Hollywood Meets Learning: The Use of Simulated Virtual Reality to Depict Invisible Cybersecurity Phenomena
We use simulated VR to depict the invisible operations of network attacks, which we operationalize as Hollywood Meets Learning.
Tell us more about you. (1,000 characters)
I design immersive learning systems for use in education and training. I have a Ph.D. in information systems and am an assistant professor of computer science at The University of Texas at Tyler. I have two decades of industry experience as a corporate finance banker, a CFO and a co-founder of an e-learning company. See my blog for more.
Why are you participating in this Challenge? (750 characters)
I have long considered how to theorize and validate the design of behavioral cybersecurity training that users of information systems find useful and that operators of such systems find effective in promoting behavioral compliance to an extent that permits more IT spending on efforts to counter advanced persistent threats. I agree that the visuals commonly used in cybersecurity education have limited usefulness because they violate the five principles you’ve articulated. But I claim that your challenge’s focus on visuals is too narrow. Yes, better visuals will help. But if they’re static, they won’t help much, unless they’re incorporated within a systems-based model of mobile messaging that we call “Hollywood Meets Learning."
My blog contains posts that illustrate several visuals that I have designed, tested and deployed for training in behavioral cybersecurity.
What is your experience with the field of cybersecurity?
I have considerable experience and/or knowledge in the cybersecurity field.
What best describes you?
I’m a cybersecurity professional with an interest in visuals.
How did you hear about this OpenIDEO Challenge?
Location: State / District