References
- Ali, Y. F. (2015, June 05). Pakistan's National Security Council. Pakistan Today. https://www.pakistantoday.com.pk/2015/08 /10/pakistans-national-security-council/
- Aziz, F. (2018). Pakistan's CyberCrime Law: boon or bane? Heinrich Boll Stifung. https://www.boell.de/en/2018/02/07/pakist ans-cybercrime-law-boon-or-bane
- Baloch, S. (2016, December 31). Cyber Security is a matter of National Security. Dawn. https://www.dawn.com/news/1229738/cyb er
- Bolobhi. (2015). The Cybercrime bill and call- to-action. BoloBhi. https://www.dawn.com/news/1229738/cyb er
- Braun, M. A. (2005). Civil-Military Cooperation as vital part in the stabilization-process in Afghanistan. MA Dissertation, University of Postdam.1-27. https://www.grin.com/document/116894
- Bischoff, P. (2020). Which countries have the worst (and best) cybersecurity? Comperitect. https://www.comparitech.com/blog/vpn- privacy/cybersecurity-by-country/
- Church, R. L., Scapparra, M. P., & Middleton R. S. (2003). Identifying the Critical Infrastructure: The Median and Covering Facility Interdiction Problems. Annals of Association of American Geographers, 94(3), 491-502. https://www.tandfonline.com/doi/abs/10.11 11/j.1467-8306.2004.00410.x
- National Center for Cyber Crime. (2016). Prevention of National Cybercrime Act 2016. Pakistan National Response Center for CyberCrime (NR3C). http://www.nr3c.gov.pk/cas.html
- Firdous, A. (2018). Cyber Security Issues in Pakistan. Center for International Strategic Studies https://ciss.org.pk/cyber- security-issues-in-pakistan/
- Fravel, M. T. (2015). China's New Military Strategy: https://jamestown.org/program/chinas- new-military-strategy-winning- informationized-local-wars/
- General Data Protection Rule. (2016). Article 7. Conditions for Consent. https://gdpr- info.eu/art-7-gdpr/
- What is Cybersecurity? (2020). June 15, 2020 https://www.itgovernance.co.uk/what-is- cybersecurity
- Greenwald, G., & MacAskill, E. (2013, June 11). Boundless Informant: the NSA's secret tool to track global surveillance data. The Guardian. https://www.theguardian.com/world/2013/ jun/08/nsa-boundless-informant-global- datamining
- Grigovrov, G. (2017). Emergence and development of civil-military cooperation. De Gruyer Open: International Conference Knowledge-based Organisation, XXIII(1), 119-123. = https://content.sciendo.com/view/journals /kbo/23/1/article- p119.xml?language=en
- Hassan, R. T. (2019, May 16). Cyber Security threats: policy gaps, challenges and way forward. Daily Times. https://dailytimes.com.pk/352011/cybersec urity-threats-policy-gaps-challenges-and- way-forward/
- Heinl, C. H. (2015). Enabling Better Multinational and International Military Cooperation for Cyber-Related matters across Asia and Europe. Center of Excellence for National Security (CENS), S. Rajaratnam School of International Studies (RSIS), Nanyang Technological Studies (NTU). https://www.files.ethz.ch/isn/189457/PR150 307_Military-Cooperation.pdf
- Huntington, S. P. (1957). The Soldier and the state: the theory of politics of Civil- Military relations. Cambridge: Belknape Press of Harvard University Press. https://books.google.com.pk/books?id=1Pq Fe0rsfdcC
- Hussain, F., & Bukhari, G., (2014). Communication surveillance in Digital Age. Global Information Social Watch. https://www.giswatch.org/en/country- report/communications- surveillance/pakistan
- Ministry of Electronics and Information Technology. (2013). National Cyber Security Policy, 2013. Indian Ministry of Electronics and Information Technology. https://www.itu.int/en/ITUD/Cybersecurity /Documents/National_Strategies_Reposit ory/India_2013_National_cyber_security _policy-2013(1).pdf
- Privacy International. (2015). Tipping the scales: Security and Surveillance in Pakistan. Privacy International. https://privacyinternational.org/sites/defa ult/files/2018- 02/PAKISTAN REPORT HIGH RE S 20150721_0.pdf
- Jabri, P. (2018, February 18). Pakistan to develop e-governance council for policy formulation. Business Recorder. http://www.brecorder.com/2018/02/13/3989 14/pakistan-to-develop-e-governance- council-for-policy-formulation/
- Janjua, R. W. (2010). Civil Military Relations: the impact of internal and external factors shaping the balance in civil military relations. Islamabad: NDU Journal.
- Kemp, S. (2020, February 18). Digital 2020: Pakistan [PowerPoint Slides]. Datareportal. https://datareportal.com/reports/digital- 2020-pakistan
- Khalil, B. (2020, February 14). Emerging Warfare threats to Pakistan. Modern Diplomacy. https://moderndiplomacy.eu/2020/02/14/e merging-cyber-warfare-threats-to- pakistan/
- Boeke, S., Veenendaal, M., & Heinl, C. (2015). Civil Military Relations and International military Cooperation in CyberSecurity: Common Challenges and State Practices Across Asia and Europe. In M.Maybaum, A.M. Osula, L.Lindstorm (Eds.), 7th International Conference on Cyber Conflict: architecture in cyberspace. Tallinn (pp.69-80).NATO CCD COE Publication. https://www.ccdcoe.org/uploads/2018/10/C yCon_2015_book.pdf
- NATO STANDARD AJP-3.19 Allied Joint Operation for Civil Military Cooperation Addition A Version 1 (2018) https://assets.publishing.service.gov.uk/go vernment/uploads/system/uploads/attach ment_data/file/757080/20181112- dcdc_doctrine_nato_cimic_ajp_3_19.pdf
- NATO/OTAN. (2020). Cyber defense. NATO/OTAN. https://www.nato.int/cps/en/natohq/publi cations.htm
- NATO/OTAN (2020). A Comprehensive approach to Crisis. NATO/OTAN. https://www.nato.int/cps/en/ natolive/topics_51633.htm
- NATO/OTAN (2020). Science for Peace. NATO/ OTAN.
- National Internal Security Policy 2014-2018 (2014). Pakistan Ministry of Interior.: https://nacta.gov.pk/wp- content/uploads/2017/08/National- Internal-Security-Policy-2014.pdf
- Pernik, P., & Emmet, T. (2014). Interagency Cooperation on Cyber security: The Estonian Model. International Center for Defense Studies.
- Qadeer, M. A. (2020, June 06). The Cyber Threat facing Pakistan. The Diplomat. https://thediplomat.com/2020/06/the- cyber-threat-facing-pakistan/
- Rafiq, A. (2019). Challenges of Securitizing Cyberspace in Pakistan. Institute of Strategic Studies Islamabad. 6(1), 90-101. http://issi.org.pk/challenges-of- securitising-cyberspace-in-pakistan/
- Rajoka, K. U. (2020, June 16). Where does Pakistan stand? Business Recorder. https://www.brecorder.com/new s/1004662/where-does-pakistan-stand
- Raska, M., & Ang, B. (2018). Cyber Security in South Asia. DGRIS, Asia Center. https://centreasia.eu/wp- content/uploads/2018/12/NotePreÃŒÂs entation-AngRaska- Cybersecurity_180518.pdf
- Salmaan, L. (2018). Integrating Cyber Security and Critical infrastructure: National, Regional and International approaches. Stockholm International Peace Research Institute. https://www.sipri.org/sites/default/files/2 018-04/integrating_cybersecurity.pdf
- Sarbannes-Oxley Act of 2002 (2010). https://pcaobus.org/About/History/Docum ents/PDFs/Sarbanes_Oxley_Act_of_2002. pdf
- Syed, R., Khaver, A. A., & Yasin, M. (2019). Cyber Security: Where does Pakistan Stand? SDPI Working Paper, 167. https://think- asia.org/bitstream/handle/11540/9714/Cybe r-security-where-does-pakistan- stand(W-167).pdf?sequence=1
- National Center for Cyber Security (2020). Research Areas. May 29, 2020 http://www.nccs.pk/collaborations/researc h-area
- Pakistan is facing issue of cyberattack (2015). CustomToday. https://customstoday.com.pk/pakistan-is- facing-issue-of-cyber- attack/?__cf_chl_jschl_tk__=75446c822a cb4668d36c4cc9431b9764ba40d6e2- 1593003456-0 AQdrSVdWfqGWM6sEEk40EqK1A_a420v DLBk0WCIf79jUPV5Aa1eJJCpICjZtulscu56c VcEvMd_a7PZn_U4thB9eAurc1EKmrQbm 7QORSWTkL4rErEt7Szetoe1pAzsVgNh2Y MyFaC3I74SE2FcbEqOe2iQfNUdupGDWp Fk6CS- bjStpErRkbDTOH96eD1OJFhWTBEiSqbsS hf5jpg1imdk83_HJIGoP3d0H0TeYw8-JBv- S_kKqhrP8ubrF1cO7FPY2Yj51lumE5iTmgI4 8kqk53sMUmZ7dTdIKgXATBuS0qmRi0eL 0Toe28k1_vPRvSlfxobdRPQpxipC8OAXQC
- International Telecommunication Union (2018). Global Cybersecurity Index 2018. ITU Publication https://www.itu.int/en/ITU- D/Cybersecurity/Pages/global- cybersecurity-index.aspx
- International Telecommunication Union (2020). Definition of Cybersecurity. ITU. https://www.itu.int/en/ITU- T/studygroups/com17/Pages/cybersecurity .aspx
- UN Open ended Working Group (2019). Bridging the Cyber Norms debate with evidence. Cape Town: Research ICT Africa. https://www.un.org/disarmament/wp- content/uploads/2019/12/Discussion- Paper-OEWG-Intersessional-Meeting.pdf
- Vombetkere, S. G. (2018, April 06). Cyber Security: Civil and Military Implications. Indian Defence 33. http://www.indiandefencereview.com/n ews/cyber-security-civil-and-military- implications/
- Work, J. D. Janensen, B. (2018, September 04). Cyber Civil-Military Relations: Balancing interests on the digital fronties. War on Rocks. https://warontherocks.com/2018/09/cyber- civil-military-relations-balancing- interests-on-the-digital-frontier/
- Yamin, T. (2014). Information CBMs between Pakistan and India in Cyberspace. Islamabad: NUST Publishing.
- Yamin, T. (2018). Cyberspace Management in Pakistan. Governance and Management Review (GMR)3(1),46-61. http://pu.edu.pk/images/journal/IAS/PDF/4 -v3_1_18.pdf
- Ali, Y. F. (2015, June 05). Pakistan's National Security Council. Pakistan Today. https://www.pakistantoday.com.pk/2015/08 /10/pakistans-national-security-council/
- Aziz, F. (2018). Pakistan's CyberCrime Law: boon or bane? Heinrich Boll Stifung. https://www.boell.de/en/2018/02/07/pakist ans-cybercrime-law-boon-or-bane
- Baloch, S. (2016, December 31). Cyber Security is a matter of National Security. Dawn. https://www.dawn.com/news/1229738/cyb er
- Bolobhi. (2015). The Cybercrime bill and call- to-action. BoloBhi. https://www.dawn.com/news/1229738/cyb er
- Braun, M. A. (2005). Civil-Military Cooperation as vital part in the stabilization-process in Afghanistan. MA Dissertation, University of Postdam.1-27. https://www.grin.com/document/116894
- Bischoff, P. (2020). Which countries have the worst (and best) cybersecurity? Comperitect. https://www.comparitech.com/blog/vpn- privacy/cybersecurity-by-country/
- Church, R. L., Scapparra, M. P., & Middleton R. S. (2003). Identifying the Critical Infrastructure: The Median and Covering Facility Interdiction Problems. Annals of Association of American Geographers, 94(3), 491-502. https://www.tandfonline.com/doi/abs/10.11 11/j.1467-8306.2004.00410.x
- National Center for Cyber Crime. (2016). Prevention of National Cybercrime Act 2016. Pakistan National Response Center for CyberCrime (NR3C). http://www.nr3c.gov.pk/cas.html
- Firdous, A. (2018). Cyber Security Issues in Pakistan. Center for International Strategic Studies https://ciss.org.pk/cyber- security-issues-in-pakistan/
- Fravel, M. T. (2015). China's New Military Strategy: https://jamestown.org/program/chinas- new-military-strategy-winning- informationized-local-wars/
- General Data Protection Rule. (2016). Article 7. Conditions for Consent. https://gdpr- info.eu/art-7-gdpr/
- What is Cybersecurity? (2020). June 15, 2020 https://www.itgovernance.co.uk/what-is- cybersecurity
- Greenwald, G., & MacAskill, E. (2013, June 11). Boundless Informant: the NSA's secret tool to track global surveillance data. The Guardian. https://www.theguardian.com/world/2013/ jun/08/nsa-boundless-informant-global- datamining
- Grigovrov, G. (2017). Emergence and development of civil-military cooperation. De Gruyer Open: International Conference Knowledge-based Organisation, XXIII(1), 119-123. = https://content.sciendo.com/view/journals /kbo/23/1/article- p119.xml?language=en
- Hassan, R. T. (2019, May 16). Cyber Security threats: policy gaps, challenges and way forward. Daily Times. https://dailytimes.com.pk/352011/cybersec urity-threats-policy-gaps-challenges-and- way-forward/
- Heinl, C. H. (2015). Enabling Better Multinational and International Military Cooperation for Cyber-Related matters across Asia and Europe. Center of Excellence for National Security (CENS), S. Rajaratnam School of International Studies (RSIS), Nanyang Technological Studies (NTU). https://www.files.ethz.ch/isn/189457/PR150 307_Military-Cooperation.pdf
- Huntington, S. P. (1957). The Soldier and the state: the theory of politics of Civil- Military relations. Cambridge: Belknape Press of Harvard University Press. https://books.google.com.pk/books?id=1Pq Fe0rsfdcC
- Hussain, F., & Bukhari, G., (2014). Communication surveillance in Digital Age. Global Information Social Watch. https://www.giswatch.org/en/country- report/communications- surveillance/pakistan
- Ministry of Electronics and Information Technology. (2013). National Cyber Security Policy, 2013. Indian Ministry of Electronics and Information Technology. https://www.itu.int/en/ITUD/Cybersecurity /Documents/National_Strategies_Reposit ory/India_2013_National_cyber_security _policy-2013(1).pdf
- Privacy International. (2015). Tipping the scales: Security and Surveillance in Pakistan. Privacy International. https://privacyinternational.org/sites/defa ult/files/2018- 02/PAKISTAN REPORT HIGH RE S 20150721_0.pdf
- Jabri, P. (2018, February 18). Pakistan to develop e-governance council for policy formulation. Business Recorder. http://www.brecorder.com/2018/02/13/3989 14/pakistan-to-develop-e-governance- council-for-policy-formulation/
- Janjua, R. W. (2010). Civil Military Relations: the impact of internal and external factors shaping the balance in civil military relations. Islamabad: NDU Journal.
- Kemp, S. (2020, February 18). Digital 2020: Pakistan [PowerPoint Slides]. Datareportal. https://datareportal.com/reports/digital- 2020-pakistan
- Khalil, B. (2020, February 14). Emerging Warfare threats to Pakistan. Modern Diplomacy. https://moderndiplomacy.eu/2020/02/14/e merging-cyber-warfare-threats-to- pakistan/
- Boeke, S., Veenendaal, M., & Heinl, C. (2015). Civil Military Relations and International military Cooperation in CyberSecurity: Common Challenges and State Practices Across Asia and Europe. In M.Maybaum, A.M. Osula, L.Lindstorm (Eds.), 7th International Conference on Cyber Conflict: architecture in cyberspace. Tallinn (pp.69-80).NATO CCD COE Publication. https://www.ccdcoe.org/uploads/2018/10/C yCon_2015_book.pdf
- NATO STANDARD AJP-3.19 Allied Joint Operation for Civil Military Cooperation Addition A Version 1 (2018) https://assets.publishing.service.gov.uk/go vernment/uploads/system/uploads/attach ment_data/file/757080/20181112- dcdc_doctrine_nato_cimic_ajp_3_19.pdf
- NATO/OTAN. (2020). Cyber defense. NATO/OTAN. https://www.nato.int/cps/en/natohq/publi cations.htm
- NATO/OTAN (2020). A Comprehensive approach to Crisis. NATO/OTAN. https://www.nato.int/cps/en/ natolive/topics_51633.htm
- NATO/OTAN (2020). Science for Peace. NATO/ OTAN.
- National Internal Security Policy 2014-2018 (2014). Pakistan Ministry of Interior.: https://nacta.gov.pk/wp- content/uploads/2017/08/National- Internal-Security-Policy-2014.pdf
- Pernik, P., & Emmet, T. (2014). Interagency Cooperation on Cyber security: The Estonian Model. International Center for Defense Studies.
- Qadeer, M. A. (2020, June 06). The Cyber Threat facing Pakistan. The Diplomat. https://thediplomat.com/2020/06/the- cyber-threat-facing-pakistan/
- Rafiq, A. (2019). Challenges of Securitizing Cyberspace in Pakistan. Institute of Strategic Studies Islamabad. 6(1), 90-101. http://issi.org.pk/challenges-of- securitising-cyberspace-in-pakistan/
- Rajoka, K. U. (2020, June 16). Where does Pakistan stand? Business Recorder. https://www.brecorder.com/new s/1004662/where-does-pakistan-stand
- Raska, M., & Ang, B. (2018). Cyber Security in South Asia. DGRIS, Asia Center. https://centreasia.eu/wp- content/uploads/2018/12/NotePreÃŒÂs entation-AngRaska- Cybersecurity_180518.pdf
- Salmaan, L. (2018). Integrating Cyber Security and Critical infrastructure: National, Regional and International approaches. Stockholm International Peace Research Institute. https://www.sipri.org/sites/default/files/2 018-04/integrating_cybersecurity.pdf
- Sarbannes-Oxley Act of 2002 (2010). https://pcaobus.org/About/History/Docum ents/PDFs/Sarbanes_Oxley_Act_of_2002. pdf
- Syed, R., Khaver, A. A., & Yasin, M. (2019). Cyber Security: Where does Pakistan Stand? SDPI Working Paper, 167. https://think- asia.org/bitstream/handle/11540/9714/Cybe r-security-where-does-pakistan- stand(W-167).pdf?sequence=1
- National Center for Cyber Security (2020). Research Areas. May 29, 2020 http://www.nccs.pk/collaborations/researc h-area
- Pakistan is facing issue of cyberattack (2015). CustomToday. https://customstoday.com.pk/pakistan-is- facing-issue-of-cyber- attack/?__cf_chl_jschl_tk__=75446c822a cb4668d36c4cc9431b9764ba40d6e2- 1593003456-0 AQdrSVdWfqGWM6sEEk40EqK1A_a420v DLBk0WCIf79jUPV5Aa1eJJCpICjZtulscu56c VcEvMd_a7PZn_U4thB9eAurc1EKmrQbm 7QORSWTkL4rErEt7Szetoe1pAzsVgNh2Y MyFaC3I74SE2FcbEqOe2iQfNUdupGDWp Fk6CS- bjStpErRkbDTOH96eD1OJFhWTBEiSqbsS hf5jpg1imdk83_HJIGoP3d0H0TeYw8-JBv- S_kKqhrP8ubrF1cO7FPY2Yj51lumE5iTmgI4 8kqk53sMUmZ7dTdIKgXATBuS0qmRi0eL 0Toe28k1_vPRvSlfxobdRPQpxipC8OAXQC
- International Telecommunication Union (2018). Global Cybersecurity Index 2018. ITU Publication https://www.itu.int/en/ITU- D/Cybersecurity/Pages/global- cybersecurity-index.aspx
- International Telecommunication Union (2020). Definition of Cybersecurity. ITU. https://www.itu.int/en/ITU- T/studygroups/com17/Pages/cybersecurity .aspx
- UN Open ended Working Group (2019). Bridging the Cyber Norms debate with evidence. Cape Town: Research ICT Africa. https://www.un.org/disarmament/wp- content/uploads/2019/12/Discussion- Paper-OEWG-Intersessional-Meeting.pdf
- Vombetkere, S. G. (2018, April 06). Cyber Security: Civil and Military Implications. Indian Defence 33. http://www.indiandefencereview.com/n ews/cyber-security-civil-and-military- implications/
- Work, J. D. Janensen, B. (2018, September 04). Cyber Civil-Military Relations: Balancing interests on the digital fronties. War on Rocks. https://warontherocks.com/2018/09/cyber- civil-military-relations-balancing- interests-on-the-digital-frontier/
- Yamin, T. (2014). Information CBMs between Pakistan and India in Cyberspace. Islamabad: NUST Publishing.
- Yamin, T. (2018). Cyberspace Management in Pakistan. Governance and Management Review (GMR)3(1),46-61. http://pu.edu.pk/images/journal/IAS/PDF/4 -v3_1_18.pdf
Cite this article
-
APA : Anwar, S. S., & Yamin, T. (2021). Civil Military Cooperation (CIMIC) in Cyber Security Domain: Analyzing Pakistan's Prospects. Global Strategic & Security Studies Review, VI(I), 68-81. https://doi.org/10.31703/gsssr.2021(VI-I).08
-
CHICAGO : Anwar, Syeda Sundus, and Tughral Yamin. 2021. "Civil Military Cooperation (CIMIC) in Cyber Security Domain: Analyzing Pakistan's Prospects." Global Strategic & Security Studies Review, VI (I): 68-81 doi: 10.31703/gsssr.2021(VI-I).08
-
HARVARD : ANWAR, S. S. & YAMIN, T. 2021. Civil Military Cooperation (CIMIC) in Cyber Security Domain: Analyzing Pakistan's Prospects. Global Strategic & Security Studies Review, VI, 68-81.
-
MHRA : Anwar, Syeda Sundus, and Tughral Yamin. 2021. "Civil Military Cooperation (CIMIC) in Cyber Security Domain: Analyzing Pakistan's Prospects." Global Strategic & Security Studies Review, VI: 68-81
-
MLA : Anwar, Syeda Sundus, and Tughral Yamin. "Civil Military Cooperation (CIMIC) in Cyber Security Domain: Analyzing Pakistan's Prospects." Global Strategic & Security Studies Review, VI.I (2021): 68-81 Print.
-
OXFORD : Anwar, Syeda Sundus and Yamin, Tughral (2021), "Civil Military Cooperation (CIMIC) in Cyber Security Domain: Analyzing Pakistan's Prospects", Global Strategic & Security Studies Review, VI (I), 68-81
-
TURABIAN : Anwar, Syeda Sundus, and Tughral Yamin. "Civil Military Cooperation (CIMIC) in Cyber Security Domain: Analyzing Pakistan's Prospects." Global Strategic & Security Studies Review VI, no. I (2021): 68-81. https://doi.org/10.31703/gsssr.2021(VI-I).08