{"id":321,"date":"2024-12-07T15:35:46","date_gmt":"2024-12-07T15:35:46","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/nicholasdent\/?p=321"},"modified":"2024-12-07T15:35:46","modified_gmt":"2024-12-07T15:35:46","slug":"article-review-2","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/nicholasdent\/2024\/12\/07\/article-review-2\/","title":{"rendered":"Article Review 2"},"content":{"rendered":"\n<p>Nicholas Dent&nbsp;<\/p>\n\n\n\n<p>November 15 2024<\/p>\n\n\n\n<p>CYSE 201S<\/p>\n\n\n\n<p><strong>Introduction&nbsp;<\/strong><\/p>\n\n\n\n<p>This article mainly talks about the implementation of artificial intelligence (AI) on the internet and how it is growing very rapidly in today&#8217;s world. AI has had a big influence in this present day, with the typical use of it being utilized by students in school. Furthermore, AI sources have become so popular because of the simplicity they display. Most AI websites simply prompt you to type in a question of your choice, and within seconds, you will receive an answer. In my opinion, AI sources and websites can be seen as a foolproof method for computers to generate problem-solving, creativity, everyday learning, and decision-making. In the cyberworld, professionals have recognized that AI is being used by cybercriminals to create cyberthreats. These cybercriminals use artificial intelligence to generate social engineering attacks such as phishing, different kinds of malware, pretexting, and tailgating. This article deploys the concepts of the Cyber Routine Activities theory and topics related to social media. The Cyber Routine Activities theory can be characterized by an approach in criminology that relates crime closely to the environment, studies it as an event, and underscores its ecological process (Cohen &amp; Felson, 1979). This theory relates to this article by analyzing potential AI-driven cyberattacks and risks, as well as highlighting the need for more policies to address AI cyberattacks. Overall, this article&#8217;s sole purpose is to inform readers about the incoming risks of AI in the cyberworld and provide ideas about how to stop, if not lessen, cyberattacks in today&#8217;s world.<\/p>\n\n\n\n<p><strong>Research questions\/ Research methods<\/strong><\/p>\n\n\n\n<p>These questions aim to provide a better understanding and knowledge to improve cybersecurity, along with the use of AI. To be more specific, the first question emphasizes how AI-driven cybercrime tools circulate across the internet. The two sides of the internet characterized in this article are the dark web (used for illicit and illegal purposes) and the clear web (publicly accessible). The second question involves media such as news, social media, and blogs. This question essentially seeks to determine whether the media increases or decreases AI-driven cybercrime. Lastly, the third question, which is my favorite, delves into the thought process of improving cyber hygiene among individuals in order to decrease AI-driven cyberattacks. The research methods used to answer these questions include both quantitative and qualitative research. This study employs these methods to gain more knowledge on the use of AI across the dark and clear web. Using the qualitative approach, the study collected 102 prompts generated by AI for malevolent purposes from both sides of the internet. The study then gathered data from 8 online forums and discussed the potential harm they could bring. The forums used in this study were Reddit, YouTube, and FlowGPT. The central focus of this research method was to examine AI-generated phishing attacks and malware. On the other hand, the study also collected qualitative data by conducting interviews with experts in criminal-related interdisciplinary fields. The interviews lasted about 45 minutes and included both open-ended and structured questions. The responses to the interview questions were kept confidential, and the transcripts were analyzed to derive better data. The central focus of these interviews was for the experts to share ideas on policies involving AI cyber threats, enhancing cyber hygiene in cyberspace, and addressing the spread of AI in different media types. Through the qualitative and quantitative data used, I gained a better understanding of AI in cybercrime, along with possible solutions to control it.<\/p>\n\n\n\n<p><strong>Data and Analysis&nbsp;<\/strong><\/p>\n\n\n\n<p>Based on the 102 AI prompts collected from the dark and clear web, the analysis done in the study aimed to identify the AI websites used for malevolent schemes. Looking at the data tables given in the study, the most used AI websites for hostile activities were ChatGPT and WormGPT. Although these two websites were the most used, ChatGPT still saw a greater usage rate, appearing in 77% of the data collected. These tools were most commonly used for phishing scheme prompts, malware, and jailbreaking. The dark web forum used most often for malevolent activities was FlowGPT, while the clear web forum used most often was Reddit. FlowGPT saw a 62.7% rate of activities, with 64 instances occurring. In addition, Reddit saw a 37.2% rate, with only 38 instances occurring. In total, hostile AI prompts were found to be most prominent on the dark web, essentially indicating that most cybercriminals reside on this side of the internet.<\/p>\n\n\n\n<p><strong>Principles of Social Science&nbsp;<\/strong><\/p>\n\n\n\n<p>The social sciences I recognize in this article are objectivity, parsimony, determinism, ethical neutrality, and relativism. Furthermore, the three principles that share a similarity in this article are objectivity, parsimony, and determinism. These principles share a similarity by incorporating concepts of the Routine Activity theory, as opposed to the other two found in the article. To start off, the first principle I come across is objectivity. This principle relates to this article by stating that one of the Routine Activity theory&#8217;s main purposes is to use structured research methods to focus on more measurable aspects of a study, rather than using personal biases or emotions. Furthermore, parsimony relates to this article by also using the Routine Activity theory. Parsimony applies this theory by incorporating the idea that one out of three conditions must be met to understand cybercrime. The conditions listed in the article are lack of guardianship, motivated offenders, and suitable targets. Through the understanding of these conditions, the study ultimately narrows down the explanations to be more straightforward. Determinism is the last principle that involves the Routine Activity theory in relation to the article. This principle occurs in the article by stating that monitoring an individual&#8217;s past online activities may provide a basis for why a person would commit a cybercrime.Ethical neutrality can be seen in this article by discussing how the study emphasizes ethical concerns related to the malicious use of AI and the cybercriminals committing these acts.The last social principle I came across in this article is relativism. Relativism in this article suggests that more vulnerable areas are more prone to experiencing cybercrime in many different ways, such as technological, educational, and socioeconomic issues.<\/p>\n\n\n\n<p><strong>Challenges on Marginalized Groups and Society&nbsp;<\/strong><\/p>\n\n\n\n<p>This study does a good job of explaining the challenges brought onto society, as well as these groups. First, the article explains that cybercrime is more commonly seen in regions that face the most hardships. As stated previously, these hardships include a lack of education, cyber knowledge, and overall living conditions. The use of AI is growing rapidly, and in this world, it is starting to take over to a certain degree. Therefore, providing information about the malicious acts committed through the use of AI to people who consider themselves part of a marginalized group will only benefit them in the long run. Most individuals lack a deep understanding of how effective AI can be when used in either a bad or good way. Consequently, because of this, more and more people fall victim to phishing schemes and harmful malware without even considering whether or not it could be real. Overall, I believe that individuals in these regions, and society in general, should be more educated about the topic of AI to ensure greater ethical responsibility, as well as to improve the everyday lives of people around the world.<\/p>\n\n\n\n<p><strong>Conclusion&nbsp;<\/strong><\/p>\n\n\n\n<p>In conclusion, this article does a great job of covering the vast increase in artificial intelligence and its varied use, whether it be good or bad in cybersecurity. The use of AI has reportedly taken a turn in the cyberworld, with criminals using it in malicious ways. The article lists methods such as phishing schemes, harmful malware, use of the dark web, and other social engineering attacks on technology. Furthermore, this study uses both qualitative and quantitative research methods to collect data on the topic. The Cyber Routine Activity theory was mentioned frequently in this study. This theory explained aspects of cybercrime and the need to prevent it in the future. Overall, this article informed me to a great extent about the use of AI, the dark web and clear web, along with the major need for more enhanced cyber hygiene.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Nicholas Dent&nbsp; November 15 2024 CYSE 201S Introduction&nbsp; This article mainly talks about the implementation of artificial intelligence (AI) on the internet and how it is growing very rapidly in today&#8217;s world. AI has had a big influence in this present day, with the typical use of it being utilized by students in school. Furthermore,&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/nicholasdent\/2024\/12\/07\/article-review-2\/\">Read More<\/a><\/div>\n","protected":false},"author":29537,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/nicholasdent\/wp-json\/wp\/v2\/posts\/321"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/nicholasdent\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/nicholasdent\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/nicholasdent\/wp-json\/wp\/v2\/users\/29537"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/nicholasdent\/wp-json\/wp\/v2\/comments?post=321"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/nicholasdent\/wp-json\/wp\/v2\/posts\/321\/revisions"}],"predecessor-version":[{"id":322,"href":"https:\/\/sites.wp.odu.edu\/nicholasdent\/wp-json\/wp\/v2\/posts\/321\/revisions\/322"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/nicholasdent\/wp-json\/wp\/v2\/media?parent=321"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/nicholasdent\/wp-json\/wp\/v2\/categories?post=321"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/nicholasdent\/wp-json\/wp\/v2\/tags?post=321"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}