Skip to main content

2014 | OriginalPaper | Buchkapitel

The Future of Social Is Personal: The Potential of the Personal Data Store

verfasst von : Max Van Kleek, Kieron OHara

Erschienen in: Social Collective Intelligence

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

This chapter argues that technical architectures that facilitate the longitudinal, decentralised and individual-centric personal collection and curation of data will be an important, but partial, response to the pressing problem of the autonomy of the data subject, and the asymmetry of power between the subject and large scale service providers/data consumers. Towards framing the scope and role of such Personal Data Stores (PDSes), the legalistic notion of personal data is examined, and it is argued that a more inclusive, intuitive notion expresses more accurately what individuals require in order to preserve their autonomy in a data-driven world of large aggregators. Six challenges towards realising the PDS vision are set out: the requirement to store data for long periods; the difficulties of managing data for individuals; the need to reconsider the regulatory basis for third-party access to data; the need to comply with international data handling standards; the need to integrate privacy-enhancing technologies; and the need to future-proof data gathering against the evolution of social norms. The open experimental PDS platform INDX is introduced and described, as a means of beginning to address at least some of these six challenges.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Agustin, J.M., Albritton, W.M.: Vendor relationship management (2001) Agustin, J.M., Albritton, W.M.: Vendor relationship management (2001)
2.
Zurück zum Zitat Antoniou, G., Van Harmelen, F.: Web Ontology Language: OWL. In: Handbook on Ontologies, pp. 67–92. Springer, New York (2004) Antoniou, G., Van Harmelen, F.: Web Ontology Language: OWL. In: Handbook on Ontologies, pp. 67–92. Springer, New York (2004)
3.
Zurück zum Zitat Armando, A., Carbone, R., Compagna, L., Cuellar, J., Tobarra, L.: Formal analysis of SAML 2.0 web browser single sign-on: breaking the SAML-based single sign-on for Google Apps. In: Proceedings of the 6th ACM Workshop on Formal Methods in Security Engineering, pp. 1–10. ACM, New York (2008) Armando, A., Carbone, R., Compagna, L., Cuellar, J., Tobarra, L.: Formal analysis of SAML 2.0 web browser single sign-on: breaking the SAML-based single sign-on for Google Apps. In: Proceedings of the 6th ACM Workshop on Formal Methods in Security Engineering, pp. 1–10. ACM, New York (2008)
4.
Zurück zum Zitat Bandura, A.: Self-efficacy: toward a unifying theory of behavioral change. Psychol. Rev. 84(2), 191 (1977)CrossRef Bandura, A.: Self-efficacy: toward a unifying theory of behavioral change. Psychol. Rev. 84(2), 191 (1977)CrossRef
5.
Zurück zum Zitat Banisar, D., Davies, S.: Global trends in privacy protection: An international survey of privacy, data protection, and surveillance laws and developments. John Marshall J. Comput. Inform. Law 18(1) (1999) Banisar, D., Davies, S.: Global trends in privacy protection: An international survey of privacy, data protection, and surveillance laws and developments. John Marshall J. Comput. Inform. Law 18(1) (1999)
6.
Zurück zum Zitat Bannon, L., Bødker, S.: Constructing common information spaces. In: Proceedings of the Fifth European Conference on Computer Supported Cooperative Work, pp. 81–96. Springer, New York (1997) Bannon, L., Bødker, S.: Constructing common information spaces. In: Proceedings of the Fifth European Conference on Computer Supported Cooperative Work, pp. 81–96. Springer, New York (1997)
7.
Zurück zum Zitat Bell, C.G., Gemmell, J., Rosson, C.: Total recall. Dutton (2010) Bell, C.G., Gemmell, J., Rosson, C.: Total recall. Dutton (2010)
8.
Zurück zum Zitat Bellotti, V., Dalal, B., Good, N., Flynn, P., Bobrow, D.G., Ducheneaut, N.: What a to-do: studies of task management towards the design of a personal task list manager. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pp. 735–742. ACM, New York (2004) Bellotti, V., Dalal, B., Good, N., Flynn, P., Bobrow, D.G., Ducheneaut, N.: What a to-do: studies of task management towards the design of a personal task list manager. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pp. 735–742. ACM, New York (2004)
9.
Zurück zum Zitat Benyon, D., Höök, K.: Navigation in information spaces: supporting the individual. In: Human-Computer Interaction INTERACT97, pp. 39–46. Springer, New York (1997) Benyon, D., Höök, K.: Navigation in information spaces: supporting the individual. In: Human-Computer Interaction INTERACT97, pp. 39–46. Springer, New York (1997)
10.
Zurück zum Zitat Boston Consulting Group: Unlocking the value of personal data: From collection to usage (2013) Boston Consulting Group: Unlocking the value of personal data: From collection to usage (2013)
11.
Zurück zum Zitat Bush, V.: As We May Think. The Atlantic Monthly, Boston (1945) Bush, V.: As We May Think. The Atlantic Monthly, Boston (1945)
12.
Zurück zum Zitat Bygrave, L.A.: Data Protection Law. Kluwer Law International, New York (2002) Bygrave, L.A.: Data Protection Law. Kluwer Law International, New York (2002)
13.
Zurück zum Zitat Castano, S., Ferrara, A., Montanelli, S.: Matching ontologies in open networked systems: Techniques and applications. J. Data Semant. V 25–63 (2006) Castano, S., Ferrara, A., Montanelli, S.: Matching ontologies in open networked systems: Techniques and applications. J. Data Semant. V 25–63 (2006)
14.
Zurück zum Zitat Cavoukian, A., El Emam, K.: Dispelling the Myths Surrounding De-identification: Anonymization Remains a Strong Tool for Protecting Privacy. Office of the Privacy and Information Commissioner, Ontario (2011) Cavoukian, A., El Emam, K.: Dispelling the Myths Surrounding De-identification: Anonymization Remains a Strong Tool for Protecting Privacy. Office of the Privacy and Information Commissioner, Ontario (2011)
15.
Zurück zum Zitat Chervenak, A., Vellanki, V., Kurmas, Z.: Protecting file systems: A survey of backup techniques. In: Proceedings Joint NASA and IEEE Mass Storage Conference, vol. 3 (1998) Chervenak, A., Vellanki, V., Kurmas, Z.: Protecting file systems: A survey of backup techniques. In: Proceedings Joint NASA and IEEE Mass Storage Conference, vol. 3 (1998)
16.
Zurück zum Zitat Chi, E.H., Pirolli, P., Chen, K., Pitkow, J.: Using information scent to model user information needs and actions and the web. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pp. 490–497. ACM, New York (2001) Chi, E.H., Pirolli, P., Chen, K., Pitkow, J.: Using information scent to model user information needs and actions and the web. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pp. 490–497. ACM, New York (2001)
17.
Zurück zum Zitat Chohan, N., Bunch, C., Krintz, C., Nomura, Y.: Database-agnostic transaction support for cloud infrastructures. In: Cloud Computing (CLOUD), 2011 IEEE International Conference on, pp. 692–699. IEEE (2011) Chohan, N., Bunch, C., Krintz, C., Nomura, Y.: Database-agnostic transaction support for cloud infrastructures. In: Cloud Computing (CLOUD), 2011 IEEE International Conference on, pp. 692–699. IEEE (2011)
19.
Zurück zum Zitat Dey, A.K.: Understanding and using context. Personal Ubiquitous Comput. 5(1), 4–7 (2001)CrossRef Dey, A.K.: Understanding and using context. Personal Ubiquitous Comput. 5(1), 4–7 (2001)CrossRef
20.
Zurück zum Zitat Doan, A., Madhavan, J., Dhamankar, R., Domingos, P., Halevy, A.: Learning to match ontologies on the Semantic Web. VLDB J. 12(4), 303–319 (2003)CrossRef Doan, A., Madhavan, J., Dhamankar, R., Domingos, P., Halevy, A.: Learning to match ontologies on the Semantic Web. VLDB J. 12(4), 303–319 (2003)CrossRef
21.
Zurück zum Zitat Engelbart, D.C., English, W.K.: A research center for augmenting human intellect. In: Proceedings of the December 9–11, 1968, Fall Joint Computer Conference, Part I, pp. 395–410. ACM, New York (1968) Engelbart, D.C., English, W.K.: A research center for augmenting human intellect. In: Proceedings of the December 9–11, 1968, Fall Joint Computer Conference, Part I, pp. 395–410. ACM, New York (1968)
22.
Zurück zum Zitat Ennals, R., Brewer, E., Garofalakis, M., Shadle, M., Gandhi, P.: Intel Mash Maker: join the web. SIGMOD Rec. 36(4), 27–33 (2007)CrossRef Ennals, R., Brewer, E., Garofalakis, M., Shadle, M., Gandhi, P.: Intel Mash Maker: join the web. SIGMOD Rec. 36(4), 27–33 (2007)CrossRef
23.
Zurück zum Zitat Euzenat, J.: An API for ontology alignment. Proc ISWC ’04 pp. 698–712 (2004) Euzenat, J.: An API for ontology alignment. Proc ISWC ’04 pp. 698–712 (2004)
24.
Zurück zum Zitat Fertig, S., Freeman, E., Gelernter, D.: Lifestreams: an alternative to the desktop metaphor. In: Conference Companion on Human Factors in Computing Systems, pp. 410–411. ACM, New York (1996) Fertig, S., Freeman, E., Gelernter, D.: Lifestreams: an alternative to the desktop metaphor. In: Conference Companion on Human Factors in Computing Systems, pp. 410–411. ACM, New York (1996)
25.
Zurück zum Zitat Floridi, L.: The Ethics of Information. Oxford University Press, Oxford (2013)CrossRef Floridi, L.: The Ethics of Information. Oxford University Press, Oxford (2013)CrossRef
26.
Zurück zum Zitat Fung, A., Graham, M., Weil, D.: Full Disclosure: The Perils and Promise of Transparency. Cambridge University Press, Cambridge (2007)CrossRef Fung, A., Graham, M., Weil, D.: Full Disclosure: The Perils and Promise of Transparency. Cambridge University Press, Cambridge (2007)CrossRef
27.
Zurück zum Zitat Gemmell, J., Bell, G., Lueder, R., Drucker, S., Wong, C.: Mylifebits: fulfilling the memex vision. In: Proceedings of the Tenth ACM International Conference on Multimedia, pp. 235–238. ACM, New York (2002) Gemmell, J., Bell, G., Lueder, R., Drucker, S., Wong, C.: Mylifebits: fulfilling the memex vision. In: Proceedings of the Tenth ACM International Conference on Multimedia, pp. 235–238. ACM, New York (2002)
28.
Zurück zum Zitat Grasso, M.A., Yen, M.J., Mintz, M.L.: Survey of handheld computing among medical students. Comput. Meth. Programs Biomed. 82(3), 196–202 (2006)CrossRef Grasso, M.A., Yen, M.J., Mintz, M.L.: Survey of handheld computing among medical students. Comput. Meth. Programs Biomed. 82(3), 196–202 (2006)CrossRef
29.
Zurück zum Zitat Hardt, D.: The oauth 2.0 authorization framework (2012). IETF RFC 6749 Hardt, D.: The oauth 2.0 authorization framework (2012). IETF RFC 6749
30.
Zurück zum Zitat Heath, T., Bizer, C.: Linked data: Evolving the web into a global data space. Synth. Lect. Semantic Web Theory Tech. 1(1), 1–136 (2011)CrossRef Heath, T., Bizer, C.: Linked data: Evolving the web into a global data space. Synth. Lect. Semantic Web Theory Tech. 1(1), 1–136 (2011)CrossRef
31.
Zurück zum Zitat Heath, W., Alexander, D., Booth, P.: Digital enlightenment, mydex, and restoring control over personal data to the individual. In: Hildebrandt, M., OHara, K., Waidner, M. (eds.) Digital Enlightenment Yearbook 2013: The Value of Personal Data, pp. 253–269. IOS Press, Amsterdam (2013) Heath, W., Alexander, D., Booth, P.: Digital enlightenment, mydex, and restoring control over personal data to the individual. In: Hildebrandt, M., OHara, K., Waidner, M. (eds.) Digital Enlightenment Yearbook 2013: The Value of Personal Data, pp. 253–269. IOS Press, Amsterdam (2013)
32.
Zurück zum Zitat Huang, G., Mak, K.: WeBid: a web-based framework to support early supplier involvement in new product development. Robot. Comput. Integrated Manuf. 16(2), 169–179 (2000)CrossRef Huang, G., Mak, K.: WeBid: a web-based framework to support early supplier involvement in new product development. Robot. Comput. Integrated Manuf. 16(2), 169–179 (2000)CrossRef
33.
Zurück zum Zitat Jones, W.: Keeping Found Things Found: The Study and Practice of Personal Information Management: The Study and Practice of Personal Information Management. Morgan Kaufmann, Amsterdam (2010) Jones, W.: Keeping Found Things Found: The Study and Practice of Personal Information Management: The Study and Practice of Personal Information Management. Morgan Kaufmann, Amsterdam (2010)
34.
Zurück zum Zitat Karger, D.R., Jones, W.: Data unification in personal information management. Comm. ACM 49(1), 77–82 (2006)CrossRef Karger, D.R., Jones, W.: Data unification in personal information management. Comm. ACM 49(1), 77–82 (2006)CrossRef
35.
Zurück zum Zitat Koshutanski, H., Ion, M., Telesca, L.: Distributed identity management model for digital ecosystems. In: Emerging Security Information, Systems, and Technologies, 2007. SecureWare 2007. The International Conference on, pp. 132–138. IEEE, New York (2007) Koshutanski, H., Ion, M., Telesca, L.: Distributed identity management model for digital ecosystems. In: Emerging Security Information, Systems, and Technologies, 2007. SecureWare 2007. The International Conference on, pp. 132–138. IEEE, New York (2007)
37.
Zurück zum Zitat Malone, T.W.: How do people organize their desks?: Implications for the design of office information systems. ACM Trans. Inform. Syst. (TOIS) 1(1), 99–112 (1983) Malone, T.W.: How do people organize their desks?: Implications for the design of office information systems. ACM Trans. Inform. Syst. (TOIS) 1(1), 99–112 (1983)
38.
Zurück zum Zitat Marshall, C.C.: Challenges and opportunities for personal digital archiving. Digital: Personal Collections in the Digital Era pp. 90–114 (2011) Marshall, C.C.: Challenges and opportunities for personal digital archiving. Digital: Personal Collections in the Digital Era pp. 90–114 (2011)
39.
Zurück zum Zitat Mayer-Schönberger, V., Cukier, K.: Big Data: A Revolution That Will Transform How We Live, Work and Think. John Murray, London (2013) Mayer-Schönberger, V., Cukier, K.: Big Data: A Revolution That Will Transform How We Live, Work and Think. John Murray, London (2013)
40.
Zurück zum Zitat McCallister, E.: Guide to Protecting the Confidentiality of Personally Identifiable Information. DIANE Publishing, Darby, PA, US (2010) McCallister, E.: Guide to Protecting the Confidentiality of Personally Identifiable Information. DIANE Publishing, Darby, PA, US (2010)
41.
Zurück zum Zitat Muth, P., Rakow, T.C.: Atomic commitment for integrated database systems. In: Data Engineering, 1991. Proceedings. Seventh International Conference on, pp. 296–304. IEEE, New York (1991) Muth, P., Rakow, T.C.: Atomic commitment for integrated database systems. In: Data Engineering, 1991. Proceedings. Seventh International Conference on, pp. 296–304. IEEE, New York (1991)
42.
Zurück zum Zitat Nadkarni, A., Hofmann, S.G.: Why do people use facebook? Pers. Indiv. Differ. 52(3), 243–249 (2012)CrossRef Nadkarni, A., Hofmann, S.G.: Why do people use facebook? Pers. Indiv. Differ. 52(3), 243–249 (2012)CrossRef
43.
Zurück zum Zitat Narayanan, A., Shmatikov, V.: Myths and fallacies of “personally identifying information. Comm. ACM 53(6), 24–26 (2010)CrossRef Narayanan, A., Shmatikov, V.: Myths and fallacies of “personally identifying information. Comm. ACM 53(6), 24–26 (2010)CrossRef
44.
Zurück zum Zitat Nelson, T.H.: Literary Machines: The Report On, and Of, Project Xanadu Concerning Word Processing, Electronic Publishing, Hypertext, Thinkertoys, Tomorrow’s Intellectual Revolution, and Certain Other Topics Including Knowledge, Education and Freedom. Nelson Ted; Schooley’s Mountain, NJ: distrib. by Distributors (1987) Nelson, T.H.: Literary Machines: The Report On, and Of, Project Xanadu Concerning Word Processing, Electronic Publishing, Hypertext, Thinkertoys, Tomorrow’s Intellectual Revolution, and Certain Other Topics Including Knowledge, Education and Freedom. Nelson Ted; Schooley’s Mountain, NJ: distrib. by Distributors (1987)
45.
Zurück zum Zitat Newman, W.M., Eldridge, M.A., Lamming, M.G.: Pepys: Generating autobiographies by automatic tracking. In: Proceedings of the Second European Conference on Computer-Supported Cooperative Work ECSCW91, pp. 175–188. Springer, New York (1991) Newman, W.M., Eldridge, M.A., Lamming, M.G.: Pepys: Generating autobiographies by automatic tracking. In: Proceedings of the Second European Conference on Computer-Supported Cooperative Work ECSCW91, pp. 175–188. Springer, New York (1991)
46.
Zurück zum Zitat Novotny, A., Spiekermann, S.: Personal information markets and privacy: a new model to solve the controversy. In: Hildebrandt, M., OHara, K., Waidner, M. (eds.) Digital Enlightenment Yearbook 2013: The Value of Personal Data, pp. 102–120. IOS Press, Amsterdam (2013) Novotny, A., Spiekermann, S.: Personal information markets and privacy: a new model to solve the controversy. In: Hildebrandt, M., OHara, K., Waidner, M. (eds.) Digital Enlightenment Yearbook 2013: The Value of Personal Data, pp. 102–120. IOS Press, Amsterdam (2013)
47.
Zurück zum Zitat Odom, W., Banks, R., Kirk, D., Harper, R., Lindley, S., Sellen, A.: Technology heirlooms?: considerations for passing down and inheriting digital materials. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pp. 337–346. ACM, New York (2012) Odom, W., Banks, R., Kirk, D., Harper, R., Lindley, S., Sellen, A.: Technology heirlooms?: considerations for passing down and inheriting digital materials. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pp. 337–346. ACM, New York (2012)
48.
Zurück zum Zitat OHara, K.: Are we getting privacy the wrong way round? IEEE Internet Comput. 17(4), 89–92 (2014) OHara, K.: Are we getting privacy the wrong way round? IEEE Internet Comput. 17(4), 89–92 (2014)
49.
Zurück zum Zitat OHara, K.: The information spring. IEEE Internet Comput. 18(2), 79–83 (2014) OHara, K.: The information spring. IEEE Internet Comput. 18(2), 79–83 (2014)
50.
Zurück zum Zitat Ohm, P.: Broken promises of privacy: responding to the surprising failure of anonymization. UCLA Law Rev. 57, 1701–1777 (2010) Ohm, P.: Broken promises of privacy: responding to the surprising failure of anonymization. UCLA Law Rev. 57, 1701–1777 (2010)
52.
Zurück zum Zitat Perry, M., O’hara, K., Sellen, A., Brown, B., Harper, R.: Dealing with mobility: understanding access anytime, anywhere. ACM Trans. Comput. Hum. Interact. (TOCHI) 8(4), 323–347 (2001) Perry, M., O’hara, K., Sellen, A., Brown, B., Harper, R.: Dealing with mobility: understanding access anytime, anywhere. ACM Trans. Comput. Hum. Interact. (TOCHI) 8(4), 323–347 (2001)
53.
Zurück zum Zitat Pirolli, P., Card, S.: Information foraging. Psychol. Rev. 106(4), 643 (1999)CrossRef Pirolli, P., Card, S.: Information foraging. Psychol. Rev. 106(4), 643 (1999)CrossRef
54.
Zurück zum Zitat Pirolli, P., Card, S.: The sensemaking process and leverage points for analyst technology as identified through cognitive task analysis. In: Proceedings of International Conference on Intelligence Analysis, vol. 5, pp. 2–4 (2005) Pirolli, P., Card, S.: The sensemaking process and leverage points for analyst technology as identified through cognitive task analysis. In: Proceedings of International Conference on Intelligence Analysis, vol. 5, pp. 2–4 (2005)
55.
Zurück zum Zitat Posner, R.A.: The economics of privacy. Am. Econ. Rev. 71, 405–409 (1981) Posner, R.A.: The economics of privacy. Am. Econ. Rev. 71, 405–409 (1981)
56.
Zurück zum Zitat Purdue, D., Dürrschmidt, J., Jowers, P., O’Doherty, R.: Diy culture and extended milieux: Lets, veggie boxes and festivals. Socio. Rev. 45(4), 645–667 (1997)CrossRef Purdue, D., Dürrschmidt, J., Jowers, P., O’Doherty, R.: Diy culture and extended milieux: Lets, veggie boxes and festivals. Socio. Rev. 45(4), 645–667 (1997)CrossRef
57.
Zurück zum Zitat Recordon, D., Reed, D.: OpenID 2.0: a platform for user-centric identity management. In: Proceedings of the Second ACM Workshop on Digital Identity Management, pp. 11–16. ACM, New York (2006) Recordon, D., Reed, D.: OpenID 2.0: a platform for user-centric identity management. In: Proceedings of the Second ACM Workshop on Digital Identity Management, pp. 11–16. ACM, New York (2006)
58.
Zurück zum Zitat Schaller, R.R.: Moore’s law: past, present and future. IEEE Spectrum 34(6), 52–59 (1997)CrossRef Schaller, R.R.: Moore’s law: past, present and future. IEEE Spectrum 34(6), 52–59 (1997)CrossRef
59.
Zurück zum Zitat Schilit, B., Adams, N., Want, R.: Context-aware computing applications. In: Mobile Computing Systems and Applications, 1994. WMCSA 1994. First Workshop on, pp. 85–90. IEEE, New York (1994) Schilit, B., Adams, N., Want, R.: Context-aware computing applications. In: Mobile Computing Systems and Applications, 1994. WMCSA 1994. First Workshop on, pp. 85–90. IEEE, New York (1994)
60.
Zurück zum Zitat Schilit, B.N., Adams, N., Gold, R., Tso, M.M., Want, R.: The parctab mobile computing system. In: Workstation Operating Systems, 1993. Proceedings., Fourth Workshop on, pp. 34–39. IEEE, New York (1993) Schilit, B.N., Adams, N., Gold, R., Tso, M.M., Want, R.: The parctab mobile computing system. In: Workstation Operating Systems, 1993. Proceedings., Fourth Workshop on, pp. 34–39. IEEE, New York (1993)
61.
Zurück zum Zitat Selker, T., Burleson, W.: Context-aware design and interaction in computer systems. IBM Syst. J. 39(3.4), 880–891 (2000) Selker, T., Burleson, W.: Context-aware design and interaction in computer systems. IBM Syst. J. 39(3.4), 880–891 (2000)
62.
Zurück zum Zitat Shadbolt, N.: Midata: towards a personal information revolution. In: M. Hildebrandt, K. OHara, M. Waidner (eds.) Digital Enlightenment Yearbook 2013: The Value of Personal Data, pp. 202–224. IOS Press (2013) Shadbolt, N.: Midata: towards a personal information revolution. In: M. Hildebrandt, K. OHara, M. Waidner (eds.) Digital Enlightenment Yearbook 2013: The Value of Personal Data, pp. 202–224. IOS Press (2013)
63.
Zurück zum Zitat Stonebraker, M., Rowe, L.A.: The design of postgres. In: Proc. of International Conference on the Management of Data, pp. 340–355. ACM, New York (1986) Stonebraker, M., Rowe, L.A.: The design of postgres. In: Proc. of International Conference on the Management of Data, pp. 340–355. ACM, New York (1986)
64.
Zurück zum Zitat Suchanek, F., Abiteboul, S., Senellart, P.: PARIS: probabilistic alignment of relations, instances, and schema. Proc. VLDB 11 5(3), 157–168 (2011) Suchanek, F., Abiteboul, S., Senellart, P.: PARIS: probabilistic alignment of relations, instances, and schema. Proc. VLDB 11 5(3), 157–168 (2011)
65.
Zurück zum Zitat Teevan, J., Alvarado, C., Ackerman, M.S., Karger, D.R.: The perfect search engine is not enough: a study of orienteering behavior in directed search. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pp. 415–422. ACM, New York (2004) Teevan, J., Alvarado, C., Ackerman, M.S., Karger, D.R.: The perfect search engine is not enough: a study of orienteering behavior in directed search. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pp. 415–422. ACM, New York (2004)
66.
Zurück zum Zitat Teevan, J., Jones, W., Bederson, B.B.: Personal information management. Comm. ACM 49(1), 40–43 (2006)CrossRef Teevan, J., Jones, W., Bederson, B.B.: Personal information management. Comm. ACM 49(1), 40–43 (2006)CrossRef
68.
Zurück zum Zitat Vakkari, P.: Task-based information searching. Annu. Rev. Inform. Sci. Tech. 37(1), 413–464 (2003)CrossRef Vakkari, P.: Task-based information searching. Annu. Rev. Inform. Sci. Tech. 37(1), 413–464 (2003)CrossRef
69.
Zurück zum Zitat Van Kleek, M., Smith, D.A., Packer, H.S., Skinner, J., Shadbolt, N.R.: Carpé data: supporting serendipitous data integration in personal information management. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pp. 2339–2348. ACM, New York (2013) Van Kleek, M., Smith, D.A., Packer, H.S., Skinner, J., Shadbolt, N.R.: Carpé data: supporting serendipitous data integration in personal information management. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pp. 2339–2348. ACM, New York (2013)
70.
Zurück zum Zitat Van Kleek, M.G., Bernstein, M., Panovich, K., Vargas, G.G., Karger, D.R., Schraefel, M.: Note to self: examining personal information keeping in a lightweight note-taking tool. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pp. 1477–1480. ACM, New York (2009) Van Kleek, M.G., Bernstein, M., Panovich, K., Vargas, G.G., Karger, D.R., Schraefel, M.: Note to self: examining personal information keeping in a lightweight note-taking tool. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pp. 1477–1480. ACM, New York (2009)
71.
Zurück zum Zitat Von Hippel, E.: Learning from open-source software. MIT Sloan Manag. Rev. 42(4), 82–86 (2001) Von Hippel, E.: Learning from open-source software. MIT Sloan Manag. Rev. 42(4), 82–86 (2001)
72.
Zurück zum Zitat Wang, Y., Kobsa, A.: Privacy-enhancing technologies. Social and Organizational Liabilities in Information Security, pp. 203–227 (2006) Wang, Y., Kobsa, A.: Privacy-enhancing technologies. Social and Organizational Liabilities in Information Security, pp. 203–227 (2006)
73.
Zurück zum Zitat Whittaker, S.: Personal information management: from information consumption to curation. Annu. Rev. Inform. Sci. Tech. 45(1), 1–62 (2011)CrossRef Whittaker, S.: Personal information management: from information consumption to curation. Annu. Rev. Inform. Sci. Tech. 45(1), 1–62 (2011)CrossRef
74.
Zurück zum Zitat Whittaker, S., Hirschberg, J.: The character, value, and management of personal paper archives. ACM Trans. Comput. Hum. Interact. (TOCHI) 8(2), 150–170 (2001) Whittaker, S., Hirschberg, J.: The character, value, and management of personal paper archives. ACM Trans. Comput. Hum. Interact. (TOCHI) 8(2), 150–170 (2001)
75.
Zurück zum Zitat Williams, N., Howard, L.: A SASL and GSS-API mechanism for the BrowserID authentication protocol (2013) Williams, N., Howard, L.: A SASL and GSS-API mechanism for the BrowserID authentication protocol (2013)
77.
Zurück zum Zitat Yang, M., Sassone, V., OHara, K.: Appendix 3: Practical Examples of Some Anonymisation Techniques, pp. 80–103. UK Information Commissioners Office (2012) Yang, M., Sassone, V., OHara, K.: Appendix 3: Practical Examples of Some Anonymisation Techniques, pp. 80–103. UK Information Commissioners Office (2012)
Metadaten
Titel
The Future of Social Is Personal: The Potential of the Personal Data Store
verfasst von
Max Van Kleek
Kieron OHara
Copyright-Jahr
2014
DOI
https://doi.org/10.1007/978-3-319-08681-1_7

Neuer Inhalt