Challenges and Opportunities of Lifelog Technologies: A Literature Review and Critical Analysis
- 708 Downloads
In a lifelog, data from various sources are combined to form a record from which one can retrieve information about oneself and the environment in which one is situated. It could be considered similar to an automated biography. Lifelog technology is still at an early stage of development. However, the history of lifelogs so far shows a clear academic, corporate and governmental interest. Therefore, a thorough inquiry into the ethical aspects of lifelogs could prove beneficial to the responsible development of this field. This article maps the main ethically relevant challenges and opportunities associated with the further development of lifelog technologies as discussed in the scholarly literature. By identifying challenges and opportunities in the current debate, we were able to identify other challenges and opportunities left unmentioned. Some of these challenges are partly explained by a blind spot in the current debate. Whilst the current debate focuses mainly on lifelogs held by individuals, lifelogs held by governmental institutions and corporations pose idiosyncratic ethical concerns as well. We have provided a brief taxonomy of lifelog technology to show the variety in uses for lifelogs. In addition, we provided a general approach to alleviate the ethical challenges identified in the critical analysis.
KeywordsLifelog Sousveillance Surveillance Pervasive computing Identity Information communication technology
This research was partly supported by the Science Foundation Ireland under grant 07/CE/I1147.
- Allan, A., & Warden, P. (2011). Got an iPhone or 3G iPad? Apple is recording your moves. O’Reilly Radar. Available from: http://radar.oreilly.com/2011/04/apple-location-tracking.html. Accessed 15 Jan 2013.
- Allen, A. L. (2007). Dredging up the past: Lifelogging, memory, and surveillance. The University of Chicago Law Review, 75(1), 47–74.Google Scholar
- ANP. (2009). Minister: excuus aan slachtoffer identiteitsfraude. Nrc.nl. Available from: http://vorige.nrc.nl/binnenland/article2368828.ece/Minister_excuus_aan_slachtoffer_identiteitsfraude. Accessed 08 Jan 2013.
- Bell, G., & Gemmell, J. (2007). A Digital Life. Scientific American. Available from: http://www.scienceandsociety.org/web/Library_files/A.Digital.Life.pdf. Accessed 28 May 2012.
- Bell, G., & Gemmell, J. (2009). Total recall: How the E-Memory revolution will change anything. New York: Dutton.Google Scholar
- Brin, D. (1998). The transparent society: Will technology force us to choose between privacy and freedom?. Cambridge: Perseus Books Group.Google Scholar
- Bush, V. (1945). As we may think. The Atlantic Monthly, 176(1), 101–108.Google Scholar
- Byrne, D., Kelly, L., & Jones, G. J. F. (2010). Multiple multimodal mobile devices: Lessons learned from engineering lifelog solutions. In P. Alencar & D. Cowan (Eds.), Handbook of research on mobile software engineering: Design, implementation and emergent applications. Hershey, PA: IGI Publishing.Google Scholar
- Chen, B. X. (2011). Creepy bug gives some iPhones unwanted facetime. Wired.com. Available from: http://www.wired.com/gadgetlab/2011/04/creepy-iphone-bug/?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+wired%2Findex+%28Wired%3A+Index+3+%28Top+Stories+2%29%29. Accessed 23 May 2012.
- Chen, Y., & Jones, G. J. F. (2012). What do people want from their lifelogs? In 6th Irish human computer interaction conference.Google Scholar
- Cheng, W. C., Golubchik, L., & Kay, D. G. (2004). Total recall: are privacy changes inevitable? In Proceedings of the 1st ACM workshop on continuous archival and retrieval of personal experiences, pp. 86–92.Google Scholar
- Clowes, R. W. (2012). Hybrid memory, cognitive technology and self. In The proceedings of the AISB and IACAP world congress 2012. Google Scholar
- Curry, M. R. (2007). Being there then: Ubiquitous computing and the anxiety of reference. International Review of Information Ethics, 8(8), 13–19.Google Scholar
- DARPA. (2003). ‘Terrorism information awareness’ (TIA) program formerly known as ‘total information awareness’. Available from: http://www.iwar.org.uk/news-archive/tia/total-information-awareness.htm. Accessed 30 Jan 2012.
- DARPA. Advanced soldier sensor information systems and technology (ASSIST). Available from: http://www.darpa.mil/Our_Work/I2O/Programs/Advanced_Soldier_Sensor_Information_Systems_and_Technology_(ASSIST).aspx. Accessed 30 Jan 2012.
- DARPA/IPTO. (2003). BAA # 03-30 LifeLog proposer information pamphlet. Available from:http://realnews247.com/lifelog.htm. Accessed 30 Jan 2012.
- Del Giudice, K., & Gardner, M. (2009). The message of the pensieve: Realizing memories through the world wide web and virtual reality. Available from: http://web.mit.edu/comm-forum/mit6/papers/Delgiudice.pdf (unpublished).
- Diaz, J. (2008). Huge iPhone security flaw puts all private information at risk. Gizmodo. Available from: http://gizmodo.com/5042332/huge-security-iphone-flaw-puts-all-private-information-at-risk. Accessed 30 Jan 2012.
- Dib, L. (2008). Memory as concept in the design of digital recording devices. Altérités, 5(1), 38–53.Google Scholar
- Dib, L. (2012). The forgetting dis-ease: Making time matter. A Journal of Feminist Cultural Studies, 23(3), 43–73.Google Scholar
- Dodge, M. (2007). Do we need an ethics of forgetting in a world of digital ‘memories for life’? In Position paper for designing for forgetting and exclusion conference. Google Scholar
- Dodge, M., & Kitchin, R. (2005). The ethics of forgetting in an age of pervasive computing. CASA Working Papers 92. London: Centre for Advanced Spatial Analysis.Google Scholar
- Fernandez, K. C., Levinson, C. A., & Rodebaugh, T. L. (2012). Profiling: Predicting Social Anxiety From Facebook Profiles. Social Psychological and Personality Science.Google Scholar
- Fleming, N. (2013). I’m recording everything for the first living archive. NewScientist.com. Available from: http://www.newscientist.com/article/mg21829110.300-im-recording-everything-for-the-first-living-archive.html. Accessed 10 April 2013.
- Goggin, G. (2005). “Have fun and change the world”: Moblogging, mobile phone culture and the internet. Blogtalk. Available from: http://incsub.org/blogtalk/?page_id=119. Accessed on 01 Feb 2012.
- Golbeck, J., Robles C., & Turner K. (2011). Predicting personality with social media. In Conference on human factors in computing systems—Proceedings, pp. 253–262.Google Scholar
- Hall, L., Johansson, P., & de Léon, D. (2013). Recomposing the Will: Distributed motivation and computer mediated extrospection. In: T. Vierkant, A. Clark, & J. Kiverstein, (Eds.) Decomposing the will, Philosophy of Mind Series. Oxford: Oxford University Press.Google Scholar
- Jayaram, M. (2011). The business of privacy: from private anxiety to commercial sense? A broad overview of why privacy ought to matter to Indian businesses. NUJS Law Review, 4(4), 567–594.Google Scholar
- Kang, J., Shilton, K., Estrin, D., Burke, J. A., & Hansen, M. (2011). Self-surveillance privacy (pp. 1–43). UC Los Angeles: UCLA School of Law.Google Scholar
- Koops, E. J. (2011). Forgetting footprints, shunning shadows: A critical analysis of the ‘right to be forgotten’ in big data practice. SCRIPTED, 8(3), 229–256.Google Scholar
- Lemos, A. (2011). Locative media and surveillance at the boundaries of informational territories. In R. Firmino, F. Duarte, & C. Ultramari (Eds.), ICTs for mobile and ubiquitous urban infrastructures: Surveillance, locative media and global networks (pp. 129–149). Hershey, PA: IGI Publishing.Google Scholar
- Mann, S. (2002). Sousveillance. Wearcam.org. Available from: http://wearcam.org/sousveillance.htm. Accessed 05 April 2012.
- Mann, S. (2004a). “Sousveillance” inverse surveillance in multimedia imaging. In MULTIMEDIA ‘04 Proceedings of the 12th annual ACM international conference on multimedia, pp. 620–627.Google Scholar
- Mann, S. (2004b). Continuous lifelong capture of personal experience with EyeTap. In Proceedings of the the 1st ACM workshop on continuous archival and retrieval of personal experiences. New York, NY: ACM SIGMM.Google Scholar
- Mann, S. (2005b). Equiveillance: The equilibrium between Sur-veillance and Sous-veillance.Google Scholar
- Mann, S., Fung, J., & Lo, R. (2006). Cyborglogging with camera phones: Steps toward equiveillance. In Proceedings of the ACM multimedia 2006.Google Scholar
- Mayer-Schönberger, V. (2009). Delete: The virtue of forgetting in the digital Age. Princeton: Princeton University Press.Google Scholar
- Mehdizadeh, S. (2010). Cyberpsychology, behavior and social networking. Mary Ann Liebert, Inc., 13(4), 357–364Google Scholar
- Memoto AB. (2013). Memoto automatic lifelogging camera. Available from: http://memoto.com/. Accessed 15 Jan 2013.
- Microsoft. (2011). Microsoft research sensecam. Available from: http://research.microsoft.com/en-us/um/cambridge/projects/sensecam/. Accessed 30 Jan 2012.
- Moreno, J. (2004). DARPA on your mind. Cerebrum, 6(4), 92–100.Google Scholar
- Murata, K. (2011). The right to forget/be forgotten. In: CEPE 2011: Crossing Boundaries.Google Scholar
- O’Hara, K. (2010a). Narcissus to a man: Lifelogging, technology and the normativity of truth. In E. Berry et al. (Eds.) Second Annual SenseCam symposium. Available at: http://eprints.ecs.soton.ac.uk/21904/.
- O’Hara, K., & Hall, W. (2008). Trust on the Web: Some Web Science Research Challenges.Google Scholar
- O’Hara, K. (2010b). Arius in cyberspace: Digital companions and the limits of the person. In Y. Wilks (Ed.), Close engagements with artificial companions: Key social, psychological, ethical and design issues. Amsterdam: John Benjamins.Google Scholar
- O’Hara, Kieron. (2012). The technology of collective memory and the normativity of truth. In D. Goldberg, N. McCarthy, & D. Michelfelder (Eds.), Philosophy and engineering: Reflections on practice, principles and process. Berlin: Springer.Google Scholar
- O’Hara, K., Tuffield, M., & Shadbolt, N. (2009). Lifelogging: Privacy and empowerment with memories for life. Identity in the Information Society, 1(2), 2–3.Google Scholar
- Price, B. A. (2010a). Towards privacy preserving lifelogging. In Proceedings of the second annual SenseCam symposium.Google Scholar
- Price, B. A. (2010b). Challenges in eliciting privacy and usability requirements for lifelogging. In Conference’10.Google Scholar
- Rawassizadeh, R. (2011). Towards sharing life-log information with society. Behaviour & Information Technology, pp. 1–11.Google Scholar
- Rawassizadeh, R., & Min Tjoa, A. (2010). Securing shareable life-logs. In The second IEEE international conference on information privacy, security, risk and trust. Available from: http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=5590506.
- Schacter, D. L. (2001). The seven sins of memory: How the mind forgets and remembers. Boston & New York: Houghton Mifflin Company.Google Scholar
- Schlenoff, C., Weiss, B., & Potts Steves, M. (2011). Lessons learned in evaluating DARPA advanced military technologies. Tech Beat. Available from: http://www.nist.gov/customcf/get_pdf.cfm?pub_id=906654. Accessed 30 Jan 2012.
- Shachtman, N. (2004). Pentagon revives memory project. Wired.com. Available from: http://www.wired.com/politics/security/news/2004/09/64911. Accessed 30 Jan 2012.
- Smith, A., O’Hara, K., & Lewis, P. (2011). Visualising the past: Annotating a life with linked open data. In Web science conference 2011, June 14th–17th 2011, Koblenz Germany.Google Scholar
- Sonvilla-Weiss, S. (2008). (IN)VISIBLE: Learning to act in the metaverse. Vienna: Springer.Google Scholar
- TED. (2011). Hasan Elahi: FBI, here I am!. Available from: http://www.ted.com/talks/hasan_elahi.html. Accessed 23 May 2012.
- Thurm, S., & Kane, I. Y. (2010). Your apps are watching you. The Wall Street Journal. Available from: http://online.wsj.com/article/SB10001424052748704694004576020083703574602.html?mod=WSJ_hps_sections_tech. Accessed 23 May 2012.
- Turkle, S. (2008). Inner History. In S. Turkle (Ed.), The inner history of devices. Cambridge: The MIT Press.Google Scholar
- Turkle, S. (2011). Alone together: Why we expect more from technology and less from each other. New York: Basic Books.Google Scholar
- Valentino Devries, J. (2011). IPhone stored location in test even if disabled. The Wall Street Journal. Available from: http://online.wsj.com/article/SB10001424052748704123204576283580249161342.html?mod=WSJ_article_comments#articleTabs%3Dcomments. Accessed 23 May 2012.
- van Dijck, J. (2012). Mediated memories in the digital age. Stanford: Stanford University Press.Google Scholar
- Weber, K. (2010). Mobile Devices and a New Understanding of Presence. In: Workshop paper from SISSI2010 at the 12th annual ACM international conference on ubiquitous computing, p. 101.Google Scholar
- Werkhoven, P. (2005). Experience machines: capturing and retrieving personal content. In P. A. Bruck, A. Buchholz, Z. Karssen, & A. Zerfass (Eds.), E-content technologies and perspectives for the European Market. New York, Heidelberg, Berlin: Springer.Google Scholar