Unit 3_Task 1

  1. We have shared a few examples of how information can be extracted from data (such as in your images). What are other ways humans can leave traces of information with the use of technologies?

Nowadays is in the era of technology affecting any aspects of our life both in a positive and negative ways. We cannot deny how fascinating technology facilitates life with up-to-date inventions and how concerned we are to keep our private data as well. In this paragraph, we will raise a few examples of how information can be extracted from data. First, using a frequently required updated cyber software such as one to organize and analyze data is a potential risk because users’ information when signing up as a member can be exposure to people across a network. Second, when we download to use an app, each interaction with the app produces data like locations, personal information of users for app developers to use for functionality and marketing. Third, social media especially websites such most favorite ones as Facebook, YouTube, Instagram just to name a few is one of the popular computer-based technologies that facilitates communication between people and sharing information whenever users visit those website then they leave big amount information, for example what users browse, interact online. Last but not least, with the growing popularity of online gaming, gamers and game platforms are targets for cyber criminals and hackers. Also users can leak big data when swiping a credit card or using a shopping member card. In short, anytime and anywhere we post things to social media, buy something with a credit card, even take a state standardized test, sign up an online course, fill out an online poll or exploit whatever means of approaching technology requiring users’ entering personal information, cyber users need to, in all circumstances, carefully consider to what extent they should share their own data.


+ There are no comments

Add yours