I've got my eye on you: Google Glass

Every time a revolutionary technology comes into being, basic questions such as 'do we really need this technology?' or 'how can we ensure that new technology can be put to right use?' will give raise to concerns about privacy and security.

Thanks to wearable technologies like Google Glass the debate as to whether we need these ‘intrusive’ technologies is back.

Mobile cam phones

When mobile phone technology was quickly embraced by commercial enterprise, it successfully generated a massive ‘conditioned response’ that everyone needed it. It was quickly and widely adopted despite privacy and security concerns being evident.

A camera was understood to be a tool for taking pictures when it was integrated with a mobile phone. The use of cameras for capturing bar-codes or QR Codes or as a substitute for photocopying or as script and image searching were unthinkable when the debate around the inclusion of cameras was being thrashed out. Many privacy and security concerns raised then were conveniently forgotten or overrun, others were down-played due to vested interests.

With general acceptance of cameras in phones notwithstanding, some security and privacy concerns are still valid, and are why some multinational companies that have 24/7 operations still do not allow employees to bring them into the work place.

Google Glass

Most of us probably know what Google Glass does and can conceive what it could do. Some of us might even have had a chance to use it by now. How this technology will ultimately be put to use up to our imagination—as generally happens with any new technology.

Some concerns around new technologies are proactively responded to by the industry, and once a healthy debate has formed, other concerns may be reactively addressed. But when such technologies are seen primarily as business opportunities—as we have seen in case of webcams and cam-phones and no doubt, Google Glass—it will become difficult to ensure that all valid concerns are addressed. Adoption will be driven ahead by the business opportunities it presents, regardless of concerns.

For a healthy debate to highlight valid concerns on privacy and security it is important to understand how the Google Glass technology could possibly be put to use:

  • Could Google Glass replace the GPS navigator in your car?
  • Can Google Glass potentially send live feeds to remote servers - possibly without the knowledge of the user?
  • Is someone who sits on the next table in a coffee shop is possibly stealing information?
  • Can Google Glass worn by a driver be used as a crash camera / accident recorder?
  • Do we need to step up our efforts to secure our mobile devices from attackers?

What are your thoughts?
Please feel free to comment below.

Join the CSO newsletter!

Error: Please check your email address.

Tags Google Glassprivacy

More about 24/7GoogleQR

Show Comments

Featured Whitepapers

Editor's Recommendations

Solution Centres

Stories by Dushyant Sattiraju

Latest Videos

  • 150x50

    CSO Webinar: Will your data protection strategy be enough when disaster strikes?

    Speakers: - Paul O’Connor, Engagement leader - Performance Audit Group, Victorian Auditor-General’s Office (VAGO) - Nigel Phair, Managing Director, Centre for Internet Safety - Joshua Stenhouse, Technical Evangelist, Zerto - Anthony Caruana, CSO MC & Moderator

    Play Video

  • 150x50

    CSO Webinar: The Human Factor - Your people are your biggest security weakness

    ​Speakers: David Lacey, Researcher and former CISO Royal Mail David Turner - Global Risk Management Expert Mark Guntrip - Group Manager, Email Protection, Proofpoint

    Play Video

  • 150x50

    CSO Webinar: Current ransomware defences are failing – but machine learning can drive a more proactive solution

    Speakers • Ty Miller, Director, Threat Intelligence • Mark Gregory, Leader, Network Engineering Research Group, RMIT • Jeff Lanza, Retired FBI Agent (USA) • Andy Solterbeck, VP Asia Pacific, Cylance • David Braue, CSO MC/Moderator What to expect: ​Hear from industry experts on the local and global ransomware threat landscape. Explore a new approach to dealing with ransomware using machine-learning techniques and by thinking about the problem in a fundamentally different way. Apply techniques for gathering insight into ransomware behaviour and find out what elements must go into a truly effective ransomware defence. Get a first-hand look at how ransomware actually works in practice, and how machine-learning techniques can pick up on its activities long before your employees do.

    Play Video

  • 150x50

    CSO Webinar: Get real about metadata to avoid a false sense of security

    Speakers: • Anthony Caruana – CSO MC and moderator • Ian Farquhar, Worldwide Virtual Security Team Lead, Gigamon • John Lindsay, Former CTO, iiNet • Skeeve Stevens, Futurist, Future Sumo • David Vaile - Vice chair of APF, Co-Convenor of the Cyberspace Law And Policy Community, UNSW Law Faculty This webinar covers: - A 101 on metadata - what it is and how to use it - Insight into a typical attack, what happens and what we would find when looking into the metadata - How to collect metadata, use this to detect attacks and get greater insight into how you can use this to protect your organisation - Learn how much raw data and metadata to retain and how long for - Get a reality check on how you're using your metadata and if this is enough to secure your organisation

    Play Video

  • 150x50

    CSO Webinar: How banking trojans work and how you can stop them

    CSO Webinar: How banking trojans work and how you can stop them Featuring: • John Baird, Director of Global Technology Production, Deutsche Bank • Samantha Macleod, GM Cyber Security, ME Bank • Sherrod DeGrippo, Director of Emerging Threats, Proofpoint (USA)

    Play Video

More videos

Blog Posts

Market Place