{"id":240,"date":"2025-02-17T04:32:12","date_gmt":"2025-02-17T04:32:12","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/dchoi201s\/?page_id=240"},"modified":"2025-04-29T20:06:13","modified_gmt":"2025-04-29T20:06:13","slug":"article-reviews","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/dchoi201s\/article-reviews\/","title":{"rendered":"Article Reviews"},"content":{"rendered":"\n<details class=\"wp-block-details is-layout-flow wp-block-details-is-layout-flow\"><summary>Article Review #1 \u25bc<\/summary>\n<p>Article Link: https:\/\/doi.org\/10.52306\/2578-3289.1187<\/p>\n\n\n\n<p class=\"has-text-align-center\"><em>Investigating the Intersection of AI and Cybercrime: Risks, Trends, and Countermeasures<\/em><\/p>\n\n\n\n<p class=\"has-text-align-center\">Danny Choi<\/p>\n\n\n\n<p class=\"has-text-align-center\">February 16, 2025<\/p>\n\n\n\n<p><em>Introduction<\/em><\/p>\n\n\n\n<p>Artificial Intelligence (AI) is one of the latest innovations that cybercriminals are utilizing for their own personal gains and wants. Some of those crimes include creating malicious software and conducting cyberattacks. With AI being such a relatively new technology, little has been done to study and examine proper preventative security measures. With AI and cybercrime seemingly intersecting, the gap between understanding the fallout and risks is increasing.<\/p>\n\n\n\n<p><em>Research Question<\/em><\/p>\n\n\n\n<p>This study is to examine the intrinsic relationship between AI and cybercrime, specifically how AI is being utilized for malicious purposes. This study utilized the Cyber Routine Activities Theoretical framework as its baseline and explored the ramifications and opportunities to mitigate risks associated with AI-driven cyberattacks. To achieve this, Shetty et all used the RAT and Cyber RAT to understand cybercrime and \u201cconducted interviews with academic and practical experts in cybercrime, cybersecurity, and criminal justice.\u201d (Shetty et al., 2024).<\/p>\n\n\n\n<p><em>Methods and Data Analysis<\/em><\/p>\n\n\n\n<p>Shetty et all utilized mixed-methods research by combining quantitative and qualitative data to study AIs role in cybercrime. For quantitative data, the study collected from The Onion Router (TOR) network and online forums such as Reddit, FlowGPT etc. involving any prompts utilizing AI for malicious purposes. This allowed Shetty et all, to study trends, patterns and frequency of these kind of prompts. For qualitative data, Shetty et all, conducted interviews, virtually and with written statements pertaining to what cybercrime is, how to conduct cyber hygiene and any security recommendations from experts needed for AI cybercrimes. This allowed for Shetty et all to gain a better understanding, new perspectives and expert recommendations on the potential risks and \u201cidentify strategies for enhancing capable guardianship and increasing awareness among suitable targets or internet users.\u201d (Shetty et al., 2024).<\/p>\n\n\n\n<p><em>Relation to Class Material and Principles of Social Science<\/em><\/p>\n\n\n\n<p>In their study, Shetty et al, utilized the Cyber RAT (C-RAT) framework as their theoretical baseline. The Routine Activities Theory (RAT) is one of the theories that we\u2019ve learned in class and C-RAT adapts RAT\u2019s principle to better examine cybercrimes. C-RAT fits into the social sciences as it suggests cybercrime occurs when three elements merge. Motivated offender, suitable targets and the absence of capable guardians. C-RAT can be applied to get a better understanding of crimes and victims in the cyber space. The cyber space is a new phenomena and something that is challenging the norms and status quo of current perspectives of crimes, justice and human behavior.<\/p>\n\n\n\n<p><em>Relation to concerns and contributions of marginalized groups<\/em><\/p>\n\n\n\n<p>Marginalized groups such as those who are living a certain online lifestyle and are unaware of AI are suitable targets for these kinds of attacks. These attacks are very meticulous and are disguised very well to prevent online users to differentiate between human or AI. The contributions to these groups is the lack of capable guardianship and the increasing usage of the internet.<\/p>\n\n\n\n<p><em>Societal Contributions<\/em><\/p>\n\n\n\n<p>This study showcases the intersection of AI and cybercrimes. AI is still a field that is growing and rapidly evolving. With the continued growing usage of AI in the cyberworld further research needs to be done to match the \u201crapidly evolving landscape of AI technology and relevant implications for cybersecurity.\u201d This study can be used the foundation or baseline to improve those studies.<\/p>\n\n\n\n<p><em>Conclusion<\/em><\/p>\n\n\n\n<p>This study with the utilization of C-RAT has given birth to the foundation of the intersection that is happening between AI and cyberattacks. AI is still rapidly growing and will continue to do so for the near future. Spreading awareness and learning the proper security measures will allow us to mitigate and reduce the risk of future cyberattacks. This is only the beginning, and we need to prepare for changes coming to the social dynamics of what is a cybercrime.<\/p>\n<\/details>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<details class=\"wp-block-details is-layout-flow wp-block-details-is-layout-flow\"><summary>Article Review #2 \u25bc<\/summary>\n<p>Article Link: https:\/\/www.doi.org\/10.52306\/02020119KDHZ8339<\/p>\n\n\n\n<p class=\"has-text-align-center\">The Future of Cybercrime Prevention Strategies: Human Factors and A Holistic Approach to Cyber Intelligence<\/p>\n\n\n\n<p class=\"has-text-align-center\">Danny Choi<\/p>\n\n\n\n<p class=\"has-text-align-center\">March 30, 2025<\/p>\n\n\n\n<p><em>Introduction<\/em><\/p>\n\n\n\n<p>Technology is improving at a rapid rate to make our lives better. From 5G capabilities to the Internet of Things, the evolution of technologies has improved how we communicate and operate in our daily lives. However, with the increased need to be connected online, these innovations provide opportunities for cybercriminals to commit crimes. Due to the rise of cybercrimes, the need for cybersecurity is more important than ever before.<\/p>\n\n\n\n<p><em>Research Question<\/em><\/p>\n\n\n\n<p>Some researchers point to humans as the weakest link in preventing cybercrimes, as they can be easily manipulated and deceived. However, this journal seeks to support the claim that humans are a crucial component in the effort to combat cyber threats. To support their claim, the journal examined human behavior and mindset in two different studies to gain an understanding of why humans behave the way they do online.<\/p>\n\n\n\n<p><em>Methods and Data Analysis<\/em><\/p>\n\n\n\n<p>In the first study, researchers utilized \u201cfour major theoretical frameworks: the vulnerability model, victimization model, disorder and social integration models, and risk interpretation model to identify how humans online perceive cybercrimes\u201d (Back et al.,2019). This study was conducted to understand how someone online views cybercrimes, gaining a better perspective from the viewpoint of an attacker and examining the correlation between human behavior, characteristics, and the likelihood of becoming a victim. The study concluded that factors such as a person\u2019s age, gender, and social networks all influence how likely a person is to become a victim of cybercrime. It reports that the fear of cybercrime is not due to technology, but rather the interactions individuals have with others in an online environment. The other study aimed to simply understand why someone would send intimate photos through social media or texting. \u201cUsing mixed methods, the researchers conducted a perception analysis and found that respondents were more likely to share images with romantic partners and preferred sending non-intimate images.\u201d (Back et al.,2019) The purpose of this study was to gain a better understanding of why people act the way they do online and the motivations behind their actions.<\/p>\n\n\n\n<p><em>Relation to Class Material and Principles of Social Science<\/em><\/p>\n\n\n\n<p>In this journal, the main component of the study was the &#8216;human&#8217; aspect of cybersecurity. This is something we learned about this week, called social cybersecurity, which is the intersection of cybersecurity and social factors. Human interactions play a role in cybersecurity. \u201cThe journal in this issue provides support for the link between human factors, technology, and cybercrime.\u201d (Back et al.,2019)<\/p>\n\n\n\n<p><em>Relation to concerns and contributions of marginalized groups<\/em><\/p>\n\n\n\n<p>The two studies would impact marginalized groups specifically women and minorities as they would be the likely candidates for victimization of cybercrimes through exploitation, abuse and revenge porn. Understanding this allows for an inclusive and sensitive prevention strategy.<\/p>\n\n\n\n<p><em>Societal Contributions<\/em><\/p>\n\n\n\n<p>This journal was written in 2019, and was laying the groundwork for understanding how cyber frameworks and the human element could be utilized to mitigate and prevent future attacks. This journal seems to be an inspiration for researcher\u2019s out there to consider their future research and implementations of policies.<\/p>\n\n\n\n<p><em>Conclusion<\/em><\/p>\n\n\n\n<p>Technology is improving at a rapid pace along with cybercrimes. Cybersecurity needs to adapt and improve at the same rate to provide sufficient security against these attacks. Social Cybersecurity is a rising sub-genre that could be utilized to understand the component of cybercrimes that is often overlooked: humans. Humans are just as crucial to cybersecurity than any other component.<br><\/p>\n<\/details>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":30524,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/dchoi201s\/wp-json\/wp\/v2\/pages\/240"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/dchoi201s\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/dchoi201s\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/dchoi201s\/wp-json\/wp\/v2\/users\/30524"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/dchoi201s\/wp-json\/wp\/v2\/comments?post=240"}],"version-history":[{"count":5,"href":"https:\/\/sites.wp.odu.edu\/dchoi201s\/wp-json\/wp\/v2\/pages\/240\/revisions"}],"predecessor-version":[{"id":332,"href":"https:\/\/sites.wp.odu.edu\/dchoi201s\/wp-json\/wp\/v2\/pages\/240\/revisions\/332"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/dchoi201s\/wp-json\/wp\/v2\/media?parent=240"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}