0% found this document useful (0 votes)
9 views14 pages

Cyber Law and Warfare-1

The document discusses the significance of international law in regulating cyber laws and cyber warfare, highlighting the rise of cybercrime and the need for updated legislation. It provides a historical background on cyber warfare, the implications of social responsibility theory, and outlines the current state of cyber laws in various countries, including China and Pakistan. Additionally, it details the types of cyber warfare, international norms, and specific cybercrime laws and penalties in Pakistan.

Uploaded by

Atia hanif
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
9 views14 pages

Cyber Law and Warfare-1

The document discusses the significance of international law in regulating cyber laws and cyber warfare, highlighting the rise of cybercrime and the need for updated legislation. It provides a historical background on cyber warfare, the implications of social responsibility theory, and outlines the current state of cyber laws in various countries, including China and Pakistan. Additionally, it details the types of cyber warfare, international norms, and specific cybercrime laws and penalties in Pakistan.

Uploaded by

Atia hanif
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 14

ASSIGNMENT

Cyber Laws and Cyber Warfare:

Introduction:

International law forms interactions among countries and international interested parties through
with a variety of restrictions, prerequisites, and authorizations. As an outcome, it really has
prepared the path for the regulation of global governance problems which also includes cyber
laws and cyber warfare. As nations concentrate to cyber related oversights and cyber laws on
global level, the impact of international law in the cyber and technical world has gained much
importance. As the modern techs and data information means grown it will also bring some
complications and bad aspects along with it which are cybercrimes and cyber-attacks. 1

In current times, cybercrime is on the rise, and many countries are lagging in updating their
legislation to keep up. cybercrime is defined as a crime committed against an individual or a
group of individuals with the intent to harm the victim's reputation or brand. Cybercrime
includes identity theft, hacking, cyberstalking, digital piracy, cyberbullying, spoofing, and
financial fraud.2 States are making different laws, legislations, and regulations to control,
administer and tackle these problems and digital criminal offences.

Historical Background:

Understanding the current state and purpose of international law governing the use of the Internet
for violent purposes in peace and war requires some background knowledge. With the end of the
Cold War, the era of cyber warfare began. The US government developed destructive software
during the Cold War to disable the enemy's communication network in the event of a nuclear
attack, ensuring that communications would not be disrupted.

This also give other global entities encouragement to use modern technology to destruct their
enemies, other state digital security and cyber space and any other person information data which

1
“Abid A. Adonis, 'International Law On Cyber Security In The Age Of Digital Sovereignty' (E-International
Relations, 2020) <https://www.e-ir.info/2020/03/14/international-law-on-cyber-security-in-the-age-of-digital-
sovereignty/> accessed 27 April 2022”
2
“Chang Weiping, 'International Pere On Fighting Cybercrime' (2003) 1 Lecture Notes in Computer Science
accessed 27 April 2022”
they desire through hacking, cyber-attacks or from other kind of digital tool for breaching digital
privacy and security and to get access.

As an outcome of widespread belief that electronic spectrum control is a critical component of


any state's sovereignty, special cyber laws and forces dedicated to electronic warfare have been
established. Because it combines traditional military tactics with electronic means and methods,
cyber warfare is an important part of the hybrid warfare strategy.3

Social Responsibility Theory:

According to the SRT, information should be freely shared, but media content should be
discussed in public forums, and media organizations or personnel should feel responsible for the
society in which they live, filtering their content based on the society's acceptance level and
needs.4 It believes that rather than being censored from the outside, media content should be
subjected to an internal accountability system.

The SRT emphasizes the importance of comprehending the risks and vulnerabilities associated
with internet use, particularly social media. It also emphasizes the importance of government
agencies developing guidelines and policies to encourage better, healthier, and safer internet
usage and prevention of their state people from cyber-attacks and personal private data breaching
from third parties with criminal intent.

Cyber Laws:

Cyber law is a legal system designed to deal with the internet, computing, and cyberspace. It is in
charge of online security and the distribution of e-commerce products over the internet.
Cybercrime and other forms of electronic crime are governed by cyber law.

Cyber laws are intended to accomplish the following goals:

3
“Marco Roscini, 'Cyber Operations And The Use Of Force In International Law' (2014) 2 Oxford University Press
<https://scholar.google.com/scholar?
hl=en&as_sdt=0%2C5&q=International+Cyber+law&btnG=#d=gs_qabs&t=1651062712073&u=%23p
%3De0xRzNRO7WsJ> accessed 27 April 2022”
4
“Steve Smith, 'Social Responsibility Theory' (Communication Theory, 2016)
<https://www.communicationtheory.org/social-responsibility-theory/> accessed 27 April 2022”
There are 4.67 billion Global Internet Users, according to the World Internet Statistics
Organization.5 This figure is rising at a rate of 7% per year. Enacting and enforcing strict cyber
rules, which are becoming increasingly important as internet usage grows at an alarming rate,
can aid in the creation of a safe and secure environment.

International Cyber Crime:

Because there are no "cyber-borders" between countries, cybercrime is referred to as


"Transnational" or "International" criminal activity. It can take many different forms and
manifest itself in a variety of ways. 6 The Assignment will focus on international cooperation
legislative and regulatory initiatives as different countries use different law enforcement and
technical countermeasures to combat cybercrimes and cyber warfare.

Cyber Warfare:

A nation-state or international organization uses computer viruses or denial-of-service attacks.


Cyberwarfare is the utilization of digital cyber-attacks against an adversary country. It aims to
cause damage comparable to traditional warfare and/or prevent critical computer systems from
operating normally.7 "Cyberwarfare" is the application and utilization of technological force by
governments in computer networking’s where data is stored, shared, or communicated over the
internet.8

Cyber Sanctions and Cyberwarfare:

5
“Manish Lunker, Cyber Laws: A Global Perspective' [2009] privacy and cybercrime institute report International
Comparison of Cyber Crime, 2009 <https://scholar.google.com/scholar?
hl=en&as_sdt=0%2C5&q=Cyber+laws&btnG=#d=gs_qabs&t=1651062737505&u=%23p%3DKrabyWBQ8XgJ>
accessed 27 April 2022”
6
“Michael N Schmitt and Liis Vihul, 'The Nature Of International Law Cyber Norms' (2014) 2 Tallinn Papers
<https://scholar.google.com/scholar?
hl=en&as_sdt=0%2C5&q=International+Cyber+law&btnG=#d=gs_qabs&t=1651062676782&u=%23p
%3DB4DjQBlUoo0J> accessed 27 April 2022”
7
“Jason Andress and Steve Winterfeld, 'Cyber Warfare: Techniques, Tactics And Tools For Security Practitioners'
(2013) 2 Elsevier <https://scholar.google.com/scholar?
hl=en&as_sdt=0%2C5&q=Cyber+warfare+&btnG=#d=gs_qabs&t=1651062889100&u=%23p%3Dv53_SV8rksAJ>
accessed 27 April 2022”
8
“Lech Janczewski and Andrew Colarik, 'Cyber Warfare And Cyber Terrorism' (2007) 21 IGI Global
<https://scholar.google.com/scholar?
hl=en&as_sdt=0%2C5&q=Cyber+warfare+&btnG=#d=gs_qabs&t=1651062833262&u=%23p%3Dt5Ki-QKqhP4J>
accessed 27 April 2022”
Cyberwarfare is the concept of retaliating against cyber-attacks with digital attacks such as those
described on this page. Another option to consider is cyber sanctions imposed by countries in
response to being the target of cyberattacks.9 Although it is not always possible to identify the
perpetrator, suspicions may be directed toward a specific state or group of states. Economic
sanctions, both multilaterals and unilateral, can be utilized in place of cyber-warfare in these
situations, depending on the circumstances. .10

Kinds of Cyber Warfare:

A country's security can be jeopardized in a variety of ways as a result of cyber warfare. Cyber-
attacks can also be utilized to assist traditional warfare operational processes at a most basic
level.11 To facilitate an air attack, cyber means could be used to tamper with the operation of air
defenses. Cyber warfare can be used to combat both "soft" threats like espionage and "hard"
threats like espionage and propagandist campaigns.12

International Norms for the Regulations of Cyber Violations:

A number of states have passed or are considering legislation that recognizes and punishes
cyber-violence. There is clearly a lot of room for legal ambiguity in this situation. International
norms govern cyber violence during times of peace; at times of war, only general rules of
international law apply.

Cyber laws in China:

Cyber laws in China considered as World leading and exemplary model for implementing cyber
laws in state level. On November 7 th of 2016, Chinese authorities enforced the “China Cyber
Security Law CSL”. The CSL went into effect on 1 st of June 2017, only with goal and objective

9
“Michael Robinson, Kevin Jones, and Helge Janicke, 'Cyber Warfare: Issues And Challenges' (2015) 49
Computers & security <https://scholar.google.com/scholar?
hl=en&as_sdt=0%2C5&q=Cyber+warfare+&btnG=#d=gs_qabs&t=1651062813573&u=%23p
%3DxcJAFOSYgUQJ> accessed 27 April 2022”
10
“Johannes Bauer and J. G Michel, 'Cybersecurity: Stakeholder Incentives, Externalities, And Policy Options'
(2009) 33 Telecommunications Policy”
11
“Paulo Shakarian and Andrew Ruef, 'Introduction To Cyber-Warfare: A Multidisciplinary Approach' (2013) 14
Newness <https://scholar.google.com/scholar?
hl=en&as_sdt=0%2C5&q=Cyber+warfare+&btnG=#d=gs_qabs&t=1651062852469&u=%23p%3DxxsFMv_Lt8oJ>
accessed 27 April 2022”
12
“Wipul Jayawickrama, 'Cyber Crime—Threats, Trends And Challenges, Computer Security Week' (2008) 3 Info
Shield”
of creating a unified regulatory legislative framework in China for cyber warfare, cybersecurity
as well as data and personal information preventions.13

The operators of online networks that are registered in other regions should indeed apply for a
cybersecurity assessment in China. According to the Latest Initiatives, if an emerging network
provider seems to have more than 1 million clients' personal details and wants to be registered in
another country, that must pertain for a cybersecurity and cybercrime review and digital audit to
secure the privacy and data information of their clients so no breach can be observe.

Infractions and violations of Articles “285, 286 and 287” of CSL can result in incarceration,
detainment, as well as financial penalties. In severe instances, the perpetrator could face a
punishment of up to 7 years in detention center for fraudulently possessing information and from
a computer network or system by cyber-attack.

International law implications on cybercrimes and violations:

International law provides a customized set of legal principles and regulations for governing
cyberspace on global level, with several examples particularly, African Union Convention on
Cyber Security, Personal Data Protection, and the Budapest Convention on Cybercrime. Most
states and international organizations, including the United Nations' First Committee on
Disarmament and International Security, the G20, the EU had already stated that
current contemporary multilateral international rules apply to countries' utilization
of communication and information technology and the cybercrime related issues. The rules lay
out by these conventions will regards as international norms for regulation and protection of
digital data and considered as binding among UNO member’s state.

Cyber Laws and Cyber Warfare in Pakistan:

Pakistan's government has agreed to develop a "National Cyber Security Policy 2021," which
will include a cybersecurity response framework. A "Cyber Governance Policy Committee" has
been formed to ensure that the policy is properly implemented. Cyber-attacks on government

13
Bin Liang and Hong Lu, 'Internet Development, Censorship, And Cyber Crimes In China' (2010) 26
<https://scholar.google.com/scholar?
hl=en&as_sdt=0%2C5&q=China+cyber+laws&btnG=#d=gs_qabs&t=1651321747149&u=%23p
%3Dz54tiZ7chKQJ> accessed 30 April 2022.
institutions will be treated as an act of aggression against national sovereignty, according to that
policy.

This initiative is also focused on preventing financial destabilization due to information and
other forms of communication technology misuse, such as cybercrime. The FIA has established a
“Cyber Patrolling Unit” to keep track of what is happening on the internet, in accordance with
the policy outlined above.14

Prevention of Electronic Crime Act:

As per to the legislative Act of Electronic Crimes Prevention Act 2016 of Pakistan, using
electronic devices for criminal purposes is prohibited by federal law. The country's most
important cybersecurity law, the PECA aims to prevent and detect all types of cybercrime. PECA
was made available to the general public for the first time in 2016. The Cyber Crime Bill of 2007
in Pakistan establishes a comprehensive framework for various forms of cybercrime. In Pakistan,
this framework addresses a variety of internet crimes, including denial of service attacks,
unauthorized data access via hacking, fraud, cyberterrorism, and electronic forgery.

Aim and Objective:

The main goal of the PECA Act is to deter cyberbullying by making certain acts and offenses
illegal and punishable. If evidence of wrongdoing is discovered, a three-year prison sentence, up
to one million rupees fine, or a combination of these 2 punishments could be imposed.

Cybercrime Wings:

In addition to an investigation and forensic section, the FIA Cyber Crime Wings will have an
information technology section. Data and networks have been set aside for the purpose of
detecting and preventing cybercrime. Compensation will be available to those who have been
wronged outside of the legal system. They also have the option of pursuing damages in Court.15

Case Authority:
14
“Jawad Hussain, Awan, Shahzad Memon, and Fateh Muhammad Burfat, 'Role Of Cyber Law And Mitigation
Strategies In Perspective Of Pakistan To Cope Cyber Threats' (2019) 9 International Journal of Cyber Warfare and
Terrorism (IJCWT) <https://scholar.google.com/scholar?
hl=en&as_sdt=0%2C5&q=Cyber+law+in+in+Pakistan+&btnG=#d=gs_qabs&t=1651062923017&u=%23p
%3Dh3wloCuBw_gJ> accessed 27 April 2022”
15
“Dr Syed Akhtar Ali Shah, 'Cybersecurity Through Laws In Pakistan' Tribune (2021)
<https://tribune.com.pk/story/2329721/cybersecurity-through-laws-in-pakistan> accessed 27 April 2022.
“Rana M. Arshad v Federation of Pakistan16”

The Islamabad High Court upholds the petitioner's right to file a report under the Pakistan
Electronic Crimes Act (PECA), as well as declaring that the petitioner has not broken or
infringed on any Pakistani cyber law.

Cyber Attacks and Risks of Bank Failures:

Cyberattacks are on the rise, and the risk of financial institutions being harmed is a major source
of concern. Cybersecurity is a major source of concern for the banking industry. ATM fraud is
widespread in Pakistan, but it is particularly prevalent in major cities such as Karachi and
Islamabad. The Pakistani government is taking drastic measures to address the problem.

Cyber Crime Punishments in Pakistan:

As a result of the 2016 Prevention of Electronic Crimes Act, cybercriminals can expect to face
the following penalties:

 Unauthorized Data or Information Access:

Someone who is not authorized to access data or information is known as an unauthorized data
or information accessor. If a person obtain access to any data or aspect of information system
with the aim to defraud, he could face a 3-month prison sentence, a fine of up to 50K Rs, or both,
as per rules of law.17

 Cyber stalking:

Anyone can receive a maximum punishment of 3-year in jail prison or with up to 1 million
rupees fine, or even both, if found in violation of this offense, while in matter of minors can
receive a maximum punishment of 5-year in jail prison or with up to 10 million rupees fine, or
even both.

 Illegally accessing Critical Infrastructure Data or Information System:

16
“Rana Muhammad Arshad Versus Federation of Pakistan, etc. [2020] IN THE ISLAMABAD HIGH COURT,
ISLAMABAD (JUDICIAL DEPARTMENT), W.P. No.2939/2020”
17
“'Cyber-Crimes And Their Punishments In Pakistan – Ask wakeel – Blog' (Askwakeel.pk, 2020)
<https://askwakeel.pk/blog/cyber-crimes-and-their-punishments-in-pakistan/> accessed 27 April 2022”
Any person who obtains unlawful access towards any critical infrastructure data or information
system with dishonest intent will bear a maximum punishment of 3-year in jail prison or with up
to 1 million rupees fine, or even with both, depending on the severity of the violation.18

National Response Centre for Cyber-crimes:

The Pakistani Authorities established the "National Response Centre for Cybercrime" to
investigate cybercrime, search for criminals, and put forth their best strategies to minimize the
misuse of the internet. The center, which is in charge of preventing internet abuse, is run by FIA.

Critical evaluation and Analysis in Cyber law:

A legal framework for prosecuting cyber criminals is required for effective protection of
sensitive data and networks in a predictable environment with a high level of deterrence against
computer crime. The more reliable and consistent methods and legislations of protecting
networked data will be required by a state to protect citizens privacy and information data. As of
September 29th, 2019, a total of 51K complaints had been filed, with 12K of them being
converted into inquiries and 1080 cases filed the previous year. In the NR3C, the state does not
invest enough in employee training and manpower to control cybercrime and attacks. 19 Which
conveys the ineffectiveness of Pakistan State Cyber Regularity Framework. As it lacks the
practical implication and definite procedure and awareness among common folks for
cybercrimes, its complain and prevention measures.

As like the China CSL acts provides all the necessary information’s and material data to their
citizen by facilitating with modern digital means to register online complains against
cybercrimes, encourage to take preventive measures to prevent their private data and personal
information from breaching or leaking and also by taking strict measure and action against the
culprit and cyber attackers on the basis of those registered complaints. Also, all the Network
Operators, Digital services providers and online available platforms will have to undergoes strict

18
“Zahid Jami, 'Cyber Law' [2006] 50th anniversary celebrations of the Supreme Court of Pakistan International
Judicial Conference on, 11-14, 2006 <https://scholar.google.com/scholar?
hl=en&as_sdt=0%2C5&q=Cyber+law+in+in+Pakistan+&btnG=#d=gs_qabs&t=1651062940001&u=%23p
%3Dc1K2FfEy4EwJ> accessed 27 April 2022”
19
“Sheraz Khan and Pardis Moslemzadeh Tehrani, 'Cyber Law And Practice Of Freedom Of Speech On Internet:
Pakistan Perspective' (2018) 2 The Journal of Social Sciences Research <https://scholar.google.com/scholar?
hl=en&as_sdt=0%2C5&q=Cyber+law+in+in+Pakistan+&btnG=#d=gs_qabs&t=1651062961995&u=%23p
%3DjmC0QATJ7XQJ> accessed 27 April 2022”
SOPS and accountability in order to b function and operate in China territory to ensure the safety
of China citizens private data privacy and safety.

Pakistan lacks a comprehensive cyber security system, as well as specific cyber protection laws,
effective enforcement, and a solid framework for addressing these issues as like in China, as per
FIA reports. In Pakistan, cybercrime and other cyber-related issues are not a major concern. 20
The majority of their time is spent going through the motions of everyday life. They are often
unaware of the cybercrime tools available to them. Pakistan makes only a minor contribution to
cybersecurity. Despite the best efforts of the FIA and other organizations, the situation is only
getting worse. At the very least, certain aspects of social networking should be prohibited in
Pakistan. It has the potential to reduce the number of people who fall victim to cybercrime
significantly. Many obstacles must be overcome before cybercrime can be effectively combated;
however, public awareness and education are critical for prevention. The general public is
dealing with a slew of issues as a result of a lack of awareness about current cyber-crime.21

Even law enforcement agencies are unaware of the crimes due to their complexity. As a result, a
thorough knowledge of such crimes is necessary. Pakistan state must adhere to established as
strict measures, make adequate reforms, and adopt the rules and regularity as like China CSL and
the International rule set out by UN both for Cyber laws and Cyber Warfare and practical
enforced them with independent and efficient sate departments to prevent and control the
cybercrimes, online cyber-attacks, private information hackings and cyber warfare etc.

Conclusion:

It is concluded that in modern times, as a result of the advancement of digital and computer
technologies and innovations tools, humans now have access to and communicate with people all
over the world using modern information and communication technologies. However, with the
benefits come some drawbacks, such as cybercrimes, in which criminals gain access to other
people's data and information for illicit purposes, and cyber warfare, which is also a concerning
sign that poses significant risks. As a result, these cyber laws play a critical role in protecting
people's personal data and preventing personal rights violations. In order to prevent and eliminate
cybercrime and cyber infractions on their territory, all countries of the world must develop a
20
“Mr. Shahid Jamal, Manual Of Cyber Laws In Pakistan: Practice And Procedure (2nd edn, 2018)”
21
“Qamar Atta, 'Cyber Security And Analysis Of Cyber-Crime Laws To Restrict Cyber Crime In Pakistan.' (2019)
11 International Journal of Computer Network & Information Security”
practical and appropriate cyber law and its regularity framework, as well as definite initiatives
and preventative measures.
Bibliography:

Primary Sources:

Books Referenced:

“Jamal M, Manual Of Cyber Laws In Pakistan: Practice And Procedure (2nd edn, 2018) ISBN-
13: 978-1482382457, ISBN-10: 1482382458”

“Tubrazy S, New Cyber Laws In Pakistan: Prevention Of Electronic Crimes Act 2016 (Theory
And Practice) (3rd edn, 2018), ISBN-13: 978-1539461432, ISBN-10: 1539461432”

Case Authority Cited:

Rana Muhammad Arshad Versus Federation of Pakistan, etc. [2020] IN THE ISLAMABAD
HIGH COURT, ISLAMABAD (JUDICIAL DEPARTMENT), W.P. No.2939/2020).

Legislative Acts Cited:

 Prevention of Electronic Crimes Act 2016


 The Cyber Crime Bill of 2007

Secondary Sources:

Journals and Articles:

Awan J, Memon S, and Burfat F, 'Role Of Cyber Law And Mitigation Strategies In Perspective
Of Pakistan To Cope Cyber Threats' (2019) 9 International Journal of Cyber Warfare and
Terrorism (IJCWT) <https://scholar.google.com/scholar?
hl=en&as_sdt=0%2C5&q=Cyber+law+in+in+Pakistan+&btnG=#d=gs_qabs&t=1651062
923017&u=%23p%3Dh3wloCuBw_gJ> accessed 27 April 2022.

Andress J, and Winterfeld S, 'Cyber Warfare: Techniques, Tactics And Tools For Security
Practitioners' (2013) 2 Elsevier <https://scholar.google.com/scholar?
hl=en&as_sdt=0%2C5&q=Cyber+warfare+&btnG=#d=gs_qabs&t=1651062889100&u=
%23p%3Dv53_SV8rksAJ> accessed 27 April 2022.

Atta Q, 'Cyber Security And Analysis Of Cyber-Crime Laws To Restrict Cyber Crime In
Pakistan.' (2019) 11 International Journal of Computer Network & Information Security.
Bauer J, and Michel J, 'Cybersecurity: Stakeholder Incentives, Externalities, And Policy Options'
(2009) 33 Telecommunications Policy.

Jayawickrama W, 'Cyber Crime—Threats, Trends And Challenges, Computer Security Week'


(2008) 3 Info Shield.

Jami Z, 'Cyber Law' [2006] 50th anniversary celebrations of the Supreme Court of Pakistan
International Judicial Conference on, 11-14, 2006 <https://scholar.google.com/scholar?
hl=en&as_sdt=0%2C5&q=Cyber+law+in+in+Pakistan+&btnG=#d=gs_qabs&t=1651062
940001&u=%23p%3Dc1K2FfEy4EwJ> accessed 27 April 2022.

Janczewski L, and Colarik A, 'Cyber Warfare And Cyber Terrorism' (2007) 21 IGI Global
<https://scholar.google.com/scholar?
hl=en&as_sdt=0%2C5&q=Cyber+warfare+&btnG=#d=gs_qabs&t=1651062833262&u=
%23p%3Dt5Ki-QKqhP4J> accessed 27 April 2022.

Khan S, and Tehrani P, 'Cyber Law And Practice Of Freedom Of Speech On Internet: Pakistan
Perspective' (2018) 2 The Journal of Social Sciences Research
<https://scholar.google.com/scholar?
hl=en&as_sdt=0%2C5&q=Cyber+law+in+in+Pakistan+&btnG=#d=gs_qabs&t=1651062
961995&u=%23p%3DjmC0QATJ7XQJ> accessed 27 April 2022.

Liang B, and Lu H, 'Internet Development, Censorship, And Cyber Crimes In China' (2010) 26
<https://scholar.google.com/scholar?
hl=en&as_sdt=0%2C5&q=China+cyber+laws&btnG=#d=gs_qabs&t=1651321747149&
u=%23p%3Dz54tiZ7chKQJ> accessed 30 April 2022.

Robinson M, Jones K, and Janicke H, 'Cyber Warfare: Issues And Challenges' (2015) 49
Computers & security <https://scholar.google.com/scholar?
hl=en&as_sdt=0%2C5&q=Cyber+warfare+&btnG=#d=gs_qabs&t=1651062813573&u=
%23p%3DxcJAFOSYgUQJ> accessed 27 April 2022.

Roscini M, 'Cyber Operations And The Use Of Force In International Law' (2014) 2 Oxford
University Press <https://scholar.google.com/scholar?
hl=en&as_sdt=0%2C5&q=International+Cyber+law&btnG=#d=gs_qabs&t=1651062712
073&u=%23p%3De0xRzNRO7WsJ> accessed 27 April 2022.

Schmitt M, and Vihul L, 'The Nature Of International Law Cyber Norms' (2014) 2 Tallinn
Papers <https://scholar.google.com/scholar?
hl=en&as_sdt=0%2C5&q=International+Cyber+law&btnG=#d=gs_qabs&t=1651062676
782&u=%23p%3DB4DjQBlUoo0J> accessed 27 April 2022.

Shakarian P, and Ruef A, 'Introduction To Cyber-Warfare: A Multidisciplinary Approach' (2013)


14 Newness <https://scholar.google.com/scholar?
hl=en&as_sdt=0%2C5&q=Cyber+warfare+&btnG=#d=gs_qabs&t=1651062852469&u=
%23p%3DxxsFMv_Lt8oJ> accessed 27 April 2022.

“Weiping C, 'International Pere On Fighting Cybercrime' (2003) 1 Lecture Notes in Computer


Science, 2665: 379–384. doi:10.1007/3-540-44853-5_34. ISBN 978-3-540-40189-6
accessed 27 April 2022”

Online Internet Sources:

Adonis A, 'International Law On Cyber Security In The Age Of Digital Sovereignty' (E-
International Relations, 2020) <https://www.e-ir.info/2020/03/14/international-law-on-
cyber-security-in-the-age-of-digital-sovereignty/> accessed 27 April 2022.

'Cyber-Crimes And Their Punishments In Pakistan – Ask wakeel – Blog' (Askwakeel.pk, 2020)
<https://askwakeel.pk/blog/cyber-crimes-and-their-punishments-in-pakistan/> accessed
27 April 2022.

Smith S, 'Social Responsibility Theory' (Communication Theory, 2016)


<https://www.communicationtheory.org/social-responsibility-theory/> accessed 27 April
2022.

Reports:

Lunker M, 'Cyber Laws: A Global Perspective' [2009] PRIVACY AND CYBER CRIME
INSTITUTE report “International Comparison of Cyber Crime, 2009
<https://scholar.google.com/scholar?
hl=en&as_sdt=0%2C5&q=Cyber+laws&btnG=#d=gs_qabs&t=1651062737505&u=
%23p%3DKrabyWBQ8XgJ> accessed 27 April 2022.

News Sources:

Shah D, 'Cybersecurity Through Laws In Pakistan' Tribune (2021)


<https://tribune.com.pk/story/2329721/cybersecurity-through-laws-in-pakistan> accessed
27 April 2022.

You might also like