The Cyberspace: Redefining A New World
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2015, Vol 17, Issue 3
Abstract
Abstract: The cyberspace driven by information systems and the Internet is transforming our environment inextraordinary ways by enabling economic growth and providing new means by which people connect, interactand collaborate with one another. The continuous evolution of components of information and communicationstechnology (ICT); advances in the underlying digital components (core electronics) and the correspondingreduction in costs suggest that the Internet is increasingly becoming more readily available and accessibleworldwide. The outcome is that more and more people around the globe will ultimately rely on the effectivefunctioning of the Internet to survive and prosper. This suggests an unremitting upsurge of the population of cybercitizens globally. Most countries no longer take these emerging trends in the virtual world casually. Asidethe evolution of digital economy driven by the extensive use of information space or digital knowledge, mostcountries are working hard to dominate the information space. As the industrial revolution bifurcated the world,so also is the level of exploitation of the vast opportunities on cyberspace bifurcating nation states. This is simplydue to the fact that traditional activities of all sorts are increasingly shifting to this new domain. Certainly,cyberspace has become a new focal point for innovations, enterprises, social networking, criminality andwarfare. These factors are reshaping and redefining a new world. Most countries that have recognizedcyberspace as the fifth domain, have, equally elevated their perception of the domain as an abstract virtual spaceto a more concrete space with ‘physical boundaries’. This paper explores the different levels at whichcyberspace is bringing benefits and risks to mankind, and the factors responsible for the widening gap between‘developed’ and ‘developing’ nations.
Authors and Affiliations
U. M. Mbanaso, PhD and E. S. Dandaura, PhD.
Managing IoT data using relational schema and JSON fields, a comparative study
Data transmitted from sensors and actuators as part of the Internet of Things (IoT) infrastructure are stored either in database tables following relational schema and normalization forms or in schema less collections us...
Enhancement of Bag-of-Words for Legal documents using Legal Statute
Abstract: In this paper Legal statute related to dowry acts has been processed to obtain a distinct set of legal keywords which don’t have a common occurrence in day to day dowry case judgments. This effort coupled with...
Optimized Fuzzy Routing for MANET
temporary network without the aid of any established infrastructure of centralized administration. In suchenvironment, the nodes operate both as hosts as well as routers. Due to mobility, the topology of the networ...
Manual Unpacking Of Upx Packed Executable Using Ollydbg and Importrec
A 'Packer' is a compression routine that compress an executable file. Packers are used on executable for two main reasons: to shrink programs or to thwart detection or analysis. When malware has been pack...
Examining Performance of Bluetooth Network In The Presence of Wi-Fi System
Abstract: More recently, there has been a growing interest in cognitive techniques, which allow devices and even whole networks to monitor the environment in order to dynamically select and use the channel that aff...