Hedvig Szabรณ – University of Gyลr, Deรกk Ferenc Faculty of Law and Political Sciences, รldozat utca 12., 9026 Gyลr, Hungary
Keywords:
Artificial intelligence;
Business security strategy;
Cybersecurity
Abstract: The rapid advancement of technology and the digital transformaยญtion of the business environment have introduced new vulnerabilities, makยญing cybersecurity a paramount concern for companies worldwide. This paper explores the evolving nature of cyber threats, with a particular focus on the rise of artificial intelligence (AI) in facilitating cyberattacks. Utilizing a combiยญnation of theoretical analysis, including the PESTEL framework, and empiriยญcal data from a survey of Information and Communication Technology (ICT) company leaders in Hungary, this study underscores the dual role of AI in cyยญbersecurity. AI not only enhances the capabilities of cyber defense mechaยญnisms but also significantly amplifies the potential and sophistication of cyยญberattacks. The research findings indicate a noticeable increase in AI-led cyยญberattacks, which are characterized by their complexity and the challenge they pose to traditional cybersecurity defenses. This trend necessitates a straยญtegic shift in how businesses approach their security strategies, integrating advanced technological solutions and adopting a proactive stance toward identifying and mitigating emerging threats. The paper concludes with recยญommendations for future research directions, emphasizing the need for conยญtinuous adaptation and the integration of cybersecurity considerations into the broader strategic planning process of companies.

Download full paper

8th International Scientific Conference – EMAN 2024 – Economics and Management: How to Cope With Disrupted Times, Rome, Italy, March 21, 2024, CONFERENCE PROCEEDINGS, published by: Association of Economists and Managers of the Balkans, Belgrade, Serbia; ISBN 978-86-80194-83-7, ISSN 2683-4510, DOI: https://doi.org/10.31410/EMAN.2024
Creative Commons Nonย Commercial CC BY-NC: This article is distributed under the terms of the Creative Commons Attribution-Non-Commercial 4.0 License (https://creativecommons.org/licenses/by-nc/4.0/) which permits non-commercial use, reproduction and distribution of the work without further permission.ย
REFERENCES
Aslan, ร., Ozkan-Okay, M., & Gupta, D. (2021). A Review of Cloud-Based Malware Detection System: Opportunities, Advances and Challenges. European Journal of Engineering and Technology Research, 6(3), Article 3. https://doi.org/10.24018/ejeng.2021.6.3.2372ย
Burton, J., & Lain, C. (2020). Desecuritising cybersecurity: Towards a societal approach. Jourยญnal of Cyber Policy, 5(3), 449โ470. https://doi.org/10.1080/23738871.2020.1856903ย
Buzan, B. (2000). Rethinking Security after the Cold War. In National and International Secuยญrity. Routledge.
Duo, W., Zhou, M., & Abusorrah, A. (2022). A Survey of Cyber Attacks on Cyber Physical Sysยญtems: Recent Advances and Challenges. IEEE/CAA Journal of Automatica Sinica, 9(5), 784โ800. https://doi.org/10.1109/JAS.2022.105548ย
Howard, R. (2023). Cybersecurity First Principles: A Reboot of Strategy and Tactics. John Wiley & Sons.
Luo, Y. (2022). A general framework of digitization risks in international business. Journal of International Business Studies, 53(2), 344โ361. https://doi.org/10.1057/s41267-021-00448-9ย
Malicious Uses and Abuses of Artificial Intelligence. (2023). https://documents.trendmicro.com/assets/white_papers/wp-malicious-uses-and-abuses-of-artificial-intelligence.pdfย ย
Mascellino, A. (2023, September 12). Cyber-criminals โJailbreakโ AI Chatbots For Maยญlicious Ends. Infosecurity Magazine. https://www.infosecurity-magazine.com/news/cybercriminals-jailbreak-ai/ย ย
Pisano, G. P. (2015, June 1). You Need an Innovation Strategy. Harvard Business Review. https://hbr.org/2015/06/you-need-an-innovation-strategyย ย
Roser, M., Ritchie, H., & Mathieu, E. (2024). What is Mooreโs Law? Our World in Data. https://ourworldindata.org/moores-lawย
Sabri, S., Gani, A., Shuib, L., & Yadegaridehkordi, E. (2018). COMRAP 2018.
Wang, P., Gao, H., Guo, X., Xiao, C., Qi, F., & Yan, Z. (2023). An Experimental Investigation of Text-based CAPTCHA Attacks and Their Robustness. ACM Computing Surveys, 55(9), 196:1-196:38. https://doi.org/10.1145/3559754ย
Yamin, M. M., Ullah, M., Ullah, H., & Katt, B. (2021). Weaponized AI for cyberattacks. Journal of Information Security and Applications, 57, 102722. https://doi.org/10.1016/j.jisa.2020.102722ย ย
