Authors :
Almahyawi, Rami K.
Volume/Issue :
Volume 10 - 2025, Issue 10 - October
Google Scholar :
https://tinyurl.com/y9skh72z
Scribd :
https://tinyurl.com/fcdcznfv
DOI :
https://doi.org/10.38124/ijisrt/25oct654
Note : A published paper may take 4-5 working days from the publication date to appear in PlumX Metrics, Semantic Scholar, and ResearchGate.
Note : Google Scholar may take 30 to 40 days to display the article.
Abstract :
This comprehensive paper examines the growing threat of Interactive Voice Response (IVR) phishing, commonly
known as vishing, in the contemporary digital landscape. The research explores the mechanisms of IVR phishing attacks,
the escalating role of artificial intelligence in enhancing these scams, and practical defense strategies for individuals and
organizations. Through analysis of current trends and emerging technologies, this study provides a multi-layered approach
to combating this sophisticated form of social engineering that threatens financial security and personal privacy.
References :
- Federal Bureau of Investigation (FBI). "Scams and Safety." Retrieved from https://www.fbi.gov/how-we-can-help-you/scams-and-safety
- Federal Deposit Insurance Corporation (FDIC). "Avoiding Scams and Scammers." Retrieved from https://www.fdic.gov/consumer-resource-center/2021-10/avoiding-scams-and-scammers
- Consumer Financial Protection Bureau (CFPB). "Fraud and Scams." Retrieved from https://www.consumerfinance.gov/consumer-tools/fraud
- Nuatech. "What is IVR Phishing, and How Can I Avoid It?" Retrieved from https://nuatech.uk/ivr-phishing-understanding-and-preventing-automated-phone-scams
- Sota Solutions. "What is IVR Phishing, and How Can I Avoid It?" Retrieved from https://sota.co.uk/what-is-ivr-phishing
- Ozkaya, E. (2018). "Learn Social Engineering." O'Reilly Media.
- US Payments Forum. "Interactive Voice Response (IVR) Voice Verification." Retrieved from https://www.uspaymentsforum.org/wp-content/uploads/2022/05/Interactive-Voice-Response-IVR-Voice-Verification-2022_legal.pdf
- Yeboah-Boateng, E. O., & Amanor, P. M. (2020). "Phishing, SMishing & Vishing: An Assessment of Threats against Mobile Devices." Journal of Cybersecurity Research.
- JCBI. "Exploring Phishing Attacks in the AI Age: A Comprehensive Literature Review." Retrieved from https://jcbi.org/index.php/Main/article/download/567/534
- MDPI. "Phishing Attacks in the Age of Generative Artificial Intelligence: A Systematic Review of Human Factors." Retrieved from https://www.mdpi.com/2673-2688/6/8/174
- Academic Conferences International. "What The Phish: Effects of AI on Phishing Attacks and Defense." Retrieved from https://papers.academic-conferences.org/index.php/cair/article/download/3224/2935/1448
- Datos Insights. "Beating the Bad Guys: Safe and Secure Voice Interactions in the IVR." Retrieved from https://datos-insights.com/reports/beating-the-bad-guys-safe-and-secure-voice-interactions-in-the-ivr
- Association of Certified Fraud Examiners (ACFE). "Fraud Resources." Retrieved from https://www.acfe.com/fraud-resources
- Insights2TechInfo. "Phishing Scams in the Age of AI: More Deceptive than Ever." Retrieved from https://insights2techinfo.com/phishing-scams-in-the-age-of-ai-more-deceptive-than-ever [[18]](https://papers.academic-conferences.org/index.php/icair/article/download/3224/2935/11448)
- MDPI. "Phishing Attacks in the Age of Generative Artificial Intelligence: A Systematic Review of Human Factors." [https://www.mdpi.com/2673-2688/6/8/174](https://www.mdpi.com/2673-2688/6/8/174) [[19]](https://www.mdpi.com/2673-2688/6/8/174)
- SciTePress. "Phishing Through Time: A Ten Year Story based on Abstracts." [https://www.scitepress.org/papers/2018/65526/65526.pdf](https://www.scitepress.org/papers/2018/65526/65526.pdf) [[20]](https://www.scitepress.org/papers/2018/65526/65526.pdf)
This comprehensive paper examines the growing threat of Interactive Voice Response (IVR) phishing, commonly
known as vishing, in the contemporary digital landscape. The research explores the mechanisms of IVR phishing attacks,
the escalating role of artificial intelligence in enhancing these scams, and practical defense strategies for individuals and
organizations. Through analysis of current trends and emerging technologies, this study provides a multi-layered approach
to combating this sophisticated form of social engineering that threatens financial security and personal privacy.