Research Article

Cybersecurity in the Digital Age: Protecting Individuals and Organizations from Emerging Threats

by  Jerome Ofori-Kyeremeh, Kingsley Ofori, Isaac Okrah, Leo Ofori-Kyeremeh
journal cover
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 187 - Issue 73
Published: January 2026
Authors: Jerome Ofori-Kyeremeh, Kingsley Ofori, Isaac Okrah, Leo Ofori-Kyeremeh
10.5120/ijca2026926225
PDF

Jerome Ofori-Kyeremeh, Kingsley Ofori, Isaac Okrah, Leo Ofori-Kyeremeh . Cybersecurity in the Digital Age: Protecting Individuals and Organizations from Emerging Threats. International Journal of Computer Applications. 187, 73 (January 2026), 39-41. DOI=10.5120/ijca2026926225

                        @article{ 10.5120/ijca2026926225,
                        author  = { Jerome Ofori-Kyeremeh,Kingsley Ofori,Isaac Okrah,Leo Ofori-Kyeremeh },
                        title   = { Cybersecurity in the Digital Age: Protecting Individuals and Organizations from Emerging Threats },
                        journal = { International Journal of Computer Applications },
                        year    = { 2026 },
                        volume  = { 187 },
                        number  = { 73 },
                        pages   = { 39-41 },
                        doi     = { 10.5120/ijca2026926225 },
                        publisher = { Foundation of Computer Science (FCS), NY, USA }
                        }
                        %0 Journal Article
                        %D 2026
                        %A Jerome Ofori-Kyeremeh
                        %A Kingsley Ofori
                        %A Isaac Okrah
                        %A Leo Ofori-Kyeremeh
                        %T Cybersecurity in the Digital Age: Protecting Individuals and Organizations from Emerging Threats%T 
                        %J International Journal of Computer Applications
                        %V 187
                        %N 73
                        %P 39-41
                        %R 10.5120/ijca2026926225
                        %I Foundation of Computer Science (FCS), NY, USA
Abstract

Digital transformation has reshaped how individuals, businesses, and governments operate, but it has also widened the avenues through which cyberattacks occur. As cloud computing, artificial intelligence (AI), and interconnected digital systems expand, cybercriminals have adopted increasingly sophisticated techniques that challenge traditional defenses. This paper examines the nature of emerging cyber threats and analyzes how modern security frameworks including Zero-Trust Architecture, socio-technical systems theory, and adaptive security models can support more resilient protection strategies. By reviewing recent empirical studies and synthesizing current scholarship (2020-2025), this work identifies the main technological, behavioral, and structural factors shaping today’s cyber risks. Notable research gaps include the limited real-world testing of AI-driven security tools, the lack of unified frameworks integrating human and automated defenses, and the underrepresentation of developing countries in cybersecurity research. The paper concludes with recommendations for strengthening security readiness at both individual and organizational levels.

References
  • Al-Dhaqm, A., Omar, M., Hashem, I. A. T., & Al-Qurishi, M. (2022). Digital forensics and cybersecurity challenges in the era of big data and artificial intelligence. IEEE Access, 10, 9551–9570. https://doi.org/10.1109/ACCESS.2022.3142883
  • Alam, F., Mehmood, R., Katib, I., & Albeshri, A. (2021). Data fusion and IoT for smart cybersecurity frameworks. Future Generation Computer Systems, 118, 147–158. https://doi.org/10.1016/j.future.2021.01.010
  • Anwar, M., He, W., Ash, I., & Tsai, W. (2023). Factors influencing organizational cybersecurity behavior. Computers & Security, 132, 103346. https://doi.org/10.1016/j.cose.2023.103346
  • Artificial Intelligence Review. (2025). Bibliometric analysis of artificial intelligence cyberattack detection models. Artificial Intelligence Review, 58, 177. https://doi.org/10.1007/s10462-025-11167-0
  • Faruqi, F. A., Zia, T., & Pranggono, B. (2022). Zero Trust security in cloud environments: A systematic review. Journal of Cloud Computing, 11(57). https://doi.org/10.1186/s13677-022-00327-8
  • Ghafir, I., Prenosil, V., Hammoudeh, M., & Baker, T. (2021). Security threats classification using MITRE ATT&CK. Computers, 10(7), 85. https://doi.org/10.3390/computers10070085
  • Kraemer-Muñoz, C., Buentello-Wong, W., & Balderas, A. (2023). Cyber threats, ransomware evolution, and global security. Sensors, 23(9), 4211. https://doi.org/10.3390/s23094211
  • Panchal, B., & Shukla, A. (2021). Socio-technical cybersecurity model for digital transformation. International Journal of Information Management, 58, 102315. https://doi.org/10.1016/j.ijinfomgt.2021.102315
  • Salem, A. H., Azzam, S. M., Emam, O. E., & Abohany, A. A. (2024). Advancing cybersecurity: A comprehensive review of AI-driven detection techniques. Journal of Big Data, 11(105). https://doi.org/10.1186/s40537-024-00957-y
  • Tonhauser, D., Bogatinovski, J., Wiesmaier, A., & Simos, D. E. (2023). Cybersecurity automation in countering cyberattacks. Transportation Research Procedia, 74, 1360–1365. https://doi.org/10.1016/j.trpro.2023.11.283.
  • Varga, S., Sommestad, T., & Brynielsson, J. (2023). Automation of cybersecurity work. In T. Sipola et al. (Eds.), Artificial Intelligence and Cybersecurity (pp. 59–80). Springer. https://doi.org/10.1007/978-3-031-15030-2_4
Index Terms
Computer Science
Information Sciences
No index terms available.
Keywords

Cybersecurity AI security Zero Trust digital risks emerging threats cyber resilience socio-technical systems

Powered by PhDFocusTM