SlideShare a Scribd company logo
1 of 12
Cyber Security Report: India
cybercivilians.com
sample size: 256
Ujjwal Singh
usingh@knox.edu
demographics expressing high concern
[7 or more on 1-10]
Age Gender Daily Usage
90
%
People over 50 tend to
show the least concern
for the privacy of
their data
80
%
60
%
Males tend to
care more about
the privacy of
their data
60
%
85
%
100
%
People who spend less
than 2 hours online
everyday tend to be
the least concerned
about the privacy of
their data
then we asked people what type of data was the most valuable to
them
For obvious reasons, financial data tends to be the most valuable to
people followed by their private conversations or chat logs.
when asked if they trust big corporations or not, we received
mixed answers
It can be seen that a fair
share of people aged 18-50
trust big corporations but
a sense of distrust can be
seen amongst seniors and
adolescents.
_________________________
According to a survey by
McKinsey & Company, the
level of trust can also
vary based on the service
provider. Financial and
healthcare services tend
to be widely trusted. This
motivated me to dig
deeper. [see next slide]
people who indicated high concern for their data earlier in the
survey were asked if they trust the Government/Big Corporations
with their data
Big Corporations Government
52% people who are highly
concerned about their data
trust Big Corporations
People who are highly concerned
about their data tend to be split
into 2 equal groups; one which
trusts the Government, and one
which doesn’t
then, we asked people if they read privacy policies of
apps/services after installing them
While the majority admitted to
reading privacy policies, a
staggering percentage of people
said they do NOT do so. So I dug
up further [see next slide]
since a large minority does not read privacy policies, we tried to
find out if they think before giving permissions to an app
The majority claimed that they
thought before granting
permissions to apps
then we tried to find demographics which are highly likely to think
before giving permissions to an app
Adolescents and people aged 35-50
are highly likely to think before
granting permissions to apps
when we asked people if they would trade their data for added
functionality we received the following results
Around 48% people were open to
trading their data for added
functionality while 39% would NOT do
so in any circumstance. A tiny group
agreed to sharing their data for
added functionality in all or most
circumstances.
people who showed high concern for their data were asked if
they’ve ever refused to share their phone number with the cashier
at a retail store
It is clear that people
who show high concern for
their data are more likely
to refuse to share their
contact information.
at the end we tried to find the demographic which is more likely to
refuse to share their phone number at the cashier in a retail store
It is clear that males are
more likely to refuse to
share their phone numbers
compared to their
counterparts
we did so by asking people if they’ve refused to share their
phone number with the cashier in the past
to summarise...
● People over 50 tend to show the least concern for their data
● In general males tend to care more about the privacy of their data
● People who spend very few hours on the internet (less than 2) tend to not
be concerned about their data online
● Financial data tends to be the most valuable data to people followed by
private conversations
● Seniors citizens and adolescents tend to have a lack of trust in big
corporations
● More than half the people who answered the survey claimed that they did
read privacy policies of the apps/software they use
● 78% people said that they think before granting permissions to apps
● 48% people would consider trading their data if it has added reward, that
is, more functionality.
● Males tend to be more likely to refuse to share their phone number with
the cashier at a retail store

More Related Content

What's hot

Your privacy online: Health information at serious risk of abuse, researchers...
Your privacy online: Health information at serious risk of abuse, researchers...Your privacy online: Health information at serious risk of abuse, researchers...
Your privacy online: Health information at serious risk of abuse, researchers...impartialnewsle68
 
US Data Privacy Laws
US Data Privacy LawsUS Data Privacy Laws
US Data Privacy LawsIDG Connect
 
Any Information Can be Valuable and Other Lessons from the JP Morgan Breach
Any Information Can be Valuable and Other Lessons from the JP Morgan BreachAny Information Can be Valuable and Other Lessons from the JP Morgan Breach
Any Information Can be Valuable and Other Lessons from the JP Morgan BreachCBIZ Risk & Advisory Services
 
Infographic: Symantec Healthcare IT Security Risk Management Study
Infographic: Symantec Healthcare IT Security Risk Management StudyInfographic: Symantec Healthcare IT Security Risk Management Study
Infographic: Symantec Healthcare IT Security Risk Management StudyCheapSSLsecurity
 
U.S. Data Privacy Report - Patchy preparation for GDPR shows U.S. businesses ...
U.S. Data Privacy Report - Patchy preparation for GDPR shows U.S. businesses ...U.S. Data Privacy Report - Patchy preparation for GDPR shows U.S. businesses ...
U.S. Data Privacy Report - Patchy preparation for GDPR shows U.S. businesses ...Ebiquity
 
Privacy Presentation for SOCAP-3
Privacy Presentation for SOCAP-3Privacy Presentation for SOCAP-3
Privacy Presentation for SOCAP-3Gary Kazmer
 
3 Instances Where E-mail Mining For Fraud Detection Could've Prevented Financ...
3 Instances Where E-mail Mining For Fraud Detection Could've Prevented Financ...3 Instances Where E-mail Mining For Fraud Detection Could've Prevented Financ...
3 Instances Where E-mail Mining For Fraud Detection Could've Prevented Financ...databahn
 
Can domain intelligence help healthcare service providers combat data breaches
Can domain intelligence help healthcare service providers combat data breachesCan domain intelligence help healthcare service providers combat data breaches
Can domain intelligence help healthcare service providers combat data breachesWhoisXML API
 
Threats to online security and data
Threats to online security and dataThreats to online security and data
Threats to online security and dataAnthonywheeler
 
2014 Data Breach Industry Forecast
2014 Data Breach Industry Forecast2014 Data Breach Industry Forecast
2014 Data Breach Industry Forecast- Mark - Fullbright
 
Its 2018... Should Pharma Still be Scared of Digital?
Its 2018... Should Pharma Still be Scared of Digital?Its 2018... Should Pharma Still be Scared of Digital?
Its 2018... Should Pharma Still be Scared of Digital?Gary Monk
 
Failure to Execute a HIPAA Business Associate Agreement Results in $1.55 Mill...
Failure to Execute a HIPAA Business Associate Agreement Results in $1.55 Mill...Failure to Execute a HIPAA Business Associate Agreement Results in $1.55 Mill...
Failure to Execute a HIPAA Business Associate Agreement Results in $1.55 Mill...Brian Dickerson
 
Managing Risk: Legal Issues for Affiliate Marketers & Affiliate Marketing Man...
Managing Risk: Legal Issues for Affiliate Marketers & Affiliate Marketing Man...Managing Risk: Legal Issues for Affiliate Marketers & Affiliate Marketing Man...
Managing Risk: Legal Issues for Affiliate Marketers & Affiliate Marketing Man...Adler Law Group
 
Using Social Media in the Age of ACA and HIPAA Regulations - BDI 7/24 Patient...
Using Social Media in the Age of ACA and HIPAA Regulations - BDI 7/24 Patient...Using Social Media in the Age of ACA and HIPAA Regulations - BDI 7/24 Patient...
Using Social Media in the Age of ACA and HIPAA Regulations - BDI 7/24 Patient...Business Development Institute
 
wp-analyzing-breaches-by-industry
wp-analyzing-breaches-by-industrywp-analyzing-breaches-by-industry
wp-analyzing-breaches-by-industryNumaan Huq
 

What's hot (19)

Your privacy online: Health information at serious risk of abuse, researchers...
Your privacy online: Health information at serious risk of abuse, researchers...Your privacy online: Health information at serious risk of abuse, researchers...
Your privacy online: Health information at serious risk of abuse, researchers...
 
US Data Privacy Laws
US Data Privacy LawsUS Data Privacy Laws
US Data Privacy Laws
 
Any Information Can be Valuable and Other Lessons from the JP Morgan Breach
Any Information Can be Valuable and Other Lessons from the JP Morgan BreachAny Information Can be Valuable and Other Lessons from the JP Morgan Breach
Any Information Can be Valuable and Other Lessons from the JP Morgan Breach
 
Infographic: Symantec Healthcare IT Security Risk Management Study
Infographic: Symantec Healthcare IT Security Risk Management StudyInfographic: Symantec Healthcare IT Security Risk Management Study
Infographic: Symantec Healthcare IT Security Risk Management Study
 
U.S. Data Privacy Report - Patchy preparation for GDPR shows U.S. businesses ...
U.S. Data Privacy Report - Patchy preparation for GDPR shows U.S. businesses ...U.S. Data Privacy Report - Patchy preparation for GDPR shows U.S. businesses ...
U.S. Data Privacy Report - Patchy preparation for GDPR shows U.S. businesses ...
 
Cyber Facts and Prevention Presentation Gianino
Cyber Facts and Prevention Presentation GianinoCyber Facts and Prevention Presentation Gianino
Cyber Facts and Prevention Presentation Gianino
 
(Webinar Slides) How to Ethically Use Technology in Your Practice
(Webinar Slides) How to Ethically Use Technology in Your Practice(Webinar Slides) How to Ethically Use Technology in Your Practice
(Webinar Slides) How to Ethically Use Technology in Your Practice
 
Privacy Presentation for SOCAP-3
Privacy Presentation for SOCAP-3Privacy Presentation for SOCAP-3
Privacy Presentation for SOCAP-3
 
Party Disagreements
Party DisagreementsParty Disagreements
Party Disagreements
 
3 Instances Where E-mail Mining For Fraud Detection Could've Prevented Financ...
3 Instances Where E-mail Mining For Fraud Detection Could've Prevented Financ...3 Instances Where E-mail Mining For Fraud Detection Could've Prevented Financ...
3 Instances Where E-mail Mining For Fraud Detection Could've Prevented Financ...
 
Can domain intelligence help healthcare service providers combat data breaches
Can domain intelligence help healthcare service providers combat data breachesCan domain intelligence help healthcare service providers combat data breaches
Can domain intelligence help healthcare service providers combat data breaches
 
Threats to online security and data
Threats to online security and dataThreats to online security and data
Threats to online security and data
 
Online Scams and Frauds
Online Scams and FraudsOnline Scams and Frauds
Online Scams and Frauds
 
2014 Data Breach Industry Forecast
2014 Data Breach Industry Forecast2014 Data Breach Industry Forecast
2014 Data Breach Industry Forecast
 
Its 2018... Should Pharma Still be Scared of Digital?
Its 2018... Should Pharma Still be Scared of Digital?Its 2018... Should Pharma Still be Scared of Digital?
Its 2018... Should Pharma Still be Scared of Digital?
 
Failure to Execute a HIPAA Business Associate Agreement Results in $1.55 Mill...
Failure to Execute a HIPAA Business Associate Agreement Results in $1.55 Mill...Failure to Execute a HIPAA Business Associate Agreement Results in $1.55 Mill...
Failure to Execute a HIPAA Business Associate Agreement Results in $1.55 Mill...
 
Managing Risk: Legal Issues for Affiliate Marketers & Affiliate Marketing Man...
Managing Risk: Legal Issues for Affiliate Marketers & Affiliate Marketing Man...Managing Risk: Legal Issues for Affiliate Marketers & Affiliate Marketing Man...
Managing Risk: Legal Issues for Affiliate Marketers & Affiliate Marketing Man...
 
Using Social Media in the Age of ACA and HIPAA Regulations - BDI 7/24 Patient...
Using Social Media in the Age of ACA and HIPAA Regulations - BDI 7/24 Patient...Using Social Media in the Age of ACA and HIPAA Regulations - BDI 7/24 Patient...
Using Social Media in the Age of ACA and HIPAA Regulations - BDI 7/24 Patient...
 
wp-analyzing-breaches-by-industry
wp-analyzing-breaches-by-industrywp-analyzing-breaches-by-industry
wp-analyzing-breaches-by-industry
 

Similar to Cyber Security Awareness Survey: India

The Business Value of Trust
The Business Value of TrustThe Business Value of Trust
The Business Value of TrustCognizant
 
The Business Value of Trust
The Business Value of TrustThe Business Value of Trust
The Business Value of TrustCognizant
 
Uk Cyber Security Survey 2019
Uk Cyber Security Survey 2019Uk Cyber Security Survey 2019
Uk Cyber Security Survey 2019Ipsos UK
 
Briefing Note - Consumer response to a data breach
Briefing Note - Consumer response to a data breach Briefing Note - Consumer response to a data breach
Briefing Note - Consumer response to a data breach Compliance3
 
None of Your Beeswax: Attitudes Towards Privacy
None of Your Beeswax: Attitudes Towards PrivacyNone of Your Beeswax: Attitudes Towards Privacy
None of Your Beeswax: Attitudes Towards PrivacyJenny Wanger
 
My data value - Orange future of digital trust - REPORT - September 2014
My data value - Orange future of digital trust - REPORT - September 2014My data value - Orange future of digital trust - REPORT - September 2014
My data value - Orange future of digital trust - REPORT - September 2014Romain Fonnier
 
TeleSign Consumer Account Security Report 2016 FINAL
TeleSign Consumer Account Security Report 2016 FINALTeleSign Consumer Account Security Report 2016 FINAL
TeleSign Consumer Account Security Report 2016 FINALPeggy Lawless
 
Carpe Datum! Who knows who you are?
Carpe Datum! Who knows who you are?Carpe Datum! Who knows who you are?
Carpe Datum! Who knows who you are?Kuliza Technologies
 
The future of digital trust
The future of digital trust The future of digital trust
The future of digital trust Dario Caliendo
 
Give-Get Framework: Balancing Lead Generation With the Expectations of Techno...
Give-Get Framework: Balancing Lead Generation With the Expectations of Techno...Give-Get Framework: Balancing Lead Generation With the Expectations of Techno...
Give-Get Framework: Balancing Lead Generation With the Expectations of Techno...Frank Jurden
 
1 Explain the principle of privacy. What impact has IT made on priv.pdf
1 Explain the principle of privacy. What impact has IT made on priv.pdf1 Explain the principle of privacy. What impact has IT made on priv.pdf
1 Explain the principle of privacy. What impact has IT made on priv.pdfAroraRajinder1
 
The State of Privacy Report
The State of Privacy ReportThe State of Privacy Report
The State of Privacy ReportFigLeaf
 
Trust & Predictive Technologies 2016
Trust & Predictive Technologies 2016Trust & Predictive Technologies 2016
Trust & Predictive Technologies 2016Edelman
 
Report: mydata value orange - future of digital trust
Report: mydata value orange - future of digital trustReport: mydata value orange - future of digital trust
Report: mydata value orange - future of digital trustLudovic Privat
 
A Survey of Security & Privacy in Online Social Networks (OSN) with regards t...
A Survey of Security & Privacy in Online Social Networks (OSN) with regards t...A Survey of Security & Privacy in Online Social Networks (OSN) with regards t...
A Survey of Security & Privacy in Online Social Networks (OSN) with regards t...Frances Coronel
 
54 Parents Worried About Cyber Bullying ofKids Norton Re.docx
54 Parents Worried About Cyber Bullying ofKids Norton Re.docx54 Parents Worried About Cyber Bullying ofKids Norton Re.docx
54 Parents Worried About Cyber Bullying ofKids Norton Re.docxblondellchancy
 
54 Parents Worried About Cyber Bullying ofKids Norton Re.docx
54 Parents Worried About Cyber Bullying ofKids Norton Re.docx54 Parents Worried About Cyber Bullying ofKids Norton Re.docx
54 Parents Worried About Cyber Bullying ofKids Norton Re.docxBHANU281672
 
DEMYSTIFYING – AND BETTER SERVING – THE DIGITAL CITIZEN
DEMYSTIFYING – AND BETTER SERVING – THE DIGITAL CITIZENDEMYSTIFYING – AND BETTER SERVING – THE DIGITAL CITIZEN
DEMYSTIFYING – AND BETTER SERVING – THE DIGITAL CITIZENForgeRock
 

Similar to Cyber Security Awareness Survey: India (20)

Privacy in the Digital Age
Privacy in the Digital AgePrivacy in the Digital Age
Privacy in the Digital Age
 
The Business Value of Trust
The Business Value of TrustThe Business Value of Trust
The Business Value of Trust
 
The Business Value of Trust
The Business Value of TrustThe Business Value of Trust
The Business Value of Trust
 
Uk Cyber Security Survey 2019
Uk Cyber Security Survey 2019Uk Cyber Security Survey 2019
Uk Cyber Security Survey 2019
 
Networked Privacy in the Age of Surveillance, Sousveillance, Coveillance
Networked Privacy in the Age of Surveillance, Sousveillance, CoveillanceNetworked Privacy in the Age of Surveillance, Sousveillance, Coveillance
Networked Privacy in the Age of Surveillance, Sousveillance, Coveillance
 
Briefing Note - Consumer response to a data breach
Briefing Note - Consumer response to a data breach Briefing Note - Consumer response to a data breach
Briefing Note - Consumer response to a data breach
 
None of Your Beeswax: Attitudes Towards Privacy
None of Your Beeswax: Attitudes Towards PrivacyNone of Your Beeswax: Attitudes Towards Privacy
None of Your Beeswax: Attitudes Towards Privacy
 
My data value - Orange future of digital trust - REPORT - September 2014
My data value - Orange future of digital trust - REPORT - September 2014My data value - Orange future of digital trust - REPORT - September 2014
My data value - Orange future of digital trust - REPORT - September 2014
 
TeleSign Consumer Account Security Report 2016 FINAL
TeleSign Consumer Account Security Report 2016 FINALTeleSign Consumer Account Security Report 2016 FINAL
TeleSign Consumer Account Security Report 2016 FINAL
 
Carpe Datum! Who knows who you are?
Carpe Datum! Who knows who you are?Carpe Datum! Who knows who you are?
Carpe Datum! Who knows who you are?
 
The future of digital trust
The future of digital trust The future of digital trust
The future of digital trust
 
Give-Get Framework: Balancing Lead Generation With the Expectations of Techno...
Give-Get Framework: Balancing Lead Generation With the Expectations of Techno...Give-Get Framework: Balancing Lead Generation With the Expectations of Techno...
Give-Get Framework: Balancing Lead Generation With the Expectations of Techno...
 
1 Explain the principle of privacy. What impact has IT made on priv.pdf
1 Explain the principle of privacy. What impact has IT made on priv.pdf1 Explain the principle of privacy. What impact has IT made on priv.pdf
1 Explain the principle of privacy. What impact has IT made on priv.pdf
 
The State of Privacy Report
The State of Privacy ReportThe State of Privacy Report
The State of Privacy Report
 
Trust & Predictive Technologies 2016
Trust & Predictive Technologies 2016Trust & Predictive Technologies 2016
Trust & Predictive Technologies 2016
 
Report: mydata value orange - future of digital trust
Report: mydata value orange - future of digital trustReport: mydata value orange - future of digital trust
Report: mydata value orange - future of digital trust
 
A Survey of Security & Privacy in Online Social Networks (OSN) with regards t...
A Survey of Security & Privacy in Online Social Networks (OSN) with regards t...A Survey of Security & Privacy in Online Social Networks (OSN) with regards t...
A Survey of Security & Privacy in Online Social Networks (OSN) with regards t...
 
54 Parents Worried About Cyber Bullying ofKids Norton Re.docx
54 Parents Worried About Cyber Bullying ofKids Norton Re.docx54 Parents Worried About Cyber Bullying ofKids Norton Re.docx
54 Parents Worried About Cyber Bullying ofKids Norton Re.docx
 
54 Parents Worried About Cyber Bullying ofKids Norton Re.docx
54 Parents Worried About Cyber Bullying ofKids Norton Re.docx54 Parents Worried About Cyber Bullying ofKids Norton Re.docx
54 Parents Worried About Cyber Bullying ofKids Norton Re.docx
 
DEMYSTIFYING – AND BETTER SERVING – THE DIGITAL CITIZEN
DEMYSTIFYING – AND BETTER SERVING – THE DIGITAL CITIZENDEMYSTIFYING – AND BETTER SERVING – THE DIGITAL CITIZEN
DEMYSTIFYING – AND BETTER SERVING – THE DIGITAL CITIZEN
 

Recently uploaded

Call Girls in Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Defence Colony Delhi 💯Call Us 🔝8264348440🔝Call Girls in Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Defence Colony Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Kantar AI Summit- Under Embargo till Wednesday, 24th April 2024, 4 PM, IST.pdf
Kantar AI Summit- Under Embargo till Wednesday, 24th April 2024, 4 PM, IST.pdfKantar AI Summit- Under Embargo till Wednesday, 24th April 2024, 4 PM, IST.pdf
Kantar AI Summit- Under Embargo till Wednesday, 24th April 2024, 4 PM, IST.pdfSocial Samosa
 
Schema on read is obsolete. Welcome metaprogramming..pdf
Schema on read is obsolete. Welcome metaprogramming..pdfSchema on read is obsolete. Welcome metaprogramming..pdf
Schema on read is obsolete. Welcome metaprogramming..pdfLars Albertsson
 
Predicting Employee Churn: A Data-Driven Approach Project Presentation
Predicting Employee Churn: A Data-Driven Approach Project PresentationPredicting Employee Churn: A Data-Driven Approach Project Presentation
Predicting Employee Churn: A Data-Driven Approach Project PresentationBoston Institute of Analytics
 
Brighton SEO | April 2024 | Data Storytelling
Brighton SEO | April 2024 | Data StorytellingBrighton SEO | April 2024 | Data Storytelling
Brighton SEO | April 2024 | Data StorytellingNeil Barnes
 
Customer Service Analytics - Make Sense of All Your Data.pptx
Customer Service Analytics - Make Sense of All Your Data.pptxCustomer Service Analytics - Make Sense of All Your Data.pptx
Customer Service Analytics - Make Sense of All Your Data.pptxEmmanuel Dauda
 
Low Rate Call Girls Bhilai Anika 8250192130 Independent Escort Service Bhilai
Low Rate Call Girls Bhilai Anika 8250192130 Independent Escort Service BhilaiLow Rate Call Girls Bhilai Anika 8250192130 Independent Escort Service Bhilai
Low Rate Call Girls Bhilai Anika 8250192130 Independent Escort Service BhilaiSuhani Kapoor
 
dokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.ppt
dokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.pptdokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.ppt
dokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.pptSonatrach
 
Indian Call Girls in Abu Dhabi O5286O24O8 Call Girls in Abu Dhabi By Independ...
Indian Call Girls in Abu Dhabi O5286O24O8 Call Girls in Abu Dhabi By Independ...Indian Call Girls in Abu Dhabi O5286O24O8 Call Girls in Abu Dhabi By Independ...
Indian Call Girls in Abu Dhabi O5286O24O8 Call Girls in Abu Dhabi By Independ...dajasot375
 
B2 Creative Industry Response Evaluation.docx
B2 Creative Industry Response Evaluation.docxB2 Creative Industry Response Evaluation.docx
B2 Creative Industry Response Evaluation.docxStephen266013
 
VIP High Class Call Girls Bikaner Anushka 8250192130 Independent Escort Servi...
VIP High Class Call Girls Bikaner Anushka 8250192130 Independent Escort Servi...VIP High Class Call Girls Bikaner Anushka 8250192130 Independent Escort Servi...
VIP High Class Call Girls Bikaner Anushka 8250192130 Independent Escort Servi...Suhani Kapoor
 
Beautiful Sapna Vip Call Girls Hauz Khas 9711199012 Call /Whatsapps
Beautiful Sapna Vip  Call Girls Hauz Khas 9711199012 Call /WhatsappsBeautiful Sapna Vip  Call Girls Hauz Khas 9711199012 Call /Whatsapps
Beautiful Sapna Vip Call Girls Hauz Khas 9711199012 Call /Whatsappssapnasaifi408
 
FESE Capital Markets Fact Sheet 2024 Q1.pdf
FESE Capital Markets Fact Sheet 2024 Q1.pdfFESE Capital Markets Fact Sheet 2024 Q1.pdf
FESE Capital Markets Fact Sheet 2024 Q1.pdfMarinCaroMartnezBerg
 
VIP Call Girls in Amravati Aarohi 8250192130 Independent Escort Service Amravati
VIP Call Girls in Amravati Aarohi 8250192130 Independent Escort Service AmravatiVIP Call Girls in Amravati Aarohi 8250192130 Independent Escort Service Amravati
VIP Call Girls in Amravati Aarohi 8250192130 Independent Escort Service AmravatiSuhani Kapoor
 
Log Analysis using OSSEC sasoasasasas.pptx
Log Analysis using OSSEC sasoasasasas.pptxLog Analysis using OSSEC sasoasasasas.pptx
Log Analysis using OSSEC sasoasasasas.pptxJohnnyPlasten
 
Digi Khata Problem along complete plan.pptx
Digi Khata Problem along complete plan.pptxDigi Khata Problem along complete plan.pptx
Digi Khata Problem along complete plan.pptxTanveerAhmed817946
 
Ukraine War presentation: KNOW THE BASICS
Ukraine War presentation: KNOW THE BASICSUkraine War presentation: KNOW THE BASICS
Ukraine War presentation: KNOW THE BASICSAishani27
 

Recently uploaded (20)

Call Girls in Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Defence Colony Delhi 💯Call Us 🔝8264348440🔝Call Girls in Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Defence Colony Delhi 💯Call Us 🔝8264348440🔝
 
Kantar AI Summit- Under Embargo till Wednesday, 24th April 2024, 4 PM, IST.pdf
Kantar AI Summit- Under Embargo till Wednesday, 24th April 2024, 4 PM, IST.pdfKantar AI Summit- Under Embargo till Wednesday, 24th April 2024, 4 PM, IST.pdf
Kantar AI Summit- Under Embargo till Wednesday, 24th April 2024, 4 PM, IST.pdf
 
Schema on read is obsolete. Welcome metaprogramming..pdf
Schema on read is obsolete. Welcome metaprogramming..pdfSchema on read is obsolete. Welcome metaprogramming..pdf
Schema on read is obsolete. Welcome metaprogramming..pdf
 
Predicting Employee Churn: A Data-Driven Approach Project Presentation
Predicting Employee Churn: A Data-Driven Approach Project PresentationPredicting Employee Churn: A Data-Driven Approach Project Presentation
Predicting Employee Churn: A Data-Driven Approach Project Presentation
 
Brighton SEO | April 2024 | Data Storytelling
Brighton SEO | April 2024 | Data StorytellingBrighton SEO | April 2024 | Data Storytelling
Brighton SEO | April 2024 | Data Storytelling
 
Decoding Loan Approval: Predictive Modeling in Action
Decoding Loan Approval: Predictive Modeling in ActionDecoding Loan Approval: Predictive Modeling in Action
Decoding Loan Approval: Predictive Modeling in Action
 
Customer Service Analytics - Make Sense of All Your Data.pptx
Customer Service Analytics - Make Sense of All Your Data.pptxCustomer Service Analytics - Make Sense of All Your Data.pptx
Customer Service Analytics - Make Sense of All Your Data.pptx
 
Low Rate Call Girls Bhilai Anika 8250192130 Independent Escort Service Bhilai
Low Rate Call Girls Bhilai Anika 8250192130 Independent Escort Service BhilaiLow Rate Call Girls Bhilai Anika 8250192130 Independent Escort Service Bhilai
Low Rate Call Girls Bhilai Anika 8250192130 Independent Escort Service Bhilai
 
dokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.ppt
dokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.pptdokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.ppt
dokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.ppt
 
Indian Call Girls in Abu Dhabi O5286O24O8 Call Girls in Abu Dhabi By Independ...
Indian Call Girls in Abu Dhabi O5286O24O8 Call Girls in Abu Dhabi By Independ...Indian Call Girls in Abu Dhabi O5286O24O8 Call Girls in Abu Dhabi By Independ...
Indian Call Girls in Abu Dhabi O5286O24O8 Call Girls in Abu Dhabi By Independ...
 
B2 Creative Industry Response Evaluation.docx
B2 Creative Industry Response Evaluation.docxB2 Creative Industry Response Evaluation.docx
B2 Creative Industry Response Evaluation.docx
 
VIP High Class Call Girls Bikaner Anushka 8250192130 Independent Escort Servi...
VIP High Class Call Girls Bikaner Anushka 8250192130 Independent Escort Servi...VIP High Class Call Girls Bikaner Anushka 8250192130 Independent Escort Servi...
VIP High Class Call Girls Bikaner Anushka 8250192130 Independent Escort Servi...
 
Beautiful Sapna Vip Call Girls Hauz Khas 9711199012 Call /Whatsapps
Beautiful Sapna Vip  Call Girls Hauz Khas 9711199012 Call /WhatsappsBeautiful Sapna Vip  Call Girls Hauz Khas 9711199012 Call /Whatsapps
Beautiful Sapna Vip Call Girls Hauz Khas 9711199012 Call /Whatsapps
 
FESE Capital Markets Fact Sheet 2024 Q1.pdf
FESE Capital Markets Fact Sheet 2024 Q1.pdfFESE Capital Markets Fact Sheet 2024 Q1.pdf
FESE Capital Markets Fact Sheet 2024 Q1.pdf
 
VIP Call Girls in Amravati Aarohi 8250192130 Independent Escort Service Amravati
VIP Call Girls in Amravati Aarohi 8250192130 Independent Escort Service AmravatiVIP Call Girls in Amravati Aarohi 8250192130 Independent Escort Service Amravati
VIP Call Girls in Amravati Aarohi 8250192130 Independent Escort Service Amravati
 
Delhi 99530 vip 56974 Genuine Escort Service Call Girls in Kishangarh
Delhi 99530 vip 56974 Genuine Escort Service Call Girls in  KishangarhDelhi 99530 vip 56974 Genuine Escort Service Call Girls in  Kishangarh
Delhi 99530 vip 56974 Genuine Escort Service Call Girls in Kishangarh
 
VIP Call Girls Service Charbagh { Lucknow Call Girls Service 9548273370 } Boo...
VIP Call Girls Service Charbagh { Lucknow Call Girls Service 9548273370 } Boo...VIP Call Girls Service Charbagh { Lucknow Call Girls Service 9548273370 } Boo...
VIP Call Girls Service Charbagh { Lucknow Call Girls Service 9548273370 } Boo...
 
Log Analysis using OSSEC sasoasasasas.pptx
Log Analysis using OSSEC sasoasasasas.pptxLog Analysis using OSSEC sasoasasasas.pptx
Log Analysis using OSSEC sasoasasasas.pptx
 
Digi Khata Problem along complete plan.pptx
Digi Khata Problem along complete plan.pptxDigi Khata Problem along complete plan.pptx
Digi Khata Problem along complete plan.pptx
 
Ukraine War presentation: KNOW THE BASICS
Ukraine War presentation: KNOW THE BASICSUkraine War presentation: KNOW THE BASICS
Ukraine War presentation: KNOW THE BASICS
 

Cyber Security Awareness Survey: India

  • 1. Cyber Security Report: India cybercivilians.com sample size: 256 Ujjwal Singh usingh@knox.edu
  • 2. demographics expressing high concern [7 or more on 1-10] Age Gender Daily Usage 90 % People over 50 tend to show the least concern for the privacy of their data 80 % 60 % Males tend to care more about the privacy of their data 60 % 85 % 100 % People who spend less than 2 hours online everyday tend to be the least concerned about the privacy of their data
  • 3. then we asked people what type of data was the most valuable to them For obvious reasons, financial data tends to be the most valuable to people followed by their private conversations or chat logs.
  • 4. when asked if they trust big corporations or not, we received mixed answers It can be seen that a fair share of people aged 18-50 trust big corporations but a sense of distrust can be seen amongst seniors and adolescents. _________________________ According to a survey by McKinsey & Company, the level of trust can also vary based on the service provider. Financial and healthcare services tend to be widely trusted. This motivated me to dig deeper. [see next slide]
  • 5. people who indicated high concern for their data earlier in the survey were asked if they trust the Government/Big Corporations with their data Big Corporations Government 52% people who are highly concerned about their data trust Big Corporations People who are highly concerned about their data tend to be split into 2 equal groups; one which trusts the Government, and one which doesn’t
  • 6. then, we asked people if they read privacy policies of apps/services after installing them While the majority admitted to reading privacy policies, a staggering percentage of people said they do NOT do so. So I dug up further [see next slide]
  • 7. since a large minority does not read privacy policies, we tried to find out if they think before giving permissions to an app The majority claimed that they thought before granting permissions to apps
  • 8. then we tried to find demographics which are highly likely to think before giving permissions to an app Adolescents and people aged 35-50 are highly likely to think before granting permissions to apps
  • 9. when we asked people if they would trade their data for added functionality we received the following results Around 48% people were open to trading their data for added functionality while 39% would NOT do so in any circumstance. A tiny group agreed to sharing their data for added functionality in all or most circumstances.
  • 10. people who showed high concern for their data were asked if they’ve ever refused to share their phone number with the cashier at a retail store It is clear that people who show high concern for their data are more likely to refuse to share their contact information.
  • 11. at the end we tried to find the demographic which is more likely to refuse to share their phone number at the cashier in a retail store It is clear that males are more likely to refuse to share their phone numbers compared to their counterparts we did so by asking people if they’ve refused to share their phone number with the cashier in the past
  • 12. to summarise... ● People over 50 tend to show the least concern for their data ● In general males tend to care more about the privacy of their data ● People who spend very few hours on the internet (less than 2) tend to not be concerned about their data online ● Financial data tends to be the most valuable data to people followed by private conversations ● Seniors citizens and adolescents tend to have a lack of trust in big corporations ● More than half the people who answered the survey claimed that they did read privacy policies of the apps/software they use ● 78% people said that they think before granting permissions to apps ● 48% people would consider trading their data if it has added reward, that is, more functionality. ● Males tend to be more likely to refuse to share their phone number with the cashier at a retail store