The Cyberspace and Intensification of Privacy Invasion

Author(s): U. Mbanaso, PhD and E.S. Dandaura, PhD  |  Published date:  Apr, 2015

Abstract: The widespread adoption of cyberspace for exceptional socio-economic activities, especially as it is connecting populations around the globe in ways never foreseen is raising fresh security issues.What is fueling this embracement, is the pervasiveness of social media and innovative mobile computing devices.  This has not only  changed  our  ways  of  life,  but  also  blurs  the  lines  that  define  the  way  governments  run,  business  are conducted  as  well  as  the  way  we  use  and  share information. Yet,  these new  ways  of  services  and  interactions, are  raising new threats  in terms  of privacy,  integrity,confidentiality  and  trust.  Cyberspace transactions cut across national boundaries, in many cases,without any form of existing trust relationships of any sort. Again, the  explosion  in  mobile  computing  is  extending  the influence of  social  web;  the  manner in which content  is shared and accessed is now defining a symbol of new global status,affecting and merging the realm of personal and  business  life. Besides  the  threats  from criminal  minded  people  or  group,  deliberate  efforts  by  states  to dominate (or show supremacy) with the potential to halt other states economically, politically or militarily, lies intensified privacy  invasion  that  is  unfamiliar to  the  unsuspecting  technology  user.This  paper explores  the different levels  at  which users  of cyberspace  are exposed to privacy invasion, the consequences and  manner in which some of the risks can be mitigated even as we continue to record steady upswing of mobile computing by cyberspace users.

Download pdf