Learn How to Preserve Your Data with Take Control of Your Digital Legacy

Life beyond the timeline: creating and curating a digital legacy

by Craig Bellamy

Abstract: The internet has steadily become integrated with our everyday lives, and it is scarcely worth remarking that the quotidian footprint we leave is increasingly digital. This being the case, the question of what will happen to our digital legacy when we die is an increasing important one. Digital accounts containing emails, photos, videos, music collections, documents of all kinds, social media content, eBooks and the like, all trace the life we have led, and if they are to be conserved and bequeathed, if family and friends are to benefit from this often highly emotive and evocative desiderata, if history is to be recorded, we need to prepare these accounts and assets for the inevitability of death. A difficulty though, is that the demands of curating such a legacy are formidable, the importance of creating digital archives from personal data contained in online accounts is not well-established in the public arena, and the products and services available to facilitate this are largely inadequate. Future generations and future historians are the poorer for this. In this presentation we will point out some of the difficulties involved in curating and bequeathing a digital legacy, and suggest a partial remediation.

Introduction

For the celebrities of the 20th century a life in the public spotlight was a matter of record, with key events, relationships and achievements recognised and documented for private and public purposes. For these individuals, a legacy of letters, sound recordings, videos, private papers, personal records, photos, and films, all stored in many places and in many forms, needed to be captured, managed and curated for the historical record; to perhaps be donated to an institutional archive or given to family members for use in family histories and memoirs. It is arguable that today this situation has been democratised, and in a sense, everyone with access to digital technologies is a multimedia celebrity. In a digital age, “Evidence of Me…” abounds and Ann-Clare’s carbon-paper is not required (McKemmish 1996). Ordinary people are now routinely creating a digital record of their everyday life. For some, this record is a self-conscious autobiography. Digital media and social network sites are mobilised in order to create a reflexive social and personal identity; images are carefully selected and annotated; “likes” are used strategically; publics of various kinds are assembled to witness, and boundary work is conducted to define these publics; stories are told to create and maintain links between that online identity and those publics. Our personally constructed digital legacy will commonly include the contents of email accounts, the contents of social network accounts on services such as Facebook and LinkedIn, music accounts on services such as iTunes and Spotify, images on services such as Flickr and Instagram, videos on services such as YouTube, and documents of many kinds on cloud storage services such as DropBox.

In parallel, a distributed and diverse record is assembled across hundreds of online sites by default, as our digital inputs and outputs are routinely captured, stored and mined for the personal-profiling data used to inform those with an interest in commodifying our identity as consumers. In both these ways, in the course of everyday life, we are assembling a media legacy of considerable volume, personal importance, and arguably historical importance. For those with a sense that the accumulation of personal media is a form of self­witnessing, and the aggregation of this media narrates a form of autobiography, it is important not only that it be authored appropriately, but that it be successfully bequeathed. Our digital legacy represents a narrative of a life lived, is of obvious personal, familial and communal value, and is also of wider historical and social value. Histories told through the exploits of the great, the good and the powerful will no doubt continue to abound, but history also has a profound interest in the lives of ordinary people leading ordinary lives, and to the extent that these lives are digitally mediated, so too is the historical dataset.

There have been a number of practical responses to this relatively new demand, such as changes in policy by Google and Facebook, and the establishment of commercial “legacy management” service providers and private “digital registers” to accompany a last will and testament. However, online service providers could offer much more leadership in this respect, as there are few established mechanisms for re-purposing the digital artefacts of the deceased, or to ensure their long-term preservation. Similarly, professional archivists have paid scant attention to personal records, as compared to institutional and commercial records (Cunningham 1999; Hobbs 2001), and even less attention to the DIY archiving needs of ordinary people.

If capture and preservation is important, it is equally critical that some elements of a digital heritage are destroyed upon death, or at the very least, remain inaccessible. As many have found to their mortification, once moved online, files are reproducible, searchable, are often re-contextualised, and can be extraordinarily difficult to delete (e.g. Mayer­Schönberger, 2009); yet the sensibilities of loved ones, the management of reputation, and a defence against identity theft may well depend upon the ability to remove these records from penetrable digital spaces.

In either case, the question of the curation and bequeathing of a digital legacy must be addressed. The history of ordinary people, as told through their correspondence and their material possessions, has long been a precious resource for families and for historians alike. Businesses, institutions and other organisations have responded to the challenges of the storage and re-use of digital assets by building digital repositories at an institutional level, and at a national and international level. However, personal data – the quotidian data relating to an individual’s life – has until very recently been neglected in the debates and practices about digital archives and access to archives. In this context the problem of what happens to a digital legacy and how it may be passed from one generation to the next have become important questions.

The literature on questions related to death and the Internet is broad, covering many fields and approaches to study. There has been growing interest within the archival, library studies and digital humanities communities about the issues surround the preservation of personal data and the creation of ‘personal digital archives’, but few studies, with one notable exception (Bellamy et al 2013; Gibbs et al 2013b) focus specifically on death and bequeathment of data. The larger body of work on online memorialising has largely been positioned within a research approach that considers the psychology and sociology of grief and support, and this connects with a wider literature in the social sciences that examines death, grieving and memorialisation (e.g. Aries 1983; Hockey, Komaromy and Woodthorpe 2010; Kellehear 2007; Metcalf and Huntington 1991; Robben 2004).

Studies of online memorialisation have examined the extent to which the sites facilitate the sharing of grieving, remembering, commemorating and providing social support (e.g. Jones 2004; Gibson 2007; Roberts and Vidal 2000; Sofka 1997; Veale, 2003, de Veries and Rutherford, 2004; Walther and Boyd 2002). More recently, following the popularisation of social software, attention has turned to social networks with particular focus on the practices of teenagers (Carroll and Landry, 2010; Williams & Merten, 2009). Others have considered memorials and commemoration in other online place such as video games (Gibbs et al, 2012; 2013a; 2013b). More recently, so called RIP Trolling of memorial sites and attendant issues of responsibility have been considered (Phillips 2011, Kohn et al. 2012). Interaction designers have also become increasingly interested in addressing the many design challenges presented by the development of online memorial practices (Brubaker and Hayes 2011; Mori et al 2011; Odom et al. 2010) and have contrasted the way various online platforms shape commemorative practices (Mori et al 2012). Whilst there is a growing literature attending to practices and forms of online memorialisation, studies of the management of digital legacies have been limited (see, for example, Carroll and Romano, 2011).

 

To examine these issues the authors undertook a project funded by the Australian Communications Consumer Action Network – a peak-body consumer advocacy, research and education group whose work is focused on the Internet and telecommunications services. The project involved empirical research on consumer issues in planning and managing death online, and involved developing accessible educational materials for Australian consumers that summarised the social, legal and economic issues, and offered guidance for action (for the report see: Bellamy et al 2013). The advice offered was informed by primary sources such as the Terms of Use Agreements of popular internet sites and services, many secondary sources from the legal literature and elsewhere, and key-informant interviews with managers and policy makers drawn from relevant industries and professions. These industries and professions comprised telecommunications companies, social network software managers, intellectual property lawyers, professional archivists, online memorial companies, the Victorian State Trustees, and members of the clergy within Australia. The report provided an account of the legal situation as it pertains to a digital legacy, and provided what we were given to understand to be “best practice” in curating and archiving that legacy. In this paper we revisit this advice, and it will be seen in the account that follows, that though the suggestions may make sense in certain legal and archiving discourses and practices, there are significant problems in adhering to it on any sort of popular scale. We conclude that the steps suggested are not likely to produce the desired result.

We turn now to identify some of the issues associated with constructing a personal digital archive, to summarise the advice received on addressing these issues, and point to the problems associated with acting on this advice. We then conclude with a brief gesture towards a potential (if partial) remedy.

Problem: are these files mine, and who can access them?

The issue of who owns what in the digital realm is complex, is an important consideration in determining what may be archived and bequeathed to others, and is a major obstacle to curating a digital legacy. Ownership of emails, photos, blogs, web-sites and URLs, electronic documents, music files, the content uploaded to social media accounts and so on, usually depends in a legal sense upon the particularities of the Terms of Use Agreement that were entered into when the deceased signed-up for the online service. These terms of use set out the conditions of posthumous access to digital assets and their use Overarching contractual rights, intellectual property rights, and various forms of copyright law, all of which vary from jurisdiction to jurisdiction, further complicate the situation. Should the files in question (or copies of the files) be stored locally on a hard-disc, a USB stick or the like, the letter of the law may not make any practical difference to bequeathing the files, however, the recent stampede towards the use of cloud services makes it increasingly likely that one’s legacy is held remotely on a server, very often in another country and in another legal jurisdiction, and is only under one’s control with the grace of the service provider.

So while there are well-established procedures for locating, valuing and transferring ownership of material property such as real-estate or cars or books, the task of locating, accessing and disbursing digital assets after death is made more difficult by the ambiguity of ownership and terms of use that prevent third-party access. For example, online services such as Yahoo! have Terms of Use Agreements that disallow the transferring of an individual account to another individual, indeed “some [commentators] believe Yahoo!’s policies regarding customer information stored on its e-mail server are stricter than hospital policies regarding medical records” (Tarney 2012 p. 780) . Companies such as Yahoo! have agreed to provide a service to a named individual and the agreement and the service provided terminates upon that individual’s death, generally operationalised through a formal process, or after a minimum period of inactivity. Many years of photos, videos, text files and other digital files and documents uploaded to an online service may be lost forever if posthumous access to them is not arranged, or local copies are unavailable.

A common-sense solution to the problem of ambiguous ownership and granting third­party access is for the individual to provide a list of services (Flickr, PayPal, Facebook, Dropbox, etc.), and, for each service, to provide the relevant username and password, along with instructions for friends, relatives and the executor of the will to execute upon one’s death in a so-called “digital register” – further detail on this is provided later in the paper (Bellamy et al. 2013; Gibbs et al. 2013c). Common-sense though this may be, it is against the terms of agreement of many service providers who prohibit the provision of one’s username and password to a third party, and forbid any individual from accessing another person’s account, deceased or not. Many US based service providers are in this category. Other online service providers (such as Australia’s iiNet and Telstra) do allow this use of a digital register and consider an individual who has been given the username and password to be an authorised agent of the account’s owner. Of course, for all practical purposes, the identification of the person using the username and password is difficult to verify.

Another common sense solution is to maintain local copies of assets stored on the internet. Local copies are under direct rather than indirect control, and the problem of access is alleviated. In many cases local files pre-exist remote copies, as internet files are in fact copies of local files, but as the use of remote file-servers overtakes the use of local storage devices, and as applications increasingly save direct to these file-servers, this situation is unlikely to remain the standard. The local storage of files in addition to “Cloud” storage also generates its own problems – in particular problems of versioning, and of course does nothing to alleviate the problem of archival management, addressed next in the paper.

Problem: curating and bequeathing a local digital archive

Local copies of your files should be in a format that can be used at a later date and are of the best possible quality. There are a number of considerations here, in a situation where hardware, application software, file formats and operating systems all rapidly become redundant, but generally it is important that the files saved are in popular open-source formats that are in general use, such as JPEG or TIFF for images, or MP4 for video, and are transferred from old hardware to new as the new becomes mainstream. If a MS Word document can be saved as a plain text file or an RTF without losing too much of its structure, then it should be saved as a plain text file to obviate future dependence on proprietary software which may or may not exist for the next generation. Some organisations have published tips sheets on creating and maintaining digital archives (e.g. the National Archives of Australia), and the National Archives of the UK have some good guidance on selecting file types (see, for example, http://www.nationalarchives.gov.uk/documents/selecting-file­formats.pdf).

Trained archivists recommend that personal archivists periodically download and archive all digital files (photos, tweets, videos, documents etc.), and store them locally on a removable storage device, such as a thumb-drive or portable hard-disk, in order to have personal control over that archive. Using this method it is possible to curate the storage disks in such a way that only the files that you wish to include are available to friends and relatives, or to future historians; it is possible to use a bespoke organisational structure that suits the files and their content, rather than relying on the default structure of the online service; and your archive is not dependent upon the good grace and continuing viability of a commercial entity.

Once all the relevant files are gathered locally in one place, they should be provided with the context that gives the file meaning and purpose for others. Following Haraway (1991) and others who have explored emergent and situated knowledges (Bhavnani, 1993; Feinberg, 2008; Ihde, 2012; Law, 2009; Sassower, 1994), the epistemological foundation of knowing is relational, and if making meaning and knowing is at all relational, it is relational in the case of legacy objects. For example, a photograph of the London Bridge not anchored by context invokes quite a different meaning when situated as holiday snap taken three weeks before the death of spouse. A way to begin to provide context is with a simple folder structure. There are no strict rules here, but generally the simpler and more straight-forward the better (such as ‘family photos’, ‘Europe trip 2010’, ‘Pam’s music’, ‘emails to Gavin’ and so on). ‘Metadata’ or contextual information about the items should also be placed in the folder so others know of its context and potential significance. This may be in the form of a simple text file that describes what is in the folder, where it was created and why, dates, and any other important information considered relevant for use in a family archive, but it can work down to fine-grain detail related to each file. Also consider using face-recognition software such as Google’s Picasa to automatically name-tag all the individuals in your photos for the benefit of future generations.

With all the data arranged in folders and in one-place, it may be then placed on a removable storage disk. Storage devices such as DVDs, CD ROMS, and Flash discs should not be used because they are fast-changing formats and may not be accessible in the future. It is recommended to use two removable hard-disks, one to be kept in a safe location and one to be given to a trusted friend. The discs must be updated regularly to make sure they contain relevant information, and also the actual discs should be replaced every 2-5 years, and should be replaced with new storage technologies as they become standard.

Digital preservation is an active and ongoing process and it is important to intervene in the process and manage digital legacies over time. Another tried and trusted method is to print out important documents and images and store them in a filing cabinet as paper remains one of the most enduring preservation formats.

In very recent times, online companies have provided facilities to download and archive personal data. For instance:

  • Facebook allows individuals to download all the information they have shared on their timeline including photos, status updates, and comments. There are also expanded options that allow individuals to view cookies, logins, logouts and almost any other way of interacting with the site (See: https://www.facebook.com/help/131112897028467/).
  • Twitter also now allows individuals to download their entire twitter archive from
    the beginning (See: http://blog.twitter.com/2012/12/your-twitter-archive.html).
  • YouTube allows users to download and archive all YouTube uploads in the original uploaded format (See: http://12starsmedia.com/blog/how-to-download­archive-your-entire-youtube-library).
  • Also, Google’s take-out service allows users to download and archive data from many of their Google services (See: https://www.google.com/takeout/).
  • Downloading and archiving an online Gmail or Hotmail account is a little more difficult as it requires the installation of a local software application such as Thunderbird to download all the emails so that they can be read and stored locally. Once emails have been downloaded, it is possible to export them in different formats and in complete folders. The emails can be associated with a particular project or a particular family member or friend. Other emails that are either personal or irrelevant can be deleted.

These downloading facilities are welcome, as is the advice of archivists, but the task of local archiving remains onerous in the extreme. Can we really expect people to engage in the time consuming and non-trivial task of categorising tens of thousands, or in many cases, hundreds of thousands of files, determining which are to be archived and bequeathed and which are to destroyed, then providing the metadata for future generations to make sense of the files, then writing them to synchronised hard-disks and ensuring the security and working order of those disks, and of course, doing this time after time, year after year, to ensure currency and completeness? This is not being done on any sort of scale, and there is clearly a lot of work to be done to make this a practicable and commonly performed task.

We move now to consider the particular media that may be included in an archive.

Problems curating and bequeathing digital music and eBooks

We all know that we can learn a lot about a person by flicking through their music collection or by examining their book shelves. We also know that music and literature is precious, and collections spanning decades make for a very valuable legacy for loved ones. Books and music speak of one’s sensibilities – intellectual and emotional – and speak of one’s shaping by a culture, and are integral to a personal legacy. Passing on physical vinyl records, CDs and books is easy; passing on digital music and eBooks is more problematic.

Digital music is usually licenced for individual use and thus cannot be legally bequeathed to another. Companies such as Apple have complex consumer software licences that once agreed are binding, and certain legal rights are established (as when a document is signed). In effect, when using a service such as iTunes the individual is licenced to listen to the music file, but does not own the music file. The licenses are in place to protect the producers of the music, who pass it to Apple under the provision that Apple will protect their interests over the interests of the consumers.

A few of the important considerations of Apple’s Terms of Agreement is that Apple will not replace digital files, files can only be downloaded once, and the unauthorised transfer of files is illegal under copyright law. If a file is lost, Apple will not replace it, and hence personal backups are important.

Other companies have different consumer software licences that set out what can and cannot be done with a digital file (such as Creative Commons licenses), and some digital audio files are in the public domain and have few or no intellectual property rights.

As with digital music, eBook files are usually licensed for individual use and cannot be bequeathed. The terms of service give buyers the right to use the file, that is, read the book, but they do not own the file, their right to read may expire on a certain date, and the file can often only be read with proprietary combinations of hardware and software. On occasions, your license may be extended to friends or family, but the ownership of the file still remains with the publisher. An important exception to this are books that are out of copyright and have been digitised and made available under a Creative Commons licence by organisations such as Project Gutenberg and Google Books.

There are many advantages to eBooks, but bequeathment is not one of them. If an individual is concerned about the inter-generational longevity of their library, it is best to buy physical copies of the book in the first instance, and not the eBook version. The physical copy can then be straightforwardly bequeathed.

Like music, books are an important component of many people’s biography, and again, form an important component of family history. As things stand at time of writing, eBooks are lost to legacy, and the seminal books that have contributed to a biography, and should be passed to others, need to be in physical form.

Problems curating and bequeathing images

Passing on digital images is less problematic than digital music or books in so much as the copyright of a photograph is owned by the individual who took the photograph, unless the rights are specifically passed to another. Uploading a photo to the web doesn’t change this and copyright is retained by the photographer. Thus photos can be bequeathed to another person in a will and many professional photographers, who earn a living from their photos, do this as a matter of course.

In the case of popular services such as Flikr, users may choose an All Rights Reserved licence for their uploaded photos, or a Creative Commons License. A Creative Commons License is a series of licenses that limits what users may and may not do with photos, such as reusing them for commercial purposes or using them without attribution (For further information see http://en.wikipedia.org/wiki/All_rights_reserved, and http://en.wikipedia.org/wiki/Creative_Commons_licenses). Although online systems are convenient places to share photos, they are often published in a compressed and low-quality format. Again, it is best practice to retain local copies, in the best quality possible, along with

 

the important information about where they were taken, dates, and people in the photo. Many digital cameras allow ‘metadata’, to be written into the file (such as time and date, GPS, and camera settings for the photo), but this will not provide future generations with social context, which will need to be added once the file is transferred to a computer.

In the case of other popular systems for publishing photos, such as Facebook, the copyright is still owned by the photographer. The terms of service grant Facebook the right to reuse personal photographs in certain features of the system, but this is primarily determined by the user’s privacy settings. Other systems may have differing copyright provisions and it is always prudent to check the Terms of Service before uploading images to a particular service.

In many different cultural contexts, photos reveal a significant component of family history over several generations and considering how they will be maintained and bequeathed is important. In other cultural contexts it is important that photographs not be viewed at all. For example, many indigenous Australian communities do not approve of the display of photographs of deceased people. Use of the names of deceased people is problematic in many of these communities. Other images should only be seen by those in community, and when in community, some should be viewed only with the permission of particular custodians and in particular circumstances.

Even where these cultural sensitivities do not apply, and the personal archivist’s objective is to make as much information known to as many people as possible, the problem of curating and managing an archive of what may be tens of thousands of images remains formidable. These problems may not be new, as anyone who has leafed through an old photo-album will attest (who are these people? where was this taken?). However, the sheer quantity of images generated in digital formats not only exacerbates these problems, it makes them virtually impossible to overcome with traditional manual methods of curating and archiving.

Problems curating and bequeathing video

As with photos, the copyright of videos uploaded to popular systems such as YouTube is usually owned by the person who recorded the video, so videos may be legally bequeathed. However, once uploaded many of the exclusive rights that the individual has over the video are granted to YouTube in the terms of service. YouTube may, for example, republish your videos in other parts of the YouTube system, and use your videos to raise revenue through banner advertisements. However the license that grants YouTube the rights to use uploaded videos is terminated once the videos are deleted from the service (See YouTube’s Community Guidelines and Terms of Service for further guidance: http://www.youtube.com/static?template=terms).

Along with photos, videos now form an important part of family history so again, it is important to consider their long term maintenance and bequeathment. As with photos, it is best practice to keep the best possible copies of the digital files in a local folder using popular formats such as Mp4, ensuring that additional contextual information accompanies the videos to enable future generations to appreciate their content. Of course, the previously mentioned curatorial and management problems remain.

Problems curating and bequeathing email

Email is one of the more important communications mechanisms in the digital age; indeed, email is commonly regarded as the internet’s “killer application” and has replaced paper letters, memos and notes in many social contexts. Access to correspondence is a very important issue for family history, community history, and history more generally. Correspondence has long been a primary evidence for the construction of these histories, and the move from paper to email has in some contexts severely compromised this important source of evidence. The archiving and bequeathing of emails poses some of the same problems encountered with paper, but also some new ones.

Like paper letters, emails are usually context-specific, personal in nature, and not meant
for broader public consumption. Email services such as Gmail and Hotmail are conscious of this and have strict rules that forbid access to the email associated with a deceased person’s account. Thus emails in general will be inaccessible and destroyed if provision for access has not been made for them before the death of the account holder.

Generally speaking, access to another person’s email account is not available except under a court order, even to next of kin (and from a privacy perspective, especially not to next of kin). Also be mindful that although one generally stores one’s email on the email server, email service providers will only store emails for a defined period of time, after which expired emails are deleted. This being the case, if one wishes to bequeath one’s emails, one must take steps to archive and store them locally, rather than relying upon the service provider to make them posthumously available.

Even though some employers permit the use of their email system for private purposes, many people consider it good practice to use a separate system for private correspondence, perhaps Gmail or Hotmail, rather than using an employer’s system. Work-related email systems usually have their own privacy and ‘terms of use’ policies, and employees using this system for private purposes may have little or no control over these terms and the way they impact email correspondence.

If personal emails are to be archived, they should be appropriately filed and stored offline. A separate email account, or several accounts each with a different purpose, makes this process clearer – though it must be said, this may be more inconvenient than a single account for day to day use. Organising personal and professional correspondence in a thoughtful way is necessary if it is to be effectively archived and bequeathed. Most email clients enable emails and their attached documents to be stored in nested folders, and the structure of these folders should clearly separate out different categories of email, represent the context in which the emails were produced, lay out a coherent history of correspondence, and should be comprehensible in the future not just to the original sender, but to their beneficiaries. This is not a difficult task in itself, but it is time consuming, and requires forethought and motivation.

Problems curating and bequeathing mobile accounts and texts

The procedure for dealing with mobile phones and the SMS texts and data that they contain differs between services providers, but in general, most of the larger service providers have established policies to deal with the death of a client. Procedures usually require the next of kin to contact the service provider on their customer support line and notifying them of the death. The next of kin or authorised representative must provide the appropriate evidence of death, such as a funeral notice, a death certificate, or a statutory declaration confirming authority to act on behalf of the deceased. The next of kin or authorised representative is then required to download, complete, and submit a form outlining what is to happen to the particular accounts.

There are usually two options for dealing with a deceased person’s account; the account may be closed, final bills paid and all data (text messages, favourites, contacts, recent calls etc.) is then deleted. However, accounts may also be transferrable to the next of kin by the authorised representative so that the service is continued. This means that the same mobile phone number is retained and call records, text messages and so on may also be available.

Telcos do not provide for a person to request that their phone account be deleted upon their death, which does raise some privacy concerns. However even if this was the case, there is still the possibility that the next of kin and authorised representative will have access to the phone-handset itself, and if unlocked, will be able to access texts, recent calls, contacts and so on, regardless of the telecommunication companies policies.

Problems curating and bequeathing websites and domain names

Web sites and domain names may be bequeathed to another person with instructions given in a Will and accompanying digital register (see the following section for details). In Australia for example, the regulator of domain names (.auDA) has a policy for transferring ownership of domain names to a deceased person’s estate that applies to the particular domain registrar

that the domain is housed (such as Melbourne IT or Netregistry). In the event of an individual’s death, the domain registrar should be contacted and appropriate evidence of death supplied. It is then a matter of transferring the domain name and the account associated with it to another person (a fee may be charged for this service).

Another important consideration here is that the domain registrar and the web host may be two different companies. If this is the case, the web host will also need to be contacted and again, appropriate evidence supplied. Access to the website files can be granted to next of kin or nominated person and the accounts name and files transferred to the nominated person.

Creating a digital register

A suggested solution to some of the problems mentioned above is to create a digital register (Bellamy et al 2013; Gibbs et al 2013c). A digital register contains the online locations and passwords of online accounts so that the files they hold may be destroyed or bequeathed to friends and relatives as appropriate. This register can be prepared by an individual, or can be arranged with the assistance of a legal specialist in Wills and Deceased Estates and is usually attached as an appendix to the Will. However, in Australia at least, the need to include a digital register as an appendix to a Will is not well-promoted by Wills and Deceased Estate specialists, nor other institutions tasked with managing the affairs of deceased persons, and much more educational work needs to be done in this regard.

Recommended steps needed to create a digital register to accompany a Will are as follows:

  • An audit needs to be done of all digital assets. All services should be considered – iTunes, Flikr, videos, Facebook, LinkedIn, domain names, blogs, websites, email accounts, application software, eBay, PayPal, online gaming accounts, YouTube, eBay, phone apps, data held on the cloud, Amazon, Google Docs, Dropbox, and other data storing facilities that may be associated with work, hobby, or personal business. Also there needs to be consideration of offline digital assets stored locally on CDs, DVDs, hard-drives, USB storage, or even on floppy disks.
  • A decision needs to be made about who is going to manage the digital assets upon the death of the individual concerned. This is usually the Executor of the Will, if they are technically adept enough to locate and access accounts, to identify the files associated with these accounts, and to carry out instructions in respect of these files. Alternatively, a friend or family member may be nominated to assist in this regard. The digital register and associated instructions may be an appendix to the Will, and like the Will, should be kept in a safe place known to the executor. Commercial service providers (e.g. Security Safe or Legacy Locker) offer specialist services that will store important data and passwords that allow nominated individuals access accounts and files in the event of death or disability.
  • Details need to be provided on where to find the ‘digital assets’, and clear instructions need to be given on how to access files and groups of files, and on exactly what to do with them upon death. It is important that information about locations, usernames and passwords are up-to-date as finding and gaining access to accounts after death can be extraordinary difficult, if not impossible, without this information. Enabling the digital legacy to be disbursed or deleted as appropriate, also reduces the possibility of identity theft and the possibility of reputational damage and distress brought to friends and relatives should privacy be violated upon death.
  • All of the above presupposes that a digital legacy is organised, labelled and described in such a way that enables instructions to be executed. There may well be many thousands of files in these accounts, and providing individual instructions for each is impractical. Thoughtful categorisation of files in archives is a useful thing to do for everyday purposes and will also make the job of deletion or disbursement of a digital estate much easier and more effective.
  • If accounts are to be closed immediately upon death, most companies require a formal process in which proof of death is provided (usually a death certificate or published obituary notice) by a person authorised to act on the deceased behalf (usually the Executor of the Will). Alternatively, many accounts will be closed at the expiry of a minimum period of inactivity – which may be as long as 9 – 12 months. If an online repository is to be closed and its contents destroyed or made inaccessible, this minimum period may be too long.

Other things to consider when preparing instructions:

  • If one opts to establish an online memorial site, should this be a Facebook memorial site or perhaps a separate website built specifically as a memorial for friends and relatives to view and interact with? What kinds of material are to appear on the site? Should one record a final video or write a final note to convey to family and friends posthumously or to post on a memorial site? Who will take responsibility for establishing and maintaining the site?
  • Should social-network accounts be closed, or remain open as a place for friends and relatives to converse and reminisce?
  • It is always good practice to create local archives of online personal files periodically. This is increasingly easy to do and most of the larger social software companies (e.g. Facebook, Google and its subsidiaries) now offer account downloading facilities.

Conclusions and future implications

Given the size of the digital economy, and the plethora of services and products now available to the public, it is difficult to ascribe a simple fix to the legacy problems that follow when users of these services die. However this is not to say that developers of software products and services could not do much more to consider the issues that will only become much more acute in the future. Some of the issues are as follows:

  1. There is no single, established mechanism for archiving and re-repurposing the digital artefacts of the deceased, nor to insure their long-term preservation with appropriate descriptive metadata to designate digital items in context. Best practices are still evolving, and must be assembled from multiple sources.
  2. There is no single, established mechanism for establishing and maintaining online memorials. Best practices are still evolving and must be assembled from multiple sources.
  3. Many online systems and service providers do not have procedures in place to cater for the death of a user. The ability to designate an inheritor of one’s data in the user’s preferences or indeed to request the deletion of ones data upon death is missing in almost all systems. This creates unnecessary complications for the next of kin.
  4. There are significant internal inconsistencies and recourse to ad-hoc arrangements in how major companies deal with the death of a client. Even where companies have established policies, the transfer of digital assets to another user is often difficult in practice as these policies are hard to find, are expressed in obscure legalese, are difficult to interpret, and they may have no-one in particular whose role it is to manage the situation.
  5. Currently, individuals need to take responsibility for their digital assets. Most importantly, this includes creating and maintaining a local archive of one’s most important digital assets, making decisions in regard to the disbursement of that archive, and leaving clear and accessible instructions to enable online digital assets to be accessed and then deleted or disbursed as appropriate. This responsibility remains almost entirely unfulfilled.
  6. The importance of creating personal digital archives is not well-established in the popular imagination. The products and services available to facilitate this are inadequate, and digital service providers could offer much more leadership in this respect.
  7. Protocols and practices associated with bequeathment of digital assets alongside material and financial assets in the context a legal Will needs to be further developed by relevant agencies.
  8. Introducing personal archival practices early in one’s life is now an important consideration, given that data is acquired from a very young age, is stored remotely in an ephemeral way, and is easily forgotten.
  9. Institutional archives and libraries could provide a lead in terms of educational material and services in regard to best-practice archiving. Personal digital archives often overlap with local or even national histories so it is in the interests of archives to innovate in this area.

Online service providers that store our assets clearly have a role to play in remediating this situation, but institutional archives and libraries could also provide a greater lead. Protocols and practices about the bequeathment of digital assets need to be further developed to take their place alongside those that pertain to material and financial assets. Individuals and families are in need of educational materials and services for the construction of personal digital archives, and communities are in need of these materials and services for the construction of community and national archives, built in part from an aggregation of family archives. The ability to construct an archive, to designate an inheritor of one’s digital legacy or indeed to request the deletion of all or some of this legacy, is missing in many systems.

The answer is clearly not to be found in devising manual systems, or encouraging people to use manual systems, and we look to a time when the work required to curate an ever increasing digital legacy held by many millions of people may be addressed by automated or semi-automated systems.

One way forward is to repurpose the automated and semi-automated systems used by intelligence services such as Echelon and Prism; by data-mining companies such as Axciom and Neilson Claritas; and by the data gathering and analytics systems used by Google, Facebook and the like to process and store personal information. Our legacy is out there. It just needs to be selectively culled, organised and brought together. The algorithms used by these surveillance systems can search out, identify, tag, categorise and cross reference the plethora of images, emails, and other digital files we produce in a lifetime, using heuristics based on rules we determine, and behaviours we exhibit, to curate and store these files. Such an “intelligent agent”, or “digital curator”, might sit in the cloud, watching traffic across our desktop, pad, and smart-phone, tagging and categorising in real time, learning from our filing practices and generalising from our explicit instructions, requesting advice and permission as needed, thus bringing our legacy together in an organised and comprehensible package. Of course, a fundamental shift in the openness and control of online processes in favour of citizens and consumers is required, and the task of repurposing surveillance systems to create such an agent is clearly a formidable one. But so is the problem. Without a “digital curator”, our history is dispersed to the digital wind – not gone, and even proliferating, but not in relation, and not to hand.

 

Digital death is still a problem. A widow’s battle to access her husband’s Apple account

An exploratory study of digital legacy among death aware people

[Original file here]

By Astrid Waagstein
IT University of Copenhagen

Introduction

 

Abstract

We need to treat the Internet as a new frontier that forms a part of our digital legacy. The things we create as an offshoot of our lives don’t just live with us, in our homes; they live in new forms in a virtual world, which extends well beyond our immediate surroundings. (Richard Banks 2011, 123.)

As people are becoming digital, virtual belongings are becoming deeply integrated into our lives and subsequently our legacies, and these legacies comprise of a combination of life experiences, values and artefacts, including digital artefacts. (Gulotta, Faste & Forlizzi 2012: Gulotta, Odom, Forlizzi & Faste 2013). This means, that not only do we live a great part of our lives online, but we might also leave a great part of our online life behind when we die, and this post-mortem online life potentially constitute what we can call digital legacy.

Every individual produces approximately 88 GB content in a 75-year average lifespan according to Stephen Bulfer, CEO and founder of LifeCellar.com, who made the estimate in 2008 based on numbers from Google reporting, that stated, at the time, they processed 20 petabytes user-generated content each day. To get an idea of the magnitude, 88 GB corresponds to the individual producing approximately 17.6 million documents of size similar to this document, which is approximately 5 KB.

 

However, this estimate might already be obsolete, because not only has digital data become more sophisticated and extensive, the estimate covers only the content we share and produce online and not, consequently, the data we store locally (Carroll & Romano 2011, 39). Hence, we create, co-create and share a lot of digital content every day, and just as its analogue counterpart, digitised documents, letters, photos, music, I argue, play an important role in portraying a person’s life and personality.

But what happens to these digital belongings when we are no longer around to maintain it? And how does our digital death affect ourselves, our loved ones and the generations to come? Let me start by answering the first question with a personal example before reviewing the study in question.

My (very tech savvy) grandmother died in June 2011. She was the one administering her own and my grandfather’s online banking accounts, exchanging emails with the members of the local badminton club and fixing the computer hard- and software when needed. When she died, unsurprisingly she left behind several SNS-profiles3 and password protected devices, which my grandfather had absolutely no idea how to manage or access, nor did his digitally native grandchildren. The effort trying to access her PC was unsuccessful, since no one knew her passwords, and suddenly a chain reaction of inaccessibility started: without knowing the password to her PC, we could not access her email account, and without being able to access her email account, we could not deactivate her Facebook profile and so forth. Eventually we managed to access her laptop, where digital photos, email contacts and other important documents were stored, by crosschecking little password-like pieces of paper, with network, computer, SNS and mobile-logins, but nevertheless the example illustrates that it can be rather complicated for both the individual and the descendants to die in the digital age.

Content is often no longer physically accessible in drawers and old shoeboxes like it was ten or fifteen years ago, but it is stored in the cloud and on password-protected devices, which can paradoxically only be accessed by the deceased. This means that if we do not plan ahead, which very few of us seemingly do, our digital legacy becomes inaccessible. This is a problem on several levels: the bereaved family becomes paralysed when trying to settle the digital estate – and forced data access might violate the posthumous privacy of the deceased, the descendants are without digital heirlooms, and society loses the ability to track the digital dimension of everyday culture. ”If we look to the literature that describes things that happened politically, historically and artistically in the twentieth century, the most important research is based on private archives of letters, notes and manuscripts (É) It is therefore crucial to future historians, writers and journalists that this type of information is preserved digitally”, notes Birgitte Possing, Professor of History at the State Archive (Dannemand Jensen, 2013).

Fortunately, there has been an increasing interest in studying the fields of the research situated at the intersection of death and technology, providing us with new information on how death and dying affects technology and its users and vice versa. Next I will go over related work, focusing on research primarily within the area of Thanatosensitive research. Thanatosensitive research refers to a humanistically-grounded concept that actively considers and integrates mortality, dying, and death into technological research and design, and the idea was introduced by interaction researcher, Michael Massimi, and PhD in English, Andrea Charise (Massimi & Charise 2009, 6-8).

Related work

The relation between death and media is not a new phenomenon. From early print culture to the present digital age, media has always played a role in how we understand death, cope with it, hear and communicate about it and commemorate it (Jones 2004, 87). The difference in the relation between death and media today is, that although in modernity dying and grief are secluded from everyday view, the dead have been given more social presence in society through new communication technologies such as SNS (Walter, Hourizi, Moncur & Pitsillides 2011, 297).

Facebook profiles of the dead keep existing alongside profiles of the living, and bereaved relatives can have conversations with the dead through SNS’s and thereby they are given the opportunity to continue the bonds with their deceased loved ones, almost as if the internet was some sort of digital heaven (Alexandra Sherlock 2013, 166). For some people this ongoing mediated conversation with the dead provides comfort and peace of mind, and for others it seems obscure and morbid. No matter people’s preference, it would seem as if there is no happy medium regarding people’s online presence post-mortem: either your digital footprints remain in cyberspace for eternity (or at least as long as the online services exists) or they become completely inaccessible. As a reaction to this, many online providers such as the Danish Aftercloud (http://aftercloud.co) or American-Canadian PasswordBox (https://www.passwordbox.com) that offers ante- and post-death digital asset management have begun to see the light of day. Some addressing their service to the bereaved family post mortem by helping them settle the digital estate, and others addressing the living intestitate, meaning person formulating a non-legally binding will, helping them plan for their impending death. Evan Carroll and John Romano have also engaged in Thanatosensitive research field, concerning digital legacy management specifically. They have covered important fundamental issues on the safeguarding of digital legacy, and provided their readers with an elaborate strategy for securing their personal digital assets (Carroll & Romano, 2011). The emergence of these online death services, together with an increased research interest in the Thanatosensitive field, suggests that on one hand there is a need for gaining knowledge about how we safe-keep and inherit digital artefacts and on the other hand how we reflect on and perceive digital effects in the context of death and dying. On the basis of research of among other Richard Banks and David Kirk & Abigail Sellen, we have come closer to an understanding of the latter: the value people derive from looking back and the role technology heirlooms play in this regard. According to Banks, objects or heirlooms have the potential of triggering memories, emotions and thoughts of people, places and events, and this is true even for digital objects. Objects, whether they are digital or physical, hold the ability to connect us to ourselves, to other people and to the past (Banks 2011; Kirk & Sellen 2010; Unruh 1983). Thus, making them both sentimental and historically valuable. The notion is supported by studies of home archiving practices, suggesting that cherished and sentimental objects also involve digital items (Massimi & Baecker 2012; Gulotta et al. 2013).

The study in question will follow in the footsteps of the studies mentioned, exploring reflections and thoughts on digital effects, only it will be on a more fundamental level. It seems as though we have not yet tried to comprehend the fundamental awareness of sentiments toward digital legacy, which, in my belief, is an important first step in understanding how people in fact value the digital legacy in order to develop appropriate Thanatosensitive systems.

Problem formulation

To explore the awareness of the digital legacy, I have implicitly4 asked death aware respondents if they can relate to their digital legacy, and if so, how? I have also asked them to what degree they feel the digital legacy is important to them, and what artefacts they regard as valuable and potential heirlooms. The death awareness refers to a state of consciousness that emerges from being either terminally ill, a close relative or nursing staff to a terminally ill person or the like. The death awareness is evoked by the realisation of the irrevocability of death, and it notably affects thoughts and actions of the death aware which presumably might trigger thoughts on (digital) legacy (Waagstein 2013). “People tend to begin planning for death as they become more aware of the finite nature of their lives. This tends to be around middle age; however, death of a loved one can highlight the issue sooner.” (Carroll & Romano 2011, 54.)

The main stakeholders in this complicated area are the living individual, also referred to as the intestates, and the bereaved family. These two groups of stakeholders are in a way interdependent. The intestate is capable of planning ahead and providing the relatives with access to important digitised content ante-mortem5, but bereaved relatives are able to assess what types of digital artefacts belonging to the deceased they value and wish to inherit post-mortem, since bereavement can cause an object’s value to change:

Objects are polysemous (É) the same object can carry with it different meanings for different people, and these meanings can change over time and in accordance with the changing nature of the relationships we have with other people (Ekerdt & Sergeant 2006; Kirk & Sellen 2010). This is true even through bereavement, where artefacts can take on new meaning. (Banks, Kirk & Sellen 2012, 65).

Also, bereaved family members are the ones that experience the consequences of the individual’s planning-or-not choice post mortem. The interdependence, therefore also refers to the shared interest regarding the management of digital legacy, which often exists between the two stakeholders. Family members usually wish to act in agreement with the wishes of their deceased:

Tou can see how fast it goes [with death, dying, accidents etc.], and then IÕm thinking, it must be nice to know the wishes ofyour loved ones. At any rate I know I would like to know the last wishes of my mom (Respondent A).6

I will elaborate on some of the major challenges regarding post-mortem digital legacy management in the final chapter, but next I will turn to the methodological exposition. In addition, it should be noted that the research in question is not theoretical, but rather explores the methodology of this cross-disciplinary research field.

Methodological approach

To gain a better understanding of the hospice environment and to be able to approach the study in the most ethical and moral manner possible, a careful preliminary study into the area of palliative care preceded the recruitment and data collection. The study consisted of a confererence on possible methodological approaches with professionals specialized in palliative care7; Chief of Palliative Research Center, a hospice nurse of development, Chief of Secretariat in Hospice Forum Denmark, and a hospital pastor with specialization in palliative care. The article Tailoring traditional interviewing techniques for qualitative research with seriously ill patients about the End-of-Life was among other readings, a fundamental part of the research preparation. It offers field-tested techniques for interviewing seriously ill individuals and suggests tailored practices for discussions of end-of-life (EoL) issues with the patients (Schulman-Green, McCorkle & Bradley 2010). Even though proxy data was used instead of interviewing dying patients, my belief is that the thoughtfulness and carefulness prescribed in the encounter with EoL-patients is equally important when interviewing hospice employees. They work in a sensitive and emotionally demanding environment and face death and dying every day.

The study is exploratory, which is why no initial hypothesis was put forward regarding the sentiments towards digital legacy. However, it is, as stated, highly motivated by the presumption that few people have thought about their digital legacy, and this is reflected both in the choice of the methodical approach as well as in the choice of respondents.

Empirical data

The empirical, qualitative data consist of eleven semi-structured interviews with women aged between 22 and 64. They are employed by the Danish care sector8 and the majority are between 40 and 50. Nine interviews were conducted with hospice nurses, one with a pedagogue student attending a grief therapy group and one with a doctor, which was also conducted as a pilot interview. The majority of the respondents are bereaved relatives; hence the death awareness, and they all have a certain degree of digital activity in common. Digital activity refers to a day-to-day use of tablets, PC, smart phones or the like.

In addition, an interview with digital legacy expert, Evan Carroll, was conducted together with an interview with the head of a secretariat of the Danish National Association Life and Death. The Carroll interview deals mainly with the perspectives on digital legacy management while the Association’s interview deals with the creation and development of the association’s My Last Will. The will is a non-legally binding document acquired and filled out by many Danes in preparation for their death and funeral, interestingly in August 2012 the Association added the option of writing down one’s pass codes to the will. Furthermore, a discussion about Dane’s perception of Death in the 21st century was initiated.

Apart from the preliminary study, I have operated with a three-step methodological approach consisting of 1) a recruitment process 2) a pre-meeting & presentation of subject and 3) the interviewing.

Recruitment for interviews

The hospice environment is a private and protective institution and for good reasons. A hospice’s main purpose is to protect the privacy of dying patients, who above all need care, rest and peace of mind during the last days of their lives. The initial plan was to recruit dying patients since they are the closest one can get to death awareness, but interviewing patients at EoL stage has its ethical as well as practical challenges concerning both dying patients as well as researchers. Dying patients might be debilitated, their anxiety and emotions can be heightened, and although qualitative interviewers in general face challenges of building trust and obtaining answers to their research questions, these issues are intensified for interviewers of EoL issues because of the sensitive subject matter (Grumann, Mareile M. & Speigel, David. 2003, 23; Schulman-Green et al. 2009, 90). But also the qualitative researcher can be emotionally affected when carrying out sensitive research. Qualitative researchers doing sensitive research risk burning out subsequently if they are not supported with clear research guidelines, e.g. in form of strategies to deal with emotions if research participants die during the research, or if they are not equipped with specific research strategies developed in conjunction with a research supervisor (Dickson-Swift, James, Kippen & Pranee 2007, 345–346).

In the study in question, proxy data was chosen instead of patient informants for three main reasons. Firstly, hospice employees would not be physically challenged by the interview situation like dying patients might be. Secondly, the subject matter would not be as sensitive for the employees to discuss as they were not terminally ill, and thirdly, if the patients were to react with the same surprise towards the existence of digital legacy, as it turned out the hospice employees did, it might cause the patients serious stress as they would not have the necessary time to prepare for their digital death.

The process of recruitment of death aware informants was carefully planned, since it can be difficult to gain access to clinical sites,and it began by collecting stamp of approval from hospice leaders, chief of Palliative Care centers and Grief support groups. The idea for this top-down approach comes from research scientists in Nursing Debra Lynn-McHale-Wiegand, Sally A. Norton and Judith Gedney Baggs (2008, 170-171), and has later been described in Schulman-Green, McCorkle & Bradley’s recruiting techniques for patient informants concerning qualitative research in critical care:

If interviews are being conducted in an institutional setting such as a hospital, nursing home, or hospice, having a staff member introduce the study to other staff members can also assist with gaining access to patient participants (Schulman-Green, McCorkle and Bradley 2009, 92).

One hospice leader in particular found the research project interesting and helped in introducing it to her employees. Emails were sent out describing the study on behalf of the researcher, information posters were hung on the hospice’s noticeboard and the leader agreed to the holding of an information- and recruitment meeting that would give the employees a basic understanding of the concept digital legacy. The pre-meeting was a fundamental part of the methodic approach, since the subject field might be too complex, novel and abstract for the uninitiated (and less tech savvy) to immediately reflect on. Also, it was not expected that the employees would be willing to volunteer merely on the basis of a poster.

Pre-meeting and presentation

The goal of the pre-meeting was to give the respondents a neutral, prior understanding of digital legacy. At this point the respondents had supposedly only read superficial newspaper articles about dead Facebook profiles existing amongst the living or about those upcoming digital death services. However, there is a big difference between having a sketchy consideration of the afterlife of one’s Facebook profile, and reflecting on a post-mortem management of one’s entire digital legacy. My assessment was therefore that an introductory presentation would be necessary since the chance of somebody being capable of answering questions about digital legacy would be rather small. Reflections on the possible negative effect of this pre-meeting on to the subsequent interviews will follow in the next chapter.

The presentation had four overall goals: 1) to enlighten the respondents on the subject field, 2) to make the subject matter as tangible, understandable and applicable to the respondents as possible, 3) to plant a seed of reflection on digital legacy, 4) and to use the pre-meeting as an opportunity to build trust between the interviewer and interviewees – an important step in qualitative research that touches upon death and immortality, and in which “the interviewer can also gain a sense of the participant through informal pre-interview talk (É)“ (Schulman-Green, McCorkle & Bradley 2010, 95; Rubin & Rubin 2012, 92).

Perhaps most important goal of the presentation, however, was to present the subject matter in the most neutral and unbiased manner as possible. If the presentation was not impartial, the researcher would risk making a self-fulfilling presumption of the study. On the other hand, the presentation had to be profound enough for the interviewees to be able to apply information about digital legacy onto their reflections on their own digital legacy. I will reflect on the outcome of the delicate balance of these considerations later.

Picture one illustrates the story of a Danish freedom fighter, Emil Balslev, who was executed in 1944. During World War II Baslev had exchanged handwritten letters with his wife Gudrun, one of them only a few hours before his execution. Gudrun hid all of her husband’s letters in shoeboxes in their home in Roenne, Denmark, and the letters were therefore accessible to Gudrun as well as later generations. In fact, Balslev’s last letter to Gudrun was published in 1945 together with 111 other farewell letters by executed freedom fighters in the anthology called De Sidste Timer [The Last Hours] (Gade 2012).

Picture two illustrates the story of an American soldier, Justin Ellsworth, who died 60 years after Balslev, in the Iraq war. During the war, Ellsworth had exchanged e-mails with his dad, John, just like Gudrun and Emil had, except that Justin and John’s letters were electronically exchanged. When Justin died, his father wanted to make a scrapbook of Justin’s emails and pictures, but he could not access his son’s email account. Firstly, because he did not know his son’s login information, and secondly, because the legal ownership of Justin’s email account had automatically passed down to Yahoo!. To make a long story short, Justin’s father took Yahoo! to court, won the trial and received a CD with the content of his son’s email account (Carroll and Romano 2011, 11–13). Although this story had a happy outcome, the example illustrates that the access to documents, pictures or other important objects is no longer given. We cannot expect our belongings to be physically accessible when we die, but they depend on service providers, such as Google, Yahoo! or Dropbox, or the deceased to grant us access to the digital archives.

While the two first pictures identify the problem area of digital legacy, the third picture concretises our potential, digital legacy by displaying the artefacts we typically store online. The type and size of the digital legacy varies, but it can consist of digital photos or videos, iTunes songs and playlists, digitized documents such as letters, diaries and songs or more official documents such as marriage certificate or contracts. I will describe the types of artefact digital legacy constitute in more detail in the results chapter.

Interviewing

All interviews were conducted one to five days after the pre-meeting, and were for the most part semi-structured. The semi-structured interview form involves, as the name implies, a semi-structured approach to the interview. It can be conducted in various ways, but typically the researcher will follow a set of predetermined topics or open-ended questions that are based on the research question. These open-ended questions will not have a fixed range of responses or a specific order and the semi-structured interview is therefore both investigative and settled. (Given 2008.)

During interviews, five key questions were always asked in order to give the interviewees some sort of direction that could help to answer fundamental matters on digital legacy. Also, when the interviewer knows what she is asking about and why she is asking, a more reliable underlying basis for a later analysis can already be made during the interview by clarifying relevant statements and eliminating ambiguous ones (Kvale 2004, 136).

All questions were formulated partly on the basis of the study’s problem formulation, and partly on the basis of a philosophical, phenomenological approach where the researcher asked herself what questions she would ask is she was to conduct an interview about digital legacy? This type of reflective, methodical grip is typical to the work of the anthropologists, who are as much in dialogue with others as they are with themselves, especially the branch of anthropology called Anthropology of Experience (Turner & Bruner 1986, 13-14).

The approach resulted in a gross list of questions and sub-questions that could be asked depending on the direction each interview took. Besides the five key questions, every interview was initiated with the question: Have you ever thought about the subject matter, digital legacy, before it was presented to you yesterday? It filled the function of giving the respondents time to adapt to the interview situation and, at the same time, getting an impression of the respondent’s prior knowledge of digital legacy. Question 1.a to 1.d shown below were asked depending on the respondent’s capacity to operate information about digital legacy. Together these constitute the first of five key questions:

1. (a) Have you prepared for your death in any way?

(b) How would you like to be commemorated?

(c) The inherent and personal memories of a physical, tangible object such as pictures or letters can help families reminisce about their deceased loved ones. Do you think some of your digital belongings could help your family reminisce about you?

(d) Do any of your digital effects have value to you at present, and do you think they could have value to your family post-mortem?

2. Are there any digital artefacts you would like to have deleted/made inaccessible upon your death?

3. Are there any digital artefacts you have doubts about deleting or securing for posterity?

4. Are there any digital artefacts you don’t care about are being preserved, passed along or deleted?

5. Are there any digital artefacts (hardware, software, passwords etc.) you think would be clever to make accessible before death?

Methods for analysis

The qualitative data was analysed with a mix of two qualitative methods called Summary of meaning and Ad hoc-meaning-establishment, respectively, formulated by Steinar Kvale, Professor of educational psychology and director of the Centre of Qualitative Research at the University of Aarhus. In the former, the researcher reads and listens through the complete transcript of the interview, and subsequently tries to identify the most significant units of content. These units will then be summed up as central themes, which again will be compared to the overall aim of the research study. In the present study the aim was to figure out what the themes tell us about the death aware respondents relation to their digital legacy.

The Ad-hoc-meaning-establishment method is a mixed method approach consisting of various techniques such as quantification of statements, visualising results, generation of patterns, search for plausibility, generation of general impressions etc. The methods can be used separately or jointly and are suitable for bringing out connections and structure in interviews that are not meaningful at first. (Kvale 2004, 201).

The application of Kvale’s methods involved several simultaneous readings of and listenings to the interviews in practice. The readings were both exhaustive and superficial depending on the purpose at the time, and resulted in the emergence of important key themes. To discover patterns and obtaining data overview, a summary of all the interviews was performed, and in-depth readings were performed on selected significant statements in the end.

 

Relating to Digital Legacy

The analysis is divided into three main sections each answering a question stated in the problem formulation. The first section answers the matter of the awareness, the second answers the matter of the respondents’ relation and reactions to the subject and the third answers the matter of the value of the digital. The selected examples below are representative of the information contributed by the respondents through pre-meeting and interviews.

Do the respondent’s relate to their digital legacy?

The term relate to refers to the respondents being aware of themselves possessing valuable digital artefacts. Consequently, they might have ensured the securement and accessibility of the valuable artefacts (without thinking directly along the lines of digital legacy, however). The short answer to the question, whether the respondents relate to their digital legacy, is no. The respondents were not aware of the existence of their digital legacy at all. Despite their death awareness, which among other things is revealed by their use of My Last Will and the fact that many respondents seem to have experiences with inaccessible digitised content both personally and through family, they have not drawn a parallel between these experiences and the existence of their digital legacy:

Respondent B: Teah, so I thought about the problematic before [when my brother-in-law had died and my sister had problems with accessing his computer, red.]. But not in the same way as after the presentation. It became more tangible, more systematic then.

Interviewer: Ok, so what did you think on the subject matter before the pre-meeting?

Respondent B: I hadn’t thought about it, actually (É) and I certainly wasn’t thinking of doing anything about it. Tou know securing it and preserving it. I just wasn’t there yet. But suddenly some aspects were put into relief and I went straight home to my husband and said: How do we handle our digital assets if one of us dies?

Another example illustrates that not even a personal experience with inaccessible hardware is tantamount to one considering making one’s digital belongings accessible. One of the respondent reports that she lost access to her family’s hard drive with all their family photos after her husband’s death since he was the only one who knew the password.

Respondent C: Yes, I have thought about the problems regarding digital legacy before you mentioned it yesterday, because my husband died two years ago. He was an IT engineer and he made sure that I could access all of his online accounts before his death. He had just forgotten about the external hard drive where all his digital photos were on.

However, the same respondent had not thought about ensuring the access to her own hardware and software post-mortem for the sake of her daughter, despite the fact she has experienced problems with inaccessibility herself. This paradox is realised during the interview:

Interviewer: Is your computer password protected?

Respondent C: Yes.

Interviewer: And your daughter, does she know the password?

Respondent C: …No, she doesn’t (pause and thoughtfulness)….That it is actually completely ridiculous. I have been in the exact same situation and haven’t even thought about this. (Interviewee C).

In other words, neither one’s relative’s experiences with inaccessible artefacts nor one’s personal experiences affect the respondent’s general awareness toward digital legacy. However, a general tendency amongst many of the respondents seems to be that a deeper understanding and awareness of digital legacy arises during the interviews, and not only as a result of the pre-meeting. One respondent suddenly realizes that she doesn’t know how to login into the Picasa family photo album, something that she apparently would like to be able to, should her husband die untimely;

Interviewer: So where do you have those pictures now?

Respondent D: Well, they’re on Picasa

Interviewer: And do you know how to access them?

Respondent D: (Pause) No I do not, actually, because my husband created the albums and he always invites me in….. you caught me there. That’s not good.

Interviewer: Okay, so how many pictures do you think you’ve uploaded to Picasa so far?

Respondent D: Oh…a lot!

In summary, both the interviews and the presentation contributed to a situation of change where reflections on digital legacy were initiated and broadened.

How do they relate and react to the knowledge of digital legacy?

With the respondents becoming aware of the existence of their potential digital legacy, it is interesting to examine how they relate to it. Do they consider the digital artefacts equally important as their physical belongings or does the digital have no importance to them at all? The fact that many of the respondents took action the very same day of the interview, making sure that they are able to access shared hard- and software post-mortem, suggests an appreciation of the digital. Action refers in this case to both the physical transfer of data and the obtainment of usernames, passwords and location of digital assets through clarifying conversations with family.

Respondent E: I talked to my husband after that [the pre-meeting, red.], and asked him fi there was anything I needed to be able to access should he be killed tomorrow” or as another respondent puts it: “When you told us about all this yesterday I raced home to my husband and asked him to tell me the password for his hard drive.

Even though the hard drive turned out not to be password protected, the immediate reaction and urge to take action suggests the appreciation of the digital that is mentioned explicitly several times:

Respondent F: I’m not a particularly tech savvy, but I think it’s a really interesting topic. The world is getting more and more digitised and that is why I think it’s important to pay attention to and think about. My son has probably never thought about it so I think we’re going to sit down and have a talk about it at some point.

The respondents have also changed professional practices. A revisit at the hospice six months later unveiled that the employees had begun discussing digital legacy, and passing access codes from patients to relatives.

Securing digital legacy not only refers to the passing of access codes and login information, but also to the backing up of content – especially considering the increasing use of mobile devices. Mobility means that we are carrying valuable digital content around with us possibly resulting in the loss of digital content, if we do not get to back up our content:

Respondent G: I have only transferred them [the iPhone pictues, red.] one time to my external hard drive. It happens that I forget to transfer them for at couple of years, and then suddenly they’re gone because the mobile has been stolen or broke.

In fact, a surprising number of respondents report either broken or stolen hardware, which, besides inaccessibility, is a risk factor that challenges the safeguarding of digital legacy:

Interviewer: Do you take (digital) pictures?

Respondent H: Yeah I do, in large numbers, but we’ve had burglary several times, actually four times in three years. I think we lost a computer twice and in that connection I lost some of my digital photos.

Even though it turns out that some respondents ‘unknowingly’ backup their digital content due to the mentioned fragility of hardware, and write down their passwords in notebooks to support their own memory, the risk of inaccessibly post-mortem is still present. As we see, digital legacy is left with no heir in mind and descendants are left only with disconnected and scattered information, which might or might not be sufficient for post-mortem access.

In summary, the reactions and statements of the respondents suggest that they consider the subject matter relevant, important and topical. The new knowledge has resulted in the discovery of a need to deliberately secure their digital assets both professionally and personally as they appreciate the digital. Respondents also ‘unknowingly’ back up their digital content in order to prevail loss. However, this act alone does not secure access post-mortem as descendants might lack a transparent system for post-mortem access.

The value of digital things

While the previous sections showed that the respondents regard their digital belongings as valuable, this section outlines

  • the type of digital assets that the respondents have, at some point, termed ‘worthy of preserving’. The majority of the
  • digital artefacts that are considered valuable are digital content, which makes sense since typically the photos on the camera, and not the camera itself are what has sentimental value to us (unless the camera belonged to, say, our deceased granddad).

However, in the digital age, hardware, content and passwords are interdependent. Digital content cannot exist without being stored on hardware or cloud services, hardware would be worthless without its content, and passwords are the key to accessing all the content. ‘Digital legacy’ therefore applies to everything from content, account passwords and usernames to hardware.

The degree of appreciation for the digital artefacts was assessed on the basis of statements, the statements’ emotional accentuation and the context of the statements that resulted in a qualitative scale of value ranging from ‘not valuable at all’ to ‘very valuable’. The most treasured digital artefacts between the respondent’s are displayed in Figure 3. Furthermore the value scale is divided into artefacts primarily representing a practical value, a sentimental value or a historical value. Next, I will give a few selected examples of digital artefacts with a sentimental, practical and historical value, respectively.

The ability to juxtapose digital objects with physical objects plays a great role in the assessment of the digital value to the respondents. People typically acknowledge the value of an old photo regardless of time and place, and thus it is so much easier to imagine the long-ranged value of a digital photo than it is to see the value of a blog or a Facebook profile. Maybe this could be one of the reasons why almost all the respondents stress the value of digital photos in particular:

A patient once reminded me that you can always buy a new sofa, but you cannot buy new photos. I thought about it and realised that fi your house burns down to the ground, it’s potentially the memories of a whole lifetime that are lostÉOn the basis of this conversation I bought myself a new hard drive. (Respondent H).

Also, digitised documents such as personal letters, poetry, songs, blogs, digital playlists and SMS’s are denoted as sentimentally valuable. One of the respondent e.g. reports that she has kept and printed out the SMS’s of her late husband which she received during his spell of sickness:

 

 

I received a lot of texts from him when he was sick. Because he was hospitalised I wasn’t allowed to stay overnight and so we texted each other. We texted a lot and I wanted to keep those texts, so I sent them to my email address and printed them out. (Respondent C).

In this case the text also takes the form of a digital heirloom that helps the respondent reminisce about her deceased husband. It does so in a manner very personal and vivid since the text was written by deceased. According to HCI researchers Richard Banks, David Kirk and Abigail Sellen (2013) who have focused some of their research on technology heirlooms, the recollection of the past is the first task of the heirloom:

Artifacts play an important role as triggers for personal memory. They help in the recollection of past experience and in reminiscing about people, places, and times gone by. Of particular interest to us is one type of artifact, the heirloom, which may also have rich connections with memory, but often through the lens of the life of a deceased member of a family, or a friend. (Banks, Kirk & Sellen 2012, 63).

The inherent stories and memories of places, people and a time gone by are also what constitute the historical value of an artefact, which in many cases are pointed out by the respondents:

Respondent F: I remember when the whole family sat together and watched old slides. It was so fun to see how my grandmother was dressed at that time. And I’m thinking, that my digital photos might give my son the same joy eventually, because they [photos] do in fact represent a piece of history. You can see how people looked in the 60’s, 70’s and 80’s.

Another respondent reflects about the historical value in the following way:

Respondent I: I want my daughter to be able to understand who I was even if I die young, and I hope she can do that through the stuff I leave behind – also the digital. I have always thought that old diaries, letters or photos were quite magical because of the insight they give you into another time.

Though it is the sentimental value that is mainly discussed in the present study, many of the respondents touch upon issues with postmortem access to both public and private online services and settlement of estate Ð also digital. A young respondent whose father died recently expresses the overwhelming amount of practicalities her family faced after his death, many of which required online access and the knowledge of deceased’s login information:

Respondent J: There were so many things that we had to take care of I can’t remember them all, but it was things like cancellation of subscriptions, -memberships,, -orders, report moving, manage online banking affairs so my mother wouldn’t be financially strained in the time after his death. And I remember that we were so grateful that we knew his passwords. I also remember that he had placed all these orders on camping gear but we didn’t know where to pick up it up because the information was in some kind of mail we couldn’t open it in the end we just gave up.

The example illustrates that the tasks of settling an estate can be extensive and, what is more, is often needs to be handled while simultaneously dealing with the loss and organizing the funeral. Also, much of the existing post-mortem settlement requires online access and knowledge of the deceased’s login information Ð login-knowledge that has a practical value to the surviving family post-mortem, but which they often do not have. Two more things to add to this notion is that bereaved relatives might have to face uncomfortable situations when they handle unsettled digital legacies of those who die (Massimi and Baecker 2010, 1826), and forced data access might violate the posthumous privacy of the deceased. There seems to be very little support for post-mortem privacy Ð referring to an individual’s right to preserve and control what becomes of his or her reputation, integrity and dignity after death Ð and it therefore needs a closer inspection in common law (Harbinja & Edwards 2013, 102–104; Tungare 2012, 1Ð2).

The issues described above are only some of the problems researchers encounter when trying to map out the landscape of digital legacy management. Unfortunately, there is no simple fix to ascribe to this subject matter but we can start by trying to at least frame some of the challenges of this highly complex and still changing culture.

Discussion and Future Work

This exploratory study on the awareness of and sentiments toward digital legacy shows that even though respondents have had experience with inaccessible digital assets personally or through family or friends, they were not at all aware of their digital inheritance before the problem was presented to them. When made aware the respondents expressed a large desire towards ensuring their digital artefacts for their families and themselves, as they felt that their digital effects have value. The validity of the respondent’s statements can be confirmed since a revisit to the hospice unveiled that action on the matter of securing the digital had been taken: the employees had begun discussing digital legacy and passing access codes with patients. The digital artefacts reported worthy of preserving consist of everything from digital documents (personal letters, poetry, songs), digital photos, SMS’s, blogs, playlists, e-Boks9 contents, access to online banking, hardware and password itself, all of which are displayed in Figure 3. The value of the digital is classified as mainly sentimental or practical but all artefacts possess an inherent historical value on par with physical assets pointed out by the respondents. Respondents back up their digital content occasionally (with the exception of mobile hardware) due to the fragility of it, but since securement is not made with descendants in mind, the surviving family might be left only with scattered and unintelligible login information. Overall, the results suggest that dying in the digital age is rather complicated for both the individual and the descendants.

Although not representative, the study in question points towards important views on digital legacy of death aware. The awareness of the existence of digital legacy at present is still rather small, but as we slowly become aware of the existence of our digital legacy and realize the value of our digital belongings, the need for providing people with suitable ways of safekeeping their private digital belongings will increase. Next, I will give my recommendation for future research and I will reflect on some of the major challenges this research area currently face.

As stated earlier, the study is qualitative and therefore not exhaustive. The goal of this study was not to put forward an exhaustive list of potential digital heirlooms, but rather to explore the knowledge and sentiments toward digital legacy, and to see if digital objects are treasured at all. However, since previous studies (including this) seems quite limited in terms of dispersion of informant types and sample size, and because similar studies conducted on the subject matter draw different conclusions regarding the value of digital affects, further and broader investigation into the subject matter is needed: one study on home archiving practices comparing physical and digital mementos suggests that physical mementos are valued more than digital mementos (Petrelli and Whittaker 2010), and yet other studies rank the sentimental value of digital objects alongside physical (Kirk & Sellen 2010; Gulotta et al. 2013; Massimi & Baecker 2010). In addition, it is important to consider whether digital and physical objects should be compared at all in future, or if digital objects should rather be explored on their own terms. Furthermore, the distribution of male and female informants in future studies on digital legacy should be considered given the potential differences in attitudes towards materiality across gender: men presumably have a more instrumental approach whereas an affective approach seems to better reflect female behaviour (Doka & Martin 2010).

Cohort differences might also influence the outcome of such studies (Hunter & Rowles 2004, 344) and undoubtedly, there are still differences in what types of digital data that are meaningful and valuable to the intestitate compared to those meaningful and valuable to the bereaved relative. Exploring these differences in stakeholder attitudes seems particularly relevant since studies show that surviving relatives might hold on to objects because they feel obligated to, not necessarily because they value them (Banks 2011).

As mentioned, there are also some challenges of greater scope on the road to an applicable solution. Besides the more “familiar” challenges such as incompatibility across platforms (Jones 2004; Carroll & Romano 2011), questions of longevity of digital data (Petrelli &Whittaker 2010; Waagstein 2013), alleged sequestration of death in Western societies (which might or might not affect our relation towards digital legacy and our interaction with Thanatosensitive systems) (Kübler-Ross 1969; Ariés 1975; Elias Nobert 1985; Howarth 2007; Walter et al. 2011); we are first of all challenged by people’s general unawareness of digital legacy. Unawareness is not in itself problematic, but since it can cause inaccessibility and the potential loss of private digital legacy, it becomes an issue. As Carroll and Romano put it: “No matter what your wishes are for your digital content, access is an important issue to resolve“ (Carroll & Romano 2011, 76). Secondly, we lack common practice and case law that allows us to manage, bequeath and organise our valuable digital possessions, not to mention laws and practices allowing us to take ownership over our digital assets (McCallig 2014). The study in question showed that respondents want to safe-keep their digital content for themselves and for their family. However, without applicable systems or laws that renders digital legacy management possible, there is only so much we can do to prepare for our digital death, and this is according to professor of Law Naomi Cahn “becoming a huge problem” (pbs.org 2013). A third major challenge concerns the immense and growing size of the private digital economy and the potential information overload we risk exposing our next of kin to (Banks 2011, 10; Bellamy, Arnold, Gibbs, Nansen & Kohn 2013). Van der Hoven et al. states: “People increasingly have vast collections of digital media about their pasts, including photos, texts and music files (É) and they collect because they can” (Van der Hoven, Sas & Whittaker 2012). The ease with which you can create, copy, share and distribute data in the digital age combined with people’s resistance towards deletion and the fact that we are not as good as organising data as we might think, is already becoming a post-mortem issue (Bergman et al. 2009; Whittaker, Bergman & Clough 2010; Odom et al. 2010). Various research on how we organise, manage and archive our digital belongings has already been initiated and Thanatosensitive design prototypes has been developed (e.g. Gemmel et al. 2006; Wiley et al. 2011; Banks, Kirk & Sellen 2012; Kirk et al. 2010). However, it would be interesting to explore how might quantity affect people’s perception and appreciation of the digital. In sum, addressing some of these challenges and suggested research approaches is part and parcel of making a sound argument for future interventions that will make the digital afterlife more easily managed, whatever form they may take.

 

 

Biographical note:

Astrid Waagstein holds a Master’s degree in Information Technology from the University of Copenhagen and an undergraduate in Rhetoric from the University of Copenhagen. Her research interests lie in the cross-disciplinary field of thanatology (death studies) and HCI research and design, with a focus on the interplay between ante mortem and post mortem life and digital material culture. Contact: awaa@itu.dk.

Creating and curating a digital legacy (abstract)

Click here to view original web page at Life beyond the timeline: creating and curating a digital legacy

 The internet has steadily become integrated with our everyday lives, and it is scarcely worth remarking that the quotidian footprint we leave is increasingly digital. This being the case, the question of what will happen to our digital legacy when we die is an increasing important one. Digital accounts containing emails, photos, videos, music collections, documents of all kinds, social media content, eBooks and the like, all trace the life we have led, and if they are to be conserved and bequeathed, if family and friends are to benefit from this often highly emotive and evocative desiderata, if history is to be recorded, we need to prepare these accounts and assets for the inevitability of death. A difficulty though, is that the demands of curating such a legacy are formidable, the importance of creating digital archives from personal data contained in online accounts is not well-established in the public arena, and the products and services available to facilitate this are largely inadequate. Future generations and future historians are the poorer for this. In this presentation we will point out some of the difficulties involved in curating and bequeathing a digital legacy, and suggest a partial remediation.

Full article here

Digital Legacy Association urges hospices to support patients in managing their digital estate

The Future of Our Digital Selves

By Jess Myra

ABSTRACT

This paper presents insights on designing interactions for digital immortality after bodily dying, and will deal with factors of interactions with the digital archive for those who stay alive.

Current instruments for digital memento and digital archive administration will not be supposed to perform for submit-life communications and don’t sufficiently take into account the longevity of content material, digital legacies, and relevancy of content material over time.

Conclusions and insights from graduate thesis analysis are offered right here to tell applicable interactions for digital immortality. It will embrace how cultural legacies of the previous can encourage digital legacies for the long run. Also, correlations will be included from a survey addressing mementos, digital legacies, digital will planning, digital archives, and the dying of family members.

Considerations

Results offered listed here are primarily based on interviews and a web-based survey. This survey had a complete of one hundred fifteen respondents and integrated qualitative and quantitative questions. Input strategies had been through radial button choice, a number of checkbox choice, and free textual content entry. Questions coated normal demographics and 6 subsections (conventional mementos, digital mementos, digital will, your legacy, these gone, digital archives) totaling 31 questions with the choice for suggestions on the finish.

Participants had been unfold throughout 22 international locations, with most respondents from North America (60%) and Europe (24%). Gender division was males (sixty one%) and females (39%). The majority of respondents had been working professionals (seventy five%), with lesser respondents as numerous sorts of college students (18%), with nominal respondents both a keep-at-dwelling dad or mum or as “different”.

Introduction

Dusty picture albums and containers of letters (conventional mementos) are being changed with laborious drives and cloud storage (digital mementos). Instead of fading pictures and ink, we now have the endurance of digital bytes. As we transition to this new kind of digital content material administration, traces of ourselves begin to manifest that will retain life far after we die.

In human historical past, there has at all times been a want to go away a legacy and be remembered. This occurs at varied scales whether or not as a civilization, tradition, household, or particular person—suppose pyramids to gravestones. In trendy instances, our channels of communication have shifted from conventional to digital memento administration.

This compulsion to seize our lives for posthumous remembrance is named thanatography. This paper explores interplay alternatives for a way our digital legacies may be eternal and retain relevance to these dwelling lengthy after our loss of life. This a brand new strategy to human-pc interplay analysis in submit-life digital humanities referred to as thanatosensitivity.

Cultural Legacies

An essential half of analysis for this thesis examined cultural legacies which have survived all through the generations. Studies included: on-website visits, interviews with anthropologists, audio guided excursions, commentary, and reflections leading to matter upsetting questions.

The purpose of this portion of analysis was to find how present behaviors and historic societies can encourage the legacy of digital content material for the next generations of technocrats. The following cultural legacies had been examined:

Native American Totem Poles, Vodou Spiritual Communications, and Icelandic Sagas.

Traditional Mementos

Traditional mementos are sometimes simply significant to the person who owns them and so they doubtless don’t even keep in mind the final time they dealt with them. Comparatively, many individuals need to be remembered lengthy after their dying so the paradigm of coveting private objects as a technique to retain a legacy to go on to others is just not very efficient. The which means and worth of conventional mementos can simply be misplaced to the following sequence of receivers.

Digital Mementos

We are amassing gigabytes of photographs, movies, and emails and we wrestle to parse significant content material at related instances from the collections. Web companies like Flickr, or software program purposes like iPhoto add some readability with organizational strategies like date stamping or tagging. Facebook’s implementation of the Timeline additionally helps us to reßect on shared moments primarily based on years of our lives. Yet, why is a date, key phrase tag, or yr related after we die? Does this meta knowledge add worth to our digital legacy when individuals need to entry it later?

The Archive

The digital archive is a set of all digital content material that the particular person owned together with the digital pictures, video, audio, emails, tweets, and textual content messages from that one particular person. However, the traces between digital archives aren’t so distinct. Typically, digital media is shared with others. Our milestone moments and recollections have worth as a result of we expertise them with folks. Consider the shared mementos between a household, or tight community of mates. The digital archive of somebody who has died in that context is considered much less as ‘theirs’ and extra as ‘ours’.

 

Ownership

We settle for a broader possession of digital content material as we tag our pals, they usually tag us, and we every share the identical content material independently by way of totally different shops. With so many channels obtainable to entry and share digital content material, and a lot of our time now being devoted within the digital realm, there’s a bigger viewers accessible that’s unparalleled by our conventional mementos. There is larger alternative to replicate our digital selves ahead to be remembered by future generations and extra importantly, to offer worth for them by way of our digital archives for an extended interval of time.

Everlasting Presence

As traces of our digital selves persist after we die, there’s alternative leverage digital media so our lives can proceed to be significant for our family members. We can retain relationships with folks we care about and make our life experiences out there for his or her profit. In essence, we will persist digitally to some extent after bodily demise.

Current platforms that exist haven’t been constructed for the performance of put up-life content material administration. Facebook’s Memorial pages are static archives in an energetic public platform that don’t handle the sensitivities of particular relationships. The Timeline group of content material is sensible for our personal self-reflection in life, nevertheless, as a digital archive it doesn’t present direct worth for others.

Remembering the Dead

One of the largest challenges with digital immortality is retaining relevancy of our digital content material over time so our lives might be precious and significant to future generations. In the interval instantly after loss of life, household and pals mourn and undergo the grieving course of. After acceptance of the dying, the particular person is remembered by these surviving by way of recollections and mementos. If the particular person was recognized first hand in life, triggers reminiscent of a spot, date, or scent can recall shared moments. However, what occurs generations after the demise of somebody and people people who knew them in life additionally cross away? How can somebody who has been lifeless for a very long time retain a legacy in digital content material that will have which means to future generations.

Activating Archives

Now we have now the chance to leverage qualities of digital content material to help differing types of relationships into the long run. With the copious quantities of knowledge being collected and shared about our private lives, there’s alternative to remain linked in new methods after dying. Algorithms primarily based on persona and character traits can auto-put up on somebody’s behalf—as seen within the new on-line service LivesOn that will tweet for you past the grave. Similarly, providers like Dead Social and IfIDie permit customers to ship preplanned messages in social media after demise.

Intersections of Life

However, not represented within the present suite of publish-life digital companies are the advantages of shared life experiences and commonalities throughout digital archives after dying. Namely, the second of overlap between somebody’s life and a digital second from somebody who’s lifeless might be beneficial in numerous contexts.

These corresponding life experiences will be accessible from the archive of people who have died to supply a brand new foundation for empathy all through life phases of the dwelling that the deceased can contribute to. This offers a chance to find new views on folks you thought you already knew, or new commonalities with a relative you by no means knew in life. Commonalities and shared experiences are timeless. They retain worth in new methods to totally different individuals, for various causes, at totally different moments.

Because now we have varied levels of relationships with individuals, we frequently wish to share and bear in mind folks in numerous methods primarily based on how we knew them. Also, the sort and quantity of info we will wish to share will depend upon how shut we’re to them. Thus, utilizing public platforms to serve the aim of many levels of relationships will not be applicable. It doesn’t fulfill the specificity of private relationships, and imposes moments within the public sphere that will possible not be anticipated and doubtlessly not desired as nicely.

CONCLUSIONS

With new retailers for connecting to a bigger viewers, and with traces of ourselves which can be left behind in digital media, it’s extra essential than ever to think about features of possession, longevity, and relevancy over time of our legacy after dying. Different from previous traditions, the long run of digital content material administration permits us to preplan and increase our digital archive to stay linked with family members and people in our social community lengthy after we’re bodily gone.

Through my analysis, I consider present present platforms don’t leverage digital media adequately for submit-life legacy in an lively contextual manner, nor does it assist the wants of these near us as a platform for communication and reminiscence in our bodily absence. I consider the traces between particular person digital archives are blurred and there may be alternative for our life to retain relevance far after we die by leveraging the worth of commonalities throughout our digital archives. Through shared recollections and availability of empathetic experiences, our lives can have that means over time through the wealthy digital content material that aggregates all through our lives.

There is a brand new alternative introduced to us that didn’t exist earlier than with conventional mementos. Fortunately, we’re in management and will get to determine what it means to command our put up-life digital selves—ought to we select to.

Learn How to Preserve Your Data with Take Control of Your Digital Legacy

Death and the Internet: Consumer issues for planning and managing digital legacies

Authored by Dr Craig Bellamy, Dr Michael Arnold, Dr Martin Gibbs, Dr Bjorn Nansen, Dr Tamara Kohn

Published in 2013

The operation of the Australian Communications Consumer Action Network is made possible by funding provided by the Commonwealth of Australia under section 593 of the Telecommunications Act 1997. This funding is recovered from charges on telecommunications carriers.

University of Melbourne

Website: www.unimelb.edu.auEmail: martin.gibbs@unimelb.edu.auTelephone: 03 8344 1394

Australian Communications Consumer Action Network

Website: www.accan.org.auEmail: grants@accan.org.auTelephone: 02 9288 4000 TTY: 02 9281 5322

ISBN: 978-1-921974-14-4

Cover image: Justine Donohue 2013

This work is copyright, licensed under the Creative Commons Attribution 3.0 Australia Licence. You are free to cite, copy, communicate and adapt this work, so long as you attribute the authors and “University of Melbourne, supported by a grant from the Australian Communications Consumer Action Network”. To view a copy of this license, visit http://creativecommons.org/licenses/by/3.0/au/

This work can be cited as: Bellamy, C., Arnold, M., Gibbs, M., Nansen, B. and Kohn, T. 2013, Death and the Internet: Consumer issues for planning and managing digital legacies, Australian Communications Consumer Action Network, Sydney.

 

Acknowledgements

The authors would like to express thanks to the ‘key informants’ in this study whose views were invaluable in guiding the direction of the report and helping us to map the complex terrain of managing digital legacies. Many of the key informants are from leading archives, telecommunication companies, religious organisations and online memorial companies but due to ethical considerations cannot be named personally in this report. The support from The University of Melbourne and, in particular, the Interaction Design Lab in the School of Computing and Information Systems has been invaluable through the provision of a supportive research environment. We would also like to especially thank the Australian Communications Consumer Action Network (ACCAN), who supported this research through their grants scheme and were proactive and generous in their impartial and professional feedback on drafts of the report.

 

Executive Summary

The growing use of software applications in the home, the workplace, and in public places has resulted in the increased production and use of personal digital files. These digital files may take the form of emails sent to colleagues, photos of family and friends taken on a camera or smartphone, music downloaded from a number of different services, or videos taken at weddings or birthday parties. In this environment of increased data production and usage, unavoidable questions arise as to what happens to these files when a person dies. This report considers this question in regards to a broad spectrum of digital media types and services with a particular emphasis on describing the current ownership and privacy issues, which are key to understanding how digital files may be bequeathed to another person.

There is, in general, a lack of understanding about the rights consumers have over the digital files they buy or produce that has implications in the context of death. The purchaser of a physical product such as a book, a CD, or a DVD has certain ‘normalised’ rights over the product such as to give it to another person. This is termed ‘the right of first sale’. This allows for gifting, lending libraries, secondary markets of copyrighted work (such as book stores and second-hand record shops) and for bequeathing a collection of books or CDs to relatives and friends. However, regarding digital products and services such as eBooks and music streaming services a different set of distinct and separate relationships are in place and it is not always clear what the consumer’s rights are in the context of death and the bequeathment of digital items.

Consumers need to be made aware that when they press the ‘buy’ button on an eBook or music file that they are not really buying anything at all. The appropriate term is ‘rent’ or ‘loan’ as there is usually no transfer of property in the transaction, only a limited right to use. In addition, the delivery methods of digital products are changing rapidly so increasingly there is no physical copy of the digital products, coupled with the inherent ‘right of first sale’ licence embedded within the physical copy. The situation is bound to become even more convoluted with the increase of cloud services to deliver entertainment and other software services where there is no transfer of a digital file or ‘property’ in any meaningful sense of the word from one party to the other. Thus, the ability to bequeath something to another person is challenged if it is not owned in the first place, or if there is no local copy.

The issues of ownership of digital files and their transfer to another person, contractual obligations, and the maintenance of digital files over time are key issues in the emerging digital economy. Although it is not possible to comprehensively explore these debates across all the industries and services that make up the digital economy here, what we can do is outline some of the innovative and practical responses to the management of digital legacies and the key issues that surround them for consumers. Some of these responses include new services to allow the download and storage of data locally and then the ability to request, for instance, that all the data held by the online services is deleted upon death. Other responses include ‘digital lockers’ where passwords and important digital files may be stored and accessed by an Executor of a Will, friend or relative upon death. Many

 

legal professionals and estate planners suggests the inclusion of a ‘digital registrar’ in a will that states the location and passwords of digital accounts with additional instructions such as ‘delete all files’ or ‘create an online memorial’.

Digital files of all types now constitute an important part of our personal and family histories, thus the ability to transfer them to another person is of vital importance for the transfer of family heritage from one generation to the next. The loss (or at least changing nature) of certain property rights within the digital economy impede the ability to transfer some copyrighted material to others, thus consumers need to be aware of this and create strategies to prevent their important digital legacies being lost through non-transferability. Companies within the digital economy also need to make consumers aware of their rights over materials such as music and eBooks as there are still many misunderstandings about them that originate in the normalised copyright relationships of the pre-digital economy. Companies also need to create new products to make the task of planning and managing digital heritage easier and there are positive steps emerging in that direction.

 

Table of Contents

Acknowledgements………………………………………………………………………………………………………. i

Executive Summary………………………………………………………………………………………………………. ii

Background and Context……………………………………………………………………………………………….. 1

Methods…………………………………………………………………………………………………………………….. 2

Discussion…………………………………………………………………………………………………………………… 3

Property and privacy………………………………………………………………………………………………….. 3

Wills and digital registers…………………………………………………………………………………………….. 4

Personal digital archives……………………………………………………………………………………………… 6

Online Memorials……………………………………………………………………………………………………… 8

Issues in bequeathing key digital media types………………………………………………………………….. 12

Music……………………………………………………………………………………………………………………. 12

Images………………………………………………………………………………………………………………….. 13

Video……………………………………………………………………………………………………………………. 13

eBooks………………………………………………………………………………………………………………….. 14

Email…………………………………………………………………………………………………………………….. 14

Mobile accounts and texts………………………………………………………………………………………… 15

Web sites and domain names…………………………………………………………………………………….. 16

Future Implications……………………………………………………………………………………………………… 17

Further Reading…………………………………………………………………………………………………………. 19

Authors…………………………………………………………………………………………………………………….. 21

Trademarks………………………………………………………………………………………………………………………………………………………… 22

References…………………………………………………………………………………………………………………………………………………………. 23

 

Background and Context

In previous generations only individuals with a public profile, such as politicians and leading entertainers, needed to be concerned about their posthumous media legacy. For celebrities a life in the public spotlight was a matter of record with key events, relationships and achievements recognised and documented for private and public purposes. For these individuals, a legacy of letters, papers, photos, films and other aspects of a prominently recorded life needed to be managed and curated for the historical record; perhaps to be donated to an institutional archive or given to family members for use in family histories and memoirs.

It is arguable that today this situation has been democratised, and in a sense, almost everyone is a celebrity in so much as ordinary people are routinely creating a digital record of everyday life and in the course of everyday life are assembling a media legacy of considerable personal volume and importance. This digital legacy will commonly include email accounts of work-related or personal emails, social network accounts on services such as Facebook and Linkedin, music accounts on services such as iTunes and Spotify, images on services such as Flickr or Picasa, videos on services such as YouTube, documents of many kinds on cloud storage services such as DropBox – some of which may be encrypted, and books and newspapers on services such as Kindle.

In this context, what happens to our ‘digital legacy’ upon our death, and how it may be passed from one generation to the next, has become an increasingly important question. Some aspects of our digital legacy may have a monetary value, such as online auction, gambling and financial accounts, and some aspects of our digital legacy are of personal value, such as videos, documents and photos. Digital technologies are increasingly utilised in daily life and are important records of a life lived, especially to friends and family who wish to remember us. Without considering the management of this digital legacy, there is a danger that it will become inaccessible and/or destroyed when a person dies. It is the responsibility of consumers to be proactive and manage their digital legacy, but digital services providers also have a responsibility to provide quality services, and locatable information and policies to assist in this process.

 

Methods

This study of digital legacy has drawn from a mixed-method approach that relied on three sources of information. The first was information provided by ‘key informants’, that is, semi-structured interviews with a number of individuals in various professions and industry sectors that have expert knowledge of the issues surrounding the management of digital legacies in the context of death. These professionals included spokespeople for various religious groups, senior executives of telecommunications companies, estate planning lawyers, moderators of online memorial sites, Internet service providers, and national and institutional archives. For ethical reasons, and because of some restrictions by their employers, the informants’ quotes remain anonymous in this report. The second source of information was the literature on death, memorialisation, and digital legacies, and our interview questions and subsequent responses were contextualised within this literature. The third source of information was the existing terms of service and policies of leading social media and telecommunication companies that provide services relevant to digital legacies and digital memorialisation.

Using this approach we were able to develop a generalised, conceptual understanding of the key considerations for bequeathing, memorialising, and preserving digital materials in the Australian context. Each digital media type, along with their associated industry and service provision, differ in terms of how they approach the death of a client and given this scope it is not possible here to provide a comprehensive view of the landscape. Nevertheless, some key and consistent issues emerge that primarily circulate around notions of ‘property’ and ‘privacy’. The issues associated with consumer rights in terms of ownership and transferral of digital files are emerging in debates in the US and EU, but have not yet matured in the Australian context. These debates have implications for the many issues associated with digital legacies and bequeathing digital materials.

 

Discussion

Property and privacy

There is a variety of different places where data may live and if someone passes away questions arise as to whose data it is (Chief Regulatory Officer, Major Australian Internet Service Provider).

The question of who owns what in digital environments is complex and is an important consideration in determining what may be bequeathed to others upon death. Digital property may include emails, photos, blogs, web-sites and URLs, electronic documents, music files, content uploaded to social media accounts and so on. Ownership of digital media and the conditions of posthumous access to it will usually depend upon the particularities of the Terms of Use Agreement that were entered into when the deceased signed up for an online service. Overarching contractual rights, intellectual property rights, and various forms of copyright law further complicate the situation. In addition, digital media may be held locally on a hard-disc or may be held remotely on a server, very often in another country and in another legal jurisdiction.

Conditions [terms of service] can change rapidly and often allow for retrospective re-writing of the conditions (Adjunct Professor of ICT, University of Melbourne).

So while there are well-established procedures for locating, valuing and transferring ownership of physical property such a real-estate, cars and books, the task of locating, accessing and disbursing digital assets after death is often more difficult. For example, many online services (i.e. Facebook, iTunes) have Terms of Service agreements that disallow the transferring of an individual’s account to another individual. The companies in question have agreed to provide a service to a named individual: the agreement, and the service provided, terminates upon that individual’s death. Many years of photos, videos, text files and other digital files and documents uploaded to an online service may be lost forever if posthumous access to them is not arranged and local copies are unavailable.

In physical items it is the physical item that embodies the licence and effectively the physical item is the licence, whilst in a digital transaction, the digital transaction defines the terms of the ownership, if any (Adjunct Professor of ICT, University of Melbourne).

A common-sense solution to this problem that appears to be emerging is for individuals to provide a list of services (Flickr, PayPal, Facebook, Dropbox, etc.), and to provide the relevant username and password for each service, along with instructions for friends, relatives and the Executor of the Will to execute upon a person’s death. Common-sense though this may be, it is often against the Terms of Service of many US service providers (Gmail, Hotmail) who prohibit the transfer a username and password to a third party, and forbid any individual from accessing another person’s account, deceased or not. Other online service providers (particularly Australian providers such as iiNet and Telstra) do allow this and consider an individual who has been given the username and password to be an authorised agent of the account’s owner. Of course, for all practical purposes, the identification of the person using the username and password cannot be verified.

 

I can bequeath any physical item under my control before I die, but with non-physical items we usually only have a licence to use so it may not be possible to bequeath (Adjunct Professor of ICT, University of Melbourne).

As with the issues of digital property rights determining what may or may not be done with digital files, privacy is also a key determinant in the Terms of Service policies that guide the use of social media and other software applications on the Internet. Much of the communication that occurs online is between one individual and another and is private in nature, thus Terms of Service policies are designed to protect the privacy of an individual, even in death.

Email is a good example of this privacy issue. Email is one of the oldest and still most common communication modes on the Internet and like paper letters, emails are usually context-specific, personal in nature, and not meant for broader public consumption. Email services such as the US­based Gmail and Hotmail are conscious of this and have strict rules that forbid access to the email associated with a deceased person’s account. Thus emails will be inaccessible and destroyed if provision for preservation has not been made for them before the death of the account holder. This being the case, if someone wishes to bequeath their emails they must take steps to archive and store the emails locally, rather than relying entirely upon the email service provider to make them posthumously available.

It is also good practice to keep private correspondence outside an employer’s email system and to use a separate email system for this type of communication. Work-related email systems will usually be subject to an employer’s own privacy and terms of use policies and employees may have little or no control over these. If work-related emails about specific projects or relationships wish to be kept, they may be downloaded and stored in the same context as other digital objects relating to the projects. This may be subject to legal constraints and taking particular care where property, such as trademarks and patents, are concerned is advisable.

Wills and digital registers

Although not well publicised, an emerging approach to managing digital legacies is the ‘digital register’. Passwords and account locations may be recorded in a digital register to accompany a last will and testament and agencies such as the State Trustees of Victoria do recommend this. A digital register contains the locations and passwords of online accounts so that the digital media and files that they hold may be given to friends and relatives. This register can be prepared by an individual, or can be prepared with the assistance of a legal specialist in wills and deceased estates. It is also possible within a digital register to request the closure of some or all online accounts upon death so that sensitive or irrelevant material is deleted. However, the ability to include a digital register within a will is generally not well-promoted by specialists in wills and deceased estates nor other institutions that manage the affairs of deceased persons. Although there is much information available online, such as templates and other guidance for creating a last will and testament, there is little in the way of guidance for the broader management of digital legacies. Thus it would appear much more educational work needs to be done in this regard.

We need to know who their next of kin is or who is the executor of their estate or what their instructions are for that data stored in their account (Chief Regulatory Officer, Major Australian Internet Service Provider).

In order to partly address this issue, this research leads us to the following recommended steps to create a digital register within a will:

  • Identify Digital Assets: An audit needs to be done of all digital assets. These may include iTunes, Flickr, videos, Facebook, LinkedIn, domain names, blogs, web sites, email accounts, application software, eBay, PayPal, online gaming accounts, YouTube, eBay, phone apps, data held on the cloud, Amazon, Google Docs, Dropbox, and other data storing facilities that may be associated with work, hobby, or personal business.
  • Nominate a Digital ‘Executor’: A decision needs to be made about who is going to manage the digital assets upon the death of the individual concerned. This is usually the Executor of the Will. They should have the technical skills to locate and access accounts, to identify the files associated with these accounts, and to carry out instructions in respect of these files. Alternatively, a friend or family member may be nominated to assist in this regard. A digital register and associated instructions may be included as an appendix to a will, and like the will, should be kept in a safe place known to the executor. Commercial service providers (e.g. Security Safe or Legacy Locker) offer specialist services that will store important data and passwords that allow nominated individuals to access accounts and files in the event of death or disability.
  • List Locations and Access Methods: Details need to be provided on where to find digital property or assets, and clear instructions need to be given on how to access files and groups of files, and what to do with them upon death. It is important that information about locations, usernames and passwords are up-to-date and retained securely. Finding and gaining access to accounts after death can be extraordinary difficult, if not impossible, without this information. Enabling a digital legacy to be disbursed or deleted as appropriate also reduces the possibility of identity theft and the possibility of reputational damage and distress brought to friends and relatives should privacy be violated upon death.
  • Prepare Paperwork: If accounts are to be closed upon death, most companies require a formal process in which proof of death is provided (usually a death certificate or published obituary notice) by a person authorised to act on the deceased behalf (usually the Executor of the Will). They may also require proof that this person is authorised to act on the deceased’s behalf.

Given the current possibilities and limitations for bequeathing digital assets, our research suggests consumers consider the following when preparing instructions in a digital register:

  • Decide what should happen to the content of files stored on cloud services, messages stored in email accounts, images stored in photo sharing accounts and so on. There may well be many thousands of files in these accounts, and providing individual instructions for each may be impractical. Thoughtful categorisation of files into archives is a useful thing to do for everyday purposes and will also make the job of deletion or disbursement of a digital estate much easier and more effective.
  • Decide whether to periodically create local archives (back-ups) of online personal files. This is increasingly easy to do and most of the larger social media and software companies now

 

offer a download facility. However, once the data is downloaded and stored locally it is also important to consider its safety in terms of privacy. If stored on a removable hard-disk for example, consider password protecting or encrypting the disk and keeping it in a secure place, or giving a second copy to a trusted friend or relative for safe keeping.

  • Decide if an individual social media profile will be deleted or memorialised (see Online Memorials section below for further discussion). Or, alternatively, if a memorial site would like to be established as a legacy. If converting or creating a memorial profile it is important to consider what content will be on display, who will be able to view it, and who will be curating or moderating any posts made to the site.

Personal digital archives

Another emerging approach to managing digital legacies is what many leading archives, such as the US Library of Congress and the National Archives of Australia, refer to as ‘personal digital archives’. As previously noted, digital technologies have impacted upon many aspects of contemporary society and economy and organisations have responded to the challenges of the storage of this data and its re-use by building digital repositories at an institutional level, and even at a national and international level. However, personal data – the data relating to an individual’s life – has until recently been neglected in the debates and practices about archiving. So, for example, it is only in recent times that online companies have provided facilities to download personal data for local storage and safekeeping. Some services include:

  • Facebook allows individuals to download nearly all the information they have shared on their timeline including photos. There are also expanded options that allow individuals to view cookies, logins, logouts and many other ways of interacting with the site. See: https://www.facebook.com/help/131112897028467/
  • Twitter also now allows individuals to download their entire twitter archive from the beginning. See:http://blog.twitter.com/2012/12/your-twitter-archive.html
  • YouTube allows users to download and archive their entire YouTube uploads in the original uploaded format. See:http://12starsmedia.com/blog/how-to-download-archive-your­entire-youtube-library
  • Also, Google’s take-out service is a welcome recent initiative which allows users to download and archive data from many of their Google services. See: https://www.google.com/takeout/
  • Downloading and archiving Gmail or Hotmail accounts is a little more difficult as it requires a local instance of a software application such as Thunderbird to download all the emails so that they can be read and stored locally. Once emails have been downloaded, it is possible to export them in different formats and in complete folders. The emails can be associated with a particular project or a particular family member or friend. Other emails that are either personal or irrelevant can be deleted.
  • Another consideration in terms of creating local archives is making sure that local copies are in a format that can be used at a later date and are in the best possible quality. There are a number of considerations here but generally it is important that the files saved are in popular formats that are in general use, such as JPEG or TIFF in term of images, or MP4 in terms of video. However if a MS Word document can be saved as a plain text file without losing too much of its structure, then it should be saved as a plain text file. There are many organisations involved in digital preservation that have published useful tip sheets on

 

creating and maintaining digital archives, and the National Archives of the UK offer useful guidance on                           selecting                    file        types.        See:
http://www.nationalarchives.gov.uk/documents/selecting-file-formats.pdf

In light of the fact that many of the practices and products associated with managing digital legacies are new and in flux, the digital archivists we contacted recommended that consumers be proactive and largely take responsibility for their own digital legacy. Consumers should periodically download and archive all digital files (photos, tweets, videos, documents etc.) and keep them locally on a portable hard-disk. Using this method it is possible to curate the storage disks in such a way that only the files that are wished to be included are available to the friends and relatives of the deceased. Sensitive or irrelevant information should not be included in the archive and may be deleted with the requested closure of online accounts upon death. Only the information on the curated storage disk will be available; perhaps for use in an online memorial or in a family archive.

The stuff we create is often just the record of what we do and how we live our life and was never meant to be published and there are ethical questions about who should see what upon our death (Associate Professor, Digital Archives, The University of Melbourne).

Once all the data is gathered in one place, it should be put into a simple folder structure. There are no strict rules here but generally the simpler and more straight-forward the better (such as ‘photos’, ‘music’, ‘emails’ or ‘Project X’). ‘Metadata’ or contextual information about the items should also be placed in the folder so others know what it is. This may be in the form of a simple text file that describes what is in the folder, where it was created and why, dates, and any other important information considered relevant for use in a family archive. Google’s Picasa photo sharing system has face recognition software to automatically name-tag all the individuals in family photos.

The digital archivists we contacted in the study also recommended considering issues of significance when consumers plan their digital heritage. Important events such as weddings, vacations, graduations, and other life achievements should be deliberated upon in the selection process.

If it is important to you, you need to have a copy outside of that (online) system because in the future it may fail (Associate Professor, Digital Archives, The University of Melbourne).

With all the data arranged in folders and in one place, it may be then placed on a removable storage disk. It is advised by archivists that storage devices such as DVDs, CD ROMS, and flash drives should not be used because they are fast-changing formats and may not be accessible in the future. Also, online cloud services and other digital repositories should be treated with caution as they also may not be around in the future. It is better to use two removable hard-disks, one to be kept in a safe location and one to be given to a trusted friend. In this way, if one of the disks is damaged, then there is a backup copy available. The disks must be updated regularly to make sure they contain relevant information, and also the actual disks should be replaced every 2-5 years.

If you want to pull the data out of a system like Google and Facebook it is better to keep it in
the standardised form in which it comes (in terms of file structures) as it will make more
sense to people in the future, especially if new tools are developed to use it. Also describe

 

where the data came from and what date it was downloaded (Associate Professor, Digital Archives, The University of Melbourne).

Digital preservation is an active and ongoing process and it is important to intervene in the process and manage digital legacies over time. Another tried and trusted method is to print out important documents and images and store them in a filing cabinet as acid-free paper remains one of the most proven long-term preservation formats.

Although personal digital archives are a practical response to the management of digital legacies and are one of the more promising solutions to the preservation of digital files over time, they are also highly reliant upon consumers taking the initiative and responsibility for their own digital heritage and the number of people who are actually doing this or plan to do this in the future is not really know. In addition, how individuals will repurpose the digital artefacts of the deceased in the future is also not clear. There is an opportunity for an institutional or commercial response to this problem in the Australian context; to create archival cloud-based preservation services that can guarantee to store and repurpose digital artefacts in the long-term with appropriate access, sharing rights, metadata, and preservation formats to insure their survival.

Online Memorials

Apart from challenging issues associated with the preservation and bequeathing of digital artefacts, a related consideration for digital legacies are the possibilities enabled by the Internet for communicating news of a death or commemorating the life of the deceased. The death of a person can easily be announced or discovered through an online service such as Facebook, LinkedIn, or Twitter; whilst the life of a person can be commemorated through a growing range of online memorial services.

Online memorials are an extension to previous memorial services and for a small cost allow a broader public reach (General Manager, An Australian and New Zealand online memorial service).

The first dedicated online memorials appeared in the 1990s, were usually associated with funeral directors, and were primarily stand-alone web pages build by technical savvy individuals for their own family members or friends. A number of companies subsequently offered memorial services to individuals, again usually associated with funeral directors, but also as standalone systems that were not always tied into the funeral service (e.g. Much Loved, Heavenaddress.com, Onlinememorials.com.au, Legacy.com).

Online memorials are about how people cope once someone dies (Chair, An online memorial charitable Trust, UK).

In recent years, with the rise of social media, the trend to ‘memorialise’ personal profiles, particularly on Facebook, has emerged. Facebook was designed to support social connections between the living, yet the popularity of the site over its 10 year history has led to an accompanying growth in the numbers of deceased users – currently estimated at 30 million (Kaleem, 2012). The initially unforeseen issue of what to do with the profiles of the dead has evolved over time and continues to redefine the operation and use of Facebook. The shift in Facebook policy from

 

deactivating deceased accounts to placing them in a ‘memorialised state’ occurred in relation to a number of significant events and user responses, including the death of a Facebook employee in 2005, the Virginia Tech massacre in 2007, and the introduction of functions that generated suggestions to ‘reconnect’ with friends (including dead ones) in 2009 (Fletcher, 2009; Kelly, 2009).

At the time of writing this report, Facebook was the only high-profile social media company to seriously articulate policies and provide services for ‘memorialisation’ of user profiles, partly because of the size, nature, and public profile of the company. This policy and service could be considered industry best-practice and as with Google’s ‘Interactive Account Manager’, it is hoped that other companies provide similar services to sensitively manage processes associated with the death of their users.

There are two options for the management of Facebook accounts after someone dies (with the appropriate evidence supplied by relatives or friends). A profile can be deleted entirely or it can be converted to ‘memorial status’. Consideration needs to be given as to which of these alternatives is appropriate and instructions perhaps provided before death as part of a digital register (there is no facility on Facebook to provide these instructions before death). (See: https://www.facebook.com/help/)

There are issues about who takes over a site, such as a Facebook profile of someone who

dies, and this is not an easy decision (Chair, An online memorial charitable Trust (UK)).

Family conflict, based around second marriage and children from various marriages may cause conflict if the site is not moderated carefully (General Manager, An Australian and New Zealand online memorial service).

If the profile remains active in memorial status, it may be used by friends as a place to gather and reminisce, and as an ongoing reminder of the life that was lived. Indeed, many people cannot bear the thought of closing down the page of a loved one, particularly where social networking was important to the relationship.

Be aware, however, that online memorials open to the public may become a target for online vandalism – such as so-called R.I.P trolling – some of which can be very hurtful, whilst memorials with appropriate privacy settings may become a site for family disputes to be played out. This means that moderation (that is, editorial control) of comments on the site is required to ensure the appropriate tone and content is used, and someone should be delegated to perform this task (again, perhaps noted within a digital register). In the case of commercial online memorial services, moderation is usually done in-house by the service-provider.

Sometimes people don’t have someone to talk to and online memorials are a way of communicating with others. But some online memorials are used to vent family issues so moderation is important (General Manager, Australian online memorial company).

When a Facebook account is in ‘memorial status’ new friends are unable to connect and automated
prompts and reminders relating to the profile will cease. The memorial site remains available at
Facebook’s discretion, and there is no guarantee that the memorialised profile will be available

 

indefinitely into the future. This is why personal digital archives are important and local copies of photos, videos or other data should be stored safely on a removable disk.

Despite the growth in Facebook memorials and other online memorials, their use is still fairly new and evolving and is not yet normalised in the same way as traditional memorial practices. As a result, online memorialisation has been subject to public debate and controversies around issues such as appropriate conduct and interaction and responsibility for administration and moderation (e.g. Kohn et al., 2012). Again, managing a digital legacy means that due consideration to all of these issues needs to take place before death.

…technology must not take over the character of the (funeral) occasion and this is not a problem of the technology, but how is how it is applied. Place, community, and embodied relationships shouldn’t be discounted by the abstract, disconnected nature of the online memorial (Senior representative, Church of England, Melbourne).

There has been a substantial shift in funeral services towards the celebration of one’s life away from fear and judgement. More symbols of one’s life are used in a service; photographs, videos etc. and at least half or more funerals have an audio /visual aspect to them now (Catholic Priest, Melbourne).

As previously noted, the online memorial services that commercial companies provide typically may form part of a funeral package or may be offered as a separate service. The providers of these online services may be located in Australia or any other country. From our discussions with individuals within the online memorial industry we discovered that typically, the sorts of features that are offered include:

  • Profile page of the deceased person
  • Photo and video publication
  • Obituary publication
  • Comments; usually open to the public but moderated by the service provider
  • QR code (or advanced barcode) that can be placed on publications or even the gravestone of the deceased that allows individuals to easily find the memorial page
  • The ability to interact with the memorial page through such activities as lighting a virtual candle or watering a virtual tree
  • Donation to a charity, such as one associated with the cause of death of the deceased, or one they played a part in whilst alive
  • Online communities, such as the Australian Defence Force, which honour the memory of individuals who died in conflicts. These communities may be moderated by a representative from this community
  • Promotion of the memorial profile through such features as share-buttons for Facebook, Twitter, or other social software sites
  • Hosting of the memorial site in perpetuity for a once-off initial fee

There are a number of considerations for consumers when deciding upon an appropriate online memorial service, one of which is the sustainability of the memorial profile itself. Although many services may claim that they will host the memorial page ‘forever’, this is very unlikely in practice. Technical factors may well limit the life of the site as web-serving technologies are fast evolving and

 

neither hardware nor software have a useful life extending to decades. Companies must be trusted to continually migrate the content of memorial sites to contemporary software and hardware platforms – which can be a costly business. For a memorial to be guaranteed into perpetuity, it requires the guarantor to survive into perpetuity, and already a number of online memorial companies have gone out of business. Consumers should check the health of the company through assessing how many memorial pages are hosted and check that protocols are in place to migrate sites to new technologies when required. As always, it is good practice to keep local copies of text, images and other media types that are submitted to a memorial (or any other site) within a personal digital archive so that they may be bequeathed to others family members or friends.

We have a 10 year end point on our memorials because we thought this was ample time for bereavement but at the end of ten years people can keep it if they want (Chair, An online memorial charitable Trust (UK)).

 

Issues in Bequeathing Key Digital Media Types

In this section of the report we describe some of the common media types used by consumers and the challenges relating to them in terms of bequeathing them to others. There are many limitations to the bequeathment of digital media to others and, as previously noted these limitations are associated with some defining issues of the digital economy: property and privacy. There are, perhaps predictably, numerous misconceptions circulating in the popular press, perhaps originating in the pre-digital era, about the assumed property rights that consumers have over digital media, especially music and ‘the right of first sale’ (i.e. to give or sell copyrighted material to someone else) (e.g. Bradgate, 2010). But the general rule is that unless the music was written by the individual consumer, then it is not owned by the consumer and again if there is no physical copy, then there is no ‘right of first sale’ (nor bequeathing to others). This general rule may be applied to other media types as well, although with some media types (or communication mechanisms) it is not issues of property that are key, but issues of the protection of individual privacy.

In the following we list some of the important issues in key media types as they relate to death, bequeathing and privacy. This is by no means an exhaustive list; nor are the issues we flag stable or resolved. The digital economy is contested and in flux and many of the processes that deal with digital media in the context of death do not have a developed legal framework, business processes, or social norms to guide practice. From our research into the terms of service of the key players associated with each media type, coupled with discussions with the key informants who contributed to the study, we outline the issues relating to the bequeathment of key digital media types.

Music

Digital music is often licensed for individual use and thus cannot be bequeathed upon the death of an individual (i.e. iTunes, Spotify). The copyright of the digital music is held by the person who created the music and the licence allows consumers to listen to the music. Companies such as Apple have complex consumer software licences that once clicked are binding, and certain legal rights are given away (as when a document is signed). In effect, when using a service such as iTunes the individual is entering a contract with Apple and the contract, or ‘Terms of Agreement’, outlines what can and cannot be done with a digital file. The licences are in place to protect the producers of the music, who give it to Apple under the provision that Apple will protect their interests, as well as the interests of the consumers.

It is important to note that under Apple’s Terms of Agreement Apple will not replace digital files and files can only be downloaded once, thus any transfer of files is potentially illegal under US copyright law. If a file is lost, Apple will not replace it, thus personal backups are important. Indeed, when an item is ‘purchased’ from iTunes, it is not actually ‘owned’ by the individual who purchased it. The individual is paying for a licence to listen to the music, not to own its content, as the content is owned by the artist, or company, who owns the copyright.

Other companies have different consumer software licences that vary according to what can be
done with a digital file (such as Creative Commons licences). It may be the case that a digital audio

 

file is in the public domain and thus has few or no intellectual property rights upon it. This means, in effect, that the music can be used by the public in certain ways, but cannot be owned by an individual and thus cannot be bequeathed in a will.

Images

Copyright of a photograph is owned by the individual who took the photograph, unless the rights are specifically given to another. Uploading a photo to the web doesn’t change this and copyright is retained by the photographer. Thus photos can be bequeathed to another person in a will and many professional photographers, who earn a living from their photos, do this as a matter of course.

In the case of popular services such as Flickr, users may choose an All Rights Reserved licence for their uploaded photos, or a Creative Commons licence. A Creative Commons licence is a series of licences that limits what users may and may not do with photos, such as reusing them for commercial purposes or using them without attribution.

In the case of other popular systems for publishing photos, such as Facebook, the copyright is still owned by the photographer. The Terms of Service grant Facebook the right to reuse your photographs in certain features of the system, but this is primarily determined by the user’s privacy settings. Other systems may have differing copyright provisions and it is always prudent to check the Terms of Service before uploading images to a particular service.

In many communities around the world, photos have come to play a significant part in the documentation of family history, and considering how they will be maintained and bequeathed is important. Although online systems are convenient places to share photos, they are often published in a compressed and low-quality format. It is best practice to retain copies, in the best quality possible, along with the important information about where they were taken, dates, and people in the photo. Many digital cameras allow ‘metadata’ (descriptions about the photo), to be written into the file, or this can be done once the file is transferred to a computer.

When an Aboriginal person dies, it is a major event and people will travel from all over the region to attend. If someone cannot attend, then they will send a fax to apologise. The funeral is a very social event and at the event a Memorial Booklet of their life story is often produced. The Memorial booklet may contain several pictures of the deceased and this is one way in which the practice of forbidding the public display of images of deceased Aboriginal people is changing. Another way is that family members may keep one or more photos of the deceased for viewing privately, but the main issue is most remote aboriginal groups do not allow the photographic representation of Aboriginals who are deceased, but this may differ from region to region (General Manager, Indigenous association in remote Australia).

Video

As with photos, the copyright of videos uploaded to popular systems such as YouTube is usually owned by the person who recorded the video, so videos may be bequeathed. However, once uploaded many of the exclusive rights that the individual has over the video are granted to YouTube (as outlined in the Terms of Service). YouTube may, for example, republish your videos in other parts

of the YouTube system, and use your videos to raise revenue through adding banner advertisements to them. However, the licence that YouTube has to use your videos is terminated once the videos are deleted from the service. YouTube’s Community Guidelines and Terms of Service give further guidance on this topic.

Along with photos, videos now form an important part of family history so it is important to consider their long term maintenance. As with photos, it is best practice to keep the best possible copies of the digital files in a local folder using popular formats such as MP4, ensuring that additional contextual information accompanies the videos to enable future generations to appreciate their content.

eBooks

As with digital music, eBook files are usually licensed for individual use and cannot be bequeathed. The terms of service give you the right to use the file, that is, read the book, but you do not own the file: your right to read may expire on a certain date, and the file can often only be read with proprietary combinations of hardware and software, such as Kindle. In some cases your licence may be extended to friends or family, but the ownership of the file still remains with the e-publisher. An important exception to this are books that are out of copyright and have been digitised and made available under a Creative Commons licence by organisations such as Project Gutenberg and Google Books. These copies may be bequeathed as in effect they are not owned by anyone.

There are many advantages to eBooks, but bequeathing is not one of them. If an individual is concerned about the inter-generational longevity of their library, it is best to buy physical copies of the book in the first instance, and not the eBook version. The physical copy can then be bequeathed in a straightforward fashion. Books are an important component of intellectual development and again form an important component of family history. The seminal and important books that one reads and wishes to pass to others should be in physical form.

Email

Email is one of the more problematic communications applications on the Internet in terms of privacy, bequeathing, copyright, ownership, and archiving. It is also one of the oldest and most popular uses of the Internet with many personal archives dating more than 20 years. It is seen by many as a more mature person’s medium as younger generations have in large part moved to social media for communications. It is also more likely to be used for professional as well as personal purposes. In terms of archiving, many large organisations will store emails for a defined period of time. But there are no certainties of this, and emails will usually not be stored indefinitely.

There are many issues in the preservation of emails in large companies and many of them are technical (Associate Professor, Digital Archives, The University of Melbourne).

An important fact to consider is the distinction between emails that are sent for professional purposes and emails that are sent for private correspondence. Many organisations have policy recommendations that advise under what conditions, if any, company email may be used for private purposes, and some organisations require that personal communication not take place on company

 

email systems. Even where this is not the case, individuals who want their personal emails to remain private will usually maintain a private email account (on say Gmail or Hotmail) in addition to their company email account. Privacy concerns arise because many companies will monitor all emails on their email systems to check compliance with broader company policies.

Thus there are a number of things to consider when bequeathing email. Email may well be personal correspondence intended for the recipient only, and one may wish to think carefully about archiving this correspondence, and if archived, to whom it is to be bequeathed. Personal correspondence between siblings, partners and friends may well constitute a valuable archive to pass to loved ones but some email should be considered private, even in the context of death.

There may be mechanisms in place for intergenerational transfer of materials but there also needs to be a respect for the record and the personal stories that they represent (Associate Professor, Digital Archives, The University of Melbourne).

Organising personal and professional correspondence in a thoughtful way is necessary if it is to be effectively archived and bequeathed (and again the responsibility here falls upon the individual). Most locally installed email clients enable emails to be stored in nested folders, and the structure of these folders should clearly separate out different categories that represent the context in which the emails were produced and lay out a coherent history of correspondence. In this way the archived email will be comprehensible in the future not just to the author, but to the beneficiary.

Email needs to be separated between a business environment and a personal environment. The data in an email account usually belongs to the account holder but in a business there is an argument that the email belongs to the company and it may be very difficult to gain access to company email if someone has left that company (Chief Regulatory Officer, Major Australian Internet Service Provider).

If individuals want their emails to be readable for decades or more, they should be saved in an archival format, such as plain text, rather than the email program’s proprietary format. All proprietary formats are subject to rapid obsolescence.

Mobile accounts and texts

The procedure for dealing with mobile phones and the SMS texts and data that they contain differs between service providers but in general the larger service providers have established policies to deal with the death of a client (Optus, Telstra). Procedures usually require the next of kin to contact the service provider on their customer support line and notify them of the death. The next of kin or authorised representative must provide the appropriate evidence of death, such as a funeral notice, a death certificate, or a statutory declaration confirming authority to act on behalf of the deceased. The next of kin or authorised representative is then required to complete and submit a form outlining what is to happen to the particular accounts.

There are usually two options for dealing with a deceased person’s account; the account may be closed, final bills paid and all data (text messages, favourites, contacts, recent calls etc) is then deleted. However, accounts may also be transferrable to the next of kin by the authorised representative so that the service is continued. This means that the same mobile phone number is

 

retained and call records, text messages and so on may also remain available. Text messages are usually stored on the phone, so if the next of kin has access to the phone and the phone password, they will also be able to access the texts.

Telecommunications providers do not provide a service for a client to request that their phone account be deleted upon their death, which does raise some privacy concerns. However, even if this was the case, there is still the possibility that the next of kin and authorised representative can have access to the phone handset itself, and if unlocked, will be able to access texts, recent calls, contacts and so on, regardless of the telecommunication company’s policies.

Telstra doesn’t require a death certificate but the customer must have the appropriate authority such as Executor or be the Next of Kin. The account can be either closed or transferred to another individual after filling in a form or through ‘voice signature’. A password holder is an authorised user and can change details on an account and it is transferable (Senior Executive, Major Australian Telecommunications Service Provider).

Web sites and domain names

Web sites and domain names may be bequeathed to another person with instructions given in a will and accompanying digital register. The regulator of domain names in Australia, auDA, has a policy for transferring ownership of domain names to a deceased person’s estate that applies to the particular registrar with which the domain is located (such as Melbourne IT or Netregistry). In the event of an individual’s death, the domain registrar should be contacted and appropriate evidence of death supplied. It is then a matter of transferring the domain name and the account associated with it to another person (there may be a fee for this service).

Another important consideration here is that the domain registrar and the web site host may be two different companies. If this is the case, the web site host will also need to be contacted and again, appropriate evidence supplied. Access to the web site files can be granted to next of kin or nominated person and the account’s name and files transferred to the nominated person.

 

Future Implications

Given the size of the digital economy and the plethora of services and products now available to the public it is difficult to prescribe a simple fix to the fact that inevitably users of these services will die. However, this is not to say that developers of software products and services could not do more to consider the issues that will only become much more acute in the future. There have been many promising responses to digital inheritance and memorialisation, with products such as Google’s Inactive Account Manager recently becoming available and other services such as Facebook, YouTube, and Twitter providing first-rate facilities for users to download and store data locally. It is uncertain if individuals are actually using these services and taking proactive responsibility to store their important digital items locally or consider the privacy implication of their data in the context of death. More research needs to be done in this regard before, as a society, we come to realise that a great deal of our collective, family and personal histories that have migrated to the Internet have become lost or inaccessible

Some pending issues include:

  • Many online systems and service providers do not have procedures in place to cater for the death of a user. The ability to designate an inheritor of personal data files or to request their deletion, according to the user’s preferences is missing in many systems and services. Google appears to be one of the only innovators in this regard (through its Inactive Account Manager). The lack of these services creates privacy concerns for the deceased and unnecessary complications for the next of kin.
  • There are significant internal inconsistencies and recourse to ad-hoc arrangements in how some companies deal with the death of a client, especially relating to personal data.
  • A lack of clear or consistent options from service providers means that individuals need to take responsibility for their digital assets. Most importantly, this includes creating and maintaining a local archive of important digital assets, making decisions in regard to the disbursement of them, and leaving clear and accessible instructions to enable them to be accessed, deleted or disbursed as appropriate.
  • The importance of creating personal digital archives is not well-established in the popular imagination and the products and services available to facilitate this are inadequate. Digital service providers could offer much more leadership in this respect. There are also neither established mechanisms nor customs for re-repurposing the digital artefacts of the deceased. Best practices such as personal digital archives are still evolving, and must be assembled from multiple sources.
  • Protocols and practices for bequeathing digital assets alongside material and financial assets in the context of a legal will and ‘digital register’ needs to be further developed by relevant agencies. Concepts of digital property and the rights consumers have over digital files are not always clear and consumers need be aware of what can and cannot be bequeathed.
  • The governance of memorial sites is generally a shared responsibility undertaken by the proprietors of the online memorial sites and the friends and family of the deceased. There is potential for vandalism and for conflict on these sites and they need to be carefully managed.
  • If legal cases in the EU and law reform debates in Australia (Copyright and the Digital Economy, Australian Law Reform Commission, Issues Paper, 29 June, 2012) alter notions of the right of first sale to extend to digital products such as software, eBooks, and music this will have significant implications for bequeathing some digital products (see Further Reading).

Further Reading

The literature on, and implications for, digital legacies is broad, covering many fields and disciplines of research. There has been growing interest within the archival, library studies and digital humanities communities about the issues that surround the preservation of personal data and the creation of ‘personal digital archives’, but few studies focus specifically on death and bequeathing data and digital files (except for the work of Carroll and Romano, 2011).

The larger body of work on online memorials has largely been positioned within a research approach that considers the psychology and sociology of grief and support and this connects with a wider literature in the social sciences that examines death, grieving and memorialisation (e.g. Aries 1983; Hockey, Komaromy and Woodthorpe 2010; Kellehear 2007; Robben 2004).

Studies of online memorialisation have looked at the use of online sites for things such as sharing of grieving, remembering, commemorating and providing social support (e.g. Jones 2004; Roberts and Vidal 2000; Sofka 1997; Veale, 2003, de Veries and Rutherford, 2004). More recently, following the popularisation of social networking sites, attention has turned to social networks with particular focus on the practices of teenagers (Carroll and Landry, 2010; Williams and Merten, 2009). Computer interaction and interface designers have also become increasingly interested in addressing the many design challenges presented by the development of online memorial practices (Brubaker and Hayes 2011; Gibbs et al. 2012; Mori et al. 2012; Odom et al. 2010).

There are also a number of reports that discuss, broadly, consumer rights in the digital economy, such as the Robert Bradgate’s Consumer Rights in Digital Products report prepared for the UK Department of Business Innovation and Skills (2010). Bradgate discusses the issues of tangible and intangible goods and the contractual rights that are lost or transmuted in digital products, which has numerous implications for bequeathing digital products. The main contention in legal debates in this area appears to be the ‘right of first sale’ (or ‘exhaustion of rights’): the rights that are lost when a copyrighted material is sold in digital form and not physical form. It is legal to sell a copyrighted copy of a CD or book, but illegal to sell the same version that is in digital form because the licencing arrangements when it was ‘purchased’ (or loaned) are different. The ‘first-sale’ doctrine is limited to physical items and there are contrasting and still unresolved approaches between certain courts in the EU and the US on the sale (and transfer) of second-hand digital assets. Legal cases include Capitol Records LLC v ReDigi Inc, in the USA, where a US district court in New York ruled that ReDigi, the operator of an online marketplace for second-hand music downloads, is liable for copyright infringement. In the EU, the Court of Justice in the European Union is taking a divergent approach in terms of allowing the right of first sale for software (UsedSoft v Oracle, C128/11).

In Australia, the Australian Law Reform Commission (ALRC) is currently reviewing the Copyright Act 1968 to consider whether existing exceptions in the act are adequate and appropriate in a digital environment. In a submission to the ALRC’s Issues Paper, Copyright and the Digital Economy Issues Paper (IP 42), the Digital Policy Group of The Australian Interactive Media Industry Association (AIMIA) – which counts eBay, Facebook, Google and Yahoo!7, among its members – proposed that:

 

~the ALRC introduce an exhaustion of rights doctrine in Australia in order to facilitate secondary markets for software, digital works and subject matter other than works and product that embody software material. The ability of a copyright owner to restrict the transfer of copyright interests as currently permitted under Australian law is a restriction on the ability of an individual or small business to legitimately trade in items of value (p20).

If the Australian Copyright Act and in particular, the right of first sale doctrine is altered to accommodate digital products, this will have repercussions for bequeathing digital products, particularly eBooks and music. This review was in progress at the time of writing this report.

 

Authors

Dr Craig Bellamy is a Research Fellow in the Department of Computing and Information Systems at the University of Melbourne. His work primarily focusses on the intersection of computing and the humanities, especially in terms of the application of new computing research methods to assist in the research process. He is founding Secretary of the Australasian Association for Digital Humanities and has worked in the field at King’s College London and the University of Virginia in the USA. He serves on a number of Digital Humanities program committees for major conferences and the editorial boards of key journals in the field.

Dr Michael Arnold is a Senior Lecturer in the History and Philosophy of Science programme at the University of Melbourne where he teaches and writes about a variety of subjects relating to digital technologies in the social context. Michael has been a Visiting Scholar at the Centre for Applied Research in Educational Technology at Cambridge University UK, a founding committee member of the Community Informatics Research Network, and a Research Associate with the Australian Centre for Science and Innovation and Society.

Dr Martin Gibbs is a Senior Lecturer in the Department of Computing and Information Systems at the University of Melbourne. He is a member of the university’s Interaction Design Lab. His expertise lies in the intersection between the disciplines of Science, Technology Studies (STS) and Human­Computer Interaction (HCI). His research contributes to the critical understanding of the social dynamics of using technology by small cohorts of people in non-work settings. He is also the co­editor of a collected work focusing on ICTs and civic engagement, From Social Butterfly to Engaged Citizen, published by MIT Press in 2011.

Dr Bjorn Nansen is a Research Fellow in the Department of Computing and Information Systems at the University of Melbourne. He researches the adoption and use of digital media and communications technologies in the contexts of households, families and everyday life. His most recent work has featured in New Media & Society, Journal of Children and Media, Environment and Planning D and the Telecommunications Journal of Australia. He recently received an ARC early career researcher award to study children’s domestic use of interactive media and natural interfaces.

Dr Tamara Kohn is a Senior Lecturer in Anthropology at the University of Melbourne. Her research and teaching interests include the anthropologies of the body, leisured practice, and the senses; mobility and identity; personhood, memorialisation and death; and methods and ethics in ethnography. She publishes widely in these areas, drawing on her extensive fieldwork experiences in the UK, Nepal, and Japan. She is currently working on an ARC funded project on ‘Sonic Practice in Japan: sound in everyday life’, as well as researching online memorialisation, with a particular interest in the way in which identities are expressed and enacted through these practices.

 

Trademarks

  • iTunes, is the registered trademarks of Apple Inc.
  • Gmail, YouTube, Picasa, are the registered trademarks of Google Inc.
  • Facebook and Instagram are the registered trademark of Facebook Inc.
  • Flickr, is the registered trademark of Yahoo Inc.
  • Dropbox is the registered trademark of Dropbox Inc.
  • LinkedIn is the registered trademark of LinkedIn Corporation
  • Spotify is the registered trademark of Spotify Australia Pty Ltd (or local country of residence)
  • PayPal is the registered trademark of PayPal Inc.
  • Hotmail is the registered trademark of Microsoft Corporation.
  • Kindle is a registered trademark of Amazon.com Inc.
  • Twitter is a registered trademark of Twitter Inc.
  • iiNet is a registered trademark of iiNet Limited.
  • Telstra is the registered trademark of Telstra Corporation Ltd.

 

References

AIMIA, Digital Policy Group. (2012) Australian Law Commission Copyright and the Digital Economy, Issues Paper 42 (IP 42), (Submission 4 December, 2012).

Aries, P. (1983) The Hour of our Death, Penguin Books.

Bradgate, R. (2010) Consumer Rights in Digital Products, A research report prepared for the UK Department for Business, Innovation and Skills, Sheffield, September, 2010.

Brubaker, J.R. and Hayes, G.R. (2011) “We will never forget you [online]”: An empirical investigation of post-mortem MySpace comments. In Proceedings of Computer Supported Cooperative Work CSCW 2011. Hangzhou, China.

Carroll, B. and Landry, K. (2010) Logging On and Letting Out: Using Online Social Networks to Grieve and to Mourn. Bulletin of Science, Technology & Society 30(5).

Carroll, E. and Romano, J. (2011) Your Digital Afterlife, Berkeley, New Riders.

Couldry, N. and McCarthy, A. (eds) (2004) MediaSpace: Place, Scale, and Culture in a Media Age. London: Routledge.

Crang, M. and Cook, I. (2007) Doing Ethnographies. London: SAGE.

Dicks, B. Mason, B. Coffey, A. and Atkinson, P. (2005) Qualitative Research and Hypermedia: Ethnography for the Digital Age. London: SAGE.

Dicks, B. Soyinka, B. and Coffey, A. (2006) Multimodal Ethnography, Qualitative Research 6(1), 77– 96.

Fletcher, D. (2009) What happens to your Facebook after you die? Time Magazine, 28 October, 2009.

Gibbs, M., Mori, M., Arnold, M. and Kohn, T. (2012) Tombstones, Uncanny Monuments and Epic Quests: Memorials in World of Warcraft. Game Studies 12(1): http://gamestudies.org/1201/articles/gibbs_martin

Hockey, J., Komaromy, C. and Woodthorpe, K. (2010) The Matter of Death: space, place and materiality, Palgrave.

Jenkins, H. (2006) Fans, Bloggers, and Gamers: Exploring Participatory Culture. New York: New York University Press.

Jones S.G. (ed.) (1999) Doing Internet Research: Critical Issues and Methods for Examining the Net, Thousand Oaks, CA: SAGE.

 

Jones, S. (2004) 404 not found: The Internet and the afterlife. Omega, Journal of Death & Dying, 48(1), 83-88.

Kaleem, J. (2012) Death on Facebook now common as ‘Dead Profiles’ create vast virtual cemetery’, Huffington Post, 7, December, 2012.

Kelly, M. (2009) Memories of Friends Departed Endure on Facebook, The Facebook Blog, 26 October 2009.

Kohn, T., Nansen B., Arnold, M. and Gibbs, M. (2012) ‘Facebook and the Other: Administering to and Caring for the Dead Online’. In G. Hage and R. Eckersley (eds) Responsibility. Carlton, Australia: Melbourne University Press, pp. 128-141.

Kellehear, A. (2007) A Social History of Dying, Cambridge University Press.

Mori, J., Gibbs, M., Arnold, M., Nansen, B. and Kohn, T. (2012) Design Considerations for After Death: Comparing the Affordances of Three Online Platforms. In Proceedings of the 21st Annual Conference of the Australian Computer-Human Interaction Special Interest Group (OZCHI’12). ACM Press, New York, USA.

Odom, W. Harper, R. Sellen, A. Kirk, D. and Banks, R. (2010) Passing On & Putting to Rest: Understanding Bereavement in the Context of Interactive Technologies’. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems 2010 (CHI’10). ACM Press, New York, USA.

Robben, C. (ed) (2004) Death, Mourning and Burial: a cross-cultural reader, Oxford: Blackwell. Roberts, P. and Vidal, L.A. (2000) Perpetual Care in Cyberspace: A Portrait of Memorials on the Web. Omega: Journal of Death and Dying 40(4), 521-545.

Sofka, C.J. (1997) Social support “Internetworks,” caskets for sale, and more: Thanatology and the information superhighway. Death Studies 21, 553-574.

de Vries, B. and Rutherford, J. (2004) Memorializing Loved Ones on the World Wide Web. Omega: Journal of Death & Dying 49(1), 5-26.

Veale, K. (2004) Online Memorialisation: The Web As A Collective Memorial Landscape For Remembering The Dead, Fibreculture, Issue 3.

Williams, A.L. and Merten, M.J. (2009) Adolescents’ Online Social Networking Following the Death of a Peer. Journal of Adolescent Research 24(1), 67-90.