Ethical Use of Lifelogging Data for Research: Perceived Value and Privacy Concerns of Wearable Camera Users


  • Ayoung Yoon Assistant Professor, Department of Library and Information Science, Indiana University Purdue University Indianapolis (IUPUI),
  • Kyle M.L. Jones Assistant Professor, Department of Library and Information Science, Indiana University Purdue University Indianapolis (IUPUI),
  • Lydia Spotts MLS Adjunct Lecturer, Department of Library and Information Science, Indiana University Purdue University Indianapolis (IUPUI),



lifelogging data, data reuse, ethics, value of data


Video data generated from wearable cameras is now available online, as the concept of “lifelogging” has been introduced to many citizens due to the spread of wearable camera equipment. Usually, these wearable cameras automatically capture images or record videos from a first-person point of view; they collect a new form of information that cannot be captured through other means. Citizen data Harvest in Motion Everywhere (CHIME) project pays close attention to the value of this new type of resource, particularly regarding the video data that cyclists record using wearable cameras over a long period of time. These contextually rich data capture community members’ infrastructure experiences and interactions with other transit modes, as well as environmental changes. If curated and made publicly accessible, there is great potential for various stakeholders, including public historians, researchers, city planners, and citizens, to use the data. However, making these videos open to the public and to researchers raises ethics issues, as the data include sensitive, location-based information that may intrude into private lives. Additionally, the videos include the accidental collection of data from secondary participants (bystanders). In this paper, we will describe the potential value of citizen-generated video data using the CHIME project example and discuss the privacy and ethical considerations related to the use of this type of data for scientific and citizen research.


Al-Muhtadi, J., Ranganathan, A., Campbell, R., & Mickunas, M. D. (2003). Cerberus: A context-aware security scheme for smart spaces. Proceedings of the First IEEE International Conference on Pervasive Computing and Communications, 489. Washington, DC: IEEE Computer Society. Retrieved from

Altman, I. (1977). Privacy regulation: Culturally universal or culturally specific? Journal of Social Issues, 33(3), 66–84.

Bernard, R. (2000). Social Research Methods: Qualitative and Quantitative Approach. Sage Publication Ltd. Thousand Oaks, CA.

Bowser, A., & Wiggins, A. (2015). Privacy in participatory research: Advancing policy to support human computation. Human Computation, 2(1), 19–44. 3

Cavoukian, A. (2014). Privacy by design. IEEE Technology and Society Magazine, 31(4), 18-19. doi: 10.1109/MTS.2012.2225459

Chaudhari, J., Cheung, S. S., & Venkatesh, M. V. (2007). Privacy protection for life-log video. 2007 IEEE Workshop on Signal Processing Applications for Public Security and Forensics, 1–5.

Cheng, W. C., Golubchik, L., & Kay, D. G. (2004). Total recall: Are privacy changes inevitable? Proceedings of the the 1st ACM Workshop on Continuous Archival and Retrieval of Personal Experiences, 86–92. New York, NY: ACM.

Cunningham, A. (1994). The archival management of personal records in electronic form: Some suggestions. Archives and Manuscripts, 22(1), 94–105.

Denning, T., Dehlawi, Z., & Kohno, T. (2014). In situ with bystanders of augmented reality glasses: Perspectives on recording and privacy-mediating technologies. Proceedings of the 32Nd Annual ACM Conference on Human Factors in Computing Systems, 2377–2386. New York, NY: ACM.

Eagle, N., & Pentland, A. (2009). Eigenbehaviors: Identifying structure in routine. Behavioral Ecology and Sociobiology, 63(7), 1057–1066.

Hoyle, R., Templeman, R., Armes, S., Anthony, D., Crandall, D., & Kapadia, A. (2014). Privacy behaviors of lifeloggers using wearable cameras. Proceedings of the 2014 ACM International Joint Conference on Pervasive and Ubiquitous Computing, 571–582. New York, NY,: ACM.

Indianapolis Cultural Trail. (2017). About. Retrieved from

Indianapolis Pacers Bikeshare. (2015). About. Retrieved from Indy Parks & Recreation & Dept. of Public Works. (2014). Indy Greenways Full Circle Master Plan, 2013-2023. Retrieved from

Jana, S., Narayanan, A., & Shmatikov, V. (2013). A scanner darkly: Protecting user privacy from perceptual applications. 2013 IEEE Symposium on Security and Privacy, 349–363.

Kärkkäinen, T., Vaittinen, T., & Väänänen-Vainio-Mattila, K. (2010). I don’t mind being logged, but want to remain in control: A field study of mobile activity and context logging. Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, 163–172. New York, NY: ACM.

Kaye, J. “Jofish,” Vertesi, J., Avery, S., Dafoe, A., David, S., Onaga, L., … Pinch, T. (2006). To have and to hold: Exploring the personal archive. Proceedings of the SIGCHI Conference on Human Factors in Computing System, 275–284. New York, NY: ACM.

Kelly, P., Marshall, S. J., Badland, H., Kerr, J., Oliver, M., Doherty, A. R., & Foster, C. (2013). An ethical framework for automated, wearable cameras in health behavior research. American Journal of Preventive Medicine, 44(3), 314–319.

Kupfer, J. (1987). Privacy, autonomy, and self-concept. American Philosophical Quarterly, 24(1), 81-89. Retrieved from

Mann, S. (1997). Wearable computing: A first step toward personal imaging. Computer, 30(2), 25–32.

McKemmish, S. (1996). Evidence of me . . . Archives and Manuscripts, 24(1), 28–45.

Motti, V. G., & Caine, K. (2015). Users’ privacy concerns about wearables. In M. Brenner, N. Christin, B. Johnson, & K. Rohloff (Eds.), Financial Cryptography and Data Security (pp. 231–244). Berlin: Springer-Verlag Berlin Heidelberg.

Nissenbaum, H. (2010). Privacy in context: Technology, policy, and the integrity of social life. Stanford, CA: Stanford Law Books.

Pucher, J., Buehler, R., & Seinen, M. (2011). Bicycling renaissance in North America? An update and re-appraisal of cycling trends and policies. Transportation Research Part A, 45, 451–475.

Pucher, J., & Renne, J. (2003). Socioeconomics of urban travel: Evidence from the 2001 NHTS. Transportation Quarterly, 57, 49–77.

Rawassizadeh, R. (2012). Towards sharing life-log information with society. Behaviour & Information Technology, 31(11), 1057–1067.

Richards, N. M., & King, J. H. (2014). Big data ethics. Wake Forest Law Review, 49, 393–432.

Savage, N. (2012). Gaining wisdom from crowds. Communications of the ACM, 55, 13. doi:10.1145/2093548.2093553

Schaar, P. (2010). Privacy by design. Identity in the Information Society, 3(2), 267-274. doi:10.1007/s12394-010-0055-x

Shilton, K., Burke, J. A., Estrin, D., Govindan, R., Hansen, M., Kang, J., & Mun, M. (2009). Designing the personal data stream: Enabling participatory privacy in mobile personal sensing. Center for Embedded Network Sensing. Retrieved from

Simmons, A. (2014, March 4). In Indianapolis, a bike path to progress. The New York Times. Retrieved from

Solove, D. J. (2013). Introduction: Privacy self-management and the consent dilemma. Harvard Law Review, 126, 1880–1903. Retrieved from

Sullivan, B.L., Wood, C.L., Iliff, M.J., Bonney, R.E., Fink, D., & Kelling, S. (2009). eBird: A citizen-based bird observation network in the biological sciences. Biological Conservation, 142 (10), 2282–2292. doi:10.1016/j.biocon.2009.05.006

Templeman, R., Korayem, M., Crandall, D., & Kapadia, A. (2014). PlaceAvoider: Steering first-person cameras away from sensitive spaces. Proceedings from NDSS Symposium 2014. San Diego, CA: NDSS. Retrieved from

Tene, O., & Polonetsky, J. (2012). Privacy in the age of big data: A time for big decisions. Stanford Law Review Online, 64. Retrieved from

Toch, E., Cranshaw, J., Hankes-Drielsma, P., Springfield, J., Kelley, P. G., Cranor, L., … Sadeh, N. (2010). Locaccino: A privacy-centric location sharing application. Proceedings of the 12th ACM International Conference Adjunct Papers on Ubiquitous Computing - Adjunct, 381–382. New York, NY: ACM.

Tuohy, J. (2015, April 16). 1 year and 100,000 rides later, Indy bike-share program thrives. Retrieved from

Wang, Y., Leon, P. G., Scott, K., Chen, X., Acquisti, A., & Cranor, L. F. (2013). Privacy nudges for social media: An exploratory Facebook study. Proceedings of the 22nd International Conference on World Wide Web, 763–770. New York, NY: ACM.

Whittaker, S., & Hirschberg, J. (2001). The character, value, and management of personal paper archives. ACM Transactions on Computer-Human Interaction (TOCHI), 8, 150–170.

Wolf, K., Schmidt, A., Bexheti, A., & Langheinrich, M. (2014). Lifelogging: You’re wearing a camera? IEEE Pervasive Computing, 13(3), 8–12.

Yoon, A. (2013). Defining what matters when preserving web-based personal digital collections: Listening to bloggers. International Journal of Digital Curation, 8(1), 173–192.

Zimmermann, C., Accorsi, R., & Müller, G. (2014). Privacy dashboards: Reconciling data-driven business models and privacy. Paper presented at the Ninth International Conference on Availability, Reliability and Security (ARES), Fribourg, Switzerland. doi: 10.1109/ARES.2014.27





Yoon, A., Jones, K. M., & Spotts, L. (2017). Ethical Use of Lifelogging Data for Research: Perceived Value and Privacy Concerns of Wearable Camera Users. Nordisk Tidsskrift for Informationsvidenskab Og Kulturformidling, 6(1), 32–44.