Skip to main content

Selective Archiving: A Model for Privacy Sensitive Capture and Access Technologies

  • Chapter

Abstract

At times, people need or want a record of their previous experiences. Sometimes those records are media other than text-based descriptions or notes. At the same time, a world of constant capture invokes Orwellian fears of surveillance and monitoring in a modern digital Panopticon. Thus, the selective archiving model, in which data are constantly buffered but require explicit input to be archived, represents a compromise through which people can dynamically negotiate their own policies around control, privacy, information access, and comfort. Through multiple formative studies and two deployment studies of selective archiving technologies in very different spaces for very different reasons, we are able to tease out some significant themes about recording in everyday life. In this chapter, we discuss those issues as observed in this work and outline some areas of future research in selective archiving.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Abowd G.D. and Mynatt E.D. (2000) Charting Past, Present and Future Research in Ubiquitous Computing. ACM Transactions on Computer-Human Interaction, Volume 7(1): 29–58, March 2000.

    Article  Google Scholar 

  2. Dietz P.H. and Yerazunis W.S. (2001) Real-Time Audio Buffering for Telephone Applications. In the Proceedings of UIST 2001: 193–194.

    Google Scholar 

  3. FERPA (1974) The Family Educational Rights and Privacy Act (FERPA) (20 U.S.C. § 1232 g; 34 CFR Part 99).

    Google Scholar 

  4. Gemmell J., Bell G., Lueder R., Drucker S. and Wong C. (2002) MyLifeBits: Fulfilling the Memex Vision. In the Proceedings of ACM Multimedia 2002: 235–238.

    Google Scholar 

  5. Goffman E. (1955) On Face-Work: An Analysis of Ritual Elements in Social Interaction. Psychiatry, Volume 81: 213–231.

    Google Scholar 

  6. Hayes G.R. and Abowd G.D. (2006) Tensions in Designing Capture Technologies for an Evidence-based Care Community. In the Proceedings CHI 2006: 937–946.

    Google Scholar 

  7. Hayes G.R., Gardere L., Abowd G.D. and Truong K.N. (2008) CareLog: A Selective Archiving Tool for Behavior Management in Schools. In the Proceedings CHI 2008: 685–694.

    Google Scholar 

  8. Hayes G.R., Kientz J.A., Truong K.N., White D.R., Abowd G.D. and Pering T. (2004) Designing Capture Applications to Support the Education of Children with Autism. In the Proceedings of UBICOMP 2004: 161–178

    Google Scholar 

  9. Hayes G.R., Patel S.N., Truong K.N., Iachello G., Kientz J.A., Farmer R. and Abowd G.D. (2004) The Personal Audio Loop: Designing a Ubiquitous Audio-based Memory aid. In the Proceedings of MobileHCI 2004: 168–179.

    Google Scholar 

  10. Hayes G.R., Poole E.S., Iachello G., Patel S.N., Grimes A., Abowd G.D. and Truong, K.N. (2007) Physical, Social, and Experiential Knowledge of Privacy and Security in a Pervasive Computing Environment. In IEEE Pervasive Computing, Volume 6(4): 56–63.

    Article  Google Scholar 

  11. Hayes G.R., Truong K.N., Abowd G.D. and Pering T. (2005) Experience Buffers: A Socially Appropriate, Selective Archiving Tool for Evidence-Based Care. In the Extended Abstracts of CHI’05: 1435–1438.

    Google Scholar 

  12. Healey J. and Picard R.W. (1998) StartleCam: A Cybernetic Wearable Camera. In the Proceedings of ISWC 1998: 42–49

    Google Scholar 

  13. Hindus D. and Schmandt C. (1992) Ubiquitous Audio: Capturing Spontaneous Collaboration. In the Proceedings of the CSCW 1992: 210–217.

    Google Scholar 

  14. Iachello G., Truong K.N., Abowd G.D., Stevens M.M. and Hayes G.R. (2006) Prototyping and Sampling Experience to Evaluate Ubiquitous Computing Privacy in the Real World. In the Proceedings of CHI 2006: 1009–1018.

    Google Scholar 

  15. Minneman S.L. and Harrison S.R. (1993) Where Were We: Making and Using Near-Synchronous, Pre-Narrative Video. In the Proceedings ACM Multimedia 1993: 207–214.

    Google Scholar 

  16. Patel S.N., Truong K.N., Hayes G.R., Iachello G., Kientz J.A. and Abowd G.D. (2007) The Personal Audio Loop: A Ubiquitous Audio-Based Memory Aid. In: Joanna Lumsden (Ed.) Handbook of User Interface Design and Evaluation for Mobile Technology.

    Google Scholar 

  17. Truong K.N. (2005) INCA: An Infrastructure for Capture & Access - Supporting the Generation, Preservation and Use of Memories from Everyday Life. Georgia Institute of Technology, Ph.D. Dissertation.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Gillian R. Hayes .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2009 Springer Science+Business Media, LLC

About this chapter

Cite this chapter

Hayes, G.R., Truong, K.N. (2009). Selective Archiving: A Model for Privacy Sensitive Capture and Access Technologies. In: Senior, A. (eds) Protecting Privacy in Video Surveillance. Springer, London. https://doi.org/10.1007/978-1-84882-301-3_10

Download citation

  • DOI: https://doi.org/10.1007/978-1-84882-301-3_10

  • Publisher Name: Springer, London

  • Print ISBN: 978-1-84882-300-6

  • Online ISBN: 978-1-84882-301-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics