Joji Joji Mori (PhD Candidate) Doctoral Consortium IDG Group 4 th May 2010.

Slides:



Advertisements
Similar presentations
Designing for Context: Usability in a Ubiquitous Environment Jenna Burrell, Paul Treadwell, Geri K. Gay Human Computer Interaction Group Cornell University.
Advertisements

Young Peoples Geographies Project Action Plan for Geography Development Strand Project.
© 2011 Crain Communications Inc.. Always on Women A survey of how women are using technology today What Devices Millennials are Using, And What They Are.
Mobile phones as autobiography: young women, delinquency and self-hood Dr Elaine Arnull London South Bank University UK.
Frameworks for the sharing of memory in a digital world Darren Stephens MBCS CITP
UKOLN is supported by: Using Blogs Effectively Within Your Organisation: Introduction A Half-Day Workshop Brian Kelly UKOLN University of Bath Bath, UK.
Our Digital World Second Edition
How many of these icons do you recognise?. Year 7 Guidance Manager CEOP Ambassador.
Discovering Computers: Chapter 1
Augmented Memory Remembering and Forgetting By: Rachel McNeely.
IR in HDMs (Liadh Kelly)- 1 - Centre for Digital Video Processing C e n t r e f o r D I g I t a l V I d e o P r o c e s s I n g Venturing into the Labyrinth:
Tony Wilson Academic Liaison Librarian for Computer Science May 2011.
New Technologies Are Surfacing Everyday. l Some will have a dramatic affect on the business environment. l Others will totally change the way you live.
IPhone 4 The iphone is a mobile phone with a lot of extras, theses include a camera video recording and MP3 player not to forget the mobile web browsing.
Social Media & Photography Photojournalism. Why social media? A 2013 study found that social media users represent 1 in 4 people on the globe, roughly.
Backing up data By Alicia stewart.
Digital Literacy.
Social Networking – The Ways and Means Rosey Broderick May 2011.
Awareness raising session for Parents and Carers.
Personal Information Management (PIM) is about keeping information and organizing it in such a way that we can find it when we need it. PIM as a field.
DELETE: THE VIRTUE OF FORGETTING IN THE DIGITAL AGE By Viktor Mayor-Schonberger.
Life Logging Melekam Tsegaye Shaun Bangay Alfredo Terzoli Research area: Wearable, Pervasive and Ubiquitous Computing
Electronic Communications State Owned System Mandates Presented by: Eileen Goldgeier.
Speaking Course Mobile Phones. Vocabulary advance technology portable electronic device: mobile phones, netbook, USB flash drive improve people’s lives.
Journalist- Bezsmola Oksana. It's no secret that virtually every person registered in any social network. and spends on the Internet most of his life.
A Fleming Parent’s Guide to Child Safety on the Internet Adapted by Kam Purewal June 24,2010 Based on: Responding to Cyberbullying: A Guide for School.
Using Social Media To Promote News Stories Christine Di Salvo.
To have and to hold: Exploring the personal archive Joseph ‘Jofish’ Kaye, Janet Vertesi Shari Avery, Allan Dafoe, Shay David, Lisa Onaga, Ivan Rosero,
EPortfolios.
Social Media Smackdown Presenters Roy Hickman, Moderator David Palme, Con Stance Jeff Trudell, Pro Stance.
Staying Safe Online Aberdeen Grammar School. Things to do online Keep in touch with friends and family using , twitter and social networking sites.
 Facebook  Twitter  MySpace  Windows LiveSpace.
MiLife Graduate Design Seminar II Discovery & Exploratory Research Synthesis.
Chloe Miles IMPROVING PRODUCTIVITY USING IT. Menu Using Word Advantages Disadvantages Conclusion E-Safety Social Media Dangers of Social Media Sites Staying.
 What are the risks?  Technologies your children use  Tips for protection  Advice and help  Questions? Topics.
Review of the paper: The Ubiquitous Camera: An In-Depth Study of Camera Phone Use Authors: Tim Kindberg, Mirjana Spasojevic, Rowanne Fleck, Abigail Sellen.
Children: Can they inspect it? Yes they can! Gavin Sim.
Internet Safety Night Raising Good Digital Citizens.
Influential Behaviors Shelbi Chandler University of Cincinnati, (Secondary Education) Introduction  The purpose of this study was.
INTERACTIONAL MODEL THEORY. NDAKALAKO T SHILONGO COMMUNICATION THEORY AND RESEARCH METHODOLOGY.
DUNN & WILSON PROJECT Tales from outside the Square.
Are you a Digital Native?
Digital artifacts for remebering and storytelling: PostHistory and Social Network Fragments F. B. Viegas, D boyd, D. H. Nguyen, J. Potter, and J. Donath.
Four or More: The New Demographic Mary Madden Pew Internet & American Life Project LITA President’s Program ALA – June 27, 2010 (and a bunch of other really.
MY DIGITAL FOOTPRINT. WHAT IS A DIGITAL FOOTPRINT? Each time you log onto social media, you leave a trail behind you, mostly based on what you search.
“W HAT ’ S ON YOUR MIND ?” An explorative study about how youngsters use notions of time and space on Facebook Mathias Decuypere (Presenter) Steven Bruneel.
Online Services. An online service is a service delivered from the internet.
Do This file can be found at
INT197B: CyberCitizenship Spring 2010 Class Catherine Dwyer Assoc. Prof. Seidenberg School Full time since Fall 2000 Other classes taught: CS121,
Mobile phones have changed the way we communicate, they allow us to send text messages and call people while on the go. Modern android phones such as.
Digital Media Content MCD 7213 Development. Presentation outline What is media What is DIGITAL media? What is DIGITAL content? Traits of digital content.
IASSIST May 26-29, 2009 The Finnish Navy Mobile Today and Records Management Issues.
“How do I keep my child safe online?” Miss Johnstone Computing Co-ordinator “Parents / Carers are the one important factor in the home environment to keep.
WHAT IF YOU COULD REMEMBER EVERYTHING? “Dalgliesh, he knew, had almost total recall.” -P.D. James, Death of an expert witness.
Blogs How to use the bog safely and secure? Create new username. Create a strong password to your account. Create the password to your uploaded files.
E-SAFETY. LYNDON B. JOHNSON (FORMER US PRESIDENT) “Every man (sic) should know that his conversations, his correspondence, and his personal life are private.”
Mobile Device Collection More Than Just a Phone. More than just a phone… Cell phone Address book Planner & Organizer Messenger Photo & Video camera GPS.
What is Multimedia Anyway? David Millard and Paul Lewis.
Extending Your Evaluation's Short Half-life So It Is Longer Than a Day: A Personal Perspective David J. Bernstein, Ph.D. Senior Study Director, Westat.
Digital Forensics and Hand Held Devices Robert Trimble COSC
St. Anne’s Baslow Online Safety Before we start… O Throughout this meeting I hope to provide information that you will find useful in keep your.
Social Media and Records Management LRC meeting 5 th September 2012 Adapted from a presentation given with Kirsten Wright, Victoria University.
Designing for Context: Usability in a Ubiquitous Environment
What is it and why is it important?
Home entertainment.
Career EMPOWERMENT Curriculum
Our Children and Social Media
Web 2.0 Technologies and Community Building Online by
Print vs. Online Coverage
Communicating in the IT Industry
Presentation transcript:

Joji Joji Mori (PhD Candidate) Doctoral Consortium IDG Group 4 th May 2010

Background Bell, C. G., & Gemmell, J. (2009). Total recall : how the E-memory revolution will change everything. New York: Dutton. Lifeloggers typically wear computers in order to capture their entire lives, or large portions of their lives wikipedia

Phones – Lifelogging devices Smart Phones can be used/are being used as lifelogging devices Location aware (GPS, Compass) Call, SMS, , docs, photos, video, social network updates Hartnell-Young, E., & Vetere, F. (2005). Lifeblog: a new concept in mobile learning? Paper presented at the Wireless and Mobile Technologies in Education. WMTE IEEE International Workshop on.

A critique of lifelogging Beyond Total Capture: A Constructive Critique of Lifelogging Sellen, A., & Whittaker, S. (2010). Beyond total capture: a constructive critique of lifelogging. Communications of the ACM, 53(5), Selectivity, not total capture 2. Cues not capture 3. Memory refers to a complex, multi- faceted set of concepts 4. Synergy not substitution Related reference. Mayer-Scho ̈ nberger, Viktor. (2009), Delete : the virtue of forgetting in the digital age / Viktor Mayer-Scho ̈ nberger Princeton University Press, Princeton, N.J. ; Woodstock

Facebook in The Age Grieving issues - Gas leak tragedy: grandfather slams Facebook page 3 rd June Privacy fears - 30,000 quit Facebook in protest 2 nd June Data Mining - The terrors of Twittering: growing up in an unexploded data minefield 5 th May

Our digital past It seems inevitable more of our everyday lives will be captured digitally The end of the ephemeral Harper, R. Rodden, T., Rogers, Y., Sellen, A. (editors), Being human: Human– computer interaction in the year Cambridge: Microsoft Research

Designing for deletion How to better design for deletion in technology that stores personal digital content? Think – does anyone have a good storage/deletion system? Think Facebook – What should happen to mundane, day to day stuff well into future? Inappropriate or incorrect comments relating to you, regretful photos, how do you delete a friend?

Designing for deletion Limited storage Active storage/deletion Stored Deleted Stored Abundant storage Accumulate

Demotion GrayArea Bergman, O., Tucker, S., Beyth-Marom, R., Cutrell, E., & Whittaker, S. (2009). It's not that important: demoting personal information of low subjective importance using GrayArea. Paper presented at the Proceedings of ACM CHI 2009 Conference on Human Factors in Computing Systems.

Candidate audiences Everyday life The commuter (yesterdays observation) Reading MX Spacing out * 2 Music on phone * 2 News on phone * 2 (I was reading sport news) Billiards game on phone

Candidate audiences Youth into adulthood Formal processes for deletion Museums (unwanted artifacts) Photographer – what to delete / keep? Hard waste Juvenile Crime, Bankruptcy Law Allen, A. L. (2008). Dredging up the Past: Lifelogging, Memory, and Surveillance. University of Chicago Law Review, 75(1),

Consider death When you create a will, you decide the future of items of monetary, and emotional value What digital content should be kept and who should have access to it? What should be deleted?

Related Research Academics keep records for…. Finding it later Building a legacy Sharing resources Fears of loss Identity Construction: Impression Management in the Archive Kaye, J. J., Vertesi, J., Avery, S., Dafoe, A., David, S., Onaga, L., et al. (2006). To have and to hold: exploring the personal archive. Paper presented at the Proceedings of ACM CHI 2006 Conference on Human Factors in Computing Systems.

Related Research Technology Heirlooms Kirk, D. S. & Banks R. (2008). On the design of technology heirlooms. International Workshop on Social Interaction and Mundane Technologies (SIMTech 08).

Personal Experience

Question for you How should I best spend my time prior to collecting data, as the topic is still being formulated? Especially given we typically apply grounded theory Is meeting people and reading relevant literature enough?

Contact details Room Phone: