Hedvig SzabΓ³ β University of GyΕr, DeΓ‘k Ferenc Faculty of Law and Political Sciences, Γldozat utca 12., 9026 GyΕr, Hungary
Keywords:
Artificial intelligence;
Business security strategy;
Cybersecurity
Abstract: The rapid advancement of technology and the digital transformaΒtion of the business environment have introduced new vulnerabilities, makΒing cybersecurity a paramount concern for companies worldwide. This paper explores the evolving nature of cyber threats, with a particular focus on the rise of artificial intelligence (AI) in facilitating cyberattacks. Utilizing a combiΒnation of theoretical analysis, including the PESTEL framework, and empiriΒcal data from a survey of Information and Communication Technology (ICT) company leaders in Hungary, this study underscores the dual role of AI in cyΒbersecurity. AI not only enhances the capabilities of cyber defense mechaΒnisms but also significantly amplifies the potential and sophistication of cyΒberattacks. The research findings indicate a noticeable increase in AI-led cyΒberattacks, which are characterized by their complexity and the challenge they pose to traditional cybersecurity defenses. This trend necessitates a straΒtegic shift in how businesses approach their security strategies, integrating advanced technological solutions and adopting a proactive stance toward identifying and mitigating emerging threats. The paper concludes with recΒommendations for future research directions, emphasizing the need for conΒtinuous adaptation and the integration of cybersecurity considerations into the broader strategic planning process of companies.

Download full paper

8th International Scientific Conference β EMAN 2024 β Economics and Management: How to Cope With Disrupted Times, Rome, Italy, March 21, 2024, CONFERENCE PROCEEDINGS, published by: Association of Economists and Managers of the Balkans, Belgrade, Serbia; ISBN 978-86-80194-83-7, ISSN 2683-4510, DOI: https://doi.org/10.31410/EMAN.2024
Creative Commons Non Commercial CC BY-NC: This article is distributed under the terms of the Creative Commons Attribution-Non-Commercial 4.0 License (https://creativecommons.org/licenses/by-nc/4.0/) which permits non-commercial use, reproduction and distribution of the work without further permission.
REFERENCES
Aslan, Γ., Ozkan-Okay, M., & Gupta, D. (2021). A Review of Cloud-Based Malware Detection System: Opportunities, Advances and Challenges. European Journal of Engineering and Technology Research, 6(3), Article 3. https://doi.org/10.24018/ejeng.2021.6.3.2372
Burton, J., & Lain, C. (2020). Desecuritising cybersecurity: Towards a societal approach. JourΒnal of Cyber Policy, 5(3), 449β470. https://doi.org/10.1080/23738871.2020.1856903
Buzan, B. (2000). Rethinking Security after the Cold War. In National and International SecuΒrity. Routledge.
Duo, W., Zhou, M., & Abusorrah, A. (2022). A Survey of Cyber Attacks on Cyber Physical SysΒtems: Recent Advances and Challenges. IEEE/CAA Journal of Automatica Sinica, 9(5), 784β800. https://doi.org/10.1109/JAS.2022.105548
Howard, R. (2023). Cybersecurity First Principles: A Reboot of Strategy and Tactics. John Wiley & Sons.
Luo, Y. (2022). A general framework of digitization risks in international business. Journal of International Business Studies, 53(2), 344β361. https://doi.org/10.1057/s41267-021-00448-9
Malicious Uses and Abuses of Artificial Intelligence. (2023). https://documents.trendmicro.com/assets/white_papers/wp-malicious-uses-and-abuses-of-artificial-intelligence.pdf
Mascellino, A. (2023, September 12). Cyber-criminals βJailbreakβ AI Chatbots For MaΒlicious Ends. Infosecurity Magazine. https://www.infosecurity-magazine.com/news/cybercriminals-jailbreak-ai/
Pisano, G. P. (2015, June 1). You Need an Innovation Strategy. Harvard Business Review. https://hbr.org/2015/06/you-need-an-innovation-strategy
Roser, M., Ritchie, H., & Mathieu, E. (2024). What is Mooreβs Law? Our World in Data. https://ourworldindata.org/moores-law
Sabri, S., Gani, A., Shuib, L., & Yadegaridehkordi, E. (2018). COMRAP 2018.
Wang, P., Gao, H., Guo, X., Xiao, C., Qi, F., & Yan, Z. (2023). An Experimental Investigation of Text-based CAPTCHA Attacks and Their Robustness. ACM Computing Surveys, 55(9), 196:1-196:38. https://doi.org/10.1145/3559754
Yamin, M. M., Ullah, M., Ullah, H., & Katt, B. (2021). Weaponized AI for cyberattacks. Journal of Information Security and Applications, 57, 102722. https://doi.org/10.1016/j.jisa.2020.102722
