921
Views
13
CrossRef citations to date
0
Altmetric
Research Article

Evolving the Ecosystem of Personal Behavioral Data

REFERENCES

  • Abrams, J.J. (Producer & Director). (2009). Star trek [Motion picture]. United States: Paramount Pictures.
  • Ackerman, M. S., Cranor, L. F., & Reagle, J. (1999). Privacy in e-commerce: Examining user scenarios and privacy preferences. Proceedings of the 1999 ACM Conference on Electronic Commerce. New York, NY: ACM.
  • Adar, E., Karger, D., & Stein, L. A. (1999). Haystack: Per-user Information Environments. Proceedings of the 1999 International Conference on Information and Knowledge Management, New York, NY: ACM.
  • Aharony, N., Pan, W., Ip, C., Khayal, I., & Pentland, A. (2011). Social fMRI: Investigating and shaping social mechanisms in the real world. Pervasive and Mobile Computing, 7(6), 643–659. doi:10.1016/j.pmcj.2011.09.004
  • Ahern, S., Eckles, D., Good, N., King, S., Naaman, M., & Nair, R. (2007). Over-exposed? Privacy patterns and considerations in online and mobile photo sharing. Proceedings of the CHI 2007 Conference on Human Factors in Computer Systems. New York, NY: ACM.
  • Ammari, T., Kumar, P., Lampe, C., & Schoenebeck, S. (2015). Managing children’s online identities. Proceedings of the CHI 2015 Conference on Human Factors in Computer Systems. New York, NY: ACM.
  • Anderson, M. (2015). Technology device ownership: 2015. Pew Research Reports, 1–26. Retrieved from http://www.pewinternet.org/2015/10/29/technology-device-ownership-2015
  • Andrews, S., Ellis, D. A., Shaw, H., Piwek, L., MacKerron, G., Mourato, S., … Jenkins, R. (2015). Beyond self-report: Tools to compare estimated and real-world smartphone use. Plos One, 10(10), e0139004. doi:10.1371/journal.pone.0139004
  • Bell, G. (2001). A personal digital store. Communications of the ACM, 44(1), 86–91. doi:10.1145/357489.357513
  • Ben-Shimon, D., Friedman, M., Hoerle, J., Tsikinovsky, A., Gude, R., & Aluchanov, R. (2014). Deploying recommender system for the masses. Proceedings of the companion publication of the IUI 2014 International Conference on Intelligent User Interfaces. New York, NY: ACM.
  • Ben-Shimon, D., Rokach, L., Shani, G., & Shapira, B. (2016). Anytime Algorithms for Recommendation Service Providers. ACM Transactions on Intelligent Systems and Technology, 7(3), 1–26. doi:10.1145/2885506
  • Bobadilla, J., Ortega, F., Hernando, A., & Gutiérrez, A. (2013). Recommender systems survey. Knowledge-Based Systems, 46, 109–132. doi:10.1016/j.knosys.2013.03.012
  • Brandimarte, L., & Acquisti, A. (2012).The economics of privacy. In M. Peitz & J. Waldfogel (Eds.), The Oxford handbook of the digital economy (pp. 547–571). New York, NY: Oxford University Press.
  • Bush, V. (1945, July). As we may think. The Atlantic Monthly. Retrieved from https://www.theatlantic.com/magazine/archive/1945/07/as-we-may-think/303881/.
  • Cáceres, R., Cox, L., Lim, H., Shakimov, A., & Varshavsky, A. (2009). Virtual individual servers as privacy-preserving proxies for mobile devices. Proceedings of the 1st ACM workshop on Networking, Systems, and Applications for Mobile Handhelds. New York, NY: ACM.
  • Card, O. S. (1985). Ender’s game (Vol. 1). New York, NY: St. Martin’s Press.
  • Chilton, L. B., Little, G., Edge, D., Weld, D. S., & Landay, J. A. (2013). Cascade. Proceedings of the CHI 2013 Conference on Human Factors in Computer Systems. New York, NY: ACM.
  • Chu, D., Kansal, A., Liu, J., & Zhao, F. (2011). Mobile apps: It’s time to move up to CondOS. Proceedings of the HotOS 2011 Conference on Hot Topics in Operating Systems. Berkeley, CA: USENIX.
  • Consolvo, S., McDonald, D. W., Toscos, T., Chen, M. Y., Froehlich, J., Harrison, B., … Landay, J. A. (2008). Activity sensing in the wild: A field trial of ubifit garden. Proceedings of the CHI 2008 Conference on Human Factors in Computer Systems. New York, NY: ACM.
  • Crabtree, A., Lodge, T., Colley, J., Greenhalgh, C., Mortier, R., & Haddadi, H. (2016). Enabling the new economic actor: Data protection, the digital economy, and the Databox. Personal and Ubiquitous Computing, 20(6), 947–957. doi:10.1007/s00779-016-0939-3
  • Das, S., Hayashi, E., & Hong, J. I. (2013). Exploring capturable everyday memory for autobiographical authentication. Proceedings of the UbiComp 2013 Joint Conference on Pervasive and Ubiquitous Computing. New York, NY: ACM.
  • Das, S., Wiese, J., & Hong, J. I. (2016). Epistenet: Facilitating programmatic access & processing of semantically related mobile personal data. Proceedings of the MobileHCI 2016 International Conference on Human Computer Interaction with Mobile Devices and Services. New York, NY: ACM.
  • Davidoff, S., Ziebart, B. D., Zimmerman, J., & Dey, A. K. (2011). Learning patterns of pick-ups and drop-offs to support busy family coordination. Proceedings of the CHI 2011 Conference on Human Factors in Computer Systems. New York, NY: ACM.
  • de Montjoye, Y.-A., Shmueli, E., Wang, S. S., & Pentland, A. S. (2014). openPDS: Protecting the privacy of metadata through SafeAnswers. Plos One, 9(7), e98790. doi:10.1371/journal.pone.0098790
  • Dey, A. K., & Mankoff, J. (2005). Designing mediation for context-aware applications. ACM Transactions on Computer-Human Interaction, 12(1), 53–80. doi:10.1145/1057237
  • Dey, A., Salber, D., & Abowd, G. (2001). A conceptual framework and a toolkit for supporting the rapid prototyping of context-aware applications. Human-Computer Interaction, 16(2), 97–166. doi:10.1207/S15327051HCI16234_02
  • Dim, E., Kuflik, T., & Reinhartz-Berger, I. (2015). When user modeling intersects software engineering: The Info-bead user modeling approach. User Modeling and User-Adapted Interaction, 25(3), 189–229. doi:10.1007/s11257-015-9159-1
  • Doryab, A., Min, J. K., Wiese, J., Zimmerman, J., & Hong, J. I. (2014). Detection of behavior change in people with depression. AAAI Workshops at the Twenty-Eighth AAAI Conference on Artificial Intelligence. Palo Alto, CA: AAAI.
  • Dourish, P. (2001). Seeking a foundation for context-aware computing. Human–Computer Interaction, 16(2–4), 229–241. doi:10.1207/S15327051HCI16234_07
  • Ducheneaut, N., & Bellotti, V. (2001). E-mail as habitat: An exploration of embedded personal information management. Interactions, 8(5), 30–38. doi:10.1145/382899.383305
  • Duhigg, C. (2012, February 16). How companies learn your secrets. The New York Times Magazine. Retrieved from http://www.nytimes.com/2012/02/19/magazine/shopping-habits.html
  • Dumais, S., Cutrell, E., Cadiz, J. J., Jancke, G., Sarin, R., & Robbins, D. C. (2003). Stuff I’ve seen: A system for personal information retrieval and re-use. Proceedings of the SIGIR 2003 Conference on Research and Development in Informaion Retrieval. New York, NY: ACM.
  • Dupree, J. L., Devries, R., Berry, D. M., & Lank, E. (2016). Privacy personas. Proceedings of the CHI 2016 Conference on Human Factors in Computer Systems. New York, NY: ACM.
  • Eagle, N., & Pentland, A. (2006). Reality mining: Sensing complex social systems. Personal and Ubiquitous Computing, 10(4), 255–268. doi:10.1007/s00779-005-0046-3
  • eMarketer. (2015). Growth of time spent on mobile devices slows. Retrieved December 12, 2016, from https://www.emarketer.com/Article/Growth-of-Time-Spent-on-Mobile-Devices-Slows/1013072
  • Estrin, D. (2014). Small data, where n = me. Communications of the ACM, 57(4), 32–34. doi:10.1145/2580723
  • Farnham, S. D., & Churchill, E. F. (2011). Faceted identity, faceted lives. Proceedings of the CSCW 2011 Conference on Computer Supported Cooperative Work. New York, NY: ACM.
  • Felton, N. (2015). The Feltron Annual Report Tenth Edition. Retrieved from http://feltron.com/FAR14.html
  • Fernandes, E., Riva, O., & Nath, S. (2015). My OS ought to know me better: In-app behavioural analytics as an OS service. HOTOS 2015 Workshop on Hot Topics in Operating Systems. New York, NY: ACM.
  • Ferreira, D., Kostakos, V., & Dey, A. K. (2015). AWARE: Mobile Context Instrumentation Framework. Frontiers in ICT, 2. doi:10.3389/fict.2015.00006
  • Fire Eagle. (n.d.). In Wikipedia. Retrieved from https://en.wikipedia.org/wiki/Fire_Eagle
  • Fogarty, J., & Hudson, S. (2007). Toolkit support for developing and deploying sensor-based statistical models of human situations. Proceedings of the CHI 2007 Conference on Human Factors in Computer Systems. New York, NY: ACM.
  • Gemmell, J., Bell, G., Lueder, R., Drucker, S., & Wong, C. (2002). MyLifeBits: Fulfilling the Memex Vision. Proceedings of the MM 2002 International Conference on Multimedia. New York, NY: ACM.
  • Gerritsen, D., Tasse, D., Olsen, J. K., Vlahovic, T. A., Gulotta, R., Odom, W., … Zimmerman, J. (2016). Mailing archived emails as postcards: Probing the value of virtual collections. Proceedings of the CHI 2016 Conference on Human Factors in Computer Systems. New York, NY: ACM.
  • Gilbert, E., & Karahalios, K. (2009). Predicting tie strength with social media. Proceedings of the CHI 2009 Conference on Human Factors in Computer Systems. New York, NY: ACM.
  • Gurevich, Y., Haiby, N., Hudis, E., Wing, J. M., & Ziklik, E. (2016). Biggish A solution for the inverse privacy problem. Retrieved from http://research.microsoft.com/en-us/um/people/gurevich/Opera/230.pdf
  • Gurevich, Y., Hudis, E., & Wing, J. M. (2016). Inverse privacy. Communications of the ACM, 59(7), 38–42. doi:10.1145/2963119
  • Haddadi, H., Howard, H., Chaudhry, A., Crowcroft, J., Madhavapeddy, A., & Mortier, R. (2015). Personal data: Thinking inside the box. Arxiv Preprint Arxiv:1501.04737. Retrieved from https://arxiv.org/abs/1501.04737.
  • Higgins Personal Data Service. (2009). Retrieved from http://www.eclipse.org/higgins/
  • Hodges, S., Williams, L., Berry, E., Izadi, S., Srinivasan, J., Butler, A., … Wood, K. (2006). SenseCam: A retrospective memory aid. Proceedings of the UbiComp 2006 Conference of Ubiquitous Computing. Berlin, Germany: Springer.
  • Hong, J., & Landay, J. (2004). An architecture for privacy-sensitive ubiquitous computing. Proceedings of the MobiSys 2004 Conference on Mobile Systems, Applications, and Services. New York, NY: ACM.
  • Hori, T., & Aizawa, K. (2003). Context-based video retrieval system for the life-log applications. Proceedings of the SIGMM 2003 International Workshop on Multimedia Information Retrieval. New York, NY: ACM.
  • Iachello, G., & Hong, J. (2007). End-user privacy in human–computer interaction. FNT in Human-Computer Interaction 1(1), 1–137. doi:10.1561/1100000004
  • Jonze, S. (Producer & Director). (2013). Her [Motion picture]. United States: Annapurna Pictures.
  • Karger, D. R., & Jones, W. (2006). Data unification in personal information management. Communications of the ACM, 49(1), 77–82. doi:10.1145/1107458
  • Kay, J., & Kummerfeld, B. (2010). PortMe : Personal lifelong user modelling portal. School of Information Technologies, University of Sydney, Sydney, Australia.
  • Kelley, P. G., Consolvo, S., Cranor, L. F., Jung, J., Sadeh, N., & Wetherall, D. (2012). A conundrum of permissions: Installing applications on an android smartphone. Proceedings of the FC 2012 Conference on Financial Cryptography and Data Security. Berlin, Germany: Springer.
  • Konstan, J. A., & Riedl, J. (2012). Recommender systems: From algorithms to user experience. User Modeling and User-Adapted Interaction, 22(1–2), 101–123. doi:10.1007/s11257-011-9112-x
  • Kosinski, M., Stillwell, D., & Graepel, T. (2013). Private traits and attributes are predictable from digital records of human behavior. Proceedings of the National Academy of Sciences of the United States of America, 110(15), 5802–5805. doi:10.1073/pnas.1218772110
  • Langheinrich, M. (2001). Privacy by design—Principles of privacy-aware ubiquitous systems. Proceedings of the UbiComp 2001 Conference on Ubiquitous Computing. Berlin, Germany: Springer.
  • Lara, O. D., & Labrador, M. A. (2013). A survey on human activity recognition using wearable sensors. IEEE Communications Surveys & Tutorials, 15(3), 1192–1209. doi:10.1109/SURV.2012.110112.00192
  • Lau, T. (2010, November). Rethinking the systems review process. Communications of the ACM, 53(11), 10–11. doi:10.1145/1839676
  • Lazer, D., Pentland, A., Adamic, L., Aral, S., Barabási, A.-L., Brewer, D., … Van Alstyne, M. (2009). Computational social science. Science, 323(5915), 721–723. doi:10.1126/science.1167742
  • Leon, P. G., Rao, A., Schaub, F., Marsh, A., Cranor, L. F., & Sadeh, N. (2015). Why people are (un)willing to share information with online advertisers (Technical Report CMU-ISR-15-106). Pittsburgh, PA: Carnegie Mellon University.
  • Li, I., Dey, A., & Forlizzi, J. (2010). A stage-based model of personal informatics systems. Proceedings of the CHI 2010 Conference on Human Factors in Computer Systems. New York, NY: ACM.
  • Lin, J., Amini, S., Hong, J. I., Sadeh, N., Lindqvist, J., & Zhang, J. (2012). Expectation and purpose: Understanding users’ mental models of mobile app privacy through crowdsourcing. Proceedings of the UbiComp 2012 Conference on Ubiquitous Computing. New York, NY: ACM.
  • Lin, J., Liu, B., Sadeh, N., & Hong, J. I. (2014). Modeling users’ mobile app privacy preferences: Restoring usability in a sea of permission settings. Proceedings of the SOUPS 2014 Symposium On Usable Privacy and Security. Menlo Park, CA: USENIX Association.
  • Lindqvist, J., Cranshaw, J., Wiese, J., Hong, J., & Zimmerman, J. (2011). I’M the mayor of my house: Examining why people use Foursquare—A social-driven location sharing application. Proceedings of the CHI 2011 Conference on Human Factors in Computer Systems. New York, NY: ACM.
  • Liu, Y., Gummadi, K. P., Krishnamurthy, B., & Mislove, A. (2011). Analyzing facebook privacy settings: User expectations vs. reality. Proceedings of the SIGCOMM 2011 Conference on Internet Measurement Conference. New York, NY: ACM.
  • Matsuo, Y., Okazaki, N., Izumi, K., Nakamura, Y., Nishimura, T., Hasida, K., & Nakashima, H. (2007). Inferring long-term user properties based on users’ location history. Proceedings of the IJCAI 2007 Joint Conference on Artificial Intelligence. San Francisco, CA: Morgan Kaufmann.
  • Matyas, C., & Schlieder, C. (2009). A spatial user similarity measure for geographic recommender systems. Proceedings of the GeoS 2009 Conference on GeoSpatial Semantics. Berlin, Germany: Springer.
  • Min, J.-K., Doryab, A., Wiese, J., Amini, S., Zimmerman, J., & Hong, J. I. (2014). Toss “n” turn: Smartphone as sleep and sleep quality detector. Proceedings of the CHI 2014 Conference on Human Factors in Computer Systems. New York, NY: ACM.
  • Min, J.-K., Wiese, J., Hong, J. I., & Zimmerman, J. (2013). Mining smartphone data to classify life-facets of social relationships. Proceedings of the CSCW 2013 Conference on Computer Supported Cooperative Work. New York, NY: ACM.
  • Mun, M., Hao, S., Mishra, N., Shilton, K., Burke, J., Estrin, D., … Govindan, R. (2010). Personal data vaults: A locus of control for personal data streams. Proceedings of the Co-NEXT 2010 International Conference. New York, NY: ACM.
  • Mun, M. Y., Kim, D. H., Shilton, K., Estrin, D., Hansen, M., & Govindan, R. (2014). PDVLoc. ACM Transactions on Sensor Networks, 10(4), 1–29. doi:10.1145/2633905
  • Odom, W., Harper, R., Sellen, A., Kirk, D., & Banks, R. (2010). Passing on & putting to rest. Proceedings of the CHI 2010 Conference on Human Factors in Computer Systems. New York, NY: ACM.
  • Odom, W., Zimmerman, J., & Forlizzi, J. (2014). Placelessness, spacelessness, and formlessness: Experiential qualities of virtual possessions. Proceedings of the DIS 2014 Conference on Designing Interactive Systems. New York, NY: ACM.
  • Odom, W., Zimmerman, J., Forlizzi, J., López Higuera, A., Marchitto, M., Cañas, J., … Moore, H. (2013). Fragmentation and transition: Understanding perceptions of virtual possessions among young adults in Spain, South Korea and the United States. Proceedings of the CHI 2013 Conference on Human Factors in Computer Systems. New York, NY: ACM.
  • Oku, K., Kotera, R., & Sumiya, K. (2010). Geographical recommender system based on interaction between map operation and category selection. Proceedings of the 1st International Workshop on Information Heterogeneity and Fusion in Recommender Systems. New York, NY: ACM.
  • Patel, K., Bancroft, N., Drucker, S. M., Fogarty, J., Ko, A. J., & Landay, J. (2010). Gestalt: Integrated support for implementation and analysis in machine learning. Proceedings of the UIST 2010 Symposium on User Interface Software and Technology. New York, NY: ACM.
  • Rainie, L., & Duggan, M. (2016). Privacy and information sharing (Vol. 14). Washington, DC: Pew Research Center. Retrieved from http://www.pewinternet.org/2016/01/14/privacy-and-information-sharing/
  • Rittel, H. J., & Webber, M. (1973). Dilemmas in a general theory of planning. Policy Sciences, 4(2), 155–169. doi:10.1007/BF01405730
  • Romanosky, S., Acquisti, A., Hong, J. I., Cranor, L. F., & Friedman, B. (2006). Privacy patterns for online interactions. Proceedings of the PLoP 2006 Conference on Pattern Languages of Programs. New York, NY: ACM.
  • Salber, D., Dey, A. K., & Abowd, G. D. (1999). The context toolkit. Proceedings of the CHI 1999 Conference on Human Factors in Computer Systems. New York, NY: ACM.
  • Schein, A. I., Popescul, A., Ungar, L. H., & Pennock, D. M. (2002). Methods and metrics for cold-start recommendations. Proceedings of the SIGIR 2002 Conference on Research and Development in Information Retrieval. New York, NY: ACM.
  • Schilit, B., Adams, N., & Want, R. (1994). Context-aware computing applications. Proceedings of the WMCSA 1994 Workshop on Mobile Computing Systems and Applications. New York, NY: IEEE.
  • Sellen, A. J., & Whittaker, S. (2010). Beyond total capture: A Constructive critique of lifelogging. Communications of the ACM, 53(5), 70–77. doi:10.1145/1735223
  • Starner, T. E., Snoeck, C. M., Wong, B. A., & McGuire, R. M. (2004). Use of mobile appointment scheduling devices. Proceedings of the CHI 2004 Extended Abstracts on Human Factors in Computer Systems. New York, NY: ACM.
  • Wang, R., Chen, F., Chen, Z., Li, T., Harari, G., Tignor, S., … Campbell, A. T. (2014). StudentLife: Assessing mental health, academic performance and behavioral trends of college students using smartphones. Proceedings of the UbiComp 2014 Joint Conference on Pervasive and Ubiquitous Computing. New York, NY: ACM.
  • Want, R., Pering, T., Danneels, G., Kumar, M., Sundar, M., & Light, J. (2002). The personal server: Changing the way we think about ubiquitous computing. Proceedings of the Ubicomp 2002 Conference on Ubiquitous Computing. Berlin. Springer.
  • Westin, A. (2001). Opinion surveys: What consumers have to say about information privacy [Prepared Witness Testimony]. Washington, DC: The House Committee on Energy and Commerce.
  • The White House. (2016, November). Request for information regarding data portability. Retrieved from https://www.whitehouse.gov/webform/request-information-regarding-data-portability
  • Whittaker, S., Jones, Q., & Terveen, L. (2002). Contact management. Proceedings of the CSCW 2002 Conference on Computer Supported Cooperative Work. New York, NY: ACM.
  • Wiese, J. (2015). Evolving the ecosystem of personal behavioral data (Technical Report CMU-HCII-15-108). Pittsburgh, PA: Carnegie Mellon University.
  • Wiese, J., Biehl, J. T., Turner, T., van Melle, W., & Girgensohn, A. (2011). Beyond “Yesterday’s Tomorrow”: Towards the design of awareness technologies for the contemporary worker. Proceedings of the MobileHCI 2011 Conference on Human–Computer Interaction with Mobile Devices and Services. New York, NY: ACM.
  • Wiese, J., Hong, J. I., & Zimmerman, J. (2014). Challenges and opportunities in data mining contact lists for inferring relationships. Proceedings of the Ubicomp 2014 Joint Conference on Pervasive and Ubiquitous Computing. New York, NY: ACM.
  • Wiese, J., Kelley, P. G., Cranor, L. F., Dabbish, L., Hong, J. I., & Zimmerman, J. (2011). Are you close with me? are you nearby?: Investigating social groups, closeness, and willingness to share. Proceedings of the UbiComp 2001 Conference on Ubiquitous Computing. New York, NY: ACM.
  • Wiese, J., Min, J.-K., Hong, J. I., & Zimmerman, J. (2015). “You never call, you never write”: Call and SMS logs do not always indicate tie strength. Proceedings of the CSCW 2015 Conference on Computer Supported Cooperative Work & Social Computing. New York, NY: ACM.
  • Wolfram, S. (2012, March 8). The personal analytics of my life [Web log post]. Retrieved from http://blog.stephenwolfram.com/2012/03/the-personal-analytics-of-my-life/

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.