{"id":"https://openalex.org/W4390509863","doi":"https://doi.org/10.3390/info15010027","title":"Unveiling the Dark Side of ChatGPT: Exploring Cyberattacks and Enhancing User Awareness","display_name":"Unveiling the Dark Side of ChatGPT: Exploring Cyberattacks and Enhancing User Awareness","publication_year":2024,"publication_date":"2024-01-02","ids":{"openalex":"https://openalex.org/W4390509863","doi":"https://doi.org/10.3390/info15010027"},"language":"en","primary_location":{"id":"doi:10.3390/info15010027","is_oa":true,"landing_page_url":"https://doi.org/10.3390/info15010027","pdf_url":"https://www.mdpi.com/2078-2489/15/1/27/pdf?version=1704188513","source":{"id":"https://openalex.org/S4210219776","display_name":"Information","issn_l":"2078-2489","issn":["2078-2489"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Information","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://www.mdpi.com/2078-2489/15/1/27/pdf?version=1704188513","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5053004588","display_name":"Moatsum Alawida","orcid":"https://orcid.org/0000-0001-8146-5843"},"institutions":[{"id":"https://openalex.org/I117222138","display_name":"Abu Dhabi University","ror":"https://ror.org/01r3kjq03","country_code":"AE","type":"education","lineage":["https://openalex.org/I117222138"]}],"countries":["AE"],"is_corresponding":true,"raw_author_name":"Moatsum Alawida","raw_affiliation_strings":["Department of Computer Sciences, Abu Dhabi University, Abu Dhabi 59911, United Arab Emirates"],"affiliations":[{"raw_affiliation_string":"Department of Computer Sciences, Abu Dhabi University, Abu Dhabi 59911, United Arab Emirates","institution_ids":["https://openalex.org/I117222138"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5083704852","display_name":"Bayan Abu Shawar","orcid":"https://orcid.org/0000-0003-3062-4511"},"institutions":[{"id":"https://openalex.org/I161913731","display_name":"Al Ain University","ror":"https://ror.org/023abrt21","country_code":"AE","type":"education","lineage":["https://openalex.org/I161913731"]}],"countries":["AE"],"is_corresponding":false,"raw_author_name":"Bayan Abu Shawar","raw_affiliation_strings":["College of Engineering, Al Ain University, Abu Dhabi 64141, United Arab Emirates"],"affiliations":[{"raw_affiliation_string":"College of Engineering, Al Ain University, Abu Dhabi 64141, United Arab Emirates","institution_ids":["https://openalex.org/I161913731"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5050410057","display_name":"Oludare Isaac Abiodun","orcid":"https://orcid.org/0000-0003-0138-6446"},"institutions":[{"id":"https://openalex.org/I8033065","display_name":"University of Abuja","ror":"https://ror.org/007e69832","country_code":"NG","type":"education","lineage":["https://openalex.org/I8033065"]}],"countries":["NG"],"is_corresponding":false,"raw_author_name":"Oludare Isaac Abiodun","raw_affiliation_strings":["Department of Computer Science, University of Abuja, Gwagwalada 900110, Nigeria"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, University of Abuja, Gwagwalada 900110, Nigeria","institution_ids":["https://openalex.org/I8033065"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5076946666","display_name":"Abid Mehmood","orcid":"https://orcid.org/0000-0002-1468-7259"},"institutions":[{"id":"https://openalex.org/I117222138","display_name":"Abu Dhabi University","ror":"https://ror.org/01r3kjq03","country_code":"AE","type":"education","lineage":["https://openalex.org/I117222138"]}],"countries":["AE"],"is_corresponding":false,"raw_author_name":"Abid Mehmood","raw_affiliation_strings":["Department of Computer Sciences, Abu Dhabi University, Abu Dhabi 59911, United Arab Emirates"],"affiliations":[{"raw_affiliation_string":"Department of Computer Sciences, Abu Dhabi University, Abu Dhabi 59911, United Arab Emirates","institution_ids":["https://openalex.org/I117222138"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5034530048","display_name":"Abiodun Esther Omolara","orcid":"https://orcid.org/0000-0002-7801-2541"},"institutions":[{"id":"https://openalex.org/I8033065","display_name":"University of Abuja","ror":"https://ror.org/007e69832","country_code":"NG","type":"education","lineage":["https://openalex.org/I8033065"]}],"countries":["NG"],"is_corresponding":false,"raw_author_name":"Abiodun Esther Omolara","raw_affiliation_strings":["Department of Computer Science, University of Abuja, Gwagwalada 900110, Nigeria"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, University of Abuja, Gwagwalada 900110, Nigeria","institution_ids":["https://openalex.org/I8033065"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5102833595","display_name":"Ahmad K. Al Hwaitat","orcid":"https://orcid.org/0000-0003-4930-0074"},"institutions":[{"id":"https://openalex.org/I114972647","display_name":"University of Jordan","ror":"https://ror.org/05k89ew48","country_code":"JO","type":"education","lineage":["https://openalex.org/I114972647"]}],"countries":["JO"],"is_corresponding":false,"raw_author_name":"Ahmad K. Al Hwaitat","raw_affiliation_strings":["King Abdullah II School of Information Technology, The University of Jordan, Amman 11942, Jordan"],"affiliations":[{"raw_affiliation_string":"King Abdullah II School of Information Technology, The University of Jordan, Amman 11942, Jordan","institution_ids":["https://openalex.org/I114972647"]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5053004588"],"corresponding_institution_ids":["https://openalex.org/I117222138"],"apc_list":{"value":1400,"currency":"CHF","value_usd":1515},"apc_paid":{"value":1400,"currency":"CHF","value_usd":1515},"fwci":5.1241,"has_fulltext":true,"cited_by_count":44,"citation_normalized_percentile":{"value":0.95671483,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":100},"biblio":{"volume":"15","issue":"1","first_page":"27","last_page":"27"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11636","display_name":"Artificial Intelligence in Healthcare and Education","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/2718","display_name":"Health Informatics"},"field":{"id":"https://openalex.org/fields/27","display_name":"Medicine"},"domain":{"id":"https://openalex.org/domains/4","display_name":"Health Sciences"}},"topics":[{"id":"https://openalex.org/T11636","display_name":"Artificial Intelligence in Healthcare and Education","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/2718","display_name":"Health Informatics"},"field":{"id":"https://openalex.org/fields/27","display_name":"Medicine"},"domain":{"id":"https://openalex.org/domains/4","display_name":"Health Sciences"}},{"id":"https://openalex.org/T10883","display_name":"Ethics and Social Impacts of AI","score":0.991599977016449,"subfield":{"id":"https://openalex.org/subfields/3311","display_name":"Safety Research"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9836000204086304,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6738321185112},{"id":"https://openalex.org/keywords/popularity","display_name":"Popularity","score":0.629252552986145},{"id":"https://openalex.org/keywords/variety","display_name":"Variety (cybernetics)","score":0.618389368057251},{"id":"https://openalex.org/keywords/exploit","display_name":"Exploit","score":0.6017293334007263},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.589480996131897},{"id":"https://openalex.org/keywords/leverage","display_name":"Leverage (statistics)","score":0.558811366558075},{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.418362021446228},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.3917258381843567}],"concepts":[{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6738321185112},{"id":"https://openalex.org/C2780586970","wikidata":"https://www.wikidata.org/wiki/Q1357284","display_name":"Popularity","level":2,"score":0.629252552986145},{"id":"https://openalex.org/C136197465","wikidata":"https://www.wikidata.org/wiki/Q1729295","display_name":"Variety (cybernetics)","level":2,"score":0.618389368057251},{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.6017293334007263},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.589480996131897},{"id":"https://openalex.org/C153083717","wikidata":"https://www.wikidata.org/wiki/Q6535263","display_name":"Leverage (statistics)","level":2,"score":0.558811366558075},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.418362021446228},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.3917258381843567},{"id":"https://openalex.org/C77805123","wikidata":"https://www.wikidata.org/wiki/Q161272","display_name":"Social psychology","level":1,"score":0.0},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.0},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.0},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.3390/info15010027","is_oa":true,"landing_page_url":"https://doi.org/10.3390/info15010027","pdf_url":"https://www.mdpi.com/2078-2489/15/1/27/pdf?version=1704188513","source":{"id":"https://openalex.org/S4210219776","display_name":"Information","issn_l":"2078-2489","issn":["2078-2489"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Information","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:fcc33dd3790f4c7a8470fa880acfc92c","is_oa":true,"landing_page_url":"https://doaj.org/article/fcc33dd3790f4c7a8470fa880acfc92c","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Information, Vol 15, Iss 1, p 27 (2024)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.3390/info15010027","is_oa":true,"landing_page_url":"https://doi.org/10.3390/info15010027","pdf_url":"https://www.mdpi.com/2078-2489/15/1/27/pdf?version=1704188513","source":{"id":"https://openalex.org/S4210219776","display_name":"Information","issn_l":"2078-2489","issn":["2078-2489"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Information","raw_type":"journal-article"},"sustainable_development_goals":[{"score":0.6399999856948853,"display_name":"Industry, innovation and infrastructure","id":"https://metadata.un.org/sdg/9"}],"awards":[],"funders":[],"has_content":{"pdf":true,"grobid_xml":false},"content_urls":{"pdf":"https://content.openalex.org/works/W4390509863.pdf"},"referenced_works_count":57,"referenced_works":["https://openalex.org/W2747680751","https://openalex.org/W2979826702","https://openalex.org/W3103891289","https://openalex.org/W3164972323","https://openalex.org/W3188220908","https://openalex.org/W4225674133","https://openalex.org/W4285101295","https://openalex.org/W4285225959","https://openalex.org/W4292779060","https://openalex.org/W4293176456","https://openalex.org/W4307216913","https://openalex.org/W4319083882","https://openalex.org/W4319662928","https://openalex.org/W4321106177","https://openalex.org/W4321153003","https://openalex.org/W4321368061","https://openalex.org/W4321499561","https://openalex.org/W4322631505","https://openalex.org/W4322719791","https://openalex.org/W4322743583","https://openalex.org/W4323655724","https://openalex.org/W4324093415","https://openalex.org/W4324304837","https://openalex.org/W4324387439","https://openalex.org/W4328053084","https://openalex.org/W4360989593","https://openalex.org/W4362456456","https://openalex.org/W4362601804","https://openalex.org/W4365512576","https://openalex.org/W4367183420","https://openalex.org/W4367595583","https://openalex.org/W4375858605","https://openalex.org/W4375858893","https://openalex.org/W4376866708","https://openalex.org/W4377227441","https://openalex.org/W4379140845","https://openalex.org/W4381435184","https://openalex.org/W4384915621","https://openalex.org/W4385302156","https://openalex.org/W4385878021","https://openalex.org/W4385988359","https://openalex.org/W4386033770","https://openalex.org/W4386119501","https://openalex.org/W4386261125","https://openalex.org/W4386408787","https://openalex.org/W4386524722","https://openalex.org/W4387735186","https://openalex.org/W4388687124","https://openalex.org/W4388996480","https://openalex.org/W6778883912","https://openalex.org/W6786072427","https://openalex.org/W6796159650","https://openalex.org/W6842264631","https://openalex.org/W6846628531","https://openalex.org/W6849998897","https://openalex.org/W6850135255","https://openalex.org/W6858552767"],"related_works":["https://openalex.org/W2368605798","https://openalex.org/W2518037665","https://openalex.org/W17155033","https://openalex.org/W2348524959","https://openalex.org/W3207760230","https://openalex.org/W2906845177","https://openalex.org/W4390723067","https://openalex.org/W4200107511","https://openalex.org/W2891427086","https://openalex.org/W1968625315"],"abstract_inverted_index":{"The":[0,77,97,130],"Chat":[1],"Generative":[2],"Pre-training":[3],"Transformer":[4],"(GPT),":[5],"also":[6,99,189],"known":[7],"as":[8,60],"ChatGPT,":[9],"is":[10],"a":[11,22,54,126,133,210],"powerful":[12],"generative":[13],"AI":[14],"model":[15],"that":[16,47,84,157],"can":[17,139],"simulate":[18],"human-like":[19],"dialogues":[20],"across":[21],"variety":[23,55],"of":[24,33,56,74,82,93,103,106,115,136,153,170,174],"domains.":[25],"However,":[26],"this":[27,175],"popularity":[28],"has":[29],"attracted":[30],"the":[31,45,72,91,101,107,154,168,172,202],"attention":[32],"malicious":[34,68,163],"actors":[35],"who":[36],"exploit":[37],"ChatGPT":[38,52,88,110,138,161,208],"to":[39,50,67,142,182,215],"launch":[40],"cyberattacks.":[41,57,112],"This":[42,165,187],"paper":[43,78,98,203],"examines":[44],"tactics":[46],"adversaries":[48],"use":[49,160],"leverage":[51],"in":[53,71,209],"Attackers":[58],"pose":[59],"regular":[61],"users":[62],"and":[63,89,111,120,146,198,219],"manipulate":[64],"ChatGPT\u2019s":[65],"vulnerability":[66],"interactions,":[69],"particularly":[70],"context":[73],"cyber":[75,158],"assault.":[76],"presents":[79],"illustrative":[80],"examples":[81],"cyberattacks":[83,218],"are":[85],"possible":[86],"with":[87],"discusses":[90],"realm":[92],"ChatGPT-fueled":[94],"cybersecurity":[95],"threats.":[96],"investigates":[100],"extent":[102],"user":[104],"awareness":[105],"relationship":[108],"between":[109],"A":[113],"survey":[114],"253":[116],"participants":[117,155],"was":[118],"conducted,":[119],"their":[121,184],"responses":[122],"were":[123],"measured":[124],"on":[125],"three-point":[127],"Likert":[128],"scale.":[129],"results":[131],"provide":[132],"comprehensive":[134],"understanding":[135],"how":[137],"be":[140],"used":[141],"improve":[143],"business":[144],"processes":[145],"identify":[147],"areas":[148],"for":[149,162,192,206],"improvement.":[150],"Over":[151],"80%":[152],"agreed":[156],"criminals":[159],"purposes.":[164],"finding":[166],"underscores":[167],"importance":[169],"improving":[171,195],"security":[173],"novel":[176],"model.":[177],"Organizations":[178],"must":[179],"take":[180],"steps":[181],"protect":[183],"computational":[185],"infrastructure.":[186],"analysis":[188],"highlights":[190],"opportunities":[191],"streamlining":[193],"processes,":[194],"service":[196],"quality,":[197],"increasing":[199],"efficiency.":[200],"Finally,":[201],"provides":[204],"recommendations":[205],"using":[207],"secure":[211],"manner,":[212],"outlining":[213],"ways":[214],"mitigate":[216],"potential":[217],"strengthen":[220],"defenses":[221],"against":[222],"adversaries.":[223]},"counts_by_year":[{"year":2026,"cited_by_count":7},{"year":2025,"cited_by_count":22},{"year":2024,"cited_by_count":14},{"year":2023,"cited_by_count":1}],"updated_date":"2026-04-04T16:13:02.066488","created_date":"2025-10-10T00:00:00"}
