Article Review #1

Darrian Taylor

2/12/2025

AI and Cybercrime….Risks, Trends, and Countermeasures

Introduction

The article, by Shetty, Choi, and Park (2024) talks about how AI is being used in cybercrime, the dangers it brings, and how people are trying to stop it. This review goes over how the article connects to social sciences, what questions the researchers asked, how they studied the topic, their findings, and how AI-driven cybercrime affects different groups of people.

Relation to Social Sciences

This study connects to social sciences because it looks at how AI-driven cybercrime affects people and society. It talks about the ethical problems that come with AI being used for crime, the impact it has on people’s emotions, and the legal and financial issues that come with it. The article explains how criminals take advantage of AI to target people and businesses, which is an important topic in social sciences because it deals with human behavior and technology.

Research Questions and Hypotheses

  • How do criminals use AI for cybercrime?
  • What current trends are appearing in AI-related cyber threats?
  • What are some ways to stop AI-based cybercrime?

They believe that while AI has a lot of effective uses, it also creates security problems that criminals can take advantage of. Because of this, cybersecurity needs to keep improving to keep up with these threats.

Research Methods

The researchers used a qualitative approach, which means they studied past research, real life cases, and interviewed experts in the field. They looked at examples of cyberattacks involving AI and studied different cybersecurity techniques used to fight back against these attacks.

Data and Analysis

The study used information from cybersecurity reports, law enforcement records, and academic research. They analyzed the data by looking for common patterns in how criminals use AI. They grouped AI-related threats into categories, including deepfake scams, automated phishing, and AI-created malware. They also studied how effective current cybersecurity measures are against these threats.

Connection to Course Concepts

The ideas in this article connect with what we have learned in class about AI and cybersecurity. We have talked about how AI can be both helpful and dangerous in cybersecurity. Topics from PowerPoint presentations, like AI vulnerabilities and hacking tactics, match what this article discusses. It also explains how AI can be used for both good and bad purposes, which is something we’ve covered in class.

Impact on Marginalized Groups

The article points out that AI-driven cybercrime affects marginalized groups more than others. People in these communities may not have access to the resources needed to protect themselves from advanced cyber threats. AI-powered scams and misinformation campaigns are sometimes targeted at these groups, making digital inequalities worse. The authors suggest that better cybersecurity policies should be made to protect these vulnerable populations.

Contributions to Society

This study is important because it raises awareness about the dangers of AI in cybercrime and suggests ways to deal with it. The authors call for better laws, increased education on cybersecurity, and ethical AI development. Their findings are useful for policymakers, cybersecurity experts, and researchers who are working to make the digital world safer.

Conclusion

The article by Shetty, Choi, and Park (2024) provides a detailed look at AI and cybercrime, explaining the risks, trends, and solutions. Their research connects AI technology with legal, social, and ethical concerns, making it an important contribution to both cybersecurity and social sciences. More research is needed to see how AI can be used to better protect communities that are most at risk.

References

Shetty, S., Choi, K., & Park, I. (2024). Investigating the Intersection of AI and Cybercrime: Risks, Trends, and Countermeasures. International Journal of Cybersecurity Intelligence & Cybercrime, 7(2), -. https://doi.org/10.52306/2578-3289.1187 Available at: https://vc.bridgew.edu/ijcic/vol7/iss2/3