AI Evaluation 2-2524

docx

School

Grand Canyon University *

*We aren’t endorsed by this school

Course

372

Subject

Computer Science

Date

Apr 3, 2024

Type

docx

Pages

8

Uploaded by SuperMole2636

Report
1 Valverde Valverde, Marcus Prof. Chuppa-Cornell, Howe & Martinez IFS-213 25-Feb-24 AI Evaluation Part III - Evaluation: Credibility of Cited Sources: 1. Johnson, A. (2020). "Cybersecurity Challenges in the Digital Age." Journal of Cybersecurity Studies, 8(2), 67-82. This resource I believe is credible because it seems to be a Journal of Cybersecurity Studies and focuses on cybersecurity issues. The only negative about the resource is that it lacks the direct link which makes it hard to confirm if it is accurate. I search through google for the site and was able to find the journal, but not able to find the full text of it. Smith, B. (2019). "Legal and Regulatory Perspectives on Hacking." International Journal of Cyber Law and Ethics, 15(1), 123-138. The resource seems to be accurate which is coming from an international Journal of Cyber Laws and Ethics. It focuses on a legal aspect of cybersecurity. There is no direct link which is hard to see if its claims are accurate. The AI cited the resource correctly and I was able to find the source
2 Valverde by looking up the Journal by its name and not the section. After I read the article, it expresses the claims that was made by the AI. Brown, C. (2021). "Ethical Hacking: Balancing Security and Privacy." Journal of Information Ethics, 12(3), 205-220. The resource looks credible because it shows that it is a Journal of Information Ethics and it express its focus on ethical consideration in Information Technology. I was able to find the site by looking up the Journal title and found the section within the Journal, but was unable to find the claim the AI made. AI Detection Test For the AI detection testing I used CopyLeaks to copy and paste the AI’s text to see if it will detect the AI. When I copied and pasted one of the paragrahs from the AI-generated essay into CopyLeaks it detected accurately and knew it was an AI-generated writing. When I copied and pasted a paragraph from the AI-generated text into CopyLeaks, the detector accurately identified the text as AI-generated. After the detection test, I altered some of the text from a paragraph and changed some of the words. The detector still recognized the paragraph as an AI-generated text. Then I tried to rephrase the paragraph to make it seem like the AI didn’t write it and put it in my own words while still talking about the same topic. After rephrasing it the detector still identified some of the AI generated text. Part IV – Report The essay the ethical implications of hacking in the digital age is interesting especially with its today’s relevance to the new technology community. Since I am wanting to work in the
3 Valverde cybersecurity and digital ethics field going through the ethics and how hacking is evolved is very interesting. This presents an amazing opportunity to dive into complex issues of technology, privacy, and law. My experience and the process of interacting with the AI has been different and crazy to see the capabilities and limitations that the AI has and is producing with complex topics. I think it’s very interesting how detailed an AI can dive within a topic of choice. Full Text of the AI’s writing AI Project Proposal: The Ethical Implications of Hacking in the Digital Age In the era of advanced technology, hacking has emerged as a pervasive issue with significant ethical implications in the digital age. This paper aims to explore the ethical considerations surrounding hacking, particularly in the context of cybersecurity, privacy concerns, and legal frameworks. Hacking encompasses a wide range of activities, from unauthorized access to computer systems to the exploitation of vulnerabilities for malicious purposes. The ethical implications of hacking extend beyond technical considerations and encompass broader societal and legal dimensions. One of the primary ethical concerns associated with hacking is its impact on cybersecurity and privacy. Hacking activities, such as data breaches and cyberattacks, can compromise the security and integrity of computer systems, leading to the unauthorized access, theft, or manipulation of sensitive information. According to Johnson (2020), the increasing frequency and sophistication of hacking incidents pose significant challenges to cybersecurity professionals and organizations tasked with safeguarding digital assets and infrastructure. Moreover, hacking undermines individuals' privacy rights by intruding upon their personal data
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
4 Valverde and online activities, raising profound questions about the protection of privacy in an interconnected world. Furthermore, hacking raises complex legal and regulatory challenges that require careful consideration and enforcement of existing laws and regulations. The legal status of hacking varies across jurisdictions, with some countries adopting stringent cybersecurity laws and others lacking comprehensive legislative frameworks to address cybercrime effectively. According to Smith (2019), the ambiguity surrounding the legal definition of hacking and the jurisdictional complexities involved in prosecuting hackers present significant obstacles to law enforcement agencies and legal authorities. Moreover, the rapid evolution of hacking techniques and technologies necessitates continual updates to legal frameworks to ensure their effectiveness in combating cyber threats and protecting individuals' rights and interests. In addition to cybersecurity and legal concerns, hacking raises broader ethical dilemmas and social implications that warrant careful consideration. The motivations behind hacking activities can vary widely, ranging from curiosity and activism to financial gain and espionage. The ethicality of hacking depends not only on the intentions and actions of the perpetrators but also on the potential consequences for affected individuals and society. As noted by Brown (2021), ethical hackers, also known as white hat hackers, play a crucial role in identifying and addressing security vulnerabilities to improve overall cybersecurity posture and protect against malicious attacks. However, distinguishing between ethical and unethical hacking practices can be challenging, highlighting the need for clear ethical guidelines and professional standards in the cybersecurity community.
5 Valverde In conclusion, the ethical implications of hacking in the digital age are multifaceted and complex, encompassing cybersecurity, privacy, legal, and social dimensions. Addressing these ethical challenges requires a comprehensive approach that involves collaboration between cybersecurity professionals, legal experts, policymakers, and other stakeholders. By promoting awareness, education, and ethical behavior, we can mitigate the risks associated with hacking and foster a safer and more secure digital environment for individuals and organizations worldwide. Evaluate the Text: The AI writing does not sound natural nor like a human would have written it. It does a well written attempt at addressing the ethical implications of hacking in the digital age. After reading the text you can see how repetitive it is and how it was from an AI generator. The writing has great formal tones and a good structure to read. I would be able to tell that it is AI-generated because some parts some robotic and shows that it was AI generated which I would think you couldn’t pass it off as my own. For example, it said “In the era of advance technology” which lacks personality and human generated writing. Besides this flaw the writing does good at expressing the key ethics of hacking and has a great starting point that captures the audience eyes. I paraphrased “In conclusion, the ethical implications of hacking in the digital age are multifaceted and complex, encompassing cybersecurity, privacy, legal, and social dimensions. Addressing these ethical challenges requires a comprehensive approach that involves collaboration between cybersecurity professionals, legal experts, policymakers, and other
6 Valverde stakeholders. By promoting awareness, education, and ethical behavior, we can mitigate the risks associated with hacking and foster a safer and more secure digital environment for individuals and organizations worldwide.” I changed it to say “In conclusion, there are many different and intricate ethical ramifications of hacking in the digital era, including those related to cybersecurity, privacy, the law, and society. A comprehensive strategy involving cooperation between cybersecurity specialists, legal professionals, legislators, and other stakeholders is needed to address these ethical issues. We can reduce the hazards associated with hacking and create a better and more secure digital environment for people and companies all around the world by fostering awareness, education, and ethical conduct.” It showed most of the text highlighted in red which indicates that it is from an AI-generator. This tells me that even if you change some of the words the detector test with always know that it was originated from an AI generator. Even minor changes to the writing will be identified by the AI detector test. The multiple transition words used in the essay giveaway that it is an AI generator. Evaluate the Sources: Johnson, A. (2020). "Cybersecurity Challenges in the Digital Age." Journal of Cybersecurity Studies, 8(2), 67-82. There was no links in this source, but I was able to find the journal by looking up “Journal of Cybersecurity Studies”. This article seems to be reputable journal. The only downside is that I was unable to get access to the full text of the journal online. The author is
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
7 Valverde Alan Johnson who is the authority in the field of cybersecurity. Going off the journals title and the authors name the site seems credible, but I would need to do further research to know for sure if the author’s credentials and expertise is accurate. The AI cites this source accurately in the text and provides relevant information on cybersecurity challenges in the digital age. Smith, B. (2019). "Legal and Regulatory Perspectives on Hacking." International Journal of Cyber Law and Ethics, 15(1), 123-138. There was no link given for the source. I was able to do a google search that led me to the International Journal of Cyber Law and Ethics which is another reputable academic publication. Although I was not able to access the full document of the journal it gave enough credibility that it was an academic source. The author of the journal is B Smith who is not high known in the cybersecurity field. There was not too much information on him. Brown, C. (2021). "Ethical Hacking: Balancing Security and Privacy." Journal of Information Ethics, 12(3), 205-220. The resource “Ethical Hacking: Balancing Security. and Privacy” is an academic journal that focuses on ethical issues in information technology. While I could not access the full text of
8 Valverde the article online, the journal itself appears reputable. The author C Brown does not appear to be widely recognized in the field and I was unable to find too much information on this author. Analysis of Findings and Conclusion: My overall takeaway I learned from this experience is that artificial intelligence AI can write complicated articles on a variety of themes more quickly than humans and can understand subject matter. When it comes to AIs, not many restrictions apply. When it comes to writing, AI does not have the human language or insight that makes it genuinely interesting. Relying only on text created by AI is not a smart idea because there are a lot of questions about the accuracy and relaibility of the information provided. Not all the information provided by the AI is reliable. The importance of AI in how it shares information has significant implication for how we look at authority and reliability. Sometimes information that is necessary for a person to know is missing from the information provided by AI. By concealing some facts from human and AI- generated material, AI subverts authority. Although AI has advantages in terms of efficiency and adaptability, there is a chance that it may not be accurate. The main concern about AI in education, information, and privacy is that the content it creates may be biased and deceive people. It has the potential to spread false information that harms both the community and individual members. I believe that it facilitates learning experiences and aids in outlining many themes, among other advantages. Moreover, it boosts output and has a beneficial impact on information and education.