Submitted:
09 March 2025
Posted:
10 March 2025
You are already at the latest version
Abstract
Keywords:
1. Introduction
1.1. Importance of the Topic
1.2. Theoretical Level
1.3. Practical Level
1.4. Literature Review
1.4.2. The Arabic Language and Contemporary Challenges and Ways to Address Them
1.4.3. The Study Titled “Cybersecurity Threats in the Age of Artificial Intelligence: Leveraging Advanced Technologies and Strengthening Cybersecurity”
1.4.4. The Study Titled “The Joint Efforts of Media and Linguistic Institutions in Preserving the Arabic Language”
1.4.5. The Study Published in the International Journal of Innovation, Creativity and Change in 2020, Titled “Artificial Intelligence Development and Challenges (Arabic Language as a Model)”
1.5. Research Problem
1.6. From This Issue, the Following Research Questions Emerge
1.7. Main Hypothesis of the Research
1.8. The Conceptual and Theoretical Framework of the Research
1.8.1. First Key Concept
1.8.2. Second Key Concept
1.8.3. Third Key Concept
2. The First Axis: Cyber Threats and Their Impact on the Arabic Language in the Digital Space
2.1. Types of Cyber Threats in the Digital Space
2.1.1. Traditional Cyber Threats
2.1.2. Cyber Threats Driven by Artificial Intelligence
2.2. The Impact of Cyber Threats on the Arabic Language and Its Protection
3. Second Axis: Strategies for Protecting the Arabic Language in Cyberspace
3.1. Digital Protection Tools for the Arabic Language
3.1.1. Encryption Systems
3.1.2. Protection Techniques Against Arabic Language Breach Attacks
3.1.2.1. Automated Response to Attacks
3.1.2.2. Data Analysis and Machine Learning
3.1.2.3. Smart Security
3.1.2.4. Real-Time Protection
3.2. Developing Security Policies and Raising Awareness
3.2.1. Strengthening Legislation to Protect the Arabic Language from Cyber Threats
3.2.2. Strengthening Arab Cooperation to Protect Arabic from Cyber Threats
4. Conclusions
References
- Abbadi, D., &Lachkar, A. (2024). Cyber threats in the age of artificial intelligence: Exploiting advanced technologies and strengthening cybersecurity. International Journal of Science and Research Archive, 13(01). [CrossRef]
- Abdelmaksoud, M. A., et al, (2023). Concerted efforts of the media and linguistic institutions in preserving the Arabic language. International Journal of Academic Research in Business and Social Sciences, 13(10). [CrossRef]
- Aboelezz, M. (2016). A history of the Arabic language and the origin of non-dominant varieties of Arabic. In R. Muhr, K. E. Fonyuy, Z. Ibrahim, & C. Miller (Eds.), Pluricentric languages and non-dominant varieties worldwide Part I: Pluricentric languages across continents. Features and usage. (pp. 175-187). Peter Lang. Available online: https://eprints.bbk.ac.uk/id/eprint/24993/.
- Aghava, M. S., et al., (2023). AI deep fake detection research paper. International Journal of Novel Research and Development (IJNRD), 8(10), (pp.64-65). Available online: https://tinyurl.com/3e4f9jfr.
- Ahmed, K. (2010). The Arabic language: Challenges in the modern world. International Journal for Cross-Disciplinary Subjects in Education, 1(3), (pp.196-200). [CrossRef]
- Al-Bidri, A. W. (2021). Cybersecurity strategy: A case study of Morocco. Democratic Arab Center for Strategic, Political, and Economic Studies, [Translated from Arabic].
- Aleroud, A., & Zhou, L. (2017). Phishing environments, techniques, and countermeasures: A survey. Computers & Security, 68, (pp.160-196). [CrossRef]
- Al-Murjan, A. R., et al. (2024). Dictionary of Key Terms in Cybercrimes and Digital Evidence: English - Arabic. Naif University Publishing House.
- Al-Omari, Ahmad H. (2018). ABJAD Arabic-Based Encryption.(Vol. 9, No. 10). Northern Border University, KSA: International Journal of Advanced Computer Science and Applications(IJACSA). Available online: https://tinyurl.com/3bz8dvw9.
- Alzahrani, I., et al., (2024). Enhancing cyber-threat intelligence in the Arab world: Leveraging IoC and MISP integration. Electronics, 13(13), (p.2526). [CrossRef]
- Anderson, H. S., et al., (2016). DeepDGA: Adversarially-tuned domain generation and detection, In Proceedings of the 2016 ACM Workshop on Artificial Intelligence and Security. [CrossRef]
- Arshi, Gabriel. (2025). Information Security in the Arab World: Risks and Challenges. International Journal of Informatics, Media, and Communication Technologies, 119. [CrossRef]
- Auda, S. (2017, July 23). Between colloquial and classical Arabic: Does diglossia pose a threat to the language?, Al Jazeera. [Translated from Arabic]. Available online: https://tinyurl.com/nwe5uude.
- Bassett, S., & Paquette, M. (2018). Improve Security Analytics with the Elastic Stack, Wazuh, and IDS. Elastic Blog. Available online: https://bit.ly/4gx6rpX.
- Begou, N., et al. (2024). Exploring the dark side of AI: Advanced phishing attack design and deployment using ChatGPT. In Proceedings of the IEEE Conference on Communications and Network Security (CNS). Available online: https://bit.ly/3ZBZ7mB.
- Bellusci, V., et al., (n.d.). Phishing (Edition not mentioned). Université Côte d’Azur. (pp. 1-5). Available online: https://tinyurl.com/mtkb3cak.
- Cybersecurity and Infrastructure Security Agency. (n.d.). CISA logo. Available online: https://tinyurl.com/mr34385w.
- Cyber Security Foundation - CSFPC™. Available online: https://tinyurl.com/2jtztvky.
- El-Khoury, A. M. (2024). The silent battles in fifth-generation warfare. Arab Union for Digital Economy. (Translated from Arabic). Available online: https://tinyurl.com/mtennnvt.
- Ernst, C. W. (2013). The global significance of Arabic language and literature. Religion Compass, 7(6), 191. [CrossRef]
- Etuh, E., et al,. (2022). Social media networks attacks and their preventive mechanisms: A review. arXiv:2201.03330 [cs.SI]. [CrossRef]
- Goodfellow, I. J., et al., (2015). Explaining and harnessing adversarial examples. arXiv preprint arXiv:1412.6572.
- Gu, Q., & Liu, P. (n.d.). Denial of service attacks. Texas State University – San Marcos; Pennsylvania State University. Available online: https://tinyurl.com/3sna9cd5.
- Hoseini, A. (2022). Ransomware and phishing cyberattacks: Analyzing the public’s perception of these attacks in Sweden (Edition not mentioned). Uppsala University. Available online: https://tinyurl.com/bdmzw9y8.
- ICAN, One World, One Internet. Available online: https://www.icann.org.
- International Council for the Arabic Language. (2022). Model Arabic Language Law (2nd ed.). [Translated from Arabic]. Available online: https://tinyurl.com/mr25h2rc.
- Jawhar, N. E. (2017). Teaching Arabic in the era of the Fourth Industrial Revolution. based on Quranic guidelines [Translated from Arabic]. Lisan Arabi. Available online: https://tinyurl.com/2skksevp.
- Kanaan, A. A. (2012). Arabic language and contemporary challenges and ways to address them [Translated from Arabic] (p. 3). Available online: https://tinyurl.com/f3csffwk.
- Khouri, A. M. (2024). The silent battles in the fifth-generation wars. Arab Union for Digital Economy. Available online: https://tinyurl.com/mtennnvt.
- Kurakin, A., et al., (2016). Adversarial examples in the physical world. arXiv preprint arXiv:1607.02533.
- MuzaaLKhalati, M. (2020). Artificial intelligence development and challenges (Arabic language as a model). International Journal of Innovation, Creativity and Change, 13(5), 924. Available online: https://tinyurl.com/4jabez6v.
- Narwal, B., et al., (2019). Towards a taxonomy of cyber threats against target applications. Journal of Statistics and Management Systems, (3), (pp.301-325). [CrossRef]
- National Cyber Security Centre. Available online: https://www.ncsc.gov.uk/.
- Noora, Albalooshi; et al. Noora Albalooshi et al.(2011).The Challenges of Arabic Language Use on the Internet, 6th International Conference on Internet Technology and Secured Transactions, (p. 379), Abu Dhabi, United Arab Emirates. Available online: https://tinyurl.com/mr3v8xay.
- Paloalto. (n.d.). What is security automation? Retrieved September 25, 2024. Available online: https://bit.ly/3ZWFDJV.
- Pew Research Center. Available online: https://www.pewresearch.org/.
- Radi, S. M. A., (2019). Cybercrime and the integration of national, regional, and international texts. Hassan II University Publications Series, (Issue 23). Morocco: Journal of Law and International Business, [Translated from Arabic].
- Russell, S. J., & Norvig, P. (2010). Artificial intelligence: A modern approach (3rd ed). Pearson Education.
- Saadany, Hadeel, Tantawy, Ashraf, Orăsan, Constantin. (2024). Cyber Risks of Machine Translation Critical Errors: Arabic Mental Health Tweets as a Case Study. Bas du formulaire. Available online: https://arxiv.org/abs/2405.11668.
- Saxe, J., & Berlin, K. (2018). Deep neural network based malware detection using two-dimensional binary program features. Proceedings of the 2018 IEEE Security and Privacy Workshops (SPW), 13(2), (pp.30–37). [CrossRef]
- Seif El-Islam, M., (2024, May 29). The Arabic language and keeping up with the times: Universality, survival, and modern technologies. Center for Arab Unity Studies. Available online: https://tinyurl.com/3sa27599.
- Sharma, G., & Narayan, R. (2024). AI-Driven Cybersecurity: Enhancing System Resilience With Advance Security Automation Program (ASAP). Journal of Open Source Developments.
- Sharp, R. (2007). An introduction to malware (Edition not mentioned). Haut du formulaire. Available online: https://tinyurl.com/mr37bxbs.
- Singh, A. (2019). The concept of artificial intelligence. Journal of Emerging Technologies and Innovative Research (JETIR), 6(3), 566. Available online: https://tinyurl.com/3fh7mmya.
- Szegedy, C., et al., (2014). Intriguing properties of neural networks. arXiv preprint arXiv:1312.6199.
- Tapscott, D., & Tapscott, A. (2016). Blockchain revolution: How the technology behind bitcoin is changing money, business, and the world. Penguin.
- Yuan, X., et al., (2019). Adversarial examples: Attacks and defenses for deep learning. IEEE transactions on neural networks and learning systems, 30(9).
- Zaydan, J. (2017). Tārīkh Ādāb al-Lughah al-‘Arabīyah [A history of the literature of the Arabic language]. Hindawi. [Translated from Arabic]. Available online: https://tinyurl.com/4nm984cz.
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2025 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).