A Policy Research Project

  1. Initiated by Sharia’a Scholars at Jamia-tur-rasheed (JTR)*
  2. Organized by Centre for Policy, Research and Dialogue (CPRD) **
  3. Collaborated by: Ummah Cyber Team (UCT) ***


 * (JTR) Jamia-Tur-Rasheed is an educational institution offering a fine blend of Sharia’a and contemporary educational streams. It is administered by Majlis-e-Ilmi Society (MIS) (Regd.), offering a variety of public-interest services i.e. Sharia’a consultancy/guidance, orphanage management, print media, research and certification

** (CPRD) Centre for Policy, Research and Dialogue is a think tank for sharia’a based sustainable solutions. CPRD is supervised by JTR

*** (UCT) Ummah Cyber Team comprises of more than 1000 volunteers of IT professionals. UCT is a project of CPRD


     The ability to harness the power and promise of leading edge technology often determines national prosperity, security and global influence as well as the standard of living and quality of life for all. The people who believe in the promises and the liberty provided by the cyberspace must take care in what they do while living in the cyber world. Although, there is nothing necessarily sinister in the technology itself, but the actions that technologies facilitate may not always be harmless.

     It may be noted that the C3 Matrix takes a holistic and comprehensive approach to preparing people for the changing life of the cyber world of communication. With the inherent delicacy of the cyber world, its safety, security and ethical dimensions are very much addressable. When anyone living in this cyber space accesses the web-based and mobile technology, they leave the digital foot printsthat make them vulnerable to invasion of privacy (safety/security dimension of cyber world come in here). They are also exposed to the negative content and significant risks (ethical dimension plays its role here).

     In this era of cyber life, rapidly changing state-of-the art, and easily accessible technologies expose the user to behavioral (ethical), safety and security risks, which include the following among many others:

  • Online addictions,
  • Invasion of privacy and disclosure of personal information,
  • Inappropriate online communications,
  • Cheating and copy right infringements,
  • Cyber bullying / harassment,
  • Sexual predating, etc.

     Therefore, there is a dire need to define authorities, responsibilities, and accountabilities for information resources and information system for their safety, security, and ethical creativity and use. It is mandatory to establish uniform rules and regulations for the use and management of wireless communication devices, (including mobile phones, tablets and other devices with cellular/digital network capability) services by staff and students of an educational institution, offices, market places, and domestic environments. Every member of the community who is connected to the cyber world through any of the available devices (laptop, computer, portable hard drives, USB flash drives, smartphones, and tablets) is responsible for the data stored, processed or transmitted via the device being used. The member must also be careful and aware of and follow the safety, security, and ethical dynamics of living and communicating in the cyber world using the internet.

     For this purpose, a team of qualified professionals from the cyber community have initiated the policy research project to develop a Sharia’a based Cybersafety, Cybersecurity, and Cyberethics (C3) Model of policy for digital citizenship in the cyber world. Thisteam is a part of a larger research group related to the Engineering and Technology (E&T) Focal Group, whichis one of 15 focal groups that are introduced by Centre for Policy Research and Dialogue (CPRD).


What to Search and Research An Overview

     Cyberspace offers numerous possibilities for entertainment and leisure, and can be a rich source for information. Unfortunately, it can also be a dangerous place for the unwary or ill-informed. In this research, we will address some safety, security and ethical issues related to cyber world that can arise when the cyberspaces are used through internet by the people living in and around it. The research work will look into the possibilities to create systems that embed adherence to laws and provide support to safety, security, and ethics.Thispolicy research study will concentrate on to converging to appropriate sharia’a based sustainable solutions in the form of policy recommendations for the said research issue. The research will focus on the following aspects of digital citizenship in the cyber world:

  • Identification of the cybersafety, cybersecurity, and cyberethics issues in educational institutions, domestic environments and offices
  • Developing the sets of rules and regulations that can be adopted and technologies devices / software’s can be suggested to ensure acceptable usage and effective controls
  • Development of a prototype C3 Model for JTR to be replicated by other madaris
  • Development of another C3 Model for some selected educational institution, which may also be replicated by other similar institutions
  • Development of a C3 Model for domestic environments
  • Development of a frame work for addressing and involving parents to adopt the C3 Model for their families

Answers to the following general questions, (not limiting to these only), will also be sought:

  • How to use and control communication technology in teaching and learning environment?
  • How to ensure monitoring of system access and usage, defining campus information security policy?
  • How to discipline usage of mobile phones in educational institution and at outside?


Milestones of the Research Project

     Cybersafety, cybersecurity, cyberethics, C3 policy recommendations and procedures for the religious educational institutions (Madaris) with an implementable C3 Model.

  1. Cybersafety, cybersecurity, cyberethics, C3 policy recommendations and procedures for schools, colleges, and universities with an implementable C3 Model.
  2. Cybersafety, cybersecurity, cyberethics, C3 policy recommendations and procedures for domestic environments with an implementable C3 Model.
  3. Cybersafety, cybersecurity, cyberethics, C3 policy recommendations and procedures for office environments with an implementable C3 Model.


How to Proceed

      In order to initiate, administer and complete this policy research, Director, Operations and Research, CPRD will undertake this research project through Engineering and Technology Focal Group. This project will be assigned to the Ummah Cyber Team (UCT), which is a project of CPRD comprises of more than 1000 IT professionals, working as volunteers from all over Pakistan and from other countries around the Globe. Remember that UCT is already dedicated to a sacred cause of “Islamifying the digital world”.

     A research team of IT professionals of UCT will undertake this research tasks and compile the data and details essential for developing standard policies and procedures along with suggested technological devices and software. The processing of final drafts and development of prototype models will be undertaken at the Engineering and Technology Focal Group of CPRD, as per their system. This predefined system has a built-in process that involves the following step:

  1. Research to be carried out by the researchers of the In-House Research Rouse Team (IRRT) in collaboration with Adjunct Research Resource Team (ARRT), which will also include the UCT researchers.
  2. A symposiumof Senior Advisory Panel (SAP) of the Engineering and Technology Focal Groups, members of the Professional Open Forum (POF), IRRT and ARRT researchers to review and finalize the research report and the recommendations.
  3. Approval of the policy research report by the Academic Council (AC), Central Advisory Board (CAB) of CPRD and Central Advisory Committee (CAC) of JTR.
  4. Policy seminar for the announcement of the policy recommendations, and the developed C3 models.
  5. Release of policy recommendations and developed C3 models for publicationin media.
  6. Successful implementation of the developed prototype C3 model by respective institutions, domestic environments, and offices.