|
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
|
| Volume 187 - Issue 73 |
| Published: January 2026 |
| Authors: Jerome Ofori-Kyeremeh, Kingsley Ofori, Isaac Okrah, Leo Ofori-Kyeremeh |
10.5120/ijca2026926225
|
Jerome Ofori-Kyeremeh, Kingsley Ofori, Isaac Okrah, Leo Ofori-Kyeremeh . Cybersecurity in the Digital Age: Protecting Individuals and Organizations from Emerging Threats. International Journal of Computer Applications. 187, 73 (January 2026), 39-41. DOI=10.5120/ijca2026926225
@article{ 10.5120/ijca2026926225,
author = { Jerome Ofori-Kyeremeh,Kingsley Ofori,Isaac Okrah,Leo Ofori-Kyeremeh },
title = { Cybersecurity in the Digital Age: Protecting Individuals and Organizations from Emerging Threats },
journal = { International Journal of Computer Applications },
year = { 2026 },
volume = { 187 },
number = { 73 },
pages = { 39-41 },
doi = { 10.5120/ijca2026926225 },
publisher = { Foundation of Computer Science (FCS), NY, USA }
}
%0 Journal Article
%D 2026
%A Jerome Ofori-Kyeremeh
%A Kingsley Ofori
%A Isaac Okrah
%A Leo Ofori-Kyeremeh
%T Cybersecurity in the Digital Age: Protecting Individuals and Organizations from Emerging Threats%T
%J International Journal of Computer Applications
%V 187
%N 73
%P 39-41
%R 10.5120/ijca2026926225
%I Foundation of Computer Science (FCS), NY, USA
Digital transformation has reshaped how individuals, businesses, and governments operate, but it has also widened the avenues through which cyberattacks occur. As cloud computing, artificial intelligence (AI), and interconnected digital systems expand, cybercriminals have adopted increasingly sophisticated techniques that challenge traditional defenses. This paper examines the nature of emerging cyber threats and analyzes how modern security frameworks including Zero-Trust Architecture, socio-technical systems theory, and adaptive security models can support more resilient protection strategies. By reviewing recent empirical studies and synthesizing current scholarship (2020-2025), this work identifies the main technological, behavioral, and structural factors shaping today’s cyber risks. Notable research gaps include the limited real-world testing of AI-driven security tools, the lack of unified frameworks integrating human and automated defenses, and the underrepresentation of developing countries in cybersecurity research. The paper concludes with recommendations for strengthening security readiness at both individual and organizational levels.