Digital footprint or digital shadow refers to one's unique set of
traceable digital activities, actions, contributions and communications manifested on the
Internet
The Internet (or internet) is the global system of interconnected computer networks that uses the Internet protocol suite (TCP/IP) to communicate between networks and devices. It is a '' network of networks'' that consists of private, pub ...
or
digital devices. Digital footprints can be classified as either passive or active. The former is composed of a user's web-browsing activity and information stored as
cookie
A cookie is a baked or cooked snack or dessert that is typically small, flat and sweet. It usually contains flour, sugar, egg, and some type of oil, fat, or butter. It may include other ingredients such as raisins, oats, chocolate chips, n ...
s. The latter is often released deliberately by a user to share information on websites or
social media
Social media are interactive media technologies that facilitate the creation and sharing of information, ideas, interests, and other forms of expression through virtual communities and networks. While challenges to the definition of ''social medi ...
.
While the term usually applies to a person, a digital footprint can also refer to a business, organization or corporation.
The use of a digital footprint has both positive and negative consequences. On one side, it is the subject of many
privacy issues
The right to privacy is an element of various legal traditions that intends to restrain governmental and private actions that threaten the privacy of individuals. Over 150 national constitutions mention the right to privacy. On 10 December 194 ...
. For example, without an individual's authorization, strangers can piece together information about that individual by only using
search engine
A search engine is a software system designed to carry out web searches. They search the World Wide Web in a systematic way for particular information specified in a textual web search query. The search results are generally presented in a ...
s. Corporations are also able to produce customized ads based on browsing history. On the other hand, others can reap the benefits by profiting off their digital footprint as social media
influencer
An Internet celebrity (also known as a social media influencer, social media personality, internet personality, or simply influencer) is a celebrity who has acquired or developed their fame and notability through the Internet. The rise of social m ...
s. Furthermore, employers use a candidate's digital footprint for
online vetting Online vetting, also known as cyber-vetting is used by potential employers and other acquaintances to vet people's online presence or "internet reputation" ("''netrep''") on search engines such as Google and Yahoo, and social networking services s ...
and assessing fit due to its reduced cost and accessibility. Between two equal candidates, a candidate with a positive digital footprint may have an advantage. As technology usage becomes more widespread, even children generate larger digital footprints with potential positive and negative consequences such as college admissions. Since it is hard not to have a digital footprint, it is in one's best interest to create a positive one.
Types of digital footprints
Passive digital footprints are a data trail that an individual involuntarily leaves online. They can be stored in various ways depending on the situation. A footprint may be stored in an online database as a "hit" in an online environment. The footprint may track the user's
IP address
An Internet Protocol address (IP address) is a numerical label such as that is connected to a computer network that uses the Internet Protocol for communication.. Updated by . An IP address serves two main functions: network interface ident ...
, when it was created, where it came from, and the footprint later being analyzed. In an
offline
In computer technology and telecommunications, online indicates a state of connectivity and offline indicates a disconnected state. In modern terminology, this usually refers to an Internet connection, but (especially when expressed "on line" or ...
environment,
administrators
Administrator or admin may refer to:
Job roles Computing and internet
* Database administrator, a person who is responsible for the environmental aspects of a database
* Forum administrator, one who oversees discussions on an Internet forum
* N ...
can access and view the machine's actions without seeing who performed them. Examples of passive digital footprints are apps that use
geolocation
Geopositioning, also known as geotracking, geolocalization, geolocating, geolocation, or geoposition fixing, is the process of determining or estimating the geographic position of an object.
Geopositioning yields a set of Geographic coordinate s ...
s, websites that download cookies onto your appliance, or
browser history
Web browsing history refers to the list of web pages a user has visited, as well as associated metadata such as page title and time of visit. It is usually stored locally by web browsers in order to provide the user with a history list to go back ...
. Although passive digital footprints are inevitable, they can be lessened by deleting old accounts, using
privacy settings
ByPrivacy settings are "the part of a social networking website, internet browser, piece of software, etc. that allows you to control who sees information about you". With the growing prevalence of social networking services, opportunities for pri ...
(public or private accounts), and occasionally online searching yourself to see the information left behind.
Active digital footprints are deliberate, as they are posted or shared information willingly. They can also be stored in a variety of ways depending on the situation. A digital footprint can be stored when a user
logs into a site and makes a
post
Post or POST commonly refers to:
*Mail, the postal system, especially in Commonwealth of Nations countries
**An Post, the Irish national postal service
**Canada Post, Canadian postal service
**Deutsche Post, German postal service
**Iraqi Post, Ira ...
or change; the registered name is connected to the edit in an online environment. Examples of active digital footprints include social media posts, video or image uploads, or changes to various websites.
Privacy issues
Digital footprints are not a
digital identity
A digital identity is information used by computer systems to represent an external agent – a person, organization, application, or device. Digital identities allow access to services provided with computers to be automated and make it possibl ...
or
passport
A passport is an official travel document issued by a government that contains a person's identity. A person with a passport can travel to and from foreign countries more easily and access consular assistance. A passport certifies the personal ...
, but the content and
metadata
Metadata is "data that provides information about other data", but not the content of the data, such as the text of a message or the image itself. There are many distinct types of metadata, including:
* Descriptive metadata – the descriptive ...
collected impacts
internet privacy
Internet privacy involves the right or mandate of personal privacy concerning the storing, re-purposing, provision to third parties, and displaying of information pertaining to oneself via Internet. Internet privacy is a subset of data privacy. Pr ...
,
trust
Trust often refers to:
* Trust (social science), confidence in or dependence on a person or quality
It may also refer to:
Business and law
* Trust law, a body of law under which one person holds property for the benefit of another
* Trust (bus ...
,
security
Security is protection from, or resilience against, potential harm (or other unwanted coercive change) caused by others, by restraining the freedom of others to act. Beneficiaries (technically referents) of security may be of persons and social ...
, digital
reputation
The reputation of a social entity (a person, a social group, an organization, or a place) is an opinion about that entity typically as a result of social evaluation on a set of criteria, such as behavior or performance.
Reputation is a ubiquitous ...
, and
recommendation. As the digital world expands and integrates with more aspects of life, ownership and rights concerning data become increasingly important. Digital footprints are controversial in that privacy and openness compete.
Scott McNealy
Scott McNealy (born November 13, 1954) is an American businessman. He is most famous for co-founding the computer technology company Sun Microsystems in 1982 along with Vinod Khosla, Bill Joy, and Andy Bechtolsheim. In 2004, while still at Sun, ...
, CEO of
Sun Microsystems
Sun Microsystems, Inc. (Sun for short) was an American technology company that sold computers, computer components, software, and information technology services and created the Java programming language, the Solaris operating system, ZFS, the ...
, said in 1999 ''Get Over It'' when referring to privacy on the Internet. The quote later became a commonly used phrase in discussing private data and what companies do with it. Digital footprints are a privacy concern because they are a set of traceable actions, contributions, and ideas shared by users. It can be tracked and can allow internet users to learn about human actions.
Interested parties use Internet footprints for several reasons; including ''cyber-vetting'', where interviewers could research applicants based on their online activities. Internet footprints are also used by law enforcement agencies to provide information unavailable otherwise due to a lack of
probable cause
In United States criminal law, probable cause is the standard by which police authorities have reason to obtain a warrant for the arrest of a suspected criminal or the issuing of a search warrant. There is no universally accepted definition o ...
. Also, digital footprints are used by marketers to find what products a user is interested in or to inspire ones' interest in a particular product based on similar interests.
''Social networking systems'' may record the activities of individuals, with data becoming a ''
life stream''. Such
social media
Social media are interactive media technologies that facilitate the creation and sharing of information, ideas, interests, and other forms of expression through virtual communities and networks. While challenges to the definition of ''social medi ...
usage and roaming services allow digital tracing data to include individual interests, social groups, behaviors, and location. Such data is gathered from sensors within devices and collected and analyzed without user awareness. When many users choose to share personal information about themselves through social media platforms, including places they visited, timelines and their connections, they are unaware of the privacy setting choices and the security consequences associated with them.
[Ball, Albert; Ranim, Michelle; Levy, Yair (January 1, 2015)]
Examining users’ personal information sharing awareness, habits, and practices in social networking sites and e-learning systems.
Online Journal of Applied Knowledge Management. pp185 Many social media sites, like
Facebook
Facebook is an online social media and social networking service owned by American company Meta Platforms. Founded in 2004 by Mark Zuckerberg with fellow Harvard College students and roommates Eduardo Saverin, Andrew McCollum, Dustin M ...
, collect an extensive amount of information that can be used to piece together a user's personality. Information gathered from social media, such as the number of friends a user has, can predict whether or not the user has an introvert or extrovert personality. Moreover, a survey of SNS users revealed that 87% identified their work or education level, 84% identified their full date of birth, 78% identified their location, and 23% listed their phone numbers.
While one's digital footprint may infer personal information, such as demographic traits, sexual orientation, race, religious and political views, personality, or intelligence without individuals' knowledge, it also exposes individuals' private psychological spheres into the social sphere. ''Lifelogging'' is an example of an indiscriminate collection of information concerning an individual's life and behavior. There are actions to take to make a digital footprint challenging to track. An example of the usage or interpretation of data trails is through Facebook-influenced creditworthiness ratings, the judicial investigations around German social scientist Andrej Holm, advertisement-junk mails by the American company
OfficeMax
OfficeMax is an American office supplies retailer founded in 1988. It is now a subsidiary of The ODP Corporation, which is headquartered in Boca Raton, Florida. As of December 2012, OfficeMax operated 941 stores in 47 states, Puerto Rico, the U ...
or the border incident of Canadian citizen Ellen Richardson.
Impacts
Workforce
An increasing number of employers are evaluating applicants by their digital footprint through their interaction on social media due to its reduced cost and easy accessibility during the hiring process. By using such resources, employers can gain more insight on candidates beyond their well-scripted interview responses and perfected resumes. Candidates who display poor communication skills, use inappropriate language, or use drugs or alcohol are rated lower. Conversely, a candidate with a professional or family-oriented social media presence receive higher ratings. Employers also assess a candidate through their digital footprint to determine if a candidate is a good cultural fit for their organization. Suppose a candidate upholds an organization's values or shows existing passion for its mission. In that case, the candidate is more likely to integrate within the organization and could accomplish more than the average person. Although these assessments are known not to be accurate predictors of performance or turnover rates, employers still use digital footprints to evaluate their applicants. Thus, job seekers prefer to create a social media presence that would be viewed positively from a professional point of view.
In some professions, maintaining a digital footprint is essential. People will search the internet for specific doctors and their reviews. Half of the search results for a particular physician link to third-party rating websites. For this reason, prospective patients may unknowingly choose their physicians based on their digital footprint in addition to online reviews. Furthermore, a generation relies on social media for livelihood as
influencers
An Internet celebrity (also known as a social media influencer, social media personality, internet personality, or simply influencer) is a celebrity who has acquired or developed their fame and notability through the Internet. The rise of social m ...
by using their digital footprint. These influencers have dedicated fan bases that may be eager to follow recommendations. As a result, marketers pay influencers to promote their products among their followers, since this medium may yield better returns than traditional advertising. Consequently, one's career may be reliant on their digital footprint.
Children
Generation Alpha
Generation Alpha (Gen Alpha for short) is the Western demographic cohort succeeding Generation Z. Researchers and popular media use the early to mid 2010s as starting birth years and the mid 2020s as ending birth years. Named after the first ...
will not be the first generation born into the internet world. As such, a children's digital footprint is becoming more significant than ever before and their consequences may be unclear. Due to parenting enthusiasm, an increasing amount of parents will create social media accounts for their children at a young age, sometimes even before they are born. Parents may post up to 13,000 photos of a child on social media in their celebratory state before their teen years of everyday life or birthday celebrations.
Furthermore, these children are predicted to post 70,000 times online on their own by 18.
The advent of posting on social media creates many opportunities to gather data from minors. Since an identity's basic components contain a name, birth date, and address, these children are susceptible to
identity theft
Identity theft occurs when someone uses another person's personal identifying information, like their name, identifying number, or credit card number, without their permission, to commit fraud or other crimes. The term ''identity theft'' was co ...
. While parents may assume that privacy settings may prevent children's photos and data from being exposed, they also have to trust that their followers will not be compromised. Outsiders may take the images to pose as these children's parents or post the content publicly. For example, during the
Facebook-Cambridge Analytica data scandal, friends of friends leaked data to data miners. Due presence of children on social media, their privacy may be at risk.
Teenagers
Some professionals argue that young people entering the workforce should consider the effect of their digital footprint on their
marketability and professionalism.
Having a digital footprint may be very good for students, as college admissions staff and potential employers may decide to research into prospective student's and employee's online profiles, leading to an enormous impact on the students' futures.
Teens will be set up for more success if they consider the kind of impact they are making and how it can affect their future. Instead, someone who acts apathetic towards the impression they are making online will struggle if they one day choose to attend college or enter into the workforce.
Teens who plan to receive a
higher education
Higher education is tertiary education leading to award of an academic degree. Higher education, also called post-secondary education, third-level or tertiary education, is an optional final stage of formal learning that occurs after completi ...
will have their digital footprint reviewed and assessed as a part of the application process.
Besides, if the teens that have the intention of receiving a higher education are planning to do so with financial help and scholarships, then they need to consider that their digital footprint will be evaluated in the application process to get scholarships.
See also
*
Alternative data In economic policy, alternative data refers to the inclusion of non-financial payment reporting data in credit files, such as telecom and energy utility payments.
Types of alternative data
Alternative data in the broadest sense refers to any non-f ...
*
Behavioral targeting
Targeted advertising is a form of advertising, including online advertising, that is directed towards an audience with certain traits, based on the product or person the advertiser is promoting. These traits can either be demographic with a focus ...
*
Browser isolation
*
Data exhaust
*
Digital identity
A digital identity is information used by computer systems to represent an external agent – a person, organization, application, or device. Digital identities allow access to services provided with computers to be automated and make it possibl ...
*
Internet anonymity
Anonymity describes situations where the acting person's identity is unknown. Some writers have argued that namelessness, though technically correct, does not capture what is more centrally at stake in contexts of anonymity. The important idea he ...
*
Internet privacy
Internet privacy involves the right or mandate of personal privacy concerning the storing, re-purposing, provision to third parties, and displaying of information pertaining to oneself via Internet. Internet privacy is a subset of data privacy. Pr ...
*
Online advertising
Online advertising, also known as online marketing, Internet advertising, digital advertising or web advertising, is a form of marketing and advertising which uses the Internet to promote products and services to audiences and platform users. ...
*
Online identity
Internet identity (IID), also online identity or internet persona, is a social identity that an Internet user establishes in online communities and websites. It may also be an actively constructed presentation of oneself. Although some people cho ...
*
Reality mining
*
Reputation management
Reputation management, originally a public relations term, refers to the influencing, controlling, enhancing, or concealing of an individual's or group's reputation. The growth of the internet and social media led to growth of reputation manage ...
*
SIGINT
Signals intelligence (SIGINT) is intelligence-gathering by interception of ''signals'', whether communications between people (communications intelligence—abbreviated to COMINT) or from electronic signals not directly used in communication ( ...
*
Social engineering
*
Social genome
*
Targeted marketing
Targeted advertising is a form of advertising, including online advertising, that is directed towards an audience with certain traits, based on the product or person the advertiser is promoting. These traits can either be demographic with a focu ...
*
UK/USA Agreement
*
Universal Product Code
The Universal Product Code (UPC or UPC code) is a barcode symbology that is widely used worldwide for tracking trade items in stores.
UPC (technically refers to UPC-A) consists of 12 digits that are uniquely assigned to each trade item. Along w ...
*
Web tracking
Web tracking is the practice by which operators of websites and third parties collect, store and share information about visitors’ activities on the World Wide Web. Analysis of a user's behaviour may be used to provide content that enables the ...
*
Website
A website (also written as a web site) is a collection of web pages and related content that is identified by a common domain name and published on at least one web server. Examples of notable websites are Google Search, Google, Facebook, Amaz ...
References
Further reading
*
* {{cite web , author=BBVA , title=The enormous data trail we generate throughout the day , website=NEWS BBVA , date=2016-08-24 , url=https://www.bbva.com/en/the-enormous-data-trail-we-generate-throughout-the-day/ , access-date=2022-05-28, quote=Have you ever stopped to think about all the data you generate throughout the day? It was the possibility of actually making use of all this data through numerous apps, records and data bases that gave rise to
Big Data
Though used sometimes loosely partly because of a lack of formal definition, the interpretation that seems to best describe Big data is the one associated with large body of information that we could not comprehend when used only in smaller am ...
.
Computing and society
Digital marketing
Information privacy
Past
Internet privacy