{"id":334,"date":"2024-04-21T15:45:19","date_gmt":"2024-04-21T15:45:19","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/cybersecurityep\/?p=334"},"modified":"2024-04-21T15:45:19","modified_gmt":"2024-04-21T15:45:19","slug":"cyse-201s-14","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/cybersecurityep\/2024\/04\/21\/cyse-201s-14\/","title":{"rendered":"CYSE 201S"},"content":{"rendered":"\n<p>Hunter Morgan<\/p>\n\n\n\n<p>3-24-24<\/p>\n\n\n\n<p><strong>Article Review #2 &#8211; AI versus Criminals<\/strong><\/p>\n\n\n\n<ol>\n<li><strong>How the topic relates to the principles of the social sciences<\/strong><\/li>\n\n\n\n<li><strong>The study&#8217;s research questions or hypotheses<\/strong><\/li>\n\n\n\n<li><strong>The types of research methods used<\/strong><\/li>\n\n\n\n<li><strong>The types of data and analysis done<\/strong><\/li>\n\n\n\n<li><strong>How concepts from the PowerPoint presentations relate to the article<\/strong><\/li>\n\n\n\n<li><strong>How the topic relates to the challenges, concerns and contributions of<\/strong><\/li>\n<\/ol>\n\n\n\n<p><strong>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;certain groups<\/strong><\/p>\n\n\n\n<ol start=\"7\">\n<li><strong>The overall contributions of the studies to society<\/strong><\/li>\n<\/ol>\n\n\n\n<p>Question 1 &#8211; This topic relates to the principles of the social sciences because it is talking about how AI can<\/p>\n\n\n\n<p>be used to prevent criminals from commiting crimes. It goes into depth about how it can learn what type&nbsp;<\/p>\n\n\n\n<p>of actions or facial expressions may occur before a crime is committed, and then notify authorities to handle<\/p>\n\n\n\n<p>such matters.&nbsp;<\/p>\n\n\n\n<p>Question 2- The study\u2019s research question was looking into how AI can be best integrated into the field of<\/p>\n\n\n\n<p>law enforcement.&nbsp;<\/p>\n\n\n\n<p>Question 3- The type of research method used was going over each and every way AI is currently being<\/p>\n\n\n\n<p>explored in, in regards to criminal activity. It then analyzed each way, including facial recognition and voice<\/p>\n\n\n\n<p>monitoring.<\/p>\n\n\n\n<p>Question 4- The type of data and analysis done in this article was purely study based. The author looks over<\/p>\n\n\n\n<p>multiple real life examples of what is happening in the world, and law enforcements around the globe as well.<\/p>\n\n\n\n<p>Question 5- Concepts from the powerpoints relate to this article, since we learned about many different<\/p>\n\n\n\n<p>theories such as determinism and victim precipitation. The author mentions online chat rooms as one of the&nbsp;<\/p>\n\n\n\n<p>areas which could be potentially monitored and reviewed by AI.&nbsp;<\/p>\n\n\n\n<p>Question 6- I think that this article does an excellent job at providing insight for the safety of the general public.<\/p>\n\n\n\n<p>The author goes on to address areas such as public transportation, online chat rooms and video games, sports&nbsp;<\/p>\n\n\n\n<p>games and safety within the stadiums, bars, and so much more. All of these are beneficial to know about, if&nbsp;<\/p>\n\n\n\n<p>we would be able to integrate artificial intelligence into the respective fields.&nbsp;<\/p>\n\n\n\n<p>Question 7- The overall contributions to society mentioned in this article are quite broad. As the author states,&nbsp;<\/p>\n\n\n\n<p>\u201cAI plays a crucial role in identifying potential&nbsp; criminal<\/p>\n\n\n\n<p>activities and their locations, analyzing past incidents to anticipate future patterns, analyzing&nbsp;<\/p>\n\n\n\n<p>visual data for suspect identification, and examining recorded audio data to<\/p>\n\n\n\n<p>detect manipulated vocal elements and predict future criminal involvement\u201d (Faqir). The use of AI in our daily lives might scare some folks; however, the potential benefits that this type of technology presents is beyond today\u2019s society\u2019s comprehension. We have not yet experienced the future, so do not know what to expect, but if we can properly monitor and use AI in the best way possible, we will be living in an entirely different world.&nbsp;<\/p>\n\n\n\n<p>                                                                            Work Cited<\/p>\n\n\n\n<p>Faqir, Raed S. A. \u201cView of Digital Criminal Investigations in the Era of Artificial Intelligence: A Comprehensive Overview.\u201d <em>International Journal of Cyber Criminology<\/em>, 2023, https:\/\/cybercrimejournal.com\/menuscript\/index.php\/cybercrimejournal\/article\/view\/189\/71. Accessed 24 March 2024.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Hunter Morgan 3-24-24 Article Review #2 &#8211; AI versus Criminals &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;certain groups Question 1 &#8211; This topic relates to the principles of the social sciences because it is talking about how AI can be used to prevent criminals from commiting crimes. It goes into depth about how it can learn what type&nbsp; of actions or&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/cybersecurityep\/2024\/04\/21\/cyse-201s-14\/\">Read More<\/a><\/div>\n","protected":false},"author":28419,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/cybersecurityep\/wp-json\/wp\/v2\/posts\/334"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/cybersecurityep\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/cybersecurityep\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/cybersecurityep\/wp-json\/wp\/v2\/users\/28419"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/cybersecurityep\/wp-json\/wp\/v2\/comments?post=334"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/cybersecurityep\/wp-json\/wp\/v2\/posts\/334\/revisions"}],"predecessor-version":[{"id":335,"href":"https:\/\/sites.wp.odu.edu\/cybersecurityep\/wp-json\/wp\/v2\/posts\/334\/revisions\/335"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/cybersecurityep\/wp-json\/wp\/v2\/media?parent=334"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/cybersecurityep\/wp-json\/wp\/v2\/categories?post=334"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/cybersecurityep\/wp-json\/wp\/v2\/tags?post=334"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}