Understanding and Combating IVR Phishing in the Age of AI


Authors : Almahyawi, Rami K.

Volume/Issue : Volume 10 - 2025, Issue 10 - October


Google Scholar : https://tinyurl.com/y9skh72z

Scribd : https://tinyurl.com/fcdcznfv

DOI : https://doi.org/10.38124/ijisrt/25oct654

Note : A published paper may take 4-5 working days from the publication date to appear in PlumX Metrics, Semantic Scholar, and ResearchGate.

Note : Google Scholar may take 30 to 40 days to display the article.


Abstract : This comprehensive paper examines the growing threat of Interactive Voice Response (IVR) phishing, commonly known as vishing, in the contemporary digital landscape. The research explores the mechanisms of IVR phishing attacks, the escalating role of artificial intelligence in enhancing these scams, and practical defense strategies for individuals and organizations. Through analysis of current trends and emerging technologies, this study provides a multi-layered approach to combating this sophisticated form of social engineering that threatens financial security and personal privacy.

References :

  1. Federal Bureau of Investigation (FBI). "Scams and Safety." Retrieved from https://www.fbi.gov/how-we-can-help-you/scams-and-safety
  2. Federal Deposit Insurance Corporation (FDIC). "Avoiding Scams and Scammers." Retrieved from https://www.fdic.gov/consumer-resource-center/2021-10/avoiding-scams-and-scammers
  3. Consumer Financial Protection Bureau (CFPB). "Fraud and Scams." Retrieved from https://www.consumerfinance.gov/consumer-tools/fraud
  4. Nuatech. "What is IVR Phishing, and How Can I Avoid It?" Retrieved from https://nuatech.uk/ivr-phishing-understanding-and-preventing-automated-phone-scams
  5. Sota Solutions. "What is IVR Phishing, and How Can I Avoid It?" Retrieved from https://sota.co.uk/what-is-ivr-phishing
  6. Ozkaya, E. (2018). "Learn Social Engineering." O'Reilly Media.
  7. US Payments Forum. "Interactive Voice Response (IVR) Voice Verification." Retrieved from https://www.uspaymentsforum.org/wp-content/uploads/2022/05/Interactive-Voice-Response-IVR-Voice-Verification-2022_legal.pdf
  8. Yeboah-Boateng, E. O., & Amanor, P. M. (2020). "Phishing, SMishing & Vishing: An Assessment of Threats against Mobile Devices." Journal of Cybersecurity Research.
  9. JCBI. "Exploring Phishing Attacks in the AI Age: A Comprehensive Literature Review." Retrieved from https://jcbi.org/index.php/Main/article/download/567/534
  10. MDPI. "Phishing Attacks in the Age of Generative Artificial Intelligence: A Systematic Review of Human Factors." Retrieved from https://www.mdpi.com/2673-2688/6/8/174
  11. Academic Conferences International. "What The Phish: Effects of AI on Phishing Attacks and Defense." Retrieved from https://papers.academic-conferences.org/index.php/cair/article/download/3224/2935/1448
  12. Datos Insights. "Beating the Bad Guys: Safe and Secure Voice Interactions in the IVR." Retrieved from https://datos-insights.com/reports/beating-the-bad-guys-safe-and-secure-voice-interactions-in-the-ivr
  13. Association of Certified Fraud Examiners (ACFE). "Fraud Resources." Retrieved from https://www.acfe.com/fraud-resources
  14. Insights2TechInfo. "Phishing Scams in the Age of AI: More Deceptive than Ever." Retrieved from https://insights2techinfo.com/phishing-scams-in-the-age-of-ai-more-deceptive-than-ever  [[18]](https://papers.academic-conferences.org/index.php/icair/article/download/3224/2935/11448)
  15. MDPI. "Phishing Attacks in the Age of Generative Artificial Intelligence: A Systematic Review of Human Factors." [https://www.mdpi.com/2673-2688/6/8/174](https://www.mdpi.com/2673-2688/6/8/174) [[19]](https://www.mdpi.com/2673-2688/6/8/174)
  16. SciTePress. "Phishing Through Time: A Ten Year Story based on Abstracts." [https://www.scitepress.org/papers/2018/65526/65526.pdf](https://www.scitepress.org/papers/2018/65526/65526.pdf) [[20]](https://www.scitepress.org/papers/2018/65526/65526.pdf)

This comprehensive paper examines the growing threat of Interactive Voice Response (IVR) phishing, commonly known as vishing, in the contemporary digital landscape. The research explores the mechanisms of IVR phishing attacks, the escalating role of artificial intelligence in enhancing these scams, and practical defense strategies for individuals and organizations. Through analysis of current trends and emerging technologies, this study provides a multi-layered approach to combating this sophisticated form of social engineering that threatens financial security and personal privacy.

CALL FOR PAPERS


Paper Submission Last Date
31 - December - 2025

Video Explanation for Published paper

Never miss an update from Papermashup

Get notified about the latest tutorials and downloads.

Subscribe by Email

Get alerts directly into your inbox after each post and stay updated.
Subscribe
OR

Subscribe by RSS

Add our RSS to your feedreader to get regular updates from us.
Subscribe