@article{RoepkeKoehlerDruryetal.2020, author = {Roepke, Rene and K{\"o}hler, Klemens and Drury, Vincent and Schroeder, Ulrik and Wolf, Martin and Meyer, Ulrike}, title = {A pond full of phishing games - analysis of learning games for anti-phishing education}, series = {Model-driven Simulation and Training Environments for Cybersecurity. MSTEC 2020}, journal = {Model-driven Simulation and Training Environments for Cybersecurity. MSTEC 2020}, publisher = {Springer}, address = {Cham}, isbn = {978-3-030-62433-0}, doi = {10.1007/978-3-030-62433-0_32020}, pages = {41 -- 60}, year = {2020}, abstract = {Game-based learning is a promising approach to anti-phishing education, as it fosters motivation and can help reduce the perceived difficulty of the educational material. Over the years, several prototypes for game-based applications have been proposed, that follow different approaches in content selection, presentation, and game mechanics. In this paper, a literature and product review of existing learning games is presented. Based on research papers and accessible applications, an in-depth analysis was conducted, encompassing target groups, educational contexts, learning goals based on Bloom's Revised Taxonomy, and learning content. As a result of this review, we created the publications on games (POG) data set for the domain of anti-phishing education. While there are games that can convey factual and conceptual knowledge, we find that most games are either unavailable, fail to convey procedural knowledge or lack technical depth. Thus, we identify potential areas of improvement for games suitable for end-users in informal learning contexts.}, language = {en} } @article{OrzadaFiedlerBitzetal.2020, author = {Orzada, Stephan and Fiedler, Thomas M. and Bitz, Andreas and Ladd, Mark E. and Quick, Harald H.}, title = {Local SAR compression with overestimation control to reduce maximum relative SAR overestimation and improve multi-channel RF array performance}, series = {Magnetic Resonance Materials in Physics, Biology and Medicine}, journal = {Magnetic Resonance Materials in Physics, Biology and Medicine}, number = {34 (2021)}, publisher = {Springer}, address = {Heidelberg}, isbn = {1352-8661}, doi = {10.1007/s10334-020-00890-0}, pages = {153 -- 164}, year = {2020}, abstract = {Objective In local SAR compression algorithms, the overestimation is generally not linearly dependent on actual local SAR. This can lead to large relative overestimation at low actual SAR values, unnecessarily constraining transmit array performance. Method Two strategies are proposed to reduce maximum relative overestimation for a given number of VOPs. The first strategy uses an overestimation matrix that roughly approximates actual local SAR; the second strategy uses a small set of pre-calculated VOPs as the overestimation term for the compression. Result Comparison with a previous method shows that for a given maximum relative overestimation the number of VOPs can be reduced by around 20\% at the cost of a higher absolute overestimation at high actual local SAR values. Conclusion The proposed strategies outperform a previously published strategy and can improve the SAR compression where maximum relative overestimation constrains the performance of parallel transmission.}, language = {en} } @article{MuellerLeiseLorenzetal.2020, author = {M{\"u}ller, Tim M. and Leise, Philipp and Lorenz, Imke-Sophie and Altherr, Lena and Pelz, Peter F.}, title = {Optimization and validation of pumping system design and operation for water supply in high-rise buildings}, series = {Optimization and Engineering}, volume = {2021}, journal = {Optimization and Engineering}, number = {22}, publisher = {Springer}, issn = {1573-2924}, doi = {10.1007/s11081-020-09553-4}, pages = {643 -- 686}, year = {2020}, abstract = {The application of mathematical optimization methods for water supply system design and operation provides the capacity to increase the energy efficiency and to lower the investment costs considerably. We present a system approach for the optimal design and operation of pumping systems in real-world high-rise buildings that is based on the usage of mixed-integer nonlinear and mixed-integer linear modeling approaches. In addition, we consider different booster station topologies, i.e. parallel and series-parallel central booster stations as well as decentral booster stations. To confirm the validity of the underlying optimization models with real-world system behavior, we additionally present validation results based on experiments conducted on a modularly constructed pumping test rig. Within the models we consider layout and control decisions for different load scenarios, leading to a Deterministic Equivalent of a two-stage stochastic optimization program. We use a piecewise linearization as well as a piecewise relaxation of the pumps' characteristics to derive mixed-integer linear models. Besides the solution with off-the-shelf solvers, we present a problem specific exact solving algorithm to improve the computation time. Focusing on the efficient exploration of the solution space, we divide the problem into smaller subproblems, which partly can be cut off in the solution process. Furthermore, we discuss the performance and applicability of the solution approaches for real buildings and analyze the technical aspects of the solutions from an engineer's point of view, keeping in mind the economically important trade-off between investment and operation costs.}, language = {en} } @article{KoehlerWolf2020, author = {K{\"o}hler, Klemens and Wolf, Martin}, title = {Organisatorische Maßnahmen zu Erh{\"o}hung der IT Sicherheit - Empfehlungen aus der Perspektive der Konflikttheorie}, number = {Preprint}, year = {2020}, abstract = {Die NATO definiert den Cyberspace als die "Umgebung, die durch physische und nicht-physische Bestandteile zum Speichern, {\"A}ndern, und Austauschen von Daten mit Hilfe von Computer-Netzwerken" [NATO CCDCOE]. Dar{\"u}ber hinaus ist es ein Medium menschlicher Interaktion. IT Angriffe sind feindselige, nichtkooperative Interaktionen, die mittels Konflikttheorie beschrieben werden k{\"o}nnen. Durch die Anwendung dieses Gedankengeb{\"a}udes auf IT Sicherheit von Organisationen k{\"o}nnen eine Reihe von Verbesserungen in Unternehmen identifiziert werden.}, language = {de} } @article{Koehler2020, author = {K{\"o}hler, Klemens}, title = {A conflict theory perspective of IT attacks - consequences for IT security education}, number = {Preprint}, year = {2020}, abstract = {Cyberspace is "the environment formed by physical and non-physical components to store, modify, and exchange data using computer networks" (NATO CCDCOE). Beyond that, it is an environment where people interact. IT attacks are hostile, non-cooperative interactions that can be described with conflict theory. Applying conflict theory to IT security leads to different objectives for end-user education, requiring different formats like agency-based competence developing games.}, language = {en} } @article{HueningDeMatteis2020, author = {H{\"u}ning, Felix and De Matteis, Stefan}, title = {Entwicklung eines taktilen HMI f{\"u}r sehbehinderte und blinde Nutzerinnen und Nutzer}, series = {Blind - sehbehindert}, volume = {140}, journal = {Blind - sehbehindert}, number = {2}, publisher = {Edition Bentheim}, address = {W{\"u}rzburg}, issn = {0176-7836}, pages = {9 -- 19}, year = {2020}, language = {de} } @article{HueningBackes2020, author = {H{\"u}ning, Felix and Backes, Andreas}, title = {Direct observation of large Barkhausen jump in thin Vicalloy wires}, series = {IEEE Magnetics Letters}, volume = {11}, journal = {IEEE Magnetics Letters}, number = {Art. 2506504}, publisher = {IEEE}, address = {New York, NY}, isbn = {1949-307X}, doi = {10.1109/LMAG.2020.3046411}, pages = {1 -- 4}, year = {2020}, language = {en} } @article{FiedlerLaddClemensetal.2020, author = {Fiedler, Thomas M. and Ladd, Mark E. and Clemens, Markus and Bitz, Andreas}, title = {Safety of subjects during radiofrequency exposure in ultra-high-field magnetic resonance imaging}, series = {IEEE Letters on Electromagnetic Compatibility Practice and Applications}, volume = {2}, journal = {IEEE Letters on Electromagnetic Compatibility Practice and Applications}, number = {3}, publisher = {IEEE}, address = {New York, NY}, isbn = {2637-6423}, doi = {10.1109/LEMCPA.2020.3029747}, pages = {1 -- 8}, year = {2020}, abstract = {Magnetic resonance imaging (MRI) is one of the most important medical imaging techniques. Since the introduction of MRI in the mid-1980s, there has been a continuous trend toward higher static magnetic fields to obtain i.a. a higher signal-to-noise ratio. The step toward ultra-high-field (UHF) MRI at 7 Tesla and higher, however, creates several challenges regarding the homogeneity of the spin excitation RF transmit field and the RF exposure of the subject. In UHF MRI systems, the wavelength of the RF field is in the range of the diameter of the human body, which can result in inhomogeneous spin excitation and local SAR hotspots. To optimize the homogeneity in a region of interest, UHF MRI systems use parallel transmit systems with multiple transmit antennas and time-dependent modulation of the RF signal in the individual transmit channels. Furthermore, SAR increases with increasing field strength, while the SAR limits remain unchanged. Two different approaches to generate the RF transmit field in UHF systems using antenna arrays close and remote to the body are investigated in this letter. Achievable imaging performance is evaluated compared to typical clinical RF transmit systems at lower field strength. The evaluation has been performed under consideration of RF exposure based on local SAR and tissue temperature. Furthermore, results for thermal dose as an alternative RF exposure metric are presented.}, language = {en} } @article{CzarneckiDietze2020, author = {Czarnecki, Christian and Dietze, Christian}, title = {Gestaltungsorientierte Forschung am Beispiel der Referenzmodellierung in der Telekommunikationsindustrie}, series = {HMD Praxis der Wirtschaftsinformatik}, volume = {57}, journal = {HMD Praxis der Wirtschaftsinformatik}, number = {2}, publisher = {Springer Nature}, address = {Cham}, issn = {2198-2775}, doi = {10.1365/s40702-020-00594-y}, pages = {310 -- 323}, year = {2020}, abstract = {Am Beispiel der Telekommunikationsindustrie zeigt der Beitrag eine konkrete Ausgestaltung anwendungsorientierter Forschung, die sowohl f{\"u}r die Praxis als auch f{\"u}r die Wissenschaft nutzen- und erkenntnisbringend ist. Forschungsgegenstand sind die Referenzmodelle des Industriegremiums TM Forum, die von vielen Telekommunikationsunternehmen zur Transformation ihrer Strukturen und Systeme genutzt werden. Es wird die langj{\"a}hrige Forschungst{\"a}tigkeit bei der Weiterentwicklung und Anwendung dieser Referenzmodelle beschrieben. Dabei wird ein konsequent gestaltungsorientierter Forschungsansatz verfolgt. Das Zusammenspiel aus kontinuierlicher Weiterentwicklung in Zusammenarbeit mit einem Industriegremium und der Anwendung in vielf{\"a}ltigen Praxisprojekten f{\"u}hrt zu einer erfolgreichen Symbiose aus praktischer Nutzengenerierung sowie wissenschaftlichem Erkenntnisgewinn. Der Beitrag stellt den gew{\"a}hlten Forschungsansatz anhand konkreter Beispiele vor. Darauf basierend werden Empfehlungen und Herausforderungen f{\"u}r eine gestaltungs- und praxisorientierte Forschung diskutiert.}, language = {de} } @article{BensbergAuthCzarnecki2020, author = {Bensberg, Frank and Auth, Gunnar and Czarnecki, Christian}, title = {Literaturanalyse mit Text Mining}, series = {E-Learning and Education (eleed)}, journal = {E-Learning and Education (eleed)}, number = {13}, editor = {Haake, J{\"o}rg M.}, publisher = {FernUniversit{\"a}t in Hagen}, address = {Hagen}, issn = {1860-7470}, pages = {1 -- 13}, year = {2020}, abstract = {Die Durchf{\"u}hrung einer systematischen Literaturrecherche ist eine zentrale Kompetenz wissenschaftlichen Arbeitens und bildet daher einen festen Ausbildungsbestandteil von Bachelor- und Masterstudieng{\"a}ngen. In entsprechenden Lehrveranstaltungen werden Studierende zwar mit den grundlegenden Hilfsmitteln zur Suche und Verwaltung von Literatur vertraut gemacht, allerdings werden die Potenziale textanalytischer Methoden und Anwendungssysteme (Text Mining, Text Analytics) dabei zumeist nicht abgedeckt. Folglich werden Datenkompetenzen, die zur systemgest{\"u}tzten Analyse und Erschließung von Literaturdaten erforderlich sind, nicht hinreichend ausgepr{\"a}gt. Um diese Kompetenzl{\"u}cke zu adressieren, ist an der Hochschule Osnabr{\"u}ck eine Lehrveranstaltung konzipiert und projektorientiert umgesetzt worden, die sich insbesondere an Studierende wirtschaftswissenschaftlicher Studieng{\"a}nge richtet. Dieser Beitrag dokumentiert die fachliche sowie technische Ausgestaltung dieser Veranstaltung und zeigt Potenziale f{\"u}r die k{\"u}nftige Weiterentwicklung auf.}, language = {de} }