Effectiveness of Artificial Intelligence
Effectiveness of Artificial Intelligence
a r t i c l e i n f o a b s t r a c t
Article history: The aim of the researcher was to determine the effectiveness of artificial intelligence techniques against
Received 7 February 2021 cyber security risks particularly in case of Iraq, Researcher has opted for quantitative method of research
Received in revised form 7 February 2021 design along with primary data. The researcher collected the data from employees working in this IT
Accepted 16 February 2021
industry. The sample size for this study was 468 and confirmatory factor analysis, discriminant validity,
Available online xxxx
basic analysis of model and lastly, hypothesis assessment was carried out. The P-values of all variables
were obtained as significant apart from expert system which had no significant relation with artificial
Keywords:
intelligence and cyber security. Geographical area, sample size, less variables and accessibility was the
Artificial intelligence
Expert system
main issue.
Neural agents Ó 2021 Elsevier Ltd. All rights reserved.
Cyber-security Selection and peer-review under responsibility of the scientific committee of the Emerging Trends in
Intelligence agents Materials Science, Technology and Engineering.
https://doi.org/10.1016/j.matpr.2021.02.531
2214-7853/Ó 2021 Elsevier Ltd. All rights reserved.
Selection and peer-review under responsibility of the scientific committee of the Emerging Trends in Materials Science, Technology and Engineering.
Please cite this article as: B. Alhayani, H. Jasim Mohammed, I. Zeghaiton Chaloob et al., Effectiveness of artificial intelligence techniques against cyber secu-
rity risks apply of IT industry, Materials Today: Proceedings, https://doi.org/10.1016/j.matpr.2021.02.531
B. Alhayani, H. Jasim Mohammed, I. Zeghaiton Chaloob et al. Materials Today: Proceedings xxx (xxxx) xxx
in Iraq. For instance, the study conducted by [5] has depicted that by client or software. Expert systems are provided in different
AI has both good and bad effect on cyber-security as it can either forms which ranges from small system to hybrid system that is uti-
escalate the process of attacks of causing faster and painful attacks lized for diagnostic purposes. In addition, the system is utilized for
or can result in enhancing the cyber security. Hence, the primarily providing security in the cyber defence [28–31]. Similarly, the
objective of the research is to determine the role of AI in Iraq in study conducted by [32] has depicted that expert system utilizes
countering against the cyber-attacks that leads to enhancing the input data for identifying vulnerability along with the threat
cyber-security. The significance of the study is that it provides level related to the transaction on E-commerce websites. Hence,
the importance of AI technologies among the IT professionals for in this manner, the following hypothesis has been developed for
taking preventive measure against cyber-attacks. expert system.
H2: Expert system has a significant and positive role on the
artificial intelligence
2. Literature review H3: Artificial intelligence has a significant mediating effect between
the expert system and cyber-security
In Iraq, the admittance of internet in 2016 has increased to Another effective technology and advanced branch for the AI is
74.9% from 47% in 2011 where it illuminates that 24 million indi- the neural nets which is also known as the deep learning. It was
viduals are utilizing the internet for social media, internet-based mainly inspired by the functions of the human brain that was asso-
games and other. Iraq Telecom is mainly responsible for the distri- ciated with several neurons that can learn any type of data. When
bution of the internet to the customers. However, with the incline applied with the cyber-security, the system can support in identi-
of internet usage has also led to the increase of computer crimes. fying whether there is a file malicious or legitimate without the
There are particularly three major cases that have occurred in Iraq interference of human. Neural nets yields a strong result in deter-
regarding cybercrime. The first major case is reflected to the State mining the malicious threats in comparison with the classical
oil company where it was hit by virus in 2012 that resulted in caus- machine learning system [33–36]. In addition, [37] has similarly
ing demolition to information and drives to computer which was depicted that neural network allows in easily monitoring the secu-
aimed to stopping the oil production. The second major case is rity of the computer while also taking remedial action. Hence, in
related with Baghdad University which was hacked where the last this perspective, the following hypotheses are designed in respect
major case is reflected to government administration that led to to neural nets:
the disruptions on operations of government [8–14]. In addition, H4: Neural nets has a significant role on the artificial intelligence
study conducted by [15] has depicted that cyber-crimes are for countering against cyber-attacks
increasing around the globe where it is critical for the countries H5: Artificial intelligence has a significant mediating effect between
to have strong cyber-security. Iraq has been taking initiative for the Neural Nets and cyber-security
enhancing the cyber-security by developing laws and regulation As per the study conducted by [33] intelligent agent is an inde-
along with focusing on enhancing cyber-security. pendent entity of the AI where it mainly recognizes the movement
The main idea of AI in Iraq was to enhance the cognitive system through sensors while following the environment actual indication
by developing similar or better intelligence than humans. AI tech- i.e. an agent and directs its overlay activity towards the achieve-
nology has started to infiltrate various industries which comprises ment of goals. Intelligent agent is mainly created for countering
of healthcare, robotics, retail and insurance industry. However, Iraq against the distributed denial of services (DDoS) attacks. The tools
has not yet fully embraced the AI revolutions. It is identified that also have several advantages as it provides with proactive mea-
the country is making significant investment on the artificial intel- sures, mobility and agent communication language. In respect to
ligence by focusing on communication network, accessibility to study of [28], intelligent agents are self-sufficient computer system
mentors, funding, infrastructure development and manufacturers that shares information with each other while fighting cyber
[16–20]. Similarly, study conducted by [21] has indicated that assaults. Moreover, the study also recognizes that the intelligent
the emergence of AI particularly in the higher education of Saudi agent is mainly designed for countering against the DDoS through
Arabi has contributed towards promoting educational quality and the support of cyber agent’s communication and movement. In this
learning outcome. The incorporation of AI has also contributed manner, the following hypotheses are designed for the study that
towards the information technology (IT) in respect to critical think- concentrates on intelligence agent:
ing, communication, problem solving, technological literacy and H6: Intelligence agent has a significant role on the artificial intelli-
creativity. gence for countering against cyber-attacks
In the past few years, many of the researchers have started H7: Artificial intelligence has a significant mediating effect between
exploring the approaches of AI for enhancing the cyber-security. the Intelligence Agents and cyber-security
The term cyber-security is referred to the processes, system and
human behaviour that supporting in safeguarding the electronic
resources. AI has been identified as a versatile technique for deter- 2.1. Conceptual framework
mining false information along with evaluating large amount of
data [22–25]. Similarly, the study conducted by [26] has depicted For the following comprehensive study, the researcher has
that the AI is getting strong recognition towards assisting the users opted for quantitative method of research design along with pri-
for fighting crime and resolving problems in cyber space. AI mainly mary data. The aim of the researcher was to determine the effec-
supports in identifying the viruses, designing solutions and deploy- tiveness of artificial intelligence techniques against cyber security
ing solutions that support in countering against the cyber-crime. risks particularly in case of Iraq. The researcher collected the data
Szychter et al. in [27] has also that many organizations are incor- from employees working in this IT industry of Iraq who possess
porating AI as it can enhance the security of internet of things thorough knowledge about advanced methods such as AI technol-
(IoT) by predicting or detecting malicious activities. In the basis ogy and cyber security issues. The sample size for this study was
of the literature, the following hypothesis has been developed. 468 because with increased sample size, the study becomes more
H1: Artificial intelligence has a significant and positive effect on accurate, reliable and authentic. Other researchers who wish to
cyber-security which reduces the impact of cyber-attack conduct study in similar domain can use this research article as a
The most common tool that is used for the AI is the expert base paper. However, a smaller sample size is always a limitation
system which utilized for identifying inquiries that are presented and does not guarantees the authenticity of the results [38] (Fig. 1).
2
B. Alhayani, H. Jasim Mohammed, I. Zeghaiton Chaloob et al. Materials Today: Proceedings xxx (xxxx) xxx
A survey questionnaire was used based on Likert scale for used in the study, the appropriate value of 0.6 was set. The table
reaching out to the desired respondents and was distributed below provides overview of the values obtained through factor
among them by self-administering in case of any queries. The loadings, Cronbach Alpha, Composite reliability and AVE (Average
respondents filled the questionnaire as per their opinion and expe- Variance Extracted).
riences and were asked to share to return back. Based on the The Table 1 above shows that all values of factor loadings are
respondent’s own convenience, the questionnaire was returned. above 0.7 which indicates that factors influence the variables
The data was then analysed through the use of Smart PLS. The data strongly. The next important values shown above are Cronbach
analysis techniques adopted were confirmatory factor analysis, Alpha, Composite reliability and AVE. These metrics show the fit-
discriminant validity, basic analysis of model and lastly, hypothesis ness of the model and whether they can be used further for testing
assessment. The data was first tested for determining whether the or not. Cronbach Alpha shows the reliability of the constructs and
variables constructs are related to each other or not. Since the aim desired or optimum value should be above 0.7. The Table 1 clearly
of the researcher was to examine the relationship as well as the indicates that all values are above 0.7 which means that they are
mediation between the variables or not therefore, SEM technique reliable and can be used further.
was used and through multiple regression models, the relationship Composite reliability is another measure for assessing the reli-
between variables was identified. Based on the results obtained, ability of the data and it indicates the internal consistency of the
the hypothesis formed were declared as ‘‘accepted” or ‘‘rejected”. constructs similar to like Cronbach Alpha. The minimum values
of composite reliability should exceed 0.7 in order to ensure high
internal consistency in constructs. On the other hand, AVE (Aver-
3. Result age Variance Extracted) is used to examine the variance that is
explained through the predictors of residual variance. The accepted
3.1. Confirmatory factor analysis benchmark value for it is 0.5 which means that for the variables to
be deemed as significant, their values should exceed 0.5. As shown
In order to find out the overall fitness of the model, confirma- by Table 1 above that AVE values exceed 0.5 and composite relia-
tory factor analysis was used. To determine the fitness of variables bility values also exceed 0.7 indicating that there is internal consis-
Table 1
Confirmatory Factor Analysis.
3
B. Alhayani, H. Jasim Mohammed, I. Zeghaiton Chaloob et al. Materials Today: Proceedings xxx (xxxx) xxx
tency in data as well as shows that variables are suitable for further Table 3
testing of hypothesis and model assessment. Model.
The hypothesis assessment is the next important stage of anal- There are many limitations faced by the researcher while con-
ysis that needs to be undertaken. After carrying out all necessary ducting this study. One of the primary issues was accessibility
tests for determining the relationship between variables and their and sample size of respondents. Due to current COVID situation,
Table 2
Discriminant Validity.
Artificial Intelligence Cyber Security Expert System Intelligent Agents Neural Nets
Artificial Intelligence
Cyber Security 0.889
Expert System 0.350 0.440
Intelligent Agents 0.529 0.585 0.730
Neural Nets 0.413 0.562 0.684 0.625
4
B. Alhayani, H. Jasim Mohammed, I. Zeghaiton Chaloob et al. Materials Today: Proceedings xxx (xxxx) xxx
Table 4
Model Coefficients.
Table 5
[3] K. Huang, C. Zhou, Y.-C. Tian, S. Yang, Y. Qin, Assessing the physical impact of
Hypothesis Assessment.
cyberattacks on industrial cyber-physical systems, IEEE Trans. Ind. Electron. 65
S. Hypothesis Sig- Result (10) (2018) 8153–8162.
NO Value [4] M. Bada, J.R.C. Nurse, The social and psychological impact of cyberattacks, in
Emerging Cyber Threats and Cognitive Vulnerabilities, Elsevier, 2020, pp. 73–
1 Artificial Intelligence -> Cyber Security 0.000 Accepted 92.
2 Expert System -> Artificial Intelligence 0.492 Rejected [5] M. Taddeo, Three ethical challenges of applications of artificial intelligence in
3 Intelligent Agents -> Artificial Intelligence 0.000 Accepted cybersecurity, Minds Mach. 29 (2) (2019) 187–191.
4 Neural Nets -> Artificial Intelligence 0.017 Accepted [6] K.R. Bhatele, H. Shrivastava, N. Kumari, The Role of Artificial Intelligence in
5 Expert System -> Artificial Intelligence -> Cyber 0.493 Rejected Cyber Security, in Countering Cyber Attacks and Preserving the Integrity and
Security Availability of Critical Systems, IGI Global, 2019, pp. 170–192.
6 Intelligent Agents -> Artificial Intelligence -> 0.000 Accepted [7] M. Conti, T. Dargahi, A. Dehghantanha, Cyber threat intelligence: challenges
and opportunities, Cyber Threat Intelligence, Springer (2018) 1–6.
Cyber Security
[8] S. Alshathry, Cyber attack on saudi aramco, Int. J. Manag., 11 (5) (2016).
7 Neural Nets -> Artificial Intelligence -> Cyber 0.018 Accepted
[9] S. Al Amro, Cybercrime in Saudi Arabia: fact or fiction?, Int. J. Comput. Sci.
Security
Issues 14 (2) (2017) 36.
[10] H.J. Mohammed, H.A. Daham, Analytic hierarchy process for evaluating
flipped classroom learning, Comput. Mater. Contin. 66 (3) (2021) 2229–
2239.
the researcher was not able to directly approach the respondents [11] H.J. Mohammed, I.A. M. Al-Jubori, M.M. Kasim, Evaluating project
but meetings were arranged and in small groups, the question- management criteria using fuzzy analytic hierarchy Process, AIP Conf. Proc.,
naires were filled. Secondly, the number of respondents were lim- 2138 (1) (2019) 040018(1–6).
[12] H.J. Mohammed, M.M. Kasim, I.N. Shaharanee, Selection of suitable e-learning
ited and in future, it is suggested that results can further be approach using TOPSIS technique with best ranked criteria weights, AIP Conf.
improved if more data is collected from large number of people. Proc., 1905 (2017) 040019(1–6).
Moreover, the researcher only focused on IT industry of Iraq and [13] H.J. Mohammed, M. Kasim, I.N. Shaharanee, Evaluation of e-learning
approaches using AHP- TOPSIS technique, J. Telecommun. Electron. Comput.
hence, the study was geographically limited therefore, for future, Eng. 10 (1–10) (2018) 7–10.
the studies can be improved if more comparison with other Middle [14] S. Hashemi, A. Marzuki, H.J. Mohammed, S. Kiumarsi, The effects of perceived
East countries are done or more variables are included in this study conference quality on attendees’ behavioural intentions, Anatolia 31 (3) (2020)
360–375.
for assessing the impact.
[15] T.S. Alshammari, H.P. Singh, Preparedness of Saudi Arabia to Defend Against
Cyber Crimes: An Assessment with Reference to Anti-Cyber Crime Law and GCI
Index, Arch. Bus. Res., 6 (12) (2018).
5. Conclusion [16] S.M. Ahmed, Artificial intelligence in Saudi Arabia: Leveraging
entrepreneurship in the Arab markets, 2019 Amity International Conference
on Artificial Intelligence (AICAI) (2019) 394–398.
Conclusively, it can be stated that the researcher carried out
[17] B. Alhayani, M. Rane, Face recognition system by image processing, Int. J.
quantitative based study with primary data collected from Electron. Commun. Eng. Technol. 5 (5) (2014) 80–90.
employees working in IT sector of Iraq. The hypothesis testing [18] B. Alhayani, H. Ilhan, Hyper spectral image classification using dimensionality
reduction techniques, Int. J. Innov. Res. Electr. Electron. Instrum. Control Eng. 5
was done and it was found that there is significant impact of intel-
(4) (2017) 71–74.
ligence agents and neural nets on AI. The advancement of technol- [19] B. Alhayani, A. Abdallah, Manufacturing intelligent corvus corone module for a
ogy has led towards increased data storage which requires more secured two way image transmission under WSN, Eng. Comput. 37 (9) (2020)
data security. 1–17.
[20] B. Alhayani, H. Ilhan, Visual sensor intelligent module based image
transmission in industrial manufacturing for monitoring and manipulation
problems, J. Intell. Manuf. 4 (2020) 1–14.
CRediT authorship contribution statement [21] M. Elhajji, A.S. Alsayyari, A. Alblawi, Towards an artificial intelligence
strategy for higher education in Saudi Arabia, in: 2020 3rd International
Bilal Alhayani: Conceptualization, Methodology, Software, Data Conference on Computer Applications & Information Security (ICCAIS), 2020,
pp. 1–7.
curation. Husam Jasim Mohammed: Visualization. Ibrahim [22] S. Zeadally, E. Adi, Z. Baig, I.A. Khan, Harnessing artificial intelligence
Zeghaiton Chaloob: Investigation, Supervision, Software. Jehan capabilities to improve cybersecurity, IEEE Access 8 (2020) 23817–
Saleh Ahmed: Validation, Writing - review & editing. 23837.
[23] I.Z. Chaloob, R. Ramli, M.K.M. Nawawi, A new multi-interval weights approach
in fuzzy goal programming for a multi-criteria problem, Int. J. Math. Oper. Res.
9 (2) (2016) 214–229.
Declaration of Competing Interest [24] I.Z. Chaloob, R. Ramli, M.K.M. Nawawi, Measuring economic and
environmental efficiency for agricultural zones in Iraq using data
The authors declare that they have no known competing finan- envelopment analysis, Int. J. Inf. Decis. Sci. 10 (3) (2018) 235–248.
[25] I.Z. Chaloob, R. Ramli, M.K.M. Nawawi, Using simulation and data envelopment
cial interests or personal relationships that could have appeared
analysis to evaluate Iraqi regions in producing strategic crops, AIP Conf. Proc.
to influence the work reported in this paper. 1635 (1) (2014) 525–529.
[26] E. Madhok, A. Gupta, N. Grover, Artificial Intelligence Impact on Cyber Security,
IITM J. Manag. IT 7 (1) (2016) 100–107.
References [27] A. Szychter, H. Ameur, A. Kung, H. Daussin, The Impact of Artificial Intelligence
on Security: a Dual Perspective, Taylor & Francis Taylor & Francis Group
[1] M. Komar et al., ‘‘High performance adaptive system for cyber attacks http://taylorandfrancis. com, 2018.
detection,” in 2017 9th IEEE International Conference on Intelligent Data [28] A. Anwar, S.I. Hassan, Applying artificial intelligence techniques to prevent
Acquisition and Advanced Computing Systems: Technology and Applications cyber assaults, Int. J. Comput. Intell. Res. 13 (5) (2017) 883–889.
(IDAACS), 2017, vol. 2, pp. 853–858. [29] H.J. Mohammed, M.M. Kasim, A.K. Hamadi, E.A. Al-Dahneem, Evaluating of
[2] J. White, Cyber Threats and Cyber Security: National Security Issues, Policy and collaborative and competitive learning using MCDM technique, Adv. Sci. Lett.
Strategies, Glob. Secur. Stud., 7 (4) (2016). 24 (6) (2018) 4084–4088.
5
B. Alhayani, H. Jasim Mohammed, I. Zeghaiton Chaloob et al. Materials Today: Proceedings xxx (xxxx) xxx
[30] H.J. Mohammed, M.M. Kasim, I.N. Shaharanee, Multi-criteria evaluation of e- [35] J.S. Ahmed, H.J. Mohammed, I.Z. Chaloob, Application of a fuzzy multi-
learning approaches, in Proceedings of the 6th International Conference on objective defuzzification method to solve a transportation problem, Mater.
Computing and Informatics, 2017, no. May. Today Proc. (2021).
[31] H.J. Mohammed, M.M. Kasim, E.A. AL-Dahneem, A.K. Hamadi, An analytical [36] H.A. Daham, H.J. Mohammed, An evolutionary algorithm approach for vehicle
survey on implementing best practices for introducing e-learning programs to routing problems with backhauls, Mater. Today Proc. (2021).
students, J. Educ. Soc. Sci., 5 (2) (2016) 191–196. [37] A. Magcale, D. Kekai, Artificial intelligence with cyber security, Google Patents
[32] K. Pal, R. Tiwari, S. Maheshwary, Implementation of artificial intelligence (2018).
methods to curb cyber assaults: A review, Int. Res. J. Eng. Technol. (2018) [38] N. Blaikie, Confounding issues related to determining sample size in
1466–1469. qualitative research, Int. J. Soc. Res. Methodol. 21 (5) (2018) 635–641.
[33] A. Panimalar, G. Pai, S. Khan, Artificial intelligence techniques for cyber [39] M.R. Ab Hamid, W. Sami, M.H.M. Sidek, Discriminant validity assessment: Use
security, Int. Res. J. Eng. Technol. 5 (3) (2018) 122–124. of Fornell & Larcker criterion versus HTMT criterion, J. Phys. Conf. Ser. 890 (1)
[34] H.J. Mohammed, E. AL-dahneem, A. Hamadi, A comparative analysis for (2017) 12163.
adopting an innovative pedagogical approach of flipped teaching for active
classroom learning, J. Glob. Bus. Soc. Entrep., 3 (5) (2016) 86–94.