Cyber legislation for virtual crimes in the digital media environment: proposed draft law on cybersecurity in media organizations

Document Type : Original Article

Author

south valley university - faculty of mass communication

Abstract

The study aimed to discover cyber threats to journalistic and media institutions, and ways to prevent them, while monitoring and analyzing cyber activities over the Internet to detect and prevent attacks and identify potential vulnerabilities in networks, and the importance of educating media professionals about cyber security threats and the best practices that should be followed to prevent such cyber attacks by applying the questionnaire tool to (72) managers of information technology centers in journalistic and media institutions, in addition to conducting an in-depth interview with (18) experts from media, computer, information and law professors, and specialists in the field of cyber security, to gain a better understanding of the current status of cyber threats. The results of the study reached the role of cyber security in protecting intellectual property and protecting assets from theft and piracy, as intellectual property, such as original content and exclusive news, is considered one of the most important assets of media institutions, in addition to compliance with laws and regulations, as media institutions are subject to many laws and regulations related to data protection and privacy. Cyber ​​security also helps ensure compliance with these laws and avoid legal penalties and also increases security awareness, in addition to the need for security analysts to acquire cyber insight into sites. Media, meaning that he has insight into cyber threats, cybersecurity attacks, and cyber risks such as vulnerabilities, exploitation, security incidents, data breaches, and cybercrimes, especially cybersecurity threats in social media, social engineering attacks, and the lack of a social media policy. In conclusion, the researcher was able to present a draft of cyber legislation that regulates how to combat virtual crimes in the digital media environment.

Keywords

Main Subjects


Guerrero, V. L. (2024). Cyber Threats, Cyber Risks, and Cybersecurity Responses: Modeling Whole-Of-Nation Strategy Implementation for American Organizations and Citizens (Doctoral dissertation, Clemson University).‏
[1](Ebot, A. (2024). Technology Acceptance Model for Adopting Cybersecurity Technology in Small and Medium Business/Enterprise: A Generic Qualitative Study (Doctoral dissertation, Capella University).‏
[1](Gualtier, K. A. (2015). Information operations under international law: A Delphi study into the legal standing of cyber warfare (Doctoral dissertation, Walden University).‏
[1]) Moore, M. C. (2014). Development and implementation of government cybersecurity policies and practices for national security and cybercrime (Doctoral dissertation, Walden University).‏
[1](Griffiths, J. L. (2016). Cyber security as an emerging challenge to South African national security (Master's thesis, University of Pretoria (South Africa)).‏
[1]) Miranda, R. M. D. F. C. (2016). Cyber Warfare in the Context of International Criminal Law (Master's thesis, Universidade Catolica Portuguesa (Portugal)).‏
[1]) Sithole, T. (2024). Impact of Brics cybersecurity regulation on the South African cybersecurity legal landscape (Master's thesis, University of Johannesburg (South Africa)).‏
[1]) Shawe, R. (2024). Exploring the Global Impact of Domestic Cyberterrorism on Cybersecurity (Doctoral dissertation, Capitol Technology University).‏pp 25-26.
[1]) Smith, A. M. (2024). Federal Organizations Mitigation of Cybersecurity Risks Due to Employees' Use of Social Media During Work Hours: A Systematic Review (Doctoral dissertation, University of Maryland University College).‏
[1](Parra, W. (2022). Deterring Ransomware Through Cyber Legislation (Master's thesis, Utica University).‏
[1]) Chundu, B., Masamha, T., & Sifile, O. (2025). Cyber-security governance framework pillars for Zimbabwean local authorities. Cogent Social Sciences11(1), 2453094.‏
[1]) Clanton, E. L. (2024). Least Developed Countries’ Digital Access: A Survey of Sustainable Development Goal 9 and Cyber Diplomacy (Doctoral dissertation, Marymount University).‏
[1](Ifeanyi-Ajufo, N. (2023). Cyber governance in Africa: at the crossroads of politics, sovereignty and cooperation. Policy Design and Practice, 6(2), 146–159. https://doi.org/10.1080/25741292.2023.2199960.
[1]) Barber, I. A., & Kumar, S. (2023). Learning from the ground up: lessons from civil society engagement in addressing the human rights implications of cybercrime legislation. Journal of Cyber Policy, 1–18. https://doi.org/10.1080/23738871.2023.2240331
[1](Yan, Z. (2022). The Dual Foundation of Cybersecurity Legislation. Social Sciences in China, 43(3), 4-20.‏
[1](Broeders, D., De Busser, E., Cristiano, F., & Tropina, T. (2022). Revisiting past cyber operations in light of new cyber norms and interpretations of international law: inching towards lines in the sand?. Journal of Cyber Policy7(1), 97-135.‏
[1](Mačák, K. (2021). Unblurring the lines: military cyber operations and international law. Journal of Cyber Policy6(3), 411-428.‏
[1](Akoto, W. (2022). Accountability and cyber conflict: examining institutional constraints on the use of cyber proxies. Conflict Management and Peace Science, 39(3), 311-332.‏
[1]) Ebert, H. (2020). Hacked IT superpower: how India secures its cyberspace as a rising digital democracy. India Review, 19(4), 376–413. https://doi.org/10.1080/14736489.2020.1797317
[1]) Adams, J. (2020). Legal Boundaries of The Cyberspace: Privacy of E-Commerce Transactions in The International Law (Doctoral dissertation, University of Essex).‏
[1]) Dunn Cavelty, M. (2018). Europe's cyber-power. European politics and society, 19(3), 304-320.‏
[1]) Shawe, R. (2024). Exploring the Global Impact of Domestic Cyberterrorism on Cybersecurity (Doctoral dissertation, Capitol Technology University).‏
-Qadri, Nour El-Hoda. (2023) aljarimat alsiybiraniat waliat mukafahatiha-muajahat tahadiyat al'amn alsiybirani. almajalat aljazayiriat lilhuquq waleulum alsiyasiat 8(1), 321-337..
[1]) Abbas, Z., Khan, R., Khan, M. Z., & Imran, M. (2023). Cyber Laws and Media Censorship in Pakistan: An Investigation of Governmental Tactics to Curtail Freedom of Expression and Right to Privacy. Journal of Creative Communications, 09732586231206913.‏
[1]) Barber, I. A., & Kumar, S. (2023). Learning from the ground up: lessons from civil society engagement in addressing the human rights implications of cybercrime legislation. Journal of Cyber Policy, 1-18.‏
[1]) Masduki. (2022). Cyber-troops, digital attacks, and media freedom in Indonesia. Asian Journal of Communication32(3), 218-233.‏
-Zenati, Mohamed. (2022). 'athar aljarayim alsubraniat ealaa alhuriyaat alfardia (aljazayir namudhaja). almajalat alafriqiat lildirasat alqanuniat walsiyasiati, 6(1), 43-62.
[1](Shandler, R., Gross, M. L., & Canetti, D. (2021). A fragile public preference for cyber strikes: Evidence from survey experiments in the United States, United Kingdom, and Israel. Contemporary Security Policy42(2), 135-162.‏
[1](McCurdy, M. (2020). The evolution and legislative response to Nigerian cybercrime (Master's thesis, Utica College).‏
[1]) Masood, U. H. B. (2017). Countering Cyber Attacks in Malaysian Law: Assessing the Concept of Cyber Attacks and the Countermeasures (Doctoral dissertation, University of Leeds).‏
[1]) Barclay, C. (2017). Cybercrime and legislation: a critical reflection on the Cybercrimes Act, 2015 of Jamaica. Commonwealth Law Bulletin, 43(1), 77-107.‏
[1]) White, J. K. (2017). Impact of protection motivation theory and general deterrence theory on the behavioral intention to implement and misuse active cyber defense (Order No. 10622990). Available from ProQuest Dissertations & Theses Global. (1957432791). Retrieved from https://www.proquest.com/dissertations-theses/impact-protection-motivation-theory-general/docview/1957432791/se-2
[1](ing Li, Li Xu, Wu He (2022) he effects of antecedents and mediating factors on cybersecurity protection behavior,Computers in Human Behavior Reports, Volume 5, https://doi.org/10.1016/j.chbr.2021.100165.
[1]) Towbin, R. S. (2019). A protection motivation theory approach to healthcare cybersecurity: A multiple case study (Order No. 13809084). Available from ProQuest Dissertations & Theses Global; Publicly Available Content Database. (2207492982). Retrieved from https://www.proquest.com/dissertations-theses/protection-motivation-theory-approach-healthcare/docview/2207492982/se-2
[1](Sulaiman, N. S., Fauzi, M. A., Hussain, S., & Wider, W. (2022). Cybersecurity Behavior among Government Employees: The Role of Protection Motivation Theory and Responsibility in Mitigating Cyberattacks. Information, 13(9), 413. https://doi.org/10.3390/info13090413
[1]) Shawe, R. (2024) op. cit, p15.
[1]) Sithole, T. (2024). Impact of Brics cybersecurity regulation on the South African cybersecurity legal landscape (Master's thesis, University of Johannesburg (South Africa)).‏
[1]) MacInnes, J., (2020). Exploratory Data Analysis, In P. Atkinson, S. Delamont, A. Cernat, J.W. Sakshaug, & R.A. Williams (Eds.), SAGE Research Methods Foundations. https://doi.org/10.4135/9781526421036889602
[1](Atatsi, E. K. (2024). Exploring the use of internships to build practical experience for emerging cybersecurity professionals in order to meet industry work experience requirements (Order No. 31146741). Available from ProQuest Dissertations & Theses Global. (3037345737). Retrieved from https://www.proquest.com/dissertations-theses/exploring-use-internships-build-practical/docview/3037345737/se-2