{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:35:11Z","timestamp":1750221311672,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":24,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,11,16]],"date-time":"2017-11-16T00:00:00Z","timestamp":1510790400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,11,16]]},"DOI":"10.1145\/3136560.3136593","type":"proceedings-article","created":{"date-parts":[[2017,11,17]],"date-time":"2017-11-17T14:02:08Z","timestamp":1510927328000},"page":"1-5","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Digital Walking Dead"],"prefix":"10.1145","author":[{"given":"Faheem","family":"Hussain","sequence":"first","affiliation":[{"name":"Department of Technology and Society, Stony Brook University, SUNY Korea"}]},{"given":"Mashiat","family":"Mostafa","sequence":"additional","affiliation":[{"name":"Department of Global and Urban Studies, Royal Melbourne Institute of Technology, Australia"}]},{"given":"Durdonahon","family":"Usmonova","sequence":"additional","affiliation":[{"name":"Stony Brook University, Department of Technology and Society, South Korea"}]}],"member":"320","published-online":{"date-parts":[[2017,11,16]]},"reference":[{"key":"e_1_3_2_1_1_1","first-page":"4","volume-title":"Identity and the Social Network. PHD Thesis","author":"Brubaker J.R.","year":"2016","unstructured":"Brubaker, J.R. 2015. Death, Identity and the Social Network. PHD Thesis. University of California, Irivine. Retrieve on 21 February, 2016, https:\/\/escholarship.org\/uc\/item\/6cn0s1xd#page-4"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.2190\/3BPT-UYJR-192R-U969"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/1124772.1124814"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/2207676.2207723"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","unstructured":"Vitak J. Lampe C. Gray R. and Ellison N. B. 2012. \"Why won't you be my Facebook friend?\" In Proceedings of the 2012 iConference on - iConference '12 (pp. 555--557). New York USA ACM Press. 10.1145\/2132176.2132286","DOI":"10.1145\/2132176.2132286"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/1520340.1520349"},{"key":"e_1_3_2_1_7_1","volume-title":"Dead: Emergent Port-Mortem Digital Curation and Creation Practices.\"","author":"Ellis S. G.","year":"2013","unstructured":"Ellis, S. G. and Coulton, P. 2013. \"Living with Dead: Emergent Port-Mortem Digital Curation and Creation Practices.\" 2013, Springer, New York, USA."},{"volume-title":"Information Systems and Developing Countries: Failure, Success, and Local Improvisation","author":"Heeks R.","key":"e_1_3_2_1_8_1","unstructured":"Heeks, R. 2002. Information Systems and Developing Countries: Failure, Success, and Local Improvisation, Institute of Development Policy and Management. The Information Society. Manchester, United Kingdom."},{"key":"e_1_3_2_1_9_1","volume-title":"Geek Hereshy: Rescuing Social Change from the Cult of Technology. Public Affairs.","author":"Toyama K.","year":"2015","unstructured":"Toyama, K. 2015. Geek Hereshy: Rescuing Social Change from the Cult of Technology. Public Affairs. New York America."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/2909609.2909661"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","unstructured":"Abokhodair N. 2015. Transmigrant Saudi Arabian Youth and Social Media: Privacy Intimacy and Freedom of Expression. ACM 187--190. 10.1145\/2702613.2702629","DOI":"10.1145\/2702613.2702629"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.5210\/fm.v16i12.3168"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"crossref","unstructured":"Connor J. 2010. \"Digital life after death: The issue of planning for a person's digital assets after death \" Texas Tech Law School Research Paper. 2011-- 02. http:\/\/papers.ssrn.com\/abstract=1811044","DOI":"10.2139\/ssrn.1811044"},{"key":"e_1_3_2_1_14_1","unstructured":"Lamm D. J. Kunz L.C. Riehl A. D. and Rademacher J.P. 2013. The Digital Death Conundrum: How Federal and State Laws Prevent Fiduciaries from Managing Digital Property University of Miami Law Review. Volume 68 (2). https:\/\/papers.ssrn.com\/sol3\/papers.cfm?abstract_id=2422081"},{"key":"e_1_3_2_1_15_1","unstructured":"Government of Australia. 2017. Guides to Information Security. Government Website. https:\/\/www.oaic.gov.au\/images\/documents\/privacy\/privacy-guides\/information-security-guide-2013_WEB.pdf"},{"key":"e_1_3_2_1_16_1","unstructured":"Anonymous. 2017. ACM Copyright Digital Privacy Challenges Associated with Shared Mobile Phone Use in Bangladeshi Families."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/1999927.1999939"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.5555\/2838885"},{"key":"e_1_3_2_1_19_1","unstructured":"Jay C. Michael P. and Kelly M. 2014. Exploring Internet Security Perceptions and Practices in Urban Ghana. In Soups. 129--142."},{"key":"e_1_3_2_1_20_1","volume-title":"not Rajib's. BDNews24. Retreived on","author":"Lenin A.","year":"2016","unstructured":"Lenin, A. 2016. \"Nurani Chapa\", not Rajib's. BDNews24. Retreived on 23 December, 2016 from http:\/\/bdnews24.com\/bangladesh\/2013\/02\/25\/nurani-chapa-not-rajibs"},{"key":"e_1_3_2_1_21_1","first-page":"4","volume-title":"Privacy Act of Canada. Government of Canada Retreived on","author":"Justice Law","year":"2017","unstructured":"Justice Law. 2016. Privacy Act of Canada. Government of Canada Retreived on 14 January, 2017. http:\/\/laws-lois.justice.gc.ca\/eng\/acts\/P-21\/page-4.html#docCont"},{"key":"e_1_3_2_1_22_1","unstructured":"Nahian's pages. 2016. Shomaj. Facebook. https:\/\/www.facebook.com\/NahianUpdate\/?hc_ref=SEARCH http:\/\/shomaj.org\/"},{"key":"e_1_3_2_1_23_1","volume-title":"Bangladesh Report","author":"Freedom","year":"2016","unstructured":"Freedom on the Net. 2016. Bangladesh Report. Freedom House, 2016. https:\/\/freedomhouse.org\/report\/freedom-net\/2016\/bangladesh"},{"key":"e_1_3_2_1_24_1","unstructured":"Aref. 2017. Profile of Ali. Facebook Page. Website. https:\/\/www.facebook.com\/aref.shaigan"}],"event":{"name":"ICTD '17: Ninth International Conference on Information and Communication Technologies and Development","acronym":"ICTD '17","location":"Lahore Pakistan"},"container-title":["Proceedings of the Ninth International Conference on Information and Communication Technologies and Development"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3136560.3136593","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3136560.3136593","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T02:13:37Z","timestamp":1750212817000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3136560.3136593"}},"subtitle":["How Safe is the Global South?"],"short-title":[],"issued":{"date-parts":[[2017,11,16]]},"references-count":24,"alternative-id":["10.1145\/3136560.3136593","10.1145\/3136560"],"URL":"https:\/\/doi.org\/10.1145\/3136560.3136593","relation":{},"subject":[],"published":{"date-parts":[[2017,11,16]]},"assertion":[{"value":"2017-11-16","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}