Google Is Watching, Perhaps Soon In Your Home - InformationWeek
IoT
IoT
Mobile // Mobile Applications
News
7/10/2008
08:18 PM
Connect Directly
Google+
LinkedIn
Twitter
RSS
E-Mail
50%
50%

Google Is Watching, Perhaps Soon In Your Home

Researchers propose gathering personal data by tracking people's activities at home through home network interactions.

Undeterred by the persistent worries of privacy advocates and government officials that it knows too much, Google hungers for more data. To augment the information the company collects from its users online -- the links they click, the searches they make, and related metrics -- Google's researchers are looking beyond the Internet.

A recent paper co-authored by Google researcher Bill N. Schilit, and computer scientists Jeonghwa Yang (Georgia Tech) and David W. McDonald (University of Washington) proposes "home activity recognition," or tracking people's activities at home through home network interactions.

"Activity recognition is a key feature of many ubiquitous computing applications ranging from office worker tracking to home health care," the paper explains. "In general, activity recognition systems unobtrusively observe the behavior of people and characteristics of their environments, and, when necessary, take actions in response -- ideally with little explicit user direction."

The goal of such monitoring might be to "remind users to perform missed activities or complete actions (like taking medicine), help them recall information, or encourage them to act more safely," the paper suggests.

As applied to the elderly, such monitoring might seem entirely sensible. Others might find such oversight Orwellian.

Is it comforting or frightening to think of Google looking after one's health? "Information about household activities can even be used to recommend changes in behavior -- for example, to reduce TV viewing and spend more time playing aerobic games on the Wii," the paper suggests.

Just wait for the pop-up menu that says, "Type faster, porky."

Whether the future Google is exploring is benevolent, malevolent or just the way things will be, such a scheme raises questions about sanctity of the data describing one's activities at home. How would that data be protected? Who would have access to it? What would prevent it from being subpoenaed or stolen?

Previous
1 of 2
Next
Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
How Enterprises Are Attacking the IT Security Enterprise
How Enterprises Are Attacking the IT Security Enterprise
To learn more about what organizations are doing to tackle attacks and threats we surveyed a group of 300 IT and infosec professionals to find out what their biggest IT security challenges are and what they're doing to defend against today's threats. Download the report to see what they're saying.
Register for InformationWeek Newsletters
White Papers
Current Issue
Digital Transformation Myths & Truths
Transformation is on every IT organization's to-do list, but effectively transforming IT means a major shift in technology as well as business models and culture. In this IT Trend Report, we examine some of the misconceptions of digital transformation and look at steps you can take to succeed technically and culturally.
Video
Slideshows
Twitter Feed
Sponsored Live Streaming Video
Everything You've Been Told About Mobility Is Wrong
Attend this video symposium with Sean Wisdom, Global Director of Mobility Solutions, and learn about how you can harness powerful new products to mobilize your business potential.
Flash Poll