TY - CHAP A1 - Nees, Franz A1 - Stengel, Ingo A1 - Meister, Vera G. A1 - Barton, Thomas A1 - Herrmann, Frank A1 - Müller, Christian A1 - Wolf, Martin T1 - Angewandte Forschung in der Wirtschaftsinformatik 2020 : Tagungsband zur 33. AKWI-Jahrestagung am 14.09.2020, ausgerichtet von der Hochschule Karlsruhe - Wirtschaft und Technik / hrsg. von Franz Nees, Ingo Stengel, Vera G. Meister, Thomas Barton, Frank Herrmann, Christian Müller, Martin R. Wolf N2 - Tagungsbeiträge aus den Bereichen KI, Prozessorganisation und Plattformen für Geschäftsprozesse, Sicherheit und Datenschutz sowie Prototypen und Modelle. Y1 - 2020 U6 - http://nbn-resolving.de/urn/resolver.pl?urn:nbn:de:kobv:526-opus4-13840 SN - 978-3-944330-66-2 PB - mana-Buch CY - Heide ER - TY - CHAP A1 - Ibanez-Sanchez, Gema A1 - Wolf, Martin T1 - Interactive Process Mining-Induced Change Management Methodology for Healthcare T2 - Interactive Process Mining in Healthcare N2 - The adoption of the Digital Health Transformation is a tremendous paradigm change in health organizations, which is not a trivial process in reality. For that reason, in this chapter, it is proposed a methodology with the objective to generate a changing culture in healthcare organisations. Such a change culture is essential for the successful implementation of any supporting methods like Interactive Process Mining. It needs to incorporate (mostly) new ways of team-based and evidence-based approaches for solving structural problems in a digital healthcare environment. KW - Methodology KW - Change culture KW - Lean thinking KW - Interactive process mining KW - Objective data Y1 - 2020 SN - 978-3-030-53993-1 (Online) SN - 978-3-030-53992-4 (Print) U6 - http://dx.doi.org/10.1007/978-3-030-53993-1_16 SP - 267 EP - 293 PB - Springer CY - Cham ER - TY - JOUR A1 - Köhler, Klemens A1 - Wolf, Martin T1 - Organisatorische Maßnahmen zu Erhöhung der IT Sicherheit – Empfehlungen aus der Perspektive der Konflikttheorie N2 - Die NATO definiert den Cyberspace als die "Umgebung, die durch physische und nicht-physische Bestandteile zum Speichern, Ändern, und Austauschen von Daten mit Hilfe von Computer-Netzwerken" [NATO CCDCOE]. Darüber hinaus ist es ein Medium menschlicher Interaktion. IT Angriffe sind feindselige, nichtkooperative Interaktionen, die mittels Konflikttheorie beschrieben werden können. Durch die Anwendung dieses Gedankengebäudes auf IT Sicherheit von Organisationen können eine Reihe von Verbesserungen in Unternehmen identifiziert werden. Y1 - 2020 IS - Preprint ER - TY - JOUR A1 - Roepke, Rene A1 - Köhler, Klemens A1 - Drury, Vincent A1 - Schroeder, Ulrik A1 - Wolf, Martin A1 - Meyer, Ulrike T1 - A pond full of phishing games - analysis of learning games for anti-phishing education JF - Model-driven Simulation and Training Environments for Cybersecurity. MSTEC 2020 N2 - Game-based learning is a promising approach to anti-phishing education, as it fosters motivation and can help reduce the perceived difficulty of the educational material. Over the years, several prototypes for game-based applications have been proposed, that follow different approaches in content selection, presentation, and game mechanics. In this paper, a literature and product review of existing learning games is presented. Based on research papers and accessible applications, an in-depth analysis was conducted, encompassing target groups, educational contexts, learning goals based on Bloom’s Revised Taxonomy, and learning content. As a result of this review, we created the publications on games (POG) data set for the domain of anti-phishing education. While there are games that can convey factual and conceptual knowledge, we find that most games are either unavailable, fail to convey procedural knowledge or lack technical depth. Thus, we identify potential areas of improvement for games suitable for end-users in informal learning contexts. Y1 - 2020 SN - 978-3-030-62433-0 U6 - http://dx.doi.org/10.1007/978-3-030-62433-0_32020 N1 - Lecture Notes in Computer Science, vol 12512 SP - 41 EP - 60 PB - Springer CY - Cham ER -