The evolving landscape of Cybercrime in Nepal: A multi-Year Analysis of Platform Specific Trends and Victim Demographics (2077-2082 B.S. / 2020-2025 A.D.)
Main Article Content
Abstract
The study analyzes official data provided by Nepal Police Headquarters Cyber Bureau for the fiscal year 2020/2021 A.D. to 2024/2025 A.D., offering a multi-year analysis of cybercrime trends by platform and victim demographics. It examines 53,474 cybercrime reported cases across 15 digital platforms, identifying dominant vectors of cybercriminal activity, and analyzes demographic victimization patterns. Results reveal dramatic reported cybercrime applications from 3,906 in 2020/2021 to 16,139 in 2024/2025., peaking at 19,730 in 2023/2024. Facebook/Messenger is the primary medium for incidents cumulatively accounted for 72.73% of all cases reported. TikTok emerged as a critical threat vector, demonstrating a 3092.86% growth in associated criminal activities. Statistical methods including chi-square tests, and Herfindahl-Hirschman Index were applied to assess platform concentration and trend evolution. Gender-wise analysis show men accounting for 47.02% and women for 45.69%, with women initially reporting more incidents in earlier fiscal years. The study correlates these trends with prevalent cybercrime typologies- photo mutilation, revenge porn, ransomware attacks, defamation and impersonation, hacking and unauthorized access, and online fraud. These findings offer policymakers, cybersecurity professionals, individuals, and researchers’ empirical insights into Nepal’s evolving cybercrime landscape and support the development of targeted prevention strategies and public awareness campaigns in a digitally evolving nation like Nepal.
Article Details
Issue
Section

This work is licensed under a Creative Commons Attribution 4.0 International License.
Deprecated: json_decode(): Passing null to parameter #1 ($json) of type string is deprecated in /home/u273879158/domains/mesopotamian.press/public_html/journals/plugins/generic/citations/CitationsPlugin.php on line 68
How to Cite
References
[1] Nepal Police Headquarters Cyber Bureau, Cybercrime Statistics (Fiscal Years 2077/78–2081/82), unpublished internal dataset, Bhotahity, Kathmandu, Nepal, Jun. 3, 2025.
[2] World Bank, “Enhancing Cyber Resilience in Developing Countries,” Jan. 29, 2025. [Online]. Available: https://www.worldbank.org/en/results/2025/01/29/-enhancing-cyber-resilience-in-developing-countries
[3] Pathways Commission (Oxford/BSG), “Tackling cybercrime to unleash developing countries’ digital potential,” 2020. [Online]. Available: https://pathwayscommission.bsg.ox.ac.uk/sites/default/files/2020-01/tackling_cybercrime_to_unleash_developing_countries_digital_potential.pdf
[4] UNCTAD, “Leapfrogging: Look Before You Leap – Policy Brief No. 71,” Dec. 2018. [Online]. Available: https://unctad.org/system/files/official-document/presspb2018d8_en.pdf
[5] Internet Society, “Paths to our Digital Future – Digital Divides,” Dec. 2022. [Online]. Available: https://www.internetsociety.org/wp content/uploads/2022/12/Paths-to our Digital Future Area of Impact Digital Divides.pdf
[6] UN Press, “Widening Digital Gap between Developed, Developing States Threatening to Exclude World’s Poorest,” Oct. 6, 2023. [Online]. Available: https://press.un.org/en/2023/gaef3587.doc.htm
[7] International Telecommunication Union, “Global Cybersecurity Index (GCI) 2024: Nepal Profile,” 2024. [Online]. Available: https://www.itu.int/epublications/publication/global-cybersecurity-index-2024
[8] Kathmandu Post, “Facebook still leads cybercrime cases, other applications catching up,” Kathmandu Post, May 2025. [Online]. Available: https://kathmandupost.com/national/2025/05/11/facebook-still-leads-cybercrime-cases-other-applications-catching-up
[9] iPleaders, “How has social media contributed to the spread of cybercrimes: an analysis?” iPleaders Blog, 2024. [Online]. Available: https://blog.ipleaders.in/how-has-social-media-contributed-to-the-spread-of-cybercrimes-an-analysis/
[10] Center for Internet Security, "Why TikTok is the Latest Security Threat," Aug. 6, 2020. [Online]. Available: https://www.cisecurity.org/insights/blog/why-tiktok-is-the-latest-security-threat
[11] CyberSpoke.Tech, “The TikTok controversy: its impact on international security,” Real Instituto Elcano, Jul. 2023. [Online]. Available: https://media.realinstitutoelcano.org/wp-content/uploads/2023/07/ari71-2023-sicilia-the-tiktok-controversy-its-impact-on-international-security.pdf
[12] Tech Policy Advisory, “Private. Secure. Dangerous? The double edged reality of encrypted messaging,” Tech Policy Advisory, 2024. [Online]. Available: https://techpolicyadvisory.com/private-secure-dangerous-the-double-edged-reality-of-encrypted-messaging/
[13] M. Näsi, P. Danielsson, and M. Kaakinen, “Cybercrime victimisation and polyvictimisation in Finland—Prevalence and risk factors,” European Journal on Criminal Policy and Research, Sept. 2021, vol. 29, pp. 283–301. [Online]. Available: https://link.springer.com/article/10.1007/s10610-021-09497-0
[14] R. Lozano-Blasco, A. Quilez-Robres, and C. Latorre-Cosculluela, "Sex, age and cyber-victimization: A meta-analysis," Comput. Human Behav., vol. 139, Art. no. 107491, 2023. [Online]. Available: https://doi.org/10.1016/j.chb.2022.107491
[15] B. Havers, K. Tripathi, A. Burton, S. McManus, and C. Cooper, “Cybercrime victimisation among older adults: A probability sample survey in England and Wales,” PLoS ONE, vol. 19, no. 12, Art. no. e0314380, Dec. 2024. [Online]. Available: https://doi.org/10.1371/journal.pone.0314380
[16] M. Dodel, D. Kaiser, and G. Mesch, “Determinants of cyber safety behaviors in a developing economy: The role of socioeconomic inequalities, digital skills and perception of cyber threats,” First Monday, vol. 25, no. 7, July 2020. [Online]. Available: https://firstmonday.org/ojs/index.php/fm/article/view/10830/9558
[17] N. F. Khan, N. Ikram, and S. Saleem, “Effects of socioeconomic and digital inequalities on cybersecurity in a developing country,” Security Journal, 2023. [Online]. Available: https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10122089/
[18] A. Caneppele, “Observing, Measuring, and Researching Cybercrime: A Scoping Review of Systematic Reviews Since the 2010s,” in Understanding Crime Trends in a Hybrid Society, SpringerBriefs in Criminology, Feb. 13, 2025, pp. 101–128. [Online]. Available: https://doi.org/10.1007/978-3-031-72387-2_5
[19] O. Gomez Morantes, A. Heeks, and R. Reilly, “Conceptualising digital platforms in developing countries as socio-technical transitions: Critical research gaps,” E Journal of Digital Research, 2021. [Online]. Available: https://research.manchester.ac.uk/files/194292055/Gomez_MorantesEtAl_EJDR_Platform_Transitions_Author_Accepted_Version.pdf
[20] M. Adewopo et al., “A comprehensive analytical review on cybercrime in West Africa,” arXiv, Jan. 2024. [Online]. Available: https://arxiv.org/abs/2402.01649
[21] HamroPatro, “Date Converter: Bikram Sambat to A.D. and vice versa,” HamroPatro.com, [Online]. Available: https://www.hamropatro.com/date-converter [Accessed: Jul. 27, 2025].
[22] M. A. Mishra, "Selection of appropriate statistical methods for data analysis," Annals of Cardiac Anaesthesia, vol. 22, no. 3, pp. 297-302, Jul. 2019. [Online]. Available: https://pmc.ncbi.nlm.nih.gov/articles/PMC6639881/
[23] T. O. Kvålseth, "Measurement of market (industry) concentration based on value validity," PLOS ONE, vol. 17, no. 7, pp. 1-24, Jul. 2022. [Online]. Available: https://journals.plos.org/plosone/article?id=10.1371/journal.pone.0264613
[24] [6] K. Okereafor and O. Adebola, "A deeper look into cybersecurity issues in the wake of Covid-19: A survey," Computer Communications, vol. 193, pp. 259-281, Sep. 2022. [Online]. Available: https://pmc.ncbi.nlm.nih.gov/articles/PMC9367180/
[25] L. A. Wasserman, All of Statistics: A Concise Course in Statistical Inference, Kindle ed., New York, NY, USA: Springer, 2013.
[26] H. J. Kim, "The chi-square test of independence," Biochemia Medica, vol. 27, no. 2, pp. 143-149, Jun. 2017. [Online]. Available: https://www.ncbi.nlm.nih.gov/pmc/articles/PMC3900058/
[27] H. S. Lallie, L. A. Shepherd, J. R. C. Nurse, A. Erola, G. Epiphaniou, C. Maple, and X. Bellekens, “Cyber security in the age of COVID-19: A timeline and analysis of cyber-crime and cyber-attacks during the pandemic,” Computers & Security, vol. 105, p. 102248, 2021. [Online]. Available: https://doi.org/10.1016/j.cose.2021.102248
[28] L. Bagui, S. Lusinga, N. Pule, T. Tuyeni, C. Q. Mtegha, E. Calandro, W. Chigona, and B. von Solms, “The impact of COVID-19 on cybersecurity awareness-raising and mindset in the southern African development community (SADC),” Electron. J. Inf. Syst. Dev. Ctries., vol. 89, no. 4, p. e12264, 2023. [Online]. Available: https://doi.org/10.1002/isd2.12264
[29] M. Widodo, S. Adam, P. H. Hsb, A. H. Prayitno, and A. Bhaskoro, “International legal dynamics in combating cybercrime: Challenges and opportunities for developing countries,” Global Law Today, 2024. [Online]. Available: https://doi.org/10.59613/global.v2i1.49
[30] S. Scatton, TikTok risk or threat? Competing narratives about risks and threats in the US case, Master’s thesis, Crisis Management and Peacebuilding, Umeå University, Umeå, Sweden, Spring 2023. [Online]. Available: https://umu.diva-portal.org/smash/get/diva2:1797783/FULLTEXT01.pdf
[31] R. E. Endeley, “End-to-end encryption in messaging services and national security—Case of WhatsApp messenger,” Journal of Information Security, vol. 9, pp. 95–99, 2018. [Online]. Available: https://doi.org/10.4236/jis.2018.91008
[32] R. A. Rogers, “Visual media analysis for Instagram and other online platforms,” Big Data & Society, vol. 8, no. 1, Jun. 2021. [Online]. Available: https://doi.org/10.1177/2053951721102237
[33] A. R. Onik, J. Brown, C. Walker, and I. Baggili, “A systematic literature review of secure instant messaging applications from a digital forensics perspective,” ACM Comput. Surv., vol. 57, no. 9, Art. no. 239, pp. 1–36, 2024. doi: 10.1145/3727641
[34] Ministry of Communication and Information Technology, National Cyber Security Policy 2080, Government of Nepal, Kathmandu, Nepal, 2023. [Online]. Available: https://mocit.gov.np/content/7119/7119-national-cyber-security-policy/
[35] A. Leukfeldt and T. Hall, "Research synthesis of cybercrime laws and COVID-19 in Indonesia: lessons for developed and developing countries," Security Journal, vol. 35, no. 4, pp. 1242-1263, Sep. 2022. [Online]. Available: https://link.springer.com/article/10.1057/s41284-022-00357-y
[36] M. Berenblum and A. Bossler, "New directions in cybercrime research," Journal of Crime & Justice, vol. 42, no. 5, pp. 495-499, 2019. [Online]. Available: https://www.tandfonline.com/doi/full/10.1080/0735648X.2019.1692426
[37] A. Gryszczyńska, “The impact of the COVID-19 pandemic on cybercrime,” Bull. Pol. Acad. Sci. Tech. Sci., vol. 69, no. 4, Article no. e137933, 2021. doi: 10.24425/bpasts.2021.137933. [Online]. Available: http://journals.pan.pl/Content/120374
[38] D. Wall, "Broadening our understanding of cybercrime and its evolution," Journal of Crime and Justice, vol. 47, no. 4, pp. 423-427, 2024. [Online]. Available: https://www.tandfonline.com/doi/full/10.1080/0735648X.2024.2323872
[39] S. Chen, M. Hao, F. Ding, D. Jiang, J. Dong, S. Zhang, Q. Guo, and C. Gao, “Exploring the global geography of cybercrime and its driving forces,” Humanit. Soc. Sci. Commun., vol. 10, no. 1, p. 71, Feb. 2023. doi: 10.1057/s41599-023-01560-x
[40] T. Hall and U. Ziemer, “Cybercrime in Commonwealth West Africa and the Regional Cyber-Criminogenic Framework,” Commonwealth Cybercrime Journal, vol. 1, no. 1, pp. 5–25, 2023. [Online]. Available: https://production-new-commonwealth-files.s3.eu-west-2.amazonaws.com/s3fs-public/2023-03/D19156-CCJ-1-1-Cybercrime-CW-West-Africa--Hall-Ziemer.pdf
[41] R. Broadhurst, P. Grabosky, M. Alazab, and S. Chon, “Organizations and cyber crime: An analysis of the nature of groups engaged in cyber crime,” International Journal of Cyber Criminology, vol. 8, no. 1, pp. 1–20, 2014. [Online]. Available: https://research-management.mq.edu.au/ws/portalfiles/portal/62156293/Publisher+version+%28open+access%29.pdf
[42] H. M. Melaku, “A Dynamic and Adaptive Cybersecurity Governance Framework,” J. Cybersecur. Priv., vol. 3, no. 3, pp. 327–350, 2023, doi: 10.3390/jcp3030017.
[43] M. Nouh, J. R. C. Nurse, and M. Goldsmith, “Towards Designing a Multipurpose Cybercrime Intelligence Framework,” in Proc. 2016 Eur. Intell. Secur. Informatics Conf. (EISIC), Uppsala, Sweden, 2016, pp. 153–156, doi: 10.1109/EISIC.2016.018.
[44] S. Ismaeel, “The Impact of Digital Literacy on Cybercrime Awareness, Victimization, and Prevention Measures: A Study of Cyberbullying in Saudi Arabia,” Pakistan J. Criminol., vol. 17, no. 1, pp. 77–96, Jan.–Mar. 2025. [Online]. Available:https://www.pjcriminology.com/wp-content/uploads/2025/01/6_The-Impact-of-Digital-Literacy-on-Cybercrime-Awareness-Victimization-and-Prevention-Measures.pdf
[45] K. Achuthan, S. Khobragade, and R. Kowalski, “Cybercrime through the public lens: a longitudinal analysis,” Humanit. Soc. Sci. Commun., vol. 12, Art. no. 282, 2025, doi: 10.1057/s41599-025-04459-x.
[46] I. Bernik, K. Prislan, and A. Mihelič, “Country Life in the Digital Era: Comparison of Technology Use and Cybercrime Victimization between Residents of Rural and Urban Environments in Slovenia,” Sustainability, vol. 14, no. 21, Art. no. 14487, 2022, doi: 10.3390/su142114487.
[47] M. Bada, A. Hutchings, Y. Papadodimitraki, and R. Clayton, An Evaluation of Police Interventions for Cybercrime Prevention, University of Cambridge, Computer Laboratory, Tech. Rep. UCAM-CL-TR-983, Jul. 2023. doi: 10.48456/tr-983. [Online]. Available: https://www.cl.cam.ac.uk/techreports/UCAM-CL-TR-983.pdf
[48] Hai, T. N., Van, Q. N., & Thi Tuyet, M. N. (2021). Digital Transformation: Opportunities and Challenges for Leaders in the Emerging Countries in Response to Covid-19 Pandemic. Emerging Science Journal, 5, 21–36. https://doi.org/10.28991/esj-2021-SPER-03