<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Crisis in Syndstad: A Serious Game for Post-Incident Investigation Training</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Richard McEvoy</string-name>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Stewart Kowalski NTNU</string-name>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Teknologiveien</string-name>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Gjøvik</string-name>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Norway</string-name>
        </contrib>
      </contrib-group>
      <pub-date>
        <year>2025</year>
      </pub-date>
      <abstract>
        <p>Crisis in Syndstad is a serious game designed to enhance post-incident investigation training in cybersecurity by integrating both technical and interpersonal skills. The game immerses players in a simulated crisis, challenging them to apply empathetic communication with diverse stakeholders in contrast to analytical investigative techniques. By contrasting logical deduction with empathetic engagement, the study explores how soft skills can improve information gathering, collaboration, and understanding in high-pressure environments. This approach advocates for a shift in cybersecurity education, emphasizing the value of trust, negotiation, and emotional intelligence in analyzing and preventing sociotechnical failures over purely analytical approaches.</p>
      </abstract>
      <kwd-group>
        <kwd>1 CDX</kwd>
        <kwd>empathy</kwd>
        <kwd>sociotechnical</kwd>
        <kwd>investigation</kwd>
        <kwd>incident</kwd>
        <kwd>serious games</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1.Introduction</title>
      <p>
        Cybersecurity incident response has traditionally been rooted in a logic-driven, systems-thinking
approach that prioritizes technical analysis and structured problem-solving over human and social
aspects. While effective in identifying vulnerabilities and mitigating threats, this methodology often
overlooks the critical interpersonal and psychological dimensions of security investigations. In
particular, it neglects the requirement to understand incidents from the point of view of the
individuals caught up in them – something that has been seen as key to understanding similar crises in
health and safety engineering (which we regard as a superset of cyber security engineering)
particularly in the work of Reason and Dekker, who emphasize latent conditions and second-victim
dynamics[
        <xref ref-type="bibr" rid="ref1 ref2">1, 2</xref>
        ].Recent research in cybersecurity education and crisis communication suggests that
technical expertise alone is insufficient in high-pressure scenarios where stakeholder coordination,
trust, and collaboration are essential[
        <xref ref-type="bibr" rid="ref3">3</xref>
        ]. This paper argues that security narratives must evolve—not
only from a technical to a sociotechnical perspective but, as a corollary, from one emphasizing
forensic analysis, deduction and fault identification to one centred on interpersonal negotiation and
empathetic communication.
      </p>
      <p>
        The necessity of integrating soft skills into cybersecurity training is underscored by studies such as
Maennel et al. [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ], which highlight the importance of emotional, social, and cognitive aspects in
Cyber Defence Exercises (CDX). Psychological safety and multidisciplinary education are key factors in
developing security professionals who can navigate complex crisis environments effectively.
Similarly, [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ] emphasize the role of active listening, empathy, and rapport-building in crisis negotiation,
demonstrating that influence and behavioural change are contingent on trust-based interactions
rather than adversarial confrontation. This approach has been popularised by Chris Voss under the
label Tactical Empathy© [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ].
      </p>
      <p>
        This shift towards socio-technical security analysis aligns with frameworks like Soft Systems
Methodology [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ] and Root Cause Analysis for socio-technical failures [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ], both of which advocate
holistic approaches that consider organizational behaviours and human factors alongside technical
vulnerabilities. Furthermore, Mayer et al. [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ] provide a foundational model for understanding
organizational trust, distinguishing ability-based credibility from the longer-term evolution of trust
through demonstrated integrity and benevolence. The dynamics of trust-building are particularly
relevant in post-incident cybersecurity investigations, where punitive responses often undermine
cooperation and engagement, as evidenced by Renaud et al. [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ] in their critique of shame-based
security cultures. Beyond this, they foreshorten the analysis of incidents and fail to take account of
the requirement to analyse the incident “as it occurred” and not from the point of view of “20/20
hindsight”[
        <xref ref-type="bibr" rid="ref2">2</xref>
        ].
      </p>
      <p>Drawing on these principles, this paper presents Crisis in Syndstad, a serious game designed to
train cybersecurity professionals in post-incident investigation strategies comparing collaboration
and empathetic understanding with logical analysis or blame assignment. By contrasting two
investigative approaches—one based on logic-driven interrogation and the other on Tactical
Empathy© —the game helps students examine how trust-building and interpersonal engagement can
enhance security analysis. This approach to cybersecurity pedagogy seeks to foster professionals
who not only diagnose technical failures but who can also navigate stakeholder dynamics to elicit
critical information and drive meaningful incident resolution.</p>
      <p>
        In this evolving security landscape, cybersecurity practitioners must become skilled
communicators, negotiators, and trust-builders. As Sasse et al. [
        <xref ref-type="bibr" rid="ref11">11</xref>
        ] assert, security systems often fail
not due to technical flaws but because of their misalignment with human behaviours and
organizational processes. This paper proposes that post-incident investigation should no longer
treat human elements as secondary factors but instead embrace them as central components of
cybersecurity resilience. This means rejecting any concept that technology or processes are perfect
and hence only the human can be at fault. Instead, by empathetic questioning, analysts come to
understand why - what are “poor” decisions in hindsight - were made in the first place, and hence
appropriately distributing causality across the sociotechnical structures in the organization and
beyond.
      </p>
    </sec>
    <sec id="sec-2">
      <title>2. Literature Review: Integrating Soft Skills and Narrative-Driven Learning in Cybersecurity Education</title>
      <p>In this section, we review the literature on cyber security incident investigation and the role of
sociotechnical skills and empathetic approaches to improving investigation outcomes. We highlight
the role serious gaming plays in educating individuals in these skills.</p>
    </sec>
    <sec id="sec-3">
      <title>2.1. Traditional Cybersecurity Narratives: The Limits of Systems</title>
    </sec>
    <sec id="sec-4">
      <title>Thinking and Logical Reasoning</title>
      <p>
        Cybersecurity education has historically centred on technical expertise and systems thinking,
emphasizing structured methodologies for identifying vulnerabilities, mitigating risks, and conducting
post-incident investigations – for example, [
        <xref ref-type="bibr" rid="ref12">12</xref>
        ]. This traditional approach assumes that security
failures stem primarily from technical weaknesses rather than social or psychological dynamics.
However, researchers have increasingly critiqued this technical perspective for neglecting the human
and organizational factors essential to incident response and to approaches to IT management in
general [
        <xref ref-type="bibr" rid="ref13 ref14 ref7">7, 13, 14</xref>
        ].
      </p>
      <p>
        Root Cause Analysis (RCA), adapted for socio-technical security incidents[
        <xref ref-type="bibr" rid="ref8">8</xref>
        ], highlights how
traditional security investigations often overlook behavioural and emotional dimensions. Similarly,
research reveals that employees frequently develop informal security practices (known as “shadow
security”) when official protocols fail to align with workplace realities [
        <xref ref-type="bibr" rid="ref15">15</xref>
        ]. These findings suggest
that security breaches are rarely attributable solely to technical misconfigurations but also include
gaps in communication, trust, and organizational alignment. This can happen at the user interface
or during the development and implementation processes.
      </p>
      <p>
        Furthermore, failures need not simply be attributed to the operational level, but can arise from
incomplete feedback loops at higher levels of the organisation, pointing to systemic shortcomings
in the governance, management, design and implementation of systems[
        <xref ref-type="bibr" rid="ref16">16</xref>
        ]. Post-incident
investigation is, therefore, not just about capturing weaknesses in terms of technical or user failure, but
requires an investigative process which encompasses higher levels of the organisation and the
social, economic and political context in which it operates.
      </p>
    </sec>
    <sec id="sec-5">
      <title>2.2. The Role of Emotional Intelligence in Cybersecurity Incident Response</title>
      <p>
        Recent studies advocate for a more people-centred approach to cybersecurity investigations,
incorporating people skills, negotiation techniques, and trust-building strategies. For instance,
Maennel et al. [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ] propose a multidimensional Cyber Defence Exercise (CDX) model that integrates
emotional, social, and cognitive aspects into cybersecurity training. By fostering psychological
safety and intrinsic motivation, such exercises enhance learning outcomes beyond traditional
technical drills.
      </p>
      <p>
        Trust is a critical component of effective security responses, particularly in high-pressure crisis
scenarios. Mayer, Davis, and Schoorman [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ] conceptualize organizational trust as a dynamic
interplay between ability, benevolence, and integrity, arguing that the willingness to be vulnerable to
others' actions is foundational to collaborative problem-solving. This perspective aligns with
research into cybersecurity investigations, where punitive blame cultures often obstruct meaningful
information exchange[
        <xref ref-type="bibr" rid="ref10">10</xref>
        ]. A shift toward a "Just Culture" framework—where mistakes are analysed
constructively rather than penalized—is necessary to foster more effective post-incident
assessments. Furthermore, experience in the health and safety industry strongly suggests that the best
way to understand an incident is to take the point of view of the individual in that incident, not
with the benefit of hindsight, but rather seeking to understand their behaviour in the exact context
of the when and where the incident occurred. We argue that this requires a practical approach to
empathizing with the individual[
        <xref ref-type="bibr" rid="ref1">1</xref>
        ].
      </p>
    </sec>
    <sec id="sec-6">
      <title>2.3. Crisis Negotiation and Tactical Empathy in Security Investigations</title>
      <p>
        Studies on crisis negotiation techniques provide valuable insights for cybersecurity professionals
seeking to improve post-incident investigative processes. Vecchi, Van Hasselt, and Romano[
        <xref ref-type="bibr" rid="ref5">5</xref>
        ]
identify active listening, empathy, and rapport-building as core skills that facilitate de-escalation
and influence in high-stakes scenarios. These techniques are commonly employed in hostage
negotiations but have direct relevance to cybersecurity investigations, where adversarial confrontations
can impede cooperation with the investigation.
      </p>
      <p>
        Crisis negotiation research underscores the importance of emotional intelligence, particularly in
settings where stakeholders may be defensive, distrustful, or unwilling to disclose critical
information[
        <xref ref-type="bibr" rid="ref17">17</xref>
        ]. We argue that cyber security professionals trained in Tactical Empathy©—an
approach that emphasizes understanding the psychological states and motivations of stakeholders—
would be more effective at eliciting intelligence and navigating complex security crises. This is not
new in the sense that these techniques are recognisably part of what is labelled “consultancy
skills”[
        <xref ref-type="bibr" rid="ref18">18</xref>
        ] but the difference is that these skills are provably trainable and have been tested in high
stakes scenarios.
      </p>
      <p>For example, the victim of a phishing attack on a corporation can be blamed twice – first, for being
victim to the phishing attack, and second, for being the “cause” of the organization’s cybersecurity
crisis. This double jeopardy makes it too easy to both foreshorten the investigation and to silence
individuals who could otherwise usefully speak up, either forestalling the crisis or helping to
comprehend its causes to improve processes in future. A wider conversation would cover how aware the
individual was, what training they had received, how effective that training was, what other
mechanisms (e.g., end point protection technologies) were employed and how effectively they might be
in alerting the individual – and so forth!</p>
      <p>
        Empathy should not be mistaken for compassion, or agreement. A Machiavellian individual can
be empathic, but not motivated to respond to their understanding of others in a compassionate
way[
        <xref ref-type="bibr" rid="ref19">19</xref>
        ]. Empathetic understanding, in this instance, should therefore be understood as a specific
and pragmatic socio-communicative skill in establishing with another individual that their point of
view has been clearly understood, both intellectually and emotionally. Nonetheless, even in
individuals that might be perceived to be ruthless, demonstrating that their point of view is understood
can be powerfully transformative in terms of future relations with them[
        <xref ref-type="bibr" rid="ref5">5</xref>
        ].
      </p>
    </sec>
    <sec id="sec-7">
      <title>2.4. Serious Gaming as a Pedagogical Tool for Cybersecurity Training</title>
      <p>
        Serious games have emerged as powerful tools for experiential learning in cybersecurity
education[
        <xref ref-type="bibr" rid="ref20">20</xref>
        ]. Unlike conventional training methodologies that rely on theoretical instruction, serious
gaming immerses participants in interactive simulations that mimic real-world challenges. These
exercises foster active engagement, strategic thinking, and adaptability under pressure[
        <xref ref-type="bibr" rid="ref21">21</xref>
        ].
      </p>
      <p>
        Recent systematic reviews affirm that serious games enhance cybersecurity awareness and
retention by leveraging narrative immersion, feedback loops, and scenario-based problem solving.
Moumouh et al. [
        <xref ref-type="bibr" rid="ref22">22</xref>
        ] highlight that serious games improve privacy and security knowledge among
professionals, especially when tailored to specific sectors such as healthcare and critical
infrastructure[
        <xref ref-type="bibr" rid="ref7">7</xref>
        ]. These games often incorporate gamified mechanics—such as role assignment, time
pressure, and branching decision trees—that simulate adversarial conditions and ethical dilemmas.
      </p>
      <p>
        Hill et al.[
        <xref ref-type="bibr" rid="ref23">23</xref>
        ] compare twenty serious games across cybersecurity domains, noting that effective
game design aligns with recognized knowledge units (KUs) and instructional goals[
        <xref ref-type="bibr" rid="ref8">8</xref>
        ]. Their rubric
emphasizes the importance of interface quality, scenario realism, and cognitive scaffolding in
shaping learner outcomes.
      </p>
      <p>
        The Crisis in Syndstad serious game aligns with this approach, integrating Tactical Empathy©
principles into cybersecurity education. Players navigate ambiguous crisis scenarios where
interpersonal trust and strategic negotiation can shape the success of post-incident investigations. This
mirrors findings from the literature that underscore the role of emotional intelligence, psychological
safety, and social cognition in cyber crisis response [
        <xref ref-type="bibr" rid="ref24 ref5">5, 24</xref>
        ].
      </p>
      <p>At the same time, the role of logic and data analysis is explored as a rival strategy – to allow a
comparison of the two methods, leading to a reflective discussion of when and how they should be
used.</p>
      <p>
        Finally, serious games serve as epistemic laboratories—spaces where learners can repeatedly
rehearse complex decision-making under uncertainty, test hypotheses about adversarial behaviour,
and reflect on the ethical dimensions of cyber defence. When embedded within a broader
curriculum, they offer recursive opportunities for feedback, adaptation, and ritualized learning.
The literature suggests that cybersecurity education must move beyond traditional technical and
socio-technical methodologies to embrace narrative-driven learning models. Sasse et al.[
        <xref ref-type="bibr" rid="ref11">11</xref>
        ] argue
that security systems often fail due to misalignment with human behaviours rather than
technological deficiencies. By incorporating insights from crisis negotiation research, trust-building
frameworks, and serious gaming methodologies, cybersecurity educators can better equip professionals
with the people skills necessary for effective incident response.
      </p>
      <p>This paper builds on these principles by presenting Crisis in Syndstad as a serious game designed
to shift security narratives—away from rigid logical assessment and toward collaborative,
trustbased problem-solving. By embedding Tactical Empathy© into the investigative process, security
professionals can enhance information flow, reduce conflict, and improve overall security resilience.</p>
    </sec>
    <sec id="sec-8">
      <title>3. Research Motivation</title>
      <p>Cybersecurity incident investigations remain dominated by logic-driven, technically structured
methodologies that often obscure the human realities at play. Even sociotechnical
approaches—while broader in scope—frequently fail to account for the emotional, psychological, and
interpersonal complexities that shape post-incident dynamics and focus on analytical approaches
to dealing with systemic social issues. In high-stakes scenarios involving human error, insider
threats, and organizational breakdowns, investigators must navigate conflicting narratives,
emotional defensiveness, and trust deficits that resist purely analytical treatment.</p>
      <p>This research is motivated by the persistent gap between procedural analysis and empathetic
engagement. Emotional responses such as shame, fear, and frustration can obstruct information flow
and reinforce adversarial cultures, especially when investigations default to blame attribution. By
contrast, crisis negotiation literature demonstrates that empathy, active listening, and
rapportbuilding foster transparency and collaboration—skills that are critically underutilized in
cybersecurity pedagogy.</p>
      <p>Crisis in Syndstad emerges from this tension, offering a serious game framework that
reimagines post-incident investigation as a socio-emotional process. It seeks to train
cybersecurity professionals not only in technical diagnosis but in trust-building, stakeholder engagement,
and the dignified handling of human complexity.</p>
    </sec>
    <sec id="sec-9">
      <title>4. Problem Definition: The Limits of Logic in Cybersecurity Incident Investigation</title>
      <sec id="sec-9-1">
        <title>4.1. The Dominance of Technical and Logic-Driven Approaches in Cybersecurity</title>
        <p>
          Traditional cybersecurity methodologies have overwhelmingly prioritized structured logical
reasoning and a technical focus to diagnose vulnerabilities, manage risks, and investigate incidents –
for example, [
          <xref ref-type="bibr" rid="ref12">12</xref>
          ]. But even where approaches focus on sociotechnical analysis, widening the
investigation beyond technical issues to embrace organizational factors such as [
          <xref ref-type="bibr" rid="ref14 ref25 ref8">8, 14, 25</xref>
          ],
methodologies often fail to account for the emotional and psychological complexities that influence
post-incident investigative processes that make a logical and systematic investigation difficult.
        </p>
        <p>
          Cybersecurity incidents—particularly those involving human error, insider threats, and
organizational failures—require more than mere technical, or even sociotechnical analysis.
Decisionmakers must navigate conflicting narratives, engage with resistant stakeholders, and foster trust
within crisis-stricken organizations. A purely logic-driven perspective, however, often frames
investigations as adversarial processes, focusing on fault-finding rather than collaborative
problemsolving. The methodology employed can also foreshorten the investigation under the assumption
that the analysis approach used is sufficient, and ignoring its documented limitations[
          <xref ref-type="bibr" rid="ref1">1</xref>
          ].
        </p>
      </sec>
      <sec id="sec-9-2">
        <title>4.2. The Sociotechnical Shift: Progress but Persistent Gaps</title>
        <p>
          The adoption of sociotechnical methodologies has broadened cybersecurity investigations by
integrating human and organizational factors into traditional analyses[
          <xref ref-type="bibr" rid="ref7">7</xref>
          ]. This shift acknowledges
that security incidents rarely emerge from technical failures alone; rather, they arise from the
interplay between technology, policy, and human behaviour. However, even within sociotechnical
approaches, investigations frequently remain rigidly structured, relying on logical analysis and
procedural frameworks.
        </p>
        <p>
          The problem with this is that the human dimension, the need to empathize with the players in
the situation, to understand the world from their perspective, which has been recognized in the
health and safety world [
          <xref ref-type="bibr" rid="ref1">1</xref>
          ], is lost both in terms of the analysis itself and its investigation, and the
barriers which human emotional responses put up to analytical approaches due to both blame
shifting behaviours[26] and cognitive overload[
          <xref ref-type="bibr" rid="ref24">24</xref>
          ] are ignored in cybersecurity crisis handling and
investigations.
        </p>
        <p>
          As an example, research into “shadow security” behaviours[
          <xref ref-type="bibr" rid="ref15">15</xref>
          ] highlights how employees often
bypass official security protocols due to usability constraints. Yet, instead of addressing underlying
usability challenges, organizations frequently respond with compliance enforcement, reinforcing an
adversarial culture and losing the opportunity to design away from a dysfunctional environment
which inevitably results in continual and repeated future divergences from policy and process.
Similarly, cybersecurity education often emphasizes rational analysis and engineering based thinking
without sufficiently integrating psychological and social dynamics [
          <xref ref-type="bibr" rid="ref21">21</xref>
          ].
        </p>
      </sec>
      <sec id="sec-9-3">
        <title>4.3. The Role of Emotion in Crisis Investigation</title>
        <p>
          Security incidents provoke a range of emotional responses, from rage and disgust to fear and
defensiveness to frustration and distrust. The failure to incorporate emotional intelligence into
investigative processes can lead to communication breakdowns and obstruct the flow of
information. Shame, in particular, has been identified as a counterproductive force in cybersecurity[
          <xref ref-type="bibr" rid="ref10">10</xref>
          ].
When incident response relies on punitive measures, or blame attribution, individuals are less likely
to disclose critical information, instead engaging in avoidance behaviours that exacerbate security
risks.
        </p>
        <p>
          In contrast, studies on crisis negotiation emphasize the value of empathetic engagement,
rapportbuilding, and trust-based communication [
          <xref ref-type="bibr" rid="ref5">5</xref>
          ]. These skills, commonly employed in hostage
negotiations, are equally relevant in post-incident cybersecurity investigations. When investigators
use pro-active listening and demonstrate empathy, they foster a collaborative environment that
encourages transparency and constructive dialogue.
        </p>
      </sec>
    </sec>
    <sec id="sec-10">
      <title>5. Changing the Narrative: Creating A Safe Space for Collaboration in</title>
    </sec>
    <sec id="sec-11">
      <title>Addressing the Causes of Incidents</title>
      <p>Our approach to resolving this problem is to shift the thinking of professionals and students of
cyber security, not to neglecting logical and technical approaches, but to enhancing their
sociotechnical understanding and to employing empathy as a tool for both understanding and
negotiating crisis situations and their investigation.</p>
      <sec id="sec-11-1">
        <title>5.1. Psychological Safety in Cyber Defence Exercises</title>
        <p>
          Building on the role of emotion in security investigations, Maennel et al. [
          <xref ref-type="bibr" rid="ref4">4</xref>
          ]propose a
multidimensional Cyber Defence Exercise (CDX) model that incorporates psychological safety,
intrinsic motivation, and interpersonal engagement. Their findings suggest that individuals perform
more effectively in crisis scenarios when they feel psychologically safe—free from excessive scrutiny
or punitive consequences. This principle aligns with the broader movement toward a "Just Culture"
[27] security framework, where incident investigations focus on learning and systemic
improvement rather than individual blame.
        </p>
        <p>By fostering an investigative approach rooted in psychological safety and trust-building,
cybersecurity professionals can move beyond adversarial methodologies, turning the “just culture”
approach into a pragmatic tool. Empathy-based information elicitation, strategic negotiation, and
interpersonal engagement should complement technical analysis to create a holistic framework for
post-incident security response.</p>
      </sec>
      <sec id="sec-11-2">
        <title>5.2. Toward an Empathy-Driven Security Narrative</title>
        <p>Cybersecurity education must likewise evolve to integrate emotional intelligence, trust-building,
and negotiation techniques as core competencies in post-incident investigation. A rigid logic-based
investigative model limits the ability of security professionals to navigate the complexities of crisis
response. An approach which is based on empathy and on building trust relationships, aiming for
collaborative outcomes provides a firmer basis for successful post-incident investigations.</p>
      </sec>
      <sec id="sec-11-3">
        <title>5.3. Reframing Post-Incident Investigation: From Logic to Tactical Empathy</title>
        <p>To resolve the limitations of traditional cybersecurity post-incident investigations, this paper
advocates for a transformative approach—one that shifts the focus from rigid logic-driven analysis
to an empathy-based model. The Crisis in Syndstad serious game embodies this paradigm, providing
a structured environment where security professionals practice Tactical Empathy© in high-pressure
investigative settings. By integrating trust-building and interpersonal engagement into
cybersecurity pedagogy, the game challenges conventional blame-centric narratives, fostering collaborative
problem-solving and improving crisis resolution outcomes.</p>
      </sec>
      <sec id="sec-11-4">
        <title>5.4. Leveraging Serious Games for Human-Centered Cybersecurity Training</title>
        <p>
          Serious gaming (see Section 2.4) offers an experiential learning framework for cybersecurity
professionals to develop critical soft skills necessary for effective post-incident investigations.
Roleplaying simulations facilitate the application of interpersonal negotiation techniques, active
listening strategies, and trust-building methodologies within adversarial security scenarios. Our
approach builds on existing research in crisis negotiation and cybersecurity education, drawing from
studies on tabletop cyber exercises[
          <xref ref-type="bibr" rid="ref21">21</xref>
          ] and crisis resolution methodologies to enhance security
training.
        </p>
      </sec>
    </sec>
    <sec id="sec-12">
      <title>6. Crisis in Syndstad: Scenario Design and Gameplay Structure</title>
      <p>6.1. Scenario Design</p>
      <p>Crisis in Syndstad is a multiplayer serious game designed to simulate the emotional, political, and
technical complexities of post-incident investigation. Set in the fictional Norwegian city of
Syndstad—recently devastated by unprecedented flooding—the game challenges players to uncover
the layered causes behind the crisis. These range from infrastructure fragility and climate-induced
weather anomalies to cyber-attacks on SCADA systems and failures in risk communication.</p>
      <p>AI (Microsoft Copilot 2025) was used to support the scripting of the game scenarios and the roles
of non-Player Characters(NPCs), drawing on real-world incidents which were relevant to the
fictional incident we invented. The structure and plotting of the game were original to the authors.</p>
      <p>The game scenario extends the investigation beyond the purely technical aspects of a cyber
security failure, due to an alleged cyber attack which may have led to failures in the city’s water
management system resulting in severe flooding with high impact costs.</p>
      <p>The players are confronted with a range of possible contributory factors: the severity of the
storm, which is a once in a hundred years event; failures to take into account predictions about
storm severityand frequency changing due to climate change; potential over-development of the
city in advance of the capacity of its water management system – due to pressure from business and
tourist sectors as well as families seeking new homes; the nature of the SCADA system with old, but
unreliable, pumps on the one hand, and new, but cyber vulnerable, pumps on the other. The game
play scenario even hints at corruption in high places. All factors were taken from real-world
scenarios – for example, the flooding of Chicago’s millionaire district[28], incidents with water
management systems potentially caused by cyber attacks[29], and the role of climate change in altering
weather patterns[30].</p>
      <p>The NPCs include the city mayor, a climate scientist, the head of IT, the head of the risk team, the
chief engineer and the town planner – giving the team choices about who to interview in the short
period of time allowed by the game. Furthermore, the NPCs as well as explaining and justifying
their own actions (based on scripts provided) can also blame the members of the investigation team
for their “failures” during the crisis.</p>
      <p>Finally, we introduce joker options and wild cards to spice up game play (see section 6.2).</p>
      <sec id="sec-12-1">
        <title>6.2. Gameplay Structure</title>
        <p>The gameplay unfolds over multiple rounds, each structured into four distinct phases:
Briefing Phase: Players receive evolving updates, including technical reports, witness statements,
and contextual data. These updates reflect real-world uncertainty and information asymmetry,
preparing players for the ambiguity inherent in crisis response.</p>
        <p>Interrogation Phase: Teams engage with scripted NPCs representing diverse
stakeholders—mayors, engineers, urban planners, climate scientists, and IT security leads. These interactions are
designed to simulate political defensiveness, blame-shifting, and emotional latency. NPCs may offer
justifications, deflections, or partial truths, requiring players to navigate complex interpersonal
terrain.</p>
        <p>Analysis Phase: Players synthesize the collected data, weighing individual accountability against
systemic failure. The phase emphasizes the tension between technical diagnosis and sociotechnical
interpretation, inviting players to consider whether the crisis stems from isolated negligence or
embedded structural vulnerabilities.</p>
        <p>Decision Phase: Using the CATWOE framework (Customers, Actors, Transformation Process,
Worldview, Owners, Environmental Constraints), teams assign responsibility—not merely to
identify fault, but to explore how worldview, governance, and environmental constraints shape
outcomes. The framework scaffolds structured reflection while resisting simplistic blame narratives.</p>
        <p>A key gameplay element involves the analysis of a cyber-attack targeting SCADA systems that
manage drainage pumps. Players must evaluate whether the attack exploited unpatched
vulnerabilities, involved zero-day exploits, or reflected deeper organizational failures in IT
governance. This scenario links the fictional crisis to real-world cybersecurity threats, such as the
Oldsmar water treatment incident, and invites players to consider the fragility of cyber-physical
systems under stress.</p>
        <p>To heighten realism and emotional engagement, players role-play as investigative teams who
may themselves be implicated in the crisis. This recursive framing introduces moral tension:
players must fairly apportion blame while resisting the instinct to deflect responsibility. NPCs may
mirror this defensiveness, creating a dynamic interplay of trust, shame, and strategic disclosure.
Additional gameplay stressors include:
Wild Cards: Randomized information drops that may be misleading, irrelevant, or revelatory—
simulating the chaos of real-time crisis investigation.</p>
        <p>Joker Option: A limited-use whistleblower mechanic that provides anonymous insider
information, challenging players to weigh credibility against strategic advantage.</p>
        <sec id="sec-12-1-1">
          <title>The experimental setup contrasts two investigative paradigms:</title>
          <p>- Team Blue employs Tactical Empathy©, drawing on FBI negotiation techniques to foster
rapport, reduce defensiveness, and enhance information flow.
- Team Red uses logic and forensic question, focusing on evidence-based reasoning and
adversarial refutation.</p>
          <p>By comparing outcomes, the game explores whether soft skills—empathy, listening, and
trustbuilding—can outperform traditional logic-driven inquiry in high-pressure, emotionally charged
environments.</p>
        </sec>
        <sec id="sec-12-1-2">
          <title>Expected learning outcomes include:</title>
          <p>- Mastery of structured investigative reasoning.
- Practice in de-escalation and empathetic engagement.
- Critical reflection on the ethics of blame, responsibility, and systemic failure.
- Application of CATWOE as a tool for nuanced accountability.</p>
          <p>Ultimately, Crisis in Syndstad reframes post-incident investigation not as a fault-finding
exercise, but as a collaborative, emotionally intelligent process of truth-seeking and systemic
understanding.</p>
        </sec>
      </sec>
      <sec id="sec-12-2">
        <title>6.2. Use of Tools versus Human Input</title>
        <p>The support provided by AI to create the game raises a question over whether the game should
be administered purely by humans or if artificial intelligence could take over some of the roles.
Our own opinion is that the usefulness of AI lies in its ability to generate and alter game scenarios
rapidly so that the game can be played several times with fresh problems. However, because the
game is about learning to use Tactical Empathy© as opposed to purely relying on logical analysis,
it is important that key roles are played by humans who can act naturally and accurately reflect
the range of human emotions. This, of course, does not prevent the use of AI for recording and
helping with the analysis of game play.</p>
      </sec>
    </sec>
    <sec id="sec-13">
      <title>7. Post-Game Analysis: Debriefing and Discussion</title>
      <p>Following the gameplay, participants are required to engage in structured post-game analysis
and discussions. This involves reflecting on their investigative tactics, assessing the effectiveness of
empathetic communication, and comparing the outcomes of different approaches such as
logicbased interrogation versus trust-driven negotiation. Participants are encouraged to draw
connections to real-world security challenges, integrating insights from crisis negotiation literature
and trust-building models to contextualize their reflections and improve their understanding of
cybersecurity dynamics.</p>
    </sec>
    <sec id="sec-14">
      <title>8. Evaluating the Effectiveness of the Approach</title>
      <p>Gameplay will be captured through observation and notetaking, with the support of AI tools
(with consent) where appropriate. Participants will also provide qualitative feedback through
semistructured interviews, surveys, and group discussions, capturing their perceptions of trust-building,
collaboration, and security decision-making in contrast to using analytical approaches. This
feedback will be analysed thematically to identify common patterns and insights.</p>
      <p>We will also draw on empirical data collected on the participants' performance during the game.
Key metrics will include the accuracy of information gathered, the effectiveness of stakeholder
engagement, and the resolution of complex crisis scenarios. These metrics will be quantitatively
assessed to measure the impact of the game on investigative proficiency. This will require us to
create score sheets for assessing players’ progress and also perceptions of players’ performances.</p>
      <p>A comparative analysis based on the reflections of the participants will be conducted between
the Tactical Empathy© approach used by Team Blue and the logical assessment approach used by
Team Red. This will involve comparing outcomes such as information elicitation, comprehension
of causality, and stakeholder interaction. Participants' experiences with both approaches and their
reflection them will be documented and contrasted to help participants evaluate the strengths and
weaknesses of each methodology.</p>
      <p>Longitudinal studies will be designed to assess the long-term impact of the game on participants'
cybersecurity skills. Follow-up assessments will be conducted at multiple intervals post-gameplay to
determine the retention and application of empathetic investigative techniques in real-world
scenarios. The effectiveness of the Crisis in Syndstad game will also be evaluated by in relation to
existing cybersecurity training programs. Feedback will be gathered from trainers and participants on
how well the game complements traditional training methods and enhances overall learning
outcomes.</p>
      <p>By adhering to these detailed requirements, the evaluation of the Crisis in Syndstad game will
provide comprehensive insights into the utility and impact of empathy-driven investigative
approaches in cybersecurity education.</p>
      <p>Beyond these approaches, we need to look for a group transformation in how organizations
communicate and how they deal with blame. It might be argued that evolutionarily speaking,
humans are doomed to act solely in their self-interest (the “selfish gene” trope) but recent research
suggests that responses to blame and the establishment of cooperative relations are situationally driven
and can be strongly influenced by cultural shifts[31, 32].</p>
    </sec>
    <sec id="sec-15">
      <title>9. Discussion, Conclusion and Future Work: Expanding the Security</title>
    </sec>
    <sec id="sec-16">
      <title>Narrative Through Empathy-Driven Investigations</title>
      <sec id="sec-16-1">
        <title>9.1. Discussion</title>
        <p>The Crisis in Syndstad game is intended to demonstrate the value of incorporating people skills
into an educational exercise in cybersecurity post-incident investigations. By shifting investigative
methodologies from rigid logic-driven analyses to an empathy-based framework, participants
engaged in collaborative problem-solving that improved information flow, trust-building, and crisis
resolution compared to purely logical approaches. The exercise seeks to encourage reflection on
the principle that cybersecurity incidents—particularly those involving human factors—require
investigative strategies that blend technical expertise with emotional intelligence.</p>
        <p>
          The literature underscores the potential for empathy-driven investigative techniques to enhance
cybersecurity training and the importance of adopting an empathetic lens when analysing how
crises unfold. Dekker’s reframing of human error as a symptom of deeper systemic conditions [
          <xref ref-type="bibr" rid="ref1">1</xref>
          ],
along with Dekker and Conklin’s advocacy for “safety differently”[
          <xref ref-type="bibr" rid="ref2">2</xref>
          ], challenges traditional
blamecentric paradigms and invites a more compassionate, context-sensitive approach to incident
analysis. This is echoed in Covarrubias’ emphasis on effective communication as foundational to crisis
management in cybersecurity[
          <xref ref-type="bibr" rid="ref3">3</xref>
          ], and further supported by Maennel et al.’s multidimensional cyber
defence exercises, which foreground emotional, social, and cognitive factors in training design[
          <xref ref-type="bibr" rid="ref4">4</xref>
          ].
        </p>
        <p>
          In the context of the Crisis in Syndstad game, these insights suggest that empathy is not merely a
pedagogical nicety but a strategic imperative. The game’s design must reflect the complexity of
human decision-making under pressure, as explored in crisis negotiation literature [
          <xref ref-type="bibr" rid="ref5 ref6">5, 6</xref>
          ], and
integrate systems thinking to capture socio-technical interdependencies [
          <xref ref-type="bibr" rid="ref13 ref14 ref7 ref8">7, 8, 13, 14</xref>
          ]. However, to refine
and enhance its effectiveness, it is crucial to gather feedback from industry professionals and
domain experts. Their lived experience and operational insight will be invaluable in shaping scenario
realism [
          <xref ref-type="bibr" rid="ref21">21</xref>
          ], calibrating emotional and cognitive load[
          <xref ref-type="bibr" rid="ref24">24</xref>
          ], and ensuring the game’s alignment with
authentic learning outcomes. Such feedback loops will also help mitigate the risk of reinforcing
shame-based responses [
          <xref ref-type="bibr" rid="ref10 ref13 ref17">10, 13, 17</xref>
          ], and instead foster trust[
          <xref ref-type="bibr" rid="ref9">9</xref>
          ], dignity, and adaptive capability—core
values in both cybersecurity pedagogy and behavioural support.
        </p>
        <p>By engaging with experts in cybersecurity, game design, and educational psychology, the
development team can ensure that the game meets the highest standards of quality and relevance.
Additionally, this collaborative approach will foster a deeper understanding of how empathy-driven
methodologies can be integrated into broader cybersecurity curricula.</p>
        <p>
          Our work has general implications for the management in dealing with cyber security. The
literature consistently reveals that cybersecurity training, and by extension organizational
decisionmaking, cannot rely solely on logic, analysis, and procedural abstraction[
          <xref ref-type="bibr" rid="ref1 ref19 ref4 ref7">1, 4, 7, 19</xref>
          ]. Our extension of
this argument foregrounds the necessity of empathetic handling—recognizing that human beings
are not deterministic processors, but predictive, emotionally attuned agents shaped by bias,
expectation, and affective feedback [
          <xref ref-type="bibr" rid="ref10 ref24 ref3">3, 10, 24</xref>
          ]. This reframing has profound implications for management at
all levels.
        </p>
        <p>
          Managers must move beyond the mechanistic treatment of personnel as “human resources” to a
more human-centred ethic of engagement. The human brain is predictive and corrective[33] rather
than logical, and does not respond optimally to coercion, shame, or rigid protocol—it thrives in
environments of trust, dignity, and adaptive support which underpin good prospective decision
making[
          <xref ref-type="bibr" rid="ref17 ref20 ref9">9, 17, 20, 33</xref>
          ]. To put it simply, if an individual expects opprobrium for speaking up about
failures or taking responsibility for some aspect of their work which has gone wrong, they will not
speak up and the organisation will not learn. Tactical Empathy© applied as a genuine, not
manipulative, enabler of communication helps create this kind of supportive framework.
        </p>
        <p>This shift is not far from emerging trends in modern management, which increasingly reject
exploitative models in favour of relational stewardship, psychological safety, and embodied
empathy[34]. Organizations that embrace this paradigm—treating employees as recursive,
emotionally complex agents—will be better equipped to navigate adversarial uncertainty, foster
innovation, and enact integrity in practice.</p>
        <p>The feedback obtained from these critiques will be meticulously analysed and incorporated into
future iterations of the game. This iterative and reflective development process will help in
fine-tuning the game mechanics, enhancing the narrative, and aligning the educational objectives with
realworld requirements. The goal is to create a robust, engaging, and educational tool that effectively
prepares participants for the multifaceted challenges of cybersecurity investigations.</p>
      </sec>
      <sec id="sec-16-2">
        <title>9.2. Limitations</title>
        <p>
          One potential limitation in the purpose of the Crisis in Syndstad game lies in its framing of
empathy. While the game seeks to cultivate empathy-driven crisis response, it risks reducing
empathy to a set of scripted choices rather than modelling it as a dynamic, context-sensitive capability.
Ren et al. [
          <xref ref-type="bibr" rid="ref19">19</xref>
          ] highlight the complexity of empathic response, noting its entanglement with
neurostructural traits and perceived social risk, which suggests that empathy cannot be reliably
taught through static interactions alone. The game goes part way to addressing that but risks
making empathy purely about conversational tricks, rather than properly negotiating understanding of
the other’s viewpoint. Similarly, Lu and Huang’s [
          <xref ref-type="bibr" rid="ref24">24</xref>
          ] emotion-cognition dual-factor model
underscores the need for nuanced emotional calibration in crisis communication, warning against
oversimplified pedagogical approaches that fail to engage deeper affective reasoning.
        </p>
        <p>
          Design-level limitations also emerge in the realism and emotional granularity of the game’s
scenarios. Maennel et al.[
          <xref ref-type="bibr" rid="ref4">4</xref>
          ] emphasize the importance of integrating emotional, social, and
cognitive dimensions into cyber defence exercises, arguing that authentic stressors and interpersonal
dynamics are essential for effective learning. If the scenarios lack operational fidelity or emotional
depth, players may disengage or default to superficial decision-making. Moreover, the absence of
robust feedback mechanisms—particularly those that reflect trust dynamics[
          <xref ref-type="bibr" rid="ref9">9</xref>
          ] or mitigate
shamebased responses [
          <xref ref-type="bibr" rid="ref10 ref17">10, 17</xref>
          ]—can flatten the learning experience into binary outcomes, undermining
the development of adaptive reasoning.
        </p>
        <p>
          Gameplay itself may be constrained by structural rigidity. Linear progression models, while
pedagogically convenient, can inhibit recursive adaptation and emergent strategy—key features of
real-world crisis evolution[26] [32]. Static role assignments further limit players’ ability to shift
between technical, emotional, and strategic viewpoints, reducing the opportunity for cross-domain
insight and systems-level reflection [
          <xref ref-type="bibr" rid="ref11 ref25">11, 25</xref>
          ]. Additionally, without explicit safeguarding protocols,
neurodivergent players may struggle to interpret ambiguous cues or navigate social
appropriateness, echoing concerns raised by Renaud et al. [
          <xref ref-type="bibr" rid="ref10">10</xref>
          ] and AlSabbagh &amp; Kowalski[
          <xref ref-type="bibr" rid="ref7">7</xref>
          ] regarding the
need for clarity and dignity in behavioural design. Although we would also argue that
neurodivergent players would greatly benefit from the social skills which the game seeks to impart
and that selected scenarios where players “lost” due to neurodivergent traits could be re-framed as
role plays[35] and social stories[36] to address their training needs.
        </p>
        <p>In short, we need to be careful not to make the game overly complex, socially or emotionally
overwhelming, or try to dictate the outcome. The aim is to let the players experience the
complexities of a real-life incident and to reflect on the different skills which can be brought to bear in its
resolution.</p>
        <p>Taken together, these limitations suggest that while Crisis in Syndstad holds promise as an
training tool for imparting empathy as a learned behaviour, its effectiveness depends achieving
emotional realism, systemic feedback, and willingness to adapt gameplay structures to the needs of
players. In short, the game needs itself to be a living demonstration of Tactical Empathy© in practice.</p>
      </sec>
      <sec id="sec-16-3">
        <title>9.3 Conclusion</title>
        <p>Crisis in Syndstad is currently in development as a serious game for helping with post-incident
analysis of root causes. As such it represents an opportunity to engage students in recursive
investigation techniques to uncover the causal hierarchy behind the occurrence of incidents and to
help them comprehend that such causes are not simply technical in nature but arise from
sociotechnical artefacts of the organisation and the environment in which it is situated.</p>
        <p>
          Our argument in designing the game is that the analysis of cyber security incidents must not
simply move from a logical and forensic examination of technical causes to a logical and forensic
examination of socio-technical causes, but also employ a methodology which introduces
empathetic skills which do more than simply facilitate the analysis process but actually provide a safe
psychological space for participants to explore causality and associated problem solving as a joint
enterprise, turning a “no blame” culture into a culture of radical responsibility taking[37],
promoting joint learning. Although we point out that much of what we are discussing represents what is
known about good consultancy skills and is already practised in health and safety management and
our approach is simply a well-founded extension of those skills to cybersecurity, based on
highstakes simulations of real world situations[
          <xref ref-type="bibr" rid="ref5 ref6">5, 6</xref>
          ].
        </p>
        <p>At the current stage, we are seeking both academic and professional feedback on the game
design to ensure that the game does indeed facilitate the aims we have. We recognise the potential
dangers of trying to enforce learning outcomes, where we need to ensure that the game experience
allows students to recognise the strengths and weaknesses of both rational analysis and empathetic
knowledge elicitation. We recognise, therefore, that the game itself needs to create a safe place to
engage with the problems it creates for the student and that its use should be adaptive, reflective
and recursive.</p>
      </sec>
      <sec id="sec-16-4">
        <title>9.4 Future Research</title>
        <p>The goal of future research is to focus on incorporating human and social aspects into the design
of cybersecurity educational materials (and, consequently, into the design and implementation of
cybersecurity systems). Serious games represent one way of achieving these goals and research in
this area will focus on refining game play mechanics. There needs to be an emphasis on fostering
safe environments to teach post-incident investigation. Game play scenarios need to be
sociotechnically rigorous, while game play rules need to create a space which challenges but does
not overwhelm.</p>
        <p>In parallel, there is a need to design and develop new serious games that model other aspects of
cybersecurity management through diverse operational and interpersonal lenses. These games
should be conceived not merely as instructional tools, but as structured enactments of complex
human behaviour under adversarial conditions—where psychological safety, reflective judgment, and
adaptive coordination are treated as core design imperatives.</p>
        <p>By narrowing the research agenda to gameplay refinement and targeted invention, the field can
move beyond generic gamification toward a principled methodology—one that integrates
behavioural nuance, emotional fidelity, and strategic realism into the architecture of cybersecurity
education.</p>
      </sec>
    </sec>
    <sec id="sec-17">
      <title>Declaration on Generative AI</title>
      <p>Any use of generative AI in this manuscript adheres to ethical guidelines for use and
acknowledgement of generative AI in academic research. Each author has made a
substantial contribution to the work and it has been thoroughly reviewed for accuracy, and they
assume full responsibility for the integrity of their contributions [38].
26. Resodihardjo, S.L., Crises, inquiries and the politics of blame. 2020: Springer.
27. Reason, J., Managing the risks of organizational accidents. 2016: Routledge.
28. Boiarsky, C., Risk Communication and Miscommunication: Case Studies in Science,
Technology, Engineering, Government, and Community Organizations. 2016: University
Press of Colorado.
29. Hassanzadeh, A., et al., A review of cybersecurity incidents in the water sector. Journal of</p>
      <p>Environmental Engineering, 2020. 146(5): p. 03120003.
30. Muller, M., Adapting to climate change: water management for urban resilience.</p>
      <p>Environment and urbanization, 2007. 19(1): p. 99-113.
31. Svensson, E.I., Understanding the egalitarian revolution in human social evolution. Trends in</p>
      <p>Ecology &amp; Evolution, 2009. 24(5): p. 233-235.
32. Rodríguez, R., From anticipatory strategies to reactive blame games in multi-level settings:
the role of structure and politics in stability and policy change. Journal of Public Policy, 2022.
42(4): p. 802-826.
33. Clark, A., Whatever next? Predictive brains, situated agents, and the future of cognitive
science. Behavioral and brain sciences, 2013. 36(3): p. 181-204.
34. Carmeli, A., Gittell, J. H., High-quality relationships, psychological safety, and learning from
failures in work organizations. Journal of Organizational Behavior, 2009. 30(6): p. 709–729.
35. Valorozo-Jones, C., Neurodiversity, Dungeons, and Dragons: A guide to transforming and
enriching TTRPGs for neurodivergent adults OR the neurodivergent player’s handbook.
2021.
36. Gray, C., Social StoriesTM, in Using Storytelling to Support Children and Adults with Special</p>
      <p>Needs. 2012, Routledge. p. 104-110.
37. Maull, F., Radical Responsibility: How to Move Beyond Blame, Fearlessly Live Your Highest</p>
      <p>Purpose, and Become an Unstoppable Force for Good. 2019: Sounds True.
38. Porsdam Mann, S., et al., Guidelines for ethical use and acknowledgement of large language
models in academic writing. Nature Machine Intelligence, 2024. 6(11): p. 1272-1274.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          1.
          <string-name>
            <surname>Dekker</surname>
            ,
            <given-names>S.,</given-names>
          </string-name>
          <article-title>The field guide to understanding'human error'</article-title>
          .
          <year>2017</year>
          : CRC press.
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          2.
          <string-name>
            <surname>Dekker</surname>
            , S. and
            <given-names>T.</given-names>
          </string-name>
          <string-name>
            <surname>Conklin</surname>
          </string-name>
          , Safety differently.
          <year>2014</year>
          : CRC Press London.
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          3.
          <string-name>
            <surname>Covarrubias</surname>
            ,
            <given-names>J.Z.L.</given-names>
          </string-name>
          ,
          <article-title>Effective Communication as A Pillar of Cybersecurity: Managing Incidents and Crises in the Digital Era</article-title>
          .
          <source>Journal of Risk Analysis and Crisis Response</source>
          ,
          <year>2025</year>
          .
          <volume>15</volume>
          (
          <issue>34</issue>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          4.
          <string-name>
            <surname>Maennel</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          , et al.,
          <article-title>A multidimensional cyber defense exercise: Emphasis on emotional, social, and cognitive aspects</article-title>
          .
          <source>SAGE Open</source>
          ,
          <year>2023</year>
          .
          <volume>13</volume>
          (
          <issue>1</issue>
          ): p.
          <fpage>21582440231156367</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          5.
          <string-name>
            <surname>Vecchi</surname>
            ,
            <given-names>G.M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>V.B. Van Hasselt</surname>
          </string-name>
          , and
          <string-name>
            <given-names>S.J.</given-names>
            <surname>Romano</surname>
          </string-name>
          ,
          <article-title>Crisis (hostage) negotiation: Current strategies and issues in high-risk conflict resolution</article-title>
          .
          <source>Aggression and Violent Behavior</source>
          ,
          <year>2005</year>
          .
          <volume>10</volume>
          (
          <issue>5</issue>
          ): p.
          <fpage>533</fpage>
          -
          <lpage>551</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          6.
          <string-name>
            <surname>Voss</surname>
            , C. and
            <given-names>T.</given-names>
          </string-name>
          <string-name>
            <surname>Raz</surname>
          </string-name>
          ,
          <article-title>Never split the difference: Negotiating as if your life depended on it</article-title>
          . 2016: Random House.
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          7.
          <string-name>
            <surname>AlSabbagh</surname>
            , B. and
            <given-names>S.</given-names>
          </string-name>
          <string-name>
            <surname>Kowalski</surname>
          </string-name>
          .
          <article-title>Security from a systems thinking perspective-applying soft systems methodology to the analysis of an information security incident</article-title>
          .
          <source>in Proceedings of the 58th annual meeting of the ISSS-2014 United States</source>
          .
          <year>2014</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          8.
          <string-name>
            <surname>Ferreira</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          , et al. In
          <string-name>
            <surname>Cyber-Space No One Can Hear You S CREAM: A Root Cause</surname>
          </string-name>
          <article-title>Analysis for Socio-Technical Security</article-title>
          . in International Workshop on Security and
          <string-name>
            <given-names>Trust</given-names>
            <surname>Management</surname>
          </string-name>
          .
          <year>2015</year>
          . Springer.
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          9.
          <string-name>
            <surname>Mayer</surname>
            ,
            <given-names>R.C.</given-names>
          </string-name>
          ,
          <string-name>
            <given-names>J.H.</given-names>
            <surname>Davis</surname>
          </string-name>
          , and
          <string-name>
            <given-names>F.D.</given-names>
            <surname>Schoorman</surname>
          </string-name>
          ,
          <article-title>An integrative model of organizational trust</article-title>
          .
          <source>Academy of management review</source>
          ,
          <year>1995</year>
          .
          <volume>20</volume>
          (
          <issue>3</issue>
          ): p.
          <fpage>709</fpage>
          -
          <lpage>734</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          10.
          <string-name>
            <surname>Renaud</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Searle</surname>
          </string-name>
          , and
          <string-name>
            <given-names>M.</given-names>
            <surname>Dupuis</surname>
          </string-name>
          .
          <article-title>Shame in cyber security: effective behavior modification tool or counterproductive foil</article-title>
          ?
          <source>in Proceedings of the 2021 New Security Paradigms Workshop</source>
          .
          <year>2021</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          11.
          <string-name>
            <surname>Sasse</surname>
            , M.A.,
            <given-names>S.</given-names>
          </string-name>
          <string-name>
            <surname>Brostoff</surname>
            , and
            <given-names>D.</given-names>
          </string-name>
          <string-name>
            <surname>Weirich</surname>
          </string-name>
          , Transforming the 'weakest link'
          <article-title>-a human/computer interaction approach to usable and effective security</article-title>
          .
          <source>BT technology journal</source>
          ,
          <year>2001</year>
          .
          <volume>19</volume>
          (
          <issue>3</issue>
          ): p.
          <fpage>122</fpage>
          -
          <lpage>131</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          12.
          <string-name>
            <surname>Huluka</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          and
          <string-name>
            <given-names>O.</given-names>
            <surname>Popov</surname>
          </string-name>
          .
          <article-title>Root cause analysis of session management and broken authentication vulnerabilities</article-title>
          .
          <source>in World Congress on Internet Security (WorldCIS-2012)</source>
          .
          <year>2012</year>
          . IEEE.
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          13.
          <string-name>
            <surname>Soomro</surname>
            ,
            <given-names>Z.A.</given-names>
          </string-name>
          ,
          <string-name>
            <given-names>M.H.</given-names>
            <surname>Shah</surname>
          </string-name>
          , and
          <string-name>
            <given-names>J.</given-names>
            <surname>Ahmed</surname>
          </string-name>
          ,
          <article-title>Information security management needs more holistic approach: A literature review</article-title>
          .
          <source>International Journal of Information Management</source>
          ,
          <year>2016</year>
          .
          <volume>36</volume>
          (
          <issue>2</issue>
          ): p.
          <fpage>215</fpage>
          -
          <lpage>225</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          14.
          <string-name>
            <surname>Salim</surname>
            ,
            <given-names>H.M.</given-names>
          </string-name>
          ,
          <article-title>Cyber safety: A systems thinking and systems theory approach to managing cyber security risks</article-title>
          .
          <year>2014</year>
          , Massachusetts Institute of Technology.
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          15.
          <string-name>
            <surname>Kirlappos</surname>
            , I.,
            <given-names>S.</given-names>
          </string-name>
          <string-name>
            <surname>Parkin</surname>
            , and
            <given-names>M.A.</given-names>
          </string-name>
          <string-name>
            <surname>Sasse</surname>
          </string-name>
          .
          <article-title>Learning from “shadow security”</article-title>
          .
          <source>in NDSS Workshop on Usable Security</source>
          .
          <year>2014</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          16.
          <string-name>
            <surname>Leveson</surname>
            ,
            <given-names>N.G.</given-names>
          </string-name>
          ,
          <article-title>Engineering a safer world: Systems thinking applied to safety</article-title>
          .
          <year>2016</year>
          : The MIT Press.
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          17. National Cybersecurity Alliance,
          <string-name>
            <surname>i.p.w.A.F.W.N.</surname>
          </string-name>
          <article-title>Don't Blame the Victim: 'Fraud Shame'</article-title>
          and Cybersecurity. 2023; Available from: https://www.staysafeonline.org/articles/don-t
          <string-name>
            <surname>-</surname>
          </string-name>
          blamethe
          <article-title>-victim-fraud-shame-and-cybersecurity.</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          18.
          <string-name>
            <surname>Banai</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          and
          <string-name>
            <given-names>P.</given-names>
            <surname>Tulimieri</surname>
          </string-name>
          ,
          <article-title>Knowledge, skills and personality of the effective business consultant</article-title>
          .
          <source>Journal of Management Development</source>
          ,
          <year>2013</year>
          .
          <volume>32</volume>
          (
          <issue>8</issue>
          ): p.
          <fpage>886</fpage>
          -
          <lpage>900</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          19.
          <string-name>
            <surname>Ren</surname>
            ,
            <given-names>H.</given-names>
          </string-name>
          , et al., “
          <article-title>High empathic response but low interest”: Machiavellianism and its neurostructural basis relate to perceived risk of social exclusion and workplace deviance</article-title>
          .
          <source>Journal of Research in Personality</source>
          ,
          <year>2024</year>
          .
          <volume>113</volume>
          : p.
          <fpage>104548</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          20.
          <string-name>
            <surname>Ahmed</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          , et al.,
          <article-title>How universities teach cybersecurity courses online: a systematic literature review</article-title>
          .
          <source>Frontiers in Computer Science</source>
          ,
          <year>2024</year>
          . 6: p.
          <fpage>1499490</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          21.
          <string-name>
            <surname>Skytterholm</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          and
          <string-name>
            <given-names>G.</given-names>
            <surname>Hotvedt</surname>
          </string-name>
          .
          <article-title>Criteria for Realistic and Expedient Scenarios for Tabletop Exercises on Cyber Attacks Against Industrial Control Systems in the Petroleum Industry</article-title>
          .
          <source>in Proceedings of the International Conference on Cybersecurity, Situational Awareness and Social Media: Cyber Science</source>
          <year>2022</year>
          ;
          <fpage>20</fpage>
          -
          <lpage>21</lpage>
          June; Wales.
          <year>2023</year>
          . Springer.
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          22.
          <string-name>
            <surname>Moumouh</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          , et al.,
          <article-title>Serious Games to Improve Privacy and Security Knowledge for Professionals: a Systematic Literature Review</article-title>
          .
          <source>International Journal of Serious Games</source>
          ,
          <year>2025</year>
          .
          <volume>12</volume>
          (
          <issue>1</issue>
          ): p.
          <fpage>3</fpage>
          -
          <lpage>24</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref23">
        <mixed-citation>
          23.
          <string-name>
            <surname>Hill</surname>
            ,
            <given-names>W.</given-names>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Fanuel</surname>
          </string-name>
          , and
          <string-name>
            <given-names>X.</given-names>
            <surname>Yuan</surname>
          </string-name>
          .
          <article-title>Comparing serious games for cyber security education</article-title>
          .
          <source>in Proceedings of the 2020 ASEE Southeastern Section Conference</source>
          , Auburn, AL, USA.
          <year>2020</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref24">
        <mixed-citation>
          24.
          <string-name>
            <surname>Lu</surname>
          </string-name>
          , Y. and
          <string-name>
            <surname>Y.-H.C. Huang</surname>
          </string-name>
          ,
          <article-title>Getting emotional: An emotion-cognition dual-factor model of crisis communication</article-title>
          .
          <source>Public Relations Review</source>
          ,
          <year>2018</year>
          .
          <volume>44</volume>
          (
          <issue>1</issue>
          ): p.
          <fpage>98</fpage>
          -
          <lpage>107</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref25">
        <mixed-citation>
          25.
          <string-name>
            <surname>Kaberuka</surname>
            , J. and
            <given-names>C.</given-names>
          </string-name>
          <string-name>
            <surname>Johnson</surname>
          </string-name>
          .
          <source>Case Studies in the Socio-technical Analysis of Cybersecurity Incidents: Comparing Attacks on the UK NHS and Irish Healthcare Systems</source>
          .
          <year>2023</year>
          . Singapore: Springer Nature Singapore.
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>