Transforming the Capabilities of Artificial Intelligence in GCC Financial Sector: A Systematic Literature Review

Identity and access management is a business process framework that makes it easier to maintain genuine user identities and regulate access to sensitive assets. The word “ access control ” refers to an organization ’ s policy for authorizing access procedures, the mechanisms that implement and enforce the policy, and the model that the policy and procedures are built on. Adopting new technology may give rise to speci ﬁ c cyber threats that decrease or degrade business operations. The paper has designed to discuss the arti ﬁ cial intelligence-based access control system as a necessary component of governing and safeguarding the ﬁ nancial sector ’ s information assets in the Gulf Cooperation Council (GCC) region. Due to the dynamic and complicated nature of security rules for access control, organizations that employ web-enabled remote access in conjunction with applications access deployed over several networks face various obstacles, including increased operational complexity and monitoring concerns. Organizations spend a vast budget on securing their business. As the industry trend has shifted to intelligent internet-based companies on the same side, the cyber threat has become a challenge for the researcher to ﬁ nd the solution. A systematic research is conducted to ﬁ ll the gaps in the existing literature by picking the most relevant research papers (126) from the four most reputable online repositories based on the four research questions speci ﬁ ed. These research topics aim to evaluate the current situation from many perspectives and provide new avenues for future study to be studied soon to maintain high security and authenticity inside ﬁ nancial sectors of the GCC ’ s countries.


Introduction
Human involvement and technological advancements have paved the road for prosperity in human life [1]. Individuals use the Internet as a communication tool to cooperate, communicate, and express their opinions about numerous topics and obtain information and use various technologies such as cell phones and other gadgets [2]. The Internet of Things (IoT) is a new technology that will transform the Internet age over the next several years. Digitally connected factories, facility management, production flow management, inventory management, safety, security, health care, logistics, supply chain optimization, and other industries may all benefit from IoT [3]. Information systems and smart Internet of things-(IoT-) based solutions have enriched our lives by offering several state-of-the-art applications in various fields, including healthcare, navigation, tracking, smart security, smart homes, smart buildings [4], and smart appliance management systems. Transportation, healthcare [5], the house, entertainment, and other daily activities have all been altered by IoT-based applications [6]. Al-Azawi et al. [7] compared several AI-assisted cybersecurity solutions. The digital age changed business paradigms by allowing businesses to join the market with specific financial advantages [8]. Mobile information systems will continue to function as facilitators of innovation and will support entrepreneurship in sustainable ways throughout the world [9]. Because of the proliferation of portable devices and the availability of the Internet, mobile learning (M-learning) has exploded in popularity in recent years. The success stories of next generation mobile information systems have been supplemented by the usage of this unique technology in learning and training [10].
Due to the unpredictability of the economic climate and fierce competition, even the well-run businesses are vulnerable to failure and financial disaster. So, whether financial difficulty in publicly traded firms can be projected properly and quickly is dependent on the development of the company, the interest of various investors, and the capital market order [11]. Organizations are interested in altering their company operations and incorporating computer-assisted technologies to serve their clientele [12]. Criminal activity is rising in our society daily. A huge number of threats and acts of violence occur in the community due to this exponential growth. People require security systems and improved living conditions to provide serenity to their lives and raise their living standards. As new technology evolves, it harms the globe in the form of cyber-attacks [13]. Organizations and individuals must endure harmful damage and cyber-attacks on their information systems. Any firm must take security action based on risk assessments in every period of information system modernization. There are other risk analysis approaches to choose from, but the qualitative method is the most effective. The qualitative approach helps the company to make timely decisions about information security [14]. Farooq and Otaibi [15] gave a paper at a symposium on reducing security risks in information systems. Information system security risk management is critical to an organization's commercial performance (ISSRM). The ISSRM ensures privacy, data security, and consistency.
Artificial intelligence (AI) is defined as "the practice of making machines intelligent, with intelligence being the attribute that allows an entity to function correctly and predictably in its environment." Artificial intelligence (AI) is the capacity of a machine to work intelligently by accurately reading incoming inputs and applying these teachings to achieve defined objectives and activities via a flexible design [16]. It is a result of human intelligence. AI is the intelligent base software that focuses on various human intelligence systems compound operations such as image processing, decision-making, speech recognition, and language processing. AI is a fictional technology that has altered many aspects of our life, including transportation, health, marketing, banking, and shopping [17]. In this industrial revolution, artificial intelligence (AI) is playing a key role. It can guard against cyber-attacks, viruses, and illegal access to the information system. AI can help with a variety of cybersecurity challenges. Multiple AI approaches, such as deep learning, machine learning, and concept of knowledge, can be used to reduce the cyber threat [7].
Due to the unpredictability of the economic climate and fierce competition, even the well-run businesses are vulnerable to failure and financial disaster. So whether financial difficulty in publicly traded firms can be projected properly and quickly is dependent on the development of the company, the interest of various investors, and the capital market order. Many investigators used AI to strengthen the security of information systems and interconnected devices in order to overcome security concerns and dangers. AI approaches assist machines in solving key issues in the same way that people do. AI can detect a variety of dangerous threats and assaults that can affect an organization's system. Using machine learning and deep knowledge, AI approaches respond in real time to numerous threats on the information system. Machine learning is a form of artificial intelligence that assists in identifying the ornament contained in incoming data [17].
Meanwhile, AI is being imposed on the education industry by the rapid advancement of information technology. Educational companies introduced the individual adaptive learning system (IALP) to support student enrolment and probe. It aims to aided teaching system, personalized learning that creates the classroom environment management, individual evaluation, and institute administration system to support the student enrolment and probe [18]. Rapidly changing needs, wants, and behavior of customers are influencing world economics, financial institutions, countries, the budget deficit, and business profitability and revenue aspects, while another view of economic development and financial crises, rapidly changing needs, wants, and behaviors of customers are influencing world economics, financial institutes, countries, and the budget deficit. Thuraisingham discussed the effects of robots and artificial intelligence on corporate economics and potential future study topics [19]. The technique and analysis of business trends and projections concerning sales, income, profits, and expenditures are all part of business forecasting. The goal of business forecasting is to give relevant data based on prophecy. Many businesses must gather this data in order to achieve their objectives [20]. The following are the main contribution of this systematic analysis: (i) For recognizing the difficulties facing or faced by financial sector of GCC region most typically (ii) To describe many strategies offered to address these difficulties, as well as where these solutions fall short (iii) How artificial intelligence-based solutions have been used to handle these problems and how they may be enhanced to ensure high levels of security and authenticity, and (iv) To identify the social and economical importance of AI on our lives and other government and nongovernment organizations (v) Based on this systematic analysis, new research directions must be proposed to ensure the safety and security of the organizations for both employees and employers The rest of the paper is organized as follows. Section 2 represents the background study, while Section 3 outlines the systematic protocol followed for this assessment work. Section 4 details the assessment criteria followed for   This question primarily focuses on extracting the information regarding different types of security issues most commonly faced by the employees and the people residing in the GCC region.

RQ2.
By utilizing AI capabilities as evidence, how many proactive approaches are proposed to counter organizational security risks in the GCC region?
The primary goal of this research question is to compile a list of various AI-based strategies that have been created to reduce organizational safety and security concerns in the GCC region. In addition, this inquiry aims to provide a new research direction for improving the capabilities of existing models or developing a new upgraded model.

RQ3.
Based on the extant findings, how can we improve the capabilities of the available authentication systems in the GCC organizations?
Based on the literature, this research topic aims to increase the organization's ability to improve the existing authentic systems to assure high security and ethnicity in GCC-based organizations.

RQ4.
What are the social and economic impacts of AI on financial bodies operating in the GCC region?
AI has a significant impact all around the world. This research topic aims to demonstrate the social and economic effects of AIbased solutions in the financial sectors of the GCC region.
3 Wireless Communications and Mobile Computing evaluation purposes. Section 5 briefly explains the results and discussion section. Section 6 presents the limitations of this research work followed by the conclusion in Section 7 of the paper.

Background Study
Artificial intellect (AI) is a new scientific technology that may simulate and expand human intelligence technology applications. AI is a study area at the crossroads of social science, natural science, and technological science. AI can process information in a way that is akin to human thinking and awareness. AI employs a procedural way to develop and extend the core of intelligence, resulting in a new sort of intelligent computer that behaves similarly to humans. The researchers investigated the influence and impact of AI on stakeholders, consumers, and businesses in the industry to improve the business [1]. Artificial intelligence (AI) has become a danger to people who labour manually as new information technology has been implemented. This danger exists for financial institutions as well. Despite this, investment in AI FinTech has not slowed due to the uncertainty that AI provides to mandatory customers, operators, and financial controllers. AI offers various social benefits to increase its credibility in financial institutions and win public acceptance [2].
Small enterprises contribute significantly to a country's economy. Almost 98 percent of businesses in the United States are small businesses with less than 100 employees. These companies employ a total of 36% of the workforce. It represents a market sector eager to improve its businesses using modern information technologies [3]. Because of blockchain technology, corporate governance has taken a new direction. A reliable and effective GITS (global information transmission system) will require a reliable value to the transmission system, the cornerstone of blockchain technology. A reliable and effective GITS (global information transmission system) will require a reliable deal to the transmission system, the cornerstone of blockchain technology. By employing cryptography, blockchain creates a mutually dispersed system that may achieve an agreement without personal intervention. By using cryptography, blockchain creates a mutually dispersed system that may execute a contract without personal intervention. Blockchain is a consensus method that acknowledges the advantages of reaching an agreement between two or more devices without the need of humans. Blockchain applications and cyberphysical systems are transforming traditional business models, technical procedures, and industrial processes. The Bitcoin network's blockchain symbolizes 1.0 technology [4].
An information system innovation is a sophisticated mechanism for administering distributed ledgers to the blockchain [5]. The key features of the traditional notebook system have aroused interest in blockchain technology due to frequent validations of operational transactions for validity, the secrecy of the encoded parties to the transaction, the inaccessibility of the control center, and the establishment of money. Cryptocurrencies are the well-known real-world solution to this new technology. It has about 2000 variations of various modifications. The ever-increasing revenue from cryptocurrencies, especially in the heavily regulated crypto industry, has taken control of exchanges and even specialized bank services as a new asset [6]. Machine vision remains a difficult issue that draws scholars to conduct research in this area. Machine vision systems (MVS) that are inspired by human vision systems have been developed (HVS) [7].
Artificial intelligence (AI) is a broad area of development that can offer a variety of advantages to enterprises. Following an immense quantity of data and a large increase in computing capabilities over the last few years, businesses have increasingly resorted to AI to generate economic value [8]. Global financial services are being reshaped as a result of fast technological advancements and increased competition. AI has recently attracted a lot of attention [9]. Organizations have implemented AI applications to generate more business value in increased sales, revenue, enhanced company efficiency, and cost savings [10]. According to a recent study published in the MIT Sloan Management Review, more than 80% of businesses see AI as a planned opportunity. AI is viewed as a tool to achieve a competitive edge by over 85% of respondents [11]. Various firms invest in AI technology to deal with organizational challenges and revenue development; nevertheless, some businesses fail to see AI's worth [12].

Research Protocol
SLR examines and determines a subject of interest by identifying a set of most relevant research questions in the selected research domain. In the SLR process, the research questions serve as a cornerstone. SLR uses a thorough, reliable, and verifiable technique to offer a fair appraisal of a research subject [21]. Many academics in diverse domains like healthcare systems [22], networking [23], crowdsourcing [24], and many others use SLR work to explore the extant and identify the gaps in the literature and define new research direction for the researchers to explore. This SLR method summarizes the literature on artificial intelligence and machine learning approaches used in financial institutions. Following are the list of the objectives that are aimed to be achieved by this systematic research work.
Analyze the current research activity in light of the four research topics that have been defined. These questions aim to outline the existing based on AI models developed to ensure high security in organizations, different types of This SLR project attempts to identify significant flaws in existing solutions and propose new future research areas to fill up the gaps. These new study paths will eventually aid firms and staff in assuring high authenticity for their security ways, preventing data leaking, and combating intruder attacks.
The most relevant research publications were chosen from four peer-reviewed internet sources for this SLR project. The researchers will be able to discover the most relevant research publications in the AI area and analyses them using this list of the most relevant research articles.
This SLR paper is being carried out following the guidelines defined by Mishra and Yadav and Daya [26,27]. The review protocol of this SLR has depicted in Figure 1. It consists of seven main steps: (1) selection of research q, (2) identification of research question, (3) search strategy, (4) selection appropriate studies, (5) review online libraries for most relevant papers selection, (6) quality assessment, and (7) conclusion and future direction. All these stages are described with full description in Figure 1.

Research Question.
Research questions (RQ) are just like the corner stone of any SLR work. The most relevant and highly precised RQs (by considering different aspects in a certain topic of interest) ensure the validity and applicability of the SLR work. To conduct this SLR work, we formulated a set of four RQs to explore the proposed field from different aspects. The details regarding the research questions and the underlined descriptions are detailed below in Table 1.

Keyword Finalization.
After formulating the research questions, the new activity is to identify the most suitable keywords that resultantly helped in accumulating relevant articles from the selected online repositories. The finalized most relevant articles retrieved are "SECURITY, SAFETY, RISKS, THREATS, MITIGATE, MINIMIZE, EMBEDDED, DEPPLY, EVIDENCE, PROOF, CAPABILITY, ABILITY, ORGANIZATION, SECTOR, INSTITUTE, IMPACT, OR EFFECT." These keywords are used for the query development according to the database requirements and tuned further for best outcomes (for the retrieval of satisfactory results in terms of relevant articles).

Query Selection.
To accelerate the articles accumulation process from the selected peer-reviewed libraries, the query    Cyber security has become a topic of worldwide concern and relevance. More than 50 countries have already released a policy statement defining their official positions on cyberspace, cybercrime, and cyber security. Participants with a prior understanding of cyber security could differentiate between distinct cyber-attacks; however, beginner participants were not sensitive to the assault types. For security analysis in corporate networks, it is critical to capture the unpredictable parts of cyber security. However, there has been little research into whether modelling techniques accurately capture such uncertainty, as well as how to design models that are effective in reality. An attack graph depicts the logical causation relationships across numerous privileges and configuration settings in an enterprise network, illustrating probable multistage assaults. Traditional methodologies and technologies to collect, parse, normalize, search, analyze, display, and explore the massive amount of security events gathered by security information and management systems are increasingly reaching their physical limits in many businesses (SIEM). Traditional SIEM devices are meant to statically correlate security events and provide warnings for possible cyber threats in any security operations center (SOC). Every day, billions of security events are generated by a typical company network with thousands of IT systems. The risk management process aids executive decisionmaking, helping managers and owners to fulfill their fiduciary duty of safeguarding their companies' assets. This critical procedure should not take a long time to complete. The strategy used by an organization to ensure the confidentiality, availability, integrity, nonrepudiation, accountability, authenticity, and dependability of its IT systems is known as information security. The potential use of artificial intelligence technology to ensure data protection. The benefits of utilizing machine learning to analyze data security incidents are demonstrated. A look at some of the most popular commercial information security tools today. The objective of AI applications is to solve problems that take an expert a long time to solve in a short amount of time. The generated model is capable of performing the needed activities in the same manner as an expert advisor. Furthermore, the built software may be utilized by virtually anyone, even if an expert is not present in the business [15][16][17][18][19][20][28][29][30][31][32][33][34] 2. Information security risk (ISR)

Wireless Communications and Mobile Computing
The security risks associated with each cloud delivery model differ and are based on a variety of factors, including the sensitivity of information assets, cloud topologies, and security measures implemented in a specific cloud environment. For a better knowledge of essential areas of emphasis in the cloud computing environment, as well as detecting threats and vulnerabilities, use this information risk management approach. Selecting a technique for conducting an information security risk analysis can be difficult for businesses. There are a variety of risk analysis approaches accessible today, some of which are qualitative and others of which are quantitative. The purpose of all of these approaches is to calculate the total risk value. Based on its unique requirements, an organization must choose the best technique. The main goal of information security is to protect an organization's important resources, such as hardware, software, and financial resources, as well as tangible and intangible assets. An organization's security objectives can be addressed by using appropriate security procedures and policies. Artificial intelligence technology excels at supervising and managing tasks in which humans fall short, hence, its use in networking has increased performance and security. [5,17,[21][22][23][35][36][37][38] 3.

Network security
A network risk assessment evaluates the network(s) that your company and workers utilize on a daily basis. Using risk assessment tools, the evaluation helps identify the threats to your essential systems and sensitive data. Cyber-attacks are growing more complicated, and reliable intrusion detection is becoming more difficult (ID). Failure to prevent infiltration can compromise security services such as data integrity, privacy, and availability. The fast growth of computer networks (CNs) has changed how people think about network security. Intrusion detection systems (IDS) are used to detect all types of computer activity and hostile network (NW) traffic that standard firewalls cannot detect. Personal computer users, businesses, and the military have all become more concerned about network security. With the introduction of the internet, security has become a big concern, and studying the history of security helps for a better understanding of how security technologies emerged. Many security issues were possible due to the internet's structure. Firewalls and encryption methods are used by many enterprises to protect themselves from the internet. Businesses construct an "intranet" to stay connected to the internet while protecting themselves from potential risks. [24,26,27,33] 4.

Security and safety
The attribute or state of being safe, such as being devoid of danger, employment stability, freedom from dread or anxiety, freedom from the risk of being laid off. With changes made both worldwide and nationally, technological breakthroughs improve the way we live. These [17,[39][40][41][42][43] 6 Wireless Communications and Mobile Computing is formulated ("SECURITY" OR "SAFETY" OR "RISKS" OR "THREATS") AND ("MITIGATE" OR "MINIMIZE") AND ("EMBEDDED" OR "DEPPLY") AND ("EVIDENCE" OR "PROOF" OR "CAPABILITY" OR "ABILITY") AND ("SEC-TOR" OR " ORGANIZATION " OR "INSTITUTE" OR "IMPACT" OR "EFFECT"). This query is fine-tuned depending on the gathered results and the libraries that have been chosen. The 126 most relevant research papers are picked based on the title, abstract, and content of the research piece. The next paragraph contains a detailed summary of the compiled research publications.

Review Online Libraries and Final Article Database
Development. We selected four of the most peer-reviewed online repositories to accumulate the most relevant research articles for the proposed SLR work, including Hindawi,

S. no
Type of security threat Description References technological advancements also have unintended consequences in the form of security risks. The use of artificial intelligence (AI) allows to solve complicated problems in the same way that people do. The artificial intelligence (AI) technology detects several assaults that threaten the application and system security of a company. The state of being safe the absence of the possibility of damage, danger, or loss. The ability to avoid or minimize damage, risk, or loss. A contraption or mechanism used to avoid harm or risk. Risk, safety, and security are all ideas that have attracted a lot of scholarly attention. There are a number of assumptions concerning their nature and relationship that have been made. Risk, safety, and security are often used in everyday discourse, in addition to academic contexts. 2. ISSRM Organizations' information system security risk management (ISSRM) is critical to their success. ISSRM ensures the availability, integrity, and privacy of information. However, especially in today's enterprises, where activities are done in a complex and interrelated setting, this latter remains a tough region to build and sustain. A well-defined strategy to produce business value is accomplished when an organization's business services and strategic planning are matched with proactive ISSRM operations. To do so, we'll look at risk management methodologies and security modelling languages to see why EAM may be beneficial. The relevance of business intelligence tools as an integrated solution for the insurance industry is growing due to the expanding data sizes in today's business sectors, as well as the requirement of risk management. The majority of the time, these tools have been employed to produce successful risk management. [45,46] 3. Adaptive learning systems Each discipline is meant to be designed as a workflow for a certain application area made of modules reflecting the necessary areas of knowledge, based on the ideas of "knowledge areas" and "application areas." Through so-called adaptive learning systems, it is possible to significantly improve education by introducing dynamic principles and customization in the curriculum. Furthermore, the management of adaptation may be accomplished using artificial intelligence technologies, which the authors have expertise with in the field of cybersecurity. [18]

Firewall technology
People's demands for network information technology are growing in tandem with the rapid advancement of science and technology. Artificial intelligence has arisen and is being used in a variety of industries to suit people's unique demands. The goal of incorporating artificial intelligence with computer network technology is to maximize the benefits of both technologies. In this way, computer networks may be utilized to make people's lives and work easier, and AI's function can be customized and humanized. It can also help to preserve information security and improve network administration at the same time. When compared to other defensive technology systems, the intelligent firewall system's combination of AI with firewall provides a greater level of intelligence and information processing impact. [47] 7 Wireless Communications and Mobile Computing Because the mobile channel may accommodate practically any sort of payment, financial theft in the IoT ecosystem is a rapidly expanding concern. Financial fraud in mobile payments has emerged and is becoming more widespread as a result of the fast development of mobile commerce and the IoT environment. Financial fraud causes financial loss in the real world; hence, a highly precise approach of financial fraud detection in an IoT context is required.
Furthermore, our technique suggested a machine-learning-based overall procedure for identifying financial fraud and compared it to artificial neural networks for detecting fraud and processing vast volumes of financial data. [59,60] 2.

New product innovation
Product lifecycle management (PLM) encompasses a wide range of technical, business, and management operations that occur throughout the lifespan of a product, from the conception of an intangible notion through the recycling of a finished product. AI theories, algorithms, and technologies to distinct stages of PLM (i.e., product design, production, and service) in the context of smart manufacturing. [61] 3.

Financial prediction models
Despite the rapid development of information science and technology, as well as computer networks, in the last decade, interdisciplinary research that promotes cross-fertilization of disciplines, and the application of research methods used in many other disciplines to financial market forecasting, it remains extremely difficult to predict the current and future state of financial markets. Due to the support of current financial market theories, as well as the relationship between global financial markets and the particular of the forecasting time horizon, financial market forecasting is a difficult study issue. [62]

Internet supply chain finance
Enterprise green operation is a commercial activity that incorporates environmental preservation into the whole operation and management process of a company. It necessitates that environmental preservation be the driving principle of corporate operations and that every link of business management be founded on it. Furthermore, with the liberalization of the financial sector, banks are no longer the exclusive source of supply chain finance in the nation, owing to the enormous financing demands of SMEs. The use of the internet and big data technologies to address the problem of information symmetry in small and mediumsized firms, as well as to break the chicken-neck of small and medium-sized business finance. [63]

Interbank offered rate
The interest rate at which banks lend money to one another in the money market is known as the interbank offer rate. Shibor can correctly and timely represent the capital supply and demand connection in the money market as a market-oriented core interest rate, and its changes will immediately transmit and impact China's financial sector. Research is to forecast and investigate the volatility and trend of interbank offer rates, which are the rates at which banks lend money to one another in the money market. [64]

Financial performance evaluation
In today's competitive market, both businesses and academic institutions place a premium on financial performance evaluation studies. The quality of financial performance has a direct impact on the long-term viability of businesses. Enterprises are paying greater attention to the use of financial performance assessment analysis to promote the sound growth of the entire company as the enterprise management concept deepens. The study-related variables effecting company financial performance, debt-paying capacity, and relevant indicators are chosen from the four aspects of profitability, operation ability, and development ability to design the financial performance assessment system. [65,66] 7.

E-commerce
Network flaws in the existing e-commerce operating paradigm, such as network chaos and unequal network distribution, impede economic growth and advancement. Through independent screening and an artificial intelligence system improves and analyses the assembly of e-commerce websites and merges the internet economics with online website theory. [4]

New product innovation
Currently, there is a growing tendency in enterprises to look at artificial intelligence and nonartificial intelligence for new product innovation and success. The goal of the continuing research is to look into the function of artificial and nonartificial intelligence in new product success, as well as the moderating effect of new product innovation in Chinese manufacturing companies. The findings revealed that both artificial and nonartificial intelligence had a favourable and substantial relationship with new product success. [61]

Accounting
The continued growth of AI has provided humanity with a plethora of new and unique experiences, as well as a variety of potential future services. Artificial intelligence is an unavoidable scientific and technical outcome of human civilization, as well as a future trend in human growth. In human civilization, accounting is an important financial analytical [67] 8 Wireless Communications and Mobile Computing work. Accounting's intelligentization is a microcosm of societal progress. Artificial intelligence can be used to improve financial accounting and support societal development with quicker and smarter services.

Financial management
The linked contents of AI and big data, extensively examines the growth of the financial industry, and demonstrates the application of AI and big data in the area of finance and big data. In the context of big data, a risk evaluation approach for financial information management systems. This approach creates logical nodes based on the system module and then creates a risk estimate model by looking for logical relationships between data. [68]

Financial crisis
Artificial intelligence is a technological advancement that involves the use of computer systems to do tasks that would normally need human intelligence. This was credited to artificial intelligence management's capacity, as a computer technology, to create, process, and analyze vast amounts of data at once, as opposed to when people are utilized, to assist managers in making speedy decisions because the analysis findings are accessible in real time. According to the study, financial management has a critical role in reducing risks, financial crises, and improving financial performance efficiency in a company or organization.

Banking
For operational and marketing factors, the present banking business is strongly reliant on technical artifacts backed by intelligent systems. However, the characteristics that enable practice between such technical interfaces and management acceptance have lagged, resulting in a knowledge gap. The paper discusses the influence of AI in financial innovation and the information safety management system (ISMS) in bank financial innovation in the span of AI. Big data, cloud computing, and other technologies have become extensively employed in business and life as a result of the continual development of numerous new internet technologies. The advancement of artificial intelligence technologies has been aided by the expansion of data size and processing capabilities. [6,34,38,48,[70][71][72][73][74] 13.

Financial sector
A macro view is desperately needed to examine the general nature of AI implementations and how enforcement should be handled within the new frontier of AI technology. The main parameters of the service robotics market include growth rates, volumes, and the scope of service robots, key players are identified. Researchers want to introduce the service of robots to the financial sector. [6,[75][76][77][78] 14.

Governance framework
Because of the widespread use of robots and artificial intelligence (AI) in a variety of industries, including autodriving, healthcare, military, mass media, service sector, large sets of information searching (legal records), financial services, and new business models, both developed and emerging market economies place a high value on AI development. The revealed scientific governance-based system will be constructed under the premise of responsible research innovation, with the researcher's objective being to establish a governance framework for AI. [79,80] 15.

Internal audit
Artificial intelligence (AI) is a technology discipline that stands out for what it can do and the benefits it can bring to a variety of industries. Internal auditing might benefit from incorporating AI into its activities, namely, through the automation of audit procedures that make them faster and more efficient, allowing internal auditors to take on more complicated jobs. Financial fraud and economic losses have paved the way for the development of trustworthy financial big data audit methods. It will assist internal auditors in deducing frauds in a systematic manner while also improving their skills. Internal auditors must adapt to AI's new innovation in order to help firms without losing sight of their goals. [48,81,82] 16. Education sector Some study subjects appear to have lasted the test of time as sophisticated technologies in education grow over time, while others have seen peaks and troughs. The goal of the study is to create an international standard-based cyber security system for university education. Each doctrine is recommended to be constructed as a workflow for a certain application area, consisting of modules reflecting the necessary fields of knowledge, based on the ideology of knowing areas and application areas. Through so-called adaptive learning systems, it is possible to significantly improve education by introducing dynamic principles and customization in the curriculum. Furthermore, the management of adaptation may be accomplished using artificial intelligence technologies, which the authors have expertise with in the field of cybersecurity. [18,83] 17.

Financial services
The current and potential consequences of artificial intelligence-(AI-) based applications, as well as technical difficulties linked to behavioral finance, are the subject of this research. [2,76,84] 9 Wireless Communications and Mobile Computing However, the financial services industry has seen tremendous progress in the field of AI-based applications, particularly in behavioral finance.

Validation for quality of service
Based on the input data, a genetic programming-based model is recommended to assure improved customer satisfaction with services. Customers are frequently exploited and subjected to other disruptions in conventional banking and other financial institutions. To address this issue, the authors have presented an effective method for providing and ensuring high-quality services [85] 19. Business Artificial intelligence (AI) is a broad category of technologies that may provide enterprises with a variety of benefits in terms of increased economic value. Following a deluge of data and a significant growth in computing capability, companies have increasingly turned to AI to create commercial value during the last several years. Business process optimization based on artificial intelligence (AI) has a substantial influence on a country's economic progress. We contend that the deployment of artificial neural networks in business processes will aid in optimizing these processes and guaranteeing the appropriate degree of functionality and compliance with the foundations of sustainable development. [8,86] 20.

Antimoney laundering
The state-of-the-art AI methodologies for AML, and then propose a framework for nextgeneration AML solutions that incorporates advanced natural language processing and deeplearning algorithms. Our methodology uses unstructured external data to help domain specialists, with the goal of reducing the human investigator's burden. The study demonstrates the disparity between traditional AML approaches and cutting-edge AI. It emphasizes fresh AI directions that can aid in the development of the AML pipeline, as well as an accessible solution with a lower false positive rate and greater flexibility. [89]

Investment in firm
Artificial intelligence (AI) has lately acquired traction and attention, resulting in a surge in interest and investment in the field. In comparison to other businesses, nonmanufacturing enterprises and firms with limited information technology skills or low credit ratings incur a more unfavourable impact. The data imply that the majority of investors consider AI investment announcements to be unpleasant news. Following that, the characteristics influencing shareholders' reactions to AI adoption are discussed. [90]

Business forecasting
The methods and tactics used to forecast company trends such as sales, expenditures, and profits are referred to as business forecasting. The goal of business forecasting is to make better strategies based on these accurate forecasts. Many firms believe that gathering knowledge about the future is critical to ensuring future organizational performance. Managers may make better judgments through improving forecasting progression. A recommendation system including graphical services, database function, reporting, interface, mathematics, and cosmological constants was created for connection recognition. [91]

Corporate governance
Corporate governance (CG) is important in a company's commitment to and adoption of ethical standards across the board, as well as in interactions with workers, customers, creditors, shareholders, and regulators. The influence of artificial intelligence's continual advancement and adaption on corporate governance. It evaluates the appropriateness, practicality, and responsibility of automating board-level decision-making to guarantee successful corporate governance using three lenses-the business, technology, and society lenses. AI can assist in freeing up government labour by automating repetitive operations, resulting in faster transactions in the delivery of government services and more correctly analyzing the effects of policy alternatives.

Marketing
A growing body of research on intelligent systems/artificial intelligence (AI) in marketing has revealed that AI can imitate people and perform tasks in an 'intelligent' manner. The paradigm provides systematic guidelines for how human marketers and consumers might collaborate with AI in marketing, which has substantial consequences for retailing, which serves as the interface between marketers and customers. For informed consumption decisions, marketers should optimize the mix and timing of AI-HI marketing teams, consumers should comprehend the complementarity between AI and HI capabilities, and [95,96] 10 Wireless Communications and Mobile Computing

Financial statement
Identifies the danger of severe financial irregularities occurring in the firm based on the yearly financial accounts. These anomalies might be related to many sorts of fraud that do not always influence the yearly financial accounts. The fact that anomalies are large-scale and will have a significant influence on the company's reputation is a distinguishing attribute of them. [97] 27.
Commercial bank In both business and society, artificial intelligence (AI) is gaining traction. The earliest uses of AI in banking were effective; nevertheless, AI is mostly used in investment banking and backend services that do not interact with customers. Using an AI-based system in commercial banks to decrease loan losses, enhance payment processing security, organize compliance-related labour, and boost customer happiness. [88,98] 28.

Supply chain
Quality client experiences, cost control, and a company's agility in the face of market possibilities and uncertainties are all dependent on supply chains. Companies desire speed, dependability, and traceability while keeping in mind budgetary constraints, deadlines, and inventory management. Supply chains today are substantially different from those of only a few years ago, and they are still evolving in a highly competitive environment. Technology that can cope with the rising complexity of dynamic supply chain operations is required. [99] 29.
Data governance Big data algorithmic systems (BDAS), which are frequently based on machine learning, neural networks, and other kinds of artificial intelligence, are made possible by the advent of big, open, and linked data (BOLD) (AI). When a result, as systems are increasingly asked to make decisions that affect individuals, communities, and society as a whole, failures cannot be allowed, and they must adhere to strict legal and ethical criteria. They all, however, rely on data that is not just large, open, and interconnected, but also diverse, dynamic, and transmitted at high rates in real time. [100] 30.

Business and economics
The industrial age, which mankind began long ago with the invention of steam power, resulted in rudimentary automation in manufacturing. Electronics, nanotechnology, breakthroughs in medicine, health, and digital applications, among other things, have all accelerated mechatronics research in recent years. The study demonstrates that altering the way businesses are conducted via the use of innovative technologies will have new effects on day-to-day operations as well as the export of these nations' economies to the global economy. As AI and robotics improve, many substances and services related to business and economics will face serious threats, exposures, hits, change, and opportunities, such as performance, jobless ratio, management, customer relationship management, sales, strategic planning, mass production, CRM analytics GDP, purchasing power parity, inflation, money, central banks, banking system, training, accounting, taxes, coaching, and so on [101]

Cash flow
Cash flow is currently one of the most essential notions in financial analysis. Large commercial banks' financial strategy relies heavily on cash flow forecasting. Forecasting cash flow is an essential aspect of the region's cash flow management process. In the event of a forecasting error, there may be a cash shortage in one of the currencies or an overflow of bank branch vaults, necessitating additional charges for strengthening or exporting money. Many variables impact money movement, including political, economic, and geographical considerations [102] 32.

Open data
The goal of this study is to assess the adoption of OD technology in Kuwait and to obtain company owners' perspectives on the concept's capacity to be adopted. Our strategy for getting various opinions and points of view concerning this technology was to create an online and hardcopy survey. We aimed to concentrate on the private sector, and we targeted individuals who operate a business and want to provide better services to their clients. [103]

Earnings equity
The impact of corporate social responsibility disclosure (CSRD) on earnings quality (EQ) in Gulf Cooperation Council member nations is investigated in this study (GCC). Corporate social responsibility (CSR), which has gotten a lot of attention in accounting and finance, has piqued the interest of accounting scholars. CSR has always combined social and corporate operations. [72]

Annual reports
Academics and scholars have been paying close attention to business sustainability and social responsibility in recent years. It has long been recognized that corporate financial performance is linked to, among other things, long-term corporate economic growth. All firms are encouraged to voluntarily report all aspects of their sustainability in order to [72] 11 Wireless Communications and Mobile Computing Springer Link, IEEE Xplore, and ScienceDirect. A total of 126 most relevant research articles are finalized for assessment and evaluation purposes. The description regarding final database development and relevant articles selection is descripted in Table 2.
A total of 126 research articles are finalized for the assessment and evaluation purposes. The number of articles contributed in this final pool from the selected different peer-reviewed online repositories is depicted in Figure 2.
With the passage of time, artificial intelligence has become a fascinating and appealing area for researchers all around the world. The researchers used artificial intelligence and machine learning techniques extensively in a variety of disciplines, including healthcare, tracking and navigation, internet security, and business and lucrative sectors and organizations. Based on these applications researchers used these models in financial firms to assure strong security and integrity of their personnel. Figure 3 shows the annual contribution of various research publications in the suggested subject depending on the research questions selected.
After evaluating the results shown in Figure 3, it is concluded that with passage of time, the number of research articles exponentially increases that reflects the interest of researchers in the proposed domain. After 2019, the number of publication increased abruptly that shows the interest of the organizations for ensuring high security and safety for its employees and other assets.

Quality Assessment
After the development of a final selection of relevant articles, the next critical step is to evaluate all of the relevant articles using the criteria that have been established [13]. For the assessment purposes in this research work, a quality criterion (QC) has defined given below: (i) If an article fully satisfies an inevitable selected research question, then that particular paper is assigned a weighted value of 1 (ii) While if a paper fails to satisfy to answer any particular research question, it was awarded a weighted value of 0

Results and Analysis
The findings of this SLR study are summarized in this portion of the publication. The relevant papers, as well as their emphasized descriptions in relation to each study topic, are detailed below.

What Are the Various Types of Organizational Security Risks Faced by Employees Working within the GCC Region?
This research question has outlined different security threats typically faced within the financial sectors in the GCC region [14]. In this modern technological age, dangers and consequences vary from types of threats and organizations. The prime objective of this research question is to outline

Firm financing
The majority of equity issuances occur in local markets, whereas bonds and loans are typically issued globally, have long maturities, and have minimal credit risk. In comparison to worldwide norms, the Arab region's issuing corporations are quite substantial. While the sums raised in the stock and credit markets (as a percentage of GDP) are high by international standards, bond issuance activity is low. Bond finance, on the other hand, has grown in importance over time. [73,104] 36.

Stock market
The stock markets in the Middle East are expanding at a breakneck speed. The goal is to identify the stock markets of Bahrain, Kuwait, Oman, Qatar, Saudi Arabia, and the United Arab Emirates' market dynamics and real-time interactions. While return behavior is certainly not uniform, there is evidence of growing market integration. [105,106]

IRFS
Recent advancements and changes in corporate governance (CG), as well as the ongoing discussion in the international accounting literature over the implementation of IFRS, have revealed a number of major deficiencies that have yet to be addressed. Many issues concerning the role of CG in the implementation of IFRS, particularly in Gulf member nations, remain unaddressed. Almost all prior research on the influence and link between CG and IFRS adoption was conducted in wealthy nations. [94,107] 38.

IT governance
Advancements in information and telecommunications technologies, information technology (IT) governance has become increasingly important in enterprises and organizations. IT governance has evolved into a valuable asset for every business, and it is now seen as a key to success and profit generation. [34]

Human resources management
Artificial intelligence is a true corporate innovation that will have a significant influence on how workers operate, particularly in the human resources and employment departments. [108] 12 Wireless Communications and Mobile Computing different threats reported in the extant and find out what type of new threats are available, or we face in common. Table 3 represents the list of security threats most reported in the literature.

By Utilizing AI Capabilities as Evidence, How Many
Proactive Approaches Are Proposed to Counter Organizational Security Risks in the GCC Region? This research question has offered a variety of ways for securing systems within an organization by utilizing AI capabilities. The major goal of this research topic is to describe the many proactive techniques to reducing security risk. Table 4 shows a list of several sorts of security risk mitigation techniques that have been recommended for use within businesses.

Based on the Extant Findings, How Can
We Improve the Capabilities of the Available Authentication Systems in the GCC Organizations? Most firms compete not only in their field of competence but also in being the leaders and innovators in the use of new applications and innovative technology. This fast growth in reliance on technology and its usage to process meaningful data has become a key audit problem for any firm [48]. In our current technology age, artificial intelligence and machine learning models have been widely proposed for a variety of research topics spanning from healthcare [49] to navigation systems [50,51], face recognition to object detection and recognition [52,53], and many others. The usage of mobile devices with access to vital resources is increasing, which increases the attack surface of digital assets. A smartphone or laptop can now be used to access a private company's network or data. The goal is to identify the many technologies involved in the implementations of continuous authentication, as well as the assessment methodologies and application cases [54]. This study attempts to present the recommended ways in the field of financial organization to ensure high security and authenticity, taking into account the varied applications of AI and machine learning techniques. Researchers throughout the world have presented several ways based on both deep and shallow architectures to assure high security and resist unauthorized access to security systems within businesses, and overall identification and recognition rates are comparably much better. To tackle the low accuracy rates of multiclass issues while also reducing simulation time, the researchers focused on hybrid models (deep-deep architectures, deep-shallow architectures, and so on), in which one architecture/classifier does one task while the other performs another. This cuts down on simulation time while ensuring excellent recognition rates. Using data fusion-based hybrid deep learning models, such models are presented for face verification [55], and many others. Given the importance of hybrid models, integrating sophisticated hybrid and AI models within financial institutions is the greatest way for providing high security for clients and investors.

What
Are the Social and Economic Impacts of AI on Financial Bodies Operating in the GCC Region? Artificial intelligence has a wide range of effects on our lives and has a wide range of cutting-edge applications in a variety of fields. It has reduced human labour in numerous research disciplines, such as text recognition, by offering automated applications [56,57], network security [57], and healthcare domain [51,58]. Table 5 represents the list of social and economical impacts of the artificial intelligence in different financial organizations.

Limitations
This research article has outlined 126 most relevant articles by analyzing the techniques developed to restrict unauthorized access in the organizations. Besides some key advantages, the following are the limitations of this systematic mapping: (i) Only four most peer-reviewed research libraries are selected for the articles accumulation and downloading purposes. Though there are a massive number of online repositories exist. Still, our prime concern was to select only those extensively searched and reviewed libraries by most researchers (ii) This SLR work is executed only for ten years, but the papers are published daily in artificial intelligence (iii) Only published research work is selected for assessment and analysis purposes. No under-review or the work under simulations in the labs is considered for evaluation and analysis purposes (iv) The papers are accumulated using keywords and formulated queries. So, if an article has no synonym matching the keywords, that paper was skipped during the article accumulation process. Also, if a paper has only a word relevant to artificial intelligence or machine learning, that paper was also skipped (if it fails to satisfy the selected research question or has no content pertinent to financial organizations)

Conclusions
AI has demonstrated exceptional skills in a variety of disciplines, including the financial and regulatory industries. Financial sectors in GCC countries are facing serious issues in terms of security, safety, and fraudulent activities as a result of the rise of information technology and smart apps. These challenges are significant roadblocks to financial companies' success, and in most situations, they result in significant losses in the form of cash loss, information theft, and so on. This work gives a systematic analysis by assessing the most relevant research publications gathered from peer-reviewed online repositories in order to address these challenges and present new future research paths for assuring high security, privacy, and safety. These articles were assessed for (1) recognizing the difficulties facing or faced by financial sector of GCC region most typically, (2) to describe the many strategies offered to address these 13 Wireless Communications and Mobile Computing difficulties, as well as where these solutions fall short, (3) how artificial intelligence-based solutions have been used to handle these problems and how they may be enhanced to ensure high levels of security and authenticity, and (4) what are the social and economic importance of AI on our lives and other sectors. Based on this systematic analysis, new research directions are proposed to ensure a safe and secure environment within the organizations for both employees and the owners.

Implications
This article has a lot of consequences in the financial sector of GCC region. The effectiveness of many processes will be improved by applying artificial intelligence skills in financial industry. Artificial intelligence, hybrid technology, and protocols can be used to safeguard data access for employees and financial institutions. Financial businesses should make data access control a solid policy decision that supports employee honesty, justice, and equality.

Data Availability
All related data is available in the paper.

Conflicts of Interest
The authors declare that they have no conflicts of interest