Unit 3


Concept 1: We have shared a few examples of how information can be extracted from data (such as in your images). What are other ways humans can leave traces of information with the use of technologies? Share an example or examples with the community.

Every day, the modern day technology user is adding to an ever-growing online footprint. This digital footprint acts as a portrait of who we are online, containing several intentional and unintentional technological traces. Unfortunately, this digital portrait is often more public than we would assume.

Tasks such as sending a message via Facebook, text message or email, or posting on social media are intentional and visible digital traces. However,  unintentional or invisible traces include online shopping, website history, phone call logs and mapping location services.

These can be dangerous, by allowing strangers and companies in depth knowledge and data collections about your digital footprints. It is important that people are made aware of the concerns about digital tracing. This YouTube video may be a helpful resource: https://www.internetsociety.org/tutorials/your-digital-footprint-matters/ 

Within this comes the importance of educating people about their digital footprints and how to be safe and protected online. Examples for safe use may include; disallowing cookies on your system, ensuring privacy on social media accounts, non-incognito internet usage and disallowing location services.

+ There are no comments

Add yours