skip to main content
10.1145/3544548.3581565acmconferencesArticle/Chapter ViewAbstractPublication PageschiConference Proceedingsconference-collections
research-article

Impact of Privacy Protection Methods of Lifelogs on Remembered Memories

Published: 19 April 2023 Publication History

Abstract

Lifelogging is traditionally used for memory augmentation. However, recent research shows that users’ trust in the completeness and accuracy of lifelogs might skew their memories. Privacy-protection alterations such as body blurring and content deletion are commonly applied to photos to circumvent capturing sensitive information. However, their impact on how users remember memories remain unclear. To this end, we conduct a white-hat memory attack and report on an iterative experiment (N=21) to compare the impact of viewing 1) unaltered lifelogs, 2) blurred lifelogs, and 3) a subset of the lifelogs after deleting private ones, on confidently remembering memories. Findings indicate that all the privacy methods impact memories’ quality similarly and that users tend to change their answers in recognition more than recall scenarios. Results also show that users have high confidence in their remembered content across all privacy methods. Our work raises awareness about the mindful designing of technological interventions.

Supplementary Material

MP4 File (3544548.3581565-talk-video.mp4)
Pre-recorded Video Presentation

References

[1]
2017. JASP Team. JASP (Version 0.8.2) [Computer software].
[2]
Delene Adams, H. Paterson, and H. MacDougall. 2020. Law and (rec)order: Updating memory for criminal events with body-worn cameras. PLoS ONE 15(2020).
[3]
Paarijaat Aditya, Rijurekha Sen, Peter Druschel, Seong Joon Oh, Rodrigo Benenson, Mario Fritz, Bernt Schiele, Bobby Bhattacharjee, and Tong Tong Wu. 2016. I-Pic: A Platform for Privacy-Compliant Image Capture. In Proceedings of the 14th Annual International Conference on Mobile Systems, Applications, and Services(Singapore, Singapore) (MobiSys ’16). ACM, New York, NY, USA, 235–248. https://doi.org/10.1145/2906388.2906412
[4]
Emma Berry, Narinder Kapur, Lyndsay Williams, Steve Hodges, Peter Watson, Gavin Smyth, James Srinivasan, Reg Smith, Barbara Wilson, and Ken Wood. 2007. The use of a wearable camera, SenseCam, as a pictorial diary to improve autobiographical memory in a patient with limbic encephalitis: A preliminary report. Neuropsychological Rehabilitation 17, 4-5 (2007), 582–601. https://doi.org/10.1080/09602010601029780 arXiv:https://doi.org/10.1080/09602010601029780PMID: 17676536.
[5]
Andrew Besmer and Heather Lipford. 2009. Tagged Photos: Concerns, Perceptions, and Protections. In CHI ’09 Extended Abstracts on Human Factors in Computing Systems (Boston, MA, USA) (CHI EA ’09). ACM, New York, NY, USA, 4585–4590. https://doi.org/10.1145/1520340.1520704
[6]
Sylvia Beyer. 1998. Gender differences in self-perception and negative recall biases. Sex roles 38, 1 (1998), 103–133.
[7]
Finn Brunton and Helen Nissenbaum. 2015. Obfuscation: A User’s Guide for Privacy and Protest. The MIT Press.
[8]
Eun Kyoung Choe, Nicole B. Lee, Bongshin Lee, Wanda Pratt, and Julie A. Kientz. 2014. Understanding Quantified-selfers’ Practices in Collecting and Exploring Personal Data. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (Toronto, Ontario, Canada) (CHI ’14). ACM, New York, NY, USA, 1143–1152. https://doi.org/10.1145/2556288.2557372
[9]
Sarah Clinch, Omar Alghamdi, and Madeleine Steeds. 2019. Technology-induced human memory degradation. In Creative Speculation on the Negative Effects of HCI Research. Workshop at The ACM CHI Conference on Human Factors in Computing Systems (CHI 2019).
[10]
Sarah Clinch, Cathleen Cortis Mack, Geoff Ward, and Madeleine Steeds. 2021. Technology-Mediated Memory Impairment. Springer Nature, United States, 71–124.
[11]
S. Clinch, N. Davies, M. Mikusz, P. Metzger, M. Langheinrich, A. Schmidt, and G. Ward. 2016. Collecting Shared Experiences through Lifelogging: Lessons Learned. IEEE Pervasive Computing 15, 1 (Jan 2016), 58–67. https://doi.org/10.1109/MPRV.2016.6
[12]
Sarah Clinch, Paul Metzger, and Nigel Davies. 2014. Lifelogging for ’Observer’ View Memories: An Infrastructure Approach. In Proceedings of the 2014 ACM International Joint Conference on Pervasive and Ubiquitous Computing: Adjunct Publication (Seattle, Washington) (UbiComp ’14 Adjunct). ACM, New York, NY, USA, 1397–1404. https://doi.org/10.1145/2638728.2641721
[13]
Tilman Dingler and Niels Henze. 2014. That’s the Dog from my Wedding – Algorithms for Memory Shaping. Workshop Paper. Adjunct Proceedings. CHI Workshop on Designing Technology for Major Life Events. Retrieved June 24, 2016 from https://sites.google.com/site/techmajorlifeevents/Dinger.pdf?attredirects=0.
[14]
Aiden R. Doherty, Katalin Pauly-Takacs, Niamh Caprani, Cathal Gurrin, Chris J. A. Moulin, Noel E. O’Connor, and Alan F. Smeaton. 2012. Experiences of Aiding Autobiographical Memory Using the SenseCam. Human–Computer Interaction 27, 1-2 (2012), 151–174. https://doi.org/10.1080/07370024.2012.656050 arXiv:https://www.tandfonline.com/doi/pdf/10.1080/07370024.2012.656050
[15]
Passant ElAgroudy, Mohamed Khamis, Florian Mathis, Diana Irmscher, Andreas Bulling, and Albrecht Schmidt. 2019. Can Privacy-Aware Lifelogs Alter Our Memories?. In Proceedings of the 37th Annual ACM Conference Extended Abstracts on Human Factors in Computing Systems (Glasgow, Scotland UK) (CHI EA ’19). ACM, New York, NY, USA, 6 pages. https://doi.org/10.1145/3290607.3313052
[16]
Gary Gillund and Richard M Shiffrin. 1984. A retrieval model for both recognition and recall.Psychological review 91, 1 (1984), 1.
[17]
Lorna Goddard, Linda Pring, and Nick Felmingham. 2005. The effects of cue modality on the quality of personal memories retrieved. Memory 13, 1 (2005), 79–86. https://doi.org/10.1080/09658210344000594 arXiv:https://doi.org/10.1080/09658210344000594PMID: 15724909.
[18]
Rúben Gouveia and Evangelos Karapanos. 2013. Footprint Tracker: Supporting Diary Studies with Lifelogging. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (Paris, France) (CHI ’13). ACM, New York, NY, USA, 2921–2930. https://doi.org/10.1145/2470654.2481405
[19]
R. L. Gregory. 1963. Distortion of Visual Space as Inappropriate Constancy Scaling. Nature 199(1963), 678–680.
[20]
Ralph Gross, Edoardo Airoldi, Bradley Malin, and Latanya Sweeney. 2006. Integrating Utility into Face De-identification. In Proceedings of the 5th International Conference on Privacy Enhancing Technologies (Cavtat, Croatia) (PET’05). Springer-Verlag, Berlin, Heidelberg, 227–242.
[21]
Cathal Gurrin, Alan F. Smeaton, and Aiden R. Doherty. 2014. LifeLogging: Personal Big Data. Foundations and Trends® in Information Retrieval 8, 1 (2014), 1–125. https://doi.org/10.1561/1500000033
[22]
Cathal Gurrin, Alan F. Smeaton, Zhengwei Qiu, and Aiden Doherty. 2013. Exploring the Technical Challenges of Large-Scale Lifelogging. In Proceedings of the 4th International SenseCam & Pervasive Imaging Conference (San Diego, California, USA) (SenseCam ’13). Association for Computing Machinery, New York, NY, USA, 68–75. https://doi.org/10.1145/2526667.2526678
[23]
Morgan Harvey, Marc Langheinrich, and Geoff Ward. 2016. Remembering through lifelogging: A survey of human memory augmentation. Pervasive and Mobile Computing 27 (2016), 14 – 26. https://doi.org/10.1016/j.pmcj.2015.12.002
[24]
Rakibul Hasan, Eman Hassan, Yifang Li, Kelly Caine, David J. Crandall, Roberto Hoyle, and Apu Kapadia. 2018. Viewer Experience of Obscuring Scene Elements in Photos to Enhance Privacy. In Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems (Montreal QC, Canada) (CHI ’18). ACM, New York, NY, USA, Article 47, 13 pages. https://doi.org/10.1145/3173574.3173621
[25]
D. Herron, Wendy Moncur, M. Curic, Drazen Grubisic, Olinka Vistica, and E. V. D. Hoven. 2018. Digital Possessions in the Museum of Broken Relationships. Extended Abstracts of the 2018 CHI Conference on Human Factors in Computing Systems (2018).
[26]
D. Herron, Wendy Moncur, and E. V. D. Hoven. 2017. Digital Decoupling and Disentangling: Towards Design for Romantic Break Up. Proceedings of the 2017 Conference on Designing Interactive Systems (2017).
[27]
Roberto Hoyle, Robert Templeman, Denise Anthony, David Crandall, and Apu Kapadia. 2015. Sensitive Lifelogs: A Privacy Analysis of Photos from Wearable Cameras. In Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems (Seoul, Republic of Korea) (CHI ’15). ACM, New York, NY, USA, 1645–1648. https://doi.org/10.1145/2702123.2702183
[28]
Panagiotis Ilia, Iasonas Polakis, Elias Athanasopoulos, Federico Maggi, and Sotiris Ioannidis. 2015. Face/Off: Preventing Privacy Leakage From Photos in Social Networks. In Proceedings of the 22Nd ACM SIGSAC Conference on Computer and Communications Security (Denver, Colorado, USA) (CCS ’15). ACM, New York, NY, USA, 781–792. https://doi.org/10.1145/2810103.2813603
[29]
K. Jones, W. Crozier, and D. Strange. 2017. Believing is Seeing: Biased Viewing of Body-Worn Camera Footage. Journal of applied research in memory and cognition 6 (2017), 460–474.
[30]
Vaiva Kalnikaite, Abigail Sellen, Steve Whittaker, and David Kirk. 2010. Now Let Me See Where I Was: Understanding How Lifelogs Mediate Memory. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (Atlanta, Georgia, USA) (CHI ’10). ACM, New York, NY, USA, 2045–2054. https://doi.org/10.1145/1753326.1753638
[31]
Mohammed Korayem, Robert Templeman, Dennis Chen, David Crandall, and Apu Kapadia. 2016. Enhancing Lifelogging Privacy by Detecting Screens. In Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems (San Jose, California, USA) (CHI ’16). ACM, New York, NY, USA, 4309–4314. https://doi.org/10.1145/2858036.2858417
[32]
Huy Viet Le, Sarah Clinch, Corina Sas, Tilman Dingler, Niels Henze, and Nigel Davies. 2016. Impact of Video Summary Viewing on Episodic Memory Recall: Design Guidelines for Video Summarizations. In Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems (San Jose, California, USA) (CHI ’16). ACM, New York, NY, USA, 4793–4805. https://doi.org/10.1145/2858036.2858413
[33]
Matthew L. Lee and Anind K. Dey. 2008. Lifelogging Memory Appliance for People with Episodic Memory Impairment. In Proceedings of the 10th International Conference on Ubiquitous Computing (Seoul, Korea) (UbiComp ’08). ACM, New York, NY, USA, 44–53. https://doi.org/10.1145/1409635.1409643
[34]
Yifang Li, Wyatt Troutman, Bart P. Knijnenburg, and Kelly Caine. 2018. Human Perceptions of Sensitive Content in Photos. In The IEEE Conference on Computer Vision and Pattern Recognition (CVPR) Workshops.
[35]
Yifang Li, Nishant Vishwamitra, Hongxin Hu, Bart P. Knijnenburg, and Kelly Caine. 2017. Effectiveness and Users’ Experience of Face Blurring as a Privacy Protection for Sharing Photos via Online Social Networks. Proceedings of the Human Factors and Ergonomics Society Annual Meeting 61, 1(2017), 803–807. https://doi.org/10.1177/1541931213601694 arXiv:https://doi.org/10.1177/1541931213601694
[36]
Yifang Li, Nishant Vishwamitra, Bart P. Knijnenburg, Hongxin Hu, and Kelly Caine. 2017. Blur vs. Block: Investigating the Effectiveness of Privacy-Enhancing Obfuscation for Images. In 2017 IEEE Conference on Computer Vision and Pattern Recognition Workshops (CVPRW). 1343–1351. https://doi.org/10.1109/CVPRW.2017.176
[37]
Yifang Li, Nishant Vishwamitra, Bart P. Knijnenburg, Hongxin Hu, and Kelly Caine. 2017. Effectiveness and Users’ Experience of Obfuscation As a Privacy-Enhancing Technology for Sharing Photos. Proc. ACM Hum.-Comput. Interact. 1, CSCW, Article 67 (Dec. 2017), 24 pages. https://doi.org/10.1145/3134702
[38]
Marcus Lu. 2022. Ranked: The World’s Most Surveilled Cities. Visual capitalist. Retrieved December 12, 2022 from https://www.visualcapitalist.com/ranked-the-worlds-most-surveilled-cities/#: :text=IHS%20Markit%20estimates%20that%20as,billion%20surveillance%20cameras%20installed%20worldwide.
[39]
RD Morey and JN Rouder. 2015. BayesFactor (Version 0.9. 11-3)[Computer software].
[40]
Pawarat Nontasil and Stephen J Payne. 2019. Emotional Utility and Recall of the Facebook News Feed. In Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems. 1–9.
[41]
José Ramón Padilla-López, Alexandros Andre Chaaraoui, Feng Gu, and Francisco Flórez-Revuelta. 2015. Visual privacy by context: proposal and evaluation of a level-based visualisation scheme. Sensors 15, 6 (2015), 12959–12982.
[42]
Chi-Hyoung Rhee and C LEE. 2013. Cartoon-like avatar generation using facial component matching. Int. J. of Multimedia and Ubiquitous Engineering 8, 4(2013), 69–78.
[43]
Franziska Roesner, David Molnar, Alexander Moshchuk, Tadayoshi Kohno, and Helen J. Wang. 2014. World-Driven Access Control for Continuous Sensing. In Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security (Scottsdale, Arizona, USA) (CCS ’14). ACM, New York, NY, USA, 1169–1181. https://doi.org/10.1145/2660267.2660319
[44]
Jeffrey N Rouder, Richard D Morey, Paul L Speckman, and Jordan M Province. 2012. Default Bayes factors for ANOVA designs. Journal of mathematical psychology 56, 5 (2012), 356–374.
[45]
Jeffrey N Rouder, Paul L Speckman, Dongchu Sun, Richard D Morey, and Geoffrey Iverson. 2009. Bayesian t tests for accepting and rejecting the null hypothesis. Psychonomic bulletin & review 16, 2 (2009), 225–237.
[46]
Corina Sas and Steve Whittaker. 2013. Design for Forgetting: Disposing of Digital Possessions after a Breakup. Association for Computing Machinery, New York, NY, USA, 1823–1832. https://doi.org/10.1145/2470654.2466241
[47]
Daniel L. Schachter. 2002. The seven sins of memory. Boston: Houghton Mifflin.
[48]
Abigail J. Sellen, Andrew Fogg, Mike Aitken, Steve Hodges, Carsten Rother, and Ken Wood. 2007. Do Life-logging Technologies Support Memory for the Past?: An Experimental Study Using Sensecam. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (San Jose, California, USA) (CHI ’07). ACM, New York, NY, USA, 81–90. https://doi.org/10.1145/1240624.1240636
[49]
Abigail J. Sellen and Steve Whittaker. 2010. Beyond Total Capture: A Constructive Critique of Lifelogging. Commun. ACM 53, 5 (May 2010), 70–77. https://doi.org/10.1145/1735223.1735243
[50]
Abigail J Sellen and Steve Whittaker. 2010. Beyond total capture: a constructive critique of lifelogging. Commun. ACM 53, 5 (2010), 70–77.
[51]
Roger N. Shepard. 1967. Recognition memory for words, sentences, and pictures. Journal of Verbal Learning and Verbal Behavior 6, 1 (1967), 156 – 163. https://doi.org/10.1016/S0022-5371(67)80067-7
[52]
Susan M. Sherman, Hannah Follows, Alexander B.R. Mushore, Kathleen Hampson-Jones, and Katie Wright-Bevans. 2015. Television advertisements create false memories for competitor brands. Journal of Applied Research in Memory and Cognition 4, 1 (2015), 1–7. https://doi.org/10.1016/j.jarmac.2014.06.001
[53]
Julian Steil, Marion Koelle, Wilko Heuten, Susanne Boll, and Andreas Bulling. 2018. PrivacEye: Privacy-Preserving First-Person Vision Using Image Features and Eye Movement Analysis. CoRR abs/1801.04457(2018). arxiv:1801.04457http://arxiv.org/abs/1801.04457
[54]
Julian Steil, Marion Koelle, Wilko Heuten, Susanne Boll, and Andreas Bulling. 2019. PrivacEye: Privacy-Preserving Head-Mounted Eye Tracking Using Egocentric Scene Image and Eye Movement Features. In Proceedings of the 2019 ACM Symposium on Eye Tracking Research and Applications(ETRA’19). ACM, New York, NY, USA. https://doi.org/10.1145/3314111.3319913
[55]
Robert Templeman, Roberto Hoyle, David Crandall, and Apu Kapadia. 2014. Reactive Security: Responding to Visual Stimuli from Wearable Cameras. In Proceedings of the 2014 ACM International Joint Conference on Pervasive and Ubiquitous Computing: Adjunct Publication (Seattle, Washington) (UbiComp ’14 Adjunct). ACM, New York, NY, USA, 1297–1306. https://doi.org/10.1145/2638728.2641708
[56]
Edison Thomaz, Aman Parnami, Jonathan Bidwell, Irfan Essa, and Gregory D. Abowd. 2013. Technological Approaches for Addressing Privacy Concerns when Recognizing Eating Behaviors with Wearable Cameras. In Proceedings of the 2013 ACM International Joint Conference on Pervasive and Ubiquitous Computing (Zurich, Switzerland) (UbiComp ’13). ACM, New York, NY, USA, 739–748. https://doi.org/10.1145/2493432.2493509
[57]
Endel Tulving. 1982. Synergistic ecphory in recall and recognition.Canadian Journal of Psychology/Revue canadienne de psychologie 36, 2(1982), 130.
[58]
John T. Wixted and Ebbe B. Ebbesen. 1991. On the Form of Forgetting. Psychological Science 2, 6 (1991), 409–415. https://doi.org/10.1111/j.1467-9280.1991.tb00175.x
[59]
A Daniel Yarmey. 1993. Adult Age and Gender Differences in Eyewitness Recall in Field Settings 1. Journal of Applied Social Psychology 23, 23 (1993), 1921–1932.

Cited By

View all
  • (2024)Was it Real or Virtual? Confirming the Occurrence and Explaining Causes of Memory Source Confusion between Reality and Virtual RealityProceedings of the 2024 CHI Conference on Human Factors in Computing Systems10.1145/3613904.3641992(1-17)Online publication date: 11-May-2024
  • (2023)BystandAR: Protecting Bystander Visual Data in Augmented Reality SystemsProceedings of the 21st Annual International Conference on Mobile Systems, Applications and Services10.1145/3581791.3596830(370-382)Online publication date: 18-Jun-2023

Index Terms

  1. Impact of Privacy Protection Methods of Lifelogs on Remembered Memories

      Recommendations

      Comments

      Information & Contributors

      Information

      Published In

      cover image ACM Conferences
      CHI '23: Proceedings of the 2023 CHI Conference on Human Factors in Computing Systems
      April 2023
      14911 pages
      ISBN:9781450394215
      DOI:10.1145/3544548
      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

      Sponsors

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 19 April 2023

      Permissions

      Request permissions for this article.

      Check for updates

      Author Tags

      1. blurring
      2. filters
      3. lifelogging
      4. memory augmentation
      5. memory implantation
      6. memory reformation
      7. obfuscation
      8. privacy
      9. recall
      10. recognition

      Qualifiers

      • Research-article
      • Research
      • Refereed limited

      Funding Sources

      Conference

      CHI '23
      Sponsor:

      Acceptance Rates

      Overall Acceptance Rate 6,199 of 26,314 submissions, 24%

      Upcoming Conference

      CHI 2025
      ACM CHI Conference on Human Factors in Computing Systems
      April 26 - May 1, 2025
      Yokohama , Japan

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)159
      • Downloads (Last 6 weeks)1
      Reflects downloads up to 17 Jan 2025

      Other Metrics

      Citations

      Cited By

      View all
      • (2024)Was it Real or Virtual? Confirming the Occurrence and Explaining Causes of Memory Source Confusion between Reality and Virtual RealityProceedings of the 2024 CHI Conference on Human Factors in Computing Systems10.1145/3613904.3641992(1-17)Online publication date: 11-May-2024
      • (2023)BystandAR: Protecting Bystander Visual Data in Augmented Reality SystemsProceedings of the 21st Annual International Conference on Mobile Systems, Applications and Services10.1145/3581791.3596830(370-382)Online publication date: 18-Jun-2023

      View Options

      Login options

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Full Text

      View this article in Full Text.

      Full Text

      HTML Format

      View this article in HTML Format.

      HTML Format

      Media

      Figures

      Other

      Tables

      Share

      Share

      Share this Publication link

      Share on social media