<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta>
      <journal-title-group>
        <journal-title>BISEC'</journal-title>
      </journal-title-group>
    </journal-meta>
    <article-meta>
      <title-group>
        <article-title>Future Media Security Transformation in the Digital Age</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Zlatogor Minchev</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Yulian Hristov</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Institute of ICT, Bulgarian Academy of Sciences</institution>
          ,
          <addr-line>Acad. Georgi Bonchev Str., Bl. 25A, Sofia, 1113</addr-line>
          ,
          <country country="BG">Bulgaria</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>Institute of Mathematics &amp; Informatics, Bulgarian Academy of Sciences</institution>
          ,
          <addr-line>Acad. Georgi Bonchev Str., Bl. 8, Sofia, 1113</addr-line>
          ,
          <country country="BG">Bulgaria</country>
        </aff>
      </contrib-group>
      <pub-date>
        <year>2024</year>
      </pub-date>
      <volume>15</volume>
      <fpage>28</fpage>
      <lpage>29</lpage>
      <abstract>
        <p>Modern media reality constantly changes our understandings, needs, perspectives and so significantly afects the overall security transformation in the new digital age. The innovative media accents in this sense are mostly giving priority to the role of AI and audience preferences, together with information reliability and usage from both human and machine perspectives. However, these changes create also numerous security transcendents for the future media environment and society that need to be properly handled. The study combines morphological with system analytical modeling, aiming comprehensive enough scenario-based future exploration of the new media environment. Further, aiming a suitable results verification, some live experiments with an ad-hoc created media environment and a multirole group of trainees is provided in the context of CYREX 2024 event with additional BISEC 2024 round table discussions on the topic extension. The proposed approach is expected to outline some of the future media security transcendents, and thus supports to the establishment of a more innovative, secure and resilient future society in the new digital age.</p>
      </abstract>
      <kwd-group>
        <kwd>eol&gt;Future media</kwd>
        <kwd>security transcendents</kwd>
        <kwd>scenario-based future exploration</kwd>
        <kwd>analytical modeling</kwd>
        <kwd>experimental results verification</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>
        Properly understanding of the future media environment is a quite challenging task in the new digital
age [
        <xref ref-type="bibr" rid="ref1 ref2">1, 2</xref>
        ]. In this sense, the process could be directly connected with the web technologies evolution and
resulting transformational transcendents, following [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ]. Though the idea sounds somewhat interesting, it
should be noted that with the appearance of interactive media communication (in Web 2.0 technologies),
mostly visible due to blogging, chatting and commenting in modern social networks, the evolution
fostered with AI immersion is getting quite strong. Presently, Web 3.0 is mainly related to smart semantic
webs and chat bots, but with Web 4.0 evolution the environment is getting even more fascinating due
to diferent IoTs and virtual worlds mixing with the objective reality. The modern Meta Ray-Ban &amp;
Oculus, Microsoft HoloLens, HTC or Apple Vision smart VR/AR/MR/XR googles (being an IoT smart
devices in general) are already providing this digital immersion quite well. Though so far not quite
popular due to diferent reasons, but still mostly addressing gaming and entertainment industries more
successfully [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ]. What however is important to note here is the leading role of AI algorithms embraced
with avatars and chatbots that have to be significantly marked with attention. The reasons for this are
quite complex and could be generalized with two directions: (i) the media bubble profiling of social
networks that is even more significant with smart googles and expensive advanced smart phones, and
(ii) the evolutionary development of machine-to-machine communications with AI autonomization
towards General AI. This practically addresses the next level of machine-to-human communication,
being expected with Web 5.0 and BCI that should give consciousness not only to humans but also
to machines [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ], similar to some sci-fi genre expectations [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ]. The already noted trends however are
mainly related to human-machine domination competition in the not-so-far future digital society [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ]
but also reasonably open the media audience debate [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ].
      </p>
      <p>From todays’ perspective in fact, the process enables indexing bots, chatbots and avatars as modern
social and mass media players that could significantly evolve if the limits added to AI evolution are
quite modest in general.</p>
      <p>Further in the paper a more comprehensive, systematized exploration of the future media
transformation will be given via a three-fold approach: (i) morphological problem space definition, (ii) system
analysis deeper risks exploration of the future media security problem at hand (merged with Section
2 &amp; Section 3), followed with final (iii) experimental results verification (outlined in Section 4) and a
wrap-up discussion (Section 5).</p>
    </sec>
    <sec id="sec-2">
      <title>2. Problem Space Definition</title>
      <p>
        This initial step assumes that a scenario-based planning for the digital future security transformation is
accepted. Following the morphological cross-consistency transcendents’ matrix representation with a
set of dimensions (Drivers, Challenges, Threats, Opportunities, Divides &amp; Gaps) and mutually exclusive
alternatives (cells in each dimension, e.g. “Social Dynamics”) have been used. The resulting matrix
contains both plausible &amp; implausible pools for scenarios [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ]. Though certainly not comprehensive
enough due to its modelling nature the approach is significantly well-known and quite popular with
uncertain and unclear large classification problems initial exploration.
      </p>
      <p>
        The work here has been significantly fostered with I-SCIP-MA environment, giving a dual
classification of Active (having aggregated positive weight) and Passive scenario combinations. The implemented
assessment also gives a possibility to have a Neutral ones, whilst taking into account the accepted
measuring scale of weights [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ].
      </p>
      <p>The presented example in Fig. 1, shows a cross-consistency scenario matrix screenshot from
I-SCIPMA, having N1 = 642 (368 – active, 252 – passive &amp; 22 – neutral), plausible combinations &amp; N2 = 13182
– implausible ones (being somewhat uncertain) of N = 13824 (6 x 4 x 4 x 4 x 4 x 3 x 3) in total.</p>
      <p>Below are given some aggregated comments on future transformational transcendents, taking into
account the morphological analysis analytical implementation.</p>
      <p>
        • One of the biggest problems for the future media is expected to be related to digital overthrust
(as both human and machine conflicts are going to address AI algorithms) with the information
gathering &amp; processing. The problem actually comes from the AI biasing that is still dificult to
be neutrally handled (as AI is still quite innovative feature for the media field) and also expected
to gather fake popularity and thus additional funding that in fact is an intermedia competition in
general.
• Another problem is the overall cognitive transformation of future humans due to multiple smart
gadgets’ assistance comfort and social dynamics technological augmentation. This actually afects
mostly new generations to come but also millennial and post-millennial ones.
• The social media bubble that nowadays is getting more and more smart as user profiling is actually
producing a biased media that are capable to skilfully play with audience scalability, trust and
interests from both economic and socio-political perspectives. This produces multiple hybrid
human-machine attacks of truth and realism. The bigger problem here appears from unreal
information greater entertainment and higher popularity efects [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ].
      </p>
      <p>So, omitting digital ethics could be quite profitable but dangerous with the future web technologies
evolution, as with the new smart virtual worlds of Web 4.0, people are getting less freedoms and become
more inclined, directed from humans and AI solutions preferences and behaviour. The upcoming
highly dynamic and rich information autonomous handling becomes impossible without suitable smart
assistance, i.e. technological support, especially with the new digital societies’ evolution is of vital
importance. Finally, the multicultural and multilanguage clashes are expected to be less common due to
multidimensional media outlook that hopefully will successfully handle the environment and climate
changes with adequate trust and credibility relying on a new transformed media environment, properly
assisted with Extended AI, either General AI in the not so far future.</p>
      <p>As the presented morphological analysis findings are not giving the causality origins of the outlined
future media security findings, a further advanced risk system analysis is provided.</p>
    </sec>
    <sec id="sec-3">
      <title>3. System Analysis Exploration</title>
      <p>
        The system causality interpretation of future media security transformation could be quite useful,
especially from a future foreseeing perspective, allowing an extended use of scenario cross-consistency
matrix for a holistic system’s dynamic risk assessment. The presented further system-of-systems model,
contains 11 entities and 24 bi-directional relations (see Figure 2a), aggregated within a System Risk
Diagram (see Figure 2b) in I-SCIP-RA environment, following the ideas of [
        <xref ref-type="bibr" rid="ref11">11</xref>
        ].
      </p>
      <p>As dynamic system risks consideration will be studied in more detail with the experimental verification
(See Section 4) a final assessment towards the next five years is aggregated stepwise (two for each year,
i.e. considering a discrete six months representation as follows:</p>
      <p>
        “1 – 2025(I), 1 – 2025(II). . . , 9 – 2030(I), 10 – 2030(II)”) with a System Risk Diagram (SR Diagram,
encompassing a probabilistic assessment of: Direct - forward, Indirect – backward, and Aggregated
system risks in the interval [
        <xref ref-type="bibr" rid="ref1">0, 1</xref>
        ]), producing a two-class distribution: Critical vs Non-Critical ones.
Additional entities’ role assessment (in each of the classes) with “Active” (white) vs “Passive” (grey)
ones is also implemented.
      </p>
      <p>The presented results show an aggregated probabilistic system risk assessment for future media
security transformation towards year 2030 as follows:</p>
      <p>Critical risk priorities are expected for: Media Bubble (2), AI Regulations (2), whilst all being “Passive”;
Hybrid H-M Attacks (4), Multidimensional Clashes (6), Combined Digital Users (9), Media
Autonomization (11), all being “Active”.</p>
      <p>Non-Critical risk priorities are given to: Future Media Gaps (3), New Media Reality (8), all “Passive”;
Social Dynamics (1), Non-State Actors (5), Cognitive Transformation (10) all “Active”.</p>
      <p>
        Obviously, the future media security transformation gives a quite important role to AI mixing with
the new media reality. This actually hides a lot of risks towards the new media bubble that is going to
be addressed from numerous hybrid attacks and clashes inspired with state &amp; non-state actors, having
diferent motivations [
        <xref ref-type="bibr" rid="ref12 ref13">12, 13</xref>
        ]. Apart of this, with the AI progressive development the regulation of this
transformed media reality security will certainly need both framework and assisted AI support, as far
as future media is probably going to become somewhat autonomous, transforming audience cognitive
&amp; emotional responses [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ]. And all these is developing a new level of autonomous machine-to-machine
communication that is targeting the human audience in an unprecedented manner. Luckily, the human
intellect will be able to keep domination due to speed, scale and contents AI assisted handling. With
these analytical expectations marked in Section 2 &amp; Section 3 a further aggregated results’ experimental
verification will be presented in the next section.
      </p>
    </sec>
    <sec id="sec-4">
      <title>4. Experimental Results Verification</title>
      <p>
        This stage has been performed in two parts: (i) During the international Cyber Research Exercise 2024
– CYREX 2024, organized as a training event amongst young people gathered in the framework of
European Digital Innovation Hub “Trakia”, National Scientific Programme “Security &amp; Defense” &amp;
Secure Digital Future 21 forum united cybersecurity eforts [
        <xref ref-type="bibr" rid="ref14">14</xref>
        ]. (ii) Additionally, some high-level
discussion generalized findings have been collected during “Future media and security issues in the
Age of AI” roundtable discussion of BISEC 2024 [16].
      </p>
      <p>In brief, CYREX 2024 has been organized as an international, web distributed, computer assisted
exercise with nine-years history, providing cyber training that involves university, academic,
professional associations and industrial participants. The main training audience is a selected group of about
thirty students from Bulgaria &amp; Italy with some invited expert members of Secure Digital Future 21
international forum (see Figure 3a).</p>
      <p>
        The exercise concerns a fictitious scenario for a three-hour distributed training of a multirole
humanmachine intellect competition that involves: smart robots, media &amp; people in a fight for leadership and
domination, concerning future of climate changes and human beings’ settlements around the Solar
System. In practice the idea is to use diferent smart gadgets for participants’ multirole interconnectivity
via social networks and an ad-hoc smart media platform [
        <xref ref-type="bibr" rid="ref15">15</xref>
        ], adding AI generative and analytical tools,
while taking their responses on innovative AI security transcendents practical identification [17].
      </p>
      <p>Further, the accomplished findings from CYREX 2024 were somewhat extended and used during a
roundtable media and security discussion, organized amongst BISEC 2024 security conference
participants with invited international key-note speakers and stakeholders from academia, media &amp; state
administration (see Figure 3b).</p>
      <p>The aggregated results, concerning future media security in the age of AI in the process towards
year 2025 are presented graphically in Figure 4.</p>
      <p>
        Obviously, the presented models’ verification results give some future security extensions. This fact
is valid, especially about the expectations for emotions and psychology fears from the perspective of
future media AI assisted (and even AI-to-AI autonomous ones) infinite interaction isues even without
human-in-the-loop. The problem could get much worse, considering the AI models pretraining, usually
considered as “hallucination” and the issues of media audience information flooding [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ]. The last
normally produces attention fatigue or digital overloading necessity (and even addiction) regarding
diferent audience ages, but is also resulting an unhealthy interest on fake news as a tool for countering
the overall artificially directed “grey” information context. The new AI generated contents should be
properly branded as to achieve proper smart media environment regulation, while keeping freedom
and reliability of the environment. This access, while measuring the cognitive and emotional responses
of the mixed H-M audience. Finally, it should be noted, that the problem of future media security
handling is quite important not just from human perspective as the AI evolution could grow towards
sentient or general levels. These will transform the new social environment of the digital age in an
unprecedented manner that will require AI dual media transformation especially with Web 4.0 &amp; Web
5.0 will become even more personalized due to transhumanization and H-M realities diferent mixing
and competing for domination. At the same time, however the new smart media stays susceptible to
both state and non-state actors influencing, that together with avataring, AI assistants and multipurpose
bots involvement will make the digital future quite insecure without suitable AI protection extensive
support.
      </p>
    </sec>
    <sec id="sec-5">
      <title>5. Discussion</title>
      <p>Understanding the future of media transformation in the age of AI fast progress is a quite challenging
task. Whilst successful joining of the human and machine intellect in this task is somewhat useful with
the implementation of experimentally verified morphological and system analysis findings, the future
security transcendents identification and coping is always under discussion. Suitable extension of the
proposed methodology is on the way with Web 4.0 &amp; Web 5.0 technological support of wearable devices
for VR/XR media smart environment access, while measuring the cognitive and emotional responses of
the mixed H-M audience. Finally, it should be noted, that the problem of future media security handling
is quite important not just from human perspective as the AI evolution could grow towards sentient or
general levels. These will transform the new social environment of the digital age in an unprecedented
manner that will require AI dual use of technologies, while giving them semiautonomous role, at least
in the future media environment handling.
The authors of this study are granting special appreciations for the experimental base and partial
funding support to the National Scientific Programme “Security &amp; Defense”. Additional gratitude for
the institutional contribution is provided to EDIH Trakia and in person to Denis Petkov &amp; Hristo Kukov,
Università Bocconi, Italy for the help during CYREX 2024 training. Distinctive thanks are expressed to
BISEC 2024 organizers from Belgarade Metropolitan University and in person to Nemanja Zdravković &amp;
Plamen Kolev, HiLife Media for the fruitful discussions during the roundtable “Future media and security
issues in the Age of AI”. The analytical results presented in the paper are benefiting the international
expert support obtained in the framework of the initiative “Securing Digital Future 21” with more than
sixty countries now, spread around the world, https://securedfuture21.org/.</p>
    </sec>
    <sec id="sec-6">
      <title>Declaration on Generative AI</title>
      <p>The authors have not employed any Generative AI tools.
[16] N. Zdravkovic, Z. Minchev, P. Kolev, E. Radibratović, Future media and security issues in the Age
of AI, 2024. URL: https://youtu.be/FjHNXtd_ItE?t=6245.
[17] CYREX 2024, Cyber research exercise 2024, 2024. URL: https://securedfuture21.org/cyrex_2024/
cyrex_2024.html.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>Z.</given-names>
            <surname>Minchev</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.</given-names>
            <surname>Boyanov</surname>
          </string-name>
          , et al.,
          <article-title>Future digital society resilience in the informational age</article-title>
          , Sofia: SoftTrade &amp; Institute of ICT, Bulgarian Academy of Sciences (
          <year>2019</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>R.</given-names>
            <surname>Lätti</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Hermansson</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            <surname>Malmelin</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Paltschik</surname>
          </string-name>
          ,
          <string-name>
            <surname>MEDIA</surname>
          </string-name>
          <year>2035</year>
          :
          <article-title>Four Scenarios for the Future of Media, 2024</article-title>
          . URL: https://www.mediaalantutkimussaatio.fi/wp-content/uploads/ Media-2035-
          <article-title>Four-Scenarios-for-the-</article-title>
          <string-name>
            <surname>Future-</surname>
          </string-name>
          of-Media.pdf.
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>Z.</given-names>
            <surname>Minchev</surname>
          </string-name>
          , L. Boyanov,
          <article-title>Smart homes cyberthreats identification based on interactive training</article-title>
          ,
          <source>in: Proceedings of International Conference on Application of Information and Communication Technology and Statistics in Economy and Education (ICAICTSEE)</source>
          ,
          <source>International Conference on Application of Information and Communication</source>
          ,
          <year>2013</year>
          , pp.
          <fpage>72</fpage>
          -
          <lpage>82</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4] Research &amp; Markets, Immersive Entertainment Market Size,
          <source>Share &amp; Trends Analysis Report by Technology Type (Virtual Reality</source>
          , Augmented Reality, Mixed Reality),
          <source>Application (Gaming</source>
          , Live Events),
          <source>Region, and Segment Forecasts</source>
          ,
          <fpage>2024</fpage>
          -
          <lpage>2030</lpage>
          ,
          <year>2024</year>
          . URL: https://www.researchandmarkets. com/reports/5976548/immersive-entertainment
          <article-title>-market-size-share-and</article-title>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>Y. N.</given-names>
            <surname>Harari</surname>
          </string-name>
          ,
          <article-title>Nexus: A brief history of information networks from the stone age to AI</article-title>
          , Signal,
          <year>2024</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>H.</given-names>
            <surname>Osawa</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Miyamoto</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Hase</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Saijo</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K.</given-names>
            <surname>Fukuchi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Miyake</surname>
          </string-name>
          ,
          <article-title>Visions of artificial intelligence and robots in science fiction: a computational analysis</article-title>
          ,
          <source>International Journal of Social Robotics</source>
          <volume>14</volume>
          (
          <year>2022</year>
          )
          <fpage>2123</fpage>
          -
          <lpage>2133</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>Z.</given-names>
            <surname>Minchev</surname>
          </string-name>
          ,
          <article-title>Digital Transformation in the Post-Information Age</article-title>
          , SoftTrade,
          <year>2022</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>D. A.</given-names>
            <surname>Rohlinger</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Sobieraj</surname>
          </string-name>
          ,
          <source>The Oxford handbook of digital media sociology</source>
          , Oxford University Press,
          <year>2022</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>Z. B.</given-names>
            <surname>Minchev</surname>
          </string-name>
          ,
          <article-title>Human factor role for cyber threats resilience</article-title>
          ,
          <source>in: Handbook of Research on Civil Society and National Security in the Era of Cyber Warfare, IGI global</source>
          ,
          <year>2016</year>
          , pp.
          <fpage>377</fpage>
          -
          <lpage>402</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <given-names>S.</given-names>
            <surname>Vosoughi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Roy</surname>
          </string-name>
          ,
          <string-name>
            <surname>S. Aral,</surname>
          </string-name>
          <article-title>The spread of true and false news online</article-title>
          , science
          <volume>359</volume>
          (
          <year>2018</year>
          )
          <fpage>1146</fpage>
          -
          <lpage>1151</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <given-names>Z.</given-names>
            <surname>Minchev</surname>
          </string-name>
          ,
          <article-title>Analytical challenges to modern digital transformation</article-title>
          ,
          <source>in: Proc. of Tenth National Conference “Education and Research in the Information Society”</source>
          , Plovdiv, Bulgaria,
          <year>2017</year>
          , pp.
          <fpage>38</fpage>
          -
          <lpage>47</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <given-names>E.</given-names>
            <surname>Pauwels</surname>
          </string-name>
          ,
          <source>Preparing for Next-Generation Information Warfare with Generative AI</source>
          ,
          <year>2024</year>
          . URL: https://www.cigionline.org/static/documents/Pauwels-Nov2024.pdf.
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          <source>[13] World Economic Forum, The Global Risks Report 2024, 19th Edition</source>
          ,
          <year>2024</year>
          . URL: https://www3. weforum.org/docs/WEF_The_
          <source>Global_Risks_Report_2024.pdf.</source>
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          <source>[14] Securing Digital Future</source>
          <volume>21</volume>
          ,
          <year>2024</year>
          . URL: https://www3.weforum.org/docs/WEF_The_
          <source>Global_Risks_ Report_2024.pdf.</source>
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [15]
          <string-name>
            <surname>Defakeoutlet</surname>
            <given-names>web platform</given-names>
          </string-name>
          ,
          <year>2024</year>
          . URL: https://shorturl.at/gfRnM.
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>