Skip to main content

The Main Aspects of the Impact of Cybercrimes on the Business Environment in the Digital Era: Literature Review

  • Chapter
  • First Online:
Economic and Financial Crime, Sustainability and Good Governance

Abstract

The aim of this research is to identify the main aspects of the impact of cybercrime on the business environment through quantitative research and comparative analysis by reviewing international literature. The applied research methodology also consisted of processing and analysing information gathered from the literature of international regulatory bodies, which formed the basis for syntheses and extracts of judgements and findings. The results obtained revealed a significant increase in cybercrime over the last decade, which is why several measures to combat cybercrime in business were proposed and discussed. The chapter concludes with the authors’ conclusions, the limitations of this study and future research directions proposed by them.

The importance of this chapter is aimed at both academic and business specialists, as well as at all readers interested in learning more about the subject.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  • Akdemir, N., Sungur, B., & Bașaranel, B. U. (2020). Examining the challenges of policing economic cybercrime in the UK. Güvenlik Bilimleri Derg. (Int. Secur. Congr. Spec. Issue), Özel Sayı, (pp. 113–134).

    Google Scholar 

  • Akhtar, N., & Perwej, Y. (2020). The internet of nano things (IoNT) existing state and future prospects, for published in the GSC. Advanced Research and Reviews, 5(2), 131–150.

    Article  Google Scholar 

  • Alecu, I., Ciuchi, C., Cîmpeanu, T., Coman, I., Găbudeanu, Larisa, Mihai, I.-C., Moghior, C., Munteanu, N., Petrică, G., Stoica, I., & Zețu C. (2021). Ghid de securitate cibernetică, Retrieved from: https://www.cyberlearning.ro/documents/Ghid-securitate-cibernetica.pdf.

  • Appiah, K. A. (2021). The prophet of maximum productivity. New York Review of Books, 14, 51–54.

    Google Scholar 

  • Black, A., Lumsden, K., & Hadlington, L. (2019). Why don’t you block them? Police officers’ constructions of the ideal victim when responding to reports of interpersonal cybercrime. In K. Lumsden & E. Harmer (Eds.), Online othering: Exploring violence and discrimination on the Web (pp. 355–378). Palgrave Macmillan.

    Chapter  Google Scholar 

  • Broadhead, S. (2018). The contemporary cybercrime ecosystem: A multi-disciplinary overview of the state of affairs and developments. Computer Law and Security Review, 34, 1180–1196.

    Article  Google Scholar 

  • Camic, C. (2020). Veblen: The making of an economist who unmade economics. Harvard University Press.

    Book  Google Scholar 

  • Chen, P., Desmet, L., & Huygens, C. (2014). A study on advanced persistent threats. In IFIP international conference on communications and multimedia security (pp. 63–72). Springer.

    Google Scholar 

  • Christensen, J. (2015). On her majesty’s secrecy service. In D. Whyte (Ed.), How corrupt is Britain? Pluto.

    Google Scholar 

  • Clark, R., Reed, J., & Sunderland, T. (2018). Bridging funding gaps: Pitfalls, progress and potential private finance. Land Use Policy, 71, 335–346.

    Article  Google Scholar 

  • Collin, B. (1996). The future of cyber terrorism, proceedings of 11th annual international symposium on criminal justice issues. The University of Illinois at Chicago.

    Google Scholar 

  • Council of Europe. (2001). Convention on Cybercrime; European Treaty Series No. 185 (pp. 1–25); Council of Europe: Budapest, Hungary. Available online: https://rm.coe.int/1680081561 (Accessed on 16 October 2022).

  • Commission of the European Communities. (2007). Communication from the Commission to the European Parliament, the Council and the Committee of the Regions: Towards a general policy on the fight against cyber crime (vol 267); Commission of the European Communities: Brussels, Belgium.

    Google Scholar 

  • Check Point Software Technologies Ltd. (CPST). (2021). Cele mai mari provocări de securitate în cloud din 2021. Retrieved from: https://www.checkpoint.com/cyber-hub/cloud-security/what-is-cloud-native-security/the-biggest-cloud -provocări-securitate-în-2021/.

  • Krazytech. (2022). Accessed on September 22, 2022. Retrieved from https://krazytech.com/technical-papers/cyber-crime

  • Dewar, R. (2014). The triptych of cyber security: A classification of active cyber defense’. 6th international conference on cyber security (pp. 7–21), NATO CCD COE Publications, Tallinn.

    Google Scholar 

  • Donalds, C., & Osei-Bryson, K. M. (2019). Toward a cybercrime classification ontology: A knowledge-based approach. Computers in Human Behavior, 92, 403–418.

    Article  Google Scholar 

  • Dunn-Cavelty, M. (2010). Cyber security. In A. Collins (Ed.), Contemporary security studies. OUP.

    Google Scholar 

  • European Commission. (2013). Joint communication to the European Parliament, the Council, the European Economic and Social Committee and the Committee of the Regions. Cybersecurity strategy of the European Union: An open, safe and secure cyberspace; European Commission: Brussels, Belgium.

    Google Scholar 

  • Faysel, M. A., & Haque, S. S. (2010). Towards cyber defense: Research in intrusion detection and intrusion prevention systems. IJCSNS International Journal of Computer Science and Network Security, 10(7), 316–325.

    Google Scholar 

  • Garfinkel, S. L. (2010). Digital forensics research: The next 10 years. Digital Investigation, 7(supplement), S64–S73.

    Article  Google Scholar 

  • Global Witness. (2021). The true price of palm oil: How global finance funds deforestation, violence and human rights abuses in Papua New Guinea, www.globalwitness.org/en/campa igns/fores ts/true-price- palm-oil/

  • Gordon, S., & Ford, R. (2006). On the definition and classification of cybercrime. Journal in Computer Virology, 2, 13–20.

    Article  Google Scholar 

  • Guo, H., Jin, B., & Huang, D. (2010). Research and review on computer forensics, forensics in telecommunications, information, and multimedia, international conference on forensics in telecommunications, information, and multimedia (pp. 224–233).

    Google Scholar 

  • Halder, D., & Jaishankar, K. (2011). Cyber crime and the victimization of women: Laws, rights and regulations. IGI-Global.

    Google Scholar 

  • Hatole, P. P., & Bawiskar, D. S. K. (2017). Literature review of email forensics. Imperial Journal of Interdisciplinary Research, 3(4).

    Google Scholar 

  • Iqbal, J., & Beigh, B. M. (2017). Cybercrime in India: Trends and challenges. International Journal of Innovations & Advancement in Computer Science, 6(12), 187–196.

    Google Scholar 

  • Jensen, M., Schwenk, J., Gruschka, N., & Iacono, L. L. (2009). On technical security issues in cloud, IEEE 2009 international conference on cloud computing (pp. 109–116), IEEE, 21–25 September 2009.

    Google Scholar 

  • Jin, X., Sun, W., Liang, Y., Guo, J., & Xie, Z. (2011). Design and implementation of intranet safety monitoring platform for power secondary system. Automation of Electric Power Systems, 35(16), 99–104.

    Google Scholar 

  • Kamruzzaman, M., Ashraful Islam, M., Shahidul Islam, M., Shakhawat Hossain, M., & Abdul Hakim, M. (2016). Plight of youth perception on cyber crime in South Asia. American Journal of Information Science and Computer Engineering, 2(4), 22–28.

    Google Scholar 

  • Kaur, M., Kaur, N., & Khurana, S. (2016). A literature review on cyber forensic and its analysis tools. International Journal of Advanced Research in Computer and Communication Engineering, 5(1), 23–28.

    Article  Google Scholar 

  • Kowtha, S., Nolan, L. A., & Daley, R. A. (2012). Cyber security operations center characterization model and analysis, IEEE conference on technologies for Homeland security (HST) (pp. 470–475).

    Google Scholar 

  • Krishna Viraja, V., & Purandare, P. (2021). A qualitative research on the impact and challenges of cybercrimes. Journal of Physics: Conference Series, 1964, 042004.

    Google Scholar 

  • Krombholz, K., Hobel, H., Huber, M., & Weippl, E. (2015). Advanced social engineering attacks. Journal of Information Security and applications, 22, 113–122.

    Article  Google Scholar 

  • Krugman, P. (2020). Arguing with zombies. W.W. Norton & Company.

    Google Scholar 

  • Kumar Goutam, R., & Kumar Verma, D. (2015). Top five cyber frauds. International Journal of Computer Applications, 119(7), 23–25.

    Article  Google Scholar 

  • Le Compte, A., Elizondo, D., & Watson, T. (2015). A renewed approach to serious games for cyber security, 7th international conference on cyber conflict: Architectures in cyberspace, IEEE (pp. 203–216), 26–29 May 2015.

    Google Scholar 

  • Leukfeldt, E. R., Kleemans, E. R., Kruisbergen, E. W., & Roks, R. A. (2019). Criminal networks in a digitized world: On the nexus of borderless opportunities and local embeddedness. Trends in Organized Crime, 22(3), 324–345.

    Article  Google Scholar 

  • Mativat, F., & Tremblay, P. (1997). Counterfeiting credit cards. British Journal of Criminology, 37(2), 165–183.

    Article  Google Scholar 

  • McAfee. (2017). Economic Impact of Cybercrime-No Slowing Down. Retrieved from: https://www.mcafee.com/enterprise/en-us/assets/executive-summaries/es-economic-impact-cybercrime.pdf.

  • McGuire, M. (2020). It ain’t what it is, it’s the way that they do it? Why we still don’t understand cybercrime. In R. Leukfeldt & T. J. Holt (Eds.), The human factor of cybercrime (pp. 3–28). Routledge.

    Google Scholar 

  • Mirkovic, J., Dietrich, S., Dittrich, D., & Reiher, P. (2004). Internet denial of service attack and defense mechanisms. Pearson education: The Radia Pertman series in computer networking and security. Retrieved from https://books.google.com/books?isbn=0132704544.

  • Mostafa, A. A. N. (2022). Cyber crime in business: Review paper. International Journal of Academic Research in Business and Social Sciences., 12(6), 962–972.

    Article  Google Scholar 

  • Mshana, J. A. (2015). Cybercrime: An empirical study of its impact in the society—a case study of Tanzania, Huria. Journal of the Open University of Tanzania, 19(1), 72–87.

    Google Scholar 

  • Nesvetailova, A., & Palan, R. (2013). Sabotage in the financial system: Lessons from Veblen. Business Horizons, 56, 723–732.

    Article  Google Scholar 

  • OECD (Organization for Economic Cooperation and Development). (2021). The momentum around sustainable finance taxonomies, OECD. https://www.oecd-ilibrary.org/sites/235eb800-en/index.html?itemId=/content/component/235eb800-en.

  • Ong, Y. J., Qiao, M., Routray, R., & Raphael, R. (2017). Context-aware data loss prevention for cloud storage services, 2017 IEEE 10th international conference on CLOUD computing (CLOUD), IEEE, 25–30 June 2017.

    Google Scholar 

  • Paoli, L., Visschers, J., Verstraete, C., & Van Hellemont, E. (2018). The impact of cybercrime on Belgian businesses. Cambridge.

    Book  Google Scholar 

  • Parwej, F., Akhtar, N., & Perwej, Y. (2019). An empirical analysis of web of things (WoT). International Journal of Advanced Research in Computer Science, 10(3), 32–40.

    Article  Google Scholar 

  • Pasqualetti, F., Dorfler, F., & Bullo, F. (2013). Attack detection and identification in cyber-physical systems. IEEE Transactions on Automatic Control, 58(11), 2715–2729.

    Article  Google Scholar 

  • Pathak, P. B. (2016). Cybercrime: A global threat to cybercommunity. Ijcset.Com, 7(3), 46–49.

    Google Scholar 

  • Pawar, S. C., Mente, R. S., & Chendage, B. D. (2021). Cyber crime, cyber space and effects of cyber crime. International Journal of Scientific Research in Computer Science, Engineering and Information Technology, 7(1), 210–214.

    Article  Google Scholar 

  • Perwej, Y. (2018a). The ambient scrutinize of scheduling algorithms in big data territory. International Journal of Advanced Research, 6(3), 241–258.

    Article  Google Scholar 

  • Perwej, Y. (2018b). A pervasive review of Blockchain technology and its potential applications. Open Science Journal of Electrical and Electronic Engineering, New York, USA, 5(4), 30–43.

    Google Scholar 

  • Perwej, Y., Hannan, S. A., Parwej, F., & Nikhat Akhtar, N. (2014). A posteriori perusal of mobile computing. International Journal of Computer Applications Technology and Research, 3(9), 569–578.

    Article  Google Scholar 

  • Perwej, Y., Kerim, B., Adrees, M. S., & Sheta, O. E. (2017). An empirical exploration of the yarn in big data. International Journal of Applied Information Systems, Foundation of Computer Science FCS, New York, USA, 12(9), 19–29.

    Google Scholar 

  • Perwej, Y., Nikhat Akhtar, N., & Parwej, F. (2018). A technological perspective of Blockchain security. International Journal of Recent Scientific Research, 9(11A), 29472–29493.

    Google Scholar 

  • Perwej, Y., Haq, K., Parwej, F., & Mohamed Hassan, M. M. (2019a). The internet of things (IoT) and its application domains. International Journal of Computer Applications (IJCA) USA, 182(49), 36–49.

    Article  Google Scholar 

  • Perwej, A., Haq, K., & Perwej, Y. (2019b). Blockchain and its influence on market. International Journal of Computer Science Trends and Technology, 7(5), 82–91.

    Google Scholar 

  • Phillips, K., Davidson, J. C., Farr, R. R., Burkhardt, C., Caneppele, S., & Aiken, M. P. (2022). Conceptualizing cybercrime: Definitions, typologies and taxonomies. Forensic Sciences, 2(2), 379–398.

    Article  Google Scholar 

  • Ponemon Institute. (2012). The impact of cybercrime on business. Studies of IT practitioners in the United States, United Kingdom, Germany, Hong Kong and Brazil. Retrieved October 16, 2022 from https://www.ponemon.org/local/.../Impact_of_Cybercrime_on_Business_FINAL.pdf

  • Ruggiero, V. (2017a). Dirty money. Oxford University Press.

    Book  Google Scholar 

  • Ruggiero, V. (2017b). Networks of greed. Justice, Power and Resistance, 1, 3–23.

    Google Scholar 

  • Ruggiero, V. (2020). Killing environmental campaigners. Criminological Encounters, 3(1), 92–105.

    Google Scholar 

  • Ruggiero, V. (2022). Sustainability and financial crime. International Criminology, 2, 143–151.

    Article  Google Scholar 

  • Sarre, R., Lau, L. Y. C., & Chang, L. Y. (2018). Responding to cybercrime: Current trends. Police Practice and Research, 19, 515–518.

    Article  Google Scholar 

  • Sachdeva, S., Raina, B. L., & Sharma, A. (2020). Analysis of digital forensic tools. Journal of Computational and Theoretical Nanoscience, 17(6), 2459–2467.

    Article  Google Scholar 

  • Schiller, C., & Binkley, J. R. (2007). Botnets: The killer web applications (1st ed.) Syngress.

    Google Scholar 

  • Shui, Y. (2013). Distributed denial of service attack and defense. Chapter 1, (pp. 1–5). Springer brief in computer science. Springer.com: Google Books online. Retrieved from October 24, 2022, https://books.google.com.tr/books?isbn=1461494915.

  • Simou, S., Kalloniatis, C., Kavakli, E., & Gritzalis, S. (2014). Cloud forensics solutions: A review. Advanced Information Systems Engineering Workshops, 299–309.

    Google Scholar 

  • Stallings, W. (2014). Cryptography and network security: Principles and practice, International Edition: Principles and Practice. Pearson Higher Ed.

    Google Scholar 

  • Tan, Z., Jamdagni, A., He, X., Nanda, P., & Liu, R. P. (2014). A system for denial-of-service attack detection based on multivariate correlation analysis. IEEE Transactions on Parallel and Distributed Systems, 25(2), 447–456.

    Article  Google Scholar 

  • Teelink, S., & Erbacher, R. (2006). Improving the computer forensic analysis process through visualization. Communications of the ACM, 49(2), 71–75.

    Article  Google Scholar 

  • Tsakalidis, G., & Vergidis, K. (2017). A systematic approach toward description and classification of cybercrime incidents. IEEE Transactions on Systems, Man, and Cybernetics Systems, 49, 710–729.

    Article  Google Scholar 

  • UN. (2017). Work of the statistical commission pertaining to the 2030 agenda for sustainable development, Resolution Adopted by the General Assembly on 6 July, UN.

    Google Scholar 

  • United Kingdom National Cyber Security Centre (UKNCSC). (2017). Cyber crime: Understanding the online business model, Report. https://www.ncsc.gov.uk/content/files/protected_files/news_files/Cyber% 20crime%20-%20understabnding%20the%20online%20business%20model.pdf

  • Viano, E. C. (2017). Cybercrime: Definition, typology, and criminalization. In E. C. Viano (Ed.), Cybercrime, organized crime, and societal responses (pp. 3–22). Springer.

    Chapter  Google Scholar 

  • Yar, M., & Steinmetz, K. F. (2019). Cybercrime and society (3rd ed.). SAGE Publications Ltd..

    Google Scholar 

  • Yasin, I., Ahmad, N., & Chaudhary, M. A. (2021). The impact of financial development, political institutions and urbanization on environmental degradation. Environment, Development and Sustainability, 23, 6698–6721.

    Article  Google Scholar 

  • Zadek, S. (2018). Aligning the financial system with sustainable development. In N. Saab & A.-K. Sadik (Eds.), Financing sustainable development in Arab countries. Arab Forum for Environment and Development.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Dan Ioan Topor .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Căpușneanu, S., Topor, D.I., Rakoș, IS., Țenovici, CO., Hint, M.Ș. (2023). The Main Aspects of the Impact of Cybercrimes on the Business Environment in the Digital Era: Literature Review. In: Achim, M.V. (eds) Economic and Financial Crime, Sustainability and Good Governance. Contributions to Finance and Accounting. Springer, Cham. https://doi.org/10.1007/978-3-031-34082-6_7

Download citation

Publish with us

Policies and ethics