Threats to the Digital Ecosystem: Can Information Security Management Frameworks, Guided by Criminological Literature, Effectively Prevent Cybercrime and Protect Public Data?

As cyber threats escalate in scale and sophistication, the imperative to secure public data through theoretically grounded and practically viable frameworks becomes increasingly urgent. This review investigates whether and how criminology theories have effectively informed the development and implem...

Full description

Saved in:
Bibliographic Details
Main Authors: Shahrukh Mushtaq, Mahmood Shah
Format: Article
Language:English
Published: MDPI AG 2025-06-01
Series:Computers
Subjects:
Online Access:https://www.mdpi.com/2073-431X/14/6/219
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1849431821665697792
author Shahrukh Mushtaq
Mahmood Shah
author_facet Shahrukh Mushtaq
Mahmood Shah
author_sort Shahrukh Mushtaq
collection DOAJ
description As cyber threats escalate in scale and sophistication, the imperative to secure public data through theoretically grounded and practically viable frameworks becomes increasingly urgent. This review investigates whether and how criminology theories have effectively informed the development and implementation of information security management frameworks (ISMFs) to prevent cybercrime and fortify the digital ecosystem’s resilience. Anchored in a comprehensive bibliometric analysis of 617 peer-reviewed records extracted from Scopus and Web of Science, the study employs Multiple Correspondence Analysis (MCA), conceptual co-word mapping, and citation coupling to systematically chart the intellectual landscape bridging criminology and cybersecurity. The review reveals those foundational criminology theories—particularly routine activity theory, rational choice theory, and deterrence theory—have been progressively adapted to cyber contexts, offering novel insights into offender behaviour, target vulnerability, and systemic guardianship. In parallel, the study critically engages with global cybersecurity standards such as National Institute of Standards and Technology (NIST) and ISO, to evaluate how criminological principles are embedded in practice. Using data from the Global Cybersecurity Index (GCI), the paper introduces an innovative visual mapping of the divergence between cybersecurity preparedness and digital development across 170+ countries, revealing strategic gaps and overperformers. This paper ultimately argues for an interdisciplinary convergence between criminology and cybersecurity governance, proposing that the integration of criminological logic into cybersecurity frameworks can enhance risk anticipation, attacker deterrence, and the overall security posture of digital public infrastructures.
format Article
id doaj-art-0ece268f1fcb45d7ba46241706453b59
institution Kabale University
issn 2073-431X
language English
publishDate 2025-06-01
publisher MDPI AG
record_format Article
series Computers
spelling doaj-art-0ece268f1fcb45d7ba46241706453b592025-08-20T03:27:30ZengMDPI AGComputers2073-431X2025-06-0114621910.3390/computers14060219Threats to the Digital Ecosystem: Can Information Security Management Frameworks, Guided by Criminological Literature, Effectively Prevent Cybercrime and Protect Public Data?Shahrukh Mushtaq0Mahmood Shah1Newcastle Business School, University of Northumbria at Newcastle, Newcastle upon Tyne NE1 8ST, UKNewcastle Business School, University of Northumbria at Newcastle, Newcastle upon Tyne NE1 8ST, UKAs cyber threats escalate in scale and sophistication, the imperative to secure public data through theoretically grounded and practically viable frameworks becomes increasingly urgent. This review investigates whether and how criminology theories have effectively informed the development and implementation of information security management frameworks (ISMFs) to prevent cybercrime and fortify the digital ecosystem’s resilience. Anchored in a comprehensive bibliometric analysis of 617 peer-reviewed records extracted from Scopus and Web of Science, the study employs Multiple Correspondence Analysis (MCA), conceptual co-word mapping, and citation coupling to systematically chart the intellectual landscape bridging criminology and cybersecurity. The review reveals those foundational criminology theories—particularly routine activity theory, rational choice theory, and deterrence theory—have been progressively adapted to cyber contexts, offering novel insights into offender behaviour, target vulnerability, and systemic guardianship. In parallel, the study critically engages with global cybersecurity standards such as National Institute of Standards and Technology (NIST) and ISO, to evaluate how criminological principles are embedded in practice. Using data from the Global Cybersecurity Index (GCI), the paper introduces an innovative visual mapping of the divergence between cybersecurity preparedness and digital development across 170+ countries, revealing strategic gaps and overperformers. This paper ultimately argues for an interdisciplinary convergence between criminology and cybersecurity governance, proposing that the integration of criminological logic into cybersecurity frameworks can enhance risk anticipation, attacker deterrence, and the overall security posture of digital public infrastructures.https://www.mdpi.com/2073-431X/14/6/219cybercrime preventioncriminologycybercrimecybersecurity frameworkscybercrime management
spellingShingle Shahrukh Mushtaq
Mahmood Shah
Threats to the Digital Ecosystem: Can Information Security Management Frameworks, Guided by Criminological Literature, Effectively Prevent Cybercrime and Protect Public Data?
Computers
cybercrime prevention
criminology
cybercrime
cybersecurity frameworks
cybercrime management
title Threats to the Digital Ecosystem: Can Information Security Management Frameworks, Guided by Criminological Literature, Effectively Prevent Cybercrime and Protect Public Data?
title_full Threats to the Digital Ecosystem: Can Information Security Management Frameworks, Guided by Criminological Literature, Effectively Prevent Cybercrime and Protect Public Data?
title_fullStr Threats to the Digital Ecosystem: Can Information Security Management Frameworks, Guided by Criminological Literature, Effectively Prevent Cybercrime and Protect Public Data?
title_full_unstemmed Threats to the Digital Ecosystem: Can Information Security Management Frameworks, Guided by Criminological Literature, Effectively Prevent Cybercrime and Protect Public Data?
title_short Threats to the Digital Ecosystem: Can Information Security Management Frameworks, Guided by Criminological Literature, Effectively Prevent Cybercrime and Protect Public Data?
title_sort threats to the digital ecosystem can information security management frameworks guided by criminological literature effectively prevent cybercrime and protect public data
topic cybercrime prevention
criminology
cybercrime
cybersecurity frameworks
cybercrime management
url https://www.mdpi.com/2073-431X/14/6/219
work_keys_str_mv AT shahrukhmushtaq threatstothedigitalecosystemcaninformationsecuritymanagementframeworksguidedbycriminologicalliteratureeffectivelypreventcybercrimeandprotectpublicdata
AT mahmoodshah threatstothedigitalecosystemcaninformationsecuritymanagementframeworksguidedbycriminologicalliteratureeffectivelypreventcybercrimeandprotectpublicdata