Digital footprint

Digital footprint or digital shadow refers to one's unique set of traceable digital activities, actions, contributions and communications that are manifested on the Internet or on digital devices.[1][2][3][4]

There are two main classifications for digital footprints: passive and active. A passive digital footprint is created when data is collected without the owner knowing (also known as data exhaust), whereas active digital footprints are created when personal data is released deliberately by a user for the purpose of sharing information about oneself by means of websites or social media.[5]

  • Passive digital footprints can be stored in many ways depending on the situation. In an online environment a footprint may be stored in an online data base as a "hit". This footprint may track the user IP address, when it was created, and where they came from; with the footprint later being analyzed. In an offline environment, a footprint may be stored in files, which can be accessed by administrators to view the actions performed on the machine, without being able to see who performed them.
  • Active digital footprints can also be stored in many ways depending on the situation. In an online environment, a footprint can be stored by a user being logged into a site when making a post or change, with the registered name being connected to the edit. In an off line environment a footprint may be stored in files, when the owner of the computer uses a keylogger, so logs can show the actions performed on the machine, and who performed them. One of the features of keylogger is to monitor the clipboard for any changes. This may be problematic as the user may copy passwords or take screenshots of sensitive information which will then be logged.

Tony Fish expounded upon the possible dangers of digital footprints in a 2007 self-published book.[6] The closed loop takes data from the open loop and provides this as a new data input. This new data determines what the user has reacted to, or how they have been influenced. The feedback then builds a digital footprint based on social data, and the controller of the social digital footprint data can determine how and why people purchase and behave.

Katalin Fehér emphasised in her academic research paper about personal online strategies in 2017[7] that users leave digital footprints behind via online systems and new media. Human interactions and digitalized automatization imply decisions and dilemmas on account of online participation. The consequences are unpredictable: both former and updated records are available in an infinite digital present.

Web browser

On the World Wide Web, the internet footprint;[8] also known as cyber shadow, electronic footprint, or digital shadow, is the information left behind as a result of a user's web-browsing and stored as cookies. The term usually applies to an individual person, but can also refer to a business, organization and corporation.[9]

Information may be intentionally or unintentionally left behind by the user; with it being either passively or actively collected by other interested parties. Depending on the amount of information left behind, it may be simple for other parties to gather large amounts of information on that individual using simple search engines. Internet footprints are used by interested parties for several reasons; including cyber-vetting,[10] where interviewers could research applicants based on their online activities. Internet footprints are also used by law enforcement agencies, to provide information that would be unavailable otherwise due to a lack of probable cause. In addition your digital footprint is being used by marketers in order to find what products a user may be interested in, or to inspire ones' interest in a certain product based on similar interests.[11]

Social networking systems may record activities of individuals, with data becoming a life stream. Such usage of social media and roaming services allow digital tracing data to include individual interests, social groups, behaviours, and location. Such data can be gathered from sensors within devices, and collected and analyzed without user awareness. Facebook is one of many social media sites that does collect an extensive amount of information that can be used to piece together a user's personality. Things such as the number of friends a user has can predict whether or not the user has an introvert or extrovert personality.

Privacy issues

Digital footprints are not a digital identity or passport, but the content and meta data collected impacts upon internet privacy, trust, security, digital reputation, and recommendation. As the digital world expands and integrates with more aspects of life, ownership and rights of data becomes important. Digital footprints are controversial in that privacy and openness are in competition.[12] Scott McNealy, CEO of Sun Microsystems, said in 1999 Get Over It when referring to privacy on the Internet.[13] This later became a commonly used quote in relationship to private data and what companies do with it.

Having a digital footprint may be dangerous for students, as affiliations such as college admissions staff and potential employers may decide to research into prospective students and employee's online profiles, leading to a large impact on the students' futures.[14]

While digital footprint can be used to infer personal information, such as demographic traits, sexual orientation, race, religious and political views, personality, or intelligence[15] without individuals' knowledge, it also exposes individuals private psychological sphere into the social sphere.[16] Lifelogging is an example of indiscriminate collection of information concerning an individuals life and behaviour.[17] There are ways to make your digital footprint difficult to track.[18] Illustrating examples of the usage or interpretation of data trails can be found at the example of Facebook-influenced creditworthiness ratings,[19] the judicial investigations around German social scientist Andrej Holm,[20] advertisement-junk mails by the American company OfficeMax[21] or the border incident of Canadian citizen Ellen Richardson.[22]

See also

References

  1. "Dictionary.com: digital footprint". Retrieved 13 April 2017.
  2. "What is Digital Footprint? Webopedia Definition". www.webopedia.com. Retrieved 13 April 2017.
  3. "Digital Footprint Definition". techterms.com. Retrieved 13 April 2017.
  4. "What is digital footprint? - Definition from WhatIs.com". WhatIs.com. Retrieved 13 April 2017.
  5. "Digital Footprints".
  6. My Digital Footprint: A two-sided digital business model where your privacy will be someone else's business! [Kindle Edition]
  7. Katalin Fehér NetFrameWork and the digitalized-mediatized self, CJSSP
  8. Garfinkel, Simson; Cox, David. "Finding and Archiving the Internet Footprint" (PDF). Presented at the first Digital Lives Research Conference. London, England.
  9. COLLINS, KATIE. "Monitoring digital footprints to prevent reputation damage and cyber attacks". Archived from the original on 12 August 2013. Retrieved 8 August 2013.
  10. Dalgord, Chelsea. "Cybervetting: The Hiring Process in the Digital Age".
  11. Wyner, Gordon. "Digital Footprints Abound". ama.org. American Marketing Association. Retrieved 3 October 2016.
  12. Gardham, Duncan (26 January 2009). "Threat to privacy under data law, campaigners warn". Telegraph. London. Retrieved 22 March 2014.
  13. Sprenger, Polly (26 January 1999). "Sun on Privacy: 'Get Over It'". Wired. Retrieved 22 March 2014.
  14. "10 Things Your Students Should Know About Their Digital Footprints". Retrieved 2016-10-04.
  15. Kosinski, Michal; Stillwell, D.; Graepel, T. (2013). "Private traits and attributes are predictable from digital records of human behavior". PNAS USA. 110 (15): 5802–5805. doi:10.1073/pnas.1218772110. PMC 3625324. PMID 23479631.
  16. Latour, Bruno (15 January 2015). "Beware, your imagination leaves digital traces" (PDF). Column for Times Higher Education Supplement.
  17. O’Hara, Kieron; Tuffield, Mischa M.; Shadbolt, Nigel (2008). "Lifelogging: Privacy and empowerment with memories for life". Identity in the Information Society. 1 (1): 155–172. doi:10.1007/s12394-009-0008-4.
  18. Singer, Natasha (19 June 2013). "Ways to Make Your Online Tracks Harder to Follow". The New York Times Company. Retrieved June 19, 2013.
  19. Lobosco, Katie (26 August 2013). "Facebook friends could change your credit score". The Guardian. Retrieved December 19, 2013.
  20. "Guantánamo in Germany". The Guardian. Retrieved December 19, 2013.
  21. Bellware, Kim. "Mike Seay Gets OfficeMax Junk Mail Referencing Daughter Killed In Car Crash". HuffPost. Retrieved January 24, 2014.
  22. "Border refusal for depressed paraplegic shows Canada-U.S. security co-operation has gone too far". The Star. Toronto. 29 November 2013. Retrieved December 20, 2013.

Further reading

Kieron O’Hara- Lifelogging: Privacy and empowerment with memories for life (Tuffield, Mischa M. and Shadbolt, Nigel (2009))

This article is issued from Wikipedia. The text is licensed under Creative Commons - Attribution - Sharealike. Additional terms may apply for the media files.