  {"id":28993,"date":"2018-11-12T22:53:33","date_gmt":"2018-11-13T03:53:33","guid":{"rendered":"https:\/\/digital.hbs.edu\/platform-rctom\/submission\/two-hours-prior-bringing-machine-learning-to-the-us-department-of-homeland-security\/"},"modified":"2018-11-12T22:53:33","modified_gmt":"2018-11-13T03:53:33","slug":"hurry-up-and-wait-bringing-machine-learning-to-the-us-department-of-homeland-security","status":"publish","type":"hck-submission","link":"https:\/\/d3.harvard.edu\/platform-rctom\/submission\/hurry-up-and-wait-bringing-machine-learning-to-the-us-department-of-homeland-security\/","title":{"rendered":"Hurry Up and Wait: Bringing Machine Learning to the US Department of Homeland Security"},"content":{"rendered":"<p>Imagine arriving at a major US airport 30 minutes before boarding time, checking a bag, proceeding through security and arriving at the gate with time to spare for a coffee.\u00a0 This utopia is not beyond the grasp of reality as we explore the potential impact of machine learning on the airport check-in and security processes.<\/p>\n<p>In 2017 the US airline industry net operating revenues were in excess of $175 Billion [1].\u00a0 With air travel expected to increase in the coming years, this industry is marked by fierce competition.\u00a0 One area in which the major contenders are investing is machine learning with hopes of improving customer service, logistics, and bag checking [2].\u00a0 The competitiveness of this market will undoubtedly drive rapid innovation and implementation, which leaves the government run security screening as the most likely bottleneck in the process of getting from the airport entrance to your aircraft seat.<\/p>\n<h3><strong>Current Security Screening Process<\/strong><\/h3>\n<p>The Transportation Security Administration (TSA), which is a subset of the Department of Homeland Security (DHS), is responsible for security screening at US airports.\u00a0 At airport security checkpoints, the TSA places several employees along with equipment (x-ray machines, metal detectors, cameras, etc.) to screen each passenger.\u00a0 Figure 1 shows the process flow diagram for a single passenger passing through a TSA security checkpoint.\u00a0 The process depicted begins after the passenger\u2019s ID and boarding pass have been checked.<\/p>\n<p><figure id=\"attachment_28973\" aria-describedby=\"caption-attachment-28973\" style=\"width: 579px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/d3.harvard.edu\/platform-rctom\/wp-content\/uploads\/sites\/4\/2018\/11\/Security-Process.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-28973 size-full\" src=\"https:\/\/d3.harvard.edu\/platform-rctom\/wp-content\/uploads\/sites\/4\/2018\/11\/Security-Process.jpg\" alt=\"\" width=\"579\" height=\"332\" srcset=\"https:\/\/d3.harvard.edu\/platform-rctom\/wp-content\/uploads\/sites\/4\/2018\/11\/Security-Process.jpg 579w, https:\/\/d3.harvard.edu\/platform-rctom\/wp-content\/uploads\/sites\/4\/2018\/11\/Security-Process-300x172.jpg 300w\" sizes=\"auto, (max-width: 579px) 100vw, 579px\" \/><\/a><figcaption id=\"caption-attachment-28973\" class=\"wp-caption-text\">Figure 1: Airport Security Check Point Flow Chart.\u00a0 Source: Journal of Air Transport Management [3].<\/figcaption><\/figure>As denoted by the worker symbols, human interaction is required at multiple points in the process.\u00a0 Many of these decision points, such as ID\/boarding pass check and X-ray screening, are both time consuming and susceptible to human error.<\/p>\n<h3><strong>Progress<\/strong><\/h3>\n<p>Fortunately, this process is ripe for machine learning intervention, and DHS has taken notice.\u00a0 In 2017 DHS teamed up with Google to introduce a $1.5 million contest to build computer algorithms that can automatically identify concealed items at airport security checkpoints [4].\u00a0 Furthermore, DHS is working with technology companies to develop CT systems that can automatically identify items hidden in luggage while using neural networks to be adaptive in the face of emerging threats [4].<\/p>\n<p>DHS has even developed an open source web application known as Global Travel Assessment System (GTAS).\u00a0 Developed in response to UN Resolution 2178, GTAS is meant to improve \u201cGlobal Security by using industry-standard Advance Passenger Information (API) to screen commercial air travelers.\u201d [5]\u00a0 Specific data used for algorithm targeting includes:<\/p>\n<p><figure id=\"attachment_29239\" aria-describedby=\"caption-attachment-29239\" style=\"width: 767px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/d3.harvard.edu\/platform-rctom\/wp-content\/uploads\/sites\/4\/2018\/11\/Table1.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-29239\" src=\"https:\/\/d3.harvard.edu\/platform-rctom\/wp-content\/uploads\/sites\/4\/2018\/11\/Table1.jpg\" alt=\"\" width=\"767\" height=\"211\" srcset=\"https:\/\/d3.harvard.edu\/platform-rctom\/wp-content\/uploads\/sites\/4\/2018\/11\/Table1.jpg 894w, https:\/\/d3.harvard.edu\/platform-rctom\/wp-content\/uploads\/sites\/4\/2018\/11\/Table1-300x83.jpg 300w, https:\/\/d3.harvard.edu\/platform-rctom\/wp-content\/uploads\/sites\/4\/2018\/11\/Table1-768x211.jpg 768w, https:\/\/d3.harvard.edu\/platform-rctom\/wp-content\/uploads\/sites\/4\/2018\/11\/Table1-600x165.jpg 600w\" sizes=\"auto, (max-width: 767px) 100vw, 767px\" \/><\/a><figcaption id=\"caption-attachment-29239\" class=\"wp-caption-text\">Table 1: API data collected that GTAS uses for targeting. Source: GTAS [5].<\/figcaption><\/figure>Earlier this year, DHS Science and Technology Directorate announced that it had paid $200,000 to DataRobot, Inc. to begin testing a machine learning platform for the US Customs and Border Protection\u2019s GTAS [6].\u00a0 The idea is to simplify the user experience and lower the requirement for a large team of data scientists while still producing increasingly accurate predictive models [6].<\/p>\n<h3><strong>Concerns<\/strong><\/h3>\n<p>As is the case with all emerging technology that impacts human safety, there are concerns with implementation.\u00a0 As we have seen, the current phase of artificial intelligence is statistically impressive, but often individually unreliable.\u00a0 Machines simply make mistakes that a human never would (recall IBM Watson\u2019s response of \u201cToronto\u201d while answering a question about US Cities on the game show <em>Jeopardy<\/em>).\u00a0 While playing a game, those mistakes are funny, but at an airport security checkpoint the humor falls short.<\/p>\n<p>Current machine learning technology is also susceptible to \u201ctargeted distortion.\u201d [7]\u00a0 In Figure 2 below, a machine learning system that had been taught to recognize images, correctly identified the image on the left as a panda.\u00a0 However, an engineer with knowledge of the algorithm overlaid the panda image with the center image.\u00a0 The result was the image on the right, which looks the same to the human eye, but caused the algorithm to incorrectly identify the image as a gibbon.<\/p>\n<figure id=\"attachment_28974\" aria-describedby=\"caption-attachment-28974\" style=\"width: 668px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/d3.harvard.edu\/platform-rctom\/wp-content\/uploads\/sites\/4\/2018\/11\/Panda.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-28974\" src=\"https:\/\/d3.harvard.edu\/platform-rctom\/wp-content\/uploads\/sites\/4\/2018\/11\/Panda.jpg\" alt=\"\" width=\"668\" height=\"266\" srcset=\"https:\/\/d3.harvard.edu\/platform-rctom\/wp-content\/uploads\/sites\/4\/2018\/11\/Panda.jpg 1000w, https:\/\/d3.harvard.edu\/platform-rctom\/wp-content\/uploads\/sites\/4\/2018\/11\/Panda-300x119.jpg 300w, https:\/\/d3.harvard.edu\/platform-rctom\/wp-content\/uploads\/sites\/4\/2018\/11\/Panda-768x306.jpg 768w, https:\/\/d3.harvard.edu\/platform-rctom\/wp-content\/uploads\/sites\/4\/2018\/11\/Panda-600x239.jpg 600w\" sizes=\"auto, (max-width: 668px) 100vw, 668px\" \/><\/a><figcaption id=\"caption-attachment-28974\" class=\"wp-caption-text\">Figure 2: Targeted Distortion. Source: DARPA [7].<\/figcaption><\/figure>\n<h3><strong>Moving Forward<\/strong><\/h3>\n<p>DHS should implement machine learning at airport security checkpoints in order to\u00a0improve the current standard of ID matching and hidden object detection while simultaneously reducing the time it takes passengers to get through the security screening process.\u00a0 Even a <em>small reduction<\/em> in the number of false positives in the passenger and bag screening process would massively reduce the burden on both patrons and staff.<\/p>\n<p>To reduce public safety risk, DHS should begin implementation on a prescreened population, such as those travelers in TSA Precheck and Global Entry.\u00a0 Human monitoring and quality checks would further reduce the initial risk.\u00a0 As the algorithm adapts and trust is developed, the use case could spread to the entire air traveling population.\u00a0 Long term, DHS should consider applying the machine learning tool to other areas of airport security, such as suspicion behavior recognition and predictive demand algorithms to optimize staff allocation.<\/p>\n<h3><strong>Questions Remain<\/strong><\/h3>\n<ul>\n<li>What are the potential forms of machine learning manipulation and are they executable enough to pose a credible security risk?<\/li>\n<li>Referencing Table 1, how do we keep human bias from creeping into the model?<\/li>\n<\/ul>\n<p><em>(Word Count: 797)<\/em><\/p>\n<p>Sources:<\/p>\n<p>[1] Bureau of Transportation, \u201c2017 Annual and 4th Quarter U.S. Airline Financial Data,\u201d <a href=\"https:\/\/www.bts.gov\/newsroom\/2017-annual-and-4th-quarter-us-airline-financial-data\">https:\/\/www.bts.gov\/newsroom\/2017-annual-and-4th-quarter-us-airline-financial-data<\/a>, accessed Nov 2018.<\/p>\n<p>[2] Tech Emergence, \u201cHow the 4 Largest Airlines Use Artificial Intelligence,\u201d \u00a0<a href=\"https:\/\/www.techemergence.com\/airlines-use-artificial-intelligence\/\">https:\/\/www.techemergence.com\/airlines-use-artificial-intelligence\/<\/a>, accessed Nov 2018.<\/p>\n<p>[3] Kelly Leone, Rongfang (Rachel) Liu, \u201cImproving airport security screening checkpoint operations in the US via paced system design,\u201d <em>Journal of Air Transport Management<\/em>, Vol.17, No.2 (2011): 62-67.<\/p>\n<p>[4] The New York Times, \u201cUncle Sam Wants Your Deep Neural Networks,\u201d \u00a0<a href=\"https:\/\/www.nytimes.com\/2017\/06\/22\/technology\/homeland-security-artificial-intelligence-neural-network.html\">https:\/\/www.nytimes.com\/2017\/06\/22\/technology\/homeland-security-artificial-intelligence-neural-network.html<\/a>, accessed Nov 2018.<\/p>\n<p>[5] Global Travel Assessment System, \u201cWhat is GTAS?,\u201d <a href=\"https:\/\/us-cbp.github.io\/GTAS\/\">https:\/\/us-cbp.github.io\/GTAS\/<\/a>, accessed Nov 2018.<\/p>\n<p>[6] Department of Homeland Security, \u201cNews Release: DHS Awards Virginia Company $200K to Begin Automated Machine Learning Prototype Test,\u201d <a href=\"https:\/\/www.dhs.gov\/science-and-technology\/news\/2018\/08\/20\/news-release-dhs-awards-va-company-200k-begin-automated\">https:\/\/www.dhs.gov\/science-and-technology\/news\/2018\/08\/20\/news-release-dhs-awards-va-company-200k-begin-automated<\/a>, accessed Nov 2018.<\/p>\n<p>[7] Defense Advanced Research Projects Agency, \u201cDARPA Perspective on AI,\u201d <a href=\"https:\/\/www.darpa.mil\/about-us\/darpa-perspective-on-ai\">https:\/\/www.darpa.mil\/about-us\/darpa-perspective-on-ai<\/a>, accessed Nov 2018.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The US Department of Homeland Security is exploring machine learning.  The outcome could be increased security and shorter lines, but what are the risks?<\/p>\n","protected":false},"author":11258,"featured_media":30366,"comment_status":"open","ping_status":"closed","template":"","categories":[1869,943,108,1909,4392,4389,346,1777,4390,2297,4391],"class_list":["post-28993","hck-submission","type-hck-submission","status-publish","has-post-thumbnail","hentry","category-ai","category-airplane","category-airport","category-artificial-intelligence","category-global-entry","category-homeland-security","category-machine-learning","category-national-security","category-precheck","category-security","category-tsa","hck-taxonomy-organization-united-states-department-of-homeland-security","hck-taxonomy-industry-air-transportation","hck-taxonomy-country-united-states"],"connected_submission_link":"https:\/\/d3.harvard.edu\/platform-rctom\/assignment\/rc-tom-challenge-2018\/","yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Hurry Up and Wait: Bringing Machine Learning to the US Department of Homeland Security - Technology and Operations Management<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/d3.harvard.edu\/platform-rctom\/submission\/hurry-up-and-wait-bringing-machine-learning-to-the-us-department-of-homeland-security\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Hurry Up and Wait: Bringing Machine Learning to the US Department of Homeland Security - Technology and Operations Management\" \/>\n<meta property=\"og:description\" content=\"The US Department of Homeland Security is exploring machine learning. The outcome could be increased security and shorter lines, but what are the risks?\" \/>\n<meta property=\"og:url\" content=\"https:\/\/d3.harvard.edu\/platform-rctom\/submission\/hurry-up-and-wait-bringing-machine-learning-to-the-us-department-of-homeland-security\/\" \/>\n<meta property=\"og:site_name\" content=\"Technology and Operations Management\" \/>\n<meta property=\"og:image\" content=\"https:\/\/d3.harvard.edu\/platform-rctom\/wp-content\/uploads\/sites\/4\/2018\/11\/Long-Line-2.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"800\" \/>\n\t<meta property=\"og:image:height\" content=\"567\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/d3.harvard.edu\\\/platform-rctom\\\/submission\\\/hurry-up-and-wait-bringing-machine-learning-to-the-us-department-of-homeland-security\\\/\",\"url\":\"https:\\\/\\\/d3.harvard.edu\\\/platform-rctom\\\/submission\\\/hurry-up-and-wait-bringing-machine-learning-to-the-us-department-of-homeland-security\\\/\",\"name\":\"Hurry Up and Wait: Bringing Machine Learning to the US Department of Homeland Security - Technology and Operations Management\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/d3.harvard.edu\\\/platform-rctom\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/d3.harvard.edu\\\/platform-rctom\\\/submission\\\/hurry-up-and-wait-bringing-machine-learning-to-the-us-department-of-homeland-security\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/d3.harvard.edu\\\/platform-rctom\\\/submission\\\/hurry-up-and-wait-bringing-machine-learning-to-the-us-department-of-homeland-security\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/d3.harvard.edu\\\/platform-rctom\\\/wp-content\\\/uploads\\\/sites\\\/4\\\/2018\\\/11\\\/Long-Line-2.jpg\",\"datePublished\":\"2018-11-13T03:53:33+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/d3.harvard.edu\\\/platform-rctom\\\/submission\\\/hurry-up-and-wait-bringing-machine-learning-to-the-us-department-of-homeland-security\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/d3.harvard.edu\\\/platform-rctom\\\/submission\\\/hurry-up-and-wait-bringing-machine-learning-to-the-us-department-of-homeland-security\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/d3.harvard.edu\\\/platform-rctom\\\/submission\\\/hurry-up-and-wait-bringing-machine-learning-to-the-us-department-of-homeland-security\\\/#primaryimage\",\"url\":\"https:\\\/\\\/d3.harvard.edu\\\/platform-rctom\\\/wp-content\\\/uploads\\\/sites\\\/4\\\/2018\\\/11\\\/Long-Line-2.jpg\",\"contentUrl\":\"https:\\\/\\\/d3.harvard.edu\\\/platform-rctom\\\/wp-content\\\/uploads\\\/sites\\\/4\\\/2018\\\/11\\\/Long-Line-2.jpg\",\"width\":800,\"height\":567},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/d3.harvard.edu\\\/platform-rctom\\\/submission\\\/hurry-up-and-wait-bringing-machine-learning-to-the-us-department-of-homeland-security\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/d3.harvard.edu\\\/platform-rctom\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Submissions\",\"item\":\"https:\\\/\\\/d3.harvard.edu\\\/platform-rctom\\\/submission\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Hurry Up and Wait: Bringing Machine Learning to the US Department of Homeland Security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/d3.harvard.edu\\\/platform-rctom\\\/#website\",\"url\":\"https:\\\/\\\/d3.harvard.edu\\\/platform-rctom\\\/\",\"name\":\"Technology and Operations Management\",\"description\":\"MBA Student Perspectives\",\"potentialAction\":[{\"@type\":\"性视界Action\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/d3.harvard.edu\\\/platform-rctom\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Hurry Up and Wait: Bringing Machine Learning to the US Department of Homeland Security - Technology and Operations Management","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/d3.harvard.edu\/platform-rctom\/submission\/hurry-up-and-wait-bringing-machine-learning-to-the-us-department-of-homeland-security\/","og_locale":"en_US","og_type":"article","og_title":"Hurry Up and Wait: Bringing Machine Learning to the US Department of Homeland Security - Technology and Operations Management","og_description":"The US Department of Homeland Security is exploring machine learning. The outcome could be increased security and shorter lines, but what are the risks?","og_url":"https:\/\/d3.harvard.edu\/platform-rctom\/submission\/hurry-up-and-wait-bringing-machine-learning-to-the-us-department-of-homeland-security\/","og_site_name":"Technology and Operations Management","og_image":[{"width":800,"height":567,"url":"https:\/\/d3.harvard.edu\/platform-rctom\/wp-content\/uploads\/sites\/4\/2018\/11\/Long-Line-2.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/d3.harvard.edu\/platform-rctom\/submission\/hurry-up-and-wait-bringing-machine-learning-to-the-us-department-of-homeland-security\/","url":"https:\/\/d3.harvard.edu\/platform-rctom\/submission\/hurry-up-and-wait-bringing-machine-learning-to-the-us-department-of-homeland-security\/","name":"Hurry Up and Wait: Bringing Machine Learning to the US Department of Homeland Security - Technology and Operations Management","isPartOf":{"@id":"https:\/\/d3.harvard.edu\/platform-rctom\/#website"},"primaryImageOfPage":{"@id":"https:\/\/d3.harvard.edu\/platform-rctom\/submission\/hurry-up-and-wait-bringing-machine-learning-to-the-us-department-of-homeland-security\/#primaryimage"},"image":{"@id":"https:\/\/d3.harvard.edu\/platform-rctom\/submission\/hurry-up-and-wait-bringing-machine-learning-to-the-us-department-of-homeland-security\/#primaryimage"},"thumbnailUrl":"https:\/\/d3.harvard.edu\/platform-rctom\/wp-content\/uploads\/sites\/4\/2018\/11\/Long-Line-2.jpg","datePublished":"2018-11-13T03:53:33+00:00","breadcrumb":{"@id":"https:\/\/d3.harvard.edu\/platform-rctom\/submission\/hurry-up-and-wait-bringing-machine-learning-to-the-us-department-of-homeland-security\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/d3.harvard.edu\/platform-rctom\/submission\/hurry-up-and-wait-bringing-machine-learning-to-the-us-department-of-homeland-security\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/d3.harvard.edu\/platform-rctom\/submission\/hurry-up-and-wait-bringing-machine-learning-to-the-us-department-of-homeland-security\/#primaryimage","url":"https:\/\/d3.harvard.edu\/platform-rctom\/wp-content\/uploads\/sites\/4\/2018\/11\/Long-Line-2.jpg","contentUrl":"https:\/\/d3.harvard.edu\/platform-rctom\/wp-content\/uploads\/sites\/4\/2018\/11\/Long-Line-2.jpg","width":800,"height":567},{"@type":"BreadcrumbList","@id":"https:\/\/d3.harvard.edu\/platform-rctom\/submission\/hurry-up-and-wait-bringing-machine-learning-to-the-us-department-of-homeland-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/d3.harvard.edu\/platform-rctom\/"},{"@type":"ListItem","position":2,"name":"Submissions","item":"https:\/\/d3.harvard.edu\/platform-rctom\/submission\/"},{"@type":"ListItem","position":3,"name":"Hurry Up and Wait: Bringing Machine Learning to the US Department of Homeland Security"}]},{"@type":"WebSite","@id":"https:\/\/d3.harvard.edu\/platform-rctom\/#website","url":"https:\/\/d3.harvard.edu\/platform-rctom\/","name":"Technology and Operations Management","description":"MBA Student Perspectives","potentialAction":[{"@type":"性视界Action","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/d3.harvard.edu\/platform-rctom\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"}]}},"_links":{"self":[{"href":"https:\/\/d3.harvard.edu\/platform-rctom\/wp-json\/wp\/v2\/hck-submission\/28993","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/d3.harvard.edu\/platform-rctom\/wp-json\/wp\/v2\/hck-submission"}],"about":[{"href":"https:\/\/d3.harvard.edu\/platform-rctom\/wp-json\/wp\/v2\/types\/hck-submission"}],"author":[{"embeddable":true,"href":"https:\/\/d3.harvard.edu\/platform-rctom\/wp-json\/wp\/v2\/users\/11258"}],"replies":[{"embeddable":true,"href":"https:\/\/d3.harvard.edu\/platform-rctom\/wp-json\/wp\/v2\/comments?post=28993"}],"version-history":[{"count":0,"href":"https:\/\/d3.harvard.edu\/platform-rctom\/wp-json\/wp\/v2\/hck-submission\/28993\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/d3.harvard.edu\/platform-rctom\/wp-json\/wp\/v2\/media\/30366"}],"wp:attachment":[{"href":"https:\/\/d3.harvard.edu\/platform-rctom\/wp-json\/wp\/v2\/media?parent=28993"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/d3.harvard.edu\/platform-rctom\/wp-json\/wp\/v2\/categories?post=28993"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}