Authors :
Dr. Umakanth. S.; Shreyas Sreenivasa; Diya Jain; Piyush Bothra; Vridhi Chowhan; Vamshika Raghav
Volume/Issue :
Volume 10 - 2025, Issue 3 - March
Google Scholar :
https://tinyurl.com/5n6zd2zn
Scribd :
https://tinyurl.com/29ecepk8
DOI :
https://doi.org/10.38124/ijisrt/25mar1587
Google Scholar
Note : A published paper may take 4-5 working days from the publication date to appear in PlumX Metrics, Semantic Scholar, and ResearchGate.
Note : Google Scholar may take 15 to 20 days to display the article.
Abstract :
While digital technology innovation is revolutionizing the world, it comes with its own share of problems, one of
which being the rise in cybercrime. The focus of this paper is to analyze the sophisticated and multifaceted problem of
cybercrime which encompasses a wide range of hostile actions including, but not limited to, ransomware, phishing attacks,
data breaches, and identity theft. IoT, Artificial Intelligence, and new cryptocurrencies aid in the creation of new targets
which cybercriminals won’t spare. Survey findings indicate that nearly 75% of respondents have some awareness of
cybercrime, yet only 50% actively check their privacy settings, highlighting a gap between awareness and proactive security
measures. Additionally, 85% of respondents believe that governments and businesses should enforce stronger regulations to
mitigate cyber threats, underlining the need for systemic intervention. The globalization of cybercrime adds an extra layer
of difficulty since criminals send attacks to multiple countries at the same time and take advantage of the lack of international
cooperation and legal frameworks. Cybercriminals are continuously evolving their strategies to disguise their activities
due to improved cybersecurity strategies – namely, encryption, multi-factor authentication, and AI-based threat
detection – making it a constant race for defenders to keep up. There is still room for criminals to shift their activities with
the rise of social engineering attacks, deepfake technology, and supply chain loopholes. Countering these new threats calls
for proactive and robust cybersecurity measures.
Keywords :
Cybercrime, Cybersecurity, Ransomware, Phishing, Data Breaches.
References :
- Yeboah-Ofori, A., & Opoku-Boateng, F. A. (2023). Mitigating cybercrimes in an evolving organizational landscape. Continuity & Resilience Review, 5(1), 53-78.
- Shah, A. (2024). Cybercrime Chronicles: Exploring the Evolving Landscape of Challenges in the Digital Era.
- Mallick, M. A. I., & Nath, R. (2024). Navigating the cyber security landscape: A comprehensive review of cyber-attacks, emerging trends, and recent developments. World Scientific News, 190(1), 1-69.
- Cassidy, A. A. T. J., Fuad, A., & Shofy, M. U. A. A. (2024). Emerging Trends and Challenges in Digital Crime: A Study of Cyber Criminal Tactics and Countermeasures. TechComp Innovations: Journal of Computer Science and Technology, 1(1), 38-45.
- Choo, K. K. R. (2011). The cyber threat landscape: Challenges and future research directions. Computers & security, 30(8), 719-731.
- Batrachenko, T., Lehan, I., Kuchmenko, V., Kovalchuk, V., & Mazurenko, O. (2024). Cybercrime in the context of the digital age: analysis of threats, legal challenges and strategies. Multidisciplinary Science Journal, 6.
- Ganguli, P. (2024). The Rise of Cybercrime-as-a-Service: Implications and Countermeasures. Available at SSRN 4959188.
- Jony, A. I., & Hamim, S. A. (2023). Navigating the Cyber Threat Landscape: A Comprehensive Analysis of Attacks and Security in the Digital Age. Journal of Information Technology and Cyber Security, 1(2), 53-67.
- Babate, A., Musa, M., Kida, A., & Saidu, M. (2015). State of cyber security: emerging threats landscape. International Journal of Advanced Research in Computer Science & Technology, 3(1), 113-119.
- Acharjee, A., Mondal, S., Pipalwa, R., Mitra, A., & Paul, A. (2023). Exploring the evolving landscape of security threats in IoT: Challenges and Countermeasures. American Journal of Advanced Computing, 2(2).
- Hussein, P. Q., & Cybersecurity, I. Information Crimes and Investigation Challenge Combating Information Crimes: A Multidimensional Approach to Addressing Investigation Challenges in the Era of Digital Advancement.
- Benson, V., McAlaney, J., & Frumkin, L. A. (2019). Emerging threats for the human element and countermeasures in current cyber security landscape. In Cyber law, privacy, and security: Concepts, methodologies, tools, and applications (pp. 1264-1269). IGI Global.
- Ogu, E. C., Ojesanmi, O. A., Awodele, O., & Kuyoro, S. (2019). A botnets circumspection: The current threat landscape, and what we know so far. Information, 10(11), 337.
- Kheruddin, M. S., Zuber, M. A. E. M., & Radzai, M. M. M. (2024). Phishing attacks: Unraveling tactics, threats, and defenses in the cybersecurity landscape. Authorea Preprints.
- Clarke, N. (2011). The Evolving Technological Landscape. In Transparent User Authentication: Biometrics, RFID and Behavioural Profiling (pp. 25-43). London: Springer London.
While digital technology innovation is revolutionizing the world, it comes with its own share of problems, one of
which being the rise in cybercrime. The focus of this paper is to analyze the sophisticated and multifaceted problem of
cybercrime which encompasses a wide range of hostile actions including, but not limited to, ransomware, phishing attacks,
data breaches, and identity theft. IoT, Artificial Intelligence, and new cryptocurrencies aid in the creation of new targets
which cybercriminals won’t spare. Survey findings indicate that nearly 75% of respondents have some awareness of
cybercrime, yet only 50% actively check their privacy settings, highlighting a gap between awareness and proactive security
measures. Additionally, 85% of respondents believe that governments and businesses should enforce stronger regulations to
mitigate cyber threats, underlining the need for systemic intervention. The globalization of cybercrime adds an extra layer
of difficulty since criminals send attacks to multiple countries at the same time and take advantage of the lack of international
cooperation and legal frameworks. Cybercriminals are continuously evolving their strategies to disguise their activities
due to improved cybersecurity strategies – namely, encryption, multi-factor authentication, and AI-based threat
detection – making it a constant race for defenders to keep up. There is still room for criminals to shift their activities with
the rise of social engineering attacks, deepfake technology, and supply chain loopholes. Countering these new threats calls
for proactive and robust cybersecurity measures.
Keywords :
Cybercrime, Cybersecurity, Ransomware, Phishing, Data Breaches.