{"id":89,"date":"2024-12-07T22:50:52","date_gmt":"2024-12-07T22:50:52","guid":{"rendered":"https:\/\/student.wp.odu.edu\/bgrah014\/?p=89"},"modified":"2024-12-07T22:50:52","modified_gmt":"2024-12-07T22:50:52","slug":"article-1","status":"publish","type":"post","link":"https:\/\/student.wp.odu.edu\/bgrah014\/2024\/12\/07\/article-1\/","title":{"rendered":"Article 1"},"content":{"rendered":"\n<p>The Article I am reviewing is called, \u201cUnderstanding the Use of Artificial Intelligence in<br>Cybercrime\u201d. This article highlights the advancements of artificial intelligence and ways that<br>cybercriminals have used it to commit cybercrimes. The paper concludes that artificial<br>intelligence is being used to create deep fakes that can be used in interpersonal cyberattacks<br>and phishing attacks. The use of these create very realistic looking pictures or videos to either<br>harm someone&#8217;s reputation, or influence someone into thinking they are talking or texting<br>someone they personally know. The case studies provided show the potential vulnerabilities and<br>how we can approach them. The first study is conducted on healthcare and what challenges this<br>field has when dealing with evolving cybercrime. What the study concludes is that a multilayered<br>approach involving the implementation of VIVA standards would be best suited to adhere to the<br>risks. The second study uses the RAT, routine activities theory, to focus on threats, risks and<br>countermeasures to cybercrime. This study also concluded that a multilayered system including<br>policy, education, and intervention was needed to ensure protection from cyber attacks. The<br>third and final study uses the IMCD, or Integrated Model of Cybercrime Dynamics to understand<br>the connections between cybercrime, and the environment and behaviors linked between them.<br>The conclusion on prevention again is a multilayered system like the previous two. The overall<br>findings of these studies is that criminals are using artificial intelligence to enhance their<br>opportunities to commit cybercrime primarily through social engineering. The most effective<br>countermeasures found in the studies were using multilayered systems that include best<br>practices, policy, education, and fast-responses to attacks.<br>https:\/\/vc.bridgew.edu\/ijcic\/vol7\/iss2\/1\/<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The Article I am reviewing is called, \u201cUnderstanding the Use of Artificial Intelligence inCybercrime\u201d. This article highlights the advancements of artificial intelligence and ways thatcybercriminals have used it to commit cybercrimes. The paper concludes that artificialintelligence is being used to create deep fakes that can be used in interpersonal cyberattacksand phishing attacks. The use of&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/student.wp.odu.edu\/bgrah014\/2024\/12\/07\/article-1\/\">Read More<\/a><\/div>\n","protected":false},"author":27861,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":6},"categories":[6],"tags":[],"_links":{"self":[{"href":"https:\/\/student.wp.odu.edu\/bgrah014\/wp-json\/wp\/v2\/posts\/89"}],"collection":[{"href":"https:\/\/student.wp.odu.edu\/bgrah014\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/student.wp.odu.edu\/bgrah014\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/student.wp.odu.edu\/bgrah014\/wp-json\/wp\/v2\/users\/27861"}],"replies":[{"embeddable":true,"href":"https:\/\/student.wp.odu.edu\/bgrah014\/wp-json\/wp\/v2\/comments?post=89"}],"version-history":[{"count":1,"href":"https:\/\/student.wp.odu.edu\/bgrah014\/wp-json\/wp\/v2\/posts\/89\/revisions"}],"predecessor-version":[{"id":90,"href":"https:\/\/student.wp.odu.edu\/bgrah014\/wp-json\/wp\/v2\/posts\/89\/revisions\/90"}],"wp:attachment":[{"href":"https:\/\/student.wp.odu.edu\/bgrah014\/wp-json\/wp\/v2\/media?parent=89"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/student.wp.odu.edu\/bgrah014\/wp-json\/wp\/v2\/categories?post=89"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/student.wp.odu.edu\/bgrah014\/wp-json\/wp\/v2\/tags?post=89"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}