Publications
Aktuelle Entwicklungen der deutschsprachigen Ingenieurpsychologie
Martin Baumann, Lewis Chuang, Sebastian Pannasch, Jürgen Sauer, Joachim Vogt, Christiane Attig
Psychologie des Alltagshandelns, baumann2020aktuelle, Vol.13
Preparedness Nudging for Warning Apps? A Mixed-Method Study Investigating Popularity and Effects of Preparedness Alerts in Warning Apps
Haunschild, Jasmin; Pauli, Selina; Reuter, Christian
International Journal on Human-Computer Studies (IJHCS), 2023
PointCloudLab: An Environment for 3D Point Cloud Annotation with Adapted Visual Aids and Levels of Immersion
Doula, Achref; Güdelhöfer, Tobias; Matviienko, Andrii; Mühlhäuser, Max; Sanchez Guinea, Alejandro
2023 IEEE International Conference on Robotics and Automation (ICRA), 2023, p.to appear
Survey on Data Augmentation for Text Classification
Bayer, Markus; Kaufhold, Marc-André; Reuter, Christian
ACM Computing Surveys (CSUR), 2023, Vol.55, p.1-39
Values and Value Conflicts in the Context of OSINT Technologies for Cybersecurity Incident Response: A Value Sensitive Design Perspective
Riebe, Thea; Bäumler, Julian; Kaufhold, Marc-André; Reuter, Christian
Computer Supported Cooperative Work: The Journal of Collaborative Computing (JCSCW), 2023
Dual-Use in Volunteer Operations? Ethical and Practical Concerns of Computer Science Students regarding the Establishment of a Cyber Security Volunteer Force
Haunschild, Jasmin; Jung, Leon; Reuter, Christian
International Symposium on Technikpsychologie, 2023
“You offer privacy like you offer tea”: Investigating Mechanisms for Improving Guest Privacy in IoT-Equipped Households
Marky, Karola; Gerber, Nina; Pelzer, Michelle Gabriela; Khamis, Mohamed; Mühlhäuser, Max
Proceedings on Privacy Enhancing Technologies, 2022, Vol.4, p.400-420
Sicherheitsherausforderungen für Smart-City-Infrastrukturen
Zimmermann, Verena; Haunschild, Jasmin; Unden, Marita; Gerber, Paul; Gerber, Nina
Wirtschaftsinformatik & Management, 2022, Vol.14, p.119-126
REGRETS: A New Corpus of Regrettable (Self-)Disclosures on Social Media
Simo, Hervais; Kreutzer, Michael
IEEE INFOCOM 2022 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), 2022
PrivateDrop: Practical Privacy-Preserving Authentication for Apple AirDrop
Alexander Heinrich; Matthias Hollick; Thomas Schneider; Milan Stute; Christian Weinert
Proceedings of the 30th USENIX Security Symposium, 2022, p.3577-3594
Perceptions and Use of Warning Apps – Did Recent Crises Lead to Changes in Germany?
Haunschild, Jasmin; Kaufhold, Marc-André; Reuter, Christian
Mensch und Computer 2022 - Tagungsband, 2022
Security threats to undersea communications cables and infrastructure – consequences for the EU
Bueger, Christian; Liebetrau, Tobias; Franken, Jonas
Trustworthy and Explainable: A European Vision of (Weaponised) Artificial Intelligence
Schmid, Stefka
Die Friedens-Warte / Journal of International Peace and Organization (JIPO), 2022, Vol.95, p.290-315
Book Review: Artificial Intelligence and The Future of Warfare, James Johnson (2021)
Reinhold, Thomas; Reuter, Christian
Zeitschrift für Außen- und Sicherheitspolitik (ZfAS), 2022
U.S. Security Policy: The Dual-Use Regulation of Cryptography and its Effects on Surveillance
Riebe, Thea; Kuehn, Philipp; Imperatori, Philipp; Reuter, Christian
European Journal for Security Research, 2022
The Digital Divide in State Vulnerability to Submarine Communications Cable Failure
Franken, Jonas; Reinhold, Thomas; Reichert, Lilian; Reuter, Christian
International Journal of Critical Infrastructure Protection (IJCIP), 2022, Vol.38, p.1-15
The Implementation of Protective Measures and Communication of Cybersecurity Alerts in Germany - A Representative Survey of the Population
Kaufhold, Marc-André; Bäumler, Julian; Reuter, Christian
Workshop-Proceedings Mensch und Computer, 2022
Dual-Use and Trustworthy? A Mixed Methods Analysis of AI Diffusion between Civilian and Defense R\&D
Schmid, Stefka; Riebe, Thea; Reuter, Christian
Science and Engineering Ethics, 2022, Vol.28, p.1-23
Towards a Cyber Weapons Assessment Model – Assessment of the Technical Features of Malicious Software
Reinhold, Thomas; Reuter, Christian
IEEE Transactions on Technology and Society, 2022, Vol.3, p.226-239
Sicherheitsherausforderungen für Smart City-Infrastrukturen
Zimmermann, Verena; Haunschild, Jasmin; Unden, Marita; Gerber, Paul; Gerber, Nina
Wirtschaftsinformatik \& Management, 2022
Cultural Violence and Fragmentation on Social Media: Interventions and Countermeasures by Humans and Social Bots
Haunschild, Jasmin; Kaufhold, Marc-André; Reuter, Christian
Cyber Security Politics: Socio-Technological Transformations and Political Fragmentation, 2022, p.48-63
VR-Surv: a VR-Based Privacy Preserving Surveillance System
Doula, Achref; Sanchez Guinea, Alejandro; Mühlhäuser, Max
CHI Conference on Human Factors in Computing Systems Extended Abstracts, 2022, p.1-7
Armament, Arms Control and Artificial Intelligence - The Janus-faced Nature of Machine Learning in the Military Realm
Schörnig, Niklas; Reinhold, Thomas
Cyber Weapons and Artificial Intelligence: Impact, Influence and the Challenges for Arms Control
Reinhold, Thomas; Reuter, Christian
Armament, Arms Control and Artificial Intelligence - The Janus-faced Nature of Machine Learning in the Military Realm, 2022, p.145-158
Towards Automated Detection and Prevention of Regrettable (Self-)Disclosures on Social Media
Hervais Simo; Michael Kreutzer
21th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-2022), 2022
Seekabel als Maritime Kritische Infrastruktur
Franken, Jonas
Dreizack 21: Von historischen bis zukünftigen Herausforderungen im maritimen Raum, 2022, p.22-25
The Nerd Factor: The Potential of $\$S\&P$\$ Adepts to Serve as a Social Resource in the User s Quest for More Secure and $\$Privacy-Preserving$\$ Behavior
Gerber, Nina; Marky, Karola
Eighteenth Symposium on Usable Privacy and Security (SOUPS 2022), 2022, p.57-76
Double Deep Q-Learning With Prioritized Experience Replay for Anomaly Detection in Smart Environments
Fährmann, Daniel; Jorek, Nils; Damer, Naser; Kirchbuchner, Florian; Kuijper, Arjan
IEEE Access, 2022, Vol.10, p.60836-60848
Immersive-Labeler: Immersive Annotation of Large-Scale 3D Point Clouds in Virtual Reality
Doula, Achref; Güdelhöfer, Tobias; Matviienko, Andrii; Mühlhäuser, Max; Sanchez Guinea, Alejandro
ACM SIGGRAPH 2022 Posters, 2022, p.1-2
Effects of the Level of Detail on the Recognition of City Landmarks in Virtual Environments
Doula, Achref; Kaufmann, Philipp; Guinea, Alejandro Sánchez; Mühlhäuser, Max
2022 IEEE Conference on Virtual Reality and 3D User Interfaces Abstracts and Workshops (VRW), 2022, p.860-861
Visualization of Machine Learning Uncertainty in AR-Based See-Through Applications
Doula, Achref; Schmidt, Lennart; Mühlhäuser, Max; Sanchez Guinea, Alejandro
2022 IEEE International Conference on Artificial Intelligence and Virtual Reality (AIVR), 2022, p.to appear
AirGuard - Protecting Android Users from Stalking Attacks by Apple Find My Devices
Alexander Heinrich; Niklas Bittner; Matthias Hollick
WiSec 22: Proceedings of the 15th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2022, p.26-38
Who Can Find My Devices? Security and Privacy of Apple?s Crowd-Sourced Bluetooth Location Tracking System
Alexander Heinrich; Milan Stute; Tim Kornhuber; Matthias Hollick
The Notion of Relevance in Cybersecurity: A Categorization of Security Tools and Deduction of Relevance Notions
Kuehn, Philipp; Bäumler, Julian; Kaufhold, Marc-André; Wendelborn, Marc; Reuter, Christian
Workshop-Proceedings Mensch und Computer, 2022
CySecBERT: A Domain-Adapted Language Model for the Cybersecurity Domain
Bayer, Markus; Kuehn, Philipp; Shanehsaz, Ramin; Reuter, Christian
Ghost Peak: Practical Distance Reduction Attacks Against HRP UWB Ranging
Patrick Leu; Giovanni Camurati; Alexander Heinrich; Marc Roeschlin; Claudio Anliker; Matthias Hollick; Capkun Srdjan; Jiska Classen
Hybrid password meters for more secure passwords – a comprehensive study of password meters including nudges and password information
Verena Zimmermann; Karola Marky; Karen Renaud
Behaviour \& Information Technology, 2022, p.1-44
Disrupting Continuity of Apple?s Wireless Ecosystem Security: New Tracking, DoS, and MitM Attacks on iOS and macOS Through Bluetooth Low Energy, AWDL, and Wi-Fi
Milan Stute; Alexander Heinrich; Jannik Lorenz; Matthias Hollick
Proceedings of the 30th USENIX Security Symposium, 2022, p.3917-3934
Lightweight Long Short-Term Memory Variational Auto-Encoder for Multivariate Time Series Anomaly Detection in Industrial Control Systems
Fährmann, Daniel; Damer, Naser; Kirchbuchner, Florian; Kuijper, Arjan
Sensors, 2022, Vol.22
Common Vulnerability Scoring System Prediction based on Open Source Intelligence Information Sources
Kuehn, Philipp; Relke, David; Reuter, Christian
A European Perspective on Crisis Informatics: Citizens and Authorities attitudes towards Social Media for Public Safety and Security
Reuter, Christian
Usability stumm geschaltet? Usable Security und Privacy in Videokonferenzsystemen
Balthasar, Mandy; Gerber, Nina; Schmitt, Hartmut
Mensch und Computer 2021 - Usability Professionals, 2022
Arms Control for Artificial Intelligence
Reinhold, Thomas
Armament, Arms Control and Artificial Intelligence - The Janus-faced Nature of Machine Learning in the Military Realm, 2022, p.211-226
Introduction
Schörnig, Niklas; Reinhold, Thomas
Armament, Arms Control and Artificial Intelligence - The Janus-faced Nature of Machine Learning in the Military Realm, 2022, p.1-9
Website operators are not the enemy either - Analyzing options for creating cookie consent notices without dark patterns
Stöver, Alina; Gerber, Nina; Cornel, Christin; Henz, Mona; Marky, Karola; Zimmermann, Verena; Vogt, Joachim
Mensch und Computer 2022 - Workshopband, 2022
Clustering of Threat Information to Mitigate Information Overload for Computer Emergency Response Teams
Kuehn, Philipp; Kerk, Moritz; Wendelborn, Marc; Reuter, Christian
Discussing Conflict in Social Media – The Use of Twitter in the Jammu and Kashmir Conflict
Gabel, Sabrina; Reichert, Lilian; Reuter, Christian
Media, War \& Conflict, 2022, Vol.15, p.1-26
A European Perspective on Crisis Informatics: Citizens and Authorities attitudes towards Social Media for Public Safety and Security
Reuter, Christian
Armament, Arms Control and Artificial Intelligence. The impact of software, machine learning and artificial intelligence on armament and arms control
Schörnig, Niklas; Reinhold, Thomas
Connected Self-Organized Citizens in Crises: An Interdisciplinary Resilience Concept for Neighborhoods
Haesler, Steffen; Mogk, Ragnark; Putz, Florentin; Logan, Kevin T.; Thiessen, Nadja; Kleinschnitger, Katharina; Baumgärtner, Lars; Stroscher, Jan-Philipp; Reuter, Christian; Knodt, Michele; Hollick, Matthias
CSCW 21 Companion: Conference Companion Publication of the 2021 on Computer Supported Cooperative Work and Social Computing, 2021
Stronger Together: How Neighborhood Groups Build up a Virtual Network during the COVID-19 Pandemic
Haesler, Steffen; Schmid, Stefka; Vierneisel, Annemike Sophia; Reuter, Christian
Proceedings of the ACM: Human Computer Interaction (PACM): Computer-Supported Cooperative Work and Social Computing, 2021, Vol.5
Information Overload in Crisis Management: Bilingual Evaluation of Embedding Models for Clustering Social Media Posts in Emergencies
Bayer, Markus; Kaufhold, Marc-André; Reuter, Christian
Proceedings of the European Conference on Information Systems (ECIS), 2021, p.1-18
Sicherheitskritische Mensch-Computer-Interaktion: Interaktive Technologien und Soziale Medien im Krisen- und Sicherheitsmanagement (Zweite Auflage)
Reuter, Christian
Sicherheitskritische Mensch-Computer-Interaktion: Interaktive Technologien und Soziale Medien im Krisen- und Sicherheitsmanagement (Zweite Auflage)
Reuter, Christian
Cyber Weapons and Artificial Intelligence – Impact, Influence and the Challenges for Arms Control
Reinhold, Thomas; Reuter, Christian
Armament, Arms Control and Artificial Intelligence. The impact of software, machine learning and artificial intelligence on armament and arms control, 2021
Citizens Perceived Information Responsibilities and Information Challenges During the COVID-19 Pandemic
Haunschild, Jasmin; Pauli, Selina; Reuter, Christian
GoodIT 21: Proceedings of the Conference on Information Technology for Social Good, 2021, p.151-156
Information Overload in Crisis Management: Bilingual Evaluation of Embedding Models for Clustering Social Media Posts in Emergencies
Bayer, Markus; Kaufhold, Marc-André; Reuter, Christian
Proceedings of the European Conference on Information Systems (ECIS), 2021
Stronger Together: How Neighborhood Groups Build up a Virtual Network during the COVID-19 Pandemic
Haesler, Steffen; Schmid, Stefka; Vierneisel, Annemike Sophia; Reuter, Christian
Proceedings of the ACM: Human Computer Interaction (PACM): Computer-Supported Cooperative Work and Social Computing, 2021
Towards Resilient Critical Infrastructures - Motivating Users to Contribute to Smart Grid Resilience
Egert, Rolf; Gerber, Nina; Haunschild, Jasmin; Kuehn, Philipp; Zimmermann, Verena
i-com - Journal of Interactive Media, 2021, Vol.20, p.161-175
Measuring Spillover Effects from Defense to Civilian Sectors – A Quantitative Approach Using LinkedIn
Riebe, Thea; Schmid, Stefka; Reuter, Christian
Defence and Peace Economics, 2021, Vol.32, p.773-785
Bridging from Crisis to Everyday Life – An Analysis of User Reviews of the Warning App NINA and the COVID-19 Information Apps CoroBuddy and DarfIchDas
Haunschild, Jasmin; Reuter, Christian
CSCW 21 Companion: Conference Companion Publication of the 2021 on Computer Supported Cooperative Work and Social Computing, 2021, p.72-78
Information Refinement Technologies for Crisis Informatics: User Expectations and Design Principles for Social Media and Mobile Apps
Kaufhold, Marc-André
Nudge or Restraint: How do People Assess Nudging in Cybersecurity - A Representative Study in Germany
Hartwig, Katrin; Reuter, Christian
European Symposium on Usable Security (EuroUSEC), 2021, p.141-150
Finding Secret Treasure? Improving Memorized Secrets Through Gamification
Hartwig, Katrin; Englisch, Atlas; Thomson, Jan Pelle; Reuter, Christian
European Symposium on Usable Security (EuroUSEC), 2021, p.105-117
Nutzer, Sammler, Entscheidungsträger? Arten der Bürgerbeteiligung in Smart Cities
Haunschild, Jasmin; Demuth, Kilian; Geiß, Henri-Jacques; Richter, Christian; Reuter, Christian
HMD Praxis der Wirtschaftsinformatik, 2021, Vol.58
Perceptions of Police Technology Use and Attitudes Towards the Police - A Representative Survey of the German Population
Haunschild, Jasmin; Reuter, Christian
Workshop-Proceedings Mensch und Computer, 2021
The Impact of Organizational Structure and Technology Use on Collaborative Practices in Computer Emergency Response Teams: An Empirical Study
Riebe, Thea; Kaufhold, Marc-André; Reuter, Christian
Proceedings of the ACM: Human Computer Interaction (PACM): Computer-Supported Cooperative Work and Social Computing, 2021, Vol.5
CySecAlert: An Alert Generation System for Cyber Security Events Using Open Source Intelligence Data
Riebe, Thea; Wirth, Tristan; Bayer, Markus; Kuehn, Philipp; Kaufhold, Marc-André; Knauthe, Volker; Guthe, Stefan; Reuter, Christian
Information and Communications Security (ICICS), 2021, p.429-446
Design and Evaluation of Deep Learning Models for Real-Time Credibility Assessment in Twitter
Kaufhold, Marc-André; Bayer, Markus; Hartung, Daniel; Reuter, Christian
30th International Conference on Artificial Neural Networks (ICANN2021), 2021, p.1-13
Demo: OpenHaystack: A Framework for Tracking Personal Bluetooth Devices via Apple s Massive Find My Network
Alexander Heinrich; Milan Stute; Matthias Hollick
WiSec ?21: Proceedings of the 14th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2021, p.374-376
OVANA: An Approach to Analyze and Improve the Information Quality of Vulnerability Databases
Kuehn, Philipp; Bayer, Markus; Wendelborn, Marc; Reuter, Christian
Proceedings of the 16th International Conference on Availability, Reliability and Security, 2021, p.11
Citizens Perceived Information Responsibilities and Information Challenges During the COVID-19 Pandemic
Haunschild, Jasmin; Pauli, Selina; Reuter, Christian
2021 ACM International Conference on Information Technology for Social Good (GoodIT), 2021
The Impact of Organizational Structure and Technology Use on Collaborative Practices in Computer Emergency Response Teams: An Empirical Study
Riebe, Thea; Kaufhold, Marc-André; Reuter, Christian
Proceedings of the ACM: Human Computer Interaction (PACM): Computer-Supported Cooperative Work and Social Computing, 2021
Perceptions of Police Technology Use and Attitudes Towards the Police - A Representative Survey of the German Population
Haunschild, Jasmin; Reuter, Christian
Workshop-Proceedings Mensch und Computer, 2021
Nutzer, Sammler, Entscheidungsträger? Arten der Bürgerbeteiligung in Smart Cities
Haunschild, Jasmin; Demuth, Kilian; Geiß, Henri-Jacques; Richter, Christian; Reuter, Christian
HMD Praxis der Wirtschaftsinformatik, 2021, Vol.58
Design and Evaluation of Deep Learning Models for Real-Time Credibility Assessment in Twitter
Kaufhold, Marc-André; Bayer, Markus; Hartung, Daniel; Reuter, Christian
30th International Conference on Artificial Neural Networks (ICANN2021), 2021
CySecAlert: An Alert Generation System for Cyber Security Events Using Open Source Intelligence Data
Riebe, Thea; Wirth, Tristan; Bayer, Markus; Kuehn, Philipp; Kaufhold, Marc-André; Knauthe, Volker; Guthe, Stefan; Reuter, Christian
International Conference on Information and Communications Security (ICICS), 2021
Cultural Violence and Fragmentation on Social Media: Interventions and Countermeasures by Humans and Social Bots
Haunschild, Jasmin; Kaufhold, Marc-André; Reuter, Christian
Cyber Security Meets Security Policy: Socio-Technological Dynamics, Political Responses, 2021
Towards Resilient Critical Infrastructures - Motivating Users to Contribute to Smart Grid Resilience
Egert, Rolf; Gerber, Nina; Haunschild, Jasmin; Kuehn, Philipp; Verena, Zimmermann
i-com - Journal of Interactive Media, 2021
OVANA: An Approach to Analyze and Improve the Information Quality of Vulnerability Databases
Kuehn, Philipp; Bayer, Markus; Wendelborn, Marc; Reuter, Christian
Proceedings of the 16th International Conference on Availability, Reliability and Security, 2021, p.11
Bridging from Crisis to Everyday Life – An Analysis of User Reviews of the Warning App NINA and the COVID-19 Information Apps CoroBuddy and DarfIchDas
Haunschild, Jasmin; Reuter, Christian
CSCW 21 Companion: Conference Companion Publication of the 2021 on Computer Supported Cooperative Work and Social Computing, 2021
Connected Self-Organized Citizens in Crises: An Interdisciplinary Resilience Concept for Neighborhoods
Haesler, Steffen; Mogk, Ragnark; Putz, Florentin; Logan, Kevin T.; Thiessen, Nadja; Kleinschnitger, Katharina; Baumgärtner, Lars; Stroscher, Jan-Philipp; Reuter, Christian; Knodt, Michele; Hollick, Matthias
CSCW 21 Companion: Conference Companion Publication of the 2021 on Computer Supported Cooperative Work and Social Computing, 2021
$\$SoK$\$: Still Plenty of Phish in the Sea—A Taxonomy of $\$User-Oriented$\$ Phishing Interventions and Avenues for Future Research
Franz, Anjuli; Zimmermann, Verena; Albrecht, Gregor; Hartwig, Katrin; Reuter, Christian; Benlian, Alexander; Vogt, Joachim
Seventeenth Symposium on Usable Privacy and Security (SOUPS 2021), 2021, p.339-358
Towards Resilient Critical Infrastructures - Motivating Users to Contribute to Smart Grid Resilience
Egert, Rolf; Gerber, Nina; Haunschild, Jasmin; Kühn, Philipp; Verena, Zimmermann
Armament, Arms Control and Artificial Intelligence. The impact of software, machine learning and artificial intelligence on armament and arms control
Schörnig, Niklas; Reinhold, Thomas
Towards Resilient Critical Infrastructures—Motivating Users to Contribute to Smart Grid Resilience
Egert, Rolf; Gerber, Nina; Haunschild, Jasmin; Kuehn, Philipp; Zimmermann, Verena
i-com, 2021, Vol.20, p.161-175
Sicherheitskritische Mensch-Computer-Interaktion: Interaktive Technologien und Soziale Medien im Krisen- und Sicherheitsmanagement (Zweite Auflage)
Reuter, Christian
Cyber Weapons and Artificial Intelligence – Impact, Influence and the Challenges for Arms Control
Reinhold, Thomas; Reuter, Christian
Armament, Arms Control and Artificial Intelligence. The impact of software, machine learning and artificial intelligence on armament and arms control, 2021
Information Overload in Crisis Management: Bilingual Evaluation of Embedding Models for Clustering Social Media Posts in Emergencies
Bayer, Markus; Kaufhold, Marc-André; Reuter, Christian
Proceedings of the European Conference on Information Systems (ECIS), 2021
Stronger Together: How Neighborhood Groups Build up a Virtual Network during the COVID-19 Pandemic
Haesler, Steffen; Schmid, Stefka; Vierneisel, Annemike Sophia; Reuter, Christian
Proceedings of the ACM: Human Computer Interaction (PACM): Computer-Supported Cooperative Work and Social Computing, 2021
Information Refinement Technologies for Crisis Informatics: User Expectations and Design Principles for Social Media and Mobile Apps
Kaufhold, Marc-André
OpenHaystack: A Framework for Tracking Personal Bluetooth Devices via Apple s Massive Find My Network
Alexander Heinrich; Milan Stute; Matthias Hollick
WiSec ?21: Proceedings of the 14th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2021, p.374-376
LOKI: Development of an Interface for Task-Based, Privacy-Friendly Smart Home Control through LOCal Information Processing: LOKI: Entwicklung Eines Interfaces Für Die Aufgaben-Basierte, Privatsphäre-Freundliche Smart Home-Steuerung Durch LOKale Informationsverarbeitung
Gerber, Paul; Heidinger, Marvin; Stiegelmayer, Julia; Gerber, Nina
Proceedings of Mensch Und Computer 2021, 2021, p.578–581
Investigating Simple Privacy Indicators for Supporting Users When Installing New Mobile Apps
Stöver, Alina; Gerber, Nina; Kaushik, Sushma; Mühlhäuser, Max; Marky, Karola
Extended Abstracts of the 2021 CHI Conference on Human Factors in Computing Systems, 2021
Exploring cybersecurity-related emotions and finding that they are challenging to measure
Renaud, Karen; Zimmermann, Verena; Schürmann, Tim; Böhm, Carlos
Humanities and Social Sciences Communications, 2021, Vol.8, p.1-17
CySecAlert: An Alert Generation System for Cyber Security Events Using Open Source Intelligence Data
Riebe, Thea; Wirth, Tristan; Bayer, Markus; Kuehn, Philipp; Kaufhold, Marc-André; Knauthe, Volker; Guthe, Stefan; Reuter, Christian
International Conference on Information and Communications Security (ICICS), 2021
Where is the Human Got to Go? Artificial Intelligence, Machine Learning, Big Data, Digitalisation, and Human—Robot Interaction in Industry 4.0 and 5.0
Joachim Vogt
AI and Society, 2021
Holonic System Model for Resilient Energy Grid Operation
Rolf Egert; Tim Grube; Florian Volk; Max Mühlhäuser
Energies, 2021
Cultural Violence and Fragmentation on Social Media: Interventions and Countermeasures by Humans and Social Bots
Haunschild, Jasmin; Kaufhold, Marc-André; Reuter, Christian
Cyber Security Meets Security Policy: Socio-Technological Dynamics, Political Responses, 2021
PrivateDrop: Practical Privacy-Preserving Authentication for Apple AirDrop
Alexander Heinrich; Matthias Hollick; Thomas Schneider; Milan Stute; Christian Weinert
30th USENIX Security Symposium, 2021
Exploring energy grid resilience: The impact of data, prosumer awareness, and action
Rolf Egert; Jörg Daubert; Stephen Marsh; Max Mühlhäuser
Patterns, 2021
The Nudge Puzzle: Matching Nudge Interventions to Cybersecurity Decisions
Verena Zimmermann; Karen Renaud
ACM Transactions on Compututer-Human Interaction, 2021, Vol.28, p.1-7
Investigating Simple Privacy Indicators for Supporting Users When Installing New Mobile Apps
Stöver, Alina; Gerber, Nina; Kaushik, Sushma; Mühlhäuser, Max; Marky, Karola
Extended Abstracts of the 2021 CHI Conference on Human Factors in Computing Systems, 2021
Smart Governance for Cybersecurity
Kreutzer, Michael; Scheel, Kirstin
ERCIM News, 2021, Vol.2021, p.6-7
OVANA: An Approach to Analyze and Improve the Information Quality of Vulnerability Databases
Kuehn, Philipp; Bayer, Markus; Wendelborn, Marc; Reuter, Christian
Proceedings of the 16th International Conference on Availability, Reliability and Security, 2021, p.1-11
Information Refinement Technologies for Crisis Informatics: User Expectations and Design Principles for Social Media and Mobile Apps
Kaufhold, Marc-André
Design and Evaluation of Deep Learning Models for Real-Time Credibility Assessment in Twitter
Kaufhold, Marc-André; Bayer, Markus; Hartung, Daniel; Reuter, Christian
30th International Conference on Artificial Neural Networks (ICANN2021), 2021
Nutzer, Sammler, Entscheidungsträger? Arten der Bürgerbeteiligung in Smart Cities
Haunschild, Jasmin; Demuth, Kilian; Geiß, Henri-Jacques; Richter, Christian; Reuter, Christian
HMD Praxis der Wirtschaftsinformatik, 2021, Vol.58
Perceptions of Police Technology Use and Attitudes Towards the Police - A Representative Survey of the German Population
Haunschild, Jasmin; Reuter, Christian
Workshop-Proceedings Mensch und Computer, 2021
The Impact of Organizational Structure and Technology Use on Collaborative Practices in Computer Emergency Response Teams: An Empirical Study
Riebe, Thea; Kaufhold, Marc-André; Reuter, Christian
Proceedings of the ACM: Human Computer Interaction (PACM): Computer-Supported Cooperative Work and Social Computing, 2021
Contemplating Blame in Cyber Security
Renaud, Karen; Musarurwa, Alfred; Zimmermann, Verena
International Conference on Cyber Warfare and Security, 2021, p.309—XIII
Who Can Find My Devices? Security and Privacy of Apple?s Crowd-Sourced Bluetooth Location Tracking System
Alexander Heinrich; Milan Stute; Tim Kornhuber; Matthias Hollick
Proceedings on Privacy Enhancing Technologies, 2021, p.227-245
Mobile Resilience: Designing Mobile Interactive Systems for Societal and Technical Resilience
Reuter, Christian; Kaufhold, Marc-André; Comes, Tina; Knodt, Michèle; Mühlhäuser, Max
MobileHCI 20: 22nd International Conference on Human-Computer Interaction with Mobile Devices and Services, 2020, p.1-3
Crisis Volunteering Nerds: Three Months After COVID-19 Hackathon \#WirVsVirus
Haesler, Steffen; Schmid, Stefka; Reuter, Christian
MobileHCI 20: 22nd International Conference on Human-Computer Interaction with Mobile Devices and Services, 2020, p.1-56
Towards IT Peace Research: Challenges at the Intersection of Peace and Conflict Research and Computer Science
Reuter, Christian
S+F Sicherheit und Frieden / Peace and Security, 2020, Vol.38, p.10-16
Sharing of Cyber Threat Intelligence between States
Kuehn, Philipp; Riebe, Thea; Apelt, Lynn; Jansen, Max; Reuter, Christian
S+F Sicherheit und Frieden / Peace and Security, 2020, Vol.38, p.22-28
Information Refinement Technologies for Crisis Informatics: User Expectations and Design Implications for Social Media and Mobile Apps in Crisis
Kaufhold, Marc-André
Zur naturwissenschaftlich-technischen Friedens- und Konfliktforschung – Aktuelle Herausforderungen und Bewertung der Empfehlungen des Wissenschaftsrats
Reuter, Christian; Altmann, Jürgen; Göttsche, Malte; Himmel, Mirko
Zeitschrift für Friedens- und Konfliktforschung (ZeFKo), 2020, Vol.9, p.143-154
Verfassungs- und völkerrechtliche Fragen im militärischen Cyber- und Informationsraum unter besonderer Berücksichtigung des Parlamentsvorbehalts, der Zurechenbarkeit von Cyberangriffen sowie einer möglichen Anpassung nationaler und internationaler Normen
Reinhold, Thomas
Deutscher Bundestag, Verteidigungsausschuß, 2020, p.1-9
Warning the Public: A Survey on Attitudes, Expectations and Use of Mobile Crisis Apps in Germany
Kaufhold, Marc-André; Haunschild, Jasmin; Reuter, Christian
Proceedings of the European Conference on Information Systems (ECIS), 2020
Towards Secure Urban Infrastructures: Cyber Security Challenges to Information and Communication Technology in Smart Cities
Reuter, Christian; Haunschild, Jasmin; Hollick, Matthias; Mühlhäuser, Max; Vogt, Joachim; Kreutzer, Michael
Mensch und Computer 2020 - Workshopband, 2020, p.1-7
Measuring Spillover Effects from Defense to Civilian Sectors – A Quantitative Approach Using LinkedIn
Riebe, Thea; Schmid, Stefka; Reuter, Christian
Defence and Peace Economics, 2020
Rapid relevance classification of social media posts in disasters and emergencies: A system and evaluation featuring active, incremental and online learning
Kaufhold, Marc-André; Bayer, Markus; Reuter, Christian
Information Processing \& Management, 2020, Vol.57, p.1-32
Sticking with Landlines? Citizens and Police Social Media Use and Expectation During Emergencies
Haunschild, Jasmin; Kaufhold, Marc-André; Reuter, Christian
Proceedings of the International Conference on Wirtschaftsinformatik (WI) (Best Paper Social Impact Award), 2020, p.1-16
3D-Auth: Two-Factor Authentication with Personalized 3D-Printed Items
Marky, Karola; Schmitz, Martin; Zimmermann, Verena; Herbers, Martin; Kunze, Kai; Mühlhäuser, Max
Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems, 2020, p.1–12
Die Veränderung der Vorratsdatenspeicherung in Europa
Riebe, Thea; Haunschild, Jasmin; Divo, Felix; Lang, Matthias; Roitburd, Gerbert; Franken, Jonas; Reuter, Christian
Datenschutz und Datensicherheit - DuD, 2020, Vol.44, p.316-321
Sharing of Cyber Threat Intelligence between States
Kuehn, Philipp; Riebe, Thea; Apelt, Lynn; Jansen, Max; Reuter, Christian
S+F Sicherheit und Frieden / Peace and Security, 2020, Vol.38, p.22-28
How to nudge in cyber security
Karen Renaud; Verena Zimmermann
Network Security, 2020, Vol.2020, p.20
Zur naturwissenschaftlich-technischen Friedens- und Konfliktforschung – Aktuelle Herausforderungen und Bewertung der Empfehlungen des Wissenschaftsrats
Reuter, Christian; Altmann, Jürgen; Göttsche, Malte; Himmel, Mirko
Zeitschrift für Friedens- und Konfliktforschung (ZeFKo), 2020, Vol.9, p.143-154
Rapid relevance classification of social media posts in disasters and emergencies: A system and evaluation featuring active, incremental and online learning
Kaufhold, Marc-André; Bayer, Markus; Reuter, Christian
Information Processing \& Management, 2020, Vol.57, p.1-32
Measuring Spillover Effects from Defense to Civilian Sectors – A Quantitative Approach Using LinkedIn
Riebe, Thea; Schmid, Stefka; Reuter, Christian
Defence and Peace Economics, 2020
Die Veränderung der Vorratsdatenspeicherung in Europa
Riebe, Thea; Haunschild, Jasmin; Divo, Felix; Lang, Matthias; Roitburd, Gerbert; Franken, Jonas; Reuter, Christian
Datenschutz und Datensicherheit - DuD, 2020, Vol.44, p.316-321
Towards Secure Urban Infrastructures: Cyber Security Challenges to Information and Communication Technology in Smart Cities
Reuter, Christian; Haunschild, Jasmin; Hollick, Matthias; Mühlhäuser, Max; Vogt, Joachim; Kreutzer, Michael
Mensch und Computer 2020 - Workshopband, 2020, p.1-7
Mobile Resilience: Designing Mobile Interactive Systems for Societal and Technical Resilience
Reuter, Christian; Kaufhold, Marc-André; Comes, Tina; Knodt, Michèle; Mühlhäuser, Max
MobileHCI 20: 22nd International Conference on Human-Computer Interaction with Mobile Devices and Services, 2020, p.1-3
Warning the Public: A Survey on Attitudes, Expectations and Use of Mobile Crisis Apps in Germany
Kaufhold, Marc-André; Haunschild, Jasmin; Reuter, Christian
Proceedings of the European Conference on Information Systems (ECIS), 2020
Discussing Conflict in Social Media – The Use of Twitter in the Jammu and Kashmir Conflict
Gabel, Sabrina; Reichert, Lilian; Reuter, Christian
Media, War \& Conflict, 2020, p.1-26
Towards IT Peace Research: Challenges at the Intersection of Peace and Conflict Research and Computer Science
Reuter, Christian
S+F Sicherheit und Frieden / Peace and Security, 2020, Vol.38, p.10-16
Information Refinement Technologies for Crisis Informatics: User Expectations and Design Implications for Social Media and Mobile Apps in Crisis
Kaufhold, Marc-André
Sticking with Landlines? Citizens and Police Social Media Use and Expectation During Emergencies
Haunschild, Jasmin; Kaufhold, Marc-André; Reuter, Christian
Proceedings of the International Conference on Wirtschaftsinformatik (WI) (Best Paper Social Impact Award), 2020, p.1-16
Crisis Volunteering Nerds: Three Months After COVID-19 Hackathon \#WirVsVirus
Haesler, Steffen; Schmid, Stefka; Reuter, Christian
MobileHCI 20: 22nd International Conference on Human-Computer Interaction with Mobile Devices and Services, 2020, p.1-56
Discussing Conflict in Social Media – The Use of Twitter in the Jammu and Kashmir Conflict
Gabel, Sabrina; Reichert, Lilian; Reuter, Christian
Media, War \& Conflict, 2020, p.1-26
Verfassungs- und völkerrechtliche Fragen im militärischen Cyber- und Informationsraum unter besonderer Berücksichtigung des Parlamentsvorbehalts, der Zurechenbarkeit von Cyberangriffen sowie einer möglichen Anpassung nationaler und internationaler Normen
Reinhold, Thomas
Deutscher Bundestag, Verteidigungsausschuß, 2020, p.1-9
All in One! User Perceptions on Centralized IoT Privacy Settings
Marky, Karola; Zimmermann, Verena; Stöver, Alina; Hoffmann, Philipp; Kunze, Kai; Mühlhäuser, Max
Extended Abstracts of the 2020 CHI Conference on Human Factors in Computing Systems, 2020, p.1–8
Improving the Usability and UX of the Swiss Internet Voting Interface
Marky, Karola; Zimmermann, Verena; Funk, Markus; Daubert, Jörg; Bleck, Kira; Mühlhäuser, Max
Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems, 2020
3D-Auth: Two-Factor Authentication with Personalized 3D-Printed Items
Marky, Karola; Schmitz, Martin; Zimmermann, Verena; Herbers, Martin; Kunze, Kai; Mühlhäuser, Max
Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems, 2020
All in One! User Perceptions on Centralized IoT Privacy Settings
Marky, Karola; Zimmermann, Verena; Stöver, Alina; Hoffmann, Philipp; Kunze, Kai; Mühlhäuser, Max
Extended Abstracts of the 2020 CHI Conference on Human Factors in Computing Systems, 2020
Towards Secure Urban Infrastructures: Cyber Security Challenges to Information and Communication Technology in Smart Cities
Reuter, Christian; Haunschild, Jasmin; Hollick, Matthias; Mühlhäuser, Max; Vogt, Joachim; Kreutzer, Michael
Mensch und Computer 2020 - Workshopband, 2020, p.1-7
Rapid relevance classification of social media posts in disasters and emergencies: A system and evaluation featuring active, incremental and online learning
Kaufhold, Marc-André; Bayer, Markus; Reuter, Christian
Information Processing \& Management (IPM), 2020, Vol.57, p.1-32
Mobile Resilience: Designing Mobile Interactive Systems for Societal and Technical Resilience
Reuter, Christian; Kaufhold, Marc-André; Comes, Tina; Knodt, Michèle; Mühlhäuser, Max
MobileHCI 20: 22nd International Conference on Human-Computer Interaction with Mobile Devices and Services, 2020, p.1-3
Towards IT Peace Research: Challenges at the Intersection of Peace and Conflict Research and Computer Science
Reuter, Christian
S+F Sicherheit und Frieden / Peace and Security, 2020, Vol.38, p.10-16
Information Refinement Technologies for Crisis Informatics: User Expectations and Design Implications for Social Media and Mobile Apps in Crisis
Kaufhold, Marc-André
Sticking with Landlines? Citizens and Police Social Media Use and Expectation During Emergencies
Haunschild, Jasmin; Kaufhold, Marc-André; Reuter, Christian
Proceedings of the International Conference on Wirtschaftsinformatik (WI) (Best Paper Social Impact Award), 2020, p.1-16
Crisis Volunteering Nerds: Three Months After COVID-19 Hackathon \#WirVsVirus
Haesler, Steffen; Schmid, Stefka; Reuter, Christian
MobileHCI 20: 22nd International Conference on Human-Computer Interaction with Mobile Devices and Services, 2020, p.1-56
Verfassungs- und völkerrechtliche Fragen im militärischen Cyber- und Informationsraum unter besonderer Berücksichtigung des Parlamentsvorbehalts, der Zurechenbarkeit von Cyberangriffen sowie einer möglichen Anpassung nationaler und internationaler Normen
Reinhold, Thomas
Deutscher Bundestag, Verteidigungsausschuss, 2020, p.1-9
Warning the Public: A Survey on Attitudes, Expectations and Use of Mobile Crisis Apps in Germany
Kaufhold, Marc-André; Haunschild, Jasmin; Reuter, Christian
Proceedings of the European Conference on Information Systems (ECIS), 2020
Sharing of Cyber Threat Intelligence between States
Kuehn, Philipp; Riebe, Thea; Apelt, Lynn; Jansen, Max; Reuter, Christian
S+F Sicherheit und Frieden / Peace and Security, 2020, Vol.38, p.22-28
The password is dead, long live the password – A laboratory study on user perceptions of authentication schemes
Verena Zimmermann; Nina Gerber
International Journal of Human-Computer Studies, 2020, Vol.133, p.26-44
Zur naturwissenschaftlich-technischen Friedens- und Konfliktforschung – Aktuelle Herausforderungen und Bewertung der Empfehlungen des Wissenschaftsrats
Reuter, Christian; Altmann, Jürgen; Göttsche, Malte; Himmel, Mirko
Zeitschrift für Friedens- und Konfliktforschung (ZeFKo), 2020, Vol.9, p.143-154
Die Veränderung der Vorratsdatenspeicherung in Europa
Riebe, Thea; Haunschild, Jasmin; Divo, Felix; Lang, Matthias; Roitburd, Gerbert; Franken, Jonas; Reuter, Christian
Datenschutz und Datensicherheit - DuD, 2020, Vol.44, p.316-321
Sensing Technology for Human Activity Recognition: A Comprehensive Survey
Fu, Biying; Damer, Naser; Kirchbuchner, Florian; Kuijper, Arjan
IEEE Access, 2020, Vol.8, p.83791-83820
LIDOR: A Lightweight DoS-Resilient Communication Protocol for Safety-Critical IoT Systems
Milan Stute; Pranay Agarwal; Abhinav Kumar; Arash Asadi; Matthias Hollick
IEEE Internet of Things Journal, 2020, p.6802-6816
RESCUE: A Resilient and Secure Device-to-Device Communication Framework for Emergencies
Milan Stute; Florian Kohnhäuser; Lars Baumgärtner; Lars Almon; Matthias Hollick; Stefan Katzenbeisser; Bernd Freisleben
Transactions on Dependable and Secure Computing, 2020
"Has the GDPR hype affected users’ reaction to cookie disclaimers?"
Kulyk, Oksana; Gerber, Nina; Hilt, Annika; Volkamer, Melanie
Journal of Cybersecurity, 2020, Vol.6
Benefits of formalized computational modeling for understanding user behavior in online privacy research
Schürmann, Tim; Gerber, Nina; Gerber, Paul
Journal of Intellectual Capital, 2020
"Exploring cybersecurity-related emotions and finding that they are challenging to measure"
"Karen Renaud; Verena Zimmermann; Tim Schürmann; Carlos Böhm"
"Humanities and Social Sciences Communications", "2021", Vol."8"