Digital footprint

Last updated
A digital footprint symbol Footprints.png
A digital footprint symbol

Digital footprint or digital shadow refers to one's unique set of traceable digital activities, actions, contributions, and communications manifested on the Internet or digital devices. [1] [2] [3] [4] Digital footprints can be classified as either passive or active. The former is composed of a user's web-browsing activity and information stored as cookies. The latter is often released deliberately by a user to share information on websites or social media. [5] While the term usually applies to a person, a digital footprint can also refer to a business, organization or corporation. [6]

Contents

The use of a digital footprint has both positive and negative consequences. On one side, it is the subject of many privacy issues. [7] For example, without an individual's authorization, strangers can piece together information about that individual by only using search engines. Corporations are also able to produce customized ads based on browsing history. On the other hand, others can reap the benefits by profiting off their digital footprint as social media influencers. Furthermore, employers use a candidate's digital footprint for online vetting and assessing fit due to its reduced cost and accessibility.[ citation needed ] Between two equal candidates, a candidate with a positive digital footprint may have an advantage. As technology usage becomes more widespread, even children generate larger digital footprints with potential positive and negative consequences such as college admissions. Since it is hard not to have a digital footprint, it is in one's best interest to create a positive one.

Types of digital footprints

Passive digital footprints are a data trail that an individual involuntarily leaves online. They can be stored in various ways depending on the situation. A footprint may be stored in an online database as a "hit" in an online environment. The footprint may track the user's IP address, when it was created, where it came from, and the footprint later being analyzed. In an offline environment, administrators can access and view the machine's actions without seeing who performed them. Examples of passive digital footprints are apps that use geolocations, websites that download cookies onto your appliance, or browser history. Although passive digital footprints are inevitable, they can be lessened by deleting old accounts, using privacy settings (public or private accounts), and occasionally online searching yourself to see the information left behind. [8]

Active digital footprints are deliberate, as they are posted or shared information willingly. They can also be stored in a variety of ways depending on the situation. A digital footprint can be stored when a user logs into a site and makes a post or change; the registered name is connected to the edit in an online environment. Examples of active digital footprints include social media posts, video or image uploads, or changes to various websites.[ citation needed ]

Privacy issues

Digital footprints are not a digital identity or passport, but the content and metadata collected impacts internet privacy, trust, security, digital reputation, and recommendation. As the digital world expands and integrates with more aspects of life, ownership and rights concerning data become increasingly important. Digital footprints are controversial in that privacy and openness compete. [9] Scott McNealy, CEO of Sun Microsystems, said in 1999 Get Over It when referring to privacy on the Internet. [10] The quote later became a commonly used phrase in discussing private data and what companies do with it. [11] Digital footprints are a privacy concern because they are a set of traceable actions, contributions, and ideas shared by users. It can be tracked and can allow internet users to learn about human actions. [12]

Interested parties use Internet footprints for several reasons; including cyber-vetting, [13] where interviewers could research applicants based on their online activities. Internet footprints are also used by law enforcement agencies to provide information unavailable otherwise due to a lack of probable cause. [14] Also, digital footprints are used by marketers to find what products a user is interested in or to inspire ones' interest in a particular product based on similar interests. [15]

Social networking systems may record the activities of individuals, with data becoming a life stream . Such social media usage and roaming services allow digital tracing data to include individual interests, social groups, behaviors, and location. Such data is gathered from sensors within devices and collected and analyzed without user awareness. [16] When many users choose to share personal information about themselves through social media platforms, including places they visited, timelines and their connections, they are unaware of the privacy setting choices and the security consequences associated with them. [17] Many social media sites, like Facebook, collect an extensive amount of information that can be used to piece together a user's personality. Information gathered from social media, such as the number of friends a user has, can predict whether or not the user has an introvert or extrovert personality. Moreover, a survey of SNS users revealed that 87% identified their work or education level, 84% identified their full date of birth, 78% identified their location, and 23% listed their phone numbers. [17]

While one's digital footprint may infer personal information, such as demographic traits, sexual orientation, race, religious and political views, personality, or intelligence [18] without individuals' knowledge, it also exposes individuals' private psychological spheres into the social sphere. [19] Lifelogging is an example of an indiscriminate collection of information concerning an individual's life and behavior. [20] There are actions to take to make a digital footprint challenging to track. [21] An example of the usage or interpretation of data trails is through Facebook-influenced creditworthiness ratings, [22] the judicial investigations around German social scientist Andrej Holm, [23] advertisement-junk mails by the American company OfficeMax [24] or the border incident of Canadian citizen Ellen Richardson. [25]

Impacts

Workforce

An increasing number of employers are evaluating applicants by their digital footprint through their interaction on social media due to its reduced cost and easy accessibility [26] during the hiring process. By using such resources, employers can gain more insight on candidates beyond their well-scripted interview responses and perfected resumes. [27] Candidates who display poor communication skills, use inappropriate language, or use drugs or alcohol are rated lower. [28] Conversely, a candidate with a professional or family-oriented social media presence receives higher ratings. [29] Employers also assess a candidate through their digital footprint to determine if a candidate is a good cultural fit [30] for their organization. [31] Suppose a candidate upholds an organization's values or shows existing passion for its mission. In that case, the candidate is more likely to integrate within the organization and could accomplish more than the average person. Although these assessments are known not to be accurate predictors of performance or turnover rates, [32] employers still use digital footprints to evaluate their applicants. Thus, job seekers prefer to create a social media presence that would be viewed positively from a professional point of view.

In some professions, maintaining a digital footprint is essential. People will search the internet for specific doctors and their reviews. Half of the search results for a particular physician link to third-party rating websites. [33] For this reason, prospective patients may unknowingly choose their physicians based on their digital footprint in addition to online reviews. Furthermore, a generation relies on social media for livelihood as influencers by using their digital footprint. These influencers have dedicated fan bases that may be eager to follow recommendations. As a result, marketers pay influencers to promote their products among their followers, since this medium may yield better returns than traditional advertising. [34] [35] Consequently, one's career may be reliant on their digital footprint.

Children

Children's digital footprint may traverse the internet beyond the intended audiences Automotive Social Media Marketing.jpg
Children's digital footprint may traverse the internet beyond the intended audiences

Generation Alpha will not be the first generation born into the internet world. As such, a children's digital footprint is becoming more significant than ever before and their consequences may be unclear. Due to parenting enthusiasm, an increasing amount of parents will create social media accounts for their children at a young age, sometimes even before they are born. [36] Parents may post up to 13,000 photos of a child on social media in their celebratory state before their teen years of everyday life or birthday celebrations. [37] Furthermore, these children are predicted to post 70,000 times online on their own by 18. [37] The advent of posting on social media creates many opportunities to gather data from minors. Since an identity's basic components contain a name, birth date, and address, these children are susceptible to identity theft. [38] While parents may assume that privacy settings may prevent children's photos and data from being exposed, they also have to trust that their followers will not be compromised. Outsiders may take the images to pose as these children's parents or post the content publicly. [39] For example, during the Facebook-Cambridge Analytica data scandal, friends of friends leaked data to data miners. Due presence of children on social media, their privacy may be at risk.

Teenagers

Some professionals argue that young people entering the workforce should consider the effect of their digital footprint on their marketability and professionalism. [40] Having a digital footprint may be very good for students, as college admissions staff and potential employers may decide to research into prospective student's and employee's online profiles, leading to an enormous impact on the students' futures. [40] Teens will be set up for more success if they consider the kind of impact they are making and how it can affect their future. Instead, someone who acts apathetic towards the impression they are making online will struggle if they one day choose to attend college or enter into the workforce. [41] Teens who plan to receive a higher education will have their digital footprint reviewed and assessed as a part of the application process. [42] Besides, if the teens that have the intention of receiving a higher education are planning to do so with financial help and scholarships, then they need to consider that their digital footprint will be evaluated in the application process to get scholarships. [43]

See also

Related Research Articles

<span class="mw-page-title-main">Privacy</span> Seclusion from unwanted attention

Privacy is the ability of an individual or group to seclude themselves or information about themselves, and thereby express themselves selectively.

An online community, also called an internet community or web community, is a community whose members interact with each other primarily via the Internet. Members of the community usually share common interests. For many, online communities may feel like home, consisting of a "family of invisible friends". Additionally, these "friends" can be connected through gaming communities and gaming companies. Those who wish to be a part of an online community usually have to become a member via a specific site and thereby gain access to specific content or links.

Internet privacy involves the right or mandate of personal privacy concerning the storage, re-purposing, provision to third parties, and display of information pertaining to oneself via the Internet. Internet privacy is a subset of data privacy. Privacy concerns have been articulated from the beginnings of large-scale computer sharing and especially relate to mass surveillance.

Digital identity is the phrase referring to the data that computer systems use to represent external agents, which can be individuals, organizations, applications, or devices. For individuals, it involves an aggregation of personal data that is essential for facilitating automated access to digital services, confirming one's identity on the internet, and allowing digital systems to manage interactions between different parties. It is a component of a person's social identity in the digital realm, often referred to as their online identity.

Internet identity (IID), also online identity, online personality, online persona or internet persona, is a social identity that an Internet user establishes in online communities and websites. It may also be an actively constructed presentation of oneself. Although some people choose to use their real names online, some Internet users prefer to be anonymous, identifying themselves by means of pseudonyms, which reveal varying amounts of personally identifiable information. An online identity may even be determined by a user's relationship to a certain social group they are a part of online. Some can be deceptive about their identity.

<span class="mw-page-title-main">Social networking service</span> Online platform that facilitates the building of relations

A social networking service or SNS is a type of online social media platform which people use to build social networks or social relationships with other people who share similar personal or career content, interests, activities, backgrounds or real-life connections.

<span class="mw-page-title-main">Social media</span> Virtual online communities

Social media are interactive technologies that facilitate the creation, sharing and aggregation of content, ideas, interests, and other forms of expression through virtual communities and networks. Social media refers to new forms of media that involve interactive participation. While challenges to the definition of social media arise due to the variety of stand-alone and built-in social media services currently available, there are some common features:

  1. Social media are interactive Web 2.0 Internet-based applications.
  2. User-generated content—such as text posts or comments, digital photos or videos, and data generated through all online interactions—is the lifeblood of social media.
  3. Users create service-specific profiles for the website or app that are designed and maintained by the social media organization.
  4. Social media helps the development of online social networks by connecting a user's profile with those of other individuals or groups.

Online identity management (OIM), also known as online image management, online personal branding, or personal reputation management (PRM), is a set of methods for generating a distinguished web presence of a person on the Internet. Online identity management also refers to identity exposure and identity disclosure, and has particularly developed in the management on online identity in social network services or online dating services.

<span class="mw-page-title-main">Digital citizen</span> Person using IT to engage in society, politics, and government

The term digital citizen is used with different meanings. According to the definition provided by Karen Mossberger, one of the authors of Digital Citizenship: The Internet, Society, and Participation, digital citizens are "those who use the internet regularly and effectively." In this sense, a digital citizen is a person using information technology (IT) in order to engage in society, politics, and government.

Online vetting, also known as cyber-vetting is used by potential employers and other acquaintances to vet people's online presence or "internet reputation" ("netrep") on search engines such as Google and Yahoo, and social networking services such as Facebook, Twitter, Instagram and LinkedIn. Employers may check profiles, posts, and photographs for indications that the candidate is unsuitable for a certain job or position.

The social data revolution is the shift in human communication patterns towards increased personal information sharing and its related implications, made possible by the rise of social networks in the early 2000s. This phenomenon has resulted in the accumulation of unprecedented amounts of public data.

<span class="mw-page-title-main">Digital privacy</span>

Digital privacy is often used in contexts that promote advocacy on behalf of individual and consumer privacy rights in e-services and is typically used in opposition to the business practices of many e-marketers, businesses, and companies to collect and use such information and data. Digital privacy can be defined under three sub-related categories: information privacy, communication privacy, and individual privacy.

Since the arrival of early social networking sites in the early 2000s, online social networking platforms have expanded exponentially, with the biggest names in social media in the mid-2010s being Facebook, Instagram, Twitter and Snapchat. The massive influx of personal information that has become available online and stored in the cloud has put user privacy at the forefront of discussion regarding the database's ability to safely store such personal information. The extent to which users and social media platform administrators can access user profiles has become a new topic of ethical consideration, and the legality, awareness, and boundaries of subsequent privacy violations are critical concerns in advance of the technological age.

<span class="mw-page-title-main">User profile</span> Data about an individual user

A user profile is a collection of settings and information associated with a user. It contains critical information that is used to identify an individual, such as their name, age, portrait photograph and individual characteristics such as knowledge or expertise. User profiles are most commonly present on social media websites such as Facebook, Instagram, and LinkedIn; and serve as voluntary digital identity of an individual, highlighting their key features and traits. In personal computing and operating systems, user profiles serve to categorise files, settings, and documents by individual user environments, known as ‘accounts’, allowing the operating system to be more friendly and catered to the user. Physical user profiles serve as identity documents such as passports, driving licenses and legal documents that are used to identify an individual under the legal system.

Sharenting is a portmanteau of "sharing" and "parenting" describing the practice of parents publicizing a large amount of potentially sensitive content about their children on internet platforms. While the term was coined as recently as 2010, sharenting has become an international phenomenon with widespread presence in the United States, Spain, France, and the United Kingdom. As such, sharenting has also ignited disagreement as a controversial application of social media. Detractors find that it violates child privacy and hurts a parent-child relationship. Proponents frame the practice as a natural expression of parental pride in their children and argue that critics take sharenting-related posts out of context.

<span class="mw-page-title-main">Dataveillance</span> Monitoring and collecting online data and metadata

Dataveillance is the practice of monitoring and collecting online data as well as metadata. The word is a portmanteau of data and surveillance. Dataveillance is concerned with the continuous monitoring of users' communications and actions across various platforms. For instance, dataveillance refers to the monitoring of data resulting from credit card transactions, GPS coordinates, emails, social networks, etc. Using digital media often leaves traces of data and creates a digital footprint of our activity. Unlike sousveillance, this type of surveillance is not often known and happens discreetly. Dataveillance may involve the surveillance of groups of individuals. There exist three types of dataveillance: personal dataveillance, mass dataveillance, and facilitative mechanisms.

Social profiling is the process of constructing a social media user's profile using his or her social data. In general, profiling refers to the data science process of generating a person's profile with computerized algorithms and technology. There are various platforms for sharing this information with the proliferation of growing popular social networks, including but not limited to LinkedIn, Google+, Facebook and Twitter.

Data shadows refer to the information that a person leaves behind unintentionally while taking part in daily activities such as checking their e-mails, scrolling through social media or even by using their debit or credit card.

Privacy settings are "the part of a social networking website, internet browser, piece of software, etc. that allows you to control who sees information about you". With the growing prevalence of social networking services, opportunities for privacy exposures also grow. Privacy settings allow a person to control what information is shared on these platforms.

The advent of social networking services has led to many issues spanning from misinformation and disinformation to privacy concerns related to public and private personal data.

References

  1. "Dictionary.com: digital footprint" . Retrieved 13 April 2017.
  2. "What is Digital Footprint? Webopedia. Definition". www.webopedia.com. 29 April 2008. Retrieved 13 April 2017.
  3. "Digital Footprint Definition". techterms.com. Retrieved 13 April 2017.
  4. "What is digital footprint? - Definition from WhatIs.com". WhatIs.com. Retrieved 13 April 2017.
  5. Madden, Fox, Smith & Vitak, Mary, Susannah, Aaron, Jessica (2007). "Digital Footprints". Pew Research Center.{{cite web}}: CS1 maint: multiple names: authors list (link)
  6. COLLINS, KATIE. "Monitoring digital footprints to prevent reputation damage and cyber attacks". Archived from the original on 12 August 2013. Retrieved 8 August 2013.
  7. "Owning Your Privacy by Managing Your Digital Footprint". Stay Safe Online. Retrieved 2020-11-08.
  8. Rossi, Julien; Bigot, Jean-Édouard (2019-01-03). "Traces numériques et recherche scientifique au prisme du droit des données personnelles". Les Enjeux de l'Information et de la Communication. N° 19/2 (2): 161–177. doi: 10.3917/enic.025.0161 . ISSN   1778-4239.
  9. Gardham, Duncan (26 January 2009). "Threat to privacy under data law, campaigners warn". Telegraph. London. Archived from the original on 4 February 2009. Retrieved 22 March 2014.
  10. Sprenger, Polly (26 January 1999). "Sun on Privacy: 'Get Over It'". Wired. Retrieved 22 March 2014.
  11. "Digital Footprint: Part 2 | Hueya: Securing Your Digital World". Hueya - Online Privacy Software. 2016-01-10. Archived from the original on 2020-10-10. Retrieved 2020-10-10.
  12. 2015nets_adminusr (2019-07-22). "What is a digital footprint?". Netsafe – Providing free online safety advice in New Zealand. Retrieved 2020-10-10.{{cite web}}: CS1 maint: numeric names: authors list (link)
  13. Dalgord, Chelsea (2012-12-07). "Cybervetting: The Hiring Process in the Digital Age". Archived from the original on 2013-12-02. Retrieved 2013-08-23.
  14. Diab, Robert (1 March 2018). "Protecting the Right to Privacy in Digital Devices: Reasonable Search on Arrest and at the Border". University of New Brunswick Law Journal. 69: 96–125. SSRN   3393119.
  15. Wyner, Gordon. "Digital Footprints Abound". American Marketing Association. Archived from the original on 5 October 2016. Retrieved 3 October 2016.
  16. "What a digital footprint? - Knowledgebase - ICTEA". www.ictea.com. Retrieved 2020-10-10.
  17. 1 2 Ball, Albert; Ranim, Michelle; Levy, Yair (January 1, 2015). Examining users’ personal information sharing awareness, habits, and practices in social networking sites and e-learning systems. Online Journal of Applied Knowledge Management. pp185
  18. Kosinski, M.; Stillwell, D.; Graepel, T. (11 March 2013). "Private traits and attributes are predictable from digital records of human behavior". Proceedings of the National Academy of Sciences. 110 (15): 5802–5805. Bibcode:2013PNAS..110.5802K. doi: 10.1073/pnas.1218772110 . PMC   3625324 . PMID   23479631.
  19. Latour, Bruno (2007). "Beware, your imagination leaves digital traces" (PDF). Column for Times Higher Education Supplement. 6 (4): 129–131.
  20. O’Hara, Kieron; Tuffield, Mischa M.; Shadbolt, Nigel (20 February 2009). "Lifelogging: Privacy and empowerment with memories for life". Identity in the Information Society. 1 (1): 155–172. doi: 10.1007/s12394-009-0008-4 .
  21. Singer, Natasha (19 June 2013). "Ways to Make Your Online Tracks Harder to Follow". Bits Blog.
  22. Lobosco, Katie (26 August 2013). "Facebook friends could change your credit score". CNNMoney.
  23. Sennett, Richard; Sassen, Saskia (21 August 2007). "Richard Sennett and Saskia Sassen: Guantanamo in Germany". The Guardian.
  24. "OfficeMax Apologizes After Sending Grieving Father Terrible Letter". HuffPost. 20 January 2014.
  25. "Border refusal for depressed paraplegic shows Canada-U.S. security co-operation has gone too far". The Star. Toronto. 29 November 2013. Retrieved December 20, 2013.
  26. Broughton, A., Foley, B., Ledermaier, S., & Cox, A. (2013). The use of social media in the recruitment process. Institute for Employment Studies, Brighton.
  27. Berkelaar, Brenda L. (2014-07-18). "Cybervetting, Online Information, and Personnel Selection: New Transparency Expectations and the Emergence of a Digital Social Contract". Management Communication Quarterly. 28 (4): 479–506. doi:10.1177/0893318914541966. ISSN   0893-3189. S2CID   146264434.
  28. Van Iddekinge, Chad H.; Lanivich, Stephen E.; Roth, Philip L.; Junco, Elliott (2016-12-16). "Social Media for Selection? Validity and Adverse Impact Potential of a Facebook-Based Assessment". Journal of Management. 42 (7): 1811–1835. doi:10.1177/0149206313515524. ISSN   0149-2063. S2CID   143067929.
  29. Bohnert, Daniel; Ross, William H. (2010-06-17). "The Influence of Social Networking Web Sites on the Evaluation of Job Candidates". Cyberpsychology, Behavior, and Social Networking. 13 (3): 341–347. doi:10.1089/cyber.2009.0193. ISSN   2152-2715. PMID   20557256.
  30. Lambiotte, Renaud; Kosinski, Michal (December 2014). "Tracking the Digital Footprints of Personality". Proceedings of the IEEE. 102 (12): 1934–1939. doi:10.1109/JPROC.2014.2359054. ISSN   0018-9219. S2CID   11085292.
  31. "SHRM Survey Findings: Using Social Media for Talent Acquisition - Recruitment and Screening" (PDF). Society for Human Resource Management. 2016-01-07.
  32. Van Iddekinge, Chad H.; Lanivich, Stephen E.; Roth, Philip L.; Junco, Elliott (2016-11-16). "Social Media for Selection? Validity and Adverse Impact Potential of a Facebook-Based Assessment". Journal of Management. 42 (7): 1811–1835. doi:10.1177/0149206313515524. ISSN   0149-2063. S2CID   143067929.
  33. Kim, Christopher; Gupta, Raghav; Shah, Aakash; Madill, Evan; Prabhu, Arpan V.; Agarwal, Nitin (May 2018). "Digital Footprint of Neurological Surgeons". World Neurosurgery. 113: e172–e178. doi:10.1016/j.wneu.2018.01.210. PMID   29427816.
  34. Gretzel, Ulrike (2017-07-20), "Influencer marketing in travel and tourism", Advances in Social Media for Travel, Tourism and Hospitality, Routledge, pp. 147–156, doi:10.4324/9781315565736-13, ISBN   978-1-315-56573-6 , retrieved 2020-11-03
  35. Twenge, Jean M.; Martin, Gabrielle N.; Spitzberg, Brian H. (2019-10-01). "Trends in U.S. Adolescents' media use, 1976–2016: The rise of digital media, the decline of TV, and the (near) demise of print". Psychology of Popular Media Culture. 8 (4): 329–345. doi:10.1037/ppm0000203. ISSN   2160-4142. S2CID   158283705.
  36. "Digital Birth: Welcome to the Online World". www.businesswire.com. 2010-10-06. Retrieved 2020-11-03.
  37. 1 2 "Children's Commissioner's report calls on internet giants and toy manufacturers to be transparent about collection of children's data". Children's Commissioner for England. 2018-11-08. Retrieved 2020-11-03.
  38. "Internet safety for children | Keeping kids safe online | Barclays". www.barclays.co.uk. Retrieved 2020-11-03.
  39. Steinberg, S. B. (2016). Sharenting: Children's privacy in the age of social media. Emory LJ, 66, 839.
  40. 1 2 "10 Things Your Students Should Know About Their Digital Footprints". TeachHUB. Archived from the original on 2020-01-28. Retrieved 2016-10-04.
  41. Bates, Cathy (October 29, 2018). "Take Charge of Your Online Reputation". Educause .
  42. Van Ouytsel, Joris; Walrave, Michel; Ponnet, Koen (5 June 2014). "How Schools Can Help Their Students to Strengthen Their Online Reputations". The Clearing House: A Journal of Educational Strategies, Issues and Ideas. 87 (4): 180–185. doi:10.1080/00098655.2014.909380. S2CID   143484401.
  43. "Harmful Digital Footprint Impacts That Parents Should Know About". www.fosi.org. Retrieved 2019-04-04.

Further reading