{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,16]],"date-time":"2026-04-16T21:20:23Z","timestamp":1776374423642,"version":"3.51.2"},"reference-count":57,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2017,3,29]],"date-time":"2017-03-29T00:00:00Z","timestamp":1490745600000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Ethics Inf Technol"],"published-print":{"date-parts":[[2017,6]]},"DOI":"10.1007\/s10676-017-9421-9","type":"journal-article","created":{"date-parts":[[2017,3,29]],"date-time":"2017-03-29T13:02:33Z","timestamp":1490792553000},"page":"129-142","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":36,"title":["Post-mortem privacy and informational self-determination"],"prefix":"10.1007","volume":"19","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-2769-3938","authenticated-orcid":false,"given":"J. C.","family":"Buitelaar","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,3,29]]},"reference":[{"key":"9421_CR1","unstructured":"Akpinar and Altun v Turkey. (2007). Mrs S. Dolle: ECHR."},{"issue":"2","key":"9421_CR2","first-page":"101","volume":"16","author":"ML Ambrose","year":"2013","unstructured":"Ambrose, M. L. (2013). It\u2019s about time: Privacy, information life cycles, and the right to be forgotten. Stanford Technology Law Review, 16(2), 101\u2013154.","journal-title":"Stanford Technology Law Review"},{"issue":"2","key":"9421_CR5","first-page":"397","volume":"2006","author":"J Atwater","year":"2006","unstructured":"Atwater, J. (2006). Who owns E-mail? Do you have the right to decide the disposition of your private digital life? Utah Law Review, 2006(2), 397\u2013418.","journal-title":"Utah Law Review"},{"key":"9421_CR6","doi-asserted-by":"crossref","first-page":"223","DOI":"10.1017\/CBO9780511625138.009","volume-title":"Philosophical dimensions of privacy. An anthology","author":"SI Benn","year":"1984","unstructured":"Benn, S. I. (1984). Privacy, freedom, and respect for persons. In F. D. Schoeman (Ed.), Philosophical dimensions of privacy. An anthology (pp.\u00a0223\u2013244). Cambridge: Cambridge University Press."},{"key":"9421_CR7","first-page":"81","volume":"34","author":"J Berg","year":"2001","unstructured":"Berg, J. (2001). Grave secrets: Legal and ethical analysis of postmortem confidentiality. Connecticut Law Review, 34, 81\u2013122.","journal-title":"Connecticut Law Review"},{"key":"9421_CR8","doi-asserted-by":"crossref","unstructured":"Bernal, P. (2012). The right to online identity.","DOI":"10.2139\/ssrn.2143138"},{"key":"9421_CR10","first-page":"22","volume-title":"Regulating technologies. Legal futures, regulatory frames and technological fixes","author":"R Brownsword","year":"2008","unstructured":"Brownsword, R. (2008). So what does the world need now? Reflections on regulating technology. In R. Brownsword & K. Yeung (Eds.), Regulating technologies. Legal futures, regulatory frames and technological fixes (pp.\u00a022\u201348). Oxford: Hart Publishing."},{"key":"9421_CR11","doi-asserted-by":"crossref","first-page":"171","DOI":"10.1017\/S2071832200020460","volume":"13","author":"JC Buitelaar","year":"2012","unstructured":"Buitelaar, J. C. (2012). Privacy: Back to the roots. German Law Journal, 13, 171\u2013202.","journal-title":"German Law Journal"},{"issue":"4","key":"9421_CR12","doi-asserted-by":"publisher","first-page":"266","DOI":"10.1080\/01972243.2014.915278","volume":"30","author":"JC Buitelaar","year":"2014","unstructured":"Buitelaar, J. C. (2014). Privacy and narrativity in the internet era. The Information Society: An International Journal, 30(4), 266\u2013281. doi: 10.1080\/01972243.2014.915278 .","journal-title":"The Information Society: An International Journal"},{"key":"9421_CR13","unstructured":"Callison-Burch, V., Probst, J., & Govea, M. (2015). Adding a legacy contact. Accessed February 16, 2015 from http:\/\/newsroom.fb.com\/news\/2015\/02\/adding-a-legacy-contact ."},{"key":"9421_CR14","first-page":"1","volume-title":"Legal Rights. Stanford Encyclopedia of Philosophy","author":"K Campbell","year":"2013","unstructured":"Campbell, K. (2013). Legal Rights. Stanford Encyclopedia of Philosophy (pp.\u00a01\u201312). Stanford: Center for the Study of Language and Information."},{"key":"9421_CR15","volume-title":"Your digital afterlife: When Facebook, Flickr and Twitter are your estate, what\u2019s your Legacy?","author":"E Carroll","year":"2011","unstructured":"Carroll, E., & Romano, J. (2011). Your digital afterlife: When Facebook, Flickr and Twitter are your estate, what\u2019s your Legacy? Berkeley, CA: New Riders."},{"key":"9421_CR16","unstructured":"Case of Putistin v. Ukraine (2013). In European Court of Human Rights (Ed.), Application no. 16882\/03. Strasbourg."},{"issue":"2","key":"9421_CR17","doi-asserted-by":"crossref","first-page":"77","DOI":"10.1080\/01972243.1994.9960160","volume":"10","author":"R Clarke","year":"1994","unstructured":"Clarke, R. (1994). The Digital persona and its application to data surveillance. The Information Society, 10(2), 77\u201392.","journal-title":"The Information Society"},{"key":"9421_CR18","unstructured":"den Hartogh, G. (2010). Prenatale en postmortale schade. Temporele grenzen van rechtssubjectie. Nederlands Juristenblad, 645."},{"key":"9421_CR19","volume-title":"Life\u2019s dominion. An argument about abortion, euthanasia, and individual freedom","author":"R Dworkin","year":"1993","unstructured":"Dworkin, R. (1993). Life\u2019s dominion. An argument about abortion, euthanasia, and individual freedom. New York: A. Knopf."},{"issue":"1","key":"9421_CR20","first-page":"101","volume":"32","author":"L Edwards","year":"2013","unstructured":"Edwards, L., & Harbinja, E. (2013). Protecting post-mortem privacy: Reconsidering the privacy interests of the deceased in a digital world. Cardozo Arts & Entertainment Law Journal, 32(1), 101\u2013147.","journal-title":"Cardozo Arts & Entertainment Law Journal"},{"key":"9421_CR21","unstructured":"Eler, A. (2012). \u201cI wanna live forever\u201d or How we die on Social Networks. readwrite."},{"key":"9421_CR22","first-page":"445","volume":"58","author":"J Feinberg","year":"1983","unstructured":"Feinberg, J. (1983). Autonomy, sovereignty, and privacy: Moral ideals in the constitution? The Notre Dame Law Review, 58, 445\u2013492.","journal-title":"The Notre Dame Law Review"},{"key":"9421_CR23","doi-asserted-by":"crossref","DOI":"10.1093\/0195046641.001.0001","volume-title":"The Moral limits of the criminal law volume 1: Harm to others","author":"J Feinberg","year":"1987","unstructured":"Feinberg, J. (1987). The Moral limits of the criminal law volume 1: Harm to others. Oxford: Oxford Scholarship Online."},{"key":"9421_CR24","doi-asserted-by":"crossref","first-page":"185","DOI":"10.1007\/s10676-006-0001-7","volume":"7","author":"L Floridi","year":"2005","unstructured":"Floridi, L. (2005). The ontological interpretation of informational privacy. Ethics and Information Technology, 7, 185\u2013200.","journal-title":"Ethics and Information Technology"},{"key":"9421_CR25","doi-asserted-by":"crossref","first-page":"549","DOI":"10.1007\/s11023-011-9259-6","volume":"21","author":"L Floridi","year":"2011","unstructured":"Floridi, L. (2011). The informational nature of personal identity. Minds & Machines, 21, 549\u2013566.","journal-title":"Minds & Machines"},{"key":"9421_CR26","volume-title":"The presentation of self in everyday life","author":"E Goffman","year":"1959","unstructured":"Goffman, E. (1959). The presentation of self in everyday life. Garden City: Doubleday."},{"issue":"1","key":"9421_CR28","doi-asserted-by":"crossref","first-page":"19","DOI":"10.2966\/scrip.100113.19","volume":"10","author":"E Harbinja","year":"2013","unstructured":"Harbinja, E. (2013). Does the EU data protection regime protect post-mortem privacy and what could be the potential alternatives? Scripted, 10(1), 19\u201338.","journal-title":"Scripted"},{"key":"9421_CR29","first-page":"2746","volume":"39","author":"V Hartkamp","year":"2013","unstructured":"Hartkamp, V. (2013). De digitale nalatenschap. Is er een digitaal leven na de dood? NederlandsJuristenBlad, 39, 2746\u20132750.","journal-title":"NederlandsJuristenBlad"},{"key":"9421_CR30","unstructured":"Herold, R. (2010). How To Protect Your Privacy After You Die. InfosecIsland."},{"key":"9421_CR31","doi-asserted-by":"crossref","first-page":"407","DOI":"10.1515\/9789048522989-025","volume-title":"Plessner\u2019s philosophical anthropology. perspectives and prospects","author":"M Hildebrandt","year":"2014","unstructured":"Hildebrandt, M. (2014). Eccentric positionally as a precondition for the criminal liability for artificial life forms. In J. Mul (Ed.), Plessner\u2019s philosophical anthropology. perspectives and prospects (pp.\u00a0407\u2013424). Amsterdam: Amsterdam University Press."},{"key":"9421_CR60","unstructured":"James, P. & Magee, S. (2013, April 16). Google RIP. What inactive account manager means for your will. The Telegraph."},{"issue":"1","key":"9421_CR32","doi-asserted-by":"crossref","first-page":"7","DOI":"10.2966\/scrip.100113.7","volume":"10","author":"E Kasket","year":"2013","unstructured":"Kasket, E. (2013). Access to the digital self in life and death: Privacy in the context of posthumously persistent facebook profiles. Scripted, 10(1), 7\u201318.","journal-title":"Scripted"},{"issue":"2","key":"9421_CR33","first-page":"497","volume":"11","author":"BJ Koops","year":"2010","unstructured":"Koops, B. J., Hildebrandt, M., & Jaquet-Chiffelle, D.-O. (2010). Bridging the accountability gap: Rights for new entities in the information society? Minnesota Journal of Law, Science & Technology, 11(2), 497\u2013561.","journal-title":"Minnesota Journal of Law, Science & Technology"},{"key":"9421_CR34","unstructured":"Kopetski, M. A. In U. S. Army (Ed.), US army memo on safeguarding email privacy in case of death: Electronic Frontier Foundation."},{"key":"9421_CR35","unstructured":"Limer, E. (2011). 1 in 10 Britons Leave Social Networking Passwords in Their Wills."},{"key":"9421_CR36","unstructured":"Maimes, S. (2013, 28 January). Managing your digital afterlife: Cyber footprint, ownership, and access. The Trust Advisor."},{"issue":"1","key":"9421_CR37","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1111\/papa.12040","volume":"43","author":"A Marmor","year":"2015","unstructured":"Marmor, A. (2015). What is the right to privacy? Philosophy & Public Affairs, 43(1), 3\u201326.","journal-title":"Philosophy & Public Affairs"},{"key":"9421_CR38","first-page":"1644","volume":"90","author":"J Mazzone","year":"2012","unstructured":"Mazzone, J. (2012). Facebook\u2019s afterlife. North Carolina Law Review, 90, 1644\u20131686.","journal-title":"North Carolina Law Review"},{"issue":"1","key":"9421_CR39","doi-asserted-by":"crossref","first-page":"39","DOI":"10.2966\/scrip.100113.39","volume":"10","author":"D McCallig","year":"2013","unstructured":"McCallig, D. (2013). Private but eventually Public: Why copyright in unpublished works matters in the digital age. Scripted, 10(1), 39\u201356.","journal-title":"Scripted"},{"key":"9421_CR40","unstructured":"McCallig, D. (2014, 24 January). Data protection and the deceased in the EU. Paper presented at the Computers Privacy Data Protection, Brussels."},{"key":"9421_CR41","doi-asserted-by":"publisher","first-page":"369","DOI":"10.1007\/s12142-015-0387-x","volume":"16","author":"LF Miller","year":"2015","unstructured":"Miller, L. F. (2015). Granting automata human rights: Challenge to a basis of full-rights privilege. Human Rights Review, 16, 369\u2013391. doi: 10.1007\/s12142-015-0387-x .","journal-title":"Human Rights Review"},{"key":"9421_CR42","unstructured":"Mulder, D. H. (2015). Objectivity. Internet Encyclopedia of Philosophy. Stanford."},{"key":"9421_CR43","volume-title":"Privacy in context. Technology, policy, and the integrity of social life","author":"H Nissenbaum","year":"2010","unstructured":"Nissenbaum, H. (2010). Privacy in context. Technology, policy, and the integrity of social life. Stanford: Stanford Law Books."},{"key":"9421_CR44","first-page":"237","volume":"47","author":"K Pennington","year":"1998","unstructured":"Pennington, K. (1998). The history of rights in western thought. Emory Law Journal, 47, 237\u2013252.","journal-title":"Emory Law Journal"},{"key":"9421_CR45","doi-asserted-by":"crossref","first-page":"50","DOI":"10.1017\/CBO9781107280557.004","volume-title":"Social dimensions of privacy: interdisciplinary perspectives","author":"PM Regan","year":"2015","unstructured":"Regan, P. M. (2015). Privacy and the common good: Revisited. In B. Roessler & M. Mokrosinska (Eds.), Social dimensions of privacy: interdisciplinary perspectives (pp.\u00a050\u201370). London: Cambridge University Press."},{"issue":"4774","key":"9421_CR46","first-page":"297","volume":"94","author":"J Rombach","year":"1963","unstructured":"Rombach, J. (1963). Prae-en postpersoonlijkheidsrechten en-plichten. Weekblad voor Privaatrecht, Notaris-ambt en Registratie, 94(4774), 297\u2013299.","journal-title":"Weekblad voor Privaatrecht, Notaris-ambt en Registratie"},{"key":"9421_CR47","volume-title":"Digital personae and profiles in law","author":"AP Roosendaal","year":"2013","unstructured":"Roosendaal, A. P. (2013). Digital personae and profiles in law. Tilburg, Oisterwijk: Wolf Legal Publishers."},{"key":"9421_CR48","doi-asserted-by":"crossref","first-page":"45","DOI":"10.1007\/978-1-4020-9498-9_2","volume-title":"Reinventing data protection?","author":"A Rouvroy","year":"2009","unstructured":"Rouvroy, A., & Poullet, Y. (2009). The right to informational self-determination and the value of self-development: Reassessing the importance of privacy for democracy. In S. Gutwirth, P. Hert & Y. Poullet (Eds.), Reinventing data protection? (pp.\u00a045\u201376). Amsterdam: Springer."},{"key":"9421_CR49","doi-asserted-by":"publisher","first-page":"329","DOI":"10.1007\/s13347-012-0062-y","volume":"25","author":"M Schechtman","year":"2012","unstructured":"Schechtman, M. (2012). The story of my (second) life: Virtual worlds and narrative identity. Philosophy & Technology, 25, 329\u2013343. doi: 10.1007\/s13347-012-0062-y .","journal-title":"Philosophy & Technology"},{"key":"9421_CR64","unstructured":"Seligson, H. (2014, March 21). An online generation redefines mourning. International New York Times."},{"issue":"3","key":"9421_CR52","first-page":"1489","volume":"50","author":"F Swennen","year":"2013","unstructured":"Swennen, F. (2013). Er is leven na de dood. Persoonlijkheidsrechten na overlijden. Tijdschrift voor Privaatrecht, 50(3), 1489\u20131553.","journal-title":"Tijdschrift voor Privaatrecht"},{"key":"9421_CR53","volume-title":"Rights of non-humans? Electronic agents and animals as new actors in politics and law. Max Weber Lecture Series","author":"G Teubner","year":"2007","unstructured":"Teubner, G. (2007). Rights of non-humans? Electronic agents and animals as new actors in politics and law. Max Weber Lecture Series. Badia Fiesolana: European University Institute."},{"key":"9421_CR61","unstructured":"Wallop, H. &\u00a0Roberts, L. (2010, 30 June). Silver surfers increase by one million last year. The Telegraph."},{"key":"9421_CR54","unstructured":"Walters, C. (2009). Facebook\u2019s new terms of service: \u201cWe Can Do Anything We Want With Your Content. Forever.\u201d. Consumerist."},{"key":"9421_CR62","unstructured":"Wortham, J. (2010, 18 July). As more facebook users die, ghosts reach out to reconnect. The New York Times."},{"issue":"5","key":"9421_CR55","doi-asserted-by":"crossref","first-page":"193","DOI":"10.2307\/1321160","volume":"4","author":"S Warren","year":"1890","unstructured":"Warren, S., & Brandeis, I. (1890). The right to privacy. Harvard Law Review, 4(5), 193\u2013220.","journal-title":"Harvard Law Review"},{"key":"9421_CR56","unstructured":"Wenar, L. (2011). Rights. Stanford Encyclopedia of Philosophy. Stanford."},{"key":"9421_CR57","first-page":"1037","volume":"62","author":"M Wilkins","year":"2011","unstructured":"Wilkins, M. (2011). Privacy and security during life, access after death: Are they mutually exclusive? Hastings Law Journal, 62, 1037\u20131064.","journal-title":"Hastings Law Journal"},{"key":"9421_CR58","unstructured":"Wilks, Y. (2015). Death and the Internet. Prospect Magazine."},{"issue":"2","key":"9421_CR59","doi-asserted-by":"crossref","first-page":"186","DOI":"10.1111\/j.1468-5930.2009.00477.x","volume":"27","author":"S Winter","year":"2010","unstructured":"Winter, S. (2010). Against posthumous rights. Journal of Applied Philosophy, 27(2), 186\u2013199.","journal-title":"Journal of Applied Philosophy"}],"container-title":["Ethics and Information Technology"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10676-017-9421-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10676-017-9421-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10676-017-9421-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,8,22]],"date-time":"2023-08-22T22:26:51Z","timestamp":1692743211000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10676-017-9421-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,3,29]]},"references-count":57,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2017,6]]}},"alternative-id":["9421"],"URL":"https:\/\/doi.org\/10.1007\/s10676-017-9421-9","relation":{},"ISSN":["1388-1957","1572-8439"],"issn-type":[{"value":"1388-1957","type":"print"},{"value":"1572-8439","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,3,29]]}}}