{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,20]],"date-time":"2026-02-20T22:57:52Z","timestamp":1771628272895,"version":"3.50.1"},"publisher-location":"Cham","reference-count":20,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783031613814","type":"print"},{"value":"9783031613821","type":"electronic"}],"license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-3-031-61382-1_5","type":"book-chapter","created":{"date-parts":[[2024,6,1]],"date-time":"2024-06-01T01:06:11Z","timestamp":1717203971000},"page":"70-83","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Revolutionizing Social Engineering Awareness Raising, Education and Training: Generative AI-Powered Investigations in the Maritime Domain"],"prefix":"10.1007","author":[{"given":"Michail","family":"Loupasakis","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9505-7496","authenticated-orcid":false,"given":"Georgios","family":"Potamos","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4040-4942","authenticated-orcid":false,"given":"Eliana","family":"Stavrou","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,6,1]]},"reference":[{"key":"5_CR1","doi-asserted-by":"crossref","unstructured":"Venkatesha, S., Reddy, K., Chandavarkar, B.: Social engineering attacks during the COVID-19 pandemic. SN Comput. Sci. (2021)","DOI":"10.1007\/s42979-020-00443-1"},{"key":"5_CR2","unstructured":"ENISA: ENISA Threat Landscape 2023 (2023). https:\/\/www.enisa.europa.eu\/publications\/enisa-threat-landscape-2023"},{"key":"5_CR3","unstructured":"SlashNext: The State of Phishing 2023 (2024). https:\/\/slashnext.com\/wp-content\/uploads\/2023\/10\/SlashNext-The-State-of-Phishing-Report-2023.pdf"},{"key":"5_CR4","unstructured":"cybersecuritymonth.eu: European Cyber Security Month (2023). https:\/\/cybersecuritymonth.eu\/"},{"key":"5_CR5","doi-asserted-by":"crossref","unstructured":"Piki, A., Stavrou, E., Procopiou, A., Demosthenous, A.: Fostering cybersecurity awareness and skills development through digital game-based learning. In: 10th International Conference on Behavioural and Social Computing (BESC), Larnaca (2023)","DOI":"10.1109\/BESC59560.2023.10386988"},{"key":"5_CR6","doi-asserted-by":"publisher","first-page":"249","DOI":"10.1007\/978-3-642-39377-8_29","volume-title":"Information Assurance and Security Education and Training","author":"A Smith","year":"2013","unstructured":"Smith, A., Papadaki, M., Furnell, S.M.: Improving awareness of social engineering attacks. In: Dodge, R.C., Futcher, L. (eds.) Information Assurance and Security Education and Training. IAICT, vol. 406, pp. 249\u2013256. Springer, Heidelberg (2013). https:\/\/doi.org\/10.1007\/978-3-642-39377-8_29"},{"key":"5_CR7","doi-asserted-by":"crossref","unstructured":"Aldawood, H., Skinner, G.: Reviewing cyber security social engineering training and awareness programs - pitfalls and ongoing issues. Future Internet (2019)","DOI":"10.3390\/fi11030073"},{"key":"5_CR8","unstructured":"Stavrou, E.: Back to basics: towards building societal resilience against a cyber pandemic. J. Syst. Cybern. Inf. (JSCI), 73\u201380 (2020)"},{"key":"5_CR9","unstructured":"Microsoft: Microsoft Digital Defense Report - Building and improving cyber resilience (2023). https:\/\/www.microsoft.com\/en-us\/security\/security-insider\/microsoft-digital-defense-report-2023"},{"key":"5_CR10","doi-asserted-by":"crossref","unstructured":"Nah, F.F.-H., Zheng, R., Cai, J., Siau, K., Chen, L.: Generative AI and ChatGPT: applications, challenges, and AI-human collaboration. J. Inf. Technol. Case Appl. Res., 277\u2013304 (2023)","DOI":"10.1080\/15228053.2023.2233814"},{"key":"5_CR11","doi-asserted-by":"crossref","unstructured":"Charalambous, A., Stavrou, E.: Building societal resilience against social engineering attacks: unleashing the power of instructional design and microtargeting. In: 16th Annual International Conference of Education, Research and Innovation (ICERI), Seville (2023)","DOI":"10.21125\/iceri.2023.1368"},{"key":"5_CR12","unstructured":"Aldawood, H.: A policy framework to prevent social engineering. In: 3rd International Conference Middle East and North Africa Conference of Information System, Casablanca (2020)"},{"key":"5_CR13","unstructured":"WEF: The Cyber Resilience Index: Advancing Organizational Cyber Resilience (2022). https:\/\/www3.weforum.org\/docs\/WEF_Cyber_Resilience_Index_2022.pdf"},{"key":"5_CR14","doi-asserted-by":"crossref","unstructured":"Hulatt, D., Stavrou, E.: The development of a multidisciplinary cybersecurity workforce: an investigation. In: 17th International Symposium on Human Aspects of Information Security & Assurance (HAISA), Kent (2021)","DOI":"10.1007\/978-3-030-81111-2_12"},{"key":"5_CR15","doi-asserted-by":"publisher","unstructured":"Potamos, G., Theodoulou, S., Stavrou, E., Stavrou, S.: Maritime cyber threats detection framework: building capabilities. In: Drevin, L., Miloslavskaya, N., Leung, W.S., von Solms, S. (eds.) WISE 2022. IFIP Advances in Information and Communication Technology, vol. 650, pp. 107\u2013129. Springer, Cham (2022). https:\/\/doi.org\/10.1007\/978-3-031-08172-9_8","DOI":"10.1007\/978-3-031-08172-9_8"},{"key":"5_CR16","doi-asserted-by":"publisher","unstructured":"Potamos, G., Theodoulou, S., Stavrou, E., Stavrou, S.: Building maritime cybersecurity capacity against ransomware attacks. In: Onwubiko, C., et al. (eds.) International Conference on Cybersecurity, Situational Awareness and Social Media, pp. 87\u2013101. Springer, Singapore (2023). https:\/\/doi.org\/10.1007\/978-981-19-6414-5_6","DOI":"10.1007\/978-981-19-6414-5_6"},{"key":"5_CR17","doi-asserted-by":"crossref","unstructured":"Kallonas, C., Piki, A., Stavrou, E.: Empowering professionals: a generative AI approach to personalized cybersecurity learning. In: IEEE Global Engineering Education Conference 2024, Kos (2024)","DOI":"10.1109\/EDUCON60312.2024.10578894"},{"key":"5_CR18","unstructured":"NIST: NIST SP 800-30 Rev. 1: Guide for Conducting Risk Assessments (2012). https:\/\/csrc.nist.gov\/pubs\/sp\/800\/30\/r1\/final"},{"key":"5_CR19","doi-asserted-by":"crossref","unstructured":"Gutterman, A.S.: Designing the organizational structure. In: SSRN (2023)","DOI":"10.2139\/ssrn.4548234"},{"key":"5_CR20","unstructured":"CompassAir: Part 2 \u2013 Stakeholders (2024). https:\/\/mycompassair.com\/part-2-stakeholders\/. Accessed 10 Feb 2024"}],"container-title":["Lecture Notes in Computer Science","HCI for Cybersecurity, Privacy and Trust"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-61382-1_5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,11,20]],"date-time":"2024-11-20T22:29:51Z","timestamp":1732141791000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-61382-1_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"ISBN":["9783031613814","9783031613821"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-61382-1_5","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"1 June 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"The authors have no competing interests to declare that are relevant to the content of this article.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Disclosure of Interests"}},{"value":"HCII","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Human-Computer Interaction","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Washington DC","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"USA","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"29 June 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"4 July 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"hcii2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/2024.hci.international\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}