Artificial Intelligence Voice Cloning in Healthcare Cybersecurity: Challenges, Opportunities, and Protective Strategies
Abstract
Keywords
Full Text:
PDFReferences
Alabdan, R. (2020). Phishing attacks survey: Types, vectors, and technical approaches. Future internet, 12(10), 168.
Genelza, G. G. (2024). A systematic literature review on AI voice cloning generator: A game- changer or a threat? Journal of Emerging Technologies, 4(2), 54-61.
Jimmy, F. N. U. (2024). Cyber security Vulnerabilities and Remediation Through Cloud Security Tools. Journal of Artificial Intelligence General science (JAIGS) ISSN: 3006- 4023, 2(1), 129-171.
Koffi, E. (2023). VOICE BIOMETRICS FUSION FOR ENHANCED SECURITY AND SPEAKER RECOGNITION: A COMPREHENSIVE REVIEW. Linguistic Portfolios, 12(1), 6.
Lewandowski, R., Goncharuk, A. G., & Cirella, G. T. (2021). Restoring patient trust in healthcare: medical information impact case study in Poland. BMC Health Services Research, 21(1), 865.
O’Kane, P., Smith, A., & Lerman, M. P. (2021). Building transparency and trustworthiness in inductive research through computer-aided qualitative data analysis software. Organizational Research Methods, 24(1), 104-139.
DOI: https://doi.org/10.53889/citj.v3i2.836
Article Metrics
Abstract view : 11 timesPDF - 5 times
Refbacks
- There are currently no refbacks.
Copyright (c) 2025 Cybersecurity and Innovative Technology Journal

This work is licensed under a Creative Commons Attribution 4.0 International License.

