{"id":328,"date":"2014-05-13T09:26:51","date_gmt":"2014-05-13T09:26:51","guid":{"rendered":"https:\/\/pim.famnit.upr.si\/wp\/?p=328"},"modified":"2021-11-17T11:18:06","modified_gmt":"2021-11-17T11:18:06","slug":"lifelogging-why-and-to-whom-is-our-information-from-fitness-and-health-apps-being-sold","status":"publish","type":"post","link":"https:\/\/pim.famnit.upr.si\/wp\/?p=328","title":{"rendered":"Lifelogging: why and to whom is our information from fitness and health apps being sold"},"content":{"rendered":"<p>Recently <a href=\"http:\/\/lifehacker.com\/lots-of-health-apps-are-selling-your-data-heres-why-1574001899\">LifeHacker published a very interesting article about why our information\/data logged by a plethora of health\/fitness apps is being sold<\/a>. <\/p>\n<p>What exactly is personal information? According to Jones [1] there are 6 types:<\/p>\n<\/p>\n<ol>\n<li>Controlled by<br \/>\n(owned by) us:&nbsp;<br \/>\nEmail messages in our email<br \/>\naccounts; files on our computer\u2019s<br \/>\nhard drive.<\/li>\n<li>About us: Credit history, medical, web<br \/>\nbrowsing, library books<br \/>\nchecked out.\n<\/li>\n<li>Directed toward us: Phone calls, drop-ins, TV ads,<br \/>\nweb ads, pop-ups.\n<\/li>\n<li>Sent (posted,<br \/>\nprovided) by us: Email, personal web sites,<br \/>\npublished reports and articles.\n<\/li>\n<li>(Already) experienced by us: Web pages that remain on the<br \/>\nWeb. Books that remain in a library.<br \/>\nTV and radio programs that remain<br \/>\nsomewhere in \u201cbroadcast ether.\u201d\n<\/li>\n<li>Relevant (useful)<br \/>\nto us: Somewhere \u201cout there\u201d is the<br \/>\nperfect vacation, house, job,<br \/>\nlifelong mate. <\/li>\n<\/ol>\n<p><strong>What is lifelogging and why is it personal?<\/strong><\/p>\n<p><a href=\"http:\/\/en.wikipedia.org\/wiki\/Lifelog\">Lifelogging<\/a> is performed by many apps on our mobile devices. They can keep record of our exercises, log our sleeping behaviour, movements, pregnancy, etc. Based on the division above lifelogging falls in between 1st, 2nd and the 4th group. <\/p>\n<ul>\n<li>In the fourth group is information we enter in the apps ourself. For example name, surname, weight, food we eat, etc. Some apps even require constant updating of some of this information (e.g. weight). <\/li>\n<li>In the first group falls information that we enter ourself and information that is automatically logged. We control such information on our devices. We can delete logs, cache and even apps. We can change names, surnames, email addresses, etc. <\/li>\n<li>The second group is where the root of the problem lies &#8211; our information gets uploaded to the servers of such apps. <\/li>\n<\/ul>\n<p><strong>Drawbacks <\/strong><\/p>\n<p>Potentially this data that we have no control over and accumulates in<br \/>\nthe cloud could be used against us. As most of such apps are free to use, developers must have a profitable business model (sadly even the paid apps do it) &#8211;&nbsp; sell our information to whoever is prepared to pay for it. Let&#8217;s see who is prepared to pay for<br \/>\n it. <\/p>\n<ul>\n<li>The main group is advertisers that are interested in targeting a specific user based on hers\/his behaviour. <\/li>\n<li>Then there are insurance companies that are interested on our well<br \/>\nbeing (sig) and can adjust insurance plans accordingly. And remember<br \/>\nthat <a href=\"http:\/\/www.dailyfinance.com\/2009\/11\/23\/facebook-spying-costs-canadian-woman-her-health-benefits\/\">insurance companies can find our information on Facebook<\/a> as well. <\/li>\n<li>And there are probably many other interested parties including government agencies and others.\n<\/li>\n<\/ul>\n<p><strong>Benefits <\/strong><\/p>\n<p>However there are some benefits as well. The immediate benefits of the upload of such information are: a backup, synchronised multiple devices, and a computational power that can suggest various things to us &#8211; users. And there are long term benefits as well. Besides augmenting our health records and help doctors in diagnosing particular conditions, personal reflection on lifelogged information can improve our well-being [2]. <\/p>\n<p>\n<iframe loading=\"lazy\" height=\"281\" frameborder=\"0\" width=\"500\" src=\"http:\/\/player.vimeo.com\/video\/66118447\"><\/iframe>\n<\/p>\n<p><a href=\"http:\/\/vimeo.com\/66118447\">CHI2013 talk: Echoes from the Past: How Technology Mediated Reflection Improves Well Being<\/a> from <a href=\"http:\/\/vimeo.com\/user5647514\">Ellen Isaacs<\/a> on <a href=\"https:\/\/vimeo.com\">Vimeo<\/a>.<\/p>\n<\/p>\n<p>In the era of <a href=\"http:\/\/en.wikipedia.org\/wiki\/Quantified_Self\">Quantified_Self<\/a>  it is very difficult to draw the line between how much and what information are we willing to share to keep the balance between benefits and drawbacks of such apps. For one, we can use fake information about us. But then the social aspect of these apps in jeopardised. And we can go on &#8230;<\/p>\n<p><\/p>\n<p>[1] William Jones. <a href=\"http:\/\/www.amazon.com\/Keeping-Found-Things-Information-Technologies\/dp\/0123708664\">Keeping Found Things Found: The Study and Practice of Personal Information Management<\/a>. Morgan Kaufmann; 1 edition (October 31, 2003). ISBN-13: 978-0123708663 ISBN-10: 0123708664 <\/p>\n<p>[2] Isaacs, E., Konrad, A., Walendowski, A., Lennig, T., Hollis, V., and Whittaker, S (2013). <a href=\"http:\/\/people.ucsc.edu\/~swhittak\/papers\/Echo-CHI2013-Accepted-Final.pdf\">Echoes From the Past: How Technology Mediated Reflection Improves Well-Being.<\/a> Proceedings of the 2013 Conference on Human factors in computing systems (CHI &#8217;13). ACM, New York, NY, USA. Nominated for best paper award.<\/p>\n<ol> <\/ol>\n","protected":false},"excerpt":{"rendered":"<p>Recently LifeHacker published a very interesting article about why our information\/data logged by a plethora of health\/fitness apps is being sold. What exactly is personal information? According to Jones [1] there are 6 types: Controlled by (owned by) us:&nbsp; Email messages in our email accounts; files on our computer\u2019s hard drive. About us: Credit history,&#46;&#46;&#46;<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[7],"tags":[],"class_list":["post-328","post","type-post","status-publish","format-standard","hentry","category-6-pim-research"],"_links":{"self":[{"href":"https:\/\/pim.famnit.upr.si\/wp\/index.php?rest_route=\/wp\/v2\/posts\/328","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/pim.famnit.upr.si\/wp\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/pim.famnit.upr.si\/wp\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/pim.famnit.upr.si\/wp\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/pim.famnit.upr.si\/wp\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=328"}],"version-history":[{"count":1,"href":"https:\/\/pim.famnit.upr.si\/wp\/index.php?rest_route=\/wp\/v2\/posts\/328\/revisions"}],"predecessor-version":[{"id":661,"href":"https:\/\/pim.famnit.upr.si\/wp\/index.php?rest_route=\/wp\/v2\/posts\/328\/revisions\/661"}],"wp:attachment":[{"href":"https:\/\/pim.famnit.upr.si\/wp\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=328"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/pim.famnit.upr.si\/wp\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=328"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/pim.famnit.upr.si\/wp\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=328"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}