Threats to the Digital Ecosystem: Can Information Security Management Frameworks, Guided by Criminological Literature, Effectively Prevent Cybercrime and Protect Public Data?
As cyber threats escalate in scale and sophistication, the imperative to secure public data through theoretically grounded and practically viable frameworks becomes increasingly urgent. This review investigates whether and how criminology theories have effectively informed the development and implem...
Saved in:
| Main Authors: | , |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
MDPI AG
2025-06-01
|
| Series: | Computers |
| Subjects: | |
| Online Access: | https://www.mdpi.com/2073-431X/14/6/219 |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| _version_ | 1849431821665697792 |
|---|---|
| author | Shahrukh Mushtaq Mahmood Shah |
| author_facet | Shahrukh Mushtaq Mahmood Shah |
| author_sort | Shahrukh Mushtaq |
| collection | DOAJ |
| description | As cyber threats escalate in scale and sophistication, the imperative to secure public data through theoretically grounded and practically viable frameworks becomes increasingly urgent. This review investigates whether and how criminology theories have effectively informed the development and implementation of information security management frameworks (ISMFs) to prevent cybercrime and fortify the digital ecosystem’s resilience. Anchored in a comprehensive bibliometric analysis of 617 peer-reviewed records extracted from Scopus and Web of Science, the study employs Multiple Correspondence Analysis (MCA), conceptual co-word mapping, and citation coupling to systematically chart the intellectual landscape bridging criminology and cybersecurity. The review reveals those foundational criminology theories—particularly routine activity theory, rational choice theory, and deterrence theory—have been progressively adapted to cyber contexts, offering novel insights into offender behaviour, target vulnerability, and systemic guardianship. In parallel, the study critically engages with global cybersecurity standards such as National Institute of Standards and Technology (NIST) and ISO, to evaluate how criminological principles are embedded in practice. Using data from the Global Cybersecurity Index (GCI), the paper introduces an innovative visual mapping of the divergence between cybersecurity preparedness and digital development across 170+ countries, revealing strategic gaps and overperformers. This paper ultimately argues for an interdisciplinary convergence between criminology and cybersecurity governance, proposing that the integration of criminological logic into cybersecurity frameworks can enhance risk anticipation, attacker deterrence, and the overall security posture of digital public infrastructures. |
| format | Article |
| id | doaj-art-0ece268f1fcb45d7ba46241706453b59 |
| institution | Kabale University |
| issn | 2073-431X |
| language | English |
| publishDate | 2025-06-01 |
| publisher | MDPI AG |
| record_format | Article |
| series | Computers |
| spelling | doaj-art-0ece268f1fcb45d7ba46241706453b592025-08-20T03:27:30ZengMDPI AGComputers2073-431X2025-06-0114621910.3390/computers14060219Threats to the Digital Ecosystem: Can Information Security Management Frameworks, Guided by Criminological Literature, Effectively Prevent Cybercrime and Protect Public Data?Shahrukh Mushtaq0Mahmood Shah1Newcastle Business School, University of Northumbria at Newcastle, Newcastle upon Tyne NE1 8ST, UKNewcastle Business School, University of Northumbria at Newcastle, Newcastle upon Tyne NE1 8ST, UKAs cyber threats escalate in scale and sophistication, the imperative to secure public data through theoretically grounded and practically viable frameworks becomes increasingly urgent. This review investigates whether and how criminology theories have effectively informed the development and implementation of information security management frameworks (ISMFs) to prevent cybercrime and fortify the digital ecosystem’s resilience. Anchored in a comprehensive bibliometric analysis of 617 peer-reviewed records extracted from Scopus and Web of Science, the study employs Multiple Correspondence Analysis (MCA), conceptual co-word mapping, and citation coupling to systematically chart the intellectual landscape bridging criminology and cybersecurity. The review reveals those foundational criminology theories—particularly routine activity theory, rational choice theory, and deterrence theory—have been progressively adapted to cyber contexts, offering novel insights into offender behaviour, target vulnerability, and systemic guardianship. In parallel, the study critically engages with global cybersecurity standards such as National Institute of Standards and Technology (NIST) and ISO, to evaluate how criminological principles are embedded in practice. Using data from the Global Cybersecurity Index (GCI), the paper introduces an innovative visual mapping of the divergence between cybersecurity preparedness and digital development across 170+ countries, revealing strategic gaps and overperformers. This paper ultimately argues for an interdisciplinary convergence between criminology and cybersecurity governance, proposing that the integration of criminological logic into cybersecurity frameworks can enhance risk anticipation, attacker deterrence, and the overall security posture of digital public infrastructures.https://www.mdpi.com/2073-431X/14/6/219cybercrime preventioncriminologycybercrimecybersecurity frameworkscybercrime management |
| spellingShingle | Shahrukh Mushtaq Mahmood Shah Threats to the Digital Ecosystem: Can Information Security Management Frameworks, Guided by Criminological Literature, Effectively Prevent Cybercrime and Protect Public Data? Computers cybercrime prevention criminology cybercrime cybersecurity frameworks cybercrime management |
| title | Threats to the Digital Ecosystem: Can Information Security Management Frameworks, Guided by Criminological Literature, Effectively Prevent Cybercrime and Protect Public Data? |
| title_full | Threats to the Digital Ecosystem: Can Information Security Management Frameworks, Guided by Criminological Literature, Effectively Prevent Cybercrime and Protect Public Data? |
| title_fullStr | Threats to the Digital Ecosystem: Can Information Security Management Frameworks, Guided by Criminological Literature, Effectively Prevent Cybercrime and Protect Public Data? |
| title_full_unstemmed | Threats to the Digital Ecosystem: Can Information Security Management Frameworks, Guided by Criminological Literature, Effectively Prevent Cybercrime and Protect Public Data? |
| title_short | Threats to the Digital Ecosystem: Can Information Security Management Frameworks, Guided by Criminological Literature, Effectively Prevent Cybercrime and Protect Public Data? |
| title_sort | threats to the digital ecosystem can information security management frameworks guided by criminological literature effectively prevent cybercrime and protect public data |
| topic | cybercrime prevention criminology cybercrime cybersecurity frameworks cybercrime management |
| url | https://www.mdpi.com/2073-431X/14/6/219 |
| work_keys_str_mv | AT shahrukhmushtaq threatstothedigitalecosystemcaninformationsecuritymanagementframeworksguidedbycriminologicalliteratureeffectivelypreventcybercrimeandprotectpublicdata AT mahmoodshah threatstothedigitalecosystemcaninformationsecuritymanagementframeworksguidedbycriminologicalliteratureeffectivelypreventcybercrimeandprotectpublicdata |