<!DOCTYPE article
PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Publishing DTD v1.4 20190208//EN"
       "JATS-journalpublishing1.dtd">
<article xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" article-type="research-article" dtd-version="1.4" xml:lang="en">
 <front>
  <journal-meta>
   <journal-id journal-id-type="publisher-id">Scientific and analytical journal «Vestnik Saint-Petersburg university of State fire service of EMERCOM of Russia»</journal-id>
   <journal-title-group>
    <journal-title xml:lang="en">Scientific and analytical journal «Vestnik Saint-Petersburg university of State fire service of EMERCOM of Russia»</journal-title>
    <trans-title-group xml:lang="ru">
     <trans-title>Научно-аналитический журнал &quot;Вестник Санкт-Петербургского университета ГПС МЧС России&quot;</trans-title>
    </trans-title-group>
   </journal-title-group>
   <issn publication-format="online">2218-130X</issn>
  </journal-meta>
  <article-meta>
   <article-id pub-id-type="publisher-id">112101</article-id>
   <article-id pub-id-type="doi">10.61260/2218-130X-2025-4-117-130</article-id>
   <article-categories>
    <subj-group subj-group-type="toc-heading" xml:lang="ru">
     <subject>ИНФОРМАТИКА, ВЫЧИСЛИТЕЛЬНАЯ ТЕХНИКА И УПРАВЛЕНИЕ</subject>
    </subj-group>
    <subj-group subj-group-type="toc-heading" xml:lang="en">
     <subject>INFORMATICS, COMPUTER ENGINEERING AND CONTROL</subject>
    </subj-group>
    <subj-group>
     <subject>ИНФОРМАТИКА, ВЫЧИСЛИТЕЛЬНАЯ ТЕХНИКА И УПРАВЛЕНИЕ</subject>
    </subj-group>
   </article-categories>
   <title-group>
    <article-title xml:lang="en">JUSTIFICATION OF THE NEED TO DEVELOP A CYBER THREAT SIMULATOR TO SOLVE EDUCATIONAL PROBLEMS</article-title>
    <trans-title-group xml:lang="ru">
     <trans-title>ОБОСНОВАНИЕ НЕОБХОДИМОСТИ РАЗРАБОТКИ СИМУЛЯТОРА КИБЕРУГРОЗ ДЛЯ РЕШЕНИЯ ОБРАЗОВАТЕЛЬНЫХ ЗАДАЧ</trans-title>
    </trans-title-group>
   </title-group>
   <contrib-group content-type="authors">
    <contrib contrib-type="author">
     <contrib-id contrib-id-type="orcid">https://orcid.org/0009-0001-0560-8117</contrib-id>
     <name-alternatives>
      <name xml:lang="ru">
       <surname>Акапьев</surname>
       <given-names>Виктор Львович</given-names>
      </name>
      <name xml:lang="en">
       <surname>Akapyev</surname>
       <given-names>Viktor L.</given-names>
      </name>
     </name-alternatives>
     <email>akapevv@yandex.ru</email>
     <bio xml:lang="ru">
      <p>кандидат педагогических наук;</p>
     </bio>
     <bio xml:lang="en">
      <p>candidate of pedagogical sciences;</p>
     </bio>
     <xref ref-type="aff" rid="aff-1"/>
    </contrib>
    <contrib contrib-type="author">
     <contrib-id contrib-id-type="orcid">https://orcid.org/0009-0003-0144-5976</contrib-id>
     <name-alternatives>
      <name xml:lang="ru">
       <surname>Дунаев</surname>
       <given-names>Роман Алексеевич</given-names>
      </name>
      <name xml:lang="en">
       <surname>Dunaev</surname>
       <given-names>Roman A.</given-names>
      </name>
     </name-alternatives>
     <email>r_dunaev@bk.ru</email>
     <bio xml:lang="ru">
      <p>кандидат философских наук;</p>
     </bio>
     <bio xml:lang="en">
      <p>candidate of philosophical sciences;</p>
     </bio>
     <xref ref-type="aff" rid="aff-2"/>
    </contrib>
    <contrib contrib-type="author">
     <contrib-id contrib-id-type="orcid">https://orcid.org/0000-0001-7502-5163</contrib-id>
     <name-alternatives>
      <name xml:lang="ru">
       <surname>Ковалева</surname>
       <given-names>Екатерина Геннадьевна</given-names>
      </name>
      <name xml:lang="en">
       <surname>Kovaleva</surname>
       <given-names>Ekaterina Gennad'evna</given-names>
      </name>
     </name-alternatives>
     <bio xml:lang="ru">
      <p>кандидат технических наук;</p>
     </bio>
     <bio xml:lang="en">
      <p>candidate of technical sciences;</p>
     </bio>
     <xref ref-type="aff" rid="aff-3"/>
    </contrib>
    <contrib contrib-type="author">
     <name-alternatives>
      <name xml:lang="ru">
       <surname>Борисенко</surname>
       <given-names>Александр Васильевич</given-names>
      </name>
      <name xml:lang="en">
       <surname>Borisenko</surname>
       <given-names>Aleksandr Vasil'evich</given-names>
      </name>
     </name-alternatives>
     <email>borisenko02.94@mail.ru</email>
     <xref ref-type="aff" rid="aff-4"/>
    </contrib>
   </contrib-group>
   <aff-alternatives id="aff-1">
    <aff>
     <institution xml:lang="ru">Белгородский юридический институт МВД России им. И.Д. Путилина</institution>
     <country>Россия</country>
    </aff>
    <aff>
     <institution xml:lang="en">Belgorod Law Institute of Ministry of the Interior  of the Russian Federation named after I.D. Putilin</institution>
     <country>Russian Federation</country>
    </aff>
   </aff-alternatives>
   <aff-alternatives id="aff-2">
    <aff>
     <institution xml:lang="ru">Белгородский юридический институт МВД России им. И.Д. Путилина</institution>
     <country>Россия</country>
    </aff>
    <aff>
     <institution xml:lang="en">Belgorod Law Institute of Ministry of the Interior  of the Russian Federation named after I.D. Putilin</institution>
     <country>Russian Federation</country>
    </aff>
   </aff-alternatives>
   <aff-alternatives id="aff-3">
    <aff>
     <institution xml:lang="ru">Белгородский юридический институт МВД России им. И.Д. Путилина</institution>
     <country>Россия</country>
    </aff>
    <aff>
     <institution xml:lang="en">Belgorod Law Institute of Ministry of the Interior  of the Russian Federation named after I.D. Putilin</institution>
     <country>Russian Federation</country>
    </aff>
   </aff-alternatives>
   <aff-alternatives id="aff-4">
    <aff>
     <institution xml:lang="ru">Федеральное государственное казенное образовательное учреждение высшего образования «Белгородский юридический институт Министерства внутренних дел Российской Федерации имени И.Д. Путилина»</institution>
     <country>Россия</country>
    </aff>
    <aff>
     <institution xml:lang="en">Federal State Public Educational Establishment of Higher Training “Belgorod Law Institute of Ministry of the Interior of the Russian Federation named after I.D. Putilin”</institution>
     <country>Russian Federation</country>
    </aff>
   </aff-alternatives>
   <pub-date publication-format="print" date-type="pub" iso-8601-date="2025-12-29T00:00:00+03:00">
    <day>29</day>
    <month>12</month>
    <year>2025</year>
   </pub-date>
   <pub-date publication-format="electronic" date-type="pub" iso-8601-date="2025-12-29T00:00:00+03:00">
    <day>29</day>
    <month>12</month>
    <year>2025</year>
   </pub-date>
   <volume>2025</volume>
   <issue>4</issue>
   <fpage>117</fpage>
   <lpage>130</lpage>
   <history>
    <date date-type="received" iso-8601-date="2025-10-31T00:00:00+03:00">
     <day>31</day>
     <month>10</month>
     <year>2025</year>
    </date>
    <date date-type="accepted" iso-8601-date="2025-11-24T00:00:00+03:00">
     <day>24</day>
     <month>11</month>
     <year>2025</year>
    </date>
   </history>
   <self-uri xlink:href="https://journals.igps.ru/en/nauka/article/112101/view">https://journals.igps.ru/en/nauka/article/112101/view</self-uri>
   <abstract xml:lang="ru">
    <p>Нарастающая цифровизация всех отраслей человеческой деятельности актуализирует необходимость подготовки различных категорий пользователей от простого потребителя информации до специалиста в области кибербезопасности к решению задач обеспечения информационной безопасности. Как аналитики в сфере кибербезопасности используют в своей работе различные программные инструменты, так и в процессе подготовки специалистов применяются разнообразные программные продукты. В ходе исследования необходимо выбрать из всего разнообразия наиболее подходящие, с точки зрения образовательного процесса, средства, сформулировать требования к реализации диалогового режима и пользовательскому интерфейсу, а также предложить вариант программной реализации.</p>
   </abstract>
   <trans-abstract xml:lang="en">
    <p>The growing digitalization of all areas of human activity makes it necessary to train various categories of users, from ordinary information consumers to cybersecurity specialists, to solve the problems of information security. Just as cybersecurity analysts use various software tools in their work, various software products are used in the training of specialists. In the course of the study, it is necessary to select the most suitable tools for the educational process, formulate requirements for the implementation of a dialogue mode and a user interface, and propose a software implementation option.</p>
   </trans-abstract>
   <kwd-group xml:lang="ru">
    <kwd>киберугрозы</kwd>
    <kwd>учебный процесс</kwd>
    <kwd>компетентность</kwd>
    <kwd>симулятор киберугроз</kwd>
    <kwd>геймификация</kwd>
    <kwd>моделирование</kwd>
   </kwd-group>
   <kwd-group xml:lang="en">
    <kwd>cyberthreats</kwd>
    <kwd>educational process</kwd>
    <kwd>competence</kwd>
    <kwd>cyber threat simulator</kwd>
    <kwd>gamification</kwd>
    <kwd>modeling</kwd>
   </kwd-group>
  </article-meta>
 </front>
 <body>
  <p></p>
 </body>
 <back>
  <ref-list>
   <ref id="B1">
    <label>1.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">Cybersecurity Tools. URL: https://brainstation.io/career-guides/what-tools-do-cybersecurity-analysts-use (дата обращения: 06.10.2025).</mixed-citation>
     <mixed-citation xml:lang="en">Cybersecurity Tools. URL: https://brainstation.io/career-guides/what-tools-do-cybersecurity-analysts-use (data obrashcheniya: 06.10.2025).</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B2">
    <label>2.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">MONT открыла киберполигон для тестирования решений по информационной безопасности. URL: https://www.mont.ru/ru-ru/news/6312 (дата обращения: 05.10.2025).</mixed-citation>
     <mixed-citation xml:lang="en">MONT otkryla kiberpoligon dlya testirovaniya reshenij po informacionnoj bezopasnosti. URL: https://www.mont.ru/ru-ru/news/6312 (data obrashcheniya: 05.10.2025).</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B3">
    <label>3.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">Фишинг – тебе пишут мошенники. URL: https://www.sberbank.ru/promo/scs-school/courseid-2.html (дата обращения: 15.10.2025).</mixed-citation>
     <mixed-citation xml:lang="en">Fishing – tebe pishut moshenniki. URL: https://www.sberbank.ru/promo/scs-school/courseid-2.html (data obrashcheniya: 15.10.2025).</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B4">
    <label>4.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">Обзор мирового и российского рынков средств симуляции кибератак (Breach and Attack Simulation, BAS). URL: https://www.anti-malware.ru/analytics/Market_Analysis/Breach-and-Attack-Simulation-Market-Overview (дата обращения: 01.10.2025).</mixed-citation>
     <mixed-citation xml:lang="en">Obzor mirovogo i rossijskogo rynkov sredstv simulyacii kiberatak (Breach and Attack Simulation, BAS). URL: https://www.anti-malware.ru/analytics/Market_Analysis/Breach-and-Attack-Simulation-Market-Overview (data obrashcheniya: 01.10.2025).</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B5">
    <label>5.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">Вовлекающее обучение для суперкоманд. URL: https://quizlab.pro/ (дата обращения: 05.10.2025).</mixed-citation>
     <mixed-citation xml:lang="en">Vovlekayushchee obuchenie dlya superkomand. URL: https://quizlab.pro/ (data obrashcheniya: 05.10.2025).</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B6">
    <label>6.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">Интерактивный симулятор атаки программ-вымогателей TADVISER. URL: https://www.tadviser.ru/index.php (дата обращения: 03.10.2025).</mixed-citation>
     <mixed-citation xml:lang="en">Interaktivnyj simulyator ataki programm-vymogatelej TADVISER. URL: https://www.tadviser.ru/index.php (data obrashcheniya: 03.10.2025).</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B7">
    <label>7.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">Киберполигон Ampire. URL: https://softline.ru/solutions/security/kiberpoligon-ampire (дата обращения: 23.08.2025).</mixed-citation>
     <mixed-citation xml:lang="en">Kiberpoligon Ampire. URL: https://softline.ru/solutions/security/kiberpoligon-ampire (data obrashcheniya: 23.08.2025).</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B8">
    <label>8.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">Standoff Cyberbones: симулятор для реальной практики в расследовании кибератак. URL: https://www.securitylab.ru/analytics/557408.php (дата обращения: 29.08.2025).</mixed-citation>
     <mixed-citation xml:lang="en">Standoff Cyberbones: simulyator dlya real'noj praktiki v rassledovanii kiberatak. URL: https://www.securitylab.ru/analytics/557408.php (data obrashcheniya: 29.08.2025).</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B9">
    <label>9.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">Kaspersky Interactive Protection Simulation (KIPS). URL: https://www.robotx.ru/programmnoe-obespechenie/informatsionnaya--bezopasnost/platforma-obuchenie-kiberbezopasnosti/Kaspersky-Interactive-Protection-Simulation-KIPS/ (дата обращения: 17.10.2025).</mixed-citation>
     <mixed-citation xml:lang="en">Kaspersky Interactive Protection Simulation (KIPS). URL: https://www.robotx.ru/programmnoe-obespechenie/informatsionnaya--bezopasnost/platforma-obuchenie-kiberbezopasnosti/Kaspersky-Interactive-Protection-Simulation-KIPS/ (data obrashcheniya: 17.10.2025).</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B10">
    <label>10.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">Как сделать из ваших сотрудников первую линию киберзащиты всего за 2 недели? URL: https://avareange.ru/ (дата обращения: 11.10.2025).</mixed-citation>
     <mixed-citation xml:lang="en">Kak sdelat' iz vashih sotrudnikov pervuyu liniyu kiberzashchity vsego za 2 nedeli? URL: https://avareange.ru/ (data obrashcheniya: 11.10.2025).</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B11">
    <label>11.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">Validate Your Cybersecurity Posture and Resilience. URL: https://cyberranges.com/ (дата обращения: 01.10.2025).</mixed-citation>
     <mixed-citation xml:lang="en">Validate Your Cybersecurity Posture and Resilience. URL: https://cyberranges.com/ (data obrashcheniya: 01.10.2025).</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B12">
    <label>12.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">Интерактивный симулятор от «Лаборатории Касперского» – новый подход к обучению защите от киберугроз. URL: https://gk-ur.ru/info/news/interaktivnyy-simulyator-ot-laboratorii-kasperskogo-novyy-podkhod-k-obucheniyu-zashchite-ot-kiberugr/ (дата обращения: 05.10.2025).</mixed-citation>
     <mixed-citation xml:lang="en">Interaktivnyj simulyator ot «Laboratorii Kasperskogo» – novyj podhod k obucheniyu zashchite ot kiberugroz. URL: https://gk-ur.ru/info/news/interaktivnyy-simulyator-ot-laboratorii-kasperskogo-novyy-podkhod-k-obucheniyu-zashchite-ot-kiberugr/ (data obrashcheniya: 05.10.2025).</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B13">
    <label>13.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">Microsoft представила симулятор кибератак с машинным обучением. URL: https://habr.com/ru/news/551558/ (дата обращения: 09.10.2025).</mixed-citation>
     <mixed-citation xml:lang="en">Microsoft predstavila simulyator kiberatak s mashinnym obucheniem. URL: https://habr.com/ru/news/551558/ (data obrashcheniya: 09.10.2025).</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B14">
    <label>14.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">Top 10 Best Cyber Attack Simulation Tools – 2025. URL: https://cybersecuritynews.com/cyber-attack-simulation-tools/ (дата обращения: 02.10.2025).</mixed-citation>
     <mixed-citation xml:lang="en">Top 10 Best Cyber Attack Simulation Tools – 2025. URL: https://cybersecuritynews.com/cyber-attack-simulation-tools/ (data obrashcheniya: 02.10.2025).</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B15">
    <label>15.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">Infection Monkey: Test and validate your defenses with Infection Monkey, our free open-source malware vaccine. URL: https://www.akamai.com/infectionmonkey (дата обращения: 11.10.2025).</mixed-citation>
     <mixed-citation xml:lang="en">Infection Monkey: Test and validate your defenses with Infection Monkey, our free open-source malware vaccine. URL: https://www.akamai.com/infectionmonkey (data obrashcheniya: 11.10.2025).</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B16">
    <label>16.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">Attack Surfaces Expanding Faster Than Teams Can Manage. URL: https://www.picussecurity.com/ (дата обращения: 01.10.2025).</mixed-citation>
     <mixed-citation xml:lang="en">Attack Surfaces Expanding Faster Than Teams Can Manage. URL: https://www.picussecurity.com/ (data obrashcheniya: 01.10.2025).</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B17">
    <label>17.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">Cymulate – Exposure Management Platform Built for Real Risk. URL: https://cymulate.com/ (дата обращения: 01.08.2025).</mixed-citation>
     <mixed-citation xml:lang="en">Cymulate – Exposure Management Platform Built for Real Risk. URL: https://cymulate.com/ (data obrashcheniya: 01.08.2025).</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B18">
    <label>18.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">MONT открыла киберполигон. URL: https://www.mont.ru/ru-ru/news/6312 (дата обращения: 13.10.2025).</mixed-citation>
     <mixed-citation xml:lang="en">MONT otkryla kiberpoligon. URL: https://www.mont.ru/ru-ru/news/6312 (data obrashcheniya: 13.10.2025).</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B19">
    <label>19.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">10 инструментов моделирования кибератак для повышения безопасности. URL: https://dzen.ru/a/ZG89c5dzB3yyeIzP (дата обращения: 19.10.2025).</mixed-citation>
     <mixed-citation xml:lang="en">10 instrumentov modelirovaniya kiberatak dlya povysheniya bezopasnosti. URL: https://dzen.ru/a/ZG89c5dzB3yyeIzP (data obrashcheniya: 19.10.2025).</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B20">
    <label>20.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">Get Involved https. URL: //caldera.mitre.org/ (дата обращения: 18.10.2025).</mixed-citation>
     <mixed-citation xml:lang="en">Get Involved https. URL: //caldera.mitre.org/ (data obrashcheniya: 18.10.2025).</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B21">
    <label>21.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">High-Risk Exposures Faster. URL: https://xmcyber.com/ (дата обращения: 01.10.2025).</mixed-citation>
     <mixed-citation xml:lang="en">High-Risk Exposures Faster. URL: https://xmcyber.com/ (data obrashcheniya: 01.10.2025).</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B22">
    <label>22.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">PRISM: A Hierarchical Intrusion Detection Architecture for Large-Scale Cyber Networks. URL: https://deepai.org/publication/prism-a-hierarchical-intrusion-detection-architecture-for-large-scale-cyber-networks (дата обращения: 11.09.2025).</mixed-citation>
     <mixed-citation xml:lang="en">PRISM: A Hierarchical Intrusion Detection Architecture for Large-Scale Cyber Networks. URL: https://deepai.org/publication/prism-a-hierarchical-intrusion-detection-architecture-for-large-scale-cyber-networks (data obrashcheniya: 11.09.2025).</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B23">
    <label>23.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">What is Threat Simulation? URL: https://xmcyber.com/glossary/what-is-threat-simulation/ (дата общения: 04.10.2025).</mixed-citation>
     <mixed-citation xml:lang="en">What is Threat Simulation? URL: https://xmcyber.com/glossary/what-is-threat-simulation/ (data obshcheniya: 04.10.2025).</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B24">
    <label>24.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">Реальная атака защищает. Симуляция кибератак с помощью BAS-решений. URL: https://www.cti.ru/media/publications/realnaya-ataka-zashchishchaet-simulyatsiya-kiberatak-s-pomoshchyu-bas-resheniy/ (дата обращения: 01.10.2025).</mixed-citation>
     <mixed-citation xml:lang="en">Real'naya ataka zashchishchaet. Simulyaciya kiberatak s pomoshch'yu BAS-reshenij. URL: https://www.cti.ru/media/publications/realnaya-ataka-zashchishchaet-simulyatsiya-kiberatak-s-pomoshchyu-bas-resheniy/ (data obrashcheniya: 01.10.2025).</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B25">
    <label>25.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">Gamification And Simulations: Powering Up Training And Productivity. URL: https://elearningindustry.com/gamification-and-simulations-powering-up-training-and-productivity (дата обращения 18.10.2025).</mixed-citation>
     <mixed-citation xml:lang="en">Gamification And Simulations: Powering Up Training And Productivity. URL: https://elearningindustry.com/gamification-and-simulations-powering-up-training-and-productivity (data obrashcheniya 18.10.2025).</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B26">
    <label>26.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">Kirstie Greany Why gamification in elearning is important. URL: https://www.elucidat.com/blog/why-gamification-in-elearning-is-important/ (дата обращения: 19.10.2025).</mixed-citation>
     <mixed-citation xml:lang="en">Kirstie Greany Why gamification in elearning is important. URL: https://www.elucidat.com/blog/why-gamification-in-elearning-is-important/ (data obrashcheniya: 19.10.2025).</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B27">
    <label>27.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">Акапьев В.Л., Савотченко С.Е. Геймификация в электронном образовании // Вестник Воронежского государственного университета. Сер.: Проблемы высшего образования. 2025. № 3. С. 19–23.</mixed-citation>
     <mixed-citation xml:lang="en">Akap'ev V.L., Savotchenko S.E. Gejmifikaciya v elektronnom obrazovanii // Vestnik Voronezhskogo gosudarstvennogo universiteta. Ser.: Problemy vysshego obrazovaniya. 2025. № 3. S. 19–23.</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B28">
    <label>28.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">The Top 5 Benefits of Gamification in Learning. URL: https://www.learnlight.com/en/articles/5-benefits-of-gamification-in-learning/ (дата обращения: 01.10.2025).</mixed-citation>
     <mixed-citation xml:lang="en">The Top 5 Benefits of Gamification in Learning. URL: https://www.learnlight.com/en/articles/5-benefits-of-gamification-in-learning/ (data obrashcheniya: 01.10.2025).</mixed-citation>
    </citation-alternatives>
   </ref>
  </ref-list>
 </back>
</article>
