§ 瀏覽學位論文書目資料
系統識別號 U0002-0207202520543300
DOI 10.6846/tku202500475
論文名稱(中文) 以虛擬實境體驗強化資訊安全行為之研究
論文名稱(英文) Enhancing Information Security Behavior: A Virtual Reality Experience
第三語言論文名稱
校院名稱 淡江大學
系所名稱(中文) 資訊管理學系碩士班
系所名稱(英文) Department of Information Management
外國學位學校名稱
外國學位學院名稱
外國學位研究所名稱
學年度 113
學期 2
出版年 114
研究生(中文) 黃冠哲
研究生(英文) Kuan-Che Huang
學號 612630136
學位類別 碩士
語言別 繁體中文
第二語言別
口試日期 2025-06-14
論文頁數 103頁
口試委員 指導教授 - 施盛寶(sbao@mail.tku.edu.tw)
口試委員 - 黃心怡(hyhuang@scu.edu.tw)
口試委員 - 林仁祥(167344@o365.tku.edu.tw)
口試委員 - 施盛寶(sbao@mail.tku.edu.tw)
關鍵字(中) 虛擬實境
AI虛擬助理
資訊安全訓練
資訊安全行為
保護動機理論
沉浸式學習的認知情感模型
關鍵字(英) Virtual reality
AI assistant
Information Security Training
Information Security Behavior
Protection Motivation Theory
The Cognitive Affective Model of Immersive Learning
第三語言關鍵字
學科別分類
中文摘要
資安威脅日益嚴峻,企業與組織逐漸意識到,最脆弱的環節不在技術,而是人。過去多以講座、影片或簡報等傳統方式進行資訊安全訓練,然而這些方式常因缺乏互動與情境帶入,難以引起學習者的參與與行為改變。因此,本研究嘗試引入虛擬實境技術,並結合AI虛擬助理,打造更具沉浸感與互動性的資安訓練方式,探討其對資訊安全行為的影響。研究結合沉浸式學習的認知情感模型與保護動機理論,探討VR訓練中之沉浸感、互動性與代理感,如何影響使用者對威脅與應對的認知,進而提升資訊安全行為表現。本研究採實驗設計,招募273位受測者,透過VR模擬資安攻擊情境進行訓練,並搭配AI虛擬助理以提供即時回饋與學習引導。資料蒐集後使用SPSS與SmartPLS 4進行統計分析與結構方程模型驗證。研究除了顯示利用VR進行資訊安全訓練效果,也探討沉浸感與互動性與實體臨場感與代理感之間關係,如何進一步影響個人的威脅評估與應對評估,最終促進資訊安全行為。本研究證實整合VR與AI的訓練模式具提升學習成效與資安行為的潛力,對資安教育與組織訓練設計具有實證意義與應用價值。
英文摘要
As information security threats grow increasingly severe, organizations are realizing that the weakest point is not technology, but people. Traditional training methods such as lectures, videos, and presentations often lack interactivity and contextual engagement, limiting their ability to foster participation and behavioral change. This study introduces an information security training approach that integrates virtual reality (VR) and AI virtual assistants to enhance immersion and interactivity, and examines its impact on information security behavior. Drawing on the Cognitive Affective Model of Immersive Learning and Protection Motivation Theory, the study investigates how immersion, interactivity, and agency in VR influence users’ threat and coping appraisals, thereby improving information security behavior. An experiment was conducted with 213 participants who underwent VR-based training simulating cyberattacks, supported by an AI assistant providing real-time feedback and guidance. Data were analyzed using SPSS and SmartPLS 4. The results confirm that VR training, especially when enhanced by AI assistance, improves users’ physical presence and agency, strengthens their threat and coping appraisal, and ultimately promotes security behavior. This research demonstrates the practical value of combining VR and AI for effective information security education and organizational training.
第三語言摘要
論文目次
目次
第一章 緒論................................................1
第一節 研究背景與動機.......................................1
第二節 研究目的............................................3
第三節 研究流程............................................4
第二章 文獻探討............................................6
第一節 資訊安全行為........................................6
第二節 VR訓練.............................................8
第三節 AI虛擬助理..........................................9
第四節 資訊安全意識訓練....................................10
一、	資訊安全意識訓練..................................10
二、	VR資安訓練.......................................13
第五節  沉浸式學習的認知情感模型(The Cognitive Affective Model of Immersive Learning)	.....14
一、	沉浸感(Immersion)................................16
二、	互動性(Interactivity)............................17
三、	代理感(Agency)...................................17
四、	實體臨場感(Physical Presence)....................18
第六節  保護動機理論(Protection Motivation Theory)........19
一、	威脅評估(Threat appraisal).......................20
二、	應對評估(Coping appraisal).......................22
第七節  CAMIL模型於資安訓練中的適用性分析..................24
第三章 研究方法..........................................25
第一節 研究架構..........................................25
第二節 研究假說..........................................26
一、	VR資安訓練中沉浸感對實體臨場感影響................26
二、	VR資安訓練中沉浸感對代理感影響....................27
三、	VR資安訓練中互動性對實體臨場感影響................28
四、	VR資安訓練中互動性對代理感影響....................28
五、	VR資安訓練中實體臨場感對威脅評估之影響.............29
六、	VR資安訓練中實體臨場感對應對評估之影響.............31
七、	VR資安訓練中代理感對威脅評估影響...................32
八、	VR資安訓練中代理感對應對評估影響...................33
九、	VR資安訓練中威脅評估對資訊安全行為影響.............34
十、	VR資安訓練中應對評估對資訊安全行為影響.............34
第三節 操作型定義........................................35
第四節 研究設計..........................................37
一、	VR資訊安全訓練環境設計............................37
二、	研究對象.........................................40
三、	實驗流程	........................................41
四、	量表設計.........................................43
五、	資料蒐集.........................................46
第四章  研究結果..........................................47
第一節 樣本敘述性統計分析..................................47
第二節 資訊安全訓練成果分析................................48
第三節 測量模型分析........................................49
一、	信度分析..........................................49
二、	效度分析..........................................50
第四節 結構方程模型分析....................................59
一、	共線性診斷........................................59
二、	共同方法偏誤......................................60
三、	路徑分析與假說檢驗.................................63
四、	中介效果檢定.......................................68
第五章  結論與建議.........................................71
第一節 研究結論............................................71
第二節 學術貢獻............................................75
第三節 實務貢獻............................................75
第四節 研究限制與未來建議...................................77
參考文獻...................................................78
附錄1 研究量表............................................100

表次
表1操作型定義...............................................35
表2 ISO-27001與情境對照表...................................37
表3虛擬資安情境.............................................39
表4實驗流程表...............................................41
表5各項構念衡量問項與來源....................................43
表6本研究正式實驗樣本之人口統計...............................47
表7受測者之前測與後測資安行為分數.............................49
表8量表敘述性統計之信效度分析表...............................50
表9交叉因素負荷量表..........................................54
表10 Heterotrait-Monotrait Ratio Criterion(HTMT)標準........57
表11 Fornell-Larker標準.....................................58
表12共線性診斷結果...........................................59
表13 Harman單因子檢定表......................................61
表14路徑分析表...............................................67
表15中介效果檢定.............................................68

圖次
圖1研究流程.....................................................5
圖2 CAMIL模型(Petersen et al., 2022)...........................16
圖3研究架構圖...................................................26
圖4 VR使用流程..................................................39
圖5 AI虛擬助理..................................................39
圖6受測者實際訓練圖..............................................42
圖7受測者實際訓練圖..............................................42
圖8研究架構路徑分析..............................................66
參考文獻
周峻佑. (2021). 勒索軟體AvosLocker攻擊技嘉,聲稱取得該公司與多家廠商的保密協議. iThome. Retrieved 6/23 from https://www.ithome.com.tw/news/147432
馬瑞璿. (2025). 獨/台灣學術圈也受害!聯手勒索軟體NOVA 陸國家級駭客入侵這大學. 聯合新聞網. Retrieved 6/23 from https://udn.com/news/story/6928/8818363
Abawajy, J. (2014). User preference of cyber security awareness delivery methods. Behaviour & Information Technology, 33(3), 237-248. 
Abid, S. K., Chan, S. W., Sulaiman, N., Bhatti, U., & Nazir, U. (2023). Present and future of artificial intelligence in disaster management. 2023 international conference on engineering management of communication and technology (EMCTECH), 
Abraham, S., & Chengalur-Smith, I. (2019). Evaluating the effectiveness of learner controlled information security training. Computers & Security, 87, 101586. 
Adinolf, S., Wyeth, P., Brown, R., & Altizer, R. (2019). Towards designing agent based virtual reality applications for cybersecurity training. Proceedings of the 31st Australian Conference on Human-Computer-Interaction, 
Ahir, K., Govani, K., Gajera, R., & Shah, M. (2025). Application on virtual reality for enhanced education learning, military training and sports. Augmented Human Research, 10(4). 
Al-Emran, M., & Deveci, M. (2024). Unlocking the potential of cybersecurity behavior in the metaverse: Overview, opportunities, challenges, and future research agendas. Technology in Society, 102498. 
Al-Karaki, J. N., Itradat, A., & Mekonen, S. (2023). Immersive Cybersecurity Teaching/Training Using Gamification on the Metaverse: A Hands-On Case Study. 2023 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress (DASC/PiCom/CBDCom/CyberSciTech), 0101-0108. 
Aldawood, H., & Skinner, G. (2019). Reviewing cyber security social engineering training and awareness programs—Pitfalls and ongoing issues. Future Internet, 11(3), 73. 
Alghamdi, M. I. (2021). WITHDRAWN: Determining the impact of cyber security awareness on employee behaviour: A case of Saudi Arabia. Materials Today. 
Alhemimah, A. (2023). How COVID-19 impacts travel-health information seeking and tourists’ travel intentions: A protection motivation theory-based model. Journal of Destination Marketing & Management, 27, 100757. 
Alnajim, A. M., Habib, S., Islam, M., AlRawashdeh, H. S., & Wasim, M. (2023). Exploring cybersecurity education and training techniques: a comprehensive review of traditional, virtual reality, and augmented reality approaches. Symmetry, 15(12), 2175. 
Alruwaili, A. (2019). A Review of the Impact of Training on Cybersecurity Awareness. International Journal of Advanced Research in Computer Science, 10(5). 
Alsaleh, A., Schubert, M., & Endres, D. (2023). The Effect of Sense of Agency on Self-Efficacy Beliefs: A Virtual Reality Paradigm. ACM Symposium on Applied Perception 2023,
Alshaikh, M., Maynard, S. B., Ahmad, A., & Chang, S. (2018). An exploratory study of current information security training and awareness practices in organizations. 
Alshare, K. A., Lane, P. L., & Lane, M. R. (2018). Information security policy compliance: a higher education case study. Information & Computer Security, 26(1), 91-108. 
Alyami, A., Sammon, D., Neville, K., & Mahony, C. (2023). The critical success factors for Security Education, Training and Awareness (SETA) program effectiveness: a lifecycle model. Information Technology & People, 36(8), 94-125.
Anderson, J. C., & Gerbing, D. W. (1988). Structural equation modeling in practice: A review and recommended two-step approach. Psychological bulletin, 103(3), 411. 
Angulo, A. V., Robartes, E., Guo, X., Chen, T. D., Heydarian, A., & Smith, B. L. (2024). Evaluating current and future pedestrian mid-block crossing safety treatments using virtual reality simulation. Accident Analysis & Prevention, 206, 107715. 
Aros, M., Tyger, C. L., & Chaparro, B. S. (2024). Unraveling the Meta Quest 3: An Out-of-Box Experience of the Future of Mixed Reality Headsets. International Conference on Human-Computer Interaction, 
Arpaci, I., & Sevinc, K. (2022). Development of the cybersecurity scale (CS-S): Evidence of validity and reliability. Information Development, 38(2), 218-226. 
Ayanbode, N., Abieba, O. A., Chukwurah, N., Ajayi, O. O., & Ifesinachi, A. (2024). Human factors in FinTech cybersecurity: Addressing insider threats and behavioral risks. Journal of Cybersecurity in FinTech, 14(2), 34-49. 
Bada, M., Sasse, A. M., & Nurse, J. R. (2019). Cyber security awareness campaigns: Why do they fail to change behaviour? arXiv preprint arXiv:1901.02672. 
Balakrishnan, J., & Dwivedi, Y. K. (2024). Conversational commerce: entering the next stage of AI-powered digital assistants. Annals of Operations Research, 333(2), 653-687.
Baltuttis, D., Teubner, T., & Adam, M. T. (2024). A typology of cybersecurity behavior among knowledge workers. Computers & Security, 140, 103741. 
Banakou, D., & Slater, M. (2014). Body ownership causes illusory self-attribution of speaking and influences subsequent real speaking. Proceedings of the National Academy of Sciences, 111(49), 17678-17683. 
Bandura, A. (1982). Self-efficacy mechanism in human agency. American Psychologist, 37(2), 122. 
Bashir, M., Wee, C., Memon, N., & Guo, B. (2017). Profiling cybersecurity competition participants: Self-efficacy, decision-making and interests predict effectiveness of competitions as a recruitment tool. Computers & Security, 65, 153-165. 
Berkman, M. I., & Akan, E. (2024). Presence and immersion in virtual reality. In Encyclopedia of computer graphics and games (pp. 1461-1470). Springer. 
Bertrand, P., Guegan, J., Robieux, L., McCall, C. A., & Zenasni, F. (2018). Learning empathy through virtual reality: multiple strategies for training empathy-related abilities using body ownership illusions in embodied virtual reality. Frontiers in Robotics and AI, 5, 326671. 
Boerman, S. C., Kruikemeier, S., & Zuiderveen Borgesius, F. J. (2021). Exploring motivations for online privacy protection behavior: Insights from panel data. Communication Research, 48(7), 953-977. 
Bollen, K. A. (1989). Structural equations with latent variables. John Wiley & Sons. 
Boss, S. R., Galletta, D. F., Lowry, P. B., Moody, G. D., & Polak, P. (2015). What do systems users have to fear? Using fear appeals to engender threats and fear that motivate protective security behaviors. MIS Quarterly, 39(4), 837-864. 
Breitinger, F., Tully-Doyle, R., & Hassenfeldt, C. (2020). A survey on smartphone user’s security choices, awareness and education. Computers & Security, 88, 101647. 
Budimir, S., Fontaine, J. R., Huijts, N. M., Haans, A., Loukas, G., & Roesch, E. B. (2021). Emotional reactions to cybersecurity breach situations: scenario-based survey study. Journal of medical Internet research, 23(5), e24879. 
Bulgurcu, B., Cavusoglu, H., & Benbasat, I. (2010). Information security policy compliance: an empirical study of rationality-based beliefs and information security awareness. MIS Quarterly, 523-548. 
Burns, A., Posey, C., Roberts, T. L., & Lowry, P. B. (2017). Examining the relationship of organizational insiders' psychological capital with information security threat and coping appraisals. Computers in Human Behavior, 68, 190-209. 
Butler, C. R., Kasper, K. B., Huggins, R. A., Cropper, T. L., Frankel, D. N., Pawlak, M. T., Casey, T., & Casa, D. J. (2023). Deaths among US Air Force basic military trainees, 2008-2020. Military Medicine, 188(7-8), e2333-e2339. 
Buttussi, F., & Chittaro, L. (2017). Effects of different types of virtual reality display on presence and learning in a safety training scenario. IEEE transactions on visualization and computer graphics, 24(2), 1063-1076. 
Caldarini, G., Jaf, S., & McGarry, K. (2022). A literature survey of recent advances in chatbots. Information, 13(1), 41. 
Cassidy, S. (2015). Resilience building in students: The role of academic self-efficacy. Frontiers in Psychology, 6, 1781. 
Chandler, T., Richards, A. E., Jenny, B., Dickson, F., Huang, J., Klippel, A., Neylan, M., Wang, F., & Prober, S. M. (2022). Immersive landscapes: modelling ecosystem reference conditions in virtual reality. Landscape Ecology, 1-17. 
Chang, H. H., Wong, K. H., & Lee, H. C. (2022). Peer privacy protection motivation and action on social networking sites: Privacy self-efficacy and information security as moderators. Electronic Commerce Research and Applications, 54, 101176. 
Chatchalermpun, S., & Daengsi, T. (2021). Improving cybersecurity awareness using phishing attack simulation. IOP Conference Series: Materials Science and Engineering, 
Checa, D., & Bustillo, A. (2020). A review of immersive virtual reality serious games to enhance learning and training. Multimedia Tools and Applications, 79(9), 5501-5527. 
Chekhovskoy, Y., Plaksiy, K., Nikiforov, A., & Miloslavskaya, N. (2022). The Use of Virtual Reality Technologies in the Specialists’ Training in the Field of Information Security. Procedia Computer Science, 213, 223-231. 
Chen, C., Zhang, K. Z., Gong, X., Lee, M. K., & Wang, Y. (2020). Decreasing the problematic use of an information system: An empirical investigation of smartphone game players. Information Systems Journal, 30(3), 492-534. 
Chen, X., & Wu, D. (2024). Automatic generation of multimedia teaching materials based on generative AI: Taking Tang poetry as an example. IEEE transactions on learning technologies. 
Chen, Y., & Zahedi, F. M. (2016). Individuals’ internet security perceptions and behaviors. MIS Quarterly, 40(1), 205-222. 
Chheang, V., Schott, D., Saalfeld, P., Vradelis, L., Huber, T., Huettl, F., Lang, H., Preim, B., & Hansen, C. (2024). Advanced liver surgery training in collaborative VR environments. Computers & Graphics, 119, 103879. 
Chheang, V., Sharmin, S., Márquez-Hernández, R., Patel, M., Rajasekaran, D., Caulfield, G., Kiafar, B., Li, J., Kullu, P., & Barmaki, R. L. (2024). Towards anatomy education with generative AI-based virtual assistants in immersive virtual reality environments. 2024 IEEE International Conference on Artificial Intelligence and Extended and Virtual Reality (AIxVR), 
Chicone, R., & Rana, S. (2023). The influence of traditional cybersecurity training on user attitudes towards VR cybersecurity training. Issues in Information Systems, 24(1). 
Chin, W. W. (1998). The partial least squares approach to structural equation modeling. Modern methods for business research, 295(2), 295-336. 
Choudhury, M., Prabhu, S., Sabri, A. K., & Marhoon, H. A. (2023). Impact of artificial intelligence (AI) in the media and entertainment industry. AIP Conference Proceedings, 
Code, J. (2020). Agency for learning: Intention, motivation, self-efficacy and self-regulation. Frontiers in Education, 5, 19. 
Cohen, J. (1992). Statistical power analysis. Current directions in psychological science, 1(3), 98-101. 
Cohen, J. (2013). Statistical power analysis for the behavioral sciences. routledge. 
Conteh, N. Y., & Schmick, P. J. (2021). Cybersecurity risks, vulnerabilities, and countermeasures to prevent social engineering attacks. In Ethical hacking techniques and countermeasures for cybercrime prevention (pp. 19-31). IGI Global. 
Copur-Gencturk, Y., Li, J., & Atabas, S. (2024). Improving Teaching at Scale: Can AI Be Incorporated Into Professional Development to Create Interactive, Personalized Learning for Teachers? American Educational Research Journal, 61(4), 767-802. 
Costa, N., & Melotti, M. (2012). Digital media in archeological areas, virtual reality and hyper-tourism. Sociology Mind, 2(1), 53-61. 
Crossler, R. E., Johnston, A. C., Lowry, P. B., Hu, Q., Warkentin, M., & Baskerville, R. (2013). Future directions for behavioral information security research. Computers & Security, 32, 90-101. 
Cummings, J. J., & Bailenson, J. N. (2016). How immersive is enough? A meta-analysis of the effect of immersive technology on user presence. Media Psychology, 19(2), 272-309. 
Dang-Pham, D., & Pittayachawan, S. (2015). Comparing intention to avoid malware across contexts in a BYOD-enabled Australian university: A Protection Motivation Theory approach. Computers & Security, 48, 281-297.
D'arcy, J., & Herath, T. (2011). A review and analysis of deterrence theory in the IS security literature: making sense of the disparate findings. European Journal of Information Systems, 20(6), 643-658. 
Dalal, R. S., Howard, D. J., Bennett, R. J., Posey, C., Zaccaro, S. J., & Brummel, B. J. (2022). Organizational science and cybersecurity: abundant opportunities for research at the interface. Journal of Business and Psychology, 37(1), 1-29. 
Debb, S. M., & McClellan, M. K. (2021). Perceived vulnerability as a determinant of increased risk for cybersecurity risk behavior. Cyberpsychology, Behavior, and Social Networking, 24(9), 605-611. 
Debb, S. M., Schaffer, D. R., & Colson, D. G. (2020). A reverse digital divide: comparing information security behaviors of generation Y and generation Z adults. International journal of cybersecurity intelligence & cybercrime, 3(1), 42-55. 
Delialioğlu, Ö. (2012). Student engagement in blended learning environments with lecture-based and problem-based instructional approaches. Journal of Educational Technology & Society, 15(3), 310-322. 
Demiray, B. Z., Sit, M., & Demir, I. (2021). DEM super-resolution with efficientNetV2. arXiv:2109.09661. 
Dengel, A., & Mägdefrau, J. (2019). Presence is the key to understanding immersive learning. In Immersive Learning Research Network (pp. 185-198). Springer. 
Dhillon, G., Abdul Talib, Y. Y., & Picoto, W. N. (2020). The mediating role of psychological empowerment in information security compliance intentions. Journal of the Association for Information Systems, 21(1), 5.
Diamantopoulos, A., & Siguaw, J. A. (2006). Formative versus reflective indicators in organizational measure development: A comparison and empirical illustration. British Journal of Management, 17(4), 263-282. 
Diemer, J., Alpers, G. W., Peperkorn, H. M., Shiban, Y., & Mühlberger, A. (2015). The impact of perception and presence on emotional reactions: a review of research in virtual reality. Frontiers in Psychology, 6, 26. 
Ding, Y., Li, Y., & Cheng, L. (2020). Application of Internet of Things and virtual reality technology in college physical education. Ieee Access, 8, 96065-96074. 
du Plooy, E., Casteleijn, D., & Franzsen, D. (2024). Personalized adaptive learning in higher education: a scoping review of key characteristics and impact on academic performance and engagement. Heliyon. 
Egelman, S., & Peer, E. (2015). Scaling the security wall: Developing a security behavior intentions scale (sebis). Proceedings of the 33rd annual ACM conference on human factors in computing systems, 
Elendu, C., Amaechi, D. C., Okatta, A. U., Amaechi, E. C., Elendu, T. C., Ezeh, C. P., & Elendu, I. D. (2024). The impact of simulation-based training in medical education: A review. Medicine, 103(27), e38813. 
Felton, W. M., & Jackson, R. E. (2022). Presence: A review. International Journal of Human–Computer Interaction, 38(1), 1-18. 
Fornell, C., & Larcker, D. F. (1981). Structural equation models with unobservable variables and measurement error: Algebra and statistics. In: Sage publications Sage CA: Los Angeles, CA.
Freifeld, L. (2023). 2023 Training Industry Report. Retrieved 6/23 from https://trainingmag.com/2023-training-industry-report/
Fribourg, R., Ogawa, N., Hoyet, L., Argelaguet, F., Narumi, T., Hirose, M., & Lécuyer, A. (2020). Virtual co-embodiment: evaluation of the sense of agency while sharing the control of a virtual body among two individuals. IEEE transactions on visualization and computer graphics, 27(10), 4023-4038. 
Frith, C. D., Blakemore, S.-J., & Wolpert, D. M. (2000). Abnormalities in the awareness and control of action. Philosophical Transactions of the Royal Society of London. Series B: Biological Sciences, 355(1404), 1771-1788. 
Frost, S., Kannis-Dymand, L., Schaffer, V., Millear, P., Allen, A., Stallman, H., Mason, J., Wood, A., & Atkinson-Nolte, J. (2022). Virtual immersion in nature and psychological well-being: A systematic literature review. Journal of Environmental Psychology, 80, 101765. 
Gautam, A., Sit, M., & Demir, I. (2022). Realistic river image synthesis using deep generative adversarial networks. Frontiers in Water, 4, 784441. 
Giaretta, A. (2024). Security and privacy in virtual reality: a literature survey. Virtual Reality, 29(1), 10. 
Gonzalez-Franco, M., & Peck, T. C. (2018). Avatar embodiment. towards a standardized questionnaire. Frontiers in Robotics and AI, 5, 74. 
Grabowski, A., & Jach, K. (2021). The use of virtual reality in the training of professionals: with the example of firefighters. Computer Animation and Virtual Worlds, 32(2), e1981. 
Gratian, M., Bandi, S., Cukier, M., Dykstra, J., & Ginther, A. (2018). Correlating human traits and cyber security behavior intentions. Computers & Security, 73, 345-358. 
Gross, A. (2018). Effective security training requires change in employee behavior. Health IT Answers. https://www.healthitanswers.net/effective-security-training-requires-change-in-employee-behavior/ 
Gurung, A., Luo, X., & Liao, Q. (2009). Consumer motivations in taking action against spyware: An empirical investigation. Information Management & Computer Security, 17(3), 276-289. 
Haag, S., Siponen, M., & Liu, F. (2021). Protection motivation theory in information systems security research: A review of the past and a road map for the future. ACM SIGMIS Database: the DATABASE for Advances in Information Systems, 52(2), 25-67. 
Haggard, P. (2017). Sense of agency in the human brain. Nature Reviews Neuroscience, 18(4), 196-207. 
Haggard, P., & Chambon, V. (2012). Sense of agency. Current biology, 22(10), R390-R392. 
Hair Jr, J. F., Sarstedt, M., Hopkins, L., & Kuppelwieser, V. G. (2014). Partial least squares structural equation modeling (PLS-SEM). European Business Review, 26(2), 106. 
Hanus, B., Windsor, J. C., & Wu, Y. (2018). Definition and multidimensionality of security awareness: Close encounters of the second order. ACM SIGMIS Database: the DATABASE for Advances in Information Systems, 49(SI), 103-133. 
He, W., & Zhang, Z. (2019). Enterprise cybersecurity training and awareness programs: Recommendations for success. Journal of Organizational Computing and Electronic Commerce, 29(4), 249-257. 
Hedges, M., & Islam, T. (2024). VirSec–Immersive Security Training within Virtual Reality. 17th International Conference on Advanced Visual Interfaces: 2nd International Workshop on CyberSecurity Education for Industry and Academia (CSE4IA 2024), 
Heikonen, L., Pietarinen, J., Toom, A., Soini, T., & Pyhältö, K. (2020). The development of student teachers’ sense of professional agency in the classroom during teacher education. Learning: Research and Practice, 6(2), 114-136. 
Henseler, J., Ringle, C. M., & Sarstedt, M. (2015). A new criterion for assessing discriminant validity in variance-based structural equation modeling. Journal of the Academy of Marketing Science, 43, 115-135. 
Henseler, J., Ringle, C. M., & Sarstedt, M. (2016). Testing measurement invariance of composites using partial least squares. International Marketing Review, 33(3), 405-431. 
Herath, T., & Rao, H. R. (2009). Protection motivation and deterrence: a framework for security policy compliance in organisations. European Journal of Information Systems, 18(2), 106-125. 
Hina, S., Selvam, D. D. D. P., & Lowry, P. B. (2019). Institutional governance and protection motivation: Theoretical insights into shaping employees’ security compliance behavior in higher education institutions in the developing world. Computers & Security, 87, 101594. 
Hoffman, D. L., & Novak, T. P. (1996). Marketing in hypermedia computer-mediated environments: Conceptual foundations. Journal of marketing, 60(3), 50-68.
Hong, J.-C., Chan, H.-Y., Teng, Y.-H., Tai, K.-H., & Lin, C.-Z. (2023). Vr training program for fire escape: Learning progress predicted by the perception of fire presence, vr operational frustration, and gameplay self-efficacy. Computers & Education: X Reality, 3, 100029. 
Horn, J. L., & McArdle, J. J. (1992). A practical and theoretical guide to measurement invariance in aging research. Experimental aging research, 18(3), 117-144. 
Hosen, S., Hamzah, S. R. a., Ismail, I. A., Alias, S. N., Abd Aziz, M. F., & Rahman, M. M. (2024). Training & development, career development, and organizational commitment as the predictor of work performance. Heliyon, 10(1). 
Howard, M. C., & Gutworth, M. B. (2020). A meta-analysis of virtual reality training programs for social skill development. Computers & Education, 144, 103707. 
Howard, M. C., Gutworth, M. B., & Jacobs, R. R. (2021). A meta-analysis of virtual reality training programs. Computers in Human Behavior, 121, 106808. 
Hsiao, K.-L., Chen, C.-C., Lin, K.-Y., & Hsu, H.-Y. (2023). What drives online-to-offline purchase intention in a VR store? An examination of affective and cognitive factors. Quality & Quantity, 57(4), 3499-3521. 
Hu-Au, E., & Lee, J. J. (2017). Virtual reality in education: a tool for learning in the experience age. International Journal of Innovation in Education, 4(4), 215-226. 
Hu, S., Hsu, C., & Zhou, Z. (2021). The impact of SETA event attributes on employees’ security-related Intentions: An event system theory perspective. Computers & Security, 109, 102404.
Hughes-Lartey, K., Li, M., Botchey, F. E., & Qin, Z. (2021). Human factor, a critical weak point in the information security of an organization's Internet of things. Heliyon, 7(3). 
Hurd, O., Kurniawan, S., & Teodorescu, M. (2019). Virtual reality video game paired with physical monocular blurring as accessible therapy for amblyopia. 2019 IEEE Conference on Virtual Reality and 3D User Interfaces (VR), 
Ifinedo, P. (2012). Understanding information systems security policy compliance: An integration of the theory of planned behavior and the protection motivation theory. Computers & Security, 31(1), 83-95. 
Ikhalia, E., Serrano, A., Bell, D., & Louvieris, P. (2019). Online social network security awareness: mass interpersonal persuasion using a Facebook app. Information Technology & People, 32(5), 1276-1300. 
Jennett, C., Cox, A. L., Cairns, P., Dhoparee, S., Epps, A., Tijs, T., & Walton, A. (2008). Measuring and defining the experience of immersion in games. International journal of human-computer studies, 66(9), 641-661. 
Jiang, Y., Li, Z., He, M., Lindlbauer, D., & Yan, Y. (2023). Handavatar: Embodying non-humanoid virtual avatars through hands. Proceedings of the 2023 CHI Conference on Human Factors in Computing Systems, 
Johnson-Glenberg, M. C. (2019). The necessary nine: Design principles for embodied VR and active stem education. In Learning in a digital world: Perspective on interactive technologies for formal and informal education (pp. 83-112). Springer. 
Johnson‐Glenberg, M. C., Bartolomea, H., & Kalina, E. (2021). Platform is not destiny: Embodied learning effects comparing 2D desktop to 3D virtual reality STEM experiences. Journal of Computer Assisted Learning, 37(5), 1263-1284. 
Johnston, A. C., Warkentin, M., & Siponen, M. (2015). An enhanced fear appeal rhetorical framework. MIS Quarterly, 39(1), 113-134. 
Jones, J., Yuan, X., Carr, E., & Yu, H. (2010). A comparative study of CyberCIEGE game and Department of Defense Information Assurance Awareness video. Proceedings of the IEEE SoutheastCon 2010 (SoutheastCon), 
Jutla, D. N., & Bodorik, P. (2005). Sociotechnical architecture for online privacy. IEEE Security & Privacy, 3(2), 29-39. 
Karabiyik, U., Mousas, C., Sirota, D., Iwai, T., & Akdere, M. (2019). A virtual reality framework for training incident first responders and digital forensic investigators. Advances in Visual Computing: 14th International Symposium on Visual Computing, ISVC 2019, Lake Tahoe, NV, USA, October 7–9, 2019, Proceedings, Part II 14, 
Katona, J., & Gyonyoru, K. I. K. (2025). Integrating AI-based adaptive learning into the flipped classroom model to enhance engagement and learning outcomes. Computers and Education: Artificial Intelligence, 8, 100392. 
Kennison, S. M., & Chan-Tin, E. (2020). Taking risks with cybersecurity: Using knowledge and personal characteristics to predict self-reported cybersecurity behaviors. Frontiers in Psychology, 11, 546546. 
Khando, K., Gao, S., Islam, S. M., & Salman, A. (2021). Enhancing employees information security awareness in private and public organisations: A systematic literature review. Computers & Security, 106, 102267. 
Kilteni, K., Groten, R., & Slater, M. (2012). The sense of embodiment in virtual reality. Presence: Teleoperators and Virtual Environments, 21(4), 373-387. 
Kim, S.-Y. (2021). Effects of military training based on the virtual reality of army using AHP method. Turkish Journal of Computer and Mathematics Education (TURCOMAT), 12(6), 551-556. 
Klooster, L., Van Delden, R., & Bullée, J.-W. (2023). First Steps to Improve Cybersecurity Behaviour–a Virtual Reality Experience. Proceedings of the 17th European Conference on Game-Based Learning: ECGBL, 
Kokkinara, E., Kilteni, K., Blom, K. J., & Slater, M. (2016). First person perspective of seated participants over a walking virtual body leads to illusory agency over the walking. Scientific reports, 6(1), 28879. 
Kostadinov, D. (2018). The components of a successful security awareness program. InforSec Institute. https://www.infosecinstitute.com/resources/security-awareness/components-successful-security-awareness-program/ 
Koutitas, G., Smith, K. S., Lawrence, G., Metsis, V., Stamper, C., Trahan, M., & Lehr, T. (2019). A virtual and augmented reality platform for the training of first responders of the ambulance bus. Proceedings of the 12th ACM International Conference on Pervasive Technologies Related to Assistive Environments, 
Koutitas, G., Smith, S., & Lawrence, G. (2021). Performance evaluation of AR/VR training technologies for EMS first responders. Virtual Reality, 25(1), 83-94. 
Krassmann, A. L., Melo, M., Pinto, D., Peixoto, B., Bessa, M., & Bercht, M. (2019). What is the relationship between the sense of presence and learning in virtual reality? A 24-year systematic literature review. PRESENCE: Virtual and Augmented Reality, 28, 247-265. 
Kruger, H. A., & Kearney, W. D. (2006). A prototype for assessing information security awareness. Computers & Security, 25(4), 289-296. 
Kuppusamy, P., Samy, G. N., Maarop, N., Magalingam, P., Kamaruddin, N., Shanmugam, B., & Perumal, S. (2020). Systematic literature review of information security compliance behaviour theories. Journal of Physics Conference Series, 
Kweon, E., Lee, H., Chai, S., & Yoo, K. (2021). The utility of information security training and education on cybersecurity incidents: An empirical evidence. Information Systems Frontiers, 23, 361-373. 
Lee, E. A.-L., Wong, K. W., & Fung, C. C. (2010). How does desktop virtual reality enhance learning outcomes? A structural equation modeling approach. Computers & Education, 55(4), 1424-1442. 
Lee, K. M. (2004). Presence, explicated. Communication theory, 14(1), 27-50. 
Lee, S. (2025). The rise of VR in media. https://www.numberanalytics.com/blog/rise-of-vr-in-media
Lehikko, A., Nykänen, M., Lukander, K., Uusitalo, J., & Ruokamo, H. (2024). Exploring interactivity effects on learners’ sense of agency, cognitive load, and learning outcomes in immersive virtual reality: A mixed methods study. Computers & Education: X Reality, 4, 100066. 
Li, L., He, W., Xu, L., Ash, I., Anwar, M., & Yuan, X. (2019). Investigating the impact of cybersecurity policy awareness on employees’ cybersecurity behavior. International Journal of Information Management, 45, 13-24. 
Li, L., Xu, L., & He, W. (2022). The effects of antecedents and mediating factors on cybersecurity protection behavior. Computers in Human Behavior Reports, 5, 100165. 
Li, Z., & Demir, I. (2023). U-net-based semantic classification for flood extent extraction using SAR imagery and GEE platform: A case study for 2019 central US flooding. Science of The Total Environment, 869, 161757. 
Lønne, T. F., Karlsen, H. R., Langvik, E., & Saksvik-Lehouillier, I. (2023). The effect of immersion on sense of presence and affect when experiencing an educational scenario in virtual reality: A randomized controlled study. Heliyon, 9(6). 
Maalem Lahcen, R. A., Caulkins, B., Mohapatra, R., & Kumar, M. (2020). Review and insight on the behavioral aspects of cybersecurity. Cybersecurity, 3, 1-18. 
Mahardika, M. S., Hidayanto, A. N., Paramartha, P. A., Ompusunggu, L. D., Mahdalina, R., & Affan, F. (2020). Measurement of employee awareness levels for information security at the center of analysis and information services judicial commission Republic of Indonesia. Advances in Science Technology and Engineering Systems Journal, 5(3), 501-509. 
Majeed, A., Alnajim, A. M., Waseem, A., Khaliq, A., Naveed, A., Habib, S., Islam, M., & Khan, S. (2023). Deep learning-based symptomizing cyber threats using adaptive 5G shared slice security approaches. Future Internet, 15(6), 193. 
Makransky, G., Andreasen, N. K., Baceviciute, S., & Mayer, R. E. (2021). Immersive virtual reality increases liking but not learning with a science simulation and generative learning strategies promote learning in immersive virtual reality. Journal of Educational Psychology, 113(4), 719. 
Makransky, G., & Lilleholt, L. (2018). A structural equation modeling investigation of the emotional value of immersive virtual reality in education. Educational Technology Research and Development, 66(5), 1141-1164. 
Makransky, G., Lilleholt, L., & Aaby, A. (2017). Development and validation of the Multimodal Presence Scale for virtual reality environments: A confirmatory factor analysis and item response theory approach. Computers in Human Behavior, 72, 276-285. 
Makransky, G., & Mayer, R. E. (2022). Benefits of taking a virtual field trip in immersive virtual reality: Evidence for the immersion principle in multimedia learning. Educational Psychology Review, 34(3), 1771-1798. 
Makransky, G., & Petersen, G. B. (2021). The cognitive affective model of immersive learning (CAMIL): A theoretical research-based model of learning in immersive virtual reality. Educational Psychology Review, 33(3), 937-958. 
Matovu, H., Ungu, D. A. K., Won, M., Tsai, C.-C., Treagust, D. F., Mocerino, M., & Tasker, R. (2023). Immersive virtual reality for science learning: Design, implementation, and evaluation. Studies in Science Education, 59(2), 205-244. 
McGivney, E. (2025). Interactivity and identity impact learners' sense of agency in virtual reality field trips. British Journal of Educational Technology, 56(1), 410-434. 
Melnick, K. (2019). NYPD uses location-based VR for active shooter training. VR Scout. https://vrscout.com/news/nypd-active-shooter-vr-training/ 
Menard, P., Bott, G. J., & Crossler, R. E. (2017). User motivations in protecting information security: Protection motivation theory versus self-determination theory. Journal of Management Information Systems, 34(4), 1203-1230. 
Milne, S., Sheeran, P., & Orbell, S. (2000). Prediction and intervention in health‐related behavior: A meta‐analytic review of protection motivation theory. Journal of Applied Social Psychology, 30(1), 106-143. 
Moore, J. W., & Fletcher, P. C. (2012). Sense of agency in health and disease: a review of cue integration approaches. Consciousness and Cognition, 21(1), 59-68. 
Morélot, S., Garrigou, A., Dedieu, J., & N'Kaoua, B. (2021). Virtual reality for fire safety training: Influence of immersion and sense of presence on conceptual and procedural acquisition. Computers & Education, 166, 104145. 
Muhirwe, J., & White, N. (2016). CYBERSECURITY AWARENESS AND PRACTICE OF NEXT GENERATION CORPORATE TECHNOLOGY USERS. Issues in Information Systems, 17(2). 
Neri, M., Benevento, E., Stefanini, A., Aloini, D., Niccolini, F., Carducci, A., Federigi, I., & Dini, G. (2024). Understanding information security awareness: evidence from the public healthcare sector. Information & Computer Security. 
Ng, B.-Y., Kankanhalli, A., & Xu, Y. C. (2009). Studying users' computer security behavior: A health belief perspective. Decision Support Systems, 46(4), 815-825. 
Norris, D. F., Mateczun, L., Joshi, A., & Finin, T. (2019). Cyberattacks at the grass roots: American local governments and the need for high levels of cybersecurity. Public Administration Review, 79(6), 895-904. 
Nunnally, J. C. (1978). An overview of psychological measurement. Clinical diagnosis of mental disorders: A handbook, 97-146. 
Ochs, C., & Sonderegger, A. (2022). The interplay between presence and learning. Frontiers in Virtual Reality, 3, 742509. 
Ogbanufe, O., Crossler, R. E., & Biros, D. (2023). The valued coexistence of protection motivation and stewardship in information security behaviors. Computers & Security, 124, 102960. 
Öğütçü, G., Testik, Ö. M., & Chouseinoglou, O. (2016). Analysis of personal information security behavior and awareness. Computers & Security, 56, 83-93. 
Oje, A. V., Hunsu, N. J., & May, D. (2023). Virtual reality assisted engineering education: A multimedia learning perspective. Computers & Education: X Reality, 3, 100033. 
Parsons, K., Calic, D., Pattinson, M., Butavicius, M., McCormac, A., & Zwaans, T. (2017). The human aspects of information security questionnaire (HAIS-Q): two further validation studies. Computers & Security, 66, 40-51. 
Patterson, W., Winston, C., & Fleming, L. (2016). Behavioral cybersecurity: Human factors in the cybersecurity curriculum. Advances in Human Factors in Cybersecurity: Proceedings of the AHFE 2016 International Conference on Human Factors in Cybersecurity, July 27-31, 2016, Walt Disney World®, Florida, USA, 
Pechmann, C., Zhao, G., Goldberg, M. E., & Reibling, E. T. (2003). What to convey in antismoking advertisements for adolescents: The use of protection motivation theory to identify effective message themes. Journal of marketing, 67(2), 1-18. 
Peinl, R., & Wirth, T. (2022). Presence in VR Experiences—An Empirical Cost–Benefit Analysis. Proceedings of Sixth International Congress on Information and Communication Technology: ICICT 2021, London, Volume 1, 
Permadi, R. B., & Ramli, K. (2024). Analysis of Measuring Information Security Awareness for Employees at Institution XYZ. MALCOM: Indonesian Journal of Machine Learning and Computer Science, 4(4), 1330-1338. 
Petersen, G. B., Petkakis, G., & Makransky, G. (2022). A study of how immersion and interactivity drive VR learning. Computers & Education, 179, 104429. 
Peterson, R. A., & Merunka, D. R. (2014). Convenience samples of college students and research reproducibility. Journal of Business Research, 67(5), 1035-1041. 
Phung, T., Pădurean, V.-A., Singh, A., Brooks, C., Cambronero, J., Gulwani, S., Singla, A., & Soares, G. (2024). Automating human tutor-style programming feedback: Leveraging gpt-4 tutor model for hint generation and gpt-3.5 student model for hint validation. Proceedings of the 14th learning analytics and knowledge conference, 
Piccione, J., Collett, J., & De Foe, A. (2019). Virtual skills training: the role of presence and agency. Heliyon, 5(11). 
Podsakoff, P. M., & Organ, D. W. (1986). Self-reports in organizational research: Problems and prospects. Journal of Management, 12(4), 531-544. 
Polito, V., Barnier, A. J., & Woody, E. Z. (2013). Developing the Sense of Agency Rating Scale (SOARS): An empirical measure of agency disruption in hypnosis. Consciousness and Cognition, 22(3), 684-696. 
Pollard, K. A., Oiknine, A. H., Files, B. T., Sinatra, A. M., Patton, D., Ericson, M., Thomas, J., & Khooshabeh, P. (2020). Level of immersion affects spatial learning in virtual environments: results of a three-condition within-subjects study with long intersession intervals. Virtual Reality, 24(4), 783-796. 
Posey, C., Roberts, T. L., & Lowry, P. B. (2015). The impact of organizational commitment on insiders’ motivation to protect organizational information assets. Journal of Management Information Systems, 32(4), 179-214. 
Prümmer, J., van Steen, T., & van den Berg, B. (2024). A systematic review of current cybersecurity training methods. Computers & Security, 136, 103585. 
Prümmer, J., van Steen, T., & van den Berg, B. (2025). Assessing the effect of cybersecurity training on End-users: A Meta-analysis. Computers & Security, 150, 104206. 
Queiroz, A. C., Fauville, G., Herrera, F., Leme, M. I., & Bailenson, J. N. (2022). Do students learn better with immersive virtual reality videos than conventional videos? A comparison of media effects with middle school girls. Technology, Mind, and Behavior, 3(3). 
Radianti, J., Majchrzak, T. A., Fromm, J., & Wohlgenannt, I. (2020). A systematic review of immersive virtual reality applications for higher education: Design elements, lessons learned, and research agenda. Computers & Education, 147, 103778. 
Rajab, M., & Eydgahi, A. (2019). Evaluating the explanatory power of theoretical frameworks on intention to comply with information security policies in higher education. Computers & Security, 80, 211-223. 
Raji, M. A., Olodo, H. B., Oke, T. T., Addy, W. A., Ofodile, O. C., & Oyewole, A. T. (2024). E-commerce and consumer behavior: A review of AI-powered personalization and market trends. GSC Advanced Research and Reviews, 18(3), 066-077. 
Ramic, M. (2025). VR Training and VR Education Statistics 2025. https://www.scribbr.com/citation/generator/folders/9l9sohFXoB3zZLRZTPOcV/lists/1iFwcbvuu2DgHwnSaEdllU/
Reeve, J. (2013). How students create motivationally supportive learning environments for themselves: The concept of agentic engagement. Journal of Educational Psychology, 105(3), 579. 
Rehman, I. (2023). Immersive Learning for Cybersecurity: A Virtual Reality-Based Approach for Empowering Users Against Cyber Threats. University of Malakand. 
Renganayagalu, S. K., Mallam, S. C., & Nazir, S. (2021). Effectiveness of VR head mounted displays in professional training: A systematic review. Technology, Knowledge and Learning, 1-43. 
Rippetoe, P. A., & Rogers, R. W. (1987). Effects of components of protection-motivation theory on adaptive and maladaptive coping with a health threat. Journal of Personality and Social Psychology, 52(3), 596. 
Riva, G., Davide, F., & IJsselsteijn, W. A. (2003). Being there: The experience of presence in mediated environments. In Being there: Concepts, effects and measurement of user presence in synthetic environments (pp. 3-16). IOS Press. 
Robert, N., & Mori, N. (2024). Effects of training needs assessment in enhancing employees’ skills and firm performance. Journal of Work-Applied Management. 
Rogers, R. W. (1975). A protection motivation theory of fear appeals and attitude change1. The Journal of Psychology, 91(1), 93-114. 
Rogers, R. W. (1983). Cognitive and physiological processes in fear appeals and attitude change: A revised theory of protection motivation. Social psychology: A source book, 153-176. 
Ryan, J. J. (2004). Information security tools and practices: what works? IEEE Transactions on Computers, 53(8), 1060-1063. 
Ryan, C., & Coleman, C. (2019). Mersus Office - Download free 3D model by Mersus Technologies. Sketchfab. https://skfb.ly/o7NFy
Salzman, M. C., Dede, C., Loftin, R. B., & Chen, J. (1999). A model for understanding how virtual reality aids complex conceptual learning. Presence: Teleoperators & Virtual Environments, 8(3), 293-316. 
Sandoval-Henríquez, F. J., & Badilla-Quintana, M. G. (2021). Measuring stimulation and cognitive reactions in middle schoolers after using immersive technology: Design and validation of the TINMER questionnaire. Computers & Education, 166, 104157. 
Saraswat, D., Bhattacharya, P., Verma, A., Prasad, V. K., Tanwar, S., Sharma, G., Bokoro, P. N., & Sharma, R. (2022). Explainable AI for healthcare 5.0: opportunities and challenges. Ieee Access, 10, 84486-84517. 
Sasse, M. A., Brostoff, S., & Weirich, D. (2001). Transforming the ‘weakest link’—a human/computer interaction approach to usable and effective security. BT technology journal, 19(3), 122-131. 
Sato, A., & Yasuda, A. (2005). Illusion of sense of self-agency: discrepancy between the predicted and actual sensory consequences of actions modulates the sense of self-agency, but not the sense of self-ownership. Cognition, 94(3), 241-255. 
Schütz, A. E., Weber, K., & Fertig, T. (2020). Assessing the information security awareness of university students. 
Schwebel, D. C., Combs, T., Rodriguez, D., Severson, J., & Sisiopiku, V. (2016). Community-based pedestrian safety training in virtual reality: A pragmatic trial. Accident Analysis & Prevention, 86, 9-15. 
Sebescen, N., & Vitak, J. (2017). Securing the human: Employee security vulnerability risk in organizational settings. Journal of the Association for Information Science and Technology, 68(9), 2237-2247. 
Seo, J. H., Bruner, M., Payne, A., Gober, N., McMullen, D., & Chakravorty, D. K. (2019). Using virtual reality to enforce principles of cybersecurity. The Journal of Computational Science Education, 10(1). 
Seo, S., Park, H., & Koo, C. (2024). Impact of interactive learning elements on personal learning performance in immersive virtual reality for construction safety training. Expert Systems with Applications, 251, 124099. 
Sharma, S., & Aparicio, E. (2022). Organizational and team culture as antecedents of protection motivation among IT employees. Computers & Security, 120, 102774. 
Silic, M., & Lowry, P. B. (2020). Using design-science based gamification to improve organizational security training and compliance. Journal of Management Information Systems, 37(1), 129-161. 
Siponen, M., Mahmood, M. A., & Pahnila, S. (2014). Employees’ adherence to information security policies: An exploratory field study. Information & management, 51(2), 217-224. 
Siponen, M., Rönkkö, M., Fufan, L., Haag, S., & Laatikainen, G. (2024). Protection motivation theory in information security behavior research: reconsidering the fundamentals. Communications of the Association for Information Systems, 53(1), 1136-1165. 
Siponen, M., & Vance, A. (2010). Neutralization: New insights into the problem of employee information systems security policy violations. MIS quarterly, 34(3), 487-502. 
Sommestad, T., Karlzén, H., & Hallberg, J. (2015). A meta-analysis of studies on protection motivation theory and information security behaviour. International Journal of Information Security and Privacy (IJISP), 9(1), 26-46. 
Song, Y., Wu, K., & Ding, J. (2024). Developing an immersive game-based learning platform with generative artificial intelligence and virtual reality technologies–“LearningverseVR”. Computers & Education: X Reality, 4, 100069. 
Stajkovic, A. D., & Luthans, F. (1998). Self-efficacy and work-related performance: A meta-analysis. Psychological bulletin, 124(2), 240. 
Statista. (2024). Virtual reality (VR). https://www.statista.com/topics/2532/virtual-reality-vr/ 
Stavroulia, K. E., & Lanitis, A. (2023). The role of perspective-taking on empowering the empathetic behavior of educators in VR-based training sessions: An experimental evaluation. Computers & Education, 197, 104739. 
Styoutomo, Y. A., & Ruldeviyani, Y. (2023). Information Security Awareness Raising Strategy Using Fuzzy AHP Method with HAIS-Q and ISO/IEC 27001: 2013: A Case Study of XYZ Financial Institution. CommIT (Communication and Information Technology) Journal, 17(2), 133-149. 
Sulaiman, N. S., Aziz, N. S., Nasir, A., & Yacob, A. (2023). Cyber Security Awareness Model (Among Children) Using Protection Motivation Theory: A Review. International Journal of Business and Technology Management, 5(S5), 74-85. 
Sulaiman, N. S., Fauzi, M. A., Hussain, S., & Wider, W. (2022). Cybersecurity behavior among government employees: the role of protection motivation theory and responsibility in mitigating cyberattacks. Information, 13(9), 413. 
Sykosch, A., Doll, C., Wübbeling, M., & Meier, M. (2020). Generalizing the phishing principle: analyzing user behavior in response to controlled stimuli for IT security awareness assessment. Proceedings of the 15th International Conference on Availability, Reliability and Security, 
Taherdoost, H. (2024). A critical review on cybersecurity awareness frameworks and training models. Procedia Computer Science, 235, 1649-1663. 
Tang, Q., Deng, W., Huang, Y., Wang, S., & Zhang, H. (2025). Can Generative Artificial Intelligence be a Good Teaching Assistant?—An Empirical Analysis Based on Generative AI‐Assisted Teaching. Journal of Computer Assisted Learning, 41(3), e70027. 
Tapal, A., Oren, E., Dar, R., & Eitam, B. (2017). The sense of agency scale: A measure of consciously perceived control over one's mind, body, and the immediate environment. Frontiers in Psychology, 8, 1552. 
Tehseen, S., Ramayah, T., & Sajilan, S. (2017). Testing and controlling for common method variance: A review of available methods. Journal of Management Sciences, 4(2), 142-168. 
Terbeck, S., Charlesford, J., Clemans, H., Pope, E., Lee, A., Turner, J., Gummerum, M., & Bussmann, B. (2021). Physical presence during moral action in immersive virtual reality. International journal of environmental research and public health, 18(15), 8039. 
Thompson, M., Uz-Bilgin, C., Tutwiler, M. S., Anteneh, M., Meija, J. C., Wang, A., Tan, P., Eberhardt, R., Roy, D., & Perry, J. (2021). Immersion positively affects learning in virtual reality games compared to equally interactive 2d games. Information and Learning Sciences, 122(7/8), 442-463. 
Tsakiris, M., Schütz-Bosbach, S., & Gallagher, S. (2007). On agency and body-ownership: Phenomenological and neurocognitive reflections. Consciousness and Cognition, 16(3), 645-660. 
Tschakert, K. F., & Ngamsuriyaroj, S. (2019). Effectiveness of and user preferences for security awareness training methodologies. Heliyon, 5(6). 
Urias, V. E., Van Leeuwen, B., Stout, W. M., & Lin, H. W. (2017). Dynamic cybersecurity training environments for an evolving cyber workforce. 2017 IEEE International Symposium on Technologies for Homeland Security (HST), 
Vance, A., Siponen, M., & Pahnila, S. (2012). Motivating IS security compliance: Insights from habit and protection motivation theory. Information & Management, 49(3-4), 190-198. 
Veneruso, S. V., Ferro, L. S., Marrella, A., Mecella, M., & Catarci, T. (2020). CyberVR: an interactive learning experience in virtual reality for cybersecurity related issues. Proceedings of the International Conference on Advanced Visual Interfaces, 
Visoottiviseth, V., Phungphat, A., Puttawong, N., Chantaraumporn, P., & Haga, J. (2018). Lord of secure: the virtual reality game for educating network security. 2018 seventh ict international student project conference (ict-ispc), 
Wang, A., Thompson, M., Uz-Bilgin, C., & Klopfer, E. (2021). Authenticity, interactivity, and collaboration in virtual reality games: Best practices and lessons learned. Frontiers in Virtual Reality, 2, 734083. 
Wang, G., Tse, D., Cui, Y., & Jiang, H. (2022). An exploratory study on sustaining cyber security protection through SETA implementation. Sustainability, 14(14), 8319. 
Weibel, D., & Wissmath, B. (2011). Immersion in computer games: The role of spatial presence and flow. International Journal of Computer Games Technology, 2011(1), 282345. 
Wilkinson, M., Brantley, S., & Feng, J. (2021). A mini review of presence and immersion in virtual reality. Proceedings of the human factors and ergonomics society annual meeting, 
Witmer, B. G., & Singer, M. J. (1998). Measuring presence in virtual environments: A presence questionnaire. Presence, 7(3), 225-240. 
Wong, L.-W., Lee, V.-H., Tan, G. W.-H., Ooi, K.-B., & Sohal, A. (2022). The role of cybersecurity and policy awareness in shifting employee compliance attitudes: Building supply chain capabilities. International Journal of Information Management, 66, 102520. 
Woon, I., Tan, G.-W., & Low, R. (2005). A protection motivation theory approach to home wireless security. ICIS 2005 Proceedings. 
Workman, M., Bommer, W. H., & Straub, D. (2008). Security lapses and the omission of information security measures: A threat control model and empirical test. Computers in Human Behavior, 24(6), 2799-2816. 
Wu, B., Yu, X., & Gu, X. (2020). Effectiveness of immersive virtual reality using head‐mounted displays on learning performance: A meta‐analysis. British Journal of Educational Technology, 51(6), 1991-2005. 
Xia, Q., Chiu, T. K., Lee, M., Sanusi, I. T., Dai, Y., & Chai, C. S. (2022). A self-determination theory (SDT) design approach for inclusive and diverse artificial intelligence (AI) education. Computers & Education, 189, 104582. 
Yang, H., Cai, M., Diao, Y., Liu, R., Liu, L., & Xiang, Q. (2023). How does interactive virtual reality enhance learning outcomes via emotional experiences? A structural equation modeling approach. Frontiers in Psychology, 13, 1081372. 
Yang, N., Singh, T., & Johnston, A. (2020). A replication study of user motivation in protecting information security using protection motivation theory and self determination theory. AIS Transactions on Replication Research, 6(1), 10. 
Yaokumah, W., Walker, D. O., & Kumah, P. (2022). SETA and security behavior: Mediating role of employee relations, monitoring, and accountability. In Research Anthology on Business Aspects of Cybersecurity (pp. 191-212). IGI Global. 
Zahedi, F. M., Abbasi, A., & Chen, Y. (2015). Fake-website detection tools: Identifying elements that promote individuals’ use and enhance their performance. Journal of the Association for Information Systems, 16(6), 2.
論文全文使用權限
國家圖書館
同意無償授權國家圖書館,書目與全文電子檔於2030-07-24, 於網際網路公開,延後電子全文
校內
校內紙本論文立即公開
同意電子論文全文授權校園內公開
校內電子論文延後至2030-07-24公開,延後電子全文
校外
不同意授權予資料庫廠商
校外書目延後至2030-07-24公開,延後「中英文摘要」

如有問題,歡迎洽詢!
圖書館數位資訊組 (02)2621-5656 轉 2487 或 來信