Post-mortem information management: exploring contextual factors in appropriate personal data access after death

Jack Holt,Jan David Smeddinck,James Nicholson,Vasilis Vlachokyriakos,Abigail C. Durrant
DOI: https://doi.org/10.1080/07370024.2023.2300792
IF: 6.4588
2024-01-23
Human-Computer Interaction
Abstract:With the increasing size and complexity of personal information and data landscapes, there is a need for guidance and support in the appropriate management of a deceased person's postmortem privacy and digital legacy. However, most people engage poorly with existing mechanisms for specifying and planning for access and suitable usage of their own data. We report on two studies exploring the ways in which contextual factors such as the accessor and the data type may affect the appropriateness of personal data flows differently during life and after death. Our findings indicate that suitable data access after death is highly individual and contextual, with differences in appropriateness between during-life and after-death data flows significantly affected by the accessor and the data type in question. We identify that ambiguous accessor motivation, failure to communicate intent, changing temporal context and latent data values further complicate the act of digital legacy planning. Our findings also provide further evidence for the existence of a postmortem privacy paradox in which reported user behaviors do not reflect intent. With this in mind, we offer design recommendations for the integration of digital legacy planning functionality within Personal Information Management (PIM) and Group Information Management (GIM) systems.
computer science, theory & methods, cybernetics
What problem does this paper attempt to address?
The paper primarily explores the issue of how personal data should be appropriately managed after death, particularly the appropriateness of accessing such data without explicit authorization. The study focuses on the differences between individuals' attitudes, expectations, and behaviors regarding the privacy of their digital legacy (including personal information and data) after death. Specifically, the research unfolds in two parts: 1. **Questionnaire Survey**: A questionnaire survey was conducted with 108 participants to understand their views on the appropriateness of unauthorized access to their personal data after death, especially in situations where such access occurs posthumously. The study particularly focused on how different types of personal data and different data accessors influence this judgment. 2. **Semi-structured Interviews**: In-depth interviews were conducted with 12 participants to understand individuals' views on the future value of data and privacy, and how these views shape their expectations of posthumous privacy boundaries. Additionally, data was collected on overall privacy and posthumous privacy values and protective behaviors to identify potential gaps between intentions and actions. The study found that people's views on accessing personal data after death are highly individualized and influenced by contextual factors. Death itself does not necessarily change everyone's views on data privacy, but it does affect some people's views. The study also pointed out that in the absence of clearly defined plans, the type of data and the identity of potential accessors significantly influence the appropriateness of posthumous data access. Furthermore, the findings support a so-called "posthumous privacy paradox," where despite respondents considering posthumous privacy important, they put in little effort to protect it. In summary, the study highlights the current shortcomings of personal information management (PIM) systems in supporting considerations of posthumous information and proposes design recommendations to improve tools and processes to better support users in creating sufficiently detailed and personalized legacy plans.