127
edits
| No edit summary | |||
| Line 65: | Line 65: | ||
| '''Vortragsdauer: 15-20min''' | '''Vortragsdauer: 15-20min''' | ||
| * 7.11 Attacks based on Psychology, [http://www.cl.cam.ac.uk/~rja14/book.html Security Engineering, Chapter 2.2] | * 7.11 Attacks based on Psychology, [http://www.cl.cam.ac.uk/~rja14/book.html Security Engineering, Chapter 2.2] (Lisa Guth) | ||
| * 14.11 Personas:  About Face 3, ISBN 0470084111, (page   75-81, 97-106) | * 14.11 Personas:  About Face 3, ISBN 0470084111, (page   75-81, 97-106) | ||
| * 21.11 'Service Blueprinting, [http://knowledge.wpcarey.asu.edu/article.cfm?articleid=1546 intro], [[wikipedia:Service blueprint|Wikipedia]], [http://www.flickr.com/photos/brandonschauer/3363169836/ template]   | * 21.11 'Service Blueprinting, [http://knowledge.wpcarey.asu.edu/article.cfm?articleid=1546 intro], [[wikipedia:Service blueprint|Wikipedia]], [http://www.flickr.com/photos/brandonschauer/3363169836/ template]   | ||
edits