Skip to main content

The Future of Social Is Personal: The Potential of the Personal Data Store

  • Chapter
  • First Online:
Book cover Social Collective Intelligence

Part of the book series: Computational Social Sciences ((CSS))

Abstract

This chapter argues that technical architectures that facilitate the longitudinal, decentralised and individual-centric personal collection and curation of data will be an important, but partial, response to the pressing problem of the autonomy of the data subject, and the asymmetry of power between the subject and large scale service providers/data consumers. Towards framing the scope and role of such Personal Data Stores (PDSes), the legalistic notion of personal data is examined, and it is argued that a more inclusive, intuitive notion expresses more accurately what individuals require in order to preserve their autonomy in a data-driven world of large aggregators. Six challenges towards realising the PDS vision are set out: the requirement to store data for long periods; the difficulties of managing data for individuals; the need to reconsider the regulatory basis for third-party access to data; the need to comply with international data handling standards; the need to integrate privacy-enhancing technologies; and the need to future-proof data gathering against the evolution of social norms. The open experimental PDS platform INDX is introduced and described, as a means of beginning to address at least some of these six challenges.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 54.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    Facebook Home—www.facebook.com/home.

  2. 2.

    Skydrive—www.microsoft.com/skydrive.

  3. 3.

    iCloud—www.apple.com/icloud.

  4. 4.

    Time Machine—www.apple.com/uk/support/timemachine/.

  5. 5.

    Filemaker—www.filemaker.com.

  6. 6.

    www4.va.gov/bluebutton/.

  7. 7.

    mesinfos.fing.org/.

  8. 8.

    www.theguardian.com/world/the-nsa-files,www.ub.uio.no/fag/informatikk-matematikk/informatikk/faglig/bibliografier/no21984.html.

  9. 9.

    lockerproject.org.

  10. 10.

    data.fm.

  11. 11.

    owncloud.org.

  12. 12.

    www.openstack.org.

  13. 13.

    Fitbits—www.fitbit.com.

  14. 14.

    Nike+ Fuelband—www.nike.com/fuelband.

  15. 15.

    Google Glass—www.google.com/glass.

  16. 16.

    Skydrive Pro- http://office.microsoft.com/en-001/office365-sharepoint-online-enterprise-help/manage-document-versions-in-skydrive-pro-HA103158256.aspx.

  17. 17.

    Apple Airport Time Capsule—www.apple.com/airport-time-capsule/.

  18. 18.

    WD MyCloud www.wdc.com/en/products/network/networkstorage/.

  19. 19.

    Drobo—www.drobo.com.

  20. 20.

    INDX source code and distributions—http://indx.es.

References

  1. Agustin, J.M., Albritton, W.M.: Vendor relationship management (2001)

    Google Scholar 

  2. Antoniou, G., Van Harmelen, F.: Web Ontology Language: OWL. In: Handbook on Ontologies, pp. 67–92. Springer, New York (2004)

    Google Scholar 

  3. Armando, A., Carbone, R., Compagna, L., Cuellar, J., Tobarra, L.: Formal analysis of SAML 2.0 web browser single sign-on: breaking the SAML-based single sign-on for Google Apps. In: Proceedings of the 6th ACM Workshop on Formal Methods in Security Engineering, pp. 1–10. ACM, New York (2008)

    Google Scholar 

  4. Bandura, A.: Self-efficacy: toward a unifying theory of behavioral change. Psychol. Rev. 84(2), 191 (1977)

    Article  Google Scholar 

  5. Banisar, D., Davies, S.: Global trends in privacy protection: An international survey of privacy, data protection, and surveillance laws and developments. John Marshall J. Comput. Inform. Law 18(1) (1999)

    Google Scholar 

  6. Bannon, L., Bødker, S.: Constructing common information spaces. In: Proceedings of the Fifth European Conference on Computer Supported Cooperative Work, pp. 81–96. Springer, New York (1997)

    Google Scholar 

  7. Bell, C.G., Gemmell, J., Rosson, C.: Total recall. Dutton (2010)

    Google Scholar 

  8. Bellotti, V., Dalal, B., Good, N., Flynn, P., Bobrow, D.G., Ducheneaut, N.: What a to-do: studies of task management towards the design of a personal task list manager. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pp. 735–742. ACM, New York (2004)

    Google Scholar 

  9. Benyon, D., Höök, K.: Navigation in information spaces: supporting the individual. In: Human-Computer Interaction INTERACT97, pp. 39–46. Springer, New York (1997)

    Google Scholar 

  10. Boston Consulting Group: Unlocking the value of personal data: From collection to usage (2013)

    Google Scholar 

  11. Bush, V.: As We May Think. The Atlantic Monthly, Boston (1945)

    Google Scholar 

  12. Bygrave, L.A.: Data Protection Law. Kluwer Law International, New York (2002)

    Google Scholar 

  13. Castano, S., Ferrara, A., Montanelli, S.: Matching ontologies in open networked systems: Techniques and applications. J. Data Semant. V 25–63 (2006)

    Google Scholar 

  14. Cavoukian, A., El Emam, K.: Dispelling the Myths Surrounding De-identification: Anonymization Remains a Strong Tool for Protecting Privacy. Office of the Privacy and Information Commissioner, Ontario (2011)

    Google Scholar 

  15. Chervenak, A., Vellanki, V., Kurmas, Z.: Protecting file systems: A survey of backup techniques. In: Proceedings Joint NASA and IEEE Mass Storage Conference, vol. 3 (1998)

    Google Scholar 

  16. Chi, E.H., Pirolli, P., Chen, K., Pitkow, J.: Using information scent to model user information needs and actions and the web. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pp. 490–497. ACM, New York (2001)

    Google Scholar 

  17. Chohan, N., Bunch, C., Krintz, C., Nomura, Y.: Database-agnostic transaction support for cloud infrastructures. In: Cloud Computing (CLOUD), 2011 IEEE International Conference on, pp. 692–699. IEEE (2011)

    Google Scholar 

  18. Choney, S.: Facebook timeline poll: ‘overwhelming negative’ reaction. Today (2012). URL http://www.today.com/tech/facebook-timeline-poll-overwhelming-negative-reaction-84717

  19. Dey, A.K.: Understanding and using context. Personal Ubiquitous Comput. 5(1), 4–7 (2001)

    Article  Google Scholar 

  20. Doan, A., Madhavan, J., Dhamankar, R., Domingos, P., Halevy, A.: Learning to match ontologies on the Semantic Web. VLDB J. 12(4), 303–319 (2003)

    Article  Google Scholar 

  21. Engelbart, D.C., English, W.K.: A research center for augmenting human intellect. In: Proceedings of the December 9–11, 1968, Fall Joint Computer Conference, Part I, pp. 395–410. ACM, New York (1968)

    Google Scholar 

  22. Ennals, R., Brewer, E., Garofalakis, M., Shadle, M., Gandhi, P.: Intel Mash Maker: join the web. SIGMOD Rec. 36(4), 27–33 (2007)

    Article  Google Scholar 

  23. Euzenat, J.: An API for ontology alignment. Proc ISWC ’04 pp. 698–712 (2004)

    Google Scholar 

  24. Fertig, S., Freeman, E., Gelernter, D.: Lifestreams: an alternative to the desktop metaphor. In: Conference Companion on Human Factors in Computing Systems, pp. 410–411. ACM, New York (1996)

    Google Scholar 

  25. Floridi, L.: The Ethics of Information. Oxford University Press, Oxford (2013)

    Book  Google Scholar 

  26. Fung, A., Graham, M., Weil, D.: Full Disclosure: The Perils and Promise of Transparency. Cambridge University Press, Cambridge (2007)

    Book  Google Scholar 

  27. Gemmell, J., Bell, G., Lueder, R., Drucker, S., Wong, C.: Mylifebits: fulfilling the memex vision. In: Proceedings of the Tenth ACM International Conference on Multimedia, pp. 235–238. ACM, New York (2002)

    Google Scholar 

  28. Grasso, M.A., Yen, M.J., Mintz, M.L.: Survey of handheld computing among medical students. Comput. Meth. Programs Biomed. 82(3), 196–202 (2006)

    Article  Google Scholar 

  29. Hardt, D.: The oauth 2.0 authorization framework (2012). IETF RFC 6749

    Google Scholar 

  30. Heath, T., Bizer, C.: Linked data: Evolving the web into a global data space. Synth. Lect. Semantic Web Theory Tech. 1(1), 1–136 (2011)

    Article  Google Scholar 

  31. Heath, W., Alexander, D., Booth, P.: Digital enlightenment, mydex, and restoring control over personal data to the individual. In: Hildebrandt, M., OHara, K., Waidner, M. (eds.) Digital Enlightenment Yearbook 2013: The Value of Personal Data, pp. 253–269. IOS Press, Amsterdam (2013)

    Google Scholar 

  32. Huang, G., Mak, K.: WeBid: a web-based framework to support early supplier involvement in new product development. Robot. Comput. Integrated Manuf. 16(2), 169–179 (2000)

    Article  Google Scholar 

  33. Jones, W.: Keeping Found Things Found: The Study and Practice of Personal Information Management: The Study and Practice of Personal Information Management. Morgan Kaufmann, Amsterdam (2010)

    Google Scholar 

  34. Karger, D.R., Jones, W.: Data unification in personal information management. Comm. ACM 49(1), 77–82 (2006)

    Article  Google Scholar 

  35. Koshutanski, H., Ion, M., Telesca, L.: Distributed identity management model for digital ecosystems. In: Emerging Security Information, Systems, and Technologies, 2007. SecureWare 2007. The International Conference on, pp. 132–138. IEEE, New York (2007)

    Google Scholar 

  36. Lin, J., Wong, J., Nichols, J., Cypher, A., Lau, T.A.: End-user programming of mashups with vegemite. In: Proc. IUI ’09, pp. 97–106. ACM, New York (2009). DOI 10.1145/1502650.1502667. URL http://doi.acm.org/10.1145/1502650.1502667

  37. Malone, T.W.: How do people organize their desks?: Implications for the design of office information systems. ACM Trans. Inform. Syst. (TOIS) 1(1), 99–112 (1983)

    Google Scholar 

  38. Marshall, C.C.: Challenges and opportunities for personal digital archiving. Digital: Personal Collections in the Digital Era pp. 90–114 (2011)

    Google Scholar 

  39. Mayer-Schönberger, V., Cukier, K.: Big Data: A Revolution That Will Transform How We Live, Work and Think. John Murray, London (2013)

    Google Scholar 

  40. McCallister, E.: Guide to Protecting the Confidentiality of Personally Identifiable Information. DIANE Publishing, Darby, PA, US (2010)

    Google Scholar 

  41. Muth, P., Rakow, T.C.: Atomic commitment for integrated database systems. In: Data Engineering, 1991. Proceedings. Seventh International Conference on, pp. 296–304. IEEE, New York (1991)

    Google Scholar 

  42. Nadkarni, A., Hofmann, S.G.: Why do people use facebook? Pers. Indiv. Differ. 52(3), 243–249 (2012)

    Article  Google Scholar 

  43. Narayanan, A., Shmatikov, V.: Myths and fallacies of “personally identifying information. Comm. ACM 53(6), 24–26 (2010)

    Article  Google Scholar 

  44. Nelson, T.H.: Literary Machines: The Report On, and Of, Project Xanadu Concerning Word Processing, Electronic Publishing, Hypertext, Thinkertoys, Tomorrow’s Intellectual Revolution, and Certain Other Topics Including Knowledge, Education and Freedom. Nelson Ted; Schooley’s Mountain, NJ: distrib. by Distributors (1987)

    Google Scholar 

  45. Newman, W.M., Eldridge, M.A., Lamming, M.G.: Pepys: Generating autobiographies by automatic tracking. In: Proceedings of the Second European Conference on Computer-Supported Cooperative Work ECSCW91, pp. 175–188. Springer, New York (1991)

    Google Scholar 

  46. Novotny, A., Spiekermann, S.: Personal information markets and privacy: a new model to solve the controversy. In: Hildebrandt, M., OHara, K., Waidner, M. (eds.) Digital Enlightenment Yearbook 2013: The Value of Personal Data, pp. 102–120. IOS Press, Amsterdam (2013)

    Google Scholar 

  47. Odom, W., Banks, R., Kirk, D., Harper, R., Lindley, S., Sellen, A.: Technology heirlooms?: considerations for passing down and inheriting digital materials. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pp. 337–346. ACM, New York (2012)

    Google Scholar 

  48. OHara, K.: Are we getting privacy the wrong way round? IEEE Internet Comput. 17(4), 89–92 (2014)

    Google Scholar 

  49. OHara, K.: The information spring. IEEE Internet Comput. 18(2), 79–83 (2014)

    Google Scholar 

  50. Ohm, P.: Broken promises of privacy: responding to the surprising failure of anonymization. UCLA Law Rev. 57, 1701–1777 (2010)

    Google Scholar 

  51. Olmstead, T.: Facebook timeline and users: Not quite a love affair. Mashable (2012). URL http://mashable.com/2012/01/31/facebook-timeline-poll-results/

  52. Perry, M., O’hara, K., Sellen, A., Brown, B., Harper, R.: Dealing with mobility: understanding access anytime, anywhere. ACM Trans. Comput. Hum. Interact. (TOCHI) 8(4), 323–347 (2001)

    Google Scholar 

  53. Pirolli, P., Card, S.: Information foraging. Psychol. Rev. 106(4), 643 (1999)

    Article  Google Scholar 

  54. Pirolli, P., Card, S.: The sensemaking process and leverage points for analyst technology as identified through cognitive task analysis. In: Proceedings of International Conference on Intelligence Analysis, vol. 5, pp. 2–4 (2005)

    Google Scholar 

  55. Posner, R.A.: The economics of privacy. Am. Econ. Rev. 71, 405–409 (1981)

    Google Scholar 

  56. Purdue, D., Dürrschmidt, J., Jowers, P., O’Doherty, R.: Diy culture and extended milieux: Lets, veggie boxes and festivals. Socio. Rev. 45(4), 645–667 (1997)

    Article  Google Scholar 

  57. Recordon, D., Reed, D.: OpenID 2.0: a platform for user-centric identity management. In: Proceedings of the Second ACM Workshop on Digital Identity Management, pp. 11–16. ACM, New York (2006)

    Google Scholar 

  58. Schaller, R.R.: Moore’s law: past, present and future. IEEE Spectrum 34(6), 52–59 (1997)

    Article  Google Scholar 

  59. Schilit, B., Adams, N., Want, R.: Context-aware computing applications. In: Mobile Computing Systems and Applications, 1994. WMCSA 1994. First Workshop on, pp. 85–90. IEEE, New York (1994)

    Google Scholar 

  60. Schilit, B.N., Adams, N., Gold, R., Tso, M.M., Want, R.: The parctab mobile computing system. In: Workstation Operating Systems, 1993. Proceedings., Fourth Workshop on, pp. 34–39. IEEE, New York (1993)

    Google Scholar 

  61. Selker, T., Burleson, W.: Context-aware design and interaction in computer systems. IBM Syst. J. 39(3.4), 880–891 (2000)

    Google Scholar 

  62. Shadbolt, N.: Midata: towards a personal information revolution. In: M. Hildebrandt, K. OHara, M. Waidner (eds.) Digital Enlightenment Yearbook 2013: The Value of Personal Data, pp. 202–224. IOS Press (2013)

    Google Scholar 

  63. Stonebraker, M., Rowe, L.A.: The design of postgres. In: Proc. of International Conference on the Management of Data, pp. 340–355. ACM, New York (1986)

    Google Scholar 

  64. Suchanek, F., Abiteboul, S., Senellart, P.: PARIS: probabilistic alignment of relations, instances, and schema. Proc. VLDB 11 5(3), 157–168 (2011)

    Google Scholar 

  65. Teevan, J., Alvarado, C., Ackerman, M.S., Karger, D.R.: The perfect search engine is not enough: a study of orienteering behavior in directed search. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pp. 415–422. ACM, New York (2004)

    Google Scholar 

  66. Teevan, J., Jones, W., Bederson, B.B.: Personal information management. Comm. ACM 49(1), 40–43 (2006)

    Article  Google Scholar 

  67. The new personal data landscape (2011). URL http://ctrl-shift.co.uk/wordpress/wp-content/uploads/2011/11/The-new-personal-data-landscape-FINAL.pdf

  68. Vakkari, P.: Task-based information searching. Annu. Rev. Inform. Sci. Tech. 37(1), 413–464 (2003)

    Article  Google Scholar 

  69. Van Kleek, M., Smith, D.A., Packer, H.S., Skinner, J., Shadbolt, N.R.: Carpé data: supporting serendipitous data integration in personal information management. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pp. 2339–2348. ACM, New York (2013)

    Google Scholar 

  70. Van Kleek, M.G., Bernstein, M., Panovich, K., Vargas, G.G., Karger, D.R., Schraefel, M.: Note to self: examining personal information keeping in a lightweight note-taking tool. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pp. 1477–1480. ACM, New York (2009)

    Google Scholar 

  71. Von Hippel, E.: Learning from open-source software. MIT Sloan Manag. Rev. 42(4), 82–86 (2001)

    Google Scholar 

  72. Wang, Y., Kobsa, A.: Privacy-enhancing technologies. Social and Organizational Liabilities in Information Security, pp. 203–227 (2006)

    Google Scholar 

  73. Whittaker, S.: Personal information management: from information consumption to curation. Annu. Rev. Inform. Sci. Tech. 45(1), 1–62 (2011)

    Article  Google Scholar 

  74. Whittaker, S., Hirschberg, J.: The character, value, and management of personal paper archives. ACM Trans. Comput. Hum. Interact. (TOCHI) 8(2), 150–170 (2001)

    Google Scholar 

  75. Williams, N., Howard, L.: A SASL and GSS-API mechanism for the BrowserID authentication protocol (2013)

    Google Scholar 

  76. Wong, J., Hong, J.I.: Making mashups with marmite: towards end-user programming for the web. In: Proc. CHI ’07, pp. 1435–1444. ACM, New York (2007). DOI 10.1145/1240624.1240842. URL http://doi.acm.org/10.1145/1240624.1240842

  77. Yang, M., Sassone, V., OHara, K.: Appendix 3: Practical Examples of Some Anonymisation Techniques, pp. 80–103. UK Information Commissioners Office (2012)

    Google Scholar 

Download references

Acknowledgements

The work described in this chapter is supported through an interdisciplinary ESPRC Research Grant EP/J017728/1, The Theory and Practice of Social Machines. The design and development of the INDX platform has benefitted from contributions from SOCIAM researchers, including Daniel Alexander Smith, Laura Dragăn, Markus Lucsak-Roesch, Ramine Tinati, and Dave Murray-Rust, and with direction and advising from Sir Nigel Shadbolt, Sir Tim Berners-Lee, and Dame Wendy Hall.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Max Van Kleek .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer International Publishing Switzerland

About this chapter

Cite this chapter

Van Kleek, M., OHara, K. (2014). The Future of Social Is Personal: The Potential of the Personal Data Store. In: Miorandi, D., Maltese, V., Rovatsos, M., Nijholt, A., Stewart, J. (eds) Social Collective Intelligence. Computational Social Sciences. Springer, Cham. https://doi.org/10.1007/978-3-319-08681-1_7

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-08681-1_7

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-08680-4

  • Online ISBN: 978-3-319-08681-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics