{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,4]],"date-time":"2026-05-04T23:25:20Z","timestamp":1777937120612,"version":"3.51.4"},"reference-count":49,"publisher":"SAGE Publications","issue":"6","license":[{"start":{"date-parts":[[2020,11,25]],"date-time":"2020-11-25T00:00:00Z","timestamp":1606262400000},"content-version":"unspecified","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc\/4.0\/"},{"start":{"date-parts":[[2020,11,25]],"date-time":"2020-11-25T00:00:00Z","timestamp":1606262400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/journals.sagepub.com\/page\/policies\/text-and-data-mining-license"}],"funder":[{"name":"Israeli Internet Society","award":["no grant number"],"award-info":[{"award-number":["no grant number"]}]},{"DOI":"10.13039\/501100003977","name":"israel science foundation","doi-asserted-by":"publisher","award":["257\/18"],"award-info":[{"award-number":["257\/18"]}],"id":[{"id":"10.13039\/501100003977","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["journals.sagepub.com"],"crossmark-restriction":true},"short-container-title":["New Media &amp; Society"],"published-print":{"date-parts":[[2022,6]]},"abstract":"<jats:p>\n                    Scholars have observed a gap between users\u2019 stated preferences to protect their privacy and their actual behavior. This is the\n                    <jats:italic toggle=\"yes\">privacy paradox<\/jats:italic>\n                    . This article queries the persistence of the privacy paradox after death. A survey of a representative sample of Israeli Internet users inquired of perceptions, preferences, and actions taken by users regarding their digital remains. The analysis yielded three distinct groups: (1) users interested in preserving privacy posthumously but do not act accordingly; for these users, the privacy paradox persists posthumously; (2) users who match their behavior to their preferences; for these users, the privacy paradox is resolved; and (3) users interested in sharing their personal data posthumously but do not make the appropriate provisions. This scenario is the\n                    <jats:italic toggle=\"yes\">inverted privacy paradox<\/jats:italic>\n                    . This new category has yet to be addressed in the literature. We present some explanations for the persistence of the\n                    <jats:italic toggle=\"yes\">posthumous privacy paradox<\/jats:italic>\n                    and for the\n                    <jats:italic toggle=\"yes\">inverted privacy paradox<\/jats:italic>\n                    .\n                  <\/jats:p>","DOI":"10.1177\/1461444820974955","type":"journal-article","created":{"date-parts":[[2020,11,26]],"date-time":"2020-11-26T01:49:11Z","timestamp":1606355351000},"page":"1343-1362","update-policy":"https:\/\/doi.org\/10.1177\/sage-journals-update-policy","source":"Crossref","is-referenced-by-count":23,"title":["The posthumous privacy paradox: Privacy preferences and behavior regarding digital remains"],"prefix":"10.1177","volume":"24","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-9960-620X","authenticated-orcid":false,"given":"Tal","family":"Morse","sequence":"first","affiliation":[{"name":"Hadassah Academic College, Israel"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Michael","family":"Birnhack","sequence":"additional","affiliation":[{"name":"Tel Aviv University, Israel"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"179","published-online":{"date-parts":[[2020,11,25]]},"reference":[{"key":"e_1_3_4_2_1","doi-asserted-by":"publisher","DOI":"10.1201\/9781420052183-29"},{"key":"e_1_3_4_3_1","doi-asserted-by":"publisher","DOI":"10.5210\/fm.v11i9.1394"},{"key":"e_1_3_4_4_1","unstructured":"BBC News (2018) Facebook ruling: German court grants parents rights to dead daughter\u2019s account 12 July. Available at: https:\/\/www.bbc.com\/news\/world-europe-44804599"},{"key":"e_1_3_4_5_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2016.04.027"},{"key":"e_1_3_4_6_1","volume-title":"It\u2019s Complicated: The Social Lives of Networked Teens","author":"boyd d","year":"2014","unstructured":"boyd d (2014) It\u2019s Complicated: The Social Lives of Networked Teens. New Haven, CT: Yale University Press."},{"key":"e_1_3_4_7_1","doi-asserted-by":"crossref","unstructured":"Brubaker JR Callison-Burch V (2016) Legacy contact: designing and implementing post-mortem stewardship at Facebook. In: Proceedings of the 2016 CHI conference on human factors in computing systems New York pp. 2908\u20132919. ACM. Available at: https:\/\/research.fb.com\/wp-content\/uploads\/2016\/11\/legacy-contact-designing-and-implementing-stewardship-at-facebook.pdf","DOI":"10.1145\/2858036.2858254"},{"key":"e_1_3_4_8_1","doi-asserted-by":"crossref","unstructured":"Brubaker JR Dombrowski LS Gilbert AM et al. (2014) Stewarding a legacy: responsibilities and relationships in the management of post-mortem data. In: Proceedings of the SIGCHI conference on human factors in computing systems New York pp. 4157\u20134166. ACM. Available at: https:\/\/cmci.colorado.edu\/idlab\/assets\/bibliography\/pdf\/Brubaker2014a.pdf","DOI":"10.1145\/2556288.2557059"},{"key":"e_1_3_4_9_1","first-page":"65","volume-title":"Lessons from the Identity Trail: Anonymity, Privacy and Identity in a Networked Society","author":"Carey R","year":"2009","unstructured":"Carey R, Burkell J (2009) A heuristics approach to understanding privacy-protecting behaviors in digital social environments. In: Kerr I, Lucock C, Steeves V (eds) Lessons from the Identity Trail: Anonymity, Privacy and Identity in a Networked Society. 1st ed. Oxford; New York: Oxford University Press, pp. 65\u201382.","edition":"1"},{"key":"e_1_3_4_10_1","unstructured":"Case ZRIII 183\/17 (2018) Available at: https:\/\/juris.bundesgerichtshof.de\/cgi-bin\/rechtsprechung\/document.py?Gericht=bgh&Art=en&nr=86602&pos=0&anz=1"},{"key":"e_1_3_4_11_1","doi-asserted-by":"publisher","DOI":"10.1177\/2056305117707187"},{"key":"e_1_3_4_12_1","volume-title":"Configuring the Networked Self: Law, Code, and the Play of Everyday Practice","author":"Cohen JE","year":"2012","unstructured":"Cohen JE (2012) Configuring the Networked Self: Law, Code, and the Play of Everyday Practice. New Haven, CT: Yale University Press."},{"key":"e_1_3_4_13_1","doi-asserted-by":"publisher","DOI":"10.1002\/ejsp.2049"},{"issue":"1","key":"e_1_3_4_14_1","first-page":"83","article-title":"Protecting post-mortem privacy: reconsidering the privacy interests of the deceased in a digital world","volume":"32","author":"Edwards L","year":"2013","unstructured":"Edwards L, Harbinja E (2013) Protecting post-mortem privacy: reconsidering the privacy interests of the deceased in a digital world. Cardozo Arts & Entertainment 32(1): 83\u2013129.","journal-title":"Cardozo Arts & Entertainment"},{"key":"e_1_3_4_15_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-014-2151-7"},{"key":"e_1_3_4_16_1","doi-asserted-by":"crossref","unstructured":"Garga V Bentonb K Camp LJ (2014) The privacy paradox: a Facebook case study. In: TPRC 41 Arlington VA. Available at: https:\/\/www.coursehero.com\/file\/21790551\/SSRN-id2411672\/","DOI":"10.2139\/ssrn.2411672"},{"key":"e_1_3_4_17_1","unstructured":"GDPR (2016) Regulation (EU) 2016\/679 of the European parliament and of the council. Available at: http:\/\/data.europa.eu\/eli\/reg\/2016\/679\/oj\/eng"},{"key":"e_1_3_4_18_1","first-page":"398","volume-title":"Handbook of Theories of Social Psychology: Volume One","author":"Greenberg J","year":"2011","unstructured":"Greenberg J, Arndt J (2011) Terror management theory. In: Lange PAMV, Kruglanski AW, Higgins ET (eds) Handbook of Theories of Social Psychology: Volume One. Los Angeles, CA: SAGE Publications Ltd, pp. 398\u2013415."},{"key":"e_1_3_4_19_1","doi-asserted-by":"publisher","DOI":"10.1080\/13600869.2017.1275116"},{"key":"e_1_3_4_20_1","first-page":"9","article-title":"Contracting around privacy: the (behavioral) law and economics of consent and big data","volume":"8","author":"Hermstruwer Y","year":"2017","unstructured":"Hermstruwer Y (2017) Contracting around privacy: the (behavioral) law and economics of consent and big data. Journal of Intellectual Property, Information Technology and Electronic Commerce Law 8: 9.","journal-title":"Journal of Intellectual Property, Information Technology and Electronic Commerce Law"},{"key":"e_1_3_4_21_1","doi-asserted-by":"publisher","DOI":"10.5817\/CP2016-4-7"},{"key":"e_1_3_4_22_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijhcs.2005.04.019"},{"key":"e_1_3_4_23_1","unstructured":"Jones JM (2016) Majority in US do not have a will. Available at: http:\/\/news.gallup.com\/poll\/191651\/majority-not.aspx"},{"issue":"2","key":"e_1_3_4_24_1","first-page":"267","article-title":"A comprehensive empirical study of data privacy, trust, and consumer autonomy","volume":"91","author":"Kesan JP","year":"2016","unstructured":"Kesan JP, Hayes CM, Bashir MN (2016) A comprehensive empirical study of data privacy, trust, and consumer autonomy. Indiana Law Journal 91(2): 267\u2013352.","journal-title":"Indiana Law Journal"},{"key":"e_1_3_4_25_1","unstructured":"Loi n\u00b078-17 du 6 janvier 1978 relative \u00e0 l\u2019informatique aux fichiers et aux libert\u00e9s \u00a7 art. 63 (2016). [in French]."},{"key":"e_1_3_4_26_1","doi-asserted-by":"publisher","DOI":"10.1177\/1461444814543995"},{"key":"e_1_3_4_27_1","doi-asserted-by":"publisher","DOI":"10.1177\/2056305116634368"},{"key":"e_1_3_4_28_1","doi-asserted-by":"publisher","DOI":"10.1093\/ijlit\/eat012"},{"key":"e_1_3_4_29_1","doi-asserted-by":"publisher","DOI":"10.1177\/1461444816654465"},{"key":"e_1_3_4_30_1","doi-asserted-by":"publisher","DOI":"10.1515\/9780804772891"},{"key":"e_1_3_4_31_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1745-6606.2006.00070.x"},{"key":"e_1_3_4_32_1","doi-asserted-by":"publisher","DOI":"10.1080\/1369118X.2018.1486870"},{"key":"e_1_3_4_33_1","doi-asserted-by":"publisher","DOI":"10.1038\/s41562-018-0335-2"},{"key":"e_1_3_4_34_1","doi-asserted-by":"publisher","DOI":"10.1177\/2056305118787808"},{"key":"e_1_3_4_35_1","doi-asserted-by":"publisher","DOI":"10.4159\/harvard.9780674736061"},{"key":"e_1_3_4_36_1","doi-asserted-by":"crossref","unstructured":"Raynes-Goldie K (2010) Aliases creeping and wall cleaning: understanding privacy in the age of Facebook. First Monday 15(1). Available at: https:\/\/firstmonday.org\/ojs\/index.php\/fm\/article\/view\/2775","DOI":"10.5210\/fm.v15i1.2775"},{"key":"e_1_3_4_37_1","doi-asserted-by":"publisher","DOI":"10.1177\/2056305117695325."},{"key":"e_1_3_4_38_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.heliyon.2020.e03298"},{"key":"e_1_3_4_39_1","doi-asserted-by":"publisher","DOI":"10.1177\/0270467615578408"},{"key":"e_1_3_4_40_1","doi-asserted-by":"publisher","DOI":"10.1201\/9780429322198-5"},{"key":"e_1_3_4_41_1","doi-asserted-by":"crossref","unstructured":"Solove DJ (2020) The myth of the privacy paradox. George Washington Law Review 89. GWU Legal Studies Research Paper No. 2020-10. Available at: https:\/\/papers.ssrn.com\/abstract=3536265","DOI":"10.2139\/ssrn.3536265"},{"key":"e_1_3_4_42_1","doi-asserted-by":"crossref","unstructured":"Spiekermann S Grossklags J Berendt B (2001) E-privacy in 2nd generation E-commerce: privacy preferences versus actual behavior. In: Proceedings of the 3rd ACM conference on electronic commerce pp. 38\u201347. Available at: http:\/\/ec-wu.at\/spiekermann\/publications\/inproceedings\/E-privacy%20in%202nd%20Generation%20E-Commerce.pdf","DOI":"10.1145\/501158.501163"},{"key":"e_1_3_4_43_1","doi-asserted-by":"publisher","DOI":"10.1177\/2056305116688035"},{"key":"e_1_3_4_44_1","doi-asserted-by":"publisher","DOI":"10.1080\/08838151.2018.1451867"},{"key":"e_1_3_4_45_1","unstructured":"Uniform Law Commission (2015) Fiduciary access to digital assets act. Available at: https:\/\/www.uniformlaws.org\/HigherLogic\/System\/DownloadDocumentFile.ashx?DocumentFileKey=61b22f86-6d3f-fd1f-7356-5c113f866c60&forceDialog=0"},{"key":"e_1_3_4_46_1","doi-asserted-by":"publisher","DOI":"10.1177\/2056305115616149."},{"key":"e_1_3_4_47_1","doi-asserted-by":"publisher","DOI":"10.2190\/OM.64.4.a"},{"key":"e_1_3_4_48_1","doi-asserted-by":"publisher","DOI":"10.1377\/hlthaff.2017.0175"},{"key":"e_1_3_4_49_1","doi-asserted-by":"publisher","DOI":"10.1080\/1369118X.2013.777757"},{"key":"e_1_3_4_50_1","volume-title":"The Age of Surveillance Capitalism: The Fight for a Human Future at the New Frontier of Power","author":"Zuboff S","year":"2019","unstructured":"Zuboff S (2019) The Age of Surveillance Capitalism: The Fight for a Human Future at the New Frontier of Power. 1st ed. New York: PublicAffairs.","edition":"1"}],"container-title":["New Media &amp; Society"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.1177\/1461444820974955","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/journals.sagepub.com\/doi\/full-xml\/10.1177\/1461444820974955","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.1177\/1461444820974955","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,5,2]],"date-time":"2026-05-02T03:51:21Z","timestamp":1777693881000},"score":1,"resource":{"primary":{"URL":"https:\/\/journals.sagepub.com\/doi\/10.1177\/1461444820974955"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,11,25]]},"references-count":49,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2022,6]]}},"alternative-id":["10.1177\/1461444820974955"],"URL":"https:\/\/doi.org\/10.1177\/1461444820974955","relation":{},"ISSN":["1461-4448","1461-7315"],"issn-type":[{"value":"1461-4448","type":"print"},{"value":"1461-7315","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,11,25]]}}}