Shazia Masood Khan
The social media revolution has impacted the world’s social, cultural and political life, and Pakistan is no exception. However, social media has dominated the political discourse in Pakistan more than affecting the other courses of individual and collective life. Then, social media is connecting force among humans. It involves the human physiology and brain simultaneously. Therefore, several studies and research have been carried out for the impact analysis of social media. As there are several positives of social media, then, it has also contributed negatively.
Social media is inherently a positive development. Like, all other products, the nature of the product is always positive. Then, the usage of social media is critical. It can be positive and also be negative depending upon the usage of social media. However, most of the usage is positive as it has not only connected the people but also awarded the people for their fundamental rights and obligations towards individuals, society and the state. Rather, it has transformed knowledge, creation and subsequent dissemination. One of the primary concerns is the health outcomes of social media usage. Over the last two decades, an expansive body of literature has been produced to comprehend the role of social media in health communication. Health communication scholars have explored the use of social media from diverse perspectives to investigate the effects of social media on individuals. For instance, studies analyzed how individuals such as ordinary citizens and medical students use social media for health. Another line of research explored how people turn to social media for social and emotional support or join an online community to seek information and treatment options on a particular issue. Additionally, studies have investigated how online campaigns can be used to change social behaviours, such as healthy diet, smoking cessation, political participation and reduction of alcohol consumption.
Examining cultural characteristics is essential in comprehending people’s use of social media for healthy activities, as previous studies have shown the effects of cultural traits on social media use and behaviours. According to Hofstede, culture can be defined as “the collective programming of the mind which distinguishes the members of one category of people from those of another” (p. 389). Indeed, Lin and Ho’s survey of residents in Taiwan suggested cultural characteristics affect people’s use of social media in healthy activities. Other studies revealed significant differences in the ways people from different cultures adopt and use social media or perceive content on social media.
Besides health products, social media is also changing social and cultural behaviours. It is the most potent tool of globalization now. It ensures fundamental rights of freedom of expression and speech. It is also supporting the cultural participation of several marginalized communities. Then, it broke the monopoly of conventional media, which monopolized the narrative and agenda dissemination. It is not only ensuring social connectivity but also improves administrative outreach. Even the public sector in Pakistan has utilized it for organizational proficiency. Social media has impacted each life in Pakistan. One illustration can be quoted as how it has transformed life in Pakistan. Literacy is defined as when a person knows how to read and write; he is a literate person. Even this definition is incorporated in different legislations about literacy. Then, how has social media transformed this basic idea? Any person now who can use social media or Mobile is a literate person. It is one of the examples of how it has transformed the fundamental ideas in Pakistani collective life.
The growth of social media has grown substantial cyber crimes. Hence, the fundamental threat to social media is the happening of cyber crimes. There are different types of cybercrimes, classified into the following categories:
- Hacking
- Identity theft
- Cyberbullying
- Cyberstalking
- Spoofing
- Financial fraud
- Digital Piracy
- Computer viruses and worms
- Malicious Software
- Intellectual property rights
- Money Laundering
- Denial of Service attack
- Electronic Terrorism
- Vandalism
Hacking: It is a type of cybercrime in which unauthorized access is gained to data in a system or computer.
Identity theft: It is the deliberate use of someone else’s identity. The term identity theft was first used in 1964.
Cyberbullying: Also known as online bullying, cyberbullying, or is a form of harassment or bullying done using electronic means.
Cyberstalking: It is the use of the internet to stalk or harass someone. It involves false accusations, slander, and defamation.
Spoofing: It is a trick in which hackers deceive computer systems to gain an illegitimate advantage and steal data from personal networks or websites.
Financial fraud: It is when someone steals money or deprives others of their assets through online means.
Digital Piracy: Also known as online piracy, it involves the practice of illegally downloading and distributing digital copyrighted content.
Computer viruses and worms: They are types of malware computer programmes that replicate themselves to spread and infect computer systems.
Malware: Software designed by cyber criminals to intentionally cause damage to the server, computer, client, or network.
Intellectual property rights: Intellectual property theft is defined as the online theft of content or material that is copyrighted.
Money Laundering: It involves the use of the internet to launder money through different online payment systems.
Denial of service attack (DOS attack): It is a cyberattack to disrupt the targeted server and its traffic. It makes a network resource or machine unavailable to the intended users.
Electronic terrorism: Also known as cyberterrorism, electronic terrorism involves the use of the internet for violent acts. It involves potentially threatening someone or achieving ideological or political gains.
Online Vandalism: It is the action that involves the deliberate damage and destruction of your online material. It may also involve the modification of the online content on your website without your permission.
Then, there are negative impacts of social media. It still needs to be regulated in Pakistan. Cybercrime is rampant and social media trolling is unabated. Freedom of speech and expression does not necessarily means entering someone’s privacy. The Parliament has passed cybercrime laws in Pakistan. These include;
- Electronic Transaction Ordinance (ETO) 2002
- Electronic / Cyber Crime Bill 2007
- Prevention of Electronic Crimes Act (PECA) 2016
Electronic Transactions Ordinance (ETO) 2002
The Electronic Transactions Ordinance (ETO), which was enacted in 2002, was the first IT-related legislation. It was an important first step in ensuring the legal sanctity and security of the local e-commerce sector.
A major portion of Pakistan’s cybercrime legislation was influenced by foreign cybercrime legislation. It is divided into 43 categories that deal with various forms of cyber offences in Pakistan.
Pakistan’s cybercrime law covers the following eight major aspects of the e-commerce industry:
- Recognition of electronic documents
- Electronic communications
- The digital signature regime and its evidential consequences
- Website and digital signatures certification providers
- Stamp duty
- Attestation and notarization of certified copies
- Jurisdiction
- Offences
Prevention of Electronic Crimes or Cybercrimes Ordinance 2007
In 2007, the PECO (Prevention of Electronic Crimes or Cybercrimes Ordinance) was passed. Pakistan’s cybercrime law covers the following electronic offences:
- Terrorism on the internet
- Damage to data
- Electronic thievery
- Forgery of electronic documents
- Unauthorized entry
- Cyberstalking
- Cyber-spamming/spoofing
Cybercriminals in Pakistan may face a variety of sanctions under PECO. Depending on the crime, they can range from six months in prison to even the death penalty.
The regulations apply to everyone in Pakistan who commits cybercrime, regardless of country of citizenship.
Prevention of Electronic Crimes Act 2016
In 2016, the Prevention of Electronic Crimes Act (PECA) was passed. It provides a comprehensive framework for all forms of cybercrime and is based on the Cyber Crime Bill of 2007.
It deals with the following internet crimes:
- Unauthorized data access (hacking)
- Denial of Service (DoS) assault (DOS Attack)
- Electronic forgery and electronic fraud
- Cyberterrorism
PECA Penalties on Cybercrimes
PECA imposes the following punishments on cyber criminals:
- For unauthorized access to critical information systems, you might face up to three years in prison, a fine of one million Pakistani rupees, or both.
- Disruption of important information systems with misleading or deceptive motives can result in up to seven years in prison, a PKR ten million fine, or both.
- For involvement in a terrorism-related offence, you might face up to seven years in prison, a PKR ten million fine, or both.
- Importing, exporting, or distributing electronic equipment for offensive use can result in up to six months in prison, a PKR fifty thousand fine, or both.
- For being involved in a data breach, you might face up to three years in prison, a PKR five million fine, or both. It could include the unintentional internet release of someone’s personal information.
Safeguarding social media devices, particularly mobile phones and an internet connection, is also essential. Therefore, users of social media must know how to use it. People not adept at using social media find it embarrassing sometimes as they need help to secure their personal information. Following are a few guidelines for using and securing social media usage.
How to secure Mobile Phones?
- To keep your smartphone safe, you need to use a strong password.
- Set on your device’s automatic lock.
- Install an antivirus or other protection software on your computer.
- Applications should only be downloaded from trusted sources.
- Examine all application permissions.
- Remember to upgrade your operating system’s security.
- Any spam links you get via email or text message should be avoided.
- Turn off your WiFi connection’s automatic mode.
- Always look for “HTTPS” in the URL when browsing or purchasing online on your smartphone or PC.
How to secure Banking Transactions
- Use separate pin codes for different bank accounts.
- For any form of internet banking, avoid using computers in cybercafes.
- When accessing your bank account, never leave the computer alone.
- Always sign up for transaction alerts via mobile SMS and email.
- Never respond to emails or messages requesting your pin code or password.
- After you’ve finished using e-banking services, log out and exit your browser.
- Always cover the keypad before entering the pin code when using an ATM.
- Examine the area around an ATM to ensure that no additional devices have been installed.
How to secure Social Media
- To gain access to your account, use additional security mechanisms (security code, login alert etc.).
- Set on the login notification alert.
- Only trusted people can view what you post (videos, photos, tagged locations, friends, etc.).
- Control and monitor who has access to your contact information.
Internet Safe Connection
- First and foremost, replace your router’s default administrative usernames and passwords.
- Have a strong password and change it at frequent intervals.
- Turn off your network/WiFi routers when not in use.
- Check the privacy options in your browser.
- Don’t give up personal information in exchange for something free on the internet.
- Avoid clicking on links provided in emails.
Reporting a Cybercrime in Pakistan
The Federal Investigation Agency (FIA) is in charge of the National Response Centre for Cyber Crime (NR3C). In Pakistan, it serves as a cyber law enforcement agency.
The NR3C has expertise in digital forensics, information system security audits, technical investigation, penetration testing, and related training.
Hence, it is critical that social media must be regulated in Pakistan. The usage of it should not remain optional but regulated under legislation, delegated legislation and policy framework. However, this regulation must be objective, not subject and should not contrast the fundamental rights protected in articles eight to twenty-eight.
The writer is an Assistant Professor.