Research Repository

Security and privacy implications of pervasive memory augmentation

Davies, N and Friday, A and Clinch, S and Sas, C and Langheinrich, M and Ward, G and Schmidt, A (2015) 'Security and privacy implications of pervasive memory augmentation.' IEEE Pervasive Computing, 14 (1). 44 - 53. ISSN 1536-1268

[img]
Preview
Text
2014-Davies-RecallSecurityPrivacy-IEEEPervasive.pdf - Submitted Version

Download (348kB) | Preview

Abstract

© 2002-2012 IEEE. Pervasive computing is beginning to offer the potential to rethink and redefine how technology can support human memory augmentation. For example, the emergence of widespread pervasive sensing, personal recording technologies, and systems for the quantified self are creating an environment in which it's possible to capture fine-grained traces of many aspects of human activity. Contemporary psychology theories suggest that these traces can then be used to manipulate our ability to recall - to both reinforce and attenuate human memories. Here, the authors consider the privacy and security implications of using pervasive computing to augment human memory. They describe a number of scenarios, outline the key architectural building blocks, and identify entirely new types of security and privacy threats-namely, those related to data security (experience provenance), data management (establishing new paradigms for digital memory ownership), data integrity (memory attenuation and recall-induced forgetting), and bystander privacy. Together, these threats present compelling research challenges for the pervasive computing research community. This article is part of a special issue on privacy and security.

Item Type: Article
Subjects: B Philosophy. Psychology. Religion > BF Psychology
Q Science > QA Mathematics > QA75 Electronic computers. Computer science
Divisions: Faculty of Science and Health > Psychology, Department of
Depositing User: Jim Jamieson
Date Deposited: 08 Jul 2015 14:40
Last Modified: 30 Jan 2019 16:22
URI: http://repository.essex.ac.uk/id/eprint/14092

Actions (login required)

View Item View Item