Abstract
This chapter argues that technical architectures that facilitate the longitudinal, decentralised and individual-centric personal collection and curation of data will be an important, but partial, response to the pressing problem of the autonomy of the data subject, and the asymmetry of power between the subject and large scale service providers/data consumers. Towards framing the scope and role of such Personal Data Stores (PDSes), the legalistic notion of personal data is examined, and it is argued that a more inclusive, intuitive notion expresses more accurately what individuals require in order to preserve their autonomy in a data-driven world of large aggregators. Six challenges towards realising the PDS vision are set out: the requirement to store data for long periods; the difficulties of managing data for individuals; the need to reconsider the regulatory basis for third-party access to data; the need to comply with international data handling standards; the need to integrate privacy-enhancing technologies; and the need to future-proof data gathering against the evolution of social norms. The open experimental PDS platform INDX is introduced and described, as a means of beginning to address at least some of these six challenges.
Keywords
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsNotes
- 1.
Facebook Home—www.facebook.com/home.
- 2.
Skydrive—www.microsoft.com/skydrive.
- 3.
iCloud—www.apple.com/icloud.
- 4.
Time Machine—www.apple.com/uk/support/timemachine/.
- 5.
Filemaker—www.filemaker.com.
- 6.
- 7.
- 8.
- 9.
- 10.
- 11.
- 12.
- 13.
Fitbits—www.fitbit.com.
- 14.
Nike+ Fuelband—www.nike.com/fuelband.
- 15.
Google Glass—www.google.com/glass.
- 16.
- 17.
Apple Airport Time Capsule—www.apple.com/airport-time-capsule/.
- 18.
WD MyCloud www.wdc.com/en/products/network/networkstorage/.
- 19.
Drobo—www.drobo.com.
- 20.
INDX source code and distributions—http://indx.es.
References
Agustin, J.M., Albritton, W.M.: Vendor relationship management (2001)
Antoniou, G., Van Harmelen, F.: Web Ontology Language: OWL. In: Handbook on Ontologies, pp. 67–92. Springer, New York (2004)
Armando, A., Carbone, R., Compagna, L., Cuellar, J., Tobarra, L.: Formal analysis of SAML 2.0 web browser single sign-on: breaking the SAML-based single sign-on for Google Apps. In: Proceedings of the 6th ACM Workshop on Formal Methods in Security Engineering, pp. 1–10. ACM, New York (2008)
Bandura, A.: Self-efficacy: toward a unifying theory of behavioral change. Psychol. Rev. 84(2), 191 (1977)
Banisar, D., Davies, S.: Global trends in privacy protection: An international survey of privacy, data protection, and surveillance laws and developments. John Marshall J. Comput. Inform. Law 18(1) (1999)
Bannon, L., Bødker, S.: Constructing common information spaces. In: Proceedings of the Fifth European Conference on Computer Supported Cooperative Work, pp. 81–96. Springer, New York (1997)
Bell, C.G., Gemmell, J., Rosson, C.: Total recall. Dutton (2010)
Bellotti, V., Dalal, B., Good, N., Flynn, P., Bobrow, D.G., Ducheneaut, N.: What a to-do: studies of task management towards the design of a personal task list manager. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pp. 735–742. ACM, New York (2004)
Benyon, D., Höök, K.: Navigation in information spaces: supporting the individual. In: Human-Computer Interaction INTERACT97, pp. 39–46. Springer, New York (1997)
Boston Consulting Group: Unlocking the value of personal data: From collection to usage (2013)
Bush, V.: As We May Think. The Atlantic Monthly, Boston (1945)
Bygrave, L.A.: Data Protection Law. Kluwer Law International, New York (2002)
Castano, S., Ferrara, A., Montanelli, S.: Matching ontologies in open networked systems: Techniques and applications. J. Data Semant. V 25–63 (2006)
Cavoukian, A., El Emam, K.: Dispelling the Myths Surrounding De-identification: Anonymization Remains a Strong Tool for Protecting Privacy. Office of the Privacy and Information Commissioner, Ontario (2011)
Chervenak, A., Vellanki, V., Kurmas, Z.: Protecting file systems: A survey of backup techniques. In: Proceedings Joint NASA and IEEE Mass Storage Conference, vol. 3 (1998)
Chi, E.H., Pirolli, P., Chen, K., Pitkow, J.: Using information scent to model user information needs and actions and the web. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pp. 490–497. ACM, New York (2001)
Chohan, N., Bunch, C., Krintz, C., Nomura, Y.: Database-agnostic transaction support for cloud infrastructures. In: Cloud Computing (CLOUD), 2011 IEEE International Conference on, pp. 692–699. IEEE (2011)
Choney, S.: Facebook timeline poll: ‘overwhelming negative’ reaction. Today (2012). URL http://www.today.com/tech/facebook-timeline-poll-overwhelming-negative-reaction-84717
Dey, A.K.: Understanding and using context. Personal Ubiquitous Comput. 5(1), 4–7 (2001)
Doan, A., Madhavan, J., Dhamankar, R., Domingos, P., Halevy, A.: Learning to match ontologies on the Semantic Web. VLDB J. 12(4), 303–319 (2003)
Engelbart, D.C., English, W.K.: A research center for augmenting human intellect. In: Proceedings of the December 9–11, 1968, Fall Joint Computer Conference, Part I, pp. 395–410. ACM, New York (1968)
Ennals, R., Brewer, E., Garofalakis, M., Shadle, M., Gandhi, P.: Intel Mash Maker: join the web. SIGMOD Rec. 36(4), 27–33 (2007)
Euzenat, J.: An API for ontology alignment. Proc ISWC ’04 pp. 698–712 (2004)
Fertig, S., Freeman, E., Gelernter, D.: Lifestreams: an alternative to the desktop metaphor. In: Conference Companion on Human Factors in Computing Systems, pp. 410–411. ACM, New York (1996)
Floridi, L.: The Ethics of Information. Oxford University Press, Oxford (2013)
Fung, A., Graham, M., Weil, D.: Full Disclosure: The Perils and Promise of Transparency. Cambridge University Press, Cambridge (2007)
Gemmell, J., Bell, G., Lueder, R., Drucker, S., Wong, C.: Mylifebits: fulfilling the memex vision. In: Proceedings of the Tenth ACM International Conference on Multimedia, pp. 235–238. ACM, New York (2002)
Grasso, M.A., Yen, M.J., Mintz, M.L.: Survey of handheld computing among medical students. Comput. Meth. Programs Biomed. 82(3), 196–202 (2006)
Hardt, D.: The oauth 2.0 authorization framework (2012). IETF RFC 6749
Heath, T., Bizer, C.: Linked data: Evolving the web into a global data space. Synth. Lect. Semantic Web Theory Tech. 1(1), 1–136 (2011)
Heath, W., Alexander, D., Booth, P.: Digital enlightenment, mydex, and restoring control over personal data to the individual. In: Hildebrandt, M., OHara, K., Waidner, M. (eds.) Digital Enlightenment Yearbook 2013: The Value of Personal Data, pp. 253–269. IOS Press, Amsterdam (2013)
Huang, G., Mak, K.: WeBid: a web-based framework to support early supplier involvement in new product development. Robot. Comput. Integrated Manuf. 16(2), 169–179 (2000)
Jones, W.: Keeping Found Things Found: The Study and Practice of Personal Information Management: The Study and Practice of Personal Information Management. Morgan Kaufmann, Amsterdam (2010)
Karger, D.R., Jones, W.: Data unification in personal information management. Comm. ACM 49(1), 77–82 (2006)
Koshutanski, H., Ion, M., Telesca, L.: Distributed identity management model for digital ecosystems. In: Emerging Security Information, Systems, and Technologies, 2007. SecureWare 2007. The International Conference on, pp. 132–138. IEEE, New York (2007)
Lin, J., Wong, J., Nichols, J., Cypher, A., Lau, T.A.: End-user programming of mashups with vegemite. In: Proc. IUI ’09, pp. 97–106. ACM, New York (2009). DOI 10.1145/1502650.1502667. URL http://doi.acm.org/10.1145/1502650.1502667
Malone, T.W.: How do people organize their desks?: Implications for the design of office information systems. ACM Trans. Inform. Syst. (TOIS) 1(1), 99–112 (1983)
Marshall, C.C.: Challenges and opportunities for personal digital archiving. Digital: Personal Collections in the Digital Era pp. 90–114 (2011)
Mayer-Schönberger, V., Cukier, K.: Big Data: A Revolution That Will Transform How We Live, Work and Think. John Murray, London (2013)
McCallister, E.: Guide to Protecting the Confidentiality of Personally Identifiable Information. DIANE Publishing, Darby, PA, US (2010)
Muth, P., Rakow, T.C.: Atomic commitment for integrated database systems. In: Data Engineering, 1991. Proceedings. Seventh International Conference on, pp. 296–304. IEEE, New York (1991)
Nadkarni, A., Hofmann, S.G.: Why do people use facebook? Pers. Indiv. Differ. 52(3), 243–249 (2012)
Narayanan, A., Shmatikov, V.: Myths and fallacies of “personally identifying information. Comm. ACM 53(6), 24–26 (2010)
Nelson, T.H.: Literary Machines: The Report On, and Of, Project Xanadu Concerning Word Processing, Electronic Publishing, Hypertext, Thinkertoys, Tomorrow’s Intellectual Revolution, and Certain Other Topics Including Knowledge, Education and Freedom. Nelson Ted; Schooley’s Mountain, NJ: distrib. by Distributors (1987)
Newman, W.M., Eldridge, M.A., Lamming, M.G.: Pepys: Generating autobiographies by automatic tracking. In: Proceedings of the Second European Conference on Computer-Supported Cooperative Work ECSCW91, pp. 175–188. Springer, New York (1991)
Novotny, A., Spiekermann, S.: Personal information markets and privacy: a new model to solve the controversy. In: Hildebrandt, M., OHara, K., Waidner, M. (eds.) Digital Enlightenment Yearbook 2013: The Value of Personal Data, pp. 102–120. IOS Press, Amsterdam (2013)
Odom, W., Banks, R., Kirk, D., Harper, R., Lindley, S., Sellen, A.: Technology heirlooms?: considerations for passing down and inheriting digital materials. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pp. 337–346. ACM, New York (2012)
OHara, K.: Are we getting privacy the wrong way round? IEEE Internet Comput. 17(4), 89–92 (2014)
OHara, K.: The information spring. IEEE Internet Comput. 18(2), 79–83 (2014)
Ohm, P.: Broken promises of privacy: responding to the surprising failure of anonymization. UCLA Law Rev. 57, 1701–1777 (2010)
Olmstead, T.: Facebook timeline and users: Not quite a love affair. Mashable (2012). URL http://mashable.com/2012/01/31/facebook-timeline-poll-results/
Perry, M., O’hara, K., Sellen, A., Brown, B., Harper, R.: Dealing with mobility: understanding access anytime, anywhere. ACM Trans. Comput. Hum. Interact. (TOCHI) 8(4), 323–347 (2001)
Pirolli, P., Card, S.: Information foraging. Psychol. Rev. 106(4), 643 (1999)
Pirolli, P., Card, S.: The sensemaking process and leverage points for analyst technology as identified through cognitive task analysis. In: Proceedings of International Conference on Intelligence Analysis, vol. 5, pp. 2–4 (2005)
Posner, R.A.: The economics of privacy. Am. Econ. Rev. 71, 405–409 (1981)
Purdue, D., Dürrschmidt, J., Jowers, P., O’Doherty, R.: Diy culture and extended milieux: Lets, veggie boxes and festivals. Socio. Rev. 45(4), 645–667 (1997)
Recordon, D., Reed, D.: OpenID 2.0: a platform for user-centric identity management. In: Proceedings of the Second ACM Workshop on Digital Identity Management, pp. 11–16. ACM, New York (2006)
Schaller, R.R.: Moore’s law: past, present and future. IEEE Spectrum 34(6), 52–59 (1997)
Schilit, B., Adams, N., Want, R.: Context-aware computing applications. In: Mobile Computing Systems and Applications, 1994. WMCSA 1994. First Workshop on, pp. 85–90. IEEE, New York (1994)
Schilit, B.N., Adams, N., Gold, R., Tso, M.M., Want, R.: The parctab mobile computing system. In: Workstation Operating Systems, 1993. Proceedings., Fourth Workshop on, pp. 34–39. IEEE, New York (1993)
Selker, T., Burleson, W.: Context-aware design and interaction in computer systems. IBM Syst. J. 39(3.4), 880–891 (2000)
Shadbolt, N.: Midata: towards a personal information revolution. In: M. Hildebrandt, K. OHara, M. Waidner (eds.) Digital Enlightenment Yearbook 2013: The Value of Personal Data, pp. 202–224. IOS Press (2013)
Stonebraker, M., Rowe, L.A.: The design of postgres. In: Proc. of International Conference on the Management of Data, pp. 340–355. ACM, New York (1986)
Suchanek, F., Abiteboul, S., Senellart, P.: PARIS: probabilistic alignment of relations, instances, and schema. Proc. VLDB 11 5(3), 157–168 (2011)
Teevan, J., Alvarado, C., Ackerman, M.S., Karger, D.R.: The perfect search engine is not enough: a study of orienteering behavior in directed search. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pp. 415–422. ACM, New York (2004)
Teevan, J., Jones, W., Bederson, B.B.: Personal information management. Comm. ACM 49(1), 40–43 (2006)
The new personal data landscape (2011). URL http://ctrl-shift.co.uk/wordpress/wp-content/uploads/2011/11/The-new-personal-data-landscape-FINAL.pdf
Vakkari, P.: Task-based information searching. Annu. Rev. Inform. Sci. Tech. 37(1), 413–464 (2003)
Van Kleek, M., Smith, D.A., Packer, H.S., Skinner, J., Shadbolt, N.R.: Carpé data: supporting serendipitous data integration in personal information management. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pp. 2339–2348. ACM, New York (2013)
Van Kleek, M.G., Bernstein, M., Panovich, K., Vargas, G.G., Karger, D.R., Schraefel, M.: Note to self: examining personal information keeping in a lightweight note-taking tool. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pp. 1477–1480. ACM, New York (2009)
Von Hippel, E.: Learning from open-source software. MIT Sloan Manag. Rev. 42(4), 82–86 (2001)
Wang, Y., Kobsa, A.: Privacy-enhancing technologies. Social and Organizational Liabilities in Information Security, pp. 203–227 (2006)
Whittaker, S.: Personal information management: from information consumption to curation. Annu. Rev. Inform. Sci. Tech. 45(1), 1–62 (2011)
Whittaker, S., Hirschberg, J.: The character, value, and management of personal paper archives. ACM Trans. Comput. Hum. Interact. (TOCHI) 8(2), 150–170 (2001)
Williams, N., Howard, L.: A SASL and GSS-API mechanism for the BrowserID authentication protocol (2013)
Wong, J., Hong, J.I.: Making mashups with marmite: towards end-user programming for the web. In: Proc. CHI ’07, pp. 1435–1444. ACM, New York (2007). DOI 10.1145/1240624.1240842. URL http://doi.acm.org/10.1145/1240624.1240842
Yang, M., Sassone, V., OHara, K.: Appendix 3: Practical Examples of Some Anonymisation Techniques, pp. 80–103. UK Information Commissioners Office (2012)
Acknowledgements
The work described in this chapter is supported through an interdisciplinary ESPRC Research Grant EP/J017728/1, The Theory and Practice of Social Machines. The design and development of the INDX platform has benefitted from contributions from SOCIAM researchers, including Daniel Alexander Smith, Laura Dragăn, Markus Lucsak-Roesch, Ramine Tinati, and Dave Murray-Rust, and with direction and advising from Sir Nigel Shadbolt, Sir Tim Berners-Lee, and Dame Wendy Hall.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 Springer International Publishing Switzerland
About this chapter
Cite this chapter
Van Kleek, M., OHara, K. (2014). The Future of Social Is Personal: The Potential of the Personal Data Store. In: Miorandi, D., Maltese, V., Rovatsos, M., Nijholt, A., Stewart, J. (eds) Social Collective Intelligence. Computational Social Sciences. Springer, Cham. https://doi.org/10.1007/978-3-319-08681-1_7
Download citation
DOI: https://doi.org/10.1007/978-3-319-08681-1_7
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-08680-4
Online ISBN: 978-3-319-08681-1
eBook Packages: Computer ScienceComputer Science (R0)