Final published version
Research output: Contribution to Journal/Magazine › Journal article › peer-review
Research output: Contribution to Journal/Magazine › Journal article › peer-review
}
TY - JOUR
T1 - Security and privacy implications of pervasive memory augmentation
AU - Davies, Nigel
AU - Friday, Adrian
AU - Clinch, Sarah
AU - Sas, Corina
AU - Langheinrich, Marc
AU - Ward, Geoff
AU - Schmidt, Albrecht
PY - 2015/2/4
Y1 - 2015/2/4
N2 - Pervasive computing is beginning to offer the potential to re-think and re-define how technology can support human memory augmentation. For example, the emergence of wide-spread pervasive sensing, personal recording technologies and systems for quantified self are creating an environmentin which it is possible to capture fine-grained traces of many aspects of human activity. Contemporary psychology theories suggest that these traces can then be used to manipulate our ability to recall, i.e. to both re-enforce and attenuatehuman memories. In this paper we consider the privacy and security implications of using pervasive computing to augment human memory. We describe a number of scenarios, outline the key architectural building blocks and identify entirely new types of security and privacy threats – namely those related to data security (experience provenance), data management (establishing new paradigms for digital memory ownership), data integrity (memory attenuation and recall induced forgetting), and bystander privacy. Together these threats present compelling research challenges for the pervasive computing research community.
AB - Pervasive computing is beginning to offer the potential to re-think and re-define how technology can support human memory augmentation. For example, the emergence of wide-spread pervasive sensing, personal recording technologies and systems for quantified self are creating an environmentin which it is possible to capture fine-grained traces of many aspects of human activity. Contemporary psychology theories suggest that these traces can then be used to manipulate our ability to recall, i.e. to both re-enforce and attenuatehuman memories. In this paper we consider the privacy and security implications of using pervasive computing to augment human memory. We describe a number of scenarios, outline the key architectural building blocks and identify entirely new types of security and privacy threats – namely those related to data security (experience provenance), data management (establishing new paradigms for digital memory ownership), data integrity (memory attenuation and recall induced forgetting), and bystander privacy. Together these threats present compelling research challenges for the pervasive computing research community.
U2 - 10.1109/MPRV.2015.13
DO - 10.1109/MPRV.2015.13
M3 - Journal article
VL - 14
SP - 44
EP - 53
JO - IEEE Pervasive Computing
JF - IEEE Pervasive Computing
SN - 1536-1268
IS - 1
ER -