{"id":327,"date":"2024-12-10T16:45:00","date_gmt":"2024-12-10T16:45:00","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/bcwcyber\/?p=327"},"modified":"2024-12-13T16:52:01","modified_gmt":"2024-12-13T16:52:01","slug":"article-review-2","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/bcwcyber\/2024\/12\/10\/article-review-2\/","title":{"rendered":"Article Review 2"},"content":{"rendered":"Brayon Wesson <br \/>11\/17\/2024 <br \/><br \/>Article review #2<br \/>A review on the article \u201cInvestigating the Intersection of AI and Cybercrime: Risks, Trends, and Countermeasures\u201d<br \/><br \/><br \/>Research used <br \/>In this article research is used to address we see that research shows according to the article \u201cArtificial Intelligence (AI) has become increasingly prevalent in various industries, including cybersecurity.\u201d AI does have some factors that do help society but it can be seen through what was researched in this article that there are a lot of negative affects (Shetty). The article says \u201cThis study examines the latest AI tools and techniques cybercriminals use, including AI-empowered malware and social engineer- ing via GPT-like applications.\u201d Using these sources are the main reason for the usage of ai helps with the data that is being used (Shetty). The findings in the article highlight that there is a need to raise awareness of the converging lines that are the usage of  AI and increase in cybercrime. It is also stated by the article that \u201cThe results also illustrate the importance of understanding the potential dangers of AI in cybersecurity\u201d, with the research given it Is very obvious that there is more that needs to be done for the cyber world. <br \/><br \/>Social Sciences principles used <br \/>The main thing that is seen when it comes to social science principles in this article is the idea of Objectivity and Relativism.  This is mostly because of things that are included in the usage of AI and how cybercrime is used for it.  Objectively AI can be used for many crimes and with Relativism includes the moral aspects of using these pieces of software. <br \/><br \/>Conclusion <br \/>The article says a lot when it comes to everything that involves the usage of AI and its major affects on cybercrime and what cybercrime can do to affect others.  When we truly look at it AI is something that needs a huge amount of education and a huge amount of understanding to truly be taken seriously in the eyes of the public. This article helps bring a light to AI and the dangerous that it can cause. <br \/>Citations <br \/><br \/>Shetty, S. , Choi, K. &amp; Park, I. (2024). Investigating the Intersection of AI and Cybercrime: Risks, Trends, and Countermeasures . International Journal of Cybersecurity Intelligence &amp; Cybercrime, 7(2), &#8211; . DOI: https:\/\/doi.org\/10.52306\/2578-3289.1187 Available at: https:\/\/vc.bridgew.edu\/ijcic\/vol7\/iss2\/3<br \/>","protected":false},"excerpt":{"rendered":"<p>Brayon Wesson 11\/17\/2024 Article review #2A review on the article \u201cInvestigating the Intersection of AI and Cybercrime: Risks, Trends, and Countermeasures\u201d Research used In this article research is used to address we see that research shows according to the article \u201cArtificial Intelligence (AI) has become increasingly prevalent in various industries, including cybersecurity.\u201d AI does have&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/bcwcyber\/2024\/12\/10\/article-review-2\/\">Read More<\/a><\/div>\n","protected":false},"author":27488,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/bcwcyber\/wp-json\/wp\/v2\/posts\/327"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/bcwcyber\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/bcwcyber\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/bcwcyber\/wp-json\/wp\/v2\/users\/27488"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/bcwcyber\/wp-json\/wp\/v2\/comments?post=327"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/bcwcyber\/wp-json\/wp\/v2\/posts\/327\/revisions"}],"predecessor-version":[{"id":330,"href":"https:\/\/sites.wp.odu.edu\/bcwcyber\/wp-json\/wp\/v2\/posts\/327\/revisions\/330"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/bcwcyber\/wp-json\/wp\/v2\/media?parent=327"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/bcwcyber\/wp-json\/wp\/v2\/categories?post=327"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/bcwcyber\/wp-json\/wp\/v2\/tags?post=327"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}