The document provides an overview of social media and theoretical perspectives on social media. It discusses functionalist, conflict, and interactionist perspectives. It covers topics like social media addiction, statistics on Pakistani social media users, types of cyber crimes, and laws related to cyber crimes. The document contains an introduction to social media, definitions, types of social media, and an overview of the growth of social media users worldwide and in Pakistan. It examines the perspectives on both the positive and negative impacts of social media.
1. Social
Media 0
Assignment
Topic:
Social Media
Group Members:
Isma Khalid Roll No. BS-IAS-31-R-F18
Iqra Ashfaq Roll No. BS-IAS-38-R-F18
Hamda Shahid Roll No. BS-IAS-48-R-F18
Asad Khalil Roll No. BS-IAS-44-R-F18
Maha Sarfraz Roll No. BS-IAS-41-R-F18
Section:
A
Submitted to:
Mam Madiha Malik
2. Social
Media 0
Table of Contents
1.1 Introduction to Social Media and Theoretical Perspectives..............................................................
IntroductiontoSocial Media……………………………………………………………………………………………………………….2
Functionalist Perspective on Social Media.........................................................................................5
ConflictPerspective onSocial Media …………………………………………………………………………………………………..9
InteractionistPerspective onSocial Media………………………………………………………………………………………11
FeministPerspectiveonSocial Media………………………………………………………………………………………………12
Audience &It’sbehavior………………………………………………………………………………………………………………….13
1.2 Social Media Addiction............................................................................................................... 14
Symptoms ....................................................................................................................................16
Effects.......................................................................................................................................... 18
Effectof Dopamine…………………………………………………………………………………………………………………………….20
1.3 Statistics of Pakistani Users …………………………………………………………………………………………………………...22
Cure to Addiction………………………………………………………………………………………………………………………………26
Why we todayneedmotivationalspeeches?........................................................................................28
1.4 A Sociological Study of differenttypesofCyber Crimes…………………………………………………………………29
CyberTerrorism…………………………………………………………………………………………………………………………….31
CyberBullying………………………………………………………………………………………………………………………………32
CyberFraud…………………………………………………………………………………………………………………………………36
1.5 Laws against CyberCrime…..…………………………………………………………………………………………………………..38
Role of PTA………………………………………………………………………………………………………………………………………48
Implementation……………………………………………………………………………………………………………………………….
3. Social
Media 1
1.1 Media
In general, "media" refers to various means of communication. For example, television, radio,
and the newspaper are different types of media. The term can also be used as a collective noun
for the press or news reporting agencies. In the computer world, "media" is also used as a
collective noun, but refers to different types of data storage options.
Types of Media:
There are five types of media:
1-Newspaper
2-Magazines
3-Radio
4-Television
5-InternetNewspaper & magazines are part of Print media while Radio, Television and internet
are part of Electronic Media.
Media
Newspaper Magazines Television Radio Internet
4. Social
Media 2
Evolution of Media:
Newspapers were vital during the Revolutionary War. Later, in the party press era, party loyalty
governed coverage. At the turn of the twentieth century, investigative journalism and
muckraking appeared, and newspapers began presenting more professional, unbiased
information. The modern print media have fought to stay relevant and cost-efficient, moving
online to do so.
Most families had radios by the 1930s, making it an effective way for politicians, especially
presidents, to reach out to citizens. While the increased use of television decreased the popularity
of radio, talk radio still provides political information. Modern presidents also use television to
rally people in times of crisis, although social media and the Internet now offer a more direct
way for them to communicate. While serious newscasts still exist, younger viewers prefer soft
news as a way to become informed.
Introduction to Social Media
What is social media?
Virtual communities where users can create individual public profiles, interact with real-
life friends, and meet other people based on shared interests.i Any website that enables
social interaction by users is considered a social media site.
Types of Social Media:
Following are four types of social media:
1) Social networking (Facebook, LinkedIn, Google+).
2) Microblogging (Twitter, Tumblr).
3) Photo sharing (Instagram, Snapchat, Pinterest).
4) Video sharing (YouTube, Facebook Live, Periscope, Vimeo).
5. Social
Media 3
Background :
The ease of internet access worldwide has made it one of the most popular medium of seeking
information and for communication (Ramamohanarao et al, 2007ii). The internet is now very
vital in the modern world. It has become an important instrument in education and social life
such that it is gradually becoming indispensable in the daily life of many people (Pew Internet
Research, 2004).iii The internet is a highly enlightening and entertaining medium, therefore
people engage in several activities on it; some of which may be potentially addictive. One of
such activities is the use of social media (Kuss & Griffiths 2011).iv
The introduction of social media in the last decade has largely attracted many people. This has
therefore shifted their focus from mainly using just traditional media and traditional forms of
social networking for social interaction (globalwebindex, 2015).v The mass appeal of social
media could be an issue of concern, especially with regards to the steady increase in the time
users spend online. Also, the qualities of social media make it a desirable escape for many of
these people increasing their dependency on it; thereby contributing to the growth of the social
media addiction phenomenon worldwide (Brewer, 2013).vi
Overview:
Social media has become a global phenomenon and a very important means of
communication among peers, families and all manner of persons. Social media sites such as
Facebook, Twitter, Instagram, LinkedIn and mobile instant messaging services (IM) such
as WhatsApp, Viber and IMO and video calling services like Skype have become a popular
means of communication in the past few years .Statistics show that Internet active users
percentage has increased from 1,966 million (28.7%) to 4,208 million (55.1%) from year
2010-2018. The increase in number of these social media sites, combined with the fast
growth and advancement of mobile device technology in the last few years, coupled with the
ease of access to broadband and mobile data services have created a major avenue for daily
social interaction; encouraging regular profile
updates and replies to comments and messages in real time. People are now logging on to
social media on mobile devices everywhere, at any time and on the go; making it a common
everyday activity .The number of social media users worldwide in 2018 is 3.196 billion, up
6. Social
Media 4
13 percent year-on-year. The level of popularity and use of social media has increased greatly
over the years since it was first introduced.
vii
In Pakistan also, the number of internet users is increasing .According to 2018 statistics , the
estimated total population of Pakistan was 200,813,818, out of which 44,608,065 were
internet users .viii
Total Population of
Pakistan (2018)
Internet Users(2000) Internet Users(2018) Facebook
Users
Users
%age
Asia
200,813,818 133,900 44,608,065 32,000,000 2.2%
Lahore among the top cities by Pakistani users on Facebook with approximately 5.2 million users
that contributes about 21% of total Pakistani Facebook audience.
7. Social
Media 5
Functionalist Perspective on Social Media:
Functionalist perspective sees that social media contributes to society in a positive way.
When using social media, different cultures are expanded all around the world. Culture is
taught more by people putting their beliefs on the internet. It could also be used a stress
reliever, decreasing conflict, and giving people something to do during boredom.
Functionalism Perspective thinks social media is good because the internet reaches for
people and both television and the radio, so when a child goes missing it is spread all
over the internet because it reaches so many people globally, with better chances of
finding the child because everyone is aware.
Functions:
1) Manifest Functions:
Agent of Socialization:
Functionalists focus on how parts of society function in expected and unexpected ways to
maintain existing social order. They also pay attention to how parts disrupt the existing
order in expected and unexpected ways. Of course the use of social networking sites as a
platform for presenting the self to others is the part of society we are analyzing. Some
expected, or manifest, functions of social networking sites are that they facilitate
connections with family, friends, and other parties; allow members to share photos and
videos; support discussions with like-minded people about hobbies and other interests;
and help users to plan face-to-face meetings with friends. They also allow users to
establish and maintain contacts with a far greater number of people than is typically
possible using non-digital means.ix
Enforcer of Social Norms:
Social norms are usually the unwritten social behaviors that are to be expected in a society or a
social group. It’s a required standard; such as completing higher education in a certain social
group, getting married during a certain age period, or gender assigned roles. Norms enforce
conformity of behavior and order in every social group, even among marginalized groups and
8. Social
Media 6
anarchists, but they do not necessarily represent functional principles or justice and equality. The
ability to interact, debate, and express freely online has led to the encouragement of action and
challenging the status quo. Take for instance the rise of gender equality and female rights
movement online led by independent activists. The repetition of this subject online has led to
worldwide awareness due to its mass and borderless audience and the effectiveness of repetition
on persuasion for multiple media outlets. This, without a doubt, works on the normalization of
female rights and equality, further pushing patriarchal systems in reform and the shaming of
inequality on a bigger scale. This effect is leading to the formation of new social norms to
conform to in pursuit of acceptance and avoidance of isolation.
In the end, reforming social norms takes great responsibility and balanced evaluation by both the
individual and the institution seeking change, but since crowd psychology doesn’t solely depend
on logic, it is safe to assume that we’ll face many social and cultural obstacles in the future.x
Coferral of Status:
Media attention confers status on people, things, and policies. By focusing on an individual or
item, the media legitimize the status of that individual or item, enhancing prestige and authority.
Lazarsfeld and Merton described status conferral as being one of the social functions of the
media. They pointed out that it was not only favorable media attention that conferred status, such
as a newspaper editorial endorsing a particular political candidate, but any media attention
enhanced status.
People can become famous for being famous— celebrity status can be gained by sheer media
coverage. In a circular belief, people believe that someone must be important because the media
focuses attention on him or her. Celebrities appearing in advertisements confer status on a
product.xi
Promotion of Consumption:
Using advertising to develop branding supports economy ,provides information about
products and underwrites the cost of media. Young people cannot escape commercial
messages .They show up at rock concerts or as banners on web pages .They also surface
in form of product placement -for example, the Coca-Cola glasses that sit in front of
judges in different TV shows is nothing new .
9. Social
Media 7
Facebook:
Facebook provides information about brands and products by Ad feature .Different
brands and pages purchase promotion packages to boost their posts.
Instagram:
Instagram is also unique engine for promotion of consumptions. It also provides
promotion packages to its users.
YouTube:
YouTube provides two types of Ads :
i. Nev Bar Ads
ii. Display-in Ads
2)Latent Functions:
An unexpected, or latent, function of social networking sites is that many offer users a tool that
allows them to connect with people with whom they have lost contact, including lost relatives. It
is also a tool that police departments draw upon to collect incriminating evidence.
Social Media also serves to collect big data to analyze large sums of information also gives
people an open platform to say what they please.
Dysfunction:
1)Manifest Dysfunction:
One manifest dysfunction of social media websites is that there is no way to tell whether people
are presenting real or fabricated self-profile. The news feature seemingly endless numbers of
stories about people who post fabricated profiles, such as one involving three teens that posted
embarrassing material and falsely attributed it to a disliked teacher. As one critic argues, "There
is a general feeling that social networking is the wild west of identity management" (Martin
2008).Many people create a Facebook page for the purpose of meeting like-minded friends or
10. Social
Media 8
staying in touch, not thinking that potential employers may view postings for clues about
someone's character apart from the resume and interview.
Most profiles are accessible which means that your life is out in the open and privacy seems far.
2)Latent Dysfunction:
Narcotizing Effect:
Narcotizing dysfunction approach is one of the most overlooked approaches of media effects in
the relevant literature. Robert K. Merton and Paul F. Lazarsfeld in their Mass Communication,
Popular Taste and Organized Social Action named article, argue about the narcotizing
dysfunctions of media. According to their approach, media creates an apathy in which people are
content to ‘know’ rather than ‘do’ something. In this context, media provides information about
the events and the receivers demonstrate some superficial concern on media about the events
while the importance of real action is neglected. Consequently, the receivers are drugged into the
inactivity like they are under the influence of narcotics. One of the main assumptions of this
approach is that, increasing dosages of mass communications sometimes ‘unpredictably’
transform the energies of the receivers from ‘active participation’ into ‘passive knowledge’. As
Robert K. Merton and Paul F. Lazarsfeld states: Exposure to this flood of information may serve
to narcotize rather than to energize the average reader or listener. As an increasing mead of time
is devoted to reading and listening, a decreasing share is available for organized action. The
individual reads accounts of issues and problems and may even discuss alternative lines of
action. But this rather intellectualized, rather remote connection with organized social action is
not activated. The interested and informed citizen can congratulate himself on his lofty state of
interest and information and neglect to see that he has abstained from decision and action…. He
comes to mistake knowing about problems of the day for doing something about them. His social
conscience remains spotlessly clean. He is concerned. He is informed. And he has all sorts of
ideas as to what should be done. But, after he has gotten through his dinner and after he has
listened to his favored radio programs and after he has read his second newspaper of the day, it is
really time for bed (1957: 464).xii
Less Control:
11. Social
Media 9
A unexpected, or latent, dysfunction of social networking sites is that once something is posted
for others to access, there is no way to control how it will be used .People start talking
inappropriately at each other online because they think they are anonymous and have free
speech.
Conflict Perspective on Social Media:
The conflict perspective looks at how social networking sites create a false way of connecting
people over the web and a place where bullying thrives, which is called cyberbullying. Conflict
theory can be used to say social media has a large influence in the younger population by looking
at who the media is controlled by. Teens are more tempted by advertisings and the propaganda in
order, which makes teens more influenced by the media .
Unequal Fame:
Social media is ruled by those with more followers. People with more followers continue to gain
followers as their content continues to be ever far reaching. People with less followers become
lost in the blur of the rest of those with names .People on social media with the most status
compete with each other in view on social media platforms ,whereas people with lower status are
not seen. These people try to keep their power ,by teaching followers what his or her status is all
about ,so that their followers are “schooled” in the status that the popular social media person has
,so that his power stays legitimized.
Gatekeeping:
Conflict theorists seek to identify advantaged and disadvantaged groups, document unequal
access to scarce and valued resources, and describe the ways in which advantaged groups
promote and protect their interests. With regard to social networking websites, conflict theorists
ask, "Who ultimately controls these websites? And who benefits from this arrangement and at
whose expense?" Conflict theorists maintain that the advantaged groups include those who own
the social networking websites, advertisers, potential employers, and other parties interested in
selling products. No matter how much users think they benefit from social networking, in the
final analysis they are the disadvantaged groups, especially if they mistakenly believe that they
control the information they have posted. On close analysis we see that the control lies with the
website. Facebook (2008), for example, makes it clear that "all content on the Site and available
through the Service, including designs, text, graphics, pictures, video, information, applications,
12. Social
Media 10
software, music, sound and other les . . . are the proprietary property of the Company." My Space
(2008) warns that it may use "cookies and similar tools to customize the content and advertising
gleaned from the Pro le Information you have provided."
Dominant Ideology:
In the Marxist perspective, “Dominant ideology” is referred to as the ideology of the majority in
a population. This ideology remains to be prevalent given that interests of the dominant class are
fulfilled. This can lead to seizure of development process in the subordinate class, who are
unable to form an effective opposition. It can be said without doubt that the ideas of the
dominant class are deeply penetrated into the social system Williams, 1977. According to Karl
Marx, ‘Social class determines consciousnesses. The relationship of a class to the modes of
production generates cultural conditions and its material conditions. In other words it can also be
said that each class has a separate belief system because each has its own interests due to
difference in their economic conditions. Secondly each mode of production has a dominant class
which is responsible for a dominant ideology to ensure the subordination of the working class.
Marx also distinguished two types of social influences in the formation of ideologies. The main
source of ideas is the experiences of individuals as they continue their daily life experiences.
David Cheal calls the reactions to these daily activities as the ‘practical ideas.’ Another source
through which individuals are introduced to new ideas is called ‘received ideas’ as these are
achieved through social interactions or communication between individuals. For Gramsci, the
presence of these two sources of ideas can lead to contradictions, which he called ‘contradictory
consciousness.’ Such types of contradictions are unevenly distributed among the classes. For
dominant classes, they form a consistent system of thought and the consequences of such
contradictions are insignificant. However for subordinate classes, these contradictions are large
and significant. (Cheal, 1979) Leading thinkers in Marxist ideology, Althussers and Paulantzas
argue that the dominance in political or ideological structures is determined by economic base.
Such dominance is sometimes also facilitated by non-economic factors like religion. In feudal
and pre-capitalist societies religion was used to ensure that a continuous labor source was
available from the peasantry. (Abercrombie & Turner, 1978). According to Marxists, media
plays an important role in spreading the dominant ideology and in building a sense of consensus
among the population about right and wrong nature of things. This in a sense can be true as
13. Social
Media 11
media has means to provide false information and completely ignore or brand something
unreasonable which challenges the dominant ideology. Media presents ideas of the ruling class
while marginalizing voices of minority. The power structures in media can be further broken
down to the interests of the owners and managers of a media group. Murdock argues that the two
important reasons that recede power of ruling class is the growth of professional managers and
the creation of new capital enterprise. As industry grows, so does the need for managers.(Gitlin,
1979) This in turn increases the influence of professional managers and threatens the power base
of the owner.xiii
Interactionist Perspective on Social Media:
People connect with others for various reasons: starting relationships, continuing relationships,
career aspirations, or something else. Social media is driven by people and their connections and
interactions with others. People are active on social media, because this is how they give meaning
to the world, by commenting on what they find meaningful and selecting articles for example
which shows what they give meaning to.xiv Symbolic interactionists study social interaction and
focus on self-awareness, symbols, and negotiated order. Symbolic interactionists ask, "How do the
involved parties experience, interpret, influence, and respond to what they and others are saying
and doing?" Symbolic interactionists are interested in learning how social networking platforms
serve as a mirror, giving users especially teenagers the chance to be noticed by others and to receive
feedback.
Symbolic interactionists studying Facebook and other social networking sites familiarize
themselves with vocabulary and symbols people use to convey intent and mood with words such
as block (take action to prevent a user from making contact or viewing a profile) and add (to gain
a new friend). Finally, symbolic interactionists are interested in how order is dealt with presenting
the self and seeking responses to that presentation.xv Neo-Luddites are people who see
technology as symbolizing the coldness and alienation of modern life. But for technophiles,
technology symbolizes the potential for a brighter future. For those adopting an ideological middle
ground, technology might symbolize status (in the form of a massive flat-screen television) or
failure (in owning a basic old mobile phone with no bells or whistles).xvi
14. Social
Media 12
Feminist Perspective on Social Media:
Take a look at popular television shows, advertising campaigns, and online game sites. In most,
women are portrayed in a particular set of parameters and tend to have a uniform look that
society recognizes as attractive. Most are thin, white or light-skinned, beautiful, and young. Why
does this matter? Feminist perspective theorists believe it is crucial in creating and reinforcing
stereotypes. For example, Fox and Bailenson (2009) found that online female avatars (the
characters you play in online games like World of Warcraft or Second Life) conforming to
gender stereotypes enhances negative attitudes toward women, and Brasted (2010) found that
media (advertising in particular) promotes gender stereotypes.
The gender gap in tech-related fields (science, technology, engineering, and math) is no secret. A
2011 U.S. Department of Commerce report suggested that gender stereotyping is one reason for
this gap, acknowledging the bias toward men as keepers of technological knowledge (U.S.
Department of Commerce 2011). But gender stereotypes go far beyond the use of technology.
Press coverage in the media reinforces stereotypes that subordinate women, giving airtime to
looks over skills, and disparaging women who defy accepted norms.
Recent research in new media has offered a mixed picture of its potential to equalize the status of
men and women in the arenas of technology and public discourse. A European agency, the
Advisory Committee on Equal Opportunities for Men and Women (2010), issued an opinion
report suggesting that while there is the potential for new media forms to perpetuate gender
stereotypes and the gender gap in technology and media access, at the same time new media
could offer alternative forums for feminist groups and the exchange of feminist ideas. Still, the
committee warned against the relatively unregulated environment of new media and the potential
for antifeminist activities, from pornography to human trafficking, to flourish there.
Increasingly prominent in the discussion of new media and feminism is cyberfeminism, the
application to, and promotion of, feminism online. Research on cyberfeminism runs the gamut
from the liberating use of blogs by women living in Iraq during the second Gulf War (Pierce
2011) to the analysis of postmodern discourse on the relationship between the body and
technology (Kerr 2014).xvii
15. Social
Media 13
Audience:
The Social Media is distinguished from other social institutions by the necessary presence of an
audience. It can be identifiable, finite group , such as audience at a jazz club or a Broadway
musical , or a much larger and undefined group , such as users of Facebook. The specialized
targeting of audiences has led some scholars to question the “masses” on social media. For
example, the British social psychologist Sonia Livingstone (2004) has written that the media
have become so segmented, they have taken on the appearance almost of individualization. Are
viewing audiences so segmented that large collective audiences are a thing of the past? That is
not yet clear. Even though we seem to be living in an age of personal computers and personal
digital assistants (PDAs) , large formal organizations still transmit public messages that reach a
sizeable , heterogeneous , and scattered audience.
Audience Behavior:
Sociologist have long researched how audiences interact with one another and how they share
information after a media event. The role of audience members as opinion leaders particularly
intrigues social researchers . An opinion leader is someone who influences the opinions and
decisions of others through day-to-day personal contact and communication. For example, a
movie of theater critic functions as an opinion leader . Sociologist Paul Lazarsfeld and his
colleagues (1948) pioneered the study of opinion of opinion leaders in their research on voting
behavior in the 1940s . They found that opinion leaders encourage their relatives , friends and co-
workers to think positively about a particular candidate, perhaps pushing them to listen to the
politician’s speeches or read the campaign literature .Despite the role of opinion leaders ,
members of an audience do not all interpret media in the same way .Often their response is
influenced by their social characteristics ,such as occupation ,race , education and income .
16. Social
Media 14
1.2Social Media Addiction:
Addiction is a psychological and physical inability to stop consuming a chemical, drug, activity,
or substance, even though it is causing psychological and physical harm. Social Media Addiction
is not a formal clinical diagnosis, it is fair to say that many people spend far too much time on
social media and may at the very least describe themselves as being “obsessed”, if not addicted.
In recent years the mental health community has become increasingly interested in the impact
that modern technology has on our lives – both positive and negative. The rise of social media
has meant that we as a global population are more connected than we have ever been in the
history of time. However, our reliance on social media can have a detrimental effect on our
mental health, with the average Brit checking their phone as much 28 times a day.
Features that make social media addictive :
According to Nick Zagorski (2017), a writer for Psychiatric News, recent studies have shown
that social media use is linked to feelings of social isolation, depression, insecurity, jealousy, and
poor self-esteem. However, these findings beg the question: how do these negative feelings
transpire from just perusing social media sites?
Here are some real examples of reasons you might feel worse by increased exposure to social
media:
The illusion that others are more popular due to the number of “friends” or “followers” they
have
Seeing pictures of a group of friends that you consider yourself to be close to but you
weren’t invited to join them
Seeing pictures of happy people enjoying their lives, which creates sadness and jealousy
because your life doesn’t seem as grand
Lack of “likes” to your post, resulting in feelings of disappointment and decreased self-
esteem
Seeing a love interest with someone else may make you feel depressed and insecure
17. Social
Media 15
Political posts that you don’t agree with
Feeling like you can never keep up with what everyone else has
Being directly attacked about a message or picture you posted
One thing that probably contributes to social media being so addictive is the role it played in the
rise of the digital age. While social media was becoming popular, the internet also became more
widely used, cheaper to access, and faster to load content .The rise of mobile phones with
internet capabilities and mobile internet also made it easier for social media to be available
wherever you go, and regardless of whatever you’re doing. Thanks to the popularity of social
media, you can constantly and instantaneously update your network about what you’re eating,
what you’re wearing, and who you’re with.
Your Ego:
Having your own space online means you have free reign to post about your favorite subject:
yourself. After all, your profile, your rules, and no one is forcing you to ‘friend’ them or ‘follow’
them. In general, humans spend 30-40% of conversations talking about themselves.
Interestingly, that number reaches up to 80% on social media posts.
FOMO (Fear of Missing Out):
FOMO is one of the leading drivers of social media addiction. People use social media to post
about the best things happening in their life, which gives them a self-esteem boost—especially
when the people in their networks affirm them. But even when experiencing something great,
people often wonder if there is something better and more exciting happening at the same time,
so they go on social media to check. Social media provides the proof that there are other great
things happening, through photos and status updates. When people compare what they’re doing
to what other people are doing, they may start to feel negative about what they would otherwise
perceive as a good time .Sometimes people forget that social media can be both a world unto
itself (suitable for undirected exploration) and also an extension of real life. Even if you’re not
bothered by other people having more fun than you, social media is a compelling place to
procrastinate.
A "High" of Sorts:
When you see people reacting to or ‘liking’ what you post about, it validates you and makes you
18. Social
Media 16
feel good. When you see that new notification alert, your brain secretes a neurotransmitter called
dopamine, which controls the brain’s pleasure and reward center. The more dopamine released,
the more the brain recognizes that it is triggered by a reward Your Own, Personal Bubble
Social media can serve as your own personal chunk of the internet. There are many who grew up
with Xanga, Blogger, and now Tumblr blogs. They turned to these online platforms and internet
strangers in order to express what they couldn't tell the people in their “real” lives. Thanks to
different levels of privacy both then and now, it’s easy to create a news feed that only contains
the thoughts of like minded people. While this effectively cuts out the trolls it can also encourage
a homogenized world view. It’s up to you to decide if you’re OK with that when trimming your
friend list based on viewpoint differences. On the idea of social media acting as a personal
bubble, consider what British filmmaker Adam Curtis said in a New York Times interview:
“On a social-media network, it’s very much like being in a heroin bubble. As a radical artist in
the 1970s, you used to go and take heroin and wander through the chaos and the collapsing
Lower East Side, and you felt safe. That’s very like now. You know you aren’t safe, but you feel
safe because everyone is like you. But you don’t have to take heroin, so it’s brilliant. You don’t
get addicted, or maybe you do. Mostly you do.”
The Like Button:
When Justin Rosenstein—one of the four designers of Facebook’s ‘Like’ Button—came up with
the idea for it, he did not think it would turn into a cultural phenomenon.
“The main intention I had was to make positivity the path of least resistance, and I think it
succeededin its goals, but it also created large unintended negative side effects. In a way, it
was too successful.”
The negative side effects he refers might include the fact that so many offline activities by
Facebook users are now driven by “likes”. For example, are you traveling somewhere new? Your
social media addiction may result in you feeling the need to post about it on social media for
positive affirmation in the form of likes. It’s possible that being able to post about your trip on
social media was in fact one of the driving forces pushing you to take it in the first place.
Facebook addiction symptoms:
Facebook Addiction Disorder, is a condition that is defined by hours spent on Facebook, so
much time in fact that the healthy balance of the individual’s life is affected. It has been said that
19. Social
Media 17
approximately 350million people are suffering from the disorder that is detected through a
simple set of six-criteria. People who are victims of the condition must have at least 2-3 of the
following criteria during a 6-8 month time period.
1)Tolerance: This term is used to describe the desperate behavior of a Facebook addict. They
spend an increasing amount of time on the site, coming to a stage where they need it in order to
obtain satisfaction or on the other extreme, it is having a detrimental affect on them as a person
and their life. For the family members and friends who think they are dealing with an addict, a
sign to look out for are multiple Facebook windows open. Three or more confirms that they are
indeed suffering from this condition.
2)Withdrawal symptoms: These become obvious when one is restricted from using Facebook
because they have to participate in normal everyday activities. Common signs are anxiety,
distress and the need to talk about Facebook and what might have been posted on their wall in
their absence.
3)Reduction of normal social/recreational activities: Someone suffering from FAD will
reduce the time spent catching up with friends, playing sport or whatever it is they used to enjoy
doing, to simply spend time on Facebook. Instead of catching up with a friend for coffee, they
will send a Facebook message. A dinner date will be substituted with a messenger chat. In
extreme cases, the person will even stop answering their parent’s phone calls, instead insisting
that they use Facebook to contact them.
4)Virtual dates: It is obvious that things are extreme when real dates are replaced with virtual
dates. Instead of going to the movies or out to dinner, they tell their partner to be online at a
certain time.
5)Fake friends: If 8 out of 10 people shown on their Facebook page are complete strangers, it is
undeniable: they have a serious case of FAD.
6)Eating Disorders:
20. Social
Media 18
It causes imbalance of diet and irregular eating habits.
Effect of Addiction:
1)It triggers more sadness, less well-being:
The more we use social media, the less happy we seem to be. One study a few years ago found
that Facebook use was linked to both less moment-to-moment happiness and less life
satisfaction—the more people used Facebook in a day, the more these two variables dropped
off. The authors write, “Facebook provides an invaluable resource for fulfilling such needs by
allowing people to instantly connect. Rather than enhancing well-being, as frequent interactions
with supportive 'offline' social networks powerfully do, the current findings demonstrate that
interacting with Facebook may predict the opposite result for young adults—it may undermine it.
2)Comparing our lives with others is mentally unhealthy:
Part of the reason Facebook makes people feel socially isolated (even though they may not
actually be) is the comparison factor. We fall into the trap of comparing ourselves to others as we
scroll through our feeds, and make judgements about how we measure up. One study looked at
how we make comparisons to others posts, in “upward” or “downward” directions—that is,
feeling that we’re either better or worse off than our friends. It turned out that both types of
comparisons made people feel worse, which is surprising, since in real life, only upward
comparisons (feeling another person has it better than you) makes people feel bad. But in the
social network world, it seems that any kind of comparison is linked to depressive symptoms.
3) It can lead to jealousy—and a vicious cycle:
It’s no secret that the comparison factor in social media leads to jealousy—most people will
admit that seeing other people’s tropical vacations and perfectly behaved kids is envy-inducing.
Studies have certainly shown that social media use triggers feelings of jealousy. The authors of
one study, looking at jealousy and other negative feelings while using Facebook, wrote that
“This magnitude of envy incidents taking place on FB alone is astounding, providing evidence
21. Social
Media 19
that FB offers a breeding ground for invidious feelings." They add that it can become a vicious
cycle: feeling jealous can make a person want to make his or her own life look better, and post
jealousy-inducing posts of their own, in an endless circle of one-upping and feeling jealous.
Another study looked at the connection between envy and depression in Facebook use and,
interestingly, discovered that envy mediates the Facebook-depression link. That is, when envy is
controlled for, Facebook isn’t so depressing. So it may be the envy that’s largely to blame in the
depression-Facebook connection.
4) We get caught in the delusion of thinking it will help:
Part of the unhealthy cycle is that we keep coming back to social media, even though it doesn’t
make us feel very good. This is probably because of what’s known as a forecasting error: Like a
drug, we think getting a fix will help, but it actually makes us feel worse, which comes down to
an error in our ability to predict our own response. One study looked at how people feel after
using Facebook and how they think they’ll feel going in. Like other studies suggested, the
participants in this one almost always felt worse after using it, compared to people engaging in
other activities. But a follow-up experiment showed that people generally believed that they’d
feel better after using, not worse. Which of course turns out not to be the case at all, and sounds a
lot like the pattern in other types of addiction.
5) More friends on social doesn’t mean you’re more social:
A couple of years ago, a study found that more friends on social media doesn’t necessarily mean
you have a better social life—there seems to be a cap on the number of friends a person’s brain
can handle, and it takes actual social interaction (not virtual) to keep up these friendships. So
feeling like you’re being social by being on Facebook doesn’t work. Since loneliness is linked to
myriad health and mental health problems (including early death), getting real social support is
important. Virtual friend time doesn’t have the therapeutic effect as time with real friends.
Complete addiction: When they meet new people, they say their name, followed by “I’ll talk to
you on Facebook”, or for those who are extremely bad, “I’ll see you in Facebook”. Their pets
22. Social
Media 20
have Facebook pages, and any notifications, wall posts, inboxes or friend requests that they
receive give them a high, one which can be compared to that gambling addicts get from the
pokies or roulette table.
So someone believes that addiction to the net is a real condition that needs to be treated just like
any other addiction, with care and caution, but is an obsession with Facebook a real condition, or
is FAD really just the latest fad? Either way, Facebook obsessions are definitely present in
today’s society and whether it is a disorder or not, something needs to be done to fix it. Forget
the fancy name and look at the facts. Many people, teenagers in particular, are spending too
much time online. People’s lives are being affected because of the hours spent looking at profiles
and pictures. Facebook, very beneficial in some ways, is having a detrimental affect on the
everyday behaviors of people around the world. Having seen the affects of too much time online
firsthand, I know this to be true. Nobody can possibly disagree when the facts speak for
themselves and when an individual’s online ‘life’ becomes more important than their real one,
we know that there is a serious problem that needs to be addressed.
Effect of Dopamine:
Dopamine is the chemical in our brain associate with stimulus and reward/ the pleasure center of
our brain. Dopamine is not only about pleasure and reward, but about learning and memory. The
reward of having our image or post "liked," shared, or commented on is something that our brain
soon learns. It is validating. When we see the little red dots on our phone, or open up Facebook
and see the notifications lit up, it does the same thing to our brain we begin to have a conditioned
stimulus. We have set the expectation of a reward by posting, and once we see the notifications
and likes we are rewarded. Dopamine is released because we seek out the reward. One of the
original developers of the Facebook news feed even said that the thing which made it successful
wasn’t the software at all. But it was actually the scroll wheel on a mouse. Because with this
your hand never has to leave its resting position, you just scroll and keep looking. Therefore,
because of dopamine giving us the desire to seek and be rewarded In an evolutionary context, it
rewards us for beneficial behaviors and motivates us to repeat them. ‘Instant gratification’ is the
immediate attainability of satisfaction and happiness. It is a way of experiencing pleasure and
fulfillment without delay or patience because it provides a spike in dopamine without effort or
discipline. With the internet, twitter, and texting, instant gratification of your desire to seek is
23. Social
Media 21
available at the click of a button. You can talk to anyone just by sending a text and they respond
in a few seconds. According to Mauricio Delgado, an Associate Professor of Psychology at
Rutgers University, “The same brain areas [that are activated for food and water] are activated
for social stimuli." This means that our brain sees this social media stimuli as a necessity.
1.3 Statistics of Pakistani Social Media Users:
Social media and its uses are increasing day by day with every passing second around the world,
its utility is also increasing in Pakistan and people are understanding the use and power of social
media. Many issues that were too controversial to be raised are now supported on the internet
and the horizon of people is expanding. Pakistan is a country which was going through corrupt
leadership and bad governance when a nation is going through such issues; problems faced by
common people are always overlooked but social media and digital media is providing such
platforms for people to come up and speak for their rights. Social media and digital platforms are
not just providing a platform for business to reach out masses and grow but it is also giving the
true freedom of speech and power to the opinion of ordinary people.
Digital Statistical Indicators:
The above chart shows the statistics of Pakistan’s population and the number of people who are
active users of the internet, mobile users, social media users and mobile social users. The main
concern is to know how much of our total population is active social media user to know how
much influence we can create by approaching on social media. Social media is one of those
24. Social
Media 22
technological changes you can’t resist as with time everything starts to depend on them. The stats
of Pakistani people actually having access and actually using social media on an active basis
shows that we have so much of people to still make aware and reach out in order to make
Pakistan socially active.
The stats show that only 44.6 million out of 198.9 are internet users in Pakistan which
means only 22% of our total population has access to internet, even out of them only 35
million are active users of social media which means only 18% are social media users. If you
look deeper about the number of mobile users you will get to know that 109.5 million out of the
total population uses mobile and among them 32 million are active internet and social media
users from their mobile devices which is just 16% of our people.
All these stats show that we have a lot to do in this sector as compared to the developed
countries. We need to create awareness regarding the healthy and efficient uses of social media.
We need to realize the wide horizon people have on the social media. Our people use it just for
time pass and connectivity whereas the true essence and power is overlooked.
Social Media Websites Usage:
The most commonly used social media websites on the internet by the people of Pakistan are
these six including Facebook, YouTube, Twitter, Pinterest, Instagram and Google+. The info
graphic is a clear elaboration of how people are using these social websites. The most used social
media website that people of Pakistan are using is Facebook as 92.06% of our population
which has access to internet is actively using Facebook. The Stats in this info graphic shows
that people of Pakistan are just familiar with Facebook and many of them are just using it for the
purpose of connectivity with friends and family however ignoring the other vital uses of social
media. With time and with certain awareness programs like Social Media Summit ‘18 can bring
change in the utility of internet. The overall stats show that people are only aware with Facebook
and are not adopting other social websites as much as they use Facebook. The reality is that all
the other platforms are as much of an opportunity as Facebook but people of Pakistan might find
it more user friendly.
25. Social
Media 23
Top Industries on Facebook:
This next info graphic shows the number of followers of the biggest local Pakistani pages in the
different industries. To be more specific the data is from the total number of Local
Fans/followers for the largest 200 pages in Pakistan by Fan count.
The stats show that people use Facebook more for the sake of fashion than any other thing. The
stats have been carefully studied to come to these results which show that most followers are of
fashion industry. After fashion industry the people follow telecom sector on Facebook.
26. Social
Media 24
Ecommerce is also booming for people of Pakistan on Facebook. Retail and services are next.
These all stats show that people of Pakistan are now getting involved in retail activities online, in
the beginning people were too reluctant in adapting this totally new experience of buying
intangible stuff but with time trend is changing and a good amount of people are involved in
online purchases. Still the numbers are growing each year and the people are becoming aware.
However Pakistan still need to make people aware regarding the uses and utility of social media
and digital market.
Instagram Usage Statistics:
Instagram is a relatively new thing for Pakistani people and is less popular among the common
people however the upper class is obsessed with its various uses. We have 5.2 million monthly
active users on Instagram, the number is very less as compared to the Facebook users which was
35million. 5.2 million is just 3% of our population the rest is still a target.
27. Social
Media 25
On Instagram also the number of male users is more than female users. 31% of the total active
Instagram users are females where as 69% are males but the numbers are increasing with time.
Cure to this Social Media Addiction:
It’s undeniable that people stare at their phone screens too much. In fact, a Nielsen study found
that the average adult spends five and a half hours every week on social media. That's nearly 12
full days every year. If that doesn’t scare you enough, a lot of us are now addicted to social
media. The rush of dopamine you get from likes, comments and retweets is actually rewiring
your brain to crave Facebook, Twitter and Instagram. To test if you’re at risk for addiction, ask
yourself: Do you feel like social media is keeping you from doing your best work or living up to
your full potential? If your answer is yes, then you’ve been bitten by the social bug. Like
breaking any bad habit, the secret is to replace your bad habit with a better one in order for the
transformation to stick. Here’s the step-by-step process I teach my clients for breaking social
media addiction once and for all:
Step1: Understand That You’re Being Played : An embarrassingly heavy social-media
habit isn’t entirely your fault. “Pinterest, Facebook, Twitter—they’ve all been designed to make
you repeatedly use them and check back in,” says Levi Felix, the CEO of Digital Detox, a tech-
free wellness retreat in Northern California. “FarmVille was engineered to keep you at your
computer.” (After all, if you miss a specific window to harvest your crops, they die.) When you
keep in mind that the technology is designed to hold you hostage, you might be motivated to set
time limits. (Think of it as buying a snack-size bag of chips instead of the party-size.)
Step2: Figure out why you’re addicted to social media.
28. Social
Media 26
Ask yourself: Why do you open Instagram and Facebook in the first place? Was your
answer, “There’s no reason, I just like scrolling through my Instagram feed”? If so, take a closer
look at your motive. Are you bored at work, stressed out, feeling disconnected from the outside
world or just overwhelmed? The first step is to identify the core need, or “cue,” that triggers the
impulse to check your phone.
Step 3: Make the itch less easy to scratch.
The second step is to implement three to four tactics that keep social media at arm’s
length. These could include deleting social media apps from your phone, using a newsfeed
blocker on your desktop, keeping your phone out of your bedroom, setting your phone to Do Not
Disturb or turning off app notifications. Remember, some of the best minds in the world have
dedicated their lives to making social media more addictive. You’ll need to get aggressive in
order to win your focus back.
Step 4: Find alternative ways to respond to the itch.
The third step is to replace the negative routine of checking your social media with a new
routine. The cue of “I’m bored” or “I’m stressed” is still going to be there. But you can replace
your response to these triggers with something positive and productive. For example, tell
yourself: “When I feel bored at work, I’m going to take a walk around the block.” Or “When I
feel stressed out, I’m going to do a three-minute breathing exercise.” Once you retrain your brain
to respond to these cues, the itch will stop altogether.
Step 5: Implement multiple layers of accountability.
The fourth step is to repeat the new habit over and over again. This is usually where people fall
down, because their self-discipline muscle needs to be incredibly strong for this to work. But
self-discipline becomes a whole lot easier when you’re not on your own. Outsource your
discipline by enrolling an accountability buddy or coach to keep you on track .A quick solution
for accountability is to use an app. Google “accountability app” and choose one of the many
options for external, unbiased accountability options. (There’s even one that donates to a cause
you hate if you don’t reach your goals -- how’s that for motivation?)
29. Social
Media 27
Step 6: Reward, reward, reward.
The fifth step is to train your brain that the new routine is a good thing by rewarding it for a job
well done until the habit is strong enough to happen automatically. Habit formation shouldn’t
feel like torture. To make sure your new habit sticks, incorporate a positive reward into your
process, even if you don’t feel like you deserve it. For example, if you work social media-free for
an hour, give yourself a 10-minute reward break to do whatever you please. And, if you make it
through your whole day social media-free, give yourself an hour of personal time in the evening
as a reward. The best new habit you could create is one that frees you from the chains of
distraction and misused time. Join the fast-growing ranks of people pushing back against the tide
of social media, and revel in your newfound freedom.xviii
Why we today need Motivational speeches?
Have we evolved our body structures? Are we shifted to a new world? Have we less intellect than our
ancestors? No? Then what thing changed , which make us so. Why we need a motivational speaker to tell
us what our goals are ? How should we live our lives? The reason is that WE ARE PROGRAMMED
We are hollow Facebook profiles blindly walking behind memes and other’s life style. We follow Popular
Cultures that originate through social media. We spend more time in using social media and comparing
our lives to other. The time which could be spent in reading books or research is used in using social
media. Our energies are used to understand memes. We have limited our minds inside the world of social
media. It’s hard to get out of this. We should explore ourselves. We are much more than Profiles. Most of
us excuse that , we use social media apps to get knowledge ,but in fact , 60% of teens just use these sites
for fun.
1.4 A SOCIOLOGICAL STUDY OF DIFFERENT TYPES OF CYBER CRIMES:
INTRODUCTION : A common man who is a user of computer and internet and cell phone is
unaware of the traps set by clever criminals in the Cyber space and the ways to get rid of them.
Computers evolved as a result of man’s search for fast and accurate calculating devices. Forging
documents is one of the best examples of this kind of a Cybercrime. Image morphing, circulation
of defamatory comments and threats through mobile phones, taking photographs without consent
and consistent blackmailing may be some other examples. With the rise in the internet users’
Cyber criminals are also increasingly targeting cyber space to commit their illegal designs.
30. Social
Media 28
CYBERCRIME:
Cyber-crime is a crime involving, using or relating to computers especially the internet. Crimes
involving use of information technology or usage of electronic means in furtherance of crime are
covered under the scope of Cyber-crime. The ambit of the term includes all kinds of
objectionable or unlawful activities, misuse or abuse taking place in cyber world, through or
against the computer, internet, and telecommunication networks run with computer system or
technology. The scope of Cyber-crime is bound to increases in view of the ever-increasing
technological advancement in the area.
DIFFERENT TYPES OF CYBERCRIMES: Cyber-crimes are new generation crimes where
the achievements of information technology are misused for criminal activities. Such crimes may
be committed against the governments, individuals, and institutions. Generally, most of the
Cyber-crimes are adversely affect individuals, and society at large. The common types of Cyber-
crimes are discussed under the following heads:
a) Hacking:
Hacking means unauthorized access to another computer system. It is the most popular
and commonly known Cybercrime. Hackers will break into networks and computers
system for multiple purposes like data theft, fraud, destruction of data, causing damage to
computer system for mere pleasure or personal satisfaction. Hacking is the basic act of
the criminals who later on tread on to the other computer related crimes and frauds thus
making it easier for law enforcement authorities to grill them down under other existing
laws too. Latest development in this field is hacking of Wi-Fi environment. But the
Information Technology Act does not use the term hacking but refers to the same act as
unauthorized access to the computer resource. There are three classes of hackers-white
hat hackers, black hat hackers, and grey hat hackers.
31. Social
Media 29
DIFFERENT TYPES OF HACKERS:
White Hat Hackers: White Hackers use their hacking skills for good reasons and do no
harm to the computer system. So, they are referred as ethical hackers.
Black Hat Hackers: A black hat hacker is a person who gains unauthorized access to a
computer system with a malicious intention. The black hat hackers use their computer
knowledge for private gain. They cause damage to the system after intrusion. They may
steal, modify or erase data or insert viruses or women are which damages the system.
Grey Hat Hackers: A Grey Hat Hackers is a skilled hacker who sometimes acts legally,
sometimes in good will and sometimes not. They are hybrids between white hat and
black hat hackers. They usually do not hack for personal gain nor have malicious
intentions but may or may not occasionally commit crimes during the course of their
technological exploits.
b) Cyber Terrorism: Cyber terrorism is the convergence of cyberspace and terrorism. It
refers to unlawful attacks and threads of attacks against computers, networks and the
information stored therein that are carried out to intermediates or coerce a country’s
government or citizens in furtherance of political or social objectives. Serial attacks
against crucial infrastructures could count as acts of cyber terrorism. The cyber terrorism
attacks and threats includes interfering and disrupting information and transportation
32. Social
Media 30
systems, emergency services and government services, communication networks,
infrastructure systems, banking and fiancé system.
FACTORS OF CYBER TERRORISM:
c) Cyber Stalking:
These crimes involve the use of internet to harass someone. The behavior includes false
accusation, threats and harassment of as victim through e-Mil. Chat message or web pages. It
is a willful conduct that actually causes a victim to feel terrorized, frightened, intimidated or
molested. Normally majority of cyber stalkers are men and the majority of victims are
women.
33. Social
Media 31
GOAL PREVENTING CYBER STALKING:
In order to prevent cyber stalking, the netizens should avoid disclosing any information
pertaining to one while chatting. Girls should avoid sending any photographs online participatory
to strangers and chat friends as there has been incidence of misuse of the photograph for
morphing so as the reduce the chance of netizens becoming victims of Cybercrimes. When
children are involved in cyber stalking it is called cyber bullying.
d) Cyber bullying:
Cyber bullying occurs when children including teenagers are tormented threatened, harassed,
humiliated, embraced or otherwise targeted by other children using the internet, interactive and
digital technologies or mobile phones. It has to have a minor on both sides or at least should have
been instigated by a minor against another minor. The methods used are limited only by child’s
imagination and access to technology. Cyber bullying is usually not a onetime communication
unless it voices death threats or credible threats of serious bodily harm. Cyber bullying may arise
to the level of a cyber harassment charge, or if the child is young enough it may result in the
charge of juvenile delinquency. In order to safeguard children from cyber bullying parents
should be more involved in their children’s online activities, the parents should also be aware of
major changes in a child’s behavior.
34. Social
Media 32
E- mail spoofing:
E-mail is the short form for ‘electronic mail’. The electronic mail system over the internet can
carry messages, letters, pictures, sounds, or anything that can be created and stored in a
computer. Data can be sent as electronic mail to any other computer connected to the internet, e-
mail spoofing is a technique commonly used to hide the origin of an e mail message. The result
is that, although the e-mail appears to have come from a particular address it comes actually
from other sources.
Phishing:
It proceeds through the mass distribution of emails that purport to originate from Banks, credit
card companies and e-sellers. These mails request for providing personal and other details in
order to update their account. The fraudsters thus gain access to the password and other security
and authentication information of users, which can then be used to hack bank accounts or steal
through credit cards. According to the Anti-Phishing Working Group (APWG), there were over
2500 such sites reported on the internet in January 2005 alone, a 100% increase in the number in
Comparison to previous year (APWG, 2005) Internet offers valuable opportunity to fraudsters to
disguise themselves and their identities. These fraudsters also change personal attributes such as
35. Social
Media 33
age, gender, ethnic group, country of residence and so on. Even though the fraud is detected,
identifying the culprit is very difficult Victims of online frauds may be reluctant to report their
victimization due to the following reasons. Relatively small amount of money involved does not
make pursuing the matter worthwhile, embarrassment in reporting a fraud, ignorance about
reporting the offence to the concerned authority, likelihood that no results will ensue as the
fraudsters are located in another country. A literature review is a body of text that aims to review
the critical points of current knowledge including substantive findings as well as theoretical and
methodological contributions to a particular topic. Literature reviews are secondary sources, and
as such, do not report any new or original experimental work. No study can be undertaken
without reviewing and analyzing the literature available related to the field of study. Review of
Literature is an important component of research by which multifaceted understanding of the
phenomenon becomes the part of researcher’s cognitive personality. Review of literature on
Cybercrime and Social Networking Sites is to find out what research has already been
undertaken in the area of Cybercrime and Social Networking Sites, what type of the critical
explanations have been given about this new technological crime which is spreading very fast all
over the globe, what have been the causes behind occurrence of Online crime and what effect it
reflects on Indian society. Besides all this, it is also worthwhile to find out what laws and
legislations are present to deal with Cybercrime and issues related to Social media. As the
subject of Cybercrime and social networking sites is new in the field of Sociology and
Criminology, there is a paucity of literature in this area. Not only this, the available literature has
many limitations as the area of Cybercrime and Social Networking is wide and dynamic. Many
prominent classical sociologists have contributed towards the social thought on social order,
effects of science and technology and crime in society. It is worthwhile to note their viewpoints
before reviewing the current literature on technology and crime.
Morphing:
Morphing is editing the original picture by unauthorized user or fake identity. It was identified
that female’s pictures are downloaded by fake users and again Re-posted/uploaded on different
websites by creating fake profiles aft editing it. The change smoothly from one image to another
by small gradual steps using computer animation techniques. Morphing is a special effect in
36. Social
Media 34
motion pictures and animations that changes one image or shape into another through
technological means or as part of a fantasy or surreal sequence.
Cyber Theft:
Cyber Theft is a way of using a computer and Internet to steal money or in formation. This is
also the most popular Cybercrime because the ability to steal from a distance reduces the risk of
detection.
Cyber Theft includes:
Cyber Embezzlement:
Online embezzlement means misuse or alteration of data by an employee of a company who has
legitimate access to the company’s computerized system and network. Example an employee
misusing the company’s computerized payroll system in such a way that he is paid extra.
Unlawful Appropriation wherein an individual gains access from outside the organization to
transfer funds and modify documents in such a manner that it gives him legitimate right to
property he doesn’t own. Unlawful appropriation differs from embezzlement as the offender is
not interested with the valuables but gains access and transfers funds or modifies some
information.
Corporate Espionage:
Corporate Espionage- In this crime, an individual from inside/outside the company uses the
network and steals marketing strategies, trade secrets, financial data, client lists etc. in order to
gain a competitive advantage. In corporate or industrial espionage, the person uses the
company’s network to steal trade secrets, financial data, confidential client lists, marketing
strategies or information to gain a competitive edge.
Plagiarism:
Plagiarism is to steal someone else’s original writing and call its own. This form of crime is
increasing everywhere as more and more people have access to computers and internet. Piracyis
is an unauthorized copying of copyrighted software, video, music, books, etc. which causes loss
of revenue to the owner. Cyber piracy is the appropriation of new forms of intellectual property,
in which the computer program expressed in the form of a digital code, generates through a
37. Social
Media 35
computer system virtual products’ such as images, music, office aids or interactive experiences.
When cyberspace and intellectual property laws interact, they become a powerful force,
especially in present day society where economic profit is quite important. Identity Theft- In this
victim’s personal information is stolen by the criminal to commit financial frauds.
Cyber Fraud:
Cyber Fraud another form of cybercrime which has a firm grip on society is cyber fraud and
scams online. But, the problem with this is the lack of systematic and official data. Internet
Crime Complain Centre (ICCC)16 is the only source available whose primary role is to receive
public reports of cybercrime and refer them to the relevant criminal justice agencies fraction.
Hani Duruy, an eBay spokesperson in USA, claims that frauds account for only 0.01% of
transactions under taken using the site yet this would amount to 3000 frauds per day, given that
more than 30 million actions taking place on eBay daily Cha (2005)17. The fact is that growing
number of internet auction sites provide thieves a global market Through which they sell stolen
items to unsuspecting customers. For example, a group of motorcycle thieves in Delhi and
Punjab, who is mantled various bikes and sold them online as spare parts for Rs one lakh.
Another form of reported fraud is non-delivery of items for which he victims have already paid.
It can also include product in authenticity and misrepresentation of the condition of the item. In
cases of shill hiding, the seller places false bids by either using multiple fake identities or aliases
to place bids on their own items or by arranging for associates to place bids for the items with no
intention of actually purchasing them. There after it becomes impossible for the legitimate
38. Social
Media 36
bidders to detect whether or not others are genuine buyers or shills. In recent years Phishing and
spoofing frauds have increased.
CONCLUSION:
The Study observes use of computers and the change in technology due to new advancements.
This Study also cautions the security of internet users and relates this to emergence of
Cybercrime. This Studies mentioned different types of cybercrime, discusses hacking as based
on technical virtuosity. The advent of computer networking and the popularity of the internet
have also given rise to excessive hacking. Not only this, Privacy is at stack because of
widespread online transactions. Mostly people don’t know about Cybercrime and Cyber laws.
So, today’s need to aware the society about different types of Cybercrimes and Cyber laws.xix
1.5 Laws against Cyber Crime and Role of PTA :
Pakistan: National Assembly Passes New Cybercrime Law. (Sept. 21, 2016) On August 11,
2016, Pakistan's lower house, the National Assembly, passed a controversial cybercrime
law called the Prevention of Electronic Crimes Act, 2016. The Senate had unanimously passed
the law, with a number of amendments, in Sep 21, 2016. The Act introduces a range of offenses
39. Social
Media 37
involving the unauthorized access, transmission, copying, or interference in an information
system or data.
Spreading False Information about an Individual: up to 3 Years in Prison or up to Rs.
1 Million in Fine or both. Whoever intentionally and publicly displays any information
through any information system, which he knows to be false and intimidates or harms
the reputation or privacy of a natural person, shall be punished with imprisonment for a
term which may extend to three years or with fine which may extend to one million
rupees or with both:
Example
You know that an information is wrong and you still post or share it on Facebook about a
person that damages his/her reputation
Not to mention, this section will not apply where offense is committed by a broadcast media
licensed under the Pakistan Electronic Media Regulatory Authority Ordinance, 2002 (XIII of
2002).
Cyber stalking: Up to 3 Years in Jail or Up to Rs. 1 Million in Fine or both
If you try to get into a relation with someone online through internet website, email, SMS, phone
or any communication tool despite there is disinterest from the other party then you can be jailed
for three years or imposed a fine which may extend to one million rupees or with both.
Examples:
You repeatedly call someone, despite the other party asks you to not to
You send emails with no interest shown by the other party
You do something in a manner that other party is harassed out of your actions
If you call, chat with someone and other party has no issues with that then its all cool, nothing to
worry about.
40. Social
Media 38
Hacking Email / phone for Stalking:
Up to 3 Years in Jail or Up to Rs. 1 Million in Fine or both. If someone monitor a person
through mail, text message or any other form of electronic communication then you can be jailed
for up to three years and a fine of Rs. 1 Million or both
Example:
You hack someone with intent to a relation that you are in or may make and then monitors the
email, this could land you in jail for up to three years.
Making Videos/Pics and Distributing without Consent:
Up to 3 Years in Jail or Up to Rs. 1 Million in Fine or both. You take a photograph or make a
video of any person and displays or distributes it without his/her consent in a manner that harms
a person then you can go behind bars for up to three years and may have to bear a fine of up to
Rs. 1 million or both
Example:
You take picture or video of someone and then posts in online to damage the other party
Note: If you take pictures, videos and they are harmless or distribute it with the consent of other
party then its all good.
Cyber Stalking with a Minor:
Up to 5 Years in Jail and up to Rs. 10 Million in Fine. If victim of the cyber stalking is a minor
the punishment may extend to five years or with hue which may extend to ten million rupees or
with both.
Cyber stalking offences include:
Making contact in a manner that minor is harassed
Taking photographs, making videos and distributing them without consent
Blackmailing
Spying on minors
41. Social
Media 39
Hate speech:
Up to 7 Years in Prison or fine or both. Whoever prepares or distributes information, through
any information system or device that triggers inter-faith, sectarian or racial hatred, shall be
punished with imprisonment for a term which may extend to seven years or with fine or with
both.
Examples:
You post messages on Facebook that can trigger inter-faith or sectarian avoidance
You write a blog that triggers ethnic hatred
Spamming:
Three Months of Prison or Fine up to Rs. 5 Million or Both. Anyone (an individual or an
organization) can be fined with up to Rs. 50,000 for the first and three months of jail if they:
Send spam emails/SMS without permission of receiver
Send emails without unsubscribe options
Send emails with
o harmful fraudulent emails
o misleading email
o illegal email
Note: Every subsequent offenses (after first time) may increase the fine with multiples of Rs.
50,000 up to Rs. 5 million
Spoofing:
Up to 3 Years in Jail or Fine up to Rs. 500,00 or both . Whoever with dishonest intention
establishes a website or sends any information with a counterfeit source intended to be believed
by the recipient or visitor of the website to he an authentic source commits spoofing.
42. Social
Media 40
Malicious Code:
Up to 2 Years in Jail or up to Rs. 1 Million in Fine or Both. Whoever writes, offers, makes
available, distributes or transmits malicious code with intent to cause harm to any information
system or data resulting in the corruption, destruction, alteration suppression, theft or loss of the
information system or data shall be punished with imprisonment for a term which may extend to
two years or with fine which may extend to one million rupees or with both.
Examples:
You write a virus
You write a code that can be used to destruct a hard drive
You develop a mobile app to spy someone
Yo develop an app to spread virus
You DDoS attack someone
Unauthorized Access to Information Systemor Data: Up to 3 Months Prison or up to Rs.
50,000 Fine or both. Law says that if you access any information system or data with dishonest
intents then you can go to jail for up to three months or be liable to pay a fine up to Rs. 50,000 or
both.
It is wondered how the term “dishonest” is going to be defined by the litigators. Even worse,
how are they going to establish if any attempt was dishonest or not.
Examples:
Access to Information System means: Gaining access, control or ability to use any part or
whole of an system that could be a laptop, mobile phone, tablet, or any other kind of
computer system
Access to Data: Gaining access, control or ability to use any data or traffic data, i.e. an
email, SMS, fax, print out, or any kind of computer data.
Note: These punishments will be applicable if access to information is gained through infringing
any security or otherwise.
43. Social
Media 41
Unauthorized copying or transmission of Data:
Up to 6 Months Prison or up to Rs. 100,000 Fine or both. Whoever with dishonest intention and
without authorization copies or otherwise transmits or causes to be transmitted any data shall be
punished with imprisonment for a term which may extend to six months, or with fine which may
extend to one hundred thousand rupees or with both.
Examples:
If you copies data of someone else’s flash drive
If you gain access to someone’s phone and copy a mobile number
If you forward someone’s SMS to unintended people
You hack a website and copy its data
If you know a loophole in a website and copy data, say email addresses
So anything which is not yours, you somehow gain access — through security infringement or
otherwise — and you are proven to have copied data or transmitted it, then this section will get
activated.
Interference with information system or data: Up to 2 Years Prison or up to Rs. 500,000 Fine
or both. Whoever with dishonest intention interferes with or damages any part or whole of an
information system or data shall be punished with imprisonment which may extend to two years
or with fine which may extend to five hundred thousand rupees or with both.
Examples:
You hack a website and delete the content of the server
You gain access to someone’s mobile and delete its number
You gain access to someone’s Facebook account and delete it, partly or wholly
You gain access to someone’s Facebook account and post an update from his/her account
You gain access to someone’s email and send an email from his account
You send an SMS from someone’s mobile phone
So anything which is not yours, and you change its data, or access it to take an action which may
alter the content of that system or trigger a communication can land you in jail for two years or
Rs. 500,000 fine or both.
44. Social
Media 42
Unauthorized access to critical infrastructure information system or data:
Up to 3 Years Prison or up to Rs. 1 Million Fine or both. Whoever with dishonest
intention gains unauthorized access to any critical infrastructure information system or
data shall be punished with imprisonment which may extend to three years or with
fine which may extend to one million rupees or with both.
Examples:
You hack NADRA’s database and get an authorized access
You hack and intercept a fiber optic cable
You hack government of Pakistan’s website that’s maybe offering healthcare
services
You hack and get access to Pakistan Stock Exchange
You hack in to Pakistan Army’s servers
So anything which can cause detrimental damage, financially, socially, economically
will be treated under this section
Unauthorized copying or transmission of critical infrastructure data:
Up to 5 Years Prison or up to Rs. 5 Million Fine or both. Whoever with dishonest intention and
without authorization copies or otherwise transmits or causes to be transmitted any critical
infrastructure data shall be punished with imprisonment for a term which may extend to five
years, or with fine which may extend to five million rupees or with both.
Examples:
You hack NADRA’s database and steal the data,
You hack and intercept a fiber optic cable and start listening to data
You hack government of Pakistan’s website that’s maybe offering healthcare services
and copy the data
You hack and get access to Pakistan Stock Exchange and copy all the records
45. Social
Media 43
You hack in to Pakistan Army’s servers and copy the data and forward it your friend
Interference with critical infrastructure information system or data:
Up to 7 Years Prison or up to Rs. 10 Million Fine or both. Whoever with dishonest intention
interferes with or damages any part or whole of a critical information system, or data shall be
punished with imprisonment which may extend to seven years or with fine which may extend to
ten million rupees or with both.
Examples:
You hack NADRA’s database and delete everything
You hack and intercept a fiber optic cable and start transmitting it to someone
You hack government of Pakistan’s website that’s maybe offering healthcare services
and copy the data and start selling it
You hack and get access to Pakistan Stock Exchange and copy all the records and then
delete them from server
You hack in to Pakistan Army’s servers and copy the data and then delete it from the
server
Glorification of an offence:
Up to 7 Years Prison or up to Rs. 10 Million Fine or both. Whoever prepares or
spreads information through any information system or device with the intent to glorify an
offence relating to terrorism, or any person convicted of a crime relating to terrorism, or
activities of prescribed organizations or individuals or groups shall be punished with
imprisonment for a term which may extend to seven years or with fine which may extend to ten
million rupees or with both.
Examples:
You post on Facebook about Talibaan and say that they are good people
You SMS someone and say that Al-Qaida people will go to heaven
You come on TV and start praising banned outfit
46. Social
Media 44
You own a website that preaches about suicide bombing
You run a YouTube channel and there you say good things about anyone who has been
convicted of terrorism
Cyber terrorism: Up to 14 Years in Prison or up to Rs. 50 Million fine or both.
Whoever accesses, copies or destroys any critical information system with an intent
to create a sense of fear, panic or insecurity in the Government or the public or a
section of the public or community or sect or create a sense of fear or insecurity in
society can be punished with imprisonment of either description for a term which may
extend to 14 years or that fine which may be extended to 50 million rupees or with
both.
Examples:
You gain access to back-end system of a TV channel and start broadcasting a
message that may create panic
You gain access to back-end of a mobile company and start broadcasting a
message that may trigger fear
Online Recruitment, Funding of Terrorism: Up to 7 Years in Prison or fine or both.
Whoever prepares or distributes information, through any information system or device that
invites or motivates to fund, or recruits people for terrorism or plans for terrorism shall be
punished with imprisonment for a term which may extend to seven years or with fine or with
both.
Examples:
You run a Facebook group and encourage people to fund TTP
You run a WhatsApp group and plan a terror attack
47. Social
Media 45
Electronic forgery: Up to 3 Years in Prison or up to Rs. 250,000 fine or both. Whoever
interferes with or uses any information system, device or data, with the intent to cause damage or
injury to the public or to any person, or to make any illegal claim or title or to cause any person
to part with property or to enter into any express or implied contract, or with intent to commit
fraud by any input, alteration, deletion, or suppression of data, resulting in unauthentic data with
the intent that it be considered or acted upon for legal purposes as if’ it were authentic, regardless
of the fact that the data is directly readable and intelligible or not shall he punished with
imprisonment of either description for a term which may extend to three years or with line which
may extend to two hundred and fifty thousand rupees or with both.
Examples:
Change a contract/ agreement / invoice with intent to gain legal benefit
Electronic forgery of Critical Infrastructure: Up to 7 Years in Prison or up to Rs. 5
Million fine or both. If any of electronic forgery is done in relation to critical
infrastructure information system or data shall be punished with imprisonment for a term which
may extend to seven years or with fine which may extend to five million rupees or with both.
Examples:
You electronically change a contract that may result into detrimental loss to a company
in magnitude
Electronic fraud: Up to 2 Years in Prison or up to Rs. 10 Million fine or both. Whoever
with the intent for wrongful gain interferes with or uses any information system, device
or data or induces any person to enter into a relationship or deceives any person, which
act or omission is likely to cause damage or harm to that person or any other person shall
be punished with imprisonment for a term which may extend to two years or with fine
which may extend to ten million rupees or with both.
Examples
You get into a relationship with someone with intents to cause financial damage
48. Social
Media 46
Making, obtaining, or supplying device for use in offence: Up to six months in Prison or up to
Rs. 50,000 fine or both. Whoever produces, makes, generates, adapts, exports, supplies, offers to
supply or imports for use any information system, data or device, with the intent to he used or
believing that it is primarily to he used to commit or to assist in the commission of an offence
under this Act will be punished with imprisonment for a term which may extend to six months or
with fine which may extend to fifty thousand rupees or with both.
Examples
You make a software to hack a website
You manufacture a special purpose phone to communicate for planning an attack
You write code to steal data
You develop a phishing page
Unauthorized use of identity information: Up to 3 Years in Prison or up to Rs. 5 Million fine
or both. Whoever obtains, sells, possesses, transmits or uses another person’s identity
information without authorization shall be punished with imprisonment for a term which may
extend to three years or with fine which may extend to five million rupees, or with both.
Examples:
You use someone’s email address to pose as someone you aren’t
You call someone and claim you are a person which you are not
Unauthorized issuance of SIM cards etc: Up to 3 Years in Prison or Up to Rs. 500,000
in fine or both. Whoever sells or otherwise provide SIM card without obtaining and
verification of the subscriber’s details in a manner that’s not allowed by PTA, will be
punished with imprisonment for a term which may extend to three years with or with fine
which may extend to five hundred thousand rupees or with both
Examples:
You sell SIM cards without verifying data
You provide a SIM card to someone else for usage, even temporarily
49. Social
Media 47
Tampering of communication equipment: Up to 3 Years in Prison or Up to Rs. 1 Million in
fine or both. Whoever unlawfully or without authorization changes, alters, tampers with or re-
programs any communication equipment including a cellular or wireless handset and starts using
or marketing such device for transmitting and receiving information shall be shall be punished
with imprisonment which may extend to three years or with fine which may extend to one
million rupees or with both.
Example
You install a spy mobile app that can record calls and SMS and is able to send this data in
email to you or someone else
Unauthorized interception: Up to 2 Years in Prison or Up to Rs. 500,000 in fine or both.
Whoever with dishonest intention commits unauthorized interception by technical means of
any transmission that is not intended to be and is not open to the public, from or within an
information system
electromagnetic emissions from an information system that are carrying data
Shall be punished with imprisonment of either description for a term which may extend to two
years or with fine which may extend to five hundred thousand rupees or with both.xx
Role of PTA:
ISLAMABAD - Pakistan Telecommunication Authority (PTA) has established a Cyber Vigilance
Division (CVD) to handle complaints against unlawful online content under Prevention of
Electronic Crimes Act (PECA). In order to handle this gigantic role, PTA has also developed a
Standard Operating Procedure (SOP) for lodging complaints and their disposal has been developed
accordingly. All such contents which are hosted on unsecured websites is being currently handled
through telecom operators of Pakistan and same is being done by PTA itself through an automated
system. On the contrary, any content which is unlawful and hosted on secured web site is handled
differently. The popular social media websites like Facebook, YouTube and twitter etc. are a few
examples of secured websites which are hosted out side of physical boundaries of Pakistan. As
50. Social
Media 48
per PTA’s latest report, the Authority, in this regard, has developed close liaison with all such
platforms to honor requests made for removal of such content. It said historically and
predominantly, PTA has been acting under functions and powers given by Pakistan Telecom (Re-
organization) Act, 1996. However, with development and growth of World Wide Web (www),
PTA has been entrusted upon responsibilities for blocking/removing of any content which is
declared unlawful under relevant provisions of the law. This responsibility was handed over to
PTA under Prevention of Electronic Crimes Act (PECA), 2016. Since the promulgation of PECA,
PTA stands committed to its responsibilities to facilitate aggrieved Internet users and
stakeholders, including but not limited to government organizations, public offices, business
entities and other agencies. In this course, PECA also identifies the areas under which
blocking/removal of unlawful content would be addressed which are “against the glory of Islam,
against the integrity, security and defense of Pakistan, public order, contempt of court, against
decency & morality and incitement of any offices under section 37 of the PECA, 2016”. The
complaints received with PTA against unlawful online content including Anti State, Anti
Judiciary, Blasphemy etc. In this regard, PTA has blocked 824,878 URLs so far which came in its
jurisdiction under PECA. It is pertinent to mention that users of social media must act responsibly
while using and accessing such platforms and should honor the norms of society and laws of the
land. In case of objectionable content is observed by any user, these platforms are open to receive
complaints from valuable users directly. Relatively high value is given to complainant/users who
report to platforms any objectionable material directly. Those complaints which are not addressed
by these platforms in the first instance can be reported to PTA at info@pta.gov.pk for escalating
the matter. xxi
51. Social
Media 49
Implementation:
In July 2017, a man in Peshawar was jailed for 12 years for creating a fake Facebook profile of a
woman and then blackmailing her. The convict, Muhammad Munir, was arrested by the FIA in
March 2015, under the Electronics Transaction Ordinance 2002. He was also ordered to pay a
Rs0.3 million fine. The duration of the sentence, which was handed down by Additional Sessions
Judge Usman Ali, was unprecedented in Pakistan’s history of cybercrime cases.xxii
Reporting of cybercrimes, especially the harassment and blackmailing of women, has
increased sharply in Pakistan in the last three years, Dawn News TV reported on Tuesday
citing figures releasedby the Federal Investigation Agency (FIA).
The agency said that its cybercrime circle has so far conducted 2,295 inquiries, registered 255
cases and made 209 arrests in 2018 — all highest since the Prevention of Electronic Crimes Act
(Peca), 2016 was enforced. The corresponding figures for 2017 were 1,290 inquiries, 207 cases
registered and 160 arrests made, whereas figures for 2016 stood at 514, 47 and 49. The FIA
admitted that cybercrimes are on the rise in Pakistan but added that "the government's recent
measure to establish 15 new cybercrime reporting centers" will help control the situation. In
June, FIA Cybercrimes Director retired Captain Mohammad Shoaib had told a Senate standing
committee that the agency only has 10 experts to investigate cybercrimes in the country.xxiii
52. Social
Media 50
References:
i Kuss, D. J., & Griffiths, M. D. (2011). Online social networking and addiction—a review of the
psychological literature. International journal of environmental research and public health, 8(9), 3528-
3552.
ii Peng, T., Leckie, C., & Ramamohanarao, K. (2007). Survey of network-based defense mechanisms
countering the DoS and DDoS problems. ACM Computing Surveys (CSUR), 39
iii Wolak, J., Mitchell, K., & Finkelhor, D. (2007). Unwanted and wanted exposure to online pornography in
a national sample of youth Internet users. Pediatrics, 119(2), 247-257.
iv Kuss, D. J., & Griffiths, M. D. (2011). Online social networking and addiction—a review of the
psychological literature. International journal of environmental research and public health, 8(9), 3528-
3552.
v Mander, J., & McGrath, F. (2015). GWI device summary: GlobalWebIndex’s quarterly report on the latest
trends for smartphones, tablets, smart TVs and wearables. GlobalWebIndex 2015.
vi Brewer, J. (2013). The pleasures of the imagination: English culture in the eighteenth century.
Routledge.
vii https://www.internetworldstats.com/stats.htm
viii https://www.internetworldstats.com/stats3.htm
ix https://courses.lumenlearning.com/alamo-sociology/chapter/reading-theoretical-perspectives-on-media-and-
technology/
x https://sailemagazine.com/2017/09/how-new-media-is-sculpting-our-social-norms/#.XFVcVJMzbIU
xi http://sk.sagepub.com/reference/behavioralsciences/n2431.xml
xii EŞİTTİ, Ş. (2016). Narcotizing Effect of Social Media. Journal of the Institute of Social Sciences Cankiri
Karatekin University/Cankiri Karatekin Üniversitesi Sosyal Bilimler Enstitusu Dergisi, 7(1).
xiii http://nourilrb.blogspot.com/p/blog-page_17.html
xiv Elmore,Tim. “The Real Purposeof Social Media.Tim Elmore.” Growing Leaders. N.p., 24 Jan.2017.Web . 06 Feb.
2017.
xv http://www.sociologyguide.com/sociology-of-social-media/
xvi https://opentextbc.ca/introductiontosociology/chapter/chapter8-media-and-technology/
xvii https://opentextbc.ca/introductiontosociology/chapter/chapter8-media-and-technology/
xviii https://www.realsimple.com/work-life/technology/social-media-addiction
xix
Brenner,W.Susan(2010), Cybercrime:Criminal threatsfromcyberspace.GreenwoodPublishing
group,Westport
Cross,Michael and Shinder,LittlejohnDebra(2008).Scene of the Cybercrime,SyngressPublishingInc,
USA.
Flemming,P.andStohl,M. (2000), Myths and Realitiesof Cyberterrorism,InternationalConference on
CounteringTerrorismthroughEnhancedInternational Cooperation,22-24Sept.2000, Italy.
Furnell,Steven(2002),Cybercrime:Vandalizingthe informationSociety,Addison-Wesley,Boston.
Higgins,George (2010), Cybercrime:AnIntroductiontoanEmergingPhenomenon,McGraw Hill
Publishing,New York.
Holt,Thomas J (2011), Crime Online:CorrelatesCausesandContexts.Durham, CarolineAcademicPress,
USA. Indiaisnowworld’sthirdlargestInternetuserafterU.S.andChina;The Hindu;Aug 24,2013
53. Social
Media 51
Jaishankar,K.(2001).CyberCriminology:ExploringInternetCrimesandCriminalBehaviour.CRCPress:
Taylorand FrancisGroup.
KeralaState Legal Service Authority,Cochin(2013) LessonsinLaw.CochinPrintedPvt. Ltd.Eloor.
SkinnerW.F.and FreamA.M. (1927), A Social Learningtheoryanalysisof computerCrime Among
College Students,Journal of ResearchinCrime andDelilnquency,Vol34,495-518. Sutherland,EdwinH.
(1924), Principlesof Criminology,University of ChicagoPress,Chicago.
Wall,DavidS (2001), Crime andthe Internet,Routledge,London.
http://cybercrime.planetindia.net/intro.htm20/11/201
http://www.cyberlawsindia.net/black-hatml.7/4/2015[13] http://www.stopcyberbulling.org/what-is-
cyberbulling-exactly.html.21/3/2015
http://www.cyberkeralam.in8888/common/cybersecurity.jsp.2/11/2014
http://www.interpol.int/public/technologycrime/crimeprev/itsecurity.asp#21/4/2015
xx https://propakistani.pk/2016/08/05/must-read-list-of-cyber-crimes-and-their-punishments-in-pakistan/
xxi https://nation.com.pk/21-Jan-2019/pta-sets-up-cyber-vigilance-division
xxii https://www.pakistantoday.com.pk/2019/01/23/man-sentenced-to-eight-years-for-uploading-womens-
pictures-to-facebook/
xxiii https://www.dawn.com/news/1440854