SOCIAL MEDIA AND CYBER CRIMES IN PAKISTAN FACTS PROPAGANDA AWARENESS AND LEGISLATION

http://dx.doi.org/10.31703/gpr.2018(III-II).09      10.31703/gpr.2018(III-II).09      Published : Dec 2
Authored by : AsadMunir , GhulamShabir

09 Pages : 84-97

References

  • Ahmed, A., & Khan, D. S. (2015). Cyber Security Issues and Ethical Hacking in Pakistan. Department of Computer Science Karachi University.
  • Al-Hamami, A. H., & Al-Sadoon, G. M. (2014). Handbook of Research on Threat Detection and Coutermeasures in Network Security: Advances in Information Security, Privacy and Ethics. Hersley: IGI Global.
  • Alkaabi, A., Mohay, G., McCullagh, A., & Chantier, N. (2010). Dealing with the Problem of Cybercrime. Digital Forensics and Cyber Crime: Second International ICST Conference (pp. 14-15). Abu Dhabi: Springer Science & Business Media.
  • Bandura, A. (1977). Social Learning Theory. Eaglewood Cliffs, NJ: Prentice Hall.
  • Bansal, D., Sofat, S., Harsha, S., & Saluja, S. (2011, June). Current Trends in Internet Usage and Cyber Crimes against Youth. International Journal of Cyber Society and Education, IV(1), 55-62
  • Batke, K. (2011, December 21). 7 types of cyber crimes and criminals. Retrieved March 17, 2015 from Faronics https://www.faronics.com/news/blog/7-types-of-cyber-criminals
  • Bhakare, J. (2013). Sexual exploitation of children over the Internet - International perspectives. SASCV 2013 Proceedings (pp. 396-399). K. Jaishankar.
  • Citron, D. K. (2014). Hate Crimes in Cyberspace. Cambridge, Massachuetts, London: Harvard University Press
  • EC-Council. (2009). Computer Forensics: Investigating Network Intrusions and Cyber Crime. Cengage Learning
  • Kumar, T., Jha, R. k., & Ray, S. M. (2012, October). Cyber Crime And Thier Solution. International Journal Of Engineering And Computer Science, I(1), 48-52.
  • liao, x. (2006). central asia and china,s energy security. china and eurasian quarterly, 62.
  • Maniscalchi, J. (2010, October 4). The Human Impact of Cyber Crime. Retrieved 12 14, 2015, from Digital Threat http://www.digitalthreat.net/2010/10/the-human-impact-of-cyber- crime
  • Nirmala, M., & Kumar, K. N. (2010, September-October). A Survey on Methodologies and Techniques for Detection and Prevention of Phishing. International Journal of Advanced Research in Computer Science, I(3).
  • NR3C. (2015). Cyber Crime. Retrieved March 17, 2015, from National Response Centre for Cyber Crime http://www.nr3c.gov.pk/cybercrime.html
  • Opala, O. J., & Rahman, S. M. (2013, September). Corporate Role in Protecting Consumers from the Rist of Identity Theft. International Journal of Computer Networks & Communications, V(5), 19-33
  • Panda Security. (2018, August 20). Types of Cybercrimes. Retrieved from Panda Security https://www.pandasecurity.com/mediacenter/panda-security/types-of-cybercrime/
  • Shalhoub, Z. K., & Al-Qasimi, S. L. (2010). Cyber Law and Cyber Security in Developing and Emerging Economies. Edward Elgar Publishing.
  • Trout, B. J. (2007). Cyber Law: A legal arsenal for online businesses. World Audience Inc
  • USAID. (2015). Cyber Crime: Its impact on Government, Society an the Prosecutor. Retrieved December 16, 2015, from http://pdf.usaid.gov/pdf_docs/Pnada641.pdf
  • Vazquez, C. I. (2006). Cyber crime, the internet and its impact on the business enterprise and the role of the technology manager. Capstone Project, University of Denver.
  • Villiers, M. d. (2011). Enabling Technologies of Cyber Crime: Why Lawyers Need to Understatand IT. Pittsburgh Journal of Technology Law and Policy, 01-53.
  • Wall, D. S. (2007). Cybercrime: The Transformation of Crime in the Information Age Crime and society series. Cambridge: Polity Press
  • Ahmed, A., & Khan, D. S. (2015). Cyber Security Issues and Ethical Hacking in Pakistan. Department of Computer Science Karachi University.
  • Al-Hamami, A. H., & Al-Sadoon, G. M. (2014). Handbook of Research on Threat Detection and Coutermeasures in Network Security: Advances in Information Security, Privacy and Ethics. Hersley: IGI Global.
  • Alkaabi, A., Mohay, G., McCullagh, A., & Chantier, N. (2010). Dealing with the Problem of Cybercrime. Digital Forensics and Cyber Crime: Second International ICST Conference (pp. 14-15). Abu Dhabi: Springer Science & Business Media.
  • Bandura, A. (1977). Social Learning Theory. Eaglewood Cliffs, NJ: Prentice Hall.
  • Bansal, D., Sofat, S., Harsha, S., & Saluja, S. (2011, June). Current Trends in Internet Usage and Cyber Crimes against Youth. International Journal of Cyber Society and Education, IV(1), 55-62
  • Batke, K. (2011, December 21). 7 types of cyber crimes and criminals. Retrieved March 17, 2015 from Faronics https://www.faronics.com/news/blog/7-types-of-cyber-criminals
  • Bhakare, J. (2013). Sexual exploitation of children over the Internet - International perspectives. SASCV 2013 Proceedings (pp. 396-399). K. Jaishankar.
  • Citron, D. K. (2014). Hate Crimes in Cyberspace. Cambridge, Massachuetts, London: Harvard University Press
  • EC-Council. (2009). Computer Forensics: Investigating Network Intrusions and Cyber Crime. Cengage Learning
  • Kumar, T., Jha, R. k., & Ray, S. M. (2012, October). Cyber Crime And Thier Solution. International Journal Of Engineering And Computer Science, I(1), 48-52.
  • liao, x. (2006). central asia and china,s energy security. china and eurasian quarterly, 62.
  • Maniscalchi, J. (2010, October 4). The Human Impact of Cyber Crime. Retrieved 12 14, 2015, from Digital Threat http://www.digitalthreat.net/2010/10/the-human-impact-of-cyber- crime
  • Nirmala, M., & Kumar, K. N. (2010, September-October). A Survey on Methodologies and Techniques for Detection and Prevention of Phishing. International Journal of Advanced Research in Computer Science, I(3).
  • NR3C. (2015). Cyber Crime. Retrieved March 17, 2015, from National Response Centre for Cyber Crime http://www.nr3c.gov.pk/cybercrime.html
  • Opala, O. J., & Rahman, S. M. (2013, September). Corporate Role in Protecting Consumers from the Rist of Identity Theft. International Journal of Computer Networks & Communications, V(5), 19-33
  • Panda Security. (2018, August 20). Types of Cybercrimes. Retrieved from Panda Security https://www.pandasecurity.com/mediacenter/panda-security/types-of-cybercrime/
  • Shalhoub, Z. K., & Al-Qasimi, S. L. (2010). Cyber Law and Cyber Security in Developing and Emerging Economies. Edward Elgar Publishing.
  • Trout, B. J. (2007). Cyber Law: A legal arsenal for online businesses. World Audience Inc
  • USAID. (2015). Cyber Crime: Its impact on Government, Society an the Prosecutor. Retrieved December 16, 2015, from http://pdf.usaid.gov/pdf_docs/Pnada641.pdf
  • Vazquez, C. I. (2006). Cyber crime, the internet and its impact on the business enterprise and the role of the technology manager. Capstone Project, University of Denver.
  • Villiers, M. d. (2011). Enabling Technologies of Cyber Crime: Why Lawyers Need to Understatand IT. Pittsburgh Journal of Technology Law and Policy, 01-53.
  • Wall, D. S. (2007). Cybercrime: The Transformation of Crime in the Information Age Crime and society series. Cambridge: Polity Press

Cite this article

    CHICAGO : Munir, Asad, and Ghulam Shabir. 2018. "Social Media and Cyber Crimes in Pakistan: Facts, Propaganda, Awareness, and Legislation." Global Political Review, III (II): 84-97 doi: 10.31703/gpr.2018(III-II).09
    HARVARD : MUNIR, A. & SHABIR, G. 2018. Social Media and Cyber Crimes in Pakistan: Facts, Propaganda, Awareness, and Legislation. Global Political Review, III, 84-97.
    MHRA : Munir, Asad, and Ghulam Shabir. 2018. "Social Media and Cyber Crimes in Pakistan: Facts, Propaganda, Awareness, and Legislation." Global Political Review, III: 84-97
    MLA : Munir, Asad, and Ghulam Shabir. "Social Media and Cyber Crimes in Pakistan: Facts, Propaganda, Awareness, and Legislation." Global Political Review, III.II (2018): 84-97 Print.
    OXFORD : Munir, Asad and Shabir, Ghulam (2018), "Social Media and Cyber Crimes in Pakistan: Facts, Propaganda, Awareness, and Legislation", Global Political Review, III (II), 84-97
    TURABIAN : Munir, Asad, and Ghulam Shabir. "Social Media and Cyber Crimes in Pakistan: Facts, Propaganda, Awareness, and Legislation." Global Political Review III, no. II (2018): 84-97. https://doi.org/10.31703/gpr.2018(III-II).09