Digital hoarding

Last updated • 8 min readFrom Wikipedia, The Free Encyclopedia
An extremely cluttered computer desktop, a common example of digital hoarding. Exampleofdigitalhoarding cluttereddesktop001.jpg
An extremely cluttered computer desktop, a common example of digital hoarding.

Digital hoarding (also known as e-hoarding, e-clutter, data hoarding,digital pack-rattery or cyber hoarding) is defined by researchers as an emerging sub-type of hoarding disorder characterized by individuals collecting excessive digital material which leads to those individuals experiencing stress and disorganization. [1] Digital hoarding takes place in electronic environments where information is stored digitally. The term gained popularity among online forums and in the media before receiving scholarly attention. [2] Research indicates there may be correlation between individuals who exhibit physical and digital hoarding behaviors [3] [4] [5] and acknowledges there is a lack of psychological literature on the subject. [5]

Contents

Several studies suggest the main influential factors of digital hoarding are related to a number of issues and personal reasons which includes reduced costs for storing data, individuals lacking time to curate accumulated data, the perceived lifespan of data and emotional attachment to digital assets. The studies conducted to examine digital hoarding are limited in scope as this is an emerging area of study. There is a lack of agreement among researchers about whether digital hoarding is a condition to be treated rather than a normal human activity. [6]

The term data hoarding is also used to describe the (non-pathological) archiving of large amounts of data that might otherwise be lost, such as old video games and websites.

Behavioral influences

The limited studies published that focus on examining digital hoarding behavior identified the following influential factors as having significant impact on an individual's decision to accumulate digital material:

Researchers cite the following developments in technology as playing a role in enabling the increased accumulation of digital material:

Research findings

The increasing availability of digital materials coincides with increased opportunity for people to accumulate digital materials. Van Bennekom et al. introduced "digital hoarding" in scientific literature in 2015 after reading descriptions of it published on the Internet by both patients and professionals. They define it as "the accumulation of digital files to the point of loss of perspective, which eventually results in stress and disorganization." [1] Since the publication of this case study, several attempts have been made to study digital hoarding. In each of these publications there are clear knowledge gaps identified citing the need of more research to better understand digital hoarding. [2] [11]

Sweeten et al. conducted one of the first research projects in 2018 that focused on digital hoarding, examining characteristics and potential problems associated with digital hoarding. [2] They identified five barriers to deleting digital data including: keeping data for the future/just in case, keeping data as evidence, lazy/time-consuming, emotional attachment to data, not my server-not my problem. They also identified four problems associated with accumulating excessive amounts of data including: effects on productivity, effects on psychological wellbeing, cybersecurity issues, links with physical hoarding. Participants in this study were frequently surprised by how much data they accumulated yet still experienced difficulties when discussing discarding that information. This study of digital hoarding was limited by a small sample of participants and the absence of an agreed upon standardized scale to measure digital hoarding behavior. [2]

Vitale et al. published another early research project in 2018 investigating digital data perceptions among a small sample of individuals with diverse backgrounds. This research focused on what digital items individuals held onto for multiple years and the criteria used to determine why and how those digital items were considered worth saving. The researchers used hoarding and minimalism as two extremes to discuss the spectrum of tendencies uncovered during interviews as they found these tendencies required context for understanding and not fitted for binary categorization. [11]

In addition to bringing attention to hoarding tendencies, Vitale et al.'s research compared and contrasted these tendencies as they relate to identity construction. [11] Dillon suggests within the spectrum Vitale et al. established with hoarding and minimalism as extremes at each end, most human engagement with digital and physical objects falls in between those two extremes. [6]

Published studies focused on digital hoarding include adult participants and no children. One researcher in search of ways to apply what is known about adult hoarding to identifying and treating hoarding behavior exhibited by children suggested further research into digital hoarding behavior among children. [13]

Constraints

The focus of existing studies on digital hoarding are narrow in scope, typically focusing on determining what differences and similarities exist between people's reasons to accumulate digital material in a work setting vs private setting. This boundary between work vs personal information spaces is becoming increasingly difficult to sustain prompting some archivists to suggest work and personal information could merge into personal record keeping. Other limitations include small sample research groups and a lack of agreed upon metrics to fully measure the aspects of digital hoarding behavior. [14] [15]

Common hoarding sites

The tab bar on Chromium of a browser tab hoarder. Tab Hoarder Bar.png
The tab bar on Chromium of a browser tab hoarder.

Digital hoarding occurs in any electronic spaces where information is stored. These are common areas where digital clutter may exist:[ citation needed ]

Some social media platforms also provide opportunity for digital hoarding. On the social networking site Facebook, for example, one can accumulate a vast number of “friends”, even reaching the maximum limit of 5000 for example, that may merely be acquaintances or lapsed contacts or even complete strangers. [16] Groups and Pages can also contribute to clutter when users join and like new ones, respectively, without leaving or unfollowing those in which they are no longer interested. [16]

Motivations

Digital hoarding stems from a variety of individual traits and habits, corporate conditions, and societal trends:

Repercussions

Digital hoarding can lead to potential issues:

Positive reasoning

From the few studies that have specifically examined digital hoarding, participants cite their reasoning for saving many digital files is due to the lack of physical space it takes up. [2] [5] Siddick et al. examined carbon and water footprints of data centers located in the United States noting a lack of transparency surrounding the role of data centers in handling data, obscuring the environmental implications of data centers from the public eye. [25]

Media coverage

Many American documentary television series depict the struggles of compulsive hoarders, such as Hoarding: Buried Alive on TLC and Hoarders on A&E. These shows have popularized awareness of hoarding, showing the consequences of accumulating clutter. However, these programs usually focus on physical hoarding. The WPTV story of Fort Lauderdale, Florida, resident Larry Fisher is a notable exception. This program focused on digital hoarding, depicting Fisher's longstanding refusal to delete any digital content. Instead, Fisher purchased an additional computer every time he ran out of hard drive space. [26] The BBC News story of Washington, D.C., resident Chris Yurista expresses a counterpoint to this perspective. The program portrayed Yurista as a "21st century minimalist" for living with hardly any physical assets, substituting digital goods wherever possible. [27]

Digital clutter is the term often used to describe the resulting (digital) artifacts of digital hoarding, but it should not be understood as exclusively the result of hoarding. Digital clutter can be created as a side-effect of high occurrences of another user activity, such as the computer desktop icons created through frequent installation of applications. In such a case the clutter does not reflect the user's intent to hoard.[ citation needed ]

Housekeeping is the term often used to refer to the activity by which digital clutter moves out of the 'clutter' designation, either by being thrown away, being organised, or by the recognition of its importance, thus no longer making it part of the 'clutter'.[ citation needed ]

Gadget hoarding is the excessive hoarding of electronic hardware including computers, cellphones, wires and cables, VCR and DVD players, audio equipment, routers, and tablets; it can occur in individuals alongside digital hoarding. [28] [29] [30] [31] [32] [33] [34] [35] [36]

See also

Related Research Articles

<span class="mw-page-title-main">Internet</span> Global system of connected computer networks

The Internet is the global system of interconnected computer networks that uses the Internet protocol suite (TCP/IP) to communicate between networks and devices. It is a network of networks that consists of private, public, academic, business, and government networks of local to global scope, linked by a broad array of electronic, wireless, and optical networking technologies. The Internet carries a vast range of information resources and services, such as the interlinked hypertext documents and applications of the World Wide Web (WWW), electronic mail, telephony, and file sharing.

<span class="mw-page-title-main">Privacy</span> Seclusion from unwanted attention

Privacy is the ability of an individual or group to seclude themselves or information about themselves, and thereby express themselves selectively.

Personal information management (PIM) is the study and implementation of the activities that people perform in order to acquire or create, store, organize, maintain, retrieve, and use informational items such as documents, web pages, and email messages for everyday use to complete tasks and fulfill a person's various roles ; it is information management with intrapersonal scope. Personal knowledge management is by some definitions a subdomain.

<span class="mw-page-title-main">Hoarding disorder</span> Behavioral pattern

Hoarding disorder (HD) or Plyushkin's disorder, is a mental disorder characterised by persistent difficulty in parting with possessions and engaging in excessive acquisition of items that are not needed or for which no space is available. This results in severely cluttered living spaces, distress, and impairment in personal, family, social, educational, occupational, or other important areas of functioning. Excessive acquisition is characterized by repetitive urges or behaviours related to amassing or buying property. Difficulty discarding possessions is characterized by a perceived need to save items and distress associated with discarding them. Accumulation of possessions results in living spaces becoming cluttered to the point that their use or safety is compromised. It is recognised by the eleventh revision of the International Classification of Diseases (ICD-11) and the Diagnostic and Statistical Manual of Mental Disorders, 5th edition (DSM-5).

<span class="mw-page-title-main">Hoarding</span> Intentional accumulation of items for later use

Hoarding is the act of engaging in excessive acquisition of items that are not needed or for which no space is available.

Information overload is the difficulty in understanding an issue and effectively making decisions when one has too much information (TMI) about that issue, and is generally associated with the excessive quantity of daily information. The term "information overload" was first used as early as 1962 by scholars in management and information studies, including in Bertram Gross' 1964 book, The Managing of Organizations, and was further popularized by Alvin Toffler in his bestselling 1970 book Future Shock. Speier et al. (1999) said that if input exceeds the processing capacity, information overload occurs, which is likely to reduce the quality of the decisions.

<span class="mw-page-title-main">Animal hoarding</span> Keeping more domestic pets than can be cared for

Animal hoarding, sometimes called Noah syndrome, is keeping a higher-than-usual number of animals as domestic pets without the ability to properly house or care for them, while at the same time denying this inability. Compulsive hoarding can be characterized as a symptom of a mental disorder rather than deliberate cruelty towards animals. Hoarders are deeply attached to their pets and find it extremely difficult to let the pets go. They typically cannot comprehend that they are harming their pets by failing to provide them with proper care. Hoarders tend to believe that they provide the right amount of care for them. The American Society for the Prevention of Cruelty to Animals provides a "Hoarding Prevention Team", which works with hoarders to help them attain a manageable and healthy number of pets.

<span class="mw-page-title-main">Tab (interface)</span> Interface component

In interface design, a tab is a graphical user interface object that allows multiple documents or panels to be contained within a single window, using tabs as a navigational widget for switching between sets of documents. It is an interface style most commonly associated with web browsers, web applications, text editors, and preference panels, with window managers and tiling window managers.

<span class="mw-page-title-main">Google Desktop</span> Computer program

Google Desktop was a computer program with desktop search capabilities, created by Google for Linux, Apple Mac OS X, and Microsoft Windows systems. It allowed text searches of a user's email messages, computer files, music, photos, chats, web pages viewed, and the ability to display "Google Gadgets" on the user's desktop in a sidebar.

Email marketing is the act of sending a commercial message, typically to a group of people, using email. In its broadest sense, every email sent to a potential or current customer could be considered email marketing. It involves using email to send advertisements, request business, or solicit sales or donations. Email marketing strategies commonly seek to achieve one or more of three primary objectives: build loyalty, trust, or brand awareness. The term usually refers to sending email messages with the purpose of enhancing a merchant's relationship with current or previous customers, encouraging customer loyalty and repeat business, acquiring new customers or convincing current customers to purchase something immediately, and sharing third-party ads.

Internet privacy involves the right or mandate of personal privacy concerning the storage, re-purposing, provision to third parties, and display of information pertaining to oneself via the Internet. Internet privacy is a subset of data privacy. Privacy concerns have been articulated from the beginnings of large-scale computer sharing and especially relate to mass surveillance.

Social computing is an area of computer science that is concerned with the intersection of social behavior and computational systems. It is based on creating or recreating social conventions and social contexts through the use of software and technology. Thus, blogs, email, instant messaging, social network services, wikis, social bookmarking and other instances of what is often called social software illustrate ideas from social computing.

<span class="mw-page-title-main">Personal web page</span> Web page created by an individual to contain personal content

Personal web pages are World Wide Web pages created by an individual to contain content of a personal nature rather than content pertaining to a company, organization or institution. Personal web pages are primarily used for informative or entertainment purposes but can also be used for personal career marketing, social networking with other people with shared interests, or as a space for personal expression.

<span class="mw-page-title-main">News aggregator</span> Client software that aggregates syndicated web content

In computing, a news aggregator, also termed a feed aggregator, content aggregator, feed reader, news reader, or simply an aggregator, is client software or a web application that aggregates digital content such as online newspapers, blogs, podcasts, and video blogs (vlogs) in one location for easy viewing. The updates distributed may include journal tables of contents, podcasts, videos, and news items.

<span class="mw-page-title-main">Digital marketing</span> Marketing of products or services using digital technologies or digital tools

Digital marketing is the component of marketing that uses the Internet and online-based digital technologies such as desktop computers, mobile phones, and other digital media and platforms to promote products and services. It has significantly transformed the way brands and businesses utilize technology for marketing since the 1990s and 2000s. As digital platforms became increasingly incorporated into marketing plans and everyday life, and as people increasingly used digital devices instead of visiting physical shops, digital marketing campaigns have become prevalent, employing combinations of search engine optimization (SEO), search engine marketing (SEM), content marketing, influencer marketing, content automation, campaign marketing, data-driven marketing, e-commerce marketing, social media marketing, social media optimization, e-mail direct marketing, display advertising, e-books, and optical disks and games have become commonplace. Digital marketing extends to non-Internet channels that provide digital media, such as television, mobile phones, callbacks, and on-hold mobile ringtones. The extension to non-Internet channels differentiates digital marketing from online marketing.

<span class="mw-page-title-main">Targeted advertising</span> Form of advertising

Targeted advertising is a form of advertising, including online advertising, that is directed towards an audience with certain traits, based on the product or person the advertiser is promoting.

Netnography is a "form of qualitative research that seeks to understand the cultural experiences that encompass and are reflected within the traces, practices, networks and systems of social media". It is a specific set of research practices related to data collection, analysis, research ethics, and representation, rooted in participant observation that can be conceptualized into three key stages: investigation, interaction, and immersion. In netnography, a significant amount of the data originates in and manifests through the digital traces of naturally occurring public conversations recorded by contemporary communications networks. Netnography uses these conversations as data. It is an interpretive research method that adapts the traditional, in-person participant observation techniques of anthropology to the study of interactions and experiences manifesting through digital communications.

Money disorders refer to problematic financial beliefs and behaviors that can cause significant distress and hinder one's social or occupational well-being. These issues often stem from financial stress or an inability to effectively utilize one's financial resources, leading to clinically significant challenges. Money disorders refer to enduring and often unchanging patterns of self-destructive financial behaviors that lead to considerable stress, anxiety, emotional anguish, and significant disruptions in various areas of a person's life.

A web beacon is a technique used on web pages and email to unobtrusively allow checking that a user has accessed some content. Web beacons are typically used by third parties to monitor the activity of users at a website for the purpose of web analytics or page tagging. They can also be used for email tracking. When implemented using JavaScript, they may be called JavaScript tags. Web beacons are unseen HTML elements that track a webpage views. Upon the user revisiting the webpage, these beacons are connected to cookies established by the server, facilitating undisclosed user tracking.

A cold email is an unsolicited e-mail that is sent to a receiver without prior contact. It could also be defined as the email equivalent of cold calling. Cold emailing is a subset of email marketing and differs from transactional and warm emailing.

References

  1. 1 2 Van Bennekom, Martine J.; Blom, Rianne M.; Vulink, Nienke; Denys, Damiaan (2015). "A case of digital hoarding". BMJ Case Reports. 2015: bcr2015210814. doi:10.1136/bcr-2015-210814. PMC   4600778 . PMID   26452411.
  2. 1 2 3 4 5 6 7 8 Sweeten, George; Sillence, Elizabeth; Neave, Nick (2018). "Digital hoarding behaviours: Underlying motivations and potential negative consequences". Computers in Human Behavior. 85: 54–60. doi:10.1016/j.chb.2018.03.031. S2CID   49487239.
  3. Centre for Research and Evidence on Security. (2020). Cybersecurity Risks of Digital Hoarding Behaviours. https://crestresearch.ac.uk/types/report/
  4. Kim, S. (2013). Personal Digital Archives: Preservation of documents, preservation of self (dissertation). University of Texas at Austin.
  5. 1 2 3 Thorpe, Susan; Bolster, Alexander; Neave, Nick (2019). "Exploring aspects of the cognitive behavioural model of physical hoarding in relation to digital hoarding behaviours". Digital Health. 5. doi:10.1177/2055207619882172. PMC   6785915 . PMID   31636918.
  6. 1 2 Dillon, Andrew (2019). "Collecting as Routine Human Behavior: Personal Identity and Control in the Material and Digital World". Information & Culture. 54 (3): 255–280. doi:10.7560/ic54301. S2CID   210381785.
  7. Beck, M. (2012-03-27). "Drowning in Email, Photos, Files? Hoarding Goes Digital". The Wall Street Journal. Archived from the original on 2012-03-27.
  8. 1 2 Gormley, C. J., & Gormley, S. J. (2012). Data hoarding and information clutter: The impact on cost, life span of data, effectiveness, sharing, productivity, and knowledge management culture. Issues in Information Systems, 13(2), 90–95.
  9. 1 2 Williams, P., Leighton John, J., & Rowland, I. (2009). The personal curation of digital objects: A lifecycle approach. AslibProceedings, 61(4), 340–363.
  10. Case, A. (2011-12-18). "Digital Hoarding". Cyborg Anthropology. Archived from the original on 2020-11-24.
  11. 1 2 3 4 Vitale, Francesco; Janzen, Izabelle; McGrenere, Joanna (2018). "Hoarding and Minimalism". Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems. pp. 1–12. doi:10.1145/3173574.3174161. ISBN   9781450356206. S2CID   5041322.
  12. Schüll, N. D. (2018). Digital containment and its discontents. History and Anthropology, 29(1), 42–48.
  13. Whomsley, Stuart R. C. (2020). "An overview of hoarding difficulties in children and adolescents". Children Australia. 45 (3): 182–185. doi:10.1017/cha.2020.29. S2CID   225689865.
  14. Lee, C. A. (2011). I, Digital: Personal Collections in the Digital Era. Society of American Archivists.
  15. Harris, V. (2001). On the back of a tiger: deconstructive possibilities in ’Evidence of me’. Archives & Manuscripts, 29(1), 8–21. Retrieved from https://publications.archivists.org.au/index.php/asa/article/view/8881
  16. 1 2 Cabellon, Ed (n.d.). "Stop Digital Hoardin". EDUniverse. Archived from the original on 2014-04-08. Retrieved 2014-04-08.
  17. 1 2 3 "Digital hoarding - a new version of an old psychological challenge". www.uclahealth.org. Retrieved 2023-03-18.
  18. "Definition of: e-hoarder". PCMag. n.d. Archived from the original on 2019-03-21.
  19. Gatchelian, Gayle (2011-05-07). "Hoarding the ethereal: How we have more things (and more problems) but with less clutter" (PDF). Massachusetts Institute of Technology. Archived from the original (PDF) on 2015-12-24. Retrieved 2014-04-09.
  20. Fogarty, Kevin (2013-01-25). "Digital Hoarding: Do We Have a Problem?". Network Computing. Archived from the original on 2021-06-13.
  21. Egan, Marsha (n.d.). "Pro: Don't Litter In Your Electronic Yard". Bloomberg Businessweek. Archived from the original on 2014-02-17. Retrieved 2014-04-08.
  22. Alan, Henry (2012-10-04). "How to Break Your Media Addiction and Clean Up Your Digital Clutter". Lifehacker. Archived from the original on 2018-02-10. Retrieved 2018-02-09.
  23. Hill, Simon (2012-08-23). "Is Digital Hoarding Dragging You Down?". Digital Trends. Archived from the original on 2017-05-02.
  24. 1 2 Sloane, Stanton D. (2011-03-25). "The Problem With Packrats:The High Costs Of Digital Hoarding". Forbes. Archived from the original on 2021-06-13.
  25. Siddik, Md Abu Bakar; Shehabi, Arman; Marston, Landon (2021). "The environmental footprint of data centers in the United States". Environmental Research Letters. 16 (6): 064017. Bibcode:2021ERL....16f4017S. doi: 10.1088/1748-9326/abfba1 . hdl: 10919/109747 . S2CID   235282419.
  26. Anfinsen, Jason (2014-04-29). "E-hoarding is a new phenomenon that is quickly spreading amongst computer users". WPTV. Archived from the original on 2014-08-08. Retrieved 2014-04-08.
  27. Danzico, Matthew (2010-08-16). "Cult of less: Living out of a hard drive". BBC News. Archived from the original on 2021-02-03.
  28. "Your new disease, America: Compulsive gadget-hoarding".
  29. Clayton, Nick. "Facing reality: Are you a gadget hoarder?".
  30. "Gadget hoarding: A growing problem in the Digital Age". ABC7 Chicago. 12 January 2014. Retrieved 11 November 2023.
  31. "Are You a Gadget Hoarder?". 13 December 2013.
  32. "Gadget hoarding: When technology runs amok". 15 May 2014.
  33. "Growing concern over gadget hoarding". 6 January 2014.
  34. "Got old gadgets? You may be a hoarder". 4 June 2014.
  35. "Organized: Gadget hoarding in our homes".
  36. "Hoarding Old, Unused Electronics".

Further reading