Using AI Assistants to Enhance Information Security Efficiency
Keywords:
information security, AI assistant, artificial intelligence, cybersecurity, technical integration, organizational aspects, Explainable AI, Telegram bot, Google Apps Script, OpenAIAbstract
This article explores the potential of deploying virtual AI assistants to strengthen information security in light of the rapid evolution of digital technologies and the growing complexity of cyber threats. The study addresses the organizational aspects of implementing AI-based solutions—including threat notifications, user training, monitoring, and analytics—and the technical integration of such assistants with existing information security systems. This includes practical steps such as registering Telegram bots, leveraging Google Apps Script, and integrating with the OpenAI API. Special attention is given to challenges and limitations, such as technical vulnerabilities, false positives, ethical and legal considerations, and functional constraints in complex scenarios. The methodology is grounded in a review of findings from related studies. Results indicate that the integration of innovative AI-driven solutions holds strong potential for advancing the field of information security. Future research should focus on improving Explainable AI algorithms, enhancing the protection of transmitted data, and developing a regulatory framework to support such systems' safe and ethical use. The insights presented in this article will be of particular interest to cybersecurity professionals, researchers, and systems architects focused on the development and deployment of AI-powered approaches for improving threat detection and mitigation mechanisms in information security.
References
. Binhammad M. et al. The Role of AI in Cyber Security: Safeguarding Digital Identity //Journal of Information Security. – 2024. – Vol.2 (15). – pp. 245-278.
. Gnatyuk V. et al. Organizational and technical support of cyber security using a virtual assistant. – 2025. – pp.1-8.
. Averyanova Y. et al. UAS Cyber Security Hazards Analysis and Approach to Qualitative Assessment //Data Science and Security: Proceedings of IDSCS 2021. – Springer Singapore, 2021. – pp. 258-265.
. Al-Hammadi A. S., Al-Jarrah S. A., Al-Saffar A. A., Al-Hammadi A. H. Cybersecurity Awareness Enhancement Using Telegram Chatbot // Proceedings of IEEE 10th International Conference on Information and Communication Systems (ICICS). - 2020. - pp.188–193.
. Al-Safi A., Al-Hinai S. A framework for responding to cyber incidents using telegram bots, in: Proceedings of International Conference on Cyber Security and Protection of Digital Services, Springer. - 2021. - pp. 235–246.
. Ness S., Shepherd N. J., Xuan T. R. Synergy Between AI and Robotics: A Comprehensive Integration //Asian Journal of Research in Computer Science. – 2023. – Vol. 4 (16). – pp. 80-94.
. Khinvasara T., Ness S., Tzenios N. Risk Management in Medical Device Industry //J. Eng. Res. Rep. – 2023. – Vol. 8 (25). – pp. 130-140.
. Xuan T. R., Ness S. Integration of Blockchain and AI: Exploring Application in the Digital Business //Journal of Engineering Research and Reports. – 2023. – Vol. 8 (25). –pp. 20-39.
. Gupta M. et al. From ChatGPT to ThreatGPT: Impact of Generative AI in Cybersecurity and Privacy //IEEE Access. – 2023. – Vol. 11. – pp. 80218-80245.
. Abdelkhalek M., Ravikumar G., Govindarasu M. ML-Based Anomaly Detection System for DER Communication in Smart Grid //2022 IEEE Power & Energy Society Innovative Smart Grid Technologies Conference (ISGT). – IEEE. - 2022. – pp. 1-5.
. Li Z. et al. AttacKG: Constructing Technique Knowledge Graph from Cyber Threat Intelligence Reports //European Symposium on Research in Computer Security. – Cham: Springer International Publishing, - 2022. – pp. 589-609.
. Digital 2025: Global Overview Report. [Electronic resource] Access mode: https://datareportal.com/reports/digital-2025-global-overview-report (date of request: 04/14/2025).
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2025 American Scientific Research Journal for Engineering, Technology, and Sciences

This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
Authors who submit papers with this journal agree to the following terms.