
AN OVERVIEW OF FINANCIAL RISK TYPES AND THE SIGNIFICANT ROLE OF ARTIFICIAL INTELLIGENCE TECHNOLOGIES IN THEIR MITIGATION
Zaynalov Jahongir Rasulovich,Latipova Shakhnoza Mahmudovna ,Kholmurodova Sevara Askarovna , Samarkand Institute of Economics and ServiceAbstract
This article analyzes the integration of artificial intelligence and cybersecurity technologies against the backdrop of emerging digital threats in modern financial systems. The article scientifically highlights the development of mechanisms for detecting, assessing and preventing financial fraud, cyberattacks and other risks using artificial intelligence. It also provides theoretical justification and practical examples of how these technologies can jointly strengthen the security of the financial sector.
Keywords
artificial intelligence, financial security, cyberattack, financial technologies (FinTech), machine learning, anomaly detection, threat response system, risk monitoring
References
Decree No. PQ-358 on the approval of the strategy for the development of artificial intelligence technologies until 2030, dated October 14, 2024.
Shakarian, P. (2021). Artificial Intelligence Tools for Cyber Attribution. SpringerBriefs in Computer Science.
Healey, J. (2013). A Fierce Domain: Conflict in Cyberspace, 1986 to 2012. Cyber Conflict Studies Association.
Danielsson, J., & Uthemann, A. (2023). Artificial Intelligence and Systemic Risk. Journal of Banking and Finance.
Tojimatov, D., & Mirzaev, J. (2023). Use of Artificial Intelligence Opportunities for Early Detection of Threats to Information Systems. Central Asian Journal of Theoretical and Applied Science, (18), 1146.
Bekmirzayev, O., & Muminov, B. (2024). The Role and Application of Artificial Intelligence in Identifying Threats to Information Systems. DTAI Journal. Retrieved from https://dtai.tsue.uz/index.php/DTAI2024/article/view/o0303
O‘rinov, N. T., & Yunusov, O. F. (2023). Artificial Intelligence and its Application in Information Security Management. Central Asian Journal of Theoretical and Applied Science, (12), 451. Retrieved from https://cajotas.centralasianstudies.org/index.php/CAJOTAS/article/view/451
Article Statistics
Downloads
Copyright License

This work is licensed under a Creative Commons Attribution 4.0 International License.