Abstract
Many online services assume that they each account will only be accessed by one person, ever. This is even enshrined in the terms and conditions for some. However, our identities are bound up with others in various ways, in both life and death, legally and socially. A basic classification system for multiple ownership of accounts is proposed, based on fictionalised accounts of real world problems encountered by the authors and their acquaintances.
- Act on Development of an Environment that Provides Safe and Secure Internet Use for Young People (Act No. 79 of 2008, Japan).Google Scholar
- Brands, S. (2004). Non Intrusive Cross-Domain Identity Management. In 3rd Annual PKI R&D Workshop (Keynote Address), http://middleware.internet2.edu/pki04/proceedings/cross_domain_identity.pdf (accessed 28 June 2013).Google Scholar
- Buckingham, D. (2008), "Introducing Identity", in Buckingham, D. (Ed.) Youth, Identity, and Digital Media, The MIT Press, Cambridge, MA, pp. 1--24.Google Scholar
- Camenisch, J., Lehmann, A. and Neven, G. (2012), "Electronic Identities Need Private Credentials", IEEE Security & Privacy, Vol. 10, pp. 80--83. Google ScholarDigital Library
- Cameron, K. (2005), "The laws of identity", available at http://www.identityblog.com/stories/2005/05/13/TheLawsOfIdentity.pdf (accessed 28 June 2013).Google Scholar
- Carroll, E. and Romano, J. (2011), Your Digital Afterlife, New Riders, San Francisco.Google Scholar
- Children's Online Privacy Protection Act of 1998 (codified in US Code Title 13, sections 1301-8).Google Scholar
- Edwards, L. and Harbinja, E. (2013), "What Happens to my Facebook Profile when I die?': Legal Issues Around Transmission of Digital Assets on Death", Working Paper No. 5, CREATe, University of Glasgow, Glasgow. http://www.create.ac.uk/what-happens-to-my-facebook-profile-when-i-die-legal-issues-around-transmission-of-digital-assets-on-death (accessed 28 June 2013).Google Scholar
- Gindin, S. E. (2009), Nobody Reads Your Privacy Policy or Online Contract: Lessons Learned and Questions Raised by the FTC's Action against Sears. NorthWestern Journal of Technology & Intellectual Property, 8(1), 1--37.Google Scholar
- Goffman, E. (1959) The Presentation of Self in Everyday Life: Penguin, London.Google Scholar
- Jenkins, R. (2000), "Categorization: Identity, Social Process and Epistemology", Current Sociology, Vol. 48 No. 3, pp. 7--25.Google ScholarCross Ref
- Jenkins, R. (2008) Social Identity (Key Ideas), Third ed. Routledge, London.Google Scholar
- Mandl, K. D., Szolovits, P. and Kohane, I. S. (2001), "Public standards and patients' control: how to keep electronic medical records accessible but private", BMJ, Vol. 322, pp. 283--287. http://dx.doi.org/10.1136/bmj.322.7281.283 (accessed 28 June 2013).Google Scholar
- Maree, C. (2004) "Same-Sex Partnerships in Japan: Bypasses and Other Alternatives," Women's Studies, Vol. 33 No. 4, pp. 541--549.Google ScholarCross Ref
- Moncur, W., Bikker, J., Kasket, E. and Troyer, J. (2012), "From death to final disposition: roles of technology in the post-mortem interval", in Konstan, J., Chi, E. H. and Höök, K., CHI '12: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, ACM, New York, NY, pp. 531--540. Google ScholarDigital Library
- Nelson, S. E., LaPlante, D. A., Peller, A. J., Schumann, A., LaBrie, R. A. and Shaffer, H. J. (2008) "Real limits in the virtual world: self-limiting behavior of Internet gamblers", Journal Gambling Studies, Vol. 24 No. 4, pp. 463--77.Google ScholarCross Ref
- Rahaman, A., and Sasse, M. A. (2010), "A framework for the lived experience of identity", Identity in the Information Society, Vol. 3 No. 3, pp. 605--638. Google ScholarDigital Library
- Viégas, F. B., boyd, d., Nguyen, D. H., Potter, J. and Donath, J. "Digital artifacts for remembering and storytelling: posthistory and social network fragments," in System Sciences, 2004. Proceedings of the 37th Annual Hawaii International Conference on, p. 10--19. http://dx.doi.org/10.1109/HICSS.2004.1265287 (accessed 28 June 2013).Google Scholar
- Williams, S., Fleming, S., Lundqvist, K. and Parslow, P. (2013), "This Is Me: Digital Identity and Reputation on the Internet", in Warburton, S. and Hatzipanagos S. (Eds.), Digital Identities and Social Media, IGI Global, London, pp. 104--117.Google Scholar
- Warburton, S. (2010) Digital Identity Matters, King's College London, London. http://digitaldisruptions.org/rhizome/wp-content/uploads/2010/06/rhiz08_DigitalIdentityMatters.pdf (accessed 28 June 2013).Google Scholar
- {i} http://productforums.google.com/d/topic/gmail/NZYEBW3Nd_o (accessed 28 June 2013).Google Scholar
Recommendations
Factors mediating disclosure in social network sites
In this paper, we explore how privacy settings and privacy policy consumption (reading the privacy policy) affect the relationship between privacy attitudes and disclosure behaviors. We present results from a survey completed by 122 users of Facebook ...
Katz out of the bag: the broader privacy ramifications of using facebook
ASIS&T '10: Proceedings of the 73rd ASIS&T Annual Meeting on Navigating Streams in an Information Ecosystem - Volume 47As the social networking site Facebook has grown in popularity, some scholars have worried about the seemingly nonchalant attitude toward privacy fostered by the website. Privacy attitudes, engendered at Facebook, have implications that stretch far ...
Personal information concerns and provision in social network sites: Interplay between secure preservation and true presentation
Encouraging users of social network sites SNS to actively provide personal information is vital if SNS are to prosper, but privacy concerns have hindered users from giving such information. Previous research dealing with privacy concerns has studied ...
Comments