CYBERCRIMES IN THE GLOBAL SECURITY SYSTEM IN MODERN CONDITIONS
PDF/A

Keywords

Cybercrime
Cyber-attacks
Cyber security
Information technology
National security

How to Cite

Buhaichuk, K. ., Warawa, W. ., Batrachenko, T. ., Cherniavska, B. ., & Kondel, V. . (2023). CYBERCRIMES IN THE GLOBAL SECURITY SYSTEM IN MODERN CONDITIONS. Lex Humana (ISSN 2175-0947), 15(2), 26–44. Retrieved from https://seer.ucp.br/seer/index.php/LexHumana/article/view/2474

Abstract

The development of the information and digital world determines the formation of new public requests, firstly, to ensure the security of cyberspace. The development of social tasks that can be solved using information technologies is constantly growing, therefore the number of cybercrimes is increasing, and their specifics are changing. An analysis of the development trend of cybersecurity and cybercrime showed that the number and scale of cyberattacks will continue to grow. Accordingly, the purpose of the article is to find the development directions of approaches to ensuring security in cyberspace in accordance with modern global challenges. The article determines that new global challenges have significantly changed the system of people's life conducting financial transactions, trade, receiving services (administrative, communal, social, and household, etc.), and providing communication systems. In the conditions of the pandemic, the processes of all spheres of human activity only spread. The analysis of digitalization models for ensuring cybersecurity is presented in the article but needs clarification and further development, which relates to new global challenges in the security architecture in the world and on the European continent. The article considers approaches to ensuring the effectiveness of cybersecurity in new social conditions. The article uses the methods of control charts to conduct a sociological survey to rank the factors of influence on the cause-and-effect relationships of cybersecurity. The put-forward hypothesis regarding the structuring of influencing factors allows us to systematize directions for further research. The projection of the trend line of the number of cyberattacks and the number of subjects subjected to cyberattacks in the analyzed period determines the scaling and complication of protection processes both at the company level and at the state level.

PDF/A

References

AL-Nuaimi, M.N. (2022), "Human and contextual factors influencing cyber-security in organizations, and implications for higher education institutions: a systematic review", Global Knowledge, Memory and Communication, Vol. ahead-of-print No. ahead-of-print. https://doi.org/10.1108/GKMC-12-2021-0209

Alsmadi, D., Maqousi, A. and Abuhussein, T. (2022), "Engaging in cybersecurity proactive behavior: awareness in COVID-19 age", Kybernetes, Vol. ahead-of-print No. ahead-of-print. https://doi.org/10.1108/K-08-2022-1104

Asbaş, C. and Tuzlukaya. (2022), "Cyberattack and Cyberwarfare Strategies for Businesses", Özsungur, F. (Ed.) Conflict Management in Digital Business, Emerald Publishing Limited, Bingley, pp. 303-328. https://doi.org/10.1108/978-1-80262-773-220221027

Chhabra Roy, N. and Prabhakaran, S. (2023), "Sustainable response system building against insider-led cyber frauds in banking sector: a machine learning approach", Journal of Financial Crime, Vol. 30 No. 1, pp. 48-85. https://doi.org/10.1108/JFC-12-2021-0274

Dupuis, D., Smith, D. and Gleason, K. (2023), "Old frauds with a new sauce: digital assets and space transition", Journal of Financial Crime, Vol. 30 No. 1, pp. 205-220. https://doi.org/10.1108/JFC-11-2021-0242

Kaswan, K.S., Dhatterwal, J.S., Kumar, S. and Lal, S. (2022), "Cybersecurity Law-based Insurance Market", Sood, K., Dhanaraj, R.K., Balusamy, B., Grima, S. and Uma Maheshwari, R. (Ed.) Big Data: A Game Changer for Insurance Industry (Emerald Studies in Finance, Insurance, and Risk Management), Emerald Publishing Limited, Bingley, pp. 303-321. https://doi.org/10.1108/978-1-80262-605-620221018

Li, Y., Li, J., Fan, Q. and Wang, Z. (2022), "Cybercrime's tendencies of the teenagers in the COVID-19 era: assessing the influence of mobile games, social networks and religious attitudes", Kybernetes, Vol. ahead-of-print No. ahead-of-print. https://doi.org/10.1108/K-07-2021-0582

Ma, K.W.F. and McKinnon, T. (2022), "COVID-19 and cyber fraud: emerging threats during the pandemic", Journal of Financial Crime, Vol. 29 No. 2, pp. 433-446. https://doi.org/10.1108/JFC-01-2021-0016

Panteli, N., Nurse, J.R.C., Collins, E. and Williams, N. (2022), "Trust disruption and preservation in the Covid-19 work from home context", Journal of Workplace Learning, Vol. ahead-of-print No. ahead-of-print. https://doi.org/10.1108/JWL-02-2022-0017

Tamer, G., Tetik, G. and Oktay, S. (2022), "Digital Conflict in Business Infrastructure", Özsungur, F. (Ed.) Conflict Management in Digital Business, Emerald Publishing Limited, Bingley, pp. 147-165. https://doi.org/10.1108/978-1-80262-773-220221011

Thomas, G. and Sule, M.-J. (2022), "A service lens on cybersecurity continuity and management for organizations’ subsistence and growth", Organizational Cybersecurity Journal: Practice, Process and People, Vol. ahead-of-print No. ahead-of-print. https://doi.org/10.1108/OCJ-09-2021-0025

TN, N. and Shailendra Kulkarni, M. (2022), "Zero click attacks – a new cyber threat for the e-banking sector", Journal of Financial Crime, Vol. ahead-of-print No. ahead-of-print. https://doi.org/10.1108/JFC-06-2022-0140

Tuna, A.A. and Türkmendağ, Z. (2022), "Cyber Business Management", Özsungur, F. (Ed.) Conflict Management in Digital Business, Emerald Publishing Limited, Bingley, pp. 281-301. https://doi.org/10.1108/978-1-80262-773-220221026

Wronka, C. (2022), "“Cyber-laundering”: the change of money laundering in the digital age", Journal of Money Laundering Control, Vol. 25 No. 2, pp. 330-344. https://doi.org/10.1108/JMLC-04-2021-0035

Wronka, C. (2022), "Impact of COVID-19 on financial institutions: navigating the global emerging patterns of financial crime", Journal of Financial Crime, Vol. 29 No. 2, pp. 476-490. https://doi.org/10.1108/JFC-03-2021-0073

Creative Commons License

This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.

Copyright (c) 2023 Lex Humana (ISSN 2175-0947)

Downloads

Download data is not yet available.