[{"status":"public","type":"journal_article","publication":"CoRR","language":[{"iso":"eng"}],"_id":"47294","user_id":"14931","department":[{"_id":"34"},{"_id":"858"}],"year":"2023","citation":{"apa":"Tran, M., Acar, Y., Cucker, M., Enck, W., Kapravelos, A., Kästner, C., &#38; Williams, L. A. (2023). S3C2 Summit 2202-09: Industry Secure Suppy Chain Summit. <i>CoRR</i>, <i>abs/2307.15642</i>. <a href=\"https://doi.org/10.48550/arXiv.2307.15642\">https://doi.org/10.48550/arXiv.2307.15642</a>","short":"M. Tran, Y. Acar, M. Cucker, W. Enck, A. Kapravelos, C. Kästner, L.A. Williams, CoRR abs/2307.15642 (2023).","mla":"Tran, Mindy, et al. “S3C2 Summit 2202-09: Industry Secure Suppy Chain Summit.” <i>CoRR</i>, vol. abs/2307.15642, 2023, doi:<a href=\"https://doi.org/10.48550/arXiv.2307.15642\">10.48550/arXiv.2307.15642</a>.","bibtex":"@article{Tran_Acar_Cucker_Enck_Kapravelos_Kästner_Williams_2023, title={S3C2 Summit 2202-09: Industry Secure Suppy Chain Summit}, volume={abs/2307.15642}, DOI={<a href=\"https://doi.org/10.48550/arXiv.2307.15642\">10.48550/arXiv.2307.15642</a>}, journal={CoRR}, author={Tran, Mindy and Acar, Yasemin and Cucker, Michel and Enck, William and Kapravelos, Alexandros and Kästner, Christian and Williams, Laurie A.}, year={2023} }","ieee":"M. Tran <i>et al.</i>, “S3C2 Summit 2202-09: Industry Secure Suppy Chain Summit,” <i>CoRR</i>, vol. abs/2307.15642, 2023, doi: <a href=\"https://doi.org/10.48550/arXiv.2307.15642\">10.48550/arXiv.2307.15642</a>.","chicago":"Tran, Mindy, Yasemin Acar, Michel Cucker, William Enck, Alexandros Kapravelos, Christian Kästner, and Laurie A. Williams. “S3C2 Summit 2202-09: Industry Secure Suppy Chain Summit.” <i>CoRR</i> abs/2307.15642 (2023). <a href=\"https://doi.org/10.48550/arXiv.2307.15642\">https://doi.org/10.48550/arXiv.2307.15642</a>.","ama":"Tran M, Acar Y, Cucker M, et al. S3C2 Summit 2202-09: Industry Secure Suppy Chain Summit. <i>CoRR</i>. 2023;abs/2307.15642. doi:<a href=\"https://doi.org/10.48550/arXiv.2307.15642\">10.48550/arXiv.2307.15642</a>"},"title":"S3C2 Summit 2202-09: Industry Secure Suppy Chain Summit","doi":"10.48550/arXiv.2307.15642","date_updated":"2024-06-05T12:41:36Z","author":[{"last_name":"Tran","id":"99001","full_name":"Tran, Mindy","first_name":"Mindy"},{"first_name":"Yasemin","last_name":"Acar","full_name":"Acar, Yasemin","id":"94636"},{"first_name":"Michel","last_name":"Cucker","full_name":"Cucker, Michel"},{"last_name":"Enck","full_name":"Enck, William","first_name":"William"},{"last_name":"Kapravelos","full_name":"Kapravelos, Alexandros","first_name":"Alexandros"},{"full_name":"Kästner, Christian","last_name":"Kästner","first_name":"Christian"},{"full_name":"Williams, Laurie A.","last_name":"Williams","first_name":"Laurie A."}],"date_created":"2023-09-22T13:24:55Z","volume":"abs/2307.15642"},{"language":[{"iso":"eng"}],"user_id":"14931","department":[{"_id":"34"},{"_id":"858"}],"_id":"47293","status":"public","type":"journal_article","publication":"CoRR","doi":"10.48550/arXiv.2307.16557","title":"S3C2 Summit 2023-02: Industry Secure Supply Chain Summit","date_created":"2023-09-22T13:24:29Z","author":[{"last_name":"Dunlap","full_name":"Dunlap, Trevor","first_name":"Trevor"},{"full_name":"Acar, Yasemin","id":"94636","last_name":"Acar","first_name":"Yasemin"},{"full_name":"Cucker, Michel","last_name":"Cucker","first_name":"Michel"},{"first_name":"William","full_name":"Enck, William","last_name":"Enck"},{"full_name":"Kapravelos, Alexandros","last_name":"Kapravelos","first_name":"Alexandros"},{"last_name":"Kästner","full_name":"Kästner, Christian","first_name":"Christian"},{"first_name":"Laurie A.","full_name":"Williams, Laurie A.","last_name":"Williams"}],"volume":"abs/2307.16557","date_updated":"2024-06-05T12:41:59Z","citation":{"apa":"Dunlap, T., Acar, Y., Cucker, M., Enck, W., Kapravelos, A., Kästner, C., &#38; Williams, L. A. (2023). S3C2 Summit 2023-02: Industry Secure Supply Chain Summit. <i>CoRR</i>, <i>abs/2307.16557</i>. <a href=\"https://doi.org/10.48550/arXiv.2307.16557\">https://doi.org/10.48550/arXiv.2307.16557</a>","bibtex":"@article{Dunlap_Acar_Cucker_Enck_Kapravelos_Kästner_Williams_2023, title={S3C2 Summit 2023-02: Industry Secure Supply Chain Summit}, volume={abs/2307.16557}, DOI={<a href=\"https://doi.org/10.48550/arXiv.2307.16557\">10.48550/arXiv.2307.16557</a>}, journal={CoRR}, author={Dunlap, Trevor and Acar, Yasemin and Cucker, Michel and Enck, William and Kapravelos, Alexandros and Kästner, Christian and Williams, Laurie A.}, year={2023} }","short":"T. Dunlap, Y. Acar, M. Cucker, W. Enck, A. Kapravelos, C. Kästner, L.A. Williams, CoRR abs/2307.16557 (2023).","mla":"Dunlap, Trevor, et al. “S3C2 Summit 2023-02: Industry Secure Supply Chain Summit.” <i>CoRR</i>, vol. abs/2307.16557, 2023, doi:<a href=\"https://doi.org/10.48550/arXiv.2307.16557\">10.48550/arXiv.2307.16557</a>.","ama":"Dunlap T, Acar Y, Cucker M, et al. S3C2 Summit 2023-02: Industry Secure Supply Chain Summit. <i>CoRR</i>. 2023;abs/2307.16557. doi:<a href=\"https://doi.org/10.48550/arXiv.2307.16557\">10.48550/arXiv.2307.16557</a>","chicago":"Dunlap, Trevor, Yasemin Acar, Michel Cucker, William Enck, Alexandros Kapravelos, Christian Kästner, and Laurie A. Williams. “S3C2 Summit 2023-02: Industry Secure Supply Chain Summit.” <i>CoRR</i> abs/2307.16557 (2023). <a href=\"https://doi.org/10.48550/arXiv.2307.16557\">https://doi.org/10.48550/arXiv.2307.16557</a>.","ieee":"T. Dunlap <i>et al.</i>, “S3C2 Summit 2023-02: Industry Secure Supply Chain Summit,” <i>CoRR</i>, vol. abs/2307.16557, 2023, doi: <a href=\"https://doi.org/10.48550/arXiv.2307.16557\">10.48550/arXiv.2307.16557</a>."},"year":"2023"},{"citation":{"bibtex":"@article{Enck_Acar_Cukier_Kapravelos_Kästner_Williams_2023, title={S3C2 Summit 2023-06: Government Secure Supply Chain Summit}, volume={abs/2308.06850}, DOI={<a href=\"https://doi.org/10.48550/arXiv.2308.06850\">10.48550/arXiv.2308.06850</a>}, journal={CoRR}, author={Enck, William and Acar, Yasemin and Cukier, Michel and Kapravelos, Alexandros and Kästner, Christian and Williams, Laurie A.}, year={2023} }","short":"W. Enck, Y. Acar, M. Cukier, A. Kapravelos, C. Kästner, L.A. Williams, CoRR abs/2308.06850 (2023).","mla":"Enck, William, et al. “S3C2 Summit 2023-06: Government Secure Supply Chain Summit.” <i>CoRR</i>, vol. abs/2308.06850, 2023, doi:<a href=\"https://doi.org/10.48550/arXiv.2308.06850\">10.48550/arXiv.2308.06850</a>.","apa":"Enck, W., Acar, Y., Cukier, M., Kapravelos, A., Kästner, C., &#38; Williams, L. A. (2023). S3C2 Summit 2023-06: Government Secure Supply Chain Summit. <i>CoRR</i>, <i>abs/2308.06850</i>. <a href=\"https://doi.org/10.48550/arXiv.2308.06850\">https://doi.org/10.48550/arXiv.2308.06850</a>","ama":"Enck W, Acar Y, Cukier M, Kapravelos A, Kästner C, Williams LA. S3C2 Summit 2023-06: Government Secure Supply Chain Summit. <i>CoRR</i>. 2023;abs/2308.06850. doi:<a href=\"https://doi.org/10.48550/arXiv.2308.06850\">10.48550/arXiv.2308.06850</a>","ieee":"W. Enck, Y. Acar, M. Cukier, A. Kapravelos, C. Kästner, and L. A. Williams, “S3C2 Summit 2023-06: Government Secure Supply Chain Summit,” <i>CoRR</i>, vol. abs/2308.06850, 2023, doi: <a href=\"https://doi.org/10.48550/arXiv.2308.06850\">10.48550/arXiv.2308.06850</a>.","chicago":"Enck, William, Yasemin Acar, Michel Cukier, Alexandros Kapravelos, Christian Kästner, and Laurie A. Williams. “S3C2 Summit 2023-06: Government Secure Supply Chain Summit.” <i>CoRR</i> abs/2308.06850 (2023). <a href=\"https://doi.org/10.48550/arXiv.2308.06850\">https://doi.org/10.48550/arXiv.2308.06850</a>."},"year":"2023","doi":"10.48550/arXiv.2308.06850","title":"S3C2 Summit 2023-06: Government Secure Supply Chain Summit","author":[{"first_name":"William","last_name":"Enck","full_name":"Enck, William"},{"full_name":"Acar, Yasemin","id":"94636","last_name":"Acar","first_name":"Yasemin"},{"first_name":"Michel","full_name":"Cukier, Michel","last_name":"Cukier"},{"full_name":"Kapravelos, Alexandros","last_name":"Kapravelos","first_name":"Alexandros"},{"last_name":"Kästner","full_name":"Kästner, Christian","first_name":"Christian"},{"last_name":"Williams","full_name":"Williams, Laurie A.","first_name":"Laurie A."}],"date_created":"2023-09-22T13:23:45Z","volume":"abs/2308.06850","date_updated":"2024-06-05T12:42:20Z","status":"public","type":"journal_article","publication":"CoRR","language":[{"iso":"eng"}],"user_id":"14931","department":[{"_id":"34"},{"_id":"858"}],"_id":"47292"},{"date_created":"2023-09-22T13:27:24Z","author":[{"first_name":"Tadayoshi","last_name":"Kohno","full_name":"Kohno, Tadayoshi"},{"id":"94636","full_name":"Acar, Yasemin","last_name":"Acar","first_name":"Yasemin"},{"full_name":"Loh, Wulf","last_name":"Loh","first_name":"Wulf"}],"date_updated":"2024-06-05T12:49:39Z","publisher":"USENIX Association","title":"Ethical Frameworks and Computer Security Trolley Problems: Foundations for Conversations","citation":{"ieee":"T. Kohno, Y. Acar, and W. Loh, “Ethical Frameworks and Computer Security Trolley Problems: Foundations for Conversations,” in <i>32nd USENIX Security Symposium, USENIX Security 2023, Anaheim, CA, USA, August 9-11, 2023</i>, 2023.","chicago":"Kohno, Tadayoshi, Yasemin Acar, and Wulf Loh. “Ethical Frameworks and Computer Security Trolley Problems: Foundations for Conversations.” In <i>32nd USENIX Security Symposium, USENIX Security 2023, Anaheim, CA, USA, August 9-11, 2023</i>, edited by Joseph A. Calandrino and Carmela Troncoso. USENIX Association, 2023.","ama":"Kohno T, Acar Y, Loh W. Ethical Frameworks and Computer Security Trolley Problems: Foundations for Conversations. In: Calandrino JA, Troncoso C, eds. <i>32nd USENIX Security Symposium, USENIX Security 2023, Anaheim, CA, USA, August 9-11, 2023</i>. USENIX Association; 2023.","apa":"Kohno, T., Acar, Y., &#38; Loh, W. (2023). Ethical Frameworks and Computer Security Trolley Problems: Foundations for Conversations. In J. A. Calandrino &#38; C. Troncoso (Eds.), <i>32nd USENIX Security Symposium, USENIX Security 2023, Anaheim, CA, USA, August 9-11, 2023</i>. USENIX Association.","short":"T. Kohno, Y. Acar, W. Loh, in: J.A. Calandrino, C. Troncoso (Eds.), 32nd USENIX Security Symposium, USENIX Security 2023, Anaheim, CA, USA, August 9-11, 2023, USENIX Association, 2023.","mla":"Kohno, Tadayoshi, et al. “Ethical Frameworks and Computer Security Trolley Problems: Foundations for Conversations.” <i>32nd USENIX Security Symposium, USENIX Security 2023, Anaheim, CA, USA, August 9-11, 2023</i>, edited by Joseph A. Calandrino and Carmela Troncoso, USENIX Association, 2023.","bibtex":"@inproceedings{Kohno_Acar_Loh_2023, title={Ethical Frameworks and Computer Security Trolley Problems: Foundations for Conversations}, booktitle={32nd USENIX Security Symposium, USENIX Security 2023, Anaheim, CA, USA, August 9-11, 2023}, publisher={USENIX Association}, author={Kohno, Tadayoshi and Acar, Yasemin and Loh, Wulf}, editor={Calandrino, Joseph A. and Troncoso, Carmela}, year={2023} }"},"year":"2023","user_id":"14931","department":[{"_id":"34"},{"_id":"858"}],"_id":"47300","language":[{"iso":"eng"}],"type":"conference","publication":"32nd USENIX Security Symposium, USENIX Security 2023, Anaheim, CA, USA, August 9-11, 2023","status":"public","editor":[{"full_name":"Calandrino, Joseph A.","last_name":"Calandrino","first_name":"Joseph A."},{"first_name":"Carmela","last_name":"Troncoso","full_name":"Troncoso, Carmela"}]},{"user_id":"14931","department":[{"_id":"34"},{"_id":"858"}],"_id":"47312","language":[{"iso":"eng"}],"type":"conference","publication":"Nineteenth Symposium on Usable Privacy and Security, SOUPS 2023, Anaheim, CA, USA, August 5-7, 2023","status":"public","author":[{"first_name":"Lorenzo","full_name":"Neil, Lorenzo","last_name":"Neil"},{"id":"99000","full_name":"Sri Ramulu, Harshini","orcid":"0000-0002-0000-5843","last_name":"Sri Ramulu","first_name":"Harshini"},{"last_name":"Acar","full_name":"Acar, Yasemin","id":"94636","first_name":"Yasemin"},{"full_name":"Reaves, Bradley","last_name":"Reaves","first_name":"Bradley"}],"date_created":"2023-09-22T13:45:47Z","date_updated":"2024-06-05T12:50:02Z","publisher":"USENIX Association","title":"Who Comes Up with this Stuff? Interviewing Authors to Understand How They Produce Security Advice","citation":{"apa":"Neil, L., Sri Ramulu, H., Acar, Y., &#38; Reaves, B. (2023). Who Comes Up with this Stuff? Interviewing Authors to Understand How They Produce Security Advice. <i>Nineteenth Symposium on Usable Privacy and Security, SOUPS 2023, Anaheim, CA, USA, August 5-7, 2023</i>, 283–299.","short":"L. Neil, H. Sri Ramulu, Y. Acar, B. Reaves, in: Nineteenth Symposium on Usable Privacy and Security, SOUPS 2023, Anaheim, CA, USA, August 5-7, 2023, USENIX Association, 2023, pp. 283–299.","mla":"Neil, Lorenzo, et al. “Who Comes Up with This Stuff? Interviewing Authors to Understand How They Produce Security Advice.” <i>Nineteenth Symposium on Usable Privacy and Security, SOUPS 2023, Anaheim, CA, USA, August 5-7, 2023</i>, USENIX Association, 2023, pp. 283–299.","bibtex":"@inproceedings{Neil_Sri Ramulu_Acar_Reaves_2023, title={Who Comes Up with this Stuff? Interviewing Authors to Understand How They Produce Security Advice}, booktitle={Nineteenth Symposium on Usable Privacy and Security, SOUPS 2023, Anaheim, CA, USA, August 5-7, 2023}, publisher={USENIX Association}, author={Neil, Lorenzo and Sri Ramulu, Harshini and Acar, Yasemin and Reaves, Bradley}, year={2023}, pages={283–299} }","chicago":"Neil, Lorenzo, Harshini Sri Ramulu, Yasemin Acar, and Bradley Reaves. “Who Comes Up with This Stuff? Interviewing Authors to Understand How They Produce Security Advice.” In <i>Nineteenth Symposium on Usable Privacy and Security, SOUPS 2023, Anaheim, CA, USA, August 5-7, 2023</i>, 283–299. USENIX Association, 2023.","ieee":"L. Neil, H. Sri Ramulu, Y. Acar, and B. Reaves, “Who Comes Up with this Stuff? Interviewing Authors to Understand How They Produce Security Advice,” in <i>Nineteenth Symposium on Usable Privacy and Security, SOUPS 2023, Anaheim, CA, USA, August 5-7, 2023</i>, 2023, pp. 283–299.","ama":"Neil L, Sri Ramulu H, Acar Y, Reaves B. Who Comes Up with this Stuff? Interviewing Authors to Understand How They Produce Security Advice. In: <i>Nineteenth Symposium on Usable Privacy and Security, SOUPS 2023, Anaheim, CA, USA, August 5-7, 2023</i>. USENIX Association; 2023:283–299."},"page":"283–299","year":"2023"},{"year":"2023","citation":{"chicago":"Klemmer, Jan H., Marco Gutfleisch, Christian Stransky, Yasemin Acar, M. Angela Sasse, and Sascha Fahl. “‘Make Them Change It Every Week!’: A Qualitative Exploration of Online Developer Advice on Usable and Secure Authentication.” <i>CoRR</i> abs/2309.00744 (2023). <a href=\"https://doi.org/10.48550/arXiv.2309.00744\">https://doi.org/10.48550/arXiv.2309.00744</a>.","ieee":"J. H. Klemmer, M. Gutfleisch, C. Stransky, Y. Acar, M. A. Sasse, and S. Fahl, “‘Make Them Change it Every Week!’: A Qualitative Exploration of Online Developer Advice on Usable and Secure Authentication,” <i>CoRR</i>, vol. abs/2309.00744, 2023, doi: <a href=\"https://doi.org/10.48550/arXiv.2309.00744\">10.48550/arXiv.2309.00744</a>.","ama":"Klemmer JH, Gutfleisch M, Stransky C, Acar Y, Sasse MA, Fahl S. “Make Them Change it Every Week!”: A Qualitative Exploration of Online Developer Advice on Usable and Secure Authentication. <i>CoRR</i>. 2023;abs/2309.00744. doi:<a href=\"https://doi.org/10.48550/arXiv.2309.00744\">10.48550/arXiv.2309.00744</a>","apa":"Klemmer, J. H., Gutfleisch, M., Stransky, C., Acar, Y., Sasse, M. A., &#38; Fahl, S. (2023). “Make Them Change it Every Week!”: A Qualitative Exploration of Online Developer Advice on Usable and Secure Authentication. <i>CoRR</i>, <i>abs/2309.00744</i>. <a href=\"https://doi.org/10.48550/arXiv.2309.00744\">https://doi.org/10.48550/arXiv.2309.00744</a>","bibtex":"@article{Klemmer_Gutfleisch_Stransky_Acar_Sasse_Fahl_2023, title={“Make Them Change it Every Week!”: A Qualitative Exploration of Online Developer Advice on Usable and Secure Authentication}, volume={abs/2309.00744}, DOI={<a href=\"https://doi.org/10.48550/arXiv.2309.00744\">10.48550/arXiv.2309.00744</a>}, journal={CoRR}, author={Klemmer, Jan H. and Gutfleisch, Marco and Stransky, Christian and Acar, Yasemin and Sasse, M. Angela and Fahl, Sascha}, year={2023} }","short":"J.H. Klemmer, M. Gutfleisch, C. Stransky, Y. Acar, M.A. Sasse, S. Fahl, CoRR abs/2309.00744 (2023).","mla":"Klemmer, Jan H., et al. “‘Make Them Change It Every Week!’: A Qualitative Exploration of Online Developer Advice on Usable and Secure Authentication.” <i>CoRR</i>, vol. abs/2309.00744, 2023, doi:<a href=\"https://doi.org/10.48550/arXiv.2309.00744\">10.48550/arXiv.2309.00744</a>."},"date_updated":"2024-06-05T13:38:52Z","author":[{"full_name":"Klemmer, Jan H.","last_name":"Klemmer","first_name":"Jan H."},{"full_name":"Gutfleisch, Marco","last_name":"Gutfleisch","first_name":"Marco"},{"last_name":"Stransky","full_name":"Stransky, Christian","first_name":"Christian"},{"last_name":"Acar","full_name":"Acar, Yasemin","id":"94636","first_name":"Yasemin"},{"full_name":"Sasse, M. Angela","last_name":"Sasse","first_name":"M. Angela"},{"first_name":"Sascha","last_name":"Fahl","full_name":"Fahl, Sascha"}],"date_created":"2023-09-22T13:23:22Z","volume":"abs/2309.00744","title":"\"Make Them Change it Every Week!\": A Qualitative Exploration of Online Developer Advice on Usable and Secure Authentication","doi":"10.48550/arXiv.2309.00744","type":"journal_article","publication":"CoRR","status":"public","_id":"47291","user_id":"14931","department":[{"_id":"34"},{"_id":"858"}],"language":[{"iso":"eng"}]},{"_id":"53362","user_id":"14931","department":[{"_id":"858"}],"language":[{"iso":"eng"}],"type":"conference","publication":"Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, CCS 2023, Copenhagen, Denmark, November 26-30, 2023","editor":[{"first_name":"Weizhi","last_name":"Meng","full_name":"Meng, Weizhi"},{"first_name":"Christian Damsgaard","full_name":"Jensen, Christian Damsgaard","last_name":"Jensen"},{"first_name":"Cas","last_name":"Cremers","full_name":"Cremers, Cas"},{"last_name":"Kirda","full_name":"Kirda, Engin","first_name":"Engin"}],"status":"public","publisher":"ACM","date_updated":"2024-06-05T13:52:15Z","author":[{"first_name":"Sabrina","full_name":"Amft, Sabrina","last_name":"Amft"},{"first_name":"Sandra","last_name":"Höltervennhoff","full_name":"Höltervennhoff, Sandra"},{"first_name":"Nicolas","full_name":"Huaman, Nicolas","last_name":"Huaman"},{"first_name":"Alexander","last_name":"Krause","full_name":"Krause, Alexander"},{"last_name":"Simko","full_name":"Simko, Lucy","first_name":"Lucy"},{"first_name":"Yasemin","last_name":"Acar","id":"94636","full_name":"Acar, Yasemin"},{"first_name":"Sascha","full_name":"Fahl, Sascha","last_name":"Fahl"}],"date_created":"2024-04-09T06:22:43Z","title":"\"We’ve Disabled MFA for You\": An Evaluation of the Security and Usability of Multi-Factor Authentication Recovery Deployments","doi":"10.1145/3576915.3623180","year":"2023","citation":{"ieee":"S. Amft <i>et al.</i>, “‘We’ve Disabled MFA for You’: An Evaluation of the Security and Usability of Multi-Factor Authentication Recovery Deployments,” in <i>Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, CCS 2023, Copenhagen, Denmark, November 26-30, 2023</i>, 2023, pp. 3138–3152, doi: <a href=\"https://doi.org/10.1145/3576915.3623180\">10.1145/3576915.3623180</a>.","chicago":"Amft, Sabrina, Sandra Höltervennhoff, Nicolas Huaman, Alexander Krause, Lucy Simko, Yasemin Acar, and Sascha Fahl. “‘We’ve Disabled MFA for You’: An Evaluation of the Security and Usability of Multi-Factor Authentication Recovery Deployments.” In <i>Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, CCS 2023, Copenhagen, Denmark, November 26-30, 2023</i>, edited by Weizhi Meng, Christian Damsgaard Jensen, Cas Cremers, and Engin Kirda, 3138–3152. ACM, 2023. <a href=\"https://doi.org/10.1145/3576915.3623180\">https://doi.org/10.1145/3576915.3623180</a>.","ama":"Amft S, Höltervennhoff S, Huaman N, et al. “We’ve Disabled MFA for You”: An Evaluation of the Security and Usability of Multi-Factor Authentication Recovery Deployments. In: Meng W, Jensen CD, Cremers C, Kirda E, eds. <i>Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, CCS 2023, Copenhagen, Denmark, November 26-30, 2023</i>. ACM; 2023:3138–3152. doi:<a href=\"https://doi.org/10.1145/3576915.3623180\">10.1145/3576915.3623180</a>","mla":"Amft, Sabrina, et al. “‘We’ve Disabled MFA for You’: An Evaluation of the Security and Usability of Multi-Factor Authentication Recovery Deployments.” <i>Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, CCS 2023, Copenhagen, Denmark, November 26-30, 2023</i>, edited by Weizhi Meng et al., ACM, 2023, pp. 3138–3152, doi:<a href=\"https://doi.org/10.1145/3576915.3623180\">10.1145/3576915.3623180</a>.","short":"S. Amft, S. Höltervennhoff, N. Huaman, A. Krause, L. Simko, Y. Acar, S. Fahl, in: W. Meng, C.D. Jensen, C. Cremers, E. Kirda (Eds.), Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, CCS 2023, Copenhagen, Denmark, November 26-30, 2023, ACM, 2023, pp. 3138–3152.","bibtex":"@inproceedings{Amft_Höltervennhoff_Huaman_Krause_Simko_Acar_Fahl_2023, title={“We’ve Disabled MFA for You”: An Evaluation of the Security and Usability of Multi-Factor Authentication Recovery Deployments}, DOI={<a href=\"https://doi.org/10.1145/3576915.3623180\">10.1145/3576915.3623180</a>}, booktitle={Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, CCS 2023, Copenhagen, Denmark, November 26-30, 2023}, publisher={ACM}, author={Amft, Sabrina and Höltervennhoff, Sandra and Huaman, Nicolas and Krause, Alexander and Simko, Lucy and Acar, Yasemin and Fahl, Sascha}, editor={Meng, Weizhi and Jensen, Christian Damsgaard and Cremers, Cas and Kirda, Engin}, year={2023}, pages={3138–3152} }","apa":"Amft, S., Höltervennhoff, S., Huaman, N., Krause, A., Simko, L., Acar, Y., &#38; Fahl, S. (2023). “We’ve Disabled MFA for You”: An Evaluation of the Security and Usability of Multi-Factor Authentication Recovery Deployments. In W. Meng, C. D. Jensen, C. Cremers, &#38; E. Kirda (Eds.), <i>Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, CCS 2023, Copenhagen, Denmark, November 26-30, 2023</i> (pp. 3138–3152). ACM. <a href=\"https://doi.org/10.1145/3576915.3623180\">https://doi.org/10.1145/3576915.3623180</a>"},"page":"3138–3152"},{"publication":"2023 IEEE Secure Development Conference (SecDev)","type":"conference","status":"public","_id":"49438","department":[{"_id":"76"},{"_id":"858"}],"user_id":"14931","language":[{"iso":"eng"}],"publication_status":"published","year":"2023","citation":{"bibtex":"@inproceedings{Krüger_Reif_Wickert_Nadi_Ali_Bodden_Acar_Mezini_Fahl_2023, title={Securing Your Crypto-API Usage Through Tool Support - A Usability Study}, DOI={<a href=\"https://doi.org/10.1109/secdev56634.2023.00015\">10.1109/secdev56634.2023.00015</a>}, booktitle={2023 IEEE Secure Development Conference (SecDev)}, publisher={IEEE}, author={Krüger, Stefan and Reif, Michael and Wickert, Anna-Katharina and Nadi, Sarah and Ali, Karim and Bodden, Eric and Acar, Yasemin and Mezini, Mira and Fahl, Sascha}, year={2023} }","short":"S. Krüger, M. Reif, A.-K. Wickert, S. Nadi, K. Ali, E. Bodden, Y. Acar, M. Mezini, S. Fahl, in: 2023 IEEE Secure Development Conference (SecDev), IEEE, 2023.","mla":"Krüger, Stefan, et al. “Securing Your Crypto-API Usage Through Tool Support - A Usability Study.” <i>2023 IEEE Secure Development Conference (SecDev)</i>, IEEE, 2023, doi:<a href=\"https://doi.org/10.1109/secdev56634.2023.00015\">10.1109/secdev56634.2023.00015</a>.","apa":"Krüger, S., Reif, M., Wickert, A.-K., Nadi, S., Ali, K., Bodden, E., Acar, Y., Mezini, M., &#38; Fahl, S. (2023). Securing Your Crypto-API Usage Through Tool Support - A Usability Study. <i>2023 IEEE Secure Development Conference (SecDev)</i>. <a href=\"https://doi.org/10.1109/secdev56634.2023.00015\">https://doi.org/10.1109/secdev56634.2023.00015</a>","chicago":"Krüger, Stefan, Michael Reif, Anna-Katharina Wickert, Sarah Nadi, Karim Ali, Eric Bodden, Yasemin Acar, Mira Mezini, and Sascha Fahl. “Securing Your Crypto-API Usage Through Tool Support - A Usability Study.” In <i>2023 IEEE Secure Development Conference (SecDev)</i>. IEEE, 2023. <a href=\"https://doi.org/10.1109/secdev56634.2023.00015\">https://doi.org/10.1109/secdev56634.2023.00015</a>.","ieee":"S. Krüger <i>et al.</i>, “Securing Your Crypto-API Usage Through Tool Support - A Usability Study,” 2023, doi: <a href=\"https://doi.org/10.1109/secdev56634.2023.00015\">10.1109/secdev56634.2023.00015</a>.","ama":"Krüger S, Reif M, Wickert A-K, et al. Securing Your Crypto-API Usage Through Tool Support - A Usability Study. In: <i>2023 IEEE Secure Development Conference (SecDev)</i>. IEEE; 2023. doi:<a href=\"https://doi.org/10.1109/secdev56634.2023.00015\">10.1109/secdev56634.2023.00015</a>"},"publisher":"IEEE","date_updated":"2024-06-05T13:51:00Z","date_created":"2023-12-04T11:07:08Z","author":[{"first_name":"Stefan","last_name":"Krüger","full_name":"Krüger, Stefan"},{"last_name":"Reif","full_name":"Reif, Michael","first_name":"Michael"},{"first_name":"Anna-Katharina","last_name":"Wickert","full_name":"Wickert, Anna-Katharina"},{"full_name":"Nadi, Sarah","last_name":"Nadi","first_name":"Sarah"},{"last_name":"Ali","full_name":"Ali, Karim","first_name":"Karim"},{"id":"59256","full_name":"Bodden, Eric","last_name":"Bodden","orcid":"0000-0003-3470-3647","first_name":"Eric"},{"id":"94636","full_name":"Acar, Yasemin","last_name":"Acar","first_name":"Yasemin"},{"full_name":"Mezini, Mira","last_name":"Mezini","first_name":"Mira"},{"first_name":"Sascha","full_name":"Fahl, Sascha","last_name":"Fahl"}],"title":"Securing Your Crypto-API Usage Through Tool Support - A Usability Study","doi":"10.1109/secdev56634.2023.00015"},{"date_updated":"2024-06-05T13:53:18Z","publisher":"IEEE","author":[{"last_name":"Fourné","full_name":"Fourné, Marcel","id":"99291","first_name":"Marcel"},{"first_name":"Dominik","full_name":"Wermke, Dominik","last_name":"Wermke"},{"full_name":"Fahl, Sascha","last_name":"Fahl","first_name":"Sascha"},{"first_name":"Yasemin","id":"94636","full_name":"Acar, Yasemin","last_name":"Acar"}],"date_created":"2024-04-09T07:14:43Z","volume":21,"title":"A Viewpoint on Human Factors in Software Supply Chain Security: A Research Agenda","issue":"6","year":"2023","citation":{"chicago":"Fourné, Marcel, Dominik Wermke, Sascha Fahl, and Yasemin Acar. “A Viewpoint on Human Factors in Software Supply Chain Security: A Research Agenda.” <i>IEEE Security &#38; Privacy</i> 21, no. 6 (2023): 59–63.","ieee":"M. Fourné, D. Wermke, S. Fahl, and Y. Acar, “A Viewpoint on Human Factors in Software Supply Chain Security: A Research Agenda,” <i>IEEE Security &#38; Privacy</i>, vol. 21, no. 6, pp. 59–63, 2023.","ama":"Fourné M, Wermke D, Fahl S, Acar Y. A Viewpoint on Human Factors in Software Supply Chain Security: A Research Agenda. <i>IEEE Security &#38; Privacy</i>. 2023;21(6):59–63.","apa":"Fourné, M., Wermke, D., Fahl, S., &#38; Acar, Y. (2023). A Viewpoint on Human Factors in Software Supply Chain Security: A Research Agenda. <i>IEEE Security &#38; Privacy</i>, <i>21</i>(6), 59–63.","mla":"Fourné, Marcel, et al. “A Viewpoint on Human Factors in Software Supply Chain Security: A Research Agenda.” <i>IEEE Security &#38; Privacy</i>, vol. 21, no. 6, IEEE, 2023, pp. 59–63.","bibtex":"@article{Fourné_Wermke_Fahl_Acar_2023, title={A Viewpoint on Human Factors in Software Supply Chain Security: A Research Agenda}, volume={21}, number={6}, journal={IEEE Security &#38; Privacy}, publisher={IEEE}, author={Fourné, Marcel and Wermke, Dominik and Fahl, Sascha and Acar, Yasemin}, year={2023}, pages={59–63} }","short":"M. Fourné, D. Wermke, S. Fahl, Y. Acar, IEEE Security &#38; Privacy 21 (2023) 59–63."},"intvolume":"        21","page":"59–63","_id":"53368","user_id":"14931","department":[{"_id":"858"}],"language":[{"iso":"eng"}],"type":"journal_article","publication":"IEEE Security & Privacy","status":"public"},{"language":[{"iso":"eng"}],"user_id":"14931","department":[{"_id":"858"}],"_id":"53366","status":"public","type":"conference","publication":"2024 IEEE Symposium on Security and Privacy (SP)","title":"Security, Privacy, and Data-sharing Trade-offs When Moving to the United States: Insights from a Qualitative Study","date_created":"2024-04-09T07:11:01Z","author":[{"first_name":"Mindy","id":"99001","full_name":"Tran, Mindy","last_name":"Tran"},{"first_name":"Collins W","last_name":"Munyendo","full_name":"Munyendo, Collins W"},{"full_name":"Sri Ramulu, Harshini","id":"99000","orcid":"0000-0002-0000-5843","last_name":"Sri Ramulu","first_name":"Harshini"},{"first_name":"Rachel Gonzalez","full_name":"Rodriguez, Rachel Gonzalez","last_name":"Rodriguez"},{"first_name":"Luisa Ball","full_name":"Schnell, Luisa Ball","last_name":"Schnell"},{"last_name":"Sula","full_name":"Sula, Cora","first_name":"Cora"},{"last_name":"Simko","full_name":"Simko, Lucy","first_name":"Lucy"},{"first_name":"Yasemin","last_name":"Acar","full_name":"Acar, Yasemin","id":"94636"}],"date_updated":"2024-06-05T13:52:39Z","citation":{"ama":"Tran M, Munyendo CW, Sri Ramulu H, et al. Security, Privacy, and Data-sharing Trade-offs When Moving to the United States: Insights from a Qualitative Study. In: <i>2024 IEEE Symposium on Security and Privacy (SP)</i>. ; 2023:4–4.","chicago":"Tran, Mindy, Collins W Munyendo, Harshini Sri Ramulu, Rachel Gonzalez Rodriguez, Luisa Ball Schnell, Cora Sula, Lucy Simko, and Yasemin Acar. “Security, Privacy, and Data-Sharing Trade-Offs When Moving to the United States: Insights from a Qualitative Study.” In <i>2024 IEEE Symposium on Security and Privacy (SP)</i>, 4–4, 2023.","ieee":"M. Tran <i>et al.</i>, “Security, Privacy, and Data-sharing Trade-offs When Moving to the United States: Insights from a Qualitative Study,” in <i>2024 IEEE Symposium on Security and Privacy (SP)</i>, 2023, pp. 4–4.","apa":"Tran, M., Munyendo, C. W., Sri Ramulu, H., Rodriguez, R. G., Schnell, L. B., Sula, C., Simko, L., &#38; Acar, Y. (2023). Security, Privacy, and Data-sharing Trade-offs When Moving to the United States: Insights from a Qualitative Study. <i>2024 IEEE Symposium on Security and Privacy (SP)</i>, 4–4.","mla":"Tran, Mindy, et al. “Security, Privacy, and Data-Sharing Trade-Offs When Moving to the United States: Insights from a Qualitative Study.” <i>2024 IEEE Symposium on Security and Privacy (SP)</i>, 2023, pp. 4–4.","bibtex":"@inproceedings{Tran_Munyendo_Sri Ramulu_Rodriguez_Schnell_Sula_Simko_Acar_2023, title={Security, Privacy, and Data-sharing Trade-offs When Moving to the United States: Insights from a Qualitative Study}, booktitle={2024 IEEE Symposium on Security and Privacy (SP)}, author={Tran, Mindy and Munyendo, Collins W and Sri Ramulu, Harshini and Rodriguez, Rachel Gonzalez and Schnell, Luisa Ball and Sula, Cora and Simko, Lucy and Acar, Yasemin}, year={2023}, pages={4–4} }","short":"M. Tran, C.W. Munyendo, H. Sri Ramulu, R.G. Rodriguez, L.B. Schnell, C. Sula, L. Simko, Y. Acar, in: 2024 IEEE Symposium on Security and Privacy (SP), 2023, pp. 4–4."},"page":"4–4","year":"2023"},{"date_updated":"2024-06-05T13:51:52Z","author":[{"id":"99291","full_name":"Fourné, Marcel","last_name":"Fourné","first_name":"Marcel"},{"first_name":"Dominik","full_name":"Wermke, Dominik","last_name":"Wermke"},{"first_name":"Sascha","last_name":"Fahl","full_name":"Fahl, Sascha"},{"first_name":"Yasemin","last_name":"Acar","full_name":"Acar, Yasemin","id":"94636"}],"date_created":"2024-04-08T09:02:04Z","volume":21,"title":"A Viewpoint on Human Factors in Software Supply Chain Security: A Research Agenda","doi":"10.1109/MSEC.2023.3316569","issue":"6","year":"2023","citation":{"ieee":"M. Fourné, D. Wermke, S. Fahl, and Y. Acar, “A Viewpoint on Human Factors in Software Supply Chain Security: A Research Agenda,” <i>IEEE Secur. Priv.</i>, vol. 21, no. 6, pp. 59–63, 2023, doi: <a href=\"https://doi.org/10.1109/MSEC.2023.3316569\">10.1109/MSEC.2023.3316569</a>.","chicago":"Fourné, Marcel, Dominik Wermke, Sascha Fahl, and Yasemin Acar. “A Viewpoint on Human Factors in Software Supply Chain Security: A Research Agenda.” <i>IEEE Secur. Priv.</i> 21, no. 6 (2023): 59–63. <a href=\"https://doi.org/10.1109/MSEC.2023.3316569\">https://doi.org/10.1109/MSEC.2023.3316569</a>.","short":"M. Fourné, D. Wermke, S. Fahl, Y. Acar, IEEE Secur. Priv. 21 (2023) 59–63.","bibtex":"@article{Fourné_Wermke_Fahl_Acar_2023, title={A Viewpoint on Human Factors in Software Supply Chain Security: A Research Agenda}, volume={21}, DOI={<a href=\"https://doi.org/10.1109/MSEC.2023.3316569\">10.1109/MSEC.2023.3316569</a>}, number={6}, journal={IEEE Secur. Priv.}, author={Fourné, Marcel and Wermke, Dominik and Fahl, Sascha and Acar, Yasemin}, year={2023}, pages={59–63} }","mla":"Fourné, Marcel, et al. “A Viewpoint on Human Factors in Software Supply Chain Security: A Research Agenda.” <i>IEEE Secur. Priv.</i>, vol. 21, no. 6, 2023, pp. 59–63, doi:<a href=\"https://doi.org/10.1109/MSEC.2023.3316569\">10.1109/MSEC.2023.3316569</a>.","ama":"Fourné M, Wermke D, Fahl S, Acar Y. A Viewpoint on Human Factors in Software Supply Chain Security: A Research Agenda. <i>IEEE Secur Priv</i>. 2023;21(6):59–63. doi:<a href=\"https://doi.org/10.1109/MSEC.2023.3316569\">10.1109/MSEC.2023.3316569</a>","apa":"Fourné, M., Wermke, D., Fahl, S., &#38; Acar, Y. (2023). A Viewpoint on Human Factors in Software Supply Chain Security: A Research Agenda. <i>IEEE Secur. Priv.</i>, <i>21</i>(6), 59–63. <a href=\"https://doi.org/10.1109/MSEC.2023.3316569\">https://doi.org/10.1109/MSEC.2023.3316569</a>"},"page":"59–63","intvolume":"        21","_id":"53348","user_id":"14931","department":[{"_id":"858"}],"language":[{"iso":"eng"}],"type":"journal_article","publication":"IEEE Secur. Priv.","status":"public"},{"language":[{"iso":"eng"}],"_id":"53352","user_id":"14931","department":[{"_id":"858"}],"status":"public","type":"journal_article","publication":"Proc. ACM Hum. Comput. Interact.","title":"The Use and Non-Use of Technology During Hurricanes","doi":"10.1145/3610215","date_updated":"2024-06-05T13:53:38Z","author":[{"first_name":"Lucy","last_name":"Simko","full_name":"Simko, Lucy"},{"last_name":"Sri Ramulu","orcid":"0000-0002-0000-5843","id":"99000","full_name":"Sri Ramulu, Harshini","first_name":"Harshini"},{"first_name":"Tadayoshi","full_name":"Kohno, Tadayoshi","last_name":"Kohno"},{"first_name":"Yasemin","last_name":"Acar","id":"94636","full_name":"Acar, Yasemin"}],"date_created":"2024-04-08T09:22:02Z","volume":7,"year":"2023","citation":{"chicago":"Simko, Lucy, Harshini Sri Ramulu, Tadayoshi Kohno, and Yasemin Acar. “The Use and Non-Use of Technology During Hurricanes.” <i>Proc. ACM Hum. Comput. Interact.</i> 7, no. CSCW2 (2023): 1–54. <a href=\"https://doi.org/10.1145/3610215\">https://doi.org/10.1145/3610215</a>.","ieee":"L. Simko, H. Sri Ramulu, T. Kohno, and Y. Acar, “The Use and Non-Use of Technology During Hurricanes,” <i>Proc. ACM Hum. Comput. Interact.</i>, vol. 7, no. CSCW2, pp. 1–54, 2023, doi: <a href=\"https://doi.org/10.1145/3610215\">10.1145/3610215</a>.","ama":"Simko L, Sri Ramulu H, Kohno T, Acar Y. The Use and Non-Use of Technology During Hurricanes. <i>Proc ACM Hum Comput Interact</i>. 2023;7(CSCW2):1–54. doi:<a href=\"https://doi.org/10.1145/3610215\">10.1145/3610215</a>","short":"L. Simko, H. Sri Ramulu, T. Kohno, Y. Acar, Proc. ACM Hum. Comput. Interact. 7 (2023) 1–54.","bibtex":"@article{Simko_Sri Ramulu_Kohno_Acar_2023, title={The Use and Non-Use of Technology During Hurricanes}, volume={7}, DOI={<a href=\"https://doi.org/10.1145/3610215\">10.1145/3610215</a>}, number={CSCW2}, journal={Proc. ACM Hum. Comput. Interact.}, author={Simko, Lucy and Sri Ramulu, Harshini and Kohno, Tadayoshi and Acar, Yasemin}, year={2023}, pages={1–54} }","mla":"Simko, Lucy, et al. “The Use and Non-Use of Technology During Hurricanes.” <i>Proc. ACM Hum. Comput. Interact.</i>, vol. 7, no. CSCW2, 2023, pp. 1–54, doi:<a href=\"https://doi.org/10.1145/3610215\">10.1145/3610215</a>.","apa":"Simko, L., Sri Ramulu, H., Kohno, T., &#38; Acar, Y. (2023). The Use and Non-Use of Technology During Hurricanes. <i>Proc. ACM Hum. Comput. Interact.</i>, <i>7</i>(CSCW2), 1–54. <a href=\"https://doi.org/10.1145/3610215\">https://doi.org/10.1145/3610215</a>"},"page":"1–54","intvolume":"         7","issue":"CSCW2"},{"publication":"Critical Sociology","language":[{"iso":"eng"}],"year":"2023","issue":"4-5","quality_controlled":"1","title":"Ibn Khaldûn and the Political Economy of Communication in the Age of Digital Capitalism","date_created":"2023-11-02T09:31:17Z","status":"public","type":"journal_article","user_id":"21863","department":[{"_id":"136"},{"_id":"11"}],"project":[{"_id":"1086","name":"PÖDIM: Politische Ökonomie der digitalen Medien und der digitalen Kommunikation"},{"name":"PÖM: Politische Ökonomie der Medien und der Kommunikation","_id":"1084"}],"_id":"48589","citation":{"mla":"Fuchs, Christian. “Ibn Khaldûn and the Political Economy of Communication in the Age of Digital Capitalism.” <i>Critical Sociology</i>, vol. 50, no. 4–5, 2023, pp. 727–45, doi:<a href=\"https://doi.org/10.1177/08969205231206488 \">10.1177/08969205231206488 </a>.","short":"C. Fuchs, Critical Sociology 50 (2023) 727–745.","bibtex":"@article{Fuchs_2023, title={Ibn Khaldûn and the Political Economy of Communication in the Age of Digital Capitalism}, volume={50}, DOI={<a href=\"https://doi.org/10.1177/08969205231206488 \">10.1177/08969205231206488 </a>}, number={4–5}, journal={Critical Sociology}, author={Fuchs, Christian}, year={2023}, pages={727–745} }","apa":"Fuchs, C. (2023). Ibn Khaldûn and the Political Economy of Communication in the Age of Digital Capitalism. <i>Critical Sociology</i>, <i>50</i>(4–5), 727–745. <a href=\"https://doi.org/10.1177/08969205231206488 \">https://doi.org/10.1177/08969205231206488 </a>","ama":"Fuchs C. Ibn Khaldûn and the Political Economy of Communication in the Age of Digital Capitalism. <i>Critical Sociology</i>. 2023;50(4-5):727-745. doi:<a href=\"https://doi.org/10.1177/08969205231206488 \">10.1177/08969205231206488 </a>","ieee":"C. Fuchs, “Ibn Khaldûn and the Political Economy of Communication in the Age of Digital Capitalism,” <i>Critical Sociology</i>, vol. 50, no. 4–5, pp. 727–745, 2023, doi: <a href=\"https://doi.org/10.1177/08969205231206488 \">10.1177/08969205231206488 </a>.","chicago":"Fuchs, Christian. “Ibn Khaldûn and the Political Economy of Communication in the Age of Digital Capitalism.” <i>Critical Sociology</i> 50, no. 4–5 (2023): 727–45. <a href=\"https://doi.org/10.1177/08969205231206488 \">https://doi.org/10.1177/08969205231206488 </a>."},"page":"727-745","intvolume":"        50","related_material":{"link":[{"description":"Comment on the article (Graham Murdock)","relation":"supplementary_material","url":"https://doi.org/10.1177/08969205231201050"},{"url":"https://doi.org/10.1177/08969205231201382 ","description":"Response to Graham Murdock","relation":"supplementary_material"}]},"publication_status":"published","main_file_link":[{"url":"https://doi.org/10.1177/08969205231206488 ","open_access":"1"}],"doi":"10.1177/08969205231206488 ","author":[{"first_name":"Christian","full_name":"Fuchs, Christian","id":"21863","last_name":"Fuchs","orcid":"0000-0003-0589-4579"}],"volume":50,"date_updated":"2024-06-10T05:13:22Z","oa":"1"},{"publication":"Critical Sociology","language":[{"iso":"eng"}],"year":"2023","issue":"4-5","quality_controlled":"1","title":"Ibn Khaldûn and the Political Economy of Communication: A Reply to Graham Murdock","date_created":"2023-11-02T09:36:35Z","status":"public","type":"journal_article","department":[{"_id":"136"},{"_id":"11"}],"user_id":"21863","_id":"48590","project":[{"_id":"1086","name":"PÖDIM: Politische Ökonomie der digitalen Medien und der digitalen Kommunikation"},{"name":"PÖM: Politische Ökonomie der Medien und der Kommunikation","_id":"1084"}],"page":"757-765","intvolume":"        50","citation":{"bibtex":"@article{Fuchs_2023, title={Ibn Khaldûn and the Political Economy of Communication: A Reply to Graham Murdock}, volume={50}, DOI={<a href=\"https://doi.org/10.1177/08969205231201382\">10.1177/08969205231201382</a>}, number={4–5}, journal={Critical Sociology}, author={Fuchs, Christian}, year={2023}, pages={757–765} }","short":"C. Fuchs, Critical Sociology 50 (2023) 757–765.","mla":"Fuchs, Christian. “Ibn Khaldûn and the Political Economy of Communication: A Reply to Graham Murdock.” <i>Critical Sociology</i>, vol. 50, no. 4–5, 2023, pp. 757–65, doi:<a href=\"https://doi.org/10.1177/08969205231201382\">10.1177/08969205231201382</a>.","apa":"Fuchs, C. (2023). Ibn Khaldûn and the Political Economy of Communication: A Reply to Graham Murdock. <i>Critical Sociology</i>, <i>50</i>(4–5), 757–765. <a href=\"https://doi.org/10.1177/08969205231201382\">https://doi.org/10.1177/08969205231201382</a>","ieee":"C. Fuchs, “Ibn Khaldûn and the Political Economy of Communication: A Reply to Graham Murdock,” <i>Critical Sociology</i>, vol. 50, no. 4–5, pp. 757–765, 2023, doi: <a href=\"https://doi.org/10.1177/08969205231201382\">10.1177/08969205231201382</a>.","chicago":"Fuchs, Christian. “Ibn Khaldûn and the Political Economy of Communication: A Reply to Graham Murdock.” <i>Critical Sociology</i> 50, no. 4–5 (2023): 757–65. <a href=\"https://doi.org/10.1177/08969205231201382\">https://doi.org/10.1177/08969205231201382</a>.","ama":"Fuchs C. Ibn Khaldûn and the Political Economy of Communication: A Reply to Graham Murdock. <i>Critical Sociology</i>. 2023;50(4-5):757-765. doi:<a href=\"https://doi.org/10.1177/08969205231201382\">10.1177/08969205231201382</a>"},"related_material":{"link":[{"url":"https://doi.org/10.1177/08969205231206488 ","description":"Original article to which this article refers","relation":"supplementary_material"},{"relation":"supplementary_material","description":"Comment by Graham Murdock to which this article refers","url":"https://doi.org/10.1177/08969205231201050"}]},"publication_status":"published","doi":"10.1177/08969205231201382","main_file_link":[{"open_access":"1","url":"https://doi.org/10.1177/08969205231201382 "}],"volume":50,"author":[{"orcid":"0000-0003-0589-4579","last_name":"Fuchs","id":"21863","full_name":"Fuchs, Christian","first_name":"Christian"}],"date_updated":"2024-06-10T05:14:13Z","oa":"1"},{"type":"journal_article","publication":"Theoretical Computer Science","status":"public","abstract":[{"text":"Classic automated algorithm selection (AS) for (combinatorial) optimization problems heavily relies on so-called instance features, i.e., numerical characteristics of the problem at hand ideally extracted with computationally low-demanding routines. For the traveling salesperson problem (TSP) a plethora of features have been suggested. Most of these features are, if at all, only normalized imprecisely raising the issue of feature values being strongly affected by the instance size. Such artifacts may have detrimental effects on algorithm selection models. We propose a normalization for two feature groups which stood out in multiple AS studies on the TSP: (a) features based on a minimum spanning tree (MST) and (b) nearest neighbor relationships of the input instance. To this end we theoretically derive minimum and maximum values for properties of MSTs and k-nearest neighbor graphs (NNG) of Euclidean graphs. We analyze the differences in feature space between normalized versions of these features and their unnormalized counterparts. Our empirical investigations on various TSP benchmark sets point out that the feature scaling succeeds in eliminating the effect of the instance size. A proof-of-concept AS-study shows promising results: models trained with normalized features tend to outperform those trained with the respective vanilla features.","lang":"eng"}],"user_id":"15504","department":[{"_id":"34"},{"_id":"819"}],"_id":"46310","language":[{"iso":"eng"}],"keyword":["Feature normalization","Algorithm selection","Traveling salesperson problem"],"publication_identifier":{"issn":["0304-3975"]},"citation":{"ama":"Heins J, Bossek J, Pohl J, Seiler M, Trautmann H, Kerschke P. A study on the effects of normalized TSP features for automated algorithm selection. <i>Theoretical Computer Science</i>. 2023;940:123-145. doi:<a href=\"https://doi.org/10.1016/j.tcs.2022.10.019\">https://doi.org/10.1016/j.tcs.2022.10.019</a>","ieee":"J. Heins, J. Bossek, J. Pohl, M. Seiler, H. Trautmann, and P. Kerschke, “A study on the effects of normalized TSP features for automated algorithm selection,” <i>Theoretical Computer Science</i>, vol. 940, pp. 123–145, 2023, doi: <a href=\"https://doi.org/10.1016/j.tcs.2022.10.019\">https://doi.org/10.1016/j.tcs.2022.10.019</a>.","chicago":"Heins, Jonathan, Jakob Bossek, Janina Pohl, Moritz Seiler, Heike Trautmann, and Pascal Kerschke. “A Study on the Effects of Normalized TSP Features for Automated Algorithm Selection.” <i>Theoretical Computer Science</i> 940 (2023): 123–45. <a href=\"https://doi.org/10.1016/j.tcs.2022.10.019\">https://doi.org/10.1016/j.tcs.2022.10.019</a>.","bibtex":"@article{Heins_Bossek_Pohl_Seiler_Trautmann_Kerschke_2023, title={A study on the effects of normalized TSP features for automated algorithm selection}, volume={940}, DOI={<a href=\"https://doi.org/10.1016/j.tcs.2022.10.019\">https://doi.org/10.1016/j.tcs.2022.10.019</a>}, journal={Theoretical Computer Science}, author={Heins, Jonathan and Bossek, Jakob and Pohl, Janina and Seiler, Moritz and Trautmann, Heike and Kerschke, Pascal}, year={2023}, pages={123–145} }","short":"J. Heins, J. Bossek, J. Pohl, M. Seiler, H. Trautmann, P. Kerschke, Theoretical Computer Science 940 (2023) 123–145.","mla":"Heins, Jonathan, et al. “A Study on the Effects of Normalized TSP Features for Automated Algorithm Selection.” <i>Theoretical Computer Science</i>, vol. 940, 2023, pp. 123–45, doi:<a href=\"https://doi.org/10.1016/j.tcs.2022.10.019\">https://doi.org/10.1016/j.tcs.2022.10.019</a>.","apa":"Heins, J., Bossek, J., Pohl, J., Seiler, M., Trautmann, H., &#38; Kerschke, P. (2023). A study on the effects of normalized TSP features for automated algorithm selection. <i>Theoretical Computer Science</i>, <i>940</i>, 123–145. <a href=\"https://doi.org/10.1016/j.tcs.2022.10.019\">https://doi.org/10.1016/j.tcs.2022.10.019</a>"},"page":"123-145","intvolume":"       940","year":"2023","author":[{"first_name":"Jonathan","full_name":"Heins, Jonathan","last_name":"Heins"},{"last_name":"Bossek","orcid":"0000-0002-4121-4668","id":"102979","full_name":"Bossek, Jakob","first_name":"Jakob"},{"first_name":"Janina","full_name":"Pohl, Janina","last_name":"Pohl"},{"last_name":"Seiler","full_name":"Seiler, Moritz","id":"105520","first_name":"Moritz"},{"first_name":"Heike","last_name":"Trautmann","orcid":"0000-0002-9788-8282","full_name":"Trautmann, Heike","id":"100740"},{"full_name":"Kerschke, Pascal","last_name":"Kerschke","first_name":"Pascal"}],"date_created":"2023-08-04T07:18:38Z","volume":940,"date_updated":"2024-06-10T11:57:21Z","doi":"https://doi.org/10.1016/j.tcs.2022.10.019","title":"A study on the effects of normalized TSP features for automated algorithm selection"},{"_id":"48898","user_id":"15504","department":[{"_id":"819"}],"extern":"1","language":[{"iso":"eng"}],"type":"conference","publication":"2023 IEEE Symposium Series on Computational Intelligence (SSCI)","abstract":[{"text":"Automated Algorithm Configuration (AAC) usually takes a global perspective: it identifies a parameter configuration for an (optimization) algorithm that maximizes a performance metric over a set of instances. However, the optimal choice of parameters strongly depends on the instance at hand and should thus be calculated on a per-instance basis. We explore the potential of Per-Instance Algorithm Configuration (PIAC) by using Reinforcement Learning (RL). To this end, we propose a novel PIAC approach that is based on deep neural networks. We apply it to predict configurations for the Lin\\textendash Kernighan heuristic (LKH) for the Traveling Salesperson Problem (TSP) individually for every single instance. To train our PIAC approach, we create a large set of 100000 TSP instances with 2000 nodes each \\textemdash currently the largest benchmark set to the best of our knowledge. We compare our approach to the state-of-the-art AAC method Sequential Model-based Algorithm Configuration (SMAC). The results show that our PIAC approach outperforms this baseline on both the newly created instance set and established instance sets.","lang":"eng"}],"status":"public","date_updated":"2024-06-10T11:56:58Z","date_created":"2023-11-14T15:59:01Z","author":[{"first_name":"Moritz","last_name":"Seiler","full_name":"Seiler, Moritz","id":"105520"},{"first_name":"Jeroen","full_name":"Rook, Jeroen","last_name":"Rook"},{"last_name":"Heins","full_name":"Heins, Jonathan","first_name":"Jonathan"},{"id":"102978","full_name":"Preuß, Oliver Ludger","orcid":"0009-0008-9308-2418","last_name":"Preuß","first_name":"Oliver Ludger"},{"first_name":"Jakob","full_name":"Bossek, Jakob","id":"102979","last_name":"Bossek","orcid":"0000-0002-4121-4668"},{"first_name":"Heike","id":"100740","full_name":"Trautmann, Heike","last_name":"Trautmann","orcid":"0000-0002-9788-8282"}],"title":"Using Reinforcement Learning for Per-Instance Algorithm Configuration on the TSP","doi":"10.1109/SSCI52147.2023.10372008","publication_status":"accepted","year":"2023","citation":{"chicago":"Seiler, Moritz, Jeroen Rook, Jonathan Heins, Oliver Ludger Preuß, Jakob Bossek, and Heike Trautmann. “Using Reinforcement Learning for Per-Instance Algorithm Configuration on the TSP.” In <i>2023 IEEE Symposium Series on Computational Intelligence (SSCI)</i>, 361–68, n.d. <a href=\"https://doi.org/10.1109/SSCI52147.2023.10372008\">https://doi.org/10.1109/SSCI52147.2023.10372008</a>.","ieee":"M. Seiler, J. Rook, J. Heins, O. L. Preuß, J. Bossek, and H. Trautmann, “Using Reinforcement Learning for Per-Instance Algorithm Configuration on the TSP,” in <i>2023 IEEE Symposium Series on Computational Intelligence (SSCI)</i>, pp. 361–368, doi: <a href=\"https://doi.org/10.1109/SSCI52147.2023.10372008\">10.1109/SSCI52147.2023.10372008</a>.","ama":"Seiler M, Rook J, Heins J, Preuß OL, Bossek J, Trautmann H. Using Reinforcement Learning for Per-Instance Algorithm Configuration on the TSP. In: <i>2023 IEEE Symposium Series on Computational Intelligence (SSCI)</i>. ; :361-368. doi:<a href=\"https://doi.org/10.1109/SSCI52147.2023.10372008\">10.1109/SSCI52147.2023.10372008</a>","short":"M. Seiler, J. Rook, J. Heins, O.L. Preuß, J. Bossek, H. Trautmann, in: 2023 IEEE Symposium Series on Computational Intelligence (SSCI), n.d., pp. 361–368.","bibtex":"@inproceedings{Seiler_Rook_Heins_Preuß_Bossek_Trautmann, title={Using Reinforcement Learning for Per-Instance Algorithm Configuration on the TSP}, DOI={<a href=\"https://doi.org/10.1109/SSCI52147.2023.10372008\">10.1109/SSCI52147.2023.10372008</a>}, booktitle={2023 IEEE Symposium Series on Computational Intelligence (SSCI)}, author={Seiler, Moritz and Rook, Jeroen and Heins, Jonathan and Preuß, Oliver Ludger and Bossek, Jakob and Trautmann, Heike}, pages={361–368} }","mla":"Seiler, Moritz, et al. “Using Reinforcement Learning for Per-Instance Algorithm Configuration on the TSP.” <i>2023 IEEE Symposium Series on Computational Intelligence (SSCI)</i>, pp. 361–68, doi:<a href=\"https://doi.org/10.1109/SSCI52147.2023.10372008\">10.1109/SSCI52147.2023.10372008</a>.","apa":"Seiler, M., Rook, J., Heins, J., Preuß, O. L., Bossek, J., &#38; Trautmann, H. (n.d.). Using Reinforcement Learning for Per-Instance Algorithm Configuration on the TSP. <i>2023 IEEE Symposium Series on Computational Intelligence (SSCI)</i>, 361–368. <a href=\"https://doi.org/10.1109/SSCI52147.2023.10372008\">https://doi.org/10.1109/SSCI52147.2023.10372008</a>"},"page":"361 - 368"},{"publication":"Communications in Computer and Information Science","type":"book_chapter","status":"public","_id":"54672","department":[{"_id":"241"},{"_id":"662"}],"user_id":"40982","publication_identifier":{"issn":["1865-0929","1865-0937"],"isbn":["9783031423062","9783031423079"]},"publication_status":"published","place":"Cham","year":"2023","citation":{"mla":"Schmelter, David, et al. “Trustful Model-Based Information Exchange in Collaborative Engineering.” <i>Communications in Computer and Information Science</i>, Springer Nature Switzerland, 2023, doi:<a href=\"https://doi.org/10.1007/978-3-031-42307-9_12\">10.1007/978-3-031-42307-9_12</a>.","short":"D. Schmelter, J.-P. Steghöfer, K. Albers, M. Ekman, J. Tessmer, R. Weber, in: Communications in Computer and Information Science, Springer Nature Switzerland, Cham, 2023.","bibtex":"@inbook{Schmelter_Steghöfer_Albers_Ekman_Tessmer_Weber_2023, place={Cham}, title={Trustful Model-Based Information Exchange in Collaborative Engineering}, DOI={<a href=\"https://doi.org/10.1007/978-3-031-42307-9_12\">10.1007/978-3-031-42307-9_12</a>}, booktitle={Communications in Computer and Information Science}, publisher={Springer Nature Switzerland}, author={Schmelter, David and Steghöfer, Jan-Philipp and Albers, Karsten and Ekman, Mats and Tessmer, Jörg and Weber, Raphael}, year={2023} }","apa":"Schmelter, D., Steghöfer, J.-P., Albers, K., Ekman, M., Tessmer, J., &#38; Weber, R. (2023). Trustful Model-Based Information Exchange in Collaborative Engineering. In <i>Communications in Computer and Information Science</i>. Springer Nature Switzerland. <a href=\"https://doi.org/10.1007/978-3-031-42307-9_12\">https://doi.org/10.1007/978-3-031-42307-9_12</a>","chicago":"Schmelter, David, Jan-Philipp Steghöfer, Karsten Albers, Mats Ekman, Jörg Tessmer, and Raphael Weber. “Trustful Model-Based Information Exchange in Collaborative Engineering.” In <i>Communications in Computer and Information Science</i>. Cham: Springer Nature Switzerland, 2023. <a href=\"https://doi.org/10.1007/978-3-031-42307-9_12\">https://doi.org/10.1007/978-3-031-42307-9_12</a>.","ieee":"D. Schmelter, J.-P. Steghöfer, K. Albers, M. Ekman, J. Tessmer, and R. Weber, “Trustful Model-Based Information Exchange in Collaborative Engineering,” in <i>Communications in Computer and Information Science</i>, Cham: Springer Nature Switzerland, 2023.","ama":"Schmelter D, Steghöfer J-P, Albers K, Ekman M, Tessmer J, Weber R. Trustful Model-Based Information Exchange in Collaborative Engineering. In: <i>Communications in Computer and Information Science</i>. Springer Nature Switzerland; 2023. doi:<a href=\"https://doi.org/10.1007/978-3-031-42307-9_12\">10.1007/978-3-031-42307-9_12</a>"},"date_updated":"2024-06-10T13:17:08Z","publisher":"Springer Nature Switzerland","date_created":"2024-06-10T13:10:39Z","author":[{"full_name":"Schmelter, David","last_name":"Schmelter","first_name":"David"},{"first_name":"Jan-Philipp","full_name":"Steghöfer, Jan-Philipp","last_name":"Steghöfer"},{"first_name":"Karsten","last_name":"Albers","full_name":"Albers, Karsten"},{"last_name":"Ekman","full_name":"Ekman, Mats","first_name":"Mats"},{"first_name":"Jörg","full_name":"Tessmer, Jörg","last_name":"Tessmer"},{"first_name":"Raphael","last_name":"Weber","full_name":"Weber, Raphael"}],"title":"Trustful Model-Based Information Exchange in Collaborative Engineering","doi":"10.1007/978-3-031-42307-9_12"},{"author":[{"full_name":"Fuchs, Christian","id":"21863","orcid":"0000-0003-0589-4579","last_name":"Fuchs","first_name":"Christian"}],"date_updated":"2024-06-10T13:47:25Z","oa":"1","main_file_link":[{"url":"https://doi.org/10.53291/BWUB5365","open_access":"1"}],"doi":"https://doi.org/10.53291/BWUB5365","has_accepted_license":"1","citation":{"apa":"Fuchs, C. (2023). Zur Kritik der Politischen Ökonomie des Digitalen Kapitalismus: Die Aktualität von Manfred Knoches Beitrag zur Kritik der Politischen Ökonomie der Medien und der Kommunikation. In S. Güney, L. Hille, J. Pfeiffer, L. Porak, &#38; H. Theine (Eds.), <i>Eigentum, Medien, Öffentlichkeit: Verhandlungen des Netzwerks Kritische Kommunikationswissenschaft</i> (pp. 215–236). Westend Verlag. <a href=\"https://doi.org/10.53291/BWUB5365\">https://doi.org/10.53291/BWUB5365</a>","mla":"Fuchs, Christian. “Zur Kritik Der Politischen Ökonomie Des Digitalen Kapitalismus: Die Aktualität von Manfred Knoches Beitrag Zur Kritik Der Politischen Ökonomie Der Medien Und Der Kommunikation.” <i>Eigentum, Medien, Öffentlichkeit: Verhandlungen Des Netzwerks Kritische Kommunikationswissenschaft</i>, edited by Selma Güney et al., Westend Verlag, 2023, pp. 215–36, doi:<a href=\"https://doi.org/10.53291/BWUB5365\">https://doi.org/10.53291/BWUB5365</a>.","bibtex":"@inbook{Fuchs_2023, place={Frankfurt am Main}, title={Zur Kritik der Politischen Ökonomie des Digitalen Kapitalismus: Die Aktualität von Manfred Knoches Beitrag zur Kritik der Politischen Ökonomie der Medien und der Kommunikation}, DOI={<a href=\"https://doi.org/10.53291/BWUB5365\">https://doi.org/10.53291/BWUB5365</a>}, booktitle={Eigentum, Medien, Öffentlichkeit: Verhandlungen des Netzwerks Kritische Kommunikationswissenschaft}, publisher={Westend Verlag}, author={Fuchs, Christian}, editor={Güney, Selma and Hille, Lina and Pfeiffer, Juliane  and Porak, Laura and Theine, Hendrik}, year={2023}, pages={215–236} }","short":"C. Fuchs, in: S. Güney, L. Hille, J. Pfeiffer, L. Porak, H. Theine (Eds.), Eigentum, Medien, Öffentlichkeit: Verhandlungen Des Netzwerks Kritische Kommunikationswissenschaft, Westend Verlag, Frankfurt am Main, 2023, pp. 215–236.","chicago":"Fuchs, Christian. “Zur Kritik Der Politischen Ökonomie Des Digitalen Kapitalismus: Die Aktualität von Manfred Knoches Beitrag Zur Kritik Der Politischen Ökonomie Der Medien Und Der Kommunikation.” In <i>Eigentum, Medien, Öffentlichkeit: Verhandlungen Des Netzwerks Kritische Kommunikationswissenschaft</i>, edited by Selma Güney, Lina Hille, Juliane  Pfeiffer, Laura Porak, and Hendrik Theine, 215–36. Frankfurt am Main: Westend Verlag, 2023. <a href=\"https://doi.org/10.53291/BWUB5365\">https://doi.org/10.53291/BWUB5365</a>.","ieee":"C. Fuchs, “Zur Kritik der Politischen Ökonomie des Digitalen Kapitalismus: Die Aktualität von Manfred Knoches Beitrag zur Kritik der Politischen Ökonomie der Medien und der Kommunikation,” in <i>Eigentum, Medien, Öffentlichkeit: Verhandlungen des Netzwerks Kritische Kommunikationswissenschaft</i>, S. Güney, L. Hille, J. Pfeiffer, L. Porak, and H. Theine, Eds. Frankfurt am Main: Westend Verlag, 2023, pp. 215–236.","ama":"Fuchs C. Zur Kritik der Politischen Ökonomie des Digitalen Kapitalismus: Die Aktualität von Manfred Knoches Beitrag zur Kritik der Politischen Ökonomie der Medien und der Kommunikation. In: Güney S, Hille L, Pfeiffer J, Porak L, Theine H, eds. <i>Eigentum, Medien, Öffentlichkeit: Verhandlungen Des Netzwerks Kritische Kommunikationswissenschaft</i>. Westend Verlag; 2023:215-236. doi:<a href=\"https://doi.org/10.53291/BWUB5365\">https://doi.org/10.53291/BWUB5365</a>"},"page":"215-236","place":"Frankfurt am Main","user_id":"21863","department":[{"_id":"136"},{"_id":"11"}],"project":[{"_id":"1084","name":"PÖM: Politische Ökonomie der Medien und der Kommunikation"}],"_id":"47548","file_date_updated":"2023-10-04T09:00:29Z","type":"book_chapter","status":"public","editor":[{"last_name":"Güney","full_name":"Güney, Selma","first_name":"Selma"},{"full_name":"Hille, Lina","last_name":"Hille","first_name":"Lina"},{"first_name":"Juliane ","last_name":"Pfeiffer","full_name":"Pfeiffer, Juliane "},{"first_name":"Laura","full_name":"Porak, Laura","last_name":"Porak"},{"first_name":"Hendrik","full_name":"Theine, Hendrik","last_name":"Theine"}],"date_created":"2023-10-04T09:01:46Z","publisher":"Westend Verlag","title":"Zur Kritik der Politischen Ökonomie des Digitalen Kapitalismus: Die Aktualität von Manfred Knoches Beitrag zur Kritik der Politischen Ökonomie der Medien und der Kommunikation","quality_controlled":"1","year":"2023","language":[{"iso":"eng"}],"ddc":["300"],"publication":"Eigentum, Medien, Öffentlichkeit: Verhandlungen des Netzwerks Kritische Kommunikationswissenschaft","file":[{"file_id":"47549","file_name":"FINALPUB.pdf","access_level":"closed","file_size":15286569,"creator":"chfuchs","date_created":"2023-10-04T09:00:29Z","date_updated":"2023-10-04T09:00:29Z","relation":"main_file","success":1,"content_type":"application/pdf"}]},{"keyword":["base and superstructure","culture","economy and culture","Georg Lukács","ideology","Raymond Williams","Stuart Hall"],"language":[{"iso":"eng"}],"_id":"46448","project":[{"_id":"1084","name":"PÖM: Politische Ökonomie der Medien und der Kommunikation"}],"department":[{"_id":"136"},{"_id":"11"}],"user_id":"21863","abstract":[{"text":"We live in times of deep crisis. General crises of society often are accompanied by ideological struggles. Given this context, it is important that social theory reinvigorates the analysis of ideology. For doing so, it makes sense to engage with classical theories of ideology. This paper contributes to this task. It asks: How are the economic and the non-economic related? What is ideology? This article deals with the base/superstructure problem and the problem of ideology via an engagement with selected aspects of Stuart Hall’s, Georg Lukács’s and Raymond Williams’s works. The commonality of Hall’s, Lukács’s and Williams’s thoughts that makes a joint engagement with their works feasible is that they all three dealt with aspects of culture from a critical theory perspective and are in one way or another representatives of Cultural Marxism. While Lukács’s works and Cultural Studies are often presented as conflicting approaches, this paper shows that concerning the question of how the economic and the non-economic are related and how we can think of ideology, the approaches of Lukács, Williams, and Hall complement each other, which allows critical theories of culture to draw on all three approaches and to combine elements from them in a synergistic manner. There are parallels between Williams’, Hall’s, and Lukács’s solutions to the base/superstructure problem. Williams argues that the economic exerts pressures on and sets limits to the non-economic. Hall writes that the economic determines the non-economic in the first instance. Lukács argues that the economic circumscribes subjectivity and the non-economic.","lang":"eng"}],"status":"public","publication":"The Communication Review.","type":"journal_article","title":"The Problems of Base/Superstructure and Ideology in the Works of Stuart Hall, Georg Lukács, and Raymond Williams","doi":"10.1080/10714421.2023.2242068  ","date_updated":"2024-06-10T13:47:16Z","author":[{"first_name":"Christian","full_name":"Fuchs, Christian","id":"21863","last_name":"Fuchs","orcid":"0000-0003-0589-4579"}],"date_created":"2023-08-07T11:46:37Z","year":"2023","citation":{"ama":"Fuchs C. The Problems of Base/Superstructure and Ideology in the Works of Stuart Hall, Georg Lukács, and Raymond Williams. <i>The Communication Review</i>. Published online 2023. doi:<a href=\"https://doi.org/10.1080/10714421.2023.2242068  \">10.1080/10714421.2023.2242068  </a>","ieee":"C. Fuchs, “The Problems of Base/Superstructure and Ideology in the Works of Stuart Hall, Georg Lukács, and Raymond Williams,” <i>The Communication Review.</i>, 2023, doi: <a href=\"https://doi.org/10.1080/10714421.2023.2242068  \">10.1080/10714421.2023.2242068  </a>.","chicago":"Fuchs, Christian. “The Problems of Base/Superstructure and Ideology in the Works of Stuart Hall, Georg Lukács, and Raymond Williams.” <i>The Communication Review.</i>, 2023. <a href=\"https://doi.org/10.1080/10714421.2023.2242068  \">https://doi.org/10.1080/10714421.2023.2242068  </a>.","apa":"Fuchs, C. (2023). The Problems of Base/Superstructure and Ideology in the Works of Stuart Hall, Georg Lukács, and Raymond Williams. <i>The Communication Review.</i> <a href=\"https://doi.org/10.1080/10714421.2023.2242068  \">https://doi.org/10.1080/10714421.2023.2242068  </a>","mla":"Fuchs, Christian. “The Problems of Base/Superstructure and Ideology in the Works of Stuart Hall, Georg Lukács, and Raymond Williams.” <i>The Communication Review.</i>, 2023, doi:<a href=\"https://doi.org/10.1080/10714421.2023.2242068  \">10.1080/10714421.2023.2242068  </a>.","short":"C. Fuchs, The Communication Review. (2023).","bibtex":"@article{Fuchs_2023, title={The Problems of Base/Superstructure and Ideology in the Works of Stuart Hall, Georg Lukács, and Raymond Williams}, DOI={<a href=\"https://doi.org/10.1080/10714421.2023.2242068  \">10.1080/10714421.2023.2242068  </a>}, journal={The Communication Review.}, author={Fuchs, Christian}, year={2023} }"},"quality_controlled":"1","publication_status":"published"},{"publication_status":"published","publication_identifier":{"isbn":["978-3-8394-6154-9"]},"citation":{"short":"C. Fuchs, in: D. Schönefeld, W. von Gahlen-Hoops (Eds.), Soziale Ordnungen des Sterbens: Theorie, Methodik und Einblicke in die Vergänglichkeit, transcript, Bielefeld, 2023, pp. 75–102.","bibtex":"@inbook{Fuchs_2023, place={Bielefeld}, title={Der Tod und die Liebe: Die Metaphysik der Kommunikation}, booktitle={Soziale Ordnungen des Sterbens: Theorie, Methodik und Einblicke in die Vergänglichkeit}, publisher={transcript}, author={Fuchs, Christian}, editor={Schönefeld, Daniel and von Gahlen-Hoops, Wolfgang}, year={2023}, pages={75–102} }","mla":"Fuchs, Christian. “Der Tod und die Liebe: Die Metaphysik der Kommunikation.” <i>Soziale Ordnungen des Sterbens: Theorie, Methodik und Einblicke in die Vergänglichkeit</i>, edited by Daniel Schönefeld and Wolfgang von Gahlen-Hoops, transcript, 2023, pp. 75–102.","apa":"Fuchs, C. (2023). Der Tod und die Liebe: Die Metaphysik der Kommunikation. In D. Schönefeld &#38; W. von Gahlen-Hoops (Eds.), <i>Soziale Ordnungen des Sterbens: Theorie, Methodik und Einblicke in die Vergänglichkeit</i> (pp. 75–102). transcript.","ama":"Fuchs C. Der Tod und die Liebe: Die Metaphysik der Kommunikation. In: Schönefeld D, von Gahlen-Hoops W, eds. <i>Soziale Ordnungen des Sterbens: Theorie, Methodik und Einblicke in die Vergänglichkeit</i>. transcript; 2023:75-102.","ieee":"C. Fuchs, “Der Tod und die Liebe: Die Metaphysik der Kommunikation,” in <i>Soziale Ordnungen des Sterbens: Theorie, Methodik und Einblicke in die Vergänglichkeit</i>, D. Schönefeld and W. von Gahlen-Hoops, Eds. Bielefeld: transcript, 2023, pp. 75–102.","chicago":"Fuchs, Christian. “Der Tod und die Liebe: Die Metaphysik der Kommunikation.” In <i>Soziale Ordnungen des Sterbens: Theorie, Methodik und Einblicke in die Vergänglichkeit</i>, edited by Daniel Schönefeld and Wolfgang von Gahlen-Hoops, 75–102. Bielefeld: transcript, 2023."},"page":"75-102","place":"Bielefeld","year":"2023","date_created":"2023-01-03T18:44:20Z","author":[{"id":"21863","full_name":"Fuchs, Christian","orcid":"0000-0003-0589-4579","last_name":"Fuchs","first_name":"Christian"}],"publisher":"transcript","date_updated":"2024-06-10T13:45:58Z","title":"Der Tod und die Liebe: Die Metaphysik der Kommunikation","type":"book_chapter","publication":"Soziale Ordnungen des Sterbens: Theorie, Methodik und Einblicke in die Vergänglichkeit","status":"public","editor":[{"first_name":"Daniel","full_name":"Schönefeld, Daniel","last_name":"Schönefeld"},{"full_name":"von Gahlen-Hoops, Wolfgang","last_name":"von Gahlen-Hoops","first_name":"Wolfgang"}],"user_id":"21863","department":[{"_id":"136"}],"project":[{"_id":"1084","name":"PÖM: Politische Ökonomie der Medien und der Kommunikation"}],"_id":"35151","language":[{"iso":"ger"}]}]
