Exploring the Need to Study the Efficacy of VR Training Compared to Traditional Cybersecurity Training
References:
[1] Esteves, R. (2017). To Improve Cybersecurity, Think Like a Hacker. MIT Sloan Management Review, 58(3), 71–.
[2] Beuran, R., Inoue, T., Tan, Y., & Shinoda, Y. (2019, June). Realistic Cybersecurity Training via Scenario Progression Management. In 2019 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW) (pp. 67-76). IEEE.
[3] Beuran, R., Pham, C., Tang, D., Chinen, K. I., Tan, Y., & Shinoda, Y. (2017). Cytrone: An integrated cybersecurity training framework
[4] Tschakert, K. F., & Ngamsuriyaroj, S. (2019). Effectiveness of and user preferences for security awareness training methodologies. Heliyon, 5(6), e02010.
[5] Sadeh-Koniecpol, N., Wescoe, K., Brubaker, J., & Hong, J. (2016). U.S. Patent No. 9,373,267. Washington, DC: U.S. Patent and Trademark Office.
[6] Abawajy, J. (2014). User preference of cyber security awareness delivery methods. Behaviour & Information Technology, 33(3), 237-248.
[7] Fouché, M. (2015). Code hunt as platform for gamification of cybersecurity training. 9–11. https://doi.org/10.1145/2792404.2792406
[8] Maennel, K. (2020, September). Learning Analytics Perspective: Evidencing Learning from Digital Datasets in Cybersecurity Exercises. In 2020 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW) (pp. 27-36). IEEE.
[9] Nagarajan, A., Allbeck, J. M., Sood, A., & Janssen, T. L. (2012, May). Exploring game design for cybersecurity training. In 2012 IEEE International Conference on Cyber Technology in Automation, Control, and Intelligent Systems (CYBER) (pp. 256-262). IEEE.
[10] Corradini, I. (2020). Training Methods. In Building a Cybersecurity Culture in Organizations (pp. 115-133). Springer, Cham.
[11] Willems, C., Klingbeil, T., Radvilavicius, L., Cenys, A., & Meinel, C. (2011, December). A distributed virtual laboratory architecture for cybersecurity training. In 2011 International Conference for Internet Technology and Secured Transactions (pp. 408-415). IEEE.
[12] Tang, D., Pham, C., Chinen, K. I., & Beuran, R. (2017, November). Interactive cybersecurity defense training inspired by web-based learning theory. In 2017 IEEE 9th International Conference on Engineering Education (ICEED) (pp. 90-95). IEEE.
[13] Wahsheh, L.A. & Mekonnen, B., "Practical Cyber Security Training Exercises," 2019 International Conference on Computational Science and Computational Intelligence (CSCI), Las Vegas, NV, USA, 2019, pp. 48-53. doi: 10.1109/CSCI49370.2019.00015
[14] Urias, V. E., Van Leeuwen, B., Stout, W. M., & Lin, H. W. (2017, April). Dynamic cybersecurity training environments for an evolving cyber workforce. In 2017 IEEE International Symposium on Technologies for Homeland Security (HST) (pp. 1-6). IEEE.
[15] Jalali, S. (2019). Decision-making and biases in cybersecurity capability development: Evidence from a simulation game experiment. The Journal of Strategic Information Systems, 28(1), 66–82. https://doi.org/10.1016/j.jsis.2018.09.003
[16] Nguyen, T. A., & Pham, H. (2020, October). A Design Theory-Based Gamification Approach for Information Security Training. In 2020 RIVF International Conference on Computing and Communication Technologies (RIVF) (pp. 1-4). IEEE.
[17] Thakong, M., Phimoltares, S., Jaiyen, S., & Lursinsap, C. (2018). One-pass-throw-away learning for cybersecurity in streaming non-stationary environments by dynamic stratum network. PloS one, 13(9), e0202937.
[18] Aldawood, H., & Skinner, G. (2019). Reviewing cyber security social engineering training and awareness programs—Pitfalls and ongoing issues. Future Internet, 11(3), 73.
[19] Adinolf, S., Wyeth, P., Brown, R., & Altizer, R. (2019, December). Towards designing agent based virtual reality applications for cybersecurity training. In Proceedings of the 31st Australian Conference on Human-Computer-Interaction (pp. 452-456).
[20] Seo, J. H., Bruner, M., Payne, A., Gober, N., & McMullen, D. (2019). Using virtual reality to enforce principles of cybersecurity. The Journal of Computational Science Education, 10(1).
[21] Kasurinen, J. (2017). Usability issues of virtual reality learning simulator in healthcare and cybersecurity. Procedia computer science, 119, 341-349.
[22] Seymour, N. E., Gallagher, A. G., Roman, S. A., O’brien, M. K., Bansal, V. K., Andersen, D. K., & Satava, R. M. (2002). Virtual reality training improves operating room performance: results of a randomized, double-blinded study. Annals of Surgery, 236(4), 458.
[23] Elevate performance through immersive experience. (2020, February 20). Retrieved November 10, 2020, from https://www.strivr.com/lp/elevate-performance-through-immersive-experience/?utm_medium=Paid-Search
[24] VR Cybersecurity Training. (n.d.). Retrieved November 10, 2020, from https://www.nnit.com/our-solutions/cybersecurity/vr-cybersecurity-training/
[25] Virtual Reality (VR) Cyber Security Awareness Training. (n.d.). Retrieved November 10, 2020, from https://securityquotient.io/security-awareness-training/virtual-reality.html
[26] Security awareness game. (n.d.). Retrieved November 12, 2020, from https://www.infosequre.com/security-awareness-game
[27] Virtual Reality Training powered by SixGen. (n.d.). Retrieved November 12, 2020, from https://www.sixgen.io/course