Course Contents
Phenomena such as deliberate and strategic disinformation and hate speech are key tools for disrupting and influencing information flows to manipulate individuals and entire societies (“information operations”). Computer science can make a significant contribution to combating and analyzing these phenomena, e.g., through automatic detection methods, network analyses, or user-centered interventions such as warnings or corrections. At the same time, new developments in computer science are making disinformation increasingly credible and difficult to detect (e.g., AI-generated or immersive (XR) content).
In this seminar, based on a thematic introduction and lectures on methodology, advanced topics are assigned that are oriented toward existing research and are developed by students using scientific methods. Through the simulation of a scientific conference, scientific papers are submitted, constructively reviewed by other students (“peer review”), revised, and presented at our student conference before being submitted as final assignments.
EXAMPLE TOPICS:
[list]
[*]Potential for deception and misdirection in XR
[*]Opportunities for XR to combat disinformation
[*]Disinformation and hate speech in gaming environments
[*]Actors and collaboration in information operations
[*]Disinformation, hate speech, and polarization in political social media discourse
[/list]
PROCEDURE:
[list]
[*]Technical introduction with presentation and assignment of topics
[*]Submission of an exposé
[*]Methodology lecture: “How do I write a good paper?”
[*]Submission of a first complete paper
[*]Methodology lecture: “How do I evaluate and present a paper?”
[*]Evaluation as part of a student peer review
[*]Presentation of the paper at a student conference
[*]Submission of the final paper
[*]Recording of the grades
[/list]
Preconditions
Recommended are basic knowledge in at least one of the following areas: computer science, IT security, human-computer interaction, or peace and conflict studies, as well as basic knowledge in the subject areas of the PEASEC department.
- Lecturer: Katrin Hartwig
- foundations of parallel systems
- parallel architectures
- programming models for parallel computing
- parallel algorithms
- significant practical programming exercises covering the above topics
- if necessary introduction to base programming languages
Literature
Parallel Programming in OpenMP
R. Chandra, L. Dagum, D. Kohr, D. Maydan, J. McDonald, R. Meno, Morgan Kaufmann
The OpenMP Common Core: Making OpenMP Simple Again
Timothy G. Mattson, Yun (Helen) He, Alice E. Koniges, The MIT Press
Programming Massively Parallel Processors David B. Kirk, Wen-mei W. Hwu, 3rd edition, Morgan Kaufmann
- Lecturer: Lukas Rothenberger
- Lecturer: Felix Wolf
Course Contents
During the course of this seminar advanced theories and subjects from the field of "Science and Technology for Peace and Security" (PEASEC) will be developed. Based on the introduction and repetition of the principles in scientific research, contemporary project topics which are related to PEASEC research will be offered by us and addressed by students applying scientific methods. During the semester scientific articles (“papers”) will be developed and presented. As usual in scientific work, students will constructively review each other’s work in a peer-review process. Subsequently, the papers will be revised for the finalization and submission.
EXEMPLARY THEMATIC AREAS
- Safety-critical human-computer interaction, social media and collaborative technologies in conflict and crisis situations, usable security and privacy
- Information technology for peace and security, information warfare, manipulation of opinions, fake news, cyber war, cyber peace, dual-use in computer science, conscientious digitalization, computer science and society
- Resilient IT-based (critical) infrastructures, particularly communication, agriculture, energy
Topics for the current semester are available in the presentation attached.
PROCEDURE:
- Technical introduction including the presentation and assignment of topics
- Writing and submitting a short exposé
- Methodological lecture
- Short presentation of the own topic and constructive feedback
- Submission of a first complete version of the paper
- Assessment within a students‘ peer-review process
- Final submission of the paper
- Grading
A mandatory introduction („kick-off“) is the first date, the mandatory methodological lecture is the second date. The assignment of topics and formation of groups will take place collaboratively during the kickoff and, if necessary, in the following week.
Literature
Up to date scientific publications with respect to specific topics.
Foundations:
Reuter, C. (2021) Sicherheitskritische Mensch-Computer-Interaktion: Interaktive Technologien und Soziale Medien im Krisen- und Sicherheitsmanagement: Springer Vieweg. http://www.buch-sec-mci.chreu.de
Reuter, C. (2024). Information Technology for Peace and Security: IT-Applications and Infrastructures in Conflicts, Crises, War, and Peace: Springer Vieweg. http://www.peace-book.chreu.de
Preconditions
Principles in one of the subjects: Computer Science, IT-Security, Human-Computer-Interaction or Peace and Conflict Studies; basic knowledge in the topics of PEASEC
- Lecturer: Katrin Hartwig
- Lecturer: Marc-André Kaufhold
- Lecturer: Christian Reuter