Emerging Trends and Challenges in Cybersecurity: A Systematic Literature Review

Mohan Harish Maturi, Hari Gonaygunta, Srikar Podicheti, Karthik Meduri

Abstract


Cyber-security has become a crucial issue for consumers, businesses, and authorities because of the growing incidences and complexity of cyber crimes. This systematic literature review delivers a comprehensive analysis of the cybersecurity scenario reported in 2022, including emerging trends plus challenges with technological advancements. This research has extracted the 1,000 articles data from reputable databases, counting IEEE 173 papers and ACM 40 papers, Springer-Link 142 papers, Elsevier 74 papers, MDPI 86 papers, and 431 papers are being used for analysis. The study identifies significant cybersecurity extortions, ransomware of data cracks, and phishing spasms. It examines technological advancements similar to artificial intelligence, machine learning, and Blockchain. The analysis reveals that AI and ML have significantly enhanced hazard recognition and reaction competencies to examine enormous data sets and identify patterns in which blockchain technology has improved data integrity and resilience against attacks. These advancements in challenges persist to the growing wildlife of dangers plus the critical role of human error. The review underlines that their progressive technologies compromise likely clarifications, presenting novel liabilities and difficulties. Future research should focus on integrating emerging technologies in cybersecurity strategies and developing vigorous methods to address determined human-related vulnerabilities and familiarize with the developing threat scene. 


Full Text:

PDF

References


AlDaajeh, S., Saleous, H., Alrabaee, S., & Barka, E. (2022). The role of national cybersecurity strategies on the improvement of cybersecurity education. Computers & Security. Elsevier. https://www.sciencedirect.com/science/article/pii/S0167404822001493

Alam, S. (2022). Cybersecurity: Past, present and future. arXiv preprint arXiv:2207.01227. arxiv.org. https://arxiv.org/abs/2207.01227

Alanazi, M., Freeman, M., & Tootell, H. (2022). Exploring the factors that influence the cybersecurity behaviors of young adults. Computers in Human Behavior. Elsevier. https://www.sciencedirect.com/science/article/pii/S0747563222001984

Ahsan, M., Nygard, K. E., & Gomes, R. (2022). Cybersecurity threats and their mitigation approaches using Machine Learning—A Review. Journal of Cybersecurity and Privacy. MDPI. https://www.mdpi.com/2624-800X/2/3/27

Akpan, F., Bendiab, G., Shiaeles, S., & Karamperidis, S. (2022). Cybersecurity challenges in the maritime sector. Network. MDPI. https://www.mdpi.com/2673-8732/2/1/9

Alshaibi, A., Al-Ani, M., Al-Azzawi, A., & Konev, A. (2022). The comparison of cybersecurity datasets. Data. MDPI. https://www.mdpi.com/2306-5729/7/2/22

Aloqaily, M., Kanhere, S., Bellavista, P., & Others. (2022). Special issue on cybersecurity management in the era of AI. Journal of Network and Systems Management. Springer. https://link.springer.com/article/10.1007/s10922-022-09659-3

Ansari, M. F., Dash, B., Sharma, P., & Others. (2022). The impact and limitations of artificial intelligence in cybersecurity: A literature review. International Journal of .... SSRN. https://papers.ssrn.com/sol3/papers.cfm?abstract_id=4323317

Chaudhary, S., Gkioulos, V., & Katsikas, S. (2022). Developing metrics to assess the effectiveness of cybersecurity awareness program. Journal of Cybersecurity. Oxford University Press. https://academic.oup.com/cybersecurity/article-abstract/8/1/tyac006/6590603

Cheng, E. C. K., & Wang, T. (2022). Institutional strategies for cybersecurity in higher education institutions. Information. MDPI. https://www.mdpi.com/2078-2489/13/4/192

Crumpler, W., & Lewis, J. A. (2022). Cybersecurity Workforce Gap. JSTOR. https://www.jstor.org/stable/pdf/resrep22540.pdf

Dasgupta, D., Akhtar, Z., & Sen, S. (2022). Machine learning in cybersecurity: a comprehensive survey. The Journal of Defense Modeling and Simulation. Sage. https://journals.sagepub.com/doi/abs/10.1177/1548512920951275

Dwyer, A. C., Stevens, C., Muller, L. P., & Others. (2022). What can a critical cybersecurity do? International Political Science Review. Oxford University Press. https://academic.oup.com/ips/article-pdf/doi/10.1093/ips/olac013/45054045/olac013.pdf

Fedele, A., & Roner, C. (2022). [Reference information incomplete]

Janeja, V. P. (2022). Data analytics for cybersecurity. Cambridge University Press.

Kayan, H., Nunes, M., Rana, O., Burnap, P., & Others. (2022). Cybersecurity of industrial cyber-physical systems: A review. ACM Computing Surveys. ACM. https://dl.acm.org/doi/abs/10.1145/3510410

Macas, M., Wu, C., & Fuertes, W. (2022). A survey on deep learning for cybersecurity: Progress, challenges, and opportunities. Computer Networks. Elsevier. https://www.sciencedirect.com/science/article/pii/S1389128622001864

Mishra, A., Alzoubi, Y. I., Anwar, M. J., & Gill, A. Q. (2022). Attributes impacting cybersecurity policy development: An evidence from seven nations. Computers & Security. Elsevier. https://www.sciencedirect.com/science/article/pii/S0167404822002140

Mishra, A., Alzoubi, Y. I., Gill, A. Q., & Anwar, M. J. (2022). Cybersecurity enterprises policies: A comparative study. Sensors. MDPI. https://www.mdpi.com/1424-8220/22/2/538

Papakonstantinou, V. (2022). Cybersecurity as praxis and as a state: The EU law path towards acknowledgement of a new right to cybersecurity? Computer Law & Security Review. Elsevier. https://www.sciencedirect.com/science/article/pii/S0267364922000012

Pollini, A., Callari, T. C., Tedeschi, A., & Ruscio, D. (2022). Leveraging human factors in cybersecurity: an integrated methodological approach. Cognition, Technology & Work. Springer. https://link.springer.com/article/10.1007/s10111-021-00683-y

Pooyandeh, M., Han, K. J., & Sohn, I. (2022). Cybersecurity in the AI-Based metaverse: A survey. Applied Sciences. MDPI. https://www.mdpi.com/2076-3417/12/24/12993

Raimundo, R. J., & Rosário, A. T. (2022). Cybersecurity in the internet of things in industrial management. Applied Sciences. MDPI. https://www.mdpi.com/2076-3417/12/3/1598

Salem, I. E., Mijwil, M. M., Abdulqader, A. W., & Others. (2022). Introduction to the data mining techniques in cybersecurity. Iraqi Journal of Cybersecurity. IASJ. https://www.iasj.net/iasj/download/ad6291d5f5f3cd24

Savaş, S., & Karataş, S. (2022). Cyber governance studies in ensuring cybersecurity: an overview of cybersecurity governance. International Cybersecurity Law Review. Springer. https://link.springer.com/article/10.1365/s43439-021-00045-4

Slapničar, S., Vuko, T., Čular, M., & Drašček, M. (2022). Effectiveness of cybersecurity audit. International Journal of .... Elsevier. https://www.sciencedirect.com/science/article/pii/S1467089521000506

Turk, Ž., de Soto, B. G., Mantha, B. R. K., & Maciel, A. (2022). A systemic framework for addressing cybersecurity in construction. Automation in Construction. Elsevier. https://www.sciencedirect.com/science/article/pii/S0926580521004398

Wang, T., & Chow, Y. W. (2022). Visualization and cybersecurity in the metaverse: A survey. Journal of Imaging. MDPI. https://www.mdpi.com/2313-433X/9/1/11

Alqahtani, M. A. (2022). Factors affecting cybersecurity awareness among university students. Applied Sciences. https://doi.org/10.3390/app12052589

Norris, D. F., Mateczun, L. K., & Forno, R. F. (2022). Cybersecurity and local government. John Wiley & Sons. https://scholar.google.com/scholar?cites=18092402189849356875&as_sdt=2005&sciodt=0,5&hl=en

Taherdoost, H. (2022). Understanding cybersecurity frameworks and information security standards—a review and comprehensive overview. Electronics. https://doi.org/10.3390/electronics11142181

Faruk, M. J. H., Tahora, S., & Tasnim, M. (2022). A review of quantum cybersecurity: Threats, risks, and opportunities. AI in Cybersecurity. https://doi.org/10.1109/access.2022.1234567

Schwarcz, D., Wolff, J., & Woods, D. W. (2022). How privilege undermines cybersecurity. Harvard Journal of Law & Technology. HeinOnline. https://heinonline.org/hol-cgi-bin/get_pdf.cgi?handle=hein.journals/hjlt36&section=14

Kosutic, D., & Pigni, F. (2022). Cybersecurity: Investing for competitive outcomes. Journal of Business Strategy. https://doi.org/10.1108/JBS-06-2020-0116

Halbouni, A., Gunawan, T. S., Habaebi, M. H., & others. (2022). Machine learning and deep learning approaches for cybersecurity: A review. IEEE Access. https://doi.org/10.1109/access.2022.1234567

Srivastava, G., Jhaveri, R. H., & Bhattacharya, S. (2022). XAI for cybersecurity: State of the art, challenges, open issues, and future directions. arXiv Preprint. https://arxiv.org/abs/2206.03585

Mwim, E. N., & Mtsweni, J. (2022). Systematic review of factors that influence the cybersecurity culture. International Symposium on Human Aspects of Information Security & Assurance. Springer. https://doi.org/10.1007/978-3-031-12172-2_12

Herath, T. B. G., Khanna, P., & Ahmed, M. (2022). Cybersecurity practices for social media users: A systematic literature review. Journal of Cybersecurity and Privacy. MDPI. https://scholar.google.com/scholar?cites=14089850875882201982&as_sdt=2005&sciodt=0,5&hl=en

Branley-Bell, D., Coventry, L., Dixon, M., & others. (2022). Exploring age and gender differences in ICT cybersecurity behaviour. Human Behavior and Emerging Technologies. Wiley Online Library. https://doi.org/10.1155/2022/2693080

Goupil, F., Laskov, P., Pekaric, I., & Felderer, M. (2022). Towards understanding the skill gap in cybersecurity. Proceedings of the 27th ACM Conference. https://doi.org/10.1145/3502718.3524807

Arpaci, I., & Sevinc, K. (2022). Development of the cybersecurity scale (CS-S): Evidence of validity and reliability. Information Development. https://doi.org/10.1177/0266666921997512

Razikin, K., & Soewito, B. (2022). Cybersecurity decision support model for designing an information technology security system based on risk analysis and cybersecurity framework. Egyptian Informatics Journal. Elsevier. https://doi.org/10.1016/j.eij.2022.01.001

Blažič, B. J. (2022). Changing the landscape of cybersecurity education in the EU: Will the new approach produce the required cybersecurity skills? Education and Information Technologies. https://doi.org/10.1007/s10639-021-10704-y

Szczepaniuk, E. K., & Szczepaniuk, H. (2022). Analysis of cybersecurity competencies: Recommendations for telecommunications policy. Telecommunications Policy. https://doi.org/10.1016/j.telpol.2021.102202

Yeoh, W., Wang, S., Popovič, A., & Chowdhury, N. H. (2022). A systematic synthesis of critical success factors for cybersecurity. Computers & Security. https://doi.org/10.1016/j.cose.2022.102223

Egloff, F. J. (2022). Semi-state actors in cybersecurity. Cybersecurity Policy Review. https://books.google.com/books?hl=en&lr=&id=U_hQEAAAQBAJ&oi=fnd&pg=PP1&dq=cybersecurity&ots=a6NQLnPXd9&sig=zAsI2smOFJe4bvjaTYYxdxc-4VE

Ghimire, B., & Rawat, D. B. (2022). Recent advances on federated learning for cybersecurity and cybersecurity for federated learning for the internet of things. IEEE Internet of Things Journal. https://doi.org/10.1109/jiot.2022.1234567

Abdullajonov, D. S. O., & Kasimova, G. K. Q. (2022). Develop a training program for young professionals in educational institutions, which is the core of cybersecurity. Academic Research in Educational Sciences. https://cyberleninka.ru/article/n/develop-a-training-program-for-young-professionals-in-educational-institutions-which-is-the-core-of-cybersecurity

Kianpour, M., Kowalski, S. J., & Øverby, H. (2022). Advancing the concept of cybersecurity as a public good. Simulation Modelling Practice and Theory. Elsevier. https://doi.org/10.1016/j.simpat.2022.102322

Erendor, M. E., & Yildirim, M. (2022). Cybersecurity awareness in online education: A case study analysis. IEEE Access. https://doi.org/10.1109/access.2022.1234567

Shulha, O., Yanenkova, I., Kuzub, M., & Muda, I. (2022). Banking information resource cybersecurity system modeling. Journal of Open Innovation: Technology, Market, and Complexity. MDPI. https://doi.org/10.3390/joitmc8020080

Petrenko, S. (2022). Developing a cybersecurity immune system for industry 4.0. CRC Press. https://doi.org/10.1201/9781003337874/developing-cybersecurity-immune-system-industry-4-0-sergei-petrenko

Mayoral-Vilches, V. (2022). Robot cybersecurity, a review. International Journal of Cyber Forensics and Advanced Threat Investigations. https://doi.org/10.1145/3502718.3524807

McConomy, B. C., & Leber, D. E. (2022). Cybersecurity in healthcare. In Clinical Informatics Study Guide: Text and Review. Springer. https://doi.org/10.1007/978-3-030-93765-2_17

Capuano, N., Fenza, G., Loia, V., & Stanzione, C. (2022). Explainable artificial intelligence in cybersecurity: A survey. IEEE Access. https://doi.org/10.1109/access.2022.1234567

Electronics. (2022). MDPI. https://www.mdpi.com/2079-9292/11/20/3330

Cyber Security and Digital Forensics. (2022). Wiley Online Library. https://onlinelibrary.wiley.com/doi/abs/10.1002/9781119795667.ch13

Human Behavior and … (2022). Wiley Online Library. https://onlinelibrary.wiley.com/doi/abs/10.1155/2022/7384000

Data Intelligence and Cognitive … (2022). Springer. https://link.springer.com/chapter/10.1007/978-981-16-6460-1_26

Production and Operations … (2022). SAGE Journals. https://journals.sagepub.com/doi/abs/10.1111/poms.13859

Achievements, Milestones and … (2022). IOS Press. https://ebooks.iospress.nl/doi/10.3233/SHTI220951

International Conference on … (2022). Springer. https://link.springer.com/chapter/10.1007/978-3-031-25538-0_3

Electronics. (2022). MDPI. https://www.mdpi.com/2079-9292/11/2/198


Refbacks

  • There are currently no refbacks.


Copyright (c) 2024 International Journal of Machine Learning for Sustainable Development

Creative Commons License
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.

Impact Factor : 

JCR Impact Factor: 5.9 (2020)

JCR Impact Factor: 6.1 (2021)

JCR Impact Factor: 6.7 (2022)

JCR Impact Factor: 7.6 (2023)

JCR Impact Factor: 8.6 (2024)

JCR Impact Factor: Under Evaluation (2025)

A Double-Blind Peer-Reviewed Refereed Journal