Understanding the Use of Artificial Intelligence in Cybercrime
I chose this article to review because the world is advancing its technology in many
different ways and I feel that it’s important to understand how this new artificial intelligence is
being used for cybercrime. An article by Morgan Stanley mentions how hackers use social
engineering schemes, password hacking, deepfakes, and data poisoning to abuse AI for
malicious acts. Being able to realize how AI is used in these malicious ways allows businesses,
individuals and governments to protect against threats like advanced malware, manipulated
data, and AI-Driven exploits. Understanding AI can help to create laws and solutions to combat
them effectively.
How this topic relates to the principles of social science
The use of AI in cybercrime is very much related to the principles of social science,
especially within criminology, ethics, and sociology. Understanding how technology has an
impact on these social sciences is essential when studying and responding to the evolving
dynamics of cybercrime in a technology driven society. This article touches on the increasing
sophistication of criminal activities involving the use of AI. Criminologists study the change in
crime and the use of AI highlights the need for the constant evolution of approaches to mitigate
crimes in the digital world. Ethics help explore responsibility and accountability when
questioning how society should combat technological advancements and its potential for
misuse. In sociology, technology has a significant impact both positive and negative. Sociologists must understand how technologies are impacting social behavior including
personal security, communication and trust.
Hypothesis
The hypothesis of this article is that as AI advances, it offers cybercriminals new ways to
automate and improve their malicious activities, resulting in more significant and widespread
cybercrime. This hypothesis supports the fact that artificial intelligence is being exploited by
cybercriminals to enhance the effectiveness of their attacks like social engineering attacks and
creating deepfakes.
Research Methods and Types of Data
There are several research methods and types of data used in this article. In Study 1,
the routine activity theory (RAT) is used to examine the motives of cyberattackers and their
common characteristics. Study 1 also uses the VIVA framework to test several cybersecurity
models such as policy framework, Online Lifestyle Awareness framework and Digital Capable
Guardianship framework. In study 2, the cyber-routine activities theory (Cyber-RAT) is used to
explore and better understand the trends, risks and countermeasures that are related to AI
being used in cybercrime. Study 2 uses a mixed method approach and combines both
qualitative and quantitative analysis to take expert interviews and AI prompts into account.
Relation to Challenges Concerns and Contributions of Marginalized Groups
This topic is intertwined with many challenges and concerns associated with marginalized groups in various ways. Some examples of this are that in lower socioeconomic brackets there is an increased vulnerability to cybercrime because they are unable to protect themselves from AI-driven crime and exploitation like AI being used to create harmful content about individuals or entire communities. The studies that are mentioned in the article contribute to society by increasing the awareness of AI cyber threats and providing preventive solutions.
Closing statement
In conclusion, Understanding AI can help to create laws and solutions to combat them
effectively. AI in cybercrime poses many challenges and opportunities. This article speaks on
valuable insight into the evolving landscape of cyberthreats that come along with AI
technologies. As societies continue to try to keep up with the rapidly advancing technology, it is
important to ensure that protection of individuals is a priority. Contributions that are made pave
the way for further innovation and research that makes for a safer digital future for everyone.
Article source:
https://vc.bridgew.edu/cgi/viewcontent.cgi?article=1185&context=ijcic
Works cited:
Ai and cybersecurity: A new era. Morgan Stanley. (n.d.).
https://www.morganstanley.com/articles/ai-cybersecurity-new-era