Unit 3 – Question 1

Unit 3 shared a few examples of how information can be extracted from data such as using an application that generates the data (GPS, google map, digital photos); social media services (eSafety, YouTube, Facebook, Instagram…); game online. You can be tracked, detected location when using a smartphone.

It is clear that people can leave information traces when using technology in many different ways. In addition to the above methods, personal information can be exposed due to circumstances such as forgetting identity card, security checks at airports, confiscation by police courts or threats of attack by hackers. Or the common case, you use service and create customer cards. Bad guys will sell your information to others.

Losing personal information exposes users to unexpected risks. I would like to share a few common cases. I often buy clothes from brand A and apply for a loyalty card, but then I get text messages promoting products from other brands that I have never used. This makes me uncomfortable. My friends often find themselves in the same situation. Another case, my personal information (phone number, work address) has to be published on the agency’s website. I was called by someone. He introduced himself as a court investigator. He informed me that I was being sued for having a bank loan due for nonpayment.

In modern life, we inevitably lose personal information. But we need to be aware of all these risks in order to have self-protective solutions.

+ There are no comments

Add yours