{"id":254,"date":"2024-04-17T21:14:56","date_gmt":"2024-04-17T21:14:56","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/kojo-agyemang\/?p=254"},"modified":"2024-04-17T21:14:56","modified_gmt":"2024-04-17T21:14:56","slug":"article-1-review","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/kojo-agyemang\/2024\/04\/17\/article-1-review\/","title":{"rendered":"Article 1 Review"},"content":{"rendered":"\n<p>Article review 1(Introduction)<\/p>\n\n\n\n<p>Artificial Intelligence relates to the principles of the social sciences through Behavioral analysis: Social sciences often study human behavior, motivation, and interaction. In cybersecurity, Al can be used to analyze user behavior to detect anomalies that may indicate a security breach, such as unusual login times, locations, or patterns of access to sensitive information(Choi et al., 2022). This application of Al is grounded in the idea that understanding and predicting human behavior can help preempt cyber attacks(Choi et al., 2022). The study\u2019s research question is: How effective is Al at detecting phishing emails compared to traditional email filtering methods? The research methods used for AI perform tasks that typically require human intelligence by analyzing data (Choi et al., 2022). Another research method the AI uses is generating responses based on vast amounts of information given to the AI (Choi et al., 2022).<\/p>\n\n\n\n<p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Study 1&nbsp;<\/p>\n\n\n\n<p>Describe the types of data and analysis done. Network Traffic Data: Continuous monitoring of inbound and outbound network traffic to identify unusual patterns or potential breaches(Choi et al., 2022).Threat Intelligence: Information about known threats, vulnerabilities, and attack strategies to enhance predictive models(Choi et al., 2022). Anomaly Detection: Al models are trained to recognize standard behavior patterns and flag deviations that might indicate a security incident (Choi et al., 2022).<\/p>\n\n\n\n<p>&nbsp;&nbsp; Powerpoints relating to the article&nbsp;<\/p>\n\n\n\n<p>The concept from the PowerPoint presentation relates to the article from module 5 Power Point 5&nbsp;<\/p>\n\n\n\n<p>The Cyber offending and behavioral theories relate to this article. This relates to the topic because of the theories.&nbsp;<\/p>\n\n\n\n<p>How does&nbsp; Artificial intelligence relate to the challenges? Bias and Discrimination: Data used to train Al systems often reflect existing societal biases.<\/p>\n\n\n\n<p>For instance, algorithms that profile cybercriminal behavior in cybersecurity could inadvertently<\/p>\n\n\n\n<p>target marginalized groups based on biased historical data. Similarly, in the social sciences,<\/p>\n\n\n\n<p>Al-driven research or policy recommendations could perpetuate stereotypes or unequal treatment<\/p>\n\n\n\n<p>if not carefully checked for biases. Technology Gap The rapid advancement of Al might<\/p>\n\n\n\n<p>widen the gap between those who can afford to protect themselves using cutting-edge<\/p>\n\n\n\n<p>cybersecurity tools and those who cannot, leaving marginalized groups more vulnerable to<\/p>\n\n\n\n<p>Cyber-attacks.<\/p>\n\n\n\n<p>The overall contribution of studies to society (conclusion<\/p>\n\n\n\n<p>&nbsp;In conclusion, the Advancement of Knowledge&nbsp; Studies contributes to the body of knowledge<\/p>\n\n\n\n<p>across disciplines, pushing the frontiers of science, humanities, and the arts. They enable society<\/p>\n\n\n\n<p>to understand natural phenomena, human behavior, social dynamics, and technological<\/p>\n\n\n\n<p>possibilities better.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Article review 1(Introduction) Artificial Intelligence relates to the principles of the social sciences through Behavioral analysis: Social sciences often study human behavior, motivation, and interaction. In cybersecurity, Al can be used to analyze user behavior to detect anomalies that may&#8230; <a class=\"more-link\" href=\"https:\/\/sites.wp.odu.edu\/kojo-agyemang\/2024\/04\/17\/article-1-review\/\">Continue Reading &rarr;<\/a><\/p>\n","protected":false},"author":26992,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/kojo-agyemang\/wp-json\/wp\/v2\/posts\/254"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/kojo-agyemang\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/kojo-agyemang\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/kojo-agyemang\/wp-json\/wp\/v2\/users\/26992"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/kojo-agyemang\/wp-json\/wp\/v2\/comments?post=254"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/kojo-agyemang\/wp-json\/wp\/v2\/posts\/254\/revisions"}],"predecessor-version":[{"id":255,"href":"https:\/\/sites.wp.odu.edu\/kojo-agyemang\/wp-json\/wp\/v2\/posts\/254\/revisions\/255"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/kojo-agyemang\/wp-json\/wp\/v2\/media?parent=254"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/kojo-agyemang\/wp-json\/wp\/v2\/categories?post=254"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/kojo-agyemang\/wp-json\/wp\/v2\/tags?post=254"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}