AI vs. AI: The Digital Duel Reshaping Fraud Detection (Published)
In the evolving landscape of financial security, a new battlefront has emerged: synthetic identity fraud powered by Generative Artificial Intelligence (GAI). This paper examines the high-stakes digital duel between fraudsters wielding GAI and the adaptive defense mechanisms of financial institutions. The paper explores how GAI-created synthetic identities challenge traditional fraud detection paradigms with convincing backstories, digital footprints, and AI-generated images. These artificial personas’ unprecedented scale and sophistication threaten to overwhelm existing security infrastructures, potentially compromising the integrity of financial systems and identity verification frameworks. Our analysis reveals large-scale synthetic identity campaigns’ far-reaching economic implications and disruptive potential across multiple sectors. It also investigates cutting-edge countermeasures, including adversarial machine learning, real-time anomaly detection, and multi-modal data analysis techniques. As this technological arms race intensifies, the paper concludes by proposing future research directions and emphasizing the critical need for collaborative initiatives to stay ahead in this ever-evolving digital battlefield.
Keywords: Cybersecurity, Fraud Detection, generative AI, machine learning, synthetic identities
Effects of People’s Mental Models of Cybersecurity on their Security Behaviour (Published)
This research investigates the effects of people’s mental modal of cybersecurity on their security behaviour. Data were collected using survey design and the questions were measured on a Likert five point-scale. The questionnaires were distributed to mainly IT staff, management staff and other staff that uses computers in the discharge of their duties. The data were analysed using percentages, frequencies and statistical methods of regression and ANOVA while Cronbach Alpha reliability coefficient technique was adopted to test the validity of the questions used to collect primary data. The result reveals that people’s prior knowledge of cybersecurity issues has no effect on people’s mental models for improved cybersecurity behaviour, but lack of trained staff (cyber talents), lack of supportive infrastructures, time constraints, exclusion of cybersecurity in non-computing courses, poor knowledge of fundamental computing areas, lack of mentors with hands-on experience, lack of cyber training or challenge programme, and inadequate books on cyber security were admitted by the participants as some of the major factors that inhibit their knowledge and engagement in cybersecurity education. These barriers if not checked could limit the level of cybersecurity awareness among undergraduate students.
Keywords: Cybersecurity, Mental Models., cyberspace, security behaviour
Utilization of Security Techniques for Cyber Warfare: KSA (Published)
Cyber warfare is considered mysterious targets of unknown sources that move through information and communication networks worldwide and use electronic weapons targeting information technology. They are directed against vital installations or invaded by agents of the intelligence services. Cybersecurity is one of the most significant digital technological breakthroughs that the world is now witnessing. It is considered the first weapon specialized in defending computers, electronic systems, and data from malicious attacks, servers, mobile devices, and networks. As a result, the goal of this research is to determine how Saudi Arabia uses security approaches for cyber warfare. The study adopted the descriptive method which addressed several aspects related to the strategies and security techniques for cyber warfare. The results indicate that the focus on cyber that pays importance to the possible countermeasures and preventive techniques that could be used to counter the risks of attackers, and discusses the encryption and watermark measures organizations can protect data against the illegal leak and hacking.
Citation: Ohoud S. Al-Harthi, Osama S. Faragallah, and Jehad F. Al-Amri (2021) Utilization of Security Techniques for Cyber Warfare: KSA, European Journal of Computer Science and Information Technology, Vol.9, No.4, pp.54-72,
Keywords: Cybersecurity, Encryption, cyber warfare, watermark