Affiliation:
1. The Center of Security Convergence & eGovernance, Inha University, Incheon 22212, Republic of Korea
Abstract
The phenomenon of law implementation has received limited attention, despite the clear evidence that it is influenced by various factors prevalent in the country, and these factors can have an impact on and obstruct the effective implementation of legislation. The primary objective of this study was to analyze the critical factors that impact the implementation of cybersecurity laws in developing nations, such as Pakistan. The prevalence of corruption, a major hindrance to the implementation of cybersecurity laws and regulations, emerged as the most influential factor in Pakistan. Additionally, factors such as discrimination, illicit conduct, expertise, ambiguity, and public confidence significantly influenced the implementation of cybersecurity laws in Pakistan. A survey was conducted among managers from banking and IT firms to collect data samples on the factors that could potentially impact the implementation of the law. The findings from a sample of 172 respondents revealed that corruption, discrimination, illicit conduct, and ambiguity appeared to have a significant negative influence on cybersecurity law implementation, whereas expertise and public confidence emerged to have a significant positive influence on the implementation of cybersecurity laws in Pakistan. This study suggests that the government of Pakistan should consider various measures such as providing training, improving capacity building, fostering institutional cooperation, strengthening legislative conviction, and promoting global collaborations to enhance the implementation of cybersecurity.
Reference95 articles.
1. Nexus of E-government, cybersecurity and corruption on public service (PSS) sustainability in Asian economies using fixed-effect and random forest algorithm;Abbas;Online Information Review,2021
2. Partial Least Square (PLS): Alternatif structural equation modeling (SEM) dalam penelitian bisnis;Abdillah;Yogyakarta: Penerbit Andi,2015
3. Abdullahi, Mujaheed, Baashar, Yahia, Alhussian, Hitham, Alwadain, Ayed, Aziz, Norshakirah, Capretz, Luiz Fernando, and Abdulkadir, Said Jadid (2022). Detecting cybersecurity attacks in internet of things using artificial intelligence methods: A systematic literature review. Electronics, 11.
4. Public perceptions of police service quality: Empirical evidence from Pakistan;Akhtar;International Journal of Police Science & Management,2012
5. Civil Military Cooperation (CIMIC) in Cyber Security Domain: Analyzing Pakistan’s Prospects;Anwar;Global Strategic & Security Studies Review,2021
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Review of National Cybersecurity Policies: A Case Study on Asian Countries;2024 IEEE 1st Karachi Section Humanitarian Technology Conference (KHI-HTC);2024-01-08