{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,14]],"date-time":"2026-02-14T05:07:09Z","timestamp":1771045629854,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":14,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,9,12]],"date-time":"2024-09-12T00:00:00Z","timestamp":1726099200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Ministry of Culture and Innovation of Hungary","award":["TKP2021-NKTA-51"],"award-info":[{"award-number":["TKP2021-NKTA-51"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,9,12]]},"DOI":"10.1145\/3670243.3670781","type":"proceedings-article","created":{"date-parts":[[2024,8,7]],"date-time":"2024-08-07T11:53:02Z","timestamp":1723031582000},"page":"209-215","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["The relationship between generative artificial intelligence and cybersecurity"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-7308-9304","authenticated-orcid":false,"given":"Peter","family":"Banyasz","sequence":"first","affiliation":[{"name":"Department of Cybersecurity, Ludovika University of Public Service, Hungary"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7191-4924","authenticated-orcid":false,"given":"Tamas","family":"Szadeczky","sequence":"additional","affiliation":[{"name":"Department of Cybersecurity, Ludovika University of Public Service, Hungary"}]},{"ORCID":"https:\/\/orcid.org\/0009-0008-4824-0923","authenticated-orcid":false,"given":"Kincso Boroka","family":"Vaczi","sequence":"additional","affiliation":[{"name":"John Lukacs Institute for Strategy and Politics, Ludovika University of Public Service, Hungary"}]}],"member":"320","published-online":{"date-parts":[[2024,9,12]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Gartner. Retrieved","author":"Jaffri Afraz","year":"2023","unstructured":"Afraz Jaffri. 2023. Hype Cycle for Artificial Intelligence, 2023. Gartner. Retrieved April 22, 2024 from https:\/\/www.gartner.com\/doc\/reprints?id=1-2EIO7DCA&ct=230721&st=sb"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1038\/nature14539"},{"key":"e_1_3_2_1_3_1","volume-title":"What is Artificial Intelligence? (January","author":"McCarthy John","year":"2004","unstructured":"John McCarthy. 2004. What is Artificial Intelligence? (January 2004)."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1177\/0735633116649373"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jbusres.2011.07.001"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSET58993.2023.10346621"},{"key":"e_1_3_2_1_7_1","volume-title":"Retrieved","author":"Silva Patr\u00edcia","year":"2024","unstructured":"Patr\u00edcia Silva and Patr\u00edcia Silva. 1AD. Davis\u2019 Technology Acceptance Model (TAM) (1989). https:\/\/services.igi-global.com\/resolvedoi\/resolve.aspx?doi=10.4018\/978-1-4666-8156-9.ch013. Retrieved April 22, 2024 from https:\/\/www.igi-global.com\/gateway\/chapter\/www.igi-global.com\/gateway\/chapter\/127133"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-68557-1_5"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1287\/mnsc.46.2.186.11926"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.17705\/1jais.00428"},{"key":"e_1_3_2_1_11_1","volume-title":"Datanami. Retrieved","author":"Woodie Alex","year":"2023","unstructured":"Alex Woodie. 2023. Prompt Engineer: The Next Hot Job in AI. Datanami. Retrieved April 16, 2024 from https:\/\/www.datanami.com\/2023\/02\/14\/prompt-engineer-the-next-hot-job-in-ai\/"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-31674-6_8"},{"key":"e_1_3_2_1_13_1","unstructured":"2024. AI Act | Shaping Europe's digital future. Retrieved April 16 2024 from https:\/\/digital-strategy.ec.europa.eu\/en\/policies\/regulatory-framework-ai"},{"key":"e_1_3_2_1_14_1","volume-title":"Technology and Engineering Systems Journal. Retrieved","author":"Technology Acceptance Understanding the usage, Modifications, Limitations","year":"2024","unstructured":"Understanding the usage, Modifications, Limitations and Criticisms of Technology Acceptance Model (TAM). Advances in Science, Technology and Engineering Systems Journal. Retrieved April 22, 2024 from https:\/\/www.astesj.com\/v05\/i06\/p12\/"}],"event":{"name":"CEEeGov 2024: Central and Eastern European eDem and eGov Days 2024","location":"Budapest Hungary","acronym":"CEEeGov 2024"},"container-title":["Proceedings of the Central and Eastern European eDem and eGov Days 2024"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3670243.3670781","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3670243.3670781","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T22:01:33Z","timestamp":1755900093000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3670243.3670781"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,9,12]]},"references-count":14,"alternative-id":["10.1145\/3670243.3670781","10.1145\/3670243"],"URL":"https:\/\/doi.org\/10.1145\/3670243.3670781","relation":{},"subject":[],"published":{"date-parts":[[2024,9,12]]},"assertion":[{"value":"2024-09-12","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}