{"id":17702,"date":"2024-02-05T08:49:33","date_gmt":"2024-02-05T08:49:33","guid":{"rendered":"https:\/\/cybercrime.rs\/?p=17702"},"modified":"2024-02-28T10:32:36","modified_gmt":"2024-02-28T10:32:36","slug":"razumevanje-upotrebe-vestacke-inteligencije-u-sajber-kriminalu","status":"publish","type":"post","link":"https:\/\/cybercrime.rs\/en\/2024\/02\/05\/razumevanje-upotrebe-vestacke-inteligencije-u-sajber-kriminalu\/","title":{"rendered":"Understanding the Use of Artificial Intelligence in Cybercrime"},"content":{"rendered":"<div data-elementor-type=\"wp-post\" data-elementor-id=\"17702\" class=\"elementor elementor-17702\">\n\t\t\t\t\t\t\t\t\t<section class=\"has_ae_slider elementor-section elementor-top-section elementor-element elementor-element-18a113e elementor-section-boxed elementor-section-height-default elementor-section-height-default ae-bg-gallery-type-default\" data-id=\"18a113e\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"has_ae_slider elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-5519bc9c ae-bg-gallery-type-default\" data-id=\"5519bc9c\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-70b0e39 elementor-widget elementor-widget-spacer\" data-id=\"70b0e39\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<style>\/*! elementor - v3.7.8 - 02-10-2022 *\/\n.elementor-column .elementor-spacer-inner{height:var(--spacer-size)}.e-container{--container-widget-width:100%}.e-container>.elementor-widget-spacer{width:var(--container-widget-width,var(--spacer-size));-ms-flex-item-align:stretch;align-self:stretch;-ms-flex-negative:0;flex-shrink:0}.e-container>.elementor-widget-spacer>.elementor-widget-container,.e-container>.elementor-widget-spacer>.elementor-widget-container>.elementor-spacer{height:100%}.e-container>.elementor-widget-spacer>.elementor-widget-container>.elementor-spacer>.elementor-spacer-inner{height:var(--container-widget-height,var(--spacer-size))}<\/style>\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-135fbc49 elementor-widget elementor-widget-text-editor\" data-id=\"135fbc49\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<style>\/*! elementor - v3.7.8 - 02-10-2022 *\/\n.elementor-widget-text-editor.elementor-drop-cap-view-stacked .elementor-drop-cap{background-color:#818a91;color:#fff}.elementor-widget-text-editor.elementor-drop-cap-view-framed .elementor-drop-cap{color:#818a91;border:3px solid;background-color:transparent}.elementor-widget-text-editor:not(.elementor-drop-cap-view-default) .elementor-drop-cap{margin-top:8px}.elementor-widget-text-editor:not(.elementor-drop-cap-view-default) .elementor-drop-cap-letter{width:1em;height:1em}.elementor-widget-text-editor .elementor-drop-cap{float:left;text-align:center;line-height:1;font-size:50px}.elementor-widget-text-editor .elementor-drop-cap-letter{display:inline-block}<\/style>\t\t\t\t<!-- wp:paragraph -->\n<p>Artificial intelligence is one of the newest innovations which offenders exploit to satisfy their criminal desires. Although understanding cybercrime that is associated with this relatively new technology is essential in developing proper preventive measures, little has been done to examine this area. Therefore, this paper provides an overview of the two articles featured in the special issue of the <span style=\"color: #e3b969;\"><a style=\"color: #e3b969;\" href=\"https:\/\/vc.bridgew.edu\/ijcic\/vol6\/iss2\/1\/\" target=\"_blank\" rel=\"noopener\">International Journal of Cybersecurity Intelligence and Cybercrime<\/a> <\/span>, one about deepfakes in the metaverse and the other about social engineering attacks.<\/p>\n<p>The articles were written by the winners of the student paper competition at the <span style=\"color: #e3b969;\"><a style=\"color: #e3b969;\" href=\"https:\/\/live.bu.edu\/whitehat\/\" target=\"_blank\" rel=\"noopener\">International White Hat Conference 2023<\/a><\/span>.<\/p>\n<!-- \/wp:paragraph -->\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7b764c0 elementor-widget elementor-widget-spacer\" data-id=\"7b764c0\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0b965e2 elementor-widget elementor-widget-text-editor\" data-id=\"0b965e2\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p>The study <span style=\"color: #ead181;\"><a style=\"color: #ead181;\" href=\"https:\/\/vc.bridgew.edu\/ijcic\/vol6\/iss2\/2\/\" target=\"_blank\" rel=\"noopener\">Victimization by Deepfake in the Metaverse: Building a Practical Management Framework<\/a>,<\/span> by<br \/>Julia Stavola and Kyung-Shick Choi is an exciting addition to cyber victimization studies, researching personal cybervictimization in the metaverse. It bridges the gap between research on deepfake-related interpersonal crime and effective prevention methods<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3d060cb elementor-widget elementor-widget-spacer\" data-id=\"3d060cb\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-70fa80f elementor-widget elementor-widget-text-editor\" data-id=\"70fa80f\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p>The study <span style=\"color: #ead181;\"><a style=\"color: #ead181;\" href=\"https:\/\/vc.bridgew.edu\/ijcic\/vol6\/iss2\/3\/\" target=\"_blank\" rel=\"noopener\">Harnessing Large Language Models to Simulate Realistic Human Responses to Social Engineering Attacks: A Case Study<\/a><\/span>, by Mohammad Asfour and Juan Carlos Murillo contributes to the growing body of literature on how GPT can be utilized to simulate target responses to social engineering attacks. The authors utilize GPT-4 large language modeling (LLM) to simulate target vulnerabilities to social engineering (e.g., phishing) attacks.<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-42a1f14 elementor-widget elementor-widget-spacer\" data-id=\"42a1f14\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ffd6751 elementor-widget elementor-widget-text-editor\" data-id=\"ffd6751\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p>Vi\u0161e o ovome, vid. <span style=\"color: #ead181;\">Parti, K. , Dearden, T. &amp; Choi, S. (2023). Understanding the Use of Artificial Intelligence in Cybercrime.\u00a0International Journal of Cybersecurity Intelligence &amp; Cybercrime: 6(2)<\/span><\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b5b1275 elementor-widget elementor-widget-spacer\" data-id=\"b5b1275\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0edd89e elementor-widget elementor-widget-text-editor\" data-id=\"0edd89e\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p class=\" translation-block\">Source <span style=\"color: #ead181\"><a style=\"color: #ead181\" href=\"https:\/\/www.linkedin.com\/pulse\/povreda-podataka-o-liC48Dnosti-zlatko-petroviC487\/?trackingId=XFCkQ48TKCv0woOAZzMhA\" target=\"_blank\" rel=\"noopener\">&gt;&gt;<\/a><\/span><\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>Studies on the use of deep fake technology for cyber victimization in the metaverse and the use of GPT-4 to simulate targeted social engineering vulnerabilities<\/p>","protected":false},"author":1,"featured_media":9975,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"om_disable_all_campaigns":false,"site-sidebar-layout":"default","site-content-layout":"default","ast-global-header-display":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","footnotes":""},"categories":[36],"tags":[],"class_list":["post-17702","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybercrime"],"acf":[],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/cybercrime.rs\/en\/wp-json\/wp\/v2\/posts\/17702","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cybercrime.rs\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cybercrime.rs\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cybercrime.rs\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/cybercrime.rs\/en\/wp-json\/wp\/v2\/comments?post=17702"}],"version-history":[{"count":11,"href":"https:\/\/cybercrime.rs\/en\/wp-json\/wp\/v2\/posts\/17702\/revisions"}],"predecessor-version":[{"id":17807,"href":"https:\/\/cybercrime.rs\/en\/wp-json\/wp\/v2\/posts\/17702\/revisions\/17807"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cybercrime.rs\/en\/wp-json\/wp\/v2\/media\/9975"}],"wp:attachment":[{"href":"https:\/\/cybercrime.rs\/en\/wp-json\/wp\/v2\/media?parent=17702"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cybercrime.rs\/en\/wp-json\/wp\/v2\/categories?post=17702"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cybercrime.rs\/en\/wp-json\/wp\/v2\/tags?post=17702"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}