Cybercrime Investigation: Modern Trends, Challenges, and the Role of Digital Evidence
DOI:
https://doi.org/10.69980/zpkbaw28Keywords:
Cybercrime Investigation, Digital Evidence, Cybersecurity, Digital Transformation, Sustainable EntrepreneurshipAbstract
The rapid digital transformation of business environments has created new opportunities for innovation, entrepreneurship, and global economic integration. However, the increasing reliance on digital infrastructures has also intensified exposure to cyber threats that affect organisations, particularly small and medium-sized enterprises (SMEs). Cybercrime activities such as phishing, ransomware attacks, financial fraud, and data breaches have become major challenges for digital economies and entrepreneurial ecosystems. This review paper examines modern trends in cybercrime affecting digital businesses and explores the role of cybercrime investigation in addressing these emerging threats. The study synthesises existing literature on digital transformation, cybercrime patterns, investigative technologies, and digital evidence management. It highlights the importance of digital forensics, artificial intelligence, blockchain analysis, and open-source intelligence as critical tools in modern cybercrime investigations. The paper also discusses major challenges faced by investigators, including cross-border jurisdictional issues, technological anonymity, regulatory limitations, and resource constraints in developing economies. Furthermore, the review emphasises the implications of cybercrime for sustainable entrepreneurship and digital economic development. Strengthening cybersecurity governance, improving digital literacy, and promoting collaboration between public and private sectors are identified as key strategies for enhancing cyber resilience. The study concludes that integrating advanced investigative technologies with effective governance frameworks is essential for combating cybercrime and protecting digital ecosystems in the evolving digital economy.
References
1.Junior, C. R., Becker, I., & Johnson, S. (2023). Unaware, unfunded and uneducated: A systematic review of SME cybersecurity. arXiv preprint arXiv:2309.17186.
2.Benjamin, L. B., Adegbola, A. E., Amajuoyi, P., Adegbola, M. D., & Adeusi, K. B. (2024). Digital transformation in SMEs: Identifying cybersecurity risks and developing effective mitigation strategies. Global Journal of Engineering and Technology Advances, 19(2), 134-153.
3.Awan, M., Alam, A., & Kamran, M. (2025). Cybersecurity challenges in small and medium enterprises: A scoping review. Journal of Cyber Security and Risk, 2025(3), 89-102.
4.Arifin, M. S. M., Radzi, S. M., Nawi, N. A. M. M., Rosman, M. R. M., & Alimin, N. A. (2025). Cybersecurity Threats among SMEs in Malaysia: Risks and Challenges. Journal of Information and Knowledge Management, 15(SI1).
5.Saeed, S., Altamimi, S. A., Alkayyal, N. A., Alshehri, E., & Alabbad, D. A. (2023). Digital transformation and cybersecurity challenges for businesses resilience: Issues and recommendations. Sensors, 23(15), 6666.
6.Perozzo, H., Zaghloul, F., & Ravarini, A. (2022). CyberSecurity readiness: a model for SMEs based on the socio-technical perspective. Complex Systems Informatics and Modeling Quarterly, (33), 53-66.
7.Ullah, M. S., Ahsan, M., & Yaqub, N. (2025). AI-Enabled Cybersecurity for Small and Medium-Sized Enterprises (SMEs): A Systematic Review and Evidence-Informed Assessment Framework. Journal of Computing & Biomedical Informatics.
8.AL-Dosari, K., & Fetais, N. (2023). Risk-management framework and information-security systems for small and medium enterprises (SMES): A meta-analysis approach. Electronics, 12(17), 3629.
9.Chang, Y., Heller, O., Shlomo, Y., Bar-Noy, I., Bokobza, E., Grinstein-Weiss, M., & Zhang, N. (2025). Mind the gap: Revealing security barriers through situational awareness of small and medium business key decision-makers. arXiv preprint arXiv:2506.10025.
10.Jasiak, J., MacKenzie, P., & Tuvaandorj, P. (2025). Digital Adoption and Cyber Security: An Analysis of Canadian Businesses. arXiv preprint arXiv:2504.12413.
11.Bada, M., & Nurse, J. R. (2019). Developing cybersecurity education and awareness programmes for small-and medium-sized enterprises (SMEs). Information & Computer Security, 27(3), 393-410.
12.Thakur, R., Kumar, S., Singh, S. K., Singla, K., Sharma, S. K., & Arya, V. (2024). Cyber Synergy: Unlocking the Potential Use of Biometric Systems and Multimedia Forensics in Cybercrime Investigations. In Digital Forensics and Cyber Crime Investigation (pp. 241-267). CRC Press.
13.Ţurcan, R., Ţurcan, I., & Stratila, A. (2022). The impact of digitalization on the development of entrepreneurial performance in the context of globalization. In European integration through the strengthening of education, research, innovations in Eastern Partnership Countries (pp. 165-171).
14.Kraus, S., Durst, S., Ferreira, J. J., Veiga, P., Kailer, N., & Weinmann, A. (2022). Digital transformation in business and management research: An overview of the current status quo. International journal of information management, 63, 102466.
15.Nambisan, S., Wright, M., & Feldman, M. (2019). The digital transformation of innovation and entrepreneurship: Progress, challenges and key themes. Research policy, 48(8), 103773.
16.Sussan, F., & Acs, Z. J. (2017). The digital entrepreneurial ecosystem. Small business economics, 49(1), 55-73.
17.Onwuadiamu, G. (2025). Cybercrime in criminology; A systematic review of criminological theories, methods, and concepts. Journal of Economic Criminology, 8, 100136.
18.Kshetri, N. (2016). Cybercrime and cybersecurity in India: causes, consequences and implications for the future. Crime, Law and Social Change, 66(3), 313-338.
19.Broadhurst, R., Grabosky, P., Alazab, M., Bouhours, B., & Chon, K. H. (2013). Organizations and cybercrime.
20.Paquet-Clouston, M., Haslhofer, B., & Dupont, B. (2019). Ransomware payments in the bitcoin ecosystem. Journal of Cybersecurity, 5(1), tyz003.
21.Europol, E. C. C. (2014). Internet organised crime threat assessment (IOCTA). The Hague, Lyon, 45-67.
22.Song, A. K. (2019). The digital entrepreneurial ecosystem—a critique and reconfiguration. Small Business Economics, 53(3), 569-590.
23.Hardinanto, A., Arief, B. N., & Setiyono, J. (2023). The Significance of Computer Forensics in Electronic Documents as Evidence in Criminal Law. Jurnal Cakrawala Hukum, 14(2), 155-166.
24.Magalhães-Timotio, J. G., Barbosa, F. V., & Ferreira, B. P. (2022). Constructing a composite financial inclusion index for Brazil. Revista Gestão & Tecnologia, 22(1), 168-192.
25.Yadav, A., Kumar, A., & Singh, V. (2023). Open-source intelligence: a comprehensive review of the current state, applications and future perspectives in cyber security. Artificial Intelligence Review, 56(11), 12407-12438.
26.Zainudin, N. M., Hasbullah, N. A., Wook, M., Ramli, S., & Razali, N. A. M. (2024). Digital Forensic Readiness in Cybersecurity: A Review of the Literature and Identification of Knowledge Gaps. Zulfaqar Journal of Defence Science, Engineering & Technology, 7(1).
27.ALkharabsheh, M. M., Alshraideh, M., & Salah, I. (2024). Enhancing Cybercrime Deterrence with Artificial Intelligence. International Journal of Advanced Networking and Applications, 15(4), 6015-6027.
28.Odejayi, R. O. (2023). Cyber Security Management: The Security Implications of the Digital Economy Across Sub-Saharan Africa Countries (Doctoral dissertation, Mykolo Romerio universitetas.).
29.Amoo, O. O., Atadoga, A., Abrahams, T. O., Farayola, O. A., Osasona, F., & Ayinla, B. S. (2024). The legal landscape of cybercrime: A review of contemporary issues in the criminal justice system. World Journal of Advanced Research and Reviews, 21(2), 205-217.
30.Broadhurst, R., & Chang, L. Y. (2012). Cybercrime in Asia: trends and challenges. Handbook of Asian criminology, 49-63.
31.Lee, J. R., Ayerza, J. M., Lee, W. G., Jadidi, V., & Holt, T. J. (2025). 11. Cybercrime: Offending and Victimization during the COVID-19 Pandemic. Crime, Corrections, and the COVID-19 Pandemic: Responses and Adaptations in the US Criminal Justice System, 211.
32.Świątkowska, J. (2020). Tackling cybercrime to unleash developing countries’ digital potential. Pathways for Prosperity Commission Background Paper Series, 33, 2020-01.
33.Do, T. H., & Selvadurai, N. (2025). Future Crime: A Theoretical Foundation for Designing Effective Cybercrime Laws in the Age of AI and Ransomware. NCJL & Tech., 27, 91.
34.Kyslenko, D., Kyslyi, A., & Tymoshenko, Y. (2024). The Effect of Regulatory Requirements on Digital Evidence Handling in Cybercrime Investigations. Review of Law and Social Sciences, 2(1), 9-22.
35.Shami, A. Z. A., Saleem, M., & Ashraf, J. (2025). Cybercrime and Digital Evidence: Investigating the Challenges and Opportunities in Prosecuting Cybercrime and Handling Digital Evidence. Research Consortium Archive, 3(2), 401-411.
36.Yeboah-Ofori, A., & Brown, A. D. (2020). Digital forensics investigation jurisprudence: issues of admissibility of digital evidence. Journal of Forensic, Legal & Investigative Sciences, 6(1), 1-8.
37.Satpathy, S., Mallick, C., & Pradhan, S. K. (2018). Big data computing application in digital forensics investigation and cyber security. International Journal of Computer Science and Mobile Applications, 129-136.
38.Sulich, A., Rutkowska, M., Krawczyk-Jezierska, A., Jezierski, J., & Zema, T. (2021). Cybersecurity and sustainable development. Procedia computer science, 192, 20-28.
39.Nicolau, C., Nichifor, E., Munteanu, D., & Bărbulescu, O. (2022). Decoding business potential for digital sustainable entrepreneurship: what Romanian entrepreneurs think and do for the future. Sustainability, 14(20), 13636.
40.Troise, C., Corvello, V., Ghobadian, A., & O'Regan, N. (2022). How can SMEs successfully navigate VUCA environment: The role of agility in the digital transformation era. Technological Forecasting and Social Change, 174, 121227.
41.Arshi, A. S., Islam, S., Tamanna, A. Y., Sultana, S., & Ikram, S. B. (2024). Fintech for Sustainability in Business and Economics Research: Trends and Future Agendas. Business Perspective Review, 6(1), 34-53.
42.Möller, D. P. (2023). NIST cybersecurity framework and MITRE cybersecurity criteria. In Guide to cybersecurity in digital transformation: Trends, methods, technologies, applications and best practices (pp. 231-271). Cham: Springer Nature Switzerland.
43.Spanou, D. (2024). The EU Cybersecurity Skills Academy: A silver bullet to address the cyber security skills gap in the European Union?. Cyber Security: A Peer-Reviewed Journal, 7(3), 229-236.
44.Von Solms, R., & Van Niekerk, J. (2013). From information security to cyber security. computers & security, 38, 97-102.
45.Bada, A., Sasse, M. A., & Nurse, J. R. (2015). Cybersecurity awareness campaigns: Why do they fail. Journal of Cyber Policy, 1(2), 157-179.



