DIRECTORY

  • Alerts
  • APTs
  • Blog
  • Books
  • Certifications
  • Cheat Sheets
  • Courses
  • Cyber Briefing
  • CyberDecoded
  • CyberReview
  • CyberStory
  • CyberTips
  • Definitions
  • Domains
  • Entertainment
  • FAQ
  • Frameworks
  • Hardware Tools
  • Incidents
  • Malware
  • News
  • Papers
  • Podcasts
  • Quotes
  • Reports
  • Tools
  • Threats
  • Tutorials
No Result
View All Result
  • Login
  • Register
  • Cyber Citizens
  • Cyber Professionals
  • Institutions
CyberMaterial
Get Help
  • Cyber Citizens
  • Cyber Professionals
  • Institutions
CyberMaterial
No Result
View All Result
Get Help
CyberMaterial
Home Document

Post no photos, leave no trace: Children’s digital footprint management strategies

Griffith University

Reading Time: 1 min read
in Document, Paper

Abstract

Given that today’s children are prolific users of the internet, concern has been raised about the future impact of the digital footprints they are currently generating. Here we report on the Best Footprint Forward project which utilised focus groups to investigate the digital footprint awareness of thirty-three children (ranging in age from 10 to 12 years old) from three primary schools in regional Australia.

The children were very aware of their digital footprints and cyber safety but had little awareness of the positive potential of digital footprints. Instead they exercised their agency through the use of strategies to minimise their digital footprint. We offer an alternative perspective to the dominant discourse that insists that a digital footprint is primarily a liability and seek to counter the positioning of children as naïve, passive consumers of digital culture.

We conclude that 10-12 years old is an appropriate age to begin to educate for positive digital footprint curation as this would build on children’s demonstrated knowledge of cyber safety and supplement their existing digital footprint management strategies with beneficial alternatives.

 

GET REPORT

Tags: AustraliaBest Footprint Forward projectChildren’s digital footprint management strategiesDigital FootprintDigital Footprint DocumentsDigital Footprint PapersDocumentsGriffith UniversityKidsKids DocumentsKids PapersLeave no tracePapersPost no photosQueensland
ADVERTISEMENT

Related Posts

National cyber threat assessment 2023–2024

National cyber threat assessment 2023–2024

March 21, 2023
2023 SonicWall Cyber Threat Report

2023 SonicWall Cyber Threat Report

March 21, 2023
Sophos 2023 Threat Report

Sophos 2023 Threat Report

March 21, 2023
CrowdStrike 2023 Global Threat Report

CrowdStrike 2023 Global Threat Report

March 21, 2023

More Articles

Simplifying DevOps – Podcast

March 10, 2022
Incidents

LA Man Indicted For Influencer Fraud

February 27, 2023

Children’s Interactive Cybersecurity Activity Kit

May 12, 2021
Incidents

Large DDoS attack shuts down KT’s nationwide network

October 25, 2021
Alerts

Experts warn of ransomware attacks against government organizations of small states

May 31, 2022
Alerts

Urgent Patch Available For SMA 100 Series 10.X Firmware Zero-Day Vulnerability

February 11, 2021
Alerts

UK Data Watchdog Issues Warning on Emotional Detection Tech

October 26, 2022
Document

A Cybersecurity Field Guide for Executives

May 14, 2021
Load More

Security through data

Cybersecurity Domains

  • API Security
  • Business Continuity
  • Career Development
  • Compliance
  • Cryptography
  • HSM
  • KPIs / KRIs
  • Penetration Testing
  • Shift Left
  • Vulnerability Scan

Emerging Technologies

  • 5G
  • Artificial Intelligence
  • Blockchain
  • Cryptocurrency
  • Deepfake
  • E-Commerce
  • Healthcare
  • IoT
  • Quantum Computing

Frameworks

  • CIS Controls
  • CCPA
  • GDPR
  • NIST
  • 23 NYCRR 500
  • HIPAA

Repository

  • Books
  • Certifications
  • Definitions
  • Documents
  • Entertainment
  • Quotes
  • Reports

Threats

  • APTs
  • DDoS
  • Insider Threat
  • Malware
  • Phishing
  • Ransomware
  • Social Engineering

© 2023 | CyberMaterial | All rights reserved.

World’s #1 Cybersecurity Repository

  • About
  • Legal and Privacy Policy
  • Site Map
No Result
View All Result
  • Audience
    • Cyber Citizens
    • Cyber Professionals
    • Institutions
  • Highlights
    • Blog
    • CyberDecoded
    • Cyber Review
    • CyberStory
    • CyberTips
  • Cyber Risks
    • Alerts
    • Attackers
    • Domains
    • Incidents
    • Threats
  • Opportunities
    • Events
    • Jobs
  • Repository
    • Books
    • Certifications
    • Cheat Sheets
    • Courses
    • Definitions
    • Frameworks
    • Games
    • Hardware Tools
    • Memes
    • Movies
    • Papers
    • Podcasts
    • Quotes
    • Reports
  • Report Cyber Incident
  • GET HELP

Subscribe to our newsletter

© 2022 Cybermaterial - Security Through Data .

Welcome Back!

Sign In with Google
Sign In with Linked In
OR

Forgotten Password? Sign Up

Create New Account!

Sign Up with Google
Sign Up with Linked In
OR

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In

Add New Playlist

This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.