top of page
Asian Institute of Research, Journal Publication, Journal Academics, Education Journal, Asian Institute
Asian Institute of Research, Journal Publication, Journal Academics, Education Journal, Asian Institute

Journal of Social and Political

Sciences

ISSN 2615-3718 (Online)

ISSN 2621-5675 (Print)

asia insitute of research, journal of social and political sciences, jsp, aior, journal publication, humanities journal, social journa
asia insitute of research, journal of social and political sciences, jsp, aior, journal publication, humanities journal, social journa
asia insitute of research, journal of social and political sciences, jsp, aior, journal publication, humanities journal, social journa
asia insitute of research, journal of social and political sciences, jsp, aior, journal publication, humanities journal, social journa
crossref
doi
open access

Published: 12 November 2024

The Intersection of Political Power and Data Exploitation: Implications for Privacy and Security in Ghana's Digital Age

Bashiru Salifu Zibo, Ogochukwu C. Nweke

Kings University College, Ghana

journal of social and political sciences
pdf download

Download Full-Text Pdf

doi

10.31014/aior.1991.07.04.527

Pages: 89-96

Keywords: Data Privacy, Ghana, National Security, Political Vigilantism, Surveillance Capitalism

Abstract

Digital technologies are rapidly being integrated into the political process and this massive transformation is bringing both opportunities and significant challenges. The research is focused on how the merging of political power and data exploitation has led to a new challenge known as surveillance capitalism – where personal data is gathered, commodified and used without the data owners' consent–in the privacy and security field. With the guidance of four key research questions, the study makes use of the mixed-methods approach, combining literature review with empirical data collected through surveys. Academic databases including Google Scholar, JSTOR, Scopus, and PubMed, build the arsenal of the literature review, examining the theoretical frameworks of surveillance capitalism and how effective current legal frameworks, such as Ghana’s Data Protection Act, 2012. The survey component captures public perceptions of political vigilantism and its exacerbation through data exploitation. The findings highlight the need for stronger enforcement of data protection laws, increased public awareness, and the development of strategies that balance innovation with privacy protection. This study provides critical insights for policymakers, emphasising the urgency of addressing the dual challenges of data exploitation and political violence to safeguard democratic processes in Ghana.

References

  1. Agbiboa, D. E. (2018). Protectors or predators? The embedded problem of police corruption and political vigilantism in Nigeria. African Affairs, 117(469), 409-432.

  2. Arif, I., & Dutta, N. (2024). Legitimacy of government and governance. Journal of Institutional Economics, 20, e14, 1-23. https://doi.org/10.1017/S174413742300033

  3. Braun, V., & Clarke, V. (2006). Using thematic analysis in psychology. Qualitative Research in Psychology, 3(2), 77-101.

  4. British Psychological Society. (2018). Code of Ethics and Conduct. Leicester: British Psychological Society.

  5. California State Legislature. (2018). California Consumer Privacy Act (CCPA). California Civil Code § 1798.100–1798.199.

  6. Couldry, N., & Mejias, U. A. (2019). The costs of connection: How data is colonizing human life and appropriating it for capitalism. Stanford University Press.

  7. Creswell, J. W., & Creswell, J. D. (2023). Research design: Qualitative, quantitative, and mixed methods approaches (6th ed.). Sage Publications.

  8. Debrah, E., Owusu-Mensah, I., Danso, S., & Aidoo, G. A. (2024). Electoral violence in Ghana’s Fourth Republic: The case of party vigilantism. In G. A. Aidoo (Ed.), The Palgrave handbook of violence in Africa (Chapter 16). Palgrave Macmillan. https://doi.org/10.1007/978-3-031-40754-3_16

  9. European Parliament, & Council of the European Union. (2016). General Data Protection Regulation (GDPR). Official Journal of the European Union, L119, 1-88. https://eur-lex.europa.eu/legal-content/EN/TXT/?uri=CELEX:32016R0679

  10. Fowler, F. J. (2014). Survey research methods (5th ed.). Sage Publications.

  11. Fuchs, C. (2012). The political economy of privacy on Facebook. Television & New Media, 13(2), 139-159.

  12. Gyampo, R. E., Graham, E., & Asare, B. E. (2017). Political vigilantism and democratic governance in Ghana's Fourth Republic. The African Review: A Journal of African Politics, Development and International Affairs, 44(2), 112-135. https://www.jstor.org/stable/45341742

  13. Isaak, J., & Hanna, M. J. (2018). User data privacy: Facebook, Cambridge Analytica, and privacy protection. Computer, 51(8), 56-59.

  14. Mayer-Schönberger, V., & Cukier, K. (2013). Big data: A revolution that will transform how we live, work, and think. John Murray.

  15. Papa Bentil, E., Nunoo, I., & Oduro Appiah, M. (2024). Threat of political vigilantism to political security in Africa: a case of Ghana. Cogent Social Sciences, 10(1), 2384184.

  16. Republic of Ghana. (2012). Data Protection Act, 2012 (Act 843).

  17. Schwartz, P. M., & Peifer, K. M. (2020). Transatlantic data privacy law. Texas Law Review, 98(8), 1915-1950.

  18. Teddlie, C., & Yu, F. (2007). Mixed methods sampling: A typology with examples. Journal of Mixed Methods Research, 1(1), 77-100.

  19. Voigt, P., & Von dem Bussche, A. (2017). The EU General Data Protection Regulation (GDPR): A practical guide. Springer.

  20. Zuboff, S. (2019). The age of surveillance capitalism: The fight for a human future at the new frontier of power. PublicAffairs.

bottom of page