Digital footprints can provide benefits like not having to repeatedly log in or submit personal details. However, they also carry costs like revealing what websites and searches you use and who is in your social circle. This information can then be used by companies for commercial purposes like tracking you, customizing ads for you, and marketing to you. There are three ways to manage your digital footprint - improve your understanding of privacy issues, develop habits like keeping different parts of your online presence separate, and using privacy settings to secure your personal data instead of having it disclosed by default.
4. Digital Footprints
Benefits
• Don’t have to repeatedly log in
• Submit personal details
Cost
• Which websites you frequent
• What things you search for
• Who is in your social circle
8. Develop your 'basic hygiene”
habits.
keep different parts of your
digital footprint separate
9. Use Privacy Settings
default settings for browsers, devices and
apps are set to disclose,
rather than secure, your personal data
10. Define
terms
Virus a self-replicating program that
is designed to infect a
computer
Malware
intentionally malicious
software or code
Spam
unsolicited email or junk mail
11. Define terms
Clickjackingtechnique that tricks users into
clicking on a malicious link
Mousetrapping
keeps visitors from leaving a website b
locking them into a window,
opening multiple windows
on the desktop, or relaunching their
website in a window that can't be clos
12. Define terms
Sockpuppet a fake identify
Troll a person who posts comments just
to get a rise out of people
Flame Warinsulting comments and
personal attacks
are focus of conversation
FlamebaitA comment posted by
someone trying to provoke a
flame
17. •Creating a hate group about someone.
•Posting mean comments online.
•Photoshopping someone’s photo to
embarrass them.
•Recording and posting fight videos.
•Spreading rumors and gossip through
text messages.
•Stealing someone’s identity to create a
fake profile
Editor's Notes
Commercial MT Internet Baby
https://www.youtube.com/watch?v=rg37kafMsWk
Digital footprints are the records and traces we leave behind us as we use the Internet.
Your digital footprint paints a picture of who you are.
Every day, whether we want to or not, most of us contribute to a growing portrait of who we are online; a portrait that is probably more public than we assume.
This portrait helps companies target content at specific markets and consumers, helps employers look into your background, and helps advertisers track your movements across multiple websites. Whatever you do online, you might be leaving digital footprints behind.
So no matter what you do online it’s important that you know what kind of trail you’re leaving, and what the possible effects can be.
While it's not possible to have ZERO footprints, the first steps toward reducing your digital footprint and managing your digital identity are not that hard.
Your own digital footprint may contribute to your online reputation. Your digital footprint can mean you don't have to repeatedly log in or submit personal details to web sites. On the other hand, your digital footprints may allow others to follow your actions, such as which web sites you use, what things you search for, and who is in your social circle.
Our digital footprints are visible to organizations with whom we have no relationship, and over whom we often have no control. Many organizations also work behind the scenes to build profiles about us based on our digital footprints.
Your digital footprints are bigger than you may have thought, and they are being used - usually for commercial purposes, but sometimes for other reasons - to track you, customize for you, and market to you. These activities are primarily for the benefit of the organisation concerned. In short, your digital footprint is a monetizable asset... but any direct gain does not usually come to you, the individual.
There are four levels at which you can choose to manage and control your digital footprints.
First. Improve your understanding of the basic issues.Second. Develop your “basic hygiene” habits.Third . Become a sophisticated user of your online tools and services. And, fourth. Find and use specific privacy-enhancing tools.
Before we can learn how to protect ourselves, we need to understand what the threats are on the Internet.
Think about the implications of everything shared on the Internet being a privacy risk to some degree.
Most people are aware that when they share information about themselves on the Internet, such as with social networking services, and when they use on-line services, such as email, instant messaging, or voice calling, they have given up some control over their privacy.
This loss of control is frequently the result of explicit acts: making a Skype call, sharing something on Facebook, uploading pictures to Tumblr, sending an email to a Hotmail user. We may expect some privacy, but we know we’ve given something up, and we’ve left a clear imprint at each of these individual services.
Privacy is a contextual thing. If you use different “personas” for different aspects of your online life – whether that's one email address for work and another for home, or a one credit card for online shopping and another for everything else – it will help keep different parts of your digital footprint separate.
Be mindful about what you share via social sites and elsewhere, because that data is probably more public and persistent than you might anticipate.
Very often, the default settings for browsers, devices and apps are set to disclose, rather than secure, your personal data. It's worth taking the time to investigate those settings and make sure you're comfortable with them, just like it's worth checking whether you latched the windows before you left the house.
When an application asks for “permission to send you push notifications and use your location data”, take a moment to reflect on whether that's really what you want.
Your camera and smartphone usually record the time and location in each photo you take, and when you share those photos, you may be publishing that data unless you specifically block it.
Once you’ve shared anything, in almost any context, you lose the ability to “un- share” it. And once you’ve visited a web site or created an account, you may lose the ability to erase your footprints.
Internet users also need to understand that a desire for privacy creates a conflict with many service providers, such as social networks.
A virus is a self-replicating program that is designed to infect a computer by rapidly spreading from one file to another, sometimes causing great harm.
*Worms are similar, except they are usually spread over a network without human help.
Malware is intentionally malicious software or code that is designed to damage your computer or collect information without your knowledge.
Spam is unsolicited email or junk mail. Sometimes, it comes from legitimate companies, but it can also be used for scams, phishing, and malware.
Clickjacking is a technique that tricks users into clicking on a malicious link by adding the link to a transparent layer over what appears to be a legitimate web page.
Users think they are clicking on buttons or links in the legitimate page, when in reality they are clicking on the concealed links in the hidden page and often providing access to confidential information in the process.
Mousetrapping keeps visitors from leaving a website by locking them into a window, opening multiple windows on the desktop, or relaunching their website in a window that can't be closed.
A sockpuppet is a fake identify that someone creates and uses to deceive others for some kind of personal gain. On most websites it is possible to have more than one account, so it is easy to create sockpuppets.
For example, John could have a few online identities for the same chat service: John45, Sarah03, and HarmonicasRock12. When he is HarmonicasRock12, he might pretend to be a 30-year-old music enthusiast to find out what music stores you go to. And when he is Sarah03, he might pretend to be a 20-year old college student to find out where you went to college.
A troll is a person who posts comments just to get a rise out of people and cause a distraction.
Trolls might say something rude, assert incorrect information, or ask questions unrelated to the topic at hand. People who respond to obvious trolling posts are said to be feeding the trolls, which often causes the trolls to return and continue disrupting the discussion.
A flame war is a heated argument in a social media outlet such as a web forum, mailing list or chat room, in which intentionally insulting comments and personal attacks become a focus of conversation.
A comment posted by someone trying to provoke a flame, or an angry response, is called flamebait.
If anyone responds to the comment, they are said to have taken the bait.
CNN study #being13
https://www.youtube.com/watch?v=t-9LtTtkg04
Sexting is one way that some teens share inappropriate information. Sexting is the sharing of nude or suggestive pictures and videos through text messages. Although only 4% of teens are sexting, stories about it have been all over the news. 13 You may even know people who have been asked to do it. Teens who get involved with sexting are usually:
Joking around with friends.
In a relationship, where a girlfriend or boyfriend asks for a photo.
Flirting or trying to impress a crush.
Getting a request to sext might make you feel:
Flattered, because it means that someone thinks you’re attractive.
Angry, because someone is asking you for something so private.
Pressured, especially if it comes from a boyfriend, girlfriend or crush.
News clips about 16yr old life changed because of sexting
In groups talk about what things could happen if you decide to take a revealing image of yourself?
The girl in the video thinks that only her boyfriend will see the image. But she soon learns that once you share an image, it is out of your control. One study estimated that 88% of the self-made sexual or suggestive images that teens post online are re-posted to adult websites.14
If you take a revealing image of yourself:
It could be lost if you misplace or lose your cell phone.
It may be passed around without your permission. For example, an ex-boyfriend or girlfriend may share the sext to get revenge.
People may bully or judge you because of the image. Some teens have been bullied so badly because of sexting images that they have been afraid to go to school.
The person that receives the image might try to use it to blackmail you into sending more images.
You may get in trouble with your school or with law enforcement, especially if there is evidence of blackmail, bullying or forwarding without permission. Some teens have been suspended from class, sports teams and other activities. Others have been charged with a crime and had to complete community service or educational programs.
Examples from the News
Sixteen KY students were suspended and banned from their school’s homecoming dance after nude photos were found on their cell phones.15
Three WA teens who got in trouble for forwarding the nude photo of a classmate had to complete community service, apologize to their classmate and start a program at their school to educate their peers about the dangers of texting.16
A 16-year-old GA teen was suspended for six days after tweeting a revealing photo that a classmate posted to his Facebook page. The school suspended him on a bullying violation.17
The last risk that we are going to discuss is one that many of you are probably aware of – cyberbullying. Cyberbullying is the use of technology to harass someone. Some examples are:
Creating a hate group about someone.
Posting mean comments online.
Photoshopping someone’s photo to embarrass them.
Recording and posting fight videos.
Spreading rumors and gossip through text messages.
Stealing someone’s identity to create a fake profile.
Some of these things may seem more like jokes or pranks than bullying to you. But even if you did not intend to hurt someone’s feelings, it can still be cyberbullying.