Paper written by N’Nuel ESM Ngui

The world today is a highly globalized but also a highly polarized world. The world is polarized due to presence of factors as s such as nationalism and conflict. A pseudo-society is thus seen through the common challenges that happen within a unified and networking society. In a rapidly globalizing world, it is evident that social systems in present day are at crossroads of the development of the networked society.

Issues like new world orders begin to emerge where modern and post-modern experiences come to cut across common issues as such as capitalism. Global integration comes into scope resulting to issues like exploitation of profits thus posing a threat to traditional approaches of business as new age investors are tapping into the advantages as presented by new media and technological discoveries to cut on production costs by embracing new technology mechanisms to control labor cost implications. Capitalism including new models of intellectual property rights, and a diffusion of technological development responsive to the needs of a vastly globalizing world explains the issue of intellectual property rights as strategically so important yet so neglected with the emergence and application of new media.

There is a vividly clearly noticeable increasing contradiction between current social relationships of production, basic lifestyles, inter-personal relationships and the potential expansion of formidable productive forces as influenced by the revolutionizing nature of technological innovation and advancement. This may be the only lasting contribution from the classical Marxist theory (The term “classical Marxism” is used here to refer to theories that cover economic and social development and specify a certain temporal and logical field)

Over years in history, human potential is lodged on new communication and emerging technologies thus creating new superficial relationships between humans and robots sharing confidential data that remains widely available on the internet. It is a question on the safety of this data and the possible consequences of the global internet connectivity which ranges from connecting home appliances as such as electronics to our offices and mobile phones. In networking, existing cultural imperialization continues to stall the dynamics of creativity which could otherwise boost safety to internet users. However, if this creativity and expanding innovations is used to challenge the existing loopholes presented by the internet of things (IoT) to bring about competition in the form of enhanced new communications safety, it tends to implode and is given no room to grow and shape the future for millions of new media users in a highly globalizing world (Castells and Kiselyova, 1995).

In addition, globalization is presented as a continuation of colonialism which comes with the emergence of uncontrolled communication and self-organization at the socio-political level, bypassing the mass media, and challenging formal politics causing loss of purity and authenticity. This is the case of insurgent political campaigns, such as the election irregularities that were reported in Kenya over the 2017 period. This is why in fact governments are open to the advantages of new communication trends vis-a-vis the uses of Internet and new technologies. They praise their benefits, yet they fear to lose the control of information and communication in which power has always been rooted. Accepting democracy of communication is accepting direct democracy, something no state has accepted in history. Accepting a debate to redefine property rights goes to the heart of the legitimacy of capitalism.

With this information, it is clearly evident that artificial intelligence is on the rise and this leads to question further the consequences/ implications coming with communications in this new global village arena. More demonstrations are to do with the connectivity of devices through GPRS, phones connected to home appliances among other uses. As explained above, this is resulting to so much data accumulated on the internet.

All the above fears and anxieties are as a result of unprotected data which is highly susceptible to manipulation thus opening up a new discussion on how and why operations and interactions in the volatile internet environment calls for particular security management approaches as such as emphasis on ethical hacking to strengthen network security, one of the most desired stills for any IT and Communications expert in a globalized world.

Therefore, there is need to provide internet users and consumers of internet content with skills on the tools and techniques used by hackers and information security professionals to test penetration vulnerabilities of organizations’ systems and individual user accounts.

For effective security support to users of the internet, individuals need to learn:

  • How to use the tools, techniques and methodologies employed by hackers
  • How hackers can accurately collect and assimilate information about an organization’s infrastructure whilst avoiding detection
  • Measures to secure and protect information against cyber-hacker attacks
  • Limitations of firewalls and the tools used to bypass them
  • Which tools can be used to leverage access on a system
  • How information may be used to assess weaknesses and subsequently launch an attack against a target
  • How hackers conceal their tracks and the route through which access to a target may be maintained
  • The implications of flawed web applications security
  • How web users are at threat

In this case, internet users and consumers will learn about the hacker mindset and become familiar with the tools used to attack systems and jeopardize securing operations on the internet which usually result to such reports of cybercrime attacks, the most common threat to internet security.

Governments and other IT co-operations should come together to build up on trainings specifically targeted at those responsible for the security of IT systems, including but not limited to: System/Network Administrators, Crime Prevention & Protection Offices, Auditors, Security Officers, and Information Security Professionals & Penetration Testers (ICT Officers)

References

Axford, B. and Huggins, R. (eds.) (2001) New Media and Politics. London: Sage.

Barney, D. (2004) The Network Society. Cambridge: Polity

Berger, A. A. (1995) Essentials of Mass Communication Theory London: Sage.

Bolter, J. D. and Grusin, R. (2000) Remediation: Understanding New Media. Cambridge, MA: MIT Press.

Burnett, Robert & Marshall, David (2003) Web Theory: An Introduction. London, Routledge.

Caldwell, J. (ed.) (2000) Theories of the New Media: A Historical Perspective. London: The Athlone Press

Curran, J. & Gurevitch, M. (eds.) (2005) Mass Media and Society. 4th ed. London: Arnold.

Habermas, J. (1974) ‘The Public Sphere’, New German Critique, 3 (Fall). 49-55.

Manovich, L. (1997) The Language of New Media. Cambridge, MA: MIT Press.

McLuhan, M. & Fiore, Q. (1967) The Medium is the Message. An Inventory of Effects. New York: Bantam Books.

McLuhan, M. & Fiore, Q. (1968) War and Peace in the Global Village. New York: Bantam Books.