1.EXIF data(Exchangeable Image File) :Other than the face in the image, the photograph does not have any identifying data on the surface. However, the meta data or Exchangeable Image File (EXIF) embedded into the file at the time the image was captured holds specific identifying and technical data.
2.Social media : Social media is one of the popular computer-based technologies that facilitates communication between people and sharing information. According to statistics from eSafety commissioner, YouTube, Facebook and Instagram are the most popular social media services among Australian teens aged 13 to 17 years. Understanding the information we share, intentionally and inadvertently, and protecting the data is of critical importance. Users need to develop skills necessary to analyse the impact of their data traces.
- Filter Bubble:In todays’ society it’s common knowledge that data is used to target advertisements and personalise online experiences on sites such as Netflix and Youtube.
4.Deep fake:As technology advances it’s becoming increasingly problematic to implicitly trust online content on face value alone. Deep fake materials, also referred to as Synthetic Media, are the result of machine learning and artificial intelligence harnessing the availability of images and video to create manipulated, realistic but fake digital content.
5.Online gaming and data: With the growing popularity of online gaming, gamers and game platforms are targets for cyber criminals. As with social media and apps, accessing data for malicious purposes remains the focus of hackers. Not only is user data a target, but within the gaming world, there are also attempts to cause havoc via in-game ransom attempts involving game assets and virtual currencies.
You must log in to post a comment.