The Cyberspace and Intensification of Privacy Invasion

Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2015, Vol 17, Issue 2

Abstract

 Abstract: The widespread adoption of cyberspace for exceptional socio-economic activities, especially as it isconnecting populations around the globe in ways never foreseen is raising fresh security issues. What is fuellingthis embracement, is the pervasiveness of social media and innovative mobile computing devices. This has notonly changed our ways of life, but also blurs the lines that define the way governments run, business areconducted as well as the way we use and share information. Yet, these new ways of services and interactions,are raising new threats in terms of privacy, integrity, confidentiality and trust. Cyberspace transactionscutacross national boundaries, in many cases, without any form of existing trust relationships of any sort. Again,the explosion in mobile computing is extending the influence of social web; the manner in which content isshared and accessed is now defining a symbol of new global status, affecting and merging the realm of personaland business life. Besides the threats from criminal minded people or group, deliberate efforts by states todominate (or show supremacy) with the potential to halt other states economically, politically or militarily, liesintensified privacy invasion that is unfamiliarto the unsuspecting technology user. This paper explores thedifferent levels at which users of cyberspace are exposed toprivacy invasion, the consequences and manner inwhich some of the risks can be mitigated even as we continue to record steady upswing of mobile computing bycyberspace users.

Authors and Affiliations

U. Mbanaso, PhD; E. S. Dandaura, PhD.

Keywords

Related Articles

Image Restoration Algorithm for Reliable Block Quantum Cellular Automata Gate

Abstract : The fault-tolerance properties of the classical Quantum Cellular Automata (QCA) Majority gate, as well as the AND-gate, suffer from precision errors in inherent in manufacturing on a nanometer scale. Due to th...

Efficient Network Design Parameters for Packet Switching Using Poisson distribution Methode

Abstract: Wireless sensor network is a group of sensor nodes with inadequate processor and partial memory unit embedded with other equipment for communication through the networking banding system. Sensor networks is one...

 Twitter Sentiment Classification on Sanders Data using HybridApproach

Abstract : Sentiment analysis is very perplexing and massive issue in the field of social data mining. Twitter isone of the mostly used social media where people discuss on various issues in a dense way. The tweets about...

 Enhancing Security of Multimodal Biometric Authentication  System by Implementing Watermarking Utilizing DWT and DCT

 Conventional personal identification techniques for instance passwords, tokens, ID card and PIN codes are prone to theft or forgery and thus biometrics isa solution thereto. Biometrics is the way of recognizing &...

 Privacy Protection in Personalized Web Search Via TaxonomyStructure

Abstract: Web search engine has long become the most important portal for ordinary people looking foruseful information on the web. User might experience failure when search engine return irrelevanceinformation due to en...

Download PDF file
  • EP ID EP122033
  • DOI -
  • Views 92
  • Downloads 0

How To Cite

U. Mbanaso, PhD; E. S. Dandaura, PhD. (2015).  The Cyberspace and Intensification of Privacy Invasion. IOSR Journals (IOSR Journal of Computer Engineering), 17(2), 24-31. https://www.europub.co.uk/articles/-A-122033