîtra quelques changements en 2025, comme le rapporte DirectVélo. La compétition a démarré dimanche dernier au GP La Marseillaise, et se poursuivra à travers 18 épreuves jusqu’au Tour de Vendée, le 11 octobre. La Classic Loire-Atlantique, annulée, disparaît du calendrier par rapport à l’an dernier. Paris-Camembert, bien à l’agenda, ne sera également plus dans ce challenge, alors que la Classic Grand Besançon Doubs et le Tour du Jura y feront leur entrée. Le CIC Mont Ventoux effectue pour sa part son retour dans le calendrier, du moins si l’organisation assure son budget. Enfin, la Coupe de France connaîtra deux nouveaux classements en 2025 : un classement pour les grimpeurs (calculé sur le GP La Marseillaise, la Classic Grand Besançon Doubs, le Tour du Jura, le Tour du Doubs, la Mercan’Tour Classic Alpes-Maritimes et le CIC Mont Ventoux) et un classement pour les sprinters (calculé sur toutes les autres courses).
  • L’UCI a présenté le calendrier de la Coupe du monde de cyclo-cross en 2025-2026. Celle-ci débutera le 23 novembre à Tabor, en République tchèque, avant un nouveau rendez-vous à Flamanville, une semaine plus tard. Les fans de cyclo-cross découvriront enfin le parcours de Cabras, en Sardaigne, le 7 décembre, avant l’arrivée en Belgique, via Namur (14 décembre) et Anvers (20 décembre). La date du 21 décembre est réservée pour la 6e manche, mais la localisation doit encore être précisée. La Coupe du monde se poursuivre le 26 décembre à Gavere, le 28 décembre à Termonde, le 4 janvier à Zonhoven, avant un final similaire à cet hiver : le 18 janvier à Benidorm, le 24 janvier à Maasmechelen et le lendemain à Hoogerheide. Le cyclo-cross de Dublin semble donc disparaître du calendrier à l’heure actuelle. Notons encore que Hulst organisera les prochains championnats du monde début février 2026.

➡️ ✍ Vous souhaitez nous partager une info sur le monde cycliste professionnel ? Envoyez-nous un e-mail à greg@cyclismerevue.be

🖤 Carnet noir

  • La série noire ne s’arrête définitivement pas cette année… À peine une semaine après le décès de l’Italienne Sara Piffer (19 ans) sur ses routes d’entraînement, le Britannique Aiden Worden a perdu la vie, samedi dernier, dans un accident similaire dans la région du Lancashire. Le cycliste de 18 ans, ex-spécialiste du BMX, était devenu champion britannique du contre-la-montre sur la distance de 25 miles chez les juniors en 2024. British Cycling a communiqué lundi sur ce terrible décès, déjà le second de l’année parmi la communauté cycliste.

🤑 Économie

  • Bonne nouvelle pour l’équipe de Jean-François Bourlart : la chaîne française de supermarchés Intermarché a prolongé son partenariat avec l’équipe Intermarché-Wanty jusqu’en 2028. La société spécialisée dans la distribution est partenaire depuis 2021 et a pu profiter ces dernières saisons de la montée en puissance de l’équipe WorldTour au plus petit budget, avec des succès sur Gand-Wevelgem, le Tour d’Italie, le Tour d’Espagne, et surtout le maillot vert du Tour de France grâce à Biniam Girmay l’an dernier.
Photo : Intermarché-Wanty/Cyclingmedia Agency
  • L’équipe continentale française Komugi-Grand Est n’est officiellement plus, comme le rapporte DirectVélo. La formation féminine avait déjà perdu le soutien de la société informatique Komugi en cours de saison, mais avait réussi à terminer 2024 grâce à “d’autres sponsors et leur précieux mécène”. Les dirigeants ont ainsi affirmé par voie de communiqué se réserver “le droit d’engager les poursuites judiciaires nécessaires au paiement du partenariat dû” par Komugi. Le manager Laurent Goglione a toutefois déclaré à DirectVélo son souhait de repartir en 2026 avec un nouveau projet. L’équpe comptait 13 coureuses en 2024 et a connu plusieurs top 10 comme une 5e place pour Ségolène Thomas sur le Tour des Pyrénées ou une 7e place de Fabienne Buri sur le Chrono de Gatineau.

💉 Dopage

  • Le Mouvement Pour un Cyclisme Crédible (MPCC) a présenté son habituel baromètre du dopage, reprenant les cas de triche tant dans le cyclisme que dans d’autres sports professionnels. Il apparaît que l’athlétisme reste encore et toujours le sport le plus touché par les cas de dopage avec 161 cas positifs sur l’année 2024, devant l’haltérophilie (72) et la force athlétique (63). Le cyclisme (route, piste, VTT, BMX, paracyclisme) reste loin de ces sphères, en neuvième position avec 20 cas positifs sur la dernière saison. Cela signifie une baisse du nombre de cas depuis le dernier pic en 2022, mais cela reste plus élevé qu’en 2020, 2021 ou avant 2018 (NDLR: le MPCC tient le relevé de ces données depuis 2014). Le mouvement s’inquiète toutefois de nouvelles pratiques qui mettent à mal la crédibilité du sport. Le mantra “Tout ce qui n’est pas interdit est autorisé”, “attise malheureusement la suspicion sur nos athlètes et notre sport”, déplore le MPCC, qui appelle donc à des règlements plus stricts sur certaines pratiques.
Crédit : MPCC
  • L’Union Cycliste Internationale (UCI) a profité de son comité directeur organisé en marge des championnats du monde de cyclo-cross pour officialiser l’interdiction de l’inhalation répétée de monoxyde de carbone (CO) dès le 10 février. Cette pratique avait été révélée au grand public lors du dernier Tour de France et Jonas Vingegaard, notamment, avait récemment appelé à son interdiction. Dans ce type de pratique, le CO pouvait être utilisé pour tenter d’améliorer le volume sanguin et le transport d’oxygène par l’hémoglobine. Cependant, une inhalation répétée peut mener à de graves problèmes de santé comme des maux de tête, des nausées, voire des crises d’épilepsie ou paralysies. L’UCI a décidé d’interdite la possession de système permettant la réinspiration de CO, hors d’une structure médicale. L’inhalation de CO restera cependant autorisée au sein d‘une structure médicale et seulement pour la mesure de la masse totale d’hémoglobine.

🌈 Sélections

  • Les nouveaux sélectionneurs de l’équipe belge de cyclisme sur piste Tim Carswell et Jonny Mitchell ont révélé leur première sélection pour les championnats d’Europe sur piste, organisés du 12 au 16 février à Heusden-Zolder. Lotte Kopecky, qui a décidé de reprendre sa saison en mars sur Milan-Sanremo, et Fabio Vanden Bossche ne seront pas de la partie, mais le groupe belge sera jeune et ambitieux. Chez les femmes, Katrijn De Clercq, Hélène Hesters, Febe Jooris, Marith Vanhove, Luca Vierstraete et Lani Wittevrongel seront de la partie. L’équipe de vitesse masculine sera menée par Runar De Schrijver, Wannes Magdelijns, Lowie Nulens et Mathijs Verhoeven. Thibaut Bernard, Tom Crabbe, Jasper De Buyst, Tuur Dens, Lindsay De Vylder, Jules Hesters, Renzo Raes et Noah Vandenbranden seront aussi présents côté masculin.

📌 Autres

  • C’est la fin d’une longue procédure judiciaire qui se termine enfin, six ans plus tard : la Cour de cassation, plus haute juridiction belge, a confirmé lundi dernier l’arrêt du travail d’Anvers du 9 juin 2021 qui impose à Wout van Aert à payer une indemnité de 662.404 euros à la structure derrière son ancienne équipe, Sniper Cycling. Le tribunal estime qu’il a “abusivement mis fin à son contrat de travail pour une raison impérieuse”, en décidant de quitter Sniper Cycling, dirigé par Nick Nuyens, pour Jumbo-Visma durant l’hiver 2018-2019. Sniper Cycling avait réclamé que Van Aert s’acquitte d’une indemnité de rupture de contrat de 1,1 million d’euros. La Cour de cassation met donc fin à ce feuilleton judiciaire. Notons encore que Sniper Cycling doit vers 10.000 euros à Wout van Aert pour une prime non payée.
  • Plus de sept mois après le championnat du Danemark du contre-la-montre, Matias Skjelmose (Lidl-Trek) va devoir rendre son maillot rouge et blanc à Johan Price-Pejtersen (Alpecin-Deceuninck). Ce dernier avait obtenu un meilleur temps que Skjelmose (pour une seconde !), mais avait été disqualifié par le jury des commissaires pour avoir roulé quelques centaines de mètres sur un trottoir, ce qui est interdit par le règlement. Price-Pejtersen avait refusé la décision et fait appel. La fédération danoise a finalement donné raison au coureur de 25 ans, qui pourra donc porter le maillot de champion du Danemark sur les contre-la-montre jusqu’en juin prochain.

  • Toujours en revalidation et enfin de sortie samedi dernier, près de deux mois après sa lourde chute avec une factrice, Remco Evenepoel s’est retrouvé dans l’actualité pour un fait divers… concernant un autre facteur. Ce dernier a été surpris par des caméras de surveillance en train de récupérer les cartes de débit et de crédit de 23 personnes, ainsi que les codes, pour voler ses victimes. Parmi les cartes interceptées, l’une d’elles appartenait à une société dont Remco Evenepoel était actionnaire. 9.000 euros ont été retirés grâce à cette carte. Durant le procès, le facteur a expliqué qu’il utilisait ces montants pour des jeux d’argent. Le parquet a requis 18 mois de prison, dont 15 avec sursis probatoire. Le tribunal se prononcera le 27 février sur cette affaire.
  • Le Norvégien Søren Wærenskjold a refusé d’aller sur l’AlUla Tour, cette saison, pour des raisons “morales et éthiques”, a-t-il expliqué à la télévision norvégienne TV2. “Je veux faire le bon choix moralement et éthiquement, et ne pas mettre mon salaire au-dessus de tout. Je l’ai exprimé auprès de mon équipe et ils respectent ma position, même s’ils déterminent mon programme. Mais je veux essayer d’être ‘du bon côté’ si je peux dire. On parle de droits humains. Il y a des preuves de personnes emprisonnées ou même tuées pour leurs opinions politiques. Puis il y a les droits des homosexuels, des femmes… Il y a beaucoup de problèmes”, a-t-il confié à propos de l’Arabie saoudite. Une position rarement évoquée publiquement dans le peloton.

À lire, voir, écouter…

  • À l’aube de la nouvelle saison de cyclisme sur route, la Néerlandaise Demi Vollering s’est ouverte sur son compte Instagram sur sa déception suivant sa deuxième place sur le Tour de France, perdu pour quatre secondes face à Kasia Niewiadoma. “Il s’agissait d’une des journées les plus difficiles de ma carrière. Physiquement, je récupérais encore de ma chute deux jours plus tôt. Mentalement, j’avais la pression sur les épaules, de la part des médias, de mon équipe, de mes proches, et de moi-même”, a-t-elle écrit. “À l’intérieur, j’avais peur et j’étais inquiète. (…) Avec du recul, je réalise qu’il s’agissait de l’un de mes plus grandes victoires (…) parce que je suis passée au-dessus de l’un des pires moments auxquels j’ai fait face.” Vollering revient par ailleurs sur l’anxiété qui a miné son Tour. “J’avais l’impression de laisser tomber tout le monde”, dit-elle. Elle a par ailleurs évoqué le fait qu’elle avait en prime découvert plus tard dans la journée qu’elle avait ses règles. “Les hormones peuvent amplifier les émotions, et avec la pression que je ressentais déjà, c’était beaucoup à gérer. C’est un rappel que notre corps et nos esprits sont connectés, et parfois, les choses ne sont pas sous votre contrôle”, a-t-elle rappelé. Un rappel important que le psychologique est aussi important que le physique.
Photo : ASO/Billy Ceusters
  • Fraîchement arrivé à la tête de la sélection belge de cyclisme sur route, Serge Pauwels sait qu’il sera attendu au tournant après la réussite de son ancien patron, Sven Vanthourenhout. L’ancien pro a déjà pris des contacts lors des stages des équipes en Espagne avec les coureurs belges intéressés pour les championnats du monde au Rwanda et d’Europe en Ardèche. Il a confirmé à la DH que seul Remco Evenepoel est pour l’heure intéressé par le contre-la-montre des Mondiaux et il dit espérer convaincre certains sélectionnés aux championnats du monde de doubler avec l’Euro, prévu la semaine suivante. “Si vous travaillez à la construction de votre condition pendant delongues semaines afin d’arriver au top pour la fin septembre, autant tenter d’exploiter encore cette forme sept jours plus tard…”, a-t-il expliqué.
  • L’interview est à lire en cliquant sur ce lien.
  • Le transfert du Français Lenny Martinez chez Bahrain Victorious a été l’un des plus commentés durant l’hiver. Le coureur de 21 ans aurait-il choisi l’argent pour rejoindre une équipe sponsorisée par un État où les droits humains ne sont pas du tout la priorité ? Martinez affirme dans Vélo Magazine qu’il avait pourtant signé dans sa nouvelle équipe depuis début 2024 et qu’il n’a pas négocié son contrat avec Bahrain Victorious. “Je ne vais pas signer dans une équipe où le salaire est pourri. Une carrière, c’est vraiment court. Groupama-FDJ me proposait aussi un contrat, d’autres formations aussi, mais à la fin, la différence n’est pas énorme…”, dit-il. “Le truc qui m’a marqué avec eux, c’était leur envie de m’avoir. Je sentais une telle assurance dans ce projet autour de moi que ça m’a donné super confiance en moi-même”, ajoute-t-il par rapport à sa nouvelle équipe. Il évoque du harcèlement et des messages de haine à son encontre.
  • L’interview est à lire sur ce lien
  • Marion Rousse est une directrice de course heureuse. L’ancienne championne de France sur route, qui “ne pouvais pas vivre” de son métier, s’est réjoui sur Eurosport du spectacle proposé ces dernières saisons sur le Tour de France Femmes et du fait qu’on “parle des championnes” aujourd’hui en parlant des leaders du cyclisme féminin. “Ma volonté, quand on a instauré le Tour de France Femmes avec Zwift, était que cela suive, que les filles puissent avoir un salaire, vivre de leur sport. L’enjeu était d’obtenir de la visibilité, grâce à la course la plus connue du monde”, a-t-elle expliqué. Elle ne souhaite pas forcément voir un Tour féminin de trois semaines, exprimant la nécessité de faire évoluer le peloton au fil des saisons, avant d’envisager une course plus rude encore.
  • L’interview est à lire sur ce lien
  • Comment il est arrivé chez Groupama-FDJ, sa préparation pour 2025 et ses envies pour l’avenir, les changements dans le peloton et les préparations… : le Français Guillaume Martin se confie sur son vélo à l’occasion d’une sortie d’entraînement avec la chaîne YouTube En Danseuse, à voir ci-dessous.

  • Le manager de XDS Astana Alexandre Vinokourov se veut optimiste quant à l’avenir de son équipe, malgré sa position difficile dans la lutte pour le maintien dans le WorldTour en 2026. “Je crois que la roue va tourner enfin dans le bon sens”, explique dans L’Équipe le Kazakh, qui estime que cette situation sportive est notamment due à une gestion d’équipe “très mauvaise”, “par les actionnaires qui ne connaissaient pas grand chose à ce sport”. “Malheureusement, on a chuté, à cause de tensions internes qu’on aurait pu éviter s’ils avaient suivi ma vision et mon expérience”, indique Vinokourov, qui a raconté comment il avait failli être évincé en 2023, notamment par des partenaires kazakhs et la fédération kazakhe de cyclisme. Il confirme que l’arrivée de XDS permet à l’équipe de disposer d’un budget de “moins de 30 millions d’euros”, avec un financement à 60% de la part du constructeur chinois.
  • L’interview est à lire en cliquant sur ce lien.

Le coin promo

  • Comme chaque année , nous vous proposons un calendrier à télécharger et à installer sur votre téléphone ou votre ordinateur, pour ne rien manquer des différentes courses professionnelles sur route de l’année, que ce soit chez les femmes ou les hommes. Tous les détails pratiques sont sur ce lien.
  • Découvrez le programme TV complet des courses cyclistes (route, piste, cyclo-cross, VTT…) diffusées ces prochaines semaines en Belgique et en France sur notre page spéciale, mise à jour quotidiennement : c’est à voir sur ce lien.

Pour profiter des retransmissions télévisées des courses cyclistes depuis l’étranger, n’hésitez pas à utiliser NordVPN, un programme vous permettant de rejoindre des réseaux privés virtuels protégés dans le monde entier. Pour accéder à ces retransmissions télévisées depuis le monde entier, un VPN peut vous aider, tout en vous protégeant. NordVPN vous propose un abonnement de deux ans avec une réduction allant jusqu’à 73%. Chaque nouvel abonné recevra par ailleurs trois mois d’abonnement offerts. Des offres combinées avec NordPass et du stockage cloud sont par ailleurs disponibles ! Tout abonnement à NordVPN est un soutien supplémentaire à CyclismeRevue.

Les résultats des derniers jours

Route

  • Cadel Evans Great Ocean Road Race – Femmes 🇦🇺 (1.WWT)
    • 01/02 : Ally Wollaston 🇳🇿 (FDJ-Suez)
  • Cadel Evans Great Ocean Road Race – Hommes  🇦🇺 (1.UWT)
    • 02/02 : Mauro Schmid 🇨🇭 (Team Jayco-AlUla)
  • AlUla Tour 🇸🇦 (2.1)
    • 1re étape (28/01) : Tim Merlier 🇧🇪 (Soudal Quick-Step)
    • 2e étape (29/01) : Tom Pidcock 🇬🇧 (Q36.5 Pro Cycling Team)
    • 3e étape (30/01) : Tim Merlier 🇧🇪 (Soudal Quick-Step)
    • 4e étape (31/01) : Tom Pidcock 🇬🇧 (Q36.5 Pro Cycling Team)
    • 5e et dernière étape (01/02) : Matteo Moschetti 🇮🇹 (Q36.5 Pro Cycling Team)
    • Classement général : Tom Pidcock 🇬🇧 (Q36.5 Pro Cycling Team)
  • Surf Coast Classic – Femmes 🇦🇺 (1.1)
    • 29/01 : Ally Wollaston 🇳🇿 (FDJ-Suez)
  • Surf Coast Classic – Hommes 🇦🇺 (1.1)
    • 30/01 : Tobias Lund Andresen 🇩🇰 (Team picnic-PostNL)
  • Challenge de Majorque masculin 🇪🇸 (1.1)
    • Trophée Calvià (29/01) : Jan Christen 🇨🇭 (UAE Team Emirates-XRG)
    • Trophée Ses Salines (30/01) : Marijn van den Berg 🇳🇱 (EF Education-EasyPost)
    • Trophée Serra Tramuntana (31/01) : Florian Stork 🇩🇪 (Tudor Pro Cycling Team)
    • Trophée Andratx-Pollença (01/02) : course annulée sur décision des coureurs en raison de conditions dangereuses
    • Trophée Palma (02/02) : Iúri Leitão 🇵🇹 (Caja Rural-Seguros RGA)
  • Grand Prix La Marseillaise 🇫🇷 (1.1)
    • 02/02 : Valentin Ferron 🇫🇷 (Cofidis)
  • Grand Prix Antalya Airport City 🇹🇷 (1.2)
    • 01/02 : Wan Abdul Rahman Hamdan 🇲🇾 (Terengganu Cycling Team)
  • Championnats d’Équateur sur route 🇪🇨 (CN)
    • Contre-la-montre élites hommes (31/01) : Jefferson Cepeda 🇪🇨 (Movistar Team)
    • Contre-la-montre élites femmes (31/01) : Miryam Nuñez 🇪🇨 (-)
    • Course en ligne élites femmes (02/02) : Esther Galarza Munoz 🇪🇨 (-)
    • Course en ligne élites hommes (02/02) : Jhonatan Narváez 🇪🇨 (UAE Team Emirates XRG)

Cyclo-cross

  • Championnats du monde de cyclo-cross à Liévin 🇫🇷 (CM)
    • Relais mixte par équipes (31/01) : Grande-Bretagne 🇬🇧 (Zoe Backstedt, Milo Wills, Zoe Roche, Oscar Amey, Cat Ferguson et Thomas Mein)
    • Juniors femmes (01/02) : Lise Revol 🇫🇷
    • Espoirs hommes (01/02) : Tibor del Grosso 🇳🇱
    • Élites femmes (01/02) : Fem van Empel 🇳🇱
    • Juniors hommes (02/02) : Matteo Agostinacchio 🇮🇹
    • Espoirs femmes (02/02) : Zoe Bäckstedt 🇬🇧
    • Élites hommes (02/02) : Mathieu van der Poel 🇳🇱

L’agenda des prochains jours

Mardi 4 février

  • Aucune course UCI prévue ce jour

Mercredi 5 février

  • Tour de la Communauté de Valence masculin 🇪🇸 (2.1) – 1re étape
    • Orihuela > Orihuela (34,5 km – CLM par équipes ⏱️)
    • Liste des partants
    • 📺 Direct dès 16h05 sur Eurosport 1 et HBO Max
  • Étoile de Bessèges 🇫🇷 (2.1) – 1re étape
    • Bellegarde > Bellegarde (159,1 km)
    • Liste des partants
    • 📺 Direct dès 14h00 sur La Chaîne L’Équipe et RTBF Auvio

CYCLO-CROSS

  • Exact Cross – Maldegem 🇧🇪 (C2)
    • Parcours et partants
    • 📺 Direct dès 13h30 sur VRT 1, Sporza.be et VRT Max, et dès 13h40 sur Eurosport 1 et HBO Max

Jeudi 6 février

  • UAE Tour Femmes 🇦🇪 (2.WWT) – 1re étape
  • Tour de la Communauté de Valence masculin 🇪🇸 (2.1) – 2e étape
    • La Nucía > Benifato (165,8 km)
    • Liste des partants
    • 📺 Direct dès 15h30 sur Eurosport 1 et HBO Max
  • Étoile de Bessèges 🇫🇷 (2.1) – 2e étape
    • Domessargues > Marguerittes (165,8 km)
    • Liste des partants
    • 📺 Direct dès 14h00 sur La Chaîne L’Équipe, et dès 14h05 sur RTBF Auvio

Vendredi 7 février

  • UAE Tour Femmes 🇦🇪 (2.WWT) – 2e étape
  • Tour de la Communauté de Valence masculin 🇪🇸 (2.1) – 3e étape
  • Étoile de Bessèges 🇫🇷 (2.1) – 3e étape
    • Bessèges > Bessèges (164,1 km)
    • Liste des partants
    • 📺 Direct dès 14h00 sur La Chaîne L’Équipe, et dès 14h05 sur RTBF Auvio

Samedi 8 février

  • UAE Tour Femmes 🇦🇪 (2.WWT) – 3e étape
  • Tour d’Oman 🇴🇲 (2.Pro) – 1re étape
  • Tour de la Communauté de Valence masculin 🇪🇸 (2.1) – 4e étape
    • Oropesa del Mar > Portell de Morella (181,3 km)
    • Liste des partants
    • 📺 Direct dès 16h15 sur Eurosport 2 HBO Max
  • Étoile de Bessèges 🇫🇷 (2.1) – 4e étape
    • Vauvert > Le Mont Bouquet (155,7 km)
    • Liste des partants
    • 📺 Direct dès 14h25 sur La Chaîne L’Équipe, et dès 14h30 sur RTBF Auvio

CYCLO-CROSS

  • Superprestige #8 – Noordzeecross à Middelkerke 🇧🇪 (C1)
    • Parcours et partants
    • 📺 Direct dès 13h30 sur VRT 1, Sporza.be et VRT Max, dès 13h40 sur Pickx Showcase, Pickx Pop-up Sports et Pickx+ Sports 1, et dès 13h45 sur Eurosport 2 et HBO Max

Dimanche 9 février

  • UAE Tour Femmes 🇦🇪 (2.WWT) – 4e et dernière étape
    • Abu Dhabi > Abu Dhabi (128 km)
    • Liste des partantes
    • 📺 Direct dès 12h00 sur Eurosport 2 et HBO Max
  • Tour de la Communauté de Valence féminin 🇪🇸 (1.Pro)
    • Alfafar > Valence (103,9 km)
    • Liste des partantes
    • 📺 Direct dès 11h00 sur Eurosport 2 et HBO Max
  • Tour d’Oman 🇴🇲 (2.Pro) – 2e étape
  • Tour de la Communauté de Valence masculin 🇪🇸 (2.1) – 5e et dernière étape
    • Alfafar > Valence (103,9 km)
    • Liste des partants
    • 📺 Direct dès 16h05 sur Eurosport 2 et HBO Max
  • Étoile de Bessèges 🇫🇷 (2.1) – 5e et dernière étape
    • Alès > Alès (10,7 km – CLM individuel ⏱️)
    • Liste des partants
    • 📺 Direct dès 13h55 sur RTBF Auvio, et dès 14h00 sur L’Équipe Live
  • Tour d’Algérie 🇩🇿 (2.2) – 1re étape

CYCLO-CROSS

  • Trophée X2O Badkamers #7 – Krawatencross à Lille 🇧🇪 (C1)
    • Parcours et partants
    • 📺 Direct dès 13h30 sur VRT 1, Sporza.be et VRT Max, et dès 13h40 sur Eurosport 2 et HBO Max

Lundi 10 février

  • Tour d’Oman 🇴🇲 (2.Pro) – 3e étape
  • Tour d’Algérie 🇩🇿 (2.2) – 2e étape

Merci pour votre lecture !

On vous retrouve le lundi 10 février 2025 dans votre boîte aux lettres numérique !

N’hésitez pas à partager cette infolettre avec vos proches et à nous suivre sur CyclismeRevue.be ainsi que nos réseaux sociaux pour ne rien manquer de l’actualité cycliste.

➡️ Pour recevoir gratuitement notre infolettre tous les lundis après-midi, inscrivez-vous sur ce lien

#7 #8

The Wiert Corner - irregular stream of stuffwiert.me@wiert.me
2025-01-01

Old programming books had cool little “puns” in their references, modern lack them in their indices. On the why, and history of them.

I wrote a two earlier blog posts around puns in programming book indices before:

  1. the 1992 Turbo Pascal 7.0 Language Guide having both entry in the manual about Recursion (“recursive loop, see recursive loop”) which of course is similar to “infinite loop” and entries for “infinite loop See loop, infinite” and “loop, infinite See infinite loop”.
  2. infinite loop in “LaTeX: A Document Preparation System” by Leslie Lamport, printed in 1994.

In the last one, I promised to list more occurrences which I now finally had time for to do.

But let me first elaborate more on the observation that modern computer books (like for instance on C# and Delphi beyond version 1) lack these kinds of index pun.

On the Delphi side, the index entry joke for recursion got removed no later than Delphi 3 (I am still looking for a Delphi 2 version of the Object Pascal Language Guide, see further below) even before the book being fully redone electronically and the index pages generation being automated in

I think I even understand why that is: the process of creating of indices. By the start of this century, more and more indices were automatically being generated and for the last 2 decades or so, all of them are. Back in the days however, indices were mostly done by hand. Nowadays, with everything automated, it is actually pretty tricky in most environments to add such an “infinite loop” index entry like in the Turbo Pascal book, as it would require two things at once:

  • a manually designated tag to be present inside the index itself (either on an index entry or on a specific page)
  • an automatically generated index

It is really tough to make these two happen at the same time, especially in an era where cost of publishing needs to be minimised.

With past manual index maintenance, adding a pun entry way was easier: just add one or two manual entries in the correct style and you were done.

I am not alone in this thought process:

  1. [Wayback/Archive] HAMMER SMASHED FILESYSTEM 🇺🇦: “@kbob @mahmoudajawad I find it…” – the Octodon
    @kbob @mahmoudajawad I find it much more likely that this was a deliberate decision than that any sort of sophisticated automation was involved. See the “Tools for Printing Indexes” by Bentley & Kernighan paper for detail of what a state of the art was at the time the book was produced. The tooling is likely to be very close to what was actually used given one of the paper’s authors is indeed Brian Kernighan.
  2. [Wayback/Archive] HAMMER SMASHED FILESYSTEM 🇺🇦: “@kbob Link to the paper: https…” – the Octodon

    @kbob Link to the paper: https://meresh.com/files/troff/Tools%2…

    [Wayback/Archive] meresh.com/files/troff/Tools for Printing Indexes, Jon L. Bentley, Brian W. Kernighan, October 1986.pdf [Wayback PDF View/PDF View]

    This paper describes a set of programs for processing and printing the index for a
    book or a manual. The input is a set of lines containing index terms and page numbers.
    (Disclaimer: these programs do not help with the original creation of index terms!) The
    programs collect multiple occurrences of the same terms, compress runs of page numbers,
    create permutations (e.g., ‘‘index, book’’ from ‘‘book index’’), and sort them into proper
    alphabetic order. The programs can cope with embedded formatting commands (size and
    font changes, etc.) and with roman numerals.

    The implementation uses an unusual software style: a long pipeline of short awk
    programs. This structure makes the programs easy to adapt or augment to meet the spe-
    cial requirements that arise in many indexes. The programs were intended to be used
    with troff, but can be used with TEX or monk[1] with minor changes.

    The above bold emphasis is mine.

  3. [Wayback/Archive] Kernel Bob: “@lkundrak @mahmoudajawad Yeah,…” – chaos.social

    @lkundrak @mahmoudajawad Yeah, I was thinking about that paper. In any case, the squirrel didn’t make it into the 2nd Edition.

    (see the K&R book reference below for the explanation about “squirrel”)

Pun index references are not limited to books

I think the most notable example of this is the Jargon File, which was already mentioned above on “squirrelcide”. The Jargon File has been in a kind of sleeping mode as of 2004, but officially it is still maintained by Eric S. Raymond (for many, he is famous next to the Jargon File for both taking over Fetchmail, and writing The Cathedral and the Bazar which is based on both the development processes of of the Linux kernel and Fetchmail, though by now there is controversy and in March 2020, [Wayback/Archive] reddit: Eric S. Raymond was today banned from the OSI. He co-founded the Open Source Initiative in 1998 : programming).

Since the early 1980s, the Jargon File has these (back then text entry, now html entry):

There are likely many more, but lets not digress too much for now (:

The entries were introduced between [Wayback/Archive] www.catb.org/jargon/oldversions/jarg1-81-MM-DD.txt [Wayback/Archive] www.catb.org/jargon/oldversions/jarg1-82-11-14.txt, changed format in various later versions for better readability/parsability until it finally became an html file.

Pun references books are not limited to programming books

A small diversion to two math books, both by mathematician Sheldon Axler. Relatively modern books, but classic puns.

Let’s start with Measure, Integration & Real Analysis (open access, updated 2020), Springer, November 2019 of which I know one joke: [Wayback/Archive] Measure, Integration & Real Analysis – MIRA.pdf [Wayback PDF View/PDF View] Chapter 2, page 44: cat saying “μ” (for “Another mew”)

[Wayback/Archive] 354250655-e52e192f-022d-41a7-87a9-a4dd8d30142a.png (589×999)

But his most recent book Linear Algebra Done Right, fourth edition, Undergraduate Texts in Mathematics, Springer, 2024 has quite a few page number jokes for which I made screenshots from [Wayback/Archive] LADR.pdf [Wayback PDF View/PDF View]:

  1. page 22: 7𝜋 (as 22/7 is a really good approximation of pi)

    [Wayback/Archive] 354253021-cc9214d4-a6a4-4ca0-a253-c47977a4b862.png (564×958)

  2. page 141: ≈ 100√2

    [Wayback/Archive] 354252012-f4b92b34-9d95-4c27-a411-c12ae4a85922.png (564×958)

  3. page 272 ≈ 100e

    [Wayback/Archive] 354252230-5760eb00-faaf-46db-be88-ec9c19ccc2f9.png (564×958)

  4. page 341: ≈ 100pi

    [Wayback/Archive] 354252334-af2618ce-969a-4aab-9b80-4f0be3c6e540.png (564×958)

I found the above via these two Reddit posts:

  1. [Wayback/Archive] Beautifully written math textbooks which don’t lack rigour : math which has a wealth of books if you want to go really deep into mathematics in an inviting way
  2. [Wayback/Archive] Infinite loop : ProgrammerHumor which showed a photograph of the LaTeX index joke.

The last brings us back to…

Programming book index puns

The Turbo Pascal and LaTeX books were not alone containing index jokes. Below are a quite a few more.

Finding on-line PDF versions of some of these books was not easy, and for some completely failed. So this blog post is also the result of quite a journey (:

The Art of Computer Programming (1968–) 3rd edition has a Circular Definition pun

This started with the 2020 post [Wayback/Archive] Jan Wildeboer 😷:krulorange:: “And no, Stroustroup did NOT do this in the C++ book and also no, Knuth didn’t do this in AOCP :)…” – social.wildeboer.net.

AOCP and TAOCP of course reference the seminal book series “The Art of Computer Programming” on which Donald Knuth started the working in 1962 and is still being published.

Jan’s post turned out to be incorrect: actually I think this seminal book started the series of recursion jokes. Not just the 1997 current/3rd edition of TAOCP Volume 1 (Fundamental Algorithms) has this index joke as for instance referenced on Donald Knuth – Wikipedia:

To demonstrate the concept of recursion, Knuth intentionally referred “Circular definition” and “Definition, circular” to each other in the index of The Art of Computer Programming, Volume 1.

  1. [Wayback/Archive] Jeroen Wiert Pluimers: “@jwildeboer I finally had some…” – Mastodon
    @jwildeboer I finally had some time to check out more on the history of these book index puns (having gained back energy after the refurbishing and move last winter exhausted me a bit too much): Donald Knuth did put a recursion joke in The Art of Computer Programming – Volume 1: Fundamental Algorithms. – Index and Glossary page 631: “Circular Definition”
    – Index and Glossary page 633: “Definition, Circular” 1/

    [Wayback/Archive] 1a220a41350a019c.png (696×984)

    [Wayback/Archive] 79f71f237ec59fbf.png (696×984)

    Screenshots from [Wayback/Archive] seriouscomputerist.atariverse.com/media/pdf/book/Art%20of%20Computer%20Programming%20-%20Volume%201%20(Fundamental%20Algorithms).pdf

  2. [Wayback/Archive] Reclus: “@jwildeboer It’s also in the german edition.…” – Sunbeam City 🌻 which I regrettably could not find on-line copies of: help on this is much appreciated.
  3. [Wayback/Archive] Jeroen Wiert Pluimers: “@jwildeboer I need to check ou…” – Mastodon
    @jwildeboer I need to check out the first and second edition of The Art of Computer Programming – Volume 1: Fundamental Algorithms as well, as given https://en.wikipedia.org/wiki/Donald_K…nuth I expect this to be in the first edition which makes me think he started this whole series of index puns. In the end, a blog post will come up with more of these jokes as I think they are historically very interesting and it is remarkably hard to actually find the materials to make photos/screenshots from. 2/2

    That’s why I wrote the blog post you are reading now (:

And indeed, that joke started in the very first edition of Volume 1, and stayed in the second edition as well:

  1. [Archive] fundamental algorithms the art of computer programming : Free Download, Borrow, and Streaming : Internet Archive, 1st edition, 1968
    Index and Glossary page 619: “Circular Definition”

    [Wayback/Archive] 354348871-7f21edd1-9f81-4313-bf9a-613fd52f9b0a.png (532×830)

    Index and Glossary page 621: “Definition, Circular”

    [Wayback/Archive] 354348686-96aa5f23-705f-4fb4-955a-bb9d1894c43e.png (532×830)

  2. [Archive] The art of computer programming : Knuth, Donald Ervin, 1938- : Free Download, Borrow, and Streaming : Internet Archive, 2nd edition, 1973 (ISBN 0201038099)
    Index and Glossary page 619 “Circular Definition”

    [Wayback/Archive] 399323411-c8e2e628-3a2a-4daf-89dc-4de3788e7d06.png (687×1057)

    Index and Glossary page 621: “Definition, Circular”

    [Wayback/Archive] 399323991-2db1498a-a37b-4ac1-bcd3-afddfbff7865.png (687×1057)

    Currently this book is listed as “Borrowing Unavailable” (see [Wayback/Archive] Why are so many books listed as “Borrow Unavailable” at the Internet Archive – Internet Archive Help Center); hopefully this will either change or I get help sourcing another 2nd edition. It wasn’t available on [Wayback/Archive] Library Genesis – search: knuth the art of computer programming volume 1 either.

Can you imagine being able to order the first volume and subsequent volumes for USD 19.50 each, and Addison-Wesley keeping your address on file for even the 7th volume to be released? I wonder how many did that, as that was exactly what the introduction brochure promised one would be possible: [Wayback/Archive] www-cs-faculty.stanford.edu/~knuth/brochure.pdf [Wayback PDF View/PDF View]

[Wayback/Archive] 354241269-ff5f6347-bf2c-423b-b2eb-05f492fa6009.png (678×299)

[Wayback/Archive] 354240561-b85d69e8-307b-4667-ba93-395855a515b3.png (515×326)

[Wayback/Archive] 354240659-0b5f3033-6f82-459a-8ec1-02ce70d506e8.png (506×327)

BTW: if you like Donald Knuth and his work, be sure to watch the series of short videos at [Wayback/Archive] Donald Knuth (Computer scientist) – YouTube, one of the many series of the channel [Wayback/Archive] Web of Stories – Life Stories of Remarkable People – YouTube.

Finally, Donald still maintains a few web-pages himself related to TAOCP, for instance:

The 1988 K&R book “The C Programming Language (2nd ed.)”

K&R of course are Brian W. Kernighan and Dennis M. Ritchie, who wrote the famous book “The C Programming Language” in 1978. The second edition added some 30 pages, including a recursion pun in the index which Jan pointed me at in [Wayback/Archive] Jan Wildeboer 😷:krulorange:: “Had to verify. And yes. Kernighan and Ritchie really did this. TIL :)…” – social.wildeboer.net (a long list of reactions, some with other books covered further below)

[Wayback/Archive] 110d041ae71691df.jpg (900×1200)

[Wayback/Archive] 575e0ebe9cd46f78.jpg (900×1200)

If you want to see for yourself, check out page 269 at the non OCR-scans [Wayback/Archive] cslabcms.nju.edu.cn/problem_solving/images/c/cc/The_C_Programming_Language_(2nd_Edition_Ritchie_Kernighan).pdf [Wayback PDF View/PDF View] or [Wayback/Archive] raw.githubusercontent.com/AzatAI/cs_books/master/The.C.Programming.Language.2nd.Edition.pdf [Wayback PDF View/PDF View].

Note that the index is not present in:

Despitethe 1978 first edition not having this entry, did have “squirrel” in it:

  1. [Wayback/Archive] HAMMER SMASHED FILESYSTEM 🇺🇦: “@jwildeboer oh i see, gentlema…” – the Octodon

    @jwildeboer oh i see, gentleman got the heretic edition

    [Wayback/Archive] 5a4474b34995c7c9.jpeg (1109×1478)

    [Wayback/Archive] 55263f2fff16446e.jpeg (1109×1478)

  2. [Wayback/Archive] Kernel Bob: “@lkundrak @jwildeboer The first edition does have an index entry for “squirrel”, though.…” – chaos.social
  3. [Wayback/Archive] HAMMER SMASHED FILESYSTEM 🇺🇦: “@kbob confirmed! ” – the Octodon

    [Wayback/Archive] a8e94fa6809affa9.jpeg (554×415)

    [Wayback/Archive] ac1d1ed131ab4bf7.jpeg (554×415)

  4. [Wayback/Archive] Kernel Bob: “@mahmoudajawad It was a proofr…” – chaos.social

    @mahmoudajawad It was a proofreading error. The text included the phrase, “[…] alloc, to provide space for squirreling the words away”. I think an automated process found and indexed `squirrel`, and the human proofreader didn’t notice.

  5. [Wayback/Archive] Andy Wootton: “@lkundrak @kbob @mahmoudajawad That’s my instinct too but “squirrel” isn’t in ‘The Jargon File’, though “squirrelcide” is: …” – Fosstodon

    [Wayback/Archive] squirrelcide

    squirrelcide: n.

    [common on Usenet’s comp.risks newsgroup.] (alt.: squirrelicide) What all too frequently happens when a squirrel decides to exercise its species’s unfortunate penchant for shorting out power lines with their little furry bodies. Result: one dead squirrel, one down computer installation. In this situation, the computer system is said to have been squirrelcided.

    [Wayback/Archive] Andy Wootton: “@lkundrak @kbob @mahmoudajawad I worked in Staffordshire County Council Highways Department in about 1984. We used the IBM mainframe located in the Treasurer’s Department across the road, so the wiring passed through a tunnel. The greatest InfoSec threat was rats, attracted by the high-frequency hum of the cables.…” – Fosstodon

  6. [Wayback/Archive] Kernel Bob: “@lkundrak @mahmoudajawad Yeah,…” – chaos.social

    @lkundrak @mahmoudajawad Yeah, I was thinking about that paper. In any case, the squirrel didn’t make it into the 2nd Edition.

    (see the K&R book reference below for the explanation about “squirrel”)

Translated versions of The C Programming Language

It looks like most translated editions of this book lack the recursion pun.

[Wayback/Archive] Jyrki :paw_nonbinary:: “@jwildeboer neat, even the German version of that edition does that :D…” – pouncetodon

[Wayback/Archive] 2b692099cb493b66.jpeg (1662×1247)

Translations which certainly didn’t understand the original joke and removed it:

The Elements of Programming Style, co-authored by Kernighan

1988 wasn’t the first time that Brian W. Kernighan pulled an index joke, he and P. J. Plauger did in 1978 as well, this time with the second edition of The Elements of Programming Style had the recursion joke.

Note this is recommended reading for any programmer: many concepts of maintainable code stem from this book. At some 170 pages, it is relatively easy to remember a lot of things from as well.

  1. [Wayback/Archive] bcl: “@jwildeboer Ah darn, Kernighan didn’t do it in “The Go Programming Language”. I guess I’ll pencil it in.…” – Infosec Exchange
  2. [Wayback/Archive] bcl: “@jwildeboer but he did do it in “The Elements of Programming Style”…” – Infosec Exchange

    [Wayback/Archive] 5370fbaa694d4d89.jpeg (1109×1478)

    [Wayback/Archive] b861e8c31bf614bd.jpeg (1109×1478)

You can verify this for instance in [Wayback/Archive] Elements of Programming Style.pdf [Wayback PDF View/PDF View] at page 166, of which I created this screenshot [Wayback/Archive] 354285919-8b987290-bea4-488f-9985-c1f60e407b19.png (671×999)

Note it wasn’t in the 1974 first edition, which you can verify at [Archive] The elements of programming style : Kernighan, Brian W : Free Download, Borrow, and Streaming : Internet Archive (to live view that page, first borrow the book from The Internet Archive):

Page 145: “Recursion, 53”

[Wayback/Archive] 354331898-98e85014-47a8-447a-a0fc-7832851a9673.png (571×905)

The Unix Programming Environment, Kernighan and Pike, 1984

A few more years in the future, the recursion joke appeared again, this time in the 1984 book The Unix Programming Environment by Brian W. Kernighan and Rob Pike.

Besides the joke, you might like to know that back in the days, things were moving at rapid pace. As a result:

The book was written before ANSI C was first drafted; the programs in it follow the older K&R style. However, the source code available on the book’s website has been updated for ANSI C conformance.

In addition, it asked you if you really understood you were adding many features to the cal program: [Wayback/Archive] Mike Taylor 🦕: “@jwildeboer There’s always a d…” – Sauropods.win

@jwildeboer There’s always a dry humour just beneath the surface in Kernighan’s book. In Kernighan & Pike’s “The UNIX Programming Environment”, one set of exercises has you add a sequence of a features to the “cal” program, then finishes with the question: When should you have stopped adding features to `cal’?

This can be seen at page 138:

[Wayback/Archive] raw.githubusercontent.com/tcd/tupe/master/the-unix-programming-environment-kernighan-pike.pdf

[Wayback/Archive] 354830184-8fe28d0a-027a-4dca-a6c9-36410efd2abd.png (653×958)

Back to the index pictures you were waiting for (:

Later I found [Archive] Full text of “UNIX Programming Enviornment”, which is exceptionally well done OCR of the book and very useful for searching phrases. It’s under [Archive] UNIX Programming Enviornment : Brian W. Kernigan, Rob Pike : Free Download, Borrow, and Streaming : Internet Archive which also has an OCR-PDF with searchable text at [Archive] UNIX Programming Enviornment – unix_programming_environment_text.pdf.

C Traps and Pitfalls: joke re-use

Given the number of books about C, it is no surprise other authors on the same topic re-used the same joke, despite some by now wondering who was first (which is one of the reasons I wrote this blog post: teaching younger periods about computing history).

The next example is from C Traps and Pitfalls, a 1988 book by Andrew Koenig who was a very productive author of papers (50+ in the 1980s and 1990s!), so it is no wonder the book is actually based on his paper [Wayback/Archive] C Traps and Pitfalls.pdf which in turn is based on his 1977 paper “PL/I Traps and Pitfalls”.

The page screenshot:

Index page 146: “recursion 88, 146”

[Wayback/Archive]

I got the screenshot from the OCR PDF at [Wayback/Archive] altair.pw/pub/doc/unix/C%20Traps%20and%20Pitfalls.pdf, but you can borrow the book (though not as PDF) form [Archive] C traps and pitfalls : Koenig, Andrew : Free Download, Borrow, and Streaming : Internet Archive.

The wondering toot: [Wayback/Archive] WGAvanDijk: “@jwildeboer Who copied it from whom? (: …” – Mastodon

@jwildeboer
Who copied it from whom? 🙂
Andrew Koenig wrote the book “C Traps and Pitfalls” and did the same recursive page number mentioning in the index. His book is from 1988/1989, and the second edition by Kernighan & Ritchis is from those years too.

[Wayback/Archive] 32d42be2b53f82f8.jpeg (1200×1631)[Wayback/Archive] b2920f0b97b4c412.jpeg (1173×1768)

Wait, no Stroustrup book humor?

Back to [Wayback/Archive] Jan Wildeboer 😷:krulorange:: “And no, Stroustroup did NOT do this in the C++ book and also no, Knuth didn’t do this in AOCP :)…” – social.wildeboer.net, it seems that usually Bjarne Stroustrup if a serious person:

[Wayback/Archive] SpeakerToManagers: “@saustrup @jwildeboer In my years on the ANSI C++ standards committee I think Stroustrup told 1 or 2 jokes. He always seemed a very serious and determined person.…” – Mastodon 🐘

But at least one he pulled off a good April 1st joke (:

[Wayback/Archive] The Jazz Butcher Social Club: Joel Webber j15r@mastodon.j15r.com “@jwildeboer OTOH, Stroustrup did publish this hilarious gem in ’98: www.stroustrup.com/whitespace98.pdf (note the j15r mastodon server of the original toot went to bit heaven, so the above is a link to a copy of the toot):

[Wayback/Archive] whitespace98.PDF – whitespace98.pdf [Wayback PDF View/PDF View]

Generalizing Overloading for C++2000

Bjarne Stroustrup
AT&T Labs, Florham Park, NJ, USA

Abstract

This paper outlines the proposal for generalizing the overloading rules for Standard C++ that is expected to become part of the next revision of the standard. The focus is on general ideas rather than technical details (which can be found in AT&T Labs Technical Report no. 42, April 1,1998).

There is C++ index humour though

The [Wayback/Archive] Draft C++ Standard: Contents (maintained at [Wayback/Archive] GitHub – timsong-cpp/cppwp: HTML version of the current C++ working paper) has two funny index entries in [Wayback/Archive] 14882: Index pointing to [Wayback/Archive] [zombie.names] with tables of names which are reserved:

  • brains, names that want to eat your, [zombie.names]
  • living dead, name of, [zombie.names]

The first one via [Wayback/Archive] 谷雨同学 on X: “@vxunderground Here’s the index of C++ standard… “

[Wayback/Archive] GTywHNyaIAADkno.jpg (616×1199)

[Wayback/Archive] Tweet JSON

Common LISP the Language, second edition, Guy Steele

Like TAOCP, this 1990 book is also listed as “Borrowing Unavailable”: [Archive] COMMON LISP : the language : Steele, Guy L., 1954- : Free Download, Borrow, and Streaming : Internet Archive.

It however has an index entry “kludges” in the print version:

[Wayback/Archive] jwatt: “@jwildeboer A good one from Common LISP the Language 2ed, Guy Steele…” – BSD Network

[Wayback/Archive] 377ea8b81a4cb23c.jpeg (499×696)

[Wayback/Archive] Suzanne Paley: “@jwildeboer I quite like this one……” – Universeodon Social Media

[Wayback/Archive] dbe727bb28442ad5.jpeg (1247×1663)

[Wayback/Archive] ae15bbb45a1aeac2.jpeg (1247×1663)

It is not in the electronic version, for the same reason I mentioned above: the print version had a manually maintained index. See:

  • [Wayback/Archive] Common Lisp the Language, 2nd Edition

    This document contains the complete text of the book

       Common Lisp the Language, 2nd edition   by Guy L. Steele, Thinking Machines, Inc.   Digital Press   1990 paperbound   1029 pages   ISBN 1-55558-041-6  $39.95

    in html format.

  • [Wayback/Archive] Index

    This index, which was compiled by Tom Bylander <bylander@ringer.cs.utsa.edu>, replaces the original minimal index compiled from the latex sources. We will eventually replace this page with a form-based GLIMPSE index.

    This index includes links for most Common Lisp functions (and other entities) to the portion of the online Common Lisp manual where they are defined. Since the index was automatically generated from the online manual, some functions may not be included in this index. Also, the links do not jump directly to the function definitions; instead, they connect to the beginning of the sections where they are defined. Finally, please note that it is sometimes useful to go the previous section or the beginning of the chapter to get an introductory explanation (maybe even a simple example) of what is going on.

  • [Wayback/Archive] Index

    This index was produced from the latex sources and is inferior to the ones in the paperbound version. We will replace this page with a form-based GLIMPSE index in the near future. –mark

The reason for the “kludges” entry was very well explained by [Wayback/Archive] A Road to Common Lisp / Steve Losh

It’s also important to realize that while Common Lisp might be very practical, the need to accommodate existing users and dialects means that there are plenty of ugly parts. If you buy a paper copy of the second edition of Common Lisp: the Language and look up “kludges” in the index you’ll find this:

Common Lisp is not a beautiful crystal of programming language design. It’s a scruffy workshop with a big pegboard wall of tools, a thin layer of sawdust on the floor, a filing cabinet in the office with a couple of drawers that open perpendicular to the rest, and there’s a weird looking saw with RPLACD written on the side sitting off in a corner where no one’s touched it for twenty years.

Too bad [Wayback/Archive] Common Lisp: The Language – preview-9780080502267_A26574230.pdf [Wayback PDF View/PDF View] had no index pages: only the first 53 pages of the book.

[Wayback/Archive] Library Genesis – search: Common Lisp the Language Steele all got me documents like [Wayback/Archive] download.library.lol/main/320000/9ed42de1b022d561d78e9c07d098f518/Guy%20Steele%20-%20Common%20LISP.%20The%20Language-Digital%20Press%20(1990).pdf which do not have the term “kludges” in their indices.

Therefore: any help for a PDF of the hardcopy book is appreciated.

The 1988 sqlroff manual

I don’t have a picture from it, but here are some tweets and other information hoping someone can help me out on this:

Mixing math and Programming: The Java™ Language Specification, 1st edition

This is the only edition that references the Taxicab number 1729, which is world famous among math lovers:

The name is derived from a conversation ca. 1919 involving mathematicians G. H. Hardy and Srinivasa Ramanujan. As told by Hardy:

I remember once going to see him [Ramanujan] when he was lying ill at Putney. I had ridden in taxi-cab No. 1729, and remarked that the number seemed to be rather a dull one, and that I hoped it was not an unfavourable omen. “No,” he replied, “it is a very interesting number; it is the smallest number expressible as the sum of two [positive] cubes in two different ways.”

It immediately reminded me of a professor I really like, especially because their field is both in math and science communication: . Let me show their explanation of their love for the number 1729: [Wayback/Archive] Ionica chose a number (and we made it difficult) – News – Maastricht University

1729 is my favourite number, because it has a story associated with it. The numeral represents someone who also saw stories behind numbers. When I look into a certain topic, like numbers, I start to love it more and the other way around. That process fascinates me.

She had a post on Mastodon on 1729, but that regrettably disappeared. You can find it in part at the Archive of John Wilson’s post below:

@tug @jwildeboer
Your post reminded me of someone, so what is the chance they wrote about 1729 today!
mastodon.social/@ionica/111750326024706992

Mathstodon
Ionica Smeets (@ionica)
Attached: 1 image Hoe het kwam dat ik tegen een theezakje over 1729 vertelde.

Ionica is actually the reason I know about the background of the number 1729: following her on social media helped me learn to understand why I appreciate some numbers more than others.

Anyway: 1729 can be written as 121212 + 1 = 1728 + 1, or as 101010 + 999 = 1000 + 729, which makes it a special.

Back to the book: [Wayback/Archive] John Wilson: “@jwildeboer The 1st edition of…” – mastodon.me.uk

@jwildeboer The 1st edition of the Java Language specification is full of this sort of thing
Ramanujan, Srinivasa, 224
On page 224 is an example with
class Super { static int taxi = 1729; }

It all disappeared in the 2nd edition

And the images you were waiting form which are actually are three, as of course in addition to Ramanujan, Hardy was referenced: he was first in the index:

[Wayback/Archivejava-langspec-1.0.pdf  [Wayback PDF View/PDF View]

Index page 786: “Hardy, Godfrey Harold, 224”

[Wayback/Archive] 354807757-631b619b-bc99-4290-83b0-990df738768b.png (796×999)

Index page 803: “Ramanujan, Srinivasa, 224”

[Wayback/Archive] 354808026-101e7588-ca46-475e-b95f-33c32651cc89.png (796×999)

Page 224: “class Super { static int taxi = 1729; }

[Wayback/Archive] 354807715-6f495d11-21dc-403e-9dcc-30a9ba9635d4.png (763×958)

Programming Perl, best known as the Camel Book

Back in 1991, Larry Wall (creator of the programming languages Perl and Raku) and Randal L. Schwartz published the famous “Camel Book” titled “Programming Perl” (nicknamed because of the O’Reilly cover image, the first edition nicknamed “the pink camel” because of the pink book-spine).

This book does not have index jokes (or more likely: I missed them) but is very humorous in is use of language, likely coming from Wall’s background in linguistics. That background also shaped the languages, which for some are difficult to learn, and others to adore them.

I will just give one example of the book, as it is high on the various lists of various Larry Wall quotes, for example:

The screenshot:

[Wayback/Archive] Programming Perl, 4E – Programming.Perl.4th.2012.pdf [Wayback PDF View/PDF View]

Programming Perl, 4th Edition, Tom Christiansen, brian d foy, Larry Wall, Jon Orwant, 2012.

Preface page xxvii

“We will encourage you to develop the three great virtues of a programmer: laziness, impatience, and hubris.”

[Wayback/Archive] 357928751-5ce94684-1e7d-4b42-b054-ea9fb466d10e.png (730×959)

Luckily, the first edition and second edition are available for on-line borrowing at the Internet Archive:

The first edition did not have the “laziness, impatience, and hubris” fun.Starting with the second edition, this fun began.[Wayback/Archive] Programming Perl : Wall, Larry : Free Download, Borrow, and Streaming : Internet Archive.

Programming Perl, 1st Edition, Larry Wall, Randal L Schwartz, 1991

[Archive] Programming Perl : Wall, Larry : Free Download, Borrow, and Streaming : Internet Archive

Programming Perl, 2nd Edition, Larry Wall, Tom Christiansen & Randal L. Schwartz; 1996

Preface page xiv

Preface page xiv

[Wayback/Archive] 357943066-2d83b7c8-c11a-4574-9e2f-faec1a435356.png (634×973)[Wayback/Archive] 357942563-9234ab30-3d4a-4732-b591-6e43f4f33926.png (684×973)

Most of the Camel Book editions is full of wit in many senses of the word, so be sure to read this book: it is still relevant, as like Delphi, Perl – after revolutionizing data handling and processing – also found its niches (not limited to bio-informatics as BioPerl plays a big role in for instance the Human Genome Project). In addition, Programming Perl is the only book for a specific language I know of that covers a very broad range of application including programming (of course), system administration, web development, internet security, etc.

Definitely recommended is the long read [Wayback/Archive] Slightly Skeptical View on Larry Wall and Perl which is part of [Wayback/Archive] Nikolai Bezroukov. Portraits of Open Source Pioneers: Essays on early history of open source), and a shorter read is at [Wayback/Archive] Exploring Larry Wall’s Legacy and Programming Innovation | IT-Jobs.

If you like more of Larry’s humour, check out his conference talks, articles, community posts, etc. For instance this 1999 [Wayback/Archive] Perl, the first postmodern computer language.

Note I got reminded to all this Perl fun by [Wayback/Archive] Peter Heppner: “@jwildeboer Try Larry Wall’s Perl Book, same sense of humor. The good ole days……” – NRW.social.

In addition to a computer linguist, Larry is also a devote Christian. Not much of that can be found into Perl, though this blessing with bless is a good example:

[Wayback/Archive] bless – Perldoc Browser

bless tells Perl to mark the item referred to by REF as an object in a package. The two-argument version of bless is always preferable unless there is a specific reason to not use it.

See perlobj for more about the blessing (and blessings) of objects.

bless returns its first argument, the supplied reference, as the value of the function; since bless is commonly the last thing executed in constructors, this means that the reference to the object is returned as the constructor’s value and allows the caller to immediately use this returned object in method calls.

CLASSNAME should always be a mixed-case name, as all-uppercase and all-lowercase names are meant to be used only for Perl builtin types and pragmas, respectively. Avoid creating all-uppercase or all-lowercase package names to prevent confusion.

Also avoid blessing things into the class name 0; this will cause code which (erroneously) checks the result of ref to see if a reference is blessed to fail, as “0”, a falsy value, is returned.

Outside programming and math

Having returned back to math, it is worth mentioning that outside our comfort zone there is a wealth of index puns as well.

If you like those, start at [Wayback/Archive] National Indexing Day 2020: some of the best and funniest index entries I know – Paula Clarke Bain which I found via [Wayback/Archive] lippard✅:donor:: “@jwildeboer Other index humor …” – Infosec Exchange

@jwildeboer Other index humor here (there is also academic footnote humor): baindex.org/2020/03/31/nationa

Oldest one?

A math one actually might be the oldest recursion pun. And indeed it is a math book, which actually started out as a paper, similarly to the 1989 “C Traps and Pitfalls” by Andrew Koenig by his 1997 paper “PL/I Traps and Pitfalls”: the late Paul Halmos wrote the 1942 paper Finite-Dimensional Vector Spaces (since a while removed from the Internet Archive because Spring-Verlag loves money) which was published in Annals of Mathematics Studies, no. 7.

Do not confuse Annals of Mathematical Studies (published by Princeton University) with with Annals of Mathematics (also published by Princeton University) as that is a different thing. We are after on-line [Wayback/Archive] Annals of Mathematics Studies | Princeton University Press, but it lacks #7 (it would be too convenient to include no. 7, right?) and various other issues.

Of course #7 it is available for instance at [Wayback/Archive] de Gruyter: Annals of Mathematics Studies. They have it as eBook (not even the original paper book!) [Wayback/Archive] De Gruyter: Volume 7 in the series Annals of Mathematics Studies – Finite Dimensional Vector Spaces for a whopping USD 327. “Luckily” [Wayback/Archive] Finite Dimensional Vector Spaces | Princeton University Press, has for USD 83.

In 1947, that #7 evolved into a regular book, which is special as Paul Halmos referened another mathematician Gerhard Hochschild (who also passed away this century:  in 2010, some 4 years after Paul Halmos): [Wayback/Archive] Finite_Vector_Spaces-Halmos.pdf (non-OCR PDF 1958 edition) [Wayback PDF View/PDF View].

Steven Molnar pointed to this index entry in this thread:

  1. [Wayback/Archive] Steven Molnar: “@WGAvanDijk @jwildeboer Paul H…” – Urbanists.Social

    @WGAvanDijk @jwildeboer Paul Halmos did essentially the same thing far earlier in Finite Dimensional Vector Spaces (1958). In the index on page 198 appears the entry:

    Hochschild, G. P., 198

    The story is that Hochschild asked Halmos if he would be mentioned in the book, but I’m not sure if that part is true.

  2. [Wayback/Archive] WGAvanDijk: “@MolnarSteven On page 198 the …” – Mastodon

    @MolnarSteven
    On page 198 the reference indeed appears:
    download.tuxfamily.org/openmat

  3. [Wayback/Archive] Steven Molnar: “@WGAvanDijk Thanks. I have a h…” – Urbanists.Social

    @WGAvanDijk Thanks. I have a hard copy around here somewhere, but I didn’t have the energy to look for it. BTW, Halmos also used a misleadingly amusing title: The finite dimensionality of the vector spaces is almost never used in the development, which is quite abstract. Similarly, his Naive Set Theory could more accurately be called Axiomatic Set Theory.

Since the above book is the 1958 edition, I tried finding the 1947 edition and found these editions on the Internet Archive:

  1. 1942 (Borrow Unavailable) [Archive] Finite dimensional vector spaces : Halmos, Paul R. (Paul Richard), 1916- : Free Download, Borrow, and Streaming : Internet Archive
  2. 1947 (Borrow Unavailable) [Archive] Finite dimensional vector spaces : Halmos, Paul R. (Paul Richard), 1916- : Free Download, Borrow, and Streaming : Internet Archive
  3. 1948 (Downloadable) [Archive] Finite Dimensional Vector Spaces : Halmos Paul R : Free Download, Borrow, and Streaming : Internet Archive

    It also has a full text download which you can use for searching: [Archive] Full text of “Finite Dimensional Vector Spaces”

  4. 1958 (Borrow Unavailable) [Archive] finite dimensional vector spaces : paul halmos : Free Download, Borrow, and Streaming : Internet Archive
  5. 1958 (Downloadable) [Archive] Halmos, P. R. Finite Dimensional Vector Spaces. ( Springer Verlag)( 205s) : Free Download, Borrow, and Streaming : Internet Archive

    The is another copy of the one referenced by @WGAvanDijk, and has a full text download to: [Archive] Full text of “Halmos, P. R. Finite Dimensional Vector Spaces. ( Springer Verlag)( 205s)”

Later I found two more PDFs that are text-readable:

Which means the oldest edition I could find that is on-line readable for me, is the 1948 one which indeed already had the index joke:

archive.org/download/dli.ernet.233504/233504-Finite%20Dimensional%20Vector%20Spaces_text.pdf / https://archive.org/download/dli.ernet.233504/233504-Finite%20Dimensional%20Vector%20Spaces.pdf

Finite Dimensional Vector Spaces, 1948, by Halmos, Paul R. (Paul Richard)

Page 198: “Hochschild, G. P., 198”

[Wayback/Archive] 357337200-efacf303-f3ab-439c-bc36-cb565592258b.png (668×990)

From old math to new math: Humble Pi

Only 5 years ago, Matt Parker released a math book that immediately became a Sunday Times #1 bestseller: Humble Pi, which you can even get signed at [Wayback/Archive] Humble Pi by Matt Parker (signed) – Maths Gear – Mathematical curiosities, games and gifts.

Besides that, the other specialty is the index: the entries have very accurate references:

[Wayback/Archive] IMG_20240801_103038.jpg (505×673)

(via discord)

It has “A Comedy of Maths Errors by Matt Parker” as subtitle for a reason (:

Back to Borland

The Borland Turbo Pascal manuals were the first ones I knew had an index joke. The reason is that Turbo Pascal 7.0 introduced the Object Pascal Language Guide. Turbo Pascal 6.0 did not yet have that:

[Wayback/Archive] Borland Pascal, Turbo Pascal Version Information

Includes: Two 720K diskettes labeled:
"INSTALL/TURBO VISON/COMPILER, VERSION 6.0", PART# 11LB-PAS04 BOR 1855
“HELP/BGI/UTILITIES”, PART# 11LB-PAS04 BOR 1855
plus the following printed materials:
User’s Guide, 259 pages (Installation, Integrated Environment, Tutorials, Command-line Compiler), Part# 11MN-PAS02-60 BOR 1850
Programmer’s Guide, 370 pages (Language Definition, Library Cross-Reference, Assembly Language, Error Messages), Part# 11MN-PAS05-60 BOR 1851
Library Reference, 176 pages (Run-Time Library), Part# 11MN-PAS03-60 BOR 1852
Turbo Vision Guide, 411 pages (Cookbook, Object Reference), Part# 11MN-PAS04-60 BOR 1853
No-Nonsense License Statement
Runtime Library source Code order form
System Requirements:
IBM PS/2 and IBM Personal Computers and 100% compatibles
PC-DOS (MS-DOS) 2.0 or later
512K RAM minimum (256K for command-line version)
Two floppy disk drives
Mouse support requires Microsoft Mouse or compatible, driver version 6.0 or later

The only Delphi version I could find the same “recursive loop” pun in was Delphi 1.0, which extended the Object Pascal Language Guide with many new Delphi language features:

[Wayback/Archive] Object Pascal Language Guide – Object Pascal Language Guide.pdf

Index page 287

[Wayback/Archive] 356704153-d42c2880-c591-4fcd-b04a-1f8c9469a202.png (747×1000)

I tried finding a Delphi 2 edition of the Object Pascal Language Guide of which I could not find a PDF, but did find it is part of the Computer History Museum collection as [Wayback/Archive] Object Pascal Language Guide | 102785693 | Computer History Museum

TitleObject Pascal Language GuideCatalog Number102785693TypeDocumentDescriptionBorland Delphi Object Pascal Language Guide version 2 manual for Windows 95 and Windows NTDate1996PublisherBorland International, Inc.Extent228 p.CategoryManualCollection TitlePeter R. Jennings papersSeries TitlePublished materialsCreditGift of Peter JenningsLot NumberX7876.2017

[Archive] Object Pascal language guide : Borland Delphi for Windows 95 and Windows NT : version 2.0 : Scotts Valley, CA : Borland International : Free Download, Borrow, and Streaming : Internet Archive has these wrong:

  • Version: should be 3.0
  • Publication date: should be 1997 (instead of 1996)

Delphi 3 still has the Object Pascal Language Guide (it is in fact the book the Internet Archive has on file for borrowing in electronic form of the above “version 2.0” link), but it does not have the recursion joke any more:

https://archive.org/details/objectpascallang00scot/page/n251/mode/1up

Index Page I-15

[Wayback/Archive] 356709651-5a18778e-8c30-4874-b0e2-63b353aac760.png (550×733)

If anyone has the Delphi 2 manual, please let me know as I would love to post a screenshot of an index page with “recursion” on it.

After Delphi 3, I found these PDF language guides (found the name “devcommon.pdf” in my blog post MESSAGE directive Delphi) – I will mention translated documentation PDF files in a future blog post:

The 2009 RTL and documentation joke

In 2009, during the Codegear years, the Delphi R&D team did add one more joke. This time not to the documentation, but to the run-time library: the EProgrammerNotFound exception was added.

I blogged about this before in EProgrammerNotFound exception in Delphi? – Stack Overflow, and about Embarcadero killing most of their old on-line documentation in The Delphi documentation site docwiki.embarcadero.com has been down/up oscillating for 4 days is now down for almost a day., but the old Codegear docs website still contains [Wayback/Archive] Rad Studio 2007: Welcome and [Wayback/Archive] Delphi and C++ Builder 2009 Help Update 2: Welcome to Help.

The latter contains the very non-descroptive entry [Wayback/Archive] EProgrammerNotFound Class:

[Wayback] scr.png (PNG Image, 1024 × 768 pixels)

In the mean time it got a bit less dense because of a new small paragraph at [Wayback/Archive] System.SysUtils.EProgrammerNotFound – RAD Studio API Documentation

Nonstandard way to indicate software faults. You can use EProgrammerNotFound as an alternative to indicate software faults detected at run time.

[Wayback] scr.png (PNG Image, 1024 × 768 pixels)

A few things I learned

In kind of random order

  • Not just the programming languages influenced each other, the book authors and indexers did too
  • Many books are available as PDF on-line, though some from not so clear sources.
  • The Internet Archive has many books online, but their PDF content is not indexed by Google Search, so these books often do not turn up in search results.
  • Science book publishing is a mess
  • As of late last century, and especially this century, programming languages hard contain index jokes any more
  • It was quite hard to find threads on social media or other on-line information about these jokes (usually just a single picture, mostly without referencing the actual book it was from)

Further reading

Computer manuals apparently have even more humor than most computer language books: [Wayback/Archive] The strangest computer manual ever written | Hacker News

Book indexing is a craft, and they write humorous posts too: [Wayback/Archive] Book Indexing, Part 2: Infinite Loops and Easter Eggs – Writer, Editor, Helper. It references a page of which in the current online copy the images are gone, but luckily they are still present in the archived versions at [Wayback/Archive] Index Humour.

Online forums, especially ones with editable posts, have taken over the recursion humor. For instance [Wayback/Archive] I would have thought you’d link to news.ycombinator.com/item?id=35574446 | Hacker News.

It is which is part of this comment tree [Wayback/Archive] I almost never comment here anymore but, well, here we are. Says something about software people that we find such fascination with recursion…. | Hacker News and pointed to me by [Wayback/Archive] Evan Light (looking for work): “@jwildeboer Relevant: news.ycombinator.com/item?id=35569670…” – Ten Forward.

Pingback

Not all of the above posts survived time, as also observed in this pingback thread: [Wayback/Archive] LIBRANET.de | clacke: exhausted pixie dream boy 🇸🇪🇭🇰💙💛 @ LIBRANET.de

Most of the original thread was archived in [Wayback/Archive] LIBRANET.de | Display: Had to verify. And yes. Kernighan and Ritchie really did this. TIL 😀.

--jeroen

#1 #7

Frame by Frame: Fireworks

As previously mentioned, me and Marc Weidenbaum have picked up making new episodes for our four-panel comics series Frame by Frame!

Here’s #7, just in time for 2024 to come to a close.

The next one will go online on January 13th, with subsequent ones being posted the first and third Monday of each month.

I’m really happy and excited to be making these again!

In the meantime, Happy New Year everybody!

#7

PEASEC - Science and Technology for Peace and Security / Wissenschaft und Technik für Frieden und Sicherheit | Technische Universität Darmstadtnews@peasec.de
2024-12-03

PEASEC 2024: A Year in Review: 4 completed PhDs, 9 awards, 1 new lecture

Dear Members and Friends of PEASEC,

As 2024 comes to a close, we sincerely thank you for your support and contributions. Wishing you a joyful holiday season and a successful New Year!

  • Teaching and Staff: We introduced the new course Computer Science and Society and supervised nearly 30 theses. We welcomed new colleagues, including Frank Nelles, Timon Dörnfeld, and Franziska Schneider, and celebrated the successful doctorates of Sebastian Linsner, Katrin Hartwig, Steffen Haesler, and Markus Bayer.
  • Publications and Awards: Our team published over 60 papers, including 15 in top-tier venues, and received multiple prestigious awards, such as the CHI and CSCW Best Paper Awards.
  • Projects and Outreach: We concluded key projects and initiated new ones, such as ATHENE-SecFOCI, while organizing impactful events and contributing to media discussions.

Thank you for being part of our journey in 2024. We look forward to 2025!

Warm regards,
The PEASEC Team

Teaching

  • We have introduced the new course ‘Computer Science and Society’ (Informatik und Gesellschaft) as a compulsory course for all Bachelor’s students of Computer Science. Furthermore we supervised around 30 successfully completed Bachelor’s and Master’s theses.
  • For the winter semester 2024/2025 (1.10.2024-31.3.2025) Dr. Marc-André Kaufhold as been appointed as deputy professor (Vertretungsprofessor) to represent the W3 professorship ‘Knoweldge Engineering’ at the Department of Computer Science at TU Darmstadt.
  • We published the second edition of our textbook „Information Technology for Peace and Security„, used as a basis for our lecture next summer semester.
New Lecture: Informatics and Society Successful Lecture: Secure Critical Infrastructures New Edition: Information Technology for Peace and Security

Staff Developments

Promotion Dr.-Ing. Sebastian Linsner Promotion Dr.-Ing. Katrin Hartwig Promotion Dr. rer. nat. Steffen Haesler Promotion Dr. rer. nat. Markus Bayer

Publications and Awards

ISCRAM Best Research Paper Award 2024 CHI Best Paper Award CSCW Best Paper Award: Steffen Haesler präsentierte PairSonic während einer Live-Demo auf der CSCW in San José. Copyright: Steffen Haesler CROSSING Collaboration Award 2024: Prof. Christian Reuter, Kilian Demuth, Gowri Chandran, Dr. Kasra EdalatNejad, and Prof. Thomas Schneider (left to right)Misssing from the photo is Dr. Sebastian Linsner. emergenCITY Collaboration Award Weizenbaum-Award 2024

Projects, Events and Outreach

RTG Privacy and Trust Closing Conference Absolvent*innenfeier 2024 emergenCITY: The Minister Explores Krisopolis BMBF Innoviationsforum Zivile Sicherheit PEASEC auf der CHI’24 Lecture with Konrad Adenauer Stiftung Abschluss des AgriRegio-Projekts (2024) Fachbereichssommerkolloquium 2024 Seekabel-Empfehlung der EU von PEASEC und der Stiftung Wissenschaft und Politik (SWP) Online-Ringvorlesung Cybersicherheit des Hessischen Ministerium des Innern, für Sicherheit und Heimatschutz

News 2024

Highlights 2024

2024 (61)

A-Paper 2024

(CORE≥A v VHB≥A v WKWI≥A v Thomson Reuters JIF≥1 v GI-CSCW≥A)

2024

  • Marc-André Kaufhold, Thea Riebe, Markus Bayer, Christian Reuter (2024)
    ‚We Do Not Have the Capacity to Monitor All Media‘: A Design Case Study on Cyber Situational Awareness in Computer Emergency Response Teams
    Proceedings of the Conference on Human Factors in Computing Systems (CHI) (Best Paper Award) New York, NY, USA. doi:10.1145/3613904.3642368
    [BibTeX] [Abstract] [Download PDF]

    Computer Emergency Response Teams (CERTs) have been established in the public sector globally to provide advisory, preventive and reactive cybersecurity services for government agencies, citizens, and businesses. Nevertheless, their responsibility of monitoring, analyzing, and communicating cyber threats and security vulnerabilities have become increasingly challenging due to the growing volume and varying quality of information disseminated through public and social channels. Based on a design case study conducted from 2021 to 2023, this paper combines three iterations of expert interviews (N=25), design workshops (N=4) and cognitive walkthroughs (N=25) to design an automated, cross-platform and real-time cybersecurity dashboard. By adopting the notion of cyber situational awareness, the study further extracts user requirements and design heuristics for enhanced threat intelligence and mission awareness in CERTs, discussing the aspects of source integration, data management, customizable visualization, relationship awareness, information assessment, software integration, (inter-)organizational collaboration, and communication of stakeholder warnings.

    @inproceedings{kaufhold_we_2024,address = {New York, NY, USA},series = {{CHI} '24},title = {'{We} {Do} {Not} {Have} the {Capacity} to {Monitor} {All} {Media}': {A} {Design} {Case} {Study} on {Cyber} {Situational} {Awareness} in {Computer} {Emergency} {Response} {Teams}},isbn = {9798400703300},url = {https://peasec.de/paper/2024/2024_KaufholdRiebeBayerReuter_CertDesignCaseStudy_CHI.pdf},doi = {10.1145/3613904.3642368},abstract = {Computer Emergency Response Teams (CERTs) have been established in the public sector globally to provide advisory, preventive and reactive cybersecurity services for government agencies, citizens, and businesses. Nevertheless, their responsibility of monitoring, analyzing, and communicating cyber threats and security vulnerabilities have become increasingly challenging due to the growing volume and varying quality of information disseminated through public and social channels. Based on a design case study conducted from 2021 to 2023, this paper combines three iterations of expert interviews (N=25), design workshops (N=4) and cognitive walkthroughs (N=25) to design an automated, cross-platform and real-time cybersecurity dashboard. By adopting the notion of cyber situational awareness, the study further extracts user requirements and design heuristics for enhanced threat intelligence and mission awareness in CERTs, discussing the aspects of source integration, data management, customizable visualization, relationship awareness, information assessment, software integration, (inter-)organizational collaboration, and communication of stakeholder warnings.},booktitle = {Proceedings of the {Conference} on {Human} {Factors} in {Computing} {Systems} ({CHI}) ({Best} {Paper} {Award})},publisher = {Association for Computing Machinery},author = {Kaufhold, Marc-André and Riebe, Thea and Bayer, Markus and Reuter, Christian},year = {2024},keywords = {Security, UsableSec, HCI, Projekt-CYWARN, Projekt-ATHENE-CyAware, Projekt-CYLENCE, A-Paper, AuswahlKaufhold, AuswahlUsableSec, Ranking-CORE-A*, Selected},}

  • Katrin Hartwig, Tom Biselli, Franziska Schneider, Christian Reuter (2024)
    From Adolescents‘ Eyes: Assessing an Indicator-Based Intervention to Combat Misinformation on TikTok
    Proceedings of the Conference on Human Factors in Computing Systems (CHI) New York, NY, USA. doi:10.1145/3613904.3642264
    [BibTeX] [Abstract] [Download PDF]

    Misinformation poses a recurrent challenge for video-sharing platforms (VSPs) like TikTok. Obtaining user perspectives on digital interventions addressing the need for transparency (e.g., through indicators) is essential. This article offers a thorough examination of the comprehensibility, usefulness, and limitations of an indicator-based intervention from an adolescents’ perspective. This study (𝑁 = 39; aged 13-16 years) comprised two qualitative steps: (1) focus group discussions and (2) think-aloud sessions, where participants engaged with a smartphone-app for TikTok. The results offer new insights into how video-based indicators can assist adolescents’ assessments. The intervention received positive feedback, especially for its transparency, and could be applicable to new content. This paper sheds light on how adolescents are expected to be experts while also being prone to video-based misinformation, with limited understanding of an intervention’s limitations. By adopting teenagers’ perspectives, we contribute to HCI research and provide new insights into the chances and limitations of interventions for VSPs.

    @inproceedings{hartwig_adolescents_2024,address = {New York, NY, USA},series = {{CHI} '24},title = {From {Adolescents}' {Eyes}: {Assessing} an {Indicator}-{Based} {Intervention} to {Combat} {Misinformation} on {TikTok}},isbn = {9798400703300},url = {https://doi.org/10.1145/3613904.3642264},doi = {10.1145/3613904.3642264},abstract = {Misinformation poses a recurrent challenge for video-sharing platforms (VSPs) like TikTok. Obtaining user perspectives on digital interventions addressing the need for transparency (e.g., through indicators) is essential. This article offers a thorough examination of the comprehensibility, usefulness, and limitations of an indicator-based intervention from an adolescents’ perspective. This study (𝑁 = 39; aged 13-16 years) comprised two qualitative steps: (1) focus group discussions and (2) think-aloud sessions, where participantsengaged with a smartphone-app for TikTok. The results offer new insights into how video-based indicators can assist adolescents’ assessments. The intervention received positive feedback, especially for its transparency, and could be applicable to new content. This paper sheds light on how adolescents are expected to be experts while also being prone to video-based misinformation, with limited understanding of an intervention’s limitations. By adoptingteenagers’ perspectives, we contribute to HCI research and provide new insights into the chances and limitations of interventions for VSPs.},booktitle = {Proceedings of the {Conference} on {Human} {Factors} in {Computing} {Systems} ({CHI})},publisher = {Association for Computing Machinery},author = {Hartwig, Katrin and Biselli, Tom and Schneider, Franziska and Reuter, Christian},year = {2024},keywords = {Security, UsableSec, HCI, A-Paper, Ranking-CORE-A*, Selected, AuswahlCrisis, Projekt-ATHENE-PriVis, Projekt-NEBULA},}

  • Laura Guntrum (2024)
    Keyboard Fighters: The Use of ICTs by Activists in Times of Military Coup in Myanmar
    Proceedings of the CHI Conference on Human Factors in Computing Systems New York, NY, USA. doi:10.1145/3613904.3642279
    [BibTeX] [Abstract] [Download PDF]

    Amidst the ongoing anti-military protests in Myanmar since 2021, there is a noticeable research gap on ICT-supported activism. Generally, ICTs play an important role during political crises in conjunction with activists’ practices on the ground. Inspired by Resource Mobilization Theory, I conducted qualitative interviews (N=16) and a qualitative online survey (N=34), which demonstrate the intersection between analog and digital domains, showcasing the ingenuity of the activists, and the rapid adoption of ICTs in a country that has experienced a digital revolution within the last few years. As not all people were able to protest on-the-ground, they acted as keyboard fighters to organize protests, to share information, and to support the civil disobedience movement in Myanmar. The study identifies, inter alia, the need for better offline applications with wider coverage in times of internet shutdowns, applications that cannot be easily identified during physical controls, and providing free and secure VPN access.

    @inproceedings{guntrum_keyboard_2024,address = {New York, NY, USA},series = {{CHI} '24},title = {Keyboard {Fighters}: {The} {Use} of {ICTs} by {Activists} in {Times} of {Military} {Coup} in {Myanmar}},isbn = {9798400703300},url = {https://doi.org/10.1145/3613904.3642279},doi = {10.1145/3613904.3642279},abstract = {Amidst the ongoing anti-military protests in Myanmar since 2021, there is a noticeable research gap on ICT-supported activism. Generally, ICTs play an important role during political crises in conjunction with activists’ practices on the ground. Inspired by Resource Mobilization Theory, I conducted qualitative interviews (N=16) and a qualitative online survey (N=34), which demonstrate the intersection between analog and digital domains, showcasing the ingenuity of the activists, and the rapid adoption of ICTs in a country that has experienced a digital revolution within the last few years. As not all people were able to protest on-the-ground, they acted as keyboard fighters to organize protests, to share information, and to support the civil disobedience movement in Myanmar. The study identifies, inter alia, the need for better offline applications with wider coverage in times of internet shutdowns, applications that cannot be easily identified during physical controls, and providing free and secure VPN access.},booktitle = {Proceedings of the {CHI} {Conference} on {Human} {Factors} in {Computing} {Systems}},publisher = {Association for Computing Machinery},author = {Guntrum, Laura},year = {2024},keywords = {Peace, Projekt-TraCe, HCI, A-Paper, Ranking-CORE-A*, Selected, Projekt-ATHENE},}

  • Stefka Schmid, Katrin Hartwig, Robert Cieslinski, Christian Reuter (2024)
    Digital Resilience in Dealing with Misinformation on Social Media during COVID-19: A Web Application to Assist Users in Crises
    Information Systems Frontiers (ISF) ;26(2):477–499. doi:10.1007/s10796-022-10347-5
    [BibTeX] [Abstract] [Download PDF]

    In crises such as the COVID-19 pandemic, it is crucial to support users when dealing with social media content. Considering digital resilience, we propose a web app based on Social Network Analysis (SNA) to provide an overview of potentially misleading vs. non-misleading content on Twitter, which can be explored by users and enable foundational learning. The latter aims at systematically identifying thematic patterns which may be associated with misleading information. Additionally, it entails reflecting on indicators of misleading tweets which are proposed to approach classification of tweets. Paying special attention to non-expert users of social media, we conducted a two-step Think Aloud study for evaluation. While participants valued the opportunity to generate new knowledge and the diversity of the application, qualities such as equality and rapidity may be further improved. However, learning effects outweighed individual costs as all users were able to shift focus onto relevant features, such as hashtags, while readily pointing out content characteristics. Our design artifact connects to learning-oriented interventions regarding the spread of misleading information and tackles information overload by a SNA-based plug-in.

    @article{schmid_digital_2024,title = {Digital {Resilience} in {Dealing} with {Misinformation} on {Social} {Media} during {COVID}-19: {A} {Web} {Application} to {Assist} {Users} in {Crises}},volume = {26},issn = {1572-9419},url = {https://doi.org/10.1007/s10796-022-10347-5},doi = {10.1007/s10796-022-10347-5},abstract = {In crises such as the COVID-19 pandemic, it is crucial to support users when dealing with social media content. Considering digital resilience, we propose a web app based on Social Network Analysis (SNA) to provide an overview of potentially misleading vs. non-misleading content on Twitter, which can be explored by users and enable foundational learning. The latter aims at systematically identifying thematic patterns which may be associated with misleading information. Additionally, it entails reflecting on indicators of misleading tweets which are proposed to approach classification of tweets. Paying special attention to non-expert users of social media, we conducted a two-step Think Aloud study for evaluation. While participants valued the opportunity to generate new knowledge and the diversity of the application, qualities such as equality and rapidity may be further improved. However, learning effects outweighed individual costs as all users were able to shift focus onto relevant features, such as hashtags, while readily pointing out content characteristics. Our design artifact connects to learning-oriented interventions regarding the spread of misleading information and tackles information overload by a SNA-based plug-in.},number = {2},journal = {Information Systems Frontiers (ISF)},author = {Schmid, Stefka and Hartwig, Katrin and Cieslinski, Robert and Reuter, Christian},month = apr,year = {2024},keywords = {Projekt-TraCe, Student, Crisis, A-Paper, Projekt-NEBULA},pages = {477--499},}

  • Katrin Hartwig, Ruslan Sandler, Christian Reuter (2024)
    Navigating Misinformation in Voice Messages: Identification of User-Centered Features for Digital Interventions
    Risk, Hazards, & Crisis in Public Policy (RHCPP) . doi:10.1002/rhc3.12296
    [BibTeX] [Abstract] [Download PDF]

    Misinformation presents a challenge to democracies, particularly in times of crisis. One way in which misinformation is spread is through voice messages sent via messenger groups, which enable members to share information on a larger scale. Gaining user perspectives on digital misinformation interventions as countermeasure after detection is crucial. In this paper, we extract potential features of misinformation in voice messages from literature, implement them within a program that automatically processes voice messages, and evaluate their perceived usefulness and comprehensibility as user-centered indicators.We propose 35 features extracted from audio files at the character, word, sentence, audio and creator levels to assist (1) private individuals in conducting credibility assessments, (2) government agencies faced with data overload during crises, and (3) researchers seeking to gather features for automatic detection approaches. We conducted a think-aloud study with laypersons (N = 20) to provide initial insight into how individuals autonomously assess the credibility of voice messages, as well as which automatically extracted features they find to be clear and convincing indicators of misinformation. Our study provides qualitative and quantitative insights into valuable indicators, particularly when they relate directly to the content or its creator, and uncovers challenges in user interface design.

    @article{hartwig_navigating_2024,title = {Navigating {Misinformation} in {Voice} {Messages}: {Identification} of {User}-{Centered} {Features} for {Digital} {Interventions}},issn = {1944-4079},url = {https://peasec.de/paper/2024/2024_HartwigSandlerReuter_NavigatingMisinfoVoiceMessages_RiskHazards.pdf},doi = {10.1002/rhc3.12296},abstract = {Misinformation presents a challenge to democracies, particularly in times of crisis. One way in which misinformation is spread is through voice messages sent via messenger groups, which enable members to share information on a larger scale. Gaining user perspectives on digital misinformation interventions as countermeasure after detection is crucial. In this paper, we extract potential features of misinformation in voice messages from literature, implement them within a program that automatically processes voice messages, and evaluate their perceived usefulness and comprehensibility as user-centered indicators.We propose 35 features extracted from audio files at the character, word, sentence, audio and creator levels to assist (1) private individuals in conducting credibility assessments, (2) government agencies faced with data overload during crises, and (3) researchers seeking to gather features for automatic detection approaches. We conducted a think-aloud study with laypersons (N = 20) to provide initial insight into how individuals autonomously assess the credibility of voice messages, as well as which automatically extracted features they find to be clear and convincing indicators of misinformation. Our study provides qualitative and quantitative insights into valuable indicators, particularly when they relate directly to the content or its creator, and uncovers challenges in user interface design.},journal = {Risk, Hazards, \& Crisis in Public Policy (RHCPP)},author = {Hartwig, Katrin and Sandler, Ruslan and Reuter, Christian},year = {2024},note = {Publisher: John Wiley \& Sons, Ltd},keywords = {Student, UsableSec, Crisis, HCI, Projekt-CYLENCE, A-Paper, Projekt-NEBULA, Projekt-ATHENE, Ranking-ImpactFactor, SocialMedia, Cyberwar},}

  • Markus Bayer, Philipp Kuehn, Ramin Shanehsaz, Christian Reuter (2024)
    CySecBERT: A Domain-Adapted Language Model for the Cybersecurity Domain
    ACM Transactions on Privacy and Security (TOPS) ;27(2). doi:10.1145/3652594
    [BibTeX] [Abstract] [Download PDF]

    The field of cybersecurity is evolving fast. Security professionals are in need of intelligence on past, current and – ideally – on upcoming threats, because attacks are becoming more advanced and are increasingly targeting larger and more complex systems. Since the processing and analysis of such large amounts of information cannot be addressed manually, cybersecurity experts rely on machine learning techniques. In the textual domain, pre-trained language models like BERT have proven to be helpful as they provide a good baseline for further fine-tuning. However, due to the domain-knowledge and the many technical terms in cybersecurity, general language models might miss the gist of textual information. For this reason, we create a high-quality dataset and present a language model specifically tailored to the cybersecurity domain which can serve as a basic building block for cybersecurity systems. The model is compared on 15 tasks: Domain-dependent extrinsic tasks for measuring the performance on specific problems, intrinsic tasks for measuring the performance of the internal representations of the model as well as general tasks from the SuperGLUE benchmark. The results of the intrinsic tasks show that our model improves the internal representation space of domain words compared to the other models. The extrinsic, domain-dependent tasks, consisting of sequence tagging and classification, show that the model performs best in cybersecurity scenarios. In addition, we pay special attention to the choice of hyperparameters against catastrophic forgetting, as pre-trained models tend to forget the original knowledge during further training.

    @article{bayer_cysecbert_2024,title = {{CySecBERT}: {A} {Domain}-{Adapted} {Language} {Model} for the {Cybersecurity} {Domain}},volume = {27},issn = {2471-2566},url = {https://peasec.de/paper/2024/2024_BayerKuehnShanesazReuter_CySecBERT_TOPS.pdf},doi = {10.1145/3652594},abstract = {The field of cybersecurity is evolving fast. Security professionals are in need of intelligence on past, current and - ideally - on upcoming threats, because attacks are becoming more advanced and are increasingly targeting larger and more complex systems. Since the processing and analysis of such large amounts of information cannot be addressed manually, cybersecurity experts rely on machine learning techniques. In the textual domain, pre-trained language models like BERT have proven to be helpful as they provide a good baseline for further fine-tuning. However, due to the domain-knowledge and the many technical terms in cybersecurity, general language models might miss the gist of textual information. For this reason, we create a high-quality dataset and present a language model specifically tailored to the cybersecurity domain which can serve as a basic building block for cybersecurity systems. The model is compared on 15 tasks: Domain-dependent extrinsic tasks for measuring the performance on specific problems, intrinsic tasks for measuring the performance of the internal representations of the model as well as general tasks from the SuperGLUE benchmark. The results of the intrinsic tasks show that our model improves the internal representation space of domain words compared to the other models. The extrinsic, domain-dependent tasks, consisting of sequence tagging and classification, show that the model performs best in cybersecurity scenarios. In addition, we pay special attention to the choice of hyperparameters against catastrophic forgetting, as pre-trained models tend to forget the original knowledge during further training.},number = {2},journal = {ACM Transactions on Privacy and Security (TOPS)},author = {Bayer, Markus and Kuehn, Philipp and Shanehsaz, Ramin and Reuter, Christian},month = apr,year = {2024},note = {Place: New York, NY, USAPublisher: Association for Computing Machinery},keywords = {Student, Security, UsableSec, Projekt-CYWARN, Projekt-ATHENE-CyAware, Projekt-CYLENCE, A-Paper, Ranking-CORE-A, Ranking-ImpactFactor},}

  • Tom Biselli, Laura Utz, Christian Reuter (2024)
    Supporting Informed Choices about Browser Cookies: The Impact of Personalised Cookie Banners
    Proceedings on Privacy Enhancing Technologies (PoPETs) (1):171–191. doi:https://doi.org/10.56553/popets-2024-0011
    [BibTeX] [Abstract] [Download PDF]

    Browser cookies, especially those from third parties, pose a threat to individual privacy. While it is possible in principle to control the number of cookies accepted, this choice is often neither usable nor truly informed. To address this issue, this study used semi-structured interviews (N=19) to identify attitudes and user requirements to develop an alternative personalised cookie banner, which was evaluated in an online experiment (N=157). The cookie banner explanations were tailored to the privacy knowledge of three groups of users: low, medium and high. The online experiment measured cookie choices and perceived usability of the cookie banner across three groups: an experimental group that viewed the novel cookie banner with personalisation (personalised privacy assistant), a control group that viewed the novel cookie banner without personalisation (privacy assistant) and a control group that viewed the standard cookie banner provided by the website. The results indicate that the novel cookie banner (with or without personalisation) generally resulted in significantly fewer accepted cookies and increased usability compared to the standard cookie window. In addition, the personalised cookie banner resulted in significantly fewer accepted cookies and higher usability than the non-personalised cookie banner. These results suggest that tailoring cookie banners to users‘ privacy knowledge can be an effective approach to empowering users to make informed choices and better protect their privacy.

    @article{biselli_supporting_2024,title = {Supporting {Informed} {Choices} about {Browser} {Cookies}: {The} {Impact} of {Personalised} {Cookie} {Banners}},url = {https://petsymposium.org/popets/2024/popets-2024-0011.pdf},doi = {https://doi.org/10.56553/popets-2024-0011},abstract = {Browser cookies, especially those from third parties, pose a threat to individual privacy. While it is possible in principle to control the number of cookies accepted, this choice is often neither usable nor truly informed. To address this issue, this study used semi-structured interviews (N=19) to identify attitudes and user requirements to develop an alternative personalised cookie banner, which was evaluated in an online experiment (N=157). The cookie banner explanations were tailored to the privacy knowledge of three groups of users: low, medium and high. The online experiment measured cookie choices and perceived usability of the cookie banner across three groups: an experimental group that viewed the novel cookie banner with personalisation (personalised privacy assistant), a control group that viewed the novel cookie banner without personalisation (privacy assistant) and a control group that viewed the standard cookie banner provided by the website. The results indicate that the novel cookie banner (with or without personalisation) generally resulted in significantly fewer accepted cookies and increased usability compared to the standard cookie window. In addition, the personalised cookie banner resulted in significantly fewer accepted cookies and higher usability than the non-personalised cookie banner. These results suggest that tailoring cookie banners to users' privacy knowledge can be an effective approach to empowering users to make informed choices and better protect their privacy.},number = {1},journal = {Proceedings on Privacy Enhancing Technologies (PoPETs)},author = {Biselli, Tom and Utz, Laura and Reuter, Christian},year = {2024},keywords = {Student, Security, UsableSec, HCI, Projekt-CROSSING, A-Paper, AuswahlUsableSec, Selected, Ranking-CORE-A},pages = {171--191},}

  • Kilian Demuth, Sebastian Linsner, Tom Biselli, Marc-André Kaufhold, Christian Reuter (2024)
    Support Personas: A Concept for Tailored Support of Users of Privacy-Enhancing Technologies
    Proceedings on Privacy Enhancing Technologies (PoPETs) (4):797–817. doi:https://doi.org/10.56553/popets-2024-0142
    [BibTeX] [Abstract] [Download PDF]

    In many applications and websites people use in their everyday life, their privacy and data is threatened, e.g., by script tracking during browsing. Although researchers and companies have developed privacy-enhancing technologies (PETs), they are often difficult to use for lay users. In this paper, we conducted a literature review to classify users into different support personas based on their privacy competence and privacy concern. With developers of PETs in mind, support personas were envisioned to facilitate the customization of software according to the support needs of different users. In order to demonstrate the usefulness of support personas and based on workshop sessions with 15 participants, we designed a browser extension which supports users with the issue of script tracking by providing different user interfaces for different support personas. The following qualitative evaluation with 31 participants showed that the developed UI elements worked as intended for the different support personas. Therefore, we conclude the concept of support personas is useful in the development process of usable applications that enhance the privacy of the users while also educating them and thus potentially increasing their privacy literacy.

    @article{demuth_support_2024,title = {Support {Personas}: {A} {Concept} for {Tailored} {Support} of {Users} of {Privacy}-{Enhancing} {Technologies}},issn = {2299-0984},url = {https://petsymposium.org/popets/2024/popets-2024-0142.pdf},doi = {https://doi.org/10.56553/popets-2024-0142},abstract = {In many applications and websites people use in their everyday life, their privacy and data is threatened, e.g., by script tracking during browsing. Although researchers and companies have developed privacy-enhancing technologies (PETs), they are often difficult to use for lay users. In this paper, we conducted a literature review to classify users into different support personas based on their privacy competence and privacy concern. With developers of PETs in mind, support personas were envisioned to facilitate the customization of software according to the support needs of different users. In order to demonstrate the usefulness of support personas and based on workshop sessions with 15 participants, we designed a browser extension which supports users with the issue of script tracking by providing different user interfaces for different support personas. The following qualitative evaluation with 31 participants showed that the developed UI elements worked as intended for the different support personas. Therefore, we conclude the concept of support personas is useful in the development process of usable applications that enhance the privacy of the users while also educating them and thus potentially increasing their privacy literacy.},number = {4},journal = {Proceedings on Privacy Enhancing Technologies (PoPETs)},author = {Demuth, Kilian and Linsner, Sebastian and Biselli, Tom and Kaufhold, Marc-André and Reuter, Christian},year = {2024},keywords = {Security, UsableSec, HCI, Projekt-CROSSING, A-Paper, Projekt-ATHENE-PriVis, Ranking-CORE-A},pages = {797--817},}

  • Sebastian Linsner, Kilian Demuth, Marc Fischlin, Christian Reuter (2024)
    Decision-based Data Distribution (D³): Enabling Users to Minimize Data Propagation in Privacy-sensitive Scenarios
    Proceedings on Privacy Enhancing Technologies (PoPETs) (4). doi:10.56553/popets-2024-0113
    [BibTeX] [Abstract] [Download PDF]

    In many scenarios users have to communicate sensitive data with third parties such as doctors, lawyers, insurance companies, social workers or online shops. Handing over personal data is necessary to use those services but the delegation of tasks to increase efficiency still poses the risk that personal data might be leaked. To minimize this risk and further enhance the privacy of users, we propose an interaction concept that uses layered encryption of messages to provide a trade-off between privacy and usability. Users can choose which data is additionally encrypted in an inner layer, say, for the eyes of their doctor only, and which data is available in an outer (encrypted or unencrypted) layer for all staff members. Another benefit is the hiding of sensitive data from package inspection or crawling algorithms over emails, while less critical parts can still be processed by these systems via the partial access. To investigate this concept, we derive relevant use cases for form-based communication over email from a quantitative pre-study with 1011 participants, showing that general practitioners are the most suitable use case. We developed demonstrators for this use case and evaluated them in a qualitative study with 42 participants. Our results show that the possibility of minimizing the propagation of sensitive data through additional encryption is highly appreciated and the usage of form-based communication is a promising approach for the digital transformation.

    @article{linsner_decision-based_2024,title = {Decision-based {Data} {Distribution} ({D}³): {Enabling} {Users} to {Minimize} {Data} {Propagation} in {Privacy}-sensitive {Scenarios}},issn = {2299-0984},url = {https://petsymposium.org/popets/2024/popets-2024-0113.php},doi = {10.56553/popets-2024-0113},abstract = {In many scenarios users have to communicate sensitive data with third parties such as doctors, lawyers, insurance companies, social workers or online shops. Handing over personal data is necessary to use those services but the delegation of tasks to increase efficiency still poses the risk that personal data might be leaked. To minimize this risk and further enhance the privacy of users, we propose an interaction concept that uses layered encryption of messages to provide a trade-off between privacy and usability. Users can choose which data is additionally encrypted in an inner layer, say, for the eyes of their doctor only, and which data is available in an outer (encrypted or unencrypted) layer for all staff members. Another benefit is the hiding of sensitive data from package inspection or crawling algorithms over emails, while less critical parts can still be processed by these systems via the partial access. To investigate this concept, we derive relevant use cases for form-based communication over email from a quantitative pre-study with 1011 participants, showing that general practitioners are the most suitable use case. We developed demonstrators for this use case and evaluated them in a qualitative study with 42 participants. Our results show that the possibility of minimizing the propagation of sensitive data through additional encryption is highly appreciated and the usage of form-based communication is a promising approach for the digital transformation.},number = {4},journal = {Proceedings on Privacy Enhancing Technologies (PoPETs)},author = {Linsner, Sebastian and Demuth, Kilian and Fischlin, Marc and Reuter, Christian},year = {2024},keywords = {Security, UsableSec, HCI, Projekt-CROSSING, A-Paper, Selected, Projekt-ATHENE-PriVis, Ranking-CORE-A},}

  • Franz Kuntke, Marc-André Kaufhold, Sebastian Linsner, Christian Reuter (2024)
    GeoBox: Design and Evaluation of a Tool for Resilient and Decentralized Data Management in Agriculture
    Behaviour & Information Technology (BIT) ;43(4):764–786. doi:10.1080/0144929X.2023.2185747
    [BibTeX] [Abstract] [Download PDF]

    Farm Management Information Systems (FMIS) are an important core component of modern farming companies as they allow, e.g., to document activities, create fertilization plans, and feed digital equipment with required data. Since the entire agricultural sector is an essential component of food production, high standards of resilience should be established in the involved companies. Accordingly, the used software should also be designed with high standards on reliability and crisis capability. Based on a literature review, we found that software for farmers with certain resilience needs is lacking. Thus, we designed and evaluated a new FMIS concept with the user-centered design method. By conducting focus groups (two rounds, total N=57) in 2017 and 2019, we raised specific front-end and back-end requirements of farmers. Based on the requirements, we developed our concept for both front- and back-end in terms of a decentralized and offline-working FMIS. Through the evaluation with practitioners (N=16) of the implemented concept, we derived findings and implications, highlighting the need for privacy, stability, and offline-capability, as well as the UI-requirement to be supportive, e.g., with easy to understand icons and terms.

    @article{kuntke_geobox_2024,title = {{GeoBox}: {Design} and {Evaluation} of a {Tool} for {Resilient} and {Decentralized} {Data} {Management} in {Agriculture}},volume = {43},issn = {0144-929X},url = {https://peasec.de/paper/2023/2023_KuntkeKaufholdLinsnerReuter_GeoBox_BIT.pdf},doi = {10.1080/0144929X.2023.2185747},abstract = {Farm Management Information Systems (FMIS) are an important core component of modern farming companies as they allow, e.g., to document activities, create fertilization plans, and feed digital equipment with required data. Since the entire agricultural sector is an essential component of food production, high standards of resilience should be established in the involved companies. Accordingly, the used software should also be designed with high standards on reliability and crisis capability. Based on a literature review, we found that software for farmers with certain resilience needs is lacking. Thus, we designed and evaluated a new FMIS concept with the user-centered design method. By conducting focus groups (two rounds, total N=57) in 2017 and 2019, we raised specific front-end and back-end requirements of farmers. Based on the requirements, we developed our concept for both front- and back-end in terms of a decentralized and offline-working FMIS. Through the evaluation with practitioners (N=16) of the implemented concept, we derived findings and implications, highlighting the need for privacy, stability, and offline-capability, as well as the UI-requirement to be supportive, e.g., with easy to understand icons and terms.},number = {4},journal = {Behaviour \& Information Technology (BIT)},author = {Kuntke, Franz and Kaufhold, Marc-André and Linsner, Sebastian and Reuter, Christian},month = mar,year = {2024},note = {Publisher: Taylor \& Francis},keywords = {Projekt-AgriRegio, Projekt-GeoBox, Security, UsableSec, A-Paper, AuswahlUsableSec, Selected, Ranking-CORE-A, Ranking-ImpactFactor},pages = {764--786},}

  • Katrin Hartwig, Frederic Doell, Christian Reuter (2024)
    The Landscape of User-centered Misinformation Interventions – A Systematic Literature Review
    ACM Computing Surveys (CSUR) ;56(11). doi:10.1145/3674724
    [BibTeX] [Abstract] [Download PDF]

    Misinformation represent a key challenge for society. User-centered misinformation interventions as digital countermeasures that exert a direct influence on users represent a promising means to deal with the large amounts of information available. While an extensive body of research on this topic exists, researchers are confronted with a diverse research landscape spanning multiple disciplines. This review systematizes the landscape of user-centered misinformation interventions to facilitate knowledge transfer, identify trends, and enable informed decision-making. Over 3,700 scholarly publications were screened and a systematic literature review (N=108) was conducted. A taxonomy was derived regarding intervention design (e.g., binary label), user interaction (active or passive), and timing (e.g., post exposure to misinformation). We provide a structured overview of approaches across multiple disciplines, and derive six overarching challenges for future research.

    @article{hartwig_landscape_2024,title = {The {Landscape} of {User}-centered {Misinformation} {Interventions} – {A} {Systematic} {Literature} {Review}},volume = {56},issn = {0360-0300},url = {https://peasec.de/paper/2024/2024_HartwigDoellReuter_LandscapeUserCentredMisinfoInterventions_CSUR.pdf},doi = {10.1145/3674724},abstract = {Misinformation represent a key challenge for society. User-centered misinformation interventions as digital countermeasures that exert a direct influence on users represent a promising means to deal with the large amounts of information available. While an extensive body of research on this topic exists, researchers are confronted with a diverse research landscape spanning multiple disciplines. This review systematizes the landscape of user-centered misinformation interventions to facilitate knowledge transfer, identify trends, and enable informed decision-making. Over 3,700 scholarly publications were screened and a systematic literature review (N=108) was conducted. A taxonomy was derived regarding intervention design (e.g., binary label), user interaction (active or passive), and timing (e.g., post exposure to misinformation). We provide a structured overview of approaches across multiple disciplines, and derive six overarching challenges for future research.},number = {11},journal = {ACM Computing Surveys (CSUR)},author = {Hartwig, Katrin and Doell, Frederic and Reuter, Christian},month = jul,year = {2024},keywords = {Peace, Student, HCI, A-Paper, Ranking-CORE-A*, Selected, Projekt-NEBULA, Ranking-ImpactFactor},}

  • Florentin Putz, Steffen Haesler, Matthias Hollick (2024)
    Sounds Good? Fast and Secure Contact Exchange in Groups
    Proceedings of the ACM: Human Computer Interaction (PACM): Computer-Supported Cooperative Work and Social Computing (Best Paper Award) ;8(CSCW2). doi:10.1145/3686964
    [BibTeX] [Abstract] [Download PDF]

    Trustworthy digital communication requires the secure exchange of contact information, but current approaches lack usability and scalability for larger groups of users. We evaluate the usability of two secure contact exchange systems: the current state of the art, SafeSlinger, and our newly designed protocol, PairSonic, which extends trust from physical encounters to spontaneous online communication. Our lab study (N=45) demonstrates PairSonic’s superior usability, automating the tedious verification tasks from previous approaches via an acoustic out-of-band channel. Although participants significantly preferred our system, minimizing user effort surprisingly decreased the perceived security for some users, who associated security with complexity. We discuss user perceptions of the different protocol components and identify remaining usability barriers for CSCW application scenarios.

    @article{putz_sounds_2024,title = {Sounds {Good}? {Fast} and {Secure} {Contact} {Exchange} in {Groups}},volume = {8},url = {https://dl.acm.org/doi/10.1145/3686964},doi = {10.1145/3686964},abstract = {Trustworthy digital communication requires the secure exchange of contact information, but current approaches lack usability and scalability for larger groups of users. We evaluate the usability of two secure contact exchange systems: the current state of the art, SafeSlinger, and our newly designed protocol, PairSonic, which extends trust from physical encounters to spontaneous online communication. Our lab study (N=45) demonstrates PairSonic's superior usability, automating the tedious verification tasks from previous approaches via an acoustic out-of-band channel. Although participants significantly preferred our system, minimizing user effort surprisingly decreased the perceived security for some users, who associated security with complexity. We discuss user perceptions of the different protocol components and identify remaining usability barriers for CSCW application scenarios.},number = {CSCW2},journal = {Proceedings of the ACM: Human Computer Interaction (PACM): Computer-Supported Cooperative Work and Social Computing (Best Paper Award)},author = {Putz, Florentin and Haesler, Steffen and Hollick, Matthias},year = {2024},keywords = {Security, UsableSec, HCI, Projekt-emergenCITY, A-Paper, Ranking-CORE-A},}

  • Katrin Hartwig, Stefka Schmid, Tom Biselli, Helene Pleil, Christian Reuter (2024)
    Misleading Information in Crises: Exploring Content-specific Indicators on Twitter from a User Perspective
    Behaviour & Information Technology (BIT) :1–34. doi:10.1080/0144929X.2024.2373166
    [BibTeX] [Abstract] [Download PDF]

    Recent crises like the COVID-19 pandemic provoked an increasing appearance of misleading information, emphasizing the need for effective user-centered countermeasures as an important field in HCI research. This work investigates how content-specific user-centered indicators can contribute to an informed approach to misleading information. In a threefold study, we conducted an in-depth content analysis of 2,382 German tweets on Twitter (now X) to identify topical (e.g., 5G), formal (e.g., links), and rhetorical (e.g., sarcasm) characteristics through manual coding, followed by a qualitative online survey to evaluate which indicators users already use autonomously to assess a tweet’s credibility. Subsequently, in a think-aloud study participants qualitatively evaluated the identified indicators in terms of perceived comprehensibility and usefulness. While a number of indicators were found to be particularly comprehensible and useful (e.g., claim for absolute truth and rhetorical questions), our findings reveal limitations of indicator-based interventions, particularly for people with entrenched conspiracy theory views. We derive four implications for digitally supporting users in dealing with misleading information, especially during crises.

    @article{hartwig_misleading_2024,title = {Misleading {Information} in {Crises}: {Exploring} {Content}-specific {Indicators} on {Twitter} from a {User} {Perspective}},issn = {0144-929X},url = {https://doi.org/10.1080/0144929X.2024.2373166},doi = {10.1080/0144929X.2024.2373166},abstract = {Recent crises like the COVID-19 pandemic provoked an increasing appearance of misleading information,emphasizing the need for effective user-centered countermeasures as an important field in HCI research. Thiswork investigates how content-specific user-centered indicators can contribute to an informed approach tomisleading information. In a threefold study, we conducted an in-depth content analysis of 2,382 Germantweets on Twitter (now X) to identify topical (e.g., 5G), formal (e.g., links), and rhetorical (e.g., sarcasm)characteristics through manual coding, followed by a qualitative online survey to evaluate which indicatorsusers already use autonomously to assess a tweet’s credibility. Subsequently, in a think-aloud study participantsqualitatively evaluated the identified indicators in terms of perceived comprehensibility and usefulness. Whilea number of indicators were found to be particularly comprehensible and useful (e.g., claim for absolute truthand rhetorical questions), our findings reveal limitations of indicator-based interventions, particularly forpeople with entrenched conspiracy theory views. We derive four implications for digitally supporting users indealing with misleading information, especially during crises.},journal = {Behaviour \& Information Technology (BIT)},author = {Hartwig, Katrin and Schmid, Stefka and Biselli, Tom and Pleil, Helene and Reuter, Christian},year = {2024},keywords = {Crisis, HCI, A-Paper, Projekt-ATHENE-PriVis, Projekt-NEBULA, Ranking-CORE-A, Ranking-ImpactFactor},pages = {1--34},}

  • Sebastian Linsner, Kilian Demuth, Sebastian Surminski, Lucas Davi, Christian Reuter (2024)
    Building Trust in Remote Attestation Through Transparency – A Qualitative User Study on Observable Attestation
    Behaviour & Information Technology (BIT) :1–21. doi:10.1080/0144929X.2024.2374889
    [BibTeX] [Abstract] [Download PDF]

    Internet of Things (IoT) devices have become increasingly important within the smart home domain, making the security of the devices a critical aspect. The majority of IoT devices are black-box systems running closed and pre-installed firmware. This raises concerns about the trustworthiness of these devices, especially considering that some of them are shipped with a microphone or a camera. Remote attestation aims at validating the trustworthiness of these devices by verifying the integrity of the software. However, users cannot validate whether the attestation has actually taken place and has not been manipulated by an attacker, raising the need for HCI research on trust and understandability. We conducted a qualitative study with 35 participants, investigating trust in the attestation process and whether this trust can be improved by additional explanations in the application. We developed an application that allows users to attest a smart speaker using their smartphone over an audio channel to identify the attested device and observe the attestation process. In order to observe the differences between the applications with and without explanations, we performed A/B testing. We discovered that trust increases when additional explanations of the technical process are provided, improving the understanding of the attestation process.

    @article{linsner_building_2024,title = {Building {Trust} in {Remote} {Attestation} {Through} {Transparency} – {A} {Qualitative} {User} {Study} on {Observable} {Attestation}},issn = {0144-929X},url = {https://doi.org/10.1080/0144929X.2024.2374889},doi = {10.1080/0144929X.2024.2374889},abstract = {Internet of Things (IoT) devices have become increasingly important within the smart home domain, making the security of the devices a critical aspect. The majority of IoT devices are black-box systems running closed and pre-installed firmware. This raises concerns about the trustworthiness of these devices, especially considering that some of them are shipped with a microphone or a camera. Remote attestation aims at validating the trustworthiness of these devices by verifying the integrity of the software. However, users cannot validate whether the attestation has actually taken place and has not been manipulated by an attacker, raising the need for HCI research on trust and understandability. We conducted a qualitative study with 35 participants, investigating trust in the attestation process and whether this trust can be improved by additional explanations in the application. We developed an application that allows users to attest a smart speaker using their smartphone over an audio channel to identify the attested device and observe the attestation process. In order to observe the differences between the applications with and without explanations, we performed A/B testing. We discovered that trust increases when additional explanations of the technical process are provided, improving the understanding of the attestation process.},journal = {Behaviour \& Information Technology (BIT)},author = {Linsner, Sebastian and Demuth, Kilian and Surminski, Sebastian and Davi, Lucas and Reuter, Christian},year = {2024},note = {Publisher: Taylor \& Francis},keywords = {Security, UsableSec, Projekt-CROSSING, A-Paper, Projekt-ATHENE-PriVis, Ranking-ImpactFactor},pages = {1--21},}

  • Enno Steinbrink, Christian Reuter (2024)
    The Impact of Transparency and Trust on User Acceptance of Contact Tracing Apps: Implications for the Adoption of Crisis Response Apps
    International Journal of Disaster Risk Reduction :104661. doi:10.1016/j.ijdrr.2024.104661
    [BibTeX] [Abstract] [Download PDF]

    Digital technology and smartphones provide great opportunities to support crisis response measures. During the COVID-19 pandemic, many countries introduced contact tracing apps (CTAs) to prevent the virus’s spread and identify infection clusters. Because wide acceptance is necessary for these apps to work, it has been a subject of research. Past research often highlighted the role of trust for acceptance and suggested that technical transparency by opening the source code can help to build trust. For this reason, we studied the acceptance of two German apps: the Corona-Warn-App (CWA), which was developed as open-source software early on, and the Luca app, which did not publish the source code initially. We conducted a multinomial logistic regression testing effects on the adoption of (1) only the CWA, (2) only the Luca app, or (3) both apps. As predictors, we considered the role of trust in the app publisher and the government and controlled for predictors relevant to past research. We found trust to have a significant effect on the acceptance of the apps. A self-reported understanding of the term “open-source software” and a perceived threat by COVID-19 had a positive effect for the Corona-Warn-App or both apps but not for the Luca app alone. Being from Eastern Germany lowered the acceptance of the Luca app or both apps. Our findings can add to previous CTA acceptance research and provide insights for policymakers for future digital crisis measures, especially for populations comparable to the German population regarding government trust and privacy attitudes.

    @article{steinbrink_impact_2024,title = {The {Impact} of {Transparency} and {Trust} on {User} {Acceptance} of {Contact} {Tracing} {Apps}: {Implications} for the {Adoption} of {Crisis} {Response} {Apps}},issn = {2212-4209},url = {https://www.sciencedirect.com/science/article/pii/S2212420924004230},doi = {10.1016/j.ijdrr.2024.104661},abstract = {Digital technology and smartphones provide great opportunities to support crisis response measures. During the COVID-19 pandemic, many countries introduced contact tracing apps (CTAs) to prevent the virus’s spread and identify infection clusters. Because wide acceptance is necessary for these apps to work, it has been a subject of research. Past research often highlighted the role of trust for acceptance and suggested that technical transparency by opening the source code can help to build trust. For this reason, we studied the acceptance of two German apps: the Corona-Warn-App (CWA), which was developed as open-source software early on, and the Luca app, which did not publish the source code initially. We conducted a multinomial logistic regression testing effects on the adoption of (1) only the CWA, (2) only the Luca app, or (3) both apps. As predictors, we considered the role of trust in the app publisher and the government and controlled for predictors relevant to past research. We found trust to have a significant effect on the acceptance of the apps. A self-reported understanding of the term “open-source software” and a perceived threat by COVID-19 had a positive effect for the Corona-Warn-App or both apps but not for the Luca app alone. Being from Eastern Germany lowered the acceptance of the Luca app or both apps. Our findings can add to previous CTA acceptance research and provide insights for policymakers for future digital crisis measures, especially for populations comparable to the German population regarding government trust and privacy attitudes.},journal = {International Journal of Disaster Risk Reduction},author = {Steinbrink, Enno and Reuter, Christian},month = jul,year = {2024},keywords = {Crisis, HCI, A-Paper, Projekt-ATHENE-PriVis, Ranking-ImpactFactor, Projekt-GRKPrivacy},pages = {104661},}

  • Stefka Schmid, BaoChau Pham, AnnaKatharina Ferl (2024)
    Trust in Artificial Intelligence: Producing Ontological Security through Governmental Visions
    Cooperation and Conflict . doi:10.1177/00108367241288073
    [BibTeX] [Abstract] [Download PDF]

    With developments in Artificial Intelligence widely framed as security concern in both military and civilian realms, governments have turned their attention to regulating and governing AI. In a study of US, Chinese, and EU AI documents, we go beyond instrumental understandings of AI as a technological capability, which serves states‘ self-interests and the maintenance of their (supra)national security. Our specific interest lies in how AI policies tap into both problem-solving approaches and affective registers to achieve both physical as well as ontological security. We find that in governmental visions, AI is perceived as a capability that enhances societal, and geopolitical interests while its risks are framed as manageable. This echoes strands within Human-Computer Interaction that draw on human-centered perceptions of technology and assumptions about human-AI relationships of trust. Despite different cultural and institutional settings, the visions of future AI development are shaped by this (shared) understanding of human-AI interaction, offering common ground in the navigation of innovation policies.

    @article{schmid_trust_2024,title = {Trust in {Artificial} {Intelligence}: {Producing} {Ontological} {Security} through {Governmental} {Visions}},url = {https://doi.org/10.1177/00108367241288073},doi = {10.1177/00108367241288073},abstract = {With developments in Artificial Intelligence widely framed as security concern in both military and civilian realms, governments have turned their attention to regulating and governing AI. In a study of US, Chinese, and EU AI documents, we go beyond instrumental understandings of AI as a technological capability, which serves states' self-interests and the maintenance of their (supra)national security. Our specific interest lies in how AI policies tap into both problem-solving approaches and affective registers to achieve both physical as well as ontological security. We find that in governmental visions, AI is perceived as a capability that enhances societal, and geopolitical interests while its risks are framed as manageable. This echoes strands within Human-Computer Interaction that draw on human-centered perceptions of technology and assumptions about human-AI relationships of trust. Despite different cultural and institutional settings, the visions of future AI development are shaped by this (shared) understanding of human-AI interaction, offering common ground in the navigation of innovation policies.},journal = {Cooperation and Conflict},author = {Schmid, Stefka and Pham, Bao-Chau and Ferl, Anna-Katharina},year = {2024},keywords = {Peace, Projekt-TraCe, A-Paper, Ranking-ImpactFactor, AuswahlPeace},}

  • Thea Riebe, Christian Reuter, Anja-Liisa Gonsior, Lilian Reichert (2024)
    Envisioning Human-Machine Interaction in Future Warfare: Defence Industry Narratives on Human Control of Autonomous Weapon Systems
    Global Society . doi:10.1080/13600826.2024.2436966
    [BibTeX] [Abstract] [Download PDF]

    The development of artificial intelligence and autonomous functions in the military domain has an immense impact on technologies being developed by the private defence industry. Defence firms contribute to the narratives and visions on autonomous weapon systems and the future of warfare, e.g. in the form of strategic marketing of their products. However, their role has so far been understudied, especially regarding autonomous weapon systems. As the normative debate revolves around aspects of human control, this work examines the narratives of (meaningful) human control in the marketing of autonomous military systems by defence manufacturers. Based on a comprehensive content analysis of twenty defence firms, we identified three main narratives, which envision autonomy as a military advantage, the role of the human in the future of warfare, and human-machine teaming. Based on the results, we argue that defence companies reproduce and adapt narratives which shape expectations and visions of human control of autonomous weapon systems in anticipation of emerging norms for (meaningful) human control. However, without specifications and verification mechanisms, there is no indication that human control will be meaningful.

    @article{riebe_envisioning_2024,title = {Envisioning {Human}-{Machine} {Interaction} in {Future} {Warfare}: {Defence} {Industry} {Narratives} on {Human} {Control} of {Autonomous} {Weapon} {Systems}},url = {https://doi.org/10.1080/13600826.2024.2436966},doi = {10.1080/13600826.2024.2436966},abstract = {The development of artificial intelligence and autonomous functions in the military domain has an immense impact on technologies being developed by the private defence industry. Defence firms contribute to the narratives and visions on autonomous weapon systems and the future of warfare, e.g. in the form of strategic marketing of their products. However, their role has so far been understudied, especially regarding autonomous weapon systems. As the normative debate revolves around aspects of human control, this work examines the narratives of (meaningful) human control in the marketing of autonomous military systems by defence manufacturers. Based on a comprehensive content analysis of twenty defence firms, we identified three main narratives, which envision autonomy as a military advantage, the role of the human in the future of warfare, and human-machine teaming. Based on the results, we argue that defence companies reproduce and adapt narratives which shape expectations and visions of human control of autonomous weapon systems in anticipation of emerging norms for (meaningful) human control. However, without specifications and verification mechanisms, there is no indication that human control will be meaningful.},journal = {Global Society},author = {Riebe, Thea and Reuter, Christian and Gonsior, Anja-Liisa and Reichert, Lilian},year = {2024},keywords = {Peace, Projekt-TraCe, Student, HCI, Projekt-ATHENE-CyAware, A-Paper, Ranking-ImpactFactor, AuswahlPeace},}

    Alle Paper 2024

    Begutachtete Zeitschriften / Peer-reviewed Journals

  • Andrew Crawford, Laura Fichtner, Laura Guntrum, Stephanie Jänsch, Niklas Krösche, Eloïse Soulier, ClaraAuguste Süß (2024)
    Ethical research in the German social sciences: Exploring the significance and challenges of institutionalized research ethics practices
    Research Ethics :17470161241270787. doi:10.1177/17470161241270787
    [BibTeX] [Abstract] [Download PDF]

    This article explores two key facets of institutionalized ethical review processes in Germany: (1) their importance in shaping ethical research and (2) their associated challenges, with a specific focus on their implications within the social sciences. Ethical considerations play a pivotal role in (social science) research, safeguarding, amongst others, the rights and well-being of participants and ensuring research integrity. Despite notable progress in promoting research ethics, German research institutions still need to significantly improve their ethics review processes. To address these challenges, this article emphasizes the need for expanding the current management of research ethics and implementing what we call ?Institutionalized Research Ethics Practices?? (IREPs), which include but go beyond the scope of common Institutional Review Boards (IRBs). Drawing on two workshops with researchers and IRB members, and a systematic review of existing IRBs in the German social sciences, we propose concrete recommendations for developing and enhancing IREPs, including a conducive environment, accessibility, fairness, and fostering expertise (CAFE). These enhancements aim to strengthen Germany?s research ethics infrastructure and promote responsible and ethical research practices in the social sciences.

    @article{crawford_ethical_2024,title = {Ethical research in the {German} social sciences: {Exploring} the significance and challenges of institutionalized research ethics practices},issn = {1747-0161},url = {https://doi.org/10.1177/17470161241270787},doi = {10.1177/17470161241270787},abstract = {This article explores two key facets of institutionalized ethical review processes in Germany: (1) their importance in shaping ethical research and (2) their associated challenges, with a specific focus on their implications within the social sciences. Ethical considerations play a pivotal role in (social science) research, safeguarding, amongst others, the rights and well-being of participants and ensuring research integrity. Despite notable progress in promoting research ethics, German research institutions still need to significantly improve their ethics review processes. To address these challenges, this article emphasizes the need for expanding the current management of research ethics and implementing what we call ?Institutionalized Research Ethics Practices?? (IREPs), which include but go beyond the scope of common Institutional Review Boards (IRBs). Drawing on two workshops with researchers and IRB members, and a systematic review of existing IRBs in the German social sciences, we propose concrete recommendations for developing and enhancing IREPs, including a conducive environment, accessibility, fairness, and fostering expertise (CAFE). These enhancements aim to strengthen Germany?s research ethics infrastructure and promote responsible and ethical research practices in the social sciences.},urldate = {2024-08-19},journal = {Research Ethics},author = {Crawford, Andrew and Fichtner, Laura and Guntrum, Laura and Jänsch, Stephanie and Krösche, Niklas and Soulier, Eloïse and Süß, Clara-Auguste},month = aug,year = {2024},note = {Publisher: SAGE Publications Ltd},keywords = {Peace, Ranking-ImpactFactor},pages = {17470161241270787},}

  • Anja-Liisa Gonsior (2024)
    Die intersektionale Perspektive auf letale autonome Waffensysteme: Eine Analyse der Diskurse innerhalb der UN-Waffenkonvention
    Zeitschrift für Außen- und Sicherheitspolitik (ZfAS) . doi:10.1007/s12399-024-00999-3
    [BibTeX] [Abstract] [Download PDF]

    Die Entwicklung letaler (teil)autonomer Waffensysteme (LAWS) gewinnt zunehmend an Bedeutung. Seit 2013 wird das Thema innerhalb der UN Convention on Certain Conventional Weapons zwischen Mitgliedsstaaten, Zivilgesellschaft und Fachexpert*innen diskutiert. Während sich die Debatte zu Beginn stark mit definitorischen Fragen von LAWS auseinandersetzte, so dominieren im Forum derzeit technische und rechtliche Fragen, was sich auch im entsprechenden wissenschaftlichen Diskurs widerspiegelt. Andererseits haben auch zivilgesellschaftliche Akteure den Verhandlungsprozess wesentlich beeinflusst, nicht zuletzt die Campaign to Stop Killer Robots, welche an der Initiierung des Verhandlungsrahmens maßgeblich beteiligt war. Einer der zentralen Argumentationsstränge dieser zivilgesellschaftlichen Akteure konzentriert sich auf eine intersektionale Perspektive, die unter anderem auf Bias in Technologien und Anwendungen aufmerksam macht, und versucht, diese Perspektiven in die GGE zu LAWS einzubringen und zu stärken. Die Analyse von 51 UN-Dokumenten und Gespräche mit Expert*innen zeigen, dass – im Hinblick auf Intersektionalität – insbesondere die Konzepte Gender und Race in den GGE-Diskussionen berücksichtigt werden, wenn auch nur mit geringem Gewicht. NGOs konnten jedoch die Gesamtdebatte beeinflussen und neue Themen einbringen, indem sie an etabliertere Diskurse in der Debatte anknüpften, wie z. B. an rechtliche oder technische Diskurse.

    @article{gonsior_intersektionale_2024,title = {Die intersektionale {Perspektive} auf letale autonome {Waffensysteme}: {Eine} {Analyse} der {Diskurse} innerhalb der {UN}-{Waffenkonvention}},issn = {1866-2196},url = {https://doi.org/10.1007/s12399-024-00999-3},doi = {10.1007/s12399-024-00999-3},abstract = {Die Entwicklung letaler (teil)autonomer Waffensysteme (LAWS) gewinnt zunehmend an Bedeutung. Seit 2013 wird das Thema innerhalb der UN Convention on Certain Conventional Weapons zwischen Mitgliedsstaaten, Zivilgesellschaft und Fachexpert*innen diskutiert. Während sich die Debatte zu Beginn stark mit definitorischen Fragen von LAWS auseinandersetzte, so dominieren im Forum derzeit technische und rechtliche Fragen, was sich auch im entsprechenden wissenschaftlichen Diskurs widerspiegelt. Andererseits haben auch zivilgesellschaftliche Akteure den Verhandlungsprozess wesentlich beeinflusst, nicht zuletzt die Campaign to Stop Killer Robots, welche an der Initiierung des Verhandlungsrahmens maßgeblich beteiligt war. Einer der zentralen Argumentationsstränge dieser zivilgesellschaftlichen Akteure konzentriert sich auf eine intersektionale Perspektive, die unter anderem auf Bias in Technologien und Anwendungen aufmerksam macht, und versucht, diese Perspektiven in die GGE zu LAWS einzubringen und zu stärken. Die Analyse von 51 UN-Dokumenten und Gespräche mit Expert*innen zeigen, dass – im Hinblick auf Intersektionalität – insbesondere die Konzepte Gender und Race in den GGE-Diskussionen berücksichtigt werden, wenn auch nur mit geringem Gewicht. NGOs konnten jedoch die Gesamtdebatte beeinflussen und neue Themen einbringen, indem sie an etabliertere Diskurse in der Debatte anknüpften, wie z. B. an rechtliche oder technische Diskurse.},journal = {Zeitschrift für Außen- und Sicherheitspolitik (ZfAS)},author = {Gonsior, Anja-Liisa},month = jul,year = {2024},keywords = {Peace, Projekt-TraCe, Projekt-ATHENE-CyAware},}

  • Enno Steinbrink, Christian Reuter (2024)
    The Impact of Transparency and Trust on User Acceptance of Contact Tracing Apps: Implications for the Adoption of Crisis Response Apps
    International Journal of Disaster Risk Reduction :104661. doi:10.1016/j.ijdrr.2024.104661
    [BibTeX] [Abstract] [Download PDF]

    Digital technology and smartphones provide great opportunities to support crisis response measures. During the COVID-19 pandemic, many countries introduced contact tracing apps (CTAs) to prevent the virus’s spread and identify infection clusters. Because wide acceptance is necessary for these apps to work, it has been a subject of research. Past research often highlighted the role of trust for acceptance and suggested that technical transparency by opening the source code can help to build trust. For this reason, we studied the acceptance of two German apps: the Corona-Warn-App (CWA), which was developed as open-source software early on, and the Luca app, which did not publish the source code initially. We conducted a multinomial logistic regression testing effects on the adoption of (1) only the CWA, (2) only the Luca app, or (3) both apps. As predictors, we considered the role of trust in the app publisher and the government and controlled for predictors relevant to past research. We found trust to have a significant effect on the acceptance of the apps. A self-reported understanding of the term “open-source software” and a perceived threat by COVID-19 had a positive effect for the Corona-Warn-App or both apps but not for the Luca app alone. Being from Eastern Germany lowered the acceptance of the Luca app or both apps. Our findings can add to previous CTA acceptance research and provide insights for policymakers for future digital crisis measures, especially for populations comparable to the German population regarding government trust and privacy attitudes.

    @article{steinbrink_impact_2024,title = {The {Impact} of {Transparency} and {Trust} on {User} {Acceptance} of {Contact} {Tracing} {Apps}: {Implications} for the {Adoption} of {Crisis} {Response} {Apps}},issn = {2212-4209},url = {https://www.sciencedirect.com/science/article/pii/S2212420924004230},doi = {10.1016/j.ijdrr.2024.104661},abstract = {Digital technology and smartphones provide great opportunities to support crisis response measures. During the COVID-19 pandemic, many countries introduced contact tracing apps (CTAs) to prevent the virus’s spread and identify infection clusters. Because wide acceptance is necessary for these apps to work, it has been a subject of research. Past research often highlighted the role of trust for acceptance and suggested that technical transparency by opening the source code can help to build trust. For this reason, we studied the acceptance of two German apps: the Corona-Warn-App (CWA), which was developed as open-source software early on, and the Luca app, which did not publish the source code initially. We conducted a multinomial logistic regression testing effects on the adoption of (1) only the CWA, (2) only the Luca app, or (3) both apps. As predictors, we considered the role of trust in the app publisher and the government and controlled for predictors relevant to past research. We found trust to have a significant effect on the acceptance of the apps. A self-reported understanding of the term “open-source software” and a perceived threat by COVID-19 had a positive effect for the Corona-Warn-App or both apps but not for the Luca app alone. Being from Eastern Germany lowered the acceptance of the Luca app or both apps. Our findings can add to previous CTA acceptance research and provide insights for policymakers for future digital crisis measures, especially for populations comparable to the German population regarding government trust and privacy attitudes.},journal = {International Journal of Disaster Risk Reduction},author = {Steinbrink, Enno and Reuter, Christian},month = jul,year = {2024},keywords = {Crisis, HCI, A-Paper, Projekt-ATHENE-PriVis, Ranking-ImpactFactor, Projekt-GRKPrivacy},pages = {104661},}

  • Jasmin Haunschild, Felix Burger, Christian Reuter (2024)
    Understanding Crisis Preparedness: Insights from Personal Values, Beliefs, Social Norms, and Personal Norms
    Proceedings of the Information Systems for Crisis Response and Management (ISCRAM) (Best Paper Award) ;21.
    [BibTeX] [Abstract] [Download PDF]

    In disasters and crises, crisis preparation at the household level is crucial for societal resilience. However, motivating citizens to take personal responsibility and to implement preparedness measures remains challenging. This study investigates the impact of values, beliefs and norms on preparedness. Through a survey in Germany on resource-oriented crisis preparedness and participants’ values, a group of more prepared and less prepared individuals was differentiated. We quantitatively analyzed the correlation between values and crisis preparedness. A quantitative analysis revealed a significant association between the value of benevolence and higher preparedness. Follow-up interviews (N=30) explored participants&\#039; beliefs and norms, showing minimal group differences. Although crisis preparedness is generally viewed positively, strong negativity exists towards perceived “hoarders”. The study discusses implication for crisis communication and the design of nudges and persuasive systems, emphasizing intervention that can trigger benevolence to foster preparedness and appeal to the social benefits to counter the narrative of anti-social crisis preparedness.

    @article{haunschild_understanding_2024,title = {Understanding {Crisis} {Preparedness}: {Insights} from {Personal} {Values}, {Beliefs}, {Social} {Norms}, and {Personal} {Norms}},volume = {21},url = {https://ojs.iscram.org/index.php/Proceedings/article/view/19},abstract = {In disasters and crises, crisis preparation at the household level is crucial for societal resilience. However, motivating citizens to take personal responsibility and to implement preparedness measures remains challenging. This study investigates the impact of values, beliefs and norms on preparedness. Through a survey in Germany on resource-oriented crisis preparedness and participants’ values, a group of more prepared and less prepared individuals was differentiated. We quantitatively analyzed the correlation between values and crisis preparedness. A quantitative analysis revealed a significant association between the value of benevolence and higher preparedness. Follow-up interviews (N=30) explored participants\&\#039; beliefs and norms, showing minimal group differences. Although crisis preparedness is generally viewed positively, strong negativity exists towards perceived “hoarders”. The study discusses implication for crisis communication and the design of nudges and persuasive systems, emphasizing intervention that can trigger benevolence to foster preparedness and appeal to the social benefits to counter the narrative of anti-social crisis preparedness.},urldate = {2024-05-27},journal = {Proceedings of the Information Systems for Crisis Response and Management (ISCRAM) (Best Paper Award)},author = {Haunschild, Jasmin and Burger, Felix and Reuter, Christian},month = may,year = {2024},note = {Section: ISCRAM Proceedings},keywords = {Student, Crisis, Projekt-emergenCITY, Projekt-ATHENE-SecUrban},}

  • Markus Bayer, Philipp Kuehn, Ramin Shanehsaz, Christian Reuter (2024)
    CySecBERT: A Domain-Adapted Language Model for the Cybersecurity Domain
    ACM Transactions on Privacy and Security (TOPS) ;27(2). doi:10.1145/3652594
    [BibTeX] [Abstract] [Download PDF]

    The field of cybersecurity is evolving fast. Security professionals are in need of intelligence on past, current and – ideally – on upcoming threats, because attacks are becoming more advanced and are increasingly targeting larger and more complex systems. Since the processing and analysis of such large amounts of information cannot be addressed manually, cybersecurity experts rely on machine learning techniques. In the textual domain, pre-trained language models like BERT have proven to be helpful as they provide a good baseline for further fine-tuning. However, due to the domain-knowledge and the many technical terms in cybersecurity, general language models might miss the gist of textual information. For this reason, we create a high-quality dataset and present a language model specifically tailored to the cybersecurity domain which can serve as a basic building block for cybersecurity systems. The model is compared on 15 tasks: Domain-dependent extrinsic tasks for measuring the performance on specific problems, intrinsic tasks for measuring the performance of the internal representations of the model as well as general tasks from the SuperGLUE benchmark. The results of the intrinsic tasks show that our model improves the internal representation space of domain words compared to the other models. The extrinsic, domain-dependent tasks, consisting of sequence tagging and classification, show that the model performs best in cybersecurity scenarios. In addition, we pay special attention to the choice of hyperparameters against catastrophic forgetting, as pre-trained models tend to forget the original knowledge during further training.

    @article{bayer_cysecbert_2024,title = {{CySecBERT}: {A} {Domain}-{Adapted} {Language} {Model} for the {Cybersecurity} {Domain}},volume = {27},issn = {2471-2566},url = {https://peasec.de/paper/2024/2024_BayerKuehnShanesazReuter_CySecBERT_TOPS.pdf},doi = {10.1145/3652594},abstract = {The field of cybersecurity is evolving fast. Security professionals are in need of intelligence on past, current and - ideally - on upcoming threats, because attacks are becoming more advanced and are increasingly targeting larger and more complex systems. Since the processing and analysis of such large amounts of information cannot be addressed manually, cybersecurity experts rely on machine learning techniques. In the textual domain, pre-trained language models like BERT have proven to be helpful as they provide a good baseline for further fine-tuning. However, due to the domain-knowledge and the many technical terms in cybersecurity, general language models might miss the gist of textual information. For this reason, we create a high-quality dataset and present a language model specifically tailored to the cybersecurity domain which can serve as a basic building block for cybersecurity systems. The model is compared on 15 tasks: Domain-dependent extrinsic tasks for measuring the performance on specific problems, intrinsic tasks for measuring the performance of the internal representations of the model as well as general tasks from the SuperGLUE benchmark. The results of the intrinsic tasks show that our model improves the internal representation space of domain words compared to the other models. The extrinsic, domain-dependent tasks, consisting of sequence tagging and classification, show that the model performs best in cybersecurity scenarios. In addition, we pay special attention to the choice of hyperparameters against catastrophic forgetting, as pre-trained models tend to forget the original knowledge during further training.},number = {2},journal = {ACM Transactions on Privacy and Security (TOPS)},author = {Bayer, Markus and Kuehn, Philipp and Shanehsaz, Ramin and Reuter, Christian},month = apr,year = {2024},note = {Place: New York, NY, USAPublisher: Association for Computing Machinery},keywords = {Student, Security, UsableSec, Projekt-CYWARN, Projekt-ATHENE-CyAware, Projekt-CYLENCE, A-Paper, Ranking-CORE-A, Ranking-ImpactFactor},}

  • Franz Kuntke, Marc-André Kaufhold, Sebastian Linsner, Christian Reuter (2024)
    GeoBox: Design and Evaluation of a Tool for Resilient and Decentralized Data Management in Agriculture
    Behaviour & Information Technology (BIT) ;43(4):764–786. doi:10.1080/0144929X.2023.2185747
    [BibTeX] [Abstract] [Download PDF]

    Farm Management Information Systems (FMIS) are an important core component of modern farming companies as they allow, e.g., to document activities, create fertilization plans, and feed digital equipment with required data. Since the entire agricultural sector is an essential component of food production, high standards of resilience should be established in the involved companies. Accordingly, the used software should also be designed with high standards on reliability and crisis capability. Based on a literature review, we found that software for farmers with certain resilience needs is lacking. Thus, we designed and evaluated a new FMIS concept with the user-centered design method. By conducting focus groups (two rounds, total N=57) in 2017 and 2019, we raised specific front-end and back-end requirements of farmers. Based on the requirements, we developed our concept for both front- and back-end in terms of a decentralized and offline-working FMIS. Through the evaluation with practitioners (N=16) of the implemented concept, we derived findings and implications, highlighting the need for privacy, stability, and offline-capability, as well as the UI-requirement to be supportive, e.g., with easy to understand icons and terms.

    @article{kuntke_geobox_2024,title = {{GeoBox}: {Design} and {Evaluation} of a {Tool} for {Resilient} and {Decentralized} {Data} {Management} in {Agriculture}},volume = {43},issn = {0144-929X},url = {https://peasec.de/paper/2023/2023_KuntkeKaufholdLinsnerReuter_GeoBox_BIT.pdf},doi = {10.1080/0144929X.2023.2185747},abstract = {Farm Management Information Systems (FMIS) are an important core component of modern farming companies as they allow, e.g., to document activities, create fertilization plans, and feed digital equipment with required data. Since the entire agricultural sector is an essential component of food production, high standards of resilience should be established in the involved companies. Accordingly, the used software should also be designed with high standards on reliability and crisis capability. Based on a literature review, we found that software for farmers with certain resilience needs is lacking. Thus, we designed and evaluated a new FMIS concept with the user-centered design method. By conducting focus groups (two rounds, total N=57) in 2017 and 2019, we raised specific front-end and back-end requirements of farmers. Based on the requirements, we developed our concept for both front- and back-end in terms of a decentralized and offline-working FMIS. Through the evaluation with practitioners (N=16) of the implemented concept, we derived findings and implications, highlighting the need for privacy, stability, and offline-capability, as well as the UI-requirement to be supportive, e.g., with easy to understand icons and terms.},number = {4},journal = {Behaviour \& Information Technology (BIT)},author = {Kuntke, Franz and Kaufhold, Marc-André and Linsner, Sebastian and Reuter, Christian},month = mar,year = {2024},note = {Publisher: Taylor \& Francis},keywords = {Projekt-AgriRegio, Projekt-GeoBox, Security, UsableSec, A-Paper, AuswahlUsableSec, Selected, Ranking-CORE-A, Ranking-ImpactFactor},pages = {764--786},}

  • Laura Guntrum, Sofía Cerrillo, Christian Reuter (2024)
    Navigating the Pandemic through Technology: Colombian NGOs Promoting Peace during the COVID-19 era
    Peacebuilding & Development . doi:10.1177/15423166241293856
    [BibTeX] [Abstract] [Download PDF]

    This article examines how Colombian NGOs use Information and Communication Technologies (ICTs) for peacebuilding attempts amid the COVID-19 pandemic. Drawing from 17 interviews with NGO members, the study underscores the pivotal role of digital peacebuilding in sustaining and expanding peace attempts, effective data management, and a broader engagement of target groups beyond in-person activities often associated with safety and financial concerns. The findings also identify prevailing challenges of incorporating ICTs in NGO’s peacebuilding activities, ranging from privacy-related concerns to connectivity issues. The article points out the potential for NGOs to enhance interactivity, knowledge transfer, and to diversify their activities, including IT-security training and awareness campaigns on hate speech and propaganda. It also emphasizes the importance of developing risk reduction strategies tailored to the specific needs of different target groups.

    @article{guntrum_navigating_2024,title = {Navigating the {Pandemic} through {Technology}: {Colombian} {NGOs} {Promoting} {Peace} during the {COVID}-19 era},url = {https://peasec.de/paper/2024/2024_GuntrumCerrilloReuter_NavigatingPanedemicThroughTechnology_PeaceDev.pdf},doi = {10.1177/15423166241293856},abstract = {This article examines how Colombian NGOs use Information and Communication Technologies (ICTs) for peacebuilding attempts amid the COVID-19 pandemic. Drawing from 17 interviews with NGO members, the study underscores the pivotal role of digital peacebuilding in sustaining and expanding peace attempts, effective data management, and a broader engagement of target groups beyond in-person activities often associated with safety and financial concerns. The findings also identify prevailing challenges of incorporating ICTs in NGO's peacebuilding activities, ranging from privacy-related concerns to connectivity issues. The article points out the potential for NGOs to enhance interactivity, knowledge transfer, and to diversify their activities, including IT-security training and awareness campaigns on hate speech and propaganda. It also emphasizes the importance of developing risk reduction strategies tailored to the specific needs of different target groups.},journal = {Peacebuilding \& Development},author = {Guntrum, Laura and Cerrillo, Sofía and Reuter, Christian},year = {2024},keywords = {Peace, Projekt-TraCe, Student},}

  • Markus Bayer, Christian Reuter (2024)
    ActiveLLM: Large Language Model-based Active Learning for Textual Few-Shot Scenarios
    arXiv . doi:10.48550/arXiv.2405.10808
    [BibTeX] [Abstract] [Download PDF]

    Active learning is designed to minimize annotation efforts by prioritizing instances that most enhance learning. However, many active learning strategies struggle with a ‚cold start‘ problem, needing substantial initial data to be effective. This limitation often reduces their utility for pre-trained models, which already perform well in few-shot scenarios. To address this, we introduce ActiveLLM, a novel active learning approach that leverages large language models such as GPT-4, Llama 3, and Mistral Large for selecting instances. We demonstrate that ActiveLLM significantly enhances the classification performance of BERT classifiers in few-shot scenarios, outperforming both traditional active learning methods and the few-shot learning method SetFit. Additionally, ActiveLLM can be extended to non-few-shot scenarios, allowing for iterative selections. In this way, ActiveLLM can even help other active learning strategies to overcome their cold start problem. Our results suggest that ActiveLLM offers a promising solution for improving model performance across various learning setups.

    @article{bayer_activellm_2024,title = {{ActiveLLM}: {Large} {Language} {Model}-based {Active} {Learning} for {Textual} {Few}-{Shot} {Scenarios}},url = {https://arxiv.org/pdf/2405.10808},doi = {10.48550/arXiv.2405.10808},abstract = {Active learning is designed to minimize annotation efforts by prioritizing instances that most enhance learning. However, many active learning strategies struggle with a 'cold start' problem, needing substantial initial data to be effective. This limitation often reduces their utility for pre-trained models, which already perform well in few-shot scenarios. To address this, we introduce ActiveLLM, a novel active learning approach that leverages large language models such as GPT-4, Llama 3, and Mistral Large for selecting instances. We demonstrate that ActiveLLM significantly enhances the classification performance of BERT classifiers in few-shot scenarios, outperforming both traditional active learning methods and the few-shot learning method SetFit. Additionally, ActiveLLM can be extended to non-few-shot scenarios, allowing for iterative selections. In this way, ActiveLLM can even help other active learning strategies to overcome their cold start problem. Our results suggest that ActiveLLM offers a promising solution for improving model performance across various learning setups.},journal = {arXiv},author = {Bayer, Markus and Reuter, Christian},year = {2024},keywords = {Security, UsableSec, Projekt-ATHENE-CyAware, Projekt-CYLENCE},}

  • Stefka Schmid, Katrin Hartwig, Robert Cieslinski, Christian Reuter (2024)
    Digital Resilience in Dealing with Misinformation on Social Media during COVID-19: A Web Application to Assist Users in Crises
    Information Systems Frontiers (ISF) ;26(2):477–499. doi:10.1007/s10796-022-10347-5
    [BibTeX] [Abstract] [Download PDF]

    In crises such as the COVID-19 pandemic, it is crucial to support users when dealing with social media content. Considering digital resilience, we propose a web app based on Social Network Analysis (SNA) to provide an overview of potentially misleading vs. non-misleading content on Twitter, which can be explored by users and enable foundational learning. The latter aims at systematically identifying thematic patterns which may be associated with misleading information. Additionally, it entails reflecting on indicators of misleading tweets which are proposed to approach classification of tweets. Paying special attention to non-expert users of social media, we conducted a two-step Think Aloud study for evaluation. While participants valued the opportunity to generate new knowledge and the diversity of the application, qualities such as equality and rapidity may be further improved. However, learning effects outweighed individual costs as all users were able to shift focus onto relevant features, such as hashtags, while readily pointing out content characteristics. Our design artifact connects to learning-oriented interventions regarding the spread of misleading information and tackles information overload by a SNA-based plug-in.

    @article{schmid_digital_2024,title = {Digital {Resilience} in {Dealing} with {Misinformation} on {Social} {Media} during {COVID}-19: {A} {Web} {Application} to {Assist} {Users} in {Crises}},volume = {26},issn = {1572-9419},url = {https://doi.org/10.1007/s10796-022-10347-5},doi = {10.1007/s10796-022-10347-5},abstract = {In crises such as the COVID-19 pandemic, it is crucial to support users when dealing with social media content. Considering digital resilience, we propose a web app based on Social Network Analysis (SNA) to provide an overview of potentially misleading vs. non-misleading content on Twitter, which can be explored by users and enable foundational learning. The latter aims at systematically identifying thematic patterns which may be associated with misleading information. Additionally, it entails reflecting on indicators of misleading tweets which are proposed to approach classification of tweets. Paying special attention to non-expert users of social media, we conducted a two-step Think Aloud study for evaluation. While participants valued the opportunity to generate new knowledge and the diversity of the application, qualities such as equality and rapidity may be further improved. However, learning effects outweighed individual costs as all users were able to shift focus onto relevant features, such as hashtags, while readily pointing out content characteristics. Our design artifact connects to learning-oriented interventions regarding the spread of misleading information and tackles information overload by a SNA-based plug-in.},number = {2},journal = {Information Systems Frontiers (ISF)},author = {Schmid, Stefka and Hartwig, Katrin and Cieslinski, Robert and Reuter, Christian},month = apr,year = {2024},keywords = {Projekt-TraCe, Student, Crisis, A-Paper, Projekt-NEBULA},pages = {477--499},}

  • Katrin Hartwig, Ruslan Sandler, Christian Reuter (2024)
    Navigating Misinformation in Voice Messages: Identification of User-Centered Features for Digital Interventions
    Risk, Hazards, & Crisis in Public Policy (RHCPP) . doi:10.1002/rhc3.12296
    [BibTeX] [Abstract] [Download PDF]

    Misinformation presents a challenge to democracies, particularly in times of crisis. One way in which misinformation is spread is through voice messages sent via messenger groups, which enable members to share information on a larger scale. Gaining user perspectives on digital misinformation interventions as countermeasure after detection is crucial. In this paper, we extract potential features of misinformation in voice messages from literature, implement them within a program that automatically processes voice messages, and evaluate their perceived usefulness and comprehensibility as user-centered indicators.We propose 35 features extracted from audio files at the character, word, sentence, audio and creator levels to assist (1) private individuals in conducting credibility assessments, (2) government agencies faced with data overload during crises, and (3) researchers seeking to gather features for automatic detection approaches. We conducted a think-aloud study with laypersons (N = 20) to provide initial insight into how individuals autonomously assess the credibility of voice messages, as well as which automatically extracted features they find to be clear and convincing indicators of misinformation. Our study provides qualitative and quantitative insights into valuable indicators, particularly when they relate directly to the content or its creator, and uncovers challenges in user interface design.

    @article{hartwig_navigating_2024,title = {Navigating {Misinformation} in {Voice} {Messages}: {Identification} of {User}-{Centered} {Features} for {Digital} {Interventions}},issn = {1944-4079},url = {https://peasec.de/paper/2024/2024_HartwigSandlerReuter_NavigatingMisinfoVoiceMessages_RiskHazards.pdf},doi = {10.1002/rhc3.12296},abstract = {Misinformation presents a challenge to democracies, particularly in times of crisis. One way in which misinformation is spread is through voice messages sent via messenger groups, which enable members to share information on a larger scale. Gaining user perspectives on digital misinformation interventions as countermeasure after detection is crucial. In this paper, we extract potential features of misinformation in voice messages from literature, implement them within a program that automatically processes voice messages, and evaluate their perceived usefulness and comprehensibility as user-centered indicators.We propose 35 features extracted from audio files at the character, word, sentence, audio and creator levels to assist (1) private individuals in conducting credibility assessments, (2) government agencies faced with data overload during crises, and (3) researchers seeking to gather features for automatic detection approaches. We conducted a think-aloud study with laypersons (N = 20) to provide initial insight into how individuals autonomously assess the credibility of voice messages, as well as which automatically extracted features they find to be clear and convincing indicators of misinformation. Our study provides qualitative and quantitative insights into valuable indicators, particularly when they relate directly to the content or its creator, and uncovers challenges in user interface design.},journal = {Risk, Hazards, \& Crisis in Public Policy (RHCPP)},author = {Hartwig, Katrin and Sandler, Ruslan and Reuter, Christian},year = {2024},note = {Publisher: John Wiley \& Sons, Ltd},keywords = {Student, UsableSec, Crisis, HCI, Projekt-CYLENCE, A-Paper, Projekt-NEBULA, Projekt-ATHENE, Ranking-ImpactFactor, SocialMedia, Cyberwar},}

  • Tom Biselli, Laura Utz, Christian Reuter (2024)
    Supporting Informed Choices about Browser Cookies: The Impact of Personalised Cookie Banners
    Proceedings on Privacy Enhancing Technologies (PoPETs) (1):171–191. doi:https://doi.org/10.56553/popets-2024-0011
    [BibTeX] [Abstract] [Download PDF]

    Browser cookies, especially those from third parties, pose a threat to individual privacy. While it is possible in principle to control the number of cookies accepted, this choice is often neither usable nor truly informed. To address this issue, this study used semi-structured interviews (N=19) to identify attitudes and user requirements to develop an alternative personalised cookie banner, which was evaluated in an online experiment (N=157). The cookie banner explanations were tailored to the privacy knowledge of three groups of users: low, medium and high. The online experiment measured cookie choices and perceived usability of the cookie banner across three groups: an experimental group that viewed the novel cookie banner with personalisation (personalised privacy assistant), a control group that viewed the novel cookie banner without personalisation (privacy assistant) and a control group that viewed the standard cookie banner provided by the website. The results indicate that the novel cookie banner (with or without personalisation) generally resulted in significantly fewer accepted cookies and increased usability compared to the standard cookie window. In addition, the personalised cookie banner resulted in significantly fewer accepted cookies and higher usability than the non-personalised cookie banner. These results suggest that tailoring cookie banners to users‘ privacy knowledge can be an effective approach to empowering users to make informed choices and better protect their privacy.

    @article{biselli_supporting_2024,title = {Supporting {Informed} {Choices} about {Browser} {Cookies}: {The} {Impact} of {Personalised} {Cookie} {Banners}},url = {https://petsymposium.org/popets/2024/popets-2024-0011.pdf},doi = {https://doi.org/10.56553/popets-2024-0011},abstract = {Browser cookies, especially those from third parties, pose a threat to individual privacy. While it is possible in principle to control the number of cookies accepted, this choice is often neither usable nor truly informed. To address this issue, this study used semi-structured interviews (N=19) to identify attitudes and user requirements to develop an alternative personalised cookie banner, which was evaluated in an online experiment (N=157). The cookie banner explanations were tailored to the privacy knowledge of three groups of users: low, medium and high. The online experiment measured cookie choices and perceived usability of the cookie banner across three groups: an experimental group that viewed the novel cookie banner with personalisation (personalised privacy assistant), a control group that viewed the novel cookie banner without personalisation (privacy assistant) and a control group that viewed the standard cookie banner provided by the website. The results indicate that the novel cookie banner (with or without personalisation) generally resulted in significantly fewer accepted cookies and increased usability compared to the standard cookie window. In addition, the personalised cookie banner resulted in significantly fewer accepted cookies and higher usability than the non-personalised cookie banner. These results suggest that tailoring cookie banners to users' privacy knowledge can be an effective approach to empowering users to make informed choices and better protect their privacy.},number = {1},journal = {Proceedings on Privacy Enhancing Technologies (PoPETs)},author = {Biselli, Tom and Utz, Laura and Reuter, Christian},year = {2024},keywords = {Student, Security, UsableSec, HCI, Projekt-CROSSING, A-Paper, AuswahlUsableSec, Selected, Ranking-CORE-A},pages = {171--191},}

  • Kilian Demuth, Sebastian Linsner, Tom Biselli, Marc-André Kaufhold, Christian Reuter (2024)
    Support Personas: A Concept for Tailored Support of Users of Privacy-Enhancing Technologies
    Proceedings on Privacy Enhancing Technologies (PoPETs) (4):797–817. doi:https://doi.org/10.56553/popets-2024-0142
    [BibTeX] [Abstract] [Download PDF]

    In many applications and websites people use in their everyday life, their privacy and data is threatened, e.g., by script tracking during browsing. Although researchers and companies have developed privacy-enhancing technologies (PETs), they are often difficult to use for lay users. In this paper, we conducted a literature review to classify users into different support personas based on their privacy competence and privacy concern. With developers of PETs in mind, support personas were envisioned to facilitate the customization of software according to the support needs of different users. In order to demonstrate the usefulness of support personas and based on workshop sessions with 15 participants, we designed a browser extension which supports users with the issue of script tracking by providing different user interfaces for different support personas. The following qualitative evaluation with 31 participants showed that the developed UI elements worked as intended for the different support personas. Therefore, we conclude the concept of support personas is useful in the development process of usable applications that enhance the privacy of the users while also educating them and thus potentially increasing their privacy literacy.

    @article{demuth_support_2024,title = {Support {Personas}: {A} {Concept} for {Tailored} {Support} of {Users} of {Privacy}-{Enhancing} {Technologies}},issn = {2299-0984},url = {https://petsymposium.org/popets/2024/popets-2024-0142.pdf},doi = {https://doi.org/10.56553/popets-2024-0142},abstract = {In many applications and websites people use in their everyday life, their privacy and data is threatened, e.g., by script tracking during browsing. Although researchers and companies have developed privacy-enhancing technologies (PETs), they are often difficult to use for lay users. In this paper, we conducted a literature review to classify users into different support personas based on their privacy competence and privacy concern. With developers of PETs in mind, support personas were envisioned to facilitate the customization of software according to the support needs of different users. In order to demonstrate the usefulness of support personas and based on workshop sessions with 15 participants, we designed a browser extension which supports users with the issue of script tracking by providing different user interfaces for different support personas. The following qualitative evaluation with 31 participants showed that the developed UI elements worked as intended for the different support personas. Therefore, we conclude the concept of support personas is useful in the development process of usable applications that enhance the privacy of the users while also educating them and thus potentially increasing their privacy literacy.},number = {4},journal = {Proceedings on Privacy Enhancing Technologies (PoPETs)},author = {Demuth, Kilian and Linsner, Sebastian and Biselli, Tom and Kaufhold, Marc-André and Reuter, Christian},year = {2024},keywords = {Security, UsableSec, HCI, Projekt-CROSSING, A-Paper, Projekt-ATHENE-PriVis, Ranking-CORE-A},pages = {797--817},}

  • Sebastian Linsner, Kilian Demuth, Marc Fischlin, Christian Reuter (2024)
    Decision-based Data Distribution (D³): Enabling Users to Minimize Data Propagation in Privacy-sensitive Scenarios
    Proceedings on Privacy Enhancing Technologies (PoPETs) (4). doi:10.56553/popets-2024-0113
    [BibTeX] [Abstract] [Download PDF]

    In many scenarios users have to communicate sensitive data with third parties such as doctors, lawyers, insurance companies, social workers or online shops. Handing over personal data is necessary to use those services but the delegation of tasks to increase efficiency still poses the risk that personal data might be leaked. To minimize this risk and further enhance the privacy of users, we propose an interaction concept that uses layered encryption of messages to provide a trade-off between privacy and usability. Users can choose which data is additionally encrypted in an inner layer, say, for the eyes of their doctor only, and which data is available in an outer (encrypted or unencrypted) layer for all staff members. Another benefit is the hiding of sensitive data from package inspection or crawling algorithms over emails, while less critical parts can still be processed by these systems via the partial access. To investigate this concept, we derive relevant use cases for form-based communication over email from a quantitative pre-study with 1011 participants, showing that general practitioners are the most suitable use case. We developed demonstrators for this use case and evaluated them in a qualitative study with 42 participants. Our results show that the possibility of minimizing the propagation of sensitive data through additional encryption is highly appreciated and the usage of form-based communication is a promising approach for the digital transformation.

    @article{linsner_decision-based_2024,title = {Decision-based {Data} {Distribution} ({D}³): {Enabling} {Users} to {Minimize} {Data} {Propagation} in {Privacy}-sensitive {Scenarios}},issn = {2299-0984},url = {https://petsymposium.org/popets/2024/popets-2024-0113.php},doi = {10.56553/popets-2024-0113},abstract = {In many scenarios users have to communicate sensitive data with third parties such as doctors, lawyers, insurance companies, social workers or online shops. Handing over personal data is necessary to use those services but the delegation of tasks to increase efficiency still poses the risk that personal data might be leaked. To minimize this risk and further enhance the privacy of users, we propose an interaction concept that uses layered encryption of messages to provide a trade-off between privacy and usability. Users can choose which data is additionally encrypted in an inner layer, say, for the eyes of their doctor only, and which data is available in an outer (encrypted or unencrypted) layer for all staff members. Another benefit is the hiding of sensitive data from package inspection or crawling algorithms over emails, while less critical parts can still be processed by these systems via the partial access. To investigate this concept, we derive relevant use cases for form-based communication over email from a quantitative pre-study with 1011 participants, showing that general practitioners are the most suitable use case. We developed demonstrators for this use case and evaluated them in a qualitative study with 42 participants. Our results show that the possibility of minimizing the propagation of sensitive data through additional encryption is highly appreciated and the usage of form-based communication is a promising approach for the digital transformation.},number = {4},journal = {Proceedings on Privacy Enhancing Technologies (PoPETs)},author = {Linsner, Sebastian and Demuth, Kilian and Fischlin, Marc and Reuter, Christian},year = {2024},keywords = {Security, UsableSec, HCI, Projekt-CROSSING, A-Paper, Selected, Projekt-ATHENE-PriVis, Ranking-CORE-A},}

  • Philipp Kuehn, Kyra Wittorf, Christian Reuter (2024)
    Navigating the Shadows: Manual and Semi-Automated Evaluation of the Dark Web for Cyber Threat Intelligence
    IEEE Access ;12:118903–118922. doi:10.1109/ACCESS.2024.3448247
    [BibTeX] [Abstract] [Download PDF]

    In today’s world, cyber-attacks are becoming more frequent and thus proactive protection against them is becoming more important. Cyber Threat Intelligence (CTI) is a possible solution, as it collects threat information in various information sources and derives stakeholder intelligence to protect one’s infrastructure. The current focus of CTI in research is the clear web, but the dark web may contain further information. To further advance protection, this work analyzes the dark web as Open Source Intelligence (OSINT) data source to complement current CTI information. The underlying assumption is that hackers use the dark web to exchange, develop, and share information and assets. This work aims to understand the structure of the dark web and identify the amount of its openly available CTI related information. We conducted a comprehensive literature review for dark web research and CTI. To follow this up we manually investigated and analyzed 65 dark web forum (DWF), 7 single-vendor shops, and 72 dark web marketplace (DWM). We documented the content and relevance of DWFs and DWMs for CTI, as well as challenges during the extraction and provide mitigations. During our investigation we identified IT security relevant information in both DWFs and DWMs, ranging from malware toolboxes to hacking-as-a-service. One of the most present challenges during our manual analysis were necessary interactions to access information and anti-crawling measures, i.e., CAPTCHAs. This analysis showed 88\% of marketplaces and 53\% of forums contained relevant data. Our complementary semi-automated analysis of 1,186,906 onion addresses indicates, that the necessary interaction makes it difficult to see the dark web as an open, but rather treat it as specialized information source, when clear web information does not suffice.

    @article{kuehn_navigating_2024,title = {Navigating the {Shadows}: {Manual} and {Semi}-{Automated} {Evaluation} of the {Dark} {Web} for {Cyber} {Threat} {Intelligence}},volume = {12},issn = {2169-3536},shorttitle = {Navigating the {Shadows}},url = {https://ieeexplore.ieee.org/document/10643518},doi = {10.1109/ACCESS.2024.3448247},abstract = {In today’s world, cyber-attacks are becoming more frequent and thus proactive protection against them is becoming more important. Cyber Threat Intelligence (CTI) is a possible solution, as it collects threat information in various information sources and derives stakeholder intelligence to protect one’s infrastructure. The current focus of CTI in research is the clear web, but the dark web may contain further information. To further advance protection, this work analyzes the dark web as Open Source Intelligence (OSINT) data source to complement current CTI information. The underlying assumption is that hackers use the dark web to exchange, develop, and share information and assets. This work aims to understand the structure of the dark web and identify the amount of its openly available CTI related information. We conducted a comprehensive literature review for dark web research and CTI. To follow this up we manually investigated and analyzed 65 dark web forum (DWF), 7 single-vendor shops, and 72 dark web marketplace (DWM). We documented the content and relevance of DWFs and DWMs for CTI, as well as challenges during the extraction and provide mitigations. During our investigation we identified IT security relevant information in both DWFs and DWMs, ranging from malware toolboxes to hacking-as-a-service. One of the most present challenges during our manual analysis were necessary interactions to access information and anti-crawling measures, i.e., CAPTCHAs. This analysis showed 88\% of marketplaces and 53\% of forums contained relevant data. Our complementary semi-automated analysis of 1,186,906 onion addresses indicates, that the necessary interaction makes it difficult to see the dark web as an open, but rather treat it as specialized information source, when clear web information does not suffice.},journal = {IEEE Access},author = {Kuehn, Philipp and Wittorf, Kyra and Reuter, Christian},year = {2024},keywords = {Student, Security, UsableSec, Projekt-CYWARN, Projekt-ATHENE-SecUrban, Ranking-CORE-A, Ranking-ImpactFactor},pages = {118903--118922},}

  • Katrin Hartwig, Frederic Doell, Christian Reuter (2024)
    The Landscape of User-centered Misinformation Interventions – A Systematic Literature Review
    ACM Computing Surveys (CSUR) ;56(11). doi:10.1145/3674724
    [BibTeX] [Abstract] [Download PDF]

    Misinformation represent a key challenge for society. User-centered misinformation interventions as digital countermeasures that exert a direct influence on users represent a promising means to deal with the large amounts of information available. While an extensive body of research on this topic exists, researchers are confronted with a diverse research landscape spanning multiple disciplines. This review systematizes the landscape of user-centered misinformation interventions to facilitate knowledge transfer, identify trends, and enable informed decision-making. Over 3,700 scholarly publications were screened and a systematic literature review (N=108) was conducted. A taxonomy was derived regarding intervention design (e.g., binary label), user interaction (active or passive), and timing (e.g., post exposure to misinformation). We provide a structured overview of approaches across multiple disciplines, and derive six overarching challenges for future research.

    @article{hartwig_landscape_2024,title = {The {Landscape} of {User}-centered {Misinformation} {Interventions} – {A} {Systematic} {Literature} {Review}},volume = {56},issn = {0360-0300},url = {https://peasec.de/paper/2024/2024_HartwigDoellReuter_LandscapeUserCentredMisinfoInterventions_CSUR.pdf},doi = {10.1145/3674724},abstract = {Misinformation represent a key challenge for society. User-centered misinformation interventions as digital countermeasures that exert a direct influence on users represent a promising means to deal with the large amounts of information available. While an extensive body of research on this topic exists, researchers are confronted with a diverse research landscape spanning multiple disciplines. This review systematizes the landscape of user-centered misinformation interventions to facilitate knowledge transfer, identify trends, and enable informed decision-making. Over 3,700 scholarly publications were screened and a systematic literature review (N=108) was conducted. A taxonomy was derived regarding intervention design (e.g., binary label), user interaction (active or passive), and timing (e.g., post exposure to misinformation). We provide a structured overview of approaches across multiple disciplines, and derive six overarching challenges for future research.},number = {11},journal = {ACM Computing Surveys (CSUR)},author = {Hartwig, Katrin and Doell, Frederic and Reuter, Christian},month = jul,year = {2024},keywords = {Peace, Student, HCI, A-Paper, Ranking-CORE-A*, Selected, Projekt-NEBULA, Ranking-ImpactFactor},}

  • Florentin Putz, Steffen Haesler, Matthias Hollick (2024)
    Sounds Good? Fast and Secure Contact Exchange in Groups
    Proceedings of the ACM: Human Computer Interaction (PACM): Computer-Supported Cooperative Work and Social Computing (Best Paper Award) ;8(CSCW2). doi:10.1145/3686964
    [BibTeX] [Abstract] [Download PDF]

    Trustworthy digital communication requires the secure exchange of contact information, but current approaches lack usability and scalability for larger groups of users. We evaluate the usability of two secure contact exchange systems: the current state of the art, SafeSlinger, and our newly designed protocol, PairSonic, which extends trust from physical encounters to spontaneous online communication. Our lab study (N=45) demonstrates PairSonic’s superior usability, automating the tedious verification tasks from previous approaches via an acoustic out-of-band channel. Although participants significantly preferred our system, minimizing user effort surprisingly decreased the perceived security for some users, who associated security with complexity. We discuss user perceptions of the different protocol components and identify remaining usability barriers for CSCW application scenarios.

    @article{putz_sounds_2024,title = {Sounds {Good}? {Fast} and {Secure} {Contact} {Exchange} in {Groups}},volume = {8},url = {https://dl.acm.org/doi/10.1145/3686964},doi = {10.1145/3686964},abstract = {Trustworthy digital communication requires the secure exchange of contact information, but current approaches lack usability and scalability for larger groups of users. We evaluate the usability of two secure contact exchange systems: the current state of the art, SafeSlinger, and our newly designed protocol, PairSonic, which extends trust from physical encounters to spontaneous online communication. Our lab study (N=45) demonstrates PairSonic's superior usability, automating the tedious verification tasks from previous approaches via an acoustic out-of-band channel. Although participants significantly preferred our system, minimizing user effort surprisingly decreased the perceived security for some users, who associated security with complexity. We discuss user perceptions of the different protocol components and identify remaining usability barriers for CSCW application scenarios.},number = {CSCW2},journal = {Proceedings of the ACM: Human Computer Interaction (PACM): Computer-Supported Cooperative Work and Social Computing (Best Paper Award)},author = {Putz, Florentin and Haesler, Steffen and Hollick, Matthias},year = {2024},keywords = {Security, UsableSec, HCI, Projekt-emergenCITY, A-Paper, Ranking-CORE-A},}

  • Katrin Hartwig, Stefka Schmid, Tom Biselli, Helene Pleil, Christian Reuter (2024)
    Misleading Information in Crises: Exploring Content-specific Indicators on Twitter from a User Perspective
    Behaviour & Information Technology (BIT) :1–34. doi:10.1080/0144929X.2024.2373166
    [BibTeX] [Abstract] [Download PDF]

    Recent crises like the COVID-19 pandemic provoked an increasing appearance of misleading information, emphasizing the need for effective user-centered countermeasures as an important field in HCI research. This work investigates how content-specific user-centered indicators can contribute to an informed approach to misleading information. In a threefold study, we conducted an in-depth content analysis of 2,382 German tweets on Twitter (now X) to identify topical (e.g., 5G), formal (e.g., links), and rhetorical (e.g., sarcasm) characteristics through manual coding, followed by a qualitative online survey to evaluate which indicators users already use autonomously to assess a tweet’s credibility. Subsequently, in a think-aloud study participants qualitatively evaluated the identified indicators in terms of perceived comprehensibility and usefulness. While a number of indicators were found to be particularly comprehensible and useful (e.g., claim for absolute truth and rhetorical questions), our findings reveal limitations of indicator-based interventions, particularly for people with entrenched conspiracy theory views. We derive four implications for digitally supporting users in dealing with misleading information, especially during crises.

    @article{hartwig_misleading_2024,title = {Misleading {Information} in {Crises}: {Exploring} {Content}-specific {Indicators} on {Twitter} from a {User} {Perspective}},issn = {0144-929X},url = {https://doi.org/10.1080/0144929X.2024.2373166},doi = {10.1080/0144929X.2024.2373166},abstract = {Recent crises like the COVID-19 pandemic provoked an increasing appearance of misleading information,emphasizing the need for effective user-centered countermeasures as an important field in HCI research. Thiswork investigates how content-specific user-centered indicators can contribute to an informed approach tomisleading information. In a threefold study, we conducted an in-depth content analysis of 2,382 Germantweets on Twitter (now X) to identify topical (e.g., 5G), formal (e.g., links), and rhetorical (e.g., sarcasm)characteristics through manual coding, followed by a qualitative online survey to evaluate which indicatorsusers already use autonomously to assess a tweet’s credibility. Subsequently, in a think-aloud study participantsqualitatively evaluated the identified indicators in terms of perceived comprehensibility and usefulness. Whilea number of indicators were found to be particularly comprehensible and useful (e.g., claim for absolute truthand rhetorical questions), our findings reveal limitations of indicator-based interventions, particularly forpeople with entrenched conspiracy theory views. We derive four implications for digitally supporting users indealing with misleading information, especially during crises.},journal = {Behaviour \& Information Technology (BIT)},author = {Hartwig, Katrin and Schmid, Stefka and Biselli, Tom and Pleil, Helene and Reuter, Christian},year = {2024},keywords = {Crisis, HCI, A-Paper, Projekt-ATHENE-PriVis, Projekt-NEBULA, Ranking-CORE-A, Ranking-ImpactFactor},pages = {1--34},}

  • Marc-André Kaufhold (2024)
    Exploring the evolving landscape of human-centred crisis informatics: current challenges and future trends
    i-com – Journal of Interactive Media ;23(2):155–163. doi:10.1515/icom-2024-0002
    [BibTeX] [Abstract] [Download PDF]

    Modern Information and Communication Technology (ICT) has been used in safety-critical situations for over twenty years. Rooted in Human-Computer Interaction (HCI) and related disciplines, the field of crisis informatics made considerable efforts to investigate social media use and role patterns in crises, facilitate the collection, processing and refinement of social media data, design and evaluate supportive ICT, and provide cumulative and longitudinal research. This narrative review examines contemporary challenges of human-centred crisis informatics and envision trends for the following decade, including (I) a broadening scope of crisis informatics, (II) the professionalisation of cross-platform collaboration of citizen communities and emergency services, (III) expert interfaces for explainable and multimodal artificial intelligence for user-generated content assessment, (IV) internet of things and mobile apps for bidirectional communication and warnings in disruption-tolerant networks, as well as (V) digital twins and virtual reality for the effective training of multi-agency collaboration in hybrid hazards.

    @article{kaufhold_exploring_2024,title = {Exploring the evolving landscape of human-centred crisis informatics: current challenges and future trends},volume = {23},issn = {2196-6826},url = {https://doi.org/10.1515/icom-2024-0002},doi = {10.1515/icom-2024-0002},abstract = {Modern Information and Communication Technology (ICT) has been used in safety-critical situations for over twenty years. Rooted in Human-Computer Interaction (HCI) and related disciplines, the field of crisis informatics made considerable efforts to investigate social media use and role patterns in crises, facilitate the collection, processing and refinement of social media data, design and evaluate supportive ICT, and provide cumulative and longitudinal research. This narrative review examines contemporary challenges of human-centred crisis informatics and envision trends for the following decade, including (I) a broadening scope of crisis informatics, (II) the professionalisation of cross-platform collaboration of citizen communities and emergency services, (III) expert interfaces for explainable and multimodal artificial intelligence for user-generated content assessment, (IV) internet of things and mobile apps for bidirectional communication and warnings in disruption-tolerant networks, as well as (V) digital twins and virtual reality for the effective training of multi-agency collaboration in hybrid hazards.},number = {2},journal = {i-com - Journal of Interactive Media},author = {Kaufhold, Marc-André},year = {2024},keywords = {Crisis, HCI, Projekt-emergenCITY, Projekt-ATHENE-CyAware, Projekt-CYLENCE, AuswahlCrisis},pages = {155--163},}

  • Sebastian Linsner, Kilian Demuth, Sebastian Surminski, Lucas Davi, Christian Reuter (2024)
    Building Trust in Remote Attestation Through Transparency – A Qualitative User Study on Observable Attestation
    Behaviour & Information Technology (BIT) :1–21. doi:10.1080/0144929X.2024.2374889
    [BibTeX] [Abstract] [Download PDF]

    Internet of Things (IoT) devices have become increasingly important within the smart home domain, making the security of the devices a critical aspect. The majority of IoT devices are black-box systems running closed and pre-installed firmware. This raises concerns about the trustworthiness of these devices, especially considering that some of them are shipped with a microphone or a camera. Remote attestation aims at validating the trustworthiness of these devices by verifying the integrity of the software. However, users cannot validate whether the attestation has actually taken place and has not been manipulated by an attacker, raising the need for HCI research on trust and understandability. We conducted a qualitative study with 35 participants, investigating trust in the attestation process and whether this trust can be improved by additional explanations in the application. We developed an application that allows users to attest a smart speaker using their smartphone over an audio channel to identify the attested device and observe the attestation process. In order to observe the differences between the applications with and without explanations, we performed A/B testing. We discovered that trust increases when additional explanations of the technical process are provided, improving the understanding of the attestation process.

    @article{linsner_building_2024,title = {Building {Trust} in {Remote} {Attestation} {Through} {Transparency} – {A} {Qualitative} {User} {Study} on {Observable} {Attestation}},issn = {0144-929X},url = {https://doi.org/10.1080/0144929X.2024.2374889},doi = {10.1080/0144929X.2024.2374889},abstract = {Internet of Things (IoT) devices have become increasingly important within the smart home domain, making the security of the devices a critical aspect. The majority of IoT devices are black-box systems running closed and pre-installed firmware. This raises concerns about the trustworthiness of these devices, especially considering that some of them are shipped with a microphone or a camera. Remote attestation aims at validating the trustworthiness of these devices by verifying the integrity of the software. However, users cannot validate whether the attestation has actually taken place and has not been manipulated by an attacker, raising the need for HCI research on trust and understandability. We conducted a qualitative study with 35 participants, investigating trust in the attestation process and whether this trust can be improved by additional explanations in the application. We developed an application that allows users to attest a smart speaker using their smartphone over an audio channel to identify the attested device and observe the attestation process. In order to observe the differences between the applications with and without explanations, we performed A/B testing. We discovered that trust increases when additional explanations of the technical process are provided, improving the understanding of the attestation process.},journal = {Behaviour \& Information Technology (BIT)},author = {Linsner, Sebastian and Demuth, Kilian and Surminski, Sebastian and Davi, Lucas and Reuter, Christian},year = {2024},note = {Publisher: Taylor \& Francis},keywords = {Security, UsableSec, Projekt-CROSSING, A-Paper, Projekt-ATHENE-PriVis, Ranking-ImpactFactor},pages = {1--21},}

  • Jasmin Haunschild, Laura Guntrum, Sofía Cerrillo, Franziska Bujara, Christian Reuter (2024)
    Towards a Digitally Mediated Transitional Justice Process? An Analysis of Colombian Transitional Justice Organisations’ Posting Behaviour on Facebook
    Peace and Conflict Studies ;30(2).
    [BibTeX] [Abstract] [Download PDF]

    In Colombia, Transitional Justice (TJ) institutions were established after years of violent conflict as part of the 2016 peace agreement between the FARC and the Colombian government. By analysing the posting behaviour of the government-appointed TJ institutions on Facebook, we show how general TJ aims and opportunities for citizen participation were promoted in 2019. Our analysis reveals that the organisations rarely address topics related to reconciliation and that active online participation and two-way communication are rather scarce. Instead, Facebook is mainly used by the TJ organisations to increase solidarity with victims and disseminate information about their work and the TJ process. Reflecting on existing literature on TJ and social media participation, we identify great potential for expanding TJ goals and community engagement on social media, to use it as a resource for facilitating the TJ processes, creating exchange, and enabling participation.

    @article{haunschild_towards_2024,title = {Towards a {Digitally} {Mediated} {Transitional} {Justice} {Process}? {An} {Analysis} of {Colombian} {Transitional} {Justice} {Organisations}’ {Posting} {Behaviour} on {Facebook}},volume = {30},issn = {1082-7307},url = {https://nsuworks.nova.edu/pcs/vol30/iss2/4/},abstract = {In Colombia, Transitional Justice (TJ) institutions were established after years of violent conflict as part of the 2016 peace agreement between the FARC and the Colombian government. By analysing the posting behaviour of the government-appointed TJ institutions on Facebook, we show how general TJ aims and opportunities for citizen participation were promoted in 2019. Our analysis reveals that the organisations rarely address topics related to reconciliation and that active online participation and two-way communication are rather scarce. Instead, Facebook is mainly used by the TJ organisations to increase solidarity with victims and disseminate information about their work and the TJ process. Reflecting on existing literature on TJ and social media participation, we identify great potential for expanding TJ goals and community engagement on social media, to use it as a resource for facilitating the TJ processes, creating exchange, and enabling participation.},number = {2},journal = {Peace and Conflict Studies},author = {Haunschild, Jasmin and Guntrum, Laura and Cerrillo, Sofía and Bujara, Franziska and Reuter, Christian},year = {2024},keywords = {Peace, Student, Projekt-ATHENE-SecUrban, SocialMedia},}

  • Stefka Schmid, BaoChau Pham, AnnaKatharina Ferl (2024)
    Trust in Artificial Intelligence: Producing Ontological Security through Governmental Visions
    Cooperation and Conflict . doi:10.1177/00108367241288073
    [BibTeX] [Abstract] [Download PDF]

    With developments in Artificial Intelligence widely framed as security concern in both military and civilian realms, governments have turned their attention to regulating and governing AI. In a study of US, Chinese, and EU AI documents, we go beyond instrumental understandings of AI as a technological capability, which serves states‘ self-interests and the maintenance of their (supra)national security. Our specific interest lies in how AI policies tap into both problem-solving approaches and affective registers to achieve both physical as well as ontological security. We find that in governmental visions, AI is perceived as a capability that enhances societal, and geopolitical interests while its risks are framed as manageable. This echoes strands within Human-Computer Interaction that draw on human-centered perceptions of technology and assumptions about human-AI relationships of trust. Despite different cultural and institutional settings, the visions of future AI development are shaped by this (shared) understanding of human-AI interaction, offering common ground in the navigation of innovation policies.

    @article{schmid_trust_2024,title = {Trust in {Artificial} {Intelligence}: {Producing} {Ontological} {Security} through {Governmental} {Visions}},url = {https://doi.org/10.1177/00108367241288073},doi = {10.1177/00108367241288073},abstract = {With developments in Artificial Intelligence widely framed as security concern in both military and civilian realms, governments have turned their attention to regulating and governing AI. In a study of US, Chinese, and EU AI documents, we go beyond instrumental understandings of AI as a technological capability, which serves states' self-interests and the maintenance of their (supra)national security. Our specific interest lies in how AI policies tap into both problem-solving approaches and affective registers to achieve both physical as well as ontological security. We find that in governmental visions, AI is perceived as a capability that enhances societal, and geopolitical interests while its risks are framed as manageable. This echoes strands within Human-Computer Interaction that draw on human-centered perceptions of technology and assumptions about human-AI relationships of trust. Despite different cultural and institutional settings, the visions of future AI development are shaped by this (shared) understanding of human-AI interaction, offering common ground in the navigation of innovation policies.},journal = {Cooperation and Conflict},author = {Schmid, Stefka and Pham, Bao-Chau and Ferl, Anna-Katharina},year = {2024},keywords = {Peace, Projekt-TraCe, A-Paper, Ranking-ImpactFactor, AuswahlPeace},}

  • Thea Riebe, Christian Reuter, Anja-Liisa Gonsior, Lilian Reichert (2024)
    Envisioning Human-Machine Interaction in Future Warfare: Defence Industry Narratives on Human Control of Autonomous Weapon Systems
    Global Society . doi:10.1080/13600826.2024.2436966
    [BibTeX] [Abstract] [Download PDF]

    The development of artificial intelligence and autonomous functions in the military domain has an immense impact on technologies being developed by the private defence industry. Defence firms contribute to the narratives and visions on autonomous weapon systems and the future of warfare, e.g. in the form of strategic marketing of their products. However, their role has so far been understudied, especially regarding autonomous weapon systems. As the normative debate revolves around aspects of human control, this work examines the narratives of (meaningful) human control in the marketing of autonomous military systems by defence manufacturers. Based on a comprehensive content analysis of twenty defence firms, we identified three main narratives, which envision autonomy as a military advantage, the role of the human in the future of warfare, and human-machine teaming. Based on the results, we argue that defence companies reproduce and adapt narratives which shape expectations and visions of human control of autonomous weapon systems in anticipation of emerging norms for (meaningful) human control. However, without specifications and verification mechanisms, there is no indication that human control will be meaningful.

    @article{riebe_envisioning_2024,title = {Envisioning {Human}-{Machine} {Interaction} in {Future} {Warfare}: {Defence} {Industry} {Narratives} on {Human} {Control} of {Autonomous} {Weapon} {Systems}},url = {https://doi.org/10.1080/13600826.2024.2436966},doi = {10.1080/13600826.2024.2436966},abstract = {The development of artificial intelligence and autonomous functions in the military domain has an immense impact on technologies being developed by the private defence industry. Defence firms contribute to the narratives and visions on autonomous weapon systems and the future of warfare, e.g. in the form of strategic marketing of their products. However, their role has so far been understudied, especially regarding autonomous weapon systems. As the normative debate revolves around aspects of human control, this work examines the narratives of (meaningful) human control in the marketing of autonomous military systems by defence manufacturers. Based on a comprehensive content analysis of twenty defence firms, we identified three main narratives, which envision autonomy as a military advantage, the role of the human in the future of warfare, and human-machine teaming. Based on the results, we argue that defence companies reproduce and adapt narratives which shape expectations and visions of human control of autonomous weapon systems in anticipation of emerging norms for (meaningful) human control. However, without specifications and verification mechanisms, there is no indication that human control will be meaningful.},journal = {Global Society},author = {Riebe, Thea and Reuter, Christian and Gonsior, Anja-Liisa and Reichert, Lilian},year = {2024},keywords = {Peace, Projekt-TraCe, Student, HCI, Projekt-ATHENE-CyAware, A-Paper, Ranking-ImpactFactor, AuswahlPeace},}

    Bücher und herausgegebene Zeitschriften / Books and Edited Special Issues in Journals

  • Jasmin Haunschild (2024)
    Enhancing Citizens’ Role in Public Safety: Interaction, Perception and Design of Mobile Warning Apps
    Darmstadt, Germany: Dissertation (Dr. rer. nat.), Department of Computer Science, Technische Universität Darmstadt.
    [BibTeX]

    @book{haunschild_enhancing_2024,address = {Darmstadt, Germany},title = {Enhancing {Citizens}’ {Role} in {Public} {Safety}: {Interaction}, {Perception} and {Design} of {Mobile} {Warning} {Apps}},publisher = {Dissertation (Dr. rer. nat.), Department of Computer Science, Technische Universität Darmstadt},author = {Haunschild, Jasmin},year = {2024},keywords = {Crisis, HCI, Projekt-emergenCITY, Projekt-ATHENE-SecUrban, Dissertation},}

  • Franz Kuntke (2024)
    Resilient Smart Farming: Crisis-Capable Information and Communication Technologies for Agriculture
    Wiesbaden, Germany: Springer Vieweg. doi:10.1007/978-3-658-44157-9
    [BibTeX] [Abstract] [Download PDF]

    Like many sectors, agriculture is experiencing a continuous digitalization, i.e. an increase in data-driven technologies used. In contrast to companies of other critical infrastructures – e.g. energy or telecommunication – a typical farm is comparatively small and often run as a family business. Accordingly, the demands on farming technology, its implementation, and regulations are different in many terms. Furthermore, the circumstances that influence crisis risks and crisis management are different in agriculture – and as digitalization introduces new potential risks, this process should be reviewed critically. Currently, the most advanced approaches for agriculture are typically referred to as smart farming and agriculture 4.0, which incorporate more precise cultivation with less manual effort. But such new agriculture technology developments usually lack an assessment about its impact on the sector’s resilience and dependencies on other infrastructures. The research domains of crisis informatics and IT security mostly focuses on other topics, apart from agriculture. The resilience research in agriculture itself is currently intensifying, however, this line of research focuses more on problems resulting from the climate crisis and social change. For these reasons it remains unclear, how digitalization impacts the resilience of food production and food safety. Therefore, it is not well researched which technological developments may lead to undesired effects in the future. How modern systems should be designed to allow for both, positive impacts on efficiency, and prevention of negative effects in terms of reduced resilience capacities, is also not answered by current literature. The aim of the present work is to close this research gap at the intersection of agriculture, digitalization, and resilience. To answer the question to what extent current technologies used by farmers are at risk of failure, the dissertation first presents a snapshot of the resilience state of agricultural companies and the technologies used. This involves interviews with stakeholders, mainly farmers, as well as surveying security issues of the LoRaWAN protocol, a transmission technology especially useful for agricultural Internet of Things. Which desires of farmers exist regarding software focusing on aspects of business continuity and secured operations, is another open question. This dissertation aims to also answer this question with empirical methods, mainly focus groups and usability tests. Then the rise of Internet of Things in agriculture raises another question, whether such technologies acquired for smart farming could also have benefits for resilience against internet-connection-lost situations. This question is answered by empirical evaluation of LoRaWAN range characteristics in agricultural landscapes, as well as artifact generation for resilient communication channels on top of LoRaWAN transmission devices. Several findings are derived from the conducted research: There is a lack of understanding of how strong the used tools in agriculture depend on ICT, and many tools require a working internet connection. Moreover, IT employed by agricultural enterprises presents security concerns similar to those encountered in other domains. Based on these findings, developments, and evaluations of new software approaches are presented: Derived design criteria and own system designs that allow for modern data-driven business operations, including IoT integration based on LoRaWAN. The developed solutions show an increase in resilience capacities by enhancing the communication possibilities in crisis situations. The detected low absorption capacities against communication infrastructure outages shows room for improvement. To improve agricultural ITs‘ resilience, software engineers could use the concepts and designs of this dissertation for their product development, like a modular offline-capable farm management storage that allows an exchange of small data in an autarkic manner via commodity LoRaWAN hardware. But also technology advisors and farmers benefit from the technological analyses and suggestions embedded in this work, like using multiple LoRaWAN gateways with an overlapping coverage to mitigate security vulnerabilities.

    @book{kuntke_resilient_2024,address = {Wiesbaden, Germany},title = {Resilient {Smart} {Farming}: {Crisis}-{Capable} {Information} and {Communication} {Technologies} for {Agriculture}},isbn = {978-3-658-44156-2},shorttitle = {Resilient {Smart} {Farming}},url = {https://link.springer.com/book/10.1007/978-3-658-44157-9},abstract = {Like many sectors, agriculture is experiencing a continuous digitalization, i.e. an increase in data-driven technologies used. In contrast to companies of other critical infrastructures – e.g. energy or telecommunication – a typical farm is comparatively small and often run as a family business.Accordingly, the demands on farming technology, its implementation, and regulations are different in many terms.Furthermore, the circumstances that influence crisis risks and crisis management are different in agriculture – and as digitalization introduces new potential risks, this process should be reviewed critically.Currently, the most advanced approaches for agriculture are typically referred to as smart farming and agriculture 4.0, which incorporate more precise cultivation with less manual effort.But such new agriculture technology developments usually lack an assessment about its impact on the sector's resilience and dependencies on other infrastructures.The research domains of crisis informatics and IT security mostly focuses on other topics, apart from agriculture.The resilience research in agriculture itself is currently intensifying, however, this line of research focuses more on problems resulting from the climate crisis and social change.For these reasons it remains unclear, how digitalization impacts the resilience of food production and food safety.Therefore, it is not well researched which technological developments may lead to undesired effects in the future.How modern systems should be designed to allow for both, positive impacts on efficiency, and prevention of negative effects in terms of reduced resilience capacities, is also not answered by current literature.The aim of the present work is to close this research gap at the intersection of agriculture, digitalization, and resilience.To answer the question to what extent current technologies used by farmers are at risk of failure, the dissertation first presents a snapshot of the resilience state of agricultural companies and the technologies used.This involves interviews with stakeholders, mainly farmers, as well as surveying security issues of the LoRaWAN protocol, a transmission technology especially useful for agricultural Internet of Things.Which desires of farmers exist regarding software focusing on aspects of business continuity and secured operations, is another open question.This dissertation aims to also answer this question with empirical methods, mainly focus groups and usability tests.Then the rise of Internet of Things in agriculture raises another question, whether such technologies acquired for smart farming could also have benefits for resilience against internet-connection-lost situations.This question is answered by empirical evaluation of LoRaWAN range characteristics in agricultural landscapes, as well as artifact generation for resilient communication channels on top of LoRaWAN transmission devices.Several findings are derived from the conducted research:There is a lack of understanding of how strong the used tools in agriculture depend on ICT, and many tools require a working internet connection.Moreover, IT employed by agricultural enterprises presents security concerns similar to those encountered in other domains.Based on these findings, developments, and evaluations of new software approaches are presented:Derived design criteria and own system designs that allow for modern data-driven business operations, including IoT integration based on LoRaWAN.The developed solutions show an increase in resilience capacities by enhancing the communication possibilities in crisis situations.The detected low absorption capacities against communication infrastructure outages shows room for improvement.To improve agricultural ITs' resilience, software engineers could use the concepts and designs of this dissertation for their product development, like a modular offline-capable farm management storage that allows an exchange of small data in an autarkic manner via commodity LoRaWAN hardware.But also technology advisors and farmers benefit from the technological analyses and suggestions embedded in this work, like using multiple LoRaWAN gateways with an overlapping coverage to mitigate security vulnerabilities.},publisher = {Springer Vieweg},author = {Kuntke, Franz},year = {2024},doi = {10.1007/978-3-658-44157-9},keywords = {Projekt-AgriRegio, Projekt-GeoBox, RSF, Security, UsableSec, Crisis, HCI, DissPublisher},}

  • Franz Kuntke (2024)
    Resilient Smart Farming: Crisis-Capable Information and Communication Technologies for Agriculture
    Darmstadt, Germany: Dissertation (Dr.-Ing.), Department of Computer Science, Technische Universität Darmstadt. doi:10.26083/tuprints-00026496
    [BibTeX] [Abstract] [Download PDF]

    Like many sectors, agriculture is experiencing a continuous digitalization, i.e. an increase in data-driven technologies used. In contrast to companies of other critical infrastructures – e.g. energy or telecommunication – a typical farm is comparatively small and often run as a family business. Accordingly, the demands on farming technology, its implementation, and regulations are different in many terms. Furthermore, the circumstances that influence crisis risks and crisis management are different in agriculture – and as digitalization introduces new potential risks, this process should be reviewed critically. Currently, the most advanced approaches for agriculture are typically referred to as smart farming and agriculture 4.0, which incorporate more precise cultivation with less manual effort. But such new agriculture technology developments usually lack an assessment about its impact on the sector’s resilience and dependencies on other infrastructures. The research domains of crisis informatics and IT security mostly focuses on other topics, apart from agriculture. The resilience research in agriculture itself is currently intensifying, however, this line of research focuses more on problems resulting from the climate crisis and social change. For these reasons it remains unclear, how digitalization impacts the resilience of food production and food safety. Therefore, it is not well researched which technological developments may lead to undesired effects in the future. How modern systems should be designed to allow for both, positive impacts on efficiency, and prevention of negative effects in terms of reduced resilience capacities, is also not answered by current literature. The aim of the present work is to close this research gap at the intersection of agriculture, digitalization, and resilience. To answer the question to what extent current technologies used by farmers are at risk of failure, the dissertation first presents a snapshot of the resilience state of agricultural companies and the technologies used. This involves interviews with stakeholders, mainly farmers, as well as surveying security issues of the LoRaWAN protocol, a transmission technology especially useful for agricultural Internet of Things. Which desires of farmers exist regarding software focusing on aspects of business continuity and secured operations, is another open question. This dissertation aims to also answer this question with empirical methods, mainly focus groups and usability tests. Then the rise of Internet of Things in agriculture raises another question, whether such technologies acquired for smart farming could also have benefits for resilience against internet-connection-lost situations. This question is answered by empirical evaluation of LoRaWAN range characteristics in agricultural landscapes, as well as artifact generation for resilient communication channels on top of LoRaWAN transmission devices. Several findings are derived from the conducted research: There is a lack of understanding of how strong the used tools in agriculture depend on ICT, and many tools require a working internet connection. Moreover, IT employed by agricultural enterprises presents security concerns similar to those encountered in other domains. Based on these findings, developments, and evaluations of new software approaches are presented: Derived design criteria and own system designs that allow for modern data-driven business operations, including IoT integration based on LoRaWAN. The developed solutions show an increase in resilience capacities by enhancing the communication possibilities in crisis situations. The detected low absorption capacities against communication infrastructure outages shows room for improvement. To improve agricultural ITs‘ resilience, software engineers could use the concepts and designs of this dissertation for their product development, like a modular offline-capable farm management storage that allows an exchange of small data in an autarkic manner via commodity LoRaWAN hardware. But also technology advisors and farmers benefit from the technological analyses and suggestions embedded in this work, like using multiple LoRaWAN gateways with an overlapping coverage to mitigate security vulnerabilities.

    @book{kuntke_resilient_2024-1,address = {Darmstadt, Germany},title = {Resilient {Smart} {Farming}: {Crisis}-{Capable} {Information} and {Communication} {Technologies} for {Agriculture}},url = {http://tuprints.ulb.tu-darmstadt.de/26496/},abstract = {Like many sectors, agriculture is experiencing a continuous digitalization, i.e. an increase in data-driven technologies used. In contrast to companies of other critical infrastructures – e.g. energy or telecommunication – a typical farm is comparatively small and often run as a family business.Accordingly, the demands on farming technology, its implementation, and regulations are different in many terms.Furthermore, the circumstances that influence crisis risks and crisis management are different in agriculture – and as digitalization introduces new potential risks, this process should be reviewed critically.Currently, the most advanced approaches for agriculture are typically referred to as smart farming and agriculture 4.0, which incorporate more precise cultivation with less manual effort.But such new agriculture technology developments usually lack an assessment about its impact on the sector's resilience and dependencies on other infrastructures.The research domains of crisis informatics and IT security mostly focuses on other topics, apart from agriculture.The resilience research in agriculture itself is currently intensifying, however, this line of research focuses more on problems resulting from the climate crisis and social change.For these reasons it remains unclear, how digitalization impacts the resilience of food production and food safety.Therefore, it is not well researched which technological developments may lead to undesired effects in the future.How modern systems should be designed to allow for both, positive impacts on efficiency, and prevention of negative effects in terms of reduced resilience capacities, is also not answered by current literature.The aim of the present work is to close this research gap at the intersection of agriculture, digitalization, and resilience.To answer the question to what extent current technologies used by farmers are at risk of failure, the dissertation first presents a snapshot of the resilience state of agricultural companies and the technologies used.This involves interviews with stakeholders, mainly farmers, as well as surveying security issues of the LoRaWAN protocol, a transmission technology especially useful for agricultural Internet of Things.Which desires of farmers exist regarding software focusing on aspects of business continuity and secured operations, is another open question.This dissertation aims to also answer this question with empirical methods, mainly focus groups and usability tests.Then the rise of Internet of Things in agriculture raises another question, whether such technologies acquired for smart farming could also have benefits for resilience against internet-connection-lost situations.This question is answered by empirical evaluation of LoRaWAN range characteristics in agricultural landscapes, as well as artifact generation for resilient communication channels on top of LoRaWAN transmission devices.Several findings are derived from the conducted research:There is a lack of understanding of how strong the used tools in agriculture depend on ICT, and many tools require a working internet connection.Moreover, IT employed by agricultural enterprises presents security concerns similar to those encountered in other domains.Based on these findings, developments, and evaluations of new software approaches are presented:Derived design criteria and own system designs that allow for modern data-driven business operations, including IoT integration based on LoRaWAN.The developed solutions show an increase in resilience capacities by enhancing the communication possibilities in crisis situations.The detected low absorption capacities against communication infrastructure outages shows room for improvement.To improve agricultural ITs' resilience, software engineers could use the concepts and designs of this dissertation for their product development, like a modular offline-capable farm management storage that allows an exchange of small data in an autarkic manner via commodity LoRaWAN hardware.But also technology advisors and farmers benefit from the technological analyses and suggestions embedded in this work, like using multiple LoRaWAN gateways with an overlapping coverage to mitigate security vulnerabilities.},publisher = {Dissertation (Dr.-Ing.), Department of Computer Science, Technische Universität Darmstadt},author = {Kuntke, Franz},year = {2024},doi = {10.26083/tuprints-00026496},keywords = {Projekt-AgriRegio, Projekt-GeoBox, RSF, Security, UsableSec, Crisis, HCI, Dissertation},}

  • Christian Reuter (2024)
    Information Technology for Peace and Security – IT Applications and Infrastructures in Conflicts, Crises, War, and Peace
    2 ed. Wiesbaden, Germany: Springer Vieweg.
    [BibTeX] [Abstract] [Download PDF]

    Technological and scientific progress, especially the rapid development in information technology (IT) and artificial intelligence (AI), plays a crucial role regarding questions of peace and security. This textbook, extended and updated in its second edition, addresses the significance, potential of IT, as well as the challenges it poses, with regard to peace and security. It introduces the reader to the concepts of peace, conflict, and security research, especially focusing on natural, technical and computer science perspectives. In the following sections, it sheds light on cyber conflicts, war and peace, cyber arms control, cyber attribution, infrastructures, artificial intelligence, as well ICT in peace and conflict.

    @book{reuter_information_2024,address = {Wiesbaden, Germany},edition = {2},title = {Information {Technology} for {Peace} and {Security} - {IT} {Applications} and {Infrastructures} in {Conflicts}, {Crises}, {War}, and {Peace}},isbn = {978-3-658-44809-7},url = {https://doi.org/10.1007/978-3-658-44810-3},abstract = {Technological and scientific progress, especially the rapid development in information technology (IT) and artificial intelligence (AI), plays a crucial role regarding questions of peace and security. This textbook, extended and updated in its second edition, addresses the significance, potential of IT, as well as the challenges it poses, with regard to peace and security.It introduces the reader to the concepts of peace, conflict, and security research, especially focusing on natural, technical and computer science perspectives. In the following sections, it sheds light on cyber conflicts, war and peace, cyber arms control, cyber attribution, infrastructures, artificial intelligence, as well ICT in peace and conflict.},publisher = {Springer Vieweg},author = {Reuter, Christian},year = {2024},keywords = {Peace, Projekt-TraCe, Security, Projekt-CROSSING, Selected, Cyberwar, AuswahlPeace, Infrastructure},}

  • Thomas Reinhold (2024)
    Towards a Peaceful Development of Cyberspace: Challenges and Technical Measures for the De-Escalation of State-Led Cyberconflicts and Arms Control of Cyberweapons
    Wiesbaden, Germany: Springer Vieweg. doi:10.1007/978-3-658-43951-4
    [BibTeX] [Abstract] [Download PDF]

    Cyberspace, already a few decades old, has become a matter of course for most of us, part of our everyday life. At the same time, this space and the global infrastructure behind it are essential for our civilizations, the economy and administration, and thus an essential expression and lifeline of a globalized world. However, these developments also create vulnerabilities and thus, cyberspace is increasingly developing into an intelligence and military operational area – for the defense and security of states but also as a component of offensive military planning, visible in the creation of military cyber-departments and the integration of cyberspace into states‘ security and defense strategies. In order to contain and regulate the conflict and escalation potential of technology used by military forces, over the last decades, a complex tool set of transparency, de-escalation and arms control measures has been developed and proof-tested. Unfortunately, many of these established measures do not work for cyberspace due to its specific technical characteristics. Even more, the concept of what constitutes a weapon – an essential requirement for regulation – starts to blur for this domain. Against this background, this thesis aims to answer how measures for the de-escalation of state-led conflicts in cyberspace and arms control of cyberweapons can be developed. In order to answer this question, the dissertation takes a specifically technical perspective on these problems and the underlying political challenges of state behavior and international humanitarian law in cyberspace to identify starting points for technical measures of transparency, arms control and verification. Based on this approach of adopting already existing technical measures from other fields of computer science, the thesis will provide proof of concepts approaches for some mentioned challenges like a classification system for cyberweapons that is based on technical measurable features, an approach for the mutual reduction of vulnerability stockpiles and an approach to plausibly assure the non-involvement in a cyberconflict as a measure for de-escalation. All these initial approaches and the questions of how and by which measures arms control and conflict reduction can work for cyberspace are still quite new and subject to not too many debates. Indeed, the approach of deliberately self-restricting the capabilities of technology in order to serve a bigger goal, like the reduction of its destructive usage, is yet not very common for the engineering thinking of computer science. Therefore, this dissertation also aims to provide some impulses regarding the responsibility and creative options of computer science with a view to the peaceful development and use of cyberspace.

    @book{reinhold_towards_2024,address = {Wiesbaden, Germany},title = {Towards a {Peaceful} {Development} of {Cyberspace}: {Challenges} and {Technical} {Measures} for the {De}-{Escalation} of {State}-{Led} {Cyberconflicts} and {Arms} {Control} of {Cyberweapons}},isbn = {978-3-658-43950-7},url = {https://link.springer.com/book/10.1007/978-3-658-43951-4},abstract = {Cyberspace, already a few decades old, has become a matter of course for most of us, part of our everyday life. At the same time, this space and the global infrastructure behind it are essential for our civilizations, the economy and administration, and thus an essential expression and lifeline of a globalized world. However, these developments also create vulnerabilities and thus, cyberspace is increasingly developing into an intelligence and military operational area – for the defense and security of states but also as a component of offensive military planning, visible in the creation of military cyber-departments and the integration of cyberspace into states' security and defense strategies. In order to contain and regulate the conflict and escalation potential of technology used by military forces, over the last decades, a complex tool set of transparency, de-escalation and arms control measures has been developed and proof-tested. Unfortunately, many of these established measures do not work for cyberspace due to its specific technical characteristics. Even more, the concept of what constitutes a weapon – an essential requirement for regulation – starts to blur for this domain. Against this background, this thesis aims to answer how measures for the de-escalation of state-led conflicts in cyberspace and arms control of cyberweapons can be developed. In order to answer this question, the dissertation takes a specifically technical perspective on these problems and the underlying political challenges of state behavior and international humanitarian law in cyberspace to identify starting points for technical measures of transparency, arms control and verification. Based on this approach of adopting already existing technical measures from other fields of computer science, the thesis will provide proof of concepts approaches for some mentioned challenges like a classification system for cyberweapons that is based on technical measurable features, an approach for the mutual reduction of vulnerability stockpiles and an approach to plausibly assure the non-involvement in a cyberconflict as a measure for de-escalation. All these initial approaches and the questions of how and by which measures arms control and conflict reduction can work for cyberspace are still quite new and subject to not too many debates. Indeed, the approach of deliberately self-restricting the capabilities of technology in order to serve a bigger goal, like the reduction of its destructive usage, is yet not very common for the engineering thinking of computer science. Therefore, this dissertation also aims to provide some impulses regarding the responsibility and creative options of computer science with a view to the peaceful development and use of cyberspace.},publisher = {Springer Vieweg},author = {Reinhold, Thomas},year = {2024},doi = {10.1007/978-3-658-43951-4},keywords = {Peace, Security, Projekt-CROSSING, Projekt-ATHENE, DissPublisher},}

  • Steffen Haesler (2024)
    Citizens in Crises: Behavior, Dependencies, and Technological Support of Digital Self-Organization
    Darmstadt, Germany: Dissertation (Dr. rer. nat.), Department of Computer Science, Technische Universität Darmstadt.
    [BibTeX]

    @book{haesler_citizens_2024,address = {Darmstadt, Germany},title = {Citizens in {Crises}: {Behavior}, {Dependencies}, and {Technological} {Support} of {Digital} {Self}-{Organization}},publisher = {Dissertation (Dr. rer. nat.), Department of Computer Science, Technische Universität Darmstadt},author = {Haesler, Steffen},year = {2024},keywords = {Crisis, HCI, Projekt-emergenCITY, Dissertation},}

  • Sebastian Linsner (2024)
    Privacy Preserving Data Management – Assisting Users in Data Disclosure Scenarios
    Darmstadt, Germany: Dissertation (Dr.-Ing.), Department of Computer Science, Technische Universität Darmstadt.
    [BibTeX]

    @book{linsner_privacy_2024,address = {Darmstadt, Germany},title = {Privacy {Preserving} {Data} {Management} – {Assisting} {Users} in {Data} {Disclosure} {Scenarios}},publisher = {Dissertation (Dr.-Ing.), Department of Computer Science, Technische Universität Darmstadt},author = {Linsner, Sebastian},year = {2024},keywords = {Security, UsableSec, Projekt-CROSSING, Projekt-ATHENE-PriVis, Dissertation},}

  • Katrin Hartwig (2024)
    Navigating Misinformation: User-Centered Design and Evaluation of Indicator-Based Digital Interventions
    Darmstadt, Germany: Dissertation (Dr.-Ing.), Department of Computer Science, Technische Universität Darmstadt.
    [BibTeX]

    @book{hartwig_navigating_2024-1,address = {Darmstadt, Germany},title = {Navigating {Misinformation}: {User}-{Centered} {Design} and {Evaluation} of {Indicator}-{Based} {Digital} {Interventions}},publisher = {Dissertation (Dr.-Ing.), Department of Computer Science, Technische Universität Darmstadt},author = {Hartwig, Katrin},year = {2024},keywords = {Crisis, HCI, Projekt-NEBULA, Dissertation},}

  • Markus Bayer (2024)
    Deep Learning in Textual Low-Data Regimes for Cybersecurity
    Darmstadt, Germany: Dissertation (Dr. rer. nat.), Department of Computer Science, Technische Universität Darmstadt.
    [BibTeX]

    @book{bayer_deep_2024,address = {Darmstadt, Germany},title = {Deep {Learning} in {Textual} {Low}-{Data} {Regimes} for {Cybersecurity}},publisher = {Dissertation (Dr. rer. nat.), Department of Computer Science, Technische Universität Darmstadt},author = {Bayer, Markus},year = {2024},keywords = {Security, Projekt-CYWARN, Projekt-ATHENE-CyAware, Projekt-CYLENCE, Dissertation},}

    Kapitel in Büchern

  • Christian Reuter, Konstantin Aal, Jürgen Altmann, Ute Bernhardt, Kai Denker, Jonas Franken, Anja-Liisa Gonsior, Laura Guntrum, Dominik Herrmann, Matthias Hollick, Stefan Katzenbeisser, Marc-André Kaufhold, Thomas Reinhold, Thea Riebe, Ingo Ruhmann, KlausPeter Saalbach, Lisa Schirch, Stefka Schmid, Niklas Schörnig, Ali Sunyaev, Volker Wulf (2024)
    Outlook: The Future of IT in Peace and Security
    In: Christian Reuter: Information Technology for Peace and Security – IT Applications and Infrastructures in Conflicts, Crises, War, and Peace. Wiesbaden, Germany: Springer Vieweg.
    [BibTeX] [Abstract] [Download PDF]

    Not only today, but also in the future information technology and the advances in the field of computer science will have a high relevance for peace and security. Naturally, a textbook like this can only cover a selective part of research and a certain point in time. Nonetheless, it can be attempted to identify trends, challenges and venture an outlook into the future. That is exactly what we want to achieve in this chapter: To predict fu-ture developments and try to classify them correctly. These considerations were made both by the editor and the authors involved alike. Therefore, an outlook based on fun-damentals, cyber conflicts and war, cyber peace, cyber arms control, infrastructures as well as social interaction is given.

    @incollection{reuter_outlook_2024,address = {Wiesbaden, Germany},title = {Outlook: {The} {Future} of {IT} in {Peace} and {Security}},url = {https://link.springer.com/chapter/10.1007/978-3-658-44810-3_22},abstract = {Not only today, but also in the future information technology and the advances in the field of computer science will have a high relevance for peace and security. Naturally, a textbook like this can only cover a selective part of research and a certain point in time. Nonetheless, it can be attempted to identify trends, challenges and venture an outlook into the future. That is exactly what we want to achieve in this chapter: To predict fu-ture developments and try to classify them correctly. These considerations were made both by the editor and the authors involved alike. Therefore, an outlook based on fun-damentals, cyber conflicts and war, cyber peace, cyber arms control, infrastructures as well as social interaction is given.},booktitle = {Information {Technology} for {Peace} and {Security} - {IT} {Applications} and {Infrastructures} in {Conflicts}, {Crises}, {War}, and {Peace}},publisher = {Springer Vieweg},author = {Reuter, Christian and Aal, Konstantin and Altmann, Jürgen and Bernhardt, Ute and Denker, Kai and Franken, Jonas and Gonsior, Anja-Liisa and Guntrum, Laura and Herrmann, Dominik and Hollick, Matthias and Katzenbeisser, Stefan and Kaufhold, Marc-André and Reinhold, Thomas and Riebe, Thea and Ruhmann, Ingo and Saalbach, Klaus-Peter and Schirch, Lisa and Schmid, Stefka and Schörnig, Niklas and Sunyaev, Ali and Wulf, Volker},editor = {Reuter, Christian},year = {2024},note = {https://doi.org/10.1007/978-3-658-44810-3\_22},keywords = {Peace, Security, Projekt-CROSSING},}

  • Christian Reuter, Jonas Franken, Anja-Liisa Gonsior, Laura Guntrum, Stefka Schmid (2024)
    An Overview and Introduction to Information Technology for Peace and Security
    In: Christian Reuter: Information Technology for Peace and Security – IT Applications and Infrastructures in Conflicts, Crises, War, and Peace. Wiesbaden, Germany: Springer Vieweg.
    [BibTeX] [Abstract] [Download PDF]

    Technological and scientific progress, especially the rapid development in information technology (IT), plays a crucial role regarding questions of peace and security. This textbook addresses the significance, potentials and challenges of IT for peace and securi-ty. For this purpose, the book offers an introduction to peace, conflict, and security research, thereby focusing on natural science, technical and computer science perspec-tives. In the following, it sheds light on fundamentals (e.g. IT in peace, conflict and security, natural-science/technical peace research), cyber conflicts and war (e.g. infor-mation warfare, cyber espionage, cyber defence, Darknet), cyber peace (e.g. dual-use, technology assessment, confidence and security building measures), cyber arms control (e.g. arms control in the cyberspace, unmanned systems, verification), cyber attribution and infrastructures (e.g. attribution of cyber attacks, resilient infrastructures, secure critical information infrastructures), culture and interaction (e.g. safety and security, cultural violence, social media), before an outlook is given. This chapter provides an overview of all chapters in this book.

    @incollection{reuter_overview_2024,address = {Wiesbaden, Germany},title = {An {Overview} and {Introduction} to {Information} {Technology} for {Peace} and {Security}},url = {https://link.springer.com/chapter/10.1007/978-3-658-44810-3_1},abstract = {Technological and scientific progress, especially the rapid development in information technology (IT), plays a crucial role regarding questions of peace and security. This textbook addresses the significance, potentials and challenges of IT for peace and securi-ty. For this purpose, the book offers an introduction to peace, conflict, and security research, thereby focusing on natural science, technical and computer science perspec-tives. In the following, it sheds light on fundamentals (e.g. IT in peace, conflict and security, natural-science/technical peace research), cyber conflicts and war (e.g. infor-mation warfare, cyber espionage, cyber defence, Darknet), cyber peace (e.g. dual-use, technology assessment, confidence and security building measures), cyber arms control (e.g. arms control in the cyberspace, unmanned systems, verification), cyber attribution and infrastructures (e.g. attribution of cyber attacks, resilient infrastructures, secure critical information infrastructures), culture and interaction (e.g. safety and security, cultural violence, social media), before an outlook is given. This chapter provides an overview of all chapters in this book.},booktitle = {Information {Technology} for {Peace} and {Security} - {IT} {Applications} and {Infrastructures} in {Conflicts}, {Crises}, {War}, and {Peace}},publisher = {Springer Vieweg},author = {Reuter, Christian and Franken, Jonas and Gonsior, Anja-Liisa and Guntrum, Laura and Schmid, Stefka},editor = {Reuter, Christian},year = {2024},note = {https://doi.org/10.1007/978-3-658-44810-3\_1},keywords = {Peace, Security, Projekt-CROSSING},}

  • Anja P. Jakobi, Jasmin Haunschild (2024)
    Transnational organisierte Kriminalität und internationale Politik
    In: Frank Sauer, Luba von Hauff, Carlo Masala: Handbuch Internationale Beziehungen. Wiesbaden: Springer Fachmedien Wiesbaden, , 1013–1037. doi:10.1007/978-3-658-33953-1_40
    [BibTeX] [Abstract] [Download PDF]

    Der Beitrag analysiert die unterschiedlichen Formen und Voraussetzungen der Bekämpfung, Verfolgung und Prävention transnational organisierter Kriminalität in der internationalen Politik. Dazu führen wir zunächst in die Definition und die Grundlagen in diesem Bereich ein, auch im Hinblick auf eine Einordnung in Debatten der Internationalen Beziehungen, bevor einzelne Politikbereiche – Drogenhandel, Menschenhandel und -schmuggel, Waffenhandel, Geldwäsche und Terrorismusfinanzierung, Konfliktmineralien – vorgestellt werden. Die Schlussfolgerungen bieten einen Ausblick in weitere Teilbereiche und erläutern die Rolle von staatlichen und nicht-staatlichen Akteuren in der Bekämpfung transnational organisierter Kriminalität.

    @incollection{jakobi_transnational_2024,address = {Wiesbaden},title = {Transnational organisierte {Kriminalität} und internationale {Politik}},isbn = {978-3-658-33953-1},url = {https://doi.org/10.1007/978-3-658-33953-1_40},abstract = {Der Beitrag analysiert die unterschiedlichen Formen und Voraussetzungen der Bekämpfung, Verfolgung und Prävention transnational organisierter Kriminalität in der internationalen Politik. Dazu führen wir zunächst in die Definition und die Grundlagen in diesem Bereich ein, auch im Hinblick auf eine Einordnung in Debatten der Internationalen Beziehungen, bevor einzelne Politikbereiche – Drogenhandel, Menschenhandel und -schmuggel, Waffenhandel, Geldwäsche und Terrorismusfinanzierung, Konfliktmineralien – vorgestellt werden. Die Schlussfolgerungen bieten einen Ausblick in weitere Teilbereiche und erläutern die Rolle von staatlichen und nicht-staatlichen Akteuren in der Bekämpfung transnational organisierter Kriminalität.},booktitle = {Handbuch {Internationale} {Beziehungen}},publisher = {Springer Fachmedien Wiesbaden},author = {Jakobi, Anja P. and Haunschild, Jasmin},editor = {Sauer, Frank and von Hauff, Luba and Masala, Carlo},year = {2024},doi = {10.1007/978-3-658-33953-1_40},keywords = {Peace},pages = {1013--1037},}

  • Thea Riebe, Stefka Schmid, Christian Reuter (2024)
    Dual-Use Information Technology: Research, Development and Governance
    In: Christian Reuter: Information Technology for Peace and Security – IT Applications and Infrastructures in Conflicts, Crises, War, and Peace. Wiesbaden, Germany: Springer Vieweg.
    [BibTeX] [Abstract] [Download PDF]

    Dual-use of IT is relevant to many applications and technology areas: how can we prevent, control or manage the risk of misuse of IT? How can dual-use awareness and regulation help to mitigate the risks to peace and security on the national and international levels? As cyberspace has been declared a military domain, IT is increasingly important for civil and military infrastructures. How can researchers, developers and decision-makers make sure that IT is not misused to cause harm? This has been discussed as the dual-use problem for nuclear, biological and chemical technologies. This chapter introduces different dual-use concepts and illustrates by considering cryptography, intrusion software, and artificial intelligence how governance measures, including export control, are applied. Further, approaches of technology assessment, with a focus on the design process, are presented. The chapter also provides insight into the implementation of dual-use assessment guidelines at TU Darmstadt, the so-called Civil Clause.

    @incollection{riebe_dual-use_2024,address = {Wiesbaden, Germany},title = {Dual-{Use} {Information} {Technology}: {Research}, {Development} and {Governance}},isbn = {978-3-658-25652-4},url = {https://link.springer.com/chapter/10.1007/978-3-658-44810-3_8},abstract = {Dual-use of IT is relevant to many applications and technology areas: how can we prevent, control or manage the risk of misuse of IT? How can dual-use awareness and regulation help to mitigate the risks to peace and security on the national and international levels? As cyberspace has been declared a military domain, IT is increasingly important for civil and military infrastructures. How can researchers, developers and decision-makers make sure that IT is not misused to cause harm? This has been discussed as the dual-use problem for nuclear, biological and chemical technologies. This chapter introduces different dual-use concepts and illustrates by considering cryptography, intrusion software, and artificial intelligence how governance measures, including export control, are applied. Further, approaches of technology assessment, with a focus on the design process, are presented. The chapter also provides insight into the implementation of dual-use assessment guidelines at TU Darmstadt, the so-called Civil Clause.},booktitle = {Information {Technology} for {Peace} and {Security} - {IT} {Applications} and {Infrastructures} in {Conflicts}, {Crises}, {War}, and {Peace}},publisher = {Springer Vieweg},author = {Riebe, Thea and Schmid, Stefka and Reuter, Christian},editor = {Reuter, Christian},year = {2024},note = {https://doi.org/10.1007/978-3-658-44810-3\_8},keywords = {Peace},}

  • Christian Reuter, Thea Riebe, Jasmin Haunschild, Thomas Reinhold, Stefka Schmid (2024)
    Teaching Peace Informatics: Reflections from Lectures and Exercises
    In: Christian Reuter: Information Technology for Peace and Security – IT Applications and Infrastructures in Conflicts, Crises, War, and Peace. Wiesbaden, Germany: Springer Vieweg.
    [BibTeX] [Abstract] [Download PDF]

    Conflicts in cyberspace do not longer constitute a fictional scenario of the future. To gain a better understanding of how such conflicts are carried out, interdisciplinary research and teaching building on both computer science and peace and security studies is indispensable. Even though numerous established courses and textbooks exist in some disciplines, this does not apply to their intersection. This chapter (This chapter has been published as a paper (in German): Reuter et al. (2022)) reflects on the introduction of the interdisciplinary course “Information Technology for Peace and Security” for students of Computer Science, IT Security and Information Systems at the Technical University of Darmstadt and Peace and Conflict Research at the TU Darmstadt in cooperation with Goethe University Frankfurt. The challenges and solutions of interdisciplinary teaching are presented while the importance of this type of teaching is assessed.

    @incollection{reuter_teaching_2024,address = {Wiesbaden, Germany},title = {Teaching {Peace} {Informatics}: {Reflections} from {Lectures} and {Exercises}},url = {https://link.springer.com/chapter/10.1007/978-3-658-44810-3_21},abstract = {Conflicts in cyberspace do not longer constitute a fictional scenario of the future. To gain a better understanding of how such conflicts are carried out, interdisciplinary research and teaching building on both computer science and peace and security studies is indispensable. Even though numerous established courses and textbooks exist in some disciplines, this does not apply to their intersection. This chapter (This chapter has been published as a paper (in German): Reuter et al. (2022)) reflects on the introduction of the interdisciplinary course “Information Technology for Peace and Security” for students of Computer Science, IT Security and Information Systems at the Technical University of Darmstadt and Peace and Conflict Research at the TU Darmstadt in cooperation with Goethe University Frankfurt. The challenges and solutions of interdisciplinary teaching are presented while the importance of this type of teaching is assessed.},booktitle = {Information {Technology} for {Peace} and {Security} - {IT} {Applications} and {Infrastructures} in {Conflicts}, {Crises}, {War}, and {Peace}},publisher = {Springer Vieweg},author = {Reuter, Christian and Riebe, Thea and Haunschild, Jasmin and Reinhold, Thomas and Schmid, Stefka},editor = {Reuter, Christian},year = {2024},note = {https://doi.org/10.1007/978-3-658-44810-3\_21},keywords = {Peace, Security, Infrastructure},}

  • Christian Reuter, Anja-Liisa Gonsior, Thea Riebe, Marc-André Kaufhold (2024)
    Peace Informatics: Bridging Peace and Conflict Studies with Computer Science
    In: Christian Reuter: Information Technology for Peace and Security – IT Applications and Infrastructures in Conflicts, Crises, War, and Peace. Wiesbaden, Germany: Springer Vieweg.
    [BibTeX] [Abstract] [Download PDF]

    Advances in science and technology play a crucial role in the context of peace, conflict and security. As information technology (IT) is becoming omnipresent, this includes both the resilience of IT infrastructures e.g. as a target in cases of conflict and the role of IT applications to prevent and manage conflicts, crises and disasters. This chapter is an introduction to IT and its role in war and peace, in conflicts and crises as well as in safety and security. Based on those connections a new field of research has emerged: IT peace research. It is introduced in this chapter which provides an overview of the inter-disciplinary concepts of peace, conflict and security. In addition, the research disciplines computer science and peace and conflict studies as the basis of IT peace research are explained. Moreover, the chapter focuses on the specific research topics of IT peace research and presents the institutionalised research landscape in Germany.

    @incollection{reuter_peace_2024,address = {Wiesbaden, Germany},title = {Peace {Informatics}: {Bridging} {Peace} and {Conflict} {Studies} with {Computer} {Science}},url = {https://link.springer.com/chapter/10.1007/978-3-658-44810-3_2},abstract = {Advances in science and technology play a crucial role in the context of peace, conflict and security. As information technology (IT) is becoming omnipresent, this includes both the resilience of IT infrastructures e.g. as a target in cases of conflict and the role of IT applications to prevent and manage conflicts, crises and disasters. This chapter is an introduction to IT and its role in war and peace, in conflicts and crises as well as in safety and security. Based on those connections a new field of research has emerged: IT peace research. It is introduced in this chapter which provides an overview of the inter-disciplinary concepts of peace, conflict and security. In addition, the research disciplines computer science and peace and conflict studies as the basis of IT peace research are explained. Moreover, the chapter focuses on the specific research topics of IT peace research and presents the institutionalised research landscape in Germany.},booktitle = {Information {Technology} for {Peace} and {Security} - {IT} {Applications} and {Infrastructures} in {Conflicts}, {Crises}, {War}, and {Peace}},publisher = {Springer Vieweg},author = {Reuter, Christian and Gonsior, Anja-Liisa and Riebe, Thea and Kaufhold, Marc-André},editor = {Reuter, Christian},year = {2024},note = {https://doi.org/10.1007/978-3-658-44810-3\_2},keywords = {Peace, Security, Infrastructure},}

  • Thomas Reinhold, Christian Reuter (2024)
    Verification in Cyberspace
    In: Christian Reuter: Information Technology for Peace and Security – IT Applications and Infrastructures in Conflicts, Crises, War, and Peace. Wiesbaden, Germany: Springer Vieweg.
    [BibTeX] [Abstract] [Download PDF]

    Verification is one of the pillars of arms control and non-proliferation treaties as well as an important part of confidence building measures. It defines practical measures that enable treaty members to check the treaty compliance by observing, counting or moni-toring specific actions and their accordance with the respective rules. In contrast to his-torical examples of former military technologies, cyberspace features some unique char-acteristics making it hard to apply established measures. The chapter describes these peculiarities and assesses distinguishing problems compared to selected verification measures for nuclear, biological and chemicals weapons technology. Yet, cyberspace is a human-made domain and adjusting its technical setting, rules and principles may help to reduce the threat of ongoing militarisation. Offering some alternatives, the chapter elaborates on suitable and measurable parameters for this domain and presents potential-ly useful verification approaches.

    @incollection{reinhold_verification_2024,address = {Wiesbaden, Germany},title = {Verification in {Cyberspace}},url = {https://link.springer.com/chapter/10.1007/978-3-658-44810-3_11},abstract = {Verification is one of the pillars of arms control and non-proliferation treaties as well as an important part of confidence building measures. It defines practical measures that enable treaty members to check the treaty compliance by observing, counting or moni-toring specific actions and their accordance with the respective rules. In contrast to his-torical examples of former military technologies, cyberspace features some unique char-acteristics making it hard to apply established measures. The chapter describes these peculiarities and assesses distinguishing problems compared to selected verification measures for nuclear, biological and chemicals weapons technology. Yet, cyberspace is a human-made domain and adjusting its technical setting, rules and principles may help to reduce the threat of ongoing militarisation. Offering some alternatives, the chapter elaborates on suitable and measurable parameters for this domain and presents potential-ly useful verification approaches.},booktitle = {Information {Technology} for {Peace} and {Security} - {IT} {Applications} and {Infrastructures} in {Conflicts}, {Crises}, {War}, and {Peace}},publisher = {Springer Vieweg},author = {Reinhold, Thomas and Reuter, Christian},editor = {Reuter, Christian},year = {2024},note = {https://doi.org/10.1007/978-3-658-44810-3\_11},keywords = {Peace, Security, Projekt-CNTR},}

  • Thomas Reinhold, Christian Reuter (2024)
    From Cyber War to Cyber Peace
    In: Christian Reuter: Information Technology for Peace and Security – IT Applications and Infrastructures in Conflicts, Crises, War, and Peace. Wiesbaden, Germany: Springer Vieweg.
    [BibTeX] [Abstract] [Download PDF]

    The encompassing trend of digitalisation and widespread dependencies on IT systems triggers adjustments also in the military forces. Besides necessary enhancements of IT security and defensive measures for cyberspace, a growing number of states are estab-lishing offensive military capabilities for this domain. Looking at historical develop-ments and transformations due to advancements in military technologies, the chapter discusses the political progress made and tools developed since. Both of these have con-tributed to handling challenges and confining threats to international security. With this background, the text assesses a possible application of these efforts to developments concerning cyberspace, as well as obstacles that need to be tackled for it to be success-ful. The chapter points out political advancements already in progress, the role of social initiatives, such as the cyber peace campaign of the Forum of Computer Scientists for Peace and Societal Responsibility (FifF), as well as potential consequences of the rising probability of cyber war as opposed to the prospects of cyber peace.

    @incollection{reinhold_cyber_2024,address = {Wiesbaden, Germany},title = {From {Cyber} {War} to {Cyber} {Peace}},url = {https://link.springer.com/chapter/10.1007/978-3-658-44810-3_7},abstract = {The encompassing trend of digitalisation and widespread dependencies on IT systems triggers adjustments also in the military forces. Besides necessary enhancements of IT security and defensive measures for cyberspace, a growing number of states are estab-lishing offensive military capabilities for this domain. Looking at historical develop-ments and transformations due to advancements in military technologies, the chapter discusses the political progress made and tools developed since. Both of these have con-tributed to handling challenges and confining threats to international security. With this background, the text assesses a possible application of these efforts to developments concerning cyberspace, as well as obstacles that need to be tackled for it to be success-ful. The chapter points out political advancements already in progress, the role of social initiatives, such as the cyber peace campaign of the Forum of Computer Scientists for Peace and Societal Responsibility (FifF), as well as potential consequences of the rising probability of cyber war as opposed to the prospects of cyber peace.},booktitle = {Information {Technology} for {Peace} and {Security} - {IT} {Applications} and {Infrastructures} in {Conflicts}, {Crises}, {War}, and {Peace}},publisher = {Springer Vieweg},author = {Reinhold, Thomas and Reuter, Christian},editor = {Reuter, Christian},year = {2024},note = {https://doi.org/10.1007/978-3-658-44810-3\_7},keywords = {Peace, Security, Projekt-CROSSING, Cyberwar, Projekt-CNTR},}

  • Thomas Reinhold, Christian Reuter (2024)
    Arms Control and its Applicability to Cyberspace
    In: Christian Reuter: Information Technology for Peace and Security – IT Applications and Infrastructures in Conflicts, Crises, War, and Peace. Wiesbaden: Springer Fachmedien Wiesbaden.
    [BibTeX] [Abstract] [Download PDF]

    Arms control aims at preventing conflicts and fostering stability in inter-state relations by either reducing the probability of usage of a specific weapon or regulating its use and thus, reducing the costs of armament. Several approaches to arms control exist: limiting or reducing numbers of weapons and armed forces, disarmament (“down to zero”) or prohibiting certain weapons. To illustrate these further, this chapter elaborates on the necessity of arms control and presents some historical examples, including an overview of existing measures of arms control. Extrapolating from these, the general architecture of arms control regimes and the complex issue of establishing and verifying compliance with agreements will be discussed, not least with respect to cyberspace. Building on these theoretical considerations, the chapter presents important treaties and first approaches, including the Wassenaar Arrangement, the recommendations of the OSCE, and the UN GGE 2015.

    @incollection{reuter_arms_2024,address = {Wiesbaden},title = {Arms {Control} and its {Applicability} to {Cyberspace}},url = {https://link.springer.com/chapter/10.1007/978-3-658-44810-3_10},abstract = {Arms control aims at preventing conflicts and fostering stability in inter-state relations by either reducing the probability of usage of a specific weapon or regulating its use and thus, reducing the costs of armament. Several approaches to arms control exist: limiting or reducing numbers of weapons and armed forces, disarmament (“down to zero”) or prohibiting certain weapons. To illustrate these further, this chapter elaborates on the necessity of arms control and presents some historical examples, including an overview of existing measures of arms control. Extrapolating from these, the general architecture of arms control regimes and the complex issue of establishing and verifying compliance with agreements will be discussed, not least with respect to cyberspace. Building on these theoretical considerations, the chapter presents important treaties and first approaches, including the Wassenaar Arrangement, the recommendations of the OSCE, and the UN GGE 2015.},language = {en},booktitle = {Information {Technology} for {Peace} and {Security} - {IT} {Applications} and {Infrastructures} in {Conflicts}, {Crises}, {War}, and {Peace}},publisher = {Springer Fachmedien Wiesbaden},author = {Reinhold, Thomas and Reuter, Christian},editor = {Reuter, Christian},year = {2024},note = {https://doi.org/10.1007/978-3-658-44810-3\_10},keywords = {Peace, Projekt-CNTR},}

  • Marc-André Kaufhold, Jasmin Haunschild, Christian Reuter (2024)
    Cultural Violence and Peace Interventions in Social Media
    In: Christian Reuter: Information Technology for Peace and Security – IT Applications and Infrastructures in Conflicts, Crises, War, and Peace. Wiesbaden, Germany: Springer Vieweg.
    [BibTeX] [Abstract] [Download PDF]

    Over the last decade, social media services had an enormous impact on modern culture. They are nowadays widely established in everyday life, but also during natural and man-made crises and conflicts. For instance, Facebook was part of the Arabic Spring, in which the tool facilitated the communication and interaction between participants of political protests. On the contrary, terrorists may recruit new members and disseminate ideologies, and social bots may influence social and political processes. Based on the notions of cultural violence and cultural peace as well as the phenomena of fake news, terrorism and social bots, this exploratory review firstly presents human cultural inter-ventions in social media (e.g. dissemination of fake news and terroristic propaganda) and respective countermeasures (e.g. fake news detection and counter-narratives). Sec-ondly, it discusses automatic cultural interventions realised via social bots (e.g. astro-turfing, misdirection and smoke screening) and countermeasures (e.g. crowdsourcing and social bot detection). Finally, this chapter concludes with a range of cultural inter-ventions and information and communication technology (ICT) in terms of actors and intentions to identify future research potential for supporting situational assessments during conflicts.

    @incollection{kaufhold_cultural_2024,address = {Wiesbaden, Germany},title = {Cultural {Violence} and {Peace} {Interventions} in {Social} {Media}},url = {https://link.springer.com/chapter/10.1007/978-3-658-44810-3_18},abstract = {Over the last decade, social media services had an enormous impact on modern culture. They are nowadays widely established in everyday life, but also during natural and man-made crises and conflicts. For instance, Facebook was part of the Arabic Spring, in which the tool facilitated the communication and interaction between participants of political protests. On the contrary, terrorists may recruit new members and disseminate ideologies, and social bots may influence social and political processes. Based on the notions of cultural violence and cultural peace as well as the phenomena of fake news, terrorism and social bots, this exploratory review firstly presents human cultural inter-ventions in social media (e.g. dissemination of fake news and terroristic propaganda) and respective countermeasures (e.g. fake news detection and counter-narratives). Sec-ondly, it discusses automatic cultural interventions realised via social bots (e.g. astro-turfing, misdirection and smoke screening) and countermeasures (e.g. crowdsourcing and social bot detection). Finally, this chapter concludes with a range of cultural inter-ventions and information and communication technology (ICT) in terms of actors and intentions to identify future research potential for supporting situational assessments during conflicts.},booktitle = {Information {Technology} for {Peace} and {Security} - {IT} {Applications} and {Infrastructures} in {Conflicts}, {Crises}, {War}, and {Peace}},publisher = {Springer Vieweg},author = {Kaufhold, Marc-André and Haunschild, Jasmin and Reuter, Christian},editor = {Reuter, Christian},year = {2024},note = {https://doi.org/10.1007/978-3-658-44810-3\_18},keywords = {Peace, Crisis, HCI, Projekt-CYLENCE, SocialMedia},}

  • Jonas Franken, Christian Reuter (2024)
    Secure Critical Infrastructures
    In: Christian Reuter: Information Technology for Peace and Security – IT Applications and Infrastructures in Conflicts, Crises, War, and Peace. Wiesbaden, Germany: Springer Vieweg.
    [BibTeX] [Abstract] [Download PDF]

    Critical infrastructures (CI) provide societies with essential goods and services. With the growing impact of digitalisation, information and communication technologies play an increasing role within these entities. Large-scale outages in many of the ten German CI sectors revealed the increasing vulnerabilities stemming from dependencies on electricity and connectivity. While the CI concept is widely used in current public debates, some inconsistencies require nuanced attention from students and researchers of CI. This chapter introduces secure critical infrastructures. It therefore provides an overview of the central characteristics, essential concepts of hierarchy, (inter-)dependency, criticality, and vulnerability to enable a coherent analysis of CI. To map out the multi-actor landscape within CI, the private, public, hybrid and civil-society stakeholders mainly shaping CI policies and discourses will be introduced.

    @incollection{franken_secure_2024,address = {Wiesbaden, Germany},title = {Secure {Critical} {Infrastructures}},url = {https://link.springer.com/chapter/10.1007/978-3-658-44810-3_13},abstract = {Critical infrastructures (CI) provide societies with essential goods and services. With the growing impact of digitalisation, information and communication technologies play an increasing role within these entities. Large-scale outages in many of the ten German CI sectors revealed the increasing vulnerabilities stemming from dependencies on electricity and connectivity. While the CI concept is widely used in current public debates, some inconsistencies require nuanced attention from students and researchers of CI. This chapter introduces secure critical infrastructures. It therefore provides an overview of the central characteristics, essential concepts of hierarchy, (inter-)dependency, criticality, and vulnerability to enable a coherent analysis of CI. To map out the multi-actor landscape within CI, the private, public, hybrid and civil-society stakeholders mainly shaping CI policies and discourses will be introduced.},booktitle = {Information {Technology} for {Peace} and {Security} - {IT} {Applications} and {Infrastructures} in {Conflicts}, {Crises}, {War}, and {Peace}},publisher = {Springer Vieweg},author = {Franken, Jonas and Reuter, Christian},editor = {Reuter, Christian},year = {2024},note = {https://doi.org/10.1007/978-3-658-44810-3\_13},keywords = {Peace, Security, Infrastructure},}

  • Steffen Haesler, Christian Reuter (2024)
    Moderne Technologien und Resilienz
    In: Andreas H. Karsten, Stefan Voßschmidt, Uwe Becker: Resilienz und Schockereignisse. Kohlhammer.
    [BibTeX]

    @incollection{haesler_moderne_2024,title = {Moderne {Technologien} und {Resilienz}},isbn = {978-3-17-043720-3},booktitle = {Resilienz und {Schockereignisse}},publisher = {Kohlhammer},author = {Haesler, Steffen and Reuter, Christian},editor = {Karsten, Andreas H. and Voßschmidt, Stefan and Becker, Uwe},year = {2024},keywords = {Security, UsableSec, Projekt-emergenCITY},}

  • Thomas Reinhold, Christian Reuter (2024)
    Artificial Intelligence and Cyber Weapons
    In: Christian Reuter: Information Technology for Peace and Security: IT Applications and Infrastructures in Conflicts, Crises, War, and Peace. Wiesbaden: Springer Fachmedien Wiesbaden, , 335–349. doi:10.1007/978-3-658-44810-3_16
    [BibTeX] [Abstract] [Download PDF]

    As cyber weapons and artificial intelligence technologies share the same technological foundation of bits and bytes, there is a strong trend of connecting both, thus addressing the imminent challenge of cyber weapons of processing, filtering and aggregating huge amounts of digital data in real time into decisions and actions. This chapter (This chapter is based on the chapter “Cyber Weapons and Artificial Intelligence: Impact, Influence and the Challenges for Arms Control” by Thomas Reinhold and Christian Reuter, published in 2022 in “Armament, Arms Control and Artificial Intelligence: The Janus-faced Nature of Machine Learning in the Military Realm” by Thomas Reinhold and Niklas Schörnig (Editors).) will analyse this development and highlight the increasing tendency towards artificial intelligence enabled autonomous decisions in defensive as well as offensive cyber weapons, the arising additional challenges for attributing cyber attacks and the problems for developing arms control measures for this technology fusion. However, the chapter also ventures an outlook how artificial intelligence methods can help to mitigate these challenges if applied for arms control measures itself.

    @incollection{reinhold_artificial_2024,address = {Wiesbaden},title = {Artificial {Intelligence} and {Cyber} {Weapons}},isbn = {978-3-658-44810-3},url = {https://link.springer.com/chapter/10.1007/978-3-658-44810-3_16},abstract = {As cyber weapons and artificial intelligence technologies share the same technological foundation of bits and bytes, there is a strong trend of connecting both, thus addressing the imminent challenge of cyber weapons of processing, filtering and aggregating huge amounts of digital data in real time into decisions and actions. This chapter (This chapter is based on the chapter “Cyber Weapons and Artificial Intelligence: Impact, Influence and the Challenges for Arms Control” by Thomas Reinhold and Christian Reuter, published in 2022 in “Armament, Arms Control and Artificial Intelligence: The Janus-faced Nature of Machine Learning in the Military Realm” by Thomas Reinhold and Niklas Schörnig (Editors).) will analyse this development and highlight the increasing tendency towards artificial intelligence enabled autonomous decisions in defensive as well as offensive cyber weapons, the arising additional challenges for attributing cyber attacks and the problems for developing arms control measures for this technology fusion. However, the chapter also ventures an outlook how artificial intelligence methods can help to mitigate these challenges if applied for arms control measures itself.},booktitle = {Information {Technology} for {Peace} and {Security}: {IT} {Applications} and {Infrastructures} in {Conflicts}, {Crises}, {War}, and {Peace}},publisher = {Springer Fachmedien Wiesbaden},author = {Reinhold, Thomas and Reuter, Christian},editor = {Reuter, Christian},year = {2024},doi = {10.1007/978-3-658-44810-3_16},pages = {335--349},}

    Publikationen in Konferenzbänden / Peer-reviewed Conference Papers

  • Gowri R. Chandran, Kilian Demuth, Kasra Edalatnejad, Sebastian Linsner, Christian Reuter, Thomas Schneider (2024)
    Encrypted MultiChannel Communication (EMC2): Johnny should use secret sharing
    23. Workshop on Privacy in the Electronic Society (WPES’24) Salt Lake City, USA. doi:10.1145/3689943.3695051
    [BibTeX] [Abstract] [Download PDF]

    Nowadays, the problem of point-to-point encryption is solved by the wide adaptation of protocols like TLS. However, challenges persist for End-to-End Encryption (E2EE). Current E2EE solutions, such as PGP and secure messengers like Signal, suffer from issues like 1) low usability, 2) small user base, 3) dependence on central service providers, and 4) susceptibility to backdoors. Concerns over legally mandated backdoors are rising as the US and EU are propos- ing new surveillance regulations requiring chat monitoring. We present a new E2EE solution called Encrypted MultiChannel Com- munication ( EMC2), based on 𝑛-out-of-𝑛 secret sharing. EMC2 splits messages into multiple secret shares and sends them through in- dependent channels. We show that multiple independent channels exist between users and EMC2 provides E2EE with no single point of trust, no setup, and is understandable by the general public. Our so- lution complements existing tools and strengthens the case against legally enforced backdoors by demonstrating their ineffectiveness.

    @inproceedings{chandran_encrypted_2024,address = {Salt Lake City, USA},title = {Encrypted {MultiChannel} {Communication} ({EMC2}): {Johnny} should use secret sharing},url = {https://dl.acm.org/doi/10.1145/3689943.3695051},doi = {10.1145/3689943.3695051},abstract = {Nowadays, the problem of point-to-point encryption is solved bythe wide adaptation of protocols like TLS. However, challengespersist for End-to-End Encryption (E2EE). Current E2EE solutions,such as PGP and secure messengers like Signal, suffer from issueslike 1) low usability, 2) small user base, 3) dependence on centralservice providers, and 4) susceptibility to backdoors. Concerns overlegally mandated backdoors are rising as the US and EU are propos-ing new surveillance regulations requiring chat monitoring. Wepresent a new E2EE solution called Encrypted MultiChannel Com-munication ( EMC2), based on 𝑛-out-of-𝑛 secret sharing. EMC2 splitsmessages into multiple secret shares and sends them through in-dependent channels. We show that multiple independent channelsexist between users and EMC2 provides E2EE with no single point oftrust, no setup, and is understandable by the general public. Our so-lution complements existing tools and strengthens the case againstlegally enforced backdoors by demonstrating their ineffectiveness.},booktitle = {23. {Workshop} on {Privacy} in the {Electronic} {Society} ({WPES}'24)},publisher = {ACM},author = {Chandran, Gowri R. and Demuth, Kilian and Edalatnejad, Kasra and Linsner, Sebastian and Reuter, Christian and Schneider, Thomas},month = oct,year = {2024},keywords = {UsableSec},pages = {34--39},}

  • Markus Bayer, Markus Neiczer, Maximilian Samsinger, Björn Buchhold, Christian Reuter (2024)
    XAI-Attack: Utilizing Explainable AI to Find Incorrectly Learned Patterns for Black-Box Adversarial Example Creation
    Proceedings of the 2024 Joint International Conference on Computational Linguistics, Language Resources and Evaluation (LREC-COLING) Torino, Italia.
    [BibTeX] [Abstract] [Download PDF]

    Adversarial examples, capable of misleading machine learning models into making erroneous predictions, pose significant risks in safety-critical domains such as crisis informatics, medicine, and autonomous driving. To counter this, we introduce a novel textual adversarial example method that identifies falsely learned word indicators by leveraging explainable AI methods as importance functions on incorrectly predicted instances, thus revealing and understanding the weaknesses of a model. Coupled with adversarial training, this approach guides models to adopt complex decision rules when necessary and simpler ones otherwise, enhancing their robustness. To evaluate the effectiveness of our approach, we conduct a human and a transfer evaluation and propose a novel adversarial training evaluation setting for better robustness assessment. While outperforming current adversarial example and training methods, the results also show our method’s potential in facilitating the development of more resilient transformer models by detecting and rectifying biases and patterns in training data, showing baseline improvements of up to 23 percentage points in accuracy on adversarial tasks. The code of our approach is freely available for further exploration and use.

    @inproceedings{bayer_xai-attack_2024,address = {Torino, Italia},title = {{XAI}-{Attack}: {Utilizing} {Explainable} {AI} to {Find} {Incorrectly} {Learned} {Patterns} for {Black}-{Box} {Adversarial} {Example} {Creation}},url = {https://aclanthology.org/2024.lrec-main.1542},abstract = {Adversarial examples, capable of misleading machine learning models into making erroneous predictions, pose significant risks in safety-critical domains such as crisis informatics, medicine, and autonomous driving. To counter this, we introduce a novel textual adversarial example method that identifies falsely learned word indicators by leveraging explainable AI methods as importance functions on incorrectly predicted instances, thus revealing and understanding the weaknesses of a model. Coupled with adversarial training, this approach guides models to adopt complex decision rules when necessary and simpler ones otherwise, enhancing their robustness. To evaluate the effectiveness of our approach, we conduct a human and a transfer evaluation and propose a novel adversarial training evaluation setting for better robustness assessment. While outperforming current adversarial example and training methods, the results also show our method's potential in facilitating the development of more resilient transformer models by detecting and rectifying biases and patterns in training data, showing baseline improvements of up to 23 percentage points in accuracy on adversarial tasks. The code of our approach is freely available for further exploration and use.},booktitle = {Proceedings of the 2024 {Joint} {International} {Conference} on {Computational} {Linguistics}, {Language} {Resources} and {Evaluation} ({LREC}-{COLING})},publisher = {ELRA and ICCL},author = {Bayer, Markus and Neiczer, Markus and Samsinger, Maximilian and Buchhold, Björn and Reuter, Christian},month = may,year = {2024},keywords = {Security, UsableSec, Projekt-ATHENE-CyAware, Projekt-CYLENCE, Ranking-CORE-A},pages = {17725--17738},}

  • Daniel EberzEder, Franz Kuntke, Christian Reuter, Ansgar Bernardi, Ahmad Kadi, Gerwin Brill, Daniel Martini, Benno Kleinhenz (2024)
    Hybrid Cloud Infrastrukturen – Edge Computing und KI-basierte Anwendungen in der Landwirtschaft für resiliente und effektive Produktions- und Biodiversitätsmaßnahmen
    44. GIL-Jahrestagung: Informatik in der Land-, Forst- und Ernährungswirtschaft .
    [BibTeX] [Abstract] [Download PDF]

    Mobile Erhebung semantisch modellierter Daten und deren Auswertung im Feld durch Hybrid Cloud Computing sind Grundlage des Resilienten Smart Farmings im Projekt GeoBox. Eine skalierbare Architektur und semantische Datenmodellierung ermöglichen Management betrieblicher Software-Container, flexible Anpassung an neue Aufgaben, und die Realisierung einfach nutzbarer externer Services, vorgestellt am Beispiel eines Resistenz-Beratungs-Chatbots und von Blühstreifen als Biodiversitätsmaßnahme.

    @inproceedings{eberz-eder_hybrid_2024,title = {Hybrid {Cloud} {Infrastrukturen} - {Edge} {Computing} und {KI}-basierte {Anwendungen} in der {Landwirtschaft} für resiliente und effektive {Produktions}- und {Biodiversitätsmaßnahmen}},url = {https://dl.gi.de/server/api/core/bitstreams/14f9629e-9e3e-4252-b9d5-b2c8016d9a01/content},abstract = {Mobile Erhebung semantisch modellierter Daten und deren Auswertung im Feld durch Hybrid Cloud Computing sind Grundlage des Resilienten Smart Farmings im Projekt GeoBox. Eine skalierbare Architektur und semantische Datenmodellierung ermöglichen Management betrieblicher Software-Container, flexible Anpassung an neue Aufgaben, und die Realisierung einfach nutzbarer externer Services, vorgestellt am Beispiel eines Resistenz-Beratungs-Chatbots und von Blühstreifen als Biodiversitätsmaßnahme.},booktitle = {44. {GIL}-{Jahrestagung}: {Informatik} in der {Land}-, {Forst}- und {Ernährungswirtschaft}},publisher = {Gesellschaft für Informatik},author = {Eberz-Eder, Daniel and Kuntke, Franz and Reuter, Christian and Bernardi, Ansgar and Kadi, Ahmad and Brill, Gerwin and Martini, Daniel and Kleinhenz, Benno},year = {2024},keywords = {Projekt-AgriRegio, Projekt-GeoBox, RSF, Security, UsableSec},}

  • Marc-André Kaufhold, Thea Riebe, Markus Bayer, Christian Reuter (2024)
    ‚We Do Not Have the Capacity to Monitor All Media‘: A Design Case Study on Cyber Situational Awareness in Computer Emergency Response Teams
    Proceedings of the Conference on Human Factors in Computing Systems (CHI) (Best Paper Award) New York, NY, USA. doi:10.1145/3613904.3642368
    [BibTeX] [Abstract] [Download PDF]

    Computer Emergency Response Teams (CERTs) have been established in the public sector globally to provide advisory, preventive and reactive cybersecurity services for government agencies, citizens, and businesses. Nevertheless, their responsibility of monitoring, analyzing, and communicating cyber threats and security vulnerabilities have become increasingly challenging due to the growing volume and varying quality of information disseminated through public and social channels. Based on a design case study conducted from 2021 to 2023, this paper combines three iterations of expert interviews (N=25), design workshops (N=4) and cognitive walkthroughs (N=25) to design an automated, cross-platform and real-time cybersecurity dashboard. By adopting the notion of cyber situational awareness, the study further extracts user requirements and design heuristics for enhanced threat intelligence and mission awareness in CERTs, discussing the aspects of source integration, data management, customizable visualization, relationship awareness, information assessment, software integration, (inter-)organizational collaboration, and communication of stakeholder warnings.

    @inproceedings{kaufhold_we_2024,address = {New York, NY, USA},series = {{CHI} '24},title = {'{We} {Do} {Not} {Have} the {Capacity} to {Monitor} {All} {Media}': {A} {Design} {Case} {Study} on {Cyber} {Situational} {Awareness} in {Computer} {Emergency} {Response} {Teams}},isbn = {9798400703300},url = {https://peasec.de/paper/2024/2024_KaufholdRiebeBayerReuter_CertDesignCaseStudy_CHI.pdf},doi = {10.1145/3613904.3642368},abstract = {Computer Emergency Response Teams (CERTs) have been established in the public sector globally to provide advisory, preventive and reactive cybersecurity services for government agencies, citizens, and businesses. Nevertheless, their responsibility of monitoring, analyzing, and communicating cyber threats and security vulnerabilities have become increasingly challenging due to the growing volume and varying quality of information disseminated through public and social channels. Based on a design case study conducted from 2021 to 2023, this paper combines three iterations of expert interviews (N=25), design workshops (N=4) and cognitive walkthroughs (N=25) to design an automated, cross-platform and real-time cybersecurity dashboard. By adopting the notion of cyber situational awareness, the study further extracts user requirements and design heuristics for enhanced threat intelligence and mission awareness in CERTs, discussing the aspects of source integration, data management, customizable visualization, relationship awareness, information assessment, software integration, (inter-)organizational collaboration, and communication of stakeholder warnings.},booktitle = {Proceedings of the {Conference} on {Human} {Factors} in {Computing} {Systems} ({CHI}) ({Best} {Paper} {Award})},publisher = {Association for Computing Machinery},author = {Kaufhold, Marc-André and Riebe, Thea and Bayer, Markus and Reuter, Christian},year = {2024},keywords = {Security, UsableSec, HCI, Projekt-CYWARN, Projekt-ATHENE-CyAware, Projekt-CYLENCE, A-Paper, AuswahlKaufhold, AuswahlUsableSec, Ranking-CORE-A*, Selected},}

  • Katrin Hartwig, Tom Biselli, Franziska Schneider, Christian Reuter (2024)
    From Adolescents‘ Eyes: Assessing an Indicator-Based Intervention to Combat Misinformation on TikTok
    Proceedings of the Conference on Human Factors in Computing Systems (CHI) New York, NY, USA. doi:10.1145/3613904.3642264
    [BibTeX] [Abstract] [Download PDF]

    Misinformation poses a recurrent challenge for video-sharing platforms (VSPs) like TikTok. Obtaining user perspectives on digital interventions addressing the need for transparency (e.g., through indicators) is essential. This article offers a thorough examination of the comprehensibility, usefulness, and limitations of an indicator-based intervention from an adolescents’ perspective. This study (𝑁 = 39; aged 13-16 years) comprised two qualitative steps: (1) focus group discussions and (2) think-aloud sessions, where participants engaged with a smartphone-app for TikTok. The results offer new insights into how video-based indicators can assist adolescents’ assessments. The intervention received positive feedback, especially for its transparency, and could be applicable to new content. This paper sheds light on how adolescents are expected to be experts while also being prone to video-based misinformation, with limited understanding of an intervention’s limitations. By adopting teenagers’ perspectives, we contribute to HCI research and provide new insights into the chances and limitations of interventions for VSPs.

    @inproceedings{hartwig_adolescents_2024,address = {New York, NY, USA},series = {{CHI} '24},title = {From {Adolescents}' {Eyes}: {Assessing} an {Indicator}-{Based} {Intervention} to {Combat} {Misinformation} on {TikTok}},isbn = {9798400703300},url = {https://doi.org/10.1145/3613904.3642264},doi = {10.1145/3613904.3642264},abstract = {Misinformation poses a recurrent challenge for video-sharing platforms (VSPs) like TikTok. Obtaining user perspectives on digital interventions addressing the need for transparency (e.g., through indicators) is essential. This article offers a thorough examination of the comprehensibility, usefulness, and limitations of an indicator-based intervention from an adolescents’ perspective. This study (𝑁 = 39; aged 13-16 years) comprised two qualitative steps: (1) focus group discussions and (2) think-aloud sessions, where participantsengaged with a smartphone-app for TikTok. The results offer new insights into how video-based indicators can assist adolescents’ assessments. The intervention received positive feedback, especially for its transparency, and could be applicable to new content. This paper sheds light on how adolescents are expected to be experts while also being prone to video-based misinformation, with limited understanding of an intervention’s limitations. By adoptingteenagers’ perspectives, we contribute to HCI research and provide new insights into the chances and limitations of interventions for VSPs.},booktitle = {Proceedings of the {Conference} on {Human} {Factors} in {Computing} {Systems} ({CHI})},publisher = {Association for Computing Machinery},author = {Hartwig, Katrin and Biselli, Tom and Schneider, Franziska and Reuter, Christian},year = {2024},keywords = {Security, UsableSec, HCI, A-Paper, Ranking-CORE-A*, Selected, AuswahlCrisis, Projekt-ATHENE-PriVis, Projekt-NEBULA},}

  • Laura Guntrum (2024)
    Keyboard Fighters: The Use of ICTs by Activists in Times of Military Coup in Myanmar
    Proceedings of the CHI Conference on Human Factors in Computing Systems New York, NY, USA. doi:10.1145/3613904.3642279
    [BibTeX] [Abstract] [Download PDF]

    Amidst the ongoing anti-military protests in Myanmar since 2021, there is a noticeable research gap on ICT-supported activism. Generally, ICTs play an important role during political crises in conjunction with activists’ practices on the ground. Inspired by Resource Mobilization Theory, I conducted qualitative interviews (N=16) and a qualitative online survey (N=34), which demonstrate the intersection between analog and digital domains, showcasing the ingenuity of the activists, and the rapid adoption of ICTs in a country that has experienced a digital revolution within the last few years. As not all people were able to protest on-the-ground, they acted as keyboard fighters to organize protests, to share information, and to support the civil disobedience movement in Myanmar. The study identifies, inter alia, the need for better offline applications with wider coverage in times of internet shutdowns, applications that cannot be easily identified during physical controls, and providing free and secure VPN access.

    @inproceedings{guntrum_keyboard_2024,address = {New York, NY, USA},series = {{CHI} '24},title = {Keyboard {Fighters}: {The} {Use} of {ICTs} by {Activists} in {Times} of {Military} {Coup} in {Myanmar}},isbn = {9798400703300},url = {https://doi.org/10.1145/3613904.3642279},doi = {10.1145/3613904.3642279},abstract = {Amidst the ongoing anti-military protests in Myanmar since 2021, there is a noticeable research gap on ICT-supported activism. Generally, ICTs play an important role during political crises in conjunction with activists’ practices on the ground. Inspired by Resource Mobilization Theory, I conducted qualitative interviews (N=16) and a qualitative online survey (N=34), which demonstrate the intersection between analog and digital domains, showcasing the ingenuity of the activists, and the rapid adoption of ICTs in a country that has experienced a digital revolution within the last few years. As not all people were able to protest on-the-ground, they acted as keyboard fighters to organize protests, to share information, and to support the civil disobedience movement in Myanmar. The study identifies, inter alia, the need for better offline applications with wider coverage in times of internet shutdowns, applications that cannot be easily identified during physical controls, and providing free and secure VPN access.},booktitle = {Proceedings of the {CHI} {Conference} on {Human} {Factors} in {Computing} {Systems}},publisher = {Association for Computing Machinery},author = {Guntrum, Laura},year = {2024},keywords = {Peace, Projekt-TraCe, HCI, A-Paper, Ranking-CORE-A*, Selected, Projekt-ATHENE},}

  • Florentin Putz, Steffen Haesler, Thomas Völkl, Maximilian Gehring, Nils Rollshausen, Matthias Hollick (2024)
    PairSonic: Helping Groups Securely Exchange Contact Information
    CSCW ’24 Companion: Conference Companion Publication of the 2024 on Computer Supported Cooperative Work and Social Computing . doi:10.1145/3678884.3681818
    [BibTeX] [Abstract] [Download PDF]

    Securely exchanging contact information is essential for establishing trustworthy communication channels that facilitate effective online collaboration. However, current methods are neither user-friendly nor scalable for large groups of users. In response, we introduce PairSonic, a novel group pairing protocol that extends trust from physical encounters to online communication. PairSonic simplifies the pairing process by automating the tedious verification tasks of previous methods through an acoustic out-of-band channel using smartphones‘ built-in hardware. Our protocol not only facilitates connecting users for computer-supported collaboration, but also provides a more user-friendly and scalable solution to the authentication ceremonies currently used in end-to-end encrypted messengers like Signal or WhatsApp. PairSonic is available as open-source software: github.com/seemoo-lab/pairsoni

    @inproceedings{putz_pairsonic_2024,title = {{PairSonic}: {Helping} {Groups} {Securely} {Exchange} {Contact} {Information}},url = {https://dl.acm.org/doi/10.1145/3678884.3681818},doi = {10.1145/3678884.3681818},abstract = {Securely exchanging contact information is essential for establishing trustworthy communication channels that facilitate effective online collaboration. However, current methods are neither user-friendly nor scalable for large groups of users. In response, we introduce PairSonic, a novel group pairing protocol that extends trust from physical encounters to online communication. PairSonic simplifies the pairing process by automating the tedious verification tasks of previous methods through an acoustic out-of-band channel using smartphones' built-in hardware. Our protocol not only facilitates connecting users for computer-supported collaboration, but also provides a more user-friendly and scalable solution to the authentication ceremonies currently used in end-to-end encrypted messengers like Signal or WhatsApp. PairSonic is available as open-source software: https://github.com/seemoo-lab/pairsonic},booktitle = {{CSCW} '24 {Companion}: {Conference} {Companion} {Publication} of the 2024 on {Computer} {Supported} {Cooperative} {Work} and {Social} {Computing}},author = {Putz, Florentin and Haesler, Steffen and Völkl, Thomas and Gehring, Maximilian and Rollshausen, Nils and Hollick, Matthias},year = {2024},note = {Place: San Jose, Costa Rica},keywords = {Security, UsableSec, HCI, Projekt-emergenCITY},}

  • Katrin Hartwig, Tom Biselli, Franziska Schneider, Christian Reuter (2024)
    NEBULA: Nutzerzentrierte KI-basierte Erkennung von Fake News und Fehlinformationen
    Aktuelle Themen und Herausforderungen behördlicher Risikokommunikation – Tagungsband München.
    [BibTeX] [Abstract] [Download PDF]

    Die Verbreitung falscher und irreführender Informationen – insbesondere über soziale Medien wie TikTok, Twitter, Facebook und Co. – nehmen eine immer größer werdende Relevanz in sicherheitsrelevanten Situationen ein. Gerade im Kontext des russischen Angriffskrieges gegen die Ukraine spielen derartige Plattformen eine besondere Rolle, indem gefälschte Videos oder Inhalte mit falscher zeitlicher Einordnung in kürzester Zeit viral gehen und somit das Potential für Verunsicherung und Meinungsmanipulation bergen. Problematisch sind dabei nicht nur absichtliche, sondern auch unabsichtlich irreführende Informationen. Ziel des interdisziplinären BMBF-Projekts NEBULA (Laufzeit: 1.7.2022-30.6.2025) ist die transparente, KI- basierte Erkennung von Falsch- und Fehlinformationen in sicherheitsrelevanten Situationen sowie die zielgruppengerechte Darstellung der Detektionsergebnisse zur Förderung der Medienkompetenz. Die nutzerzentrierten Ansätze adressieren dabei sowohl Behörden und Organisationen mit Sicherheitsaufgaben (BOS) in der akkuraten Lagebilderstellung und Krisenkommunikation, als auch vulnerable Personengruppen durch partizipative Entwicklung von technischen Unterstützungswerkzeugen. Innerhalb des Projekts entstehen Demonstratoren in Form von Smartphone-Apps, Browser-Plugins und Webanwendungen, um Einzelpersonen und Behörden dazu zu befähigen, Falsch- und Fehlinformationen eigenständig kritisch zu reflektieren und Umgangsstrategien zur Informationseinordnung anzueignen.

    @inproceedings{hartwig_nebula_2024,address = {München},title = {{NEBULA}: {Nutzerzentrierte} {KI}-basierte {Erkennung} von {Fake} {News} und {Fehlinformationen}},url = {https://peasec.de/paper/2024/2024_HartwigBiselliSchneiderReuter_NEBULA_BfSTagungsband.pdf},abstract = {Die Verbreitung falscher und irreführender Informationen – insbesondere über soziale Medien wie TikTok,Twitter, Facebook und Co. – nehmen eine immer größer werdende Relevanz in sicherheitsrelevantenSituationen ein. Gerade im Kontext des russischen Angriffskrieges gegen die Ukraine spielen derartigePlattformen eine besondere Rolle, indem gefälschte Videos oder Inhalte mit falscher zeitlicher Einordnungin kürzester Zeit viral gehen und somit das Potential für Verunsicherung und Meinungsmanipulationbergen. Problematisch sind dabei nicht nur absichtliche, sondern auch unabsichtlich irreführendeInformationen.Ziel des interdisziplinären BMBF-Projekts NEBULA (Laufzeit: 1.7.2022-30.6.2025) ist die transparente, KI-basierte Erkennung von Falsch- und Fehlinformationen in sicherheitsrelevanten Situationen sowie diezielgruppengerechte Darstellung der Detektionsergebnisse zur Förderung der Medienkompetenz. Dienutzerzentrierten Ansätze adressieren dabei sowohl Behörden und Organisationen mit Sicherheitsaufgaben(BOS) in der akkuraten Lagebilderstellung und Krisenkommunikation, als auch vulnerable Personengruppendurch partizipative Entwicklung von technischen Unterstützungswerkzeugen. Innerhalb des Projektsentstehen Demonstratoren in Form von Smartphone-Apps, Browser-Plugins und Webanwendungen, umEinzelpersonen und Behörden dazu zu befähigen, Falsch- und Fehlinformationen eigenständig kritisch zureflektieren und Umgangsstrategien zur Informationseinordnung anzueignen.},booktitle = {Aktuelle {Themen} und {Herausforderungen} behördlicher {Risikokommunikation} - {Tagungsband}},publisher = {Bundesamt für Strahlenschutz},author = {Hartwig, Katrin and Biselli, Tom and Schneider, Franziska and Reuter, Christian},year = {2024},keywords = {Crisis, Projekt-NEBULA},}

  • Julian Bäumler, Marc-André Kaufhold, Georg Voronin, Christian Reuter (2024)
    Towards an Online Hate Speech Classification Scheme for German Law Enforcement and Reporting Centers: Insights from Research and Practice
    Mensch und Computer 2024 – Workshopband Karlsruhe, Germany. doi:10.18420/muc2024-mci-ws13-124
    [BibTeX] [Abstract] [Download PDF]

    In Germany, both law enforcement agencies and dedicated reporting centers engage in various activities to counter illegal online hate speech. Due to the high volume of such content and against the background of limited resources, their personnel can be confronted with the issue of information overload. To mitigate this issue, technologies for information filtering, classification, prioritization, and visualization offer great potential. However, domainspecific classification schemes that differentiate subtypes of online hate speech are a prerequisite for the development of such assistive tools. There is a gap in research with regard to an empirically substantiated classification scheme for subtypes of hate speech for the German law enforcement and reporting center domain. Based on a review of relevant computer science publications (N=24) and qualitative interviews with practitioners (N=18), this work investigates practice-relevant subtypes of hate speech and finds that it is primarily differentiated with regard to targeted group affiliations, the conveyance of an immediate security threat, and criminal relevance. It contributes to the state of research with an empirically grounded online hate speech classification scheme for German law enforcement agencies and reporting centers (C1) and five implications for the user-centered design of hate speech classification tools (C2).

    @inproceedings{baumler_towards_2024,address = {Karlsruhe, Germany},title = {Towards an {Online} {Hate} {Speech} {Classification} {Scheme} for {German} {Law} {Enforcement} and {Reporting} {Centers}: {Insights} from {Research} and {Practice}},url = {https://dl.gi.de/items/2fa0ec97-d562-41d2-bab9-0b0539432c87},doi = {10.18420/muc2024-mci-ws13-124},abstract = {In Germany, both law enforcement agencies and dedicated reporting centers engage in various activities to counter illegal online hate speech. Due to the high volume of such content and against the background of limited resources, their personnel can be confronted with the issue of information overload. To mitigate this issue, technologies for information filtering, classification, prioritization, and visualization offer great potential. However, domainspecific classification schemes that differentiate subtypes of online hate speech are a prerequisite for the development of such assistive tools. There is a gap in research with regard to an empirically substantiated classification scheme for subtypes of hate speech for the German law enforcement and reporting center domain. Based on a review of relevant computer science publications (N=24) and qualitative interviews with practitioners (N=18), this work investigates practice-relevant subtypes of hate speech and finds that it is primarily differentiated with regard to targeted group affiliations, the conveyance of an immediate security threat, and criminal relevance. It contributes to the state of research with an empirically grounded online hate speech classification scheme for German law enforcement agencies and reporting centers (C1) and five implications for the user-centered design of hate speech classification tools (C2).},language = {en},booktitle = {Mensch und {Computer} 2024 - {Workshopband}},publisher = {Gesellschaft für Informatik e.V.},author = {Bäumler, Julian and Kaufhold, Marc-André and Voronin, Georg and Reuter, Christian},year = {2024},keywords = {UsableSec, HCI, Projekt-ATHENE-CyAware, Projekt-CYLENCE},}

  • Marc-André Kaufhold, Julian Bäumler, Nicolai Koukal, Christian Reuter (2024)
    Towards a Security Advisory Content Retrieval and Extraction System for Computer Emergency Response Teams
    Mensch und Computer 2024 – Workshopband Karlsruhe, Germany. doi:10.18420/muc2024-mci-ws13-133
    [BibTeX] [Abstract] [Download PDF]

    Computer Emergency Response Teams provide advisory, preventive, and reactive cybersecurity services for authorities, citizens, and businesses. However, their responsibility of establishing cyber situational awareness by monitoring and analyzing security advisories and vulnerabilities has become challenging due to the growing volume of information disseminated through public channels. Thus, this paper presents the preliminary design of a system for automatically retrieving and extracting security advisory documents from Common Security Advisory Framework (CSAF), HTML, and RSS sources. The evaluation with various security advisory sources (N=53) shows that the developed system can retrieve 90\% of the published advisory documents, which is a significant improvement over systems only relying on the retrieval from RSS feeds (30\%).

    @inproceedings{kaufhold_towards_2024,address = {Karlsruhe, Germany},title = {Towards a {Security} {Advisory} {Content} {Retrieval} and {Extraction} {System} for {Computer} {Emergency} {Response} {Teams}},url = {https://dl.gi.de/items/6ee00080-4245-44c0-ae9c-1a9cdea7fa3a},doi = {10.18420/muc2024-mci-ws13-133},abstract = {Computer Emergency Response Teams provide advisory, preventive, and reactive cybersecurity services for authorities, citizens, and businesses. However, their responsibility of establishing cyber situational awareness by monitoring and analyzing security advisories and vulnerabilities has become challenging due to the growing volume of information disseminated through public channels. Thus, this paper presents the preliminary design of a system for automatically retrieving and extracting security advisory documents from Common Security Advisory Framework (CSAF), HTML, and RSS sources. The evaluation with various security advisory sources (N=53) shows that the developed system can retrieve 90\% of the published advisory documents, which is a significant improvement over systems only relying on the retrieval from RSS feeds (30\%).},language = {en},booktitle = {Mensch und {Computer} 2024 - {Workshopband}},publisher = {Gesellschaft für Informatik e.V.},author = {Kaufhold, Marc-André and Bäumler, Julian and Koukal, Nicolai and Reuter, Christian},year = {2024},keywords = {UsableSec, HCI, Projekt-ATHENE-CyAware, Projekt-CYLENCE},}

  • Marc-André Kaufhold, Tilo Mentler, Simon Nestler, Christian Reuter (2024)
    11. Workshop Mensch-Maschine-Interaktion in sicherheitskritischen Systemen
    Mensch und Computer 2024 – Workshopband Karlsruhe, Germany. doi:10.18420/muc2024-mci-ws13-101
    [BibTeX] [Abstract] [Download PDF]

    Im Zentrum dieses Workshops steht die Interaktion von Mensch und Technik in sicherheitskritischen Kontexten. Hierzu zählen Bereiche, die bereits seit Jahrzehnten Gegenstand der Forschung sind (z.B. Prozessführung in Leitwarten), aber auch aktuelle Herausforderungen (z.B. Social Media im Katastrophenschutz). In diesen und vielen weiteren Bereichen gilt, dass sichere Systemzustände nur durch die ganzheitliche Betrachtung von Mensch, Technik und Organisation gewährleistet bzw. schnellstmöglich wieder erreicht werden können. In diesem Zusammenhang ist der Workshop auch der Nutzbarkeit und Akzeptanz von Sicherheitskonzepten sowie einer bewussteren Auseinandersetzung der Nutzenden mit diesem Thema gewidmet.

    @inproceedings{kaufhold_11_2024,address = {Karlsruhe, Germany},title = {11. {Workshop} {Mensch}-{Maschine}-{Interaktion} in sicherheitskritischen {Systemen}},url = {https://dl.gi.de/items/6a526522-0cbf-4672-af8d-d7580cf97f92},doi = {10.18420/muc2024-mci-ws13-101},abstract = {Im Zentrum dieses Workshops steht die Interaktion von Mensch und Technik in sicherheitskritischen Kontexten. Hierzu zählen Bereiche, die bereits seit Jahrzehnten Gegenstand der Forschung sind (z.B. Prozessführung in Leitwarten), aber auch aktuelle Herausforderungen (z.B. Social Media im Katastrophenschutz). In diesen und vielen weiteren Bereichen gilt, dass sichere Systemzustände nur durch die ganzheitliche Betrachtung von Mensch, Technik und Organisation gewährleistet bzw. schnellstmöglich wieder erreicht werden können. In diesem Zusammenhang ist der Workshop auch der Nutzbarkeit und Akzeptanz von Sicherheitskonzepten sowie einer bewussteren Auseinandersetzung der Nutzenden mit diesem Thema gewidmet.},language = {de},booktitle = {Mensch und {Computer} 2024 - {Workshopband}},publisher = {Gesellschaft für Informatik e.V.},author = {Kaufhold, Marc-André and Mentler, Tilo and Nestler, Simon and Reuter, Christian},year = {2024},keywords = {Security, UsableSec, HCI, Projekt-CYLENCE},}

  • Sarah Rüller, KonstantinKostaAal, Laura Guntrum, Reem Talhouk, Shaimaa Lazem, Volker Wulf, Dave Randall (2024)
    The Collaboration Paradox: Confronting Colonial Legacies in South-North Projects
    Companion Publication of the 2024 Conference on Computer-Supported Cooperative Work and Social Computing New York, NY, USA. doi:10.1145/3678884.3687138
    [BibTeX] [Abstract] [Download PDF]

    This special interest group invites participants to critically examine the complex interplay between interventionist Information and Communication Technology (ICT) projects and (historical) contexts of conflict and colonialism. It aims to open conversations on the multitude of challenges, barriers, and lessons learned around South-North collaborations, particularly in contexts with a colonial past and present, including researchers and research participants safety, data „security“, applied ethics, and methodologies. This SIG aims at jointly developing ideas on how we, as academic researchers, can navigate and reframe the power dynamics inherent in global South-North collaborations.

    @inproceedings{ruller_collaboration_2024,address = {New York, NY, USA},series = {{CSCW} {Companion} '24},title = {The {Collaboration} {Paradox}: {Confronting} {Colonial} {Legacies} in {South}-{North} {Projects}},isbn = {9798400711145},url = {https://doi.org/10.1145/3678884.3687138},doi = {10.1145/3678884.3687138},abstract = {This special interest group invites participants to critically examine the complex interplay between interventionist Information and Communication Technology (ICT) projects and (historical) contexts of conflict and colonialism. It aims to open conversations on the multitude of challenges, barriers, and lessons learned around South-North collaborations, particularly in contexts with a colonial past and present, including researchers and research participants safety, data "security", applied ethics, and methodologies. This SIG aims at jointly developing ideas on how we, as academic researchers, can navigate and reframe the power dynamics inherent in global South-North collaborations.},booktitle = {Companion {Publication} of the 2024 {Conference} on {Computer}-{Supported} {Cooperative} {Work} and {Social} {Computing}},publisher = {Association for Computing Machinery},author = {Rüller, Sarah and Aal, Konstantin "Kosta" and Guntrum, Laura and Talhouk, Reem and Lazem, Shaimaa and Wulf, Volker and Randall, Dave},year = {2024},note = {event-place: San Jose, Costa Rica},keywords = {Peace, Projekt-TraCe},pages = {669--671},}

    Weitere Publikationen / Other Publications

  • Christian Reuter, Thea Riebe, Laura Guntrum (2024)
    ​​Technologie und die Transformation Politischer Gewalt
    Wissenschaft und Frieden: 2024.
    [BibTeX] [Abstract] [Download PDF]

    Die Konferenz Science · Peace · Security ’23 fand vom 20. bis 22. September 2023 an der Technischen Universität Darmstadt statt. Sie widmete sich dem Wandel von Technologien, deren Rolle in Kriegen und Konflikten sowie Fragen der Rüstungskontrolle. Ausgerichtet wurde die englischsprachige Konferenz von TraCe, einem hessischen BMBF-Forschungsverbund zu Transformationen politischer Gewalt, vom DFG-Sonderforschungsbereich CROSSING zu kryptografiebasierten Sicherheitslösungen und vom Forschungsverbund Naturwissenschaft, Abrüstung und internationale Sicherheit FONAS. Der Krieg Russlands gegen die Ukraine macht die Bedeutung der Friedens- und Konfliktforschung und deren technische Dimension, unter anderem, offensichtlich. Bereits 2019 hat der Wissenschaftsrat als wichtigstes wissenschaftspolitisches Beratungsgremium in Deutschland seine Empfehlungen zur Weiterentwicklung der Friedens- und Konfliktforschung veröffentlicht. Darin weist er auf einen dringenden Handlungsbedarf zur Stärkung der naturwissenschaftlich-technischen Friedens- und Konfliktforschung hin. Die Konferenzreihe Science · Peace · Security möchte einen kleinen Beitrag dazu leisten. Sie wurde 2019 in Darmstadt gegründet, fand 2021 an der RWTH Aachen statt, und soll 2025 am Forschungszentrum Jülich stattfinden.

    @techreport{reuter_technologie_2024,address = {Wissenschaft und Frieden},title = {​​{Technologie} und die {Transformation} {Politischer} {Gewalt}},url = {http://www.peasec.de/paper/2024/2024_ReuterRiebeGuntrum_TechnologieTransformationPolitischeGewalt_WundF.pdf},abstract = {Die Konferenz Science · Peace · Security ’23 fand vom 20. bis 22. September 2023 an der Technischen Universität Darmstadt statt. Sie widmete sich dem Wandel von Technologien, deren Rolle in Kriegen und Konflikten sowie Fragen der Rüstungskontrolle. Ausgerichtet wurde die englischsprachige Konferenz von TraCe, einem hessischen BMBF-Forschungsverbund zu Transformationen politischer Gewalt, vom DFG-Sonderforschungsbereich CROSSING zu kryptografiebasierten Sicherheitslösungen und vom Forschungsverbund Naturwissenschaft, Abrüstung und internationale Sicherheit FONAS.Der Krieg Russlands gegen die Ukraine macht die Bedeutung der Friedens- und Konfliktforschung und deren technische Dimension, unter anderem, offensichtlich. Bereits 2019 hat der Wissenschaftsrat als wichtigstes wissenschaftspolitisches Beratungsgremium in Deutschland seine Empfehlungen zur Weiterentwicklung der Friedens- und Konfliktforschung veröffentlicht. Darin weist er auf einen dringenden Handlungsbedarf zur Stärkung der naturwissenschaftlich-technischen Friedens- und Konfliktforschung hin. Die Konferenzreihe Science · Peace · Security möchte einen kleinen Beitrag dazu leisten. Sie wurde 2019 in Darmstadt gegründet, fand 2021 an der RWTH Aachen statt, und soll 2025 am Forschungszentrum Jülich stattfinden.},author = {Reuter, Christian and Riebe, Thea and Guntrum, Laura},year = {2024},keywords = {Peace, Projekt-TraCe},}

  • Christian Reuter, Jonas Franken, Thomas Reinhold, Philipp Kuehn, Marc-André Kaufhold, Thea Riebe, Katrin Hartwig, Tom Biselli, Stefka Schmid, Laura Guntrum, Steffen Haesler (2024)
    Informatik für den Frieden: Perspektive von PEASEC zu 40 Jahren FIfF
    FIfF-Kommunikation: 2024.
    [BibTeX] [Abstract] [Download PDF]

    Fortschritte in Wissenschaft und Technik, besonders der Informatik, spielen im Kontext von Frieden und Sicherheit eine essenzielle Rolle. Der Lehrstuhl Wissenschaft und Technik für Frieden und Sicherheit (PEASEC) an der Technischen Universität Darmstadt verbindet Informatik mit Friedens-, Konflikt- und Sicherheitsforschung.

    @techreport{reuter_informatik_2024,address = {FIfF-Kommunikation},title = {Informatik für den {Frieden}: {Perspektive} von {PEASEC} zu 40 {Jahren} {FIfF}},url = {https://peasec.de/paper/2024/2024_Reuteretal_InformatikFuerFrieden_fiff.pdf},abstract = {Fortschritte in Wissenschaft und Technik, besonders der Informatik, spielen im Kontext von Frieden und Sicherheit eine essenzielle Rolle. Der Lehrstuhl Wissenschaft und Technik für Frieden und Sicherheit (PEASEC) an der Technischen Universität Darmstadt verbindet Informatik mit Friedens-, Konflikt- und Sicherheitsforschung.},author = {Reuter, Christian and Franken, Jonas and Reinhold, Thomas and Kuehn, Philipp and Kaufhold, Marc-André and Riebe, Thea and Hartwig, Katrin and Biselli, Tom and Schmid, Stefka and Guntrum, Laura and Haesler, Steffen},year = {2024},keywords = {Peace, Security},}

    #6 #7 #9

    As most of you know, I recently completed a draft of my book. But I’m still struggling to come up with a title. Commenters on the linked post had some good advice and suggestions. But I didn’t come away with anything I was entirely satisfied with. I’m now leaning away from calling it “Dynamic Ecology,” because that title doesn’t convey what the book is about, and because you can get just as much marketing value by putting the phrase “Founder of the Dynamic Ecology blog” below my name on the book cover.

    So I decided to give AI a crack at the title. I gave Claude 3.5 Sonnet the introduction of my book, the chapter list, and the following prompt:

    Please suggest some titles for a book I have written. The book is about how ecologists can better harness their diverse goals, ideas, and approaches, in order to better advance the science of ecology. To help you, I have provided the introduction to the book, and the table of contents.

    Here are Claude’s suggestions for my book title:

    1. “Embracing Ecological Diversity: Harnessing Different Approaches for a Stronger Science”
    2. “The Polyglot Nature of Ecology: Leveraging Diversity to Advance the Field”
    3. “Ecology’s Strength in Variety: Unifying Diverse Approaches for Scientific Progress”
    4. “The Ecology of Ecologists: Cultivating Diversity in Research and Practice”
    5. “Many Paths, One Forest: Navigating the Diverse Landscape of Ecological Research”
    6. “Unified in Disunity: How Ecological Diversity Drives Scientific Discovery”
    7. “The Ecological Mosaic: Celebrating and Harnessing Diverse Approaches in Science”
    8. “Beyond the Disunified Mess: Leveraging Ecological Diversity for Scientific Advancement”
    9. “Complementary Ecology: Thriving on Diverse Goals, Ideas, and Approaches”
    10. “The Ecology of Ideas: Fostering Diversity for a Robust Science”

    These titles aim to capture the main themes of your book: the diversity within ecology, the strength that comes from this diversity, and the potential for advancing the field by harnessing different approaches. They also reflect the positive stance you’ve taken towards the “disunified mess” of ecology, presenting it as a feature rather than a bug.

    Overall, this is a pretty good list of suggestions!

    Ok, they’re not all good. #1 is a bad title (the subtitle is fine), because it makes the book sound like it’s a conventional book about the value of biodiversity. #2 and #8 are bad titles based on phrases from the Introduction. #9 is bad because it identifies the whole book with just one of the ideas in the book (the idea of complementarity). #3 is bad because it’s awkward and boring.

    But the other five are pretty good! Some are better than pretty good. In particular, #4 and #6 have a lot of promise, I think. They’re both recursive or self-referential titles, which is a style of title Peter Adler suggested in a comment on my previous post. I liked that suggestion at the time, but had been struggling to think of a title that actually implemented it. And #10 could be modified to make it recursive. Something like “The Ecology of Ecological Ideas.” #5 and #7 are good too, though they have the disadvantage that neither metaphor (forest paths or mosaics) occurs in the book.

    The subtitles are decent overall. Some are better than others. But even the best ones are merely on a par with subtitles I’ve come up with already. It’s the title I need help with, not the subtitle.

    What do you think? Take the poll below!

    https://dynamicecology.wordpress.com/2024/09/05/ai-generated-titles-for-my-book/

    #1 #10 #2 #3 #4 #5 #6 #7 #8 #9

    2024-07-24
    #7: Digital gardening didn't work for me, getting serious about writing, and my new role tjpalanca.com
    2024-07-14
    50 Ideas for Blog Posts by Lou Plummer #7 mandarismoore.com
    Medinetz Halle /Saale e.V.fediverse@www.medinetz-halle.de
    2024-07-01

    Stellungnahme zur Einführung der „Bezahlkarte“ und weiteren Änderungen des Asylbewerberleistungsgesetz (AsylbLG)

    In Deutschland unterliegen Personen, die Leistungen nach dem Asylbewerberleistungsgesetz (AsylblG) erhalten, bereits seit Einführung des so genannten „Rückführungsverbesserungsgesetzes“ im Februar 2024 verlängerten Leistungseinschränkungen in der Gesundheitsversorgung. Nun sollen sie durch eine weitere Änderung des AsylbLG zudem mit einer Bezahlkarte gegängelt werden, die ihnen unter Anderem das Abheben von Bargeld oberhalb einer festgelegten Grenze unmöglich macht.

    Das stellt eine massive Teilhabeeinschränkung und Diskriminierung von Asylbewerber*innen dar.

    Als Begründung für die Einführung der Bezahlkarte werden populistische Narrative genutzt, wie Geflüchtete würden Unsummen an Sozialleistungen in ihre Herkunftsländer überweisen. Belastbare Zahlen liegen hierzu nicht vor. Einige Städte und Kommunen haben mit der Einführung der Bezahlkarte bereits begonnen; bis zum Spätsommer 2024 könnten bundesweit alle Geflüchteten eine Bezahlkarte anstatt Bargeld oder Überweisungen der Leistungen auf ihr Konto erhalten. Der Gesetzgeber überlässt die Entscheidung über die tatsächliche Einführung den jeweiligen Leistungsbehörden. Zu erwarten ist dabei, dass sich Landkreise und Kommunen, die das AsylbLG bereits besonders restriktiv und diskriminierend anwenden, für eine verschärfte Auslegung des Bezahlkartensystems entscheiden werden. Sie können beispielsweise festlegen, die Nutzung der Karte regional zu begrenzen und nur Einkaufsmöglichkeiten bei bestimmten Handelsunternehmen zu akzeptieren. In Deutschland, einem Land, das noch in großen Teilen auf Bargeldnutzung fußt, bedeutet das eine Eingrenzung des Konsumverhaltens. Flohmärkte, der Einkauf in Läden ohne Kartenzahlung und Privatkäufe werden quasi unmöglich, genauso wie die Partizipation an Unternehmungen, die außerhalb des zugelassenen Postleitzahl-Bereichs liegen. Handyverträge abschließen, Mietzahlungen tätigen oder das Abonnements von ÖPNV-Tickets können, je nach kommunaler Regelung, ebenfalls schwierig oder unmöglich werden, da Überweisungen eingeschränkt werden können.
    Dies führt zu einer weiteren Prekarisierung, Ausschluss von gesellschaftlicher Teilhabe, Integrationshindernissen und Armut. Seit Jahrzehnten ist bekannt, dass diese sozialen Determinanten krank machen.

    Zuletzt hatte sich im Februar mit der Verabschiedung des „Rückführungsverbesserungsgesetzes“ der Bezugszeitraum der eingeschränkten Gesundheits- und Sozialleistungen für Asylbewerber*innen auf 36 Monate verdoppelt. So lange müssen Geflüchtete inzwischen warten, um Leistungen der Gesundheitsversorgung in Anspruch nehmen zu können. In der Zwischenzeit haben sie nur Zugang zu eingeschränkten Leistungen. Erkrankungen werden so später erkannt und behandelt, akute Krankheitsproblematiken chronifizieren zum Teil. Schwere Krankheitsverläufe, vermehrte Notaufnahmebesuche, mehr und längere Krankenhausaufenthalte und aufwändigere Diagnostik und Therapien werden die Konsequenz sein. Es ist bekannt, dass illegalisierte, geflüchtete und migrierte Menschen sowie Menschen ohne Krankenversicherung, egal welcher Generation, schon im Moment schlechter gesundheitlich versorgt und betroffen von Armut sind. Dies erhöht die Wahrscheinlichkeit schwerer zu erkranken und früher zu versterben. Zusätzlich führt dies zu einer Zunahme an Verwaltungsaufwand und damit einhergehenden Kosten für die Behörden. Auch für ein Gesundheitssystem, das spätestens seit der Coronapandemie ächzt, wird dies zu einer weiteren Qualitätsverschlechterung und Unterversorgung für alle führen.

    Die politische Unerwünschtheit einer Verbesserung der gesundheitlichen Situation geflüchteter Menschen und das freimütige Annehmen und Vorantreiben menschenverachtender und rassistischer Maßnahmen gegen sie, mit dem Ziel rechte Politik und Wahlkampfrhetorik zu befrieden, entsetzt uns. Während uns jahrelang von staatlicher und behördlicher Seite versichert wurde, über nicht genug finanzielle Mittel zu verfügen, um die Situation verbessern zu können, melden Städte und Landkreise sich nun freiwillig und kurzsichtig für Testläufe mit Bezahlkarten. Und im nächsten Atemzug wird von Stimmen der CDU und FDP die Frage aufgeworfen, was gegen die Einführung der Bezahlkarte auch für andere Personengruppen spricht, die staatliche Leistungen beziehen. Die systematische Aushebelung von Menschen- und Grundrechten verurteilen wir scharf.

    Medibüros und Medinetze im ganzen Bundesgebiet setzen sich seit über zehn Jahren für die Einführung einer elektronischen Gesundheitskarte (eGK) für Alle ein, um die faktische Gesundheitsversorgung von Asylbewerber*innen endlich an ihren menschenrechtlichen Anspruch anzupassen. Mit den diesjährigen Änderungen des AsylbLG sind stattdessen ausschließlich Rückschritte und Verschlechterungen beschlossen worden.

    Wir finden: Es wurde die falsche Karte eingeführt! Für die bundesweite Einführung einer obligatorischen elektronischen Gesundheitskarte (eGK) gibt es bereits funktionierende Vorbilder und belastbare Evaluationen, die eine verbesserte Versorgung sowie entstehende Kosteneinsparungen für die Länder belegen. Beispielhaft war dies bereits bei der schnellen und unbürokratischen Handhabe für Ukrainer*innen, die bereits nach wenigen Monaten eine Chipkarte und vollen Leistungsanspruch erhielten, sichtbar. Die Bezahlkarte „gegen“ Geflüchtete verschärft hingegen Diskriminierung, schafft einen enormen behördlichen Mehraufwand und wird Verwaltungsprozesse chaotisieren.

    Die unterzeichnenden Medinetze und Medibüros fordern weiterhin die alternativlose Abschaffung des Asylbewerberleistungsgesetzes und der damit einhergehenden diskriminierenden Einschränkungen für Asylsuchende, sowie Gesundheitsleistungen für Geflüchtete wie im Leistungskatalog der gesetzlichen Krankenversicherung gesetzlich zu verankern.

    Wir fordern die Rücknahme der Bezahlkarten und ein absolutes Absehen weiterer Sanktionsmaßnahmen gegen geflüchtete Menschen und Menschen, die auf Transferleistungen aus welchen Gründen auch immer, angewiesen sind. Wir fordern ein klares Benennen rassistischer und rechtspopulistischer Narrative und eine deutliche Abgrenzung davon.

    Rechte Politik und Meinungsmache wird durch Gesetze und Maßnahmen, die sich gegen Geflüchtete oder arme Menschen richten, nicht befriedet, sondern weiter befeuert.

    Wir fordern ein solidarisches Handeln für und mit Menschen, die von Bezahlkarten betroffen sein werden: tauscht Gutscheine, die mit der Bezahlkarte erworben werden können, gegen Bargeld! Organisiert sichere Orte und überlegt euch gemeinsam Strategien, um die Bezahlkarte und ihre falschen Versprechungen zu widerlegen und auszuhöhlen!

    Mitgezeichnet von:

    Medinetz Magdeburg e.V.
    Medinetz Halle/Saale e.V.
    Medinetz Dresden e.V.
    Medinetz Rostock e.V.

    Medinetz Chemnitz e.V.
    Medinetz Leipzig e.V.
    Medinetz Jena e.V.

    https://www.medinetz-halle.de/es-wird-die-falsche-karte-eingefuehrt/

    #1 #10 #11 #2 #3 #4 #5 #6 #7 #8 #9

    2018-06-19

    I’m James Croft, and I work in ICT at TAFE Queensland in Brisbane, Australia.

    Recently I just worked on migrating all TAFE Queensland staff mailboxes to Exchange Online. It was a big job! Buy me a drink and ask me about it sometime.

    I also work on enabling Microsoft 365 apps & Teams within TAFE Queensland, and coordinate the statewide approach to training and user adoption in those systems.

    Previously I spent a number of years as a team lead managing the training and adoption for TAFE Queensland’s learning management system Connect (powered by D2L’s Brightspace Learning Environment).

    I’m a big fan of teaching new skills by doing, so I create a lot of tutorial videos. You can currently see a lot of my prior public-facing work over on our Connect YouTube channel.

    A final example of my work: I worked on the learning platform for the GC2018 Commonwealth Games. We used D2L’s Brightspace Learning Environment to train 15,000 skilled volunteers online, saving 1.8 million pieces of paper. Here’s a case study on the project.

    A handful of other side projects:

    Contact

    Want to get in touch?

    Email: shutout_00_tripod@icloud.com (note: this is an iCloud Hide My Email address)
    Instagram: @jamescroft
    LinkedIn: James Croft

    https://jamescroft.website/contact/

    #1 #10 #2 #3 #4 #5 #6 #7 #8 #9

    2023-12-07

    L’éducation fondée sur des preuves: arguments et débats

    L’éducation fondée sur des preuves est souvent mal connue et mal comprise. Ce n’est pas une théorie de l’éducation, ni une politique éducative particulière. C’est juste l’application de la démarche scientifique usuelle aux questions relatives aux pratiques pédagogiques et aux politiques éducatives.

    Conséquence de ces malentendus, de nombreuses personnes se sentent obligées de critiquer l’éducation fondée sur des preuves, et fournissent des arguments censés la réfuter. J’ai recensé 22 de ces arguments que j’ai régulièrement entendus, et je donne ci-dessous mes réponses. Par rapport au feuilleton que j’avais diffusé sur les réseaux sociaux, j’ai réorganisé ces arguments dans un ordre plus logique, en les séparant en 4 catégories :

    1. Arguments de nature scientifique et méthodologique :
      1. Des méthodes conçues pour la médecine ne peuvent pas s’appliquer à l’éducation;
      2. La méthode expérimentale comporte des biais;
      3. L’éducation fondée sur des preuves ne peut s’appliquer qu’à des pédagogies standardisées;
      4. L’éducation fondée sur des preuves ne s’intéresse qu’à ce qui est mesurable et quantifiable;
      5. L’éducation fondée sur des preuves ne s’intéresse qu’à la performance scolaire;
      6. Les méthodes expérimentales ne permettent d’établir que des « effets moyens », ce qui est d’un intérêt limité en pédagogie;
      7. En pédagogie, isoler strictement une variable n’est pas possible;
      8. Comment prétendre sérieusement promouvoir des « méthodes efficaces » en les détachant des conditions concrètes (nombres d’élèves, inégalités sociales, etc.) dans lesquelles elles devraient être mises en œuvre ?
      9. On enseigne à des enfants, pas à des sujets. C’est la qualité des relations humaines qui est primordiale;
      10. Ces recherches en laboratoire ne peuvent prescrire ce qu’il faut faire en classe;
      11. Rien de nouveau sous le soleil.
    2. Arguments épistémologiques :
      1. L’éducation fondée sur des preuves a une conception trop étroite de la notion de preuve;
      2. L’éducation fondée sur des preuves s’appuie sur une épistémologie particulière, il y en a d’autres tout aussi valables.
    3. Arguments concernant la mise en œuvre :
      1. La singularité des contextes, des élèves… empêche toute mise en place de pratique fondée sur les données probantes;
      2. Les politiques éducatives échouent souvent à atteindre leurs objectifs, même quand elles sont fondées sur des preuves scientifiques;
      3. Les enseignants doivent faire chaque jour des choix pédagogiques qui n’ont pas été testés scientifiquement, sans attendre les résultats des études;
    4. Arguments éthiques, politiques et idéologiques:
      1. Il n’est pas éthique de procéder à des expérimentations en éducation, les élèves ne sont pas des cobayes;
      2. L’éducation fondée sur des preuves évacue la question des valeurs;
      3. Vouloir évaluer l’efficacité en éducation, c’est du néolibéralisme;
      4. L’éducation fondée sur des preuves prend les enseignants pour des robots décervelés ou des techniciens;
      5. L’éducation fondée sur des preuves veut formater les élèves, en faire de bons petits travailleurs dociles;
      6. Ces recherches réduisent les enfants à leur cerveau. On enseigne à des enfants, pas à des cerveaux;
      7. Promouvoir l’éducation fondée sur des preuves c’est entretenir le soupçon sur la façon dont les personnels font leur métier.

    A. Arguments de nature scientifique et méthodologique

    1.      Des méthodes conçues pour la médecine ne peuvent pas s’appliquer à l’éducation

    C’est une pétition de principe. En fait c’est parfaitement possible. La méthode de l’essai randomisé contrôlé nécessite uniquement de pouvoir comparer 2 groupes recevant des interventions différentes, et de mesurer ce que l’intervention vise à changer avant et après celle-ci. C’est donc totalement indépendant de la nature de l’intervention menée entre les deux temps de mesure. C’est pour cela que cette méthode a produit des résultats pertinents pour l’évaluation des traitements médicaux, paramédicaux, des psychothérapies, des pratiques pédagogiques, et des politiques publiques dans les domaines de l’éducation, de la santé, du handicap, des affaires sociales, de la lutte contre la pauvreté, de l’emploi, de la lutte contre la criminalité, de la justice, etc. On peut s’en faire une idée en constatant l’étendue et la qualité du travail des What Works Centres britanniques.

    2.      La méthode expérimentale comporte des biais

    Non, la méthode expérimentale n’a pas intrinsèquement de biais. Toute étude, qu’elle soit expérimentale ou non, peut comporter des biais. Surtout les études non-expérimentales ! Dans les études observationnelles, de nombreux facteurs sont confondus les uns avec les autres, par exemple : l’action pédagogique du prof, ses autres qualités, les caractéristiques de ses élèves, ce que ses élèves apprennent en-dehors de la classe, etc. Lorsque l’on croit observer un effet de l’action pédagogique, il se peut qu’on observe en fait l’effet d’un autre facteur : l’observation est biaisée. Ce qui fait qu’il est impossible de démêler les différents facteurs et de tirer une conclusion fiable quant à l’effet causal du facteur d’intérêt. C’est précisément pour cela qu’on a inventé la méthode expérimentale, pour minimiser les biais inhérents aux études observationnelles ! L’utilisation de grands effectifs et le tirage au sort des participants entre les différents groupes est particulièrement de nature à produire des estimations moins biaisées que les autres méthodes. Cela n’implique pas qu’une étude expérimentale soit toujours exempte de biais. Elle peut toujours en avoir, aucune étude n’est parfaite. Mais elle en aura toujours moins qu’une étude observationnelle portant sur le même facteur.

    NB : il existe des méthodes sophistiquées (de type économétrique) pour modéliser des relations causales dans des données purement observationnelles. Ce sont des compléments importants à la méthode expérimentale, et parfois la seule possibilité (lorsque l’expérimentation n’est pas possible). Mais ce ne sont généralement pas des méthodes utilisées par les opposants à la méthode expérimentale.

    3.      L’éducation fondée sur des preuves ne peut s’appliquer qu’à des pédagogies standardisées

    Non. Pour évaluer des pratiques pédagogiques, il suffit que ces pratiques soient caractérisées de manière suffisamment précise, pour qu’on soit en mesure de distinguer une pédagogie A d’une pédagogie B, et de définir des programmes de formation à la pédagogie A ou B. Cela n’implique pas que ces pédagogies soient totalement rigides, appliquées à l’identique par tous les enseignants à tous les apprenants, sans aucun degré de liberté. Certaines pédagogies (tout comme les psychothérapies) peuvent offrir de la souplesse et des possibilités d’adaptation, tout en étant bien caractérisées et distinguables d’autres pédagogies. Du moment qu’elles sont bien caractérisées, cela suffit à faire des groupes d’enseignants pratiquant les pédagogies A, B ou X, et à en comparer les effets sur leurs élèves.

    Ce prérequis de l’éducation fondée sur des preuves s’applique en fait à tous ceux qui discourent sur l’éducation. En effet, caractériser précisément la pédagogie sur laquelle on affirme quelque chose, c’est tout simplement le minimum requis pour savoir de quoi on parle.

    4.      L’éducation fondée sur des preuves ne s’intéresse qu’à ce qui est mesurable et quantifiable

    Photo de Pixabay sur Pexels.com

    Certes. Mais ce n’est pas l’argument-massue que certains imaginent.

    Pour évaluer des pratiques ou une politique, il faut nécessairement 1) définir précisément ce que ces pratiques visent à changer (par exemple une compétence scolaire, ou un ressenti subjectif) ; 2) trouver un moyen de mesurer cette dimension (par des tests, questionnaires ou observations) ; 3) afin de pouvoir la comparer avant et après une intervention, et entre différentes pratiques ou politiques. Pour effectuer de telles comparaisons, il est nécessaire que les mesures soient quantitatives ou puissent être converties sur une échelle numérique. La manière de quantifier toute mesure, y compris qualitative et subjective, est expliquée dans un précédent article sur l’évaluation de la souffrance psychique.

    Plus généralement, il est difficile d’étudier rigoureusement ce qui n’est pas mesurable. Si on ne sait pas mesurer quelque chose, que peut-on en dire de précis ? Intéressons-nous donc à la position alternative. Quand certains disent dédaigneusement que l’éducation fondée sur des preuves ne s’intéresse qu’à ce qui est mesurable et quantifiable, ils disent implicitement « Nous, nous nous intéressons aux choses nobles, celles qui comptent vraiment en éducation, celles qui ne sont ni mesurables ni quantifiables ». Mais quelles sont donc ces choses nobles et mystérieuses, et que pouvez-vous en dire d’autre que des discours vagues et sans preuves ?

    Dans bien des cas, ces personnes parlent de dimensions qui sont parfaitement mesurables et quantifiables. Peut-être ignorent-elles qu’elles le sont. Peut-être s’abstiennent-elles de les mesurer par principe. Dans tous les cas, on est en droit de leur demander des justifications : quelles données factuelles pouvez-vous montrer à l’appui de votre affirmation ? Pourquoi devrait-on croire ce que vous affirmez, si vous n’avez pas pris la peine de mesurer ce dont vous parlez ?

    Dans d’autres cas, ces personnes parlent de dimensions qui sont très vagues et globales. Par exemple « émanciper les élèves » ou « former des citoyens libres et éclairés ». De manière générale, il est difficile d’étudier scientifiquement des concepts trop vagues et peu définis. L’approche scientifique exige justement de définir précisément les concepts. Néanmoins, efforçons-nous d’aller au bout de cette logique :

    1. Si l’on veut rigoureusement évaluer des pratiques qui visent ces dimensions, à défaut de pouvoir mesurer quelque chose d’aussi vague et mal défini, on peut tenter de l’opérationnaliser (en lui substituant un concept voisin moins vague et mieux défini), ou de le décomposer en concepts plus simples et précis qui, eux, sont mesurables. Par exemple, construire des tests, questionnaires ou grilles d’observation sondant différents aspects de ce que l’on entend par « émancipation » ou « citoyen libre et éclairé ». Si la pratique qu’on veut évaluer a un effet réel sur le concept vague et mal défini, elle devrait aussi en avoir sur ces mesures. C’est le mieux que l’on puisse faire.
    2. Si l’on refuse de décomposer et préciser le concept vague et mal défini, ou si c’est impossible, alors il serait prudent de ne rien affirmer à son sujet. Car comment pourrait-on justifier une telle affirmation ? A nouveau, on est en droit de demander des justifications : quelles données factuelles pouvez-vous montrer à l’appui de votre affirmation ? Pourquoi devrait-on croire ce que vous affirmez avec autant d’aplomb, si vous n’êtes pas capable de mesurer ce dont vous parlez, ni même de le définir de manière suffisamment précise pour qu’on puisse l’opérationnaliser et concevoir des outils de mesure ?

    Dans tous les cas, on en revient à la nécessité pour tout chercheur de fournir des justifications convaincantes de ses énoncés. Sans mesures quantifiées, il est difficile de produire des justifications convaincantes sur des questions d’efficacité.

    A propos des données qualitatives

    Beaucoup de personnes revendiquent l’étude de données qualitatives en éducation. En fait, une fois que l’on a bien exploré et décrit les dimensions pertinentes des données qualitatives, il est souvent possible de les convertir sur des échelles numériques, afin de faire plus précisément les comparaisons requises.

    Les données qualitatives sont utiles surtout quand on ne sait pas exactement ce qu’on cherche, alors on fait du descriptif et de l’exploratoire : on enregistre tout ce qu’on voit et tout ce que les gens disent. Ça peut faire émerger des hypothèses intéressantes sur des facteurs pertinents. Une fois que des hypothèses précises sont formulées, on peut concevoir des mesures plus spécifiques et quantitatives de ces facteurs pertinents et tester des hypothèses précises quant à leurs effets. Alors qu’avec des données qualitatives, on peut discourir sur leurs effets supposés mais on ne peut pas rigoureusement tester ces hypothèses.

    5.      L’éducation fondée sur des preuves ne s’intéresse qu’à la performance scolaire

    Photo de Lukas sur Pexels.com

    Non. L’éducation fondée sur des preuves s’intéresse à toutes les questions que se posent les enseignants, les parents, les politiques, et les chercheurs. Bien sûr, dans le domaine scolaire, beaucoup de questions légitimes ont trait à la performance scolaire : comment enseigner au mieux la lecture ? comment faire progresser la compréhension des fractions par les élèves ? Mais il y en a bien d’autres : comment augmenter l’engagement des élèves dans les apprentissages ? comment établir un climat de classe positif et diminuer les comportements perturbateurs ? comment améliorer le bien-être des élèves ? et celui des enseignants ? Il est possible de répondre rigoureusement à toutes ces questions. La seule condition nécessaire est de posséder ou de concevoir des outils de mesure (tests, questionnaires ou échelles d’observation) de ce que l’on cherche à améliorer. On en revient donc au point précédent. A partir de là, il est possible de le mesurer avant et après une intervention, et d’en comparer les progrès entre différents groupes recevant différentes interventions. Cette démarche scientifique n’est donc en aucun cas limitée à la performance scolaire.

    6.      Les méthodes expérimentales ne permettent d’établir que des « effets moyens », ce qui est d’un intérêt limité en pédagogie

    Les méthodes expérimentales permettent effectivement de déterminer des effets moyens ainsi que la variabilité autour de l’effet moyen. C’est d’un grand intérêt pédagogique. En effet, il est fort possible que différentes pédagogies conviennent à différents enfants. Mais dans un contexte où l’enseignant enseigne en classe entière et ne peut totalement individualiser son enseignement, il parait raisonnable, en première approche, de choisir des pédagogies qui produisent le plus grand effet moyen, c’est-à-dire qui conviennent au plus grand nombre d’enfants.

    Si l’on soupçonne que certains élèves n’apprennent pas bien avec la « pédagogie de la moyenne », on peut essayer d’en identifier les caractéristiques (par exemple niveau socio-économique, ou troubles des apprentissages), et envisager d’autres pédagogies qui leur conviendraient mieux. Mais à nouveau, il s’agit d’hypothèses à tester, et elles le seront le mieux avec la méthode expérimentale.

    Par ailleurs, si l’on dispose de nombreuses études expérimentales sur un même sujet, les méta-analyses permettent d’étudier de manière systématique les « modérateurs » de l’effet, c’est-à-dire les facteurs qui le font varier. D’ailleurs, le « Teaching and learning toolkit » de l’Education Endowment Foundation inclut systématiquement une section « derrière la moyenne » qui donne des indications sur les facteurs qui peuvent faire varier un effet autour de la moyenne.

    On peut ainsi en arriver à proposer aux enseignants une démarche rationnelle incluant:

    1. Une pédagogie qui est la meilleure pour la plupart des élèves ;
    2. une pédagogie alternative qui est la meilleure pour ceux qui ne bénéficient pas suffisamment de la première ;
    3. si nécessaire on peut encore tester d’autres pédagogies plus adaptées à ceux qui ne répondraient pas assez aux deux premières, et qui pourraient être mises en œuvre par des enseignants spécialisés
    4. une démarche rationnelle permettant ainsi à l’enseignant de différencier sa pédagogie pour gérer la diversité dans sa classe sans pour autant devoir individualiser son enseignement ;
    5. le tout fondé sur des preuves d’efficacité, parce que c’est toujours mieux que des allégations.

    C’est compliqué, bien sûr, mais ça existe, c’est par exemple la démarche de l’approche « réponse à l’intervention » pour l’apprentissage de la lecture.

    Enfin, il est important de retourner la question à ceux qui la posent : vous critiquez la méthode expérimentale, mais quelles pédagogies proposez-vous, vous, pour gérer la diversité dans la classe ? Et comment savez-vous si elles sont efficaces, si elles n’ont pas été testées par la méthode expérimentale ?

    7.      En pédagogie, isoler strictement une variable n’est pas possible

    C’est une pétition de principe. Certaines variables pédagogiques s’isolent très bien, d’autres moins, mais ce n’est pas toujours crucial. On peut aussi bien comparer les effets de micro-pratiques pédagogiques que ceux d’approches plus globales différant par de nombreux aspects.

    Que l’on compare les enseignants de CP utilisant un manuel de lecture phonique ou non-phonique, ou qu’on les compare selon le nombre de correspondances graphèmes-phonèmes enseignées au cours du trimestre, il n’est pas indispensable que les groupes comparés soient parfaitement homogènes, que tous les enseignants suivent une méthode à la lettre, du moment que les deux groupes diffèrent globalement selon une ou plusieurs dimensions identifiées. La variabilité au sein des deux groupes introduit du bruit statistique dans la comparaison, mais beaucoup d’effets pédagogiques peuvent être mis en évidence malgré ce bruit. Cela a par exemple été abondamment démontré dans le cas de l’enseignement de la lecture :

    https://youtu.be/-SfPHLhq9qY?feature=shared&t=2054

    Il existe tout de même un sens dans lequel l’idée d’« isoler une variable » a son importance. On peut en effet s’inquiéter du fait que les progrès que l’on mesure ne sont pas juste liés à la pratique pédagogique d’intérêt, mais peuvent être dus à d’autres facteurs corrélés : il se pourrait par exemple que les enseignants qui choisissent spontanément d’utiliser un manuel phonique et d’enseigner de nombreuses correspondances graphèmes-phonèmes ont d’autres qualités particulières, et que ce soient ces qualités qui font progresser leurs élèves en lecture, plutôt que la méthode choisie.

    Cette problématique des facteurs potentiellement confondus est l’un des grands enjeux de la recherche en sciences sociales et en particulier en éducation. Et c’est précisément pour cela que toutes les méthodes ne se valent pas. La meilleure manière de neutraliser tous les facteurs potentiellement confondus est d’utiliser l’essai randomisé contrôlé : en tirant au sort un grand nombre d’enseignants volontaires entre ceux qui recevront une formation à une méthode phonique et ceux qui recevront une formation à une méthode non-phonique, les autres qualités de ces enseignants seront réparties aléatoirement entre les deux groupes, et découplées des pratiques que l’on évalue. Aucune autre méthode, expérimentale non aléatoire, ou observationnelle, n’a cette qualité.

    L’expérimentation sur de grands effectifs et le tirage aléatoire sont donc les meilleurs moyens méthodologiques pour contrôler les facteurs confondus et ainsi isoler les variables d’intérêt, en pédagogie comme dans tous les autres domaines.

    8.      Comment prétendre sérieusement promouvoir des « méthodes efficaces » en les détachant des conditions concrètes (nombres d’élèves, inégalités sociales, etc.) dans lesquelles elles devraient être mises en œuvre ?

    L’éducation fondée sur des preuves ne se désintéresse aucunement des conditions d’enseignement, au contraire, elle en fournit des évaluations. Par exemple on peut trouver sur le site de l’EEF une estimation de l’effet de la réduction de la taille des classes sur les apprentissages.

    Et il existe bien sûr d’innombrables études sur les effets des inégalités sociales, qui sont par exemple systématiquement détaillées dans toutes les notes de la DEPP et dans toutes les études de l’OCDE.

    Si au cours de l’évaluation d’une pratique pédagogique ou d’une politique éducative, on a des raisons de penser que ses effets pourraient varier en fonction des effectifs, du milieu social, ou de tout autre facteur, alors c’est une hypothèse qu’il est possible de tester, de manière expérimentale dans de nouvelles études, ou par des analyses de modérateurs dans les méta-analyses.

    En résumé, il est très pertinent de se soucier des conditions précises dans lesquelles l’effet d’une politique ou d’une pratique peut être obtenu. Et le cadre de l’éducation fondée sur des preuves fournit toute la méthodologie nécessaire pour les déterminer. Quelle autre méthodologie le permettrait ?

    9.      On enseigne à des enfants, pas à des sujets. C’est la qualité des relations humaines qui est primordiale.

    Tout le monde est convaincu que la qualité des relations entre élèves et enseignants est importante. Mais ce n’est pas un argument contre l’éducation fondée sur des preuves, bien au contraire !

    Car une fois qu’on a énoncé ce slogan bien intentionné et un peu vague, on n’a rien dit qui puisse aider très concrètement les enseignants. Si on pense que c’est un facteur important, il faut faire le travail jusqu’au bout: définir des pratiques concrètes qui promeuvent les bonnes relations entre enseignant et élèves, puis les tester! C’est-à-dire vérifier expérimentalement si ces pratiques ont bien l’effet attendu sur la qualité des relations, et aussi si cet effet se transfère jusqu’aux résultats scolaires! C’est important car de manière générale les bonnes intentions ne suffisent pas.

    Et bien sûr de telles recherches se font déjà. J’en donne un exemple ici:

    https://youtu.be/ekPg4uX1664?feature=shared&t=60

    Et un autre exemple là:

    https://www.youtube.com/watch?v=bJSpMaRpx-M&t=316s

    10. Ces recherches en laboratoire ne peuvent prescrire ce qu’il faut faire en classe

    Cette objection reflète une représentation erronée de ce qu’est la recherche en éducation, qui ne se déroule pas en laboratoire.

    Les recherches qui se font le plus souvent en laboratoire sont certaines recherches en psychologie qui visent à établir des résultats fondamentaux sur les processus cognitifs (tel que l’effet de récupération en mémoire), et bien sûr les recherches en neurosciences qui visent à comprendre les bases cérébrales des processus cognitifs. Mais ce n’est pas sur la base de ces recherches que l’on peut faire des recommandations fondées sur des preuves en éducation.

    L’éducation fondée sur des preuves se base, bien évidemment, sur des recherches qui ont expérimenté des politiques éducatives ou des pratiques pédagogiques avec de vrais enseignants dans de vraies classes avec de vrais élèves. Même lorsque des interventions sont inspirées de résultats obtenus en laboratoire, elles sont ensuite testées dans des classes en situation réelle. Par exemple, l’exploitation pédagogique de l’effet de récupération en mémoire a été testée par des enseignants dans leurs classes (par exemple dans cette étude), et ce n’est bien sûr qu’à cette condition que l’on peut en tirer des recommandations valides.

    11. Rien de nouveau sous le soleil

    Lorsque les résultats de recherches expérimentales en éducation contredisent ce que vous croyez vrai (ou efficace), la tentation est grande de les rejeter, sous un prétexte ou sous un autre (l’un des 21 autres arguments de cette liste).

    Mais il peut aussi arriver que des résultats de recherche confirment ce que vous croyiez vrai ou efficace. Et dans ce cas, qu’entend-on souvent de la part des détracteurs de l’éducation fondée sur des preuves ? « Rien de nouveau sous le soleil, on le savait déjà, on fait déjà tout ça. C’est bien la peine de payer des chercheurs pour inventer la machine à courber les bananes ! »

    L’erreur de cet argument, c’est de croire déjà savoir ce qui est vrai ou efficace, avant même d’avoir pris connaissance des recherches sur le sujet. Et de faire plus confiance à son intuition ou à son expérience subjective qu’à des résultats objectifs. C’est confondre croyance et connaissance.

    En fait, que des résultats de recherches confirment ou contredisent vos croyances, ils sont tout aussi importants ! Car avant que la recherche ne soit faite, rien n’est connu avec le même niveau de preuve, quelle que soit la force de votre conviction.

    La science n’est pas un supermarché dans lequel on peut choisir les résultats qui vous conviennent, et laisser ceux qui ne vous conviennent pas. Si l’on pense que la démarche scientifique est la manière la plus fiable d’acquérir des connaissances sur le monde, alors il faut en prendre l’ensemble des résultats fiables, qu’ils vous plaisent ou pas.

    B. Arguments épistémologiques

    12. L’éducation fondée sur des preuves a une conception trop étroite de la notion de preuve

    C’est sans aucun doute le cœur du débat. Qu’est-ce qui compte comme une preuve (ou plus modestement, une donnée convaincante) de l’efficacité d’une politique éducative ou d’une pratique pédagogique ?

    Contrairement aux idées reçues, l’éducation fondée sur des preuves prend en compte l’ensemble des données disponibles : descriptives et explicatives, qualitatives et quantitatives, observationnelles et expérimentales.

    En revanche, elle établit une hiérarchie entre les différents types de données, de la moins convaincante à la plus convaincante. C’est la hiérarchie des niveaux de preuve, parfois représentée sous forme d’une pyramide :

    Illustration: Stéphane Ponzi.

    Cette hiérarchie est contestée pour défendre une pluralité de méthodologies qui seraient toutes de valeur égale. La diversité n’est pas un problème, mais peut-on raisonnablement défendre que toutes les méthodes se valent, et que toutes les données sont également convaincantes ? Ce serait nier plusieurs siècles d’histoire des sciences, au cours desquels les chercheurs n’ont cessé ne découvrir les limites de leurs données, les problèmes de leurs méthodes, et de continuellement améliorer leurs méthodologies de manière à produire des données toujours plus fiables permettant de tirer des conclusions toujours plus sûres. Peut-on raisonnablement défendre que la recherche en éducation soit immunisée contre ces problèmes et se tienne à l’écart de ces progrès méthodologiques ?

    Contrairement à ce qu’en disent les détracteurs, la hiérarchie des niveaux de preuves n’a rien d’arbitraire. Elle est au contraire très rigoureusement justifiée par la nécessité de prendre en compte les multiples interprétations possibles d’un résultat produit par une méthode donnée, ainsi qu’il est détaillé dans cet article.

    On peut bien sûr être en désaccord avec ces justifications. Mais dans ce cas il faut aller jusqu’au bout de l’argument, et expliquer précisément comment une autre méthodologie peut permettre de rejeter aussi bien les interprétations alternatives des mêmes observations.

    13. L’éducation fondée sur des preuves s’appuie sur une épistémologie particulière, il y en a d’autres tout aussi valables

    L’appel à une épistémologie alternative est une constante chez tous ceux qui veulent affirmer des choses sans apporter de preuves, ou qui veulent exercer sans avoir à justifier de l’efficacité de leurs pratiques. Il est par exemple abondamment utilisé par les promoteurs de pseudomédecines. Cela n’implique pas nécessairement qu’un tel argument soit illégitime, mais cela invite à le considérer avec un minimum de scepticisme.

    Source: Florian Cova.

    Restons ouverts à l’idée qu’une épistémologie alternative ait quelque chose d’intéressant à apporter. Pour pouvoir en juger, il suffirait que quelqu’un explicite quelle est cette épistémologie alternative, comment elle fonctionne, comment elle valide les énoncés qui sont jugés vrais et comment elle valide les pratiques qui sont jugées efficaces. Et qu’on nous fournisse quelques exemples d’énoncés et de pratiques éducatives validées par cette épistémologie, et des données prises en compte pour les valider. Cela permettrait d’engager un débat fructueux sur la nature des données, leurs différentes interprétations possibles, et sur les atouts et les limites de chaque méthodologie.

    En particulier, il serait intéressant que les partisans d’épistémologies alternatives répondent eux-mêmes aux critiques adressés à l’éducation fondée sur des preuves, qui peuvent aussi bien être retournées vers les autres approches. Par exemple :

    • si vous pensez que la méthode expérimentale est biaisée (argument #2), comment votre épistémologie permet-elle de produire des résultats moins biaisés ?
    • si vous reprochez à l’éducation fondée sur des preuves de ne s’intéresser qu’au mesurable et au quantifiable (argument #4), comment votre épistémologie permet-elle de produire des conclusions précises et fiables à propos de choses non mesurables et non quantifiables ?
    • si vous pensez que l’éducation fondée sur des preuves ne parle que d’effets moyens (argument #6), comment votre épistémologie produit-elle des conclusions fiables sur les facteurs qui font varier les effets ?
    • si vous pensez qu’isoler une variable n’est pas possible en pédagogie (argument #7), quels résultats concrets votre épistémologie permet-elle d’obtenir à propos de variables non dissociables les unes des autres ?
    • si vous pensez qu’en pédagogie tout dépend de la singularité de chaque élève et de chaque contexte (argument #13), comment votre épistémologie peut-elle énoncer des généralités sur la pédagogie ?
    • si vous pensez qu’il n’est pas éthique de mener des expérimentations en éducation (argument #16), pourquoi pensez-vous qu’il est éthique de soumettre les élèves à des pédagogies qui n’ont pas été testées expérimentalement ?
    • Etc.

    En résumé, on peut débattre de tout, y compris de l’épistémologie sous-jacente à l’éducation fondée sur des preuves. A condition que les détracteurs ne se contentent pas de critiquer, mais montrent concrètement comment leur épistémologie alternative produit des résultats aussi convaincants.

    C. Arguments concernant la mise en œuvre

    14. La singularité des contextes, des élèves… empêche toute mise en place de pratique fondée sur les données probantes

    Oui, chaque élève est unique, et chaque enseignant est unique. Et pourtant, nous sommes tous des êtres humains, similaires par l’appartenance à la même espèce. Nous partageons tous l’architecture générale du cerveau humain que nous a légué l’évolution des primates, et donc nous partageons tous les mêmes mécanismes d’apprentissage, de mémorisation, de langage, de motivation, de cognition sociale, de régulation émotionnelle, et bien d’autres, qui sont impliqués dans les apprentissages scolaires.

    De même, toutes les situations de classe sont uniques, mais elles ont toutes aussi de grandes similarités. Chaque année, en France, 800 000 élèves commencent à apprendre à lire, et les situations d’apprentissage de la lecture observées cette année diffèrent somme toute assez peu de celles observées l’année dernière.

    Ainsi, malgré la singularité irréductible des individus et des situations, il existe aussi des régularités universelles, des généralités qu’il est possible d’extraire du bruit de fond. Et c’est tout l’objectif de la Science, que d’identifier les grands principes généraux qui gouvernent l’univers, les êtres vivants, et leurs relations, malgré le caractère unique de chaque instant, chaque endroit, et chaque être.

    La validité et l’utilité de la compréhension scientifique du monde s’évalue à sa capacité à faire des prédictions correctes sur l’avenir : quelle sera la position précise de Pluton dans 24h, dans 1 an, dans 100 ans ? Ou sur le sujet qui nous intéresse : si l’année prochaine j’enseigne à mes élèves de CP la lecture par une méthode idéovisuelle, sauront-ils lire mieux ou moins bien (en moyenne) que mes élèves de cette année à qui j’enseigne par une méthode phonique ?

    Le fait que les méthodes expérimentales en éducation soient capables de répondre de manière fiable à au moins certaines de ces questions d’intérêt primordial pour les enseignants, malgré la singularité incontestable des élèves, des enseignants et des situations, montre tout leur intérêt.

    15. Les politiques éducatives échouent souvent à atteindre leurs objectifs, même quand elles sont fondées sur des preuves scientifiques

    C’est vrai. C’est pour cela que l’on se préoccupe de plus en plus, au-delà des études expérimentales établissant des preuves d’efficacité de certaines pratiques ou politiques, de mener des études de passage à l’échelle en situation réelle. C’est un véritable défi, mais y répondre ne requiert pas de sortir du cadre de l’éducation fondée sur des preuves, au contraire, ça en fait partie. Et cela peut bien sûr se nourrir de toutes les études qualitatives ou quantitatives qui décrivent les conditions nécessaires pour l’adhésion et l’implémentation par les enseignants et les autres acteurs. Identifier les défis, les points de vigilance et d’amélioration ne doit donc pas conduire à rejeter l’approche fondée sur les preuves, mais à l’alimenter. Cela constitue même un sous-domaine à part entière, appelé « science de l’implémentation« .

    16. Les enseignants doivent faire chaque jour des choix pédagogiques qui n’ont pas été testés scientifiquement, sans attendre les résultats des études

    Bien sûr. La recherche scientifique a testé un certain nombre de pratiques pédagogiques, dans un certain nombre de contextes, et c’est déjà beaucoup. Mais c’est loin d’épuiser tout l’espace des pratiques pédagogiques et des situations de classe. En permanence, l’enseignant se trouve confronté à des lacunes de la recherche scientifique, et malgré tout il doit faire des choix et enseigner.

    La question est donc : comment armer le mieux possible les enseignants pour affronter ces situations inédites et ces lacunes de nos connaissances pédagogiques ? Doit-on leur dire qu’ils peuvent bien ignorer les connaissances scientifiques existantes, parce qu’elles ne s’appliqueront jamais à leur situation ? Curieusement, personne ne recommanderait cela pour les médecins, qui, eux aussi, doivent faire face à des patients nouveaux et des maladies inconnues.

    De la même manière que le « sens clinique » des médecins a d’autant plus de chances d’aboutir à un diagnostic correct et à un traitement efficace qu’il s’appuie sur des connaissances médicales solides, les « intuitions pédagogiques » des enseignants ont d’autant plus de chances d’être justes qu’elles s’appuient sur des connaissances solides des mécanismes des apprentissages et des pratiques efficaces, leur donnant les meilleures chances de transférer leurs compétences aux situations nouvelles.

    Ainsi, il serait trompeur de croire que, sous prétexte que les études scientifiques répondent rarement aux questions précises que l’on se pose, et ne s’appliquent pas toujours aux situations que l’on rencontre, il serait inutile d’en prendre connaissance. Au contraire, une bonne maîtrise des connaissances scientifiques actuelles sur l’efficacité des pratiques pédagogiques et sur les mécanismes des apprentissages est la meilleure base que les enseignants puissent avoir pour inventer les pratiques qui répondent à leurs besoins dans leurs circonstances à eux.

    L’argument est développé plus complètement dans la préface du livre L’apprentissage visible : ce que la science sait sur l’apprentissage.

    D. Arguments éthiques, politiques et idéologiques

    17. Il n’est pas éthique de procéder à des expérimentations en éducation, les élèves ne sont pas des cobayes

    Si c’était vrai, il ne serait pas éthique non plus de procéder à des expérimentations sur des patients en médecine, qui ne sont pas des cobayes non plus. Or les conditions nécessaires pour procéder éthiquement à des expérimentations en médecine, y compris contre un groupe placebo, ont déjà été bien balisées depuis longtemps, et les mêmes arguments s’appliquent aisément dans les autres domaines.

    Comme toujours, lorsqu’on critique une approche, il est important de la comparer aux situations alternatives, pour s’assurer qu’elles ne seraient pas encore pires. En l’espèce, si l’on se prive de recherches expérimentales permettant d’évaluer rigoureusement l’efficacité des pratiques en éducation, que se passe-t-il ?

    On laisse les enseignants démunis, à la merci des modes, des idéologies et des arguments d’autorité, avec pour seul recours de tâtonner, de se baser sur leurs propres essais et erreurs, au détriment de leurs élèves, pour faire évoluer leurs pratiques. Autrement dit, on laisse chaque enseignant jouer au chercheur, sans pour autant lui donner une formation à la recherche ni les moyens de mener ses expérimentations et observations rigoureusement, et donc d’en tirer des conclusions valides. Le tout en dehors de tout cadre éthique. Dans ces conditions, ce sont tous les enfants qui sont les « cobayes » de tous les enseignants !

    Refuser l’expérimentation en éducation pour des raisons prétendument éthiques, c’est maintenir volontairement les enseignants dans l’ignorance au lieu de se donner les moyens de guider rationnellement leur liberté pédagogique, c’est les laisser tâtonner perpétuellement à l’aveugle et reproduire des pratiques sous-optimales sur génération après génération de « cobayes ». Il est là, le véritable manquement à l’éthique.

    18. L’éducation fondée sur des preuves évacue la question des valeurs

    Oui, mais ce n’est pas une évacuation, c’est une indépendance de principe. En effet pour éviter de tout confondre, il serait sain de distinguer les objectifs et les moyens. L’éducation fondée sur des preuves ne s’occupe que des moyens. Les valeurs peuvent intervenir 1) dans la définition des objectifs ; 2) dans l’évaluation du caractère éthique des moyens.

    Définir des objectifs éducatifs n’est pas le rôle des scientifiques. C’est le rôle des citoyens et de leurs représentants élus. Leurs valeurs (ce qui constitue une « bonne » éducation) jouent bien sûr un rôle important dans la définition de ces objectifs. L’éducation fondée sur des preuves ne se mêle donc pas de cela. Que les citoyens, les politiques, ou les enseignants disent ce qu’ils veulent obtenir ; l’éducation fondée sur des preuves pourra alors évaluer rigoureusement les différents moyens d’y parvenir. C’est tout ce qu’on lui demande et c’est déjà beaucoup !

    Il se peut que, parmi les moyens établis comme les plus efficaces pour atteindre un objectif éducatif, il y ait des moyens que l’on juge non éthiques (relativement à certaines valeurs). A nouveau, c’est aux citoyens et à leurs représentants de faire le tri et de dire quels moyens leur semblent acceptables et lesquels doivent être écartés.

    Bien sûr, les chercheurs de l’éducation fondée sur des preuves sont aussi des citoyens dotés d’une éthique, et peuvent s’apercevoir eux-mêmes si certains moyens posent problème et choisir de ne pas les évaluer ou de ne pas les promouvoir. Les comités d’éthique ont aussi pour mission d’empêcher les expérimentations de moyens non éthiques, ce qui fait qu’il est peu probable que de tels projets soient menés. Il existe donc des garde-fous éthiques au sein même de l’éducation fondée sur des preuves. Néanmoins, il est important, dans l’évaluation de toute politique ou pratique, de ne pas confondre l’évaluation de son efficacité et celle de sa conformité aux valeurs, qui sont deux choses conceptuellement différentes.

    19. Vouloir évaluer l’efficacité en éducation, c’est du néolibéralisme

    Dire cela, c’est confondre 1) une méthode scientifique pour évaluer l’efficacité des pratiques et des politiques publiques ; 2) certaines personnes ou politiques qui utilisent ou disent utiliser cette méthode ; et c’est ignorer tous les contre-exemples : les néolibéraux qui ne veulent pas d’évaluations d’efficacité, et les anti-libéraux qui en veulent. C’est aussi ignorer que toute préconisation pédagogique est motivée au moins implicitement par un présupposé d’efficacité : on le recommande parce que ça marche mieux. Même ceux qui rejettent l’évaluation d’efficacité s’y réfèrent donc implicitement.

    En vérité, l’évaluation de l’efficacité des politiques publiques est une demande légitime de la part de tous les citoyens. Quelles que soient nos opinions politiques, nous avons tous intérêt à ce que les services publics fonctionnent de manière efficace en faisant le meilleur usage de nos impôts, y compris le service public d’éducation auquel nous confions nos enfants. Personne n’a intérêt à financer à fonds perdus des écoles où les élèves n’apprennent pas bien, pas plus que des hôpitaux où les patients ne sont pas soignés.

    L’exigence d’évaluation rigoureuse des politiques publiques est donc politiquement totalement neutre. Et la connaissance scientifique de l’efficacité relative de différentes politiques éducatives et pratiques pédagogiques ne prescrit nullement la manière dont on doit s’en servir.

    De fait, l’idée de liberté pédagogique sans contrainte est très compatible avec le néolibéralisme, avec le principe selon lequel les enseignants et les écoles font ce qu’ils veulent, les parents les jugeront sur leurs résultats, et la libre concurrence fera le reste. A l’inverse, un régime socialiste autoritaire pourrait bien être le plus enclin et le plus en capacité à vouloir utiliser cette connaissance pour imposer des pratiques uniformes à tous les enseignants.

    Il s’agit là d’une nouvelle illustration du fait que les connaissances scientifiques peuvent être au service de toutes les politiques mais n’en prescrivent aucune en particulier. Vouloir assimiler les unes aux autres est une grave confusion.

    19bis: « mais si, je vous dis, la montée de l’éducation fondée sur des preuves s’inscrit dans le contexte du New Public Management »

    Dire que « X s’inscrit dans le contexte de Y », ce n’est rien de plus que l’observation d’une corrélation temporelle et spatiale. Ce n’est pas la preuve d’un effet causal ni d’un lien consubstantiel.

    Mon interprétation de cette corrélation : il semble en effet y avoir concomitance entre 1) des progrès scientifiques et méthodologiques qui ont donné les moyens de mieux évaluer les effets des politiques publiques, et 2) l’arrivée au pouvoir d’un ou deux gouvernements qui souhaitaient réduire les dépenses publiques, qui ont trouvé là un moyen possible de le faire, et qui ont donc été les premiers à s’en servir.

    Il n’en reste pas moins, comme je l’ai déjà expliqué, que quel que soit le niveau de dépense publique, tous les citoyens et tous les gouvernements ont intérêt à évaluer l’efficacité des politiques publiques, de manière à fournir les meilleurs services publics étant donné le montant des impôts consentis par les citoyens.

    Je n’ai pas connaissance que qui que ce soit réclame de gaspiller l’argent de nos impôts dans des services publics inefficaces. Les opposants à l’éducation fondée sur des preuves réclament-ils cela ? Si leur réponse est non, alors ils veulent aussi une évaluation rigoureuse des politiques publiques, et leur discours est contradictoire avec leurs propres intérêts.

    L’éducation fondée sur des preuves est politiquement neutre, elle produit de la connaissance qui peut être mise au service de toutes les politiques.

    20. L’éducation fondée sur des preuves prend les enseignants pour des robots décervelés ou des techniciens

    Cette croyance étrange provient sans doute de l’idée qu’évaluer et recommander des pratiques pédagogiques implique nécessairement d’avoir une conception très étroite et rigide de ces pratiques, qui ne laisserait aux enseignants aucun degré d’appréciation de la diversité des situations et aucun degré de liberté dans la mise en œuvre des pratiques.

    Mais une telle idée est absurde et n’est soutenue par personne. Bien sûr, toute pratique pédagogique doit pouvoir être adaptée aux différents élèves et aux diverses situations, et cela n’empêche pas de pouvoir l’évaluer, puisque l’évaluation implique justement des expérimentations sur de grands groupes d’élèves dans des situations forcément diverses, qui auront déjà obligé les enseignants à s’adapter.

    Personne n’imagine qu’un enseignant soit un exécutant aveugle d’une pratique rigide et uniforme, pas plus qu’un médecin ou un psychologue. Mais cela n’enlève rien à l’intérêt pour lui d’avoir une connaissance approfondie de différentes pratiques pédagogiques et de leur efficacité respective, et une bonne maîtrise des techniques et gestes professionnels requis par ces pratiques. Qu’il y ait une composante technique au métier d’enseignant n’est ni un problème, ni un déshonneur pour les enseignants, pas plus que pour les médecins ou les psychologues.

    La nécessaire capacité à s’adapter à la diversité des élèves et des situations s’exercera d’autant mieux que l’enseignant pourra l’appuyer sur des connaissances solides et la maîtrise d’un éventail de pratiques à l’efficacité éprouvée.

    21. L’éducation fondée sur des preuves veut formater les élèves, en faire de bons petits travailleurs dociles

    Non, l’éducation fondée sur des preuves ne veut rien. Ce n’est qu’une méthode.

    Je ne sais pas s’il existe vraiment des gens qui voudraient « formater » les élèves. Les personnes qui l’affirment n’en apportent aucune preuve, et cela ressemble bigrement à une théorie du complot. En tous cas, si des gouvernants voulaient cela, alors les méthodes expérimentales pourraient certainement déterminer les moyens les plus efficaces pour y parvenir. Encore faudrait-il que cela soit possible, et trouver des chercheurs pour mener de telles recherches.

    Si des gouvernants veulent le contraire, par exemple former des citoyens libres et éclairés par des connaissances solides et un esprit critique affûté, alors les méthodes expérimentales peuvent également déterminer les méthodes les plus efficaces pour y parvenir.

    Encore une fois, il est important de distinguer les objectifs de l’éducation et les moyens pour y parvenir. Les objectifs doivent être délibérés démocratiquement et conformes aux valeurs des citoyens. Une fois qu’ils sont définis, il est légitime de vouloir se donner les moyens les plus efficaces pour les atteindre. Car à quoi bon avoir de nobles valeurs et se fixer des objectifs merveilleux si l’on ne se donne pas les moyens de les atteindre ?

    Les méthodes de l’éducation fondée sur des preuves peuvent aider à évaluer ces moyens et à choisir les meilleurs.

    22. Ces recherches réduisent les enfants à leur cerveau. On enseigne à des enfants, pas à des cerveaux.

    Gaetan Lee, CC BY 2.0, via Wikimedia Commons.

    Je pense que cet argument s’adresse aux discours de type « neuroéducation », pas à l’éducation fondée sur des preuves. Or les deux sont entièrement indépendants. La plupart des pratiques évaluées dans le cadre de l’éducation fondée sur des preuves ne sont pas inspirées par les neurosciences, mais par les enseignants, les pédagogues, les observations en classe, ou encore par des connaissances en psychologie. Inversement, certaines pratiques inspirées par les neurosciences sont des neuromythes sans aucune preuve d’efficacité (par exemple le Brain Gym supposé stimuler les connexions entre hémisphères cérébraux). (pour en savoir plus sur ce que je pense de la neuroéducation)

    Deuxièmement, je ne sais pas ce qu’est une recherche réduisant les enfants à leur cerveau. J’en ai demandé des exemples précis, et je n’ai plus eu aucune réponse.

    Enfin, dire que l’on enseigne à des enfants, pas à des cerveaux, est un faux dilemme. Il n’y a pas à choisir entre les enfants et leurs cerveaux, puisque les deux sont indissociables, et puisque tout ce qu’on veut enseigner à un enfant doit nécessairement trouver une place dans son cerveau.

    Dans cette vidéo je fais l’argument à propos de la mémoire, mais vous pouvez remplacer « mémoire » par « cerveau », c’est le même :

    https://youtu.be/xLX8Bl4cFU4?feature=shared

    23. Promouvoir l’éducation fondée sur des preuves c’est entretenir le soupçon sur la façon dont les personnels font leur métier

    Avec ce raisonnement on pourrait aussi bien dire « promouvoir la médecine fondée sur des preuves c’est entretenir le soupçon sur la façon dont les médecins font leur métier ».

    On pourrait aussi dire « promouvoir la formation continue c’est entretenir le soupçon sur la façon dont les professionnels font leur métier ».

    Dans quel métier n’a-t-on jamais besoin de mettre à jour ses connaissances et d’améliorer ses pratiques ?

    #13 #16 #2 #4 #6 #7 #education #science #société

    Nathan Weathingtonnathan-aotearoa@1964.co.nz
    2022-01-08
    (This post is being modified)
    2019-04-25

    Штобы што? Отказаться от последней настоящей десктопной ОС в пользу подставки для зондов? Этому не бывать.

    #Windows #Microsoft #7
    2019-03-31
    [P]My Machine Learning Journal #7: Making my first GAN for generating MNIST-like data! https://www.reddit.com/r/MachineLearning/comments/b7jpg7/pmy_machine_learning_journal_7_making_my_first/ #MachineLearning
    2019-02-26
    2019-02-11
    Paris : un homme a eu la main arrachée par une grenade de la gendarmerie



    https://paris-luttes.info/paris-un-homme-a-la-main-arrachee-11641

    #Répression_-_prisons #7<sup_class="typo_exposants">e</sup>_arrondissement #armes_de_la_police #violences_policières #police #Mouvement_des_Gilets_Jaunes

    Via RSS : https://paris-luttes.info/spip.php?page=backend&lang=fr
    🇳🇴 Thor — backup accountthor@pleroma.soykaf.com
    2018-12-05
    It annoys me that Google "helpfully" drops words from search results for you now, and if you ask it to reinclude a dropped word, it does so with quotes. I did not want you to drop the word, Google, and I definitely did not want you to reinclude it as an exact quote.

    Google started out as "better than AltaVista", transitioned to "excellent" and now it&#39;s kind of back to "better than AltaVista" and getting gradually worse.

    Google is cancer on mobile. You have to scroll past a whole page of ads before you get to view the actual results, and maybe you&#39;ll find what you&#39;re looking for at #4 or #7. #1 - #3? Usually cancer.

    Good things never last.
    nameless Cat Pöñíçkøvāpony@blovice.bahnhof.cz
    2018-11-08
    can i rely on the interns implementing pkcs #7 padding that was forgotten last time at few places in our rfc 6030 container reader? obviously, question is not that they can do the algorithm itself, which is trivial, but if giving only this assignment won't again lead them to just run in circles for the next 2 weeks

    bets are closing
    Radio Almaina 88.5 FM - radioalmaina.orgradioalmaina@gnusocial.net
    2018-10-06
    De raíz: Reposición veraniega #7 - http://www.deraizradio.org/2018/10/06/reposicion-veraniega-7/ !radioslibres !medioslibres

    Client Info

    Server: https://mastodon.social
    Version: 2025.04
    Repository: https://github.com/cyevgeniy/lmst