{"id":9013,"date":"2019-09-19T16:57:30","date_gmt":"2019-09-19T14:57:30","guid":{"rendered":"https:\/\/blog.mi.hdm-stuttgart.de\/?p=9013"},"modified":"2023-08-06T21:44:26","modified_gmt":"2023-08-06T19:44:26","slug":"social-bots-an-attack-on-democracy","status":"publish","type":"post","link":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/2019\/09\/19\/social-bots-an-attack-on-democracy\/","title":{"rendered":"Social Bots &#8211; An Attack on Democracy?"},"content":{"rendered":"\n<p>Election campaigns are increasingly carried out in social networks to influence voters. Social bots are being used for this purpose, which raises the question of how much influence they have on voters and whether they can even endanger a democracy. Furthermore, the question arises as to who can be held responsible for this and how users of social networks can protect themselves against social bots.<\/p>\n\n\n\n<!--more-->\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Democracy &#8211; a secure system?<\/strong><\/h3>\n\n\n\n<p>The decline of the Weimar Republic through Adolf Hitler&#8217;s seizure of power has shown that a democracy is a system that must be protected. Adolf Hitler repealed the civil rights by Reichstagsbrandverordnung (\u201eReichstag fire ordinance\u201c) [1]. The separation of powers was abolished by the \u201eErm\u00e4chtigungsgesetz\u201c (Authorization Act) [2]. Furthermore, the freedom of assembly and of the press was restricted by the \u201eVerordnung des Reichspr\u00e4sidenten zum Schutze des Deutschen Volkes\u201c (\u201eOrdinance of the Reich President for the Protection of the German People\u201c) [3]. In the Federal Republic of Germany, democracy is secured by various laws. The constitution of Germany, the Basic Law, can only be changed if a 2\/3 majority of the Bundestag and a 2\/3 majority of the Bundesrat is achieved [4]. In addition, some paragraphs cannot be changed at all. These concern Article 1 of the Basic Law (human dignity), Article 20 of the Basic Law (state structure) and paragraphs which prevent the abolition of fundamental rights [5]. Nevertheless, there are always people or organizations that want to harm democracy. For this reason, the Constitution is protected by the Domestic Intelligence Service of the Federal Office for the Bundesamt f\u00fcr Verfassungsschutz&nbsp; (\u201edomestic intelligence service of the Federal Republic of Germany \u201c), the Milit\u00e4rische Abschirmdienst (\u201eMilitary&nbsp;Counter-Intelligence&nbsp;Service\u201c) and the Landesbeh\u00f6rde f\u00fcr Verfassungsschutz (\u201eFederal&nbsp;Office&nbsp;for&nbsp;the&nbsp;Protection&nbsp;of&nbsp;the&nbsp;Constitution\u201c) [6].&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Bots<\/strong><\/h3>\n\n\n\n<p>Bots are computer programs that automatically perform repetitive tasks without having to rely on interaction with a human user. Bots mostly consist of simple algorithms. Complex bots are rather rare. [7]<\/p>\n\n\n\n<p>Like any technology, bots are neither good nor bad. Bots can be used for good purposes, to help people or for malicious purposes. For example, web crawlers help to index content from the Internet so that it can be found via search engines. Shop bots enable price comparison portals or bots in computer games make some games attractive in the first place.<\/p>\n\n\n\n<p>Users of bots, for example in the form of Aim-Bot, which automatically aim at the opponent&#8217;s head, or Mining-Bots, which automatically mine resources, have clearly darker intentions. With the sale of the items and resources won with it, you can earn real money afterwards. Other bots try to bid at the last second (auction sniping) [8], click on advertisements (click fraud) [9] or even steal credit card information (credit card fraud) [10]. Entire bot networks are able to surrender an attack target with targeted requests (DDoS).&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>What makes Bots dangerous?<\/strong><\/h3>\n\n\n\n<p>The fact that bots are easy to develop and can cause major damage or generate large profits means that the risk of bots is high. Even attackers with basic programming knowledge should be able to program and use or sell a bot. Bots aren&#8217;t expensive either, they start from $50 per day [11].<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Social Bots<\/strong><\/h3>\n\n\n\n<p>Social Bots simulate human users in social networks [12]. They are used to spread fake news and (political) opinions [13]. Through targeted disinformation, they deceive users of social networks or create polarizing effects [14]. Social bots are not forbidden in Germany [15].<\/p>\n\n\n\n<p>Like other bots, social bots are simple programs. To access data or create their own content, they mostly use APIs provided by the platform operators. Using simple if-then event chains, they search the social network for contributions with certain keywords or hashtags and carry out actions on the contributions found, for example by replying to the contribution. [16]<\/p>\n\n\n\n<p>The beneficiaries of social bots are primarily political actors such as lobby groups, political parties and governments, but also other groups with an interest in forming public opinion such as private individuals, groups and organisations. Furthermore, there are harmless bots, which for example reply to tweets with StarWars tags. [16]<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Use of social bots in election campaigns<\/strong><\/h3>\n\n\n\n<p>Social bots are used above all in election campaigns. In the US presidential election of 2016, Donald Trump&#8217;s 13 million followers included several million bots who shared his tweets and created a mood for the Republicans. Bots from Russia also spread about half a million tweets. [17].<\/p>\n\n\n\n<p>In the Brexit vote (2016), both sides, opponents and supporters of Brexit, used bots. According to this, around 800,000 bots used hashtags on the Brexit theme, such as #leave. From 10 June to 11 July, 10 million tweets were written on the subject of Brexit. Of these, an average of 5 tweets were sent by accounts that can be assigned to bots, while only 1.2 tweets were sent by real users. Bots could be assigned to 13,500 accounts, of which 31% contained #leave and 17% #remain (#remain is mainly used by Brexit opponents). [18]<\/p>\n\n\n\n<p>Bots were also used in Germany in the 2017 Bundestag elections. 7.6% of the tweets about the Bundestag elections had been sent by bots, of which 15% can be attributed to the AfD and 12% to the left [19].<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Influence of bots on humans &#8211; even a few bots can influence<\/strong><\/h3>\n\n\n\n<p>There is no empirical study to date on how far voters actually allowed themselves to be influenced by elections. The theory of the spiral of silence, however, states that the willingness to commit oneself publicly to a topic depends on the climate of opinion [21]. This means that if an opinion contradicts the prevailing opinion, there is an inhibition to publicly represent that opinion. The more opinions are expressed, the less inhibition there is. Already 2-4% of bots can break the spiral and the probability that the opinion of the bots will prevail is 2\/3 [20].<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Responsibilities<\/strong><\/h3>\n\n\n\n<p>Since only 18% of Internet users feel able to recognize social bots [21], the question arises as to who is responsible. In addition, there are various possible positions: the platform, the governments or the users themselves.<\/p>\n\n\n\n<p>Twitter has taken several measures to detect social bots. To do this, they compare relative metrics of human users. Different patterns can be bots. But also the registration process has been improved. Users must confirm their e-mail address or mobile phone number when logging in. This is to prevent automatic logins by bots. Furthermore, tweets with frequent occurrence will be evaluated with the same hashtags. [22]<\/p>\n\n\n\n<p>Facebook, Google and other platforms have presented the EU with a code of conduct against disinformation in which they undertake to block fake accounts and social bots quickly. Advertising revenues for accounts that disseminate false information are also to be withdrawn and data protection-compliant access for researchers established. [23]<\/p>\n\n\n\n<p>The federal government wants a labelling obligation for news originating from social bots. If bots do not identify their messages, the operator will be fined. Furthermore, platforms are to be obliged to make the emergence of bots transparent. [23]<\/p>\n\n\n\n<p>The EU wants to implement an early warning system for the defence against fake news. This would fall within the remit of the European External Action Service (EEAS). To this end, they are to hire more qualified staff, receive better data analysis tools and receive 5 million euros. [24]<\/p>\n\n\n\n<p>However, there is also criticism of an obligation to label. For example, Linus Neuman of the Chaos Computer Club (CCC) considers the importance of social bots to be massively exaggerated. He also said that politicians want to distract from a general loss of trust among citizens. According to Dr. Christian Grimme of the Westf\u00e4lische Wilhelms-Universit\u00e4t M\u00fcnster, there is no jurisdiction: it must first be proven in a court of law whether it is a bot or not. Marie-Teresa Weber of Bitkom raises the question of who judges &#8220;good&#8221; and &#8220;evil&#8221; in the fight against bots. [25]<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Improvement of the competence of the users<\/strong><\/h3>\n\n\n\n<p>Prof. Dr. Thorsten Quant (Westf\u00e4lische Wilhelms-Universit\u00e4t M\u00fcnster) doesn\u2019t see the problem in technology, but in its social application: one should not start with technology, but education is the decisive point [26].<\/p>\n\n\n\n<p>So how can they be recognized? There are several hints that can be found in user profiles and behavior and can provide information about whether it is a real user or a bot [27]:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Do profiles have any private information?<\/li>\n\n\n\n<li>Number of postings?<\/li>\n\n\n\n<li>Thematically always the same?<\/li>\n\n\n\n<li>Above average fast reactions?<\/li>\n\n\n\n<li>No answer to complicated questions?<\/li>\n\n\n\n<li>Many conversations at the same time?<\/li>\n\n\n\n<li>Do the postings have a pattern?<\/li>\n<\/ul>\n\n\n\n<p>There are also online services such as Botometer<a href=\"https:\/\/botometer.iuni.iu.edu\"> (<\/a>https:\/\/botometer.iuni.iu.edu) or Bootsheck (https:\/\/botcheck.me<a href=\"https:\/\/botcheck.me\">),<\/a> which try to detect whether a social media profile is a real user or a bot. They use algorithms based on machine learning [28, 29].<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Social Bots and Artificial Intelligence<\/strong><\/h3>\n\n\n\n<p>As described, social bots are not intelligent, but simple algorithms. Nevertheless, the development of bots does not stop there. A danger emanates from artificial intelligence when social bots create their own content or behave like real people. By then at the latest, social bots will no longer be recognizable as machines.<\/p>\n\n\n\n<p>Microsoft has developed a social bot called Tay, which is based on AI. The aim was to test how an AI can learn in everyday life. Tay was designed as a Twitter bot and learns with every conversation. During a first test run in March 2016, Tay turned into a genocidal troll, so that Tay was shut down after only 16 hours and 96,000 tweets. [30]<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Philosophical and ethical questions<\/strong><\/h3>\n\n\n\n<p>In addition to technical questions, philosophical and ethical questions must also be clarified, such as whether an AI would develop a morality and whether it would accept limits and whether mankind has to do everything that is technically possible at all [32]. The transhumanists want a fusion of the human brain with computer chips to prevent the danger of people not understanding machine solutions&nbsp;[31].<\/p>\n\n\n\n<p>Stephen Hawking warned against crossing a red line, which says whether mankind must do anything at all that is technically possible [32]. An example of this is the atomic bomb.<\/p>\n\n\n\n<p>Science fiction takes up the topic in the form of films. In Terminator (1984) intelligent machines fight against mankind [33| and in 2001: A Space Odyssey (1968) reached an AI that the end of mankind is better for the universe [34].<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Conclusion<\/strong><\/h3>\n\n\n\n<p>German democracy is a system that is protected by laws in such a way that it cannot be leveraged. Nevertheless, there are institutions that actively protect democracy. Social bots are used to spread (political) opinions and influence voters. To counteract this, politicians, operators and users must become aware of their responsibilities. An obligation to label content created by bots is not readily enforceable without jurisdiction. This is why it is important to communicate digital skills in terms of social networks, fake news and the recognition of social bots, and to sensitize users.<\/p>\n\n\n\n<p>The greatest danger comes from social bots that use artificial intelligence, because it is very difficult to even recognize them as bots. In the future, modern problems will require modern solutions to combat them if they send rushing messages, for example by platforms themselves using AI to recognize AI-based bots. The example of Tay from Microsoft shows how dangerous AI-based social bots are. Here we must appeal to humanity not to do everything that is technologically feasible.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">References<\/h4>\n\n\n\n<p>[1] <a href=\"https:\/\/de.wikipedia.org\/wiki\/Verordnung_des_Reichspr%C3%A4sidenten_zum_Schutz_von_Volk_und_Staat\">https:\/\/de.wikipedia.org\/wiki\/Verordnung_des_Reichspr%C3%A4sidenten_zum_Schutz_von_Volk_und_Staat<\/a><\/p>\n\n\n\n<p>[2] <a href=\"https:\/\/de.wikipedia.org\/wiki\/Erm%C3%A4chtigungsgesetz\">https:\/\/de.wikipedia.org\/wiki\/Erm%C3%A4chtigungsgesetz<\/a><\/p>\n\n\n\n<p>[3] <a href=\"https:\/\/de.wikipedia.org\/wiki\/Verordnung_des_Reichspr%C3%A4sidenten_zum_Schutze_des_Deutschen_Volkes\">https:\/\/de.wikipedia.org\/wiki\/Verordnung_des_Reichspr%C3%A4sidenten_zum_Schutze_des_Deutschen_Volkes<\/a><\/p>\n\n\n\n<p>[4]&nbsp;<a href=\"https:\/\/de.wikipedia.org\/wiki\/Verfassungs%C3%A4nderung\">https:\/\/de.wikipedia.org\/wiki\/Verfassungs%C3%A4nderung<\/a><\/p>\n\n\n\n<p>[5] <a href=\"https:\/\/de.wikipedia.org\/wiki\/Ewigkeitsklausel\">https:\/\/de.wikipedia.org\/wiki\/Ewigkeitsklausel<\/a><\/p>\n\n\n\n<p>[6] <a href=\"https:\/\/de.wikipedia.org\/wiki\/Verfassungsschutz\">https:\/\/de.wikipedia.org\/wiki\/Verfassungsschutz<\/a><\/p>\n\n\n\n<p>[7] <a href=\"https:\/\/de.wikipedia.org\/wiki\/Bot\">https:\/\/de.wikipedia.org\/wiki\/Bot<\/a><\/p>\n\n\n\n<p>[8] <a href=\"https:\/\/en.wikipedia.org\/wiki\/Auction_sniping\">https:\/\/en.wikipedia.org\/wiki\/Auction_sniping<\/a><\/p>\n\n\n\n<p>[9] <a href=\"https:\/\/www.cloudflare.com\/learning\/bots\/what-is-click-fraud\/\">https:\/\/www.cloudflare.com\/learning\/bots\/what-is-click-fraud\/<\/a><\/p>\n\n\n\n<p>[10] <a href=\"https:\/\/en.wikipedia.org\/wiki\/Credit_card_fraud\">https:\/\/en.wikipedia.org\/wiki\/Credit_card_fraud<\/a><\/p>\n\n\n\n<p>[11] <a href=\"https:\/\/securelist.com\/the-cost-of-launching-a-ddos-attack\/77784\/\">https:\/\/securelist.com\/the-cost-of-launching-a-ddos-attack\/77784\/<\/a><\/p>\n\n\n\n<p>[12] <a href=\"https:\/\/onlinemarketing.de\/lexikon\/definition-social-bots\">https:\/\/onlinemarketing.de\/lexikon\/definition-social-bots<\/a><\/p>\n\n\n\n<p>[13] <a href=\"https:\/\/www.oeffentliche-it.de\/-\/social-bots\">https:\/\/www.oeffentliche-it.de\/-\/social-bots<\/a><\/p>\n\n\n\n<p>[14] <a href=\"https:\/\/www.ionos.de\/digitalguide\/online-marketing\/social-media\/social-bots-was-koennen-die-meinungsroboter-wirklich\/\">https:\/\/www.ionos.de\/digitalguide\/online-marketing\/social-media\/social-bots-was-koennen-die-meinungsroboter-wirklich\/<\/a><\/p>\n\n\n\n<p>[15] <a href=\"https:\/\/ggr-law.com\/internetrecht\/faq\/social-bots-recht-was-ist-bei-dem-einsatz-von-bots-zu-beachten\/\">https:\/\/ggr-law.com\/internetrecht\/faq\/social-bots-recht-was-ist-bei-dem-einsatz-von-bots-zu-beachten\/<\/a><\/p>\n\n\n\n<p>[16] <a href=\"https:\/\/www.ionos.de\/digitalguide\/online-marketing\/social-media\/social-bots-was-koennen-die-meinungsroboter-wirklich\/\">https:\/\/www.ionos.de\/digitalguide\/online-marketing\/social-media\/social-bots-was-koennen-die-meinungsroboter-wirklich\/<\/a><\/p>\n\n\n\n<p>[17] <a href=\"https:\/\/www.faz.net\/aktuell\/wirtschaft\/diginomics\/twitter-russische-bots-haben-trump-470-000-mal-retweetet-15419783.html\">https:\/\/www.faz.net\/aktuell\/wirtschaft\/diginomics\/twitter-russische-bots-haben-trump-470-000-mal-retweetet-15419783.html<\/a><\/p>\n\n\n\n<p>[18] <a href=\"https:\/\/www.datacenter-insider.de\/brexit-forscher-kommen-der-twitterbot-armee-auf-die-spur-a-661027\/\">https:\/\/www.datacenter-insider.de\/brexit-forscher-kommen-der-twitterbot-armee-auf-die-spur-a-661027\/<\/a><\/p>\n\n\n\n<p>[19] <a href=\"https:\/\/www.abendblatt.de\/politik\/article211987383\/Studie-Social-Bots-auf-Twitter-bestimmen-Wahlkampf-nicht.html\">https:\/\/www.abendblatt.de\/politik\/article211987383\/Studie-Social-Bots-auf-Twitter-bestimmen-Wahlkampf-nicht.html<\/a><\/p>\n\n\n\n<p>[20] <a href=\"https:\/\/medienrot.de\/laute-minderheiten-und-die-schweigespirale\/\">https:\/\/medienrot.de\/laute-minderheiten-und-die-schweigespirale\/<\/a><\/p>\n\n\n\n<p>[21] <a href=\"https:\/\/de.wikinews.org\/wiki\/K%C3%BCnstliche_Intelligenz:_Gefahren_durch_Social_Bots\">https:\/\/de.wikinews.org\/wiki\/K%C3%BCnstliche_Intelligenz:_Gefahren_durch_Social_Bots<\/a><\/p>\n\n\n\n<p>[22] <a href=\"https:\/\/blog.twitter.com\/official\/en_us\/topics\/company\/2018\/how-twitter-is-fighting-spam-and-malicious-automation.html\">https:\/\/blog.twitter.com\/official\/en_us\/topics\/company\/2018\/how-twitter-is-fighting-spam-and-malicious-automation.html<\/a><\/p>\n\n\n\n<p>[24] <a href=\"https:\/\/www.heise.de\/newsticker\/meldung\/Bundesregierung-erwaegt-Kennzeichnungspflicht-fuer-Social-Bots-4252095.html\">https:\/\/www.heise.de\/newsticker\/meldung\/Bundesregierung-erwaegt-Kennzeichnungspflicht-fuer-Social-Bots-4252095.html<\/a><\/p>\n\n\n\n<p>[25] <a href=\"https:\/\/www.heise.de\/newsticker\/meldung\/EU-Kommission-setzt-auf-Fruehwarnsystem-zur-Abwehr-von-Fake-News-4242289.html\">https:\/\/www.heise.de\/newsticker\/meldung\/EU-Kommission-setzt-auf-Fruehwarnsystem-zur-Abwehr-von-Fake-News-4242289.html<\/a><\/p>\n\n\n\n<p>[26] <a href=\"https:\/\/www.bundestag.de\/dokumente\/textarchiv\/2017\/kw04-pa-bildung-forschung-social-bots-488818\">https:\/\/www.bundestag.de\/dokumente\/textarchiv\/2017\/kw04-pa-bildung-forschung-social-bots-488818<\/a><\/p>\n\n\n\n<p>[28] <a href=\"https:\/\/www.tagesschau.de\/faktenfinder\/tutorials\/social-bots-erkennen-101.html\">https:\/\/www.tagesschau.de\/faktenfinder\/tutorials\/social-bots-erkennen-101.html<\/a><\/p>\n\n\n\n<p>[29] <a href=\"https:\/\/botometer.iuni.iu.edu\/#!\/faq%23how-does-it-works\">https:\/\/botometer.iuni.iu.edu\/#!\/faq#how-does-it-works<\/a><\/p>\n\n\n\n<p>[30] <a href=\"https:\/\/medium.com\/@robhat\/identifying-propaganda-bots-on-twitter-5240e7cb81a9\">https:\/\/medium.com\/@robhat\/identifying-propaganda-bots-on-twitter-5240e7cb81a9<\/a><\/p>\n\n\n\n<p>[31] <a href=\"https:\/\/de.wikipedia.org\/wiki\/Tay_(Bot)\">https:\/\/de.wikipedia.org\/wiki\/Tay_(Bot)<\/a><\/p>\n\n\n\n<p>[32] <a href=\"http:\/\/mediario.de\/wordpress\/wp-content\/uploads\/Social-Bots-und-KI.pdf\">http:\/\/mediario.de\/wordpress\/wp-content\/uploads\/Social-Bots-und-KI.pdf<\/a><\/p>\n\n\n\n<p>[33] <a href=\"https:\/\/de.wikipedia.org\/wiki\/Terminator_(Film)\">https:\/\/de.wikipedia.org\/wiki\/Terminator_(Film)<\/a><\/p>\n\n\n\n<p>[34] <a href=\"https:\/\/en.wikipedia.org\/wiki\/2001:_A_Space_Odyssey_(film)\">https:\/\/en.wikipedia.org\/wiki\/2001:_A_Space_Odyssey_(film)<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Election campaigns are increasingly carried out in social networks to influence voters. Social bots are being used for this purpose, which raises the question of how much influence they have on voters and whether they can even endanger a democracy. Furthermore, the question arises as to who can be held responsible for this and how users of social networks can protect themselves against social bots.<\/p>\n","protected":false},"author":948,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[1,664,26],"tags":[],"ppma_author":[805],"class_list":["post-9013","post","type-post","status-publish","format-standard","hentry","category-allgemein","category-ethics","category-secure-systems"],"aioseo_notices":[],"jetpack_featured_media_url":"","jetpack-related-posts":[{"id":10726,"url":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/2020\/08\/24\/fake-news-with-reference-to-information-warfare\/","url_meta":{"origin":9013,"position":0},"title":"Fake news with reference to information warfare","author":"Niklas Brocker","date":"24. August 2020","format":false,"excerpt":"Through networking and the Internet, more and more people can share their opinions and spread news. This has positive and negative consequences. On the one hand, it is much easier to get the news you want and to publish it. On the other hand it is relatively easy to influence\u2026","rel":"","context":"In &quot;Allgemein&quot;","block_context":{"text":"Allgemein","link":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/category\/allgemein\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2020\/08\/fake-2355686_1920.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2020\/08\/fake-2355686_1920.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2020\/08\/fake-2355686_1920.jpg?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2020\/08\/fake-2355686_1920.jpg?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2020\/08\/fake-2355686_1920.jpg?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2020\/08\/fake-2355686_1920.jpg?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":1393,"url":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/2016\/09\/05\/botnets-structural-analysis-functional-principle-and-general-overview\/","url_meta":{"origin":9013,"position":1},"title":"Botnets &#8211; Structural analysis, functional principle and general overview","author":"Michael Kreuzer","date":"5. September 2016","format":false,"excerpt":"This paper provides an overview on the most important types of botnets in terms of network topology, functional principle as well as a short definition on the subject matter. By exploring the motivation of botnet operators, the reader will gain more insight into business models and course of actions of\u2026","rel":"","context":"In &quot;Secure Systems&quot;","block_context":{"text":"Secure Systems","link":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/category\/system-designs\/secure-systems\/"},"img":{"alt_text":"wiat wektor","src":"https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2016\/09\/Fotolia_67526425_M-300x169.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2016\/09\/Fotolia_67526425_M-300x169.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2016\/09\/Fotolia_67526425_M-300x169.jpg?resize=525%2C300&ssl=1 1.5x"},"classes":[]},{"id":28117,"url":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/2026\/02\/27\/how-to-develop-notification-system-for-crypto-stocks\/","url_meta":{"origin":9013,"position":2},"title":"How to Develop a Notification System for Crypto Stocks for Telegram and Discord","author":"Julia Bai","date":"27. February 2026","format":false,"excerpt":"This blog post was written for the lecture \"System Engineering & Management\" (143101a) by Julia Bai, Frederik Runge and Dominik Seitz. Introduction The cryptocurrency market never sleeps. While traditional stock exchanges close, trading in digital assets occurs 24\/7, characterized by extreme volatility where minutes decide between profit and loss. A\u2026","rel":"","context":"In &quot;Allgemein&quot;","block_context":{"text":"Allgemein","link":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/category\/allgemein\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2026\/02\/Shift-Left20Defect20Detection20and20Remediation_5.gif?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2026\/02\/Shift-Left20Defect20Detection20and20Remediation_5.gif?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2026\/02\/Shift-Left20Defect20Detection20and20Remediation_5.gif?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2026\/02\/Shift-Left20Defect20Detection20and20Remediation_5.gif?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":10555,"url":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/2020\/08\/19\/iot-security-the-current-situation-best-practices-and-how-these-should-be-applied\/","url_meta":{"origin":9013,"position":3},"title":"IoT security \u2013 The current situation, \u201cbest practices\u201d and how these should be applied","author":"lh133","date":"19. August 2020","format":false,"excerpt":"Smart thermostats, lamps, sockets, and many other devices are no longer part of any futuristic movies. These items can be found in most households, at least in parts, whether in Europe, America, or Asia. A trend that affects the entire globe and is currently gaining ground, especially in industrialized countries.\u2026","rel":"","context":"In &quot;Internet of Things&quot;","block_context":{"text":"Internet of Things","link":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/category\/scalable-systems\/internet-of-things\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2020\/08\/PaperClasses.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2020\/08\/PaperClasses.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2020\/08\/PaperClasses.png?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2020\/08\/PaperClasses.png?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":1701,"url":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/2016\/11\/14\/malvertising-part-2\/","url_meta":{"origin":9013,"position":4},"title":"Malvertising Part 2","author":"Jonathan Peter","date":"14. November 2016","format":false,"excerpt":"Welcome to the second part of my series about malvertising. In this second post, we\u2019ll get to the important stuff: What is malvertising and how often do these attacks happen? As previously mentioned, the word malvertising is composed of advertising and malware. It\u2019s an attack form in which a victim\u2026","rel":"","context":"In &quot;Secure Systems&quot;","block_context":{"text":"Secure Systems","link":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/category\/system-designs\/secure-systems\/"},"img":{"alt_text":"bildschirmfoto-2016-10-03-um-20-53-58","src":"https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2016\/10\/Bildschirmfoto-2016-10-03-um-20.53.58.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2016\/10\/Bildschirmfoto-2016-10-03-um-20.53.58.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2016\/10\/Bildschirmfoto-2016-10-03-um-20.53.58.png?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2016\/10\/Bildschirmfoto-2016-10-03-um-20.53.58.png?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":3730,"url":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/2018\/06\/26\/metadata-in-the-world-of-smartphones\/","url_meta":{"origin":9013,"position":5},"title":"Metadata in the world of smartphones","author":"Ronny Rampp","date":"26. June 2018","format":false,"excerpt":"Metadata is data about data. Thus, it provides information about data. Examples for metadata are file size, time and date of creation, means of creation of data etc. Every day, we deal with it, but no one really cares about it. Sometimes, metadata gives us more information than the data\u2026","rel":"","context":"In &quot;Secure Systems&quot;","block_context":{"text":"Secure Systems","link":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/category\/system-designs\/secure-systems\/"},"img":{"alt_text":"A nice picture of a dog in garden","src":"https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2018\/06\/Hund.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2018\/06\/Hund.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2018\/06\/Hund.jpg?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2018\/06\/Hund.jpg?resize=700%2C400&ssl=1 2x"},"classes":[]}],"jetpack_sharing_enabled":true,"authors":[{"term_id":805,"user_id":948,"is_guest":0,"slug":"de032","display_name":"de032","avatar_url":"https:\/\/secure.gravatar.com\/avatar\/82a2496378f84f62dfcd0ce8248067f663096d43786b05ee348c2d79e573c1b3?s=96&d=mm&r=g","0":null,"1":"","2":"","3":"","4":"","5":"","6":"","7":"","8":""}],"_links":{"self":[{"href":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/wp-json\/wp\/v2\/posts\/9013","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/wp-json\/wp\/v2\/users\/948"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/wp-json\/wp\/v2\/comments?post=9013"}],"version-history":[{"count":6,"href":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/wp-json\/wp\/v2\/posts\/9013\/revisions"}],"predecessor-version":[{"id":25422,"href":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/wp-json\/wp\/v2\/posts\/9013\/revisions\/25422"}],"wp:attachment":[{"href":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/wp-json\/wp\/v2\/media?parent=9013"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/wp-json\/wp\/v2\/categories?post=9013"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/wp-json\/wp\/v2\/tags?post=9013"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/wp-json\/wp\/v2\/ppma_author?post=9013"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}