{"id":208,"date":"2025-02-12T03:48:04","date_gmt":"2025-02-12T03:48:04","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/jsmit163-cyse201s\/?p=208"},"modified":"2025-04-27T14:02:53","modified_gmt":"2025-04-27T14:02:53","slug":"article-review-1-artificial-intelligence-and-cybercrime","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/jsmit163-cyse201s\/2025\/02\/12\/article-review-1-artificial-intelligence-and-cybercrime\/","title":{"rendered":"Article Review #1 &#8211; Artificial Intelligence and Cybercrime"},"content":{"rendered":"\n<h3 class=\"wp-block-heading has-text-align-left\">Artificial Intelligence and Cybercrime<br>Article Review #1<\/h3>\n\n\n\n<h3 class=\"wp-block-heading\">Introduction<\/h3>\n\n\n\n<p>The academic article Investigating the Intersection of AI and Cybercrime: Risks, Trends, Investigating the Intersection of AI and Cybercrime, the authors explore the relationship between artificial intelligence cybercrime. With the increasing popularity of artificial intelligence due to both the ease of access and use, it has shown itself to be advantageous in increasing efficiency and productivity. However, with artificial intelligence\u2019s increased ease of access, this has led to an increased use in cybercrime.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Research Questions<\/h3>\n\n\n\n<p>The article aims to address a variety of research questions. Information involving the malicious use of artificial intelligence is examined along with the role of the media in the spread of AI-facilitated cybercrime. In addition, the article explores the possible ways an individual\u2019s online practices can reduce the risk related to the threats posed by artificial intelligence.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Relations in Social Science<\/h3>\n\n\n\n<p>Throughout the article, it is evident a variety of social science disciplines are utilized to form a conclusion. For example, beyond the criminology in relation to cybercrime, the Cyber Routine Activities Theory (Cyber RAT) \u201csheds light on lifestyle factors that contribute to potential victimization in computer crimes\u201d (Shetty et al.). Using Cyber RAT, the everyday behavior and routines of an individual is examined to determine whether they elevate the risk of cybercrime victimization, blending both the study of sociology and psychology.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Research Methods<\/h3>\n\n\n\n<p>Data was collected by both traditional and cyberspace field studies. The authors were able to collected actual prompts used with various artificial intelligence tools such as ChatGPT, in addition to examining multiple online forums which exchanged AI-generated prompts aimed for malicious use. This aided the authors to gather information on the sociological aspect by directly examining the communications and prompts used on various forums. Experts in cybercrime, cybersecurity, and criminal justice were also interviewed. Both open-ended and more structured questions were asked in the goal of gathering information relevant to the study.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Data and analysis<\/h3>\n\n\n\n<p>102 chat prompts were collected from ChatGPT and similar tools. From these prompts, it was shown the AI-tools \u201cwere employed for a range of malicious activities, such as creating malware, ransomware, phishing schemes, and jailbreaking techniques\u201d (Shetty et al.). Further more, it was observed the number of users on the online forums ranged from 4,430 to 4,600,000 individuals, showing that the \u201cuser engagement highlights the potential reach and impact of AI-generated prompts for malicious activities across diverse online communities\u201d (Shetty et al.). The interviews with experts discussed a variety of topics, including how the ways individuals conducted themselves online may contribute to the risk of being victimized by AI-based attacks, the media\u2019s portrayal of artificial intelligence as threatening to human jobs, to the lack of regulation of artificial intelligence online.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Challenges and Concerns<\/h3>\n\n\n\n<p>The article acknowledges the need of a multifaceted approach. For example, in the context of victim precipitation, young children online may experience increased victimization online. The author notes \u201cby moving away from a one-size-fits-all model, we can better address the specific cybersecurity needs of different age groups\u201d (Shetty et al.). As an example, the article suggests that interactive educational games can be utilized as a means to provide cybersecurity education for children. Furthermore, the authors suggest televised advertisements to effectively raise awareness for the senior citizen demographic.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Conclusion<\/h3>\n\n\n\n<p>In conclusion, while artificial intelligence can be beneficial, this article highlights how it can be use to facilitate cybercrime. By examining how online behavior can increase the risk of victimization, the study employs the Cyber Routine Activities Theory to blend the disciplines of sociology and psychology, in combination with cyber criminology, better solution can be better geared towards mitigating these risks. The authors note \u201cthere is a pressing need for more tailored cybercrime<\/p>\n\n\n\n<p>statutes to regulate the dissemination of malicious acts\u201d (Shetty et al.), specifically to address the malicious use of artificial intelligence and related technologies. With the data collected from the research, frameworks, policies, and other changes can be made to better prepare from the use of the quickly evolving artificial intelligence as a threat.<\/p>\n\n\n\n<p><\/p>\n\n\n\n<p>Works Cited:<br>Shetty, Sanaika, et al. \u201cInvestigating the Intersection of AI and Cybercrime.\u201d <em>Investigating the Intersection of AI and Cybercrime: Risks, Trends, and Countermeasures<\/em>, 16 Sept. 2024, https:\/\/vc.bridgew.edu\/cgi\/viewcontent.cgi?article=1187&amp;context=ijcic.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Artificial Intelligence and CybercrimeArticle Review #1 Introduction The academic article Investigating the Intersection of AI and Cybercrime: Risks, Trends, Investigating the Intersection of AI and Cybercrime, the authors explore the relationship between artificial intelligence cybercrime. With the increasing popularity of artificial intelligence due to both the ease of access and use, it has shown itself &hellip; <a href=\"https:\/\/sites.wp.odu.edu\/jsmit163-cyse201s\/2025\/02\/12\/article-review-1-artificial-intelligence-and-cybercrime\/\" class=\"more-link\">Continue reading <span class=\"screen-reader-text\">Article Review #1 &#8211; Artificial Intelligence and Cybercrime<\/span><\/a><\/p>\n","protected":false},"author":23698,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":3},"categories":[3],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/jsmit163-cyse201s\/wp-json\/wp\/v2\/posts\/208"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/jsmit163-cyse201s\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/jsmit163-cyse201s\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/jsmit163-cyse201s\/wp-json\/wp\/v2\/users\/23698"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/jsmit163-cyse201s\/wp-json\/wp\/v2\/comments?post=208"}],"version-history":[{"count":2,"href":"https:\/\/sites.wp.odu.edu\/jsmit163-cyse201s\/wp-json\/wp\/v2\/posts\/208\/revisions"}],"predecessor-version":[{"id":263,"href":"https:\/\/sites.wp.odu.edu\/jsmit163-cyse201s\/wp-json\/wp\/v2\/posts\/208\/revisions\/263"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/jsmit163-cyse201s\/wp-json\/wp\/v2\/media?parent=208"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/jsmit163-cyse201s\/wp-json\/wp\/v2\/categories?post=208"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/jsmit163-cyse201s\/wp-json\/wp\/v2\/tags?post=208"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}