Role of Artificial Intelligence in the Detection of Social Engineering Attacks
Oluwatosin Temitope Ogunlade ()
European Journal of Technology, 2025, vol. 9, issue 1, 86-97
Abstract:
Purpose: Social engineering attacks are a major concern in cybersecurity, leveraging human psychology to access sensitive information or systems without authorization. Phishing, Chief Executive Officer (CEO) scams, and deep-fake impersonation have resulted in enormous financial and reputational loss to organizations globally. All these have proved conventional security systems to be inadequate in countering the highly developed and targeted methods used by cybercriminals. This paper therefore highlights the potentials of Artificial Intelligence (AI) to improve the detection and prevention of social engineering attacks. Materials and Methods: Popular real-life cases were subjected to critical analysis together with AI tools such as Predictive analytics, AI powered voice, in addition to Multi-modal detection and Natural Language Processing based (NLP-based) fraud detection. Findings: AI tools were seen to have prevented and provided complete defense against social engineering attacks. Predictive analytics permits pre-emptive detection of threats, with the potential to anticipate attacks and eliminate them before they are launched. Multi-modal detection systems, including NLP to analyze email phishing and voice forensics to detect synthesized voices by probing several communication avenues together. Unique Contribution to Theory, Practice and Policy: This paper explores how integrating behavioral science with AI-driven detection systems can help organizations identify psychologically targeted threats, implement adaptive threat detection and strengthen security frameworks through intelligent preventive strategies. This paper also illustrates how the integration of AI in cybersecurity systems enables organizations adopt more adaptive and proactive security postures, thereby countering social engineering threats and enhancing overall security resilience.
Date: 2025
References: Add references at CitEc
Citations:
Downloads: (external link)
https://ajpojournals.org/journals/EJT/article/view/2790 (application/pdf)
Access to full texts is restricted to European Journal of Technology
Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.
Export reference: BibTeX
RIS (EndNote, ProCite, RefMan)
HTML/Text
Persistent link: https://EconPapers.repec.org/RePEc:bfy:ojtejt:v:9:y:2025:i:1:p:86-97:id:2790
Access Statistics for this article
More articles in European Journal of Technology from AJPO Journals Limited
Bibliographic data for series maintained by Chief Editor ().