Home > Research > Publications & Outputs > Security and privacy implications of pervasive ...

Links

Text available via DOI:

View graph of relations

Security and privacy implications of pervasive memory augmentation

Research output: Contribution to Journal/MagazineJournal articlepeer-review

Published

Standard

Security and privacy implications of pervasive memory augmentation. / Davies, Nigel; Friday, Adrian; Clinch, Sarah et al.
In: IEEE Pervasive Computing, Vol. 14, No. 1, 04.02.2015, p. 44-53.

Research output: Contribution to Journal/MagazineJournal articlepeer-review

Harvard

APA

Vancouver

Davies N, Friday A, Clinch S, Sas C, Langheinrich M, Ward G et al. Security and privacy implications of pervasive memory augmentation. IEEE Pervasive Computing. 2015 Feb 4;14(1):44-53. doi: 10.1109/MPRV.2015.13

Author

Davies, Nigel ; Friday, Adrian ; Clinch, Sarah et al. / Security and privacy implications of pervasive memory augmentation. In: IEEE Pervasive Computing. 2015 ; Vol. 14, No. 1. pp. 44-53.

Bibtex

@article{fb562a273241491ab63d5028b39692bb,
title = "Security and privacy implications of pervasive memory augmentation",
abstract = "Pervasive computing is beginning to offer the potential to re-think and re-define how technology can support human memory augmentation. For example, the emergence of wide-spread pervasive sensing, personal recording technologies and systems for quantified self are creating an environmentin which it is possible to capture fine-grained traces of many aspects of human activity. Contemporary psychology theories suggest that these traces can then be used to manipulate our ability to recall, i.e. to both re-enforce and attenuatehuman memories. In this paper we consider the privacy and security implications of using pervasive computing to augment human memory. We describe a number of scenarios, outline the key architectural building blocks and identify entirely new types of security and privacy threats – namely those related to data security (experience provenance), data management (establishing new paradigms for digital memory ownership), data integrity (memory attenuation and recall induced forgetting), and bystander privacy. Together these threats present compelling research challenges for the pervasive computing research community. ",
author = "Nigel Davies and Adrian Friday and Sarah Clinch and Corina Sas and Marc Langheinrich and Geoff Ward and Albrecht Schmidt",
year = "2015",
month = feb,
day = "4",
doi = "10.1109/MPRV.2015.13",
language = "English",
volume = "14",
pages = "44--53",
journal = "IEEE Pervasive Computing",
issn = "1536-1268",
publisher = "Institute of Electrical and Electronics Engineers Inc.",
number = "1",

}

RIS

TY - JOUR

T1 - Security and privacy implications of pervasive memory augmentation

AU - Davies, Nigel

AU - Friday, Adrian

AU - Clinch, Sarah

AU - Sas, Corina

AU - Langheinrich, Marc

AU - Ward, Geoff

AU - Schmidt, Albrecht

PY - 2015/2/4

Y1 - 2015/2/4

N2 - Pervasive computing is beginning to offer the potential to re-think and re-define how technology can support human memory augmentation. For example, the emergence of wide-spread pervasive sensing, personal recording technologies and systems for quantified self are creating an environmentin which it is possible to capture fine-grained traces of many aspects of human activity. Contemporary psychology theories suggest that these traces can then be used to manipulate our ability to recall, i.e. to both re-enforce and attenuatehuman memories. In this paper we consider the privacy and security implications of using pervasive computing to augment human memory. We describe a number of scenarios, outline the key architectural building blocks and identify entirely new types of security and privacy threats – namely those related to data security (experience provenance), data management (establishing new paradigms for digital memory ownership), data integrity (memory attenuation and recall induced forgetting), and bystander privacy. Together these threats present compelling research challenges for the pervasive computing research community.

AB - Pervasive computing is beginning to offer the potential to re-think and re-define how technology can support human memory augmentation. For example, the emergence of wide-spread pervasive sensing, personal recording technologies and systems for quantified self are creating an environmentin which it is possible to capture fine-grained traces of many aspects of human activity. Contemporary psychology theories suggest that these traces can then be used to manipulate our ability to recall, i.e. to both re-enforce and attenuatehuman memories. In this paper we consider the privacy and security implications of using pervasive computing to augment human memory. We describe a number of scenarios, outline the key architectural building blocks and identify entirely new types of security and privacy threats – namely those related to data security (experience provenance), data management (establishing new paradigms for digital memory ownership), data integrity (memory attenuation and recall induced forgetting), and bystander privacy. Together these threats present compelling research challenges for the pervasive computing research community.

U2 - 10.1109/MPRV.2015.13

DO - 10.1109/MPRV.2015.13

M3 - Journal article

VL - 14

SP - 44

EP - 53

JO - IEEE Pervasive Computing

JF - IEEE Pervasive Computing

SN - 1536-1268

IS - 1

ER -