A typical person today usually has dataa on several devices and in a number of commercial systems that function as data traps where it is easy to check in information and difficult to remove it or sometimes to simply access it. It is also difficult, sometimes impossible, to control data access by other parties. One might consider this an unavoidable price to pay in order to fully take advantage of the ever-increasing amount of available information. However, this situation is not only unsatisfactory because it requires users to trade privacy against convenience but also, because it limits the value we, as individuals and as a society, can derive from the data.
We live in a world where data is considered a vital asset and where most people consider they have little, if any, control over their personal data. This is surely detrimental to trust, innovation, and growth. In this world, we are also limited in leveraging all this existing information because it resides in isolated silos kept apart by technical incompatibilities, semantic fuzziness, organizational barriers, as well as privacy regulations. The situation gets worse as the number of data sources keeps growing.
Of course, users could choose to delegate all their information to a single company (some companies clearly dream of offering all the spectrum of information services). This would definitely make the users' lives easier in the short run, but this would also make them totally dependent of that company. Although this is debatable, we will assume that, given a choice, most users would prefer to avoid such a solution.
Another possibility is to ask users to spend a few years of their lives studying to become computer wizards. We can safely assume this is not what a large portion of the population craves. Is there another option? We believe there is one: the personal information management system (PIMS).
To understand the notion of personal information management system, we must consider today's context. Why do users "entrust" their data to services proposed by companies such as Google or Facebook? Because they enjoy using these services. Now, there are two facets to these services: they are supported by software with useful features, and they are executed on machines that are not managed by the user. What if we could separate these two facets? On one hand, a particular user would select, for each service, the best software developer or service provider that suits his or her needs. On the other hand, this user would choose a server where all these applications would run. This would therefore bring together, on a personal server, all this user's favorite applications and all the user's data that is currently distributed, fragmented, and isolated.
This is what a PIMS does. It may look like utopia. As we will see, it is not.
The PIMS system consists of a user's server, running the services selected by the user, storing and processing the user's data:
Many different settings are possible. We do not need to specify a particular one. The user may own the server, or pay for a hosted server. The server may be a physical or a virtual machine. It may be physically located in the user's home (for example, a TV box) or not. It may run on a single machine or be distributed among several machines.
The PIMS centralizes the user's personal information. It is a digital home. The PIMS is also able to exert control over information that resides in external services (for example, Facebook), and that only gets replicated inside the PIMS. These services' business models are based on our personal data, and PIMS will not prevent them from working in this way, so long as their customers agree; however, they will need to share their data with their users, who may want to use the data with competing platforms, or for whatever makes sense to them. PIMS do not prevent data sharing, they prevent unilateral data hoarding. The PIMS software provides the necessary support so the user always has access to his or her information and controls (to the extent this is possible) how information is accessed by the applications.
People have had relatively little concern so far about where their personal data goes, but this is changing for a number of reasons.
By centralizing access to an individual's information, the PIMS enables very useful new services that combine information from a wide variety of sourcesthose same silos that were prevented from collaborating together in an organizations-centric worldunder the user's control and to serve his or her needs.
Is the PIMS a security risk? Of course, one could answer it is difficult to be more risky than today's large, interconnected corporate databases containing data about millions of customers, but this is hardly a comforting answer. A possible weakness is that PIMS security seems to rest on end users when individuals have repeatedly proved to be either disinclined or unable to apply even the minimal effort toward securing their systems. However:
Also, in a properly designed PIMS, each collection of user data is strongly isolated from that of others. So, in case security has been compromised, it has been so for a single user. Pirates will therefore be more attracted to other systems with lots of data and many users to attack.
PIMS will not resolve the security issues for protecting users' data. However, by providing a single entry point for specifying security/privacy rules, and with the support of the PIMS carefully designed with security in mind, we believe this model puts us in a better position to provide security as well as privacy to users.
Another main issue for regular users is clearly the management of their PIMS. This is where the cloud turns out to be essential. With the cloud, it is possible to have a company host the system for the users. (The user is a paying customer of that company and a contract protects the data privacy.)
This may be observed from three different angles: society, technology, and industry.
Society is ready to move. People have had relatively little concern so far about where their personal data goes, but this is changing for a number of reasons:
As a result, a series of initiatives are converging toward giving individual users not only more control over how others gather and use their personal data, but more power to actually own and use this data to their own ends. These initiatives fall into several categories:
These expectations have also recently led to important personal data disclosure initiatives, such as Smart Disclosure in the U.S. (where more than 40 million Americans can currently download and use their health data by using the same "Blue Button" on their health insurance provider's website), MiData in the U.K., and MesInfosf in France.
Technology is gearing up. Some people already use their own PIMS. They run a home server or rent a hosted server (in a 2013 market test, the French Web hosting company OVH rented 15,000 low-cost personal servers in just 10 days). They have at their disposal some rather primitive functionality, typically by developing scripts. A limiting factor is that, in order to use existing services, they have no choice but to relinquish some control over their data. For instance, if they want to partake in the social Web, they must trust their data to Facebook or others. However, by devoting time and effort and subject to these limitations, they can manage their own data and services to some extent.
This is not for everyone, though. One needs to be highly skilled and willing to devote a lot of time in order to achieve such a result today. But things are changing rapidly:
Research in PIMS is also increasingly active.g A number of prototypes have been developed for storing and retrieving personal data: Lifestreams, Stuff-I've-Seen, Haystack, MyLifeBits, Connections, Seetrieve, Personal Dataspaces, or deskWeb. The tipping point appears close as indicated by a number of projects such as Mailpile (for mail), Lima (for Dropbox-like service hosted at home), Synologie or Iomega (personal NAS), SAMI of Samsung (personal data store), and a number of self-host PIMS such as YounoHost, Amahi, ArkOS, OwnCloud, or Cozy Cloud.
Large companies are getting in. PIMS also act as magnets to large companies, and in particular:
We are all experiencing a loss of control over our personal data. With PIMS, we can regain control.
PIMS should also be of interest to pure Internet players. Some of them (for example, Amazon), have a great amount of know-how in providing data services. They could seamlessly move to this new business. Others (for example, Facebook), centered on the management of information, cannot let such a wide field of information management grow without becoming involved. However, PIMS, as defined here, are very far from these companies' indirect business models based on personalized advertisement. So moving in this new market would require a major change for them, and in particular, the clarification of the relationship with users (represented by the PIMS) with respect to personal data monetization.
For users, perhaps the main reason to move to PIMS is these systems enable great new functionalities. Building on the integration of the user's data, PIMS can provide:
Online services have become an essential part of our daily life. However, because of them, we are all experiencing a loss of control over our personal data. With PIMS, we can regain control. PIMS also enable a wide range of new functionalities. They point toward a new, powerful, yet more balanced way of creating user value as well as business value. They achieve all this without giving up on ubiquity, ease of use, or security. For these reasons, we believe their benefits are so clear that PIMS will be adopted massively in a near future. What remains to be seen is what shape this evolution will take, and how it will alter the relationships between new "personal cloud" players, home appliance and electronics providers, established online platforms, and current personal data holders.
Will we continue to move toward an Internet dominated by oligopolies, user profiling, and generalized surveillance? Will our lack of control over our data increasingly turn us into passive products of a global digital economy? PIMS may be the alternative to such an outcome.
2. World Economic Forum. Personal Data: The Emergence of a New Asset Class (2011); http://www.weforum.org/reports/personal-data-emergence-newasset-class.
a. Data that we publish (for example, pictures), produce (for example, contacts), co-produce socially (for example, in social networks), data that organizations produce about us (for example, banks, public administrations), data about us captured by sensors (for example, GPS), and so forth.
b. As an example, see GFK Survey on Data Privacy and Trust, 2014: http://www.gfk.com/trustsurvey/.
f. MesInfos is a personal data disclosure experiment where several large companies (network operators, banks, retailers, insurers...) have agreed to share with a panel of customers the personal data they hold about them.
The Digital Library is published by the Association for Computing Machinery. Copyright © 2015 ACM, Inc.
No entries found