Google Street View Accused of Capturing Illegal Information

Is Google Spying on You?

By IGI Global on Nov 13, 2013
Contributed by Marisa Weachter, Marketing Assistant

Is Google using Google Earth to spy on communities? In a recent RT News Report, Google’s Street View program is being accused of collecting the personal data of Brazilian communities.

Google’s Street View cars do drive-bys of communities to collect images and information for geographical purposes, but citizens of over 30 countries are concerned that is Google is using their security cameras and web technologies for intercepting and collecting emails, passwords, photos and personal information that are transmitted through the Internet.

The article interviews German authorities who reported: “Among the information gathered in the drive-bys were significant amounts of personal data of varying quality. For example, e-mails, passwords, photos and chat protocols were collected.”

With new advances in technological spyware, it is becoming even more crucial to make sure personal information that is that is entered on the web remains secure and private. An interesting comparison on spyware threats protection can be found in the IGI Global chapter, "A Survey on Security in Wireless Sensor Networks: Attacks and Defense Mechanisms".

Written by research professionals Ilker Korkmaz of Izmir University of Economics, Turkey, Orhan Dagdeviren of Ege University, Turkey, Fatih Tekbacak of Izmir Institute of Technology, Turkey and Mehmet Emin Dalkilic of Ege University, Turkey, this chapter provides insight into new advancements in wireless sensor networks and how to secure personal information against cyber attacks.

“Any possible attack to WSN is a threat for the Information System integrated to the corresponding WSN. As an attack to any part of the hardware or software of the WSN may give a significant damage to the Information System in use”.

This chapter is part of the IGI Global title, Theory and Practice of Cryptography Solutions for Secure Information Systems, edited by Atilla Elçi of Aksaray University, Turkey, Josef Pieprzyk of Macquarie University, Australia, Alexander G. Chefranov of Eastern Mediterranean University, North Cyprus, Mehmet A. Orgun of Macquarie University, Australia, Huaxiong Wang of Nanyang Technological University, Singapore and Rajan Shankaran of Macquarie University, Australia. This book explores current trends in IS security technologies, techniques, and concerns, primarily through the use of cryptographic tools to safeguard valuable information resources.

This title is also a part of an IGI Global Book Series, Advances in Information Security, Privacy, and Ethics (AISPE). This book series provides only the most cutting-edge research on how information is utilized in the digital age.
Browse for more posts in:
Security and ForensicsInformation Security & PrivacyBook SeriesBooks & E-BooksChaptersInfoSci-BooksEuropeLatin & South AmericaNorth AmericaOceania

No comments Comments

Log in or sign up to comment.
Be the first to comment!

More from IGI Global

0
As technology continues to evolve at a rapid pace, the integration of artificial intelligence (AI) and humanoid robotics is projected to revolutionize the world of academia. With strides in AI, humanoid robotics, nanotechnology, biotechnology, and smart medicine, the concept of an ultra-intelligent digital realm is becoming increasingly real.
IGI GlobalRead More
Computer Science and Information TechnologyArtificial IntelligenceWeb Technologies & EngineeringCyber BehaviorComputational IntelligenceBooks & E-Books
In today’s technological era, leveraging digital tools and resources is essential for all aspects of learning. As generative AI evolves, it is essential to understand its methods and the advantages it offers for educational and learning strategies
IGI GlobalRead More
EducationComputer Science and Information TechnologyArtificial IntelligenceBooks & E-Books
There are many ways to work with IGI Global including submitting a book proposal, journal proposal, or special issue proposal, or becoming a reviewer.
NewsletterAuthor News
Check out this article highlighting the recent success of chapter author, Mukundan Appadurai Paramashivan, and his accomplishments in data-driven ingenuities.
IGI GlobalRead More
Awards & RecognitionAuthor News
0
In today’s globalized business world, effective leadership in managing diversity is crucial for organizational success. This guest blog aims to introduce the main themes covered by this book and its contributions to the world of diversity in the workforce.
IGI GlobalRead More
Business and ManagementBooks & E-Books
Learn how to identify fraudulent IGI Global Impersonations to protect yourself.
IGI GlobalRead More
0
The outlook for education is undergoing a paradigm shift. Technological advancements, globalization, and evolving societal expectations have created a complex environment that demands innovative approaches to learning...
EducationWeb-Based Teaching & LearningBooks & E-Books
0
The threats of cyber-attacks are more dangerous than ever. Ranging from data breaches to ransomware, the risk of personal, corporate, and governmental data breaches has never been higher. As technology advances, so do the methods employed by cybercriminals, making robust cybersecurity measures essential. Protecting against these threats not only defends against immediate financial and operational damage but also preserves trust and safety in an interconnected world.
IGI GlobalRead More
Computer Science and Information TechnologySecurity and ForensicsCyber BehaviorSystems & Software EngineeringBooks & E-Books
First Previous 1 2 3 4 5 6 7 8 9 10  ... Next Last