{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,28]],"date-time":"2025-08-28T12:33:41Z","timestamp":1756384421380,"version":"3.40.3"},"publisher-location":"Cham","reference-count":103,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031615689"},{"type":"electronic","value":"9783031615696"}],"license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-3-031-61569-6_15","type":"book-chapter","created":{"date-parts":[[2024,6,1]],"date-time":"2024-06-01T01:03:59Z","timestamp":1717203839000},"page":"233-252","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["Digital Twins and\u00a0Extended Reality for\u00a0Tailoring Better Adapted Cybersecurity Trainings in\u00a0Critical Infrastructures"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-6521-9407","authenticated-orcid":false,"given":"Elo\u00efse","family":"Zehnder","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9069-4266","authenticated-orcid":false,"given":"Leanne","family":"Torgersen","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1907-0004","authenticated-orcid":false,"given":"Torvald F.","family":"Ask","sequence":"additional","affiliation":[]},{"given":"Benjamin J.","family":"Knox","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9032-1312","authenticated-orcid":false,"given":"Holger","family":"Morgenstern","sequence":"additional","affiliation":[]},{"given":"Jeroen","family":"Gaiser","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8570-9200","authenticated-orcid":false,"given":"Yannick","family":"Naudet","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0718-5645","authenticated-orcid":false,"given":"Alexeis","family":"Garcia Perez","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9489-2385","authenticated-orcid":false,"given":"Cristoph","family":"Stahl","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,6,1]]},"reference":[{"key":"15_CR1","doi-asserted-by":"crossref","unstructured":"Ardito, L., Petruzzelli, A., Panniello, U., Garavelli, A.: Towards industry 4.0: mapping digital technologies for supply chain management-marketing integration. Bus. Process Manag. J. 25(2), 323\u2013346 (2019)","DOI":"10.1108\/BPMJ-04-2017-0088"},{"issue":"2","key":"15_CR2","doi-asserted-by":"publisher","first-page":"860","DOI":"10.1109\/SURV.2012.071812.00124","volume":"15","author":"B Galloway","year":"2012","unstructured":"Galloway, B., Hancke, G.: Introduction to industrial control networks. IEEE Commun. surv. tutorials 15(2), 860\u2013880 (2012)","journal-title":"IEEE Commun. surv. tutorials"},{"key":"15_CR3","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/978-3-030-91293-2_1","volume-title":"Cyber Security: Critical Infrastructure Protection","author":"M Lehto","year":"2022","unstructured":"Lehto, M.: Cyber-attacks against critical infrastructure. In: Lehto, M., Neittaanm\u00e4ki, P. (eds.) Cyber Security: Critical Infrastructure Protection, pp. 3\u201342. Springer, Cham (2022). https:\/\/doi.org\/10.1007\/978-3-030-91293-2_1"},{"issue":"1","key":"15_CR4","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1111\/j.1749-5687.2009.00088.x","volume":"4","author":"RJ Deibert","year":"2010","unstructured":"Deibert, R.J., Rohozinski, R.: Risking security: policies and paradoxes of cyberspace security. Int. Polit. Sociol. 4(1), 15\u201332 (2010). https:\/\/doi.org\/10.1111\/j.1749-5687.2009.00088.x","journal-title":"Int. Polit. Sociol."},{"key":"15_CR5","doi-asserted-by":"crossref","DOI":"10.5040\/9798400636509","volume-title":"Cyber-Threats, Information Warfare, and Critical Infrastructure Protection: Defending the Us Homeland","author":"AH Cordesman","year":"2001","unstructured":"Cordesman, A.H.: Cyber-Threats, Information Warfare, and Critical Infrastructure Protection: Defending the Us Homeland. Greenwood Publishing Group, CA (2001)"},{"key":"15_CR6","series-title":"Studies in Systems, Decision and Control","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1007\/978-3-319-74412-4_3","volume-title":"Sustainable Interdependent Networks","author":"AI Sarwat","year":"2018","unstructured":"Sarwat, A.I., Sundararajan, A., Parvez, I., Moghaddami, M., Moghadasi, A.: Toward a smart city of interdependent critical infrastructure networks. In: Amini, M.H., Boroojeni, K.G., Iyengar, S.S., Pardalos, P.M., Blaabjerg, F., Madni, A.M. (eds.) Sustainable Interdependent Networks. SSDC, vol. 145, pp. 21\u201345. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-74412-4_3"},{"key":"15_CR7","unstructured":"European Commission: Directive (EU) 2022\/2555 of the European Parliament and of the Council of 14 December 2022 on measures for a high common level of cybersecurity across the Union, amending Regulation (EU) No 910\/2014 and Directive (EU) 2018\/1972, and repealing Directive (EU) 2016\/1148 (NIS 2 Directive) 2022. https:\/\/eur-lex.europa.eu\/eli\/dir\/2022\/2555. Accessed 22 Jan 2024"},{"issue":"5","key":"15_CR8","doi-asserted-by":"publisher","first-page":"697","DOI":"10.1108\/ICS-07-2020-0121","volume":"29","author":"N Chowdhury","year":"2021","unstructured":"Chowdhury, N., Gkioulos, V.: Key competencies for critical infrastructure cyber-security: a systematic literature review. Inf. Comput. Secur. 29(5), 697\u2013723 (2021)","journal-title":"Inf. Comput. Secur."},{"issue":"3","key":"15_CR9","doi-asserted-by":"publisher","first-page":"1153","DOI":"10.32604\/csse.2022.019938","volume":"40","author":"M Alsharif","year":"2022","unstructured":"Alsharif, M., Mishra, S., AlShehri, M.: Impact of human vulnerabilities on cybersecurity. Comput. Syst. Sci. Eng. 40(3), 1153\u20131166 (2022). https:\/\/doi.org\/10.32604\/csse.2022.019938","journal-title":"Comput. Syst. Sci. Eng."},{"issue":"8","key":"15_CR10","doi-asserted-by":"publisher","first-page":"685","DOI":"10.1016\/S0167-4048(03)00007-5","volume":"22","author":"J Leach","year":"2003","unstructured":"Leach, J.: Improving user security behaviour. Comput. Secur. 22(8), 685\u2013692 (2003)","journal-title":"Comput. Secur."},{"key":"15_CR11","doi-asserted-by":"crossref","unstructured":"Ratchford, M. M., Wang, Y.: BYOD-insure: a security assessment model for enterprise byod. In: 2019 Fifth Conference on Mobile and Secure Services (MobiSecServ), pp. 1\u201310. IEEE, Miami Beach, FL, USA (2019)","DOI":"10.1109\/MOBISECSERV.2019.8686551"},{"issue":"4","key":"15_CR12","doi-asserted-by":"publisher","first-page":"51","DOI":"10.1145\/2691517.2691521","volume":"45","author":"R Crossler","year":"2014","unstructured":"Crossler, R., B\u00e9langer, F.: An extended perspective on individual security behaviors: protection motivation theory and a unified security practices (USP) instrument. ACM SIGMIS Database: DATABASE Adv. Inf. Syst. 45(4), 51\u201371 (2014)","journal-title":"ACM SIGMIS Database: DATABASE Adv. Inf. Syst."},{"key":"15_CR13","doi-asserted-by":"crossref","unstructured":"Alohali, M., Clarke, N., Furnell, S., Albakri, S.: Information security behavior: recognizing the influencers. In: 2017 Computing Conference, pp. 844\u2013853. IEEE, London, UK (2017)","DOI":"10.1109\/SAI.2017.8252194"},{"key":"15_CR14","doi-asserted-by":"crossref","unstructured":"Nurse, J. R.: Cybercrime and you: how criminals attack and the human factors that they seek to exploit. arXiv preprint arXiv:1811.0662 (2018)","DOI":"10.1093\/oxfordhb\/9780198812746.013.35"},{"key":"15_CR15","unstructured":"Case, D. U.: Analysis of the cyber attack on the Ukrainian power grid. Electricity Inf. Sharing Anal. Cent. (E-ISAC) 388, 1\u201329 (2016)"},{"key":"15_CR16","unstructured":"The attack on Colonial pipeline: what we\u2019ve learned & what we\u2019ve done over the past two years. https:\/\/www.cisa.gov\/news-events\/news\/attack-colonial-pipeline-what-weve-learned-what-weve-done-over-past-two-years. Accessed 29 Jan 2024"},{"key":"15_CR17","unstructured":"IRGC-affiliated cyber actors exploit PLCs in multiple sectors, including U.S. water and wastewater systems facilities. https:\/\/www.cisa.gov\/news-events\/cybersecurity-advisories\/aa23-335a. Accessed 29 Jan 2024"},{"key":"15_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"140","DOI":"10.1007\/978-3-030-42051-2_10","volume-title":"Comput. Secur.","author":"U Morelli","year":"2020","unstructured":"Morelli, U., Nicolodi, L., Ranise, S.: An open and flexible cybersecurity training laboratory in IT\/OT infrastructures. In: Fournaris, A.P., et al. (eds.) IOSEC\/MSTEC\/FINSEC -2019. LNCS, vol. 11981, pp. 140\u2013155. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-42051-2_10"},{"key":"15_CR19","unstructured":"Drogkaris, P., Bourka, A.: European Union Agency for Cybersecurity: Cybersecurity culture guidelines - Behavioural aspects of cybersecurity, Drogkaris, P.(eds.), Bourka, A.(editor), European Network and Information Security Agency (2018). https:\/\/doi.org\/10.2824\/324042"},{"key":"15_CR20","doi-asserted-by":"publisher","first-page":"1390","DOI":"10.3389\/fpsyg.2020.01390","volume":"11","author":"C McMahon","year":"2020","unstructured":"McMahon, C.: In Defence of the human factor. Front. Psychol. 11, 1390 (2020)","journal-title":"Front. Psychol."},{"key":"15_CR21","doi-asserted-by":"crossref","unstructured":"Canham, M.: Repeat clicking: a lack of awareness is not the problem. In: HCI International 2023 - Late Breaking Papers: 25th International Conference on Human-Computer Interaction, pp. 325\u2013342. Copenhagen, Denmark (2023)","DOI":"10.1007\/978-3-031-48057-7_20"},{"key":"15_CR22","doi-asserted-by":"publisher","unstructured":"S\u00fctterlin, S., et al.: The role of IT background for metacognitive accuracy, confidence and overestimation of deep fake recognition skills. In: International Conference on Human-Computer Interaction, pp. 103\u2013119. Springer International Publishing, Cham (2022). https:\/\/doi.org\/10.1007\/978-3-031-05457-0_9","DOI":"10.1007\/978-3-031-05457-0_9"},{"key":"15_CR23","doi-asserted-by":"publisher","unstructured":"S\u00fctterlin, S., et al.: Individual deep fake recognition skills are affected by viewer\u2019s political orientation, agreement with content and device used. In: International Conference on Human-Computer Interaction, pp. 269\u2013284. Springer Nature Switzerland, Copenhagen, Denmark, Cham (2023). https:\/\/doi.org\/10.1007\/978-3-031-35017-7_18","DOI":"10.1007\/978-3-031-35017-7_18"},{"key":"15_CR24","unstructured":"Lif, P., Sommestad, T.: Human factors related to the performance of intrusion detection operators. HAISA, pp. 265\u2013275 (2015)"},{"key":"15_CR25","doi-asserted-by":"crossref","unstructured":"Pirta-Dreimane, R., et al.: Application of intervention mapping in cybersecurity education design. Front. Educ. 7, 998335 (2022)","DOI":"10.3389\/feduc.2022.998335"},{"key":"15_CR26","series-title":"Communications in Computer and Information Science","doi-asserted-by":"publisher","first-page":"294","DOI":"10.1007\/978-3-030-90179-0_38","volume-title":"HCI International 2021 - Late Breaking Posters","author":"P Ruh","year":"2021","unstructured":"Ruh, P., Morgenstern, H.: Establishing cyberpsychology at universities in the area of cyber security. In: Stephanidis, C., Antona, M., Ntoa, S. (eds.) HCII 2021. CCIS, vol. 1499, pp. 294\u2013301. Springer, Cham (2021). https:\/\/doi.org\/10.1007\/978-3-030-90179-0_38"},{"key":"15_CR27","unstructured":"European cybersecurity skills framework role profiles. https:\/\/www.enisa.europa.eu\/publications\/european-cybersecurity-skills-framework-role-profiles. Accessed 29 Jan 2024"},{"issue":"2017","key":"15_CR28","first-page":"181","volume":"800","author":"W Newhouse","year":"2017","unstructured":"Newhouse, W., Keith, S., Scribner, B., Witte, G.: National initiative for cybersecurity education (NICE) cybersecurity workforce framework. NIST Spec. Publ. 800(2017), 181 (2017)","journal-title":"NIST Spec. Publ."},{"issue":"19","key":"15_CR29","doi-asserted-by":"publisher","first-page":"163","DOI":"10.1016\/j.ifacol.2019.12.168","volume":"52","author":"BJ Knox","year":"2019","unstructured":"Knox, B.J., Lugo, R.G., S\u00fctterlin, S.: Cognisance as a human factor in military cyber Defence education. IFAC-Pap. OnLine 52(19), 163\u2013168 (2019)","journal-title":"IFAC-Pap. OnLine"},{"key":"15_CR30","doi-asserted-by":"crossref","unstructured":"Huff, P., Leiterman, S., Springer, J.: Cyber arena: an open-source solution for scalable cybersecurity labs in the cloud. In: Proceedings of the 54th ACM Technical Symposium on Computer Science Education V. 1, pp. 221\u2013227. ACM, Toronto, Canada (2023)","DOI":"10.1145\/3545945.3569828"},{"key":"15_CR31","doi-asserted-by":"crossref","unstructured":"Jelo, M., Helebrandt, P.: Gamification of cyber ranges in cybersecurity education. In: 2022 20th International Conference on Emerging eLearning Technologies and Applications (ICETA), pp. 280\u2013285. IEEE, Stary Smokovec, Slovakia (2022)","DOI":"10.1109\/ICETA57911.2022.9974714"},{"key":"15_CR32","doi-asserted-by":"publisher","first-page":"145","DOI":"10.3389\/fnhum.2017.00145","volume":"11","author":"SI Di Domenico","year":"2017","unstructured":"Di Domenico, S.I., Ryan, R.M.: The emerging neuroscience of intrinsic motivation: a new frontier in self-determination research. Front. Hum. Neurosci. 11, 145 (2017)","journal-title":"Front. Hum. Neurosci."},{"key":"15_CR33","first-page":"150","volume":"12","author":"G Jin","year":"2018","unstructured":"Jin, G., Tu, M., Kim, T.-H., Heffron, J., White, J.: Evaluation of game-based learning in cybersecurity education for high school students. J. Educ. Learn. 12, 150 (2018)","journal-title":"J. Educ. Learn."},{"key":"15_CR34","series-title":"Lecture Notes in Computer Science (Lecture Notes in Artificial Intelligence)","doi-asserted-by":"publisher","first-page":"178","DOI":"10.1007\/978-3-319-39952-2_18","volume-title":"Foundations of Augmented Cognition: Neuroergonomics and Operational Neuroscience","author":"\u00d8 J\u00f8sok","year":"2016","unstructured":"J\u00f8sok, \u00d8., Knox, B.J., Helkala, K., Lugo, R.G., S\u00fctterlin, S., Ward, P.: Exploring the hybrid space. In: Schmorrow, D.D.D., Fidopiastis, C.M.M. (eds.) AC 2016. LNCS (LNAI), vol. 9744, pp. 178\u2013188. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-39952-2_18"},{"key":"15_CR35","unstructured":"Staheli, D., et al.: Collaborative data analysis and discovery for cyber security. In: Twelfth Symposium on Usable Privacy and Security (SOUPS 2016) (2016)"},{"key":"15_CR36","doi-asserted-by":"crossref","unstructured":"Steinke, J., et al.: Improving cybersecurity incident response team effectiveness using teams-based research. IEEE Secur. Priv. 13(4), 20\u201329 (2015)","DOI":"10.1109\/MSP.2015.71"},{"key":"15_CR37","doi-asserted-by":"publisher","first-page":"1018","DOI":"10.1109\/21.120054","volume":"21","author":"GA Klein","year":"1991","unstructured":"Klein, G.A., Calderwood, R.: Decision models: some lessons from the field. IEEE Trans. Syst. Man Cybernet. 21, 1018\u20131026 (1991)","journal-title":"IEEE Trans. Syst. Man Cybernet."},{"issue":"2","key":"15_CR38","doi-asserted-by":"publisher","first-page":"385","DOI":"10.1287\/isre.2014.0522","volume":"25","author":"RT Wright","year":"2014","unstructured":"Wright, R.T., Jensen, M.L., Thatcher, J.B., Dinger, M., Marett, K.: Research note-influence techniques in phishing attacks: an examination of vulnerability and resistance. Inf. Syst. Res. 25(2), 385\u2013400 (2014)","journal-title":"Inf. Syst. Res."},{"key":"15_CR39","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1016\/j.chb.2018.04.019","volume":"86","author":"A Suh","year":"2018","unstructured":"Suh, A., Prophet, J.: The state of immersive technology research: a literature analysis. Comput. Hum. Behav. 86, 77\u201390 (2018)","journal-title":"Comput. Hum. Behav."},{"issue":"12","key":"15_CR40","first-page":"1321","volume":"77","author":"P Milgram","year":"1994","unstructured":"Milgram, P., Kishino, F.: A taxonomy of mixed reality visual displays. IEICE Trans. Inf. Syst. 77(12), 1321\u20131329 (1994)","journal-title":"IEICE Trans. Inf. Syst."},{"issue":"1","key":"15_CR41","doi-asserted-by":"publisher","first-page":"6","DOI":"10.1365\/s40702-022-00840-5","volume":"59","author":"M Knoll","year":"2022","unstructured":"Knoll, M., Stieglitz, S.: Augmented Reality und Virtual Reality-Einsatz im Kontext von Arbeit, Forschung und Lehre. HMD Praxis der Wirtschaftsinformatik 59(1), 6\u201322 (2022)","journal-title":"HMD Praxis der Wirtschaftsinformatik"},{"key":"15_CR42","doi-asserted-by":"publisher","first-page":"1042783","DOI":"10.3389\/fdata.2023.1042783","volume":"6","author":"TF Ask","year":"2023","unstructured":"Ask, T.F., Kullman, K., S\u00fctterlin, S., Knox, B.J., Engel, D., Lugo, R.G.: A 3D mixed reality visualization of network topology and activity results in better dyadic cyber team communication and cyber situational awareness. Front. Big Data 6, 1042783 (2023)","journal-title":"Front. Big Data"},{"key":"15_CR43","doi-asserted-by":"crossref","unstructured":"Seo, J.H., Bruner, M., Payne, A., Gober, N., McMullen, D., Chakravorty, D.K.: Using virtual reality to enforce principles of cybersecurity. J. Comput. D Sci. Educ. 10(1), 81\u201387 (2019)","DOI":"10.22369\/issn.2153-4136\/10\/1\/13"},{"key":"15_CR44","doi-asserted-by":"crossref","unstructured":"Anwar, M. S., et al.: Immersive learning and AR\/VR-based education: cybersecurity measures and risk management. In: Cybersecurity Management in Education Technologies, pp. 1\u201322. CRC Press (2023)","DOI":"10.1201\/9781003369042-1"},{"key":"15_CR45","doi-asserted-by":"crossref","unstructured":"Veneruso, S.V., Ferro, L.S., Marrella, A., Mecella, M., Catarci, T.: CyberVR: an interactive learning experience in virtual reality for cybersecurity related issues. In: Proceedings of the International Conference on Advanced Visual Interfaces, pp. 1\u20138. ACM, Salerno, Italy (2020)","DOI":"10.1145\/3399715.3399860"},{"issue":"6","key":"15_CR46","doi-asserted-by":"publisher","first-page":"691","DOI":"10.1111\/jcal.12375","volume":"35","author":"G Makransky","year":"2019","unstructured":"Makransky, G., Borre-Gude, S., Mayer, R.E.: Motivational and cognitive benefits of training in immersive virtual reality based on multiple assessments. J. Comput. Assist. Learn. 35(6), 691\u2013707 (2019)","journal-title":"J. Comput. Assist. Learn."},{"key":"15_CR47","doi-asserted-by":"publisher","first-page":"937","DOI":"10.1007\/s10648-020-09586-2","volume":"33","author":"G Makransky","year":"2021","unstructured":"Makransky, G., Petersen, G.B.: The cognitive affective model of immersive learning (CAMIL): a theoretical research-based model of learning in immersive virtual reality. Educ. Psychol. Rev. 33, 937\u2013958 (2021)","journal-title":"Educ. Psychol. Rev."},{"key":"15_CR48","first-page":"1","volume":"11","author":"M Shafto","year":"2010","unstructured":"Shafto, M., et al.: Draft modeling, simulation, information technology & processing roadmap. Technol. Area 11, 1\u201332 (2010)","journal-title":"Technol. Area"},{"key":"15_CR49","doi-asserted-by":"publisher","DOI":"10.1016\/j.compind.2021.103469","volume":"130","author":"C Semeraro","year":"2021","unstructured":"Semeraro, C., Lezoche, M., Panetto, H., Dassisti, M.: Digital twin paradigm: a systematic literature review. Comput. Ind. 130, 103469 (2021)","journal-title":"Comput. Ind."},{"key":"15_CR50","doi-asserted-by":"crossref","unstructured":"L\u00f6cklin, A., Jung, T., Jazdi, N., Ruppert, T., Weyrich, M.: Architecture of a human-digital twin as common interface for operator 4.0 applications. Procedia CIRP 104, 458\u2013463 (2021)","DOI":"10.1016\/j.procir.2021.11.077"},{"key":"15_CR51","doi-asserted-by":"crossref","unstructured":"Naudet, Y., Baudet, A., Risse, M.: Human digital twin in industry 4.0: concept and preliminary model. In: IN4PL, pp. 137\u2013144. ISBN (2021)","DOI":"10.5220\/0010709000003062"},{"key":"15_CR52","unstructured":"Karvonen, A., Saariluoma, P.: Cognitive mimetics and human digital twins: towards holistic AI design. ERCIM News 2023(132), 17\u201318 (2023)"},{"key":"15_CR53","doi-asserted-by":"publisher","DOI":"10.1016\/j.rcim.2022.102515","volume":"81","author":"Y Yin","year":"2023","unstructured":"Yin, Y., Zheng, P., Li, C., Wang, L.: A state-of-the-art survey on augmented reality-assisted digital twin for futuristic human-centric industry transformation. Robot. Comput. Integr. Manuf. 81, 102515 (2023)","journal-title":"Robot. Comput. Integr. Manuf."},{"key":"15_CR54","doi-asserted-by":"crossref","unstructured":"Kaarlela, T., Piesk\u00e4, S., Pitk\u00e4aho, T.: Digital twin and virtual reality for safety training. In: 2020 11th IEEE International Conference on Cognitive Infocommunications (CogInfoCom), pp. 000115\u2013000120. IEEE, Mariehamn, Finland (2020)","DOI":"10.1109\/CogInfoCom50765.2020.9237812"},{"issue":"1","key":"15_CR55","doi-asserted-by":"publisher","first-page":"128","DOI":"10.5604\/01.3001.0013.0464","volume":"19","author":"T T\u00e4hemaa","year":"2019","unstructured":"T\u00e4hemaa, T., Bondarenko, Y.: Digital twin based Synchronised control and simulation of the industrial robotic cell using virtual reality. J. Mach. Eng. 19(1), 128\u2013144 (2019)","journal-title":"J. Mach. Eng."},{"key":"15_CR56","doi-asserted-by":"crossref","unstructured":"Wu, P., Qi, M., Gao, L., Zou, W., Miao, Q., Liu, L.L.: Research on the virtual reality synchronization of workshop digital twin. In: 2019 IEEE 8th Joint International Information Technology and Artificial Intelligence Conference (ITAIC), pp. 875\u2013879. IEEE, Chongqing, China (2019)","DOI":"10.1109\/ITAIC.2019.8785552"},{"key":"15_CR57","doi-asserted-by":"crossref","unstructured":"Voordijk, H., Vahdatikhaki, F., Hesselink, L.: Digital twin-based asset inspection and user-technology interactions. J. Eng. Des. Technol. (2023)","DOI":"10.1108\/JEDT-03-2023-0121"},{"issue":"10","key":"15_CR58","doi-asserted-by":"publisher","first-page":"1316","DOI":"10.1097\/ACM.0b013e3182675af2","volume":"87","author":"MM McConnell","year":"2012","unstructured":"McConnell, M.M., Eva, K.W.: The role of emotion in the learning and transfer of clinical skills and knowledge. Acad. Med. J. Assoc. Am. Med. Coll. 87(10), 1316\u20131322 (2012)","journal-title":"Acad. Med. J. Assoc. Am. Med. Coll."},{"issue":"1920","key":"15_CR59","first-page":"w13786","volume":"143","author":"T Brosch","year":"2013","unstructured":"Brosch, T., Scherer, K., Grandjean, D., Sander, D.: The impact of emotion on perception, attention, memory, and decision-making. Swiss Med. Wkly. 143(1920), w13786\u2013w13786 (2013)","journal-title":"Swiss Med. Wkly."},{"issue":"4","key":"15_CR60","doi-asserted-by":"publisher","first-page":"473","DOI":"10.1080\/026999300402763","volume":"14","author":"JS Lerner","year":"2000","unstructured":"Lerner, J.S., Keltner, D.: Beyond valence: toward a model of emotion-specific influences on judgement and choice. Cogn. Emot. 14(4), 473\u2013493 (2000)","journal-title":"Cogn. Emot."},{"key":"15_CR61","doi-asserted-by":"crossref","unstructured":"Amara, K., Kerdjidj, O., Ramzan, N.: Emotion recognition for affective human digital twin by means of virtual reality enabling technologies. IEEE Access 11, 74216\u201374227 (2023)","DOI":"10.1109\/ACCESS.2023.3285398"},{"key":"15_CR62","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s11042-023-16918-1","volume":"83","author":"M Magalh\u00e3es","year":"2023","unstructured":"Magalh\u00e3es, M., Coelho, A., Melo, M., Bessa, M.: Measuring users\u2019 emotional responses in multisensory virtual reality: a systematic literature review. Multimed. Tools Appl. 83, 1\u201341 (2023)","journal-title":"Multimed. Tools Appl."},{"key":"15_CR63","doi-asserted-by":"crossref","unstructured":"Greenfeld, A., Lugmayr, A., Lamont, W.: Comparative reality: measuring user experience and emotion in immersive virtual environments. In: 2018 IEEE International Conference on Artificial Intelligence and Virtual Reality (AIVR), pp. 204-209. IEEE, Taichung, Taiwan (2018)","DOI":"10.1109\/AIVR.2018.00048"},{"key":"15_CR64","doi-asserted-by":"crossref","unstructured":"Tyng, C.M., Amin, H.U., Saad, M.N., Malik, A.S.: The influences of emotion on learning and memory. Front. Psychol. 8, 1454 (2017)","DOI":"10.3389\/fpsyg.2017.01454"},{"issue":"10","key":"15_CR65","doi-asserted-by":"publisher","first-page":"1336","DOI":"10.1080\/13669877.2019.1646315","volume":"23","author":"XA Zhang","year":"2020","unstructured":"Zhang, X.A., Borden, J.: How to communicate cyber-risk? An examination of behavioral recommendations in cybersecurity crises. J. Risk Res. 23(10), 1336\u20131352 (2020)","journal-title":"J. Risk Res."},{"issue":"2","key":"15_CR66","doi-asserted-by":"publisher","first-page":"167","DOI":"10.1108\/IMCS-09-2013-0068","volume":"22","author":"I Gulenko","year":"2014","unstructured":"Gulenko, I.: Improving passwords: influence of emotions on security behaviour. Inf. Manag. Comput. Secur. 22(2), 167\u2013178 (2014)","journal-title":"Inf. Manag. Comput. Secur."},{"key":"15_CR67","doi-asserted-by":"crossref","unstructured":"Bachura, E., Valecha, R., Chen, R., Rao, H.R.: The OPM data breach: an investigation of shared emotional reactions on Twitter. MIS Q. 46(2), 881\u2013910 (2022)","DOI":"10.25300\/MISQ\/2022\/15596"},{"issue":"1","key":"15_CR68","doi-asserted-by":"crossref","first-page":"1","DOI":"10.5334\/joc.54","volume":"2","author":"K Oberauer","year":"2019","unstructured":"Oberauer, K.: Working memory and attention - a conceptual analysis and review. J. Cogn. 2(1), 1\u201323 (2019)","journal-title":"J. Cogn."},{"issue":"19","key":"15_CR69","first-page":"1","volume":"13","author":"CC Wang","year":"2021","unstructured":"Wang, C.C., Hung, J.C., Chen, H.C.: How prior knowledge affects visual attention of Japanese mimicry and onomatopoeia and learning outcomes: evidence from virtual reality eye tracking. Sustain. 13(19), 1\u201328 (2021)","journal-title":"Sustain."},{"key":"15_CR70","doi-asserted-by":"publisher","DOI":"10.3389\/feduc.2021.693355","volume":"6","author":"J Mirault","year":"2021","unstructured":"Mirault, J., Albrand, J.P., Lassault, J., Grainger, J., Ziegler, J.C.: Using virtual reality to assess reading fluency in children. Fronti. Educ. 6, 693355 (2021)","journal-title":"Fronti. Educ."},{"issue":"1","key":"15_CR71","doi-asserted-by":"publisher","first-page":"95","DOI":"10.1111\/1469-8986.3910095","volume":"39","author":"M Al\u2019Absi","year":"2002","unstructured":"Al\u2019Absi, M., Hugdahl, K., Lovallo, W.R.: Adrenocortical stress responses and altered working memory performance. Psychophysiol. 39(1), 95\u201399 (2002)","journal-title":"Psychophysiol."},{"key":"15_CR72","doi-asserted-by":"crossref","unstructured":"Anderson, B.B., Kirwan, C.B., Jenkins, J.L., Eargle, D., Howard, S., Vance, A.: How polymorphic warnings reduce habituation in the brain: insights from an fMRI study. In: Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems, pp. 2883\u20132892. ACM, Seoul, Korea (2015)","DOI":"10.1145\/2702123.2702322"},{"key":"15_CR73","doi-asserted-by":"publisher","first-page":"1755","DOI":"10.3389\/fpsyg.2020.01755","volume":"11","author":"R Monta\u00f1ez","year":"2020","unstructured":"Monta\u00f1ez, R., Golob, E., Xu, S.: Human cognition through the lens of social engineering cyberattacks. Front. Psychol. 11, 1755 (2020)","journal-title":"Front. Psychol."},{"key":"15_CR74","doi-asserted-by":"publisher","first-page":"437","DOI":"10.1016\/j.chb.2016.12.040","volume":"69","author":"M Anwar","year":"2017","unstructured":"Anwar, M., He, W., Ash, I., Yuan, X., Li, L., Xu, L.: Gender difference and employees\u2019 cybersecurity behaviors. Comput. Hum. Behav. 69, 437\u2013443 (2017)","journal-title":"Comput. Hum. Behav."},{"key":"15_CR75","doi-asserted-by":"crossref","unstructured":"T\u00f8mte, C., Hatlevik, O.E.: Gender-differences in self-efficacy ICT related to various ICT-user profiles in Finland and Norway. How do self-efficacy, gender and ICT-user profiles relate to findings from PISA 2006. Comput. Educ. 57(1), 1416\u20131424 (2011)","DOI":"10.1016\/j.compedu.2010.12.011"},{"key":"15_CR76","doi-asserted-by":"crossref","unstructured":"Branley-Bell, D., Coventry, L., Dixon, M., Joinson, A., Briggs, P.: Exploring age and gender differences in ICT cybersecurity behaviour. Hum. Behav. Emerg. Technol. 2022, 1\u201310 (2022)","DOI":"10.1155\/2022\/2693080"},{"issue":"1\u20132","key":"15_CR77","doi-asserted-by":"publisher","first-page":"23","DOI":"10.1007\/s42454-022-00041-x","volume":"4","author":"ME Miller","year":"2022","unstructured":"Miller, M.E., Spatz, E.: A unified view of a human digital twin. Hum. Intell. Syst. Integr. 4(1\u20132), 23\u201333 (2022)","journal-title":"Hum. Intell. Syst. Integr."},{"issue":"1","key":"15_CR78","doi-asserted-by":"publisher","first-page":"203","DOI":"10.1016\/j.jrp.2006.02.001","volume":"41","author":"B Rammstedt","year":"2007","unstructured":"Rammstedt, B., John, O.P.: Measuring personality in one minute or less: a 10-item short version of the big five inventory in English and German. J. Res. Pers. 41(1), 203\u2013212 (2007)","journal-title":"J. Res. Pers."},{"key":"15_CR79","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/978-3-030-79318-0_1","volume-title":"Socio-Technical Aspects in Security and Trust","author":"N Condori-Fernandez","year":"2021","unstructured":"Condori-Fernandez, N., Suni-Lopez, F., Mu\u00f1ante, D., Daneva, M.: How can personality influence perception on security of context-aware applications? In: Gro\u00df, T., Vigan\u00f2, L. (eds.) STAST 2020. LNCS, vol. 12812, pp. 3\u201322. Springer, Cham (2021). https:\/\/doi.org\/10.1007\/978-3-030-79318-0_1"},{"issue":"4","key":"15_CR80","doi-asserted-by":"publisher","first-page":"475","DOI":"10.1037\/ppm0000247","volume":"9","author":"AT Shappie","year":"2020","unstructured":"Shappie, A.T., Dawson, C.A., Debb, S.M.: Personality as a predictor of cybersecurity behavior. Psychol. Popular Media 9(4), 475 (2020)","journal-title":"Psychol. Popular Media"},{"issue":"2","key":"15_CR81","doi-asserted-by":"publisher","first-page":"11","DOI":"10.3390\/mti7020011","volume":"7","author":"SO Thorp","year":"2023","unstructured":"Thorp, S.O., Rimol, L.M., Grassini, S.: Association of the big five personality traits with training effectiveness, sense of presence, and cybersickness in virtual reality. Multimodal Technol. Interact. 7(2), 11 (2023)","journal-title":"Multimodal Technol. Interact."},{"key":"15_CR82","doi-asserted-by":"crossref","unstructured":"Monta\u00f1ez, R., Atyabi, A., Xu, S.: Social engineering attacks and defenses in the physical world vs. cyberspace: a contrast study. In: Cybersecurity and Cognitive Science, pp. 3\u201341. Academic Press (2022)","DOI":"10.1016\/B978-0-323-90570-1.00012-7"},{"issue":"4","key":"15_CR83","doi-asserted-by":"publisher","first-page":"625","DOI":"10.3758\/BF03196322","volume":"9","author":"M Wilson","year":"2002","unstructured":"Wilson, M.: Six views of embodied cognition. Psychon. Bull. Rev. 9(4), 625\u2013636 (2002)","journal-title":"Psychon. Bull. Rev."},{"key":"15_CR84","doi-asserted-by":"publisher","first-page":"608","DOI":"10.1016\/j.sbspro.2015.07.201","volume":"197","author":"CW Wei","year":"2015","unstructured":"Wei, C.W., Chen, H.H., Chen, N.S.: Effects of embodiment-based learning on perceived cooperation process and social flow. Procedia. Soc. Behav. Sci. 197, 608\u2013613 (2015)","journal-title":"Procedia. Soc. Behav. Sci."},{"issue":"8","key":"15_CR85","doi-asserted-by":"publisher","first-page":"1396","DOI":"10.1177\/17470218211009227","volume":"74","author":"Q Marre","year":"2021","unstructured":"Marre, Q., Huet, N., Labeye, E.: Embodied mental imagery improves memory. Q. J. Exp. Psychol. 74(8), 1396\u20131405 (2021)","journal-title":"Q. J. Exp. Psychol."},{"issue":"2","key":"15_CR86","doi-asserted-by":"publisher","first-page":"220","DOI":"10.1177\/2372732216655542","volume":"3","author":"JM Harackiewicz","year":"2016","unstructured":"Harackiewicz, J.M., Smith, J.L., Priniski, S.J.: Interest matters: the importance of promoting interest in education. Policy Insights Behav. Brain Sci. 3(2), 220\u2013227 (2016)","journal-title":"Policy Insights Behav. Brain Sci."},{"key":"15_CR87","doi-asserted-by":"crossref","unstructured":"Rajivan, P., Cooke, N.: Impact of team collaboration on cybersecurity situational awareness. Theory Models Cyber Situation Awareness, pp. 203\u2013226 (2017)","DOI":"10.1007\/978-3-319-61152-5_8"},{"issue":"4","key":"15_CR88","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3462334","volume":"2","author":"J Dykstra","year":"2021","unstructured":"Dykstra, J., Rowe, N., Shimeall, T., Horneman, A., Midler, M.: Introduction: on the nature of situational awareness. Digital Threats Res. Pract. 2(4), 1\u20133 (2021)","journal-title":"Digital Threats Res. Pract."},{"key":"15_CR89","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2023.103368","volume":"132","author":"B Munsinger","year":"2023","unstructured":"Munsinger, B., Beebe, N., Richardson, T.: Virtual reality for improving cyber situational awareness in security operations centers. Comput. Secur. 132, 103368 (2023)","journal-title":"Comput. Secur."},{"key":"15_CR90","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"272","DOI":"10.1007\/978-3-030-05171-6_14","volume-title":"Information Systems Security","author":"A Kabil","year":"2018","unstructured":"Kabil, A., Duval, T., Cuppens, N., Le Comte, G., Halgand, Y., Ponchel, C.: From cyber security activities to collaborative virtual environments practices through the 3D CyberCOP platform. In: Ganapathy, V., Jaeger, T., Shyamasundar, R.K. (eds.) ICISS 2018. LNCS, vol. 11281, pp. 272\u2013287. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-030-05171-6_14"},{"key":"15_CR91","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1007\/978-3-030-90328-2_2","volume-title":"HCI International 2021 - Late Breaking Papers: Cognition, Inclusion, Learning, and Culture","author":"TF Ask","year":"2021","unstructured":"Ask, T.F., Lugo, R.G., Knox, B.J., S\u00fctterlin, S.: Human-human communication in cyber threat situations: a systematic review. In: Stephanidis, C., et al. (eds.) HCII 2021. LNCS, vol. 13096, pp. 21\u201343. Springer, Cham (2021). https:\/\/doi.org\/10.1007\/978-3-030-90328-2_2"},{"key":"15_CR92","doi-asserted-by":"publisher","DOI":"10.1016\/j.compedu.2022.104495","volume":"183","author":"I Dubovi","year":"2022","unstructured":"Dubovi, I.: Cognitive and emotional engagement while learning with VR: the perspective of multimodal methodology. Comput. Educ. 183, 104495 (2022)","journal-title":"Comput. Educ."},{"issue":"4","key":"15_CR93","doi-asserted-by":"publisher","first-page":"219","DOI":"10.1080\/00461520.2014.965823","volume":"49","author":"MT Chi","year":"2014","unstructured":"Chi, M.T., Wylie, R.: The ICAP framework: linking cognitive engagement to active learning outcomes. Educ. Psychol. 49(4), 219\u2013243 (2014)","journal-title":"Educ. Psychol."},{"issue":"1","key":"15_CR94","doi-asserted-by":"publisher","first-page":"14","DOI":"10.1080\/00461520.2014.989230","volume":"50","author":"BA Greene","year":"2015","unstructured":"Greene, B.A.: Measuring cognitive engagement with self-report scales: reflections from over 20 years of research. Educ. Psychol. 50(1), 14\u201330 (2015)","journal-title":"Educ. Psychol."},{"key":"15_CR95","unstructured":"Giaretta, A.: Security and privacy in virtual reality\u2013a literature survey (2022). arXiv preprint arXiv:2205.00208"},{"key":"15_CR96","unstructured":"23andMe confirms hackers stole ancestry data on 6.9 million users. https:\/\/tcrn.ch\/47Hzimn. Accessed 21 Jan 2024"},{"issue":"4","key":"15_CR97","doi-asserted-by":"publisher","DOI":"10.1016\/j.patter.2022.100469","volume":"3","author":"M Braun","year":"2022","unstructured":"Braun, M., Krutzinna, J.: Digital twins and the ethics of health decision-making concerning children. Patterns (NY) 3(4), 100469 (2022)","journal-title":"Patterns (NY)"},{"issue":"5","key":"15_CR98","doi-asserted-by":"publisher","first-page":"26","DOI":"10.1109\/MITP.2016.84","volume":"18","author":"B Stanton","year":"2016","unstructured":"Stanton, B., Theofanos, M.F., Prettyman, S.S., Furman, S.: Security fatigue. IT Prof. 18(5), 26\u201332 (2016)","journal-title":"IT Prof."},{"key":"15_CR99","unstructured":"Dykstra, J., Paul, C. L.: Cyber operations stress survey (COSS): studying fatigue, frustration, and cognitive workload in cybersecurity operations. In: Proceedings of the 11th USENIX Workshop on Cyber Security Experimentation and Test (CSET 18), pp. 1\u20138. ACM, Baltimore, USA (2018)"},{"key":"15_CR100","doi-asserted-by":"crossref","unstructured":"Ferreira, A., Lenzini, G.: An analysis of social engineering principles in effective phishing. In: 2015 Workshop on Socio-Technical Aspects in Security and Trust, pp. 9\u201316. IEEE, Verona, Italy (2015)","DOI":"10.1109\/STAST.2015.10"},{"key":"15_CR101","doi-asserted-by":"publisher","first-page":"125","DOI":"10.1080\/23742917.2019.1698178","volume":"4","author":"E Agyepong","year":"2020","unstructured":"Agyepong, E., Cherdantseva, Y., Reinecke, P., Burnap, P.: Challenges and performance metrics for security operations center analysts: a systematic review. J. Cyber Secur. Technol. 4, 125\u2013152 (2020)","journal-title":"J. Cyber Secur. Technol."},{"key":"15_CR102","series-title":"Lecture Notes in Computer Science (Lecture Notes in Artificial Intelligence)","doi-asserted-by":"publisher","first-page":"181","DOI":"10.1007\/978-3-319-91122-9_16","volume-title":"Engineering Psychology and Cognitive Ergonomics","author":"RG Lugo","year":"2018","unstructured":"Lugo, R.G., S\u00fctterlin, S.: Cyber officer profiles and performance factors. In: Harris, D. (ed.) EPCE 2018. LNCS (LNAI), vol. 10906, pp. 181\u2013190. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-91122-9_16"},{"key":"15_CR103","doi-asserted-by":"publisher","unstructured":"Childs, E., et al.: An overview of enhancing distance learning through augmented and virtual reality technologies. arXiv Preprint arXiv:2101.11000 (2021). https:\/\/doi.org\/10.48550\/arXiv.2101.11000","DOI":"10.48550\/arXiv.2101.11000"}],"container-title":["Lecture Notes in Computer Science","Augmented Cognition"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-61569-6_15","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,11,20]],"date-time":"2024-11-20T22:16:55Z","timestamp":1732141015000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-61569-6_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"ISBN":["9783031615689","9783031615696"],"references-count":103,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-61569-6_15","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"1 June 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"HCII","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Human-Computer Interaction","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Washington DC","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"USA","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"29 June 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"4 July 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"hcii2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/2024.hci.international\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}