{"id":362,"date":"2025-11-25T16:59:11","date_gmt":"2025-11-25T16:59:11","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/ankaya\/?page_id=362"},"modified":"2025-11-25T17:00:22","modified_gmt":"2025-11-25T17:00:22","slug":"article-1","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/ankaya\/article-1\/","title":{"rendered":"Article 1"},"content":{"rendered":"\n<h1 class=\"wp-block-heading\">Understanding the Use of Artificial Intelligence in Cybercrime<\/h1>\n\n\n\n<p><br>Introduction<br>Choi, Dearden, and Parti&#8217;s publication \u201cUnderstanding the Use of Artificial Intelligence<br>in Cybercrime\u201d, which was published in the International Journal of Cybersecurity Intelligence<br>&amp; Cybercrime in 2024, examines the growing exploitation of artificial intelligence (AI) for illicit<br>purposes. Although AI has many advantages, including data processing, automated decision-<br>making, and predictive analytics, it has also opened fresh paths for criminal activity. AI is now<br>being used by cybercriminals to create deepfakes, improve phishing attempts, automate malware,<br>and even more easily exploit human vulnerabilities.<br>Three major pieces that focus on healthcare cybersecurity, AI-driven threats like large<br>language models (LLMs), and a new integrated theoretical framework for explaining the<br>changing nature of cybercrime are all contained in this special issue. When combined, they offer<br>a multidisciplinary strategy involving social problems, advances in technology, and theories of<br>crime. This review&#8217;s objective is to analyze the article&#8217;s research design, methodology, and<br>contributions while linking them to social science concepts, class concepts, marginalized groups,<br>and broad societal effects.<br>Source of the Article<br>Choi, S., Dearden, T., and Parti, K. (2024). Understanding the use of artificial intelligence in<br>cybercrime. International Journal of Cybersecurity Intelligence and Cybercrime, 7(2), 1\u20133.<br>https:\/\/doi.org\/10.52306\/2578-3289.1185<a href=\"https:\/\/doi.org\/10.52306\/2578-3289.1185\" target=\"_blank\" rel=\"noreferrer noopener\"><\/a><\/p>\n\n\n\n<p><\/p>\n\n\n\n<p>A special edition of the journal has this section as its editorial introduction. The authors sum up<br>three peer-reviewed studies chose from the 2024 International White Hat Conference. These<br>studies showcase both empirical and theoretical work on AI-enabled cybercrime. By merging<br>real-world case studies, mixed-method research, and new criminological frameworks, the issue<br>makes a remarkable advanced to the understanding of cybercrime in the digital age.<br>Research Design<br>The three distinct studies included in this special edition each with their own design:<br>Study 1 (Praveen et al., 2024): This study examines healthcare victimization taking Routine<br>Activity Theory (RAT) and the VIVA framework. It analyses how to attribute of the target such<br>as value, inertia, visibility, and accessibility (VIVA) form the risks faced by healthcare<br>organizations.<br>Independent Variables (IV): Target features (e.g., sensitivity of healthcare data, accessibility of<br>systems).<br>Dependent Variable (DV): Cyber-victimization is likely.<br>Study 2 (Shetty et al., 2024): This research analyzes AI-driven risks, especially the misusage of<br>large language models (LLMs) and AI-based malicious code. Using a mixed-method design, the<br>study takes in both qualitative interviews with experts and quantitative analysis of AI prompts.<br>Independent Variables (IV): Use of AI tools such as LLMs and AI-generated malicious activity.<br>Dependent Variable (DV): Exposure of new cybersecurity risks and security weakness.<br>Study 3 (Smith, 2024): This theoretical study introduces the Integrated Model of Cybercrime<br>Dynamics (IMCD), which investigates the interactions between person attributes, online<br>behavior, and environmental factors.<\/p>\n\n\n\n<p><\/p>\n\n\n\n<p>Independent Variables (IV): Individual characteristics and online habits.<br>Dependent Variable (DV): Offending and victimization results.<br>Methods &amp; Analysis<br>Each study uses various techniques.:<br>Study 1: A case study technique centered on the healthcare industry. Using RAT and Cyber-<br>RAT, it shows how offenders use institutional vulnerabilities and how poor &#8220;digital<br>guardianship&#8221; elevates risk. The report suggests preventive measures include technical<br>safeguards, personnel awareness training, and legal frameworks.<br>Study 2: A combination of qualitative and quantitative methods using a mixed-method design.<br>Professional interviews provide insider viewpoints on the vulnerabilities posed by LLMs, while<br>an analysis of AI prompts demonstrates how attackers could utilize these tools. The report<br>suggests that increased cybersecurity and user awareness are crucial as AI tools grow more<br>Study 3: An introduction to the IMCD framework using a conceptual approach. It maps how<br>individual characteristic, online customs, and environmental circumstances interact to shape both<br>offending and adversity. This model gives flexibility for policy formulation, education, and<br>upcoming empirical research.<br>Linking PowerPoint and the Article<br>The Module 5 PowerPoint describes why individuals commit cybercrimes, the psychological<br>theories behind their actions, and why victims can be vulnerable. It also indicates how cyber<br>specialist must realize criminal behavior.<br>The article joins that AI makes these subjects worse by allowing of phishing, deepfakes, and<br>malware. Both accepts that while motives remain the identical, AI rises the scale and risk of<br>cybercrime.<\/p>\n\n\n\n<p><\/p>\n\n\n\n<p>Relation to Social Science Principles<br>The research is based on social science and criminology theories:<br>Routine Activity Theory (RAT): Illustrates how in cyberspace, ideal targets, motivated<br>criminals, and the lack of effective guardians come together.<br>Cyber-RAT Extension: By applying RAT to online activities, the Cyber-RAT Extension<br>demonstrates how digital routines expose people and businesses to artificial intelligence dangers.<br>Victimization Theory: Describes how structural flaw, such as weak security infrastructure,<br>make certain groups overmuch vulnerable.<br>Sociotechnical Systems Perspective: Emphasizes the ways in which technological<br>vulnerabilities interact with social elements, such as employee awareness and training.<br>By combining their findings into these frameworks, the authors ensure that the research is not<br>just technically valuable but also a sociological perspective meaningful.<br>Class Concepts<br>The article is directly related to course concepts:<br>Social Engineering: AI improves phishing by producing convincing and targeted messages.<br>Deepfakes: These tools facilitate scam, imposture, cyberbullying, and disinformation.<br>Cyber Hygiene: Highlighted as an essential defense against increasingly sophisticated attacks.<br>Policy and Law: The issue underscores the necessity for new policies to keep up with rapid<br>technological progress.<br>Marginalized Groups<br>The issue highlights how marginalized populations are disproportionately affected by AI-driven<br>cybercrime:<\/p>\n\n\n\n<p><\/p>\n\n\n\n<p>Healthcare Patients: Their sensitive entry makes them main targets in data breaches, putting<br>them at risk of long-term financial and emotional harm.<br>Non-technical Users: People with minimal digital literacy are more vulnerable to AI-powered<br>phishing or deepfake frauds.<br>Developing Countries and Small Organizations: Their lack of resources and insufficient<br>infrastructure cause them more vulnerable to AI-powered hacks.<br>Recognizing these differences underlines the moral need of academics and decision-makers to<br>safeguard vulnerable groups. The issue demonstrates how marginalized individuals suffer the<br>most by AI-driven cybercrime.<br>Societal Contributions<br>The research together provides major societal benefits:<br>1. Healthcare Resilience: Study 1 suggests multilayer prevention strategies\u2014technical, legal,<br>and educational\u2014to top safeguard healthcare systems.<br>2. AI Risk Awareness: Study 2 highlights the significance of cyber hygiene and digital literacy<br>while enhancing awareness of the new risks posed by LLMs.<br>3. Theoretical Advancement: The IMCD model in Study 3 offers a framework that may be<br>modified for use in research, instruction, and policy.<br>4. Policy and Collaboration: The issue highlights the necessity of interdisciplinary cooperation<br>between scholars, practitioners, and policymakers in order to combat the ever-evolving threats<br>posed by cyberspace.<br>The special issue helps to educate decision-making and build long-term resilience by connecting<br>research and practice.<br>Conclusion<\/p>\n\n\n\n<p><\/p>\n\n\n\n<p>Understanding the Use of Artificial Intelligence in Cybercrime proposals an insightful<br>look at how AI technologies are utilized for criminal purposes and how the community can<br>respond. The special issue offers a comprehensive viewpoint on new risks through empirical<br>research, mixed-method techniques, and innovative theory. It promotes proactive tactics,<br>stresses the need of protecting underprivileged groups, and draws attention to the applicability of<br>social scientific theories. The study concludes by showing that a multidisciplinary strategy<br>combining criminology, sociology, technology, and policy is necessary to tackle AI-enabled<br>cybercrime. This contribution makes society more prepared to handle the difficulties posed by<br>AI-driven cyberthreats by strengthening both academic knowledge and useful solutions.<br>References<br>Choi, S., Dearden, T., &amp; Parti, K. (2024). Understanding the use of artificial intelligence in<br>cybercrime. International Journal of Cybersecurity Intelligence &amp; Cybercrime, 7(2), 1\u20133.<br>https:\/\/doi.org\/10.52306\/2578-3289.1185<br>Praveen, Y., Kim, M., &amp; Choi, K. (2024). Cyber victimization in the healthcare industry:<br>Analyzing offender motivations and target characteristics through Routine Activities Theory<br>(RAT) and Cyber-Routine Activities Theory (Cyber-RAT). International Journal of<br>Cybersecurity Intelligence &amp; Cybercrime, 7(2), 4\u201327.<br>Shetty, S., Choi, K., &amp; Park, I. (2024). Investigating the intersection of AI and cybercrime:<br>Risks, trends, and countermeasures. International Journal of Cybersecurity Intelligence &amp;<br>Cybercrime, 7(2), 28\u201353.<br>Smith, T. (2024). Integrated model of cybercrime dynamics: A comprehensive framework for<br>understanding offending and victimization in the digital realm. International Journal of<br>Cybersecurity Intelligence &amp; Cybercrime, 7(2), 54\u201370.<\/p>\n\n\n\n<p><\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><\/h2>\n","protected":false},"excerpt":{"rendered":"<p>Understanding the Use of Artificial Intelligence in Cybercrime IntroductionChoi, Dearden, and Parti&#8217;s publication \u201cUnderstanding the Use of Artificial Intelligencein Cybercrime\u201d, which was published in the International Journal of Cybersecurity Intelligence&amp; Cybercrime in 2024, examines the growing exploitation of artificial intelligence (AI) for illicitpurposes. Although AI has many advantages, including data processing, automated decision-making, and predictive&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/ankaya\/article-1\/\">Read More<\/a><\/div>\n","protected":false},"author":31204,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/ankaya\/wp-json\/wp\/v2\/pages\/362"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/ankaya\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/ankaya\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/ankaya\/wp-json\/wp\/v2\/users\/31204"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/ankaya\/wp-json\/wp\/v2\/comments?post=362"}],"version-history":[{"count":2,"href":"https:\/\/sites.wp.odu.edu\/ankaya\/wp-json\/wp\/v2\/pages\/362\/revisions"}],"predecessor-version":[{"id":364,"href":"https:\/\/sites.wp.odu.edu\/ankaya\/wp-json\/wp\/v2\/pages\/362\/revisions\/364"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/ankaya\/wp-json\/wp\/v2\/media?parent=362"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}