From Personal Data to Digital Legacy: Exploring Conflicts in the Sharing, Security and Privacy of Post-mortem Data
暂无分享,去创建一个
[1] N. Chu. Protecting Privacy after Death , 2015 .
[2] Joanna McGrenere,et al. Hoarding and Minimalism: Tendencies in Digital Data Preservation , 2018, CHI.
[3] Lynn Dombrowski,et al. Stewarding a legacy: responsibilities and relationships in the management of post-mortem data , 2014, CHI.
[4] William Odom,et al. Keeping and Discarding Personal Data: Exploring a Design Space , 2019, Conference on Designing Interactive Systems.
[5] Damiaan Denys,et al. A case of digital hoarding , 2015, BMJ Case Reports.
[6] Richard Banks,et al. Matters of life and death: locating the end of life in lifespan-oriented hci research , 2011, CHI.
[7] Michael Birnhack,et al. Digital Remains , 2020 .
[8] Spyros Kokolakis,et al. Privacy attitudes and privacy behaviour: A review of current research on the privacy paradox phenomenon , 2017, Comput. Secur..
[9] Patrick Stokes,et al. Deletion as second death: the moral status of digital remains , 2015, Ethics and Information Technology.
[10] Jocelyn Spence,et al. Inalienability: Understanding Digital Gifts , 2019, CHI.
[11] David W. Chadwick,et al. Password Sharing and How to Reduce It , 2010 .
[12] Elizabeth Sillence,et al. Digital hoarding behaviours: Measurement and evaluation , 2019, Comput. Hum. Behav..
[13] Paul C. van Oorschot,et al. A Research Agenda Acknowledging the Persistence of Passwords , 2012, IEEE Security & Privacy.
[14] Blase Ur,et al. Do Users' Perceptions of Password Security Match Reality? , 2016, CHI.
[15] Edina Harbinja. Emails and death: Legal issues surrounding post-mortem transmission of emails , 2019, Death studies.
[16] Virginia Braun,et al. Successful Qualitative Research: A practical guide for beginners , 2013, QMiP Bulletin.
[17] Steve Whittaker,et al. Personal information management: From information consumption to curation , 2011, Annu. Rev. Inf. Sci. Technol..
[18] Daniel R. Horne,et al. The Privacy Paradox: Personal Information Disclosure Intentions versus Behaviors , 2007 .
[19] Lilian Edwards,et al. Protecting Post-Mortem Privacy: Reconsidering the Privacy Interests of the Deceased in a Digital World , 2013 .
[20] Peter DePasquale,et al. Security and privacy considerations in digital death , 2011, NSPW '11.
[21] Matthias Schweizer,et al. Passing and Passing on in the Digital World : Issues and Solutions for the Digital Estate , 2013 .
[22] R. Belk. Possessions and the Extended Self , 1988 .
[23] Richard Banks,et al. The Future of Looking Back (Microsoft Research) , 2011 .
[24] Lujo Bauer,et al. Let's Go in for a Closer Look: Observing Passwords in Their Natural Habitat , 2017, CCS.
[25] Blase Ur,et al. Usability and Security of Text Passwords on Mobile Devices , 2016, CHI.
[26] R. Belk. Extended Self in a Digital World , 2013 .
[27] Patrick Olivier,et al. Social Media As a Resource for Understanding Security Experiences: A Qualitative Analysis of #Password Tweets , 2015, SOUPS.
[28] Paul C. van Oorschot,et al. An Administrator's Guide to Internet Password Research , 2014, LISA.
[29] M. Gibbs,et al. Posthumous personhood and the affordances of digital media , 2015 .
[30] David Watson,et al. Are the dead taking over Facebook? A Big Data approach to the future of death online , 2018, Big Data Soc..
[31] Cristiano Maciel,et al. Post-mortem Digital Legacy: Possibilities in HCI , 2015, HCI.
[32] J. Hopkins,et al. Afterlife in the Cloud: Managing a Digital Estate , 2013 .
[33] Lynn Dombrowski,et al. Digital Footprints and Changing Networks During Online Identity Transitions , 2016, CHI.
[34] Patrick Olivier,et al. Mortality as Framed by Ongoingness in Digital Design , 2018, Design Issues.
[35] Jodi Forlizzi,et al. Digital artifacts as legacy: exploring the lifespan and value of digital data , 2013, CHI.
[36] Helmut Schneider,et al. The domino effect of password reuse , 2004, CACM.
[37] Aisling Kelliher,et al. Engaging with Death Online: An Analysis of Systems that Support Legacy-Making, Bereavement, and Remembrance , 2016, Conference on Designing Interactive Systems.
[38] Laura A. Dabbish,et al. Share and Share Alike? An Exploration of Secure Behaviors in Romantic Relationships , 2018, SOUPS @ USENIX Security Symposium.
[39] Rick Wash,et al. Understanding Password Choices: How Frequently Entered Passwords Are Re-used across Websites , 2016, SOUPS.
[40] Aisling Kelliher,et al. Curatorial Agents: How Systems Shape Our Understanding of Personal and Familial Digital Information , 2015, CHI.
[41] H. Nissenbaum. Privacy as contextual integrity , 2004 .
[42] Gunela Astbrink,et al. Password sharing: implications for security design based on social practice , 2007, CHI.
[43] Lujo Bauer,et al. “It's not actually that horrible”: Exploring Adoption of Two-Factor Authentication at a University , 2018, CHI.
[44] Abigail Sellen,et al. On human remains: Values and practice in the home archiving of cherished objects , 2010, TCHI.
[45] Wendy Moncur,et al. From death to final disposition: roles of technology in the post-mortem interval , 2012, CHI.
[46] Elizabeth Stobert,et al. The Password Life Cycle , 2018, ACM Trans. Priv. Secur..
[47] Joachim Pfister,et al. "This will cause a lot of work.": Coping with Transferring Files and Passwords as Part of a Personal Digital Legacy , 2017, CSCW.
[48] Tony Walter,et al. New mourners, old mourners: online memorial culture as a chapter in the history of mourning , 2015, New Rev. Hypermedia Multim..