Cybersecurity Policy Research Driven by Data

Authors

  • Xiaodie Hu
  • Yuzhu Du
  • Yingying Feng
  • Zhifu Jia

DOI:

https://doi.org/10.54097/gq20zb80

Keywords:

Cyber Security Policy, Cluster Analysis, Time Series Analysis, DID Model, Multiple Linear Regression

Abstract

To support data-driven national cybersecurity policy formulation, we developed a multidimensional analytical framework focusing on global cybercrime distribution, policy effectiveness, and the correlation between demographic characteristics and criminal patterns. First, we collected authoritative data from multiple sources including the International Telecommunication Union (ITU) and conducted preprocessing. Using a K-means clustering model based on Euclidean distance with Python tools, we revealed the global distribution patterns of cybercrime. Second, by integrating time series analysis with Difference-in-Differences (DID) models, we visualized changes in policy-related indicators before and after implementation, quantified policy impacts, and identified key effective policies. Finally, we constructed a multiple linear regression model incorporating interaction effects to visualize correlations between demographic factors and cybercrime, utilizing statsmodels tools for precise predictions. This study demonstrates how the integration of multi-methods and efficient computation provides scientific decision-making support for optimizing cybersecurity policies and global cybersecurity governance.

Downloads

Download data is not yet available.

References

[1] Zhang K, Liu T C, Jiang L X. A Greedy Randomized Block Coordinate Descent Algorithm with k-means Clustering for Solving Large Linear Least-squares Problems[J].IAENG International Journal of Computer Science,2024,51(5).

[2] Simonsen S, Baden C. Migration on digital news platforms: Using large-scale digital text analysis and time-series to estimate the effects of socioeconomic data on migration content[J]. Communications,2025,50(4):908-929.DOI: 10. 1515/ COMMUN-2024-0011.

[3] Xingyao Z, Nana W, Juaner Z , et al.Synergy effect evaluation of coal and electricity joint venture based on DID model [J]. Energy Reports,2022,8(S7):198-209.DOI:10. 1016/J. EGYR. 2022. 05.080.

[4] Yang A J, Lee Y. Performance Improvement of a Multiple Linear Regression-Based Storm Surge Height Prediction Model Using Data Resampling Techniques[J].Journal of Marine Science and Engineering,2025,13(11):2173-2173. DOI: 10.3390/JMSE13112173.

[5] Yao J, Liu X, Wu X, et al.High-precision time delay compensation to achieve a low noise floor in fiber-optic interferometers by using linear interpolation[J].Optics Communications, 2025,592132210-132210. DOI:10.1016/J. OPTCOM. 2025.132210.

[6] Kalpanarani K, Grace H G. A Statistical Test Based Separability Measure for Internal Cluster Validation[J].Neural Processing Letters,2025,57(6):95-95.DOI:10.1007/S11063-025-11761-X.

[7] Riccardo K, Fabian S D A, Stephanie W, et al. Z-score mapping for standardized analysis and reporting of cardiovascular magnetic resonance modified Look-Locker inversion recovery (MOLLI) T1 data: Normal behavior and validation in patients with amyloidosis.[J].Journal of cardiovascular magnetic resonance : official journal of the Society for Cardiovascular Magnetic Resonance,2020,22(1):6.DOI:10.1186/s12968-019-0595-7.

[8] Jawad M, Nazir S, Islam S M. Examining exchange rate bubbles in Pakistan: application of sequential ADF tests[J].SN Business & Economics,2025,5(9):128-128.DOI:10.1007/ S43 546-025-00896-7.

[9] Zhou R, Qiu S, Li M, et al. Short-Term Air Traffic Flow Prediction Based on CEEMD-LSTM of Bayesian Optimization and Differential Processing[J]. Electronics, 2024,13(10): DOI: 10.3390/ELECTRONICS13101896.

Downloads

Published

29-12-2025

Issue

Section

Articles

How to Cite

Hu, X., Du, Y., Feng, Y., & Jia, Z. (2025). Cybersecurity Policy Research Driven by Data. Frontiers in Computing and Intelligent Systems, 14(3), 29-43. https://doi.org/10.54097/gq20zb80