@article{Wolf2012, author = {Wolf, Martin}, title = {Von Security Awareness zum Secure Behaviour}, series = {Hakin9 Extra - IT-Forensik}, volume = {2012}, journal = {Hakin9 Extra - IT-Forensik}, number = {5}, publisher = {Software Wydawnictwo}, address = {Warszawa}, issn = {1733-7186}, pages = {18 -- 19}, year = {2012}, abstract = {Security Awareness ist derzeit ein viel diskutiertes Thema. Es reicht nicht, einfach nur ein paar technische Systeme (z.B. Firewalls) zu installieren, um ein angemessenes Schutzniveau zu erzielen. Neben einer guten Organisation von IT Security ist es auch notwendig, den Mitarbeiter einzubinden. Der vielzitierte "Faktor Mensch" ist derjenige, der die Technik korrekt anwenden muss und der durch falsches Verhalten technische und organisatorische Schutzmaßnahmen aushebeln kann. Deshalb reicht es nicht aus, wenn sich der Mitarbeiter der Gefahren bewusst ("aware") ist, er muss auch dementsprechend "sicher" handeln.}, language = {de} } @article{FoltzSchneiderWolfetal.2008, author = {Foltz, Christian and Schneider, Nicole and Wolf, Martin and Kausch, Bernhard and Schlick, Christopher and Luczak, Holger}, title = {Usability engineering}, series = {Collaborative and distributed chemical engineering : from understanding to substantial design process support; results of the IMPROVE Project. - (Lecture notes in computer science ; 4970)}, journal = {Collaborative and distributed chemical engineering : from understanding to substantial design process support; results of the IMPROVE Project. - (Lecture notes in computer science ; 4970)}, editor = {Nagl, Manfred}, publisher = {Springer}, address = {Berlin}, isbn = {978-3-540-70552-9}, doi = {10.1007/978-3-540-70552-9_21}, pages = {527 -- 554}, year = {2008}, language = {en} } @article{KoehlerRoepkeWolf2021, author = {K{\"o}hler, Klemens and R{\"o}pke, Ren{\´e} and Wolf, Martin}, title = {Through a mirror darkly - On the obscurity of teaching goals in game-based learning in IT security}, series = {ISAGA 2019: Simulation Gaming Through Times and Disciplines}, journal = {ISAGA 2019: Simulation Gaming Through Times and Disciplines}, publisher = {Springer}, address = {Cham}, doi = {10.1007/978-3-030-72132-9_6}, pages = {61 -- 73}, year = {2021}, abstract = {Teachers and instructors use very specific language communicating teaching goals. The most widely used frameworks of common reference are the Bloom's Taxonomy and the Revised Bloom's Taxonomy. The latter provides distinction of 209 different teaching goals which are connected to methods. In Competence Developing Games (CDGs - serious games to convey knowledge) and in IT security education, a two- or three level typology exists, reducing possible learning outcomes to awareness, training, and education. This study explores whether this much simpler framework succeeds in achieving the same range of learning outcomes. Method wise a keyword analysis was conducted. The results were threefold: 1. The words used to describe teaching goals in CDGs on IT security education do not reflect the whole range of learning outcomes. 2. The word choice is nevertheless different from common language, indicating an intentional use of language. 3. IT security CDGs use different sets of terms to describe learning outcomes, depending on whether they are awareness, training, or education games. The interpretation of the findings is that the reduction to just three types of CDGs reduces the capacity to communicate and think about learning outcomes and consequently reduces the outcomes that are intentionally achieved.}, language = {en} } @article{WolfSchlickSpringer1997, author = {Wolf, Martin and Schlick, Christopher and Springer, J.}, title = {The use of implicit communication mechanisms in desktop-teleconferencing-systems}, series = {Proceedings of WWDU '97 Tokyo, Fifth International Scientific Conference on Work with Display Units : November 3 - 5, 1997, Tokyo}, journal = {Proceedings of WWDU '97 Tokyo, Fifth International Scientific Conference on Work with Display Units : November 3 - 5, 1997, Tokyo}, editor = {Miyamoto, Hiroyuki}, publisher = {-}, address = {Tokyo}, pages = {193 -- 194}, year = {1997}, language = {en} } @article{WolfLuczakSpringeretal.1997, author = {Wolf, Martin and Luczak, Holger and Springer, J. and Simon, S.}, title = {The role of metaphors in computer supported cooperative work}, series = {Proceedings of WWDU '97 Tokyo, Fifth International Scientific Conference on Work with Display Units : November 3 - 5, 1997, Tokyo /}, journal = {Proceedings of WWDU '97 Tokyo, Fifth International Scientific Conference on Work with Display Units : November 3 - 5, 1997, Tokyo /}, editor = {Miyamoto, Hiroyuki}, publisher = {-}, address = {Tokyo}, pages = {191 -- 192}, year = {1997}, language = {en} } @article{WolfFoltzKillichetal.2001, author = {Wolf, Martin and Foltz, Christian and Killich, Stephan and Schmidt, Ludger}, title = {Task and Information Modeling for Cooperative Work / Foltz, Christian ; Killich, Stephan ; Wolf, Martin ; Schmidt, Ludger ; Luczak, Holger}, series = {Systems, social and internationalization design aspects of human-computer interaction / ed. by Michael J. Smith, Gavriel Salvendy Vol. 2}, journal = {Systems, social and internationalization design aspects of human-computer interaction / ed. by Michael J. Smith, Gavriel Salvendy Vol. 2}, publisher = {-}, isbn = {0-8058-3608-X}, pages = {172 -- 176}, year = {2001}, language = {en} } @article{Wolf2003, author = {Wolf, Martin}, title = {Risiko- und Maßnahmenmanagement bei der Computervalidierung}, series = {Pharma-Technologie-Journal (2003)}, journal = {Pharma-Technologie-Journal (2003)}, publisher = {-}, isbn = {0931-9700}, pages = {50 -- 62}, year = {2003}, language = {de} } @article{WolfSimonSchlick1998, author = {Wolf, Martin and Simon, S. and Schlick, Christopher}, title = {Qualitative and Quantitative Analysis of Cooperation / Wolf, M. ; Simon, S. ; Schlick, C.}, series = {Proceedings : May 26 - 29, 1998, Cannes (France) = Actes : 26 - 29 mai 1998 / INRIA, Institut National de Recherche en Informatique et en Automatique, Unit{\´e} de recherche ... F. Darses ..., eds}, journal = {Proceedings : May 26 - 29, 1998, Cannes (France) = Actes : 26 - 29 mai 1998 / INRIA, Institut National de Recherche en Informatique et en Automatique, Unit{\´e} de recherche ... F. Darses ..., eds}, publisher = {-}, address = {Cannes}, pages = {1 -- 5}, year = {1998}, language = {en} } @article{KoehlerWolf2020, author = {K{\"o}hler, Klemens and Wolf, Martin}, title = {Organisatorische Maßnahmen zu Erh{\"o}hung der IT Sicherheit - Empfehlungen aus der Perspektive der Konflikttheorie}, number = {Preprint}, year = {2020}, abstract = {Die NATO definiert den Cyberspace als die "Umgebung, die durch physische und nicht-physische Bestandteile zum Speichern, {\"A}ndern, und Austauschen von Daten mit Hilfe von Computer-Netzwerken" [NATO CCDCOE]. Dar{\"u}ber hinaus ist es ein Medium menschlicher Interaktion. IT Angriffe sind feindselige, nichtkooperative Interaktionen, die mittels Konflikttheorie beschrieben werden k{\"o}nnen. Durch die Anwendung dieses Gedankengeb{\"a}udes auf IT Sicherheit von Organisationen k{\"o}nnen eine Reihe von Verbesserungen in Unternehmen identifiziert werden.}, language = {de} } @article{PoppelWolf2013, author = {Poppel, Kristin Isabel and Wolf, Martin}, title = {M{\"o}glichkeiten und Potentiale von Revisionsmarketing}, series = {Zeitschrift Interne Revision : ZIR ; Fachzeitschrift f{\"u}r Wissenschaft und Praxis}, volume = {48}, journal = {Zeitschrift Interne Revision : ZIR ; Fachzeitschrift f{\"u}r Wissenschaft und Praxis}, number = {4}, publisher = {Erich Schmidt Verlag}, address = {Berlin}, issn = {0044-3816}, pages = {200 -- 208}, year = {2013}, language = {de} }