宣称 发表于 2025-3-25 06:32:45
http://reply.papertrans.cn/59/5841/584100/584100_21.png协奏曲 发表于 2025-3-25 10:30:01
http://reply.papertrans.cn/59/5841/584100/584100_22.png失误 发表于 2025-3-25 13:27:07
http://reply.papertrans.cn/59/5841/584100/584100_23.png鸵鸟 发表于 2025-3-25 18:21:19
http://reply.papertrans.cn/59/5841/584100/584100_24.png疯狂 发表于 2025-3-25 23:36:51
O. Zinke,H. Brunswigonduct effective training for cyber situation awareness, it becomes essential to design realistic training scenarios. In this paper, we present a Cognitive Task Analysis based approach to address this training need. The technique of Cognitive Task Analysis is to capture and represent knowledge used雪崩 发表于 2025-3-26 00:09:42
http://reply.papertrans.cn/59/5841/584100/584100_26.png横条 发表于 2025-3-26 08:23:11
http://reply.papertrans.cn/59/5841/584100/584100_27.png与野兽博斗者 发表于 2025-3-26 10:48:41
O. Zinke,H. Brunswigavior. Users are supposed to engage in secure behavior by use of security features or procedures but those struggle to get widespread use and one hindering factor is usability. While several previous papers studied various usability factors in the cybersecurity domain, a common understanding of usab忍受 发表于 2025-3-26 15:49:46
O. Zinke,H. Brunswig cognitive overload among students. Cognitive load includes: 1) intrinsic load (IL- due to inherent difficulty of the topic), 2) extraneous (EL- due to presentation of material), and 3) germane (GL- due to extra effort put in for learning). The challenge is to minimize IL and EL and maximize GL. WeFILTH 发表于 2025-3-26 20:35:27
http://reply.papertrans.cn/59/5841/584100/584100_30.png