The Role of Using Artificial Intelligence Technologies in Improving Information Security: An Analytical Study on a Sample of Employees Working in the Banking Sector

Authors

  • Abeer Kadhim Oleiwi Al-Furat Al-Awsat Technical University, Najaf, Iraq.

DOI:

https://doi.org/10.62843/jssr.v5i3.591

Keywords:

Artificial Intelligence Technologies, Information Security, Commercial Banks

Abstract

This research aims to evaluate the impact of artificial intelligence (AI) technologies on information security in commercial banks. It focuses on understanding how these technologies contribute to enhancing protection and detection capabilities against cyber threats. The research relied on a quantitative approach, selecting a random sample of 152 accountants and technicians working in various commercial banks. Data was collected using a specially designed questionnaire and analyzed using SPSS. The results indicate a strong, positive relationship between the application of AI technologies and improved banking information security, confirming the effectiveness of these technologies in addressing growing security challenges. The research recommends that banks invest in and develop AI technologies, as well as train their staff on how to use them effectively, to ensure the highest levels of protection and security.

References

Al-Kilani, M. A. (2015). Information Security Management. Dar AlThaqafah for Publishing and Distribution.

Al-Najjar, F. J. (2018). Management information systems, an administrative perspective. Dar Al-Hamid for Publication and Distribution.

Alghizzawi, M., Ahmed, E., Alshaketheep, K., Alkhlaifat, B. I., & Alnawafleh, H. (2023). Rival influences of Airbnb digital platforms on the Jordanian hotels market. Migr. Lett, 20(8), 134–144.

Alloghani, M., Al-Jumeily, D., Mustafina, J., Hussain, A., & Aljaaf, A. J. (2020). A systematic review on supervised and unsupervised machine learning algorithms for data science. Supervised and unsupervised learning for data science, 3-21. https://doi.org/10.1007/978-3-030-22475-2_1

Angelopoulos, A., Michailidis, E. T., Nomikos, N., Trakadas, P., Hatziefremidis, A., Voliotis, S., & Zahariadis, T. (2019). Tackling faults in the Industry 4.0 era-A survey of machine-learning solutions and key aspects. Sensors (Basel, Switzerland), 20(1), 109. https://doi.org/10.3390/s20010109

Aziz, A. S. A., Salama, M., ella Hassanien, A., & Hanafi, S. E. O. (2012, September). Detectors generation using genetic algorithm for a negative selection inspired anomaly network intrusion detection system. In 2012 Federated Conference on Computer Science and Information Systems (FedCSIS) (pp. 597-602). IEEE.

Barman, D., & Kumar, G. (2012). Design of intrusion detection system based on artificial neural network and application of rough set. International Journal of Computer Science and Communication Networks, 2(4), 548–552.

Bivens, A., Palagiri, C., Smith, R., Szymanski, B., & Embrechts, M. (2002). Network-based intrusion detection using neural networks. Intelligent Engineering Systems through Artificial Neural Networks, 12(1), 579–584.

Brundage, M., Avin, S., Clark, J., Toner, H., Eckersley, P., Garfinkel, B., ... & Amodei, D. (2018). The malicious use of artificial intelligence: Forecasting, prevention, and mitigation. arXiv preprint arXiv:1802.07228. https://doi.org/10.48550/arXiv.1802.07228

C. Liu, J. Yang, Y. Zhang, R. Chen and J. Zeng, "Research on immunity-based intrusion detection technology for the Internet of Things," Seventh International Conference on Natural Computation, 2011.

Chakraborty, A., Alam, M., Dey, V., Chattopadhyay, A., & Mukhopadhyay, D. (2021). A survey on adversarial attacks and defences. CAAI Transactions on Intelligence Technology, 6(1), 25-45. https://doi.org/10.1049/cit2.12028

Chapple, M., Stewart, J. M., & Gibson, D. (2018). ISC) 2 CISSP certified information systems security professional official study guide. John Wiley & Sons.

Chimphlee, W., Abdullah, A. H., Sap, M. N. M., Srinoy, S., & Chimphlee, S. (2006, November). Anomaly-based intrusion detection using fuzzy rough clustering. In 2006 International Conference on Hybrid Information Technology (Vol. 1, pp. 329-334). IEEE.

Chowdhary, K. R. (2020). Fundamentals of artificial intelligence. Springer. https://doi.org/10.1007/978-81-322-3972-7

Deng, L., & Yu, D. (2014). Deep learning: methods and applications. Foundations and trends® in signal processing, 7(3–4), 197-387. http://dx.doi.org/10.1561/2000000039

Dhingra, M., Jain, M., & Jadon, R. S. (2016). Role of artificial intelligence in enterprise information security: A review. 2016 Fourth International Conference on Parallel, Distributed and Grid Computing (PDGC).

Forrest, S., Hofmeyr, S. A., & Somayaji, A. (1997). Computer immunology. Communications of the ACM, 40(10), 88–96. https://doi.org/10.1145/262793.262811

Golovko, V. A. (2017). Deep learning: an overview and main paradigms. Optical Memory and Neural Networks, 26, 1–17. https://doi.org/10.3103/S1060992X16040081

Immannavar, M., Pujar, P. M., & Suryavanshi, M. (2015). An Intrusion Detection Model Based on Fuzzy Membership Function Using GNP. International Journal of Research in Engineering and Technology, 4(8), 27-32.

Ji, H., Alfarraj, O., & Tolba, A. (2020). Artificial intelligence-empowered edge of vehicles: architecture, enabling technologies, and applications. IEEE Access, 8, 61020-61034. https://doi.org/10.1109/ACCESS.2020.2983609

Jongsuebsuk, P., Wattanapongsakorn, N., & Charnsripinyo, C. (2013, May). Real-time intrusion detection with fuzzy genetic algorithm. In 2013 10th International Conference on Electrical Engineering/Electronics, Computer, Telecommunications and Information Technology (pp. 1-6). IEEE.

Juma, S., Muda, Z., Mohamed, M. A., & Yassin, W. (2015). MACHINE LEARNING TECHNIQUES FOR INTRUSION DETECTION SYSTEM: A REVIEW. Journal of Theoretical & Applied Information Technology, 72(3).

Juma, S., Muda, Z., Mohamed, M. A., & Yassin, W. (2015). MACHINE LEARNING TECHNIQUES FOR INTRUSION DETECTION SYSTEM: A REVIEW. Journal of Theoretical & Applied Information Technology, 72(3).

Kaloudi, N., & Li, J. (2020). The ai-based cyber threat landscape: A survey. ACM Computing Surveys (CSUR), 53(1), 1-34. https://doi.org/10.1145/3372823

Kritzinger, E., & Smith, E. (2008). Information security management: An information security retrieval and awareness model for industry. Computers & Security, 27(5–6), 224–231. https://doi.org/10.1016/j.cose.2008.05.006

Li, J. H. (2018). Cyber security meets artificial intelligence: a survey. Frontiers of Information Technology & Electronic Engineering, 19(12), 1462-1474. https://doi.org/10.1631/FITEE.1800573

Li, W. (2004). Using genetic algorithm for network intru sion detection. Proceedings of the United States department of energy cyber security group, 1(1), 8. http://bit.csc.lsu.edu/~jianhua/krish-1.pdf

Luck, M., McBurney, P., & Preist, C. (2003). Agent technology: enabling next generation computing (a roadmap for agent based computing). AgentLink. https://eprints.soton.ac.uk/257309/1/al2roadmap.pdf

McIlwraith, A. (2021). Information security and employee behaviour: How to reduce risk through employee education, training and awareness (2nd ed.). https://doi.org/10.4324/9780429281785

Moradi, M., & Zulkernine, M. (2004, November). A neural network based system for intrusion detection and classification of attacks. In Proceedings of the IEEE international conference on advances in intelligent systems-theory and applications (pp. 15-18). IEEE Lux-embourg-Kirchberg, Luxembourg.

Novikov, I. (2018). How AI can be applied to cyberattacks. Retrieved Novemb, 25, 2019.

Ojugo, A. A., Eboka, A. O., Okonta, O., Yoro, R., & Aghware, F. (2012). Genetic algorithm rule-based intrusion detection system (GAIDS). Journal of Emerging Trends in Computing and Information Sciences, 3(8), 1182-1194.

Panda, M., Abraham, A., Das, S., & Patra, M. R. (2011). Network intrusion detection system: A machine learning approach. Intelligent Decision Technologies, 5(4), 347–356. https://doi.org/10.3233/idt-2011-0117

PK, F. A. (1984). What is artificial intelligence?. Success is no accident. It is hard work, perseverance, learning, studying, sacrifice and most of all, love of what you are doing or learning to do, 65, 85-108.

Tipton, H. (2019). Information security management handbook: Volume IV (H. Tipton & M. KrauseBoca Raton, Eds.; 4th ed.). https://doi.org/10.1201/9780203325438

Trifonov, R., Nakov, O., & Mladenov, V. (2018, December). Artificial intelligence in cyber threats intelligence. In 2018 international conference on intelligent and innovative computing applications (ICONIC) (pp. 1-4). IEEE. https://doi.org/10.1109/ICONIC.2018.8601235

Veselý, A., & Brechlerova, D. (2009). Neural networks in intrusion detection systems. Agricultural Economics, 50, 35-50. https://www.agriculturejournals.cz/pdfs/age/2004/01/06.pdf

Von Solms, R., & Van Niekerk, J. (2013). From information security to cyber security. computers & security, 38, 97-102. https://doi.org/10.1016/j.cose.2013.04.004

Wang, P. (2019). On defining artificial intelligence. Journal of Artificial General Intelligence, 10(2), 1–37. https://doi.org/10.2478/jagi-2019-0002

Yuan, X. (2017, May). Phd forum: Deep learning-based real-time malware detection with multi-stage analysis. In 2017 IEEE International Conference on Smart Computing (SMARTCOMP) (pp. 1-2). IEEE. https://doi.org/10.1109/SMARTCOMP.2017.7946997

Downloads

Published

2025-10-09

Issue

Section

Articles

How to Cite

The Role of Using Artificial Intelligence Technologies in Improving Information Security: An Analytical Study on a Sample of Employees Working in the Banking Sector. (2025). Journal of Social Sciences Review, 5(3), 252-264. https://doi.org/10.62843/jssr.v5i3.591