[HTML][HTML] A systematic review of current cybersecurity training methods

J Prümmer, T van Steen, B van den Berg - Computers & Security, 2024 - Elsevier
Cybersecurity continues to be a growing issue, with cyberattacks causing financial losses
and loss of productivity and reputation. Especially in an organisational setting, end-user …

Leveraging vr/ar/mr/xr technologies to improve cybersecurity education, training, and operations

P Wagner, D Alharthi - Journal of Cybersecurity …, 2023 - digitalcommons.kennesaw.edu
Abstract The United States faces persistent threats conducting malicious cyber campaigns
that threaten critical infrastructure, companies and their intellectual property, and the privacy …

The role of cognition in develo** successful cybersecurity training programs–passive vs. active engagement

J Prümmer - International Conference on Human-Computer …, 2024 - Springer
End-user cybersecurity, and the risks associated with it, are receiving more and more
attention, particularly in organizational settings. This increase in attention has led to a …

Analysis of Interdependency of ICCT Underlying Technologies and Related New Research Opportunities with Special Emphasis on Cyber Security and Forensic …

PS Aithal, S Aithal - Proceedings of the Conference on Future …, 2020 - papers.ssrn.com
Abstract Information Communication and Computation technology (ICCT) is a 21st-century
name of Information Communication Technology (ICT) that covers a broader definition of …

Bridging the Gap: Cyber Defence Skills for the Future

S Strukova, M Albaladejo-González… - 2024 IEEE Global …, 2024 - ieeexplore.ieee.org
As cyber threats continue to evolve, the need for highly skilled cyber defence operators
becomes increasingly critical. In this work, we aim to provide a multidisciplinary exploration …

Cybersecurity awareness in Saudi Arabia: A systematic literature review

R Hamdi - EDULEARN22 Proceedings, 2022 - library.iated.org
Technology changed the way people live and work through adding competitive advantages
and values of cost efficiency, information availability, knowledge documentation and …

Security Education Training and Awareness (SETA) at the Edge of the Metaverse

M Sadeghi, H Ghanbari, M Rossi - 2024 - aisel.aisnet.org
With the rise of cyber-attacks and incidents, cybersecurity has become a key concern for
organizations in different contexts. Considering that these attacks mostly rely on exploiting …

Coupling Agent-Based Simulations and VR universes: the case of GAMA and Unity

A Drogoul, P Taillandier, A Brugière, L Martinez… - arxiv preprint arxiv …, 2025 - arxiv.org
Agent-based models (ABMs) and video games, including those taking advantage of virtual
reality (VR), have undergone a remarkable parallel evolution, achieving impressive levels of …

Revolutionizing Cybersecurity Training: An Empirical Study on the Relationship Between Traditional Methods and Interest in Virtual Reality Modules

S Rana, R Chicone - 2024 2nd International Conference on …, 2024 - ieeexplore.ieee.org
Effective training is essential to protect the cybersecurity of information systems. However,
traditional cybersecurity training faces difficulties in terms of effectiveness, engagement …