EconPapers    
Economics at your fingertips  
 

Examining generational impacts of machine learning, artificial intelligence, generative AI and deepfake-based social engineering cybercrime

Christopher S. Kayser
Additional contact information
Christopher S. Kayser: Cybercrime Analytics, Canada

Cyber Security: A Peer-Reviewed Journal, 2025, vol. 9, issue 2, 188-202

Abstract: Social engineering (SE) has been used as an effective technique for decades to extract information from individuals for malicious purposes. Machine learning (ML), artificial intelligence (AI), generative AI (GenAI) and deepfakes provide advanced technologies and tools for cybercriminals to increase the probability of a successful cyberattack. Our ability to detect that we are being maliciously manipulated is becoming increasingly difficult as these technologies are incorporated into SE-based cyberattacks. This paper examines the positive and negative aspects of ML, AI and GenAI, reviews existing literature about these technologies and presents a brief introduction of the technical aspects of ML, AI and deepfakes. The decision model Required Elements for a Social Engineered Cyber Attack Theory examines our decision processes when confronted by a SE-based cyberattack, and how simple decisions can become more complicated when influenced by AI. Examples of generation-specific AI-based scams are examined to describe techniques bad actors are using to victimise specific age groups. The conclusion offers recommendations that technology users can adopt to reduce their exposure of being victimised by AI-based SE cyberattacks.

Keywords: artificial intelligence; AI; decision processing; deepfakes; generative AI; GenAI; machine learning; ML; RESCAT; social engineering; SE (search for similar items in EconPapers)
JEL-codes: M15 (search for similar items in EconPapers)
Date: 2025
References: Add references at CitEc
Citations:

Downloads: (external link)
https://hstalks.com/article/10274/download/ (application/pdf)
https://hstalks.com/article/10274/ (text/html)
Requires a paid subscription for full access.

Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.

Export reference: BibTeX RIS (EndNote, ProCite, RefMan) HTML/Text

Persistent link: https://EconPapers.repec.org/RePEc:aza:csj000:y:2025:v:9:i:2:p:188-202

Access Statistics for this article

More articles in Cyber Security: A Peer-Reviewed Journal from Henry Stewart Publications
Bibliographic data for series maintained by Henry Stewart Talks ().

 
Page updated 2025-10-26
Handle: RePEc:aza:csj000:y:2025:v:9:i:2:p:188-202