Cyber Security in Current Era in Pakistan: An Analysis of Cyber-Crimes and Cyber-Laws of Pakistan
DOI:
https://doi.org/10.5281/zenodo.8105463Keywords:
Cyber Security, Cyber Laws, Cybercrimes, Pirated Softwares, Cyber CriminalsAbstract
The study discussed the cyber laws in Pakistan and how these laws are preventing cyber-crimes and how much these laws are up to date along with this the study also studied the legality of pirated softwares in Pakistan and internationally. Two research objectives were focused about the pirated softwares and the cyber laws of Pakistan. The study was a systematic review in which 25 articles from journals along with PECA 2016, electronic transition ordinance 2002 and cyber laws dragged in 2007 were reviewed to know the legality of pirated softwares and how these pirated softwares were treated around the globe. Concluded that there was made of laws related to cyber-crimes and up to date technologies in order to cope with the cyber-crimes that were conducted by the use of these modern devices so that the cybercriminals could be arrested and can be punished. All this should be done in order to protect the identity and privacy of the people who are using these technologies. The study concluded that there is a requirement for new laws which are up to date so that these laws can protect the country and its people and their online life so that their privacy and identity cannot be stolen.
Downloads
References
Ahmed, A., Wertheimer, T., Bubalo, M., & Saunders, T. (2020, September). TikTok Ban: How did TikTok stay online in the US? - BBC News. BBC News.
Anderson, R., Barton, C., Rainer, B., Clayton, R., Ga, C., Grasso, T., Levi, M., Moore, T., & Vasek, M. (2019). Measuring the Changing Cost of Cybercrime. Workshop on the Economics of Information Security (WEIS).
Aziz, F. (2018). Pakistan’s Cybercrime Law: boon or bane? | Background Report. Digital Asia.
Broadhurst, R., Grabosky, P., Alazab, M., & Chon, S. (2014). Organizations and cybercrime: An analysis of the nature of groups engaged in cybercrime. International Journal of Cyber Criminology, 8(1).
Chen, M. F., Pan, C. T., & Pan, M. C. (2009). The joint moderating impact of moral intensity and moral judgment on consumer’s use intention of pirated software. Journal of Business Ethics, 90(3). https://doi.org/10.1007/s10551-009-0046-8
Geil, A., Sagers, G., Spaulding, A. D., & Wolf, J. R. (2018). Cyber security on the farm: An assessment of cyber security practices in the United States agriculture industry. International Food and Agribusiness Management Review, 21(3). https://doi.org/10.22434/IFAMR2017.0045
Guinchard, A. (2011). Between Hype and Understatement: Reassessing Cyber Risks as a Security Strategy. Journal of Strategic Security, 4(2). https://doi.org/10.5038/1944-0472.4.2.5
Gurunathan, M., Mahmoud, M. A., & Mahdi, M. N. (2022). #In Journal of Theoretical and Applied Information Technology (Vol. 100, Issue 2).
Hasanah, U. (2018). The Effectiveness Of Islamic Law Implementation To Address Cyber Crime: Studies In Arab, Brunei Darussalam, And China. Al-Ahkam Jurnal Ilmu Syari’ah Dan Hukum, 3(2). https://doi.org/10.22515/al-ahkam.v3i2.1348
Hiscox Cyber Readiness Report 2019. (2019). Network Security, 2019(5). https://doi.org/10.1016/s1353-4858(19)30057-1
Lallie, H. S., Shepherd, L. A., Nurse, J. R. C., Erola, A., Epiphaniou, G., Maple, C., & Bellekens, X. (2021). Cyber security in the age of COVID-19: A timeline and analysis of cyber-crime and cyber-attacks during the pandemic. Computers and Security, 105. https://doi.org/10.1016/j.cose.2021.102248
Liao, C., Lin, H. N., & Liu, Y. P. (2010). Predicting the use of pirated software: A contingency model integrating perceived risk with the theory of planned behaviour. Journal of Business Ethics, 91(2). https://doi.org/10.1007/s10551-009-0081-5
Mbinjama-Gamatham, A., & Olivier, B. (2020). ‘Dark technology’, aggressiveness and the question of cyber-ethics. Acta Academica, 52(1). https://doi.org/10.18820/24150479/aa52i1/1
Øversveen, E. (2021). Capitalism and alienation: Towards a Marxist theory of alienation for the 21st century. European Journal of Social Theory. https://doi.org/10.1177/13684310211021579
Pakistan: man sentenced to death for blasphemy on Facebook | Pakistan | The Guardian. (n.d.).
Partida, D. (n.d.). Why You Shouldn’t Use Pirated Software IEEE Computer Society. IEEE Computer Society.
Phau, I., & Ng, J. (2010). Predictors of usage intentions of pirated software. Journal of Business Ethics, 94(1). https://doi.org/10.1007/s10551-009-0247-1
Rahman, M. S., Hossain, M. A., Abdel Fattah, F. A. M., & Ibne Mokter, A. M. (2022). Avoidance behaviour towards using pirated software: testing a seven-component model on SME employees. Information Technology and People, 35(1). https://doi.org/10.1108/ITP-12-2019-0621
Sardar, T., & Wahsheh, L. A. (2020). Design of a Cyber Security Awareness Campaign to Be Implemented in a Quarantine Laboratory. J. Computer. Sci. Coll., 35(9).
Symantec Corporation. (2019). Cyber Safety Insights Report Global Results. Norton LifeLock.
U.S. Copyright Office. (2016). Copyright Law of the United States. In Circular 92 (Issue December).