{"id":29,"date":"2010-01-07T05:09:11","date_gmt":"2010-01-07T10:09:11","guid":{"rendered":"http:\/\/blogs.law.harvard.edu\/difficultprobs\/?p=29"},"modified":"2011-01-04T17:13:58","modified_gmt":"2011-01-04T22:13:58","slug":"is-government-use-of-ubicomp-ethical","status":"publish","type":"post","link":"https:\/\/archive.blogs.harvard.edu\/difficultprobs\/2010\/01\/07\/is-government-use-of-ubicomp-ethical\/","title":{"rendered":"Is government use of UbiComp ethical?"},"content":{"rendered":"<p>A government seeks to identify its dissidents. This government has a pre-existing cache of photos linked to names and addresses, for the national identity card system. They also have reasonably high quality images and video footage from a recent protest. The government, theoretically, could ask participants in UbiComp sites to determine gender and age-range features of the identification photographs, and then ask users to match faces with high accuracy, speed and low cost. This would, of course, help the government investigate and track down their dissenters.<\/p>\n<p>Does this change your opinion on Human Ubiquitous Computing? How so? What might companies do to guard against this type of action while maintaining their full functionality? Should the participants in UbiComp platforms be required to understand the end goals of their jobs?<\/p>\n","protected":false},"excerpt":{"rendered":"<p>A government seeks to identify its dissidents. This government has a pre-existing cache of photos linked to names and addresses, for the national identity card system. They also have reasonably high quality images and video footage from a recent protest. The government, theoretically, could ask participants in UbiComp sites to determine gender and age-range features [&hellip;]<\/p>\n","protected":false},"author":2181,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4852],"tags":[],"class_list":["post-29","post","type-post","status-publish","format-standard","hentry","category-ubiquitous-human-computing"],"jetpack_featured_media_url":"","_links":{"self":[{"href":"https:\/\/archive.blogs.harvard.edu\/difficultprobs\/wp-json\/wp\/v2\/posts\/29","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/archive.blogs.harvard.edu\/difficultprobs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/archive.blogs.harvard.edu\/difficultprobs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/archive.blogs.harvard.edu\/difficultprobs\/wp-json\/wp\/v2\/users\/2181"}],"replies":[{"embeddable":true,"href":"https:\/\/archive.blogs.harvard.edu\/difficultprobs\/wp-json\/wp\/v2\/comments?post=29"}],"version-history":[{"count":3,"href":"https:\/\/archive.blogs.harvard.edu\/difficultprobs\/wp-json\/wp\/v2\/posts\/29\/revisions"}],"predecessor-version":[{"id":120,"href":"https:\/\/archive.blogs.harvard.edu\/difficultprobs\/wp-json\/wp\/v2\/posts\/29\/revisions\/120"}],"wp:attachment":[{"href":"https:\/\/archive.blogs.harvard.edu\/difficultprobs\/wp-json\/wp\/v2\/media?parent=29"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/archive.blogs.harvard.edu\/difficultprobs\/wp-json\/wp\/v2\/categories?post=29"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/archive.blogs.harvard.edu\/difficultprobs\/wp-json\/wp\/v2\/tags?post=29"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}