{"id":382,"date":"2025-04-25T15:55:54","date_gmt":"2025-04-25T15:55:54","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/dtayl079\/?page_id=382"},"modified":"2025-04-25T15:55:54","modified_gmt":"2025-04-25T15:55:54","slug":"article-review-1","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/dtayl079\/article-review-1\/","title":{"rendered":"Article Review #1"},"content":{"rendered":"\n<p>Darrian Taylor<\/p>\n\n\n\n<p>2\/12\/2025<\/p>\n\n\n\n<h1 class=\"wp-block-heading has-text-align-center\"><strong>AI and Cybercrime&#8230;.Risks, Trends, and Countermeasures<\/strong><\/h1>\n\n\n\n<h2 class=\"wp-block-heading has-text-align-center\"><strong>Introduction<\/strong><\/h2>\n\n\n\n<p>The article, by Shetty, Choi, and Park (2024) talks about how AI is being used in cybercrime, the dangers it brings, and how people are trying to stop it. This review goes over how the article connects to social sciences, what questions the researchers asked, how they studied the topic, their findings, and how AI-driven cybercrime affects different groups of people.<\/p>\n\n\n\n<h2 class=\"wp-block-heading has-text-align-center\"><strong>Relation to Social Sciences<\/strong><\/h2>\n\n\n\n<p>This study connects to social sciences because it looks at how AI-driven cybercrime affects people and society. It talks about the ethical problems that come with AI being used for crime, the impact it has on people\u2019s emotions, and the legal and financial issues that come with it. The article explains how criminals take advantage of AI to target people and businesses, which is an important topic in social sciences because it deals with human behavior and technology.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Research Questions and Hypotheses<\/strong><\/h2>\n\n\n\n<ul>\n<li>How do criminals use AI for cybercrime?<\/li>\n\n\n\n<li>What current trends are appearing in AI-related cyber threats?<\/li>\n\n\n\n<li>What are some ways to stop AI-based cybercrime?<\/li>\n<\/ul>\n\n\n\n<p>They believe that while AI has a lot of effective uses, it also creates security problems that criminals can take advantage of. Because of this, cybersecurity needs to keep improving to keep up with these threats.<\/p>\n\n\n\n<h2 class=\"wp-block-heading has-text-align-center\"><strong>Research Methods<\/strong><\/h2>\n\n\n\n<p>The researchers used a qualitative approach, which means they studied past research, real life cases, and interviewed experts in the field. They looked at examples of cyberattacks involving AI and studied different cybersecurity techniques used to fight back against these attacks.<\/p>\n\n\n\n<h2 class=\"wp-block-heading has-text-align-center\"><strong>Data and Analysis<\/strong><\/h2>\n\n\n\n<p>The study used information from cybersecurity reports, law enforcement records, and academic research. They analyzed the data by looking for common patterns in how criminals use AI. They grouped AI-related threats into categories, including deepfake scams, automated phishing, and AI-created malware. They also studied how effective current cybersecurity measures are against these threats.<\/p>\n\n\n\n<h2 class=\"wp-block-heading has-text-align-center\"><strong>Connection to Course Concepts<\/strong><\/h2>\n\n\n\n<p>The ideas in this article connect with what we have learned in class about AI and cybersecurity. We have talked about how AI can be both helpful and dangerous in cybersecurity. Topics from PowerPoint presentations, like AI vulnerabilities and hacking tactics, match what this article discusses. It also explains how AI can be used for both good and bad purposes, which is something we\u2019ve covered in class.<\/p>\n\n\n\n<h2 class=\"wp-block-heading has-text-align-center\"><strong>Impact on Marginalized Groups<\/strong><\/h2>\n\n\n\n<p>The article points out that AI-driven cybercrime affects marginalized groups more than others. People in these communities may not have access to the resources needed to protect themselves from advanced cyber threats. AI-powered scams and misinformation campaigns are sometimes targeted at these groups, making digital inequalities worse. The authors suggest that better cybersecurity policies should be made to protect these vulnerable populations.<\/p>\n\n\n\n<h2 class=\"wp-block-heading has-text-align-center\"><strong>Contributions to Society<\/strong><\/h2>\n\n\n\n<p>This study is important because it raises awareness about the dangers of AI in cybercrime and suggests ways to deal with it. The authors call for better laws, increased education on cybersecurity, and ethical AI development. Their findings are useful for policymakers, cybersecurity experts, and researchers who are working to make the digital world safer.<\/p>\n\n\n\n<h2 class=\"wp-block-heading has-text-align-center\"><strong>Conclusion<\/strong><\/h2>\n\n\n\n<p>The article by Shetty, Choi, and Park (2024) provides a detailed look at AI and cybercrime, explaining the risks, trends, and solutions. Their research connects AI technology with legal, social, and ethical concerns, making it an important contribution to both cybersecurity and social sciences. More research is needed to see how AI can be used to better protect communities that are most at risk.<\/p>\n\n\n\n<h2 class=\"wp-block-heading has-text-align-center\"><strong>References<\/strong><\/h2>\n\n\n\n<p>Shetty, S., Choi, K., &amp; Park, I. (2024). <a>Investigating the Intersection of AI and Cybercrime: Risks, Trends, and Countermeasures.<\/a> <em>International Journal of Cybersecurity Intelligence &amp; Cybercrime, 7<\/em>(2), -. <a href=\"https:\/\/doi.org\/10.52306\/2578-3289.1187\">https:\/\/doi.org\/10.52306\/2578-3289.1187<\/a> Available at: <a href=\"https:\/\/vc.bridgew.edu\/ijcic\/vol7\/iss2\/3\">https:\/\/vc.bridgew.edu\/ijcic\/vol7\/iss2\/3<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Darrian Taylor 2\/12\/2025 AI and Cybercrime&#8230;.Risks, Trends, and Countermeasures Introduction The article, by Shetty, Choi, and Park (2024) talks about how AI is being used in cybercrime, the dangers it brings, and how people are trying to stop it. This review goes over how the article connects to social sciences, what questions the researchers asked,&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/dtayl079\/article-review-1\/\">Read More<\/a><\/div>\n","protected":false},"author":28663,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/dtayl079\/wp-json\/wp\/v2\/pages\/382"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/dtayl079\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/dtayl079\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/dtayl079\/wp-json\/wp\/v2\/users\/28663"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/dtayl079\/wp-json\/wp\/v2\/comments?post=382"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/dtayl079\/wp-json\/wp\/v2\/pages\/382\/revisions"}],"predecessor-version":[{"id":383,"href":"https:\/\/sites.wp.odu.edu\/dtayl079\/wp-json\/wp\/v2\/pages\/382\/revisions\/383"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/dtayl079\/wp-json\/wp\/v2\/media?parent=382"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}