{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,8]],"date-time":"2025-11-08T05:24:53Z","timestamp":1762579493739,"version":"build-2065373602"},"publisher-location":"Cham","reference-count":17,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783032103468","type":"print"},{"value":"9783032103475","type":"electronic"}],"license":[{"start":{"date-parts":[[2025,11,9]],"date-time":"2025-11-09T00:00:00Z","timestamp":1762646400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,11,9]],"date-time":"2025-11-09T00:00:00Z","timestamp":1762646400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026]]},"DOI":"10.1007\/978-3-032-10347-5_15","type":"book-chapter","created":{"date-parts":[[2025,11,8]],"date-time":"2025-11-08T05:22:11Z","timestamp":1762579331000},"page":"162-173","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Social Engineering Attack Targeting Vulnerabilities in 1-to-N Avatar Operation Switching: A Positioning Study"],"prefix":"10.1007","author":[{"given":"Itta","family":"Matsuda","sequence":"first","affiliation":[]},{"given":"Sena","family":"Enomoto","sequence":"additional","affiliation":[]},{"given":"Tsubasa","family":"Shibata","sequence":"additional","affiliation":[]},{"given":"Fan","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Seiji","family":"Sato","sequence":"additional","affiliation":[]},{"given":"Tetsushi","family":"Ohki","sequence":"additional","affiliation":[]},{"given":"Masakatsu","family":"Nishigaki","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,11,9]]},"reference":[{"key":"15_CR1","doi-asserted-by":"publisher","unstructured":"Sibilla, F., Mancini, T.: I am (not) my avatar: a review of the user-avatar relationships in massively multiplayer online worlds. Cyberpsychol. J. Psychosoc. Res. Cyberspace 12(3), Article no. 4. (2018). https:\/\/doi.org\/10.5817\/CP2018-3-4","DOI":"10.5817\/CP2018-3-4"},{"key":"15_CR2","unstructured":"Cabinet Office of Japan: Moonshot Goal 1 Realization of a society in which human beings can be free from limitations of body, brain, space, and time by 2050.https:\/\/www8.cao.go.jp\/cstp\/english\/moonshot\/sub1_en.html. Accessed 22 Jan 2025"},{"key":"15_CR3","unstructured":"Linnik, I.: What Is Haptics and Why Should You Pay Close Attention to It? SOFTTECO. https:\/\/softteco.com\/blog\/what-is-haptics. Accessed 12 July 2025"},{"key":"15_CR4","unstructured":"Mizushina, Y., Fernando, C.L., Minamizawa, K., Tachi, S.: Haptic broadcasting, Haptics Neurosci. Dev. Model. Appl., 466\u2013468 (2014)"},{"key":"15_CR5","unstructured":"VRChat: VRChat. https:\/\/hello.vrchat.com\/. Accessed 14 Feb 2025"},{"key":"15_CR6","unstructured":"cluster: cluster, metaverse platform. https:\/\/cluster.mu\/en. 19 Feb 2025"},{"key":"15_CR7","doi-asserted-by":"crossref","unstructured":"Numada, K., Nozaki, S., Takaiwa, T., Ohki, T., Nishigaki, M.: Perceiving human psychological consistency: attack detection against advanced persistent social engineering. In: Proceedings of 2023 International Conference on Emerging Internet, Data & Web Technologies, pp.152\u2013162, February 2024","DOI":"10.1007\/978-3-031-53555-0_15"},{"issue":"2","key":"15_CR8","doi-asserted-by":"publisher","first-page":"550","DOI":"10.1109\/TDSC.2019.2907942","volume":"18","author":"P Casey","year":"2019","unstructured":"Casey, P., Baggili, I., Yarramreddy, A.: Immersive virtual reality attacks and the human joystick. IEEE Trans. Dependable Secure Comput. 18(2), 550\u2013562 (2019)","journal-title":"IEEE Trans. Dependable Secure Comput."},{"key":"15_CR9","doi-asserted-by":"crossref","unstructured":"Hagiwara, T., et al.: Collaborative avatar platform for collective human expertise. In: SA 2021: SIGGRAPH Asia 2021 Emerging Technologies, Article No. 2, pp. 1\u20132 (2021)","DOI":"10.1145\/3476122.3484841"},{"key":"15_CR10","unstructured":"Ogiri, T., et al.: M:N Turing test: advanced persistent social engineering attacks using cybernetic avatars and speech sentence synthesis\/segmentation LLM and its countermeasures. In: 2025 Symposium on Cryptography and Information Security, 4G1\u20131, January 2025. (in Japanese)"},{"key":"15_CR11","doi-asserted-by":"publisher","unstructured":"Miura, R., Kasahara, S., Kitazaki, M., Verhulst, A., Inami, M., Sugimoto, M.: MultiSoma: motor and gaze analysis on distributed embodiment with synchronized behavior and perception. Front. Comput. Sci. 4, Article no. 788014 (2022). https:\/\/doi.org\/10.3389\/fcomp.2022.788014","DOI":"10.3389\/fcomp.2022.788014"},{"key":"15_CR12","doi-asserted-by":"publisher","unstructured":"Kishore, S., Muncunill, X.N., Bourdin, P., Or-Berkers, K., Friedman, D., Slater, M.: Multi-destination beaming: apparently being in three places at once through robotic and virtual embodiment. Front. Robot. AI 3, Article no. 65 (2016). https:\/\/doi.org\/10.3389\/frobt.2016.00065","DOI":"10.3389\/frobt.2016.00065"},{"key":"15_CR13","unstructured":"The Guardian: Company worker in Hong Kong pays out \u00a320m in deepfake video call scam. https:\/\/www.theguardian.com\/world\/2024\/feb\/05\/hong-kong-company-deepfake-video-conference-call-scam. Accessed 12 July 2025"},{"key":"15_CR14","unstructured":"Cialdini, R.B.: Influence: The Psychology of Persuasion, Revised Edition. Harper Business (2006)"},{"key":"15_CR15","doi-asserted-by":"publisher","unstructured":"Lentoor, A.G.: Cognitive and neural mechanisms underlying false memories: misinformation, distortion or erroneous configuration?. AIMS Neurosci. 10(3), 255\u2013268 (2023). https:\/\/doi.org\/10.3934\/Neuroscience.2023020","DOI":"10.3934\/Neuroscience.2023020"},{"key":"15_CR16","doi-asserted-by":"crossref","unstructured":"Tajima, D., Nishida, H., Lopes, P., Kasahara, S.: Whose touch is this? understanding the agency trade-off between user-driven touch and computer-driven touch. ACM Trans. Comput. Hum. Interact. 29(3), Article no. 24 (2022)","DOI":"10.1145\/3489608"},{"key":"15_CR17","doi-asserted-by":"crossref","unstructured":"Kocur, M., Kalus, A., Bogon, J., Henze, N., Wolff, C., Schwind, V.: The rubber hand illusion in virtual reality and the real world - comparable but different. In: VRST 2022: Proceedings of the 28th ACM Symposium on Virtual Reality Software and Technology, Article No. 31, pp. 1\u201312 (2022)","DOI":"10.1145\/3562939.3565614"}],"container-title":["Lecture Notes on Data Engineering and Communications Technologies","Advances on Broad-Band and Wireless Computing, Communication and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-032-10347-5_15","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,8]],"date-time":"2025-11-08T05:22:13Z","timestamp":1762579333000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-032-10347-5_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,11,9]]},"ISBN":["9783032103468","9783032103475"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-032-10347-5_15","relation":{},"ISSN":["2367-4512","2367-4520"],"issn-type":[{"value":"2367-4512","type":"print"},{"value":"2367-4520","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,11,9]]},"assertion":[{"value":"9 November 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"BWCCA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Broadband and Wireless Computing, Communication and Applications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Sharjah","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"United Arab Emirates","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12 November 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14 November 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"bwcca2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/voyager.ce.fit.ac.jp\/conf\/bwcca\/2025\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}