Evolving the Ecosystem of Personal Behavioral Data

Everyday, people generate lots of personal data. Driven by the increasing use of online services and widespread adoption of smartphones (owned by 68% of U.S. residents; Anderson, 2015), personal data take many forms, including communications (e.g., e-mail, SMS, Facebook), plans and coordination (e.g., calendars, TripIt, to-do lists), entertainment consumption (e.g., YouTube, Spotify, Netflix), finances (e.g., banking, Amazon, eBay), activities (e.g., steps, runs, check-ins), and even health care (e.g., doctor visits, medications, heart rate). Collectively, these data provide a highly detailed description of an individual. Personal data afford the opportunity for many new kinds of applications that might improve people’s lives through deep personalization, tools to manage personal well-being, and services that support identity construction. However, developers currently encounter challenges working with personal data due to its fragmentation across services. This article evaluates the landscape of personal data, including the systemic forces that created current fragmented collections of data and the process required for integrating data from across services into an application. It details challenges the fragmented ecosystem imposes. Finally, it contributes Phenom, an experimental system that addresses these challenges, making it easier to develop applications that access personal data and providing users with greater control over how their data are used.

[1]  Denzil Ferreira,et al.  AWARE: Mobile Context Instrumentation Framework , 2015, Front. ICT.

[2]  Anind K. Dey,et al.  Parent-driven use of wearable cameras for autism support: a field study with families , 2012, UbiComp.

[3]  John Zimmerman,et al.  Challenges and opportunities in data mining contact lists for inferring relationships , 2014, UbiComp.

[4]  David A. Ellis,et al.  Beyond Self-Report: Tools to Compare Estimated and Real-World Smartphone Use , 2015, PloS one.

[5]  Tsvi Kuflik,et al.  When user modeling intersects software engineering: the info-bead user modeling approach , 2015, User Modeling and User-Adapted Interaction.

[6]  Konrad Paul Kording,et al.  Mobile Phone Sensor Correlates of Depressive Symptom Severity in Daily-Life Behavior: An Exploratory Study , 2015, Journal of medical Internet research.

[7]  Suman Nath,et al.  My OS Ought to Know Me Better: In-app Behavioural Analytics as an OS Service , 2015, HotOS.

[8]  John Zimmerman,et al.  Fragmentation and transition: understanding perceptions of virtual possessions among young adults in Spain, South Korea and the United States , 2013, CHI.

[9]  John Zimmerman,et al.  Placelessness, spacelessness, and formlessness: experiential qualities of virtual possessions , 2014, Conference on Designing Interactive Systems.

[10]  Andy Hopper,et al.  The active badge location system , 1992, TOIS.

[11]  Alexandra Marin,et al.  Simplifying the Personal Network Name Generator , 2007 .

[12]  A. J. Bernheim Brush,et al.  Phoneprioception: enabling mobile phones to infer where they are kept , 2013, CHI.

[13]  John T. Stasko,et al.  Casual Information Visualization: Depictions of Data in Everyday Life , 2007, IEEE Transactions on Visualization and Computer Graphics.

[14]  Judy Kay,et al.  PortMe: Personal Lifelong User Modelling Portal , 2010 .

[15]  J. Gliem,et al.  Calculating, Interpreting, And Reporting Cronbach’s Alpha Reliability Coefficient For Likert-Type Scales , 2003 .

[16]  John Riedl,et al.  Recommender systems: from algorithms to user experience , 2012, User Modeling and User-Adapted Interaction.

[17]  Blase Ur,et al.  Tag, you can see it!: using tags for access control in photo sharing , 2012, CHI.

[18]  Fanglin Chen,et al.  StudentLife: assessing mental health, academic performance and behavioral trends of college students using smartphones , 2014, UbiComp.

[19]  M. Peitz,et al.  The Oxford Handbook of the Digital Economy , 2012 .

[20]  Victoria Bellotti,et al.  E-mail as habitat: an exploration of embedded personal information management , 2001, INTR.

[21]  Hamed Haddadi,et al.  Personal Data: Thinking Inside the Box , 2015, Aarhus Conference on Critical Alternatives.

[22]  R. Pahl,et al.  Rethinking Friendship: Hidden Solidarities Today , 2006 .

[23]  Richard P. Schuler,et al.  TellUsWho: Guided Social Network Data Collection , 2010, 2010 43rd Hawaii International Conference on System Sciences.

[24]  Lorrie Faith Cranor,et al.  A Conundrum of Permissions: Installing Applications on an Android Smartphone , 2012, Financial Cryptography Workshops.

[25]  David M. Pennock,et al.  Categories and Subject Descriptors , 2001 .

[26]  James H. Aylor,et al.  Computer for the 21st Century , 1999, Computer.

[27]  Krishna P. Gummadi,et al.  Analyzing facebook privacy settings: user expectations vs. reality , 2011, IMC '11.

[28]  H. Rittel,et al.  Dilemmas in a general theory of planning , 1973 .

[29]  Jason I. Hong,et al.  End-User Privacy in Human-Computer Interaction , 2007, Found. Trends Hum. Comput. Interact..

[30]  Kôiti Hasida,et al.  Inferring Long-term User Properties Based on Users' Location History , 2007, IJCAI.

[31]  Deborah Estrin,et al.  Personal data vaults: a locus of control for personal data streams , 2010, CoNEXT.

[32]  Mor Naaman,et al.  Over-exposed?: privacy patterns and considerations in online and mobile photo sharing , 2007, CHI.

[33]  Shamsi T. Iqbal,et al.  The Known Stranger: Supporting Conversations between Strangers with Personalized Topic Suggestions , 2015, CHI.

[34]  Albert-László Barabási,et al.  Understanding individual human mobility patterns , 2008, Nature.

[35]  Norman M. Sadeh,et al.  Rethinking location sharing: exploring the implications of social-driven vs. purpose-driven location sharing , 2010, UbiComp.

[36]  D. Gática-Pérez,et al.  Towards rich mobile phone datasets: Lausanne data collection campaign , 2010 .

[37]  Christoph Schlieder,et al.  A Spatial User Similarity Measure for Geographic Recommender Systems , 2009, GeoS.

[38]  J. Bobadilla,et al.  Recommender systems survey , 2013, Knowl. Based Syst..

[39]  Saul Greenberg,et al.  Supporting social worlds with the community bar , 2005, GROUP.

[40]  Elaine Rich,et al.  Building and Exploiting User Models , 1979, IJCAI.

[41]  Eamonn O'Neill,et al.  Feasibility of structural network clustering for group-based privacy control in social networks , 2010, SOUPS.

[42]  Gordon Bell,et al.  MyLifeBits: fulfilling the Memex vision , 2002, MULTIMEDIA '02.

[43]  Mark S. Ackerman,et al.  Privacy in e-commerce: examining user scenarios and privacy preferences , 1999, EC '99.

[44]  M. Lamming,et al.  The Design of a Human Memory Prosthesis , 1994 .

[45]  A-L Barabási,et al.  Structure and tie strengths in mobile communication networks , 2006, Proceedings of the National Academy of Sciences.

[46]  Jonathan Grudin,et al.  A study of preferences for sharing and privacy , 2005, CHI Extended Abstracts.

[47]  Mika Raento,et al.  ContextContacts: re-designing SmartPhone's contact book to support mobile awareness and collaboration , 2005, Mobile HCI.

[48]  Hamed Haddadi,et al.  Enabling the new economic actor: data protection, the digital economy, and the Databox , 2016, Personal and Ubiquitous Computing.

[49]  Alex Pentland,et al.  Social fMRI: Investigating and shaping social mechanisms in the real world , 2011, Pervasive Mob. Comput..

[50]  Jie Liu,et al.  Mobile Apps: It's Time to Move Up to CondOS , 2011, HotOS.

[51]  Susan T. Dumais,et al.  Stuff I've Seen: A System for Personal Information Retrieval and Re-Use , 2003, SIGF.

[52]  I HongJason,et al.  Evolving the Ecosystem of Personal Behavioral Data , 2017 .

[53]  Noah E. Friedkin,et al.  A test of structural features of granovetter's strength of weak ties theory , 1980 .

[54]  Andreas Girgensohn,et al.  Beyond 'yesterday's tomorrow': towards the design of awareness technologies for the contemporary worker , 2011, Mobile HCI.

[55]  Kenta Oku,et al.  Geographical recommender system based on interaction between map operation and category selection , 2010, HetRec '10.

[56]  Lorrie Faith Cranor,et al.  The post that wasn't: exploring self-censorship on facebook , 2013, CSCW.

[57]  John Zimmerman,et al.  "You Never Call, You Never Write": Call and SMS Logs Do Not Always Indicate Tie Strength , 2015, CSCW.

[58]  John Zimmerman,et al.  Are you close with me? are you nearby?: investigating social groups, closeness, and willingness to share , 2011, UbiComp '11.

[59]  Robin I. M. Dunbar,et al.  Social network size in humans , 2003, Human nature.

[60]  Jason I. Hong,et al.  Exploring capturable everyday memory for autobiographical authentication , 2013, UbiComp.

[61]  John Zimmerman,et al.  Mailing Archived Emails as Postcards: Probing the Value of Virtual Collections , 2016, CHI.

[62]  John Zimmerman,et al.  Toss 'n' turn: smartphone as sleep and sleep quality detector , 2014, CHI.

[63]  Anind K. Dey,et al.  Designing mediation for context-aware applications , 2005, TCHI.

[64]  Roy Want,et al.  The Personal Server: Changing the Way We Think about Ubiquitous Computing , 2002, UbiComp.

[65]  Loren G. Terveen,et al.  Contact management: identifying contacts to support long-term communication , 2002, CSCW '02.

[66]  John Zimmerman,et al.  I'm the mayor of my house: examining why people use foursquare - a social-driven location sharing application , 2011, CHI.

[67]  Donald A. Sch The reflective practitioner: how professionals think in action , 1983 .

[68]  Ramón Cáceres,et al.  Virtual individual servers as privacy-preserving proxies for mobile devices , 2009, MobiHeld '09.

[69]  Alex Pentl,et al.  Reality Mining of Mobile Communications: Toward A New Deal On Data , 2009 .

[70]  Erez Shmueli,et al.  openPDS: Protecting the Privacy of Metadata through SafeAnswers , 2014, PloS one.

[71]  Lada A. Adamic,et al.  Computational Social Science , 2009, Science.

[72]  James A. Landay,et al.  An architecture for privacy-sensitive ubiquitous computing , 2004, MobiSys '04.

[73]  John Zimmerman,et al.  Virtual possessions , 2010, Conference on Designing Interactive Systems.

[74]  Guy Shani,et al.  Anytime Algorithms for Recommendation Service Providers , 2016, ACM Trans. Intell. Syst. Technol..

[75]  John Zimmerman,et al.  Mining smartphone data to classify life-facets of social relationships , 2013, CSCW.

[76]  Abigail Sellen,et al.  Beyond total capture , 2010, Commun. ACM.

[77]  John C. Tang,et al.  ConNexus to awarenex: extending awareness to mobile users , 2001, CHI.

[78]  Didier Sornette,et al.  Discrete hierarchical organization of social group sizes , 2004, Proceedings of the Royal Society B: Biological Sciences.

[79]  James A. Landay,et al.  Gestalt: integrated support for implementation and analysis in machine learning , 2010, UIST.

[80]  John Zimmerman,et al.  Learning patterns of pick-ups and drop-offs to support busy family coordination , 2011, CHI.

[81]  Deborah Estrin,et al.  ohmage: An open mobile system for activity and experience sampling , 2012, 2012 6th International Conference on Pervasive Computing Technologies for Healthcare (PervasiveHealth) and Workshops.

[82]  Gordon Bell,et al.  A personal digital store , 2001, CACM.

[83]  Ninghui Li,et al.  End-User Privacy in Human–Computer Interaction , 2009 .

[84]  David R. Karger,et al.  Haystack: per-user information environments , 1999, CIKM '99.

[85]  Deborah Estrin,et al.  Small data, where n = me , 2014, Commun. ACM.

[86]  Paul Dourish,et al.  Seeking a Foundation for Context-Aware Computing , 2001, Hum. Comput. Interact..

[87]  Tessa A. Lau Rethinking the systems review process , 2010, Commun. ACM.

[88]  Lorrie Faith Cranor,et al.  A "nutrition label" for privacy , 2009, SOUPS.

[89]  Shahram Izadi,et al.  SenseCam: A Retrospective Memory Aid , 2006, UbiComp.

[90]  Bill N. Schilit,et al.  Context-aware computing applications , 1994, Workshop on Mobile Computing Systems and Applications.

[91]  Elaine Rich,et al.  User Modeling via Stereotypes , 1998, Cogn. Sci..

[92]  Lorrie Faith Cranor,et al.  Why People Are (Un)willing to Share Information with Online Advertisers , 2014 .

[93]  David W. McDonald,et al.  Activity sensing in the wild: a field trial of ubifit garden , 2008, CHI.

[94]  Elizabeth F. Churchill,et al.  Faceted identity, faceted lives: social and technical issues with being yourself online , 2011, CSCW.

[95]  Robin I. M. Dunbar,et al.  Communication in social networks: Effects of kinship, network size, and emotional closeness , 2011 .

[96]  Yuri Gurevich,et al.  Biggish: A Solution For The Inverse Privacy Problem , 2017 .

[97]  Alfred Kobsa,et al.  Generic User Modeling Systems , 2001, User Modeling and User-Adapted Interaction.

[98]  Eric Gilbert,et al.  Predicting tie strength with social media , 2009, CHI.

[99]  James Fogarty,et al.  Toolkit support for developing and deploying sensor-based statistical models of human situations , 2007, CHI.

[100]  Yuri Gurevich,et al.  Inverse privacy , 2016, Commun. ACM.

[101]  Miguel A. Labrador,et al.  A Survey on Human Activity Recognition using Wearable Sensors , 2013, IEEE Communications Surveys & Tutorials.

[102]  Dino Pedreschi,et al.  Human mobility, social ties, and link prediction , 2011, KDD.

[103]  Gregory D. Abowd,et al.  A Conceptual Framework and a Toolkit for Supporting the Rapid Prototyping of Context-Aware Applications , 2001, Hum. Comput. Interact..

[104]  David R. Karger,et al.  Data unification in personal information management , 2006, CACM.

[105]  Christopher McCarty,et al.  Structure in Personal Networks , 2002, J. Soc. Struct..

[106]  Mary Czerwinski,et al.  Interactions with big data analytics , 2012, INTR.

[107]  Herbert A. Simon,et al.  The Sciences of the Artificial , 1970 .

[108]  T. Graepel,et al.  Private traits and attributes are predictable from digital records of human behavior , 2013, Proceedings of the National Academy of Sciences.

[109]  Alex Pentland,et al.  Reality mining: sensing complex social systems , 2006, Personal and Ubiquitous Computing.

[110]  Thad Starner,et al.  Use of mobile appointment scheduling devices , 2004, CHI EA '04.

[111]  William Jones Personal Information Management , 2007, Annu. Rev. Inf. Sci. Technol..

[112]  Armando Solar-Lezama,et al.  A language for automatically enforcing privacy policies , 2012, POPL '12.

[113]  C. Raymond Perrault,et al.  Speech Acts as a Basis for Understanding Dialogue Coherence , 1978, TINLAP.

[114]  David Gelernter,et al.  Lifestreams: a storage model for personal data , 1996, SGMD.

[115]  Lorrie Faith Cranor,et al.  An Investigation into Facebook Friend Grouping , 2011, INTERACT.

[116]  Norman M. Sadeh,et al.  Modeling Users' Mobile App Privacy Preferences: Restoring Usability in a Sea of Permission Settings , 2014, SOUPS.

[117]  Norman M. Sadeh,et al.  Expectation and purpose: understanding users' mental models of mobile app privacy through crowdsourcing , 2012, UbiComp.

[118]  Jason Hong,et al.  Privacy patterns for online interactions , 2006, PLoP '06.

[119]  Anind K. Dey,et al.  Lifelogging memory appliance for people with episodic memory impairment , 2008, UbiComp.

[120]  Eric Freeman,et al.  Lifestreams: Organizing your Electronic Life* , 1995 .

[121]  Jason I. Hong,et al.  Epistenet: facilitating programmatic access & processing of semantically related mobile personal data , 2016, MobileHCI.

[122]  James Fogarty,et al.  Presence versus availability: the design and evaluation of a context-aware communication client , 2004, Int. J. Hum. Comput. Stud..

[123]  Gustavo S. Mesch Social context and communication channels choice among adolescents , 2009, Comput. Hum. Behav..

[124]  Michael Friedmann,et al.  Deploying recommender system for the masses , 2014, IUI Companion '14.

[125]  Marc Langheinrich,et al.  Privacy by Design - Principles of Privacy-Aware Ubiquitous Systems , 2001, UbiComp.

[126]  Janet Vertesi,et al.  To have and to hold: exploring the personal archive , 2006, CHI.

[127]  John Zimmerman,et al.  Detection of Behavior Change in People with Depression , 2014, AAAI Workshop: Modern Artificial Intelligence for Health Analytics.

[128]  Kiyoharu Aizawa,et al.  Context-based video retrieval system for the life-log applications , 2003, MIR '03.

[129]  Nan Lin,et al.  Social support and depression , 1984, Social psychiatry.

[130]  Douglas B. Terry,et al.  Using collaborative filtering to weave an information tapestry , 1992, CACM.

[131]  Esteban Moro Egido,et al.  Time as a limited resource: Communication Strategy in Mobile Phone Networks , 2013, Soc. Networks.

[132]  John Zimmerman,et al.  Teenagers and their virtual possessions: design opportunities and issues , 2011, CHI.

[133]  Jodi Forlizzi,et al.  A stage-based model of personal informatics systems , 2010, CHI.