{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,24]],"date-time":"2026-01-24T12:19:48Z","timestamp":1769257188847,"version":"3.49.0"},"reference-count":48,"publisher":"MDPI AG","issue":"13","license":[{"start":{"date-parts":[[2025,6,24]],"date-time":"2025-06-24T00:00:00Z","timestamp":1750723200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Electronics"],"abstract":"<jats:p>Users of all ages face risks on social media and messaging platforms. When encountering suspicious messages, legitimate concerns arise about a sender\u2019s malicious intent. This study examines recent advances in Natural Language Processing for detecting message-based threats in digital communication. We conducted a systematic review following PRISMA guidelines, to address four research questions. After applying a rigorous search and screening pipeline, 30 publications were selected for analysis. Our work assessed the NLP techniques and evaluation methods employed in recent threat detection research, revealing that large language models appear in only 20% of the reviewed works. We further categorized detection input scopes and discussed ethical and privacy implications. The results show that AI ethical aspects are not systematically addressed in the reviewed scientific literature.<\/jats:p>","DOI":"10.3390\/electronics14132551","type":"journal-article","created":{"date-parts":[[2025,6,24]],"date-time":"2025-06-24T06:49:38Z","timestamp":1750747778000},"page":"2551","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Advances in NLP Techniques for Detection of Message-Based Threats in Digital Platforms: A Systematic Review"],"prefix":"10.3390","volume":"14","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-3025-0687","authenticated-orcid":false,"given":"Jos\u00e9","family":"Saias","sequence":"first","affiliation":[{"name":"Departamento de Inform\u00e1tica, Escola de Ci\u00eancias e Tecnologia, Universidade de \u00c9vora, Rua Rom\u00e3o Ramalho, n. 59, 7000-671 \u00c9vora, Portugal"},{"name":"VISTA Lab, ALGORITMI Research Centre\/LASI, University of \u00c9vora, 7004-516 \u00c9vora, Portugal"}]}],"member":"1968","published-online":{"date-parts":[[2025,6,24]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"105","DOI":"10.1007\/s44282-024-00132-x","article-title":"Digital romance fraud targeting unmarried women","volume":"2","author":"Thumboo","year":"2024","journal-title":"Discov. Glob. Soc."},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"460","DOI":"10.1108\/JFC-02-2021-0042","article-title":"Meeting you was a fake: Investigating the increase in romance fraud during COVID-19","volume":"29","author":"Zeng","year":"2022","journal-title":"J. Financ. Crime"},{"key":"ref_3","first-page":"69","article-title":"Social Media Identity Deception Detection: A Survey","volume":"54","author":"Alharbi","year":"2021","journal-title":"Acm Comput. Surv."},{"key":"ref_4","unstructured":"Perik, L.W. (2025). Leveraging Generative Pre-trained Transformers for the Detection and Generation of Social Engineering Attacks: A Case Study on YouTube Collusion Scams. [Master\u2019s Thesis, University of Twente]."},{"key":"ref_5","doi-asserted-by":"crossref","unstructured":"Kyaw, P.H., Gutierrez, J., and Ghobakhlou, A. (2024). A Systematic Review of Deep Learning Techniques for Phishing Email Detection. Electronics, 13.","DOI":"10.3390\/electronics13193823"},{"key":"ref_6","doi-asserted-by":"crossref","unstructured":"Europol (2021). Internet Organised Crime Threat Assessment (IOCTA) 2021, Publications Office of the European Union.","DOI":"10.1016\/S1361-3723(21)00125-1"},{"key":"ref_7","unstructured":"Europol (2024). Internet Organised Crime Threat Assessment (IOCTA) 2024, Publications Office of the European Union."},{"key":"ref_8","unstructured":"Jurafsky, D., and Martin, J.H. (2025). Speech and Language Processing, Stanford University. [3rd ed.]."},{"key":"ref_9","unstructured":"IBM (2025, April 04). What is Machine Learning?. Available online: https:\/\/www.ibm.com\/think\/topics\/machine-learning."},{"key":"ref_10","unstructured":"Goodfellow, I., Bengio, Y., and Courville, A. (2016). Deep Learning, MIT Press."},{"key":"ref_11","unstructured":"Vaswani, A., Shazeer, N., Parmar, N., Uszkoreit, J., Jones, L., Gomez, A.N., Kaiser, L., and Polosukhin, I. (2017, January 4\u20139). Attention is All You Need. Proceedings of the 31st Conference on Neural Information Processing Systems (NIPS 2017), Long Beach, CA, USA."},{"key":"ref_12","unstructured":"Barber\u00e1, I. (2025, June 12). AI Privacy Risks & Mitigations\u2014Large Language Models (LLMs). Available online: https:\/\/www.edpb.europa.eu\/system\/files\/2025-04\/ai-privacy-risks-and-mitigations-in-llms.pdf."},{"key":"ref_13","unstructured":"Booth, A., Sutton, A., Clowes, M., and James, M. (2022). Systematic Approaches to a Successful Literature Review, SAGE Publications Ltd.. [3rd ed.]."},{"key":"ref_14","doi-asserted-by":"crossref","unstructured":"Fakhouri, H., Alhadidi, B., Omar, K., Makhadmeh, S., Hamad, F., and Halalsheh, N. (2024, January 26\u201328). AI-Driven Solutions for Social Engineering Attacks: Detection, Prevention, and Response. Proceedings of the 2nd International Conference on Cyber Resilience (ICCR), Dubai, United Arab Emirates.","DOI":"10.1109\/ICCR61006.2024.10533010"},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"e1230","DOI":"10.1002\/cl2.1230","article-title":"PRISMA2020: An R package and Shiny app for producing PRISMA 2020-compliant flow diagrams, with interactivity for optimised digital transparency and Open Synthesis","volume":"18","author":"Haddaway","year":"2022","journal-title":"Campbell Syst. Rev."},{"key":"ref_16","doi-asserted-by":"crossref","unstructured":"Patel, H., Rehman, U., and Iqbal, F. (2024, January 8\u201311). Evaluating the Efficacy of Large Language Models in Identifying Phishing Attempts. Proceedings of the 16th International Conference on Human System Interaction (HSI), Paris, France.","DOI":"10.1109\/HSI61632.2024.10613528"},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"28335","DOI":"10.1109\/ACCESS.2025.3540075","article-title":"Benchmarking and Evaluating Large Language Models in Phishing Detection for Small and Midsize Enterprises: A Comprehensive Analysis","volume":"13","author":"Zhang","year":"2025","journal-title":"IEEE Access"},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"104188","DOI":"10.1016\/j.cose.2024.104188","article-title":"FDN-SA: Fuzzy deep neural-stacked autoencoder-based phishing attack detection in social engineering","volume":"148","author":"Vidyasri","year":"2025","journal-title":"Comput. Secur."},{"key":"ref_19","doi-asserted-by":"crossref","unstructured":"Aljamal, M., Alquran, R., Aljaidi, M., Aljamal, O.S., Alsarhan, A., Al-Aiash, I., Samara, G., Banisalman, M., and Khouj, M. (2024, January 10\u201312). Harnessing ML and NLP for Enhanced Cybersecurity: A Comprehensive Approach for Phishing Email Detection. Proceedings of the 25th International Arab Conference on Information Technology, Zarqa, Jordan.","DOI":"10.1109\/ACIT62805.2024.10877181"},{"key":"ref_20","doi-asserted-by":"crossref","unstructured":"Ibrahim, A., Alyousef, S., Alajmi, H., Aldossari, R., and Masmoudi, F. (2024, January 3\u20134). Phishing Detection in Arabic SMS Messages using Natural Language Processing. Proceedings of the Seventh International Women in Data Science Conference at Prince Sultan University, Riyadh, Saudi Arabia.","DOI":"10.1109\/WiDS-PSU61003.2024.00040"},{"key":"ref_21","first-page":"69","article-title":"A machine learning and natural language processing-based smishing detection model for mobile money transactions","volume":"16","author":"Zimba","year":"2024","journal-title":"Int. J. Inf. Technol. Secur."},{"key":"ref_22","doi-asserted-by":"crossref","first-page":"25164","DOI":"10.1109\/ACCESS.2024.3365193","article-title":"Uncovering SMS Spam in Swahili Text Using Deep Learning Approaches","volume":"12","author":"Mambina","year":"2024","journal-title":"IEEE Access"},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"109","DOI":"10.1007\/s42979-024-03532-7","article-title":"Detecting Smishing Messages Using BERT and Advanced NLP Techniques","volume":"6","author":"Jain","year":"2025","journal-title":"SN Comput. Sci."},{"key":"ref_24","doi-asserted-by":"crossref","first-page":"16072","DOI":"10.1109\/ACCESS.2024.3359030","article-title":"CSE-ARS: Deep Learning-Based Late Fusion of Multimodal Information for Chat-Based Social Engineering Attack Recognition","volume":"12","author":"Tsinganos","year":"2024","journal-title":"IEEE Access"},{"key":"ref_25","doi-asserted-by":"crossref","unstructured":"Ai, L., Kumarage, T., Bhattacharjee, A., Liu, Z., Hui, Z., Davinroy, M., Cook, J., Cassani, L., Trapeznikov, K., and Kirchner, M. (2024, January 12\u201326). Defending Against Social Engineering Attacks in the Age of LLMs. Proceedings of the 2024 Conference on Empirical Methods in Natural Language Processing, Miami, FL, USA.","DOI":"10.18653\/v1\/2024.emnlp-main.716"},{"key":"ref_26","doi-asserted-by":"crossref","unstructured":"DiMario, C.L., Bacha, R.C., and Butka, B.K. (2024, January 11\u201313). Combatting Senior Scams Using a Large Language Model-Created Rubric. Proceedings of the 5th Asia Service Sciences and Software Engineering Conference (ASSE 2024), Tokyo, Japan.","DOI":"10.1145\/3702138.3702140"},{"key":"ref_27","doi-asserted-by":"crossref","unstructured":"Reddy, M., and Pallerla, R. (2025, January 5\u20137). Using AI to Detect and Classify Suspicious Mobile Messages in Real Time. Proceedings of the 3rd International Conference on Intelligent Data Communication Technologies and Internet of Things (IDCIoT), Bengaluru, India.","DOI":"10.1109\/IDCIOT64235.2025.10914800"},{"key":"ref_28","first-page":"289","article-title":"Classifying SMS as spam or ham: Leveraging NLP and machine learning techniques","volume":"14","author":"Dharrao","year":"2024","journal-title":"Int. J. Saf. Secur. Eng."},{"key":"ref_29","doi-asserted-by":"crossref","unstructured":"Asmitha, M., and Kavitha, C.R. (2024, January 5\u20137). Exploration of Automatic Spam\/Ham Message Classifier Using NLP. Proceedings of the 9th International Conference for Convergence in Technology (I2CT), Pune, India.","DOI":"10.1109\/I2CT61223.2024.10544236"},{"key":"ref_30","doi-asserted-by":"crossref","unstructured":"Anh, H.Q., Anh, P.T., Nguyen, P.S., and Hung, P.D. (2024, January 20\u201322). Federated Learning for Vietnamese SMS Spam Detection Using Pre-trained PhoBERT. Proceedings of the 25th International Conference on Intelligent Data Engineering and Automated Learning\u2014IDEAL 2024, Valencia, Spain.","DOI":"10.1007\/978-3-031-77731-8_24"},{"key":"ref_31","unstructured":"Sivakumar, M., Abishek, S.A., Karthik, N., and Vanitha, J. (2024, January 21\u201323). Offensive Message Spam Detection in Social Media Using Long Short-Term Memory. Proceedings of the 3rd Edition of IEEE Delhi Section Flagship Conference (DELCON), New Delhi, India."},{"key":"ref_32","doi-asserted-by":"crossref","unstructured":"Bennet, D.T., Bennet, P.S., Thiagarajan, P., and Sundarakantham, K. (2024, January 1\u20132). Content Based Classification of Short Messages using Recurrent Neural Networks in NLP. Proceedings of the International Conference on Artificial Intelligence, Computer, Data Sciences and Applications (ACDSA), Victoria, Seychelles.","DOI":"10.1109\/ACDSA59508.2024.10467367"},{"key":"ref_33","doi-asserted-by":"crossref","first-page":"112939","DOI":"10.1016\/j.knosys.2024.112939","article-title":"Spam email classification based on cybersecurity potential risk using natural language processing","volume":"310","author":"Fidalgo","year":"2025","journal-title":"Knowl.-Based Syst."},{"key":"ref_34","doi-asserted-by":"crossref","unstructured":"Geetha, B., Sushmitha, B., Ilanchezhian, P., Alabdeli, H., and Ahila, R. (2024, January 18\u201319). A Bi-directional Gated Recurrent Unit and Long Short-Term Memory based Fake Profile Identification System. Proceedings of the First International Conference on Software, Systems and Information Technology (SSITCON), Tumkur, India.","DOI":"10.1109\/SSITCON62437.2024.10796272"},{"key":"ref_35","doi-asserted-by":"crossref","unstructured":"Singha, A.K., Paul, A., Sonti, S., Guntur, K., Chiranjeevi, M., and Dhuli, S. (2024, January 24\u201328). BERT-Based Detection of Fake Twitter Profiles: A Case Study on the Israel-Palestine War. Proceedings of the 15th International Conference on Computing Communication and Networking Technologies (ICCCNT), Kamand, India.","DOI":"10.1109\/ICCCNT61001.2024.10724386"},{"key":"ref_36","doi-asserted-by":"crossref","unstructured":"Arunprakaash, R.R., and Nathiya, R. (2024, January 8\u20139). Leveraging Machine Learning algorithms for Fake Profile Detection on Instagram. Proceedings of the 7th International Conference on Circuit Power and Computing Technologies (ICCPCT), Kollam, India.","DOI":"10.1109\/ICCPCT61902.2024.10673398"},{"key":"ref_37","doi-asserted-by":"crossref","unstructured":"Asha, V., Nithya, B., Prasad, A., Kumari, M., Hujaifa, M., and Sharma, A. (2025, January 11\u201313). Optimizing Fraud Detection with XGBoost and CatBoost for Social Media Profiles and Payment Systems. Proceedings of the International Conference on Electronics and Renewable Systems (ICEARS), Tuticorin, India.","DOI":"10.1109\/ICEARS64219.2025.10940620"},{"key":"ref_38","doi-asserted-by":"crossref","unstructured":"Kuruvilla, A., Daley, R., and Kumar, R. (2024, January 6\u20139). Spotting Fake Profiles in Social Networks via Keystroke Dynamics. Proceedings of the IEEE 21st Consumer Communications & Networking Conference (CCNC), Las Vegas, NV, USA.","DOI":"10.1109\/CCNC51664.2024.10454821"},{"key":"ref_39","unstructured":"Abhijith, A.B., and Prithvi, P. (2024, January 11\u201312). Automated Toxic Chat Synthesis, Reporting and Removing the Chat in Telegram Social Media Using Natural Language Processing Techniques. Proceedings of the Fourth International Conference on Advances in Electrical, Computing, Communication and Sustainable Technologies (ICAECT), Bhilai, India."},{"key":"ref_40","unstructured":"Shiny, J., Penyameen, S., Hannah, N., Harilakshmi, J.S., Hewin, A., and Thanusha, S. (2024, January 10\u201312). Analysis of Behavior in Chat Applications using Natural Language Processing. Proceedings of the 2nd International Conference on Sustainable Computing and Smart Systems (ICSCSS), Coimbatore, India."},{"key":"ref_41","first-page":"1","article-title":"Pretending to be a VIP! Characterization and Detection of Fake and Clone Channels on Telegram","volume":"19","author":"Mei","year":"2024","journal-title":"Acm Trans."},{"key":"ref_42","unstructured":"Paladini, T., Ferro, L., Polino, M., Zanero, S., and Carminati, M. (October, January 30). You Might Have Known It Earlier: Analyzing the Role of Underground Forums in Threat Intelligence. Proceedings of the 27th International Symposium on Research in Attacks, Intrusions and Defenses (RAID \u201924), Padua, Italy."},{"key":"ref_43","doi-asserted-by":"crossref","first-page":"183","DOI":"10.1007\/s44196-024-00580-y","article-title":"Reading Between the Lines: Machine Learning Ensemble and Deep Learning for Implied Threat Detection in Textual Data","volume":"17","author":"Raza","year":"2024","journal-title":"Int. J. Comput. Intell. Syst."},{"key":"ref_44","first-page":"1","article-title":"Integrating Content Moderation Systems with Large Language Models","volume":"19","author":"Franco","year":"2024","journal-title":"Acm Trans."},{"key":"ref_45","doi-asserted-by":"crossref","unstructured":"Feretzakis, G., Vagena, E., Kalodanis, K., Peristera, P., Kalles, D., and Anastasiou, A. (2025). GDPR and Large Language Models: Technical and Legal Obstacles. Future Internet, 17.","DOI":"10.3390\/fi17040151"},{"key":"ref_46","doi-asserted-by":"crossref","first-page":"145","DOI":"10.1038\/s41746-025-01520-6","article-title":"Addressing contemporary threats in anonymised healthcare data using privacy engineering","volume":"8","author":"Narayan","year":"2025","journal-title":"NPJ Digit. Med."},{"key":"ref_47","doi-asserted-by":"crossref","first-page":"985","DOI":"10.1007\/s43681-022-00220-1","article-title":"Proportionality principle for the ethics of artificial intelligence","volume":"3","author":"Karliuk","year":"2023","journal-title":"AI Ethics"},{"key":"ref_48","doi-asserted-by":"crossref","unstructured":"Nie, N., Guo, H., and Song, W. (2024, January 25\u201327). Authenticity Classification of WeChat Group Chat Messages Based on LDA and NLP. Proceedings of the 9th International Conference on Cloud Computing and Big Data Analytics (ICCCBDA), Chengdu, China.","DOI":"10.1109\/ICCCBDA61447.2024.10569975"}],"container-title":["Electronics"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2079-9292\/14\/13\/2551\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,9]],"date-time":"2025-10-09T17:57:41Z","timestamp":1760032661000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2079-9292\/14\/13\/2551"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,6,24]]},"references-count":48,"journal-issue":{"issue":"13","published-online":{"date-parts":[[2025,7]]}},"alternative-id":["electronics14132551"],"URL":"https:\/\/doi.org\/10.3390\/electronics14132551","relation":{},"ISSN":["2079-9292"],"issn-type":[{"value":"2079-9292","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,6,24]]}}}