{"title":"Using AI to combat fraud in the voice channel","authors":"Amit Gupta","doi":"10.12968/s1361-3723(22)70590-8","DOIUrl":null,"url":null,"abstract":"Whether it's an attempt to defraud individuals by accessing their bank accounts, or a large-scale attack on an organisation targeting huge volumes of data, identity is at the heart of most sophisticated criminal activity today. And while most online channels have been continually strengthened to stay ahead of evolving criminal tactics, the voice channel – another critical customer connection point – has increasingly come to be seen as a vulnerable target.","PeriodicalId":35636,"journal":{"name":"Computer Fraud and Security","volume":"55 1","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2022-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Computer Fraud and Security","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.12968/s1361-3723(22)70590-8","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"Social Sciences","Score":null,"Total":0}
引用次数: 0
Abstract
Whether it's an attempt to defraud individuals by accessing their bank accounts, or a large-scale attack on an organisation targeting huge volumes of data, identity is at the heart of most sophisticated criminal activity today. And while most online channels have been continually strengthened to stay ahead of evolving criminal tactics, the voice channel – another critical customer connection point – has increasingly come to be seen as a vulnerable target.
期刊介绍:
Computer Fraud & Security has grown with the fast-moving information technology industry and has earned a reputation for editorial excellence with IT security practitioners around the world. Every month Computer Fraud & Security enables you to see the threats to your IT systems before they become a problem. It focuses on providing practical, usable information to effectively manage and control computer and information security within commercial organizations.