{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,18]],"date-time":"2026-05-18T10:40:50Z","timestamp":1779100850884,"version":"3.51.4"},"reference-count":31,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,9,17]],"date-time":"2024-09-17T00:00:00Z","timestamp":1726531200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,9,17]],"date-time":"2024-09-17T00:00:00Z","timestamp":1726531200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,9,17]]},"DOI":"10.1109\/mcna63144.2024.10703950","type":"proceedings-article","created":{"date-parts":[[2024,10,9]],"date-time":"2024-10-09T17:45:05Z","timestamp":1728495905000},"page":"64-73","source":"Crossref","is-referenced-by-count":23,"title":["Exploring the Potential Implications of AI-generated Content in Social Engineering Attacks"],"prefix":"10.1109","author":[{"given":"Yazan","family":"Alahmed","sequence":"first","affiliation":[{"name":"Al Ain University,Faculty of Engineering,Abu Dhabi,U.A.E"}]},{"given":"Reema","family":"Abadla","sequence":"additional","affiliation":[{"name":"Al Ain University,Faculty of Engineering,Abu Dhabi,U.A.E"}]},{"given":"Mohammed Jassim Al","family":"Ansari","sequence":"additional","affiliation":[{"name":"University of Central Lancashire Preston,School of Business,UK"}]}],"member":"263","reference":[{"key":"ref1","article-title":"Ai-generated content (aigc): A survey","author":"Wu","year":"2023","journal-title":"arXiv preprint arXiv:2304.06632"},{"issue":"1","key":"ref2","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3372823","article-title":"The ai-based cyber threat landscape: A survey","volume":"53","author":"Kaloudi","year":"2020","journal-title":"ACM Computing Surveys (CSUR)"},{"key":"ref3","article-title":"Unveiling security, privacy, and ethical concerns of chatgpt","author":"Wu","year":"2023","journal-title":"Journal of Information and Intelligence"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ICIS.2015.7166658"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-10-3376-6_6"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2016.06.012"},{"key":"ref7","article-title":"Historical evolution of artificial intelligence","author":"Delipetrev","year":"2020"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2019.12.165"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1080\/23270012.2019.1570365"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.24203\/ajas.v9i2.6589"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/MIS.2006.46"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.14569\/IJACSA.2020.0111103"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-05457-0_4"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ISNCC58260.2023.10323860"},{"key":"ref15","article-title":"A comprehensive survey of ai-generated content (aigc): A history of generative ai from gan to chatgpt","author":"Cao","year":"2023","journal-title":"arXiv preprint arXiv:2303.04226"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.5812\/sdme.67670"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.3109\/13668250.2014.964191"},{"key":"ref18","article-title":"Research reveals a rise in novel social engineering attacks","year":"2023","journal-title":"Digitalisation World"},{"key":"ref19","article-title":"What is Deep Learning?","year":"2023","journal-title":"IBM"},{"key":"ref20","article-title":"World Economic Forum Names Cybercrime and Cyber Insecurity Among Top. 10 Global Risks for 2023","year":"2023","journal-title":"TenableR"},{"key":"ref21","article-title":"What is Social Engineering Attack Techniques & Prevention Methods I Imperva","year":"2019","journal-title":"Learning Center"},{"key":"ref22","article-title":"What are AI Generated Attacks?"},{"key":"ref23","article-title":"Why are Social Engineering Attacks on the Rise? [Infographic]","author":"Merola","year":"2022","journal-title":"Elevate Security"},{"key":"ref24","article-title":"The Tularosa Study: An Experimental Design and Implementation to Quantify the Effectiveness of Cyber Deception","author":"Ferguson-Walter","year":"2018"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/3372823"},{"key":"ref26","article-title":"What is a Social Media Bot? Social Media Bot Definition Cloudflare","journal-title":"Cloudflare"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.15379\/ijmst.v10i3.2953"},{"key":"ref28","first-page":"1","article-title":"How Does ChatGPT Work\u201d Examining Functionality To The Creative AI CHATGPT on X\u2019s (Twitter) Platform","volume-title":"2023 Tenth International Conference on Social Networks Analysis","author":"Alahmed"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/iccns58795.2023.10192993"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/ICCNS58795.2023.10193714"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/acit58888.2023.10453850"}],"event":{"name":"2024 International Conference on Multimedia Computing, Networking and Applications (MCNA)","location":"Valencia, Spain","start":{"date-parts":[[2024,9,17]]},"end":{"date-parts":[[2024,9,20]]}},"container-title":["2024 International Conference on Multimedia Computing, Networking and Applications (MCNA)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10703864\/10703853\/10703950.pdf?arnumber=10703950","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,10,10]],"date-time":"2024-10-10T17:21:18Z","timestamp":1728580878000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10703950\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,9,17]]},"references-count":31,"URL":"https:\/\/doi.org\/10.1109\/mcna63144.2024.10703950","relation":{},"subject":[],"published":{"date-parts":[[2024,9,17]]}}}