Social networking privacy issues, legal concerns and weak legislation a way to cybercrimes: A case of Pakistan
Main Article Content
Abstract
Extension of information & communication technologies elevated the necessity for more confidentiality of data and its protection against cybercrime. More so, advancement in ICT is beneficial whereas on the contrary, due to its excessive utilization the privacy and legal/security crisis are at stake. This qualitative study, using grounded theory analysis approach, explores how social networking privacy issues, legal concerns and weak legislation lead to cybercrimes in Pakistan. For this purpose, social networking sites, documents, relevant literature and interviews were used as data collection tools. The findings indicate that the social networking big data contains various legal issues such as privacy and security. Moreover, due to weak legislative laws, such issues are promoting cybercrimes such as cyberbullying, cyber stalking, cyber defamation etc. in Pakistan, which may have adverse and devastating effects.
Downloads
Article Details
Section
This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors who publish in this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licenced under a Creative Commons Attribution License that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (see The Effect of Open Access).
How to Cite
References
Akhlaq, M. A. R. I. A. (2021). Cybercrime in Pakistan: A Study of the Law Dealing with Cybercrimes in Pakistan. PCL Student Journal of Law, V(1), 31-66.
Alelyani, S., & Kumar, H. GR, (2018). Overview of cyberattack on saudi organizations. Journal of Information Security and Cybercrimes Research, 1(1), 32-39. https://doi.org/10.26735/16587790.2018.004
Almadhoor, L. (2021). Social media and cybercrimes. Turkish Journal of Computer and Mathematics Education (TURCOMAT), 12(10), 2972-2981. https://doi.org/10.17762/turcomat.v12i10.4947
Bolo Bhi. (2016). Major contentions: PECA’ last accessed 16 March 2021
Cerruto, F., Cirillo, S., Desiato, D., Gambardella, S. M., & Polese, G. (2022). Social network data analysis to highlight privacy threats in sharing data. Journal of Big Data, 9(1), 19. https://doi.org/10.1186/s40537-022-00566-7
Corbin J, Strauss A (2008). Basics of Qualitative Research: Techniques and Procedures for Developing Grounded Theory. 3rd ed. SAGE
Farooq M. (2019), Active social media users in Pakistan grow by 5.7%: Report. Pakistan Today. https://www.digitalrightsmonitor.pk/active-social-media-users-in-pakistan-grow-by-5-7-report/. Published 2019.
Ganesh, S., Ganapathy, D., & Sasanka, K. (2020). Awareness of Cyber Crime on Social Media. Journal of Contemporary Issues in Business and Government, 26(2), 1758-1765
Ghari W. & Shaabi, M. (2012). Cyber Threats In Social Networking Websites. International Journal of Distributed and Parallel Systems (IJDPS), 3(1), 119-126. DOI:10.5121/ijdps.2012.3109
Goni, O., Ali, M. H., Alam, M. M., & Shameem, M. A. (2022). The Basic Concept of Cyber Crime. Journal of Technology Innovations and Energy, 1(2), 16-24
Goodman, M. D., & Brenner, S. W. (2002). The emerging consensus on criminal conduct in cyberspace. International journal of law and information technology, 10(2), 139-223. https://doi.org/10.1093/ijlit/10.2.139
Gupta S, Singh A, Kumari S, & Kunwar N. (2017). Impact of cyber crime on adolescents through social networking sites. International Journal of Law 3(6), 104-106.
Halder, D. (2011). Information Technology Act and cyber terrorism: A critical review. Available at SSRN https://ssrn.com/abstract=1964261 OR http://dx.doi.org/10.2139/ssrn.1964261
Hernandez-Castro, J., & Boiten, E. (2014). Cybercrime prevalence and impact in the UK. Computer Fraud & Security, 2014(2), 5-8. https://doi.org/10.1016/S1361-3723(14)70461-0
Hussain, Z., Bhutto, Z. A., Rai, G., Hussain, M., & Zaheer, K. (2016). Statistical analysis of network based issues and their impact on social computing practices in Pakistan. Journal of Computer and Communications, 4(13), 23. DOI: https://doi.org/10.4236/jcc.2016.413003
Jaishankar, K. (2018). Cyber criminology as an academic discipline: history, contribution and impact. International Journal of Cyber Criminology, 12(1), 1-8. DOI: https://doi.org/10.5281/zenodo.1467308
Khan, T. (2015). Cybercrimes: Pakistan lacks facilities to trace hackers. The Express Tribune.
Khiralla, F. A. M. (2020). Statistics of cybercrime from 2016 to the first half of 2020. International Journal of Computer Science and Network., 9(5), 252-261.
Kundi, G. M., Nawaz, A., Akhtar, R., & MPhil Student, I. E. R. (2014). Digital revolution, cyber-crimes and cyber legislation: A challenge to governments in developing countries. Journal of Information Engineering and Applications, 4(4), 61-71. doi:http://www.iiste.org/Journals/index.php/JIEA/article/viewFile/12430/12764
Magalla, A. (2018). Prevention and detection of cyber crimes in tanzania as described by cyber crime act, no. 13 of 2015. http://dx.doi.org/10.2139/ssrn.3136637
Mateen, A., & Abbas, Q. (2016). Tsunami of Cyber Crime: Analysis of Cyber Crime New Trends, Causes and Remedies in Future Prospectus. International Journal of Computer Applications, 152(8).
Meter, D. J., & Bauman, S. (2015). When sharing is a bad idea: The effects of online social network engagement and sharing passwords with friends on cyberbullying involvement. Cyberpsychology, Behavior, and Social Networking, 18(8), 437-442. https://doi.org/10.1089/cyber.2015.0081
Miles, M. B., & Huberman, A. M. (1994). Qualitative data analysis: An expanded sourcebook. sage.
Mohammed, F. (2016). PECA 2015: A Critical Analysis of Pakistan’s Proposed Cybercrime Bill. UCLA J Islam Near EL, 15, 71.
Monteith, S., Bauer, M., Alda, M., Geddes, J., Whybrow, P. C., & Glenn, T. (2021). Increasing cybercrime since the pandemic: Concerns for psychiatry. Current psychiatry reports, 23, 1-9. https://doi.org/10.1007/s11920-021-01228-w
Oxford Analytica. (2022). Pakistan, Bangladesh fail to tackle online violence. Emerald Expert Briefings, (oxan-db). https://doi.org/10.1108/OXAN-DB266467
Peng, S., Wang, G., & Xie, D. (2017). Social influence analysis in social networking big data: Opportunities and challenges. IEEE network, 31(1), 11-17. https://doi.org/10.1109/MNET.2016.1500104NM
Prevention of Electronic Crimes Bill 2016.; (2016). http://www.na.gov.pk/uploads/documents/1470910659_707.pdf
Solove, D. J. (2006). Taxonomy of Privacy. University of Pennsylvania Law Review. 154(3), 477. GWU Law School Public Law Research Paper No. 129, Available at SSRN: https://ssrn.com/abstract=667622
Soomro, T. R., & Hussain, M. (2019). Social Media-Related Cybercrimes and Techniques for Their Prevention. Applied Computer Systems, 24(1), 9-17. DOI:10.2478/acss-2019-0002
Sridharan, V. (2016). Pakistan passes 'draconian' cybercrime law threatening civil liberties. International Business Times. https://www.ibtimes.co.uk/pakistan-passes-draconian-cybercrime-law-threatening-civil-liberties-1575530. Accessed August 23, 2020.
Tene, O. (2011). Privacy: The new generations. International data privacy law, 1(1), 15-27. https://doi.org/10.1093/idpl/ipq003
Zahra-Malik, M (2016). Pakistan passes controversial cyber-crime law. Reuters. https://www.reuters.com/article/us-pakistan-internet/pakistan-passes-controversial-cyber-crime-law-idUSKCN10N0ST.