{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,25]],"date-time":"2026-03-25T16:14:16Z","timestamp":1774455256043,"version":"3.50.1"},"reference-count":38,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,4,22]],"date-time":"2025-04-22T00:00:00Z","timestamp":1745280000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,4,22]],"date-time":"2025-04-22T00:00:00Z","timestamp":1745280000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,4,22]]},"DOI":"10.1109\/educon62633.2025.11016486","type":"proceedings-article","created":{"date-parts":[[2025,6,3]],"date-time":"2025-06-03T17:42:47Z","timestamp":1748972567000},"page":"1-10","source":"Crossref","is-referenced-by-count":1,"title":["Balancing Generative AI and Critical Thinking to Develop Written Communication Skills in Cybersecurity"],"prefix":"10.1109","author":[{"given":"Apostolos","family":"Charalambous","sequence":"first","affiliation":[{"name":"Open University of Cyprus,Faculty of Pure and Applied Sciences,Cyprus"}]},{"given":"Andriani","family":"Piki","sequence":"additional","affiliation":[{"name":"School of Sciences, University of Central,Lancashire Cyprus,Cyprus"}]},{"given":"Joakim","family":"K\u00e4vrestad","sequence":"additional","affiliation":[{"name":"School of Engineering, J&#x00F6;nk&#x00F6;ping University,Sweeden"}]},{"given":"Eliana","family":"Stavrou","sequence":"additional","affiliation":[{"name":"Open University of Cyprus,Faculty of Pure and Applied Sciences,Cyprus"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/EDUCON45650.2020.9125105"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.3389\/fpsyg.2018.00744"},{"key":"ref3","volume-title":"Fostering Critical Thinking in the AI Era: Innovative Educational Approaches for a Data-Driven Society","author":"Bhuman","year":"2024"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/educon60312.2024.10578728"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/educon60312.2024.10578866"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/educon60312.2024.10578588"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/3458026.3462153"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1057\/s41284-024-00420-w"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1080\/08874417.2022.2115954"},{"key":"ref10","article-title":"Cyber Security Skills Report 2021 National Survey","volume-title":"Cyber Ireland","author":"Somers","year":"2021"},{"key":"ref11","volume-title":"European Cybersecurity Skills Framework Role Profiles","year":"2022"},{"key":"ref12","volume-title":"Bloom\u2019s Taxonomy Reimagined: Digital Strategies for Today\u2019s Teachers.","author":"Mcnulty","year":"2020"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.62273\/TRBS2965"},{"issue":"9","key":"ref14","first-page":"83","article-title":"Generative AI and the Development of Critical Thinking Skills","volume":"7","author":"Thiga","year":"2024","journal-title":"Iconic Research and Engineering (IRE) Journals"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/EDUCON60312.2024.10578742"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/MIS.2023.3283169"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/EDUCON60312.2024.10578894"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1108\/ICS-02-2024-0038"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-13-2262-4_299-1"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1016\/j.caeai.2023.100198"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1002\/9781119171409"},{"key":"ref22","volume-title":"Cybersecurity Workforce Study","year":"2023"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1002\/ets2.12035"},{"key":"ref24","article-title":"Skills and Characteristics of Successful Cybersecurity Advocates","volume-title":"SOUPS","author":"Haney","year":"2017"},{"key":"ref25","volume-title":"The Role of Technical Writing in Cybersecurity. Doakio.","author":"Augusto","year":"2023"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/3152893"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.17148\/ijarcce.2022.11912"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1631\/fitee.1800573"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1007\/s42979-021-00557-0"},{"key":"ref30","article-title":"Artificial Intelligence and Cybersecurity Research","volume-title":"ENISA","year":"2023"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/FIE44824.2020.9274033"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.3390\/app13126986"},{"key":"ref33","volume-title":"Evaluating the Cyber Security Skills Gap relating to Penetration Testing","author":"Beukes","year":"2021"},{"key":"ref34","first-page":"1","article-title":"The Theory of Stages in Cognitive Development","volume-title":"Measurement and Piaget","author":"Piaget","year":"1971"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.3389\/feduc.2024.1241973"},{"key":"ref36","volume-title":"A Taxonomy for Learning, Teaching, and Assessing: A Revision of Bloom\u2019s Taxonomy of Educational Objectives.","author":"Anderson","year":"2001"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-38530-8_8"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2020.101875"}],"event":{"name":"2025 IEEE Global Engineering Education Conference (EDUCON)","location":"London, United Kingdom","start":{"date-parts":[[2025,4,22]]},"end":{"date-parts":[[2025,4,25]]}},"container-title":["2025 IEEE Global Engineering Education Conference (EDUCON)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11016265\/11016287\/11016486.pdf?arnumber=11016486","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,4]],"date-time":"2025-06-04T05:08:56Z","timestamp":1749013736000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11016486\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,4,22]]},"references-count":38,"URL":"https:\/\/doi.org\/10.1109\/educon62633.2025.11016486","relation":{},"subject":[],"published":{"date-parts":[[2025,4,22]]}}}