Customize Consent Preferences

We use cookies to help you navigate efficiently and perform certain functions. You will find detailed information about all cookies under each consent category below.

The cookies that are categorized as "Necessary" are stored on your browser as they are essential for enabling the basic functionalities of the site. ... 

Always Active

Necessary cookies are required to enable the basic features of this site, such as providing secure log-in or adjusting your consent preferences. These cookies do not store any personally identifiable data.

No cookies to display.

Functional cookies help perform certain functionalities like sharing the content of the website on social media platforms, collecting feedback, and other third-party features.

No cookies to display.

Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics such as the number of visitors, bounce rate, traffic source, etc.

No cookies to display.

Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.

No cookies to display.

Advertisement cookies are used to provide visitors with customized advertisements based on the pages you visited previously and to analyze the effectiveness of the ad campaigns.

No cookies to display.

Hedvig SzabΓ³ – University of GyΕ‘r, DeΓ‘k Ferenc Faculty of Law and Political Sciences, Áldozat utca 12., 9026 GyΕ‘r, Hungary

Keywords:
Artificial intelligence;
Business security strategy;
Cybersecurity

DOI: https://doi.org/10.31410/EMAN.2024.259

Abstract: The rapid advancement of technology and the digital transformaΒ­tion of the business environment have introduced new vulnerabilities, makΒ­ing cybersecurity a paramount concern for companies worldwide. This paper explores the evolving nature of cyber threats, with a particular focus on the rise of artificial intelligence (AI) in facilitating cyberattacks. Utilizing a combiΒ­nation of theoretical analysis, including the PESTEL framework, and empiriΒ­cal data from a survey of Information and Communication Technology (ICT) company leaders in Hungary, this study underscores the dual role of AI in cyΒ­bersecurity. AI not only enhances the capabilities of cyber defense mechaΒ­nisms but also significantly amplifies the potential and sophistication of cyΒ­berattacks. The research findings indicate a noticeable increase in AI-led cyΒ­berattacks, which are characterized by their complexity and the challenge they pose to traditional cybersecurity defenses. This trend necessitates a straΒ­tegic shift in how businesses approach their security strategies, integrating advanced technological solutions and adopting a proactive stance toward identifying and mitigating emerging threats. The paper concludes with recΒ­ommendations for future research directions, emphasizing the need for conΒ­tinuous adaptation and the integration of cybersecurity considerations into the broader strategic planning process of companies.

Download full paper

8th International Scientific Conference – EMAN 2024 – Economics and Management: How to Cope With Disrupted Times, Rome, Italy, March 21, 2024, CONFERENCE PROCEEDINGS, published by: Association of Economists and Managers of the Balkans, Belgrade, Serbia; ISBN 978-86-80194-83-7, ISSN 2683-4510, DOI: https://doi.org/10.31410/EMAN.2024

Creative Commons Non Commercial CC BY-NC: This article is distributed under the terms of the Creative Commons Attribution-Non-Commercial 4.0 License (https://creativecommons.org/licenses/by-nc/4.0/) which permits non-commercial use, reproduction and distribution of the work without further permission. 

Suggested citation

SzabΓ³, H. (2024). AI-Led Attacks in the Field of Business. In C. A. Nastase, A. Monda, & R. Dias (Eds.), International Scientific Conference – EMAN 2024: Vol 8. Conference Proceedings (pp. 259-265). Association of Economists and Managers of the Balkans. https://doi.org/10.31410/EMAN.2024.259

REFERENCES

Aslan, Γ–., Ozkan-Okay, M., & Gupta, D. (2021). A Review of Cloud-Based Malware Detection System: Opportunities, Advances and Challenges. European Journal of Engineering and Technology Research, 6(3), Article 3. https://doi.org/10.24018/ejeng.2021.6.3.2372 

Burton, J., & Lain, C. (2020). Desecuritising cybersecurity: Towards a societal approach. JourΒ­nal of Cyber Policy, 5(3), 449–470. https://doi.org/10.1080/23738871.2020.1856903 

Buzan, B. (2000). Rethinking Security after the Cold War. In National and International SecuΒ­rity. Routledge.

Duo, W., Zhou, M., & Abusorrah, A. (2022). A Survey of Cyber Attacks on Cyber Physical SysΒ­tems: Recent Advances and Challenges. IEEE/CAA Journal of Automatica Sinica, 9(5), 784–800. https://doi.org/10.1109/JAS.2022.105548 

Howard, R. (2023). Cybersecurity First Principles: A Reboot of Strategy and Tactics. John Wiley & Sons.

Luo, Y. (2022). A general framework of digitization risks in international business. Journal of International Business Studies, 53(2), 344–361. https://doi.org/10.1057/s41267-021-00448-9 

Malicious Uses and Abuses of Artificial Intelligence. (2023). https://documents.trendmicro.com/assets/white_papers/wp-malicious-uses-and-abuses-of-artificial-intelligence.pdf  

Mascellino, A. (2023, September 12). Cyber-criminals β€œJailbreak” AI Chatbots For MaΒ­licious Ends. Infosecurity Magazine. https://www.infosecurity-magazine.com/news/cybercriminals-jailbreak-ai/  

Pisano, G. P. (2015, June 1). You Need an Innovation Strategy. Harvard Business Review. https://hbr.org/2015/06/you-need-an-innovation-strategy  

Roser, M., Ritchie, H., & Mathieu, E. (2024). What is Moore’s Law? Our World in Data. https://ourworldindata.org/moores-law 

Sabri, S., Gani, A., Shuib, L., & Yadegaridehkordi, E. (2018). COMRAP 2018.

Wang, P., Gao, H., Guo, X., Xiao, C., Qi, F., & Yan, Z. (2023). An Experimental Investigation of Text-based CAPTCHA Attacks and Their Robustness. ACM Computing Surveys, 55(9), 196:1-196:38. https://doi.org/10.1145/3559754 

Yamin, M. M., Ullah, M., Ullah, H., & Katt, B. (2021). Weaponized AI for cyberattacks. Journal of Information Security and Applications, 57, 102722. https://doi.org/10.1016/j.jisa.2020.102722  

Share this