Determinantes dos Crimes Cibernéticos: Evidências de um Estudo Cross-Country
Palavras-chave:
Palavras-chave: Ataques cibernéticos; Crimes cibernéticos; Segurança cibernética; Segurança jurídica; Países.Resumo
This study investigates the determining factors that heighten countries' vulnerability to cyberattacks. Cybercrimes consist of illicit actions by individuals known as hackers or groups of people who aim to breach computer systems, networks, and digital devices with the objective of causing damage, stealing private information, or obtaining some type of advantage. Accordingly, this study aims to investigate the determining factors that intensify countries' vulnerability to cyberattacks. Data from 50 countries, listed in the ranking by Bruce et al. (2024), were analyzed using linear regression to investigate the relationship between cybercrimes and variables related to the dimensions of governance quality, politics, and economic indicators. The results indicate that the quality of regulation plays a significant role in reducing vulnerability; that is, countries with greater legal certainty tend to exhibit lower rates of cybercrime. Furthermore, the study found a correlation between countries' economic development and the incidence of cybercrime. However, no significant relationships were found between corruption, political instability, and the occurrence of cyberattacks. This study indicates that improvements in cybersecurity require not only technological measures but also the strengthening of regulatory frameworks and broader approaches that address underlying socioeconomic issues that also influence cybercrime.
Referências
Agrawal, M., Singh, H., Gour, N., & Kumar, M. A. (2014). Evaluation on malware analysis. International Journal of Computer Science and Information Technologies, 5(3), 3381-3383.
Arcuri, M. C., Brogi, M., & Gandolfi, G. (2017, January). How Does Cyber Crime Affect Firms? The Effect of Information Security Breaches on Stock Returns. In ITASEC (pp. 175-193).
Aslan, Ö., Aktuğ, S. S., Ozkan-Okay, M., Yilmaz, A. A., & Akin, E. (2023). A comprehensive review of cyber security vulnerabilities, threats, attacks, and solutions. Electronics, 12(6), 1333.
Aviv, I., & Ferri, U. (2023). Russian-Ukraine armed conflict: Lessons learned on the digital ecosystem. International Journal of Critical Infrastructure Protection, 43, 100637
Bouveret, A. (2018). Cyber risk for the financial sector: A framework for quantitative assessment. International Monetary Fund.
Bruggemann, R., Koppatz, P., Scholl, M., & Schuktomow, R. (2022). Global cybersecurity index (GCI) and the role of its 5 pillars. Social Indicators Research, 1-19.
Bruce, M., Lusthaus, J., Kashyap, R., Phair, N., & Varese, F. (2024). Mapping the global geography of cybercrime with the World Cybercrime Index. Plos one, 19(4), e0297312.
Chen, S., Hao, M., Ding, F., Jiang, D., Dong, J., Zhang, S., ... & Gao, C. (2023). Exploring the global geography of cybercrime and its driving forces. Humanities and Social Sciences Communications, 10(1), 1-10.
Darem, A. A., Alhashmi, A. A., Alkhaldi, T. M., Alashjaee, A. M., Alanazi, S. M., & Ebad, S. A. (2023). Cyber threats classifications and countermeasures in banking and financial sector. IEEE Access, 11, 125138-125158.
Erkan-Barlow, A., & Wells-Dietel, B. P. (2023). The Current State of Cyber Insurance and Regulation in the Context of Investment Efficiency and Moral Hazard: A Literature Review. Journal of Insurance Regulation. https://content. naic. org/sites/default/files/cipr-jir-2023-4. pdf.
Familoni, B. T., & Shoetan, P. O. (2024). Cybersecurity in the financial sector: a comparative analysis of the USA and Nigeria. Computer Science & IT Research Journal, 5(4), 850-877.
Guo, M. (2018). China's cybersecurity legislation, it's relevance to critical infrastructures and the challenges it faces. International Journal of Critical Infrastructure Protection, 22, 139-149.
Hall, T., & Ziemer, U. (2024). Online deviance in post-Soviet space: Victimisation, perceptions and social attitudes amongst young people, an Armenian case study. Digital Geography and Society, 7, 100096.
Hathaway, O. A., Crootof, R., Levitz, P., & Nix, H. (2012). The law of cyber-attack. Calif. L. Rev., 100, 817.
Harkin, D., Whelan, C., & Chang, L. (2018). The challenges facing specialist police cyber-crime units: An empirical analysis. Police Practice and Research, 19(6), 519-536.
Hellvig, R. C. (2023). Cybersecurity And Macroeconomic Vulnerabilities. Internal Auditing & Risk Management, (Supplement), 20-27.
Holt, T. J., Burruss, G. W., & Bossler, A. M. (2018). Assessing the macro-level correlates of malware infections using a routine activities framework. International journal of offender therapy and comparative criminology, 62(6), 1720-1741.
Holovkin, B., Cherniavskyi, S., & Tavolzhanskyi, O. (2023). Factors of cybercrime in Ukraine. Relações Internacionais no Mundo Atual, 3(41), 464-488.
Huang, K., Siegel, M., & Madnick, S. (2018). Systematically understanding the cyber attack business: A survey. ACM Computing Surveys (CSUR), 51(4), 1-36.
Imam, A. (2024). Nigeria's Foreign Relations and Soft Power Diplomacy Amidst Cybercrime. Available at SSRN 4896432.
Jackson, A. (2024). How the Collapse of the Soviet Union Made Russia a Great CyberPower. The Cyber Defense Review, 9(1), 99-112.
Kaminska, M. (2021). Restraint under conditions of uncertainty: Why the United States tolerates cyberattacks. Journal of Cybersecurity, 7(1), tyab008.
Kanaker, H., Karim, N. A., Awwad, S. A., Ismail, N. H., & Zraqou, J. (2022). Trojan Horse Infection Detection in Cloud Based Environment Using Machine Learning. International Journal of Interactive Mobile Technologies, 16(24).
Khadam, N., Anjum, N., Alam, A., Mirza, Q. A., Assam, M., Ismail, E. A., & Abonazel, M. R. (2023). How to punish cyber criminals: A study to investigate the target and consequence based punishments for malware attacks in UK, USA, China, Ethiopia & Pakistan. Heliyon, 9(12).
Li, Y., & Liu, Q. (2021). A comprehensive review study of cyber-attacks and cyber security; Emerging trends and recent developments. Energy Reports, 7, 8176-8186.
Lee, S. H., Kang, I., & Kim, H. W. (2023). Understanding cybercrime from a criminal's perspective: Why and how suspects commit cybercrimes?. Technology in Society, 75, 102361.
Lu, H., Liang, B., & Taylor, M. (2010). A comparative analysis of cybercrimes and governmental law enforcement in China and the United States. Asian journal of criminology, 5, 123-135.
Makridis, C. A., & Smeets, M. (2019). Determinants of cyber readiness. Journal of Cyber Policy, 4(1), 72-89.
Miao, Y., Chen, C., Pan, L., Han, Q. L., Zhang, J., & Xiang, Y. (2021). Machine learning–based cyber attacks targeting on controlled information: A survey. ACM Computing Surveys (CSUR), 54(7), 1-36.
Nte , N. D., Enoke, B. K., & Teru, V. A. (2022). A comparative analysis of cyber security laws and policies in Nigeria and South Africa. Law Research Review Quarterly, 8(2), 233-258.
Rasyid, M. F. F., SJ, M. A., Mamu, K. Z., Paminto, S. R., Hidaya, W. A., & Hamadi, A. (2024). Cybercrime Threats and Responsibilities: The utilization of artificial intelligence in online crime. Jurnal Ilmiah Mizani: Wacana Hukum, Ekonomi Dan Keagamaan, 11(1, April), 49-63.
Riggs, H., Tufail, S., Parvez, I., Tariq, M., Khan, M. A., Amir, A., ... & Sarwat, A. I. (2023). Impact, vulnerabilities, and mitigation strategies for cyber-secure critical infrastructure. Sensors, 23(8), 4060.
Sharif, M. H. U., & Mohammed, M. A. (2022). A literature review of financial losses statistics for cyber security and future trend. World Journal of Advanced Research and Reviews, 15(1), 138-156.
Smith, K. T., Jones, A., Johnson, L., & Smith, L. M. (2019). Examination of cybercrime and its effects on corporate stock value. Journal of Information, Communication and Ethics in Society, 17(1), 42-60
Srivastava, S. K., Das, S., Udo, G. J., & Bagchi, K. (2020). Determinants of cybercrime originating within a nation: a cross-country study. Journal of Global Information Technology Management, 23(2), 112-137.
Sufi, F. (2023). Novel Application of Open-Source Cyber Intelligence. Electronics, 12(17), 3610.
Ufnal, M., & Longuevergne, T. (2024). Detection and Prevention of Malware Smuggling in Scalable Vector Graphics (SVG).
Ukwuoma, H. C., Williams, I. S., & Choji, I. D. (2022). Digital economy and cybersecurity in Nigeria: policy implications for development. International Journal of Innovation in the Digital Economy (IJIDE), 13(1), 1-11.
Von Solms, R., & Van Niekerk, J. (2013). From information security to cyber security. computers & security, 38, 97-102.
Zwilling, M., Klien, G., Lesjak, D., Wiechetek, Ł., Cetin, F., & Basim, H. N. (2022). Cyber security awareness, knowledge and behavior: A comparative study. Journal of Computer Information Systems, 62(1), 82-97.
Downloads
Publicado
Como Citar
Edição
Seção
Licença
Copyright (c) 2025 Revista de Empreendedorismo e Gestão de Micro e Pequenas Empresas

Este trabalho está licenciado sob uma licença Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
Divulgação e compartilhamento:
A revista permite a divulgação dos artigos publicados (p´os print) em webpage pessoais e institucionais dos autores, repositórios institucionais e temáticos, bem como em redes sociais.
Os artigos são licenciados sob a versão Atribuição-NãoComercial-Compartilhamento pela mesma Licença 4.0 Internacional