Security and Privacy Implications of Pervasive Memory Augmentation

@article{Davies2015SecurityAP,
  title={Security and Privacy Implications of Pervasive Memory Augmentation},
  author={Nigel Davies and Adrian Friday and Sarah Clinch and Corina Sas and Marc Langheinrich and Geoff Ward and Albrecht Schmidt},
  journal={IEEE Pervasive Computing},
  year={2015},
  volume={14},
  pages={44-53}
}
Pervasive computing is beginning to offer the potential to rethink and redefine how technology can support human memory augmentation. For example, the emergence of widespread pervasive sensing, personal recording technologies, and systems for the quantified self are creating an environment in which it's possible to capture fine-grained traces of many aspects of human activity. Contemporary psychology theories suggest that these traces can then be used to manipulate our ability to recall--to… CONTINUE READING
Highly Cited
This paper has 44 citations. REVIEW CITATIONS

From This Paper

Figures, tables, and topics from this paper.

Citations

Publications citing this paper.
Showing 1-10 of 29 extracted citations

A decade of security research in ubiquitous computing: results of a systematic literature review

Int. J. Pervasive Computing and Communications • 2016
View 6 Excerpts
Highly Influenced

References

Publications referenced by this paper.
Showing 1-10 of 27 references

Through the Looking GLaSS: Google Glass, Privacy, and Opacity, with an Israeli Law Twist,

a. Schreiber
Int’l Data Privacy Law, • 2014

Living with the Dead : Emergent Post - Mortem Digital Curation and Creation Practices

V. Carvalho Pereira
Digital legacy and interaction • 2013

What Happens to My Facebook Profile When I Die ? ’ : Legal Issues Around Transmission of Digital Assets on Death

E. Harbinja
Digital legacy and interaction • 2013

Can implementation intentions and text messages promote brisk walking? A randomized trial.

Health psychology : official journal of the Division of Health Psychology, American Psychological Association • 2010

Lifelogging: Privacy and Empowerment with memories for Life,

K. O’hara, m.m. Tuffield, n. Shadbolt
Identity in the Information Society, • 2009

Dredging up the Past: Lifelogging, memory, and Surveillance,

a.L. allen
Univ. Chicago Law Rev., • 2008

Similar Papers

Loading similar papers…