Globalization (Cyberspace) and Risk

As you can see in Virtual job-hunting: Technology fills situations vacant by Rory Cellan-Jones technology correspondent, BBC News,

We all know that how convenient or efficient in terms of time, cost and space it is for both employers and employees to make the best use of social network services as recruiting methods.

On the other hand I have been thinking of how risky or harmful it is for us to live in this cyberspace society if you like it or not. We even don’t choose to live in such a society, yet this is something we have to accept to live with. In other words, this cyberspace age can be something as surprising or unprecedented as enlightenment age and industrial revolution.

Then the risk management would be a crucial thing to get prepared for this coming age. However as I am so amateur about this, this highlights so many savvy areas, in which I have already seem to have involved without realizing it. (I have to admit that more or less I have already expected to see risky sides of cyberspace, yet I have been tamed to use all technological tools  as everyone uses them and so do I although I am not ready for using social network services of Facebooks and LinkedIn.)

The problem is that all technological equipments/tools (network devices) relating to cyberspace are too invisible or blind to feel confident in controlling them by oneself. I am so used to using them before I really understand them.

How could one be so responsible for those devices if you don’t know them really well? To make the best use of it requires the problem-solving skill to overcome unexpected troubles, whose infrastructure could relate to one’s familiarity with the mechanism of computer science or any relevant engineering area, which should be learnt by all people (just like the process of getting a driver license for example). This might solve all problems resulting from side-effects of constantly evolving cyberspace community world.

According to Maggie Shiels as technology reporter, BBC News, Silicon Valley

 ‘The targeted attack used by hackers to compromise e-mail accounts of top US officials is reaching ‘epidemic’ proportions, say security experts.’

Moreover she describes how easy it is to access to digital citizen’s personal accounts(with my emphasis).

‘Security experts said spear phishing attacks were easy to perpetrate because of the amount of information people put on the internet about themselves on social networking sites such as Facebook and Twitter……..

The mountain of data lets canny hackers piece together enough information to make e-mails they concoct appear convincing and genuine…………….In this attack, some Gmail users received a message that looked like it came from a work colleague or was linked to a work project.’

Once we become owners of some property, they have to be looked after. This sometimes results in extra money, time and attention. Our essential tools to live with now have been added by invisible entities (such as e-mails, social networking sites and other social activities) within cyberspace. They all include individual accounts, which could identify yourself to be approved of prior to accessing the door to as if contracted cyber formats of organizations.

Even if you visit off-line social places, specific public areas (for example, age restricted public places, embarkation procedure, and duty shops outside of your own country) would ask you to show your ID (such as driver license, health insurance and passport), which would be no longer physical entities anymore but digitally tracked. We cannot avoid from being a part of digital worlds, and our records have been kept without knowing them fully enough for you to oversee, yet no ones care for how your private information has been protected. It seems to be only yourself who could take care of it with your full control.