The Cyberspace and Intensification of Privacy Invasion

Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2015, Vol 17, Issue 2

Abstract

 Abstract: The widespread adoption of cyberspace for exceptional socio-economic activities, especially as it isconnecting populations around the globe in ways never foreseen is raising fresh security issues. What is fuellingthis embracement, is the pervasiveness of social media and innovative mobile computing devices. This has notonly changed our ways of life, but also blurs the lines that define the way governments run, business areconducted as well as the way we use and share information. Yet, these new ways of services and interactions,are raising new threats in terms of privacy, integrity, confidentiality and trust. Cyberspace transactionscutacross national boundaries, in many cases, without any form of existing trust relationships of any sort. Again,the explosion in mobile computing is extending the influence of social web; the manner in which content isshared and accessed is now defining a symbol of new global status, affecting and merging the realm of personaland business life. Besides the threats from criminal minded people or group, deliberate efforts by states todominate (or show supremacy) with the potential to halt other states economically, politically or militarily, liesintensified privacy invasion that is unfamiliarto the unsuspecting technology user. This paper explores thedifferent levels at which users of cyberspace are exposed toprivacy invasion, the consequences and manner inwhich some of the risks can be mitigated even as we continue to record steady upswing of mobile computing bycyberspace users.

Authors and Affiliations

U. Mbanaso, PhD; E. S. Dandaura, PhD.

Keywords

Related Articles

 Securing IPv6’s Neighbour and Router Discovery, using Locally Authentication Process

 today’s world.Internet Engineering Task Force (IETF), in IPv6, allowed nodes to Auto configure using neighbour discovery protocol. Neighbour Discovery (ND) and Address auto-configuration mechanisms may be protect...

 Text Clustering in Distributed Networks with Enhanced File Security

 Abstract: Text Clustering technique is widely used in both centralized and distributed environments for information retrieval. Centralized approaches are used in traditional text clustering algorithms. In such appr...

 The Cyberspace and Intensification of Privacy Invasion

 Abstract: The widespread adoption of cyberspace for exceptional socio-economic activities, especially as it isconnecting populations around the globe in ways never foreseen is raising fresh security issues. What is...

 Bandwidth Management on Cloud Computing Network

 Abstract: To be able to manage the available bandwidth and distribute it among the Cloud Applications userseffectively is a very critical issue to avoid network congestion and network resources abuse. In this paper...

 Data storage security in Cloud

 Abstract : Cloud computing is worthy of consideration and try to build business systems as a way for businesses in this way can undoubtly bring about lower costs, higher profits and more choice; for large scale ind...

Download PDF file
  • EP ID EP122033
  • DOI -
  • Views 85
  • Downloads 0

How To Cite

U. Mbanaso, PhD; E. S. Dandaura, PhD. (2015).  The Cyberspace and Intensification of Privacy Invasion. IOSR Journals (IOSR Journal of Computer Engineering), 17(2), 24-31. https://europub.co.uk/articles/-A-122033