S., Umakanth. and Sreenivasa, Shreyas and Jain, Diya and Bothra, Piyush and Chowhan, Vridhi and Raghav, Vamshika (2025) Adapting to the Shift in Cybercrime: Emerging Threats, Challenges and Strategic Responses. International Journal of Innovative Science and Research Technology, 10 (3): 25mar1587. pp. 2422-2429. ISSN 2456-2165

[thumbnail of IJISRT25MAR1587.pdf] Text
IJISRT25MAR1587.pdf - Published Version

Download (639kB)

Abstract

While digital technology innovation is revolutionizing the world, it comes with its own share of problems, one of which being the rise in cybercrime. The focus of this paper is to analyze the sophisticated and multifaceted problem of cybercrime which encompasses a wide range of hostile actions including, but not limited to, ransomware, phishing attacks, data breaches, and identity theft. IoT, Artificial Intelligence, and new cryptocurrencies aid in the creation of new targets which cybercriminals won’t spare. Survey findings indicate that nearly 75% of respondents have some awareness of cybercrime, yet only 50% actively check their privacy settings, highlighting a gap between awareness and proactive security measures. Additionally, 85% of respondents believe that governments and businesses should enforce stronger regulations to mitigate cyber threats, underlining the need for systemic intervention. The globalization of cybercrime adds an extra layer of difficulty since criminals send attacks to multiple countries at the same time and take advantage of the lack of international cooperation and legal frameworks. Cybercriminals are continuously evolving their strategies to disguise their activities due to improved cybersecurity strategies – namely, encryption, multi-factor authentication, and AI-based threat detection – making it a constant race for defenders to keep up. There is still room for criminals to shift their activities with the rise of social engineering attacks, deepfake technology, and supply chain loopholes. Countering these new threats calls for proactive and robust cybersecurity measures.

Item Type: Article
Subjects: T Technology > T Technology (General)
Divisions: Faculty of Engineering, Science and Mathematics > School of Electronics and Computer Science
Depositing User: Editor IJISRT Publication
Date Deposited: 10 Apr 2025 10:58
Last Modified: 10 Apr 2025 10:58
URI: https://eprint.ijisrt.org/id/eprint/334

Actions (login required)

View Item
View Item