SlideShare a Scribd company logo
Digital Identity
What is it?
Thouraya.daouas@ihec.rnu.tn
Dr. Thouraya Daouas
Digital identity
• The set of activities you do on Internet contributes in
defining your digital identity.
• It’s constructed by many elements:
– Personal data associated with your profile.
– Information you publish on Internet.
– Information about you that others publish.
– Tracks you leave consciously or not.
• User can have three types of identifier:
– Professional or institutional related to a professional activity.
– Private identifiers for personal use (social network, online selling,
mail, online banking, etc.)
Dr. Thouraya Daouas 2Digital Identity
Digital identity
• How to master it?
– User should choose sensibly its identifier to be used
according to his activity;
– User limits the access to the information which he
publishes;
– User checks regularly his image on Web or e-
reputation.
Dr. Thouraya Daouas 3Digital Identity
Authentification
• Procedure which checks that the information
about connection supplied is correct (identifier
and password, fingerprints, etc.).
• Some rules are important to respect:
– Keep secret the password.
– Choose a complex password (Combining necessarily
small letters, capital letters, numbers and symbols).
Should not have evident meaning.
– Should not usurp an identity.
Dr. Thouraya Daouas 4Digital Identity
Configuration of profile
• Connection identifier can be associated to a profile
containing photos, personal information and
preferences.
• It is possible to configure information access:
– Public: accessible for everyone and referenced in search
engines.
– Restricted: accessible for authorized community and not
referenced.
• In case of emails, a signature could be put at the end of the
email body or a visit card could be joint to the email.
Dr. Thouraya Daouas 5Digital Identity
Digital tracks
• What could we find in the file properties?
– Date, Time, Author name, Revision number, Camera model, etc.
• What can we know about the user identity?
– Each connected computer has an IP address given to user by the
Internet service provider which has to keep during one year the list of
connections and the information allowing to identify the Internet
user.
– When we consult a web page, the browser sends a request to the
server to get back the data (texts, images, etc.) to download. Server
can keep track and follow so the browsing on the site.
– In email header are stored a series of IP addresses describing servers
which can supply indications on sender geographical localization.
Dr. Thouraya Daouas 6Digital Identity
e-Reputation
• e-Reputation or digital reputation is the image can be made
of a person through the Web.
• We must be aware that:
– Everybody can publish on Web without any control: on a blog or a
social network, by participating in a discussion forum, by publishing a
site to a host, etc.
– We loose the control of an information published with a " public
access ": from the moment where an information is public, it can be
indexed by search engines and copied out in their mask memory. It
can put several months disappearing.
Dr. Thouraya Daouas 7Digital Identity

More Related Content

What's hot

Data encryption
Data encryptionData encryption
Data encryption
Deepam Goyal
 
Security issues in E-commerce
Security issues in E-commerceSecurity issues in E-commerce
Security issues in E-commerce
nikitaTahilyani1
 
Online Scams and Frauds
Online Scams and FraudsOnline Scams and Frauds
Online Scams and Frauds
Quick Heal Technologies Ltd.
 
Cyber security for an organization
Cyber security for an organizationCyber security for an organization
Cyber security for an organization
Tejas Wasule
 
Introduction to Network Security
Introduction to Network SecurityIntroduction to Network Security
Introduction to Network SecurityJohn Ely Masculino
 
E commerce security
E commerce securityE commerce security
E commerce securityShakti Singh
 
Security issues in e commerce
Security issues in e commerceSecurity issues in e commerce
Security issues in e commerce
sadaf tst
 
E commerce infrastructure
E commerce infrastructureE commerce infrastructure
E commerce infrastructure
Raj vardhan
 
Security in E-commerce
Security in E-commerceSecurity in E-commerce
Security in E-commercem8817
 
Indian Cyber Army
Indian Cyber ArmyIndian Cyber Army
Indian Cyber Army
tushar garg
 
Privacy in the Digital Age
Privacy in the Digital AgePrivacy in the Digital Age
Privacy in the Digital Age
Pew Research Center
 
Security Threats in E-Commerce
Security Threats in E-CommerceSecurity Threats in E-Commerce
Security Threats in E-Commerce
Dattatreya Reddy Peram
 
Phishing ppt
Phishing pptPhishing ppt
Phishing ppt
shindept123
 
cyber security presentation.pptx
cyber security presentation.pptxcyber security presentation.pptx
cyber security presentation.pptx
kishore golla
 
Cyberspace
CyberspaceCyberspace
Cyberspace
Utchi
 
Social engineering
Social engineering Social engineering
Social engineering
Abdelhamid Limami
 
Security issue in e commerce
Security issue in e commerceSecurity issue in e commerce
cyber stalking
cyber stalking cyber stalking
cyber stalking
Rishabh Kataria
 
Authentication techniques
Authentication techniquesAuthentication techniques
Authentication techniques
IGZ Software house
 
Cyber security
Cyber securityCyber security
Cyber security
Rishav Sadhu
 

What's hot (20)

Data encryption
Data encryptionData encryption
Data encryption
 
Security issues in E-commerce
Security issues in E-commerceSecurity issues in E-commerce
Security issues in E-commerce
 
Online Scams and Frauds
Online Scams and FraudsOnline Scams and Frauds
Online Scams and Frauds
 
Cyber security for an organization
Cyber security for an organizationCyber security for an organization
Cyber security for an organization
 
Introduction to Network Security
Introduction to Network SecurityIntroduction to Network Security
Introduction to Network Security
 
E commerce security
E commerce securityE commerce security
E commerce security
 
Security issues in e commerce
Security issues in e commerceSecurity issues in e commerce
Security issues in e commerce
 
E commerce infrastructure
E commerce infrastructureE commerce infrastructure
E commerce infrastructure
 
Security in E-commerce
Security in E-commerceSecurity in E-commerce
Security in E-commerce
 
Indian Cyber Army
Indian Cyber ArmyIndian Cyber Army
Indian Cyber Army
 
Privacy in the Digital Age
Privacy in the Digital AgePrivacy in the Digital Age
Privacy in the Digital Age
 
Security Threats in E-Commerce
Security Threats in E-CommerceSecurity Threats in E-Commerce
Security Threats in E-Commerce
 
Phishing ppt
Phishing pptPhishing ppt
Phishing ppt
 
cyber security presentation.pptx
cyber security presentation.pptxcyber security presentation.pptx
cyber security presentation.pptx
 
Cyberspace
CyberspaceCyberspace
Cyberspace
 
Social engineering
Social engineering Social engineering
Social engineering
 
Security issue in e commerce
Security issue in e commerceSecurity issue in e commerce
Security issue in e commerce
 
cyber stalking
cyber stalking cyber stalking
cyber stalking
 
Authentication techniques
Authentication techniquesAuthentication techniques
Authentication techniques
 
Cyber security
Cyber securityCyber security
Cyber security
 

Similar to Digital identity

DIGITAL FOOTPRINT-WPS Office.pptx
DIGITAL FOOTPRINT-WPS Office.pptxDIGITAL FOOTPRINT-WPS Office.pptx
DIGITAL FOOTPRINT-WPS Office.pptx
T Tanujha
 
How you can protect your online identity, online privacy and VPNs
How you can protect your online identity, online privacy and VPNsHow you can protect your online identity, online privacy and VPNs
How you can protect your online identity, online privacy and VPNs
Iulia Porneala
 
Cyber safety
Cyber safetyCyber safety
Cyber safety
DeepasreeBiju
 
Web services
Web servicesWeb services
Web services
Himanshu Pathak
 
CyberSecurity - Computers In Libraries 2024
CyberSecurity - Computers In Libraries 2024CyberSecurity - Computers In Libraries 2024
CyberSecurity - Computers In Libraries 2024
Brian Pichman
 
Cybersecurity - Defense Against The Dark Arts Harry Potter Style
Cybersecurity - Defense Against The Dark Arts Harry Potter StyleCybersecurity - Defense Against The Dark Arts Harry Potter Style
Cybersecurity - Defense Against The Dark Arts Harry Potter Style
Brian Pichman
 
4.2.1 Network Issues and Communication.pptx
4.2.1 Network Issues and Communication.pptx4.2.1 Network Issues and Communication.pptx
4.2.1 Network Issues and Communication.pptx
TeenaSharma73
 
4.2.1 Network Issues and Communication [Autosaved].pptx
4.2.1 Network Issues and Communication [Autosaved].pptx4.2.1 Network Issues and Communication [Autosaved].pptx
4.2.1 Network Issues and Communication [Autosaved].pptx
TeenaSharma73
 
Computer Science – societal impact.pptx
Computer Science – societal impact.pptxComputer Science – societal impact.pptx
Computer Science – societal impact.pptx
Nano894860
 
Unit 3B.pdf
Unit 3B.pdfUnit 3B.pdf
Unit 3B.pdf
TuhinUtsabPaul
 
Ethics,security and privacy control
Ethics,security and privacy controlEthics,security and privacy control
Ethics,security and privacy control
Sifat Hossain
 
BCE L-3omputer security Basics.pptx
BCE L-3omputer security Basics.pptxBCE L-3omputer security Basics.pptx
BCE L-3omputer security Basics.pptx
Kirti Verma
 
20131030 hkpasea presentation[1]
20131030 hkpasea presentation[1]20131030 hkpasea presentation[1]
20131030 hkpasea presentation[1]
Alex Hung
 
Presentation on Information Privacy
Presentation on Information PrivacyPresentation on Information Privacy
Presentation on Information Privacy
Perry Slack
 
Your digital identity - are you feeling lucky?
Your digital identity - are you feeling lucky?Your digital identity - are you feeling lucky?
Your digital identity - are you feeling lucky?
Kirsten Thompson
 
Community IT Innovators - IT Security Best Practices
Community IT Innovators - IT Security Best PracticesCommunity IT Innovators - IT Security Best Practices
Community IT Innovators - IT Security Best Practices
Community IT Innovators
 
Securing and Safeguarding Your Library Setup
Securing and Safeguarding Your Library SetupSecuring and Safeguarding Your Library Setup
Securing and Safeguarding Your Library Setup
Brian Pichman
 
Eds user authenticationuser authentication methods
Eds user authenticationuser authentication methodsEds user authenticationuser authentication methods
Eds user authenticationuser authentication methods
lapao2014
 
SERVICES ON THE INTERNET
SERVICES ON THE INTERNETSERVICES ON THE INTERNET
SERVICES ON THE INTERNETRiya Gupta
 
Cyber Safety
Cyber Safety Cyber Safety
Cyber Safety
Asim Sourav Rath
 

Similar to Digital identity (20)

DIGITAL FOOTPRINT-WPS Office.pptx
DIGITAL FOOTPRINT-WPS Office.pptxDIGITAL FOOTPRINT-WPS Office.pptx
DIGITAL FOOTPRINT-WPS Office.pptx
 
How you can protect your online identity, online privacy and VPNs
How you can protect your online identity, online privacy and VPNsHow you can protect your online identity, online privacy and VPNs
How you can protect your online identity, online privacy and VPNs
 
Cyber safety
Cyber safetyCyber safety
Cyber safety
 
Web services
Web servicesWeb services
Web services
 
CyberSecurity - Computers In Libraries 2024
CyberSecurity - Computers In Libraries 2024CyberSecurity - Computers In Libraries 2024
CyberSecurity - Computers In Libraries 2024
 
Cybersecurity - Defense Against The Dark Arts Harry Potter Style
Cybersecurity - Defense Against The Dark Arts Harry Potter StyleCybersecurity - Defense Against The Dark Arts Harry Potter Style
Cybersecurity - Defense Against The Dark Arts Harry Potter Style
 
4.2.1 Network Issues and Communication.pptx
4.2.1 Network Issues and Communication.pptx4.2.1 Network Issues and Communication.pptx
4.2.1 Network Issues and Communication.pptx
 
4.2.1 Network Issues and Communication [Autosaved].pptx
4.2.1 Network Issues and Communication [Autosaved].pptx4.2.1 Network Issues and Communication [Autosaved].pptx
4.2.1 Network Issues and Communication [Autosaved].pptx
 
Computer Science – societal impact.pptx
Computer Science – societal impact.pptxComputer Science – societal impact.pptx
Computer Science – societal impact.pptx
 
Unit 3B.pdf
Unit 3B.pdfUnit 3B.pdf
Unit 3B.pdf
 
Ethics,security and privacy control
Ethics,security and privacy controlEthics,security and privacy control
Ethics,security and privacy control
 
BCE L-3omputer security Basics.pptx
BCE L-3omputer security Basics.pptxBCE L-3omputer security Basics.pptx
BCE L-3omputer security Basics.pptx
 
20131030 hkpasea presentation[1]
20131030 hkpasea presentation[1]20131030 hkpasea presentation[1]
20131030 hkpasea presentation[1]
 
Presentation on Information Privacy
Presentation on Information PrivacyPresentation on Information Privacy
Presentation on Information Privacy
 
Your digital identity - are you feeling lucky?
Your digital identity - are you feeling lucky?Your digital identity - are you feeling lucky?
Your digital identity - are you feeling lucky?
 
Community IT Innovators - IT Security Best Practices
Community IT Innovators - IT Security Best PracticesCommunity IT Innovators - IT Security Best Practices
Community IT Innovators - IT Security Best Practices
 
Securing and Safeguarding Your Library Setup
Securing and Safeguarding Your Library SetupSecuring and Safeguarding Your Library Setup
Securing and Safeguarding Your Library Setup
 
Eds user authenticationuser authentication methods
Eds user authenticationuser authentication methodsEds user authenticationuser authentication methods
Eds user authenticationuser authentication methods
 
SERVICES ON THE INTERNET
SERVICES ON THE INTERNETSERVICES ON THE INTERNET
SERVICES ON THE INTERNET
 
Cyber Safety
Cyber Safety Cyber Safety
Cyber Safety
 

More from Thouraya Daouas

Fish philosophie
Fish philosophieFish philosophie
Fish philosophie
Thouraya Daouas
 
Pich aux LUDOVIALES 2020
Pich aux LUDOVIALES 2020Pich aux LUDOVIALES 2020
Pich aux LUDOVIALES 2020
Thouraya Daouas
 
Présentation d'une communication acceptée dans ICERI2018.
Présentation d'une communication acceptée dans ICERI2018.Présentation d'une communication acceptée dans ICERI2018.
Présentation d'une communication acceptée dans ICERI2018.
Thouraya Daouas
 
Présentation d'une communication acceptée dans Iceri2019
Présentation d'une communication acceptée dans Iceri2019Présentation d'une communication acceptée dans Iceri2019
Présentation d'une communication acceptée dans Iceri2019
Thouraya Daouas
 
De la craie au virtuel
De la craie au virtuelDe la craie au virtuel
De la craie au virtuel
Thouraya Daouas
 
La place de la technologie dans l'enseignement: Le changement a eu lieu.
La place de la technologie dans l'enseignement: Le changement a eu lieu.La place de la technologie dans l'enseignement: Le changement a eu lieu.
La place de la technologie dans l'enseignement: Le changement a eu lieu.
Thouraya Daouas
 
Work flow
Work flowWork flow
Work flow
Thouraya Daouas
 
Le virtuel dans l’enseignement exploiter le ‘e’ pour améliorer l’apprentissage
Le virtuel dans l’enseignement exploiter le ‘e’ pour améliorer l’apprentissageLe virtuel dans l’enseignement exploiter le ‘e’ pour améliorer l’apprentissage
Le virtuel dans l’enseignement exploiter le ‘e’ pour améliorer l’apprentissage
Thouraya Daouas
 
Plateforme uvt c2i
Plateforme uvt c2iPlateforme uvt c2i
Plateforme uvt c2i
Thouraya Daouas
 
Plateforme e circle
Plateforme e circlePlateforme e circle
Plateforme e circle
Thouraya Daouas
 

More from Thouraya Daouas (10)

Fish philosophie
Fish philosophieFish philosophie
Fish philosophie
 
Pich aux LUDOVIALES 2020
Pich aux LUDOVIALES 2020Pich aux LUDOVIALES 2020
Pich aux LUDOVIALES 2020
 
Présentation d'une communication acceptée dans ICERI2018.
Présentation d'une communication acceptée dans ICERI2018.Présentation d'une communication acceptée dans ICERI2018.
Présentation d'une communication acceptée dans ICERI2018.
 
Présentation d'une communication acceptée dans Iceri2019
Présentation d'une communication acceptée dans Iceri2019Présentation d'une communication acceptée dans Iceri2019
Présentation d'une communication acceptée dans Iceri2019
 
De la craie au virtuel
De la craie au virtuelDe la craie au virtuel
De la craie au virtuel
 
La place de la technologie dans l'enseignement: Le changement a eu lieu.
La place de la technologie dans l'enseignement: Le changement a eu lieu.La place de la technologie dans l'enseignement: Le changement a eu lieu.
La place de la technologie dans l'enseignement: Le changement a eu lieu.
 
Work flow
Work flowWork flow
Work flow
 
Le virtuel dans l’enseignement exploiter le ‘e’ pour améliorer l’apprentissage
Le virtuel dans l’enseignement exploiter le ‘e’ pour améliorer l’apprentissageLe virtuel dans l’enseignement exploiter le ‘e’ pour améliorer l’apprentissage
Le virtuel dans l’enseignement exploiter le ‘e’ pour améliorer l’apprentissage
 
Plateforme uvt c2i
Plateforme uvt c2iPlateforme uvt c2i
Plateforme uvt c2i
 
Plateforme e circle
Plateforme e circlePlateforme e circle
Plateforme e circle
 

Recently uploaded

Social Media Marketing Strategies .
Social Media Marketing Strategies                     .Social Media Marketing Strategies                     .
Social Media Marketing Strategies .
Virtual Real Design
 
Buy Pinterest Followers, Reactions & Repins Go Viral on Pinterest with Socio...
Buy Pinterest Followers, Reactions & Repins  Go Viral on Pinterest with Socio...Buy Pinterest Followers, Reactions & Repins  Go Viral on Pinterest with Socio...
Buy Pinterest Followers, Reactions & Repins Go Viral on Pinterest with Socio...
SocioCosmos
 
“To be integrated is to feel secure, to feel connected.” The views and experi...
“To be integrated is to feel secure, to feel connected.” The views and experi...“To be integrated is to feel secure, to feel connected.” The views and experi...
“To be integrated is to feel secure, to feel connected.” The views and experi...
AJHSSR Journal
 
7 Tips on Social Media Marketing strategy
7 Tips on Social Media Marketing strategy7 Tips on Social Media Marketing strategy
7 Tips on Social Media Marketing strategy
Digital Marketing Lab
 
SluggerPunk Angel Investor Final Proposal
SluggerPunk Angel Investor Final ProposalSluggerPunk Angel Investor Final Proposal
SluggerPunk Angel Investor Final Proposal
grogshiregames
 
Improving Workplace Safety Performance in Malaysian SMEs: The Role of Safety ...
Improving Workplace Safety Performance in Malaysian SMEs: The Role of Safety ...Improving Workplace Safety Performance in Malaysian SMEs: The Role of Safety ...
Improving Workplace Safety Performance in Malaysian SMEs: The Role of Safety ...
AJHSSR Journal
 
Unlock TikTok Success with Sociocosmos..
Unlock TikTok Success with Sociocosmos..Unlock TikTok Success with Sociocosmos..
Unlock TikTok Success with Sociocosmos..
SocioCosmos
 
SluggerPunk Final Angel Investor Proposal
SluggerPunk Final Angel Investor ProposalSluggerPunk Final Angel Investor Proposal
SluggerPunk Final Angel Investor Proposal
grogshiregames
 
The Evolution of SEO: Insights from a Leading Digital Marketing Agency
The Evolution of SEO: Insights from a Leading Digital Marketing AgencyThe Evolution of SEO: Insights from a Leading Digital Marketing Agency
The Evolution of SEO: Insights from a Leading Digital Marketing Agency
Digital Marketing Lab
 
Grow Your Reddit Community Fast.........
Grow Your Reddit Community Fast.........Grow Your Reddit Community Fast.........
Grow Your Reddit Community Fast.........
SocioCosmos
 
Your Path to YouTube Stardom Starts Here
Your Path to YouTube Stardom Starts HereYour Path to YouTube Stardom Starts Here
Your Path to YouTube Stardom Starts Here
SocioCosmos
 
Multilingual SEO Services | Multilingual Keyword Research | Filose
Multilingual SEO Services |  Multilingual Keyword Research | FiloseMultilingual SEO Services |  Multilingual Keyword Research | Filose
Multilingual SEO Services | Multilingual Keyword Research | Filose
madisonsmith478075
 
Surat Digital Marketing School - course curriculum
Surat Digital Marketing School - course curriculumSurat Digital Marketing School - course curriculum
Surat Digital Marketing School - course curriculum
digitalcourseshop4
 

Recently uploaded (13)

Social Media Marketing Strategies .
Social Media Marketing Strategies                     .Social Media Marketing Strategies                     .
Social Media Marketing Strategies .
 
Buy Pinterest Followers, Reactions & Repins Go Viral on Pinterest with Socio...
Buy Pinterest Followers, Reactions & Repins  Go Viral on Pinterest with Socio...Buy Pinterest Followers, Reactions & Repins  Go Viral on Pinterest with Socio...
Buy Pinterest Followers, Reactions & Repins Go Viral on Pinterest with Socio...
 
“To be integrated is to feel secure, to feel connected.” The views and experi...
“To be integrated is to feel secure, to feel connected.” The views and experi...“To be integrated is to feel secure, to feel connected.” The views and experi...
“To be integrated is to feel secure, to feel connected.” The views and experi...
 
7 Tips on Social Media Marketing strategy
7 Tips on Social Media Marketing strategy7 Tips on Social Media Marketing strategy
7 Tips on Social Media Marketing strategy
 
SluggerPunk Angel Investor Final Proposal
SluggerPunk Angel Investor Final ProposalSluggerPunk Angel Investor Final Proposal
SluggerPunk Angel Investor Final Proposal
 
Improving Workplace Safety Performance in Malaysian SMEs: The Role of Safety ...
Improving Workplace Safety Performance in Malaysian SMEs: The Role of Safety ...Improving Workplace Safety Performance in Malaysian SMEs: The Role of Safety ...
Improving Workplace Safety Performance in Malaysian SMEs: The Role of Safety ...
 
Unlock TikTok Success with Sociocosmos..
Unlock TikTok Success with Sociocosmos..Unlock TikTok Success with Sociocosmos..
Unlock TikTok Success with Sociocosmos..
 
SluggerPunk Final Angel Investor Proposal
SluggerPunk Final Angel Investor ProposalSluggerPunk Final Angel Investor Proposal
SluggerPunk Final Angel Investor Proposal
 
The Evolution of SEO: Insights from a Leading Digital Marketing Agency
The Evolution of SEO: Insights from a Leading Digital Marketing AgencyThe Evolution of SEO: Insights from a Leading Digital Marketing Agency
The Evolution of SEO: Insights from a Leading Digital Marketing Agency
 
Grow Your Reddit Community Fast.........
Grow Your Reddit Community Fast.........Grow Your Reddit Community Fast.........
Grow Your Reddit Community Fast.........
 
Your Path to YouTube Stardom Starts Here
Your Path to YouTube Stardom Starts HereYour Path to YouTube Stardom Starts Here
Your Path to YouTube Stardom Starts Here
 
Multilingual SEO Services | Multilingual Keyword Research | Filose
Multilingual SEO Services |  Multilingual Keyword Research | FiloseMultilingual SEO Services |  Multilingual Keyword Research | Filose
Multilingual SEO Services | Multilingual Keyword Research | Filose
 
Surat Digital Marketing School - course curriculum
Surat Digital Marketing School - course curriculumSurat Digital Marketing School - course curriculum
Surat Digital Marketing School - course curriculum
 

Digital identity

  • 1. Digital Identity What is it? Thouraya.daouas@ihec.rnu.tn Dr. Thouraya Daouas
  • 2. Digital identity • The set of activities you do on Internet contributes in defining your digital identity. • It’s constructed by many elements: – Personal data associated with your profile. – Information you publish on Internet. – Information about you that others publish. – Tracks you leave consciously or not. • User can have three types of identifier: – Professional or institutional related to a professional activity. – Private identifiers for personal use (social network, online selling, mail, online banking, etc.) Dr. Thouraya Daouas 2Digital Identity
  • 3. Digital identity • How to master it? – User should choose sensibly its identifier to be used according to his activity; – User limits the access to the information which he publishes; – User checks regularly his image on Web or e- reputation. Dr. Thouraya Daouas 3Digital Identity
  • 4. Authentification • Procedure which checks that the information about connection supplied is correct (identifier and password, fingerprints, etc.). • Some rules are important to respect: – Keep secret the password. – Choose a complex password (Combining necessarily small letters, capital letters, numbers and symbols). Should not have evident meaning. – Should not usurp an identity. Dr. Thouraya Daouas 4Digital Identity
  • 5. Configuration of profile • Connection identifier can be associated to a profile containing photos, personal information and preferences. • It is possible to configure information access: – Public: accessible for everyone and referenced in search engines. – Restricted: accessible for authorized community and not referenced. • In case of emails, a signature could be put at the end of the email body or a visit card could be joint to the email. Dr. Thouraya Daouas 5Digital Identity
  • 6. Digital tracks • What could we find in the file properties? – Date, Time, Author name, Revision number, Camera model, etc. • What can we know about the user identity? – Each connected computer has an IP address given to user by the Internet service provider which has to keep during one year the list of connections and the information allowing to identify the Internet user. – When we consult a web page, the browser sends a request to the server to get back the data (texts, images, etc.) to download. Server can keep track and follow so the browsing on the site. – In email header are stored a series of IP addresses describing servers which can supply indications on sender geographical localization. Dr. Thouraya Daouas 6Digital Identity
  • 7. e-Reputation • e-Reputation or digital reputation is the image can be made of a person through the Web. • We must be aware that: – Everybody can publish on Web without any control: on a blog or a social network, by participating in a discussion forum, by publishing a site to a host, etc. – We loose the control of an information published with a " public access ": from the moment where an information is public, it can be indexed by search engines and copied out in their mask memory. It can put several months disappearing. Dr. Thouraya Daouas 7Digital Identity