SlideShare a Scribd company logo
1 of 17
Attitudes to Privacy and Security
Damian Radcliffe
Social Impact Department Manager
ICT and Society
Damian Radcliffe
Email: dradcliffe@ict.gov.qa
Twitter: @damianradcliffe
2
MENA fastest growing online region
Online penetration still quite low, especially in North
Africa, but the MENA region will see the fastest levels
of take up in the coming years.
3
And eCommerce will be part of this mix
4
But, comparatively, MENA remains
a small international B2C market
North America & Asia-Pacific dominate global
share; with Asia-Pacific becoming the
predominant B2C market this year
So what do we know about what people do
online, and their attitudes and behaviors?
5
ICT Penetration among Individuals
6
Examples of tasks performed
by Internet users in Qatar
7
8
Concerns of Internet users in Qatar
Many similarities to those not online
Skills: Don’t know how to do a certain task.
Knowledge: Don’t understand how the Internet benefits them.
Trust: Don’t trust the Internet for certain tasks.
Or the Internet more generally.
Fear of virus and malware.
Preferences: Face to face communication remains popular.
9
10
In a good place to move forward
11
But need to remain vigilant
12
Online activity does not
necessarily equate to feeling safe online
An idea perhaps reflected in
what people in MENA do online
13
14
Especially when compared
with online activities globally
Yet compelling propositions can
help override many user concerns
15
UK data suggests concerns
relating to personal privacy,
security or fraud don’t
appear to inhibit online
behaviors.
People’s propensity to trust
a website increases if their
desire for the product or
service on offer is great
• Concerns re privacy and security will continue especially
as new technology is rolled out e.g. NFC, newer Apps etc.
• We need to continue to sell the benefits of being online to
both non-users and users.
• You can also play a role in helping promote being safe and
secure online.
16
Future Considerations
We look forward to working with you
and making this happen.
1717
Thanks for listening.
Find out more on Internet usage in Qatar: www.ictqatar.qa
Get our quarterly digest of emerging issues and evidence of
ICT behaviors in the MENA region at:
www.slideshare.net/ictqatar

More Related Content

What's hot

Adapting to changing cyber security threats in South East Asia (IFRI 2020)
Adapting to changing cyber security threats in South East Asia (IFRI 2020)Adapting to changing cyber security threats in South East Asia (IFRI 2020)
Adapting to changing cyber security threats in South East Asia (IFRI 2020)Benjamin Ang
 
Business under cyberassault
Business under cyberassaultBusiness under cyberassault
Business under cyberassaultMohammad Husain
 
Social media & cyber crime
Social media & cyber crimeSocial media & cyber crime
Social media & cyber crimeatifkhanniazi
 
Law and warfare in the cyber domain (for NSSP, AFP, NDCP)
Law and warfare in the cyber domain (for NSSP, AFP, NDCP)Law and warfare in the cyber domain (for NSSP, AFP, NDCP)
Law and warfare in the cyber domain (for NSSP, AFP, NDCP)Benjamin Ang
 
Internet Safety: Social, Mobile, Messy
Internet Safety: Social, Mobile, MessyInternet Safety: Social, Mobile, Messy
Internet Safety: Social, Mobile, MessyMarian Merritt
 
Unleashing Technology to Advance Social and Economic Development
Unleashing Technology to Advance Social and Economic DevelopmentUnleashing Technology to Advance Social and Economic Development
Unleashing Technology to Advance Social and Economic DevelopmentLisa Malone
 
Looking Forward and Looking Back: Lookout's Cybersecurity Predictions
Looking Forward and Looking Back: Lookout's Cybersecurity PredictionsLooking Forward and Looking Back: Lookout's Cybersecurity Predictions
Looking Forward and Looking Back: Lookout's Cybersecurity PredictionsLookout
 
Security In A Connected Society
Security In A Connected SocietySecurity In A Connected Society
Security In A Connected SocietyCentraComm
 
Preventing Cybercrime in Libraries
Preventing Cybercrime in LibrariesPreventing Cybercrime in Libraries
Preventing Cybercrime in LibrariesMary Rayme
 
Cyber Crime is around us
Cyber Crime is around usCyber Crime is around us
Cyber Crime is around uslichuyuliting
 
Open Source Insight: IoT, Medical Devices, Connected Cars All Vulnerable to ...
Open Source Insight: IoT, Medical Devices, Connected Cars  All Vulnerable to ...Open Source Insight: IoT, Medical Devices, Connected Cars  All Vulnerable to ...
Open Source Insight: IoT, Medical Devices, Connected Cars All Vulnerable to ...Black Duck by Synopsys
 
Android Security: Art of Exploitation
Android Security: Art of ExploitationAndroid Security: Art of Exploitation
Android Security: Art of ExploitationSatria Ady Pradana
 
Privacy is for losers 2016
Privacy is for losers 2016Privacy is for losers 2016
Privacy is for losers 2016Cain Ransbottyn
 
Data data every where!! Thomas O'Grady
Data data every where!! Thomas O'GradyData data every where!! Thomas O'Grady
Data data every where!! Thomas O'Gradytomo006
 
Framework of responsible state behaviour in cyberspace - for Marshall Center ...
Framework of responsible state behaviour in cyberspace - for Marshall Center ...Framework of responsible state behaviour in cyberspace - for Marshall Center ...
Framework of responsible state behaviour in cyberspace - for Marshall Center ...Benjamin Ang
 

What's hot (18)

Adapting to changing cyber security threats in South East Asia (IFRI 2020)
Adapting to changing cyber security threats in South East Asia (IFRI 2020)Adapting to changing cyber security threats in South East Asia (IFRI 2020)
Adapting to changing cyber security threats in South East Asia (IFRI 2020)
 
Business under cyberassault
Business under cyberassaultBusiness under cyberassault
Business under cyberassault
 
Social media & cyber crime
Social media & cyber crimeSocial media & cyber crime
Social media & cyber crime
 
Cybercrime (sociology)
Cybercrime (sociology)Cybercrime (sociology)
Cybercrime (sociology)
 
Law and warfare in the cyber domain (for NSSP, AFP, NDCP)
Law and warfare in the cyber domain (for NSSP, AFP, NDCP)Law and warfare in the cyber domain (for NSSP, AFP, NDCP)
Law and warfare in the cyber domain (for NSSP, AFP, NDCP)
 
Internet Safety: Social, Mobile, Messy
Internet Safety: Social, Mobile, MessyInternet Safety: Social, Mobile, Messy
Internet Safety: Social, Mobile, Messy
 
cyber crime
cyber crimecyber crime
cyber crime
 
Unleashing Technology to Advance Social and Economic Development
Unleashing Technology to Advance Social and Economic DevelopmentUnleashing Technology to Advance Social and Economic Development
Unleashing Technology to Advance Social and Economic Development
 
Looking Forward and Looking Back: Lookout's Cybersecurity Predictions
Looking Forward and Looking Back: Lookout's Cybersecurity PredictionsLooking Forward and Looking Back: Lookout's Cybersecurity Predictions
Looking Forward and Looking Back: Lookout's Cybersecurity Predictions
 
Security In A Connected Society
Security In A Connected SocietySecurity In A Connected Society
Security In A Connected Society
 
Preventing Cybercrime in Libraries
Preventing Cybercrime in LibrariesPreventing Cybercrime in Libraries
Preventing Cybercrime in Libraries
 
Software Piracy
Software PiracySoftware Piracy
Software Piracy
 
Cyber Crime is around us
Cyber Crime is around usCyber Crime is around us
Cyber Crime is around us
 
Open Source Insight: IoT, Medical Devices, Connected Cars All Vulnerable to ...
Open Source Insight: IoT, Medical Devices, Connected Cars  All Vulnerable to ...Open Source Insight: IoT, Medical Devices, Connected Cars  All Vulnerable to ...
Open Source Insight: IoT, Medical Devices, Connected Cars All Vulnerable to ...
 
Android Security: Art of Exploitation
Android Security: Art of ExploitationAndroid Security: Art of Exploitation
Android Security: Art of Exploitation
 
Privacy is for losers 2016
Privacy is for losers 2016Privacy is for losers 2016
Privacy is for losers 2016
 
Data data every where!! Thomas O'Grady
Data data every where!! Thomas O'GradyData data every where!! Thomas O'Grady
Data data every where!! Thomas O'Grady
 
Framework of responsible state behaviour in cyberspace - for Marshall Center ...
Framework of responsible state behaviour in cyberspace - for Marshall Center ...Framework of responsible state behaviour in cyberspace - for Marshall Center ...
Framework of responsible state behaviour in cyberspace - for Marshall Center ...
 

Similar to Attitudes to online Privacy and Security

Attitudes to Cybersafety and Online Privacy in the Middle East
Attitudes to Cybersafety and Online Privacy in the Middle EastAttitudes to Cybersafety and Online Privacy in the Middle East
Attitudes to Cybersafety and Online Privacy in the Middle EastMOTC Qatar
 
Digital life south africa event jan 2012 mark short
Digital life south africa event jan 2012 mark shortDigital life south africa event jan 2012 mark short
Digital life south africa event jan 2012 mark shortMark Molenaar
 
Protecting the Resilience of Canada’s Financial System
Protecting the Resilience of Canada’s Financial SystemProtecting the Resilience of Canada’s Financial System
Protecting the Resilience of Canada’s Financial SystemAjay Shibu
 
Protecting the Resilience of Canada’s Financial System
Protecting the Resilience of Canada’s Financial SystemProtecting the Resilience of Canada’s Financial System
Protecting the Resilience of Canada’s Financial SystemAjay Shibu
 
Cyber Security Awareness Challenge: In India
Cyber Security Awareness Challenge:  In IndiaCyber Security Awareness Challenge:  In India
Cyber Security Awareness Challenge: In IndiaIRJET Journal
 
Irjet v5 i1268
Irjet v5 i1268Irjet v5 i1268
Irjet v5 i1268xosap
 
Forbes Africa - Africa ICT Outlook 2016
Forbes Africa - Africa ICT Outlook 2016Forbes Africa - Africa ICT Outlook 2016
Forbes Africa - Africa ICT Outlook 2016Tebogo Mogapi
 
Uk Cyber Security Survey 2019
Uk Cyber Security Survey 2019Uk Cyber Security Survey 2019
Uk Cyber Security Survey 2019Ipsos UK
 
Awareness about cybercrime among youth
Awareness about cybercrime among youthAwareness about cybercrime among youth
Awareness about cybercrime among youthnirmal00776
 
10 Most Influential Leaders in Cybersecurity, 2022.pdf
10 Most Influential Leaders in Cybersecurity, 2022.pdf10 Most Influential Leaders in Cybersecurity, 2022.pdf
10 Most Influential Leaders in Cybersecurity, 2022.pdfCIO Look Magazine
 
Policy options for connecting and enabling the next billion – phase iii cal...
Policy options for connecting and enabling the next billion – phase iii   cal...Policy options for connecting and enabling the next billion – phase iii   cal...
Policy options for connecting and enabling the next billion – phase iii cal...Shreedeep Rayamajhi
 
E Marketing Lecture Part 2
E Marketing Lecture Part 2E Marketing Lecture Part 2
E Marketing Lecture Part 2Gerald Fricke
 
THE INCLUSIVE INTERNET INDEX: Bridging digital divides
THE INCLUSIVE INTERNET INDEX:  Bridging digital dividesTHE INCLUSIVE INTERNET INDEX:  Bridging digital divides
THE INCLUSIVE INTERNET INDEX: Bridging digital dividesPeerasak C.
 
Impact of the Internet in Nigeria - Mobile Monday Nigeria
Impact of the Internet in Nigeria - Mobile Monday NigeriaImpact of the Internet in Nigeria - Mobile Monday Nigeria
Impact of the Internet in Nigeria - Mobile Monday NigeriaMobile Monday Nigeria
 
The Realities and Challenges of Cyber Crime and Cyber Security in Africa
The Realities and Challenges of Cyber Crime and Cyber Security in AfricaThe Realities and Challenges of Cyber Crime and Cyber Security in Africa
The Realities and Challenges of Cyber Crime and Cyber Security in AfricaZsolt Nemeth
 

Similar to Attitudes to online Privacy and Security (20)

Attitudes to Cybersafety and Online Privacy in the Middle East
Attitudes to Cybersafety and Online Privacy in the Middle EastAttitudes to Cybersafety and Online Privacy in the Middle East
Attitudes to Cybersafety and Online Privacy in the Middle East
 
Positive Use of Internet and Mobile Devices
Positive Use of Internet and Mobile DevicesPositive Use of Internet and Mobile Devices
Positive Use of Internet and Mobile Devices
 
Digital life south africa event jan 2012 mark short
Digital life south africa event jan 2012 mark shortDigital life south africa event jan 2012 mark short
Digital life south africa event jan 2012 mark short
 
Protecting the Resilience of Canada’s Financial System
Protecting the Resilience of Canada’s Financial SystemProtecting the Resilience of Canada’s Financial System
Protecting the Resilience of Canada’s Financial System
 
Protecting the Resilience of Canada’s Financial System
Protecting the Resilience of Canada’s Financial SystemProtecting the Resilience of Canada’s Financial System
Protecting the Resilience of Canada’s Financial System
 
Cyber Security Awareness Challenge: In India
Cyber Security Awareness Challenge:  In IndiaCyber Security Awareness Challenge:  In India
Cyber Security Awareness Challenge: In India
 
Irjet v5 i1268
Irjet v5 i1268Irjet v5 i1268
Irjet v5 i1268
 
Forbes Africa - Africa ICT Outlook 2016
Forbes Africa - Africa ICT Outlook 2016Forbes Africa - Africa ICT Outlook 2016
Forbes Africa - Africa ICT Outlook 2016
 
Uk Cyber Security Survey 2019
Uk Cyber Security Survey 2019Uk Cyber Security Survey 2019
Uk Cyber Security Survey 2019
 
Awareness about cybercrime among youth
Awareness about cybercrime among youthAwareness about cybercrime among youth
Awareness about cybercrime among youth
 
A4 melinda(1)
A4 melinda(1)A4 melinda(1)
A4 melinda(1)
 
People Centered Internet Briefing Jan 30 2016
People Centered Internet Briefing Jan 30 2016People Centered Internet Briefing Jan 30 2016
People Centered Internet Briefing Jan 30 2016
 
10 Most Influential Leaders in Cybersecurity, 2022.pdf
10 Most Influential Leaders in Cybersecurity, 2022.pdf10 Most Influential Leaders in Cybersecurity, 2022.pdf
10 Most Influential Leaders in Cybersecurity, 2022.pdf
 
Policy options for connecting and enabling the next billion – phase iii cal...
Policy options for connecting and enabling the next billion – phase iii   cal...Policy options for connecting and enabling the next billion – phase iii   cal...
Policy options for connecting and enabling the next billion – phase iii cal...
 
E Marketing Lecture Part 2
E Marketing Lecture Part 2E Marketing Lecture Part 2
E Marketing Lecture Part 2
 
Materi Perlindungan Konsumen.pdf
Materi Perlindungan Konsumen.pdfMateri Perlindungan Konsumen.pdf
Materi Perlindungan Konsumen.pdf
 
THE INCLUSIVE INTERNET INDEX: Bridging digital divides
THE INCLUSIVE INTERNET INDEX:  Bridging digital dividesTHE INCLUSIVE INTERNET INDEX:  Bridging digital divides
THE INCLUSIVE INTERNET INDEX: Bridging digital divides
 
Impact of the Internet in Nigeria - Mobile Monday Nigeria
Impact of the Internet in Nigeria - Mobile Monday NigeriaImpact of the Internet in Nigeria - Mobile Monday Nigeria
Impact of the Internet in Nigeria - Mobile Monday Nigeria
 
The Realities and Challenges of Cyber Crime and Cyber Security in Africa
The Realities and Challenges of Cyber Crime and Cyber Security in AfricaThe Realities and Challenges of Cyber Crime and Cyber Security in Africa
The Realities and Challenges of Cyber Crime and Cyber Security in Africa
 
Panel 5
Panel 5Panel 5
Panel 5
 

More from MOTC Qatar

منتدى قطر للتجارة الإلكترونية 2015
منتدى قطر للتجارة الإلكترونية 2015منتدى قطر للتجارة الإلكترونية 2015
منتدى قطر للتجارة الإلكترونية 2015MOTC Qatar
 
Qatar Digital Government 2014-2015 حكومة قطر الرقمية
Qatar Digital Government 2014-2015 حكومة قطر الرقمية Qatar Digital Government 2014-2015 حكومة قطر الرقمية
Qatar Digital Government 2014-2015 حكومة قطر الرقمية MOTC Qatar
 
إنفوجرافيك الملخص الرقمي، الربع الثالث
إنفوجرافيك الملخص الرقمي، الربع الثالثإنفوجرافيك الملخص الرقمي، الربع الثالث
إنفوجرافيك الملخص الرقمي، الربع الثالثMOTC Qatar
 
Digital Digest Q3 Infographic
Digital Digest Q3 InfographicDigital Digest Q3 Infographic
Digital Digest Q3 InfographicMOTC Qatar
 
الملخص الرقمي الربع الاخير 2014
الملخص الرقمي  الربع الاخير   2014 الملخص الرقمي  الربع الاخير   2014
الملخص الرقمي الربع الاخير 2014 MOTC Qatar
 
Digital Digest Q4 2014
Digital Digest Q4 2014Digital Digest Q4 2014
Digital Digest Q4 2014MOTC Qatar
 
TOP TEN: Big Data_ Issue 16 _ Dec 2014
TOP TEN: Big Data_ Issue 16 _ Dec 2014TOP TEN: Big Data_ Issue 16 _ Dec 2014
TOP TEN: Big Data_ Issue 16 _ Dec 2014MOTC Qatar
 
البيانات الضخمة: 10 استخدامات حالية و مستقبلية
البيانات الضخمة: 10 استخدامات حالية و مستقبلية البيانات الضخمة: 10 استخدامات حالية و مستقبلية
البيانات الضخمة: 10 استخدامات حالية و مستقبلية MOTC Qatar
 
How Qatar uses WhatsApp, Snapchat and other social media
How Qatar uses WhatsApp, Snapchat and other social mediaHow Qatar uses WhatsApp, Snapchat and other social media
How Qatar uses WhatsApp, Snapchat and other social mediaMOTC Qatar
 
عشراستخدامات للطباعة ثلاثية الأبعاد
عشراستخدامات للطباعة ثلاثية الأبعادعشراستخدامات للطباعة ثلاثية الأبعاد
عشراستخدامات للطباعة ثلاثية الأبعادMOTC Qatar
 
10 ways people are using 3D printing
10 ways people are using 3D printing10 ways people are using 3D printing
10 ways people are using 3D printingMOTC Qatar
 
Digital Digest Q3 2014 (English)
Digital Digest Q3 2014 (English)Digital Digest Q3 2014 (English)
Digital Digest Q3 2014 (English)MOTC Qatar
 
الملخص الرقمي - الربع الثالث 2014
الملخص الرقمي - الربع الثالث 2014الملخص الرقمي - الربع الثالث 2014
الملخص الرقمي - الربع الثالث 2014MOTC Qatar
 
التقرير الكامل: مواقف مستخدمي الإنترنت في منطقة الشرق الأوسط حيال السلامة وا...
 التقرير الكامل: مواقف مستخدمي الإنترنت في منطقة الشرق الأوسط حيال السلامة وا... التقرير الكامل: مواقف مستخدمي الإنترنت في منطقة الشرق الأوسط حيال السلامة وا...
التقرير الكامل: مواقف مستخدمي الإنترنت في منطقة الشرق الأوسط حيال السلامة وا...MOTC Qatar
 
عشر تقنيات للعام الدراسي الجديد
عشر تقنيات للعام الدراسي الجديدعشر تقنيات للعام الدراسي الجديد
عشر تقنيات للعام الدراسي الجديدMOTC Qatar
 
إنفوجرافيك: الملخص الرقمي الربع 2 لعام 2014
إنفوجرافيك: الملخص الرقمي الربع 2 لعام 2014إنفوجرافيك: الملخص الرقمي الربع 2 لعام 2014
إنفوجرافيك: الملخص الرقمي الربع 2 لعام 2014MOTC Qatar
 
عشر ابتكارات في مجال التجارة الالكترونية
 عشر ابتكارات في مجال التجارة الالكترونية عشر ابتكارات في مجال التجارة الالكترونية
عشر ابتكارات في مجال التجارة الالكترونيةMOTC Qatar
 
Tech Top 10s: Innovations in e commerce
Tech Top 10s: Innovations in e commerceTech Top 10s: Innovations in e commerce
Tech Top 10s: Innovations in e commerceMOTC Qatar
 
Tech Top 10... Innovations for "Social Good"
Tech Top 10... Innovations for "Social Good"Tech Top 10... Innovations for "Social Good"
Tech Top 10... Innovations for "Social Good"MOTC Qatar
 
عشر ابتكارات تكنولوجية في مجال الأعمال الخيرية
 عشر ابتكارات تكنولوجية في مجال الأعمال الخيرية عشر ابتكارات تكنولوجية في مجال الأعمال الخيرية
عشر ابتكارات تكنولوجية في مجال الأعمال الخيريةMOTC Qatar
 

More from MOTC Qatar (20)

منتدى قطر للتجارة الإلكترونية 2015
منتدى قطر للتجارة الإلكترونية 2015منتدى قطر للتجارة الإلكترونية 2015
منتدى قطر للتجارة الإلكترونية 2015
 
Qatar Digital Government 2014-2015 حكومة قطر الرقمية
Qatar Digital Government 2014-2015 حكومة قطر الرقمية Qatar Digital Government 2014-2015 حكومة قطر الرقمية
Qatar Digital Government 2014-2015 حكومة قطر الرقمية
 
إنفوجرافيك الملخص الرقمي، الربع الثالث
إنفوجرافيك الملخص الرقمي، الربع الثالثإنفوجرافيك الملخص الرقمي، الربع الثالث
إنفوجرافيك الملخص الرقمي، الربع الثالث
 
Digital Digest Q3 Infographic
Digital Digest Q3 InfographicDigital Digest Q3 Infographic
Digital Digest Q3 Infographic
 
الملخص الرقمي الربع الاخير 2014
الملخص الرقمي  الربع الاخير   2014 الملخص الرقمي  الربع الاخير   2014
الملخص الرقمي الربع الاخير 2014
 
Digital Digest Q4 2014
Digital Digest Q4 2014Digital Digest Q4 2014
Digital Digest Q4 2014
 
TOP TEN: Big Data_ Issue 16 _ Dec 2014
TOP TEN: Big Data_ Issue 16 _ Dec 2014TOP TEN: Big Data_ Issue 16 _ Dec 2014
TOP TEN: Big Data_ Issue 16 _ Dec 2014
 
البيانات الضخمة: 10 استخدامات حالية و مستقبلية
البيانات الضخمة: 10 استخدامات حالية و مستقبلية البيانات الضخمة: 10 استخدامات حالية و مستقبلية
البيانات الضخمة: 10 استخدامات حالية و مستقبلية
 
How Qatar uses WhatsApp, Snapchat and other social media
How Qatar uses WhatsApp, Snapchat and other social mediaHow Qatar uses WhatsApp, Snapchat and other social media
How Qatar uses WhatsApp, Snapchat and other social media
 
عشراستخدامات للطباعة ثلاثية الأبعاد
عشراستخدامات للطباعة ثلاثية الأبعادعشراستخدامات للطباعة ثلاثية الأبعاد
عشراستخدامات للطباعة ثلاثية الأبعاد
 
10 ways people are using 3D printing
10 ways people are using 3D printing10 ways people are using 3D printing
10 ways people are using 3D printing
 
Digital Digest Q3 2014 (English)
Digital Digest Q3 2014 (English)Digital Digest Q3 2014 (English)
Digital Digest Q3 2014 (English)
 
الملخص الرقمي - الربع الثالث 2014
الملخص الرقمي - الربع الثالث 2014الملخص الرقمي - الربع الثالث 2014
الملخص الرقمي - الربع الثالث 2014
 
التقرير الكامل: مواقف مستخدمي الإنترنت في منطقة الشرق الأوسط حيال السلامة وا...
 التقرير الكامل: مواقف مستخدمي الإنترنت في منطقة الشرق الأوسط حيال السلامة وا... التقرير الكامل: مواقف مستخدمي الإنترنت في منطقة الشرق الأوسط حيال السلامة وا...
التقرير الكامل: مواقف مستخدمي الإنترنت في منطقة الشرق الأوسط حيال السلامة وا...
 
عشر تقنيات للعام الدراسي الجديد
عشر تقنيات للعام الدراسي الجديدعشر تقنيات للعام الدراسي الجديد
عشر تقنيات للعام الدراسي الجديد
 
إنفوجرافيك: الملخص الرقمي الربع 2 لعام 2014
إنفوجرافيك: الملخص الرقمي الربع 2 لعام 2014إنفوجرافيك: الملخص الرقمي الربع 2 لعام 2014
إنفوجرافيك: الملخص الرقمي الربع 2 لعام 2014
 
عشر ابتكارات في مجال التجارة الالكترونية
 عشر ابتكارات في مجال التجارة الالكترونية عشر ابتكارات في مجال التجارة الالكترونية
عشر ابتكارات في مجال التجارة الالكترونية
 
Tech Top 10s: Innovations in e commerce
Tech Top 10s: Innovations in e commerceTech Top 10s: Innovations in e commerce
Tech Top 10s: Innovations in e commerce
 
Tech Top 10... Innovations for "Social Good"
Tech Top 10... Innovations for "Social Good"Tech Top 10... Innovations for "Social Good"
Tech Top 10... Innovations for "Social Good"
 
عشر ابتكارات تكنولوجية في مجال الأعمال الخيرية
 عشر ابتكارات تكنولوجية في مجال الأعمال الخيرية عشر ابتكارات تكنولوجية في مجال الأعمال الخيرية
عشر ابتكارات تكنولوجية في مجال الأعمال الخيرية
 

Recently uploaded

Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfOrbitshub
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWERMadyBayot
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Orbitshub
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesrafiqahmad00786416
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...apidays
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistandanishmna97
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Zilliz
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Victor Rentea
 
Introduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMIntroduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMKumar Satyam
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelDeepika Singh
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityWSO2
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)Samir Dash
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...apidays
 

Recently uploaded (20)

Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
Introduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMIntroduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDM
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 

Attitudes to online Privacy and Security

  • 1. Attitudes to Privacy and Security Damian Radcliffe Social Impact Department Manager ICT and Society Damian Radcliffe Email: dradcliffe@ict.gov.qa Twitter: @damianradcliffe
  • 2. 2 MENA fastest growing online region Online penetration still quite low, especially in North Africa, but the MENA region will see the fastest levels of take up in the coming years.
  • 3. 3 And eCommerce will be part of this mix
  • 4. 4 But, comparatively, MENA remains a small international B2C market North America & Asia-Pacific dominate global share; with Asia-Pacific becoming the predominant B2C market this year
  • 5. So what do we know about what people do online, and their attitudes and behaviors? 5
  • 6. ICT Penetration among Individuals 6
  • 7. Examples of tasks performed by Internet users in Qatar 7
  • 8. 8 Concerns of Internet users in Qatar
  • 9. Many similarities to those not online Skills: Don’t know how to do a certain task. Knowledge: Don’t understand how the Internet benefits them. Trust: Don’t trust the Internet for certain tasks. Or the Internet more generally. Fear of virus and malware. Preferences: Face to face communication remains popular. 9
  • 10. 10 In a good place to move forward
  • 11. 11 But need to remain vigilant
  • 12. 12 Online activity does not necessarily equate to feeling safe online
  • 13. An idea perhaps reflected in what people in MENA do online 13
  • 14. 14 Especially when compared with online activities globally
  • 15. Yet compelling propositions can help override many user concerns 15 UK data suggests concerns relating to personal privacy, security or fraud don’t appear to inhibit online behaviors. People’s propensity to trust a website increases if their desire for the product or service on offer is great
  • 16. • Concerns re privacy and security will continue especially as new technology is rolled out e.g. NFC, newer Apps etc. • We need to continue to sell the benefits of being online to both non-users and users. • You can also play a role in helping promote being safe and secure online. 16 Future Considerations We look forward to working with you and making this happen.
  • 17. 1717 Thanks for listening. Find out more on Internet usage in Qatar: www.ictqatar.qa Get our quarterly digest of emerging issues and evidence of ICT behaviors in the MENA region at: www.slideshare.net/ictqatar

Editor's Notes

  1. http://cdn.thenextweb.com/wp-content/blogs.dir/1/files/2012/10/asia-internet-users-520x391.png
  2. Needs info re sample size
  3. When? Source?
  4. e.g. 55% of UK adult internet users admit they use the same password for most, if not all, websites. 26% admit to using easy to remember passwords such as birthdays or names, potentially opening themselves up to the threat of account hacking.