Universitätspublikationen
Refine
Year of publication
- 2016 (107) (remove)
Document Type
- Report (107) (remove)
Has Fulltext
- yes (107)
Is part of the Bibliography
- no (107)
Keywords
- Deutschland (10)
- Salafismus (9)
- Terrorismus (7)
- EU (6)
- Islamischer Staat (6)
- terrorism (6)
- Islamismus (5)
- far right (5)
- islamism (5)
- China (4)
We study platform design in online markets in which buying involves a (non-monetary) cost for consumers caused by privacy and security concerns. Firms decide whether to require registration at their website before consumers learn relevant product information. We derive conditions under which a monopoly seller benefits from ex ante registration requirements and demonstrate that the profitability of registration requirements is increased when taking into account the prospect of future purchases or an informational value of consumer registration to the
rm. Moreover, we consider the effectiveness of discounts (store credit) as a means to influence the consumers-registration decision. Finally, we con
rm the profitability of ex ante registration requirements in the presence of price competition.
Dies ist ein Crosspost mit freundlicher Genehmigung der Hessischen Stiftung Friedens- und Konfliktforschung. Der Beitrag findet sich ebenso auf der Seite der HSFK.
Trotz Bangen war am Ende allen zum Feiern zumute: Am 16. Dezember 2016 fasste die fünfte Überprüfungskonferenz der UN-Waffenkonvention (Convention on Certain Conventional Weapons, CCW) unter pakistanischem Vorsitz den Beschluss, im nächsten Jahr eine offizielle Expertenkommission einzusetzen, die sich mit letalen autonomen Waffensystemen (Lethal Autonomous Weapons Systems, LAWS) befassen soll. Diese Group of Governmental Experts (GGE) wird unter indischem Vorsitz „open-ended“ tagen und 2017 zu zwei je fünftägigen Treffen zusammenkommen...
Terrorism isn't new to the country; in its history, France has experienced a significant number of attacks. In 1995, the GIA-affiliated terrorist network of which Khaled Kelkal was part conducted several attacks, as did the Al Qaida-affiliated gang de Roubaix one year later; but until Mohammed Merah’s murders in 2012 in Toulouse and Montauban, terrorist attacks were treated as political violence in the context of anti-colonial struggles or connected to other kinds of violent conflicts abroad, such as the Bosnian War, rather than as religiously inspired or connected to social, societal and/or political issues within the country, or as some sort of atypical pathology. Terrorist perpetrators, their networks and milieus were met with repressive instruments – a wider angle of analysis which would have allowed to tackle the threat from a more holistic perspective had not been incorporated in a counter-terrorism policy design.
Der angebliche Hack von etwa 900.000 Telekomroutern hat in Deutschland das Thema IT-Sicherheit wieder einmal auf die Tagesordnung gesetzt. In den folgenden Tagen kristallisierte sich heraus, dass der Ausfall der Router mit Internetkriminalität in Verbindung stand. Dabei hätte es bleiben können, aber es sollte nicht lange dauern, bis das ebenfalls immer aktuelle Reizthema Terrorismus mit den Vorfällen in Verbindung gebracht wurde: Rainer Wendt, Bundesvorsitzender der Deutschen Polizeigewerkschaft, ließ im Zuge des angeblichen Hackerangriffs folgendes verlautbaren: "Cyber-Kriminalität ist Terrorismus."
Die Gleichsetzung von Hackern mit Terroristen, die Herr Wendt in seinem Interview vornimmt, ist derart absurd und gleichzeitig symptomatisch für eine unproduktive und hysterische Debatte zu IT-Sicherheit (vulgo: Cybersicherheit) und dem vagen Begriff des Cyberterrors, dass es sinnvoll ist, sie in einen kritischen Kontext zu setzen. Dieser Beitrag betrachtet daher, ausgehend vom Ausfall der Telekomrouter, die Ereignisse und diskutiert wieso die Debatte um IT-Sicherheit in Deutschland fundamental an den eigentlichen Sicherheitsproblemen in der IT und aus Sicht der Terrorbekämpfung vorbei geht.
We present techniques to prove termination of cycle rewriting, that is, string rewriting on cycles, which are strings in which the start and end are connected. Our main technique is to transform cycle rewriting into string rewriting and then apply state of the art techniques to prove termination of the string rewrite system. We present three such transformations, and prove for all of them that they are sound and complete. In this way not only termination of string rewriting of the transformed system implies termination of the original cycle rewrite system, a similar conclusion can be drawn for non-termination. Apart from this transformational approach, we present a uniform framework of matrix interpretations, covering most of the earlier approaches to automatically proving termination of cycle rewriting. All our techniques serve both for proving termination and relative termination. We present several experiments showing the power of our techniques.
Since Mobile Virtual Assistants are rising in popularity and come with most new smartphones out of the box and theoretical work in the field is hard to come by, a test is in order to establish the status quo of development. We did a manual test on six different Mobile Virtual Assistants in the categories Voice Recognition, Online Search, Phone Control and Natural Conversation and the results show that Siri is currently the best Mobile Virtual Assistant on the market with a success rate of 65.8% on average over all four categories.
On October the 2nd the Colombian people rejected the peace agreement between the government and the FARC in a referendum with a very thin majority of 0.4%. With this unexpected rejection, the referendum was in some ways similar to the Brexit referendum, for the results of which David Cameron was as little prepared as Juan Manuel Santos for his rejection; there was obviously no Plan B. In the last weeks, the government undertook ten changes to the agreement, but it will not go through a referendum again. Santos, as he said, has learned his lesson from the rejection and will seek to have the amended peace agreement approved in Congress. This will likely lead to the implementation of the peace agreement and the furtherance of its goals, such as a DDR process, land reforms, a transitional justice process and reparations for victims, just to mention a few. But this progress in peace will be seen as being at odds with popular opinion. Many of the “no” voters are still not satisfied with the adjustments made by the government and the FARC, and neither are the sectors of the opposition mainly responsible for the rejection. Nevertheless, the government and the FARC are progressing with the implementation, and peace talks with the second-largest – and now the last standing – guerrilla group, the ELN, are scheduled to start in 2017. The prospects for 2018 and onwards, when the presidency election will be held, are more questionable.
This is the last post in the blog series „Movements and Institutions“. Check out the introductory post for more information on the series and click here for all contributions.
This blog series reflected on the interactions between social movements and institutions. These interactions have proven to be among the most complicated areas of social movement research, especially because causality is very hard to establish: (how) do movements influence formal political institutions – and vice versa? How to study, understand and explain the consequences of the institutionalization of social movements? The difficulties of addressing these questions are also related to definitional problems as social movements and institutions can be understood and defined in various ways. All authors contributing to this blog series highlight the importance of studying interactions between social movements from one perspective or another.
Wird von Terrorismusbekämpfung gesprochen, ist der Fokus auf nationale Problemlösungen gerichtet. Bei modernen Formen des Terrorismus handelt es sich zumeist um transnationale Phänomene, denen auch transnational begegnet werden muss. Zwei Beispiele zeigen die Probleme, die aus einer nationalen Beschränkung entstehen...
Radicalisation is a phenomenon that has been striking not only in parts of Asia and Africa but also in the heart of Europe. While the number of Muslims in Germany is estimated by 4,7 millions (5,8%), 70% of the almost 900,000 asylum-seekers have arrived in recent years are believed to be Muslims. It is undeniable that there is discrimination in Germany, and it is equally undeniable that more on issues of integration and conflict prevention should be done. Thus, could effective integration processes prevent radicalisation of the Muslim youth in Europe?
Donald Trump hat die Polittechnologie des Populismus auf die Spitze getrieben und geradezu perfektioniert. Hier sind die mehr oder minder appetitlichen Zutaten seines Hyperpopulismus, die allesamt zur Anwendung kamen. Keine dieser Ingredienzen ist gänzlich neu, sondern sie wurden auch schon von europäischen Rechtspopulisten hinlänglich erprobt. Dieses Gemisch bedarf eines fruchtbaren Resonanzbodens, um seine betörende Wirkung zu entfalten. Es muss auf eine gesellschaftliche Disposition treffen. Je nach Kontext spielen unterschiedliche sozio-kulturelle und ökonomische Faktoren eine Rolle, weshalb sich die Populismen auch von Land zu Land in Form und Inhalt durchaus unterscheiden. Dennoch gibt es so etwas wie einen Kern an populistischen Lehrsätzen und Mechanismen, die man sich vergegenwärtigen sollte, um auch in der medialen Berichterstattung nicht stets aufs Neue in die aufgestellten Fallen zu tappen.
Flüchtlinge in eine neue Sicherheitsarchitektur einzubinden ist billiger und effektiver als ein Überwachungsstaat oder der Einsatz der GSG 9 bei jedem Verdachtsfall. Der Fall des Terrorverdächtigen von Chemnitz hat auf deutlichste Weise gezeigt, dass Behörden große Schwierigkeiten damit haben, die Bildung von Kleinst-Terrorzellen zu verhindern. Sie bekommen ihre Informationen zu oft ex-post, oder warten zu lange mit dem Zugriff. Daher muss an besseren Präventions- und Notfallmechanismen gearbeitet werden. Dies hat allerdings viele Facetten : Jugend- und Informationsprogramme, eine effektive Bekämpfung der Jihad Online Propaganda und die aktive Einbindung von Flüchtlingen und ihren Netzwerken in die Terrorismusprävention und in Notfall-Strategien.