Identification could include
- digital footprint
- cyber threats
- passwords (e.g., sharing, strength, multifactor authentication)
- social networking applications
- tracking through cookies
- smartphone/mobile devices
- computer privacy
- data security applications
- equipment theft
- hacking and viruses
- identity theft
and the way each affects security or freedom.