skip to main content
research-article

What's yours is mine and what's mine's my own: joint accounts and digital identity

Published:01 April 2014Publication History
Skip Abstract Section

Abstract

Many online services assume that they each account will only be accessed by one person, ever. This is even enshrined in the terms and conditions for some. However, our identities are bound up with others in various ways, in both life and death, legally and socially. A basic classification system for multiple ownership of accounts is proposed, based on fictionalised accounts of real world problems encountered by the authors and their acquaintances.

References

  1. Act on Development of an Environment that Provides Safe and Secure Internet Use for Young People (Act No. 79 of 2008, Japan).Google ScholarGoogle Scholar
  2. Brands, S. (2004). Non Intrusive Cross-Domain Identity Management. In 3rd Annual PKI R&D Workshop (Keynote Address), http://middleware.internet2.edu/pki04/proceedings/cross_domain_identity.pdf (accessed 28 June 2013).Google ScholarGoogle Scholar
  3. Buckingham, D. (2008), "Introducing Identity", in Buckingham, D. (Ed.) Youth, Identity, and Digital Media, The MIT Press, Cambridge, MA, pp. 1--24.Google ScholarGoogle Scholar
  4. Camenisch, J., Lehmann, A. and Neven, G. (2012), "Electronic Identities Need Private Credentials", IEEE Security & Privacy, Vol. 10, pp. 80--83. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Cameron, K. (2005), "The laws of identity", available at http://www.identityblog.com/stories/2005/05/13/TheLawsOfIdentity.pdf (accessed 28 June 2013).Google ScholarGoogle Scholar
  6. Carroll, E. and Romano, J. (2011), Your Digital Afterlife, New Riders, San Francisco.Google ScholarGoogle Scholar
  7. Children's Online Privacy Protection Act of 1998 (codified in US Code Title 13, sections 1301-8).Google ScholarGoogle Scholar
  8. Edwards, L. and Harbinja, E. (2013), "What Happens to my Facebook Profile when I die?': Legal Issues Around Transmission of Digital Assets on Death", Working Paper No. 5, CREATe, University of Glasgow, Glasgow. http://www.create.ac.uk/what-happens-to-my-facebook-profile-when-i-die-legal-issues-around-transmission-of-digital-assets-on-death (accessed 28 June 2013).Google ScholarGoogle Scholar
  9. Gindin, S. E. (2009), Nobody Reads Your Privacy Policy or Online Contract: Lessons Learned and Questions Raised by the FTC's Action against Sears. NorthWestern Journal of Technology & Intellectual Property, 8(1), 1--37.Google ScholarGoogle Scholar
  10. Goffman, E. (1959) The Presentation of Self in Everyday Life: Penguin, London.Google ScholarGoogle Scholar
  11. Jenkins, R. (2000), "Categorization: Identity, Social Process and Epistemology", Current Sociology, Vol. 48 No. 3, pp. 7--25.Google ScholarGoogle ScholarCross RefCross Ref
  12. Jenkins, R. (2008) Social Identity (Key Ideas), Third ed. Routledge, London.Google ScholarGoogle Scholar
  13. Mandl, K. D., Szolovits, P. and Kohane, I. S. (2001), "Public standards and patients' control: how to keep electronic medical records accessible but private", BMJ, Vol. 322, pp. 283--287. http://dx.doi.org/10.1136/bmj.322.7281.283 (accessed 28 June 2013).Google ScholarGoogle Scholar
  14. Maree, C. (2004) "Same-Sex Partnerships in Japan: Bypasses and Other Alternatives," Women's Studies, Vol. 33 No. 4, pp. 541--549.Google ScholarGoogle ScholarCross RefCross Ref
  15. Moncur, W., Bikker, J., Kasket, E. and Troyer, J. (2012), "From death to final disposition: roles of technology in the post-mortem interval", in Konstan, J., Chi, E. H. and Höök, K., CHI '12: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, ACM, New York, NY, pp. 531--540. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. Nelson, S. E., LaPlante, D. A., Peller, A. J., Schumann, A., LaBrie, R. A. and Shaffer, H. J. (2008) "Real limits in the virtual world: self-limiting behavior of Internet gamblers", Journal Gambling Studies, Vol. 24 No. 4, pp. 463--77.Google ScholarGoogle ScholarCross RefCross Ref
  17. Rahaman, A., and Sasse, M. A. (2010), "A framework for the lived experience of identity", Identity in the Information Society, Vol. 3 No. 3, pp. 605--638. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. Viégas, F. B., boyd, d., Nguyen, D. H., Potter, J. and Donath, J. "Digital artifacts for remembering and storytelling: posthistory and social network fragments," in System Sciences, 2004. Proceedings of the 37th Annual Hawaii International Conference on, p. 10--19. http://dx.doi.org/10.1109/HICSS.2004.1265287 (accessed 28 June 2013).Google ScholarGoogle Scholar
  19. Williams, S., Fleming, S., Lundqvist, K. and Parslow, P. (2013), "This Is Me: Digital Identity and Reputation on the Internet", in Warburton, S. and Hatzipanagos S. (Eds.), Digital Identities and Social Media, IGI Global, London, pp. 104--117.Google ScholarGoogle Scholar
  20. Warburton, S. (2010) Digital Identity Matters, King's College London, London. http://digitaldisruptions.org/rhizome/wp-content/uploads/2010/06/rhiz08_DigitalIdentityMatters.pdf (accessed 28 June 2013).Google ScholarGoogle Scholar
  21. {i} http://productforums.google.com/d/topic/gmail/NZYEBW3Nd_o (accessed 28 June 2013).Google ScholarGoogle Scholar

Recommendations

Comments

Login options

Check if you have access through your login credentials or your institution to get full access on this article.

Sign in

Full Access

PDF Format

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader