From Personal Data to Digital Legacy: Exploring Conflicts in the Sharing, Security and Privacy of Post-mortem Data

Jack Holt*, James Nicholson, Jan Smeddinck

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

1 Citation (Scopus)
35 Downloads (Pure)

Abstract

As digital technologies become more prevalent there is a growing awareness of the importance of good security and privacy practices. The tools and techniques used to achieve this are typically designed with the living user in mind, with little consideration of how they should or will perform after the user has died. We report on two workshops carried out with users of password managers to explore their views on the post-mortem sharing, security and privacy of a range of common digital assets. We discuss a post-mortem pri- vacy paradox where users recognise value in planning for their digital legacy, yet avoid actively doing so. Importantly, our find- ings highlight a tension between the use of recommended security tools during life and facilitating appropriate post-mortem access to chosen assets. We offer design recommendations to facilitate and encourage digital legacy planning while promoting good security habits during life.
Original languageEnglish
Title of host publicationWWW '21: Proceedings of the Web Conference 2021
EditorsJure Leskovec, Marko Grobelnik, Marc Najork, Jie Tang, Leila Zia
Place of PublicationNew York
PublisherACM
Pages2745-2756
Number of pages12
ISBN (Electronic)9781450383127
DOIs
Publication statusPublished - 19 Apr 2021
EventThe Web Conference - Ljubljana, Slovenia, Ljubljana, Slovenia
Duration: 19 Apr 202123 Apr 2021
https://www2021.thewebconf.org/

Conference

ConferenceThe Web Conference
Abbreviated titleWWW
Country/TerritorySlovenia
CityLjubljana
Period19/04/2123/04/21
Internet address

Fingerprint

Dive into the research topics of 'From Personal Data to Digital Legacy: Exploring Conflicts in the Sharing, Security and Privacy of Post-mortem Data'. Together they form a unique fingerprint.

Cite this