How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
The risk of being impacted by a cyberattack is high, because of more professional attacks. Thereby, cyber criminals are bypassing technological countermeasures through tricking users. Recently collected data during the SARS-CoV-2 pandemic demonstrate, that cyberattacks including social engineering are among the main threats, especially for Small an...
Educational videos play an important role in university education. However, they are often not designed to foster active learning and the learning process is not immersive. Interactive digital storytelling is a promising game design element but requires a rigorous evaluation to avoid negative side effects. Therefore, we adopt a design science resea...
Gamified learning management systems (LMS) can be effective in case game-design elements (GDE) address users' motivation to engage with the topic and lower barriers to learning. In the context of Security Education, Training, and Awareness (SETA) programs, gamification is stated to be a major success factor. However, there is scarce research about...
Note: Student paper (Bachelor) ----ABSTRACT:--- The relevance of cloud computing, especially cloud storage services, was growing steadily within the last years. By getting more acceptance from customers, there are several new issues coming up, especially the question of data security. Therefore this paper analysis impacts on data security in the fu...