Authors:

Na Li

Frank Hopfgartner

Abstract:

With more and more wearable devices and smartphone apps being released that are capable of unobtrusively recording various aspects of our life, we are currently witnessing the emergence of a new trend. Followers of this trend rely on these apps and devices to track their every day activities and to gain insights into their personal well-being. Although promoted by various players on the market, the use of such techniques does not come without risks or drawbacks. In this chapter, we use the SWOT matrix, which is commonly used by business strategists, to evaluate the strengths, weaknesses, opportunities, and threats of self-tracking activities.

Document:

https://link.springer.com/chapter/10.1007/978-3-658-13137-1_17

References:

  1. Albatal, R., Gurrin, C., Zhou, J., Yang, Y., Carthy, D., & Li, N. (2013). Senseseer mobilecloud-based lifelogging framework. Technology and Society (ISTAS), 2013 IEEE International Symposium on, 144-146.
  2. Arcega, L., Font, J., & Cetina, C. (2013). Towards Memory-Aware Services and Browsing through Lifelogging Sensing. Sensors, 13(11), 15113-15137.
  3. Baum, G. (2013). Wacht auf, es geht um die Menschenwürde. Datenschutz und Datensicherheit – DuD, 37(9), 583-584.
  4. Bell, G., & Gemmell, J. (2010). Your Life, Uploaded: The Digital Way to Better Memory, Health, and Productivity. New York: Plume.
  5. Biggs, J. (2012). Augmented Reality Explorer Steve Mann Assaulted At Parisian McDonald’s. http://techcrunch.com/2012/07/16/augmented-reality-explorer-steve-mann-assaulted-at-parisian-mcdonalds/. Accessed 06 March 2015.
  6. Blair, S. N., Kohl, H. W., Paffenbarqer, R. S. J., Clark, D. G., Cooper, K. H., & Gibbons, L. W. (1989). Physical fitness and all-cause mortality. A prospective study of healthy men and women. The Journal of the American Medical Association, 262(17), 2395-2401.
  7. Brake, D. R. (2014). Sharing our Lives Online- Risks and Exposure in Social Media. London: Palgrave Macmillan.
  8. Burneleit, E. (2011). Necrologium Vitae. Master Thesis at University of Applied Sciences Potsdam.
  9. Caprani, N., O’Connor, N., & Gurrin, C. (2013). Experiencing SenseCam: a case study interview exploring seven years living with a wearable camera. Proceedings of the 4th International SenseCam & Pervasive Imaging Conference (SenseCam ‘13), 52-59.Falagas, M. E., Pitsouni, E. I., Malietzis, G. A., & Pappas, G. (2008). Comparison of PubMed, Scopus, Web of Science, and Google Scholar: strengths and weaknesses. The FASEB Journal, 22(2), 338-342.
  10. Fox, S., & Duggan, M. (2012). Mobile Health 2012. http://www.pewinternet.org/files/old-media/Files/Reports/2012/PIP_MobileHealth2012_FINAL.pdf. Accessed 06 March 2015.
  11. Fox, S., & Duggan, M. (2013). Part Three: Tracking for Health. http://www.pewinternet.org/2013/11/26/part-three-tracking-for-health/. Accessed 06 March 2015.
  12. Friedland, G., & Sommer, R. (2010). Cybercasing the Joint: On the Privacy Implications of Geo-Tagging. Proceedings of the 5th USENIX conference on Hot topics in security (HotSec’10), 1-8.
  13. Gurrin, C. (2013). Keynote: Experience of a Lifelogger: Tasks and Challenges. Keynote at the Lifelong User Modelling Workshop 2013.
  14. Gurrin, C., Smeaton, A. F., & Doherty, A. R. (2014). Lifelogging: Personal Big Data, Foundations and Trends in Information Retrieval, 8(1), 1-125.
  15. Hodges, S., Williams, L., Berry, E., Izadi, S., Srinivasan, J., Butler, A., Smyth, G., Kapur, N., & Wood, K. (2006). SenseCam: A Retrospective Memory Aid, Proceedings of the 8th International Conference of Ubiquitous Computing (UbiComp 2006), 177-193.
  16. Hopfgartner, F. (2015). Smart Information Systems: Computational Intelligence for Real- Life Applications. Heidelberg: Springer Verlag.
  17. Hopfgartner, F., & Jose, J. M. (2010). Semantic User Modelling for Personal News Video Retrieval. In S. Boll, Q. Tian, L. Zhang, Z. Zhang, & Y.-P. P. Chen (Eds.), Advances in Multimedia Modeling. 16th International Multimedia Modeling Conference, MMM 2010 (pp. 336-346). Heidelberg: Springer Verlag
  18. Ioannis, A., Brown, I., Dickman, P., Friedewald, M., Irion, K., Kosta, E., Langheinrich, M., McCarthy, P., Osimo, D., Papiotis, S., Pasic, A., Petkovic, M., Spiekermann, S., & Wright, D. (2011). To log or not to log?—Risks and benefits of emerging life-logging applications. European Network and Information Security Agency (ENISA).
  19. Karatzoglou, A., Amatriain, X., & Baltrunas, L. (2010). Multiverse Recommendation: N-dimensional Tensor Factorization for Context-aware Collaborative Filtering, RecSys ‘10 Proceedings of the fourth ACM conference on Recommender systems, 79-86.
  20. Kitamura, K., Yamasaki, T., & Aizawa, K. (2009). FoodLog: capture, analysis and retrieval of personal food images via web. CEA ‘09 Proceedings of the ACM multimedia 2009 workshop on Multimedia for cooking and eating activities, 23-30.
  21. Labs, QS, Quantified Self Blog. http://quantifiedself.com. Accessed 17 March 2014.
  22. Levy, K. (2014). A San Francisco Bar Banned Google Glass Because It Doesn’t Want Patrons Being Secretly Filmed. Business Insider. http://www.businessinsider.com/san-francisco-bar-bans-google-glass-2014-3?IR=T. Accessed 17 March 2015.
  23. Li, N., Hopfgartner, F., Plumbaum, T., & Ruskin, H. J. (2014). QSHP’14: Proceedings of the Workshop on Quantified Self for Personal Healthcare, held in conjunction with IEEE BIBM 2014. IEEE.
  24. Lyon, D. (2014). Surveillance, Snowden, and Big Data: Capacities, consequences, critique. Big Data & Society, 1(2).
  25. McClusky, M. (2009). The Nike Experiement: How the Shoe Giant Unleased the Power of Personal Metrics, Wired Magazine. http://archive.wired.com/medtech/health/magazine/17-07/lbnp_nike?currentPage=all. Accessed 17 March 2015.
  26. McHugh, J. (2001). Intrusion and intrusion detection. International Journal of Information Security, 1, 14-35. 
  27. Mcknight, D. H., Carter, M., Thatcher, J. B., & Clay, P. F. (2011). Trust in a specific technology: An investigation of its components and measures, ACM Transactions on Management Information Systems (TMIS), 2(2) 12:1-12:25.
  28. Morahan-Martin, J. M. (2004). How internet users find, evaluate, and use online health information: a cross-cultural review. Cyberpsychology, Behavior, and Social Networking, 7(5), 497-510.
  29. Nafus, D., & Sherman, J. (2014). Big Data, Big Questions| This One Does Not Go Up To 11: The Quantified Self Movement as an Alternative Big Data Practice. International Journal of Communication, 8, 1784-1794.
  30. Nicholls, J. G. (1989). The Competitive Ethos and Democratic Education. Cambridge: Harvard University Press.
  31. Oliver, J. (2014). Find a Google Glass and kick it from the network. http://julianoliver.com/output/log_2014-05-30_20-52. Accessed 17 March 2015.
  32. Olson, P. (2014). Wearable Tech Is Plugging Into Health Insurance, http://www.forbes.com/sites/parmyolson/2014/06/19/wearable-tech-health-insurance/. Accessed 17 March 2015.
  33. Omre, A. H., & Keeping, S. (2010). Bluetooth low energy: Wireless connectivity for medical monitoring. Journal of Diabetes Science and Technology, 4(2), 457-463. doi: 10.1177/193229681000400227.
  34. World Health Organisation (2010). Global recommendations on physical activity for health. http://whqlibdoc.who.int/publications/2010/9789241599979_eng.pdf. Accessed 17 March 2015.
  35. Rainie, L., Kiesler, S., Kang, R., & Madden, M. (2013). Anonymity, Privacy, and Security Online. PewResearchCenter. http://www.pewinternet.org/files/old-media//Files/Reports/2013/PIP_AnonymityOnline_090513.pdf. Accessed 17 March 2015.
  36. Rapp, A., Hopfgartner, F., Plumbaum, T., Kummerfeld, B., Kay, J., & Herder, E. (2014). LinkQS’14: Proceedings of the Workshop Linking the Quantified Self. CEUR-WS. http://ceur-ws.org/Vol-1210/#LQS2014. Accessed 17 March 2015.
  37. Rawassizadeh, R., & Tjoa, A. M. (2010). Securing Shareable Life-logs. Social Computing (SocialCom), 2010 IEEE Second International Conference on, 1105-1110.
  38. Selke, S. (2014). Lifelogging: Wie die digitale Selbstvermessung unsere Gesellschaft verändert. Berlin: Econ.
  39. U.S. Department of Health and Human Services (2006). Physical Activity and health: A report of the surgeon general. Centers for Disease Control and Prevention. http://www.cdc.gov/nccdphp/sgr/pdf/execsumm.pdf. Accessed 17 March 2015.
  40. Solon, A., Callaghan, M., Harkin, J., & McGinnity, T. (2006). Case Study on the Bluetooth Vulnerabilities in Mobile Devices. International Journal of Computer Science and Network Security, 6(4), 125-129.
  41. Song, C.-W., Lee, D., Chung, K.-Y., Rim, K.-W., & Lee, J.-H. (2014). Interactive middleware architecture for lifelog based context awareness. Multimedia Tools and Applications, 71(2), 813-826.
  42. Swan, M. (2009). Emerging Patient-Driven Health Care Models: An Examination of Health Social Networks, Consumer Personalized Medicine and Quantified Self-Tracking. International Journal of Environmental Research and Public Health, 6(2), 492-525.
  43. Swan, M. (2012). The Realization of Personalized Medicine through Crowdsourcing the Quantified Self, and the Participatory Biocitizen. Journal of Personal Medicine, 2(3), 93-118.
  44. Swan, M. (2013). The quantified self: fundamental disruption in big data science and biological discovery. Big Data, 1(2), 85-99.
  45. Templeman, R., Korayem, M., Crandall, D., & Kapadia, A. (2014). PlaceAvoider: Steering First-Person Cameras away from Sensitive Spaces. NDSS’14: Proceedings of the 21st Annual Network and Distributed System Security Symposium, Internet Society. http://www.internetsociety.org/doc/placeavoider-steering-first-person-cameras-away-sensitive-spaces.
  46. Tsai, A. G., & Wadden, T. A. (2005). Systematic review: an evaluation of major commercial weight loss programs in the United States. Annuals of Internal Medicine, 142(1), 56-66.
  47. Warburton, D. E. R., Nicol, C. W., & Bredin, S. S. D. (2006). Health benefits of physical activity: the evidence. Canadian Medical Association Journal, 174(6), 801-809.
  48. White, R., & Horvitz, E. (2008). Cyberchondria: Studies of the Escalation of Medical Concerns in Web Search. Microsoft Research. http://research.microsoft.com/pubs/76529/TR-2008-178.pdf. Accessed 17 March 2015.
  49. Wicks, P., Massagli, M., Frost, J., Brownstein, C., Okun, S., Vaughan, T., Bradley, R., & Heywood, J. (2010). Sharing Health Data for Better Outcomes on PatientsLikeMe. Journal of Medical Internet Research, 12(2), e19.
  50. Wolf, G. (2010a, May 2). The Data-Driven Life. The New York Times, p. MM38. http://www.nytimes.com/2010/05/02/magazine/02self-measurement-t.html?pagewanted=all&_r=0.Accessed 17 March 2015.
  51. Wolf, G. (2010b). The quantified self. TED talk. http://www.ted.com/talks/gary_wolf_the_quantified_self. Accessed 17 March 2015.
  52. Wu, B., Chen, J., Wu, J., & Cardei, M. (2007). A survey of attacks and countermeasures in mobile ad hoc networks. In Y. Xiao, X.S. Shen, & D.-Z. Du (Eds.), Wireless Network Security, Signals and Communication Technology (pp. 103-135). New York: Springer US.