{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,2]],"date-time":"2025-08-02T04:36:17Z","timestamp":1754109377730,"version":"3.40.3"},"publisher-location":"Cham","reference-count":35,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030119348"},{"type":"electronic","value":"9783030119355"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-11935-5_60","type":"book-chapter","created":{"date-parts":[[2019,2,28]],"date-time":"2019-02-28T05:06:03Z","timestamp":1551330363000},"page":"632-643","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":9,"title":["Integrating Cyber Range Technologies and Certification Programs to Improve Cybersecurity Training Programs"],"prefix":"10.1007","author":[{"given":"Demitrius","family":"Fenton","sequence":"first","affiliation":[]},{"given":"Terry","family":"Traylor","sequence":"additional","affiliation":[]},{"given":"Guy","family":"Hokanson","sequence":"additional","affiliation":[]},{"given":"Jeremy","family":"Straub","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,3,1]]},"reference":[{"key":"60_CR1","unstructured":"Cybersecurity Training Online, Combat Threats with Cybersecurity Training. \n                    www.villanovau.com\/resources\/iss\/cyber-security-training\/#.Wrm05IjwbIU\n                    \n                  . 20 July 2018"},{"key":"60_CR2","unstructured":"While, S.: Cybersecurity Skills Aren\u2019t Taught in College. IDG Communications, Inc., \n                    www.cio.com\n                    \n                  , 13 Dec 2016"},{"key":"60_CR3","volume-title":"Taxonomy of Educational Objectives: The Classification of Educational Goals. Handbook I: Cognitive Domain","author":"BS Bloom","year":"1956","unstructured":"Bloom, B.S., Engelhart, M.D., Furst, E.J., Hill, W.H., Krathwohl, D.R.: Taxonomy of Educational Objectives: The Classification of Educational Goals. Handbook I: Cognitive Domain. David McKay Company, New York (1956)"},{"issue":"4","key":"60_CR4","doi-asserted-by":"publisher","first-page":"212","DOI":"10.1207\/s15430421tip4104_2","volume":"41","author":"David R. Krathwohl","year":"2002","unstructured":"Krathwohl, D.R.: A revision of Bloom\u2019s taxonomy: an overview. In: Theory Into Practice, vol. 41, issue 4, Special Issue: Revising Bloom\u2019s Taxonomy, pp. 212\u2013218. Routledge, London (2002)","journal-title":"Theory Into Practice"},{"key":"60_CR5","unstructured":"Leaman, C.: Improving learning and transfer: using brain science to drive successful learning transfer. In: Training: The Source for Professional Development. \n                    http:\/\/trainingmag.com\/improving-learning-transfer\n                    \n                  . (2014)"},{"key":"60_CR6","doi-asserted-by":"crossref","unstructured":"Jones, R., Korwin, A.: Do hands-on, technology-based activities enhance learning by reinforcing cognitive knowledge and retention? J. Technol. Educ. 1(2) (1990)","DOI":"10.21061\/jte.v1i2.a.3"},{"key":"60_CR7","doi-asserted-by":"crossref","unstructured":"Andel, T., McDonald, J.: A systems approach to cyber assurance education. In: Proceedings of infoSecCD\u201913: Information Security Curriculum Development Conference (2013)","DOI":"10.1145\/2528908.2528920"},{"issue":"3","key":"60_CR8","first-page":"99","volume":"13","author":"A Bicak","year":"2015","unstructured":"Bicak, A., Liu, X., Murphy, D.: Cybersecurity curriculum development: introducing specialties in a graduate program. Inf. Syst. Educ. J. 13(3), 99 (2015)","journal-title":"Inf. Syst. Educ. J."},{"issue":"5","key":"60_CR9","first-page":"389","volume":"5","author":"M Dark","year":"2006","unstructured":"Dark, M., Ekstrom, J., Lunt, B.: Integration of information assurance and security into education: a look at the model curriculum and emerging practice. J. Inf. Technol. Educ. 5(5), 389\u2013403 (2006)","journal-title":"J. Inf. Technol. Educ."},{"issue":"5","key":"60_CR10","doi-asserted-by":"publisher","first-page":"366","DOI":"10.1108\/09685221011095272","volume":"18","author":"L Futcher","year":"2010","unstructured":"Futcher, L., Schroder, C., Von Solms, R.: Information security education in South Africa. Inf. Manage. Comput. Secur. 18(5), 366\u2013374 (2010)","journal-title":"Inf. Manage. Comput. Secur."},{"key":"60_CR11","doi-asserted-by":"crossref","unstructured":"Rowe, D., Lunt, B., Ekstrom, J.: The role of cyber-security in information technology education. In: Proceedings of the 2011 Conference on Information Technology Education, pp. 113\u2013122 (2011)","DOI":"10.1145\/2047594.2047628"},{"key":"60_CR12","unstructured":"Harris, M., Patten, K.: Using Bloom\u2019s and Webb\u2019s taxonomies to integrate emergeing cybersecurity topics into a computing curriculum. J. Inf. Syst. Educ. 26(3), 219\u2013234 (2015)"},{"key":"60_CR13","volume-title":"The Classification of Educational Objectives in the Psychomotor Domain","author":"E Simpson","year":"1972","unstructured":"Simpson, E.: The Classification of Educational Objectives in the Psychomotor Domain. Gryphon House, Washington, DC (1972)"},{"key":"60_CR14","unstructured":"Dave, R.: Psychomotor Levels in Developing and Writing Behavioral Objectives. In: Armstrong, R.J. (ed.) pp. 20\u201321. Educational Innovators Press. Tuscon, AZ (1970)"},{"key":"60_CR15","unstructured":"Wikipedia: Definition of Learning. \n                    https:\/\/en.wikipedia.org\/wiki\/Learning"},{"key":"60_CR16","unstructured":"Transfer of Learning Slide deck"},{"issue":"2","key":"60_CR17","doi-asserted-by":"publisher","first-page":"193","DOI":"10.5465\/amle.2005.17268566","volume":"4","author":"Alice Y. Kolb","year":"2005","unstructured":"Kolb, D.A., Kolb, A.Y.: Learning Styles and Learning Spaces: Enhancing Experiential Learning in Higher Education. In: Academy of Management Learning and Education, vol. 4, issue 2, pp. 198\u2013212. Academy of Management, Briarcliff Manor (2005)","journal-title":"Academy of Management Learning & Education"},{"issue":"4","key":"60_CR18","first-page":"559","volume":"8","author":"EDUARDO SALAS","year":"2009","unstructured":"Salas, E., Wildman, J.L., Piccolo, R.F.: Using simulation-based training to enhance management education. In: Academy of Management Learning & Education, vol. 8, issue. 4, pp. 559\u2013573, Academy of Management, Briarcliff Manor (2009)","journal-title":"Academy of Management Learning & Education"},{"key":"60_CR19","unstructured":"Stanford University: Speaking of Teaching: Teaching with Cases. In: Stanford University Newsletter on Teaching, Winter Edition, vol. 5, issue 2, Stanford (1994)"},{"key":"60_CR20","doi-asserted-by":"crossref","unstructured":"Deterding, S., Dixon, D., Khaled, R., Nacke, L.: From game design elements to gamefulness: defining \u201cGamification.\u201d In: Laugmayr, A., Franssilia, H., Safran, C., Hammouda, I. (eds.) MindTrek 2011: Proceedings of the 15th International Academic MindTrek Conference: Envisioning Future Media Environments, pp. 9\u201315. Association for Computing Machinery, New York (2011)","DOI":"10.1145\/2181037.2181040"},{"key":"60_CR21","unstructured":"Dicheva, D., Dichev, C., Agre, G., Angelova, G.: Gamification in education: asystematic mapping study. In: Educational Technology and Society, vol. 18, issue 3, pp. 75\u201388. Athabasca, Canada (2015)"},{"key":"60_CR22","volume-title":"The Gamification of Learning and Instruction: Game-Based Methods and Strategies for Training and Education","author":"K Kapp","year":"2012","unstructured":"Kapp, K.: The Gamification of Learning and Instruction: Game-Based Methods and Strategies for Training and Education. Pfeiffer, San Francisco (2012)"},{"issue":"4","key":"60_CR23","doi-asserted-by":"publisher","first-page":"34","DOI":"10.1111\/j.1540-4560.1946.tb02295.x","volume":"2","author":"Kurt Lewin","year":"1946","unstructured":"Lewin, K.: Action research and minority problems. J. Soc. Issues 2, 34\u201346 (1946)","journal-title":"Journal of Social Issues"},{"key":"60_CR24","unstructured":"Buchanan, L., Wolanczyk, F., Zinghini, F.: Blending Bloom\u2019s taxonomy and serious game design. In: Proceedings of 2011 International Conference on Security and Management. Las Vegas, NV (2011)"},{"key":"60_CR25","unstructured":"Damn Vulnerable Web Application. \n                    www.dvwa.co.uk"},{"key":"60_CR26","unstructured":"Smartphone Pentest Framework. \n                    www.bulbsecurity.com"},{"key":"60_CR27","unstructured":"https:\/\/www.wday.com\/news\/4424170-ethical-hackers-expose-businesses-security-problems"},{"key":"60_CR28","unstructured":"https:\/\/www.mprnews.org\/story\/2018\/04\/09\/class-combats-cyber-crime-by-promoting-ethical-hacking"},{"key":"60_CR29","unstructured":"https:\/\/www.usnews.com\/news\/best-states\/north-dakota\/articles\/2018-04-21\/north-dakota-class-combats-cybercrime-with-hacking-skills"},{"key":"60_CR30","unstructured":"https:\/\/www.indianagazette.com\/leisure\/class-members-combat-cybercrime-by-learning-advanced-hacking-skills\/article_197c1790-caa5-58ba-9e35-792938ac5594.html"},{"key":"60_CR31","unstructured":"Webster\u2019s Dictionary for Learning (2015)"},{"key":"60_CR32","unstructured":"Stanford University: Speaking of Teaching: Problem-Based Learning. In: Stanford University Newsletter on Teaching, Winter Edition, vol. 11, issue 1, Stanford (2001)"},{"key":"60_CR33","unstructured":"Armstrong, E.: Case Based Teaching: Overview: Advantages of the Case Based Approach. \n                    http:\/\/pedicases.org\/teaching\/overview\/approach.html"},{"key":"60_CR34","unstructured":"Christensen, C.R.: Teaching with cases at the Harvard Business School. In: Barnes, L., Christensen, C.R., Hansen, A. (eds.) Teaching and the Case Method, 3rd Edition, p. 34. Harvard Business School Press, Boston (1994)"},{"key":"60_CR35","unstructured":"USMC Systems Approach to Training and Education"}],"container-title":["Advances in Intelligent Systems and Computing","The Challenges of the Digital Transformation in Education"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-11935-5_60","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,18]],"date-time":"2019-05-18T02:52:23Z","timestamp":1558147943000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-11935-5_60"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030119348","9783030119355"],"references-count":35,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-11935-5_60","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"1 March 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICL","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Interactive Collaborative Learning","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Kos Island","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Greece","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"25 September 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"28 September 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"icl2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/icl-conference.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}