Abstract
Emerging technologies and the globalization require constant investment in people and their performance in actual and virtual environments. New technologies such as autonomous systems, machine learning and artificial intelligence (AI) radically re-contextualize the human dimension of the organization. Technological developments are changing the ways people experience the physical and the virtual environments. Strategic changes have revealed new critical vulnerabilities such as social media-based disinformation campaigning with impact on the human aspects at state, societal, organizational and individual levels. Scenarios of gathering information, committing fraud or getting access to critical systems are often used for follow-up actions. Cybersecurity education and training aim to raise the level of expertise, skills and competences and ensure better performance in complex situations in cyber space. Researchers have addressed assumptions, models, concepts and cognitive aspects of humans performing in the cyber domain. However, the human cognitive learning and human performance approaches in Virtual Reality (VR), Augmented Reality (AR) and Mixed Reality (XM) and Cyber Range (CR) learning platform design are only partly touched. CRs are becoming crucial means in acquisition of skills and knowledge but also to augment and mimic human cognitive behaviour for cognitive agents. Empirical studies and evaluations of the capabilities, tools and techniques for enhancing organizational cyber resilience by the human performance to better face cyber-attacks are needed. The purpose of this paper is to provide a literature review, suggest viewpoints on cybersecurity training and education and to study the current capabilities of CRs. This paper includes a literature review to support human performance and provides empirical findings on CR capabilities, interactions and learning features. The results of this study can be used as a baseline for future initiatives towards the development of CRs in accordance with human cognitive learning and future improvements in design. Furthermore, the intention is to constructively promote discussion on current issues about humans in cyber physical systems and cybersecurity domain and thus boost multidisciplinary studies to enhance cyber awareness in different sectors.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Boyle, E., et al.: An update to the systematic literature review of empirical evidence of the impacts and outcomes of computer games and serious games. Comput. Educ. 94, 178–192 (2016)
Collins, J., Futter, A.: Reassessing the Revolution in Military Affairs: Transformation, Evolution and Lessons Learnt. Palgrave, London (2015)
Couretas, J.: An Introduction to Cyber Modeling and Simulation. Wiley, New York (2019)
Dankbaar, M., et al.: Comparative Effectiveness of a Serious Game and an E-Module to Support Patient Safety Knowledge and Awareness. BMC Medical Education (2017). https://bmcmededuc.biomedcentral.com/articles/10.1186/s12909-016-0836-5
Davis, J., Magrath, S.: A Survey of Cyber Ranges and Testbeds. Cyber Electronic Warfare Division. Commonwealth of Australia 2013, Oct 2013
Aaltola, K., Taitto, P.: Utilising experiential and organizational learning theories to improve human performance in cyber training. Inf. Secur. Int. J. 43(2), 123–133 (2019). https://doi.org/10.11610/isij.4311
de Freitas, S.: Education in Computer Generated Environments. Routledge, New York and London (2014)
Kolb, D.: Experiential learning: Experience as the source of learning and development. 1st Edition. Prentice-Hall, Englewood Cliffs, NJ (1984)
Dix, A.: Human–computer interaction, foundations and new paradigms. J. Vis. Lang. Comput. 42(2017), 122–134 (2017)
Flavián, C., Ibáñez-Sánchez, S., Orús, C.: The impact of virtual, augmented and mixed reality technologies on the customer experience. J. Bus. Res. 100, 547–560 (2019)
Futter, A.: Cyber Threats and Nuclear Weapons—New Questions for Command and Control, Security and Strategy. RUSI, London (2016)
Grunewald, D., Lützenberger, M., Chinnow, J.: Agent-based network security simulation. In: Proceedings of the 10th International Conference on Autonomous Agents and Multiagent Systems, Taipei, Taiwan, 2–6 May 2011, pp. 1325–1326. International Foundation for Autonomous Agents and Multiagent Systems, Richland, SC (2011)
Happa, J., Glencross, M., Steed, A.: Cyber security threats and challenges in collaborative mixed-reality. Front. ICT 6, 5 (2019). https://doi.org/10.3389/fict.2019.00005
Ihde, D.: Technology and the Lifeworld: From Garden to Earth. Indiana University Press, Bloomington (1990)
Jones, R., O’Crady, R., Nicholson, D., Hoffman, R., Brunch, L., Bradshaw, J., Bolton, A.: Modeling and integrating cognitive agents within the emerging cyber domain. In: Interservice/Industry Training, Simulation, and Education Conference (I/ITSEC) 2015, Paper No. #15232 (2015)
Kabil, A., Duval, T., Cuppens, N., Le Comte, G., Halgand, Y., Ponchel, C.: Why should we use 3d collaborative virtual environments for cyber security? In: IEEE Fourth VR International Workshop on Collaborative Virtual Environments (IEEEVR 2018), pp. 1–8. IEEE, Reutlingen (2018)
Kaplan, F.: Dark Territory: The Secret History of Cyber War. Simon & Schuster, London (2016)
Knapp, K.: The Gamification of Learning and Instruction: Game-based Methods and Strategies for Training and Education. Pfeiffer and Company Publishers (2012)
Linkov, I., et al.: Comparative, collaborative, and integrative risk governance for emerging technologies. In: Environment Systems and Decisions. Springer, Berlin, 4 May 2018. https://doi.org/10.1007/s10669-018-9686-5
McGonigal, J.: Reality is Broken: How Games Make Us Better and How they Can Change the World. Penguin Press, USA (2011)
Milgram, P., Kishino, F.: A taxonomy of mixed reality visual displays. IEICE Trans. Inform. Syst. E77-D, 1321–1329 (1994)
Moskal, S., Yang, S., Kuhl, M.: Cyber threat assessment via attack scenario simulation using an integrated adversary and network modeling approach. J. Defense Model. Simul. 15(1), 13–29 (2018). https://doi.org/10.1177/1548512917725408
Ostrom, A., Parasuraman, A., Bowen, D., Patricio, L., Voss, A.: Service research priorities in a rapidly changing context. J. Serv. Res. 18(2), 127–159 (2015)
Patrício, L., Fisk, R., Falcão e Cunha, J., Constantine, L.: Designing multi-interface service experiences: the service experience blueprint. J. Serv. Res. 10(4), 318–334 (2011)
Piskozub, M., Creese, S., Happa, J.: Dynamic re-planning for cyberphysical situational awareness. In: CPS Conference on Computational Science and Computational Intelligence, Las Vegas, NV, pp. 1–6 (2017)
Priyadarshini, I.: Features and Architecture of the Modern Cyber Range: A Qualitative Analysis and Survey. University of Delaware (2018). https://udspace.udel.edu/handle/19716/23789 © 2018 Ishaani Priyadarshini
Raybourn, E., Kunz, M., Fritz, D., Urias, V.: A zero-entry cyber range environment for future learning ecosystems. In: Koç, Ç. (eds.) Cyber-Physical Systems Security. Springer, Cham. https://doi.org/10.1007/978-3-319-98935-8_5
Tabansky, L.: Basic Concepts in Cyber Warfare. Mil. Strateg. Stud. 3(1), 75–92 (2011)
Tussyadiah, I., Jung, T., Tom Dieck, M.: Embodiment of wearable augmented reality technology in tourism experiences. J. Travel Res. 57(5), 597–611 (2017)
Kolb, A., Kolb, D.: Learning styles and learning spaces: Enhancing experiential learning in higher education. Acad. Manag. Learn. Educ. 4(2), 193–212 (2005)
Wang, B., Cai, J., Zhang, S.: A network security assessment model based on attack-defense game theory. In: Proceedings of the IEEE 2010 International Conference on Computer Application and System Modeling (ICCASM), Taiyuan, China, 22–24 Oct 2010, pp. V3-639–V3-643. IEEE, Piscataway, NJ
Wiener, N.: Cybernetics or Control and Communication in the Animal and the Machine. The MIT Press, Cambridge, MA (1948)
Kraiger, K., Passmore, J., Rebelo dos Santos, N., Malvezzi, S.: The Wiley blackwell handbook of the psychology of training, development, and performance Improvement. Wiley (2014)
Tagarev, T., Pappalardo, S., Stoianov, N.: A logical model for multi-sector cyber risk management & security. Inf. Secur. Int. J. 47(1), 13–26 (2020)
Guttentag, D.: Virtual reality: Applications and implications for tourism. Tourism Manag. 31(5), 637–651 (2010)
Szilárd, S., Benedek, A., Ionel-Cioca, L.: Soft skills development needs and methods in micro-companies of ICT Sector. Soc. Behav. Sci. 238, 94–103. Elsevier (2018)
Burton, J., Lain, C.: Desecuritising cybersecurity: towards a societal approach. J Cyber Policy (2020). https://doi.org/10.1080/23738871.2020.1856903
Lehto, M., Limnéll, J.: Strategic leadership in cyber security, case Finland. Inf. Secur. J. Global Perspect. (2020). https://doi.org/10.1080/19393555.2020.1813851
Wang, R., Newton, S.: A review of Kolb’s learning styles in the context of emerging interactive learning environments. In: AUBEA 2012: Proceedings of the 37th International Conference of the Australasian Universities Building Educators Association (pp. 191–199). University of New South Wales (2012)
Beitzel, S., Dykstra, J., Toliver, P., Youzwak, J.: Exploring 3d cybersecurity visualization with the microsoft hololens. In: International Conference on Applied Human Factors and Ergonomics (pp. 197–207). Springer, Cham (2017)
Dalsgaard, C.: Social software: E-learning beyond learning management systems. Eur. J. Open, Distance E-learning 9(2) (2006)
Means, B., Toyama, Y., Murphy, R., Bakia, M., Jones, K.: Evaluation of evidence-based practices in online learning: A meta-analysis and review of online learning studies. Project Report. Centre for Learning Technology (2009)
Siemens, G.: Connectivism: a learning theory for the digital age. Instruct. Technol. Distance Learning 2(1) (2005)
Friedrich, P.: Web-based co-design. Social media tools to enhance user-centered design and innovation process, University of Tampere (2013)
Björk, S., Holopainen, J.: Games and design patterns. The game design reader, pp. 410–437 (2006)
Voelcker-Rehage, C.: Motor-skill learning in older adults—a review of studies on age-related differences. Eur. Rev. Aging Phys. Act. 5, 5–16 (2008)
Walker-Roberts, S., Hammoudeh, M., Aldabbas, O., et al.: Threats on the horizon: understanding security threats in the era of cyber-physical systems. J. Supercomput. 76, 2643–2664 (2020). https://doi.org/10.1007/s11227-019-03028-9
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this chapter
Cite this chapter
Aaltola, K. (2021). Empirical Study on Cyber Range Capabilities, Interactions and Learning Features. In: Tagarev, T., Atanassov, K.T., Kharchenko, V., Kacprzyk, J. (eds) Digital Transformation, Cyber Security and Resilience of Modern Societies. Studies in Big Data, vol 84. Springer, Cham. https://doi.org/10.1007/978-3-030-65722-2_26
Download citation
DOI: https://doi.org/10.1007/978-3-030-65722-2_26
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-65721-5
Online ISBN: 978-3-030-65722-2
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)