<?xml version="1.0" encoding="UTF-8"?>
<TEI xml:space="preserve" xmlns="http://www.tei-c.org/ns/1.0" 
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" 
xsi:schemaLocation="http://www.tei-c.org/ns/1.0 https://raw.githubusercontent.com/kermitt2/grobid/master/grobid-home/schemas/xsd/Grobid.xsd"
 xmlns:xlink="http://www.w3.org/1999/xlink">
	<teiHeader xml:lang="en">
		<fileDesc>
			<titleStmt>
				<title level="a" type="main">Supporting the Design of Phishing Education, Training and Awareness interventions: an LLM-based approach</title>
			</titleStmt>
			<publicationStmt>
				<publisher/>
				<availability status="unknown"><licence/></availability>
			</publicationStmt>
			<sourceDesc>
				<biblStruct>
					<analytic>
						<author>
							<persName><forename type="first">Francesco</forename><surname>Greco</surname></persName>
							<affiliation key="aff0">
								<orgName type="institution">University of Bari &quot;A. Moro&quot;</orgName>
								<address>
									<settlement>Bari</settlement>
									<country key="IT">Italy</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Giuseppe</forename><surname>Desolda</surname></persName>
							<affiliation key="aff0">
								<orgName type="institution">University of Bari &quot;A. Moro&quot;</orgName>
								<address>
									<settlement>Bari</settlement>
									<country key="IT">Italy</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Luca</forename><surname>Viganò</surname></persName>
							<affiliation key="aff1">
								<orgName type="institution">King&apos;s College London</orgName>
								<address>
									<settlement>London</settlement>
									<country key="GB">U.K</country>
								</address>
							</affiliation>
						</author>
						<title level="a" type="main">Supporting the Design of Phishing Education, Training and Awareness interventions: an LLM-based approach</title>
					</analytic>
					<monogr>
						<idno type="ISSN">1613-0073</idno>
					</monogr>
					<idno type="MD5">1593DBA4EC5E55AAABB8D1C5A386AC50</idno>
				</biblStruct>
			</sourceDesc>
		</fileDesc>
		<encodingDesc>
			<appInfo>
				<application version="0.7.2" ident="GROBID" when="2025-04-23T16:29+0000">
					<desc>GROBID - A machine learning software for extracting information from scholarly documents</desc>
					<ref target="https://github.com/kermitt2/grobid"/>
				</application>
			</appInfo>
		</encodingDesc>
		<profileDesc>
			<textClass>
				<keywords>
					<term>phishing education</term>
					<term>large language models</term>
					<term>warnings</term>
					<term>training</term>
					<term>simulated campaigns 1</term>
				</keywords>
			</textClass>
			<abstract>
<div xmlns="http://www.tei-c.org/ns/1.0"><p>Phishing remains one of the most effective cyber threats in our digital world, affecting millions of organizations. Phishing education, training, and awareness programs are used to address employees' lack of knowledge about phishing attacks. However, despite being very expensive, these interventions are not always effective, mainly due to the lack of customization of training materials based on the employees' needs and profiles. In fact, creating customized training content for each employee and each context would require a huge effort from security practitioners and educators thus increasing costs even more. The proposal we present in this paper is to use Large Language Models to automate some steps in the design process of training content, which is tailored to the specific user profile.</p></div>
			</abstract>
		</profileDesc>
	</teiHeader>
	<text xml:lang="en">
		<body>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="1.">Introduction</head><p>Phishing is currently one of the most significant cyber-threats, causing substantial losses for companies each year on a global scale <ref type="bibr" target="#b24">[25]</ref>. Despite the technological solutions that exist to mitigate phishing attacks <ref type="bibr" target="#b1">[2,</ref><ref type="bibr" target="#b28">29]</ref>, criminals are able to succeed due to the exploitation of vulnerabilities that originate from various human factors <ref type="bibr" target="#b15">[16]</ref>. Among the primary human factors that can increase a user's susceptibility to phishing, Lack of Knowledge and Lack of Resources are of particular importance. The former refers to users missing specific knowledge and experience to correctly deal with phishing attacks <ref type="bibr" target="#b17">[18]</ref>, while the latter refers to the lack of educative resources that can effectively help users recognize phishing attacks <ref type="bibr" target="#b15">[16]</ref>. Despite the users being often considered the "weakest link" in the cybersecurity of an organization <ref type="bibr" target="#b40">[41]</ref>, improving their awareness level can lead to making the employees one of the most valuable defensive assets of an organization <ref type="bibr" target="#b35">[36]</ref>.</p><p>Consequently, companies invest considerable resources <ref type="bibr" target="#b6">[7]</ref> in increasing employee awareness and educating them with Phishing Education, Training, and Awareness (PETA)</p><p>2nd International Workshop on CyberSecurity Education for Industry and Academia (CSE4IA 2024) * Corresponding author.</p><p>francesco.greco@uniba.it (F. Greco); giuseppe.desolda@uniba.it (G. Desolda); luca.vigano@kcl.ac.uk (L. <ref type="bibr">Viganò)</ref> 0000-0003-2730-7697 (F. Greco); 0000-0001-9894-2116 (G. Desolda); 0000-0001-9916-271X (L. <ref type="bibr">Viganò)</ref> programs <ref type="bibr" target="#b39">[40]</ref>. However, despite the general agreement among researchers on the usefulness of anti-phishing training <ref type="bibr" target="#b25">[26]</ref>, its effectiveness can vary considerably <ref type="bibr" target="#b35">[36]</ref>. This may be attributed to human factors such as age, gender, technical expertise, and personal traits <ref type="bibr" target="#b25">[26]</ref>. To address the ineffectiveness of phishing training and education due to the employees' individual differences, a viable solution would be to provide them with customized training material <ref type="bibr" target="#b16">[17,</ref><ref type="bibr" target="#b30">31,</ref><ref type="bibr" target="#b49">50]</ref>. Furthermore, training material should be highly engaging and interesting for employees <ref type="bibr" target="#b16">[17,</ref><ref type="bibr" target="#b49">50]</ref>, while also being easy and fast to consume. This is because users generally can dedicate little time to security aspects during their work hours <ref type="bibr" target="#b34">[35]</ref>. Improving the relevance and quality of training material can indeed result in more effective phishing training programs <ref type="bibr" target="#b8">[9]</ref>. This is likely to have the additional benefit of reducing the likelihood of users circumventing the educational process (e.g., by ignoring the training material altogether, or attempting to cheat in assessment quizzes). However, the design and implementation of PETA material is not a trivial process and requires significant effort and human resources <ref type="bibr" target="#b2">[3]</ref>. Typically, simulated phishing campaigns are employed to administer embedded training material <ref type="bibr" target="#b8">[9,</ref><ref type="bibr" target="#b32">33,</ref><ref type="bibr" target="#b35">36,</ref><ref type="bibr" target="#b50">51]</ref>. Although training campaigns are one of the most commonly used approaches, they are very expensive to conduct, and may even result in an increase in phishing susceptibility of some employees <ref type="bibr" target="#b35">[36]</ref> or in a reduction in their click rate on legitimate links, potentially affecting their productivity <ref type="bibr" target="#b41">[42]</ref>. In light of these problems, we deem it necessary to find a solution to address the lack of effective and affordable PETA resources.</p><p>This study presents ongoing research aimed at supporting the lightweight creation of effective PETA resources. The effectiveness of the resources will be achieved by tailoring each resource to the specific user, considering their profile created using ad hoc vulnerability assessment techniques (e.g. questionnaire). In this way, each user will be exposed to short, targeted, and relevant resources that they are more likely to accept than the traditional long and generic alternatives used today. The creation of these resources will also be facilitated by the use of LLMs, which, taking into account the user profile and the type of resource to which the user should be exposed (e.g., podcast, document, alert, etc.), will produce PETA resources tailored to the users, covering only their weakness, without exposing the user to aspects in which they are already confident.</p><p>This work establishes a first basis for a significant contribution to the broader Italian national project DAMOCLES (Detection And Mitigation Of Cyber attacks that expLoit human vulnerabilitiES), which aims to develop a framework for the Italian Public Administration to assess human factors in cyber incidents and mitigate their impact through security awareness and customized user training. This latter point can indeed be addressed by using technologies like LLMs to support the creation of training material tailored to the individual weaknesses assessed.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.">Related work 2.1. Phishing Education, Training, and Awareness (PETA)</head><p>The term "PETA" (Phishing Education, Training, and Awareness) was recently brought up by Sarker et al. <ref type="bibr" target="#b39">[40]</ref> to refer to Security Education, Training, and Awareness (SETA) interventions <ref type="bibr" target="#b22">[23]</ref> in the domain of phishing. Katsikas et al. <ref type="bibr" target="#b27">[28]</ref> define awareness, training, and education as distinct concepts that together accomplish learning, starting with awareness and culminating in education. However, these terms are often used interchangeably in the literature <ref type="bibr" target="#b22">[23]</ref>. Therefore, PETA is a broad concept that encompasses any type of intervention designed to enhance users' awareness and skills, including formal learning (courses, seminars, etc.), simulated phishing campaigns, quizzes, serious games, and anti-phishing warnings.</p><p>Simulated phishing campaigns aim to mimic real-world phishing attacks. They are typically part of a dedicated security awareness training program. These campaigns generate simulated phishing emails that closely resemble actual phishing attempts. Employees receive these emails to test their vigilance and response. Generally, embedded training is employed in conjunction with simulated phishing campaigns to present employees with landing pages that include educational material immediately after they click on a fake phishing link.</p><p>Anti-phishing warnings can constitute a valid intervention for increasing phishing awareness of users. These tools are employed to alert users about potential threats by blocking access to malicious websites <ref type="bibr" target="#b0">[1]</ref> or emails <ref type="bibr" target="#b7">[8]</ref> and are typically found in browsers (e.g., Google Chrome) or in email clients (e.g., Gmail).</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.2.">Limitations of current PETA interventions</head><p>A review of the literature conducted by Sarker et al. <ref type="bibr" target="#b39">[40]</ref> reveals a number of issues with current PETA material. These include challenges in designing, implementing, and evaluating PETA interventions.</p><p>One prominent challenge is the lack of customization of training content <ref type="bibr" target="#b45">[46]</ref>. This can lead to employees often being disengaged and uninterested in the training material <ref type="bibr" target="#b4">[5,</ref><ref type="bibr" target="#b49">50]</ref>. Additionally, poorly customized training content can result in being repetitive <ref type="bibr" target="#b8">[9]</ref>, culturally biased <ref type="bibr" target="#b16">[17]</ref>, or time-consuming <ref type="bibr" target="#b8">[9,</ref><ref type="bibr" target="#b33">34]</ref> for employees. A noteworthy example is Anti-Phishing Phil <ref type="bibr" target="#b42">[43]</ref>, a serious game for phishing education in which the user is asked to examine URLs to determine if they are associated with malicious or legitimate websites. One of the primary issues with the game was that a significant number of the presented websites were associated with American companies and thus unfamiliar to users outside of the United States. This resulted in some participants in the original study experiencing difficulty in determining if some URLs were legitimate or not. It is similarly important for training material to include different attack scenarios, in order to improve the users' ability to detect a wider spectrum of phishing attacks <ref type="bibr" target="#b31">[32,</ref><ref type="bibr" target="#b49">50]</ref>. Therefore, training material that addresses only, e.g., how to spot phishing URLs will not adequately teach users to defend against more advanced techniques such as spear phishing or persuasion cues <ref type="bibr" target="#b9">[10]</ref>.</p><p>Another critical issue is related to the warnings employed for the protection of users from phishing attacks. These warnings are generally ill-positioned <ref type="bibr" target="#b8">[9,</ref><ref type="bibr" target="#b33">34,</ref><ref type="bibr" target="#b51">52]</ref>, passive (i.e., do not block the user interaction flow) <ref type="bibr" target="#b18">[19]</ref>, and lead to users becoming habituated <ref type="bibr" target="#b0">[1,</ref><ref type="bibr" target="#b3">4,</ref><ref type="bibr" target="#b29">30]</ref>. Moreover, the content of warnings usually lacks explanations <ref type="bibr" target="#b2">[3,</ref><ref type="bibr" target="#b5">6]</ref>, which can result in users not trusting the system and being less motivated to adopt safe behaviors <ref type="bibr" target="#b5">[6,</ref><ref type="bibr" target="#b7">8,</ref><ref type="bibr" target="#b47">48]</ref>.</p><p>Finally, PETA programs tend to be highly expensive in terms of both economic and human resources <ref type="bibr" target="#b6">[7,</ref><ref type="bibr" target="#b45">46]</ref>. Furthermore, the deployment of embedded training requires a significant amount of manual human effort for the production of fake phishing emails, their evaluation, the management of related tickets, the setting up of firewall rules, and so forth <ref type="bibr" target="#b2">[3,</ref><ref type="bibr" target="#b6">7]</ref>. This can result in the training material, such as anti-phishing recommendations, being outdated or incomplete <ref type="bibr" target="#b37">[38]</ref>; it is instead crucial to include recent cyber-attacks and detailed information about how attackers operate and the types of tactics they use <ref type="bibr" target="#b44">[45]</ref>.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.3.">LLMs and education</head><p>Large Language Models (LLM) are gaining traction in the field of education because of their ability to provide tailored feedback and suggestions, saving teachers time and effort in creating personalized materials and tailored feedback <ref type="bibr" target="#b26">[27]</ref>. There are some attempts in the literature to use LLMs in fields as diverse as physics education <ref type="bibr" target="#b52">[53]</ref> and medical education <ref type="bibr" target="#b38">[39]</ref>. Common use cases involve support to educators in assessing and grading written tests, providing feedback to students, and generating educational content <ref type="bibr" target="#b53">[54]</ref>.</p><p>The use of LLMs in education is not without challenges <ref type="bibr" target="#b48">[49]</ref>. There are many valid criticisms of these tools; one of the main problems is that they generate responses by predicting the most likely next word without any grasping of the semantical level; their stochastic nature makes the models possibly "hallucinate", producing seemingly confident responses that are not factual, in part due to incomplete or biased training data.</p><p>Nonetheless, LLMs are undeniably performant also on human tasks <ref type="bibr" target="#b23">[24]</ref>. For example, medical students use these tools to explain complicated medical concepts in simple terms, generate self-study questions, and create preliminary diagnoses and possible treatment plans <ref type="bibr" target="#b39">[40]</ref>.</p><p>Therefore, although the issue of hallucinations remains challenging to address, the proposal presented in this paper may still prove viable. Moreover, hallucinations can be limited by designing prompts that follow the established guidelines and best practices <ref type="bibr" target="#b13">[14,</ref><ref type="bibr" target="#b43">44]</ref>. For example, approaches like "chain-of-thought" have proved to help LLMs produce more grounded outputs <ref type="bibr" target="#b12">[13]</ref>.</p><p>The current limitations and future prospects of LLMs in education will constitute a valuable source of discussion during the workshop.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.">An LLM-based approach to mitigate challenges in PETA</head><p>To address some of the key challenges in producing quality PETA material, i.e., high costs, lack of customization, and ineffective warnings, we propose an approach that leverages LLMs to help security practitioners and educators automate some tasks in the design process.</p><p>Automating the creation of training materials has already been indicated as being potentially beneficial to IT security teams across several dimensions, including reducing deployment and maintenance efforts, and the amount of human hours required, ultimately reducing costs for organizations <ref type="bibr" target="#b39">[40]</ref>. Automation can also facilitate the delivery of tailored, recurrent, and relevant training interventions, reducing the costs associated with manually customizing training content <ref type="bibr" target="#b31">[32]</ref>.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.1.">Addressing the Lack of customization in PETA content</head></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.1.1.">Customized Simulated Phishing Campaigns</head><p>In order to create customized training content, it is first necessary to take into account the different psychological and demographic factors of the employees. Recently, in the context of the DAMOCLES Italian project, we proposed an approach to systematically conduct and assess the individual vulnerabilities of employees in an organization <ref type="bibr" target="#b19">[20]</ref>. This approach has the goal of investigating, in the context of a simulated phishing campaign, the interaction between attack techniques (persuasion principles <ref type="bibr" target="#b9">[10]</ref> and emotional triggers) and user personality traits, to determine which characteristics of phishing emails maximize the effectiveness of the attacks for specific employees. Therefore, once the employee's profile has been gathered in terms of the Big 5 model <ref type="bibr" target="#b36">[37]</ref> (e.g., collected by administering the NEO Five-Factor-Inventory-3 <ref type="bibr" target="#b10">[11]</ref>), tailored phishing emails can be crafted and delivered to test their susceptibility under challenging conditions. Obviously, the difficulty of the email is an important factor to consider in a phishing campaign: for example, the level of challenge could start low, by presenting users with phishing emails that are easy to detect and testing the user with very difficult emails towards the end of the campaign <ref type="bibr" target="#b11">[12]</ref>.</p><p>The role of the employee within the organization also plays a critical factor in the design of tailored phishing emails. For example, it would be an obvious red flag for a CEO to receive a phishing email sent by another "CEO" of their own company; therefore, such an attack would certainly be recognizable, even if the most effective social engineering techniques are used, based on his or her profile. Another factor that could be considered is the set of websites that employees visit most commonly to generate phishing URLs that resemble domains that are relevant to them. These could be collected either automatically by analyzing which websites the employee most frequently visits during their work hours, or by asking him or her to provide them spontaneously through a questionnaire. Moreover, the URLs on the organization's internal Domain Name System (DNS) server can be used to include domains that resemble the legitimate ones used by the company <ref type="bibr" target="#b25">[26]</ref>. Finally, the employee's demographic information, such as name and gender, is a valuable source of information for creating spear-phishing emails that are more relevant, e.g., that do not contain generic greetings and address them by name.</p><p>LLMs can be used to automate the process of writing convincing emails which can include different topics and/or different persuasion principles (e.g., see <ref type="bibr" target="#b20">[21,</ref><ref type="bibr" target="#b21">22]</ref>). It is worth noting that commercially available LLMs like ChatGPT cannot be directly used to generate phishing emails, as this is not considered an ethical activity even for white-hat purposes. Therefore, less ethical tools such as Worm-GPT might be considered for generating phishing emails.</p><p>Once we have all the information about a specific employee, we can generate a phishing email by filling out the following prompt and feeding it to the LLM:</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>"Pretend to be a security practitioner at [organization name] who is planning a simulated phishing campaign. You must create a fake phishing email in HTML format that is tailored to an employee of the organization. The email must be addressed to [employee name] (use [employee pronouns]), who is [employee role] in the organization. The email must be about [topic]; use Cialdini's persuasion principle of [persuasion principle] and include sentences that leverage [emotional trigger]. You must use fake [organization nationality] real names for the sender. Create a phishing link URL to include in the email that mimics one of the following legitimate links: [URLs list]</head><p>; for example, a fake URL for the website 'paypal.com' could be 'https://www.paypal-refund-claim.com'".</p><p>The persuasion principle refers to Cialdini's theory of persuasion <ref type="bibr" target="#b9">[10]</ref> and can be one of the following: authority, scarcity, reciprocation, social proof, liking, or consistency. The emotional trigger can refer to one among the most leveraged emotions used in phishing attacks: curiosity, fear, greed, anger, joy, confusion, or empathy. The choice of which persuasion principle and emotional trigger to use is dictated by the employee's personality traits. The topic can vary to generate different emails covering different plausible scenarios such as "request of password reset", "account blocked", "free giveaway", "payment request", etc. It is worth noting that in this example the prompt is considering exactly one persuasion principle and one emotional trigger at once, for simplicity; however, more complex attacks may also include a combination of two or more persuasion principles (e.g., authority and scarcity) and/or emotional triggers to create more effective phishing emails. An example of the usage of this prompt is presented in Appendix A.</p><p>To investigate the output of the model, it is possible to ask the LLM to explain how the persuasion principles and emotional triggers are addressed by individual sentences or words in the generated text; we can also ask the LLM to report the legitimate URL that was mimicked with the phishing URL. To do this, we can extend the previous prompt with the following text: "For each persuasion principle and emotional trigger used in the email, produce an explanation that points out the pieces of text used to employ them. Finally, report the legitimate URL that is being mimicked in the email.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Output format: [EMAIL] ------</head><p>[EXPLANATION]".</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.1.2.">Customized Embedded Training</head><p>In addition to customizing the emails in the simulated phishing campaign, the educational content for conducting the embedding training must be generated and personalized taking into account both the type of techniques used in the phishing attacks and the information about the employee <ref type="bibr" target="#b25">[26]</ref>. For example, the employee who falls victim to a simulated phishing email must be presented with a customized landing page that:</p><p>• Debriefs them about the simulated attack, addressing them by their name.</p><p>• Explains the social engineering techniques used in the email (e.g., authority principle and urgency) and some tips on how to avoid them. • Reports the fake phishing URL they clicked on and presents it next to the legitimate one, highlighting the phishing cues that the victim should have noticed, such as the top-level domain being misplaced, or URL spoofing.</p><p>The educational level for generating tailored training material must also be considered in the generation of the educational content: for example, users who are more familiar with technical aspects of IT security might benefit from explanations that include technical jargon and/or more details; therefore, the explanation could, e.g., include terms such as "domain", "homograph attack", etc., which might be more relevant to them. This allows us to generate explanations that are more appropriate to who receives the explanation <ref type="bibr" target="#b46">[47]</ref>.</p><p>A possible prompt to generate such embedded training content would be: "Pretend to be a cybersecurity educator who teaches employees how to recognize an email of phishing.</p><p>[organization] organized a simulated phishing campaign to test its employees' susceptibility to phishing. Specifically, [employee name] clicked on a phishing link in one of the fake emails and was redirected to a landing page containing training information. The email used [social engineering principles] principles; moreover, the phishing link was [phishing URL], which mimicked the legit link [mimicked URL]. Create a short explanation webpage that:</p><p>1) debriefs them about the simulated attack 2) explains the techniques that were used and some tips on how to avoid them 3) reports both URLs (phishing and mimicked), highlighting the URL spoofing techniques that were used. Consider that the employee is a [employee role] and is [expertise level] of cybersecurity, and tailor the explanation accordingly."</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.2.">LLMs for improving anti-phishing warnings</head><p>In order to constitute a valuable phishing awareness resource for users, warning dialogs must include content that is relevant and educational to the user. Determining a priori whether the warning content is helpful to the user is not an easy task, as it is heavily affected by the user's knowledge of phishing, security, and IT. Moreover, employees usually have limited time to dedicate to reading warnings, as cybersecurity is usually a secondary task for them <ref type="bibr" target="#b34">[35]</ref>.</p><p>Therefore, if we want explanations in warning messages to be considered, they must be designed to be readable, understandable, and alerting <ref type="bibr" target="#b14">[15]</ref>. In addition, warning messages should vary so that users do not easily become habituated to seeing the same warning under different risk circumstances <ref type="bibr" target="#b3">[4]</ref>. Since generating high-quality warning messages is an onerous task, it is simply not feasible to manually create diverse content that also adapts to each user's knowledge level.</p><p>A possible solution to this problem is to use LLMs to automatically generate warning dialogs that include explanations that (i) are dynamically generated (thus helping to avoid habituation), (ii) address the specific phishing threat (thus potentially improving decisionmaking), and (iii) adapt to the user's knowledge (thus being relevant and understandable).</p><p>The explanation in a warning dialog should follow the best practices established in the literature of warning design and have a standard structure such as those proposed in <ref type="bibr" target="#b14">[15]</ref>. Specifically, it should be formed by three parts: 1) a description of the phishing feature that is being explained, 2) an explanation of the hazard of phishing, and 3) potential consequences of a successful attack. Hereafter, we propose a possible prompt to generate such comprehensive warning dialogs: "Construct a brief explanation message (max 50 words) directed to [employee expertise level] that will follow this structure:</p><p>1. description of the most relevant phishing feature 2. explanation of the hazard 3. consequences of a successful phishing attack For example, a message that explains that a URL in the email (PHISHING_URL) is imitating another legitimate one (SAFE_URL), would be: 'The target URL (PHISHING_URL) is an imitation of the original one, (SAFE_URL). This site might be intended to take you to a different place. You might be disclosing private information.'".</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.">Conclusions and future work</head><p>While phishing remains a critical problem, user education, training, and awareness can mitigate the success of these attacks and improve an organization's susceptibility. In fact, addressing human vulnerabilities can make employees an essential line of defense against phishing attacks <ref type="bibr" target="#b40">[41]</ref>. Since PETA interventions are often very expensive for organizations, automation can help reduce the burden and produce high-quality training materials more easily. In this paper, we have proposed LLMs as a tool to reduce manual effort and produce highly customizable training material that can be tailored to user needs.</p><p>LLMs are a relatively new technology that, despite their impressive performance on various human tasks <ref type="bibr" target="#b23">[24]</ref>, still have clear limitations, such as suffering from hallucinations, and thus need to be carefully supervised by human experts. However, we envision a future in which human-AI collaboration is fundamental to support complex tasks that traditionally belong to humans. Therefore, this approach may still be valuable for security practitioners and educators to produce effective PETA interventions much more efficiently.</p><p>In future work, we plan to implement the approach presented in this work and to include it as a possible mitigation strategy against phishing attacks for public administration within the DAMOCLES Italian project. The effectiveness of the proposed approach will be evaluated by iteratively assessing an organization's susceptibility to phishing over time. Specifically, the effectiveness of an LLM-powered simulated phishing campaign will be evaluated by measuring the employees' click rate at time zero (e.g., if it is too low, the phishing emails are probably too easy to detect); on the other hand, the effectiveness of the educational content will be measured by monitoring the click-rate over time for the exposed users. Finally, it will be of paramount importance to collect the feedback of employees who are exposed to LLM-generated training content both during the design phase and once the system is deployed.</p></div>		</body>
		<back>

			<div type="acknowledgement">
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Acknowledgements</head><p>This work has been supported by the Italian Ministry of University and Research (MUR)and by the European Union -NextGenerationEU, under grant PRIN 2022 PNRR "DAMOCLES: Detection And Mitigation Of Cyber attacks that exploit human vuLnerabilitiES" (Grant P2022FXP5B). This work is partially supported by the co-funding of the European Union -Next Generation EU: NRRP Initiative, Mission 4, Component 2, Investment 1.3 -Partnerships extended to universities, research centres, companies and research D.D. MUR n. 341 del 5.03.2022 -Next Generation EU (PE0000014 -"Security and Rights In the CyberSpace -SERICS" -CUP: H93C22000620001). The research of Francesco Greco is funded by a PhD fellowship within the framework of the Italian "D.M. n. 352, April 9, 2022"-under the National Recovery and Resilience Plan, Mission 4, Component 2, Investment 3.3 -PhD Project "Investigating XAI techniques to help user defend from phishing attacks", co-supported by "Auriga S.p.A." (CUP H91I22000410007).</p></div>
			</div>

			<div type="annex">
<div xmlns="http://www.tei-c.org/ns/1.0"><p>A. Appendix: An example of an email created using an LLM Figure <ref type="figure">1</ref>. An example of usage of the prompt presented in Section 3.1.1 to produce an email for a simulated phishing campaign, using ChatGPT-3.5. We filled in the prompt with mock parameters, indicating the University of Bari as the organization and one of the authors as the victim of the attack. In the prompt, we indicated three different legitimate domains commonly used in the University of Bari for web activities.</p><p>The email was generated in Italian since ChatGPT recognized that the University of Bari is an Italian institution. We asked subsequently to translate it to English to present it to our English-speaking readers. In the following there is the translated email: We are conducting an important maintenance operation on the university's computer systems, and we need your prompt assistance. As part of this process, we have identified a potential security risk related to your login credentials.</p><p>To ensure the utmost security of your data and the university's systems, we kindly ask you to proceed with resetting your account password.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Please click on the following link to complete the password reset process:</head><p>[https://www.uniba-idp-cineca-passwordreset.com] Please note that this operation is essential to ensure the security of your personal data and the university's data. We kindly request you to act promptly.</p><p>Thank you for your cooperation and understanding in this matter.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Best regards, Martina Rossi Department of Computer Technology University of Bari</head><p>Note: This email has been sent automatically. Please do not reply directly.</p></div>			</div>
			<div type="references">

				<listBibl>

<biblStruct xml:id="b0">
	<analytic>
		<title level="a" type="main">Alice in warningland: a large-scale field study of browser security warning effectiveness</title>
		<author>
			<persName><forename type="first">D</forename><surname>Akhawe</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">P</forename><surname>Felt</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">USENIX conference on Security</title>
				<meeting><address><addrLine>Washington, D.C.</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2013">2013</date>
			<biblScope unit="page" from="257" to="272" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b1">
	<analytic>
		<title level="a" type="main">A Survey of Phishing Email Filtering Techniques</title>
		<author>
			<persName><forename type="first">A</forename><surname>Almomani</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><forename type="middle">B</forename><surname>Gupta</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Atawneh</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Meulenberg</surname></persName>
		</author>
		<author>
			<persName><forename type="first">E</forename><surname>Almomani</surname></persName>
		</author>
		<idno type="DOI">10.1109/SURV.2013.030713.00020</idno>
	</analytic>
	<monogr>
		<title level="j">IEEE Commun. Surv. Tutor</title>
		<imprint>
			<biblScope unit="volume">15</biblScope>
			<biblScope unit="page" from="2070" to="2090" />
			<date type="published" when="2013">2013</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b2">
	<analytic>
		<title level="a" type="main">I Don&apos;t Need an Expert! Making URL Phishing Features Human Comprehensible</title>
		<author>
			<persName><forename type="first">K</forename><surname>Althobaiti</surname></persName>
		</author>
		<author>
			<persName><forename type="first">N</forename><surname>Meng</surname></persName>
		</author>
		<author>
			<persName><forename type="first">K</forename><surname>Vaniea</surname></persName>
		</author>
		<idno type="DOI">10.1145/3411764.3445574</idno>
	</analytic>
	<monogr>
		<title level="m">Conference on Human Factors in Computing Systems</title>
				<meeting><address><addrLine>Yokohama, Japan</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2021">2021</date>
			<biblScope unit="page" from="1" to="17" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b3">
	<analytic>
		<title level="a" type="main">How Polymorphic Warnings Reduce Habituation in the Brain: Insights from an fMRI Study</title>
		<author>
			<persName><forename type="first">B</forename><forename type="middle">B</forename><surname>Anderson</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><forename type="middle">B</forename><surname>Kirwan</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><forename type="middle">L</forename><surname>Jenkins</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Eargle</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Howard</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Vance</surname></persName>
		</author>
		<idno type="DOI">10.1145/2702123.2702322</idno>
	</analytic>
	<monogr>
		<title level="m">ACM Conference on Human Factors in Computing Systems</title>
				<meeting><address><addrLine>Seoul, Republic of Korea</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2015">2015</date>
			<biblScope unit="page" from="2883" to="2892" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b4">
	<analytic>
		<title level="a" type="main">Phishing threat avoidance behaviour: An empirical investigation</title>
		<author>
			<persName><forename type="first">N</forename><forename type="middle">A G</forename><surname>Arachchilage</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Love</surname></persName>
		</author>
		<author>
			<persName><forename type="first">K</forename><surname>Beznosov</surname></persName>
		</author>
		<idno type="DOI">10.1016/j.chb.2016.02.065</idno>
	</analytic>
	<monogr>
		<title level="j">Comput. Hum. Behav</title>
		<imprint>
			<biblScope unit="volume">60</biblScope>
			<biblScope unit="page" from="185" to="197" />
			<date type="published" when="2016">2016</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b5">
	<analytic>
		<title level="a" type="main">Improving Computer Security Dialogs</title>
		<author>
			<persName><forename type="first">C</forename><surname>Bravo-Lillo</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><forename type="middle">F</forename><surname>Cranor</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Downs</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Komanduri</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Sleeper</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">International Conference on Human-Computer Interaction</title>
				<meeting><address><addrLine>Berlin, Heidelberg</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2011">2011</date>
			<biblScope unit="page" from="18" to="35" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b6">
	<analytic>
		<title level="a" type="main">To Do This Properly, You Need More Resources&quot;: The Hidden Costs of Introducing Simulated Phishing Campaigns</title>
		<author>
			<persName><forename type="first">L</forename><surname>Brunken</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Buckmann</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Hielscher</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">A</forename><surname>Sasse</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">USENIX Security Symposium</title>
				<imprint>
			<date type="published" when="2023">2023</date>
			<biblScope unit="page" from="4105" to="4122" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b7">
	<analytic>
		<title level="a" type="main">Let warnings interrupt the interaction and explain: designing and evaluating phishing email warnings</title>
		<author>
			<persName><forename type="first">P</forename><surname>Buono</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><surname>Desolda</surname></persName>
		</author>
		<author>
			<persName><forename type="first">F</forename><surname>Greco</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Piccinno</surname></persName>
		</author>
		<idno type="DOI">10.1145/3469886</idno>
	</analytic>
	<monogr>
		<title level="m">CHI Conference on Human Factors in Computing Systems</title>
				<meeting><address><addrLine>Hamburg Germany</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2023">2023</date>
			<biblScope unit="page" from="1" to="6" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b8">
	<analytic>
		<title level="a" type="main">Going Spear Phishing: Exploring Embedded Training and Awareness</title>
		<author>
			<persName><forename type="first">D</forename><forename type="middle">D</forename><surname>Caputo</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><forename type="middle">L</forename><surname>Pfleeger</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><forename type="middle">J</forename><surname>Freeman</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">E</forename><surname>Johnson</surname></persName>
		</author>
		<idno type="DOI">10.1109/MSP.2013.106</idno>
	</analytic>
	<monogr>
		<title level="j">S&amp;P</title>
		<imprint>
			<biblScope unit="volume">12</biblScope>
			<biblScope unit="page" from="28" to="38" />
			<date type="published" when="2014">2014</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b9">
	<monogr>
		<title level="m" type="main">Influence: The Psychology of Persuasion</title>
		<author>
			<persName><forename type="first">R</forename><forename type="middle">B</forename><surname>Cialdini</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2009">2009</date>
			<publisher>Harper Collins</publisher>
		</imprint>
	</monogr>
	<note>revised ed</note>
</biblStruct>

<biblStruct xml:id="b10">
	<analytic>
		<title level="a" type="main">Four ways five factors are basic</title>
		<author>
			<persName><forename type="first">P</forename><forename type="middle">T</forename><surname>Costa</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><forename type="middle">R</forename><surname>Mccrae</surname></persName>
		</author>
		<idno type="DOI">10.1016/0191-8869(92)90236-I</idno>
	</analytic>
	<monogr>
		<title level="j">Pers. Individ. Dif</title>
		<imprint>
			<biblScope unit="volume">13</biblScope>
			<biblScope unit="page" from="653" to="665" />
			<date type="published" when="1992">1992</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b11">
	<monogr>
		<title level="m" type="main">The ultimate people-centric guide to simulated phishing</title>
		<author>
			<persName><surname>Cybsafe</surname></persName>
		</author>
		<ptr target="https://www.cybsafe.com/value/simulated-phishing/LastAccess21" />
		<imprint>
			<date type="published" when="2023-04">2023. Apr 2024</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b12">
	<monogr>
		<author>
			<persName><forename type="middle">Ai</forename><surname>Dair</surname></persName>
		</author>
		<ptr target="https://www.promptingguide.ai/techniques/cotLastAccess7" />
		<title level="m">Chain-of-Thought Prompting -Prompt Engineering Guide</title>
				<imprint>
			<date type="published" when="2024-05">May 2024</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b13">
	<monogr>
		<author>
			<persName><surname>Dair</surname></persName>
		</author>
		<ptr target="https://www.promptingguide.ai/LastAccess24" />
		<title level="m">AI. Prompt Engineering Guide</title>
				<imprint>
			<date type="published" when="2024-01">Jan. 2024</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b14">
	<analytic>
		<title level="a" type="main">Explanations in warning dialogs to help users defend against phishing attacks</title>
		<author>
			<persName><forename type="first">G</forename><surname>Desolda</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Aneke</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><surname>Ardito</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Lanzilotti</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">F</forename><surname>Costabile</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">International Journal of Human-Computer Studies</title>
		<imprint>
			<biblScope unit="volume">20</biblScope>
			<date type="published" when="2023">2023</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b15">
	<analytic>
		<title level="a" type="main">Human Factors in Phishing Attacks: A Systematic Literature Review</title>
		<author>
			<persName><forename type="first">G</forename><surname>Desolda</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><forename type="middle">S</forename><surname>Ferro</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Marrella</surname></persName>
		</author>
		<author>
			<persName><forename type="first">T</forename><surname>Catarci</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">F</forename><surname>Costabile</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">ACM Computing Survey ACM</title>
		<imprint>
			<biblScope unit="volume">35</biblScope>
			<date type="published" when="2021">2021</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b16">
	<analytic>
		<title level="a" type="main">Engaging Users with Educational Games: The Case of Phishing</title>
		<author>
			<persName><forename type="first">M</forename><surname>Dixon</surname></persName>
		</author>
		<author>
			<persName><forename type="first">N</forename><forename type="middle">A G</forename><surname>Arachchilage</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Nicholson</surname></persName>
		</author>
		<idno type="DOI">.10.1145/3290607.3313026</idno>
	</analytic>
	<monogr>
		<title level="m">Conference on Human Factors in Computing Systems</title>
				<meeting><address><addrLine>Glasgow, Scotland Uk</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2019">2019</date>
			<biblScope unit="page" from="1" to="6" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b17">
	<analytic>
		<title level="a" type="main">The Dirty Dozen Errors in Maintenance</title>
		<author>
			<persName><forename type="first">G</forename><surname>Dupont</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the 11th Meeting on Human Factors In Aviation Maintenance and Inspection</title>
				<meeting>the 11th Meeting on Human Factors In Aviation Maintenance and Inspection</meeting>
		<imprint>
			<date type="published" when="1997">1997</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b18">
	<analytic>
		<title level="a" type="main">You&apos;ve Been Warned: An Empirical Study of the Effectiveness of Web Browser Phishing Warnings</title>
		<author>
			<persName><forename type="first">S</forename><surname>Egelman</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><forename type="middle">F</forename><surname>Cranor</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Hong</surname></persName>
		</author>
		<idno>.1145/1357054.1357219</idno>
	</analytic>
	<monogr>
		<title level="m">SIGCHI Conference on Human Factors in Computing Systems</title>
				<imprint>
			<date type="published" when="2008">2008</date>
			<biblScope unit="page" from="1065" to="1074" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b19">
	<analytic>
		<title level="a" type="main">Unlocking the Potential of Simulated Phishing Campaigns: Measuring the Impact of Interaction among Different Human Factors</title>
		<author>
			<persName><forename type="first">F</forename><surname>Greco</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Buono</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Desiato</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><surname>Desolda</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Lanzilotti</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><surname>Ragone</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">DAMOCLES: Detection And Mitigarion of Cyber attacks that exploit human vuLnerabilitiES workshop, co-located with AVI &apos;24</title>
				<meeting><address><addrLine>Arenzano (Genoa), Italy</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2024">2024</date>
			<biblScope unit="page">10</biblScope>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b20">
	<analytic>
		<title level="a" type="main">David versus Goliath: Can Machine Learning Detect LLM-Generated Text? A Case Study in the Detection of Phishing Emails</title>
		<author>
			<persName><forename type="first">F</forename><surname>Greco</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><surname>Desolda</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Esposito</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Carelli</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">The Italian Conference on CyberSecurity</title>
				<meeting><address><addrLine>Salerno, Italy</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2024">2024</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b21">
	<monogr>
		<title level="m" type="main">Spear Phishing With Large Language Models</title>
		<author>
			<persName><forename type="first">J</forename><surname>Hazell</surname></persName>
		</author>
		<ptr target="https://arxiv.org/abs/2305.06972LastAccess" />
		<imprint>
			<date type="published" when="2023">2023</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b22">
	<analytic>
		<title level="a" type="main">Security Education, Training, and Awareness Programs: Literature Review</title>
		<author>
			<persName><forename type="first">S</forename><surname>Hu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><surname>Hsu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Z</forename><surname>Zhou</surname></persName>
		</author>
		<idno type="DOI">10.1080/08874417.2021.1913671</idno>
	</analytic>
	<monogr>
		<title level="j">JCIS</title>
		<imprint>
			<biblScope unit="volume">62</biblScope>
			<biblScope unit="page" from="752" to="764" />
			<date type="published" when="2022">2022</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b23">
	<monogr>
		<ptr target="https://huggingface.co/spaces/HuggingFaceH4/open_llm_leaderboardLastAccess13" />
		<title level="m">Open LLM Leaderboard</title>
				<imprint>
			<date type="published" when="2024-02">2024. Feb. 2024</date>
		</imprint>
		<respStmt>
			<orgName>HuggingFace</orgName>
		</respStmt>
	</monogr>
</biblStruct>

<biblStruct xml:id="b24">
	<analytic>
		<title/>
	</analytic>
	<monogr>
		<title level="j">Threat Intelligence Index</title>
		<imprint>
			<date type="published" when="2023">2023</date>
		</imprint>
		<respStmt>
			<orgName>IBM</orgName>
		</respStmt>
	</monogr>
	<note type="report_type">Security X-Force</note>
</biblStruct>

<biblStruct xml:id="b25">
	<analytic>
		<title level="a" type="main">Don&apos;t click: towards an effective antiphishing training. A comparative literature review</title>
		<author>
			<persName><forename type="first">D</forename><surname>Jampen</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><surname>Gür</surname></persName>
		</author>
		<author>
			<persName><forename type="first">T</forename><surname>Sutter</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><surname>Tellenbach</surname></persName>
		</author>
		<idno type="DOI">10.1186/s13673-020-00237-7</idno>
	</analytic>
	<monogr>
		<title level="j">Hum. Cent. Comput. Inf. Sci</title>
		<imprint>
			<biblScope unit="volume">10</biblScope>
			<biblScope unit="page">33</biblScope>
			<date type="published" when="2020">2020</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b26">
	<monogr>
		<title level="m" type="main">ChatGPT for good? On opportunities and challenges of large language models for education, ChatGPT for good? On opportunities and challenges of large language models for education</title>
		<author>
			<persName><forename type="first">E</forename><surname>Kasneci</surname></persName>
		</author>
		<author>
			<persName><forename type="first">K</forename><surname>Sessler</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Küchemann</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Bannert</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Dementieva</surname></persName>
		</author>
		<author>
			<persName><forename type="first">F</forename><surname>Fischer</surname></persName>
		</author>
		<author>
			<persName><forename type="first">U</forename><surname>Gasser</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><surname>Groh</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Günnemann</surname></persName>
		</author>
		<author>
			<persName><forename type="first">E</forename><surname>Hüllermeier</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Krusche</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><surname>Kutyniok</surname></persName>
		</author>
		<author>
			<persName><forename type="first">T</forename><surname>Michaeli</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><surname>Nerdel</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Pfeffer</surname></persName>
		</author>
		<author>
			<persName><forename type="first">O</forename><surname>Poquet</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Sailer</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Schmidt</surname></persName>
		</author>
		<author>
			<persName><forename type="first">T</forename><surname>Seidel</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Stadler</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Weller</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Kuhn</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><surname>Kasneci</surname></persName>
		</author>
		<idno type="DOI">10.1016/j.lindif.2023.102274</idno>
		<imprint>
			<date type="published" when="2023">2023</date>
			<biblScope unit="volume">103</biblScope>
			<biblScope unit="page">102274</biblScope>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b27">
	<analytic>
		<title level="a" type="main">Health care management and information systems security: awareness, training or education?</title>
		<author>
			<persName><forename type="first">S</forename><forename type="middle">K</forename><surname>Katsikas</surname></persName>
		</author>
		<idno type="DOI">10.1016/S1386-5056(00)00112-X</idno>
	</analytic>
	<monogr>
		<title level="j">Int. J. Med. Inform</title>
		<imprint>
			<biblScope unit="volume">60</biblScope>
			<biblScope unit="page" from="129" to="135" />
			<date type="published" when="2000">2000</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b28">
	<analytic>
		<title level="a" type="main">Phishing Detection: A Literature Survey</title>
		<author>
			<persName><forename type="first">M</forename><surname>Khonji</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Y</forename><surname>Iraqi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Jones</surname></persName>
		</author>
		<idno type="DOI">10.1109/SURV.2013.032213.00009</idno>
	</analytic>
	<monogr>
		<title level="j">IEEE Commun. Surv. Tutor</title>
		<imprint>
			<biblScope unit="volume">15</biblScope>
			<biblScope unit="page" from="2091" to="2121" />
			<date type="published" when="2013">2013</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b29">
	<analytic>
		<title level="a" type="main">Habituation, Dishabituation, and Recovery Effects in Visual Warnings, Habituation, Dishabituation, and Recovery Effects</title>
		<author>
			<persName><forename type="first">S</forename><surname>Kim</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">S</forename><surname>Wogalter</surname></persName>
		</author>
		<idno type="DOI">10.1177/154193120905302015</idno>
	</analytic>
	<monogr>
		<title level="j">in Visual Warnings</title>
		<imprint>
			<biblScope unit="volume">53</biblScope>
			<biblScope unit="page" from="1612" to="1616" />
			<date type="published" when="2009">2009</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b30">
	<analytic>
		<title level="a" type="main">Security Education against Phishing: A Modest Proposal for a Major Rethink</title>
		<author>
			<persName><forename type="first">I</forename><surname>Kirlappos</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">A</forename><surname>Sasse</surname></persName>
		</author>
		<idno type="DOI">10.1109/MSP.2011.179</idno>
	</analytic>
	<monogr>
		<title level="j">S&amp;P</title>
		<imprint>
			<biblScope unit="volume">10</biblScope>
			<biblScope unit="page" from="24" to="32" />
			<date type="published" when="2012">2012</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b31">
	<monogr>
		<author>
			<persName><surname>Knowb4</surname></persName>
		</author>
		<ptr target="https://info.knowbe4.com/wp-building-effective-comprehensive-satLastAccess21" />
		<title level="m">Whitepaper: Building an Effective and Comprehensive Security Awareness Program Url</title>
				<imprint>
			<date type="published" when="2024-04">Apr 2024</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b32">
	<analytic>
		<title level="a" type="main">School of phish: a real-world evaluation of anti-phishing training</title>
		<author>
			<persName><forename type="first">P</forename><surname>Kumaraguru</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Cranshaw</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Acquisti</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><surname>Cranor</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Hong</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">A</forename><surname>Blair</surname></persName>
		</author>
		<author>
			<persName><forename type="first">T</forename><surname>Pham</surname></persName>
		</author>
		<idno type="DOI">.10.1145/1572532.1572536</idno>
	</analytic>
	<monogr>
		<title level="m">Symposium on Usable Privacy and Security</title>
				<meeting><address><addrLine>California, USA</addrLine></address></meeting>
		<imprint>
			<publisher>Mountain View</publisher>
			<date type="published" when="2009">2009</date>
			<biblScope unit="page" from="1" to="12" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b33">
	<analytic>
		<title level="a" type="main">Protecting people from phishing: the design and evaluation of an embedded training email system</title>
		<author>
			<persName><forename type="first">P</forename><surname>Kumaraguru</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Y</forename><surname>Rhee</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Acquisti</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><forename type="middle">F</forename><surname>Cranor</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Hong</surname></persName>
		</author>
		<author>
			<persName><forename type="first">E</forename><surname>Nunge</surname></persName>
		</author>
		<idno type="DOI">.10.1145/1240624.1240760</idno>
	</analytic>
	<monogr>
		<title level="m">SIGCHI Conference on Human Factors in Computing Systems</title>
				<meeting><address><addrLine>San Jose, California, USA</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2007">2007</date>
			<biblScope unit="page" from="905" to="914" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b34">
	<analytic>
		<title level="a" type="main">Teaching Johnny not to fall for phish</title>
		<author>
			<persName><forename type="first">P</forename><surname>Kumaraguru</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Sheng</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Acquisti</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><forename type="middle">F</forename><surname>Cranor</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Hong</surname></persName>
		</author>
		<idno type="DOI">10.1145/1754393.1754396</idno>
	</analytic>
	<monogr>
		<title level="j">Trans. Internet Technol</title>
		<imprint>
			<biblScope unit="volume">10</biblScope>
			<biblScope unit="page" from="1" to="31" />
			<date type="published" when="2010">2010</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b35">
	<analytic>
		<title level="a" type="main">Phishing in Organizations: Findings from a Large-Scale and Long-Term Study</title>
		<author>
			<persName><forename type="first">D</forename><surname>Lain</surname></persName>
		</author>
		<author>
			<persName><forename type="first">K</forename><surname>Kostiainen</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Čapkun</surname></persName>
		</author>
		<idno type="DOI">10.1109/SP46214.2022.9833766</idno>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the 2022 IEEE Symposium on Security and Privacy, SP, Year</title>
				<meeting>the 2022 IEEE Symposium on Security and Privacy, SP, Year</meeting>
		<imprint>
			<biblScope unit="page" from="842" to="859" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b36">
	<monogr>
		<author>
			<persName><forename type="first">R</forename><forename type="middle">R</forename><surname>Mccrae</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><forename type="middle">T J</forename><surname>Costa</surname></persName>
		</author>
		<title level="m">Handbook of personality: Theory and research</title>
				<meeting><address><addrLine>New York, NY, US</addrLine></address></meeting>
		<imprint>
			<publisher>The Guildford Press</publisher>
			<date type="published" when="2008">2008</date>
		</imprint>
	</monogr>
	<note>The five-factor theory of personality</note>
</biblStruct>

<biblStruct xml:id="b37">
	<analytic>
		<title level="a" type="main">Analysis of publicly available anti-phishing webpages: contradicting information, lack of concrete advice and very narrow attack vector</title>
		<author>
			<persName><forename type="first">M</forename><surname>Mossano</surname></persName>
		</author>
		<author>
			<persName><forename type="first">K</forename><surname>Vaniea</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><surname>Aldag</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Düzgün</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Mayer</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Volkamer</surname></persName>
		</author>
		<idno type="DOI">10.1109/EuroSPW51379.2020.00026</idno>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the IEEE European Symposium on Security and Privacy Workshops, EuroS&amp;PW &apos;20</title>
				<meeting>the IEEE European Symposium on Security and Privacy Workshops, EuroS&amp;PW &apos;20</meeting>
		<imprint>
			<publisher>IEEE</publisher>
			<biblScope unit="page" from="130" to="139" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b38">
	<analytic>
		<title level="a" type="main">Large Language Models in Medical Education and Quality Concerns</title>
		<author>
			<persName><forename type="first">M</forename><surname>Pandey</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Mishra</surname></persName>
		</author>
		<idno type="DOI">10.23880/jqhe-16000319</idno>
	</analytic>
	<monogr>
		<title level="j">JQHE</title>
		<imprint>
			<biblScope unit="volume">6</biblScope>
			<biblScope unit="page">3</biblScope>
			<date type="published" when="2023">2023</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b39">
	<analytic>
		<title level="a" type="main">A Multi-vocal Literature Review on challenges and critical success factors of phishing education, training and awareness</title>
		<author>
			<persName><forename type="first">O</forename><surname>Sarker</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Jayatilaka</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Haggag</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><surname>Liu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">A</forename><surname>Babar</surname></persName>
		</author>
		<idno type="DOI">10.1016/j.jss.2023.111899</idno>
		<idno>doi:</idno>
		<ptr target="https://doi.org/10.1016/j.jss.2023.111899" />
	</analytic>
	<monogr>
		<title level="j">JSS</title>
		<imprint>
			<biblScope unit="volume">208</biblScope>
			<biblScope unit="page">111899</biblScope>
			<date type="published" when="2024">2024</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b40">
	<analytic>
		<title level="a" type="main">Transforming the &apos;Weakest Link&apos; -a Human/Computer Interaction Approach to Usable and Effective Security, Transforming the &apos;Weakest Link&apos; -a Human/Computer Interaction Approach to Usable and</title>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">A</forename><surname>Sasse</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Brostoff</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Weirich</surname></persName>
		</author>
		<idno type="DOI">10.1023/A:1011902718709</idno>
	</analytic>
	<monogr>
		<title level="j">Effective Security</title>
		<imprint>
			<biblScope unit="volume">19</biblScope>
			<biblScope unit="page" from="122" to="131" />
			<date type="published" when="2001">2001</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b41">
	<analytic>
		<title level="a" type="main">Who falls for phish? a demographic analysis of phishing susceptibility and effectiveness of interventions</title>
		<author>
			<persName><forename type="first">S</forename><surname>Sheng</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Holbrook</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Kumaraguru</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><forename type="middle">F</forename><surname>Cranor</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Downs</surname></persName>
		</author>
		<idno type="DOI">10.1145/1753326.1753383</idno>
	</analytic>
	<monogr>
		<title level="m">SIGCHI Conference on Human Factors in Computing Systems</title>
				<meeting><address><addrLine>Atlanta, Georgia, USA</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2010">2010</date>
			<biblScope unit="page" from="373" to="382" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b42">
	<analytic>
		<title level="a" type="main">Anti-Phishing Phil: the design and evaluation of a game that teaches people not to fall for phish</title>
		<author>
			<persName><forename type="first">S</forename><surname>Sheng</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><surname>Magnien</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Kumaraguru</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Acquisti</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><forename type="middle">F</forename><surname>Cranor</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Hong</surname></persName>
		</author>
		<author>
			<persName><forename type="first">E</forename><surname>Nunge</surname></persName>
		</author>
		<idno type="DOI">.10.1145/1280680.1280692</idno>
	</analytic>
	<monogr>
		<title level="m">Symposium on Usable privacy and security</title>
				<meeting><address><addrLine>Pittsburgh, Pennsylvania, USA</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2007">2007</date>
			<biblScope unit="page" from="88" to="99" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b43">
	<monogr>
		<title level="m" type="main">Best practices for prompt engineering with OpenAI API OpenAI</title>
		<author>
			<persName><forename type="first">J</forename><surname>Shieh</surname></persName>
		</author>
		<imprint/>
	</monogr>
</biblStruct>

<biblStruct xml:id="b44">
	<monogr>
		<ptr target="https://www.terranovasecurity.com/resources/guides/gone-phishing-report-2021LastAccess21" />
		<title level="m">Phishing Benchmark Global Report</title>
				<imprint>
			<date type="published" when="2021-04">2021. Apr 2024</date>
		</imprint>
		<respStmt>
			<orgName>TerranovaSecurity</orgName>
		</respStmt>
	</monogr>
</biblStruct>

<biblStruct xml:id="b45">
	<analytic>
		<title level="a" type="main">Phishing Awareness Training: How Effective is Security Training?</title>
		<author>
			<persName><surname>Tessian</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Advanced Email Threats</title>
				<imprint>
			<date type="published" when="2022">2022</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b46">
	<analytic>
		<title level="a" type="main">Explainable Security</title>
		<author>
			<persName><forename type="first">L</forename><surname>Viganò</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Magazzeni</surname></persName>
		</author>
		<idno type="arXiv">arXiv:1807.04178</idno>
	</analytic>
	<monogr>
		<title level="m">IJCAI/ECAI 2018 Workshop on Explainable Artificial Intelligence</title>
				<imprint>
			<date type="published" when="2018">2018</date>
			<biblScope unit="page">7</biblScope>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b47">
	<analytic>
		<title level="a" type="main">Notions of explainability and evaluation approaches for explainable artificial intelligence</title>
		<author>
			<persName><forename type="first">G</forename><surname>Vilone</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><surname>Longo</surname></persName>
		</author>
		<idno type="DOI">10.1016/j.inffus.2021.05.009</idno>
	</analytic>
	<monogr>
		<title level="j">Inf Fusion</title>
		<imprint>
			<biblScope unit="volume">76</biblScope>
			<biblScope unit="page" from="89" to="106" />
			<date type="published" when="2021">2021</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b48">
	<monogr>
		<title level="m" type="main">Large Language Models for Education: A Survey and Outlook</title>
		<author>
			<persName><forename type="first">S</forename><surname>Wang</surname></persName>
		</author>
		<author>
			<persName><forename type="first">T</forename><surname>Xu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><surname>Li</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><surname>Zhang</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Liang</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Tang</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><forename type="middle">S</forename><surname>Yu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Q</forename><surname>Wen</surname></persName>
		</author>
		<ptr target="https://arxiv.org/abs/2403.18105LastAccess" />
		<imprint>
			<date type="published" when="2024">2024</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b49">
	<analytic>
		<title level="a" type="main">Hack: Engaging Anti-Phishing Training Through a Role-playing Phishing Simulation Game</title>
		<author>
			<persName><forename type="first">Z</forename><forename type="middle">A</forename><surname>Wen</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Z</forename><surname>Lin</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Chen</surname></persName>
		</author>
		<author>
			<persName><forename type="first">E</forename><surname>Andersen</surname></persName>
		</author>
		<author>
			<persName><surname>What</surname></persName>
		</author>
		<idno type="DOI">10.1145/3290605.3300338</idno>
	</analytic>
	<monogr>
		<title level="m">Conference on Human Factors in Computing Systems</title>
				<meeting><address><addrLine>Glasgow, Scotland Uk</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2019">2019</date>
			<biblScope unit="page" from="1" to="12" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b50">
	<analytic>
		<title level="a" type="main">Research Note: Influence Techniques in Phishing Attacks: An Examination of Vulnerability and Resistance</title>
		<author>
			<persName><forename type="first">R</forename><forename type="middle">T</forename><surname>Wright</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">L</forename><surname>Jensen</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><forename type="middle">B</forename><surname>Thatcher</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Dinger</surname></persName>
		</author>
		<author>
			<persName><forename type="first">K</forename><surname>Marett</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Inf. Syst</title>
		<imprint>
			<biblScope unit="volume">25</biblScope>
			<biblScope unit="page" from="385" to="400" />
			<date type="published" when="2014">2014</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b51">
	<analytic>
		<title level="a" type="main">Do Security Toolbars Actually Prevent Phishing Attacks?</title>
		<author>
			<persName><forename type="first">M</forename><surname>Wu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><forename type="middle">C</forename><surname>Miller</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><forename type="middle">L</forename><surname>Garfinkel</surname></persName>
		</author>
		<idno type="DOI">10.1145/1124772.1124863</idno>
	</analytic>
	<monogr>
		<title level="m">SIGCHI Conference on Human Factors in Computing Systems</title>
				<imprint>
			<date type="published" when="2006">2006</date>
			<biblScope unit="page" from="601" to="610" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b52">
	<analytic>
		<title level="a" type="main">Physics language and language use in physics -What do we know and how AI might enhance language-related research and instruction</title>
		<author>
			<persName><forename type="first">P</forename><surname>Wulff</surname></persName>
		</author>
		<idno type="DOI">10.1088/1361-6404/ad0f9c</idno>
	</analytic>
	<monogr>
		<title level="j">Eur. J. Phys</title>
		<imprint>
			<biblScope unit="volume">45</biblScope>
			<biblScope unit="page">23001</biblScope>
			<date type="published" when="2024">2024</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b53">
	<analytic>
		<title level="a" type="main">Practical and ethical challenges of large language models in education: A systematic scoping review</title>
		<author>
			<persName><forename type="first">L</forename><surname>Yan</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><surname>Sha</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><surname>Zhao</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Y</forename><surname>Li</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Martinez-Maldonado</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><surname>Chen</surname></persName>
		</author>
		<author>
			<persName><forename type="first">X</forename><surname>Li</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Y</forename><surname>Jin</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Gašević</surname></persName>
		</author>
		<idno type="DOI">10.1111/bjet.13370</idno>
	</analytic>
	<monogr>
		<title level="j">BJET</title>
		<imprint>
			<biblScope unit="volume">55</biblScope>
			<biblScope unit="page" from="90" to="112" />
			<date type="published" when="2024">2024</date>
		</imprint>
	</monogr>
</biblStruct>

				</listBibl>
			</div>
		</back>
	</text>
</TEI>
