{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,20]],"date-time":"2026-02-20T18:36:06Z","timestamp":1771612566485,"version":"3.50.1"},"publisher-location":"Cham","reference-count":62,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783031638503","type":"print"},{"value":"9783031638510","type":"electronic"}],"license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-3-031-63851-0_15","type":"book-chapter","created":{"date-parts":[[2024,6,27]],"date-time":"2024-06-27T23:01:51Z","timestamp":1719529311000},"page":"217-228","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["Evolving Cybersecurity Challenges in the Age of AI-Powered Chatbots: A Comprehensive Review"],"prefix":"10.1007","author":[{"given":"Andr\u00e9 F.","family":"Costa","sequence":"first","affiliation":[]},{"given":"Nuno Mateus","family":"Coelho","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,6,28]]},"reference":[{"key":"15_CR1","doi-asserted-by":"crossref","unstructured":"Gianvecchio, S., Xie, M., Wu, Z., Wang, H.: Humans and bots in internet chat: measurement analysis, and automated classification. IEEEACM Trans. Netw. 19, 1557\u20131571 (2011)","DOI":"10.1109\/TNET.2011.2126591"},{"key":"15_CR2","doi-asserted-by":"crossref","unstructured":"Shawar, B.A., Atwell, E.: Chatbots: Are they really useful? J. Lang. Technol. Comput. Linguist. 22, 29\u201349 (2007)","DOI":"10.21248\/jlcl.22.2007.88"},{"key":"15_CR3","doi-asserted-by":"crossref","unstructured":"Gupta, A., Hathwar, D., Vijayakumar, A.: Introduction to AI chatbots. Int. J. Eng. Res. Technol. 9, 07 (2020)","DOI":"10.17577\/IJERTV9IS070143"},{"key":"15_CR4","doi-asserted-by":"publisher","unstructured":"Tavares, A., Sousa, P., Proen\u00e7a, R.: Exploring the dynamics between artificial intelligence and cybersecurity in Healthcare. ARIS2 - Adv. Res. Inf. Syst. Secur. 4(1), 20\u201334 (2024). https:\/\/doi.org\/10.56394\/aris2.v4i1.44","DOI":"10.56394\/aris2.v4i1.44"},{"key":"15_CR5","doi-asserted-by":"crossref","unstructured":"Yang, J., Chen, Y.-L., Por, L.Y., Ku, C.S.: A systematic literature review of information security in chatbots. Appl. Sci. 13, 6355 (2023)","DOI":"10.3390\/app13116355"},{"key":"15_CR6","doi-asserted-by":"crossref","unstructured":"Iqbal, F., Samsom, F., Kamoun, F., MacDermott, \u00c1.: When chatgpt goes rogue: exploring the potential cybersecurity threats of AI-powered conversational chatbots. Front. Commun. Netw. 4, 1220243 (2023)","DOI":"10.3389\/frcmn.2023.1220243"},{"key":"15_CR7","unstructured":"Mateus-Coelho, N.: Cybersecurity in our world (2022)"},{"key":"15_CR8","doi-asserted-by":"publisher","unstructured":"Sule, D.: Social engineering as a tool for warfare: a look at the 2022 dollar bill rejection hoax in Nigeria. ARIS2 - Adv. Res. Inf. Syst. Secur. 3(2), 3\u201310 (2023). https:\/\/doi.org\/10.56394\/aris2.v3i2.29","DOI":"10.56394\/aris2.v3i2.29"},{"key":"15_CR9","doi-asserted-by":"crossref","unstructured":"Soni, B., Gautam, A., Soni, G.: Exploring the advancements and implications of artificial intelligence. Int. J. Sci. Res. Eng. Manag. (2023)","DOI":"10.55041\/IJSREM17358"},{"key":"15_CR10","doi-asserted-by":"publisher","unstructured":"Kooli, C.: Ethical implications of AI chatbots in education and research. Sustainability 15(7), 5614 (2023). https:\/\/doi.org\/10.3390\/su15075614","DOI":"10.3390\/su15075614"},{"key":"15_CR11","doi-asserted-by":"publisher","unstructured":"Gupta, M., Akiri, C., Aryal, K., Parker, E., Praharaj, L.: From ChatGpt to ThreatGpt: Impact of generative AI in cybersecurity and privacy. IEEE Access 11 (2023). https:\/\/doi.org\/10.1109\/ACCESS.2023.3300381","DOI":"10.1109\/ACCESS.2023.3300381"},{"key":"15_CR12","doi-asserted-by":"crossref","unstructured":"Ferreira, J., Mamede, H.S., Mateus-Coelho, N.: Risk management in the current digital reality of organizations. In: Contemporary Challenges for Cyber Security and Data Privacy, IGI Global, pp. 31\u201350 (2023)","DOI":"10.4018\/979-8-3693-1528-6.ch003"},{"key":"15_CR13","unstructured":"Sarker, H., Janicke, H., Mohammad, N., Watters, P., Nepal, S.: Human-AI teaming in cybersecurity. ArXiv Prepr. arXiv:2310.12162 (2023)"},{"key":"15_CR14","doi-asserted-by":"crossref","unstructured":"Bullee, W., Junger, M.: Social Engineering (2020)","DOI":"10.1007\/978-3-319-78440-3_38"},{"key":"15_CR15","unstructured":"Duarte, N., Coelho, N., Guarda, T.: Social engineering: The art of attacks. Algoritmi Center Minho Univercity (2023)"},{"key":"15_CR16","doi-asserted-by":"publisher","unstructured":"Usmani, U.A., Happonen, A., Watada, J.: Human-Centered Artificial intelligence: designing for user empowerment and ethical considerations. In: IEEE Humanitarian Opportunities and Risk Assessment (HORA) 2023. https:\/\/doi.org\/10.1109\/HORA58378.2023.10156761","DOI":"10.1109\/HORA58378.2023.10156761"},{"key":"15_CR17","doi-asserted-by":"publisher","unstructured":"Amershi, S., et al.: Guidelines for human-AI interaction. In: Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems, New York, NY, USA: Association for Computing Machinery, pp. 1\u201313 (2019). https:\/\/doi.org\/10.1145\/3290605.3300233","DOI":"10.1145\/3290605.3300233"},{"key":"15_CR18","doi-asserted-by":"publisher","unstructured":"Costa, A., Silva F.: Interaction design for AI systems: an oriented state-of-the-art. In: 2022 International Congress on Human-Computer Interaction, Optimization and Robotic Applications (HORA), pp. 1\u20137 (2022). https:\/\/doi.org\/10.1109\/HORA55278.2022.9800084","DOI":"10.1109\/HORA55278.2022.9800084"},{"key":"15_CR19","doi-asserted-by":"publisher","unstructured":"Zeng, Y.: How human centered AI will contribute towards intelligent gaming systems. AAAI Conf. Artif. Intell. 35(18), 17868 (2021). https:\/\/doi.org\/10.1609\/aaai.v35i18.17868","DOI":"10.1609\/aaai.v35i18.17868"},{"key":"15_CR20","doi-asserted-by":"publisher","unstructured":"Battistoni, P., Gregorio, M.D., Romano, M., Sebillo, M., Vitiello, G.: Can AI-oriented requirements enhance human-centered design of intelligent interactive systems? results from a workshop with young HCI designers. Multimodal Technol. Interact. 7(3), 24 (2023). https:\/\/doi.org\/10.3390\/mti7030024","DOI":"10.3390\/mti7030024"},{"key":"15_CR21","unstructured":"B\u00f6hm, S., et al.: Intent identification and analysis for user-centered Chatbot design: a case study on the example of recruiting Chatbots in Germany. Publ. (2022)"},{"key":"15_CR22","doi-asserted-by":"publisher","unstructured":"Page, M., et al.: The PRISMA 2020 statement: an updated guideline for reporting systematic reviews. J. Clin. Epidemiol. (2021). https:\/\/doi.org\/10.1016\/j.jclinepi.2021.03.001","DOI":"10.1016\/j.jclinepi.2021.03.001"},{"key":"15_CR23","doi-asserted-by":"crossref","unstructured":"Weizenbaum, J.: Eliza - a computer program for the study of natural language communication between man and machine. Commun. ACM 9(1), 36\u201345 (1966)","DOI":"10.1145\/365153.365168"},{"key":"15_CR24","unstructured":"Wallace, R.S.: The anatomy of A.l.I.C.E (2004)"},{"key":"15_CR25","doi-asserted-by":"crossref","unstructured":"Shawar, B.A., Atwell, E.: Using corpora in machine-learning chatbot systems. Int. J. Corpus Linguist. 10(4), 489\u2013516 (2005)","DOI":"10.1075\/ijcl.10.4.06sha"},{"key":"15_CR26","doi-asserted-by":"crossref","unstructured":"Lowe, R., Noseworthy, M., Serban, I.V., Angelard-Gontier, N., Bengio, Y., Pineau, J.: Towards an automatic turing test: learning to evaluate dialogue responses. In: Proceedings of the 5th International Conference on Learning Representations (ICLR) Workshop, Toulon, France (2017)","DOI":"10.18653\/v1\/P17-1103"},{"key":"15_CR27","volume-title":"Natural Language Processing: Encyclopedia of Library and Information Science","author":"D Liddy","year":"2001","unstructured":"Liddy, D.: Natural Language Processing: Encyclopedia of Library and Information Science, 2nd edn. Marcel Decker Inc, NY (2001)","edition":"2"},{"key":"15_CR28","unstructured":"Research, V.: Chatbot market size and share analysis, Ind. Rep. 2014\u20132025 (2018)"},{"key":"15_CR29","unstructured":"Vaswani, A., et al.: Attention is all you need. In: Advances in neural information processing systems, Curran Associates, Inc. (2017)"},{"key":"15_CR30","unstructured":"Syed, A.M., Zafar, H., Malik, N.: Social engineering: Concepts, techniques, and security countermeasures. J. Comput. Virol. Hacking Tech. 16(4), 265\u2013278 (2020)"},{"key":"15_CR31","unstructured":"Mann, I.: Hacking the Human: Social Engineering Techniques and Security Counter measures. Gower Publishing (2008)"},{"key":"15_CR32","doi-asserted-by":"crossref","unstructured":"Ferreira, D.J., Mateus-Coelho, N., Mamede, H.S.: Methodology for predictive cyber security risk assessment (pcsra). Procedia Comput. Sci. 219, 1555\u20131563 (2023)","DOI":"10.1016\/j.procs.2023.01.447"},{"key":"15_CR33","doi-asserted-by":"crossref","unstructured":"Sebastian, G.: Do chatgpt and other AI Chatbots pose a cybersecurity risk? An exploratory study. Int. J. Secur. Priv. Pervasive Comput. 15 (2023)","DOI":"10.2139\/ssrn.4363843"},{"key":"15_CR34","doi-asserted-by":"crossref","unstructured":"McIntire, J.P., McIntire, L.K., Havig, P.R.: Methods for Chatbot detection in distributed textbased communications. In: 2010 International Symposium on Collaborative Technologies and Systems, pp. 463\u2013472 (2010)","DOI":"10.1109\/CTS.2010.5478478"},{"key":"15_CR35","doi-asserted-by":"crossref","unstructured":"Siddiqi, A., Pak, W., Siddiqi, M.A.: Social engineering based cyberattacks and countermeasures. Appl. Sci. 12(12), 6042 (2022)","DOI":"10.3390\/app12126042"},{"key":"15_CR36","doi-asserted-by":"crossref","unstructured":"Chinmulgund, A., Khatwani, R., Tapas, P., Shah, P., Sekhar, R.: Anthropomorphism of AI based Chatbots by users during communication. In: Proceedings of the IEEE Conference on Information Technology (2023)","DOI":"10.1109\/CONIT59222.2023.10205689"},{"key":"15_CR37","doi-asserted-by":"crossref","unstructured":"Biswas, D.: Privacy preserving Chatbot conversations. In: 2020 IEEE Third International Conference on Artificial Intelligence and Knowledge Engineering (AIKE), pp. 179\u2013182 (2020)","DOI":"10.1109\/AIKE48582.2020.00035"},{"key":"15_CR38","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1007\/978-3-319-99927-2_3","volume-title":"Testing Software and Systems","author":"J Bozic","year":"2018","unstructured":"Bozic, J., Wotawa, F.: Security testing for chatbots. In: Medina-Bulo, I., Merayo, M.G., Hierons, R. (eds.) ICTSS 2018. LNCS, vol. 11146, pp. 33\u201338. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-99927-2_3"},{"key":"15_CR39","doi-asserted-by":"crossref","unstructured":"Cheng, Y., Jiang, H.: How do AI-driven Chatbots impact user experience? Examining gratifications, perceived privacy risk, satisfaction, loyalty, and continued use. J. Broadcast. Electron. Media, 64, 592\u2013614 (2020)","DOI":"10.1080\/08838151.2020.1834296"},{"key":"15_CR40","doi-asserted-by":"publisher","unstructured":"Ischen, C., Araujo, T., Voorveld, H., van Noort, G., Smit, E.: Privacy concerns in Chatbot interactions. 34\u201348 (2019). https:\/\/doi.org\/10.1007\/978-3-030-39540-7_3","DOI":"10.1007\/978-3-030-39540-7_3"},{"key":"15_CR41","doi-asserted-by":"crossref","unstructured":"Hasal, M., Nowakov\u00e1, J., Ahmed Saghair, K., Abdulla, H., Sn\u00e1\u0161el, V., Ogiela, L.: Chatbots: security, privacy, data protection, and social aspects. Concurr. Comput. Pract. Exp. 33, e6426 (2021)","DOI":"10.1002\/cpe.6426"},{"key":"15_CR42","unstructured":"Al-Saadoon, M.W., Al-Bayatti, H.M.: A comparison of Trojan virus behavior in Linux and Windows operating systems. ArXiv Prepr. abs11051234 (2011)"},{"key":"15_CR43","doi-asserted-by":"crossref","unstructured":"Smys, S., Wang, H.: Naive Bayes and entropy based analysis and classification of humans and chat bots. 3, 40\u201349 (2021)","DOI":"10.36548\/jismac.2021.1.004"},{"key":"15_CR44","doi-asserted-by":"crossref","unstructured":"Bailey, N.R., Scerbo, M.W.: Automation-induced complacency for monitoring highly reliable systems: the role of task complexity, system experience, and operator trust. Theor. Issues Ergon. Sci. 8, 321\u2013348 (2007)","DOI":"10.1080\/14639220500535301"},{"key":"15_CR45","doi-asserted-by":"crossref","unstructured":"Parasuraman, R., Manzey, D.: Complacency and bias in human use of automation: an attentional integration. Hum. Factors J. Hum. Factors Ergon. Soc. 52, 381\u2013410 (2010)","DOI":"10.1177\/0018720810376055"},{"key":"15_CR46","doi-asserted-by":"crossref","unstructured":"Singh, I.L., Molloy, R., Parasuraman, R.: Automation-induced \u201ccomplacency\u201d: development of the complacency potential rating scale. Int. J. Aviat. Psychol. 3, 111\u2013122 (1993)","DOI":"10.1207\/s15327108ijap0302_2"},{"key":"15_CR47","doi-asserted-by":"crossref","unstructured":"Manzey, D., Bahner, J.E., Hueper, A.D.: Misuse of automated aids in process control: complacency, automation bias and possible training interventions. In: Proceedings of the Human Factors and Ergonomics Society Annual Meeting, pp. 220\u2013224 (2006)","DOI":"10.1177\/154193120605000303"},{"key":"15_CR48","doi-asserted-by":"crossref","unstructured":"Rodriguez, S.S., O\u2019Donovan, J., Schaffer, J., H\u00f6llerer, T. Knowledge complacency and decision support systems. In: 2019 IEEE Conference on Cognitive and Computational Aspects of Situation Management (CogSIMA), pp. 43\u201351 (2019)","DOI":"10.1109\/COGSIMA.2019.8724175"},{"key":"15_CR49","doi-asserted-by":"crossref","unstructured":"Jin, S.V., Youn, S.: Social presence and imagery processing as predictors of Chatbot continuance intention in human-AI-interaction. Int. J. Hum.-Comput. Interact. (2022)","DOI":"10.1080\/10447318.2022.2129277"},{"key":"15_CR50","unstructured":"Ribeiro, R.A.B.: Improving social engineering resilience in enterprises. Master\u2019s Dissertation in Information and Enterprise Systems (MISE), Universidade Aberta (2023)"},{"key":"15_CR51","unstructured":"Zimmermann, G.T., Nagappan, N.: The state of the ML universe: 10 years of artificial intelligence & machine learning software development on GitHub. In: Proceedings of the 17th International Conference on Mining Software Repositories (2020)"},{"key":"15_CR52","doi-asserted-by":"crossref","unstructured":"von Ahn, M., Blum, N., Hopper, Langford, J.: Captcha: using hard AI problems for security. Proc. Eurocrypt. 294\u2013311 (2003)","DOI":"10.1007\/3-540-39200-9_18"},{"key":"15_CR53","unstructured":"Mohta, A.: Bots are back in yahoo chat rooms (2007). http:\/\/www.technospot.net\/blogs\/bots-are-back-in-yahoo-chat-room\/"},{"key":"15_CR54","unstructured":"Mohta: Yahoo chat: captcha check to remove bots (2007). http:\/\/www.technospot.net\/blogs\/yahoo-chat-captcha-check-to-remove-bots\/"},{"key":"15_CR55","unstructured":"Malatji: Systematic literature review on AI-driven cyberattacks and countermeasures. In: Proceedings of the 2023 International Conference on Data and Applications Technology (2023)"},{"key":"15_CR56","doi-asserted-by":"crossref","unstructured":"Chanda, R., Prabhu, S.: Secured framework for banking Chatbots using AI, ML and NLP. In 2023 7th International Conference on Intelligent Computing and Control Systems (ICICCS), pp. 60\u201365 (2023)","DOI":"10.1109\/ICICCS56967.2023.10142289"},{"key":"15_CR57","doi-asserted-by":"crossref","unstructured":"Bresniker, M., Gavrilovska, A., Holt, J., Milojicic, D., Tran, T.-D.: Grand challenge: applying artificial intelligence and machine learning to cybersecurity. Computer 52, 45\u201352 (2019)","DOI":"10.1109\/MC.2019.2942584"},{"key":"15_CR58","doi-asserted-by":"crossref","unstructured":"Lai, S.-T., Leu, F.-Y., Lin, J.-W.: A banking Chatbot security control procedure for protecting user data security and privacy. 561\u2013571 (2018)","DOI":"10.1007\/978-3-030-02613-4_50"},{"key":"15_CR59","doi-asserted-by":"crossref","unstructured":"Zeadally, S., Adi, E., Baig, Z., Khan, A.: Harnessing artificial intelligence capabilities to improve cybersecurity. IEEE Access 8, 23817\u201323837 (2020)","DOI":"10.1109\/ACCESS.2020.2968045"},{"key":"15_CR60","doi-asserted-by":"crossref","unstructured":"Ansari, M., Sharma, P.K., Dash, B.: Prevention of phishing attacks using AI-based cybersecurity awareness training. Int. J. Smart Sens. Adhoc Netw. (2022)","DOI":"10.47893\/IJSSAN.2022.1221"},{"key":"15_CR61","doi-asserted-by":"crossref","unstructured":"Jobin, A., Ienca, M., Vayena, E.: Artificial intelligence: the global landscape of ethics guidelines. ETH Zurich (2019)","DOI":"10.1038\/s42256-019-0088-2"},{"key":"15_CR62","doi-asserted-by":"publisher","unstructured":"Shneiderman, B.: Human-centered artificial intelligence: reliable, safe & trustworthy. Int. J. Hum.\u2013Comput. Interact. 36(6), 495\u2013504 (2020). https:\/\/doi.org\/10.1080\/10447318.2020.1741118","DOI":"10.1080\/10447318.2020.1741118"}],"container-title":["IFIP Advances in Information and Communication Technology","Technological Innovation for Human-Centric Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-63851-0_15","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,6,27]],"date-time":"2024-06-27T23:04:08Z","timestamp":1719529448000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-63851-0_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"ISBN":["9783031638503","9783031638510"],"references-count":62,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-63851-0_15","relation":{},"ISSN":["1868-4238","1868-422X"],"issn-type":[{"value":"1868-4238","type":"print"},{"value":"1868-422X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"28 June 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"DoCEIS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Doctoral Conference on Computing, Electrical and Industrial Systems","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Caparica","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Portugal","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"3 July 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5 July 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"doceis2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/doceis.dee.fct.unl.pt\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}