{"id":394,"date":"2024-12-08T17:40:09","date_gmt":"2024-12-08T17:40:09","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/jadonwhite\/?page_id=394"},"modified":"2024-12-08T17:47:34","modified_gmt":"2024-12-08T17:47:34","slug":"article-review-2","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/jadonwhite\/article-review-2\/","title":{"rendered":"Article Review 1"},"content":{"rendered":"\n<p>Jadon White<br>CYSE 201s<br>Article Review #1<br>The Intersection of AI and Cybercrime: A Cyber-Routine Activities Perspective<br>This article will provide you with an understanding of the double-sided game of machine learning in<br>cybercrimes: While on one side it strengthens cybersecurity, the possibilities that criminals can exploit<br>systems also increase. Applying Routine Activity Theory (RAT) as a frame, the article argues that AI<br>transforms the cybercrime landscape by increasing prediction and intervention efficacy on one end of<br>criminal activity spectrum and rendering it less predictable and more accessible on another.<br>Applicability to Social Sciences<br>Building upon insights from criminology and sociology especially Rational Action Theory (RAT), this work<br>examines how AI alters the opportunities for engaging in cybercrime. RAT provides that a crime will<br>occur when three factors converge: A motivated offender and suitable target come together in the<br>absence of a capable guardian. Aside from the Guardian role (threat detection), AI is also a trap for<br>cybercriminals like we have it with AI-powered malware. In this context, the way in which people and AI<br>operate holds a key to the issue of cybercrime as well, with psychological and sociological impacts<br>playing an equally major role.<br>Statement of Research Questions or Hypotheses<br>The study primarily tries to answer, \u201cHow AI changes the game in fighting cybercrime and whether AIdriven solutions can help minimize the threats?\u201d The idea behind AI as an attack vector is that the entire<br>house of cards crumbles, as fast or faster than it arises,\u2026 oh\u2026. and by the way\u2026the key aspect for AI is<br>security\u2026but the hypothesis goes like this: \u2026\u2026.the general conjecture promotes security on one side<br>while breaking it in another\u2026 This is a major point that concerns how AI dreams of being able to<br>enhance cybersecurity and yet also significantly dampen all through the plague.<br>Research Methods<br>That is a lit review article where authors have analyzed various research papers and editors opinion on<br>AI in cybersecurity arenas. This approach is useful, as it provides a high-level perspective on the current<br>state of play and thereby informs both the trade space as well as areas for future research when<br>studying AI against AI in cyber-enabled crime.<br>Data and Analysis<br>Data from actual research articles and reviews, reports and case studies are used in the study. Using<br>thematic analysis which revealed patterns such as AI in relation to phishing and malware attacks, and<br>how it is used in cybersecurity defenses. This approach demonstrates the way AI is reworking<br>cybercrime.<br>Relation to Course Concepts<br>As such, this article is closely aligned with course discussions related to AI and cybersecurity. Second, it<br>calls attention to the need for AI in making threat detection more effective on the one hand and the<br>danger for future unethical consequences of large scale use of AI itself against us all and hence makes a<br>small dent in some overly positive views (including ours) relating to AI into security.<br>Impact on Marginalized Groups<br>The piece further delves into how AI-powered cybercrime can disproportionately impact the most<br>vulnerable communities because of cyber-attacks to essential systems, like healthcare or financial<br>services. Failure to safeguard against AI bias in cybersecurity systems would not only exacerbate social<br>inequalities, but also more seriously expose vulnerable populations to attacks.<br>Contributions to Society<br>In general our study points out the necessity of trading off between AI benefits and risks. It hints that<br>there is a pathway for policy makers and how they should look at these vulnerabilities that AI brings,<br>while leveraging the strengths of the technology to build stronger cyber security. We also identified<br>areas for future research, particularly the search for practical methods to avoid any misuse of AI and<br>thus keep it far from cybercrime.<br>Conclusion<br>The article ends by giving a balanced perspective of the focus AI attracts in cybersecurity, on either side.<br>While it does depend on existing research, the paper provides good overview of the double-edged<br>sword nature of AI. The construction of additional empirical research on these theories is required<\/p>\n\n\n\n<p><br>References<br>Shetty, S. , Choi, K. &amp; Park, I. (2024). Investigating the Intersection of AI and Cybercrime: Risks, Trends,<br>and Countermeasures. International Journal of<br>Scharre, P., &amp; Chilukuri, V. (2024, March 5). What an American approach to AI regulation should look<br>like. Time. Retrieved from https:\/\/time.com\/6848922\/ai-regulation\/<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Jadon WhiteCYSE 201sArticle Review #1The Intersection of AI and Cybercrime: A Cyber-Routine Activities PerspectiveThis article will provide you with an understanding of the double-sided game of machine learning incybercrimes: While on one side it strengthens cybersecurity, the possibilities that criminals can exploitsystems also increase. Applying Routine Activity Theory (RAT) as a frame, the article argues&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/jadonwhite\/article-review-2\/\">Read More<\/a><\/div>\n","protected":false},"author":29639,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/jadonwhite\/wp-json\/wp\/v2\/pages\/394"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/jadonwhite\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/jadonwhite\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/jadonwhite\/wp-json\/wp\/v2\/users\/29639"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/jadonwhite\/wp-json\/wp\/v2\/comments?post=394"}],"version-history":[{"count":2,"href":"https:\/\/sites.wp.odu.edu\/jadonwhite\/wp-json\/wp\/v2\/pages\/394\/revisions"}],"predecessor-version":[{"id":405,"href":"https:\/\/sites.wp.odu.edu\/jadonwhite\/wp-json\/wp\/v2\/pages\/394\/revisions\/405"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/jadonwhite\/wp-json\/wp\/v2\/media?parent=394"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}