The Evolution of Cybercrime and Its Impact on Various Sectors
DOI:
https://doi.org/10.32734/jocai.v10.i1-24471Keywords:
History of Technology, Cybercrime, Literature Review, Industries, Cyber-incidentAbstract
This research undertakes an investigation, into the development of cybercrime and its significant consequences in five crucial industries; Manufacturing, Finance and Insurance, Professional Business and Consumer Services, Energy and Retail and Wholesale. By examining the progression of cybercrime, the study traces its evolution from curious hacking to its present state as a sophisticated global threat. The analysis delves into cyber incidents in these industries exploring how these criminal activities have evolved from simple digital pranks to globally impactful actions. The narrative provides insights into the effects of these crimes and the evolving strategies employed to mitigate risks enhancing our understanding of the ever-changing cybersecurity landscape. This research serves as an introduction to facilitate an exploration laying the foundation for an understanding of past current and emerging trends in cybercrime, within these key sectors. It aims to significantly contribute to the development and strengthening of future cybersecurity approaches and resilience by providing a deep understanding of these trends.
Downloads
References
[1] B. Leibowitz, “Hack, hacker, hacking,” TF Peterson, Nightwork: A History of Hacks and Pranks at MIT, 1990.
[2] D. Prince, “Cybersecurity: The security and protection challenges of our digital world,” Computer, vol. 51, pp. 16–19, 2018. [Online]. Available: https://api.semanticscholar.org/ CorpusID:22324168
[3] Statista. (February 2023) Distribution of cyber attacks across worldwide industries in 2022. Accessed: 06 January 2024. [Online]. Available: https://www.statista.com/statistics/ 1315805/cyber-attacks-top-industries-worldwide/
[4] V. Jangada Correia, “An explorative study into the importance of defining and classifying cyber terrorism in the united kingdom,” SN Computer Science, vol. 3, no. 1, p. 84, 2022.
[5] G. Zeviar-Geese, “The state of the law on cyberjursidiction and cybercrime on the internet,” Gonz. J. Int’l L., vol. 1, p. 119, 1997.
[6] U. Nations, “The united nations manual on the prevention and control of computer related crime,” International Review of Criminal Policy, vol. Supplement, pp. 43–44, 1995, supra note 41, paragraphs 20 to 73 in International Review of Criminal Policy, pp. 43–44 (1995).
[7] D. O. Friedrichs, “Crimes of the powerful and the definition of crime,” in The Routledge international handbook of the crimes of the powerful. Routledge, 2015, pp. 39–49.
[8] Federal Bureau of Investigation. (2018, November) Morris worm: 30 years since first major attack on internet. Accessed on 14 January 2024. [Online]. Available: https://www.fbi.gov/ news/stories/morris-worm-30-years-since-first-major-attack-on-internet-110218
[9] K.-S. Choi, C. S. Lee, and E. R. Louderback, “Historical evolutions of cybercrime from computer crime to cybercrime,” The Palgrave handbook of international cybercrime and cyberdeviance, pp. 27–43, 2020.
[10] B. Dwan, “The computer virus—from there to here.: An historical perspective.” Computer Fraud & Security, vol. 2000, no. 12, pp. 13–16, 2000.
[11] C. Miles, “Early history of the computer virus,” Prof. Dasgupta’s History of Computer Science The Center for Advanced Computer Studies University of Louisiana, pp. 1–8, 2012.
[12] V. Babanina, I. Tkachenko, O. Matiushenko, and M. Krutevych, “Cybercrime: History of formation, current state and ways of counteraction,” April 12 2021, https://doi.org/10.34069/ai/2021.38.02.10.
[13] P. Grabosky, “The evolution of cybercrime, 2004-2014,” January 1 2014.
[14] N. Vandezande, “Cybersecurity in the eu: How the nis2-directive stacks up against its predecessor,” Computer Law & Security Review, vol. 52, p. 105890, 2024.
[15] I. Corradini and I. Corradini, “Redefining the approach to cybersecurity,” Building a Cybersecurity Culture in Organizations: How to Bridge the Gap Between People and Digital Technology, pp. 49–62, 2020.
[16] C. Stoll, The cuckoo’s egg: tracking a spy through the maze of computer espionage. Simon and Schuster, 2005.
[17] D. R. C. T. C. Community, “25 Years Later: Looking Back at the First Great (Cyber) Bank Heist — darkreading.com,” https://www.darkreading.com/perimeter/25-years-later-looking-back-at-the-first-great-cyber-bank-heist, 2019, [Accessed 15-01-2024].
[18] Federal Bureau of Investigation. (2019, March) The melissa virus. Accessed on 14 January 2024. [Online]. Available: https://www.fbi.gov/news/stories/morris-worm-30-years-since-first-major-attack-on-internet-110218
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2026 Cindy Aprilia, Robel Amare Gebrewold, Mercy Damilola Bamiduro, Niurguiana Borisova, Anel Mengdigali

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.










