Refine
Year of publication
- 2024 (22)
- 2023 (77)
- 2022 (122)
- 2021 (127)
- 2020 (154)
- 2019 (191)
- 2018 (165)
- 2017 (153)
- 2016 (150)
- 2015 (162)
- 2014 (159)
- 2013 (168)
- 2012 (152)
- 2011 (178)
- 2010 (173)
- 2009 (175)
- 2008 (148)
- 2007 (137)
- 2006 (129)
- 2005 (122)
- 2004 (150)
- 2003 (95)
- 2002 (123)
- 2001 (103)
- 2000 (102)
- 1999 (109)
- 1998 (98)
- 1997 (96)
- 1996 (81)
- 1995 (78)
- 1994 (86)
- 1993 (59)
- 1992 (54)
- 1991 (29)
- 1990 (39)
- 1989 (44)
- 1988 (56)
- 1987 (32)
- 1986 (19)
- 1985 (33)
- 1984 (22)
- 1983 (20)
- 1982 (29)
- 1981 (20)
- 1980 (36)
- 1979 (24)
- 1978 (34)
- 1977 (14)
- 1976 (13)
- 1975 (12)
- 1974 (3)
- 1973 (2)
- 1972 (2)
- 1971 (1)
- 1968 (1)
Document Type
- Article (3149)
- Conference Proceeding (1016)
- Part of a Book (184)
- Book (144)
- Doctoral Thesis (30)
- Patent (25)
- Other (9)
- Report (9)
- Preprint (4)
- Poster (3)
- Talk (3)
- Master's Thesis (2)
- Working Paper (2)
- Bachelor Thesis (1)
- Contribution to a Periodical (1)
- Habilitation (1)
Language
- English (4583) (remove)
Has Fulltext
- no (4583) (remove)
Keywords
- Gamification (6)
- avalanche (6)
- Earthquake (5)
- Enterprise Architecture (5)
- MINLP (5)
- solar sail (5)
- Diversity Management (4)
- Energy storage (4)
- Engineering optimization (4)
- LAPS (4)
- Natural language processing (4)
- Papierkunst (4)
- Power plants (4)
- Seismic design (4)
- field-effect sensor (4)
- frequency mixing magnetic detection (4)
- hydrogen (4)
- metal structure (4)
- snow (4)
- steel (4)
Institute
- Fachbereich Medizintechnik und Technomathematik (1545)
- Fachbereich Elektrotechnik und Informationstechnik (686)
- IfB - Institut für Bioengineering (560)
- Fachbereich Energietechnik (552)
- INB - Institut für Nano- und Biotechnologien (532)
- Fachbereich Chemie und Biotechnologie (522)
- Fachbereich Luft- und Raumfahrttechnik (463)
- Fachbereich Maschinenbau und Mechatronik (261)
- Fachbereich Wirtschaftswissenschaften (196)
- Solar-Institut Jülich (160)
- Fachbereich Bauingenieurwesen (146)
- ECSM European Center for Sustainable Mobility (75)
- MASKOR Institut für Mobile Autonome Systeme und Kognitive Robotik (62)
- Fachbereich Gestaltung (24)
- Nowum-Energy (24)
- Institut fuer Angewandte Polymerchemie (23)
- Sonstiges (21)
- Fachbereich Architektur (20)
- Freshman Institute (18)
- Kommission für Forschung und Entwicklung (18)
Through a mirror darkly – On the obscurity of teaching goals in game-based learning in IT security
(2021)
Teachers and instructors use very specific language communicating teaching goals. The most widely used frameworks of common reference are the Bloom’s Taxonomy and the Revised Bloom’s Taxonomy. The latter provides distinction of 209 different teaching goals which are connected to methods. In Competence Developing Games (CDGs - serious games to convey knowledge) and in IT security education, a two- or three level typology exists, reducing possible learning outcomes to awareness, training, and education. This study explores whether this much simpler framework succeeds in achieving the same range of learning outcomes. Method wise a keyword analysis was conducted. The results were threefold: 1. The words used to describe teaching goals in CDGs on IT security education do not reflect the whole range of learning outcomes. 2. The word choice is nevertheless different from common language, indicating an intentional use of language. 3. IT security CDGs use different sets of terms to describe learning outcomes, depending on whether they are awareness, training, or education games. The interpretation of the findings is that the reduction to just three types of CDGs reduces the capacity to communicate and think about learning outcomes and consequently reduces the outcomes that are intentionally achieved.
Cyberspace is "the environment formed by physical and non-physical components to store, modify, and exchange data using computer networks" (NATO CCDCOE). Beyond that, it is an environment where people interact. IT attacks are hostile, non-cooperative interactions that can be described with conflict theory. Applying conflict theory to IT security leads to different objectives for end-user education, requiring different formats like agency-based competence developing games.