Social networking privacy issues, legal concerns and weak legislation a way to cybercrimes: A case of Pakistan

Main Article Content

Mehwish Iftikhar
Zarina Waheed
Usman Abdullah
Sheraz Khan

Abstract

Extension of information & communication technologies elevated the necessity for more confidentiality of data and its protection against cybercrime. More so, advancement in ICT is beneficial whereas on the contrary, due to its excessive utilization the privacy and legal/security crisis are at stake. This qualitative study, using grounded theory analysis approach, explores how social networking privacy issues, legal concerns and weak legislation lead to cybercrimes in Pakistan. For this purpose, social networking sites, documents, relevant literature and interviews were used as data collection tools. The findings indicate that the social networking big data contains various legal issues such as privacy and security. Moreover, due to weak legislative laws, such issues are promoting cybercrimes such as cyberbullying, cyber stalking, cyber defamation etc. in Pakistan, which may have adverse and devastating effects.

Article Details

How to Cite
Social networking privacy issues, legal concerns and weak legislation a way to cybercrimes: A case of Pakistan. (2024). Journal of Management Info, 9(4), 556-565. https://doi.org/10.31580/jmi.v9i4.2844
Section
Research Article
Author Biographies

Mehwish Iftikhar, NUST Business School, National University of Sciences and Technology, Islamabad, Pakistan

Abstract Extension of information & communication technologies elevated the necessity for more confidentiality of data and its protection against cybercrime. More so, advancement in ICT is beneficial whereas on the contrary, due to its excessive utilization the privacy and legal/security crisis are at stake. This qualitative study, using grounded theory analysis approach, explores how social networking privacy issues, legal concerns and weak legislation lead to cybercrimes in Pakistan. For this purpose, social networking sites, documents, relevant literature and interviews were used as data collection tools. The findings indicate that the social networking big data contains various legal issues such as privacy and security. Moreover, due to weak legislative laws, such issues are promoting cybercrimes such as cyberbullying, cyber stalking, cyber defamation etc. in Pakistan, which may have adverse and devastating effects.

Zarina Waheed, Education Department, Sardar Bahadur Khan Women's University, Quetta, Pakistan

Abstract Extension of information & communication technologies elevated the necessity for more confidentiality of data and its protection against cybercrime. More so, advancement in ICT is beneficial whereas on the contrary, due to its excessive utilization the privacy and legal/security crisis are at stake. This qualitative study, using grounded theory analysis approach, explores how social networking privacy issues, legal concerns and weak legislation lead to cybercrimes in Pakistan. For this purpose, social networking sites, documents, relevant literature and interviews were used as data collection tools. The findings indicate that the social networking big data contains various legal issues such as privacy and security. Moreover, due to weak legislative laws, such issues are promoting cybercrimes such as cyberbullying, cyber stalking, cyber defamation etc. in Pakistan, which may have adverse and devastating effects.

Usman Abdullah, Department of Management Sciences, COMSATS University Islamabad, Islamabad, Pakistan

Abstract Extension of information & communication technologies elevated the necessity for more confidentiality of data and its protection against cybercrime. More so, advancement in ICT is beneficial whereas on the contrary, due to its excessive utilization the privacy and legal/security crisis are at stake. This qualitative study, using grounded theory analysis approach, explores how social networking privacy issues, legal concerns and weak legislation lead to cybercrimes in Pakistan. For this purpose, social networking sites, documents, relevant literature and interviews were used as data collection tools. The findings indicate that the social networking big data contains various legal issues such as privacy and security. Moreover, due to weak legislative laws, such issues are promoting cybercrimes such as cyberbullying, cyber stalking, cyber defamation etc. in Pakistan, which may have adverse and devastating effects.

Sheraz Khan, Judicial Magistrate, Peshawar High Courts, Peshawar, Pakistan

Abstract Extension of information & communication technologies elevated the necessity for more confidentiality of data and its protection against cybercrime. More so, advancement in ICT is beneficial whereas on the contrary, due to its excessive utilization the privacy and legal/security crisis are at stake. This qualitative study, using grounded theory analysis approach, explores how social networking privacy issues, legal concerns and weak legislation lead to cybercrimes in Pakistan. For this purpose, social networking sites, documents, relevant literature and interviews were used as data collection tools. The findings indicate that the social networking big data contains various legal issues such as privacy and security. Moreover, due to weak legislative laws, such issues are promoting cybercrimes such as cyberbullying, cyber stalking, cyber defamation etc. in Pakistan, which may have adverse and devastating effects.

How to Cite

Social networking privacy issues, legal concerns and weak legislation a way to cybercrimes: A case of Pakistan. (2024). Journal of Management Info, 9(4), 556-565. https://doi.org/10.31580/jmi.v9i4.2844

References

Akhlaq, M. A. R. I. A. (2021). Cybercrime in Pakistan: A Study of the Law Dealing with Cybercrimes in Pakistan. PCL Student Journal of Law, V(1), 31-66.

Alelyani, S., & Kumar, H. GR, (2018). Overview of cyberattack on saudi organizations. Journal of Information Security and Cybercrimes Research, 1(1), 32-39. https://doi.org/10.26735/16587790.2018.004

Almadhoor, L. (2021). Social media and cybercrimes. Turkish Journal of Computer and Mathematics Education (TURCOMAT), 12(10), 2972-2981. https://doi.org/10.17762/turcomat.v12i10.4947

Bolo Bhi. (2016). Major contentions: PECA’ last accessed 16 March 2021

Cerruto, F., Cirillo, S., Desiato, D., Gambardella, S. M., & Polese, G. (2022). Social network data analysis to highlight privacy threats in sharing data. Journal of Big Data, 9(1), 19. https://doi.org/10.1186/s40537-022-00566-7

Corbin J, Strauss A (2008). Basics of Qualitative Research: Techniques and Procedures for Developing Grounded Theory. 3rd ed. SAGE

Farooq M. (2019), Active social media users in Pakistan grow by 5.7%: Report. Pakistan Today. https://www.digitalrightsmonitor.pk/active-social-media-users-in-pakistan-grow-by-5-7-report/. Published 2019.

Ganesh, S., Ganapathy, D., & Sasanka, K. (2020). Awareness of Cyber Crime on Social Media. Journal of Contemporary Issues in Business and Government, 26(2), 1758-1765

Ghari W. & Shaabi, M. (2012). Cyber Threats In Social Networking Websites. International Journal of Distributed and Parallel Systems (IJDPS), 3(1), 119-126. DOI:10.5121/ijdps.2012.3109

Goni, O., Ali, M. H., Alam, M. M., & Shameem, M. A. (2022). The Basic Concept of Cyber Crime. Journal of Technology Innovations and Energy, 1(2), 16-24

Goodman, M. D., & Brenner, S. W. (2002). The emerging consensus on criminal conduct in cyberspace. International journal of law and information technology, 10(2), 139-223. https://doi.org/10.1093/ijlit/10.2.139

Gupta S, Singh A, Kumari S, & Kunwar N. (2017). Impact of cyber crime on adolescents through social networking sites. International Journal of Law 3(6), 104-106.

Halder, D. (2011). Information Technology Act and cyber terrorism: A critical review. Available at SSRN https://ssrn.com/abstract=1964261 OR http://dx.doi.org/10.2139/ssrn.1964261

Hernandez-Castro, J., & Boiten, E. (2014). Cybercrime prevalence and impact in the UK. Computer Fraud & Security, 2014(2), 5-8. https://doi.org/10.1016/S1361-3723(14)70461-0

Hussain, Z., Bhutto, Z. A., Rai, G., Hussain, M., & Zaheer, K. (2016). Statistical analysis of network based issues and their impact on social computing practices in Pakistan. Journal of Computer and Communications, 4(13), 23. DOI: https://doi.org/10.4236/jcc.2016.413003

Jaishankar, K. (2018). Cyber criminology as an academic discipline: history, contribution and impact. International Journal of Cyber Criminology, 12(1), 1-8. DOI: https://doi.org/10.5281/zenodo.1467308

Khan, T. (2015). Cybercrimes: Pakistan lacks facilities to trace hackers. The Express Tribune.

Khiralla, F. A. M. (2020). Statistics of cybercrime from 2016 to the first half of 2020. International Journal of Computer Science and Network., 9(5), 252-261.

Kundi, G. M., Nawaz, A., Akhtar, R., & MPhil Student, I. E. R. (2014). Digital revolution, cyber-crimes and cyber legislation: A challenge to governments in developing countries. Journal of Information Engineering and Applications, 4(4), 61-71. doi:http://www.iiste.org/Journals/index.php/JIEA/article/viewFile/12430/12764

Magalla, A. (2018). Prevention and detection of cyber crimes in tanzania as described by cyber crime act, no. 13 of 2015. http://dx.doi.org/10.2139/ssrn.3136637

Mateen, A., & Abbas, Q. (2016). Tsunami of Cyber Crime: Analysis of Cyber Crime New Trends, Causes and Remedies in Future Prospectus. International Journal of Computer Applications, 152(8).

Meter, D. J., & Bauman, S. (2015). When sharing is a bad idea: The effects of online social network engagement and sharing passwords with friends on cyberbullying involvement. Cyberpsychology, Behavior, and Social Networking, 18(8), 437-442. https://doi.org/10.1089/cyber.2015.0081

Miles, M. B., & Huberman, A. M. (1994). Qualitative data analysis: An expanded sourcebook. sage.

Mohammed, F. (2016). PECA 2015: A Critical Analysis of Pakistan’s Proposed Cybercrime Bill. UCLA J Islam Near EL, 15, 71.

Monteith, S., Bauer, M., Alda, M., Geddes, J., Whybrow, P. C., & Glenn, T. (2021). Increasing cybercrime since the pandemic: Concerns for psychiatry. Current psychiatry reports, 23, 1-9. https://doi.org/10.1007/s11920-021-01228-w

Oxford Analytica. (2022). Pakistan, Bangladesh fail to tackle online violence. Emerald Expert Briefings, (oxan-db). https://doi.org/10.1108/OXAN-DB266467

Peng, S., Wang, G., & Xie, D. (2017). Social influence analysis in social networking big data: Opportunities and challenges. IEEE network, 31(1), 11-17. https://doi.org/10.1109/MNET.2016.1500104NM

Prevention of Electronic Crimes Bill 2016.; (2016). http://www.na.gov.pk/uploads/documents/1470910659_707.pdf

Solove, D. J. (2006). Taxonomy of Privacy. University of Pennsylvania Law Review. 154(3), 477. GWU Law School Public Law Research Paper No. 129, Available at SSRN: https://ssrn.com/abstract=667622

Soomro, T. R., & Hussain, M. (2019). Social Media-Related Cybercrimes and Techniques for Their Prevention. Applied Computer Systems, 24(1), 9-17. DOI:10.2478/acss-2019-0002

Sridharan, V. (2016). Pakistan passes 'draconian' cybercrime law threatening civil liberties. International Business Times. https://www.ibtimes.co.uk/pakistan-passes-draconian-cybercrime-law-threatening-civil-liberties-1575530. Accessed August 23, 2020.

Tene, O. (2011). Privacy: The new generations. International data privacy law, 1(1), 15-27. https://doi.org/10.1093/idpl/ipq003

Zahra-Malik, M (2016). Pakistan passes controversial cyber-crime law. Reuters. https://www.reuters.com/article/us-pakistan-internet/pakistan-passes-controversial-cyber-crime-law-idUSKCN10N0ST.

Similar Articles

You may also start an advanced similarity search for this article.