2015
DOI: 10.7146/aahcc.v1i1.21312
|View full text |Cite
|
Sign up to set email alerts
|

Personal Data: Thinking Inside the Box

Abstract: <div class="page" title="Page 1"><div class="layoutArea"><div class="column"><p><span>We are in a ‘personal data gold rush’ driven by advertising being the primary revenue source for most online companies. These companies accumulate extensive personal data about individuals with minimal concern for us, the subjects of this process. This can cause many harms: privacy infringement, personal and professional embarrassment, restricted access to labour markets, restricted access to hig… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
58
0

Year Published

2016
2016
2019
2019

Publication Types

Select...
4
2
2

Relationship

2
6

Authors

Journals

citations
Cited by 86 publications
(59 citation statements)
references
References 20 publications
0
58
0
Order By: Relevance
“…developing local PDMS rather than cloud-based ones. One such example is provided by the Databox model [25]. At the centre of this model sits a physical device located in the individual's home, which is under the direct control of the individual.…”
Section: Striking the Balancementioning
confidence: 99%
“…developing local PDMS rather than cloud-based ones. One such example is provided by the Databox model [25]. At the centre of this model sits a physical device located in the individual's home, which is under the direct control of the individual.…”
Section: Striking the Balancementioning
confidence: 99%
“…These actions are complemented by two new ones. 'Licensing' conveys an act of sharing whereby permissions are negotiated between the user and some other party, be that a person or a service (this is somewhat akin to the possibilities offered by Databox [1]). 'Giving' refers to the transfer of permissions from one person to another, and could underpin social practices such as gifting, loaning and inheritance.…”
Section: Conceptual Workmentioning
confidence: 99%
“…Examples include tools that permit the deletion of content regardless of how it has been synced and duplicated [6], entities that articulate a user's data sharing preferences across a fragmented ecosystem of technologies [28], and systems that allow users to specify how services can access their data [1]. As noted in the Introduction, research into virtual possessions has also proposed the 'bundling' of content to form new abstractions [9], and the development of new actions as ways of underpinning ownership, including by reasserting ownership (by, e.g., withdrawing content from an online service) as well as by being able to relinquish it [16,9].…”
Section: Related Workmentioning
confidence: 99%
“…Databox [1] proposes a trusted platform which is designed to allow users to manage and use their own data, grant controlled access to others and offer different support incentive policies for external users. RaspPiPCloud [2] builds on this to propose a novel low cost personal cloud approach hosted ion devices such as Raspberry Pi which allows users to collect, store, query and share their own data.…”
Section: Related Workmentioning
confidence: 99%
“…Even though the majority of users are not aware of the technical details of what happens to their data once they use cloud services, they are increasingly aware that many service providers analyze their personal data to build profiles which they "trade" with other agencies such as advertising or credit companies [1]. In this paper, we address this problem by proposing a mobile low cost, intelligent and adaptive human-centered, personal cloud architecture which allows users to host their services, collect, store and analyse as well as interact with their data and services.…”
Section: Introductionmentioning
confidence: 99%