A Quantitative Study on the Factors Influencing Implementation of Cybersecurity Laws and Regulations in Pakistan
Abstract
:1. Introduction
2. Literature Review
2.1. Technical Cybersecurity
2.2. Cybersecurity Law
2.3. Implementation of Cybersecurity Law
2.4. Factors Influencing Implementation of Cybersecurity Law
2.4.1. Corruption and Law Implementation
- Discriminatory or Selective Ground-Level Implementation
- B.
- Involved in the Eradication of Illicit Conduct
2.4.2. Expertise and Law Enforcement
2.4.3. Ambiguity and Law Enforcement
2.4.4. Public Confidence and Law Enforcement
3. Research Methods
3.1. Research Design and Sampling
3.2. Variable Assessment
3.2.1. Corruption
3.2.2. Discrimination
3.2.3. Illicit Conduct
3.2.4. Expertise
3.2.5. Ambiguity
3.2.6. Public Confidence
3.2.7. Implementation of Cybersecurity Law
3.3. Research Analysis
4. Findings
4.1. Reliability and Validity Findings
4.2. Hypotheses Testing
5. Discussion
6. Implications
7. Conclusions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Conflicts of Interest
References
- Abbas, Hafiz Syed Mohsin, Zahid Hussain Qaisar, Xiaodong Xu, and Chunxia Sun. 2021. Nexus of E-government, cybersecurity and corruption on public service (PSS) sustainability in Asian economies using fixed-effect and random forest algorithm. Online Information Review 46: 754–70. [Google Scholar] [CrossRef]
- Abdillah, Willy, and Jogiyanto Hartono. 2015. Partial Least Square (PLS): Alternatif structural equation modeling (SEM) dalam penelitian bisnis. Yogyakarta: Penerbit Andi 22: 103–50. [Google Scholar]
- Abdullahi, Mujaheed, Yahia Baashar, Hitham Alhussian, Ayed Alwadain, Norshakirah Aziz, Luiz Fernando Capretz, and Said Jadid Abdulkadir. 2022. Detecting cybersecurity attacks in internet of things using artificial intelligence methods: A systematic literature review. Electronics 11: 198. [Google Scholar] [CrossRef]
- Akhtar, Aisha, Sadaf Rafiq, Ali Asif, Arshia Saeed, and Muhammad Kashif. 2012. Public perceptions of police service quality: Empirical evidence from Pakistan. International Journal of Police Science & Management 14: 97–106. [Google Scholar]
- Anwar, Syeda Sundus, and Tughral Yamin. 2021. Civil Military Cooperation (CIMIC) in Cyber Security Domain: Analyzing Pakistan’s Prospects. Global Strategic & Security Studies Review VI: 68–81. [Google Scholar] [CrossRef]
- Appazov, Artur. 2014. Legal Aspects of Cybersecurity. University of Copenhagen, pp. 38–42. Available online: https://www.justitsministeriet.dk/sites/default/files/media/Arbejdsomraader/Forskning/Forskningspuljen/Legal_Aspects_of_Cybersecurity.pdf (accessed on 14 April 2023).
- Awan, Jawad Hussain, Shahzad Memon, and Fateh Muhammad Burfat. 2019. Role of Cyber Law and Mitigation Strategies in Perspective of Pakistan to Cope Cyber Threats. International Journal of Cyber Warfare and Terrorism (IJCWT) 9: 29–38. [Google Scholar] [CrossRef]
- Azmi, Rama Halim Nur. 2020. Indonesian Cyber Law Formulation in The Development Of National Laws In 4.0 Era. Lex Scientia Law Review 4: 46–58. [Google Scholar]
- Baruch, Yehuda, and Brooks C Holtom. 2008. Survey response rate levels and trends in organizational research. Human Relations 61: 1139–60. [Google Scholar] [CrossRef]
- Bauman, Sheri, and Jina Yoon. 2014. This Issue: Theories of Bullying and Cyberbullying. London: Taylor & Francis, pp. 253–56. [Google Scholar]
- Bechara, Fabio Ramazzini, and Samara Bueno Schuch. 2021. Cybersecurity and global regulatory challenges. Journal of Financial Crime 28: 359–74. [Google Scholar] [CrossRef]
- Becker, Gary S. 1968. Crime and punishment: An economic approach. In The Economic Dimensions of Crime. Berlin/Heidelberg: Springer, pp. 13–68. [Google Scholar]
- Benedict, Wm Reed, Ben Brown, and Douglas J. Bower. 2000. Perceptions of the police and fear of crime in a rural setting: Utility of a geographically focused survey for police services, planning, and assessment. Criminal Justice Policy Review 11: 275–98. [Google Scholar] [CrossRef]
- Bokhari, Syed Asad Abbas. 2022. An Empirical Examination of the Impact of Initial Capital, Prior Experience, and R&D on SMEs’ Survival and Economic Performance: Moderating Role of Innovation Culture. Journal of Small Business Strategy 32: 112–25. [Google Scholar]
- Bokhari, Syed Asad Abbas, and Seunghwan Myeong. 2022. Use of artificial intelligence in smart cities for smart decision-making: A social innovation perspective. Sustainability 14: 620. [Google Scholar] [CrossRef]
- Bokhari, Syed Asad Abbas, and Seunghwan Myeong. 2023. The Influence of Artificial Intelligence on E-Governance and Cybersecurity in Smart Cities: A Stakeholder’s Perspective. IEEE Access 11: 69783–97. [Google Scholar] [CrossRef]
- Bolger, P. Colin, and Glenn D. Walters. 2019. The relationship between police procedural justice, police legitimacy, and people’s willingness to cooperate with law enforcement: A meta-analysis. Journal of Criminal Justice 60: 93–99. [Google Scholar] [CrossRef]
- Brenner, Susan W. 2010. Cybercrime: Criminal Threats from Cyberspace. Santa Barbara: ABC-CLIO. [Google Scholar]
- Bronk, Chris, and Wm Arthur Conklin. 2022. Who’s in charge and how does it work? US cybersecurity of critical infrastructure. Journal of Cyber Policy 7: 155–74. [Google Scholar] [CrossRef]
- Burns, Ronald G., Keith H. Whitworth, and Carol Y. Thompson. 2004. Assessing law enforcement preparedness to address Internet fraud. Journal of Criminal Justice 32: 477–93. [Google Scholar] [CrossRef]
- Burr, R. 2015. To Improve Cybersecurity in the United States through Enhanced Sharing of Information about Cybersecurity Threats, and for Other Purposes. Paper presented at the 114th United States Congress, Washington, DC, USA, July 6. [Google Scholar]
- Buzdugan, Aurelian, and Gheorghe Capatana. 2022. Cyber security maturity model for critical infrastructures. In Education, Research and Business Technologies: Proceedings of 20th International Conference on Informatics in Economy (IE 2021). Hanover: Springer Nature. [Google Scholar]
- Cabaj, Krzysztof, Luca Caviglione, Wojciech Mazurczyk, Steffen Wendzel, Alan Woodward, and Sebastian Zander. 2018. The new threats of information hiding: The road ahead. IT Professional 20: 31–39. [Google Scholar] [CrossRef]
- Calford, Evan M., and Gregory DeAngelo. 2022. Ambiguity and enforcement. Experimental Economics 26: 1–35. [Google Scholar] [CrossRef]
- Cavanagh, Connor Joseph. 2017. Mapping the state’s Janus face: Green economy and the ‘green resource curse’ in Kenya’s highland forests. In Corruption, Natural Resources and Development. Cheltenham: Edward Elgar Publishing. [Google Scholar]
- Chang, Yen-Chiang, and Mehran Idris Khan. 2019. China–Pakistan economic corridor and maritime security collaboration: A growing bilateral interests. Maritime Business Review 4: 217–35. [Google Scholar] [CrossRef]
- Chêne, Marie. 2008. Overview of corruption in Pakistan. Transparency International, 1–13. Available online: https://www.u4.no/publications/overview-of-corruption-in-pakistan (accessed on 7 November 2023).
- Chizanga, Merrilyn, J. Agola, and Anthony Rodrigues. 2022. Factors Affecting Cyber Security Awareness in Combating Cyber Crime in Kenyan Public Universities. International Research Journal of Innovations in Engineering and Technology 6: 54–57. [Google Scholar] [CrossRef]
- Chopard, Bertrand, and Marie Obidzinski. 2021. Public law enforcement under ambiguity. International Review of Law and Economics 66: 105977. [Google Scholar] [CrossRef]
- Clark, Gordon. 2002. The Geography of Law. London: Routledge. [Google Scholar]
- Clark, Rodney, Apollonia P. Coleman, and Jeremy D. Novak. 2004. Brief report: Initial psychometric properties of the everyday discrimination scale in black adolescents. Journal of Adolescence 27: 363–68. [Google Scholar] [CrossRef] [PubMed]
- Earnshaw, Valerie A., Sari L. Reisner, David D. Menino, V. Paul Poteat, Laura M. Bogart, Tia N. Barnes, and Mark A. Schuster. 2018. Stigma-based bullying interventions: A systematic review. Developmental Review 48: 178–200. [Google Scholar] [CrossRef] [PubMed]
- Firdous, Ms Afeera. 2018. Formulation of Pakistan’s Cyber Security Policy. CISS Insight Journal 6: 70–94. [Google Scholar]
- Gallagher, Mary, John Giles, Albert Park, and Meiyan Wang. 2015. China’s 2008 Labor Contract Law: Implementation and implications for China’s workers. Human Relations 68: 197–235. [Google Scholar] [CrossRef]
- General Assembly. 2014. Universal Declaration of Human Rights, 1948, Article 15. Available online: https://www.ohchr.org/EN/UDHR/Documents/UDHR_Translations/eng.pdf (accessed on 12 April 2023).
- Goel, Sanjay. 2020. National cyber security strategy and the emergence of strong digital borders. Connections 19: 73–86. [Google Scholar] [CrossRef]
- Goldfoot, Josh A. 2018. The Pen-Trap Statute and the Internet. Virginia Journal of Criminal Law 6: 1. [Google Scholar]
- Goncalves, Marilyne Pereira, Melissa Panjer, Theodore S. Greenberg, and William B Magrath. 2012. Justice for Forests: Improving Criminal Justice Efforts to Combat Illegal Logging. Washington, DC: World Bank Publications. [Google Scholar]
- Gross, Michael L., Daphna Canetti, and Dana R. Vashdi. 2017. Cyberterrorism: Its effects on psychological well-being, public confidence and political attitudes. Journal of Cybersecurity 3: 49–58. [Google Scholar] [CrossRef]
- Hall, Nathan. 2012. Policing hate crime in London and New York City: Some reflections on the factors influencing effective law enforcement, service provision and public trust and confidence. International Review of Victimology 18: 73–87. [Google Scholar] [CrossRef]
- Harbin, Gloria, James J. Gallagher, Timothy Lillie, and Jane Eckland. 1992. Factors influencing state progress in the implementation of Public Law 99-457, Part H. Policy Sciences 25: 103–15. [Google Scholar] [CrossRef]
- Hauser, Christian. 2019. Fighting against corruption: Does anti-corruption training make any difference? Journal of Business Ethics 159: 281–99. [Google Scholar] [CrossRef]
- Hawamleh, A., Almuhannad Sulaiman M. Alorfi, Jassim Ahmad Al-Gasawneh, and Ghada Al-Rawashdeh. 2020. Cyber security and ethical hacking: The importance of protecting user data. Solid State Technology 63: 7894–99. [Google Scholar]
- Holmes, Erin J., and Doug Goodman. 2010. African-American and White Perception of Police Services: The Impact of Diversity on Citizens’ Attitudes toward Police Services. Journal of Public Management & Social Policy 16: 3–18. [Google Scholar]
- Holovkin, Bohdan M., Oleksii V. Tavolzhanskyi, and Oleksandr V. Lysodyed. 2021. Corruption as a cybersecurity threat in conditions of the new world’s order. Linguistics and Culture Review 5: 499–512. [Google Scholar] [CrossRef]
- Hong, Jun Sung, Anthony A. Peguero, and Dorothy L. Espelage. 2018. Experiences in bullying and/or peer victimization of vulnerable, marginalized, and oppressed children and adolescents: An introduction to the special issue. American Journal of Orthopsychiatry 88: 399. [Google Scholar] [CrossRef]
- Hooghe, Marc, and Anna Kern. 2015. Party membership and closeness and the development of trust in political institutions: An analysis of the European Social Survey, 2002–2010. Party Politics 21: 944–56. [Google Scholar] [CrossRef]
- Jackson, Jonathan, Muhammad Asif, Ben Bradford, and Muhammad Zakria Zakar. 2014. Corruption and police legitimacy in Lahore, Pakistan. British Journal of Criminology 54: 1067–88. [Google Scholar] [CrossRef]
- Janssen, Marijn, Vishanth Weerakkody, Elvira Ismagilova, Uthayasankar Sivarajah, and Zahir Irani. 2020. A framework for analysing blockchain technology adoption: Integrating institutional, market and technical factors. International Journal of Information Management 50: 302–9. [Google Scholar] [CrossRef]
- Jones, Lisa M., Anna Segura Montagut, Kimberly J. Mitchell, Heather A. Turner, Sherry Hamby, and Carlos A. Cuevas. 2023. Youth bias-based victimization: Comparing online only, in-person only, and mixed online/in-person incidents. International Journal of Bullying Prevention, 1–13. [Google Scholar] [CrossRef]
- Karakus, Onder, Edmund F. McGarrell, and Oguzhan Basibuyuk. 2011. Public satisfaction with law enforcement in Turkey. Policing: An International Journal of Police Strategies & Management 34: 304–25. [Google Scholar]
- Kolstad, Ivar, and Tina Søreide. 2009. Corruption in natural resource management: Implications for policy makers. Resources Policy 34: 214–26. [Google Scholar] [CrossRef]
- Kosseff, Jeff. 2017. Defining cybersecurity law. Iowa Law Review 103: 985. [Google Scholar]
- Koziarski, Jacek, and Jin Ree Lee. 2020. Connecting evidence-based policing and cybercrime. Policing: An International Journal 43: 198–211. [Google Scholar] [CrossRef]
- Kure, Halima Ibrahim, Shareeful Islam, and Haralambos Mouratidis. 2022. An integrated cyber security risk management framework and risk predication for the critical infrastructure protection. Neural Computing and Applications 34: 15241–71. [Google Scholar] [CrossRef]
- L. J. Bikoko, Théodore Gautier, Jean Claude Tchamba, and Felix Ndubisi Okonta. 2019. A comprehensive review of failure and collapse of buildings/structures. International Journal of Civil Engineering and Technology 10: 187–98. [Google Scholar]
- Lallie, Harjinder Singh, Lynsay A. Shepherd, Jason R. C. Nurse, Arnau Erola, Gregory Epiphaniou, Carsten Maple, and Xavier Bellekens. 2021. Cyber security in the age of COVID-19: A timeline and analysis of cyber-crime and cyber-attacks during the pandemic. Computers & Security 105: 102248. [Google Scholar]
- Lim, Hazel Si Min, and Araz Taeihagh. 2018. Autonomous vehicles for smart and sustainable cities: An in-depth exploration of privacy and cybersecurity implications. Energies 11: 1062. [Google Scholar] [CrossRef]
- Ma, Chen. 2021. Smart city and cyber-security; technologies used, leading challenges and future recommendations. Energy Reports 7: 7999–8012. [Google Scholar] [CrossRef]
- Marcacci, Antonio. 2022. Transnational Securities Regulation: How It Works, Who Shapes It. Berlin/Heidelberg: Springer Nature, vol. 3. [Google Scholar]
- Ministry of Information Technology & Telecommunication. 2021. National CYBER Security Policy 2021; Islamabad: Government of Pakistan. Available online: https://moitt.gov.pk/SiteImage/Misc/files/National%20Cyber%20Security%20Policy%202021%20Final.pdf (accessed on 26 May 2023).
- Mohanta, Abhijit, and Anoop Saldanha. 2020. Malware Analysis and Detection Engineering: A Comprehensive Approach to Detect and Analyze Modern Malware. Berlin/Heidelberg: Springer. [Google Scholar]
- Möller, Dietmar P. F., and Roland E. Haas. 2019. Guide to Automotive Connectivity and Cybersecurity. Berlin/Heidelberg: Springer. [Google Scholar]
- Munaiah, Nuthan, Akond Rahman, Justin Pelletier, Laurie Williams, and Andrew Meneely. 2019. Characterizing attacker behavior in a cybersecurity penetration testing competition. Paper presented at the 2019 ACM/IEEE International Symposium on Empirical Software Engineering and Measurement (ESEM), Recife, Brazil, September 19–20. [Google Scholar]
- Navarro-Rodríguez, Christián Denisse, Jose A. Vera Noriega, and Sheri Bauman. 2023. Bias-Based Cyberaggression in Northwestern Mexican Adolescents: Associations With Moral Disengagement. The Journal of Early Adolescence 43: 110–35. [Google Scholar] [CrossRef]
- Nouh, Mariam, Jason R. C. Nurse, Helena Webb, and Michael Goldsmith. 2019. Cybercrime investigators are users too! Understanding the socio-technical challenges faced by law enforcement. arXiv arXiv:1902.06961. [Google Scholar]
- Nurse, Jason R. C. 2018. Cybercrime and you: How criminals attack and the human factors that they seek to exploit. arXiv arXiv:1811.06624. [Google Scholar]
- Ohanian, Roobina. 1990. Construction and validation of a scale to measure celebrity endorsers’ perceived expertise, trustworthiness, and attractiveness. Journal of Advertising 19: 39–52. [Google Scholar] [CrossRef]
- Parker, Dominic. 2019. Corruption, Natural Resources and Development: From Resource Curse to Political Ecology. The Energy Journal 40: 250–53. [Google Scholar]
- Peguero, Anthony A., and Jun Sung Hong. 2020. School Bullying: Youth Vulnerability, Marginalization, and Victimization. Berlin/Heidelberg: Springer. [Google Scholar]
- Pellegrini, Lorenzo. 2011. The rule of the jungle in Pakistan: A case study on corruption and forest management in Swat. In Corruption, Development and the Environment. Berlin/Heidelberg: Springer, pp. 121–47. [Google Scholar]
- Polinsky, A. Mitchell, and Steven Shavell. 2001. Corruption and optimal law enforcement. Journal of public Economics 81: 1–24. [Google Scholar] [CrossRef]
- Polinsky, A. Mitchell, and Steven Shavell. 2007. The theory of public enforcement of law. Handbook of Law and Economics 1: 403–54. [Google Scholar]
- Rafiq, Aamna. 2019. Challenges of securitising cyberspace in Pakistan. Strategic Studies 39: 90–101. [Google Scholar] [CrossRef]
- Rasool, Sadia. 2015. Cyber security threat in Pakistan: Causes, Challenges and Way forward. International Scientific Online Journal 12: 21–32. [Google Scholar]
- Richards, Newman U., and Felix E. Eboibi. 2021. African governments and the influence of corruption on the proliferation of cybercrime in Africa: Wherein lies the rule of law? International Review of Law, Computers & Technology 35: 131–61. [Google Scholar]
- Richmond, Christina. 2017. Cybersecurity Readiness: How “At Risk” Is Your Organization. Framingham: International Data Corporation (IDC), pp. 1–17. [Google Scholar]
- Robbins, Paul. 2000. The rotten institution: Corruption in natural resource management. Political Geography 19: 423–43. [Google Scholar] [CrossRef]
- Sattar, Zunaira, Shazia Riaz, and Ahmad U. Mian. 2018. Challenges of Cybercrimes to Implementation of Legal Framework. Paper presented at the 2018 14th International Conference on Emerging Technologies (ICET), Islamabad, Pakistan, November 21–22. [Google Scholar]
- Schafer, Joseph A., Beth M. Huebner, and Timothy S. Bynum. 2003. Citizen perceptions of police services: Race, neighborhood context, and community policing. Police Quarterly 6: 440–68. [Google Scholar] [CrossRef]
- Slemrod, Joel. 2019. Tax compliance and enforcement. Journal of Economic Literature 57: 904–54. [Google Scholar] [CrossRef]
- Slipachuk, Lada, Serhii Toliupa, and Volodymyr Nakonechnyi. 2019. The Process of the Critical Infrastructure Cyber Security Management using the Integrated System of the National Cyber Security Sector Management in Ukraine. Paper presented at the 2019 3rd International Conference on Advanced Information and Communications Technologies (AICT), Lviv, Ukraine, July 2–6. [Google Scholar]
- Snow, Arthur. 2011. Ambiguity aversion and the propensities for self-insurance and self-protection. Journal of Risk and Uncertainty 42: 27–43. [Google Scholar] [CrossRef]
- Suwana, Fiona, and Nur Hidayat Sardini. 2022. Cyber Terror, the Academic Anti-corruption Movement and Indonesian Democratic Regression. Contemporary Southeast Asia 44: 31–55. [Google Scholar]
- Tarter, Alex. 2017. Importance of cyber security. In Community Policing-A European Perspective. Berlin/Heidelberg: Springer, pp. 213–30. [Google Scholar]
- Tene, Claude Bernard, Siddig Omer, and Blaise Mempouo. 2017. Towards a coherent implementation of safe building laws and regulations in Cameroon: Law, gowernance and institutional imperatives. Journal of Sustainable Development Law and Policy 8: 87–109. [Google Scholar] [CrossRef]
- Tewamba, Harold Nguegang, Jean Robert Kala Kamdjoug, Georges Bell Bitjoka, Samuel Fosso Wamba, and Nicolas Nkondock Mi Bahanag. 2019. Effects of information security management systems on firm performance. American Journal of Operations Management and Information Systems 4: 99–108. [Google Scholar] [CrossRef]
- Tran, Jasper L. 2016. Navigating the Cybersecurity Act of 2015. Chapman Law Review 19: 483. [Google Scholar]
- Tremblay, Paul R. 2018. At Your Service: Lawyer Discretion to Assist Clients in Unlawful Conduct. Florida Law Review 70: 251. [Google Scholar]
- UNODC (United Nations Office on Drugs and Crime). 2013. Comprehensive Study on Cybercrime. Available online: https://www.unodc.org/documents/commissions/CCPCJ/CCPCJ_Sessions/CCPCJ_22/_E-CN15-2013-CRP05/Comprehensive_study_on_cybercrime.pdf (accessed on 28 June 2023).
- Vaughn, Michael S., Tab W. Cooper, and Rolando V. del Carmen. 2001. Assessing legal liabilities in law enforcement: Police chiefs’ views. Crime & Delinquency 47: 3–27. [Google Scholar]
- Veale, Michael, and Ian Brown. 2020. Cybersecurity. Internet Policy Review 9: 1–22. [Google Scholar] [CrossRef]
- Weinstein, Mariani, Michaeline R. Jensen, and Brendesha M. Tynes. 2021. Victimized in many ways: Online and offline bullying/harassment and perceived racial discrimination in diverse racial–ethnic minority adolescents. Cultural Diversity and Ethnic Minority Psychology 27: 397. [Google Scholar] [CrossRef] [PubMed]
- Williams, David Aled. 2019. Understanding Effects of Corruption on Law Enforcement and Environmental Crime. Bergen: U4 Anti-Corruption Resource Centre. [Google Scholar]
- Williams, Lynne Yarbro. 2008. Catch me if you can: A taxonomically structured approach to cybercrime. Forum on Public Policy: A Journal of the Oxford Round Table. Available online: https://go.gale.com/ps/i.do?p=AONE&u=googlescholar&id=GALE|A197721378&v=2.1&it=r&sid=googleScholar&asid=c64b8028 (accessed on 6 May 2023).
Description | N | % |
---|---|---|
Age | ||
22 to 35 years | 112 | 65 |
36 to 50 years | 55 | 32 |
51 to 60 years | 05 | 03 |
Gender | ||
Male | 108 | 63 |
Female | 64 | 37 |
Sector | ||
Banking firms | 106 | 62 |
IT firms | 66 | 38 |
Position | ||
Low-level managers/Supervisors | 102 | 59 |
Middle-level managers/Operations managers | 52 | 30 |
Full managers/Branch managers | 18 | 11 |
N | Cronbach’s Alpha | CR | AVE | |
---|---|---|---|---|
Overall Cronbach’s Alpha = 0.979 | ||||
Corruption | 5 | 0.817 | 0.882 | 0.600 |
Ambiguity | 5 | 0.894 | 0.927 | 0.719 |
Discrimination | 5 | 0.915 | 0.939 | 0.757 |
Illicit Conduct | 5 | 0.968 | 0.976 | 0.890 |
Public Confidence | 5 | 0.842 | 0.888 | 0.615 |
Expertise | 5 | 0.741 | 0.921 | 0.795 |
Cyber Law Implementation | 5 | 0.823 | 0.894 | 0.764 |
N | M | SD | Gen | Age | Pos | CLI | COR | PC | EXP | DIS | IC | |
---|---|---|---|---|---|---|---|---|---|---|---|---|
Gen | 172 | 1.343 | 0.476 | 1 | ||||||||
Age | 172 | 2.256 | 0.438 | 0.054 | 1 | |||||||
Pos | 172 | 3.401 | 0.492 | 0.258 ** | 0.472 ** | 1 | ||||||
CLI | 172 | 3.68 | 0.501 | 0.052 | 0.038 * | 0.034 * | 1 | |||||
COR | 172 | 3.787 | 0.645 | −0.075 | −0.076 | −0.021 | −0.449 ** | 1 | ||||
PC | 172 | 3.809 | 0.778 | 0.029 * | 0.045 * | 0.034 * | 0.624 ** | 0.887 ** | 1 | |||
EXP | 172 | 4.053 | 0.826 | 0.060 | 0.035 * | 0.007 ** | 0.712 ** | 0.879 ** | 0.959 ** | 1 | ||
DIS | 172 | 0.901 | 1.009 | 0.027 * | −0.054 | −0.14 * | −0.626 ** | 0.846 ** | 0.957 ** | 0.977 ** | 1 | |
IC | 172 | 3.958 | 0.673 | 0.052 | 0.035 * | 0.006 ** | −0.573 ** | 0.908 ** | 0.920 ** | 0.923 ** | 0.890 ** | 1 |
AMB | 172 | 3.857 | 0.667 | −0.030 * | −0.074 | 0.042 * | −0.668 ** | 0.881 ** | 0.906 ** | 0.925 ** | 0.933 ** | 0.869 ** |
ANOVA a | ||||||
---|---|---|---|---|---|---|
Model | Sum of Squares | df | Mean Square | F | Sig. | |
1 | Regression | 1994.493 | 9 | 221.610 | 355.738 | 0.000 b |
Residual | 100.920 | 162 | 0.623 | |||
Total | 2095.413 | 171 |
Coefficients | ||||||
Model | Unstandardized Coefficients | Standardized Coefficients | t | Sig. | ||
B | Std. Error | Beta | ||||
(Constant) | −7.198 | 0.705 | −10.214 | 0.000 | ||
Gen | −0.086 | 0.133 | −0.012 | −0.643 | 0.521 | |
Age | −0.029 | 0.159 | −0.004 | −0.184 | 0.854 | |
Position | 0.111 | 0.146 | 0.016 | 0.763 | 0.447 | |
Corruption | −7.361 ** | 0.268 | −1.357 | −27.429 | 0.000 | |
Public Confidence | 2.428 ** | 0.333 | 0.540 | 7.293 | 0.000 | |
Expertise | 14.019 ** | 0.423 | 3.307 | 33.164 | 0.000 | |
Discrimination | −10.434 ** | 0.353 | −3.007 | −29.575 | 0.000 | |
Illicit Conduct | −0.947 ** | 0.284 | −0.182 | −3.331 | 0.001 | |
Ambiguity | −6.725 ** | 0.292 | 1.282 | 23.041 | 0.000 | |
Model Summary | ||||||
R | R Square | Adjusted R Square | Std. Error of the Estimate | |||
0.976 | 0.952 | 0.949 | 0.7893 |
Effect | Efficacy | Method | |
---|---|---|---|
COR → CSLI | Negative | Control Corruption | Accountability |
DISC → CSLI | Negative | Equality for Human Rights | Judicial System |
ICON → CSLI | Negative | Improve Transparency | Legislative Conviction |
EXP → CSLI | Positive | Further IT Expertise | Capacity Building |
AMBG → CSLI | Negative | Clear Laws Interpretation | Justice System |
PUCO → CSLI | Positive | Strengthen Confidence | Institutional Cooperation |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2023 by the author. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Bokhari, S.A.A. A Quantitative Study on the Factors Influencing Implementation of Cybersecurity Laws and Regulations in Pakistan. Soc. Sci. 2023, 12, 629. https://doi.org/10.3390/socsci12110629
Bokhari SAA. A Quantitative Study on the Factors Influencing Implementation of Cybersecurity Laws and Regulations in Pakistan. Social Sciences. 2023; 12(11):629. https://doi.org/10.3390/socsci12110629
Chicago/Turabian StyleBokhari, Syed Asad Abbas. 2023. "A Quantitative Study on the Factors Influencing Implementation of Cybersecurity Laws and Regulations in Pakistan" Social Sciences 12, no. 11: 629. https://doi.org/10.3390/socsci12110629
APA StyleBokhari, S. A. A. (2023). A Quantitative Study on the Factors Influencing Implementation of Cybersecurity Laws and Regulations in Pakistan. Social Sciences, 12(11), 629. https://doi.org/10.3390/socsci12110629