Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/2836041.2841216acmotherconferencesArticle/Chapter ViewAbstractPublication PagesmumConference Proceedingsconference-collections
poster

Understanding usage control requirements in pervasive memory augmentation systems

Published: 30 November 2015 Publication History

Abstract

Mobile and wearable devices allow people to capture different aspects of their life experiences (e.g. family holidays, work meetings, running activities, etc.) in the form of photos, videos, physiological data, etc. An interesting avenue to explore is the usage of such captured experiences to support and augment human memory. Experiences of different events can be used to generate retrieval memory cues in order to trigger recall of those recorded events. In addition, captured experiences can be shared with other (co-located) people of the same event. The focus of this work is on understanding the privacy challenges with regard to using and sharing captured experiences for memory augmentation purposes. With the ultimate goal of an usage control model for the protection of personal memory cues, here we provide insights on: how sharing captured experiences is different from sharing experiences in social media networks, and what are some challenges in designing an usage control model for memory cues.

References

[1]
Shane Ahern, Dean Eckles, Nathaniel S. Good, Simon King, Mor Naaman, and Rahul Nair. 2007. Over-exposed?: Privacy Patterns and Considerations in Online and Mobile Photo Sharing. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI '07). ACM, 357--366.
[2]
Michael C. Anderson, Robert A. Bjork, and Elizabeth L. Bjork. 1994. Remembering can cause forgetting: Retrieval dynamics in long-term memory. Journal of Experimental Psychology: Learning, Memory, and Cognition 20, 5 (1994), 1063--1087.
[3]
Vannevar Bush. 1967. As we may think. The growth of knowledge: readings on organization and retrieval of information (1967), 23--35.
[4]
Sabrina De Capitani di Vimercati, Stefano Paraboschi, and Pierangela Samarati. 2003. Access Control: Principles and Solutions. Softw. Pract. Exper. 33, 5 (April 2003), 397--421.
[5]
Daniel A. Epstein, James Fogarty, and Sean A. Munson. 2014. Failures in Sharing Personal Data on Social Networking Sites. In Proceedings of the 2014 ACM International Joint Conference on Pervasive and Ubiquitous Computing: Adjunct Publication (UbiComp '14 Adjunct). ACM, New York, NY, USA, 695--698.
[6]
Patricia G. Lange. 2007. Publicly Private and Privately Public: Social Networking on YouTube. Journal of Computer-Mediated Communication 13, 1 (Oct. 2007), 361--380.
[7]
Jaehong Park and Ravi Sandhu. 2002. Towards Usage Control Models: Beyond Traditional Access Control. In Proceedings of the Seventh ACM Symposium on Access Control Models and Technologies (SACMAT '02). ACM, New York, NY, USA, 57--64.
[8]
Reza Rawassizadeh and A Min Tjoa. 2010. Securing Shareable Life-logs. IEEE, 1105--1110.
[9]
Janice Y. Tsai, Patrick Kelley, Paul Drielsma, Lorrie Faith Cranor, Jason Hong, and Norman Sadeh. 2009. Who's Viewed You?: The Impact of Feedback in a Mobile Location-sharing Application. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI '09). ACM, New York, NY, USA, 2003--2012.
[10]
Endel Tulving. 1985. Elements of Episodic Memory. (1985).
[11]
Jason Wiese, Patrick Gage Kelley, Lorrie Faith Cranor, Laura Dabbish, Jason I. Hong, and John Zimmerman. 2011. Are You Close with Me? Are You Nearby?: Investigating Social Groups, Closeness, and Willingness to Share. In Proceedings of the 13th International Conference on Ubiquitous Computing (UbiComp '11). ACM, New York, NY, USA, 197--206.

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Other conferences
MUM '15: Proceedings of the 14th International Conference on Mobile and Ubiquitous Multimedia
November 2015
442 pages
ISBN:9781450336055
DOI:10.1145/2836041
Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the Owner/Author.

Sponsors

  • FH OOE: University of Applied Sciences Upper Austria
  • Johannes Kepler Univ Linz: Johannes Kepler Universität Linz

In-Cooperation

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 30 November 2015

Check for updates

Author Tags

  1. episodic memory
  2. life-logging
  3. memory augmentation
  4. privacy
  5. sharing
  6. usage control

Qualifiers

  • Poster

Funding Sources

  • Future and Emerging Technologies (FET)

Conference

MUM '15
Sponsor:
  • FH OOE
  • Johannes Kepler Univ Linz

Acceptance Rates

MUM '15 Paper Acceptance Rate 33 of 89 submissions, 37%;
Overall Acceptance Rate 190 of 465 submissions, 41%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • 0
    Total Citations
  • 84
    Total Downloads
  • Downloads (Last 12 months)9
  • Downloads (Last 6 weeks)1
Reflects downloads up to 14 Oct 2024

Other Metrics

Citations

View Options

Get Access

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media