Analyses of Cybercrime Regulations Falling behind New Technologies
DOI:
https://doi.org/10.54183/jssr.v3i1.181Keywords:
Information and Communication Technology (ICT), Cyber Security, Cybercrime, Cyber Assets, Cyberspace, Cyberbullying, New Technologies, Social NetworkAbstract
Information and communication technology (ICT) and digital systems have developed to the point that they are indispensable to all industries, including Europe. The extensive use of preventative measures reflects the growing concern regarding cyber security. Concerns regarding cyber security in light of new technology are the primary focus of this review paper, which also discusses the problem of out-of-date cybercrime regulations. New technological advancements in cyber security, together with ethical considerations and external factors, are highlighted. To prevent sensitive data from falling into the wrong hands and jeopardising the security of the financial industry, the industry must continually analyse and improve its systems. In this review article, we examine more than twenty unique scholarly evaluations. The abstract and introduction comprise the first section of this review. In this review article, we discussed a variety of scholarly opinions on the topic as reviews. Typically, the final paragraph of an article includes a concise summary of the main arguments and supporting evidence presented in the body of the article. Moreover, security threats and challenges, as well as the most recent developments and emerging trends in cyber security, are discussed.
People today are more inclined to conduct business on the internet than they were a decade ago. Likewise, it is more difficult than ever to retain what we have learnt. Additionally, a spike in cybercrime has been connected to the exponential expansion of social media platforms. Data security is of the utmost importance in the area of information technology. Information security is one of the most significant issues of the contemporary era. The term "cybersecurity" is always the first thing that comes to mind when discussing "cybercrimes," which are increasing at an alarming rate every day (Brands & Van Doorn, 2022). In order to combat this type of cybercrime, governments and corporations have created a variety of protective measures. The extensive use of preventative measures reflects the growing concern regarding cyber security. Concerns regarding cyber security in light of new technology are the primary focus of this review paper, which also discusses the problem of out-of-date cybercrime regulations.
New technological advancements in cyber security, together with ethical considerations and external factors, are highlighted. It is well-known that the dynamic nature of the financial ecosystem will impact some aspect of the institution's infrastructure, as well as the financial sector's susceptibility to cybercrimes, particularly denial-of-service attacks (Brands & Van Doorn, 2022). To prevent sensitive data from falling into the wrong hands and jeopardising the security of the financial industry, the industry must continually analyse and improve its systems. The financial sector has been far ahead of other businesses in terms of investment and innovation in cyber security, with the banking industry at the forefront of safety system deployment and best practises. In this review article, we examine more than twenty unique scholarly evaluations. The abstract and introduction comprise the first section of this review. These introductions and abstracts elaborate on the most recent facts. Earlier, we discussed a variety of scholarly opinions on the topic as reviews. Typically, the final paragraph of an article includes a concise summary of the main arguments and supporting evidence presented in the body of the article. Moreover, security threats and challenges, as well as the most recent developments and emerging trends in cyber security, are discussed. The supplied comprehensive review study is anticipated to be beneficial for IT and cyber security specialists.
References
Brands, J., & Van Doorn, J. (2022). The measurement, intensity and determinants of fear of cybercrime: A systematic review. Computers in Human Behavior, 127, 107082. https://doi.org/10.1016/j.chb.2021.107082
Chert. (2015). Revitalizing the Rule of Law: Examining the Success of the Arab Spring - ProQuest. Www.proquest.com. https://search.proquest.com/openview/e00b725291c1b8e8002c120f93048528/1?pq-origsite=gscholar&cbl=32013
Cook, S., Giommoni, L., Pareja, N. T., Levi, M., & Williams, M. L. (2022). OUP accepted manuscript. British Journal of Criminology, 63(2), 384–406. https://doi.org/10.1093/bjc/azac021
Curtis, J., & Oxburgh, G. (2022). Understanding cybercrime in “real world” policing and law enforcement. The Police Journal: Theory, Practice and Principles, 0032258X2211075. https://doi.org/10.1177/0032258x221107584
Fosch-Villaronga, E., & Mahler, T. (2021). Cybersecurity, safety and robots: Strengthening the link between cybersecurity and safety in the context of care robots. Computer Law & Security Review, 41, 105528. https://doi.org/10.1016/j.clsr.2021.105528
Herath, T. B. G., Khanna, P., & Ahmed, M. (2022). Cybersecurity Practices for Social Media Users: A Systematic Literature Review. Journal of Cybersecurity and Privacy, 2(1), 1–18. https://doi.org/10.3390/jcp2010001
Jang. (2020). Julian Jang-Jaccard. Scholar.google.com.au. https://scholar.google.com/citations?hl=en&user=AsTWD0UAAAAJ
Johnson, S. D., Blythe, J. M., Manning, M., & Wong, G. T. W. (2020). The impact of IoT security labelling on consumer product choice and willingness to pay. PLOS ONE, 15(1), e0227800. https://doi.org/10.1371/journal.pone.0227800
Kundi, G., Nawaz, A., & Akhtar, R. (2020). Digital Revolution, Cyber-Crimes And Cyber Legislation: A Challenge To Governments In Developing Countries. 4(4). https://core.ac.uk/download/pdf/234677092.pdf
Li, Y., & Liu, Q. (2021). A comprehensive review study of cyber-attacks and cyber security; Emerging trends and recent developments. Energy Reports, 7(7), 8176–8186. ScienceDirect. https://doi.org/10.1016/j.egyr.2021.08.126
Narasimhan, P. (2023, January). Most Extensive Cyber Security Challenges & Solutions in 2023. Www.knowledgehut.com. https://www.knowledgehut.com/blog/security/cyber-security-challenges
Parker, S. T. (2022). Measuring gun violence in police data sources: transitioning to NIBRS. Injury Epidemiology, 9(1). https://doi.org/10.1186/s40621-022-00376-8
Phillips, K., Davidson, J. C., Farr, R. R., Burkhardt, C., Caneppele, S., & Aiken, M. (2022). Conceptualizing Cybercrime: Definitions, Typologies and Taxonomies. Forensic Sciences, 2(2), 379–398. https://doi.org/10.3390/forensicsci2020028
Rand. (2021). Technology and the future of cybercrime. Www.rand.org. https://www.rand.org/randeurope/research/projects/technological-developments-and-the-future-of-cybercrime.html
Rani, S., Kataria, A., Sharma, V., Ghosh, S., Karar, V., Lee, K., & Choi, C. (2021, April 28). Threats and Corrective Measures for IoT Security with Observance of Cybercrime: A Survey. Wireless Communications and Mobile Computing. https://www.hindawi.com/journals/wcmc/2021/5579148/
Reddy, K. C., Divya. B, & M, V. (2022). Cyber Crime against Women in India. European Journal of Humanities and Educational Advancements, 64–69. https://www.scholarzest.com/index.php/ejhea/article/view/2492
Saada, A., Abdel-Kader, H., & Ali, A. (2021). Enhanced Security System of Internet of Things data streaming. IJCI. International Journal of Computers and Information, 8(2), 144–150. https://doi.org/10.21608/ijci.2021.207860
Velasco, C. (2022). Cybercrime and Artificial Intelligence. An overview of the work of international organizations on criminal justice and the applicable international instruments. ERA Forum. https://doi.org/10.1007/s12027-022-00702-z
Vuggumudi, S., Wang, Y., Ragothaman, K., Noteboom, C., & Liu, J. (2022). Improving the Effectiveness of Security Controls to Prevent APT Attacks. Faculty Research & Publications. https://scholar.dsu.edu/bispapers/305/
Additional Files
Published
Issue
Section
License
Copyright (c) 2023 Copyright in the Journal of Social Sciences Review is retained by the author(s). Authors also grant any third party the right to use the article freely as long as its integrity is maintained and its original authors, citation details and publisher are identified.

This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.
SSR's Editorial Board shares the vision of providing free access to information, education, and science for everyone, thus promoting its content through an OPEN ACCESS POLICY, fulfilling the DOAJ definition of open access. The JSSR adheres to an Open Access and Copyright Licensing Policy based on the belief that making research freely accessible to the public promotes greater global knowledge sharing.
The JSSR uses the Creative Commons Attribution-NonCommercial 4.0 International License. The authors who apply and publish in JSSR consent to abide by the copyright policy set out in the Creative Commons 4.0 license (Attribution-NonCommercial 4.0 International license).
- Copyright in the Journal of Social Sciences Review is retained by the author(s).
- Authors also grant any third party the right to use the article freely as long as its integrity is maintained and its original authors, citation details and publisher are identified.
While "By 'open access' to this literature, we mean its free availability on the public internet, permitting any users to read, download, copy, distribute, print, search, or link to the full texts of these articles, crawl them for indexing, pass them as data to software, or use them for any other lawful purpose, without financial, legal, or technical barriers other than those inseparable from gaining access to the internet itself."
