Researchers propose gathering personal data by tracking people's activities at home through home network interactions.
Undeterred by the persistent worries of privacy advocates and government officials that it knows too much, Google hungers for more data. To augment the information the company collects from its users online -- the links they click, the searches they make, and related metrics -- Google's researchers are looking beyond the Internet.
A recent paper co-authored by Google researcher Bill N. Schilit, and computer scientists Jeonghwa Yang (Georgia Tech) and David W. McDonald (University of Washington) proposes "home activity recognition," or tracking people's activities at home through home network interactions.
"Activity recognition is a key feature of many ubiquitous computing applications ranging from office worker tracking to home health care," the paper explains. "In general, activity recognition systems unobtrusively observe the behavior of people and characteristics of their environments, and, when necessary, take actions in response -- ideally with little explicit user direction."
The goal of such monitoring might be to "remind users to perform missed activities or complete actions (like taking medicine), help them recall information, or encourage them to act more safely," the paper suggests.
As applied to the elderly, such monitoring might seem entirely sensible. Others might find such oversight Orwellian.
Is it comforting or frightening to think of Google looking after one's health? "Information about household activities can even be used to recommend changes in behavior -- for example, to reduce TV viewing and spend more time playing aerobic games on the Wii," the paper suggests.
Just wait for the pop-up menu that says, "Type faster, porky."
Whether the future Google is exploring is benevolent, malevolent or just the way things will be, such a scheme raises questions about sanctity of the data describing one's activities at home. How would that data be protected? Who would have access to it? What would prevent it from being subpoenaed or stolen?
How Enterprises Are Attacking the IT Security EnterpriseTo learn more about what organizations are doing to tackle attacks and threats we surveyed a group of 300 IT and infosec professionals to find out what their biggest IT security challenges are and what they're doing to defend against today's threats. Download the report to see what they're saying.
Digital Transformation Myths & TruthsTransformation is on every IT organization's to-do list, but effectively transforming IT means a major shift in technology as well as business models and culture. In this IT Trend Report, we examine some of the misconceptions of digital transformation and look at steps you can take to succeed technically and culturally.