Article Review #1 ▼
Article Link: https://doi.org/10.52306/2578-3289.1187
Investigating the Intersection of AI and Cybercrime: Risks, Trends, and Countermeasures
Danny Choi
February 16, 2025
Introduction
Artificial Intelligence (AI) is one of the latest innovations that cybercriminals are utilizing for their own personal gains and wants. Some of those crimes include creating malicious software and conducting cyberattacks. With AI being such a relatively new technology, little has been done to study and examine proper preventative security measures. With AI and cybercrime seemingly intersecting, the gap between understanding the fallout and risks is increasing.
Research Question
This study is to examine the intrinsic relationship between AI and cybercrime, specifically how AI is being utilized for malicious purposes. This study utilized the Cyber Routine Activities Theoretical framework as its baseline and explored the ramifications and opportunities to mitigate risks associated with AI-driven cyberattacks. To achieve this, Shetty et all used the RAT and Cyber RAT to understand cybercrime and “conducted interviews with academic and practical experts in cybercrime, cybersecurity, and criminal justice.” (Shetty et al., 2024).
Methods and Data Analysis
Shetty et all utilized mixed-methods research by combining quantitative and qualitative data to study AIs role in cybercrime. For quantitative data, the study collected from The Onion Router (TOR) network and online forums such as Reddit, FlowGPT etc. involving any prompts utilizing AI for malicious purposes. This allowed Shetty et all, to study trends, patterns and frequency of these kind of prompts. For qualitative data, Shetty et all, conducted interviews, virtually and with written statements pertaining to what cybercrime is, how to conduct cyber hygiene and any security recommendations from experts needed for AI cybercrimes. This allowed for Shetty et all to gain a better understanding, new perspectives and expert recommendations on the potential risks and “identify strategies for enhancing capable guardianship and increasing awareness among suitable targets or internet users.” (Shetty et al., 2024).
Relation to Class Material and Principles of Social Science
In their study, Shetty et al, utilized the Cyber RAT (C-RAT) framework as their theoretical baseline. The Routine Activities Theory (RAT) is one of the theories that we’ve learned in class and C-RAT adapts RAT’s principle to better examine cybercrimes. C-RAT fits into the social sciences as it suggests cybercrime occurs when three elements merge. Motivated offender, suitable targets and the absence of capable guardians. C-RAT can be applied to get a better understanding of crimes and victims in the cyber space. The cyber space is a new phenomena and something that is challenging the norms and status quo of current perspectives of crimes, justice and human behavior.
Relation to concerns and contributions of marginalized groups
Marginalized groups such as those who are living a certain online lifestyle and are unaware of AI are suitable targets for these kinds of attacks. These attacks are very meticulous and are disguised very well to prevent online users to differentiate between human or AI. The contributions to these groups is the lack of capable guardianship and the increasing usage of the internet.
Societal Contributions
This study showcases the intersection of AI and cybercrimes. AI is still a field that is growing and rapidly evolving. With the continued growing usage of AI in the cyberworld further research needs to be done to match the “rapidly evolving landscape of AI technology and relevant implications for cybersecurity.” This study can be used the foundation or baseline to improve those studies.
Conclusion
This study with the utilization of C-RAT has given birth to the foundation of the intersection that is happening between AI and cyberattacks. AI is still rapidly growing and will continue to do so for the near future. Spreading awareness and learning the proper security measures will allow us to mitigate and reduce the risk of future cyberattacks. This is only the beginning, and we need to prepare for changes coming to the social dynamics of what is a cybercrime.
Article Review #2 ▼
Article Link: https://www.doi.org/10.52306/02020119KDHZ8339
The Future of Cybercrime Prevention Strategies: Human Factors and A Holistic Approach to Cyber Intelligence
Danny Choi
March 30, 2025
Introduction
Technology is improving at a rapid rate to make our lives better. From 5G capabilities to the Internet of Things, the evolution of technologies has improved how we communicate and operate in our daily lives. However, with the increased need to be connected online, these innovations provide opportunities for cybercriminals to commit crimes. Due to the rise of cybercrimes, the need for cybersecurity is more important than ever before.
Research Question
Some researchers point to humans as the weakest link in preventing cybercrimes, as they can be easily manipulated and deceived. However, this journal seeks to support the claim that humans are a crucial component in the effort to combat cyber threats. To support their claim, the journal examined human behavior and mindset in two different studies to gain an understanding of why humans behave the way they do online.
Methods and Data Analysis
In the first study, researchers utilized “four major theoretical frameworks: the vulnerability model, victimization model, disorder and social integration models, and risk interpretation model to identify how humans online perceive cybercrimes” (Back et al.,2019). This study was conducted to understand how someone online views cybercrimes, gaining a better perspective from the viewpoint of an attacker and examining the correlation between human behavior, characteristics, and the likelihood of becoming a victim. The study concluded that factors such as a person’s age, gender, and social networks all influence how likely a person is to become a victim of cybercrime. It reports that the fear of cybercrime is not due to technology, but rather the interactions individuals have with others in an online environment. The other study aimed to simply understand why someone would send intimate photos through social media or texting. “Using mixed methods, the researchers conducted a perception analysis and found that respondents were more likely to share images with romantic partners and preferred sending non-intimate images.” (Back et al.,2019) The purpose of this study was to gain a better understanding of why people act the way they do online and the motivations behind their actions.
Relation to Class Material and Principles of Social Science
In this journal, the main component of the study was the ‘human’ aspect of cybersecurity. This is something we learned about this week, called social cybersecurity, which is the intersection of cybersecurity and social factors. Human interactions play a role in cybersecurity. “The journal in this issue provides support for the link between human factors, technology, and cybercrime.” (Back et al.,2019)
Relation to concerns and contributions of marginalized groups
The two studies would impact marginalized groups specifically women and minorities as they would be the likely candidates for victimization of cybercrimes through exploitation, abuse and revenge porn. Understanding this allows for an inclusive and sensitive prevention strategy.
Societal Contributions
This journal was written in 2019, and was laying the groundwork for understanding how cyber frameworks and the human element could be utilized to mitigate and prevent future attacks. This journal seems to be an inspiration for researcher’s out there to consider their future research and implementations of policies.
Conclusion
Technology is improving at a rapid pace along with cybercrimes. Cybersecurity needs to adapt and improve at the same rate to provide sufficient security against these attacks. Social Cybersecurity is a rising sub-genre that could be utilized to understand the component of cybercrimes that is often overlooked: humans. Humans are just as crucial to cybersecurity than any other component.