SlideShare a Scribd company logo
1 of 57
Privacy vs. Safety
Acceptance of Tracking
Technology
www.telaeris.com
Introduction
Telaeris and Point Loma Nazarene
University MBA students teamed up to
conduct a research study.
This study sought to evaluate how people
weigh the balance between the privacy
concerns and potential benefits of using
RFID technology to track people.
www.telaeris.com
Research Objectives
Assess stakeholder perceived benefits and concerns with
respect to selected RFID people tracking applications.
Measure respondent assessments of various methods of
allaying concerns.
Determine whether attitudes vary significantly by key
demographic groups.
www.telaeris.com
Methodology
A Qualtrics-hosted web survey was designed with
substantial inputs from Telaeris management.
A solicitation email with a link to the survey was sent out to
a Telaeris-provided email list and the survey was also
posted to LinkedIn to allow for participation by the
followers of the Telaeris CEO.
All data was processed and analyzed using SPSS.
www.telaeris.com
Limitations
Small sample size (n = 140) due to limited email lists and
social media reach.
Sample frame was limited to the Telaeris, Inc. contact list
and it may not draw on audiences who aren’t security
related yet still have concerns.
www.telaeris.com
Demographics
of Respondents
www.telaeris.com
Respondents Working in the
Security Industry
• Majority of respondents
do work for a company
that provides services or
solutions that use RFID
• 42% work in industries
outside of security
solutions
www.telaeris.com
Industries Respondents Work In
www.telaeris.com
Number of Employees at
Respondent's Companies
www.telaeris.com
Approximate Respondent
Position in Company
www.telaeris.com
Age of Respondents
www.telaeris.com
Respondents’ Ethnicity
www.telaeris.com
Highest Degree Achieved
www.telaeris.com
Children Under the Age of 18 at Home?
www.telaeris.com
Knowledge of
RFID Technology
www.telaeris.com
SURVEY QUESTIONS
KNOWLEDGE
OF RFID:
• TECHNOLOGY
• CAPABILITIES
• STANDARDS
1. How knowledgeable
would you say you are
about RFID?
(Not at all - Extremely)
2. Please list RFID:
• Applications
• Benefits
• Concerns
www.telaeris.com
Average Knowledge of RFID
www.telaeris.com
Verbatims: Applications of RFID
www.telaeris.com
Verbatims: Benefits of RFID
www.telaeris.com
Verbatims: Concerns of RFID
www.telaeris.com
SURVEY QUESTIONS
Pre-Image
Vs.
Post-Image
Knowledge
How often do you
think you have
used a product or
item containing an
RFID chip in the
last month?
www.telaeris.com
RFID Technology Use in the
Last Month
www.telaeris.com
IMPORTANCE OF
RFID CONCERNS
www.telaeris.com
Concerns:
# 1: Management Monitoring
#2: Hackers Skimming Data
#3: Government Tracking
#4: Radiation Risk
#5: Implantable RFID Chips
SURVEY QUESTIONS
1. Which concern with
RFID was most
important?
2. What is the most
effective solution for
each concern?
www.telaeris.com
Average Level Of Importance
for RFID Concerns
www.telaeris.com
SURVEY QUESTIONS
Management
Monitoring Concern #1:
Tracking people by RFID
could be used by
management to
monitor where
employees are and
what they are doing.
www.telaeris.com
Concern Level for Management
Monitoring
Mean = 3.11
Moderate level of concern.
No significant difference in level of concern by sub-group.
www.telaeris.com
Effective Ways to
Address Management Monitoring
Provide educational resources as to how the technology
avoids this problem.
RANK RESPONSE MEAN RANK
1 Educational Resources 2.29
2 Case Histories 2.37
3 Employee Opt-Out Option 2.81
4 Company Policies 3.16
5 Other 4.37
www.telaeris.com
Verbatim: Other Ways to
Address Manager Monitoring
www.telaeris.com
SURVEY QUESTIONS
Hackers
Skimming Data Concern #2:
Hackers could skim
individual’s private
data from RFID
cards and tags.
www.telaeris.com
Concern Level for Hackers
Skimming Private Data
Mean = 3.86,
High level of concern for hackers skimming data.
Many significant differences in sub-group perceptions.
www.telaeris.com
Concerns about Hackers
Skimming Data by Sub-Groups
• Respondents from companies involved with RFID technology
applications were significantly less concerned about hacking than other
respondents.
• Respondents from small companies (1-50 employees) were significantly
less concerned than respondents from large companies (500+
employees).
• Younger respondents (18-30) were significantly less concerned than
older employees (40-65).
• Respondents with less than a Bachelor’s degree were significantly less
concerned than respondents with a Bachelor’s or advanced degrees.
www.telaeris.com
Effective Ways to Address
Hackers Skimming Data
Provide educational resources as to how the technology
avoids this problem.
RANK RESPONSE MEAN
Rank
1 Educational Resources 1.99
2 Case Histories 2.70
3 Employee Opt-Out Option 2.70
4 Company Policies 3.09
5 Other 4.54
www.telaeris.com
Verbatim: Other Ways to
Address Hackers Skimming Data
The industry needs to support the equivalent of CERT
(Community Emergency Response Team) to fix issues
Do not put private data on the card
Show the data up front so they are informed & not
speculating
Provide two factor authentication required to read the tags.
www.telaeris.com
Government
Tracking
SURVEY QUESTIONS
Concern #3:
RFID is a tool that
the government
could use to track
people.
www.telaeris.com
Concern about
Government Tracking
Mean = 3.1
Moderate Concern
Younger respondents (18-30) are significantly less concerned than older respondents
(31-45; 45-65).
www.telaeris.com
Ways to Address Government
Misuse (Verbatims)
www.telaeris.com
SURVEY QUESTIONS
Radiation Risk Concern #4:
RFID tags and
readers could
pose a radiation
risk.
www.telaeris.com
Concern Level for
Radiation Risk
Mean = 1.81
Lowest Concern overall
Concern levels did vary by sub-groups
www.telaeris.com
Concern Level
Significantly Lower for:
RFID involved respondents
Caucasians (vs non-caucasians)
Respondents from large companies (vs. mid sized
companies)
Respondents with more than Bachelor’s degree
www.telaeris.com
Ways to Address Radiation
Concern (Verbatims)
www.telaeris.com
SURVEY QUESTIONS
Implantable
RFID Chips Concern #5:
Implantable RFID
chips could be used
as universal
identification for
everything from
security to payment.
www.telaeris.com
Concern Level
for Implantable RFID Chips
Mean = 3.26
Moderate concern (2nd highest).
Non-Caucasians are significantly more concerned than Caucasians about this issue.
www.telaeris.com
Ways to Address an Implant
Concern (Verbatims)
www.telaeris.com
Case Studies
1. Tracking School Children with RFID Tags
2. Worker Tracking with RFID tags
www.telaeris.com
Case 1: School Children
Privacy vs. Concerns
Mean = 4.64; Non-Caucasians (mean 3.53) significantly more concerned
about the privacy issues than Caucasians (mean 5.07).
Support = 71% , Don’t Support = 29%
www.telaeris.com
Expected Parental Reactions
(Verbatims)
www.telaeris.com
Case 2: Employee Tracking
Privacy vs. Concerns
Mean = 4.42. Non-Caucasians (Mean = 3.71) significantly more concerned
about the privacy issues than Caucasians (Mean 4.76).
Respondents from small firms (50-200) are more positive about the benefits
than respondents from larger companies.
www.telaeris.com
Expected Employee Reactions
(Verbatims)
Support = 46% , Don’t Support = 54%
www.telaeris.com
PRIVACY CONCERNS
VS. BENEFITS
SECURITY
SAFETY
EFFICIENCY
CONVENIENCE
www.telaeris.com
Security, Safety, Efficiency,
Convenience
www.telaeris.com
Benefit vs Privacy
Tradeoffs by Demographic Groups
Respondents in RFID related services rate the security benefit of
RFID significantly higher than respondents who work for non-RFID
related firms.
Respondents in larger companies (e.g., > 500 employees) are
significantly less impressed by the safety benefit than respondents
from smaller companies (e.g., 50 employees or less)
Respondents in mid-sized companies (e.g., 50-200; 201-500
employees) are significantly less impressed by the convenience
benefit than respondents from smaller companies (e.g., 50 employees
or less)
www.telaeris.com
CONCLUSIONS &
RECOMMENDATIONS
www.telaeris.com
Conclusions
Hackers skimming data is the largest concern of
respondents and must be addressed by security
solutions companies.
This is less of an issue for respondents who come from the industry, are younger,
are from smaller companies, or have less education
Radiation risks are not a significant concern for
this sample.
www.telaeris.com
Conclusions cont’d
The most highly ranked interventions are education,
case histories, and employee opt out options.
• Non-Caucasians are significantly more concerned
about both the student- and the employee-tracking
application cases than Caucasians.
• Respondents are generally strongly positive
towards the security, safety, and convenience
benefits of RFID but are more neutral about the
efficiency benefit.
www.telaeris.com
Recommendations
The survey worked well. The main limitation for the
study were:
1. the limited number of respondents
2. the limited sample frame from which
respondents were drawn, i.e., contacts and
social media followers of Telaeris.
www.telaeris.com
Recommendations Cont’d
We recommend:
• Pursuing other sample frames such as the
Security Industry Association, and other, non-
security related associations.
• Continuing the collection of responses so as to
“increase the power of the test” of differences
among demographic groups concerning RFID
benefits and concerns.
• In particular, the attitudinal differences we
uncovered based on ethnicity should be
explored further.

More Related Content

What's hot

Prof m01-2013 global information security workforce study - final
Prof m01-2013 global information security workforce study - finalProf m01-2013 global information security workforce study - final
Prof m01-2013 global information security workforce study - final
SelectedPresentations
 
Mimecast Threat Report
Mimecast Threat ReportMimecast Threat Report
Mimecast Threat Report
Chris Hewitt
 
An Improved Method for Preventing Data Leakage in an Organization
An Improved Method for Preventing Data Leakage in an OrganizationAn Improved Method for Preventing Data Leakage in an Organization
An Improved Method for Preventing Data Leakage in an Organization
IJERA Editor
 
State of endpoint risk v3
State of endpoint risk v3State of endpoint risk v3
State of endpoint risk v3
Lumension
 
State of endpoint risk v3
State of endpoint risk v3State of endpoint risk v3
State of endpoint risk v3
Lumension
 
InformationSecurity_11141
InformationSecurity_11141InformationSecurity_11141
InformationSecurity_11141
sraina2
 

What's hot (15)

Prof m01-2013 global information security workforce study - final
Prof m01-2013 global information security workforce study - finalProf m01-2013 global information security workforce study - final
Prof m01-2013 global information security workforce study - final
 
Software piracy in Bangladesh
Software piracy in BangladeshSoftware piracy in Bangladesh
Software piracy in Bangladesh
 
Mimecast Threat Report
Mimecast Threat ReportMimecast Threat Report
Mimecast Threat Report
 
An Improved Method for Preventing Data Leakage in an Organization
An Improved Method for Preventing Data Leakage in an OrganizationAn Improved Method for Preventing Data Leakage in an Organization
An Improved Method for Preventing Data Leakage in an Organization
 
The Shifting State of Endpoint Risk: Key Strategies to Implement in 2011
The Shifting State of Endpoint Risk: Key Strategies to Implement in 2011The Shifting State of Endpoint Risk: Key Strategies to Implement in 2011
The Shifting State of Endpoint Risk: Key Strategies to Implement in 2011
 
State of endpoint risk v3
State of endpoint risk v3State of endpoint risk v3
State of endpoint risk v3
 
Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party Cyb...
Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party  Cyb...Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party  Cyb...
Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party Cyb...
 
The State of IT Security for 2019
The State of IT Security for 2019The State of IT Security for 2019
The State of IT Security for 2019
 
State of endpoint risk v3
State of endpoint risk v3State of endpoint risk v3
State of endpoint risk v3
 
LinkedIn Information Security Talent Pool Research - Black Hat CISO Summit 20...
LinkedIn Information Security Talent Pool Research - Black Hat CISO Summit 20...LinkedIn Information Security Talent Pool Research - Black Hat CISO Summit 20...
LinkedIn Information Security Talent Pool Research - Black Hat CISO Summit 20...
 
Best practices for_implementing_security_awareness_training
Best practices for_implementing_security_awareness_trainingBest practices for_implementing_security_awareness_training
Best practices for_implementing_security_awareness_training
 
InformationSecurity_11141
InformationSecurity_11141InformationSecurity_11141
InformationSecurity_11141
 
Jonathan raymond 2010 rotman telus - atlseccon2011
Jonathan raymond   2010 rotman telus - atlseccon2011Jonathan raymond   2010 rotman telus - atlseccon2011
Jonathan raymond 2010 rotman telus - atlseccon2011
 
Cognitive automation with machine learning in cyber security
Cognitive automation with machine learning in cyber securityCognitive automation with machine learning in cyber security
Cognitive automation with machine learning in cyber security
 
Corporate Cybersecurity: A Serious Game
Corporate Cybersecurity: A Serious GameCorporate Cybersecurity: A Serious Game
Corporate Cybersecurity: A Serious Game
 

Similar to RFID Privacy & Safety Concerns

2015 Scalar Security Study Executive Summary
2015 Scalar Security Study Executive Summary2015 Scalar Security Study Executive Summary
2015 Scalar Security Study Executive Summary
patmisasi
 

Similar to RFID Privacy & Safety Concerns (20)

Cybersecurity: Perceptions & Practices
Cybersecurity: Perceptions & PracticesCybersecurity: Perceptions & Practices
Cybersecurity: Perceptions & Practices
 
2015 Scalar Security Study Executive Summary
2015 Scalar Security Study Executive Summary2015 Scalar Security Study Executive Summary
2015 Scalar Security Study Executive Summary
 
How Well is Your Organization Protecting its Real Crown Jewels - Identities?
How Well is Your Organization Protecting its Real Crown Jewels - Identities?How Well is Your Organization Protecting its Real Crown Jewels - Identities?
How Well is Your Organization Protecting its Real Crown Jewels - Identities?
 
The Stand Against Cyber Criminals Lawyers, Take The Stand Against Cyber Crimi...
The Stand Against Cyber Criminals Lawyers, Take The Stand Against Cyber Crimi...The Stand Against Cyber Criminals Lawyers, Take The Stand Against Cyber Crimi...
The Stand Against Cyber Criminals Lawyers, Take The Stand Against Cyber Crimi...
 
Sans survey - maturing - specializing-incident-response-capabilities-needed-p...
Sans survey - maturing - specializing-incident-response-capabilities-needed-p...Sans survey - maturing - specializing-incident-response-capabilities-needed-p...
Sans survey - maturing - specializing-incident-response-capabilities-needed-p...
 
Cybersecurity - Sam Maccherola
Cybersecurity - Sam MaccherolaCybersecurity - Sam Maccherola
Cybersecurity - Sam Maccherola
 
Riverside Healthcare Accelerate Tech 2016 presentation
Riverside Healthcare Accelerate Tech 2016 presentationRiverside Healthcare Accelerate Tech 2016 presentation
Riverside Healthcare Accelerate Tech 2016 presentation
 
Cybersecurity and Healthcare - HIMSS 2018 Survey
Cybersecurity and Healthcare - HIMSS 2018 SurveyCybersecurity and Healthcare - HIMSS 2018 Survey
Cybersecurity and Healthcare - HIMSS 2018 Survey
 
Scalar security study2017_slideshare_rev[1]
Scalar security study2017_slideshare_rev[1]Scalar security study2017_slideshare_rev[1]
Scalar security study2017_slideshare_rev[1]
 
2017 Scalar Security Study Summary
2017 Scalar Security Study Summary2017 Scalar Security Study Summary
2017 Scalar Security Study Summary
 
Matt_Cyber Security Core Deck September 2016.pptx
Matt_Cyber Security Core Deck September 2016.pptxMatt_Cyber Security Core Deck September 2016.pptx
Matt_Cyber Security Core Deck September 2016.pptx
 
IT Security Risks Survey 2014
IT Security Risks Survey 2014IT Security Risks Survey 2014
IT Security Risks Survey 2014
 
The State of Threat Detection 2019
The State of Threat Detection 2019The State of Threat Detection 2019
The State of Threat Detection 2019
 
2016 Scalar Security Study Executive Summary
2016 Scalar Security Study Executive Summary2016 Scalar Security Study Executive Summary
2016 Scalar Security Study Executive Summary
 
5 Key Findings on Advanced Threats
5 Key Findings on Advanced Threats5 Key Findings on Advanced Threats
5 Key Findings on Advanced Threats
 
OSB50: Operational Security: State of the Union
OSB50: Operational Security: State of the UnionOSB50: Operational Security: State of the Union
OSB50: Operational Security: State of the Union
 
Cybersecurity risk assessments help organizations identify.pdf
Cybersecurity risk assessments help organizations identify.pdfCybersecurity risk assessments help organizations identify.pdf
Cybersecurity risk assessments help organizations identify.pdf
 
'HOW SECURE IS YOUR MARKETING TRANSFORMATION' RSA CMO Cybersecurity SURVEY
'HOW SECURE IS YOUR MARKETING TRANSFORMATION' RSA CMO Cybersecurity SURVEY'HOW SECURE IS YOUR MARKETING TRANSFORMATION' RSA CMO Cybersecurity SURVEY
'HOW SECURE IS YOUR MARKETING TRANSFORMATION' RSA CMO Cybersecurity SURVEY
 
Overcoming Hidden Risks in a Shared Security Model
Overcoming Hidden Risks in a Shared Security ModelOvercoming Hidden Risks in a Shared Security Model
Overcoming Hidden Risks in a Shared Security Model
 
Cyber Attack Survival
Cyber Attack SurvivalCyber Attack Survival
Cyber Attack Survival
 

Recently uploaded

CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
giselly40
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
Earley Information Science
 

Recently uploaded (20)

Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdf
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 

RFID Privacy & Safety Concerns

Editor's Notes

  1. Revise - Slide is confusing Cannot tell what its purpose is – is this a question page for the slides that proceeds this? What about question 2? Is this what the person answering thinks RFID is?
  2. Could someone select multiple options? The point of this slide is unclear
  3. Same concern, can people select multiple options?
  4. Same concern, can people select multiple options?
  5. Re format – font, formatting, etc.
  6. Delete
  7. What is Case Histories mentioned in Rank 2? Can’t understand what this slide is trying to say
  8. Have we not sent out the surveys to Security Industry Associated contacts?
  9. Have we not sent out the surveys to Security Industry Associated contacts?