@article{KuertenMottaghyZiegler2015, author = {K{\"u}rten, Sylvia and Mottaghy, Darius and Ziegler, Martin}, title = {A new model for the description of the heat transfer for plane thermo-active geotechnical systems based on thermal resistances}, series = {Acta Geotechnica}, volume = {10}, journal = {Acta Geotechnica}, number = {2}, publisher = {Springer}, address = {Berlin}, issn = {1861-1133}, doi = {10.1007/s11440-014-0311-6}, pages = {219 -- 229}, year = {2015}, language = {en} } @article{KuertenMottaghyZiegler2015, author = {K{\"u}rten, Sylvia and Mottaghy, Darius and Ziegler, Martin}, title = {Design of plane energy geostructures based on laboratory tests and numerical modelling}, series = {Energy and Buildings}, volume = {107}, journal = {Energy and Buildings}, publisher = {Elsevier}, address = {Amsterdam}, issn = {0378-7788}, doi = {10.1016/j.enbuild.2015.08.039}, pages = {434 -- 444}, year = {2015}, language = {en} } @article{KuertenMottaghyZiegler2015, author = {K{\"u}rten, Sylvia and Mottaghy, Darius and Ziegler, Martin}, title = {Besonderheiten bei der Planung und Berechnung von oberfl{\"a}chennahen thermo-aktiven Bauteilen}, series = {Geotechnik}, volume = {38}, journal = {Geotechnik}, number = {2}, publisher = {Wiley}, address = {Weinheim}, issn = {2190-6653}, doi = {10.1002/gete.201500002}, pages = {107 -- 119}, year = {2015}, language = {de} } @article{KueppersSteffenHellmuthetal.2014, author = {K{\"u}ppers, Tobias and Steffen, Victoria and Hellmuth, Hendrik and O'Connell, Timothy and Bongaerts, Johannes and Maurer, Karl-Heinz and Wiechert, Wolfgang}, title = {Developing a new production host from a blueprint: Bacillus pumilus as an industrial enzyme producer}, series = {Microbial cell factories}, volume = {13}, journal = {Microbial cell factories}, publisher = {BioMed Central}, address = {London}, issn = {1475-2859 (E-Journal)}, doi = {10.1186/1475-2859-13-46}, pages = {Article No. 46}, year = {2014}, language = {en} } @article{KoenigWolf2018, author = {K{\"o}nig, Johannes Alexander and Wolf, Martin R.}, title = {GHOST: An Evaluated Competence Developing Game for Cybersecurity Awareness Training}, series = {International Journal on Advances in Security}, volume = {11}, journal = {International Journal on Advances in Security}, number = {3 \& 4}, publisher = {IARIA Journals}, issn = {1942-2636}, pages = {274 -- 287}, year = {2018}, abstract = {To train end users how to interact with digital systems is indispensable to ensure a strong computer security. 'Competence Developing Game'-based approaches are particularly suitable for this purpose because of their motivation-and simulation-aspects. In this paper the Competence Developing Game 'GHOST' for cybersecurity awareness trainings and its underlying patterns are described. Accordingly, requirements for an 'Competence Developing Game' based training are discussed. Based on these requirements it is shown how a game can fulfill these requirements. A supplementary game interaction design and a corresponding evaluation study is shown. The combination of training requirements and interaction design is used to create a 'Competence Developing Game'-based training concept. A part of these concept is implemented into a playable prototype that serves around one hour of play respectively training time. This prototype is used to perform an evaluation of the game and training aspects of the awareness training. Thereby, the quality of the game aspect and the effectiveness of the training aspect are shown.}, language = {en} } @article{KoenigVoelkerWolfetal.2016, author = {K{\"o}nig, Johannes Alexander and V{\"o}lker, Veronika and Wolf, Martin R. and Schuba, Marko}, title = {Gamified Hacking Offence Simulation-based Training (GHOST)}, series = {Crisis Prevention}, volume = {2016}, journal = {Crisis Prevention}, number = {3}, publisher = {Beta}, address = {Bonn}, pages = {44 -- 46}, year = {2016}, language = {de} } @article{KoellenspergerBragardPlumetal.2009, author = {K{\"o}llensperger, P. and Bragard, Michael and Plum, T. and De Doncker, R. W.}, title = {The dual GCT : new high-power device using optimized GCT technology}, series = {IEEE transactions on industry applications}, volume = {45}, journal = {IEEE transactions on industry applications}, number = {5}, issn = {0093-9994}, doi = {10.1109/TIA.2009.2027364}, pages = {1754 -- 1762}, year = {2009}, language = {en} } @article{KoehlerWolf2020, author = {K{\"o}hler, Klemens and Wolf, Martin R.}, title = {Organisatorische Maßnahmen zu Erh{\"o}hung der IT Sicherheit - Empfehlungen aus der Perspektive der Konflikttheorie}, number = {Preprint}, year = {2020}, abstract = {Die NATO definiert den Cyberspace als die "Umgebung, die durch physische und nicht-physische Bestandteile zum Speichern, {\"A}ndern, und Austauschen von Daten mit Hilfe von Computer-Netzwerken" [NATO CCDCOE]. Dar{\"u}ber hinaus ist es ein Medium menschlicher Interaktion. IT Angriffe sind feindselige, nichtkooperative Interaktionen, die mittels Konflikttheorie beschrieben werden k{\"o}nnen. Durch die Anwendung dieses Gedankengeb{\"a}udes auf IT Sicherheit von Organisationen k{\"o}nnen eine Reihe von Verbesserungen in Unternehmen identifiziert werden.}, language = {de} } @article{KoehlerRoepkeWolf2021, author = {K{\"o}hler, Klemens and R{\"o}pke, Ren{\´e} and Wolf, Martin R.}, title = {Through a mirror darkly - On the obscurity of teaching goals in game-based learning in IT security}, series = {ISAGA 2019: Simulation Gaming Through Times and Disciplines}, journal = {ISAGA 2019: Simulation Gaming Through Times and Disciplines}, publisher = {Springer}, address = {Cham}, doi = {10.1007/978-3-030-72132-9_6}, pages = {61 -- 73}, year = {2021}, abstract = {Teachers and instructors use very specific language communicating teaching goals. The most widely used frameworks of common reference are the Bloom's Taxonomy and the Revised Bloom's Taxonomy. The latter provides distinction of 209 different teaching goals which are connected to methods. In Competence Developing Games (CDGs - serious games to convey knowledge) and in IT security education, a two- or three level typology exists, reducing possible learning outcomes to awareness, training, and education. This study explores whether this much simpler framework succeeds in achieving the same range of learning outcomes. Method wise a keyword analysis was conducted. The results were threefold: 1. The words used to describe teaching goals in CDGs on IT security education do not reflect the whole range of learning outcomes. 2. The word choice is nevertheless different from common language, indicating an intentional use of language. 3. IT security CDGs use different sets of terms to describe learning outcomes, depending on whether they are awareness, training, or education games. The interpretation of the findings is that the reduction to just three types of CDGs reduces the capacity to communicate and think about learning outcomes and consequently reduces the outcomes that are intentionally achieved.}, language = {en} } @article{Koehler2020, author = {K{\"o}hler, Klemens}, title = {A conflict theory perspective of IT attacks - consequences for IT security education}, number = {Preprint}, year = {2020}, abstract = {Cyberspace is "the environment formed by physical and non-physical components to store, modify, and exchange data using computer networks" (NATO CCDCOE). Beyond that, it is an environment where people interact. IT attacks are hostile, non-cooperative interactions that can be described with conflict theory. Applying conflict theory to IT security leads to different objectives for end-user education, requiring different formats like agency-based competence developing games.}, language = {en} }