
Volume 3, 2025 - Issue 1
Evaluation of International Cybersecurity Policy Effectiveness and Pathway Optimization Based on PCA-Entropy Weight Method
Abstract
With the rapid development of the digital era, the widespread adoption of the internet has been accompanied by a surge in cybersecurity threats. This study proposes a practical theoretical framework supported by data-driven analysis to enhance national cybersecurity governance.Task 1: Utilizing datasets from ITU, INTERPOL, and VCDB, preprocessed data (with outliers removed) were visualized through heatmaps to analyze the global distribution of cyber threats. Clustered bar charts and stacked histograms further dissected regional variations in cybersecurity incident success rates, prevention rates, prosecution rates, and reporting rates. Results reveal that the distribution of cyber threats correlates with a nation’s economic development level and cybersecurity infrastructure robustness.Task 2: The Global Cybersecurity Index (GCI) was employed to evaluate national cybersecurity capabilities. Missing values in GCI’s five pillars were addressed via Lagrangian interpolation. Principal Component Analysis (PCA) identified six countries with the highest contribution rates, while the entropy weight method optimized the pillars into two core dimensions: collaboration and technology. Incorporating policy time lag effects, this framework pinpointed effective policies for mitigating cybersecurity incidents.Task 3: A multivariate linear regression model quantified the impact of demographic factors (e.g., internet penetration rate and education level) on cyber threat distribution. Finally, a neural network-based multivariate time series model predicted the theoretical impact of policy interventions on threat dynamics, complemented by sensitivity analysis to objectively assess the framework’s strengths and limitations.
Share and Cite
Article Metrics
References
- Wu Shenkuo. The Governance System of the United Nations Convention on Cybercrime and China's Response [J/OL]. China Legal Review, 1-13 [2025-01-27]. http://kns.cnki.net/kcms/detail/10.1210.D.20250123.1625.024.html.
- Chikore T, Kayuni N M, Chukwudum C Q, et al. Exploring the Impact of How Criminals Interact with Cyber-Networks: A Mathematical Modeling Approach [J]. Research in Mathematics, 2024, 11(1):
- Chen Y. Research on E-Discovery of Cross-border Cybercrimes [J]. Science of Law Journal, 2024, 3(7):
- Zhao Hui, Dou Yunwei. The Application of Big Data in the Governance of Cybercrime in the New Era [J]. Journal of Hubei Police College, 2024, 37(06): 62-71. DOI: 10.19828/j.issn1673-2391.2024.06.006.
- Li L. High Rates of Prosecution and Conviction in China: The Use of Passive Coping Strategies [J]. International Journal of Law, Crime and Justice, 2014, 42(3): 271-285.
- Ahmead M, Sharif E N, Abuiram I. Risky Online Behaviors and Cybercrime Awareness among Undergraduate Students at Al Quds University: A Cross-sectional Study [J]. Crime Science, 2024, 13(1): 29-29.
- Si Shoukui, Sun Zhaoliang. Mathematical Modeling Algorithms and Applications (2nd Edition) [M]. National Defense Industry Press, 2015.