Ontologies for quantified self: A semantic approach

Author(s): Cena, FedericaLikavec, SilviaRapp, AmonDeplano, MartinaMarcengo, Alessandro Abstract: The spreading of devices and applications that allow people to collect personal information opens new opportunities for user modeling (UM). In this new scenario UM...

The quantified patient: a patient participatory culture

Author(s): Appelboom, GeoffLoPresti, MelissaReginster, Jean-YvesSander Connolly, E.Dumont, Emmanuel P.L. Abstract: The Quantified Self Movement, which aims to improve various aspects of life and health through recording and reviewing daily activities and biometrics,...

Self-tracking Modes: Reflexive self-monitoring and data practices

Author(s): Lupton, Deborah Abstract: The concept of ‘self-tracking’ (also referred to as life-logging, the quantified self, personal analytics and personal informatics) has recently begun to emerge in discussions of ways in which people can voluntarily monitor and...

Quantified Self and the Privacy Challenge in Wearables

Author(s): Haddadi, Hamed Brown, Ian Abstract: The increasing availability of personal activity monitors, tracking devices, wearable recording devices, and associated smartphone apps has given rise to a wave of Quantified Self individuals and applications. The data...

Visualization of human behavior data: The quantified self

Author(s): Marcengo, AlessandroRapp, Amon Abstract: Although in recent years the Quantified Self (QS) application domain is growing, there are still some palpable fundamental problems that relegate the QS movement in a phase of low maturity. The first is a...

Lifelogging: You’re Wearing a Camera?

Author(s): Katrin Wolf Albrecht Schmidt Agon Bexheti Marc Langheinrich Abstract: The appearance of a new generation of highly portable, maybe even fashionable image-based lifelogging device has the potential to disrupt our current understanding of what is “socially...

IoT-Privacy: To be private or not to be private

Author: Arijit UkilSoma BandyopadhyayArpan Pal Abstract: Privacy breaching attacks pose considerable challenges in the development and deployment of Internet of Things (IoT) applications. Though privacy preserving data mining (PPDM) minimizes sensitive data disclosure...

Library

Devices

Books

Archive

Contact

Search