{"id":320,"date":"2025-04-23T18:15:18","date_gmt":"2025-04-23T18:15:18","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/jwalk04\/?page_id=320"},"modified":"2025-04-23T19:07:48","modified_gmt":"2025-04-23T19:07:48","slug":"article-reviews","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/jwalk04\/article-reviews\/","title":{"rendered":"Article Reviews"},"content":{"rendered":"\n<p><strong>Article Review #1<\/strong><\/p>\n\n\n\n<p>Jalen Walker<\/p>\n\n\n\n<p>Cybersecurity and the Social Sciences<\/p>\n\n\n\n<p>Professor Yalpi<\/p>\n\n\n\n<p>16 February 2025<\/p>\n\n\n\n<p><strong>Understanding the Use of Artificial Intelligence in Cybercrime<\/strong><\/p>\n\n\n\n<p><em><strong>Introduction<\/strong><\/em><\/p>\n\n\n\n<p>The incorporation of Artificial Intelligence (AI) into several sectors has revolutionized industries, but I would also say it has exposed new opportunities for cybercriminal activities. In the article &#8220;Understanding the Use of Artificial Intelligence in Cybercrime&#8221; by Sinyong Choi, Thomas Dearden, and Katalin Parti discussing how AI is being utilized for malicious purposes, observing the implications for cybersecurity and society at large.<\/p>\n\n\n\n<p><em><strong>Relation to Social Sciences Principles<\/strong><\/em><\/p>\n\n\n\n<p>This topic relates to social sciences by exploring the behavioral patterns of cybercriminals and the societal influence of AI-driven cybercrimes. Understanding the motivations and methods of offender&#8217;s aids in creating effective prevention and intervention strategies, makes complete sense with criminological theories and practices.<\/p>\n\n\n\n<p><em><strong>Research Questions and Hypotheses<\/strong><\/em><\/p>\n\n\n\n<p>The study seeks to answer: How are cybercriminals leveraging AI technologies in their operations? It hypothesizes that the accessibility and advancement of AI tools have lowered the barrier for creating sophisticated cyberattacks, leading to a rise in AI-facilitated crimes.<\/p>\n\n\n\n<p><em><strong>Research Methods<\/strong><\/em><\/p>\n\n\n\n<p>Using a qualitative method, the authors hosted a comprehensive literature review of documented AI-related cybercrimes and analyzed case studies to identify common tactics and tools used by offenders. This method provided an in-depth understanding of the evolving landscape of AI in cybercrime.<\/p>\n\n\n\n<p><em><strong>Data and Analysis<\/strong><\/em><\/p>\n\n\n\n<p>Data was collected from cybersecurity reports, academic journals, and incident databases. The analysis focused on organizing all the different types of AI applications utilized in cybercrimes, for example automated phishing, deepfakes, and AI-driven malware, highlighting trends and potential future threats.<\/p>\n\n\n\n<p><em><strong>Connection to Course Concepts<\/strong><\/em><\/p>\n\n\n\n<p>The article strengthened concepts from our studies, especially the studies about dual-use nature of technology and the challenges in regulating emerging tech. It demonstrates how advancements intended for societal benefit can be repurposed for malicious activities, underscoring the need for robust cybersecurity measures and ethical considerations in AI development.<\/p>\n\n\n\n<p><em><strong>Impact on Marginalized Groups<\/strong><\/em><\/p>\n\n\n\n<p>AI-driven cybercrimes can unfairly affect marginalized communities, who possibly don&#8217;t have the same resources for sufficient digital protection. To put in perspective, deepfake technologies can be used to target people with limited means to legally defend themselves, exacerbating existing social inequalities.<\/p>\n\n\n\n<p><em><strong>Contributions to Society<\/strong><\/em><\/p>\n\n\n\n<p>The study exposes the rush for policymakers, technologists, and educators to collaborate in creating safeguards against AI-enabled cybercrimes. By boosting awareness and offering proactive measures, it adds to the development of a more secure digital environment, hoping to protect all societal segments from possible threats to come.<\/p>\n\n\n\n<p><em><strong>Conclusion<\/strong><\/em><\/p>\n\n\n\n<p>I would say as AI continues to grow over these years, so do the methods of cybercriminals. This article highlights the critical need for multiple adaptive cybersecurity strategies and ethical AI practices to reduce the risks associated with AI-enhanced cyber offenses.<\/p>\n\n\n\n<p><em><strong>References<\/strong><\/em><\/p>\n\n\n\n<p>Choi, S., Dearden, T., &amp; Parti, K. (2024). Understanding the Use of Artificial Intelligence in Cybercrime. International Journal of Cybersecurity Intelligence &amp; Cybercrime, 7(2).<\/p>\n\n\n\n<p>Bridgewater Virtual Commons<\/p>\n\n\n\n<p><em>Source Article<\/em><\/p>\n\n\n\n<p>Understanding the Use of Artificial Intelligence in Cybercrime<\/p>\n\n\n\n<p><a href=\"https:\/\/vc.bridgew.edu\/ijcic\/\">https:\/\/vc.bridgew.edu\/ijcic\/<\/a><\/p>\n\n\n\n<p><strong>Article Review #2<\/strong><\/p>\n\n\n\n<p>Jalen Walker<\/p>\n\n\n\n<p>Cybersecurity and the Social Sciences<\/p>\n\n\n\n<p>Professor Yalpi<\/p>\n\n\n\n<p>6 April 2025<\/p>\n\n\n\n<p><strong> Investigating the Intersection of AI and Cybercrime: Risks, Trends, and<\/strong> <strong>Countermeasures<\/strong><\/p>\n\n\n\n<p><strong><em>Introduction<\/em><\/strong><\/p>\n\n\n\n<p>The article &#8220;Investigating the Intersection of AI and Cybercrime: Risks, Trends, and Countermeasures&#8221; by Sanaika Shetty, Kyung-Shick Choi, and Insun Park looks at how artificial intelligence (AI) is being used in cybercrime, the problems this causes, and how we can fight back against these threats.<\/p>\n\n\n\n<p><strong><em>Connection to Social Science<\/em><\/strong><\/p>\n\n\n\n<p>This topic connects to social science because it dives into how technology changes the way people behave and interact. It also shows how laws and rules need to change as criminals start using new powerful technology tools like AI.<\/p>\n\n\n\n<p><strong><em>Research Questions and Hypotheses<\/em><\/strong><\/p>\n\n\n\n<p>The research questions addressed in the study: <\/p>\n\n\n\n<p>1. How is AI being leveraged by cybercriminals to enhance their operations?<\/p>\n\n\n\n<p>2. What are the emerging trends in AI-driven cybercrime?<\/p>\n\n\n\n<p>3. What countermeasures can be implemented to combat AI-enhanced cyber threats?<\/p>\n\n\n\n<p>The authors hypothesized that the wrongful use of AI by cybercriminals is on the rise, which caused it to lead to more complicated and widespread cyber-attacks.<\/p>\n\n\n\n<p><strong><em>Research Methods<\/em><\/strong><\/p>\n\n\n\n<p>The authors used both real-life examples and data from cyber-attack reports. They used quantitative data to figure this out. They looked at how AI tools were used to carry out different cybercrimes.<\/p>\n\n\n\n<p><strong><em>Data and Analysis<\/em><\/strong><\/p>\n\n\n\n<p>The study found that AI helps criminals create smarter malware, trick people with fake emails or websites, and make deepfake videos for scams. These tools make it easier for attackers to target people and harder to stop them. These problems already now AI enhances all the possible attacks on people.<\/p>\n\n\n\n<p><strong><em>Connection to Course Concepts<\/em><\/strong><\/p>\n\n\n\n<p>This article connects to ideas we have learned in class, such as the Routine Activities Theory. The Routine Activities Theory says that crimes happen when a criminal, a victim, and a lack of protection come together. AI makes it much easier for criminals to find targets and avoid getting caught. Knowing how powerful and smart AI is when used it makes it tampered with.<\/p>\n\n\n\n<p><strong><em>Impact on Marginalized Groups<\/em><\/strong><\/p>\n\n\n\n<p>People with fewer resources such as money or tech knowledge are often more at risk. On their behalf, being vulnerable as they are, they may not know how to protect themselves or could even afford strong cybersecurity tools to help better protect them. This shows the need to make cybersecurity help available to everyone. In which would make the world a better and safer place.<\/p>\n\n\n\n<p><strong><em>Contributions to Society<\/em><\/strong><\/p>\n\n\n\n<p>The study is important because it warns us about how AI can be used in ways it shouldn\u2019t be. It also shows that we need to keep upgrading cybersecurity laws and tools to keep up with these changes. Which would help better safeguard digital infrastructures and public trust.<\/p>\n\n\n\n<p><strong><em>Conclusion<\/em><\/strong><\/p>\n\n\n\n<p>To sum it all up the article gives a concise understanding of how AI is evolving cybercrime and constantly changing which is why we need to act fast. The authors suggest better technology, stronger rules, and more public awareness as ways to reduce the risk. I&#8217;ve been told the biggest vulnerability to cybercrime is people, so it starts with us.<\/p>\n\n\n\n<p><strong><em>References<\/em><\/strong><\/p>\n\n\n\n<p>Shetty, S., Choi, K.-S., &amp; Park, I. (2024). Investigating the Intersection of AI and Cybercrime: Risks, Trends, and Countermeasures. <em>International Journal of Cybersecurity Intelligence &amp;<\/em> <em>Cybercrime<\/em>, 7(2). https:\/\/doi.org\/10.52306\/2578-3289.1187<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Article Review #1 Jalen Walker Cybersecurity and the Social Sciences Professor Yalpi 16 February 2025 Understanding the Use of Artificial Intelligence in Cybercrime Introduction The incorporation of Artificial Intelligence (AI) into several sectors has revolutionized industries, but I would also say it has exposed new opportunities for cybercriminal activities. In the article &#8220;Understanding the Use&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/jwalk04\/article-reviews\/\">Read More<\/a><\/div>\n","protected":false},"author":28582,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/jwalk04\/wp-json\/wp\/v2\/pages\/320"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/jwalk04\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/jwalk04\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/jwalk04\/wp-json\/wp\/v2\/users\/28582"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/jwalk04\/wp-json\/wp\/v2\/comments?post=320"}],"version-history":[{"count":3,"href":"https:\/\/sites.wp.odu.edu\/jwalk04\/wp-json\/wp\/v2\/pages\/320\/revisions"}],"predecessor-version":[{"id":342,"href":"https:\/\/sites.wp.odu.edu\/jwalk04\/wp-json\/wp\/v2\/pages\/320\/revisions\/342"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/jwalk04\/wp-json\/wp\/v2\/media?parent=320"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}