..
  • Sprachen

  • Recent Posts

  • Intern

  • Archiv

  • Meta

  • / cscw / home /
     

    EmerGent – Emergency Management in Social Media Generation

    logo

    Duration: 01.04.2017-31.07.2017

    Sponsorship: Europäische Union – 7th Framework Programme

    Contact person: Dr. Christian ReuterMarc-André Kaufhold M.Sc.Dr. Thomas Ludwig

    The use of social media in disaster situations has become a common phenomenon. Events such as the 2013 European floods or the Love Parade disaster in 2010, show that citizens, for example, use Facebook or Twitter to communicate with each other and (self-) organize help. Emergency service (BOS), such as the fire and police departments, communicate via social media with the public or use the content provided for situation assessment. The target of the research project is to study the positive and negative effects of social media in disaster situations, to enhance the objective and perceived security of citizens. To this end, empirical studies and published studies are used to research current usage patterns and future use potentials. Based on this, prototypes are developed and tested that both citizens and emergency services are supported. Besides the University of Siegen, the University of Paderborn as coordinator, IES Solutions (Italy), Oxford Computer Consultants, Tavistock Institute (both UK) Vestlandsforsking (Norway) and the Federation of European Union Fire Officer Associations (Luxembourg), the European Emergency Number Association (Belgium), the Institute of Fire and rescue technology (Germany) and the Scientific and Research Centre for Fire Protection (Poland) are involved.

    This project is funded by the Seventh Framework Program of the European Community for research, technological development and demonstration with the delivery number 608352.

    More information on www.fp7-emergent.eu

    Publications

    2019


    • Kaufhold, M., Gizikis, A., Reuter, C., Habdank, M. & Grinko, M. (2019)Avoiding Chaotic Use of Social Media during Emergencies: Evaluation of Citizens’ Guidelines

      IN Journal of Contingencies and Crisis Management (JCCM) doi:10.1111/1468-5973.12249
      [BibTeX] [Download PDF]

      @article{kaufhold_avoiding_2019,
      title = {Avoiding {Chaotic} {Use} of {Social} {Media} during {Emergencies}: {Evaluation} of {Citizens}' {Guidelines}},
      url = {http://www.peasec.de/paper/2018/2018_KaufholdGizikisReuterHabdankGrinko_DesignEvaluationCitizenGuidelines_JCCM.pdf https://onlinelibrary.wiley.com/doi/abs/10.1111/1468-5973.12249},
      doi = {10.1111/1468-5973.12249},
      journal = {Journal of Contingencies and Crisis Management (JCCM)},
      author = {Kaufhold, Marc-André and Gizikis, Alexis and Reuter, Christian and Habdank, Matthias and Grinko, Margarita},
      year = {2019},
      keywords = {A-Paper, EmerGent, KontiKat},
      }

    2018


    • Reuter, C., Hughes, A. L. & Kaufhold, M. (2018)Social Media in Crisis Management: An Evaluation and Analysis of Crisis Informatics Research

      IN International Journal on Human-Computer Interaction (IJHCI), Vol. 34, Pages: 280–294 doi:10.1080/10447318.2018.1427832
      [BibTeX] [Abstract] [Download PDF]

      Since the terrorist attacks of 9/11, the use of social media in emergency and crisis events has greatly increased and many studies have concentrated on the use of ICT and social media be-fore, during or after these events. The field of research that these studies fall under is called cri-sis informatics. In this paper, we evaluate and analyze crisis informatics research by looking at case studies of social media use in emergencies, outlining the types of research found in crisis informatics, and expounding upon the forms of interaction that have been researched. Finally, we summarize the achievements from an HCI perspective and outline trends and challenges for future research.

      @article{reuter_social_2018,
      title = {Social {Media} in {Crisis} {Management}: {An} {Evaluation} and {Analysis} of {Crisis} {Informatics} {Research}},
      volume = {34},
      url = {http://www.peasec.de/paper/2018/2018_ReuterHughesKaufhold_SocialMediaCrisisManagementEvaluation_IJHCI.pdf},
      doi = {10.1080/10447318.2018.1427832},
      abstract = {Since the terrorist attacks of 9/11, the use of social media in emergency and crisis events has greatly increased and many studies have concentrated on the use of ICT and social media be-fore, during or after these events. The field of research that these studies fall under is called cri-sis informatics. In this paper, we evaluate and analyze crisis informatics research by looking at case studies of social media use in emergencies, outlining the types of research found in crisis informatics, and expounding upon the forms of interaction that have been researched. Finally, we summarize the achievements from an HCI perspective and outline trends and challenges for future research.},
      number = {4},
      journal = {International Journal on Human-Computer Interaction (IJHCI)},
      author = {Reuter, Christian and Hughes, Amanda Lee and Kaufhold, Marc-André},
      year = {2018},
      keywords = {CSCW, HCI, A-Paper, EmerGent, Frieden, KontiKat, Selected, SMO},
      pages = {280--294},
      }


    • Reuter, C. & Kaufhold, M. (2018)Usable Safety Engineering sicherheitskritischer interaktiver Systeme

      IN Reuter, C. (Ed.), Sicherheitskritische Mensch-Computer-Interaktion: Interaktive Technologien und Soziale Medien im Krisen- und Sicherheitsmanagement Wiesbaden, Germany doi:10.1007/978-3-658-19523-6_2
      [BibTeX] [Abstract] [Download PDF]

      Die Gestaltung gebrauchstauglicher, interaktiver und kooperativer Systeme wird bereits seit den 1980ern in der Disziplin Mensch-Computer-Interaktion (MCI) und Computerunterstützte Gruppenarbeit (CSCW) abgedeckt. Es gibt jedoch einige Besonderheiten der MCI im Kontext sicherheitskritischer Systeme, insbesondere der störungsfreien Nutzung von IT (Safety) zu beachten. Dieses Kapitel stellt Merkmale der Anwendung von Gestaltungsmethoden der MCI in sicherheitskritischen Systemen dar. Hierfür werden zu Beginn die Grundlagen der beiden Gebiete – der MCI sowie des Krisen- und Sicherheitsmanagements – erläutert. Darauf aufbauend werden Ansätze und Methoden der Analyse, des Designs und der Entwicklung sowie der Evaluation der MCI unter besonderer Berücksichtigung sicherheitskritischer Systeme diskutiert. Aspekte wie Risikoanalysen in der Anforderungsanalyse, die Einkalkulierung von Bedienfehlern und Rückfallebenen im Systemdesign gehören ebenso dazu wie besondere Herausforderungen bei Evaluationen.

      @incollection{reuter_usable_2018,
      address = {Wiesbaden, Germany},
      title = {Usable {Safety} {Engineering} sicherheitskritischer interaktiver {Systeme}},
      isbn = {978-3-658-19523-6},
      url = {https://link.springer.com/chapter/10.1007/978-3-658-19523-6_2},
      abstract = {Die Gestaltung gebrauchstauglicher, interaktiver und kooperativer Systeme wird bereits seit den 1980ern in der Disziplin Mensch-Computer-Interaktion (MCI) und Computerunterstützte Gruppenarbeit (CSCW) abgedeckt. Es gibt jedoch einige Besonderheiten der MCI im Kontext sicherheitskritischer Systeme, insbesondere der störungsfreien Nutzung von IT (Safety) zu beachten. Dieses Kapitel stellt Merkmale der Anwendung von Gestaltungsmethoden der MCI in sicherheitskritischen Systemen dar. Hierfür werden zu Beginn die Grundlagen der beiden Gebiete – der MCI sowie des Krisen- und Sicherheitsmanagements – erläutert. Darauf aufbauend werden Ansätze und Methoden der Analyse, des Designs und der Entwicklung sowie der Evaluation der MCI unter besonderer Berücksichtigung sicherheitskritischer Systeme diskutiert. Aspekte wie Risikoanalysen in der Anforderungsanalyse, die Einkalkulierung von Bedienfehlern und Rückfallebenen im Systemdesign gehören ebenso dazu wie besondere Herausforderungen bei Evaluationen.},
      booktitle = {Sicherheitskritische {Mensch}-{Computer}-{Interaktion}: {Interaktive} {Technologien} und {Soziale} {Medien} im {Krisen}- und {Sicherheitsmanagement}},
      publisher = {Springer Vieweg},
      author = {Reuter, Christian and Kaufhold, Marc-André},
      editor = {Reuter, Christian},
      year = {2018},
      doi = {10.1007/978-3-658-19523-6_2},
      keywords = {CSCW, HCI, EmerGent, KontiKat, CRISP},
      pages = {17--40},
      }


    • Kaufhold, M., Rupp, N., Reuter, C., Amelunxen, C. & Cristaldi, M. (2018)112.SOCIAL: Design and Evaluation of a Mobile Crisis App for Bidirectional Communication between Emergency Services and Citizen

      Portsmouth, UK, Publisher: AIS
      [BibTeX] [Download PDF]

      @inproceedings{kaufhold_112social_2018,
      address = {Portsmouth, UK},
      title = {112.{SOCIAL}: {Design} and {Evaluation} of a {Mobile} {Crisis} {App} for {Bidirectional} {Communication} between {Emergency} {Services} and {Citizen}},
      url = {http://ecis2018.eu/wp-content/uploads/2018/09/1458-doc.pdf https://aisel.aisnet.org/ecis2018_rp/81/},
      booktitle = {Proceedings of the {European} {Conference} on {Information} {Systems} ({ECIS})},
      publisher = {AIS},
      author = {Kaufhold, Marc-André and Rupp, Nicola and Reuter, Christian and Amelunxen, Christoph and Cristaldi, Massimo},
      year = {2018},
      keywords = {crisis management, CSCW, A-Paper, EmerGent, KontiKat, social media, bidirectional communication, KooperationHCI, mobile crisis apps},
      }


    • Reuter, C., Kaufhold, M., Spielhofer, T. & Hahne, A. S. (2018)Soziale Medien und Apps in Notsituationen: Eine repräsentative Studie über die Wahrnehmung in Deutschland

      IN BBK Bevölkerungsschutz, Vol. 2, Pages: 22–24
      [BibTeX] [Abstract] [Download PDF]

      Helfer bei Hochwassergefahr mobilisieren oder bei einem Terroranschlag Freunden auf Facebook mitteilen, dass es einem gut geht – immer mehr Menschen nutzen soziale Medien in Notsituationen, Krisen- oder Katastrophenlagen. Schließlich ist es heute kein Geheimnis mehr, dass soziale Medien in jenen Lagen (z. B. Überschwemmungen, Stürme, terroristische Anschläge) für diverse Gruppen (z. B. Bürger, Rettungsdienste) von Nutzen sein können. Während Stärken und Schwächen dieser Nutzung bereits eingehend erforscht wurden, widmen sich nur wenige Studien den betreffenden Wahrnehmungen innerhalb der Bevölkerung. Unsere repräsentative Untersuchung von Einstellungen der Bevölkerung in Deutschland gegenüber der Nutzung sozialer Medien in Notsituationen stellt die erste ihrer Art dar. Dabei zeigt sich, dass ungefähr die Hälfte der Befragten (44 \%) bereits in Notsituationen zum Zwecke des Teilens und / oder Herausfindens von Informationen auf soziale Medien zurückgegriffen hat. Zudem werden falsche Gerüchte in sozialen Medien mehrheitlich (74 \%) als Bedrohung empfunden. Notfall-Apps für das eigene Smartphone werden selten (16 \%) heruntergeladen, wobei Wetter- und Erste-Hilfe-Apps am beliebtesten sind.

      @article{reuter_soziale_2018,
      title = {Soziale {Medien} und {Apps} in {Notsituationen}: {Eine} repräsentative {Studie} über die {Wahrnehmung} in {Deutschland}},
      volume = {2},
      url = {http://www.peasec.de/paper/2018/2018_ReuterKaufholdSpielhoferHahne_SozialeMedienAppsNotsituationen_BBK.pdf},
      abstract = {Helfer bei Hochwassergefahr mobilisieren oder bei einem Terroranschlag Freunden auf Facebook mitteilen, dass es einem gut geht – immer mehr Menschen nutzen soziale Medien in Notsituationen, Krisen- oder Katastrophenlagen. Schließlich ist es heute kein Geheimnis mehr, dass soziale Medien in jenen Lagen (z. B. Überschwemmungen, Stürme, terroristische Anschläge) für diverse Gruppen (z. B. Bürger, Rettungsdienste) von Nutzen sein können. Während Stärken und Schwächen dieser Nutzung bereits eingehend erforscht wurden, widmen sich nur wenige Studien den betreffenden Wahrnehmungen innerhalb der Bevölkerung. Unsere repräsentative Untersuchung von Einstellungen der Bevölkerung in Deutschland gegenüber der Nutzung sozialer Medien in Notsituationen stellt die erste ihrer Art dar. Dabei zeigt sich, dass ungefähr die Hälfte der Befragten (44 \%) bereits in Notsituationen zum Zwecke des Teilens und / oder Herausfindens von Informationen auf soziale Medien zurückgegriffen hat. Zudem werden falsche Gerüchte in sozialen Medien mehrheitlich (74 \%) als Bedrohung empfunden. Notfall-Apps für das eigene Smartphone werden selten (16 \%) heruntergeladen, wobei Wetter- und Erste-Hilfe-Apps am beliebtesten sind.},
      journal = {BBK Bevölkerungsschutz},
      author = {Reuter, Christian and Kaufhold, Marc-André and Spielhofer, Thomas and Hahne, Anna Sophie},
      year = {2018},
      keywords = {CSCW, HCI, EmerGent, KontiKat, SMO},
      pages = {22--24},
      }


    • Reuter, C. & Kaufhold, M. (2018)Informatik für Frieden und Sicherheit

      IN Reuter, C. (Ed.), Sicherheitskritische Mensch-Computer-Interaktion: Interaktive Technologien und Soziale Medien im Krisen- und Sicherheitsmanagement Wiesbaden, Germany doi:10.1007/978-3-658-19523-6_28
      [BibTeX] [Abstract] [Download PDF]

      Die Erkenntnisse aus Naturwissenschaft und Technik hatten bereits immer einen großen Einfluss auf die Art und Weise, wie Kriege und Konflikte ausgetragen werden konnten und ausgetragen wurden. Im Kontext von Frieden und Sicherheit können Erkenntnisse, die eigentlich für zivile Kontexte entwickelt wurden, auch für militärische Auseinandersetzungen genutzt werden (Dual-Use). Seit einigen Jahren betrifft dies insbesondere die Informatik, die durch die militärische Nutzung von Computern, Cyberwar, Information Warfare, einschließlich terroristischer Propaganda, Fake News, Ausspähung und Hacking konfliktäre Auseinandersetzungen unterstützen kann. Auch werden Konflikte vermehrt im digitalen Raum ausgetragen, mit erschwerter Zurechenbarkeit zu einzelnen (angreifenden) Akteuren. Die Informatik bietet jedoch auch für friedensstiftende Aktivitäten einige Möglichkeiten. Dieses Kapitel möchte eine Einführung in dieses an Bedeutung gewinnende Gebiet liefern.

      @incollection{reuter_informatik_2018,
      address = {Wiesbaden, Germany},
      title = {Informatik für {Frieden} und {Sicherheit}},
      isbn = {978-3-658-19523-6},
      url = {https://link.springer.com/chapter/10.1007/978-3-658-19523-6_28},
      abstract = {Die Erkenntnisse aus Naturwissenschaft und Technik hatten bereits immer einen großen Einfluss auf die Art und Weise, wie Kriege und Konflikte ausgetragen werden konnten und ausgetragen wurden. Im Kontext von Frieden und Sicherheit können Erkenntnisse, die eigentlich für zivile Kontexte entwickelt wurden, auch für militärische Auseinandersetzungen genutzt werden (Dual-Use). Seit einigen Jahren betrifft dies insbesondere die Informatik, die durch die militärische Nutzung von Computern, Cyberwar, Information Warfare, einschließlich terroristischer Propaganda, Fake News, Ausspähung und Hacking konfliktäre Auseinandersetzungen unterstützen kann. Auch werden Konflikte vermehrt im digitalen Raum ausgetragen, mit erschwerter Zurechenbarkeit zu einzelnen (angreifenden) Akteuren. Die Informatik bietet jedoch auch für friedensstiftende Aktivitäten einige Möglichkeiten. Dieses Kapitel möchte eine Einführung in dieses an Bedeutung gewinnende Gebiet liefern.},
      booktitle = {Sicherheitskritische {Mensch}-{Computer}-{Interaktion}: {Interaktive} {Technologien} und {Soziale} {Medien} im {Krisen}- und {Sicherheitsmanagement}},
      publisher = {Springer Vieweg},
      author = {Reuter, Christian and Kaufhold, Marc-André},
      editor = {Reuter, Christian},
      year = {2018},
      doi = {10.1007/978-3-658-19523-6_28},
      keywords = {CSCW, EmerGent, Frieden, KontiKat, CRISP},
      pages = {573--595},
      }


    • Kaufhold, M., Riebe, T., Reuter, C., Hester, J., Jeske, D., Knüver, L. & Richert, V. (2018)Business Continuity Management in Micro Enterprises: Perception, Strategies and Use of ICT

      IN International Journal of Information Systems for Crisis Response and Management (IJISCRAM), Vol. 10, Pages: 1–19 doi:10.4018/IJISCRAM.2018010101
      [BibTeX]

      @article{kaufhold_business_2018,
      title = {Business {Continuity} {Management} in {Micro} {Enterprises}: {Perception}, {Strategies} and {Use} of {ICT}},
      volume = {10},
      doi = {10.4018/IJISCRAM.2018010101},
      number = {1},
      journal = {International Journal of Information Systems for Crisis Response and Management (IJISCRAM)},
      author = {Kaufhold, Marc-André and Riebe, Thea and Reuter, Christian and Hester, Julian and Jeske, Danny and Knüver, Lisa and Richert, Viktoria},
      year = {2018},
      keywords = {CSCW, EmerGent, KontiKat, Infrastruktur, RSF, Kooperation, MAKI},
      pages = {1--19},
      }


    • Reuter, C. & Kaufhold, M. (2018)Fifteen Years of Social Media in Emergencies: A Retrospective Review and Future Directions for Crisis Informatics

      IN Journal of Contingencies and Crisis Management (JCCM), Vol. 26, Pages: 41–57 doi:10.1111/1468-5973.12196
      [BibTeX] [Abstract] [Download PDF]

      Social media has been established in many larger emergencies and crises. This process has not started just a few years ago, but already 15 years ago in 2001 after the terrorist attacks of 9/11. In the following years, especially in the last 10, sometimes summarized under the term crisis informatics, a variety of studies focusing on the use of ICT and social media before, during or after nearly every crisis and emergency has arisen. This article aims to recapitulate 15 years of social media in emergencies and its research with a special emphasis on use patterns, role patterns and perception patterns that can be found across different cases in order to point out what has been achieved so far, and what future potentials exist.

      @article{reuter_fifteen_2018,
      title = {Fifteen {Years} of {Social} {Media} in {Emergencies}: {A} {Retrospective} {Review} and {Future} {Directions} for {Crisis} {Informatics}},
      volume = {26},
      url = {http://www.peasec.de/paper/2018/2018_ReuterKaufhold_FifteenYearsSocialMediaEmergencies_JCCM.pdf http://onlinelibrary.wiley.com/doi/10.1111/1468-5973.12196/full},
      doi = {10.1111/1468-5973.12196},
      abstract = {Social media has been established in many larger emergencies and crises. This process has not started just a few years ago, but already 15 years ago in 2001 after the terrorist attacks of 9/11. In the following years, especially in the last 10, sometimes summarized under the term crisis informatics, a variety of studies focusing on the use of ICT and social media before, during or after nearly every crisis and emergency has arisen. This article aims to recapitulate 15 years of social media in emergencies and its research with a special emphasis on use patterns, role patterns and perception patterns that can be found across different cases in order to point out what has been achieved so far, and what future potentials exist.},
      number = {1},
      journal = {Journal of Contingencies and Crisis Management (JCCM)},
      author = {Reuter, Christian and Kaufhold, Marc-André},
      year = {2018},
      keywords = {CSCW, HCI, A-Paper, EmerGent, Frieden, KontiKat, SMO, Terror, Kokos},
      pages = {41--57},
      }


    • Reuter, C., Aal, K., Beham, F., Boden, A., Brauner, F., Ludwig, T., Lukosch, S., Fiedrich, F., Fuchs-Kittowski, F., Geisler, S., Gennen, K., Herrmann, D., Kaufhold, M., Klafft, M., Lipprandt, M., Lo Iacono, L., Pipek, V., Pottebaum, J., Mentler, T., Nestler, S., Stieglitz, S., Sturm, C., Rusch, G., Sackmann, S., Volkamer, M. & Wulf, V. (2018)Die Zukunft sicherheitskritischer Mensch-Computer-Interaktion

      IN Reuter, C. (Ed.), Sicherheitskritische Mensch-Computer-Interaktion: Interaktive Technologien und Soziale Medien im Krisen- und Sicherheitsmanagement Wiesbaden, Germany doi:10.1007/978-3-658-19523-6_30
      [BibTeX] [Abstract] [Download PDF]

      Sicherheitskritische Mensch-Computer-Interaktion ist nicht nur derzeit, sondern auch zukünftig ein äußerst relevantes Thema. Hierbei kann ein Lehr- und Fachbuch, wie dieses, immer nur einen punktuellen Stand abdecken. Dennoch kann der Versuch unternommen werden, aktuelle Trends zu identifizieren und einen Ausblick in die Zukunft zu wagen. Genau das möchte dieses Kapitel erreichen: Es sollen zukünftige Entwicklungen vorausgesagt und versucht werden, diese korrekt einzuordnen. Das ist an dieser Stelle nicht nur durch den Herausgeber, sondern durch Abfrage bei zahlreichen am Lehrbuch beteiligten Autoren geschehen. Neben einem Ausblick auf Grundlagen und Methoden werden dementsprechend auch sicherheitskritische interaktive Systeme und sicherheitskritische kooperative Systeme abgedeckt.

      @incollection{reuter_zukunft_2018,
      address = {Wiesbaden, Germany},
      title = {Die {Zukunft} sicherheitskritischer {Mensch}-{Computer}-{Interaktion}},
      isbn = {978-3-658-19523-6},
      url = {https://link.springer.com/chapter/10.1007/978-3-658-19523-6_30},
      abstract = {Sicherheitskritische Mensch-Computer-Interaktion ist nicht nur derzeit, sondern auch zukünftig ein äußerst relevantes Thema. Hierbei kann ein Lehr- und Fachbuch, wie dieses, immer nur einen punktuellen Stand abdecken. Dennoch kann der Versuch unternommen werden, aktuelle Trends zu identifizieren und einen Ausblick in die Zukunft zu wagen. Genau das möchte dieses Kapitel erreichen: Es sollen zukünftige Entwicklungen vorausgesagt und versucht werden, diese korrekt einzuordnen. Das ist an dieser Stelle nicht nur durch den Herausgeber, sondern durch Abfrage bei zahlreichen am Lehrbuch beteiligten Autoren geschehen. Neben einem Ausblick auf Grundlagen und Methoden werden dementsprechend auch sicherheitskritische interaktive Systeme und sicherheitskritische kooperative Systeme abgedeckt.},
      booktitle = {Sicherheitskritische {Mensch}-{Computer}-{Interaktion}: {Interaktive} {Technologien} und {Soziale} {Medien} im {Krisen}- und {Sicherheitsmanagement}},
      publisher = {Springer Vieweg},
      author = {Reuter, Christian and Aal, Konstantin and Beham, Frank and Boden, Alexander and Brauner, Florian and Ludwig, Thomas and Lukosch, Stephan and Fiedrich, Frank and Fuchs-Kittowski, Frank and Geisler, Stefan and Gennen, Klaus and Herrmann, Dominik and Kaufhold, Marc-André and Klafft, Michael and Lipprandt, Myriam and Lo Iacono, Luigi and Pipek, Volkmar and Pottebaum, Jens and Mentler, Tilo and Nestler, Simon and Stieglitz, Stefan and Sturm, Christian and Rusch, Gebhard and Sackmann, Stefan and Volkamer, Melanie and Wulf, Volker},
      editor = {Reuter, Christian},
      year = {2018},
      doi = {10.1007/978-3-658-19523-6_30},
      keywords = {CSCW, HCI, EmerGent, KontiKat, SMO, book\_section},
      pages = {621--630},
      }


    • Reuter, C. & Kaufhold, M. (2018)Soziale Medien in Notfällen, Krisen und Katastrophen

      IN Reuter, C. (Ed.), Sicherheitskritische Mensch-Computer-Interaktion: Interaktive Technologien und Soziale Medien im Krisen- und Sicherheitsmanagement Wiesbaden doi:10.1007/978-3-658-19523-6_19
      [BibTeX] [Abstract] [Download PDF]

      Die Nutzung sozialer Medien hat sich nicht nur im Alltag, sondern auch in vielen verschiedenen Notfällen, Krisen und Katastrophen etabliert. Dieser Prozess begann bereits vor über 15 Jahren nach den Terroranschlägen vom 11. September 2001. In den darauffolgenden Jahren, vor allem in den vergangenen zehn, wurden eine Vielzahl von Studien veröffentlicht, die sich auf den Gebrauch von Informations- und Kommunikations-technologien und sozialen Medien vor, während oder nach Notfällen konzentrieren. Dieser Forschungsbereich wird auch unter dem Begriff Crisis Informatics zusammengefasst. Das Ziel dieses Kapitels ist es, den Gebrauch von und die Forschung über soziale Medien in Katastrophen und Notfällen in den vergangenen 15 Jahren und mit besonderem Schwerpunkt auf identifizierbare Nutzungsmuster und der Wahrnehmung zusammenzufassen, um die bisherigen Ergebnisse und zukünftigen Potenziale herauszustellen.

      @incollection{reuter_soziale_2018-1,
      address = {Wiesbaden},
      title = {Soziale {Medien} in {Notfällen}, {Krisen} und {Katastrophen}},
      isbn = {978-3-658-19523-6},
      url = {https://link.springer.com/chapter/10.1007/978-3-658-19523-6_19},
      abstract = {Die Nutzung sozialer Medien hat sich nicht nur im Alltag, sondern auch in vielen verschiedenen Notfällen, Krisen und Katastrophen etabliert. Dieser Prozess begann bereits vor über 15 Jahren nach den Terroranschlägen vom 11. September 2001. In den darauffolgenden Jahren, vor allem in den vergangenen zehn, wurden eine Vielzahl von Studien veröffentlicht, die sich auf den Gebrauch von Informations- und Kommunikations-technologien und sozialen Medien vor, während oder nach Notfällen konzentrieren. Dieser Forschungsbereich wird auch unter dem Begriff Crisis Informatics zusammengefasst. Das Ziel dieses Kapitels ist es, den Gebrauch von und die Forschung über soziale Medien in Katastrophen und Notfällen in den vergangenen 15 Jahren und mit besonderem Schwerpunkt auf identifizierbare Nutzungsmuster und der Wahrnehmung zusammenzufassen, um die bisherigen Ergebnisse und zukünftigen Potenziale herauszustellen.},
      booktitle = {Sicherheitskritische {Mensch}-{Computer}-{Interaktion}: {Interaktive} {Technologien} und {Soziale} {Medien} im {Krisen}- und {Sicherheitsmanagement}},
      publisher = {Springer Vieweg},
      author = {Reuter, Christian and Kaufhold, Marc-André},
      editor = {Reuter, Christian},
      year = {2018},
      doi = {10.1007/978-3-658-19523-6_19},
      keywords = {CSCW, HCI, EmerGent, KontiKat, SMO},
      pages = {379--402},
      }


    • Reuter, C., Ludwig, T., Kaufhold, M. & Spielhofer, T. (2018)Studie: Wie sehen Mitarbeiter von Feuerwehr und THW den Einsatz sozialer Medien in Gefahrenlagen?

      IN Crisis Prevention – Fachmagazin für Innere Sicherheit, Bevölkerungsschutz und Katastrophenhilfe, Vol. 1, Pages: 64–66
      [BibTeX] [Download PDF]

      @article{reuter_studie_2018,
      title = {Studie: {Wie} sehen {Mitarbeiter} von {Feuerwehr} und {THW} den {Einsatz} sozialer {Medien} in {Gefahrenlagen}?},
      volume = {1},
      url = {http://www.peasec.de/paper/2018/2018_ReuterLudwigKaufholdSpielhofer_FeuerwehrTHWSozialeMedienGefahrenlagen_CrisisPrevention.pdf},
      journal = {Crisis Prevention – Fachmagazin für Innere Sicherheit, Bevölkerungsschutz und Katastrophenhilfe},
      author = {Reuter, Christian and Ludwig, Thomas and Kaufhold, Marc-André and Spielhofer, Thomas},
      year = {2018},
      keywords = {CSCW, HCI, EmerGent, KontiKat, SMO},
      pages = {64--66},
      }

    2017


    • Reuter, C., Pätsch, K. & Runft, E. (2017)Terrorbekämpfung mithilfe sozialer Medien – ein explorativer Einblick am Beispiel von Twitter

      IN Leimeister, J. M. & Brenner, W. (Eds.). St. Gallen, Switzerland, Publisher: AIS, Pages: 649–663
      [BibTeX] [Abstract] [Download PDF]

      Das Internet und insbesondere soziale Medien werden bekanntermaßen nicht nur zu vermeintlich guten Zwecken genutzt. So findet die Rekrutierung neuer Mitglieder und die Verbreitung von Ideologien des Terrorismus ebenfalls über dieses Medium statt. Aber auch die Terrorismusbekämpfung bedient sich gleicher Werkzeuge. Die Art und Weise dieser Gegenmaßnahmen sowie die Vorgehensweisen sollen in diesem Artikel thematisiert werden. Im ersten Teil wird der Forschungsstand zusammengefasst. Der zweite Teil stellt eine explorative empirische Studie der Terrorismusbekämpfung in sozialen Medien, insbesondere in Twitter, dar. Verschiedene, möglichst charakteristische Formen werden in diesem Rahmen am Beispiel von Twitter strukturiert. Ziel ist es, sich diesem hochrelevanten Gebiet mit dem Ziel von Frieden und Sicherheit aus Perspektive der Wirtschaftsinformatik zu nähern und weiteren Forschungsarbeiten in diesem Gebiet als Grundlage und Ausgangspunkt dienen zu können.

      @inproceedings{reuter_terrorbekampfung_2017,
      address = {St. Gallen, Switzerland},
      title = {Terrorbekämpfung mithilfe sozialer {Medien} – ein explorativer {Einblick} am {Beispiel} von {Twitter}},
      url = {http://www.wineme.uni-siegen.de/paper/2017/2017_ReuterPaetschRunft_TerrorbekaempfungSozialeMedien_WI.pdf http://aisel.aisnet.org/wi2017/track06/paper/6/ http://wineme.uni-siegen.de/paper/2017/2017_ReuterPaetschRunft_TerrorbekaempfungSozialeMedien_WI.pdf},
      abstract = {Das Internet und insbesondere soziale Medien werden bekanntermaßen nicht nur zu vermeintlich guten Zwecken genutzt. So findet die Rekrutierung neuer Mitglieder und die Verbreitung von Ideologien des Terrorismus ebenfalls über dieses Medium statt. Aber auch die Terrorismusbekämpfung bedient sich gleicher Werkzeuge. Die Art und Weise dieser Gegenmaßnahmen sowie die Vorgehensweisen sollen in diesem Artikel thematisiert werden. Im ersten Teil wird der Forschungsstand zusammengefasst. Der zweite Teil stellt eine explorative empirische Studie der Terrorismusbekämpfung in sozialen Medien, insbesondere in Twitter, dar. Verschiedene, möglichst charakteristische Formen werden in diesem Rahmen am Beispiel von Twitter strukturiert. Ziel ist es, sich diesem hochrelevanten Gebiet mit dem Ziel von Frieden und Sicherheit aus Perspektive der Wirtschaftsinformatik zu nähern und weiteren Forschungsarbeiten in diesem Gebiet als Grundlage und Ausgangspunkt dienen zu können.},
      booktitle = {Proceedings of the {International} {Conference} on {Wirtschaftsinformatik} ({WI})},
      publisher = {AIS},
      author = {Reuter, Christian and Pätsch, Katja and Runft, Elena},
      editor = {Leimeister, J.M. and Brenner, W.},
      year = {2017},
      keywords = {CSCW, HCI, A-Paper, EmerGent, Frieden, SMO, Terror},
      pages = {649--663},
      }


    • Reuter, C., Kaufhold, M. & Steinfort, R. (2017)Rumors, Fake News and Social Bots in Conflicts and Emergencies: Towards a Model for Believability in Social Media

      IN Comes, T., Bénaben, F., Hanachi, C. & Lauras, M. (Eds.). Albi, France, Publisher: ISCRAM, Pages: 583–591
      [BibTeX] [Abstract] [Download PDF]

      The use of social media is gaining more and more in importance in ordinary life but also in conflicts and emergencies. The social big data, generated by users, is partially also used as a source for situation assessment, e.g. to receive pictures or to assess the general mood. However, the information’s believability is hard to control and can deceive. Rumors, fake news and social bots are phenomenons that challenge the easy consumption of social media. To address this, our paper explores the believability of content in social media. Based on foundations of information quality we conducted a literature study to derive a three-level model for assessing believability. It summarizes existing assessment approaches, assessment criteria and related measures. On this basis, we describe several steps towards the development of an assessment approach that works across different types of social media.

      @inproceedings{reuter_rumors_2017,
      address = {Albi, France},
      title = {Rumors, {Fake} {News} and {Social} {Bots} in {Conflicts} and {Emergencies}: {Towards} a {Model} for {Believability} in {Social} {Media}},
      url = {http://idl.iscram.org/files/christianreuter/2017/1492_ChristianReuter_etal2017.pdf},
      abstract = {The use of social media is gaining more and more in importance in ordinary life but also in conflicts and emergencies. The social big data, generated by users, is partially also used as a source for situation assessment, e.g. to receive pictures or to assess the general mood. However, the information's believability is hard to control and can deceive. Rumors, fake news and social bots are phenomenons that challenge the easy consumption of social media. To address this, our paper explores the believability of content in social media. Based on foundations of information quality we conducted a literature study to derive a three-level model for assessing believability. It summarizes existing assessment approaches, assessment criteria and related measures. On this basis, we describe several steps towards the development of an assessment approach that works across different types of social media.},
      booktitle = {Proceedings of the {Information} {Systems} for {Crisis} {Response} and {Management} ({ISCRAM})},
      publisher = {ISCRAM},
      author = {Reuter, Christian and Kaufhold, Marc-André and Steinfort, René},
      editor = {Comes, Tina and Bénaben, Frédérick and Hanachi, Chihab and Lauras, Matthieu},
      year = {2017},
      keywords = {CSCW, HCI, EmerGent, Frieden, KontiKat, SMO, Terror},
      pages = {583--591},
      }


    • Reuter, C., Ludwig, T., Kaufhold, M. & Hupertz, J. (2017)Social Media Resilience during Infrastructure Breakdowns using Mobile Ad-Hoc Networks

      IN Wohlgemuth, V., Fuchs-Kittowski, F. & Wittmann, J. (Eds.). Berlin, Germany, Publisher: Springer, Pages: 75–88 doi:10.1007/978-3-319-44711-7_7
      [BibTeX] [Abstract] [Download PDF]

      Social media and instant messaging services are nowadays considered as important communication infrastructures on which people rely on. However, the exchange of content during breakdowns of the underlying technical infrastructures, which sometimes happens based on environmental occurrences, is challenging. Hence, with this paper, we examine the resilience of social media during breakdowns. We discuss communication options and examine ad-hoc functionality for the exchange of social media data between different actors in such cases. To address this, we have developed a concept, which makes use of mobile ad-hoc networks (MANETs) for the spontaneous exchange of information with smartphones. We implemented our concept as the mobile application Social Offline Map (SOMAP) and evaluated it within two iterations (1.0 and 2.0). Finally, we discuss our contribution within the context of related work and the limitations of our approach.

      @inproceedings{reuter_social_2017,
      address = {Berlin, Germany},
      title = {Social {Media} {Resilience} during {Infrastructure} {Breakdowns} using {Mobile} {Ad}-{Hoc} {Networks}},
      url = {http://wineme.uni-siegen.de/paper/2017/2017_Reuteretal_SocialMediaResilienceMANET_EnviroInfo.pdf http://www.wineme.uni-siegen.de/paper/2017/2017_Reuteretal_SocialMediaResilienceMANET_EnviroInfo.pdf},
      doi = {10.1007/978-3-319-44711-7_7},
      abstract = {Social media and instant messaging services are nowadays considered as important communication infrastructures on which people rely on. However, the exchange of content during breakdowns of the underlying technical infrastructures, which sometimes happens based on environmental occurrences, is challenging. Hence, with this paper, we examine the resilience of social media during breakdowns. We discuss communication options and examine ad-hoc functionality for the exchange of social media data between different actors in such cases. To address this, we have developed a concept, which makes use of mobile ad-hoc networks (MANETs) for the spontaneous exchange of information with smartphones. We implemented our concept as the mobile application Social Offline Map (SOMAP) and evaluated it within two iterations (1.0 and 2.0). Finally, we discuss our contribution within the context of related work and the limitations of our approach.},
      booktitle = {Advances and {New} {Trends} in {Environmental} {Informatics} - {Proceedings} of the 30th {EnviroInfo} {Conference}},
      publisher = {Springer},
      author = {Reuter, Christian and Ludwig, Thomas and Kaufhold, Marc-André and Hupertz, Julian},
      editor = {Wohlgemuth, V. and Fuchs-Kittowski, Frank and Wittmann, Jochen},
      year = {2017},
      keywords = {CSCW, HCI, EmerGent, SMO, Infrastruktur, KOKOS, RSF},
      pages = {75--88},
      }


    • Reuter, C., Pätsch, K. & Runft, E. (2017)IT for Peace? Fighting Against Terrorism in Social Media – An Explorative Twitter Study

      IN i-com: Journal of Interactive Media, Vol. 16, Pages: 181–195 doi:https://doi.org/10.1515/icom-2017-0013
      [BibTeX] [Abstract] [Download PDF]

      The Internet and especially social media are not only used for supposedly good purposes. For example, the recruitment of new members and the dissemination of ideologies of terrorism also takes place in the media. However, the fight against terrorism also makes use of the same tools. The type of these countermeasures, as well as the methods, are covered in this work. In the first part, the state of the art is summarized. The second part presents an explorative empirical study of the fight against terrorism in social media, especially on Twitter. Different, preferably characteristic forms are structured within the scope with the example of Twitter. The aim of this work is to approach this highly relevant subject with the goal of peace, safety and safety from the perspective of information systems. Moreover, it should serve following researches in this field as basis and starting point.

      @article{reuter_it_2017,
      title = {{IT} for {Peace}? {Fighting} {Against} {Terrorism} in {Social} {Media} – {An} {Explorative} {Twitter} {Study}},
      volume = {16},
      url = {http://www.peasec.de/paper/2017/2017_ReuterPaetschRunft_ITforPeaceTerrorismSocialMedia_ICOM.pdf https://www.degruyter.com/view/j/icom.2017.16.issue-2/icom-2017-0013/icom-2017-0013.xml?format=INT},
      doi = {https://doi.org/10.1515/icom-2017-0013},
      abstract = {The Internet and especially social media are not only used for supposedly good purposes. For example, the recruitment of new members and the dissemination of ideologies of terrorism also takes place in the media. However, the fight against terrorism also makes use of the same tools. The type of these countermeasures, as well as the methods, are covered in this work. In the first part, the state of the art is summarized. The second part presents an explorative empirical study of the fight against terrorism in social media, especially on Twitter. Different, preferably characteristic forms are structured within the scope with the example of Twitter. The aim of this work is to approach this highly relevant subject with the goal of peace, safety and safety from the perspective of information systems. Moreover, it should serve following researches in this field as basis and starting point.},
      number = {2},
      journal = {i-com: Journal of Interactive Media},
      author = {Reuter, Christian and Pätsch, Katja and Runft, Elena},
      year = {2017},
      keywords = {CSCW, HCI, EmerGent, Frieden, KontiKat, SMO, Terror},
      pages = {181--195},
      }


    • Reuter, C., Kaufhold, M., Leopold, I. & Knipp, H. (2017)Informing the Population: Mobile Warning Apps

      IN Klafft, M. (Ed.), Risk and Crisis Communication in Disaster Prevention and Management Wilhelmshaven
      [BibTeX] [Abstract] [Download PDF]

      Catastrophes like the storms in Europe in spring 2016, but also terrorist attacks regularly not only lead to extensive monetary damage but also threaten human lives. In such situations, the population desires information about the status of damage and safe behaviours. Apps can address this potentially, but comparatively, record a low number of users. Based on Reuter et al. (2017), this article shows the importance of information in disaster situations and illustrates features from current mobile warning apps.

      @incollection{reuter_informing_2017,
      address = {Wilhelmshaven},
      title = {Informing the {Population}: {Mobile} {Warning} {Apps}},
      isbn = {978-3-7450-5448-4},
      url = {http://publica.fraunhofer.de/eprints/urn_nbn_de_0011-n-4527283.pdf#page=35},
      abstract = {Catastrophes like the storms in Europe in spring 2016, but also terrorist attacks regularly not only lead to extensive monetary damage but also threaten human lives. In such situations, the population desires information about the status of damage and safe behaviours. Apps can address this potentially, but comparatively, record a low number of users. Based on Reuter et al. (2017), this article shows the importance of information in disaster situations and illustrates features from current mobile warning apps.},
      booktitle = {Risk and {Crisis} {Communication} in {Disaster} {Prevention} and {Management}},
      publisher = {epubli},
      author = {Reuter, Christian and Kaufhold, Marc-André and Leopold, Inken and Knipp, Hannah},
      editor = {Klafft, Michael},
      year = {2017},
      keywords = {CSCW, HCI, EmerGent, Frieden, KontiKat, Terror},
      pages = {31--41},
      }


    • Reuter, C., Kaufhold, M., Leopold, I. & Knipp, H. (2017)Katwarn, NINA or FEMA? Multi-Method Study on Distribution, Use and Public Views on Crisis Apps

      Guimarães, Portugal, Publisher: AIS, Pages: 2187–2201
      [BibTeX] [Abstract] [Download PDF]

      Crises, such as thunderstorms and an increasing number of (recognised) terroristic attacks in 2015, 2016, and 2017, do not only lead to extensive monetary damage, but also threaten human lives and influence citizens’ perceptions of safety and security. In such situations, the population demands information about the damage and safe behaviour. Although some apps are available to provide this information, the number of users seems relatively low. Focussing on Germany, this study aims to research (1) the distribution of crisis apps in the population, (2) the kinds of crisis apps currently used, as well as (3) needed core functionalities of warning apps. This multi-method study analyses crisis apps by investigating their utilisation quantitatively in a snowball-based survey in Europe (n=1,034) and in a representative survey in Germany (n=1,369). Based on this, the German warning apps Katwarn and NINA and the US-American app FEMA are evaluated qualitatively (n=22). The results revealed requirements which informed the implementation of a warning app prototype. The prototype combines the identified advantages of the apps evaluated in the study, containing warnings and all-clear, recommendations for action, functions to contact friends and helpers. The contributions of this work are findings on the distribution of crisis apps in Europe and Germany (both 16\%), the kinds of crisis apps used (mostly weather and warning apps), and empirically based requirements for warning apps which can be integrated in further developments of existing apps and a prototype for such an app.

      @inproceedings{reuter_katwarn_2017,
      address = {Guimarães, Portugal},
      title = {Katwarn, {NINA} or {FEMA}? {Multi}-{Method} {Study} on {Distribution}, {Use} and {Public} {Views} on {Crisis} {Apps}},
      url = {http://www.peasec.de/paper/2017/2017_ReuterKaufholdLeopoldKnipp_CrisisApps_ECIS.pdf http://aisel.aisnet.org/ecis2017_rp/139/},
      abstract = {Crises, such as thunderstorms and an increasing number of (recognised) terroristic attacks in 2015, 2016, and 2017, do not only lead to extensive monetary damage, but also threaten human lives and influence citizens' perceptions of safety and security. In such situations, the population demands information about the damage and safe behaviour. Although some apps are available to provide this information, the number of users seems relatively low. Focussing on Germany, this study aims to research (1) the distribution of crisis apps in the population, (2) the kinds of crisis apps currently used, as well as (3) needed core functionalities of warning apps. This multi-method study analyses crisis apps by investigating their utilisation quantitatively in a snowball-based survey in Europe (n=1,034) and in a representative survey in Germany (n=1,369). Based on this, the German warning apps Katwarn and NINA and the US-American app FEMA are evaluated qualitatively (n=22). The results revealed requirements which informed the implementation of a warning app prototype. The prototype combines the identified advantages of the apps evaluated in the study, containing warnings and all-clear, recommendations for action, functions to contact friends and helpers. The contributions of this work are findings on the distribution of crisis apps in Europe and Germany (both 16\%), the kinds of crisis apps used (mostly weather and warning apps), and empirically based requirements for warning apps which can be integrated in further developments of existing apps and a prototype for such an app.},
      booktitle = {European {Conference} on {Information} {Systems} ({ECIS})},
      publisher = {AIS},
      author = {Reuter, Christian and Kaufhold, Marc-André and Leopold, Inken and Knipp, Hannah},
      year = {2017},
      keywords = {CSCW, HCI, A-Paper, EmerGent, Frieden, KontiKat, Terror},
      pages = {2187--2201},
      }


    • Kaufhold, M. & Reuter, C. (2017)The Impact of Social Media in Emergencies: A Case Study with the Fire Department of Frankfurt

      IN Comes, T., Bénaben, F., Hanachi, C. & Lauras, M. (Eds.). Albi, France, Publisher: ISCRAM, Pages: 603–612
      [BibTeX] [Abstract] [Download PDF]

      The use of social media is not only part of everyday life but also of crises and emergencies. Many studies focus on the concrete use of social media during a specific emergency, but the prevalence of social media, data access and published research studies allows the examination in a broader and more integrated manner. This work-in-progress paper presents the results of a case study with the Fire Department Frankfurt, which is one of the biggest and most modern fire departments in Germany. The findings relate to social media technologies, organizational structure and roles, information validation, staff skills and resources, and the importance of volunteer communities. In the next step, the results will be integrated into the frame of a comparative case study with the overall aim of examining the impact of social media on how emergency services respond and react in an emergency.

      @inproceedings{kaufhold_impact_2017,
      address = {Albi, France},
      title = {The {Impact} of {Social} {Media} in {Emergencies}: {A} {Case} {Study} with the {Fire} {Department} of {Frankfurt}},
      url = {http://idl.iscram.org/files/marc-andrekaufhold/2017/1494_Marc-AndreKaufhold+ChristianReuter2017.pdf},
      abstract = {The use of social media is not only part of everyday life but also of crises and emergencies. Many studies focus on the concrete use of social media during a specific emergency, but the prevalence of social media, data access and published research studies allows the examination in a broader and more integrated manner. This work-in-progress paper presents the results of a case study with the Fire Department Frankfurt, which is one of the biggest and most modern fire departments in Germany. The findings relate to social media technologies, organizational structure and roles, information validation, staff skills and resources, and the importance of volunteer communities. In the next step, the results will be integrated into the frame of a comparative case study with the overall aim of examining the impact of social media on how emergency services respond and react in an emergency.},
      booktitle = {Proceedings of the {Information} {Systems} for {Crisis} {Response} and {Management} ({ISCRAM})},
      publisher = {ISCRAM},
      author = {Kaufhold, Marc-André and Reuter, Christian},
      editor = {Comes, Tina and Bénaben, Frédérick and Hanachi, Chihab and Lauras, Matthieu},
      year = {2017},
      keywords = {CSCW, HCI, EmerGent, KontiKat, SMO},
      pages = {603--612},
      }


    • Reuter, C., Kaufhold, M., Spielhofer, T. & Hahne, A. S. (2017)Social Media in Emergencies: A Representative Study on Citizens’ Perception in Germany

      IN Proceedings of the ACM: Human Computer Interaction (PACM): Computer-Supported Cooperative Work and Social Computing, Vol. 1, Pages: 1–19 doi:https://doi.org/10.1145/3134725
      [BibTeX] [Abstract] [Download PDF]

      The value of social media in crises, disasters, and emergencies across different events (e.g. floods, storms, terroristic attacks), countries, and for heterogeneous participants (e.g. citizens, emergency services) is now well-attested. Existing work has examined the potentials and weaknesses of its use during specific events. Fewer studies, however, have focused on citizens’ perceptions of social media in emergencies, and none have deployed a representative sample to examine this. We present the results of the first representative study on citizens’ perception of social media in emergencies that we have conducted in Germany. Our study highlights, for example, that around half (45\%) of people have used social media during an emergency to share and / or look for information. In contrast, false rumours on social media (74\%) are perceived as a threat. Moreover, only a minority of people have downloaded a smartphone app for emergencies (16\%), with the most popular ones’ weather and first aid apps.

      @article{reuter_social_2017-1,
      title = {Social {Media} in {Emergencies}: {A} {Representative} {Study} on {Citizens}' {Perception} in {Germany}},
      volume = {1},
      url = {http://www.peasec.de/paper/2017/2017_ReuterKaufholdSpielhoferHahne_SocialMediaEmergenciesGermany_CSCW.pdf},
      doi = {https://doi.org/10.1145/3134725},
      abstract = {The value of social media in crises, disasters, and emergencies across different events (e.g. floods, storms, terroristic attacks), countries, and for heterogeneous participants (e.g. citizens, emergency services) is now well-attested. Existing work has examined the potentials and weaknesses of its use during specific events. Fewer studies, however, have focused on citizens' perceptions of social media in emergencies, and none have deployed a representative sample to examine this. We present the results of the first representative study on citizens' perception of social media in emergencies that we have conducted in Germany. Our study highlights, for example, that around half (45\%) of people have used social media during an emergency to share and / or look for information. In contrast, false rumours on social media (74\%) are perceived as a threat. Moreover, only a minority of people have downloaded a smartphone app for emergencies (16\%), with the most popular ones' weather and first aid apps.},
      number = {2},
      journal = {Proceedings of the ACM: Human Computer Interaction (PACM): Computer-Supported Cooperative Work and Social Computing},
      author = {Reuter, Christian and Kaufhold, Marc-André and Spielhofer, Thomas and Hahne, Anna Sophie},
      year = {2017},
      keywords = {HCI, A-Paper, EmerGent, KontiKat, Selected, SMO},
      pages = {1--19},
      }


    • Reuter, C. & Spielhofer, T. (2017)Towards Social Resilience: A Quantitative and Qualitative Survey on Citizens’ Perception of Social Media in Emergencies in Europe

      IN Journal Technological Forecasting and Social Change (TFSC), Vol. 121, Pages: 168–180 doi:10.1016/j.techfore.2016.07.038
      [BibTeX] [Abstract] [Download PDF]

      Social media is increasingly being used during emergencies. Most available studies are focused on how citizens and/or authorities use these technologies in concrete events. However, larger quantitative studies with significant results on attitudes, needs and future plans of citizens in such events are not available – especially such of a comparative nature related to emergency services. As part of the EU project ‘EmerGent’ this article presents the findings of a survey of 1034 citizens across 30 European countries conducted between February and June 2015 to explore citizens’ attitudes towards the use of social media for private purposes and in emergency situations. The article briefly compares these findings with a second survey conducted with 761 emergency service staff across 32 European countries from September to December 2014. The aim of the overall study is to discuss citizens’ attitudes towards social media in emergencies in order to derive challenges and opportunities for social resilience.

      @article{reuter_towards_2017,
      title = {Towards {Social} {Resilience}: {A} {Quantitative} and {Qualitative} {Survey} on {Citizens}' {Perception} of {Social} {Media} in {Emergencies} in {Europe}},
      volume = {121},
      url = {http://www.wineme.uni-siegen.de/paper/2016/2016_reuterspielhoefer_towardssocialresilience-citizensurvey_tfsc.pdf http://www.sciencedirect.com/science/article/pii/S0040162516301986 http://wineme.uni-siegen.de/paper/2016/2016_reuterspielhoefer_towardssocial},
      doi = {10.1016/j.techfore.2016.07.038},
      abstract = {Social media is increasingly being used during emergencies. Most available studies are focused on how citizens and/or authorities use these technologies in concrete events. However, larger quantitative studies with significant results on attitudes, needs and future plans of citizens in such events are not available - especially such of a comparative nature related to emergency services. As part of the EU project ‘EmerGent' this article presents the findings of a survey of 1034 citizens across 30 European countries conducted between February and June 2015 to explore citizens' attitudes towards the use of social media for private purposes and in emergency situations. The article briefly compares these findings with a second survey conducted with 761 emergency service staff across 32 European countries from September to December 2014. The aim of the overall study is to discuss citizens' attitudes towards social media in emergencies in order to derive challenges and opportunities for social resilience.},
      journal = {Journal Technological Forecasting and Social Change (TFSC)},
      author = {Reuter, Christian and Spielhofer, Thomas},
      year = {2017},
      keywords = {CSCW, A-Paper, EmerGent, SMO, RSF},
      pages = {168--180},
      }


    • Reuter, C., Kaufhold, M. & Ludwig, T. (2017)End-User Development and Social Big Data – Towards Tailorable Situation Assessment with Social Media

      IN Paternò, F. & Wulf, V. (Eds.), New Perspectives in End-User Development doi:10.1007/978-3-319-60291-2_12
      [BibTeX] [Abstract] [Download PDF]

      The amount of data being available is increasing rapidly. Based on the technological advances with mobile and ubiquitous computing, the use of social media is getting more and more usual in daily life as well as in extraordinary situations, such as crises. Not surprisingly, this increasing use is one reason why data on the internet is also developing that fast. Currently, more than 3 billion people use the internet and the majority is also registered with social media services such as Facebook or Twitter. While processing this kind of data by the majority of non-technical users, concepts of End-User Development (EUD) are important. This chapter researches how concepts of EUD might be applied to handle social big data. Based on foundations and an empirical pre-study, we explore how EUD can support the gathering and assessment process of social media. In this context, we investigate how end-users can articulate their personal quality criteria appropriately and how the selection of relevant data can be supported by EUD approaches. We present a tailorable social media gathering service and quality assessment service for social media content, which has been implemented and integrated into an application for both volunteers and the emergency services.

      @incollection{reuter_end-user_2017,
      title = {End-{User} {Development} and {Social} {Big} {Data} - {Towards} {Tailorable} {Situation} {Assessment} with {Social} {Media}},
      isbn = {978-3-319-60290-5},
      url = {http://www.peasec.de/paper/2017/2017_ReuterKaufholdLudwig_EUDSocialBigData_EUD.pdf https://link.springer.com/chapter/10.1007/978-3-319-60291-2_12},
      abstract = {The amount of data being available is increasing rapidly. Based on the technological advances with mobile and ubiquitous computing, the use of social media is getting more and more usual in daily life as well as in extraordinary situations, such as crises. Not surprisingly, this increasing use is one reason why data on the internet is also developing that fast. Currently, more than 3 billion people use the internet and the majority is also registered with social media services such as Facebook or Twitter. While processing this kind of data by the majority of non-technical users, concepts of End-User Development (EUD) are important. This chapter researches how concepts of EUD might be applied to handle social big data. Based on foundations and an empirical pre-study, we explore how EUD can support the gathering and assessment process of social media. In this context, we investigate how end-users can articulate their personal quality criteria appropriately and how the selection of relevant data can be supported by EUD approaches. We present a tailorable social media gathering service and quality assessment service for social media content, which has been implemented and integrated into an application for both volunteers and the emergency services.},
      booktitle = {New {Perspectives} in {End}-{User} {Development}},
      publisher = {Springer},
      author = {Reuter, Christian and Kaufhold, Marc-André and Ludwig, Thomas},
      editor = {Paternò, Fabio and Wulf, Volker},
      year = {2017},
      doi = {10.1007/978-3-319-60291-2_12},
      keywords = {CSCW, HCI, EmerGent, SMO, KOKOS},
      pages = {307--332},
      }


    • Reuter, C., Pätsch, K. & Runft, E. (2017)Terrorbekämpfung mithilfe sozialer Medien – ein explorativer Einblick am Beispiel von Twitter

      St. Gallen, Switzerland, Pages: Accepted
      [BibTeX] [Abstract] [Download PDF]

      Das Internet und insbesondere soziale Medien werden bekanntermaßen nicht nur zu vermeintlich guten Zwecken genutzt. So findet die Rekrutierung neuer Mitglieder und die Verbreitung von Ideologien des Terrorismus ebenfalls über dieses Medium statt. Aber auch die Terrorismusbekämpfung bedient sich gleicher Werkzeuge. Die Art und Weise dieser Gegenmaßnahmen sowie die Vorgehensweisen sollen in diesem Artikel thematisiert werden. Im ersten Teil wird der Forschungsstand zusammengefasst. Der zweite Teil stellt eine explorative empirische Studie der Terrorismusbekämpfung in sozialen Medien, insbesondere in Twitter, dar. Verschiedene, möglichst charakteristische Formen werden in diesem Rahmen am Beispiel von Twitter strukturiert. Ziel ist es, sich diesem hochrelevanten Gebiet mit dem Ziel von Frieden und Sicherheit aus Perspektive der Wirtschaftsinformatik zu nähern und weiteren Forschungsarbeiten in diesem Gebiet als Grundlage und Ausgangspunkt dienen zu können.

      @inproceedings{reuter_terrorbekampfung_2017-1,
      address = {St. Gallen, Switzerland},
      title = {Terrorbekämpfung mithilfe sozialer {Medien} – ein explorativer {Einblick} am {Beispiel} von {Twitter}},
      url = {http://wineme.uni-siegen.de/paper/2017/2017_ReuterPaetschRunft_TerrorbekaempfungSozialeMedien_WI.pdf},
      abstract = {Das Internet und insbesondere soziale Medien werden bekanntermaßen nicht nur zu vermeintlich guten Zwecken genutzt. So findet die Rekrutierung neuer Mitglieder und die Verbreitung von Ideologien des Terrorismus ebenfalls über dieses Medium statt. Aber auch die Terrorismusbekämpfung bedient sich gleicher Werkzeuge. Die Art und Weise dieser Gegenmaßnahmen sowie die Vorgehensweisen sollen in diesem Artikel thematisiert werden. Im ersten Teil wird der Forschungsstand zusammengefasst. Der zweite Teil stellt eine explorative empirische Studie der Terrorismusbekämpfung in sozialen Medien, insbesondere in Twitter, dar. Verschiedene, möglichst charakteristische Formen werden in diesem Rahmen am Beispiel von Twitter strukturiert. Ziel ist es, sich diesem hochrelevanten Gebiet mit dem Ziel von Frieden und Sicherheit aus Perspektive der Wirtschaftsinformatik zu nähern und weiteren Forschungsarbeiten in diesem Gebiet als Grundlage und Ausgangspunkt dienen zu können.},
      booktitle = {Proceedings of the {International} {Conference} on {Wirtschaftsinformatik}},
      author = {Reuter, Christian and Pätsch, Katja and Runft, Elena},
      year = {2017},
      keywords = {CSCW, A-Paper, EmerGent},
      pages = {Accepted},
      }

    2016


    • Ludwig, T. (2016)Understanding Complex Information Infrastructures: Design Characteristics of ICT Tools for Researching Modern Technology Usage (PhD Thesis) (to appear in Springer)

      [BibTeX]

      @book{ludwig_understanding_2016,
      title = {Understanding {Complex} {Information} {Infrastructures}: {Design} {Characteristics} of {ICT} {Tools} for {Researching} {Modern} {Technology} {Usage} ({PhD} {Thesis}) (to appear in {Springer})},
      author = {Ludwig, Thomas},
      year = {2016},
      keywords = {CSCW, EmerGent, KOKOS, Dissertation},
      }


    • Reuter, C., Mentler, T., Geisler, S., Herczeg, M., Ludwig, T., Pipek, V., Nestler, S. & Sautter, J. (2016)Aktuelle Ansätze zur Mensch-Computer-Interaktion in sicherheitskritischen Systemen

      IN Weyers, B. & Dittmar, A. (Eds.). Aachen, Germany, Publisher: Gesellschaft für Informatik e.V. doi:10.18420/muc2016-ws01-0000
      [BibTeX] [Abstract] [Download PDF]

      Die zunehmende Durchdringung der Lebenswelt mit IT macht auch nicht vor sicherheitskritischen Systemen halt. Anwendungsfelder betreffen kritische Infrastrukturen, Leitstellensysteme, Fahrzeug- und Verkehrsführungssoftware, Prozessführungssysteme, Produktionstechnologien, Anwendung der Medizintechnik, des Krisenmanagements, der Gefahrenabwehr oder des Terrorismus. Die Mensch-Computer-Interaktion in solchen sicherheitskritischen Systemen und Anwendungsfeldern ist eine Herausforderung nicht nur für die Informatik, sondern eine interdisziplinäre Aufgabe an der Schnittstelle vieler Disziplinen. Zunehmend müssen auch mobile Kontexte und Endgeräte sowie soziale Netzwerke in die Betrachtungen einbezogen werden.

      @inproceedings{reuter_aktuelle_2016,
      address = {Aachen, Germany},
      title = {Aktuelle {Ansätze} zur {Mensch}-{Computer}-{Interaktion} in sicherheitskritischen {Systemen}},
      url = {http://dl.mensch-und-computer.de/bitstream/handle/123456789/5056/Reuter_etal_2016.pdf http://wineme.uni-siegen.de/paper/2016/2016_Reuteretal_AktuelleAnsatzeSicherheitskritischeHCI.pdf},
      doi = {10.18420/muc2016-ws01-0000},
      abstract = {Die zunehmende Durchdringung der Lebenswelt mit IT macht auch nicht vor sicherheitskritischen Systemen halt. Anwendungsfelder betreffen kritische Infrastrukturen, Leitstellensysteme, Fahrzeug- und Verkehrsführungssoftware, Prozessführungssysteme, Produktionstechnologien, Anwendung der Medizintechnik, des Krisenmanagements, der Gefahrenabwehr oder des Terrorismus. Die Mensch-Computer-Interaktion in solchen sicherheitskritischen Systemen und Anwendungsfeldern ist eine Herausforderung nicht nur für die Informatik, sondern eine interdisziplinäre Aufgabe an der Schnittstelle vieler Disziplinen. Zunehmend müssen auch mobile Kontexte und Endgeräte sowie soziale Netzwerke in die Betrachtungen einbezogen werden.},
      booktitle = {Mensch \& {Computer}: {Workshopband}},
      publisher = {Gesellschaft für Informatik e.V.},
      author = {Reuter, Christian and Mentler, Tilo and Geisler, Stefan and Herczeg, Michael and Ludwig, Thomas and Pipek, Volkmar and Nestler, Simon and Sautter, Johannes},
      editor = {Weyers, B. and Dittmar, A.},
      year = {2016},
      keywords = {CSCW, HCI, EmerGent, SMO, KOKOS},
      }


    • Reuter, C., Geilen, G. & Gellert, R. (2016)Sicherheit vs. Privatsphäre: Zur Akzeptanz von Überwachung in sozialen Medien im Kontext von Terrorkrisen

      IN Mayr, H. C. & Pinzger, M. (Eds.). Klagenfurt, Publisher: GI-Edition-Lecture Notes in Informatics (LNI)
      [BibTeX] [Abstract] [Download PDF]

      Nach den terroristischen Anschlägen in Paris 2015 und Brüssel 2016 wurde das Bedürfnis nach mehr Sicherheit und Überwachung im Internet laut. Als Folge der Enthüllungen der Überwachungs- und Spionagetechniken der National Security Agency (NSA) durch Edward Snowden 2013 konnte in der Bevölkerung aber auch ein Aufschrei nach erhöhtem Schutz der Privatsphäre im Internet wahrgenommen werden. Die geschilderten Ereignisse verdeutlichen die gegensätzlichen Wünsche nach Sicherheit und Überwachung im Internet sowie Schutz der Privatsphäre. Im ersten Teil dieses Beitrags stellen wir den Stand der Forschung im Bereich Terror, Sicherheit und Privatsphäre in sozialen Medien dar. Im zweiten Teil führen wir eine explorative Studie durch, um zu beleuchten, ob Bürgerinnen und Bürger in Krisenzeiten bereit wären, ihre Privatsphäre im Internet, vor allem in sozialen Netzwerken, zugunsten von Sicherheit zu reduzieren. Basierend auf qualitativen Daten zeigt diese Arbeit Meinungscluster und Tendenzen in Bezug auf das Nullsummenspiel „Sicherheit und Privatsphäre“.

      @inproceedings{reuter_sicherheit_2016,
      address = {Klagenfurt},
      title = {Sicherheit vs. {Privatsphäre}: {Zur} {Akzeptanz} von Überwachung in sozialen {Medien} im {Kontext} von {Terrorkrisen}},
      url = {http://subs.emis.de/LNI/Proceedings/Proceedings259/P-259.pdf#page=1760 http://www.wineme.uni-siegen.de/paper/2016/2016_ReuterGeilenGellert_SicherheitvsPrivatsphaere-Terrorkrise_INF.pdf http://wineme.uni-siegen.de/paper/2016/2016_ReuterGeilenGellert_Sicher},
      abstract = {Nach den terroristischen Anschlägen in Paris 2015 und Brüssel 2016 wurde das Bedürfnis nach mehr Sicherheit und Überwachung im Internet laut. Als Folge der Enthüllungen der Überwachungs- und Spionagetechniken der National Security Agency (NSA) durch Edward Snowden 2013 konnte in der Bevölkerung aber auch ein Aufschrei nach erhöhtem Schutz der Privatsphäre im Internet wahrgenommen werden. Die geschilderten Ereignisse verdeutlichen die gegensätzlichen Wünsche nach Sicherheit und Überwachung im Internet sowie Schutz der Privatsphäre. Im ersten Teil dieses Beitrags stellen wir den Stand der Forschung im Bereich Terror, Sicherheit und Privatsphäre in sozialen Medien dar. Im zweiten Teil führen wir eine explorative Studie durch, um zu beleuchten, ob Bürgerinnen und Bürger in Krisenzeiten bereit wären, ihre Privatsphäre im Internet, vor allem in sozialen Netzwerken, zugunsten von Sicherheit zu reduzieren. Basierend auf qualitativen Daten zeigt diese Arbeit Meinungscluster und Tendenzen in Bezug auf das Nullsummenspiel „Sicherheit und Privatsphäre“.},
      booktitle = {Informatik 2016: von {Menschen} für {Menschen}},
      publisher = {GI-Edition-Lecture Notes in Informatics (LNI)},
      author = {Reuter, Christian and Geilen, Gordian and Gellert, Robin},
      editor = {Mayr, Heinrich C. and Pinzger, Martin},
      year = {2016},
      keywords = {CSCW, HCI, EmerGent, Frieden, SMO, KOKOS, Terror},
      }


    • Reuter, C., Mentler, T., Geisler, S., Herczeg, M., Ludwig, T., Pipek, V., Nestler, S. & Sautter, J. (2016)Proceedings des Workshops “Mensch-Computer-Interaktion in sicherheitskritischen Systemen”

      IN Weyers, B. & Dittmar, A. (Eds.). Aachen, Germany, Publisher: Gesellschaft für Informatik e.V.
      [BibTeX] [Download PDF]

      @inproceedings{reuter_proceedings_2016,
      address = {Aachen, Germany},
      title = {Proceedings des {Workshops} "{Mensch}-{Computer}-{Interaktion} in sicherheitskritischen {Systemen}"},
      url = {http://dl.mensch-und-computer.de/handle/123456789/4876/browse?value=Mensch-Computer-Interaktion+in+sicherheitskritischen+Systemen&type=session http://wineme.uni-siegen.de/paper/2016/2016_proc-sicherheitskritischemmi_muc.pdf},
      booktitle = {Mensch \& {Computer}: {Workshopband}},
      publisher = {Gesellschaft für Informatik e.V.},
      author = {Reuter, Christian and Mentler, Tilo and Geisler, Stefan and Herczeg, Michael and Ludwig, Thomas and Pipek, Volkmar and Nestler, Simon and Sautter, Johannes},
      editor = {Weyers, B. and Dittmar, A.},
      year = {2016},
      keywords = {CSCW, HCI, EmerGent, EMERGENT},
      }


    • Reuter, C. (2016)Emergence as a Characteristic of Resilient Cooperation Technologies

      IN Wohlgemuth, V., Fuchs-Kittowski, F. & Wittmann, J. (Eds.). Berlin, Germany, Pages: 141–144
      [BibTeX] [Download PDF]

      @inproceedings{reuter_emergence_2016,
      address = {Berlin, Germany},
      title = {Emergence as a {Characteristic} of {Resilient} {Cooperation} {Technologies}},
      url = {http://wineme.uni-siegen.de/paper/2016/2016_reuter_emergencecharacteristicresilienttechnologies_enviroinfo.pdf http://www.peasec.de/paper/2016/2016_Reuter_EmergenceCharacteristicResilientTechnologies_EnviroInfo.pdfsticresilienttechnologies_enviroinfo.pdf},
      booktitle = {Environmental {Informatics} – {Stability}, {Continuity}, {Innovation}. {Current} trends and future perspectives based on 30 years of history. {Adjunct} {Proceedings} of the {EnviroInfo} 2016 conference},
      author = {Reuter, Christian},
      editor = {Wohlgemuth, Volker and Fuchs-Kittowski, Frank and Wittmann, Jochen},
      year = {2016},
      keywords = {CSCW, EmerGent, Infrastruktur, RSF},
      pages = {141--144},
      }


    • Reuter, C., Pätsch, K. & Runft, E. (2016)Terrorismus und soziale Medien – Propaganda und Gegenpropaganda

      IN Prinz, W., Borchers, J. & Jarke, M. (Eds.). Aachen, Germany, Publisher: Gesellschaft für Informatik e.V. doi:10.18420/muc2016-mci-0209
      [BibTeX] [Abstract] [Download PDF]

      Der Terrorismus nutzt das Internet und insbesondere soziale Medien bereits seit einiger Zeit zur Rekrutierung neuer Mitglieder und zur Verbreitung ihrer Ideologie. Aber auch deren Gegner nutzen das Internet zur Terrorbekämpfung. Auch wenn es zum Einsatz sozialer Medien in Krisen bereits zahlreiche Veröffentlichungen gibt, wurde deren Einsatz im Terrorismus, einer besonderen Art der Krise, insbesondere in der digitalen Terrorbekämpfung, noch weniger betrachtet. Dieser Artikel fasst im ersten Teil den Stand der Forschung in jenem Bereich zusammen. Im zweiten Teil stellt er eine explorative empirische Studie zur Terrorismusbekämpfung in sozialen Medien dar. Hierzu werden verschiedene, möglichst repräsentative Formen am Beispiel von Twitter analysiert und gegliedert. Ziel ist die Schaffung eines Überblicks, der weiteren Forschungsarbeiten als Grundlage dienen kann.

      @inproceedings{reuter_terrorismus_2016,
      address = {Aachen, Germany},
      title = {Terrorismus und soziale {Medien} – {Propaganda} und {Gegenpropaganda}},
      url = {https://dl.gi.de/bitstream/handle/20.500.12116/178/bitstream_8792.pdf http://dl.mensch-und-computer.de/bitstream/handle/123456789/5017/Reuter_Pätsch_Runft_2016.pdf http://wineme.uni-siegen.de/paper/2016/2016_ReuterPaetschRunft_TerrorismusSozialeMedienGege},
      doi = {10.18420/muc2016-mci-0209},
      abstract = {Der Terrorismus nutzt das Internet und insbesondere soziale Medien bereits seit einiger Zeit zur Rekrutierung neuer Mitglieder und zur Verbreitung ihrer Ideologie. Aber auch deren Gegner nutzen das Internet zur Terrorbekämpfung. Auch wenn es zum Einsatz sozialer Medien in Krisen bereits zahlreiche Veröffentlichungen gibt, wurde deren Einsatz im Terrorismus, einer besonderen Art der Krise, insbesondere in der digitalen Terrorbekämpfung, noch weniger betrachtet. Dieser Artikel fasst im ersten Teil den Stand der Forschung in jenem Bereich zusammen. Im zweiten Teil stellt er eine explorative empirische Studie zur Terrorismusbekämpfung in sozialen Medien dar. Hierzu werden verschiedene, möglichst repräsentative Formen am Beispiel von Twitter analysiert und gegliedert. Ziel ist die Schaffung eines Überblicks, der weiteren Forschungsarbeiten als Grundlage dienen kann.},
      booktitle = {Mensch \& {Computer}: {Tagungsband}},
      publisher = {Gesellschaft für Informatik e.V.},
      author = {Reuter, Christian and Pätsch, Katja and Runft, Elena},
      editor = {Prinz, W. and Borchers, J. and Jarke, M.},
      year = {2016},
      keywords = {CSCW, EmerGent, Frieden, SMO, Terror},
      }


    • Reuter, C., Amelunxen, C. & Moi, M. (2016)Semi-Automatic Alerts and Notifications for Emergency Services based on Cross-Platform Social Media Data –Evaluation of a Prototype

      IN Mayr, H. C. & Pinzger, M. (Eds.). Klagenfurt, Publisher: GI-Edition-Lecture Notes in Informatics (LNI), Pages: 1805–1818
      [BibTeX] [Abstract] [Download PDF]

      The convergence of social networking and mobile media technology is shifting the way how people communicate and gain or share information. People are using social media to a greater extent, also in emergency situations. During disasters throughout the world, such as the 2010 Haiti earthquake, the 2013 European floods, or the terror attacks 2015 in Paris and 2016 in Brussels, this has been illustrated again. Often information about disasters even finds its way faster to social media than it reaches regular news companies and emergency services. However, approaches for processing and analyzing the vast quantities of data produced have even more potential. Yet many emergency services still have not found a way to put this potential to an effective use. Within our project EmerGent we are developing a system to process and analyse information from social media particularly tailored for the specific needs of emergency services. The aim is to transform the high volume of noisy data into a low volume of rich content that is useful to emergency personnel. In the first part of this paper we present our approach from a user interface perspective. The second part deals with the evaluation of the approach and the derivation of future potentials of the approach.

      @inproceedings{reuter_semi-automatic_2016,
      address = {Klagenfurt},
      title = {Semi-{Automatic} {Alerts} and {Notifications} for {Emergency} {Services} based on {Cross}-{Platform} {Social} {Media} {Data} –{Evaluation} of a {Prototype}},
      url = {http://subs.emis.de/LNI/Proceedings/Proceedings259/P-259.pdf#page=1806 http://wineme.uni-siegen.de/paper/2016/2016_ReuterAmelunxenMoi_EvaluationAlertsNotifications_INF.pdf},
      abstract = {The convergence of social networking and mobile media technology is shifting the way how people communicate and gain or share information. People are using social media to a greater extent, also in emergency situations. During disasters throughout the world, such as the 2010 Haiti earthquake, the 2013 European floods, or the terror attacks 2015 in Paris and 2016 in Brussels, this has been illustrated again. Often information about disasters even finds its way faster to social media than it reaches regular news companies and emergency services. However, approaches for processing and analyzing the vast quantities of data produced have even more potential. Yet many emergency services still have not found a way to put this potential to an effective use. Within our project EmerGent we are developing a system to process and analyse information from social media particularly tailored for the specific needs of emergency services. The aim is to transform the high volume of noisy data into a low volume of rich content that is useful to emergency personnel. In the first part of this paper we present our approach from a user interface perspective. The second part deals with the evaluation of the approach and the derivation of future potentials of the approach.},
      booktitle = {Informatik 2016: von {Menschen} für {Menschen}},
      publisher = {GI-Edition-Lecture Notes in Informatics (LNI)},
      author = {Reuter, Christian and Amelunxen, Christoph and Moi, Matthias},
      editor = {Mayr, Heinrich C. and Pinzger, Martin},
      year = {2016},
      keywords = {CSCW, HCI, EmerGent, SMO, Kooperation},
      pages = {1805--1818},
      }


    • Reuter, C., Ludwig, T., Kaufhold, M. & Spielhofer, T. (2016)Emergency Services’ Attitudes towards Social Media: A Quantitative and Qualitative Survey across Europe

      IN International Journal on Human-Computer Studies (IJHCS), Vol. 95, Pages: 96–111 doi:10.1016/j.ijhcs.2016.03.005
      [BibTeX] [Abstract] [Download PDF]

      Various studies show that social media is used in emergencies – and that in spite of possible challenges for emergency services, beneficial use cases can be identified. However, relatively little empirical data is available regarding the attitudes of emergency services towards social media, and almost none of a comparative nature. This article summarizes the findings of a survey conducted of the EU project ‘EmerGent’ with 761 emergency service staff across 32 European countries from September to December 2014. The main aims of the survey were to explore the attitudes expressed by emergency service staff towards social media for private and organizational use as well as the levels and main factors influencing the current and likely future use of social media in their organizations. Based on our results, we discuss possible enhancements of the emergency management cycle using social media.

      @article{reuter_emergency_2016,
      title = {Emergency {Services}' {Attitudes} towards {Social} {Media}: {A} {Quantitative} and {Qualitative} {Survey} across {Europe}},
      volume = {95},
      url = {https://www.wineme.uni-siegen.de/paper/2016/2016_reuteretal_emergencyservicesattiudessurveysocialmedia_ijhcs.pdf http://www.sciencedirect.com/science/article/pii/S1071581916000379 http://wineme.uni-siegen.de/paper/2016/2016_reuteretal_emergencyservicesatt},
      doi = {10.1016/j.ijhcs.2016.03.005},
      abstract = {Various studies show that social media is used in emergencies – and that in spite of possible challenges for emergency services, beneficial use cases can be identified. However, relatively little empirical data is available regarding the attitudes of emergency services towards social media, and almost none of a comparative nature. This article summarizes the findings of a survey conducted of the EU project ‘EmerGent' with 761 emergency service staff across 32 European countries from September to December 2014. The main aims of the survey were to explore the attitudes expressed by emergency service staff towards social media for private and organizational use as well as the levels and main factors influencing the current and likely future use of social media in their organizations. Based on our results, we discuss possible enhancements of the emergency management cycle using social media.},
      journal = {International Journal on Human-Computer Studies (IJHCS)},
      author = {Reuter, Christian and Ludwig, Thomas and Kaufhold, Marc-André and Spielhofer, Thomas},
      year = {2016},
      keywords = {CSCW, HCI, A-Paper, EmerGent, Selected, SMO},
      pages = {96--111},
      }


    • Mentler, T., Reuter, C. & Geisler, S. (2016)Special Issue on Human-Machine Interaction and Cooperation in Safety-Critical Systems

      IN i-com: Journal of Interactive Media, Vol. 15
      [BibTeX] [Download PDF]

      @article{mentler_special_2016,
      title = {Special {Issue} on {Human}-{Machine} {Interaction} and {Cooperation} in {Safety}-{Critical} {Systems}},
      volume = {15},
      url = {https://www.degruyter.com/view/j/icom.2016.15.issue-3/issue-files/icom.2016.15.issue-3.xml},
      number = {3},
      journal = {i-com: Journal of Interactive Media},
      author = {Mentler, Tilo and Reuter, Christian and Geisler, Stefan},
      year = {2016},
      keywords = {CSCW, HCI, EmerGent},
      }


    • Reuter, C., Gellert, R. & Geilen, G. (2016)Reception of Terror in Germany – Security, Privacy and Social Media

      IN Wohlgemuth, V., Fuchs-Kittowski, F. & Wittmann, J. (Eds.). Berlin, Pages: 151–156
      [BibTeX] [Download PDF]

      @inproceedings{reuter_reception_2016,
      address = {Berlin},
      title = {Reception of {Terror} in {Germany} – {Security}, {Privacy} and {Social} {Media}},
      url = {http://wineme.uni-siegen.de/paper/2016/2016_reutergeilengellert_receptionterrorgermany-securityprivacysocialmedia_enviroinfo.pdf http://www.peasec.de/paper/2016/2016_ReuterGeilenGellert_ReceptionTerrorGermany-SecurityPrivacySocialMedia_EnviroInfo_selbst.p},
      booktitle = {Environmental {Informatics} – {Stability}, {Continuity}, {Innovation}. {Current} trends and future perspectives based on 30 years of history. {Adjunct} {Proceedings} of the {EnviroInfo} 2016 conference},
      author = {Reuter, Christian and Gellert, Robin and Geilen, Gordian},
      editor = {Wohlgemuth, Volker and Fuchs-Kittowski, Frank and Wittmann, Jochen},
      year = {2016},
      keywords = {CSCW, EmerGent, Frieden, SMO, KOKOS, Terror},
      pages = {151--156},
      }


    • Reuter, C., Ludwig, T., Kotthaus, C., Kaufhold, M., von Radziewski, E. & Pipek, V. (2016)Big Data in a Crisis? Creating Social Media Datasets for Emergency Management Research

      IN i-com: Journal of Interactive Media, Vol. 15, Pages: 249–264 doi:10.1515/icom-2016-0036
      [BibTeX] [Abstract] [Download PDF]

      A growing body of research in the area of information systems for crisis management is based on data from social media. After almost every larger disaster studies emerge with the focus on the specific use of social media. Much of this research is based on Twitter data, due to the ease of access of this (mainly public) data, compared to (more closed) data, such as Facebook or Google+. Based on the experience gained from a research project on social media in emergencies and our task to collect social media data sets for other partners, we present the design and evaluation of a graphical user interface that supports those stakeholders (such as emergency services or researchers) that are interested in creating social media datasets for further crisis management research. We do not specifically focus on the analysis of social media data. Rather we aim to support the gathering process and how actors without sophisticated technical skills can be supported to get what they want and especially need: relevant social media data. Within this article, we present a practice-oriented approach and implications for designing tools that support the collection of social media data as well as future work.

      @article{reuter_big_2016,
      title = {Big {Data} in a {Crisis}? {Creating} {Social} {Media} {Datasets} for {Emergency} {Management} {Research}},
      volume = {15},
      url = {http://wineme.uni-siegen.de/paper/2016/2016_Reuteretal_BigDatainCrisisDatasets_ICOM.pdf},
      doi = {10.1515/icom-2016-0036},
      abstract = {A growing body of research in the area of information systems for crisis management is based on data from social media. After almost every larger disaster studies emerge with the focus on the specific use of social media. Much of this research is based on Twitter data, due to the ease of access of this (mainly public) data, compared to (more closed) data, such as Facebook or Google+. Based on the experience gained from a research project on social media in emergencies and our task to collect social media data sets for other partners, we present the design and evaluation of a graphical user interface that supports those stakeholders (such as emergency services or researchers) that are interested in creating social media datasets for further crisis management research. We do not specifically focus on the analysis of social media data. Rather we aim to support the gathering process and how actors without sophisticated technical skills can be supported to get what they want and especially need: relevant social media data. Within this article, we present a practice-oriented approach and implications for designing tools that support the collection of social media data as well as future work.},
      number = {3},
      journal = {i-com: Journal of Interactive Media},
      author = {Reuter, Christian and Ludwig, Thomas and Kotthaus, Christoph and Kaufhold, Marc-André and von Radziewski, Elmar and Pipek, Volkmar},
      year = {2016},
      keywords = {CSCW, HCI, PRAXLABS, EmerGent, SMO, KOKOS},
      pages = {249--264},
      }


    • Reuter, C., Ludwig, T. & Pipek, V. (2016)Kooperative Resilienz – ein soziotechnischer Ansatz durch Kooperationstechnologien im Krisenmanagement

      IN Gruppe. Interaktion. Organisation. Zeitschrift für Angewandte Organisationspsychologie (GIO), Vol. 47, Pages: 159–169 doi:10.1007/s11612-016-0317-7
      [BibTeX] [Abstract] [Download PDF]

      Während das Konzept der Resilienz in den Ingenieurwissenschaften vornehmlich auf die Verfügbarkeit technischer Systeme fokussiert ist, betrachtet unser Beitrag Resilienz als soziotechnisches Konstrukt und zeigt Möglichkeiten zur Förderung kooperativer Resilienz, insbesondere durch Kooperationstechnologie, auf. Nach einer Definition von Resilienz im Allgemeinen und im Katastrophenschutz – unserem Anwendungsfeld – sowie im Kontext kooperativer Strukturen, stellen wir unsere Methodik und die entwickelten Kooperationstechnologien vor. Diese adressieren die Zusammenarbeit verschiedener Akteure (z. B. Feuerwehr, Polizei, Bevölkerung) in Schadenslagen. Abschließend diskutieren wir den Beitrag dieser Technologien zur kooperativen Resilienz als Fähigkeit, Krisen der Kooperation durch Anpassungsfähigkeit an geänderte Realitäten mithilfe von Kooperationstechnologie zu überstehen.

      @article{reuter_kooperative_2016,
      title = {Kooperative {Resilienz} – ein soziotechnischer {Ansatz} durch {Kooperationstechnologien} im {Krisenmanagement}},
      volume = {47},
      url = {http://wineme.uni-siegen.de/paper/2016/2016_ReuterLudwigPipek_KooperativeResilienz_GIOJournal.pdf https://www.wineme.uni-siegen.de/paper/2016/2016_reuterludwigpipek_kooperativeresilienz_gio.pdf},
      doi = {10.1007/s11612-016-0317-7},
      abstract = {Während das Konzept der Resilienz in den Ingenieurwissenschaften vornehmlich auf die Verfügbarkeit technischer Systeme fokussiert ist, betrachtet unser Beitrag Resilienz als soziotechnisches Konstrukt und zeigt Möglichkeiten zur Förderung kooperativer Resilienz, insbesondere durch Kooperationstechnologie, auf. Nach einer Definition von Resilienz im Allgemeinen und im Katastrophenschutz – unserem Anwendungsfeld – sowie im Kontext kooperativer Strukturen, stellen wir unsere Methodik und die entwickelten Kooperationstechnologien vor. Diese adressieren die Zusammenarbeit verschiedener Akteure (z. B. Feuerwehr, Polizei, Bevölkerung) in Schadenslagen. Abschließend diskutieren wir den Beitrag dieser Technologien zur kooperativen Resilienz als Fähigkeit, Krisen der Kooperation durch Anpassungsfähigkeit an geänderte Realitäten mithilfe von Kooperationstechnologie zu überstehen.},
      number = {2},
      journal = {Gruppe. Interaktion. Organisation. Zeitschrift für Angewandte Organisationspsychologie (GIO)},
      author = {Reuter, Christian and Ludwig, Thomas and Pipek, Volkmar},
      year = {2016},
      keywords = {CSCW, HCI, EmerGent, KOKOS, RSF, Kooperation, InfoStrom},
      pages = {159--169},
      }


    • Kaufhold, M. & Reuter, C. (2016)The Self-Organization of Digital Volunteers across Social Media: The Case of the 2013 European Floods in Germany

      IN Journal of Homeland Security and Emergency Management, Vol. 13, Pages: 137–166 doi:10.1515/jhsem-2015-0063
      [BibTeX] [Abstract] [Download PDF]

      For almost 15 years, social media have been regularly used during emergencies. One of the most recent, and instructive, examples of its widespread use during a large scale scenario in Europe were the 2013 European floods. Public reporting during the event indicated, and our analysis confirms, that Twitter, Facebook (FB), Google Maps and other services were frequently used by affected citizen and volunteers to coordinate help activities among themselves. We conducted a qualitative analysis of selected emergent volunteer communities in Germany on FB and Twitter among others, and subsequently conducted interviews with FB group founders and activists. Our aim was to analyze the use of social media during this particular event, especially by digital volunteers. Our study illustrates the relevance of social media for German citizens in cases of disaster, focusing especially on the role of the moderator. Our specific emphasis was the embedding of social media in the organizing work done by said volunteers, emphasizing both the patterns of social media use and the challenges that result. We show that different social media were used in different ways: Twitter was used in the main for status updates while FB-pages were mostly intended to provide an overview. FB-groups also coordinated a multitude of activities.

      @article{kaufhold_self-organization_2016,
      title = {The {Self}-{Organization} of {Digital} {Volunteers} across {Social} {Media}: {The} {Case} of the 2013 {European} {Floods} in {Germany}},
      volume = {13},
      url = {http://wineme.uni-siegen.de/paper/2016/2016_KaufholdReuter_SelfOrganizationDigitalVolunteersEuropeanFloods_JHSEM.pdf},
      doi = {10.1515/jhsem-2015-0063},
      abstract = {For almost 15 years, social media have been regularly used during emergencies. One of the most recent, and instructive, examples of its widespread use during a large scale scenario in Europe were the 2013 European floods. Public reporting during the event indicated, and our analysis confirms, that Twitter, Facebook (FB), Google Maps and other services were frequently used by affected citizen and volunteers to coordinate help activities among themselves. We conducted a qualitative analysis of selected emergent volunteer communities in Germany on FB and Twitter among others, and subsequently conducted interviews with FB group founders and activists. Our aim was to analyze the use of social media during this particular event, especially by digital volunteers. Our study illustrates the relevance of social media for German citizens in cases of disaster, focusing especially on the role of the moderator. Our specific emphasis was the embedding of social media in the organizing work done by said volunteers, emphasizing both the patterns of social media use and the challenges that result. We show that different social media were used in different ways: Twitter was used in the main for status updates while FB-pages were mostly intended to provide an overview. FB-groups also coordinated a multitude of activities.},
      number = {1},
      journal = {Journal of Homeland Security and Emergency Management},
      author = {Kaufhold, Marc-André and Reuter, Christian},
      year = {2016},
      keywords = {CSCW, HCI, EmerGent, SMO, KOKOS, Kooperation},
      pages = {137--166},
      }


    • Reuter, C. (2016)Chapter 44: Communication between Power Blackout and Mobile Network Overload

      IN Mehdi Khosrow-Pour (Ed.), E-Health and Telemedicine: Concepts, Methodologies, Tools, and Applications
      [BibTeX] [Abstract] [Download PDF]

      In cases of power outages the communication of organizations responsible for recovery work (emergency services, public administration, energy network operators) to the public poses several challenges, pri-marily the breakdowns of many communication infrastructures and therefore the limitations of the use of classical communication media. This paper surveys technical concepts to support crisis communica-tion during blackouts. Therefore it first investigates the perception and information demands of citizens and communication infrastructures in different scenarios. Furthermore, it analyzes communication infrastructures and their availability in different scenarios. Finally it proposes ‘BlaCom’, an ICT-based concept for blackout communication, which addresses the time span between the occurrence of the energy blackout and the possible overload of the mobile phone network. It combines general information with location-specific and setting-specific information, was implemented as a prototype smartphone application and evaluated with 12 potential end users.

      @incollection{reuter_chapter_2016,
      title = {Chapter 44: {Communication} between {Power} {Blackout} and {Mobile} {Network} {Overload}},
      volume = {II},
      isbn = {978-1-4666-8756-1},
      url = {https://www.wineme.uni-siegen.de/paper/2016/2016_reuter_communicationpowerblackoutnetworkoverload_ehealth.pdf http://wineme.uni-siegen.de/paper/2016/2016_reuter_communicationpowerblackoutnetworkoverload_ehealth.pdf},
      abstract = {In cases of power outages the communication of organizations responsible for recovery work (emergency services, public administration, energy network operators) to the public poses several challenges, pri-marily the breakdowns of many communication infrastructures and therefore the limitations of the use of classical communication media. This paper surveys technical concepts to support crisis communica-tion during blackouts. Therefore it first investigates the perception and information demands of citizens and communication infrastructures in different scenarios. Furthermore, it analyzes communication infrastructures and their availability in different scenarios. Finally it proposes ‘BlaCom', an ICT-based concept for blackout communication, which addresses the time span between the occurrence of the energy blackout and the possible overload of the mobile phone network. It combines general information with location-specific and setting-specific information, was implemented as a prototype smartphone application and evaluated with 12 potential end users.},
      booktitle = {E-{Health} and {Telemedicine}: {Concepts}, {Methodologies}, {Tools}, and {Applications}},
      publisher = {IGI Global},
      author = {Reuter, Christian},
      editor = {{Mehdi Khosrow-Pour}},
      year = {2016},
      keywords = {CSCW, HCI, EmerGent, Infrastruktur, RSF, InfoStrom},
      pages = {876--891},
      }


    • Reuter, C. & Kaufhold, M. (2016)Warum Katastrophenschutzbehörden soziale Medien nicht nutzen wollen

      IN Prinz, W., Borchers, J. & Jarke, M. (Eds.). Aachen, Germany, Publisher: Gesellschaft für Informatik e.V. doi:10.18420/muc2016-mci-0205
      [BibTeX] [Abstract] [Download PDF]

      In Deutschland wurde die Umfassende Nutzung sozialer Medien in Krisenlagen erstmalig während des mitteleuropäischen Hochwassers 2013 öffentlich wahrgenommen (Kaufhold & Reuter, 2014). Twitter, Facebook, Google Maps und weitere Plattformen dienten der Informationsverbreitung Koordination freiwilliger Helfer. Solche Informationen sind potentiell auch für Behörden und Organisationen mit Sicherheitsaufgaben (BOS) von Relevanz, jedoch existieren ebenfalls Gefahren. Da es sich um einen sicherheitskritischen Kontext handelt, ist die Berücksichtigung kritischer Stimmen von besonderer Relevanz. Dieser Artikel möchte sich folglich mit den Gründen deren Nichtnutzung in Katstrophenlagen beschäftigen. Hierfür wird zuerst der Stand der Forschung analysiert, um anschließend die Ergebnisse einer explorativen empirischen Studie vorzustellen.

      @inproceedings{reuter_warum_2016,
      address = {Aachen, Germany},
      title = {Warum {Katastrophenschutzbehörden} soziale {Medien} nicht nutzen wollen},
      url = {http://dl.mensch-und-computer.de/bitstream/handle/123456789/5014/Reuter_Kaufhold_2016.pdf http://wineme.uni-siegen.de/paper/2016/2016_ReuterKaufhold_WarumKatastrophenschutzbehoerdenkeinesozialeMedien_MuC.pdf https://dl.gi.de/bitstream/handle/20.500.12116/},
      doi = {10.18420/muc2016-mci-0205},
      abstract = {In Deutschland wurde die Umfassende Nutzung sozialer Medien in Krisenlagen erstmalig während des mitteleuropäischen Hochwassers 2013 öffentlich wahrgenommen (Kaufhold \& Reuter, 2014). Twitter, Facebook, Google Maps und weitere Plattformen dienten der Informationsverbreitung Koordination freiwilliger Helfer. Solche Informationen sind potentiell auch für Behörden und Organisationen mit Sicherheitsaufgaben (BOS) von Relevanz, jedoch existieren ebenfalls Gefahren. Da es sich um einen sicherheitskritischen Kontext handelt, ist die Berücksichtigung kritischer Stimmen von besonderer Relevanz. Dieser Artikel möchte sich folglich mit den Gründen deren Nichtnutzung in Katstrophenlagen beschäftigen. Hierfür wird zuerst der Stand der Forschung analysiert, um anschließend die Ergebnisse einer explorativen empirischen Studie vorzustellen.},
      booktitle = {Mensch \& {Computer}: {Tagungsband}},
      publisher = {Gesellschaft für Informatik e.V.},
      author = {Reuter, Christian and Kaufhold, Marc-André},
      editor = {Prinz, W. and Borchers, J. and Jarke, M.},
      year = {2016},
      keywords = {CSCW, EmerGent, SMO},
      }


    • Reuter, C. & Hupertz, J. (2016)Sozial auch ohne Netz – Soziale Medien bei Infrastrukturproblemen

      IN Weyers, B. & Dittmar, A. (Eds.). Aachen, Germany, Publisher: Gesellschaft für Informatik e.V. doi:http://dx.doi.org/10.18420/muc2016-ws01-0004
      [BibTeX] [Abstract] [Download PDF]

      Menschen tauschen sich aus und gerade in schwierigen Situationen ist Kommunikation sehr wichtig. In Katastrophenlagen, wie schweren Unwettern, sind jedoch teilweise zentrale Kommunikationsinfrastrukturen betroffen durch der durch Kommunikationsmedien unterstützte Informationsaustausch naturgemäß schwerer möglich als in Zeiten ohne solche Ausfälle. In jenen Fällen ist Kreativität erforderlich. Den Ansatz des Infrastructuring, d.h. der Re-Konzeptualisierung der eigenen Arbeit im Kontext bestehender und potentieller Werkzeuge, aufgreifend werden in diesem Artikel Kommunikationsmöglichkeiten in solchen Fällen untersucht. Basierend auf der Analyse der Verfügbarkeit von Kommunikationsinfrastrukturen wird betrachtet, welche Ansätze zur Kommunikation basierend auf alternativen und dezentralen Infrastrukturen wie MANETs, Wi-Fi und Bluetooth existieren und mithilfe von Smartphones nutzbar gemacht werden können.

      @inproceedings{reuter_sozial_2016,
      address = {Aachen, Germany},
      title = {Sozial auch ohne {Netz} – {Soziale} {Medien} bei {Infrastrukturproblemen}},
      url = {http://dl.mensch-und-computer.de/bitstream/handle/123456789/5090/Reuter_Hupertz_2016.pdf http://wineme.uni-siegen.de/paper/2016/2016_ReuterHupertz_SozialauchohneNetz_MuC.pdf},
      doi = {http://dx.doi.org/10.18420/muc2016-ws01-0004},
      abstract = {Menschen tauschen sich aus und gerade in schwierigen Situationen ist Kommunikation sehr wichtig. In Katastrophenlagen, wie schweren Unwettern, sind jedoch teilweise zentrale Kommunikationsinfrastrukturen betroffen durch der durch Kommunikationsmedien unterstützte Informationsaustausch naturgemäß schwerer möglich als in Zeiten ohne solche Ausfälle. In jenen Fällen ist Kreativität erforderlich. Den Ansatz des Infrastructuring, d.h. der Re-Konzeptualisierung der eigenen Arbeit im Kontext bestehender und potentieller Werkzeuge, aufgreifend werden in diesem Artikel Kommunikationsmöglichkeiten in solchen Fällen untersucht. Basierend auf der Analyse der Verfügbarkeit von Kommunikationsinfrastrukturen wird betrachtet, welche Ansätze zur Kommunikation basierend auf alternativen und dezentralen Infrastrukturen wie MANETs, Wi-Fi und Bluetooth existieren und mithilfe von Smartphones nutzbar gemacht werden können.},
      booktitle = {Mensch \& {Computer}: {Workshopband}},
      publisher = {Gesellschaft für Informatik e.V.},
      author = {Reuter, Christian and Hupertz, Julian},
      editor = {Weyers, B. and Dittmar, A.},
      year = {2016},
      keywords = {CSCW, HCI, EmerGent, SMO, Infrastruktur, KOKOS, RSF},
      }


    • Ludwig, T., Reuter, C. & Pipek, V. (2016)From Publics to Communities: Researching the Path of Shared Issues Through ICT

      IN Computer Supported Cooperative Work: The Journal of Collaborative Computing (JCSCW), Vol. 25, Pages: 193–225 doi:10.1007/s10606-016-9252-y
      [BibTeX] [Abstract] [Download PDF]

      In recent years, citizens’ movements such as the Arab Spring or Euromaidan protests have clearly shown that, whenever affected — whether negatively or positively — by the state and government decisions, citizens act to deal with the shared issues. Groups of people who organize themselves to address (mainly political) issues were defined as a `public’ by the philosopher John Dewey. He believed it is necessary to improve communication to create a `Great Community’ as a cohesive group of a public. Although information and communication technologies (ICT) lead to ambivalent effects on pursuing this goal and often distract the mass of people from discussing these issues, we argue that nowadays ICT can improve communication and has the potential to foster the detection of issues and therefore promote the (trans-)formation of a public into an issue-based community. As our foundation we took a literature study covering the formation of publics and their potential to evolve into communities, as well as their interplay with technology. This formed the basis for the development of our operational model that `follows the issues’ for capturing the (trans-)formation of a public. Based on our model, we outline different perspectives on detecting shared issues as early indicators for publics based on ICT and derive implications for researching this process from a practical perspective.

      @article{ludwig_publics_2016,
      title = {From {Publics} to {Communities}: {Researching} the {Path} of {Shared} {Issues} {Through} {ICT}},
      volume = {25},
      issn = {0925-9724},
      url = {http://wineme.uni-siegen.de/paper/2016/2016_ludwigreuterpipek_frompublicstocommunities_jcscw.pdf http://dx.doi.org/10.1007/s10606-016-9252-y https://www.wineme.uni-siegen.de/paper/2016/2016_ludwigreuterpipek_frompublicstocommunities_jcscw.pdf},
      doi = {10.1007/s10606-016-9252-y},
      abstract = {In recent years, citizens' movements such as the Arab Spring or Euromaidan protests have clearly shown that, whenever affected — whether negatively or positively — by the state and government decisions, citizens act to deal with the shared issues. Groups of people who organize themselves to address (mainly political) issues were defined as a `public' by the philosopher John Dewey. He believed it is necessary to improve communication to create a `Great Community' as a cohesive group of a public. Although information and communication technologies (ICT) lead to ambivalent effects on pursuing this goal and often distract the mass of people from discussing these issues, we argue that nowadays ICT can improve communication and has the potential to foster the detection of issues and therefore promote the (trans-)formation of a public into an issue-based community. As our foundation we took a literature study covering the formation of publics and their potential to evolve into communities, as well as their interplay with technology. This formed the basis for the development of our operational model that `follows the issues' for capturing the (trans-)formation of a public. Based on our model, we outline different perspectives on detecting shared issues as early indicators for publics based on ICT and derive implications for researching this process from a practical perspective.},
      number = {2-3},
      journal = {Computer Supported Cooperative Work: The Journal of Collaborative Computing (JCSCW)},
      author = {Ludwig, Thomas and Reuter, Christian and Pipek, Volkmar},
      year = {2016},
      keywords = {CSCW, HCI, A-Paper, EmerGent, SMO, Kooperation, Communities, Infrastructures, Mobile devices, Publics, Social media},
      pages = {193--225},
      }


    • Mentler, T., Reuter, C. & Geisler, S. (2016)Introduction to this Special Issue on “Human-Machine Interaction and Cooperation in Safety-Critical Systems”

      IN i-com: Journal of Interactive Media, Vol. 15, Pages: 219–226 doi:https://doi.org/10.1515/icom-2016-0037
      [BibTeX] [Abstract] [Download PDF]

      Mission- and safety-critical domains are more and more characterized by interactive and multimedia systems varying from large-scale technologies (e. g. airplanes) to wearable devices (e. g. smartglasses) operated by professional staff or volunteering laypeople. While technical availability, reliability and security of computer-based systems are of utmost importance, outcomes and performances increasingly depend on sufficient human-machine interaction or even cooperation to a large extent. While this i-com Special Issue on “Human-Machine Interaction and Cooperation in Safety-Critical Systems” presents recent research results from specific application domains like aviation, automotive, crisis management and healthcare, this introductory paper outlines the diversity of users, technologies and interaction or cooperation models involved.

      @article{mentler_introduction_2016,
      title = {Introduction to this {Special} {Issue} on “{Human}-{Machine} {Interaction} and {Cooperation} in {Safety}-{Critical} {Systems}”},
      volume = {15},
      url = {http://dl.mensch-und-computer.de/handle/123456789/5518 http://wineme.uni-siegen.de/paper/2016/2016_MentlerReuterGeisler_IntroductionHumanMachineInteractionSafetyCriticalSystems_ICOM.pdf},
      doi = {https://doi.org/10.1515/icom-2016-0037},
      abstract = {Mission- and safety-critical domains are more and more characterized by interactive and multimedia systems varying from large-scale technologies (e. g. airplanes) to wearable devices (e. g. smartglasses) operated by professional staff or volunteering laypeople. While technical availability, reliability and security of computer-based systems are of utmost importance, outcomes and performances increasingly depend on sufficient human-machine interaction or even cooperation to a large extent. While this i-com Special Issue on “Human-Machine Interaction and Cooperation in Safety-Critical Systems” presents recent research results from specific application domains like aviation, automotive, crisis management and healthcare, this introductory paper outlines the diversity of users, technologies and interaction or cooperation models involved.},
      number = {3},
      journal = {i-com: Journal of Interactive Media},
      author = {Mentler, Tilo and Reuter, Christian and Geisler, Stefan},
      year = {2016},
      keywords = {CSCW, HCI, EmerGent, Infrastruktur, Kooperation},
      pages = {219--226},
      }


    • Reuter, C., Ludwig, T., Kotthaus, C., Kaufhold, M., von Radziewski, E. & Pipek, V. (2016)Big Data in a Crisis? Creating Social Media Datasets for Emergency Management Research

      IN i-com: Journal of Interactive Media, Vol. 15, Pages: 249–264 doi:https://doi.org/10.1515/icom-2016-0036,
      [BibTeX]

      @article{reuter_big_2016-1,
      title = {Big {Data} in a {Crisis}? {Creating} {Social} {Media} {Datasets} for {Emergency} {Management} {Research}},
      volume = {15},
      doi = {https://doi.org/10.1515/icom-2016-0036,},
      number = {3},
      journal = {i-com: Journal of Interactive Media},
      author = {Reuter, Christian and Ludwig, Thomas and Kotthaus, Christoph and Kaufhold, Marc-André and von Radziewski, Elmar and Pipek, Volkmar},
      year = {2016},
      keywords = {CSCW, PRAXLABS, EmerGent, SMO, KOKOS},
      pages = {249--264},
      }

    2015


    • Reuter, C., Ludwig, T., Friberg, T., Pratzler-Wanczura, S. & Gizikis, A. (2015)Social Media and Emergency Services? Interview Study on Current and Potential Use in 7 European Countries

      IN International Journal of Information Systems for Crisis Response and Management (IJISCRAM), Vol. 7, Pages: 36–58 doi:10.4018/IJISCRAM.2015040103
      [BibTeX] [Abstract] [Download PDF]

      Social media is much just used for private as well as business purposes, obviously, also during emergencies. Emergency services are often confronted with the amount of information from social media and might consider using them – or not using them. This article highlights the perception of emergency services on social media during emergencies. Within their European research project EMERGENT, the authors therefore conducted an interview study with emergency service staff (N=11) from seven European countries and eight different cities. Their results highlight the current and potential use of social media, the emergency service’s participation in research on social media as well as current challenges, benefits and future plans.

      @article{reuter_social_2015,
      title = {Social {Media} and {Emergency} {Services}? {Interview} {Study} on {Current} and {Potential} {Use} in 7 {European} {Countries}},
      volume = {7},
      issn = {1937-9390},
      url = {https://www.wineme.uni-siegen.de/paper/2015/2015_reuteretal_socialmediaemergencyservices-interview-study_ijiscram.pdf http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/IJISCRAM.2015040103},
      doi = {10.4018/IJISCRAM.2015040103},
      abstract = {Social media is much just used for private as well as business purposes, obviously, also during emergencies. Emergency services are often confronted with the amount of information from social media and might consider using them – or not using them. This article highlights the perception of emergency services on social media during emergencies. Within their European research project EMERGENT, the authors therefore conducted an interview study with emergency service staff (N=11) from seven European countries and eight different cities. Their results highlight the current and potential use of social media, the emergency service's participation in research on social media as well as current challenges, benefits and future plans.},
      number = {2},
      journal = {International Journal of Information Systems for Crisis Response and Management (IJISCRAM)},
      author = {Reuter, Christian and Ludwig, Thomas and Friberg, Therese and Pratzler-Wanczura, Sylvia and Gizikis, Alexis},
      month = apr,
      year = {2015},
      keywords = {CSCW, HCI, PRAXLABS, EmerGent, SMO},
      pages = {36--58},
      }


    • Ludwig, T., Reuter, C., Heukäufer, R. & Pipek, V. (2015)CoTable : Collaborative Social Media Analysis with Multi-Touch Tables

      IN Palen, L., Büscher, M., Comes, T. & Hughes, A. L. (Eds.). Kristiansand, Norway, Publisher: ISCRAM
      [BibTeX] [Abstract] [Download PDF]

      To be able to take efficient measures in crisis management, it is essential for emergency services to get as much details about an actual situation on-site as possible. Currently content from social media plays an important role since those platforms are used to spread crisis-relevant data within the population. Our contribution presents a concept which supports the situation assessment practices of emergency services by collaboratively evaluating and by analyzing citizen-generated content from social media using a multi-touch table. The concept was implemented based on a Microsoft PixelSense and evaluated with 14 participants. The results reveal the impact of subjectivity of the participants, their positioning around the table as well as the uniqueness of social media posts on the collaborative situation assessment with multi-touch tables

      @inproceedings{ludwig_cotable_2015,
      address = {Kristiansand, Norway},
      title = {{CoTable} : {Collaborative} {Social} {Media} {Analysis} with {Multi}-{Touch} {Tables}},
      isbn = {978-82-7117-788-1},
      url = {https://www.wineme.uni-siegen.de/paper/2015/2015_ludwigreuterheukaeuferpipek_cotable_iscram.pdf},
      abstract = {To be able to take efficient measures in crisis management, it is essential for emergency services to get as much details about an actual situation on-site as possible. Currently content from social media plays an important role since those platforms are used to spread crisis-relevant data within the population. Our contribution presents a concept which supports the situation assessment practices of emergency services by collaboratively evaluating and by analyzing citizen-generated content from social media using a multi-touch table. The concept was implemented based on a Microsoft PixelSense and evaluated with 14 participants. The results reveal the impact of subjectivity of the participants, their positioning around the table as well as the uniqueness of social media posts on the collaborative situation assessment with multi-touch tables},
      booktitle = {Proceedings of the {Information} {Systems} for {Crisis} {Response} and {Management} ({ISCRAM})},
      publisher = {ISCRAM},
      author = {Ludwig, Thomas and Reuter, Christian and Heukäufer, Ralf and Pipek, Volkmar},
      editor = {Palen, Leysia and Büscher, Monika and Comes, Tina and Hughes, Amanda L.},
      year = {2015},
      keywords = {cscw, CSCW, HCI, PRAXLABS, EmerGent, SMO, social media, Kooperation, collaboration, coverimage, multi-touch tables},
      }


    • Ludwig, T., Reuter, C. & Pipek, V. (2015)Social Haystack: Dynamic Quality Assessment of Citizen-Generated Content in Social Media during Emergencies

      IN ACM Transactions on Computer-Human Interaction, Vol. 22, Pages: 17:1–17:27
      [BibTeX] [Download PDF]

      @article{ludwig_social_2015-1,
      title = {Social {Haystack}: {Dynamic} {Quality} {Assessment} of {Citizen}-{Generated} {Content} in {Social} {Media} during {Emergencies}},
      volume = {22},
      url = {https://www.wineme.uni-siegen.de/paper/2015/2015_ludwigreuterpipek_socialhaystack_tochi.pdf},
      number = {4},
      journal = {ACM Transactions on Computer-Human Interaction},
      author = {Ludwig, Thomas and Reuter, Christian and Pipek, Volkmar},
      year = {2015},
      keywords = {CSCW, PRAXLABS, A-Paper, EmerGent, MdK},
      pages = {17:1--17:27},
      }


    • Reuter, C. (2015)Special Issue on Human Computer Interaction in Critical System II: Authorities and Industry

      IN International Journal of Information Systems for Crisis Response and Management (IJISCRAM), Vol. 7
      [BibTeX] [Download PDF]

      @article{reuter_special_2015,
      title = {Special {Issue} on {Human} {Computer} {Interaction} in {Critical} {System} {II}: {Authorities} and {Industry}},
      volume = {7},
      url = {https://www.wineme.uni-siegen.de/paper/2015/2015_reuter_editorial-specialissue-hci-criticalsystems-ii.pdf https://www.wineme.uni-siegen.de/paper/2015/2015_ijiscram-specialissue_hci-criticalsystems-ii.pdf},
      number = {3},
      journal = {International Journal of Information Systems for Crisis Response and Management (IJISCRAM)},
      author = {Reuter, Christian},
      year = {2015},
      keywords = {CSCW, PRAXLABS, EmerGent, KOKOS},
      }


    • Reuter, C. (2015)Der Einsatz sozialer Medien in Katastrophenlagen

      IN Crisis Prevention – Fachmagazin für Innere Sicherheit, Bevölkerungsschutz und Katastrophenhilfe, Vol. 5, Pages: 43–44
      [BibTeX] [Download PDF]

      @article{reuter_einsatz_2015,
      title = {Der {Einsatz} sozialer {Medien} in {Katastrophenlagen}},
      volume = {5},
      url = {https://www.wineme.uni-siegen.de/paper/2015/2015_reuter_dereinsatzsozialermedieninkatastrophenlagen_crisisprevention.pdf},
      number = {4},
      journal = {Crisis Prevention – Fachmagazin für Innere Sicherheit, Bevölkerungsschutz und Katastrophenhilfe},
      author = {Reuter, Christian},
      year = {2015},
      keywords = {CSCW, HCI, PRAXLABS, EmerGent, SMO, KOKOS},
      pages = {43--44},
      }


    • Ludwig, T., Reuter, C. & Pipek, V. (2015)Social Haystack: Dynamic Quality Assessment of Citizen-Generated Content in Social Media during Emergencies

      IN ACM Transactions on Computer-Human Interaction (ToCHI), Vol. 21, Pages: Article 17 doi:10.1145/2749461
      [BibTeX] [Abstract] [Download PDF]

      People all over the world are regularly affected by disasters and emergencies. Besides official emergency services, ordinary citizens are getting increasingly involved in crisis response work. They are usually present on-site at the place of incident and use social media to share information about the event. For emergency services, the large amount of citizen-generated content in social media, however, means that finding high-quality information is similar to “finding a needle in a haystack”. This article presents an approach to how a dynamic and subjective quality assessment of citizen-generated content could support the work of emergency services. First, we present results of our empirical study concerning the usage of citizen-generated content by emergency services. Based on our literature review and empirical study, we derive design guidelines and describe a concept for dynamic quality measurement that is implemented as a service-oriented web-application “Social Haystack.” Finally, we outline findings of its evaluation and implications thereof.

      @article{ludwig_social_2015,
      title = {Social {Haystack}: {Dynamic} {Quality} {Assessment} of {Citizen}-{Generated} {Content} in {Social} {Media} during {Emergencies}},
      volume = {21},
      url = {http://dl.acm.org/citation.cfm?id=2798442.2749461 https://www.wineme.uni-siegen.de/paper/2015/2015_ludwigreuterpipek_socialhaystack_tochi.pdf},
      doi = {10.1145/2749461},
      abstract = {People all over the world are regularly affected by disasters and emergencies. Besides official emergency services, ordinary citizens are getting increasingly involved in crisis response work. They are usually present on-site at the place of incident and use social media to share information about the event. For emergency services, the large amount of citizen-generated content in social media, however, means that finding high-quality information is similar to “finding a needle in a haystack”. This article presents an approach to how a dynamic and subjective quality assessment of citizen-generated content could support the work of emergency services. First, we present results of our empirical study concerning the usage of citizen-generated content by emergency services. Based on our literature review and empirical study, we derive design guidelines and describe a concept for dynamic quality measurement that is implemented as a service-oriented web-application “Social Haystack.” Finally, we outline findings of its evaluation and implications thereof.},
      number = {4},
      journal = {ACM Transactions on Computer-Human Interaction (ToCHI)},
      author = {Ludwig, Thomas and Reuter, Christian and Pipek, Volkmar},
      year = {2015},
      keywords = {CSCW, HCI, PRAXLABS, A-Paper, EmerGent, SMO, MdK},
      pages = {Article 17},
      }


    • Reuter, C., Ludwig, T., Ritzkatis, M. & Pipek, V. (2015)Social-QAS: Tailorable Quality Assessment Service for Social Media Content

      , Pages: 156–170 doi:10.1007/978-3-319-18425-8_11
      [BibTeX] [Abstract] [Download PDF]

      More than 3 billion people use the Internet, many of whom also use social media services such as the social network Facebook with about 1.35 billion active users monthly or the microblogging platform Twitter numbering approximately 284 million active users monthly. This paper researches how a tailorable quality assessment service can assist the use of citizen-generated content from social media. In particular, we want to study how users can articulate their personal quality criteria appropriately. A presentation of related work is followed by an empirical study on the use of social media in the field of emergency management, focusing on situation assessment practices by the emergency services. Based on this, we present the tailorable quality assessment service (QAS) for social media content, which has been implemented and integrated into an existing application for both volunteers and the emergency services.

      @inproceedings{reuter_social-qas_2015,
      title = {Social-{QAS}: {Tailorable} {Quality} {Assessment} {Service} for {Social} {Media} {Content}},
      url = {https://www.wineme.uni-siegen.de/paper/2015/2015_reuterludwigritzkatispipek_qualityassessmentservice_iseud.pdf http://www.springer.com/us/book/9783319184241 https://link.springer.com/chapter/10.1007%2F978-3-319-18425-8_11},
      doi = {10.1007/978-3-319-18425-8_11},
      abstract = {More than 3 billion people use the Internet, many of whom also use social media services such as the social network Facebook with about 1.35 billion active users monthly or the microblogging platform Twitter numbering approximately 284 million active users monthly. This paper researches how a tailorable quality assessment service can assist the use of citizen-generated content from social media. In particular, we want to study how users can articulate their personal quality criteria appropriately. A presentation of related work is followed by an empirical study on the use of social media in the field of emergency management, focusing on situation assessment practices by the emergency services. Based on this, we present the tailorable quality assessment service (QAS) for social media content, which has been implemented and integrated into an existing application for both volunteers and the emergency services.},
      booktitle = {Proceedings of the {International} {Symposium} on {End}-{User} {Development} ({IS}-{EUD}). {Lecture} {Notes} in {Computer} {Science}},
      author = {Reuter, Christian and Ludwig, Thomas and Ritzkatis, Michael and Pipek, Volkmar},
      year = {2015},
      keywords = {CSCW, EmerGent, SMO, CUBES},
      pages = {156--170},
      }


    • Reuter, C., Mentler, T., Geisler, S., Herczeg, M., Ludwig, T., Pipek, V., Nestler, S. & Sautter, J. (2015)Editorial: Mensch-Computer-Interaktion und Social Computing in sicherheitskritischen Systemen

      IN Schmidt, A., Weisbecke, A. & Burmester, M. (Eds.)., Publisher: Oldenbourg Verlag, Pages: 3–9
      [BibTeX] [Abstract] [Download PDF]

      Mensch-Maschine-Interaktion in sicherheitskritischen Systemen ist ein für die Informatik und die jeweiligen Anwendungsdomänen in der Bedeutung weiter zunehmendes Thema. Dieser Workshop der GI-Fachgruppe „Mensch-Maschine-Interaktion in sicherheitskritischen Systemen“ innerhalb des Fach-bereichs Mensch-Computer-Interaktion soll aktuelle Entwicklungen und Fragestellungen offenlegen und neue Impulse für das Forschungsgebiet geben.

      @inproceedings{reuter_editorial_2015,
      title = {Editorial: {Mensch}-{Computer}-{Interaktion} und {Social} {Computing} in sicherheitskritischen {Systemen}},
      url = {https://www.wineme.uni-siegen.de/paper/2015/2015_reuteretal_editorial-kritischehci_muc.pdf},
      abstract = {Mensch-Maschine-Interaktion in sicherheitskritischen Systemen ist ein für die Informatik und die jeweiligen Anwendungsdomänen in der Bedeutung weiter zunehmendes Thema. Dieser Workshop der GI-Fachgruppe „Mensch-Maschine-Interaktion in sicherheitskritischen Systemen“ innerhalb des Fach-bereichs Mensch-Computer-Interaktion soll aktuelle Entwicklungen und Fragestellungen offenlegen und neue Impulse für das Forschungsgebiet geben.},
      booktitle = {Mensch \& {Computer}: {Workshopband}},
      publisher = {Oldenbourg Verlag},
      author = {Reuter, Christian and Mentler, Tilo and Geisler, Stefan and Herczeg, Michael and Ludwig, Thomas and Pipek, Volkmar and Nestler, Simon and Sautter, Johannes},
      editor = {Schmidt, Albrecht and Weisbecke, Anette and Burmester, Michael},
      year = {2015},
      keywords = {CSCW, HCI, PRAXLABS, EmerGent, SMO},
      pages = {3--9},
      }


    • Reuter, C. & Schröter, J. (2015)Microblogging during the European Floods 2013: What Twitter May Contribute in German Emergencies

      IN International Journal of Information Systems for Crisis Response and Management (IJISCRAM), Vol. 7, Pages: 22–41
      [BibTeX] [Abstract] [Download PDF]

      Social media is becoming more and more important in crisis management. However its analysis by emergency services still bears unaddressed challenges and the majority of studies focus on the use of social media in the USA. In this paper German tweets of the European Flood 2013 are therefore captured and analyzed using descriptive statistics, qualitative data coding, and computational algorithms. Our work illustrates that this event provided sufficient German traffic and geo-locations as well as enough original data (not derivative). However, up-to-date Named Entity Recognizer (NER) with German classifier could not recognize German rivers and highways satisfactorily. Furthermore our analysis revealed pragmatic (linguistic) barriers resulting from irony, wordplay, and ambiguity, as well as in retweet-behavior. To ease the analysis of data we suggest a retweet ratio, which is illustrated to be higher with important tweets and may help selecting tweets for mining. We argue that existing software has to be adapted and improved for German language characteristics, also to detect markedness, seriousness and truth

      @article{reuter_microblogging_2015,
      title = {Microblogging during the {European} {Floods} 2013: {What} {Twitter} {May} {Contribute} in {German} {Emergencies}},
      volume = {7},
      url = {https://www.wineme.uni-siegen.de/paper/2015/2015_reuterschroeter_microbloggingeuropeanfloods_ijiscram.pdf http://www.peasec.de/paper/2015/2015_ReuterSchroeter_MicrobloggingEuropeanFloods_IJISCRAM.pdf},
      abstract = {Social media is becoming more and more important in crisis management. However its analysis by emergency services still bears unaddressed challenges and the majority of studies focus on the use of social media in the USA. In this paper German tweets of the European Flood 2013 are therefore captured and analyzed using descriptive statistics, qualitative data coding, and computational algorithms. Our work illustrates that this event provided sufficient German traffic and geo-locations as well as enough original data (not derivative). However, up-to-date Named Entity Recognizer (NER) with German classifier could not recognize German rivers and highways satisfactorily. Furthermore our analysis revealed pragmatic (linguistic) barriers resulting from irony, wordplay, and ambiguity, as well as in retweet-behavior. To ease the analysis of data we suggest a retweet ratio, which is illustrated to be higher with important tweets and may help selecting tweets for mining. We argue that existing software has to be adapted and improved for German language characteristics, also to detect markedness, seriousness and truth},
      number = {1},
      journal = {International Journal of Information Systems for Crisis Response and Management (IJISCRAM)},
      author = {Reuter, Christian and Schröter, Julian},
      year = {2015},
      keywords = {CSCW, HCI, PRAXLABS, EmerGent, SMO, Kooperation},
      pages = {22--41},
      }


    • Reuter, C., Ludwig, T., Kaufhold, M. & Pipek, V. (2015)XHELP: Design of a Cross-Platform Social-Media Application to Support Volunteer Moderators in Disasters

      Seoul, Korea, Publisher: ACM Press, Pages: 4093–4102 doi:10.1145/2702123.2702171
      [BibTeX] [Abstract] [Download PDF]

      Recent disasters have shown an increase in the significance of social media for both affected citizens and volunteers alike in the coordination of information and organization of relief activities, often independently of and in addition to the official emergency response. Existing research mainly focuses on the way in which individual platforms are used by volunteers in response to disasters. This paper examines the use of social media during the European Floods of 2013 and proposes a novel cross-social-media application for volunteers. Besides comprehensive analysis of volunteer communities, interviews were conducted with “digital volunteers” such as Facebook moderators of disaster-related groups. Based on the challenges identified, we designed and implemented the cross-social-media application “XHELP”, which allows information to be both, acquired and distributed cross-media and cross-channel. The evaluation with 20 users leads to further design requirements for applications aiming to support volunteer moderators during disasters.

      @inproceedings{reuter_xhelp_2015,
      address = {Seoul, Korea},
      title = {{XHELP}: {Design} of a {Cross}-{Platform} {Social}-{Media} {Application} to {Support} {Volunteer} {Moderators} in {Disasters}},
      url = {http://www.peasec.de/paper/2015/2015_ReuterLudwigKaufholdPipek_XHELP_CHI.pdf https://www.wineme.uni-siegen.de/paper/2015/2015_reuterludwigkaufholdpipek_xhelp_chi.pdf https://www.youtube.com/watch?v=UJjonJRa3Lg http://dl.acm.org/citation.cfm?id=2702171},
      doi = {10.1145/2702123.2702171},
      abstract = {Recent disasters have shown an increase in the significance of social media for both affected citizens and volunteers alike in the coordination of information and organization of relief activities, often independently of and in addition to the official emergency response. Existing research mainly focuses on the way in which individual platforms are used by volunteers in response to disasters. This paper examines the use of social media during the European Floods of 2013 and proposes a novel cross-social-media application for volunteers. Besides comprehensive analysis of volunteer communities, interviews were conducted with "digital volunteers" such as Facebook moderators of disaster-related groups. Based on the challenges identified, we designed and implemented the cross-social-media application "XHELP", which allows information to be both, acquired and distributed cross-media and cross-channel. The evaluation with 20 users leads to further design requirements for applications aiming to support volunteer moderators during disasters.},
      booktitle = {Proceedings of the {Conference} on {Human} {Factors} in {Computing} {Systems} ({CHI})},
      publisher = {ACM Press},
      author = {Reuter, Christian and Ludwig, Thomas and Kaufhold, Marc-André and Pipek, Volkmar},
      year = {2015},
      keywords = {CSCW, HCI, A-Paper, EmerGent, Selected, SMO, Kooperation},
      pages = {4093--4102},
      }


    • Reuter, C., Ludwig, T., Pipek, V., Herczeg, M., Mentler, T., Nestler, S., Sautter, J., Geisler, S., Herczeg, M., Ludwig, T., Pipek, V., Nestler, S. & Sautter, J. (2015)Proceedings des Workshops “Mensch-Computer-Interaktion und Social Computing in sicherheitskritischen Systemen”

      IN Weisbecker, A., Burmester, M. & Schmidt, A. (Eds.). München, Germany, Publisher: Oldenbourg-Verlag, Pages: 99–140
      [BibTeX] [Abstract] [Download PDF]

      Mensch-Computer-Interaktion und Social Computing spielen auch in Krisensituationen eine große Rolle. Durch die größere Verbreitung mobiler und ubiquitärer Technologien sowie die zunehmende Durchdringung sozialer und kooperativer Medien im Alltag haben sich auch im Bereich des Krisenmanagements und der zivilen Sicherheitsforschung neue Möglichkeiten und Potenziale, aber auch Problembereiche entwickelt, die besonderer Aufmerksamkeit bedürfen. Neue Ansätze und Prototypen adressieren Interaktionen und Kooperationen innerhalb und zwischen klassischen Behörden und Organisationen mit Sicherheitsaufgaben (BOS), aber zunehmend auch die Einbeziehung der von der Krise betroffenen Akteure aus den Bereichen der Industrie und der Bürger, die eine Rolle als aktive Krisenmanager wahrnehmen und BOS unterstützen.

      @inproceedings{reuter_proceedings_2015,
      address = {München, Germany},
      title = {Proceedings des {Workshops} "{Mensch}-{Computer}-{Interaktion} und {Social} {Computing} in sicherheitskritischen {Systemen}"},
      url = {http://www.wineme.uni-siegen.de/paper/2015/2015_proc-kritischemci_muc.pdf https://www.wineme.uni-siegen.de/paper/2014/2014_proc-mci-in-krisen_muc.pdf},
      abstract = {Mensch-Computer-Interaktion und Social Computing spielen auch in Krisensituationen eine große Rolle. Durch die größere Verbreitung mobiler und ubiquitärer Technologien sowie die zunehmende Durchdringung sozialer und kooperativer Medien im Alltag haben sich auch im Bereich des Krisenmanagements und der zivilen Sicherheitsforschung neue Möglichkeiten und Potenziale, aber auch Problembereiche entwickelt, die besonderer Aufmerksamkeit bedürfen. Neue Ansätze und Prototypen adressieren Interaktionen und Kooperationen innerhalb und zwischen klassischen Behörden und Organisationen mit Sicherheitsaufgaben (BOS), aber zunehmend auch die Einbeziehung der von der Krise betroffenen Akteure aus den Bereichen der Industrie und der Bürger, die eine Rolle als aktive Krisenmanager wahrnehmen und BOS unterstützen.},
      booktitle = {Mensch \& {Computer}: {Workshopband}},
      publisher = {Oldenbourg-Verlag},
      author = {Reuter, Christian and Ludwig, Thomas and Pipek, Volkmar and Herczeg, Michael and Mentler, Tilo and Nestler, Simon and Sautter, Johannes and Geisler, Stefan and Herczeg, Michael and Ludwig, Thomas and Pipek, Volkmar and Nestler, Simon and Sautter, Johannes},
      editor = {Weisbecker, Anette and Burmester, Michael and Schmidt, Albrecht},
      year = {2015},
      keywords = {CSCW, HCI, EmerGent, SMO},
      pages = {99--140},
      }


    • Kaufhold, M. & Reuter, C. (2015)Konzept und Evaluation einer Facebook-Applikation zur crossmedialen Selbstorganisation freiwilliger Helfer

      Osnabrück, Germany, Publisher: AIS
      [BibTeX] [Abstract] [Download PDF]

      Das mitteleuropäische Hochwasser 2013 sorgte für große Schäden in weiten Teilen Deutschlands. Währenddessen und in der anschließenden Wiederherstellungsphase koordinierten betroffene und nicht betroffene Bürger ihre Hilfsaktivitäten nicht nur vor Ort, sondern auch in sozialen Medien wie Twitter, Facebook und mit Tools wie Google Maps. Basierend auf einer Vorstudie zu den Aktivitäten in Twitter und Facebook sowie Interviews mit „Digital Volunteers“ (hier: Gründer und Moderatoren von Facebook-Gruppen zum Hochwasser) stellt dieser Beitrag eine als Facebook-App realisierte crossmediale Applikation zur gruppen- und plattformübergreifenden Informationsbeschaffung und -Veröffentlichung vor, die der (Selbst-)Koordination ungebundener Helfer dienen soll. Diese wurde mit 20 Nutzern qualitativ evaluiert und zeigt Implikationen für die technische Unterstützung der Partizipation Freiwilliger in Katastrophenlagen auf.

      @inproceedings{kaufhold_konzept_2015,
      address = {Osnabrück, Germany},
      title = {Konzept und {Evaluation} einer {Facebook}-{Applikation} zur crossmedialen {Selbstorganisation} freiwilliger {Helfer}},
      url = {http://www.wi2015.uni-osnabrueck.de/Files/WI2015-D-14-911.pdf},
      abstract = {Das mitteleuropäische Hochwasser 2013 sorgte für große Schäden in weiten Teilen Deutschlands. Währenddessen und in der anschließenden Wiederherstellungsphase koordinierten betroffene und nicht betroffene Bürger ihre Hilfsaktivitäten nicht nur vor Ort, sondern auch in sozialen Medien wie Twitter, Facebook und mit Tools wie Google Maps. Basierend auf einer Vorstudie zu den Aktivitäten in Twitter und Facebook sowie Interviews mit „Digital Volunteers“ (hier: Gründer und Moderatoren von Facebook-Gruppen zum Hochwasser) stellt dieser Beitrag eine als Facebook-App realisierte crossmediale Applikation zur gruppen- und plattformübergreifenden Informationsbeschaffung und -Veröffentlichung vor, die der (Selbst-)Koordination ungebundener Helfer dienen soll. Diese wurde mit 20 Nutzern qualitativ evaluiert und zeigt Implikationen für die technische Unterstützung der Partizipation Freiwilliger in Katastrophenlagen auf.},
      booktitle = {Proceedings of the {International} {Conference} on {Wirtschaftsinformatik}},
      publisher = {AIS},
      author = {Kaufhold, Marc-André and Reuter, Christian},
      year = {2015},
      keywords = {CSCW, HCI, PRAXLABS, A-Paper, EmerGent, SMO, Kooperation},
      }


    • Ludwig, T., Reuter, C., Siebigteroth, T. & Pipek, V. (2015)CrowdMonitor: Mobile Crowd Sensing for Assessing Physical and Digital Activities of Citizens during Emergencies

      IN Begole, B., Jinwoo, K., Kor, I. & Woontack, W. (Eds.). New York, USA, Publisher: ACM Press, Pages: 4083–4092
      [BibTeX] [Abstract] [Download PDF]

      Emergencies such as the 2013 Central European flood or the 2013 typhoon Haiyan in Philippines have shown how citizens can organize themselves and coordinate private relief activities. These activities can be found in (physical) groups of affected people, but also within (digital) social media communities. There is an evident need, however, for a clearer picture of what exactly is going on to be available for use by the official emergency services: to enlist them, to keep them safe, to support their efforts and to avoid need-less duplications or conflicts. Aligning emergency services and volunteer activities is, then, crucial. In this paper we present a mobile crowd sensing based concept, which was designed as well as implemented as the application CrowdMonitor and facilitates the detection of physical and digital activities and the assignment of specific tasks to citizens. Finally, we outline the findings of its evaluation.

      @inproceedings{ludwig_crowdmonitor_2015,
      address = {New York, USA},
      title = {{CrowdMonitor}: {Mobile} {Crowd} {Sensing} for {Assessing} {Physical} and {Digital} {Activities} of {Citizens} during {Emergencies}},
      url = {https://www.wineme.uni-siegen.de/paper/2015/2015_ludwigreutersiebigterothpipek_crowdmonitor_chi.pdf},
      abstract = {Emergencies such as the 2013 Central European flood or the 2013 typhoon Haiyan in Philippines have shown how citizens can organize themselves and coordinate private relief activities. These activities can be found in (physical) groups of affected people, but also within (digital) social media communities. There is an evident need, however, for a clearer picture of what exactly is going on to be available for use by the official emergency services: to enlist them, to keep them safe, to support their efforts and to avoid need-less duplications or conflicts. Aligning emergency services and volunteer activities is, then, crucial. In this paper we present a mobile crowd sensing based concept, which was designed as well as implemented as the application CrowdMonitor and facilitates the detection of physical and digital activities and the assignment of specific tasks to citizens. Finally, we outline the findings of its evaluation.},
      booktitle = {Proceedings of the {International} {Conference} on {Human} {Factors} in {Computing} {Systems} ({CHI})},
      publisher = {ACM Press},
      author = {Ludwig, Thomas and Reuter, Christian and Siebigteroth, Tim and Pipek, Volkmar},
      editor = {Begole, Bo and Jinwoo, Kim and Kor, Inkpeni and Woontack, Woo},
      year = {2015},
      keywords = {CSCW, HCI, PRAXLABS, A-Paper, EmerGent, Kooperation},
      pages = {4083--4092},
      }


    • Reuter, C., Ludwig, T., Funke, T. & Pipek, V. (2015)SOMAP: Network Independent Social-Offline-Map-Mashup

      IN Palen, L., Büscher, M., Comes, T. & Hughes, A. L. (Eds.). Kristiansand, Norway, Publisher: ISCRAM
      [BibTeX] [Abstract] [Download PDF]

      Maps, showing the tactical or the administrative situation at any particular time, play a central role in disaster management. They can be realized as interactive map mashups. In addition to classical information (weather, water levels, energy network, forces), they can also be used to present a view on citizen-generated content, e.g. from social media. In this paper we offer insights into how mobile map mashups can assist citizens during infrastructure failures that often occur in large-scale emergencies. Based on a review of approaches and mobile applications from literature and especially from practice, we present SOMAP (social offline map), a mobile app we developed in Android. It offers offline map functionality in terms of (A) pro-active loading and storing of potentially needed maps of the respective area as well as (B) the possibility of exchanging information from social media using Bluetooth. The application was evaluated qualitatively, to gain insights into the potential of such applications.

      @inproceedings{reuter_somap_2015,
      address = {Kristiansand, Norway},
      title = {{SOMAP}: {Network} {Independent} {Social}-{Offline}-{Map}-{Mashup}},
      url = {https://www.wineme.uni-siegen.de/paper/2015/2015_reuterludwigfunkepipek_somap-socialofflinemap_iscram.pdf},
      abstract = {Maps, showing the tactical or the administrative situation at any particular time, play a central role in disaster management. They can be realized as interactive map mashups. In addition to classical information (weather, water levels, energy network, forces), they can also be used to present a view on citizen-generated content, e.g. from social media. In this paper we offer insights into how mobile map mashups can assist citizens during infrastructure failures that often occur in large-scale emergencies. Based on a review of approaches and mobile applications from literature and especially from practice, we present SOMAP (social offline map), a mobile app we developed in Android. It offers offline map functionality in terms of (A) pro-active loading and storing of potentially needed maps of the respective area as well as (B) the possibility of exchanging information from social media using Bluetooth. The application was evaluated qualitatively, to gain insights into the potential of such applications.},
      booktitle = {Proceedings of the {Information} {Systems} for {Crisis} {Response} and {Management} ({ISCRAM})},
      publisher = {ISCRAM},
      author = {Reuter, Christian and Ludwig, Thomas and Funke, Timo and Pipek, Volkmar},
      editor = {Palen, Leysia and Büscher, Monika and Comes, Tina and Hughes, Amanda Lee},
      year = {2015},
      keywords = {CSCW, HCI, PRAXLABS, EmerGent, SMO, Infrastruktur, Kooperation},
      }


    • Reuter, C., Mentler, T. & Geisler, S. (2015)Guest Editorial Preface: Special Issue on Human Computer Interaction in Critical Systems II: Authorities and Industry

      IN International Journal of Information Systems for Crisis Response and Management (IJISCRAM), Vol. 7, Pages: i–ix
      [BibTeX] [Abstract] [Download PDF]

      Human computer interaction in security and time-critical systems is an interdisciplinary challenge at the seams of human factors, engineering, information systems and computer science. Application fields include control systems, critical infrastructures, vehicle and traffic management, production technology, business continuity management, medical technology, crisis management and civil protection. Nowadays in many areas mobile and ubiquitous computing as well as social media and collaborative technologies also plays an important role. The specific challenges require the discussion and development of new methods and approaches in order to design information systems. These are going to be addressed in this special issue with a particular focus on technologies for citizen and volunteers in emergencies.

      @article{reuter_guest_2015,
      title = {Guest {Editorial} {Preface}: {Special} {Issue} on {Human} {Computer} {Interaction} in {Critical} {Systems} {II}: {Authorities} and {Industry}},
      volume = {7},
      url = {http://www.wineme.uni-siegen.de/paper/2015/2015_reuter_editorial-specialissue-hci-criticalsystems-ii.pdf https://www.wineme.uni-siegen.de/paper/2015/2015_ijiscram-specialissue_hci-criticalsystems-ii.pdf http://www.wineme.uni-siegen.de/paper/2015/2015_reut},
      abstract = {Human computer interaction in security and time-critical systems is an interdisciplinary challenge at the seams of human factors, engineering, information systems and computer science. Application fields include control systems, critical infrastructures, vehicle and traffic management, production technology, business continuity management, medical technology, crisis management and civil protection. Nowadays in many areas mobile and ubiquitous computing as well as social media and collaborative technologies also plays an important role. The specific challenges require the discussion and development of new methods and approaches in order to design information systems. These are going to be addressed in this special issue with a particular focus on technologies for citizen and volunteers in emergencies.},
      number = {3},
      journal = {International Journal of Information Systems for Crisis Response and Management (IJISCRAM)},
      author = {Reuter, Christian and Mentler, Tilo and Geisler, Stefan},
      year = {2015},
      keywords = {CSCW, HCI, PRAXLABS, EmerGent, SMO, BCM, KOKOS},
      pages = {i--ix},
      }


    • Moi, M., Friberg, T., Marterer, R., Reuter, C., Ludwig, T., Markham, D., Hewlett, M. & Muddiman, A. (2015)Strategy for Processing and Analyzing Social Media Data Streams in Emergencies

      Brest, France
      [BibTeX] [Abstract] [Download PDF]

      People are using social media to a greater extent, particularly in emergency situations. However, approaches for processing and analyzing the vast quantities of data produced currently lag far behind. In this paper we discuss important steps, and the associated challenges, for processing and analyzing social media in emergencies. In our research project EmerGent, a huge volume of low-quality messages will be continuously gathered from a variety of social media services such as Facebook or Twitter. Our aim is to design a software system that will process and analyze social media data, transforming the high volume of noisy data into a low volume of rich content that is useful to emergency personnel. Therefore, suitable techniques are needed to extract and condense key information from raw social media data, allowing detection of relevant events and generation of alerts pertinent to emergency personnel.

      @inproceedings{moi_strategy_2015,
      address = {Brest, France},
      title = {Strategy for {Processing} and {Analyzing} {Social} {Media} {Data} {Streams} in {Emergencies}},
      url = {http://www.peasec.de/paper/2015/2015_Moietal_SocialMediaDataStreams_ICT-DM.pdf http://www.tholud.de/wp-content/uploads/2016/01/2015_Moietal_SocialMediaDataStreams_ICT-DM.pdf},
      abstract = {People are using social media to a greater extent, particularly in emergency situations. However, approaches for processing and analyzing the vast quantities of data produced currently lag far behind. In this paper we discuss important steps, and the associated challenges, for processing and analyzing social media in emergencies. In our research project EmerGent, a huge volume of low-quality messages will be continuously gathered from a variety of social media services such as Facebook or Twitter. Our aim is to design a software system that will process and analyze social media data, transforming the high volume of noisy data into a low volume of rich content that is useful to emergency personnel. Therefore, suitable techniques are needed to extract and condense key information from raw social media data, allowing detection of relevant events and generation of alerts pertinent to emergency personnel.},
      booktitle = {Proceedings of the {International} {Conference} on {Information} and {Communication} {Technologies} for {Disaster} {Management} ({ICT}-{DM})},
      author = {Moi, Matthias and Friberg, Therese and Marterer, Robin and Reuter, Christian and Ludwig, Thomas and Markham, Deborah and Hewlett, Mike and Muddiman, Andrew},
      year = {2015},
      keywords = {CSCW, PRAXLABS, EmerGent, SMO},
      }


    • Reuter, C. (2015)Betriebliches Kontinuitätsmanagement in kleinen und mittleren Unternehmen – Smart Services für die Industrie 4.0

      IN Weisbecker, A., Burmester, M. & Schmidt, A. (Eds.). Stuttgart, Publisher: Oldenbourg Wissensverlag, Pages: 37–44
      [BibTeX] [Abstract] [Download PDF]

      Betriebliches Kontinuitätsmanagement (Business Continuity Management, kurz: BCM) ist im Sinne des betrieblichen Notfallmanagements integraler Bestandteil ziviler Sicherheit. BCM ist laut ISO 22301 (2014) ein ganzheitlicher Managementprozess, der potenzielle Bedrohungen für Organisationen und deren Auswirkungen auf Geschäftsabläufe ermittelt. Bei Betrachtung der aktuellen Studienlage liegt der Schluss nahe, dass die Anwendung von BCM in kleinen und mittleren Unternehmen (KMU) unterrepräsentiert ist und der Sicherheitslevel teilweise im nicht-wirtschaftlichen Bereich liegt. Dieser Beitrag stellt den Einsatz von BCM in KMU vor und diskutiert diesbezügliche Forschungsergebnisse. Hierauf aufbauend wird eine Matrix zu möglichen Auswirkungen vs. Umfang und Qualität des Notfallmanagements verschiedener Akteure dargestellt. Abschließend werden leichtgewichtige und einfach zu handhabende BCM-Sicherheitslösungen, in Form von Smart Services, als möglicher Lösungsansatz für die vermehrt von kontinuierlichem IT-Einsatz abhängigen Industrie 4.0 vorgestellt.

      @inproceedings{reuter_betriebliches_2015,
      address = {Stuttgart},
      title = {Betriebliches {Kontinuitätsmanagement} in kleinen und mittleren {Unternehmen} – {Smart} {Services} für die {Industrie} 4.0},
      url = {https://www.wineme.uni-siegen.de/paper/2015/2015_reuter_bcminkmu_smartservicesindustrie40_muc.pdf},
      abstract = {Betriebliches Kontinuitätsmanagement (Business Continuity Management, kurz: BCM) ist im Sinne des betrieblichen Notfallmanagements integraler Bestandteil ziviler Sicherheit. BCM ist laut ISO 22301 (2014) ein ganzheitlicher Managementprozess, der potenzielle Bedrohungen für Organisationen und deren Auswirkungen auf Geschäftsabläufe ermittelt. Bei Betrachtung der aktuellen Studienlage liegt der Schluss nahe, dass die Anwendung von BCM in kleinen und mittleren Unternehmen (KMU) unterrepräsentiert ist und der Sicherheitslevel teilweise im nicht-wirtschaftlichen Bereich liegt. Dieser Beitrag stellt den Einsatz von BCM in KMU vor und diskutiert diesbezügliche Forschungsergebnisse. Hierauf aufbauend wird eine Matrix zu möglichen Auswirkungen vs. Umfang und Qualität des Notfallmanagements verschiedener Akteure dargestellt. Abschließend werden leichtgewichtige und einfach zu handhabende BCM-Sicherheitslösungen, in Form von Smart Services, als möglicher Lösungsansatz für die vermehrt von kontinuierlichem IT-Einsatz abhängigen Industrie 4.0 vorgestellt.},
      booktitle = {Mensch \& {Computer}: {Workshopband}},
      publisher = {Oldenbourg Wissensverlag},
      author = {Reuter, Christian},
      editor = {Weisbecker, A and Burmester, M and Schmidt, A},
      year = {2015},
      keywords = {CSCW, PRAXLABS, EmerGent, BCM, Infrastruktur, KOKOS},
      pages = {37--44},
      }


    • Reuter, C., Mentler, T. & Geisler, S. (2015)Special Issue on Human Computer Interaction in Critical Systems I: Citizen and Volunteers

      IN International Journal of Information Systems for Crisis Response and Management (IJISCRAM), Vol. 7
      [BibTeX] [Download PDF]

      @article{reuter_special_2015-1,
      title = {Special {Issue} on {Human} {Computer} {Interaction} in {Critical} {Systems} {I}: {Citizen} and {Volunteers}},
      volume = {7},
      url = {https://www.wineme.uni-siegen.de/paper/2015/2015_ijiscram-specialissue_hci-criticalsystems-i.pdf},
      number = {2},
      journal = {International Journal of Information Systems for Crisis Response and Management (IJISCRAM)},
      author = {Reuter, Christian and Mentler, Tilo and Geisler, Stefan},
      year = {2015},
      keywords = {CSCW, PRAXLABS, EmerGent, KOKOS},
      }

    2014


    • Reuter, C., Ludwig, T., Pipek, V., Herczeg, M., Mentler, T., Nestler, S. & Sautter, J. (2014)Editorial: Mensch-Computer-Interaktion und Social Computing in Krisensituationen

      IN Koch, M., Butz, A. & Schlichter, J. (Eds.). München, Germany, Publisher: Oldenbourg-Verlag, Pages: 101–104
      [BibTeX] [Abstract] [Download PDF]

      Die Mensch-Computer-Interaktion und Social Computing in Krisensituationen wird auch in Zukunft eine große Rolle spielen. Mit diesem Workshop möchten wir einen kleinen Beitrag leisten, diese Entwicklung in sinnvoller Weise mitzugestalten.

      @inproceedings{reuter_editorial_2014,
      address = {München, Germany},
      title = {Editorial: {Mensch}-{Computer}-{Interaktion} und {Social} {Computing} in {Krisensituationen}},
      url = {https://www.wineme.uni-siegen.de/paper/2014/2014_reuteretal_mci-krisen-editorial_muc.pdf},
      abstract = {Die Mensch-Computer-Interaktion und Social Computing in Krisensituationen wird auch in Zukunft eine große Rolle spielen. Mit diesem Workshop möchten wir einen kleinen Beitrag leisten, diese Entwicklung in sinnvoller Weise mitzugestalten.},
      booktitle = {Mensch \& {Computer}: {Workshopband}},
      publisher = {Oldenbourg-Verlag},
      author = {Reuter, Christian and Ludwig, Thomas and Pipek, Volkmar and Herczeg, Michael and Mentler, Tilo and Nestler, Simon and Sautter, Johannes},
      editor = {Koch, Michael and Butz, Andreas and Schlichter, Johann},
      year = {2014},
      keywords = {CSCW, HCI, PRAXLABS, EmerGent},
      pages = {101--104},
      }


    • Reuter, C., Ritzkatis, M. & Ludwig, T. (2014)Entwicklung eines SOA-basierten und anpassbaren Bewertungsdienstes für Inhalte aus sozialen Medien

      IN Plöderereder, E., Grunske, L., Schneider, E. & Ull, D. (Eds.). Stuttgart, Germany, Publisher: GI-Edition-Lecture Notes in Informatics (LNI), Pages: 977–988
      [BibTeX] [Abstract] [Download PDF]

      Dieser Beitrag soll aufzeigen, wie ein anpassbarer Bewertungsdienst die Nutzung bürgergenerierter Inhalte aus sozialen Medien unterstützen kann. Dabei soll insbesondere geklärt werden, wie dieser gestaltet werden kann und wie Nutzer die Qualitätskriterien angemessen artikulieren können. Nach einer Darstellung von Grundlagen und verwandten Arbeiten wird anhand einer empirischen Vorstudie der Umgang von Behörden und Organisationen mit Sicherheitsaufgaben (BOS) mit bürgergenerierten Informationen betrachtet. Basierend auf den dort gewonnen Erkenntnissen wurde ein service-orientierter Bewertungsdienst entwickelt und in eine Anwendung integriert, welche so den Zugang zu bürgergenerierten Informationen aus verschiedenen sozialen Medien inklusive einer anpassbaren Qualitätsbewertung ermöglicht. Eine abschließende Evaluation illustriert deren mögliche Anwendung in der Praxis.

      @inproceedings{reuter_entwicklung_2014,
      address = {Stuttgart, Germany},
      title = {Entwicklung eines {SOA}-basierten und anpassbaren {Bewertungsdienstes} für {Inhalte} aus sozialen {Medien}},
      url = {https://www.wineme.uni-siegen.de/paper/2014/2014_reuterritzkatisludwig-soabewertungsozialemedien_inf.pdf},
      abstract = {Dieser Beitrag soll aufzeigen, wie ein anpassbarer Bewertungsdienst die Nutzung bürgergenerierter Inhalte aus sozialen Medien unterstützen kann. Dabei soll insbesondere geklärt werden, wie dieser gestaltet werden kann und wie Nutzer die Qualitätskriterien angemessen artikulieren können. Nach einer Darstellung von Grundlagen und verwandten Arbeiten wird anhand einer empirischen Vorstudie der Umgang von Behörden und Organisationen mit Sicherheitsaufgaben (BOS) mit bürgergenerierten Informationen betrachtet. Basierend auf den dort gewonnen Erkenntnissen wurde ein service-orientierter Bewertungsdienst entwickelt und in eine Anwendung integriert, welche so den Zugang zu bürgergenerierten Informationen aus verschiedenen sozialen Medien inklusive einer anpassbaren Qualitätsbewertung ermöglicht. Eine abschließende Evaluation illustriert deren mögliche Anwendung in der Praxis.},
      booktitle = {Informatik 2014 - {Big} {Data} - {Komplexität} meistern},
      publisher = {GI-Edition-Lecture Notes in Informatics (LNI)},
      author = {Reuter, Christian and Ritzkatis, Michael and Ludwig, Thomas},
      editor = {Plöderereder, E. and Grunske, L. and Schneider, E. and Ull, D.},
      year = {2014},
      keywords = {CSCW, HCI, PRAXLABS, EmerGent, SMO},
      pages = {977--988},
      }


    • Reuter, C. & Ritzkatis, M. (2014)Adaptierbare Qualitätsbewertung bürgergenerierter Inhalte aus sozialen Medien

      IN Butz, A., Koch, M. & Schlichter, J. (Eds.). München, Publisher: Oldenbourg-Verlag, Pages: 115–124
      [BibTeX] [Download PDF]

      @inproceedings{reuter_adaptierbare_2014,
      address = {München},
      title = {Adaptierbare {Qualitätsbewertung} bürgergenerierter {Inhalte} aus sozialen {Medien}},
      url = {https://www.wineme.uni-siegen.de/paper/2014/2014_reuterritzkatis_adaptierbarequalitaetsbewertung_muc.pdf},
      booktitle = {Mensch \& {Computer}: {Tagungsband}},
      publisher = {Oldenbourg-Verlag},
      author = {Reuter, Christian and Ritzkatis, Michael},
      editor = {Butz, Andreas and Koch, Michael and Schlichter, Johann},
      year = {2014},
      keywords = {CSCW, PRAXLABS, EmerGent},
      pages = {115--124},
      }


    • Kaufhold, M. & Reuter, C. (2014)Vernetzte Selbsthilfe in Sozialen Medien am Beispiel des Hochwassers 2013 / Linked Self-Help in Social Media using the example of the Floods 2013 in Germany

      IN i-com – Zeitschrift für interaktive und kooperative Medien, Vol. 13, Pages: 20–28 doi:10.1515/icom.2014.0004
      [BibTeX] [Abstract] [Download PDF]

      Dieser Artikel untersucht den Einsatz sozialer Medien während des Hochwassers 2013 in Deutschland. Über Twitter, Facebook, Google Maps und auf weiteren Plattformen koordinierten betroffene Bürger und freiwillige Helfer untereinander Hilfsaktivitäten und lieferten dabei einen ergänzenden und signifikanten Beitrag zum offiziellen Katastrophenschutz. Neben der qualitativen Analyse ausgewählter, entstandener Hilfsnetzwerke wurden zusätzlich Interviews mit Facebook-Gruppengründern geführt. Die Ziele dieser Studie liegen zum einen in der Analyse des Benutzungsverhaltens sozialer Medien in Katastrophenlagen, zum anderen in der Identifikation von Gestaltungs- und Erweiterungspotenzialen für soziale Medien im Katastrophenschutz.

      @article{kaufhold_vernetzte_2014,
      title = {Vernetzte {Selbsthilfe} in {Sozialen} {Medien} am {Beispiel} des {Hochwassers} 2013 / {Linked} {Self}-{Help} in {Social} {Media} using the example of the {Floods} 2013 in {Germany}},
      volume = {13},
      url = {https://www.wineme.uni-siegen.de/paper/2014/2014_kaufholdreuter_vernetzteselbsthilfehochwasser_icom.pdf},
      doi = {10.1515/icom.2014.0004},
      abstract = {Dieser Artikel untersucht den Einsatz sozialer Medien während des Hochwassers 2013 in Deutschland. Über Twitter, Facebook, Google Maps und auf weiteren Plattformen koordinierten betroffene Bürger und freiwillige Helfer untereinander Hilfsaktivitäten und lieferten dabei einen ergänzenden und signifikanten Beitrag zum offiziellen Katastrophenschutz. Neben der qualitativen Analyse ausgewählter, entstandener Hilfsnetzwerke wurden zusätzlich Interviews mit Facebook-Gruppengründern geführt. Die Ziele dieser Studie liegen zum einen in der Analyse des Benutzungsverhaltens sozialer Medien in Katastrophenlagen, zum anderen in der Identifikation von Gestaltungs- und Erweiterungspotenzialen für soziale Medien im Katastrophenschutz.},
      number = {1},
      journal = {i-com - Zeitschrift für interaktive und kooperative Medien},
      author = {Kaufhold, Marc-André and Reuter, Christian},
      editor = {Pipek, Volkmar and Reuter, Christian},
      year = {2014},
      keywords = {CSCW, HCI, PRAXLABS, EmerGent, SMO, Kooperation},
      pages = {20--28},
      }


    • Reuter, C. & Scholl, S. (2014)Technical Limitations for Designing Applications for Social Media

      IN Koch, M., Butz, A. & Schlichter, J. (Eds.). München, Germany, Publisher: Oldenbourg-Verlag, Pages: 131–140
      [BibTeX] [Abstract] [Download PDF]

      Social media content is used in various applications for businesses, organizations and citizens. However, there are technical limitations for analyzing content from social media; these include the way how data can be gained and which safety regulations as well as query limitations have to be considered. They are of specific importance when designing applications for time critical scenarios, such as crisis management. This paper analyzes these limitations (in June 2014) for the most important social media. The selection of social media is based on the Monthly Active Users (MAU), which counts unique users over 30 days. Besides the identification of various limitations, this paper outlines ap proaches to access the data and summarizes design considerations.

      @inproceedings{reuter_technical_2014,
      address = {München, Germany},
      title = {Technical {Limitations} for {Designing} {Applications} for {Social} {Media}},
      url = {https://www.wineme.uni-siegen.de/paper/2014/2014_reuterscholl_technicallimitationssocialmedia_muc.pdf},
      abstract = {Social media content is used in various applications for businesses, organizations and citizens. However, there are technical limitations for analyzing content from social media; these include the way how data can be gained and which safety regulations as well as query limitations have to be considered. They are of specific importance when designing applications for time critical scenarios, such as crisis management. This paper analyzes these limitations (in June 2014) for the most important social media. The selection of social media is based on the Monthly Active Users (MAU), which counts unique users over 30 days. Besides the identification of various limitations, this paper outlines ap proaches to access the data and summarizes design considerations.},
      booktitle = {Mensch \& {Computer}: {Workshopband}},
      publisher = {Oldenbourg-Verlag},
      author = {Reuter, Christian and Scholl, Simon},
      editor = {Koch, Michael and Butz, Andreas and Schlichter, Johann},
      year = {2014},
      keywords = {CSCW, PRAXLABS, EmerGent, SMO, Infrastruktur},
      pages = {131--140},
      }


    • (2014)Special Issue zu “Interaktion und Kooperation im Krisenmanagement”

      IN i-com – Zeitschrift für interaktive und kooperative Medien, Vol. 13, Pages: 1–62
      [BibTeX] [Download PDF]

      @article{pipek_special_2014-1,
      title = {Special {Issue} zu "{Interaktion} und {Kooperation} im {Krisenmanagement}"},
      volume = {13},
      url = {http://www.degruyter.com/view/j/icom.2014.13.issue-1/issue-files/icom.2014.13.issue-1.xml},
      number = {1},
      journal = {i-com - Zeitschrift für interaktive und kooperative Medien},
      editor = {Pipek, Volkmar and Reuter, Christian},
      year = {2014},
      keywords = {CSCW, PRAXLABS, EmerGent},
      pages = {1--62},
      }


    • Reuter, C., Ludwig, T., Pipek, V., Herczeg, M., Mentler, T., Nestler, S. & Sautter, J. (2014)Proceedings des Workshops Mensch-Computer-Interaktion und Social Computing in Krisensituationen

      IN Weisbecker, A., Burmester, M. & Schmidt, A. (Eds.). München, Germany, Publisher: Oldenbourg-Verlag, Pages: 99–140
      [BibTeX] [Abstract] [Download PDF]

      Mensch-Computer-Interaktion und Social Computing spielen auch in Krisensituationen eine große Rolle. Durch die größere Verbreitung mobiler und ubiquitärer Technologien sowie die zunehmende Durchdringung sozialer und kooperativer Medien im Alltag haben sich auch im Bereich des Krisenmanagements und der zivilen Sicherheitsforschung neue Möglichkeiten und Potenziale, aber auch Problembereiche entwickelt, die besonderer Aufmerksamkeit bedürfen. Neue Ansätze und Prototypen adressieren Interaktionen und Kooperationen innerhalb und zwischen klassischen Behörden und Organisationen mit Sicherheitsaufgaben (BOS), aber zunehmend auch die Einbeziehung der von der Krise betroffenen Akteure aus den Bereichen der Industrie und der Bürger, die eine Rolle als aktive Krisenmanager wahrnehmen und BOS unterstützen.

      @inproceedings{reuter_proceedings_2014,
      address = {München, Germany},
      title = {Proceedings des {Workshops} {Mensch}-{Computer}-{Interaktion} und {Social} {Computing} in {Krisensituationen}},
      url = {https://www.wineme.uni-siegen.de/paper/2014/2014_proc-mci-in-krisen_muc.pdf},
      abstract = {Mensch-Computer-Interaktion und Social Computing spielen auch in Krisensituationen eine große Rolle. Durch die größere Verbreitung mobiler und ubiquitärer Technologien sowie die zunehmende Durchdringung sozialer und kooperativer Medien im Alltag haben sich auch im Bereich des Krisenmanagements und der zivilen Sicherheitsforschung neue Möglichkeiten und Potenziale, aber auch Problembereiche entwickelt, die besonderer Aufmerksamkeit bedürfen. Neue Ansätze und Prototypen adressieren Interaktionen und Kooperationen innerhalb und zwischen klassischen Behörden und Organisationen mit Sicherheitsaufgaben (BOS), aber zunehmend auch die Einbeziehung der von der Krise betroffenen Akteure aus den Bereichen der Industrie und der Bürger, die eine Rolle als aktive Krisenmanager wahrnehmen und BOS unterstützen.},
      booktitle = {Mensch \& {Computer}: {Workshopband}},
      publisher = {Oldenbourg-Verlag},
      author = {Reuter, Christian and Ludwig, Thomas and Pipek, Volkmar and Herczeg, Michael and Mentler, Tilo and Nestler, Simon and Sautter, Johannes},
      editor = {Weisbecker, Anette and Burmester, Michael and Schmidt, Albrecht},
      year = {2014},
      keywords = {CSCW, PRAXLABS, EmerGent},
      pages = {99--140},
      }


    • Ludwig, T. & Siebigteroth, T. (2014)Unterstützung von BOS durch Mobile Crowd Sensing in Schadenslagen

      IN Butz, A., Koch, M. & Schlichter, J. H. (Eds.)., Publisher: De Gruyter Oldenbourg, Pages: 117–123
      [BibTeX] [Download PDF]

      @inproceedings{ludwig_unterstutzung_2014,
      title = {Unterstützung von {BOS} durch {Mobile} {Crowd} {Sensing} in {Schadenslagen}},
      url = {http://dl.mensch-und-computer.de/handle/123456789/3866 https://pdfs.semanticscholar.org/bf44/2e02a8c8fe37f17bd11bc7fe68d85089a7b5.pdf},
      booktitle = {Mensch \& {Computer}: {Tagungsband}},
      publisher = {De Gruyter Oldenbourg},
      author = {Ludwig, Thomas and Siebigteroth, Tim},
      editor = {Butz, Andreas and Koch, Michael and Schlichter, Johann H},
      year = {2014},
      keywords = {CSCW, PRAXLABS, EmerGent},
      pages = {117--123},
      }


    • (2014)Special Issue zum Themenschwerpunkt Krisenmanagement

      IN i-com – Zeitschrift für interaktive und kooperative Medien, Vol. 13
      [BibTeX] [Download PDF]

      @article{pipek_special_2014-2,
      title = {Special {Issue} zum {Themenschwerpunkt} {Krisenmanagement}},
      volume = {13},
      url = {http://www.degruyter.com/view/j/icom.2014.13.issue-1/issue-files/icom.2014.13.issue-1.xml},
      number = {1},
      journal = {i-com - Zeitschrift für interaktive und kooperative Medien},
      editor = {Pipek, Volkmar and Reuter, Christian},
      year = {2014},
      keywords = {CSCW, PRAXLABS, EmerGent},
      }


    • Pipek, V. & Reuter, C. (2014)Forschungsherausforderungen der Interaktion und Kooperation im Krisenmanagement

      IN i-com – Zeitschrift für interaktive und kooperative Medien, Vol. 13, Pages: 1–3
      [BibTeX] [Abstract] [Download PDF]

      Im Zuge der wachsenden Vernetzung mit mobilen, interaktiven und kooperativen Technologien und der zunehmenden Bedeutung sozialer Medien haben sich auch im Bereich Krisenmanagement und zivile Sicherheitsforschung neue Möglichkeiten und Problembereiche entwickelt, die besonderer Aufmerksamkeit bedürfen. Neue Ansätze und Prototypen adressieren Interaktionen und Kooperationen innerhalb und zwischen klassischen BOS (“Behörden und Organisationen mit Sicherheitsaufgaben”), aber zunehmend auch Interaktionen und Kooperationen, welche auch die von der Krise betroffenen Akteure, wie Industrie und Bürger als aktive Krisenmanager wahrnehmen und unterstützen.

      @article{pipek_forschungsherausforderungen_2014,
      title = {Forschungsherausforderungen der {Interaktion} und {Kooperation} im {Krisenmanagement}},
      volume = {13},
      url = {https://www.wineme.uni-siegen.de/paper/2014/2014_pipekreuter_forschungsherausforderungenkrisen_icom.pdf http://www.degruyter.com/view/j/icom.2014.13.issue-1/icom-2014-0001/icom-2014-0001.xml?format=INT},
      abstract = {Im Zuge der wachsenden Vernetzung mit mobilen, interaktiven und kooperativen Technologien und der zunehmenden Bedeutung sozialer Medien haben sich auch im Bereich Krisenmanagement und zivile Sicherheitsforschung neue Möglichkeiten und Problembereiche entwickelt, die besonderer Aufmerksamkeit bedürfen. Neue Ansätze und Prototypen adressieren Interaktionen und Kooperationen innerhalb und zwischen klassischen BOS ("Behörden und Organisationen mit Sicherheitsaufgaben"), aber zunehmend auch Interaktionen und Kooperationen, welche auch die von der Krise betroffenen Akteure, wie Industrie und Bürger als aktive Krisenmanager wahrnehmen und unterstützen.},
      number = {1},
      journal = {i-com - Zeitschrift für interaktive und kooperative Medien},
      author = {Pipek, Volkmar and Reuter, Christian},
      year = {2014},
      keywords = {CSCW, HCI, PRAXLABS, EmerGent, Kooperation, GI-CSCW-B},
      pages = {1--3},
      }


    • Greenlaw, R., Muddiman, A., Friberg, T., Moi, M., Cristaldi, M., Ludwig, T. & Reuter, C. (2014)The EmerGent project: Emergency Management in Social Media Generation – Dealing with Big Data from Social Media Data Stream

      London, United Kingdom, Pages: 687–689 doi:10.1109/UCC.2014.111
      [BibTeX] [Abstract] [Download PDF]

      This paper describes EmerGent which is a new EU FP7 project currently engaging with users, gathering requirements and writing initial technical specifications and deals with the impact of social media in emergency management. This paper describes the overall objectives of the project and the plans to create an online big data semantic store of social media will be outlined.

      @inproceedings{greenlaw_emergent_2014,
      address = {London, United Kingdom},
      title = {The {EmerGent} project: {Emergency} {Management} in {Social} {Media} {Generation} – {Dealing} with {Big} {Data} from {Social} {Media} {Data} {Stream}},
      url = {https://www.wineme.uni-siegen.de/paper/2014/2014_emergentbigdata_ucc.pdf},
      doi = {10.1109/UCC.2014.111},
      abstract = {This paper describes EmerGent which is a new EU FP7 project currently engaging with users, gathering requirements and writing initial technical specifications and deals with the impact of social media in emergency management. This paper describes the overall objectives of the project and the plans to create an online big data semantic store of social media will be outlined.},
      booktitle = {Workshop on {Big} {Data}, {Intelligence} {Management} and {Analytics} {Workshop}. 7th {IEEE}/{ACM} {International} {Conference} on {Utility} and {Cloud} {Computing} ({UCC})},
      author = {Greenlaw, Reynold and Muddiman, Andrew and Friberg, Therese and Moi, Matthias and Cristaldi, Massimo and Ludwig, Thomas and Reuter, Christian},
      year = {2014},
      keywords = {CSCW, HCI, PRAXLABS, EmerGent, SMO},
      pages = {687--689},
      }


    • Reuter, C. (2014)Emergent Collaboration Infrastructures: Technology Design for Inter-Organizational Crisis Management (Ph.D. Thesis)

      , Siegen, Germany, Publisher: Springer Gabler doi:10.1007/978-3-658-08586-5
      [BibTeX] [Abstract] [Download PDF]

      Using the domain of crisis management, Christian Reuter explores challenges and opportunities for technology design in emergent environments. He therefore empirically analyzes collaborative work in inter-organizational crisis – such as the police, fire departments, energy network operators and citizens – in order to identify collaboration practices that reveal work infrastructure limitations. He also designs, implements and evaluates novel concepts and ICT artifacts towards the support of emergent collaboration. Besides the discovery of potential organizational effects on the ability to deal with emergence he presents methodological implications for technology design.

      @book{reuter_emergent_2014,
      address = {Siegen, Germany},
      title = {Emergent {Collaboration} {Infrastructures}: {Technology} {Design} for {Inter}-{Organizational} {Crisis} {Management} ({Ph}.{D}. {Thesis})},
      isbn = {978-3-658-08585-8},
      url = {http://www.springer.com/springer+gabler/bwl/wirtschaftsinformatik/book/978-3-658-08585-8},
      abstract = {Using the domain of crisis management, Christian Reuter explores challenges and opportunities for technology design in emergent environments. He therefore empirically analyzes collaborative work in inter-organizational crisis – such as the police, fire departments, energy network operators and citizens – in order to identify collaboration practices that reveal work infrastructure limitations. He also designs, implements and evaluates novel concepts and ICT artifacts towards the support of emergent collaboration. Besides the discovery of potential organizational effects on the ability to deal with emergence he presents methodological implications for technology design.},
      publisher = {Springer Gabler},
      author = {Reuter, Christian},
      year = {2014},
      doi = {10.1007/978-3-658-08586-5},
      keywords = {CSCW, HCI, PRAXLABS, EmerGent, Selected, SMO, Infrastruktur, RSF, InfoStrom, Dissertation},
      }


    • Reuter, C. & Ritzkatis, M. (2014)Adaptierbare Bewertung bürgergenerierter Inhalte aus sozialen Medien

      IN Koch, M., Butz, A. & Schlichter, J. (Eds.). München, Germany, Publisher: Oldenbourg-Verlag, Pages: 115–124
      [BibTeX] [Abstract] [Download PDF]

      Zwei Drittel aller Internetnutzer in Deutschland nutzen soziale Medien. Neben der Kommunikation mit eigenen Kontakten werden dort auch vermehrt Fotos, Filme und Inhalte ganz bewusst öffentlich geteilt. Vergangene Ereignisse, wie das Hochwasser in Mitteleuropa im Juni 2013, haben gezeigt, dass diese alltäglichen Verhaltensweisen ebenso in Ausnahmesituationen fortgeführt werden und bürgergenierte Inhalte auch dann beispielsweise über Facebook und Twitter verbreitet werden. Diese werden in Teilen von Behörden und Organisationen mit Sicherheitsaufgaben (BOS), wie der Polizei und Feuerwehr, ausgewertet und für die Lagebeurteilung genutzt. Dieser Beitrag stellt, basierend auf einer Analyse verwandter Arbeiten, die Ergebnisse einer empirischen Untersuchung zur Nutzung bürgergenerierter Inhalte und die Bedingungen für deren Integration in die Lagebeurteilung durch BOS dar. Die hieraus gewonnenen Erkenntnisse münden in Anforderungen an einen adaptierbaren Bewertungsmechanismus für bürgergenerierte Inhalte aus sozialen Medien.

      @inproceedings{reuter_adaptierbare_2014-1,
      address = {München, Germany},
      title = {Adaptierbare {Bewertung} bürgergenerierter {Inhalte} aus sozialen {Medien}},
      url = {https://dl.gi.de/bitstream/handle/20.500.12116/7536/Reuter_Ritzkatis_2014.pdf?sequence=2&isAllowed=y},
      abstract = {Zwei Drittel aller Internetnutzer in Deutschland nutzen soziale Medien. Neben der Kommunikation mit eigenen Kontakten werden dort auch vermehrt Fotos, Filme und Inhalte ganz bewusst öffentlich geteilt. Vergangene Ereignisse, wie das Hochwasser in Mitteleuropa im Juni 2013, haben gezeigt, dass diese alltäglichen Verhaltensweisen ebenso in Ausnahmesituationen fortgeführt werden und bürgergenierte Inhalte auch dann beispielsweise über Facebook und Twitter verbreitet werden. Diese werden in Teilen von Behörden und Organisationen mit Sicherheitsaufgaben (BOS), wie der Polizei und Feuerwehr, ausgewertet und für die Lagebeurteilung genutzt. Dieser Beitrag stellt, basierend auf einer Analyse verwandter Arbeiten, die Ergebnisse einer empirischen Untersuchung zur Nutzung bürgergenerierter Inhalte und die Bedingungen für deren Integration in die Lagebeurteilung durch BOS dar. Die hieraus gewonnenen Erkenntnisse münden in Anforderungen an einen adaptierbaren Bewertungsmechanismus für bürgergenerierte Inhalte aus sozialen Medien.},
      booktitle = {Mensch \& {Computer}: {Interaktiv} unterwegs – {Freiräume} gestalten},
      publisher = {Oldenbourg-Verlag},
      author = {Reuter, Christian and Ritzkatis, Michael},
      editor = {Koch, Michael and Butz, Andreas and Schlichter, Johann},
      year = {2014},
      keywords = {CSCW, HCI, PRAXLABS, EmerGent, SMO},
      pages = {115--124},
      }


    • (2014)Special Issue zu “Interaktion und Kooperation im Krisenmanagement”

      IN i-com: Journal of Interactive Media, Vol. 13, Pages: 1–62
      [BibTeX] [Download PDF]

      @article{pipek_special_2014-3,
      title = {Special {Issue} zu "{Interaktion} und {Kooperation} im {Krisenmanagement}"},
      volume = {13},
      url = {http://www.degruyter.com/view/j/icom.2014.13.issue-1/issue-files/icom.2014.13.issue-1.xml},
      number = {1},
      journal = {i-com: Journal of Interactive Media},
      editor = {Pipek, Volkmar and Reuter, Christian},
      year = {2014},
      keywords = {CSCW, PRAXLABS, EmerGent},
      pages = {1--62},
      }


    • (2014)Special Issue zum Themenschwerpunkt Krisenmanagement

      IN i-com: Journal of Interactive Media, Vol. 13
      [BibTeX] [Download PDF]

      @article{pipek_special_2014-4,
      title = {Special {Issue} zum {Themenschwerpunkt} {Krisenmanagement}},
      volume = {13},
      url = {http://www.degruyter.com/view/j/icom.2014.13.issue-1/issue-files/icom.2014.13.issue-1.xml},
      number = {1},
      journal = {i-com: Journal of Interactive Media},
      editor = {Pipek, Volkmar and Reuter, Christian},
      year = {2014},
      keywords = {CSCW, PRAXLABS, EmerGent},
      }