Malhotra, A., et.al. 2012. Studying User Footprints in Different Online Social Networks. 2012 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, pp. 1065 – 1070.
This article is merely concerned about gathering the digital footprints of the users online and to use that digital footprint to find out their membership on other social networking websites. This research is done by the team of intellects to show how the digital footprints of the users are created and can be used to trace them on the other websites. The results of their experiments give strength to their idea of digital footprint and how it can be used to know about the activities of a specific person on the internet. This article is a true depiction of the collection of digital footprints of the users over different social networking websites and how that data is used to find out their activities on other social networking websites.
The writers have put their best effort in proving their point by conducting experiments in order to disambiguate between two different profiles on the social websites. The experiment was done on world-famous networking sites: Twitter and LinkedIn, on 41,336 profiles from each. The work seems promising as it can be used to help security analysts as they are looking forward to developing this model so that it can be implemented on other social websites to increase the radius of the search for disambiguating different profiles. This information provides basic terminology that what technologies can be used to create the digital footprint and how those footprints can be interpreted. This article clearly depicts that there is need of more advancement in disambiguating profiles on social websites despite from Twitter and LinkedIn.
Wu, H. and Wang, W. 2013. Identifying the Daily Activity Pattern of Community Dynamics Using Digital Footprint. Computational and Information Sciences (ICCIS), 2013 Fifth International Conference on, pp. 782 – 785.
This research conducted by Hao Wu and Wenjun Wang in support of Tiajin Key Laboratory of Cognitive Computing and Application to find out the patterns of the people living in the community with the help of digital footprints. The idea was to find out if the digital footprints can be helpful in tracing the daily activities of the people and find out if the people share the same activities and routines if they live in the same community as it will help in urban management, road engineering and other aspects of sociology. This would be possible only if there is an appropriate way to get the digital footprint of the users in real time but not depending on the user to make a call or use this data package.
The theme of the research is inspiring but the method to get the digital footprints from the mobile devices of the users was not good because, the digital footprints were generated through GPS only when the use made calls, sent a message or used data package. On the basis of the stay of the people at a place for more than 30 minutes make it their stationary point or
staying point. This research needs to be extended by extracting digital footprint in a better way that does not require the activity of the user with their mobile phone. The researchers have shown a new dimension that how the digital footprints can be used to determine the activities of the human and then planning the urban community so that it could be exactly according to the requirements of the people.
Wren, C., Reily, D. and Berry, T. 2010. Footprinting. A methodology for Auditing ESystem Vulnerabilities. Developments in E-systems Engineering (DESE), 2010, pp. 263 – 267.
Footprinting can be used in a number of ways that can cause some serious threats to the organizations regarding the leakage of information the most precious asset of the organization. This research shows that how the access to the websites lets the users get the footprint relating to the access of IP of the websites that can be first vulnerability to the system for gaining access. This article is informative as it highlights the areas where the digital footprints can be alarming for organizations and the security personnel’s in the organization can be the one to create digital footprints allowing vulnerabilities to the systems.
The writers seem to have limited the number of technologies that can be used to create digital footprints but with concrete examples show that how easy is to gain some useful information regarding the IP addresses of the websites using tools that are available for free on the internet. The information is much relevance to the digital footprints and technologies as it is the upcoming threat to the organizations working online and has a little knowledge about vulnerabilities to their systems. The discussion in the article opens a new way to find out that how the digital footprints of the websites can be a way to vulnerabilities and how to eliminate those threats to the information systems of the organizations. There is lacking how some guides for the security professionals that they do create digital footprint can be used for breaching into the system.
Bodhani, A., 2012. Digital Footprint Setup. Engineering & Technology, 7(1), pp. 82 – 83.
Bodhani has explained that how our internet usage has become routine in our lives and as much we use the internet it adds more to the digital footprint letting others trace our activities online. She says that the hour’s people use to spend on the internet have increased and the trends are moving upwards. She emphasis on the use of the internet by stating the statistics that pre-born babies are also on the internet as 23% of the scan have already been uploaded on the internet giving the internet users a long history of more than 15-20 years that is alarming in many ways to the users. Another interesting point highlighted by Bodhani is that this increasing use of the internet is also increasing the memory taken by the digital footprints and the companies should also consider how to reduce the digital footprints and allocate that memory to another storage medium.
This article is quite general in sense and lacks some of the key information related to how the footprints are created however it represents the idea about the increasing number of digital footprints. The article can be a source of general idea about increasing number of internet users and contribute to the increasing digital footprint leaving traces of their activities on the internet and online forums. She has used real numbers for showing that how the social networking websites are contributing to the creation of digital footprints and giving an exposure to the world. This article gives an overview of how the users should be cautious while sharing their posts and pictures on social networking sites.
Hayes, D.R. and Qureshi, S. 2009. Implications of Microsoft Vista Operating System For Computer Forensic Investigations. Systems, Applications and Technology Conference, 2009. LISAT ’09. IEEE Long Island, pp. 1 – 9.
This paper is about the extraction of the data and information for forensic investigation by the investigators and how they are facing challenges with the introduction of a new operating system named Vista by Windows. This paper is not merely about the digital footprint on the internet, however, it is more related to the topic as the information is to be extracted offline from the log files that are generated when the users are making use of their computer systems. Considering the article, it provides details about the Vista Operating system and the introduction of the new file system that enhances the security for the user.
The article is more general in sense telling about the file locations of the log files that should be used for the extraction of information and why it is important. There is very less relevance with the core topic of a digital footprint, but in, many ways, it is connected as the information extracted will show the behaviors and activities of the users just like the digital footprint provides information about the users and their activities online. The digital footprints are created in the offline environment as well as the log files, however, the writers did not discuss.
Sutter, R.D., et.al. 2011. Establishing a Customer Relationship Management between the Broadcaster and the Digital User. Digital Content, Multimedia Technology and its Applications (IDCTA), 2011 7th International Conference on, pp.185 – 187.
The article is a true depiction of how the media broadcasters have felt the need to adopt the technology and make use of digital footprints. The emphasis in this article is how the digital footprint felt the need of knowing its viewers, and it was only possible with the second screen that is handheld devices rather than the first screen that are televisions. The digital footprints let the broadcaster to know their viewer with the introduction of a digital footprint in their broadcasting. The writers have demonstrated how the customer resource management was developed for the broadcaster. This article provides details related to the amalgamation of broadcasters and the digital users. Moreover, this practice has been transferred to first screens as well by introducing the digital services being deployed in handheld devices.
The information related to how the information will be gathered and incorporated into customer resource management department so that they can really know who are their customers and how they can improve in relevant departments. It was only possible with the digital footprints because the activity of the digital users automatically leave a footprint to extract the related information and what the customers are looking for. The writers demonstrated the information in well-mannered and decided to find out the footprint with the social demo-graphs. The writer does not clearly state that this would be achieved with the help of digital footprints, but it is obvious that when he is talking about the second device, then it is sure that he is considering the handheld devices using the internet to watch television using their login details.
Bodhani, A. 2012. Digital footprints step up. [Online]. IET. Available at : <http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=6175185> [Accessed 18 March 2015].
De Sutter, R. et.al. 2011. Establishing a customer relationship management between the broadcaster and the digital user. [Online]. IEEE. Available at: <http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=6016658> [Accessed 18 March 2015].
Wu, H. and Wang, W. 2013. Identifying the Daily Activity Pattern of Community Dynamics Using Digital Footprint. [Online]. IEEE. Available at: <http://ieeexplore.ieee.org/xpl/login.jsp?tp=&arnumber=6643126&url=http%3A%2F%2Fieeexplore.ieee.org%2Fiel7%2F6642226%2F6642914%2F06643126.pdf%3Farnumber%3D6643126> [Accessed 20 March 201].
Hayes, D.R. and Qureshi, S. 2009. Implications of Microsoft Vista operating system for computer forensics investigations. [Online]. IEEE. Available at: <http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=5031562> [Accessed 20 March 2015].
Malhotra, A. et.al. 2012. Studying User Footprints in Different Online Social Networks. [Online]. Available at: <http://ieeexplore.ieee.org/xpl/login.jsp?tp=&arnumber=6425617&url=http%3A%2F%2Fieeexplore.ieee.org%2Fxpls%2Fabs_all.jsp%3Farnumber%3D6425617> [Accessed 17 March 2015].
De Sutter, R. et.al. 2011. Establishing a customer relationship management between the broadcaster and the digital user. [Online]. Available at: < http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=6016658> [Accessed 20 March 2015].