A Study on Cybercrime Policy Analysis Based On K-Means++ Clustering and TOPSIS Modeling
DOI:
https://doi.org/10.54097/q2w6s474Keywords:
K-Means++ Clustering, Logistic Regression, TOPSIS, LSTM, Correlation Analysis.Abstract
As modern technology advances, more and more of our world is interconnected through the Internet, but it has also increased our individual and collective risk of cybercrime. This paper uses modelling to find policies that are effective in curbing cybercrime. Firstly, this article utilized the K-Means++ clustering algorithm to classify countries into five categories based on the cybercrime rates, then this article uses Logistic regression to study the impact of prosecution and reporting on the cybercrime situation. Secondly, in order to explore the model that can identify the effectiveness of relevant policies, this article constructed a Combined Empowerment - TOPSIS model for assessing the effectiveness of the policies and finally get the most effective policies to solve cybercrime in different categories of countries. After that a Pearson correlation analysis of the different policies is performed to explore synergies between policies. Finally, in order to make theory complete and scientific, this article looked for four demographic features: internet coverage (%), wealth (GDP per capita), education level, and population happiness index, predicted the above four indicators as well as the cybercrime rate through the LSTM algorithm, and combined them with the historical data to perform a comprehensive Spearman correlation analysis, and then united the results of the analysis into theory.
Downloads
References
[1] Karim A, Shahroz M, Mustofa K, et al. Phishing Detection System Through Hybrid Machine Learning Based on URL [J]. IEEE Access, 2023, 11: 36805-36822.
[2] Chang C C. Automation of reversible steganographic coding with nonlinear discrete optimisation [J]. Connection Science, 2022, 34(1): 1719-1735.
[3] Carvalho J V, Carvalho S, Rocha A. European strategy and legislation for cybersecurity: implications for Portugal [J]. Cluster Computing-the Journal of Networks Software Tools and Applications, 2020, 23(3): 1845-1854.
[4] Ma Guang Z S. Study on the international law regulation of transnational cybercrime -- from the perspective of international conventions, jurisdiction, and soft law norms [J]. Korea Law Review, 2020, 98: 163-198.
[5] Althibyani H A, Al-Zahrani A M. Investigating the Effect of Students’ Knowledge, Beliefs, and Digital Citizenship Skills on the Prevention of Cybercrime [J]. Sustainability, 2023, 15(15).
[6] Bruce M, Lusthaus J, Kashyap R, et al. Mapping the global geography of cybercrime with the World Cybercrime Index [J]. Plos One, 2024, 19(4).
[7] Chen S, Hao M M, Ding F Y, et al. Exploring the global geography of cybercrime and its driving forces [J]. Humanities & Social Sciences Communications, 2023, 10(1).
[8] Zhang X, Wang S Q, Chen H, et al. Risk Assessment of Karst Tunnel Water Inrush Based on Combined Weighting Method [J]. Tehnicki Vjesnik-Technical Gazette, 2025, 32(1): 157-164.
[9] Khan S, Saleh T, Dorasamy M, et al. A systematic literature review on cybercrime legislation [J]. F1000Research, 2022, 11: 971.
[10] Popham J, Mccluskey M, Ouellet M, et al. Exploring police-reported cybercrime in Canada variation and correlates [J]. Policing-an International Journal of Police Strategies & Management, 2020, 43(1): 35-48.
[11] Joo M, Hun-Yeong K, In L J. Cyber Security Governance Analysis in Major Countries and Policy Implications [J]. Journal of The Korea Institute of Information Security and Cryptology, 2018, 28(5): 1259-1277.
[12] Hong Y, Neilson W. Cybercrime and Punishment [J]. Journal of Legal Studies, 2020, 49(2): 431-466.
Downloads
Published
Issue
Section
License
Copyright (c) 2025 Highlights in Science, Engineering and Technology

This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.







