Refine
Year of publication
Document Type
- Article (625)
- Conference Proceeding (296)
- Book (113)
- Part of a Book (61)
- Patent (15)
- Report (9)
- Other (8)
- Contribution to a Periodical (6)
- Course Material (6)
- Doctoral Thesis (6)
- Bachelor Thesis (1)
- Video (1)
- Poster (1)
- Review (1)
- Talk (1)
Language
- English (693)
- German (456)
- Multiple languages (1)
Keywords
- Multimediamarkt (7)
- Enterprise Architecture (5)
- MINLP (5)
- Engineering optimization (4)
- Gamification (4)
- Serious Game (4)
- Auslenkung (3)
- Digitale Transformation (3)
- Digitalisierung (3)
- Education (3)
- Javasimulation (3)
- Literaturanalyse (3)
- Optimization (3)
- Powertrain (3)
- Referenzmodellierung (3)
- Robotic Process Automation (3)
- Technical Operations Research (3)
- Telecommunication (3)
- Amplitude (2)
- Autonomous mobile robots (2)
- Competence Developing Games (2)
- Content Management (2)
- Energy efficiency (2)
- Experimental validation (2)
- Feder (2)
- Forschungsprozess (2)
- Hot S-parameter (2)
- Industry 4.0 (2)
- Machine Learning (2)
- Mathematik (2)
- Multi-robot systems (2)
- Optimal Topology (2)
- Process engineering (2)
- Prozessautomatisierung (2)
- Pump System (2)
- Simulation (2)
- Smart Building (2)
- Smart factory (2)
- TM Forum (2)
- Text Analytics (2)
- Ventilation System (2)
- Virtuelle Realität (2)
- Water (2)
- Water distribution system (2)
- autonomous driving (2)
- eTOM (2)
- enhanced Telecom Operations Map (eTOM) (2)
- mathematical optimization (2)
- robotic process automation (2)
- 3-D printing (1)
- 3D object detection (1)
- Advanced driver assistance systems (ADAS/AD) (1)
- Agile development (1)
- Agility (1)
- Android (1)
- Angle Sensor (1)
- Anomalieerkennung (1)
- Anomaly detection (1)
- Antennen (1)
- Anwendungsorientierter Forschungsansatz (1)
- Arbeit 4.0 (1)
- Artificial Intelligence (1)
- Automated driving (1)
- Automation (1)
- Automotive application (1)
- Awareness (1)
- BEV (1)
- BIM (1)
- Benchmark (1)
- Besetzungsinversion (1)
- Bewertungsframework (1)
- Bloom’s Taxonomy (1)
- Booster Stations (1)
- Buffering Capacity (1)
- Building Automation (1)
- Business Engineering (1)
- Business Process (1)
- Bändermodell (1)
- CAV (1)
- CCD-Bildwandler (1)
- CDG (1)
- CMS (1)
- CO2 (1)
- Calcium oxides (1)
- Carbon Dioxide (1)
- Case Study (1)
- Case study (1)
- Chance Constraint (1)
- Change culture (1)
- Chaostheorie (1)
- Charging stations (1)
- Chatbots (1)
- Circuit simulation (1)
- Competence Developing Gam (1)
- Competence Developing Game (1)
- Computational modeling (1)
- Connected Automated Vehicle (1)
- Conpot (1)
- Control (1)
- Controller Parameter (1)
- Cooling system (1)
- Cryptographic protocols (1)
- Customer Experience Management (1)
- Customer Journeys (1)
- Customer Orientation (1)
- Cyber-physical systems (1)
- Cybersecurity (1)
- Cybersicherheit (1)
- Datasets (1)
- Deep learning (1)
- Design Science Research (1)
- DiggiTwin (1)
- Digital Age (1)
- Digital Game Based Learning (1)
- Digital Twin Evolution (1)
- Digital transformation (1)
- Digital triage (1)
- Digital twin (1)
- Digitale Lehre (1)
- Discrete Optimisation (1)
- Dreidimensionale Bildverarbeitung (1)
- Drinking Water Supply (1)
- E-Learning (1)
- E-carsharing (1)
- E-mobility (1)
- EBSCO Discovery Service (1)
- Efficiency (1)
- Efficiency optimization (1)
- Electrocardiography (1)
- Electron-phonon coupling (1)
- Elektrische Leitung (1)
- Elektronengas (1)
- Elektrotechnik (1)
- Elicit (1)
- Energy (1)
- Energy Disaggregation (1)
- Engineering Application (1)
- Engineering optimisation (1)
- Enhanced Telecom Operations Map (1)
- Enterprise architecture (1)
- Enterprise transformation (1)
- FPGA (1)
- Feldsimulation (1)
- Festkörper (1)
- Forschung (1)
- Forschungsinformationssystem (1)
- Frequency Doubler (1)
- Fully connected car (1)
- Furnace (1)
- Fusion (1)
- Future Skills (1)
- GPU (1)
- Game-based learning (1)
- Gearbox (1)
- Geschäftsmodelle (1)
- Geschäftsprozessmanagement (1)
- Gleichspannungswandler (1)
- Global optimization (1)
- Graduiertentagung (1)
- Graph Theory (1)
- HDTV (1)
- Harmonic Radar (1)
- He-Ne Laser (1)
- He-Ne Schema (1)
- Helium-Neon-Laser (1)
- Heuristic algorithms (1)
- High Definition Media Services (1)
- High Quality Streaming (1)
- Hochfrequenztechnik (1)
- Home Assistant (1)
- Home Automation Platform (1)
- IBM Watson Explorer (1)
- ICS (1)
- IP-based networks (1)
- ISO 26262 (1)
- IT security education (1)
- IT-Marketing (1)
- IT-Sicherheit (1)
- Image Database (1)
- Image Forensics (1)
- Implementation Case (1)
- Impulstechnik (1)
- Incremental Encoder (1)
- IndraMotion (1)
- Inductive charging (1)
- Industrial optimisation (1)
- Information and communication technology (1)
- Informationsgetriebene Geschäftsmodelle (1)
- Informationssicherheit (1)
- Informationssicherheitsmanagement (1)
- Integrated mobility (1)
- Intelligentes Parken (1)
- Interactive process mining (1)
- Interdisciplinarity (1)
- Internet der Dinge (1)
- IoT (1)
- Keyword analysis (1)
- Klassifikator <Informatik> (1)
- Kommerzielle Interaktionen (1)
- LQR (1)
- Latin Hypercube Sampling (1)
- Leaderboard (1)
- Lean thinking (1)
- Level Control System (1)
- LiDAR (1)
- Lichtabsorption (1)
- Lichtbetrachtung (1)
- Lichtemission (1)
- Lichtquelle (1)
- Lidar (1)
- Literatur-analyse-prozess (1)
- Literaturdaten (1)
- Literature review (1)
- Literaturrecherche (1)
- MATLAB , MLPI , Motion control , Open Core , industrial drives , rapid control prototypin , sercos automation bus (1)
- MILP (1)
- MPC (1)
- MPEG 4 (1)
- MPEG 7 (1)
- MPEG-Standard (1)
- Machine learning (1)
- Malicious model (1)
- Management (1)
- Map (eTOM) Process reference model Process design Telecommunications industry (1)
- McLuhan, Marshall (1)
- Methodology (1)
- Minimum Risk Manoeuvre (1)
- Mixed Integer Programming (1)
- Mixed-Integer Nonlinear Optimisation (1)
- Mixed-integer nonlinear black-box optimization (1)
- Mixed-integer nonlinear problem (1)
- Mixed-integer nonlinear programming (1)
- Mixed-integer programming (1)
- Mobile Phones (1)
- Mobility management (1)
- Mode converter (1)
- Modeling (1)
- Monetarisierung (1)
- Motion-Logic System (1)
- Mpc (1)
- Multi-criteria optimization (1)
- Multimedia-Dienst (1)
- NGN (1)
- Navigation (1)
- Network (1)
- Network design (1)
- Neural networks (1)
- Next Generation Network (1)
- OR 2019 (1)
- Objective data (1)
- Objekterkennung (1)
- Open Source (1)
- Operational Design Domain (1)
- Optimal Closed Loop (1)
- PPO (1)
- Paper recycling (1)
- Path-following (1)
- Pendel (1)
- Performance (1)
- Personality (1)
- Phonons (1)
- Piecewise Linearization (1)
- Piecewise linearization (1)
- Plasma (1)
- Plasma diagnostics (1)
- Plasmatechnik (1)
- Player Types (1)
- Position Encoder (1)
- Praxisprojekte (1)
- Preface (1)
- Privacy-enhancing technologies (1)
- Process design (1)
- Process optimization (1)
- Process reference model (1)
- Process virtualization (1)
- Product bundling (1)
- Product family optimization (1)
- Projektbeispiele (1)
- Prototype (1)
- Prozessabläufe (1)
- Prozessagilität (1)
- Prozessmodellierung (1)
- Prozessstandardisierung (1)
- Pulselektroniklabor (1)
- Pumping systems (1)
- Qualitative Wertschöpfungsanalyse (1)
- Quality control (1)
- Quantum Computing (1)
- Quantum Machine Learning (1)
- Radar (1)
- Reference Process Model (1)
- Reference modelling (1)
- Referenzmodelle (1)
- Reinforcement Learning (1)
- Relaxation (1)
- Rescue System (1)
- Research process (1)
- Resilience (1)
- Resilience Assessment (1)
- Resilience assessment (1)
- Resilience metric graph theory (1)
- Resilient infrastructure (1)
- Resonator (1)
- RoboCup (1)
- Robotic process automation (1)
- Rotary encoder (1)
- Rotational Encoder (1)
- Rotatory Inverted Pendulum (1)
- SPS (1)
- Safety of the intended functionality (SOTIF) (1)
- Safety-critical systems validation (1)
- Secure multi-party computation (1)
- Self-driving (1)
- Sensors comparison (1)
- Serious Games (1)
- Serviceintegration (1)
- Services (1)
- Signalquelle (1)
- Similarity Theory (1)
- Society (1)
- Software (1)
- Software Robots (1)
- Software development (1)
- Software testing (1)
- Softwareroboter (1)
- Solver Per- formance (1)
- Speicherprogrammierte Steuerung (1)
- Stochastic Programming (1)
- Story (1)
- Stress testing (1)
- Subject-oriented Business Process Management (1)
- Supraleitung (1)
- Sustainability (1)
- System Design (1)
- System Design Problem (1)
- TGA (1)
- Tag (1)
- Teamwork (1)
- Technical Operation Research (1)
- Telecommunication Industry (1)
- Telecommunications Industry. (1)
- Text Analytics (1)
- Text Mining (1)
- Text analytics (1)
- Text mining (1)
- Three-dimensional displays (1)
- Time-series synchronization (1)
- Transdisciplinarity (1)
- Transformation (1)
- Transformation Project (1)
- Transformative Competencies (1)
- Transiton of Control (1)
- Transponder (1)
- Triage-app (1)
- Uncertainty (1)
- Unternehmensarchitektur (1)
- Unternehmensarchitekturen (1)
- Unternehmensarchitekturen Internet der Dinge (1)
- Unternehmensstrukturen (1)
- Unternehmenstransformation (1)
- Urban areas (1)
- V2X (1)
- Validation (1)
- Video Game (1)
- Vorverarbeitung (1)
- WLTP (1)
- Water Distribution (1)
- Water Supply Networks (1)
- Water Supply System (1)
- Water supply system (1)
- Wearable electronic device (1)
- Wertschöpfungskettenanalyse (1)
- Wiegand Effect (1)
- Wiegand sensor (1)
- Wissenstransfer (1)
- Wärmeübertragung (1)
- Zero-knowledge proofs (1)
- active learning (1)
- agile (1)
- anticipation strategy (1)
- applications (1)
- artificial intelligence (1)
- automated vehicles (1)
- availability (1)
- batteries and fuel cells (1)
- body imaging at 7 T MRI (1)
- business analytics (1)
- business process automation (1)
- business simulation (1)
- commercial offthe- shelf solutions (1)
- competence developing games (1)
- connected automated vehicles (1)
- culpability (1)
- cybersecurity (1)
- decision analytics (1)
- design of technical systems (1)
- digital economy (1)
- do-it-yourself (1)
- education (1)
- electrospinning (1)
- embedded hardware (1)
- energy efficiency (1)
- energy transfer (1)
- experimental evaluation (1)
- fault detection (1)
- fibers (1)
- genetic algorithm (1)
- global optimization (1)
- harmonic radar (1)
- harmonic radar tags (1)
- heating system (1)
- honeynet (1)
- honeypot (1)
- ignition (1)
- information systems (1)
- irradiation (1)
- lab work (1)
- learning theories (1)
- legal obligations (1)
- liability (1)
- management (1)
- metrological characterization (1)
- microplasma (1)
- microwave (MW) plasma (1)
- microwave measurements (1)
- mixed-integer linear programming (1)
- model-predictive control (1)
- motivation theories (1)
- next generation network (1)
- nonlinear VNA measurements (1)
- optimization (1)
- passive inter-modulation (1)
- plasma jet (1)
- porous materials (1)
- power integrity (1)
- product bundling (1)
- product liability (1)
- professional skills (1)
- programming (1)
- remote sensing (1)
- requirements (1)
- research framework (1)
- resilience (1)
- sensor networks (1)
- signal integrity (1)
- slum classification (1)
- software engineering (1)
- software evaluation (1)
- software selection (1)
- stochastic optimization (1)
- sustainability (1)
- system optimization (1)
- system synthesis (1)
- systematic literature review (1)
- tablet game (1)
- technical operations research (1)
- technology (1)
- telecommunication (1)
- thermal dose (1)
- tissue temperature (1)
- transmit antenna arrays (1)
- water supply design (1)
- water supply system (1)
- Überwachung & Optimierung (1)
Institute
- Fachbereich Elektrotechnik und Informationstechnik (1150) (remove)
To train end users how to interact with digital systems is indispensable to ensure a strong computer security. 'Competence Developing Game'-based approaches are particularly suitable for this purpose because of their motivation-and simulation-aspects. In this paper the Competence Developing Game 'GHOST' for cybersecurity awareness trainings and its underlying patterns are described. Accordingly, requirements for an 'Competence Developing Game' based training are discussed. Based on these requirements it is shown how a game can fulfill these requirements. A supplementary game interaction design and a corresponding evaluation study is shown. The combination of training requirements and interaction design is used to create a 'Competence Developing Game'-based training concept. A part of these concept is implemented into a playable prototype that serves around one hour of play respectively training time. This prototype is used to perform an evaluation of the game and training aspects of the awareness training. Thereby, the quality of the game aspect and the effectiveness of the training aspect are shown.
This paper introduces a Competence Developing Game (CDG) for the purpose of a cybersecurity awareness training for businesses. The target audience will be discussed in detail to understand their requirements. It will be explained why and how a mix of business simulation and serious game meets these stakeholder requirements. It will be shown that a tablet and touchscreen based approach is the most suitable solution. In addition, an empirical study will be briefly presented. The study was carried out to examine how an interaction system for a 3D-tablet based CDG has to be designed, to be manageable for non-game experienced employees. Furthermore, it will be explained which serious content is necessary for a Cybersecurity awareness training CDG and how this content is wrapped in the game
During the development of a Competence Developing Game’s (CDG) story it is indispensable to understand the target audience. Thereby, CDGs stories represent more than just the plot. The Story is about the
Setting, the Characters and the Plot. As a toolkit to support the
development of such a story, this paper introduces the UserFocused Storybuilding (short UFoS) Framework for CDGs. The Framework and its utilization will be explained, followed by a description of its development and derivation, including an empirical study. In addition, to simplify the Framework use regarding the CDG’s target audience, a new concept of Nine Psychographic Player Types will be explained. This concept of Player Types provides an approach to handle the differences in between players during the UFoS Framework use. Thereby,
this article presents a unique approach to the development of
target group-differentiated CDGs stories.
In diesem Paper wird die Entwicklung und Evaluation eines grafischen Regeleditors für das Erstellen von „Smart Living Environments“-Services vorgestellt. Dafür werden zunächst die Deduktion und Implementierung des grafischen Regeleditors erläutert. Anschließend wird eine Probandenstudie vorgestellt, in welcher der Mehrwert bezogen auf die Aspekte Zeit, Fehleranfälligkeit und Gebrauchstauglichkeit festgestellt wird.
Die NATO definiert den Cyberspace als die "Umgebung, die durch physische und nicht-physische Bestandteile zum Speichern, Ändern, und Austauschen von Daten mit Hilfe von Computer-Netzwerken" [NATO CCDCOE]. Darüber hinaus ist es ein Medium menschlicher Interaktion. IT Angriffe sind feindselige, nichtkooperative Interaktionen, die mittels Konflikttheorie beschrieben werden können. Durch die Anwendung dieses Gedankengebäudes auf IT Sicherheit von Organisationen können eine Reihe von Verbesserungen in Unternehmen identifiziert werden.
Through a mirror darkly – On the obscurity of teaching goals in game-based learning in IT security
(2021)
Teachers and instructors use very specific language communicating teaching goals. The most widely used frameworks of common reference are the Bloom’s Taxonomy and the Revised Bloom’s Taxonomy. The latter provides distinction of 209 different teaching goals which are connected to methods. In Competence Developing Games (CDGs - serious games to convey knowledge) and in IT security education, a two- or three level typology exists, reducing possible learning outcomes to awareness, training, and education. This study explores whether this much simpler framework succeeds in achieving the same range of learning outcomes. Method wise a keyword analysis was conducted. The results were threefold: 1. The words used to describe teaching goals in CDGs on IT security education do not reflect the whole range of learning outcomes. 2. The word choice is nevertheless different from common language, indicating an intentional use of language. 3. IT security CDGs use different sets of terms to describe learning outcomes, depending on whether they are awareness, training, or education games. The interpretation of the findings is that the reduction to just three types of CDGs reduces the capacity to communicate and think about learning outcomes and consequently reduces the outcomes that are intentionally achieved.
Cyberspace is "the environment formed by physical and non-physical components to store, modify, and exchange data using computer networks" (NATO CCDCOE). Beyond that, it is an environment where people interact. IT attacks are hostile, non-cooperative interactions that can be described with conflict theory. Applying conflict theory to IT security leads to different objectives for end-user education, requiring different formats like agency-based competence developing games.