Input keywords, title, abstract, author, affiliation etc..
Journal Article An open access journal
Open Access Journal Article

Evaluation of International Cybersecurity Policy Effectiveness and Pathway Optimization Based on PCA-Entropy Weight Method

by Keming Bao 1 Qingxuan Zhang 2 Yujing Li 2 Biqi Yang 2 Taoqi Wang 1  and  Yutong Yan 1
1
College of civil engineering, Shijiazhuang Tiedao University, Hebei Province, China,050043
2
Department of mathematics and physics, Shijiazhuang Tiedao University, Hebei Province,China,050043
*
Author to whom correspondence should be addressed.
Received: 11 March 2025 / Accepted: 1 April 2025 / Published Online: 8 April 2025

Abstract

With the rapid development of the digital era, the widespread adoption of the internet has been accompanied by a surge in cybersecurity threats. This study proposes a practical theoretical framework supported by data-driven analysis to enhance national cybersecurity governance.Task 1: Utilizing datasets from ITU, INTERPOL, and VCDB, preprocessed data (with outliers removed) were visualized through heatmaps to analyze the global distribution of cyber threats. Clustered bar charts and stacked histograms further dissected regional variations in cybersecurity incident success rates, prevention rates, prosecution rates, and reporting rates. Results reveal that the distribution of cyber threats correlates with a nation’s economic development level and cybersecurity infrastructure robustness.Task 2: The Global Cybersecurity Index (GCI) was employed to evaluate national cybersecurity capabilities. Missing values in GCI’s five pillars were addressed via Lagrangian interpolation. Principal Component Analysis (PCA) identified six countries with the highest contribution rates, while the entropy weight method optimized the pillars into two core dimensions: collaboration and technology. Incorporating policy time lag effects, this framework pinpointed effective policies for mitigating cybersecurity incidents.Task 3: A multivariate linear regression model quantified the impact of demographic factors (e.g., internet penetration rate and education level) on cyber threat distribution. Finally, a neural network-based multivariate time series model predicted the theoretical impact of policy interventions on threat dynamics, complemented by sensitivity analysis to objectively assess the framework’s strengths and limitations.


Copyright: © 2025 by Bao, Zhang, Li, Yang, Wang and Yan. This is an open-access article distributed under the terms of the Creative Commons Attribution License (CC BY) (Creative Commons Attribution 4.0 International License). The use, distribution or reproduction in other forums is permitted, provided the original author(s) or licensor are credited and that the original publication in this journal is cited, in accordance with accepted academic practice. No use, distribution or reproduction is permitted which does not comply with these terms.

Share and Cite

ACS Style
Bao, K.; Zhang, Q.; Li, Y.; Yang, B.; Wang, T.; Yan, Y. Evaluation of International Cybersecurity Policy Effectiveness and Pathway Optimization Based on PCA-Entropy Weight Method. Scientific Innovation in Asia, 2025, 3, 37. doi:10.12410/sia0201021
AMA Style
Bao K, Zhang Q, Li Y et al.. Evaluation of International Cybersecurity Policy Effectiveness and Pathway Optimization Based on PCA-Entropy Weight Method. Scientific Innovation in Asia; 2025, 3(1):37. doi:10.12410/sia0201021
Chicago/Turabian Style
Bao, Keming; Zhang, Qingxuan; Li, Yujing; Yang, Biqi; Wang, Taoqi; Yan, Yutong 2025. "Evaluation of International Cybersecurity Policy Effectiveness and Pathway Optimization Based on PCA-Entropy Weight Method" Scientific Innovation in Asia 3, no.1:37. doi:10.12410/sia0201021

Article Metrics

Article Access Statistics

References

  1. Wu Shenkuo. The Governance System of the United Nations Convention on Cybercrime and China's Response [J/OL]. China Legal Review, 1-13 [2025-01-27]. http://kns.cnki.net/kcms/detail/10.1210.D.20250123.1625.024.html.
  2. Chikore T, Kayuni N M, Chukwudum C Q, et al. Exploring the Impact of How Criminals Interact with Cyber-Networks: A Mathematical Modeling Approach [J]. Research in Mathematics, 2024, 11(1):
  3. Chen Y. Research on E-Discovery of Cross-border Cybercrimes [J]. Science of Law Journal, 2024, 3(7):
  4. Zhao Hui, Dou Yunwei. The Application of Big Data in the Governance of Cybercrime in the New Era [J]. Journal of Hubei Police College, 2024, 37(06): 62-71. DOI: 10.19828/j.issn1673-2391.2024.06.006.
  5. Li L. High Rates of Prosecution and Conviction in China: The Use of Passive Coping Strategies [J]. International Journal of Law, Crime and Justice, 2014, 42(3): 271-285.
  6. Ahmead M, Sharif E N, Abuiram I. Risky Online Behaviors and Cybercrime Awareness among Undergraduate Students at Al Quds University: A Cross-sectional Study [J]. Crime Science, 2024, 13(1): 29-29.
  7. Si Shoukui, Sun Zhaoliang. Mathematical Modeling Algorithms and Applications (2nd Edition) [M]. National Defense Industry Press, 2015.