Author
Abstract
Advancements in science and technology has resulted in substantial transformations inside society. The telecommunications sector has established cyberspace, a virtual domain for online communication, data exchange, and digital interactions. This platform enables individuals to interact and cultivate relationships worldwide, fostering a sense of proximity despite geographical separation. Nonetheless, these improvements provide concerns, since there has been an increase in cyber victimisation via cyberspace, the internet, computer networks, and online systems. Criminals are progressively utilising these technologies to perpetrate illicit actions, endangering individuals, governments, organisations, and institutions.This study analyses the evaluation of cyber policies for regulating, monitoring, and supervising cyberspace activities, along with the implementation of cybersecurity measures to address technologically advanced crime. A mixed methods strategy, including qualitative and quantitative methodologies, was employed for data collecting. The research revealed that although cyberspace provides avenues for social contact, idea exchange, information dissemination, commercial transactions, and additional activities, it remains susceptible to cyber threats including ransomware, fraud, warfare, terrorism, trafficking, and breaches of privacy. Formulating cyber regulations to regulate actions in cyberspace is crucial for efficient law enforcement, alongside the establishment of a cybersecurity framework to safeguard critical cyber systems and bolster security protocols across several sectors. To safeguard both the public and private sectors against cybersecurity risks, it is essential to create and execute plans. These tactics encompass the regular evaluation and auditing of security systems, investment in cybersecurity training programs, maintenance of current systems, formulation and rehearsal of incident response plans, and dissemination of information among experts and professionals.
Suggested Citation
Download full text from publisher
Corrections
All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:adi:ijbess:v:6:y:2024:i:5:p:96-109. See general information about how to correct material in RePEc.
If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.
We have no bibliographic references for this item. You can help adding them by using this form .
If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.
For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Umit Hacioglu (email available below). General contact details of provider: https://edirc.repec.org/data/ibihutr.html .
Please note that corrections may take a couple of weeks to filter through
the various RePEc services.