BJ Sutton Jr.
11/28/2024
Article Review #1
Connections between AI and Cybercrimes
Principles of the Social Sciences
On the Start of this Article, lets address the Social Science of Relativism, Objectivity, and Empiricism which follows with, “Its rapid development has spurred a wave of innovation across diverse industries, with over 90% of leading businesses and organizations planning to integrate AI into their operations, which significantly enhance their business performance (Haan, 2023).” Plus, with the components of AI, it also “encompasses a diverse range of disciplines with the goal of developing machines and systems capable of executing tasks typically associated with human intelligence.”
Questionable hypotheses
One of the biggest number 1 questions that popped up was, “How is information involving malicious use of AI distributed and used on both the dark web and the clear web, and what are the mechanisms for its transfer between these domains?” In the article they state that, “to collecting the prompts, they examined various online forums on clear web and dark web for discussions and exchanges related to AI-generated prompts. Specifically, they identified eight distinct forums that served as platforms for AI-generated prompts: FlowGPT, Respostas Ocultas, Reddit, Dread, Legal RC, Hidden Answers, Dark Net Army, and YouTube.”
Research Methods
One of the methods that they mainly used for this study was Cyber RAT framework which, “extended the traditional Routine Activities Theory to better explain computer crime victimization by underscoring that, in the digital age, the presence of motivated offenders is inevitable due to the internet’s broad accessibility and anonymity it provides in the cyberspace.” This also, “provided a strong analytical framework in understanding the factors related to cyber victimization by focusing on capable guardianship and individual cyber hygiene as means to reduce the likelihood of victimization.”
Data and Analysis
Although, on the Data and Analysis side of things, “The data gathered from written statements and recordings of virtual interviews were then reviewed to identify recurring themes across the expert responses.” Next, for gathering data, “The process began with transcription, familiarization with the data, and selection of quotations, followed by the selection of keywords, coding, theme development, and finally, conceptualization through the interpretation of keywords, codes, and themes (Naeem et al., 2023).”
Concepts
This quote in the article stated that, “Motivated offenders are harnessing AI to create malware, phishing campaigns, deep fakes, and other harmful cyber threats and attacks (Mitchell, 2023).” They also note that, “Using the Cyber Routine Activities perspective as the theoretical foundation, we conducted interviews with academic and practical experts in cybercrime, cybersecurity, and criminal justice.” They also had a concern based on, “the ethical considerations that once dominated discussions about AI have taken a backseat to concerns about economic disruption and the potential erosion of human relevance in an increasingly automated world.”
Challenges
On the biggest challenges, “the primary concerns frequently revolve around the fear of AI displacing human jobs. Instead of focusing on security risks, the discourse primarily highlights anxieties about automation and its implications for employment opportunities.” Although, “as individuals and industries embrace AI for its potential benefits, malicious actors are leveraging its capabilities for various criminal activities, including fraud, cyberattacks, and misinformation campaigns.”
Contribution Conclusion
Following the conclusion of this article it states that with, “the mixed-methods approach, combining quantitative data with qualitative insights from expert interviews, provided a well-rounded understanding of the multifaceted nature of AI-related cyber threats and the strategies required to address them effectively.”
Cite Source
Shetty, S., Choi, K.-S. and Park, I. (2024) “Investigating the intersection of AI and cybercrime: Risks, trends, and countermeasures,” International Journal of Cybersecurity Intelligence & Cybercrime, 7(2). Available at: https://doi.org/10.52306/2578-3289.1187.