Determinantes dos Crimes Cibernéticos: Evidências de um Estudo Cross-Country
Palavras-chave:
Palavras-chave: Ataques cibernéticos; Crimes cibernéticos; Segurança cibernética; Segurança jurídica; Países.Resumo
Este estudo investiga os fatores determinantes que acentuam a vulnerabilidade de países a ataques cibernéticos.Nesse sentido, o presente estudo tem como objetivo investigar os fatores determinantes que intensificam a vulnerabilidade de países a ataques cibernéticos, Foram analisados dados de 50 países, listados no ranking de Bruce et al. (2024), utilizando regressão linear para investigar a relação entre crimes cibernéticos e variáveis relativas a dimensão da qualidade da governança, da política e de indicadores econômicos. O programa estatístico Gretl foi utilizado para realizar a regressão linear, com base no método dos mínimos quadrados ordinários (OLS). Os resultados indicam que a qualidade da regulação exerce um papel significativo na redução da vulnerabilidade, ou seja, países com maior segurança jurídica tendem a apresentar menores taxas de cibercrimes. Além disso, o estudo encontrou uma correlação entre desenvolvimento econômico dos países e a incidência de cibercrimes.Este estudo indica que melhorias na segurança cibernética exigem não apenas medidas tecnológicas, mas um fortalecimento das estruturas regulatórias e também abordagens mais amplas que abordem as questões socioeconômicas subjacentes que também influenciam o crime cibernético.
Referências
Agrawal, M., Singh, H., Gour, N., & Kumar, M. A. (2014). Evaluation on malware analysis. International Journal of Computer Science and Information Technologies, 5(3), 3381-3383.
Arcuri, M. C., Brogi, M., & Gandolfi, G. (2017, January). How Does Cyber Crime Affect Firms? The Effect of Information Security Breaches on Stock Returns. In ITASEC (pp. 175-193).
Aslan, Ö., Aktuğ, S. S., Ozkan-Okay, M., Yilmaz, A. A., & Akin, E. (2023). A comprehensive review of cyber security vulnerabilities, threats, attacks, and solutions. Electronics, 12(6), 1333.
Aviv, I., & Ferri, U. (2023). Russian-Ukraine armed conflict: Lessons learned on the digital ecosystem. International Journal of Critical Infrastructure Protection, 43, 100637
Bouveret, A. (2018). Cyber risk for the financial sector: A framework for quantitative assessment. International Monetary Fund.
Bruggemann, R., Koppatz, P., Scholl, M., & Schuktomow, R. (2022). Global cybersecurity index (GCI) and the role of its 5 pillars. Social Indicators Research, 1-19.
Bruce, M., Lusthaus, J., Kashyap, R., Phair, N., & Varese, F. (2024). Mapping the global geography of cybercrime with the World Cybercrime Index. Plos one, 19(4), e0297312.
Chen, S., Hao, M., Ding, F., Jiang, D., Dong, J., Zhang, S., ... & Gao, C. (2023). Exploring the global geography of cybercrime and its driving forces. Humanities and Social Sciences Communications, 10(1), 1-10.
Darem, A. A., Alhashmi, A. A., Alkhaldi, T. M., Alashjaee, A. M., Alanazi, S. M., & Ebad, S. A. (2023). Cyber threats classifications and countermeasures in banking and financial sector. IEEE Access, 11, 125138-125158.
Erkan-Barlow, A., & Wells-Dietel, B. P. (2023). The Current State of Cyber Insurance and Regulation in the Context of Investment Efficiency and Moral Hazard: A Literature Review. Journal of Insurance Regulation. https://content. naic. org/sites/default/files/cipr-jir-2023-4. pdf.
Familoni, B. T., & Shoetan, P. O. (2024). Cybersecurity in the financial sector: a comparative analysis of the USA and Nigeria. Computer Science & IT Research Journal, 5(4), 850-877.
Guo, M. (2018). China's cybersecurity legislation, it's relevance to critical infrastructures and the challenges it faces. International Journal of Critical Infrastructure Protection, 22, 139-149.
Hall, T., & Ziemer, U. (2024). Online deviance in post-Soviet space: Victimisation, perceptions and social attitudes amongst young people, an Armenian case study. Digital Geography and Society, 7, 100096.
Hathaway, O. A., Crootof, R., Levitz, P., & Nix, H. (2012). The law of cyber-attack. Calif. L. Rev., 100, 817.
Harkin, D., Whelan, C., & Chang, L. (2018). The challenges facing specialist police cyber-crime units: An empirical analysis. Police Practice and Research, 19(6), 519-536.
Hellvig, R. C. (2023). Cybersecurity And Macroeconomic Vulnerabilities. Internal Auditing & Risk Management, (Supplement), 20-27.
Holt, T. J., Burruss, G. W., & Bossler, A. M. (2018). Assessing the macro-level correlates of malware infections using a routine activities framework. International journal of offender therapy and comparative criminology, 62(6), 1720-1741.
Holovkin, B., Cherniavskyi, S., & Tavolzhanskyi, O. (2023). Factors of cybercrime in Ukraine. Relações Internacionais no Mundo Atual, 3(41), 464-488.
Huang, K., Siegel, M., & Madnick, S. (2018). Systematically understanding the cyber attack business: A survey. ACM Computing Surveys (CSUR), 51(4), 1-36.
Imam, A. (2024). Nigeria's Foreign Relations and Soft Power Diplomacy Amidst Cybercrime. Available at SSRN 4896432.
Jackson, A. (2024). How the Collapse of the Soviet Union Made Russia a Great CyberPower. The Cyber Defense Review, 9(1), 99-112.
Kaminska, M. (2021). Restraint under conditions of uncertainty: Why the United States tolerates cyberattacks. Journal of Cybersecurity, 7(1), tyab008.
Kanaker, H., Karim, N. A., Awwad, S. A., Ismail, N. H., & Zraqou, J. (2022). Trojan Horse Infection Detection in Cloud Based Environment Using Machine Learning. International Journal of Interactive Mobile Technologies, 16(24).
Khadam, N., Anjum, N., Alam, A., Mirza, Q. A., Assam, M., Ismail, E. A., & Abonazel, M. R. (2023). How to punish cyber criminals: A study to investigate the target and consequence based punishments for malware attacks in UK, USA, China, Ethiopia & Pakistan. Heliyon, 9(12).
Li, Y., & Liu, Q. (2021). A comprehensive review study of cyber-attacks and cyber security; Emerging trends and recent developments. Energy Reports, 7, 8176-8186.
Lee, S. H., Kang, I., & Kim, H. W. (2023). Understanding cybercrime from a criminal's perspective: Why and how suspects commit cybercrimes?. Technology in Society, 75, 102361.
Lu, H., Liang, B., & Taylor, M. (2010). A comparative analysis of cybercrimes and governmental law enforcement in China and the United States. Asian journal of criminology, 5, 123-135.
Makridis, C. A., & Smeets, M. (2019). Determinants of cyber readiness. Journal of Cyber Policy, 4(1), 72-89.
Miao, Y., Chen, C., Pan, L., Han, Q. L., Zhang, J., & Xiang, Y. (2021). Machine learning–based cyber attacks targeting on controlled information: A survey. ACM Computing Surveys (CSUR), 54(7), 1-36.
Nte , N. D., Enoke, B. K., & Teru, V. A. (2022). A comparative analysis of cyber security laws and policies in Nigeria and South Africa. Law Research Review Quarterly, 8(2), 233-258.
Rasyid, M. F. F., SJ, M. A., Mamu, K. Z., Paminto, S. R., Hidaya, W. A., & Hamadi, A. (2024). Cybercrime Threats and Responsibilities: The utilization of artificial intelligence in online crime. Jurnal Ilmiah Mizani: Wacana Hukum, Ekonomi Dan Keagamaan, 11(1, April), 49-63.
Riggs, H., Tufail, S., Parvez, I., Tariq, M., Khan, M. A., Amir, A., ... & Sarwat, A. I. (2023). Impact, vulnerabilities, and mitigation strategies for cyber-secure critical infrastructure. Sensors, 23(8), 4060.
Sharif, M. H. U., & Mohammed, M. A. (2022). A literature review of financial losses statistics for cyber security and future trend. World Journal of Advanced Research and Reviews, 15(1), 138-156.
Smith, K. T., Jones, A., Johnson, L., & Smith, L. M. (2019). Examination of cybercrime and its effects on corporate stock value. Journal of Information, Communication and Ethics in Society, 17(1), 42-60
Srivastava, S. K., Das, S., Udo, G. J., & Bagchi, K. (2020). Determinants of cybercrime originating within a nation: a cross-country study. Journal of Global Information Technology Management, 23(2), 112-137.
Sufi, F. (2023). Novel Application of Open-Source Cyber Intelligence. Electronics, 12(17), 3610.
Ufnal, M., & Longuevergne, T. (2024). Detection and Prevention of Malware Smuggling in Scalable Vector Graphics (SVG).
Ukwuoma, H. C., Williams, I. S., & Choji, I. D. (2022). Digital economy and cybersecurity in Nigeria: policy implications for development. International Journal of Innovation in the Digital Economy (IJIDE), 13(1), 1-11.
Von Solms, R., & Van Niekerk, J. (2013). From information security to cyber security. computers & security, 38, 97-102.
Zwilling, M., Klien, G., Lesjak, D., Wiechetek, Ł., Cetin, F., & Basim, H. N. (2022). Cyber security awareness, knowledge and behavior: A comparative study. Journal of Computer Information Systems, 62(1), 82-97.
Downloads
Publicado
Como Citar
Edição
Secção
Licença
Direitos de Autor (c) 2025 Revista de Empreendedorismo e Gestão de Micro e Pequenas Empresas

Este trabalho encontra-se publicado com a Licença Internacional Creative Commons Atribuição-NãoComercial-CompartilhaIgual 4.0.
Este obra está licenciado com uma Licença
Creative Commons Atribuição-NãoComercial-CompartilhaIgual 4.0 Internacional