Cybersecurity Analysis in Thailand: Trends, Challenges, and Policy Insights from Case Studies of SMEs, Mobile Banking, and Port Infrastructure

Main Article Content

Chanin Taeratanachai
Rawida Wiriyakitjar

Abstract

This academic article analyzes the emerging trends and challenges in cybersecurity within the context of Thailand, focusing on three key sectoral case studies: small and medium-sized enterprises (SMEs), mobile banking, and port infrastructure. Amid the rapid transformation toward a digital economy, these sectors face growing cyber risks that could undermine the country’s economic security. The article advocates for the adoption of Artificial Intelligence (AI), particularly Machine Learning (ML) and Deep Learning (DL), to enhance threat detection, incident response, and predictive risk analytics. Nonetheless, Thailand continues to encounter critical obstacles, including limited technical readiness, fragmented governance, and a relatively low rate of AI adoption. The article concludes by proposing strategic policy recommendations to strengthen national cyber resilience through the integration of regulatory frameworks, technological innovations, and multi-stakeholder collaboration-ensuring a sustainable and secure cybersecurity environment for Thailand’s digital future.

Article Details

Section
บทความวิชาการ (Academic Article)

References

Akhtar, Z. B., & Rawol, A. T. (2024). Enhancing cybersecurity through AI-powered security mechanisms. IT Journal Research and Development, 9(1), 50-67.

Akinrinola, O., Okoye, C. C., Ofodile, O. C., & Ugochukwu, C. E. (2024). Navigating and reviewing ethical dilemmas in AI development: Strategies for transparency, fairness, and accountability. GSC Advanced Research and Reviews, 18(3), 050-058.

Aminu, M., Akinsanya, A., Dako, D. A., & Oyedokun, O. (2024). Enhancing cyber threat detection through real-time threat intelligence and adaptive defense mechanisms. International Journal of Computer Applications Technology and Research, 13(8), 11-27.

Basak, B. (2024). The Impact of Cybersecurity Threats on National Security: Strategies. International Journal of Humanities Social Science and Management (IJHSSM), 4(2), 1361-1382.

Bellamkonda, S. (2020). Cybersecurity in critical infrastructure: Protecting the foundations of modern society. International Journal of Communication Networks and Information Security, 12, 273-280.

Burita, L., & Le, D. T. (2021). Cyber security and APT groups. In 2021 Communication and Information Technologies (KIT) (pp. 1-7). IEEE.

Capuano, N., Fenza, G., Loia, V., & Stanzione, C. (2022). Explainable artificial intelligence in cybersecurity: A survey. IEEE Access, 10, 93575-93600.

Durgaraju, S., Vel, D. V. T., & Madathala, H. (2025). The evolution of cyber threats and defenses: A review of innovations and challenges. In Proceedings of the 6th International Conference on Mobile Computing and Sustainable Informatics (ICMCSI) (pp. 117–123). IEEE.

Firmansyah, B. (2024). Cybersecurity Fundamentals. In Challenges in Large Language Model Development and AI Ethics (pp. 280-320). IGI Global.

González, A. L., Moreno, M., Román, A. C. M., Fernández, Y. H., & Pérez, N. C. (2024). Ethics in artificial intelligence: An approach to cybersecurity. Inteligencia Artificial, 27(73), 38-54.

Hickman, E., & Petrin, M. (2021). Trustworthy AI and corporate governance: the EU’s ethics guidelines for trustworthy artificial intelligence from a company law perspective. European Business Organization Law Review, 22, 593-625.

Hosain, M. T., Jim, J. R., Mridha, M. F., & Kabir, M. M. (2024). Explainable AI approaches in deep learning: Advancements, applications and challenges. Computers and electrical engineering, 117, Articel 109246.

Janmethakulwat, A., & Thanasopon, B. (2024). Digital technology adoption and institutionalization in Thai maritime industry: An exploratory study of the Thai shipowners. The Asian Journal of Shipping and Logistics, 40(3), 157-166.

Jonathan, G., & Thamrongthanakit, T. (2024). Cybersecurity Management Practices in Thai SMEs. In MWAIS 2024 Proceedings. AIS Electronic Library (AISeL).

Kaushik, K., Khan, A., Kumari, A., Sharma, I., & Dubey, R. (2024). Ethical considerations in AI-based cybersecurity. In Next-generation cybersecurity: AI, ML, and Blockchain (pp. 437-470). Singapore: Springer Nature Singapore.

Komsan Tortermvasana. (2024, December 17). Project aims to fortify firms’ cyber defence. Bangkok Post. https://www.bangkokpost.com/business/general/2921177/project-aims-to-fortify-firms-cyberdefence

Kumar, V. A., Bhardwaj, S., & Lather, M. (2024). Cybersecurity and Safeguarding Digital Assets: An Analysis of Regulatory Frameworks, Legal Liability and Enforcement Mechanisms. Productivity, 65(1), 1-10.

Lee, Y., Lee, Y., Lee, E., & Lee, T. (2023). Explainable Artificial Intelligence-Based Model Drift Detection Applicable to Unsupervised Environments. Computers, Materials & Continua, 76(2).

Limna, P., Kraiwanit, T., & Siripipattanakul, S. (2023). The relationship between cyber security knowledge,

awareness and behavioural choice protection among mobile banking users in Thailand. International Journal of Computing Sciences Research, 7, 1133-1151.

Lo’ai, A. T., & Saldamli, G. (2021). Reconsidering big data security and privacy in cloud and mobile cloud systems. Journal of King

Saud University-Computer and Information Sciences, 33(7), 810-819.

Mallick, M. A. I., & Nath, R. (2024). Navigating the cyber security landscape: A comprehensive review of cyber-attacks, emerging trends, and recent developments. World Scientific News, 190(1), 1-69.

Mian, S. M., Khan, M. S., Shawez, M., & Kaur, A. (2024). Artificial Intelligence (AI), Machine Learning (ML) & Deep Learning (DL): A

Comprehensive Overview on Techniques, Applications and Research Directions. In 2024 2nd International Conference on Sustainable Computing and Smart Systems (ICSCSS) (pp. 1404-1409). IEEE.

Muhammad, A. R., Sukarno, P., & Wardana, A. A. (2023). Integrated security information and event management (siem) with intrusion detection system (ids) for live analysis based on machine learning. Procedia Computer Science, 217, 1406-1415.

Nguyen, T. T., & Reddi, V. J. (2021). Deep reinforcement learning for cyber security. IEEE Transactions on Neural Networks and Learning Systems, 34(8), 3779-3795.

Office of National Economic and Social Development Council. (2024). Thailand’s Logistics Report 2023. Patchipala, S. (2023). Tackling data and model drift in AI: Strategies for maintaining accuracy during ML model inference. International Journal of Science and Research Archive, 10(2), 1198-1209.

Patel, Y., Tanwar, S., Gupta, R., Bhattacharya, P., Davidson, I. E., Nyameko, R., Srinivas, A., & Vimal, V. (2023). Deepfake generation and detection: Case study and challenges. IEEE Access, 11, 143296-143323.

Paul, J. (2024). Comparative Analysis of Supervised vs. Unsupervised Learning in API Threat Detection.

Personal Data Protection Commission. (2020). Singapore’s Model AI Governance Framework.

Prasopdee, N., & Srisa-An, C. (2024). Strategies for Cyber Risk Assessment and Mitigation in Small and Medium-Sized Enterprises in Thailand. In 2024 8th International Conference on Information Technology (InCIT) (pp. 40-44). IEEE.

Ramalingam, R., Arthi, K., Bhavani, M. M., & Sunitha, T. (2025). AI-Enhanced Security Information and Event Management (SIEM) System. In Deep Learning Innovations for Securing Critical Infrastructures (pp. 75-94). IGI Global Scientific Publishing.

Saad, W., & Aslam, M. (2023). The Role of Artificial Intelligence in Remediation and Risk Mitigation for Cybersecurity.

Salama, R., & Al-Turjman, F. (2025). Addressing Cybersecurity Vulnerabilities with Cloud Security. NEU Journal for Artificial Intelligence and Internet of Things, 4(1), 86-95.

Salman, H. A., & Alsajri, A. (2023). The Evolution of Cybersecurity Threats and Strategies for Effective Protection. SHIFRA, 2023, 73-85.

Sarker, I. H. (2021). Deep cybersecurity: a comprehensive overview from neural network and deep learning perspective. SN Computer Science, 2(3), 154.

Sarker, I. H. (2024). AI-driven cybersecurity and threat intelligence. In cyber automation, intelligent decision-making and explainability. Springer Cham.

Senarak, C. (2021). Port cybersecurity and threat: A structural model for prevention and policy development. The Asian Journal of Shipping and Logistics, 37(1), 20-36.

Shafiq, M., Gu, Z., Cheikhrouhou, O., Alhakami, W., & Hamam, H. (2022). The Rise of “Internet of Things”: Review and Open Research Issues Related to Detection and Prevention of IoT-Based Security Attacks. Wireless Communications and Mobile Computing, 2022(1), Articel 8669348.

Sharkov, G. (2020). Assessing the maturity of national cybersecurity and resilience. Connections: The Quarterly Journal, 19(4), 5-24.

Thamrongthanakit, T. (2023). Impacts of cybersecurity practices on cyberattack damage and protection among small and medium enterprises in Thailand [Master’s thesis, Stockholm University]. https://urn.kb.se/resolve?urn=urn:nbn:se:su:diva-219680

Thetlek, R., Kraiwanit, T., Limna, P., Shaengchart, Y., & Moolngearn, P. (2024). The strategy of virtual banking adoption in the digital economy [Special issue]. Corporate & Business Strategy Review, 5(1), 264-272.

Tran, K.. (2024, September 18). Largest cybersecurity markets in the Asia-Pacific region in 2022, by revenue. Statista. https://www.statista.com/forecasts/1400787/apac-largest-cybersecurity-markets-by-revenue

Walderich, A. (2023, December 20). Cybersecurity and cybercrime in Thailand – Statistics & facts. Statista. https://www.statista.com/topics/11439/cybersecurity-and-cybercrime-in-thailand/

Walderich, A. (2024a, October 4). Number of cyber threats against public and private entities in Thailand 2023, by type of organization. Statista. https://www.statista.com/statistics/1202802/thailandnumber-of-cyber-threats-by-type-of-organization/

Walderich, A. (2024b, October 14). Number of cyber threats detected and settled by ThaiCERT in Thailand in 2023, by type of threat. Statista. https://www.statista.com/statistics/1154735/thailand-number-of-cyber-threats-by-type-of-threat/

Xenofontos, C., Zografopoulos, I., Konstantinou, C., Jolfaei, A., Khan, M. K., & Choo, K. K. R. (2021). Consumer, commercial, and industrial iot (in) security: Attack taxonomy and case studies. IEEE Internet of Things Journal, 9(1), 199-221.

Yeasmin, F. (2024). The impact of digital transformation on society: unraveling trends, challenges, and opportunities. Eunomia–Rozwój ZrównowaŻony–Sustainable Development, 2(108), 53-67.

Zhang, Z., Al Hamadi, H., Damiani, E., Yeun, C. Y., & Taher, F. (2022). Explainable artificial intelligence applications in cyber security: State-of-the-art in research. IEEE Access, 10, 93104-93139.