@article{FrankeStreckertBitzetal.2005, author = {Franke, Helmut and Streckert, Joachim and Bitz, Andreas and Goeke, Johannes and Hansen, Volkert and Ringelstein, E. Bernd and Nattk{\"a}mper, Heiner and Galle, Hans-Joachim and St{\"o}gbauer, Florian}, title = {Effects of Universal Mobile Telecommunications System (UMTS) electromagnetic fields on the blood-brain barrier in vitro}, series = {Radiation Research}, volume = {164}, journal = {Radiation Research}, number = {3}, issn = {1938-5404}, doi = {10.1667/RR3424.1}, pages = {258 -- 269}, year = {2005}, language = {en} } @article{WissenBogdanskiScheeretal.2005, author = {Wissen, M. and Bogdanski, N. and Scheer, H.-C. and Bitz, Andreas and Ahrens, G. and Gruetzner, G.}, title = {Implication of the light polarisation for UV curing of pre-patterned resists}, series = {Microelectronic Engineering}, volume = {78-79}, journal = {Microelectronic Engineering}, issn = {0167-9317}, doi = {10.1016/j.mee.2004.12.099}, pages = {659 -- 664}, year = {2005}, language = {en} } @article{NdoumbeMbonjoMbonjoStreckertBitzetal.2004, author = {Ndoumb{\`e} Mbonjo Mbonjo, H. and Streckert, J. and Bitz, Andreas and Hansen, V. and Glasmachers, A. and Gencol, S. and Rozic, D.}, title = {Generic UMTS test signal for RF bioelectromagnetic studies}, series = {Bioelectromagnetics}, volume = {25}, journal = {Bioelectromagnetics}, number = {6}, issn = {1521-186X}, doi = {10.1002/bem.20007}, pages = {415 -- 425}, year = {2004}, language = {en} } @article{SommerStreckertBitzetal.2004, author = {Sommer, Angela M. and Streckert, Joachim and Bitz, Andreas and Hansen, Volkert W. and Lerchl, Alexander}, title = {No effects of GSM-modulated 900 MHz electromagnetic fields on survival rate and spontaneous development of lymphoma in female AKR/J mice}, series = {BMC Cancer}, volume = {77}, journal = {BMC Cancer}, number = {4}, doi = {10.1186/1471-2407-4-77}, year = {2004}, language = {en} } @article{HansenBitzStreckert1999, author = {Hansen, Volkert W. and Bitz, Andreas and Streckert, Joachim R.}, title = {RF Exposure of Biological Systems in Radial Waveguides}, series = {IEEE Transactions on Electromagnetic Compatibility}, volume = {41}, journal = {IEEE Transactions on Electromagnetic Compatibility}, number = {4}, issn = {1558-187X}, doi = {10.1109/15.809852}, pages = {487 -- 493}, year = {1999}, language = {en} } @article{OrzadaSolbachGratzetal.2019, author = {Orzada, Stephan and Solbach, Klaus and Gratz, Marcel and Brunheim, Sascha and Fiedler, Thomas M. and Johst, S{\"o}ren and Bitz, Andreas and Shooshtary, Samaneh and Abuelhaija, Asjraf and Voelker, Maximilian N. and Rietsch, Stefan H. G. and Kraff, Oliver and Maderwald, Stefan and Fl{\"o}ser, Martina and Oehmingen, Mark and Quick, Harald H. and Ladd, Mark E.}, title = {A 32-channel parallel transmit system add-on for 7T MRI}, series = {Plos one}, journal = {Plos one}, doi = {10.1371/journal.pone.0222452}, year = {2019}, language = {en} } @article{HueningDeMatteis2020, author = {H{\"u}ning, Felix and De Matteis, Stefan}, title = {Entwicklung eines taktilen HMI f{\"u}r sehbehinderte und blinde Nutzerinnen und Nutzer}, series = {Blind - sehbehindert}, volume = {140}, journal = {Blind - sehbehindert}, number = {2}, publisher = {Edition Bentheim}, address = {W{\"u}rzburg}, issn = {0176-7836}, pages = {9 -- 19}, year = {2020}, language = {de} } @article{Koehler2020, author = {K{\"o}hler, Klemens}, title = {A conflict theory perspective of IT attacks - consequences for IT security education}, number = {Preprint}, year = {2020}, abstract = {Cyberspace is "the environment formed by physical and non-physical components to store, modify, and exchange data using computer networks" (NATO CCDCOE). Beyond that, it is an environment where people interact. IT attacks are hostile, non-cooperative interactions that can be described with conflict theory. Applying conflict theory to IT security leads to different objectives for end-user education, requiring different formats like agency-based competence developing games.}, language = {en} } @article{KoehlerWolf2020, author = {K{\"o}hler, Klemens and Wolf, Martin}, title = {Organisatorische Maßnahmen zu Erh{\"o}hung der IT Sicherheit - Empfehlungen aus der Perspektive der Konflikttheorie}, number = {Preprint}, year = {2020}, abstract = {Die NATO definiert den Cyberspace als die "Umgebung, die durch physische und nicht-physische Bestandteile zum Speichern, {\"A}ndern, und Austauschen von Daten mit Hilfe von Computer-Netzwerken" [NATO CCDCOE]. Dar{\"u}ber hinaus ist es ein Medium menschlicher Interaktion. IT Angriffe sind feindselige, nichtkooperative Interaktionen, die mittels Konflikttheorie beschrieben werden k{\"o}nnen. Durch die Anwendung dieses Gedankengeb{\"a}udes auf IT Sicherheit von Organisationen k{\"o}nnen eine Reihe von Verbesserungen in Unternehmen identifiziert werden.}, language = {de} } @article{KoehlerRoepkeWolf2021, author = {K{\"o}hler, Klemens and R{\"o}pke, Ren{\´e} and Wolf, Martin}, title = {Through a mirror darkly - On the obscurity of teaching goals in game-based learning in IT security}, series = {ISAGA 2019: Simulation Gaming Through Times and Disciplines}, journal = {ISAGA 2019: Simulation Gaming Through Times and Disciplines}, publisher = {Springer}, address = {Cham}, doi = {10.1007/978-3-030-72132-9_6}, pages = {61 -- 73}, year = {2021}, abstract = {Teachers and instructors use very specific language communicating teaching goals. The most widely used frameworks of common reference are the Bloom's Taxonomy and the Revised Bloom's Taxonomy. The latter provides distinction of 209 different teaching goals which are connected to methods. In Competence Developing Games (CDGs - serious games to convey knowledge) and in IT security education, a two- or three level typology exists, reducing possible learning outcomes to awareness, training, and education. This study explores whether this much simpler framework succeeds in achieving the same range of learning outcomes. Method wise a keyword analysis was conducted. The results were threefold: 1. The words used to describe teaching goals in CDGs on IT security education do not reflect the whole range of learning outcomes. 2. The word choice is nevertheless different from common language, indicating an intentional use of language. 3. IT security CDGs use different sets of terms to describe learning outcomes, depending on whether they are awareness, training, or education games. The interpretation of the findings is that the reduction to just three types of CDGs reduces the capacity to communicate and think about learning outcomes and consequently reduces the outcomes that are intentionally achieved.}, language = {en} }