Enhancing the Incident Response Capabilities of the UAE Critical Infrastructure Against Phishing Cyber Security Threat: An AI-Based Approach

dc.contributor.authorBushra Rwashdeh
dc.contributor.authorAhmed Awad
dc.contributor.authorUsman Butt
dc.date.accessioned2025-05-31T11:09:50Z
dc.date.available2025-05-31T11:09:50Z
dc.date.issued2025
dc.description.abstractPhishing attacks pose a significant threat to critical infrastructure in the UAE. This study proposes an AI-driven approach to enhance incident response capabilities against such threats. The research adapts the Technology Threat Avoidance Theory (TTAT) to an organizational context and develops a machine learning model for phishing detection and response. This research contributes to both theory and practice by extending TTAT and creating an AI prototype tailored to the UAE's critical infrastructure needs. The study employs a design science approach, incorporating qualitative evaluations from UAE experts to refine the model. This research aims to strengthen organizational resilience and contribute to the UAE's national cybersecurity objectives.
dc.identifier.citationRwashdeh, B., Awad, A., Butt, U. (2025). Enhancing the Incident Response Capabilities of the UAE Critical Infrastructure Against Phishing Cyber Security Threat: An AI-Based Approach. In: Al Marri, K., Mir, F.A., Awad, A., Abubakar, A. (eds) BUiD Doctoral Research Conference 2024. BDRC 2024. Lecture Notes in Civil Engineering, vol 587. Springer, Cham. https://doi.org/10.1007/978-3-031-84371-6_16
dc.identifier.isbnHB: 9783031843709 eBook: 9783031843716
dc.identifier.urihttps://bspace.buid.ac.ae/handle/1234/3154
dc.language.isoen
dc.publisherSpringer Cham
dc.relation.ispartofseriesLecture Notes in Civil Engineering; 587
dc.titleEnhancing the Incident Response Capabilities of the UAE Critical Infrastructure Against Phishing Cyber Security Threat: An AI-Based Approach
dc.typeBook chapter
Files
License bundle
Now showing 1 - 1 of 1
Name:
license.txt
Size:
1.35 KB
Format:
Item-specific license agreed upon to submission
Description: