{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,6]],"date-time":"2026-04-06T10:26:17Z","timestamp":1775471177139,"version":"3.50.1"},"publisher-location":"Cham","reference-count":20,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783031741852","type":"print"},{"value":"9783031741869","type":"electronic"}],"license":[{"start":{"date-parts":[[2024,10,9]],"date-time":"2024-10-09T00:00:00Z","timestamp":1728432000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,10,9]],"date-time":"2024-10-09T00:00:00Z","timestamp":1728432000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-3-031-74186-9_3","type":"book-chapter","created":{"date-parts":[[2024,10,8]],"date-time":"2024-10-08T07:04:34Z","timestamp":1728371074000},"page":"26-38","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Evaluating the\u00a0Privacy and\u00a0Security Implications of\u00a0AI-Based Medical Chatbots on\u00a0Android Platforms"],"prefix":"10.1007","author":[{"given":"T. Q.","family":"Bao","sequence":"first","affiliation":[]},{"given":"P. T.","family":"Nghiem","sequence":"additional","affiliation":[]},{"given":"T. L.","family":"Khiem","sequence":"additional","affiliation":[]},{"given":"H. T. P.","family":"Trung","sequence":"additional","affiliation":[]},{"given":"T. D.","family":"Thong","sequence":"additional","affiliation":[]},{"given":"P. D.","family":"Trinh","sequence":"additional","affiliation":[]},{"given":"Doan Minh","family":"Hieu","sequence":"additional","affiliation":[]},{"given":"Nhi Truc","family":"Le","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,10,9]]},"reference":[{"issue":"8","key":"3_CR1","doi-asserted-by":"publisher","first-page":"462","DOI":"10.3390\/info14080462","volume":"14","author":"M Alawida","year":"2023","unstructured":"Alawida, M., et al.: A comprehensive study of ChatGPT: advancements, limitations, and ethical considerations in natural language processing and cybersecurity. Information 14(8), 462 (2023)","journal-title":"Information"},{"issue":"10","key":"3_CR2","doi-asserted-by":"publisher","first-page":"326","DOI":"10.3390\/info10100326","volume":"10","author":"A Amin","year":"2019","unstructured":"Amin, A., et al.: AndroShield: automated android applications vulnerability detection, a hybrid static and dynamic analysis approach. Information 10(10), 326 (2019)","journal-title":"Information"},{"issue":"1","key":"3_CR3","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1007\/s43926-023-00047-0","volume":"3","author":"E Caushaj","year":"2023","unstructured":"Caushaj, E., Sugumaran, V.: Classification and security assessment of android apps. Discov. Internet Things 3(1), 15 (2023)","journal-title":"Discov. Internet Things"},{"key":"3_CR4","doi-asserted-by":"crossref","unstructured":"Diamantaris, M., Papadopoulos, E.P., Markatos, E.P., Ioannidis, S., Polakis, J.: REAPER: real-time app analysis for augmenting the android permission system. In: Proceedings of the Ninth ACM Conference on Data and Application Security and Privacy, pp. 37\u201348 (2019)","DOI":"10.1145\/3292006.3300027"},{"key":"3_CR5","doi-asserted-by":"crossref","unstructured":"Gupta, M., Akiri, C., Aryal, K., Parker, E., Praharaj, L.: From ChatGPT to ThreatGPT: impact of generative AI in cybersecurity and privacy. IEEE Access (2023)","DOI":"10.1109\/ACCESS.2023.3300381"},{"issue":"1","key":"3_CR6","doi-asserted-by":"publisher","DOI":"10.2196\/44838","volume":"11","author":"MR Haque","year":"2023","unstructured":"Haque, M.R., Rubya, S.: An overview of chatbot-based mobile mental health apps: insights from app description and user reviews. JMIR Mhealth Uhealth 11(1), e44838 (2023)","journal-title":"JMIR Mhealth Uhealth"},{"key":"3_CR7","doi-asserted-by":"publisher","first-page":"158","DOI":"10.1016\/j.future.2018.02.001","volume":"83","author":"A Kumar","year":"2018","unstructured":"Kumar, A., et al.: FAMOUS: forensic analysis of mobile devices using scoring of application permissions. Futur. Gener. Comput. Syst. 83, 158\u2013172 (2018)","journal-title":"Futur. Gener. Comput. Syst."},{"key":"3_CR8","doi-asserted-by":"publisher","unstructured":"Nam, T.B., et al.: SPaMeR: securing patient medical records in the cloud - a microservice and brokerless architecture approach. In: Zhang, Y., Zhang, L.J. (eds.) Web Services - ICWS 2023. ICWS 2023. LNCS, vol. 14209, pp. 32\u201346. Springer, Cham (2023). https:\/\/doi.org\/10.1007\/978-3-031-44836-2_3","DOI":"10.1007\/978-3-031-44836-2_3"},{"issue":"19","key":"3_CR9","doi-asserted-by":"publisher","first-page":"3997","DOI":"10.3390\/app9193997","volume":"9","author":"MMH Onik","year":"2019","unstructured":"Onik, M.M.H., et al.: Personal information classification on aggregated android application\u2019s permissions. Appl. Sci. 9(19), 3997 (2019)","journal-title":"Appl. Sci."},{"key":"3_CR10","unstructured":"Qammar, A., et\u00a0al.: Chatbots to ChatGPT in a cybersecurity space: Evolution, vulnerabilities, attacks, challenges, and future recommendations (2023). arXiv preprint arXiv:2306.09255"},{"issue":"12","key":"3_CR11","doi-asserted-by":"publisher","DOI":"10.1002\/ett.3773","volume":"31","author":"G Shrivastava","year":"2020","unstructured":"Shrivastava, G., et al.: Privacy issues of android application permissions: a literature review. Trans. Emerg. Telecommun. Technol. 31(12), e3773 (2020)","journal-title":"Trans. Emerg. Telecommun. Technol."},{"key":"3_CR12","doi-asserted-by":"crossref","unstructured":"Son, H.X., Carminati, B., Ferrari, E.: A risk assessment mechanism for android apps. In: 2021 IEEE International Conference on Smart Internet of Things (SmartIoT), pp. 237\u2013244. IEEE (2021)","DOI":"10.1109\/SmartIoT52359.2021.00044"},{"key":"3_CR13","doi-asserted-by":"publisher","unstructured":"Son, H.X., Carminati, B., Ferrari, E.: PriApp-install: learning user privacy preferences on mobile apps\u2019 installation. In: Su, C., Gritzalis, D., Piuri, V. (eds.) Information Security Practice and Experience. ISPEC 2022. LNCS, vol. 13620, pp. 306\u2013323. Springer, Cham (2022). https:\/\/doi.org\/10.1007\/978-3-031-21280-2_17","DOI":"10.1007\/978-3-031-21280-2_17"},{"issue":"3","key":"3_CR14","doi-asserted-by":"publisher","first-page":"242","DOI":"10.1007\/s41019-022-00189-1","volume":"7","author":"HX Son","year":"2022","unstructured":"Son, H.X., Carminati, B., Ferrari, E.: A risk estimation mechanism for android apps based on hybrid analysis. Data Sci. Eng. 7(3), 242\u2013252 (2022)","journal-title":"Data Sci. Eng."},{"key":"3_CR15","doi-asserted-by":"publisher","unstructured":"Son, H.X., et al.: In2P-Med: toward the individual privacy preferences identity in the medical web apps. In: Garrig\u00f3s, I., Murillo Rodr\u00edguez, J.M., Wimmer, M. (eds.) Web Engineering. ICWE 2023. LNCS, vol. 13893, pp. 126\u2013140. Springer, Cham (2023). https:\/\/doi.org\/10.1007\/978-3-031-34444-2_10","DOI":"10.1007\/978-3-031-34444-2_10"},{"key":"3_CR16","doi-asserted-by":"crossref","unstructured":"Wang, H., et\u00a0al.: Reevaluating android permission gaps with static and dynamic analysis. In: 2015 IEEE Global Communications Conference (GLOBECOM), pp.\u00a01\u20136. IEEE (2015)","DOI":"10.1109\/GLOCOM.2015.7417621"},{"issue":"11","key":"3_CR17","doi-asserted-by":"publisher","first-page":"6355","DOI":"10.3390\/app13116355","volume":"13","author":"J Yang","year":"2023","unstructured":"Yang, J., et al.: A systematic literature review of information security in chatbots. Appl. Sci. 13(11), 6355 (2023)","journal-title":"Appl. Sci."},{"key":"3_CR18","doi-asserted-by":"publisher","first-page":"265","DOI":"10.1007\/s10586-016-0703-5","volume":"21","author":"Y Yang","year":"2018","unstructured":"Yang, Y., et al.: Droidward: an effective dynamic analysis method for vetting android applications. Clust. Comput. 21, 265\u2013275 (2018)","journal-title":"Clust. Comput."},{"key":"3_CR19","doi-asserted-by":"crossref","unstructured":"Ye, W., Li, Q.: Chatbot security and privacy in the age of personal assistants. In: 2020 IEEE\/ACM Symposium on Edge Computing (SEC), pp. 388\u2013393. IEEE (2020)","DOI":"10.1109\/SEC50012.2020.00057"},{"key":"3_CR20","doi-asserted-by":"crossref","unstructured":"Zaazaa, O., El\u00a0Bakkali, H.: Dynamic vulnerability detection approaches and tools: State of the art. In: 2020 Fourth International Conference On Intelligent Computing in Data Sciences (ICDS), pp.\u00a01\u20136. IEEE (2020)","DOI":"10.1109\/ICDS50568.2020.9268686"}],"container-title":["Lecture Notes in Computer Science","Hybrid Artificial Intelligent Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-74186-9_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,10,8]],"date-time":"2024-10-08T07:05:07Z","timestamp":1728371107000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-74186-9_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,10,9]]},"ISBN":["9783031741852","9783031741869"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-74186-9_3","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,10,9]]},"assertion":[{"value":"9 October 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"HAIS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Hybrid Artificial Intelligence Systems","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Salamanca","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Spain","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"9 October 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"11 October 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"hais2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/haisconference.eu\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}