Return to Article Details Privacy in Cyberworld: Why Lock the Gate After the Horse Has Bolted?