{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,8]],"date-time":"2026-03-08T03:38:26Z","timestamp":1772941106149,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":16,"publisher":"ACM","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,12,3]]},"DOI":"10.1145\/3773002.3774813","type":"proceedings-article","created":{"date-parts":[[2026,2,20]],"date-time":"2026-02-20T10:43:31Z","timestamp":1771584211000},"page":"181-188","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["The resilience of social media users against Generative AI-based visual manipulation: A survey among Hungarian Facebook users"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-7308-9304","authenticated-orcid":false,"given":"Peter","family":"Banyasz","sequence":"first","affiliation":[{"name":"Department of Cybersecurity and e-Government, Ludovika University of Public Service, Budapest, Hungary"},{"name":"Institute of Cybersecurity, Ludovika University of Public Service, Budapest, Hungary"}]},{"ORCID":"https:\/\/orcid.org\/0009-0008-0827-6091","authenticated-orcid":false,"given":"Laszlo","family":"Gulyas","sequence":"additional","affiliation":[{"name":"Department of Cybersecurity and e-Government, Ludovika University of Public Service, Budapest, Hungary"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7191-4924","authenticated-orcid":false,"given":"Tamas","family":"Szadeczky","sequence":"additional","affiliation":[{"name":"Department of Cybersecurity and e-Government, Ludovika University of Public Service, Budapest, Hungary"}]},{"ORCID":"https:\/\/orcid.org\/0009-0008-4824-0923","authenticated-orcid":false,"given":"Kincso Boroka","family":"Banyasz-Vaczi","sequence":"additional","affiliation":[{"name":"Istvan Nemeskurty Faculty of Teacher Training, Ludovika University of Public Service, Budapest, Hungary"}]}],"member":"320","published-online":{"date-parts":[[2026,2,20]]},"reference":[{"key":"e_1_3_3_1_1_2","doi-asserted-by":"publisher","unstructured":"Ali Al Maqousi and Kashinath Basu. 2025. Cybersecurity in Smart Cities Generative AI as Threat and Solution. Examining Cybersecurity Risks Produced by Generative AI. 10.4018\/979-8-3373-0832-6.ch015","DOI":"10.4018\/979-8-3373-0832-6.ch015"},{"key":"e_1_3_3_1_2_2","doi-asserted-by":"publisher","unstructured":"Ammar Almomani and Mohammad Alauthman. 2025. Examining Cybersecurity Risks Produced by Generative AI. Examining Cybersecurity Risks Produced by Generative AI. 10.4018\/979-8-3373-0832-6","DOI":"10.4018\/979-8-3373-0832-6"},{"key":"e_1_3_3_1_3_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-92605-1_19"},{"key":"e_1_3_3_1_4_2","doi-asserted-by":"publisher","unstructured":"Luigi Coppolino Salvatore D'Antonio Giovanni Mazzeo and Federica Uccello. 2025. The good the bad and the algorithm: The impact of generative AI on cybersecurity. Neurocomputing 623. 10.1016\/j.neucom.2025.129406","DOI":"10.1016\/j.neucom.2025.129406"},{"key":"e_1_3_3_1_5_2","doi-asserted-by":"publisher","unstructured":"Kevin Curran Ethan Curran Joseph Killen and Cormac Duffy. 2024. The role of generative AI in cyber security. Metaverse 5. 10.54517\/m.v5i2.2796","DOI":"10.54517\/m.v5i2.2796"},{"key":"e_1_3_3_1_6_2","doi-asserted-by":"publisher","unstructured":"Kritika 2024. Generative AI for Cybersecurity An Introduction. Generative AI and Implications for Ethics Security and Data Management. 10.4018\/979-8-3693-8557-9.ch009","DOI":"10.4018\/979-8-3693-8557-9.ch009"},{"key":"e_1_3_3_1_7_2","doi-asserted-by":"publisher","unstructured":"Michail Loupasakis Georgios Potamos and Eliana Stavrou. 2024. Revolutionizing Social Engineering Awareness Raising Education and Training: Generative AI-Powered Investigations in the Maritime Domain. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) 14729 LNCS 70\u201383. 10.1007\/978-3-031-61382-1_5","DOI":"10.1007\/978-3-031-61382-1_5"},{"key":"e_1_3_3_1_8_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.chbah.2024.100052"},{"key":"e_1_3_3_1_9_2","doi-asserted-by":"publisher","unstructured":"Hamed Taherdoost. 2025. AI for cyber security and cyber security for AI: Complementary role. Artificial Intelligence for Cyber Security and Industry 4.0. 10.1201\/9781032657264-1","DOI":"10.1201\/9781032657264-1"},{"key":"e_1_3_3_1_10_2","doi-asserted-by":"publisher","unstructured":"T. Venkat Narayana Rao G. Harsh Vardhan A.N. Krishna Sai and Bhavana Sangers. 2024. Future trends and trials in cybersecurity and generative AI. Reshaping CyberSecurity With Generative AI Techniques. 10.4018\/979-8-3693-5415-5.ch013","DOI":"10.4018\/979-8-3693-5415-5.ch013"},{"key":"e_1_3_3_1_11_2","unstructured":"Manas Kumar Yogi Yamuna Mundru Atti Manga Devi Manas Kumar Yogi Yamuna Mundru and Atti Manga Devi. 1 AD. Guardians of the Digital Realm: Generative AI's Role in Cybersecurity. https:\/\/services.igi-global.com\/resolvedoi\/resolve.aspx?doi=10.4018\/979-8-3693-8557-9.ch010. 10.4018\/979-8-3693-8557-9.ch010"},{"key":"e_1_3_3_1_12_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2025.3540075"},{"key":"e_1_3_3_1_13_2","doi-asserted-by":"publisher","unstructured":"Jamal Zraqou Wissam Alkhadour and Jawad Alkhateeb. 2025. Building Resilience Against Cybersecurity Risks of Generative AI. Examining Cybersecurity Risks Produced by Generative AI. 10.4018\/979-8-3373-0832-6.ch022","DOI":"10.4018\/979-8-3373-0832-6.ch022"},{"key":"e_1_3_3_1_14_2","doi-asserted-by":"publisher","DOI":"10.16353\/j.cnki.1000-7490.2024.03.015"},{"key":"e_1_3_3_1_15_2","unstructured":"Phishing Trends Report (Updated for 2025). Retrieved August 7 2025 from https:\/\/hoxhunt.com\/guide\/phishing-trends-report"},{"key":"e_1_3_3_1_16_2","volume-title":"Weaponization of AI-powered Deception Rises | CrowdStrike Holdings","author":"Global Threat CrowdStrike","year":"2025","unstructured":"CrowdStrike Global Threat Report 2025: China's Cyber Espionage Surges 150% with Increasingly Aggressive Tactics, Weaponization of AI-powered Deception Rises | CrowdStrike Holdings, Inc. Retrieved August 7, 2025 from https:\/\/ir.crowdstrike.com\/news-releases\/news-release-details\/2025-crowdstrike-global-threat-report-chinas-cyber-espionage\/"}],"event":{"name":"CEEeGov 2025: Central and Eastern European eDem and eGov Days 2025","location":"Bucharest Romania","acronym":"CEEeGov 2025"},"container-title":["Proceedings of the Central and Eastern European eDem and eGov Days 2025"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3773002.3774813","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,7]],"date-time":"2026-03-07T10:44:54Z","timestamp":1772880294000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3773002.3774813"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,12,3]]},"references-count":16,"alternative-id":["10.1145\/3773002.3774813","10.1145\/3773002"],"URL":"https:\/\/doi.org\/10.1145\/3773002.3774813","relation":{},"subject":[],"published":{"date-parts":[[2025,12,3]]},"assertion":[{"value":"2026-02-20","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}