This document presents survey results on internet security priorities from interviews with 1,000 registered voters in the US. The key findings were:
1. Voters are much more worried about hacking and identity theft than about companies tracking their online activity to target ads. 2. An overwhelming majority see protecting security and personal information as more important than protecting browsing history. 3. While most voters share information online, they also take active steps like using passwords on devices and different passwords for each account to protect their security and privacy.
Together with Motorola The R Simmons Group is offering the Community Engagement Networking Technology Service. Motorola supplies a powerful tipping platform, while RSG provides a valuable community analysis to inform you of how to drive greater engagement and inform on community member preference.
2019 Identity Protection and Data Breaches Survey 4iQ
4iQ recently surveyed over 2,300 U.S. adults on their perceptions of data breaches and how they are personally impacted, what kind of assistance they received in its wake, and how prepared they are at protecting their own personally identifiable information (PII).
This survey analyses the level of concern shown by Indian users on the internet. The survey responses were collected with Google Forms and analyzed/visualized with Python
President Trump’s approval rating is divided by party lines, with 80% of Republicans, 36% of Independents and just 10% of Democrats approving of Trump’s performance.
Together with Motorola The R Simmons Group is offering the Community Engagement Networking Technology Service. Motorola supplies a powerful tipping platform, while RSG provides a valuable community analysis to inform you of how to drive greater engagement and inform on community member preference.
2019 Identity Protection and Data Breaches Survey 4iQ
4iQ recently surveyed over 2,300 U.S. adults on their perceptions of data breaches and how they are personally impacted, what kind of assistance they received in its wake, and how prepared they are at protecting their own personally identifiable information (PII).
This survey analyses the level of concern shown by Indian users on the internet. The survey responses were collected with Google Forms and analyzed/visualized with Python
President Trump’s approval rating is divided by party lines, with 80% of Republicans, 36% of Independents and just 10% of Democrats approving of Trump’s performance.
Its 2018... Should Pharma Still be Scared of Digital?Gary Monk
One of Pharma's biggest fears when it comes to adopting digital and new technology, is fear of regulations and compliance. To see how much of an issue this really is, breaches of the ABPI code of practice were analyzed over 2017 & 2016, across all channels. The results are interesting...
TNS Infographic - Data Breach Targets RevealedTNSIMarketing
Are you a typical target for a data breach? Take a look at our latest infographic which reveals the worst affected industries, the most common types of incident and how the point-of-sale is vulnerable to compromise
This week’s Reuters/Ipsos Core Political release presents something of an outlier of our trend. Every series of polls has the occasional outlier and in our opinion this is one. So, while we are reporting the findings in the interest of transparency, we will not be announcing the start of a new trend until we have more data to validate this pattern.
Five cyber threats to be careful in 2018Ronak Jain
It is not true that people are safe from hackers because they only target big companies for money and other purposes. Every person using debit or credit cards, doing online transactions, using the internet can get affected by cyber threats. You may lose money before even recognizing the situation. Simple mistakes from users open the entry for virus and malware coded by hackers.
California Congressional District 21 Immigration Reform Survey - Magellan Str...Magellan Strategies
Magellan Strategies public releases of the results of a 687n autodial and cell phone survey of likely 2014 general election voters in California Congressional District 22 regarding the opinion of Immigration reform. Conducted on October 7th - 8th, 2013
The National Cyber Security Centre and Department for Digital, Culture, Media and Sport have released findings from the UK Cyber Survey conducted by Ipsos MORI. These findings are from a study of UK individuals to measure and understand awareness and attitudes towards cyber security, and related behaviours. They are part of a wider research project to provide insight to inform HM Government’s approach to encourage positive behaviour amongst the public in protecting themselves against cyber threats.
Let’s understand about the “2017 Norton Cyber Security Insights Report”, the main topics of this reports are Cybercrime by the Numbers, Portrait of a Cybercrime Victim, Consumers’ Contradicting Beliefs, and State of Consumers’ Trust.
Lack of passwords, use of public Wi-Fi lead consumer cyber security risks. New survey from Experian's ProtectMyID® reveals how Americans can take greater control when securing their personal information. The study, conducted by Edelman Berland, reveals areas where consumers’ identities are at the most risk, including electronic devices and online accounts. The findings show that 93 percent of respondents believe that identify theft is a growing problem, yet are not doing enough to address the issue.
Its 2018... Should Pharma Still be Scared of Digital?Gary Monk
One of Pharma's biggest fears when it comes to adopting digital and new technology, is fear of regulations and compliance. To see how much of an issue this really is, breaches of the ABPI code of practice were analyzed over 2017 & 2016, across all channels. The results are interesting...
TNS Infographic - Data Breach Targets RevealedTNSIMarketing
Are you a typical target for a data breach? Take a look at our latest infographic which reveals the worst affected industries, the most common types of incident and how the point-of-sale is vulnerable to compromise
This week’s Reuters/Ipsos Core Political release presents something of an outlier of our trend. Every series of polls has the occasional outlier and in our opinion this is one. So, while we are reporting the findings in the interest of transparency, we will not be announcing the start of a new trend until we have more data to validate this pattern.
Five cyber threats to be careful in 2018Ronak Jain
It is not true that people are safe from hackers because they only target big companies for money and other purposes. Every person using debit or credit cards, doing online transactions, using the internet can get affected by cyber threats. You may lose money before even recognizing the situation. Simple mistakes from users open the entry for virus and malware coded by hackers.
California Congressional District 21 Immigration Reform Survey - Magellan Str...Magellan Strategies
Magellan Strategies public releases of the results of a 687n autodial and cell phone survey of likely 2014 general election voters in California Congressional District 22 regarding the opinion of Immigration reform. Conducted on October 7th - 8th, 2013
The National Cyber Security Centre and Department for Digital, Culture, Media and Sport have released findings from the UK Cyber Survey conducted by Ipsos MORI. These findings are from a study of UK individuals to measure and understand awareness and attitudes towards cyber security, and related behaviours. They are part of a wider research project to provide insight to inform HM Government’s approach to encourage positive behaviour amongst the public in protecting themselves against cyber threats.
Let’s understand about the “2017 Norton Cyber Security Insights Report”, the main topics of this reports are Cybercrime by the Numbers, Portrait of a Cybercrime Victim, Consumers’ Contradicting Beliefs, and State of Consumers’ Trust.
Lack of passwords, use of public Wi-Fi lead consumer cyber security risks. New survey from Experian's ProtectMyID® reveals how Americans can take greater control when securing their personal information. The study, conducted by Edelman Berland, reveals areas where consumers’ identities are at the most risk, including electronic devices and online accounts. The findings show that 93 percent of respondents believe that identify theft is a growing problem, yet are not doing enough to address the issue.
Personal privacy in the networked age is limited by three dimensions of “veillance.” They shape people’s behavior and their anxieties about the future of privacy. Lee Rainie will present the latest survey findings from the Pew Research Center about how people try to navigate this new environment in their relationship with government, commercial enterprises, and each other. He will also discuss how some technologists are trying to respond.
2018 Survey: Consumer Attitudes in a Post-Breach Era - The Generational GapPing Identity
Consumers under 35 and over 55 have significant differences in the way they think about security, willingness to share personal information, investment in data protection and use of technology like biometrics. Check out the infographic to see where Ping Identity’s survey revealed the biggest differences.
Lee Rainie, Director, Internet, Science and Technology from the Pew Research Center to delivered a keynote address at WAN-IFRA’s first World Media Policy Forum. Rainie is one of the world’s top academic researchers on the internet and the social changes triggered by information and communication technologies (ICT.) He talked about what research is showing us about privacy strategies and statistics.
Many security breaches we saw in the past few years and how it affect the number of businesses it include large and small businesses. We will study what is breach and how it will effect on our business and what are the main causes of it. Why social media account is harm for us and how the largest organizations got breached and how would we stop to get breach our data. Our main target Is related to business it could be small or large business. We will discuss that how companies got lost their reputation because of data breach and how much companies got loss of money it include the organization that we all are known about it like Facebook.
↓↓↓↓ Read More:
Watch my videos on snack here: --> --> http://sck.io/x-B1f0Iy
@ Kindly Follow my Instagram Page to discuss about your mental health problems-
-----> https://instagram.com/mentality_streak?utm_medium=copy_link
@ Appreciate my work:
-----> behance.net/burhanahmed1
Thank-you !
Discover the hard facts and real risks of identity theft from Javelin Strategy & Research. Here we share the 2012 Identity Fraud Report findings that reveal the new fraud frontier of social media and mobile—and why even the most sophisticated technology users are vulnerable. See how individuals and businesses can protect personal information from identity theft while interacting online, and learn more at http://www.LifeLockBusinessSolutions.com.
Consumer Mobile Policy & Security - Lightspeed & KantarMerlien Institute
at Market Research in the Mobile World Europe
23 - 26 September 2014, Belin, Germany
This event is proudly organised by Merlien Institute
Check out our upcoming events by visiting http://www.mrmw.net
Grbn trust and personal data survey a call to actionAndrew Cannon
The GRBN global Trust & Personal Data survey highlights just how concerned people are about their data and who they (dis)trust with their data. What needs to be done (by whom) to improve trust?
DV 2016: Don't Track Me, Bro - Security and Privacy as a DifferentiatorTealium
Joe Christopher, Blast Analytics & Marketing
With the rise of Big Data, we’ve seen significant changes in innovation surrounding collecting, storing, and leveraging customer data. At the same time, consumers are expressing an increasing concern over their privacy and how their data is being used. Companies now have an opportunity to differentiate with the privacy and data security they offer to customers, and ultimately, win the trust of privacy conscious shoppers. In this session, Joe Christopher of Blast Analytics and Marketing explores how the government agency overseeing Healthcare.gov – the Health Insurance Marketplace - transformed their relationship with consumers by offering the most advanced, granular privacy controls available.
Similar to Ccia internet security presentation fin (20)
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfPeter Spielvogel
Building better applications for business users with SAP Fiori.
• What is SAP Fiori and why it matters to you
• How a better user experience drives measurable business benefits
• How to get started with SAP Fiori today
• How SAP Fiori elements accelerates application development
• How SAP Build Code includes SAP Fiori tools and other generative artificial intelligence capabilities
• How SAP Fiori paves the way for using AI in SAP apps
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfPaige Cruz
Monitoring and observability aren’t traditionally found in software curriculums and many of us cobble this knowledge together from whatever vendor or ecosystem we were first introduced to and whatever is a part of your current company’s observability stack.
While the dev and ops silo continues to crumble….many organizations still relegate monitoring & observability as the purview of ops, infra and SRE teams. This is a mistake - achieving a highly observable system requires collaboration up and down the stack.
I, a former op, would like to extend an invitation to all application developers to join the observability party will share these foundational concepts to build on:
Welocme to ViralQR, your best QR code generator.ViralQR
Welcome to ViralQR, your best QR code generator available on the market!
At ViralQR, we design static and dynamic QR codes. Our mission is to make business operations easier and customer engagement more powerful through the use of QR technology. Be it a small-scale business or a huge enterprise, our easy-to-use platform provides multiple choices that can be tailored according to your company's branding and marketing strategies.
Our Vision
We are here to make the process of creating QR codes easy and smooth, thus enhancing customer interaction and making business more fluid. We very strongly believe in the ability of QR codes to change the world for businesses in their interaction with customers and are set on making that technology accessible and usable far and wide.
Our Achievements
Ever since its inception, we have successfully served many clients by offering QR codes in their marketing, service delivery, and collection of feedback across various industries. Our platform has been recognized for its ease of use and amazing features, which helped a business to make QR codes.
Our Services
At ViralQR, here is a comprehensive suite of services that caters to your very needs:
Static QR Codes: Create free static QR codes. These QR codes are able to store significant information such as URLs, vCards, plain text, emails and SMS, Wi-Fi credentials, and Bitcoin addresses.
Dynamic QR codes: These also have all the advanced features but are subscription-based. They can directly link to PDF files, images, micro-landing pages, social accounts, review forms, business pages, and applications. In addition, they can be branded with CTAs, frames, patterns, colors, and logos to enhance your branding.
Pricing and Packages
Additionally, there is a 14-day free offer to ViralQR, which is an exceptional opportunity for new users to take a feel of this platform. One can easily subscribe from there and experience the full dynamic of using QR codes. The subscription plans are not only meant for business; they are priced very flexibly so that literally every business could afford to benefit from our service.
Why choose us?
ViralQR will provide services for marketing, advertising, catering, retail, and the like. The QR codes can be posted on fliers, packaging, merchandise, and banners, as well as to substitute for cash and cards in a restaurant or coffee shop. With QR codes integrated into your business, improve customer engagement and streamline operations.
Comprehensive Analytics
Subscribers of ViralQR receive detailed analytics and tracking tools in light of having a view of the core values of QR code performance. Our analytics dashboard shows aggregate views and unique views, as well as detailed information about each impression, including time, device, browser, and estimated location by city and country.
So, thank you for choosing ViralQR; we have an offer of nothing but the best in terms of QR code services to meet business diversity!
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
A tale of scale & speed: How the US Navy is enabling software delivery from l...sonjaschweigert1
Rapid and secure feature delivery is a goal across every application team and every branch of the DoD. The Navy’s DevSecOps platform, Party Barge, has achieved:
- Reduction in onboarding time from 5 weeks to 1 day
- Improved developer experience and productivity through actionable findings and reduction of false positives
- Maintenance of superior security standards and inherent policy enforcement with Authorization to Operate (ATO)
Development teams can ship efficiently and ensure applications are cyber ready for Navy Authorizing Officials (AOs). In this webinar, Sigma Defense and Anchore will give attendees a look behind the scenes and demo secure pipeline automation and security artifacts that speed up application ATO and time to production.
We will cover:
- How to remove silos in DevSecOps
- How to build efficient development pipeline roles and component templates
- How to deliver security artifacts that matter for ATO’s (SBOMs, vulnerability reports, and policy evidence)
- How to streamline operations with automated policy checks on container images
2. Methodology
The Benenson Strategy Group and American Viewpoint conducted 1,000
telephone interviews from November 12-18, 2013.
Interviews were conducted with registered voters nationwide who use the
Internet.
Voters were defined as those who voted in the 2012 presidential election or
registered to vote after November 2012.
The margin of error for the entire data set is 3.02% at the 95% confidence
level. It is higher among subgroups.
Contact Information
For questions about the data contained in this presentation, please contact:
Danny Franklin, Benenson Strategy Group: dfranklin@bsgco.com; 212-702-8777
David Kanevsky, American Viewpoint: david@amview.com; 703-684-3325
ALL DATA CONTAINED IN THIS DECK IS EMBARGOED
UNTIL 12:01AM ON FRIDAY DEC 20, 2013
2
3. Voters Are Much More Worried
about Hacking than Tracking
ALL DATA CONTAINED IN THIS DECK IS EMBARGOED
UNTIL 12:01AM ON FRIDAY DEC 20, 2013
4. Voters Deeply Worried about Security of Their
Info; Stopping Tracking for Ads Is Not a Priority
Voters 20x more likely to say top concern is ID theft than to say targeted ads
Key Attitudes on Privacy and Security
Worry about Privacy and Security
Top Concern about Online Privacy and Security
(Forced Choice)
Not Worried
Worried
Having your information or
identity stolen online
25%
44%
58%
18%
Kids not being safe online
Government being able to
access your info online
75%
15%
Personal Info Stolen
3%
All of these
54%
Services targeting ads to
you based on your online
activity
5%
History Tracked for Ads
How worried are you about your personal information, such as your Social Security
number or financial records, being stolen by online hackers?
How worried are you about your online search and browsing history or emails being
tracked by or sold by internet companies to target ads based on that activity?
Which of these are you most worried about?
EMBARGOED UNTIL 12:01AM
ON FRIDAY DEC 20, 2013
4
5. Overall, Voters Are 5x More Concerned with
Hacking over Tracking
Priorities: Worries about Security and Privacy
Which generally worries you more?
The information I
share online will be
hacked to cause harm
or steal from me
80%
84%
79%
16%
14%
18%
All Voters
(100%)
Worried about Hacking
(75%)
Worried about Tracking
(54%)
Companies will use the
information I share
online to target
advertising to me
Which generally worries you more?
EMBARGOED UNTIL 12:01AM
ON FRIDAY DEC 20, 2013
5
6. Protecting Security Is Far More Important to
Voters than Protecting Browsing History
Even voters concerned about Internet tracking clearly prioritize security
Priorities: Protecting Online Security and Privacy
Which is more important to you?
Protecting your personal
information, such as your Social
Security number or financial
records, from online hackers
87%
88%
84%
6%
6%
8%
6%
8%
All Voters
(100%)
Worried about Hacking
(75%)
Worried about Tracking
(54%)
Protecting information about your
online behavior, such as your online
searches and browsing history or
emails, from Internet companies who
target ads based on that activity
No difference/Don’t know/Refused
Which is more important to you…?
7%
EMBARGOED UNTIL 12:01AM
ON FRIDAY DEC 20, 2013
6
7. Voters Want a Free Internet Paid For by Ads
rather than a Fee-Based Internet with No Ads
Even voters who would pay to have no ads say security is more important
When it comes to online services like email or social networks, which would you prefer?
61%
A free service that is supported by ads that
are targeted to you based on your online activity
This is the most popular position across
demographic groups, with young people and
heavy Internet users even more likely to agree:
18-34 yrs: 69% free service
Use Internet more than once/day: 65%
free service
When it comes to online services like email or social networks,
which would you prefer?
33%
A service that you pay a fee to use that
doesn't have ads that are targeted to
you based on your online activity
Even those who would pay to have
no ads are more much more
concerned about security:
86% say it’s more important to protect
their personal info from hackers vs.
8% who say it’s more important to
protect browsing info from companies
EMBARGOED UNTIL 12:01AM
ON FRIDAY DEC 20, 2013
7
8. Voters Feel Vulnerable to Hacking
and Want the Government To Act
ALL DATA CONTAINED IN THIS DECK IS EMBARGOED
UNTIL 12:01AM ON FRIDAY DEC 20, 2013
9. Security Is a Priority Due to Acute Awareness of
Risk: Most Are or Know a Victim of Online Breach
Experience with Online Security Breaches
Have you or anyone you know had your online
accounts breached?
Received a suspicious email you
suspected came from a breached
account:
Know someone or themselves
Don't know anyone
Financial account
breached
50%
49%
21% say they personally have had a
financial breach
Email account
breached
55%
43%
23% say they personally have had an
email breach
Have you or someone you know ever had their online financial accounts breached, such
as a credit card number stolen or a bank account hacked?
Have you or someone you know ever had their email account breached?
Have you ever received a suspicious email from a friend that you think was the result of
their email account being breached?
Yes
62%
No
36%
Voters
EMBARGOED UNTIL 12:01AM
ON FRIDAY DEC 20, 2013
9
10. Consequently, There Is Strong and Decisive
Desire for Gov’t Action on Identity Theft
Want gov’t to go after criminal hackers not the companies that were hacked
Role for Government In Protecting Security
Which of the following comes closer to
your view?
What should be the more important
priority for government regulators?
19%
The federal gov’t
has done enough
74%
to prevent and act
against identity
The federal gov’t
theft
needs to do
more to prevent
and act against
identity theft
7%
60%
Don’t
know
56% strongly
believe this
Which of the following comes closer to your view? And would you say you
feel strongly about that or not too strongly about that?
When a company is the target of an online security breach, what should
be the more important priority for government regulators?
34%
Tracking down the
hackers who steal
consumer data
from companies
and individuals
Investigating the
security practices
of the company
that was hacked
and had consumer
data stolen
EMBARGOED UNTIL 12:01AM
ON FRIDAY DEC 20, 2013
10
11. Voters Choose To Share Info; Know
How and Act To Protect Privacy
ALL DATA CONTAINED IN THIS DECK IS EMBARGOED
UNTIL 12:01AM ON FRIDAY DEC 20, 2013
12. Voters Share Information Online through a
Variety of Channels
Voters: Online Behaviors
Voters Have Accounts on:
Online Behaviors: % Do Each Monthly or More
Facebook
Send personal emails
80%
Login to a social networking
site
70%
Use online banking
64%
Make a purchase online with
a credit card
56%
Post a status update on a
social networking site
51%
Allow your location to be
used by a mobile app
Use a mobile banking app
Get info from a health
insurer or your doctor online
Amazon
40%
36%
21%
*Showing activities 20% or more do monthly
How often do you do this?
Do you have an account on any of the following?
Do you regularly use any of the following devices?
53%
Google
LinkedIn
Twitter
Pinterest
Instagram
47%
Post a photo or video you
took to share with friends
69%
46%
25%
23%
20%
16%
And Access Them through:
91%
Computer
63%
Smartphone
44%
Tablet
E-Reader
22%
EMBARGOED UNTIL 12:01AM
ON FRIDAY DEC 20, 2013
12
13. Voters Are Taking Concrete Steps To Protect
Themselves, Especially on Security
Steps Taken To Protect Online Security & Privacy
% have taken this step
Protecting Security
83%
Required a password to unlock your device
76%
Used a different password for each service
73%
Not allowing a service to remember your credit card information
66%
Set your browser to never remember login info
57%
Signed up to use a two-step sign-on process
Protecting Privacy
Set your browser to disable cookies
65%
Read privacy policies for websites you visit
65%
Set privacy settings so that only certain friends can see your page
64%
53%
Blocked an app from accessing your location information
Removed or taken down personal information about yourself
47%
Used the private browsing mode on your internet browser
37%
Set privacy settings so that you do not come up in searches
36%
Have you ever taken this step or have you never done this?
EMBARGOED UNTIL 12:01AM
ON FRIDAY DEC 20, 2013
13
14. Most Report Being Cautious with Passwords,
but Secure Password Habits Not Universal
1 in 3 voters who use same password across Internet at high risk for theft
Password Behaviors
Which of the Following Best Describes You?
You have different
passwords on almost
every site that you use
32%
You tend to use the
same one or two
passwords on most of
your sites
63%
Now think about the passwords that you have on your various online
accounts. Which of the following statements would you say best
describes you?
EMBARGOED UNTIL 12:01AM
ON FRIDAY DEC 20, 2013
14
15. Voters Knowledgeable about Steps To Protect
Their Privacy and Take Action To Do So
Those who adjusted settings concerned about security of personal info
Have you ever adjusted the privacy settings on a social networking or online account?
Yes - 68%
No - 31%
Main reason why you changed your privacy settings
78%
(Open-End)
Actively chose not to
change their settings
Protecting security of my information (NET)
47%
Trying to protect my personal information
41%
(24% of all voters)
My account has been hacked in the past
7%
vs.
Keeping individuals out of my private life (NET)
32%
Didn't want strangers seeing this info/Don't want to be harassed or
stalked
22%
16%
Wanted to limit who had access/ Didn’t want people I know to see it
16%
Thought was right thing to do/someone recommended it
7%
Don’t want a lot of ads
2%
who said: I don’t know
how
(7% of all voters)
Thinking about social networking and other online accounts that you have,
EMBARGOED UNTIL
have you ever adjusted the privacy settings on your accounts?
What is the main reason why you changed privacy settings on your accounts?
ON FRIDAY DEC
What is the reason why you have not changed privacy settings on your accounts?
12:01AM
20, 2013
15