{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,12]],"date-time":"2025-08-12T21:30:23Z","timestamp":1755034223686,"version":"3.41.0"},"reference-count":80,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,4,22]],"date-time":"2025-04-22T00:00:00Z","timestamp":1745280000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,4,22]],"date-time":"2025-04-22T00:00:00Z","timestamp":1745280000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,4,22]]},"DOI":"10.1109\/educon62633.2025.11016494","type":"proceedings-article","created":{"date-parts":[[2025,6,3]],"date-time":"2025-06-03T17:42:47Z","timestamp":1748972567000},"page":"1-9","source":"Crossref","is-referenced-by-count":1,"title":["Tailored Extended Reality Environments for Education and Training in Cybersecurity: Engagement Beyond Awareness"],"prefix":"10.1109","author":[{"given":"Elizabeth R.","family":"Noble","sequence":"first","affiliation":[{"name":"&#x00D8;stfold University College,Faculty of Health, Welfare and Organization,Halden,Norway"}]},{"given":"Torvald F.","family":"Ask","sequence":"additional","affiliation":[{"name":"&#x00D8;stfold University College,Faculty of Health, Welfare and Organization,Halden,Norway"}]},{"given":"Benjamin J.","family":"Knox","sequence":"additional","affiliation":[{"name":"&#x00D8;stfold University College,Faculty of Health, Welfare and Organization,Halden,Norway"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-61569-6_15"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/ICSC60084.2023.10349976"},{"volume-title":"PRC state-sponsored actors compromise and maintain persistent access to U.S. critical infrastructure, AA24\u2013038A","year":"2024","key":"ref3"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-58625-0_35"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.3389\/feduc.2022.998335"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.promfg.2015.07.178"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-71368-7_2"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-90238-4"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1093\/cybsec\/tyac001"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/cogsima.2012.6188386"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-39952-2_18"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1080\/08995605.2018.1478546"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1177\/1541931218621161"},{"volume-title":"European cybersecurity skills framework role profiles","year":"2022","key":"ref14"},{"key":"ref15","article-title":"Mississippi cybersecurity labor market analysis","volume-title":"Technical report, The University of Southern Mississippi","author":"Keeton","year":"2019"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.6028\/NIST.SP.800-181"},{"volume-title":"Strengths and knowledge gaps identified from cybersecurity education and training programs, and the implications for operational technology personnel in critical infrastructures: A scoping review","year":"2024","author":"Torgersen","key":"ref17"},{"key":"ref18","first-page":"1","volume-title":"Cybersecurity culture guidelines - behavioural aspects of cybersecurity","author":"Drogkaris","year":"2018"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-39454-6_70"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/MTICTI53925.2021.9664771"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/2994475.2994484"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.3389\/fpsyg.2020.01390"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1177\/21582440231156367"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2019.101607"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1016\/j.edurev.2020.100322"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.3389\/fpsyg.2023.1253549"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.3389\/feduc.2023.988043"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.3389\/fpsyg.2022.885619"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/hicss.2014.377"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1016\/j.compedu.2019.103707"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.3390\/app11199266"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.11591\/edulearn.v12i1.7736"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.25304\/rlt.v26.2140"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1080\/0144929X.2016.1212929"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1177\/0018720820904229"},{"volume-title":"Cybersecurity in critical infrastructure: understanding the needs of operational technology personnel for developing trainings in cybersecurity awareness and behaviour","year":"2025","author":"Noble","key":"ref36"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2020.101875"},{"key":"ref38","first-page":"369","article-title":"Enhancing cyber defense situational awareness using 3D visualizations","volume-title":"Proceedings of the 13th International Conference on Cyber Warfare and Security ICCWS","author":"Kullman","year":"2018"},{"key":"ref39","first-page":"257","article-title":"Operator impressions of 3D visualizations for cybersecurity analysts","volume-title":"Proceedings of the 18th European Conference on Cyber Warfare and Security, ECCWS 2019","author":"Kullman","year":"2019"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.3389\/fdata.2023.1042783"},{"volume-title":"The production of space","year":"1991","author":"Lefebvre","key":"ref41"},{"volume-title":"Critique of everyday life","year":"2014","author":"Lefebvre","key":"ref42"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1093\/ct\/qty025"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1016\/j.jenvp.2019.04.008"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4684-8753-4_1"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.52842\/conf.caadria.2004.871"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1080\/08874417.2020.1845583"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-98827-6_11"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2009.12.005"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1037\/0033-295x.84.2.191"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1145\/3290607.3312935"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2009.05.008"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijhcs.2018.11.003"},{"key":"ref54","first-page":"1","article-title":"The study of cybersecurity self-efficacy: a systematic literature review of methodology","volume-title":"USENIX Symposium on Usable Privacy and Security (SOUPS)","author":"Borgert","year":"2021"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1016\/j.ifacol.2019.12.168"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1080\/713611442"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.3389\/fpsyg.2017.00422"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1002\/tea.3660020306"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1016\/b978-012109890-2\/50031-7"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.4135\/9781446221129.n6"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1207\/s15326985ep2802_3"},{"volume-title":"Self-efficacy: the exercise of control","year":"1997","author":"Bandura","key":"ref62"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.3102\/0013189X013006004"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.7551\/mitpress\/7716.001.0001"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.4324\/9780203797327"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1080\/00220670209596583"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1007\/s10464-007-9153-9"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.4324\/9780203874844.ch6"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1007\/s11162-009-9130-2"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.5152\/alphapsychiatry.2023.231144"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1186\/s12888-022-03779-5"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.3389\/fpsyg.2023.1153377"},{"issue":"1","key":"ref73","first-page":"307","article-title":"Guide for constructing self-efficacy scales","volume":"5","author":"Bandura","year":"2006","journal-title":"Self Efficacy Beliefs Adolesc."},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2023.3241809"},{"volume-title":"Fixing the metaverse: augmented reality pioneer shares ideas for avoiding dystopia","year":"2021","author":"Rosenberg","key":"ref75"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-28076-4_5"},{"volume-title":"Russian military cyber actors target U.S. and global Critical Infrastructure","year":"2024","key":"ref77"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1093\/ct\/qtab008"},{"issue":"4","key":"ref79","first-page":"1","article-title":"The human factors and cybersecurity policy","volume":"20","author":"Qashqari","year":"2020","journal-title":"International Journal of Computer Science and Network Security"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.1080\/08874417.2021.1903367"}],"event":{"name":"2025 IEEE Global Engineering Education Conference (EDUCON)","start":{"date-parts":[[2025,4,22]]},"location":"London, United Kingdom","end":{"date-parts":[[2025,4,25]]}},"container-title":["2025 IEEE Global Engineering Education Conference (EDUCON)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11016265\/11016287\/11016494.pdf?arnumber=11016494","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,4]],"date-time":"2025-06-04T05:11:39Z","timestamp":1749013899000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11016494\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,4,22]]},"references-count":80,"URL":"https:\/\/doi.org\/10.1109\/educon62633.2025.11016494","relation":{},"subject":[],"published":{"date-parts":[[2025,4,22]]}}}