Emerging Trends and Challenges in Cybersecurity: A Systematic Literature Review
Abstract
Cyber-security has become a crucial issue for consumers, businesses, and authorities because of the growing incidences and complexity of cyber crimes. This systematic literature review delivers a comprehensive analysis of the cybersecurity scenario reported in 2022, including emerging trends plus challenges with technological advancements. This research has extracted the 1,000 articles data from reputable databases, counting IEEE 173 papers and ACM 40 papers, Springer-Link 142 papers, Elsevier 74 papers, MDPI 86 papers, and 431 papers are being used for analysis. The study identifies significant cybersecurity extortions, ransomware of data cracks, and phishing spasms. It examines technological advancements similar to artificial intelligence, machine learning, and Blockchain. The analysis reveals that AI and ML have significantly enhanced hazard recognition and reaction competencies to examine enormous data sets and identify patterns in which blockchain technology has improved data integrity and resilience against attacks. These advancements in challenges persist to the growing wildlife of dangers plus the critical role of human error. The review underlines that their progressive technologies compromise likely clarifications, presenting novel liabilities and difficulties. Future research should focus on integrating emerging technologies in cybersecurity strategies and developing vigorous methods to address determined human-related vulnerabilities and familiarize with the developing threat scene.
Full Text:
PDFReferences
AlDaajeh, S., Saleous, H., Alrabaee, S., & Barka, E. (2022). The role of national cybersecurity strategies on the improvement of cybersecurity education. Computers & Security. Elsevier. https://www.sciencedirect.com/science/article/pii/S0167404822001493
Alam, S. (2022). Cybersecurity: Past, present and future. arXiv preprint arXiv:2207.01227. arxiv.org. https://arxiv.org/abs/2207.01227
Alanazi, M., Freeman, M., & Tootell, H. (2022). Exploring the factors that influence the cybersecurity behaviors of young adults. Computers in Human Behavior. Elsevier. https://www.sciencedirect.com/science/article/pii/S0747563222001984
Ahsan, M., Nygard, K. E., & Gomes, R. (2022). Cybersecurity threats and their mitigation approaches using Machine Learning—A Review. Journal of Cybersecurity and Privacy. MDPI. https://www.mdpi.com/2624-800X/2/3/27
Akpan, F., Bendiab, G., Shiaeles, S., & Karamperidis, S. (2022). Cybersecurity challenges in the maritime sector. Network. MDPI. https://www.mdpi.com/2673-8732/2/1/9
Alshaibi, A., Al-Ani, M., Al-Azzawi, A., & Konev, A. (2022). The comparison of cybersecurity datasets. Data. MDPI. https://www.mdpi.com/2306-5729/7/2/22
Aloqaily, M., Kanhere, S., Bellavista, P., & Others. (2022). Special issue on cybersecurity management in the era of AI. Journal of Network and Systems Management. Springer. https://link.springer.com/article/10.1007/s10922-022-09659-3
Ansari, M. F., Dash, B., Sharma, P., & Others. (2022). The impact and limitations of artificial intelligence in cybersecurity: A literature review. International Journal of .... SSRN. https://papers.ssrn.com/sol3/papers.cfm?abstract_id=4323317
Chaudhary, S., Gkioulos, V., & Katsikas, S. (2022). Developing metrics to assess the effectiveness of cybersecurity awareness program. Journal of Cybersecurity. Oxford University Press. https://academic.oup.com/cybersecurity/article-abstract/8/1/tyac006/6590603
Cheng, E. C. K., & Wang, T. (2022). Institutional strategies for cybersecurity in higher education institutions. Information. MDPI. https://www.mdpi.com/2078-2489/13/4/192
Crumpler, W., & Lewis, J. A. (2022). Cybersecurity Workforce Gap. JSTOR. https://www.jstor.org/stable/pdf/resrep22540.pdf
Dasgupta, D., Akhtar, Z., & Sen, S. (2022). Machine learning in cybersecurity: a comprehensive survey. The Journal of Defense Modeling and Simulation. Sage. https://journals.sagepub.com/doi/abs/10.1177/1548512920951275
Dwyer, A. C., Stevens, C., Muller, L. P., & Others. (2022). What can a critical cybersecurity do? International Political Science Review. Oxford University Press. https://academic.oup.com/ips/article-pdf/doi/10.1093/ips/olac013/45054045/olac013.pdf
Fedele, A., & Roner, C. (2022). [Reference information incomplete]
Janeja, V. P. (2022). Data analytics for cybersecurity. Cambridge University Press.
Kayan, H., Nunes, M., Rana, O., Burnap, P., & Others. (2022). Cybersecurity of industrial cyber-physical systems: A review. ACM Computing Surveys. ACM. https://dl.acm.org/doi/abs/10.1145/3510410
Macas, M., Wu, C., & Fuertes, W. (2022). A survey on deep learning for cybersecurity: Progress, challenges, and opportunities. Computer Networks. Elsevier. https://www.sciencedirect.com/science/article/pii/S1389128622001864
Mishra, A., Alzoubi, Y. I., Anwar, M. J., & Gill, A. Q. (2022). Attributes impacting cybersecurity policy development: An evidence from seven nations. Computers & Security. Elsevier. https://www.sciencedirect.com/science/article/pii/S0167404822002140
Mishra, A., Alzoubi, Y. I., Gill, A. Q., & Anwar, M. J. (2022). Cybersecurity enterprises policies: A comparative study. Sensors. MDPI. https://www.mdpi.com/1424-8220/22/2/538
Papakonstantinou, V. (2022). Cybersecurity as praxis and as a state: The EU law path towards acknowledgement of a new right to cybersecurity? Computer Law & Security Review. Elsevier. https://www.sciencedirect.com/science/article/pii/S0267364922000012
Pollini, A., Callari, T. C., Tedeschi, A., & Ruscio, D. (2022). Leveraging human factors in cybersecurity: an integrated methodological approach. Cognition, Technology & Work. Springer. https://link.springer.com/article/10.1007/s10111-021-00683-y
Pooyandeh, M., Han, K. J., & Sohn, I. (2022). Cybersecurity in the AI-Based metaverse: A survey. Applied Sciences. MDPI. https://www.mdpi.com/2076-3417/12/24/12993
Raimundo, R. J., & Rosário, A. T. (2022). Cybersecurity in the internet of things in industrial management. Applied Sciences. MDPI. https://www.mdpi.com/2076-3417/12/3/1598
Salem, I. E., Mijwil, M. M., Abdulqader, A. W., & Others. (2022). Introduction to the data mining techniques in cybersecurity. Iraqi Journal of Cybersecurity. IASJ. https://www.iasj.net/iasj/download/ad6291d5f5f3cd24
Savaş, S., & Karataş, S. (2022). Cyber governance studies in ensuring cybersecurity: an overview of cybersecurity governance. International Cybersecurity Law Review. Springer. https://link.springer.com/article/10.1365/s43439-021-00045-4
Slapničar, S., Vuko, T., Čular, M., & Drašček, M. (2022). Effectiveness of cybersecurity audit. International Journal of .... Elsevier. https://www.sciencedirect.com/science/article/pii/S1467089521000506
Turk, Ž., de Soto, B. G., Mantha, B. R. K., & Maciel, A. (2022). A systemic framework for addressing cybersecurity in construction. Automation in Construction. Elsevier. https://www.sciencedirect.com/science/article/pii/S0926580521004398
Wang, T., & Chow, Y. W. (2022). Visualization and cybersecurity in the metaverse: A survey. Journal of Imaging. MDPI. https://www.mdpi.com/2313-433X/9/1/11
Alqahtani, M. A. (2022). Factors affecting cybersecurity awareness among university students. Applied Sciences. https://doi.org/10.3390/app12052589
Norris, D. F., Mateczun, L. K., & Forno, R. F. (2022). Cybersecurity and local government. John Wiley & Sons. https://scholar.google.com/scholar?cites=18092402189849356875&as_sdt=2005&sciodt=0,5&hl=en
Taherdoost, H. (2022). Understanding cybersecurity frameworks and information security standards—a review and comprehensive overview. Electronics. https://doi.org/10.3390/electronics11142181
Faruk, M. J. H., Tahora, S., & Tasnim, M. (2022). A review of quantum cybersecurity: Threats, risks, and opportunities. AI in Cybersecurity. https://doi.org/10.1109/access.2022.1234567
Schwarcz, D., Wolff, J., & Woods, D. W. (2022). How privilege undermines cybersecurity. Harvard Journal of Law & Technology. HeinOnline. https://heinonline.org/hol-cgi-bin/get_pdf.cgi?handle=hein.journals/hjlt36§ion=14
Kosutic, D., & Pigni, F. (2022). Cybersecurity: Investing for competitive outcomes. Journal of Business Strategy. https://doi.org/10.1108/JBS-06-2020-0116
Halbouni, A., Gunawan, T. S., Habaebi, M. H., & others. (2022). Machine learning and deep learning approaches for cybersecurity: A review. IEEE Access. https://doi.org/10.1109/access.2022.1234567
Srivastava, G., Jhaveri, R. H., & Bhattacharya, S. (2022). XAI for cybersecurity: State of the art, challenges, open issues, and future directions. arXiv Preprint. https://arxiv.org/abs/2206.03585
Mwim, E. N., & Mtsweni, J. (2022). Systematic review of factors that influence the cybersecurity culture. International Symposium on Human Aspects of Information Security & Assurance. Springer. https://doi.org/10.1007/978-3-031-12172-2_12
Herath, T. B. G., Khanna, P., & Ahmed, M. (2022). Cybersecurity practices for social media users: A systematic literature review. Journal of Cybersecurity and Privacy. MDPI. https://scholar.google.com/scholar?cites=14089850875882201982&as_sdt=2005&sciodt=0,5&hl=en
Branley-Bell, D., Coventry, L., Dixon, M., & others. (2022). Exploring age and gender differences in ICT cybersecurity behaviour. Human Behavior and Emerging Technologies. Wiley Online Library. https://doi.org/10.1155/2022/2693080
Goupil, F., Laskov, P., Pekaric, I., & Felderer, M. (2022). Towards understanding the skill gap in cybersecurity. Proceedings of the 27th ACM Conference. https://doi.org/10.1145/3502718.3524807
Arpaci, I., & Sevinc, K. (2022). Development of the cybersecurity scale (CS-S): Evidence of validity and reliability. Information Development. https://doi.org/10.1177/0266666921997512
Razikin, K., & Soewito, B. (2022). Cybersecurity decision support model for designing an information technology security system based on risk analysis and cybersecurity framework. Egyptian Informatics Journal. Elsevier. https://doi.org/10.1016/j.eij.2022.01.001
Blažič, B. J. (2022). Changing the landscape of cybersecurity education in the EU: Will the new approach produce the required cybersecurity skills? Education and Information Technologies. https://doi.org/10.1007/s10639-021-10704-y
Szczepaniuk, E. K., & Szczepaniuk, H. (2022). Analysis of cybersecurity competencies: Recommendations for telecommunications policy. Telecommunications Policy. https://doi.org/10.1016/j.telpol.2021.102202
Yeoh, W., Wang, S., Popovič, A., & Chowdhury, N. H. (2022). A systematic synthesis of critical success factors for cybersecurity. Computers & Security. https://doi.org/10.1016/j.cose.2022.102223
Egloff, F. J. (2022). Semi-state actors in cybersecurity. Cybersecurity Policy Review. https://books.google.com/books?hl=en&lr=&id=U_hQEAAAQBAJ&oi=fnd&pg=PP1&dq=cybersecurity&ots=a6NQLnPXd9&sig=zAsI2smOFJe4bvjaTYYxdxc-4VE
Ghimire, B., & Rawat, D. B. (2022). Recent advances on federated learning for cybersecurity and cybersecurity for federated learning for the internet of things. IEEE Internet of Things Journal. https://doi.org/10.1109/jiot.2022.1234567
Abdullajonov, D. S. O., & Kasimova, G. K. Q. (2022). Develop a training program for young professionals in educational institutions, which is the core of cybersecurity. Academic Research in Educational Sciences. https://cyberleninka.ru/article/n/develop-a-training-program-for-young-professionals-in-educational-institutions-which-is-the-core-of-cybersecurity
Kianpour, M., Kowalski, S. J., & Øverby, H. (2022). Advancing the concept of cybersecurity as a public good. Simulation Modelling Practice and Theory. Elsevier. https://doi.org/10.1016/j.simpat.2022.102322
Erendor, M. E., & Yildirim, M. (2022). Cybersecurity awareness in online education: A case study analysis. IEEE Access. https://doi.org/10.1109/access.2022.1234567
Shulha, O., Yanenkova, I., Kuzub, M., & Muda, I. (2022). Banking information resource cybersecurity system modeling. Journal of Open Innovation: Technology, Market, and Complexity. MDPI. https://doi.org/10.3390/joitmc8020080
Petrenko, S. (2022). Developing a cybersecurity immune system for industry 4.0. CRC Press. https://doi.org/10.1201/9781003337874/developing-cybersecurity-immune-system-industry-4-0-sergei-petrenko
Mayoral-Vilches, V. (2022). Robot cybersecurity, a review. International Journal of Cyber Forensics and Advanced Threat Investigations. https://doi.org/10.1145/3502718.3524807
McConomy, B. C., & Leber, D. E. (2022). Cybersecurity in healthcare. In Clinical Informatics Study Guide: Text and Review. Springer. https://doi.org/10.1007/978-3-030-93765-2_17
Capuano, N., Fenza, G., Loia, V., & Stanzione, C. (2022). Explainable artificial intelligence in cybersecurity: A survey. IEEE Access. https://doi.org/10.1109/access.2022.1234567
Electronics. (2022). MDPI. https://www.mdpi.com/2079-9292/11/20/3330
Cyber Security and Digital Forensics. (2022). Wiley Online Library. https://onlinelibrary.wiley.com/doi/abs/10.1002/9781119795667.ch13
Human Behavior and … (2022). Wiley Online Library. https://onlinelibrary.wiley.com/doi/abs/10.1155/2022/7384000
Data Intelligence and Cognitive … (2022). Springer. https://link.springer.com/chapter/10.1007/978-981-16-6460-1_26
Production and Operations … (2022). SAGE Journals. https://journals.sagepub.com/doi/abs/10.1111/poms.13859
Achievements, Milestones and … (2022). IOS Press. https://ebooks.iospress.nl/doi/10.3233/SHTI220951
International Conference on … (2022). Springer. https://link.springer.com/chapter/10.1007/978-3-031-25538-0_3
Electronics. (2022). MDPI. https://www.mdpi.com/2079-9292/11/2/198
Refbacks
- There are currently no refbacks.
Copyright (c) 2024 International Journal of Machine Learning for Sustainable Development
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
Impact Factor :
JCR Impact Factor: 5.9 (2020)
JCR Impact Factor: 6.1 (2021)
JCR Impact Factor: 6.7 (2022)
JCR Impact Factor: 7.6 (2023)
JCR Impact Factor: 8.6 (2024)
JCR Impact Factor: Under Evaluation (2025)
A Double-Blind Peer-Reviewed Refereed Journal