@inproceedings{KoenigWolf2016, author = {K{\"o}nig, Johannes Alexander and Wolf, Martin}, title = {The pyramid assessment framework for 'competence developing games'}, series = {Communications in Computer and Information Science}, volume = {618}, booktitle = {Communications in Computer and Information Science}, editor = {Stephanidis, C.}, publisher = {Springer}, isbn = {978-331940541-4}, issn = {1865-0929}, doi = {10.1007/978-3-319-40542-1_37}, pages = {232 -- 237}, year = {2016}, language = {en} } @inproceedings{WolfLenz2015, author = {Wolf, Martin and Lenz, Laura L.}, title = {The economic effectiveness of serious games in the healthcare environment : application and evaluation of the Comparative Transformation Model (CTM)}, series = {IEEE 3rd International Conference on Serious Games and Applications for Health : SeGAH 2014 ; Rio de Janeiro, Brazil, May 14 - 16}, booktitle = {IEEE 3rd International Conference on Serious Games and Applications for Health : SeGAH 2014 ; Rio de Janeiro, Brazil, May 14 - 16}, publisher = {IEEE [u.a.]}, address = {Piscataway, NJ}, isbn = {978-1-4799-4823-9}, doi = {10.1109/SeGAH.2014.7067089}, pages = {135 -- 142}, year = {2015}, language = {en} } @article{WolfBiesenGreeb2014, author = {Wolf, Martin and Biesen, Ina van der and Greeb, Birgit}, title = {Mein Freund, die Uni}, series = {Die neue Hochschule : DNH : f{\"u}r anwendungsbezogene Wissenschaft und Kunst}, volume = {2014}, journal = {Die neue Hochschule : DNH : f{\"u}r anwendungsbezogene Wissenschaft und Kunst}, number = {2}, publisher = {HLB}, address = {Bonn}, issn = {0340-448X}, pages = {54 -- 56}, year = {2014}, language = {de} } @inproceedings{LenzWolf2014, author = {Lenz, Laura L. and Wolf, Martin}, title = {Economic evaluation of serious games with the comparative assessment framework COSEGA}, series = {The shift from teaching to learning : individual, collective and organizational learning through gaming simulation ; proceedings of the 45th conference of the International Simulation and Gaming Association, Dornbirn 2014}, booktitle = {The shift from teaching to learning : individual, collective and organizational learning through gaming simulation ; proceedings of the 45th conference of the International Simulation and Gaming Association, Dornbirn 2014}, editor = {Kritz, Willy Christian}, publisher = {Bertelsmann}, address = {[Bielefeld]}, isbn = {978-3-7639-5422-3}, pages = {374 -- 386}, year = {2014}, language = {en} } @inproceedings{MaikeLenzWolf2014, author = {Maike, M{\"u}ller and Lenz, Laura and Wolf, Martin}, title = {Steigerung der Effektivit{\"a}t durch Prozessmodellierungs-Tools - {\"A}nderbarkeit und Transparenz von Prozessen am Beispiel der Business Simulation Apollo 13}, series = {Informatik 2014}, booktitle = {Informatik 2014}, publisher = {Gesellschaft f{\"u}r Informatik e.V.}, address = {Bonn}, isbn = {978-3-88579-626-8}, issn = {1617-5468}, pages = {357 -- 369}, year = {2014}, abstract = {Die Nutzung von Prozessmodellierungsmethoden oder - werkzeugen kann erheblichen Einfluss auf die Effektivit{\"a}t von Prozessen haben. Das gilt insbesondere f{\"u}r Situationen, in denen Personen unter Stress stehen oder unge{\"u}bt sind. In diesen F{\"a}llen geben Prozessmodelle konkrete Empfehlungen, nach denen sich die handelnden Personen richten k{\"o}nnten. In Experimenten mit der Business-Simulation Apollo 13 haben wir den Effekt eines Einsatzes von Prozessmodellierungsmethoden und -werkzeugen untersucht. Bereits bekannte Theorien (z.B. {\"u}ber geeignete Verh{\"a}ltnisse von Kommunikationsinhalten) konnten best{\"a}tigt werden. Dar{\"u}ber hinaus haben wir eine besondere Bedeutung der {\"U}bertragbarkeit von Prozessmodellen in konkrete Handlungen identifiziert.}, language = {de} } @incollection{WolfFraentz2013, author = {Wolf, Martin and Fr{\"a}ntz, Birgit}, title = {Erfolgreiches IT-Marketing}, series = {Erfolgreiches IT-Marketing in Zeiten von Social Media, Cloud \& Co. - (CIO-Handbuch ; 2)}, booktitle = {Erfolgreiches IT-Marketing in Zeiten von Social Media, Cloud \& Co. - (CIO-Handbuch ; 2)}, edition = {1. Auflage}, publisher = {Symposion Publishing}, address = {D{\"u}sseldorf}, isbn = {978-3-86329-612-4}, pages = {123 -- 140}, year = {2013}, language = {de} } @inproceedings{WolfWiese2013, author = {Wolf, Martin and Wiese, Ute}, title = {A comparative transformation model for process changes using serious games}, series = {2013 IEEE 2nd International Conference on Serious Games and Applications for Health (SeGAH): proceedings of a meeting held 2-3 May 2013, Algarve, Portugal}, booktitle = {2013 IEEE 2nd International Conference on Serious Games and Applications for Health (SeGAH): proceedings of a meeting held 2-3 May 2013, Algarve, Portugal}, publisher = {Institute of Electrical and Electronics Engineers (IEEE)}, address = {Piscataway, NJ}, organization = {International Conference on Serious Games and Applications for Health <2, 2013, Algarve>}, isbn = {978-1-4673-6164-4}, doi = {10.1109/SeGAH.2013.6665307}, pages = {64 -- 70}, year = {2013}, language = {en} } @article{PoppelWolf2013, author = {Poppel, Kristin Isabel and Wolf, Martin}, title = {M{\"o}glichkeiten und Potentiale von Revisionsmarketing}, series = {Zeitschrift Interne Revision : ZIR ; Fachzeitschrift f{\"u}r Wissenschaft und Praxis}, volume = {48}, journal = {Zeitschrift Interne Revision : ZIR ; Fachzeitschrift f{\"u}r Wissenschaft und Praxis}, number = {4}, publisher = {Erich Schmidt Verlag}, address = {Berlin}, issn = {0044-3816}, pages = {200 -- 208}, year = {2013}, language = {de} } @article{WolfAltgen2013, author = {Wolf, Martin and Altgen, Jannik}, title = {IT Service Management in der Region Aachen : White Paper}, pages = {1 -- 13}, year = {2013}, language = {de} } @article{Wolf2012, author = {Wolf, Martin}, title = {Von Security Awareness zum Secure Behaviour}, series = {Hakin9 Extra - IT-Forensik}, volume = {2012}, journal = {Hakin9 Extra - IT-Forensik}, number = {5}, publisher = {Software Wydawnictwo}, address = {Warszawa}, issn = {1733-7186}, pages = {18 -- 19}, year = {2012}, abstract = {Security Awareness ist derzeit ein viel diskutiertes Thema. Es reicht nicht, einfach nur ein paar technische Systeme (z.B. Firewalls) zu installieren, um ein angemessenes Schutzniveau zu erzielen. Neben einer guten Organisation von IT Security ist es auch notwendig, den Mitarbeiter einzubinden. Der vielzitierte "Faktor Mensch" ist derjenige, der die Technik korrekt anwenden muss und der durch falsches Verhalten technische und organisatorische Schutzmaßnahmen aushebeln kann. Deshalb reicht es nicht aus, wenn sich der Mitarbeiter der Gefahren bewusst ("aware") ist, er muss auch dementsprechend "sicher" handeln.}, language = {de} }