Abstract
The lifelogging activity enables a user, the lifelogger, to passively capture multimodal records from a first-person perspective and ultimately create a visual diary encompassing every possible aspect of her life with unprecedented details. In recent years it has gained popularity among different groups of users. However, the possibility of ubiquitous presence of lifelogging devices especially in private spheres has raised serious concerns with respect to personal privacy. Different practitioners and active researchers in the field of lifelogging have analysed the issue of privacy in lifelogging and proposed different mitigation strategies. However, none of the existing works has considered a well-defined privacy threat model in the domain of lifelogging. Without a proper threat model, any analysis and discussion of privacy threats in lifelogging remains incomplete. In this paper we aim to fill in this gap by introducing a first-ever privacy threat model identifying several threats with respect to lifelogging. We believe that the introduced threat model will be an essential tool and will act as the basis for any further research within this domain.
| Original language | English |
|---|---|
| Title of host publication | Proceedings of the 2016 ACM International Joint Conference on Pervasive and Ubiquitous Computing: Adjunct, UbiComp '16 |
| Place of Publication | New York, NY (US) |
| Publisher | ACM |
| Pages | 576-581 |
| Number of pages | 6 |
| ISBN (Print) | 978-1-450-34462-3 |
| DOIs | |
| Publication status | Published - 12 Sept 2016 |
| Event | 2016 ACM International Joint Conference on Pervasive and Ubiquitous Computing - Heidelberg, Germany Duration: 12 Sept 2016 → 16 Sept 2016 |
Conference
| Conference | 2016 ACM International Joint Conference on Pervasive and Ubiquitous Computing |
|---|---|
| Abbreviated title | UbiComp 2016 |
| Country/Territory | Germany |
| City | Heidelberg |
| Period | 12/09/16 → 16/09/16 |
Bibliographical note
-Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the Owner/Author.Copyright is held by the owner/author(s).
Keywords
- privacy
- lifelogging
- threats
- threat modelling
Fingerprint
Dive into the research topics of 'Privacy threat model in lifelogging'. Together they form a unique fingerprint.Research output
- 5 Citations
- 1 Conference publication
-
Exploring lifelog sharing and privacy
Chowdhury, S., Ferdous, M. S. & Jose, J. M., 12 Sept 2016, Proceedings of the 2016 ACM International Joint Conference on Pervasive and Ubiquitous Computing: Adjunct, UbiComp '16. New York, NY (US): ACM, p. 553-558 6 p.Research output: Chapter in Book/Published conference output › Conference publication
Open AccessFile5 Link opens in a new tab Citations (Scopus)83 Downloads (Pure)
Cite this
- APA
- Author
- BIBTEX
- Harvard
- Standard
- RIS
- Vancouver