End User Effects of Centralized Data Control

  • Peter Imrie
  • Peter Bednar
Conference paper
Part of the Lecture Notes in Information Systems and Organisation book series (LNISO, volume 11)


Within distributed technologies there is a need to manage and control the data stored on devices for it to be useful. This control can include limiting what data is stored on the device, applying software updates from different sources and even accessing the private data that is stored on the device. Different approaches have been taken to manage the content on distributed technologies and some of these methods have the potential to negatively impact their usefulness to the end user. In this paper we look at approaches for managing data within the contexts of either the end user or a centralized server and their effects on the usefulness of the support to the end user. Following this we discuss advantages and disadvantages and give examples of technologies that utilize different methods of data control and discuss our conclusions within the context of end user support.


Data control Data management Access control Categories of support 


  1. 1.
    Bayluxe: NeRD. US Navy’s own e-reader. (2014). Accessed 07 July 2014
  2. 2.
    Enis, M.: U.S. Navy launches NeRD, a security enhanced e-reader. (2014). Accessed 09 July 2014
  3. 3.
    Bednar, P., Katos, V.: MCIS2009: 4th Mediterranean conference on information systems. In: 4th Mediterranean Conference on Information Systems, pp. 900–912 (2009)Google Scholar
  4. 4.
    Bednar, P.M., Welch, C., Graziano, A.: Learning objects and their implications on learning: a case of developing the foundation for a new knowledge infrastructure. In: Harman, K., Koohang, A. (eds.) Chapter 6 in Learning Objects: Applications, Implications and Future Directions, pp. 157–185. Informing Science Press, New York (2007)Google Scholar
  5. 5.
    Orlowski, A.: 77 % of Google users don’t know it records personal data. (2006). Accessed 08 July 2014
  6. 6.
    Channel 4: Thursday 16 January 2014 UK What GCHQ knows about us—a timeline of revelations. (2014). Accessed 08 July 2014
  7. 7.
    Greenwald, G.: NSA collecting phone records of millions of Verizon customers daily. (2013). Accessed 05 July 2014
  8. 8.
    Lhandslide Studios: Advanced virtual girl with artificial intelligence. (2012). Accessed 02 July 2014
  9. 9.
    Zabaware Inc.: Ultra hal can hold conversations with you. (n.d). Accessed 09 July 2014
  10. 10.
    Tsavli, M., Efraimidis, P.S., Katos, V.: Reengineering the user: privacy concerns about personal data on smartphones. In: Proceedings of the Eighth International Symposium on Human Aspects of Information Security and Assurance, pp. 80–89 (2014)Google Scholar
  11. 11.
    Apple: Siri. Your wish is it’s command. (n.d). Accessed 15 April 2013
  12. 12.
    Ozer, N.: Note to self: siri not just working for me, working full-time for apple, too.,_working_full-time_for_apple,_too.shtml (2012). Accessed 22 April 2013
  13. 13.
    Apple: Siri FAQ. (2014). Accessed 05 July 2014
  14. 14.
    Microsoft Windows: The most personal smartphone assistant. (2014). Accessed 09 July 2014
  15. 15.
    Martin, M.: Xbox One won’t play games on day one without mandatory update. (2013). Accessed 05 July 2014
  16. 16.
    Makuch, E.: Microsoft changing Xbox live terms of use. (2013). Accessed 05 July 2014
  17. 17.
    Klepek, P.: You must agree to all of Xbox live’s new terms of service. (2011). Accessed 07 July 2014
  18. 18.
    Zax, D.: A software update for your car? (2012). Accessed 09 July 2014
  19. 19.
    Ford: How to install Ford SYNC updates in your vehicle. (2014). Accessed 05 July 2014
  20. 20.
  21. 21.
    Bullis, K.: Why your car won’t get remote software updates anytime soon. Accessed 09 July 2014
  22. 22.
    Bednar, P., Imrie, P.: Virtual personal assistant. (2013). Accessed 11 July 2014
  23. 23.
    Griggs, B.: Meet the ‘NeRD,’ the Navy’s new e-reader. (2014). Accessed 05 July 2014
  24. 24.
    Baker, B.: US Navy develops world’s worst e-reader. (2014). Accessed 05 July 2014
  25. 25.
    Plex: What is Plex? (2014). Accessed 09 July 2014

Copyright information

© Springer International Publishing Switzerland 2016

Authors and Affiliations

  1. 1.University of PortsmouthPortsmouthUK
  2. 2.School of ComputingUniversity of PortsmouthPortsmouthUK
  3. 3.Department of InformaticsLund UniversityLundSweden

Personalised recommendations