Privacy invasion is an offence perpetrated by availability, access, and use of advanced mobile devices when they land in the wrong hands of people who have the intention of infringing into the space of either individuals or organizations. There have been many incidences of infringement on people‟s privacy by exposing their personal lives to third parties and the general public, a factor which is associated with detrimental effects. The study sought to integrate mobile application security strategies as a measure towards curbing privacy invasion. The general objective was to evaluate the effects of mobile application security strategies on privacy invasion among mobile shop operators in Nakuru East Sub-County, Kenya. The specific objectives were; to examine data encryption, advanced software testing techniques, risk analysis, and privacy settings on privacy invasion among mobile shop operators in Nakuru East Sub-County, Kenya. The study was guided by the technology acceptance model, restricted access or limited control theory of privacy, control theory of privacy, and seclusion theory of privacy. The study adopted a cross-sectional research design, and was carried out in Nakuru East Sub-County, Kenya. The units of observation were mobile shops within Nakuru town, while the units of analysis were operators of mobile shops. According to Nakuru East Sub-County Business Register (2019), there are 221 mobile shops within Nakuru town. The researcher used Purposive sampling method to select respondents (Operators) from each of the 221 mobile shops. Nassiuma‟s (2000) formula was used to determine the sample size of 70 operators of mobile shops. The study used structured questionnaires to facilitate data collection. The pilot study was conducted in Eldoret town‟s Central Business District where questionnaires were issued out to 7 selected operators of mobile shops. The collected data was analyzed with the aid of the Statistical Package for Social Sciences. Descriptive statistics encompassing frequencies, percentages, means and standard deviations were used in the analysis.