Abstract
Increasingly social media accounts are created across multiple platforms with potential long-term use over a person’s lifespan. Social media use over long periods of time can be problematic when the account owner dies as it contains a wealth of information and connections to other users. Messages, pictures, likes, connections, and other social media interaction, over time construct a form of a digital narrative that both may need protection. Problems can occur when these accounts of deceased users are compromised as these profiles can become a treasure trove of content for hackers and can potentially be used to attack other accounts. In this project, we explore possible security implications of compromised social media accounts of deceased users and propose future exploratory studies. This includes a discussion of transitional weaknesses; the time between a person’s death and public knowledge of their death which is when accounts are especially susceptible to being attacked. In addition, we discuss concerns in order to better protect these accounts.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Braman, J., Wood, A., Dudley, A., Vincenti, G.: Using social media to express grief while considering security vulnerabilities of inactive accounts of the deceased. In: Proceedings of the 21st HCI International Conference on Online Communities and Social Computing, Orlando, Florida, July 2019 (2019)
Mitra, A.: Creating a presence on social networks via narbs. Global Media J. 9(16), 1–18 (2010)
The Economist, The world’s most valuable resource is no longer oil, but data. https://www.economist.com/leaders/2017/05/06/the-worlds-most-valuable-resource-is-no-longer-oil-but-data. Accessed 01 Mar 2022
Öhman, C.J., Watson, D.: Are the dead taking over Facebook? A Big Data approach to the future of death online. Big Data Soc. 6(1), 2053951719842540 (2019)
Braman, J., Dudley, A., Vincenti, G.: Death, social networks and virtual worlds: a look into the digital afterlife. In: Proceedings of the 9th International Conference on Software Engineering Research, Management and Applications (SERA 2011), Baltimore, MD USA (2011)
Yu, H., Kaminsky, M., Gibbons, P.B., Flaxman, A.: SybilGuard: defending against sybil attacks via social networks. In: Proceedings of the 2006 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications (SIGCOMM) (2006)
Cao,Q., Sirivianos, M., Yang, X., Pregueiro, T.: Aiding the detection of fake accounts in large scale social online services. In: Symposium on Network System Design and Implementation (2012)
Yang, C., Harkreader, R., Zhang, J., Won Shin, S., Gu, G.: Analyzing spammer’s social networks for fun and profit. In: World Wide Web (WWW) (2012)
Jia, J., Wang, B., Gong, N.Z.: Random walk based fake account detection in online social networks. In: 2017 47Th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), pp. 273–284. IEEE (2017)
Braman, J., Dudley, A., Vincenti, G.: Designing SADD: a social media agent for the detection of the deceased. In: Proceedings of the 20th HCI International Conference on Online Communities and Social Computing, Las Vegas, Nevada, USA, 15–20 July 2018 (2018)
Bossetta, M.: The weaponization of social media: spear phishing and cyberattacks on democracy. J. Int. Affairs 71(15), 97–106 (2018)
Severance, C.: Scammers hack Facebook accounts of deceased users to steal information (2018). https://www.kgw.com/article/news/investigations/scammers-hack-facebook-accounts-of-deceased-users-to-steal-your-information/283-619222524
Holmes, A.: 533 million Facebook users’ phone numbers and personal data have been leaked online (2021). https://www.businessinsider.com/stolen-data-of-533-million-facebook-users-leaked-online-2021-4?r=US&IR=T
Statt, N., Brandom, R.: Google will shut down Google+ four months early after second data leak (2018). https://www.theverge.com/2018/12/10/18134541/google-plus-privacy-api-data-leak-developers
Pagliery, J.: Hackers selling 117 million LinkedIn passwords (2016). https://money.cnn.com/2016/05/19/technology/linkedin-hack/
Microsoft Support: Deceased friends account has been hacked. (User Thread) (2018). https://answers.microsoft.com/en-us/skype/forum/all/deceased-friends-account-has-been-hacked-i/0f84bed8-edba-41f1-8b32-8c258de58197
Sacharczyk, T.: Hackers hijack Facebook accounts of deceased users (2022). https://turnto10.com/i-team/nbc10-i-team-hackers-hijack-facebook-accounts-of-deceased-users
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2022 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this paper
Cite this paper
Dickerson-Southworth, G., Chen, B., Braman, J. (2022). Securing the Accounts of the Deceased: Implications of Compromised Profiles. In: Stephanidis, C., Antona, M., Ntoa, S. (eds) HCI International 2022 Posters. HCII 2022. Communications in Computer and Information Science, vol 1583. Springer, Cham. https://doi.org/10.1007/978-3-031-06394-7_58
Download citation
DOI: https://doi.org/10.1007/978-3-031-06394-7_58
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-06393-0
Online ISBN: 978-3-031-06394-7
eBook Packages: Computer ScienceComputer Science (R0)