TY - CHAP A1 - Wolf, Martin A1 - König, Johannes Alexander ED - Eibl, Maximilian ED - Gaedke, Martin T1 - Competence Developing Games – Ein Überblick T2 - INFORMATIK 2017, Lecture Notes in Informatics (LNI), Gesellschaft für Informatik N2 - Es existieren verschiedenste Arten von Spielen, die versuchen, die Motivation einer Spielsituation in einen ernsten Kontext zu überführen. In diesem Artikel wird der Überbegriff „Competence Developing Games“ definiert und anhand von Beispielen erläutert. Dafür werden Erkennungskriterien vorgestellt, entsprechende Spieltypen erläutert und eine Zuordnung durch-geführt. KW - Competence Developing Gam KW - Serious Game KW - Education KW - Gamification KW - Bewertungsframework Y1 - 2017 SN - 978-3-88579-669-5 U6 - http://dx.doi.org/10.18420/in2017_32 SP - 385 EP - 391 ER - TY - CHAP A1 - König, Johannes Alexander A1 - Völker, Veronika A1 - Wolf, Martin T1 - The user-focused storybuilding framework for competence developing games - a design-framework considering the basics of an educational game’s story T2 - ACHI 2018 : The Eleventh International Conference on Advances in Computer-Human Interactions N2 - During the development of a Competence Developing Game’s (CDG) story it is indispensable to understand the target audience. Thereby, CDGs stories represent more than just the plot. The Story is about the Setting, the Characters and the Plot. As a toolkit to support the development of such a story, this paper introduces the UserFocused Storybuilding (short UFoS) Framework for CDGs. The Framework and its utilization will be explained, followed by a description of its development and derivation, including an empirical study. In addition, to simplify the Framework use regarding the CDG’s target audience, a new concept of Nine Psychographic Player Types will be explained. This concept of Player Types provides an approach to handle the differences in between players during the UFoS Framework use. Thereby, this article presents a unique approach to the development of target group-differentiated CDGs stories. KW - Competence Developing Game KW - Serious Game KW - Video Game KW - Story KW - Player Types Y1 - 2018 SN - 978-1-61208-616-3 N1 - Proceeding of the Eleventh International Conference on Advances in Computer-Human Interactions (ACHI 2018), Rome, Italy. SP - 98 EP - 106 ER - TY - CHAP A1 - Dowidat, Linda A1 - König, Johannes Alexander A1 - Wolf, Martin T1 - The motivational competence developing game framework T2 - Mensch und Computer 2017 - Tagungsband N2 - Competence Developing Games (CDGs) are a new concept of how to think about games with serious intentions. In order to emphasize on this topic, a new framework has been developed. It basically relies on learning and motivation theories. This ‘motivational Competence Developing Game Framework’ demonstrates how it is possible to use these theories in a CDG development process. The theoretical derivation and use of the framework is explained in this paper. KW - Competence Developing Games KW - Serious Games KW - Gamification KW - motivation theories KW - learning theories Y1 - 2017 U6 - http://dx.doi.org/10.18420/muc2017-mci-0130 SP - 15 EP - 26 PB - Gesellschaft für Informatik e.V. CY - Regensburg ER - TY - CHAP A1 - König, Johannes Alexander A1 - Wolf, Martin T1 - Cybersecurity awareness training provided by the competence developing game GHOST T2 - ACHI 2018 : The Eleventh International Conference on Advances in Computer-Human Interactions N2 - This paper introduces a Competence Developing Game (CDG) for the purpose of a cybersecurity awareness training for businesses. The target audience will be discussed in detail to understand their requirements. It will be explained why and how a mix of business simulation and serious game meets these stakeholder requirements. It will be shown that a tablet and touchscreen based approach is the most suitable solution. In addition, an empirical study will be briefly presented. The study was carried out to examine how an interaction system for a 3D-tablet based CDG has to be designed, to be manageable for non-game experienced employees. Furthermore, it will be explained which serious content is necessary for a Cybersecurity awareness training CDG and how this content is wrapped in the game KW - Awareness KW - CDG KW - Serious Game KW - tablet game KW - business simulation Y1 - 2018 SN - 978-1-61208-616-3 N1 - Proceeding of the Eleventh International Conference on Advances in Computer-Human Interactions (ACHI 2018), Rome, Italy. SP - 81 EP - 87 ER - TY - CHAP A1 - Maike, Müller A1 - Lenz, Laura A1 - Wolf, Martin T1 - Steigerung der Effektivität durch Prozessmodellierungs-Tools - Änderbarkeit und Transparenz von Prozessen am Beispiel der Business Simulation Apollo 13 T2 - Informatik 2014 N2 - Die Nutzung von Prozessmodellierungsmethoden oder - werkzeugen kann erheblichen Einfluss auf die Effektivität von Prozessen haben. Das gilt insbesondere für Situationen, in denen Personen unter Stress stehen oder ungeübt sind. In diesen Fällen geben Prozessmodelle konkrete Empfehlungen, nach denen sich die handelnden Personen richten könnten. In Experimenten mit der Business-Simulation Apollo 13 haben wir den Effekt eines Einsatzes von Prozessmodellierungsmethoden und -werkzeugen untersucht. Bereits bekannte Theorien (z.B. über geeignete Verhältnisse von Kommunikationsinhalten) konnten bestätigt werden. Darüber hinaus haben wir eine besondere Bedeutung der Übertragbarkeit von Prozessmodellen in konkrete Handlungen identifiziert. Y1 - 2014 SN - 978-3-88579-626-8 SN - 1617-5468 SP - 357 EP - 369 PB - Gesellschaft für Informatik e.V. CY - Bonn ER - TY - JOUR A1 - Heuermann, Holger A1 - Emmrich, Thomas A1 - Bongartz, Simon T1 - Microwave spark plug to support ignitions with high compression ratios JF - IEEE Transactions on Plasma Science N2 - Upcoming gasoline engines should run with a larger number of fuels beginning from petrol over methanol up to gas by a wide range of compression ratios and a homogeneous charge. In this article, the microwave (MW) spark plug, based on a high-speed frequency hopping system, is introduced as a solution, which can support a nitrogen compression ratio up to 1:39 in a chamber and more. First, an overview of the high-speed frequency hopping MW ignition and operation system as well as the large number of applications are presented. Both gives an understanding of this new base technology for MW plasma generation. Focus of the theoretical part is the explanation of the internal construction of the spark plug, on the achievable of the high voltage generation as well as the high efficiency to hold the plasma. In detail, the development process starting with circuit simulations and ending with the numerical multiphysics field simulations is described. The concept is evaluated with a reference prototype covering the frequency range between 2.40 and 2.48 GHz and working over a large power range from 20 to 200 W. A larger number of different measurements starting by vector hot-S11 measurements and ending by combined working scenarios out of hot temperature, high pressure and charge motion are winding up the article. The limits for the successful pressure tests were given by the pressure chamber. Pressures ranged from 1 to 39 bar and charge motion up to 25 m/s as well as temperatures from 30◦ to 125◦. KW - Automotive application KW - ignition KW - microplasma KW - microwave (MW) plasma KW - plasma jet Y1 - 2022 U6 - http://dx.doi.org/10.1109/TPS.2022.3183690 SN - 1939-9375 IS - Early Access SP - 1 EP - 6 PB - IEEE ER - TY - CHAP A1 - Ostkotte, Sebastian A1 - Peters, Constantin A1 - Hüning, Felix A1 - Bragard, Michael T1 - Design, implementation and verification of an rotational incremental position encoder based on the magnetic Wiegand effect T2 - 2022 ELEKTRO (ELEKTRO) N2 - This paper covers the use of the magnetic Wiegand effect to design an innovative incremental encoder. First, a theoretical design is given, followed by an estimation of the achievable accuracy and an optimization in open-loop operation. Finally, a successful experimental verification is presented. For this purpose, a permanent magnet synchronous machine is controlled in a field-oriented manner, using the angle information of the prototype. KW - Position Encoder KW - Rotational Encoder KW - Wiegand Effect KW - Angle Sensor KW - Incremental Encoder Y1 - 2022 SN - 978-1-6654-6726-1 SN - 978-1-6654-6727-8 U6 - http://dx.doi.org/10.1109/ELEKTRO53996.2022.9803477 SN - 2691-0616 N1 - 2022 ELEKTRO (ELEKTRO), 23-26 Mai 2022, Krakow, Poland. PB - IEEE ER - TY - CHAP A1 - Schuba, Marko A1 - Höfken, Hans-Wilhelm T1 - Cybersicherheit in Produktion, Automotive und intelligenten Gebäuden T2 - IT-Sicherheit - Technologien und Best Practices für die Umsetzung im Unternehmen Y1 - 2022 SN - 978-3-446-47223-5 SN - 978-3-446-47347-8 U6 - http://dx.doi.org/10.3139/9783446473478.012 SP - 193 EP - 218 PB - Carl Hanser Verlag CY - München ER - TY - CHAP A1 - Engländer, Jacques A1 - Kaminski, Lars A1 - Schuba, Marko T1 - Informationssicherheitsmanagement T2 - Digitalisierungs- und Informationsmanagement N2 - Daten und Informationen sind die wichtigsten Ressourcen vieler Unternehmen und müssen daher entsprechend geschützt werden. Getrieben durch die erhöhte Vernetzung von Informationstechnologie, die höhere Offenheit infolge datengetriebener Dienstleistungen und eine starke Zunahme an Datenquellen, rücken die Gefahren von Informationsdiebstahl, -manipulation und -verlust in den Fokus von produzierenden Unternehmen. Auf dem Weg zum lern- und wandlungsfähigen Unternehmen kann dies zu einem großen Hindernis werden, da einerseits zu hohe Sicherheitsanforderungen neue Entwicklungen beschränken, andererseits wegen des Mangels an ausreichenden Informationssicherheitskonzepten Unternehmen weniger Innovationen wagen. Deshalb bedarf es individuell angepasster Konzepte für die Bereiche IT-Security, IT-Safety und Datenschutz für vernetzte Produkte, Produktion und Arbeitsplätze. Bei der Entwicklung und Durchsetzung dieser Konzepte steht der Faktor Mensch im Zentrum aller Überlegungen. In diesem Kapitel wird dargestellt, wie der Faktor Mensch bei der Erstellung von Informationssicherheitskonzepten in verschiedenen Phasen zu beachten ist. Beginnend mit der Integration von Informationssystemen und damit verbundenen Sicherheitsmaßnahmen, über die Administration, bis hin zur Anwendung durch den Endnutzer, werden Methoden beschrieben, die den Menschen, verbunden mit seinem Mehrwert wie auch den Risiken, einschließen. Dabei werden sowohl Grundlagen aufgezeigt als auch Konzepte vorgestellt, mit denen Entscheider in der Unternehmens-IT Leitlinien für die Informationssicherheit festlegen können. KW - Informationssicherheitsmanagement KW - Cybersicherheit KW - Cybersecurity KW - Informationssicherheit KW - IT-Sicherheit Y1 - 2022 SN - 978-3-662-63757-9 SN - 978-3-662-63758-6 U6 - http://dx.doi.org/10.1007/978-3-662-63758-6_15 SP - 373 EP - 398 PB - Springer Vieweg CY - Berlin ER - TY - CHAP A1 - Schuba, Marko A1 - Höfken, Hans-Wilhelm A1 - Linzbach, Sophie T1 - An ICS Honeynet for Detecting and Analyzing Cyberattacks in Industrial Plants T2 - 2021 International Conference on Electrical, Computer and Energy Technologies (ICECET) N2 - Cybersecurity of Industrial Control Systems (ICS) is an important issue, as ICS incidents may have a direct impact on safety of people or the environment. At the same time the awareness and knowledge about cybersecurity, particularly in the context of ICS, is alarmingly low. Industrial honeypots offer a cheap and easy to implement way to raise cybersecurity awareness and to educate ICS staff about typical attack patterns. When integrated in a productive network, industrial honeypots may not only reveal attackers early but may also distract them from the actual important systems of the network. Implementing multiple honeypots as a honeynet, the systems can be used to emulate or simulate a whole Industrial Control System. This paper describes a network of honeypots emulating HTTP, SNMP, S7communication and the Modbus protocol using Conpot, IMUNES and SNAP7. The nodes mimic SIMATIC S7 programmable logic controllers (PLCs) which are widely used across the globe. The deployed honeypots' features will be compared with the features of real SIMATIC S7 PLCs. Furthermore, the honeynet has been made publicly available for ten days and occurring cyberattacks have been analyzed KW - Conpot KW - honeypot KW - honeynet KW - ICS KW - cybersecurity Y1 - 2022 SN - 978-1-6654-4231-2 SN - 978-1-6654-4232-9 U6 - http://dx.doi.org/10.1109/ICECET52533.2021.9698746 N1 - 2021 International Conference on Electrical, Computer and Energy Technologies (ICECET). 09-10 December 2021. Cape Town, South Africa. PB - IEEE ER -