Question 1: We have shared a few examples of how information can be extracted from data (such as in your images). What are other ways humans can leave traces of information with the use of technologies?
Answer: The other ways humans can leave traces of information with the use of technology:
Nowadays, various online tools are available to explore EXIF data or metadata such as the exact day, time and location as well as the file type and size from our images captured or even our images can be used to make deepfake videos shared virally.
Besides this, we can check for changes to the structure of the data. Changed data structures have to be dealt with pro-grammatically. Retrieve the target tables and fields from the records specified by the integration’s replication scheme.
Moreover, we can also be tracked by others whenever we use search engines such as Google, use apps, indulge in social media such as Facebook, Instagram and Twitter, engage in communication on the internet, take part in playing games online, or shopping online. Our metadata may be collected and used for malicious purposes such as to target advertisements, personalise online experiences on sites or practise fraudulent activity through search history, wed and app activity, location history or Youtube history. Especially, the data of gamers – young people or students is not only a target for cyber criminals, but there are also attempts to cause havoc via in-game ransom attempts involving game assets and virtual currencies.
Therefore, we should raise our students’ awareness of many of the issues with data and use of apps through the activity of the ‘Data Detox Kit’ from Tactical Tech, a resource which steps through practical suggestions for making changes to online habits. From re-naming their phone, considering the apps they have installed and removing location traces to strengthening privacy, security and well-being practices.
You must log in to post a comment.