"This will cause a lot of work.": Coping with Transferring Files and Passwords as Part of a Personal Digital Legacy

We present a qualitative interview study of 39 participants who describe their current practices and concerns with shaping a digital legacy, especially when they are using cloud-based storage services that unify secure file storage and password management functionalities in one service (electronic data safes). After introducing the transactional model of stress and coping as an analytical lens, we report on the users' coping strategies with respect to shaping and giving access to their digital legacy. Pre-mortem password sharing is identified as a common problem-focused coping strategy. Moreover, emotion-focused strategies of avoid-ance and ignorance are discussed. Challenges associated with passing on a digital legacy, such as the lack of enculturated practices, difficulties in the appraisal and selection of information items, the preference for deletion, and implicitly transferring data stewardship duties are described and discussed to develop design implications.

[1]  Gerhard Schwabe,et al.  Electronic Data Safes as an Infrastructure for Transformational Government? A Case Study , 2015, EGOV.

[2]  Stacey Pitsillides The future of looking back , 2012 .

[3]  Abigail Sellen,et al.  Technology heirlooms?: considerations for passing down and inheriting digital materials , 2012, CHI.

[4]  D. Hildebrand E-invoicing as the Principal Driver of Change in B2X Letter Market Definitions , 2015 .

[5]  Victor Kaptelinin,et al.  Making the Case for an Existential Perspective in HCI Research on Mortality and Death , 2016, CHI Extended Abstracts.

[6]  Jason Hong,et al.  "It’s Hidden in My Computer": Exploring Account Management Tools and Behaviors (CMU-CyLab-13-007) , 2013 .

[7]  Richard Banks,et al.  The Future of Looking Back (Microsoft Research) , 2011 .

[8]  Joseph Kaye Self-reported password sharing strategies , 2011, CHI.

[9]  V. Braun,et al.  Using thematic analysis in psychology , 2006 .

[10]  Richard Banks,et al.  Matters of life and death: locating the end of life in lifespan-oriented hci research , 2011, CHI.

[11]  Jed R. Brubaker,et al.  Death, Memorialization, and Social Media: A Platform Perspective for Personal Archives , 2014 .

[12]  Matthias Schweizer,et al.  Passing and Passing on in the Digital World : Issues and Solutions for the Digital Estate , 2013 .

[13]  N. Hoffart Basics of Qualitative Research: Techniques and Procedures for Developing Grounded Theory , 2000 .

[14]  Thomas W. Malone,et al.  How do people organize their desks?: Implications for the design of office information systems , 1983, TOIS.

[15]  Catherine C. Marshall,et al.  Rethinking Personal Digital Archiving, Part 2: Implications for Services, Applications, and Institutions , 2008, D Lib Mag..

[16]  Siân E. Lindley,et al.  Things We Own Together: Sharing Possessions at Home , 2016, CHI.

[17]  Sven Laumer,et al.  Giving too much social support: social overload on social networking sites , 2015, Eur. J. Inf. Syst..

[18]  Janet Vertesi,et al.  To have and to hold: exploring the personal archive , 2006, CHI.

[19]  Wendy Moncur,et al.  An emergent framework for digital memorials , 2014, Conference on Designing Interactive Systems.

[20]  Elisa Giaccardi,et al.  Things we value , 2011, INTR.

[21]  J. Hopkins,et al.  Afterlife in the Cloud: Managing a Digital Estate , 2013 .

[22]  Mary Beth Rosson,et al.  Making Decisions About Digital Legacy with Google's Inactive Account Manager , 2015, INTERACT.

[23]  S. Fredette Breast cancer survivors: concerns and coping , 1995, Cancer nursing.

[24]  Michael Massimi,et al.  Dying, death, and mortality: towards thanatosensitivity in HCI , 2009, CHI Extended Abstracts.

[25]  Gunela Astbrink,et al.  Password sharing: implications for security design based on social practice , 2007, CHI.

[26]  Christian Maier,et al.  Technostress: Theoretical foundation and empirical evidence , 2014 .

[27]  A. Strauss,et al.  The discovery of grounded theory: strategies for qualitative research aldine de gruyter , 1968 .

[28]  Catherine C. Marshall,et al.  The Long Term Fate of Our Digital Belongings: Toward a Service Model for Personal Archives , 2006, Archiving Conference.

[29]  Kori Inkpen Quinn,et al.  Family accounts: a new paradigm for user accounts within the home environment , 2008, CSCW.

[30]  Jed R. Brubaker,et al.  Death and the Social Network , 2010 .

[31]  Chang Liu,et al.  Exploring the factors associated with Web site success in the context of electronic commerce , 2000, Inf. Manag..

[32]  Ann Blandford,et al.  Integration of human factors and ergonomics during medical device design and development: it's all about communication. , 2014, Applied ergonomics.

[33]  Elizabeth Stobert,et al.  Expert Password Management , 2015, PASSWORDS.

[34]  Catherine C. Marshall,et al.  Rethinking Personal Digital Archiving, Part 1: Four Challenges from the Field , 2008, D Lib Mag..

[35]  Wendy Moncur,et al.  The Role of Digital Technologies During Relationship Breakdowns , 2016, CSCW.

[36]  Jed R. Brubaker,et al.  Legacy Contact: Designing and Implementing Post-mortem Stewardship at Facebook , 2016, CHI.

[37]  Gerhard Schwabe,et al.  The Landscape of Electronic Data Safes and Their Adoption in E-Government and E-Business , 2013, 2013 46th Hawaii International Conference on System Sciences.

[38]  Helena Karasti,et al.  Reflections on 25 Years of Ethnography in CSCW , 2012, Computer Supported Cooperative Work (CSCW).

[39]  Michael D. Myers,et al.  A Set of Principles for Conducting and Evaluating Interpretive Field Studies in Information Systems , 1999, MIS Q..

[40]  Aisling Kelliher,et al.  Engaging with Death Online: An Analysis of Systems that Support Legacy-Making, Bereavement, and Remembrance , 2016, Conference on Designing Interactive Systems.

[41]  Cristiano Maciel,et al.  Post-mortem Digital Legacy: Possibilities in HCI , 2015, HCI.

[42]  Viswanath Venkatesh,et al.  Bridging the Qualitative-Quantitative Divide: Guidelines for Conducting Mixed Methods Research in Information Systems , 2013, MIS Q..

[43]  Jed R. Brubaker,et al.  "We will never forget you [online]": an empirical investigation of post-mortem myspace comments , 2011, CSCW.

[44]  Christopher A. Le Dantec,et al.  Finding a new normal: the role of technology in life disruptions , 2012, CSCW.

[45]  Jacek Gwizdka,et al.  Email task management styles: the cleaners and the keepers , 2004, CHI EA '04.

[46]  T. Trabasso,et al.  Appraisal and goal processes as predictors of psychological well-being in bereaved caregivers. , 1997, Journal of personality and social psychology.

[47]  Jodi Forlizzi,et al.  Digital artifacts as legacy: exploring the lifespan and value of digital data , 2013, CHI.

[48]  Anne Beaudry,et al.  Understanding User Responses to Information Technology: A Coping Model of User Adaption , 2005, MIS Q..

[49]  John Romano,et al.  Your Digital Afterlife: When Facebook, Flickr and Twitter Are Your Estate, What's Your Legacy? , 2010 .

[50]  Mary Lewis,et al.  The human remains , 2011 .

[51]  Monideepa Tarafdar,et al.  The Consequences of Technostress for End Users in Organizations: Conceptual Development and Empirical Validation , 2008, Inf. Syst. Res..

[52]  Judith S. Olson,et al.  Remote and alone: coping with being the remote member on the team , 2012, CSCW.

[53]  Michael Mönnich,et al.  Adding Value to the Library Catalog by Implementing a Recommendation System , 2008, D Lib Mag..

[54]  Kori Inkpen Quinn,et al.  Yours, Mine and Ours? Sharing and Use of Technology in Domestic Environments , 2007, UbiComp.

[55]  Sonia Chiasson,et al.  Survey on the Fate of Digital Footprints after Death , 2014 .

[56]  Christine Reid,et al.  The Myth of the Paperless Office , 2003, J. Documentation.

[57]  Elizabeth Stobert,et al.  The Password Life Cycle: User Behaviour in Managing Passwords , 2014, SOUPS.

[58]  Abigail Sellen,et al.  A Design Perspective on Three Technology Heirlooms , 2012, Hum. Comput. Interact..

[59]  Abigail Sellen,et al.  On human remains: Values and practice in the home archiving of cherished objects , 2010, TCHI.

[60]  Jed R. Brubaker The afterlife of identity , 2013, CSCW '13.

[61]  Markus Makkonen,et al.  "I just cursed and opened a beer": Explaining Mobile Users' Non-Complaining Behavior Through Coping , 2015, ICIS.

[62]  S. Folkman,et al.  Stress, appraisal, and coping , 1974 .

[63]  S. Folkman,et al.  Stress, Appraisal, and Coping. New York, NY: Springer; , 1984 .

[64]  Tara Matthews,et al.  "She'll just grab any device that's closer": A Study of Everyday Device & Account Sharing in Households , 2016, CHI.

[65]  M. Hetherington,et al.  The cloud afterlife: Managing your digital legacy , 2015, 2015 IEEE International Symposium on Technology and Society (ISTAS).

[66]  Mark Ciampa,et al.  Online Versus Local Password Management Applications: An Analysis of User Training and Reactions , 2011 .

[67]  Richard S. Lazarus,et al.  Transactional theory and research on emotions and coping , 1987 .

[68]  B. Berg Qualitative Research Methods for the Social Sciences , 1989 .

[69]  Gerhard Schwabe,et al.  Going Paperless with Electronic Data Safes: Information Ecology Fit and Challenges , 2016, ICIS.

[70]  J. B. Berger Mandatory e-government has arrived: The silent protest from staff calls for the committed scholar – resistance must never be futile! , 2014 .

[71]  Mark S. Ackerman,et al.  Group information management , 2007 .

[72]  Elise van den Hoven,et al.  Introduction to this Special Issue on Designing for Personal Memories: Past, Present, and Future , 2012, Hum. Comput. Interact..

[73]  T. D. Wilson,et al.  Review of: Berg, Bruce L. Qualitative research methods for the social sciences, 6th ed. Boston, MA: Allyn and Bacon, 2007 , 2008, Inf. Res..

[74]  Sven Laumer,et al.  Online Social Networks as a Source and Symbol of Stress: An Empirical Analysis , 2012, ICIS.

[75]  Rafi Nachmias,et al.  The project fragmentation problem in personal information management , 2006, CHI.