{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,11]],"date-time":"2025-09-11T20:22:04Z","timestamp":1757622124466,"version":"3.44.0"},"publisher-location":"Cham","reference-count":22,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783032006462"},{"type":"electronic","value":"9783032006448"}],"license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-3-032-00644-8_4","type":"book-chapter","created":{"date-parts":[[2025,8,8]],"date-time":"2025-08-08T04:06:10Z","timestamp":1754625970000},"page":"59-76","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Psychological and Behavioral Aspects and System Dynamics: Insights from Exercises Using a Cyber Range"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-5110-3486","authenticated-orcid":false,"given":"Jos\u00e9 Manuel","family":"Castillo","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9021-2589","authenticated-orcid":false,"given":"Nicolas","family":"Louveton","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7432-7119","authenticated-orcid":false,"given":"Marc","family":"Parenthoen","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,8,9]]},"reference":[{"key":"4_CR1","doi-asserted-by":"publisher","unstructured":"Lazarov, W., Stodulka, T., Schafeitel-T\u00e4htinen, T., Helenius, M., Martinasek, Z.: Interactive environment for effective cybersecurity teaching and learning. In: Proceedings of the 18th International Conference on Availability, Reliability and Security (ARES 2023), pp. 1\u20139. Association for Computing Machinery, New York (2023). https:\/\/doi.org\/10.1145\/3600160.360500","DOI":"10.1145\/3600160.360500"},{"key":"4_CR2","doi-asserted-by":"publisher","unstructured":"Pfaller, T., Skopik, F., Reuter, L., Leitner, M.: Data collection in cyber exercises through monitoring points: observing, steering, and scoring. In: International Conference on Information Systems Security and Privacy, pp. 355\u2013366. Science and Technology Publications, Lda (2025). https:\/\/doi.org\/10.5220\/0013309900003899","DOI":"10.5220\/0013309900003899"},{"key":"4_CR3","doi-asserted-by":"publisher","unstructured":"Skopik, F., Leitner, M.: Preparing for national cyber crises using non-linear cyber exercises. In: Proceedings of the 18th International Conference on Privacy, Security and Trust (PST 2021), pp. 1\u201315. IEEE (2021). https:\/\/doi.org\/10.1109\/PST52912.2021.9647795","DOI":"10.1109\/PST52912.2021.9647795"},{"key":"4_CR4","doi-asserted-by":"publisher","unstructured":"Leitner, M., et al.: Enabling exercises, education and research with a comprehensive cyber range. J. Wirel. Mob. Netw. Ubiquitous Comput. Dependable Appl. 12, 37\u201361 (2021). https:\/\/doi.org\/10.22667\/JOWUA.2021.12.31.037","DOI":"10.22667\/JOWUA.2021.12.31.037"},{"key":"4_CR5","unstructured":"Glas, M., Pernul, G.: Cyber ranges: five use cases for improving cybersecurity skills development in organizations. IEEE Secur. Priv. Mag. 1\u201310 (2025)"},{"key":"4_CR6","unstructured":"Parenthoen, M.: R\u00e9SISTeCC: R\u00e9silience par simulation immersive Strat\u00e9gique et technique de Crise cyber. In: Proceedings of the conference \u201cRecherche et de l\u2019Enseignement de la S\u00e9curit\u00e9 des Syst\u00e8mes d\u2019Information (RESSI 2023), pp. 1\u20134. Neuvy-sur-Barangeon, France (2023)"},{"key":"4_CR7","unstructured":"Castillo, J.M., Louveton, N., Parenthoen, M.: Immersive training in cyber crisis management: the case of the RESISTECC project. In: Proceedings of IHM 2024, Paris, France (2024)"},{"key":"4_CR8","doi-asserted-by":"publisher","unstructured":"Russo, E., Costa, G., Armando, A.: Building next generation cyber ranges with CRACK. Comput. Secur. 95 (2020). https:\/\/doi.org\/10.1016\/j.cose.2020.101837","DOI":"10.1016\/j.cose.2020.101837"},{"key":"4_CR9","doi-asserted-by":"publisher","unstructured":"Yamin, M.M., Katt, B., Gkioulos, V.: Cyber ranges and security testbeds: scenarios, functions, tools and architecture (2020). https:\/\/doi.org\/10.1016\/j.cose.2019.101636","DOI":"10.1016\/j.cose.2019.101636"},{"key":"4_CR10","unstructured":"Limousin, P.: Contribution \u00e0 la sc\u00e9narisation p\u00e9dagogique d\u2019exercices de crise (PhD thesis). \u00c9cole Nationale Sup\u00e9rieure des Mines de Saint-\u00c9tienne, Saint-\u00c9tienne (2017)"},{"key":"4_CR11","unstructured":"Tena-Chollet, F.: \u00c9laboration d\u2019un environnement semi-virtuel de formation \u00e0 la gestion strat\u00e9gique de crise, bas\u00e9 sur la simulation multi-agents (PhD thesis). \u00c9cole Nationale Sup\u00e9rieure des Mines de Saint-\u00c9tienne, Saint-\u00c9tienne (2012)"},{"key":"4_CR12","unstructured":"Stramler, J.H.: The dictionary for human factors\/ergonomics. CRC Press (1993)"},{"key":"4_CR13","unstructured":"Cegarra, J., Morgado, N.: \u00c9tude des propri\u00e9t\u00e9s de la version francophone du NASA-TLX. In: EPIQUE 2009: 5\u00e8me Colloque de Psychologie Ergonomique, pp. 233\u2013239 (2009)"},{"issue":"1","key":"4_CR14","doi-asserted-by":"publisher","first-page":"85","DOI":"10.1518\/001872095779049462","volume":"37","author":"MJ Adams","year":"1995","unstructured":"Adams, M.J., Tenney, Y.J., Pew, R.W.: Situation awareness and the cognitive management of complex systems. Hum. Factors 37(1), 85\u2013104 (1995)","journal-title":"Hum. Factors"},{"key":"4_CR15","unstructured":"Taylor, R.M.: Experiential measures: performance-based self-ratings of situational awareness. In: Garland, D.J., Endsley, M.R. (eds.) Experimental Analysis and Measurement of Situation Awareness. Embry-Riddle Aeronautical University Press, Daytona Beach, FL, USA (1995)"},{"key":"4_CR16","doi-asserted-by":"publisher","unstructured":"Nemeth, C., Wears, R.L., Patel, S., Rosen, G., Cook, R.: Resilience is not control: healthcare, crisis management, and ICT. Cogn. Technol. Work 13, 189\u2013202 (2011). https:\/\/doi.org\/10.1007\/s10111-011-0174-7","DOI":"10.1007\/s10111-011-0174-7"},{"key":"4_CR17","doi-asserted-by":"crossref","unstructured":"Witmer, B.G., Singer, M.J.: Measuring presence in virtual environments: a presence questionnaire. Presence Teleoper. Virtual Environ. 7(3), 225\u2013240 (1998)","DOI":"10.1162\/105474698565686"},{"key":"4_CR18","doi-asserted-by":"publisher","first-page":"1009","DOI":"10.1111\/1468-5973.12464","volume":"31","author":"E Petridou","year":"2023","unstructured":"Petridou, E., Sparf, J., Hemmingsson, O., Pihl, K.: Immersive simulation and experimental design in risk and crisis management: implications for learning. J. Contingencies Crisis Manag. 31, 1009\u20131017 (2023). https:\/\/doi.org\/10.1111\/1468-5973.12464","journal-title":"J. Contingencies Crisis Manag."},{"key":"4_CR19","doi-asserted-by":"publisher","unstructured":"Cummings, J.J., Bailenson, J.N.: How immersive is enough? A meta-analysis of the effect of immersive technology on user presence. Media Psychol. 19, 272\u2013309 (2016). https:\/\/doi.org\/10.1080\/15213269.2015.1015740","DOI":"10.1080\/15213269.2015.1015740"},{"key":"4_CR20","doi-asserted-by":"publisher","unstructured":"Kuhail, M.A., Elsayary, A., Farooq, S., Alghamdi, A.: Exploring Immersive Learning Experiences: A Survey (2022). https:\/\/doi.org\/10.3390\/informatics9040075","DOI":"10.3390\/informatics9040075"},{"key":"4_CR21","unstructured":"Robilliard, G., Bouchard, S., Renaud, P., Cournoyer, L.: Validation canadienne-fran\u00e7aise de deux mesures importantes en r\u00e9alit\u00e9 virtuelle: l\u2019Immersive Tendencies Questionnaire et le Presence Questionnaire. Poster presented at the 25th Annual Conference of the Soci\u00e9t\u00e9 Qu\u00e9b\u00e9coise pour la Recherche en Psychologie (SQRP), Trois-Rivi\u00e8res, Canada, 1\u20133 November (2002)"},{"key":"4_CR22","unstructured":"Ahmad, A.: A cyber exercise post assessment framework: in Malaysia perspectives (PhD thesis) University of Glasgow, Glasgow (2016)"}],"container-title":["Lecture Notes in Computer Science","Availability, Reliability and Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-032-00644-8_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,8]],"date-time":"2025-09-08T17:50:26Z","timestamp":1757353826000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-032-00644-8_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"ISBN":["9783032006462","9783032006448"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-3-032-00644-8_4","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"9 August 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ARES","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Availability, Reliability and Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Ghent","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Belgium","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"11 August 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14 August 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ares-12025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/2025.ares-conference.eu","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}