..
/ cscw / home /
 

Thea Riebe, (M.A.)

Raum US-G003

Kontakt: +49 (0) 271 / 740 4129

thea.riebe@uni-siegen.de

Universität Siegen, Fakultät III, Institut für Wirtschaftsinformatik,
Kriseninformationssysteme / BMBF-Arbeitsgruppe KONTIKAT,
Kohlbettstr. 15, 57072 Siegen

Vita

Thea Riebe, M.A., studierte Internationale Studien / Friedens- und Konfliktforschung an der Goethe Universität Frankfurt, der TU Darmstadt und der Université de Lausanne, und ist wissenschaftliche Mitarbeiterin in der BMBF-Arbeitsgruppe KONTIKAT der Universität Siegen sowie Doktorandin am Lehrstuhl “Wissenschaft und Technik für Frieden und Sicherheit” (PEASEC) am Fachbereich Informatik (FB 20) der TU Darmstadt. Davor war sie für die technisch-naturwissenschaftliche Friedensforschungsgruppe IANUS an der TU Darmstadt tätig, und hat für die Hessische Stiftung für Friedens- und Konfliktforschung (HSFK) an der Umsetzung des EU elearning Programms for Nonproliferation and Disarmament, sowie beim BMBF Projekt Salafismus und Dschihadismus in Deutschland mitgearbeitet.

In ihrer Promotion untersucht sie Möglichkeiten zur Kontrolle von ambivalenten Technologien in sicherheitskritischen Kontexten, wie im Bereich Krisen- und Kontinuitätsmanagement, in der Mensch-Computer Interaktion und in der Cyber- und internationalen Sicherheit.

Publications

2019


  • Reuter, C., Aal, K., Aldehoff, L., Altmann, J., Bernhardt, U., Buchmann, J., Denker, K., Herrmann, D., Hollick, M., Katzenbeisser, S., Kaufhold, M., Nordmann, A., Reinhold, T., Riebe, T., Ripper, A., Ruhmann, I., Saalbach, K., Schörnig, N., Sunyaev, A. & Wulf, V. (2019)The Future of IT in Peace and Security

    IN Reuter, C. (Ed.), Information Technology for Peace and Security: IT Applications and Infrastructures in Conflicts, Crises, War, and Peace Wiesbaden doi:10.1007/978-3-658-25652-4_19
    [BibTeX] [Abstract] [Download PDF]

    Not only today, but also in the future information technology and the advances in the field of computer science will have a high relevance for peace and security. Naturally, a textbook like this can only cover a selective part of research and a certain point in time. Nonetheless, it can be attempted to identify trends, challenges and venture an outlook into the future. That is exactly what we want to achieve in this chapter: To predict future developments and try to classify them correctly. These considerations were made both by the editor and the authors involved alike. Therefore, an outlook based on fundamentals, cyber conflicts and war, cyber peace, cyber arms control, infrastructures as well as social interaction is given.

    @incollection{reuter_future_2019,
    address = {Wiesbaden},
    title = {The {Future} of {IT} in {Peace} and {Security}},
    isbn = {978-3-658-25652-4},
    url = {https://doi.org/10.1007/978-3-658-25652-4_19},
    abstract = {Not only today, but also in the future information technology and the advances in the field of computer science will have a high relevance for peace and security. Naturally, a textbook like this can only cover a selective part of research and a certain point in time. Nonetheless, it can be attempted to identify trends, challenges and venture an outlook into the future. That is exactly what we want to achieve in this chapter: To predict future developments and try to classify them correctly. These considerations were made both by the editor and the authors involved alike. Therefore, an outlook based on fundamentals, cyber conflicts and war, cyber peace, cyber arms control, infrastructures as well as social interaction is given.},
    booktitle = {Information {Technology} for {Peace} and {Security}: {IT} {Applications} and {Infrastructures} in {Conflicts}, {Crises}, {War}, and {Peace}},
    publisher = {Springer Fachmedien Wiesbaden},
    author = {Reuter, Christian and Aal, Konstantin and Aldehoff, Larissa and Altmann, Jürgen and Bernhardt, Ute and Buchmann, Johannes and Denker, Kai and Herrmann, Dominik and Hollick, Matthias and Katzenbeisser, Stefan and Kaufhold, Marc-André and Nordmann, Alfred and Reinhold, Thomas and Riebe, Thea and Ripper, Annette and Ruhmann, Ingo and Saalbach, Klaus-Peter and Schörnig, Niklas and Sunyaev, Ali and Wulf, Volker},
    editor = {Reuter, Christian},
    year = {2019},
    doi = {10.1007/978-3-658-25652-4_19},
    keywords = {book\_section},
    pages = {405--413},
    }


  • Reuter, C., Aldehoff, L., Riebe, T. & Kaufhold, M. (2019)IT in Peace, Conflict, and Security Research

    IN Reuter, C. (Ed.), Information Technology for Peace and Security – IT-Applications and Infrastructures in Conflicts, Crises, War, and Peace Wiesbaden, Germany
    [BibTeX]

    @incollection{reuter_it_2019,
    address = {Wiesbaden, Germany},
    title = {{IT} in {Peace}, {Conflict}, and {Security} {Research}},
    booktitle = {Information {Technology} for {Peace} and {Security} - {IT}-{Applications} and {Infrastructures} in {Conflicts}, {Crises}, {War}, and {Peace}},
    publisher = {Springer Vieweg},
    author = {Reuter, Christian and Aldehoff, Larissa and Riebe, Thea and Kaufhold, Marc-André},
    editor = {Reuter, Christian},
    year = {2019},
    keywords = {HCI, Frieden, CRISP, Infrastruktur},
    }


  • Reuter, C., Aldehoff, L., Riebe, T. & Kaufhold, M. (2019)IT in Peace, Conflict, and Security Research

    IN Reuter, C. (Ed.), Information Technology for Peace and Security: IT Applications and Infrastructures in Conflicts, Crises, War, and Peace Wiesbaden doi:10.1007/978-3-658-25652-4_2
    [BibTeX] [Abstract] [Download PDF]

    Advances in science and technology play a crucial role in the context of peace, conflict and security. As information technology (IT) is becoming omnipresent, this includes both the resilience of IT infrastructures e.g. as a target in cases of conflict and the role of IT applications to prevent and manage conflicts, crises and disasters. This chapter is an introduction to IT and its role in war and peace, in conflicts and crises as well as in safety and security. Based on those connections a new field of research has emerged: IT peace research. It is introduced in this chapter which provides an overview of the interdisciplinary concepts of peace, conflict and security. In addition, the research disciplines computer science and peace and conflict studies as the basis of IT peace research are explained. Moreover, the chapter focuses on the specific research topics of IT peace research and presents the institutionalised research landscape in Germany.

    @incollection{reuter_it_2019-1,
    address = {Wiesbaden},
    title = {{IT} in {Peace}, {Conflict}, and {Security} {Research}},
    isbn = {978-3-658-25652-4},
    url = {https://doi.org/10.1007/978-3-658-25652-4_2},
    abstract = {Advances in science and technology play a crucial role in the context of peace, conflict and security. As information technology (IT) is becoming omnipresent, this includes both the resilience of IT infrastructures e.g. as a target in cases of conflict and the role of IT applications to prevent and manage conflicts, crises and disasters. This chapter is an introduction to IT and its role in war and peace, in conflicts and crises as well as in safety and security. Based on those connections a new field of research has emerged: IT peace research. It is introduced in this chapter which provides an overview of the interdisciplinary concepts of peace, conflict and security. In addition, the research disciplines computer science and peace and conflict studies as the basis of IT peace research are explained. Moreover, the chapter focuses on the specific research topics of IT peace research and presents the institutionalised research landscape in Germany.},
    language = {en},
    urldate = {2021-04-16},
    booktitle = {Information {Technology} for {Peace} and {Security}: {IT} {Applications} and {Infrastructures} in {Conflicts}, {Crises}, {War}, and {Peace}},
    publisher = {Springer Fachmedien},
    author = {Reuter, Christian and Aldehoff, Larissa and Riebe, Thea and Kaufhold, Marc-André},
    editor = {Reuter, Christian},
    year = {2019},
    doi = {10.1007/978-3-658-25652-4_2},
    pages = {11--37},
    }

2018


  • Kaufhold, M., Riebe, T., Reuter, C., Hester, J., Jeske, D., Knüver, L. & Richert, V. (2018)Business Continuity Management in Micro Enterprises: Perception, Strategies and Use of ICT

    IN International Journal of Information Systems for Crisis Response and Management (IJISCRAM), Vol. 10, Pages: 1–19 doi:10.4018/IJISCRAM.2018010101
    [BibTeX]

    @article{kaufhold_business_2018,
    title = {Business {Continuity} {Management} in {Micro} {Enterprises}: {Perception}, {Strategies} and {Use} of {ICT}},
    volume = {10},
    doi = {10.4018/IJISCRAM.2018010101},
    number = {1},
    journal = {International Journal of Information Systems for Crisis Response and Management (IJISCRAM)},
    author = {Kaufhold, Marc-André and Riebe, Thea and Reuter, Christian and Hester, Julian and Jeske, Danny and Knüver, Lisa and Richert, Viktoria},
    year = {2018},
    keywords = {CSCW, EmerGent, KontiKat, Infrastruktur, RSF, Kooperation, MAKI},
    pages = {1--19},
    }


  • Kaufhold, M., Reuter, C., Riebe, T. & von Radziewski, E. (2018)Design eines BCM-Dashboards für kleine und mittlere Unternehmen

    Mensch und Computer 2018: Workshopband. Dresden, Germany, Publisher: Gesellschaft für Informatik e.V., Pages: 579–586
    [BibTeX] [Abstract] [Download PDF]

    Business Continuity Management (BCM) ist definiert als ganzheitlicher Managementprozess, der poten-zielle Bedrohungen für Organisationen und die Auswirkungen ermittelt, sowie ein Gerüst zum Aufbau der Belastbarkeit einer Organisation bereitstellt. Bereits existierende Ansätze in der Forschung legen den Fokus allerdings auf große Konzerne, während die Umsetzung eines BCM-Konzepts für kleine und mittlere Unternehmen (KMU) oft an den knappen finanziellen und personellen Ressourcen, aber auch an der Komplexität des BCM scheitert. Um KMU bei der Implementierung eines an deren Bedürfnisse angepasstem BCM-Systems (BCMS) zu unterstützen, gibt es in der Forschung nur wenige Lösungsan-sätze. Dieser Artikel stellt auf Basis einer empirischen Studie, welche Umsetzungsfaktoren für BCM und Anforderungen für BCMS untersucht, das prototypische Design eines BCM-Dashboards vor, welches mit wenig Konfigurationsaufwand möglichst relevante externe und interne Gefahrenquellen in einer kom-pakten Übersicht darzustellen vermag.

    @inproceedings{kaufhold_design_2018,
    address = {Dresden, Germany},
    title = {Design eines {BCM}-{Dashboards} für kleine und mittlere {Unternehmen}},
    url = {https://dl.gi.de/bitstream/handle/20.500.12116/16796/Beitrag_453_final__a.pdf},
    abstract = {Business Continuity Management (BCM) ist definiert als ganzheitlicher Managementprozess, der poten-zielle Bedrohungen für Organisationen und die Auswirkungen ermittelt, sowie ein Gerüst zum Aufbau der Belastbarkeit einer Organisation bereitstellt. Bereits existierende Ansätze in der Forschung legen den Fokus allerdings auf große Konzerne, während die Umsetzung eines BCM-Konzepts für kleine und mittlere Unternehmen (KMU) oft an den knappen finanziellen und personellen Ressourcen, aber auch an der Komplexität des BCM scheitert. Um KMU bei der Implementierung eines an deren Bedürfnisse angepasstem BCM-Systems (BCMS) zu unterstützen, gibt es in der Forschung nur wenige Lösungsan-sätze. Dieser Artikel stellt auf Basis einer empirischen Studie, welche Umsetzungsfaktoren für BCM und Anforderungen für BCMS untersucht, das prototypische Design eines BCM-Dashboards vor, welches mit wenig Konfigurationsaufwand möglichst relevante externe und interne Gefahrenquellen in einer kom-pakten Übersicht darzustellen vermag.},
    booktitle = {Mensch und {Computer} 2018: {Workshopband}},
    publisher = {Gesellschaft für Informatik e.V.},
    author = {Kaufhold, Marc-André and Reuter, Christian and Riebe, Thea and von Radziewski, Elmar},
    editor = {Dachselt, Raimund and Weber, Gerhard},
    year = {2018},
    keywords = {HCI, KontiKat, Infrastruktur},
    pages = {579--586},
    }


  • Riebe, T., Pätsch, K., Kaufhold, M. & Reuter, C. (2018)From Conspiracies to Insults: A Case Study of Radicalisation in Social Media Discourse

    Mensch und Computer 2018: Workshopband. Dresden, Germany, Publisher: Gesellschaft für Informatik e.V., Pages: 595–603
    [BibTeX] [Abstract] [Download PDF]

    Online radicalisation is often linked to discourses on social media. In this context, the question arises how populist online discourses radicalise in social media platforms. With a quantitative content analysis of supporters of the German party “Alternative für Deutschland (AfD)” and their contributions on Facebook between March 2014 and May 2017, this preliminary analysis illustrates how the discourse shifts from a dominantly neutral debate to insult-driven and dis-criminatory contributions. It provides insights into the dynamic of political social media dis-courses and shows a tendency of correlating language style and topics that can be further studied in Social Media Analytics.

    @inproceedings{riebe_conspiracies_2018,
    address = {Dresden, Germany},
    title = {From {Conspiracies} to {Insults}: {A} {Case} {Study} of {Radicalisation} in {Social} {Media} {Discourse}},
    url = {https://dl.gi.de/bitstream/handle/20.500.12116/16795/Beitrag_449_final__a.pdf},
    abstract = {Online radicalisation is often linked to discourses on social media. In this context, the question arises how populist online discourses radicalise in social media platforms. With a quantitative content analysis of supporters of the German party “Alternative für Deutschland (AfD)” and their contributions on Facebook between March 2014 and May 2017, this preliminary analysis illustrates how the discourse shifts from a dominantly neutral debate to insult-driven and dis-criminatory contributions. It provides insights into the dynamic of political social media dis-courses and shows a tendency of correlating language style and topics that can be further studied in Social Media Analytics.},
    booktitle = {Mensch und {Computer} 2018: {Workshopband}},
    publisher = {Gesellschaft für Informatik e.V.},
    author = {Riebe, Thea and Pätsch, Katja and Kaufhold, Marc-André and Reuter, Christian},
    editor = {Dachselt, Raimund and Weber, Gerhard},
    year = {2018},
    keywords = {HCI, Frieden, KontiKat, SMO, CRISP},
    pages = {595--603},
    }


  • Riebe, T., Kaufhold, M. & Reuter, C. The Impact of Organizational Structure and Technology Use on Collaborative Practices in Computer Emergency Response Teams: An Empirical Study

    IN Christian Reuter, Vol. 5, Pages: 30 doi:10.1145/3479865
    [BibTeX]

    @article{riebe_impact_nodate,
    title = {The {Impact} of {Organizational} {Structure} and {Technology} {Use} on {Collaborative} {Practices} in {Computer} {Emergency} {Response} {Teams}: {An} {Empirical} {Study}},
    volume = {5},
    doi = {10.1145/3479865},
    language = {en},
    journal = {Christian Reuter},
    author = {Riebe, Thea and Kaufhold, Marc-André and Reuter, Christian},
    pages = {30},
    }