TY - JOUR A1 - Kürten, Sylvia A1 - Mottaghy, Darius A1 - Ziegler, Martin T1 - Planung, Auslegung und Dimensionierung von thermo-aktiven Bauteilen am Beispiel thermo-aktiver Abdichtungselemente JF - Geothermie, Bohr- und Brunnentechnik Y1 - 2014 SP - 18 EP - 20 PB - Ernst & Sohn CY - Berlin ER - TY - JOUR A1 - Kürten, Sylvia A1 - Mottaghy, Darius A1 - Ziegler, Martin T1 - A new model for the description of the heat transfer for plane thermo-active geotechnical systems based on thermal resistances JF - Acta Geotechnica Y1 - 2015 U6 - https://doi.org/10.1007/s11440-014-0311-6 SN - 1861-1133 VL - 10 IS - 2 SP - 219 EP - 229 PB - Springer CY - Berlin ER - TY - JOUR A1 - Kürten, Sylvia A1 - Mottaghy, Darius A1 - Ziegler, Martin T1 - Design of plane energy geostructures based on laboratory tests and numerical modelling JF - Energy and Buildings Y1 - 2015 U6 - https://doi.org/10.1016/j.enbuild.2015.08.039 SN - 0378-7788 VL - 107 SP - 434 EP - 444 PB - Elsevier CY - Amsterdam ER - TY - JOUR A1 - Kürten, Sylvia A1 - Mottaghy, Darius A1 - Ziegler, Martin T1 - Besonderheiten bei der Planung und Berechnung von oberflächennahen thermo-aktiven Bauteilen JF - Geotechnik Y1 - 2015 U6 - https://doi.org/10.1002/gete.201500002 SN - 2190-6653 VL - 38 IS - 2 SP - 107 EP - 119 PB - Wiley CY - Weinheim ER - TY - JOUR A1 - Küppers, Tobias A1 - Steffen, Victoria A1 - Hellmuth, Hendrik A1 - O'Connell, Timothy A1 - Bongaerts, Johannes A1 - Maurer, Karl-Heinz A1 - Wiechert, Wolfgang T1 - Developing a new production host from a blueprint: Bacillus pumilus as an industrial enzyme producer JF - Microbial cell factories Y1 - 2014 U6 - https://doi.org/10.1186/1475-2859-13-46 SN - 1475-2859 (E-Journal) VL - 13 SP - Article No. 46 PB - BioMed Central CY - London ER - TY - JOUR A1 - König, Johannes Alexander A1 - Wolf, Martin R. T1 - GHOST: An Evaluated Competence Developing Game for Cybersecurity Awareness Training JF - International Journal on Advances in Security N2 - To train end users how to interact with digital systems is indispensable to ensure a strong computer security. 'Competence Developing Game'-based approaches are particularly suitable for this purpose because of their motivation-and simulation-aspects. In this paper the Competence Developing Game 'GHOST' for cybersecurity awareness trainings and its underlying patterns are described. Accordingly, requirements for an 'Competence Developing Game' based training are discussed. Based on these requirements it is shown how a game can fulfill these requirements. A supplementary game interaction design and a corresponding evaluation study is shown. The combination of training requirements and interaction design is used to create a 'Competence Developing Game'-based training concept. A part of these concept is implemented into a playable prototype that serves around one hour of play respectively training time. This prototype is used to perform an evaluation of the game and training aspects of the awareness training. Thereby, the quality of the game aspect and the effectiveness of the training aspect are shown. Y1 - 2018 SN - 1942-2636 VL - 11 IS - 3 & 4 SP - 274 EP - 287 PB - IARIA Journals ER - TY - JOUR A1 - König, Johannes Alexander A1 - Völker, Veronika A1 - Wolf, Martin R. A1 - Schuba, Marko T1 - Gamified Hacking Offence Simulation-based Training (GHOST) JF - Crisis Prevention Y1 - 2016 VL - 2016 IS - 3 SP - 44 EP - 46 PB - Beta CY - Bonn ER - TY - JOUR A1 - Köllensperger, P. A1 - Bragard, Michael A1 - Plum, T. A1 - De Doncker, R. W. T1 - The dual GCT : new high-power device using optimized GCT technology JF - IEEE transactions on industry applications Y1 - 2009 U6 - https://doi.org/10.1109/TIA.2009.2027364 SN - 0093-9994 VL - 45 IS - 5 SP - 1754 EP - 1762 ER - TY - JOUR A1 - Köhler, Klemens A1 - Wolf, Martin R. T1 - Organisatorische Maßnahmen zu Erhöhung der IT Sicherheit – Empfehlungen aus der Perspektive der Konflikttheorie N2 - Die NATO definiert den Cyberspace als die "Umgebung, die durch physische und nicht-physische Bestandteile zum Speichern, Ändern, und Austauschen von Daten mit Hilfe von Computer-Netzwerken" [NATO CCDCOE]. Darüber hinaus ist es ein Medium menschlicher Interaktion. IT Angriffe sind feindselige, nichtkooperative Interaktionen, die mittels Konflikttheorie beschrieben werden können. Durch die Anwendung dieses Gedankengebäudes auf IT Sicherheit von Organisationen können eine Reihe von Verbesserungen in Unternehmen identifiziert werden. Y1 - 2020 IS - Preprint ER - TY - JOUR A1 - Köhler, Klemens A1 - Röpke, René A1 - Wolf, Martin R. T1 - Through a mirror darkly – On the obscurity of teaching goals in game-based learning in IT security JF - ISAGA 2019: Simulation Gaming Through Times and Disciplines N2 - Teachers and instructors use very specific language communicating teaching goals. The most widely used frameworks of common reference are the Bloom’s Taxonomy and the Revised Bloom’s Taxonomy. The latter provides distinction of 209 different teaching goals which are connected to methods. In Competence Developing Games (CDGs - serious games to convey knowledge) and in IT security education, a two- or three level typology exists, reducing possible learning outcomes to awareness, training, and education. This study explores whether this much simpler framework succeeds in achieving the same range of learning outcomes. Method wise a keyword analysis was conducted. The results were threefold: 1. The words used to describe teaching goals in CDGs on IT security education do not reflect the whole range of learning outcomes. 2. The word choice is nevertheless different from common language, indicating an intentional use of language. 3. IT security CDGs use different sets of terms to describe learning outcomes, depending on whether they are awareness, training, or education games. The interpretation of the findings is that the reduction to just three types of CDGs reduces the capacity to communicate and think about learning outcomes and consequently reduces the outcomes that are intentionally achieved. KW - IT security education KW - Competence Developing Games KW - Game-based learning KW - Keyword analysis KW - Bloom’s Taxonomy Y1 - 2021 U6 - https://doi.org/10.1007/978-3-030-72132-9_6 N1 - ISAGA 2019 - International Simulation and Gaming Association Conference. 26-30 August 2019. Warsaw, Poland. Part of the Lecture Notes in Computer Science book series (LNCS, volume 11988) SP - 61 EP - 73 PB - Springer CY - Cham ER -