<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Learning from Human Memory: Managed Forgetting and Contextualized Remembering for Digital Memories</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Claudia Nieder´ee</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Leibniz Universita ̈t Hannover / Forschungszentrum L3S 30167 Hannover</institution>
          ,
          <country country="DE">Germany</country>
        </aff>
      </contrib-group>
      <pub-date>
        <year>2015</year>
      </pub-date>
      <abstract>
        <p>In the human brain, forgetting is a very effective way of focusing on the important things, while unstressing irrelevant details. In the ForgetIT project, we use forgetting and other processes in the human brain - such as the context-driven reconstruction of memories - as an inspiration for creating intelligent methods for joint information and preservation management. In this paper, we present selected results of the ForgetIT project with a special focus on the concept of managed forgetting in digital memories and on personal preservation.</p>
      </abstract>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>Introduction</title>
      <p>The fast growing amount of personal content such as photos, social media posts,
and emails, created, collected and shared today, raise the question on what
should happen with this content in the long run. With the decrease of
storage prices and the availability of cloud storage services, storage itself is not the
core problem, here. However, we face two major risks for long-term information
management in the personal setting: Accidental ”Digital forgetting”, e.g., by
hard-disk crashes and technology obsoleteness creates random information loss.
Furthermore, the mere size of, for example, accumulated personal photo
collections creates the risk of practically creating personal ”dark archives”, which
are rarely revisited again. Therefore, alternatives are required to the
dominating keep-it-all approach, which make digital memories and archives, especially
personal ones, manageable, durable, and enjoyable, again.</p>
      <p>While preservation technologies are meanwhile well-established in memory
institutions, adequate approaches and best practices for preservation in the
personal setting are still in their infancy. In this paper we present results of the
European project ForgetIT, which investigates intelligent preservation solutions
for personal and organizational settings. Work in the project leverages methods
learned from the human brain such as forgetting and reconstruction of
memories, for developing a forgetful approach to preservation, which bridges the gap
between information and preservation management, creates immediate benefit,
supports the user in what to select for preservation, and eases interpretation,
when revisiting archived content (contextualized remembering ). In more detail,
we present the reference model and the architecture developed in the project, as
well as our approach for managed forgetting. We conclude with our vision of a
joint model of forgetful human and digital memory.
2
2</p>
    </sec>
    <sec id="sec-2">
      <title>ForgetIT: A Forgetful Approach</title>
      <p>A major roadblock for a wider adoption of preservation solutions in personal
and organizational settings is the gap between the preservation system
responsible for the long-term information management and the ”Active System”, i.e.,
the system, where information, which is in active use, is managed. This can
for example be a content management system or a solution used for personal
information management.</p>
      <p>Therefore, the goal of the approach followed in the ForgetIT project is to
better bridge between such an Active System and the Preservation System. This
is done by creating a mediating middle layer for reducing the gap between those
systems as well as by creating immediate benefit from the adoption of a joint
information and preservation management system.</p>
      <p>Core contributions for this approach, which have been developed in the
ForgetIT project are the Preserve-or-Forget (PoF) Reference Model and the PoF
Architecture described below. The purpose of the reference model is to serve as
a basis for further discussion of the forgetful approach and as a starting point
for realizing joint information and preservation management systems that follow
a forgetful approach. The PoF architecture underlies the implementation of the
forgetful approach in the ForgetIT project and is used both to guide and validate
the reference model in an iterative approach.
2.1</p>
      <sec id="sec-2-1">
        <title>The PoF Reference Model</title>
        <p>
          The design of the reference model is driven by five desirable characteristics for
such a system[
          <xref ref-type="bibr" rid="ref1">1</xref>
          ]: It should be value-driven, forgetful, brain-inspired, integrative,
and evolution-aware.
        </p>
        <p>A first version of the reference model, which has been developed in the
project, distinguishes three layers. The Core Layer introduces the core
processes (a) for Preservation Preparation, which handles the transition between
active system and preservation system and (b) for Re-activation, which handles
bringing back the content into an active environment in a meaningful way, even
if a longer time has passed since content archival. The core layer only includes
the core functionality of basic connectivity.</p>
        <p>Subsequently, those processes are extended in the second layer, the Remember
and Forget Layer of the reference model. In more detail, this layer introduces
ideas of managed forgetting and contextualized remembering into the
Preservation Preparation and the Re-activation processes. This includes information
value assessment and managed forgetting functionality, which help to decide,
what to preserve as well as functionality for enriching content with context
information, such that it can be more easily interpreted, when it is re-activated at
a later point in time.</p>
        <p>Finally, the third layer, the Evolution Layer, introduces three more processes
for monitoring and reacting to evolution in the joint information and
preservation management system. Those three processes refer to (a) evolution in the
3
active system, especially in its knowledge structuring (Situation Change
processes), (b) to changes in the practices and technology, i.e., more traditional
preservation tasks (Setting Change Processes) and (c) to changes in the overall
system architecture (System Change Processes) such as exchange of the Active
System or the Preservation System, respectively.</p>
        <p>Along those processes functional entities have been identified, which are
required for implementing the respective processes on the three identified layers.
The layering structures the reference model and enables different levels of
conformity for systems, which implement the reference model.
2.2</p>
      </sec>
      <sec id="sec-2-2">
        <title>The PoF Architecture</title>
        <p>
          In the ForgetIT project, an architecture for the PoF Middleware, which
connects the Active System and the Preservation System has been developed and
implemented. Figure 1 b) shows a high level overview of the architecture. In a
nutshell, the PoF Middleware consists of six main components:
– The Navigator manages information access in the joint information space
composed from the Active System and the Preservation System. In its search
functionality, it takes into account information decay and differences of
importance of content objects (see managed forgetting).
– The Forgettor implements the managed forgetting functions described in
section 3. For this purposes it collects evidences from the Active system,
e.g., information about usage pattern.
– The Condensator supports forgetting actions by providing methods for
summarizing and condensation of content objects and content collections.
4
– The Contextualizer adds the required context information to objects to be
archived, in order to ensure their long-term interpretation. It also
manages context evolution and re-contextualization into the current (typically
changed) context, when archived content is brought back into active use. In
addition, methods for re-contextualization [
          <xref ref-type="bibr" rid="ref2">2</xref>
          ] are developed in the project,
i.e., methods for a-posteriori adding more context to older content objects.
– The Collector/Archiver is responsible for the bi-directional transfer of
resources between the Active System and the Preservation System.
– The Context-aware Preservation Manager is a metalevel component, which
monitors and manages the interaction between the active system and the
preservation system, e.g. the frequency of formats of the resources exchanged.
3
        </p>
      </sec>
    </sec>
    <sec id="sec-3">
      <title>Managed Forgetting</title>
      <p>
        Managed Forgetting is the core ingredient of our forgetful approach [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ]. It is
inspired by the effectiveness of human forgetting in focusing on the import things,
while forgetting irrelevant details. The idea here is to learn from human
forgetting and remembering, while not copying it. Rather, it is desirable to complement
human forgetting.
      </p>
      <p>In more practical terms managed forgetting is composed from methods for
information value assessment and from forgetting actions. Taking into account
the goal of creating immediate benefit, we consider short-term as well as
longterm information value, both imposing different challenges.</p>
      <p>
        Short-term value, which we call memory buoyancy 1, has to quickly adapt to
changing needs and interests, taking into account usage pattern, information
decay inspired by forgetting functions [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ], and spreading of activation via semantic
networks [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ]. For creating immediate benefit memory buoyancy can, for
example, be used to declutter the desktop or for query result re-ranking as forgetting
actions.
      </p>
      <p>
        In contrast, long-term information value, which we call preservation value,
”reflects the expected value of a resource for the future”[
        <xref ref-type="bibr" rid="ref1">1</xref>
        ]. It is used to decide,
how much to invest into the preservation of a resource and if it is to be preserved
at all. This task is related to appraisal in the archival domain [
        <xref ref-type="bibr" rid="ref6 ref7">6, 7</xref>
        ].
      </p>
      <p>
        The prediction of future usefulness of a resource is a challenging task,
especially, when thinking about long-term storage. For developing a better
understanding of the factors driving long-term preservation decisions, we performed
studies and experiments for different types of content in personal information
management [
        <xref ref-type="bibr" rid="ref10 ref3 ref8 ref9">8–10, 3</xref>
        ].
      </p>
      <p>
        A special focus has been on photo selection for preservation due to the high
importance of photo collections for personal preservation settings. In addition to
studies on users’ keep or delete decisions [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ], we have also developed methods for
semi-automatic photo selection based on preservation value computation from a
wide variety of factors [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ]. We followed a novel approach, which focuses on user
1 The name memory buoyancy is inspired by the idea that information sinks away
from the user with decreasing buoyancy (i.e., importance).
5
expectation, exploits advanced concept detection and does not expect manual
effort by the user for photo annotation. In contrast to many other works in photo
selection (e.g. [
        <xref ref-type="bibr" rid="ref11 ref12">11, 12</xref>
        ]), we, furthermore, unstress the role of coverage as a major
selection factor. For the novel task of photo selection for preservation we have
achieved a major improvement of selection performance with this approach [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ].
4
      </p>
    </sec>
    <sec id="sec-4">
      <title>Vision: Joint model of Human and Digital Forgetting</title>
      <p>
        The concept of complementing human memory has already been discussed above.
Going a step beyond, human and digital memory can be modeled as a joint
system, as it is shown in Figure 1 a) (from [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ]): On the left hand site, core
processes of remembering and forgetting in the human memory are depicted
(following [
        <xref ref-type="bibr" rid="ref13">13</xref>
        ]). Several types of memory are distinguished. The verbal short
term memory (things just heard) and the visual short term memory (things
just seen) together with the currently activated episodic and semantic memory
form the human working memory, i.e., the memory used for current activities
and tasks. Knowledge is activated on demand from the semantic and episodic
memory according to current needs via the so-called executive functions. This
activation is - amongst other factors - triggered by human perception. However,
perceived signals are first interpreted using things already known (for making
sense out of them), before they become part of the verbal or visual short term
memory. The other types of memory episodic memory and semantic memory are
responsible for different aspects of mid- and long-term-memory.
      </p>
      <p>In the digital memory (right-hand site) we also distinguish working memory,
i.e., digital content, which is important for current tasks and interests from
Information Management for Re-use, which targets information management for
a mid-term time perspective. Similar to the executive function in the human
brain, we foresee managed forgetting functions for the transition between
working memory and mid-term memory. Such functions might, for example, decide,
which information to keep on your mobile device and which information to put
on a server or in a cloud storage system. As discussed above, managed forgetting
functions are also used for controlling the transfer of information into long-term
storage (Archival and Preservation), together with functions for enriching the
content with context information.</p>
      <p>In an envisioned joint model, both types of memory together form a type
of virtual memory. In this context, the interactions between the two types of
memory have to be considered as well. A first set of interactions are already
shown in the figure such as the human conceptualization of the world reflected
in information structuring and the digital memory supporting the human in not
forgetting important things.</p>
      <p>However, this joint model still requires further investigation, since it is
expected that there is also a strong mutual influence between the two types of
memory. For example, the digital memory system available will influence the
type of information, which is memorized by the human, as it can be observed
with the end of memorizing phone numbers triggered by the introduction of
more intelligent phones.</p>
      <p>In the optimal case, these mutual and evolving influences should be
incorporated in the joint model and in the design of adaptive memory systems, which
ideally support and foster the human brain on concentrating on the really
important things that cannot be taken over by a digital system.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          1. Nieder´ee,
          <string-name>
            <given-names>C.</given-names>
            ,
            <surname>Kanhabua</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            ,
            <surname>Gallo</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            ,
            <surname>Logie</surname>
          </string-name>
          ,
          <string-name>
            <surname>R.H.</surname>
          </string-name>
          :
          <article-title>Forgetful digital memory: Towards brain-inspired long-term data and information management</article-title>
          .
          <source>SIGMOD Rec</source>
          .
          <volume>44</volume>
          (
          <issue>2</issue>
          ) (
          <year>August 2015</year>
          )
          <fpage>41</fpage>
          -
          <lpage>46</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          2.
          <string-name>
            <surname>Tran</surname>
            ,
            <given-names>N.K.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Ceroni</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kanhabua</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Nieder</surname>
          </string-name>
          ´ee, C.:
          <article-title>Back to the past: Supporting interpretations of forgotten stories by time-aware re-contextualization</article-title>
          .
          <source>In: Proceedings of International Conference on Web Search and Data Mining</source>
          . WSDM '
          <volume>15</volume>
          (
          <year>2015</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          3.
          <string-name>
            <surname>Kanhabua</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Nieder</surname>
            ´ee,
            <given-names>C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Siberski</surname>
            ,
            <given-names>W.</given-names>
          </string-name>
          :
          <article-title>Towards concise preservation by managed forgetting: Research issues and case study</article-title>
          .
          <source>In: Proceedings of the 10th International Conference on Preservation of Digital Objects. iPres '2013</source>
          (
          <year>2013</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          4.
          <string-name>
            <surname>Ebbinghaus</surname>
          </string-name>
          , H.:
          <article-title>U¨ber das ged¨achtnis: untersuchungen zur experimentellen psychologie</article-title>
          .
          <source>Duncker &amp; Humblot</source>
          (
          <year>1885</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          5.
          <string-name>
            <surname>Anderson</surname>
            ,
            <given-names>J.R.:</given-names>
          </string-name>
          <article-title>A spreading activation theory of memory</article-title>
          .
          <source>Journal of Verbal Learning and Verbal Behavior</source>
          <volume>22</volume>
          (
          <issue>3</issue>
          ) (
          <year>June 1983</year>
          )
          <fpage>261</fpage>
          -
          <lpage>295</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          6.
          <string-name>
            <surname>Cook</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          :
          <article-title>Macroappraisal in theory and practice: Origins, characteristics, and</article-title>
          implementation in canada,
          <source>19502000. Archival Science</source>
          <volume>5</volume>
          (
          <issue>2</issue>
          -4) (
          <year>2005</year>
          )
          <fpage>101</fpage>
          -
          <lpage>161</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          7.
          <string-name>
            <surname>Schellenberg</surname>
            ,
            <given-names>T.R.:</given-names>
          </string-name>
          <article-title>The appraisal of modern records</article-title>
          .
          <source>Bulletins of the National Archives</source>
          <volume>8</volume>
          (
          <year>1956</year>
          ) 46 pages
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          8.
          <string-name>
            <surname>Ceroni</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Solachidis</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          , Nieder´ee,
          <string-name>
            <given-names>C.</given-names>
            ,
            <surname>Papadopoulou</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O.</given-names>
            ,
            <surname>Kanhabua</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            ,
            <surname>Mezaris</surname>
          </string-name>
          ,
          <string-name>
            <surname>V.</surname>
          </string-name>
          :
          <article-title>To keep or not to keep: An expectation-oriented photo selection method for personal photo collections</article-title>
          .
          <source>In: Proceedings of International Conference on Multimedia Retrieval</source>
          . ICMR '
          <volume>15</volume>
          (
          <year>2015</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          9.
          <string-name>
            <given-names>Djafari</given-names>
            <surname>Naini</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K.</given-names>
            ,
            <surname>Kawase</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            ,
            <surname>Kanhabua</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            ,
            <surname>Nieder</surname>
          </string-name>
          ´ee, C.:
          <article-title>Characterizing highimpact features for content retention in social web applications</article-title>
          .
          <source>In: Proceedings of International Conference on World Wide Web. WWW Companion</source>
          '
          <volume>14</volume>
          (
          <year>2014</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          10.
          <string-name>
            <surname>Wolters</surname>
            ,
            <given-names>M.K.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Niven</surname>
            ,
            <given-names>E.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Logie</surname>
            ,
            <given-names>R.H.</given-names>
          </string-name>
          :
          <article-title>The art of deleting snapshots</article-title>
          .
          <source>In: Proceedings of the extended abstracts of the 32nd annual ACM conference on Human factors in computing systems - CHI EA '14</source>
          , New York, New York, USA, ACM Press (
          <year>April 2014</year>
          )
          <fpage>2521</fpage>
          -
          <lpage>2526</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          11.
          <string-name>
            <surname>Walber</surname>
            ,
            <given-names>T.C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Scherp</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Staab</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          :
          <article-title>Smart photo selection: Interpret gaze as personal interest</article-title>
          .
          <source>In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. CHI '14</source>
          , New York, NY, USA, ACM (
          <year>2014</year>
          )
          <fpage>2065</fpage>
          -
          <lpage>2074</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          12.
          <string-name>
            <surname>Rabbath</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Sandhaus</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Boll</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          :
          <article-title>Automatic creation of photo books from stories in social media</article-title>
          .
          <source>ACM Trans. Multimedia Comput. Commun. Appl. 7S(1) (November</source>
          <year>2011</year>
          )
          <volume>27</volume>
          :
          <fpage>1</fpage>
          -
          <lpage>27</lpage>
          :
          <fpage>18</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          13.
          <string-name>
            <surname>Logie</surname>
            .,
            <given-names>R.:</given-names>
          </string-name>
          <article-title>The functional organisation and the capacity limits of working memory</article-title>
          .
          <source>Current Directions in Psychological Science</source>
          <volume>20</volume>
          (
          <issue>4</issue>
          ) (
          <year>2011</year>
          )
          <fpage>240</fpage>
          -
          <lpage>245</lpage>
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>