Unit 3 – Task – Question 1


  1. We have shared a few examples of how information can be extracted from data (such as in your images). What are other ways humans can leave traces of information with the use of technologies?

Whenever we navigate through websites, we might be leaving traces on the internet, which is also called a ‘digital footprint’. Some of the traces can be tracked down easily in a database and some can potentially be seen by other people. Therefore, we should be aware of the traces that we are leaving behind and what will the possible effects be if the data is shared.

 When we browse through websites, retailers and product review sites often track our movement from site to site by leaving cookies. By accepting the cookies, allows targeted advertisements to show you the products that you have been reading about or looking at online recently. Such cookies can be a vulnerability to our privacy especially when criminals have access to our private info. Hence, we should educate young children to have a sense of awareness before allowing cookies to track their browsing histories.
With new technologies propelling, more features on social media platforms are added that require us to expand our understandings of privacy. Another example of us leaving a digital footprint is through Facebook and The Live Location. Our social media posts can also pose a security risk. Our social media posts can also pose a security risk. Other people combine all of our information posted on Facebook, they will have a comprehensive view of each person’s life. This can lead to theft, fraud, and even identity theft. Moreover, you may be scammed or lose your account, lose your identity or leave a bad image with the employer. The Live Location feature allows users to share their real-time location on the map with friends. Strangers could abuse this feature to pose as a friend and stalk teenagers online and in the worst case, carry out illegal acts to harm teens. Hereby, adults must acknowledge the danger of leaving traces of information online and spread this awareness to young people to ensure that they limit location sharing on social media sites.
Below, we have some resources for students.
  1. https://www.esafety.gov.au/young-people/keeping-your-online-accounts-secure
  2. https://www.dwrl.utexas.edu/2018/01/02/lesson-plan-filter-bubbles/
Categories
Tags

+ There are no comments

Add yours