Research Article
Open access
Published on 23 July 2024
Download pdf
Li,L. (2024). The Current Situation and Prevention of AI Telecom Fraud: Starting from Personal Information Protection. Lecture Notes in Education Psychology and Public Media,55,61-69.
Export citation

The Current Situation and Prevention of AI Telecom Fraud: Starting from Personal Information Protection

Lezhi Li *,1,
  • 1 Guangzhou University

* Author to whom correspondence should be addressed.

https://doi.org/10.54254/2753-7048/55/20240083

Abstract

AI telecom fraud is an act of using artificial intelligence deep cooperation and analysis technology to create false information to lure and deceive individuals and illegal possession of money. With the rapid development of the Internet and AI, the number of AI telecom fraud cases has exploded, so how to prevent AI telecom fraud has become an important issue in society. AI telecom fraud has led to a series of problems, such as the illegal collection and malicious disclosure of personal information, criminals using AI to analyze personal information for fraud, and the industry does not adequately supervise the collection and use of personal information by companies. This article uses case analysis, normative analysis, and comparative research methods to analyze the above three problems and proposes the solution, including establishing a complete legal regulatory system for personal information protection and the prevention and control of AI telecom fraud, and strengthening industry supervision. It is hoped that by applying the above-mentioned solutions, the protection of personal information and the prevention and control of AI telecom fraud can be strengthened, and the development of AI telecom fraud prevention and control in China can be promoted.

Keywords

Artificial intelligence, Telecom fraud, Personal information, Prevention.

[1]. China Internet Network Information Center. (2024). The 53rd Statistical Reports on Internet Development in China. Retrieved from https://www.cnnic.net.cn/n4/2024/0322/c88-10964.html.

[2]. Yu Zhigang. (2017). The Right Attribute of “Citizen’s Personal Information” and the Thought of the Criminal Law Protection. Zhejiang Social Sciences, 10, 4-14+155.

[3]. Xiao Chengjun, Xu Yuzhen. (2017). Personal Information Leakage and its Multi-center Governance in big Data Era. Inner Mongolia Social Sciences, 38(02), 185-192.

[4]. Zhao Lianqing. (2017). Criminal Law Protection of Citizens' Personal Information Security -- from the Perspective of Frequent Telecom Network Fraud Cases. Study & Exploration,09,80-84.

[5]. Ali M A, Azad M A, Parreno-Centeno M, Hao F, van Moorsel A. (2019). Consumer-facing technology fraud: Economics, attack methods and potential solutions. Future Gener. Comp. Sy., 100,408-427.

[6]. Chris Jay Hoofnagle, Bart van der Sloot & Frederik Zuiderveen Borgesius. (2019). The European Union general data protection regulation: what it is and what it means, Information & Communications Technology Law, 28:1, 65-98.

[7]. Wang Liming. (2013). Legal Protection of Personal Information: Centered on the Line between Personal Information and Privacy. Modern Law Science, 35(04),62-72.

[8]. Wang Xiaoxue. (2023). Research on the Prevention and Control of Telecom Network Fraud Crime: From the Perspective of Personal Information Protection. East China University of Political Science and Law.

Cite this article

Li,L. (2024). The Current Situation and Prevention of AI Telecom Fraud: Starting from Personal Information Protection. Lecture Notes in Education Psychology and Public Media,55,61-69.

Data availability

The datasets used and/or analyzed during the current study will be available from the authors upon reasonable request.

Disclaimer/Publisher's Note

The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of EWA Publishing and/or the editor(s). EWA Publishing and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

About volume

Volume title: Proceedings of the 3rd International Conference on International Law and Legal Policy

Conference website: https://www.icillp.org/
ISBN:978-1-83558-473-6(Print) / 978-1-83558-474-3(Online)
Conference date: 27 September 2024
Editor:Renuka Thakore
Series: Lecture Notes in Education Psychology and Public Media
Volume number: Vol.55
ISSN:2753-7048(Print) / 2753-7056(Online)

© 2024 by the author(s). Licensee EWA Publishing, Oxford, UK. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license. Authors who publish this series agree to the following terms:
1. Authors retain copyright and grant the series right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this series.
2. Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the series's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this series.
3. Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See Open access policy for details).