{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,25]],"date-time":"2025-10-25T12:57:01Z","timestamp":1761397021759,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":80,"publisher":"Springer Nature Singapore","isbn-type":[{"type":"print","value":"9789819614820"},{"type":"electronic","value":"9789819614837"}],"license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-981-96-1483-7_31","type":"book-chapter","created":{"date-parts":[[2025,2,27]],"date-time":"2025-02-27T19:37:52Z","timestamp":1740685072000},"page":"378-393","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Psychological Profiling in\u00a0Cybersecurity: A Look at\u00a0LLMs and\u00a0Psycholinguistic Features"],"prefix":"10.1007","author":[{"given":"Jean Marie","family":"Tshimula","sequence":"first","affiliation":[]},{"given":"D\u2019Jeff K.","family":"Nkashama","sequence":"additional","affiliation":[]},{"given":"Jean Tshibangu","family":"Muabila","sequence":"additional","affiliation":[]},{"given":"Ren\u00e9 Manass\u00e9","family":"Galekwa","sequence":"additional","affiliation":[]},{"given":"Hugues","family":"Kanda","sequence":"additional","affiliation":[]},{"given":"Maximilien V.","family":"Dialufuma","sequence":"additional","affiliation":[]},{"given":"Mbuyi Mukendi","family":"Didier","sequence":"additional","affiliation":[]},{"given":"Kalala","family":"Kalonji","sequence":"additional","affiliation":[]},{"given":"Serge","family":"Mundele","sequence":"additional","affiliation":[]},{"given":"Patience Kinshie","family":"Lenye","sequence":"additional","affiliation":[]},{"given":"Tighana Wenge","family":"Basele","sequence":"additional","affiliation":[]},{"given":"Aristarque","family":"Ilunga","sequence":"additional","affiliation":[]},{"given":"Christian N.","family":"Mayemba","sequence":"additional","affiliation":[]},{"given":"Nathana\u00ebl M.","family":"Kasoro","sequence":"additional","affiliation":[]},{"given":"Selain K.","family":"Kasereka","sequence":"additional","affiliation":[]},{"given":"Hardy","family":"Mikese","sequence":"additional","affiliation":[]},{"given":"Pierre-Martin","family":"Tardif","sequence":"additional","affiliation":[]},{"given":"Marc","family":"Frappier","sequence":"additional","affiliation":[]},{"given":"Froduald","family":"Kabanza","sequence":"additional","affiliation":[]},{"given":"Shengrui","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Ali Mulenda","family":"Sumbu","sequence":"additional","affiliation":[]},{"given":"Xavier","family":"Ndona","sequence":"additional","affiliation":[]},{"given":"Raoul Kienge-Kienge","family":"Intudi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,2,28]]},"reference":[{"key":"31_CR1","unstructured":"Weimann, G.: Cyberterrorism: how real is the threat? United States Institute of Peace 31 (2004)"},{"key":"31_CR2","doi-asserted-by":"publisher","first-page":"8176","DOI":"10.1016\/j.egyr.2021.08.126","volume":"7","author":"Y Li","year":"2021","unstructured":"Li, Y., Liu, Q.: A comprehensive review study of cyber-attacks and cyber security; Emerging trends and recent developments. Energy Rep. 7, 8176\u20138186 (2021)","journal-title":"Energy Rep."},{"issue":"3","key":"31_CR3","doi-asserted-by":"publisher","first-page":"698","DOI":"10.1057\/s41288-022-00266-6","volume":"47","author":"F Cremer","year":"2022","unstructured":"Cremer, F., et al.: Cyber risk and cybersecurity: a systematic review of data availability. Geneva Papers Risk Insurance-Issues Pract. 47(3), 698\u2013736 (2022)","journal-title":"Geneva Papers Risk Insurance-Issues Pract."},{"key":"31_CR4","unstructured":"McBrayer, J.: Exploiting the digital frontier: hacker typology and motivation. In: The University of Alabama (2014)"},{"key":"31_CR5","doi-asserted-by":"crossref","unstructured":"Kumar, S., Carley, K.M.: Approaches to understanding the motivations behind cyber attacks. In: 2016 IEEE ISI, pp. 307\u2013309. IEEE (2016)","DOI":"10.1109\/ISI.2016.7745496"},{"key":"31_CR6","doi-asserted-by":"crossref","unstructured":"Li, X.: A review of motivations of illegal cyber activities. Kriminologija & socijalna integracija: \u010dasopis za kriminologiju, penologiju i poreme\u0107aje u pona\u0161anju 25(1), 110\u2013126 (2017)","DOI":"10.31299\/ksi.25.1.4"},{"key":"31_CR7","doi-asserted-by":"publisher","DOI":"10.7249\/CT490","volume-title":"Data thieves: The motivations of cyber threat actors and their use and monetization of stolen data","author":"L Ablon","year":"2018","unstructured":"Ablon, L.: Data thieves: The motivations of cyber threat actors and their use and monetization of stolen data. RAND Corporation Santa Monica, CA, USA (2018)"},{"key":"31_CR8","doi-asserted-by":"crossref","unstructured":"Bada, M., Nurse, J.R.C.: The social and psychological impact of cyberattacks. In: Emerging Cyber Threats and Cognitive Vulnerabilities, pp. 73\u201392 (2020)","DOI":"10.1016\/B978-0-12-816203-3.00004-6"},{"issue":"2","key":"31_CR9","first-page":"111","volume":"6","author":"LY Hunter","year":"2021","unstructured":"Hunter, L.Y., Albert, C.D., Garrett, E.: Factors that motivate state-sponsored cyberattacks. Cyber Defense Rev. 6(2), 111\u2013128 (2021)","journal-title":"Cyber Defense Rev."},{"key":"31_CR10","doi-asserted-by":"publisher","DOI":"10.1016\/j.chbr.2022.100167","volume":"5","author":"S Chng","year":"2022","unstructured":"Chng, S., Lu, H.Y., Kumar, A., Yau, D.: Hacker types, motivations and strategies: a comprehensive framework. Comput. Hum. Behav. Rep. 5, 100167 (2022)","journal-title":"Comput. Hum. Behav. Rep."},{"key":"31_CR11","doi-asserted-by":"crossref","unstructured":"Thackray, H., McAlaney, J., Dogan, H., Taylor, J., Richardson, C.: Social psychology: an under-used tool in cybersecurity. In: BCS Human Computer Interaction Conference (2016)","DOI":"10.14236\/ewic\/HCI2016.64"},{"key":"31_CR12","doi-asserted-by":"publisher","first-page":"1381351","DOI":"10.3389\/fcomp.2024.1381351","volume":"6","author":"U Hani","year":"2024","unstructured":"Hani, U., Sohaib, O., Khan, K., Aleidi, A., Islam, N.: Psychological profiling of hackers via machine learning toward sustainable cybersecurity. Front. Comput. Sci. 6, 1381351 (2024)","journal-title":"Front. Comput. Sci."},{"issue":"1","key":"31_CR13","doi-asserted-by":"publisher","first-page":"113","DOI":"10.1080\/09546553.2022.2119848","volume":"36","author":"TJ Holt","year":"2024","unstructured":"Holt, T.J., Chermak, S.M., Freilich, J.D., Turner, N., Greene-Colozzi, E.: Assessing racial and ethnically motivated extremist cyberattacks using open source data. Terrorism Polit. Violence 36(1), 113\u2013126 (2024)","journal-title":"Terrorism Polit. Violence"},{"key":"31_CR14","doi-asserted-by":"publisher","DOI":"10.3389\/fpsyg.2020.01755","volume":"11","author":"R Monta\u00f1ez","year":"2020","unstructured":"Monta\u00f1ez, R., Golob, E., Xu, S.: Human cognition through the lens of social engineering cyberattacks. Front. Psychol. 11, 528099 (2020)","journal-title":"Front. Psychol."},{"issue":"3","key":"31_CR15","doi-asserted-by":"publisher","first-page":"527","DOI":"10.1080\/09546553.2018.1551213","volume":"33","author":"TJ Holt","year":"2021","unstructured":"Holt, T.J., Stonhouse, M., Freilich, J., Chermak, S.M.: Examining ideologically motivated cyberattacks performed by far-left groups. Terrorism Polit. Violence 33(3), 527\u2013548 (2021)","journal-title":"Terrorism Polit. Violence"},{"issue":"3","key":"31_CR16","first-page":"253","volume":"4","author":"R Saroha","year":"2014","unstructured":"Saroha, R.: Profiling a cyber criminal. Int. J. Inf. Comput. Technol. 4(3), 253\u2013258 (2014)","journal-title":"Int. J. Inf. Comput. Technol."},{"key":"31_CR17","unstructured":"Madarie, R.: Hackers\u2019 motivations: testing Schwartz\u2019s theory of motivational types of values in a sample of hackers. Int. J. Cyber Criminol. 11(1), 78\u201397 (2017)"},{"issue":"1","key":"31_CR18","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s42400-020-00050-w","volume":"3","author":"RA Maalem Lahcen","year":"2020","unstructured":"Maalem Lahcen, R.A., Caulkins, B., Mohapatra, R., Kumar, M.: Review and insight on the behavioral aspects of cybersecurity. Cybersecurity 3(1), 1\u201318 (2020). https:\/\/doi.org\/10.1186\/s42400-020-00050-w","journal-title":"Cybersecurity"},{"key":"31_CR19","doi-asserted-by":"crossref","unstructured":"Kipane, A.: Meaning of profiling of cybercriminals in the security context. In: SHS Web of Conferences, vol. 68, p. 01009 (2019). EDP Sciences","DOI":"10.1051\/shsconf\/20196801009"},{"key":"31_CR20","unstructured":"Ke, L., Tong, S., Chen, P., Peng, K.: Exploring the frontiers of LLMS in psychological applications: a comprehensive review. arXiv preprint arXiv:2401.01519 (2024)"},{"key":"31_CR21","unstructured":"Boyd, R.L., Ashokkumar, A., Seraj, S., Pennebaker, J.W.: The development and psychometric properties of LIWC-22. Austin, TX: University of Texas at Austin, pp. 1\u201347 (2022)"},{"issue":"4","key":"31_CR22","doi-asserted-by":"publisher","first-page":"497","DOI":"10.1080\/14640748108400805","volume":"33","author":"M Coltheart","year":"1981","unstructured":"Coltheart, M.: The MRC psycholinguistic database. Q. J. Exp. Psychol. Sect. A 33(4), 497\u2013505 (1981)","journal-title":"Q. J. Exp. Psychol. Sect. A"},{"issue":"4","key":"31_CR23","doi-asserted-by":"publisher","first-page":"215824402110615","DOI":"10.1177\/21582440211061556","volume":"11","author":"A Palassis","year":"2021","unstructured":"Palassis, A., Speelman, C.P., Pooley, J.A.: An exploration of the psychological impact of hacking victimization. SAGE Open 11(4), 21582440211061556 (2021)","journal-title":"SAGE Open"},{"key":"31_CR24","doi-asserted-by":"crossref","unstructured":"Yang, G., Cai, L., Yu, A., Ma, J., Meng, D., Wu, Y.: Potential malicious insiders detection based on a comprehensive security psychological model. In: 2018 IEEE BigDataService, pp. 9\u201316 (2018). IEEE","DOI":"10.1109\/BigDataService.2018.00011"},{"issue":"5","key":"31_CR25","doi-asserted-by":"publisher","first-page":"284","DOI":"10.1080\/00963402.2016.1216502","volume":"72","author":"ML Gross","year":"2016","unstructured":"Gross, M.L., Canetti, D., Vashdi, D.R.: The psychological effects of cyber terrorism. Bull. Atomic Sci. 72(5), 284\u2013291 (2016)","journal-title":"Bull. Atomic Sci."},{"issue":"4","key":"31_CR26","doi-asserted-by":"publisher","first-page":"573","DOI":"10.1177\/0032258X221107584","volume":"96","author":"J Curtis","year":"2023","unstructured":"Curtis, J., Oxburgh, G.: Understanding cybercrime in \u2018real world\u2019 policing and law enforcement. Police J. 96(4), 573\u2013592 (2023)","journal-title":"Police J."},{"issue":"2","key":"31_CR27","first-page":"61","volume":"6","author":"MA Gomez","year":"2018","unstructured":"Gomez, M.A., Villar, E.B.: Fear, uncertainty, and dread: cognitive heuristics and cyber threats. Polit. Gov. 6(2), 61\u201372 (2018)","journal-title":"Polit. Gov."},{"issue":"10","key":"31_CR28","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1145\/3613253","volume":"66","author":"D Geer","year":"2023","unstructured":"Geer, D.: Using psychology to bolster cybersecurity. Commun. ACM 66(10), 15\u201317 (2023)","journal-title":"Commun. ACM"},{"key":"31_CR29","unstructured":"Bolton, A.: Media effects and criminal profiling: how fiction influences perception and profile accuracy. PhD thesis, Nova Southeastern University (2019)"},{"issue":"3","key":"31_CR30","first-page":"239","volume":"2","author":"J Lickiewicz","year":"2011","unstructured":"Lickiewicz, J.: Cyber crime psychology-proposal of an offender psychological profile. Probl. Forensic Sci. 2(3), 239\u2013252 (2011)","journal-title":"Probl. Forensic Sci."},{"key":"31_CR31","doi-asserted-by":"crossref","unstructured":"Jiang, J., et al.: Prediction and detection of malicious insiders\u2019 motivation based on sentiment profile on webpages and emails. In: 2018 IEEE Military Communications Conference, pp. 1\u20136 (2018). IEEE","DOI":"10.1109\/MILCOM.2018.8599790"},{"issue":"5","key":"31_CR32","doi-asserted-by":"publisher","first-page":"24879","DOI":"10.2196\/24879","volume":"23","author":"S Budimir","year":"2021","unstructured":"Budimir, S., Fontaine, J.R.J., Huijts, N.M.A., Haans, A., Loukas, G., Roesch, E.B.: Emotional reactions to cybersecurity breach situations: scenario-based survey study. J. Med. Internet Res. 23(5), 24879 (2021)","journal-title":"J. Med. Internet Res."},{"key":"31_CR33","doi-asserted-by":"crossref","unstructured":"Bada, M., Nurse, J.R.C.: Profiling the cybercriminal: a systematic review of research. In: 2021 International Conference on Cyber Situational Awareness, Data Analytics and Assessment, pp. 1\u20138 (2021)","DOI":"10.1109\/CyberSA52016.2021.9478246"},{"key":"31_CR34","doi-asserted-by":"crossref","unstructured":"Gaia, J., et al.: Psychological profiling of hacking potential. In: Proceedings of the 53rd Hawaii International Conference on System Sciences (2020)","DOI":"10.24251\/HICSS.2020.273"},{"key":"31_CR35","volume":"75","author":"P Zambrano","year":"2023","unstructured":"Zambrano, P., Torres, J., Tello-Oquendo, L., Y\u00e1nez, \u00c1., Vel\u00e1squez, L.: On the modeling of cyber-attacks associated with social engineering: a parental control prototype. J. Inf. Secur. Appl. 75, 103501 (2023)","journal-title":"J. Inf. Secur. Appl."},{"key":"31_CR36","doi-asserted-by":"crossref","unstructured":"Kioskli, K., Polemi, N.: Estimating attackers\u2019 profiles results in more realistic vulnerability severity scores. In: 13th International Conference on AHFE (2022)","DOI":"10.54941\/ahfe1002211"},{"key":"31_CR37","doi-asserted-by":"crossref","unstructured":"Halevi, T., et al.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318\u2013324 (2016)","DOI":"10.1145\/3011141.3011165"},{"key":"31_CR38","doi-asserted-by":"crossref","unstructured":"Odemis, M., Yucel, C., Koltuksuz, A., et al.: Detecting user behavior in cyber threat intelligence: development of Honeypsy system. Secur. Commun. Netw. 2022 (2022)","DOI":"10.1155\/2022\/7620125"},{"key":"31_CR39","unstructured":"Petrov, N.B., Serapio-Garc\u00eda, G., Rentfrow, J.: Limited ability of LLMs to simulate human psychological behaviours: a psychometric analysis. arXiv preprint arXiv:2405.07248 (2024)"},{"key":"31_CR40","doi-asserted-by":"crossref","unstructured":"Pellert, M., Lechner, C.M., Wagner, C., Rammstedt, B., Strohmaier, M.: AI psychometrics: Assessing the psychological profiles of large language models through psychometric inventories. Perspect. Psychol. Sci., 19, 17456916231214460 (2023)","DOI":"10.31234\/osf.io\/jv5dt"},{"key":"31_CR41","unstructured":"Sorokovikova, A., Fedorova, N., Rezagholi, S., Yamshchikov, I.P.: LLMs simulate big five personality traits: further evidence. arXiv preprint arXiv:2402.01765 (2024)"},{"key":"31_CR42","unstructured":"Safdari, M., et al.: Personality traits in large language models. arXiv preprint arXiv:2307.00184 (2023)"},{"key":"31_CR43","unstructured":"Huang, J., et al.: On the humanity of conversational AI: evaluating the psychological portrayal of LLMs. In: ICLR (2023)"},{"key":"31_CR44","unstructured":"Frisch, I., Giulianelli, M.: LLM agents in interaction: Measuring personality consistency and linguistic alignment in interacting populations of large language models. arXiv preprint arXiv:2402.02896 (2024)"},{"key":"31_CR45","volume":"57","author":"MM Yamin","year":"2021","unstructured":"Yamin, M.M., Ullah, M., Ullah, H., Katt, B.: Weaponized AI for cyber attacks. J. Inf. Secur. Appl. 57, 102722 (2021)","journal-title":"J. Inf. Secur. Appl."},{"key":"31_CR46","doi-asserted-by":"crossref","unstructured":"Motlagh, F.N., Hajizadeh, M., Majd, M., Najafi, P., Cheng, F., Meinel, C.: Large language models in cybersecurity: state-of-the-art. arXiv preprint arXiv:2402.00891 (2024)","DOI":"10.5220\/0013377600003899"},{"key":"31_CR47","unstructured":"Beckerich, M., Plein, L., Coronado, S.: RatGPT: turning online LLMs into proxies for malware attacks. arXiv preprint arXiv:2308.09183 (2023)"},{"key":"31_CR48","doi-asserted-by":"crossref","unstructured":"Schmitt, M., Flechais, I.: Digital deception: generative artificial intelligence in social engineering and phishing. arXiv preprint arXiv:2310.13715 (2023)","DOI":"10.2139\/ssrn.4602790"},{"key":"31_CR49","doi-asserted-by":"crossref","unstructured":"Zhang, Z., et al.: Psysafe: A comprehensive framework for psychological-based attack, defense, and evaluation of multi-agent system safety. arXiv preprint arXiv:2401.11880 (2024)","DOI":"10.18653\/v1\/2024.acl-long.812"},{"key":"31_CR50","unstructured":"Minaee, S., et al.: Large language models: a survey. arXiv preprint arXiv:2402.06196 (2024)"},{"key":"31_CR51","doi-asserted-by":"crossref","unstructured":"Abdurahman, S., Ziabari, A.S., Moore, A., Bartels, D., Dehghani, M.: Evaluating large language models in psychological research: a guide for reviewers (2024)","DOI":"10.31234\/osf.io\/ag7hy"},{"key":"31_CR52","unstructured":"Lai, T., et al.: PSY-LLM: scaling up global mental health psychological services with AI-based large language models. arXiv preprint arXiv:2307.11991 (2023)"},{"key":"31_CR53","unstructured":"Chung, N.C., Dyer, G., Brocki, L.: Challenges of large language models for mental health counseling. arXiv preprint arXiv:2311.13857 (2023)"},{"key":"31_CR54","unstructured":"Hagendorff, T.: Machine psychology: investigating emergent capabilities and behavior in large language models using psychological methods. arXiv preprint arXiv:2303.13988 (2023)"},{"key":"31_CR55","unstructured":"Sharma, A., Rao, S., Brockett, C., Malhotra, A., Jojic, N., Dolan, W.B.: Investigating agency of LLMs in human-AI collaboration tasks. In: Proc. of the 18th Conference of the European Chapter of the Association for Computational Linguistics (Volume 1: Long Papers), pp. 1968\u20131987 (2024)"},{"key":"31_CR56","unstructured":"Song, X., et al.: Identifying multiple personalities in large language models with external evaluation. arXiv preprint arXiv:2402.14805 (2024)"},{"key":"31_CR57","doi-asserted-by":"crossref","unstructured":"Gupta, M., Akiri, C., Aryal, K., Parker, E., Praharaj, L.: From ChatGPT to ThreatGPT: Impact of generative AI in cybersecurity and privacy. IEEE Access 11, 80218\u201380245 (2023)","DOI":"10.1109\/ACCESS.2023.3300381"},{"key":"31_CR58","doi-asserted-by":"crossref","unstructured":"Yao, Y., Duan, J., Xu, K., Cai, Y., Sun, Z., Zhang, Y.: A survey on large language model (LLM) security and privacy: the good, the bad, and the ugly. High-Confidence Comput. 4, 100211 (2024)","DOI":"10.1016\/j.hcc.2024.100211"},{"key":"31_CR59","unstructured":"Wu, F., Liu, X., Xiao, C.: DeceptPrompt: exploiting LLM-driven code generation via adversarial natural language instructions. arXiv preprint arXiv:2312.04730 (2023)"},{"key":"31_CR60","unstructured":"Xu, J., et al.: AutoAttacker: a large language model guided system to implement automatic cyber-attacks. arXiv preprint arXiv:2403.01038 (2024)"},{"key":"31_CR61","unstructured":"Liu, Y., et al.: Prompt injection attack against LLM-integrated applications. arXiv preprint arXiv:2306.05499 (2023)"},{"key":"31_CR62","doi-asserted-by":"crossref","unstructured":"Piet, J., et al.: Jatmo: prompt injection defense by task-specific finetuning. arXiv preprint arXiv:2312.17673 (2023)","DOI":"10.1007\/978-3-031-70879-4_6"},{"key":"31_CR63","unstructured":"Bethany, M., Galiopoulos, A., Bethany, E., Karkevandi, M.B., Vishwamitra, N., Najafirad, P.: Large language model lateral spear phishing: a comparative study in large-scale organizational settings. arXiv preprint arXiv:2401.09727 (2024)"},{"key":"31_CR64","doi-asserted-by":"publisher","DOI":"10.1016\/j.nlp.2024.100057","volume":"6","author":"SA Prome","year":"2024","unstructured":"Prome, S.A., Ragavan, N.A., Islam, M.R., Asirvatham, D., Jegathesan, A.J.: Deception detection using ML and DL techniques: a systematic review. Nat. Lang. Process. J. 6, 100057 (2024)","journal-title":"Nat. Lang. Process. J."},{"issue":"11","key":"31_CR65","doi-asserted-by":"publisher","first-page":"280","DOI":"10.3390\/info9110280","volume":"9","author":"A Deb","year":"2018","unstructured":"Deb, A., Lerman, K., Ferrara, E.: Predicting cyber-events by leveraging hacker sentiment. Information 9(11), 280 (2018)","journal-title":"Information"},{"issue":"5","key":"31_CR66","doi-asserted-by":"publisher","DOI":"10.1016\/j.ipm.2022.103012","volume":"59","author":"J Uyheng","year":"2022","unstructured":"Uyheng, J., Moffitt, J.D., Carley, K.M.: The language and targets of online trolling: a psycholinguistic approach for social cybersecurity. Inf. Process. Manag. 59(5), 103012 (2022)","journal-title":"Inf. Process. Manag."},{"issue":"1","key":"31_CR67","doi-asserted-by":"publisher","first-page":"199","DOI":"10.31470\/2309-1797-2019-26-1-199-215","volume":"26","author":"Y Krylova-Grek","year":"2019","unstructured":"Krylova-Grek, Y.: Psycholinguistic aspects of humanitarian component of cybersecurity. Psycholinguistics 26(1), 199\u2013215 (2019)","journal-title":"Psycholinguistics"},{"issue":"2","key":"31_CR68","doi-asserted-by":"publisher","first-page":"199","DOI":"10.1108\/ICS-11-2021-0185","volume":"31","author":"T Xu","year":"2023","unstructured":"Xu, T., Rajivan, P.: Determining psycholinguistic features of deception in phishing messages. Inf. Comput. Secur. 31(2), 199\u2013220 (2023)","journal-title":"Inf. Comput. Secur."},{"key":"31_CR69","doi-asserted-by":"crossref","unstructured":"Rogers, M.K., Seigfried, K., Tidke, K.A.: Self-reported computer criminal behavior: psychological analysis. Digit. Invest. 3, 116\u2013120 (2006)","DOI":"10.1016\/j.diin.2006.06.002"},{"issue":"1","key":"31_CR70","doi-asserted-by":"publisher","first-page":"24","DOI":"10.1177\/0261927X09351676","volume":"29","author":"YR Tausczik","year":"2010","unstructured":"Tausczik, Y.R., Pennebaker, J.W.: The psychological meaning of words: LIWC and computerized text analysis methods. J. Lang. Soc. Psychol. 29(1), 24\u201354 (2010)","journal-title":"J. Lang. Soc. Psychol."},{"issue":"4","key":"31_CR71","doi-asserted-by":"publisher","first-page":"475","DOI":"10.1037\/ppm0000247","volume":"9","author":"AT Shappie","year":"2020","unstructured":"Shappie, A.T., Dawson, C.A., Debb, S.M.: Personality as a predictor of cybersecurity behavior. Psychol. Popular Media 9(4), 475 (2020)","journal-title":"Psychol. Popular Media"},{"key":"31_CR72","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2022.107576","volume":"140","author":"MW Kranenbarg","year":"2023","unstructured":"Kranenbarg, M.W., Van Gelder, J.-L., Barends, A.J., Vries, R.E.: Is there a cybercriminal personality? Comparing cyber offenders and offline offenders on hexaco personality domains and their underlying facets. Comput. Hum. Behav. 140, 107576 (2023)","journal-title":"Comput. Hum. Behav."},{"key":"31_CR73","doi-asserted-by":"crossref","unstructured":"Guo, Z., Wang, P., Cho, J.-H., Huang, L.: Text mining-based social-psychological vulnerability analysis of potential victims to cybergrooming: insights and lessons learned. In: Companion Proceedings of the ACM Web Conference 2023, pp. 1381\u20131388 (2023)","DOI":"10.1145\/3543873.3587636"},{"issue":"1","key":"31_CR74","first-page":"52","volume":"7","author":"S-S Tan","year":"2019","unstructured":"Tan, S.-S., Na, J., Duraisamy, S.: Unified psycholinguistic framework: an unobtrusive psychological analysis approach towards insider threat prevention and detection. J. Inf. Sci. Theory Pract. 7(1), 52\u201371 (2019)","journal-title":"J. Inf. Sci. Theory Pract."},{"issue":"2","key":"31_CR75","first-page":"213","volume":"20","author":"J Parapar","year":"2014","unstructured":"Parapar, J., Losada, D.E., Barreiro, A.: Combining psycho-linguistic, content-based and chat-based features to detect predation in chatrooms. J. Univers. Comput. Sci. 20(2), 213\u2013239 (2014)","journal-title":"J. Univers. Comput. Sci."},{"key":"31_CR76","unstructured":"Chatterjee, A., Basu, S.: How vulnerable are you? A novel computational psycholinguistic analysis for phishing influence detection. In: Proceedings of the 18th International Conference on Natural Language Processing, pp. 499\u2013507 (2021)"},{"key":"31_CR77","doi-asserted-by":"crossref","unstructured":"Sapienza, A., Bessi, A., Damodaran, S., Shakarian, P., Lerman, K., Ferrara, E.: Early warnings of cyber threats in online discussions. In: 2017 IEEE International Conference on Data Mining Workshops (ICDMW), pp. 667\u2013674. IEEE (2017)","DOI":"10.1109\/ICDMW.2017.94"},{"issue":"11","key":"31_CR78","first-page":"15","volume":"8","author":"UP Liyanage","year":"2023","unstructured":"Liyanage, U.P., Ranaweera, N.D.: Ethical considerations and potential risks in the deployment of large language models in diverse societal contexts. J. Comput. Soc. Dyn. 8(11), 15\u201325 (2023)","journal-title":"J. Comput. Soc. Dyn."},{"issue":"1","key":"31_CR79","doi-asserted-by":"publisher","first-page":"205395172090438","DOI":"10.1177\/2053951720904386","volume":"7","author":"A McStay","year":"2020","unstructured":"McStay, A.: Emotional AI, soft biometrics and the surveillance of emotional life: an unusual consensus on privacy. Big Data Soc. 7(1), 2053951720904386 (2020)","journal-title":"Big Data Soc."},{"issue":"3","key":"31_CR80","doi-asserted-by":"publisher","first-page":"181","DOI":"10.1080\/10508422.2020.1817026","volume":"31","author":"MN Fleming","year":"2021","unstructured":"Fleming, M.N.: Considerations for the ethical implementation of psychological assessment through social media via machine learning. Ethics Behav. 31(3), 181\u2013192 (2021)","journal-title":"Ethics Behav."}],"container-title":["Lecture Notes in Computer Science","Web Information Systems Engineering \u2013 WISE 2024 PhD Symposium, Demos and Workshops"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-96-1483-7_31","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,27]],"date-time":"2025-02-27T19:38:19Z","timestamp":1740685099000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-96-1483-7_31"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"ISBN":["9789819614820","9789819614837"],"references-count":80,"URL":"https:\/\/doi.org\/10.1007\/978-981-96-1483-7_31","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"28 February 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"WISE","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Web Information Systems Engineering","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Doha","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Qatar","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2 December 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5 December 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"25","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"wise2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/wise2024-qatar.com\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}