Books and journals Case studies Expert Briefings Open Access
Advanced search

State transgression on electronic expression: is it for real?

Argha Ray (College of Business, Iowa State University, Ames, Iowa, USA)
Anjali Kaushik (Department of Information Systems, Management Development Institute, Gurgaon, India)

Information and Computer Security

ISSN: 2056-4961

Publication date: 9 October 2017

Abstract

Purpose

Cyberspace is a virtual environment where instantaneous communications are initiated and consumed using computer networks without any natural or artificial boundaries. These communications are not only an exchange of information but also a catharsis on the socio-political environment of the real world. This explosion of electronic expression is often detrimental to the traditional secretive maneuvers of nation states and the exercise of its power. Unable to come to terms with the new reality nation states through legislative action or otherwise attempt to assert its sovereignty in the space that has no political and societal boundaries. This may lead to an encroachment on basic human rights that often have constitutional guarantees in the real world but may be violated in the online milieu. This paper aims to investigate this issue in detail and evaluate whether nation states are using cyber-security as a propaganda tool to transgress on electronic expression.

Design/methodology/approach

The Website of the UN Office of the High Commissioner for Human Rights states “In December 2013, the United Nations General Assembly adopted resolution 68/167, which expresses deep concern at the negative impact that surveillance and interception of communications may have on human rights”. It further says “The General Assembly called on all States to review their procedures, practices and legislation related to communications surveillance, interception and collection of personal data and emphasized the need for States to ensure the full and effective implementation of their obligations under international human rights law”. With this development, this paper seeks to unravel the role of nation states in using cybersecurity as a propaganda tool by raising the specter of threat to national security and economic wellbeing. The paper is based on exploratory research with data compilation from secondary sources. To collect data, various research papers, books and journals have been referenced and data available in public domain has been accumulated.

Findings

This paper has tried to unravel state action on cyberspace which often runs counter to the concept of civil liberties. It indicates that in terms of both national security and economic impact, cybercrime represent a very nominal threat vector. Also, cybercrime as compared with other forms of crime is again nominal. Finally, cyber laws and policies of different countries need to be more nuanced such as to allow space for civil liberties. Overall, the propaganda surrounding the malaise of cybercrime seems to be more hype than real. We already have examples of countries who have transgressed into electronic expression in cyber space. Therefore, UN has a valid reason to raise a red flag on this unfolding issue.

Originality/value

This paper was published at 21st Americas Conference of Information Systems held at Puerto Rico, USA, between August 13-15, 2015 (AMCIS, 2015). The authors of this paper seek review by Editors of the Journal for Republication of original work. The authors have taken cognizance of the Originality Guidelines for Emerald published at this URL www.emeraldgrouppublishing.com/authors/writing/originality.htm

Keywords

  • Privacy
  • Surveillance
  • Censorship
  • Cyber security
  • Civil liberties

Acknowledgements

The authors thank the Editor Professor Steven M. Furnell and two anonymous reviewers for their useful comments that greatly improved the paper. The first author also thanks Dr Joey F. George and Aparajita Guha for their immense support during the course of writing this paper.

Citation

Ray, A. and Kaushik, A. (2017), "State transgression on electronic expression: is it for real?", Information and Computer Security, Vol. 25 No. 4, pp. 382-401. https://doi.org/10.1108/ICS-03-2016-0024

Download as .RIS

Publisher

:

Emerald Publishing Limited

Copyright © 2017, Emerald Publishing Limited

Please note you do not have access to teaching notes

You may be able to access teaching notes by logging in via Shibboleth, Open Athens or with your Emerald account.
Login
If you think you should have access to this content, click the button to contact our support team.
Contact us

To read the full version of this content please select one of the options below

You may be able to access this content by logging in via Shibboleth, Open Athens or with your Emerald account.
Login
To rent this content from Deepdyve, please click the button.
Rent from Deepdyve
If you think you should have access to this content, click the button to contact our support team.
Contact us
Emerald Publishing
  • Opens in new window
  • Opens in new window
  • Opens in new window
  • Opens in new window
© 2021 Emerald Publishing Limited

Services

  • Authors Opens in new window
  • Editors Opens in new window
  • Librarians Opens in new window
  • Researchers Opens in new window
  • Reviewers Opens in new window

About

  • About Emerald Opens in new window
  • Working for Emerald Opens in new window
  • Contact us Opens in new window
  • Publication sitemap

Policies and information

  • Privacy notice
  • Site policies
  • Modern Slavery Act Opens in new window
  • Chair of Trustees governance statement Opens in new window
  • COVID-19 policy Opens in new window
Manage cookies

We’re listening — tell us what you think

  • Something didn’t work…

    Report bugs here

  • All feedback is valuable

    Please share your general feedback

  • Member of Emerald Engage?

    You can join in the discussion by joining the community or logging in here.
    You can also find out more about Emerald Engage.

Join us on our journey

  • Platform update page

    Visit emeraldpublishing.com/platformupdate to discover the latest news and updates

  • Questions & More Information

    Answers to the most commonly asked questions here