Abstract
The aim of this research is to identify the main aspects of the impact of cybercrime on the business environment through quantitative research and comparative analysis by reviewing international literature. The applied research methodology also consisted of processing and analysing information gathered from the literature of international regulatory bodies, which formed the basis for syntheses and extracts of judgements and findings. The results obtained revealed a significant increase in cybercrime over the last decade, which is why several measures to combat cybercrime in business were proposed and discussed. The chapter concludes with the authors’ conclusions, the limitations of this study and future research directions proposed by them.
The importance of this chapter is aimed at both academic and business specialists, as well as at all readers interested in learning more about the subject.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Akdemir, N., Sungur, B., & Bașaranel, B. U. (2020). Examining the challenges of policing economic cybercrime in the UK. Güvenlik Bilimleri Derg. (Int. Secur. Congr. Spec. Issue), Özel Sayı, (pp. 113–134).
Akhtar, N., & Perwej, Y. (2020). The internet of nano things (IoNT) existing state and future prospects, for published in the GSC. Advanced Research and Reviews, 5(2), 131–150.
Alecu, I., Ciuchi, C., Cîmpeanu, T., Coman, I., Găbudeanu, Larisa, Mihai, I.-C., Moghior, C., Munteanu, N., Petrică, G., Stoica, I., & Zețu C. (2021). Ghid de securitate cibernetică, Retrieved from: https://www.cyberlearning.ro/documents/Ghid-securitate-cibernetica.pdf.
Appiah, K. A. (2021). The prophet of maximum productivity. New York Review of Books, 14, 51–54.
Black, A., Lumsden, K., & Hadlington, L. (2019). Why don’t you block them? Police officers’ constructions of the ideal victim when responding to reports of interpersonal cybercrime. In K. Lumsden & E. Harmer (Eds.), Online othering: Exploring violence and discrimination on the Web (pp. 355–378). Palgrave Macmillan.
Broadhead, S. (2018). The contemporary cybercrime ecosystem: A multi-disciplinary overview of the state of affairs and developments. Computer Law and Security Review, 34, 1180–1196.
Camic, C. (2020). Veblen: The making of an economist who unmade economics. Harvard University Press.
Chen, P., Desmet, L., & Huygens, C. (2014). A study on advanced persistent threats. In IFIP international conference on communications and multimedia security (pp. 63–72). Springer.
Christensen, J. (2015). On her majesty’s secrecy service. In D. Whyte (Ed.), How corrupt is Britain? Pluto.
Clark, R., Reed, J., & Sunderland, T. (2018). Bridging funding gaps: Pitfalls, progress and potential private finance. Land Use Policy, 71, 335–346.
Collin, B. (1996). The future of cyber terrorism, proceedings of 11th annual international symposium on criminal justice issues. The University of Illinois at Chicago.
Council of Europe. (2001). Convention on Cybercrime; European Treaty Series No. 185 (pp. 1–25); Council of Europe: Budapest, Hungary. Available online: https://rm.coe.int/1680081561 (Accessed on 16 October 2022).
Commission of the European Communities. (2007). Communication from the Commission to the European Parliament, the Council and the Committee of the Regions: Towards a general policy on the fight against cyber crime (vol 267); Commission of the European Communities: Brussels, Belgium.
Check Point Software Technologies Ltd. (CPST). (2021). Cele mai mari provocări de securitate în cloud din 2021. Retrieved from: https://www.checkpoint.com/cyber-hub/cloud-security/what-is-cloud-native-security/the-biggest-cloud -provocări-securitate-în-2021/.
Krazytech. (2022). Accessed on September 22, 2022. Retrieved from https://krazytech.com/technical-papers/cyber-crime
Dewar, R. (2014). The triptych of cyber security: A classification of active cyber defense’. 6th international conference on cyber security (pp. 7–21), NATO CCD COE Publications, Tallinn.
Donalds, C., & Osei-Bryson, K. M. (2019). Toward a cybercrime classification ontology: A knowledge-based approach. Computers in Human Behavior, 92, 403–418.
Dunn-Cavelty, M. (2010). Cyber security. In A. Collins (Ed.), Contemporary security studies. OUP.
European Commission. (2013). Joint communication to the European Parliament, the Council, the European Economic and Social Committee and the Committee of the Regions. Cybersecurity strategy of the European Union: An open, safe and secure cyberspace; European Commission: Brussels, Belgium.
Faysel, M. A., & Haque, S. S. (2010). Towards cyber defense: Research in intrusion detection and intrusion prevention systems. IJCSNS International Journal of Computer Science and Network Security, 10(7), 316–325.
Garfinkel, S. L. (2010). Digital forensics research: The next 10 years. Digital Investigation, 7(supplement), S64–S73.
Global Witness. (2021). The true price of palm oil: How global finance funds deforestation, violence and human rights abuses in Papua New Guinea, www.globalwitness.org/en/campa igns/fores ts/true-price- palm-oil/
Gordon, S., & Ford, R. (2006). On the definition and classification of cybercrime. Journal in Computer Virology, 2, 13–20.
Guo, H., Jin, B., & Huang, D. (2010). Research and review on computer forensics, forensics in telecommunications, information, and multimedia, international conference on forensics in telecommunications, information, and multimedia (pp. 224–233).
Halder, D., & Jaishankar, K. (2011). Cyber crime and the victimization of women: Laws, rights and regulations. IGI-Global.
Hatole, P. P., & Bawiskar, D. S. K. (2017). Literature review of email forensics. Imperial Journal of Interdisciplinary Research, 3(4).
Iqbal, J., & Beigh, B. M. (2017). Cybercrime in India: Trends and challenges. International Journal of Innovations & Advancement in Computer Science, 6(12), 187–196.
Jensen, M., Schwenk, J., Gruschka, N., & Iacono, L. L. (2009). On technical security issues in cloud, IEEE 2009 international conference on cloud computing (pp. 109–116), IEEE, 21–25 September 2009.
Jin, X., Sun, W., Liang, Y., Guo, J., & Xie, Z. (2011). Design and implementation of intranet safety monitoring platform for power secondary system. Automation of Electric Power Systems, 35(16), 99–104.
Kamruzzaman, M., Ashraful Islam, M., Shahidul Islam, M., Shakhawat Hossain, M., & Abdul Hakim, M. (2016). Plight of youth perception on cyber crime in South Asia. American Journal of Information Science and Computer Engineering, 2(4), 22–28.
Kaur, M., Kaur, N., & Khurana, S. (2016). A literature review on cyber forensic and its analysis tools. International Journal of Advanced Research in Computer and Communication Engineering, 5(1), 23–28.
Kowtha, S., Nolan, L. A., & Daley, R. A. (2012). Cyber security operations center characterization model and analysis, IEEE conference on technologies for Homeland security (HST) (pp. 470–475).
Krishna Viraja, V., & Purandare, P. (2021). A qualitative research on the impact and challenges of cybercrimes. Journal of Physics: Conference Series, 1964, 042004.
Krombholz, K., Hobel, H., Huber, M., & Weippl, E. (2015). Advanced social engineering attacks. Journal of Information Security and applications, 22, 113–122.
Krugman, P. (2020). Arguing with zombies. W.W. Norton & Company.
Kumar Goutam, R., & Kumar Verma, D. (2015). Top five cyber frauds. International Journal of Computer Applications, 119(7), 23–25.
Le Compte, A., Elizondo, D., & Watson, T. (2015). A renewed approach to serious games for cyber security, 7th international conference on cyber conflict: Architectures in cyberspace, IEEE (pp. 203–216), 26–29 May 2015.
Leukfeldt, E. R., Kleemans, E. R., Kruisbergen, E. W., & Roks, R. A. (2019). Criminal networks in a digitized world: On the nexus of borderless opportunities and local embeddedness. Trends in Organized Crime, 22(3), 324–345.
Mativat, F., & Tremblay, P. (1997). Counterfeiting credit cards. British Journal of Criminology, 37(2), 165–183.
McAfee. (2017). Economic Impact of Cybercrime-No Slowing Down. Retrieved from: https://www.mcafee.com/enterprise/en-us/assets/executive-summaries/es-economic-impact-cybercrime.pdf.
McGuire, M. (2020). It ain’t what it is, it’s the way that they do it? Why we still don’t understand cybercrime. In R. Leukfeldt & T. J. Holt (Eds.), The human factor of cybercrime (pp. 3–28). Routledge.
Mirkovic, J., Dietrich, S., Dittrich, D., & Reiher, P. (2004). Internet denial of service attack and defense mechanisms. Pearson education: The Radia Pertman series in computer networking and security. Retrieved from https://books.google.com/books?isbn=0132704544.
Mostafa, A. A. N. (2022). Cyber crime in business: Review paper. International Journal of Academic Research in Business and Social Sciences., 12(6), 962–972.
Mshana, J. A. (2015). Cybercrime: An empirical study of its impact in the society—a case study of Tanzania, Huria. Journal of the Open University of Tanzania, 19(1), 72–87.
Nesvetailova, A., & Palan, R. (2013). Sabotage in the financial system: Lessons from Veblen. Business Horizons, 56, 723–732.
OECD (Organization for Economic Cooperation and Development). (2021). The momentum around sustainable finance taxonomies, OECD. https://www.oecd-ilibrary.org/sites/235eb800-en/index.html?itemId=/content/component/235eb800-en.
Ong, Y. J., Qiao, M., Routray, R., & Raphael, R. (2017). Context-aware data loss prevention for cloud storage services, 2017 IEEE 10th international conference on CLOUD computing (CLOUD), IEEE, 25–30 June 2017.
Paoli, L., Visschers, J., Verstraete, C., & Van Hellemont, E. (2018). The impact of cybercrime on Belgian businesses. Cambridge.
Parwej, F., Akhtar, N., & Perwej, Y. (2019). An empirical analysis of web of things (WoT). International Journal of Advanced Research in Computer Science, 10(3), 32–40.
Pasqualetti, F., Dorfler, F., & Bullo, F. (2013). Attack detection and identification in cyber-physical systems. IEEE Transactions on Automatic Control, 58(11), 2715–2729.
Pathak, P. B. (2016). Cybercrime: A global threat to cybercommunity. Ijcset.Com, 7(3), 46–49.
Pawar, S. C., Mente, R. S., & Chendage, B. D. (2021). Cyber crime, cyber space and effects of cyber crime. International Journal of Scientific Research in Computer Science, Engineering and Information Technology, 7(1), 210–214.
Perwej, Y. (2018a). The ambient scrutinize of scheduling algorithms in big data territory. International Journal of Advanced Research, 6(3), 241–258.
Perwej, Y. (2018b). A pervasive review of Blockchain technology and its potential applications. Open Science Journal of Electrical and Electronic Engineering, New York, USA, 5(4), 30–43.
Perwej, Y., Hannan, S. A., Parwej, F., & Nikhat Akhtar, N. (2014). A posteriori perusal of mobile computing. International Journal of Computer Applications Technology and Research, 3(9), 569–578.
Perwej, Y., Kerim, B., Adrees, M. S., & Sheta, O. E. (2017). An empirical exploration of the yarn in big data. International Journal of Applied Information Systems, Foundation of Computer Science FCS, New York, USA, 12(9), 19–29.
Perwej, Y., Nikhat Akhtar, N., & Parwej, F. (2018). A technological perspective of Blockchain security. International Journal of Recent Scientific Research, 9(11A), 29472–29493.
Perwej, Y., Haq, K., Parwej, F., & Mohamed Hassan, M. M. (2019a). The internet of things (IoT) and its application domains. International Journal of Computer Applications (IJCA) USA, 182(49), 36–49.
Perwej, A., Haq, K., & Perwej, Y. (2019b). Blockchain and its influence on market. International Journal of Computer Science Trends and Technology, 7(5), 82–91.
Phillips, K., Davidson, J. C., Farr, R. R., Burkhardt, C., Caneppele, S., & Aiken, M. P. (2022). Conceptualizing cybercrime: Definitions, typologies and taxonomies. Forensic Sciences, 2(2), 379–398.
Ponemon Institute. (2012). The impact of cybercrime on business. Studies of IT practitioners in the United States, United Kingdom, Germany, Hong Kong and Brazil. Retrieved October 16, 2022 from https://www.ponemon.org/local/.../Impact_of_Cybercrime_on_Business_FINAL.pdf
Ruggiero, V. (2017a). Dirty money. Oxford University Press.
Ruggiero, V. (2017b). Networks of greed. Justice, Power and Resistance, 1, 3–23.
Ruggiero, V. (2020). Killing environmental campaigners. Criminological Encounters, 3(1), 92–105.
Ruggiero, V. (2022). Sustainability and financial crime. International Criminology, 2, 143–151.
Sarre, R., Lau, L. Y. C., & Chang, L. Y. (2018). Responding to cybercrime: Current trends. Police Practice and Research, 19, 515–518.
Sachdeva, S., Raina, B. L., & Sharma, A. (2020). Analysis of digital forensic tools. Journal of Computational and Theoretical Nanoscience, 17(6), 2459–2467.
Schiller, C., & Binkley, J. R. (2007). Botnets: The killer web applications (1st ed.) Syngress.
Shui, Y. (2013). Distributed denial of service attack and defense. Chapter 1, (pp. 1–5). Springer brief in computer science. Springer.com: Google Books online. Retrieved from October 24, 2022, https://books.google.com.tr/books?isbn=1461494915.
Simou, S., Kalloniatis, C., Kavakli, E., & Gritzalis, S. (2014). Cloud forensics solutions: A review. Advanced Information Systems Engineering Workshops, 299–309.
Stallings, W. (2014). Cryptography and network security: Principles and practice, International Edition: Principles and Practice. Pearson Higher Ed.
Tan, Z., Jamdagni, A., He, X., Nanda, P., & Liu, R. P. (2014). A system for denial-of-service attack detection based on multivariate correlation analysis. IEEE Transactions on Parallel and Distributed Systems, 25(2), 447–456.
Teelink, S., & Erbacher, R. (2006). Improving the computer forensic analysis process through visualization. Communications of the ACM, 49(2), 71–75.
Tsakalidis, G., & Vergidis, K. (2017). A systematic approach toward description and classification of cybercrime incidents. IEEE Transactions on Systems, Man, and Cybernetics Systems, 49, 710–729.
UN. (2017). Work of the statistical commission pertaining to the 2030 agenda for sustainable development, Resolution Adopted by the General Assembly on 6 July, UN.
United Kingdom National Cyber Security Centre (UKNCSC). (2017). Cyber crime: Understanding the online business model, Report. https://www.ncsc.gov.uk/content/files/protected_files/news_files/Cyber% 20crime%20-%20understabnding%20the%20online%20business%20model.pdf
Viano, E. C. (2017). Cybercrime: Definition, typology, and criminalization. In E. C. Viano (Ed.), Cybercrime, organized crime, and societal responses (pp. 3–22). Springer.
Yar, M., & Steinmetz, K. F. (2019). Cybercrime and society (3rd ed.). SAGE Publications Ltd..
Yasin, I., Ahmad, N., & Chaudhary, M. A. (2021). The impact of financial development, political institutions and urbanization on environmental degradation. Environment, Development and Sustainability, 23, 6698–6721.
Zadek, S. (2018). Aligning the financial system with sustainable development. In N. Saab & A.-K. Sadik (Eds.), Financing sustainable development in Arab countries. Arab Forum for Environment and Development.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this chapter
Cite this chapter
Căpușneanu, S., Topor, D.I., Rakoș, IS., Țenovici, CO., Hint, M.Ș. (2023). The Main Aspects of the Impact of Cybercrimes on the Business Environment in the Digital Era: Literature Review. In: Achim, M.V. (eds) Economic and Financial Crime, Sustainability and Good Governance. Contributions to Finance and Accounting. Springer, Cham. https://doi.org/10.1007/978-3-031-34082-6_7
Download citation
DOI: https://doi.org/10.1007/978-3-031-34082-6_7
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-34081-9
Online ISBN: 978-3-031-34082-6
eBook Packages: Economics and FinanceEconomics and Finance (R0)