{"title":"Understanding the Use of Artificial Intelligence in Cybercrime","authors":"Katalin Parti, Thomas Dearden, Sinyong Choi","doi":"10.52306/2578-3289.1170","DOIUrl":"https://doi.org/10.52306/2578-3289.1170","url":null,"abstract":"Artificial intelligence is one of the newest innovations which offenders exploit to satisfy their criminal desires. Although understanding cybercrime that is associated with this relatively new technology is essential in developing proper preventive measures, little has been done to examine this area. Therefore, this paper provides an overview of the two articles featured in the special issue of the International Journal of Cybersecurity Intelligence and Cybercrime, one about deepfakes in the metaverse and the other about social engineering attacks. The articles were written by the winners of the student paper competition at the 2023 International White Hat Conference.","PeriodicalId":492275,"journal":{"name":"International journal of cybersecurity intelligence and cybercrime","volume":"145 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-08-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136242470","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Victimization by Deepfake in the Metaverse: Building a Practical Management Framework","authors":"Julia Stavola, Kyung-Shick Choi","doi":"10.52306/2578-3289.1171","DOIUrl":"https://doi.org/10.52306/2578-3289.1171","url":null,"abstract":"Deepfake is digitally altered media aimed to deceive online users for political favor, monetary gain, extortion, and more. Deepfakes are the prevalent issues of impersonation, privacy, and fake news that cause substantial damage to individuals, groups, and organizations. The metaverse is an emerging 3-dimensional virtual platform led by AI and blockchain technology where users freely interact with each other. The purpose of this study is to identify the use of illicit deep fakes which can potentially contribute to cybercrime victimization in the metaverse. The data will be derived from expert interviews (n=8) and online open sources to design a framework and provide solutions to mitigate deepfake-related victimization in the metaverse. This study identifies and further suggests a framework for advocacy of deepfake crime victimization in the metaverse through the application of the routine activities theory, as well as offender motivation and potential explanation of criminal behavior through Eysenck’s theory of criminality.","PeriodicalId":492275,"journal":{"name":"International journal of cybersecurity intelligence and cybercrime","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-08-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136242469","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Harnessing Large Language Models to Simulate Realistic Human Responses to Social Engineering Attacks: A Case Study","authors":"Mohammad Asfour, Juan Carlos Murillo","doi":"10.52306/2578-3289.1172","DOIUrl":"https://doi.org/10.52306/2578-3289.1172","url":null,"abstract":"The research publication, “Generative Agents: Interactive Simulacra of Human Behavior,” by Stanford and Google in 2023 established that large language models (LLMs) such as GPT-4 can generate interactive agents with credible and emergent human-like behaviors. However, their application in simulating human responses in cybersecurity scenarios, particularly in social engineering attacks, remains unexplored. In addressing that gap, this study explores the potential of LLMs, specifically the Open AI GPT-4 model, to simulate a broad spectrum of human responses to social engineering attacks that exploit human social behaviors, framing our primary research question: How does the simulated behavior of human targets, based on the Big Five personality traits, responds to social engineering attacks? . This study aims to provide valuable insights for organizations and researchers striving to systematically analyze human behavior and identify prevalent human qualities, as defined by the Big Five personality traits, that are susceptible to social engineering attacks, specifically phishing emails. Also, it intends to offer recommendations for the cybersecurity industry and policymakers on mitigating these risks. The findings indicate that LLMs can provide realistic simulations of human responses to social engineering attacks, highlighting certain personality traits as more susceptible.","PeriodicalId":492275,"journal":{"name":"International journal of cybersecurity intelligence and cybercrime","volume":"115 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-08-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136242471","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Understanding the Connection Between Hackers and Their Hacks: Analyzing USDOJ Reports for Hacker Profiles","authors":"Joshua Gerstenfeld","doi":"10.52306/2578-3289.1157","DOIUrl":"https://doi.org/10.52306/2578-3289.1157","url":null,"abstract":"Recently, it seems as if hacking-related stories can be found in the news every day. To study, and hopefully prevent, this new type of crime, the field of cyber criminology has emerged. This study adds to the existing cybercrime literature by examining hacking behavior specifically. It determines if there is a relationship between the age, gender, and nationality of hackers and characteristics of the cyberattacks that they perpetrate. To do this, this study analyzes 122 United States Department of Justice (USDOJ) press reports from January 2019 to December 2021. Some key results include the finding that older hackers and international hackers are more likely to build/maintain software in their cyberattacks. Also, older hackers are less likely to use follow-up access in their hacks compared to younger hackers. Finally, international hackers are more likely to have more sophisticated attacks than nationals, and individual hackers are less likely to have sophisticated hacks than those working in groups. Implications of this study are that law enforcement can create a more accurate profile of hackers based on their hacks to guide them in investigations.","PeriodicalId":492275,"journal":{"name":"International journal of cybersecurity intelligence and cybercrime","volume":"73 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135950015","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"New Knowledge, Better Decisions: Promoting Effective Policymaking Through Cybercrime Analysis","authors":"Austen D. Givens","doi":"10.52306/2578-3289.1153","DOIUrl":"https://doi.org/10.52306/2578-3289.1153","url":null,"abstract":"This editorial introduction will present an overview of the four articles contained in this issue of the International Journal of Cybersecurity Intelligence and Cybercrime. The articles examine the profiling of hackers, the role of the media in shaping public perceptions of cyberterrorism, research trends in cybersecurity and cybercrime, as well as the impacts of cyberbullying.","PeriodicalId":492275,"journal":{"name":"International journal of cybersecurity intelligence and cybercrime","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135950017","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Threat Construction and Framing of Cyberterrorism in the U.S. News Media","authors":"Mehmet F. Bastug, Ismail Onat, Ahmet Guler","doi":"10.52306/2578-3289.1155","DOIUrl":"https://doi.org/10.52306/2578-3289.1155","url":null,"abstract":"This research aims to explore the influence of news media on the fear of cyberterrorism and how cyberterrorism is framed in the media. Using a mixed-method approach as a research strategy, this paper reports on two studies that explore the influence of news reading on the fear of cyberterrorism. The first study analyzed survey responses from 1,190 participants and found that increased exposure to reading news media was associated with increased fear of cyberterrorism. The second study, built on the first, sought to investigate how cyberterrorism is framed and constructed as a threat by the US local and national newspapers. The framing and portrayal of cyberterrorism in US newspapers are discussed.","PeriodicalId":492275,"journal":{"name":"International journal of cybersecurity intelligence and cybercrime","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135950240","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Jason Nicholson, Catherine Marcum, George E Higgins
{"title":"Prevalence and Trends of Depression among Cyberbullied Adolescents - Youth Risk Behavior Survey, United States, 2011 – 2019","authors":"Jason Nicholson, Catherine Marcum, George E Higgins","doi":"10.52306/2578-3289.1156","DOIUrl":"https://doi.org/10.52306/2578-3289.1156","url":null,"abstract":"The difference in depression between non-cyberbullied and cyberbullied youth is not well understood. To describe the prevalence and trends in depression among cyberbullied adolescents. Using cross-sectional, nationally-representative data from the YRBS 2011 - 2019, we estimated the prevalence and trends of depression across the total years and within cyberbullied groups that include biological sex and race and ethnicity among adolescents. The results indicated the prevalence of depression was higher among those that were cyberbullied. Within the cyberbullied groups the total trend was higher than the non-cyberbullied, females had a higher prevalence of depression than males, and Hispanics had a higher prevalence of depression than blacks. Further, the results showed the trends for cyberbullied, males, females, whites, and blacks had significant linear increases, but Hispanics remained stable. Further, the non-cyberbullied trend was quadratic where there was no change from 2011-2015, but an increase occurred between 2015-2019. Depression is high among adolescents. It appears to be increasing among individuals that are cyberbullied, with the exception of Hispanics. These results are discussed with programming recommendations.","PeriodicalId":492275,"journal":{"name":"International journal of cybersecurity intelligence and cybercrime","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135950016","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research Trends in Cybercrime and Cybersecurity: A Review Based on Web of Science Core Collection Database","authors":"Ling Wu, Qiong Peng, Michael Lembke","doi":"10.52306/2578-3289.1154","DOIUrl":"https://doi.org/10.52306/2578-3289.1154","url":null,"abstract":"Studies on cybercrime and cybersecurity have expanded in both scope and breadth in recent years. This study offers a bibliometric review of research trends in cybercrime and cybersecurity over the past 26 years (1995-2021) based on Web of Science core collection database. Specifically, we examine the growth of scholarship and the expanded scope of subject categories and relevant journals. We also analyze the research collaboration network based on authors’ affiliated institutions and countries. Finally, we identify major topics within the fields, how each topic relates to – and diverges from – one another, and their evolution over time. Overall, we illustrate the scientific landscape of cybercrime and cybersecurity scholarship by quantitatively synthesizing major components of existing literature. This study offers actionable insights to help researchers identify key research resources, establish/expand collaboration networks, and investigate emerging research topics in this increasingly important domain in criminology and criminal justice.","PeriodicalId":492275,"journal":{"name":"International journal of cybersecurity intelligence and cybercrime","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135950239","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}