Analyses of Cybercrime Regulations Falling behind New Technologies

Authors

  • Hafiz Shahzad Pervaiz
  • Shaukat Hussain Bhatti

DOI:

https://doi.org/10.54183/jssr.v3i1.181

Keywords:

Information and Communication Technology (ICT), Cyber Security, Cybercrime, Cyber Assets, Cyberspace, Cyberbullying, New Technologies, Social Network

Abstract

Information and communication technology (ICT) and digital systems have developed to the point that they are indispensable to all industries, including Europe. The extensive use of preventative measures reflects the growing concern regarding cyber security. Concerns regarding cyber security in light of new technology are the primary focus of this review paper, which also discusses the problem of out-of-date cybercrime regulations.  New technological advancements in cyber security, together with ethical considerations and external factors, are highlighted. To prevent sensitive data from falling into the wrong hands and jeopardising the security of the financial industry, the industry must continually analyse and improve its systems. In this review article, we examine more than twenty unique scholarly evaluations. The abstract and introduction comprise the first section of this review. In this review article, we discussed a variety of scholarly opinions on the topic as reviews. Typically, the final paragraph of an article includes a concise summary of the main arguments and supporting evidence presented in the body of the article. Moreover, security threats and challenges, as well as the most recent developments and emerging trends in cyber security, are discussed.

    People today are more inclined to conduct business on the internet than they were a decade ago. Likewise, it is more difficult than ever to retain what we have learnt. Additionally, a spike in cybercrime has been connected to the exponential expansion of social media platforms. Data security is of the utmost importance in the area of information technology. Information security is one of the most significant issues of the contemporary era. The term "cybersecurity" is always the first thing that comes to mind when discussing "cybercrimes," which are increasing at an alarming rate every day (Brands & Van Doorn, 2022). In order to combat this type of cybercrime, governments and corporations have created a variety of protective measures. The extensive use of preventative measures reflects the growing concern regarding cyber security. Concerns regarding cyber security in light of new technology are the primary focus of this review paper, which also discusses the problem of out-of-date cybercrime regulations.

 New technological advancements in cyber security, together with ethical considerations and external factors, are highlighted. It is well-known that the dynamic nature of the financial ecosystem will impact some aspect of the institution's infrastructure, as well as the financial sector's susceptibility to cybercrimes, particularly denial-of-service attacks (Brands & Van Doorn, 2022). To prevent sensitive data from falling into the wrong hands and jeopardising the security of the financial industry, the industry must continually analyse and improve its systems. The financial sector has been far ahead of other businesses in terms of investment and innovation in cyber security, with the banking industry at the forefront of safety system deployment and best practises. In this review article, we examine more than twenty unique scholarly evaluations. The abstract and introduction comprise the first section of this review. These introductions and abstracts elaborate on the most recent facts. Earlier, we discussed a variety of scholarly opinions on the topic as reviews. Typically, the final paragraph of an article includes a concise summary of the main arguments and supporting evidence presented in the body of the article. Moreover, security threats and challenges, as well as the most recent developments and emerging trends in cyber security, are discussed. The supplied comprehensive review study is anticipated to be beneficial for IT and cyber security specialists.

 

Author Biography

  • Hafiz Shahzad Pervaiz

     

     

References

Brands, J., & Van Doorn, J. (2022). The measurement, intensity and determinants of fear of cybercrime: A systematic review. Computers in Human Behavior, 127, 107082. https://doi.org/10.1016/j.chb.2021.107082

Chert. (2015). Revitalizing the Rule of Law: Examining the Success of the Arab Spring - ProQuest. Www.proquest.com. https://search.proquest.com/openview/e00b725291c1b8e8002c120f93048528/1?pq-origsite=gscholar&cbl=32013

Cook, S., Giommoni, L., Pareja, N. T., Levi, M., & Williams, M. L. (2022). OUP accepted manuscript. British Journal of Criminology, 63(2), 384–406. https://doi.org/10.1093/bjc/azac021

Curtis, J., & Oxburgh, G. (2022). Understanding cybercrime in “real world” policing and law enforcement. The Police Journal: Theory, Practice and Principles, 0032258X2211075. https://doi.org/10.1177/0032258x221107584

Fosch-Villaronga, E., & Mahler, T. (2021). Cybersecurity, safety and robots: Strengthening the link between cybersecurity and safety in the context of care robots. Computer Law & Security Review, 41, 105528. https://doi.org/10.1016/j.clsr.2021.105528

Herath, T. B. G., Khanna, P., & Ahmed, M. (2022). Cybersecurity Practices for Social Media Users: A Systematic Literature Review. Journal of Cybersecurity and Privacy, 2(1), 1–18. https://doi.org/10.3390/jcp2010001

Jang. (2020). Julian Jang-Jaccard. Scholar.google.com.au. https://scholar.google.com/citations?hl=en&user=AsTWD0UAAAAJ

Johnson, S. D., Blythe, J. M., Manning, M., & Wong, G. T. W. (2020). The impact of IoT security labelling on consumer product choice and willingness to pay. PLOS ONE, 15(1), e0227800. https://doi.org/10.1371/journal.pone.0227800

Kundi, G., Nawaz, A., & Akhtar, R. (2020). Digital Revolution, Cyber-Crimes And Cyber Legislation: A Challenge To Governments In Developing Countries. 4(4). https://core.ac.uk/download/pdf/234677092.pdf

Li, Y., & Liu, Q. (2021). A comprehensive review study of cyber-attacks and cyber security; Emerging trends and recent developments. Energy Reports, 7(7), 8176–8186. ScienceDirect. https://doi.org/10.1016/j.egyr.2021.08.126

Narasimhan, P. (2023, January). Most Extensive Cyber Security Challenges & Solutions in 2023. Www.knowledgehut.com. https://www.knowledgehut.com/blog/security/cyber-security-challenges

Parker, S. T. (2022). Measuring gun violence in police data sources: transitioning to NIBRS. Injury Epidemiology, 9(1). https://doi.org/10.1186/s40621-022-00376-8

Phillips, K., Davidson, J. C., Farr, R. R., Burkhardt, C., Caneppele, S., & Aiken, M. (2022). Conceptualizing Cybercrime: Definitions, Typologies and Taxonomies. Forensic Sciences, 2(2), 379–398. https://doi.org/10.3390/forensicsci2020028

Rand. (2021). Technology and the future of cybercrime. Www.rand.org. https://www.rand.org/randeurope/research/projects/technological-developments-and-the-future-of-cybercrime.html

Rani, S., Kataria, A., Sharma, V., Ghosh, S., Karar, V., Lee, K., & Choi, C. (2021, April 28). Threats and Corrective Measures for IoT Security with Observance of Cybercrime: A Survey. Wireless Communications and Mobile Computing. https://www.hindawi.com/journals/wcmc/2021/5579148/

Reddy, K. C., Divya. B, & M, V. (2022). Cyber Crime against Women in India. European Journal of Humanities and Educational Advancements, 64–69. https://www.scholarzest.com/index.php/ejhea/article/view/2492

Saada, A., Abdel-Kader, H., & Ali, A. (2021). Enhanced Security System of Internet of Things data streaming. IJCI. International Journal of Computers and Information, 8(2), 144–150. https://doi.org/10.21608/ijci.2021.207860

Velasco, C. (2022). Cybercrime and Artificial Intelligence. An overview of the work of international organizations on criminal justice and the applicable international instruments. ERA Forum. https://doi.org/10.1007/s12027-022-00702-z

Vuggumudi, S., Wang, Y., Ragothaman, K., Noteboom, C., & Liu, J. (2022). Improving the Effectiveness of Security Controls to Prevent APT Attacks. Faculty Research & Publications. https://scholar.dsu.edu/bispapers/305/

Additional Files

Published

2023-03-30

How to Cite

Analyses of Cybercrime Regulations Falling behind New Technologies. (2023). Journal of Social Sciences Review, 3(1), 460-469. https://doi.org/10.54183/jssr.v3i1.181