major project interim report

Page 1

Major Project

Interim Report

2019-06-18

Death, digital heritage, memory

Doris Tong B816785

Words count: 4630

Tutor: Vicky Lofthouse


O1

Content

Project Brief

02

Background

03

Review

05

Methodology Sampling

06

Mind mapping

08

Sensitization

09

Semi-Interview

10

Participant Board

11

Affinity map

12

Key findings

14

Key insights

18

Opportunity

20

Critical Evaluation

22

Current&Future

23

Reference

24

Appendix

26


Project Brief

Project Brief This project is to explore the attitudes and needs of Internet users (who have intentionally shown interest in their data inheritage) regarding their own data estate before their natural death, to form a new way of transmission and commemoration in the future. (Data heritage mainly includes social accounts, and electronic intellectual property.)

O2


O3

Background

Background

People who use social media:

Their age of using social media:

85%

10+

Millennials

&

75% Gen Xer

Years

(According to the pew research center, by 2018.)

The digital age is all about the use of social software. Social software has become part of the lives of many Internet users. For Facebook, 74% of users say they visit the site multiple times every day. They record their photos, life experiences, articles, interactions and so on on social media (Perrin,2019). Personal data left on the Internet has become one of their valuable assets.

However, a large number of Internet users died over time. Take Facebook for instance, In the ďŹ rst ten years of Facebook

Now reportedly by Facebook

30,000,000

8,000

users died

users die daily (The Sun, 2018. and Independent, 2019.)

Countless of their data and accounts were left behind, and no longer be used as the changes of generations. Facebook is on course to become a digital graveyard after millions of proďŹ les became inactive after users died.


O4

Background

Background Social media has different regulations and adjustments for the situation where user has died and left their social accounts behind. Their regulations on account setting include the way of account transmission, verification, ownership of information, and the person to whom it belongs. Take some famous social medias for example: User can have their account permanently deleted before they die or choose someone (anytime when alive) to become a 'legacy contact' and take control of some aspects of their account after their death. Anyone could report a user as dead with proof and it becomes a memorial account which was permanently locked. Users could not do any setting before they die. The company will work with a person authorized to have an account deactivated (account is not accessible) but requires ID confirmation of the person and the death certificate. Users could not do any setting before they die. The account of a deceased person can either be reported and then memorialised (requires proof of death), or an immediate family member can request that the account be deleted (not accessible). (According to the Sun,2018 and Independent, 2019)

Although social media companies have started to implement some rules and regulations, most of the Internet doesn't allow a user to make posthumous social software settings before they die, which may require some ethic and humane considerations. On the other hand, it's very difficult to set up rules for dead accounts becuase people havent build the awareness of it. According to Pew Research Center(2013), not only because each account has different requirements, many people do not realize the options of this step, which is to set digital will in advance. People begin to realize the importance of data acquisition and transmission only when they encounter similar events. Also, families, companies and legislators are just starting to sort out who owns and has access to these accounts after someone has died. (Duggan, 2013) Generaly, a large amount of young people leave a lot of personal data on the Internet or social media. However, how that data will be processed when they die is a question for the future while the Internet's rules on dead accounts are also immature. The more inactivated accounts are retained in the future, the more serious the problem will be. It is hoped that this research can explore people's views on their own data, as a reference for future people.


Review

Original Focus changes were made.

At the beginning, this research focused on what legacy data they want to leave, the attitude of data privacy and the prospect of future data preservation. However, it is a future-based design project, the future trend of technology and social media can not be predicted. Therefore, the research should not be limited by the current personal data assets, but on the basic human needs, like emotions. What their attitudes toward death and What their basic needs by recalling their memory about death should also be considered as part of research emphsis.

O5


O6

Methodology

Sampling Who would be recruited? In order to explore Internet users' attitudes and needs of data heritage, when sampling participants needed to belong to two of the following three types of people. The targeting people can be classified into three categories:

Internet natives : People who grew up in the Internet age and

Those people are considered "the ‘native speakers’ of the digital language of computers, videos, social media etc., on the internet" (Prensky, 2001). They are mainly millennials who are aged from 22 to 29 (Dimock, 2019).

Cyber citizens : People who enter the Internet era halfway of

This can be original natives who born before the digital age may be the inventors, designers, developers and first users of digital technology and in this sense could be regarded as the original "digital natives" (Prensky, 2001).

Experienced people : The third is people who have experienced

They have some perspective on death and they know what their needs are if they're in the position of memorying someone else.

have accumulated a lot of data with years of experience in the Internet such as social media (still at the age of 20-30).

their life and accumulate a large amount of relatively meaningful data on the Internet, such as having a specific specialty in a certain aspect.

the death of those around them and left a legacy of data.

How to do the sampling? Sampling method was screening. People were asked questions to be assessed if they were the targeting participants above. Question list: 1 How long have you used social media? 2 Would you like to leave your data legacy? (what would you do with your digital legacy before you die?) 3 No offense but have you experienced death of those around you? 4 Did they left a legacy of data and how they deal with it? If they met the above conditions, they were the target group. On the premise of their consent, they would be recruited and make an appointment for the interview later.


O7

Methodology

Participant Table Num. Age

Occupation

P1

22

student

14

Personal ‘value’ M

P2

26

Illustrate designer

17

H

Yes

Yes

Grandpa

P3

28

Ux designer

18

H

Yes

Yes

A designer

P4

24

student

13

H

Yes

Yes

A teacher in uni

P5

29

Project manager

13

H

Yes

Yes

Grandma

P6

22

student

14

H

Yes

Yes

A colse friend

P7

23

student

13

M

Yes

Yes

A teacher and a classmate

P8

27

student

17

M

Yes

Yes

Grandpa

P9

42

Brand designer

21

H

No

Yes

Grandpa and a dog

Internet age

Leave data Experienced behind? death? Yes Yes

who? A friend

*M-Medium H-High

The participants in the above table were recruited for meeting sampling conditions, and their personal information and relevant data were filled for future assistance.


Methodology

O8

Mind Mapping Why? The topic that is about death and heritage is very broad and has many directions. Therefore mindmapping was used in the early stages of the research in order to help the researcher visually organize the connection between death, digital legacy and memory, so as to better understand them. During mind mapping, pain points were pointed out as assumptions for further research in primary research. In subsequent studies, this method also helps researcher to promote understanding of the topic and facilitate their reection on research content (Martin, 2012). How? The whole mind mapping considered time as the axis. Users, data heritage and mourners were the main themes under which the other extensions were gathered outward from. Researcher continued to extend and associate content until all content were represented (Martin, 2012). The pain points generated in the process were written on red and blue post-it notes, respectively for the people who leave the legacy and for the person who mourn it. And these points were written down for further research (Appendix1). Some questions about the prediction of the future will be written at the bottom for the purpose of secondary research.

Mind mapping photo


O9

Methodology

Sensitization The sensitization tool was decided to be used after two interviews. It refers to a series of questions or reflection guides that participants were asked to finish individually one or two days before the interview to think about past experience in advance to improve the quality of the interview (Visser, 2005).

Content structure setting: (Appendix 2)

1. Background Project brief was introduced to have them understood the subject. And they were given a right of refuse answering to build mutual trust and self-exposure. 2. Story guidance and emotion inspiration The content of this section were based on subsequent interviews. Participants were asked to go through their personal data or belongings to establish an advance thinking about their future heritage. "of all the data you currently have, what would you like to leave behind?" Such a question requires participants to roughly browse all their data before answering, which will waste a lot of time in the interview. 3. Recall their memory This section helped to establish their self-reflection on their past experience before going to talk about sensitive topic, and have psychological prepared to avoid excessive negative emotions and antagonistic feeling during the interview.

Questions and guidance that were likely to generate strong emotions should be weakened on the whole and then gradually improved. And Participants were given the option to answer these questions or not. The entire toolkit was in the form of Google slide, where Shared links were sent to participants to edit or download, in order to facilitate participants' ability to drag and drop electronic files (such as digital photos) to complete responses while browsing through their electronic data. Participants were asked to finish and send it back one day before interview. Warm colors were used throughout the tool to make it look less purposeful which give participants a sense of security and warmth to those who was answering. All the information collected from Sensitization were clustered into a table (Appendix 3). The researcher will extract some key points from the answers and explore deeper in the interview. Participants' responses in tool will be consolidated and analyzed into insights in analysis stage.

Check the link to see the sensitization tool online: https://docs.google.com/presentation/d/154K1kYrjr2Rs6QkrjuRGDiiLuGHPtfiQsBP3kudXypM/edit?usp=sharing


1O

Methodology

Semi-Interview Semi-Interview was used in order to have a conversation with participants to collect qualitative information about the latest situation of the experience, and the crowd expectation (Kumar, 2013). The ways of interview were through Facetime and face-to-face with audio recording. All interviews were done by semi-structure so that researcher could adjust next the question according to the answers and participants' emotion, meanwhile, interviewees have more space to express their opinions (Teijlingen, 2014). The structure of interview content (Appendix 4) which could be tailored according to individual interviews was written down in bullet points as a guide of interview. The content was mainly about several major themes obtained from previous research. All articipants were asked to choose an available time and a comfortable place to do interviews. The transcriptions were written down and gone through to extract all the necessary points after interview. Adjustments: Two interviewees were interviewed individually ďŹ rst. However, due to the topic of interview was very private and sensitive and their answers was not smooth (for example, they thought for a long time, etc.), the next six participants were asked to do the sensitization tool before interview with a new structure.

Interview photos

How to interview without hurting participants? In order to avoid hurting the interviewees during the interview. Some tips were used. 1 It was necessary to aďŹƒrm their courage and trust of accepting the interview to show the respect. 2 Participants were given rights to say no, and decide what to say. 3 In the process of interview, researcher tried to interview in a listening way to make them feel safe and supported. Researchers themselves can also establish empathy as soon as possible and accurately handle it. 4 When participants feel uncomfortable during the interview, resercher should give them a break like changing the topic or drink some tea. Sometimes the respondents are already emotional or in tears, researcher need to give them plenty of time to rest until they can move on. When the trust between resercher and participant was established, it can help the resercher to reveal their true feelings and they would be grateful and considered it was an emotional but enjoyable trip.


Methodology

11

Participant Boards Participant board is to list the opinions and key quotes of each participants from transcripts on their own board. Their personal information was written on the board to help reect the reasons behind opinions. The researcher preliminarily extracted insights from the interview contents of each participant (each insight was written on one sticky note), and roughly classiďŹ ed these insights into three or four main aspects according to the interview question framework. It helped to build persona by categorization in a later stage (Appendix 5). Five aspects in participant boards: What will you leave How to memory you How to remember others Data/privacy? Death

Part of participant boards photos


Affinity Map

12

Affinity Map Affinity map was used as the method of analysis for this project.It concretely and meaningfully clusters and synthesizes the observations and insights from secondary and primary research (Martin, 2012). The details of each finding were fully considered in this study, which can be the evidences when extracting insights.

Affinity map photo


13

Affinity Map

1the details obtained from all research methods (interview, secondary, etc.) were written down separately on post-it notes. About 30-40 small insights or observations can be extracted from each participant in the interview. In addition, each of the post-it notes was marked with the participant's number in order to find the source of data. All the post-it notes were initially classified by the themes used in the interview and were posted on a large piece of paper.

2Under each theme, researcher sorted the notes according to the very detail of the content. Notes that share similar content and questions were put together and summarized by a new sticky note in different color. These new sticky notes served as the second layer of this map. Sticky notes with repetitive content were highlighted for finding’s writing.

How to remember others

How to be remembered

Flow diagram was illustrated on the right: 1

2

3

4 Flow of doing Affinity map

3These second layer sticky notes were classified by content and repeated the above process to get the third and fourth layer.

4The content of the fourth layer will serve as the title or theme of the

main findings, which was generally abstract and broad. The sticky notes below this level will support the content of the topic as evidence. Key insights would also be identified by connecting and contradicting among the topics.

Affinity map photos


14

Finding

Key Findings "Want to Be remembered"

"Create or leave something valuable."

People leave data because they want to be remembered. (the next paragraph will explain in detail about people who want to go something valuable to be remembered.) Most people want to do something to avoid being forgotten by the people they care about and by their family descendants. They tend to leave something impressive to form a specific personal image or impression in the way they want. Photos and audio are usually left to express their own style and life history. Besides, no matter it brings positive or negative emotion, people want to leave "common memories" through words, images, audio, social media, etc., so others who share memory can better engrave them. They want to be remembered in positive impressions and perosnal images, so they want to maintain that image by processing the data and removing the unwanted, other faces of themselves, as well as unpublished data that may hurt loved ones.

People want to leave or create valuable data before they died. This ‘valuable’ data mainly includes career achievements, personal works, current thinking and life summary in the form of audio, pictures texts and files. Although the value vary from person to person, most people believed that others acknowledge their works was a kind of affirmation of life and self. Some people say that to be immortality was to have their work been recognized, recorded and even studied by others after death. Whatsmore, the offspring of the family were considered as beneficiaries, in addition to the society and friends. They all want their value to influence or educate their future generations or to help and inspire others in specific fields. Also, this value can be consiedered for having a unique personal emotional value to the person whom they care.


15

Finding

"Emotional catharsis." People are rational when dealing with their data, but they are very emotional when facing death. Most is the need for emotional catharsis. Some are worried about the data left will hurt ppl or leave a negative impression. Some people ďŹ nd it challenging to overcome the fear of death while some prefer to believe in fate. In the face of these emotions, people want to do something to get them o. They want what left were joyful, such as happy memories, photos of laughter, to deliver positive emotions for those who remember. Meanwhile, they choose to leave or create some inner thought or unspoken words to take the last chance to express their feelings. When they miss others, they will browse the social accounts, photos of memories and other data of the deceased and do some interaction to serve as their emotional sustenance and relieve the pain.

Regret "I wish I had time to..." Regret is an emotion that everyone would produce when facing the deceased. Some of these regret become a negatively self-blame, or to cherish the people around. Generally, most want to cherish those who are alive for now and hope those people suer less pain.

"Social media is a way of connection." Social media is considered as a primary platform to have emotional interaction with the deceased. When users pass away, their friends or family members will gather at their public social platform to mourn them, such as writing, leaving messages, and so on. People also mentioned that when they feel miss, it is a great platform to follow the updates from the family of the deceased. Social media is also a current way of receiving about the death information of people around them (not family). In addition, people express their willingness to leave their social accounts behind. They entrust their social accounts to their family and friends or platforms in advance, hoping to inform others of their death information through social platforms on behalf of them.


16

Finding

"Data processing." They all agree that the right to handle personal data should belong to themselves. They enjoy the emotions and memories that come with reviewing the data such as photos or documents. However, one of their troubles is that there is too much data which may takes a long time to do data screening and processing. A large amount of data significantly reduces their motivation to process their data. Besides, They don't know when they're going to die, so they can't decide when is the best time to process their data(they believe it should be done before death). In addition, everyone has different decision regarding public and private data, and there is no specific threshold that can determine what’s privacy and what’s public. They want to make the adjustment and change of the decision over time.

ALREADY PUBLISHED DATA

Published VALUABLE DATA JUNK DATA

UNPUBLISHED DATA

SECRETS

Deleted

OTHERS

Most people want to filter their unpublished parts and keep the published parts still. Only the unpublished BUT valuable data is what they want to keep particularly to a particularly group of people. It is considered have basically privacy. The secret and junk data are expected to be deleted forever.


17

Finding

"Data privacy."

"Data protection."

Most people expressed the hope that they should still have privacy after death. Without their permission, they don't want anyone to invade their data privacy after death, even their closest family. They want to make their unpublished data(see last paragraph), available to people at dierent levels of conďŹ dentiality. Besides, they believe that only people who care about themselves will reach out to their data. When they look at the data of the deceased, although they still have doubts or regrets, they always respect the privacy of the dead. Generally people are willing to give the ownership of the processed data to someone very close and trustworthy and set privacy for people in general relationships, and don't care about public strangers.

VERY CLOSE and TRUSTWORTHY GENERAL RELATIONSHIP

Privacy groups can be divided into people who are very close, people in general relationship, and strangers.

STRANGERS

Because of the bankruptcy of some social software companies in the past, most of them have experienced data loss, which brings them a strong sense of insecurity about their data. They believe that data represents certain parts of themselves (life experience, career history, etc.), and the loss of data represents the loss of evidence in these parts. Because of this, they store and publish their data on many platforms to ensure the record of their data. Moreover, some still believe the USB portable hard drive is more reliable than in the cloud. They want their data, or inherited data to be kept in a safe, trusted and private place.


18

Key Insights

Key Insights

value?

People want to leave something meaningful and valuable because they want future generations can benefit from their data. However, they need to process their large amount of data to filter the valuable part.

social account?

People want to left their social account and keep it published. Because others can remember them by going to their social media account. However, people have not established the consciousness of understanding the terms and conditions of setting death social account. Meanwhile, they find it challenging to face death.

interaction?

People want to have interaction with the deceased, such as leaving messages. They also want to leave some words unspoken or regret behind, because they both need to express emotion, but some interaction is very, and there is no universal technology can satisfy this need.

data processing?

People want to process and shape their data(delete some secrets) in advance because they want to be remembered and recalled in a specific and positive image, or in the way they want to be remembered, but they have not established the consciousness of processing data.

change?

People want to process data legacy before they die, because they don't want to leave regret or hurt others, also don't want to transfer the rights to others, but what they want may be different at each stage and they even don't know what time through what is the most suitable to process the data.


19

Key Insights

classification?

family?

People want to classify who can access to their data into groups in terms of privacy because they want different people to access to different content and they believe that their data heritage means different things to different people. However, they need to face a large amount of data, spend much time in advance to do privacy classification for people and content, and there is no platform to meet this demand. People want to give their private (including social account) data to close family, because they think the affection and lineage between the family are what cannot get rid of. Only people who care about them will access and remember their data, but they are afraid to leave too much might hurt them.

ownership?

People want to own the data of whom they care the most( family mainly), because they hope that to know the person, miss the deceased(emotional catharsis) and find the answer of their confusion and regret through their data. However, they sometimes did not get the rights or password to access their data.

preservation?

People will put data on many platforms, or stored in many devices, because data is a part of them and they want their data can be preserved safely, but they have experienced the bankruptcy or update of the company which resulted in the loss of personal data, so they are worried about the security of the data, and have a very strong sense of insecurity and mistrust regarding the existing platform.


20

Opportunity

Opportunities-HMW These insights above were used to generate pain points in order to look for opportunities to solve problems and improve experience.

value?

consciousness?

HMW provide some settled options to store their valuable data? HMW help to ďŹ lter the valuable part of their data? HMW use their occupations as a guide to ďŹ lter the data? HMW build the awareness of setting data in advance? HMW emphasis the step of reading policy of setting death account of social media? HMW download their data on social media and transfer them into another way? HMW build the new perspective of death?

interaction?

HMW create that person by his data online? HMW use a timeline where people can join and edit? HMW provide people a private space to remember and interact with the deceased? HMW create a function that people can search key words on others data heritage(for common memory)?

data processing?

HMW use a technology to store data during entire life and it helps to process data? HMW create a function to inform users to manage their data every few periods of their life? HMW provide a service to know users’ data better than the users? HMW provide a service to help users to shape their heritage into the way they want it to be?


21

Opportunity

change?

HMW make the heritage editable? HMW evaluate the data usage every life stage to help to make a decision regarding their data?

classification?

HMW use personal identity (or interesting question)to get access to the data heritage? HMW have different content of data shown to different groups of people?

family?

HMW limit the quality and quantity of their data leaving behind? HMW design for the family inheritance so that every future generation can understand the family? HMW set family with special rights to access to the data?

ownership?

HMW have people set ownership the data before they die? HMW help to save the passwords or keys in a safe place to pass over?

How might we photo

preservation?

HMW sign a contrast like an insurance to keep them safe? HMW use the function like inserting pictures into AI files, every data is like a link connecting its origin place?


Critical Evaluation

Critical evaluations This project is a future project. It is a problem that many people are not aware of, and there is no obvious solution at present. The limitation of the project is that future technology are unpredictable. Although the Internet usage is mostly unchanged (Perrin, 2019), most social and data companies generally take the decision to recycle the data of dead users, except that Facebook is beginning to recognize the problem and made some initial adjustments. The attitude of users towards personal data heritage, the device to preserve the data and so on are unknown. The most challenging part of the project is people's complicated emotion behind data is diďŹƒcult to quantify. This project started from the most basic needs of current Internet users and explore what data they consider that have a positive impact and which data they think is negative. In addition, most users now haven't experienced the death of someone with a data legacy around them and the awareness to process data haven’t been established. Therefore diusion of this notion should be important. In the hope that, this project can serve as a reference to help future people think about how to deal with their data heritage and help data companies design more user-based settings.

22


23

Current&Future

Current & future A large number of interviews and secondary research collected a lot of valuable information, including people's attitudes and demands, so as to basically understand the services of data companies. The current progress of this project is the data collection has completed and the insights has been extracted. The core of the research will not change in later stage. UX vision and persona will be needed to help the researcher find more solutions. Meanwhile, secondary research should be conducted simultaneously to help open up ideas and provide evidence. After that, all the HMWs are screened by matrix, and then ideation will be carried out. In the future, more design methods, such as interviews, toolkits, group discussion and so on, will be used to verify and iterate final concept. Please see the table on the right side for summer plan.

4th July

Identify the key issues and have a UX vision statement

11th July

Create a persona and generate concepts.

18th July

Refine final concept and create story board

25th July

Plan a user testing iteration

1st August

Lo-fi prototype and do the user testing

8th August

UI plan and create hi-fi prototype

15th August

Create final Hi-fi prototype

22nd August

Create final Hi-fi prototype and write report

29nd August

Create final Hi-fi prototype and write report

6th Sept.

Final report hand in


Reference

Reference Perrin, A. and Anderson, M. (2019). Share of U.S. adults using social media, including Facebook, is mostly unchanged since 2018. [online] Available at:https://www.pewresearch.org/fact-tank/2019/04/10/share-of-u-s-adults-using-social-media-including-facebook-is-mostly-unchanged-since-2018/ (Accessed 10 Apr. 2019). Jiang, J. (2018). Millennials stand out for their technology use, but older generations also embrace digital life. [online] Available at: https://www.pewresearch.org/fact-tank/2018/05/02/millennals-stand-out-for-their-technology-use-but-older-generations-also-embrace-digital-life/ (Accessed 2 May. 2018). Ritschel, C. (2019). WHAT HAPPENS TO YOUR INSTAGRAM, FACEBOOK AND TWITTER ACCOUNTS WHEN YOU DIE. [online] Available at: https://www.independent.co.uk/life-style/social-media-what-happens-when-you-die-instagram-facebook-twitter-gmail-pinterest-a8706126.html (Accessed 2 Jan. 2019). Christodoulou, H. (2018). This is what happens to ALL your social media accounts after you die. [online] Available at: https://www.thesun.co.uk/tech/2441047/what-happens-social-media-accounts-when-you-die/ (Accessed 30 Dec. 2018). Duggan, M. (2013). What happens to your digital life after death? [online] Available at: https://www.pewresearch.org/fact-tank/2013/12/02/what-happens-to-your-digital-life-after-death/ (Accessed 2 Dec. 2013). Reynolds, E. (2019). Why You Should Make a 'Digital Will'. [online] Available at: https://www.vice.com/en_uk/article/eve37e/digital-data-after-death-facebook (Accessed 28 Mar. 2019). Anderson, J. and Lee, R. (2017). The Fate of Online Trust in the Next Decade [online] Available at: https://www.pewinternet.org/2017/08/10/the-fate-of-online-trust-in-the-next-decade/ (Accessed 10 Aug. 2017). Pransky, M. (2001). Digital Natives. [online] Available at: https://en.wikipedia.org/wiki/Digital_native (Accessed Apr. 2019).

24


Reference

Reference Dimock, M. (2019). DeďŹ ning generations: Where Millennials end and Generation Z begins. [online] Available at: https://www.pewresearch.org/fact-tank/2019/01/17/where-millennials-end-and-generation-z-begins/ (Accessed 17 Jan. 2019). Martin, B. (2012). Universal Methods of Design. p118-119. Visser, F. S., Stapper, P. J. (2005) Contextmapping: experiences from practice. [online] Available at: https://www.tandfonline.com/doi/full/10.1080/15710880500135987?scroll=top&needAccess=true&instName=Loughborough+University# (Accessed 03 Feb. 2007). Teijlingen, E. V. (2014). Semi-structured interviews [online] Available at: http://dx.doi.org/10.4135/9781412963909.n420 (Accessed 2008). Kumar, V. (2013). 101 Design Methods. [online] Available at: https://books.google.co.uk/books?hl=zh-CN&lr=&id=WJQmHlsDhQUC&oi=fnd&pg=PR9&dq=101+design+method+kumar&ots=ivi0c-AN0N&sig=VZaTEvv80k-H2Pga573uiwiEPd8#v=onepage&q=101%20design%20metho d%20kumar&f=false (Accessed 2013). Gibson, M. (2015). Automatic and automated mourning: messengers of death and messages from the dead. [online] Available at: https://www.tandfonline.com/doi/full/10.1080/10304312.2015.1025369 (Accessed 24 Apr. 2015).

25


26

Critical Evaluation

Appendix 1- Pain points from Mind Mapping

• Before: 1. I haven't thought about my digital data? 2. Who am I? 3. I don't know how much data I have for now 4. When should I deal with them? 5. No idea how to cluster them or process them 6. Too much data(filter) 7. Where is the safe place to store? 8. How to trust this place? 9. Memory in the way I want them to… 11. Anxiety of death

• After: 1. How to access to hiden data? 2. No password No right 3. How can I be comfirmed? 4. How to inform others about the death? 5. How to remember the deceased? 6. Where? 7. When is the time to remeber others? 8. Deal with the heritable data 10. How to be remembered?


Critical Evaluation

Appendix 2- Template of Sensitization https://docs.google.com/presentation/d/154K1kYrjr2Rs6QkrjuRGDiiLuGHPtfiQsBP3kudXypM/edit#slide=id.p

27

2


Critical Evaluation

Appendix 3- Data from Sensitization

28


29

Critical Evaluation

Appendix 4- Semi-Interview Structure Draft Structure : (used ONLY when interviewing P1, P2)

1.Death -perspective -meaning 2.Social media (toward death -meaning -Frequency of use -property left (digital, memory) -personal wish 3.Legacy -what&why-perspective -process when alive -how to remember others and you -security and privacy -future 4.Social media (company) -looks like ďźˆUI -how to remember -data storage -data privacy -access and security

Final Structure :

1.Death -story telling -perspective 2.Being mourned -what&how&why -digital data meaning -how to remember -security and privacy -set it when alive -future 3.Mourn others -what&why -meaning -how to memory -security and privacy -digital help -future 4.Social media -looks like ďźˆUI -how to remember -data storage -data privacy -access and security


Critical Evaluation

Appendix 5Data table from Participant boards

30


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.