Experts emphasizing the importance of considering the ethical, social, and economic consequences of artificial intelligence development, state that automation and artificial intelligence can cause unemployment in certain sectors.
Prof. Dr. Burhan Pektaş, highlighting that as artificial intelligence systems become more integrated into critical infrastructure, the risk of cyber attacks and malicious use also increases, warned, “Be careful about sharing your personal information on social media and other online platforms.”
Üsküdar Üniversitesi Faculty of Engineering and Natural Sciences (MDBF) Vice Dean, Head of Computer Engineering (English) Department Prof. Dr. Burhan Pektaş evaluated the topic of artificial intelligence and cyber crimes.
The future development of artificial intelligence is uncertain…
Stating that the future development of artificial intelligence (AI) is quite uncertain, Prof. Dr. Burhan Pektaş said:
“However, there are various trends and potential scenarios that the scientific community considers when discussing the future of artificial intelligence. For example, AI is likely to become more complex and capable over time. Advances in machine learning, neural networks, and other artificial intelligence technologies can lead to systems that can perform complex tasks with higher efficiency and accuracy.”
There are concerns about privacy issues and potential misuse!
Prof. Dr. Burhan Pektaş also pointed out that as artificial intelligence technologies advance, concerns and discussions about ethical considerations, privacy issues, and potential misuse will increase, stating, “The scientific community and policymakers will need to address these challenges to ensure the responsible development and deployment of artificial intelligence systems. Artificial intelligence is expected to integrate more into various aspects of daily life, from healthcare and education to transportation and entertainment. This integration can lead to increased efficiency and convenience but also raises questions about societal impacts and job displacements.”
Can artificial intelligence cause unemployment?
Explaining that while artificial intelligence has the potential to offer many benefits, it also brings concerns and potential risks, Prof. Dr. Burhan Pektaş stated:
“It is important to consider the ethical, social, and economic consequences of artificial intelligence development. Automation and artificial intelligence can lead to job displacement in certain sectors, potentially causing economic disruptions and unemployment. This is a significant concern, and efforts to reskill the workforce and create new job opportunities will be vital.
Artificial intelligence systems can inherit biases present in the data used to train them, which can lead to unfair or discriminatory outcomes. If not properly addressed, this bias can reinforce existing societal inequalities and lead to unfair treatment in areas such as hiring, lending, and criminal justice.
As artificial intelligence systems become more integrated into critical infrastructure, the risk of cyber attacks and malicious use also increases. Hackers can exploit vulnerabilities in artificial intelligence systems to manipulate data, disrupt services, and even cause physical harm when it comes to autonomous vehicles or industrial systems.”
Artificial intelligence can be a powerful tool to enhance cybersecurity defenses
Stating that artificial intelligence (AI) technologies have a dual impact on cybersecurity, Prof. Dr. Burhan Pektaş said, “On one hand, artificial intelligence can be a powerful tool to enhance cybersecurity defenses, automate threat detection, and improve incident response. On the other hand, cybercriminals can potentially leverage artificial intelligence to develop more sophisticated and targeted attacks.”
Prof. Dr. Burhan Pektaş listed some of the ways artificial intelligence can affect cybersecurity and cybercrimes as follows:
“Targeted attacks: Cybercriminals can potentially use artificial intelligence to carry out more complex and targeted attacks, such as highly personalized and convincing phishing campaigns.
Automated exploits: Artificial intelligence can automate the process of identifying and exploiting vulnerabilities, making it easier for attackers to scale their operations.”
Techniques can be used to manipulate artificial intelligence-based detection systems
Explaining that attackers can use techniques to manipulate artificial intelligence-based detection systems by introducing adversarial inputs that can evade detection mechanisms, Prof. Dr. Burhan Pektaş said, “Cybercriminals can use artificial intelligence to analyze and adapt to the defense mechanisms used by security systems, making it harder to anticipate and counter their tactics.”
Creating fake content…
Prof. Dr. Burhan Pektaş noted that AI-generated deepfake content can be used for social engineering attacks by creating realistic-looking but fake audio or video messages to deceive individuals or organizations, stating, “The evolution of artificial intelligence has added new dimensions to cyber threats, enabling attackers to potentially use AI for malicious purposes.”
Phishing emails can be created for cyber attacks
Prof. Dr. Burhan Pektaş also stated that there are various ways attackers can misuse artificial intelligence to enhance their cyber attacks, saying, “Attackers can use artificial intelligence to analyze large datasets and social media profiles to create highly targeted and convincing phishing emails. This makes it difficult for individuals to distinguish between legitimate and malicious messages.”
Convincing audio and video recordings can be created by impersonating the target
Prof. Dr. Burhan Pektaş also noted that artificial intelligence can be used to create polymorphic malware that can dynamically change its code and appearance to evade traditional signature-based antivirus solutions, adding, “Artificial intelligence algorithms can automate the creation of malware variants, making it difficult for security systems to keep up with the volume and variety of threats. Attackers can use artificial intelligence-generated deepfake technology to create convincing audio and video recordings by impersonating legitimate individuals. This can be used for social engineering attacks or to spread misinformation.”
AI-powered chatbots can be used to manipulate public opinion
Prof. Dr. Burhan Pektaş also explained that AI-powered chatbots or social bots can be used to mimic human behavior in online interactions, spread disinformation, carry out social engineering attacks, or manipulate public opinion, adding, “Attackers may attempt to manipulate the training data of artificial intelligence models used for security purposes.”
Security of personal data
Stating that artificial intelligence has a significant impact on personal data security, and ethical and privacy concerns also arise, Prof. Dr. Burhan Pektaş said, “Artificial intelligence systems often rely on extensive datasets for training. When these datasets contain sensitive personal information, ethical concerns arise, and questions about the scope and necessity of data collection emerge. Ethical practices include obtaining informed consent from individuals before collecting and processing their personal data. Transparency in explaining how data will be used is crucial.”
What can individuals and organizations do to protect against cybercrimes?
Noting that protection against cybercrimes involves a combination of proactive measures, security practices, and continuous vigilance, Prof. Dr. Burhan Pektaş listed his recommendations for both individuals and organizations to enhance cybersecurity as follows:
Use strong and unique passwords: Create complex passwords and avoid using the same password across multiple accounts. Consider using a password manager to generate and store strong, unique passwords.
Enable multi-factor authentication (MFA): Implement MFA wherever possible to add an extra layer of security beyond passwords.
Keep software updated: Regularly update operating systems, software, and applications to patch vulnerabilities and improve security.
Be cautious with emails: Avoid clicking on suspicious links or downloading attachments from unknown sources. Verify the legitimacy of emails, especially those requesting sensitive information.
Use secure Wi-Fi networks: Secure home Wi-Fi networks with strong passwords and encryption. Avoid using public Wi-Fi for sensitive transactions unless you are using a VPN.
Install and update security software: Install and keep reputable antivirus and anti-malware software up to date.
Back up important data: Regularly back up critical data to an external device or a secure cloud service.
Stay informed: Stay updated on current cyber threats and best security practices through reputable sources.
Limit personal information sharing: Be careful about sharing your personal information on social media and other online platforms.

