@inproceedings{WolfWiedenmaierSchlick1998, author = {Wolf, Martin and Wiedenmaier, S. and Schlick, Christopher}, title = {Flexible Kooperation durch computergest{\"u}tzte Teamarbeit}, series = {Groupware und organisatorische Innovation : Tagungsband der Deutschen Fachtagung zu Computer Supported Cooperative Work. - (Berichte des German Chapter of the ACM ; Bd. 51)}, booktitle = {Groupware und organisatorische Innovation : Tagungsband der Deutschen Fachtagung zu Computer Supported Cooperative Work. - (Berichte des German Chapter of the ACM ; Bd. 51)}, editor = {Herrmann, Thomas}, publisher = {Teubner}, address = {Stuttgart}, isbn = {3-519-02692-9}, pages = {349 -- 350}, year = {1998}, language = {de} } @article{WolfSimonSchlick1997, author = {Wolf, Martin and Simon, S. and Schlick, Christopher}, title = {Computergest{\"u}tzte Kooperation - Eine Seifenblase? / Wolf, M.; Simon, S.; Schlick, C.}, series = {Rechnergest{\"u}tzte Kooperation in Verwaltungen und großen Unternehmen : Tagungsband zum Workshop der GI-Gachgruppe / Peter Mambrey ... ( Hrsg.)}, journal = {Rechnergest{\"u}tzte Kooperation in Verwaltungen und großen Unternehmen : Tagungsband zum Workshop der GI-Gachgruppe / Peter Mambrey ... ( Hrsg.)}, publisher = {Univ., Fachbereich Mathematik u. Informatik}, address = {Essen}, pages = {220 -- 234}, year = {1997}, language = {de} } @article{WolfArmbrusterSchlicketal.1997, author = {Wolf, Martin and Armbruster, S. and Schlick, Christopher and Simon, S.}, title = {Markt{\"u}bersicht Telekooperationssysteme - Das IAW stellt im Internet umfangreiche Informationen {\"u}ber Telekooperationssysteme zur Verf{\"u}gung / Wolf, M. ; Armbruster, S. ; Schlick, C. ; Simon, S.}, series = {FIR + IAW Mitteilungen. 29 (1997), H. 1}, journal = {FIR + IAW Mitteilungen. 29 (1997), H. 1}, publisher = {-}, pages = {11 -- 12}, year = {1997}, language = {de} } @article{WolfArmbrusterSchlicketal.1997, author = {Wolf, Martin and Armbruster, S. and Schlick, Christopher and Simon, S.}, title = {Markt{\"u}bersicht Telekooperationssysteme / Wolf, M.; Armbruster, S.; Schlick, C.; Simon, S.}, series = {Elsa Insight (1997)}, journal = {Elsa Insight (1997)}, publisher = {-}, pages = {8 -- 9}, year = {1997}, language = {de} } @inproceedings{WolfSchlickHerbstetal.1996, author = {Wolf, Martin and Schlick, Christopher and Herbst, D. and Springer, J.}, title = {Einflussfaktoren auf den Erfolg von Telekooperation in großen Unternehmen}, series = {Computer Supported Cooperative Work (CSCW) in großen Unternehmungen : Tagungsband zum Workshop der GI-Fachgruppe 5.5.1 "CSCW in Organisationen" und dem Technologiezentrum Darmstadt der Deutschen Telekom AG vom 09. - 10. Mai 1996}, booktitle = {Computer Supported Cooperative Work (CSCW) in großen Unternehmungen : Tagungsband zum Workshop der GI-Fachgruppe 5.5.1 "CSCW in Organisationen" und dem Technologiezentrum Darmstadt der Deutschen Telekom AG vom 09. - 10. Mai 1996}, editor = {Uellner, Stefan}, publisher = {Dt. Telekom}, address = {Darmstadt}, pages = {1 -- 12}, year = {1996}, language = {de} } @book{WolfFoltzKillich2000, author = {Wolf, Martin and Foltz, Christian and Killich, S.}, title = {K3 User Guide}, publisher = {RWTH}, address = {Aachen}, pages = {1 -- 13}, year = {2000}, language = {en} } @article{Wolf2012, author = {Wolf, Martin}, title = {Von Security Awareness zum Secure Behaviour}, series = {Hakin9 Extra - IT-Forensik}, volume = {2012}, journal = {Hakin9 Extra - IT-Forensik}, number = {5}, publisher = {Software Wydawnictwo}, address = {Warszawa}, issn = {1733-7186}, pages = {18 -- 19}, year = {2012}, abstract = {Security Awareness ist derzeit ein viel diskutiertes Thema. Es reicht nicht, einfach nur ein paar technische Systeme (z.B. Firewalls) zu installieren, um ein angemessenes Schutzniveau zu erzielen. Neben einer guten Organisation von IT Security ist es auch notwendig, den Mitarbeiter einzubinden. Der vielzitierte "Faktor Mensch" ist derjenige, der die Technik korrekt anwenden muss und der durch falsches Verhalten technische und organisatorische Schutzmaßnahmen aushebeln kann. Deshalb reicht es nicht aus, wenn sich der Mitarbeiter der Gefahren bewusst ("aware") ist, er muss auch dementsprechend "sicher" handeln.}, language = {de} } @incollection{WolfFraentz2013, author = {Wolf, Martin and Fr{\"a}ntz, Birgit}, title = {Erfolgreiches IT-Marketing}, series = {Erfolgreiches IT-Marketing in Zeiten von Social Media, Cloud \& Co. - (CIO-Handbuch ; 2)}, booktitle = {Erfolgreiches IT-Marketing in Zeiten von Social Media, Cloud \& Co. - (CIO-Handbuch ; 2)}, edition = {1. Auflage}, publisher = {Symposion Publishing}, address = {D{\"u}sseldorf}, isbn = {978-3-86329-612-4}, pages = {123 -- 140}, year = {2013}, language = {de} } @inproceedings{WolfWiese2013, author = {Wolf, Martin and Wiese, Ute}, title = {A comparative transformation model for process changes using serious games}, series = {2013 IEEE 2nd International Conference on Serious Games and Applications for Health (SeGAH): proceedings of a meeting held 2-3 May 2013, Algarve, Portugal}, booktitle = {2013 IEEE 2nd International Conference on Serious Games and Applications for Health (SeGAH): proceedings of a meeting held 2-3 May 2013, Algarve, Portugal}, publisher = {Institute of Electrical and Electronics Engineers (IEEE)}, address = {Piscataway, NJ}, organization = {International Conference on Serious Games and Applications for Health <2, 2013, Algarve>}, isbn = {978-1-4673-6164-4}, doi = {10.1109/SeGAH.2013.6665307}, pages = {64 -- 70}, year = {2013}, language = {en} } @article{PoppelWolf2013, author = {Poppel, Kristin Isabel and Wolf, Martin}, title = {M{\"o}glichkeiten und Potentiale von Revisionsmarketing}, series = {Zeitschrift Interne Revision : ZIR ; Fachzeitschrift f{\"u}r Wissenschaft und Praxis}, volume = {48}, journal = {Zeitschrift Interne Revision : ZIR ; Fachzeitschrift f{\"u}r Wissenschaft und Praxis}, number = {4}, publisher = {Erich Schmidt Verlag}, address = {Berlin}, issn = {0044-3816}, pages = {200 -- 208}, year = {2013}, language = {de} } @article{WolfBiesenGreeb2014, author = {Wolf, Martin and Biesen, Ina van der and Greeb, Birgit}, title = {Mein Freund, die Uni}, series = {Die neue Hochschule : DNH : f{\"u}r anwendungsbezogene Wissenschaft und Kunst}, volume = {2014}, journal = {Die neue Hochschule : DNH : f{\"u}r anwendungsbezogene Wissenschaft und Kunst}, number = {2}, publisher = {HLB}, address = {Bonn}, issn = {0340-448X}, pages = {54 -- 56}, year = {2014}, language = {de} } @inproceedings{WolfLenz2015, author = {Wolf, Martin and Lenz, Laura L.}, title = {The economic effectiveness of serious games in the healthcare environment : application and evaluation of the Comparative Transformation Model (CTM)}, series = {IEEE 3rd International Conference on Serious Games and Applications for Health : SeGAH 2014 ; Rio de Janeiro, Brazil, May 14 - 16}, booktitle = {IEEE 3rd International Conference on Serious Games and Applications for Health : SeGAH 2014 ; Rio de Janeiro, Brazil, May 14 - 16}, publisher = {IEEE [u.a.]}, address = {Piscataway, NJ}, isbn = {978-1-4799-4823-9}, doi = {10.1109/SeGAH.2014.7067089}, pages = {135 -- 142}, year = {2015}, language = {en} } @inproceedings{LenzWolf2014, author = {Lenz, Laura L. and Wolf, Martin}, title = {Economic evaluation of serious games with the comparative assessment framework COSEGA}, series = {The shift from teaching to learning : individual, collective and organizational learning through gaming simulation ; proceedings of the 45th conference of the International Simulation and Gaming Association, Dornbirn 2014}, booktitle = {The shift from teaching to learning : individual, collective and organizational learning through gaming simulation ; proceedings of the 45th conference of the International Simulation and Gaming Association, Dornbirn 2014}, editor = {Kritz, Willy Christian}, publisher = {Bertelsmann}, address = {[Bielefeld]}, isbn = {978-3-7639-5422-3}, pages = {374 -- 386}, year = {2014}, language = {en} } @article{WolfAltgen2013, author = {Wolf, Martin and Altgen, Jannik}, title = {IT Service Management in der Region Aachen : White Paper}, pages = {1 -- 13}, year = {2013}, language = {de} } @article{KoenigVoelkerWolfetal.2016, author = {K{\"o}nig, Johannes Alexander and V{\"o}lker, Veronika and Wolf, Martin and Schuba, Marko}, title = {Gamified Hacking Offence Simulation-based Training (GHOST)}, series = {Crisis Prevention}, volume = {2016}, journal = {Crisis Prevention}, number = {3}, publisher = {Beta}, address = {Bonn}, pages = {44 -- 46}, year = {2016}, language = {de} } @inproceedings{KoenigWolf2016, author = {K{\"o}nig, Johannes Alexander and Wolf, Martin}, title = {The pyramid assessment framework for 'competence developing games'}, series = {Communications in Computer and Information Science}, volume = {618}, booktitle = {Communications in Computer and Information Science}, editor = {Stephanidis, C.}, publisher = {Springer}, isbn = {978-331940541-4}, issn = {1865-0929}, doi = {10.1007/978-3-319-40542-1_37}, pages = {232 -- 237}, year = {2016}, language = {en} } @book{GunnarBartonBeigeletal.2017, author = {Gunnar, Auth and Barton, Thomas and Beigel, Stefan and Bensberg, Frank and Brehm, Lars and Wolf, Martin}, title = {Prozesse, Technologie, Anwendungen, Systeme und Management 2017}, editor = {Barton, Thomas and Herrmann, Frank and Meister, Vera G. and M{\"u}ller, Christian and Seel, Christian}, publisher = {Mana-Buch}, address = {Heide}, isbn = {978-3-944330-56-3}, pages = {297 Seiten}, year = {2017}, language = {de} } @article{KoenigWolf2018, author = {K{\"o}nig, Johannes Alexander and Wolf, Martin}, title = {GHOST: An Evaluated Competence Developing Game for Cybersecurity Awareness Training}, series = {International Journal on Advances in Security}, volume = {11}, journal = {International Journal on Advances in Security}, number = {3 \& 4}, publisher = {IARIA Journals}, issn = {1942-2636}, pages = {274 -- 287}, year = {2018}, abstract = {To train end users how to interact with digital systems is indispensable to ensure a strong computer security. 'Competence Developing Game'-based approaches are particularly suitable for this purpose because of their motivation-and simulation-aspects. In this paper the Competence Developing Game 'GHOST' for cybersecurity awareness trainings and its underlying patterns are described. Accordingly, requirements for an 'Competence Developing Game' based training are discussed. Based on these requirements it is shown how a game can fulfill these requirements. A supplementary game interaction design and a corresponding evaluation study is shown. The combination of training requirements and interaction design is used to create a 'Competence Developing Game'-based training concept. A part of these concept is implemented into a playable prototype that serves around one hour of play respectively training time. This prototype is used to perform an evaluation of the game and training aspects of the awareness training. Thereby, the quality of the game aspect and the effectiveness of the training aspect are shown.}, language = {en} } @inproceedings{WeberWolf2017, author = {Weber, Niklas and Wolf, Martin}, title = {Datenerhebung f{\"u}r die CDG-Forschung}, series = {Prozesse, Technologie, Anwendungen, Systeme und Management 2017 : angewandte Forschung in der Wirtschaftsinformatik : Tagungsband zur 30. AKWI-Jahrestagung vom 17.09.2017 bis 20.09.2017 an der Hochschule Aschaffenburg / Arbeitskreis Wirtschaftsinformatik an Fachhochschulen (AKWI)}, booktitle = {Prozesse, Technologie, Anwendungen, Systeme und Management 2017 : angewandte Forschung in der Wirtschaftsinformatik : Tagungsband zur 30. AKWI-Jahrestagung vom 17.09.2017 bis 20.09.2017 an der Hochschule Aschaffenburg / Arbeitskreis Wirtschaftsinformatik an Fachhochschulen (AKWI)}, editor = {Barton, Thomas}, publisher = {mana-Buch}, address = {Heide}, isbn = {978-3-944330-56-3}, pages = {218 -- 227}, year = {2017}, language = {de} } @article{Wolf2000, author = {Wolf, Martin}, title = {Groupware related task design}, series = {ACM SIGGROUP Bulletin}, volume = {21}, journal = {ACM SIGGROUP Bulletin}, number = {2}, issn = {2372-7403}, doi = {10.1145/605660.605662}, pages = {5 -- 8}, year = {2000}, abstract = {his report summarizes the results of a workshop on Groupware related task design which took place at the International Conference on Supporting Group Work Group'99, Arizona, from 14 th to 17 th November 1999. The workshop was addressed to people from different viewpoints, backgrounds, and domains: - Researchers dealing with questions of task analysis and task modeling for Groupware application from an academic point of view. They may contribute modelbased design approaches or theoretically oriented work - Practitioners with experience in the design and everyday use of groupware systems. They might refer to the practical side of the topic: "real" tasks, "real" problems, "real" users, etc.}, language = {en} }