TY - JOUR A1 - Köhler, Klemens A1 - Röpke, René A1 - Wolf, Martin T1 - Through a mirror darkly – On the obscurity of teaching goals in game-based learning in IT security JF - ISAGA 2019: Simulation Gaming Through Times and Disciplines N2 - Teachers and instructors use very specific language communicating teaching goals. The most widely used frameworks of common reference are the Bloom’s Taxonomy and the Revised Bloom’s Taxonomy. The latter provides distinction of 209 different teaching goals which are connected to methods. In Competence Developing Games (CDGs - serious games to convey knowledge) and in IT security education, a two- or three level typology exists, reducing possible learning outcomes to awareness, training, and education. This study explores whether this much simpler framework succeeds in achieving the same range of learning outcomes. Method wise a keyword analysis was conducted. The results were threefold: 1. The words used to describe teaching goals in CDGs on IT security education do not reflect the whole range of learning outcomes. 2. The word choice is nevertheless different from common language, indicating an intentional use of language. 3. IT security CDGs use different sets of terms to describe learning outcomes, depending on whether they are awareness, training, or education games. The interpretation of the findings is that the reduction to just three types of CDGs reduces the capacity to communicate and think about learning outcomes and consequently reduces the outcomes that are intentionally achieved. KW - IT security education KW - Competence Developing Games KW - Game-based learning KW - Keyword analysis KW - Bloom’s Taxonomy Y1 - 2021 U6 - http://dx.doi.org/10.1007/978-3-030-72132-9_6 N1 - ISAGA 2019 - International Simulation and Gaming Association Conference. 26-30 August 2019. Warsaw, Poland. Part of the Lecture Notes in Computer Science book series (LNCS, volume 11988) SP - 61 EP - 73 PB - Springer CY - Cham ER - TY - JOUR A1 - Roepke, Rene A1 - Köhler, Klemens A1 - Drury, Vincent A1 - Schroeder, Ulrik A1 - Wolf, Martin A1 - Meyer, Ulrike T1 - A pond full of phishing games - analysis of learning games for anti-phishing education JF - Model-driven Simulation and Training Environments for Cybersecurity. MSTEC 2020 N2 - Game-based learning is a promising approach to anti-phishing education, as it fosters motivation and can help reduce the perceived difficulty of the educational material. Over the years, several prototypes for game-based applications have been proposed, that follow different approaches in content selection, presentation, and game mechanics. In this paper, a literature and product review of existing learning games is presented. Based on research papers and accessible applications, an in-depth analysis was conducted, encompassing target groups, educational contexts, learning goals based on Bloom’s Revised Taxonomy, and learning content. As a result of this review, we created the publications on games (POG) data set for the domain of anti-phishing education. While there are games that can convey factual and conceptual knowledge, we find that most games are either unavailable, fail to convey procedural knowledge or lack technical depth. Thus, we identify potential areas of improvement for games suitable for end-users in informal learning contexts. Y1 - 2020 SN - 978-3-030-62433-0 U6 - http://dx.doi.org/10.1007/978-3-030-62433-0_32020 N1 - Lecture Notes in Computer Science, vol 12512 SP - 41 EP - 60 PB - Springer CY - Cham ER - TY - CHAP A1 - Czarnecki, Christian ED - vom Brocke, Jan ED - Mendling, Jan T1 - Establishment of a central process governance organization combined with operational process improvements : Insights from a BPM Project at a leading telecommunications operator in the Middle East T2 - Business process management cases : digital innovation and business transformation in practice N2 - Because of customer churn, strong competition, and operational inefficiencies, the telecommunications operator ME Telco (fictitious name due to confidentiality) launched a strategic transformation program that included a Business Process Management (BPM) project. Major problems were silo-oriented process management and missing cross-functional transparency. Process improvements were not consistently planned and aligned with corporate targets. Measurable inefficiencies were observed on an operational level, e.g., high lead times and reassignment rates of the incident management process. Y1 - 2018 SN - 978-3-319-58306-8 SN - 978-3-319-58307-5 SN - 978-3-319-86372-6 U6 - http://dx.doi.org/10.1007/978-3-319-58307-5 N1 - Als Präsenzexemplar unter der Signatur 20 PZR 469-1 vorhanden. SP - 57 EP - 76 PB - Springer CY - Cham ER - TY - JOUR A1 - Elsen, Ingo A1 - Kraiss, Karl-Friedrich A1 - Krumbiegel, Dirk A1 - Walter, Peter A1 - Wickel, Jochen T1 - Visual information retrieval for 3D product identification: a midterm report JF - KI - Künstliche Intelligenz Y1 - 1999 SN - 1610-1987 SN - 0933-1875 VL - 13 IS - 1 SP - 64 EP - 67 PB - Springer CY - Berlin ER - TY - CHAP A1 - Eggert, Mathias A1 - Zähl, Philipp M. A1 - Wolf, Martin R. A1 - Haase, Martin ED - Cooper, Kendra M.L. ED - Bucchiarone, Antonio T1 - Applying leaderboards for quality improvement in software development projects T2 - Software Engineering for Games in Serious Contexts N2 - Software development projects often fail because of insufficient code quality. It is now well documented that the task of testing software, for example, is perceived as uninteresting and rather boring, leading to poor software quality and major challenges to software development companies. One promising approach to increase the motivation for considering software quality is the use of gamification. Initial research works already investigated the effects of gamification on software developers and come to promising. Nevertheless, a lack of results from field experiments exists, which motivates the chapter at hand. By conducting a gamification experiment with five student software projects and by interviewing the project members, the chapter provides insights into the changing programming behavior of information systems students when confronted with a leaderboard. The results reveal a motivational effect as well as a reduction of code smells. KW - Leaderboard KW - Gamification KW - Software testing KW - Software development Y1 - 2023 SN - 978-3-031-33337-8 (Print) SN - 978-3-031-33338-5 (Online) U6 - http://dx.doi.org/10.1007/978-3-031-33338-5_11 SP - 243 EP - 263 PB - Springer CY - Cham ER - TY - CHAP A1 - Zähl, Philipp M. A1 - Theis, Sabine A1 - Wolf, Martin A1 - Köhler, Klemens ED - Chen, Jessie Y. C. ED - Fragomeni, Gino T1 - Teamwork in software development and what personality has to do with it - an overview T2 - Virtual, Augmented and Mixed Reality N2 - Due to the increasing complexity of software projects, software development is becoming more and more dependent on teams. The quality of this teamwork can vary depending on the team composition, as teams are always a combination of different skills and personality types. This paper aims to answer the question of how to describe a software development team and what influence the personality of the team members has on the team dynamics. For this purpose, a systematic literature review (n=48) and a literature search with the AI research assistant Elicit (n=20) were conducted. Result: A person’s personality significantly shapes his or her thinking and actions, which in turn influences his or her behavior in software development teams. It has been shown that team performance and satisfaction can be strongly influenced by personality. The quality of communication and the likelihood of conflict can also be attributed to personality. KW - Teamwork KW - Software KW - Personality KW - Performance KW - Elicit Y1 - 2023 SN - 978-3-031-35633-9 (Print) SN - 978-3-031-35634-6 (Online) U6 - http://dx.doi.org/10.1007/978-3-031-35634-6_10 N1 - Virtual, Augmented and Mixed Reality: 15th International Conference. VAMR 2023. Held as Part of the 25th HCI International Conference. HCII 2023. Copenhagen, Denmark. July 23–28, 2023. SP - 130 EP - 153 PB - Springer CY - Cham ER - TY - CHAP A1 - Viehmann, Tarik A1 - Limpert, Nicolas A1 - Hofmann, Till A1 - Henning, Mike A1 - Ferrein, Alexander A1 - Lakemeyer, Gerhard ED - Eguchi, Amy ED - Lau, Nuno ED - Paetzel-Prüsmann, Maike ED - Wanichanon, Thanapat T1 - Winning the RoboCup logistics league with visual servoing and centralized goal reasoning T2 - RoboCup 2022 N2 - The RoboCup Logistics League (RCLL) is a robotics competition in a production logistics scenario in the context of a Smart Factory. In the competition, a team of three robots needs to assemble products to fulfill various orders that are requested online during the game. This year, the Carologistics team was able to win the competition with a new approach to multi-agent coordination as well as significant changes to the robot’s perception unit and a pragmatic network setup using the cellular network instead of WiFi. In this paper, we describe the major components of our approach with a focus on the changes compared to the last physical competition in 2019. Y1 - 2023 SN - 978-3-031-28468-7 (Print) SN - 978-3-031-28469-4 (Online) U6 - http://dx.doi.org/https://doi.org/10.1007/978-3-031-28469-4_25 N1 - Robot World Cup, RoboCup 2022. 17. July 2023. Bangkok, Thailand. Part of the Lecture Notes in Computer Science book series (LNAI,volume 13561) SP - 300 EP - 312 PB - Springer CY - Cham ER - TY - CHAP A1 - Neugebauer, Georg A1 - Brutschy, Lucas A1 - Meyer, Ulrike A1 - Wetzel, Susanne ED - Garcia-Alfaro, Joaquin ED - Lioudakis, Georgios ED - Cuppens-Boulahia, Nora ED - Foley, Simon ED - Fitzgerald, William M. T1 - Privacy-preserving multi-party reconciliation secure in the malicious model T2 - DPM 2013, SETOP 2013: Data Privacy Management and Autonomous Spontaneous Security N2 - The problem of fair and privacy-preserving ordered set reconciliation arises in a variety of applications like auctions, e-voting, and appointment reconciliation. While several multi-party protocols have been proposed that solve this problem in the semi-honest model, there are no multi-party protocols that are secure in the malicious model so far. In this paper, we close this gap. Our newly proposed protocols are shown to be secure in the malicious model based on a variety of novel non-interactive zero-knowledge-proofs. We describe the implementation of our protocols and evaluate their performance in comparison to protocols solving the problem in the semi-honest case. KW - Privacy-enhancing technologies KW - Secure multi-party computation KW - Cryptographic protocols KW - Zero-knowledge proofs KW - Malicious model Y1 - 2014 SN - 978-3-642-54567-2 (Print) SN - 978-3-642-54568-9 (Online) U6 - http://dx.doi.org/10.1007/978-3-642-54568-9_12 N1 - 8th International Workshop, DPM 2013, and 6th International Workshop, SETOP 2013, Egham, UK, September 12-13, 2013. Part of the Lecture Notes in Computer Science book series (LNSC,volume 8247) SP - 178 EP - 193 PB - Springer CY - Berlin ER - TY - CHAP A1 - Schulte-Tigges, Joschua A1 - Matheis, Dominik A1 - Reke, Michael A1 - Walter, Thomas A1 - Kaszner, Daniel ED - Krömker, Heidi T1 - Demonstrating a V2X enabled system for transition of control and minimum risk manoeuvre when leaving the operational design domain T2 - HCII 2023: HCI in Mobility, Transport, and Automotive Systems N2 - Modern implementations of driver assistance systems are evolving from a pure driver assistance to a independently acting automation system. Still these systems are not covering the full vehicle usage range, also called operational design domain, which require the human driver as fall-back mechanism. Transition of control and potential minimum risk manoeuvres are currently research topics and will bridge the gap until full autonomous vehicles are available. The authors showed in a demonstration that the transition of control mechanisms can be further improved by usage of communication technology. Receiving the incident type and position information by usage of standardised vehicle to everything (V2X) messages can improve the driver safety and comfort level. The connected and automated vehicle’s software framework can take this information to plan areas where the driver should take back control by initiating a transition of control which can be followed by a minimum risk manoeuvre in case of an unresponsive driver. This transition of control has been implemented in a test vehicle and was presented to the public during the IEEE IV2022 (IEEE Intelligent Vehicle Symposium) in Aachen, Germany. KW - V2X KW - Transiton of Control KW - Minimum Risk Manoeuvre KW - Operational Design Domain KW - Connected Automated Vehicle Y1 - 2023 SN - 978-3-031-35677-3 (Print) SN - 978-3-031-35678-0 (Online) U6 - http://dx.doi.org/10.1007/978-3-031-35678-0_12 N1 - 5th International Conference, MobiTAS 2023, Held as Part of the 25th HCI International Conference, HCII 2023, Copenhagen, Denmark, July 23–28, 2023. SP - 200 EP - 210 PB - Springer CY - Cham ER -