This article contains instructions, advice, or how-to content. (November 2021)
Digital footprint or digital shadow refers to one's unique set of traceable digital activities, actions, contributions and communications manifested on the Internet or digital devices. Digital footprints can be classified as either passive or active. The former is composed of a user's web-browsing activity and information stored as cookies. The latter is often released deliberately by a user to share information on websites or social media. While the term usually applies to a person, a digital footprint can also refer to a business, organization or corporation.
The use of a digital footprint has both positive and negative consequences. On one side, it is the subject of many privacy issues. For example, without an individual's authorization, strangers can piece together information about that individual by only using search engines. Corporations are also able to produce customized ads based on browsing history. On the other hand, others can reap the benefits by profiting off their digital footprint as social media influencers. Furthermore, employers use a candidate's digital footprint for online vetting and assessing fit due to its reduced cost and accessibility. Between two equal candidates, a candidate with a positive digital footprint may have an advantage. As technology usage becomes more widespread, even children generate larger digital footprints with potential positive and negative consequences such as college admissions. Since it is hard not to have a digital footprint, it is in one's best interest to create a positive one.
Types of digital footprints
Passive digital footprints is a data trail that an individual involuntarily leave online. They can be stored in various ways depending on the situation. A footprint may be stored in an online database as a "hit" in an online environment. The footprint may track the user's IP address, when it was created, where it came from, and the footprint later being analyzed. In an offline environment, administrators can access and view the machine's actions without seeing who performed them. Examples of passive digital footprints are apps that use geolocations, websites that download cookies onto your appliance, or browser history. Although passive digital footprints are inevitable, some tips to keep in mind to slow a large digital footprint are: deleting old accounts, using privacy settings (public or private accounts), and occasionally online searching yourself to see the information left behind.
Active digital footprints are deliberate, as they are posted or shared information willingly. They can also be stored in a variety of ways depending on the situation. A footprint can be stored by a user being logged into a site when making a post or change, with the registered name being connected to the edit in an online environment. In an offline environment, a footprint may be stored in files when the owner of the computer uses a keylogger. Logs can show the actions performed on the machine and who performed them. One feature of the keylogger monitors the clipboard for any changes. Though, this may be problematic if the user intends to copy passwords or take screenshots of sensitive information, which is then logged. Examples of active digital footprints include social media posts, video or image uploads, or changes to various websites. Digital footprints do not need to be seen as negative, as they are useful in hiring processes. With this knowledge in mind, it is important to post information knowing that several populations may be viewing their digital footprint by a simple web search.
Digital footprints are not a digital identity or passport, but the content and metadata collected impacts internet privacy, trust, security, digital reputation, and recommendation. As the digital world expands and integrates with more aspects of life, ownership and rights concerning data become increasingly important. Digital footprints are controversial in that privacy and openness compete. Scott McNealy, CEO of Sun Microsystems, said in 1999 Get Over It when referring to privacy on the Internet. The quote later became a commonly used phrase in discussing private data and what companies do with it. Digital footprints are a privacy concern because they are a set of traceable actions, contributions, and ideas shared by users. It can be tracked and can allow internet users to learn about human actions.
Interested parties use Internet footprints for several reasons; including cyber-vetting, where interviewers could research applicants based on their online activities. Internet footprints are also used by law enforcement agencies to provide information unavailable otherwise due to a lack of probable cause. Also, digital footprints are used by marketers to find what products a user is interested in or to inspire ones' interest in a particular product based on similar interests.
Social networking systems may record the activities of individuals, with data becoming a life stream. Such social media usage and roaming services allow digital tracing data to include individual interests, social groups, behaviors, and location. Such data is gathered from sensors within devices and collected and analyzed without user awareness. When many users choose to share personal information about themselves through social media platforms, including places they visited, timelines and their connections, they are unaware of the privacy setting choices and the security consequences associated with them. Many social media sites, like Facebook, collect an extensive amount of information that can be used to piece together a user's personality. Information gathered from social media, such as the number of friends a user has, can predict whether or not the user has an introvert or extrovert personality. Moreover, a survey of SNS users revealed that 87% identified their work or education level, 84% identified their full date of birth, 78% identified their location, and 23% listed their phone numbers.
While one's digital footprint may infer personal information, such as demographic traits, sexual orientation, race, religious and political views, personality, or intelligence without individuals' knowledge, it also exposes individuals' private psychological spheres into the social sphere. Lifelogging is an example of an indiscriminate collection of information concerning an individual's life and behavior. There are actions to take to make a digital footprint challenging to track. An example of the usage or interpretation of data trails is through Facebook-influenced creditworthiness ratings, the judicial investigations around German social scientist Andrej Holm, advertisement-junk mails by the American company OfficeMax or the border incident of Canadian citizen Ellen Richardson.
Effects on workforce
As technology becomes ubiquitous, an increasing number of employers are also evaluating applicants by their digital footprint through their interaction on social media due to its reduced cost and easy accessibility during the hiring process. By using such resources, employers can gain more insight on candidates beyond their well-scripted interview responses and perfected resumes. Candidates who display poor communication skills, use inappropriate language, or use drugs or alcohol are rated lower. Conversely, a candidate with a professional or family-oriented social media presence receive higher ratings. Employers also assess a candidate through their digital footprint to determine if a candidate is a good cultural fit for their organization. Suppose a candidate upholds an organization's values or shows existing passion for its mission. In that case, the candidate is more likely to integrate within the organization and could accomplish more than the average person. Although these assessments are known not to be accurate predictors of performance or turnover rates, employers still use digital footprints to evaluate their applicants. Thus, job seekers prefer to create a social media presence that would be viewed positively from a professional point of view.
In some professions, maintaining a digital footprint is essential. In the age of technology, people will search the internet for specific doctors and their reviews. Half of the search results for a particular physician link to third-party rating websites. For this reason, prospective patients may unknowingly choose their physicians based on their digital footprint in addition to online reviews. Furthermore, a generation relies on social media for livelihood as influencers by using their digital footprint. These influencers have dedicated fan bases that may be eager to follow recommendations. As a result, marketers pay influencers to promote their products among their followers, since this medium may yield better returns than traditional advertising. Consequently, one's career may be reliant on their digital footprint.
Effect on children
Generation Alpha will be the first generation that won't exist without the technology era. As such, children's digital footprint is becoming more significant than ever before and their consequences may be unclear. Due to parenting enthusiasm, an increasing amount of parents will create social media accounts for their children at a young age, sometimes even before they are born. Parents may post up to 13,000 photos of a child on social media in their celebratory state before their teen years of everyday life or birthday celebrations. Furthermore, these children are predicted to post 70,000 times online on their own by 18. The advent of posting on social media creates many opportunities to gather data from minors. Since an identity's basic components contain a name, birth date, and address, these children are susceptible to identity theft. While parents may assume that privacy settings may prevent children's photos and data from being exposed, they also have to trust that their followers will not be compromised. Outsiders may take the images to pose as these children's parents or post the content publicly. For example, during the Facebook-Cambridge Analytica data scandal, friends of friends leaked data to data miners. Due presence of children on social media, their privacy may be at risk.
Effects on teens
Some professionals argue that young people entering the workforce should consider the effect of their digital footprint on their marketability and professionalism. Having a digital footprint may be dangerous for students, as college admissions staff and potential employers may decide to research into prospective student's and employee's online profiles, leading to an enormous impact on the students' futures. Teens will be set up for more success if they consider the kind of impact they are making and how it can affect their future. Instead, someone who acts apathetic towards the impression they are making online will struggle if they one day choose to attend college or enter into the workforce. Teens who plan to receive a higher education will have their digital footprint reviewed and assessed as a part of the application process. Besides, if the teens that have the intention of receiving a higher education are planning to do so with financial help and scholarships, then they need to consider that their digital footprint will be evaluated in the application process to get scholarships.
- "Dictionary.com: digital footprint". Retrieved 13 April 2017.
- "What is Digital Footprint? Webopedia. Definition". www.webopedia.com. Retrieved 13 April 2017.
- "Digital Footprint Definition". techterms.com. Retrieved 13 April 2017.
- "What is digital footprint? - Definition from WhatIs.com". WhatIs.com. Retrieved 13 April 2017.
- Madden, Fox, Smith & Vitak, Mary, Susannah, Aaron, Jessica (2007). "Digital Footprints". Pew Research Center.CS1 maint: multiple names: authors list (link)
- COLLINS, KATIE. "Monitoring digital footprints to prevent reputation damage and cyber attacks". Archived from the original on 12 August 2013. Retrieved 8 August 2013.
- "Owning Your Privacy by Managing Your Digital Footprint". Stay Safe Online. Retrieved 2020-11-08.
- Gardham, Duncan (26 January 2009). "Threat to privacy under data law, campaigners warn". Telegraph. London. Archived from the original on 4 February 2009. Retrieved 22 March 2014.
- Sprenger, Polly (26 January 1999). "Sun on Privacy: 'Get Over It'". Wired. Retrieved 22 March 2014.
- "Digital Footprint: Part 2 | Hueya: Securing Your Digital World". Hueya - Online Privacy Software. 2016-01-10. Retrieved 2020-10-10.
- 2015nets_adminusr (2019-07-22). "What is a digital footprint?". Netsafe – Providing free online safety advice in New Zealand. Retrieved 2020-10-10.
- Dalgord, Chelsea (2012-12-07). "Cybervetting: The Hiring Process in the Digital Age". Archived from the original on 2013-12-02. Retrieved 2013-08-23.
- Diab, Robert (1 March 2018). "Protecting the Right to Privacy in Digital Devices: Reasonable Search on Arrest and at the Border". University of New Brunswick Law Journal. 69: 96–125. SSRN 3393119.
- Wyner, Gordon. "Digital Footprints Abound". American Marketing Association. Archived from the original on 5 October 2016. Retrieved 3 October 2016.
- "What a digital footprint? - Knowledgebase - ICTEA". www.ictea.com. Retrieved 2020-10-10.
- Ball, Albert; Ranim, Michelle; Levy, Yair (January 1, 2015). Examining users’ personal information sharing awareness, habits, and practices in social networking sites and e-learning systems. Online Journal of Applied Knowledge Management. pp185
- Kosinski, M.; Stillwell, D.; Graepel, T. (11 March 2013). "Private traits and attributes are predictable from digital records of human behavior". Proceedings of the National Academy of Sciences. 110 (15): 5802–5805. Bibcode:2013PNAS..110.5802K. doi:10.1073/pnas.1218772110. PMC 3625324. PMID 23479631.
- Latour, Bruno (2007). "Beware, your imagination leaves digital traces" (PDF). Column for Times Higher Education Supplement. 6 (4): 129–131.
- O’Hara, Kieron; Tuffield, Mischa M.; Shadbolt, Nigel (20 February 2009). "Lifelogging: Privacy and empowerment with memories for life". Identity in the Information Society. 1 (1): 155–172. doi:10.1007/s12394-009-0008-4.
- Singer, Natasha (19 June 2013). "Ways to Make Your Online Tracks Harder to Follow". Bits Blog.
- Lobosco, Katie (26 August 2013). "Facebook friends could change your credit score". CNNMoney.
- Sennett, Richard; Sassen, Saskia (21 August 2007). "Richard Sennett and Saskia Sassen: Guantanamo in Germany". The Guardian.
- "OfficeMax Apologizes After Sending Grieving Father Terrible Letter". HuffPost. 20 January 2014.
- "Border refusal for depressed paraplegic shows Canada-U.S. security co-operation has gone too far". The Star. Toronto. 29 November 2013. Retrieved December 20, 2013.
- Broughton, A., Foley, B., Ledermaier, S., & Cox, A. (2013). The use of social media in the recruitment process. Institute for Employment Studies, Brighton.
- Berkelaar, Brenda L. (2014-07-18). "Cybervetting, Online Information, and Personnel Selection: New Transparency Expectations and the Emergence of a Digital Social Contract". Management Communication Quarterly. 28 (4): 479–506. doi:10.1177/0893318914541966. ISSN 0893-3189. S2CID 146264434.
- Van Iddekinge, Chad H.; Lanivich, Stephen E.; Roth, Philip L.; Junco, Elliott (2016-12-16). "Social Media for Selection? Validity and Adverse Impact Potential of a Facebook-Based Assessment". Journal of Management. 42 (7): 1811–1835. doi:10.1177/0149206313515524. ISSN 0149-2063. S2CID 143067929.
- Bohnert, Daniel; Ross, William H. (2010-06-17). "The Influence of Social Networking Web Sites on the Evaluation of Job Candidates". Cyberpsychology, Behavior, and Social Networking. 13 (3): 341–347. doi:10.1089/cyber.2009.0193. ISSN 2152-2715. PMID 20557256.
- Lambiotte, Renaud; Kosinski, Michal (December 2014). "Tracking the Digital Footprints of Personality". Proceedings of the IEEE. 102 (12): 1934–1939. doi:10.1109/JPROC.2014.2359054. ISSN 0018-9219. S2CID 11085292.
- "SHRM Survey Findings: Using Social Media for Talent Acquisition - Recruitment and Screening" (PDF). Society for Human Resource Management. 2016-01-07.
- Van Iddekinge, Chad H.; Lanivich, Stephen E.; Roth, Philip L.; Junco, Elliott (2016-11-16). "Social Media for Selection? Validity and Adverse Impact Potential of a Facebook-Based Assessment". Journal of Management. 42 (7): 1811–1835. doi:10.1177/0149206313515524. ISSN 0149-2063. S2CID 143067929.
- Kim, Christopher; Gupta, Raghav; Shah, Aakash; Madill, Evan; Prabhu, Arpan V.; Agarwal, Nitin (May 2018). "Digital Footprint of Neurological Surgeons". World Neurosurgery. 113: e172–e178. doi:10.1016/j.wneu.2018.01.210. PMID 29427816.
- Gretzel, Ulrike (2017-07-20), "Influencer marketing in travel and tourism", Advances in Social Media for Travel, Tourism and Hospitality, Routledge, pp. 147–156, doi:10.4324/9781315565736-13, ISBN 978-1-315-56573-6, retrieved 2020-11-03
- Twenge, Jean M.; Martin, Gabrielle N.; Spitzberg, Brian H. (2019-10-01). "Trends in U.S. Adolescents' media use, 1976–2016: The rise of digital media, the decline of TV, and the (near) demise of print". Psychology of Popular Media Culture. 8 (4): 329–345. doi:10.1037/ppm0000203. ISSN 2160-4142. S2CID 158283705.
- "Digital Birth: Welcome to the Online World". www.businesswire.com. 2010-10-06. Retrieved 2020-11-03.
- "Children's Commissioner's report calls on internet giants and toy manufacturers to be transparent about collection of children's data". Children's Commissioner for England. 2018-11-08. Retrieved 2020-11-03.
- "Internet safety for children | Keeping kids safe online | Barclays". www.barclays.co.uk. Retrieved 2020-11-03.
- Steinberg, S. B. (2016). Sharenting: Children's privacy in the age of social media. Emory LJ, 66, 839.
- "10 Things Your Students Should Know About Their Digital Footprints". TeachHUB.
- Bates, Cathy (October 29, 2018). "Take Charge of Your Online Reputation". Educause.
- Van Ouytsel, Joris; Walrave, Michel; Ponnet, Koen (5 June 2014). "How Schools Can Help Their Students to Strengthen Their Online Reputations". The Clearing House: A Journal of Educational Strategies, Issues and Ideas. 87 (4): 180–185. doi:10.1080/00098655.2014.909380. S2CID 143484401.
- "Harmful Digital Footprint Impacts That Parents Should Know About". www.fosi.org. Retrieved 2019-04-04.