The Use of Generative Artificial Intelligence in Cybersecurity Awareness Training, Part 1

doi: 10.32567/hm.2025.2.8

Abstract

This study examines how generative artificial intelligence (GenAI) can be applied in cybersecurity awareness training, with particular emphasis on personalization, effectiveness, and user acceptance. The theoretical section follows the ADDIE instructional design model and explores the role of GenAI in educational planning, highlighting its potential in content development, adaptive learning, and feedback mechanisms. Special attention is given to Retrieval-Augmented Generation (RAG) technologies, focusing on content accuracy and data protection considerations.

The empirical part of the research is based on a questionnaire survey conducted with 109 participants and designed according to the Technology Acceptance Model (TAM). The questionnaire included phishing simulations, an AI-generated cybersecurity scenario, and attitude-based questions. The aim of the study is to assess how non-expert users perceive and evaluate cybersecurity training materials generated by artificial intelligence, and to identify key factors influencing their acceptance and perceived usefulness.

Keywords:

artificial intelligence cybersecurity awareness training phishing

How to Cite

Szabó, G. (2026). The Use of Generative Artificial Intelligence in Cybersecurity Awareness Training, Part 1. Military Engineer, 20(2), 129–142. https://doi.org/10.32567/hm.2025.2.8

References

AI-Generated Phishing Simulations Are a Game Changer for MSPs. ConnectWise Marketplace, 2023. július 11. Online: https://marketplace.connectwise.com/blogs/ai-generated-phishing-simulations-are-a-game-changer-for-msps/

Breacher.ai (2025): Deepfake Archives. Online: https://breacher.ai/solutions/deepfake-simulation/

BRITO, Fernando et al. (2025): Enhancing Cybersecurity Education With Artificial Intelligence Content. In Proceedings of the 56th ACM Technical Symposium on Computer Science Education 1. New York: Association for Computing Machinery, 158–164. Online: https://doi.org/10.1145/3641554.3701958

CVE [é. n.]: Frequently Asked Questions (FAQs). Online: https://www.cve.org/ResourcesSupport/FAQs

EU Artificial Intelligence Act. Online: https://artificialintelligenceact.eu/ai-act-explorer/

European Union Agency for Cybersecurity (2024): ENISA Threat Landscape 2024: July 2023 to June 2024. Online: https://data.europa.eu/doi/10.2824/0710888

JAKKAL, Vasu (2023): Introducing Microsoft Security Copilot: Empowering Defenders at the Speed of AI. Official Microsoft Blog, 2023. március 28. Online: https://blogs.microsoft.com/blog/2023/03/28/introducing-microsoft-security-copilot-empowering-defenders-at-the-speed-of-ai/

MERRITT, Marian et al. (2024): Building a Cybersecurity and Privacy Learning Program. NIST SP 800-50r1. Gaithersburg: National Institute of Standards and Technology. Online: https://doi.org/10.6028/NIST.SP.800-50r1

MOUTON, Francios et al. (2014): Social Engineering Attack Framework. In 2014 Information Security for South Africa. 1–9. Online: https://doi.org/10.1109/ISSA.2014.6950510

NELSON, Connor – DOUPÉ, Adam – SHOSHITAISHVILI, Yan (2025). SENSAI: Large Language Models as Applied Cybersecurity Tutors. In Proceedings of the 56th ACM Technical Symposium on Computer Science Education 1. New York: Association for Computing Machinery, 833–839. Online: https://doi.org/10.1145/3641554.3701801

New Jersey Cybersecurity & Communications Integration Cell [é. n.]: ChatGPT and Its Impact on Cybersecurity. Online: https://www.cyber.nj.gov/guidance-and-best-practices/artificial-intelligence/chatgpt-and-its-impact-on-cybersecurity

Introducing ChatGPT Enterprise. OpenAI, 2023. augusztus 28. Online: https://openai.com/index/introducing-chatgpt-enterprise/

PETKAUSKAS, Vilius (2023): Lessons Learned From ChatGPT’s Samsung Leak. Cybernews, 2023. május 8. Online: https://cybernews.com/security/chatgpt-samsung-leak-explained-lessons/

Proofpoint (2023): 2023 Security Awareness Study. How Effective Are Your Awareness Programs – and Do Your Employees Agree? Information Security Media Group. Online: https://www.proofpoint.com/us/resources/analyst-reports/ismg-security-awareness-training-perception-study

SHAW, R. S. et al. (2009): The Impact of Information Richness on Information Security Awareness Training Effectiveness. Computers & Education, 52(1), 92–100. Online: https://doi.org/10.1016/j.compedu.2008.06.011

SlashNext (2023): State of Phishing. Online: https://www.prnewswire.com/news-releases/slashnexts-2023-state-of-phishing-report-reveals-a-1-265-increase-in-phishing-emails-since-the-launch-of-chatgpt-in-november-2022--signaling-a-new-era-of-cybercrime-fueled-by-generative-ai-301971557.html

Solving the Security Challenges of Retrieval-Augmented Generation (RAG). Polymer, 2025. január 31. Online: https://www.polymerhq.io/blog/ai/solving-the-security-challenges-of-retrieval-augmented-generation-rag/

Verizon (2024): 2023 Data Breach Investigations Report: Frequency and Cost of Social Engineering Attacks Skyrocket. Online: https://www.verizon.com/business/resources/reports/2023-data-breach-investigations-report-dbir.pdf

YOGARAJAH, Jesudhas – HOSSAIN, Gahangir (2025). The Concept of Cognitive CyTutor Utilizing Federated Learning for Cybersecurity Education. In 2025 IEEE 15th Annual Computing and Communication Workshop and Conference (CCWC). 681–690. Online: https://doi.org/10.1109/CCWC62904.2025.10903809