{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,17]],"date-time":"2025-10-17T00:32:13Z","timestamp":1760661133325,"version":"build-2065373602"},"publisher-location":"Cham","reference-count":46,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031928321"},{"type":"electronic","value":"9783031928338"}],"license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-3-031-92833-8_12","type":"book-chapter","created":{"date-parts":[[2025,6,10]],"date-time":"2025-06-10T00:07:54Z","timestamp":1749514074000},"page":"193-212","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Enhancing the Effectiveness of Cyber Range Training Scenarios: Impact of Video Tutorials on Mental Workload, Situational Awareness and Presence"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-5110-3486","authenticated-orcid":false,"given":"Jos\u00e9 Manuel","family":"Castillo","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7432-7119","authenticated-orcid":false,"given":"Marc","family":"Parenthoen","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9021-2589","authenticated-orcid":false,"given":"Nicolas","family":"Louveton","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,6,11]]},"reference":[{"key":"12_CR1","unstructured":"Commandement du minist\u00e8re de l\u2019Int\u00e9rieur dans le cyberespace (ComCyber-MI): Rapport annuel sur la cybercriminalit\u00e9. Paris, France (2024)"},{"key":"12_CR2","doi-asserted-by":"publisher","unstructured":"Young, H., van Vliet, T., van de Ven, J., Jol, S., Broekman, C.: Understanding human factors in cyber security as a dynamic system. In: Advances in Intelligent Systems and Computing, pp. 244\u2013254. Springer (2018). https:\/\/doi.org\/10.1007\/978-3-319-60585-2_23","DOI":"10.1007\/978-3-319-60585-2_23"},{"key":"12_CR3","doi-asserted-by":"publisher","first-page":"4986","DOI":"10.1007\/s11227-018-2337-2","volume":"74","author":"I Ghafir","year":"2018","unstructured":"Ghafir, I., et al.: Security threats to critical infrastructure: the human factor. J. Supercomput. 74, 4986\u20135002 (2018). https:\/\/doi.org\/10.1007\/s11227-018-2337-2","journal-title":"J. Supercomput."},{"key":"12_CR4","doi-asserted-by":"publisher","first-page":"371","DOI":"10.1007\/s10111-021-00683-y","volume":"24","author":"A Pollini","year":"2022","unstructured":"Pollini, A., et al.: Leveraging human factors in cybersecurity: an integrated methodological approach. Cogn. Technol. Work 24, 371\u2013390 (2022). https:\/\/doi.org\/10.1007\/s10111-021-00683-y","journal-title":"Cogn. Technol. Work"},{"key":"12_CR5","unstructured":"Castillo, J.M., Louveton, N., Parenthoen, M.: Immersive Training in Cyber Crisis Management: The Case of the RESISTECC Project Formation immersive dans la gestion des crises d\u2019origine cyber: Le cas du projet RESISTECC (2024)"},{"key":"12_CR6","unstructured":"Agence nationale de la s\u00e9curit\u00e9 des syst\u00e8mes d\u2019information (ANSSI): Anticiper et g\u00e9rer sa communication de crise cyber. Paris, France (2021)"},{"key":"12_CR7","unstructured":"Parenthoen, M.: R\u00e9SISTeCC: R\u00e9silience par Simulation Immersive Strat\u00e9gique et Technique de Crise Cyber. In: Proceedings of the conference \u201cRecherche et de l\u2019Enseignement de la S\u00e9curit\u00e9 des Syst\u00e8mes d\u2019Information (RESSI 2023), pp. 1\u20134. Neuvy-sur-Barangeon, France (2023)"},{"key":"12_CR8","doi-asserted-by":"publisher","unstructured":"Yamin, M.M., Katt, B., Gkioulos, V.: Cyber ranges and security testbeds: scenarios, functions, tools and architecture (2020). https:\/\/doi.org\/10.1016\/j.cose.2019.101636","DOI":"10.1016\/j.cose.2019.101636"},{"key":"12_CR9","doi-asserted-by":"publisher","unstructured":"Russo, E., Costa, G., Armando, A.: Building next generation Cyber Ranges with CRACK. Comput. Secur. 95 (2020). https:\/\/doi.org\/10.1016\/j.cose.2020.101837","DOI":"10.1016\/j.cose.2020.101837"},{"key":"12_CR10","unstructured":"Castillo, J.M., Parenthoen, M., Gaumer, E.L., Louveton, N.: Improving Effectiveness of Cyber Crisis Management Trainings: Lessons Learned from an Exploratory Study Assessing Immersion, Cognitive Load, and Situation Awareness (2024)"},{"key":"12_CR11","doi-asserted-by":"publisher","unstructured":"Jelo, M., Helebrandt, P.: Gamification of cyber ranges in cybersecurity education. In: 20th Anniversary of IEEE International Conference on Emerging eLearning Technologies and Applications, ICETA 2022 \u2013 Proceedings, pp. 280\u2013285. Institute of Electrical and Electronics Engineers Inc. (2022). https:\/\/doi.org\/10.1109\/ICETA57911.2022.9974714","DOI":"10.1109\/ICETA57911.2022.9974714"},{"key":"12_CR12","doi-asserted-by":"publisher","unstructured":"Karjalainen, M., Puuska, S., Kokkonen, T.: Measuring learning in a cyber security exercise. In: ACM International Conference Proceeding Series, pp. 205\u2013209. Association for Computing Machinery (2020). https:\/\/doi.org\/10.1145\/3436756.3437046","DOI":"10.1145\/3436756.3437046"},{"key":"12_CR13","doi-asserted-by":"publisher","unstructured":"Vykopal, J., Vizvary, M., Oslejsek, R., Celeda, P., Tovarnak, D.: Lessons learned from complex hands-on defence exercises in a cyber range. In: Proceedings - Frontiers in Education Conference, FIE, pp. 1\u20138. Institute of Electrical and Electronics Engineers Inc. (2017). https:\/\/doi.org\/10.1109\/FIE.2017.8190713","DOI":"10.1109\/FIE.2017.8190713"},{"key":"12_CR14","doi-asserted-by":"publisher","unstructured":"Seker, E., Ozbenli, H.: The concept of cyber defence exercises (CDX): planning, execution, evaluation. In: Proceedings of the IEEE International Conference on Cyber Security and Protection of Digital Services (Cyber Security), Glasgow, UK, pp. 1\u20139. IEEE (2018). https:\/\/doi.org\/10.1109\/CyberSecPODS.2018.8560673","DOI":"10.1109\/CyberSecPODS.2018.8560673"},{"key":"12_CR15","unstructured":"Tena-Chollet, F.: \u00c9laboration d\u2019un environnement semi-virtuel de formation \u00e0 la gestion strat\u00e9gique de crise, bas\u00e9 sur la simulation multi-agents (PhD thesis). \u00c9cole Nationale Sup\u00e9rieure des Mines de Saint-\u00c9tienne (2012)"},{"key":"12_CR16","unstructured":"Limousin, P.: Contribution \u00e0 la sc\u00e9narisation p\u00e9dagogique d\u2019exercices de crise (PhD thesis). \u00c9cole des Mines de Saint-\u00c9tienne, Universit\u00e9 de Lyon (2017)"},{"key":"12_CR17","unstructured":"Kolb, D.A.: Experiential Learning: Experience as the Source of Learning and Development. Prentice Hall, Englewood Cliffs (1984)"},{"key":"12_CR18","doi-asserted-by":"publisher","first-page":"1","DOI":"10.4018\/ijcwt.2017040101","volume":"7","author":"A Cook","year":"2017","unstructured":"Cook, A., Smith, R.G., Maglaras, L., Janicke, H.: SCIPS. Int. J. Cyber Warfare Terrorism 7, 1\u201315 (2017). https:\/\/doi.org\/10.4018\/ijcwt.2017040101","journal-title":"Int. J. Cyber Warfare Terrorism"},{"key":"12_CR19","doi-asserted-by":"crossref","unstructured":"Moorthy, K., Vincent, C., Darzi, A.: Simulation based training. BMJ (2005)","DOI":"10.1136\/bmj.330.7490.493"},{"key":"12_CR20","doi-asserted-by":"crossref","unstructured":"Thompson, T.N., Carroll, M.B., Deaton, J.E.: Justification for use of simulation. In: Vincenzi, D.A., Moloua, M., Wise, J.A., Hancock, P.A. (eds.) Human Factors in Simulation and Training, pp. 39\u201348. CRC Press, New York (2009)","DOI":"10.1201\/9781420072846.ch2"},{"key":"12_CR21","doi-asserted-by":"crossref","unstructured":"Witmer, B.G., Singer, M.J.: Measuring Presence in Virtual Environments: A Presence Questionnaire (1998)","DOI":"10.1037\/t21619-000"},{"key":"12_CR22","doi-asserted-by":"publisher","first-page":"272","DOI":"10.1080\/15213269.2015.1015740","volume":"19","author":"JJ Cummings","year":"2016","unstructured":"Cummings, J.J., Bailenson, J.N.: How immersive is enough? A meta-analysis of the effect of immersive technology on user presence. Media Psychol. 19, 272\u2013309 (2016). https:\/\/doi.org\/10.1080\/15213269.2015.1015740","journal-title":"Media Psychol."},{"key":"12_CR23","doi-asserted-by":"publisher","unstructured":"Kuhail, M.A., Elsayary, A., Farooq, S., Alghamdi, A.: Exploring Immersive Learning Experiences: A Survey (2022). https:\/\/doi.org\/10.3390\/informatics9040075","DOI":"10.3390\/informatics9040075"},{"key":"12_CR24","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1207\/S15327590IJHC1201_1","volume":"12","author":"EB Nash","year":"2000","unstructured":"Nash, E.B., Edwards, G.W., Thompson, J.A., Barfield, W.: A review of presence and performance in virtual environments. Int. J. Hum. Comput. Interact. 12, 1\u201341 (2000). https:\/\/doi.org\/10.1207\/S15327590IJHC1201_1","journal-title":"Int. J. Hum. Comput. Interact."},{"key":"12_CR25","doi-asserted-by":"publisher","unstructured":"Agrawal, S., Simon, A., Bech, S\u00f8., B\u00c6rentsen, K., Forchhammer, S\u00f8.: Defining immersion: literature review and implications for research on audiovisual experiences (2020). https:\/\/doi.org\/10.17743\/jaes.2020.0039","DOI":"10.17743\/jaes.2020.0039"},{"key":"12_CR26","unstructured":"Arsenault, D.: Dark waters: spotlight on immersion. In: Proceedings of the GAMEON-NA International Conference, Montreal, Quebec, pp. 50\u201352 (2005). 1866\/13052"},{"key":"12_CR27","doi-asserted-by":"publisher","unstructured":"Nilsson, N.C., Nordahl, R., Serafin, S.: Immersion revisited: a review of existing definitions of immersion and their relation to different theories of presence. Hum. Technol. 12, 108\u2013134 (2016). https:\/\/doi.org\/10.17011\/ht\/urn.201611174652","DOI":"10.17011\/ht\/urn.201611174652"},{"key":"12_CR28","doi-asserted-by":"publisher","first-page":"1009","DOI":"10.1111\/1468-5973.12464","volume":"31","author":"E Petridou","year":"2023","unstructured":"Petridou, E., Sparf, J., Hemmingsson, O., Pihl, K.: Immersive simulation and experimental design in risk and crisis management: implications for learning. J. Contingencies Crisis Manag. 31, 1009\u20131017 (2023). https:\/\/doi.org\/10.1111\/1468-5973.12464","journal-title":"J. Contingencies Crisis Manag."},{"key":"12_CR29","doi-asserted-by":"publisher","unstructured":"Glas, M., Messmann, G., Pernul, G.: Complex yet attainable? An interdisciplinary approach to designing better cyber range exercises. Comput Secur. 144 (2024). https:\/\/doi.org\/10.1016\/j.cose.2024.103965","DOI":"10.1016\/j.cose.2024.103965"},{"key":"12_CR30","doi-asserted-by":"publisher","first-page":"189","DOI":"10.1007\/s10111-011-0174-7","volume":"13","author":"C Nemeth","year":"2011","unstructured":"Nemeth, C., Wears, R.L., Patel, S., Rosen, G., Cook, R.: Resilience is not control: healthcare, crisis management, and ICT. Cogn. Technol. Work 13, 189\u2013202 (2011). https:\/\/doi.org\/10.1007\/s10111-011-0174-7","journal-title":"Cogn. Technol. Work"},{"key":"12_CR31","doi-asserted-by":"publisher","unstructured":"Barford, P., Dacier, M., Dietterich, T.G., et al.: Cyber SA: situational awareness for cyber defense. In: Jajodia, S., Liu, P., Swarup, V., Wang, C. (eds.) Cyber Situational Awareness. Advances in Information Security, vol. 46. Springer, Boston (2010). https:\/\/doi.org\/10.1007\/978-1-4419-0140-8_1","DOI":"10.1007\/978-1-4419-0140-8_1"},{"key":"12_CR32","doi-asserted-by":"publisher","first-page":"279","DOI":"10.1177\/154193121005400403","volume":"54","author":"S Mahoney","year":"2010","unstructured":"Mahoney, S., Roth, E., Steinke, K., Pfautz, J., Wu, C., Farry, M.: A cognitive task analysis for cyber situational awareness. Proc. Hum. Factors Ergon. Soc. Annu. Meet. 54, 279\u2013283 (2010). https:\/\/doi.org\/10.1177\/154193121005400403","journal-title":"Proc. Hum. Factors Ergon. Soc. Annu. Meet."},{"key":"12_CR33","doi-asserted-by":"crossref","unstructured":"Adams, M.J., Tenney, Y.J., Pew, R.W.: Situation Awareness and the Cognitive Management of Complex Systems (1995)","DOI":"10.1518\/001872095779049462"},{"key":"12_CR34","unstructured":"Taylor, R.M.: Experiential measures: performance-based self-ratings of situational awareness. In: Garland, D.J., Endsley, M.R. (eds.) Experimental Analysis and Measurement of Situation Awareness. Embry-Riddle Aeronautical University Press, Daytona Beach, FL, USA (1995)"},{"key":"12_CR35","doi-asserted-by":"publisher","unstructured":"Endsley, M.R.: Toward a theory of situation awareness in dynamic systems (1995). https:\/\/doi.org\/10.1518\/001872095779049543","DOI":"10.1518\/001872095779049543"},{"key":"12_CR36","unstructured":"Endsley, M.R., Jones, W.M.: A model of inter and intra team situation awareness: implications for design, training and measurement. New trends in cooperative activities: understanding system dynamics in compl. (2001)"},{"key":"12_CR37","unstructured":"Stramler, J.H.: The dictionary for human factors\/ergonomics. CRC Press (1993)"},{"key":"12_CR38","doi-asserted-by":"publisher","unstructured":"Young, M.S., Stanton, N.A.: It\u2019s all relative: Defining mental workload in the light of Annett\u2019s paper (2002). https:\/\/doi.org\/10.1080\/00140130210166816.","DOI":"10.1080\/00140130210166816"},{"key":"12_CR39","unstructured":"Castillo, J.M.: Etude de la charge mentale et du stress engendr\u00e9s par l\u2019usage des technologies num\u00e9riques en milieu professionnel (2022)"},{"key":"12_CR40","doi-asserted-by":"publisher","unstructured":"Sweller, J., van Merri\u00ebnboer, J.J.G., Paas, F.: Cognitive Architecture and Instructional Design: 20\u00a0Years Later (2019). https:\/\/doi.org\/10.1007\/s10648-019-09465-5","DOI":"10.1007\/s10648-019-09465-5"},{"key":"12_CR41","doi-asserted-by":"publisher","first-page":"251","DOI":"10.1023\/A:1022193728205","volume":"10","author":"J Sweller","year":"1998","unstructured":"Sweller, J., Van Merrienboer, J.J.G., Paas, F.G.W.C.: Cognitive architecture and instructional design. Educ. Psychol. Rev. 10, 251\u2013296 (1998). https:\/\/doi.org\/10.1023\/A:1022193728205","journal-title":"Educ. Psychol. Rev."},{"key":"12_CR42","doi-asserted-by":"publisher","unstructured":"Fraser, K.L., Ayres, P., Sweller, J.: Cognitive load theory for the design of medical simulations (2015). https:\/\/doi.org\/10.1097\/SIH.0000000000000097","DOI":"10.1097\/SIH.0000000000000097"},{"key":"12_CR43","doi-asserted-by":"publisher","unstructured":"Naismith, L.M., et al.: Using cognitive load theory to optimize simulation design. In: Clinical Simulation: Education, Operations and Engineering, pp. 129\u2013141. Elsevier (2019). https:\/\/doi.org\/10.1016\/B978-0-12-815657-5.00010-3","DOI":"10.1016\/B978-0-12-815657-5.00010-3"},{"key":"12_CR44","unstructured":"Hart, S., Staveland, L.: Development of NASA-TLX (Task Load Index): Results of Empirical and Theoretical Research (1988)"},{"key":"12_CR45","unstructured":"Cegarra, J., Morgado, N. : \u00c9tude des propri\u00e9t\u00e9s de la version francophone du NASA-TLX (2009)"},{"key":"12_CR46","unstructured":"Robilliard, G., Bouchard, S., Renaud, P., Cournoyer, L.: Validation canadienne-fran\u00e7aise de deux mesures importantes en r\u00e9alit\u00e9 virtuelle\u202f: l\u2019Immersive Tendencies Questionnaire et le Presence Questionnaire (2002)"}],"container-title":["Lecture Notes in Computer Science","HCI for Cybersecurity, Privacy and Trust"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-92833-8_12","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,16]],"date-time":"2025-10-16T17:22:19Z","timestamp":1760635339000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-92833-8_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"ISBN":["9783031928321","9783031928338"],"references-count":46,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-92833-8_12","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"11 June 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"HCII","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Human-Computer Interaction","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Gothenburg","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Sweden","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22 June 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"27 June 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"27","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"hcii2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/2025.hci.international\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}