skip to main content
Skip header Section
Delete: The Virtue of Forgetting in the Digital AgeJuly 2011
Publisher:
  • Princeton University Press
  • 41 William St. Princeton, NJ
  • United States
ISBN:978-0-691-15036-9
Published:25 July 2011
Pages:
272
Skip Bibliometrics Section
Bibliometrics
Skip Abstract Section
Abstract

Delete looks at the surprising phenomenon of perfect remembering in the digital age, and reveals why we must reintroduce our capacity to forget. Digital technology empowers us as never before, yet it has unforeseen consequences as well. Potentially humiliating content on Facebook is enshrined in cyberspace for future employers to see. Google remembers everything we've searched for and when. The digital realm remembers what is sometimes better forgotten, and this has profound implications for us all. In Delete, Viktor Mayer-Schnberger traces the important role that forgetting has played throughout human history, from the ability to make sound decisions unencumbered by the past to the possibility of second chances. The written word made it possible for humans to remember across generations and time, yet now digital technology and global networks are overriding our natural ability to forget--the past is ever present, ready to be called up at the click of a mouse. Mayer-Schnberger examines the technology that's facilitating the end of forgetting--digitization, cheap storage and easy retrieval, global access, and increasingly powerful software--and describes the dangers of everlasting digital memory, whether it's outdated information taken out of context or compromising photos the Web won't let us forget. He explains why information privacy rights and other fixes can't help us, and proposes an ingeniously simple solution--expiration dates on information--that may. Delete is an eye-opening book that will help us remember how to forget in the digital age.

Cited By

  1. ACM
    Barnett S, Brand N, Odom W and Andres K Exploring Data Intermediaries as Infrastructure for a Human-Centric Data Economy: Speculations & Critical Reflections Nordic Human-Computer Interaction Conference, (1-20)
  2. ACM
    Kim H, Kim H, Kim J and Jang J (2022). When Does it Become Harassment?, Proceedings of the ACM on Human-Computer Interaction, 6:CSCW2, (1-32), Online publication date: 7-Nov-2022.
  3. Ma X, Qin Y, Chen Z and Cho H (2022). Perceived ephemerality, privacy calculus, and the privacy settings of an ephemeral social media site, Computers in Human Behavior, 124:C, Online publication date: 1-Nov-2021.
  4. ACM
    Luria M and Foulds N Hashtag-Forget: Using Social Media Ephemerality to Support Evolving Identities Extended Abstracts of the 2021 CHI Conference on Human Factors in Computing Systems, (1-5)
  5. ACM
    Mangini V, Tal I and Moldovan A An empirical study on the impact of GDPR and right to be forgotten - organisations and users perspective Proceedings of the 15th International Conference on Availability, Reliability and Security, (1-9)
  6. ACM
    Huang X, Vitak J and Tausczik Y "You Don't Have To Know My Past": How WeChat Moments Users Manage Their Evolving Self-Presentation Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems, (1-13)
  7. ACM
    Mohamed R, Chametka P and Chiasson S The Influence of Decaying the Representation of Older Social Media Content on Simulated Hiring Decisions Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems, (1-19)
  8. ACM
    M. Vogl T Artificial Intelligence and Organizational Memory in Government The 21st Annual International Conference on Digital Government Research, (223-231)
  9. Laifa M, Giglou R, Samir A and Maamri R (2018). Forgiveness Predictors and Trust in a Digital Age, International Journal of Technology and Human Interaction, 14:4, (23-42), Online publication date: 1-Oct-2018.
  10. Mohamed R and Chiasson S Online privacy and aging of digital artifacts Proceedings of the Fourteenth USENIX Conference on Usable Privacy and Security, (177-195)
  11. Murillo A, Kramm A, Schnorf S and De Luca A "If I press delete, it's gone" Proceedings of the Fourteenth USENIX Conference on Usable Privacy and Security, (329-339)
  12. ACM
    Amjad G, Mirza M and Pöpper C Forgetting with Puzzles Proceedings of the Eighth ACM Conference on Data and Application Security and Privacy, (342-353)
  13. ACM
    Mohamed R, Idalino T and Chiasson S When private and professional lives meet Proceedings of the 8th International Conference on Social Media & Society, (1-5)
  14. ACM
    Cavalcanti L, Pinto A, Brubaker J and Dombrowski L Media, Meaning, and Context Loss in Ephemeral Communication Platforms Proceedings of the 2017 ACM Conference on Computer Supported Cooperative Work and Social Computing, (1934-1945)
  15. Muralidharan S, Roy A and Saxena N (2016). An Exhaustive Review on Internet of Things from Korea's Perspective, Wireless Personal Communications: An International Journal, 90:3, (1463-1486), Online publication date: 1-Oct-2016.
  16. ACM
    Xu B, Chang P, Welker C, Bazarova N and Cosley D Automatic Archiving versus Default Deletion Proceedings of the 19th ACM Conference on Computer-Supported Cooperative Work & Social Computing, (1662-1675)
  17. ACM
    Ramos L, van den Hoven E and Miller L Designing for the Other 'Hereafter' Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems, (721-732)
  18. Barker K Privacy Protection or Data Value Proceedings of the 4th International Conference on Big Data Analytics - Volume 9498, (3-20)
  19. ACM
    Gulotta R, Sciuto A, Kelliher A and Forlizzi J Curatorial Agents Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems, (3453-3462)
  20. ACM
    Rosner D, Roccetti M and Marfia G (2014). The digitization of cultural practices, Communications of the ACM, 57:6, (82-87), Online publication date: 1-Jun-2014.
  21. ACM
    Dong T, Newman M and Ackerman M (2014). House memory, Interactions, 21:5, (70-73), Online publication date: 1-Sep-2014.
  22. ACM
    Gulotta R, Odom W, Faste H and Forlizzi J Legacy in the age of the internet Proceedings of the 2014 conference on Designing interactive systems, (975-984)
  23. ACM
    Dong T, Ackerman M and Newman M "If these walls could talk" Proceedings of the 2014 conference on Designing interactive systems, (63-72)
  24. ACM
    Shein E (2013). Ephemeral data, Communications of the ACM, 56:9, (20-22), Online publication date: 1-Sep-2013.
  25. Riesner M, Netter M and Pernul G (2013). Analyzing settings for social identity management on Social Networking Sites, Information Security Tech. Report, 17:4, (185-198), Online publication date: 1-May-2013.
  26. ACM
    Odom W, Sellen A, Harper R and Thereska E Lost in translation Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, (781-790)
Contributors
  • Oxford Social Sciences Division

Recommendations