@article{Wolf2003, author = {Wolf, Martin}, title = {Risiko- und Maßnahmenmanagement bei der Computervalidierung}, series = {Pharma-Technologie-Journal (2003)}, journal = {Pharma-Technologie-Journal (2003)}, publisher = {-}, isbn = {0931-9700}, pages = {50 -- 62}, year = {2003}, language = {de} } @article{WolfFoltzKillichetal.2001, author = {Wolf, Martin and Foltz, Christian and Killich, Stephan and Schmidt, Ludger}, title = {Task and Information Modeling for Cooperative Work / Foltz, Christian ; Killich, Stephan ; Wolf, Martin ; Schmidt, Ludger ; Luczak, Holger}, series = {Systems, social and internationalization design aspects of human-computer interaction / ed. by Michael J. Smith, Gavriel Salvendy Vol. 2}, journal = {Systems, social and internationalization design aspects of human-computer interaction / ed. by Michael J. Smith, Gavriel Salvendy Vol. 2}, publisher = {-}, isbn = {0-8058-3608-X}, pages = {172 -- 176}, year = {2001}, language = {en} } @article{WolfLuczakSpringeretal.1997, author = {Wolf, Martin and Luczak, Holger and Springer, J. and Simon, S.}, title = {The role of metaphors in computer supported cooperative work}, series = {Proceedings of WWDU '97 Tokyo, Fifth International Scientific Conference on Work with Display Units : November 3 - 5, 1997, Tokyo /}, journal = {Proceedings of WWDU '97 Tokyo, Fifth International Scientific Conference on Work with Display Units : November 3 - 5, 1997, Tokyo /}, editor = {Miyamoto, Hiroyuki}, publisher = {-}, address = {Tokyo}, pages = {191 -- 192}, year = {1997}, language = {en} } @article{WolfSchlickSpringer1997, author = {Wolf, Martin and Schlick, Christopher and Springer, J.}, title = {The use of implicit communication mechanisms in desktop-teleconferencing-systems}, series = {Proceedings of WWDU '97 Tokyo, Fifth International Scientific Conference on Work with Display Units : November 3 - 5, 1997, Tokyo}, journal = {Proceedings of WWDU '97 Tokyo, Fifth International Scientific Conference on Work with Display Units : November 3 - 5, 1997, Tokyo}, editor = {Miyamoto, Hiroyuki}, publisher = {-}, address = {Tokyo}, pages = {193 -- 194}, year = {1997}, language = {en} } @article{KoehlerRoepkeWolf2021, author = {K{\"o}hler, Klemens and R{\"o}pke, Ren{\´e} and Wolf, Martin}, title = {Through a mirror darkly - On the obscurity of teaching goals in game-based learning in IT security}, series = {ISAGA 2019: Simulation Gaming Through Times and Disciplines}, journal = {ISAGA 2019: Simulation Gaming Through Times and Disciplines}, publisher = {Springer}, address = {Cham}, doi = {10.1007/978-3-030-72132-9_6}, pages = {61 -- 73}, year = {2021}, abstract = {Teachers and instructors use very specific language communicating teaching goals. The most widely used frameworks of common reference are the Bloom's Taxonomy and the Revised Bloom's Taxonomy. The latter provides distinction of 209 different teaching goals which are connected to methods. In Competence Developing Games (CDGs - serious games to convey knowledge) and in IT security education, a two- or three level typology exists, reducing possible learning outcomes to awareness, training, and education. This study explores whether this much simpler framework succeeds in achieving the same range of learning outcomes. Method wise a keyword analysis was conducted. The results were threefold: 1. The words used to describe teaching goals in CDGs on IT security education do not reflect the whole range of learning outcomes. 2. The word choice is nevertheless different from common language, indicating an intentional use of language. 3. IT security CDGs use different sets of terms to describe learning outcomes, depending on whether they are awareness, training, or education games. The interpretation of the findings is that the reduction to just three types of CDGs reduces the capacity to communicate and think about learning outcomes and consequently reduces the outcomes that are intentionally achieved.}, language = {en} } @article{FoltzSchneiderWolfetal.2008, author = {Foltz, Christian and Schneider, Nicole and Wolf, Martin and Kausch, Bernhard and Schlick, Christopher and Luczak, Holger}, title = {Usability engineering}, series = {Collaborative and distributed chemical engineering : from understanding to substantial design process support; results of the IMPROVE Project. - (Lecture notes in computer science ; 4970)}, journal = {Collaborative and distributed chemical engineering : from understanding to substantial design process support; results of the IMPROVE Project. - (Lecture notes in computer science ; 4970)}, editor = {Nagl, Manfred}, publisher = {Springer}, address = {Berlin}, isbn = {978-3-540-70552-9}, doi = {10.1007/978-3-540-70552-9_21}, pages = {527 -- 554}, year = {2008}, language = {en} } @article{Wolf2012, author = {Wolf, Martin}, title = {Von Security Awareness zum Secure Behaviour}, series = {Hakin9 Extra - IT-Forensik}, volume = {2012}, journal = {Hakin9 Extra - IT-Forensik}, number = {5}, publisher = {Software Wydawnictwo}, address = {Warszawa}, issn = {1733-7186}, pages = {18 -- 19}, year = {2012}, abstract = {Security Awareness ist derzeit ein viel diskutiertes Thema. Es reicht nicht, einfach nur ein paar technische Systeme (z.B. Firewalls) zu installieren, um ein angemessenes Schutzniveau zu erzielen. Neben einer guten Organisation von IT Security ist es auch notwendig, den Mitarbeiter einzubinden. Der vielzitierte "Faktor Mensch" ist derjenige, der die Technik korrekt anwenden muss und der durch falsches Verhalten technische und organisatorische Schutzmaßnahmen aushebeln kann. Deshalb reicht es nicht aus, wenn sich der Mitarbeiter der Gefahren bewusst ("aware") ist, er muss auch dementsprechend "sicher" handeln.}, language = {de} }