{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,2]],"date-time":"2026-01-02T01:29:44Z","timestamp":1767317384215,"version":"3.48.0"},"publisher-location":"Cham","reference-count":34,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783032126597","type":"print"},{"value":"9783032126603","type":"electronic"}],"license":[{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026]]},"DOI":"10.1007\/978-3-032-12660-3_9","type":"book-chapter","created":{"date-parts":[[2026,1,2]],"date-time":"2026-01-02T01:25:32Z","timestamp":1767317132000},"page":"108-122","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["From Theory to Practice: Leveraging VR and CTF Competitions for Advanced Cybersecurity Education"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0009-0008-9865-5326","authenticated-orcid":false,"given":"Triin","family":"Muulmann","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2012-5700","authenticated-orcid":false,"given":"Ricardo Gregorio","family":"Lugo","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1362-1733","authenticated-orcid":false,"given":"Rain","family":"Ottis","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2026,1,2]]},"reference":[{"key":"9_CR1","unstructured":"UNESCO World Water Assessment Programme: The United Nations World Water Development Report 2024: water for prosperity and peace. UNESDOC (2024)"},{"key":"9_CR2","unstructured":"Cardenas, A., Amin, S., Sastry, S.: Research Challenges for the Security of Control Systems. in 3rd USENIX Workshop on Hot Topics in Security, San Jose (2008)"},{"key":"9_CR3","doi-asserted-by":"crossref","unstructured":"Hassanzadeh, A., Rasekh, A., Galelli, S., Aghashahi, M., Taormina, R., Ostfeld, A., Banks, M.K.: A review of cybersecurity incidents in the water sector. J. Environ. Eng. (2020)","DOI":"10.1061\/(ASCE)EE.1943-7870.0001686"},{"issue":"2","key":"9_CR4","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1109\/MIAS.2019.2943630","volume":"26","author":"R Paes","year":"2019","unstructured":"Paes, R., Mazur, D.C., Venne, B.K., Ostrzenski, J.: A guide to securing industrial control networks: Integrating IT and OT systems. IEEE Ind. Appl. Mag. 26(2), 47\u201353 (2019)","journal-title":"IEEE Ind. Appl. Mag."},{"key":"9_CR5","doi-asserted-by":"crossref","unstructured":"Patriarca, R., Simone, F., Di Gravio, G.: Modelling cyber resilience in a water treatment and distribution system. Reliab. Eng. Syst. Saf. (2022)","DOI":"10.1016\/j.ress.2022.108653"},{"key":"9_CR6","doi-asserted-by":"crossref","unstructured":"Stouffer, K, Pease, M., Tang, C., Zimmerman, M., Pillitteri, V., Lightman, S., Hahn, A., Saravia, S., Sherule, A., Thompson, M.: Guide to Operational Technology (OT) Security. Computer security resource center (2023)","DOI":"10.6028\/NIST.SP.800-82r3"},{"key":"9_CR7","unstructured":"E. Commission, European Commission: https:\/\/eur-lex.europa.eu\/eli\/dir\/2016\/1148\/oj\/eng. Accessed 10 Febr 2025"},{"key":"9_CR8","doi-asserted-by":"crossref","unstructured":"Michalec, O., Milyaeva, S., & Rashid, A., Reconfiguring governance: How cyber security regulations are reconfiguring water governance., Regulation & Governance, pp. 1325\u20131342 (2022)","DOI":"10.1111\/rego.12423"},{"key":"9_CR9","unstructured":"E. Commission, European Skills, Competences, Qualifications and Occupations (ESCO): European Commission. https:\/\/esco.ec.europa.eu\/en. Accessed 03 Febr 2025"},{"key":"9_CR10","unstructured":"E. Commission, European Commission\u2019s Joint Research Centre: https:\/\/joint-research-centre.ec.europa.eu\/digcomp\/digcomp-framework_en. Accessed 14 June 2024"},{"key":"9_CR11","unstructured":"Muulmann, T.: D2.6 Raport on roles and competence needs. Manuscript submitted for Digital Europe Programme: Project ATHENA (2024)"},{"key":"9_CR12","doi-asserted-by":"crossref","unstructured":"Karampidis, K., Panagiotakis, S., Vasilakis, M., Markakis, E. K., Papadourakis, G., Industrial cybersecurity 4.0: Preparing the operational technicians for industry 4.0. In 2019 IEEE 24th international workshop on computer aided modeling and design of communication links and networks (CAMAD), pp. 1\u20136 (2019)","DOI":"10.1109\/CAMAD.2019.8858454"},{"key":"9_CR13","unstructured":"Ramazan, C.A., Coffy, P.M., Lemons, J.: Building the Operational Technology (OT) Cybersecurity Workforce: What are Employers Looking for? Journal of Cybersecurity Education Research and Practice (JCERP) (2024)"},{"key":"9_CR14","doi-asserted-by":"crossref","unstructured":"Caliskan, E., Topgul, M. O., Ottis, R.: Cyber security exercises: A comparison of participant evaluation metrics and scoring systems. In Strategic Cyber Defense, pp. 180\u2013190 (2017)","DOI":"10.3233\/978-1-61499-771-9-180"},{"key":"9_CR15","doi-asserted-by":"crossref","unstructured":"Gonzalez, H., Llamas, R., Rivas, O. M.: Using a CTF Tournament for Reinforcing Learned Skills in Cybersecurity Course. Res. Comput. Sci. (2019)","DOI":"10.13053\/rcs-148-5-15"},{"key":"9_CR16","unstructured":"Dabrowski, A., Kammerstetter, M., Thamm, E., Weippl, E., Kastner, W.: Leveraging competitive gamification for sustainable fun and profit in security education. In 2015 USENIX Summit on Gaming, Games, and Gamification in Security Education (2015)"},{"key":"9_CR17","unstructured":"Carlisle, M., Chiaramonte, M., Caswell, D.: Using {CTFs} for an Undergraduate Cyber Education. In 2015 USENIX Summit on Gaming, Games, and Gamification in Security Education (2015)"},{"key":"9_CR18","doi-asserted-by":"crossref","unstructured":"Maennel, K.: Learning analytics perspective: Evidencing learning from digital datasets in cybersecurity exercises. In 2020 IEEE European symposium on security and privacy workshops (EuroS&PW), pp. 27\u201336 (2020)","DOI":"10.1109\/EuroSPW51379.2020.00013"},{"key":"9_CR19","unstructured":"Vigna, G., Borgolte, K., Corbetta, J., Doup\u00e9, A., Fratantonio, Y., Invernizzi, L., ... Shoshitaishvili, Y.:Ten Years of {iCTF}: The Good, The Bad, and The Ugly. In 2014 USENIX Summit on Gaming, Games, and Gamification in Security Education (2014)"},{"key":"9_CR20","unstructured":"Time, C.: CTF Time. CTFtime. https:\/\/ctftime.org\/ctfs. Accessed 1 Dec 2024"},{"key":"9_CR21","doi-asserted-by":"crossref","unstructured":"Leune, K., Petrilli Jr, S. J.: Using capture-the-flag to enhance the effectiveness of cybersecurity education. In: Proceedings of the 18th annual conference on information technology education, pp. 47\u201352 (2017)","DOI":"10.1145\/3125659.3125686"},{"key":"9_CR22","unstructured":"Trickel, E., Disperati, F., Gustafson, E., Kalantari, F., Mabey, M., Tiwari, N., ... Vigna, G.: Shell we play a game? {CTF-as-a-service} for security education. In 2017 USENIX Workshop on Advances in Security Education (2017)"},{"key":"9_CR23","doi-asserted-by":"crossref","unstructured":"Pramod, D.: Gamification in cybersecurity education; a state of the art review and research agenda. J. Appl. Res. High. Educ. (2024)","DOI":"10.1108\/JARHE-02-2024-0072"},{"key":"9_CR24","doi-asserted-by":"crossref","unstructured":"Riva, G., Botella, C., Ba\u00f1os, R., Mantovani, F., Garc\u00eda-Palacios, A., Quero, S., ... Gaggioli, A.: Presence-inducing media for mental health applications. Immersed in media: Telepresence theory, measurement & technology, pp. 283\u2013332 (2015)","DOI":"10.1007\/978-3-319-10190-3_12"},{"key":"9_CR25","doi-asserted-by":"crossref","unstructured":"Chekhovskoy, Y., Plaksiy, K., Nikiforov, A., Miloslavskaya, N.: The Use of Virtual Reality Technologies in the Specialists\u2019 Training in the Field of Information Security. Procedia Comput. Sci. 213, pp. 223\u2013231 (2022)","DOI":"10.1016\/j.procs.2022.11.060"},{"key":"9_CR26","doi-asserted-by":"crossref","unstructured":"Ahmed, A., Watterson, C., Alhashmi, S., Gaber, T.: How universities teach cybersecurity courses online: a systematic literature review. Frontiers Comput. Sci. 6 (2024)","DOI":"10.3389\/fcomp.2024.1499490"},{"key":"9_CR27","unstructured":"Wagner, P., Alharthi, D.: Leveraging VR\/AR\/MR\/XR Technologies to Improve Cybersecurity Education, Training, and Operations. J. Cybersecurity Educ. Res. Pract. (2024)"},{"key":"9_CR28","doi-asserted-by":"crossref","unstructured":"Oktavianto, R., Erik Sibarani, B.: Building Cyber-Savvy Generation: 15 Years of Research on Cybersecurity Education and Future Research Agendas. Build. Cyber-Savvy Gener. (2024)","DOI":"10.2139\/ssrn.5004673"},{"issue":"11","key":"9_CR29","doi-asserted-by":"publisher","first-page":"777","DOI":"10.7326\/M14-2385","volume":"162","author":"B Hutton","year":"2015","unstructured":"Hutton, B., Salanti, G., Caldwell, D.M., Chaimani, A., Schmid, C.H., Cameron, C.: \u2026 & Moher, D, The PRISMA extension statement for reporting of systematic reviews incorporating network meta-analyses of health care interventions: checklist and explanations. Ann. Intern. Med. 162(11), 777\u2013784 (2015)","journal-title":"Ann. Intern. Med."},{"key":"9_CR30","doi-asserted-by":"crossref","unstructured":"Hassenfeldt, C., Jacques, J., Baggili, I.: Exploring the learning efficacy of digital forensics concepts and bagging & tagging of digital devices in immersive virtual reality. Forensic Sci. Int. Digit. Invest. 33 (2020)","DOI":"10.1016\/j.fsidi.2020.301011"},{"key":"9_CR31","doi-asserted-by":"crossref","unstructured":"Mathis, F., O\u2019Hagan, J., Khamis, M., Vaniea, K.: Virtual reality observations: Using virtual reality to augment lab-based shoulder surfing research. In: 2022 IEEE Conference on Virtual Reality and 3D User Interfaces (VR), pp. 291\u2013300 (2022)","DOI":"10.1109\/VR51125.2022.00048"},{"key":"9_CR32","doi-asserted-by":"crossref","unstructured":"Korkiakoski, M., Antila, A., Annamaa, J., Sheikhi, S., Alavesa, P., Kostakos, P.: Hack the Room: Exploring the potential of an augmented reality game for teaching cyber security. in in Proceedings of the Augmented Humans International Conference 2023 (2023)","DOI":"10.1145\/3582700.3583955"},{"key":"9_CR33","doi-asserted-by":"crossref","unstructured":"Munsinger, B., Beebe, N., Richardson, T.: Virtual reality for improving cyber situational awareness in security operations centers. Comput. Secur. 132 (2023)","DOI":"10.1016\/j.cose.2023.103368"},{"key":"9_CR34","unstructured":"Vuorikari, R., Kluzer, S., Punie, Y.: The Digital Competence Framework for Citizens. 27 07 2024 (2024). https:\/\/joint-research-centre.ec.europa.eu\/digcomp\/digcomp-framework_en#definition-of-digital-competence"}],"container-title":["Lecture Notes in Computer Science","HCI International 2025 \u2013 Late Breaking Papers"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-032-12660-3_9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,1,2]],"date-time":"2026-01-02T01:25:36Z","timestamp":1767317136000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-032-12660-3_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026]]},"ISBN":["9783032126597","9783032126603"],"references-count":34,"URL":"https:\/\/doi.org\/10.1007\/978-3-032-12660-3_9","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026]]},"assertion":[{"value":"2 January 2026","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"HCII","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Human-Computer Interaction","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Gothenburg","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Sweden","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22 June 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"27 June 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"27","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"hcii2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/2025.hci.international\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}