Skip to product information
AI Crime and Self-Defense
AI Crime and Self-Defense
Description
Book Introduction
Uncover the true nature of evolving crimes, including AI-based phishing, deepfakes, and money laundering.
This practical guide analyzes criminals' calculation methods, suggests personalized defense strategies, and even covers social responses. The AI ​​Encyclopedia.
You can find the artificial intelligence knowledge you need at aiseries.oopy.io.
  • You can preview some of the book's contents.
    Preview

index
AI and Cybercrime Exploitation

01 AI Crime: A New Era of Digital Risk

02 The Economics of Criminals

03 A world that seems real but is fake: The threat of deepfakes

04 The Perfect Scammer: How AI Is Changing the World of Phishing and Social Engineering

05 The World of Continuously Evolving AI-Based Automated Attacks

06 AI Surveillance and the Privacy Crisis

07 AI and Financial Crime

08 Create your own digital shield

09 Creating a Safe AI Society Together

10 Digital Survival Strategies to Prepare for the Future

Into the book
Conversational automated crime refers to a new form of digital crime in which artificial intelligence converses naturally like a human and automatically generates customized messages or content to carry out criminal purposes (TRM; King et al., 2020).
Beyond simple spam and phishing, AI uses real-time conversations to manipulate victims' emotions, instill trust, and extract sensitive information.
This is not simply a matter of utilizing technology, but rather a structural shift in which AI becomes a tool and executor of crime.
--- From "01_“AI Crime, the New Era of Digital Risk”"

When deepfake technology is combined with this psychological manipulation, it becomes more than just a scam; it becomes a meticulously planned crime.
Voice used to be a symbol of trust, but now it has become manipulable data.
People begin to doubt their own senses when faced with a voice that is so similar to the real thing.
--- From "03_“A world that seems real but is fake, the threat of deepfakes”"

Behind this convenience lies the shadow of massive collection of personal information.
Most free digital services monetize their users' information, with companies like Google, Facebook, and Amazon building sophisticated profiles of individuals by synthesizing their search histories, social media activity, and spending history.
The problem is that this information is collected without the user's explicit consent or is used for purposes other than those for which it was collected.
Complex consent procedures are effectively a formality, and there are ongoing cases where sensitive data, such as COVID-19 or medical information, is being diverted for other purposes.
--- From “06_“AI Surveillance and the Crisis of Privacy””

One of the most serious characteristics of AI crime is that its damage is not limited to individual cases, but spreads to society as a whole, creating an “externality.”
In economics, an externality refers to a phenomenon in which a person's economic activity provides unexpected benefits or harms to a third party not participating in the economic activity, but for which no compensation or price is paid.
--- From "09_“Creating a Safe AI Society Together”"

Publisher's Review
The Wisdom of Self-Defense in the Age of AI Crime

It clearly exposes the reality of AI-based crimes that are already occurring in everyday life.
Messenger phishing scams impersonating friends and voice phishing attempts impersonating family members are no longer the stuff of movies. AI learns human speech, conversation patterns, and even emotions to undermine victims' trust, allowing hackers to launch efficient and precise attacks.
From identity theft and deepfakes to automated hacking and even cryptocurrency money laundering, AI crime is evolving into an organized and corporate model.
This book goes beyond the simple technical explanation that “AI is used for crime,” and analyzes why criminals choose AI from the perspective of “criminal economics.”
Understanding the criminal's profit and loss calculations is essential for developing an effective defense strategy.
We propose customized security guidelines and social response measures tailored to each individual's digital lifestyle, and explore a new safety net that goes beyond technical responses to encompass ethical and institutional dimensions.
GOODS SPECIFICS
- Date of issue: October 10, 2025
- Page count, weight, size: 123 pages | 128*188*7mm
- ISBN13: 9791143009036

You may also like

카테고리