{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T23:07:55Z","timestamp":1776121675198,"version":"3.50.1"},"reference-count":21,"publisher":"Association for Computing Machinery (ACM)","issue":"1","license":[{"start":{"date-parts":[[2014,4,1]],"date-time":"2014-04-01T00:00:00Z","timestamp":1396310400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["SIGCAS Comput. Soc."],"published-print":{"date-parts":[[2014,4]]},"abstract":"<jats:p>Many online services assume that they each account will only be accessed by one person, ever. This is even enshrined in the terms and conditions for some. However, our identities are bound up with others in various ways, in both life and death, legally and socially. A basic classification system for multiple ownership of accounts is proposed, based on fictionalised accounts of real world problems encountered by the authors and their acquaintances.<\/jats:p>","DOI":"10.1145\/2602147.2602150","type":"journal-article","created":{"date-parts":[[2014,4,8]],"date-time":"2014-04-08T12:24:20Z","timestamp":1396959860000},"page":"15-26","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":7,"title":["What's yours is mine and what's mine's my own"],"prefix":"10.1145","volume":"44","author":[{"given":"A. A.","family":"Adams","sequence":"first","affiliation":[{"name":"Meiji University, Tokyo, Japan"}]},{"given":"S. A.","family":"Williams","sequence":"additional","affiliation":[{"name":"University of Reading, Reading, UK"}]}],"member":"320","published-online":{"date-parts":[[2014,4]]},"reference":[{"key":"e_1_2_1_1_1","unstructured":"Act on Development of an Environment that Provides Safe and Secure Internet Use for Young People (Act No. 79 of 2008 Japan).  Act on Development of an Environment that Provides Safe and Secure Internet Use for Young People (Act No. 79 of 2008 Japan)."},{"key":"e_1_2_1_2_1","volume-title":"3rd Annual PKI R&D Workshop (Keynote Address)","author":"Brands S.","year":"2004"},{"key":"e_1_2_1_3_1","first-page":"1","volume-title":"Buckingham, D. (Ed.) Youth, Identity, and Digital Media","author":"Buckingham D.","year":"2008"},{"key":"e_1_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2012.7"},{"key":"e_1_2_1_5_1","unstructured":"Cameron K. (2005) \"The laws of identity\" available at http:\/\/www.identityblog.com\/stories\/2005\/05\/13\/TheLawsOfIdentity.pdf (accessed 28 June 2013).  Cameron K. (2005) \"The laws of identity\" available at http:\/\/www.identityblog.com\/stories\/2005\/05\/13\/TheLawsOfIdentity.pdf (accessed 28 June 2013)."},{"key":"e_1_2_1_6_1","unstructured":"Carroll E. and Romano J. (2011) Your Digital Afterlife New Riders San Francisco.  Carroll E. and Romano J. (2011) Your Digital Afterlife New Riders San Francisco."},{"key":"e_1_2_1_7_1","unstructured":"Children's Online Privacy Protection Act of 1998 (codified in US Code Title 13 sections 1301-8).  Children's Online Privacy Protection Act of 1998 (codified in US Code Title 13 sections 1301-8)."},{"key":"e_1_2_1_8_1","doi-asserted-by":"crossref","unstructured":"Edwards L. and Harbinja E. (2013) \"What Happens to my Facebook Profile when I die?': Legal Issues Around Transmission of Digital Assets on Death\" Working Paper No. 5 CREATe University of Glasgow Glasgow. http:\/\/www.create.ac.uk\/what-happens-to-my-facebook-profile-when-i-die-legal-issues-around-transmission-of-digital-assets-on-death (accessed 28 June 2013).  Edwards L. and Harbinja E. (2013) \"What Happens to my Facebook Profile when I die?': Legal Issues Around Transmission of Digital Assets on Death\" Working Paper No. 5 CREATe University of Glasgow Glasgow. http:\/\/www.create.ac.uk\/what-happens-to-my-facebook-profile-when-i-die-legal-issues-around-transmission-of-digital-assets-on-death (accessed 28 June 2013).","DOI":"10.2139\/ssrn.2222163"},{"issue":"1","key":"e_1_2_1_9_1","first-page":"1","article-title":"Nobody Reads Your Privacy Policy or Online Contract: Lessons Learned and Questions Raised by the FTC's Action against Sears","volume":"8","author":"Gindin S. E.","year":"2009","journal-title":"NorthWestern Journal of Technology & Intellectual Property"},{"key":"e_1_2_1_10_1","unstructured":"Goffman E. (1959) The Presentation of Self in Everyday Life: Penguin London.  Goffman E. (1959) The Presentation of Self in Everyday Life: Penguin London."},{"key":"e_1_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1177\/0011392100048003003"},{"key":"e_1_2_1_12_1","unstructured":"Jenkins R. (2008) Social Identity (Key Ideas) Third ed. Routledge London.  Jenkins R. (2008) Social Identity (Key Ideas) Third ed. Routledge London."},{"key":"e_1_2_1_13_1","first-page":"283","volume-title":"BMJ","volume":"322","author":"Mandl K. D.","year":"2001"},{"key":"e_1_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1080\/00497870490464396"},{"key":"e_1_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/2207676.2207750"},{"key":"e_1_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10899-008-9106-8"},{"key":"e_1_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1007\/s12394-010-0078-3"},{"key":"e_1_2_1_18_1","first-page":"10","volume-title":"Proceedings of the 37th Annual Hawaii International Conference on","author":"Vi\u00e9gas F. B.","year":"2004"},{"key":"e_1_2_1_19_1","first-page":"104","volume-title":"IGI Global","author":"Williams S.","year":"2013"},{"key":"e_1_2_1_20_1","unstructured":"Warburton S. (2010) Digital Identity Matters King's College London London. http:\/\/digitaldisruptions.org\/rhizome\/wp-content\/uploads\/2010\/06\/rhiz08_DigitalIdentityMatters.pdf (accessed 28 June 2013).  Warburton S. (2010) Digital Identity Matters King's College London London. http:\/\/digitaldisruptions.org\/rhizome\/wp-content\/uploads\/2010\/06\/rhiz08_DigitalIdentityMatters.pdf (accessed 28 June 2013)."},{"key":"e_1_2_1_21_1","unstructured":"{i} http:\/\/productforums.google.com\/d\/topic\/gmail\/NZYEBW3Nd_o (accessed 28 June 2013).  {i} http:\/\/productforums.google.com\/d\/topic\/gmail\/NZYEBW3Nd_o (accessed 28 June 2013)."}],"container-title":["ACM SIGCAS Computers and Society"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2602147.2602150","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2602147.2602150","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T07:00:47Z","timestamp":1750230047000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2602147.2602150"}},"subtitle":["joint accounts and digital identity"],"short-title":[],"issued":{"date-parts":[[2014,4]]},"references-count":21,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2014,4]]}},"alternative-id":["10.1145\/2602147.2602150"],"URL":"https:\/\/doi.org\/10.1145\/2602147.2602150","relation":{},"ISSN":["0095-2737"],"issn-type":[{"value":"0095-2737","type":"print"}],"subject":[],"published":{"date-parts":[[2014,4]]},"assertion":[{"value":"2014-04-01","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}