{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,2]],"date-time":"2025-08-02T18:18:46Z","timestamp":1754158726196,"version":"3.41.2"},"reference-count":68,"publisher":"Emerald","issue":"4","license":[{"start":{"date-parts":[[2017,10,9]],"date-time":"2017-10-09T00:00:00Z","timestamp":1507507200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.emerald.com\/insight\/site-policies"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["ICS"],"published-print":{"date-parts":[[2017,10,9]]},"abstract":"<jats:sec>\n<jats:title content-type=\"abstract-subheading\">Purpose<\/jats:title>\n<jats:p>Cyberspace is a virtual environment where instantaneous communications are initiated and consumed using computer networks without any natural or artificial boundaries. These communications are not only an exchange of information but also a catharsis on the socio-political environment of the real world. This explosion of electronic expression is often detrimental to the traditional secretive maneuvers of nation states and the exercise of its power. Unable to come to terms with the new reality nation states through legislative action or otherwise attempt to assert its sovereignty in the space that has no political and societal boundaries. This may lead to an encroachment on basic human rights that often have constitutional guarantees in the real world but may be violated in the online milieu. This paper aims to investigate this issue in detail and evaluate whether nation states are using cyber-security as a propaganda tool to transgress on electronic expression.<\/jats:p>\n<\/jats:sec>\n<jats:sec>\n<jats:title content-type=\"abstract-subheading\">Design\/methodology\/approach<\/jats:title>\n<jats:p>The Website of the UN Office of the High Commissioner for Human Rights states \u201cIn December 2013, the United Nations General Assembly adopted resolution 68\/167, which expresses deep concern at the negative impact that surveillance and interception of communications may have on human rights\u201d. It further says \u201cThe General Assembly called on all States to review their procedures, practices and legislation related to communications surveillance, interception and collection of personal data and emphasized the need for States to ensure the full and effective implementation of their obligations under international human rights law\u201d. With this development, this paper seeks to unravel the role of nation states in using cybersecurity as a propaganda tool by raising the specter of threat to national security and economic wellbeing. The paper is based on exploratory research with data compilation from secondary sources. To collect data, various research papers, books and journals have been referenced and data available in public domain has been accumulated.<\/jats:p>\n<\/jats:sec>\n<jats:sec>\n<jats:title content-type=\"abstract-subheading\">Findings<\/jats:title>\n<jats:p>This paper has tried to unravel state action on cyberspace which often runs counter to the concept of civil liberties. It indicates that in terms of both national security and economic impact, cybercrime represent a very nominal threat vector. Also, cybercrime as compared with other forms of crime is again nominal. Finally, cyber laws and policies of different countries need to be more nuanced such as to allow space for civil liberties. Overall, the propaganda surrounding the malaise of cybercrime seems to be more hype than real. We already have examples of countries who have transgressed into electronic expression in cyber space. Therefore, UN has a valid reason to raise a red flag on this unfolding issue.<\/jats:p>\n<\/jats:sec>\n<jats:sec>\n<jats:title content-type=\"abstract-subheading\">Originality\/value<\/jats:title>\n<jats:p>This paper was published at 21st Americas Conference of Information Systems held at Puerto Rico, USA, between August 13-15, 2015 (AMCIS, 2015). The authors of this paper seek review by Editors of the Journal for Republication of original work. The authors have taken cognizance of the Originality Guidelines for Emerald published at this URL <jats:ext-link xmlns:xlink=\"http:\/\/www.w3.org\/1999\/xlink\" ext-link-type=\"uri\" xlink:href=\"http:\/\/www.emeraldgrouppublishing.com\/authors\/writing\/originality.htm\">www.emeraldgrouppublishing.com\/authors\/writing\/originality.htm<\/jats:ext-link><\/jats:p>\n<\/jats:sec>","DOI":"10.1108\/ics-03-2016-0024","type":"journal-article","created":{"date-parts":[[2017,8,21]],"date-time":"2017-08-21T19:14:54Z","timestamp":1503342894000},"page":"382-401","source":"Crossref","is-referenced-by-count":4,"title":["State transgression on electronic expression: is it for real?"],"prefix":"10.1108","volume":"25","author":[{"given":"Argha","family":"Ray","sequence":"first","affiliation":[]},{"given":"Anjali","family":"Kaushik","sequence":"additional","affiliation":[]}],"member":"140","reference":[{"key":"key2020120605011358400_ref001","unstructured":"ACLU (2012), \u201cNew justice department documents show huge increase in warrantless electronic surveillance\u201d, available at: www.aclu.org\/blog\/national-security-technology-and-liberty\/new-justice-department-documents-show-huge-increase"},{"article-title":"Annual report","year":"2013\/2012\/2011","author":"ACMA","key":"key2020120605011358400_ref002"},{"key":"key2020120605011358400_ref003","unstructured":"Administrative Office of US Courts (2012), \u201cWiretap report 2012\u201d, available at: www.uscourts.gov\/Statistics\/WiretapReports\/wiretap-report-2012.aspx."},{"article-title":"2008 to 2014. Annual report","year":"2014","author":"APCERT","key":"key2020120605011358400_ref004"},{"article-title":"Australian demographic statistics","year":"2014","author":"Australian Bureau of Statistics","key":"key2020120605011358400_ref005"},{"article-title":"The internet economy in the G-20: the $4.2 trillion growth opportunity","year":"2012","author":"BCG","key":"key2020120605011358400_ref006"},{"article-title":"Police crime statistics","year":"2012\/2013\/2015","author":"Bundeskriminalamt","key":"key2020120605011358400_ref007"},{"article-title":"Annual report","year":"2014","author":"CERT-in","key":"key2020120605011358400_ref008"},{"article-title":"Global drugs trade \u2018as strong as ever\u2019 as fight fails","year":"2013","author":"CNBC","key":"key2020120605011358400_ref009"},{"article-title":"Advanced persistent threats: a decade in review","year":"2011","author":"Command Five Pty Ltd","key":"key2020120605011358400_ref010"},{"issue":"2","key":"key2020120605011358400_ref011","article-title":"Against cyberterrorism, why cyber-based terrorist attacks are unlikely to occur","volume":"54","year":"2011","journal-title":"Communications of the ACM"},{"article-title":"Net losses: estimating the global cost of cybercrime","year":"2014","author":"CSIS","key":"key2020120605011358400_ref012"},{"article-title":"Good practice guide for addressing network and information security aspects of cybercrime","year":"2012","author":"Enisa","key":"key2020120605011358400_ref013"},{"year":"2013","key":"key2020120605011358400_ref014","article-title":"Federal laws relating to cybersecurity: overview and discussion of proposed revisions"},{"volume-title":"Discipline and Punish: The Birth of the Prison","year":"1977","key":"key2020120605011358400_ref015"},{"key":"key2020120605011358400_ref016","unstructured":"Global Financial Integrity (2016), \u201cIllicit financial flows\u201d, available at: www.gfintegrity.org\/issue\/illicit-financial-flows\/"},{"article-title":"Transparency report","year":"2013\/2012\/2011","author":"Google","key":"key2020120605011358400_ref017"},{"key":"key2020120605011358400_ref018","unstructured":"Google (2016), \u201cGoogle transparency report\u201d, available at: www.google.com\/transparencyreport\/"},{"key":"key2020120605011358400_ref019","unstructured":"Guardian (2001), \u201cThe Echelon spy network, Jane Perrone\u201d, available at: http:\/\/theguardian.com"},{"key":"key2020120605011358400_ref020","unstructured":"Hackmageddon.com (2014), \u201cCyber-attacks timeline\u201d, available at: http:\/\/hackmageddon.com\/"},{"key":"key2020120605011358400_ref021","first-page":"102","article-title":"How can we deter cyber terrorism?","volume-title":"Information Security Journal: A Global Perspective","year":"2012"},{"article-title":"Freedom of expression and the internet in China","year":"2009","author":"Human Rights Watch","key":"key2020120605011358400_ref022"},{"article-title":"Internet crime report","year":"2013","author":"IC3 and FBI","key":"key2020120605011358400_ref023"},{"key":"key2020120605011358400_ref024","unstructured":"International Business Times (2013), \u201cThis sentence has been rephrased. Here the comparison is between the total number of cyber-attacks on military targets and total number of cyber-attacks on educational institutes. The comparison is between the number of attacks rather than the number of targets\u201d, Ryan W Neal, available at: www.ibtimes.com\/global-cost-hacking-exaggerated-did-mcafee-inflate-data-profit-cybersecurity-expansions-1357499"},{"key":"key2020120605011358400_B24a","unstructured":"JPCERT (2014), Japan Computer Emergency Response Team Coordination Centre\u2019s Incident Handling Quarterly Report, available at: www.jpcert.or.jp\/english\/ir\/report.html"},{"key":"key2020120605011358400_ref025","unstructured":"McCullagh, D. (2004), \u201cGovernment data mining lives on\u201d, available at: http:\/\/news.com\/Government\u00b1data-mining\u00b1lives\u00b1on\/2010-1028_3-5223088.html"},{"issue":"4","key":"key2020120605011358400_ref026","article-title":"State censorship of the internet in China","volume":"48","year":"2005","journal-title":"Communications of the ACM"},{"key":"key2020120605011358400_ref027","unstructured":"May, A. Sir (2013), \u201cAnnual report of the interception of communications commissioner\u201d."},{"article-title":"Law enforcement requests report","year":"2013","author":"Microsoft","key":"key2020120605011358400_ref028"},{"volume-title":"Public Privacy Human Rights in Cyberspace","year":"2013","key":"key2020120605011358400_ref029"},{"article-title":"Ministry of home affairs, government of India, 2013, crime in India 2012","year":"2012","author":"National Crime Records Bureau NCRB","key":"key2020120605011358400_ref030"},{"article-title":"National drug control budget","year":"2014","author":"Office of National Drug Control Policy","key":"key2020120605011358400_ref031"},{"article-title":"Annual mid-year population estimates, 2013","year":"2013","author":"Office of National Statistics UK","key":"key2020120605011358400_ref032"},{"article-title":"FY 2013 congressional budget justification","year":"2013","author":"Office of the Director of National Intelligence","key":"key2020120605011358400_ref033"},{"volume-title":"Information Technology and the Criminal Justice System","year":"2004","key":"key2020120605011358400_ref034"},{"key":"key2020120605011358400_ref035","unstructured":"Reuters (2013), \u201cTrillion-dollar global hacking damages estimate called exaggerated\u201d, Joseph Menn, available at: www.reuters.com\/article\/us-hacking-estimate-idUSBRE96L0M920130722"},{"key":"key2020120605011358400_ref036","unstructured":"Sacco, L.N. (2014), \u201cDrug enforcement in the United States: history, policy, and trends\u201d, Congressional Research Service: Prepared for Members and Committees of Congress. 7-5700, available at: www.crs.gov."},{"key":"key2020120605011358400_ref037","unstructured":"Scotsman (2011), \u201cScottish police monitor networking sites\u201d, available at: www.scotsman.com\/news\/scottish_police_monitor_networking_sites_1_1794988"},{"key":"key2020120605011358400_ref038","unstructured":"SFLC (2014), India\u2019s Surveillance State, Internet Governance Forum."},{"key":"key2020120605011358400_ref039","unstructured":"Shiffman, J. and Cooke, K. (2013), \u201cExclusive: US directs agents to cover up program used to investigate Americans\u201d, Reuters, available at: www.reuters.com\/article\/2013\/08\/05\/us-dea-sod-idUSBRE97409R20130805."},{"issue":"3","key":"key2020120605011358400_ref040","article-title":"The threat of terrorist organizations in cyberspace","volume":"5","year":"2013","journal-title":"Military and Strategic Affairs"},{"volume-title":"The Cyber Terror Bogeyman","year":"2012","key":"key2020120605011358400_ref041"},{"issue":"3","key":"key2020120605011358400_ref042","first-page":"39","article-title":"Human rights and hacktivism: the cases of wikileaks and anonymous","volume":"7","year":"2015","journal-title":"Journal of Human Rights Practice"},{"key":"key2020120605011358400_ref043","unstructured":"Stanford News Service (2015), \u201cStanford cybersecurity expert analyzes anonymous\u2019 hacking attacks on ISIS\u201d, available at: http:\/\/news.stanford.edu\/2015\/11\/18\/lin-anonymous-isis-111815\/"},{"volume-title":"The End of Privacy","year":"1999","key":"key2020120605011358400_ref044"},{"article-title":"W32.Duqu: the precursor to the next Stuxnet. Version 1.4","year":"2011","author":"Symantec","key":"key2020120605011358400_ref045"},{"key":"key2020120605011358400_ref046","unstructured":"Symantec (2013), Norton Report."},{"volume-title":"The People\u2019s Platform","year":"2014","key":"key2020120605011358400_ref047"},{"key":"key2020120605011358400_ref048","unstructured":"United Nations Statistics Division (2014), \u201cUNSD demographic statistics\u201d, http:\/\/data.un.org\/Data.aspx?d=POP&f=tableCode%3a1"},{"article-title":"World population prospects: the 2015 revision, DVD edition","year":"2015","author":"United Nations Population Division","key":"key2020120605011358400_ref049"},{"article-title":"Estimating illicit financial flows resulting from drug trafficking and other transnational organized crimes","year":"2011","author":"UNODC","key":"key2020120605011358400_ref050"},{"article-title":"The transatlantic cocaine market","year":"2011","author":"UNODC","key":"key2020120605011358400_ref051"},{"key":"key2020120605011358400_ref052","unstructured":"UNODC (2013a), \u201cComprehensive study on cybercrime\u201d, available at: www.unodc.org."},{"key":"key2020120605011358400_ref053","unstructured":"UNODC (2013b), \u201cCrime and criminal justice statistics\u201d, available at: www.unodc.org\/unodc\/data-and-analysis\/statistics\/crime.html."},{"article-title":"Population estimates","year":"2013","author":"US Census Bureau","key":"key2020120605011358400_ref054"},{"article-title":"2010, Report on the use of pen registers and trap and trace devices by the law enforcement agencies\/offices of the department of justice","year":"2011","author":"US Department of Justice USDOJ","key":"key2020120605011358400_ref055"},{"article-title":"National strategy, roles, and responsibilities need to be better defined and more effectively implemented","year":"2013","author":"US Government Accountability Office","key":"key2020120605011358400_ref056"},{"volume-title":"Privacy in Cyberspace: Personal Information, Free Speech, and the Internet, Privacy and Loyalty","year":"1997","key":"key2020120605011358400_ref057"},{"year":"1997","key":"key2020120605011358400_ref058","article-title":"Mrs. McIntyre in cyberspace: some thoughts on anonymity"},{"key":"key2020120605011358400_ref059","unstructured":"Washington Post (2012), \u201cUS, Israel developed flame computer virus to slow Iranian nuclear efforts\u201d, available at: www.washingtonpost.com\/world\/national-security\/us-israel-developed-computer-virus-to-slow-iranian-nuclear-efforts-officials-say\/2012\/06\/19\/gJQA6xBPoV_story.html"},{"article-title":"The Black budget: how intelligence agencies spend $52 billion","year":"2013","author":"Washington Post","key":"key2020120605011358400_ref060"},{"key":"key2020120605011358400_ref061","unstructured":"Webcertain (2013), \u201cThe webcertain global search & social report 2013\u201d."},{"year":"2013","key":"key2020120605011358400_ref062","article-title":"An analysis of service provider transparency reports on government requests for data"},{"key":"key2020120605011358400_ref063","unstructured":"World Bank (2013), \u201cInternet users per 100 people\u201d, available at: http:\/\/data.worldbank.org\/indicator\/IT.NET.USER.P2?end=2013&name_desc=false&start=2009"},{"volume-title":"Cybercrime and Society","year":"2006","key":"key2020120605011358400_ref064"},{"key":"key2020120605011358400_ref065","unstructured":"CERT-br (2014), \u201cEstat\u00edsticas dos incidentes reportados ao CERT.br\u201d, available at: www.cert.br\/stats\/incidentes\/#2013"},{"article-title":"Federal agencies need to enhance responses to data breaches","year":"2014","author":"US Government Accountability Office","key":"key2020120605011358400_ref066"},{"article-title":"Law enforcement disclosure report: legal annexe","year":"2014","author":"Vodafone","key":"key2020120605011358400_ref067"}],"container-title":["Information &amp; Computer Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/ICS-03-2016-0024\/full\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/ICS-03-2016-0024\/full\/html","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,25]],"date-time":"2025-07-25T01:22:44Z","timestamp":1753406564000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.emerald.com\/ics\/article\/25\/4\/382-401\/201145"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,10,9]]},"references-count":68,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2017,10,9]]}},"alternative-id":["10.1108\/ICS-03-2016-0024"],"URL":"https:\/\/doi.org\/10.1108\/ics-03-2016-0024","relation":{},"ISSN":["2056-4961"],"issn-type":[{"type":"print","value":"2056-4961"}],"subject":[],"published":{"date-parts":[[2017,10,9]]}}}