The Cyberspace and Intensification of Privacy Invasion

Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2015, Vol 17, Issue 2

Abstract

 Abstract: The widespread adoption of cyberspace for exceptional socio-economic activities, especially as it isconnecting populations around the globe in ways never foreseen is raising fresh security issues. What is fuellingthis embracement, is the pervasiveness of social media and innovative mobile computing devices. This has notonly changed our ways of life, but also blurs the lines that define the way governments run, business areconducted as well as the way we use and share information. Yet, these new ways of services and interactions,are raising new threats in terms of privacy, integrity, confidentiality and trust. Cyberspace transactionscutacross national boundaries, in many cases, without any form of existing trust relationships of any sort. Again,the explosion in mobile computing is extending the influence of social web; the manner in which content isshared and accessed is now defining a symbol of new global status, affecting and merging the realm of personaland business life. Besides the threats from criminal minded people or group, deliberate efforts by states todominate (or show supremacy) with the potential to halt other states economically, politically or militarily, liesintensified privacy invasion that is unfamiliarto the unsuspecting technology user. This paper explores thedifferent levels at which users of cyberspace are exposed toprivacy invasion, the consequences and manner inwhich some of the risks can be mitigated even as we continue to record steady upswing of mobile computing bycyberspace users.

Authors and Affiliations

U. Mbanaso, PhD; E. S. Dandaura, PhD.

Keywords

Related Articles

 Quality Technical, Vocational Education and Training: A Toolfor Self Reliance

 Abstract: This paper has discusses the relevance of a quality TVE training as a tool for self-reliance. Itidentified skill and knowledge as the engine room for economic growth and sustainable livelihood only if eff...

Energy using optimization in wireless sensor networks using the hybrid algorithm

Abstract: Energy limitation is one the most important issues in wireless sensor networks design. Data integration and their multi-step and hierarchical transition is an effective method for reducing energy consumption a...

 A Comparative Study of Facial, Retinal, Iris and Sclera Recognition Techniques

 The pressures on today’s system administrators to have secure systems are ever increasing. One area where security can be improved is in authentication. Face, retina, iris and sclera recognition, biometrics, provid...

Phase Space Framework for Coherence: Towards Quantum Computing System Design

Abstract: This work aims to propose a framework for the phase space representation of quantum coherence in matter. The central thesis of this work is that quantum coherence could result from weak time-periodic forcing in...

 Comparative Analysis, Security Aspects & Optimization ofWorkload in Gfs Based Map Reduce Framework in Cloud System

 Abstract: This paper discusses a propose cloud infrastructure that combines On-Demand allocation ofresources with improved utilization, opportunistic provisioning of cycles from idle cloud nodes to otherprocesses I...

Download PDF file
  • EP ID EP122033
  • DOI -
  • Views 83
  • Downloads 0

How To Cite

U. Mbanaso, PhD; E. S. Dandaura, PhD. (2015).  The Cyberspace and Intensification of Privacy Invasion. IOSR Journals (IOSR Journal of Computer Engineering), 17(2), 24-31. https://europub.co.uk/articles/-A-122033