Cybersecurity Policy Research Driven by Data
DOI:
https://doi.org/10.54097/gq20zb80Keywords:
Cyber Security Policy, Cluster Analysis, Time Series Analysis, DID Model, Multiple Linear RegressionAbstract
To support data-driven national cybersecurity policy formulation, we developed a multidimensional analytical framework focusing on global cybercrime distribution, policy effectiveness, and the correlation between demographic characteristics and criminal patterns. First, we collected authoritative data from multiple sources including the International Telecommunication Union (ITU) and conducted preprocessing. Using a K-means clustering model based on Euclidean distance with Python tools, we revealed the global distribution patterns of cybercrime. Second, by integrating time series analysis with Difference-in-Differences (DID) models, we visualized changes in policy-related indicators before and after implementation, quantified policy impacts, and identified key effective policies. Finally, we constructed a multiple linear regression model incorporating interaction effects to visualize correlations between demographic factors and cybercrime, utilizing statsmodels tools for precise predictions. This study demonstrates how the integration of multi-methods and efficient computation provides scientific decision-making support for optimizing cybersecurity policies and global cybersecurity governance.
Downloads
References
[1] Zhang K, Liu T C, Jiang L X. A Greedy Randomized Block Coordinate Descent Algorithm with k-means Clustering for Solving Large Linear Least-squares Problems[J].IAENG International Journal of Computer Science,2024,51(5).
[2] Simonsen S, Baden C. Migration on digital news platforms: Using large-scale digital text analysis and time-series to estimate the effects of socioeconomic data on migration content[J]. Communications,2025,50(4):908-929.DOI: 10. 1515/ COMMUN-2024-0011.
[3] Xingyao Z, Nana W, Juaner Z , et al.Synergy effect evaluation of coal and electricity joint venture based on DID model [J]. Energy Reports,2022,8(S7):198-209.DOI:10. 1016/J. EGYR. 2022. 05.080.
[4] Yang A J, Lee Y. Performance Improvement of a Multiple Linear Regression-Based Storm Surge Height Prediction Model Using Data Resampling Techniques[J].Journal of Marine Science and Engineering,2025,13(11):2173-2173. DOI: 10.3390/JMSE13112173.
[5] Yao J, Liu X, Wu X, et al.High-precision time delay compensation to achieve a low noise floor in fiber-optic interferometers by using linear interpolation[J].Optics Communications, 2025,592132210-132210. DOI:10.1016/J. OPTCOM. 2025.132210.
[6] Kalpanarani K, Grace H G. A Statistical Test Based Separability Measure for Internal Cluster Validation[J].Neural Processing Letters,2025,57(6):95-95.DOI:10.1007/S11063-025-11761-X.
[7] Riccardo K, Fabian S D A, Stephanie W, et al. Z-score mapping for standardized analysis and reporting of cardiovascular magnetic resonance modified Look-Locker inversion recovery (MOLLI) T1 data: Normal behavior and validation in patients with amyloidosis.[J].Journal of cardiovascular magnetic resonance : official journal of the Society for Cardiovascular Magnetic Resonance,2020,22(1):6.DOI:10.1186/s12968-019-0595-7.
[8] Jawad M, Nazir S, Islam S M. Examining exchange rate bubbles in Pakistan: application of sequential ADF tests[J].SN Business & Economics,2025,5(9):128-128.DOI:10.1007/ S43 546-025-00896-7.
[9] Zhou R, Qiu S, Li M, et al. Short-Term Air Traffic Flow Prediction Based on CEEMD-LSTM of Bayesian Optimization and Differential Processing[J]. Electronics, 2024,13(10): DOI: 10.3390/ELECTRONICS13101896.
Downloads
Published
Issue
Section
License
Copyright (c) 2025 Frontiers in Computing and Intelligent Systems

This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.

