{"id":"https://openalex.org/W4410700562","doi":"https://doi.org/10.1007/s10207-025-01062-8","title":"Telecom spam and scams in the 5G and artificial intelligence era: analyzing economic implications, technical challenges and global regulatory efforts","display_name":"Telecom spam and scams in the 5G and artificial intelligence era: analyzing economic implications, technical challenges and global regulatory efforts","publication_year":2025,"publication_date":"2025-05-24","ids":{"openalex":"https://openalex.org/W4410700562","doi":"https://doi.org/10.1007/s10207-025-01062-8"},"language":"en","primary_location":{"id":"doi:10.1007/s10207-025-01062-8","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s10207-025-01062-8","pdf_url":"https://link.springer.com/content/pdf/10.1007/s10207-025-01062-8.pdf","source":{"id":"https://openalex.org/S164062316","display_name":"International Journal of Information Security","issn_l":"1615-5262","issn":["1615-5262","1615-5270"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Information Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://link.springer.com/content/pdf/10.1007/s10207-025-01062-8.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5033241410","display_name":"Marcello Pietri","orcid":"https://orcid.org/0000-0002-0998-0653"},"institutions":[{"id":"https://openalex.org/I122346577","display_name":"University of Modena and Reggio Emilia","ror":"https://ror.org/02d4c4y02","country_code":"IT","type":"education","lineage":["https://openalex.org/I122346577"]}],"countries":["IT"],"is_corresponding":true,"raw_author_name":"Marcello Pietri","raw_affiliation_strings":["DISMI, University of Modena and Reggio Emilia, ., Italy"],"affiliations":[{"raw_affiliation_string":"DISMI, University of Modena and Reggio Emilia, ., Italy","institution_ids":["https://openalex.org/I122346577"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5001933830","display_name":"Marco Mamei","orcid":"https://orcid.org/0000-0003-3918-2107"},"institutions":[{"id":"https://openalex.org/I122346577","display_name":"University of Modena and Reggio Emilia","ror":"https://ror.org/02d4c4y02","country_code":"IT","type":"education","lineage":["https://openalex.org/I122346577"]}],"countries":["IT"],"is_corresponding":false,"raw_author_name":"Marco Mamei","raw_affiliation_strings":["DISMI, University of Modena and Reggio Emilia, ., Italy"],"affiliations":[{"raw_affiliation_string":"DISMI, University of Modena and Reggio Emilia, ., Italy","institution_ids":["https://openalex.org/I122346577"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5073709427","display_name":"Michele Colajanni","orcid":"https://orcid.org/0000-0002-9499-1559"},"institutions":[{"id":"https://openalex.org/I9360294","display_name":"University of Bologna","ror":"https://ror.org/01111rn36","country_code":"IT","type":"education","lineage":["https://openalex.org/I9360294"]}],"countries":["IT"],"is_corresponding":false,"raw_author_name":"Michele Colajanni","raw_affiliation_strings":["DISI, University of Bologna, ., Italy"],"affiliations":[{"raw_affiliation_string":"DISI, University of Bologna, ., Italy","institution_ids":["https://openalex.org/I9360294"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5033241410"],"corresponding_institution_ids":["https://openalex.org/I122346577"],"apc_list":{"value":2590,"currency":"EUR","value_usd":3190},"apc_paid":{"value":2590,"currency":"EUR","value_usd":3190},"fwci":2.0146,"has_fulltext":true,"cited_by_count":3,"citation_normalized_percentile":{"value":0.86849577,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":95,"max":98},"biblio":{"volume":"24","issue":"3","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T13918","display_name":"Advanced Data and IoT Technologies","score":0.9700000286102295,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T13918","display_name":"Advanced Data and IoT Technologies","score":0.9700000286102295,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9560999870300293,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.9484999775886536,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.5921155214309692},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.46615469455718994},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.46607255935668945},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.44325515627861023},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.3335876166820526}],"concepts":[{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.5921155214309692},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.46615469455718994},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.46607255935668945},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.44325515627861023},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.3335876166820526}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1007/s10207-025-01062-8","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s10207-025-01062-8","pdf_url":"https://link.springer.com/content/pdf/10.1007/s10207-025-01062-8.pdf","source":{"id":"https://openalex.org/S164062316","display_name":"International Journal of Information Security","issn_l":"1615-5262","issn":["1615-5262","1615-5270"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Information Security","raw_type":"journal-article"},{"id":"pmh:oai:iris.unimore.it:11380/1381708","is_oa":true,"landing_page_url":"https://hdl.handle.net/11380/1381708","pdf_url":null,"source":{"id":"https://openalex.org/S4377196326","display_name":"Iris Unimore (University of Modena and Reggio Emilia)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I122346577","host_organization_name":"University of Modena and Reggio Emilia","host_organization_lineage":["https://openalex.org/I122346577"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"info:eu-repo/semantics/article"}],"best_oa_location":{"id":"doi:10.1007/s10207-025-01062-8","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s10207-025-01062-8","pdf_url":"https://link.springer.com/content/pdf/10.1007/s10207-025-01062-8.pdf","source":{"id":"https://openalex.org/S164062316","display_name":"International Journal of Information Security","issn_l":"1615-5262","issn":["1615-5262","1615-5270"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Information Security","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G3650733657","display_name":null,"funder_award_id":"NextGenerationEU","funder_id":"https://openalex.org/F4320320300","funder_display_name":"European Commission"},{"id":"https://openalex.org/G507880695","display_name":null,"funder_award_id":"PE00000014","funder_id":"https://openalex.org/F4320320300","funder_display_name":"European Commission"},{"id":"https://openalex.org/G5538284277","display_name":null,"funder_award_id":"National Recovery","funder_id":"https://openalex.org/F4320320300","funder_display_name":"European Commission"},{"id":"https://openalex.org/G8893660128","display_name":null,"funder_award_id":"PE0000001","funder_id":"https://openalex.org/F4320320300","funder_display_name":"European Commission"}],"funders":[{"id":"https://openalex.org/F4320311022","display_name":"Universit\u00e0 Degli Studi di Modena e Reggio Emila","ror":"https://ror.org/02d4c4y02"},{"id":"https://openalex.org/F4320320300","display_name":"European Commission","ror":"https://ror.org/00k4n6c32"}],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4410700562.pdf","grobid_xml":"https://content.openalex.org/works/W4410700562.grobid-xml"},"referenced_works_count":30,"referenced_works":["https://openalex.org/W1923027028","https://openalex.org/W1975113377","https://openalex.org/W2029658262","https://openalex.org/W2097508581","https://openalex.org/W2110915848","https://openalex.org/W2136612401","https://openalex.org/W2161003251","https://openalex.org/W2187881751","https://openalex.org/W2480956190","https://openalex.org/W2505710799","https://openalex.org/W2514548353","https://openalex.org/W2946055406","https://openalex.org/W2955914507","https://openalex.org/W2990181931","https://openalex.org/W2991305957","https://openalex.org/W3023316635","https://openalex.org/W3042888165","https://openalex.org/W3179186578","https://openalex.org/W4210529474","https://openalex.org/W4242138061","https://openalex.org/W4297894154","https://openalex.org/W4300452270","https://openalex.org/W4376644880","https://openalex.org/W4385452929","https://openalex.org/W4387105401","https://openalex.org/W4387432528","https://openalex.org/W4393170828","https://openalex.org/W4395471144","https://openalex.org/W4399412887","https://openalex.org/W6601587288"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2899084033","https://openalex.org/W2748952813","https://openalex.org/W2390279801","https://openalex.org/W4391913857","https://openalex.org/W2358668433","https://openalex.org/W4396701345","https://openalex.org/W2376932109","https://openalex.org/W2060145807","https://openalex.org/W4248806346"],"abstract_inverted_index":{"Abstract":[0],"This":[1,110],"paper":[2,111],"addresses":[3],"the":[4,13,35,40,59,92,113,121,128,142,153,159,189,217],"enduring":[5],"issue":[6],"of":[7,18,37,42,50,62,94,115,124,141,192,209],"spam,":[8],"scams,":[9,38],"and":[10,31,65,75,84,106,119,138,147,150,158,170,204],"robocalls":[11,66],"within":[12],"telecommunications":[14,218],"sector.":[15],"The":[16,47,185],"diffusion":[17],"generative":[19],"AI":[20],"technologies":[21,79],"has":[22],"escalated":[23],"these":[24,51,95,125,213],"challenges.":[25],"Advancements":[26],"in":[27,155,161,194,216],"natural":[28],"language":[29],"processing":[30],"related":[32],"tools":[33],"enhance":[34],"sophistication":[36],"facilitating":[39],"implementation":[41],"convincing":[43],"social":[44],"engineering":[45],"attacks.":[46],"economic":[48],"impact":[49],"nefarious":[52],"activities":[53],"is":[54],"significant,":[55],"as":[56,81],"evidenced":[57],"by":[58,97],"vast":[60],"number":[61],"spam":[63,174],"calls":[64,205],"generated":[67],"every":[68],"day":[69],"that":[70],"lead":[71],"to":[72,103,200,211],"significant":[73],"time":[74],"financial":[76],"losses.":[77],"Although":[78],"such":[80],"blocklists,":[82],"STIR/SHAKEN,":[83],"Caller":[85],"ID":[86],"Verification":[87],"methods":[88],"are":[89],"being":[90],"implemented,":[91],"adoption":[93],"solutions":[96],"phone":[98],"companies":[99],"remains":[100],"slow":[101],"due":[102],"industry":[104,202],"barriers":[105],"multi-national":[107],"regulatory":[108,148,168],"frameworks.":[109],"evaluates":[112],"effectiveness":[114],"current":[116],"anti-spam":[117],"countermeasures":[118],"highlights":[120],"practical":[122],"limits":[123],"solutions,":[126],"underscoring":[127],"need":[129],"for":[130,178,206],"improved":[131],"decision-making":[132],"tools.":[133],"It":[134],"offers":[135],"a":[136,207],"comprehensive":[137],"interdisciplinary":[139],"survey":[140],"problem,":[143],"integrating":[144],"technical,":[145],"economic,":[146],"perspectives,":[149],"mapping":[151],"out":[152],"vulnerabilities":[154],"existing":[156],"protocols":[157],"gaps":[160],"policy":[162],"enforcement.":[163],"Additionally,":[164],"it":[165],"examines":[166],"recent":[167],"changes":[169],"their":[171],"effects":[172],"on":[173],"call":[175],"dynamics,":[176],"advocating":[177],"increased":[179],"vigilance":[180],"against":[181],"evolving":[182],"scam":[183],"tactics.":[184],"study":[186],"also":[187],"considers":[188],"broader":[190],"role":[191],"institutions":[193],"perpetuating":[195],"this":[196],"issue,":[197],"which":[198],"contributes":[199],"substantial":[201],"turnover,":[203],"reassessment":[208],"strategies":[210],"combat":[212],"pervasive":[214],"problems":[215],"domain.":[219]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":2}],"updated_date":"2026-04-18T07:56:08.524223","created_date":"2025-10-10T00:00:00"}
