The purpose of this study is to expand the boundaries of our knowledge by exploring some relevant facts and figures related to the issue of Cyber-crime in Pakistan. Cybercrime can be referred to as illegal activities being carried out by people using information technology for criminal purposes. Among the major types of cyber-crime includes the spread of malware, hacking passwords, steal credit card numbers and other bank details, as well as the dissemination of illegal information (libel, obscene material) over the Internet. Cybercrime is also considered as online auctions in which sellers are betting themselves to raise the price of the goods offered for auction. Everyone knows that Internet is the hunting ground of pirates (hackers), and the prey of evil viruses, spyware and other spam. Faced with sometimes serious consequences that can caused their shares to a company, all these forms of activities are considered crimes and punishable as per the law (Wall, 2007). In Pakistan, there has been an increase in the activities of cyber crime with a major emphasis on Credit Card Fraud. In this paper, we will examine different aspects of cyber crime in Pakistan, including methods used to commit such crime and methods that could have been used to either eradicate or diminish the effect of such crimes.
Discussion
In Pakistan, Computer crime or electronic crime or illegal digital is the generic term for those illegal transactions made through Internet or that are meant to destroy and damage computers, electronic media and Internet networks. However, the categories that define a computer crime are even more complex and may include crimes such as credit card fraud, forgery and misappropriation of public funds in which computers and networks have been used. With the development of programming and the Internet, cyber crimes have become more frequent and sophisticated (McQuade, 2010).
In Pakistan, there are criminal activities that take place via electronic structures that are linked to a number of criminal tools seeking to damage anything they find in the IT sector: illegal entry systems, illegal interception networks, interference, damage information, misuse of devices, blackmail, phishing, attacks on systems, bank robbery, attacks by hackers, violation of copyright, violation of confidential information and many others. Currently there are laws aimed at comprehensive protection for systems using information technology, however, authorities have been failed to prevent and punish those involved in such crimes (Choi, 2008).
Cyber crimes are criminal acts that may affect the government and its stability, economy and social peace, which requires specialized care authority. At first they looked like typical figures fit into the theft, fraud, forgery, fraud or sabotage, but now the catalog is broader and include figures such as cyber terrorism. The adoption of new technologies and their impact on everyday life led the authorities in Pakistan to update, although still inadequately, various legal provisions that were outdated with the passage of time. Moreover, in Pakistan, authorities have adopted policies to face this new danger; still there are some lope holes that are yet to be ...