P352 - INFORMATIK 2024 - Lock in or log out? Wie digitale Souveränität gelingt
Auflistung P352 - INFORMATIK 2024 - Lock in or log out? Wie digitale Souveränität gelingt nach Erscheinungsdatum
1 - 10 von 196
Treffer pro Seite
Sortieroptionen
- KonferenzbeitragEine Methode für die Potenzialanalyse zur Identifikation von Anwendungsszenarien für Maschinelles Lernen(INFORMATIK 2024, 2024) Fuchs-Kittowski, Frank; Schulze, Paul; Abecker, Andreas; Lachowitzer, Jonas; Lossow, Stefan; Rudolf, Heino; Rodner, ErikDieser Beitrag präsentiert eine Potenzialanalysemethode zur Identifizierung von Anwendungspotenzialen für Maschinelles Lernen in Organisationen. Diese Methode beschreibt ein systematisches Vorgehen, das die Bedarfe der Mitarbeitenden und die Anforderungen der Geschäftsprozesse in den Vordergrund stellt. Neben der Beschreibung der Struktur und Artefakte der Methode wird in diesem Beitrag die Anwendung der Methode am Beispiel eines Landesumweltamtes erläutert. Die gewonnenen Ergebnisse zeigen, dass die Methode den Landesumweltämtern half, den Prozess der Entwicklung von ML-Lösungen schnell und effektiv durchzuführen und dabei eine nutzenstiftende ML-Lösung auszuwählen.
- KonferenzbeitragTowards LLM-augmented Situation Space Analysis for the Hazard and Risk Assessment of Automotive Systems(INFORMATIK 2024, 2024) Hillen, Daniel; Helten, Catharina; Reich, JanThe hazard analysis and risk assessment (HARA) is a fundamental artifact of safety engineering that requires substantial effort from experienced engineers to conform to standards. The cost combined with today’s shortage of trained personnel demands technical solutions to reduce these efforts. Recent advances in generative AI provide new opportunities to support engineers with complex and creative tasks such as the HARA that require knowledge of the system and the environment. However, for now, the results provided by large language models are not reliable enough for safety artifacts so human engineers must review and approve them. In our study, we present a tool to create a HARA based on human-AI cooperation. Our goal is to keep human engineers involved in each decision and guide them by providing arguments, examples, and assessment proposals. In our case study, the engineers benefit from the additional reasonings and proposed assessments of the AI tool.
- KonferenzbeitragUnderstanding stegomalware in ICS: Attacks and Prevention(INFORMATIK 2024, 2024) Edeh, Natasha; Yatagha, Romarick; Mejri, Oumayma; Waedt, KarlThis research investigates the growing threat of stego-malware in Industrial Control Systems (ICS), where attackers utilize steganography to embed malicious code covertly. Such attacks pose significant challenges due to their ability to evade traditional detection methods. The study reviews current cybersecurity frameworks and detection techniques, highlighting their strengths and limitations against stego-malware. It explores various detection approaches, including signature-based, anomaly-based, and AI/ML-based methods, assessing their effectiveness within the context of ISO/IEC 27001 and IEC 62443 standards. Case studies such as Havex and Industroyer underscore the real-world impact of stego-malware on ICS infrastructure. The research advocates for enhanced integration of AI and machine learning to bolster steganalysis capabilities, and proposes improvements to existing cybersecurity frameworks to address steganographic threats more effectively. By bridging gaps in current knowledge, this study contributes to advancing cybersecurity measures tailored to protect critical ICS environments against evolving cyber threats.
- KonferenzbeitragRecht und Technik – Datenschutz im Diskurs: Vorwort zu den Workshopbeiträgen(INFORMATIK 2024, 2024) Grimm, Rüdiger; Hornung, Gerrit; Sorge, Christoph; Döhmann, Indra
- KonferenzbeitragKey Users activities along ACTIVATE phases and associated challenges in a Public Cloud ERP introduction(INFORMATIK 2024, 2024) Brockmann, Dr. Carsten; Rudat, JörgThe concept of key users is not new to the world of ERP system implementations. Key users are responsible for ensuring that the ERP standard is mostly adapted, leading to a clean core. In this article, we describe their importance, outline their activities and workload, and conclude with recommendations on how to handle the challenges that may arise.
- KonferenzbeitragNutzerfreundliche Datenschutzinformationen: Erkenntnisse des Einflusses der gestalterischen Aufbereitung einer Datenschutzinformation auf das Textverständnis(INFORMATIK 2024, 2024) Geissler, Ines; Selzer, AnnikaDer vorliegende Beitrag untersucht den Einfluss der gestalterischen Aufbereitung von Datenschutzinformationen auf das Textverständnis. Hierfür wurden 32 strukturierte Interviews mit betroffenen Personen geführt. Im Rahmen dessen wurden verschiedene Aufbereitungsformen von Datenschutzinformationen erprobt und diskutiert.
- KonferenzbeitragConsidering the Regulatory Framework of the AI Act: Cybersecurity in the Technical and Legal Integration of Dialogue Systems(INFORMATIK 2024, 2024) Reckziegel Weschenfelder, LucasIn this paper we aim to provide a concise commentary on the possibilities of technical integration within the regulatory framework established by the AI Act. It will focus on the conception of dialogue systems and their interoperable functionalities, highlighting their interactions as and with other AI systems deployed as cybersecurity products or services. The analysis advocates for and acknowledges the need for a broader contextual dialogue between regulations that may influence this technological environment.
- KonferenzbeitragArtificial Intelligence-Based Assistance Systems for Environmental Sustainability in Smart Homes: A Systematic Literature Review on Requirements and Future Directions(INFORMATIK 2024, 2024) Brîncoveanu, Constantin; Carl, K. Valerie; Binz, Simon; Weiher, Moritz-Andre; Thomas, Oliver; Hinz, OliverArtificial Intelligence (AI) is increasingly being utilized to promote sustainable behavior, particularly in the context of smart homes. Such solutions can significantly enhance resource consumption sustainability by leveraging data analysis for ecological benefits. This systematic literature review examines the requirements for data-driven AI applications aimed at improving environmental sustainability in smart homes, based on an analysis of 60 selected papers. Key findings include the importance of predictive analytics, privacy and security, context-aware features, real-time monitoring, interoperability, efficiency strategies, personalized user engagement, user interface design, and behavioral aspects. We highlight technological advancements that facilitate more comprehensive applications and identify the need for integrating diverse features to build consumer trust and acceptance. This review provides an overview of current smart home technologies and suggests future research directions to enhance energy efficiency, user comfort, and environmental sustainability.
- KonferenzbeitragScalable Modeling of Preventive and Detective Security Controls for Cyber-Physical Systems(INFORMATIK 2024, 2024) Shun, Hnin Yee; Al Sardy, Loui; Waedt, Karl; Le Berre, GabrielCritical infrastructure and Industry 4.0 depend heavily on Cyber-Physical Systems (CPS), necessitating significant support for cybersecurity and safety professionals throughout development and implementation. This paper explores safety measures linked to physical protection at different CPS levels and how they interact with features of the digital twin. However, digital twins require comprehensive preventative and detective procedures to ensure security. The objective is to facilitate advanced attack tree analysis. Utilizing 3D modeling to incorporate features such as tamper-indicating devices, forensic biometric security, digital CCTV/video monitoring, physical/logical zones, and graded security controls enhances the depiction of the real world. Furthermore, functional safety assessments and risk assessments are carried out. The frameworks will include Babylon JS 7.0, Vue 3.x, and Element+, enabling a tool-based method designed to help subject matter experts analyze complex security postures of CPS efficiently and consistently. This scalable method can be applied in smart manufacturing as well as large-scale plant operations.
- KonferenzbeitragUnderstanding and addressing user needs for annotation of simple sensor data: Bridging the gap between human sensemaking and machine interpretation(INFORMATIK 2024, 2024) Kurze, Albrecht; Reuter, ChristinThe increasing presence of sensors in smart homes generates vast amounts of data, which require effective interpretation to be useful, often along with data annotation. While automatic approaches can automatically analyze sensor data but require strict and clean annotations, they often neglect the complex, multidimensional nature of human sensemaking. We explore this gap and propose an approach to bridge this gap. We present preliminary findings from three directions: lay user annotations of sensor data collected in a field study using our Sensorkit solution, analysis of existing annotation tools, and a human-centered design process for a new annotation solution. Our goal is to develop a more integrated approach to sensor data interpretation that benefits both humans and machines.