REFERENCES
Anderson, J.R. (2000). Learning and memory, NY: John Wiley & Sons.
Arthur, W., Bennett, W., Edens, P.S., & Bell, S.T. (2003). Effectiveness of training in organizations: A meta-analysis of design and evaluation features. Journal of Applied Psychology, 88 (2), 234-245.
Baldwin, T.T., & Ford, J.K. (1988). Transfer of training: a review and directions for future research.* Personnel Psychology, 41,* 63 105.
Banks, B. (2007). Using behavior analysis algorithms to anticipate security threats before they impact mission critical operations. IEEE Conference on Signal Detection and Behavior, AVSS’07, Sept 5-7, 307-312.
Burke, L.A. (1997). Improving positive transfer: A test of relapse prevention training on transfer outcomes. Human Resource Development Quarterly, 8 (1), 115-126.
Center for Strategic and International Studies (2017). Securing Cyberspace for the 45th Presidency. https://www.csis.org/analysis/2017-global-forecast.
Conetta, C. (2019). Individual differences in cyber security. McNair Research Journal, 15 (4), 2- 20.
Dewey, J. (1998). The Essential Dewey: Pragmatism, education, democracy. In, The Essential Dewey (L. Hickman & T. Alexander, Eds). Bloomington: Indiana University Press.
Dunaney, E. (2009). CompTIA Security +. Indianapolis, ID: Sybex.
Ernits, M., Tammekänd, J., Maennel, O. (2015). A fully automated cyber defense competition for students. In: Proceedings of the 2015 ACM Conference on Special Interest Group on Data Communication, SIGCOMM, New York, 113–114.
Ferdig, R.E. (2006). Assessing technologies for teaching and learning: understanding the importance of technological pedagogical content knowledge. British Journal of Educational Technology, 37 (5), 749-760.
Goode, J., Levy, Y., Hovav, A., & Smith, J. (2018). Expert assessment of organizational cybersecurity programs and development of vignettes to measure cybersecurity countermeasures awareness. Online Journal of Applied Knowledge Management, 6 (1), 67-80.
Hendrix, M., Al-Sherbaz, A., & Bloom, V. (2016). Game based cyber security training: Are serious games suitable for cyber security training? International Journal of Serious Games, 3 (1), 53-61.
Hogan, L. C., & Bell, M. (2009). A preliminary investigation of the reinforcement function of signal detections in simulated baggage screening: Further support for the vigilance reinforcement hypothesis. Journal of Organizational Behavior Management, 29, 6-18.
Hoffman, L.J., Rosenberg, T., Dodge, R., Ragsdale, D. (2005). Exploring a national cybersecurity exercise for universities. IEEE Security & Privacy, 3(5), 27–33.
Hoke, J., Reuter, C., Romeas, T., Montariol, M., Schnell, T., Faubert, J. (2017). Perceptualcognitive & physiological assessment of training effectiveness. Proceedings from the Interservice/Industry Training, Simulation and Education Conference (I/ITSEC), Orlando, FL. 1-12.
Jalali, M.S., Siegel, M., & Madnick, S. (2019). Decision-making and biases in cybersecurity capability development: Evidence from a simulation game experiment. Journal of Strategic Information Systems, 28, 66-82.
Jin, G., Tu, M., Kim, T. Heffron, J. & White, J. (2018). Game based cybersecurity training for high school students. Proceedings of the ACM, SIGCSE’18, February 21-24. Baltimore, MD., 68-73.
Kirschner, P. A., & Paas, F. (2001). Web-enhanced higher education: a tower of Babel. Computers in Human Behavior, 17, 347–353.
Landers, R.N., Armstrong, M.B. (2017). Enhancing instructional outcomes with gamification: An empirical test of the technology-enhanced training effectiveness model. Computers in Human Behavior, 71, 499-507.
Leune, K., & Petrilli, S. J. (2017). Using capture-the-flag to enhance the effectiveness of cybersecurity education. Proceedings of the ACM, SIGITE’17, October 4–7. Rochester, NY, 47-52.
Miranda, M.J.A. (2018). Enhancing cybersecurity awareness training: A comprehensive phishing exercise approach. International Management Review, 14 (2), 5-10.
Myers, J. L., Well, A. D., & Lorch, R. F. (2010). Research design and statistical analysis. NY: Rourtledge.
Pan, K., Teixeira, A., López C.D., & Palensky, P. (2017). Co-simulation for cyber security analysis: Data attacks against energy management system. Proceedings from the IEEE International Conference on Smart Grid Communications (SmartGridComm), Dresden, Germany, 253-258.
Reio, T. G., & Wiswell, A. (2001). Field investigation of the relationship among adult curiosity, workplace learning, and job performance. Human Resource Development Quarterly, 11 (1), 5-30.
Retalis, S., & Skordalakis, E. (2001). CADMOS: an approach to developing web-based instructional systems. Computers in Human Behavior, 17, 393–407.
Rumeser D. & Emsley, M. (2018). A systematic review of project management serious games: Identifying gaps, trends, and directions for future research. The Journal of Modern Project Management, 6 (1), 33-44.
Schepens, W.J., Ragsdale, D.J., Surdu, J.R., Schafer, J., New Port, R. (2002) The cyber defense exercise: an evaluation of the effectiveness of information assurance education. Journal of Information Security, 1(2), 118-127.
Sommestad, T., & Hallberg, J. (2012). Cyber security exercises and competitions as a platform for cyber security experiments. In A. Jøsang and B. Carlsson (Eds.): NordSec 2012, LNCS 7617, pp. 47–60, Springer-Verlag Berlin Heidelberg.
Sitzmann, T., & Weinhardt, J. M. (2019). Approaching evaluation from a multilevel perspective: A comprehensive analysis of the indicators of training effectiveness,* Human Resource Management Review, 29 (2)*, 253-269.
TeachThought (2019). Modern trends in education: 50 different approaches to learning. https://www.teachthought.com/pedagogy/modern-trends-education-50-different-approaches-learning/.
Thatcher, J. B., & Perrewé, P. L. (2002). An empirical examination of individual traits as antecedents to computer anxiety and computer self-efficacy. MIS Quarterly, 26 (4), 381–396.
Tipton, H. F. & Henry, K. (2007). Official (ISC)2 Guide to the CISSP CBK. NY: Auerbach.
Torkzadeh, G., & Van Dyke, T. P. (2002). Effects of training on internet self-efficacy and computer attitudes. Computers in Human Behavior, 18, 479–494.
Trafton, G. J., & Trickett, S. B. (2001). Note-taking for self-explanation and problem solving. Human–Computer Interaction, 16, 1–38.
Veksler, V.D., Buchler, N., Hoffman, B.E., Cassenti, D.N., & Sugrim, S. (2018). Simulations in cyber-security: A review of cognitive modeling of network attackers, defenders, and users. Frontiers In Psychology, 9, 1-12.
Voskoboinicov, S. &. Melnyk, S. (2018). Cyber security in the modern sociation and improvement of preparation of future factors in the field of competent approach, Social Work and Education, 5 (1), 103- 112.
Workman, M., Bommer, W. H., & Straub, D. (2008). Security lapses and the omission of information security measures: An empirical test of the threat control model, Computers in Human Behavior, 24, 2799–2816.