{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,8,18]],"date-time":"2024-08-18T17:48:10Z","timestamp":1724003290086},"reference-count":80,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2013,7,9]],"date-time":"2013-07-09T00:00:00Z","timestamp":1373328000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Sci Eng Ethics"],"published-print":{"date-parts":[[2014,6]]},"DOI":"10.1007\/s11948-013-9456-1","type":"journal-article","created":{"date-parts":[[2013,7,8]],"date-time":"2013-07-08T06:51:04Z","timestamp":1373266264000},"page":"379-409","source":"Crossref","is-referenced-by-count":39,"title":["Challenges and Opportunities of Lifelog Technologies: A Literature Review and Critical Analysis"],"prefix":"10.1007","volume":"20","author":[{"given":"Tim","family":"Jacquemard","sequence":"first","affiliation":[]},{"given":"Peter","family":"Novitzky","sequence":"additional","affiliation":[]},{"given":"Fiachra","family":"O\u2019Brolch\u00e1in","sequence":"additional","affiliation":[]},{"given":"Alan F.","family":"Smeaton","sequence":"additional","affiliation":[]},{"given":"Bert","family":"Gordijn","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2013,7,9]]},"reference":[{"key":"9456_CR1","doi-asserted-by":"crossref","DOI":"10.1007\/b94080","volume-title":"The new everyday: Views on ambient intelligence","author":"E Aarts","year":"2003","unstructured":"Aarts, E., & Marzano, S. (2003). The new everyday: Views on ambient intelligence. Rotterdam: 010 Publishers."},{"key":"9456_CR2","unstructured":"Allan, A., & Warden, P. (2011). Got an iPhone or 3G iPad? Apple is recording your moves. O\u2019Reilly Radar. Available from: http:\/\/radar.oreilly.com\/2011\/04\/apple-location-tracking.html . Accessed 15 Jan 2013."},{"issue":"1","key":"9456_CR3","first-page":"47","volume":"75","author":"AL Allen","year":"2007","unstructured":"Allen, A. L. (2007). Dredging up the past: Lifelogging, memory, and surveillance. The University of Chicago Law Review, 75(1), 47\u201374.","journal-title":"The University of Chicago Law Review"},{"key":"9456_CR4","unstructured":"ANP. (2009). Minister: excuus aan slachtoffer identiteitsfraude. Nrc.nl. Available from: http:\/\/vorige.nrc.nl\/binnenland\/article2368828.ece\/Minister_excuus_aan_slachtoffer_identiteitsfraude . Accessed 08 Jan 2013."},{"issue":"2","key":"9456_CR5","doi-asserted-by":"crossref","first-page":"129","DOI":"10.1007\/s10676-007-9135-5","volume":"9","author":"J Bailey","year":"2007","unstructured":"Bailey, J., & Kerr, I. R. (2007). Seizing Control? The experience capture experiments of Ringley & Mann. Ethics and Information Technology, 9(2), 129\u2013139.","journal-title":"Ethics and Information Technology"},{"issue":"1","key":"9456_CR6","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1080\/15710880600608230","volume":"2","author":"L Bannon","year":"2006","unstructured":"Bannon, L. (2006). Forgetting as a feature not a bug. CoDesign, 2(1), 3\u201315.","journal-title":"CoDesign"},{"issue":"4","key":"9456_CR7","doi-asserted-by":"crossref","first-page":"50","DOI":"10.1145\/1978822.1978833","volume":"18","author":"L Bannon","year":"2011","unstructured":"Bannon, L. (2011). Reimagining HCI: Toward a more human-centered perspective. Interactions, 18(4), 50\u201357.","journal-title":"Interactions"},{"key":"9456_CR91","unstructured":"Bell, G., & Gemmell, J. (2007). A Digital Life. Scientific American. Available from: http:\/\/www.scienceandsociety.org\/web\/Library_files\/A.Digital.Life.pdf. Accessed 28 May 2012."},{"key":"9456_CR8","unstructured":"Bell, G., & Gemmell, J. (2009). Total recall: How the E-Memory revolution will change anything. New York: Dutton."},{"key":"9456_CR9","volume-title":"The transparent society: Will technology force us to choose between privacy and freedom?","author":"D Brin","year":"1998","unstructured":"Brin, D. (1998). The transparent society: Will technology force us to choose between privacy and freedom?. Cambridge: Perseus Books Group."},{"issue":"1","key":"9456_CR10","first-page":"101","volume":"176","author":"V Bush","year":"1945","unstructured":"Bush, V. (1945). As we may think. The Atlantic Monthly, 176(1), 101\u2013108.","journal-title":"The Atlantic Monthly"},{"key":"9456_CR11","volume-title":"Handbook of research on mobile software engineering: Design, implementation and emergent applications","author":"D Byrne","year":"2010","unstructured":"Byrne, D., Kelly, L., & Jones, G. J. F. (2010). Multiple multimodal mobile devices: Lessons learned from engineering lifelog solutions. In P. Alencar & D. Cowan (Eds.), Handbook of research on mobile software engineering: Design, implementation and emergent applications. Hershey, PA: IGI Publishing."},{"key":"9456_CR12","unstructured":"Chen, B. X. (2011). Creepy bug gives some iPhones unwanted facetime. Wired.com. Available from: http:\/\/www.wired.com\/gadgetlab\/2011\/04\/creepy-iphone-bug\/?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+wired%2Findex+%28Wired%3A+Index+3+%28Top+Stories+2%29%29 . Accessed 23 May 2012."},{"key":"9456_CR13","unstructured":"Chen, Y., & Jones, G. J. F. (2012). What do people want from their lifelogs? In 6th Irish human computer interaction conference."},{"key":"9456_CR14","doi-asserted-by":"crossref","unstructured":"Cheng, W. C., Golubchik, L., & Kay, D. G. (2004). Total recall: are privacy changes inevitable? In Proceedings of the 1st ACM workshop on continuous archival and retrieval of personal experiences, pp. 86\u201392.","DOI":"10.1145\/1026653.1026666"},{"key":"9456_CR15","unstructured":"Clowes, R. W. (2012). Hybrid memory, cognitive technology and self. In The proceedings of the AISB and IACAP world congress 2012."},{"issue":"1","key":"9456_CR16","doi-asserted-by":"crossref","first-page":"107","DOI":"10.1007\/s13164-013-0130-y","volume":"4","author":"RW Clowes","year":"2013","unstructured":"Clowes, R. W. (2013). The cognitive integration of E-Memory. Review of Philosophy and Psychology, 4(1), 107\u2013133.","journal-title":"Review of Philosophy and Psychology"},{"issue":"8","key":"9456_CR17","doi-asserted-by":"crossref","first-page":"13","DOI":"10.29173\/irie92","volume":"8","author":"MR Curry","year":"2007","unstructured":"Curry, M. R. (2007). Being there then: Ubiquitous computing and the anxiety of reference. International Review of Information Ethics, 8(8), 13\u201319.","journal-title":"International Review of Information Ethics"},{"key":"9456_CR18","unstructured":"DARPA. (2003). \u2018Terrorism information awareness\u2019 (TIA) program formerly known as \u2018total information awareness\u2019. Available from: http:\/\/www.iwar.org.uk\/news-archive\/tia\/total-information-awareness.htm . Accessed 30 Jan 2012."},{"key":"9456_CR19","unstructured":"DARPA. Advanced soldier sensor information systems and technology (ASSIST). Available from: http:\/\/www.darpa.mil\/Our_Work\/I2O\/Programs\/Advanced_Soldier_Sensor_Information_Systems_and_Technology_(ASSIST).aspx . Accessed 30 Jan 2012."},{"key":"9456_CR20","unstructured":"DARPA\/IPTO. (2003). BAA # 03-30 LifeLog proposer information pamphlet. Available from: http:\/\/realnews247.com\/lifelog.htm . Accessed 30 Jan 2012."},{"key":"9456_CR21","unstructured":"Del Giudice, K., & Gardner, M. (2009). The message of the pensieve: Realizing memories through the world wide web and virtual reality. Available from: http:\/\/web.mit.edu\/comm-forum\/mit6\/papers\/Delgiudice.pdf (unpublished)."},{"key":"9456_CR22","unstructured":"Diaz, J. (2008). Huge iPhone security flaw puts all private information at risk. Gizmodo. Available from: http:\/\/gizmodo.com\/5042332\/huge-security-iphone-flaw-puts-all-private-information-at-risk . Accessed 30 Jan 2012."},{"issue":"1","key":"9456_CR23","first-page":"38","volume":"5","author":"L Dib","year":"2008","unstructured":"Dib, L. (2008). Memory as concept in the design of digital recording devices. Alt\u00e9rit\u00e9s, 5(1), 38\u201353.","journal-title":"Alt\u00e9rit\u00e9s"},{"issue":"3","key":"9456_CR24","first-page":"43","volume":"23","author":"L Dib","year":"2012","unstructured":"Dib, L. (2012). The forgetting dis-ease: Making time matter. A Journal of Feminist Cultural Studies, 23(3), 43\u201373.","journal-title":"A Journal of Feminist Cultural Studies"},{"key":"9456_CR25","unstructured":"Dodge, M. (2007). Do we need an ethics of forgetting in a world of digital \u2018memories for life\u2019? In Position paper for designing for forgetting and exclusion conference."},{"key":"9456_CR26","unstructured":"Dodge, M., & Kitchin, R. (2005). The ethics of forgetting in an age of pervasive computing. CASA Working Papers 92. London: Centre for Advanced Spatial Analysis."},{"issue":"3","key":"9456_CR27","doi-asserted-by":"crossref","first-page":"431","DOI":"10.1068\/b32041t","volume":"34","author":"M Dodge","year":"2007","unstructured":"Dodge, M., & Kitchin, R. (2007). Outlines of a world coming into existence\u2019: Pervasive computing and the ethics of forgetting. Environment and Planning B Planning and Design, 34(3), 431\u2013445.","journal-title":"Environment and Planning B Planning and Design"},{"key":"9456_CR32","doi-asserted-by":"crossref","unstructured":"Fernandez, K. C., Levinson, C. A., & Rodebaugh, T. L. (2012). Profiling: Predicting Social Anxiety From Facebook Profiles. Social Psychological and Personality Science.","DOI":"10.1177\/1948550611434967"},{"key":"9456_CR34","unstructured":"Fleming, N. (2013). I\u2019m recording everything for the first living archive. NewScientist.com. Available from: http:\/\/www.newscientist.com\/article\/mg21829110.300-im-recording-everything-for-the-first-living-archive.html . Accessed 10 April 2013."},{"key":"9456_CR37","unstructured":"Goggin, G. (2005). \u201cHave fun and change the world\u201d: Moblogging, mobile phone culture and the internet. Blogtalk. Available from: http:\/\/incsub.org\/blogtalk\/?page_id=119 . Accessed on 01 Feb 2012."},{"key":"9456_CR38","doi-asserted-by":"crossref","unstructured":"Golbeck, J., Robles C., & Turner K. (2011). Predicting personality with social media. In Conference on human factors in computing systems\u2014Proceedings, pp. 253\u2013262.","DOI":"10.1145\/1979742.1979614"},{"key":"9456_CR39","doi-asserted-by":"crossref","unstructured":"Hall, L., Johansson, P., & de L\u00e9on, D. (2013). Recomposing the Will: Distributed motivation and computer mediated extrospection. In: T. Vierkant, A. Clark, & J. Kiverstein, (Eds.) Decomposing the will, Philosophy of Mind Series. Oxford: Oxford University Press.","DOI":"10.1093\/acprof:oso\/9780199746996.003.0016"},{"issue":"3","key":"9456_CR40","doi-asserted-by":"crossref","first-page":"241","DOI":"10.1007\/s10676-011-9273-7","volume":"13","author":"R Heersmink","year":"2011","unstructured":"Heersmink, R., Den Hoven, J., Van Eck, N. J., & Den Berg, J. (2011). Bibliometric mapping of computer and information ethics. Ethics and Information Technology, 13(3), 241\u2013249.","journal-title":"Ethics and Information Technology"},{"issue":"2","key":"9456_CR41","doi-asserted-by":"crossref","first-page":"404","DOI":"10.1587\/transcom.E96.B.404","volume":"96-B","author":"M Helfert","year":"2013","unstructured":"Helfert, M., Walshe, R., & Gurrin, C. (2013). The impact of information quality on quality of life: An information quality oriented framework. IEICE Transactions, 96-B(2), 404\u2013409.","journal-title":"IEICE Transactions"},{"issue":"4","key":"9456_CR42","first-page":"567","volume":"4","author":"M Jayaram","year":"2011","unstructured":"Jayaram, M. (2011). The business of privacy: from private anxiety to commercial sense? A broad overview of why privacy ought to matter to Indian businesses. NUJS Law Review, 4(4), 567\u2013594.","journal-title":"NUJS Law Review"},{"key":"9456_CR43","first-page":"1","volume-title":"Self-surveillance privacy","author":"J Kang","year":"2011","unstructured":"Kang, J., Shilton, K., Estrin, D., Burke, J. A., & Hansen, M. (2011). Self-surveillance privacy (pp. 1\u201343). UC Los Angeles: UCLA School of Law."},{"issue":"3","key":"9456_CR44","doi-asserted-by":"crossref","first-page":"314","DOI":"10.1016\/j.amepre.2012.11.006","volume":"44","author":"P Kelly","year":"2013","unstructured":"Kelly, P., Marshall, S. J., Badland, H., Kerr, J., Oliver, M., Doherty, A. R., et al. (2013). An ethical framework for automated, wearable cameras in health behavior research. American Journal of Preventive Medicine, 44(3), 314\u2013319.","journal-title":"American Journal of Preventive Medicine"},{"issue":"3","key":"9456_CR45","first-page":"229","volume":"8","author":"EJ Koops","year":"2011","unstructured":"Koops, E. J. (2011). Forgetting footprints, shunning shadows: A critical analysis of the \u2018right to be forgotten\u2019 in big data practice. SCRIPTED, 8(3), 229\u2013256.","journal-title":"SCRIPTED"},{"key":"9456_CR46","doi-asserted-by":"crossref","first-page":"129","DOI":"10.4018\/978-1-60960-051-8.ch008","volume-title":"ICTs for mobile and ubiquitous urban infrastructures: Surveillance, locative media and global networks","author":"A Lemos","year":"2011","unstructured":"Lemos, A. (2011). Locative media and surveillance at the boundaries of informational territories. In R. Firmino, F. Duarte, & C. Ultramari (Eds.), ICTs for mobile and ubiquitous urban infrastructures: Surveillance, locative media and global networks (pp. 129\u2013149). Hershey, PA: IGI Publishing."},{"key":"9456_CR48","unstructured":"Mann, S. (2002). Sousveillance. Wearcam.org. Available from: http:\/\/wearcam.org\/sousveillance.htm . Accessed 05 April 2012."},{"key":"9456_CR49","doi-asserted-by":"crossref","unstructured":"Mann, S. (2004a). \u201cSousveillance\u201d inverse surveillance in multimedia imaging. In MULTIMEDIA \u201804 Proceedings of the 12th annual ACM international conference on multimedia, pp. 620\u2013627.","DOI":"10.1145\/1027527.1027673"},{"key":"9456_CR50","doi-asserted-by":"crossref","unstructured":"Mann, S. (2004b). Continuous lifelong capture of personal experience with EyeTap. In Proceedings of the the 1st ACM workshop on continuous archival and retrieval of personal experiences. New York, NY: ACM SIGMM.","DOI":"10.1145\/1026653.1026654"},{"issue":"6","key":"9456_CR51","doi-asserted-by":"crossref","first-page":"625","DOI":"10.1162\/105474605775196571","volume":"14","author":"S Mann","year":"2005","unstructured":"Mann, S. (2005a). Sousveillance and cyborglogs. A 30-year empirical voyage through ethical, legal and policy issues. Presence: Teleoperators and Virtual Environments, 14(6), 625\u2013646.","journal-title":"Presence: Teleoperators and Virtual Environments"},{"key":"9456_CR52","unstructured":"Mann, S. (2005b). Equiveillance: The equilibrium between Sur-veillance and Sous-veillance."},{"key":"9456_CR53","doi-asserted-by":"crossref","unstructured":"Mann, S., Fung, J., & Lo, R. (2006). Cyborglogging with camera phones: Steps toward equiveillance. In Proceedings of the ACM multimedia 2006.","DOI":"10.1145\/1180639.1180690"},{"key":"9456_CR54","volume-title":"Delete: The virtue of forgetting in the digital Age","author":"V Mayer-Sch\u00f6nberger","year":"2009","unstructured":"Mayer-Sch\u00f6nberger, V. (2009). Delete: The virtue of forgetting in the digital Age. Princeton: Princeton University Press."},{"key":"9456_CR55","unstructured":"Mehdizadeh, S. (2010). Cyberpsychology, behavior and social networking. Mary Ann Liebert, Inc., 13(4), 357\u2013364"},{"key":"9456_CR56","unstructured":"Memoto AB. (2013). Memoto automatic lifelogging camera. Available from: http:\/\/memoto.com\/ . Accessed 15 Jan 2013."},{"key":"9456_CR57","unstructured":"Microsoft. (2011). Microsoft research sensecam. Available from: http:\/\/research.microsoft.com\/en-us\/um\/cambridge\/projects\/sensecam\/ . Accessed 30 Jan 2012."},{"issue":"4","key":"9456_CR58","first-page":"92","volume":"6","author":"J Moreno","year":"2004","unstructured":"Moreno, J. (2004). DARPA on your mind. Cerebrum, 6(4), 92\u2013100.","journal-title":"Cerebrum"},{"key":"9456_CR59","unstructured":"Murata, K. (2011). The right to forget\/be forgotten. In: CEPE 2011: Crossing Boundaries."},{"issue":"1","key":"9456_CR60","doi-asserted-by":"crossref","first-page":"4","DOI":"10.1109\/MMUL.2005.17","volume":"12","author":"F Nack","year":"2005","unstructured":"Nack, F. (2005). You must remember this. IEEE Multimedia, 12(1), 4\u20137.","journal-title":"IEEE Multimedia"},{"key":"9456_CR62","unstructured":"O\u2019Hara, K. (2010a). Narcissus to a man: Lifelogging, technology and the normativity of truth. In E. Berry et al. (Eds.) Second Annual SenseCam symposium. Available at: http:\/\/eprints.ecs.soton.ac.uk\/21904\/ ."},{"key":"9456_CR63","unstructured":"O\u2019Hara, K., & Hall, W. (2008). Trust on the Web: Some Web Science Research Challenges."},{"key":"9456_CR64","volume-title":"Close engagements with artificial companions: Key social, psychological, ethical and design issues","author":"K O\u2019Hara","year":"2010","unstructured":"O\u2019Hara, K. (2010b). Arius in cyberspace: Digital companions and the limits of the person. In Y. Wilks (Ed.), Close engagements with artificial companions: Key social, psychological, ethical and design issues. Amsterdam: John Benjamins."},{"key":"9456_CR65","volume-title":"Philosophy and engineering: Reflections on practice, principles and process","author":"Kieron O\u2019Hara","year":"2012","unstructured":"O\u2019Hara, Kieron. (2012). The technology of collective memory and the normativity of truth. In D. Goldberg, N. McCarthy, & D. Michelfelder (Eds.), Philosophy and engineering: Reflections on practice, principles and process. Berlin: Springer."},{"issue":"8","key":"9456_CR66","doi-asserted-by":"crossref","first-page":"351","DOI":"10.1098\/rsif.2006.0125","volume":"3","author":"K O\u2019Hara","year":"2006","unstructured":"O\u2019Hara, K., Morris, R., Shadbolt, N., Hitch, G. J., Hall, W., & Beagrie, N. (2006). Memories for Life: A review of the science and technology. Journal of the Royal Society, Interface, 3(8), 351\u2013365.","journal-title":"Journal of the Royal Society, Interface"},{"issue":"2","key":"9456_CR67","first-page":"2","volume":"1","author":"K O\u2019Hara","year":"2009","unstructured":"O\u2019Hara, K., Tuffield, M., & Shadbolt, N. (2009). Lifelogging: Privacy and empowerment with memories for life. Identity in the Information Society, 1(2), 2\u20133.","journal-title":"Identity in the Information Society"},{"key":"9456_CR68","unstructured":"Price, B. A. (2010a). Towards privacy preserving lifelogging. In Proceedings of the second annual SenseCam symposium."},{"key":"9456_CR69","unstructured":"Price, B. A. (2010b). Challenges in eliciting privacy and usability requirements for lifelogging. In Conference\u201910."},{"key":"9456_CR70","unstructured":"Rawassizadeh, R. (2011). Towards sharing life-log information with society. Behaviour & Information Technology, pp. 1\u201311."},{"key":"9456_CR71","unstructured":"Rawassizadeh, R., & Min Tjoa, A. (2010). Securing shareable life-logs. In The second IEEE international conference on information privacy, security, risk and trust. Available from: http:\/\/ieeexplore.ieee.org\/xpls\/abs_all.jsp?arnumber=5590506 ."},{"key":"9456_CR72","volume-title":"The seven sins of memory: How the mind forgets and remembers","author":"DL Schacter","year":"2001","unstructured":"Schacter, D. L. (2001). The seven sins of memory: How the mind forgets and remembers. Boston & New York: Houghton Mifflin Company."},{"key":"9456_CR73","unstructured":"Schlenoff, C., Weiss, B., & Potts Steves, M. (2011). Lessons learned in evaluating DARPA advanced military technologies. Tech Beat. Available from: http:\/\/www.nist.gov\/customcf\/get_pdf.cfm?pub_id=906654 . Accessed 30 Jan 2012."},{"issue":"5","key":"9456_CR74","doi-asserted-by":"crossref","first-page":"71","DOI":"10.1145\/1735223.1735243","volume":"53","author":"AJ Sellen","year":"2010","unstructured":"Sellen, A. J., & Whittaker, S. (2010). Beyond total capture: A constructive critique of lifelogging. Communications of the ACM, 53(5), 71\u201372.","journal-title":"Communications of the ACM"},{"key":"9456_CR75","unstructured":"Shachtman, N. (2004). Pentagon revives memory project. Wired.com. Available from: http:\/\/www.wired.com\/politics\/security\/news\/2004\/09\/64911 . Accessed 30 Jan 2012."},{"key":"9456_CR77","doi-asserted-by":"crossref","unstructured":"Smith, A., O\u2019Hara, K., & Lewis, P. (2011). Visualising the past: Annotating a life with linked open data. In Web science conference 2011, June 14th\u201317th 2011, Koblenz Germany.","DOI":"10.1145\/2527031.2527038"},{"key":"9456_CR78","volume-title":"(IN)VISIBLE: Learning to act in the metaverse","author":"S Sonvilla-Weiss","year":"2008","unstructured":"Sonvilla-Weiss, S. (2008). (IN)VISIBLE: Learning to act in the metaverse. Vienna: Springer."},{"issue":"1","key":"9456_CR79","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/1050305.1050307","volume":"34","author":"L Sweeney","year":"2004","unstructured":"Sweeney, L. (2004). Navigating computer science research through waves of privacy concerns: Discussions among computer scientists at Carnegie Mellon University. ACM Computers and Society, 34(1), 1\u201319.","journal-title":"ACM Computers and Society"},{"key":"9456_CR81","unstructured":"TED. (2011). Hasan Elahi: FBI, here I am!. Available from: http:\/\/www.ted.com\/talks\/hasan_elahi.html . Accessed 23 May 2012."},{"key":"9456_CR82","unstructured":"Thurm, S., & Kane, I. Y. (2010). Your apps are watching you. The Wall Street Journal. Available from: http:\/\/online.wsj.com\/article\/SB10001424052748704694004576020083703574602.html?mod=WSJ_hps_sections_tech . Accessed 23 May 2012."},{"key":"9456_CR83","doi-asserted-by":"crossref","DOI":"10.7551\/mitpress\/7972.001.0001","volume-title":"The inner history of devices","author":"S Turkle","year":"2008","unstructured":"Turkle, S. (2008). Inner History. In S. Turkle (Ed.), The inner history of devices. Cambridge: The MIT Press."},{"key":"9456_CR84","volume-title":"Alone together: Why we expect more from technology and less from each other","author":"S Turkle","year":"2011","unstructured":"Turkle, S. (2011). Alone together: Why we expect more from technology and less from each other. New York: Basic Books."},{"key":"9456_CR85","unstructured":"Valentino Devries, J. (2011). IPhone stored location in test even if disabled. The Wall Street Journal. Available from: http:\/\/online.wsj.com\/article\/SB10001424052748704123204576283580249161342.html?mod=WSJ_article_comments#articleTabs%3Dcomments . Accessed 23 May 2012."},{"issue":"2","key":"9456_CR86","doi-asserted-by":"crossref","first-page":"167","DOI":"10.1386\/ejpc.2.2.167_1","volume":"2","author":"Y Eede Van Den","year":"2011","unstructured":"Van Den Eede, Y. (2011). Technological remembering\/forgetting: A Faustian bargain? Empedocles: European Journal for the Philosophy of Communication, 2(2), 167\u2013180.","journal-title":"Empedocles: European Journal for the Philosophy of Communication"},{"issue":"3","key":"9456_CR87","doi-asserted-by":"crossref","first-page":"311","DOI":"10.1177\/1461444805050765","volume":"7","author":"J Dijck van","year":"2005","unstructured":"van Dijck, J. (2005). From shoebox to performative agent: The computer as personal memory machine. New Media & Society, 7(3), 311\u2013332.","journal-title":"New Media & Society"},{"key":"9456_CR88","volume-title":"Mediated memories in the digital age","author":"J Dijck van","year":"2012","unstructured":"van Dijck, J. (2012). Mediated memories in the digital age. Stanford: Stanford University Press."},{"key":"9456_CR89","unstructured":"Weber, K. (2010). Mobile Devices and a New Understanding of Presence. In: Workshop paper from SISSI2010 at the 12th annual ACM international conference on ubiquitous computing, p. 101."},{"key":"9456_CR90","volume-title":"E-content technologies and perspectives for the European Market","author":"P Werkhoven","year":"2005","unstructured":"Werkhoven, P. (2005). Experience machines: capturing and retrieving personal content. In P. A. Bruck, A. Buchholz, Z. Karssen, & A. Zerfass (Eds.), E-content technologies and perspectives for the European Market. New York, Heidelberg, Berlin: Springer."}],"container-title":["Science and Engineering Ethics"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11948-013-9456-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11948-013-9456-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11948-013-9456-1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,2,27]],"date-time":"2022-02-27T16:47:05Z","timestamp":1645980425000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11948-013-9456-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,7,9]]},"references-count":80,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2014,6]]}},"alternative-id":["9456"],"URL":"https:\/\/doi.org\/10.1007\/s11948-013-9456-1","relation":{},"ISSN":["1353-3452","1471-5546"],"issn-type":[{"value":"1353-3452","type":"print"},{"value":"1471-5546","type":"electronic"}],"subject":[],"published":{"date-parts":[[2013,7,9]]}}}