UNIT 3- QUESTION 1
QUESTION 1: We have shared a few examples of how information can be extracted from data (such as in your images). What are other ways humans can leave traces of information with the use of technologies?
Nowadays, various online tools are available to explore EXIF data or metadata such as the exact day, time and location as well as the file type and size from our images captured or even our images can be used to make deepfake videos shared virally.
Besides this, we can also be tracked by others whenever we use search engines such as Google, use apps, indulge in social media such as Facebook, Instagram and Twitter, engage in communication on the internet, take part in playing games online, or shopping online. Our metadata may be collected and used for malicious purposes such as to target advertisements, personalise online experiences on sites or practise fraudulent activity through search history, wed and app activity, location history or Youtube history. Especially, the data of gamers – young people or students is not only a target for cyber criminals, but there are also attempts to cause havoc via in-game ransom attempts involving game assets and virtual currencies.
Therefore, we teachers need to raise our students’ awareness of many of the issues with data and use of apps through the activity of the ‘Data Detox Kit’ from Tactical Tech, a resource which steps through practical suggestions for making changes to online habits. From re-naming their phone, considering the apps they have installed and removing location traces to strengthening privacy, security and well-being practices.
You must log in to post a comment.