{"id":198,"date":"2024-09-19T02:40:49","date_gmt":"2024-09-19T02:40:49","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/chrisangcyber\/?page_id=198"},"modified":"2024-12-09T02:16:07","modified_gmt":"2024-12-09T02:16:07","slug":"cyse201s","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/chrisangcyber\/cyse201s\/","title":{"rendered":"Article Review 1"},"content":{"rendered":"\n<p class=\"has-small-font-size\"><strong>Article Review on \u201cInvestigating the Intersection of AI and Cybercrime: Risks,<br>Trends, and Countermeasures\u201d<\/strong><br><em>Introduction<\/em><br>For my article review I read the article Investigating the Intersection of AI and Cybercrime:<br>Risks, Trends, and Countermeasures. This was a study conducted by Sanaika Shetty of Boston<br>University, Kyung-Shick Choi from Boston University, Insun Park from The University of Akron.<br>The abstract and question of this article was \u201chow does AI and cybersecurity connect with each<br>other?\u201d (page 1) The study informed the reader about the upcoming threats and modern threats<br>AI presented as it is becoming more widespread and accessible. As AI becomes more prevalent<br>in society and more accessible to the average citizen, that means that criminals will have<br>access to new ways to commit crimes.<br><em>AI cybercrime and social science through RAT Theory<\/em><br>The article relates to social science in its application of the routine activities theory or RAT<br>theory, which is a social science theory that states that peoples routine activities and lack of<br>guardianship make them victims to crime (page 4). The article related this criminology theory to<br>cybercrime, stating that people become victims to cybercrime due to lack of protection or<br>guardianship. The other topic of this article covered the news ways criminals are using AI<br>programs like ChatGPT and WormGPT for cybercrime.<br><em>Methods<\/em><br>Criminals are using AI for social engineering schemes that we covered in class like phishing,<br>malware, ransomware and other scams. The research method used were studies conducted<br>with criminals whose identities were protected to gather information about how criminals are<br>using AI for crime (page 8). The data covered the variables of tools criminals use like Darkweb<br>forums such as FlowGPT website, Respostas Ocultas, Dread, and other surface web forums<br>like Reddit and Youtube (page 9-10). The studies also provided informational graphs on the<br>most common types of cybercrimes committed with BECs, brute force, and capturing keystrokes<br>being the most common types.<br><em>Marginalized group<\/em><br>A common marginalized group that this study covered are people who don&#8217;t have proper<br>guardianship who are active in cyberspace (page 4) because they often fall victim to<br>cybercrime. This study provides important information to society because it brings light to the<br>growing threat of AI and cybercrime.<br><em>Conclusion<\/em><br>AI is becoming more prevalent in society, along with it comes new ways for criminals to exploit<br>it. As stated in the article, people are already becoming victims to it through common scams like<br>phishing, fake pictures, and AI generated malware. This article covered a study conducted to<br>learn more about AI and crime, along with how it relates to social sciences. RAT theory has<br>been used to explain how people can become victims to cybercrime.<\/p>\n\n\n\n<p class=\"has-small-font-size\"><\/p>\n\n\n\n<p class=\"has-small-font-size\">Reference<br>Shetty, S. , Choi, K. &amp; Park, I. (2024). Investigating the Intersection of AI and Cybercrime: Risks,<br>Trends, and Countermeasures . International Journal of Cybersecurity<br>Intelligence &amp; Cybercrime, 7(2), &#8211; . DOI: https:\/\/doi.org\/10.52306\/2578-3289.1187<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Article Review on \u201cInvestigating the Intersection of AI and Cybercrime: Risks,Trends, and Countermeasures\u201dIntroductionFor my article review I read the article Investigating the Intersection of AI and Cybercrime:Risks, Trends, and Countermeasures. This was a study conducted by Sanaika Shetty of BostonUniversity,&#8230; <a class=\"more-link\" href=\"https:\/\/sites.wp.odu.edu\/chrisangcyber\/cyse201s\/\">Continue Reading &rarr;<\/a><\/p>\n","protected":false},"author":29623,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/chrisangcyber\/wp-json\/wp\/v2\/pages\/198"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/chrisangcyber\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/chrisangcyber\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/chrisangcyber\/wp-json\/wp\/v2\/users\/29623"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/chrisangcyber\/wp-json\/wp\/v2\/comments?post=198"}],"version-history":[{"count":2,"href":"https:\/\/sites.wp.odu.edu\/chrisangcyber\/wp-json\/wp\/v2\/pages\/198\/revisions"}],"predecessor-version":[{"id":274,"href":"https:\/\/sites.wp.odu.edu\/chrisangcyber\/wp-json\/wp\/v2\/pages\/198\/revisions\/274"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/chrisangcyber\/wp-json\/wp\/v2\/media?parent=198"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}