From Personal Data to Digital Legacy: Exploring Conflicts in the Sharing, Security and Privacy of Post-mortem Data

As digital technologies become more prevalent there is a growing awareness of the importance of good security and privacy practices. The tools and techniques used to achieve this are typically designed with the living user in mind, with little consideration of how they should or will perform after the user has died. We report on two workshops carried out with users of password managers to explore their views on the post-mortem sharing, security and privacy of a range of common digital assets. We discuss a post-mortem privacy paradox where users recognise value in planning for their digital legacy, yet avoid actively doing so. Importantly, our findings highlight a tension between the use of recommended security tools during life and facilitating appropriate post-mortem access to chosen assets. We offer design recommendations to facilitate and encourage digital legacy planning while promoting good security habits during life.

[1]  N. Chu Protecting Privacy after Death , 2015 .

[2]  Joanna McGrenere,et al.  Hoarding and Minimalism: Tendencies in Digital Data Preservation , 2018, CHI.

[3]  Lynn Dombrowski,et al.  Stewarding a legacy: responsibilities and relationships in the management of post-mortem data , 2014, CHI.

[4]  William Odom,et al.  Keeping and Discarding Personal Data: Exploring a Design Space , 2019, Conference on Designing Interactive Systems.

[5]  Damiaan Denys,et al.  A case of digital hoarding , 2015, BMJ Case Reports.

[6]  Richard Banks,et al.  Matters of life and death: locating the end of life in lifespan-oriented hci research , 2011, CHI.

[7]  Michael Birnhack,et al.  Digital Remains , 2020 .

[8]  Spyros Kokolakis,et al.  Privacy attitudes and privacy behaviour: A review of current research on the privacy paradox phenomenon , 2017, Comput. Secur..

[9]  Patrick Stokes,et al.  Deletion as second death: the moral status of digital remains , 2015, Ethics and Information Technology.

[10]  Jocelyn Spence,et al.  Inalienability: Understanding Digital Gifts , 2019, CHI.

[11]  David W. Chadwick,et al.  Password Sharing and How to Reduce It , 2010 .

[12]  Elizabeth Sillence,et al.  Digital hoarding behaviours: Measurement and evaluation , 2019, Comput. Hum. Behav..

[13]  Paul C. van Oorschot,et al.  A Research Agenda Acknowledging the Persistence of Passwords , 2012, IEEE Security & Privacy.

[14]  Blase Ur,et al.  Do Users' Perceptions of Password Security Match Reality? , 2016, CHI.

[15]  Edina Harbinja Emails and death: Legal issues surrounding post-mortem transmission of emails , 2019, Death studies.

[16]  Virginia Braun,et al.  Successful Qualitative Research: A practical guide for beginners , 2013, QMiP Bulletin.

[17]  Steve Whittaker,et al.  Personal information management: From information consumption to curation , 2011, Annu. Rev. Inf. Sci. Technol..

[18]  Daniel R. Horne,et al.  The Privacy Paradox: Personal Information Disclosure Intentions versus Behaviors , 2007 .

[19]  Lilian Edwards,et al.  Protecting Post-Mortem Privacy: Reconsidering the Privacy Interests of the Deceased in a Digital World , 2013 .

[20]  Peter DePasquale,et al.  Security and privacy considerations in digital death , 2011, NSPW '11.

[21]  Matthias Schweizer,et al.  Passing and Passing on in the Digital World : Issues and Solutions for the Digital Estate , 2013 .

[22]  R. Belk Possessions and the Extended Self , 1988 .

[23]  Richard Banks,et al.  The Future of Looking Back (Microsoft Research) , 2011 .

[24]  Lujo Bauer,et al.  Let's Go in for a Closer Look: Observing Passwords in Their Natural Habitat , 2017, CCS.

[25]  Blase Ur,et al.  Usability and Security of Text Passwords on Mobile Devices , 2016, CHI.

[26]  R. Belk Extended Self in a Digital World , 2013 .

[27]  Patrick Olivier,et al.  Social Media As a Resource for Understanding Security Experiences: A Qualitative Analysis of #Password Tweets , 2015, SOUPS.

[28]  Paul C. van Oorschot,et al.  An Administrator's Guide to Internet Password Research , 2014, LISA.

[29]  M. Gibbs,et al.  Posthumous personhood and the affordances of digital media , 2015 .

[30]  David Watson,et al.  Are the dead taking over Facebook? A Big Data approach to the future of death online , 2018, Big Data Soc..

[31]  Cristiano Maciel,et al.  Post-mortem Digital Legacy: Possibilities in HCI , 2015, HCI.

[32]  J. Hopkins,et al.  Afterlife in the Cloud: Managing a Digital Estate , 2013 .

[33]  Lynn Dombrowski,et al.  Digital Footprints and Changing Networks During Online Identity Transitions , 2016, CHI.

[34]  Patrick Olivier,et al.  Mortality as Framed by Ongoingness in Digital Design , 2018, Design Issues.

[35]  Jodi Forlizzi,et al.  Digital artifacts as legacy: exploring the lifespan and value of digital data , 2013, CHI.

[36]  Helmut Schneider,et al.  The domino effect of password reuse , 2004, CACM.

[37]  Aisling Kelliher,et al.  Engaging with Death Online: An Analysis of Systems that Support Legacy-Making, Bereavement, and Remembrance , 2016, Conference on Designing Interactive Systems.

[38]  Laura A. Dabbish,et al.  Share and Share Alike? An Exploration of Secure Behaviors in Romantic Relationships , 2018, SOUPS @ USENIX Security Symposium.

[39]  Rick Wash,et al.  Understanding Password Choices: How Frequently Entered Passwords Are Re-used across Websites , 2016, SOUPS.

[40]  Aisling Kelliher,et al.  Curatorial Agents: How Systems Shape Our Understanding of Personal and Familial Digital Information , 2015, CHI.

[41]  H. Nissenbaum Privacy as contextual integrity , 2004 .

[42]  Gunela Astbrink,et al.  Password sharing: implications for security design based on social practice , 2007, CHI.

[43]  Lujo Bauer,et al.  “It's not actually that horrible”: Exploring Adoption of Two-Factor Authentication at a University , 2018, CHI.

[44]  Abigail Sellen,et al.  On human remains: Values and practice in the home archiving of cherished objects , 2010, TCHI.

[45]  Wendy Moncur,et al.  From death to final disposition: roles of technology in the post-mortem interval , 2012, CHI.

[46]  Elizabeth Stobert,et al.  The Password Life Cycle , 2018, ACM Trans. Priv. Secur..

[47]  Joachim Pfister,et al.  "This will cause a lot of work.": Coping with Transferring Files and Passwords as Part of a Personal Digital Legacy , 2017, CSCW.

[48]  Tony Walter,et al.  New mourners, old mourners: online memorial culture as a chapter in the history of mourning , 2015, New Rev. Hypermedia Multim..