737
Views
14
CrossRef citations to date
0
Altmetric
Articles

Towards sharing life-log information with society

Pages 1057-1067 | Received 12 Dec 2009, Accepted 09 Jul 2010, Published online: 10 Feb 2011

References

  • Addis , M. E. and Carpenter , K. M. 1999 . Why, why, why?: Reason-giving and rumination as predictors of response to activation and insight-oriented treatment rationales . Journal of Clinical Psychology , 55 ( 7 ) : 881 – 894 .
  • Allen , A. L. 2007 . Dredging-up the past: lifelogging, memory and surveillance . The University of Chicago Law Review , 75 ( 1 ) : 47 – 74 .
  • Babcock , B. Models and issues in data stream systems . PODS '02: Proceedings of the twenty-first ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems . pp. 1 – 16 . New York : ACM .
  • Baloi , D. and Price , A. D.F. 2003 . Modeling global risk factors affecting construction cost performance . International Journal of Project Management , 21 ( 4 ) : 261 – 269 .
  • Bell , G. and Gemmell , J. 2009 . Total recall: how the E-memory revolution will change everything , USA : Dutton Adult .
  • Bentham , J. 1995 . The Panopticon Writings , 29 – 95 . London : Verso .
  • Boyd , D. M. and Ellison , N. B. 2007 . Social network sites: definition, history, and scholarship . Journal of Computer-Mediated Communication , 13 ( 1 ) : 210 – 230 .
  • Breslin , J. and Decker , S. 2007 . The future of social networks on the internet: the need for semantics . IEEE Internet Computing , 11 ( 6 ) : 86 – 90 .
  • Bush , V. 1945 . “ As we may think ” . In The Atlantic Available from: http://www.theatlantic.com/magazine/archive/1969/12/as-we-may-think/3881 [Accessed 10 October 2010]
  • Carlson , S. 2007 . On the record, all the time . Chronicle of Higher Education , Available from: http://chronicle.com/article/On-The-Record-All-the-Time/10391 [Accessed 10 October 2010]
  • Clark , D. 2010 . Internet predications, fighting over the future of internet . IEEE Internet Computing , 14 ( 1 ) : 22 – 23 .
  • Clarkson , B. P. 2002 . Life patterns: structure from wearable sensors , Thesis (PhD). Department of Electrical Engineering and Computer Science, Massachusetts Institute of Technology .
  • Collins , W. R. 1994 . How good is good enough? An ethical analysis of software construction and use . Communication of ACM , 27 ( 1 ) : 81 – 91 .
  • Directive 2006/24/EC . 2006 . Directive 2006/24/EC of the European parliament and of the council . Official Journal of European Union , : 54 – 63 . OJ L 105
  • Dodge , M. and Kitchin , R. 2007 . ‘Outlines of a world coming into existence’: pervasive computing and the ethics of forgetting . Environment and Planning B: Planning and Design , 34 ( 3 ) : 431 – 445 .
  • Eagle , N. 2008 . Behavioral inference across cultures: using telephones as a cultural lens . IEEE Intelligent Systems , 23 ( 4 ) : 62 – 64 .
  • Eagle , N. and Pentland , A. 2005 . Social serendipity: mobilizing social software . IEEE Pervasive Computing , 4 ( 2 ) : 28 – 34 .
  • Eagle , N. and Pentland , A. 2006 . Reality mining: sensing complex social systems . Personal and Ubiquitous Computing , 10 ( 4 ) : 255 – 268 .
  • Eagle , N. and Pentland , A. 2009 . Eigenbehaviors: identifying structure in routine . Behavioral Ecology and Sociobiology , 63 : 1057 – 1066 .
  • FCC . 2005 . CALEA [online] Available from: http://www.fcc. gov/calea [Accessed 10 October 2009]
  • Fitzgibbon , A. and Reiter , E . 2003 . Memories for life: managing information over a human lifetime . UK Computing Research Committee Grand Challenge proposal , 22 : 13 – 16 .
  • Foucault , M. 1977 . Discipline and punish: the birth of the prison , New York : Vintage Books . Translated by Alan Sheridan
  • Fried , C. 1968 . Privacy: a moral analysis . Yale Law Journal , 77 ( 1 ) : 475 – 493 .
  • Gemmell , J. MyLifeBits: fulfilling the Memex vision . MULTIMEDIA '02: Proceedings of the tenth ACM international Conference on Multimedia . pp. 235 – 238 . New York : ACM .
  • Gibbs , S. , Breiteneder , C. and Tsichritzis , D. Data modeling of time-based media . SIGMOD '94: Proceedings of the 1994 ACM SIGMOD international conference on Management of data . pp. 91 – 102 . New York : ACM .
  • Gross , R. , Acquisti , A. and Heinz , H. J. Information revelation and privacy in online social networks . WPES '05: Proceedings of the 2005 ACM workshop on Privacy in the electronic society . pp. 71 – 80 . New York : ACM .
  • Legacy Locker . 2009 . Legacy locker [online] Available from: http://legacylocker.com [Accessed 12 September 2009]
  • Lyon , D. 2003 . Surveillance after September 11 , Blackwell Publishing Ltd., Polity Press, UK .
  • Mann , S. , Nolan , J. and Wellman , B. 2003 . Sousveillance: inventing and using wearable computing devices to challenge surveillance . Surveillance and Society , 1 ( 3 ) : 332 – 355 .
  • Miller , J. 2008 . Who are you? the trade-off between information utility and privacy . IEEE Internet Computing , 12 ( 4 ) : 93 – 96 .
  • Mislove , A. Measurement and analysis of online social networks . Proceedings of the 7th ACM SIGCOMM conference on Internet measurement . pp. 29 – 42 . New York : ACM .
  • Moor , J. H. 1985 . What is computer ethics? . Metaphilosophy , 16 ( 4 ) : 266 – 275 .
  • Moor , J. H. 2005 . Why we need better ethics for emerging technologies . Ethics and Information Technology , 7 ( 3 ) : 111 – 119 .
  • Morris , M. and Guilak , F. 2009 . Mobile heart health: project highlight . IEEE Pervasive Computing , 8 ( 2 ) : 57 – 61 .
  • Nov , O. and Wattal , S. Social computing privacy concerns: antecedents and effects . CHI '09: Proceedings of the 27th international conference on Human factors in computing systems . pp. 333 – 336 .
  • O'Hara , K. , Tuffield , M. and Shadbolt , N. 2009 . Lifelogging: privacy and empowerment with memories for life . Identity in the Information Society , 1 ( 1 ) : 155 – 172 .
  • Parameswaran , M. and Whinston , A. B. 2007 . Social computing: an overview . Communications of the Association for Information Systems , 19 : 762 – 780 .
  • Rawls , J. 1971 . A theory of justice , Cambridge , Massachusetts : Harvard University Press .
  • Schacter , D. 2001 . The seven sins of memory. How the mind forgets and remembers , New York : Houghton Mifflin .
  • Schneier , B. 2009 . Taxonomy of social networking and privacy [online] Available from: http://cyberlaw.stanford. edu/node/6381 [Accessed 24 June 2010]
  • Sellen , A. J. Do life-logging technologies support memory for the past? An experimental study using SenseCam . CHI '07: Proceedings of the SIGCHI conference on Human factors in computing systems . pp. 81 – 90 . New York : ACM .
  • Shachtman , N. 2003 . A spy machine of DARPA's dreams [online] Available from: http://www.wired.com/print/techbiz/media/news/2003/05/58909 [Accessed 8 September 2009]
  • Strahilevitz , L. 2005 . A social networks theory of privacy . The University of Chicago Law Review , 72 : 919–988
  • Tah , J. H.M. , Thorpe , A. and McCaffer , R. 1996 . Contractor project risks contingency allocation using linguistic approximation . Engineering, Construction and Architectural Management , 3 ( 4 ) : 251 – 269 .
  • Time . 2009 . Tools for managing your online life after death [online] Available from: http://www.time.com/time/specials/packages/completelist/0,29569,1920156,00. html [Accessed 12 September 2009]
  • Wood , D. M. and Ball , K. 2006 . A report on the surveillance society: public discussion document , London : Office of the Information Commissioner .
  • Zanoj , R. B. 1965 . Social facilitation . Science , 149 ( 3681 ) : 269 – 274 .
  • Zimbardo , P. G. and Leippe , M. R. 1991 . The psychology of attitude change and social influence , New York : McGraw-Hill .

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.