Common Risks and Challenges in Cybercrime

Authors

  • Ismail A. Humied Associate Professor, Faculty of Police, Policy Academic, Ministry of Interior, Sana'a Yemen

Keywords:

Adaptive threat response and mitigation, Challenges, Cybercrime, Cyber security, Evidence, Investigation, Legislation, Risks

Abstract

The significance of cybercrime stems from the magnitude of risks it poses, impacting the right to information, infringing upon individuals' private lives, threatening national security, and leading to a loss of public trust in technology and other aspects of contemporary life. In this research, we not only studied the risks of cybercrime and methods to counter them but also sought to deepen our understanding of the inherent complexities in combating this intricate phenomenon, proposing innovative and proactive solutions. Key challenges in cybercrime include the inherent difficulty of evidentiary procedures, manifested in the concealment of cybercrime, the ease and speed with which digital evidence and crime features can be erased or destroyed, and the colossal volume of network data requiring examination. Furthermore, complexities arise in evidence collection procedures, such as inspection and seizure, compounded by the global, trans-jurisdictional nature of these crimes. This research delineates digital evidence procedures across three fundamental stages: forming an expert investigation team, and executing procedures for inspecting, seizing, and collecting digital evidence in cybercrime cases. Moreover, a comprehensive discussion of the most critical challenges in cybercrime is presented, categorizing them by the crime itself, affected parties, and issues related to investigating authorities and legislation. In addition, this research introduces new and innovative concepts in cybersecurity and proposes an algorithm for adaptive response to threats. Finally, it provides key recommendations for overcoming these challenges.

References

D. Franke, Cyber security basics: protect your organization by applying the fundamentals. Don Franke, 2016.

A. Refsdal, B. Solhaug, and K. Stølen, Cyber-Risk Management. Cham: Springer International Publishing, 2015. doi: https://doi.org/10.1007/978-3-319-23570-7.

V. E. Kappeler and G. W. Potter, The Mythology of Crime and Criminal Justice. Rime and Criminal Justice in American Society, 2005.

R. G. Smith, Ray, and L. Lau, Cybercrime Risks and Responses. Palgrave Studies in Cybercrime and Cybersecurity, 2015. doi: https://doi.org/10.1057/9781137474162.

E. G. Amoroso, Cyber-attacks: protecting national infrastructure. Amsterdam: Butterworth-Heinemann, 2011.

M. Gitlin , “Cyber Attack (Nonfiction - Young Adult) by Margaret J. Goldstein, Martin Gitlin (2015) Library Binding: Martin ‘Marty’ Gitlin: Amazon.com: Books,” Amazon.com, 2025.

Y. Radziwill, Cyber-attacks and the exploitable imperfection of international law. Leiden; Boston: Brill Nijhoff, 2015.

A. Coburn, “Amazon.com: Solving Cyber Risk: Protecting Your Company and Society eBook : Coburn, Andrew, Leverett, Eireann, Woo, Gordon: Kindle Store,”

E. Casey, “Digital Evidence and Computer Crime: Forensic Science, Computers and the Internet, 3rd Edition: Eoghan Casey: 9780123742681: Amazon.com: Books,”

G. Edwards, Cybercrime investigators handbook. Hoboken, New Jersey: John Wiley & Sons, Inc., 2020.

A. Jenkinson, Ransomware and cybercrime. Boca Raton: Crc Press, 2022.

Check Point Research, “Check Point Research: Weekly Cyber Attacks increased by 32% Year-Over-Year; 1 out of 40 organizations impacted by Ransomware,” Check Point Software, Jul. 26, 2022. https://blog.checkpoint.com/2022/07/26/check-point-research-weekly-cyber-attacks-increased-by-32-year-over-year-1-out-of-40-organizations-impacted-by-ransomware-2/

KnowBe4, “Ransomware Hostage Rescue Manual, What You Need to Know to Prepare and Recover from a Ransomware Attack”,” 2023. Available: https://flexipgroup.com/wp-content/uploads/2022/06/knowbe4-ransomware-hostage-rescue-whitepaper-manual.pdf

A. Mohanta, K. Velmurugan, and M. Hahad, Preventing Ransomware: Understand everything about digital extortion and its prevention. Packt Publishing, Birmingham, UK, 2018. Available: https://www.goodreads.com/book/show/39830971-preventing-ransomware

T. Bunnell, Global education under attack: International Baccalaureate in America. Frankfurt Am Main: Peter Lang, 2012.

R. G. Musto, The Attack on Higher Education. Cambridge University Press, 2021.

M.-H. Maras, Computer Forensics: Cybercriminals, Laws, and Evidence, 2nd edition. Burlington, MA: Jones & Bartlett Learning, 2014. Available: https://www.amazon.com/Computer-Forensics-Cybercriminals-Laws-Evidence/dp/1449692222

J. Clough, Principles of cybercrime. Cambridge, United Kingdom: Cambridge University Press, 2010.

A. E. Hassanien, Cybersecurity and Secure Information Systems. Cham: Springer International Publishing, 2019. doi: https://doi.org/10.1007/978-3-030-16837-7.

D. Dasgupta, Z. Akhtar, and S. Sen, “Machine learning in cybersecurity: a comprehensive survey,” The Journal of Defense Modeling and Simulation: Applications, Methodology, Technology, vol. 19, no. 1, p. 154851292095127, Sep. 2020, doi: https://doi.org/10.1177/1548512920951275.

ITU COUNCIL, “Understanding cybercrime: Phenomena, challenges and legal response,” ITU, 2014. https://www.itu.int/en/publications/itu-d/pages/publications.aspx?parent=d-str-cyb_crime-2015&media=electronic

B. Akhgar and B. Brewster, Combatting Cybercrime and Cyberterrorism. Cham: Springer International Publishing, 2016. doi: https://doi.org/10.1007/978-3-319-38930-1.

E. G. B. Gjertsen, E. A. Gjære, M. Bartnes, and W. R. Flores, “Gamification of Information Security Awareness and Training,” Proceedings of the 3rd International Conference on Information Systems Security and Privacy, vol. 1, 2017, doi: https://doi.org/10.5220/0006128500590070.

M. Kuperberg, “Blockchain-Based Identity Management: A Survey From the Enterprise and Ecosystem Perspective,” IEEE Transactions on Engineering Management, vol. 67, no. 4, pp. 1–20, 2019, doi: https://doi.org/10.1109/tem.2019.2926471.

P. J. Taylor, T. Dargahi, A. Dehghantanha, R. M. Parizi, and K.-K. R. Choo, “A systematic literature review of blockchain cyber security,” Digital Communications and Networks, vol. 6, no. 2, pp. 147–156, Feb. 2019, doi: https://doi.org/10.1016/j.dcan.2019.01.005.

A. H. Sarker, A. S. M. Kayes, S. Badsha, H. Alqahtani, P. Watters, and A. Ng, “Cybersecurity data science: an overview from machine learning perspective,” Journal of Big Data, vol. 7, no. 1, Jul. 2020, Available: https://link.springer.com/article/10.1186/s40537-020-00318-5

E. Casey, “Digital Evidence and Computer Crime,” Google Books, 2025.

K. Zhang and J. Liu, “Review on the Application of Knowledge Graph in Cyber Security Assessment,” IOP Conference Series: Materials Science and Engineering, vol. 768, p. 052103, Mar. 2020, doi: https://doi.org/10.1088/1757-899x/768/5/052103.

R. Sihwail, K. Omar, and K. A. Zainol Ariffin, “A Survey on Malware Analysis Techniques: Static, Dynamic, Hybrid and Memory Analysis,” International Journal on Advanced Science, Engineering and Information Technology, vol. 8, no. 4–2, p. 1662, Sep. 2018, doi: https://doi.org/10.18517/ijaseit.8.4-2.6827.

K. Jakimoski, “Security Techniques for Data Protection in Cloud Computing,” International Journal of Grid and Distributed Computing, vol. 9, no. 1, pp. 49–56, Jan. 2016, doi: https://doi.org/10.14257/ijgdc.2016.9.1.05.

M. Maadi, H. Akbarzadeh Khorshidi, and U. Aickelin, “A Review on Human–AI Interaction in Machine Learning and Insights for Medical Applications,” International Journal of Environmental Research and Public Health, vol. 18, no. 4, p. 2121, Feb. 2021, doi: https://doi.org/10.3390/ijerph18042121.

T. Sylla, M. A. Chalouf, F. Krief, and Karim Samaké, “Context-aware security in the internet of things: a survey,” International Journal Of Autonomous And Adaptive Communications Systems, vol. 14, no. 3, pp. 231–231, Jan. 2021, doi: https://doi.org/10.1504/ijaacs.2021.117808.

A. E. Brill and F. N. Baldwin, “Cybercrime & Security,” Google Books, 2025.

P. C. Jorgensen, Software Testing: a craftsmans approach. S.L.: Auerbach Publications, 2021.

A.-P. Mathur, Foundations of Software Testing. Delhi: Pearson, 2013

P. Prasad, “Cybersecurity Awarness: A Real-World Perspective on Cybercrime & Cyberattacks | Pothi.com,” Pothi.com, 2025. https://store.pothi.com/book/ebook-prakash-prasad-cybersecurity-awarness-real-world-perspective-cybercrime-cyberattacks.

S. W. Brenner, Cybercrime and the Law: Challenges, Issues, and Outcomes. University Press of New England, 2012.

C. Guerrier, Security and its Challenges in the 21st Century. John Wiley & Sons, 2021.

Y. Liu, M. Tian, and Y. Shao, Cybercrimes and Financial Crimes in the Global Era. Springer, 2022.

Published

2025-06-20