@article{WolfLuczakSpringeretal.1997, author = {Wolf, Martin and Luczak, Holger and Springer, J. and Simon, S.}, title = {The role of metaphors in computer supported cooperative work}, series = {Proceedings of WWDU '97 Tokyo, Fifth International Scientific Conference on Work with Display Units : November 3 - 5, 1997, Tokyo /}, journal = {Proceedings of WWDU '97 Tokyo, Fifth International Scientific Conference on Work with Display Units : November 3 - 5, 1997, Tokyo /}, editor = {Miyamoto, Hiroyuki}, publisher = {-}, address = {Tokyo}, pages = {191 -- 192}, year = {1997}, language = {en} } @article{WolfSchlickSpringer1997, author = {Wolf, Martin and Schlick, Christopher and Springer, J.}, title = {The use of implicit communication mechanisms in desktop-teleconferencing-systems}, series = {Proceedings of WWDU '97 Tokyo, Fifth International Scientific Conference on Work with Display Units : November 3 - 5, 1997, Tokyo}, journal = {Proceedings of WWDU '97 Tokyo, Fifth International Scientific Conference on Work with Display Units : November 3 - 5, 1997, Tokyo}, editor = {Miyamoto, Hiroyuki}, publisher = {-}, address = {Tokyo}, pages = {193 -- 194}, year = {1997}, language = {en} } @article{WolfSimonSchlick1997, author = {Wolf, Martin and Simon, S. and Schlick, Christopher}, title = {Computergest{\"u}tzte Kooperation - Eine Seifenblase? / Wolf, M.; Simon, S.; Schlick, C.}, series = {Rechnergest{\"u}tzte Kooperation in Verwaltungen und großen Unternehmen : Tagungsband zum Workshop der GI-Gachgruppe / Peter Mambrey ... ( Hrsg.)}, journal = {Rechnergest{\"u}tzte Kooperation in Verwaltungen und großen Unternehmen : Tagungsband zum Workshop der GI-Gachgruppe / Peter Mambrey ... ( Hrsg.)}, publisher = {Univ., Fachbereich Mathematik u. Informatik}, address = {Essen}, pages = {220 -- 234}, year = {1997}, language = {de} } @article{WolfArmbrusterSchlicketal.1997, author = {Wolf, Martin and Armbruster, S. and Schlick, Christopher and Simon, S.}, title = {Markt{\"u}bersicht Telekooperationssysteme - Das IAW stellt im Internet umfangreiche Informationen {\"u}ber Telekooperationssysteme zur Verf{\"u}gung / Wolf, M. ; Armbruster, S. ; Schlick, C. ; Simon, S.}, series = {FIR + IAW Mitteilungen. 29 (1997), H. 1}, journal = {FIR + IAW Mitteilungen. 29 (1997), H. 1}, publisher = {-}, pages = {11 -- 12}, year = {1997}, language = {de} } @article{WolfArmbrusterSchlicketal.1997, author = {Wolf, Martin and Armbruster, S. and Schlick, Christopher and Simon, S.}, title = {Markt{\"u}bersicht Telekooperationssysteme / Wolf, M.; Armbruster, S.; Schlick, C.; Simon, S.}, series = {Elsa Insight (1997)}, journal = {Elsa Insight (1997)}, publisher = {-}, pages = {8 -- 9}, year = {1997}, language = {de} } @article{WolfSimonSchlick1998, author = {Wolf, Martin and Simon, S. and Schlick, Christopher}, title = {Qualitative and Quantitative Analysis of Cooperation / Wolf, M. ; Simon, S. ; Schlick, C.}, series = {Proceedings : May 26 - 29, 1998, Cannes (France) = Actes : 26 - 29 mai 1998 / INRIA, Institut National de Recherche en Informatique et en Automatique, Unit{\´e} de recherche ... F. Darses ..., eds}, journal = {Proceedings : May 26 - 29, 1998, Cannes (France) = Actes : 26 - 29 mai 1998 / INRIA, Institut National de Recherche en Informatique et en Automatique, Unit{\´e} de recherche ... F. Darses ..., eds}, publisher = {-}, address = {Cannes}, pages = {1 -- 5}, year = {1998}, language = {en} } @article{WolfFoltzSchlicketal.1999, author = {Wolf, Martin and Foltz, Christian and Schlick, Christopher and Luczak, Holger}, title = {Groupware support for chemical process design / Wolf, M.; Foltz, C.; Schlick, C.; Luczak, H.}, series = {Human-computer interaction : proceedings of HCI International '99 (the 8th International Conference on Human-Computer Interaction), Munich, Germany, August 22 - 26, 1999}, journal = {Human-computer interaction : proceedings of HCI International '99 (the 8th International Conference on Human-Computer Interaction), Munich, Germany, August 22 - 26, 1999}, publisher = {Erlbaum}, address = {Mahwah, NJ}, pages = {343 -- 347}, year = {1999}, language = {en} } @article{WolfLuczak1999, author = {Wolf, Martin and Luczak, Holger}, title = {Computer Supported Communication and Cooperation - Making Information Aware / Luczak, H. ; Wolf, M.}, series = {Human-computer interaction : proceedings of HCI International '99 (the 8th International Conference on Human-Computer Interaction), Munich, Germany, August 22 - 26, 1999}, journal = {Human-computer interaction : proceedings of HCI International '99 (the 8th International Conference on Human-Computer Interaction), Munich, Germany, August 22 - 26, 1999}, publisher = {Erlbaum}, address = {Mahwah, NJ}, pages = {298 -- 302}, year = {1999}, language = {en} } @article{WolfFoltzSchlicketal.2000, author = {Wolf, Martin and Foltz, Christian and Schlick, Christopher and Luczak, Holger}, title = {Empirical Investigation of a workspace model for Chemical engineers / Wolf, Martin ; Foltz, Christian ; Schlick, Christopher ; Luczak, Holger}, series = {Proceedings of the Human Factors and Ergonomics Society Annual Meeting July 2000. 44 (2000), H. 6}, journal = {Proceedings of the Human Factors and Ergonomics Society Annual Meeting July 2000. 44 (2000), H. 6}, publisher = {-}, pages = {612 -- 615}, year = {2000}, language = {en} } @article{WolfFoltzSchlicketal.2000, author = {Wolf, Martin and Foltz, Christian and Schlick, Christopher and Luczak, Holger}, title = {Empirische Untersuchung eines Groupware-basierten Unterst{\"u}tzungs-Systems f{\"u}r verfahrenstechnische Entwickler / Wolf, M. ; Foltz, C. ; Schlick, C. ; Luczak, H.}, series = {Zeitschrift f{\"u}r Arbeitswissenschaft. 54 (2000), H. 3-4}, journal = {Zeitschrift f{\"u}r Arbeitswissenschaft. 54 (2000), H. 3-4}, publisher = {-}, isbn = {0340-2444}, pages = {258 -- 266}, year = {2000}, language = {de} } @article{WolfFoltzSchlicketal.2000, author = {Wolf, Martin and Foltz, Christian and Schlick, Christopher and Luczak, Holger}, title = {Entwicklung und Evaluation eines groupware-basierten Unterst{\"u}tzungssystems f{\"u}r verfahrenstechnische Entwickler / Wolf, M.; Foltz, C.; Schlick, C.; Luczak, H.}, series = {Komplexe Arbeitssysteme - Herausforderung f{\"u}r Analyse und Gestaltung : Bericht zum 46. Arbeitswissenschaftlichen Kongress der Gesellschaft f{\"u}r Arbeitswissenschaft vom 15. - 18. M{\"a}rz 2000 ; [Technische Universit{\"a}t Berlin]}, journal = {Komplexe Arbeitssysteme - Herausforderung f{\"u}r Analyse und Gestaltung : Bericht zum 46. Arbeitswissenschaftlichen Kongress der Gesellschaft f{\"u}r Arbeitswissenschaft vom 15. - 18. M{\"a}rz 2000 ; [Technische Universit{\"a}t Berlin]}, publisher = {GfA-Press}, address = {Dortmund}, isbn = {3-9806222-5-8}, pages = {95 -- 98}, year = {2000}, language = {de} } @article{Wolf2000, author = {Wolf, Martin}, title = {Groupware related task design}, series = {ACM SIGGROUP Bulletin. 21 (2000), H. 2}, journal = {ACM SIGGROUP Bulletin. 21 (2000), H. 2}, publisher = {-}, pages = {5 -- 8}, year = {2000}, language = {en} } @article{WolfFoltzLuczaketal.2000, author = {Wolf, Martin and Foltz, Christian and Luczak, Holger and Eggersmann, M.}, title = {Entwurf eines Referenzszenarios zur Analyse und Gestaltung von Entwicklungsprozessen in der verfahrenstechnischen Industrie / Foltz, C.; Wolf, M.; Luczak, H.; Eggersmann, M.; Schneider, R.; Marquardt, W.}, series = {Komplexe Arbeitssysteme - Herausforderung f{\"u}r Analyse und Gestaltung : Bericht zum 46. Arbeitswissenschaftlichen Kongress der Gesellschaft f{\"u}r Arbeitswissenschaft vom 15. - 18. M{\"a}rz 2000 ; [Technische Universit{\"a}t Berlin]}, journal = {Komplexe Arbeitssysteme - Herausforderung f{\"u}r Analyse und Gestaltung : Bericht zum 46. Arbeitswissenschaftlichen Kongress der Gesellschaft f{\"u}r Arbeitswissenschaft vom 15. - 18. M{\"a}rz 2000 ; [Technische Universit{\"a}t Berlin]}, publisher = {GfA-Press}, address = {Dortmund}, isbn = {3-9806222-5-8}, pages = {545 -- 548}, year = {2000}, language = {de} } @article{Wolf2000, author = {Wolf, Martin}, title = {Groupware related task design}, series = {ACM SIGGROUP Bulletin}, volume = {21}, journal = {ACM SIGGROUP Bulletin}, number = {2}, issn = {2372-7403}, doi = {10.1145/605660.605662}, pages = {5 -- 8}, year = {2000}, abstract = {his report summarizes the results of a workshop on Groupware related task design which took place at the International Conference on Supporting Group Work Group'99, Arizona, from 14 th to 17 th November 1999. The workshop was addressed to people from different viewpoints, backgrounds, and domains: - Researchers dealing with questions of task analysis and task modeling for Groupware application from an academic point of view. They may contribute modelbased design approaches or theoretically oriented work - Practitioners with experience in the design and everyday use of groupware systems. They might refer to the practical side of the topic: "real" tasks, "real" problems, "real" users, etc.}, language = {en} } @article{WolfFoltzKillichetal.2001, author = {Wolf, Martin and Foltz, Christian and Killich, Stephan and Schmidt, Ludger}, title = {Task and Information Modeling for Cooperative Work / Foltz, Christian ; Killich, Stephan ; Wolf, Martin ; Schmidt, Ludger ; Luczak, Holger}, series = {Systems, social and internationalization design aspects of human-computer interaction / ed. by Michael J. Smith, Gavriel Salvendy Vol. 2}, journal = {Systems, social and internationalization design aspects of human-computer interaction / ed. by Michael J. Smith, Gavriel Salvendy Vol. 2}, publisher = {-}, isbn = {0-8058-3608-X}, pages = {172 -- 176}, year = {2001}, language = {en} } @article{WolfFoltzSchlicketal.2002, author = {Wolf, Martin and Foltz, Christian and Schlick, Christopher and Luczak, Holger}, title = {Development and evaluation of a groupware system to support chemical design processes / Wolf, Martin ; Foltz, Christian ; Schlick, Christopher ; Luczak, Holger}, series = {International Journal of Human-Computer Interaction . 14 (2002), H. 2}, journal = {International Journal of Human-Computer Interaction . 14 (2002), H. 2}, publisher = {-}, isbn = {1044-7318}, pages = {181 -- 198}, year = {2002}, language = {en} } @article{Wolf2003, author = {Wolf, Martin}, title = {Risiko- und Maßnahmenmanagement bei der Computervalidierung}, series = {Pharma-Technologie-Journal (2003)}, journal = {Pharma-Technologie-Journal (2003)}, publisher = {-}, isbn = {0931-9700}, pages = {50 -- 62}, year = {2003}, language = {de} } @article{FoltzSchneiderWolfetal.2008, author = {Foltz, Christian and Schneider, Nicole and Wolf, Martin and Kausch, Bernhard and Schlick, Christopher and Luczak, Holger}, title = {Usability engineering}, series = {Collaborative and distributed chemical engineering : from understanding to substantial design process support; results of the IMPROVE Project. - (Lecture notes in computer science ; 4970)}, journal = {Collaborative and distributed chemical engineering : from understanding to substantial design process support; results of the IMPROVE Project. - (Lecture notes in computer science ; 4970)}, editor = {Nagl, Manfred}, publisher = {Springer}, address = {Berlin}, isbn = {978-3-540-70552-9}, doi = {10.1007/978-3-540-70552-9_21}, pages = {527 -- 554}, year = {2008}, language = {en} } @article{Wolf2012, author = {Wolf, Martin}, title = {Von Security Awareness zum Secure Behaviour}, series = {Hakin9 Extra - IT-Forensik}, volume = {2012}, journal = {Hakin9 Extra - IT-Forensik}, number = {5}, publisher = {Software Wydawnictwo}, address = {Warszawa}, issn = {1733-7186}, pages = {18 -- 19}, year = {2012}, abstract = {Security Awareness ist derzeit ein viel diskutiertes Thema. Es reicht nicht, einfach nur ein paar technische Systeme (z.B. Firewalls) zu installieren, um ein angemessenes Schutzniveau zu erzielen. Neben einer guten Organisation von IT Security ist es auch notwendig, den Mitarbeiter einzubinden. Der vielzitierte "Faktor Mensch" ist derjenige, der die Technik korrekt anwenden muss und der durch falsches Verhalten technische und organisatorische Schutzmaßnahmen aushebeln kann. Deshalb reicht es nicht aus, wenn sich der Mitarbeiter der Gefahren bewusst ("aware") ist, er muss auch dementsprechend "sicher" handeln.}, language = {de} } @article{PoppelWolf2013, author = {Poppel, Kristin Isabel and Wolf, Martin}, title = {M{\"o}glichkeiten und Potentiale von Revisionsmarketing}, series = {Zeitschrift Interne Revision : ZIR ; Fachzeitschrift f{\"u}r Wissenschaft und Praxis}, volume = {48}, journal = {Zeitschrift Interne Revision : ZIR ; Fachzeitschrift f{\"u}r Wissenschaft und Praxis}, number = {4}, publisher = {Erich Schmidt Verlag}, address = {Berlin}, issn = {0044-3816}, pages = {200 -- 208}, year = {2013}, language = {de} } @article{WolfAltgen2013, author = {Wolf, Martin and Altgen, Jannik}, title = {IT Service Management in der Region Aachen : White Paper}, pages = {1 -- 13}, year = {2013}, language = {de} } @article{WolfBiesenGreeb2014, author = {Wolf, Martin and Biesen, Ina van der and Greeb, Birgit}, title = {Mein Freund, die Uni}, series = {Die neue Hochschule : DNH : f{\"u}r anwendungsbezogene Wissenschaft und Kunst}, volume = {2014}, journal = {Die neue Hochschule : DNH : f{\"u}r anwendungsbezogene Wissenschaft und Kunst}, number = {2}, publisher = {HLB}, address = {Bonn}, issn = {0340-448X}, pages = {54 -- 56}, year = {2014}, language = {de} } @article{KoenigVoelkerWolfetal.2016, author = {K{\"o}nig, Johannes Alexander and V{\"o}lker, Veronika and Wolf, Martin and Schuba, Marko}, title = {Gamified Hacking Offence Simulation-based Training (GHOST)}, series = {Crisis Prevention}, volume = {2016}, journal = {Crisis Prevention}, number = {3}, publisher = {Beta}, address = {Bonn}, pages = {44 -- 46}, year = {2016}, language = {de} } @article{KoenigWolf2018, author = {K{\"o}nig, Johannes Alexander and Wolf, Martin}, title = {GHOST: An Evaluated Competence Developing Game for Cybersecurity Awareness Training}, series = {International Journal on Advances in Security}, volume = {11}, journal = {International Journal on Advances in Security}, number = {3 \& 4}, publisher = {IARIA Journals}, issn = {1942-2636}, pages = {274 -- 287}, year = {2018}, abstract = {To train end users how to interact with digital systems is indispensable to ensure a strong computer security. 'Competence Developing Game'-based approaches are particularly suitable for this purpose because of their motivation-and simulation-aspects. In this paper the Competence Developing Game 'GHOST' for cybersecurity awareness trainings and its underlying patterns are described. Accordingly, requirements for an 'Competence Developing Game' based training are discussed. Based on these requirements it is shown how a game can fulfill these requirements. A supplementary game interaction design and a corresponding evaluation study is shown. The combination of training requirements and interaction design is used to create a 'Competence Developing Game'-based training concept. A part of these concept is implemented into a playable prototype that serves around one hour of play respectively training time. This prototype is used to perform an evaluation of the game and training aspects of the awareness training. Thereby, the quality of the game aspect and the effectiveness of the training aspect are shown.}, language = {en} } @article{KoehlerWolf2020, author = {K{\"o}hler, Klemens and Wolf, Martin}, title = {Organisatorische Maßnahmen zu Erh{\"o}hung der IT Sicherheit - Empfehlungen aus der Perspektive der Konflikttheorie}, number = {Preprint}, year = {2020}, abstract = {Die NATO definiert den Cyberspace als die "Umgebung, die durch physische und nicht-physische Bestandteile zum Speichern, {\"A}ndern, und Austauschen von Daten mit Hilfe von Computer-Netzwerken" [NATO CCDCOE]. Dar{\"u}ber hinaus ist es ein Medium menschlicher Interaktion. IT Angriffe sind feindselige, nichtkooperative Interaktionen, die mittels Konflikttheorie beschrieben werden k{\"o}nnen. Durch die Anwendung dieses Gedankengeb{\"a}udes auf IT Sicherheit von Organisationen k{\"o}nnen eine Reihe von Verbesserungen in Unternehmen identifiziert werden.}, language = {de} } @article{RoepkeKoehlerDruryetal.2020, author = {Roepke, Rene and K{\"o}hler, Klemens and Drury, Vincent and Schroeder, Ulrik and Wolf, Martin and Meyer, Ulrike}, title = {A pond full of phishing games - analysis of learning games for anti-phishing education}, series = {Model-driven Simulation and Training Environments for Cybersecurity. MSTEC 2020}, journal = {Model-driven Simulation and Training Environments for Cybersecurity. MSTEC 2020}, publisher = {Springer}, address = {Cham}, isbn = {978-3-030-62433-0}, doi = {10.1007/978-3-030-62433-0_32020}, pages = {41 -- 60}, year = {2020}, abstract = {Game-based learning is a promising approach to anti-phishing education, as it fosters motivation and can help reduce the perceived difficulty of the educational material. Over the years, several prototypes for game-based applications have been proposed, that follow different approaches in content selection, presentation, and game mechanics. In this paper, a literature and product review of existing learning games is presented. Based on research papers and accessible applications, an in-depth analysis was conducted, encompassing target groups, educational contexts, learning goals based on Bloom's Revised Taxonomy, and learning content. As a result of this review, we created the publications on games (POG) data set for the domain of anti-phishing education. While there are games that can convey factual and conceptual knowledge, we find that most games are either unavailable, fail to convey procedural knowledge or lack technical depth. Thus, we identify potential areas of improvement for games suitable for end-users in informal learning contexts.}, language = {en} } @article{KoehlerRoepkeWolf2021, author = {K{\"o}hler, Klemens and R{\"o}pke, Ren{\´e} and Wolf, Martin}, title = {Through a mirror darkly - On the obscurity of teaching goals in game-based learning in IT security}, series = {ISAGA 2019: Simulation Gaming Through Times and Disciplines}, journal = {ISAGA 2019: Simulation Gaming Through Times and Disciplines}, publisher = {Springer}, address = {Cham}, doi = {10.1007/978-3-030-72132-9_6}, pages = {61 -- 73}, year = {2021}, abstract = {Teachers and instructors use very specific language communicating teaching goals. The most widely used frameworks of common reference are the Bloom's Taxonomy and the Revised Bloom's Taxonomy. The latter provides distinction of 209 different teaching goals which are connected to methods. In Competence Developing Games (CDGs - serious games to convey knowledge) and in IT security education, a two- or three level typology exists, reducing possible learning outcomes to awareness, training, and education. This study explores whether this much simpler framework succeeds in achieving the same range of learning outcomes. Method wise a keyword analysis was conducted. The results were threefold: 1. The words used to describe teaching goals in CDGs on IT security education do not reflect the whole range of learning outcomes. 2. The word choice is nevertheless different from common language, indicating an intentional use of language. 3. IT security CDGs use different sets of terms to describe learning outcomes, depending on whether they are awareness, training, or education games. The interpretation of the findings is that the reduction to just three types of CDGs reduces the capacity to communicate and think about learning outcomes and consequently reduces the outcomes that are intentionally achieved.}, language = {en} }