Javascript is disabled. Please enable javascript to view images and advanced functionality
Social MediaSummary
Did You Mean: Digital twinDigital strategy managerDigital identity

Add research to Digital Footprint by attaching materials such as relevant webpages, videos, images or pdf documents here


Digital Footprint on Social Media

Digital Footprint Summary

One's unique set of traceable digital activities

Digital footprint also known as digital shadow  

Digital footprint or digital shadow refers to one's unique set of traceable digital activities, actions, contributions and communications that are manifested on the Internet or on digital devices.There are two main classifications for digital footprints: passive and active. A passive digital footprint is created when data is collected without the owner knowing (also known as data exhaust), whereas active digital footprints are created when personal data is released deliberately by a user for the purpose of sharing information about oneself by means of websites or social media. Passive digital footprints can be stored in many ways depending on the situation. In an online environment a footprint may be stored in an online data base as a "hit". This footprint may track the user IP address, when it was created, and where they came from; with the footprint later being analyzed. In an offline environment, a footprint may be stored in files, which can be accessed by administrators to view the actions performed on the machine, without being able to see who performed them. Active digital footprints can also be stored in many ways depending on the situation. In an online environment, a footprint can be stored by a user being logged into a site when making a post or change, with the registered name being connected to the edit. In an offline environment a footprint may be stored in files, when the owner of the computer uses a keylogger, so logs can show the actions performed on the machine, and who performed them. One of the features of keylogger is to monitor the clipboard for any changes. This may be problematic as the user may copy passwords or take screenshots of sensitive information which will then be logged.Tony Fish expounded upon the possible dangers of digital footprints in a 2007 self-published book. The closed loop takes data from the open loop and provides this as a new data input. This new data determines what the user has reacted to, or how they have been influenced. The feedback then builds a digital footprint based on social data, and the controller of the social digital footprint data can determine how and why people purchase and behave. Katalin Fehér emphasised in her academic research paper about personal online strategies in 2017 that users leave digital footprints behind via online systems and new media. Human interactions and digitalized automatization imply decisions and dilemmas on account of online participation. The consequences are unpredictable: both former and updated records are available in an infinite digital present.

Website Menu