Skip to main content

To Log or Not to Log? SWOT Analysis of Self-Tracking

  • Chapter
  • First Online:
Lifelogging

Abstract

With more and more wearable devices and smartphone apps being released that are capable of unobtrusively recording various aspects of our life, we are currently witnessing the emergence of a new trend. Followers of this trend rely on these apps and devices to track their every day activities and to gain insights into their personal well-being. Although promoted by various players on the market, the use of such techniques does not come without risks or drawbacks. In this chapter, we use the SWOT matrix, which is commonly used by business strategists, to evaluate the strengths, weaknesses, opportunities, and threats of self-tracking activities.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 64.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 84.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  • Albatal, R., Gurrin, C., Zhou, J., Yang, Y., Carthy, D., & Li, N. (2013). Senseseer mobilecloud-based lifelogging framework. Technology and Society (ISTAS), 2013 IEEE International Symposium on, 144-146. doi:10.1109/ISTAS.2013.6613113.

  • Arcega, L., Font, J., & Cetina, C. (2013). Towards Memory-Aware Services and Browsing through Lifelogging Sensing. Sensors, 13(11), 15113-15137. doi:10.3390/s131115113.

    Google Scholar 

  • Baum, G. (2013). Wacht auf, es geht um die Menschenwürde. Datenschutz und Datensicherheit – DuD, 37(9), 583-584. doi:10.1007/s11623-013-0242-7.

    Google Scholar 

  • Bell, G., & Gemmell, J. (2010). Your Life, Uploaded: The Digital Way to Better Memory, Health, and Productivity. New York: Plume.

    Google Scholar 

  • Biggs, J. (2012). Augmented Reality Explorer Steve Mann Assaulted At Parisian McDonald’s. http://techcrunch.com/2012/07/16/augmented-reality-explorer-steve-mann-assaulted-at-parisian-mcdonalds/. Accessed 06 March 2015.

  • Blair, S. N., Kohl, H. W., Paffenbarqer, R. S. J., Clark, D. G., Cooper, K. H., & Gibbons, L. W. (1989). Physical fitness and all-cause mortality. A prospective study of healthy men and women. The Journal of the American Medical Association, 262(17), 2395-2401. doi:10.1001/jama.1989.03430170057028.

    Google Scholar 

  • Brake, D. R. (2014). Sharing our Lives Online- Risks and Exposure in Social Media. London: Palgrave Macmillan.

    Google Scholar 

  • Burneleit, E. (2011). Necrologium Vitae. Master Thesis at University of Applied Sciences Potsdam.

    Google Scholar 

  • Caprani, N., O’Connor, N., & Gurrin, C. (2013). Experiencing SenseCam: a case study interview exploring seven years living with a wearable camera. Proceedings of the 4th International SenseCam & Pervasive Imaging Conference (SenseCam ‘13), 52-59. doi:10.1145/2526667.2526676.

  • Falagas, M. E., Pitsouni, E. I., Malietzis, G. A., & Pappas, G. (2008). Comparison of PubMed, Scopus, Web of Science, and Google Scholar: strengths and weaknesses. The FASEB Journal, 22(2), 338-342. doi:10.1096/fj.07-9492LSF.

    Google Scholar 

  • Fox, S., & Duggan, M. (2012). Mobile Health 2012. http://www.pewinternet.org/files/old-media/Files/Reports/2012/PIP_MobileHealth2012_FINAL.pdf. Accessed 06 March 2015.

  • Fox, S., & Duggan, M. (2013). Part Three: Tracking for Health. http://www.pewinternet.org/2013/11/26/part-three-tracking-for-health/. Accessed 06 March 2015.

  • Friedland, G., & Sommer, R. (2010). Cybercasing the Joint: On the Privacy Implications of Geo-Tagging. Proceedings of the 5th USENIX conference on Hot topics in security (HotSec’10), 1-8.

    Google Scholar 

  • Gurrin, C. (2013). Keynote: Experience of a Lifelogger: Tasks and Challenges. Keynote at the Lifelong User Modelling Workshop 2013.

    Google Scholar 

  • Gurrin, C., Smeaton, A. F., & Doherty, A. R. (2014). Lifelogging: Personal Big Data, Foundations and Trends in Information Retrieval, 8(1), 1-125. doi:10.1561/1500000033.

    Google Scholar 

  • Hodges, S., Williams, L., Berry, E., Izadi, S., Srinivasan, J., Butler, A., Smyth, G., Kapur, N., & Wood, K. (2006). SenseCam: A Retrospective Memory Aid, Proceedings of the 8th International Conference of Ubiquitous Computing (UbiComp 2006), 177-193. doi:10.1007/11853565_11.

    Google Scholar 

  • Hopfgartner, F. (2015). Smart Information Systems: Computational Intelligence for Real- Life Applications. Heidelberg: Springer Verlag.

    Google Scholar 

  • Hopfgartner, F., & Jose, J. M. (2010). Semantic User Modelling for Personal News Video Retrieval. In S. Boll, Q. Tian, L. Zhang, Z. Zhang, & Y.-P. P. Chen (Eds.), Advances in Multimedia Modeling. 16th International Multimedia Modeling Conference, MMM 2010 (pp. 336-346). Heidelberg: Springer Verlag

    Google Scholar 

  • Ioannis, A., Brown, I., Dickman, P., Friedewald, M., Irion, K., Kosta, E., Langheinrich, M., McCarthy, P., Osimo, D., Papiotis, S., Pasic, A., Petkovic, M., Spiekermann, S., & Wright, D. (2011). To log or not to log?—Risks and benefits of emerging life-logging applications. European Network and Information Security Agency (ENISA).

    Google Scholar 

  • Karatzoglou, A., Amatriain, X., & Baltrunas, L. (2010). Multiverse Recommendation: N-dimensional Tensor Factorization for Context-aware Collaborative Filtering, RecSys ‘10 Proceedings of the fourth ACM conference on Recommender systems, 79-86. doi:10.1145/1864708.1864727.

  • Kitamura, K., Yamasaki, T., & Aizawa, K. (2009). FoodLog: capture, analysis and retrieval of personal food images via web. CEA ‘09 Proceedings of the ACM multimedia 2009 workshop on Multimedia for cooking and eating activities, 23-30. doi:10.1145/1630995.1631001.

  • Labs, QS, Quantified Self Blog. http://quantifiedself.com. Accessed 17 March 2014.

  • Levy, K. (2014). A San Francisco Bar Banned Google Glass Because It Doesn’t Want Patrons Being Secretly Filmed. Business Insider. http://www.businessinsider.com/san-francisco-bar-bans-google-glass-2014-3?IR=T. Accessed 17 March 2015.

  • Li, N., Hopfgartner, F., Plumbaum, T., & Ruskin, H. J. (2014). QSHP’14: Proceedings of the Workshop on Quantified Self for Personal Healthcare, held in conjunction with IEEE BIBM 2014. IEEE.

    Google Scholar 

  • Lyon, D. (2014). Surveillance, Snowden, and Big Data: Capacities, consequences, critique. Big Data & Society, 1(2). doi:10.1177/2053951714541861.

    Google Scholar 

  • McClusky, M. (2009). The Nike Experiement: How the Shoe Giant Unleased the Power of Personal Metrics, Wired Magazine. http://archive.wired.com/medtech/health/magazine/17-07/lbnp_nike?currentPage=all. Accessed 17 March 2015.

  • McHugh, J. (2001). Intrusion and intrusion detection. International Journal of Information Security, 1, 14-35. doi:10.1007/s102070100001.

    Google Scholar 

  • Mcknight, D. H., Carter, M., Thatcher, J. B., & Clay, P. F. (2011). Trust in a specific technology: An investigation of its components and measures, ACM Transactions on Management Information Systems (TMIS), 2(2) 12:1-12:25. doi:10.1145/1985347.1985353.

    Google Scholar 

  • Morahan-Martin, J. M. (2004). How internet users find, evaluate, and use online health information: a cross-cultural review. Cyberpsychology, Behavior, and Social Networking, 7(5), 497-510.

    Google Scholar 

  • Nafus, D., & Sherman, J. (2014). Big Data, Big Questions| This One Does Not Go Up To 11: The Quantified Self Movement as an Alternative Big Data Practice. International Journal of Communication, 8, 1784-1794.

    Google Scholar 

  • Nicholls, J. G. (1989). The Competitive Ethos and Democratic Education. Cambridge: Harvard University Press.

    Google Scholar 

  • Oliver, J. (2014). Find a Google Glass and kick it from the network. http://julianoliver.com/output/log_2014-05-30_20-52. Accessed 17 March 2015.

  • Olson, P. (2014). Wearable Tech Is Plugging Into Health Insurance, http://www.forbes.com/sites/parmyolson/2014/06/19/wearable-tech-health-insurance/. Accessed 17 March 2015.

  • Omre, A. H., & Keeping, S. (2010). Bluetooth low energy: Wireless connectivity for medical monitoring. Journal of Diabetes Science and Technology, 4(2), 457-463. doi:10.1177/193229681000400227.

    Google Scholar 

  • World Health Organisation (2010). Global recommendations on physical activity for health. http://whqlibdoc.who.int/publications/2010/9789241599979_eng.pdf. Accessed 17 March 2015.

  • Rainie, L., Kiesler, S., Kang, R., & Madden, M. (2013). Anonymity, Privacy, and Security Online. PewResearchCenter. http://www.pewinternet.org/files/old-media//Files/Reports/2013/PIP_AnonymityOnline_090513.pdf. Accessed 17 March 2015.

  • Rapp, A., Hopfgartner, F., Plumbaum, T., Kummerfeld, B., Kay, J., & Herder, E. (2014). LinkQS’14: Proceedings of the Workshop Linking the Quantified Self. CEUR-WS. http://ceur-ws.org/Vol-1210/#LQS2014. Accessed 17 March 2015.

  • Rawassizadeh, R., & Tjoa, A. M. (2010). Securing Shareable Life-logs. Social Computing (SocialCom), 2010 IEEE Second International Conference on, 1105-1110. doi:10.1109/SocialCom.2010.164.

  • Selke, S. (2014). Lifelogging: Wie die digitale Selbstvermessung unsere Gesellschaft verändert. Berlin: Econ.

    Google Scholar 

  • U.S. Department of Health and Human Services (2006). Physical Activity and health: A report of the surgeon general. Centers for Disease Control and Prevention. http://www.cdc.gov/nccdphp/sgr/pdf/execsumm.pdf. Accessed 17 March 2015.

  • Solon, A., Callaghan, M., Harkin, J., & McGinnity, T. (2006). Case Study on the Bluetooth Vulnerabilities in Mobile Devices. International Journal of Computer Science and Network Security, 6(4), 125-129.

    Google Scholar 

  • Song, C.-W., Lee, D., Chung, K.-Y., Rim, K.-W., & Lee, J.-H. (2014). Interactive middleware architecture for lifelog based context awareness. Multimedia Tools and Applications, 71(2), 813-826. doi:10.1007/s11042-013-1362-7.

    Google Scholar 

  • Swan, M. (2009). Emerging Patient-Driven Health Care Models: An Examination of Health Social Networks, Consumer Personalized Medicine and Quantified Self-Tracking. International Journal of Environmental Research and Public Health, 6(2), 492-525. doi:10.3390/ijerph6020492.

    Google Scholar 

  • Swan, M. (2012). The Realization of Personalized Medicine through Crowdsourcing the Quantified Self, and the Participatory Biocitizen. Journal of Personal Medicine, 2(3), 93-118. doi:10.3390/jpm2030093.

    Google Scholar 

  • Swan, M. (2013). The quantified self: fundamental disruption in big data science and biological discovery. Big Data, 1(2), 85-99. doi:10.1089/big.2012.0002.

    Google Scholar 

  • Templeman, R., Korayem, M., Crandall, D., & Kapadia, A. (2014). PlaceAvoider: Steering First-Person Cameras away from Sensitive Spaces. NDSS’14: Proceedings of the 21st Annual Network and Distributed System Security Symposium, Internet Society. http://www.internetsociety.org/doc/placeavoider-steering-first-person-cameras-away-sensitive-spaces.

  • Tsai, A. G., & Wadden, T. A. (2005). Systematic review: an evaluation of major commercial weight loss programs in the United States. Annuals of Internal Medicine, 142(1), 56-66. doi:10.7326/0003-4819-142-1-200501040-00012.

    Google Scholar 

  • Warburton, D. E. R., Nicol, C. W., & Bredin, S. S. D. (2006). Health benefits of physical activity: the evidence. Canadian Medical Association Journal, 174(6), 801-809. doi:10.1503/cmaj.051351.

    Google Scholar 

  • White, R., & Horvitz, E. (2008). Cyberchondria: Studies of the Escalation of Medical Concerns in Web Search. Microsoft Research. http://research.microsoft.com/pubs/76529/TR-2008-178.pdf. Accessed 17 March 2015.

  • Wicks, P., Massagli, M., Frost, J., Brownstein, C., Okun, S., Vaughan, T., Bradley, R., & Heywood, J. (2010). Sharing Health Data for Better Outcomes on PatientsLikeMe. Journal of Medical Internet Research, 12(2), e19. doi:10.2196/jmir.1549.

    Google Scholar 

  • Wolf, G. (2010a, May 2). The Data-Driven Life. The New York Times, p. MM38. http://www.nytimes.com/2010/05/02/magazine/02self-measurement-t.html?pagewanted=all&_r=0.Accessed 17 March 2015.

  • Wolf, G. (2010b). The quantified self. TED talk. http://www.ted.com/talks/gary_wolf_the_quantified_self. Accessed 17 March 2015.

  • Wu, B., Chen, J., Wu, J., & Cardei, M. (2007). A survey of attacks and countermeasures in mobile ad hoc networks. In Y. Xiao, X.S. Shen, & D.-Z. Du (Eds.), Wireless Network Security, Signals and Communication Technology (pp. 103-135). New York: Springer US.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Na Li .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer Fachmedien Wiesbaden

About this chapter

Cite this chapter

Li, N., Hopfgartner, F. (2016). To Log or Not to Log? SWOT Analysis of Self-Tracking. In: Selke, S. (eds) Lifelogging. Springer VS, Wiesbaden. https://doi.org/10.1007/978-3-658-13137-1_17

Download citation

  • DOI: https://doi.org/10.1007/978-3-658-13137-1_17

  • Published:

  • Publisher Name: Springer VS, Wiesbaden

  • Print ISBN: 978-3-658-13136-4

  • Online ISBN: 978-3-658-13137-1

  • eBook Packages: Social SciencesSocial Sciences (R0)

Publish with us

Policies and ethics