{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,8]],"date-time":"2026-02-08T13:07:27Z","timestamp":1770556047839,"version":"3.49.0"},"reference-count":35,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,5,8]],"date-time":"2024-05-08T00:00:00Z","timestamp":1715126400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,5,8]],"date-time":"2024-05-08T00:00:00Z","timestamp":1715126400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,5,8]]},"DOI":"10.1109\/educon60312.2024.10578894","type":"proceedings-article","created":{"date-parts":[[2024,7,8]],"date-time":"2024-07-08T17:23:24Z","timestamp":1720459404000},"page":"1-10","source":"Crossref","is-referenced-by-count":23,"title":["Empowering Professionals: A Generative AI Approach to Personalized Cybersecurity Learning"],"prefix":"10.1109","author":[{"given":"Christos","family":"Kallonas","sequence":"first","affiliation":[{"name":"Open University of Cyprus Nicosia,Faculty of Pure and Applied Sciences,Cyprus"}]},{"given":"Andriani","family":"Piki","sequence":"additional","affiliation":[{"name":"School of Sciences, University of Central Lancashire Cyprus Larnaca,Cyprus"}]},{"given":"Eliana","family":"Stavrou","sequence":"additional","affiliation":[{"name":"Open University of Cyprus Nicosia,Faculty of Pure and Applied Sciences,Cyprus"}]}],"member":"263","reference":[{"key":"ref3","volume-title":"Cyber security skills in the UK labour market 2023. Ipsos & Department for Science, Innovation and Technology (DSIT)","author":"Coutinho","year":"2023"},{"key":"ref4","volume-title":"Chartered Institute of Information Security - The Security Profession 2022\/23"},{"key":"ref5","volume-title":"European cybersecurity skills framework (ECSF)\u201d, ENISA","year":"2018"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.6028\/nist.sp.800-181r1"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-38530-8_8"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2020.102080"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.62915\/2472-2707.1071"},{"key":"ref10","article-title":"Student Perceptions of Challenges and Role of Mentorship in Cybersecurity Careers: Addressing the Gender Gap","author":"Pinchot","year":"2020","journal-title":"Information Systems Education Journal"},{"key":"ref11","volume-title":"Microsoft","year":"2023"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1080\/15228053.2023.2233814"},{"key":"ref13","volume-title":"Exploring the opportunities and limitations of current Threat Intelligence Platforms\u201d, ENISA","year":"2018"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ICEED.2017.8251171"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2020.101875"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-023-00704-z"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2018.09.009"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1186\/s42400-020-00050-w"},{"key":"ref19","volume-title":"World Economic Forum (WEF)","year":"2023"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/BESC59560.2023.10386988"},{"issue":"1","key":"ref21","first-page":"17","article-title":"Translating constructivism into instructional design: Potential and limitations","volume":"8","author":"Karagiorgi","year":"2005","journal-title":"Journal of Educational Technology & Society"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1080\/08923648909526659"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1080\/08923649409526853"},{"key":"ref24","first-page":"562","article-title":"Authentic activities and online learning","volume":"25","author":"Reeves","year":"2004","journal-title":"Quality conversations: Research and development in higher education"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2018.06.001"},{"key":"ref26","author":"Bada","year":"2019","journal-title":"Cyber Security Awareness Campaigns: Why do they fail to change behaviour"},{"key":"ref27","article-title":"Effective security training requires change in employee behavior","author":"Gross","year":"2018","journal-title":"Health IT Answers"},{"key":"ref28","volume-title":"The components of a successful security awareness program","author":"Kostadinov","year":"2018"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-81111-2_12"},{"key":"ref30","article-title":"Cybersecurity-related curriculum for diverse postgraduate cohorts: A case study","author":"Stavrou","year":"2020","journal-title":"18th International Conference on Education and Information Systems, Technologies and Applications (EISTA 2020)"},{"key":"ref31","volume-title":"Artificial Intelligence and Cybersecurity Research\u201d, ENISA, 2023"},{"key":"ref32","article-title":"Innovating pedagogy 2022: exploring new forms of teaching, learning and assessment, to guide educators and policy makers","volume-title":"Open University Innovation Report","volume":"10","author":"Kukulska-Hulme","year":"2022"},{"key":"ref33","volume-title":"REWIRE Vocational Open Online Courses"},{"key":"ref34","doi-asserted-by":"crossref","first-page":"17","DOI":"10.1017\/9781108762519.002","author":"Swedberg","year":"2020","journal-title":"Exploratory research. The production of knowledge: Enhancing progress in social science"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1631\/fitee.1800573"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1007\/s42979-021-00557-0"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.17148\/ijarcce.2022.11912"}],"event":{"name":"2024 IEEE Global Engineering Education Conference (EDUCON)","location":"Kos Island, Greece","start":{"date-parts":[[2024,5,8]]},"end":{"date-parts":[[2024,5,11]]}},"container-title":["2024 IEEE Global Engineering Education Conference (EDUCON)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10578342\/10578320\/10578894.pdf?arnumber=10578894","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,7,10]],"date-time":"2024-07-10T04:38:07Z","timestamp":1720586287000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10578894\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,5,8]]},"references-count":35,"URL":"https:\/\/doi.org\/10.1109\/educon60312.2024.10578894","relation":{},"subject":[],"published":{"date-parts":[[2024,5,8]]}}}