{"id":322,"date":"2025-04-25T14:40:19","date_gmt":"2025-04-25T14:40:19","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/jlarmercyse-201s\/?page_id=322"},"modified":"2025-04-27T19:11:03","modified_gmt":"2025-04-27T19:11:03","slug":"article-review-2","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/jlarmercyse-201s\/article-review-2\/","title":{"rendered":"Article Review #2"},"content":{"rendered":"\n<p class=\"has-text-align-center has-black-color has-text-color has-link-color wp-elements-b5fef4c20c9c78cb59fea3f684055be7\"><strong>Understanding the Use of Artificial Intelligence in Cybercrime<\/strong><\/p>\n\n\n\n<p class=\"has-black-color has-text-color has-link-color wp-elements-fe05dffeb0786d9c54db7793fa541f3b\" style=\"font-size:16px\"><br>I chose this article to review because the world is advancing its technology in many<br>different ways and I feel that it\u2019s important to understand how this new artificial intelligence is<br>being used for cybercrime. An article by Morgan Stanley mentions how hackers use social<br>engineering schemes, password hacking, deepfakes, and data poisoning to abuse AI for<br>malicious acts. Being able to realize how AI is used in these malicious ways allows businesses,<br>individuals and governments to protect against threats like advanced malware, manipulated<br>data, and AI-Driven exploits. Understanding AI can help to create laws and solutions to combat<br>them effectively.<\/p>\n\n\n\n<p class=\"has-vivid-cyan-blue-color has-text-color has-link-color wp-elements-346a7fd55818c887956058c5c0b3315a\"><br><strong>How this topic relates to the principles of social science<\/strong><\/p>\n\n\n\n<p class=\"has-black-color has-text-color has-link-color wp-elements-96eec6026c94612cdfd38fdd80a0e9e6\" style=\"font-size:16px\"><br>The use of AI in cybercrime is very much related to the principles of social science,<br>especially within criminology, ethics, and sociology. Understanding how technology has an<br>impact on these social sciences is essential when studying and responding to the evolving<br>dynamics of cybercrime in a technology driven society. This article touches on the increasing<br>sophistication of criminal activities involving the use of AI. Criminologists study the change in<br>crime and the use of AI highlights the need for the constant evolution of approaches to mitigate<br>crimes in the digital world. Ethics help explore responsibility and accountability when<br>questioning how society should combat technological advancements and its potential for<br>misuse. In sociology, technology has a significant impact both positive and negative. Sociologists must understand how technologies are impacting social behavior including<br>personal security, communication and trust.<\/p>\n\n\n\n<p class=\"has-vivid-cyan-blue-color has-text-color has-link-color wp-elements-137f61112f9fe3e2d1e3dab3e61caa16\"><br><strong>Hypothesis<\/strong><\/p>\n\n\n\n<p class=\"has-black-color has-text-color has-link-color wp-elements-bef5625361ca2ee995da69815d609684\" style=\"font-size:16px\"><br>The hypothesis of this article is that as AI advances, it offers cybercriminals new ways to<br>automate and improve their malicious activities, resulting in more significant and widespread<br>cybercrime. This hypothesis supports the fact that artificial intelligence is being exploited by<br>cybercriminals to enhance the effectiveness of their attacks like social engineering attacks and<br>creating deepfakes.<\/p>\n\n\n\n<p class=\"has-vivid-cyan-blue-color has-text-color has-link-color wp-elements-2da94184757e82945e86d170b739557c\"><br><strong>Research Methods and Types of Data<\/strong><\/p>\n\n\n\n<p class=\"has-black-color has-text-color has-link-color wp-elements-5e6f01a9d07bfcb1419516c89986acd9\" style=\"font-size:16px\"><br>There are several research methods and types of data used in this article. In Study 1,<br>the routine activity theory (RAT) is used to examine the motives of cyberattackers and their<br>common characteristics. Study 1 also uses the VIVA framework to test several cybersecurity<br>models such as policy framework, Online Lifestyle Awareness framework and Digital Capable<br>Guardianship framework. In study 2, the cyber-routine activities theory (Cyber-RAT) is used to<br>explore and better understand the trends, risks and countermeasures that are related to AI<br>being used in cybercrime. Study 2 uses a mixed method approach and combines both<br>qualitative and quantitative analysis to take expert interviews and AI prompts into account.<\/p>\n\n\n\n<p class=\"has-vivid-cyan-blue-color has-text-color has-link-color wp-elements-82b5513d74d0cbbcaf1bdd44de0a6f00\"><br><strong>Relation to Challenges Concerns and Contributions of Marginalized Groups <\/strong><\/p>\n\n\n\n<p class=\"has-black-color has-text-color has-link-color wp-elements-15bcfd60d7c37e2af7d46937f721b244\" style=\"font-size:16px\">This topic is intertwined with many challenges and concerns associated with marginalized groups in various ways. Some examples of this are that in lower socioeconomic brackets there is an increased vulnerability to cybercrime because they are unable to protect themselves from AI-driven crime and exploitation like AI being used to create harmful content about individuals or entire communities. The studies that are mentioned in the article contribute to society by increasing the awareness of AI cyber threats and providing preventive solutions.<\/p>\n\n\n\n<p class=\"has-text-align-center has-black-color has-text-color has-link-color wp-elements-98778016dbd087becb73bc4a70369d14\"><br><strong>Closing statement<\/strong><\/p>\n\n\n\n<p class=\"has-black-color has-text-color has-link-color wp-elements-c15d03254606c60f449e1180e79e9b7d\" style=\"font-size:16px\"><br>In conclusion, Understanding AI can help to create laws and solutions to combat them<br>effectively. AI in cybercrime poses many challenges and opportunities. This article speaks on<br>valuable insight into the evolving landscape of cyberthreats that come along with AI<br>technologies. As societies continue to try to keep up with the rapidly advancing technology, it is<br>important to ensure that protection of individuals is a priority. Contributions that are made pave<br>the way for further innovation and research that makes for a safer digital future for everyone.<\/p>\n\n\n\n<p class=\"has-black-color has-text-color has-link-color wp-elements-ef644f2f271da52e60765338b746acdf\" style=\"font-size:16px\"><br>Article source:<br>https:\/\/vc.bridgew.edu\/cgi\/viewcontent.cgi?article=1185&amp;context=ijcic<br>Works cited:<br>Ai and cybersecurity: A new era. Morgan Stanley. (n.d.).<br>https:\/\/www.morganstanley.com\/articles\/ai-cybersecurity-new-era<\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Understanding the Use of Artificial Intelligence in Cybercrime I chose this article to review because the world is advancing its technology in manydifferent ways and I feel that it\u2019s important to understand how this new artificial intelligence isbeing used for cybercrime. An article by Morgan Stanley mentions how hackers use socialengineering schemes, password hacking, deepfakes,&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/jlarmercyse-201s\/article-review-2\/\">Read More<\/a><\/div>\n","protected":false},"author":30270,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/jlarmercyse-201s\/wp-json\/wp\/v2\/pages\/322"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/jlarmercyse-201s\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/jlarmercyse-201s\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/jlarmercyse-201s\/wp-json\/wp\/v2\/users\/30270"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/jlarmercyse-201s\/wp-json\/wp\/v2\/comments?post=322"}],"version-history":[{"count":3,"href":"https:\/\/sites.wp.odu.edu\/jlarmercyse-201s\/wp-json\/wp\/v2\/pages\/322\/revisions"}],"predecessor-version":[{"id":393,"href":"https:\/\/sites.wp.odu.edu\/jlarmercyse-201s\/wp-json\/wp\/v2\/pages\/322\/revisions\/393"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/jlarmercyse-201s\/wp-json\/wp\/v2\/media?parent=322"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}