Skip to main content

Empirical Study on Cyber Range Capabilities, Interactions and Learning Features

  • Chapter
  • First Online:
Digital Transformation, Cyber Security and Resilience of Modern Societies

Part of the book series: Studies in Big Data ((SBD,volume 84))

Abstract

Emerging technologies and the globalization require constant investment in people and their performance in actual and virtual environments. New technologies such as autonomous systems, machine learning and artificial intelligence (AI) radically re-contextualize the human dimension of the organization. Technological developments are changing the ways people experience the physical and the virtual environments. Strategic changes have revealed new critical vulnerabilities such as social media-based disinformation campaigning with impact on the human aspects at state, societal, organizational and individual levels. Scenarios of gathering information, committing fraud or getting access to critical systems are often used for follow-up actions. Cybersecurity education and training aim to raise the level of expertise, skills and competences and ensure better performance in complex situations in cyber space. Researchers have addressed assumptions, models, concepts and cognitive aspects of humans performing in the cyber domain. However, the human cognitive learning and human performance approaches in Virtual Reality (VR), Augmented Reality (AR) and Mixed Reality (XM) and Cyber Range (CR) learning platform design are only partly touched. CRs are becoming crucial means in acquisition of skills and knowledge but also to augment and mimic human cognitive behaviour for cognitive agents. Empirical studies and evaluations of the capabilities, tools and techniques for enhancing organizational cyber resilience by the human performance to better face cyber-attacks are needed. The purpose of this paper is to provide a literature review, suggest viewpoints on cybersecurity training and education and to study the current capabilities of CRs. This paper includes a literature review to support human performance and provides empirical findings on CR capabilities, interactions and learning features. The results of this study can be used as a baseline for future initiatives towards the development of CRs in accordance with human cognitive learning and future improvements in design. Furthermore, the intention is to constructively promote discussion on current issues about humans in cyber physical systems and cybersecurity domain and thus boost multidisciplinary studies to enhance cyber awareness in different sectors.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 149.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 199.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 199.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Boyle, E., et al.: An update to the systematic literature review of empirical evidence of the impacts and outcomes of computer games and serious games. Comput. Educ. 94, 178–192 (2016)

    Article  Google Scholar 

  2. Collins, J., Futter, A.: Reassessing the Revolution in Military Affairs: Transformation, Evolution and Lessons Learnt. Palgrave, London (2015)

    Book  Google Scholar 

  3. Couretas, J.: An Introduction to Cyber Modeling and Simulation. Wiley, New York (2019)

    Google Scholar 

  4. Dankbaar, M., et al.: Comparative Effectiveness of a Serious Game and an E-Module to Support Patient Safety Knowledge and Awareness. BMC Medical Education (2017). https://bmcmededuc.biomedcentral.com/articles/10.1186/s12909-016-0836-5

  5. Davis, J., Magrath, S.: A Survey of Cyber Ranges and Testbeds. Cyber Electronic Warfare Division. Commonwealth of Australia 2013, Oct 2013

    Google Scholar 

  6. Aaltola, K., Taitto, P.: Utilising experiential and organizational learning theories to improve human performance in cyber training. Inf. Secur. Int. J. 43(2), 123–133 (2019). https://doi.org/10.11610/isij.4311

  7. de Freitas, S.: Education in Computer Generated Environments. Routledge, New York and London (2014)

    Google Scholar 

  8. Kolb, D.: Experiential learning: Experience as the source of learning and development. 1st Edition. Prentice-Hall, Englewood Cliffs, NJ (1984)

    Google Scholar 

  9. Dix, A.: Human–computer interaction, foundations and new paradigms. J. Vis. Lang. Comput. 42(2017), 122–134 (2017)

    Article  Google Scholar 

  10. Flavián, C., Ibáñez-Sánchez, S., Orús, C.: The impact of virtual, augmented and mixed reality technologies on the customer experience. J. Bus. Res. 100, 547–560 (2019)

    Google Scholar 

  11. Futter, A.: Cyber Threats and Nuclear Weapons—New Questions for Command and Control, Security and Strategy. RUSI, London (2016)

    Google Scholar 

  12. Grunewald, D., Lützenberger, M., Chinnow, J.: Agent-based network security simulation. In: Proceedings of the 10th International Conference on Autonomous Agents and Multiagent Systems, Taipei, Taiwan, 2–6 May 2011, pp. 1325–1326. International Foundation for Autonomous Agents and Multiagent Systems, Richland, SC (2011)

    Google Scholar 

  13. Happa, J., Glencross, M., Steed, A.: Cyber security threats and challenges in collaborative mixed-reality. Front. ICT 6, 5 (2019). https://doi.org/10.3389/fict.2019.00005

    Article  Google Scholar 

  14. Ihde, D.: Technology and the Lifeworld: From Garden to Earth. Indiana University Press, Bloomington (1990)

    Google Scholar 

  15. Jones, R., O’Crady, R., Nicholson, D., Hoffman, R., Brunch, L., Bradshaw, J., Bolton, A.: Modeling and integrating cognitive agents within the emerging cyber domain. In: Interservice/Industry Training, Simulation, and Education Conference (I/ITSEC) 2015, Paper No. #15232 (2015)

    Google Scholar 

  16. Kabil, A., Duval, T., Cuppens, N., Le Comte, G., Halgand, Y., Ponchel, C.: Why should we use 3d collaborative virtual environments for cyber security? In: IEEE Fourth VR International Workshop on Collaborative Virtual Environments (IEEEVR 2018), pp. 1–8. IEEE, Reutlingen (2018)

    Google Scholar 

  17. Kaplan, F.: Dark Territory: The Secret History of Cyber War. Simon & Schuster, London (2016)

    Google Scholar 

  18. Knapp, K.: The Gamification of Learning and Instruction: Game-based Methods and Strategies for Training and Education. Pfeiffer and Company Publishers (2012)

    Google Scholar 

  19. Linkov, I., et al.: Comparative, collaborative, and integrative risk governance for emerging technologies. In: Environment Systems and Decisions. Springer, Berlin, 4 May 2018. https://doi.org/10.1007/s10669-018-9686-5

  20. McGonigal, J.: Reality is Broken: How Games Make Us Better and How they Can Change the World. Penguin Press, USA (2011)

    Google Scholar 

  21. Milgram, P., Kishino, F.: A taxonomy of mixed reality visual displays. IEICE Trans. Inform. Syst. E77-D, 1321–1329 (1994)

    Google Scholar 

  22. Moskal, S., Yang, S., Kuhl, M.: Cyber threat assessment via attack scenario simulation using an integrated adversary and network modeling approach. J. Defense Model. Simul. 15(1), 13–29 (2018). https://doi.org/10.1177/1548512917725408

    Article  Google Scholar 

  23. Ostrom, A., Parasuraman, A., Bowen, D., Patricio, L., Voss, A.: Service research priorities in a rapidly changing context. J. Serv. Res. 18(2), 127–159 (2015)

    Google Scholar 

  24. Patrício, L., Fisk, R., Falcão e Cunha, J., Constantine, L.: Designing multi-interface service experiences: the service experience blueprint. J. Serv. Res. 10(4), 318–334 (2011)

    Google Scholar 

  25. Piskozub, M., Creese, S., Happa, J.: Dynamic re-planning for cyberphysical situational awareness. In: CPS Conference on Computational Science and Computational Intelligence, Las Vegas, NV, pp. 1–6 (2017)

    Google Scholar 

  26. Priyadarshini, I.: Features and Architecture of the Modern Cyber Range: A Qualitative Analysis and Survey. University of Delaware (2018). https://udspace.udel.edu/handle/19716/23789 © 2018 Ishaani Priyadarshini

  27. Raybourn, E., Kunz, M., Fritz, D., Urias, V.: A zero-entry cyber range environment for future learning ecosystems. In: Koç, Ç. (eds.) Cyber-Physical Systems Security. Springer, Cham. https://doi.org/10.1007/978-3-319-98935-8_5

  28. Tabansky, L.: Basic Concepts in Cyber Warfare. Mil. Strateg. Stud. 3(1), 75–92 (2011)

    Google Scholar 

  29. Tussyadiah, I., Jung, T., Tom Dieck, M.: Embodiment of wearable augmented reality technology in tourism experiences. J. Travel Res. 57(5), 597–611 (2017)

    Google Scholar 

  30. Kolb, A., Kolb, D.: Learning styles and learning spaces: Enhancing experiential learning in higher education. Acad. Manag. Learn. Educ. 4(2), 193–212 (2005)

    Google Scholar 

  31. Wang, B., Cai, J., Zhang, S.: A network security assessment model based on attack-defense game theory. In: Proceedings of the IEEE 2010 International Conference on Computer Application and System Modeling (ICCASM), Taiyuan, China, 22–24 Oct 2010, pp. V3-639–V3-643. IEEE, Piscataway, NJ

    Google Scholar 

  32. Wiener, N.: Cybernetics or Control and Communication in the Animal and the Machine. The MIT Press, Cambridge, MA (1948)

    Google Scholar 

  33. Kraiger, K., Passmore, J., Rebelo dos Santos, N., Malvezzi, S.: The Wiley blackwell handbook of the psychology of training, development, and performance Improvement. Wiley (2014)

    Google Scholar 

  34. Tagarev, T., Pappalardo, S., Stoianov, N.: A logical model for multi-sector cyber risk management & security. Inf. Secur. Int. J. 47(1), 13–26 (2020)

    Google Scholar 

  35. Guttentag, D.: Virtual reality: Applications and implications for tourism. Tourism Manag. 31(5), 637–651 (2010)

    Google Scholar 

  36. Szilárd, S., Benedek, A., Ionel-Cioca, L.: Soft skills development needs and methods in micro-companies of ICT Sector. Soc. Behav. Sci. 238, 94–103. Elsevier (2018)

    Google Scholar 

  37. Burton, J., Lain, C.: Desecuritising cybersecurity: towards a societal approach. J Cyber Policy (2020). https://doi.org/10.1080/23738871.2020.1856903

  38. Lehto, M., Limnéll, J.: Strategic leadership in cyber security, case Finland. Inf. Secur. J. Global Perspect. (2020). https://doi.org/10.1080/19393555.2020.1813851

  39. Wang, R., Newton, S.: A review of Kolb’s learning styles in the context of emerging interactive learning environments. In: AUBEA 2012: Proceedings of the 37th International Conference of the Australasian Universities Building Educators Association (pp. 191–199). University of New South Wales (2012)

    Google Scholar 

  40. Beitzel, S., Dykstra, J., Toliver, P., Youzwak, J.: Exploring 3d cybersecurity visualization with the microsoft hololens. In: International Conference on Applied Human Factors and Ergonomics (pp. 197–207). Springer, Cham (2017) 

    Google Scholar 

  41. Dalsgaard, C.: Social software: E-learning beyond learning management systems. Eur. J. Open, Distance E-learning 9(2) (2006)

    Google Scholar 

  42. Means, B., Toyama, Y., Murphy, R., Bakia, M., Jones, K.: Evaluation of evidence-based practices in online learning: A meta-analysis and review of online learning studies. Project Report. Centre for Learning Technology (2009)

    Google Scholar 

  43. Siemens, G.: Connectivism: a learning theory for the digital age. Instruct. Technol. Distance Learning 2(1) (2005)

    Google Scholar 

  44. Friedrich, P.: Web-based co-design. Social media tools to enhance user-centered design and innovation process, University of Tampere (2013)

    Google Scholar 

  45. Björk, S., Holopainen, J.: Games and design patterns. The game design reader, pp. 410–437 (2006)

    Google Scholar 

  46. Voelcker-Rehage, C.: Motor-skill learning in older adults—a review of studies on age-related differences. Eur. Rev. Aging Phys. Act. 5, 5–16 (2008)

    Google Scholar 

  47. Walker-Roberts, S., Hammoudeh, M., Aldabbas, O., et al.: Threats on the horizon: understanding security threats in the era of cyber-physical systems. J. Supercomput. 76, 2643–2664 (2020). https://doi.org/10.1007/s11227-019-03028-9

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Kirsi Aaltola .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Aaltola, K. (2021). Empirical Study on Cyber Range Capabilities, Interactions and Learning Features. In: Tagarev, T., Atanassov, K.T., Kharchenko, V., Kacprzyk, J. (eds) Digital Transformation, Cyber Security and Resilience of Modern Societies. Studies in Big Data, vol 84. Springer, Cham. https://doi.org/10.1007/978-3-030-65722-2_26

Download citation

Publish with us

Policies and ethics