Cyber security
Information technology
National security

How to Cite

Buhaichuk, K. ., Warawa, W. ., Batrachenko, T. ., Cherniavska, B. ., & Kondel, V. . (2023). CYBERCRIMES IN THE GLOBAL SECURITY SYSTEM IN MODERN CONDITIONS. Lex Humana (ISSN 2175-0947), 15(2), 26–44. Retrieved from


The development of the information and digital world determines the formation of new public requests, firstly, to ensure the security of cyberspace. The development of social tasks that can be solved using information technologies is constantly growing, therefore the number of cybercrimes is increasing, and their specifics are changing. An analysis of the development trend of cybersecurity and cybercrime showed that the number and scale of cyberattacks will continue to grow. Accordingly, the purpose of the article is to find the development directions of approaches to ensuring security in cyberspace in accordance with modern global challenges. The article determines that new global challenges have significantly changed the system of people's life conducting financial transactions, trade, receiving services (administrative, communal, social, and household, etc.), and providing communication systems. In the conditions of the pandemic, the processes of all spheres of human activity only spread. The analysis of digitalization models for ensuring cybersecurity is presented in the article but needs clarification and further development, which relates to new global challenges in the security architecture in the world and on the European continent. The article considers approaches to ensuring the effectiveness of cybersecurity in new social conditions. The article uses the methods of control charts to conduct a sociological survey to rank the factors of influence on the cause-and-effect relationships of cybersecurity. The put-forward hypothesis regarding the structuring of influencing factors allows us to systematize directions for further research. The projection of the trend line of the number of cyberattacks and the number of subjects subjected to cyberattacks in the analyzed period determines the scaling and complication of protection processes both at the company level and at the state level.



AL-Nuaimi, M.N. (2022), "Human and contextual factors influencing cyber-security in organizations, and implications for higher education institutions: a systematic review", Global Knowledge, Memory and Communication, Vol. ahead-of-print No. ahead-of-print.

Alsmadi, D., Maqousi, A. and Abuhussein, T. (2022), "Engaging in cybersecurity proactive behavior: awareness in COVID-19 age", Kybernetes, Vol. ahead-of-print No. ahead-of-print.

Asbaş, C. and Tuzlukaya. (2022), "Cyberattack and Cyberwarfare Strategies for Businesses", Özsungur, F. (Ed.) Conflict Management in Digital Business, Emerald Publishing Limited, Bingley, pp. 303-328.

Chhabra Roy, N. and Prabhakaran, S. (2023), "Sustainable response system building against insider-led cyber frauds in banking sector: a machine learning approach", Journal of Financial Crime, Vol. 30 No. 1, pp. 48-85.

Dupuis, D., Smith, D. and Gleason, K. (2023), "Old frauds with a new sauce: digital assets and space transition", Journal of Financial Crime, Vol. 30 No. 1, pp. 205-220.

Kaswan, K.S., Dhatterwal, J.S., Kumar, S. and Lal, S. (2022), "Cybersecurity Law-based Insurance Market", Sood, K., Dhanaraj, R.K., Balusamy, B., Grima, S. and Uma Maheshwari, R. (Ed.) Big Data: A Game Changer for Insurance Industry (Emerald Studies in Finance, Insurance, and Risk Management), Emerald Publishing Limited, Bingley, pp. 303-321.

Li, Y., Li, J., Fan, Q. and Wang, Z. (2022), "Cybercrime's tendencies of the teenagers in the COVID-19 era: assessing the influence of mobile games, social networks and religious attitudes", Kybernetes, Vol. ahead-of-print No. ahead-of-print.

Ma, K.W.F. and McKinnon, T. (2022), "COVID-19 and cyber fraud: emerging threats during the pandemic", Journal of Financial Crime, Vol. 29 No. 2, pp. 433-446.

Panteli, N., Nurse, J.R.C., Collins, E. and Williams, N. (2022), "Trust disruption and preservation in the Covid-19 work from home context", Journal of Workplace Learning, Vol. ahead-of-print No. ahead-of-print.

Tamer, G., Tetik, G. and Oktay, S. (2022), "Digital Conflict in Business Infrastructure", Özsungur, F. (Ed.) Conflict Management in Digital Business, Emerald Publishing Limited, Bingley, pp. 147-165.

Thomas, G. and Sule, M.-J. (2022), "A service lens on cybersecurity continuity and management for organizations’ subsistence and growth", Organizational Cybersecurity Journal: Practice, Process and People, Vol. ahead-of-print No. ahead-of-print.

TN, N. and Shailendra Kulkarni, M. (2022), "Zero click attacks – a new cyber threat for the e-banking sector", Journal of Financial Crime, Vol. ahead-of-print No. ahead-of-print.

Tuna, A.A. and Türkmendağ, Z. (2022), "Cyber Business Management", Özsungur, F. (Ed.) Conflict Management in Digital Business, Emerald Publishing Limited, Bingley, pp. 281-301.

Wronka, C. (2022), "“Cyber-laundering”: the change of money laundering in the digital age", Journal of Money Laundering Control, Vol. 25 No. 2, pp. 330-344.

Wronka, C. (2022), "Impact of COVID-19 on financial institutions: navigating the global emerging patterns of financial crime", Journal of Financial Crime, Vol. 29 No. 2, pp. 476-490.

Creative Commons License

This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.

Copyright (c) 2023 Lex Humana (ISSN 2175-0947)


Download data is not yet available.