<?xml version="1.0" encoding="UTF-8"?><xml><records><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Alberto Tremori</style></author><author><style face="normal" font="default" size="100%">Sasha B. Godfrey</style></author><author><style face="normal" font="default" size="100%">Luca Berretta</style></author><author><style face="normal" font="default" size="100%">Arnau Carrera Viñas</style></author><author><style face="normal" font="default" size="100%">Pavlina Nikolova</style></author><author><style face="normal" font="default" size="100%">Iliyan Hutov</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Simulation-Based Training with Gamified Components for Augmented Border Protection</style></title><secondary-title><style face="normal" font="default" size="100%">Information &amp; Security: An International Journal</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">High Level Architecture</style></keyword><keyword><style  face="normal" font="default" size="100%">interoperable simulation</style></keyword><keyword><style  face="normal" font="default" size="100%">Modelling and Simulation</style></keyword><keyword><style  face="normal" font="default" size="100%">serious games  and gamification</style></keyword><keyword><style  face="normal" font="default" size="100%">training</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2022</style></year></dates><volume><style face="normal" font="default" size="100%">53</style></volume><pages><style face="normal" font="default" size="100%">255-272</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">ARESIBO, an EU H2020 funded project, aims to improve the efficiency of border surveillance systems by providing the operational teams and the tactical command and control levels with accurate and comprehensive information by means of augmented reality (AR). This article describes the training system, with gamified modules, that was designed and developed within the project to deliver training on the AR applications developed to operators in border security missions. The ARESIBO Training System is fed by a set of interoperable, distributed simulators (Simulation Engine) comprised of detailed landscapes, realistic assets, and end-user vetted border control scenarios. By generating virtual incidents and situations, the Training System creates realistic operational conditions in which to train and employ the ARESIBO AR devices. It also includes the front-end tools and interfaces for the trainer to setup and execute the training sessions, such as the Trainer Editor GUI. Additional gamified modules were developed to investigate the effectiveness of serious gaming for training; these modules work both on- and off-line and independently of each other to maximize the autonomy of the trainer. This work concludes with a description of the training scenario and training events.</style></abstract><issue><style face="normal" font="default" size="100%">2</style></issue><section><style face="normal" font="default" size="100%">255</style></section></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Klaus Niemeyer</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Simulation of Critical Infrastructure</style></title><secondary-title><style face="normal" font="default" size="100%">Information &amp; Security : An International Journal</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">Critical Infrastructure</style></keyword><keyword><style  face="normal" font="default" size="100%">Gamma Methodology</style></keyword><keyword><style  face="normal" font="default" size="100%">Modelling and Simulation</style></keyword><keyword><style  face="normal" font="default" size="100%">Powersim</style></keyword><keyword><style  face="normal" font="default" size="100%">System Dynamics</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2005</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2005</style></date></pub-dates></dates><volume><style face="normal" font="default" size="100%">17</style></volume><pages><style face="normal" font="default" size="100%">120-143</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">The paper presents a set of model prototypes developed to simulate the most critical areas of a highly-developed region in social, economic, technical and informational terms. The models were developed inspired by the fact that the highly integrated information infrastructure creates risks of failure and intrusions with a possible consequence of total loss of vital resources, such as energy or traffic. The models are seen on three levels of abstraction and are programmed and executed with tools from System Dynamics. On the highest level of abstraction, the modelled region is described and calculated using system attributes and variables like pro¬ductivity, social pressure, satisfaction, etc. Different layers of social, informational and physical realities are defined. On the medium level of abstraction, critical areas of an advanced society are identified and calculated using variables that represent an entity in the reality and that, in general, have an empirical context. Identified critical areas for the first experiments with the model were the sectors of energy, communications, traffic, security, government, and defence. Applying a methodol¬ogy to identify value drivers and to visualise the interrelations of components in complex systems helped in developing the model inputs and descriptive factors. This approach was used together with a group of experts in each area. On a low level of abstraction, a model prototype was developed using variables that in gen¬eral can be measured and quantified based on real-life empirical sources. The latter approach is very complex and resource-intensive and requires detailed insight and knowledge. The first application of the models was related to an exercise that demonstrates the risks of software attacks in information networks and the possible consequences for other sensitive areas. Sensitivity analyses with the models showed that the threat of intrusion into the information networks with the consequence of loss of vital resources is likely to be overestimated in comparison to the threat of a direct attack on the relevant vital sectors.</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Klaus Niemeyer</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Simulation of Critical Infrastructures</style></title><secondary-title><style face="normal" font="default" size="100%">Information &amp; Security: An International Journal </style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">Critical Infrastructure</style></keyword><keyword><style  face="normal" font="default" size="100%">Gamma Methodology</style></keyword><keyword><style  face="normal" font="default" size="100%">Modelling and Simulation</style></keyword><keyword><style  face="normal" font="default" size="100%">Powersim</style></keyword><keyword><style  face="normal" font="default" size="100%">System Dynamics</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2005</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2005</style></date></pub-dates></dates><volume><style face="normal" font="default" size="100%">17</style></volume><pages><style face="normal" font="default" size="100%">120–143</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">The paper presents a set of model prototypes developed to simulate the most critical areas of a highly-developed region in social, economic, technical and informational terms. The models were developed inspired by the fact that the highly integrated information infrastructure creates risks of failure and intrusions with a possible consequence of total loss of vital resources, such as energy or traffic. The models are seen on three levels of abstraction and are programmed and executed with tools from System Dynamics. On the highest level of abstraction, the modelled region is described and calculated using system attributes and variables like productivity, social pressure, satisfaction, etc. Different layers of social, informational and physical realities are defined. On the medium level of abstraction, critical areas of an advanced society are identified and calculated using variables that represent an entity in the reality and that, in general, have an empirical context. Identified critical areas for the first experiments with the model were the sectors of energy, communications, traffic, security, government, and defence. Applying a methodology to identify value drivers and to visualise the interrelations of components in complex systems helped in developing the model inputs and descriptive factors. This approach was used together with a group of experts in each area. On a low level of abstraction, a model prototype was developed using variables that in general can be measured and quantified based on real-life empirical sources. The latter approach is very complex and resource-intensive and requires detailed insight and knowledge. The first application of the models was related to an exercise that demonstrates the risks of software attacks in information networks and the possible consequences for other sensitive areas. Sensitivity analyses with the models showed that the threat of intrusion into the information networks with the consequence of loss of vital resources is likely to be overestimated in comparison to the threat of a direct attack on the relevant vital sectors.</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Editorial</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Advances in Modelling and Simulation</style></title><secondary-title><style face="normal" font="default" size="100%">Information &amp; Security: An International Journal</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">defence</style></keyword><keyword><style  face="normal" font="default" size="100%">Modelling and Simulation</style></keyword><keyword><style  face="normal" font="default" size="100%">security</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2003</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2003</style></date></pub-dates></dates><volume><style face="normal" font="default" size="100%">12</style></volume><pages><style face="normal" font="default" size="100%">5-15</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p&gt;Editorial article by the I&amp;amp;S Editorial Board, presenting major current challenges and a summary of the contributions this volume makes in providing solutions.&lt;/p&gt;</style></abstract><issue><style face="normal" font="default" size="100%">1</style></issue><section><style face="normal" font="default" size="100%">005</style></section></record></records></xml>