StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Technologies Used to Make up a Digital Footprint - Research Paper Example

Summary
The paper "Technologies Used to Make up a 'Digital Footprint'" focuses on identifying and discussing the technologies used to collect and use data that make up a “digital footprint”. Digital footprint refers to the trail of information that remains behind after a person uses digital technology…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER92.1% of users find it useful

Extract of sample "Technologies Used to Make up a Digital Footprint"

Report Topic: Technologies used to collect and use data that make up a “digital footprint.” Name: Student ID: Technologies used to collect and use data that make up a “digital footprint.” Abstract Digital footprint refers to the trail of information that remains behind after a person uses digital technology. Many people are ‘digitally inexperienced’ and do not take time to think critically about the implications of their online behavior. This information may have effects on the present life and the future of an individual. Knowledge about digital footprints is very important. For instance, some college admission counselors claim to look at applicants social networking profiles, and most of them find something that portrays a negative image about an applicant. Taking control of online identity is a very important skill which needs consideration. Managing digital identities and digital footprints is a worldwide challenge for internet users and providers. This paper seeks to identify and discuss the Technologies used to collect and use data that make up a “digital footprint.” 1.0 Introduction Transmission of digital footprints occurs online through; emails, digital images, social media, digital videos, credit cards, GPS systems, and details about certain registrations. These technologies leave personal information about a person obtainable online. Digital footprints intend to distinguish about an individual’s data strategies online. Therefore, they reveal information about one’s self and the friends’ information. Digital footprint includes two types of classification; Passive and active. Passive digital footprint refers to the collection of data without any activation of client whereas active digital footprints results when individuals deliberately release personal information for the purpose of sharing information about them. 1.1 Passive Footprints Passive digital footprints get stored in many methods in respect to the situation. In an online situation, footprints are stored as hits in online databases. This footprint is used to track the IP address of the user, when it came to existence, and it’s location of creation; during analyzing of the footprint. In an offline situation, footprints pile up in files which are accessible by administrators to examine the kind of actions carried out on the machine, not necessarily seeing who performed it (Schuppli 2013). 1.2 Active Digital Footprints Active digital footprints are also storable in many forms depending on the environment. In an online situation, a footprint gets stored when a user logs in tea site to edit or make a post, with the edit connecting to the registered name. In an offline situation, a footprint is stored in files. When the computer owner makes use of a keylogger, logs shows all the actions performed on a machine and the person who performed them. 1.3 Pros and Cons of Digital Footprints It is simple to easy to look at the negative side of digital footprints, but there are some positive aspects associated with them. The lives of human are entangled with digital technology and it is important to remain educated. The pros that arise as a result of tracking down personal digital footprints by third parties include: it is easier to detect fraud and legal issues and adds value to the internet use through personalization akin to suggested products. Companies are able to offer motivations based on preferences and requirements which results to cost savings. However, the following cons are also involved: other people may use another person’s data to acquire revenue. It is distracting to constantly receive adverts and information. Digital footprints may portray a negative image about individuals and thereafter, used to tarnish their personality (Schuppli 2013). 2.0 Contextual Analysis The term ‘digital footprints’ usually applies to individual persons but my also refer to a business or an organization. Depending on the amount of information left behind, other parties may collect huge amounts of data about an individual. Internet footprints play a vital role in activities such as cyber-vetting, where interviewers evaluate applicants according to their online activities. Social schemes record activities of persons and the data becomes a life stream. Such data may be collected and examined without the knowledge of the user. Below, are the technologies used to collect and use data that make up a digital footprint. 2.1 Cookies and Web Storage Cookies refer to small bits of record keeping information used to identify a user’s computer by sites. Cookies are used for identification of user’s computer and to remember everything concerning the writers visit. Cookies may also be used to track people’s preferences, username and passwords. For this purpose, cookies’ information may be linked to user’s personal information. Cookies may be disabled or browser set to alert the user when cookies are sent to the computer. This may have effects on the user’s ability to access many other features of the service. 2.2 IP Addresses Internet protocols (IP) addresses refer to numbers used to identify every computer when logged in to the internet. IP addresses may be may be collected when there is need to protect to protect the service provided, customers, or websites. They are unique figures which identify computer on networks (Swanson 2013). 2.3 Log Files Other technology used to collect Digital Footprints is by use of log-files, which take record of the website activity, such as the number of hits a specific webpage gets (navigational data). These entries get generated anonymously, and it enables the gathering of information concerning the user’s browsing habit, asses the general activities of a certain website, and uphold its security. Log-file entries may also be used for internal marketing and for demographic study to improve the online services provided. Log-files are only used within an organization. They are usually used in conjunction with information collected from cookies to trace the behavioral patterns of registered users (Swanson 2013). 2.4 Malware Malware refers to computer software programs that download and install themselves on a computer without the owner’s approval. Most common malware keep record on the websites visited with the computer. Some malwares like Trojan are able to record keystrokes and steal passwords. Such malwares also send information other online services to enable them determine where to put their adverts and asses general online behavior. 3.0 Conclusion Technology is neither excellent nor awful. However, a new technology introduction to a particular use raises serious questions. Consequences resulting from introduction of a new the technology may involve ethical, moral concerns as well as legal issues. Therefore, it calls for serious attention by individuals who are aware of the potential impacts of introduction of new surveillance technologies. I believe that the technology discussed above has immense potential for both excellence and harm. Furthermore, investigations should be carried out to determine the potential impacts of this technology, so as to make sure human rights are not violated due to reasons such national security. ‘Digital footprints’ are not ‘digital identities’ but the information collected has extreme impacts upon recommendations, internet privacy, digital reputation, security and trust. Digital footprints become controversial due to the fact that privacy and openness are in competition. Digital footprints may be used to infer personal private information such as sexual orientation, political views, and intelligence without the person’s approval; hence, it leads to exposure of an individual’s privacy into the social sphere. Protection of digital footprints involves: deletion of all browsing records and tracking cookies regularly form the computer, constant reviewing of social networks security settings to be informed of new settings and features, and use of only the latest versions of browsers because they have extra security measures. Additional methods include: Regular change of passwords, use of unique passwords, and use of cash instead of credit cash. One may also opt out provision of personal details such as telephone number to protect the personal identity (Swanson 2013). Bibliography Schuppli, S 2013, ‘Dusting for fingerprints and tracking digital footprints’. Photographies, vol.6 no. 1, pp. 159-167. Swanson, K 2013, Professional learning in the digital age: the educator's guide to user-generated learning, Larchmont, NY, Eye of Education. Read More

CHECK THESE SAMPLES OF Technologies Used to Make up a Digital Footprint

Cinema: Digital Technologies

For example, using digital technologies, moviemakers have been able to make shots that are more impressive than those that could have been produced using pre-digital technologies.... In this paper, the term cinema is used to refer to the art of producing and presenting motion pictures.... From the paper "Cinema: digital Technologies" it is clear that generally speaking, though the traditional technologies and production techniques may persist in their presence, digital technology gives us a better chance to re-think and re-focus on cinema....
16 Pages (4000 words) Essay

Improvement of Computer Software

Modern thermography machines are used to detect heat changes in the body; they convert such pulses to thermograms fed into the computers, which are used to give images of the body parts that are unusually hot and cold.... The images are used to investigate such defects as arthritis, breast cancer.... Communication through cell phones, personal digital assistants (PDAs), Ipads, and smartphones form part of the digital footprints (Grayson, 2011)....
9 Pages (2250 words) Essay

Digital Media Content Development - Ted-Ed.com

DIGITAL MEDIA Reason for Choosing Digital Content There has been a move toward digital content mainly in the publishing and entertainment field because of the ease of distributing content in a digital shape.... For example, rather than carrying a load of reading material and other necessary documentation from place to place, all the data can be viewed in a digital space.... They can further include multimedia files in their lessons to make the learning experience more productive....
5 Pages (1250 words) Speech or Presentation

Greenhouse Business Challenge and Carbon Footprint

In the paper 'Greenhouse Business Challenge and Carbon footprint,' the author discusses short-term solutions to reduce companies' greenhouse gas emission.... Carbon footprint is nothing but the sum total of all the greenhouse gases.... Many non-government organizations have come up to conserve the environment and take actions to protect it....
12 Pages (3000 words) Assignment

Micro and Macro Carbon Audit

Burning of tropical forests to make room for industrial agriculture such as cattle ranching and palm oil plantations emit massive amounts of CO2 into the atmosphere.... The budget is made up of carbon units, where each carbon unit allows the emission of1 kg CO2.... A wide variety of technologies are available, with a wide range of efficiencies for converting energies into useful heat....
14 Pages (3500 words) Research Paper

The Effects of Digital Technologies on Cinema

The paper "The Effects of digital Technologies on Cinema" highlights that digital cameras utilize lossless and lossy compression systems.... The use of special effects in digital movies in order to achieve attraction at times tends to dominate over the narrative perspective of the cinema.... igital cinema is defined as the use of digital technology to project and distribute motion pictures.... The process of doing this is called digital cinematography....
17 Pages (4250 words) Assignment

Contexts of Media Technologies Usage

We will also see the role of convergence in the digital and electronic media, used in incorporating diverse modes to serve large audiences through different platforms.... he discussion will look at the past and more recent categories that are widely used as necessary devices to disseminate information and programs.... Looking at some specific media technologies, it is possible to discuss the contexts in which they are used.... The writer of the paper 'Contexts of Media technologies Usage' states that convergence and remediation have retained and at the same time, improved the past experiences of media technologies....
10 Pages (2500 words) Coursework

Importance of Green IT and Sustainability

Concerns have, however, remained with regard to the burning of digital music on CDs and DVDs, and the printing of books and other digital articles, which have been liked to increase in new material and energy impacts around the world.... At the same time, sustainability efforts continue to advocate for the development of technologies that are friendly to the environment.... The growing concerns, however, have closely liked green IT consideration and organizational sustainability through the development of savvy technologies....
9 Pages (2250 words) Term Paper
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us