A Controversial Hypercritical Examination of Cybersecurity Policies in Pakistan that Cannot Be Ignored
Pakistan has witnessed a very fast digit transformation. The present article explains how this new technology has affected economic activities, critical infrastructure management, and communication dynamics in Pakistan. Without a doubt, digital infrastructure provides a way for the communication and interaction, which are also increasingly being targeted by hackers, cybercriminals, state proxy and governments. Resolving these risks involves a multi-dimensional solution that includes technical, organizational, and legal remedies. Moreover, the interplay of cyber law and cybersecurity occupies a paramount position as regards the safety of personal, organizational, and national data that are often the target of growing cyber threats. Through the discussion of the developing context of cyber incidents and the significant role of the legal and security environment, the article focuses on the aforesaid issue, the lack of proactive measures that should be taken to combat cyber risks and safeguard the integrity of the digital world.
-
Digital Information, Cyberattacks, Cybersecurity, Vulnerabilities, Legal Frameworks, Economic Activities, Critical Infrastructure, Communication Dynamics National Security
-
(1) Rana Zaheer ud din Ahmad
Advocate, High Court, Pakistan.
(2) Mirza Shahid Rizwan Baig
Assistant Professor, Department of Law, Government College University Faisalabad, Faisalabad, Punjab, Pakistan.
-
Aftab, R. M., Ijaz, M., Rehman, F., Ashfaq, A., Sharif, H., Riaz, N., Hussain, S., Arslan, M., & Maqsood, H. (2022). A Systematic Review on the Motivations of Cyber-Criminals and Their Attacking Policies. 3rd International Conference on Innovations in Computer Science & Software Engineering (ICONICS),. https://doi.org/10.1109/iconics56716.2022.10100569
- Darwish, A., & Lakhtaria, K. I. (2011). The impact of the new Web 2.0 technologies in communication, development, and revolutions of societies. Journal of Advances in Information Technology, 2(4). https://doi.org/10.4304/jait.2.4.204-216
- Hirtle, S. C., & Raubal, M. (2013). Many to many mobile maps. In Lecture notes in geoinformation and cartography (pp. 141–157). https://doi.org/10.1007/978-3-642-34359-9_8
- Lehto, M. (2013). The ways, means and ends in cyber security strategies. In Proceedings of the 12th European Conference on Information Warfare and Security.
- Lin, J., Yu, W., Zhang, N., Yang, X., Zhang, H., & Zhao, W. (2017). A survey on Internet of things: architecture, enabling technologies, security and privacy, and applications. IEEE Internet of Things Journal, 4(5), 1125–1142. https://doi.org/10.1109/jiot.2017.2683200
- Malik, M. B. (2018). Architecture of cyberspace as an evolving security paradigm in South Asia: Pakistan-India cyber security strategy. Institute of Regional Studies, Islamabad, 36(2), 3-35.
- Menon, S., & Siew, T. G. (2012). Key challenges in tackling economic and cyber crimes. Journal of Money Laundering Control, 15(3), 243–256. https://doi.org/10.1108/13685201211238016
- Möller, D. P. F. (2023). Cybersecurity in digital transformation. In Advances in information security (pp. 1–70). https://doi.org/10.1007/978-3-031-26845-8_1
- Newmeyer, K. P. (2014). Cybersecurity strategy in developing nations: A Jamaica case study [Doctoral dissertation, Walden University]. Walden University Dissertations and Doctoral Studies.
- Pătraşcu, P. (2021). Emerging Technologies and National Security: The Impact of IoT in Critical Infrastructures Protection and Defence Sector. Revista Academiei Forţelor Terestre, 26(4), 423–429. https://doi.org/10.2478/raft-2021-0055
- Perwej, D., Abbas, S. Q., Dixit, J. P., Akhtar, N., & Jaiswal, A. K. (2021). A Systematic Literature Review on the Cyber Security. International Journal of Scientific Research and Management, 9(12), 669–710. https://doi.org/10.18535/ijsrm/v9i12.ec04
- Petrenko, S. (2022). Cyber security innovation for the digital economy: A case study of the Russian Federation. River Publishers.
- Rasheed, H., Hoellein, L., Bukhari, K. S., & Holzgrabe, U. (2019). Regulatory framework in Pakistan: situation analysis of medicine quality and future recommendations. Journal of Pharmaceutical Policy and Practice, 12(1). https://doi.org/10.1186/s40545-019-0184-z
- Relia, S. (2015). Cyber warfare: Its implications on national security. Vij Books India Pvt Ltd.
- Shah, N., Zada, H., & Bibi, A. (2022). Harassment in the purview of Social Media: A Cross-Sectional Analysis of Youth in District Dir Lower. Pakistan Languages and Humanities Review, 6(III). https://doi.org/10.47205/plhr.2022(6-iii)43
- Shandilya, S. K., Datta, A., Kartik, Y., & Nagar, A. (2024). Achieving Digital Resilience with Cybersecurity. In EAI/Springer Innovations in Communication and Computing (pp. 43–123). https://doi.org/10.1007/978-3-031-53290-0_2
- Ullah, S., Amir, M., Khan, M., Asmat, H., & Habib, K. (2015). Pakistan and cyber crimes: Problems and preventions. First International Conference on Anti-Cybercrime (ICACC),. https://doi.org/10.1109/anti-cybercrime.2015.7351951
- Yusuf, H., Dragomir, M., Thompson, M., Watts, G., Chan, Y.-Y., & Nissen, C. S. (2013). Mapping digital media: Pakistan. Open Society Foundations.
Cite this article
-
APA : Ahmad, R. Z. u. d., & Baig, M. S. R. (2024). A Controversial Hypercritical Examination of Cybersecurity Policies in Pakistan that Cannot Be Ignored. Global Strategic & Security Studies Review, IX(II), 43-54. https://doi.org/10.31703/gsssr.2024(IX-II).04
-
CHICAGO : Ahmad, Rana Zaheer ud din, and Mirza Shahid Rizwan Baig. 2024. "A Controversial Hypercritical Examination of Cybersecurity Policies in Pakistan that Cannot Be Ignored." Global Strategic & Security Studies Review, IX (II): 43-54 doi: 10.31703/gsssr.2024(IX-II).04
-
HARVARD : AHMAD, R. Z. U. D. & BAIG, M. S. R. 2024. A Controversial Hypercritical Examination of Cybersecurity Policies in Pakistan that Cannot Be Ignored. Global Strategic & Security Studies Review, IX, 43-54.
-
MHRA : Ahmad, Rana Zaheer ud din, and Mirza Shahid Rizwan Baig. 2024. "A Controversial Hypercritical Examination of Cybersecurity Policies in Pakistan that Cannot Be Ignored." Global Strategic & Security Studies Review, IX: 43-54
-
MLA : Ahmad, Rana Zaheer ud din, and Mirza Shahid Rizwan Baig. "A Controversial Hypercritical Examination of Cybersecurity Policies in Pakistan that Cannot Be Ignored." Global Strategic & Security Studies Review, IX.II (2024): 43-54 Print.
-
OXFORD : Ahmad, Rana Zaheer ud din and Baig, Mirza Shahid Rizwan (2024), "A Controversial Hypercritical Examination of Cybersecurity Policies in Pakistan that Cannot Be Ignored", Global Strategic & Security Studies Review, IX (II), 43-54
-
TURABIAN : Ahmad, Rana Zaheer ud din, and Mirza Shahid Rizwan Baig. "A Controversial Hypercritical Examination of Cybersecurity Policies in Pakistan that Cannot Be Ignored." Global Strategic & Security Studies Review IX, no. II (2024): 43-54. https://doi.org/10.31703/gsssr.2024(IX-II).04